Wild animal interception system and operation method
阅读说明:本技术 野生动物拦截系统和操作方法 (Wild animal interception system and operation method ) 是由 斯蒂芬·亚历山大·施温特 于 2019-08-06 设计创作,主要内容包括:一种用于操作野生动物拦截系统的系统和方法,包括接收预定区域中存在入侵物的指示,确定在预定区域中的入侵物的位置,以及通过运载工具的至少一个子集远离预定区域引导入侵物。(A system and method for operating a wildlife intercept system includes receiving an indication of the presence of an intruder in a predetermined area, determining the location of the intruder in the predetermined area, and directing the intruder away from the predetermined area by at least a subset of vehicles.)
1. A method of operating an intruder interception system, the method comprising:
receiving, at a controller module, an indication of the presence of an intruder in a predetermined area;
determining, in the controller module, a location of the intruder in the predetermined area;
generating, in the controller module, a set of intercept paths configured to vectorize the intruder toward a capture area;
providing the set of intercept paths to a respective set of intercept vehicles; and
operating the set of intercept vehicles according to the set of intercept paths.
2. The method of claim 1, wherein receiving comprises receiving data from a sensor array.
3. The method of claim 2, wherein determining the location comprises determining the location of the intruding object based on data received from the sensor array.
4. The method of claim 1 or 2, wherein the set of intercepting vehicles comprises at least one air-based vehicle and at least one ground-based vehicle.
5. The method of claim 4, wherein generating the intercept path for the at least one ground-based vehicle comprises avoiding a ground-based obstacle.
6. The method of claim 4, wherein generating the intercept path for the at least one air-based vehicle is based on avoiding a ground-based obstacle.
7. The method of claim 1 or 2, further comprising: receiving, at the controller module, an indication of a presence of the intruder in a protected area, the protected area being a subset of the predetermined area.
8. The method of claim 7, wherein generating the set of intercepted paths further comprises: generating a first portion of the set of interception paths configured to vector the intruder away from the protected region and a second portion of the set of interception paths configured to vector the intruder toward the capture tile.
9. The method of claim 1 or 2, wherein generating the set of intercepted paths further comprises: generating a first portion of the set of intercept paths configured to direct at least a subset of the intercept vehicles between the intruder and a protected area and a second portion of the set of intercept paths configured to vector the intruder toward the capture area.
10. A system for vectoring an intruder away from a predetermined site, comprising:
a sensor array disposed proximate to the predetermined block and configured to detect the presence of the intruder within the predetermined block;
a set of intercepting vehicles adapted to move within the predetermined block and operable to perform movements within the predetermined block according to a respective set of intercepting paths; and
a controller module configured to receive an indication from the sensor array that the intruder is present in a predetermined tile, to determine a location of the intruder in the predetermined tile, to generate a set of intercept paths, and to provide the set of intercept paths to the set of intercept vehicles for execution of the set of intercept paths, the set of intercept paths being configured to vectorize the intruder towards a capture tile.
Technical Field
The present disclosure relates to a method and apparatus for operating an intruder interception system, and more particularly to a contactor, and more particularly to intercepting intruders in a restricted area by an intercepting vehicle.
Background
Wildlife or animals may be present at airport sites, including during flight operations. Wildlife intruders in various areas of an airport ground, such as an airstrip, may cause flight delays, aircraft damage, or other unexpected consequences.
Disclosure of Invention
In one aspect, the present disclosure relates to a method of operating an intruder interception system, the method comprising: receiving, in a controller module, an indication of the presence of an intruding object in a predetermined area; determining, in the controller module, a location of an intruding object in a predetermined area; generating, in a controller module, a set of intercept paths configured to vectorize an intruder towards a capture zone; providing a set of intercept paths to a corresponding set of intercept vehicles (vehicles); and operating a set of intercept vehicles according to a set of intercept paths.
