导航

ACTA AERONAUTICAET ASTRONAUTICA SINICA ›› 2020, Vol. 41 ›› Issue (4): 323479-323479.doi: 10.7527/S1000-6893.2019.23479

• Electronics and Electrical Engineering and Control • Previous Articles     Next Articles

Flow allocation of air traffic interdependent network based on functional vulnerability

WANG Xinglong, QI Yannan, PAN Weihuang   

  1. Air Traffic Management College, Civil Aviation University of China, Tianjin 300300, China
  • Received:2019-09-10 Revised:2019-11-29 Online:2020-04-15 Published:2019-11-28
  • Supported by:
    National Natural Science Foundation of China (61571441);National Key Basic Research Program of China(2016YFB0502405);Fundamental Research Funds for the Central Universities(special for Civil Aviation University of China)(3122019D027)

Abstract: According to rules of air traffic management and flight operation, a dependent network model is constructed with airports, routes, and control sectors based on the complex network theory. The influence rules of different disturbance strategies are established. A method for identifying network functional vulnerability by changing rate of network flow entropy and flow loss rate is proposed. In order to reduce the vulnerability of air traffic dependent networks, a coordinated network traffic allocation algorithm based on the improved genetic algorithm is proposed, which takes the minimum total network traffic entropy as the objective function. Taking the airspace in North China as the prototype, the vulnerability occurrence rules and causative factors of the dependent network are identified. Based on this, the genetic algorithm is adopted to obtain the best flow allocation, and the optimized results effectively reduced the functional vulnerability and the total network traffic entropy. Among them, the effect of airport network traffic allocation is the most remarkable, verifying the effectiveness of the method. The research results can provide theoretical support for air traffic management decision-making.

Key words: air traffic interdependent network, vulnerability, traffic flow entropy, flow loss rate, flow allocation

CLC Number: