Location Fixing by 3 DF Stations using Triangulation Method
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 3
Abstract
One of the most important requirements placed on EW (Electronic Warfare) systems is the location of threat emitters. The paper deals with the location of an object at unknown position, on which bearings are taken from two or more DF (Direction Finding) stations whose positions are known. These provide solutions to the most probable position of the object and how far from the true position is the position indicated by the “fix” likely to be? The objective of this analytical study is to develop an optimal emitter location in latitude/longitude coordinates using maximum likelihood of stansfield technique. Diagrams are given to show the results of applying the theory to typical practical cases. It is shown that, subject to certain qualifications, reliability of a fix does not depend on the size of the particular “cocked hat” from which it is derived. It is proposed that the reciprocal of the rootmean-square error expected in the position of the fix should be adopted as the conventional standard quantity for measuring the reliability of a fix. Simulation results verify the predicted theoretical performance.
Authors and Affiliations
S Abdul Matheen, Dr. K Padma Raju, G Murali Prasad
Logo Matching And Recognition System Using Surf
Matching is an important part of a model based object recognition system. Matching is a difficult task because images do not present perfect data, noise and occlusions greatly complicate the task. Although no existin...
High Speed Design of an Information Lossless 8 Bit Carry Select Adder using CNT FET
Basic reasons for research on reversible logic are the power consumption and heat dissipation. Existing systems have designed carry select added using TSG gate, for four bit addition. In the proposed system an enhan...
Low-Complexity Turbo Decoder Architecture for Energy-Efficient Wireless Sensor Networks
Turbo codes have recently been considered for energy-constrained wireless communication applications, mainly because of low transmission energy consumption. In this project, we decompose the low complexity turbo deco...
Cooperative and Riskless Data Publishing in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. The proposed design allows users to audit the cloud storag...
A Distributed Algorithm for identifying failures in WSN
A wireless sensor network is a technology for monitoring physical or environmental conditions such as temperature, pressure, sound etc. A WSN can get separated into multiple connected sensors. But some nodes may fail...