Abstract
Anomalous trajectory detection and traffic flow classification for complicated airspace are of vital importance to safety and efficiency analysis. Some researchers employed density-based unsupervised machine learning method to exploit these trajectories related to air traffic control (ATC) actions. However, the quality of position data and the tiny density difference between traffic flows in the terminal area make it particularly challenging. To alleviate these two challenges, this paper proposes a novel framework which combines robust deep auto-encoder (RDAE) model and density peak (DP) clustering algorithm. Specifically, the RDAE model is utilized to reconstruct denoising trajectory and identify anomaly trajectories in the terminal area by two different regularizations. Then, the nonlinear components captured by the encoder of RDAE are input in the DP algorithm to classify the global traffic flows. An experiment on a terminal airspace at Guangzhou Baiyun Airport (ZGGG) with anomaly label shows that the proposed combination can automatically capture non-conventional spatiotemporal traffic patterns in the aircraft movement. The superiority of RDAE and combination are also demonstrated by visualizing and quantitatively evaluating the experimental results.
The foreseen air traffic deman
Currently, several tactical initiatives on aircraft route focus on maintaining TMA situations, such as circumnavigation, holding, and direct fly. These tactical ATC actions can associate to the recorded ADS-B data. The actual trajectories that are composed of spatiotemporal points have different characteristics and meaning
In previous literature, anomaly detection based on clustering (ADCluster) identified nominal trajectories and regarded the rest not belonging to any cluster as anomalous flights. There were two main methods in the research of ADCluster. The first focused on clustering through statistical or priori features, such as the local average velocity of the trajectory, the density of the aircraft, and the distance between the aircraft and the reference poin
Gariel proposed the second widely used method for clustering trajectories at the level of position measurement. It consists of two well-differentiated steps. Firstly, principal component analysis (PCA) was used to eliminate redundant information on the resampling data. Secondly, density-based clustering algorithm (DBSCAN) identified anomalous trajectories and clustered them at the linear dimensionality reduced vector. The position-based data can be utilized to classify traffic flows in real tim
In spite of the good quality results, limitations in ADCluster with the position measurement have been pointed out in studie
Moreover, other research direction of the trajectory clustering has not been neglected. A state-of-the-art application by trajectory clustering is extracting the non-conventional pattern trajectories from the actual aircraft operations. Conde et al
Note that, there are two limitations in the trajectory clustering for the non-conventional traffic patterns: (1) Using the PCA method to reduce position data dimension will damage the necessary details. (2) DBSCAN-based methods are sensitive to the hyper-parameters when clustering the non-conventional traffic patterns. We further utilize the encoder of trained RDAE model as substitute for PCA method due to the preferable dimensionality reduction ability to extract key information. Then, a DP clustering algorithm is combining with RDAE encoder to classify the nominal trajectories and non-conventional tactical traffic flows simultaneously. The evaluation results show that the proposed framework of the combination of RDAE model and DP algorithm outperforms baseline models.
The aircraft trajectory dataset used in this paper is denoted as:. Each trajectory consists of a set of time and position ordered data, i.e. , where the time is and the measurements are .
The ADS-B data contain the following information: timestamp, flight number, departure airport, target airport, current location (using the longitude and latitude of WGS-84 coordinates), sea level altitude (m), heading, ground speed, and vertical speed. The experiment trajectory data come from the TMA of Guangzhou Baiyun Airport, and it is separated from the national flights data by the following methods.
First, the essence of the deep learning model is to construct a main traffic flow model in the terminal area through trajectory data. The actual trajectory timestamp cannot form traffic flows, so we shifttime so that the first time measurement in each trajectory is always at . Second, by the Mercator projection method with the center of the ZGGG runway, the latitude and longitude coordinates are converted into east‑north‑up (ENU) coordinates (represented by xyz). Finally, we intercepte trajectory points within a rectangle of and (the rectangle is greater than TMA). And the target airport of all trajectories is ZGGG. However, some aircraft do not update the target airport in time after landing, and the ADS-B receiver does not revise it when recording, so the intercepted data contain aircraft trajectories in other operation states. Therefore, for the intercepted data, a heuristic method is used to further distinguish the landing, takeoff, and overflying trajectories in the terminal airspace.
For each trajectory, we set the index of the closest point to the center of the runway as , and the index of the farthest point as . The time of the last measurement in the trajectory is , and the average descent speed is . The trajectory is then divided as:
Landing if
Takeoff if
Overflying if
The length of the runway at ZGGG airport is about 3 km, and the longest distance between the surrounding approach sector boundary and the runway center is about 100 km. This method works well with ADS-B data in Central South China.
For these three types of trajectories, the overflying aircraft have only a slight effect on the capacity in the terminal area. The departure aircraft use lots of performance on the initial climb process. Even if the terminal area capacity is limited due to the increased traffic complexity or severe weathers, the control methods of the departure aircraft are often limited to ground delay procedure (GDP) or pre-departure, and the probability of ocurrence of anomalous trajectories is extremely low.
In order to keep sustainable operations in the terminal area, the approaching aircraft are usually tactically controlled based on the standard procedure. The control behavior reflects the complexity of the airspac

