共查询到19条相似文献,搜索用时 203 毫秒
1.
为了使卫星导航接收机自主完好性检测算法与卡尔曼滤波位置解算法结合起来,并且有效降低卫星导航接收机自主完好性检测的漏检率和误警率,进而为用户提供实时、准确、可靠的定位定时服务。对卡尔曼滤波位置解算法和卫星导航接收机自主完好性检测算法进行了研究,提出了能够对多个故障进行检测与识别的基于卡尔曼滤波的卫星导航接收机自主完好性检测方案,方案中引入了故障检测调整系数,有效地降低了漏检率和误警率。对方案进行了仿真分析,仿真结果表明方案是可行、有效。 相似文献
2.
3.
4.
地基增强系统中采用B值是多个接收机输出观测量偏差,是地面站系统进行完好性监测的重要参数之一,为系统进行基于接收机故障的完好性风险评估提供基础判断依据。在单系统的卫星导航着陆系统中,B值的处理采用了伪距修正残差的基本思想,但对于多系统卫星导航系统情况下,接收机的故障需要进行独立分析和综合判断,判断的门限也存在区别,因此,本文基于地基增强系统中B值的计算方法,针对GPS系统进行B值的计算分析,提出了一种适用于多系统的B值计算方法,为多系统地基增强系统的完好性监测处理方法进行了研究和分析。 相似文献
5.
6.
全球卫星导航系统(GNSS)导航信号的波形特性将会影响导航信号质量,而信号质量优劣则直接决定了整个GNSS的服务性能极限。传统的波形畸变评估方法主要针对传统相移键控(PSK)调制信号的波形幅度和宽度开展研究,而忽视了波形不对称对跟踪误差和测距误差带来的影响。该文在国际民航组织(ICAO)所采用的传统测距码波形分析模型TMA/TMB/TMC基础上,给出了适用于各种新型二进制偏置载波(BOC)调制的波形畸变分析扩展模型。接着提出能够精细分析波形上升下降沿对称特性(WRaFES)分析模型,并从时域波形、相关函数、S曲线过零点偏差3个方面,深入仿真分析了WRaFES模型的性能特点。最后,以北斗试验卫星M1-S B1Cd信号为例,给出了基于WRaFES模型及相关曲线特性的实测分析结果。研究表明:该方法能够精确分析导航信号波形不对称性及对用户带来的影响,研究成果可为新型卫星导航信号评估提供一种新方法和新思路,同时还可为GNSS用户接收机相关器间隔参数的合理选取提供建议和技术支撑。 相似文献
7.
8.
SB-JPALS是联合精密进近与着陆系统(JPALS)中的一种重要应用,用于支持飞机的全自动着舰。为保障系统的完好性性能,SB-JPALS在舰载端通过一系列监测算法对包括卫星钟、卫星星历、电离层、对流层、多径和接收机故障等故障源进行分类监视。同时充分考虑了舰艇运动、载体形变对完好性监测的影响,在舰面端和机载端引入惯性导航系统对完好性监测性能进行辅助和提升。本文主要针对卫星导航着舰的高精度和高完好性性能要求以及着舰特殊的应用环境,对SB-JPALS系统的完好性技术开展研究,分析其体系结构及实现方法。 相似文献
9.
为了进一步提高卫星导航接收机对BOC(1,1)及其衍生类型调制信号的码鉴相的质量和跟踪能力,尤其是在高动态下的跟踪性能。该文提出一种基于局部相关函数插值的方法确定BOC(1,1)调制信号的码相位。该方法基于相关器阵列的结构,根据相关器阵列的输出值判断相关峰值的大致范围。利用广义延拓逼近的方法估计码相位的位置,同时在缺少延拓空间的情况下构造一个虚拟的相关器以完成对码相位的估计。该文具体分析了单侧相关器个数对牵入范围的影响,在此基础上对所提方法进行了计算机仿真实验。理论和仿真证明:所提方法能够在不增加过多硬件资源的条件下扩大码鉴相函数的线性牵入范围,进而能够提高接收机对于BOC调制信号的跟踪精度。 相似文献
10.
11.
LAAS地面站伪距纠正量误差完好性监测算法研究 总被引:2,自引:0,他引:2
该文推导了LAAS地面参考站系统中伪距纠正量误差公式,分析现有的伪距纠正量误差完好性监测算法B值排除法,得出结论:B值之间具有相关性,一个B值出错,会影响到其它B值;B值排除法没有把接收机故障和卫星故障分开考虑,会产生较大的误检和漏检概率。该文提出两种伪距纠正量误差完好性监测算法:行列判断法和C值辅助法。针对无故障和5种故障情况,通过仿真实验对3种算法进行了分析,结果表明两种新算法的误检、漏检、误排、漏排概率均小于原算法,进而提高了系统的定位精度和连续性。把行列判断法和C值辅助法进行对比,讨论各自优缺点,提出选择算法的依据。 相似文献
12.
