<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Inside GNSS &#8211; Global Navigation Satellite Systems Engineering, Policy, and Design</title>
	<atom:link href="https://insidegnss.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://insidegnss.com/</link>
	<description>Global Navigation Satellite Systems Engineering, Policy, and Design</description>
	<lastBuildDate>Fri, 06 Mar 2026 19:01:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://insidegnss.com/wp-content/uploads/2017/12/site-icon.png</url>
	<title>Inside GNSS &#8211; Global Navigation Satellite Systems Engineering, Policy, and Design</title>
	<link>https://insidegnss.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Qualinx Details 1 mW Reconfigurable GNSS Chip and Evaluation Kit</title>
		<link>https://insidegnss.com/qualinx-details-1-mw-reconfigurable-gnss-chip-and-evaluation-kit/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 19:01:03 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Autonomous Vehicles]]></category>
		<category><![CDATA[Business News]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[New Builds]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196545</guid>

					<description><![CDATA[<p>Qualinx has provided technical details on its QLX3Gx ultra-low-power GNSS chip and a companion developer evaluation kit aimed at battery-constrained IoT, wearable, tracking...</p>
<p>The post <a href="https://insidegnss.com/qualinx-details-1-mw-reconfigurable-gnss-chip-and-evaluation-kit/">Qualinx Details 1 mW Reconfigurable GNSS Chip and Evaluation Kit</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Qualinx has provided technical details on its QLX3Gx ultra-low-power GNSS chip and a companion developer evaluation kit aimed at battery-constrained IoT, wearable, tracking and mobility devices. </p>



<span id="more-196545"></span>



<p>The company positions the QLX3Gx as a market-ready receiver built around its Dragonfly Digital RF architecture, which moves many traditionally analog RF functions into the digital domain to reduce power, size and cost while retaining multi-constellation GNSS performance. The new evaluation kit is intended to let OEMs characterize power consumption and positioning behavior in their own devices before committing to volume designs. </p>



<p>According to Qualinx, the QLX3Gx can operate in a 1 mW GNSS mode, with the same silicon supporting a range of power-versus-performance configurations through software. The chip is designed to track multiple constellations and bands concurrently, and to keep tracking and navigation computation on the chip rather than offloading to cloud services or host processors. It also supports authenticated Galileo signals via OSNMA to improve resilience against spoofing, with the company highlighting use cases in asset tracking, wearables and other edge devices that need long battery life as well as resistance to malicious interference.&nbsp;</p>



<p>Qualinx is also emphasizing supply-chain and manufacturing aspects, noting that the GNSS chip is fabricated at GlobalFoundries’ facility in Dresden, Germany, as part of a broader European semiconductor footprint. A recent €20 million funding round is intended to help move the QLX3Gx family into volume production and expand its availability in international markets.&nbsp;</p>
<p>The post <a href="https://insidegnss.com/qualinx-details-1-mw-reconfigurable-gnss-chip-and-evaluation-kit/">Qualinx Details 1 mW Reconfigurable GNSS Chip and Evaluation Kit</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>u-blox Introduces ZED-X20D GNSS Heading Module for Mass-Market High-Precision Applications</title>
		<link>https://insidegnss.com/u-blox-introduces-zed-x20d-gnss-heading-module-for-mass-market-high-precision-applications/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 18:44:59 +0000</pubDate>
				<category><![CDATA[agriculture]]></category>
		<category><![CDATA[Autonomous Vehicles]]></category>
		<category><![CDATA[Business News]]></category>
		<category><![CDATA[Galileo]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[New Builds]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196540</guid>

					<description><![CDATA[<p>u-blox has introduced the ZED-X20D, a dual-antenna, all-band GNSS heading module that brings centimeter-level positioning and motion-independent heading to high-volume industrial applications. Built...</p>
<p>The post <a href="https://insidegnss.com/u-blox-introduces-zed-x20d-gnss-heading-module-for-mass-market-high-precision-applications/">u-blox Introduces ZED-X20D GNSS Heading Module for Mass-Market High-Precision Applications</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>u-blox has introduced the ZED-X20D, a dual-antenna, all-band GNSS heading module that brings centimeter-level positioning and motion-independent heading to high-volume industrial applications.</p>



<span id="more-196540"></span>



<p>Built on the company’s X20 high-precision platform, the module delivers RTK-grade performance while maintaining precise GNSS-based heading even at low speeds or standstill, a key requirement for auto-steering and autonomous operation. Target sectors include precision agriculture, unmanned aerial vehicles, autonomous machinery, marine and robotics navigation.&nbsp;</p>



<h3 class="wp-block-heading" id="h-all-band-on-both-antennas-with-scalable-corrections">All-band on both antennas, with scalable corrections</h3>



<p>The ZED-X20D tracks all major GNSS constellations on L1, L2, L5 and L6, and adds L-band reception for PPP correction services, an “all band on both antennas” approach that is intended to maximize heading availability and stability in challenging environments. To meet different accuracy and deployment needs, it works with RTK, PPP-RTK and PPP correction services, including u-blox’s PointPerfect offerings for regional and global coverage. Built-in support for Galileo E6 enables use of the free Galileo High Accuracy Service (HAS), giving equipment makers multiple options to source corrections. </p>



<p>u-blox is positioning the ZED-X20D as a drop-in upgrade for existing designs by retaining the established ZED form factor and pairing the module with its ANN-MB2 all-band antenna and PointPerfect services as a turnkey high-precision bundle. The company says this combination is aimed at simplifying design, reducing system cost and accelerating mass adoption of automated and autonomous equipment across agriculture, UAVs, construction and other industrial domains.&nbsp;</p>



<h3 class="wp-block-heading" id="h-security-and-interference-resilience-for-trusted-heading">Security and interference resilience for trusted heading</h3>



<p>The module includes u-blox’s end-to-end hardened security, with secure boot, signed firmware and a hardware root of trust for cryptographic material, as well as support for Galileo OSNMA and encrypted correction data.&nbsp;All-band frequency diversity and interference monitoring are designed to improve resilience against jamming and other RF threats, while access to high-quality GNSS measurements supports reliable post-processing and integrity monitoring—features likely to appeal to developers building safety-critical or highly automated systems on top of the new heading platform.</p>
<p>The post <a href="https://insidegnss.com/u-blox-introduces-zed-x20d-gnss-heading-module-for-mass-market-high-precision-applications/">u-blox Introduces ZED-X20D GNSS Heading Module for Mass-Market High-Precision Applications</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Spirent SimXTRACT Converts Real-World GNSS Environments into Repeatable Lab Scenarios</title>
		<link>https://insidegnss.com/spirent-simxtract-converts-real-world-gnss-environments-into-repeatable-lab-scenarios/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 20:51:09 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Autonomous Vehicles]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196538</guid>

					<description><![CDATA[<p>Spirent Communications, now part of Keysight Technologies, has introduced a new GNSS test tool designed to close the long-standing gap between field data...</p>
<p>The post <a href="https://insidegnss.com/spirent-simxtract-converts-real-world-gnss-environments-into-repeatable-lab-scenarios/">Spirent SimXTRACT Converts Real-World GNSS Environments into Repeatable Lab Scenarios</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Spirent Communications, now part of Keysight Technologies, has introduced a new GNSS test tool designed to close the long-standing gap between field data collection and laboratory simulation in PNT testing.</p>



<span id="more-196538"></span>



<p>The new solution, SimXTRACT, allows engineers to decompose real-world RF recordings into discrete signal components and replay them as fully controllable scenarios on Spirent simulators.</p>



<p>Positioning, navigation and timing (PNT) developers have traditionally been forced to choose between RF record-and-playback on one side and pure lab simulation on the other. Record-and-playback captures all the richness of the real world, but offers limited control and repeatability. Simulation provides precise control over parameters and repeatability for regression and corner-case testing, but can lack the full complexity of live-sky environments. Spirent positions SimXTRACT as a way to fuse these two approaches.</p>



<p>According to the company, SimXTRACT takes signals captured in the field using Spirent record-and-playback devices and performs complex signal decomposition, breaking each received signal into separate line-of-sight and multipath ray paths. Metadata such as Doppler offset, code error, power level, and angle of arrival (AoA) is retained. That decomposed representation is then converted into simulator drive files that can be loaded into Spirent GNSS simulators as fully controllable, repeatable scenarios.</p>



<p>“SimXTRACT revolutionizes how you can test positioning solutions. By combining real-world insights with lab-based control and repeatability, our customers will no longer have to compromise on how they test in this fast-moving technology area,” said Peter Terry-Brown, Divisional CEO of Spirent’s Positioning business, in the announcement. “SimXTRACT ensures customers get the best of both worlds, with enhanced realism delivering more accurate results, quicker issue resolution, and faster time to market.”</p>



<p>By reducing the amount of time and number of trips required for field data collection, Spirent says users can cut the cost and complexity of scenario capture and generation while still working with high-fidelity, real-world conditions. Developers can also analyze signal recordings, search for specific types of events or environments, and then recreate those conditions in the lab to focus troubleshooting or performance characterization.</p>



<p>Spirent expects SimXTRACT to be used across a broad set of sectors where high-precision PNT is critical, including automotive, chipsets, consumer devices, defense and critical infrastructure. Terry-Brown frames the tool as a way to “bring the real-world environment into every stage of your product realization process,” with the goal of improving product quality while saving time and money.</p>
<p>The post <a href="https://insidegnss.com/spirent-simxtract-converts-real-world-gnss-environments-into-repeatable-lab-scenarios/">Spirent SimXTRACT Converts Real-World GNSS Environments into Repeatable Lab Scenarios</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DARPA’s ROCkN Program Targets GNSS-Free Precision Timing in Contested Environments</title>
		<link>https://insidegnss.com/darpas-rockn-program-targets-gnss-free-precision-timing-in-contested-environments/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 17:59:10 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Business News]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[New Builds]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[timing]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196532</guid>

					<description><![CDATA[<p>Robust Optical Clock Network aims to deliver shoebox-scale and transportable optical clocks with months-long GPS-quality holdover for next-generation PNT and sensor networks. DARPA...</p>
<p>The post <a href="https://insidegnss.com/darpas-rockn-program-targets-gnss-free-precision-timing-in-contested-environments/">DARPA’s ROCkN Program Targets GNSS-Free Precision Timing in Contested Environments</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>Robust Optical Clock Network aims to deliver shoebox-scale and transportable optical clocks with months-long GPS-quality holdover for next-generation PNT and sensor networks.</em></p>



<span id="more-196532"></span>



<p>DARPA has outlined new details of its Robust Optical Clock Network (ROCkN) program, describing how high-precision optical clocks could allow U.S. forces to retain GPS-grade positioning, navigation and timing (PNT) in contested environments while also enabling timing precision well beyond what space-based GNSS currently provides. The agency’s latest update, released March 2, emphasizes GPS-free operations for platforms and networks operating under jamming, spoofing or prolonged signal outages.&nbsp;</p>



<p>Modern missiles, sensors, aircraft and artillery all depend on the nanosecond-accurate timing disseminated by GPS satellites. A timing error of just a few billionths of a second translates into position errors on the order of a meter or more, which can quickly degrade weapon accuracy and sensor coherence. Despite hardening measures, the space-to-ground link remains vulnerable to electronic attack and interference, making assured timing one of the central challenges for GNSS-dependent forces.&nbsp;</p>



<h3 class="wp-block-heading" id="h-rockn-pushes-optical-clocks-from-physics-labs-into-tactical-form-factors">ROCkN Pushes Optical Clocks From Physics Labs Into Tactical Form Factors</h3>



<p>ROCkN’s answer is to push optical-domain timing out of the lab and into tactical-grade hardware. The program is developing two classes of clocks: a compact, shoebox-sized unit with power consumption comparable to a household lightbulb, designed to hold GPS-level timing (sub-nanosecond precision) for up to two weeks without any satellite updates; and a larger, “washing-machine”-sized master clock intended to provide a regional time reference with GPS-level precision for more than six months without resynchronization. Both clocks are being engineered under strict size, weight and power constraints for deployment on mobile or forward-based platforms.&nbsp;</p>



<p>At the network level, ROCkN is also demonstrating over-the-air optical time-transfer techniques that push beyond GPS’ few-nanosecond accuracy. According to DARPA, recent field tests have achieved femtosecond-level synchronization over hundreds of kilometers and have operated multi-node clock networks in challenging weather, from tropical humidity to heat waves and blizzards. Moving from nanosecond to picosecond-and-better timing is expected to unlock new capabilities in distributed sensing, coherent radar and electronic warfare, as well as wideband, high-capacity communications.</p>



<h3 class="wp-block-heading" id="h-femtosecond-level-synchronization-targets-next-gen-sensing-ew-and-comms-nbsp">Femtosecond-Level Synchronization Targets Next-Gen Sensing, EW and Comms&nbsp;</h3>



<p>The most immediate impact is in timing resilience. Optical clocks with weeks- to months-long holdover effectively create local and regional “mini-time scales” that can maintain GPS-equivalent performance through prolonged outages or deliberate interference. In practice, that means platforms and sensor networks could retain precise time tags and navigation solutions even when denied access to GPS, and could re-align with space-based systems once signals become available again. DARPA also highlights the potential for coherent synthesis of data from multiple compact, mobile sensors at frequencies beyond X-band, improving emitter geolocation and target characterization in contested spectrum.&nbsp;</p>



<p>DARPA reports that ROCkN hardware has already been flown on fixed-wing aircraft, integrated on ground vehicles and deployed at sea for a three-week demonstration aboard a naval vessel operating in the Pacific. Over the coming year, the agency plans a series of field exercises showcasing ROCkN-enabled capabilities across next-generation PNT, electronic warfare and ISR mission sets, alongside a pilot-line manufacturing effort aimed at supplying Department of Defense transition partners.&nbsp;</p>



<p>Taken together, ROCkN positions optical-clock-based timing as a key pillar in the broader push toward alternative and complementary PNT. For GNSS users and system designers, it underscores a strategic shift: from relying solely on space-borne signals for timing, to a hybrid model in which resilient, GPS-independent local time sources and optical time-transfer networks backstop – and ultimately extend – the performance envelope of satellite navigation.</p>
<p>The post <a href="https://insidegnss.com/darpas-rockn-program-targets-gnss-free-precision-timing-in-contested-environments/">DARPA’s ROCkN Program Targets GNSS-Free Precision Timing in Contested Environments</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Working Papers: Overview of Overbounding Techniques for Integrity Purposes</title>
		<link>https://insidegnss.com/overview-of-overbounding-techniques-for-integrity-purposes/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 02:18:28 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[Galileo]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196409</guid>

					<description><![CDATA[<p>A comprehensive look at various concepts related to CDF-overbounding, and a methodology for creating protection volumes that contain positioning errors with a high...</p>
<p>The post <a href="https://insidegnss.com/overview-of-overbounding-techniques-for-integrity-purposes/">Working Papers: Overview of Overbounding Techniques for Integrity Purposes</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>A comprehensive look at various concepts related to CDF-overbounding, and a methodology for creating protection volumes that contain positioning errors with a high level of confidence.</em></p>



<span id="more-196409"></span>



<p><strong>SÉBASTIEN TRILLES, ODILE MALIET, JULIE ANTIC, KIN MIMOUNI</strong>, THALES ALENIA SPACE, FRANCE</p>



<p>In a broad sense, the notion of integrity refers to the level of confidence one can have in data obtained from a calculation result. In positioning systems, integrity is a measure of the trustworthiness a user can place in a position estimate. Geolocation would be perfect if measurements were error-free, but this is never the case as all device measurements inherently contain errors and noise. Hence, a discrepancy between the calculated position and the true (but unknown) one always exists. As errors and noise contains stochastic part, integrity is fundamentally grounded in probabilistic theory.</p>



<p>Mathematically expressed, integrity is equivalent to assigning a probability of the estimate being outside a defined confidence interval (protection level). The integrity of a positioning system is compromised when anomalies occur, leading to unexpected positioning errors beyond the operational protection level. These anomalies could persist for more than a few seconds within a specific time interval (T). In such cases, the integrity risk (IR) is defined as the probability the true position remains outside the protection level for a duration exceeding T.</p>



<p>For instance, in precision approach operations in aviation, the Standards And Recommended Practices (SARPs) set the IR at 2×10<sup>-7</sup>&nbsp;per approach (150s) and the specific time interval to&nbsp;T=6s. The computation of Protection Level (PL) consists of scaling position error variance to the integrity requirement using K-factors. The K-factors are derived from statistical laws and are critical for ensuring the system’s integrity in various operational conditions, taking into account the errors&#8217; time-correlation [9] [10].</p>



<p>In practical applications, positioning is accomplished using measurements with well-known residual error structure and statistical distributions. Position and time errors are determined by linearly combining the residual errors of the measurements. The process starts with the GNSS navigation solution involving the estimation of a position-time correction x as a solution to the measurement equations linearized around a given position-time priori:&nbsp;<em>WGx=Wb+</em>ε, where&nbsp;<em>G</em>&nbsp;is a&nbsp;<em>m×4</em>&nbsp;matrix with&nbsp;<em>m</em>&nbsp;the number of line of sight,&nbsp;ε&nbsp;is the measurement noises vector,&nbsp;<em>W</em>&nbsp;is a weight matrix and&nbsp;<em>b</em>&nbsp;is the residual measurements vector. The noises&nbsp;ε&nbsp;are assumed to follow a Normal centered law.</p>



<p>The so called design matrix&nbsp;<em>G</em>&nbsp;is defined as the matrix of partial derivatives of the measurement equations with respect to the parameters of position and time. The partial derivative of the pseudo range with respect to the position correction is obtained from the partial derivatives of the geometric distance D=||X<sup>s</sup>-X<sub>r</sub>&nbsp;||&nbsp;between satellite position&nbsp;<em>X</em><em><sup>s</sup></em>&nbsp;and (unknown) receiver position&nbsp;<em>X</em><em><sub>r</sub></em><em>.&nbsp;</em>Re-writing the geometric distance as&nbsp;<em>D=u</em><em><sub>r</sub></em><em><sup>s</sup></em><em>∙(X</em><em><sup>s</sup></em><em>-X</em><em><sub>r</sub></em><em>),</em>&nbsp;the partial derivative of with respect to the positions is the unit vector of the line of sight–<em>u</em><em><sub>r</sub></em><em><sup>s</sup></em>&nbsp;from receiver to satellite.</p>



<p>The weights per line of sight are built using different model variances related to various contributor to measurement errors: residual system errors (orbit and clock), propagation errors (ionosphere and troposphere), and local errors (multipath, thermal noise and interference). The maximum likelihood method provides the estimate&nbsp;<em>=Sb,</em>&nbsp;where&nbsp;<em>S=(G</em><em><sup>t</sup></em><em>&nbsp;W G)</em><em><sup>-1</sup></em><em>G</em><em><sup>t</sup></em><em>&nbsp;W</em>&nbsp;is the&nbsp;<em>4×m</em>&nbsp;sensitivity matrix expressed in the east (E), north (N), up (U) local frame and time.</p>



<p>The estimation positioning error <em>e</em> is given by </p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="476" height="58" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM.png" alt="Screen Shot 2026-03-03 at 4.36.01 PM" class="wp-image-196410" style="width:213px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM.png 476w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM-300x37.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM-48x6.png 48w" sizes="(max-width: 476px) 100vw, 476px" /></figure>



<p>The first three row components of <em>S, </em>respectively s<sub>E,i</sub>, s<sub>N,i</sub> and s<sub>U,i</sub> correspond to the partial derivatives of position errors with respect to the east, north and up directions in relation to the measurement errors of the i-th satellite. The sensitivity matrix linearly projects the unmodeled residual measurement errors ε<em><sub>i</sub></em> in a given direction.</p>



