Wild animal interception system and operation method

文档序号:1398956 发布日期:2020-03-06 浏览:35次 中文

阅读说明:本技术 野生动物拦截系统和操作方法 (Wild animal interception system and operation method ) 是由 斯蒂芬·亚历山大·施温特 于 2019-08-06 设计创作,主要内容包括:一种用于操作野生动物拦截系统的系统和方法,包括接收预定区域中存在入侵物的指示,确定在预定区域中的入侵物的位置,以及通过运载工具的至少一个子集远离预定区域引导入侵物。(A system and method for operating a wildlife intercept system includes receiving an indication of the presence of an intruder in a predetermined area, determining the location of the intruder in the predetermined area, and directing the intruder away from the predetermined area by at least a subset of vehicles.)

1. A method of operating an intruder interception system, the method comprising:

receiving, at a controller module, an indication of the presence of an intruder in a predetermined area;

determining, in the controller module, a location of the intruder in the predetermined area;

generating, in the controller module, a set of intercept paths configured to vectorize the intruder toward a capture area;

providing the set of intercept paths to a respective set of intercept vehicles; and

operating the set of intercept vehicles according to the set of intercept paths.

2. The method of claim 1, wherein receiving comprises receiving data from a sensor array.

3. The method of claim 2, wherein determining the location comprises determining the location of the intruding object based on data received from the sensor array.

4. The method of claim 1 or 2, wherein the set of intercepting vehicles comprises at least one air-based vehicle and at least one ground-based vehicle.

5. The method of claim 4, wherein generating the intercept path for the at least one ground-based vehicle comprises avoiding a ground-based obstacle.

6. The method of claim 4, wherein generating the intercept path for the at least one air-based vehicle is based on avoiding a ground-based obstacle.

7. The method of claim 1 or 2, further comprising: receiving, at the controller module, an indication of a presence of the intruder in a protected area, the protected area being a subset of the predetermined area.

8. The method of claim 7, wherein generating the set of intercepted paths further comprises: generating a first portion of the set of interception paths configured to vector the intruder away from the protected region and a second portion of the set of interception paths configured to vector the intruder toward the capture tile.

9. The method of claim 1 or 2, wherein generating the set of intercepted paths further comprises: generating a first portion of the set of intercept paths configured to direct at least a subset of the intercept vehicles between the intruder and a protected area and a second portion of the set of intercept paths configured to vector the intruder toward the capture area.

10. A system for vectoring an intruder away from a predetermined site, comprising:

a sensor array disposed proximate to the predetermined block and configured to detect the presence of the intruder within the predetermined block;

a set of intercepting vehicles adapted to move within the predetermined block and operable to perform movements within the predetermined block according to a respective set of intercepting paths; and

a controller module configured to receive an indication from the sensor array that the intruder is present in a predetermined tile, to determine a location of the intruder in the predetermined tile, to generate a set of intercept paths, and to provide the set of intercept paths to the set of intercept vehicles for execution of the set of intercept paths, the set of intercept paths being configured to vectorize the intruder towards a capture tile.

Technical Field

The present disclosure relates to a method and apparatus for operating an intruder interception system, and more particularly to a contactor, and more particularly to intercepting intruders in a restricted area by an intercepting vehicle.

Background

Wildlife or animals may be present at airport sites, including during flight operations. Wildlife intruders in various areas of an airport ground, such as an airstrip, may cause flight delays, aircraft damage, or other unexpected consequences.

Disclosure of Invention

In one aspect, the present disclosure relates to a method of operating an intruder interception system, the method comprising: receiving, in a controller module, an indication of the presence of an intruding object in a predetermined area; determining, in the controller module, a location of an intruding object in a predetermined area; generating, in a controller module, a set of intercept paths configured to vectorize an intruder towards a capture zone; providing a set of intercept paths to a corresponding set of intercept vehicles (vehicles); and operating a set of intercept vehicles according to a set of intercept paths.

