Hostname: page-component-848d4c4894-nr4z6 Total loading time: 0 Render date: 2024-05-01T01:29:04.136Z Has data issue: false hasContentIssue false

Analysis of the traffic conflict situation for speed probability distributions

Published online by Cambridge University Press:  30 March 2023

Zs. Öreg*
Affiliation:
Centre for Autonomous and Cyber-Physical Systems, School of Aerospace, Transportation and Manufacturing, Cranfield University, Cranfield, UK
H.-S. Shin
Affiliation:
Centre for Autonomous and Cyber-Physical Systems, School of Aerospace, Transportation and Manufacturing, Cranfield University, Cranfield, UK
A. Tsourdos
Affiliation:
Centre for Autonomous and Cyber-Physical Systems, School of Aerospace, Transportation and Manufacturing, Cranfield University, Cranfield, UK
*
*Corresponding author. Email: zsombor.t.oreg@cranfield.ac.uk
Rights & Permissions [Opens in a new window]

Abstract

The increasingly widespread application of drones and the emergence of urban air mobility leads to a challenging question in airspace modernisation: how to create a safe and scalable air traffic management system that can handle the expected density of operations. Increasing the number of vehicles in a given airspace volume and enabling routine operations are essential for these services to be economically viable. However, a higher density of operations increases risks, poses a great challenge for coordination and necessitates the development of a novel solution for traffic management. This paper contributes to the research towards such a strategy and the field of airspace management by calculating and analysing the conflict probability in an en-route, free-flight scenario for autonomous vehicles. Analytical methods are used to determine the directional dependence of conflict probabilities for exponential and normal prescribed speed probability distributions. The notions of geometric and speed conflict are introduced and distinguished throughout the calculations of the paper. The effect of truncating the set of available flight speeds is also investigated. The sensitivity of the calculated results to speed and heading perturbations is studied within the analytical framework and verified by numerical simulations. Results enable a fresh approach to conflict detection and resolution through distribution shaping and are intended to be used in an integrated, stochastic coordination framework.

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction provided the original article is properly cited.
Copyright
© The Author(s), 2023. Published by Cambridge University Press on behalf of Royal Aeronautical Society

Nomenclature

a

parameter of the exponential distribution for the ownship [−]

ACAS

airborne collision avoidance system

ADS-B

automatic dependent surveillance-broadcast

ATC

air traffic control

b

parameter of the exponential distribution for the intruder [−]

CA

collision avoidance

CNS

communication, navigation and surveillance

d

distance to be traversed between sensing range and conflict range[m]

DAA

detect and avoid

erfc

complementary error function

GC

geometric conflict

l

lower speed limit [Kn]

MDP

Markov decision process

NMAC

near mid-air collision

p

magnitude of normal distribution variables [−]

PAV

personal aerial vehicle

PDF

probability density function

$\Pr\!(x)$

probability of x

q

ratio of normal distribution variables $\left( {q = x/y} \right)$ , [−]

r

ratio of speeds [−]

${r_{\rm{C}}}$

conflict range [m]

${r_{\rm{S}}}$

sensing range [m]

sUAS

small unmanned aerial system

${t_{{\rm{th}}}}$

threshold time for speed conflict [s]

TCAS

traffic collision avoidance system

u

upper speed limit [Kn]

UAM

urban air mobility

UAS

unmanned aerial system

UAV

unmanned aerial vehicle

UTM

unmanned traffic management

Greek symbol

$\beta $

angle of projection of the conflict range on the sensing range [−]

$\gamma $

angle of the velocity triangle [−]

$\delta $

angle at which the intruder becomes visible for the ownship - relative azimuth [−]

$\theta $

relative heading angle of the intruder to the ownship [−]

$\lambda $

general exponential distribution parameter [−]

$\mu $

parameter of the normal distribution for the ownship [−]

$\nu $

parameter of the normal distribution for the intruder [−]

$\rho $

ratio of distribution parameters $\left( {\rho = a/b} \right)$ , [−]

$\sigma $

standard deviation of the normal distribution [−]

$\Omega $

angle of the apparent path [−]

1.0 Introduction

1.1 Background and motivation

With the more frequent and widespread application of unmanned aerial vehicles (UAVs) [Reference Macrina, Pugliese, Guerriero and Laporte1], together with the advent of Personal Aerial Vehicles (PAVs) and Urban Air Mobility (UAM), the need for a novel traffic management framework emerges [Reference Kopardekar2]. The current air traffic management methods cannot handle the rapid increase in the number of vehicles and the projected density of operations [Reference Vascik and Hansman3, Reference Thipphavong, Apaza, Barmore, Battiste, Burian, Dao, Feary, Go, Goodrich, Homola, Idris, Kopardekar, Lachter, Neogi, Ng, Oseguera-Lohr, Patterson and Verma4]. This is due to the fact that the methods applied scale poorly because of their remote, centralised nature. Air traffic control was identified as one of the key constraints on urban air mobility (UAM) by Vascik and Hansman [Reference Vascik and Hansman3].

Thus a modernisation of airspace management is necessary. In order to make novel services related to UAVs and PAVs technically and commercially feasible it is desirable to create a mechanism for self-organising, in-flight strategic management which regulates airspace capacity. The traffic management system for UAM is expected to employ ideas from Unmanned Traffic Management to ensure scalability. Although, the UTM services would need to be tailored to the needs of UAM [Reference Verma, Monheim, Moolchandani, Pradeep, Cheng, Thipphavong, Dulchinos, Arneson, Lauderdale, Bosson, Mueller and Wei5]. It has already been proven that conflicts involving a few aircraft can be solved easily and efficiently, satisfying assurances, even in a decentralised manner [Reference Kuchar and Yang6]. Therefore a potential goal of a traffic management system could be to create a framework that drives the probabilities of the formation of such conflict situations towards easily manageable scenarios even in complex, dense traffic [Reference Egorov, Kuroda and Sachs7].

1.2 Aim of the paper

Control of the density and complexity of traffic, and through that airspace capacity, is conjectured to be easiest by applying speed control from the set of possible ATC deconfliction methods (turns, vertical manoeuvres, speed changes) [Reference Kuchar and Yang6, Reference Wang, Alligier, Allignol, Barnier, Durand and Gondran8]. Instead of controlling the speed of each individual aircraft, however, only the distribution of speed probabilities is controlled. A fundamental element of designing such a method, able to govern density and complexity, is understanding how conflicts occur in a speed distribution controlled airspace. The aim of this paper is to provide this self-contained element of the development process by providing a method to calculate the directional distribution of the conflict probability in a free-flight environment. In this environment, all aircraft are controlled to follow a prescribed speed probability distribution, taking into account that the range of available speeds is bounded. Results of the analysis are also applicable for main-flow systems [Reference Gerdes, Temme and Schultz9].

1.3 Proposed solution

One way to ensure the necessary scalability and reliability of the system would be to design the coordination as a hierarchic system, similarly to frameworks proposed by Valavanis [Reference Valavanis10]. The framework proposed and analysed in this paper comprises three layers, all supervised by a human operator [Reference Vascik and Hansman3, Reference Thipphavong, Apaza, Barmore, Battiste, Burian, Dao, Feary, Go, Goodrich, Homola, Idris, Kopardekar, Lachter, Neogi, Ng, Oseguera-Lohr, Patterson and Verma4]. At the base layer, the aim is to collect all nearby vehicles into ad-hoc formations in order to increase the airspace capacity. This can be achieved by applying flocking rules, similarly to the ones proposed by Huang, Tang and Lao [Reference Huang, Tang and Lao11]. For the middle layer, the objective is to coordinate these formations governing their behaviour based on the optimisation decisions of the top layer to maximise throughput while ensuring appropriate safety. The aim of the middle layer is not to provide deconfliction – tactical deconfliction within the formation and between formations is managed by the bottom layer using well-established techniques. The objective of the middle layer is to limit the probability of conflict resolution being necesary and present the ensemble to the top layer through a few, understandable parameters, namely the distribution parameters. Thus, the middle layer has to be able to govern global ensemble dynamics, ensuring all conflicts can be resolved by the bottom layer, while also taking care of throughput and remaining transparent at all times to the supervising control officers.

Although there is no one-to-one correspondence between the layers of the proposed model and conflict management system models [12] or concepts of operations for UAS [13, Reference Rios14], the framework is in harmony with the recommendations and could possibly be integrated into the wider system-of-systems architecture. This paper focuses on the analysis of the middle layer of this framework. Previous results indicate that conflict probabilities and their distribution are related to the airspace performance metrics [Reference Öreg, Shin and Tsourdos15, Reference Öreg, Shin and Tsourdos16]. Conflict rate (related to safety) and throughput (related to the average speed corrected for disruptions) describe system-level behaviour and enable overall airspace design.

1.4 Rationale

Within the middle layer, speed distribution control is achieved by applying a distributed stochastic task allocation method. This by design stochastic, distributed method was chosen for scalability and resilience, as it requires no central coordination and possesses a certain “self-repair” property [Reference Açikmeşe and Bayard17]. However, the application of distributed stochastic task allocation requires analysis and necessitates the formulation of a methodology to determine how safely agents can operate.

In air traffic control practice the three resolution manoeuvres are horizontal (change in heading), vertical (change in flight level) and speed (change in flight speed) [Reference Kuchar and Yang6, Reference Wang, Alligier, Allignol, Barnier, Durand and Gondran8]. For a given operation the starting point and the destination are considered given, loosely determining the heading angle. The instantaneous heading angle is necessary to be kept as a free variable to allow avoidance manoeuvres to deal with imminent conflicts. Altitude separation can be used as an effective way to increase airspace capacity. Since the focus of this paper is the middle layer and in-flight strategic management, the principal behaviour chosen to be regulated is the remaining degree of freedom, the control of the aircraft speed. Also, speed affects both throughput and the number of conflicts (safety), thus determining the optimal speed distribution is essential. Once this speed distribution is established, the middle layer can direct the formations towards that, using a distributed stochastic task allocation-based algorithm. This can be achieved using local information only, as presented by Jang, Shin and Tsourdos [Reference Jang, Shin and Tsourdos18]. The middle layer function also contributes towards the self-optimisation characteristic of the framework described by Kopardekar [Reference Kopardekar2].

In order to control the number of decision variables, the type of distribution is prescribed. Ensemble dynamics can be controlled through the parameters of the distribution. Within the presented framework any arbitrary speed distribution can be analysed. Throughout this paper, exponential and normal distributions are investigated. Normal distribution can be regarded as analogous to ordinary traffic flow with disturbances. Analysis of en-route flight ground speeds based on traffic data resembles a normal distribution [Reference Yang, Han, Borst and Mulder19]. Exponential distribution would be beneficial for emergency situations (emergency services) since it permits much higher speeds than the average. Emergency vehicles can deterministically occupy these speed states, while other vehicles would automatically respond and adapt to maintain the prescribed distribution. The distributed stochastic task allocation method, however, would allow for any distribution to be prescribed as desired. To account for the fact that the set of available velocities is bounded in practice, the analysis is also performed for truncated distributions with lower and upper speed limits.

1.5 Assumptions and simplifications

Within the scope of this paper, the conflict situation is analysed for the ownship and a single intruder, to determine geometric and speed conflict probabilities and enhance collision detection. Results of previous research efforts are extended by generalising the conflict problem such that both the ownship and the intruder behave stochastically. Separation distances and speed ranges are defined to represent scenarios and characteristic dynamics of personal aerial vehicles (PAVs). Assuming independence of intruder behaviour, extension is straightforward for multiple intruders. Analysis of the effect of interdependence is subject to future work. Also, the analysis of the effect of human factors on operation is beyond the scope of this paper. Conflicts are analysed for level flying aircraft, in two dimensions, due to the complexity of the problem arising from the fact that speeds of participants are not given explicitly, only their distribution is known. Nevertheless, this simplified analysis in plane helps to create the calculation framework, gain insight and understand the underlying relations. Results about the shape of conflict probability distributions, the effect of truncation, sensitivity to perturbations and the comparison of different distributions are expected to be similar in 3D. Also, it is generally accepted [Reference Kopardekar2, Reference Thipphavong, Apaza, Barmore, Battiste, Burian, Dao, Feary, Go, Goodrich, Homola, Idris, Kopardekar, Lachter, Neogi, Ng, Oseguera-Lohr, Patterson and Verma4, Reference Kacem, Barreto, Costa and Wijesekera20, Reference Sunil, Hoekstra, Ellerbroek, Bussink, Nieuwenhuisen, Vidosavljevic and Kern21] that UAM PAVs would either fly in a narrow, dedicated altitude band, or the dedicated airspace will be segmented into layers to increase capacity. Extension with climbing and descending aircraft is left for future work. To preserve the generality of the results it is assumed that no conflict resolution technique is applied, thus the heading remains constant. Analysis of the effect of a particular resolution method, possibly designed based on current results, is left for future work.

1.6 Contribution of the paper

Results of this analysis can be integrated into the top-layer optimisation and middle-layer stochastic task allocation part of the framework. Directional probability distributions help decision making and optimisation. They also make the relationship between decision variables and ensemble dynamics better understood. The relationship between the overall conflict probability and the system-level metrics has been analysed previously [Reference Öreg, Shin and Tsourdos15, Reference Öreg, Shin and Tsourdos16]. This paper provides a deeper insight by exploring the directionality of conflict probabilities. The results provide a benchmark and performance bounds for conflict resolution algorithms. In addition, providing bounds on conflict probabilities can lead to more effective conflict resolution algorithm design and enhanced risk management for the bottom layer. Studying the effect of distribution parameter selection and the ratio of parameters enables distribution shaping controlled by the selection of parameters. Moreover, results may help determine airspace capacity for specified safety criteria, and contribute towards orientation-based separation limits. Comparison of the conflict probability distributions resulting from prescribing exponential and normal speed distributions is important in relation to system-level safety. As results are calculated using analytical methods, accuracy and sensitivity to uncertainties can be determined in a straightforward manner. Distinguishing geometric and speed conflicts is an important step towards establishing the responsibilities and necessary dependability of the different levels of conflict detection algorithms, essential for a scalable management framework.

The paper is structured as follows. Research in aircraft conflict detection and conflict definitions are summarised in Section 2. Conflict probability calculations for exponential distribution are given in Section 3. For normal distribution, calculations are outlined in Section 4. Numerical verification methods and results are provided in Section 5. Results are analysed in Section 6, comparing the different distributions for geometric and speed conflicts.

Calculations throughout the paper were performed using Wolfram Mathematica. Verification simulations were implemented in Matlab.

2.0 Literature review

2.1 Definitions and context

Several, mostly different definitions for air traffic conflict and conflict detection methods can be found in the literature.

According to Kelly [Reference Kelly22], a conflict can be defined either as a violation of the separation standard or the predicted violation of the separation. Separation is defined based on distance and protected zones of given shapes (oblate spheroid and cylinder). The notion of “conflict detection” and “conflict resolution” is distinguished. An alerting logic based on two protected zones is described, and the severity of the conflict is assessed based on the time to reach these ranges. Because of the different separation requirements, horizontal and vertical separation is treated separately. The proposed conflict detection algorithm is based on instantaneous state vectors and does not take into account the stochastic nature of the problem.

A review of conflict detection and resolution methods is presented by Kuchar and Yang [Reference Kuchar and Yang6], creating a taxonomy of the techniques applied. Conflict is defined as a loss of minimum separation for two or more aircraft. Detection and resolution techniques are characterised based on several characteristics: state propagation method (this paper presents a probabilistic approach), state dimensions (the paper introduces a model for the horizontal plane), detection capability, resolution capability, the type of resolution manoeuvre and the method to handle multiple conflicts (throughout the paper aircraft conflict probabilities are calculated in a pairwise manner). The paper also emphasises the importance of robustness and the need for a consistent benchmarking method.

A mathematical description of the TCAS (traffic collision avoidance system) logic is given by Tang, Zhu and Piera [Reference Tang, Zhu and Piera23], and its capabilities are extended with horizontal resolution. TCAS is a last resort airborne system to prevent mid-air collisions by notifying the pilot of the threat (traffic advisory) and suggesting coordinated resolutions of the conflict situation (resolution advisory). The effect of surrounding traffic, induced risk, and resolution generated conflicts are also analysed using a graphical modelling and analysis software. With horizontal resolution, it is possible to reduce the domino effect. Taking into account induced conflicts is beneficial for airspace stability, however, no system-wide analysis is presented in the paper.

Formal mathematical definitions of conflict and collision can be found in the paper by Mitici and Blom [Reference Mitici and Blom24], together with a comparative evaluation of collision probability estimation models. Several models are presented with their application areas and characteristics analysed in a unified mathematical framework. A survey of safety risk models and validation methods is also provided to reflect on their applicability. Presented methods may become useful in future aerospace design, especially for unmanned traffic management. None of the methods reviewed apply a method to govern global dynamics to keep conflict probability at an acceptable level and airspace complexity manageable.

2.2 Traffic collision avoidance systems

The ACAS (airborne collision avoidance system) was extended for unmanned systems (ACAS Xu) [Reference Owen, Panken, Moss, Alvarez and Leeper25] and small unmanned systems (ACAS sXu) [Reference Alvarez, Jessen, Owen, Silbermann and Wood26]. Collision detection is enabled by the surveillance and tracking module incorporating multiple surveillance inputs to determine the position of nearby aircraft, together with position uncertainty. The threat resolution module evaluates collision risk, taking into account surveillance and dynamic uncertainty and determines whether a resolution manoeuvre is necessary. Resolution manoeuvres may be horizontal, vertical or combined. Platform manoeuvrability is taken into account to ensure avoidance feasibility. The sXu variant has a different action space to reflect the capabilities of sUAS. The problem is modelled as a Markov decision process (MDP). The MDP problem is solved in real-time, coordinating with other aircraft if possible during run-time. Although multiple threats may be handled using utility decomposition and fusion, due to the MDP formulation and the “curse of dimensionality” (exponential growth of the state space with the number of agents) application in dense airspace is infeasible [Reference Li, Egorov and Kochenderfer27]. Therefore, managing airspace complexity on a higher level (middle layer of the framework proposed) is necessary and justifiable, with an underlying operation of an ACAS-like CA method, customised for UAM. It is worth noting, that the ACAS Xu operation is consistent with the model adopted in the framework investigated in the paper for lower-level collision avoidance.

