Hi,
also interested...
If you are checking for non-normal behaviour, first let us define normal
behaviour: only small temperature changes and no steep ramps?
If so, maybe you can make an rolling average of the last x points, and check
if the following point deviates more than ... ?
Or is it
Thank you Clint for your response. I am happy to know that you have gotten
interested in this analysis.:-)
Let me give you some details about sensor networks that would help you
understand my goal better. Sensor nodes run on small batteries which have
limited life. So communication amongst
Thank you everyone for all the responses.
Clint you are correct in assuming that the problem deals with sensors in a
lab setup which can be assumed to be isolated from outside temperature
changes. And, I am only dealing with temperature so the other parameters are
not important.
There will be
Aneeta,
My gorilla and mouse analogies were referring to the magnitude of
the disturbance and also to its time signature. Are you only
interested in the large disturbance which is abrupt (the gorilla)?
Or do you also want to be able to detect the more surreptitious
attack which may be quite
Aneeta,
You will have to have a seasonal component built into your model,
because the seasonal variation does matter, particularly -where- you are
geographically (San Diego, Chicago, Denver, Miami are very different).
Generally, there is a sinusoidal daily temperature variation, but
frontal
Aneeta,
If I understand the figure at
http://db.csail.mit.edu/labdata/labdata.html this problem deals
with sensors in a lab that is probably isolated from outdoor
temperature changes.
I assume the predictive model must detect when a rampaging 800
pound gorilla messes with a sensor. Do we
Hi,
On Oct 21, 2009, at 12:31 PM, Aneeta wrote:
Greetings!
As part of my research project I am using R to study temperature data
collected by a network. Each node (observation point) records
temperature of
its surroundings throughout the day and generates a dataset. Using the
recorded
Hi,
In order to have more eyes on this, I'm CCing this back to lease
(please try to keep further correspondence here, since most mail to
*this* address of mine probably gets lost if it's not coming in from a
list to begin with) ...
I'm not really sure I have much to say about your
The data that I use has been collected by a sensor network deployed by Intel.
You may take a look at the network at the following website
http://db.csail.mit.edu/labdata/labdata.html
The main goal of my project is to simulate a physical layer attack on a
sensor network and to detect such an
9 matches
Mail list logo