GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY

Size: px
Start display at page:

Download "GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY"

Transcription

1 GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY Ali Broumandan and James T. Curran PLAN group Schulich School of Engineering, University of Calgary PLAN.geomatics.ucalgary.ca International Technical Symposium on Navigation and Timing (ITSNT) Nov 2017 ENAC, Toulouse, France

2 Outline Introduction Spoofing detection metrics Single antenna spoofing detection Antenna array for spoofing detection Detection performance Experimental results 2/16

3 Spoofing Scenarios Not Covered Overlapped and non overlapped scenarios Spoofer knows the target receiver signal parameters Authentic and spoofing signals coexist The correlation peak is aligned with the authentic peak Covered Authentic signals are blocked Easy to spoof and difficult to detect Spoofer 3/16

4 Standalone Spoofing Detection RF Down- Converter Detecting multiple correlation peaks in CAF Detecting high received power level Synthetic array processing Antenna Combining (Beam- Forming) Acquisition Tracking Move the GNSS receiver and detect abnormal variations in the clock bias PVT Authentication for a Moving Receiver Structural signals power analysis Noise floor analysis Detecting rapid fluctuations in tracked signal amplitude Doppler and code rate consistency check Synthetic array processing Possible spoofing detection metrics in different operating layers of a GNSS receiver 4/16

5 Spoofing Detection Spoofing detection can be performed at Receiver level where a stand-alone receiver detects a spoofing attack AGC level monitoring SNR monitoring Number of PRNs Pre-correlation based structural power analysis Network level where a CAV unit detects the spoofing occurrence based on observations from different receivers Position estimates Measurements 5/16

6 Antenna Array Based Spoofing Detection Spoofing-free Digital baseband Acquisition Ch N Ch 2 Ch 1 RF Down- Converter/ Digitizer Nullsteering Tracking Beamforming M S R P V T RF Front-end Precorrelation spoofing mitigation Single channel receiver Pre-despreading and post-despreading approaches can be employed 6/16

7 Covered Spoofing Scenario Two Maxtena helical antenna with 8 cm spacing as the receiver antenna array Spoofer antennas Spoofing Signals Receiver antennas 7/16

8 Data Collection Scenario Phase-coherent multi-channel TeleOrbit Frontend 10 Mega samples/s, 8 bit quantization and disabled automatic gain control (AGC) 8/16

9 Signal Quality in Covered Spoofing Ch1 cable connection Ch2 and Ch3 propagation Signals processed with a software receiver Counterfeit signals are propagated inside the case Received signals are not subject to attenuation and multipath propagation 9/16

10 Pre-despreading spoofing detection metrics Structural Power Content Analysis (SPCA) IF samples variance with disabled AGC is considered Pre-despreading methods cannot be used to detect SPCA and IF Variance 10/16

11 SQM and PLI Monitoring Metrics Post-despreading spoofing detection There is no distortion on correction peak Phase lock indicator (PLI) was used to monitor quality of PLL a) SQM Authentic, std=0.01 Covered spoofing, std= Time (s) b) PLI Authentic Covered spoofing Time (s) 11/16

12 RTK Solutions in Covered Spoofing Horizontal and vertical solutions Code and carrier measurements quality in the covered spoofing attack Antenna quality in covered spoofing scenario Carrier phase multipath propagation 12/16

13 Antenna Array Eigen Analysis 2-element antenna array was used Correlation matrix of IF samples was used for Eigen analysis Highest-to-lowest ratio of eigenvalues ( ) in spoofing and authentic cases 13/16

14 Relative Phase in Authentic Case Relative phase of Ch1-Ch2 in tracking stage Relative phase is a function of Direction of arrival PRN signals Relative path delay of the RF chain Relative phase in authentic case for various PRNs are not the same 14/16

15 Relative Phase in Spoofing Case Relative phase of Ch1-Ch2 at correlator outputs Ch1 parameters were used to wipe of Ch2 Relative phase in spoofing case for various PRNs are the same All PRNs are transmitted from a single source 15/16

16 Conclusions Covered spoofing scenario was investigated where the reception of the authentic signals was blocked The covered spoofing attack is relatively easy to implement while the signal quality was preserved Multipath due to signal propagation inside the spoofing case was not a concern Single antenna based spoofing detection metrics are not sensitive for the covered spoofing attack Two-element antenna array was utilized to implement spatial processing in pre-despreading and post-despreading stages of the receiver the covered spoofing attack could be successfully detected using such an antenna array 16/16

