1976
DOI: 10.1109/taes.1976.308304
|View full text |Cite
|
Sign up to set email alerts
|

Navigation by Back Triangulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

1983
1983
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…The initial bearing is 0", and the target maintains a steady course of 0" with a constant speed of 20 knots. Own-ship also maintains a constant speed of 28.28 knots, but periodically executes 90" course changes as follows: 2,3,4] from 315" to 45" at t = (12.5+ 17k)min…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The initial bearing is 0", and the target maintains a steady course of 0" with a constant speed of 20 knots. Own-ship also maintains a constant speed of 28.28 knots, but periodically executes 90" course changes as follows: 2,3,4] from 315" to 45" at t = (12.5+ 17k)min…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The second form is resection, which occurs when an observer estimates its unknown location using angle measurements to two (or more) points at known locations. The resection form of triangulation describes the vehicle (e.g., robot, ship, aircraft, spacecraft) localization problem that commonly appears in navigation applications [9,36].…”
Section: Background and The Lexicon Of Triangulationmentioning
confidence: 99%
“…Such algorithms determine the source of a transmission by using signal strength and/or direction (triangulation algorithms [17]), or the phase difference [?]. More than one reader will be needed but only one reader needs to broadcast the challenge.…”
Section: Protocolmentioning
confidence: 99%
“…The location of a transmitting device can be determined by analyzing its radio signals. For outdoor applications the signal strength and/or direction are used (with triangulation protocols (see e.g., [17]); for indoor applications one may have two antennas on each tag and analyze the phase difference of their signals (to deal with multi-path effects, see e.g., [9]). Localization privacy requires that an RFID tag will only respond to a challenge from an RFID reader if it can first ascertain that the challenge is authentic and fresh (current).…”
Section: Introductionmentioning
confidence: 99%