Wireless Networking

The most popular and active area of data mining study is sentiment analysis. Twitter is a crucial platform for collecting and distributing people's thoughts, feelings, views, and attitudes regarding specific entities. There are several social media networks available today. In light of this, sentiment analysis in natural language processing (NLP) field became fascinating. Different techniques have been developed for sentiment analysis. However, there is still a need for improvement in terms of accuracy and system effectiveness.

Categories:
97 Views

This dataset presents a collection of real-world RF signals encompassing three prominent wireless communication technologies: Wi-Fi (IEEE 802.11ax), LTE, and 5G. The data aims to facilitate advanced research in spectrum analysis, interference identification, and wireless communication optimization. The signals were meticulously captured under varying conditions to ensure a broad representation of real-world scenarios, including different modulation schemes, channel conditions, and data rates.

Categories:
2375 Views

5G Network slicing is one of the key enabling technologies that offer dedicated logical resources to different applications on the same physical network. However, a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack can severely damage the performance and functionality of network slices. Furthermore, recent DoS/DDoS attack detection techniques are based on the available data sets which are collected from simulated 5G networks rather than from 5G network slices.

Categories:
3247 Views

This dataset contains adversarial attacks on Deep Learning (DL) when it is employed for the classification of wireless modulated communication signals. The attack is executed with an obfuscating waveform that is embedded in the transmitted signal in such a way that prevents the extraction of clean data for training from a wireless eavesdropper. At the same time it allows a legitimate receiver (LRx) to demodulate the data.

Categories:
449 Views

This dataset contains adversarial attacks on Deep Learning (DL) when it is employed for the classification of
wireless modulated communication signals. The attack is executed with an obfuscating waveform that is embedded in the
transmitted signal in such a way that prevents the extraction of clean data for training from a wireless eavesdropper. At the
same time it allows a legitimate receiver (LRx) to demodulate the data. The scheme works for both single carrier and multi-carrier

Categories:
199 Views

Modern, industrial use cases for wireless communications are related to mobile applications such as moving robotics in industrial environments. For the design of communication systems, the behavior of the radio channel, especially over time, is of great importance. Most of the existing data sets for industrial radio channels originate from static measurement procedures, containing an arbitrary subset of the environment.

Categories:
539 Views

The dataset, titled "SensorNetGuard: A Dataset for Identifying Malicious Sensor Nodes," comprises 10,000 samples with 21 features. It is designed to facilitate the identification of malicious sensor nodes in a network environment, specifically focusing on IoT-based sensor networks.

General Metrics

§  Node ID: The unique identifier for each node.

§  Timestamp: The time at which data or a packet is sent or received.

§  IP Address: Internet Protocol address of the node.

Categories:
1973 Views

According to the different proportion of agent loss and link loss in faults, five experimental data sets are designed. Among them, the fault type corresponding to data set A is agent loss where the proportion of link loss in faults is 0%, the fault type of data set B, C and D is agent & link loss where the proportion of link loss in faults is 25%, 50% and 75% respectively, and the fault type of data set E is link loss where the proportion of link loss in faults is 100%.

Categories:
83 Views

The increasing complexity of cellular networks has resulted in dynamic network performance optimization (NPO) playing a critical role in streamlining network operations. While the success of NPO techniques primarily depends upon the quality and quantity of telemetry data available from the underlying network, up until now, third-party access to such data has been largely limited due to the prevalence of proprietary interfaces throughout the access network. However, the upcoming open radio access network (RAN) architecture is set to change this trend.

Categories:
269 Views

Dataset Description:

Based on some real-world events, the dataset offers a synthetic representation of 5G network states and metrics during a high traffic event, such as a major sports gathering in a city. Each row corresponds to a unique record capturing the attributes of the network at a particular moment, and each column corresponds to a specific feature or attribute.

Significance:

Categories:
1860 Views

Pages