<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Rena R. Timirgaleeva</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Air Navigation: The Classification of Airborne Vehicles in the Air Traffic Management System*</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Lomonosov Moscow State University</institution>
          ,
          <addr-line>Moscow</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>V.I. Vernadsky Crimean Federal University</institution>
          ,
          <addr-line>Simferopol</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1858</year>
      </pub-date>
      <volume>1</volume>
      <issue>2</issue>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The article considers the classification of airborne vehicles in the automated air traffic control system, which is essential for improving the level of air traffic safety. Proposed is a new method of airborne vehicles' classification which differs from the existing ones, as it is distinguished by integrated data processing from heterogeneous sources, formalizing the characteristics of airborne vehicles based on binary relationships and production models, the hierarchical structure of airborne vehicles' classification and the structural features of the singleton knowledge base. This article is the sequel to the earlier articles written by the authors on air navigation issues.</p>
      </abstract>
      <kwd-group>
        <kwd>airborne vehicles</kwd>
        <kwd>air traffic control system</kwd>
        <kwd>classification of airborne vehicles</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Over the recent years, there has been a considerable growth in the number and variety
of airborne vehicles used by various government departments, private companies, and
individuals to meet the needs of the state, business, leisure, etc. Primarily, this growth
is associated with the advent of unmanned aircraft (UMA).</p>
      <p>
        At the same time, the number of violations in using airspace is constantly growing
[
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Against this background, there has appeared a persistent tendency to cause
possible harm to civilian objects with airborne vehicles in peacetime, that is, the possible
terrorist use of airborne vehicles [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. This situation is especially acute in airport areas.
      </p>
      <p>Experts predict that the volume of the Russian market for UMA will have reached
about $ 35 billion by 2035. Therefore, unmanned aircraft currently pose the greatest
threat to civil aviation, as their owners try to take photos of airports or aircraft from an
unusual angle. However, they do not stop doing it despite their awareness that their
*
actions pose a real threat to the life and health of thousands of people and can cause
damage amounting to tens of millions of rubles.</p>
      <p>
        Specialists in protecting objects from airborne threats identify five types of problems
caused by UMA in territories free from military conflicts [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The first problem is
dangerous air miss with other airborne vehicles. The second problem is caused by flights
over areas where the use of aircraft is prohibited or inappropriate, for example, over
warehouses of combustibles and lubricants. The third problem is the criminal use of
UMA (transporting drugs and smuggling into or from airports). Another threat is the
collision of UMA with various buildings and structures at airports and adjacent
territories. The use of UMA to commit terrorist acts in airport areas is the fifth type of threat.
      </p>
      <p>Small-sized UMA (especially those of multicopter type) should be considered the
main threat to civil aviation. Even seemingly insignificant on-board equipment
weighing several hundred grams can cause considerable damage. Taking into account the fact
that average payload’s weight is from 10 to 30 percent of UMA’s total weight, it can
be concluded that UMA weighing from three to twenty kilograms present the main
threat nowadays.</p>
      <p>Consequently, low-altitude security is becoming increasingly important as an
element of the overall effective response to air threats. Various technical means are
currently used at airports for this purpose: fencing systems (fences, barriers), engineering
barriers (barbed wire, difficult-to-surmount barriers), perimeter security alarms
(passive and active infrared barriers, radio beam devices, and vibration-sensitive systems),
monitoring and surveillance systems (video cameras, night vision devices). In specific
cases, stationary or mobile technical inspection posts can be used as a means of
increasing the safety level and expanding the controlled areas outside airports’ outer security
zones.</p>
      <p>All these systems successfully fulfill their tasks. However, they are aimed
exclusively at neutralizing ground-based threats nowadays. Perimeter protection complexes
can be completely insulated even passing through places of inaccessible natural
formations (water areas or ravines). Alarm systems tend to have high sensitivity and a low
percentage of false positives. High-resolution radar stations and optoelectronic devices
located at points of technical observation can detect UMA within several kilometers.
However, these measures are no longer enough.</p>
      <p>Technical solutions to the problem of UMA’s intrusion consist of detection and
suppression/interception services. The most effective means of detecting UMA is
multisensor devices. Their functioning mode consists of processing signals from airborne
targets through optical, acoustic, thermal, and radiofrequency channels. The
combination of the characteristic features of a UMA in each of these channels creates its
signature, which allows the system to distinguish UMA from birds or other types of aircraft.
