Method, system and equipment for analyzing threat influence of air traffic control system

文档序号:8909 发布日期:2021-09-17 浏览:66次 中文

1. A threat influence analysis method for an air traffic control system is characterized by comprising the following steps:

constructing an airport-airway-sector network topological structure of an air traffic control system to be analyzed;

determining constraint conditions and objective functions of an air traffic control system to be analyzed, and acquiring flight actual paths;

when the air traffic control system to be analyzed is not threatened, constructing an airport normal queuing model, and calculating the total delay time of all flights in the air traffic control system to be analyzed, namely obtaining the normal operation delay of the system;

when the air traffic control system to be analyzed is threatened, updating the actual flight path according to the external threat characteristics; constructing a threatened airport queuing model; calculating the total delay time of all flights in the air traffic control system to be analyzed under the current threat, namely obtaining the delay of the system after the threat;

obtaining a comparison result of the current threat influence by using the normal operation delay of the system and the delay of the system after the system is threatened;

and obtaining a threat influence analysis result of the air traffic control system according to the comparison result of different threat influences.

2. The method according to claim 1, wherein the airport-route-sector network topology comprises an airport network layer, a route network layer and a sector network layer;

in the airport network layer, an airport is used as an airport network node, and two airport connecting lines with flight direct flight connection are used as airport network connecting edges; in the route network layer, airport points and route points are used as route network nodes, route network node connecting lines with route setting are used as route network connecting edges, and a directed network is constructed by adopting a standard instrument departure program and a standard approach program to obtain the route network layer; in the sector network layer, each sector in the airspace is used as a sector network node, and a sector network node connecting line with flight handover is used as a sector network connecting edge; the airport network nodes in the airport network layer correspond to the airport points in the route network layer one by one, and the airport network nodes and the route network nodes respectively have membership relations with the sector network nodes.

3. The method of claim 1, wherein the constraints of the air traffic control system to be analyzed include airport capacity limit, sector capacity limit, and flight path length limit;

the airport capacity is limited to the maximum times of flight take-off and landing procedures which can be processed by the airport in a preset time period; the capacity of the sector is limited to the maximum number of airplanes which can provide control services at any time by the sector; the flight path length is limited to the maximum length of the fuel carried by the flight direct flight aircraft to enable the aircraft to fly;

the objective function of the air traffic control system to be analyzed is the actual delay of the flight.

4. The method of claim 3, wherein the flight actual path is a flight path corresponding to the minimum objective function value of the air traffic control system to be analyzed.

5. The method of claim 1, wherein the delay of normal operation of the computing system is as follows:

setting safety interval parameters between flights according to airport characteristics;

dividing a time period to be analyzed into a plurality of time parts, and judging flight taking-off and landing procedures of each time part according to the safety interval parameters among flights to obtain an airport normal queuing model;

and executing the take-off and landing programs of all the flights according to the normal queuing model of the airport and the actual paths of the flights, and calculating to obtain the total delay time after the take-off and landing programs of all the flights are executed, namely obtaining the normal operation delay of the system.

6. The method as claimed in claim 1, wherein the delay process after the computing system is threatened is as follows:

updating constraint conditions of the air traffic control system to be analyzed according to different threat modes, threat duration and influence characteristics of threat targets, and updating flight actual paths by combining target functions of the air traffic control system to be analyzed to obtain updated flight actual paths;

setting safety interval parameters between flights under the influence of the threat according to the characteristics of the airport and the influence of the threat on the airport by the system;

dividing a time period to be analyzed into a plurality of time parts, and judging flight taking-off and landing programs of each time part according to time sequence according to safety interval parameters between flights influenced by threats to obtain a threatened airport queuing model;

and executing the take-off and landing programs of all the flights according to the threatened airport queuing model and the updated flight actual path, and calculating to obtain the total delay time after the take-off and landing programs of all the flights are executed, namely obtaining the delay of the system after the system is threatened.

7. The method as claimed in claim 1, wherein the comparison result of the current threat effects is a delay difference between a delay after the system is threatened and a delay of normal operation of the system.

8. The method of claim 7, wherein the process of obtaining the threat impact analysis result of the air traffic control system comprises:

evaluating the threat suffered by the system according to the delay difference value to obtain the threat influence analysis result of the air traffic control system; the larger the delay difference value is, the larger the influence degree of the air traffic control system is under the corresponding threat.

9. A threat influence analysis system of an air traffic control system is characterized by comprising a network module, a path module, a first calculation module, a second calculation module, an influence comparison module and an analysis module;

the network module is used for constructing an airport-airway-sector network topological structure of the air traffic control system to be analyzed;

the path module is used for determining constraint conditions and target functions of the air traffic control system to be analyzed and acquiring the actual path of the flight;

the system comprises a first calculation module, a second calculation module and a third calculation module, wherein the first calculation module is used for constructing an airport normal queuing model when the air traffic control system to be analyzed is not threatened, and calculating the total delay time of all flights in the air traffic control system to be analyzed, namely the normal operation delay of the system;

the second calculation module is used for updating the actual flight path according to the external threat characteristics when the air traffic control system to be analyzed is threatened; constructing a threatened airport queuing model; calculating the total delay time of all flights in the air traffic control system to be analyzed under the current threat, namely the delay of the system after the threat;

the influence comparison module is used for obtaining a current threat influence comparison result by utilizing the normal operation delay of the system and the delay of the system after the system is threatened;

and the analysis module is used for obtaining a threat influence analysis result of the air traffic control system according to the comparison result of different threat influences.

