Professional Documents
Culture Documents
Candidato: Relatori:
Matteo Ragni Prof. Ing. Paolo Bosetti
Prof. Ing. Francesco Biral
3 Drone Avionics 43
3.1 Perception Action paradigm . . . . . . . . . . . . . . . . . 44
3.2 Building the PA map of the drone . . . . . . . . . . . . . . 46
3.3 Hexa–copter model . . . . . . . . . . . . . . . . . . . . . . . 47
3.4 Obstacle avoidance . . . . . . . . . . . . . . . . . . . . . . . 53
3.5 Altitude keeping . . . . . . . . . . . . . . . . . . . . . . . . 56
3.6 The signal detection problem . . . . . . . . . . . . . . . . . 59
3.7 Searching for the signal . . . . . . . . . . . . . . . . . . . . 63
3.8 Source searching algorithm . . . . . . . . . . . . . . . . . . 65
4 Simulations 69
4.1 Implementations . . . . . . . . . . . . . . . . . . . . . . . . 69
4.2 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
5 Conclusions 79
5.1 The ARTVA and the searching field . . . . . . . . . . . . . 79
5.2 The drone and its avionic . . . . . . . . . . . . . . . . . . . 80
List of symbols 83
Bibliography 85
9
Introduction to Mountain Rescue
1
Contents
1.1 Some statistics about the avalanche accidents . . . 12
1.2 Avalanche Beacons . . . . . . . . . . . . . . . . . . . 12
1.2.1 Transmission Mode . . . . . . . . . . . . . . . 13
1.2.2 Receiving Mode . . . . . . . . . . . . . . . . . 13
Analog Beacons . . . . . . . . . . . . . . . . . . 13
Digital Beacons . . . . . . . . . . . . . . . . . . . 13
1.2.3 Italian Mountain Rescue Intervention . . . . . 13
Intervention on Avalanche . . . . . . . . . . . . . 13
Equipment . . . . . . . . . . . . . . . . . . . . . 14
1.3 State of the Art . . . . . . . . . . . . . . . . . . . . . 14
1.3.1 Transmission . . . . . . . . . . . . . . . . . . . 14
1.3.2 Reception . . . . . . . . . . . . . . . . . . . . . 15
1.3.3 Searching Algorithms . . . . . . . . . . . . . . 16
The magnetic momentum problem . . . . . . . . . 16
Multiple Burial . . . . . . . . . . . . . . . . . . . 16
A complex procedure . . . . . . . . . . . . . . . . 17
1.4 Autonomous VTOL for buried searching . . . . . . 17
1.4.1 Why the use of a VTOL? . . . . . . . . . . . . 17
1.4.2 Quality Function Deployment . . . . . . . . . 18
Customer Needs . . . . . . . . . . . . . . . . . . 18
Technical Specification . . . . . . . . . . . . . . . 18
Merging the tables and comparison . . . . . . . . 19
Components selection . . . . . . . . . . . . . . . 19
Many people in the last few year have re-discovered a passion for
winter mountain sports. Some of them have decided to explore the
extreme version of this sports, like winter climbing or free-riding.
The increasing number of riders in extreme snow condition facili-
tates avalanches falling. Mountain Rescue Team is often called for
search probable buried hikers, constrained to operate in an environ- 1
Repubblica Italiana. Legge
ment with an high residual risk. To facilitate the research, national 24/12/2003 n. 363. Gazzetta Uffi-
ciale, 2003
and regional laws1 have imposed the use of ARTVA transmitter, also
called Avalanche Beacons, for rider on non-equipped trails.
12 autonomous vtol for avalanche buried searching avionics
Digital Beacons
Those beacons implements an user interface that indicates the field
line direction and an artificial distance to the center of the field. This sim-
plicity makes those beacons perfect for unexperienced user and auto-
rescue: those device are strongly advised by the Mountain Rescue
for all hikers, experienced or not.
Must be noted that the algorithm inside those transceivers runs on
a very low power DSP, due to energy harvesting requirements; often
rescuer has to slow down his speed to gave time to the beacon to
analyze received data. Also, it was pointed out from manufacturers Figure 1.2: Tracker DTS Avalanche
that advanced techniques, like multi-buried identification and buried Transceiver, a digital beacon
Intervention on Avalanche
14 autonomous vtol for avalanche buried searching avionics
The intervention begin after a witness call. Usually the witness is one
of the hikers that is on the accident location. In the best situation,
the witness begins the companion rescue procedure, with his own
avalanche beacon, and calls the emergency number.
During the emergency call, the operator tries to understand the loca-
tion, alerts the rescue team on shift and tries to figure out the general
situation that the team may encounter. A rescue unit is formed by:
• Mountain Rescue heli-ambulance expert
• Mountain Rescue canine unit
• Health equip and nurse
If heli-ambulance is cleared to take off, those are the first rescuers
on the avalanche. The clearance is related to weather and light con-
ditions, because flight is performed by eye-sight. If heli-ambulance
mission is aborted, Mountain Rescue team have to reach the avalanche
with ground vehicle.
Once arrived on the location, if residual risk make it possible, the res-
cue team is dropped from the heli-ambulance and starts the search-
ing procedure, with canine unit and with personal ARTVAs. The
rescuers with the beacons follow a scheme that allow them to cover
the avalanche front. This scheme is called primary search. While
a signal is identified, the rescuer start a fine search to pinpoint the
buried position.
Under certain condition, it is possible to perform an ARTVA search
from the helicopter.
Equipment
There is a procedural and moral obligation in having the last gener-
ation device, even if does not exist a directive that defines a specific
model for the equipment. Each rescuer has a VHF transmitter and
cellphone, along with the personal beacon.
4
RECCO is a passive searching method, It is possible to perform a search with other technology, like RECCO4 ,
composed by a reflector included in even if the detector is heavy and not always reliable.
hikers clothing, and a detector used
by rescue teams. A RECCO detector
usually performs passive search and
457kHz avalanche beacons search at the 1.3 State of the Art
same time. The last generation detec-
tor has an average weight of 1kg, while
the reflector weights only few grams. In this section we will analyze the state of the art in the field of
RECCO cannot be used for companion beacons construction and signal analysis.
rescue
1.3.1 Transmission
Normative states the use of a very long wavelength (λ) (656m). Such
a long wavelength reduces the interference effects of snow, body and
rocks and also multi-bouncing and multi-path effects[2] that may
afflict some shorter waves. This is one of the main reason why GPS
technology never appeared in this field[12].
