<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Processing of Flight Information based on Approximation with Analytical Connections</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Lubomyr Huzar ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>300</fpage>
      <lpage>308</lpage>
      <abstract>
        <p>The conflict of airships is understood as their convergence in space and time, during which there is a violation of the specified minimum separation distance (echeloning). An increase in the intensity of flights inevitably leads to an increase in conflicts between airships. The minimum separation distance between aircraft is determined by their protective spatial zone with regulated geometry. Thanks to the proposed mathematical and software, it became possible to reduce the protective space zone and thereby reduce the minimum permissible interval between aircraft and increase flight safety, as well as to optimize the structure of airspace to improve throughput and thereby increase flight safety.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Traffic safety</kwd>
        <kwd>data processing</kwd>
        <kwd>risks assessment</kwd>
        <kwd>operation system</kwd>
        <kwd>air navigation system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The relevance of maintaining traffic safety in
the aeronautical environment is consistently high.
It is caused by several processes accompanying
the development of aviation technologies [1–4].</p>
      <p>
        The intensity of air traffic is growing
exponentially (5–6% per year). An increase in
traffic leads to an increase in the frequency of
delays. Air traffic safety is based on methods and
algorithms for detecting and preventing conflict
situations [5, 6]. For this purpose, there is a need
to improve the existing air traffic control systems
on the route and improve the algorithms of their
functioning. Modern concepts are aimed at
increasing the safety of flights, providing aircraft
with the ability to fly within clearly defined
airspace along arbitrary routes [7]. However, they
do not fully satisfy the modern requirements of air
traffic safety, as they do not ensure full autonomy
of aircraft movement, and reliable resolution of
conflict situations in the airspace is not performed
[
        <xref ref-type="bibr" rid="ref7">8, 9</xref>
        ]. There is an acute problem in improving the
algorithmic maintenance of the future
aeronavigation system on a safe and effective basis [
        <xref ref-type="bibr" rid="ref10 ref11 ref2 ref3 ref4 ref6 ref8 ref9">10
–13</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Statement of the Problem</title>
      <p>
        The analysis of available sources of
information shows that the existing concepts
related to flight autonomy, such as Free Flight,
A3, TCAS, S&amp;A, ADS-B, and ASAS are
imperfect. This is because systems of this level are
multi-faceted complex systems with a hierarchical
organization scheme, which contains technical,
organizational, informational, management,
socio-technical and energetic components. These
concepts can solve only partial problems of air
traffic safety. The results of recent research
revealed certain existing shortcomings and
limitations of these concepts in the
implementation of autonomous flight [
        <xref ref-type="bibr" rid="ref12 ref13 ref14">14–16</xref>
        ].
      </p>
      <p>
        Eurocontrol has formulated a strategy for the
development of the air traffic organization for the
coming decades. An important role is given to the
development of new principles of air traffic
management and airspace organization [
        <xref ref-type="bibr" rid="ref15">17</xref>
        ].
      </p>
      <p>
        The technology of self-organizing systems is
currently considered the only technology capable
of offering adequate methods, architecture, and
instrumental support for the software
implementation of the most complex modern
systems. This technology has great prospects, first
of all, about systems that are characterized by
openness, large dimensions, the autonomy of its
component subsystems and their network
organization, as well as mobility [
        <xref ref-type="bibr" rid="ref16">18</xref>
        ].
      </p>
      <p>
        It can be said that the process of
selforganization of the system confirms that the
effectiveness of rational and purposeful actions is
weakening, the organization itself “creates” itself,
sometimes opposing conscious leadership.
Research into the processes of self-organization
provides an opportunity not only to identify the
mechanism of autonomous cyclical self-support
but also to find an opportunity to start this
mechanism [
        <xref ref-type="bibr" rid="ref17 ref18">19, 20</xref>
        ].
