<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>X (V. Savchenko);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Modeling the Localization of Hidden Radio Transmitters Using Redundant Multi-Antenna Measurements</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kobozieva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitalii Savchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>, Anatolii Salii</institution>
          ,
          <addr-line>Tymur Kurtseitov</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Defence University of Ukraine</institution>
          ,
          <addr-line>28 Air Force avenue, Kyiv, 03049</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Odesa National Maritime University</institution>
          ,
          <addr-line>34 Mechnykova street, Odesa, 65029</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>State University of Information and Communication Technologies</institution>
          ,
          <addr-line>7 Solomianska street, Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska street, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Today, the world is experiencing a sharp increase in the volume of industrial espionage. To counteract unauthorized information leakage, companies are forced to install expensive hardware of constant monitoring of the radio spectrum, which monitor radio transmitters activity in the certain area. In such hardware, the location of hidden transmitters is determined using appropriate software. Such software works well enough with the minimum required number of measurements, but in large complex buildings the minimum number of measurements may not be enough. Therefore, it is necessary to create a model for developing software to work with redundant measurements. The purpose of this study is to develop a model for determining hidden radio transmitters for a multi-position monitoring hardware taking into account information redundancy. To achieve the goal of the study, the article develops an algorithm for determining the coordinates of the transmitter by the redundant sample of distance measurements based on the Gauss-Newton method. The localization accuracy was investigated using a model based on the Least Squares Method. The main results of the study confirm the developed model effectiveness and show the dependence of localization accuracy on the number and geometry of the location of receiving antennas in the building. It was confirmed that the highest localization accuracy is achieved in the center of the tetrahedron formed by the receiving antennas. The practical value of the study is the possibility of creating automated monitoring complexes with specified localization accuracy parameters within specific building areas.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Modeling</kwd>
        <kwd>localization</kwd>
        <kwd>hidden transmitter</kwd>
        <kwd>redundant measurements</kwd>
        <kwd>Least Squares Method</kwd>
        <kwd>Mean Square Error</kwd>
        <kwd>Dilution of Precision</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>2,†
3,†
, Oleksandr Laptiev
3,†
and Alla</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>Detection and localization of hidden cameras, microphones and transmitters remains a difficult
practical problem and requires the development of both hardware and software [1]. Modern
hardware used to counter industrial espionage works quite well with the minimum required
number of measurements from receiving antennas. However, in large buildings, when additional
antennas are involved and redundant measurements are available, the continuous monitoring
system requires improvement of the appropriate software. To develop such software, in this study
we focus on a mathematical model and algorithm for localization of a hidden transmitter, which
can work in conditions of redundant measurements. It is important that such an algorithm
provides high speed and sufficient localization accuracy.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Problem statement</title>
      <p>Continuous monitoring scanners used in organizations where classified information circulates
consist of an antenna complex of different frequency ranges, combined with a centralized
monitoring data processing processor. The receiving antennas of the complex are located in
different parts of the building, which allows localizing the radio radiation of a hidden transmitter
using the ranging, difference-based ranging and quasi-ranging methods [2]. The purpose of
mathematical modeling of the above-mentioned hardware is to assess the impact of antenna
placement, ranging measurement accuracy and signal propagation conditions on the overall
localization efficiency. Such modeling should become the basis for selecting optimal system
parameters and ensuring reliable detection in real conditions.</p>
      <p>In the software complex, localization of an unknown transmitter is performed by solving a
system of equations based on distance measurements to several receivers, performed
simultaneously or at different times. Although three measurements are sufficient for spatial
localization, it is assumed that increasing the number of antennas, depending on the building
layout, will allow for increased accuracy due to mathematical redundancy [3], which highlights the
need to improve the localization model under such conditions.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Related works overview</title>
      <p>Localization based on ranging methods is widely used in navigation. GPS-based positioning
systems use complex signal processing algorithms to achieve high accuracy [4].</p>
      <p>In [5], the mathematical foundations of ranging methods are considered and factors affecting
high range determination accuracy are investigated, using the example of marine radars. The
authors also proposed a positioning method using several radar stations by crossing several radar
range measurements.</p>
      <p>In [6], various localization methods are considered and it is concluded that localization accuracy
depends on the number of receivers. However, the authors of this study concentrate their attention
only on the influence of the ionosphere on the propagation of RF signals. This makes such a
mathematical basis unsuitable for the analysis of hidden transmitters in the VHF range.</p>
      <p>In [7], cluster analysis methods (network clustering), graph theory (analytical models for
constructing cluster topology), telecommunication network theory (when calculating bandwidth in
radio channels), and telecommunication aerial platform positioning theory are used to solve the
positioning problem. However, this publication does not investigate the impact of topology on
system accuracy.</p>
      <p>The authors of [8] study the localization problem with an unknown distribution of
measurement errors. The localization problem is formulated as an optimization problem to
minimize the estimation error in the worst case, showing that the objective function is non-convex.
Then, the authors apply relaxation to transform it into a convex form and propose a distributed
computation algorithm that converges in several iterations. The geometry of the
receivingtransmitting system is also taken into account. However, the proposed approach is excessively
complicated for practical application.</p>
      <p>In [9], the authors propose a scalable dynamic estimator for obtaining the relative bearing of
static landmarks in the local coordinate system of a moving object in real time. The convergence of
the proposed bearing estimator for different ranges is analyzed and the upper and lower bounds for
the gain of the estimator are presented. However, this approach is poorly adapted for the ranging
method of determining the coordinates of hidden transmitters.</p>
      <p>In [10], the authors consider the localization of the signal source from measurements based on
the difference in range, taking into account the measurement noise and sensor positioning, in order
to guarantee asymptotic identification of the model using the Maximum Likelihood method. The
problem is solved by performing local iterations based on the Gauss-Newton algorithm. In this
case, the main attention is focused on obtaining a preliminary consistent estimate with the
subsequent solution of the linear problem by the Least Squares Method. This approach is the most
appropriate in terms of computational complexity and localization accuracy. At the same time, the
authors do not specify how the method will work in the case of information redundancy.</p>
      <p>In [11], the authors investigate two methods of measuring the distance between the transmitter
and the receiver using UWB technology. The method of calculating the position is presented
together with a method of predicting errors based on the geometry of the room. The authors focus
on UWB technologies and discuss Bluetooth technology, which is used to connect the monitoring
system to the environment.</p>
      <p>The issues of measurement errors and device calibration are studied in [12], where the authors
investigate the influence of calibration modules in a real-time three-dimensional localization
system during the calibration of the anchor position. This study demonstrates that the positional
error can be successfully reduced by using calibration modules. However, this approach cannot
completely solve the localization accuracy problem and requires further research.</p>
      <p>In [13], various indoor localization systems are considered and a comparison is made between
these systems in terms of accuracy, cost, advantages and disadvantages. Also, the article
investigates various detection methods and compares them in terms of accuracy and complexity.