In another aspect, the present disclosure is directed to a system for vectorizing an intruder away from a predetermined tile, comprising: a sensor array disposed proximate to the predetermined area and configured to detect the presence of an intruding object within the predetermined area; a set of intercepting vehicles adapted to move within a predetermined block and operable to perform movements within the predetermined block according to a respective set of intercepting paths; and a controller module configured to receive an indication from the sensor array that an intruder is present in the predetermined zone to determine a location of the intruder in the predetermined zone to generate a set of intercept paths and provide the set of intercept paths to a set of intercept vehicles for execution of the set of intercept paths, the set of intercept paths configured to vectorize the intruder towards the capture zone.

Drawings

In the drawings:

FIG. 1 illustrates a schematic diagram of an airport with intruders in accordance with various aspects described herein.

Fig. 2 illustrates a schematic diagram of a wildlife interception system for the airport of fig. 1, in accordance with various aspects described herein.

Fig. 3 is an exemplary schematic diagram of operation of the wildlife interception system of fig. 2 at the airport of fig. 1, in accordance with various aspects described herein.

Fig. 4 is a flow diagram of an exemplary method of operating the wildlife interception system of fig. 2, in accordance with various aspects described herein.

Fig. 5 is a flow diagram of another exemplary method of operating the wildlife interception system of fig. 2, in accordance with various aspects described herein.

Detailed Description

Systems may be utilized to reduce wildlife intrusions in the protected area to improve airport operating efficiency. Aspects of the present disclosure may be implemented in any environment, apparatus, or method for operating a system for directing or redirecting an intruder in a predetermined or protected area outside the predetermined or protected area, regardless of why or where the area is defined. In one non-limiting example, the intruder may comprise a wildlife, an animal or a human, and the predetermined or protected area may comprise an airport or a runway.

While a "set" of various elements will be described, it should be understood that a "set" can include any number of the corresponding elements, including only one element. Also as used herein, although a sensor may be described as "sensing" or "measuring" a corresponding value, sensing or measuring may include determining a value indicative of or related to the corresponding value, rather than directly sensing or measuring the value itself. The sensed or measured values may further be provided to other components. For example, a value may be provided to a controller module or processor, and the controller module or processor may perform processing on the value to determine a representative value or electrical characteristic representative of the value.

All directional references (e.g., radial, axial, up, down, left, right, lateral, front, back, top, bottom, above, below, vertical, horizontal, clockwise, counterclockwise) are only used for identification purposes to aid the reader's understanding of the present disclosure, and do not create limitations, particularly as to the position, orientation, or use thereof. Connection references (e.g., attached, coupled, connected, and joined) are to be construed broadly and may include intermediate members between a collection of elements and relative movement between elements unless otherwise indicated. Thus, joinder references do not necessarily infer that two elements are directly connected and in fixed relation to each other.

Further, as used herein, "vectoring" or "vectoring" may refer to an action of directing an object in a particular direction or destination. For example, the first component may vector the object towards a particular or desired destination, or away from a reference point or region. In this sense, a vector may include a magnitude (e.g., a velocity at which an object is directed) and a direction, and may refer to a ground-based or air-based object. Vectoring may also be referred to as pasturing (herding), driving, or another exercise of power, strength, or scare that produces desired motion in the vectorized object.

As used herein, a "system" or "controller module" may include at least one processor and memory. Non-limiting examples of memory may include Random Access Memory (RAM), Read Only Memory (ROM), flash memory, or one or more different types of portable electronic memory, such as a disk, DVD, CD-ROM, etc., or any suitable combination of these types of memory. The processor may be configured to execute any suitable program or executable instructions designed to perform various methods, functions, processing tasks, calculations, etc. to enable or implement the operations or operations of the techniques described herein. The program may comprise a computer program product which may include a machine-readable medium for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. Generally, such computer programs may include routines, programs, objects, components, data structures, algorithms, etc., that have the technical effect of performing particular tasks or implementing particular abstract data types.

As used herein, a "path" or "path data" may include a specified set of instructions or commands that define the motion of a vehicle. In the example of a ground vehicle, the path may include heading, speed, approach, turn, acceleration, etc. to define directional motion along the path. In the example of an air-based vehicle, the path may include a subset of profiles (such as a ascent or ascent profile, a cruise profile, or a descent profile) in addition to the directional motion. In another example, a path may include waypoint data, approach data or a corresponding set of performance characteristic "points" data, where a set of "points" may define a determined, estimated or predicted position, airspeed, ground speed, altitude, heading, etc. for a series or sequence of points along the path. In this sense, the path or path data may comprise a series or sequence of individual or discrete "points" or "models".

Non-limiting examples of vehicles may include automobiles, remotely controlled wheeled vehicles, unmanned autonomous vehicles, unmanned aerial vehicles, aircraft, and the like. As used herein, the term "determining" refers to a system or method determining an outcome or consequence that has occurred or is occurring (e.g., an outcome or consequence that is "current" or "now"), and in contrast to the term "predicting," which refers to a prospective determination or estimation that lets the outcome or consequence be known before the actual performance occurs. The exemplary drawings are for illustrative purposes only, and the dimensions, locations, order and relative sizes reflected in the drawings may vary.

FIG. 1 illustrates one non-limiting example of a predefined or predetermined area 10 or zone, shown as an airport 12. In an example, the airport 12 may be at least partially defined by a geometric perimeter structure (e.g., a fence) or a naturally occurring perimeter (e.g., a stream or embankment). The airport 12 may include a set of structures 14, shown schematically as airport control towers 16, at least one airport terminal 18, and an airstrip 20 for taxiing, taking-off or landing an aircraft 24.

A portion of the runway 20 or a portion of the airport 12 that includes or surrounds the runway 20 may be further defined as a "protected" area or zone and is shown in dashed outline 22. In one example, protected area 22 may be larger than runway 20, or may include a buffer area around runway 20. As used herein, a "protected" area 22 may be any area or block in which intrusion or unauthorized access may have particularly undesirable consequences, or in which enhanced authorized access reduces particularly undesirable consequences. In the example of a protected area 22 surrounding the runway 20, the intruder may interfere with aircraft flight, such as a takeoff or landing event. As used herein, a "predetermined" area 10 or zone may be distinguished from a "protected" area 22 or zone based on, for example, authorized access (e.g., authorized) or in response to unauthorized access by an intruder (e.g., "intruders"). As used herein, "invader" may include animals, birds, wildlife or humans. Also as shown, the protected area 22 may include only a subset of the predetermined area 10.

In the example of an airport 12, large areas of land may sometimes include or receive unauthorized, unintentional or undesired wildlife intrusion in a predetermined area 10 or a protected area 22. Non-limiting examples of wild animals may include ground animals (e.g., dogs, cats, deer, rabbits, etc.) or aerial animals (ducks, geese, migratory birds, etc.). An illustrative example of an intruder from a wild animal, human or other unauthorized entity is represented by the dashed circle 32 in fig. 1. An intrusion of a wildlife 32 at or near the airport 12 or runway 20 may result in a particularly undesirable contact of the aircraft 24 or "bump" between the aircraft 24 and the wildlife 32, resulting in damage to the aircraft 24, or delaying the flight schedule of the airport 12 until the wildlife 32 is captured, scared off or otherwise removed from the predetermined area 10 or protected area 22. Thus, a system or operation for reducing the presence or invasion of wild animals 32 may reduce the risk of such impact or delay.

In one non-limiting example, the airport 12 may also include a set of sensors 30 or detectors spaced or arranged within the predetermined area 10 or around the protected area 22 to sense, measure or otherwise detect the presence of an intruder or wildlife 32. In one example, the set of sensors 30 may be arranged in an array. In another example, such as the example shown in fig. 1, the set of sensors 30 may be arranged to define a sensing perimeter around a subset of the predetermined area 10, such as around the protected area 22 or runway 20. In this example, the set of sensors 30 may be proximately located for sensing or detecting an intruder or the presence of a wildlife 32 proximate the protected area 22 before the wildlife 32 reaches the protected area 22.