<p>For east direction:</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="308" height="96" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM.png" alt="Screen Shot 2026-03-03 at 4.38.20 PM" class="wp-image-196412" style="aspect-ratio:3.2093023255813953;width:103px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM.png 308w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM-300x94.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM-48x15.png 48w" sizes="(max-width: 308px) 100vw, 308px" /></figure>



<p>for north:</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="314" height="98" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM.png" alt="Screen Shot 2026-03-03 at 4.41.12 PM" class="wp-image-196413" style="aspect-ratio:3.2041793643883327;width:103px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM.png 314w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM-300x94.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM-48x15.png 48w" sizes="(max-width: 314px) 100vw, 314px" /></figure>



<p>and for up:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="314" height="96" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM.png" alt="Screen Shot 2026-03-03 at 4.43.05 PM" class="wp-image-196414" style="width:105px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM.png 314w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM-300x92.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM-48x15.png 48w" sizes="auto, (max-width: 314px) 100vw, 314px" /></figure>



<p>This process establishes a straightforward mathematical transfer that enables the projection of residual errors from the measurement domain to the position domain. Focusing on measurement domain, we seek sufficient properties regarding measurement errors distribution that ensure integrity in the domain of positions. These properties define integrity at the measurement level. If these properties are respected, integrity in the domain of positions is ensured, referred to as the transfer of integrity from the measurement domain to the position domain.</p>



<p>This article provides a comprehensive overview of the various concepts related to CDF overbounding. It aims to articulate each concept within a common framework, delineate their ranges and limitations, and ultimately present a methodology for creating protection volumes that reliably contain positioning errors with a high level of confidence.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="360" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-1024x360.png" alt="Screenshot 2026-02-11 at 5.39.02 PM" class="wp-image-196522" style="width:600px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-1024x360.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-300x105.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-768x270.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-48x17.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-mops-integrity-concept">MOPS Integrity Concept </h3>



<p>Initially, integrity concept was developed for aeronautical users and standardized by the Minimum Operational Performance Standards (MOPS) document [1] and is defined at position level. This standard deals with integrity parameters broadcasted by SBAS regarding ionosphere, orbit and clock corrections. In this aspect, MOPS considers the individual measurement error contributors as independent, making it possible to sum up all model variances in unique one σ<em><sub>i</sub></em><sup>2</sup>&nbsp;per line of sight. The weight matrix is defined as diagonal&nbsp;<em>W</em>=diag(w<sub>1</sub>,…,w<sub>m</sub>) where&nbsp;<em>w</em><em><sub>i</sub></em>=1⁄σ<sub>i</sub><sup>2</sup>).</p>



<p>Therefore, the measurement errors are assumed of white noise type, so their distributions have a zero expectation&nbsp;<em>E</em>[ε]=0, which implies the expectation of the identification error is also zero:&nbsp;<em>E</em>[<em>e</em>]=<em>SE</em>[ε]=0.</p>



<p>The covariance of the error is: cov(<em>e</em>)=<em>E</em>[(<em>e-E</em>[<em>e</em>]) (<em>e-E</em>[<em>e</em>])<sup>t</sup>]=<em>E</em>[<em>ee<sup>t</sup></em>]<em>SE</em>[εε<sup>t</sup>] <em>S<sup>t</sup></em>=<em>Scov</em>(ε)<em>S<sup>t</sup>.</em> Therefore, the minimum covariance is reached by taking cov(ε)=<em>W</em><sup>-1</sup>, thus cov(<em>e</em>)=<em>SW</em><sup>-1</sup><em>S<sup>t</sup></em>=(<em>G<sup>t</sup></em> <em>WG</em>)<sup>-1</sup>. This refers to a four-dimensional symmetric positive-definite matrix whose are linear combinations of the measurement variances, as for instance:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="270" height="106" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM.png" alt="Screen Shot 2026-03-03 at 4.47.09 PM" class="wp-image-196415" style="width:176px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM.png 270w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM-36x14.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM-48x19.png 48w" sizes="auto, (max-width: 270px) 100vw, 270px" /></figure>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="948" height="118" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM.png" alt="Screen Shot 2026-03-03 at 4.51.09 PM" class="wp-image-196417" style="aspect-ratio:8.03467344193693;width:418px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM.png 948w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-300x37.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-768x96.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-48x6.png 48w" sizes="auto, (max-width: 948px) 100vw, 948px" /></figure>



<p>The positioning error structure is then separated into horizontal errors <em>e<sub>H</sub></em> and vertical errors <em>e<sub>U</sub>,</em> which amounts to considering the following extracted submatrices:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="320" height="46" src="https://insidegnss.com/wp-content/uploads/2026/03/10.png" alt="10" class="wp-image-196418" srcset="https://insidegnss.com/wp-content/uploads/2026/03/10.png 320w, https://insidegnss.com/wp-content/uploads/2026/03/10-300x43.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/10-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/10-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/10-48x7.png 48w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>



<p>The MOPS specify the integrity risk IR as the maximum allowable probability for the navigation position error to exceed the alarm limit without the system alerting the user within the alert time. In the case of a standardized Normal distribution, such as <em>N</em>(0,1), the <em>K</em>-factor depends on the risk <em>IR:</em></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="38" src="https://insidegnss.com/wp-content/uploads/2026/03/11.png" alt="11" class="wp-image-196419" srcset="https://insidegnss.com/wp-content/uploads/2026/03/11.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/11-300x36.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/11-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/11-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/11-48x6.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>By making the change of variables <em>t</em>=√2<em>u</em> in <strong>Equation 2,</strong> we obtain an expression that depends on the complementary error function erfc:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="34" src="https://insidegnss.com/wp-content/uploads/2026/03/12.png" alt="12" class="wp-image-196420" srcset="https://insidegnss.com/wp-content/uploads/2026/03/12.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/12-300x32.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/12-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/12-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/12-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>and after inversion in <strong>Equation 3, </strong>we get the expression of the usual Gaussian <em>K</em>-factor:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="20" src="https://insidegnss.com/wp-content/uploads/2026/03/13.png" alt="13" class="wp-image-196421" srcset="https://insidegnss.com/wp-content/uploads/2026/03/13.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/13-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/13-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/13-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/13-48x3.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p><strong>Application to protection volumes: </strong>The MOPS standard define the vertical protection volume as:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/14.png" alt="14" class="wp-image-196422" srcset="https://insidegnss.com/wp-content/uploads/2026/03/14.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/14-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/14-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/14-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/14-48x2.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>Where the K-factor inflates the standard deviation <em>d<sub>U</sub></em> at a level compatible with integrity requirements. Because a linear combination of Gaussian-distributed vector is Gaussian-distributed, the residual position errors follow a Normal law. If Φ<sub>eU</sub> denotes the cumulative distribution function (CDF) of this Normal law, defined by Φ<sub>eU</sub>(x)=<em>P</em>(<em>e<sub>U</sub></em>≤<em>x</em>), we then have:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/15.png" alt="15" class="wp-image-196423" srcset="https://insidegnss.com/wp-content/uploads/2026/03/15.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/15-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/15-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/15-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/15-48x3.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p><strong>Equation 6</strong>&nbsp;indicates that the absolute value of the error&nbsp;<em>e</em><em><sub>U</sub></em>&nbsp;is bounded by the confidence interval&nbsp;<em>VPL</em>&nbsp;defined in&nbsp;<strong>Equation 5</strong>&nbsp;at the probability (1-<em>IR</em>).</p>



<p>The integrity MOPS concept does not mention any overbounding approach. It does not provide information regarding the shape of empirical residual errors distribution. It only mentions [1] the necessity from SBAS to broadcast two parameters, the first one being the variance of Normal distributions associated with the user differential range error for a satellite after application of corrections, and the second one associated with residual ionosphere vertical error at an ionospheric grid point for an L1 signal. The term “associated” as used by MOPS leaves room for several possible interpretations.</p>



<p>In fact, these definitions may give the impression that these Normal distributions represent the actual errors distribution. This interpretation has already been mentioned by several authors [5]. As a consequence, based on the stability of independent Normal distributions through linear combination, the position errors distribution is also represented by a Normal distribution. Unfortunately, the actual range errors are generally not Normal, especially in the tails.</p>



<p>In that context, it could be tempting to check integrity at the pseudorange level by making sure that, for all lines of sight&nbsp;<em>i,</em>&nbsp;the Normal distribution with standard deviation σ<em><sub>i</sub></em>&nbsp;is conservative at the quantile equals to the integrity risk IR:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/16.png" alt="16" class="wp-image-196424" srcset="https://insidegnss.com/wp-content/uploads/2026/03/16.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/16-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/16-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/16-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/16-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Non-intuitively, this naïve approach is not correct in general conditions. Annex A3 in [1] shows a toy example that satisfies&nbsp;<strong>Equation 7</strong>&nbsp;for all lines of sight, and yet is not compliant with the integrity risk IR on position. This example clearly shows integrity transfer from range to position is not obvious and explains the emergence of overbounding concepts.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="358" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-1024x358.png" alt="Screenshot 2026-02-11 at 5.39.13 PM" class="wp-image-196523" style="width:595px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-1024x358.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-300x105.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-768x268.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-48x17.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM.png 1162w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-cdf-overbounding">CDF-Overbounding </h3>



<p>The CDF-overbounding concept has been introduced by [2] in the field of aeronautical users. The main idea is to overbound the empirical measurement error distribution, in the field of CDF, by a simpler one allowing to better control the integrity risk mainly in the tails, in the absence of faults. An overbound can be viewed as a statistic distribution that is a regular envelope of the empirical distribution. It is interesting to note the mathematical results presented in [2] were already known to the statistic community [14].</p>



<p>In the following, the CDF of a random variable X is denoted by&nbsp;<em>F</em><em><sub>X</sub></em><em>.</em>&nbsp;According to [2], the random variable&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;is a CDF-overbound of the random variable&nbsp;<em>X,&nbsp;</em>and we note&nbsp;<em>X</em><img decoding="async" src="blob:https://insidegnss.com/049e9722-dc98-4a5f-8f7a-7bae4e1dab7d" alt=""><em>O</em><em><sub>X</sub></em>, if</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="48" src="https://insidegnss.com/wp-content/uploads/2026/03/18.png" alt="18" class="wp-image-196425" srcset="https://insidegnss.com/wp-content/uploads/2026/03/18.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/18-300x45.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/18-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/18-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/18-48x7.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p>The binary relationship (8) defines a partial order on the set of distributions. Indeed, the CDF-overbound relation is:</p>



<p>•&nbsp;<strong>Reflexive:</strong>&nbsp;X<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">X<br>(every element is related to itself)</p>



<p>•&nbsp;<strong>Transitive:</strong>&nbsp;if X<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">Y and Y<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">Z then X<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">Z<br>(the order is maintained through the chain)</p>



<p>•&nbsp;<strong>Antisymmetric:</strong>&nbsp;if X<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">Y and<br>Y<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">X then X=Y (two elements can&#8217;t mutually precede each other; they are considered equal)</p>



<p>Three graphical representations of CDF-overbounding are provided in&nbsp;<strong>Figure 1</strong>&nbsp;for a Gaussian overbound with standard deviation equals to 0.7. The green area represents the domain for the CDF (respectively folded CDF and QQ plot) of&nbsp;<em>X,</em>&nbsp;that satisfies the CDF-overbounding of&nbsp;<em>X</em>&nbsp;by&nbsp;<em>O</em><em><sub>X</sub></em><em>.</em>&nbsp;On the left, the CDF of the overbound&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;is represented in black. This representation is a direct illustration of the definition. The representation in the middle is based on the folded CDF that equals the CDF before the median and the survival function (1-CDF) after the median. This representation is handy to inspect the overbounding on the left and right tails thanks to the log-scale. The representation on the left is based on the Quantile-Quantile (QQ) plot for&nbsp;<em>X</em>&nbsp;and&nbsp;<em>O</em><em><sub>X</sub></em>. It permits inspecting both the core and the tails of the distribution.</p>



<p>Introducing the overbounding concept allows the following result:&nbsp;</p>



<p><strong>Theorem 1:</strong>&nbsp;If&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>&nbsp;are two centered symmetric and unimodal distributions, and&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;and&nbsp;<em>O</em><em><sub>Y</sub></em>&nbsp;their respective overbounds are also symmetric and unimodal. Then for all α, β in&nbsp;<img decoding="async" src="blob:https://insidegnss.com/a050764f-bd2b-4772-87d8-2af9857cd8e7" alt="">, the linear combination α<em>X</em>+β<em>Y</em>&nbsp;is CDF-overbounded by α<em>O</em><em><sub>X</sub></em>+β<em>O</em><em><sub>Y</sub></em>. In short, the overbounding property is stable by linear combination:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="14" src="https://insidegnss.com/wp-content/uploads/2026/03/26.png" alt="26" class="wp-image-196426" srcset="https://insidegnss.com/wp-content/uploads/2026/03/26.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/26-300x13.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/26-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/26-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/26-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>If the distribution of each residual measurement error is symmetric, unimodal and can be overbounded by a distribution that is also symmetric and unimodal, then the positioning errors are also overbounded by a known symmetric and unimodal distribution. Under this assumption, integrity in the pseudorange domain implies integrity in the position domain.</p>



<h3 class="wp-block-heading" id="h-proof">Proof:</h3>



<p>Proof of stability by addition:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="814" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM.png" alt="Screen Shot 2026-03-03 at 5.01.31 PM" class="wp-image-196427" style="aspect-ratio:8.660223048327138;width:251px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM.png 814w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-300x35.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-768x89.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-48x6.png 48w" sizes="auto, (max-width: 814px) 100vw, 814px" /></figure>



<p>The proof is established in two steps. The first step is to prove that if </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="678" height="144" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM.png" alt="Screen Shot 2026-03-03 at 5.02.50 PM" class="wp-image-196428" style="aspect-ratio:4.709393014581214;width:198px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM.png 678w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM-300x64.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM-24x5.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM-36x8.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM-48x10.png 48w" sizes="auto, (max-width: 678px) 100vw, 678px" /></figure>



<p>The second step is a direct application of the previous statement: if</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="454" height="76" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM.png" alt="Screen Shot 2026-03-03 at 5.03.51 PM" class="wp-image-196429" style="width:215px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM.png 454w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM-300x50.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM-48x8.png 48w" sizes="auto, (max-width: 454px) 100vw, 454px" /></figure>



<p>The sum of two independent symmetric and unimodal variables is itself symmetric and unimodal. The proof is detailed in the Appendix (see online version). This shows all the considered distributions have the right properties to be compared by CDF-overbounding.</p>



<p>Applying the definition of CDF-overbounding, proving (1) comes down to establishing that:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="24" src="https://insidegnss.com/wp-content/uploads/2026/03/34.png" alt="34" class="wp-image-196430" srcset="https://insidegnss.com/wp-content/uploads/2026/03/34.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/34-300x23.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/34-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/34-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/34-48x4.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="25" src="https://insidegnss.com/wp-content/uploads/2026/03/35.png" alt="35" class="wp-image-196431" srcset="https://insidegnss.com/wp-content/uploads/2026/03/35.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/35-300x24.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/35-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/35-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/35-48x4.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>Let us fix z and compute F<sub>X+OY</sub>(z)–F<sub>X+Y</sub>(z) using the formula for the CDF of the sum of two independent random variables (the derivation of the formula is recalled in the Appendix):</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="55" src="https://insidegnss.com/wp-content/uploads/2026/03/36.png" alt="36" class="wp-image-196433" srcset="https://insidegnss.com/wp-content/uploads/2026/03/36.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/36-300x52.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/36-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/36-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/36-48x8.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p>We now split the integral of <strong>Equation 10</strong> into two parts and make the change of variable x to <em>-x</em> for the negative part:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="320" height="45" src="https://insidegnss.com/wp-content/uploads/2026/03/37.png" alt="37" class="wp-image-196434" srcset="https://insidegnss.com/wp-content/uploads/2026/03/37.png 320w, https://insidegnss.com/wp-content/uploads/2026/03/37-300x42.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/37-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/37-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/37-48x7.png 48w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>



<p>Recalling that by requirement of the CDF-overbounding both <em>Y</em> and <em>O<sub>Y</sub></em> distributions are symmetrical, which means <em>F<sub>Y</sub></em>(<em>-x</em>)=1-<em>F<sub>Y</sub></em>(<em>x</em>) and thus F<sub>OY</sub>(<em>-x</em>)-<em>F<sub>Y</sub></em>(<em>-x</em>)=<em>F<sub>Y</sub></em>(<em>x</em>)-F<sub>OY</sub>(<em>x</em>). <strong>Equation 11</strong> becomes:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="18" src="https://insidegnss.com/wp-content/uploads/2026/03/38.png" alt="38" class="wp-image-196435" srcset="https://insidegnss.com/wp-content/uploads/2026/03/38.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/38-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/38-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/38-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/38-48x3.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>By definition of </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="146" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM.png" alt="Screen Shot 2026-03-03 at 7.11.08 PM" class="wp-image-196436" style="aspect-ratio:1.5533980582524272;width:47px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM.png 146w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM-24x15.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM-36x23.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM-48x31.png 48w" sizes="auto, (max-width: 146px) 100vw, 146px" /></figure>



<p>the right parenthesis of the integrand in&nbsp;<strong>Equation 12</strong>&nbsp;is positive for all&nbsp;<em>x.&nbsp;</em>Because&nbsp;<em>X</em>&nbsp;is unimodal and symmetric by assumption, its PDF&nbsp;<em>f</em><em><sub>X</sub></em>&nbsp;peaks at&nbsp;<em>f</em><em><sub>X</sub></em>(0) and is decreasing on the positive and negative sides. Thus, the unimodality and symmetry implies that, for all&nbsp;<em>x</em><sub>1</sub>&nbsp;and&nbsp;<em>x</em><sub>2</sub>, if |<em>x</em><sub>1</sub>|≤|<em>x</em><sub>2</sub>| then&nbsp;<em>f</em><em><sub>X</sub></em>(<em>x</em><sub>1</sub>)≥<em>f</em><em><sub>X</sub></em>(<em>x</em><sub>2</sub>).&nbsp;</p>



<p>In our case of interest, if&nbsp;<em>z</em>&nbsp;is negative, we have for all positive x, |z+x|≤|z-x| and so&nbsp;<em>f</em><em><sub>X</sub></em>(z+x)≥&nbsp;<em>f</em><em><sub>X</sub></em>(z-x), which means the left parenthesis of the previous integrand is also positive. We can deduce that</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="21" src="https://insidegnss.com/wp-content/uploads/2026/03/40.png" alt="40" class="wp-image-196437" srcset="https://insidegnss.com/wp-content/uploads/2026/03/40.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/40-300x20.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/40-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/40-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/40-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>which is precisely the statement (A). On the other hand, if <em>z</em> is positive, |z+x|≥ |z-x| and so <em>f<sub>X</sub></em>(z+x)≤<em>f<sub>X</sub></em>(z-x) meaning that the integrand is negative and so</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="20" src="https://insidegnss.com/wp-content/uploads/2026/03/41.png" alt="41" class="wp-image-196438" srcset="https://insidegnss.com/wp-content/uploads/2026/03/41.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/41-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/41-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/41-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/41-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>This proves (B) completing the proof that, if </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="140" height="114" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM.png" alt="Screen Shot 2026-03-03 at 7.14.03 PM" class="wp-image-196439" style="aspect-ratio:1.2283587935761848;width:39px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM.png 140w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM-24x20.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM-36x29.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM-48x39.png 48w" sizes="auto, (max-width: 140px) 100vw, 140px" /></figure>



