Results 41 to 50 of about 645,822 (205)

Identification Method of Critical Routes in Aviation Network Based on Double Capacity Identification Standard

open access: yesHangkong gongcheng jinzhan, 2019
A method of identifying critical routes in the aviation network based on dual capacity identification standard is used for improving the singleness of the traditional identification method and incomplete evaluation index of network performance.
Li Jiawei   +4 more
doaj   +1 more source

Robustness Analysis of Flight Conflict Networks Based on Degree Correlation

open access: yesIEEE Access, 2022
Analyzing the composition and robustness of flight conflicts is beneficial to find the vulnerable sources of conflicts and dissipate flight conflicts, and effectively improve the safety and operational efficiency of air traffic.
Fugen Lin   +3 more
doaj   +1 more source

Research on Integrated Decision-Control Cooperative Target Assignment for Cross-Domain Unmanned Systems Based on a Bi-Level Optimization Framework

open access: yesDrones
Addressing prevalent challenges in current cooperative task assignment methods for cross-domain unmanned swarm, such as the disconnection between decision-making and execution processes, and the inadequate incorporation of platform kinematic constraints,
Aoyu Zheng   +4 more
doaj   +1 more source

An Unsupervised Situation Awareness Framework for UAV Sensor Data Fusion Enabled by a Stabilized Deep Variational Autoencoder

open access: yesSensors
Effective situation awareness relies on the robust processing of high-dimensional data streams generated by onboard sensors. However, the application of deep generative models to extract features from complex UAV sensor data (e.g., GPS, IMU, and radar ...
Anxin Guo   +5 more
doaj   +1 more source

Management of threats and errors in normal operations of assistant controllers : a thesis presented in partial fulfilment of the requirements for the degree of Master in Aviation at Massey University [PDF]

open access: yes, 2007
"To err is indeed human, so to err is normal" Human errors are usually pronounced in accident or incident reports. Seldom does one pay enough attention to these errors during daily normal operations as these either go unnoticed or unreported for ...
Yeung, Timothy Kwan Chi
core  

Evaluation Method of Usability of Low Altitude Airspace ResourcesBased on the Regression Analysis

open access: yesHangkong gongcheng jinzhan, 2019
Low altitude airspace resources has always been the development bottleneck of the general aviation industry, and is also one of the key factors in restricting the development of general aviation in China. Based on theoretical research and field research,
Wang Zekun   +4 more
doaj   +1 more source

Air Traffic Safety: continued evolution or a new Paradigm. [PDF]

open access: yes, 2007
The context here is Transport Risk Management. Is the philosophy of Air Traffic Safety different from other modes of transport? – yes, in many ways, it is.
Brooker, Peter
core  

Satellites at work (Space in the seventies) [PDF]

open access: yes, 1971
The use of satellites in the areas of communications, meteorology, geodesy, navigation, air traffic control, and earth resources technology is discussed.
Corliss, W. R.
core   +1 more source

Research on Congestion Situation Relief in Terminal Area Based on Flight Path Adjustment

open access: yesAerospace
With the continuous growth of air transportation demand, air traffic congestion in the Terminal Area has become increasingly serious. In order to assist controllers in efficiently alleviating the traffic congestion situation in the Terminal Area, this ...
Yuren Ji   +3 more
doaj   +1 more source

Low Visibility: The Fate of Air Traffic Control Privatization [PDF]

open access: yes, 2016
This paper assesses plans to create an independent air traffic control corporation. While the plans being considered don't seem to offer the benefits that could result from privatization (the possible downsides are not being noted here), they also do not
Max B. Sawicky
core  

Home - About - Disclaimer - Privacy