This advantage also bring a consistent number of drawbacks, such
introduction to mountain rescue 15
1.3.2 Reception
Analog A–D
Digital Conversion
H–field Signal
Digital Filter
Estimation Detection
• other filtration techniques are analyzed in [27], and are one of the
main research topic in this field, in association with phase analysis
to better understand the direction of the single components of the
H–field
• the signal detector and magnetic field estimator is implemented
via software
One of the main challenge is the problem of the noise introduced
by antennas. This noise is proportional to the received signal, phe-
nomenon that induces an unsurmountable issue in the identification
of multiple burial signal.
Multiple Burial
Those algorithms do not analyze the problem of multiple burial, and
the subsequent possible situation of overlapping signal. An almost
complete dissertation about this problem, with some test on beacon
present on the market, may be found in [19, 8]. From those technical
documents, distributed by one of the most well-know company in
snow–safety, rises the evident lack of a solution for the overlapping
problem, due to transmitted signal limitation. The most suggest so-
lution is to run–away from an identified source in the hope to find
another new signal. Some producer try to avoid this using parallel
carrier frequency with additional information coded into intelligence
introduction to mountain rescue 17
A complex procedure
Standard de facto is an algorithm of flux line following, in paral-
lel with different assumption that user shall analyze, to derive the
possible orientation of the buried person transmitting antenna, and
subsequently find the best way to reach the hikers position. The
complete explanation for the searching procedure is long even if not
too complex, but based upon qualitative observation and deduction
derived from expertise of the rescuer.
Generally speaking, what we need to know is the fact that a simple
translation of this procedure in a machine with limited computa-
tional power is not practically possible.
A comprehensive description of the companion search and Mountain
Rescue procedure could be found in [32].
The thesis is built around the main thread of inspect and derive the
avionics of an autonomous VTOL. Even if avionics refer to the com-
plete set of instrumentation and algorithms necessary to stabilize and
control the flight, in this work we will focus on some of the main as-
pects necessary to perform the main task of buried searching.
This work is not the first attempt to bring an automatic drone on
avalanches. Some remarkable examples are
• SHERPA, European project born to create a robotic framework of
helpers for Mountain Rescue, coordinated by University of Bologna
• An user–piloted quad-copter research is just started in Politecnico
di Torino
• the project Alcedo from the Eidgenössische Technische Hochschule
Zürich6 6
Luc Oth Manuel Grauwiler. Fully au-
tonomous search for avalanche victims
using an mav, 2010
1.4.1 Why the use of a VTOL?
ble shows the comparison between technical specifications and cus- Range Ultrasonic RF m
Arm Length m
tomer needs and also between technical specifications and the other Control TX distance m
technical specifications. GPS Resolution m
Lateral Speed m s−1
Wind Speed m s−1
Components selection ARTVA RX distance m
Resolution Ultrasonic RF m
From the merged data it was possible to select the components that Lift Force N
will be used in the prototype. All components are listed in table 1.3 N. dissembled pieces
N. Darts
We have also decide not to use a commercial ARTVA, but instead try N. Lift Vector
to build a digital one from scratch. This will allow us to get a lighter Maximum inclination rad
Operative height m
model, and also extract exactly the information that we want from IMU Resolution m s−1
the received signal. Even if some device have a serial port, the output Weight Marking Device kg
Weight Dart kg
data are filtered with models that incorporate the possible speed of Weight ARTVA kg
a rescuer, that is different from our VTOL. Table 1.2: Technical specifications
Total 1041.48€
20 autonomous vtol for avalanche buried searching avionics
Is autonomous #
H # # #
H #
H # # # # # # # # #
Is fast #
H # # #
H # # # # # # #
H # #
Is usable by anyone # # # # #
H # #
H # # # # # # # # # # # #
H # #
Is quiet # # # # # # # # #
H # # # #
H # # #
H # # # #
Legend:
Cust. needs vs. Tech. spec.:
# no relation Resolution Ultrasonic RF
H light relation
#
Maximum inclination
N. dissembled pieces
Range Ultrasonic RF
Battery Temperature
N. ARTVA antennas
ARTVA RX distance
Control TX distance
Operative Height
negative strong relation
IMU resolution
Weight ARTVA
GPS resolution
N. Lift vector
Weight Darts
Arm Length
Wind speed
Flying time
# no relation
Lift Force
N. Darts
Weight
Flying Time
# # # # # #
Weight
# # # # # # # # #
N. ARTVA antennas
# # # # # # # # # # # # # # #
Battery temperature
# # # # # # # # # # # # # # #
Range Ultrasonic RF
# # # # # # # # # # # # #
Arm length
# # # # # # # # # # # #
Control TX distance
# # # # # # # # # # # # #
GPS Resolution
# # # # # # # # # # # #
Lateral speed
# # # # # # # # # #
Wind speed
# # # # #
ARTVA RX distance
# # # # # # # # # #
Resolution Ultrasonic RF # # # # # # # # # #
Lift Force
# # # # # #
N. disassembled pieces
# # #
N. Darts
# # # # #
N. Lift vector
# # # #
Maximum inclination
# # # #
Operative Height # # # #
IMU Resolution # # #
Weight Marking Device
In this chapter we will try to design a digital receiver for the ARTVA
signal. Before starting with the design, ARTVA signal is deeply an-
alyzed, with the derivation of a simplified model for a field pattern
that could be used for the implementation of the searching algorithm.
After that, ferrite antennas are studied, as they are the only way to
receive such a long wavelength. In the last part of the chapter the
circuitry for the ARTVA receiver is shown and explained.
f (r, t) = f f ∈ [ ρ, J, E, B, H ]
The equations that rule the induction are the Gauss equation of mag-
netic induction and the Faraday law of electric induction:
∇·B = 0 (2.1)
∂
∇×E = − B (2.2)
∂t
while the equations that rule the interaction with materials are Gauss
equation and Ampere law:
ρ
∇·E = (2.3)
ε0
∂
∇ × B = µ0 J + ε 0 E (2.4)
∂t
∂ ρ
∇·A ∇2 φ + = −
∂t ε0 (2.8)
2
1 ∂ A
1 ∂φ
2
∇ A− 2 2 −∇ ∇·A+ 2 = − µ0 J
c ∂t c ∂t
Those equation, even if complex, could be resolved with a well posed
boundaries condition problem. Equation are coupled with the cur-
rent formulation, but could be decoupled using the Gauge transfor-
mation[23], also called recalibration map, that is in the form:
A0 7→ A + ∇ψ
(2.9)
φ0 7→ φ − ∂ψ
∂t
in which ψ = ψ(r, t) ∈ C2 . As proofed in 2.42, this map represents
an invariant with respect to dynamic potential formulation. If we
consider a ψ such that it verifies the Lorentz equation
1 ∂φ0
∇ · A0 = − (2.10)
c2 ∂t
we obtain the decoupled version:
1 ∂2 φ ρ
∇2 φ − = −
c2 ∂t2 ε0 (2.11)
1 ∂2 A
∇2 A − 2 2 = − µ0 J
c ∂t
Those dynamic equations describe the time evolution of an EM–field.
