Optimal risk allocation for BDS/GPS advanced Receiver Autonomous Integrity Monitoring

Yuan Sun, Taosheng Wang, Zhipeng Wang, Jun Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

Receiver Autonomous Integrity Monitoring (RAIM) is a sensor level integrity monitoring system which is essential for safety-of-life applications. The increased number of satellites in view with BDS/GPS has drawn interest in Advanced RAIM (ARAIM) to provide vertical guidance for aircrafts. In the baseline ARAIM algorithms, the continuity risk under fault-free hypothesis is allocated evenly to each hypothesis to obtain the detection threshold. However, the BDS constellation is different from GPS constellation in both the satellite geometry and the prior probability of satellite fault. In this paper, the influence of both satellite geometry and prior fault probability on the integrity risk is analyzed. The optimal risk allocation for BDS/GPS ARAIM is proposed to reduce the integrity risk with the continuity risk within the requirement. The experimental results demonstrate the effectiveness of our proposed algorithm over the baseline ARAIM methods in reducing the integrity risk.

Original languageEnglish
Title of host publicationInstitute of Navigation International Technical Meeting 2015, ITM 2015
PublisherInstitute of Navigation
Pages687-695
Number of pages9
ISBN (Electronic)9781510800434
Publication statusPublished - 2015
Externally publishedYes
EventInstitute of Navigation International Technical Meeting 2015, ITM 2015 - Dana Point, United States
Duration: 26 Jan 201528 Jan 2015

Publication series

NameInstitute of Navigation International Technical Meeting 2015, ITM 2015

Conference

ConferenceInstitute of Navigation International Technical Meeting 2015, ITM 2015
Country/TerritoryUnited States
CityDana Point
Period26/01/1528/01/15

Fingerprint

Dive into the research topics of 'Optimal risk allocation for BDS/GPS advanced Receiver Autonomous Integrity Monitoring'. Together they form a unique fingerprint.

Cite this