Feeds

Weather forecast: WiFi storms make meteorologists look mad

Boffins are finding ways to stop WiFi messing with weather stations

Business security measures using SSL

A problem in a world of global WiFi equipment is that global spectrum allocations aren't consistent, and in some places, kit clashes with applications like weather radar. A group of Austrian researchers is looking at how to clean up radar images spoiled by nearby WiFi kit.

In a paper published on the Arxiv pre-print server, the scientists note that it's not just 5 GHz WiFi that causes artefacts on images: air traffic control radars and topology also cause problems for weather radar.

Led by Harald Ganster of Joanneum Research in Austria, the research found that a third of images from one weather station in the mountainous country suffered wireless LAN interference, with disturbance like that shown below present in “2713 from 8928 images”.

“Improvement of WXR [weather radar – El Reg] images - by combining them with other sensors in order to complete concealed zones and eliminate interfering signals without losing important meteorological information - is essential for an accurate prediction of weather phenomenons and atmospheric conditions”, they write.

Wifi interference on weather radar

WiFi interference on Austrian weather radar

The algorithm developed by Ganster's group is designed to identify such artefacts in the radar images so they can be removed. Geometry is helpful here: something like WiFi, whose interference appears as a straight line, can be classified, turned into a vertical line, and removed, as can the speckle coming from air traffic radars.

The other aspect of the work is to fill in shadows in the radar. They do this by taking long-term data from meteorological satellite images, and stitching that data – which they refer to as “meteorologically reasonable” – back into the real-time radar data.

The aim of that part of the work is to provide a model that can reasonably serve as a proxy for the real-time data.

The 'RottNest Monster'

It still doesn't provide an explanation, however, for artefacts like Australia's “Rottnest Monster”, which set the country afire with speculation in February.

That ended up being attributed to a defence training exercise. ®

Business security measures using SSL

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
ISPs' post-net-neutrality world is built on 'bribes' says Tim Berners-Lee
Father of the worldwide web is extremely peeved over pay-per-packet-type plans
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Turnbull: NBN won't turn your town into Silicon Valley
'People have been brainwashed to believe that their world will be changed forever if they get FTTP'
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.