<p>and the distributions <em>X, Y, O<sub>Y</sub></em> are symmetric unimodal, then</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="298" height="100" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM.png" alt="Screen Shot 2026-03-03 at 7.15.06 PM" class="wp-image-196440" style="width:86px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM.png 298w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM-48x16.png 48w" sizes="auto, (max-width: 298px) 100vw, 298px" /></figure>



<p>By applying the same reasoning, we get that if</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="94" height="80" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM.png" alt="Screen Shot 2026-03-03 at 7.16.05 PM" class="wp-image-196441" style="width:48px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM.png 94w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM-24x20.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM-36x31.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM-48x41.png 48w" sizes="auto, (max-width: 94px) 100vw, 94px" /></figure>



<p>and the distributions <em>X, O<sub>X</sub>, O<sub>Y</sub></em> are symmetric unimodal, then</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="268" height="96" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM.png" alt="Screen Shot 2026-03-03 at 7.17.52 PM" class="wp-image-196442" style="width:101px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM.png 268w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM-48x17.png 48w" sizes="auto, (max-width: 268px) 100vw, 268px" /></figure>



<p>This finishes the proof of stability of CDF-overbounding by addition.</p>



<p><em>Proof of stability by multiplication by a scalar:</em>&nbsp;for all real α,</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="438" height="74" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM.png" alt="Screen Shot 2026-03-03 at 7.19.09 PM" class="wp-image-196443" style="aspect-ratio:5.920997920997921;width:166px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM.png 438w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM-300x51.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM-48x8.png 48w" sizes="auto, (max-width: 438px) 100vw, 438px" /></figure>



<p>Let <em>X,</em> <em>O<sub>X</sub></em> be two symmetric, unimodal random variables such that</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="118" height="58" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM.png" alt="Screen Shot 2026-03-03 at 7.21.10 PM" class="wp-image-196445" style="width:45px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM.png 118w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM-24x12.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM-36x18.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM-48x24.png 48w" sizes="auto, (max-width: 118px) 100vw, 118px" /></figure>



<p>First of all, α<em>X</em>&nbsp;and α<em>O</em><em><sub>X</sub></em>&nbsp;are also symmetric and unimodal. By symmetry of&nbsp;<em>X</em>&nbsp;and&nbsp;<em>O</em><em><sub>X</sub></em><em>,</em>&nbsp;we can restrict ourselves to the case where α is strictly positive. According to the equality&nbsp;<em>F</em><sub>α</sub><em><sub>X</sub></em>(<em>x</em>)=<em>F</em><em><sub>X</sub></em>(<em>x</em>⁄α) and similarly for&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;so the inequalities defining&nbsp;<em>X</em><img decoding="async" src="blob:https://insidegnss.com/b753ea9a-1e39-4dca-8005-4dfe6fc9627c" alt=""><em>O</em><em><sub>X</sub></em>&nbsp;directly translate to α<em>X</em><img decoding="async" src="blob:https://insidegnss.com/b753ea9a-1e39-4dca-8005-4dfe6fc9627c" alt="">α<em>O</em><em><sub>X</sub></em><em>.</em></p>



<p>Application to protection volumes: If&nbsp;<em>X</em>&nbsp;is the distribution of the residual error (symmetric and unimodal by assumption), then a CDF-overbound&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;allows us to put a lower bound on the probability of the error to be in a certain interval containing 0. More specifically, for a negative&nbsp;<em>a</em>&nbsp;and positive&nbsp;<em>b,</em>&nbsp;we have:&nbsp;<em></em>.&nbsp;</p>



<p>Usually, protection volumes are chosen to be symmetric, and thus for positive&nbsp;<em>a,</em></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/52.png" alt="52" class="wp-image-196446" srcset="https://insidegnss.com/wp-content/uploads/2026/03/52.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/52-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/52-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/52-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/52-48x2.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>and so any protection volume computed with the overbounding distribution is a conservative protection volume for the original distribution.</p>



<p>In practice,&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;is a Gaussian distribution, chosen for its stability by linear combinations. If in the total error</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="94" height="24" src="https://insidegnss.com/wp-content/uploads/2026/03/54.png" alt="54" class="wp-image-196447" srcset="https://insidegnss.com/wp-content/uploads/2026/03/54.png 94w, https://insidegnss.com/wp-content/uploads/2026/03/54-24x6.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/54-36x9.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/54-48x12.png 48w" sizes="auto, (max-width: 94px) 100vw, 94px" /></figure>



<p>each error component ε<em><sub>i</sub></em> is CDF-overbounded by a Gaussian distribution with standard deviation σ<em><sub>i</sub>,</em> then the total error <em>e</em> is CDF-overbounded by a Gaussian of standard deviation</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="238" height="102" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM.png" alt="Screen Shot 2026-03-03 at 7.27.25 PM" class="wp-image-196448" style="width:117px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM.png 238w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM-24x10.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM-36x15.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM-48x21.png 48w" sizes="auto, (max-width: 238px) 100vw, 238px" /></figure>



<p>Thus, the usual formula for the protection . Thus, the usual formula for the protection level can be used, with</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="19" src="https://insidegnss.com/wp-content/uploads/2026/03/55.png" alt="55" class="wp-image-196449" srcset="https://insidegnss.com/wp-content/uploads/2026/03/55.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/55-300x18.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/55-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/55-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/55-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p><strong>Case of distributions with bias:</strong>&nbsp;The CDF-overbound theorem requires the distributions of error components to be centered. However, the absence of bias in residual measurement errors is never perfectly satisfied because of systematic errors due to troposphere, multipath inter-channel bias, etc.</p>



<p>These errors along the lines of sight are therefore composed of a random part, a noise&nbsp;ε<em><sub>i</sub></em>&nbsp;with zero mean, plus an additional bias μ<em><sub>i</sub></em><em>.</em>&nbsp;If these biases were known, they would be integrated into the SBAS corrections, but this is not the case. However, we will assume we know a bound on their absolute values.</p>



<p>The absolute value of the position error along one coordinate is then given by:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="43" src="https://insidegnss.com/wp-content/uploads/2026/03/56.png" alt="56" class="wp-image-196450" srcset="https://insidegnss.com/wp-content/uploads/2026/03/56.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/56-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/56-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/56-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/56-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>We can build the protection volume that covers the suffered errors as follows:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="320" height="44" src="https://insidegnss.com/wp-content/uploads/2026/03/57.png" alt="57" class="wp-image-196451" srcset="https://insidegnss.com/wp-content/uploads/2026/03/57.png 320w, https://insidegnss.com/wp-content/uploads/2026/03/57-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/57-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/57-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/57-48x7.png 48w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>



<p>where the factor <em>K</em> is computed according to the error distribution. In the Gaussian case, the multiplicative factor K is calculated using the inverse of the complementary function K=√2<em>erfc</em><sup>-1</sup>(<em>IR</em>).</p>



<p>The question of introducing biases as a multiplicative factor of the protection volume calculated with the classic formulation arises. To do this, we introduce the following calculation:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="322" height="75" src="https://insidegnss.com/wp-content/uploads/2026/03/58.png" alt="58" class="wp-image-196452" srcset="https://insidegnss.com/wp-content/uploads/2026/03/58.png 322w, https://insidegnss.com/wp-content/uploads/2026/03/58-300x70.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/58-24x6.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/58-36x8.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/58-48x11.png 48w" sizes="auto, (max-width: 322px) 100vw, 322px" /></figure>



<p>Here, the quantities</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="34" src="https://insidegnss.com/wp-content/uploads/2026/03/61.png" alt="61" class="wp-image-196453" srcset="https://insidegnss.com/wp-content/uploads/2026/03/61.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/61-300x32.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/61-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/61-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/61-48x5.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>We then find the desired multiplicative factor:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="33" src="https://insidegnss.com/wp-content/uploads/2026/03/62.png" alt="62" class="wp-image-196454" srcset="https://insidegnss.com/wp-content/uploads/2026/03/62.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/62-300x31.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/62-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/62-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/62-48x5.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>This multiplicative factor ξ makes it possible to inflate the classic volumes of protections (expressed without bias) so as to encompass these residual biases:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="15" src="https://insidegnss.com/wp-content/uploads/2026/03/63.png" alt="63" class="wp-image-196455" srcset="https://insidegnss.com/wp-content/uploads/2026/03/63.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/63-300x14.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/63-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/63-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/63-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>This approach allows us to state the following result:</p>



<p><strong>Theorem 1bis:</strong>&nbsp;If the distribution of each of the residual measurement errors is symmetric around its median, unimodal and can be overbounded by a Gaussian distribution with the same median (i.e. the mean of the Gaussian is equal to the median of the residual error distribution), then the protection level for the position error can be computed with the usual formula, provided we inflate the<em>&nbsp;K-</em>factor by the multiplicative factor ξ. Under these assumptions, integrity in the pseudorange domain imply integrity in the position domain.</p>



<p>The definition of coverage relative to a median is given by:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="48" src="https://insidegnss.com/wp-content/uploads/2026/03/64.png" alt="64" class="wp-image-196456" srcset="https://insidegnss.com/wp-content/uploads/2026/03/64.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/64-300x45.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/64-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/64-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/64-48x7.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>The concept of CDF-overbound requires the tails of the overbound cover the tails of the empirical distribution. In the case of a Gaussian overbound, we know the tails of the Gaussian distributions are very light and we will end up finding a quantile (even if it is very large) beyond which the tail of the Gaussian passes below the tail of the empirical distribution. This is why we set in practice a quantile <em>q,</em> beyond the specified integrity risk <em>q</em>><em>F</em><sup>-1</sup>(<em>IR⁄2N</em>), within which, on the interval [<em>-q,q</em>], the overbound property is verified.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="388" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-1024x388.png" alt="Screenshot 2026-02-11 at 5.39.26 PM" class="wp-image-196524" style="width:602px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-1024x388.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-300x114.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-768x291.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-36x14.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-48x18.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-paired-overbounding">Paired Overbounding </h3>



<p>This concept was introduced in [3,4] to relax the strong assumptions of CDF-overbounding, namely that the distributions of the residual error components are centered, unimodal and symmetric.</p>



<p><strong>Definition:</strong>&nbsp;The random variables&nbsp;<em>L</em><em><sub>X</sub></em>&nbsp;and&nbsp;<em>R</em><em><sub>X</sub></em>&nbsp;are a paired overbound of the random variable&nbsp;<em>X,</em>&nbsp;and we note&nbsp;<em>X</em>&nbsp;⊆&nbsp;[<em>L</em><em><sub>X</sub></em><em>, R</em><em><sub>X</sub></em>] if&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="43" src="https://insidegnss.com/wp-content/uploads/2026/03/65.png" alt="65" class="wp-image-196457" srcset="https://insidegnss.com/wp-content/uploads/2026/03/65.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/65-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/65-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/65-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/65-48x7.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p>The random variable&nbsp;<em>L</em><em><sub>X</sub></em>&nbsp;is said to be the left overbound and&nbsp;<em>R</em><em><sub>X</sub></em>&nbsp;is said to be the right overbound of the random variable&nbsp;<em>X.</em>&nbsp;<strong>Figure 2</strong>&nbsp;displays three representations of paired overbounding by two Gaussian distributions with standard deviation 0.7 and bias equals to -/+ 0.3, adopting the same conventions as in&nbsp;<strong>Figure 1.&nbsp;</strong></p>



<p><strong>Theorem 2a:</strong><strong>&nbsp;</strong>For independent random variables&nbsp;<em>X,Y,</em>&nbsp;if X&nbsp;⊆&nbsp;[<em>L</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] and Y&nbsp;⊆&nbsp;[<em>L</em><em><sub>Y</sub></em><em>,R</em><em><sub>Y</sub></em>] then&nbsp;<em>X</em>+<em>Y</em>&nbsp;⊆&nbsp;[<em>L</em><em><sub>X</sub></em>+<em>L</em><em><sub>Y</sub></em>,<em>R</em><em><sub>X</sub></em>+<em>R</em><em><sub>Y</sub></em>]. In other words, the pair overbounding concept is stable by convolution. A priori the random variables&nbsp;<em>X,Y</em>&nbsp;and their overbounding pair are arbitrary; no particular assumption is necessary to demonstrate stability by convolution, which is the strength of the concept.</p>



<h3 class="wp-block-heading" id="h-proof-0">Proof:</h3>



<p>We have, using the definition of the left-overbounding:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="32" src="https://insidegnss.com/wp-content/uploads/2026/03/66.png" alt="66" class="wp-image-196458" srcset="https://insidegnss.com/wp-content/uploads/2026/03/66.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/66-300x30.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/66-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/66-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/66-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>And so ∀<em>z</em> ε<img decoding="async" src="blob:https://insidegnss.com/88721d0a-5539-41d1-a36e-4e6f343230ab" alt="">,<em>F<sub>X+Y</sub></em>(z)≤<em>F<sub>X</sub></em><sub>+</sub><em><sub>LY</sub></em>(z). Repeating the same argument:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="39" src="https://insidegnss.com/wp-content/uploads/2026/03/68.png" alt="68" class="wp-image-196459" srcset="https://insidegnss.com/wp-content/uploads/2026/03/68.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/68-300x37.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/68-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/68-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/68-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Combining the two inequalities of <strong>Equations 25</strong> and <strong>26,</strong> we get: </p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/69.png" alt="69" class="wp-image-196460" srcset="https://insidegnss.com/wp-content/uploads/2026/03/69.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/69-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/69-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/69-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/69-48x3.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p>The proof of the inverse inequality is established in a similar way without difficulties.&nbsp;</p>



<p><strong>Theorem 2b:</strong>&nbsp;If&nbsp;<em>X</em>⊆[<em>L</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>], then for a positive real α we have α<em>X</em>⊆[α<em>L</em><em><sub>X</sub></em><em>,</em>α<em>R</em><em><sub>X</sub></em>]. However, for a negative real α, we have α<em>X</em>⊆[α<em>R</em><em><sub>X</sub></em><em>,</em>α<em>L</em><em><sub>X</sub></em>]. If we further require that the over-bounding pair is symmetric, meaning that&nbsp;<em>L</em><em><sub>X</sub></em>=<em>-R</em><em><sub>X</sub></em><em>,</em>&nbsp;we can write the result as follows: for all α, if&nbsp;<em>X</em>⊆[-<em>R</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>], then α<em>X</em>⊆[–|α|<em>R</em><em><sub>X</sub></em><em>,</em>|α|<em>R</em><em><sub>X</sub></em>].</p>



<h3 class="wp-block-heading" id="h-proof-1">Proof:</h3>



<p>We have for positive α:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="47" src="https://insidegnss.com/wp-content/uploads/2026/03/70.png" alt="70" class="wp-image-196461" srcset="https://insidegnss.com/wp-content/uploads/2026/03/70.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/70-300x44.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/70-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/70-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/70-48x7.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>On the other hand, for a negative α, we have:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="51" src="https://insidegnss.com/wp-content/uploads/2026/03/71.png" alt="71" class="wp-image-196462" srcset="https://insidegnss.com/wp-content/uploads/2026/03/71.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/71-300x48.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/71-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/71-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/71-48x8.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>These theorems show the stability of linear combinations is satisfied with any pair of overbounds (possibility asymmetric or multi-modal) but only with positive coefficients. Unfortunately, this property is not sufficient to guarantee the integrity transfer from range to positioning domain (because the geometry coefficients are signed). The following Theorem permits to guarantee the stability of any linear combinations (with positive or negative coefficients) by adding a condition on the pair of overbounds that is&nbsp;<em>L</em><em><sub>X</sub></em><em>=–R</em><em><sub>X</sub></em>.</p>



<p><strong>Theorem 2c:</strong>&nbsp;If&nbsp;<em>X</em>⊆[–<em>R</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] and&nbsp;<em>Y</em>⊆<br>[–<em>R</em><em><sub>Y</sub></em><em>,R</em><em><sub>Y</sub></em>] then&nbsp;∀(α,β)∈<img decoding="async" src="blob:https://insidegnss.com/8205c683-8adb-444d-b948-7e47a84707b8" alt=""><sup>2</sup>, α<em>X</em>+β<em>Y</em>⊆<br>[–|α|R<sub>X</sub>–|β|<em>R</em><em><sub>Y</sub></em>,|α|<em>R</em><em><sub>X</sub></em>+|β|<em>R</em><em><sub>Y</sub></em>]. If the distribution of each of the residual measurement errors is paired-overbounded by a symmetric pair, then the position errors are also paired-overbounded by a known pair. Under these conditions, integrity in the pseudorange domain imply integrity in the position domain.</p>



<p>This approach is useful for taking residual biases into acount. Consider a given line of sight and a contributor&nbsp;<em>X</em>&nbsp;to the residual errors on this line of sight. This contributor presents a residual bias for which a known bound is μ.</p>



<p>We construct a bounding of distribution&nbsp;<em>X</em>&nbsp;by two Normal laws with standard deviation σ, the left bound biased by -μ and the right bound biased by +μ, which form a symmetric pair:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/73.png" alt="73" class="wp-image-196463" srcset="https://insidegnss.com/wp-content/uploads/2026/03/73.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/73-300x89.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/73-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/73-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/73-48x14.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>If we collect all the lines of sight and each contributor to the measurement errors paired-overbounded, then the convolution property implies that the position error is also a paired-overbounded distribution with a variance and a bias given respectively by</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="416" height="114" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM.png" alt="Screen Shot 2026-03-03 at 7.39.04 PM" class="wp-image-196465" style="aspect-ratio:3.6493738819320214;width:208px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM.png 416w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM-300x82.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM-36x10.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM-48x13.png 48w" sizes="auto, (max-width: 416px) 100vw, 416px" /></figure>



<p>The limiting aspect is the search for left and right bounds can bring conservatism in practice, knowing these boundaries must frame the entire empirical distribution.</p>



<p><strong>Application to protection volumes:&nbsp;</strong>The pair overbounding&nbsp;<em>X</em>⊆[<em>L</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] allows us to put a lower bound on the probability to be in a certain interval: for any&nbsp;<em>a,b</em>&nbsp;with&nbsp;<em>a</em>&lt;<em>b,</em>&nbsp;we have:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/76.png" alt="76" class="wp-image-196466" srcset="https://insidegnss.com/wp-content/uploads/2026/03/76.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/76-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/76-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/76-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/76-48x3.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>In the case of an overbounding pair by two Gaussians of mean ±μ and variance σ<sup>2</sup>, we have for a symmetric protection level:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/77.png" alt="77" class="wp-image-196467" srcset="https://insidegnss.com/wp-content/uploads/2026/03/77.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/77-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/77-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/77-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/77-48x2.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>and so the integrity condition <em>P</em>(X∈<br>[-PL,PL])≥1-IR can be ensured for</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/78.png" alt="78" class="wp-image-196469" srcset="https://insidegnss.com/wp-content/uploads/2026/03/78.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/78-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/78-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/78-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/78-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>If in the total error </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="164" height="72" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM.png" alt="Screen Shot 2026-03-03 at 8.04.41 PM" class="wp-image-196470" style="width:77px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM.png 164w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM-36x16.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM-48x21.png 48w" sizes="auto, (max-width: 164px) 100vw, 164px" /></figure>



<p>&nbsp;each error component&nbsp;ε<em><sub>i</sub></em>&nbsp;is pair-overbounded by two Gaussian distribution with standard deviation σ<em><sub>i</sub></em>&nbsp;and mean ±μ, then by the stability by linear combinations, the total error&nbsp;<em>e</em>&nbsp;is pair-overbounded by two Gaussians of standard deviation σ=<img decoding="async" src="blob:https://insidegnss.com/4cb8a672-f895-4e88-a405-73455df8f175" alt="">&nbsp;and mean μ=<img decoding="async" src="blob:https://insidegnss.com/94256b07-88ce-4e65-916f-ec3dfd63c4f6" alt="">. Thus, the formula for the protection level is identical to the formula in the previous section, but with different hypothesis on the original distributions.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="378" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-1024x378.png" alt="Screenshot 2026-02-11 at 5.39.32 PM" class="wp-image-196525" style="width:563px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-1024x378.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-300x111.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-768x283.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-48x18.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-core-tail-overbounding">Core-Tail Overbounding </h3>



