This paper proposes a method for multiple-aircraft conflict avoidance. We assume that aircraft cruise at constant altitude with varying velocities and that conflicts are resolved in the horizontal plane using heading change, velocity change, or a combination thereof. We assume that each aircraft's position, heading, and velocity are available to all aircraft involved in the conflict, we constrain the maneuver to be two straight paths of equal length, and we assume that all aircraft initiate conflict resolution maneuvers at the same time and that once an aircraft has initiated a maneuver, its velocity along the maneuver remains constant. Our multiple-aircraft conflict resolution methodology is presented in two steps; first, we consider an unrealistic but geometrically simple exact conflict, in which the original trajectories of all aircraft collide at a point, in order to derive a closed-form analytic solution for the required heading change, and then we consider a realistic inexact conflict, in which conflict points of multiple aircraft do not coincide. Heading change is a main control input for conflict resolution, yet velocity change is also used for an inexact conflict. We then construct a finite partition of the airspace around the conflict, and using our analytic solution, we derive a protocol for resolving the worst-case conflict within each partition. The result is a multiple-aircraft conflict resolution protocol, or a simple rule which is easily understandable and
As the technological capabilities of automated systems have increased, the use of unmanned aerial vehicles (UAVs) for traditionally exhausting and dangerous manned missions has become more feasible. The United States Army, Air Force, and Navy have released plans for the increased use of UAVs, but have only recently shown interest in the cyber security aspect of UAVs. As a result, current autopilot systems were not built with cyber security considerations taken into account, and are thus vulnerable to cyber attack. Since UAVs rely heavily on their on-board autopilots to function, it is important to develop an autopilot system that is robust to possible cyber attacks. In order to develop a cyber-secure autopilot architecture, we have run a study on potential cyber threats and vulnerabilities of the current autopilot systems. This study involved a literature review on general cyber attack methods and on networked systems, which we used to identify the possible threats and vulnerabilities of the current autopilot system. We then studied the identified threats and vulnerabilities in order to analyze the post-attack behavior of the autopilot system through simulation. The uses of UAVs are increasing in many applications other than the traditional military use. We describe several example scenarios involving cyber attacks that demonstrate the vulnerabilities of current autopilot systems.
To efficiently and safely accommodate the ever increasing air traffic, the concept of the Next Generation Air Transportation System has been proposed and studied in recent years. In this paper, we consider the problem of four-dimensional trajectory prediction and conflict detection, which is one of the key functions of the Next Generation Air Transportation System. A stochastic linear hybrid system is proposed to describe the dynamics of an aircraft with changing flight modes. The stochastic linear hybrid system can have two different discrete-state transition models depending on the availability of flight plans (or aircraft intent): the Markov transition model and state-dependent transition model. The state-dependent transition model can incorporate the prior information about an aircraft's intent. Based on the proposed model, an algorithm for the probabilistic reachability analysis of the stochastic linear hybrid system is proposed for aircraft four-dimensional trajectory prediction. To detect a midair conflict between aircraft, a computationally efficient algorithm is developed based on the cumulative distribution function approximation for the quadratic form of Gaussian random variables. The performance of the proposed algorithms is validated through an illustrative air traffic scenario. Nomenclature= discrete state of a hybrid system T = look-ahead time horizon in trajectory prediction T s = sampling time v = observation noise w = process noise x = continuous state of a hybrid system z = radar observations/predicted observations = Markov transition matrix = discrete-state transition function ; ; h = coordinate in the local navigation frame
The pyrolysis residue (SP) of sewage sludge (SS) produced at 500 °C was subjected to batch and column leaching tests to investigate the release of its organic and inorganic constituents and metals. For comparison, incineration ash (SI) obtained from a SS incinerator was also tested. Pyrolysis and incineration reduced organic matter of SS from 0.78 kg kg -1 -dry SS to 0.16 and 0.01 kg kg -1 -dry SS, respectively. Heavy metals remained in SP without being volatilized, although Cd and Pb were transferred into the off-gas during incineration.In the batch leaching test with the leaching liquid-to-solid mass ratio (L/S) = 10, the pH of the SS, SP, and SI filtrates was 6.3, 7.9, and 11.0, respectively. The total organic carbon concentrations were in the order SS (877l mg l -1 ) >> SP (99 mg l -1 ) > SI (26 mg l -1 ). The SP and SI filtrates met the landfill standard for the Cd and Pb concentrations (< 0.3 mg l -1 ). In the column tests, although the SP contained more organic matter than that of SI, its carbon discharge into the leachate under aerobic conditions was similar to that of SI under anaerobic conditions. The leaching of heavy metals, such as Cd, Cr, Pb, and Zn, was also suppressed in SP during the active decomposition of organic matter.We demonstrated that pyrolysis reduces the potential release of pollutants from sewage sludge in landfill, making it a promising method of treating sewage sludge before landfilling.
Cyber security has emerged as one of the most important issues in unmanned aerial systems for which the functionality heavily relies on onboard automation and intervehicle communications. In this paper, potential cyber threats and vulnerabilities in the unmanned aerial system's state estimator to stealthy cyber attacks are identified, which can avoid being detected by the monitoring system. Specifically, this paper investigates the worst stealthy cyber attack that can maximize the state estimation error of the unmanned aerial system's state estimator while not being detected. First, the condition that the system is vulnerable to the stealthy cyber attacks is derived, and then an analytical method is provided to identify the worst stealthy cyber attack. The proposed cyber attack analysis methods are demonstrated with illustrative examples of an onboard unmanned aerial system navigation system and an unmanned aerial system tracking application. Nomenclature A, B = system matrices a c , a o = cyber attack vectors B c , B o = cyber attack matrices C = observation matrix E 1 , E 2 = noise input matrices e a = estimation error subject to cyber attacks F = equality constraint matrix h = threshold value J, Φ = objective functions k = time index L = steady-state Kalman gain L = Lagrange function N = discrete-time horizon Q = process noise covariance matrix Q oa , Q ca = controllability matrices R = measurement noise covariance matrix r = residual vector u = input vector v = measurement noise vector W c = controllability gramian w = process noise vector x a = state vector subject to cyber attackŝ x a = state estimate subject to cyber attacks y a = output vector subject to cyber attacks μ, ν = Lagrange multipliers Σ = estimation error covariance matrix Σ p = predicted error covariance matrix Σ r = residual covariance matrix X = optimization variable Ω = inequality constraint function
The problem of estimating the discrete and continuous state of a stochastic linear hybrid system, given only the continuous system output data, is studied. Well established techniques for hybrid estimation, known as the Multiple Model Adaptive Estimation algorithm, and the Interacting Multiple Model algorithm, are first reviewed. Conditions that must be satisfied in order to guarantee the convergence of these hybrid estimation algorithms are then presented. These conditions also provide a means to predict, as a function of the system parameters, which transitions in a hybrid system are relatively easy to detect. A new variant of hybrid estimation algorithms, called the Residual-Mean Interacting Multiple Model (RMIMM) algorithm, is then proposed and analyzed. The performance of RMIMM is demonstrated through multi-modal aircraft trajectory tracking examples.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.