In most of the algorithms, the future trajectory of the intruder aircraft is extrapolated based on a linear motion assumption [Reference Bilimoria28, Reference van den Berg, Guy, Lin and Manocha29]. In the paper by Bilimoria [Reference Bilimoria28], closed-form analytical solutions are presented based on geometric optimisation, producing trajectories with minimal deviation from nominal. Intruder trajectories are extrapolated based on current speed and heading. An instantaneous resolution manoeuvre is assumed, conflict can be resolved by changing heading only, speed only or both. It is assumed that both aircraft stay in the same horizontal plane, and no wind disturbance is taken into account. Multiple aircraft conflicts are resolved sequentially. Intruders are modelled as velocity obstacles by van den Berg et al. [Reference van den Berg, Guy, Lin and Manocha29], it is assumed that agents do not change speed for a given lookahead time, and independently decide on their velocity for the next period without communication with other agents. In the paper, sufficient conditions for reciprocal n-body collision avoidance are derived. A key drawback of the algorithm presented is the assumption of perfect sensing, not taking into account any stochastic effect. Linear motion has been extended to curved trajectories by Zhong and Xuejun [Reference Zhong and Xuejun30]. This is achieved by taking intent into account with predefined trajectory change points. To detect and resolve conflicts geometric optimisation can be used after projecting velocities to the piecewise linear trajectory. In all of the above-mentioned papers, a simple extrapolation is used for conflict detection, which may be efficient in a last resort avoidance manoeuvre, but permits no conclusions about performance, the effect on global dynamics and airspace capacity.

Conflict detection is simplified by Rebollo, Ollero and Maza [Reference Rebollo, Ollero and Maza31] by discretising the space into cubic cells and sharing residence times, thus conflicts can be identified as time overlaps. Since the space is discretised, for collision avoidance graph-based methods can be used, namely the search tree algorithm and the tabu search algorithm. The key drawback of the methods is the need for the availability of information and scalability.

For fixed-wing aircraft, a collision avoidance algorithm is given based on manoeuvre coordination in the paper by Wan, Tang and Lao [Reference Wan, Tang and Lao32]. The set of possible manoeuvres is restricted to special manoeuvre styles, uncertainty is taken into account by a conical region calculated based on error radius. Conflicts are detected using the shared information on possible trajectories. Avoidance and manoeuvre selection is such that activation can be delayed as much as possible to minimise disruptions. For a given scenario the method proposed in the paper works appropriately, however, the effects of a manoeuvre on the wider airspace are not considered, thus, it may lead to a domino effect.

A self-organising collision avoidance method is presented by Huang, Tang and Lao [Reference Huang, Tang and Lao11] for approaching drone swarms. Self-organisation is achieved by applying a combination of Reynolds rules, extended with an anti-collision force, based on the pairwise closest point of approach, and linear extrapolation. Results show that rapid reorganisation creates a domino effect when using the traditional flocking rules only. This domino effect can be successfully overcome by self-coordination, demonstrating its effectiveness. The directionality of conflict probability, however, is not taken into account, even though it could lead to more efficient swarming.

An automatic collision resolution algorithm is designed by Luongo, Di Vito and Corraro [Reference Luongo, Di Vito and Corraro33], based on an analytical solution for conflict detection. All aircraft applying the algorithm creates a self-organising system, assuming all aircraft share intent. Conflicts are resolved either by changing aircraft speed or by changing speed, flight path and track angle, respecting flight envelope. One of the requirements of the method was to solve all conflicts in a multi-aircraft scenario without creating new ones, thus induced conflicts are taken into account. Admittedly, not all conflict scenarios can be resolved. However, no method is given to identify such scenarios nor is any technique provided to avoid such scenarios or at least limit their probability.

Speed control is applied to minimise potential conflict by Constans, Fontaine and Fondacci [Reference Constans, Fontaine and Fondacci34]. The sliding horizon loop process is made up of two layers, the supervisory layer detects conflicts and calculates deconflicted arrival times using linear programming, while the localised control layer follows the set arrival times correcting for disturbances and respecting aircraft performance limits, applying predictive functional control. Conflicts are localised, they can only occur at route intersection points, therefore conflict detection is based on arrival times, and separation thus becomes time separation. Results show speed control is an effective and simple method to minimise conflict probability. The same space discretisation technique is described in the paper by Cecen and Cetek [Reference Cecen and Cetek35], focusing on en-route, level traffic. Speed control is identified as the long-term resolution method for conflicts. Airspace entry points are also considered variables of the optimisation problem, which is solved using a novel heuristic. The most important drawback of the above-described techniques is the need for a central entity for coordination.

2.3 Collision detection and risk

Analysis of collision detection methods is extended by taking into account the effect of navigation uncertainty and communication package losses in the paper by Mahjri et al. [Reference Mahjri, Dhraief, Belghith and AlMogren36] UAVs flying in a straight line are assumed to exchange position and velocity information periodically. The effect of the setting of broadcast period and lookahead time on missed and false alarms is analysed analytically and using simulation. No conflict resolution method is applied so the performance of the detection algorithm could be analysed. The results presented are averaged over all relative headings, providing no insight into the underlying dynamics of the emergence of the conflict.

Collision risk as a result of UAS intruding terminal airspace is modelled by Wang, Tan and Low [Reference Wang, Tan and Low37] to assess hazard and threat levels and prevent collisions with passenger aircraft. Based on an initial sighting of the UAS, its trajectory is propagated probabilistically to reflect on its “assumed intent”. The position and state of the passenger aircraft are prescribed, and perfectly known to ATC. Conflict probability for a given scenario is calculated by 2D Monte-Carlo simulations resulting in a framework for risk management taking the maximum speed of the UAS model as an input. Alternatively, tracking data can be incorporated into decision making when available. The study highlights the importance of stochastic analysis in risk assessment. However, in this study, only one of the participating agents exhibits stochastic behaviour. Moreover, the evaluation is based solely on simulation results, which provides no help in understanding the underlying dynamics.

Another way to detect conflicts is to predict separation violations by calculating the reachable sets of intruders, taking intruder motion uncertainty into account. In the paper by Lin and Saripalli [Reference Lin and Saripalli38] a Dubins car model is used to represent obstacle aircraft kinematics, based on current information, assuming constant speed and limited maximal turning rate the reachable set can be calculated. The xy component and the z component of the set are calculated separately. To simplify the calculation, the reachable set is approximated by a polygon. The resolution path is generated using intermediate waypoint sampling. Although the method presented improves the success rate of collision avoidance, it does not take into account stochastic behaviour due to uncertain intent or disturbances, any relies on instantaneous information only, therefore does not reflect realistic collective dynamics.

A multi-aircraft conflict detection algorithm based on probabilistic reach sets is introduced by Yang et al. [Reference Yang, Zhang, Cai and Prandini39]. The nominal, piecewise linear trajectory of the aircraft is disturbed by a stochastic wind component, and possible realisations of the trajectory are formulated as a chance-constrained program, which is solved by the scenario approach to provide the ellipsoidal probabilistic reach sets. Conflicts are resolved as a second-order cone program. Utilising the algorithms described conflict detection can be accomplished for a given stochastic model, however, results are dependent on the given scenario and are therefore not universal.

A unified analytical framework for aircraft separation assurance and unmanned aircraft system sense-and-avoid is presented by Ramasamy, Sabatini and Gardi [Reference Ramasamy, Sabatini and Gardi40]. The paper presents mathematical models to calculate the overall uncertainty volume of the intruder aircraft, utilising unified range and bearing uncertainty descriptors, taking into account separation requirements. To determine the probability of near mid-air collisions, trajectory predictions and Monte Carlo approximations are used, based on cooperative and non-cooperative sensor selection and characteristics. Based on conflict identification the avoidance trajectory can be calculated as a result of an optimisation. For automated sensor selection, Adaptive Boolean Decision Logics are employed. Even though the paper represents a significant step towards certifiable separation assurance systems and determining UTM airspace capacity, a drawback of the methods described is that conflict probability can only be determined for a given scenario, using numerical models, therefore no general conclusions can be drawn, and the accuracy of the solutions remains uncertain.

For two common encounter geometries in a terminal manoeuvring area, a probabilistic conflict detection algorithm is formulated by Shi and Wu [Reference Shi and Wu41]. As a perturbation to the nominal trajectories, a three-dimensional Brownian motion is added and transformed to be standardised. Conflict probability is defined as the probability of the intruder entering the protection zone, which is the probability of a Brownian motion hitting a moving protection zone. Using the Bachelier-Levy theorem an analytical approximation is presented. Even though results can be used by air traffic control officers to assess the severity of a conflict for the analysed scenarios it is difficult to generalise the results of the paper.

Conflict detection for trajectory-based operations can also be found in the paper by Hao et al. [Reference Hao, Zhang, Cheng, Liu and Xing42]. Conflict probability is calculated taking into account random changes in pilot intent. The aim is to detect “whether two aircraft would violate the safe separation criteria during the look-ahead period based on the predicted aircraft trajectory”. This is done by calculating the intersections of state-time prisms in a discretised space. The uneven occurrence probability distribution within the reachable domain is considered by the truncated Brownian bridge model. Multi-aircraft conflict probability is calculated assuming independence. Other than pilot intent, no source of uncertainty is taken into account.

2.4 Directional conflict probability

None of the papers listed describe any scenario when for both the ownship and the intruder behave according to given probabilities. Also, as it can be seen from the references cited, even though conflict probabilities are calculated by many, directional analysis for further insight is rarely given. An exception is a paper and a PhD thesis published by Hernández-Romero et al. [Reference Hernández-Romero, Valenzuela and Rivas43, Reference Hernández-Romero44], which include directional analysis of the conflict probability according to the relative ground track angle of the two aircraft and the wind direction. A probabilistic approach to quantifying aircraft conflict intensity is presented, focusing on the propagation of wind forecast uncertainty using the probabilistic transformation method. The calculated conflict probability and intensity are used to improve optimal strategic deconfliction of aircraft trajectories under uncertainties derived from the ensemble weather forecast. This makes the research an important step towards minimising conflict probability taking into account weather uncertainty. Wind forecast uncertainties are relatively small compared to aircraft speeds used in the paper. Moreover, due to the small distance between the aircraft, the same wind is assumed to affect both aircraft, thus the uncertain wind vector added to the velocities is the same. In the current paper distribution parameters are not necessarily equal for both aircraft, providing a more general approach. While both papers highlight the importance of uncertainty analysis, the methodology presented here is better suited for high density airspace analysis and management, where the sources of uncertainty are more diverse.

2.5 Aim of the paper

The aim of this paper is to provide analytical formulae for geometric and speed conflict probability evaluation. The analysis is performed without constraints of any specific scenario, in free flight. Calculation results using the formulae provided can serve as measures of effectiveness of prescribed distributions for the middle layer of the proposed framework. To assess the validity of the method no underlying conflict resolution technique is applied, similarly to Mahjri et al. [Reference Mahjri, Dhraief, Belghith and AlMogren36]. Results of the analysis presented show how conflict probability is related to distribution parameters, which are to be used as decision variables in the top-level optimisation. Integrated analysis of the framework described in Section 1 is subject to future work.

3.0 Calculations for exponential distribution

In this section, the conflict situation is analysed with the speed of the ownship and the intruder both having exponential distributions. As already stated, an exponential speed distribution could be the best solution for enabling priority missions, e.g. emergency services. Calculation methods presented, however, are universal, and could be applied for any prescribed distribution, exponential distribution is merely an example.

Notations used are listed in NOMENCLATURE. Units used are generally accepted in the field of aerospace, albeit not standard, and thus not forming a metric system. Nevertheless, conversion constants are omitted from the formulae in the interest of clarity.

3.1 Definitions

To determine the probability of a conflict two ranges are defined around the ownship, the sensing ( ${r_S}$ ) and the conflict range ( ${r_C}$ ). It is assumed that the ownship becomes aware of the intruder once it enters the sensing range. A conflict may be defined as an event when the intruder enters a range (the conflict range) with a predefined radius around the ownship, which is referred to as geometric conflict (GC) throughout the paper. For an alternative definition for conflict it may be assumed that the ownship can avoid the intruder being too close (manoeuvring, possibly in cooperation with the intruding aircraft) given enough time, therefore a conflict is defined as the event when the intruder traverses from the sensing range to the conflict range faster than a threshold time ( ${t_{{\rm{th}}}}$ ). This event is referred to as a speed conflict (SC). A conflict range value may be chosen as the NMAC (near mid-air collision) range or the well-clear range corresponding to the underlying DAA (detect and avoid) concept and method applied. As ACAS was extended to unmanned systems [Reference Owen, Panken, Moss, Alvarez and Leeper25, Reference Alvarez, Jessen, Owen, Silbermann and Wood26], it is expected that UAM vehicles would have the same capability. NMAC and well-clear ranges in practice would be defined corresponding to this system, similarly to their derivation for small UAS [Reference Weinert, Campbell, Vela, Schuldt and Kurucar45, Reference Lester and Weinert46]. The above-described concept corresponds to a simplified model of the underlying collision avoidance performance requirements, defining the relevant volumes and time thresholds. This model is appropriate for the purposes of the investigation as the point is not to evaluate the capabilities of DAA systems but to determine conflict probabilities related to an encompassing system of the proposed framework. It is expected that performance requirements for UAM DAA systems would be standardised in the future, similarly to the requirements for unmanned aircraft [47].

The conflict geometry with the ranges and angle definitions can be seen in Fig. 1. The figure shows both the ownship and the intruder in the plane in which they are flying, in a coordinate system fixed to the ownship. Note that the figures are not to scale to help understanding.

Figure 1. The geometry of the scenario for which the conflict probabilities are calculated. The ownship and the intruder are flying in the same xy plane. Note that the figure is not to scale to help understanding.

The angle related to the projection of the conflict range on the sensing range is denoted by $\beta $ and defined according to Equation (1). The angle at which the intruder becomes visible to the ownship is denoted by $\delta $ .

(1) \begin{align}\sin\!\left( \beta \right) = \frac{{{r_C}}}{{{r_S}}}\end{align}

The formulae for conflict probabilities can be evaluated for arbitrary sensing and conflict ranges. For the plots in this paper the sensing and conflict ranges in Equations (2)–(4) were used, based on previous analysis on the flight and communication performance of UAM vehicles [Reference Öreg, Shin and Tsourdos15, Reference Öreg, Shin and Tsourdos16].

(2) \begin{align}{r_C} = 0.135\;{\rm{[nmi]}} = 250\;{\rm{[m]}}\end{align}
(3) \begin{align}{r_S} = 2.5\;{\rm{[nmi]}} = 4630\;{\rm{[m]}}\end{align}
(4) \begin{align}\beta = \arcsin\!\left( {\frac{{{r_C}}}{{{r_S}}}} \right) \approx 3.1^{\circ} \end{align}

The speed of the ownship is denoted by ${v_{{\rm{ownship}}}}$ , and the speed of the intruder is ${v_{{\rm{intruder}}}}$ . Without loss of generality, the ownship is assumed to progress in the positive x-direction, and the angle between the intruder and ownship velocity is denoted by $\theta $ . The angle of the apparent path of the intruder is denoted by $\Omega $ .

For calculating the conflict probabilities for an intruder with perpendicular velocity it is convenient to express the ratio of speeds, which, considering the velocity triangle can be connected to the angle $\gamma $ according to Equation (5).

(5) \begin{align}r = \tan\!\left( \gamma \right) = \frac{{{v_{{\rm{ownship}}}}}}{{{v_{{\rm{intruder}}}}}}\end{align}

Given the apparent position of the intruder and the angle of the apparent trajectory, the distance to be traversed to the conflict range can be calculated according to Equation (6).

(6) \begin{align}d = \left\{ {\begin{array}{l@{\quad}l}{{r_S}\sin\!\left( {\delta + \Omega } \right)} & {}\\[5pt] { - {r_S}\sqrt {\mathop {\sin }\nolimits^2\!\left( {\delta + \Omega } \right) - \mathop {\cos }\nolimits^2 \beta } } & {{\rm{if}}\;\left( {\delta - \beta \le \frac{\pi }{2} - \Omega \le \beta + \delta \;{\rm{and}}\;\Omega \geq - \frac{\pi }{2}\;{\rm{and}}\;\delta \geq \beta - \pi } \right)}\\[5pt] {} & {\;{\rm{or}}\;\left( { - \beta \le \delta + \Omega + \frac{{3\pi }}{2} \le \beta \;{\rm{and}}\;\Omega \geq - \frac{\pi }{2}\;{\rm{and}}\;\delta \le \beta - \pi } \right)}\\[5pt] {} & {\;{\rm{or}}\;\left( { - \beta \le \delta + \Omega + \frac{{3\pi }}{2} \le \beta \;{\rm{and}}\;\Omega \lt - \frac{\pi }{2}\;{\rm{and}}\;\delta \le \pi - \beta } \right)}\\[5pt] {} & {\;{\rm{or}}\;\left( {\delta - \beta \le \frac{\pi }{2} - \Omega \le \beta + \delta \;{\rm{and}}\;\Omega \lt - \frac{\pi }{2}\;{\rm{and}}\;\delta \geq \pi - \beta } \right)}\\[5pt] \infty & {\;{\rm{else}}}\end{array}} \right.\end{align}

If the apparent trajectory is parallel to the movement of the ownship, Equation (6) can be simplified to Equation (7).