<p>In general, the empirical distribution of interest is obtained by collecting large volumes of data. This is sufficient to accurately represent the core of the distribution but there is always a point where the tail remains unknown because the collected samples are always finite. Therefore, how can we ensure the constructed overbounding distribution remains correct for the entire underlying distribution?</p>



<p>Furthermore, if the tail of the underlying distribution is known analytically or with good numerical precision, the overbounding theorems presented impose a condition on the entire distribution. When using Gaussian overbounds, which have very light tails, this can lead to excessive conservatism, for example to absorb some mass far in the tail, or can be mathematically impossible if the analytic expression of the underlying distribution falls slower than a Gaussian.</p>



<p>The strategy presented by [6] is a mean to deal with these two problems. It divides the cumulative distribution function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>&nbsp;of the overbound distribution into two parts: an explicit core and an implicit tail. The overbounding distribution is a mixture of both, and the value this function takes at a point is equal to the sum of the core cumulative distribution function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and the tail cumulative distribution function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,t</sub></em>, weighted by the probability&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;that the point is in the core or the tail:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/82.png" alt="82" class="wp-image-196471" srcset="https://insidegnss.com/wp-content/uploads/2026/03/82.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/82-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/82-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/82-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/82-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>The core distribution is explicit, meaning it can be expressed analytically and calculations performed. Most often, it is a Gaussian distribution. As for the tail, which poses the most problems, it is left completely arbitrary: We know it exists, but we do not wish to perform calculations with it. Instead, we will always consider the worst possible tail for the chosen application to constrain the maximum impact of the unknown tail.</p>



<p>This approach is valid for both CDF-overbounding and paired overbounding. The benefit of this decomposition is to be able to focus on the core overbound, while ensuring the unknown tail of X is defined such that&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>(<em>x</em>) (defined by&nbsp;<strong>Equation 34</strong>) is an overbound of&nbsp;<em>X,&nbsp;</em>with the following approach of&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,t</sub></em>&nbsp;as a pseudo CDF:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="40" src="https://insidegnss.com/wp-content/uploads/2026/03/83.png" alt="83" class="wp-image-196472" srcset="https://insidegnss.com/wp-content/uploads/2026/03/83.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/83-300x38.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/83-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/83-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/83-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Intuitively, inequality (24) means the worst tail for the CDF-overbounding is a probability weight of 1⁄2 localized at both infinities, whereas the worst tail for a left-overbound is to have all probability concentrated at minus infinity (plus infinity for the right overbound). Formally, the resulting overbounding function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>(<em>x</em>) is not a CDF (because its total weight is not 1) but as in the excess mass concept, all properties of the corresponding overbounding function remain unchanged.</p>



<p>In practice, a CDF-overbound in the core-tail overbounding concept consists of a (symmetric unimodal) function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and a tail weight&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;such that&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>=(1-<em>P</em><em><sub>t</sub></em>)&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>+<em>P</em><em><sub>t</sub></em>⁄2 (because for CDF-overbounding the tail CDF is always chosen as a constant of value 1⁄2) is a CDF-overbound of the distribution of interest X. In other words, we need&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;such&nbsp;<em>X</em><img decoding="async" src="blob:https://insidegnss.com/4978958a-89de-4ed8-8fd3-d7166b615504" alt=""><em>O</em><em><sub>X</sub></em><em>.</em>&nbsp;For pair-overbounding, the left and right bounds are split into core and tail. We need a left and right core overbounding distribution&nbsp;<em>F</em><em><sub>L</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and&nbsp;<em>F</em><em><sub>R</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and a tail weight&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;such that:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/85.png" alt="85" class="wp-image-196473" srcset="https://insidegnss.com/wp-content/uploads/2026/03/85.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/85-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/85-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/85-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/85-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Graphical representations of core-tail overbounding is illustrated with&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;equals to 5&#215;10<sup>-2</sup>&nbsp;in&nbsp;<strong>Figure 3</strong>&nbsp;for CDF-overbounding by a Gaussian with standard deviation 0.7, and&nbsp;<strong>Figure 4</strong>&nbsp;for paired overbounding by two Gaussian with biais +/- 0.3 and standard deviation 0.7. The green area represents the domain that satisfies the overbounding of&nbsp;<em>X</em>&nbsp;by&nbsp;<em>O</em><em><sub>X</sub></em><em>.</em></p>



<p>Note the core-tail overbounding is a weaker condition than the original overbounding condition, in the sense that any overbounding distribution (CDF or paired) can be seen as the core overbounding distribution with a tail weight&nbsp;<em>P</em><em><sub>t</sub></em>, whatever the value of&nbsp;<em>P</em><em><sub>t</sub></em>. The downside is the resulting protection volumes will be more conservative for larger tail weight, and can be undefined if the integrity risk is lower than the tail weight. This phenomenon allows for the following result as part of this new paradigm.</p>



<p><strong>Theorem 4:</strong>&nbsp;Let&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>&nbsp;be two random variables that admits a CDF-overbound (central or paired) that can be decomposed into a core part and a tail part with weight&nbsp;<em>P</em><em><sub>t,X</sub></em>&nbsp;and&nbsp;<em>P</em><em><sub>t,Y</sub></em>. Then the linear combination αX+βY admits a corresponding overbound with the core given by the theorem 1 or 2c, and with core weight (1-<em>P</em><em><sub>t,X</sub></em>)×(1-<em>P</em><em><sub>t,Y</sub></em>). Under these conditions, integrity in the pseudorange domain imply integrity in the position domain.</p>



<h3 class="wp-block-heading" id="h-proof-2">Proof:</h3>



<p>We will first consider the framework of the central CDF-overbound and the overbounding of&nbsp;<em>X</em>+<em>Y</em>. Theorem 1 (stability by convolution) gives us&nbsp;<em>X</em>+<em>Y</em>&nbsp;is overbounded by&nbsp;<em>O</em><em><sub>X</sub></em>+<em>O</em><em><sub>Y</sub></em>&nbsp;(the core-tail overbound remains a centered symmetric and unimodal distributions):</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/86.png" alt="86" class="wp-image-196474" srcset="https://insidegnss.com/wp-content/uploads/2026/03/86.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/86-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/86-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/86-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/86-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>We then inject into inequality (26) the decomposition of the overbounds of the random variables <em>X</em> and <em>Y</em> into core and tail.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="18" src="https://insidegnss.com/wp-content/uploads/2026/03/87.png" alt="87" class="wp-image-196475" srcset="https://insidegnss.com/wp-content/uploads/2026/03/87.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/87-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/87-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/87-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/87-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>By expanding expression (38), we get</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="31" src="https://insidegnss.com/wp-content/uploads/2026/03/88.png" alt="88" class="wp-image-196476" srcset="https://insidegnss.com/wp-content/uploads/2026/03/88.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/88-300x29.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/88-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/88-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/88-48x5.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>On the other hand, the cumulative distribution function of the overbound of the sum is decomposed into core and tail parts:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/89.png" alt="89" class="wp-image-196477" srcset="https://insidegnss.com/wp-content/uploads/2026/03/89.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/89-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/89-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/89-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/89-48x3.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p><br>By identification with&nbsp;<strong>Equations 38&nbsp;</strong>and&nbsp;<strong>39</strong>&nbsp;we find that:</p>



<p>1-<em>P</em><em><sub>O,t</sub></em>=(1-<em>P</em><em><sub>t,X</sub></em>)(1-<em>P</em><em><sub>t,Y</sub></em>), which gives the weight of the core,</p>



<p><em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>+<em>O</em><em><sub>Y,c</sub></em>=<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em><em><sub>,c</sub></em>, so the core of the sum is the convolution of the cores of each distribution,</p>



<p>The rest of the expression is considered as the tail and its explicit expression is not needed.</p>



<p>The last step is to prove by replacing the implicit tail part by the constant 1⁄2, we still have a CDF-overbounding of the sum. For&nbsp;<em>x</em>≤0, the three terms&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,t</sub></em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em><em><sub>,c</sub></em>(<em>x</em>),&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em><em><sub>,t</sub></em>&nbsp;(<em>x</em>),&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em>,t</em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em><em>,t</em>&nbsp;(<em>x</em>) are smaller than 1⁄2 because each one is a symmetric CDF. Thus, for negative&nbsp;<em>x,</em>&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em>(<em>x</em>)≤(1-<em>P</em><em><sub>O,t</sub></em>)×<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>+<em>O</em><em><sub>Y,c</sub></em>+<em>P</em><em><sub>O,</sub></em><em><sub>t</sub></em>⁄2. On the positive side, the equations are reversed, and we get a CDF-overbound of the sum by considering only the core part of the two distributions. We can replace the tail part by its generic value.</p>



<p>The multiplication by a scalar is treated as in Theorem 1 and does not change the weight of the core or tail.&nbsp;</p>



<p>In the pair overbounding case, the resulting pair is symmetric if the core overbounding pair is symmetric, so formula of theorem 2c holds as long as each individual overbounding pair has the same core and tail weights for the left and right overbounding pair. The proof is very similar to the CDF-overbounding case.</p>



<p>The core-tail overbounding concepts allows us to manipulate a weaker form of CDF or paired-overbounding. It is weaker because the inequalities are not required on the entire CDF but only on the core part. The properties of stability by linear combination of the CDF and paired-overbounding are maintained but at the price of a small “contamination” of the tail for each added term. For each addition, the tail weight grows. An upper bound on the weight of the tail can easily be derived as follows: In the case where all weights are equal with tail weight&nbsp;<em>P</em><em><sub>t</sub></em><em>,</em>&nbsp;we have&nbsp;<em>P</em><em><sub>O,</sub></em><em><sub>t</sub></em>=1-(1-P<sub>t</sub>&nbsp;)<sup>2</sup>&lt;2<em>P</em><em><sub>t</sub></em>, and by recurrence on n sources of errors, we have&nbsp;<em>P</em><em><sub>O,t</sub></em>&lt;<em>n</em><em>P</em><em><sub>t</sub></em>.</p>



<p><strong>Application to protection volumes: </strong>The protection volume formulas are identical to the CDF or paired-overbounding cases, with the replacement of the overbounding distribution by the core plus tail part. If we are working with Gaussian distributions, the properties of stability by linear combination allows us to use the same formulas by changing only the value of the <em>K</em>-factor, which now depends on the weight of the tail distribution. The compatible quantile <em>K</em> of a given integrity risk IR in the position domain is calculated by considering the CDF of the overbounding function and inverting it. The Gaussian K-factor changes for the CDF-overbound to:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="35" src="https://insidegnss.com/wp-content/uploads/2026/03/90.png" alt="90" class="wp-image-196478" srcset="https://insidegnss.com/wp-content/uploads/2026/03/90.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/90-300x33.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/90-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/90-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/90-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>For a protection volume to be calculable with the&nbsp;<em>K</em>-factor, it is necessary that IR-<em>P</em><em><sub>O,</sub></em><em><sub>t</sub></em>&gt;0 and thus that&nbsp;<em>P</em><em><sub>O,t</sub></em>&lt;IR. Otherwise, the knowledge of the core distribution is not sufficient to build a suitable protection volume and the protection level goes to infinity, and gives no information in practice.</p>



<p>For the paired CDF-overbound the&nbsp;<em>K</em>-factor changes to:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="33" src="https://insidegnss.com/wp-content/uploads/2026/03/91.png" alt="91" class="wp-image-196479" srcset="https://insidegnss.com/wp-content/uploads/2026/03/91.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/91-300x31.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/91-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/91-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/91-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Note the weight of the tail depends on the number of error contributors. If each error has an overbound tail weight&nbsp;<em>P</em><em><sub>t</sub></em>&lt;&lt;1, then the full error overbound has tail weight&nbsp;<em>n</em><em>P</em><em><sub>t</sub></em><em>.</em>&nbsp;This means the density of the tail distribution of each measurement error must be at least n times lower than the selected integrity risk for the position domain. In case this condition is not met, the protection volume is undefined (infinite) because the knowledge of the core distribution is not sufficient to guarantee a protection level at the given integrity risk.</p>



<p>If we have&nbsp;<em>P</em><em><sub>t</sub></em>&lt;&lt;<em>IR,</em>&nbsp;then we can use the usual K-factor formula (4).</p>



<p>The notion of core-tail overbounding is very important theoretically because it justifies the use of overbounding methods when the tail is not fully known, and it justifies the use of Gaussian overbounding even when the tail is heavier than a Gaussian. However, in practice, such conditions on&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;(<em>P</em><em><sub>t</sub></em>&lt;<em>I</em><em>R</em>⁄<em>n</em>&nbsp;or&nbsp;<em>P</em><em><sub>t</sub></em>&lt;&lt;<em>IR</em>) are challenging to verify because&nbsp;<em>IR</em>&nbsp;is already very low (usually about 10<sup>-7</sup>). This requires a fine knowledge of the error distribution to go far in the tail, which means a large experimental sample of values that is quite difficult to achieve. Thus, the core-tail overbounding technique is rarely used, and the assumption that the overbounding is valid up to infinity is often made.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="415" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-1024x415.png" alt="Screenshot 2026-02-11 at 5.39.45 PM" class="wp-image-196526" style="aspect-ratio:2.4675265066323955;width:587px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-1024x415.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-300x121.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-768x311.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-24x10.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-36x15.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-48x19.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-excess-mass-for-paired-overbounding">Excess Mass for Paired Overbounding </h3>



<p>In practice, constructing pairs of overbounds can artificially increase biases or variances on each of the overbounds to correctly bound the empirical distribution function. While this operation is often necessary, it inevitably leads to conservatism and larger protection levels than needed.</p>



<p>The left bounding distribution must have a heavier tail on the left (on the negative side) than the original error distribution, while at the same time have a lighter tail on the right. Because Gaussian distributions are often used for overbounding, this double condition is difficult to achieve and is often met at the price of very large biases. This specific problem with the pair overbounding technique can be partially resolved by the concept of excess mass overbounding [5] (excess mass CDF method), which considers a distribution mass greater than 1, typically 1+ ε where ε is referred as excess mass.</p>



<p>With such mass, the pseudo CDF is allowed to pass either beyond +1 or below -1. With this flexibility, we only need to ensure the properties of the overbound on one side of the empirical distribution, knowing the other side is no longer constrained. For Gaussian pair-overbounds, this adds a third degree of freedom to the variance and the bias.</p>



<p>Formally, we consider&nbsp;<em>f,</em>&nbsp;a pseudo-PDF that is positive and integrable, but we do not impose that its total probability weight is 1. Instead, we allow a total mass 1+ε larger than one&nbsp;<strong>(Equation 43).</strong></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="320" height="20" src="https://insidegnss.com/wp-content/uploads/2026/03/92.png" alt="92" class="wp-image-196480" srcset="https://insidegnss.com/wp-content/uploads/2026/03/92.png 320w, https://insidegnss.com/wp-content/uploads/2026/03/92-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/92-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/92-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/92-48x3.png 48w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>



<p>The associated left pseudo-CDF is defined as&nbsp;<em>F</em><em><sub>L</sub></em>(<em>x</em>)=(1+ε)×<em>F</em><em>~</em><em><sub>L</sub></em>(<em>x</em>), where&nbsp;<em>F</em><em>~</em><em><sub>L</sub></em>&nbsp;is a regular CDF with total weight equal to 1. This means&nbsp;<em>F</em><em><sub>L</sub></em>(<em>x</em>) tends to 0 as the variable&nbsp;<em>x</em>&nbsp;approaches negative infinity as a regular CDF, but tends to 1+ε as&nbsp;<em>x</em>&nbsp;approaches infinity, relaxing the overbounding constraint by the left overbounding on the right.</p>



<p>For the right overbound&nbsp;<em>F</em><em><sub>R</sub></em>(<em>x</em>), the excess mass is applied on the survival function: 1–<em>F</em><em><sub>R</sub></em>(<em>x</em>)=(1+ε)×(1–<em>F</em><em>~</em><em><sub>R</sub></em>(x)), where&nbsp;<em>F</em><em>~</em><em><sub>R</sub></em>(x) is a regular CDF, which leads to&nbsp;<em>F</em><em><sub>R</sub></em>(<em>x</em>)=(1+ε)×<em>F</em><em>~</em><em><sub>R</sub></em>(x)-ε. Consequently, the right pseudo-CDF goes to 1 as x approaches infinity like a regular CDF but tends to a negative value when x goes to negative infinity.</p>



<p>With this definition, the concept of pairs of overbounds can be expressed in the same terms and exhibits the same properties, particularly the stability under convolution (the proof can be reproduced identically as it uses only the positivity of the PDF), noting the mass of the sum of random variables is the product of the masses of each variable. Specifically, if the variables&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>&nbsp;have respectively masses 1+ε<em><sub>X</sub></em>&nbsp;and 1+ε<sub>Y</sub>, then the sum&nbsp;<em>X</em>+<em>Y</em>&nbsp;has a mass of (1+ε<em><sub>X</sub></em>)×(1+ε<em><sub>Y</sub></em>).&nbsp;</p>



<p><strong>Definition:</strong>&nbsp;<em>L</em><em><sub>X</sub></em>&nbsp;and&nbsp;<em>R</em><em><sub>X</sub></em>&nbsp;associated to the pseudo-PDF&nbsp;<em>f</em><em><sub>L</sub></em>&nbsp;and&nbsp;<em>f</em><em><sub>R</sub></em>&nbsp;define a paired overbound with excess mass ε of the random variable&nbsp;<em>X,</em>&nbsp;and we note&nbsp;<em>X</em>⊆[<em>L</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] if&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="45" src="https://insidegnss.com/wp-content/uploads/2026/03/93.png" alt="93" class="wp-image-196481" srcset="https://insidegnss.com/wp-content/uploads/2026/03/93.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/93-300x42.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/93-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/93-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/93-48x7.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>where&nbsp;<em>F</em><em><sub>L</sub></em>(<em>x</em>) and&nbsp;<em>F</em><em>~</em><em><sub>R</sub></em>(<em>x</em>) are regular CDF (with total probability weight equal to 1).</p>



<p><strong>Theorem 3:</strong>&nbsp;If&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>&nbsp;are paired-overbounded with excess mass by a symmetric pair then the linear combinations are also paired-overbounded by a known formula. If&nbsp;<em>X</em>⊆[–<em>R</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] and&nbsp;<em>Y</em>⊆[–<em>R</em><em><sub>Y</sub></em><em>,R</em><em><sub>Y</sub></em>] then&nbsp;∀(α,β)∈<img decoding="async" src="blob:https://insidegnss.com/2a0bfb77-84b2-4763-a510-fe197c617cde" alt=""><sup>2</sup>, α<em>X</em>+β<em>Y</em>&nbsp;⊆[–|α|<em>R</em><em><sub>X</sub></em>–|β|<em>R</em><em><sub>Y</sub></em><em>,</em>|α|<em>R</em><em><sub>X</sub></em>+|β|<em>R</em><em><sub>Y</sub></em>]. (Here&nbsp;<em>–</em><em>R</em><em><sub>X</sub></em>&nbsp;is defined as having the pseudo-PDF&nbsp;<em>f</em><em><sub>R</sub></em>(<em>-x</em>) and the sum and multiplication by a scalar are defined as for regular random variables). The total mass of the overbounding of the linear combination is (1+ε<em><sub>X</sub></em>)×(1+ε<em><sub>Y</sub></em>). Under these conditions, integrity in the pseudorange domain imply integrity in the position domain.</p>



