Computational Intelligence - November 2014 - 59

B. Traffic with TMA

To avoid the N(N-1)/2 time-consuming pair-wise
Since it is not possible to modify the shape
of the trajectories in the TMA, the TMAcomparisons, which are prohibitive in our continentraffic is much more constrained than the
talscale application context, we propose a grid-based
en-route traffic. Indeed, the interactions
interaction detection scheme which is implemented
occurring in en-route airspace can be separated in space and in time, while the interin a so-called hash table.
actions occurring in the TMA can only be
separated by acting in the time domain. In
tions. Moreover, the algorithm has to modify more trajectoorder to take into account the trajectory segments that
ries in order to solve all the interactions.
belong to the TMA, we first set the size of the minimum
One observes that the computation time required to
separation N hTMA to 3 NM. The trajectory set consists of
obtain the interaction-free solution depends on the size of
N = 30, 695 trajectories which yields U tot,initial = 235, 632
the solution space. As expected, with the same setting
initial interactions.
The input parameters of the optimization algorithm are,
d i = 0.12 and maximum time shift, -d ia = d id = 60 minutes
here again, empirically set. Two different values for the maxi(case 1), the algorithm requires significantly more computamum departure time shift (- d ia, d id) and for the maximum
tion time for solving the scenario with TMA traffic than to
solve the scenario involving only en-route traffic. However,
route length extension (d i) are used, and their values are given
the required computation time decreases significantly when
in Table 3. The simulation is carried out 10 times for each of
the solution space is relaxed (i.e., when more candidate soluthe three cases in Table 3. Again, the proposed algorithm is
tions are considered; case 2 and case 3).
able to find interaction-free solutions ^U tot,final = 0h for the
given traffic situation involving the high-density traffic
occurring in the TMA. The computation time and the numC. Taking into Account Uncertainty
ber of modified trajectories relevant to each case of the optiIn this subsection, we consider the uncertainty of aircraft posimization constraints are compared in Figure 19.
tion in the horizontal plane. Simulations were performed on
Remark that the initial interaction when taking into
both the en-route traffic scenario, and on the traffic scenario
account the air-traffic in the TMA is significantly higher than
involving the TMA. The uncertainty margin in en-route is set
when considering only en-route traffic. This is due to the
to R enroute = 3 NM. The uncertainty margin in the TMA is not
high density of the traffic in the TMA. In addition, our intertaken into account ^R TMA = 0h, since during this phase of
action-detection method cannot distinguish aircraft using
flight, aircraft are usually required to follow a given path with
parallel runways from actual interaction. This leads to some
very high precision. The user-defined input parameters of the
false-positive contributions to the interactions. This larger
optimization algorithm are empirically set as follows. The maxproblem instance is more difficult to solve, and requires lonimum departure time shift is -d ia, d id = 120 minutes, and the
ger computation time to converge to interaction-free solumaximum route length extension d i is 0.25. The number of
1400
Number of Modified Trajectories (%)

90

Computation Time (minutes)

1200
1000
800
600
400
200
0

Case 1

Case 2
(a)

Case 3

Modified Routes
Modified Departure Times

80
70
60
50
40
30
20
10
0

Case 1

Case 2

Case 3

(b)

Figure 19 (a) Impact of the size of the solution space on the computation time. (b) Impact of the size of the solution space on the number of
modified routes and the number of modified departure times.

november 2014 | Ieee ComputatIonal IntellIgenCe magazIne

59



Table of Contents for the Digital Edition of Computational Intelligence - November 2014

Computational Intelligence - November 2014 - Cover1
Computational Intelligence - November 2014 - Cover2
Computational Intelligence - November 2014 - 1
Computational Intelligence - November 2014 - 2
Computational Intelligence - November 2014 - 3
Computational Intelligence - November 2014 - 4
Computational Intelligence - November 2014 - 5
Computational Intelligence - November 2014 - 6
Computational Intelligence - November 2014 - 7
Computational Intelligence - November 2014 - 8
Computational Intelligence - November 2014 - 9
Computational Intelligence - November 2014 - 10
Computational Intelligence - November 2014 - 11
Computational Intelligence - November 2014 - 12
Computational Intelligence - November 2014 - 13
Computational Intelligence - November 2014 - 14
Computational Intelligence - November 2014 - 15
Computational Intelligence - November 2014 - 16
Computational Intelligence - November 2014 - 17
Computational Intelligence - November 2014 - 18
Computational Intelligence - November 2014 - 19
Computational Intelligence - November 2014 - 20
Computational Intelligence - November 2014 - 21
Computational Intelligence - November 2014 - 22
Computational Intelligence - November 2014 - 23
Computational Intelligence - November 2014 - 24
Computational Intelligence - November 2014 - 25
Computational Intelligence - November 2014 - 26
Computational Intelligence - November 2014 - 27
Computational Intelligence - November 2014 - 28
Computational Intelligence - November 2014 - 29
Computational Intelligence - November 2014 - 30
Computational Intelligence - November 2014 - 31
Computational Intelligence - November 2014 - 32
Computational Intelligence - November 2014 - 33
Computational Intelligence - November 2014 - 34
Computational Intelligence - November 2014 - 35
Computational Intelligence - November 2014 - 36
Computational Intelligence - November 2014 - 37
Computational Intelligence - November 2014 - 38
Computational Intelligence - November 2014 - 39
Computational Intelligence - November 2014 - 40
Computational Intelligence - November 2014 - 41
Computational Intelligence - November 2014 - 42
Computational Intelligence - November 2014 - 43
Computational Intelligence - November 2014 - 44
Computational Intelligence - November 2014 - 45
Computational Intelligence - November 2014 - 46
Computational Intelligence - November 2014 - 47
Computational Intelligence - November 2014 - 48
Computational Intelligence - November 2014 - 49
Computational Intelligence - November 2014 - 50
Computational Intelligence - November 2014 - 51
Computational Intelligence - November 2014 - 52
Computational Intelligence - November 2014 - 53
Computational Intelligence - November 2014 - 54
Computational Intelligence - November 2014 - 55
Computational Intelligence - November 2014 - 56
Computational Intelligence - November 2014 - 57
Computational Intelligence - November 2014 - 58
Computational Intelligence - November 2014 - 59
Computational Intelligence - November 2014 - 60
Computational Intelligence - November 2014 - 61
Computational Intelligence - November 2014 - 62
Computational Intelligence - November 2014 - 63
Computational Intelligence - November 2014 - 64
Computational Intelligence - November 2014 - 65
Computational Intelligence - November 2014 - 66
Computational Intelligence - November 2014 - 67
Computational Intelligence - November 2014 - 68
Computational Intelligence - November 2014 - 69
Computational Intelligence - November 2014 - 70
Computational Intelligence - November 2014 - 71
Computational Intelligence - November 2014 - 72
Computational Intelligence - November 2014 - 73
Computational Intelligence - November 2014 - 74
Computational Intelligence - November 2014 - 75
Computational Intelligence - November 2014 - 76
Computational Intelligence - November 2014 - 77
Computational Intelligence - November 2014 - 78
Computational Intelligence - November 2014 - 79
Computational Intelligence - November 2014 - 80
Computational Intelligence - November 2014 - Cover3
Computational Intelligence - November 2014 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com