期刊文献+

基于TDOA原理计算信号源位置的算法探讨 被引量:12

Discussion about Algorithm of Calculating Source Location Based on TDOA
在线阅读 下载PDF
导出
摘要 目前,在无线电监测工作中小型监测站以其成本低、体积小、便于维护等众多优势得到广泛应用,已逐渐成为行业趋势。但是,众多小型监测站目前仅具备监测功能,不具备测向功能,给未知信号源的定位带来诸多不便,因此基于TDOA(Time Difference Of Arrival)定位方法的研究便显得尤为重要。主要讨论了基于未知信号源到不同监测站的时间差、计算未知信号源位置的方法,并用C语言实现。 At present,small and medium size radio monitoring stations with their low cost,small volume,convenient in maintenance etc advantages are widely applied,have gradually become the industry trend.However,numerous small stations currently only have monitoring function,doesn't have the direction-finding function,and bring a lot of inconvenience to the unknown source orientation.So it is particularly important to research method of locating based on TDOA Time Difference of Arrival).This paper discussed the method of calculating unknown source to defined position,based on temporal difference between unknown source and the different stations.Finally,it was implemented with C language.
出处 《计算机科学》 CSCD 北大核心 2011年第B10期467-469,共3页 Computer Science
关键词 TDOA 双曲线 经纬度 时差定位 TDOA Hyperbolic Longitude and latitude Time position
  • 相关文献

参考文献2

二级参考文献1

共引文献33

同被引文献67

  • 1方震,赵湛,郭鹏,张玉国.基于RSSI测距分析[J].传感技术学报,2007,20(11):2526-2530. 被引量:265
  • 2朱庆厚.到达时间差(TDOA)测向定位研究[J].电讯技术,2007,47(1):53-56. 被引量:34
  • 3戈稳.雷达接收机技术[M].北京:电子工业出版社,2006:173-226.
  • 4Qiuyan Zou, Juanjuan Zhao. A Personalized Location Privacy Protection Solution in Wireless Network [J].International Conference on Communications and Mobile Computing, 2010 : 139 -140.
  • 5Ozturk C, Zhang Y, Trappe W. Source_location privacy in en ergy constrained sensor networks routing. Washington DC, USA, 2004 : 90-93.
  • 6Yun Li, Jian Ren, Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks[J]. IEEE,2010:1 .
  • 7Sangho Oh, Marco Gruteser. Multi node Coordinated Jamming for Location Privacy Protection Sangho Oh Marco Gruteser[J]. Military communications conference, 2011 : 3- 5.
  • 8Yun Li, Jian Ren, Jie Wu, et al. Quantitative Measurement and Design of Source-Location Privacy Schemes fnr Wireless Sensor Networks[J]. IEEE,2010:1 -4.
  • 9Honglong Chen, Wei Lou, Zhi Wang. Secure l.ocalization A gainst Wormhole Attacks Using Conflicting Sets[J].计算机科学,20ll:467-469.
  • 10Mohamed M. E. A. Mahmoud, Xuemin(Sherman)Shen. A Cloud-Based Scheme for Protecting Source-Location Privacy a gainst Hotspot-I.ocating Attack in Wireless Sensor Networks[J].IEEE, 2011, Digital Object Indentifier 10. ll09/TPDS, 2011,302:1-10.

引证文献12

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部