Browse Definitions :
Definition

azimuth and elevation

Azimuth and elevation are angles used to define the apparent position of an object in the sky, relative to a specific observation point. The observer is usually (but not necessarily) located on the earth's surface.

The azimuth (az) angle is the compass bearing, relative to true (geographic) north, of a point on the horizon directly beneath an observed object. The horizon is defined as a huge, imaginary circle centered on the observer, equidistant from the zenith (point straight overhead) and the nadir (point exactly opposite the zenith). As seen from above the observer, compass bearings are measured clockwise in degrees from north. Azimuth angles can thus range from 0 degrees (north) through 90 (east), 180 (south), 270 (west), and up to 360 (north again).

 

The elevation (el) angle, also called the altitude, of an observed object is determined by first finding the compass bearing on the horizon relative to true north, and then measuring the angle between that point and the object, from the reference frame of the observer. Elevation angles for objects above the horizon range from 0 (on the horizon) up to 90 degrees (at the zenith). Sometimes the range of the elevation coordinate is extended downward from the horizon to -90 degrees (the nadir). This is useful when the observer is located at some distance above the surface, such as in an aircraft.

This was last updated in November 2006

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

please read azimuth deffination
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

  • WPA3

    WPA3, also known as Wi-Fi Protected Access 3, is the third version of the security certification program developed by the Wi-Fi ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

Close