Non-limiting examples of the set of sensors 30 may include, but are not limited to, radar, wavelength or frequency based sensors (such as doppler radar, motion detectors, infrared sensors), vision based sensors (e.g., cameras), and the like. In these examples, the set of sensors 30 may be configured or adapted to sense, measure, confirm or identify the presence of an object or intruder based on size or shape detection, movement detection, or the like. In one or more doppler radars or another differential motion based radar examples, the set of sensors 30 may be configured or adapted to sense, measure, confirm or identify the presence of an object or intruder based on, for example, respiration, wingflapping, or another predefined or predetermined characteristic motion of a general or specific wildlife 32.

The illustrated arrangement of the set of sensors 30 is only one example of an arrangement of the set of sensors 30. Aspects of the present disclosure contemplate additional sensors 30 or arrangements thereof.

Additionally, the airport 12 may include at least one ground-based or air-based intercept vehicle 40 located around the airport 12, the predetermined area 10, or the protected area 22. In another non-limiting example, the set of intercepting vehicles 40 may comprise a combination of ground-based or air-based intercepting vehicles 40. The airport 12 or predetermined area 10 may also include a set of predetermined or predefined capture areas or zones 42 configured or adapted to retain or restrict intruders or wildlife 32. For example, the capture area 42 may include a set of structural boundaries, such as doors, fences, cages, etc., or may include natural boundaries, such as a stream. In another non-limiting example, the set of catch blocks 42 can include a lethal or non-lethal mechanical trap mechanism for holding or restraining the wild animal 32. In yet another non-limiting example, the set of capture areas 42 may be spaced around the airport 12, the predetermined area 10 or the protected area 22, or may be adapted or configured to hold or confine a particular species, category or species of wildlife 32 (e.g., larger cages of deer, closed cages of birds, etc.).

A schematic diagram of a wildlife interception system 50, such as for use at the airport 12 of fig. 1, is shown in fig. 2. As shown, the wildlife intercept system 50 can include a wildlife management system 52, the set of sensors 30 (shown schematically as a single sensor 30), and the set of intercept vehicles 40 (shown schematically as a single intercept vehicle 40). In one non-limiting example, wildlife management system 52 can receive information, data, communications, etc. from sensors 30 and can be in two-way communication with intercept vehicle 40.

The set of intercept vehicles 40 may also include a controller module 64 having a processor 66 and a memory 68. Further, non-limiting examples of one or more of the set of intercepting vehicles 40 may include, for example, setup data generating inputs including, but not limited to, a set of sensors 70 (which may be similar to the set of sensors 30) or a Global Navigation Satellite System (GNSS) module 72. The set of intercept vehicles 40 may also include a set of response devices including, but not limited to, a set of interaction devices 74 or another navigation system 76.

The set of interaction devices 74 may include devices 74 configured or adapted to interact with the intruder or wildlife 32. In one example, "interacting" with the wildlife 32 may include exposing the wildlife 32 to an intentional or intentional startle interaction, such as flashing, lighting, loud sounds, distress calls, and the like. In this sense, the interaction device 74 is designed or adapted to frighten, frighten or cause a "flight" response of the wild animal 32 away from the respective intercepting vehicle 40. Non-limiting examples of interaction devices 74 may include fireworks, blank ammunition, projectiles, lights, fireworks, lighting (e.g., flashing, strobing, changing colors, patterns, etc.), and the like. In one example, a particular interaction device 74 may be selected or customized based on the sensed or identified wildlife 32 (e.g., rabbits are most afraid of fireworks). In another example, the interactive devices 74 may be selected based on rotation or randomly selected to reduce repeated exposure or familiarity of the wildlife 32 with a particular interactive device 74.