Such a study can be considered as a summary of the localization of objects indoors, at the same
time, in a direct formulation, the considered methods cannot be used for the localization of hidden
transmitters.</p>
      <p>Thus, the analysis shows that the problem of determining the optimal configuration of direction
finding systems and creating effective algorithms for localizing hidden transmitters remains
insufficiently studied, with existing research focusing mainly on remote measurement methods,
positioning technologies, or GPS-based tools. Methods for localizing hidden transmitters in large
buildings are particularly underdeveloped.</p>
      <p>The purpose of this study is to develop a mathematical model for detecting hidden radio
transmitters in a multi-position system, which can serve as the basis for creating specialized
software that accounts for measurement redundancy. To achieve this goal, the following tasks
must be performed:
•
•
•
•</p>
      <p>To consider the general theoretical foundations of multi-position localization.</p>
      <p>To develop an algorithm for determining the transmitter coordinates using a redundant
sample of distance measurements.</p>
      <p>To investigate the issue of localization accuracy.</p>
      <p>To model various configurations of the radio monitoring system and evaluate their
effectiveness.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Theoretical foundations of localization</title>
      <p>To determine the spatial coordinates of the transmitter by the ranging method, it is sufficient to
obtain measurements from three receivers. In this case, in the XYZ coordinate system, the location
of the unknown emitter can be found by solving the system of equations [14]:
transmitter.</p>
      <p>Iterative methods for solving the system of equations (1) differ in the amount of calculations
and the speed of convergence of the iteration process. Among such methods, the most common is
where
is vector of residuals between measured
and calculated
values; is a matrix of partial derivatives of measured distance functions by coordinates,
which has the form
Newton's method, as the simplest and fastest [15]. Solving the system (1) by Newton's method is a
process of multiple processing of the results of distance measurements according to the formula
where – iteration cycle number.</p>
      <p>The matrix and the vector of residuals are calculated on the basis of a priori data in
the first iteration, and on the following iterations – on the basis of data obtained in the previous
iterations. The iterative cycles are repeated until the difference between the next refined values of
the coordinates that are determined, compared to the previous ones, is less than the specified error,
which has the content of the residual error.</p>
      <p>The sequence of iterative calculation of the x, y, z coordinates of the transmitter using the
minimum amount of simultaneous measurements is reduced to the following sequence of steps.
1. Input of initial data. The initial data are:
prior values of rectangular coordinates of the transmitter;
coordinates of receivers , , , ( );
values of measured distances .</p>
      <p>2. Calculation of measurement errors. Distance errors are calculated by subtracting the
calculated value from the measurement . That is,</p>
      <p>,</p>
      <p>(2)
(3)
(4)
(5)
where
where
3. Calculation of the observation matrix
,</p>
      <p>,
4. Estimation of the rectangular coordinates of the transmitter. The rectangular coordinates of
the transmitter are determined by formula (2) after performing the required number of iterations.
The inversion of the matrix provided for in (2) can be performed, for example, by the Gauss
method [16].</p>
      <p>The given method is suitable for processing the minimum necessary number of measurements.
To determine three coordinates, it is enough to measure the distances from the transmitter to three
receivers. In the case of a larger number of measurements, the system of equations becomes
incompatible and therefore, the Least Squares Method is used to solve the localization problem
[17]. With an appropriate choice of the weight matrix, the results obtained by this method coincide
with the results obtained by the Maximum Likelihood Method or Bayesian methods.</p>
    </sec>
    <sec id="sec-6">
      <title>5. A model for determining transmitter coordinates by redundant distance measurements</title>
      <p>The solution of the vector equation (2) by the Least Squares Method can be given in the form
where is a symmetric non-negatively defined matrix of weight coefficients; is a priori
estimate of the vector .</p>
      <p>Due to the linearization of the initial equations (1), the estimation by formula (6) does not yet
give the best result. To eliminate the influence of the linearization error on the localization
accuracy, it is necessary to organize an iterative process, usually according to the Newton scheme.</p>
      <p>If the measurement errors are distributed according to the multidimensional Gaussian law with
the second-order moment matrix , then the vector of estimation parameters is random,
distributed according to the multidimensional Gaussian law with the correlation matrix</p>
      <p>If we assume , then the vector of estimation parameters has the smallest variance and
coincides with the estimate by the maximum likelihood criterion.</p>
      <p>and also</p>
      <p>If, when processing the measurement results, the errors of the a priori estimate of the
transmitter state vector are taken into account and these errors are not correlated with the
measurement noise, then equations (6) and (7) can be given in the form
where</p>
      <p>is the correlation matrix of errors of the a priori estimate of the transmitter state
vector . If , then the vector estimated by formula (10) coincides by the criterion of the
maximum of the posterior probability density and</p>
      <p>Thus, the algorithm for searching for the consumer's coordinates in the case of redundant
measurements will have the form:
1. coordinates of receivers.
2. condition for stopping iterations.
3. – initial approximation value.
4. coordinates of the starting point of iterations.
5. Calculation of distances to the point :</p>
      <p>(6)
(7)
(8)
(9)
(10)
(11)
(12)
6. Calculation of the direction cosines matrix:
7. Forming an array of results:
8. – iteration cycle.
.
9.
10.
11.
12.
13.
14.
15.
16.</p>
      <p>– measuring distances to
–
determination</p>
      <p>of new
– recalculation of the approach
–
redefinition</p>
      <p>of
– redefinition of the matrix of direction
– adding new coordinates to the results
coordinates of the approach point.
transmitters.
distance.
point.
cosines.
distances to the transmitter.</p>
      <p>– calculation of residuals.</p>
      <p>– redefinition of the initial coordinates of the approach
array.
17. – end of cycle.
18. output of results.</p>
      <p>Fig. 1 shows an example of the localization model with redundant information. There are 4
receivers in the building that search for a hidden transmitter. The configuration of the receivers
forms a regular tetrahedron, which makes it possible to avoid the singularity of the matrix
during calculations and to provide the most favorable geometry of the receiving system.</p>
      <p>The operation of the model is highly dependent on the state of the matrix , since with poor
conditioning of this matrix, numerous errors in the calculation of coordinates arise and acceptable
localization accuracy is not guaranteed. In practice, cases of poor conditioning of the matrix are
associated with the location of the receivers and transmitter in the same plane and when the</p>
    </sec>
    <sec id="sec-7">
      <title>6. Localization accuracy</title>
      <p>When solving the problem of localization of a hidden transmitter, an important issue is the
localization accuracy [18]. Based on the matrix (9) and provided that , the matrix is
defined as a matrix of weight coefficients that have the meaning of the accuracy of distance
measurement. The matrix itself can be given as a product
(13)</p>
      <p>(
(14)
(15)
The matrix
in (13) is a diagonal matrix
, where
is the Root Mean Square Error of distance measurement,
consideration, we will assume .</p>
      <p>Taking into account the substitutions made from equation (9), we obtain the matrix
is some scaling factor). For further
The matrix</p>
      <p>in (14) is the correlation matrix of transmitter localization errors [19], on the
main diagonal of which are the dispersions of the localization coordinates</p>
      <p>In this case, the resulting localization error can be defined as the sum of the diagonal elements
of the matrix
, i.e., through the trace of the matrix (15) in the form
. In this
case, the ratio
, where
is the localization error of the transmitter, and
is the
distance measurement error. This ratio determines the Dilution of Precision caused by the
geometry of the mutual arrangement of the transmitter and receivers [21].</p>
      <p>For the previously considered example of a building, shown in Fig. 1, let us examine the
localization accuracy parameters. Fig. 2 shows the localization accuracy fields under the initial
conditions: ; the scanning height is 3, 6, 9, 12 m, which approximately corresponds to
individual floors of the building. Fig. 3 shows the same situation, but the surrounding space around
the building is subject to investigation. Situations where it is necessary to monitor not only the
premises, but also the surrounding space around the building may arise with more complex
building structures, the presence of a cluster of buildings in a limited area, or when it is necessary
to counteract more sophisticated means of remote information extraction, such as laser
microphones or drone-based reconnaissance systems.</p>
    </sec>
    <sec id="sec-8">
      <title>7. Results and discussion</title>
      <p>As can be seen from Fig. 2, the best accuracy is provided in the central part of the regular
tetrahedron formed by the receivers of the scanning system: . The worst accuracy
indicators (</p>
      <p>) are observed at the edges of the zone. However, it should be noted
that the difference between
and
is insignificant, and the overall result can be
considered quite acceptable.</p>
      <p>A different picture is observed in Fig. 3. As we can see, the accuracy field outside the
tetrahedron formed by the receiving antennas is heterogeneous and depends on the mutual
location of the transmitter and receivers. The minimum value of the MSE, as in the previous case,
is , while the maximum value , which is unacceptable. This is
especially important to consider when constructing a scanning system in large buildings with
complex architecture.</p>
      <p>Thus, the conducted study confirms the possibility of localization of hidden transmitters by
redundant observations. In this case, the algorithm usually requires 4-7 steps before stopping,
when the coordinates obtained at subsequent steps change insignificantly relative to the previous
ones. This indicates the rapid convergence of the algorithm and its efficiency.</p>
      <p>Further research shows that localization accuracy depends on both distance measurement
precision and the spatial arrangement of the transmitter and receivers. With 4 antennas, minimum
MSE is achieved at in the center of a regular tetrahedron, while accuracy deteriorates
at the edges and is worst outside the building. Increasing the number of receivers improves
accuracy due to redundant data, but requires an antenna layout that maximizes the volume of the
geometric figure formed by their positions.</p>
      <p>The proposed model offers several significant advantages for software developers.</p>
      <p>First, it demonstrates high adaptability to various antenna configurations, which allows them to
be effectively deployed both in open areas and in limited, architecturally complex indoor
environments. Such versatility reduces the volume of software and the time for its development,
since similar software can be used for different organizations without being tied to its specific
structure and building layout.</p>
      <p>Second, the use of redundant measurements not only increases the localization accuracy, but
also increases fault tolerance, ensuring stable operation even in the event of failure of individual
receivers or interference. In this case, the developer will not have to solve the problem of how and
what to replace individual measurements that can be distorted by various interferences. Also, the
localization algorithm will be more resistant to various measurement errors, since with significant
errors, individual measurements can simply be ignored.</p>
      <p>Thirdly, the fast convergence of the algorithm significantly reduces the computational cost,
which makes it suitable for real-time applications. In many cases, this requirement can be key,
because modern covert transmitters can use different transmission modes: for example, pulsed.
When the accumulated information is not released gradually, but in one packet over a short period
of time. In this case, the problem of direction finding such a signal can become key and therefore
fast localization will make it possible to effectively counteract information leakage.</p>
      <p>Finally, the scalability of the approach allows it to be used both for full coverage of the building
and for targeted localization in certain rooms, which makes the model universal for various
security and monitoring tasks. In real conditions, not the entire area of the building may be equally
suitable for installing covert transmitters. There are places where their presence is more likely than
others. Therefore, by configuring the position of the receiving antennas, you can achieve the best
sensitivity and localization accuracy in specific places, while ignoring other spaces. This can be
very convenient in the practical activities of security services, when the system configuration can
be changed covertly without the need for installation work.</p>
    </sec>
    <sec id="sec-9">
      <title>8. Conclusions</title>
      <p>The development of special software for applied problems requires the search for appropriate
models and preliminary modeling of the problem. For the considered problem of localization of
hidden transmitters in conditions of redundant measurements, such software should take into
account some features of practical solution of the problem.</p>
      <p>In particular, when creating a model, it is important to ensure fast convergence of the algorithm
and sufficient accuracy of localization of the hidden transmitter. This is extremely necessary for
monitoring systems operating in real time. As has been shown, the localization accuracy depends
on both the accuracy of distance measurements and the geometry of the receiver placement, and
can vary significantly. At the same time, redundant measurements can significantly improve the
accuracy. Under these conditions, the Newton method is the most suitable, offering fast
convergence and reliable results. The assessment of the model accuracy using the Mean Square
Error proves the adequacy of the developed model taking into account the geometry and accuracy
parameters of the measurements.</p>
      <p>The software developed based on the proposed model allows you to predict the performance of
the monitoring system, optimize the placement of receivers in the building, and minimize system
costs. Such modeling also allows you to choose the most effective algorithm under various
architectural and structural constraints of the building. It also allows for remote configuration
changes without additional installation work.</p>
      <p>Further research on modeling the localization of hidden transmitters could focus on studying
the energy parameters of signal propagation, the influence of structural elements of buildings on
the accuracy of distance measurement and the influence of interference on signals, including radio
electronic jamming.</p>
    </sec>
    <sec id="sec-10">
      <title>Declaration on Generative AI</title>
      <p>
        The authors have not employed any Generative AI tools.
[9] M. Marcantoni, B. Jayawardhana, K. Bunte, Range-Only Bearing Estimator for
Localization and Mapping, in: IEEE Co
        <xref ref-type="bibr" rid="ref1">ntrol Systems Letters, 2023</xref>
        , 7, pp. 2503 - 2508.
doi:10.1109/LCSYS.2023.3286956.
[10] G. Zeng, B. Mu, L. Shi, J. Chen, J. Wu, Consistent and Asymptotically Efficient
Localization from Range- Difference Measurements, in: IEEE Transactions on Information
Theory, vol. 70, no. 4, pp. 3032-3045, April 2024, doi:10.1109/TIT.2023.3343347.
[11] D. Gnaś, P. Adamkiewicz, Indoor Localization System Using UWB, Informatyka,
Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 2022. 12(1), pp. 15–19.
doi:10.35784/iapgos.2895.
[12] P. Krapež, M. Munih, Anchor Calibration for Real-Time-Measurement Localization
Systems, in: IEEE Transactions on Instrumentation and Measurement, vol. 69, no. 12,
December 2020, pp. 9907-9917. URL:
https://robolab.si/wpcontent/uploads/2020/11/AnchorCalibration.pdf
[13] H. Obeidat, W. Shuaieb, O. Obeidat, et al., A Review of Indoor Localization Techniques
and Wireless Technologies, Wireless Pers Communications 2021, 119, pp. 289–327.
doi:10.1007/s11277-021-08209-5.
[14] V. Savchenko, O. Laptiev, O. Kolos, R. Lisnevskyi, V. Ivannikova, I. Ablazov, Hidden
Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement, in:
Proceedings of the IEEE International Conference on Advanced Trends in Information Theory,
ATIT`2020, 2020, pp. 246-249. doi:10.1109/ATIT50783.2020.9349304.
[15] K. U. Danmalam, H. Mohammad, M. Y. Waziri, Structured diagonal Gauss–Newton
method for nonlinear least squares, Co
        <xref ref-type="bibr" rid="ref4">mp. Appl. Math., 2022</xref>
        , 41, 68.
doi:10.1007/s40314-02201774-w.
[16] F. Ahmad, H. Khan, An Efficient and Simple Algorithm for Matrix Inversion. IJTD. 2010,
1, pp. 20-27. doi:10.4018/jtd.2010010102.
[17] W. Y. Tey, N. A. Che Sidik, N. A. Che Sidik, Y. Asako, M. Al-Gailani, O. Afshar, W. Tey,
Moving Least Squares Method and its Improvement: A Concise Review. Journal of Applied
and Computational Mechanics, 2021, 7. pp. 883-889. doi:10.22055/JACM.2021.35435.2652.
[18] V. Savchenko, O. Vorobiov, R. Mykolaichuk, A. Mykolaychuk, T. Kurtseitov, The Model
of Accuracy of a Local Radio Navigation System Considering Unstable Performance of
Individual Elements, Eastern European Journal of Enterprise Technologies, 2016, vol. 3, no.
9(81), pp. 4-10. doi:10.15587/1729-4061.2016.71921.
[19] R. D. Ball, R. L. Pearson, Correlation of theoretical uncertainties in PDF fits and
theoretical uncertainties in predictions. Eur. Phys. J. C, 2021, 81, 830.
doi:10.1140/epjc/s10052021-09602-x.
[20] M. Tarpo, T. Friis, C. Georgakis, R. Brincker, The statistical errors in the estimated
correlation function matrix for operational modal analysis, Journal of Sound and Vibration,
2020, vol. 466, 115013, doi:10.1016/j.jsv.2019.115013.
[21] V. Savchenko, A. Syrotenko, P. Shchypanskyi, O. Matsko, O. Laptiev, The Model of
Localization Precision for Detection of Hidden Transmitters, in: International Journal of
Innovative Technology and Exploring Engineering (IJITEE), 2020, vol. 9, iss. 4, pp. 2114-2119.
doi:10.35940/ijitee.D1533.029420.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <article-title>Industrial espionage</article-title>
          ,
          <source>in: Proceedings of the Conference of Industrial espionage</source>
          , Nafeesa Ahmed Fatima Jinnah Women University,
          <year>March 2023</year>
          ,
          <volume>15</volume>
          p.
          <source>doi:10.13140/RG.2.2.32087.14245.</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Chaman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hassanieh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Choudhury</surname>
          </string-name>
          ,
          <article-title>Ghostbuster: Detecting the Presence of Hidden Eavesdroppers</article-title>
          ,
          <source>in: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking</source>
          , MobiCom '18,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2018</year>
          , pp.
          <fpage>337</fpage>
          -
          <lpage>351</lpage>
          . doi:
          <volume>10</volume>
          .1145/3241539.3241580.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Nordmoen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Engebraten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Thoresen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Skjervold</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Landmark</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Larsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Moen</surname>
          </string-name>
          ,
          <article-title>Locating a Hidden Transmitter Using Swarm UAVs</article-title>
          , in: NATO S&amp;
          <string-name>
            <surname>T organization Public</surname>
            <given-names>Release</given-names>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://www.sto.
          <source>nato.int/publications/STO%20Meeting%20Proceedings/STO-MP-SET-222/MPSET-222-06</source>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Mamdyal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sandupatla</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Saka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kothawale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Shirashayad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kazi</surname>
          </string-name>
          , GPS Tracking System,
          <source>International Journal of Advanced Research in Science, Communication and Technology (IJARSCT)</source>
          ,
          <year>2022</year>
          , Vol.
          <volume>2</volume>
          ,
          <issue>Iss</issue>
          . 1, pp.
          <fpage>529</fpage>
          -
          <lpage>534</lpage>
          . doi:
          <volume>10</volume>
          .48175/568.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <article-title>Spatial positioning method based on range-only measurement of multi-station radar</article-title>
          .
          <source>Heliyon</source>
          ,
          <year>2024</year>
          , vol.
          <volume>10</volume>
          , no. 15. doi:
          <volume>10</volume>
          .1016/j.heliyon.
          <year>2024</year>
          .e35388.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <article-title>Detection on HF radio transmitters using passive geolocation techniques</article-title>
          .
          <source>Signal and Image processing</source>
          ,
          <year>2019</year>
          . URL: https://theses.hal.science/tel02133926v1/file/2019IMTA0128_Jain-Ankit.pdf
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Romaniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Novikov</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Sushyn</surname>
          </string-name>
          ,
          <article-title>Development of methods of positioning, localization and data collection from nodes of a free mobile sensor network using intelligent adaptive telecommunication aeroplatforms</article-title>
          ,
          <source>Information and Telecommunication Sciences</source>
          , vol.
          <volume>12</volume>
          ,
          <issue>num</issue>
          . 2,
          <string-name>
            <surname>July</surname>
            <given-names>-December</given-names>
          </string-name>
          <year>2021</year>
          . URL: https://ela.kpi.ua/server/api/core/bitstreams/8f471bd2- 7e73
          <string-name>
            <surname>-</surname>
          </string-name>
          4808
          <string-name>
            <surname>-</surname>
          </string-name>
          bbef-e7faaf4e8d69/content
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>X.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Mao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Anderson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Robust Localization Using Range Measurements with Unknown and Bounded Errors</article-title>
          ,
          <source>in: IEEE Transactions on Wireless Communications</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>4065</fpage>
          -
          <lpage>4078</lpage>
          , doi:10.1109/TWC.
          <year>2017</year>
          .
          <volume>2691699</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>