Location Fixing by 3 DF Stations using Triangulation Method
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 3
Abstract
One of the most important requirements placed on EW (Electronic Warfare) systems is the location of threat emitters. The paper deals with the location of an object at unknown position, on which bearings are taken from two or more DF (Direction Finding) stations whose positions are known. These provide solutions to the most probable position of the object and how far from the true position is the position indicated by the “fix” likely to be? The objective of this analytical study is to develop an optimal emitter location in latitude/longitude coordinates using maximum likelihood of stansfield technique. Diagrams are given to show the results of applying the theory to typical practical cases. It is shown that, subject to certain qualifications, reliability of a fix does not depend on the size of the particular “cocked hat” from which it is derived. It is proposed that the reciprocal of the rootmean-square error expected in the position of the fix should be adopted as the conventional standard quantity for measuring the reliability of a fix. Simulation results verify the predicted theoretical performance.
Authors and Affiliations
S Abdul Matheen, Dr. K Padma Raju, G Murali Prasad
In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encry...
Implementation of MIMO Technique in Vehicular Adhoc Network for Different Mobility Patterns
VANETs (Vehicular ad-hoc network) is a special type if intelligent system used for road safety which is characterized by a very dynamic topology with partial infrastructure support, patterned mobility, and mobile nod...
To Measure The Average Delay Experienced By A Subscriber To Connect In An Attribute Tree
Validation of publishers and subscribers is not simple to get due to the loose coupling ofpublishers and subscribers.We also present extensions of the cryptographic methods to proffer capable routing of encrypted eve...
Design And Implementation of CMOS Adder Cell With Reduced Leakage Power Technique In 90nm Technology
Now-a-days Power consumption (or) power dissipation has becomes the most important criteria for implementing anyone of the digital circuit. While calculating the efficient value of the output of that particular digit...
ROUTING THROUGH CROSS LAYER APPROACH FOR WIRELESS MAC LAYER NETWORKS
Wireless mesh networks (WMNs) are dynamically self-organized and self-configured, with the nodes in the network automatically establishing an ad hoc network and maintaining the mesh connectivity. WMNs are comprised o...