Machine Learning
GPS spoofing and jamming are common attacks against the UAV, however, conducting these experiments for research can be difficult in many areas. This dataset consists of a logs from simulation and live fights. Logs include data from a benign flight as well as one where the UAV experiences an attack.
Simulated Attacks
Note: This is not the most accurate of the data. We recommend using the live GPS Spoofing and Jamming data if possible.
- Categories:
Along with the increasing use of unmanned aerial vehicles (UAVs), large volumes of aerial videos have been produced. It is unrealistic for humans to screen such big data and understand their contents. Hence methodological research on the automatic understanding of UAV videos is of paramount importance.
- Categories:
This is a dataset having paired thermal-visual images collected over 1.5 years from different locations in Chitrakoot, India and Prayagraj, India. The images can be broadly classified into greenery, urban, historical buildings and crowd data.
The crowd data was collected from the Maha Kumbh Mela 2019, Prayagraj, which is the largest religious fair in the world and is held every 6 years.
- Categories:
A Traffic Light Controller PETRI_NET (Finite State Machine) Implementation.
An implementation of FSM approach can be followed in systems whose tasks constitute a well-structured list so all states can be easily enumerated. A Traffic light controller represents a relatively complex control function
- Categories:
16.00
Normal
0
7.8 磅
0
2
false
false
false
EN-US
ZH-CN
X-NONE
- Categories:
Dataset of GPS, inertial and WiFi data collected during road vehicle trips in the district of Porto, Portugal. It contains 40 trip datasets collected with a smartphone fixed on the windshield or dashboard, inside the road vehicle. The dataset was collected and used in order to develop a proof-of-concept for "MagLand: Magnetic Landmarks for Road Vehicle Localization", an approach that leverages magnetic anomalies created by existing road infrastructure as landmarks, in order to support current vehicle localization system (e.g. GNSS, dead reckoning).
- Categories:
Collision detection (CD) is a key capability of carrier sense multiple access (CSMA) based medium access control (MAC) protocol. Applying CD, the transmitter can abort transmission immediately so that the power can be saved. This technique does not need the peer receiver to give feedback on whether there is a packet collision, and hence, the overall overhead is significantly low. The challenge, however, is to operate in transmit time and instantly detect the week colliding signal in the presence of strong self-interference (SI).
- Categories:
This dataset features cooking activities with recipes and gestures labeled. The data has been collected using two smartphones (right arm and left hip), two smartwatches (both wrists) and one motion capture system with 29 markers. There were 4 subjects who prepared 3 recipes (sandwich, fruit salad, cereal) 5 times each. The subjects followed a script for each recipe but acted as naturally as possible
- Categories:
Double-identity fingerprint is a fake fingerprint created by aligning two fingerprints for maximum ridge similarity and then joining them along an estimated cutline such that relevant features of both fingerprints
are present on either sides of the cutline. The fake fingerprint containing the features of the criminal and his innocuous accomplice can be enrolled with an electronic machine readable travel document and later used to cross the automated
- Categories: