IoT

Abstract—A novel approach is proposed in this article to boost the energy efficiency (EE) of an AoI-aware IoT network. In particular, we propose a new approach that is based a combination of simultaneous wireless information and power

Categories:
526 Views

Over 34,000 frames from 60 commercial-off-the-shelf ZigBee devices were collected in various scenarios including indoor/outdoor and line-of-sight/non-line-of-sight (LOS/NLOS). The ZigBee devices are hybrid, with 36 equipped with power amplifiers and the other 24 not. The ZigBee device uses the CC2530 chip, while the power amplifier is the RFX2401C chip. The signal frames in each scenario are placed in a separate folder, where all device numbers are fixed. Each frame reaches its maximum length, which includes 266 symbols.

Categories:
436 Views

This is a dataset for TCS-Fall.
A total of 20 volunteers were invited to take part in the experiment. Each volunteer performed hundreds of falls and non-falls.
All fall data and non-fall data are stored in binary files that can be parsed by Python or matlab.

Categories:
196 Views

This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.

Categories:
2535 Views

The dataset contains a collection of V2X (Vehicle-to-Everything) messages for classification, prioritization, and spam message detection. It comprises 1,000 messages with varying message types, content, priorities, and spam labels. The messages are sourced from different vehicles with specific destination vehicles or broadcast to all vehicles. They cover various message types, including traffic updates, emergency alerts, weather notifications, hazard warnings, roadwork information, and spam messages. The priority of the messages is categorized as either high, medium, or low.

Categories:
725 Views

This dataset consists of high-resolution visible-spectrum (RGB) and thermal infrared (TIR) images of two vineyards (Vitis vinifera L.) with varieties of Mouhtaro and Merlot, which was captured by Unmanned Aerial Vehicle (UAV) carrying TIR and RGB sensors three times in a cultivation period.

Categories:
621 Views

To illustrate the impact of the obstacles, we consider indoor and outdoor scenarios. We consider the Department of Computer Science and Engineering, IIT(BHU) buildings as indoor buildings and the railway platform as an outdoor scenario. Here, we use single-channel LG in our experiment. The distance between LNs and LG varies from 5 to 50 meters. The floor map illustrates the walls, doors, and windows between LNs and LG. We consider railway stations for the outdoor environment. The outdoor environment did not consist of obstacles between LNs and LG.

Categories:
257 Views

 

This data set contains three activities of laying up, passing, and shooting of nine professional basketball players, collected and processed by Yu Zhou, Chuanshi Xie, and Yufan Wang.

Categories:
103 Views

The dataset contains basketball activity data for nine varsity basketball players of professional skill levels. Each player wore a smart bracelet on their right wrist to record activity data during the event. The smart bracelet contains an accelerometer and gyroscope that collects acceleration and angular velocity information, and it has a sampling frequency of 50 Hz. The basketball activities of the players are laying up, passing and shooting, which are defined as shown in Table 1.

Categories:
49 Views

Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies, i.e., secret key generation (SKG) from wireless fading coefficients during the channel’s coherence time. As opposed to other works, where only specific parts of the protocol are typically investigated, here, we implement the full SKG chain in four indoor experimental campaigns.

Categories:
376 Views

Pages