In another aspect, the present disclosure is directed to a system for vectorizing an intruder away from a predetermined tile, comprising: a sensor array disposed proximate to the predetermined area and configured to detect the presence of an intruding object within the predetermined area; a set of intercepting vehicles adapted to move within a predetermined block and operable to perform movements within the predetermined block according to a respective set of intercepting paths; and a controller module configured to receive an indication from the sensor array that an intruder is present in the predetermined zone to determine a location of the intruder in the predetermined zone to generate a set of intercept paths and provide the set of intercept paths to a set of intercept vehicles for execution of the set of intercept paths, the set of intercept paths configured to vectorize the intruder towards the capture zone.
Drawings
In the drawings:
FIG. 1 illustrates a schematic diagram of an airport with intruders in accordance with various aspects described herein.
Fig. 2 illustrates a schematic diagram of a wildlife interception system for the airport of fig. 1, in accordance with various aspects described herein.
Fig. 3 is an exemplary schematic diagram of operation of the wildlife interception system of fig. 2 at the airport of fig. 1, in accordance with various aspects described herein.
Fig. 4 is a flow diagram of an exemplary method of operating the wildlife interception system of fig. 2, in accordance with various aspects described herein.
Fig. 5 is a flow diagram of another exemplary method of operating the wildlife interception system of fig. 2, in accordance with various aspects described herein.
Detailed Description
Systems may be utilized to reduce wildlife intrusions in the protected area to improve airport operating efficiency. Aspects of the present disclosure may be implemented in any environment, apparatus, or method for operating a system for directing or redirecting an intruder in a predetermined or protected area outside the predetermined or protected area, regardless of why or where the area is defined. In one non-limiting example, the intruder may comprise a wildlife, an animal or a human, and the predetermined or protected area may comprise an airport or a runway.
While a "set" of various elements will be described, it should be understood that a "set" can include any number of the corresponding elements, including only one element. Also as used herein, although a sensor may be described as "sensing" or "measuring" a corresponding value, sensing or measuring may include determining a value indicative of or related to the corresponding value, rather than directly sensing or measuring the value itself. The sensed or measured values may further be provided to other components. For example, a value may be provided to a controller module or processor, and the controller module or processor may perform processing on the value to determine a representative value or electrical characteristic representative of the value.
All directional references (e.g., radial, axial, up, down, left, right, lateral, front, back, top, bottom, above, below, vertical, horizontal, clockwise, counterclockwise) are only used for identification purposes to aid the reader's understanding of the present disclosure, and do not create limitations, particularly as to the position, orientation, or use thereof. Connection references (e.g., attached, coupled, connected, and joined) are to be construed broadly and may include intermediate members between a collection of elements and relative movement between elements unless otherwise indicated. Thus, joinder references do not necessarily infer that two elements are directly connected and in fixed relation to each other.
Further, as used herein, "vectoring" or "vectoring" may refer to an action of directing an object in a particular direction or destination. For example, the first component may vector the object towards a particular or desired destination, or away from a reference point or region. In this sense, a vector may include a magnitude (e.g., a velocity at which an object is directed) and a direction, and may refer to a ground-based or air-based object. Vectoring may also be referred to as pasturing (herding), driving, or another exercise of power, strength, or scare that produces desired motion in the vectorized object.
As used herein, a "system" or "controller module" may include at least one processor and memory. Non-limiting examples of memory may include Random Access Memory (RAM), Read Only Memory (ROM), flash memory, or one or more different types of portable electronic memory, such as a disk, DVD, CD-ROM, etc., or any suitable combination of these types of memory. The processor may be configured to execute any suitable program or executable instructions designed to perform various methods, functions, processing tasks, calculations, etc. to enable or implement the operations or operations of the techniques described herein. The program may comprise a computer program product which may include a machine-readable medium for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. Generally, such computer programs may include routines, programs, objects, components, data structures, algorithms, etc., that have the technical effect of performing particular tasks or implementing particular abstract data types.
