• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
Page
1. 1
1
2. 2
2
3. 3
3
4. 4
4
5. 5
5
6. 6
6
7. 7
7
8. 8
8
9. 9
9
10. 10
10
11. 11
11
12. 12
12
13. 13
13
14. 14
14
15. 15
15
16. 16
16
17. 17
17

# overview of GPS

Extracts from this document...

Introduction

Middle

For measurements of a shorter range the carrier phase errors can be ignored because of the high accuracy static has incorporated. It works like this, the surveyor with the GPS receiver sets up over a known position with coordinates x,y,z. then using a different receiver the user stands over a position which he/she wants to know. To understand why this process needs time is because of the 'cycle ambiguity problem' this is where it needs time to solve the integer number of cycles between the satellites. This is one of its drawbacks, in that static processing is to slow but accurate. Rapid static Very closely related to static positing but with a difference in occupation time, where static takes hours, this method only takes minutes. To achieve a shorter time has something to do with the ambiguity problem discussed above. There are two ways in which the problem can be eradicated, the problem of occupation that is. Often the problems money is thrown to solve it, one way would be is to have very expensive equipment and software, which could calculate equations very rapidly. This is the simple way of solving a problem but expensive. A less expensive approach would be to combine carrier phase with p-code measurements which would then get rid of the least squares solution for ambiguities and the combination of both the measurements would involve search routines as the GPS receiver is well capable of doing. Where static positions can take up to two hours, rapid static can reduce this time to around 20 minutes, a technique called wide laning makes this possible. Basically the GPS frequency bands L1 and L2 are put together in a linear combination, when both L1 and L2 are combined, 2 distinct signals arise. One is called narrow lane and the other wide lane. Also one is slower than the other and the wavelengths are different compared to L1 and L2. ...read more.

Conclusion

In the end my decision was undertaken. Using the theodolite we sighted to station2 from station1 and then extracted the data, and then we sighted to station 1 from station2, to give the distance and angles. We did this throughout the day, but because we did not know how to start off, it took sometime to get going, we called it a day at station5. Events on this day, reduced our team count to 4, Sarab Jit decided that the whole course was not for him and he left the group, Andrew Baily was then allocated group leader. Wednesday: day3 Carrying on from yesterday, we managed to finish of the final three stations, which were stations, 5, 6 and 7. We did not have any problems on this day because we knew what we were doing and I made sure that everyone was taking turns in handling the equipment so that they learn. Around the university there were other groups conducting similar exercises, but were falling behind and so we called it a day, because we were ahead of them all. Another reason was because we did not want to rush the detailing of the area, as we knew this would need concentration. Thursday: day4 Detailing of the area around the library, here we decided what should be detailed and what should not, because it was not practical to detail every item around the area, we decided to detail large objects, which ranged from pillars to flower beds. The whole day was spent detailing however we did not manage to finish the detailing. Friday: day 5 The final day, on this day detailing was completed and the group sat down and looked at the data to see if it 'looked' correct and that there were no major problems or concerns in general about the week. Members of group: Imtiaz Ali, Andrew Baily, Thomas Docker, Hoi Wing Cheung ?? ?? ?? ?? Surveying people ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

## Found what you're looking for?

• Start learning 29% faster today
• 150,000+ documents available
• Just £6.99 a month

Not the one? Search for your essay title...
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month

# Related AS and A Level Computer Science essays

1. ## Visual basic

O6.Visible = False Then X6.Visible = True sp2 = True sp1 = False Exit Sub End If If sp2 = True And X6.Visible = False Then O6.Visible = True sp1 = True sp2 = False Exit Sub End If End Sub Private Sub Image7_Click()'When you click on the image7 box

1. ## Computing Project

[Telephone] 'aaaaaaaaaa' Extreme Data Data Stored AS EXPECTED 14. [Telephone] 00154 8794649 Ensure it rejects too many numbers Data Rejected AS EXPECTED (See Screen Print4) 15. [Date] '21/03/2008' Ensure data is stored Data Stored AS EXPECTED 16. [Date] '20/14/2008' Ensure it rejects this incorrect date Data Rejected AS EXPECTED (See screen Print 5)

2. ## Programming Techniques

An example might be: Pie = 3.1423 Variables and constants, and other named components of a program, are given their names by the programmer. The names are called identifiers. It is important that these identifiers mean something, so that as the program develops it remains easy to understand.

1. ## The Global Positioning System

However, maps of this sort can easily cost more than the receiver, and are used mainly for in-car navigation. In other countries, GPS receivers will use the equivalent OS grid for that country. Each GPS can change the way they display the users position, so one GPS receiver will work around the world.

2. ## Smart Card System

The purpose of this project is to develop a set of compliant drivers, API's, and a resource manager for various smart cards and readers for the GNU environment. Many years before, magnetic tape stripe card was used for the necessity for every day life.

1. ## Flexible Architectures in Communication Security Application

We configured each algorithm as suggested by the inventors to maintain good strength and performance. 3DES was configured as per the SSL specification [39]. All ciphers were run in chainingblock- cipher (CBC) mode. In this mode, the value of cipher text block i is XOR'ed with plaintext block i+1 before it is encrypted.

2. ## CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

not been in place for long and the client has not managed to setup a suitable computer based system. Though the current system is mainly paper based there is limited use of computer resources. The aim of the current system for the user is to record the availability of the

• Over 160,000 pieces
of student written work
• Annotated by
experienced teachers
• Ideas and feedback to
improve your own work