<p>The proof is the same as the equivalent proof for paired-overbounding. With each addition, the total weight of the excess mass overbounding pair grows as it is the product of all masses involved.</p>



<p><strong>Figure 5</strong>&nbsp;illustrates paired overbounding with excess mass ε equals to 2.5×10<sup>&#8211;</sup><sup>2</sup>. The overbounds are two Gaussian with bias –/+ 0.3 and standard deviation 0.7 and the green area represents the domain that satisfies the overbounding of&nbsp;<em>X</em>&nbsp;by&nbsp;<em>L</em><em><sub>X</sub></em>&nbsp;on the left and&nbsp;<em>R</em><em><sub>X</sub></em>&nbsp;on the right. The QQ plot representation is not applicable to excess mass because the overbounds has total weight greater than 1. The allowed green zone is much larger with excess mass than in&nbsp;<strong>Figure 2,</strong>&nbsp;making the condition easier to verify.</p>



<p><strong>Application to protection volumes:</strong>&nbsp;In the case of overbounding by Gaussian pseudo–PDFs, all the convenient addition properties of the Gaussian-distributed vector are maintained. All the formulas derived for the protection volume build with pair-overbounding remain valid, with only a modification in the&nbsp;<em>K</em>-factor. Explicit calculations show the new expression of the&nbsp;<em>K</em>-factor is</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="486" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM.png" alt="Screen Shot 2026-03-03 at 8.15.11 PM" class="wp-image-196482" style="aspect-ratio:5.170305676855895;width:165px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM.png 486w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM-300x58.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM-24x5.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM-36x7.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM-48x9.png 48w" sizes="auto, (max-width: 486px) 100vw, 486px" /></figure>



<p>Because the complementary error function erfc is decreasing, we see&nbsp;<em>K</em>&nbsp;increases with ε. Thus, a larger excess mass makes it easier to pair-overbound the distribution, but leads to larger protection volumes.</p>



<p>When all the error sources&nbsp;<em>i</em>&nbsp;are paired-overbounded with excess mass by Gaussian distributions of standard deviation σ<em><sub>i</sub></em>, bias ±μ<em><sub>i</sub></em>&nbsp;and excess mass ε<em><sub>i</sub></em>,the calculation of the protection volume remains particularly simple. It is given by</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/96.png" alt="96" class="wp-image-196483" srcset="https://insidegnss.com/wp-content/uploads/2026/03/96.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/96-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/96-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/96-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/96-48x2.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>Where </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="264" height="86" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM.png" alt="Screen Shot 2026-03-03 at 8.17.05 PM" class="wp-image-196484" style="width:107px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM.png 264w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM-48x16.png 48w" sizes="auto, (max-width: 264px) 100vw, 264px" /></figure>



<p>ξ is the multiplicative factor defined by <strong>Equation 16</strong> and inflating <em>K</em>-factor defined by <strong>Equation 46.</strong></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="34" src="https://insidegnss.com/wp-content/uploads/2026/03/98.png" alt="98" class="wp-image-196485" srcset="https://insidegnss.com/wp-content/uploads/2026/03/98.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/98-300x32.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/98-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/98-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/98-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Note the excess mass, as proposed in [5] requires the true tail is Gaussian or lighter to the Gaussian, because the overbound must hold up to infinite. It is interesting to combine the excess mass with core-tail approaches. We propose to include the excess mass only on the core overbound. In this case, we have for each error contributor:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="18" src="https://insidegnss.com/wp-content/uploads/2026/03/99.png" alt="99" class="wp-image-196486" srcset="https://insidegnss.com/wp-content/uploads/2026/03/99.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/99-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/99-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/99-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/99-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>By projecting <strong>Equation 47</strong> in position domain, we get:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="43" src="https://insidegnss.com/wp-content/uploads/2026/03/100.png" alt="100" class="wp-image-196487" srcset="https://insidegnss.com/wp-content/uploads/2026/03/100.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/100-300x40.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/100-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/100-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/100-48x6.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p><strong>Equation 48</strong> can be arranged as:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="15" src="https://insidegnss.com/wp-content/uploads/2026/03/101.png" alt="101" class="wp-image-196488" srcset="https://insidegnss.com/wp-content/uploads/2026/03/101.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/101-300x14.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/101-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/101-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/101-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>By inverting the equation, we get, in <strong>Equation 50,</strong> the new formulation for <em>K</em>-factor:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="26" src="https://insidegnss.com/wp-content/uploads/2026/03/102.png" alt="102" class="wp-image-196489" srcset="https://insidegnss.com/wp-content/uploads/2026/03/102.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/102-300x25.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/102-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/102-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/102-48x4.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="990" height="1024" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-990x1024.png" alt="Screenshot 2026-02-11 at 5.39.55 PM" class="wp-image-196527" style="aspect-ratio:0.9668021436535625;width:432px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-990x1024.png 990w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-290x300.png 290w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-768x794.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-24x24.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-36x36.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-46x48.png 46w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM.png 1164w" sizes="auto, (max-width: 990px) 100vw, 990px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-two-steps-overbounding">Two Steps Overbounding </h3>



<p>The objective of the approach proposed in [7] is to mix the two concepts of central CDF-overbound and paired overbound. From the empirical distribution of an unmodelled residual error, the objective is to construct a weaker form of paired overbound by Gaussian distributions (the Gaussian distribution is chosen for computational simplicity).</p>



<p>We start by constructing an intermediate pair-overbound where each bound is unimodal and symmetrical around its mean, but not necessarily Gaussian. We know (Theorem 3) this paired overbound is stable by convolution. We impose the properties of symmetry and unimodality because they are part of the hypotheses of the CDF-overbound. The second step is to find a Gaussian distribution (necessarily symmetrical and unimodal around their mean) where CDF-overbounds the left and right distributions. The assumptions of the CDF-overbound are met and imply these pairs of Gaussians overbounds are stable by convolution.</p>



<p>The result of this method are the two Gaussian variables</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="114" height="66" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM.png" alt="Screen Shot 2026-03-03 at 8.21.03 PM" class="wp-image-196490" style="width:59px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM.png 114w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM-36x21.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM-48x28.png 48w" sizes="auto, (max-width: 114px) 100vw, 114px" /></figure>



<p>which have the following property:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="37" src="https://insidegnss.com/wp-content/uploads/2026/03/104.png" alt="104" class="wp-image-196491" srcset="https://insidegnss.com/wp-content/uploads/2026/03/104.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/104-300x35.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/104-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/104-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/104-48x6.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>The resulting properties of the two-step overbounding are weaker than those of the pair-overbounding, but they are sufficient to build a protection volume as follows:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="15" src="https://insidegnss.com/wp-content/uploads/2026/03/105.png" alt="105" class="wp-image-196492" srcset="https://insidegnss.com/wp-content/uploads/2026/03/105.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/105-300x14.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/105-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/105-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/105-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Where&nbsp;<em>K</em>&nbsp;is the usual factor computed with Gaussian distributions&nbsp;<strong>(Equation 4).</strong></p>



<p>This protection level is correct because of</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="27" src="https://insidegnss.com/wp-content/uploads/2026/03/106.png" alt="106" class="wp-image-196493" srcset="https://insidegnss.com/wp-content/uploads/2026/03/106.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/106-300x25.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/106-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/106-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/106-48x4.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>The goal is to build a Gaussian two-steps overbound defined by μ<em><sub>X</sub></em><em>,</em>&nbsp;σ<em><sub>X</sub></em>&nbsp;that is stable by linear combination, making it possible to perform the overbounding at range level and to build a protection volume at position level.</p>



<p><strong>Theorem 5:</strong>&nbsp;If μ<em><sub>X</sub></em>, σ<em><sub>X</sub></em>&nbsp;define a two-steps overbound of&nbsp;<em>X</em>&nbsp;and μ<em><sub>Y</sub></em>, σ<em><sub>Y</sub></em>&nbsp;define a two-steps overbound of&nbsp;<em>Y,</em>&nbsp;then the linear combination&nbsp;<em>Z</em>=α<em>X</em>+β<em>Y</em>&nbsp;can be two-steps overbounded by a pair of Gaussians with bias μ<em><sub>Z</sub></em>=|α| μ<em><sub>X</sub></em>+|β| μ<em><sub>Y</sub></em>&nbsp;and variance</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="304" height="102" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM.png" alt="Screen Shot 2026-03-03 at 8.24.18 PM" class="wp-image-196494" style="width:155px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM.png 304w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM-300x101.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM-48x16.png 48w" sizes="auto, (max-width: 304px) 100vw, 304px" /></figure>



<p>Under this condition, integrity in the pseudorange domain imply integrity in the position domain.</p>



<p><strong>Proof:</strong></p>



<p>The proof makes extensive use of previous results. Let us start with stability by convolution and consider&nbsp;<em>Z</em>=<em>X</em>+<em>Y</em>. Can we build a two-steps overbound of&nbsp;<em>Z</em>&nbsp;from the two-steps overbounds of&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>?</p>



<p>We know the intermediate paired overbounding is stable by convolution, and this step requires no particular assumption on the underlying distributions of&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="14" src="https://insidegnss.com/wp-content/uploads/2026/03/108.png" alt="108" class="wp-image-196495" srcset="https://insidegnss.com/wp-content/uploads/2026/03/108.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/108-300x13.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/108-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/108-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/108-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Then we use that the CDF-overbounding is stable by convolution. This is where the unimodality and symmetry around the median of the intermediate distributions is essential:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/109.png" alt="109" class="wp-image-196496" srcset="https://insidegnss.com/wp-content/uploads/2026/03/109.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/109-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/109-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/109-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/109-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Because the CDF-overbounds are Gaussian, we have&nbsp;<em>O</em><em><sub>L</sub></em><em><sub>X</sub></em>+<em>O</em><em><sub>L</sub></em><em><sub>Y</sub></em>~N(μ<em><sub>L</sub></em><em><sub>X</sub></em>+μ<em><sub>L</sub></em><em><sub>Y</sub></em>,&nbsp;σ<sup>2</sup><em><sub>L</sub></em><em><sub>X</sub></em>+σ<sup>2</sup><em><sub>L</sub></em><em><sub>Y</sub></em>) and similarly for&nbsp;<em>O</em><em><sub>R</sub></em><em><sub>X</sub></em>+<em>O</em><em><sub>R</sub></em><em><sub>Y</sub></em>.</p>



<p>Finally, μ<em><sub>Z</sub></em>=μ<em><sub>X</sub></em>+μ<em><sub>Y</sub></em>, we have μ<em><sub>Z</sub></em>≥ max (|μ<em><sub>L</sub></em><em><sub>X</sub></em>+μ<em><sub>L</sub></em><em><sub>Y</sub></em>|,|μ<em><sub>R</sub></em><em><sub>X</sub></em>+μ<em><sub>R</sub></em><em><sub>Y</sub></em>|) and also&nbsp;σ<sup>2</sup><em><sub>Z</sub></em>≥&nbsp;max(σ<sup>2</sup><em><sub>L</sub></em><em><sub>X</sub></em>+σ<sup>2</sup><em><sub>L</sub></em><em><sub>Y</sub></em>,&nbsp;σ<sup>2</sup><em><sub>R</sub></em><em><sub>X</sub></em>+σ<sup>2</sup><em><sub>R</sub></em><em><sub>Y</sub></em>). Because the tail probability for a Gaussian distribution is an increasing function of the standard deviation and the mean, the previous inequalities ensures the two Gaussian variables</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="144" height="100" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM.png" alt="Screen Shot 2026-03-03 at 8.27.03 PM" class="wp-image-196497" style="aspect-ratio:1.4402535657686213;width:62px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM.png 144w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM-24x17.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM-36x25.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM-48x33.png 48w" sizes="auto, (max-width: 144px) 100vw, 144px" /></figure>



<p>of mean ±μ<em><sub>Z</sub></em> and variance σ<sup>2</sup><em><sub>Z</sub></em> have the following property:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="47" src="https://insidegnss.com/wp-content/uploads/2026/03/111.png" alt="111" class="wp-image-196498" srcset="https://insidegnss.com/wp-content/uploads/2026/03/111.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/111-300x44.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/111-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/111-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/111-48x7.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>which is the essential property for the protection level to be correct.&nbsp;</p>



<p>Note these properties on the tails of the distributions are necessary for the protection level formula to be correct but are not in themselves sufficient for a two-steps overbound because they are not stable by convolution. The stability by addition comes from the intermediate paired-overbound constructed in the first step.</p>



<p>The multiplication by a scalar poses no additional difficulties: if&nbsp;<em>Z</em>=α<em>X</em>&nbsp;then&nbsp;<em>Z</em>&nbsp;⊆&nbsp;[α<em>L</em><em><sub>X</sub></em><em>,</em>α<em>R</em><em><sub>X</sub></em>] if α if positive (and&nbsp;<em>Z</em>&nbsp;⊆&nbsp;[α<em>R</em><em><sub>X</sub></em><em>,</em>α<em>L</em><em><sub>X</sub></em>] for the negative case). In both cases α<em>L</em><em><sub>X</sub></em><img decoding="async" src="blob:https://insidegnss.com/25f5140c-7551-4f53-9041-2f4cfa84db29" alt="">α<em>O</em><em><sub>L</sub></em><em><sub>X</sub></em>&nbsp;and α<em>R</em><em><sub>X</sub></em><img decoding="async" src="blob:https://insidegnss.com/25f5140c-7551-4f53-9041-2f4cfa84db29" alt="">α<em>O</em><em><sub>R</sub></em><em><sub>X</sub></em>&nbsp;because the considered distributions are unimodal and symmetric around their means. We have α<em>O</em><em><sub>L</sub></em><em><sub>X</sub></em>~N(αμ<em><sub>L</sub></em><em><sub>X</sub></em>,α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>L</sub></em><em><sub>X</sub></em>) and α<em>O</em><em><sub>R</sub></em><em><sub>X</sub></em>~N(αμ<em><sub>R</sub></em><em><sub>X</sub></em>, α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>R</sub></em><em><sub>X</sub></em>) and the choice μ<em><sub>Z</sub></em>=|α|μ<em><sub>X</sub></em>&nbsp;and σ<em><sub>Z</sub></em>=α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>X</sub></em>&nbsp;ensures μ<em><sub>Z</sub></em>≥max (|αμ<em><sub>L</sub></em><em><sub>X</sub></em>|,|αμ<em><sub>R</sub></em><em><sub>X</sub></em>|) and σ<sup>2</sup><em><sub>Z</sub></em>≥max (α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>L</sub></em><em><sub>X</sub></em>, α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>R</sub></em><em><sub>X</sub></em>).&nbsp;</p>



<p>The two-steps overbounding construction allows for the transfer of integrity from the measurement domain to the position domain without specific assumptions of symmetry, centering and unimodality of the empirical error distribution by transmitting only two Gaussian parameters per line-of-sight (namely μ<em><sub>X</sub></em>&nbsp;and σ<sup>2</sup><em><sub>X</sub></em>). This approach is less conservative than the paired overbound by two symmetric Gaussians because the needed property concerns only the left tail</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="764" height="104" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM.png" alt="Screen Shot 2026-03-03 at 8.29.41 PM" class="wp-image-196499" style="width:235px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM.png 764w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM-48x7.png 48w" sizes="auto, (max-width: 764px) 100vw, 764px" /></figure>



<p>The stability by linear combination is guaranteed by the existence of the intermediate symmetric and unimodal paired-overbound, but the explicit knowledge of the intermediate distribution is not needed for protection volume calculation.</p>



<p>The limiting aspect of the two steps overbounding method is the quality of the final overbound is very dependent on the construction of the first paired overbounds (first step). This step requires a complex optimization algorithm, with one such algorithm described in [7]. Another drawback of the method is it is difficult for a user with knowledge of the original error distribution and the parameters μ<em><sub>X</sub></em>&nbsp;and σ<sup>2</sup><em><sub>X</sub></em><em>&nbsp;</em>to verify the received parameters effectively form a correct two-steps overbounding of the error distribution without the information of the algorithm used in the first step.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="520" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-1024x520.png" alt="Screenshot 2026-02-11 at 5.40.02 PM" class="wp-image-196528" style="width:526px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-1024x520.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-300x152.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-768x390.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-24x12.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-36x18.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-48x24.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-wide-sense-cdf-overbounding">Wide Sense CDF-Overbounding </h3>



<p>The approach of Weak CDF-over-bounding is introduced in [11]. Similar to the two-step overbound concept, the approach aims at taking advantage of both the CDF-overbounding and pair-overbounding definitions: the simplicity of the first one and the robustness of the second. The main idea is to impose a condition equivalent to CDF-overbounding for biased distribution, but without the assumptions of symmetry and unimodality. When performing linear combinations, the stability of the protection volume formula is lost because of the dropped assumptions. However, it is possible to quantify and bound the worst deviations from the Gaussian distribution and encapsulate them in a suitable inflation factor in the protection volume formula to ensure integrity.</p>



<p>In more precise terms, let&nbsp;<em>X</em>&nbsp;be a distribution (typically the distribution of an error contributor in a GNSS pseudorange measurement) with median b. We do not require&nbsp;<em>X</em>&nbsp;to be unimodal nor symmetric around its median. A weak CDF-overbound is given by a pair of Gaussians with mean ±μ<em><sub>X</sub></em>&nbsp;and identical variance σ<sup>2</sup>&nbsp;such that μ<sub>X</sub>≥|b| and furthermore:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="43" src="https://insidegnss.com/wp-content/uploads/2026/03/116.png" alt="116" class="wp-image-196500" srcset="https://insidegnss.com/wp-content/uploads/2026/03/116.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/116-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/116-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/116-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/116-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>The condition is identical to the second step of the two-steps overbounding method, but without the first step guaranteeing the stability of the property under linear combinations. If our quantity of interest is given by</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="218" height="100" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM.png" alt="Screen Shot 2026-03-03 at 8.31.51 PM" class="wp-image-196501" style="width:105px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM.png 218w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM-36x17.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM-48x22.png 48w" sizes="auto, (max-width: 218px) 100vw, 218px" /></figure>



<p>where all <em>X<sub>i</sub></em> are individually weakly CDF-overbounded by Gaussian pairs of parameters μ<em><sub>i</sub></em> and σ<em><sub>i</sub></em> and <em>n</em> being the number of each error source, it is shown in [11] that the weak CDF-overbounding condition is sufficient to build a protection volume for <em>E.</em> The protection level formula is:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="48" src="https://insidegnss.com/wp-content/uploads/2026/03/118.png" alt="118" class="wp-image-196502" srcset="https://insidegnss.com/wp-content/uploads/2026/03/118.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/118-300x45.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/118-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/118-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/118-48x7.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>In this formula, <em>K</em> is the usual Gaussian <em>K</em>-factor (σ is the usual Gaussian standard deviation) where</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="266" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM.png" alt="Screen Shot 2026-03-03 at 8.33.34 PM" class="wp-image-196503" style="width:91px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM.png 266w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM-48x17.png 48w" sizes="auto, (max-width: 266px) 100vw, 266px" /></figure>



<p>and the new term&nbsp;<em>A</em><em><sub>n,K</sub></em>&nbsp;is an inflation factor that takes into account the weaker assumptions taken in the definition. It quantifies somehow the worst deviations from the Gaussian distribution if each term follows the weak CDF-overbound condition. The inflation factor&nbsp;<em>A</em><em><sub>n,K&nbsp;</sub></em>depends on the value of the&nbsp;<em>K</em>-factor (and the required integrity risk) but also on the number of terms in the linear combination. The factor&nbsp;<em>A</em><em><sub>n,K</sub></em>&nbsp;has no simple analytical formula, but a table of values can be pre-computed and used as such in a given context.</p>



