This document proposes integrating trajectory-oriented air traffic management with airborne separation assistance systems. It describes today's sector-oriented air traffic control system and proposed strategic trajectory-based approaches. The concept integrates these by generating conflict-free trajectories meeting time constraints, while allowing aircraft to maintain local spacing using airborne systems when needed. This combines benefits of both approaches. The concept could be implemented incrementally using emerging technologies and procedures. Research is still needed to further develop and evaluate integrating trajectory planning with airborne separation assistance.
Improving Flight Inspection by Automation Processmdmannino
Introduction of Area Navigation and PBN let the activity of a modern Flight Inspection department become more and more challenging, because the instrument flight procedures validation effort, which brings changes and workload, has been added to the well known commissioning and periodic flight checking activity.
Mission planning support.
Task Management.
Document repository.
Repository for the data collected during the flight check.
Post-processing tool.
Improving Flight Inspection by Automation Processmdmannino
Introduction of Area Navigation and PBN let the activity of a modern Flight Inspection department become more and more challenging, because the instrument flight procedures validation effort, which brings changes and workload, has been added to the well known commissioning and periodic flight checking activity.
Mission planning support.
Task Management.
Document repository.
Repository for the data collected during the flight check.
Post-processing tool.
The Challenge We Face
Minimal separation and rapid pace.
High-speed operations with little margin for error.
Complex environment.
Low visibility in poor weather.
Combination of Factors Minimizes Safety Margin
The Challenge We Face
Minimal separation and rapid pace.
High-speed operations with little margin for error.
Complex environment.
Low visibility in poor weather.
Combination of Factors Minimizes Safety Margin
This presentation was given by the Industry Co-Chair of the CASA UASSC at the AAUS "RPAS in Australian Skies Conference", June 2017.
It provides a refresher on CASA UAS Standards Sub-Committee Roadmap approach alongside a better methods for identifying the intrinsic Air Risk for use in the JARUS SORA, (proposed by Dr Aaron McFadyen from QUT) alongside more detail on some of the challenges embedded within CNPC expectations, particularly in reference to separation distances and ATC intervention.
Optimizing precision final approach through gbasIrfan iftekhar
Rhis work proposes a way to interoperate between several Navigation Satellites, i.e. GPS, GLONASS and GALILEO, and possibly the Chinese COMPASS/Beidou and the Indian IRNSS (FAA 2013).
PROUDCTION AND OPERATION MANAGEMENT.pptxSouvik Das
- Assessed research papers to evaluate the most apt model used by FedEX for optimum Airline cargo dynamic logistic algorithms - Operations research LPP with aircraft regression equations and incidence matrix for obtaining the most optimum cargo routes
Automatic Landing of a UAV Using Model Predictive Control for the Surveillanc...AM Publications
The objective of this paper is to provide safe landing of an UAV on any demanding conditions and can be very useful during the period of floods, rescuing the affected people. It can be also be useful in military operations. This system provides stable method for landing of an aircraft. Image processing technique is used to capture the image and find the angle of inclinations. MATLAB produces four types of image through Image processing technique. They are Gray image, Edge Detection image, Histogram image, object detection image. MATLAB sends the histogram signal to microcontroller using UART. It is used to convert the received parallel data into serial data for transmitting the data to longer distance. Relay drives the DC motor. Angle of inclinations is measured according to the detected image of the surface. MATLAB produces the total inclination value of the surface. DC motor automatically adjusts the landing gear according to the obtained input inclination value of the surface. An UAV is programmed to adjust the landing gear according to angle of inclination. When the landing surface is detected for landing the aircraft, it automatically adjusts the landing gear and lands the aircraft according to the inclined surface of the landing area.
The object of the hackathon was to demonstrate thought leadership through the sharing of knowledge, best practices, and networking on topics and themes related to digital innovation in supply chain management and operations. The hackathon competition was meant to inspire, empower and enable emerging talent to innovate by developing new solutions, approaches, and applications to existing challenges in the supply chain.
Our application, Trux, which stood for Transportation Reusability User Experience, is aimed at understanding and correcting structured traffic congestion for companies within the supply chain and operations areas of the import and export industry. Trux helps commercial businesses who seek to better understand how new technology and innovation will impact their supply chain.