      </p>
      <p>
        Let’s consider a special case when two planes
in the airspace have to pass each other at a safe
distance. For this case, an analogy can be drawn
with connected pendulums that can move freely at
the same height. We impose a condition or “bind”
two bodies not rigidly, but so that they cannot
touch each other. At the same time, it is also not
necessary that the bodies do not diverge over a
long distance (that is, the plane remains on its
route) [
        <xref ref-type="bibr" rid="ref19">21</xref>
        ].
      </p>
      <p>
        The goal is to improve the mathematical and
software of the automated aircraft traffic control
system in terms of conflict prevention in
autonomous flight conditions [
        <xref ref-type="bibr" rid="ref20">22</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Materials and Methods</title>
      <p>The task is to find mathematically two
harmonics for the case when the lengths of the
pendulums are the same. As an example of linear
oscillators with nonlinear coupling, consider the
equation
where the quadratic terms on the right-hand side
describe the relationship.</p>
      <p>Let the deviation of one pendulum be x, and
the other—y, as shown in Fig. 1. In the absence of
a spring, the gravitational force acting on the first
pendulum is proportional to its deflection. If there
were no spring here, then a certain natural
frequency ω0 would appear for one pendulum,
and the equation of motion, in this case, would
take the form</p>
      <p>The second pendulum, in the absence of
spring, would swing exactly like the first.
However, in the presence of a spring, in addition
to the restoring force arising as a result of gravity,
there is an additional force from the spring that
tends to “pull” the pendulums. This force depends
on the excess of deviation x over deviation y and
is proportional to their difference, that is, it is
equal to some constant, dependent only on the
geometry, multiplied by (x-y). The same force,
but in the opposite direction, acts on the second
pendulum. Therefore, the equations of motion that
we must solve will be as follows:
(3)
(4)
(1)
(2)</p>
      <p>To find the motion at which both pendulums
oscillate at the same frequency, we must
determine how much each of them deviates. In
other words, pendulum A and pendulum B will
oscillate with the same frequency and with certain
amplitudes of A and B, the ratio of which is fixed.
Let’s check how suitable this solution is:
x=Aeiωt
y=Beiωt.</p>
      <p>If we substitute it into equation (1) and add
similar terms, we get
(5)</p>
      <p>When deriving these equations, we reduced the
common factor eiωt and divided everything by m.
Now we see that we have two equations for what
would seem to be two unknowns. However, in
reality, there are no two unknowns here, because
the general scales of motion cannot be found in
these equations. They can only give us the ratio of
A to B, and both equations must give the same
value. The requirement that the equations be
consistent with each other requires the frequency:
it must be something very special.</p>
      <p>But finding the frequency in this particular
case is quite easy. If we multiply both equations,
we get</p>
      <p>On both sides, the product AB can be
truncated, except when either A or B is zero,
which means no motion at all. But if there is
movement, then other coefficients must be equal
to each other, which leads to a quadratic equation.
As a result, two possible frequencies are obtained:
і</p>
      <p>Moreover, if we substitute these values of
frequencies again in equation (5), then for the first
frequency we will get A = B, that is, the spring
will not stretch at all and both pendulums oscillate
with the frequency ω0, as if there was no spring at
all. In another solution, when A = -B, the spring
increases the restoring force, and the frequency
increases.</p>
      <p>
        This problem was solved in stochastics by
referring to H. Haken (he is the founder of the
synergistic approach in the deterministic
formulation of the problem) [
        <xref ref-type="bibr" rid="ref21">23</xref>
        ], but we decided
to take into account the stochasticity of the
process.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Results and Discussion</title>
      <p>As a result of modeling the movement of
pendulums in the ideal case, in the absence of
noise, interference, and other distortions, we have
the following curves (Fig. 2a). But in real life, a
system of connected moving objects is exposed to
various types of disturbances. In addition, there
are always errors in the measurements of the
movement parameters of these objects. This is
reflected in the curves (Fig. 2b).
