Autonomous air taxi separation system and method
12211387 ยท 2025-01-28
Assignee
Inventors
Cpc classification
G08G5/26
PHYSICS
International classification
Abstract
A system for urban air mobility monitors flight separation for compliance with a safe separation distance. A reference formation airspace is established for a reference air taxi based on minimum longitudinal, lateral and vertical parameters. When penetration of the reference formation airspace is detected, a penetration airspace is established. A centroid of the penetration airspace is determined and a target separation to the centroid is supplied to the air taxi to reestablish safe separation. The extent of separation is also safely contained by the presence of virtual air taxis whose positions on the periphery of the penetrated airspace serve to limit potential penetration of surrounding air taxi air spaces.
Claims
1. A method for managing air taxi flight separation of a reference air taxi during flight for compliance with a predetermined separation distance that includes minimum longitudinal, lateral and vertical separation parameters, the method comprising: receiving a current flight vector for the reference air taxi, receiving position data of the reference air taxi, constructing a reference formation airspace in the form of an ellipsoid, an ovoid, or other non-spheroidal shape with dimensions based upon the minimum longitudinal, lateral, and vertical separation parameters and the position of the reference air taxi as the centroid of the reference formation airspace, receiving position data of at least one other air taxi that has penetrated into the reference formation airspace, constructing a penetration airspace representing a modification of the reference formation airspace deformed by at least the position data of the at least one other air taxi, determining a centroid of the penetration airspace, determining a target separation vector for the reference air taxi representing a direction to the centroid of the penetration airspace, and determining a new flight vector for the reference air taxi based upon the current flight vector combined with the target separation vector, sending to the reference air taxi the new flight vector.
2. The method according to claim 1 further comprising the steps of: defining a plurality of virtual positions spaced about the surface of the reference formation airspace, and wherein the penetration airspace is represented by the plurality of virtual positions and the position of the at least one other air taxi.
3. The method of claim 2 wherein the plurality of virtual positions comprises a set of 6 positions.
4. The method of claim 1 further comprising the steps of: defining a plurality of virtual positions spaced about the surfaces of the reference formation airspace, and wherein the penetration airspace is represented by the plurality of virtual positions and one of the plurality of virtual positions is substituted with the position of the at least one other air taxi.
5. The method of claim 4 wherein the plurality of virtual positions comprises a set of 6 positions.
6. The method according to claim 1 where the target separation vector for the reference air taxi is determined based at least in part on limiting emissions of the reference air taxi.
7. The method according to claim 1 where the target separation vector for the reference air taxi is determined based at least in part on optimizing fuel efficiency of the reference air taxi.
Description
DRAWINGS
(1) The disclosed embodiments may be understood from the following detailed description taken in conjunction with the accompanying drawings of which:
(2)
(3)
(4)
(5)
(6) In
(7) In
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
DETAILED DESCRIPTION
(16) Turning to
(17) By contrast, the present disclosure describes a technology enabling individual air taxis and similar UAM vehicles to create their own (autonomous) safe separation. As noted earlier, autonomous safe separation requires three conditions be met: (a) detecting when an air taxi has penetrated the airspace of a reference or center air taxi; (b) independently generating mutually compatible or sympathetic routings to restore safe separation; and (c) automatically containing the direction and range of separation restoral so that the potential for moving into the path of another air taxi is forestalled. With these conditions met, autonomous safe separation is a vehicle-borne air traffic management capability fully compatible with the airspace-based air traffic management.
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25) Turning to
(26) The ASU system in air taxi 704B calculates a new centroid based on its penetration airspace 703B, generating the new centroid position 704CENT among all points of the now-changed airspace. Similarly, air taxi 702B recalculates its own new centroid 702CENT based on the deformations imposed by air taxi 704B. The centroid 704CENT is located deeper into its penetrated airspace and further from its current position because the rest of the original perimeter of the airspace remains intact and serves to contain the continued movement away from the incursion. This functional action contains further separation by imposing virtual boundaries. This third and final capability establishes autonomous separation: penetration detection, sympathetic routing, and now, contained separation.
(27)
(28) In an embodiment, a target separation vector may be combined with a current flight vector of an air taxi, to guide the air taxi towards the centroid as it continues its flight.
(29) Any number of penetrations can be addressed, resulting only in the potential tightening of the airspace in which the centroid location is computed. Further, while the virtual air taxis are used to frame the reference formation airspace and typically at least a portion of a penetration airspace, these virtual air taxis are not real, and thus offer no risk of real danger even as the centroid draws closer. In fact, the framing virtual air taxis establish the closest location of potentially penetrating real air taxis and circumscribe the range of movement of air taxis as the restoration of safe separation is underway.
