Spacecraft Maneuver Reachable Domain Solving and Threat Region Assessment Method Under J2 Perturbation

  • Ai Gao*
  • , Yixin Wang*
  • , Junwei Wang*
  • , Chaolong Chen*
  • *Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

Abstract

This paper proposes a threat assessment framework for non-cooperative spacecraft under J2-perturbed conditions, based on orbital maneuverability and reachable domain theory. By comparing and analyzing the distribution characteristics of the reachable domain under the two-body model and the J2-perturbation model, it is found that the J2 perturbations has a significant effect on the spatial distribution of the reachable domain. On this basis, this paper further investigates the spatial rendezvous characteristics of the reachable domains of non-cooperative targets and the orbits of targets under the dynamics model with J2 perturbations, which enables the assessment of the spatial threat region of orbital rendezvous. In order to more comprehensively assess the potential collision threat of space rendezvous under J2 perturbations conditions in the medium and long term, this paper constructs a comprehensive assessment index system that includes Effective Coverage Rate, Distribution Concentration, and Distribution Skewness. The simulation results confirm the accuracy and applicability of the proposed method, which has the potential to provide quantitative support for space situational awareness and orbit protection decision-making.

Original languageEnglish
Pages (from-to)1788-1793
Number of pages6
JournalIFAC-PapersOnLine
Volume59
Issue number20
DOIs
Publication statusPublished - 1 Aug 2025
Externally publishedYes
Event23th IFAC Symposium on Automatic Control in Aerospace, ACA 2025 - Harbin, China
Duration: 2 Aug 20256 Aug 2025

Keywords

  • J2 perturbation
  • Space situational awareness
  • orbital maneuver
  • reachable domain
  • threat assessment

Fingerprint

Dive into the research topics of 'Spacecraft Maneuver Reachable Domain Solving and Threat Region Assessment Method Under J2 Perturbation'. Together they form a unique fingerprint.

Cite this