a b
Figure 2: An example of stochastic oscillations of pendulums with different SLEs of noise: a)
deterministic foundations; b) a real signal, which includes a deterministic basis and noises.</p>
      <p>We will perform wavelet filtering of the
amplitudes of stochastic pendulums taking into
account the analytical relationships between their
determined bases to increase the accuracy of data
evaluation.</p>
      <p>To filter the parameters of mathematical
pendulums by classical and proposed (taking into
account analytical connections between their
deterministic bases) methods, we use a
multiscale analysis with a biorthogonal spline wavelet
of the eighth order as a basis function.</p>
      <p>Based on B-splines, several biorthogonal bases
of bursts are constructed. For example, the scaling
function and the Malla-Zong burst are defined in
terms of their Fourier transforms as follows:</p>
      <p>The smoothing function (t) and the
wavelet function ψ (t) are shown in Fig. 3.</p>
      <p>Note that in the case of biorthogonal bursts,
different filters must be used for forward and
reverse transformation.</p>
      <p>The function for calculating the coefficients of
wavelet filters for stochastic pendulums, taking
into account the linear relationship between them,
has the form:
where is the coefficient of the
low-frequency wavelet filter (Low); λ—is a
weighting factor characterizing the rigidity of the
analytical connection; y—input readings of the
signal; —oscillation frequency of the first
pendulum; α—is the weight coefficient of the
equation of motion of the first pendulum (4).</p>
      <p>We will conduct statistical modeling and build
a comparative table of filtering by the classic and
proposed methods (Table 1). We can see that the
accuracy advantage of the new method is many
times higher than that of the classical method. The
accuracy indicators of flight data measurement do
not deteriorate, but on the contrary, improve.</p>
      <p>To find the optimal coefficients, we will
compile the following system of equations:</p>
      <p>We will conduct statistical modeling and build
a comparative table of filtering by the classic and
proposed methods (Table 1). We can see that the
accuracy advantage of the new method is many
times higher than that of the classical method. The
accuracy indicators of flight data measurement do
not deteriorate, but on the contrary, improve.</p>
      <p>As evidenced by the data presented in Table 1,
the advantage in filtering the accuracy of the first
pendulum by the created method is 26–28 percent
compared to the classical filtering method. At the
same time, the accuracy of filtering the second
pendulum by the developed method is 50–59
percent higher than the accuracy of the classical
filtering method.</p>
      <p>Let’s graphically display the results of
modeling the dependence of the Root mean square
deviation deviation (RMS) of the filtered signal
relative to its deterministic base on the mean
square deviation deviation of the input noise (in
the range from 0.1 to 0.25) for both pendulums
(Fig. 7)
m.s.
d.of the
input
signal
where: 1—the MSD of the filtered signal from the
deterministic base of the pendulum oscillation,
obtained by the classical filtering method; 2—
MSD of the filtered signal from the deterministic
basis of the pendulum oscillation, obtained by the
proposed filtering method.</p>
      <p>Analysis of graphs of functions in Fig. 7 shows
that the proposed mathematical and software
allows significant gain in reducing the SLE of the
filtered signal. The first graphic window displays
the results of the accuracy assessment of data
filtering of the first pendulum, and the second
graphic window shows the results of the second
pendulum.</p>
      <p>One of the design variations of conflict
detection algorithms is the shape and size of the
“protected zone”. The protected zone is actually
defined by the threshold values used in the
conflict detection logic. That is, mathematical
models of three-dimensional volumes, as a rule,
are not supported in real-time implementations.</p>
      <p>Rather, airspace volumes serve as conceptually
useful concepts for understanding the logic of
conflict detection.</p>
      <p>
        A “flattened spheroid” is a mathematically
convenient shape for a protected zone. This
volume is usually obtained by considering some
vertical division as equivalent to some horizontal
division [
        <xref ref-type="bibr" rid="ref22">24</xref>
        ].