The advantages of Trux , allows entities like the Port of Los Angeles to monitor trucks in route from their location to the warehouse to the port and vice versa. Allows a one-hour window period for given location(e.g. warehouse) pickup. Uses a 10-minute window for Drop-off at Port Of Los Angeles with respect to
Trux uses jQuery, Javascript, AngularJS, C#/.NET, Visual Studio & Data from Port Of Los Angeles, CA.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Pushing the limits of ePRTC: 100ns holdover for 100 days
ATM Concept 4D ASAS and TFM
1. 22nd Digital Avionics Systems Conference Indianapolis, IN, October 2003
ATM Concept Integrating Trajectory-Orientation and
Airborne Separation Assistance in the Presence of Time-
based Traffic Flow Management
Thomas Prevot, Stephen Shelden, Joey Mercer
San Jose State University/NASA Ames Research Center, Moffett Field, CA
Parimal Kopardekar,
Federal Aviation Administration/NASA Ames Research Center, Moffett Field, CA
Everett Palmer, Vernol Battiste
NASA Ames Research Center, Moffett Field, CA
2. Contents
• Introduction
• Layers in the air traffic system
– Tactical ATC system
– Strategic trajectory-based system
– Proposed system
• Concept for integrating trajectory orientation and ASAS
– Concept definition
– Illustration
• Concept Implementation
– Near-term: Ground based trajectory planning and limited
delegation
– Mid-term: Incremental integration of new CNS and DSTs
– Far-term: Autonomous trajectory planning and spacing
• Concluding remarks
3. Introduction
• Today’s tactical “sector-oriented” air traffic control:
– Safe
– Can cause inefficiencies
– Limited by controller workload and frequency congestion
• Different approaches to address the inefficiencies and
limitations
– 4D Trajectory-based approaches (strategic)
– Use of Airborne Separation Assistance Systems (ASAS)
(tactical)
• Proposal:
– Combine both approaches to achieve “the best of both
worlds”*
*Graham, R., E. Hoffmann, C. Pusch, and K. Zeghal, 2002, Absolute versus Relative Navigation:
Theoretical Considerations from an ATM Perspective, e.g. ATM 2003
4. Today’s Tactical Air Traffic System
Flight
progress
Flight execution
Evaluate
airspace/flow
constraints
Flow Constraints
(Miles in Trail,
Meter Times)
Proceed along
filed route
yes
no
Proceed along
radar vectors
Separation
or flow
conformance
required
?
Evaluate
local traffic
situation
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
Flight
progress
Flight execution
Evaluate
airspace/flow
constraints
Flow Constraints
(Miles in Trail,
Meter Times)
Proceed along
filed route
yes
no
Proceed along
radar vectors
Separation
or flow
conformance
required
?
Evaluate
local traffic
situation
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
Today’s tactical air traffic system is focused on separation management. Traffic flow
management provides flow constraints to the flight execution (i. e. air traffic control) layer.
5. Today’s Tactical Air Traffic System
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Flight
progress
Flight execution
Evaluate
airspace/flow
constraints
Flow Constraints
(Miles in Trail,
Meter Times)
Proceed along
filed route
yes
no
Proceed along
radar vectors
Separation
or flow
conformance
required
?
Evaluate
local traffic
situation
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
Flight
progress
Flight execution
Evaluate
airspace/flow
constraints
Flow Constraints
(Miles in Trail,
Meter Times)
Proceed along
filed route
yes
no
Proceed along
radar vectors
Separation
or flow
conformance
required
?
Evaluate
local traffic
situation
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
• Relies heavily on the skills of air traffic controllers and traffic flow
managers
• Requires little automation (simple algorithms in the host computer)
• Separation management is primary objective
• Safe, but not as efficient as it could be
6. Strategic trajectory-based system
Flight
progress
Trajectory
planning
Flight execution
Evaluate
airspace/flow
constraints
Create
conflict free
trajectory
4D
Trajectory
Time
constraints Proceed along
4D trajectory
Aircraft
state
4D
Trajectory
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
Flight
progress
Trajectory
planning
Flight execution
Evaluate
airspace/flow
constraints
Create
conflict free
trajectory
4D
Trajectory
Time
constraints Proceed along
4D trajectory
Aircraft
state
4D
Trajectory
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
In a pure trajectory-based system, aircraft should always fly along up to date 4D
trajectories that need to be conflict-free and conform to TFM constraints.
