subject

Suppose that a file named sensor. dat contains information collected from a set of sensors. Each row contains a set of sensor readings, with the first row containing values collected at 0 seconds, the second row containing values collected at 1.0 seconds and so on. Deliverables for #3:

a) Read the data file and print the number of sensors and the number of seconds of data contained in the file. (Hint: Use the size function -- don't just count the two numbers.)

b) Find both the maximum value and the minimum value recorded on each sensor. Use MATLAB� to determine at what times they occurred.

c) Find the mean and standard deviation for each sensor and for all the data values collected. Remember, column 1 does not contain sensor data; it contains time data.

0.0000000e+000 7.0643200e+001 6.8347000e+001 7.2346900e+001 6.7675100e+001 7.3176400e+001

1.0000000e+000 7.3282300e+001 6.5781900e+001 6.5482200e+001 7.1854800e+001 6.6992900e+001

2.0000000e+000 6.4160900e+001 7.2488800e+001 7.0179400e+001 7.3641400e+001 7.2755900e+001

3.0000000e+000 6.7697000e+001 7.7442500e+001 6.6862300e+001 8.0560800e+001 6.4500800e+001

4.0000000e+000 6.8687800e+001 6.7267600e+001 7.2677000e+001 6.3213500e+001 7.0430000e+001

5.0000000e+000 6.3934200e+001 6.5766200e+001 2.7644000e+000 6.4886900e+001 5.9977200e+001

6.0000000e+000 6.3402800e+001 6.8768300e+001 6.8981500e+001 7.5189200e+001 6.7534600e+001

7.0000000e+000 7.4656100e+001 7.3315100e+001 5.9728400e+001 6.8051000e+001 7.2310200e+001

8.0000000e+000 7.0056200e+001 6.5729000e+001 7.0662800e+001 6.3093700e+001 6.8395000e+001

9.0000000e+000 6.6774300e+001 6.3993400e+001 7.7964700e+001 7.1577700e+001 7.6182800e+001

1.0000000e+001 7.4028600e+001 6.9400700e+001 7.5092100e+001 7.7766200e+001 6.6843600e+001

1.1000000e+001 7.1158100e+001 6.9673500e+001 6.2098000e+001 7.3539500e+001 5.8373900e+001

1.2000000e+001 6.5051200e+001 7.2426500e+001 6.9606700e+001 7.9786900e+001 6.3841800e+001

1.3000000e+001 7.6697900e+001 6.7022500e+001 6.6591700e+001 7.2522700e+001 7.5278200e+001

1.4000000e+001 7.1447500e+001 6.9251700e+001 6.4877200e+001 7.9322600e+001 6.9433900e+001

1.5000000e+001 7.7394600e+001 6.7826200e+001 6.3828200e+001 6.8300900e+001 7.1896100e+001

1.6000000e+001 7.5690100e+001 6.9603300e+001 7.1444000e+001 6.4301100e+001 7.4721000e+001

1.7000000e+001 6.6579300e+001 7.7675800e+001 6.7853500e+001 6.8944400e+001 5.9397900e+001

1.8000000e+001 6.3540300e+001 6.6967600e+001 7.0279000e+001 7.5951200e+001 6.6776600e+001

1.9000000e+001 6.9635400e+001 6.3263200e+001 6.8160600e+001 6.4419000e+001 6.6478500e+001

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 17:30
Working on this program in python 3.7: a year in the modern gregorian calendar consists of 365 days. in reality, the earth takes longer to rotate around the sun. to account for the difference in time, every 4 years, a leap year takes place. a leap year is when a year has 366 days: an extra day, february 29th. the requirements for a given year to be a leap year are: 1) the year must be divisible by 42) if the year is a century year (1700, 1800, the year must be evenly divisible by 400some example leap years are 1600, 1712, and 2016.write a program that takes in a year and determines whether that year is a leap year.ex: if the input is 1712, the output is: 1712 is a leap year. ex: if the input is 1913, the output is: 1913 is not a leap year. your program must define and call the function isleapyear(useryear). the function should return true if the input year is a leap year and false otherwise.
Answers: 1
question
Computers and Technology, 23.06.2019 00:00
What engine component is shown in the above figure?
Answers: 1
question
Computers and Technology, 23.06.2019 10:00
Install and use wireshark program ( send back screen shots and other vital information) case project 3-2: decode a tcp segment in a wireshark capture in this chapter, you walked through tcp segment to interpret the data included in its header. in this project, you use wireshark to capture your own http messafes, examine the tcp headers, and practice interpreting the data you'll find there. 1. open wireshark and snap the window to one side of your screen. open a browser and snap that window to the other side of your screen so you can see both windows.
Answers: 2
question
Computers and Technology, 23.06.2019 11:00
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
You know the right answer?
Suppose that a file named sensor. dat contains information collected from a set of sensors. Each row...
Questions
question
Mathematics, 05.02.2021 06:00
question
Mathematics, 05.02.2021 06:00
question
Chemistry, 05.02.2021 06:00
Questions on the website: 13722362