(7) \begin{align}{d_\parallel } = \left\{ {\begin{array}{l@{\quad}l}{{r_S}\cos\!(\delta ) - {r_S}\sqrt {\mathop {\cos }\nolimits^2 (\delta ) - \mathop {\cos }\nolimits^2 (\beta )} } & {{\rm{if}}\; - \beta \le \delta \le \beta }\\[5pt] { - {r_S}\cos\!(\delta ) - {r_S}\sqrt {\mathop {\cos }\nolimits^2 (\delta ) - \mathop {\cos }\nolimits^2 (\beta )} } & {{\rm{if}}\;\delta \le - \pi + \beta \;{\rm{or}}\;\pi - \beta \le \delta }\\[5pt] \infty & {{\rm{if}}\; - \pi + \beta \le \delta \le - \beta \;}\\[5pt] {} & {{\rm{or}}\;\beta \le \delta \le \pi - \beta }\end{array}} \right.\end{align}

Starting the investigations for the exponential distribution the probability distribution formulae are summarised. The probability density function and the cumulative distribution function of the exponential distribution are given by Equations (8) and (9), respectively.

(8) \begin{align}f\!\left( {x;\;\lambda } \right) = \left\{{\begin{array}{l@{\quad}l}{\lambda {e^{ - \lambda x}}} & {{\rm{if}}\;x \geq 0}\\[5pt] 0 & {{\rm{if}}\;x \lt 0}\end{array}} \right.\end{align}
(9) \begin{align}F\!\left( {X;\;\lambda } \right) = \left\{{\begin{array}{l@{\quad}l}{1 - {e^{ - \lambda X}}} & {{\rm{if}}\;X \geq 0}\\[5pt] 0 & {{\rm{if}}\;X \lt 0}\end{array}} \right.\end{align}

Considering that the range of available speeds for an aircraft is limited (minimum speed due to stall and maximum speed due to performance and structural constraints) the effect of truncating the exponential distribution has to be taken into account as well. The probability density function and the cumulative distribution function of the truncated exponential distribution with lower limit l and upper limit u are given by Equations (10) and (11).

(10) \begin{align}f'\left( {x;\;\lambda ,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{\lambda {e^{ - \lambda x}}}}{{{e^{ - \lambda l}} - {e^{ - \lambda u}}}}} & {{\rm{if}}\;x \geq 0\;{\rm{and}}\;l \le x \le u}\\[12pt] 0 & {{\rm{else}}}\end{array}} \right.\end{align}
(11) \begin{align}F'\left( {X;\;\lambda ,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{{e^{\lambda u}}\left( { - 1 + {e^{\lambda \left( {l - X} \right)}}} \right)}}{{{e^{ - \lambda l}} - {e^{ - \lambda u}}}}} & {{\rm{if}}\;X \geq 0\;{\rm{and}}\;l \le X \le u}\\[12pt] 1 & {{\rm{if}}\;X \gt u}\\[5pt] 0 & {{\rm{else}}}\end{array}} \right.\end{align}

For the ownship and the intruder, the parameters of the exponential distribution are denoted by a and b respectively, thus the cumulative distribution functions of the speeds become as given by Equations (12) and (13) for the non-truncated distributions.

(12) \begin{align}\Pr\!\left( {{v_{{\rm{ownship}}}} \le X} \right) = 1 - {e^{ - aX}}\end{align}
(13) \begin{align}\Pr\!\left( {{v_{{\rm{intruder}}}} \le Y} \right) = 1 - {e^{ - bY}}\end{align}

The formulae derived for conflict probabilities can be evaluated for arbitrary distribution parameters and speed limits. Based on previous analysis on the flight and communication performance of UAM vehicles [Reference Öreg, Shin and Tsourdos15, Reference Öreg, Shin and Tsourdos16], for the plots in this paper the parameter ranges and speed limits in Equations (14)–(16) were used for exponential distribution.

(14) \begin{align}a \in \left[ {0.0025,0.2} \right],b \in \left[ {0.0025,0.2} \right]\end{align}
(15) \begin{align}l = 15\;{\rm{[Kn]}}\end{align}
(16) \begin{align}u = 180\;{\rm{[Kn]}}\end{align}

The mean speeds for the chosen parameter range and speed limits for the truncated exponential distribution are shown in Fig. 3. Generally, higher values of the rate parameter (a or b) indicate lower mean speeds.

For the conflict probability calculations, it is necessary to calculate the sum, the difference and the ratio of exponentially distributed random variables. All related formulae can be found in Appendix A.1.

3.2 Probability of entering the conflict range for perpendicular velocities

Even though an intruder may appear from any direction on the sensing range circle as a first approximation the principal directions are analysed. Derivation for these principal directions is useful in itself for airspace structures with constrained principal directions [Reference Sunil, Hoekstra, Ellerbroek, Bussink, Nieuwenhuisen, Vidosavljevic and Kern21]. Moreover, based on these primary formulae arbitrary directions or their superposition may be analysed.

The conflict geometry for this scenario is shown in Fig. 2.

Figure 2. The geometry of the conflict scenario for perpendicular velocities. The ownship and the intruder are flying in the same xy plane. Note that the figure is not to scale to help understanding.

Figure 3. Mean speed in Kn as a function of the exponential distribution parameter (a for the ownship and b for the intruder).

Assuming the velocity of the intruder is perpendicular to the velocity of the ownship, no conflict occurs if Equation (17) holds.

(17) \begin{align}\left\{ {\begin{array}{l@{\quad}l}{\gamma \lt \dfrac{\pi }{2} - \left( {\delta + \beta } \right)} & {{\rm{if}}\; - \beta \le \delta \le \dfrac{\pi }{2} - \beta }\\[12pt] {\gamma \gt \dfrac{\pi }{2} - \left( {\delta - \beta } \right)} & {{\rm{if}}\;\beta \le \delta \le \dfrac{\pi }{2} + \beta }\end{array}} \right.\end{align}

The conditions can be transformed according to Equations (18) and (19).

(18) \begin{align}\tan\!\left( \gamma \right) \lt \tan\!\left( {\frac{\pi }{2} - \left( {\delta + \beta } \right)} \right) = \cot\!\left( {\delta + \beta } \right)\end{align}
(19) \begin{align}\tan\!\left( \gamma \right) \gt \tan\!\left( {\frac{\pi }{2} - \left( {\delta - \beta } \right)} \right) = \cot\!\left( {\delta - \beta } \right)\end{align}

Therefore the probabilities that no conflict occurs become as given by Equations (20) and (21) for ranges defined in Equation (17), using the formula derived in Equation (58)

(20) \begin{align}\Pr\!\left( {r \le \cot\!\left( {\delta + \beta } \right)} \right) = \frac{{a\cot\!\left( {\delta + \beta } \right)}}{{a\cot\!\left( {\delta + \beta } \right) + b}}\end{align}
(21) \begin{align}\Pr\!\left( {r \geq \cot\!\left( {\delta - \beta } \right)} \right) = \frac{b}{{a\cot\!\left( {\delta - \beta } \right) + b}}\end{align}

Thus, for the ranges of $\delta $ where conflict is possible, defining the parameter ratio as $\rho = a/b$ , the probabilities become the following.

Case 1: $ - \beta \le \delta \le \beta $

(22) \begin{align}\mathop {\Pr }\limits_{{\rm{perp}}} \!\left( {{\rm{GC}}} \right) = \frac{b}{{a\cot\!(\beta + \delta ) + b}} = \frac{1}{{\rho \cot\!(\beta + \delta ) + 1}}\end{align}

Case 2: $\beta \le \delta \le \dfrac{\pi }{2} - \beta $

(23) \begin{align}\mathop {\Pr }\limits_{{\rm{perp}}} \!\left( {{\rm{GC}}} \right) = \frac{b}{{a\cot\!(\beta + \delta ) + b}} + \frac{b}{{a\cot\!(\beta - \delta ) - b}} = \frac{1}{{\rho \cot\!(\beta + \delta ) + 1}} + \frac{1}{{\rho \cot\!(\beta - \delta ) - 1}}\end{align}

Case 3: $\dfrac{\pi }{2} - \beta \le \delta \le \dfrac{\pi }{2} + \beta $

(24) \begin{align}\mathop {\Pr }\limits_{{\rm{perp}}}\! \left( {{\rm{GC}}} \right) = 1 - \frac{b}{{b - a\cot\!(\beta - \delta )}} = 1 - \frac{1}{{1 - \rho \cot\!(\beta - \delta )}}\end{align}

Conflict probability formulas can be evaluated for arbitrary ratio of distribution parameters ( $\rho $ ) yielding conflict probability distribution for the full circle (Figs. 4 and 5). It can be seen that for equal distribution parameters ( $\rho = 1$ ) the highest probability of a conflict occurs at head-on or perpendicular encounters. This corresponds to predicted behaviour, because with equal parameters the expected value of speed is the same, thus for an intruder arriving from a perpendicular direction the distribution is symmetric to $\pi /4$ with peaks at $\beta $ and $\pi /2 - \beta $ . By modifying the ratio of distribution parameters the distribution of conflict probability can be adjusted. For $\rho = 80$ the conflict probability for the $ - \beta $ to $\pi /2 - \beta $ region reduces almost completely, but increases significantly in the $\pi /2 - \beta $ to $\pi /2 + \beta $ range. Opposite, but symmetric behaviour can be seen for $\rho = 1/80$ .

Figure 4. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for exponential distribution with $\rho = 1$ ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 5. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for exponential distribution with $\rho = 80$ ( $a = 0.2$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

If the set of available speeds is bounded, and the velocity magnitudes assume a truncated distribution, the conflict probabilities can be calculated according to Equations (61), (62) and (63) (Appendix A.2), using the results in Equation (60).

As it can be seen in Figs. 6 and 7 the probability distribution changes significantly if the bounds considerably affect the range of available speeds ( $l = 15,\;u = 180$ ). Relaxing the bounds ( $l = 0,\;u = \infty $ ) provides the unbounded results. If the distribution is truncated, the point of maximum conflict probability shifts to $\pi /4$ for equal parameters. Not only the angle but also the magnitude of the peak probability changes. For $\rho = 80$ the peak probability decreases considerably and tilts back towards $\pi /4$ .

Figure 6. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for truncated exponential distribution with $\rho = 1$ ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 7. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for truncated exponential distribution with $\rho = 80$ ( $a = 0.2$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Since conflict probability formulae are given analytically, the sensitivity of results to parameter changes can be evaluated by calculating the partial derivatives with respect to the parameters. The analysis method is presented for geometric conflict probability with exponential distributions (given by Equations (22)–(24)), and it can be applied for all subsequent scenarios. The partial derivative with respect to the distribution parameter ratio $\left( \rho \right)$ can be calculated as in Equation (25).

(25) \begin{align}\frac{{\partial \mathop {\Pr }\limits_{{\rm{perp}}}\! \left( {{\rm{GC}}} \right)}}{{\partial \rho }} = \left\{ {\begin{array}{l@{\quad}l}{ - \dfrac{{\cot\!(\beta + \delta )}}{{{{(\rho \cot\!(\beta + \delta ) + 1)}^2}}}} & {{\rm{if}}\;\beta + \delta \geq 0\;{\rm{and}}\;\beta - \delta \geq 0}\\[15pt] { - \dfrac{{\cot\!(\beta - \delta )}}{{{{(\rho \cot\!(\beta - \delta ) - 1)}^2}}} - \dfrac{{\cot\!(\beta + \delta )}}{{{{(\rho \cot\!(\beta + \delta ) + 1)}^2}}}} & {{\rm{if}}\;\beta - \delta \le 0\;{\rm{and}}\;\beta + \delta \le \dfrac{\pi }{2}}\\[15pt] {\dfrac{{\cot\!(\beta - \delta )}}{{\rho \cot\!(\beta - \delta ) - 1}} - \dfrac{{\rho \mathop {\cot }\nolimits^2 (\beta - \delta )}}{{{{(\rho \cot\!(\beta - \delta ) - 1)}^2}}}} & {{\rm{if}}\;\beta + \delta \geq \dfrac{\pi }{2}\;{\rm{and}}\;\beta - \delta \geq - \dfrac{\pi }{2}}\end{array}} \right.\end{align}

Sensitivity as a function of heading difference can be seen in Fig. 8. Overall, the magnitude of change with parameter variation is very low. Although there are no explicit metrics for parameter sensitivity, it is still meaningful to calculate the sensitivities to parameters as they indicate how the result changes with input perturbations. Maximum locations of conflict probability and its sensitivity curve coincide. This is expected, as $\rho = 1$ represents a limiting case. For $\rho = 80$ , shown in Fig. 9, sensitivity is even lower, the peak location is at a low conflict probability angle, $\delta = \frac{\pi }{2} + \beta $ . This is because conflict at this heading difference is almost only possible at an extreme ratio, even a slight perturbation of the parameter results in a significant change in probability.

Figure 8. Sensitivity of geometric intrusion probability to changes in parameter ratio of exponential distribution with perpendicular intruder velocity ( $\rho = 1$ , $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ ). As a function of relative azimuth angle, geometric intrusion probability is shown on the left axis, and sensitivity is shown on the right axis.

For truncated distributions, since conflict probability is not only a function of the parameter ratio, sensitivities were determined for the distribution parameters separately as shown in Figs. 10 and 11. For low parameter values, the change with parameter perturbation is significant due to the characteristics of the probability density function of the exponential distribution. As the parameter values increase the sensitivity decreases. Nevertheless, conflict probability for truncated distributions is still predominantly determined by parameter ratio, insensitivity to perturbations will be shown in Section 5.

3.3 Probability of entering the conflict range for parallel velocities

As another principal direction parallel velocities can be analysed. The conflict geometry for parallel velocities is shown in Fig. 12.

Figure 9. Sensitivity of geometric intrusion probability to changes in parameter ratio of exponential distribution with perpendicular intruder velocity ( $\rho = 80$ , $a = 0.2$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ ). As a function of relative azimuth angle, geometric intrusion probability is shown on the left axis, and sensitivity is shown on the right axis.

Considering geometric conflicts only, if the velocities of the ownship and the intruder are not only parallel, but point in the opposite direction a conflict surely occurs ( $\Pr\!\left( {{\rm{GC}}} \right) = 1$ ) if the intruder is in the range of the projection of the conflict range on the sensing range (Equation (26)).

(26) \begin{align}\mathop {\Pr }\limits_{{\rm{parallel}}} \!\left( {{\rm{GC}}} \right) = \left\{ {\begin{array}{l@{\quad}l}1 &{{\rm{if}}\; - \beta \lt \delta \lt \beta }\\[5pt] 0 & {{\rm{if}}\;\delta \le - \beta \;{\rm{or}}\;\beta \le \delta }\end{array}} \right.\end{align}

If the velocities point in the same direction, a geometric conflict occurs only if the intruder is in the angle range determined by the projection of the conflict range, and its speed is greater than the speed of the ownship if the intruder is behind (the difference of speeds is positive ( $y - x \gt 0$ ), Equation (27), or the intruder speed is less than the ownship speed, and the intruder is ahead. Calculations are based on Equation (54)).

(27) \begin{align}\mathop {\Pr }\limits_{{\rm{parallel}}}\! \left( {{\rm{GC}}} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{a}{{a + b}}} & {{\rm{if}}\;\delta \lt - \pi + \beta \;{\rm{or}}\;\pi - \beta \lt \delta }\\[12pt] {\dfrac{b}{{a + b}}} & {{\rm{if}}\; - \beta \lt \delta \lt \beta }\\[12pt] 0 & {{\rm{if}}\; - \pi + \beta \le \delta \le - \beta }\\[5pt] {} & {{\rm{or}}\;\beta \le \delta \le \pi - \beta }\end{array}} \right.\end{align}

If the distributions are truncated, the probability of a positive difference becomes different as given by Equation (28) (based on Equation (56)).

(28) \begin{align}\mathop {\Pr }\limits_{{\rm{parallel}}} \!\left( {{\rm{GC'}}} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{{e^{al}}\!\left( {a{e^{bl}} - (a + b){e^{bu}}} \right) + b{e^{u(a + b)}}}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;\delta \lt - \pi + \beta \;{\rm{or}}\;\pi - \beta \lt \delta }\\[15pt] {\dfrac{{b{e^{bl}}\!\left( {{e^{al}} - {e^{au}}} \right) + a\!\left( {{e^{u(a + b)}} - {e^{au + bl}}} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\; - \beta \lt \delta \lt \beta }\\[15pt] 0 & {{\rm{if}}\; - \pi + \beta \le \delta \le - \beta \;}\\[5pt] {} & {{\rm{or}}\;\beta \le \delta \le \pi - \beta }\end{array}} \right.\end{align}

Having taken into account all possibilities with parallel and perpendicular intruder velocities, assuming that they have a uniform probability, the composite probability distributions weighted by arc lengths can be determined, as shown in Figs. 13 and 14. Even though the probability of head-on and rear-end collisions is much higher than that of perpendicular collisions, when weighted with the corresponding arc length it decreases below the perpendicular probability, especially in the truncated case, where the contribution of the perpendicular probability is not as significant in these directions.

Figure 10. Sensitivity of geometric intrusion probability to changes in parameters of truncated exponential distributions with perpendicular intruder velocity ( $\rho = 1$ , $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ ). As a function of relative azimuth angle, geometric intrusion probability is shown on the left axis, and sensitivity is shown on the right axis.