10. An air traffic control system threat impact analysis apparatus comprising a memory, a processor, and executable instructions stored in the memory and executable in the processor; the processor, when executing the executable instructions, implements the method of any of claims 1-8.

Background

The air traffic control system monitors and controls the flight activities of the airplane by using communication, navigation technology and monitoring means, so that the flight safety and the flight order are ensured; meanwhile, the air traffic control system is also responsible for planning air routes of the airplane, effectively maintains and promotes air traffic safety, maintains air traffic order and ensures smooth air traffic; the air traffic control system comprises three parts, namely air traffic service, air traffic flow management and airspace management; the air traffic control system divides the airspace of the flight route into different management airspaces including an air route, a flight information management area, an approach management area, a tower management area, a waiting airspace management area and the like, and requires that the aircraft communicates with different traffic control facilities (such as navigation equipment, a radar system, a secondary radar, communication equipment and a ground control center) according to the difference of the management areas at different flight stages, so that the traffic control system monitors, identifies and guides the aircraft in the coverage area, and the safe flight of the aircraft is ensured.

With the continuous increase of the air transportation demand, the number of aircrafts is more and more, and the requirement on the control of the air traffic flow is gradually increased; modern Air traffic control systems reduce the occurrence of traffic congestion and delay phenomena by increasingly using digital techniques to enhance the control and perception of airspace, such as the Next Generation Air transport System (Next Generation Air transport System, Next Generation) in the united states, SESAR (Single European Sky's ATM Research) in europe; by improving the safety, efficiency, capacity, accessibility, flexibility, predictability and elasticity of an airspace system and reducing the influence on the environment, the guidance from the traditional control from 'roadside to roadside' to the accurate control 'door to door' is realized by combining a satellite technology, a data chain technology and a computer network technology.

The air traffic control System is a typical network Physical System (CPS), and realizes expected performance by integrating calculation, communication and control, although better control and less delay can be achieved in an ideal state after combining emerging digital technology, so that the air control efficiency is effectively improved; but at the same time, the threat surface of the system is also expanded, wherein at the physical level, the attacks of some typical faults and physical devices also affect the air traffic control system; on a network level, the air traffic control system seriously depends on an information system, and can bring higher network threat along with the continuous development of the information network threat; the united states federal aviation administration report also indicates a need to improve network security and recovery capabilities of the National Airspace System (NAS). In the real world, hacker intrusions into air traffic systems do also exist, the frequency of system outages is also increasing, and failures and threats are becoming more common, diverse and influential.

The air traffic control system is a complex and interactive system, and the damage of the system can cause complex propagation influence in the whole air transportation network, thereby complicating network scheduling and routing, reducing system efficiency and even influencing flight safety; therefore, it is very important to analyze the threat impact of the air traffic control system. In order to optimize the existing system, reasonably arrange flights, enhance the protection of fragile nodes in the system and improve the safety, robustness and elasticity of the air traffic control system, the air traffic control system needs to be reasonably modeled and analyzed.

The threat analysis method of the existing air traffic control system mainly comprises two aspects: firstly, modeling analysis is carried out on an air traffic control system from the perspective of a network topological structure, a research subject is used as a node, and connecting edges are arranged among nodes with interaction; network topologies of the system under different layers are constructed in the mode, and scientific theories such as a complex network are utilized to research the network topologies; secondly, besides the research on the network topological structure, modeling analysis is carried out on the air traffic control system by combining the dynamic characteristics such as delay, flow and benefit, and a plurality of important achievements and findings are obtained; however, the existing method mainly has the following defects: firstly, the threat analysis element of the system is considered to be single, and only one element of an airport or a sector is utilized for analysis; secondly, the characteristics of the air traffic control system are ignored by the analysis method, and the established model cannot reflect the real system characteristics; thirdly, evaluation indexes influenced by the threat of the system are evaluated only by using typical topological indexes of a complex network theory, and are not reflected visually; fourthly, the threat impact analysis method cannot reflect complex interaction characteristics inside the system.

Disclosure of Invention

Aiming at the technical problems in the prior art, the invention provides a method, a system and equipment for analyzing the threat influence of an air traffic control system, which are used for solving the technical problems that the existing system threat analysis has single element, ignores the characteristics of the air traffic control system, cannot reflect the characteristics of a real system and cannot reflect the interaction inside the system.

