Sequential ARAIM evaluation using time-domain versus frequency-domain error-correlation bounding methods

Danielle Racelis, Sandeep Jada, Mathieu Joerger

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we evaluate the performance of a carrier-phase-based sequential implementation of Advanced Receiver Autonomous Integrity Monitoring (ARAIM). In particular, we analyze the robust modeling of measurement error dynamics over time, which is a major challenge in the design and evaluation of high-integrity sequential estimators and detectors. Two classes of methods were recently developed to rigorously account for time-correlated measurement errors: time-domain bounding [1, 2, 3, 4], and frequency-domain bounding [5, 6, 7]. We implement two of these methods [4, 7], analyze their differences with an illustrative example, and evaluate their integrity and continuity performance for an example ARAIM application.

Original languageEnglish (US)
Title of host publicationProceedings of the 34th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2021
PublisherInstitute of Navigation
Pages1079-1091
Number of pages13
ISBN (Electronic)9780936406299
DOIs
StatePublished - 2021
Event34th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2021 - St. Louis, United States
Duration: Sep 20 2021Sep 24 2021

Publication series

NameProceedings of the 34th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2021

Conference

Conference34th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2021
Country/TerritoryUnited States
CitySt. Louis
Period9/20/219/24/21

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Sequential ARAIM evaluation using time-domain versus frequency-domain error-correlation bounding methods'. Together they form a unique fingerprint.

Cite this