The navigation system 76 may also be distinct from the GNSS module 72. In one example, the GNSS module 72 may be configured or adapted to report the current position or orientation of the intercepting vehicle 40 to the controller module 64 of the intercepting vehicle 40 or to the wildlife management system 52. Instead, the navigation system 76 may be configured or adapted to operate the movement of the intercept vehicle 40 in response to receiving navigation directions, commands, instructions, or the like. In one non-limiting example, the navigation system 76 may operate to navigate the movement of the intercept vehicle 40 based on the path or path data received from the wildlife management system 52.

The wildlife management system 52 can also include a controller module 58 having a processor 60 and a memory 62. Wildlife interception system 50 can also include or be in communication with alternative systems. For example, the wildlife management system 52, such as via the controller module 58, may optionally request and receive data from an airport location database 56, the airport location database 56 including geographic or navigational data related to the airport 12, the predetermined area 10, the runway 20, the protected area 22, or other airport information (e.g., streams, boulder placements, etc.). In another example, wildlife management system 52, e.g., via controller module 58, may optionally request and receive data from an aircraft traffic management system 54, e.g., a system tasked or responsible for notifying the movement of aircraft 24 about airport 12. As used herein, "communication" and "transfer" between various components may be accomplished through analog or digital transmission through a transconductance medium (e.g., a conductive data transmission line, a network, a power line network, etc.) or a non-conductive medium (e.g., wireless transmission).

Non-limiting aspects of the present disclosure may include operation of the wildlife intercept system 50 to vector, track, herd, or otherwise direct detected intruders or wildlife 32 away from the protected area 22 (e.g., runway 20) toward the capture zone 42. For example, the set of sensors 30 may be operable to sense or measure the presence of wildlife 32 relative to the predetermined area 10 or the protected area 22 and provide an indication of the presence to the wildlife management system 52. In response to the detection or indication of the presence of a wildlife 32, the wildlife management system 52 can determine the location of the intruder or wildlife 32, for example, spatially based on the received detection of the set of sensors 30, or relative to one or more sensors 30. Once the location of the wildlife 32 is determined, the wildlife management system 52 or the controller module 58 can generate a set of intercept paths, such as navigation instructions, configured to vectorize the wildlife 32 towards a particular capture zone 42.

The wildlife management system 52 or the controller module 58 can provide, provision, or otherwise communicate the set of intercept paths to the set of intercept vehicles 40 at the airport 12, and in response to the set of intercept paths, the set of intercept vehicles 40 can navigate motion in accordance with the intercept paths in order to vector wildlife 32, causing wildlife 32 to hear or otherwise direct wildlife 32 toward a particular capture zone 42, without entering another set of intercept vehicles 40 or other known traffic at the airport 12.

Fig. 3 illustrates one non-limiting example of the operation of a wildlife interception system 50 according to aspects of the present disclosure. As shown, the set of sensors 30 can sense or detect the presence of a wild animal 32 relative to the predetermined area 10 or relative to the protected area 22. In response to receiving the indication of the presence of wildlife 32, wildlife management system 52 (not shown) may determine a location of wildlife 32 and generate a set of intercept paths 180 for the set of intercept vehicles 40 spaced around airport 12. The set of intercepted paths 180 is shown as including: a first interception path 190, whereby the interception vehicle 40 can approach the wild animal 32 in a direction or vector from the rear and slightly to the right (with respect to the direction of movement); a second interception path 192 whereby the interception vehicle 40 can approach the wildlife 32 in a rearward direction or vector; and a third interception path 194, whereby the interception vehicle 40 can approach the wild animal 32 in a direction or vector from the rear and slightly to the left (with respect to the direction of movement).

In this example, a set of intercept vehicles 40 are positioned to approach the wildlife 32 from behind, including left and right rear locations, which may be selected to be designed or intended to cause movement of the wildlife 32 downwardly (relative to fig. 3) towards the catch block 42. The resulting movement of wild animal 32 is represented by a sequential ordered schematic, followed by position 132, followed by position 232, and finally ending at position 332, where wild animal 32 is captured, retained or otherwise restrained in capture block 42 at position 332.