If field sources are located in a finite region, the problem admit as
solution a generalization of the well know stationary formulation,
called retarded potential:
1 1 | r − r0 |
ZZZ
0
φ(r, t) = ρ r ,t− dr
4πε 0 | r − r0 | c
Ω (2.12)
1 | r − r0 |
µ0
ZZZ
0
A(r, t) = J r ,t− dr
4π | r − r0 | c
Ω
24 autonomous vtol for avalanche buried searching avionics
κ = |r − r0 | θ
ψ J
r0
y
x dr
ϕ0
µ0 J0 cos(ω0 (t − κ/c))
Z
A(r, t) = cos ϕ0 dϕ0 φ̂
4π r
In the hypothesis of r k ẑ × x̂, we obtain a vector A directed along ŷ:
(r − r0 ) · (r − r0 )
p
κ =
Z2π
µ0 J0 r 0 cos(ω0 (t − κ/c))
A(r, t) = cos( ϕ0 )dϕ0 φ̂ (2.14)
4π κ
0
• we assume r 0 r
• we assume r 0 λ = 2πc/ω0
that brings us to the following solution:
µ0 m0 1
ω0
A(r, t) = sin(θ ) sin (ω0 (t − r/c)) − cos (ω0 (t − r/c)) φ̂
4πr r r
(2.15)
in which m0 identifies the total dipole moment, considering also the
number of the coils of antenna. The rest of the equation describes
the propagation of the transmission in near–field conditions.
∂A
E = −
∂t (2.16)
B = ∇×A
r
τ = t−
c
ω02
!
µ0 m0 ω0
Eφ = sin(θ ) sin (ω0 τ ) + cos (ω0 τ )
4π r2 c
µ0 m0 1
ω0
Br = cos(θ ) cos (ω0 τ ) + sin (ω0 τ )
2πr2 r c
µ0 m0
Bθ = sin(θ ) c2 − ω02 r2 cos (ω0 τ ) + ω0 rc sin (ω0 τ )
4πr3 c2
(2.18)
In figure 2.2 are shown some animation referred to the magnetic field
defined in the previous equations. The animation are performed us-
ing ARTVA typical parameters, even if time is scaled. The equations
are parametric with respect to a value, m0 that is the transmitter
magnetic dipole. As we have seen in chapter 1, the real transmit-
ting power of an avalanche beacon is not known, but it shall have
the maximum at 10m inside a range. The animations consider an
unitary magnetic dipole moment.
1 µ0 m0 1
κ
Br = cos (θ ) 3 cos (ω0 τ ) − 2 sin (ω0 τ )
2 π r r
(2.19)
1 µ0 m0 3 1 1
= − j κ cos (θ ) 2 2 2 + 3 3 3 e jω0 τ
2 π j r κ j r κ
1 µ0 m0 2 − ω 2 r2 cos ( ω τ ) − ω rc sin ( ω τ )
Bθ sin c
= ( θ ) 0 0 0 0
4 πr3 c2
1 µ0 m0 3 1 1 1
= − j κ sin (θ ) + 2 2 2 + 3 3 3 e jω0 τ
4 π jrκ j r κ j r κ
(2.20) z
∞
2A
Modulated
Jint (t) = A∆ + ∑ nπ
sin (nπ∆) cos (ωint nt) (2.25)
n =1
antenna is a very difficult task, due to the extreme high noise that
could be generated by imperfections in windings or material.
dl E
dΦB
I
Vind = E·l = − (2.26)
dt
Vind
where flux is:
Figure 2.7: Single coil in a field
ΦB B · ê a dA
R
=
Ac (2.27)
= µ0 H A cos (θ )
It is evident a cosine relation between field and axis of the coil. The
value of induced potential is maximum when the magnetic field H
is orthogonal to the coil. θ is the angle between the field an the axis
of the coil. Fusing two previous equations, we get:
dH
Vind = µ0 Ac
dt
that for our example:
Vind = − jω0 H Ac µ0
Ferrite effect
Inserting a ferrite bar brings to a deviation of the magnetic field flux.
Fields lines are bended inside the ferrite because of its grater mag-
netic permeability The total flux in section A of figure 2.8 is given by
the flux that crosses area A − Ar and flux that crosses area Ar :
ΦT = Φ B1 + Φ B2
Φ B1 = µr Ar H
Φ B2 = µ0 ( A − Ar ) H
30 autonomous vtol for avalanche buried searching avionics
Ferrite rod Ar
Signal
Starting from the definition of the equivalent circuit, with an exter-
nal resistive load R L it is possible to derive a transfer function (full Figure 2.9: Antenna equivalent circuit
derivation in appendix at equation 2.44):
Vout ω s + Qα ω LC
= G (s) = LC (2.35)
Vind Qα s2 + ω LC s + ω 2
Qβ LC
and then:
Qβ
Vout = heff E (2.37)
Qα
Noise
We could consider different sources of noise for our ferrite antenna:
• Boltzmann temperature noise
• ferrite polarization noise
• skin effect noise
• auto-inductance noise
• parasite capacitances due to construction, wirings or circuit ground-
ing
• thermal deviation
Even if some of those source are easily to model, some of them are
not and require an experimental interpolation. For the Boltzmann
white noise[22]: q
Vn,B = 4KT∆ f Q β Z L
that is environment dependent. For the other sources, some more
considerations must be derived. Skin effect and ferrite noise are pro-
portional to the received field. Those two effects must be carefully
taken into account and analyzed from experimental point of view.
The first one is due to the distribution of the current in the section
of the coil wire: current tends to accumulate in the skin layer of the
wire, generating eddy currents that are sources of noise[26]. To this
effect, some special woven wire, like litz wire, should be used. The
32 autonomous vtol for avalanche buried searching avionics
second effect, ferrite noise, derives from the polarization of the mag-
netic crystal inside ferrite. To polarize the whole ferrite bar, some
energy must be spent to move magnetic domain, and the movement
of those domain generates a noise[29]. This effect is strictly related
to the quality of material and cannot be mitigated. Auto-inductance
noise is due to the current that is absorbed by the serial circuit of
antenna and load. In a production of a prototype it is important that
input of identification circuit has a very high impedance to reduce a
generation of this current on antenna. Some high quality devices im-
plement a secondary loop on the antenna that acts as a re-generator,
that tries to null those parasitic currents effect.
It is straightforward now, that all those noise effect could be resumed
in an unique interpolated expression n (Vind , T ).
