Communications

Another raw ADS-B signal dataset with labels, the dataset is captured using a BladeRF2 SDR receiver @ 1090MHz with a sample rate of 10MHz

Categories:
3416 Views

This dataset is being used to evaluate PerfSim accuracy and speed against a real deployment in a Kubernetes cluster based on sfc-stress workloads.

Categories:
303 Views

This dataset was used in our work "See-through a Vehicle: Augmenting Road Safety Information using Visual Perception and Camera Communication in Vehicles" published in the IEEE Transactions on Vehicular Technology (TVT). In this work, we present the design, implementation and evaluation of non-line-of-sight (NLOS) perception to achieve a virtual see-through functionality for road vehicles.

Categories:
416 Views

This dataset contains 15 years of data about IT-vacancies from 2006 to 2020 downloaded from hh.ru using their public API. This site contains about 3 million vacancy descriptions posted by mainly Russian companies.

This dataset can be used for analyzing trends in IT or for creating new educational programs.

Categories:
737 Views

 This dataset is in support of my 2 research papers ' '.

Preprint :

  • Part I :  
  • Part II : 

Related Claim : Novel ß Non-Linear Theory, Novel ß Inverter and Novel ß PFC  in Patent 'Novel ß 10-Axis Grid Compatible Multi-Controller' 

   

Categories:
1653 Views

Three well-known Border Gateway Anomalies (BGP) anomalies:
WannaCrypt, Moscow blackout, and Slammer, occurred in May 2017, May 2005, and January 2003, respectively.
The Route Views BGP update messages are publicly available from the University of Oregon Route Views Project and contain:
WannaCrypt, Moscow blackout, and Slammer: http://www.routeviews.org/routeviews/.

Categories:
1049 Views

As an alternative to classical cryptography, Physical Layer Security (PhySec) provides primitives to achieve fundamental security goals like confidentiality, authentication or key derivation. Through its origins in the field of information theory, these primitives are rigorously analysed and their information theoretic security is proven. Nevertheless, the practical realizations of the different approaches do take certain assumptions about the physical world as granted.

Categories:
1211 Views

This survey covers more than 150 published papers related to sub-6 GHz wideband LNAs from IEEE publications such as ISSCC, JSSC, TMTT, RFIC, MWCL, TCAS and NEWCAS published in the last 20 years. The considered LNAs are classified according to the technology node and its topology. The presented database is a useful tool for investigating technology trends and comparing the performance of common LNA design styles. 

Categories:
465 Views

The emerging 5G services offer numerous new opportunities for networked applications. In this study, we seek to answer two key questions: i) is the throughput of mmWave 5G predictable, and ii) can we build "good" machine learning models for 5G throughput prediction? To this end, we conduct a measurement study of commercial mmWave 5G services in a major U.S. city, focusing on the throughput as perceived by applications running on user equipment (UE).

Categories:
1376 Views

Pages