      </p>
      <p>For example, in cruise flight, a vertical
deviation of 1,000 feet may be considered the
equivalent of five miles of horizontal separation.</p>
      <p>Vertical units are simply scaled to the equivalent
horizontal division.</p>
      <p>This is mathematically convenient, since a
single value can be calculated to characterize the
separation between two aircraft. Fig. 9 illustrates
a “flattened spheroid”.
criteria in both axes are checked separately. Fig.
10 illustrates the conceptual scope that results
from this scheme. Five miles of zonal separation
and 1000 feet of vertical separation are still
appropriate examples of separation parameters.</p>
      <p>Although the braided spheroid is mathematically
simpler, the cylindrical shielded zone has the
advantage of being consistent with existing
separation criteria used today. In addition, it is
most likely a division of the airspace that
corresponds more to the perception of the pilots.</p>
      <p>The RTCA CD&amp;R working group aims to
simultaneously use two protected zones for each
aircraft—the Protected Airspace Zone (PAZ) and
the Near Mid-Air Collision (NMAC) zone. The
PAZ would define the desired airspace separation
standards. For example, a criterion of five miles
per 1,000 feet would define a PAZ. The NMAC
zone is intended for tighter closure of the aircraft.</p>
      <p>A smaller protected zone can be used to generate
high-level notifications.</p>
      <p>A “cylindrical” protected zone is another
common shape used in conflict detection
algorithms. For this protected zone, the separation</p>
      <p>Thanks to the developed mathematical and
software, it became possible to reduce the
protective space zone (Fig. 11) and thereby reduce
the minimum permissible interval between
aircraft and increase flight safety.</p>
      <p>The expected increase in air traffic density, a
change in the dynamics of the relative movement
of aircraft and a decrease in echeloning norms
increases the probability of dangerous
convergence of aircraft. Under these conditions,
the role of systems for detecting and preventing
potentially conflict situations is growing
significantly.
1—for stochastic formulation of the problem; 2—
after classic filtering; 3—after the suggested
filtering.</p>
      <p>An important role is given to the development of
new principles of air traffic management and
airspace organization, which are designed to
ensure high throughput of the route network and
the ability to fly on the most efficient trajectories
with a guaranteed level of safety.</p>
      <p>The aircraft monitors the current flight path of the
aircraft from the point of view of possible
conflicts. (In practice, the automatic ASAS
function will monitor all relevant traffic and alert
the flight crew of any conflicts. The bottom line is
that the flight crew is responsible for separation
from all aircraft, so the aircraft, not the ground
systems or the controller must detect conflicts.)
The aircraft entity adjusts its flight path as
necessary to resolve any conflict, avoiding loss of
separation with any other aircraft as a result of a
change in trajectory.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>An increase in the intensity of flights
inevitably leads to an increase in conflicts
between airships. A conflict of airships means
such a convergence of them in space and time,
during which there is a violation of the specified
minimums of separation distance (echeloning).
The minimum separation distance between
aircraft is determined by their protective spatial
zone with regulated geometry.</p>
      <p>The possibility of using already existing
methods of processing results, as well as the
characteristic features of the behavior of wavelet
transformation in the time-frequency domain
allow to significantly expand and supplement the
capabilities of such systems. It can be concluded
that the wavelet transformation taking into
account analytical connections provides a more
accurate and informative picture of the results of
simulation and experiment. Allows you to better
clean the input data of the movement of the
aircraft from noise and random distortions.</p>
      <p>Thanks to the proposed mathematical and
software, it became possible to reduce the
protective space zone and thereby reduce the
minimum permissible interval between aircraft
and increase flight safety, as well as to optimize
the structure of airspace in order to improve
throughput and thereby increase flight safety.
6. References</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Chepizhenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Volkohon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>FAA Announces</given-names>
            <surname>Automatic Dependent Surveillance-Broadcast Architecture</surname>
          </string-name>
          (Press release),
          <source>FAA Office of Public Affairs. July 1 - 2002. APA 27-02</source>
          .
