Abstract

As unmanned aerial systems (UASs) increasingly integrate into the US national airspace system, there is an increasing need to characterize how commercial and recreational UASs may encounter each other. To inform the development and evaluation of safety critical technologies, we demonstrate a methodology to analytically calculate all potential relative geometries between different UAS operations performing inspection missions. This method is based on a previously demonstrated technique that leverages open source geospatial information to generate representative unmanned aircraft trajectories. Using open source data and parallel processing techniques, we performed trillions of calculations to estimate the relative horizontal distance between geospatial points across sixteen locations.

Highlights

  • The continuing integration of unmanned aerial system (UAS) operations into the National AirspaceSystem (NAS) requires new or updated regulations, policies, and technologies to maintain safety and enable efficient use of the airspace

  • The experiment design was based on an approach to generate representative UAS trajectories that take into account their operational intent by leveraging open source datasets, such as OpenStreetMap (OSM), “a knowledge collective that provides user-generated street maps [13].”

  • We demonstrated an analytical method to characterize potential UAS encounters

Read more

Summary

Introduction

The continuing integration of unmanned aerial system (UAS) operations into the National AirspaceSystem (NAS) requires new or updated regulations, policies, and technologies to maintain safety and enable efficient use of the airspace. One enabling technology to help address several UAS airspace integration gaps are airspace encounter models, which have been fundamental to quantifying airborne collision risk for manned and unmanned operation [1,2,3,4,5]. These models represent how aircraft behavior and their relative geometries evolve during close encounters. They have supported the development of surveillance and communication requirements [6,7]

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.