A multi-emitter location method based on DOA by position information field

Author(s):  
Kui Zhang ◽  
Jingqing Luo
Author(s):  
Yaohong Qu ◽  
Feng Zhang ◽  
Renneng Gu ◽  
Dongli Yuan

Based on the locations of several unmanned aerial vehicles (UAVs) and the pseudo ranges to a target, a target cooperative location method is proposed in this paper. The nonlinear equation about real pseudo distance information is transformed to another equation by using Tayloy formula. By solving the above equation, position information of the target can be obtained. Meanwhile, the certain equation's variables are the measured results of pseudo distances, location errors of UAVs and distance-measuring errors of range sensors. Besides, an online enumeration method is applied to search for the best formation, whose objective is to enhance the location accuracy, and the mentioned formation is mapped to the minimal GDOP. The simulations verify the validity and adaptability of the proposed method.


Author(s):  
Yong-Hee Kim ◽  
Dong-Gyu Kim ◽  
Jin-Woo Han ◽  
Kyu-Ha Song ◽  
Hyoung-Nam Kim

2017 ◽  
Vol 4 (1) ◽  
pp. 117-126
Author(s):  
Tine Sopaheluwakan ◽  
Mohammad A. Amin Soetomo

Information Technology as a new Technology has been used in businesses from small company until multinational company in almost all industries. IT role as an enabler and differentiation factor separating success company from average company. IT need people to build, operate, maintain and support the systems, hence expect the new hire to immediately contribute from the first day they join the company. The industry define the needs for Information Technology competence and expect Education Institution as one of IT resource work hard to design their program study to fulfill the needs for Information Technology graduates, yet the industry still struggle to succeed in hiring fresh graduate to fill the IT position. Information Technology Training Institution can be an alternative to improve the education result. Also certification on Information Technology competence from third party or independent body might be used as a standard for both Industry and Education. This paper will report literature review several previous paper about all of the above.


2016 ◽  
Vol 2 (2) ◽  
Author(s):  
Amit Singh ◽  
Nitin Mishra ◽  
Angad Singh

 A Wireless Mobile Ad-hoc Network consists of variety of mobile nodes that temporally kind a dynamic infrastructure less network. To modify communication between nodes that don’t have direct radio contact, every node should operate as a wireless router and potential forward knowledge traffic of behalf of the opposite node. In MANET Localization is a fundamental problem. Current localization algorithm mainly focuses on checking the localizability of a network and/or how to localize as many nodes as possible. It could provide accurate position information foe kind of expanding application. Localization provide information about coverage, deployment, routing, location, services, target tracking and rescue If high mobility among the mobile nodes occurs path failure breaks. Hence the location information cannot be predicted. Here we have proposed a localization based algorithm which will help to provide information about the localized and non-localized nodes in a network. In the proposed approach DREAM protocol and AODV protocol are used to find the localizability of a node in a network. DREAM protocol is a location protocol which helps to find the location of a node in a network whereas AODV is a routing protocol it discover route as and when necessary it does not maintain route from every node to every other. To locate the mobile nodes in a n/w an node identification algorithm is used. With the help of this algorithm localized and non-localized node can be easily detected in respect of radio range. This method helps to improve the performance of a module and minimize the location error and achieves improved performance in the form of UDP packet loss, received packet and transmitted packets, throughput, routing overhead, packet delivery fraction. All the simulation done through the NS-2 module and tested the mobile ad-hoc network.


Sign in / Sign up

Export Citation Format

Share Document