Skip to main content

To validate the method, the authors implemented an experiment with four sensors deployed along the north coast of Crete, from the Rethymno to the Lasithi districts. The Area of Interest was defined...

The study does not stop at theory: it presents a full algorithmic pipeline, from reading sensor data to delivering positions on a map. The algorithm is divided into clear stages, including reading and...

The paper explains triangulation in simple geometric terms: sensors measure angles, not distances, and their bearing lines intersect to form small polygons where a transmitter might be. When more than...

In many security and monitoring scenarios, it is not enough to detect that “something is there” – we also need to know where several transmitters are, often at the same time. The new study by Staridas...

Although the scientific article that inspired these news items focuses on wireless spectrum monitoring and security-related use cases, the methods developed are broadly applicable. Any situation where...

No monitoring system is perfect, and real-life situations often involve unexpected changes, such as sensor malfunctions, maintenance needs or environmental shifts. The UnderSec study includes...

Follow us

Never Miss Our Newsletter!

Subscribe

Our Brochure

download