Fig.1 ZGGG’s RNAV procedure for RWY 19/20L/20
For the part of the anomalous trajectory detection, the key criterion is the reconstruction error, which is related to the number of trajectories. Therefore, the time is divided equally to get the same amount of trajectory points. The other preprocessing is to scale each measurement by a standardization. The data set is restored and rescaled separately in each experiment to eliminate the effect of noise and anomalous trajectories on the remaining data. In the experiment of trajectory clustering, in order to clarify the difference between trajectories, Gariel’s strategy is duplicated to add three dimensions to each trajectory poin
where is the top left corner with coordinates of km. is the angular position in cylindrical coordinates.
This section outlines the steps of anomaly detection model and traffic flow classification. The steps are to reconstruct the trajectories, identify anomalies, and then cluster the rest trajectories.
There are multi-deficiencies with the trajectories in ADS-B data. First, the measurements are noisy. Second, the trajectories can have any number (including zero) measurements at a given time range. Third, trajectories have to share the same number of points. If we used linear interpolation to solve the third problem directly, the influence of noise would be increased. The deep auto-encoder (DAE) is widely used for denoising and anomaly detectio

Fig.2 Structure of standard DAE network
In the encoding stage, the input data X is compressed into the hidden layer h to eliminate outliers. The connection function follows the standard practic
(1) |
where is the weight connecting the input layer and the hidden layer and the bias of the input layer. Similarly, the decoding function is defined as
(2) |
where is the weight connecting the hidden layer and the output layer and the bias of the hidden layer. So, the objective function of DAE model is denoted as
(3) |
However, the DAE model needs to train clear data, which is difficult to achieve due to the error of the hardware system. Thus, the RDAE model is used to reconstruct the trajectories to smooth noisy data. In the RDAE model, the outlier S and the part of the input data LD that is well represented by the hidden layer model are separated into two parts: X=LD+S. The outlier S contains the noise and anomalous vectors that are difficult to reconstruct. Then, the RDAE model can execute denoising and anomaly detection through employing different regularization in the loss function. In order to sparse the noise as much as possible, the loss function should be set as the sum of the reconstruction error and the normalization term of the . But for the calculation reason, one can relax the combinatorial term of the optimization by replacing it with a convex relaxation . The objective function can be denoted as
(4) |
where is the Frobenius norm of a matrix. As the parameter of L1 is regularized, a smaller will promote more data to be isolated into S as noise, and therefore minimize the reconstruction error.
We construct the L1 to regularize RDAE (L1-RDAE) model. The number of input layer units and output layer units is the dimension of the data. The number of units in the middle of the hidden layer is determined by the method of eigen-dimensional estimation. The same value is selected for all input trajectories to maintain the consistency of denoising. We choose appropriate parameters in RDAE model that have the lowest reconstruction loss on the test data.

Fig.3 Trajectory reconstruction
The anomalous trajectories have different formats with the noise removed in Section 2.1. In

Fig.4 Visualization of noise and anomaly
The reconstructed trajectory data is processed to a matrix through linear interpolation. Each row has 75 equal time position points of a flight, and each column is the measurement value of the trajectory in time and spatial dimensions. Anomalous trajectories reflect aircraft behaviors caused by unhealthy airspac
(5) |
It can be regarded as a L2-norm regularizing member of each column, which amplifies the influence of anomalies in the group to make anomalous vectors obvious. Then L1 regularization is used between each row to reduce the anomalous vectors effect on low dimensional manifold, which enhances the robustness of the deep network. The anomalous trajectory data in this paper is reflected on the row vectors, so X needs to be transposed. The objective function is as follows
(6) |
However, the objective is not convex, and it is difficult to guarantee to converge the method to a global minimum. So we employ the block-wise soft-thresholding functio
(7) |
where is a group index, a within-group index, and the regularization parameter of the objective function L2,1. There are anomalous labels marked by the controller. We use false alarm rates to tune parameters.

