A Mathematical Algorithm of Locomotive Source Localization Based on Hyperbolic Technique
نویسندگان
چکیده
منابع مشابه
A Hybrid Algorithm of Source Localization Based on Hyperbolic Technique in WSN
Electromagnetic (EM) source localization has become a vital issue lately to improve civilian safety, increase the military security and mitigate the disaster effect. The localization is embedded in battle-field surveillance, traffic alert, emergency call 911 (E911), resource allocation and mitigation of disaster effect. The location of the emitter can be determined by bestowing its transmitted ...
متن کاملHigh-Resolution Source Localization Algorithm Based on the Conjugate Gradient
This paper proposes a new algorithm for the direction of arrival (DOA) estimation of P radiating sources. Unlike the classical subspace-based methods, it does not resort to the eigendecomposition of the covariance matrix of the received data. Indeed, the proposed algorithm involves the building of the signal subspace from the residual vectors of the conjugate gradient (CG) method. This approach...
متن کاملSound source localization and separation based on the EM algorithm
A method of sound localization using the EM algorithm has been proposed by Feder and Weinstein [1] and Miller and Fuhrmann [2]. In this paper, the signal separation aspect of this algorithm is analyzed and is extended so that it can be applied to separation of signals from moving sound sources.
متن کاملA Rssi Based Localization Algorithm for WSN Using a Mobile Anchor Node
Wireless sensor networks attracting a great deal of research interest. Accurate localization of sensor nodes is a strong requirement in a wide area of applications. In recent years, several techniques have been proposed for localization in wireless sensor networks. In this paper we present a localization scheme with using only one mobile anchor station and received signal strength indicator tec...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed Sensor Networks
سال: 2015
ISSN: 1550-1329,1550-1477
DOI: 10.1155/2015/384180