Propagation Engineering in Wireless Communications by Abdollah Ghasemi Ali Abedi & Farshid Ghasemi
Author:Abdollah Ghasemi, Ali Abedi & Farshid Ghasemi
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
6.2.8 Multiple Isolated Obstacles
A number of authors have developed geometrical methods for modeling cascaded terrain obstructions as knife edges. Among them, the best one is known as Deygout model as illustrated in Fig. 6.11.
Fig. 6.11Radio path with multiple obstructions
This method is based upon finding the point on the profile which, treated as a single knife-edge obstruction for the whole path (ignoring all other points), gives the highest value of v. This is the principal point and in Fig. 6.11 is point B. The corresponding diffraction loss is calculated for T-B-R. The path is then divided into two parts, one on each side of the principal point, and the process is repeated. Assuming that the secondary principal points are at A and C, diffraction losses are calculated for T-A-B and B-C-R and added to the total. This process is recursive and can be continued until there are no further significant points. In practice, it is normal to limit the process using a suitable criterion.
Example 6.4.
Radiowave path profile is presented in Fig. 6.12. The heights of transmitter and receiver antennas are 2000 m and 2280 m, respectively, and the distance between them is 9.5 km. Calculate the diffraction loss of the obstacles for 150 MHz radiowaves. The obstacle heights are 2350 m and 2361 m, respectively.
Fig. 6.12Path profile for Example 6.4
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(16140)
The Mikado Method by Ola Ellnestam Daniel Brolund(13424)
Hello! Python by Anthony Briggs(13220)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(12374)
Dependency Injection in .NET by Mark Seemann(12232)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10989)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10843)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10540)
Grails in Action by Glen Smith Peter Ledbrook(10305)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(10248)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9579)
Hit Refresh by Satya Nadella(9040)
Kotlin in Action by Dmitry Jemerov(8986)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8691)
The Kubernetes Operator Framework Book by Michael Dame(8488)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8309)
Robo-Advisor with Python by Aki Ranin(8261)
Practical Computer Architecture with Python and ARM by Alan Clements(8234)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8203)