wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Satellite Based Positioning

profile
Chetankumar Sharma
Mar 16, 2023
0 Likes
0 Discussions
106 Reads

Satellites have allowed us to realize geocentric reference systems, and increase the level of spatial accuracy substantially. They are critical tools in geodetic engineering for the maintenance of the ITRF. They also play a key role in mapping, surveying, and in a growing number of applications requiring positioning techniques.

The requirements for the development of the positioning system were:

  • Suitability for all kinds of military use: ground troops and vehicles, aircraft and missiles, ships; Requiring only low-cost equipment with low energy consumption at the receiver end;
  • Provision of results in real time for an unlimited number of users concurrently support for different levels of accuracy (military versus civilian);
  • Around-the-clock and weather-proof availability;
  • Use of a single geodetic data.

    A satellite-based positioning system set-up involves implementation of three hardware segments :

    • The space segment, i.e. the satellites that orbit the Earth, and the radio signals that they emit
    • The control segment, i.e. the ground stations that monitor and maintain the space segment components, and the user segment, i.e. the users with their hard- and software to conduct positioning.
    • In satellite positioning, the central problem is to determine values (X, Y, Z) of a receiver that receives satellite signals, i.e. to determine the position of the receiver with a stated accuracy and precision.

Comments ()


Sign in

Read Next

KEAP MANAGEMENT SYSTEM

Blog banner

Deadlock and Starvation

Blog banner

Ethical Hacking

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

GIS Topography

Blog banner

Security issues

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

10 Unknown facts about India's Independence

Blog banner

Reconnaissance

Blog banner

Review on Recovering Deleted Files

Blog banner

This too shall pass

Blog banner

gis substation

Blog banner

Service Strategy In ITSM

Blog banner

Memory Management in Operating System

Blog banner

Different Types of Data

Blog banner

Data Visualization

Blog banner

IOT- Internet Of Things

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Big Data Architecture

Blog banner

Disk scheduling

Blog banner

INTERRUPTS

Blog banner

Sage business cloud accounting

Blog banner

undefined

Blog banner

WORKFRONT SOFTWARE

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Self managing devices

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

security requirements for safe e-payment

Blog banner

Direct Memory Access

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Evolution of Operating system

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Self defence

Blog banner

File Organization and Access

Blog banner

Mumbai Metro 3

Blog banner

Process, process creation and process termination

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Session Vulnerabilities

Blog banner

Deadlock

Blog banner