Figure 11. Sensitivity of geometric intrusion probability to changes in parameters of truncated exponential distributions with perpendicular intruder velocity ( $\rho = 80$ , $a = 0.2$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ ). As a function of relative azimuth angle, geometric intrusion probability is shown on the left axis, and sensitivity is shown on the right axis.

Figure 12. The geometry of the conflict scenario for parallel velocities. The ownship and the intruder are flying in the same xy plane. Note that the figure is not to scale to help understanding.

Figure 13. Polar plot showing the probability of geometric intrusion with equally likely perpendicular and parallel intruder velocities for full and truncated exponential distribution with $\rho = 1$ ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \left\{ {\frac{\pi }{2},0, - \frac{\pi }{2},\pi } \right\}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

3.4 Probability of entering the conflict range for velocities with arbitrary direction

To generalise the results obtained in the previous sections the geometric conflict probability is analysed for arbitrary intruder velocity angles ( $\theta $ ) as well. The angle of the apparent path ( $\Omega $ ) can be calculated based on the relative equations of motion, according to Equation (29).

(29) \begin{align}\Omega = \left\{ {\begin{array}{l@{\quad}l}{\arctan \!\left( {\dfrac{{\tan \gamma }}{{\sin \theta }} + \cot \theta } \right)} & {{\rm{if}}\;0 \lt \theta \lt \pi }\\[15pt] {\pi + \arctan\! \left( {\dfrac{{\tan \gamma }}{{\sin \theta }} + \cot \theta } \right)}& {{\rm{if}}\; - \pi \lt \theta \lt 0}\\[15pt] {\dfrac{\pi }{2}} & {{\rm{if}}\;\theta = 0}\\[15pt] {\dfrac{\pi }{2}}& {{\rm{if}}\;\theta = \pi \;\;{\rm{and}}\;\;{v_A} \geq {v_B}}\\[15pt] { - \dfrac{\pi }{2}} & {{\rm{if}}\;\theta = \pi \;\;{\rm{and}}\;\;{v_A} \lt {v_B}}\end{array}} \right.\end{align}

In Equation (29) the angle $\theta $ is measured from the negative $x$ -axis, in the clockwise direction and $\Omega $ is measured from the negative $y$ -axis in the anticlockwise direction. Since it is easier to calculate the probability distribution of the tangent of the apparent path angle (Equation (30), based on Equation (58)), the conflict probability limits for $0 \lt \theta \lt \pi $ were transformed according to Equation (31) and (32).

(30) \begin{align}\Pr\!\left( {\tan \Omega \le Z} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{a\sin \theta \!\left( {Z - \cot \theta } \right)}}{{a\sin \theta \!\left( {Z - \cot \theta } \right) + b}}} & {{\rm{if}}\;\cot \theta \le Z}\\[15pt] 0 & {{\rm{if}}\;\cot \theta \gt Z}\end{array}} \right.\end{align}

(31) \begin{align}\left\{ {\begin{array}{l@{\quad}l}{\dfrac{\pi }{2} - \left( {\delta + \beta } \right) \le \Omega \le \dfrac{\pi }{2}} & {{\rm{if}}\; - \beta \le \delta \le \beta }\\[15pt] {\dfrac{\pi }{2} - \left( {\delta + \beta } \right) \le \Omega \le \dfrac{\pi }{2} - \left( {\delta - \beta } \right)} & {{\rm{if}}\;\beta \lt \delta \lt \pi - \beta }\\[15pt] { - \dfrac{\pi }{2} \le \Omega \le \dfrac{\pi }{2} - \left( {\delta - \beta } \right)} & {{\rm{if}}\; - \pi \le \delta \le - \pi + \beta \;{\rm{or}}\;\pi - \beta \le \delta \le \pi }\end{array}} \right.\end{align}
(32) \begin{align}\left\{ {\begin{array}{l@{\quad}l}{\cot\!\left( {\delta + \beta } \right) \le \tan \Omega } & {{\rm{if}}\; - \beta \le \delta \le \beta }\\[5pt] {\cot\!\left( {\delta + \beta } \right) \le \tan \Omega \le \cot\!\left( {\delta - \beta } \right)} & {{\rm{if}}\;\beta \lt \delta \lt \pi - \beta }\\[5pt] {\tan \Omega \le \cot\!\left( {\delta - \beta } \right)} & {{\rm{if}}\; - \pi \le \delta \le - \pi + \beta \;{\rm{or}}\;\pi - \beta \le \delta \le \pi }\end{array}} \right.\end{align}

Calculations of conflict probabilities can be found in Appendix A.3.

Figure 14. Polar plot showing the probability of geometric intrusion with equally likely perpendicular and parallel intruder velocities for full and truncated exponential distribution with $\rho = 80$ ( $a = 0.2$ and $b = 0.0025$ , $\theta = \left\{ {\frac{\pi }{2},0, - \frac{\pi }{2},\pi } \right\}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figures 15, 16, 17 and 18 show the conflict probabilities for $\theta = \frac{\pi }{4}$ and $\theta = \frac{{3\pi }}{4}$ with full and truncated distributions. It can be seen, that having an arbitrary angle for intrusion corresponds to an angular scaling with the origin being the centre. For $\rho = 80$ and $\theta = \pi /4$ the angle for maximum conflict probability shifts from $\pi /2$ to $\pi /4$ . For truncated distributions, the same reduction and shifting behaviour is visible as in Fig. 7 for $\rho = 80$ . For $\rho = 1$ , the distribution is modified similarly as it can be seen in Fig. 6.

Figure 15. Polar plot showing the probability of geometric intrusion for $\theta = \frac{\pi }{4}$ , exponential distribution with $\rho = 80$ ( $a = 0.2$ and $b = 0.0025$ , $\theta = \frac{\pi }{4}$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 16. Polar plot showing the probability of geometric intrusion for $\theta = \frac{{3\pi }}{4}$ , exponential distribution with $\rho = 1$ ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{{3\pi }}{4}$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 17. Polar plot showing the probability of geometric intrusion for $\theta = \frac{\pi }{4}$ , truncated exponential distribution with $\rho = 80$ ( $a = 0.2$ and $b = 0.0025$ , $\theta = \frac{\pi }{4}$ , $l = 15$ , $u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 18. Polar plot showing the probability of geometric intrusion for $\theta = \frac{{3\pi }}{4}$ , truncated exponential distribution with $\rho = 1$ ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{{3\pi }}{4}$ , $l = 15$ , $u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

3.5 Probability of entering the conflict range for velocities with uniform distribution of intrusion angle

To evaluate the probability of conflicts in a realistic free flight traffic scenario, assuming a uniform distribution for intrusion velocity angles the conflict probabilities were averaged for all intrusion angles as shown in Fig. 19. If the distribution of intrusion relative headings is not uniform, but known, the same method may be applied as a weighted average, weighing the directions according to the assumed probability of intrusion with that angle. The highest probability of conflicts is for the $ - \beta $ to $\beta $ region for both the full and the truncated distribution, however, the peak value for the truncated distribution is less than half of that for the full distribution. Although for small angular deviations from the ownship heading the full distribution probability is greater, for higher angles the truncated distribution takes over.

Figure 19. Polar plot showing the probability of geometric intrusion for full and truncated exponential distribution with $\rho = 1$ , averaged over all intrusion angles ( $a = 0.0025$ and $b = 0.0025$ , $l = 15$ , $u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

3.6 Probability of entering the conflict range faster than the threshold for perpendicular velocities

Since it is assumed that, provided enough time is available for manoeuvring, collision avoidance methods are able to handle intruders, a conflict emerges only if the traversal from the sensing range to the conflict range is faster than a certain threshold time. This is referred to as a speed conflict.

The integrals corresponding to the conflict probabilities cannot be evaluated analytically, however, lower and upper bounds can be given for them based on approximations (Equations (69)–(72), Appendix A.4).

Evaluating the speed conflict limits with a threshold time of ${t_{{\rm{th}}}} = 60{\rm{s}}$ provides the speed conflict probability distribution as it can be seen in Figs. 20 and 21. The difference between lower and upper approximations is negligible. Comparing the speed conflict with the geometric conflict probability it can be seen that specifying a time threshold corresponds to a scaling, however with the choice of this threshold time ( ${t_{{\rm{th}}}} = 60{\rm{s}}$ ) the conflict probability does not change very much for the full distribution. The selection of ${t_{{\rm{th}}}} = 60{\rm{s}}$ time threshold here is arbitrary for the plots, the formulae can be evaluated for any other parameter. Avoidance logic threshold selection for UAM vehicles in the future would probably be based on classification of airspace, type of operation, vehicle speed and category and CNS performance.

If the set of available speeds is bounded, and thus the distributions are truncated, speed conflict distributions are modified according to Equations (77) (Appendix A.5).

Conflict probabilities for full and truncated exponential distributions for intruders with perpendicular velocities can be seen in Figs. 22 and 23. For high $\rho $ the difference between upper and lower approximations is not so apparent, however, for $\rho = 1$ the effect of the speed threshold is clearly visible.

3.7 Probability of entering the conflict range faster than the threshold for parallel velocities

Speed conflict probabilities can also be calculated for intruder velocities parallel to the ownship velocity. For intruders with velocities pointing in the opposite direction the conflict probability can be calculated using the formula for the sum of exponentially distributed random variables for a full distribution is given by Equation (47), leading to Equation (33).

(33) \begin{align}\mathop {\Pr }\limits_{{\rm{parallel}}} \!\left( {{\rm{SC}}} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{{e^{\frac{{ - b\;{d_\parallel }\left( {\delta ,\beta } \right)}}{{{t_{{\rm{th}}}}}}}}\left( {b\;{d_\parallel }\left( {\delta ,\beta } \right) + {t_{{\rm{th}}}}} \right)}}{{{t_{{\rm{th}}}}}}} & {{\rm{if}}\; - \beta \lt \delta \lt \beta \;{\rm{and}}\;a = b}\\[14pt] {\dfrac{{a\;{e^{\frac{{ - b\;{d_\parallel }\left( {\delta ,\beta } \right)}}{{{t_{{\rm{th}}}}}}}} - b\;{e^{\frac{{a\;{d_\parallel }\left( {\delta ,\beta } \right)}}{{{t_{{\rm{th}}}}}}}}}}{{a - b}}} & {{\rm{if}}\; - \beta \lt \delta \lt \beta \;{\rm{and}}\;a \ne b}\\[8pt] 0 & {{\rm{if}}\;\delta \le - \beta \;{\rm{or}}\;\beta \le \delta }\end{array}} \right.\end{align}

If distributions are truncated, the sum of exponentially distributed random variables is given by Equation (51), thus speed conflict probability becomes Equation (34).

(34) \begin{align}\begin{array}{l}\mathop {\Pr }\limits_{{\rm{parallel}}} \!\left( {{\rm{SC'}}} \right) = \\[13pt] \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{{e^{2au}}\left( {2al - \dfrac{{a{d_\parallel }\left( {\delta ,\beta } \right)}}{{{t_{{\rm{th}}}}}} - 1} \right)}}{{{{\left( {{e^{al}} - {e^{au}}} \right)}^2}}}\dfrac{{\exp\!\left( {2al - \dfrac{{a{d_\parallel }\left( {\delta ,\beta } \right)}}{{{t_{{\rm{th}}}}}}} \right)}}{{{{\left( {{e^{al}} - {e^{au}}} \right)}^2}}} + \dfrac{{{e^{2au}}}}{{{{\left( {{e^{al}} - {e^{au}}} \right)}^2}}}} & {{\rm{if}}\;l + u \geq \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;{\rm{and}}\;a = b\;{\rm{and}}\;}\\[14pt] {} & {2l \le \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}} \le 2u\;{\rm{and}}\; - \beta \lt \delta \lt \beta }\\[14pt] {\dfrac{1}{{{{\left( {{e^{al}} - {e^{au}}} \right)}^2}}}} & {{\rm{if}}\;l + u \le \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;{\rm{and}}\;a = b\;{\rm{and}}\;}\\[14pt] {} & {2l \le \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}} \le 2u\;{\rm{and}}\; - \beta \lt \delta \lt \beta }\\[14pt] {\dfrac{{a\exp\!\left( {al + b\!\left( {l - \dfrac{{{d_\parallel }\left( {\delta ,\beta } \right)}}{{{t_{{\rm{th}}}}}} + 2u} \right)} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}} - \dfrac{{a\!\left( {{e^{au + bl}} - {e^{al + bu}} + {e^{u(a + b)}}} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {}\\[14pt] { - \dfrac{{b\exp\!\left( {a\!\left( {l - \dfrac{{{d_\parallel }\left( {\delta ,\beta } \right)}}{{{t_{{\rm{th}}}}}} + 2u} \right) + bl} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}} - \dfrac{{b\!\left( {{e^{au + bl}} - {e^{al + bu}} + {e^{u(a + b)}}} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;l + u \geq \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;{\rm{and}}\;a \ne b\;{\rm{and}}\;}\\[14pt] {} & {2l \le \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}} \le 2u\;{\rm{and}}\; - \beta \lt \delta \lt \beta }\\[14pt] {\dfrac{{(a\;{e^{u(a + b)}}\left( { - \exp\!\left( {2bl - \dfrac{{b{d_\parallel }\left( {\delta ,\beta } \right)}}{{{t_{{\rm{th}}}}}}} \right)} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {}\\[14pt] { + \dfrac{{b{e^{u(a + b)}}\left( {\exp\!\left( {2al - \dfrac{{a{d_\parallel }\left( {\delta ,\beta } \right)}}{{{t_{{\rm{th}}}}}}} \right) - 1} \right) + a{e^{u(a + b)}}}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;l + u \le \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;{\rm{and}}\;a \ne b\;{\rm{and}}\;}\\[14pt] {} & {2l \le \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}} \le 2u\;{\rm{and}}\; - \beta \lt \delta \lt \beta }\\[14pt] 0 & {{\rm{if}}\;2l \gt \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;{\rm{and}}\; - \beta \lt \delta \lt \beta }\\[14pt] 1 & {{\rm{if}}\;2u \lt \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;{\rm{and}}\; - \beta \lt \delta \lt \beta }\\[14pt] 0 & {{\rm{if}}\;\delta \le - \beta \;{\rm{or}}\;\beta \le \delta }\end{array}} \right.\end{array}\end{align}

For intruders having a velocity with the same direction the probability of a speed conflict can be calculated according to Equations (35) for full and Equation (36) for truncated distributions.

(35) \begin{align}\mathop {\Pr }\limits_{{\rm{parallel}}} \!\left( {{\rm{SC}}} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{b\;{e^{\frac{{a\;{r_S}\left( {\sqrt {\mathop {\cos }\nolimits^2 (\delta ) - \mathop {\cos }\nolimits^2 (\beta )} + \cos\!(\delta )} \right)}}{{{t_{{\rm{th}}}}}}}}}}{{a + b}}} & {{\rm{if}}\;\delta \lt - \pi + \beta \;{\rm{or}}\;\pi - \beta \lt \delta }\\[15pt] {1 - \dfrac{{b\;{e^{\frac{{a\;{r_S}\left( {\sqrt {\mathop {\cos }\nolimits^2 (\delta ) - \mathop {\cos }\nolimits^2 (\beta )} + \cos\!(\delta )} \right)}}{{{t_{{\rm{th}}}}}}}}}}{{a + b}}} & {{\rm{if}}\; - \beta \lt \delta \lt \beta }\\[9pt] 0 & {{\rm{if}}\; - \pi + \beta \le \delta \le \pi - \beta }\end{array}} \right.\end{align}
(36) \begin{align}\begin{array}{l}\mathop {\Pr }\limits_{{\rm{parallel}}} \left( {{\rm{SC'}}} \right) = \\[5pt] \left\{ {\begin{array}{l@{\quad}l}0 & {{\rm{if}}\;u - l \lt \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;\;{\rm{and}}\;}\\[15pt] {} & {\left( {\delta \lt - \pi + \beta \;{\rm{or}}\;\pi - \beta \lt \delta } \right)}\\[15pt] {1 - \dfrac{{a\!\left( { - \exp\!\left( {al + bl - \dfrac{{b{r_S}\sqrt {\cos\!(2\delta ) - \cos\!(2\beta )} }}{{\sqrt 2 {t_{{\rm{th}}}}}} - \dfrac{{b{r_S}\cos\!(\delta )}}{{{t_{{\rm{th}}}}}}} \right) - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {}\\[15pt] { - \dfrac{{b\!\left( { - \exp\!\left( {u(a + b) + \dfrac{{a{r_S}\left( {\sqrt {\mathop {\cos }\nolimits^2 (\delta ) - \mathop {\cos }\nolimits^2 (\beta )} + \cos\!(\delta )} \right)}}{{{t_{{\rm{th}}}}}}} \right) - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;u - l \geq \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;\;{\rm{and}}\;}\\[15pt] {} & {\left( {\delta \lt - \pi + \beta \;{\rm{or}}\;\pi - \beta \lt \delta } \right)}\\[15pt] 0 & {{\rm{if}}\;u - l \lt \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;\;{\rm{and}}\;}\\[15pt] {} & { - \beta \lt \delta \lt \beta }\\[15pt] {\dfrac{{a\!\left( { - \exp\!\left( {al + bl - \dfrac{{b{r_S}\sqrt {\cos\!(2\delta ) - \cos\!(2\beta )} }}{{\sqrt 2 {t_{{\rm{th}}}}}} - \dfrac{{b{r_S}\cos\!(\delta )}}{{{t_{{\rm{th}}}}}}} \right) - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {}\\[15pt] { + \dfrac{{b\!\left( { - \exp\!\left( {u(a + b) + \dfrac{{a{r_S}\left( {\sqrt {\mathop {\cos }\nolimits^2 (\delta ) - \mathop {\cos }\nolimits^2 (\beta )} + \cos\!(\delta )} \right)}}{{{t_{{\rm{th}}}}}}} \right) - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;u - l \geq \dfrac{{d\left( {\delta ,\gamma } \right)}}{{{t_{{\rm{th}}}}}}\;\;{\rm{and}}\;}\\[15pt] {} & { - \beta \lt \delta \lt \beta }\\[15pt] 0 & {{\rm{if}}\; - \pi + \beta \le \delta \le \pi - \beta }\end{array}} \right.\end{array}\end{align}

3.8 Probability of entering the conflict range faster than the threshold for velocities with arbitrary direction

The speed conflict probability for intruders with arbitrary velocity directions was also analysed. Calculations were performed according to sections of the intruder velocity angle and can be found in Appendix A.6.