For simulation purpose it is possible to simulate this as Gaussian
white noise as follows:
Power supply
ADC
220μF
220μF
5
220μF
220μF
220μF
2.4.1 Tuned tank
LM7905
390kΩ 430Ω 39
L
LF347N/1
1kΩ 1kΩ
100kΩ
470Ω
330kΩ
360Ω
430Ω
1nF
1nF
1nF
LM7805
The tuned
TLE2426 tank is composed by a ferrite antenna, with a rod of 10cm
220μF
220μF
per 1cm. The wire of the coil is a 30 AWG enameled copper wire,
220μF
with a final parasite resistance of 22Ω. The coil has 70 windings. For
220μF
220μF
LM7905
1kΩ
100k
1kΩ
L
LF347N/1
1nF 1nF 1nF TA7641
2.7kΩ
C LF347N/2 3kΩ LF347N/3 2.7kΩ LF347N/4
0.01μF
0.1μF
470Ω
330kΩ
360Ω
430Ω
430Ω
1nF
1nF
1nF
50 the gain at 457kHz, at which the filter is centered. Also, this stage
Magnitude (dB)
Frequency (Hz)
Figure 2.13: Filter magnitude character- 2.4.3 Identification
istic
The central block is an identification circuit, obtained with the mono-
6
A.k.a.: MK484 evolution of ZN414 lithic classical IC TA76416 , that acts as a one chip radio solution in
AM. All receiver is derived from the modification of the basic cir-
cuit provided in schematics of this IC, extended with filtering and
buffers, and the removal of the auto gain control resistance in the
output feedback. Also, transistor amplification stage is removed.
220μF
89kΩ
220μF
32kΩ
1kΩ
430Ω 390Ω
1kΩ
68nF
150nF
330kΩ
360Ω
430Ω
430Ω
1.8kΩ
1nF
1nF
2.4kΩ
100nF
100nF
2.4k
The output of this circuitry is in 40 to 60mV, with a very low current
Missed peak
2.4.4 Amplifier
The identified signal is, again, amplified and filtered, to a lower fre-
quency, to grant the isolation of the square wave, with respect to the
89kΩ
220μF
32kΩ
1kΩ
design of a digital artva 35
1kΩ
68nF
150nF
TA7641
LF347N/4 18kΩ 22kΩ
LM324/1 12kΩ 15kΩ
LM324/2
MSP430G2253
LM324/3
0.1μF
1μF
1kΩ
1.8kΩ
2.4kΩ
100nF 1.8kΩ
100nF
2.4k
Figure 2.16: Low pass filter and ampli-
fication stage
residual carrier and other source of interference. A 10dB gain fil-
ter, with 2 stages was implemented. After the filter, another buffer
connects analog circuitry with digital micro–controller.
LM324/2
MSP430G2253
LM324/3
Magnitude (dB)
0
−50
1μF
1.8kΩ −100
2.4k
−150
100 102 104
Frequency (Hz)
One last stage is the ADC and the UART interface on the micro– Figure 2.17: Filter magnitude character-
istic
controller. Using an MSP430 it is easy to develop in C the routines
necessary to perform the task. To reduce the power consumption,
ADC sampling is performed with ALU in power saving mode. Once
the sampling task is completed, an interrupt brings up the ALU that
set up the variables too be sent over serial interface UART (or SPI or
I2C).
220μF
220μF
TLE2426
220μF
220μF
220μF
LM7905
100k
with orthogonal antennas, and one single ADC micro–controller and
power supply unit.
390kΩ 430Ω
L
LF347N/1
Figure 2.20: Complete circuit 200
2.7kΩ 1nF 1nF
180 C LF347N/2 3kΩ
160
0.01μF
140
Sampling value
120 1kΩ
100kΩ
470Ω
360Ω
430Ω
1nF
1nF
100
transmitter distance increased
80
60
40
20
0
0 5 10 15 20 25 30 35
Time (s)
z
Ferrite rod
Loop solenoid
Power supply
x
Analog
stage
Analog Digital
stage stage
Analog
stage
y
Figure 2.22: Complete circuit
LM7805
TLE2426
220μF
220μF
220μF
220μF
220μF
89kΩ
LM7905
1kΩ
32kΩ
100k 220μF
0.01μF
0.1μF
1kΩ
1μF
1kΩ 1kΩ
1.8kΩ
1nF
1nF
1nF
1.8kΩ
470Ω
360Ω
430Ω
430Ω
100kΩ
330kΩ
2.4kΩ
100nF
2.4k
100nF
design of a digital artva
37
38 autonomous vtol for avalanche buried searching avionics
2.5 Appendix
Maps:
r x 2 + y2 + z2
p
=
x = r sin(θ ) cos(φ)
!
z
y = r sin(θ ) sin(φ) → θ = arctan
x 2 + y2
p
x
z r cos(θ )
= = arctan
φ
y
(2.39)
Versors in Cartesian coordinates:
xz y
x −p
x 2 + y2 x 2 + y2
p
1 yz x
y
r̂ θ̂ φ̂ = −p
2 2 2
x +y +z x 2 + y2 x 2 + y2
p p
x 2 + y2
z −p 0
x 2 + y2
(2.40)
2.5.2 Evidences
∂A ρ
∇ · −∇φ − =
∂t ε0
∂ ρ
∇2 φ + ∇ · A = −
∂t ε0
∂ ∂A
µ0 J + ε 0 −∇φ − = ∇ × (∇ × A)
∂t ∂t
∂2 A ∂φ
µ0 J − µ0 ε 0 2 − µ0 ε 0 ∇ = ∇ (∇ · A) − ∇2 A
∂t ∂t
2 1 ∂2 A 1 ∂φ
∇ A− 2 2 −∇ ∇·A+ 2 = − µ0 J
c ∂t c ∂t
(2.41)
In the following equation invariance with respect to recalibration
design of a digital artva 39
map is showed:
∇ × A0 = ∇(A + ∇ψ)
= ∇ × A + ∇ × ∇ψ
= ∇×A
= B
(2.42)
∂A0
∂ψ ∂
−∇φ0 − = −∇ φ − − (A + ∇ψ)
∂t ∂t ∂t
∂ ∂A ∂
= −∇φ + ∇ ψ − − ∇ψ
∂t ∂t ∂t
∂A
= −∇φ −
∂t
= E
(r − r0 ) · (r − r0 ) =
p
κ =
√
= r · r + r0 · r0 − 2 r · r0
r2 + r 02 − 2 r r 0 sin(θ )cos( ϕ0 )
p
=
r 02
r
r0
= r 1 + 2 − 2 sin(θ )cos( ϕ0 )
r r
the simplification is performed by the use of Taylor expansions, un-
der the hypothesis of r 02 /r2 ≈ 0:
" r #
r0
κ = Taylor2 r 1 − 2 sin(θ )cos( ϕ0 ) 0
r r
→0
r
r 0
≈ r 1 − sin(θ )cos( ϕ0 )
r
imposing the inverse:
−1
1 1 r0
= 1 − sin(θ )cos( ϕ0 )
κ r "r −1 #
1 r0 0
= Taylor2 1 − sin(θ )cos( ϕ )
r r r0
→0
r
1 r0
≈ 1 − sin(θ )cos( ϕ0 )
r r
