Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Air traffic dependent network vulnerability identification and control method and system

A technology for air traffic and control methods, applied in data exchange networks, transmission systems, digital transmission systems, etc., can solve problems such as the identification and control of air traffic interdependent networks that are rarely studied, and improve safety and efficiency. sexual effect

Active Publication Date: 2019-05-17
CIVIL AVIATION UNIV OF CHINA
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the related air traffic interdependence network research, the fault propagation law among multi-layer networks and the vulnerability of interdependence networks have been studied, but there is little research on the identification and control of the vulnerability of air traffic interdependence networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Air traffic dependent network vulnerability identification and control method and system
  • Air traffic dependent network vulnerability identification and control method and system
  • Air traffic dependent network vulnerability identification and control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0053] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element referred to must have a particular orientation, be constructed and operate in a particular orientation, and thus should not be construed as limiting the invention. In addition, the terms "first", "second", etc. are used for descriptive purposes only, and should not be understood ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an air traffic dependent network vulnerability identification and control method and system. According to the method and the system, firstly, an air traffic dependency network model connected by airport network, airway network and control sector network is established; disturbance strategies of random disturbance and deliberate disturbance are used for disturbing nodes of the air traffic dependent network; calculating a change rate of a structure vulnerability related characteristic index and a change rate of a function vulnerability related index of the dependent network; and identifying a change rule of the structure vulnerability and the function vulnerability of the dependent network, and finally, optimizing the vulnerability of the dependent network by performing flow coordination control on the dependent network according to an identification result. In combination with the vulnerability analysis result of the air traffic dependency network, the traffic flow of the network is subjected to coordination control again, so that the traffic flow of the air traffic dependency network tends to be ordered, and the vulnerability of the network is reduced.

Description

technical field [0001] The invention belongs to the technical field of air traffic management, and in particular relates to a method and system for identifying and controlling the vulnerability of an air traffic dependent network. Background technique [0002] When the air traffic system is in operation, it often encounters internal or external disturbances of the system (such as flight take-off and landing queues caused by unreasonable airport time, bad weather or military activities that cause the capacity of airport routes to decrease, etc.), resulting in a decline in the performance and efficiency of air traffic flights. This leads to the vulnerability of the system. The performance of the vulnerability of the air traffic system not only threatens the safety of the air traffic system, but also destroys the normal flight transportation function of the system, so the research on the identification and control of the vulnerability of the air traffic system has positive prac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/26
Inventor 齐雁楠苗尚飞王兴隆潘维煌
Owner CIVIL AVIATION UNIV OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products