Signal Processing

This is a data set of alarm deadband design for paper ''Alarm deadband design based on maximum amplitude deviations and Bayesian estimation''.

Categories:
10 Views

This is a data set of delay timer design for paper ''Alarm deadband design based on maximum amplitude deviations and Bayesian estimation''.

Categories:
29 Views

This is a data set of delay timer design for paper ''Alarm deadband design based on maximum amplitude deviations and Bayesian estimation''.

Categories:
9 Views

A dataset of Global Positioning System (GPS) spoofing attacks is presented in this article. This dataset includes data extracted from authentic GPS signals collected from different locationsto emulate a moving and a static autonomous vehicle using a universal software radio peripheral unit configured as a GPS receiver. During the data collection, 13 features are extracted from eight-parallel channels at different receiver stages (i.e., acquisition, tracking, and navigation decoding).

Categories:
118 Views

This dataset is a collection of phase samples retrieved from an in-house design for a Bluetooth Low Energy (BLE) 5.1 based receiver, using an 8-element Uniform Circular Array (UCA). The purpose of the dataset was the implementation of localization techniques based on the use of Angle-of-Arrival data, possible due to the BLE 5.1 Direction Finding (DF) features.

Categories:
32 Views

Images with real ENF traces and related dataset for the paper named "Invisible Geolocation Signature Extraction From a Single Image" published in IEEE Transactions on Information Forensics and Security (T-IFS).

If you used our dataset, please cite our paper as:

J. Choi, C.-W. Wong, A. Hajj-Ahmad, M. Wu, and Y. Ren, "Invisible geolocation signature extraction from a single image," IEEE Transactions on Information Forensics and Security, pp. 2598–2613, Jun. 2022.

Categories:
58 Views

Images with synthetic ENF traces and related dataset for the paper named "Invisible Geolocation Signature Extraction From a Single Image" published in IEEE Transactions on Information Forensics and Security (T-IFS).

If you used our dataset, please cite our paper as:

J. Choi, C.-W. Wong, A. Hajj-Ahmad, M. Wu, and Y. Ren, "Invisible geolocation signature extraction from a single image," IEEE Transactions on Information Forensics and Security, pp. 2598–2613, Jun. 2022.

Categories:
38 Views

This dataset is in support of my research paper - Short Circuit Analysis of 666 Wh Li-Ion NMC

 Faults and datasets can be copied to submit in fire cause investigation reports or thesis. The simulation is run for 20 hours (72000 seconds) of simulation time for each fault of 100 faults. 

PrePrint : (Make sure you have read Caution.)

Categories:
561 Views

A monitoring data, which includes several OTDR traces incorporating various types of fiber events (e.g. reflective, non-reflective, merged events) induced along an optical fiber link, is provided. Different fiber faults such as fiber cut, and fiber bend are modeled using optical components such as connectors and variable optical attenuators (VOAs). The data can be used to train machine learning models for solving fiber fault diagnosis problems. 

Categories:
57 Views

The monitored data is obtained using the optical time domain reflectometry (OTDR) principle, which is commonly used for troubleshooting fiber optic cables or links. The data set contains raw OTDR traces that include one or two reflective events caused by the placement of one or two reflectors and/or an open physical contact (PC) at the end of the monitored optical fiber link.

Categories:
101 Views

Pages