cos(γ + β) = cos γ cos β − sin γ sin β
for γ → 0 we get sin (γ) ≈ ω0 τ and
r 0 λ = 2πc/ω0 : this observation permits us to simplify the cosine
cos (γ) ≈ 1
in the argument of the integral, with τ as defined in 2.18:
40 autonomous vtol for avalanche buried searching avionics
κ ω0 r 0
cos ω0 t − ≈ cos (ω0 τ ) + sin (θ ) cos ( ϕ0 )
c c
ω0 r 0
= cos (ω0 τ ) cos sin (θ ) cos ( ϕ0 ) −
c
ω0 r 0
+ sin (ω0 τ ) sin 0
sin (θ ) cos ( ϕ )
c
≈ cos (ω0 τ ) −
ω0 r 0
+ sin (ω0 τ ) sin sin (θ ) cos ( ϕ0 )
c
1 r 0 cos (θ ) sin ( ϕ0 )
1+ ·
r r
ω r 0 sin (θ ) cos ( ϕ0 ) sin (ω0 τ )
· cos (ω0 τ ) − 0
c
r 02 r 0 ω0 r 0
where the term cr = r 2π λ ≈ 0 as we have already stated:
1 1
ω0
cos (ω0 τ ) − sin (ω0 τ ) − cos (ω0 τ ) r 0 ξ
r c r
1
a1 = cos (ω0 τ )
r
1 ω0 1
a2 = sin (ω0 τ ) − cos (ω0 τ ) r 0 sin (θ )
r c r
Z2π
µ0 J0 r 0
A(r, t) = a1 cos ϕ0 − a2 cos2 ϕ0 dϕ0 φ̂
4πr
0
2π
R
cos ( ϕ0 ) dϕ0 = 0
and thus solved:
0
2π
cos2 ( ϕ0 ) dϕ0 = π µ0 J0 r 0
R
0 A(r, t) = − πa2
4π
µ0 J0 r 02 π 1
ω0
= cos (ω0 τ ) − sin (ω0 τ )
4πr r c
1 µ0 m0 1
κ
Br = cos (θ ) 3 cos (ω0 τ ) − 2 sin (ω0 τ )
2 π r r
1 µ0 m0 1 1
= cos (θ ) κ 3 cos (ω0 τ ) − 2 2 sin (ω0 τ )
2 π r3 κ 3 r κ
1 µ0 m0 1 j
= cos (θ ) κ 3 + 2 2 e jω0 τ
2 π r3 κ 3 r κ
1 µ0 m0 j 1
= cos (θ ) κ 3 + e jω0 τ
2 π r2 κ 2 r3 κ 3
1 µ0 m0 3 1 1
= − j κ cos (θ ) 2 2 2 + 3 3 3 e jω0 τ
2 π j r κ j r κ
1 µ0 m0
Bθ sin (θ ) c2 − ω02 r2 cos (ω0 τ ) − ω0 rc sin (ω0 τ )
=
4 πr3 c2
ω02
! !
1 µ0 m0 1 ω0
= sin (θ ) − 2 cos (ω0 τ ) − 2 sin (ω0 τ )
4 π r3 c r r c
1 µ0 m0
1 κ 2
κ
= sin (θ ) − cos ( ω 0 τ ) − sin ( ω 0 τ )
4 π r3 r r2
1 µ0 m0 1 1 1
= sin (θ ) κ 3 − cos (ω0 τ ) − 2 2 sin (ω0 τ )
4 π r3 κ 3 rκ r κ
1 µ0 m0 1 1 j
= sin (θ ) κ 3 − + 2 2 e jω0 τ
4 π r3 κ 3 rκ r κ
1 µ0 m0 1 j 1
= sin (θ ) κ 3 − + 2 2 + 3 3 e jω0 τ
4 π rκ r κ r κ
1 µ0 m0 3 1 1 1
= − j κ sin (θ ) + 2 2 2 + 3 3 3 e jω0 τ
4 π jrκ j r κ j r κ
r
r̂ =
|r|
(m × r) × r
θ̂ =
|(m × r) × r|
and the magnetic dipole vector is the projection on the two versors:
m · r̂ = m0 cos (θ )
m · θ̂ = −m0 sin (θ )
µ0
B 2m0 cos (θ ) r̂ + m0 sin (θ ) θ̂
=
4πr3
µ0
2 (m · r̂) r̂ − m · θ̂ ϑ
=
4πr3
µ0
3 (m · r̂) r̂ − (m · r̂) r̂ − m · θ̂ ϑ
=
4πr3
µ0
= (3 (m · r̂) r̂ − m)
4πr3
42 autonomous vtol for avalanche buried searching avionics
Vout ( R L k Cs)
=
Vind ( R L k Cs) + ( R P k Ls)
1
1
+ Cs
RL
=
1 1
+
1 1 1
+ Cs +
RL RL Ls
1 1 (2.44)
+
Rp Ls
=
1 1 1
+ Cs + +
RL RP Ls
R
1 s+ P
= L
RP C 2 1 1
s + s+
R R LC
C P L
RP + RL
Drone Avionics
3
Contents
3.1 Perception Action paradigm . . . . . . . . . . . . . . 44
3.1.1 The basic paradigm . . . . . . . . . . . . . . . 44
3.1.2 Exploiting more complex behavior . . . . . . . 44
Expanding PA . . . . . . . . . . . . . . . . . . . 44
Subsumption and grounding . . . . . . . . . . . 45
Innate knowledge and emulation . . . . . . . . . 45
Bootstrapping and more . . . . . . . . . . . . . . 45
3.2 Building the PA map of the drone . . . . . . . . . . 46
3.2.1 Overview of our searching map . . . . . . . . 46
3.3 Hexa–copter model . . . . . . . . . . . . . . . . . . . 47
3.3.1 Motion equations . . . . . . . . . . . . . . . . . 47
External force and torque analysis . . . . . . . . . 47
Inertial analysis . . . . . . . . . . . . . . . . . . 49
Newton–Euler equations . . . . . . . . . . . . . . 50
3.3.2 Linearization and LQR control . . . . . . . . . 51
Linearization . . . . . . . . . . . . . . . . . . . . 51
LQR on complete state . . . . . . . . . . . . . . . 52
Solving tracking problem . . . . . . . . . . . . . 52
3.4 Obstacle avoidance . . . . . . . . . . . . . . . . . . . 53
Model of range finder . . . . . . . . . . . . . . . 54
3.5 Altitude keeping . . . . . . . . . . . . . . . . . . . . 56
3.5.1 Kalman Filter . . . . . . . . . . . . . . . . . . . 56
Initial state probability . . . . . . . . . . . . . . . 57
Prediction phase . . . . . . . . . . . . . . . . . . 57
Estimation state . . . . . . . . . . . . . . . . . . 57
Complete KF algorithm . . . . . . . . . . . . . . 58
3.5.2 Application to altitude keeping . . . . . . . . 58
3.6 The signal detection problem . . . . . . . . . . . . . 59
3.6.1 Supervised signal detection . . . . . . . . . . . 60
3.6.2 Risk criterion . . . . . . . . . . . . . . . . . . . 60
Minimum risk criterion . . . . . . . . . . . . . . 60
The feature space . . . . . . . . . . . . . . . . . . 62
3.7 Searching for the signal . . . . . . . . . . . . . . . . 63
3.8 Source searching algorithm . . . . . . . . . . . . . . 65
3.8.1 Exploration step . . . . . . . . . . . . . . . . . 65
3.8.2 Emulation step . . . . . . . . . . . . . . . . . . 66
Optimization . . . . . . . . . . . . . . . . . . . . 66
Estimation . . . . . . . . . . . . . . . . . . . . . 67
complex behavior.