Review Article GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Review Article GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques Hindawi Publishing Corporation International Journal of Navigation and Observation Volume 2012, Article ID 127072, 16 pages doi:10.1155/2012/127072 Review Article GPS Vulnerability to Spoofing Threats

More information

Robust GPS-Based Timing for Phasor Measurement Units

Robust GPS-Based Timing for Phasor Measurement Units TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG Robust GPS-Based Timing for Phasor Measurement Units October 3, 2014 Grace Xingxin Gao University of Illinois at Urbana-Champaign UNIVERSITY

More information

SPREE: A Spoofing Resistant GPS Receiver

SPREE: A Spoofing Resistant GPS Receiver SPREE: A Spoofing Resistant GPS Receiver Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun raanjhan@inf.ethz.ch, ohildur@inf.ethz.ch, capkuns@inf.ethz.ch Department of Computer Science ETH Zurich,

More information

Radio Propagation Characteristics of MIMO Systems in Practical Deployment Scenarios

Radio Propagation Characteristics of MIMO Systems in Practical Deployment Scenarios NPL EM Day 29 November 2007 Radio Propagation Characteristics of MIMO Systems in Practical Deployment Scenarios Matthew Webb, Mark Beach and Mythri Hunukumbure University of Bristol Introduction MIMO now

More information

Assessing the Civil GPS Spoofing Threat

Assessing the Civil GPS Spoofing Threat Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O Hanlon, Paul Kintner, Cornell

More information

Spoofing GNSS Timing Receivers

Spoofing GNSS Timing Receivers Spoofing GNSS Timing Receivers Tim Frost and Guy Buesnel ITSF, November 2016 www.calnexsol.com www.spirent.com Introduction 2 Dependence on GPS timing US Department of Homeland Security: 15 of the 19 Critical

More information

Introduction. Communication Systems Simulation - I. Monte Carlo method. Simulation methods

Introduction. Communication Systems Simulation - I. Monte Carlo method. Simulation methods Introduction Communication Systems Simulation - I Harri Saarnisaari Part of Simulations and Tools for Telecommunication Course First we study what simulation methods are available Use of the Monte Carlo

More information

MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?

MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp 22 nd June

More information

Position Matching Estimation for GNSS Positioning in Multipath/Non-Line-Of-Sight Environments

Position Matching Estimation for GNSS Positioning in Multipath/Non-Line-Of-Sight Environments Position Matching Estimation for GNSS Positioning in Multipath/Non-Line-Of-Sight Environments Nabil Kbayer; Héctor Ortega; Mohamed Sahmoudi and Cédric Rouch TéSA Lab, ISAE-SUPAERO, CNES, Toulouse University,

More information

Evaluation of a GNSS receiver performance in different multipath environments with a novel real-time multipath simulation system

Evaluation of a GNSS receiver performance in different multipath environments with a novel real-time multipath simulation system Evaluation of a GNSS receiver performance in different multipath environments with a novel real-time multipath simulation system Tommaso Panicciari, Spirent Communications (Tommaso.Panicciari@spirent.com)

More information

What is the Advantage of Seismic Array Processing?

What is the Advantage of Seismic Array Processing? What is the Advantage of Seismic Array Processing? Seismic arrays are geographic distributions of matched seismic sensors whose data can be used to infer certain seismic wavefield properties The spatial

More information

Framework and Performance Evaluation of a Ray Tracing-Software Defined Radio Method for GNSS Positioning in an Urban Canyon Environment

Framework and Performance Evaluation of a Ray Tracing-Software Defined Radio Method for GNSS Positioning in an Urban Canyon Environment 17 Nov. 2017, ITSNT2017 Framework and Performance Evaluation of a Ray Tracing-Software Defined Radio Method for GNSS Positioning in an Urban Canyon Environment Rei Furukawa, Tokyo University of Marine

More information

State of the art in GNSS authentication and opportunities for system evolutions

State of the art in GNSS authentication and opportunities for system evolutions State of the art in GNSS authentication and opportunities for system evolutions Oscar Pozzobon Director and founder Qascom S.r.l. ENAC, Toulouse 17/11/15 Agenda The threat of spoofing Authentication solution

More information

Two-Antenna Differential Carrier Phase

Two-Antenna Differential Carrier Phase GNSS Spoofing Detection using Two-Antenna Differential Carrier Phase Mark L. Psiaki Sibley School of Mech. & Aero. Engr., Cornell Univ. Brady W. O'Hanlon & Steven P. Powell School of Electrical & Computer

