IoT

The boring and repetitive task of monitoring video feeds makes real-time anomaly detection tasks difficult for humans. Hence, crimes are usually detected hours or days after the occurrence. To mitigate this, the research community proposes the use of a deep learning-based anomaly detection model (ADM) for automating the monitoring process.

Categories:
852 Views

This datset contains 2000  images of size 256 X256. The dataset is created by captuirng photos using mobile phone. This dataset is applicable for two classes namely water and wet surface.

Categories:
1494 Views

We propose a blockchain-enabled zero trust information sharing protocol. The proposed protocol supports the filtering of fabricated information, and protect participant privacy during information sharing. We then evaluate its performance using a series of experiments. 

Categories:
431 Views

This data set is the result of model test trained on the basis of the Stanford earthquake dataset (stead): a global data set of seismic signals for AI, which can effectively get the seismic signal and the arrival time of seismic phase from the image, so as to prove the effectiveness of this model

Categories:
549 Views

The Widar3.0 project is a large dataset designed for use in WiFi-based hand gesture recognition. The RF data are collected from commodity WiFi NICs in the form of Received Signal Strength Indicator (RSSI) and Channel State Information (CSI). The dataset consists of 258K instances of hand gestures with a duration of totally 8,620 minutes and from 75 domains. In addition, two sophisticated features from raw RF signal, including Doppler Frequency Shift (DFS) and a new feature Body-coordinate Velocity Profile (BVP) are included.

Categories:
15299 Views

Open dataset from Machine Learning Repository of Center for Machine Learning and Intelligent Systems at the University of California, Irvine.

Categories:
777 Views

This repository hosts the data and code for studying the UAV positioning problem under obstructive environment. This study focuses on the scenario of the low-altitude UAV to ground communication in a dense urban environment. There could be a lot of local structure, such as buildings and trees, that blocks the communication signal. As a result, the UAV should be optimized to smartly explore a good propagation condition to communicate with the user. At the same time, the UAV also needs to balance the communication link with the BS.

Categories:
431 Views

This dataset contains RF signals from drone remote controllers (RCs) of different makes and models. The RF signals transmitted by the drone RCs to communicate with the drones are intercepted and recorded by a passive RF surveillance system, which consists of a high-frequency oscilloscope, directional grid antenna, and low-noise power amplifier. The drones were idle during the data capture process. All the drone RCs transmit signals in the 2.4 GHz band. There are 17 drone RCs from eight different manufacturers and ~1000 RF signals per drone RC, each spanning a duration of 0.25 ms. 

Categories:
16407 Views

Predicting energy consumption is currently a key challenge for the energy industry as a whole.  Predicting the consumption in a certain area is massively complicated due to the sudden changes in the way that energy is being consumed and generated at the current point in time. However, this prediction becomes extremely necessary to minimise costs and to enable adjusting (automatically) the production of energy and better balance the load between different energy sources.

Last Updated On: 
Wed, 12/23/2020 - 12:16
Citation Author(s): 
Isaac Triguero

Performance of Wireless Sensor Networks (WSN) based on IEEE 802.15.4 and Time Slotted Channel Hopping (TSCH) has been shown to be mostly predictable in typical real-world operating conditions. This is especially true for performance indicators like reliability, power consumption, and latency. This article provides and describes a database (i.e., a set of data acquired with real devices deployed in a real environment) about measurements on OpenMote B devices, implementing the 6TiSCH protocol, made in different experimental configurations.

Categories:
3279 Views

Pages