Level 1
As an example, the very basic level that could be implemented is a
stabilization control, that could be used to keep the plant in a control- Level 0
Sensors Actuators
lable state. From this layer, an upper tracking layer will try to reduce Figure 3.3: Subsumption and ground-
the input error using the lower layer to preserve a safe stability for ing architecture
the system.
This techniques, introduced in [6], will be used in our avionics defi-
nition.
Emulator
Model
Hypothesis
Environment
dancies
• further repetition remove unused parameters
• last repetitions allows to perform an optimization and update of
the model parameters
tect
de
dar
Action Ra
Emulation
Exploration
routines
Source
searching
Altitude Keeping
Obstacle Avoidance
Tracking Problem
Fb = ∑ Fb (3.2)
external
48 autonomous vtol for avalanche buried searching avionics
π/3
yb
zg
xb
yg
xg
Weight:
0
Pg = (3.3)
0
−mg
Motor thrust:
0
6
Lb = ∑ (3.4)
0
i =1
− Lb,i
Total force:
sin(θ ) 0
Fb = mg + (3.5)
− sin(φ) cos(θ ) 0
6
− cos(φ) cos(θ ) − ∑ Lb,i
i =1
Drag torque, with β the proportional factor between thrust and drag
drone avionics 49
torque
0
6
Db = ∑ (3.8)
0
i =1
βLb,i
Inertial analysis
We could define speed vector in body system of coordinates:
ẋ u
(3.10)
ẏ = R(φ, θ, ψ) v
ż w
. that allows us to define the accelerations vector in the form: The rotational matrix form body
to ground is obtained through a
sequence of elementary rotations:
ab = v̇b + ωb × vb (3.11) R = Rz (ψ) Ry (θ ) R x (φ)
K̇b = Ib ω̇b + ωb × Ib ωb
Ix ṗ ( Iz − Iy )qr
(3.14)
= I q̇ + ( I − I ) pr
y x z
Iz ṙ ( Iy − Ix ) pq
Newton–Euler equations
Defined state vectors and control vectors:
x = [ x, y, z, u, v, w, φ, θ, ψ, p, q, r ] T
u = [ L1 , L2 , L3 , L4 , L5 , L6 ] T
Linearization
We now linearize the system feedback to get a control that stabilizes
our drone:
u0 : 0 = f ( x0 , u0 ) (3.16)
that will be solved for hovering state, that is one of the most impor-
tant flight routine. Hovering is not dependent with respect to vertical
orientation along ẑ axis:
x = [ x0 , y0 , z0 , 0, 0, 0, 0, 0, ψ0 , 0, 0, 0] T
One solution for this state is the control vector composed by thrust
forces:
mg
L1 = L2 = L3 = L4 = L5 = L6 =
6
and the linearized system is in the form:
∂ f (x, u) k ∂ f (x, u) k
ẋ = x+ u (3.17)
∂x x0 ,u0 ∂u x0 ,u0
| {z } | {z }
A B
and it is possible to obtain a representation of a linear model using a
computer algebra system:
0 0 0 cos (ψ0 ) sin (ψ0 ) 0 0 0 0 0 0 0
0 0 0 − sin (ψ0 ) cos (ψ0 ) 0 0 0 0 0 0 0
0 0 0 0 0 1 0 0 0 0 0 0
0 0 0 0 0 0 0 g 0 0 0 0
0 0 0 0 0 0 −g 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0
A=
0 0 0 0 0 0 0 0 0 1 0 0
0 0 0 0 0 0 0 0 0 0 1 0
0 0 0 0 0 0 0 0 0 0 0 1
0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0
(3.18)
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
1 1 1 1 1 1
− − − − − −
m m m m m m
B=
0 0 0 0 0 0
(3.19)
0 0 0 0 0 0
0
√0 √0 0
√0 √0
3 l 3 l 3 l 3 l
0 − − 0
2 Ix 2 Ix 2 Ix 2 Ix
l 1 l 1 l l 1 l 1 l
− − −
Iy 2 Iy 2 Iy Iy 2 Iy 2 Iy
β β β β β β
− − −
Iz Iz Iz Iz Iz Iz
52 autonomous vtol for avalanche buried searching avionics
ẋ = Ax + Bu (3.20)
R = ρI6×6
√ √
T √ T dim(x)−1 √ T
O A, Q = rank Q AT Q . . . AT Q = 12
C ( A, B) = rank B AB . . . ( A)dim(x)−1 B = 6
K xf
u∗ e −
drone avionics 53
1
v ( di ) = − (3.23)
di
v ( di ) p2
mented is a sigmoid function:
di
!
p1 1
v ( d i ) = p3 p1 −1 (3.24)
1+e
4( 2 − di ) pp32
di
ui
v(di)
For our system we suppose to know exactly the position xd and ori-
2
For the obstacle avoidance algorithm entation R(φ, θ, ψ) of the drone2 . We define observation versors as
only attitude must be know, to project follows:
the velocity in ground reference frame
π
cos (i − 1)
3
û
{ i : i = 1..6 } →
π
: i = 1..6 (3.26)
− sin ( i − 1 )
3
0
drone avionics 55
ûi
ρ
u
h
ρ (maximum radius)
u = (xiΨ − xd ) · ûi
h (maximum range)
u
x = ρ cos(θ )
h
u (3.27)
y = ρ sin(θ )
h
z = u
9 else
10
Ψ ←∞;
Di,j
17 return r
with µ the mean value for the distribution and Σ covariance matrix
of the distribution.
