Feeds

Weather forecast: WiFi storms make meteorologists look mad

Boffins are finding ways to stop WiFi messing with weather stations

Internet Security Threat Report 2014

A problem in a world of global WiFi equipment is that global spectrum allocations aren't consistent, and in some places, kit clashes with applications like weather radar. A group of Austrian researchers is looking at how to clean up radar images spoiled by nearby WiFi kit.

In a paper published on the Arxiv pre-print server, the scientists note that it's not just 5 GHz WiFi that causes artefacts on images: air traffic control radars and topology also cause problems for weather radar.

Led by Harald Ganster of Joanneum Research in Austria, the research found that a third of images from one weather station in the mountainous country suffered wireless LAN interference, with disturbance like that shown below present in “2713 from 8928 images”.

“Improvement of WXR [weather radar – El Reg] images - by combining them with other sensors in order to complete concealed zones and eliminate interfering signals without losing important meteorological information - is essential for an accurate prediction of weather phenomenons and atmospheric conditions”, they write.

Wifi interference on weather radar

WiFi interference on Austrian weather radar

The algorithm developed by Ganster's group is designed to identify such artefacts in the radar images so they can be removed. Geometry is helpful here: something like WiFi, whose interference appears as a straight line, can be classified, turned into a vertical line, and removed, as can the speckle coming from air traffic radars.

The other aspect of the work is to fill in shadows in the radar. They do this by taking long-term data from meteorological satellite images, and stitching that data – which they refer to as “meteorologically reasonable” – back into the real-time radar data.

The aim of that part of the work is to provide a model that can reasonably serve as a proxy for the real-time data.

The 'RottNest Monster'

It still doesn't provide an explanation, however, for artefacts like Australia's “Rottnest Monster”, which set the country afire with speculation in February.

That ended up being attributed to a defence training exercise. ®

Intelligent flash storage arrays

More from The Register

next story
You! AT&T! The only thing 'unlimited' about you is your CHEEK, growl feds
Man, we did everything but knock on their doors - carrier
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Watch out, Samsung and Apple: Xiaomi's No 3 in smartphones now
From obscurity to selling 19 million mobes a quarter
Brazil greenlights $200m internet cable to Europe in bid to outfox NSA
Only one problem: it won't make the slightest difference. And they know it
Wanna hop carriers with your iPad's Apple SIM? AVOID AT&T
Unless you want your network-swapping tech disabled for good, that is
Knocking Knox: Samsung DENIES vuln claims, says mysterious blogger is a JOKER
But YES, system does store encryption key on the device
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.