(30)
(31) In step 901, operation of the ASU is initiated by ensuring the air taxi ID is entered, the transponder is set, GPS and/or sensor signals can be received, and that in an embodiment both broadcast and reception to and from ATC and other air taxis are enabled. In modern air taxis a flight management system is activated in step 902, and can be set to manual 903 or autopilot 904 operation of the air taxis. In step 905, the system is configured to establish the reference formation airspace that creates a sphere around the air taxi at the safe distance longitudinally, laterally, and vertically. In addition, in an embodiment, risk triggers 907 can be set to govern how far away a potentially-penetrating air taxis should be before being tracked by the system and considered a threat, and when the proximity of an air taxis is such that the separation system is suspended and the Detection and Avoidance (DAA) system 911, takes over.
(32) Once airborne, in step 906 the ASU system monitors broadcast or sensor data from GPS and other air taxi data, and in step 907 assesses the degree to which any air taxi may pose a trigger-level risk. If the threat from an approaching air taxi is deemed a sufficient risk, in step 908 the system will generate a penetration airspace. In an embodiment, a set of virtual air taxis spaced about the perimeter of the penetration airspace may be defined, and virtual air taxis may be replaced or substituted with the data from the nearest-risk, real approaching air taxi(s). In step 909, the approaching air taxi is evaluated to determine if it has penetrated the reference formation airspace of the air taxis. If the approaching air taxi does not breach the separation distances, the system returns to monitoring for vicinity air taxis in step 906. On the other hand, in step 909, if separation is violated and the approaching air taxi has penetrated the reference formation airspace, then in step 910 the incoming distance is checked to see if it is so close and closing so quickly that the system automatically hands off to DAA in step 911. However, if in step 910 DAA is not triggered, the penetration datafor current and additional air taxis if anyis incorporated in step 912, and the updated penetration airspace is constructed in step 913. In step 914, the centroid of the penetration airspace is computed, and in step 915 the target separation vector is generated. In step 916, if in an embodiment the autopilot is engaged, then in step 918 the target separation vector is displayed and supplied to the autopilot system for the air taxi to navigate to the centroid along the target separation vector which will reestablish safe separation. If the autopilot is not engaged, then in step 917 the target separation vector information is displayed, possibly with an audible or visual indicator alerting the pilot to the penetration and the recommended target safe separation vector. Further, after the target separation vector is generated in step 915, the process returns to step 908 to continuously update the penetrated airspace until, in step 909, it determines that a separation violation no longer exists.
(33)
(34) According to an embodiment, the Autonomous Separation Unit 1006 may be installed and interfaced with direct access to the flight management system 1001, in order to facilitate the display of information such as the separation trajectory as shown in
(35)
(36) In an embodiment, the ASU system is integrated with the Area Control Center 1101 and is interfaced with the available directional and communications systems. In an embodiment, as indicated in step 1102, the ASU is deployed en-route in an urban air traffic information region (ATIR) role, referring to a non-airport-based control center that is primarily engaged in managing air taxis en-route to their destinations and thus not within the control of origin or destination launch and landing points. In an alternative embodiment, the ASU may be deployed at an airport. The ASU can be operated in standby mode 1103 supplying data and information to controllers who would then review, amend if needed, and transmit the recommended separation actions to multiple air taxis. Alternatively, operating in an automated mode 1104, the Area Control Center-based ASU transmits instructions to multiple air taxis simultaneously after tracking and computing individual reference formation airspaces and, when needed, penetration airspaces for multiple air taxis, and determining their target separation vectors as needed.