The Kalman filter include the knowledge of the covariance matrix
into the state estimation procedure[31], and it is possible to proof
that the final estimation will maintain a normal distribution if:
• distribution of initial state is normal
• the state distribution is a linear function of the previous state and
a white Gaussian noise
• the measurement distribution is a linear function of the state and
a white Gaussian noise
Prediction phase
The distribution of the state derives from the distribution of the pre-
vious state, using the linear relation:
µ̄t = At µt−1 + Bt ut
x t = g ( x t −1 , u t ) + w t (3.31)
k
Taylor1 ( g(xt−1 , ut )) = g(µ̄t−1 , ūt )+
µ̄t−1 ,ūt
k
∇ x g ( x t −1 , u t ) xt−1 − µ̄t−1
µ̄t−1 ,ūt
Estimation state
The measurement distribution derives directly from the measure-
ment model:
zt = Ct xt + vt (3.32)
58 autonomous vtol for avalanche buried searching avionics
zt = h(xt ) + vt (3.33)
k k
Taylor1 (h(xt )) = h(µ̄t ) + ∇x h(xt ) (xt − µ̄t )
µ̄t µ̄t−1
Complete KF algorithm
Now we are ready to define a complete Kalman Filter. The blue lines
represent the step that should be performed in the case of non–linear
models. Must be noticed, that in case of such non–linearities, it is
impossible to demonstrate the fact that normal posterior distribution
are maintained.
mt
h mt-1
We can model the problem taking into account attitude dynamic and
vertical dynamic of the VTOL, from which we know also the rotation
matrix of the drone. The plane of the avalanche could be approxi-
mated through the orthogonal versor m̂, projected in the drone refer- 3
SLAM: Simultaneous Localization
ence frame. The problem, inserting m̂ into the state vector, becomes And Mapping
equivalent to a SLAM3 problem.
The state is: " #
x
x= (3.34)
m̂b
and the covariance matrix of the state derives from covariance of the
position system at which must be added a covarianc matrix on the
knowledge of m̂b = R(φ, θ, ψ) T m̂. We could use three range finder
directed to the ground, under the drone, that allow us to define three
points on the surface. A model for the measurement function uses
some simple algebraic definitions: given three points that belong to
the plane, { A, B, C }, the normal is:
( A − B) × ( B − C )
m̂ = (3.35)
|( A − B) × ( B − C )|
We have two searching status for our agent. In one searching status,
the VTOL tries to identify a signal presence, while in the second
stage, once it has identified the presence of a signal, the drone has
to find the transmission source point. The passage from a searching
strategy to another is the supervised signal detection.
60 autonomous vtol for avalanche buried searching avionics
Z1 7→ p(s| H1 )
p(s) p(s| H0 )
p(s| H1 )
P( D0 | H0 ) p(s| H0 )ds = 1 − PF
R
= PD
Z0 PM
P( D0 | H1 ) p(s| H1 )ds = PM
R
=
Z0 s
Z0 Z1
P( D1 | H0 ) p(s| H0 )ds = PF
R
= ←s→
Z1
p(s) p(s| H0 )
P( D1 | H1 ) p(s| H1 )ds = 1 − PM
R
= p(s| H1 )
Z1
PC PF
where:
• PC : represents probability of correct rejection s
Z0 Z1
• PF : represents probability of false alarm
Figure 3.13: Probability versus decision
• PM : represents probability of missed alarm space
PD + PM = 1
PC + PF = 1
R = c0,0 (1 − PF ) P( H0 ) + c0,1 PM P( H1 )+
+c1,0 PF P( H0 ) + c1,1 (1 − PM ) P( H1 )
PM p(s| H1 )ds
R
=
Z0
PF p(s| H0 )ds =
R
=
Z1
= 1− p(s| H0 )ds
R
Z0
= P( H0 )c1,0 + P( H1 )c1,1 +
Z1 = {s ∈ Z : Λ(s) > η }
Start
Receiving starting
point p0 , ending point
pn , plane direction
Generation of points
vector P = [p0 , . . . , pn ],
set confidence distance ∆
i ← 0
Go To pi
Λ(s) > η?
false
Get x
true
Search H–field
source
| pi − x | < ∆ ?
false
true
i ← i+1 i = n?
false
true
Stop
Receiver range
p0
n
io
ct
re
di
e
an
Pl
pn
The first step is simply an adaptive filter, stolen from the evaluation
of Round–Trip–Time in TCP networking[17], that tries to identify a
direction in which the signal is maximized, given an adapted previ-
ous knowledge. The algorithm takes into consideration the presence
of fluctuations due to noise and interference and changes orienta-
tion only when the change in signal is obvious. Scaling parameter
regulate the velocity that will move the drone.
An adaptive filter for a variable x is defined as:
|H| = Hx + Hy + Hz
p
0
9 return vk
Optimization
In parallel with the previous searching method, an emulation of the
real field is implemented. The emulation tries to understand the po-
sition of the source as a solution of an optimization problem, using
drone avionics 67
arg min δ
pT
δ = H(x, p T , m) − Ĥ 2
(3.45)
subject to
(x − p T )2 ≤ rmax
Estimation
At this point, with could notice a lot of fluctuation in the solution,
due to the noise in measurement, that is why we decided to treat the
solution as a stochastic process. The solution are parsed in a parzen
window estimator, a non–parametric estimator, that consider a kernel
function γ(p, h) with volume V (h):
• h identifies a kernel geometric characteristic
• the kernel is normal:
γ(p, h)
Z
dp = 1
V (h)
Rn
N
1 γ(p − pk , h)
p̂(p) =
N ∑ V (h)
(3.46)
k =1
Z∞ z2
1 −
√ e 2h2 dz = 1
2πh
−∞
• the estimation may suffer bias problem for samples N < ∞, that
means
E{ p̂(p)} = E{ p(p)} + ∆
Time
Parameters
mg
Fi = + Hexacopter Model x
6
1 Searching
LQR Controller +
s Algorithm
ẑ attitude
Obstacle
Avoiding
Figure 4.1: System complete model
Position
+
Velocity
−
x K u
Attitude
+
Ang.ratio
−
xf
ψf
Transmitter position p T
Magnetic Dipole m̂
x H (x, p T , m̂) + H
|H|
N (0, Σ) × SNR
[h, ρ]
Ψ = [xi : i = 1..M ] [ p1 , p2 , p3 ]
6
x Range Finder Model di vb = ∑ v(di )ûi × v
i =1
R T (φ, θ, ψ)
Figure 4.4: Obstacle avoidance sub–
block
The receiver output feeds directly the two component of the source
searching algorithm. The field information is transformed in an
intensity and in a direction value to get an exploration direction.