As shown, for example, the set of intercepted paths 180 may include a plurality of path portions. For example, the first portion 188 of the first intercept path 190 may be adjusted, generated, selected or otherwise configured to position the intercept vehicle 40 around the wildlife 32 in preparation for performing vectoring of the wildlife 32 towards the capture zone 42. In this example, the second portion 184 of the first interception path 190 may comprise ongoing vectorization as wildlife 32 continues along the wildlife movement of positions 132,232, 332. To this extent, the first intercepted path 190 may include a first portion 188 and a second portion 184.

In yet another example, a portion of at least a subset of the intercept paths 180 may include a portion adapted to be generated, selected or otherwise configured to position at least one intercept vehicle 40 between an intruder or wildlife 32 and a protected area 22 or runway 20. As shown, the third intercept path 194 may include a portion 182, the portion 182 being adapted, generated, selected or otherwise configured to position the intercept vehicle 40 directly between the runway 20 and wildlife 32. In this sense, the resulting set of interception paths 180 can work together to ensure not only that the wild animals 32 are moving in the intended direction (e.g., 32,132,232,332, toward the capture block 42), but also that the wild animals 32 do not drift or divert as they are driven or herded by the vehicle toward the protected area 22. Alternatively, if the wildlife 32 does divert, positioning the intercept vehicle 40 directly between the runway 20 and the wildlife 32 will cause the wildlife 32 to divert away from the runway 20, which is a more acceptable solution.

As further shown, the portion 186 of the fourth interception path 196 can be a trailing catch-up for wild animals 32, which is located between the protected area 22 and the wild animals 32. This additional fourth interception path 196 can be operable to ensure that the wildlife 32 is again forced out of the protected area 22 when the interception vehicle 40 executes or operates the first, second and third interception paths 190,192, 194. In addition to executing the set of intercept paths 180, the set of intercept vehicles 40 may also utilize one or more interactive devices 74 to assist in vectoring, herding, or guided movement of wildlife 32. In one non-limiting example, based on the indicated, identified or determined specific characteristics of wildlife 32, at least one of the set of intercept vehicles 40, at least one of the generated set of intercept paths 180, or at least one operation of the interaction device 74 may be selected by wildlife management system 52. For example, the unmanned air intercept vehicle 40 may most effectively vector migratory wildlife 32, while the pyrotechnic interaction device 74 may most effectively vector deer wildlife 32. In one non-limiting example, the generating of the set of intercept paths 180 may further include generating a set of interactions with the interaction devices 74 of the set of intercept vehicles 40 and providing the generated interactions and the intercept paths 180 to the set of intercept vehicles.

In another non-limiting example, the wildlife vectoring system 50 or wildlife management system 52 can be configured to maintain operational activity in vectorized or herded wildlife 32 away from the protected area 22 until authorized by the aircraft traffic management system 54. For example, upon receiving an indication of the presence of an intruder, the wildlife vectoring system 50 or wildlife management system 52 can alert the aircraft traffic management system 54 and wait for operational confirmation or approval before performing an intercept of the wildlife 32. In this example, if the aircraft 24 is on the runway 20 and is ready to take off, the aircraft traffic management system 54 may command or otherwise instruct the wildlife vectoring system 50 to remain in motion to avoid intrusion of the intercept vehicles 40 into the runway 20 until after flight take off, thereby avoiding traffic delays. In yet another non-limiting example of the wildlife vectoring system 50, aspects of the wildlife management system 52 can be configured or adjusted to ensure that the generated set of intercept paths 180 is compatible with the corresponding set of intercept vehicles 40. For example, if a particular intercept path 180 is to traverse terrain-based or ground-based obstacles or obstructions, such as steep dams, or traverse large rocks, the wildlife management system 52 may be configured or adapted to avoid the obstacle (e.g., to regenerate a new intercept path 180 that avoids the obstacle), or to assign that particular intercept path 180 to an intercept vehicle 40 that is not obstructed by the obstacle (e.g., an unmanned vehicle that can fly over the rocks). In one non-limiting example, terrain-based or ground-based obstacles or obstructions may be defined in the airport location database 56.