More information

Christian Doppler Laboratory for Dependable Wireless Connectivity for the Society in Motion Three-Dimensional Beamforming

Christian Doppler Laboratory for Dependable Wireless Connectivity for the Society in Motion Three-Dimensional Beamforming Christian Doppler Laboratory for Three-Dimensional Beamforming Fjolla Ademaj 15.11.216 Studying 3D channel models Channel models on system-level tools commonly 2-dimensional (2D) 3GPP Spatial Channel Model

More information

Laser speckle based background oriented schlieren measurements in a fire backlayering front

Laser speckle based background oriented schlieren measurements in a fire backlayering front Laser speckle based background oriented schlieren measurements in a fire backlayering front Philipp Bühlmann 1*, Alexander H. Meier 1, Martin Ehrensperger 1, Thomas Rösgen 1 1: ETH Zürich, Institute of

More information

GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons?

GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons? Space Reflecto 2013, Brest, 04 November 2013 GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons? Mohamed SAHMOUDI 1,2 1 ISAE, University of Toulouse, France 2

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

PMU Time Source Security

PMU Time Source Security PMU Time Source Security Erich Heine Information Trust Institute Authors: Erich Heine, Tim Yardley, Dr. Alejandro Dominguez-Garcia, Daniel Chen 1 Overview PMU time synchronization

More information

LTE: MIMO Techniques in 3GPP-LTE

LTE: MIMO Techniques in 3GPP-LTE Nov 5, 2008 LTE: MIMO Techniques in 3GPP-LTE PM101 Dr Jayesh Kotecha R&D, Cellular Products Group Freescale Semiconductor Proprietary Information Freescale and the Freescale logo are trademarks of Freescale

More information

5G Air Interface Enhanced Mobile Broadband with Millimeter Wave

5G Air Interface Enhanced Mobile Broadband with Millimeter Wave 5G Air Interface Enhanced Mobile Broadband with Millimeter Wave Enhanced Mobile Broadband (embb) A Founda)on for 5G Performance Enhanced Mobile Broadband Peak data rate User experienced data rate Area

More information

AHORN SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum. TeleConsult Austria GmbH.

AHORN SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum. TeleConsult Austria GmbH. AHORN 2012 SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum TeleConsult Austria GmbH Jürgen Seybold Schwarzbauerweg 3, A-8043 Graz, Austria juergen.seybold@tca.at

More information

Spoofing Detection in Wireless Networks

Spoofing Detection in Wireless Networks RESEARCH ARTICLE OPEN ACCESS Spoofing Detection in Wireless Networks S.Manikandan 1,C.Murugesh 2 1 PG Scholar, Department of CSE, National College of Engineering, India.mkmanikndn86@gmail.com 2 Associate

More information

The Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning

The Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning The Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning R.Murat Demirer R.Murat Demirer( CORS Project) 1 Potential Applications of the Global Positioning

More information

Effects of Weight Approximation Methods on Performance of Digital Beamforming Using Least Mean Squares Algorithm

Effects of Weight Approximation Methods on Performance of Digital Beamforming Using Least Mean Squares Algorithm IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331,Volume 6, Issue 3 (May. - Jun. 2013), PP 82-90 Effects of Weight Approximation Methods on Performance

More information

A New Method for Correcting ScanSAR Scalloping Using Forests and inter SCAN Banding Employing Dynamic Filtering

A New Method for Correcting ScanSAR Scalloping Using Forests and inter SCAN Banding Employing Dynamic Filtering A New Method for Correcting ScanSAR Scalloping Using Forests and inter SCAN Banding Employing Dynamic Filtering Masanobu Shimada Japan Aerospace Exploration Agency (JAXA), Earth Observation Research Center

More information

CHAPTER 4 DUAL LOOP SELF BIASED PLL

CHAPTER 4 DUAL LOOP SELF BIASED PLL 52 CHAPTER 4 DUAL LOOP SELF BIASED PLL The traditional self biased PLL is modified into a dual loop architecture based on the principle widely applied in clock and data recovery circuits proposed by Seema

More information

CS 4495 Computer Vision A. Bobick. CS 4495 Computer Vision. Features 2 SIFT descriptor. Aaron Bobick School of Interactive Computing

CS 4495 Computer Vision A. Bobick. CS 4495 Computer Vision. Features 2 SIFT descriptor. Aaron Bobick School of Interactive Computing CS 4495 Computer Vision Features 2 SIFT descriptor Aaron Bobick School of Interactive Computing Administrivia PS 3: Out due Oct 6 th. Features recap: Goal is to find corresponding locations in two images.

