IoT

The dataset contains the path loss measurements obtained with a LoRa (868 MHz) transmitting radio and five receivers. The receivers move in a search area covering both outdoor and indoor areas wherein a double-slope path loss is experienced. The data can be used to test range-based localization algorithm through the received signal strength.

Categories:
476 Views

It is important for network operators to carry out traffic and application characterization to gain insights into the activity of their networks. Several studies proposed methods that extract features from network traffic to characterize it, or to classify the application that produced it, based on a ?man in the middle? network interception point that can analyze the entire network traffic of an organization.

Categories:
538 Views

The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS attacks since most of them filter the normal and attack traffic based upon the static predefined rules.

Categories:
7792 Views

Any work using this dataset should cite this paper as follows:

Nirmalya Thakur and Chia Y. Han, "Country-Specific Interests towards Fall Detection from 2004–2021: An Open Access Dataset and Research Questions", Journal of Data, Volume 6, Issue 8, pp. 1-21, 2021.

Abstract

Categories:
1850 Views

The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established.

Categories:
11979 Views

This is a communication dataset for the simulation of WSNs in TinyOS.

There are two groups of files. They are used separately for the simulation of topology and noise in the communication of WSNs. They work for the platform TinyOS.

Categories:
304 Views

This is Chromatographic Data of some Transformer

Categories:
148 Views

Using Wi-Fi IEEE 802.11 standard, radio frequency waves are mainly used for communication on various devices such as mobile phones, laptops, and smart televisions. Apart from communication applications, the recent research in wireless technology has turned Wi-Fi into other exploration possibilities such as human activity recognition (HAR). HAR is a field of study that aims to predict motion and movement made by a person or even several people.

Categories:
4384 Views

As Science and technology evolve, the environment is getting affected daily. These cause major environmental issues like Global Warming, Ozone layer depletion, Natural resource depletion, etc. These are measured and regulated by local bodies. The data given by the local bodies are average values for a large area, those data might be inaccurate for a small sector or isolated zone. However, there are few techniques such as WSN (Wireless Sensor Networks), IoT (Internet of things) which measures and updates real-time data to a cloud server to overcome the trouble.

Categories:
1697 Views

Industrial Internet of Things (IIoTs) are high-value cyber targets due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the compromise of any single device can extend to the whole system and disrupt critical functions. There are various security solutions that detect and mitigate intrusions.

Categories:
4900 Views

Pages