<p>Note the parameter&nbsp;<em>n</em>&nbsp;is the number of independent error contributors and can be larger than the number of satellites in view if there are several error sources for each line-of-sight.</p>



<p>In this method, the properties of CDF-overbounding cannot be used directly because important assumptions on the unknown distribution are not met. However, the conditions of CDF-overbounding by a Gaussian are equivalent to a pair-overbound by two symmetric distributions, the left and right half-Gaussian. Furthermore, the properties of pair-overbounding do not use the assumptions of symmetry and unimodality. One can build a pair-overbound of the final error distribution as linear combinations of half-Gaussians. The last step is to build a pair-overbounding distribution for all coefficients in the linear combinations of half-Gaussians, such that the result is independent of the geometry of the problem. This allows conservative protection volumes to be built for a specific integrity risk. These protection levels are then divided by the usual&nbsp;<em>K</em>-factor and interpreted as an inflation factor&nbsp;<em>A</em><em><sub>n,K</sub></em>&nbsp;integrated in the protection volume formula. Note the factors presented in&nbsp;<strong>Table 1</strong>&nbsp;and [11] are upper-bounds and future improvements on the method may reduce the numerical values of the inflation factors and thus of the protection volumes.</p>



<p>The main advantage of weak CDF-overbounding is its simplicity. The condition to verify for weak CDF-overbounding is of the same complexity as usual CDF-overbounding, but fewer assumptions on the underlying distribution are needed. The user only needs to store a pre-computed table of values of inflation factors (computed for the required integrity risk) to use when computing its protection volume. On the other hand, weak CDF-overbounding can lead to large protection volumes if the number of contributors is large and the&nbsp;<em>K</em>-factor is low.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1336" height="1418" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM.png" alt="Screenshot 2026-02-11 at 5.40.22 PM" class="wp-image-196529" style="aspect-ratio:0.9423973635311853;width:720px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM.png 1336w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-283x300.png 283w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-965x1024.png 965w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-768x815.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-24x24.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-34x36.png 34w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-45x48.png 45w" sizes="auto, (max-width: 1336px) 100vw, 1336px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-conclusion">Conclusion </h3>



<p>This article shows the overbounding concepts that play a crucial role in demonstrating integrity are neither intuitive nor straightforward. However, the overbounding concepts using Gaussian overbounds are designed to keep the procedure as simple as possible. Indeed, the stability by linear combination of the overbounding properties and of the Gaussian distribution allows the user to manipulate the range errors as if they were Gaussian (by adding their standard deviations in quadrature) and apply the protection volume formula that mostly differ by the&nbsp;<em>K</em>-factor. From the integrity system point of view, the advantage is to focus on monitoring range error distribution and to send few parameters to the user, allowing for the construction of correct protection volumes.&nbsp;</p>



<p><strong>Table 2</strong>&nbsp;summarizes the main assumptions and implications of the different concepts applied to Gaussian overbounds.</p>



<p>Despite extensive work on the subject, several open points remain on overbounding.&nbsp;</p>



<p>First of all, all the studied concepts consider independence between all contributions to the positioning errors, and consequently between line of sights&nbsp;<strong>(Table 1).</strong>&nbsp;In practice, a correlation between the lines of sight could be caused by the troposphere residual errors, multipath or ODTS algorithm. [12] introduced a Power Spectral Density (PSD) overbounding concept that can guarantee integrity transfer of correlated Gaussian errors (with unknown and arbitrary correlation pattern), using a Gauss-Markov processes that overbound the PSD. To our knowledge, this concept is not used for single point positioning but is key for the integrity demonstration for Kalman filter. Generalization of this concept to non-Gaussian distributions will be a key step both for single point positioning and Kalman filtering.</p>



<p>Secondly, the concepts of overbounding presented are adapted to one dimensional quantities only. For example, the protection level formulas should be applied direction by direction for the positioning solution. A theory of overbounding multidimensional distributions is missing to, for example, build a protection volume for the norm of the horizontal positioning error. One difficulty of such a theory is the norm of a vector is not a linear combination of its components, and thus all the properties presented do not apply to this problem [13].&nbsp;</p>



<p>Last, the practical evaluation of overbounding remains a challenge because it involves estimating quantiles with low probability. This requires collecting and analyzing huge quantities of experimental data, which is costly, cumbersome and generally unrealistic. A promising alternative could be to extrapolate the tails of the distributions beyond the available data based on extreme value theory. </p>



<h3 class="wp-block-heading" id="h-appendix">Appendix</h3>



<p><strong>CDF OF THE SUM OF TWO INDEPENDENT RANDOM VARIABLES</strong></p>



<p>We start by formulating the expression for the CDF of the sum X+Y. By definition of the CDF, F_(X+Y) (z)=P(X+Y≤z). The probability P(X+Y≤z) is obtained by integrating the join density function f_(X,Y) (x,y) of the couple of random variables (X,Y) on the set of x,y respecting the inequality x+y≤z or equivalently y≤z-x. As the random variables X and Y are independent, the joint PDF is the product of the individual PDFs:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="67" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-1024x67.png" alt="Screen Shot 2026-03-03 at 8.46.56 PM" class="wp-image-196505" style="aspect-ratio:15.285754904748366;width:596px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-1024x67.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-768x50.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM.png 1354w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The PDF of the sum of the two independent variables X and Y is obtained by making, in Equation 59, the change of variable y=v-x, interchanging the order of integration, and derivating the CDF with respect to z:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="59" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-1024x59.png" alt="Screen Shot 2026-03-03 at 8.48.27 PM" class="wp-image-196506" style="aspect-ratio:17.358734258960283;width:608px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-1024x59.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-768x44.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM.png 1360w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Thus, the density f_(X+Y) appear as the classic convolution product Equation 61 of the densities, noted as f_(X+Y)=f_X*f_Y:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="84" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-1024x84.png" alt="Screen Shot 2026-03-03 at 8.49.50 PM" class="wp-image-196507" style="aspect-ratio:12.192273665585374;width:646px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-1024x84.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-300x24.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-768x63.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-48x4.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM.png 1396w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The CDF of the sum of the two variables X and Y is obtained by recognizing in Equation 59 the CDF of the random variable Y:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="76" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-1024x76.png" alt="Screen Shot 2026-03-03 at 8.51.02 PM" class="wp-image-196508" style="aspect-ratio:13.483822422874342;width:634px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-1024x76.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-300x22.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-768x57.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-48x4.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM.png 1402w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Injecting F_Y (z-x) given by Equation 62 in the expression of F_(X+Y) (z) in Equation 59, we then get:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="92" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-1024x92.png" alt="Screen Shot 2026-03-03 at 8.52.16 PM" class="wp-image-196509" style="width:623px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-1024x92.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-300x27.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-768x69.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-48x4.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM.png 1378w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>By making the integral of the joint density function respecting now the inequality x≤z-y in Equation 59, it comes:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="96" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-1024x96.png" alt="Screen Shot 2026-03-03 at 8.53.40 PM" class="wp-image-196510" style="width:683px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-1024x96.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-300x28.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-768x72.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-48x5.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM.png 1424w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Therefore, the CDF of the sum of the two variables X and Y is the convolution of the CDF of the one with the PDF on the other indifferently:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="57" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-1024x57.png" alt="Screen Shot 2026-03-03 at 8.54.52 PM" class="wp-image-196511" style="aspect-ratio:17.967914438502675;width:701px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-1024x57.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-768x43.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM.png 1402w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p><strong>SUM OF TWO SYMMETRIC UNIMODAL RANDOM VARIABLES</strong></p>



<p>In this section, we want to prove the following: if X and Y are two independent, symmetric and unimodal random variables, then their sum X+Y is also symmetric and unimodal [8].&nbsp;</p>



<p>Let f_X, f_Y, be the PDFs of X and Y and f_(X+Y)=f_X*f_Y the PDF of X+Y. Then f_(X+Y) is symmetric because, for all x∈R:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="79" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-1024x79.png" alt="Screen Shot 2026-03-03 at 8.56.28 PM" class="wp-image-196512" style="aspect-ratio:12.96358813600193;width:687px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-1024x79.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-300x23.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-768x60.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-48x4.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM.png 1366w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this manipulation, we have used the symmetry of f_X and f_Y and the change of variable t→-t.</p>



<p>Let us now fix two reals 0≤a≤b and prove that f_(X+Y) (a)≥f_(X+Y) (b). We have from the ordering of a and b that for all x, |x-a|≥|x-b| if x≥((a+b))⁄2 and |x-a|≤|x-b| if x≤((a+b))⁄2. From the unimodality and symmetry of Y, this implies that f_Y (x-a)≤f_Y (x-b) if x≥((a+b))⁄2 and the contrary if x≤((a+b))⁄2. Similarly, we have, for x≥((a+b))⁄2, |x|≥|x-a-b| and so f_X (x)≤f_X (x-a-b) and also, for x≤((a+b))⁄2, f_X (x)≥f_X (x-a-b).</p>



<p>This shows that for all x∈R, we have:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="63" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-1024x63.png" alt="Screen Shot 2026-03-03 at 8.57.40 PM" class="wp-image-196513" style="aspect-ratio:16.2564257635319;width:715px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-1024x63.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-300x18.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-768x47.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM.png 1428w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Because both terms are positive for x≤((a+b))⁄2, else both terms are negative.</p>



<p>Integrating the positive product defining by Equation 66 on x, and using the symmetry of f_X,f_Y we get:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="118" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-1024x118.png" alt="Screen Shot 2026-03-03 at 8.58.53 PM" class="wp-image-196514" style="width:729px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-1024x118.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-300x35.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-768x89.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-48x6.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM.png 1418w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>And using the symmetry of f_(X+Y), right side of inequation 67 becomes:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="52" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-1024x52.png" alt="Screen Shot 2026-03-03 at 8.59.55 PM" class="wp-image-196515" style="aspect-ratio:19.584699453551913;width:725px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-1024x52.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-768x39.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-48x2.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM.png 1410w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Thus f_(X+Y) is decreasing for positive x, which proves the unimodality of X+Y.</p>



<p><strong>A COUNTER EXAMPLE TO A NAÏVE APPROACH </strong></p>



<p>For a given integrity risk IR and associated Gaussian K-factor, it is tempting to check integrity at the pseudorange level by making sure that for all lines of sight:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="364" height="86" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM.png" alt="Screen Shot 2026-03-03 at 9.01.38 PM" class="wp-image-196516" style="width:224px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM.png 364w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM-300x71.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM-24x6.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM-36x9.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM-48x11.png 48w" sizes="auto, (max-width: 364px) 100vw, 364px" /></figure>



<p>However, the following example demonstrates this approach is not sufficient to guarantee the integrity at position level. The reason is this condition tests a certain quantile of the pseudorange error distribution, whereas the stability by linear combinations require criteria to be met across the entire distribution.</p>



<p>Let us use a numerical counterexample. We first take a geometry matrix (here corresponding to 7 GPS satellites above Toulouse&nbsp;&nbsp;on September 3, 2002, 0h00 in ENU frame)</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="892" height="280" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM.png" alt="Screen Shot 2026-03-03 at 9.03.30 PM" class="wp-image-196517" style="aspect-ratio:3.1857777777777776;width:519px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM.png 892w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-300x94.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-768x241.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-48x15.png 48w" sizes="auto, (max-width: 892px) 100vw, 892px" /></figure>



<p>Let us consider the case where all error variances on the pseudorange errors σ_i^2 are equal to 1. Then we build the S matrix as S=(G^T G)^(-1) G^T. The third line of S is</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="64" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-1024x64.png" alt="Screen Shot 2026-03-03 at 9.05.00 PM" class="wp-image-196518" style="width:528px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-1024x64.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-768x48.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM.png 1032w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The vertical protection volume VPL has radius given by Equation 69</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="57" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-1024x57.png" alt="Screen Shot 2026-03-03 at 9.06.35 PM" class="wp-image-196519" style="aspect-ratio:17.97993311036789;width:647px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-1024x57.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-768x43.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM.png 1402w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>with K_V=5.33 and σ_V=√(S_(3,i)^2 σ_i^2 )</p>



<p>If the vector of residual errors is</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="484" height="64" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM.png" alt="Screen Shot 2026-03-03 at 9.07.45 PM" class="wp-image-196520" style="width:310px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM.png 484w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM-300x40.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM-48x6.png 48w" sizes="auto, (max-width: 484px) 100vw, 484px" /></figure>



<p>then each line of sight passes the integrity test (meaning that ∀i,b_i&lt;K_V σ_i=5.33), but the vertical error is</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="54" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-1024x54.png" alt="Screen Shot 2026-03-03 at 9.09.01 PM" class="wp-image-196521" style="width:550px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-1024x54.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-768x41.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM.png 1394w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>which exceeds the protection level radius.</p>



<p>This counter-example does not question the principle of integrity transfers from pseudo distance to position, but the fact that it can be done by the sole definition of confidence intervals in the pseudo distance domain. To establish the equivalence between both realms, the property of overbounding must be verified across the entire distribution, at least up to the desired quantile.</p>



<p>Indeed, if the overbound is applicable for each line of sight, it is extremely improbable to obtain the vector&nbsp;<img loading="lazy" decoding="async" width="6" height="14" src="blob:https://insidegnss.com/4b4ea743-aa06-4ee8-bf84-af1959e74891">&nbsp;proposed in the example. In addition, if we only know the inequality is satisfied for each line of sight, we have no information about the probability of occurrence of the given vector&nbsp;<img loading="lazy" decoding="async" width="6" height="14" src="blob:https://insidegnss.com/4b4ea743-aa06-4ee8-bf84-af1959e74891">&nbsp;in the example, even though it leads to a lack of integrity in the domain of positions.</p>



<h3 class="wp-block-heading" id="h-references">References </h3>



<p>[1]&nbsp;Minimum operational performance standards for Global positioning system/ wide area augmentation system airborne equipment, DO-229, RTCA ed. Washington, DC.</p>



<p>[2] B. DeCleene, Defining pseudorange integrity &#8211; Overbounding, In Proc. 13th Int. Techn. Meeting Satellite Div. Inst. Navigat., Salt Lake City, UT, USA, Sep. 2000, pp. 1916–1924.</p>



<p>[3] J. Rife , S. Pullen, B. Pervan, and P. Enge, Paired Overbounding and Application to GPS Augmentation, Proceedings IEEE Position, Location and Navigation Symposium, pp. 439-446, July 2004.</p>



<p>[4] J. Rife, S. Pullen, B. Pervan, and P. Enge, Paired Overbounding for Nonideal LAAS and WAAS Error Distributions, IEEE Trans. Aerosp. Electron. Syst., vol. 42, no. 4, pp. 1386–1395, Oct. 2006.</p>



<p>[5] J. Rife, J. Blanch and T. Walter, Overbounding SBAS and GBAS Error Distributions with Excess-Mass Functions, in Proceedings of the GNSS 2004 Internat. Symp. On GNSS/GPS, Sydney, Australia,6-8, Dec. 2004.</p>



<p>[6] J. Rife, S. Pullen, B. Pervan, Core Overbounding and its Implications for LAAS Integrity, Proceedings of the 17th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2004), Long Beach, CA, Sept. 2004, pp. 2810-2821.</p>



<p>[7] J. Blanch, T. Walter and P. Enge, Gaussian Bounds of Sample Distributions for Integrity Analysis, IEEE Trans. Aerosp. Electron. Syst., vol. 55, no. 4, pp 1806-1815, Aug. 2019.</p>



<p>[8] M. Earnest,&nbsp;<a href="https://math.stackexchange.com/a/70659">link</a>.</p>



<p>[9]&nbsp;J. Antic, O. Maliet, and S. Trilles, &#8220;SBAS Protection Levels with Gauss-Markov K-Factors for Any Integrity Target&#8221;; NAVIGATION: Journal of the Institute of Navigation September 2023, 70 (3) navi.594</p>



<p>[10] K. Mimouni, O. Maliet, J. Antic,&nbsp;&#8220;A simple and robust K-factor computation for GNSS integrity needs&#8221;.&nbsp;ION plan, pp 399-407, 2023</p>



<p>[11] Maliet, O., Mimouni, K., Antic, J., &amp; Trilles, S. (2025). Wide-Sense CDF overbounding for GNSS integrity.&nbsp;NAVIGATION: Journal of the Institute of Navigation June 2025, 72 (2) navi.697;&nbsp;<a href="https://doi.org/10.33012/navi.697">link</a></p>



<p>[12] Langel, S., Crespillo, O. G., &amp; Joerger, M. (2020, April). “A new approach for modeling correlated Gaussian errors using frequency domain overbounding”. In 2020 IEEE/ION Position, Location and Navigation Symposium (PLANS) (pp. 868-876). IEEE.</p>



<p>[13] I. Nikiforov, “From pseudorange overbounding to integrity risk overbounding”, NAVIGATION, Vol 66, Issue 2, Summer 2019, pp 417-439.<strong></strong></p>



<p>[14] Z. W. Birnbaum, “On Random Variables with Comparable Peakedness”, The Annals of Mathematical Statistics, 19 (1), pp 76-81&nbsp;<a href="https://doi.org/10.1214/aoms/1177730293" target="_blank" rel="noreferrer noopener">doi:10.1214/aoms/1177730293</a><strong></strong></p>



<h3 class="wp-block-heading" id="h-authors">Authors</h3>



<p><strong>Julie Antic</strong>&nbsp;is a specialist in GNSS integrity algorithms and performances at Thales Alenia Space in Toulouse, France. She holds a Ph.D. in probability and Statistics from Paul Sabatier University, France, as well as an engineering degree in applied Mathematics from INSA in Toulouse, France. Her areas of activity include advanced GNSS augmentation systems for high accuracy and integrity, advanced receiver autonomous integrity monitoring and overbounding concepts.</p>



<p><strong>Odile Maliet</strong>&nbsp;graduated from École Polytechnique and received her Ph.D. degree in Macroevolution from École Normale Supérieure (ENS), Paris in 2018. Between 2018 and 2020, she worked as a postdoc on the use of Bayesian techniques on phylogenetics empirical data at ENS, Paris. Since 2021 she has worked on integrity concepts in Advanced Projects at the Performance and Processing Department of Navigation Domain, Thales Alenia Space.</p>



<p><strong>Kin Mimouni</strong>&nbsp;graduated from École Polytechnique, Paris, and received his Ph.D. in Theoretical Physics from École Polytechnique Fédérale de Lausanne (EPFL) in 2019. Since 2021 he has worked on GNSS algorithms and integrity concepts, first as a post-doc in the Télécommunications Spatiales et Aéronautiques (TéSA) laboratory in Toulouse, and since 2023 as an engineer in Advanced Projects at the Performance and Processing Department of Navigation Domain France, Thales Alenia Space.</p>



<p><strong>Sébastien Trilles</strong>&nbsp;is an expert in orbitography and integrity algorithms at Thales Alenia Space in Toulouse, France. He holds a Ph.D. in Pure Mathematics from the Paul Sabatier University and an advanced master’s degree in Space Technology from ISAE-Supaero. He heads the Performance and Processing Department where high precise algorithms are designed as orbit determination, clock synchronization, time transfer, reference time generation, integrity and ionosphere modeling algorithms for GNSS systems and augmentation.</p>
<p>The post <a href="https://insidegnss.com/overview-of-overbounding-techniques-for-integrity-purposes/">Working Papers: Overview of Overbounding Techniques for Integrity Purposes</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Spire GNSS-Reflectometry Data Enables Arctic-Wide Sea Ice Mapping</title>
		<link>https://insidegnss.com/spire-gnss-reflectometry-data-enables-arctic-wide-sea-ice-mapping/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 18:06:55 +0000</pubDate>
				<category><![CDATA[Environment]]></category>
		<category><![CDATA[Galileo]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196405</guid>