13.
利用GPS数据对中国区域电离层环境(电离层赤道异常、电离层暴、电离层闪烁)对卫星导航系统的完好性、可用性影响进行分析。结果表明,中国区域电离层异常将影响电离层延迟误差的空间相关性,从而影响电离层完好性门限的建立。电离层暴破坏了电离层的空间相关性,在影响系统完好性门限建立的同时,还影响到系统对扰动的检测能力。电离层闪烁影响接收机测量的精度、可用的卫星数和定位精度,影响系统的可用性;同时,闪烁相关的不均匀体也会影响电离层TEC的准确提取,从而影响系统电离层修正模型的实现。电离层这些不同影响效应之间往往又相互影响,使得中国区域的电离层环境对卫星导航系统的影响具有复杂性。 相似文献
14.
数据库数据完整性的实现 总被引:2,自引:0,他引:2
本文根据数据库系统开发及维护经验论述了数据库的完整性,并将ORACLE7与几种主要关系数据库系统的完整性实现方法进行比较,重点介绍了ORACLE7(目前已推出ORACLE7.1)是如何实现完整性的。 相似文献
15.
Seongkyun Shin Yungseon Eo Eisenstadt W.R. Jongin Shim 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2004,12(4):395-407
Novel signal integrity verification models and algorithms for inductance-effect- prominent RLC interconnect lines are developed by using a traveling-wave-based waveform approximation (TWA) technique. The multicoupled line responses are decoupled into the eigenmodes of the system in order to exploit the TWA technique. Then, the response signals are mathematically represented by the linear combination of each eigenmode response based on TWA, followed by reporting the signal integrity models and algorithms for the multicoupled lines. The signal integrity of VLSI circuit interconnects is complicatedly correlated with input signal switching-patterns, layout geometry, and termination conditions. It is shown that the technique can be efficiently employed for complicated multicoupled interconnect lines with various termination conditions and the signal transients based on the technique have excellent agreement with SPICE simulations. Thus, with the proposed technique, the switching-dependent signal delay, crosstalk, ringing, and glitches of the inductance-effect-prominent RLC interconnect lines can be accurately as well as efficiently determined. 相似文献
16.
《Digital Communications & Networks》2022,8(5):591-603
With the rapid advancement of cloud computing, cloud storage services have developed rapidly. One issue that has attracted particular attention in such remote storage services is that cloud storage servers are not enough to reliably save and maintain data, which greatly affects users’ confidence in purchasing and consuming cloud storage services. Traditional data integrity auditing techniques for cloud data storage are centralized, which faces huge security risks due to single-point-of-failure and vulnerabilities of central auditing servers. Blockchain technology offers a new approach to this problem. Many researchers have endeavored to employ the blockchain for data integrity auditing. Based on the search of relevant papers, we found that existing literature lacks a thorough survey of blockchain-based integrity auditing for cloud data. In this paper, we make an in-depth survey on cloud data integrity auditing based on blockchain. Firstly, we cover essential basic knowledge of integrity auditing for cloud data and blockchain techniques. Then, we propose a series of requirements for evaluating existing Blockchain-based Data Integrity Auditing (BDIA) schemes. Furthermore, we provide a comprehensive review of existing BDIA schemes and evaluate them based on our proposed criteria. Finally, according to our completed review and analysis, we explore some open issues and suggest research directions worthy of further efforts in the future. 相似文献
17.
18.
In this paper, we propose multimodal biometric image watermarking scheme through a two-stage integrity verification method using the hidden thumbnail feature vectors for safe authentication of multimodal biometrics data, face and fingerprint, respectively. It is basically blind and spread spectrum-based robust watermarking method. The proposed method enables us to detect a tampered region by controlling watermark embedding strength to meet the requirement of predefined watermark extraction threshold. The key idea is that the thumbnail feature vectors of a face image as a watermark pattern are utilized by embedding into a fingerprint image in order to verify the integrity of respective biometric data. The first stage of integrity verification for a fingerprint image is done by deciding the validity of extracted thumbnail patterns. The second stage of integrity verification for a face image is done by one-to-one matching between the thumbnail feature vectors extracted from a face image and the thumbnail one of the received face image. Experimental results showed that the proposed method has a high detection rate of the forged biometric data and guarantees the security assurance. 相似文献
19.
在对直接扩频通信系统的信号及技术实现特点进行分析的基础之上,提出了采用多相关器实现BPSK直扩信号解扩的方法。采用多相关器进行BPSK直扩信号的解扩,改善了高动态变化条件下接收机的同步及跟踪性能;通过控制本地解扩序列的产生方式,提高了接收机对不同使用条件的适应能力,较之采用单相关器的解扩方法,其适应能力更强。通过仿真验证证明了该方法的有效性。 相似文献