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Monash University Department of Electrical and Computer Systems Engineering Wireless and Mobile Networks Present and Future Y. Ahmet Şekercioğlu August 2007wireless-nets.tex,v1.5 Y. Ahmet Şekercioğlu:

More information

LMS Sound Camera and Sound Source Localization Fast & Versatile Sound Source Localization

LMS Sound Camera and Sound Source Localization Fast & Versatile Sound Source Localization LMS Sound Camera and Sound Source Localization Fast & Versatile Sound Source Localization Realize innovation. Sound Source Localization What is it about?? Sounds like it s coming from the engine Sound

More information

G012 Scattered Ground-roll Attenuation for 2D Land Data Using Seismic Interferometry

G012 Scattered Ground-roll Attenuation for 2D Land Data Using Seismic Interferometry G012 Scattered Ground-roll Attenuation for 2D Land Data Using Seismic Interferometry D.F. Halliday* (Schlumberger Cambridge Research), P.J. Bilsby (WesternGeco), J. Quigley (WesternGeco) & E. Kragh (Schlumberger

More information

Analysis of Functional MRI Timeseries Data Using Signal Processing Techniques

Analysis of Functional MRI Timeseries Data Using Signal Processing Techniques Analysis of Functional MRI Timeseries Data Using Signal Processing Techniques Sea Chen Department of Biomedical Engineering Advisors: Dr. Charles A. Bouman and Dr. Mark J. Lowe S. Chen Final Exam October

More information

Objective. Introduction A More Practical Model. Introduction A More Practical Model. Introduction The Issue

Objective. Introduction A More Practical Model. Introduction A More Practical Model. Introduction The Issue Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks By Byron E. Thornton Objective We now begin to build a Wireless Sensor Network model that better captures the operational

More information

Energy Efficient Adaptive Beamforming on Sensor Networks

Energy Efficient Adaptive Beamforming on Sensor Networks Energy Efficient Adaptive Beamforming on Sensor Networks Viktor K. Prasanna Bhargava Gundala, Mitali Singh Dept. of EE-Systems University of Southern California email: prasanna@usc.edu http://ceng.usc.edu/~prasanna

More information

SLC ultra low jitter Clock Synthesizer 2 MHz to 7 GHz

SLC ultra low jitter Clock Synthesizer 2 MHz to 7 GHz SLC ultra low jitter Clock Synthesizer 2 MHz to 7 GHz Datasheet The SLC is a very affordable single or dual clock 7 GHz synthesizer that exhibits outstanding phase noise and jitter performance in a very

More information

NOVEL TECHNIQUES AND ARCHITECTURES FOR ADAPTIVE BEAMFORMING

NOVEL TECHNIQUES AND ARCHITECTURES FOR ADAPTIVE BEAMFORMING NOVEL TECHNIQUES AND ARCHITECTURES FOR ADAPTIVE BEAMFORMING By THUA VAN HO, B.A.Sc, M.A.Sc A Thesis Submitted to the School of Graduate Studies in Partial Fulfillment of the Requirements for the Degree

More information

This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks.

This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks. Certified Wireless Network Administrator (CWNA) Course Overview This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks. Course

More information

COMPARISON OF 3D LASER VIBROMETER AND ACCELEROMETER FREQUENCY MEASUREMENTS

COMPARISON OF 3D LASER VIBROMETER AND ACCELEROMETER FREQUENCY MEASUREMENTS Proceedings of the IMAC-XXVII February 9-12, 2009 Orlando, Florida USA 2009 Society for Experimental Mechanics Inc. COMPARISON OF 3D LASER VIBROMETER AND ACCELEROMETER FREQUENCY MEASUREMENTS Pawan Pingle,

More information

Rate Adaptation in

Rate Adaptation in Rate Adaptation in 802.11 SAMMY KUPFER Outline Introduction Intuition Basic techniques Techniques General Designs Robust Rate Adaptation for 802.11 (2006) Efficient Channel aware Rate Adaptation in Dynamic

More information

Point to Multi-point Link: Bridge Mode

Point to Multi-point Link: Bridge Mode u n w i r i n g o u r w o r l d T M Point to Multi-point Link: Bridge Mode airpoint Nexus PRO TOTAL (sb 3212) & airclient Nexus PRO TOTAL (sb 3412) Configuration Guide Version 1.0 Copyright smartbridges

