Tracking Trains via Radio Frequency Systems
نویسندگان
چکیده
منابع مشابه
Femtosecond synchronization of radio frequency signals with optical pulse trains.
A synchronization scheme for extraction of low-jitter rf signals from optical pulse trains, which is robust against photodetector nonlinearities, is described. The scheme is based on a transfer of timing information into an intensity imbalance of the two output beams from a Sagnac loop. Sub-100-fs timing jitter between the extracted 2-GHz rf signal and the 100-MHz optical pulse train from a mod...
متن کامل3D Tracking via Body Radio Reflections
This paper introduces WiTrack, a system that tracks the 3D motion of a user from the radio signals reflected off her body. It works even if the person is occluded from the WiTrack device or in a different room. WiTrack does not require the user to carry any wireless device, yet its accuracy exceeds current RF localization systems, which require the user to hold a transceiver. Empirical measurem...
متن کاملRadio-frequency clock delivery via free-space frequency comb transmission.
We characterize the instability of an rf clock signal caused by free-space transmission of a frequency comb (FC) under typical laboratory conditions. The phase-noise spectra show the involvement of multiple random processes. For a 10 m transmission, the rms timing jitter integrated over 1-10(5) Hz is 95 fs, and the root Allan variance over 1 s is 4x10(-13). The measured Allan variance has a tau...
متن کاملBandwidth Analysis of Multiport Radio-Frequency Systems
When multiple radio-frequency sources are connected to multiple loads through a passive multiport matching network, perfect power transfer to the loads across all frequencies is generally impossible. In this two-part paper, we provide analyses of bandwidth over which power transfer is possible. Our principal tools include broadband multiport matching upper bounds, presented herein, on the integ...
متن کاملSecurity Aspects in Radio Frequency Identification Systems
Radio frequency identification technology is becoming ubiquitous, and as an unfortunate side effect, more and more authentication solutions come with more security issues. In former contributions, the authors introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks and performs exceptionally well even in very l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Intelligent Transportation Systems
سال: 2005
ISSN: 1524-9050
DOI: 10.1109/tits.2005.848369