          <fpage>Retrieved2011</fpage>
          -02-21.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>doi:10</source>
          .15421/431511
          <string-name>
            <given-names>V.</given-names>
            <surname>Shutko</surname>
          </string-name>
          , et al.,
          <source>Application of SplineFourier Transform for Radar Signal Processing, IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)</source>
          , Polyana, Ukraine,
          <year>2019</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>doi:10</source>
          .1109/CADSM.
          <year>2019</year>
          .8779279
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          , et al.,
          <article-title>Shadow Image Processing of X-Ray Screening System for Aviation Security</article-title>
          ,
          <string-name>
            <given-names>Int. J. Image</given-names>
            <surname>Grs</surname>
          </string-name>
          .
          <source>Signal Process</source>
          .
          <volume>14</volume>
          (
          <issue>6</issue>
          ) (
          <year>2022</year>
          )
          <fpage>26</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>doi:10</source>
          .5815/ijigsp.
          <year>2022</year>
          .
          <volume>06</volume>
          .03
          <string-name>
            <given-names>M.</given-names>
            <surname>Kuhn</surname>
          </string-name>
          , K. Johnson, Applied Predictive Modeling, Springer, New York,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Marais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <article-title>Aircraft Positioning Using Multiple Distance Measurements</article-title>
          and
          <string-name>
            <given-names>Spline</given-names>
            <surname>Prediction</surname>
          </string-name>
          , Aviation,
          <volume>26</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>doi:10</source>
          .3846/aviation.
          <year>2022</year>
          .16589
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <article-title>Statistical Analysis and Flight Route Extraction from Automatic Dependent SurveillanceBroadcast Data, Integrated Communications Navigation</article-title>
          and Surveillance Conference, Dulles, USA,
          <year>2022</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICNS54818.
          <year>2022</year>
          .9771515
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Zuiev</surname>
          </string-name>
          , Radioelectronic Equipment Availability Factor Models,
          <source>Signal Processing Symposium (SPS)</source>
          , Serock, Poland,
          <year>2013</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          . doi:
          <volume>10</volume>
          .1109/SPS.
          <year>2013</year>
          .6623616
          <string-name>
            <given-names>J.</given-names>
            <surname>Al-Azzeh</surname>
          </string-name>
          , et al.,
          <source>A Method of Accuracy Increment Using Segmented Regression, Algorithms</source>
          <volume>15</volume>
          (
          <issue>10</issue>
          ):
          <volume>378</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .3390/a15100378
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior, Int. J. Comput. Network Inf. Secur</source>
          .
          <volume>12</volume>
          (
          <issue>6</issue>
          ) (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2020</year>
          .
          <volume>06</volume>
          .01
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Brzhevska</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of the Process of Information Transfer from the Source-toUser in Terms of Information Impact, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3188</volume>
          (
          <year>2021</year>
          )
          <fpage>257</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Kipchuk</surname>
          </string-name>
          , et al.,
          <source>Assessing Approaches of IT Infrastructure Audit, in: IEEE 8th International Conference on Problems of Infocommunications, Science and Technology</source>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1109/picst54195.
          <year>2021</year>
          .9772181
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security Rating Metrics for Distributed Wireless Systems</article-title>
          ,
          <source>in: Workshop of the 8th International Conference on “Mathematics. Information Technologies. Education:” Modern Machine Learning Technologies and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dyvak</surname>
          </string-name>
          , et al.,
          <source>Mathematical Modeling of the Estimation Process of Functioning Efficiency Level of Information WebResources, 10th International Conference on Advanced Computer Information Technologies</source>
          ,
          <year>2020</year>
          ,
          <fpage>492</fpage>
          -
          <lpage>496</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACIT49673.
          <year>2020</year>
          .