Figure 20. Polar plot showing the upper and lower bounds for probability of speed intrusion, exponential distribution with $\rho = 1$ , perpendicular intruder velocity ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , ${t_{{\rm{th}}}} = 60$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 21. Polar plot showing the upper and lower bounds for probability of speed intrusion, exponential distribution with $\rho = 80$ , perpendicular intruder velocity ( $a = 0.2$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , ${t_{{\rm{th}}}} = 60$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 22. Polar plot showing the upper and lower bounds for probability of speed intrusion, full and truncated exponential distribution with $\rho = 1$ , perpendicular intruder velocity ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , ${t_{{\rm{th}}}} = 60$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 23. Polar plot showing the upper and lower bounds for probability of speed intrusion, full and truncated exponential distribution with $\rho = 80$ , perpendicular intruder velocity ( $a = 0.2$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , ${t_{{\rm{th}}}} = 60$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Assuming a truncated distribution the conflict probabilities can be calculated similarly, the range of $\theta $ is sectioned according to Equation (37).

(37) \begin{align}\begin{array}{*{20}{c}}{ - \beta \lt \delta \le \beta \;{\rm{and}}\;\theta = 0}\\[5pt] {0 \lt \theta \le 2\beta }\\[5pt] {2\beta \lt \theta \le 4\beta }\\[5pt] {4\beta \lt \theta \le \frac{\pi }{2}}\\[5pt] {\dfrac{\pi }{2} \lt \theta \le \pi }\end{array}\end{align}

Evaluating the integrals leads to the results shown in Fig. 24 for $\theta = \pi /4$ and Fig. 25 for $\theta = 3\pi /4$ . Once again the effect of changing the intruder velocity direction can be seen (central angular scaling), together with the effect of truncation, and how the difference between upper and lower approximations for truncated distributions is more conspicuous.

Figure 24. Polar plot showing the upper and lower bounds for probability of speed intrusion, full and truncated exponential distribution with $\rho = 1$ , intruder velocity angle $\frac{\pi }{4}$ ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{\pi }{4}$ , ${t_{{\rm{th}}}} = 60$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 25. Polar plot showing the upper and lower bounds for probability of speed intrusion, full and truncated exponential distribution with $\rho = 1$ , intruder velocity angle $\frac{{3\pi }}{4}$ ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{{3\pi }}{4}$ , ${t_{{\rm{th}}}} = 60$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

4.0 Calculations for normal distribution

As stated in Section 3, conflict probabilities can be calculated for any desired distribution using the presented chain of deduction and integration limits. As normal speed distribution is representative of a perturbed traffic flow, making it another sensible example, the same procedure was performed for normal prescribed speed distributions. In this section, only the major differences worth highlighting are summarised.

The parameter ranges and speed limits used for normal distribution are given in Equations (38)–(40).

(38) \begin{align}\mu \in \left[ {5,90} \right],\nu \in \left[ {5,90} \right]\end{align}
(39) \begin{align}l = 15\;{\rm{[knots]}}\end{align}
(40) \begin{align}u = 180\;{\rm{[knots]}}\end{align}

The mean speeds for the chosen parameter range and speed limits for the truncated normal distribution are shown in Fig. 26. Generally, higher values of the location parameter ( $\mu \,$ or $\nu $ ) indicate higher mean speeds.

Figure 26. Mean speed in Kn as a function of the normal distribution parameter ( $\mu $ for the ownship and $\nu $ for the intruder).

For the probability density function of the ratio of normal variables the approximation given by Equation (41) and (42) is used, according to Hayya, Armstrong and Gressis [Reference Hayya, Armstrong and Gressis48].

(41) \begin{align}{f_{\frac{x}{y}}}\left( {x,y;\;\mu ,\nu } \right) \approx \frac{{{e^{ - \frac{{{{(\mu - \nu z)}^2}}}{{2\left( {\sigma _x^2 + \sigma _y^2{z^2}} \right)}}}}\left( {\nu \sigma _x^2 + \mu \sigma _y^2z} \right)}}{{\sqrt {2\pi } {{\left( {\sigma _x^2 + \sigma _y^2{z^2}} \right)}^{3/2}}}}\end{align}
(42) \begin{align}{F_{\frac{x}{y}}}\left( {x,y;\;\mu ,\nu } \right) \approx \frac{1}{2}{\rm{erfc}}\!\left( { - \frac{{\nu z - \mu }}{{\sqrt 2 \sqrt {\sigma _x^2 + \sigma _y^2{z^2}} }}} \right)\end{align}

The exact functions can be found in the papers by Hinkley [Reference Hinkley49] and Cedilnik, Košmelj and Blejec [Reference Cedilnik, Košmelj and Blejec50]. Both formulae were compared to the approximation and each other, and the difference was found to be negligible.

To be able to calculate conflict probabilities for truncated distributions and to handle speed conflicts the joint probability distribution for x and y was written in terms of p and q defined according to Equation (43).

(43) \begin{align}\begin{array}{*{20}{c}}{p = \sqrt {{x^2} + {y^2}} }\\[10pt] {q = \dfrac{x}{y}}\end{array}\end{align}

By completing the squares the joint probability distribution function can be written as a product of the PDF of p (dependent of q) and a scaling term containing q only, as elaborated in Appendix B.1. The integral for p can thus be analytically evaluated. Conflict calculation results are shown in Figs. 27 and 28.

Figure 27. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for full and truncated normal distribution with $\rho = 1$ ( $\mu = 90$ and $\nu = 90$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 28. Polar plot showing the probability of geometric intrusion with intruder velocity angle $\pi /4$ for full and truncated normal distribution with $\rho = 1$ ( $\mu = 90$ and $\nu = 90$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $\theta = \frac{\pi }{4}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Averaging for all possible intrusion angles yields the results in Fig. 29. As opposed to the exponential distribution, which has its maximum in the $ - \beta $ to $\beta $ region for normal distribution the maximum is at $\frac{{11}}{{40}}\pi $ . Compared to the exponential distribution the range of angles with similar corresponding magnitudes is much wider (around $0.8\pi $ for normal distribution as opposed to around $0.3\pi $ for exponential distribution), however, the probability magnitudes are generally lower. The difference between the full and truncated distribution is not significant.

Figure 29. Polar plot showing the probability of geometric intrusion averaged over all possible intruder heading angles for full and truncated normal distribution with $\rho = 1$ ( $\mu = 90$ and $\nu = 90$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Calculations can be performed for any mean and standard deviation. Changing the standard deviation can help represent the heterogeneity of vehicles, which the exponential distribution cannot represent because it has only a single parameter. For normal distributions, it was found that changing the standard deviation does not alter the principal shape of the results, but it spreads the conflict probabilities widening the angles affected and decreasing the peak magnitude (Fig. 30). The total conflict probability does not change with varying the standard deviation.

Figure 30. Polar plot showing the probability of geometric intrusion for perpendicular velocities for full normal distribution with $\rho = 1$ ( $\mu = 90$ and $\nu = 90$ , $l = 15,\;u = 180$ ) for a range of equal standard deviations. The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

It is also possible to calculate conflict probabilities for mismatched standard deviations. If standard deviations are not equal, the conflict probability map becomes distorted, as it can be seen in Fig. 31. Since the standard deviation of the normal distribution is not considered to be a decision variable, for the remaining part of the paper it is set as ${\sigma _x} = {\sigma _y} = 10$ .

Figure 31. Polar plot showing the probability of geometric intrusion for perpendicular velocities for full normal distribution with $\rho = 1$ ( $\mu = 90$ and $\nu = 90$ , $l = 15,\;u = 180$ ) for a range of mismatched standard deviations. The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 32. Polar plot showing the probability of geometric intrusion with intruder velocity angle $3\pi /4$ for full and truncated exponential distribution with $\rho = 1$ – comparison of analytical and numerical results ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{{3\pi }}{4}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 33. Polar plot showing the probability of geometric intrusion with intruder velocity angle $\pi /4$ for full and truncated normal distribution with $\rho = 1$ – comparison of analytical and numerical results ( $\mu = 90$ and $\nu = 90$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $\theta = \frac{\pi }{4}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 34. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for exponential distribution with $\rho = 1$ – comparison of perturbed and nominal simulations ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , ${\sigma _v} = 10$ , ${\sigma _\theta }{ = 5^ \circ }$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

5.0 Verification of calculations using numerical simulations

The calculations were verified using Monte-Carlo simulations. After discretising the set of possible intrusion angles and relative headings, conflict probability was calculated for each angle of the discrete set as the ratio of samples resulting in a conflict divided by the total number of samples for a particular intrusion angle. A sample of speeds according to the prescribed distribution was generated by inverse transform sampling. Using inverse transform sampling, a sample of uniformly distributed variables is transformed according to the cumulative distribution function of the desired sample distribution [Reference Sigman51]. Given all the parameters (intrusion angle, ownship speed, intruder speed, relative heading) the angle of the apparent path and the distance and time traversed can be calculated (Equation (29), (6) and $t = d/{v_{{\rm{res}}}}$ respectively), which, according to the definitions determine whether a conflict occurs or not. Resultant speed $\left( {{v_{{\rm{res}}}}} \right)$ is calculated by projecting both velocities to the apparent path, as in Equation (44).

(44) \begin{align}{v_{{\rm{res}}}} = {v_{\rm{O}}}\sin \Omega + {v_{\rm{I}}}\sin\!\left( {\theta + \Omega } \right)\end{align}

Comparing the number of conflict occurrences to the sample size provides the conflict probability for a given angle pair.

The comparison of analytical and numerical results is shown in Fig. 32 for exponential distribution and Fig. 33 for normal distribution. Apart from the fluctuations typical for numerical methods the results are in agreement, verifying the analytical formulae.

Figure 35. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for truncated exponential distribution with $\rho = 1$ – comparison of perturbed and nominal simulations ( $a = 0.0025$ and $b = 0.0025$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ , ${\sigma _v} = 10$ , ${\sigma _\theta }{ = 5^ \circ }$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 36. Polar plot showing the probability of geometric intrusion with perpendicular intrusion angle for full and truncated exponential and normal distributions with $\rho = 1$ – comparison of results for distributions with matching mean speeds ( $a = 0.00422$ and $b = 0.00422$ , $\mu = 88$ , $\nu = 88$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 37. Polar plot showing the probability of geometric intrusion with perpendicular intrusion angle for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ( $a = 0.125$ and $b = 0.00422$ , $\mu = 15$ , $\nu = 88$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 38. Polar plot showing the probability of speed intrusion with perpendicular intrusion angle for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ( $a = 0.00422$ and $b = 0.00422$ , $\mu = 88$ , $\nu = 88$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 39. Polar plot showing the probability of speed intrusion with perpendicular intrusion angle for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ( $a = 0.125$ and $b = 0.00422$ , $\mu = 15$ , $\nu = 88$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $\theta = \frac{\pi }{2}$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 40. Polar plot showing the probability of speed intrusion averaged over possible intrusion angles for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ( $a = 0.00422$ and $b = 0.00422$ , $\mu = 88$ , $\nu = 88$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 41. Polar plot showing the probability of speed intrusion averaged over possible intrusion angles for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ( $a = 0.125$ and $b = 0.00422$ , $\mu = 15$ , $\nu = 88$ , ${\sigma _x} = 10$ , ${\sigma _y} = 10$ , $l = 15,\;u = 180$ ). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Numerical simulations were also used to evaluate the robustness of estimations. Speed distributions and the intrusion angle were perturbed by adding zero-mean normally distributed noise to the sampled speed and heading values with the given deviations ( ${\sigma _v} = 10$ , ${\sigma _\theta }{ = 5^ \circ }$ ), and results are compared to nominal simulations. Perturbations may be considered analogous to navigation uncertainties. Depending on equipage, vehicles can be categorised in terms of these uncertainties. The categories are also broadcast via ADS-B [Reference Sun52]. Further standardisation of equipage and performance for UASs and UAM is highly likely. Comparisons for perpendicular intrusions with exponential distributions are shown in Figs. 34 and 35. For full distributions perturbation of speed does not modify conflict probability significantly, the angle perturbation however decreases the peak probability. In case of truncated distributions, no significant change can be seen.

6.0 Analysis of results

In this section characteristics of the conflict probabilities are analysed and compared for exponential and normal prescribed distributions. This comparative analysis can form the basis of the selection of the desired distribution for different traffic scenarios.

For an intruder arriving from the perpendicular direction the range of angles that might lead to conflicts is much wider for exponential than for normal distribution. Especially for full distribution, while the corresponding probabilities are smaller, the overall conflict probability is the same, and independent of the type of distribution (Figs. 36 and 37). For unequal parameters, the range of possible conflict angles shrinks for all distributions, being wider for normal distribution with lower amplitudes. Changing the parameters of distributions only changes the angular distribution, not the overall probability of a conflict. The same characteristics can be seen for speed conflicts, with the threshold time of ${t_{{\rm{th}}}} = 60\;{\rm{s}}$ the trends are generally the same (Figs. 38 and 39).

The overall conflict probability stays the same when calculated for all headings. Similarly to the perpendicular case, the angle range is wider for the normal distribution and the probabilities are lower. For unequal parameters, the difference becomes less, and the shape of the distributions become similar (Figs. 40 and 41).

7.0 Conclusions

7.1 Summary

In this paper, the conflict situation was analysed with speed distributions for both the ownship and the intruder. Exponential and normal distributions were assumed, both in their full form and with truncation to account for the limited range of achievable speeds. Analytical formulae were derived for conflict probability, at first for perpendicular and parallel intrusions, which were then extended for arbitrary angles intrusions. Assuming a uniform probability for intrusion angles conflict probabilities were averaged. Results were verified using numerical (Monte Carlo) simulations. The sensitivity of results to parameter variations was calculated and simulated, results showed perturbations have no significant effect.

Calculation outcomes lead to the following findings. Truncating the distribution of possible speeds has a significant effect on conflict probability distribution in the exponential case, however, for normal distribution, the effect is almost negligible. For geometric conflicts, only the shape of the distribution is affected by changing the parameters. The overall conflict probability stays the same, similarly to the waterbed effect. For speed conflicts, however, the overall probability can also be modified by the choice of parameters. One of the key points of progress is that formulae for conflict probabilities were calculated, thus the exact relationship is known. A significant drawback of the results is the complexity of expressions, therefore to be applicable for conflict resolution appropriate approximations need to be found.

7.2 Future work

Future work includes the integration of the derived formulae into the optimisation part of the proposed framework, together with the analysis of the effect of distribution shaping when applied in concert with heading-based altitude separation. The method can also be extended to three dimensions, taking into account climbing and descending as well. Another extension would be to investigate the transformation of conflict probabilities when an avoidance manoeuvre is applied and formulate a conflict resolution algorithm for the low layer of the framework. Also, the synthesis of the ideal behaviour distribution holds significant merit.

Acknowledgements

The authors gratefully acknowledge that this research was supported by the Engineering and Physical Sciences Research Council, under grant EPSRC EP/N509450/1.

The authors confirm that the data supporting the findings of this study are available within the paper and its supplementary materials.

Raw data is available from the corresponding author, Zs. Ö., upon reasonable request. The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this paper.

Appendix

A. Conflict probabilities for exponential distribution

A.1 Formulae related to exponential distribution algebra

The probability distribution of the sum ( $x + y = z$ ) of exponentially distributed random variables can be calculated according to Equations (A1), (A2), (A3) and (A4).

(A1) \begin{align}{f_{x + y}}\left( {x,y\;;a,b} \right) = \left\{ {\begin{array}{l@{\quad}l}{ - \dfrac{{ab\!\left( {{e^{ - az}} - {e^{ - bz}}} \right)}}{{a - b}}\left( { = \int_0^z a\;b\;{e^{ - ax}}\;{e^{ - b(z - x)}}{\kern 1pt} {\rm{d}}x} \right)} & {{\rm{if}}\;z \geq 0\;{\rm{and}}\;a \ne b}\\[9pt] 0 & {{\rm{if}}\;z \lt 0\;{\rm{and}}\;a \ne b}\end{array}} \right.\end{align}
(A2) \begin{align}{f_{x + y}}\left( {x,y;\;a,b} \right) = \left\{ {\begin{array}{l@{\quad}l}{{a^2}z{e^{ - az}}} & {{\rm{if}}\;z \geq 0\;{\rm{and}}\;a = b}\\[5pt] 0 & {{\rm{if}}\;z \lt 0\;{\rm{and}}\;a = b}\end{array}} \right.\end{align}
(A3) \begin{align}{F_{x + y}}\left( {x,y;\;a,b} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{a\!\left( { - {e^{ - bZ}}} \right) + b\!\left( {{e^{ - aZ}} - 1} \right) + a}}{{a - b}}\left( { = \int_0^Z - \dfrac{{ab\!\left( {{e^{ - az}} - {e^{ - bz}}} \right)}}{{a - b}}{\kern 1pt} dz} \right)} & {{\rm{if}}\;Z \geq 0\;{\rm{and}}\;a \ne b}\\[15pt] 0 & {{\rm{if}}\;Z \lt 0\;{\rm{and}}\;a \ne b}\end{array}} \right.\end{align}

(A4) \begin{align}{F_{x + y}}\left( {x,y;\;a,b} \right) = \left\{ {\begin{array}{l@{\quad}l}{1 - {e^{ - aZ}}(aZ + 1)} & {{\rm{if}}\;Z \geq 0\;{\rm{and}}\;a = b}\\[5pt] 0 & {{\rm{if}}\;Z \lt 0\;{\rm{and}}\;a = b}\end{array}} \right.\end{align}

Since the set of possible values for a truncated exponential distribution is bounded, the sum of variables with truncated exponential distributions is bounded. The probability density function and the cumulative distribution function of the sum of variables are given by Equations (A5), (A6), (A7) and (A8).

