Feeds

Weather forecast: WiFi storms make meteorologists look mad

Boffins are finding ways to stop WiFi messing with weather stations

The Power of One eBook: Top reasons to choose HP BladeSystem

A problem in a world of global WiFi equipment is that global spectrum allocations aren't consistent, and in some places, kit clashes with applications like weather radar. A group of Austrian researchers is looking at how to clean up radar images spoiled by nearby WiFi kit.

In a paper published on the Arxiv pre-print server, the scientists note that it's not just 5 GHz WiFi that causes artefacts on images: air traffic control radars and topology also cause problems for weather radar.

Led by Harald Ganster of Joanneum Research in Austria, the research found that a third of images from one weather station in the mountainous country suffered wireless LAN interference, with disturbance like that shown below present in “2713 from 8928 images”.

“Improvement of WXR [weather radar – El Reg] images - by combining them with other sensors in order to complete concealed zones and eliminate interfering signals without losing important meteorological information - is essential for an accurate prediction of weather phenomenons and atmospheric conditions”, they write.

Wifi interference on weather radar

WiFi interference on Austrian weather radar

The algorithm developed by Ganster's group is designed to identify such artefacts in the radar images so they can be removed. Geometry is helpful here: something like WiFi, whose interference appears as a straight line, can be classified, turned into a vertical line, and removed, as can the speckle coming from air traffic radars.

The other aspect of the work is to fill in shadows in the radar. They do this by taking long-term data from meteorological satellite images, and stitching that data – which they refer to as “meteorologically reasonable” – back into the real-time radar data.

The aim of that part of the work is to provide a model that can reasonably serve as a proxy for the real-time data.

The 'RottNest Monster'

It still doesn't provide an explanation, however, for artefacts like Australia's “Rottnest Monster”, which set the country afire with speculation in February.

That ended up being attributed to a defence training exercise. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.