As used herein, a "path" or "path data" may include a specified set of instructions or commands that define the motion of a vehicle. In the example of a ground vehicle, the path may include heading, speed, approach, turn, acceleration, etc. to define directional motion along the path. In the example of an air-based vehicle, the path may include a subset of profiles (such as a ascent or ascent profile, a cruise profile, or a descent profile) in addition to the directional motion. In another example, a path may include waypoint data, approach data or a corresponding set of performance characteristic "points" data, where a set of "points" may define a determined, estimated or predicted position, airspeed, ground speed, altitude, heading, etc. for a series or sequence of points along the path. In this sense, the path or path data may comprise a series or sequence of individual or discrete "points" or "models".
Non-limiting examples of vehicles may include automobiles, remotely controlled wheeled vehicles, unmanned autonomous vehicles, unmanned aerial vehicles, aircraft, and the like. As used herein, the term "determining" refers to a system or method determining an outcome or consequence that has occurred or is occurring (e.g., an outcome or consequence that is "current" or "now"), and in contrast to the term "predicting," which refers to a prospective determination or estimation that lets the outcome or consequence be known before the actual performance occurs. The exemplary drawings are for illustrative purposes only, and the dimensions, locations, order and relative sizes reflected in the drawings may vary.
FIG. 1 illustrates one non-limiting example of a predefined or
A portion of the runway 20 or a portion of the
In the example of an
In one non-limiting example, the
Non-limiting examples of the set of
The illustrated arrangement of the set of
Additionally, the
A schematic diagram of a
The set of
The set of
The
The
Non-limiting aspects of the present disclosure may include operation of the
The
Fig. 3 illustrates one non-limiting example of the operation of a
In this example, a set of
As shown, for example, the set of intercepted
In yet another example, a portion of at least a subset of the
As further shown, the
In another non-limiting example, the
Fig. 4 shows a flow diagram illustrating a
Fig. 5 shows a flow diagram illustrating another
The depicted sequence is for illustrative purposes only and is not meant to limit the methods 200,300 in any way, as it is understood that the portions of the methods 200,300 may be performed in a different logical order, additional or intermediate portions may be included, or portions of the described methods may be divided into multiple portions, or the described portions of the methods may be omitted without departing from the described methods.
In addition to the many other possible aspects and configurations illustrated in the above-described figures, the present disclosure also encompasses many other possible aspects and configurations. In addition, the design and placement of the various components of the system may be rearranged such that a number of different configurations may be implemented.
Aspects disclosed herein provide methods and systems for intercepting wildlife relative to an airport. The technical effect is that the above aspects enable strategic and efficient pasturing or vectoring of wildlife away from a protected area of an airport (e.g., a runway) to prevent inadvertent damage due to contact with wildlife. One advantage that may be realized by the above aspects is that the above aspects have improved ability to manage wildlife intrusions relative to airports. Improved wildlife management capabilities can reduce the occurrence of foreign object damage to aircraft, reduce flight or airport delays caused by unauthorized runway or protected area entry, and the like. Another advantage may include vectoring or herding wildlife toward a capture zone for later retrieval. In some cases, repelling wild animals alone does not eliminate or reduce the risk of future invasion. Aspects of the present disclosure may be included wherein, for example, capturing wildlife may include permanently removing the wildlife, such as by transferring it to a location several miles away from an airport, making the same animal less likely to cause future intrusion.
To the extent not described, the different features and structures of the various aspects may be used in combination with each other as desired. This one feature cannot be shown in all aspects and is not meant to be construed as it cannot, but is done for brevity of description. Thus, various features of different aspects may be mixed and matched as desired to form new aspects, whether or not the new aspects are explicitly described. The present disclosure encompasses combinations or permutations of features described herein.
