Location Fixing by 3 DF Stations using Triangulation Method
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 3
Abstract
One of the most important requirements placed on EW (Electronic Warfare) systems is the location of threat emitters. The paper deals with the location of an object at unknown position, on which bearings are taken from two or more DF (Direction Finding) stations whose positions are known. These provide solutions to the most probable position of the object and how far from the true position is the position indicated by the “fix” likely to be? The objective of this analytical study is to develop an optimal emitter location in latitude/longitude coordinates using maximum likelihood of stansfield technique. Diagrams are given to show the results of applying the theory to typical practical cases. It is shown that, subject to certain qualifications, reliability of a fix does not depend on the size of the particular “cocked hat” from which it is derived. It is proposed that the reciprocal of the rootmean-square error expected in the position of the fix should be adopted as the conventional standard quantity for measuring the reliability of a fix. Simulation results verify the predicted theoretical performance.
Authors and Affiliations
S Abdul Matheen, Dr. K Padma Raju, G Murali Prasad
A survey – Energy Efficient Routing protocol for Homogenous & Heterogeneous Networks
The wireless sensor networks have gained a lot of grasp in the previous years due to various encroachments in this field. One of the major challenges faced by WSNs is the problem of energy efficiency. Various routing...
A Brief Servey Of Rfid Devices And Its Security Protocols
Security plays a very important role during the transmission of information in RFID devices. RFID are the wireless devices that contain a tag and a reader. While there are many authentication protocols put into opera...
Privacy Preserving using Slicing Technique
Privacy Preserving on microdata publishing different anonymization techniques named as generalization and bucketization have been proposed. In generalization amount of information loses on high-dimensional data. Buc...
Strategy And Guidelines For Sheltering Database To Database Communication Through Database Links
The majority of organizations today prefer Oracle database systems to maintain their operational and transactional data. Multiple databases will be used for different fields of operation in an organization. There aris...
SIMULATION AND ANALYSIS OF DSR PROTOCOL IN VANETS
VANET (Vehicular Adhoc Network) is a new concept in the field of wireless networks. The main objective of VANET is to build a powerful network between mobile vehicles so that the vehicles can talk to each other for t...