(A5) \begin{align}{f'_{\!\!x + y}}\left( {x,y;\;a,b,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{a\;b\;{e^{u(a + b)}}\left( {{e^{2bl - bz}} - {e^{2al - az}}} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;2l \le z \le l + u\;{\rm{and}}\;a \ne b}\\[15pt] {\dfrac{{a\;b\;{e^{l(a + b)}}\left( {{e^{2au - az}} - {e^{2bu - bz}}} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;l + u \lt z \le 2u\;{\rm{and}}\;a \ne b}\\[15pt] 0 & {{\rm{if}}\;z \lt 2l\;{\rm{or}}\;2u \lt z\;{\rm{and}}\;a \ne b}\end{array}} \right.\end{align}
(A6) \begin{align}{f'_{\!\!x + y}}\left( {x,y;\;a,b,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{ - \dfrac{{{a^2}(2l - z){e^{a(2l + 2u - z)}}}}{{{{\left( {{e^{al}} - {e^{au}}} \right)}^2}}}} & {{\rm{if}}\;2l \le z \le l + u\;{\rm{and}}\;a = b}\\[15pt] {\dfrac{{{a^2}(2u - z){e^{a(2l + 2u - z)}}}}{{{{\left( {{e^{al}} - {e^{au}}} \right)}^2}}}}& {{\rm{if}}\;l + u \lt z \le 2u\;{\rm{and}}\;a = b}\\[15pt] 0 & {{\rm{if}}\;z \lt 2l\;{\rm{or}}\;2u \lt z\;{\rm{and}}\;a = b}\end{array}} \right.\end{align}
(A7) \begin{align}{F'_{\!\!x + y}}\left( {x,y;\;a,b,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{{e^{u(a + b)}}\left( {a\!\left( { - {e^{2bl - bZ}}} \right) + b\!\left( {{e^{2al - aZ}} - 1} \right) + a} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;2l \le Z \le l + u\;{\rm{and}}\;a \ne b}\\[15pt] {\dfrac{{a\!\left( {{e^{al + b(l + 2u - Z)}} - {e^{au + bl}} - {e^{al + bu}} + {e^{u(a + b)}}} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {}\\[15pt] { - \dfrac{{b\!\left( {{e^{a(l + 2u - Z) + bl}} - {e^{au + bl}} - {e^{al + bu}} + {e^{u(a + b)}}} \right)}}{{(a - b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;l + u \lt Z \le 2u\;{\rm{and}}\;a \ne b}\\[15pt] 0 & {{\rm{if}}\;Z \lt 2l\;{\rm{and}}\;a \ne b}\\[5pt] 1 & {{\rm{if}}\;2u \lt Z\;{\rm{and}}\;a \ne b}\end{array}} \right.\end{align}
(A8) \begin{align}{F'_{\!\!x + y}}\left( {x,y;\;a,b,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{{e^{2au}}\left( {{e^{2al - aZ}}(2al - aZ - 1) + 1} \right)}}{{{{\left( {{e^{al}} - {e^{au}}} \right)}^2}}}} & {{\rm{if}}\;2l \le Z \le l + u\;{\rm{and}}\;a = b}\\[15pt] {\dfrac{{(a(Z - 2u) + 1){e^{2a(l + u) - aZ}} - 2{e^{a(l + u)}} + {e^{2au}}}}{{{{\left( {{e^{al}} - {e^{au}}} \right)}^2}}}} & {{\rm{if}}\;l + u \lt Z \le 2u\;{\rm{and}}\;a = b}\\[9pt] 0 & {{\rm{if}}\;Z \lt 2l\;{\rm{and}}\;a = b}\\[5pt] 1 & {{\rm{if}}\;2u \lt Z\;{\rm{and}}\;a = b}\end{array}} \right.\end{align}

The difference ( $z = x - y$ ) of the exponentially distributed variables can be calculated similarly, by evaluating the integral of the probability distribution functions (Equations (A9) and (A10)). If the distribution functions of the variables are truncated, the difference becomes bounded as given by Equations (A11) and (A12).

(A9) \begin{align}{f_{x - y}}\left( {x,y;\;a,b} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{ab{e^{ - az}}}}{{a + b}}} & {{\rm{if}}\;z \geq 0}\\[15pt] {\dfrac{{ab{e^{bz}}}}{{a + b}}} & {{\rm{if}}\;z \lt 0}\end{array}} \right.\end{align}
(A10) \begin{align}{F_{x - y}}\left( {x,y;\;a,b} \right) = \left\{ {\begin{array}{l@{\quad}l}{1 - \dfrac{{a{e^{ - bZ}}}}{{a + b}}} & {{\rm{if}}\;Z \geq 0}\\[15pt] {\dfrac{{a{e^{bZ}}}}{{a + b}}} & {{\rm{if}}\;Z \lt 0}\end{array}} \right.\end{align}
(A11) \begin{align}{f'_{\!\!x - y}}\left( {x,y;\;a,b,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{ab{e^{ - aZ}}\!\left( {{e^{(a + b)(u + Z)}} - {e^{l(a + b)}}} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;l - u \le z \le 0}\\[15pt] {\dfrac{{ab{e^{ - aZ}}\left( {{e^{u(a + b)}} - {e^{(a + b)(l + Z)}}} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;0 \lt z \le u - l}\\[15pt] 0 & {{\rm{if}}\;z \lt l - u\;{\rm{or}}\;u - l \lt z}\end{array}} \right.\end{align}
(A12) \begin{align}{F'_{\!\!x - y}}\left( {x,y;\;a,b,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{{e^{ - aZ}}\!\left( {b\!\left( {{e^{l(a + b)}} - {e^{a(u + Z) + bl}}} \right) + a\!\left( {{e^{(a + b)(u + Z)}} - {e^{a(u + Z) + bl}}} \right)} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;l - u \le Z \le 0}\\[15pt] {1 + \dfrac{{b{e^{ - aZ}}\left( {{e^{a(l + Z) + bu}} - {e^{u(a + b)}}} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {}\\[15pt] { + \dfrac{{a{e^{ - aZ}}\left( {{e^{a(l + Z) + bu}} - {e^{(a + b)(l + Z)}}} \right)}}{{(a + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;0 \lt Z \le u - l}\\[15pt] 0 & {{\rm{if}}\;Z \lt l - u}\\[5pt] 1 & {{\rm{if}}\;u - l \lt Z}\end{array}} \right.\end{align}

For conflict probability calculation of aircraft with perpendicular velocities it is necessary to determine the ratio ( $z = x/y$ ) of exponentially distributed random variables. The probability density function and the cumulative distribution function for the ratio are given by Equations (A13) and (A14).

(A13) \begin{align}{f_{\frac{x}{y}}}\!\left( {x,y;\;a,b} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{ab}}{{{{(az + b)}^2}}}} & {{\rm{if}}\;z \geq 0}\\[10pt] 0 & {{\rm{if}}\;z \lt 0}\end{array}} \right.\end{align}
(A14) \begin{align}{F_{\frac{x}{y}}}\!\left( {x,y;\;a,b} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{aZ}}{{aZ + b}}} & {{\rm{if}}\;Z \geq 0}\\[10pt] 0 & {{\rm{if}}\;Z \lt 0}\end{array}} \right.\end{align}

If the exponential distribution variables are truncated, their ratio becomes bounded. The probability density function and the cumulative distribution function of the truncated cases are given by Equations (A15) and (A16).

(A15) \begin{align}{f'_{\!\!\frac{x}{y}}}\!\left( {x,y;a,b,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{ab{e^{au + bl}}\left( {z(auz + bu + 1){e^{a(l - uz)}} - (alz + bl + z){e^{b\!\left( {u - \dfrac{l}{z}} \right)}}} \right)}}{{z{{(az + b)}^2}\left( {{e^{au}} - {e^{al}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;l/u \le z \le 1}\\[15pt] {\dfrac{{ab{e^{\frac{{(z - 1)(bu - alz)}}{z}}}\left( {z(alz + bl + 1){e^{u\left( {a + \frac{b}{z}} \right)}} - {e^{l(az + b)}}(auz + bu + z)} \right)}}{{z{{(az + b)}^2}\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;1 \lt z \le u/l}\\[15pt] 0 & {{\rm{if}}\;z \lt l/u\;}\\[5pt] {} & {{\rm{or}}\;u/l \lt z}\end{array}} \right.\end{align}
(A16) \begin{align}{F'_{\!\frac{x}{y}}}\!\left( {x,y;\;a,b,l,u} \right) = \left\{ {\begin{array}{l@{\quad}l}{ - \dfrac{{{e^{au + bl}}\!\left( {b\!\left( {{e^{a(l - uz)}} - 1} \right) + az\!\left( {{e^{b\!\left( {u - \frac{l}{z}} \right)}} - 1} \right)} \right)}}{{(az + b)\left( {{e^{au}} - {e^{al}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;l/u \le Z \le 1}\\[15pt] {\dfrac{{b\!\left( { - {e^{a(l(\!-\!z) + l + u) + bu}} - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{(az + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {}\\[15pt] { + \dfrac{{az\left( { - {e^{al + b\!\left( {l - \frac{u}{z} + u} \right)}} - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{(az + b)\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)}}} & {{\rm{if}}\;1 \lt Z \le u/l}\\[10pt] 0 & {{\rm{if}}\;Z \lt l/u}\\[5pt] 1 & {{\rm{if}}\;u/l \lt Z}\end{array}} \right.\end{align}

A.2 Geometric intrusion for truncated exponential distribution for perpendicular intrusion

Geometric conflict probabilities perpendicular intrusions, with both the ownship and the intruder speeds assuming truncated exponential distribution are given by Equations (A17)–(A19).

(A17)
(A18)
(A19)

A.3 Geometric intrusion for exponential distribution with arbitrary intrusion angle

The conflict probabilities for $0 \lt \theta \lt \pi $ can then be calculated according to Equation (A20). If $\theta = 0$ , the conflict probability is the same as given by Equation (26), if $\theta = \pi $ Equation (27) gives the conflict probability. For $ - \pi \lt \theta \lt 0$ the conflict probabilities can be calculated similarly, and are given by Equation (A21). For truncated distributions the distribution of $\tan \Omega $ (Equation (30)) becomes Equation (A23). For $ - \pi \lt \theta \lt 0$ a different formula is used, which is given by Equation (A25). Using Equation (A23) the conflict probabilities can be calculated according to Equation (A22).

(A20) \begin{align}\left\{ {\begin{array}{l@{\quad}l}{\dfrac{b}{{a\sin\!(\theta )\cot\!(\beta + \delta ) - a\cos\!(\theta ) + b}}} & {{\rm{if}}\; - \beta \le \delta \le \beta \;\;{\rm{and}}\;\;\cot\!(\beta + \delta ) \geq \cot \theta }\\[15pt] 1 & {{\rm{if}}\; - \beta \le \delta \le \beta \;\;{\rm{and}}\;\;\cot\!(\beta + \delta ) \lt \cot \theta }\\[15pt] 0 & {{\rm{if}}\;\beta \lt \delta \lt \pi - \beta \;\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \lt \cot \theta }\\[15pt] {\dfrac{b}{{a\sin\!(\theta )\cot\!(\beta + \delta ) - a\cos\!(\theta ) + b}} - 1} & {{\rm{if}}\;\beta \lt \delta \lt \pi - \beta \;\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \lt \cot \theta }\\[15pt] {} & {\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \geq \cot \theta }\\[15pt] {\dfrac{a}{{a - b\sin\!(\beta - \delta )\csc\!(\beta - \delta + \theta )}}} & {{\rm{if}}\;\beta \lt \delta \lt \pi - \beta \;\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \geq \cot \theta }\\[15pt] {} & {\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \lt \cot \theta }\\[15pt] {\dfrac{a}{{a - b\sin\!(\beta - \delta )\csc\!(\beta - \delta + \theta )}}} & {}\\[15pt] { + \dfrac{b}{{a\sin\!(\theta )\cot\!(\beta + \delta ) - a\cos\!(\theta ) + b}} - 1} & {{\rm{if}}\;\beta \lt \delta \lt \pi - \beta \;\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \geq \cot \theta }\\[15pt] {} & {\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \geq \cot \theta }\\[15pt] {\dfrac{a}{{a - b\sin\!(\beta - \delta )\csc\!(\beta - \delta + \theta )}}} & {{\rm{if}}\;\left( { - \pi \le \delta \le - \pi + \beta \;{\rm{or}}\;\pi - \beta \le \delta \le \pi } \right)}\\[15pt] {} & {\;{\rm{and}}\;\;\cot\!(\delta - \beta ) \geq \cot \theta }\\[5pt] 0 & {{\rm{if}}\;\left( { - \pi \le \delta \le - \pi + \beta \;{\rm{or}}\;\pi - \beta \le \delta \le \pi } \right)}\\[5pt] {} & {\;{\rm{and}}\;\;\cot\!(\delta - \beta ) \lt \cot \theta }\end{array}} \right.\end{align}

(A21) \begin{align}\left\{ {\begin{array}{l@{\quad}l}1 & {{\rm{if}}\; - \beta \le \delta \le \beta \;\;{\rm{and}}\;\;\cot\!(\beta + \delta ) \geq \cot \theta }\\[15pt] {\dfrac{b}{{b - a\sin\!(\theta )(\!\cot\!(\beta - \delta ) + \cot\!(\theta ))}}} & {{\rm{if}}\; - \beta \le \delta \le \beta \;\;{\rm{and}}\;\;\cot\!(\beta + \delta ) \lt \cot \theta }\\[15pt] 0 & {{\rm{if}}\;\beta \lt \delta \lt \pi - \beta }\\[5pt] {1 - \dfrac{b}{{b - a\sin\!(\theta )(\!\cot\!(\beta - \delta ) + \cot\!(\theta ))}}} & {{\rm{if}}\; - \pi + \beta \le \delta \lt - \beta \;\;{\rm{and}}\;\;\cot\!\left( {\delta + \beta } \right) \geq \cot \theta }\\[15pt] {} & {\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \lt \cot \theta }\\[10pt] {\dfrac{b}{{b - a\sin\!(\theta )(\!\cot\!(\theta ) - \cot\!(\beta + \delta ))}}} & {}\\[15pt] { - \dfrac{b}{{b - a\sin\!(\theta )(\!\cot\!(\beta - \delta ) + \cot\!(\theta ))}}} & {{\rm{if}}\; - \pi + \beta \le \delta \lt - \beta \;\;{\rm{and}}\;\;\cot\!\left( {\delta + \beta } \right) \lt \cot \theta }\\[15pt] {} & {\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \lt \cot \theta }\\[10pt] 0 & {{\rm{if}}\; - \pi + \beta \le \delta \lt - \beta \;\;{\rm{and}}\;\;\cot\!\left( {\delta + \beta } \right) \geq \cot \theta }\\[5pt] {} & {\;{\rm{and}}\;\;\cot\!\left( {\delta - \beta } \right) \geq \cot \theta }\\[5pt] 0 & {{\rm{if}}\;\left( { - \pi \le \delta \le - \pi + \beta \;{\rm{or}}\;\pi - \beta \le \delta \le \pi } \right)}\\[5pt] {} & {\;{\rm{and}}\;\;\cot\!(\delta - \beta ) \geq \cot \theta }\\[15pt] {1 - \dfrac{b}{{b - a\sin\!(\theta )(\!\cot\!(\theta ) - \cot\!(\beta + \delta ))}}} & {{\rm{if}}\;\left( { - \pi \le \delta \le - \pi + \beta \;{\rm{or}}\;\pi - \beta \le \delta \le \pi } \right)}\\[15pt] {} & {\;{\rm{and}}\;\;\cot\!(\delta - \beta ) \lt \cot \theta }\\[5pt] {} & {\;{\rm{and}}\;\;\delta + \beta \lt \theta }\end{array}} \right.\end{align}

