{"title":"Sensors and wrong values","authors":"Zoltán Pödör","doi":"10.14738/tnc.94.10539","DOIUrl":null,"url":null,"abstract":"In the world of IoT and BigData, sensor based data collection is a really important domain. Using these tools it is possible to stow large amounts of data collection sensors in a factory or in nature in harsh environments. However, in order to obtain valuable information from these tools, it is important that potentially wrong data is discovered and handled. Automated exploration of wrong data is not a trivial task, even if similar measurements are performed in parallel with spatial differences. We present the difficulties of revealing defected data and suggest easy-to-implement procedures for detecting and handing them. We also draw attention to the potential disadvantages of these methods based on the given results.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Networks and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14738/tnc.94.10539","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the world of IoT and BigData, sensor based data collection is a really important domain. Using these tools it is possible to stow large amounts of data collection sensors in a factory or in nature in harsh environments. However, in order to obtain valuable information from these tools, it is important that potentially wrong data is discovered and handled. Automated exploration of wrong data is not a trivial task, even if similar measurements are performed in parallel with spatial differences. We present the difficulties of revealing defected data and suggest easy-to-implement procedures for detecting and handing them. We also draw attention to the potential disadvantages of these methods based on the given results.