In order to achieve the purpose, the invention adopts the technical scheme that:

the invention provides a method for analyzing threat influence of an air traffic control system, which comprises the following steps:

constructing an airport-airway-sector network topological structure of an air traffic control system to be analyzed;

determining constraint conditions and objective functions of an air traffic control system to be analyzed, and acquiring flight actual paths;

when the air traffic control system to be analyzed is not threatened, constructing an airport normal queuing model, and calculating the total delay time of all flights in the air traffic control system to be analyzed, namely obtaining the normal operation delay of the system;

when the air traffic control system to be analyzed is threatened, updating the actual flight path according to the external threat characteristics; constructing a threatened airport queuing model; calculating the total delay time of all flights in the air traffic control system to be analyzed under the current threat, namely obtaining the delay of the system after the threat;

obtaining a comparison result of the current threat influence by using the normal operation delay of the system and the delay of the system after the system is threatened;

and obtaining a threat influence analysis result of the air traffic control system according to the comparison result of different threat influences.

Furthermore, the airport-route-sector network topological structure comprises an airport network layer, a route network layer and a sector network layer;

in the airport network layer, an airport is used as an airport network node, and two airport connecting lines with flight direct flight connection are used as airport network connecting edges; in the route network layer, airport points and route points are used as route network nodes, route network node connecting lines with route setting are used as route network connecting edges, and a directed network is constructed by adopting a standard instrument departure program and a standard approach program to obtain the route network layer; in the sector network layer, each sector in the airspace is used as a sector network node, and a sector network node connecting line with flight handover is used as a sector network connecting edge; the airport network nodes in the airport network layer correspond to the airport points in the route network layer one by one, and the airport network nodes and the route network nodes respectively have membership relations with the sector network nodes.

Furthermore, the constraint conditions of the air traffic control system to be analyzed comprise airport capacity limit, sector capacity limit and flight path length limit;

the airport capacity is limited to the maximum times of flight take-off and landing procedures which can be processed by the airport in a preset time period; the capacity of the sector is limited to the maximum number of airplanes which can provide control services at any time by the sector; the flight path length is limited to the maximum length of the fuel carried by the flight direct flight aircraft to enable the aircraft to fly;

the objective function of the air traffic control system to be analyzed is the actual delay of the flight.

Further, the flight actual path is a flight path corresponding to the minimum objective function value of the air traffic control system to be analyzed.

Further, the process of delaying normal operation of the computing system is as follows:

setting safety interval parameters between flights according to airport characteristics;

dividing a time period to be analyzed into a plurality of time parts, and judging flight taking-off and landing procedures of each time part according to the safety interval parameters among flights to obtain an airport normal queuing model;

and executing the take-off and landing programs of all the flights according to the normal queuing model of the airport and the actual paths of the flights, and calculating to obtain the total delay time after the take-off and landing programs of all the flights are executed, namely obtaining the normal operation delay of the system.

Further, the delay process after the computing system is threatened is as follows:

updating constraint conditions of the air traffic control system to be analyzed according to different threat modes, threat duration and influence characteristics of threat targets, and updating flight actual paths by combining target functions of the air traffic control system to be analyzed to obtain updated flight actual paths;

setting safety interval parameters between flights under the influence of the threat according to the characteristics of the airport and the influence of the threat on the airport by the system;

dividing a time period to be analyzed into a plurality of time parts, and judging flight taking-off and landing programs of each time part according to time sequence according to safety interval parameters between flights influenced by threats to obtain a threatened airport queuing model;

and executing the take-off and landing programs of all the flights according to the threatened airport queuing model and the updated flight actual path, and calculating to obtain the total delay time after the take-off and landing programs of all the flights are executed, namely obtaining the delay of the system after the system is threatened.

Further, the current threat influence comparison result is a delay difference value between delay of the system after being threatened and delay of normal operation of the system.

Further, the process of obtaining the analysis result of the threat influence of the air traffic control system is as follows:

evaluating the threat suffered by the system according to the delay difference value to obtain the threat influence analysis result of the air traffic control system; the larger the delay difference value is, the larger the influence degree of the air traffic control system is under the corresponding threat.

The invention also provides an air traffic control system threat influence analysis system, which comprises a network module, a path module, a first calculation module, a second calculation module, an influence comparison module and an analysis module;

the network module is used for constructing an airport-airway-sector network topological structure of the air traffic control system to be analyzed;

the path module is used for determining constraint conditions and target functions of the air traffic control system to be analyzed and acquiring the actual path of the flight;

the system comprises a first calculation module, a second calculation module and a third calculation module, wherein the first calculation module is used for constructing an airport normal queuing model when the air traffic control system to be analyzed is not threatened, and calculating the total delay time of all flights in the air traffic control system to be analyzed, namely the normal operation delay of the system;

the second calculation module is used for updating the actual flight path according to the external threat characteristics when the air traffic control system to be analyzed is threatened; constructing a threatened airport queuing model; calculating the total delay time of all flights in the air traffic control system to be analyzed under the current threat, namely the delay of the system after the threat;

the influence comparison module is used for obtaining a current threat influence comparison result by utilizing the normal operation delay of the system and the delay of the system after the system is threatened;

and the analysis module is used for obtaining a threat influence analysis result of the air traffic control system according to the comparison result of different threat influences.