					<description><![CDATA[<p>ESA-supported research reinforces the complementary role of commercial satellite data alongside government missions. New research supported by the European Space Agency’s (ESA) Third...</p>
<p>The post <a href="https://insidegnss.com/spire-gnss-reflectometry-data-enables-arctic-wide-sea-ice-mapping/">Spire GNSS-Reflectometry Data Enables Arctic-Wide Sea Ice Mapping</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>ESA-supported research reinforces the complementary role of commercial satellite data alongside government missions</em>.</p>



<span id="more-196405"></span>



<p>New research supported by the European Space Agency’s (ESA) Third Party Missions programme has generated Arctic-wide sea ice freeboard maps using GNSS-Reflectometry (GNSS-R) data captured by Spire Global, Inc.’s GNSS-Reflectometry (GNSS-R) multipurpose listening constellation.</p>



<p>Led by the Technical University of Munich (DGFI-TUM) and the Norwegian Research Centre, the study leveraged Spire’s grazing-angle GNSS-Reflectometry (GNSS-R) — a radio frequency (RF) sensing technique that analyzes reflected navigation signals — to retrieve sea ice freeboard measurements across an entire winter season. The results show strong alignment with established altimetry datasets, including ESA’s CryoSat mission, validating the complementary role of commercial satellite data alongside government missions.</p>



<p>While GNSS signals have long been used for positioning, this research highlights how reflected signal analysis can extend their value into large-scale Earth observation applications, delivering persistent coverage independent of sunlight or weather conditions.</p>



<p>“Advances in miniaturization, digital signal processing, and machine learning have fundamentally changed what’s possible in RF sensing,” said Theresa Condor, Chief Executive Officer of Spire Global. “Commercial constellations can now deliver persistent, high-quality RF data that complements traditional government systems with greater flexibility and cost efficiency. As environmental monitoring requirements intensify, we’re seeing agencies increasingly integrate commercially sourced RF datasets into operational architectures, reflecting the continued maturation of this market and the growing role of commercial infrastructure in government missions.”</p>



<p>Read more on the research from ESA:&nbsp;<a rel="noreferrer noopener" href="https://cts.businesswire.com/ct/CT?id=smartlink&amp;url=https%3A%2F%2Fearth.esa.int%2Feogateway%2Fsuccess-story%2Freflected-satellite-signals-unlock-new-insights-into-arctic-sea-ice&amp;esheet=54436388&amp;newsitemid=20260303202469&amp;lan=en-US&amp;anchor=Reflected+satellite+signals+unlock+new+insights+into+Arctic+sea+ice&amp;index=2&amp;md5=0f9af5c5986c32c1b6a42871ef295282" target="_blank">Reflected satellite signals unlock new insights into Arctic sea ice</a></p>
<p>The post <a href="https://insidegnss.com/spire-gnss-reflectometry-data-enables-arctic-wide-sea-ice-mapping/">Spire GNSS-Reflectometry Data Enables Arctic-Wide Sea Ice Mapping</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GNSS Interference Complicates Navigation as Hormuz Shipping Disruption Deepens</title>
		<link>https://insidegnss.com/gnss-interference-complicates-navigation-as-hormuz-shipping-disruption-deepens/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 18:56:56 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Business News]]></category>
		<category><![CDATA[Galileo]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[Marine]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[SBAS and RNSS]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196401</guid>

					<description><![CDATA[<p>Reports of widespread GNSS interference in the Gulf and Strait of Hormuz region are coinciding with a sharp disruption in commercial shipping, turning...</p>
<p>The post <a href="https://insidegnss.com/gnss-interference-complicates-navigation-as-hormuz-shipping-disruption-deepens/">GNSS Interference Complicates Navigation as Hormuz Shipping Disruption Deepens</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Reports of widespread GNSS interference in the Gulf and Strait of Hormuz region are coinciding with a sharp disruption in commercial shipping, turning the area into a real-world test of how resilient maritime navigation and monitoring are when satellite positioning becomes unreliable.</p>



<span id="more-196401"></span>



<p>Over the last several days, maritime analytics providers have documented interference events affecting more than 1,000 ships in the Middle East Gulf, alongside a growing pattern of AIS anomalies and “dark” operations. At the same time, tanker and container traffic has slowed or stopped near the Strait of Hormuz, and leading war-risk insurers are withdrawing cover for the region.&nbsp;</p>



<p>The episode illustrates in practical terms what a contested RF environment means for ships that still rely heavily on satellite-derived position for navigation, tracking and compliance.</p>



<h3 class="wp-block-heading" id="h-interference-profile-gps-jamming-and-ais-spoofing-on-a-regional-scale">Interference profile: GPS jamming and AIS spoofing on a regional scale</h3>



<p>Maritime intelligence firm&nbsp;Windward&nbsp;reports that more than 1,100 vessels experienced GPS and AIS interference across the Middle East Gulf within a single 24-hour period following the outbreak of hostilities between Iran, the United States and Israel. Ships’ reported positions were displaced onto airports, inland locations in Iran and the Gulf states, and even over a nuclear power plant, producing track histories that are clearly inconsistent with physical reality.&nbsp;</p>



<p>A parallel assessment reported by <em>Wired</em>, based on analysis of satellite navigation attacks since the start of the air campaign against Iran, arrives at a similar figure of roughly 1,100 ships affected, underscoring that interference is not limited to a small subset of vessels or a single narrow area. </p>



<p>Dryad Global notes “heightened risk of GPS jamming and AIS spoofing” in the Gulf of Oman and Strait of Hormuz, explicitly linking recent anomalies to Iranian naval exercises and electronic warfare activity. </p>



<p>Taken together, the data suggests:</p>



<ul class="wp-block-list">
<li>GNSS-derived position can become systematically biased over wide areas, not only momentarily lost.</li>



<li>AIS tracks based on those positions may show vessels apparently transiting over land, clustered around inland targets, or moving in circular or jagged patterns that reflect repeated loss and reacquisition of signal.</li>



<li>Some operators respond by switching AIS off altogether, which protects them from misinterpretation of spoofed positions but reduces visibility for collision-avoidance and traffic management.</li>
</ul>



<p>From a PNT standpoint, this is a textbook case of how GNSS jamming and spoofing propagate through downstream systems that treat satellite position as authoritative.</p>



<h3 class="wp-block-heading" id="h-shipping-insurance-and-security-advisories">Shipping, insurance and security advisories</h3>



<p>The interference is occurring against the backdrop of a broader shipping disruption centered on the Strait of Hormuz.</p>



<p>Reuters reports that around 150 ships, including oil and LNG tankers, are currently stranded near the Strait of Hormuz, with at least five tankers damaged and crew casualties following drone and missile attacks. In the wake of US and Israeli strikes, Iran has announced that it is closing the strait, and many market participants now characterize conditions as a “de facto” closure of a route that normally carries about one-fifth of global oil exports and substantial volumes of gas.</p>



<p>In response to the increased risk:</p>



<ul class="wp-block-list">
<li>Major war-risk underwriters, including Gard, Skuld, NorthStandard, the American Club and others, are cancelling war-risk cover for ships operating in Gulf and Iranian waters from early March, with premiums for any residual cover rising sharply. </li>



<li>Container carriers such as Maersk and CMA CGM have begun rerouting or suspending services that would normally pass through Hormuz, adding to the reduction in commercial traffic through the area. </li>
</ul>



<p>On the governmental side, a recent advisory from the US Maritime Administration designates the Strait of Hormuz, Persian Gulf, Gulf of Oman and parts of the Arabian Sea as an area of active military operations and potential retaliatory strikes by Iranian forces. The advisory highlights the risk of hailing, boarding or detention of commercial vessels and directs operators to closely monitor updates and guidance from US Naval Forces Central Command.&nbsp;</p>



<p>Although these notices are primarily focused on kinetic threats, several security circulars from P&amp;I clubs and risk advisers now explicitly call out the likelihood of GPS interference and AIS anomalies in the region and recommend that ships treat GNSS-based position with caution when operating there.&nbsp;</p>



<h3 class="wp-block-heading" id="h-implications-for-pnt-resilience">Implications for PNT resilience</h3>



<p>The current pattern of events around Hormuz reinforces several points that have been discussed in standards bodies and industry forums for some time:</p>



<ul class="wp-block-list">
<li>GNSS reliability is not uniform. In certain strategic waterways, including parts of the Gulf and Strait of Hormuz, interference can reach a level where satellite-based positioning should be treated as advisory rather than authoritative. </li>



<li>Spoofed or displaced positions can have regulatory and commercial consequences, not just navigational ones, when automated compliance systems interpret false AIS tracks as evidence of port calls or territorial incursions. </li>



<li>“Going dark” on AIS reduces exposure to mis-located tracks but increases dependence on radar and visual watchkeeping, especially in confined waters.</li>
</ul>



<p>For PNT system designers and policy-makers, the current situation underscores the value of alternative and complementary positioning sources, whether that means terrestrial systems, inertial aids, or hardened multi-constellation receivers, and the need to assume that in some regions, GNSS degradation will not be an exception but a recurring operating condition.</p>



<p>In that sense, the developments around Hormuz are less an isolated crisis than another data point in an evolving pattern: satellite navigation has become a routine instrument in regional competition, and maritime navigation practices are having to adjust accordingly.</p>
<p>The post <a href="https://insidegnss.com/gnss-interference-complicates-navigation-as-hormuz-shipping-disruption-deepens/">GNSS Interference Complicates Navigation as Hormuz Shipping Disruption Deepens</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Shared Recognition for the Inside GNSS Community</title>
		<link>https://insidegnss.com/inside-gnss-named-2026-neal-awards-finalist-in-two-categories/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 06:04:17 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Business News]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196391</guid>

					<description><![CDATA[<p>Inside GNSS&#160;has been named a finalist for&#160;two Jesse H. Neal Awards, recognizing two complementary editorial efforts focused on assured positioning, navigation, and timing...</p>
<p>The post <a href="https://insidegnss.com/inside-gnss-named-2026-neal-awards-finalist-in-two-categories/">A Shared Recognition for the Inside GNSS Community</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>Inside GNSS&nbsp;has been named a finalist for&nbsp;two Jesse H. Neal Awards, recognizing two complementary editorial efforts focused on assured positioning, navigation, and timing (PNT).</em></p>



<span id="more-196391"></span>



<p>The honors include:</p>



<ul class="wp-block-list">
<li><strong>Best Industry Coverage</strong> for the <em><a href="https://lsc-pagepro.mydigitalpublication.com/publication/?i=857643&amp;p=1&amp;view=issueViewer">PNT Leadership Summit</a></em> issue and proceedings</li>



<li><strong>Best Subject-Related Package</strong> for <em><a href="https://lsc-pagepro.mydigitalpublication.com/publication/?i=851733">Assured PNT: A National Imperative</a></em></li>
</ul>



<p>Together, these recognitions acknowledge sustained, technically grounded work addressing PNT resilience as both an engineering challenge and a national infrastructure priority—examining threats, architectures, governance, and operational accountability across civil, commercial, and defense domains.</p>



<p>Established in&nbsp;1955, the&nbsp;Jesse H. Neal Awards&nbsp;are widely regarded as the Pulitzer Prizes of the B2B media industry, honoring journalism that serves professional communities with rigor and clarity.</p>



<p>This acknowledgment belongs to the&nbsp;Inside GNSS community. We thank our contributors, advisors, and readers whose expertise, candor, and engagement made this work possible.</p>



<p></p>
<p>The post <a href="https://insidegnss.com/inside-gnss-named-2026-neal-awards-finalist-in-two-categories/">A Shared Recognition for the Inside GNSS Community</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CGI, Vantor Team on AI Spatial Intelligence for GNSS-Denied Operations</title>
		<link>https://insidegnss.com/cgi-vantor-team-on-ai-spatial-intelligence-for-gnss-denied-operations/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 19:10:56 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Business News]]></category>
		<category><![CDATA[Galileo]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[New Builds]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196379</guid>

					<description><![CDATA[<p>CGI&#160;has formed a new alliance with&#160;Vantor&#160;to develop AI-enabled spatial intelligence and situational awareness tools for operations where GNSS is denied, degraded or contested....</p>
<p>The post <a href="https://insidegnss.com/cgi-vantor-team-on-ai-spatial-intelligence-for-gnss-denied-operations/">CGI, Vantor Team on AI Spatial Intelligence for GNSS-Denied Operations</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>CGI&nbsp;has formed a new alliance with&nbsp;Vantor&nbsp;to develop AI-enabled spatial intelligence and situational awareness tools for operations where GNSS is denied, degraded or contested.</p>



<span id="more-196379"></span>



<p>The collaboration aims to fuse satellite imagery, real-time sensor feeds and onboard computer vision into navigation and targeting solutions that remain reliable when GPS and other GNSS signals are unavailable.&nbsp;</p>



<p>Under a Letter of Intent, the companies plan to integrate CGI’s AI, edge computing and visual analytics platforms with Vantor’s Tensorglobe spatial intelligence environment and Raptor visual navigation software. Tensorglobe is Vantor’s AI-powered spatial intelligence platform that unifies data from satellites, drones and ground sensors into what the company describes as a “living 3D replica of Earth.” Raptor is a vision-based positioning suite that uses onboard cameras and 3D terrain data to estimate aerial position and extract ground coordinates in real time, reducing dependence on GNSS for unmanned systems and other platforms.&nbsp;</p>



<h3 class="wp-block-heading" id="h-fusing-visual-navigation-and-spatial-intelligence">Fusing Visual Navigation and Spatial Intelligence</h3>



<p>According to the joint announcement, CGI will bring its Machine Vision and SignalSense technologies, along with secure access to satellite data and space-based sensing, while Vantor contributes Tensorglobe’s data fusion and Raptor’s GNSS-resilient navigation capabilities. The goal is to deliver integrated products that provide precise location data, real-time analytics and operational navigation in GNSS-denied or signal-degraded areas, supporting faster decision-making in complex environments.&nbsp;</p>



<p>On the navigation side, integrating Raptor into the joint offering is intended to help users maintain accurate positioning and coordinate generation when GNSS is jammed, spoofed or unavailable—using visual matching against high-resolution 3D terrain models instead of satellite ranging alone. On the intelligence side, Tensorglobe’s ability to orchestrate multi-constellation satellite imagery, airborne ISR and ground sensors into a common operating picture is expected to feed CGI’s AI analytics, supporting mission planning, dynamic monitoring and threat detection.&nbsp;</p>



<p>CGI and Vantor say they will initially target defense, national security and civil government customers in the UK, Europe and allied markets that need AI-enabled edge computing and space-based situational awareness for operations with poor or zero GNSS coverage. The companies also frame the alliance as a way to deliver interoperable and sovereign solutions, aligning with European and allied priorities around resilient PNT, sovereign data handling and reduced dependence on single-source infrastructure.&nbsp;</p>



<p>For GNSS users and system integrators, the partnership fits into a broader trend: using spatial intelligence, visual positioning and alternative signals to harden PNT architectures against jamming, spoofing and outages, while feeding richer context into command-and-control and autonomy stacks rather than treating navigation and ISR as separate problems.</p>
<p>The post <a href="https://insidegnss.com/cgi-vantor-team-on-ai-spatial-intelligence-for-gnss-denied-operations/">CGI, Vantor Team on AI Spatial Intelligence for GNSS-Denied Operations</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Linking GNSS Data to UTC</title>
		<link>https://insidegnss.com/linking-gnss-data-to-utc/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 18:52:26 +0000</pubDate>
				<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[timing]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196371</guid>

					<description><![CDATA[<p>The methods used to establish traceability of the timing data processed by a GNSS receiver to Coordinated Universal Time (UTC), and the role...</p>
<p>The post <a href="https://insidegnss.com/linking-gnss-data-to-utc/">Linking GNSS Data to UTC</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>The methods used to establish traceability of the timing data processed by a GNSS receiver to Coordinated Universal Time (UTC), and the role calibrating the delay in the user’s receiving and processing equipment plays in realizing this traceability.</em></p>



<span id="more-196371"></span>



<p><strong>JUDAH LEVINE</strong>, UNIVERSITY OF COLORADO, <strong>PASCALE DEFRAIGNE</strong>, ROYAL OBSERVATORY OF BELGIUM, <strong>ILARIA SESIA</strong>, ITALIAN METROLOGY INSTITUTE, <strong>GIULIO TAGLIAFERRO</strong>, INTERNATIONAL BUREAU OF WEIGHTS AND MEASURES, <strong>MICHAEL WOUTERS, </strong>NATIONAL MEASUREMENT INSTITUTE</p>



<p>Coordinated Universal Time (UTC) has been recommended as the unique time scale for international reference time stamps and is the basis for civil time in most countries [1]. Time zones, which are established by local administrations, are defined by an offset from UTC. Some applications are required to use time stamps based on UTC either by regulation or by statute [2-4]. There are advantages to the use of time stamps based on UTC, even when it is not required to do so, because this facilitates combining data from multiple sources or when international coordination is important.</p>



<p>Time signals from global navigation satellite systems (GNSS) are widely used as the reference time in many applications, and it is important to understand the requirements that ensure GNSS time stamps are traceable to UTC from both a technical and a regulatory perspective [5]. This article describes how UTC is defined and realized and how a prediction of UTC is included in GNSS data transmissions.</p>



<h3 class="wp-block-heading" id="h-the-definition-and-realization-of-utc-nbsp">The Definition and Realization of UTC&nbsp;</h3>



<p>The UTC time scale is a paper time scale that has no physical realization. It is computed monthly by the International Bureau of Weights and Measures (BIPM) based on data from several hundred atomic clocks located at National Metrology Institutes (NMIs) and other time centers in various countries. Many laboratories operate local ensembles of atomic clocks and use the data from these ensembles to compute and disseminate a local UTC estimate. This local estimate is identified as UTC(k), where k is the acronym for the laboratory. The estimate of UTC computed by the U.S. Naval Observatory (USNO) is UTC(USNO) and the estimate computed by the National Institute of Standards and Technology (NIST) is UTC(NIST).&nbsp;</p>



<p>The computation of UTC for any month is published in BIPM Circular T by the tenth day of the following month [6]. This circular tabulates UTC-UTC(k) every five days for every participating laboratory. A rapid version of UTC, called UTCr [7], is also published by the BIPM every Wednesday. It lists daily values of UTCr-UTC(lab) through the previous Sunday. These data are published on the BIPM website and are distributed by email&nbsp;<strong>(Figures 1 and 2).&nbsp;</strong></p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1164" height="924" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM.png" alt="Screenshot 2026-02-11 at 5.43.07 PM" class="wp-image-196372" style="aspect-ratio:1.2597539543057996;width:518px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM.png 1164w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-300x238.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-1024x813.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-768x610.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-24x19.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-36x29.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-48x38.png 48w" sizes="auto, (max-width: 1164px) 100vw, 1164px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-gnss-time-signals">GNSS Time Signals</h3>



<p>The system time of a GNSS constellation, GNSS_T, is generated by the ground segment from an ensemble of clocks located on the ground at the control center and tracking stations. It also can include the clocks in the satellites [8-11]. Each satellite in a constellation transmits a prediction of the offset between the time of the clock on the satellite and the system time of the constellation, which is uploaded to the satellites periodically. GNSS constellations also broadcast bUTC_GNSS, a prediction of the difference between GNSS_T and UTC (including a 3-hour offset for the GLONASS system) that is derived from the UTC prediction of timing laboratories. This prediction is transmitted in two parameters: an integer giving number of whole seconds difference between UTC and the GNSS system time, and a fractional part, which specifies the difference modulo 1 s. The first parameter changes only when a leap second is inserted into UTC and not at other times. (The GLONASS constellation uses UTC as the system time so only the fraction is transmitted in the navigation message.)</p>