Measured field is used to perform the emulation, as an optimization
problem. It was quite tricky to call the optimizer from Simulink, but
possible using the caller extrinsic directive, alongside with an ex-
ternal evaluation from the Matlab engine, using feval. To speed up
the process, residuals and barrier function results are evaluated us-
ing a mex-function. The parzen window estimation is performed
offline, only as qualitative expression of the quality of the algorithm.
The system shows some problem due to the symmetry of the trans-
mitting field.
72 autonomous vtol for avalanche buried searching avionics
Transmitter position p T
Optimized p T
Emulation
(H − Ĥ)2 = 0
Optimized m̂
4.2 Results
In the next pages some results are reported, for a sample simulation.
simulations 73
10
5
z (m)
10 5
0
15 −5
x (m) −10
−15
20
−20
y (m)
−25
−30
20
10 2
Attitude (rad)
Position (m)
0
1
−10
0
−20
−30
0 20 40 60 80 100 120 140 0 20 40 60 80 100 120 140
3
Angular rate (rad/s)
2 0
Velocity (m/s)
1
−2
−4
−1
0 20 40 60 80 100 120 140 0 20 40 60 80 100 120 140
1
Learned orientation
0.5
−0.5
−1
Time (s)
cos(θ ) cos(θ ) real sin(θ ) sin(θ ) real
10−3
Learned intensity (A/m)
10−4
10−5
10−6
0 20 40 60 80 100 120 140
Time (s)
|H| |H| real
Figure 4.8: The searching routine per-
ceived value. It is important to notice
the monotonic behavior of the H–field
strength. The algorithm succeeds in
finding the direction in which the field
increases.
76 autonomous vtol for avalanche buried searching avionics
0.15
p(ptx,x |H)
0.10
0.05
0.00
−30 −20 −10 0 10 20 30 40 50 60
30 30
Drone position
Transmitter position
20 Optimization results 20
Latest optimization results
Obstacle
10 10
0 0
−10 −10
y (m)
−20 −20
−30 −30
−40 −40
−50 −50
−60 −60
−30 −20 −10 0 10 20 30 40 50 60 0.00 0.05 0.10 0.15
Distance d0 (m)
4
2 )
(m
3 6
d5 π/
0
nce 4
0 50 100 150 a
st 2
Time (s) Di
0
150 0
x
100 50
Tim
s)
e(
e(
Tim
Di 50 100
sta 4
s)
nc
ed 2
π/
3 (m 0 0 150
)
y
Di
sta
nc
150 0 0 ed
2 4π
/3
(m
4 )
Tim
s)
100 50
e(
6
e(
Tim
s)
50 100
0 150
0
Time (s)
2 )
4
(m 150 100 50 0
/3 0
e d2
Distance dπ (m)
π
6
nc
sta
Di 2
The receiver is not the only critical part, some word must be spent
about the complexity of the searching H–field and the transmission
protocol. Even if based upon some strong advantages due to little in-
terference induced by external environment, the protocol is defined
in such a way that is almost impossible to perform a reliable search-
ing routine. The use of one frequency, with such long λ put us in
the difficult situation of searching in near field condition. As we
have already seen, the field lines creates a very difficult shape to be
interpreted.
The protocol has a extremely variable duty cycle, that is not a prob-
lem for a human rescuers, but could introduce issues in our algo-
rithms, that make them unreliable.
Some simpler aspects of a construction of transmitting device are
also locked by the normative, like battery. The use of commercial bat-
teries is forced, while some other form of accumulator, with higher
energy density, may be used. More energy could bring to the use of
different frequency transmitted, to perform searches in near and far
field, and send some more data.
The last element that should be taken into account is the impossibil-
ity to find two or more buried that are close to each other. The signal
overlapping problem do not allow us to understand and sometime
even receive the weaker signal. At this moment the only solution
seems to be an estrangement from the buried found, to try to receive
other beacons signal.
What is suggested in literature is a revision of the searching protocol and
normative, to get a new one more conform to the technology evolution and
to get a signal that is defined in such a way that could be used to perform
an automatic searching routine.
c Speed of light
λ Electromagnetic Wavelength
heff Effective height of loop antenna
µ Magnetic permeability
ε Electric permittivity
r Radio distance vector
ρ Charge density
J Current density
E Electric field
B Magnetic induction field
H Magnetic field
A Vector potential
φ Scalar potential
ψ Lorentz recalibration potential
ω0 Transmitting angular frequency
ωint Transmitting intelligence angular frequency
m Magnetic dipole vector
κ Wavenumber
ptx Transmitter position
Jint Intelligence signal current
Jtx Transmitted signal current
∆ Duty cycle
Vind Induced potential tension
N Number of antenna coils
K Boltzmann constant: 1.38 × 10−23 J/K
R(φ, θ, ψ) Rotation matrix from body to ground
x Haxa–copter state vector
u Hexa–copter control vector
m Mass of the drone
Ib Inertial matrix of the drone
F Total force on hexa–copter body
T Total torque on hexa–copter body
µ State estimation in KF
84 autonomous vtol for avalanche buried searching avionics
z Measurement set in KF
µ
µ̄ State prediction in KF
z̄ Measurement prediction in KF
Σ State estimation covariance in KF
Σ̄ State prediction covariance in KF
wt State noise in KF
Rt State noise covariance in KF
vt Measurement noise in KF
Qt Measurement noise covariance in KF
Kt Kalman Gain
s Radar detection signal
H1 Signal present hypothesis
H0 Signal absent hypothesis
Λ(s) Signal decision likelihood ratio
η Signal decision threshold
Z Decision space
Z1 Decision space signal present
Z0 Decision space signal absent
PD Probability of detection
PM Probability of missed alarm
PC Probability of correct rejection
PF Probability of false alarm
γ(p, h) Kernel function for parzen window estimator
Bibliography
[14] C. Hutchinson et al. The ARRL handbook for radio amateurs. Amer-
ican Radio Relay League, 2000.
[15] Repubblica Italiana. Legge 24/12/2003 n. 363. Gazzetta Ufficiale,
2003.
[16] Heinz E. Knoepfel. Magnetic fields: a comprehensive theoretical
treatise for practical use. John Wiley & Sons, 2008.
[17] James F. Kurose and Keith W. Ross. Computer Networking: A top-
down approach featuring the Internet. Addison-Wesley Reading,
2001.
[18] H.J. Laurent and Carlos A.B. Carvalho. Ferrite antennas for am
broadcast receivers. IRE Transactions on Broadcast and Television
Receivers, 1962.
[19] T. Lund. Signal strength versus signal timing: Achiev-
ing reliability in multiple burial searches. BackCountry Ac-
cess. From https://s3.amazonaws.com/BackcountryAccess/
content/papers/SignalOverlapPaper_001.pdf.