The invention also provides a threat impact analysis device of the air traffic control system, which comprises a memory, a processor and executable instructions stored in the memory and operated in the processor; the processor, when executing the executable instructions, implements the air traffic control system threat impact analysis method.

Compared with the prior art, the invention has the beneficial effects that:

the invention provides a method, a system and equipment for analyzing threat influence of an air traffic control system, which can simultaneously or respectively construct the external threat situation of an airport network layer, an airway network layer and a sector network layer by constructing a network topology structure of the air traffic control system from three layers of an airport, an airway and a sector; meanwhile, the airport queuing model is ensured to be in line with the reality and closer to a real air traffic control system, and the characteristics of the air traffic control system are effectively combined; the airport queuing model is adopted to describe the ground delay, the change of the actual flight path is adopted to describe the air delay, the real embodiment of the delay generation of the air traffic control system is realized, the analysis requirement is comprehensive, and the interaction in the system is effectively embodied; by taking the system operation delay as an index, the quantification of the external threat is realized, the influence of the threat is visually embodied, the observation of delay propagation is realized, and the delay propagation mechanism is further known.

The method for analyzing the threat influence of the air traffic control system can be used for pre-prediction and/or post-evaluation under specific external threats, can take appropriate action to reduce the influence by a 'hypothesis' scenario method according to the influence analysis, and can research different scenes and alternative schemes on a 'macro' level, so that planners of the air traffic control system can better know where to optimize and make investment decisions of infrastructure protection facilities; in addition, the method can also be used for evaluating the elasticity and the expected consequences of the flight schedule, identifying key airports and waypoints, effectively planning the route and relieving measures before, during and after the external threat time; also, the present invention may be applied to other, even larger, air traffic control systems with only minor modifications and extensions.

Drawings

FIG. 1 is a schematic illustration of an airport-way-sector network topology of an air traffic control system in an embodiment;

FIG. 2 is a flow chart of flight path planning in an embodiment;

FIG. 3 is a schematic diagram illustrating the division of the moment-by-moment decision in the flight queuing model according to the embodiment;

FIG. 4 is a flow chart of flight queuing rules in an embodiment.

Detailed Description

In order to make the technical problems, technical solutions and advantageous effects of the present invention more apparent, the following embodiments further describe the present invention in detail. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.

The invention provides a method for analyzing threat influence of an air traffic control system, which comprises the following steps:

step 1, constructing an airport-airway-sector network topological structure of an air traffic control system to be analyzed; the process for constructing the airport-route-sector network topological structure comprises the following steps:

step 11, acquiring sector data, airport list data, daily flight schedule list data and airway data in the jurisdiction area of the air traffic control system to be analyzed according to the characteristics of the air traffic control system to be analyzed;

step 12, constructing an airport-airway-sector network topological structure according to the acquired sector data, airport list data, daily flight schedule list data and airway data; the airport-route-sector network topology structure comprises an airport network layer, a route network layer and a sector network layer, and specifically comprises the following steps:

in the airport network layer, an airport is used as an airport network node, and two airport connecting lines with flight direct flight connection are used as airport network connecting edges; in the route network layer, airport points and route points are used as route network nodes, and route network node connecting lines with route setting are used as route network connecting edges; in the construction of the airway network layer, a directed network is constructed by adopting a Standard Instrument Departure (SIDs) and a Standard approach (STARs) to obtain the airway network layer; in the sector network layer, each sector in the airspace is used as a sector network node, and a sector network node connecting line with flight handover is used as a sector network connecting edge; the airport network nodes in the airport network layer correspond to the airport points in the route network layer one by one, and the airport network nodes and the route network nodes respectively have membership relations with the sector network nodes; when the sector is threatened to cause the limited change of the capacity of the sector or the denial of service of the sector, the waypoints and the airports to which the sector belongs are threatened and influenced.

Step 2, determining constraint conditions and objective functions of the air traffic control system to be analyzed, and acquiring flight actual paths; the constraint conditions of the air traffic control system to be analyzed comprise airport capacity limit, sector capacity limit and flight path length limit.

The airport capacity is limited to the maximum times of flight take-off and landing procedures which can be processed by the airport in a preset time period; the capacity of the sector is limited to the maximum number of airplanes which can provide control services at any time by the sector; the flight path length is limited to the maximum length of the fuel carried by the flight direct flight aircraft to enable the aircraft to fly; the objective function of the air traffic control system to be analyzed is the actual delay of the flight.

Step 3, when the air traffic control system to be analyzed is not threatened, constructing an airport normal queuing model, and calculating the total delay time of all flights of a corresponding airport, namely obtaining the normal operation delay of the system;

the normal operation delay process of the computing system is as follows:

step 31, setting safety interval parameters between flights according to airport characteristics under the condition that a system is normally operated; in the invention, the safety interval parameters between flights are the interval time of an airport in processing a flight take-off program and a flight landing program, and comprise take-off-landing time intervals, take-off-take-off time intervals and landing-landing time intervals; i.e. the time interval between adjacent programs of all processes, while ensuring flight safety.