As soon as a target having the UMA signature is detected around the object in the near
airspace (up to 1 km), the system turns on the alarm signal and starts to record the
intrusion. A plan of further actions is developed by the airport security service: it can
be taking people to a safe place, calling the police, bringing in their rapid response
teams, or actively neutralizing the UMA. The UMA neutralization equipment is a block
of jamming in the radio frequency range used to control the UMA from the operator’s
panel. Having lost contact with its operator, either a UMA returns to the point of
departure or freezes hovering until its battery is discharged. Several UMA types can fly
autonomously, according to a pre-programmed flight mission. In this case, jamming
equipment from navigation satellites (GLONASS, GPS, Galileo) should be used.</p>
      <p>Currently, a sufficiently great number of means of UMA’s physical neutralization
are in development. These are UMA interceptors with nets and pneumatic grenade
launchers with nets inside their capsules. The prospects for the use of such means are
still unclear, since in the first case the constant on-site duty of an experienced pilot of
the UMA interceptors is required, and in the second case, the firing range of the
capsules does not exceed 100 meters. Regardless of which method of neutralization is
optimal from law and efficiency, ensuring low-altitude security is based on the timely
detection of UMA (UMA-detection). The radius of UMA detection can be significantly
increased if, in addition to the multisensor devices servicing the internal areas of the
territory, airports are equipped with special radars. The radars tuned to detect
exclusively UMA and having a range from 1 to 5 km can effectively protect airspace in
airport areas. Equipping such systems with radio-frequency sensors will allow not only
detecting UMA but also detecting the location of the intruding UMA’s operator with
the help of the triangulation method. The UMA operators’ detention is the most
preferred countermeasure in the airport area since jamming systems of radio and GPS
signals are radiating facilities. Hence, their use at airports can lead to disruption of the
navigation equipment of air traffic control services.</p>
      <p>All the tackled problems also indicate the imperfection of legal acts in the field of
airspace use. Also, one of the causes of violations of the rules for the use of airspace is
the problem of the timely and correct classification of airborne vehicles (AV) including
UMA.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Main part</title>
      <p>
        The reliability of AV’s identification and further classification is determined by the
degree of data formalization and the quality of information about these vehicles’ current
behavior, their characteristics, the recognition process performed by experts, as well as
other information needed to manage and control the airspace. Heterogeneous features
are characterized by various types of metric evidence, reliability, rate of renewal, nature
of changes, degree of mutual dependence, etc. The qualitative nature and uncertainty
of some of the information features are eliminated by detailing or transformation on
appropriate scales [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        The feature information is characterized by stochastic and linguistic uncertainty [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
The vagueness of information about airborne intruders is stochastic due to their
intention not to reveal their planned actions using different types of interference, inaccurate
measurements of AV parameters, poor quality of communication channels, etc. The use
of technical parlance in the air traffic management service is the reason for the linguistic
uncertainty of phrases in the decision-making process for airspace control. To describe
many different situations in the air, the operator uses a limited number of words and
phrases whose meanings are sometimes inaccurate, ambiguous, and incomplete.
      </p>
      <p>
        The situational dynamism, a great number of features, and, accordingly, their
possible disagreements, heterogeneity, uncertainty and incompleteness in the description of
AV classes, data heterogeneity and the uncertainty of the classification process itself
are often ignored while using traditional methods to formalize information about the air
situation [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        To identify an AV posing a threat, the cognitive approaches, in particular, fuzzy
measures and sets are used. All AV features are represented by a basic linguistic or
fuzzy variable and a generalizing linguistic variable corresponding to the production
model and the formation of the knowledge base in the form of a set of linguistic
variables [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. However, this approach is more characteristic of a slowly changing air
situation.
      </p>
      <p>Attempts to present non-random information received from random sources lead to
an uncertain decision on the classification of AV since most of AV features are
formalized based on determinism. Fuzzy sets are used in case it is impossible to present
information on AV using traditional methods. Fuzziness is described by fuzzy set adjectives.
Given the rather uncertain nature of the information, the multi-signature method of AV
can be used.</p>
      <p>The currently adopted AV classification system does not allow for unambiguous
determination of threat risks. To do this, it is necessary to determine the classification
levels, the alphabet for AV classes, the list, and the information content of each class’s
features, i.e. the formation and formalization of AV reference features in a specific
knowledge base.</p>
      <p>The stage of processing information about the air situation, assessing its reliability,
and forming AV current features precedes the stage of AV classification. Therefore, it
is possible to find an effective solution to the problem of identifying AV, if image
recognition methods and expert systems based on the automated collection and joint
processing of information from various sources are used:
 radar stations of radio engineering units of the Armed Forces of the Russian
Federation, including those providing recognition of AV classes and types;
 survey route radar systems of the Unified Air Traffic Management System of the</p>
      <p>Russian Federation;
 means of the Unified System of State Radar Identification of the Russian Federation;
 secondary radar equipment of domestic and international air traffic control systems;
 means of automatic independent airspace monitoring;
 radio engineering and electronic intelligence systems;
 sighting and command transmission stations that are part of command radio control
aviation lines;
 means of planning the airspace use located at the centers of the Unified Air Traffic</p>
      <p>Management System of the Russian Federation;
 means, complexes, and systems of communication with AV.</p>
      <p>The above-mentioned sources provide the following information and identification
features:
 AV positioning data;
 data on the nationality of AV equipped with defendants of the state recognition
system;
 individual or flight numbers;
 AV classes and types;
 data on the jamming environment (no interference; active interference; passive
interference; combined interference);
 data on the situation on board the aircraft (does not suffer a disaster; suffers a
disaster; the pilot has been injured; equipment failure; loss of orientation; fire; combat
damage; the attack on the crew);
 AV quantitative composition;
 data on the AV location concerning the state border of the Russian Federation or the
boundaries of restricted access facilities (does not violate; is in dangerous proximity;
violates);
 planning and dispatch information.</p>
      <p>Certain types of information and identification features can be assigned and entered
into a complex of automation tools for controlling the use of airspace directly by the
complex’s operators.</p>
      <p>The procedure of AV classification according to the degree of «danger» includes the
following three stages:
 forming and dynamic updating knowledge bases of airspace control systems
containing the information necessary to determine AV categories, first of all, the
description of images of various AV categories;
 joint processing and generalization of positioning, flight, and individual features, as
well as other information about AV, received from sources of various physical nature
and serving various purposes;
 defining AV categories (actually the AV classification by the degree of their
«danger»).</p>
      <p>The knowledge bases formed at the first stage depend on the level of the airspace
control system and can include data on consolidated daily flight plans, changes and
supplements to it, the airspace structure, prohibitions and restrictions on its use, AV
individual numbers and relevant data on each of them, various trajectory and
signal-trajectory features, as well as other data necessary for determining AV categories.</p>
      <p>Joint processing and generalization of information from various sources are aimed
at creating a unique integrated image of every AV with the corresponding identification
features. The determination of AV categories is carried out following the established
regulations for every vehicle based on the information received about it and the
information stored in knowledge bases.</p>
      <p>Initially, the obtained positioning and flight data are identified with the daily flight
plan. This process may take some time (depending on the degree of automation and
reliability of the estimated information). Until a decision is made on whether the AV
belongs to the scheduled ones, such a vehicle is considered unidentified.</p>
      <p>If an AV is identified as «scheduled», then it is checked whether it follows the
established flight modes. This check is conducted according to the algorithms of
complexes of automation means of airspace use control. If the value of the controlled flight
parameters is exceeded, the AV’s «scheduled» category is changed to the «flight mode
violator» category. All airborne vehicles that are not identified with the plan are then
analyzed to define their possible belonging to unscheduled AV or those, which
dominate objectives.</p>
      <p>For objects that do not belong to any of the above-mentioned categories, the presence
of a response signal is checked according to the system of state affiliation, the
possibility of violating the state border or the boundaries of restricted access facilities is
assessed, and aircraft belonging to the armed forces of foreign states are established.
Depending on the presence or absence of these features, an airborne vehicle is either
assigned one of these categories: «potentially dangerous AV», «border violator», «air
enemy», or is considered unidentified. An AV having completely passed all the
identification procedures is assigned an index and a unique number following the updated
identification system.</p>
      <p>
        The main requirements for the AV classification are as follows [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]:
 conformity of the formalized description of AV data to the mathematical class
model;
 completeness and consistency of formalized data regarding the AV classification;
 obtaining results within a given time interval;
 the openness of the decision support system;
 the ability to use data from external sources of information.
      </p>
      <p>There exist the information and cognitive approaches to formalize the decision-making
processes.</p>
      <p>
        The information approach is justified in systems designed to work under typical
conditions, when the operator has enough time for an in-depth analysis of the situation and
decision-making, and the computer saves information and is an auxiliary tool for
evaluating solutions [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        The cognitive approach is used in guidance systems characterized by a high degree
of adaptability to external conditions. Therefore, knowledge representation is one of
the main tasks in vehicles’ classifications [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Formal or informal models are used to
represent knowledge. The formal models are based on rigorous mathematical theory.
Each informal model is developed for a specific knowledge domain. Conclusions in
informal systems are largely subjective. The main methods of knowledge
representation are based on the logical, frame, and production models, neural or semantic
networks. The formalization of decision-making tasks in AV classification is characterized
by incomplete or inaccurate information, that is, uncertainty. It is proposed to use the
theory of fuzzy sets to take into account the uncertainty of information.
      </p>
      <p>According to the analysis, the production models are most suitable for the tasks of
AV classification. In general, products are threefold: &lt;product name&gt; &lt;condition ()&gt;
&lt;expression ()&gt;. Products are close to the logical models and allow organizing
effective output procedures on them. They reflect knowledge more clearly than the other
models. The absence of strict restrictions makes it possible to change the interpretation
of product elements.</p>
      <p>Decision-making based on the principle of the causal relationship between
informational features and the result can be described in a natural language and formalized as
a set of logical statements. The class of a vehicle is obtained using logical inference
mechanisms based on:
 fuzzy production rules;
 multi-criteria selection algorithms;
 use case and choice by analogy (fuzzy recognition of situations).</p>
      <p>The decision on AV classification consists in the comparison of the current values of
the observed vehicle’s properties with the reference pattern. For this purpose, the degree
of similarity or the distance between the vehicles is calculated. The AV’s
correspondence to a certain a priori class is chosen according to the rule: the sum of the distances
from a certain class S* to all the other classes Si is minimal. The similarity measures
proposed by Lukasevich, Tanimoto, etc. are used to determine the degree of similarity.
However, sometimes it is problematic to use the selection method by analogy to solve
the problem of classifying AV with incomplete information due to a change in the
number of obtained features over time. The difference between the features’ current
dimension and the reference pattern does not allow comparison. But the selection method by
analogy in combination with other methods provided that there is sufficient information
to make a decision can bring good results in AV classification.</p>
      <p>It is proposed to use a combined approach for the formal presentation of knowledge
according to the AV classification: fuzzy production models with a developed output
instrument, models with deterministic logical inference based on ordinary Boolean
logic and the use of the selection method by analogy. This requires the development of
two logical inference mechanisms – the deterministic one and the one under fuzzy
conditions, namely:
 justifying the inference mechanism ensuring the formation of proposals for
automated decision-making with insufficient information;
 synthesizing the mathematical description of AV classes by comparing the reference
and current values of features, determining AV classes according to the chosen
proximity criterion or using selected inference mechanisms;
 assessing the degree of conformity of the obtained AV classes developed at the
conceptualization stage.</p>
      <p>
        To describe the behavior of an AV, it is proposed to use the following group of features:
 the spatial position of the vehicle;
 the composition of the planning and dispatching information for the AV;
 the AV’s controllability from the ground;
 the availability and composition of visual information about the AV;
 current information according to the primary location data;
 trajectory information.
We intend to describe each class of AV with its own set of quantitative and qualitative
features [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ]. Quantitative features can be evaluated and quantified against each
other. Qualitative features allow for a semantic description of vehicles’ properties.
According to the degree of significance, the features will be divided into groups, and AV
will be classified separately for each group based on experimental data or expert
estimates. Features are represented in binary space by dichotomizing data in each group
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Dichotomization is a sequential decomposition of the generalized feature Ai into the
space of partial ij, in which each partial feature is represented in binary form («1» or
«0»). This corresponds to the unit value of the membership function (singleton). The
partial features ij of an AV’s behavior are collected in groups Ai according to their
types or sources. This approach allows switching from linguistic variables in the
knowledge base to Boolean ones, i.e. defining them in a single dimensionless metric
knowledge base.</p>
      <p>The information features describing AV’s behavior are as follows:
 A1 – spatial position (11 on the route, 12 near borders or prohibited areas, 13 in
prohibited areas, 14 in areas not listed above);
 A2 – scheduled dispatch information (21 there is planned information about AV, 22
there is no planned information about AV, 23 there is planned information
indicating violation, 24 there is planned information from the military dispatcher);
 A3 – controllability from the ground (31 there is communication, the crew executes
commands, 32 there is communication, the crew does not execute commands, 33
there is no communication);
 A4 – trajectory features (41 high-speed AV, 42 low-speed AV, 43 maneuvering
AV, 44 with constant motion parameters, 45 AV at low altitude, 46 AV at high
altitude);
 A5 – interference features (51 AV interferes, 52 AV does not interfere).
The information features of recognition and secondary location are as follows:
 A6 – responds in the RBS system (61 in A mode, 62 in C mode, 63 in the 1st mode,
64 in the 2nd mode, 65 response code 7500, 66 response code 7600, 67 response
code 7700, 68 responds with the alarm signal, 69 response codes 7711-7717,
77217727, 610 does not answer in the RBS systems);
 A7 – the ASDE system’s data (71 decision was not made, 72 unknown, 73
interceptor, 74 of particular importance, 75 friend, 76 simulated enemy, 77 jammer of
the simulated enemy, 78 enemy, 79 jammer, 710 suspicious AV).</p>
      <p>We represent the AV classification procedure in the form of a graph, where ij are
features, mn is the AV’s class, i is the group of features, j is the current number of
features in the group, m is the classification level, n is the current class number at this
level.</p>
      <p>The binary feature of space allows creating a matrix of correspondence of
features and indices of AV affiliations (knowledge matrix) and then switching from
linguistic variables in the knowledge base to Boolean ones.</p>
      <p>The incompleteness of information on AV sometimes does not allow unambiguous
identification of such vehicles. That is, it is necessary to expand the list of indices and
automate the process of making appropriate decisions based on the available
information. We introduce such a hierarchical system of the levels of AV classification.</p>
      <p>According to the degree of threat and the need for action taken by the air traffic
services concerning a specific AV (the first level):
 regular situation: no additional actions by officials of the air traffic control
authorities are needed;
 activities by the competent authorities are not needed; additional attention or
additional information is needed;
 •equired is an immediate set of measures taken by the appropriate authorities.
At the second level, AV is identified by their affiliation. At the third level, AV is
identified by the main features (that is, they are assigned the current indices of affiliation).
The fourth level is the identification of AV by additional features.</p>
      <p>Some mn classes are determined automatically by deterministic features, others have
a probabilistic or fuzzy character, and still others are formed by operators based on
nonformalized data:
 according to the degree of threat (11 air target, 12 air danger, 13 AV needs
attention, 14 ordinary AV, 15 unidentified AV);
 according to AV’s affiliation (21 friend, 22 foe, 23 neutral, 24 military, 25
civilian, 26 unidentified);
 according to the main features (31 AV with a recognition signal, 32 AV violating
the state border, 33 AV on request, 34 AV violating the procedure for using
airspace, 35 enemy, 36 AV without a recognition signal);
 according to additional features (41 friendly interceptor, 42 responds in the 3rd
mode, 43 aircraft number in the RBS system, 44 responds in the 40D system, 45
responds in the RBS system, 46 jammer, 47 training target, 47 control target, 49
«friend» response, 410 AV constituting a plausible threat, 411 AV constituting a
confirmed threat, 412 AV’s nationality).</p>
      <sec id="sec-2-1">
        <title>Thus, the introduced hierarchical classification system of AV allows:</title>
        <p> identifying hazardous AV requiring special attention at the first level;
 comparing the existing legal system of AV classification according to affiliation
indices with modern requirements for the definition of AV classes;
 ensuring the unambiguous conversion of data on AV classes in the data exchange on
the air situation with neighboring states.</p>
        <p>The large-dimensional matrix is used to unambiguously compare the available features
of the proposed AV classes. To reduce its dimensionality and to compare AV’s
behavior features with affiliation indices, the corresponding inference equations are proposed
for each of the classification levels.</p>
        <p>The ij features can be entered automatically by the program simultaneously with
the formation of records or after the initial data processing by operators:
 1j are formed according to the results of calculating the distance to the
corresponding areas, the border line and comparison with the limit values;
 2j are entered manually or are formed by comparing the entered estimated
information with the response codes in the RBS system (21) or comparing the estimated
information with the current radar (23);
 3j can only be entered manually according to the notification of the air traffic
authorities (33 is generated automatically when the 66 feature is received);
 4j are generated automatically according to the analysis of motion parameters
according to radar observation data;
 51 is entered manually or automatically when accompanied by a jammer using the
triangulation method;
 6j are generated automatically according to the results of radar recognition (features
61, 62, 61-67, 69 – according to the data in the RBS system, features 63, 64,
68, 610 – according to the data in the 40D system).</p>
      </sec>
      <sec id="sec-2-2">
        <title>The features for the classification of airborne vehicles are as follows:</title>
        <p> received automatically (11, 12, 13, 21, 22, 23, 24);
 entered manually (31, 32, 33, 51, 34, 410, 411, 41, 42, 43, 44, 45, 46, 51,</p>
        <p>A6, A7).
 7j features are obtained through data exchange lines with the ASDE system.
The following methods are used to obtain features automatically:
 11, 21-23 – the automated «correlation plan – track» procedure;
 12, 13 – calculation of distances to areas and boundaries;
 41-44 – according to the secondary processing of radar information;
 45, 46, A6 – according to the data of radar observation through the channels of the
primary and/or secondary radar;
 51 – passive radar systems experience the influence of active interference sources
(concerning passive jammers, a feature can be entered only semi-automatically);
 A7 – conversion of ASDE message formats to the corresponding class formats.
Features carry objective and determinate data from the moment they are received or
need additional actions and checking overtime to gain confidence.</p>
        <p>The determinate features 31-33, A6 are objective and unambiguous, 12, 41-46
need an initial definition of threshold indicators for designating them as deterministic.</p>
        <p>Features of probabilistic confidence need other information elements to make it
comprehensive: comparing current radar information with estimated information (21-24),
secondary processing algorithms’ sensitivity to maneuvers (43, 44), etc. That is, the
decision on AV depends on the quality of information and the degree of its
dependability.</p>
        <p>The information on the air situation in terms of its composition and content includes
the value of AV’s positioning in space and the parameters of their movement
(positioning information about AV), as well as semantic (meaningful) information about AV
and the air situation as a whole.</p>
        <p>The semantic information about AV includes:
 the feature of defining AV’s state or departmental affiliation;
 AV’s affiliation index;
 AV’s type (class);
 features of AV’s actions (presence of maneuvering and its type, jamming and its
type, etc.);
 the quantitative composition of a separate group of vehicles.</p>
        <p>The processing of various kinds of data (trajectory (positioning) obtained through state
recognition channels, secondary (flight) location, estimation, dispatching, and
notification) becomes semantically relevant.</p>
        <p>
          As the analysis of publications shows, the problem of assessing the quality of data,
especially semantic data, for AV classification, has not been completely solved yet. The
methods for assessing the quality of radar data to determine the location of air targets
are best known [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. The quality of radar data, divided into coordinate and
non-coordinate, is usually assessed by completeness, accuracy, reliability, and efficiency.
        </p>
        <p>To correctly determine an AV’s location, the coordinate radar data will have the
degree of accuracy to solve the problem to the specified probability. The pace of
obtaining radar data should be consistent with the control cycle and allow solving the
problem taking into account the time delay for data.</p>
        <p>Non-coordinate information is evaluated by only one qualitative indicator –
reliability, as a measure of the available data’s correspondence to the facts. The reliability of
the data used during decision-making determines the probability of a correct decision.</p>
        <p>To identify airborne threats, a comprehensive assessment of the quality of radar data
is necessary, which is based on partial indicators (completeness, accuracy, reliability)
and temporal indicators.</p>
        <p>
          The most difficult task is to assess the information’s completeness. So, the following
indicator [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] can be used to decide on the recognition of situations:
        </p>
        <p>Q
Y   i  Ri Ti ,</p>
        <p>i1
in which Q is the number of features; i is the coefficient of the feature’s importance;
Ri is the indicator showing the reliability of the results of AV’s detection; Ti is the
indicator of the efficiency of AV’s detection.</p>
        <p>This formula takes into account all the features used in recognition. However, this
approach cannot provide an adequate assessment of the completeness of AV
classification. Therefore, the assessment of completeness should not equal to the total number of
features, but the correspondence of features to characteristic features allowing AV’s
unambiguous classification. Therefore, in further studies, it is necessary to determine
the reference composition of features for each class of AV and the measure of the
available data’s proximity to the standard of comparison.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusion</title>
      <p>The formalization of features’ description of airborne vehicles is based on the principle
of determinism. The proposed method of forming the set of features of airborne vehicles
includes the definition of the generalized features of airborne vehicles’ behavior, their
dichotomization, and the definition of a reference set of features for each class of
airborne vehicles. The correspondence matrix of features and airborne vehicles’ affiliation
indices is formed in the binary space of features. This allows switching from linguistic
variables in the knowledge base to Boolean ones.</p>
      <p>Proposed is the hierarchical four-level classification system of airborne vehicles. The
introduced classification system allows identifying hazardous airborne vehicles that
need operators’ special attention and comparing the existing system of airborne
vehicles’ classification by affiliation indices with the modern requirements for determining
air targets’ classes.</p>
      <p>Acknowledgment</p>
      <p>The reported study was funded by RFBR, project number 19-29-06081.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <article-title>Ministerstvo transporta Rossijskoj Federacii ROSTRANSNADZOR</article-title>
          .
          <article-title>Official website. Kolichestvo narushenij poryadka ispol'zovaniya vozdushnogo prostranstva Rossijskoj Federacii v 2018 godu</article-title>
          . [Electronic source]. - URL: https://avia.rostransnadzor.ru/podnadzornye/aon/kolichestvo-narushenij
          <string-name>
            <surname>-</surname>
          </string-name>
          poryadka-isp. - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <article-title>Ministerstvo transporta Rossijskoj Federacii ROSAVIACIYA</article-title>
          .
          <article-title>Official website. Informaciya o sostoyanii bezopasnosti polyotov vozdushnyh sudov aviacii obshchego naznacheniya v 2006 - 2015 godah</article-title>
          . [Electronic source]. - URL: https://www.favt.ru/ novosti-aktualnaja-informacija?id=
          <fpage>2620</fpage>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Rudnickij</surname>
          </string-name>
          , Dyuk.
          <article-title>Osnovnye principy postroeniya biometricheskih sistem preduprezhdeniya nesankcionirovannogo ispol'zovaniya vozdushnyh sudov</article-title>
          .
          <source>Trudy SPIIRAN, (4)</source>
          ,
          <fpage>405</fpage>
          -
          <lpage>415</lpage>
          . https://doi.org/10.15622/sp.4.
          <fpage>30</fpage>
          - In Russian.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Osipov</surname>
          </string-name>
          , V. Y.,
          <string-name>
            <surname>Yusupov</surname>
            ,
            <given-names>R. M.</given-names>
          </string-name>
          <article-title>Informacionnyj vandalizm, kriminal i terrorizm kak sovremennye ugrozy obshchestvu</article-title>
          .
          <source>Trudy SPIIRAN, (8)</source>
          ,
          <fpage>34</fpage>
          -
          <lpage>45</lpage>
          . https://doi.org/10.15622/sp.8.
          <fpage>2</fpage>
          -
          <string-name>
            <given-names>In</given-names>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Orlov</surname>
            <given-names>A. I.</given-names>
          </string-name>
          <article-title>Teoriya prinyatiya reshenij</article-title>
          . Moscow : Ekzamen Publ.,
          <year>2006</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Rotshtejn</surname>
            <given-names>A. P.</given-names>
          </string-name>
          <string-name>
            <surname>Intellektual</surname>
          </string-name>
          <article-title>'nye tekhnologii identifikacii: nechyotkie mnozhestva, geneticheskie algoritmy, nejronnye seti</article-title>
          . Vinnica : UNIVERSUM Publ.,
          <year>1999</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Yarushek</surname>
            <given-names>V. E.</given-names>
          </string-name>
          et al.,
          <article-title>Teoreticheskie osnovy avtomatizacii processov vyrabotki reshenij v sistemah upravleniya</article-title>
          .
          <source>Har'kov : HVU Publ.</source>
          ,
          <year>1993</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Korolyov</surname>
            <given-names>S. A.</given-names>
          </string-name>
          <article-title>Takticheskaya podgotovka</article-title>
          . Kurs «
          <article-title>Taktika vojskovoj PVO VS RF»</article-title>
          . Moscow : MIET Publ.,
          <year>2001</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Bondarev</surname>
            <given-names>A. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ade</surname>
            <given-names>F. G.</given-names>
          </string-name>
          <article-title>Iskusstvennyj intellekt</article-title>
          . Sevastopol' : SevNTU Publ.,
          <year>2002</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Popov</surname>
            <given-names>E. V.</given-names>
          </string-name>
          <article-title>Iskusstvennyj intellekt</article-title>
          .
          <source>Moscow : Radio i svyaz'</source>
          ,
          <year>1990</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Tu</given-names>
            <surname>Dzh</surname>
          </string-name>
          .,
          <string-name>
            <surname>Gonsales</surname>
            <given-names>R</given-names>
          </string-name>
          .
          <article-title>Principy raspoznavaniya obrazov: transl</article-title>
          .
          <source>from English</source>
          , Moscow : Mir Publ.,
          <year>1978</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>Dzharratano</given-names>
            <surname>Dzh</surname>
          </string-name>
          .,
          <string-name>
            <surname>Rajli</surname>
            <given-names>G</given-names>
          </string-name>
          .
          <article-title>Ekspertnye sistemy</article-title>
          .
          <source>Principy razrabotki i programmirovanie</source>
          ,
          <source>Vil'yams</source>
          ,
          <year>2007</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Panasyuk</surname>
            <given-names>Y. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pudovkin</surname>
            <given-names>A. P.</given-names>
          </string-name>
          ,
          <article-title>Obrabotka radiolokacionnoj informacii v radiotekhnicheskih sistemah, Tambov : FGBOU VPO «TGTU» Publ</article-title>
          .,
          <year>2016</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Berdyshev</surname>
            <given-names>V. P.</given-names>
          </string-name>
          <string-name>
            <surname>Radiolokacionnye</surname>
            <given-names>sistemy</given-names>
          </string-name>
          , Krasnoyarsk : SFU Publ.,
          <year>2012</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Zubyuk</surname>
            <given-names>A. V.</given-names>
          </string-name>
          <article-title>Novyj podhod k specifichnosti vozmozhnostnykh mer i ego rol' v teorii prinyatiya reshenij</article-title>
          .
          <source>DOI: 10</source>
          .30826/
          <string-name>
            <surname>IDP201806 MGU imeni M. V. Lomonosova</surname>
          </string-name>
          , Moscow,
          <year>2018</year>
          . - In
          <string-name>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Ganzha</surname>
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oskorbin</surname>
            <given-names>N.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khvalynsky</surname>
            <given-names>D.S.</given-names>
          </string-name>
          <string-name>
            <surname>Making</surname>
          </string-name>
          and
          <article-title>Implementing Decisions in the Economic System with Eliminated Uncertainty</article-title>
          , Altai State University,
          <year>2015</year>
          , DOI: 10.14258/izvasu(
          <year>2015</year>
          )
          <article-title>1</article-title>
          .
          <fpage>1</fpage>
          -25 - In Russian.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Projdakov</surname>
            <given-names>E. M.</given-names>
          </string-name>
          <article-title>Sovremennoe sostoyanie iskusstvennogo intellekta</article-title>
          ,
          <source>DOI: 10</source>
          .31249/scis/
          <year>2018</year>
          .00.
          <fpage>09</fpage>
          - In Russian.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. Zhong
          <string-name>
            <surname>Z.F.</surname>
          </string-name>
          “
          <article-title>Overview of recent developments in modelling and simulations for analyses of airspace structures and traffic flows”</article-title>
          ,
          <source>Advances in Mechanical Engineering</source>
          , vol.
          <volume>10</volume>
          (
          <issue>2</issue>
          ), Feb.
          <year>2018</year>
          , article number 1687814017753911.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Kistan</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gardy</surname>
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Sabatini</surname>
            <given-names>R.</given-names>
          </string-name>
          <article-title>“Machine Learning and Cognitive Ergonomics in Air Traffic Management: Recent Developments and Considerations for Certification”</article-title>
          ,
          <source>Aerospace</source>
          , vol.
          <volume>5</volume>
          (
          <issue>4</issue>
          ), Dec.
          <year>2018</year>
          , article number 103.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Tian</surname>
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dai</surname>
            <given-names>X.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Hu</surname>
            <given-names>M. “</given-names>
          </string-name>
          <article-title>Spreading system congestion in the airspace network”</article-title>
          , Mathematical Problems in Engineering,
          <year>2018</year>
          , article number 7171486.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Wang</surname>
            <given-names>H.</given-names>
          </string-name>
          , Song
          <string-name>
            <given-names>Z.</given-names>
            and
            <surname>Wen</surname>
          </string-name>
          <string-name>
            <surname>R.</surname>
          </string-name>
          “
          <article-title>Modeling Air Traffic Situation Complexity with a Dynamic Weighted Network Approach”</article-title>
          ,
          <source>Journal of Advanced Transportation</source>
          ,
          <year>2018</year>
          , article number UNSP 5254289.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Timofeev</surname>
            <given-names>A. V.</given-names>
          </string-name>
          <article-title>Teoriya i modelirovanie geterogennyh polinomial'nyh nejronnyh setej</article-title>
          .
          <source>Trudy SPIIRAN, (4)</source>
          ,
          <fpage>73</fpage>
          -
          <lpage>86</lpage>
          . https://doi.org/10.15622/sp.4.
          <fpage>4</fpage>
          -
          <string-name>
            <given-names>In</given-names>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Kosovskaya</surname>
          </string-name>
          , T. M.
          <article-title>Nekotorye zadachi iskusstvennogo intellekta, dopuskayushchie formalizaciyu na yazyke ischisleniya predikatov, i ocenki chisla shagov ih resheniya</article-title>
          .
          <source>Trudy SPIIRAN</source>
          ,
          <volume>3</volume>
          (
          <issue>14</issue>
          ),
          <fpage>58</fpage>
          -
          <lpage>75</lpage>
          . https://doi.org/10.15622/sp.14.4 -
          <string-name>
            <given-names>In</given-names>
            <surname>Russian</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>