<p>For the GPS constellation, this prediction is derived from UTC(USNO) maintained at the U.S. Naval Observatory. The GLONASS constellation broadcasts a prediction based on UTC(SU), which is realized at the Russian Metrology Institute of Technical Physics and Radio Engineering (FSUE, VNIFTRI). The Galileo constellation uses a prediction derived from a collaboration of five European National Metrology Institutes. The BeiDou system uses UTC(NTSC) realized at the National Time Service center of China and UTC(NIM) realized at the China National Institute of Metrology. Regional systems also broadcast similar messages. The formats of the respective messages are GNSS-specific and are documented in the respective Interface Control Documents.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="916" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM.png" alt="Screenshot 2026-02-11 at 5.43.13 PM" class="wp-image-196373" style="aspect-ratio:1.2751120703968122;width:539px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-300x235.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-1024x803.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-768x602.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-24x19.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-36x28.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-48x38.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-the-role-of-the-bipm">The Role of the BIPM</h3>



<p>In addition to computing UTC and publishing the differences of UTC-UTC(k), the BIPM evaluates the difference between UTC and the predictions of UTC broadcast by the various GNSS constellations, bUTC_GNSS. These differences are published in Section 4 of BIPM circular T [6]. This section lists the difference in ns between UTC computed by the BIPM and the prediction of UTC transmitted by the GPS, GLONASS, Galileo and BeiDou satellites for every day in the monthly reporting period for that issue of Circular T.&nbsp;<strong>Table 1&nbsp;</strong>shows the values from the August 2025 editor of Circular T interpolated from the five-day reporting interval in Circular T to a daily value at 0 UTC [12].&nbsp;</p>



<h3 class="wp-block-heading" id="h-linking-user-equipment-to-utc">Linking User Equipment to UTC</h3>



<p>There are two common configurations that support a link between the user’s time reference and UTC(k) or UTC. In the first configuration, the user has a clock (or an ensemble of clocks) that provides the reference signal for a GNSS timing receiver. The receiver does not discipline the free-running local clock (or ensemble) in the short term, but measures its time with respect to the signal broadcast by the satellites of some constellation. These data are combined with the data in the navigation message to (1) correct for the transit time between the satellite and the receiver, (2) include the offset between the satellite clock and the GNSS system time, and (3) add the prediction of the offset between the system time and UTC.&nbsp;</p>



<p>Most receivers can be configured to implement these calculations in firmware, and the output data gives the difference between the local reference and the broadcast prediction of UTC. The signal from this clock (or clock ensemble) can be used in the user’s application or the application’s clock can be compared to it. The system connected to the GNSS receiver may be completely free-running and not disciplined by the GNSS data; its offset is recorded and used to adjust the downstream data. In some configurations, the time or frequency of the local reference clock is adjusted from time to time so the measured time difference is kept within some administratively defined tolerance. The interval between adjustments depends on this tolerance and on the frequency stability of the local reference, and it can range from minutes for a rubidium-based reference to hours or days for a cesium-based device.&nbsp;</p>



<p>The second configuration, which is much more common, combines a GNSS receiver and an oscillator in a single device. There are many commercial systems that realize this configuration and often provide several outputs (5 MHz, 10 MHz and 1 pps) that are disciplined by the data received from the GNSS constellation. The simpler systems use the code data transmitted on the L1 frequency, but dual-frequency receivers and more sophisticated carrier-phase analyses are possible. The first GNSS disciplined oscillators usually used signals from the GPS constellation, but newer systems can track satellites from more than one constellation simultaneously. The output signal might be based on only the satellites from one constellation at any time or on a combination of the data received from multiple constellations. Either solution can produce significant steps in the output signals, especially in the PPS data, when the reference constellation changes. The details of the disciplining algorithm are often proprietary; the output could be disciplined to GNSS system time or to the prediction of UTC, and traceability to UTC would require the additional adjustment that incorporated the data published in BIPM Circular T. This additional adjustment, based on data from Circular T, may be small enough to ignore in some applications.&nbsp;</p>



<p>The first configuration is more flexible; the measurement process can accept data from multiple sources, including common-view data, and implement more sophisticated post-processing methods. The adjustment process for the local reference clock can be adjusted to meet the requirements of the user’s application. The second configuration, on the other hand, may provide adequate performance in many applications. It is much simpler to operate, and this simplicity may be the deciding factor for many users.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="874" height="1294" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM.png" alt="Screenshot 2026-02-11 at 5.43.28 PM" class="wp-image-196374" style="aspect-ratio:0.67542779606503;width:575px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM.png 874w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-203x300.png 203w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-692x1024.png 692w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-768x1137.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-16x24.png 16w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-24x36.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-32x48.png 32w" sizes="auto, (max-width: 874px) 100vw, 874px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-combining-data-from-multiple-constellations"><span style="font-size: revert;">Combining Data from Multiple Constellations</span></h3>



<p>Combining GNSS signals from multiple constellations can significantly improve the timing performance of a user’s receiver, especially in locations with limited visibility of the sky. This approach requires a knowledge of the offsets between different GNSS time scales, which are at the level of a few ns and vary in time. It is possible for a user to solve for the inter-system bias between constellations [13] if enough satellites from both constellations are visible at the same time, but this is not always the case, and the broadcast values must be used [14]. The broadcast of the predicted time difference between each GNSS system time and UTC greatly simplifies the job of combining signals from multiple constellations when only broadcast data are available. The use of UTC as the common reference time scale eliminates the need for maintaining multiple inter-system bias values.</p>



<h3 class="wp-block-heading" id="h-metrological-traceability">Metrological Traceability</h3>



<p>The International Vocabulary of Metrology (VIM) defines traceability as the “property of a measurement result whereby the result can be related to a reference through a documented unbroken chain of calibrations, each contributing to the measurement uncertainty” [15]. The International Telecommunications Union (ITU) [16] and the International Laboratory Accreditation Conference adopted the same definition and refer to the International Organization for Standardization (ISO/IEC) standard 17025 [17].</p>



<p>The signals transmitted by the GNSS constellations can be traceable to UTC. The broadcast signals are linked to UTC through the UTC(k) data of a timing laboratory, and the transmissions are monitored by the BIPM with results published in Circular T. A user can also establish a common-view relationship with a timing laboratory, which can provide a near-real-time estimate of the offset of the user’s timing system with respect to the UTC(k) of that laboratory. In either case, these data are processed by the receiving system at the user’s site, and the calibration and statistical characteristics of this system directly affect the accuracy and stability of the timing data that control the user’s application.&nbsp;</p>



<h3 class="wp-block-heading" id="h-timing-receiver-calibration">Timing Receiver Calibration</h3>



<p>The calibration of the user’s equipment that is required to complete the demonstration of traceability should be performed by a method validated by a National Metrology Institute or a Designated Institute that participates in the Mutual Recognition Agreements (MRA) and have their Calibration and Measurement Capabilities (CMC) published in the Key Comparison Database maintained by the BIPM [18]. The Key Comparison Database maintains the equivalency between different organizations and guarantees the international acceptance of calibrations performed by different agencies that participate in the MRA.</p>



<p>The manufacturer’s published specifications can be the basis for specifying the performance of a stand-alone GNSS receiver or a GNSS receiver and disciplined oscillator combination. These specifications should be based on a calibration of one example of a particular model with some allowance for the variation among devices of the same type. For applications that require only modest accuracy (not greater than about 1 µs) a statement by the manufacturer that the device has been type-approved to that level is sufficient. The transmission delay even through a very long antenna cable is unlikely to invalidate this assumption.</p>



<p>The use of “type approval” may not be adequate for applications that require sub-microsecond accuracy. One method of calibrating a receiving system is to compare the output of the system to a source of UTC(k) by using a time-interval counter to monitor the difference. This method depends on an independent source of UTC(k), which might be provided by a traveling calibrated receiver, by transporting a running clock from the UTC(k) source to the location of the receiver, or by operating the device to be calibrated at a laboratory where a source of UTC(k) is available.&nbsp;</p>



<p>Using a traveling receiver is the best choice because it tests the receiving hardware with the antenna and cables in the environment where it will be used. The BIPM uses this option to calibrate the time-transfer equipment at timing laboratories. Although the traveling receiver is calibrated, it is operated at a location where its position may not be known accurately, and where it may be influenced by multipath effects that are not the same as the effects on the device under test. These considerations are usually not important unless the required accuracy must be better than about 50 ns.</p>



<p>A calibration based on carrying a running clock from the source of UTC(k) to the location of the user’s equipment is feasible if the distance is not too great and the required calibration accuracy is not too high. For example, the GPS receivers at the NIST radio station in Fort Collins, Colorado, are calibrated by carrying a rubidium oscillator from the source of UTC(NIST) in Boulder to Fort Collins, a distance of about 100 km by road. The calibration is repeated by carrying a calibrated GPS receiver between the two locations. The accuracy of either method is estimated to be about 15 ns, and the two methods agree within this uncertainty.</p>



<p>Transporting the device under test to a location where an independent source of UTC(k) is available is usually the most difficult solution. It may be impractical to disconnect the antenna cable at the site, so a different cable must be used for the calibration. The delay through the actual cable can be estimated with a time domain reflectometer, but this method tests the cable with signals that are not the same as signals from real satellites. The impedances at the end-points are also different.&nbsp;</p>



<p>If the system to be calibrated provides the contribution of each satellite in view to the composite output, then the common-view method can be used to calibrate the receiver. (Unfortunately, many disciplined oscillators do not provide these data.) The system to be calibrated measures the difference between the local clock (or clock ensemble) and the system time of the constellation by using the data from each satellite in view. These data are compared, satellite by satellite, with the same measurements made at a location where UTC(k) is available. The common-view difference cancels or attenuates the contributions of the satellite clock and the orbital&nbsp;parameters, which are common to both data sets and cancel in the differences in first order. If the distance between the locations of the user and the UTC(k) laboratory is not too great, the contribution of the ionosphere may also be common to both measurements and cancel in the difference. A multiple-frequency measurement, which can correct for the contribution of the ionosphere, may not offer a significant improvement over a simple L1 comparison in this configuration, because the contribution of the ionosphere will be cancelled or attenuated in the common-view subtraction. The common-view method can operate continuously, and can also monitor the stability of the remote system.</p>



<h3 class="wp-block-heading" id="h-frequency-calibration">Frequency Calibration</h3>



<p>The techniques described for timing calibration can also calibrate the output frequency of the user’s system. A frequency calibration can be easier to realize than a time calibration because the absolute values of the delays in the equipment are not important, only the stability of these delays is. The stability of the output frequency of a quartz oscillator may be degraded by fluctuations in the ambient temperature, and the frequency estimated with a reference based on a rubidium or cesium device may be degraded by changes in the multipath contribution.</p>



<h3 class="wp-block-heading" id="h-specific-recommendations">Specific Recommendations</h3>



<p>The documentation from the manufacturer is the best source of information about a particular device. The following specifications provide general guidance on the methods to establish traceability [19].</p>



<p><strong>1.</strong>&nbsp;If the application can accept a fractional frequency uncertainty of 10<sup>-8</sup>&nbsp;or greater with an averaging time of one day, or a time uncertainty of 1 µs or greater, then a certificate by the manufacturer that at least one unit of the model satisfies the requirement is adequate to establish traceability at this level. (A receiver used only as the reference for a server that supports NTP, the Network Time Protocol, may not require calibration, because the accuracy and stability of the NTP service is usually limited to not better than about 1 ms by the characteristics of the network connection between the server and the client systems.)&nbsp;</p>



<p><strong>2.</strong>&nbsp;If the application requires a fractional frequency uncertainty between 10<sup>-8</sup>&nbsp;and 10<sup>-10</sup>&nbsp;with an averaging time of one day or a time uncertainty between 100 ns and 1 µs, then the manufacturer should provide a certificate with every unit that satisfies the requirement. The manufacturer could validate the performance of each unit by comparing its output with a calibrated reference unit maintained at the manufacturer’s facility.&nbsp;</p>



<p><strong>3.</strong>&nbsp;If the application requires a fractional frequency uncertain of less than 10<sup>-10</sup>&nbsp;with an averaging time of one day or a time uncertainty of less than 100 ns, then the calibration can be challenging and should be performed at the user’s facility, if possible.&nbsp;</p>



<p><strong>4.</strong>&nbsp;If the application requires a fractional frequency stability of less than 10<sup>-12</sup>&nbsp;or a time uncertainty of less than 50 ns, then the calibration should be repeated periodically or the performance of the system should be monitored by common-view or an equivalent technique, which will require a dedicated GNSS timing receiver at the user’s site. The contributions of multipath reflections and the sensitivity of the equipment to fluctuations in the ambient temperature may be important. The impact of multipath reflections can be minimized by locating the antenna so it has an unobstructed view of the sky, and by using a directional “choke ring” antenna, which attenuates signals coming from low elevations. The sensitivity to fluctuations in the ambient temperature may be a problem if the local reference device is a simple quartz oscillator or if a long antenna cable is exposed to direct sunlight.&nbsp;</p>



<p>It is important to maintain documentation that validates the traceability of any system. Configurations that support this capability are particularly useful.</p>



<h3 class="wp-block-heading" id="h-summary-and-conclusion">Summary and Conclusion</h3>



<p>Applications that use the timing data from GNSS systems often require legal and technical traceability to UTC. Even when traceability is not legally required, maintaining traceability to UTC simplifies combining the data from multiple constellations. The signals transmitted by GNSS systems are monitored by the BIPM and can be made traceable to UTC by the methods discussed. Ensuring the traceability of the timing data in a user application also depends on a calibration of the receiving equipment. The methods for realizing this calibration were presented and specific recommendations provided. Maintaining adequate documentation is important, and configurations that support real-time monitoring and log files are particularly useful.&nbsp;</p>



<h3 class="wp-block-heading" id="h-references-nbsp">References&nbsp;</h3>



<p><strong>(1)&nbsp;</strong>Conference generale des poids et mesures (CGPM) 2018 Resolution 2 of the 26th CGPM (2018), on the definition of time scales (https://bipm.org/en/committees/cg/cgpm/26-2018)</p>



<p><strong>(2)&nbsp;</strong>MiFiR RTS 25: https://ec.europa.eu/finance/securities/docs/isd/mifid/rts/160607-rts-25_en.pdf</p>



<p><strong>(3)&nbsp;</strong>Finra Rule 6820: https://www.finra.org/rules-guidance/rulebooks/finra-rules/6820</p>



<p><strong>(4)&nbsp;</strong>IEEE Standard for Synchrophasor Measurement for Power Systems, IEEE C37.118.1-2011. https://standards.ieee.org/ieee/C37.118.1/4902.</p>



<p><strong>(5)&nbsp;</strong>Dimetrios Matsakis, Judah Levine, and Michael Lombardi, Metrological and Legal Traceability of Time Signals, Inside GNSS, March/April 2019, pp. 48-58.</p>



<p><strong>(6)&nbsp;</strong>https://www.bipm.org/en/time-ftp/circular-t</p>



<p><strong>(7)&nbsp;</strong>https://www.bipm.org/en/time-ftp/utcr</p>



<p><strong>(8)&nbsp;</strong>GPS system time: https://www.gps.gov/applications/timing</p>



<p><strong>(9)&nbsp;</strong>Galileo system time: https://www.gsc-europa.eu/GST</p>



<p><strong>(10)&nbsp;</strong>GLONASS system time: https://www.unoosa.org/documents/pdf/icg/2020/GLONASS_Time_2017_E.pdf</p>



<p><strong>(11)&nbsp;</strong>BeiDou system time: http://en.beidou.gov.cn/SYSTEMS/Officialdocument/202001/P020231201549662978039.pdf</p>



<p><strong>(12)&nbsp;</strong>https://webtai.bipm.org/ftp/pub/tai/other-products/notes/explanatory_supplement_v0.8.pdf</p>



<p><strong>(13)&nbsp;</strong>G. Huang, Q. Zhang, W. Fu and G. Guo, GPS/GLONASS time offset monitoring based on combined precise point positioning approach, Advances in Space Research, Vol. 55, number 12, 15 June 2015, pp. 2950-2960. DOI: https://doi.org/10.1016/j.asr.2015.03.003. See also references in that text.</p>



<p><strong>(14)&nbsp;</strong>GPS-Galileo Time Offset (GGTO): https://www.unoosa.org/documents/pdf/icg/2017/wgd/wgd4-2-2.pdf</p>



<p><strong>(15)&nbsp;</strong>https://www.bipm.org/documents/20126/54295284/VIM4_CD_210111c.pdf</p>



<p><strong>(16)&nbsp;</strong>ITU-R, TF-686-3, Glossary and Definitions of Time and Frequency Terms p 16. https://www.itu.int/dms_pubrec/itu-r/rec/tf/r-rec-tf.686-3-201312-i!!pdf-e.pdf</p>



<p><strong>(17)&nbsp;</strong>SO 17025:2017, General requirements for the competence of testing and calibration laboratories, https://www.iso.org/ISO-IEC-17025-testing-and-calibration-laboratories.html</p>



<p><strong>(18)&nbsp;</strong>https://www.bipm.org/en/cipm-mra</p>



<p><strong>(19)&nbsp;</strong>P. Defraigne, J. Achkar, M. J. Coleman, M. Gertsvolv, R. Ichikawa, J. Levine, P. Uhrich, P. Whibberley, M. Wouters and A. Bauch, Achieving traceability to UTC through GNSS measurements, Metrologia, vol. 59, Number 6, October 2022. Metrologia, 59, 064001. DOI: 10.1088/1681-7575/ac98cb.</p>



<h3 class="wp-block-heading" id="h-authors">Authors</h3>



<p><strong>Judah Levine</strong>&nbsp;is on the faculty of the Department of Physics at the University of Colorado at Boulder. He recently retired from the Time and Frequency Division of NIST, where he worked on time scales and methods of distributing time and frequency information. He is continuing those projects at the University and is also a member of committees of the International Bureau&nbsp;<br>of Weights studying the future of Coordinated Universal Time and possible time scales for the Moon.</p>



<p><strong>Pascale Defraigne</strong>&nbsp;obtained her Ph.D. in Geophysics in 1995 at the Université Catholique de Louvain. Since 1997, she has managed the time and frequency activities at the Royal Observatory of Belgium, where the Belgian reference UTC (ORB) is maintained. Her research activities mainly concern the use of satellite navigation systems for time and frequency transfer. Pascale presently chairs the CCTF working group on GNSS time transfer, and contributes to the validation of Galileo timing signals.</p>



<p><strong>Ilaria Sesia</strong>&nbsp;is a Senior Researcher and Head of the Time and Frequency Department at INRiM, where she works on time transfer, atomic clocks and time scales for satellite applications. Since 2004, she has been deeply involved in the design and development of the timing aspects of the Galileo System.</p>



<p><strong>Giulio Tagliaferro&nbsp;</strong>received his Ph.D. in 2021 from Politecnico di Milano on precise GNSS measurement adjustment. He is currently a physicist at BIPM, where he works on GNSS time-transfer activities and receiver calibration supporting the realization of UTC.</p>



<p><strong>Michael Wouters</strong>&nbsp;leads the time and frequency group at the National Measurement Institute in Sydney, Australia. His research focuses on using low-cost GNSS receivers for time-transfer. He chairs the Consultative Committee on Time and Frequency&#8217;s task group working on the traceability of GNSS timing signals to UTC.</p>



<p></p>
<p>The post <a href="https://insidegnss.com/linking-gnss-data-to-utc/">Linking GNSS Data to UTC</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