          <volume>9208846</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ji</surname>
          </string-name>
          , Y. Mou,
          <source>Research on the Feasibility of Application of Millimeter-wave Security Screening Equipment in Civil Aviation</source>
          ,
          <source>2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology</source>
          ,
          <year>2021</year>
          ,
          <fpage>71</fpage>
          -
          <lpage>75</lpage>
          , doi: 10.1109/ICCASIT53235.
          <year>2021</year>
          .9633747
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Semenov</surname>
          </string-name>
          , Aviation Security Equipment, Kyiv: NAU,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [16]
          <string-name>
            <surname>D. Anderson</surname>
          </string-name>
          ,
          <article-title>Optimising Multi-layered Security Screening</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Transp</surname>
          </string-name>
          . Secur.
          <volume>14</volume>
          (
          <year>2021</year>
          )
          <fpage>249</fpage>
          -
          <lpage>273</lpage>
          . doi:
          <volume>10</volume>
          .1007/s12198-021- 00237-3
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>K.</given-names>
            <surname>Leone</surname>
          </string-name>
          ,
          <source>Security System Throughput Modeling, 36th Annual 2002 International Carnahan Conference on Security Technology</source>
          ,
          <year>2002</year>
          ,
          <fpage>144</fpage>
          -
          <lpage>150</lpage>
          . doi:
          <volume>10</volume>
          .1109/CCST.
          <year>2002</year>
          .1049240
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Almazroui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          , G. Zhang, Imaging Technologies in Aviation Security,
          <source>European J. Appl. Sci. 3</source>
          (
          <issue>4</issue>
          ) (
          <year>2015</year>
          )
          <fpage>12</fpage>
          -
          <lpage>27</lpage>
          . doi:
          <volume>10</volume>
          .14738/aivp.34.1433
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>J. Skorupski P.</given-names>
            <surname>Uchroński</surname>
          </string-name>
          ,
          <article-title>A Human Being as a Part of the Security Control System at the Airport</article-title>
          , Procedia Eng.
          <volume>134</volume>
          (
          <year>2016</year>
          )
          <fpage>291</fpage>
          -
          <lpage>300</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.proeng.
          <year>2016</year>
          .
          <volume>01</volume>
          .010
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et al.,
          <source>Data Processing Method for Deterioration Detection during Radio Equipment Operation</source>
          ,
          <source>2019 IEEE Microwave Theory and Techniques in Wireless Communications</source>
          ,
          <year>2019</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi:10.1109/MTTW.
          <year>2019</year>
          .8897232
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>V.</given-names>
            <surname>Cutler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Paddock</surname>
          </string-name>
          ,
          <article-title>Use of Threat Image Projection (TIP) to Enhance Security Performance</article-title>
          ,
          <source>43rd Annual 2009 International Carnahan Conference on Security Technology</source>
          ,
          <year>2009</year>
          ,
          <fpage>46</fpage>
          -
          <lpage>51</lpage>
          . doi:
          <volume>10</volume>
          .1109/CCST.
          <year>2009</year>
          .5335565
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>O.</given-names>
            <surname>Shcherbyna</surname>
          </string-name>
          et al.,
          <article-title>Diagnostic Process Efficiency Analysis for Block Diagram of Electric Field Parameters Meter</article-title>
          ,
          <source>IEEE XII International Conference on Electronics and Information Technologies</source>
          ,
          <year>2021</year>
          ,
          <fpage>5</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1109/ELIT53502.
          <year>2021</year>
          .9501136
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>M.</given-names>
            <surname>Eby</surname>
          </string-name>
          , W. Kelly,
          <article-title>Free Flight Separation Assurance Using Distributed Algorithms</article-title>
          , IEEE Aerospace Conference, Snowmass, CO,
          <year>March 1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shutko</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Two-Dimensional Spectral Detector for Baggage Inspection X-Ray</surname>
            <given-names>System</given-names>
          </string-name>
          ,
          <source>CEUR Workshop Proceedings</source>
          ,
          <volume>2300</volume>
          (
          <year>2018</year>
          )
          <fpage>63</fpage>
          -
          <lpage>66</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>