(A22) \begin{align}\left\{ {\begin{array}{l@{\quad}l}{\dfrac{a}{{a + b}}} & {{\rm{if}}\; - \pi \le \delta \lt - \pi + \beta \;\;{\rm{and}}\;\;\theta = - \pi }\\[15pt] {{\mathop{\rm P}\nolimits} r'\left( {\tan \Omega \le \cot\!(\!-\!\beta - \delta )} \right)} & {{\rm{if}}\; - \pi \le \delta \lt - \pi + \beta \;\;{\rm{and}}\;\; - \pi \lt \theta \lt 0}\\[5pt] {\Pr\!\left( {\tan \Omega \le \cot\!(\delta - \beta )} \right)} & {{\rm{if}}\; - \pi \le \delta \lt - \pi + \beta \;\;{\rm{and}}\;\;0 \lt \theta \lt \pi }\\[8pt] {\dfrac{a}{{a + b}}} & {{\rm{if}}\; - \pi \le \delta \lt - \pi + \beta \;\;{\rm{and}}\;\;\theta = \pi }\\[10pt] {{\mathop{\rm P}\nolimits} r'\left( {\tan \Omega \le \cot\!(\!-\!\delta - \beta )} \right)} & {}\\[15pt] { - {\mathop{\rm P}\nolimits} r'\left( {\tan \Omega \le \cot\!(\!-\!\delta + \beta )} \right)} & {{\rm{if}}\; - \pi + \beta \le \delta \lt - \beta \;\;{\rm{and}}\;\; - \pi \lt \theta \lt 0}\\[15pt] {1 - \dfrac{a}{{a + b}}} & {{\rm{if}}\; - \beta \le \delta \lt \beta \;\;{\rm{and}}\;\;\theta = - \pi }\\[15pt] {1 - {\mathop{\rm P}\nolimits} r'\left( {\tan \Omega \le \cot\!(\beta - \delta )} \right)} & {{\rm{if}}\; - \beta \le \delta \lt \beta \;\;{\rm{and}}\;\;\pi \lt \theta \lt 0}\\[5pt] 1 & {{\rm{if}}\; - \beta \le \delta \lt \beta \;\;{\rm{and}}\;\;\theta = 0}\\[5pt] {1 - \Pr\!\left( {\tan \Omega \le \cot\!(\beta + \delta )} \right)} & {{\rm{if}}\; - \beta \le \delta \lt \beta \;\;{\rm{and}}\;\;0 \lt \theta \lt \pi }\\[15pt] {1 - \dfrac{a}{{a + b}}} & {{\rm{if}}\; - \beta \le \delta \lt \beta \;\;{\rm{and}}\;\;\theta = \pi }\\[15pt] {\Pr\!\left( {\tan \Omega \le \cot\!(\delta - \beta )} \right)} & {}\\[5pt] { - \Pr\!\left( {\tan \Omega \le \cot\!(\beta + \delta )} \right)} & {{\rm{if}}\;\beta \le \delta \lt \pi - \beta \;\;{\rm{and}}\;\;0 \lt \theta \lt \pi }\\[15pt] {\dfrac{a}{{a + b}}} & {{\rm{if}}\;\pi - \beta \le \delta \le \pi \;\;{\rm{and}}\;\;\theta = - \pi }\\[15pt] {{\mathop{\rm P}\nolimits} r'\left( {\tan \Omega \le \cot\!(\!-\!\beta - \delta )} \right)} & {{\rm{if}}\;\pi - \beta \le \delta \le \pi \;\;{\rm{and}}\;\; - \pi \lt \theta \lt 0}\\[5pt] {\Pr\!\left( {\tan \Omega \le \cot\!(\delta - \beta )} \right)} & {{\rm{if}}\;\pi - \beta \le \delta \le \pi \;\;{\rm{and}}\;\;0 \lt \theta \lt \pi }\\[15pt] {\dfrac{a}{{a + b}}} & {{\rm{if}}\;\pi - \beta \le \delta \le \pi \;\;{\rm{and}}\;\;\theta = \pi }\\[15pt] 0 & {\;{\rm{else}}}\end{array}} \right.\end{align}

(A23) \begin{align} & \Pr\!\left( {\tan \Omega \le Z} \right) \nonumber \\ &= \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{ - {e^{au + bl}}b\!\left( {{e^{a(l - u\sin\!(\theta )(\!\cot\!(\theta ) + Z))}} - 1} \right)}}{{\left( {{e^{au}} - {e^{al}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)(a\sin\!(\theta )(\!\cot\!(\theta ) + Z) + b)}}} & {}\\[15pt] { - \dfrac{{a{e^{au + bl}}\sin\!(\theta )(\!\cot\!(\theta ) + Z)\left( {{e^{b\!\left( {u - \dfrac{{l\csc\!(\theta )}}{{\cot\!(\theta ) + Z}}} \right)}} - 1} \right)}}{{\left( {{e^{au}} - {e^{al}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)(a\sin\!(\theta )(\!\cot\!(\theta ) + Z) + b)}}} & {\;{\rm{if}}\;\dfrac{l}{u} \lt \left( {Z + \cot \theta } \right)\sin \theta }\\[15pt] {} & {\;{\rm{and}}\;\;\left( {Z + \cot \theta } \right)\sin \theta \le 1}\\[15pt] {\dfrac{{b\!\left( { - \exp (a(l\sin\!(\theta )(\!-\!(\!\cot\!(\theta ) + Z)) + l + u) + bu) - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)(a\sin\!(\theta )(\!\cot\!(\theta ) + Z) + b)}}} & {}\\[15pt] { + \dfrac{{a\sin\!(\theta )(\!\cot\!(\theta ) + Z)\left( { - {e^{al + b\!\left( {l - \dfrac{{u\csc\!(\theta )}}{{\cot\!(\theta ) + Z}} + u} \right)}} - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)(a\sin\!(\theta )(\!\cot\!(\theta ) + Z) + b)}}} & {\;{\rm{if}}\;\dfrac{u}{l} \gt \left( {Z + \cot \theta } \right)\sin \theta }\\[15pt] {} & {\;{\rm{and}}\;\;\left( {Z + \cot \theta } \right)\sin \theta \gt 1}\\[15pt] 0 & {\;{\rm{else}}}\end{array}} \right.\end{align}
(A24) \begin{align}&{\rm{Pr}}'\left( {\tan \Omega \le Z} \right) \nonumber \\ &= \left\{ {\begin{array}{l@{\quad}l}{\dfrac{{ - {e^{au + bl}}\;b\!\left( {{e^{a(l + u\sin\!(\theta )(\!\cot\!(\theta ) + Z))}} - 1} \right)}}{{\left( {{e^{au}} - {e^{al}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)(b - a\sin\!(\theta )(\!\cot\!(\theta ) + Z))}}} & {}\\[15pt] { + \dfrac{{{e^{au + bl}}\;a\sin\!(\theta )(\!\cot\!(\theta ) + Z)\left( {{e^{b\!\left( {\dfrac{{l\csc\!(\theta )}}{{\cot\!(\theta ) + Z}} + u} \right)}} - 1} \right)}}{{\left( {{e^{au}} - {e^{al}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)(b - a\sin\!(\theta )(\!\cot\!(\theta ) + Z))}}} & {\;{\rm{if}}\;\dfrac{l}{u} \lt - \left( {Z + \cot \theta } \right)\sin \theta }\\[15pt] {} & {\;{\rm{and}}\;\; - \left( {Z + \cot \theta } \right)\sin \theta \le 1}\\[15pt] {\dfrac{{b\!\left( { - {e^{a(l\sin\!(\theta )(\!\cot\!(\theta ) + Z) + l + u) + bu}} - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)(b - a\sin\!(\theta )(\!\cot\!(\theta ) + Z))}}} & {}\\[15pt] { - \dfrac{{a\sin\!(\theta )(\!\cot\!(\theta ) + Z)\left( { - {e^{al + b\!\left( {l + \dfrac{{u\csc\!(\theta )}}{{\cot\!(\theta ) + Z}} + u} \right)}} - {e^{au + bl}} + {e^{l(a + b)}} + {e^{u(a + b)}}} \right)}}{{\left( {{e^{al}} - {e^{au}}} \right)\left( {{e^{bl}} - {e^{bu}}} \right)(b - a\sin\!(\theta )(\!\cot\!(\theta ) + Z))}}} & {\;{\rm{if}}\;\dfrac{u}{l} \gt - \left( {Z + \cot \theta } \right)\sin \theta }\\[15pt] {} & {\;{\rm{and}}\;\; - \left( {Z + \cot \theta } \right)\sin \theta \gt 1}\\[15pt] 0 & {\;{\rm{else}}}\end{array}} \right.\end{align}

A.4 Speed intrusion for full exponential distribution for perpendicular intrusion

Case 1: $ - \beta \le \delta \le \beta $

(A25)

Case 2: $\beta \le \delta \le \frac{\pi }{4}$

(A26)

Case 3: $\frac{\pi }{4} \le \delta \le \frac{\pi }{2} - \beta $

(A27)

Case 4: $\frac{\pi }{2} - \beta \le \delta \le \frac{\pi }{2} + \beta $

(A28)

Evaluating the integral bounds the conflict probability can be calculated (Equations (A29), (A30), (A31) and (A32)).

Case 1: $ - \beta \le \delta \le \beta $

(A29)

Case 2: $\beta \le \delta \le \frac{\pi }{4}$

(A30)

Case 3: $\frac{\pi }{4} \le \delta \le \frac{\pi }{2} - \beta $

(A31)

Case 4: $\frac{\pi }{2} - \beta \le \delta \le \frac{\pi }{2} + \beta $

(A32)

A.5 Speed intrusion for truncated exponential distribution for perpendicular intrusion

For truncated distributions the formula conflict probability changes similarly to the transformation between Equations (A29) and (A33).

(A33)

A.6 Speed intrusion for truncated exponential distribution for intrusion with arbitrary direction

Speed conflict probability is upper bounded by the case of direct opposite movement. The upper approximation of a speed conflict can be calculated similarly to Equation (A34). The lower approximation is is formulated analogously to Equation (A35).

(A34)
(A35)

B. Conflict probabilities for normal distribution

B.1 Transformation of the normal distribution

The joint probability distribution for orthogonal variables is given by Equation (B1).

(B1) \begin{align}{P_{x,y}} = \frac{1}{{2\pi {\sigma _x}{\sigma _y}}}{{\rm{e}}^{ - \frac{1}{2}\left( {\frac{{{{\left( {x - \mu } \right)}^2}}}{{\sigma _x^2}} + \frac{{{{\left( {y - \nu } \right)}^2}}}{{\sigma _y^2}}} \right)}}\end{align}

Substituting $p = \sqrt {{x^2} + {y^2}} $ and $q = \frac{x}{y}$ and completing the square leads to the formula given by Equation (B2).

(B2) \begin{align}{P_{p,q}} = \frac{1}{{\sqrt {2\pi } {\sigma _p}}}{{\rm{e}}^{ - \frac{1}{2}{{\left( {\frac{{p - \xi }}{{{\sigma _p}}}} \right)}^2}}}\frac{{{\sigma _p}}}{{\sqrt {2\pi } {\sigma _x}{\sigma _y}}}{{\rm{e}}^{ - \frac{1}{2}\kappa }}\end{align}

In Equation (B2) the parameters are defined by Equation (B5).

(B3) \begin{align}\xi = \frac{{\sqrt {{q^2} + 1} \left( {\nu \sigma _x^2 + \mu \sigma _y^2q} \right)}}{{\sigma _x^2 + \sigma _y^2{q^2}}}\end{align}
(B4) \begin{align}{\sigma _p} = \sqrt {\frac{{\sigma _x^2\sigma _y^2\left( {{q^2} + 1} \right)}}{{\sigma _x^2 + \sigma _y^2{q^2}}}} \end{align}
(B5) \begin{align}\kappa = \frac{{\left( {\sigma _x^2 + \sigma _y^2{q^2}} \right)\left( {\frac{{{\mu ^2}\sigma _y^2 + {\nu ^2}\sigma _x^2}}{{\sigma _x^2 + \sigma _y^2{q^2}}} - \frac{{{{\left( {\nu \sigma _x^2 + \mu \sigma _y^2q} \right)}^2}}}{{{{\left( {\sigma _x^2 + \sigma _y^2{q^2}} \right)}^2}}}} \right)}}{{\sigma _x^2\sigma _y^2}}\end{align}

