Location Fixing by 3 DF Stations using Triangulation Method
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 3
Abstract
One of the most important requirements placed on EW (Electronic Warfare) systems is the location of threat emitters. The paper deals with the location of an object at unknown position, on which bearings are taken from two or more DF (Direction Finding) stations whose positions are known. These provide solutions to the most probable position of the object and how far from the true position is the position indicated by the “fix” likely to be? The objective of this analytical study is to develop an optimal emitter location in latitude/longitude coordinates using maximum likelihood of stansfield technique. Diagrams are given to show the results of applying the theory to typical practical cases. It is shown that, subject to certain qualifications, reliability of a fix does not depend on the size of the particular “cocked hat” from which it is derived. It is proposed that the reciprocal of the rootmean-square error expected in the position of the fix should be adopted as the conventional standard quantity for measuring the reliability of a fix. Simulation results verify the predicted theoretical performance.
Authors and Affiliations
S Abdul Matheen, Dr. K Padma Raju, G Murali Prasad
Butterfly Design for RADIX-4K DIF FFT
VLSI and Digital Signal Processing are the two emerging technologies in the present world. Design of high performance, low area and low power VLSI circuits are needed for the DSP applications. This paper is dealing w...
Design and Verification of Area Efficient High-Speed Carry Select Adder
Design of area efficient and high-speed data path logic systems forms the largest areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to transmit a carry...
Agile Software Development Teams on Autopoiesies Aspects
Self-organizing teams are at the spirit of agile software development. Self-organizing Agile teams are composed of individuals supervise their own workload shift work among themselves based on need and best fit and p...
Learning and Sequential Decision Making For Medical Data Streams Using Rl Algorithm
Data stream mining has obtained a high attraction due to the importance of its applications and increase in the generation of streaming information. The data streams are the set of data, which are moving in specified...
An Approach to Identify Node Clones in Wireless Sensor Networks
Sensor nodes that are deployed in hostile environments are susceptible to capture and compromise. An adversary may gain private information from these sensors, clone and logically deploy them in the network to launch...