2016
DOI: 10.3390/s16030329
|View full text |Cite
|
Sign up to set email alerts
|

A Real-Time Interference Monitoring Technique for GNSS Based on a Twin Support Vector Machine Method

Abstract: Interferences can severely degrade the performance of Global Navigation Satellite System (GNSS) receivers. As the first step of GNSS any anti-interference measures, interference monitoring for GNSS is extremely essential and necessary. Since interference monitoring can be considered as a classification problem, a real-time interference monitoring technique based on Twin Support Vector Machine (TWSVM) is proposed in this paper. A TWSVM model is established, and TWSVM is solved by the Least Squares Twin Support … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 8 publications
0
16
0
Order By: Relevance
“…The classification algorithms are very helpful to predict the weather pattern. SVM is one of the highly developed classification technique [13].…”
Section: Support Vector Machinementioning
confidence: 99%
“…The classification algorithms are very helpful to predict the weather pattern. SVM is one of the highly developed classification technique [13].…”
Section: Support Vector Machinementioning
confidence: 99%
“…In the signal features method, the features of the spoofing signal are quite similar to those of the actual signal and there is no sudden change in the transition process; but still, the signal feature method has not proven to work well. In addition, some crossing methods were proposed to detect spoofing, for instance machine learning [32], maximum likelihood estimation [33], and cooperation of multiple detections [34]. However, these methods are still dependent on prior information or actual signal features [35].…”
Section: Introductionmentioning
confidence: 99%
“…In Ref. [ 22 ], the authors proposed a method to monitor the spoofing signal based on machine learning and signal processing. Other methods can also detect spoofing signals to a certain extent, but still have limitations.…”
Section: Introductionmentioning
confidence: 99%