Fig. 4 shows a flow diagram illustrating a method 200 of operating a wildlife interception system 50. At 210, the method 200 may begin by receiving at the controller module 58 an indication of the presence of an intruder or wildlife 32 in a predetermined area 110 (e.g., an airport 12), a protected area 22, or a runway 20. The method may further include outputting a signal, for example from at least one of the set of sensors 30, the signal received at 210. Next, at 220, the method 200 may determine the location of an intruder in the predetermined area 10, airport 12, protected area 22 or runway 20 in the controller module 58. The invader may include animals, humans, wildlife 32, etc. Then, at 230, the method 200 may generate a set of intercept paths 180 in the controller module 58 configured to vector the intruder or wildlife 32 towards the capture area 42. Then, at 240, the method 200 may operatively provide the set of intercept paths 180 to a corresponding set of intercept vehicles 40. Finally, the method 200 performs the operation of the set of intercept vehicles 40 according to the set of intercept paths 180. It should be understood that the method may include operating a single intercept vehicle 40 along a single intercept path.

Fig. 5 shows a flow diagram illustrating another method 300 of operating a wildlife interception system 50. At 310, the method 300 begins by outputting a signal from at least one sensor 30 indicating the presence of an animal or wildlife 32 in the airport 12 or location of the predetermined area 10. Next, at 320, the method continues with receiving a signal at the controller module 58, the signal being the signal output at the controller module in step 310. Then, at 330, the method 300 generates a set of intercept paths 180 in the controller module 58 that are configured to herd the animal or wildlife 32 toward the capture area 42. Next, at 340, the method 300 provides the set of intercept paths 180 to a respective set of intercept vehicles 40, and at 350, operates the set of intercept vehicles 40 according to the set of intercept paths 180.

The depicted sequence is for illustrative purposes only and is not meant to limit the methods 200,300 in any way, as it is understood that the portions of the methods 200,300 may be performed in a different logical order, additional or intermediate portions may be included, or portions of the described methods may be divided into multiple portions, or the described portions of the methods may be omitted without departing from the described methods.

In addition to the many other possible aspects and configurations illustrated in the above-described figures, the present disclosure also encompasses many other possible aspects and configurations. In addition, the design and placement of the various components of the system may be rearranged such that a number of different configurations may be implemented.

Aspects disclosed herein provide methods and systems for intercepting wildlife relative to an airport. The technical effect is that the above aspects enable strategic and efficient pasturing or vectoring of wildlife away from a protected area of an airport (e.g., a runway) to prevent inadvertent damage due to contact with wildlife. One advantage that may be realized by the above aspects is that the above aspects have improved ability to manage wildlife intrusions relative to airports. Improved wildlife management capabilities can reduce the occurrence of foreign object damage to aircraft, reduce flight or airport delays caused by unauthorized runway or protected area entry, and the like. Another advantage may include vectoring or herding wildlife toward a capture zone for later retrieval. In some cases, repelling wild animals alone does not eliminate or reduce the risk of future invasion. Aspects of the present disclosure may be included wherein, for example, capturing wildlife may include permanently removing the wildlife, such as by transferring it to a location several miles away from an airport, making the same animal less likely to cause future intrusion.

To the extent not described, the different features and structures of the various aspects may be used in combination with each other as desired. This one feature cannot be shown in all aspects and is not meant to be construed as it cannot, but is done for brevity of description. Thus, various features of different aspects may be mixed and matched as desired to form new aspects, whether or not the new aspects are explicitly described. The present disclosure encompasses combinations or permutations of features described herein.

Further aspects of the invention are provided by the subject matter of the following clauses:

1. a method of operating an intruder interception system, the method comprising: receiving, at a controller module, an indication of the presence of an intruder in a predetermined area; determining, in the controller module, a location of an intruding object in a predetermined area; generating, in a controller module, a set of intercept paths configured to vectorize an intruder towards a capture zone; providing a set of intercept paths to a respective set of intercept vehicles; and operating a set of intercept vehicles according to a set of intercept paths.