References

Macrina, G., Pugliese, L.D.P., Guerriero, F. and Laporte, G. Drone-aided routing: A literature review, Transp Res C: Emer Technol, 120, 2020, https://doi.org/10.1016/j.trc.2020.102762.CrossRefGoogle Scholar
Kopardekar, P.H. Unmanned aerial system (UAS) traffic management (UTM): Enabling low-altitude airspace and UAS operations. NASA/TM-2014-218299, 2014.Google Scholar
Vascik, P.D. and Hansman, R.J. Scaling Constraints for Urban Air Mobility Operations: Air Traffic Control, Ground Infrastructure, and Noise, 2018 Aviation Technology, Integration, and Operations Conference, 2018, https://doi.org/10.2514/6.2018-3849.CrossRefGoogle Scholar
Thipphavong, D.P., Apaza, R., Barmore, B., Battiste, V., Burian, B., Dao, Q., Feary, M., Go, S., Goodrich, K.H., Homola, J., Idris, H.R., Kopardekar, P.H., Lachter, J.B., Neogi, N.A., Ng, H.K., Oseguera-Lohr, R.M., Patterson, M.D. and Verma, S.A. Urban Air Mobility Airspace Integration Concepts and Considerations, AIAA Aviation Forum (Aviation 2018), June 25, 2018 – June 29, 2018; Atlanta, GA, United States, 2018, https://doi.org/10.2514/6.2018-3676.CrossRefGoogle Scholar
Verma, S.A., Monheim, S.C., Moolchandani, K.A., Pradeep, P., Cheng, A.W., Thipphavong, D.P., Dulchinos, V.L., Arneson, H., Lauderdale, T.A., Bosson, C.S., Mueller, E.R. and Wei, B. Lessons Learned: Using UTM Paradigm for Urban Air Mobility Operations, 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 2020, https://doi.org/10.1109/DASC50938.2020.9256650.CrossRefGoogle Scholar
Kuchar, J.K. and Yang, L.C. A review of conflict detection and resolution modeling methods, IEEE Trans Intell Transp Syst, 2000, 1, (4), pp 179189, https://doi.org/10.1109/6979.898217.CrossRefGoogle Scholar
Egorov, M., Kuroda, V. and Sachs, P. Encounter aware flight planning in the unmanned airspace, 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS), Herndon, VA, USA, pp 115, 2019, https://doi.org/10.1109/ICNSURV.2019.8735399.CrossRefGoogle Scholar
Wang, R., Alligier, R., Allignol, C., Barnier, N., Durand, N. and Gondran, A. Cooperation of combinatorial solvers for en-route conflict resolution, Transp Res C: Emer Technol, 2020, 114, pp 3658, https://doi.org/10.1016/j.trc.2020.01.004.CrossRefGoogle Scholar
Gerdes, I., Temme, A. and Schultz, M. From free-route air traffic to an adapted dynamic main-flow system, Transp Res C: Emer Technol, 115, 2020, https://doi.org/10.1016/j.trc.2020.102633.CrossRefGoogle Scholar
Valavanis, K.P. The Entropy Based Approach to Modeling and Evaluating Autonomy and Intelligence of Robotic Systems. J Intell Robot Syst, 2018, 91, pp 722, https://doi.org/10.1007/s10846-018-0905-6.CrossRefGoogle Scholar
Huang, Y., Tang, J. and Lao, S. Collision Avoidance Method for Self-Organizing Unmanned Aerial Vehicle Flights. IEEE Access, 2019, 7, pp 8553685547, https://doi.org/10.1109/ACCESS.2019.2925633.CrossRefGoogle Scholar
International Civil Aviation Organization. Global Air Traffic Management Operational Concept. International Civil Aviation Organization, Doc 9854, 2005.Google Scholar
Federal Aviation Administration. Unmanned Aircraft System (UAS) Traffic Management (UTM) - Concept of Operations. U.S. Department of Transportation, Version 2.0, 2020.Google Scholar
Rios, J. Strategic deconfliction: System requirements. National Aeronautics and Space Administration, 2018.Google Scholar
Öreg, Zs., Shin, H. and Tsourdos, A. Traffic conflict reduction based on distributed stochastic task allocation. Aeronaut J, 2022, 126, (1300), pp 9931025, https://doi.org/10.1017/aer.2021.119.CrossRefGoogle Scholar
Öreg, Zs., Shin, H. and Tsourdos, A. On the underlying dynamics of traffic conflicts related to stochastic behaviour, Proc Inst Mech Eng G, 2022, https://doi.org/10.1177/09544100221117432.Google Scholar
Açikmeşe, B. and Bayard, D.S. Markov Chain approach to probabilistic guidance for swarms of autonomous agents, Asian J Cont, 2015, 17, (4), pp 11051124, https://doi.org/10.1002/asjc.982.CrossRefGoogle Scholar
Jang, I., Shin, H.-S. and Tsourdos, A. Local information-based control for probabilistic swarm distribution guidance. Swarm Intell, 2018, 12, pp 327359, https://doi.org/10.1007/s11721-018-0160-2.CrossRefGoogle Scholar
Yang, L., Han, K., Borst, C. and Mulder, M. Impact of aircraft speed heterogeneity on contingent flow control in 4D en-route operation. Transportation Research Part C: Emerging Technologies, 2020, 119, https://doi.org/10.1016/j.trc.2020.102746.CrossRefGoogle Scholar
Kacem, T., Barreto, A., Costa, P. and Wijesekera, D. Extending ADS-B for Mixed Urban Air Traffic. 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), 2018, https://doi.org/10.1109/DASC.2018.8569853.CrossRefGoogle Scholar
Sunil, E., Hoekstra, J., Ellerbroek, J., Bussink, F., Nieuwenhuisen, D., Vidosavljevic, A. and Kern, S. Metropolis: Relating airspace structure and capacity for extreme traffic densities, 11th USA/EUROPE Air Traffic Management R&D Seminar, 2015.Google Scholar
Kelly, W.E. Conflict detection and alerting for separation assurance systems, Gateway to the New Millennium. 18th Digital Avionics Systems Conference. Proceedings (Cat. No.99CH37033), Vol. 2, 1999, https://doi.org/10.1109/DASC.1999.821978.CrossRefGoogle Scholar
Tang, J., Zhu, F. and Piera, M.A. A causal encounter model of traffic collision avoidance system operations for safety assessment and advisory optimization in high-density airspace. Transp Res C: Emer Technol, 2018, 96, pp 347365, https://doi.org/10.1016/j.trc.2018.10.006.CrossRefGoogle Scholar
Mitici, M. and Blom, H.A.P. Mathematical models for air traffic conflict and collision probability estimation, IEEE Trans Intell Transp Syst, 2019, 20, (3), https://doi.org/10.1109/TITS.2018.2839344.CrossRefGoogle Scholar
Owen, M.P., Panken, A., Moss, R., Alvarez, L. and Leeper, C. ACAS Xu: Integrated collision avoidance and detect and avoid capability for UAS, 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), San Diego, CA, USA, 2019, https://doi.org/10.1109/DASC43569.2019.9081758.CrossRefGoogle Scholar
Alvarez, L.E., Jessen, I., Owen, M.P., Silbermann, J. and Wood, P. ACAS sXu: Robust decentralized detect and avoid for small unmanned aircraft systems, 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), San Diego, CA, USA, 2019, https://doi.org/10.1109/DASC43569.2019.9081631.CrossRefGoogle Scholar
Li, S., Egorov, M. and Kochenderfer, M.J. Optimizing Collision Avoidance in Dense Airspace using Deep Reinforcement Learning. Thirteenth USA/Europe Air Traffic Management Research and Development Seminar (ATM2019), Vienna, Austria, 2019, http://atmseminar.org/seminarContent/seminar13/papers/ATM_Seminar_2019_paper_65.pdf.Google Scholar
Bilimoria, K.D. A geometric optimization approach to aircraft conflict resolution, AIAA Guidance, Navigation, and Control Conference and Exhibit, 2000, https://doi.org/10.2514/6.2000-4265.CrossRefGoogle Scholar
van den Berg, J., Guy, S.J., Lin, M. and Manocha, D. Reciprocal n-body collision avoidance, Robot Res, 2011, https://doi.org/10.1007/978-3-642-19457-3_1.CrossRefGoogle Scholar
Zhong, Z. and Xuejun, Z. An improved geometric approach to conflict resolution in curve trajectory, 9th International Conference on Electronic Measurement & Instruments, 2009, https://doi.org/10.1109/ICEMI.2009.5274889.CrossRefGoogle Scholar
Rebollo, J.J., Ollero, A. and Maza, I. Collision avoidance among multiple aerial robots and other non-cooperative aircraft based on velocity planning, ROBOTICA 2007 - 7th Conference on Mobile Robots and Competitions, Portugal, 2007.Google Scholar
Wan, Y., Tang, J. and Lao, S. Research on the collision avoidance algorithm for fixed-wing UAVs based on maneuver coordination and planned trajectories prediction, Appl Sci, 2019, 9, (4), https://doi.org/10.3390/app9040798.CrossRefGoogle Scholar
Luongo, S., Di Vito, V. and Corraro, F. An advanced 3D algorithm for automatic separation assurance systems, 2012 20th Mediterranean Conference on Control & Automation (MED), Barcelona, pp 15721578, 2012, https://doi.org/10.1109/MED.2012.6265863.CrossRefGoogle Scholar
Constans, S., Fontaine, B. and Fondacci, R. Minimizing potential conflict quantity with speed control, Proceedings of the 4th EUROCONTROL Innovative Research Workshop, 6-8 December, Bretigny-sur-Orge, 2005.Google Scholar
Cecen, R.K. and Cetek, C. Conflict-free en-route operations with horizontal resolution manoeuvers using a heuristic algorithm, Aeronaut J, 2020, pp 119, https://doi.org/10.1017/aer.2020.5.Google Scholar
Mahjri, I., Dhraief, A., Belghith, A. and AlMogren, A.S. SLIDE: A straight line conflict detection and alerting algorithm for multiple unmanned aerial vehicles, IEEE Trans Mobile Comput, 2018, 17, (5), pp 11901203, https://doi.org/10.1109/TMC.2017.2750144.CrossRefGoogle Scholar
Wang, C.H.J., Tan, S.K. and Low, K.H. Collision risk management for non-cooperative UAS traffic in airport-restricted airspace with alert zones based on probabilistic conflict map, Transp Res C: Emer Technol, 2019, 109, pp 1939, https://doi.org/10.1016/j.trc.2019.09.017.CrossRefGoogle Scholar
Lin, Y. and Saripalli, S. Collision avoidance for UAVs using reachable sets, International Conference on Unmanned Aircraft Systems, ICUAS 2015, pp 226235, 2015, https://doi.org/10.1109/ICUAS.2015.7152295.CrossRefGoogle Scholar
Yang, Y., Zhang, J., Cai, K. and Prandini, M. Multi-aircraft conflict detection and resolution based on probabilistic reach sets, IEEE Trans Cont Syst Technol, 2017, 25, (1), pp 309316, https://doi.org/10.1109/TCST.2016.2542046.CrossRefGoogle Scholar
Ramasamy, S., Sabatini, R. and Gardi, A. A unified analytical framework for aircraft separation assurance and UAS sense-and-avoid, J Intell Robot Syst, 2018, 91, pp 735754, https://doi.org/10.1007/s10846-017-0661-z.CrossRefGoogle Scholar
Shi, L. and Wu, R. A probabilistic conflict detection algorithm in terminal area based on three-dimensional Brownian motion, 2012 IEEE 11th International Conference on Signal Processing, Beijing, pp 22872291, 2012, https://doi.org/10.1109/ICoSP.2012.6492037.CrossRefGoogle Scholar
Hao, S., Zhang, Y., Cheng, S., Liu, R. and Xing, Z. Probabilistic multi-aircraft conflict detection approach for trajectory-based operation. Transport Res C, 2018, 95, pp 698712, https://doi.org/10.1016/j.trc.2018.08.010.CrossRefGoogle Scholar
Hernández-Romero, E., Valenzuela, A., and Rivas, D. A probabilistic approach to measure aircraft conflict severity considering wind forecast uncertainty, Aerosp Sci Technol, 2019, 86, pp 401414, https://doi.org/10.1016/j.ast.2019.01.024.CrossRefGoogle Scholar
Hernández-Romero, E. Probabilistic aircraft conflict detection and resolution under the effects of weather uncertainty. PhD Thesis, Universidad de Sevilla, Sevilla, 2020, https://hdl.handle.net/11441/102299.CrossRefGoogle Scholar
Weinert, A., Campbell, S., Vela, A., Schuldt, D. and Kurucar, J. Well-clear recommendation for small unmanned aircraft systems based on unmitigated collision risk, J Air Transport, 2018, 26, (3), pp 113122, https://doi.org/10.2514/1.D0091.CrossRefGoogle Scholar
Lester, E.T. and Weinert, A. Three quantitative means to remain well clear for small UAS in the terminal area, 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS), Herndon, VA, USA, 2019, https://doi.org/10.1109/ICNSURV.2019.8735171.CrossRefGoogle Scholar
ASTM F3442/F3442M-20, Standard Specification for Detect and Avoid System Performance Requirements. ASTM International, West Conshohocken, PA, 2020, https://doi.org/10.1520/F3442_F3442M-20.CrossRefGoogle Scholar
Hayya, J., Armstrong, D. and Gressis, N. A Note on the Ratio of Two Normally Distributed Variables. Manag Sci, 1975, 21, (11), pp 13381341, https://doi.org/10.1287/mnsc.21.11.1338.CrossRefGoogle Scholar
Hinkley, D.V. On the ratio of two correlated normal random variables. Biometrika 56, 3, p. 635, 1969.CrossRefGoogle Scholar
Cedilnik, A., Košmelj, K. and Blejec, A. The distribution of the ratio of jointly normal variables, Metodološki zvezki, 2004, 1, (1), pp 99108.Google Scholar
Sigman, K. Lecture notes on simulation, 2010, http://www.columbia.edu/ ks20/4404-Sigman/4404-Notes-ITM.pdf.Google Scholar
Sun, J. The 1090 Megahertz Riddle - A Guide to Decoding Mode S and ADS-B Signals. TU Delft Open Publishing, 2020, https://mode-s.org/decode/book-the_1090mhz_riddle-junzi_sun.pdf.Google Scholar
Figure 0

Figure 1. The geometry of the scenario for which the conflict probabilities are calculated. The ownship and the intruder are flying in the same xy plane. Note that the figure is not to scale to help understanding.

Figure 1

Figure 2. The geometry of the conflict scenario for perpendicular velocities. The ownship and the intruder are flying in the same xy plane. Note that the figure is not to scale to help understanding.

Figure 2

Figure 3. Mean speed in Kn as a function of the exponential distribution parameter (a for the ownship and b for the intruder).

Figure 3

Figure 4. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for exponential distribution with $\rho = 1$ ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 4

Figure 5. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for exponential distribution with $\rho = 80$ ($a = 0.2$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 5

Figure 6. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for truncated exponential distribution with $\rho = 1$ ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 6

Figure 7. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for truncated exponential distribution with $\rho = 80$ ($a = 0.2$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 7

Figure 8. Sensitivity of geometric intrusion probability to changes in parameter ratio of exponential distribution with perpendicular intruder velocity ($\rho = 1$, $a = 0.0025$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$). As a function of relative azimuth angle, geometric intrusion probability is shown on the left axis, and sensitivity is shown on the right axis.

Figure 8

Figure 9. Sensitivity of geometric intrusion probability to changes in parameter ratio of exponential distribution with perpendicular intruder velocity ($\rho = 80$, $a = 0.2$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$). As a function of relative azimuth angle, geometric intrusion probability is shown on the left axis, and sensitivity is shown on the right axis.

Figure 9

Figure 10. Sensitivity of geometric intrusion probability to changes in parameters of truncated exponential distributions with perpendicular intruder velocity ($\rho = 1$, $a = 0.0025$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$). As a function of relative azimuth angle, geometric intrusion probability is shown on the left axis, and sensitivity is shown on the right axis.

Figure 10

Figure 11. Sensitivity of geometric intrusion probability to changes in parameters of truncated exponential distributions with perpendicular intruder velocity ($\rho = 80$, $a = 0.2$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$). As a function of relative azimuth angle, geometric intrusion probability is shown on the left axis, and sensitivity is shown on the right axis.

Figure 11

Figure 12. The geometry of the conflict scenario for parallel velocities. The ownship and the intruder are flying in the same xy plane. Note that the figure is not to scale to help understanding.

Figure 12

Figure 13. Polar plot showing the probability of geometric intrusion with equally likely perpendicular and parallel intruder velocities for full and truncated exponential distribution with $\rho = 1$ ($a = 0.0025$ and $b = 0.0025$, $\theta = \left\{ {\frac{\pi }{2},0, - \frac{\pi }{2},\pi } \right\}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 13

Figure 14. Polar plot showing the probability of geometric intrusion with equally likely perpendicular and parallel intruder velocities for full and truncated exponential distribution with $\rho = 80$ ($a = 0.2$ and $b = 0.0025$, $\theta = \left\{ {\frac{\pi }{2},0, - \frac{\pi }{2},\pi } \right\}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 14

Figure 15. Polar plot showing the probability of geometric intrusion for $\theta = \frac{\pi }{4}$, exponential distribution with $\rho = 80$ ($a = 0.2$ and $b = 0.0025$, $\theta = \frac{\pi }{4}$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 15

Figure 16. Polar plot showing the probability of geometric intrusion for $\theta = \frac{{3\pi }}{4}$, exponential distribution with $\rho = 1$ ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{{3\pi }}{4}$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 16

Figure 17. Polar plot showing the probability of geometric intrusion for $\theta = \frac{\pi }{4}$, truncated exponential distribution with $\rho = 80$ ($a = 0.2$ and $b = 0.0025$, $\theta = \frac{\pi }{4}$, $l = 15$, $u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 17

Figure 18. Polar plot showing the probability of geometric intrusion for $\theta = \frac{{3\pi }}{4}$, truncated exponential distribution with $\rho = 1$ ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{{3\pi }}{4}$, $l = 15$, $u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 18

Figure 19. Polar plot showing the probability of geometric intrusion for full and truncated exponential distribution with $\rho = 1$, averaged over all intrusion angles ($a = 0.0025$ and $b = 0.0025$, $l = 15$, $u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 19

Figure 20. Polar plot showing the upper and lower bounds for probability of speed intrusion, exponential distribution with $\rho = 1$, perpendicular intruder velocity ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, ${t_{{\rm{th}}}} = 60$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 20

Figure 21. Polar plot showing the upper and lower bounds for probability of speed intrusion, exponential distribution with $\rho = 80$, perpendicular intruder velocity ($a = 0.2$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, ${t_{{\rm{th}}}} = 60$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 21

Figure 22. Polar plot showing the upper and lower bounds for probability of speed intrusion, full and truncated exponential distribution with $\rho = 1$, perpendicular intruder velocity ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, ${t_{{\rm{th}}}} = 60$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 22

Figure 23. Polar plot showing the upper and lower bounds for probability of speed intrusion, full and truncated exponential distribution with $\rho = 80$, perpendicular intruder velocity ($a = 0.2$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, ${t_{{\rm{th}}}} = 60$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 23

Figure 24. Polar plot showing the upper and lower bounds for probability of speed intrusion, full and truncated exponential distribution with $\rho = 1$, intruder velocity angle $\frac{\pi }{4}$ ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{\pi }{4}$, ${t_{{\rm{th}}}} = 60$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 24

Figure 25. Polar plot showing the upper and lower bounds for probability of speed intrusion, full and truncated exponential distribution with $\rho = 1$, intruder velocity angle $\frac{{3\pi }}{4}$ ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{{3\pi }}{4}$, ${t_{{\rm{th}}}} = 60$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 25

Figure 26. Mean speed in Kn as a function of the normal distribution parameter ($\mu $ for the ownship and $\nu $ for the intruder).

Figure 26

Figure 27. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for full and truncated normal distribution with $\rho = 1$ ($\mu = 90$ and $\nu = 90$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 27

Figure 28. Polar plot showing the probability of geometric intrusion with intruder velocity angle $\pi /4$ for full and truncated normal distribution with $\rho = 1$ ($\mu = 90$ and $\nu = 90$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $\theta = \frac{\pi }{4}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 28

Figure 29. Polar plot showing the probability of geometric intrusion averaged over all possible intruder heading angles for full and truncated normal distribution with $\rho = 1$ ($\mu = 90$ and $\nu = 90$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 29

Figure 30. Polar plot showing the probability of geometric intrusion for perpendicular velocities for full normal distribution with $\rho = 1$ ($\mu = 90$ and $\nu = 90$, $l = 15,\;u = 180$) for a range of equal standard deviations. The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 30

Figure 31. Polar plot showing the probability of geometric intrusion for perpendicular velocities for full normal distribution with $\rho = 1$ ($\mu = 90$ and $\nu = 90$, $l = 15,\;u = 180$) for a range of mismatched standard deviations. The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 31

Figure 32. Polar plot showing the probability of geometric intrusion with intruder velocity angle $3\pi /4$ for full and truncated exponential distribution with $\rho = 1$ – comparison of analytical and numerical results ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{{3\pi }}{4}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 32

Figure 33. Polar plot showing the probability of geometric intrusion with intruder velocity angle $\pi /4$ for full and truncated normal distribution with $\rho = 1$ – comparison of analytical and numerical results ($\mu = 90$ and $\nu = 90$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $\theta = \frac{\pi }{4}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 33

Figure 34. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for exponential distribution with $\rho = 1$ – comparison of perturbed and nominal simulations ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, ${\sigma _v} = 10$, ${\sigma _\theta }{ = 5^ \circ }$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 34

Figure 35. Polar plot showing the probability of geometric intrusion with perpendicular intruder velocity for truncated exponential distribution with $\rho = 1$ – comparison of perturbed and nominal simulations ($a = 0.0025$ and $b = 0.0025$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$, ${\sigma _v} = 10$, ${\sigma _\theta }{ = 5^ \circ }$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 35

Figure 36. Polar plot showing the probability of geometric intrusion with perpendicular intrusion angle for full and truncated exponential and normal distributions with $\rho = 1$ – comparison of results for distributions with matching mean speeds ($a = 0.00422$ and $b = 0.00422$, $\mu = 88$, $\nu = 88$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 36

Figure 37. Polar plot showing the probability of geometric intrusion with perpendicular intrusion angle for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ($a = 0.125$ and $b = 0.00422$, $\mu = 15$, $\nu = 88$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 37

Figure 38. Polar plot showing the probability of speed intrusion with perpendicular intrusion angle for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ($a = 0.00422$ and $b = 0.00422$, $\mu = 88$, $\nu = 88$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 38

Figure 39. Polar plot showing the probability of speed intrusion with perpendicular intrusion angle for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ($a = 0.125$ and $b = 0.00422$, $\mu = 15$, $\nu = 88$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $\theta = \frac{\pi }{2}$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 39

Figure 40. Polar plot showing the probability of speed intrusion averaged over possible intrusion angles for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ($a = 0.00422$ and $b = 0.00422$, $\mu = 88$, $\nu = 88$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.

Figure 40

Figure 41. Polar plot showing the probability of speed intrusion averaged over possible intrusion angles for full and truncated exponential and normal distributions – comparison of results for distributions with matching mean speeds ($a = 0.125$ and $b = 0.00422$, $\mu = 15$, $\nu = 88$, ${\sigma _x} = 10$, ${\sigma _y} = 10$, $l = 15,\;u = 180$). The radius coordinate represents conflict probability magnitude, while the angle coordinate shows relative azimuth.