And step 32, dividing the time period to be analyzed into a plurality of time parts, and judging flight taking-off and landing programs of each time part according to the safety interval parameters among flights in a time sequence to obtain the normal queuing model of the airport.

And step 33, executing the take-off and landing programs of all flights according to the normal queuing model of the airport and the actual flight paths, and calculating to obtain the total delay time after the take-off and landing programs of all flights are executed, namely obtaining the system normal operation delay.

Step 4, when the air traffic control system to be analyzed is threatened, updating constraint conditions and flight actual paths of the air traffic control system to be analyzed according to external threat characteristics, and building a threatened airport queuing model after updating safety interval parameters among flights; and under the current threat, executing the take-off and landing programs of all the flights, and calculating the total delay time of all the flights of the corresponding airport under the current threat, namely obtaining the delay of the system after the threat.

The method specifically comprises the following steps:

and step 41, updating the constraint conditions of the air traffic control system to be analyzed according to different threat modes, threat duration and influence characteristics of threat targets, and updating the flight actual path by combining the objective function of the air traffic control system to be analyzed to obtain the updated flight actual path.

And step 42, setting safety interval parameters between flights affected by the threat according to the characteristics of the airport and the influence of the threat on the airport of the system.

And 43, dividing the time period to be analyzed into a plurality of time parts, and judging flight taking-off and landing procedures of each time part according to the time sequence according to the safety interval parameters between flights under the influence of the threat to obtain the queue model of the threatened airport.

And step 44, executing the take-off and landing programs of all flights according to the queue model of the threatened airport and the updated flight actual path, and calculating to obtain the total delay time after the take-off and landing programs of all the flights are executed, namely the delay of the system after the system is threatened.

According to the threat characteristics, the influence of external threats on the air traffic control system is embodied by modifying the airport-airway-sector network topological structure of the air traffic control system and the corresponding parameters in the constraint conditions thereof, and the parameter modification is based on the actual threat influence and takes the fitting reality as a criterion; for example: (1) when the waypoints are threatened, deleting the threatened waypoints from the waypoint network layer, wherein the waypoint deleting time is consistent with the time of the waypoints affected by the threatens; (2) when the sector command center is threatened; the capacity of the compromised sector decreases; (3) when an airport is threatened, the flight safety interval of the airport is increased.

Step 5, obtaining a comparison result of the current threat influence by using the normal operation delay of the system and the delay of the system after the system is threatened; and the current threat influence comparison result is a difference value between delay of the system after being threatened and normal operation delay of the system.

Step 6, repeating the steps 4-5, and obtaining comparison results of different threat influences; evaluating the threat suffered by the system according to the delay difference value to obtain the threat influence analysis result of the air traffic control system; the larger the delay difference value is, the larger the influence degree of the air traffic control system is under the corresponding threat.

The invention also provides an air traffic control system threat influence analysis system, which comprises a network module, a path module, a first calculation module, a second calculation module, an influence comparison module and an analysis module; the network module is used for constructing an airport-airway-sector network topological structure of the air traffic control system to be analyzed; the path module is used for determining constraint conditions and target functions of the air traffic control system to be analyzed and acquiring the actual path of the flight; the system comprises a first calculation module, a second calculation module and a third calculation module, wherein the first calculation module is used for constructing an airport normal queuing model when the air traffic control system to be analyzed is not threatened, and calculating the total delay time of all flights in the air traffic control system to be analyzed, namely the normal operation delay of the system; the second calculation module is used for updating the actual flight path according to the external threat characteristics when the air traffic control system to be analyzed is threatened; constructing a threatened airport queuing model; calculating the total delay time of all flights in the air traffic control system to be analyzed under the current threat, namely the delay of the system after the threat; the influence comparison module is used for obtaining a current threat influence comparison result by utilizing the normal operation delay of the system and the delay of the system after the system is threatened; and the analysis module is used for obtaining a threat influence analysis result of the air traffic control system according to the comparison result of different threat influences.

The invention also provides a threat impact analysis device for the air traffic control system, which comprises a processor, a memory and a computer program stored in the memory and capable of running on the processor; when the processor executes the computer program, the steps in the method for analyzing the threat influence of the air traffic control system are realized; or the processor realizes the functions of each module in the air traffic control system threat influence analysis system when executing the computer program.

Illustratively, the computer program may be partitioned into one or more modules that are stored in the memory and executed by the processor to implement the invention.