More information

Heterogeneous Mobile Network

Heterogeneous Mobile Network Heterogeneous Mobile Network Dr. Jin Yang Verizon Communications Inc. IEEE ComSoc SCV April 2012 Outline Heterogeneous mobile wireless network (HetNet) Deployment scenarios for low-power nodes LTE performance

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

GPS Vulnerability Report

GPS Vulnerability Report GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements

More information

Multiple target detection in video using quadratic multi-frame correlation filtering

Multiple target detection in video using quadratic multi-frame correlation filtering Multiple target detection in video using quadratic multi-frame correlation filtering Ryan Kerekes Oak Ridge National Laboratory B. V. K. Vijaya Kumar Carnegie Mellon University March 17, 2008 1 Outline

More information

HIGH SPEED SIGNAL CHAIN SELECTION GUIDE

HIGH SPEED SIGNAL CHAIN SELECTION GUIDE HIGH SPEED SIGNAL CHAIN SELECTION GUIDE Includes High Speed Cs, DACs, Amplifiers, and Clocking Solutions Visit analog.com and linear.com High Speed Signal Chain Product Selection Guide TABLE OF CONTENTS

More information

Robust Ring Detection In Phase Correlation Surfaces

Robust Ring Detection In Phase Correlation Surfaces Griffith Research Online https://research-repository.griffith.edu.au Robust Ring Detection In Phase Correlation Surfaces Author Gonzalez, Ruben Published 2013 Conference Title 2013 International Conference

More information

Multicomponent f-x seismic random noise attenuation via vector autoregressive operators

Multicomponent f-x seismic random noise attenuation via vector autoregressive operators Multicomponent f-x seismic random noise attenuation via vector autoregressive operators Mostafa Naghizadeh and Mauricio Sacchi ABSTRACT We propose an extension of the traditional frequency-space (f-x)

More information

"Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary

Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary Course Summary Description Implementing Cisco Unified Wireless Networking Essentials (IUWNE) v2.0 is a five-day instructor-led course that is designed to help students prepare for the CCNA _ wireless certification,

More information

Lecture ID: WT

Lecture ID: WT GNSS Online Lecture # 1 Lecture ID: WT-103-401 Lecture Topic: GNSS Data Processing in RTKLIB Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters

More information

Simulating the propagation and

Simulating the propagation and GNSS SOLUTIONS What are the challenges of ray-tracing for GNSS applications? GNSS Solutions is a regular column featuring questions and answers about technical aspects of GNSS. Readers are invited to send

More information

A Correlation Test: What were the interferometric observation conditions?

A Correlation Test: What were the interferometric observation conditions? A Correlation Test: What were the interferometric observation conditions? Correlation in Practical Systems For Single-Pass Two-Aperture Interferometer Systems System noise and baseline/volumetric decorrelation

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION DOI: 1.138/NPHOTON.234 Detection and tracking of moving objects hidden from view Genevieve Gariepy, 1 Francesco Tonolini, 1 Robert Henderson, 2 Jonathan Leach 1 and Daniele Faccio 1 1 Institute of Photonics

More information

Quality control phantoms and protocol for a tomography system

Quality control phantoms and protocol for a tomography system Quality control phantoms and protocol for a tomography system Lucía Franco 1 1 CT AIMEN, C/Relva 27A O Porriño Pontevedra, Spain, lfranco@aimen.es Abstract Tomography systems for non-destructive testing

More information

7th ICG Meeting, Beijing

7th ICG Meeting, Beijing Location Assurance Service Provider 06/11/2012 itrust consulting s.à r.l. Tel: +352 26 176 212 6 Z.I. Bombicht Fax: +352 26 710 978 L-6947 Niederanven Web: www.itrust.lu 7th ICG Meeting, Beijing Introduction

More information

An SVD-based Fragile Watermarking Scheme With Grouped Blocks

An SVD-based Fragile Watermarking Scheme With Grouped Blocks An SVD-based Fragile Watermarking Scheme With Grouped Qingbo Kang Chengdu Yufei Information Engineering Co.,Ltd. 610000 Chengdu, China Email: qdsclove@gmail.com Ke Li, Hu Chen National Key Laboratory of

More information

UHF Wireless Microphone System UwMic9

UHF Wireless Microphone System UwMic9 UHF Wireless Microphone System UwMic9 User Manual Statement Please read this manual carefully before using and strictly operate and store in accordance with the instructions. Please save it for your future