2. The method of any preceding item, wherein receiving comprises receiving data from a sensor array.

3. The method of any preceding item, wherein determining the location comprises determining a location of an intruding object based on data received from the sensor array.

4. The method of any preceding claim, wherein a set of intercepting vehicles comprises at least one air-based vehicle and at least one ground-based vehicle.

5. The method of any preceding item, wherein generating an intercept path for at least one ground-based vehicle comprises avoiding a ground-based obstacle.

6. The method of any preceding item, wherein generating an intercept path for at least one air-based vehicle is based on avoiding a ground-based obstacle.

7. The method of any preceding claim, further comprising receiving, at the controller module, an indication of the presence of an intruder in a protected area, the protected area being a subset of the predetermined area.

8. The method of any preceding item, wherein the predetermined area is an airport and the protected area is a runway.

9. The method of any preceding claim, wherein generating a set of interception paths further comprises generating a first portion of the set of interception paths configured to vector an intruder away from a protected area and a second portion of the set of interception paths configured to vector the intruder towards a capture zone.

10. The method of any preceding claim, further comprising alerting an aircraft traffic management system of the presence of an intruder in a predetermined area.

11. The method of any preceding item, further comprising receiving authorization from an aircraft traffic management system to operate a set of intercept vehicles.

12. The method of any preceding item, wherein generating comprises generating, in the controller module, a set of intercept interactions that intercept the vehicle.

13. The method of any preceding item, further comprising operating a set of interactive devices that intercept at least a subset of vehicles, wherein the interactive devices are configured to vector an intruder towards a capture zone.

14. The method of any preceding claim, wherein generating a set of intercept paths further comprises generating a first portion of the set of intercept paths configured to direct at least a subset of intercept vehicles between an intruder and a protected area and a second portion of the set of intercept paths configured to vector the intruder towards the capture zone.

15. A system for vectorizing an intruder away from a predetermined tile, comprising: a sensor array disposed proximate to the predetermined area and configured to detect the presence of an intruding object within the predetermined area; a set of intercepting vehicles adapted to move within a predetermined block and operable to perform movements within the predetermined block according to a respective set of intercepting paths; and a controller module configured to receive an indication from the sensor array that an intruder is present in the predetermined zone to determine a location of the intruder in the predetermined zone to generate a set of intercept paths and provide the set of intercept paths to a set of intercept vehicles for execution of the set of intercept paths, the set of intercept paths configured to vectorize the intruder towards the capture zone.

16. The system of any preceding claim, wherein the sensor array comprises at least a subset of doppler sensors configured to detect movement of the animal.

17. The system of any preceding claim, wherein the capture area is configured to retain the intruder for further retrieval.

18. A method of operating a wildlife interception system, the method comprising: outputting from at least one sensor a signal indicative of the presence of an animal in a location in an airport area; receiving a signal at a controller module; generating a set of intercept paths in the controller module configured to herd animals from a location of the airport area towards the capture zone; providing a set of intercept paths to a set of intercept vehicles; and operating a set of intercept vehicles according to a set of intercept paths.

19. The method of any preceding clause, further comprising: the method includes alerting an aircraft traffic management system to the presence of animals in an airport area and receiving authorization from the aircraft traffic management system to operate a set of intercept vehicles.

20. The method of any preceding item, wherein generating the set of interception paths further comprises generating a first portion of the set of interception paths configured to direct at least a subset of the interception vehicles between the animals and the runway and a second portion of the set of interception paths configured to herd the animals towards the capture area.

This written description uses examples to disclose aspects of the disclosure, including the best mode, and also to enable any person skilled in the art to practice aspects of the disclosure, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the disclosure is defined by the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal languages of the claims.

16页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种宫颈细胞保存液及其制备方法和宫颈细胞保存方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!