The one or more modules may be a series of computer program instruction segments capable of performing certain functions that describe the execution of the computer program in the air traffic control system threat impact analysis device. For example, the computer program may be divided into a network module, a path module, a first calculation module, a second calculation module, an influence comparison module, and an analysis module, where the specific functions of the modules are as follows: the network module is used for constructing an airport-airway-sector network topological structure of the air traffic control system to be analyzed; the path module is used for determining constraint conditions and target functions of the air traffic control system to be analyzed and acquiring the actual path of the flight; the system comprises a first calculation module, a second calculation module and a third calculation module, wherein the first calculation module is used for constructing an airport normal queuing model when the air traffic control system to be analyzed is not threatened, and calculating the total delay time of all flights in the air traffic control system to be analyzed, namely the normal operation delay of the system; the second calculation module is used for updating the actual flight path according to the external threat characteristics when the air traffic control system to be analyzed is threatened; constructing a threatened airport queuing model; calculating the total delay time of all flights in the air traffic control system to be analyzed under the current threat, namely the delay of the system after the threat; the influence comparison module is used for obtaining a current threat influence comparison result by utilizing the normal operation delay of the system and the delay of the system after the system is threatened; and the analysis module is used for obtaining a threat influence analysis result of the air traffic control system according to the comparison result of different threat influences.

The threat influence analysis equipment of the air traffic control system can be computing equipment such as a desktop computer, a notebook computer, a palm computer, a cloud server and the like. The air traffic control system threat impact analysis device may include, but is not limited to, a processor and a memory. It will be appreciated by those skilled in the art that the above-described air traffic control system threat impact analysis apparatus is merely an example of the apparatus, and does not constitute a limitation on the air traffic control system threat impact analysis apparatus, and may include more or fewer components, or combine some components, or different components, for example, the air traffic control system threat impact analysis apparatus may further include an input-output device, a network access device, a bus, and the like.

The processor may be a Central Processing Unit (CPU), other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like that is the control center for the air traffic control system threat impact analysis apparatus, with various interfaces and lines connecting various portions of the overall air traffic control system threat impact analysis apparatus.

The memory may be configured to store the computer programs and/or modules, and the processor may be configured to implement the various functions of the air traffic control system threat impact analysis apparatus by executing or otherwise executing the computer programs and/or modules stored in the memory and invoking the data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like.

In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) card, a flash memory card (FlashCard), at least one disk storage device, a flash memory device, or other volatile solid state storage device.

The integrated modules of the air traffic control system threat impact analysis device, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes of the above methods can be implemented by the present invention, and the implementation of the computer program can also be implemented by the relevant hardware, and the computer program can be stored in a computer readable storage medium, and when the computer program is executed by a processor, the steps of the above methods can be implemented.

Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer memory, Read-only memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc.

It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.

The invention relates to a method, a system and equipment for analyzing threat influence of an air traffic control system, which are characterized in that an airport-airway-sector network topological structure is constructed, and three different network layer elements and influence factors of an airport network layer, an airway network layer and a sector network layer are considered; the system operation delay is adopted to realize visual description and quantification of external threats of the air traffic control system; the method effectively reflects the actual characteristic elements and the network topological structure of the air traffic control system to be analyzed by combining the characteristics of capacity and delay, ensures that the analysis is more comprehensive, realizes more detailed modeling of the air traffic control system, and realizes the simulation of various external threats by modifying the parameters of different levels of airports, air routes and sectors.

In the invention, in order to make the modeling of the air traffic control system closer to the real-life system, the rules of dead-reckoning, path selection, speed change and the like are set on the basis of a network topology structure in combination with the consideration of system dynamics factors, so that the airport queuing model is ensured to be in line with the reality and closer to the real air traffic control system, and the accuracy and persuasion of the model are effectively improved; the method comprises the steps of taking system delay as an index, modeling an air traffic control system by combining two stages generated by the delay, namely a ground delay stage and an air delay stage, fully considering system dynamics factors, and having an index for clearly evaluating the influence of threats; the propagation effect of flight delay is common in air traffic control systems, and delay propagation in the systems can be better observed.

The method for analyzing the threat influence of the air traffic control system can be used for pre-prediction and post-evaluation under specific external threats, and can take appropriate action to reduce the influence by a 'hypothesis' scenario method according to the influence analysis; different scenes and alternative schemes can be researched from the macroscopic level; different scenes and alternative schemes are that parameters of the method are modified according to the reality, and key parts are identified according to the result of the method, namely the system delay, so that a planner of the air traffic control system can better know where to optimize and make investment decisions of infrastructure protection facilities; the invention can also be used for evaluating the elasticity and the expected consequences of the flight schedule, identifying key airports and waypoints, effectively planning the route and relieving measures before, during and after the external threat time; it can be applied to other even larger air traffic control systems with only minor modifications and extensions.

Examples

Taking a threat impact analysis process of a certain air traffic control system as an example, the embodiment provides an air traffic control system threat impact analysis method, which includes the following steps:

step 1, according to the air traffic control system to be analyzed, sector data, airport list data, daily flight schedule list data and air route data in the jurisdiction area of the air traffic control system to be analyzed are obtained.

And 2, constructing an airport-airway-sector network topological structure according to the acquired sector data, airport list data, daily flight schedule list data and airway data.

As shown in fig. 1, in the present embodiment, the airport-route-sector network topology includes an airport network layer, a route network layer, and a sector network layer; in the airport network layer, an airport is used as an airport network node, and two airport connecting lines with flight direct flight connection are used as airport network connecting edges; in the route network layer, airport points and route points are used as route network nodes, and route network node connecting lines with route setting are used as route network connecting edges.