More information

AUDIOVISUAL COMMUNICATION

AUDIOVISUAL COMMUNICATION AUDIOVISUAL COMMUNICATION Laboratory Session: Discrete Cosine Transform Fernando Pereira The objective of this lab session about the Discrete Cosine Transform (DCT) is to get the students familiar with

More information

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless

More information

A new robust watermarking scheme based on PDE decomposition *

A new robust watermarking scheme based on PDE decomposition * A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid

More information

Advanced Wireless Cooperation mechanisms for Interference Mitigation in the 2.4 GHz ISM Band

Advanced Wireless Cooperation mechanisms for Interference Mitigation in the 2.4 GHz ISM Band Advanced Wireless Cooperation mechanisms for Interference Mitigation in the 2.4 GHz ISM Band Fumio Ishizu MITSUBISHI ELECTRIC CORPORATION INFORMATION TECHNOLOGY R & D CENTER Outline Background & Motivation

More information

G Practical Magnetic Resonance Imaging II Sackler Institute of Biomedical Sciences New York University School of Medicine. Compressed Sensing

G Practical Magnetic Resonance Imaging II Sackler Institute of Biomedical Sciences New York University School of Medicine. Compressed Sensing G16.4428 Practical Magnetic Resonance Imaging II Sackler Institute of Biomedical Sciences New York University School of Medicine Compressed Sensing Ricardo Otazo, PhD ricardo.otazo@nyumc.org Compressed

More information

Interferometric processing. Rüdiger Gens

Interferometric processing. Rüdiger Gens Rüdiger Gens Why InSAR processing? extracting three-dimensional information out of a radar image pair covering the same area digital elevation model change detection 2 Processing chain 3 Processing chain

More information

Active noise control at a moving location in a modally dense three-dimensional sound field using virtual sensing

Active noise control at a moving location in a modally dense three-dimensional sound field using virtual sensing Active noise control at a moving location in a modally dense three-dimensional sound field using virtual sensing D. J Moreau, B. S Cazzolato and A. C Zander The University of Adelaide, School of Mechanical

More information

Detection of Buried Objects using GPR Change Detection in Polarimetric Huynen Spaces

Detection of Buried Objects using GPR Change Detection in Polarimetric Huynen Spaces Detection of Buried Objects using GPR Change Detection in Polarimetric Huynen Spaces Firooz Sadjadi Lockheed Martin Corporation Saint Anthony, Minnesota USA firooz.sadjadi@ieee.org Anders Sullivan Army

More information

DESIGN OF EXPERIMENTS and ROBUST DESIGN

DESIGN OF EXPERIMENTS and ROBUST DESIGN DESIGN OF EXPERIMENTS and ROBUST DESIGN Problems in design and production environments often require experiments to find a solution. Design of experiments are a collection of statistical methods that,

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Wake Vortex Tangential Velocity Adaptive Spectral (TVAS) Algorithm for Pulsed Lidar Systems

Wake Vortex Tangential Velocity Adaptive Spectral (TVAS) Algorithm for Pulsed Lidar Systems Wake Vortex Tangential Velocity Adaptive Spectral (TVAS) Algorithm for Pulsed Lidar Systems Hadi Wassaf David Burnham Frank Wang Communication, Navigation, Surveillance (CNS) and Traffic Management Systems

More information

Christos Papadopoulos

Christos Papadopoulos CS557: Measurements Christos Papadopoulos Adapted by Lorenzo De Carli Outline End-to-End Packet Dynamics - Paxon99b Wireless measurements - Aguayo04a Note: both these studies are old, so the results have

More information

Dynamic Behavior of RS latches using FIB processing and probe connection

Dynamic Behavior of RS latches using FIB processing and probe connection Dynamic Behavior of RS latches using FIB processing and probe connection Naoya Torii 1,2, Dai Yamamoto 1, Masahiko Takenaka 1, and Tsutomu Matsumoto 2 1 Secure Computing Laboratory, Fujitsu Laboratories

More information

Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System

Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System Proc. of IEEE Conference on Computer Vision and Pattern Recognition, vol.2, II-131 II-137, Dec. 2001. Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System

More information

High Dynamic Range Imaging

High Dynamic Range Imaging High Dynamic Range Imaging Josh Marvil CASS Radio Astronomy School 3 October 2014 CSIRO ASTRONOMY & SPACE SCIENCE High Dynamic Range Imaging Introduction Review of Clean Self- Calibration Direction Dependence

More information

SL Interpreter Compact

SL Interpreter Compact SL Interpreter Compact Interpreter Console FEATURES stand-alone console, no need for external equipment individual volume and tone controls for 2 interpreters built-in distribution amplifier allows easy

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

HIGH RESOLUTION STACKING OF SEISMIC DATA. Marcos Ricardo Covre, Tiago Barros and Renato da Rocha Lopes

HIGH RESOLUTION STACKING OF SEISMIC DATA. Marcos Ricardo Covre, Tiago Barros and Renato da Rocha Lopes HIGH RESOLUTION STACKING OF SEISMIC DATA Marcos Ricardo Covre, Tiago Barros and Renato da Rocha Lopes School of Electrical and Computer Engineering, University of Campinas DSPCom Laboratory, Department

More information

SiRFstar II ARCHITECTURE:

SiRFstar II ARCHITECTURE: SiRFstar II ARCHITECTURE: A POWERFUL SYSTEM PLATFORM for CONSUMER GPS APPLICATIONS J. Knight, R. Tso, Dr. L. Peng, A. Pande, G. Turetzky SiRF Technology Inc. GPS System Overview 1 Typical SiRFstar II Architecture

More information

Course Outline (1) #6 Data Acquisition for Built Environment. Fumio YAMAZAKI

Course Outline (1) #6 Data Acquisition for Built Environment. Fumio YAMAZAKI AT09.98 Applied GIS and Remote Sensing for Disaster Mitigation #6 Data Acquisition for Built Environment 9 October, 2002 Fumio YAMAZAKI yamazaki@ait.ac.th http://www.star.ait.ac.th/~yamazaki/ Course Outline

More information

802.11ac FREQUENTLY ASKED QUESTIONS. May 2012

802.11ac FREQUENTLY ASKED QUESTIONS. May 2012 802.11ac FREQUENTLY ASKED QUESTIONS May 2012 Table of Contents General Questions:... 3 1. What is 802.11ac?... 3 2. When will 802.11ac be ratified into a standard?... 3 5. Will 802.11ac come out before

More information

mmwave Radar IWR1642 People Counting Demonstration

mmwave Radar IWR1642 People Counting Demonstration mmwave Radar IWR1642 People Counting Demonstration 1 Presenters Abdulraheem Killedar Wesley He Gondalia Akash Please Note: This Webinar is being recorded and will be made available to the public. 2 mmwave

More information

Keysight Technologies PROPSIM F64 5G Channel Emulation Solution - F8800A

Keysight Technologies PROPSIM F64 5G Channel Emulation Solution - F8800A Keysight Technologies PROPSIM F64 5G Channel Emulation Solution - F8800A 02 Keysight PROPSIM F64 5G Channel Emulation Solution - F8800A - Brochure 5G NR End-to-End Real-World Performance Testing at Sub

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Part 9: Representation and Description AASS Learning Systems Lab, Dep. Teknik Room T1209 (Fr, 11-12 o'clock) achim.lilienthal@oru.se Course Book Chapter 11 2011-05-17 Contents

More information

CoE4TN3 Medical Image Processing

CoE4TN3 Medical Image Processing CoE4TN3 Medical Image Processing Image Restoration Noise Image sensor might produce noise because of environmental conditions or quality of sensing elements. Interference in the image transmission channel.

More information

A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality

A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality Multidimensional DSP Literature Survey Eric Heinen 3/21/08

More information

SPM8 for Basic and Clinical Investigators. Preprocessing

SPM8 for Basic and Clinical Investigators. Preprocessing SPM8 for Basic and Clinical Investigators Preprocessing fmri Preprocessing Slice timing correction Geometric distortion correction Head motion correction Temporal filtering Intensity normalization Spatial

More information

A new motion compensation algorithm of floating lidar system for the assessment of turbulence intensity

A new motion compensation algorithm of floating lidar system for the assessment of turbulence intensity A new motion compensation algorithm of floating lidar system for the assessment of turbulence intensity Atsushi Yamaguchi and Takeshi Ishihara The University of Tokyo, 7-3-1 Hongo Bunkyo, Tokyo, 113-8656,

More information

SPM8 for Basic and Clinical Investigators. Preprocessing. fmri Preprocessing

SPM8 for Basic and Clinical Investigators. Preprocessing. fmri Preprocessing SPM8 for Basic and Clinical Investigators Preprocessing fmri Preprocessing Slice timing correction Geometric distortion correction Head motion correction Temporal filtering Intensity normalization Spatial