Further aspects of the invention are provided by the subject matter of the following clauses:
1. a method of operating an intruder interception system, the method comprising: receiving, at a controller module, an indication of the presence of an intruder in a predetermined area; determining, in the controller module, a location of an intruding object in a predetermined area; generating, in a controller module, a set of intercept paths configured to vectorize an intruder towards a capture zone; providing a set of intercept paths to a respective set of intercept vehicles; and operating a set of intercept vehicles according to a set of intercept paths.
2. The method of any preceding item, wherein receiving comprises receiving data from a sensor array.
3. The method of any preceding item, wherein determining the location comprises determining a location of an intruding object based on data received from the sensor array.
4. The method of any preceding claim, wherein a set of intercepting vehicles comprises at least one air-based vehicle and at least one ground-based vehicle.
5. The method of any preceding item, wherein generating an intercept path for at least one ground-based vehicle comprises avoiding a ground-based obstacle.
6. The method of any preceding item, wherein generating an intercept path for at least one air-based vehicle is based on avoiding a ground-based obstacle.
7. The method of any preceding claim, further comprising receiving, at the controller module, an indication of the presence of an intruder in a protected area, the protected area being a subset of the predetermined area.
8. The method of any preceding item, wherein the predetermined area is an airport and the protected area is a runway.
9. The method of any preceding claim, wherein generating a set of interception paths further comprises generating a first portion of the set of interception paths configured to vector an intruder away from a protected area and a second portion of the set of interception paths configured to vector the intruder towards a capture zone.
10. The method of any preceding claim, further comprising alerting an aircraft traffic management system of the presence of an intruder in a predetermined area.
11. The method of any preceding item, further comprising receiving authorization from an aircraft traffic management system to operate a set of intercept vehicles.
12. The method of any preceding item, wherein generating comprises generating, in the controller module, a set of intercept interactions that intercept the vehicle.
13. The method of any preceding item, further comprising operating a set of interactive devices that intercept at least a subset of vehicles, wherein the interactive devices are configured to vector an intruder towards a capture zone.
14. The method of any preceding claim, wherein generating a set of intercept paths further comprises generating a first portion of the set of intercept paths configured to direct at least a subset of intercept vehicles between an intruder and a protected area and a second portion of the set of intercept paths configured to vector the intruder towards the capture zone.
15. A system for vectorizing an intruder away from a predetermined tile, comprising: a sensor array disposed proximate to the predetermined area and configured to detect the presence of an intruding object within the predetermined area; a set of intercepting vehicles adapted to move within a predetermined block and operable to perform movements within the predetermined block according to a respective set of intercepting paths; and a controller module configured to receive an indication from the sensor array that an intruder is present in the predetermined zone to determine a location of the intruder in the predetermined zone to generate a set of intercept paths and provide the set of intercept paths to a set of intercept vehicles for execution of the set of intercept paths, the set of intercept paths configured to vectorize the intruder towards the capture zone.
16. The system of any preceding claim, wherein the sensor array comprises at least a subset of doppler sensors configured to detect movement of the animal.
17. The system of any preceding claim, wherein the capture area is configured to retain the intruder for further retrieval.
18. A method of operating a wildlife interception system, the method comprising: outputting from at least one sensor a signal indicative of the presence of an animal in a location in an airport area; receiving a signal at a controller module; generating a set of intercept paths in the controller module configured to herd animals from a location of the airport area towards the capture zone; providing a set of intercept paths to a set of intercept vehicles; and operating a set of intercept vehicles according to a set of intercept paths.
19. The method of any preceding clause, further comprising: the method includes alerting an aircraft traffic management system to the presence of animals in an airport area and receiving authorization from the aircraft traffic management system to operate a set of intercept vehicles.
20. The method of any preceding item, wherein generating the set of interception paths further comprises generating a first portion of the set of interception paths configured to direct at least a subset of the interception vehicles between the animals and the runway and a second portion of the set of interception paths configured to herd the animals towards the capture area.
This written description uses examples to disclose aspects of the disclosure, including the best mode, and also to enable any person skilled in the art to practice aspects of the disclosure, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the disclosure is defined by the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal languages of the claims.