In the construction of the airway network layer, a directed network is constructed by adopting a Standard Instrument Departure (SIDs) and a Standard approach (STARs) to obtain the airway network layer; in the sector network layer, each sector in the airspace is used as a sector network node, and a sector network node connecting line with flight handover is used as a sector network connecting edge; the airport network nodes in the airport network layer correspond to the airport points in the route network layer one by one, and the airport network nodes and the route network nodes respectively have membership relations with the sector network nodes.

When the sector is threatened to cause the limited change of the capacity of the sector or the denial of service of the sector, the waypoints and the airports to which the sector belongs are threatened and influenced.

Step 3, determining constraint conditions

The constraint conditions of the air traffic control system to be analyzed comprise airport capacity limit, sector capacity limit and flight path length limit; the airport capacity is limited to the maximum times of flight take-off and landing procedures which can be processed by the airport in a preset time period; the capacity of the sector is limited to the maximum number of airplanes which can provide control services at any time by the sector; the flight path length is limited to the maximum length of the fuel carried by the flight direct flight aircraft to enable the aircraft to fly; the objective function of the air traffic control system to be analyzed is the actual delay of the flight.

Step 4, determining flight speed change rules of the flight

In this embodiment, in order to get close to the real air traffic control system, the flight with the longer flight path length increases its flight speed, and the flight with the shorter flight path length decreases its flight speed, so as to ensure the flight delay to be minimum; the flight flying speed change rule is shown as the following formula:

where v is the actual flight speed of the flight, v*For the planned flight speed of the flight, e for the actual flight path length of the flight, e*Flight path lengths are planned for flights.

Step 5, determining an objective function

The objective function of the air traffic control system to be analyzed is the actual delay of the flight, namely the difference between the actual arrival time of the flight and the planned arrival time.

Step 6, obtaining the actual path of the flight

As shown in fig. 2, in this embodiment, the step of obtaining the actual flight path includes the following steps:

and step 61, acquiring a plurality of flight paths from the airport-airway-sector network topology structure in the step 2 under the condition that the constraint condition in the step 3 is met.

And step 62, combining the flight speed change rule in the step 4, and selecting a flight path corresponding to the minimum objective function value of the air traffic control system to be analyzed from the plurality of flight paths to obtain the actual flight path.

Step 7, constructing a normal queuing model of the airport

In this embodiment, constructing the airport queuing model includes the following steps:

step 71, setting safety interval parameters between flights under the condition of normal operation of the system according to the characteristics of the airport; the safety interval parameters between flights are interval time of an airport in processing a flight take-off program and a flight landing program, and the interval time comprises a take-off-landing time interval, a take-off-take-off time interval and a landing-landing time interval; i.e. the time interval between adjacent programs of all processes, while ensuring flight safety.

And 72, dividing the time period to be analyzed into a plurality of time parts, and judging flight taking-off and landing programs of each time part according to the safety interval parameters among flights in time sequence to obtain the normal queuing model of the airport.

As shown in fig. 3 and 4, in this embodiment, taking a safety interval parameter S between flights set at an airport as an example, different times are divided into four time portions according to the safety interval parameter S between flights, where the four time portions include a time portion a, a time portion B, a time portion C, and a time portion D;

the process of determining the flight departure and landing procedure of the four time sections is specifically as follows:

(1) when no flight is executed at the current moment, entering the next moment judgment; if the flight carries out the take-off and landing program, judging, and entering into step (2);

(2) in the time B part of the current time, if a flight takes off and lands, the taking-off or landing procedure of the current flight is carried out at one time, and the next time judgment is carried out; if no flight program exists, entering (3);

(3) comparing the flight execution priorities in the time part A, the time part C and the time part D at the current moment; if the priority of the flight in the time part A is higher than that of the flight in the time part C, the execution program of the flight with the highest priority in the time part A is unchanged, and other flights with low priorities are executed in a sequential way at one moment and enter the next moment for judgment;

if the priority of the flight in the time part C is higher than that of the flight in the time part A but lower than that of the flight in the time part D, the execution program of the flight with the highest priority in the time part A is unchanged, other flights with low priorities are executed sequentially at one moment, and the next moment is judged; if the priority of the flight in the time part C is higher than that of the flight in the time part A and higher than that of the flight in the time part D, the flights in the time part A are executed sequentially by one time and enter the next time judgment.

Step 8, obtaining the system normal operation delay

According to the time sequence, judging all the flights in the flight schedule of the air traffic control system to be analyzed by using the airport normal queuing model in the step 7, and executing the flights according to the acquired flight actual path when the corresponding flights are determined to be executed at the corresponding time; calculating the total delay time of all flights to obtain the normal operation delay of the system; and the delay of a single flight is the difference between the actual arrival time of the flight and the scheduled arrival time, and the total delay time of all flights is obtained by summing the delays of all flights.