7. Strategic trajectory-based system
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Flight
progress
Trajectory
planning
Flight execution
Evaluate
airspace/flow
constraints
Create
conflict free
trajectory
4D
Trajectory
Time
constraints Proceed along
4D trajectory
Aircraft
state
4D
Trajectory
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
Flight
progress
Trajectory
planning
Flight execution
Evaluate
airspace/flow
constraints
Create
conflict free
trajectory
4D
Trajectory
Time
constraints Proceed along
4D trajectory
Aircraft
state
4D
Trajectory
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
• Benefits in terms of flight predictability, efficiency, and workload
• Faces challenges in the areas of trajectory de-confliction and tool
capability
• High requirements on automation capabilities and CNS infrastructure
• Can cause problems for controllers and pilots who have to evaluate,
manipulate and communicate the trajectories
• In a purely trajectory-based system, controllers and pilots would have
to adjust trajectories for local problems that could otherwise be handled
by one or two tactical instructions.
8. Integrating Trajectory-Orientation and ASAS
Flight
progress
Trajectory planning Flight execution
Evaluate
airspace/flow
constraints
Create
conflict free
trajectory
Trajectory
meets time
constraints
?
4D
Trajectory
Time
constraints
no
Proceed along
4D Trajectory
Next time
constraint
achievable
?
yes
yes
no
Proceed relative
to other aircraft
Relative
spacing
required
?
Evaluate
trajectory and
local traffic
situation
no
Aircraft
state
4D
Trajectory
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
Flight
progress
Trajectory planning Flight execution
Evaluate
airspace/flow
constraints
Create
conflict free
trajectory
Trajectory
meets time
constraints
?
4D
Trajectory
Time
constraints
no
Proceed along
4D Trajectory
Next time
constraint
achievable
?
yes
yes
no
Proceed relative
to other aircraft
Relative
spacing
required
?
Evaluate
trajectory and
local traffic
situation
no
Aircraft
state
4D
Trajectory
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
Proposed system: time-based traffic flow management and trajectory-
orientation are augmented by a tactical relative spacing loop. Feedback
between the layers is event-driven and not continuous.
9. Integrating Trajectory-Orientation and ASAS
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Flight
progress
Trajectory planning Flight execution
Evaluate
airspace/flow
constraints
Create
conflict free
trajectory
Trajectory
meets time
constraints
?
4D
Trajectory
Time
constraints
no
Proceed along
4D Trajectory
Next time
constraint
achievable
?
yes
yes
no
Proceed relative
to other aircraft
Relative
spacing
required
?
Evaluate
trajectory and
local traffic
situation
no
Aircraft
state
4D
Trajectory
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
Flight
progress
Trajectory planning Flight execution
Evaluate
airspace/flow
constraints
Create
conflict free
trajectory
Trajectory
meets time
constraints
?
4D
Trajectory
Time
constraints
no
Proceed along
4D Trajectory
Next time
constraint
achievable
?
yes
yes
no
Proceed relative
to other aircraft
Relative
spacing
required
?
Evaluate
trajectory and
local traffic
situation
no
Aircraft
state
4D
Trajectory
Traffic flow
management
NAS
state
Filed
flight
plans
Airline
inputs
• Time-based traffic flow management on a NAS-wide and local level
assures that local airspace areas are not overloaded at any given time
• Trajectory-based operations are used to plan and execute conflict free
flight paths for upcoming flight segments.
• Together, these operations put flight crews in a position to utilize
Airborne Separation Assistance Systems (ASAS) to deal with local
separation issues, if instructed or permitted by the controller to do so
10. Integrating Trajectory-Orientation and ASAS
Concept
• Use trajectory-based operations to create efficient,
nominally conflict-free trajectories that conform to
traffic management constraints and,
• maintain local spacing between aircraft with airborne
separation assistance
11. Envisioned Benefits
It is intended that the concept:
• Takes full advantage of the traffic flow management benefits of
the trajectory-oriented approach
• Reduce to a minimum any additional conflict resolution buffers
arising out of prediction uncertainty
• Reduces controller workload increases controller availability
• Minimally impacts flight crew workload.
• Has a positive effect on controller and flight crew traffic
awareness
• Limits the deviations from the 4D path to short-term deviations
mostly due to speed changes, thereby minimizing the medium to
long-term prediction uncertainty
• Minimizes lateral route and/or altitude changes for local
separation assurance
13. Trajectory Oriented Operations with Limited Delegation
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
2.5NM
3NM
Strategy:
Generate a set of conflict free trajectories with small buffers for flight deck based
spacing inaccuracies that meet the metering constraints, communicate the trajectory
change points to the flight crew and delegate the spacing tasks to the flight crew.
14. Trajectory Oriented Operations with Limited Delegation
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
2.5NM
3NM
The trajectories can be designed with minimal buffers to precondition the aircraft
properly and meet the metering constraints precisely. The spacing will be fine-tuned
by the flight crew dynamically.
