IoT

Wi-Fi BLE RSSI SQI Localization dataset

 
Wi-Fi BLE RSSI for positioning / Indoor Localization in 4 different locations and using 18 different APs

Data is only measured at the Router Side

Data is not measured at client side

Has 12 datasets inside the zip folder with over 1,000,000 data points

Categories:
613 Views

This dataset presents real-world IoT device traffic captured under a scenario termed "Active," reflecting typical usage patterns encountered by everyday users. Our methodology emphasizes the collection of authentic data, employing rigorous testing and system evaluations to ensure fidelity to real-world conditions while minimizing noise and irrelevant capture.

Categories:
336 Views

Privacy perception refers to the control individuals have over the use of their data, including determining who can access, share, and utilize it without interference or intrusion. In the context of the Internet of Things (IoT), particularly in Smart Home Data Monetization (SH-DM), users’ data is aggregated and made available to potential service providers to target end users with personalized advertisements.

Categories:
318 Views

The rapid evolution of wireless technology has led to the proliferation of small, low-power IoT devices, often constrained by traditional battery limitations, resulting in size, weight, and maintenance challenges. In response, ambient radio frequency (RF) energy harvesting has emerged as a promising solution to power IoT devices using RF energy from the environment. However, optimizing the placement of energy harvesters is crucial for maximizing energy reception. This paper employs machine learning (ML) techniques to predict areas with high power intensity for RF energy harvesting.

Categories:
249 Views

Database of the times the device remained in each state (idle, low power mode, transmitting and listening, respectively), number of hops, hop distance (d), transmission rate (_R) and size of the packet sent (_Nb), measured on the Tmote Sky device using an Aloha Puro protocol with RDC implemented in the Contiki operating system.

Categories:
181 Views

DataSet used in learning process of the traditional technique's operation, considering different devices and scenarios, perform the commutation through Pure ALOHA protocol, and make the device to operate with the best possible configuration.The control of energy consumption is essential for the operation of battery-operated systems, such as those used in IoT networks and sensors. The algorithms commonly employed for this purpose involve optimization functions with considerable complexity and rigorous control of the test environment.

Categories:
289 Views

16.00

Normal
0

false
false
false

EN-GB
X-NONE
X-NONE

Categories:
235 Views

As the field of human-computer interaction continues to evolve, there is a growing need for new methods of gesture recognition that can be used in a variety of applications, from gaming and entertainment to healthcare and robotics. While traditional methods of gesture recognition rely on cameras or other optical sensors, these systems can be limited by factors such as lighting conditions and occlusions.

Categories:
628 Views

<p><span style="color: #3c4043; font-family: Inter, sans-serif; font-size: 14px;">The dataset is collected from 3 MPU9250 sensors connected simultaneously on different positions of the hand. One sensor was placed on the wrist, another between wrist and elbow and another between elbow and shoulder. The dataset contains a 3-axis accelerometer, 3-axis gyroscope and 3-axis magnetometer readings along with a result column in which '1' denoted shaking hand and '0' denoted stable hand.

Categories:
491 Views

Radio frequency fingerprint identification (RFFI) is an emerging device authentication technique, which exploits the hardware characteristics of the RF front-end as device identifiers. The receiver hardware impairments interfere with the feature extraction of transmitter impairments, but their effect and mitigation have not been comprehensively studied. In this paper, we propose a receiver-agnostic RFFI system by employing adversarial training to learn the receiver-independent features.

Categories:
70 Views

Pages