More information

1 Audio quality determination based on perceptual measurement techniques 1 John G. Beerends

1 Audio quality determination based on perceptual measurement techniques 1 John G. Beerends Contents List of Figures List of Tables Contributing Authors xiii xxi xxiii Introduction Karlheinz Brandenburg and Mark Kahrs xxix 1 Audio quality determination based on perceptual measurement techniques

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices

Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, and David Wetherall University of Washington Presenter: Xiaolong Zheng

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data

The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data Li Liu, Murat Kantarcioglu and Bhavani Thuraisingham Computer Science Department University of Texas

More information

AUDIO SIGNAL PROCESSING FOR NEXT- GENERATION MULTIMEDIA COMMUNI CATION SYSTEMS

AUDIO SIGNAL PROCESSING FOR NEXT- GENERATION MULTIMEDIA COMMUNI CATION SYSTEMS AUDIO SIGNAL PROCESSING FOR NEXT- GENERATION MULTIMEDIA COMMUNI CATION SYSTEMS Edited by YITENG (ARDEN) HUANG Bell Laboratories, Lucent Technologies JACOB BENESTY Universite du Quebec, INRS-EMT Kluwer

More information

GafChromic Protocol Multi-Channel Film Dosimetry + Gamma Map Analysis

GafChromic Protocol Multi-Channel Film Dosimetry + Gamma Map Analysis GafChromic Protocol Multi-Channel Film Dosimetry + Gamma Map Analysis Micke A. Ashland Inc. Advanced Materials Ashland proprietary patented technology GafChromic Film for Dose Measurement Radiotherapy

More information

Sampling Approaches to Metrology in Semiconductor Manufacturing

Sampling Approaches to Metrology in Semiconductor Manufacturing Sampling Approaches to Metrology in Semiconductor Manufacturing Tyrone Vincent 1 and Broc Stirton 2, Kameshwar Poolla 3 1 Colorado School of Mines, Golden CO 2 GLOBALFOUNDRIES, Austin TX 3 University of

More information

20th GISFI Standardisation Series Meeting (GSSM) Dr. Navin Kumar Amrita Vishwa Vidyapeetham (University) Bangalore

20th GISFI Standardisation Series Meeting (GSSM) Dr. Navin Kumar Amrita Vishwa Vidyapeetham (University) Bangalore 20th GISFI Standardisation Series Meeting (GSSM) Dr. Navin Kumar Amrita Vishwa Vidyapeetham (University) Bangalore Outline Introduction Specifications and Critical Performance Technology Candidates mmwave

More information

Processing techniques for a GNSS-R scatterometric remote sensing instrument

Processing techniques for a GNSS-R scatterometric remote sensing instrument Processing techniques for a GNSS-R scatterometric remote sensing instrument Philip J. Jales (1) Martin Unwin (2) Craig Underwood (1) (1) Surrey Space Centre, University Of Surrey, UK (2) Satellite Technology

More information

Yui-Lam CHAN and Wan-Chi SIU

Yui-Lam CHAN and Wan-Chi SIU A NEW ADAPTIVE INTERFRAME TRANSFORM CODING USING DIRECTIONAL CLASSIFICATION Yui-Lam CHAN and Wan-Chi SIU Department of Electronic Engineering Hong Kong Polytechnic Hung Hom, Kowloon, Hong Kong ABSTRACT

More information

MIMO RFIC Test Architectures

MIMO RFIC Test Architectures MIMO RFIC Test Architectures Chris Ziomek, ZTEC Instruments, cziomek@ztecinstruments.com Dr. Matthew Hunter, ZTEC Instruments, mhunter@ztecinstruments.com Silicon Valley Test Conference 2012 1 AGENDA Wireless

More information

MAXIMIZING BANDWIDTH EFFICIENCY

MAXIMIZING BANDWIDTH EFFICIENCY MAXIMIZING BANDWIDTH EFFICIENCY Benefits of Mezzanine Encoding Rev PA1 Ericsson AB 2016 1 (19) 1 Motivation 1.1 Consumption of Available Bandwidth Pressure on available fiber bandwidth continues to outpace

More information

Lab 2 Report. Carlin Gettliffe

Lab 2 Report. Carlin Gettliffe Lab 2 Report Carlin Gettliffe Abstract: In this lab we investigated the wave-particle duality of light. We verified light s wave properties by conducting both a double slit experiment and constructing

More information