IoT

The Internet of Things (IoT) is the nova emergence of connecting devices, people, and objects over the internet as sensors and actuators for a targeted application. Among popular IoT applications, location based IoT services are curtailed. Where the geographical location of a moving object will be estimated based on signal strength values using algorithms. To estimate the locations using algorithms distance measurement such as Received Signal Strength Indicator (RSSI) is required.

Categories:
198 Views

The project research team successfully established China's first Inertial Motion Tracking Dataset (IMTD), which can be widely used for artificial intelligence model training in fields such as satellite-free navigation, unmanned driving, and wearable devices. Based on the IMTD dataset, the motion tracking method proposed by Wang Yifeng, Zhao Yi, and others breaks through the limitations of traditional motion tracking and positioning technologies such as inertia, optics, GPS, and carrier phase.

Categories:
350 Views

We introduce a high-performance computer vision based Intraveneous (IV) infusion speed measurement system as a camera application on an iPhone or Android phone. Our system uses You Only Look Once version 5 (YOLOv5) as it was designed for real-time object detection, making it substantially faster than two-stage algorithms such as R-CNN. In addition, YOLOv5 offers greater precision than its predecessors, making it more competitive with other object detection methods.

Categories:
65 Views

Smart homes contain programmable electronic devices (mostly IoT) that enable home automation. People who live in smart homes benefit from interconnected devices by controlling them either remotely or manually/autonomously. However, high interconnectivity comes with an increased attack surface, making the smart home an attractive target for adversaries. NCC Group and the Global Cyber Alliance recorded over 12,000 attacks to log into smart home devices maliciously. Recent statistics show that over 200 million smart homes can be subjected to these attacks.

Categories:
3482 Views

This dataset provides valuable insights into hand gestures and their associated measurements. Hand gestures play a significant role in human communication, and understanding their patterns and characteristics can be enabled various applications, such as gesture recognition systems, sign language interpretation, and human-computer interaction. This dataset was carefully collected by a specialist who captured snapshots of individuals making different hand gestures and measured specific distances between the fingers and the palm.

Categories:
1114 Views

Abstract—This paper presents a novel approach to optimizing resource allocation in Internet of Things (IoT) networks, focusing on enhancing energy efficiency (EE) while maintaining age of information (AoI) awareness through device-to-device (D2D) communication. Our proposed solution integrates simultaneous wireless information and power transfer (SWIPT) with energy harvesting (EH) techniques. Specifically, D2D users employ time switching (TS) to harvest energy from the environment, while IoT users utilize power splitting (PS) to obtain energy from base stations (BS).

Categories:
842 Views

Over 34,000 frames from 60 commercial-off-the-shelf ZigBee devices were collected in various scenarios including indoor/outdoor and line-of-sight/non-line-of-sight (LOS/NLOS). The ZigBee devices are hybrid, with 36 equipped with power amplifiers and the other 24 not. The ZigBee device uses the CC2530 chip, while the power amplifier is the RFX2401C chip. The signal frames in each scenario are placed in a separate folder, where all device numbers are fixed. Each frame reaches its maximum length, which includes 266 symbols.

Categories:
667 Views

This is a dataset for TCS-Fall.
A total of 20 volunteers were invited to take part in the experiment. Each volunteer performed hundreds of falls and non-falls.
All fall data and non-fall data are stored in binary files that can be parsed by Python or matlab.

Categories:
275 Views

This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.

Categories:
4546 Views

Pages