An Efficient Trajectory Negotiation and Verification Method Based on Spatiotemporal Pattern Mining

被引:0
|
作者
Liu, Yongqi [1 ]
Wang, Miao [1 ]
Zhong, Zhaohua [2 ]
Zhong, Kelin [3 ]
Wang, Guoqing [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Aeronaut & Astronaut, Shanghai, Peoples R China
[2] China Aeronaut Radio Elect Res Inst, Shanghai, Peoples R China
[3] COMAC Shanghai Aircraft Design & Res Inst, Shanghai, Peoples R China
基金
上海市自然科学基金;
关键词
Advanced traffic management systems - Air transportation - Aircraft - Data mining - Flight paths;
D O I
10.1155/2023/5530977
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
In trajectory-based operations, trajectory negotiation and verification are conducive to using airspace resources fairly, reducing flight delay, and ensuring flight safety. However, most of the current methods are based on route negotiation, making it difficult to accommodate airspace user-initiated trajectory requests and dynamic flight environments. Therefore, this paper develops a framework for trajectory negotiation and verification and describes the trajectory prediction, negotiation, and verification processes based on a four-dimensional trajectory. Secondly, users predict flight trajectories based on aircraft performance and flight plans and submit them as requested flight trajectories to the air traffic management (ATM) system for negotiation in the airspace. Then, a spatiotemporal weighted pattern mining algorithm is proposed, which accurately identifies flight combinations that violate the minimum flight separation constraint from four-dimensional flight trajectories proposed by users, as well as flight combinations with close flight intervals and long flight delays in the airspace. Finally, the experimental results demonstrate that the algorithm efficiently verifies the user-proposed flight trajectory and promptly identifies flight conflicts during the trajectory negotiation and verification processes. The algorithm then analyzes the flight trajectories of aircrafts by applying various constraints based on the specific traffic environment; the flight combinations which satisfy constraints can be identified. Then, based on the results identified by the algorithm, the air traffic management system can negotiate with users to adjust the flight trajectory, so as to reduce flight delay and ensure flight safety.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Semantic trajectory-based event detection and event pattern mining
    Wang, Xiaofeng
    Li, Gang
    Jiang, Guang
    Shi, Zhongzhi
    KNOWLEDGE AND INFORMATION SYSTEMS, 2013, 37 (02) : 305 - 329
  • [32] Semantic trajectory-based event detection and event pattern mining
    Xiaofeng Wang
    Gang Li
    Guang Jiang
    Zhongzhi Shi
    Knowledge and Information Systems, 2013, 37 : 305 - 329
  • [33] Travel Trajectory Frequent Pattern Mining Based on Differential Privacy Protection
    Wang, Weiya
    Yang, Geng
    Bao, Lin
    Ma, Ke
    Zhou, Hao
    Bai, Yunlu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [34] Mining individual behavior pattern based on semantic knowledge discovery of trajectory
    Ren, Min
    Yang, Feng
    Zhou, Guangchun
    Wang, Haiping
    Journal of Computing and Information Technology, 2015, 23 (03) : 245 - 254
  • [35] Spatiotemporal Mining of Time-Series Remote Sensing Images Based on Sequential Pattern Mining
    Liu, H. C.
    He, G. J.
    Zhang, X. M.
    Jiang, W.
    Ling, S. G.
    ISPRS International Workshop on Spatiotemporal Computing, 2015, : 111 - 118
  • [36] Semantic Trajectory Frequent Pattern Mining Method with Fuzzy Stay Time Constraint
    Li, Aiguo
    Fu, Jiahao
    Gao, Ruifang
    Yang, Jie
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [37] Highly Efficient Pattern Mining Based on Transaction Decomposition
    Djenouri, Youcef
    Lin, Jerry Chun-Wei
    Norvag, Kjetil
    Ramampiaro, Heri
    2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 1646 - 1649
  • [38] SiFT: An efficient method for trajectory based forwarding
    Capone, A
    Pizziniaco, L
    Filippini, I
    de la Fuente, MAG
    2nd International Symposium on Wireless Communications Systems 2005 (ISWCS 2005), 2005, : 135 - 139
  • [39] Efficient pattern-based verification of connections to IP cores
    Polian, I
    Günther, W
    Becker, B
    10TH ASIAN TEST SYMPOSIUM, PROCEEDINGS, 2001, : 443 - 448
  • [40] WhereNext: a Location Predictor on Trajectory Pattern Mining
    Monreale, Anna
    Pinelli, Fabio
    Trasarti, Roberto
    Giannotti, Fosca
    KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, : 637 - 645