Step 9, obtaining delay after system is threatened

When the air traffic control system to be analyzed is threatened by the outside, the service capacities of airports, sectors and flight points in the jurisdiction area of the air traffic control system to be analyzed and the operation state of flights can be influenced to different degrees; updating an airport-airway-sector network topological structure and constraint conditions according to external threat characteristics including threat modes, threat duration and threat target characteristics, and constructing a threatened airport queuing model; and calculating the total delay time of all flights of the corresponding airport under the current threat, namely the delay of the system after the threat.

Wherein, according to different threat modes, threat duration and influence characteristics of threat targets, the constraint conditions of the air traffic control system to be analyzed are updated, for example: correspondingly executing waypoint deletion, sector capacity change or sector deletion and the like; meanwhile, parameters of the established airport-route-sector network topology structure are modified according to external threats, such as: waypoint deletion, sector capacity change, or sector deletion operations; and updating the flight actual path by combining with the objective function of the air traffic control system to be analyzed to obtain the updated flight actual path.

Setting safety interval parameters between flights under the influence of the threat according to the characteristics of the airport and the influence of the threat on the airport by the system; dividing a time period to be analyzed into a plurality of time parts, and judging flight taking-off and landing programs of each time part according to time sequence according to safety interval parameters between flights influenced by threats to obtain a threatened airport queuing model; and executing the take-off and landing programs of all the flights according to the threatened airport queuing model and the updated flight actual path, and calculating to obtain the total delay time after the take-off and landing programs of all the flights are executed, namely obtaining the delay of the system after the system is threatened.

Step 10, obtaining a comparison result of the current threat influence by using the normal operation delay of the system and the delay of the system after the system is threatened; the current threat influence comparison result is the difference value between the delay of the system after being threatened and the delay of the normal operation of the system.

And 11, repeating the steps 9-10, and obtaining comparison results of different threat influences to obtain threat influence analysis results of the air traffic control system.

The embodiment can visually reflect the relative influence of the threats by using the system delay caused by different external threats, and can also identify key airports and other elements by using the delay comparison; by constructing a network topology structure of the air traffic control system from three levels of an airport, an airway and a sector, the external threat situation of an airport network layer, an airway network layer and a sector network layer can be constructed simultaneously or respectively; by combining the consideration of system dynamics factors on the basis of a network topological structure and adopting the arrangement of airway rerouting, path selection and speed change rules, the airport queuing model is ensured to be in line with the reality and to be closer to a real air traffic control system, and the accuracy and persuasion of the model are effectively improved.

The present embodiment further provides a system and a device for analyzing a threat effect of an air traffic control system, where for a description of a relevant part, reference may be made to detailed descriptions of a corresponding part in the method for analyzing a threat effect of an air traffic control system described in the present embodiment, and details are not described here again.

According to the method, the system and the equipment for analyzing the threat influence of the air traffic control system, influence analysis can be simultaneously or respectively carried out on the external threats of three levels of an airport network, an airway network and a sector network by constructing an airport-airway-sector network topological structure; the comprehensiveness of an analysis result is ensured by combining system dynamics and network topology; by setting the airway rerouting, path selection and speed change rules, the airport queuing model is ensured to be in line with reality and closer to a real air traffic control system, and the accuracy and persuasion of the model are effectively improved.

The invention adopts the system operation delay as an index, and combines the air delay and the ground delay to model the air traffic control system; the aerial delay is represented by the change of a flight path, and the ground delay is represented by an airport queuing model; the air delay modeling and ground delay modeling process considers system dynamics factors, the specific system dynamics factors can reflect the actual characteristic factors of the researched system, and the air delay modeling and ground delay modeling process has flow, capacity, delay, income and the like for an air traffic control system.

In the invention, the characteristics of capacity and delay in system dynamics are considered, and modeling is carried out by combining two stages generated by delay of an air traffic control system, wherein the two stages are respectively as follows: air delay and ground delay; the air delay is reflected by the change of flight paths, and the ground delay is reflected by an airport queuing model; the system operation delay is used as an index to realize the quantification of external threats, so that the threat influence is visually reflected; the setting of the constraint condition reflects the interaction of all elements in the system, and the observation of delay propagation can be realized so as to further understand the delay propagation mechanism.

The invention can be used for pre-prediction and/or post-evaluation under specific external threats, and can take appropriate action to reduce the influence by a 'hypothesis' scenario method according to the influence analysis, and can research different scenes and alternative schemes from a 'macro' level, so that planners of the air traffic control system can better know where to optimize and make investment decisions of infrastructure protection facilities. In addition, the method can also be used for evaluating the elasticity and the expected consequences of the flight schedule, identifying key airports and waypoints, effectively performing route planning, and relieving measures before, during and after the external threat time; also, it can be applied to other even larger air traffic control systems with only slight modifications and extensions.

The above-described embodiment is only one of the embodiments that can implement the technical solution of the present invention, and the scope of the present invention is not limited by the embodiment, but includes any variations, substitutions and other embodiments that can be easily conceived by those skilled in the art within the technical scope of the present invention disclosed.

完整详细技术资料下载
上一篇:石墨接头机器人自动装卡簧、装栓机
下一篇:一种基于履约能力和行为的多维信用评价模型构建方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!