15. Trajectory Oriented Operations with Limited Delegation
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
Metering
Fix
D
B
A
C
2.5NM
3NM
The metering constraints can be defined with minimal separation buffers and the
aircraft handle the merge and follow each other into the next airspace (e.g.
TRACON)
16. Concept Implementation
• Near-term:
– Ground-side:
• Trajectory tools
• Conflict detection tools
• Could use standard trajectories (airways, STARs, approach transitions)
• Simple spacing assignment and monitoring function
– Air-side
• Improved surveillance e.g. ADS-B
• Traffic display
• Simple state-based spacing algorithm
• Medium to Far-term
– Ground-side:
• CD&R tools
• Trajectory negotiation capabilities (e.g. integrated CPDLC)
• Support for autonomous operations
– Air-side
• Trajectory tools
• CDTI with CD&R capabilities
• Trajectory negotiation capabilities (e.g. integrated CPDLC)
• Advanced self spacing capabilities (local free maneuvering)
• Autonomous Operations
17. Near-Term Implementation
Ground-based trajectory planning and limited
delegation of spacing task to properly equipped
aircraft
• Ground-side
– Utilize existing ground-based trajectory tools like CTAS to
generate TFM conforming 4D trajectories
– Use route evaluation tools to alert controllers to upcoming
spacing problems
– Uplink trajectories via CPDLC to equipped aircraft, if
available
– Delegate spacing task to ASAS equipped aircraft
• Air-Side
– Utilize Flight Management System to follow generated
trajectories
– Use CPDLC for receiving and loading of more complex
trajectories
– Use ASAS equipment for speed-centric spacing operations
18. Mid-Term Implementation
Incremental Integration of new CNS and DSTs
and controlled paradigm shit
• Incremental integration of new Technologies:
– CNS e.g. ADS-B, TIS-B, CPDLC
– ground-side automation e.g. EDA
– flight deck automation e.g. CDTI
as their underlying algorithms mature and human-automation-
integration issues are thoroughly researched and addressed.
• Control paradigm shifts can occur slowly and be controlled by
operational procedures rather than dictated by new automation
• The initial very limited delegation of tasks will give flight crews and
controllers initial experience with new execution/monitoring roles
• The delegation of more degrees of freedom provides controller and
flight crew feedback and operational performance data in a safe
environment at different levels of automation integration and separation
authority
• Trajectory planning can migrate to a distributed process of air and
ground operations
• Enabling of advanced operational concepts like DAG-TM CE6
“trajectory negotiation” and CE 5 “free maneuvering”
19. Far-Term Implementation
Autonomous trajectory planning and spacing of free
maneuvering aircraft
• Appropriately equipped aircraft can plan trajectories and
execute the flight autonomously as long as the trajectories
– don’t create immediate conflicts
– comply with TFM constraints and
– are communicated to other participants.
• Flight deck and ground-side trajectories only need to be de-
conflicted with minimal separation buffers, because the ASAS
layer is still intact to support relative spacing operations.
• Flight Crews could detect the need for resolving a local spacing
problem autonomously and switch to the ASAS mode while the
problem exists.
• Controllers support lesser equipped aircraft with trajectory
planning tasks and delegate limited spacing tasks or issue radar
vectors
20. Concept Implementation: Ground side example
Mock-up of a display system replacement (DSR) center controller display with
trajectory information on timeline and spacing information in data tag and aircraft
history circle
21. Concept Implementation: Air side example
Flight deck display prototype indicating the ownship position relative to the desired
spacing position (historical position of the lead aircraft 90 seconds ago)
The advised speed command is displayed in the upper left corner
Slow
Fast
Optimal
Slow
Fast
Optimal
23. Concluding Remarks
The concept:
Use trajectory-based operations to create efficient, nominally conflict-free
trajectories that conform to traffic management constraints and,
maintain local spacing between aircraft with airborne separation
assistance.
• Integrates two promising approaches
• Shows a potential for maintaining high safety and improving efficiency over
today’s system
• Can be implemented evolutionarily, and an immediate paradigm shift by air
traffic controllers and pilots is not required
• Can build on existing tools and strategies, can provide immediate and emergent
benefits, and is compatible with advanced DAG-TM concepts
• The benefits of trajectory-based operations can be realized without having to
generate completely de-conflicted routes with ‘buffers’ for prediction uncertainty
• Flight crews monitoring ‘local’ situations in addition to ground controllers, is a
further level of operational safety – a second set of eyes
• Research is required and planned to further develop and
evaluate this concept