(37) In addition to separation management for minimum-space adherence purposes, the ASU can also compute and transmit trajectories designed to optimize fuel efficiency and limit emissions. The specific operation of the ASU in an Urban Air Traffic Information Region tracking multiple air taxis and with full access to GPS and all related sensor, positioning, navigation, and air taxi transponder and communications performs the following representative steps: a. In step 1105, the ASU establishes the reference formation airspace for each air taxi in its flight information region, and sets risk triggers across all three dimensions of longitude, latitude, and altitude. b. Next, in step 1106, the ASU continues to gather information from Area Control Center inputs (GPS and related sensors and data), preparing to respond when, in step 1107, risk limits are triggered; otherwise, the system continues monitoring. c. When a risk limit is triggered and a reference formation airspace penetration is imminent, in step 1108, the ASU generates models of the projected penetration, awaiting confirmed determination that penetration has occurred in step 1109. If, in step 1110, the confirmed penetration occurs at such a rapid pace that there is a risk of air taxi collision, the ASU so warns the pilots of the air taxis involved and instructs the respective pilots in command rely on onboard detection and avoidance (DAA) systems 1111 aboard all air taxis so individual pilots with situational awareness can address the relevant risks directly. d. In step 1112, in a dynamic situation potentially involving additional air taxis, surveillance of the airspace continues specifically to detect any additional penetration or triggered risks of penetration that need to also be managed. e. In step 1113, as the penetrated airspace continues to evolve, the overall penetrated airspace modeling and status are continually updated. f. Then, in step 1114, the ASU then generates the centroid location of the penetrated airspace of each air taxis at risk, and the centroid position is then used to set the target separation vector in step 1115. g. In step 1116, Air Traffic Controllers can set or neutralize the automated instructions to air taxis, supporting either display-only, in step 1117, or display and instruct in step 1118. h. The dotted line demarcation 1119 in
(38) The phrases at least one, one or more, or, and and/or are open-ended expressions that are both conjunctive and disjunctive in operation. For example, each of the expressions at least one of A, B and C, at least one of A, B, or C, one or more of A, B, and C, one or more of A, B, or C, A, B, and/or C, and A, B, or C means A alone, B alone, C alone, A and B together, A and C together, B and C together, or A, B and C together.
(39) The term a or an entity refers to one or more of that entity. As such, the terms a (or an), one or more, and at least one can be used interchangeably herein. It is also to be noted that the terms comprising, including, and having can be used interchangeably.
(40) Any of the steps, functions, and operations discussed herein can be performed continuously and automatically.
(41) The exemplary systems and methods of this disclosure have been described in relation to computing devices. However, to avoid unnecessarily obscuring the present disclosure, the preceding description omits several known structures and devices. This omission is not to be construed as a limitation. Specific details are set forth to provide an understanding of the present disclosure. It should, however, be appreciated that the present disclosure may be practiced in a variety of ways beyond the specific detail set forth herein.
(42) Furthermore, while the exemplary aspects illustrated herein show the various components of the system collocated, certain components of the system can be located remotely, at distant portions of a distributed network, such as a LAN and/or the Internet, or within a dedicated system. Thus, it should be appreciated, that the components of the system can be combined into one or more devices, such as a server, communication device, or collocated on a particular node of a distributed network, such as an analog and/or digital telecommunications network, a packet-switched network, or a circuit-switched network. It will be appreciated from the preceding description, and for reasons of computational efficiency, that the components of the system can be arranged at any location within a distributed network of components without affecting the operation of the system.
(43) Furthermore, it should be appreciated that the various links connecting the elements can be wired or wireless links, or any combination thereof, or any other known or later developed element(s) that is capable of supplying and/or communicating data to and from the connected elements. These wired or wireless links can also be secure links and may be capable of communicating encrypted information. Transmission media used as links, for example, can be any suitable carrier for electrical signals, including coaxial cables, copper wire, and fiber optics, and may take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
(44) While the flowcharts have been discussed and illustrated in relation to a particular sequence of events, it should be appreciated that changes, additions, and omissions to this sequence can occur without materially affecting the operation of the disclosed configurations and aspects.
(45) Several variations and modifications of the disclosure can be used. It would be possible to provide for some features of the disclosure without providing others.
(46) In yet another configurations, the systems and methods of this disclosure can be implemented in conjunction with a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device or gate array such as PLD, PLA, FPGA, PAL, special purpose computer, any comparable means, or the like. In general, any device(s) or means capable of implementing the methodology illustrated herein can be used to implement the various aspects of this disclosure. Exemplary hardware that can be used for the present disclosure includes computers, handheld devices, telephones (e.g., cellular, Internet enabled, digital, analog, hybrids, and others), and other hardware known in the art. Some of these devices include processors (e.g., a single or multiple microprocessors), memory, nonvolatile storage, input devices, and output devices. Furthermore, alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
(47) In yet another configuration, the disclosed methods may be readily implemented in conjunction with software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms. Alternatively, the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with this disclosure is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized.
(48) In yet another configuration, the disclosed methods may be partially implemented in software that can be stored on a storage medium, executed on programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like. In these instances, the systems and methods of this disclosure can be implemented as a program embedded on a personal computer such as an applet, JAVA or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated measurement system, system component, or the like. The system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system.
(49) The disclosure is not limited to standards and protocols if described. Other similar standards and protocols not mentioned herein are in existence and are included in the present disclosure. Moreover, the standards and protocols mentioned herein, and other similar standards and protocols not mentioned herein are periodically superseded by faster or more effective equivalents having essentially the same functions. Such replacement standards and protocols having the same functions are considered equivalents included in the present disclosure.