Fig.5 Anomaly detection method based on RDAE
In fact, such a semi-supervised training method makes proper chosen according to the already pattern instances. Thus, the RDAE model trained on LD contains enough information to reconstruct the main traffic flows. Foreshadowing our results in Section 3.1, we note that the linear dimension reduction of PCA on the data may lead to insufficient trajectory details. Meanwhile, deep auto-encoder model can abstract low-dimensional codes that work much better than PCA as a tool to reduce the dimensionality of dat
DP algorithm is a recently published metho
First, the neighbors can be recognized by a soft threshold like the Gaussian kernel function or a hard threshold as defined in Eq.(8). In order to reduce the computational complexity, we employ a hard threshold to calculate the local density
(8) |
Suppose that a descending order represents the subscript order , that is: .
Second, the distance parameter of each data point is calculated, which is measured by the minimum distance between the point and other high-density points. However, the distance of the trajectory point with the highest density is the maximum value of its distance from all the other high-density points, that is
(9) |
Therefore, each point is given two quantities: Local density and distance. Points with high local density and distances far greater than the threshold (,) can be identified as density peaks or cluster centers. The cluster centers in non-conventional pattern should correspond to a small and a large . Thus, we can set the reasonable parameters to identify the non-conventional trajectories near the edge of the nominal trajectory data. After these density peaks are found, other points are assigned to the same cluster as their nearest neighbor of higher density.
By this way, DP method can cluster the data contained various densities, which is the weakness of the DBSCAN-cored clustering algorith
It is worth mentioning that the combination of RDAE+DP could improve the performance in the trajectory clustering. Due to the presence of two regularizations, the effect of noise and anomalous trajectories is constrained. Thus, there is a trend that the trajectory data would converge in the low-dimensional manifold, so that the non-conventional trajectories have higher density locally. This makes small clusters that are finely different from the classical data easier to be identified.

Fig.6 Trajectory clustering method based on RDAE+DP
We carried out our method on 524 real trajectories at the Guangzhou terminal airspace on 2019-06-16. Twenty-seven anomalous trajectory labels, marked by licensed controllers, were collected for evaluating the performance of our method. This is typical imbalance dataset in the binary classification. We used F1-score to verify the anomaly detection performance. Its definition is as follows
(10) |
where precision is the number of correct anomalous results divided by the number of all anomalous results identified by the algorithm of anomaly detection, and recall is the number of correct anomalous results divided by the number of all anomalous samples marked by controllers. A single high precision or recall cannot correctly reflect the anomaly detection performance. Thus, we visualized the optimal F1-score results of each algorithm to analyze the performance difference.
In the traffic flow classification, we used the same data set and selected the silhouette criterion (SC) value as the evaluation metrics. The SC value definition is as follows
(11) |
where is the mean distance between and all other data points in the same cluster, and the smallest mean distance of to all points in any other cluster.
In order to compare the RDAE performance in anomaly detection, we repeated Gariel’s strategy (PCA+ DBSCAN) and trained a standard deep auto-encoder (DAE) model that had the same structure with RDAE.

Fig.7 Anomaly detection results

Fig.8 Anomaly complementary set of two algorithms
However, there were three trajectories that still cannot be detected by RDAE. These trajectories are displayed in red in
The quantitative results for the dataset are shown in

Fig.9 Visualization of three algorithms
Although PCA+DBSCAN had the optimal performance in identifying anomalous trajectories (the optimal F1-score), the quantitative SC value was not the optimal result of the algorithm. The visualization is shown in
Compared with RDAE+DBSCAN, the RDAE+DP combination further improved the quantitative SC value, and separated non-conventional pattern (orange trajectories in
(1) The combination of RDAE and L1‑regularization can well eliminate the noise in trajectories, and it is easy to train. In fact, the performance of denoising can potentially be improved by the Huber loss function or L1/2‑regularizatio
(2) The method of combining L2,1‑regularization and RDAE can effectively identify the anomalous trajectories in the airspace. Compared with the PCA+DBSCAN and DAE algorithms, the method has 36% and 28% performance in F1-score.
(3) The RDAE model can simultaneously capture non-linear components containing sufficient details in trajectories, so that the combination with DBSCAN can accurately cluster all standard RNAV aircraft routes. The last but not least, the combination of RDAE+DP can identify both the non-conventional spatiotemporal patterns and the nominal trajectories, which could be further used to train machine learning techniques aiming at improving the state-of-the-art of tactical deconfliction and prediction algorithms.
Contributions Statement
Mr. DONG Xinfang complied the models, conducted the analysis, designed the study, interpreted the results and wrote the manuscript. Mr. LIU jixin contributed data, polished the manuscript. Mr. ZHANG Weining contributed model components, proposed revision opinion of manuscript and corrected structure of manuscript. Mr. ZHANG Minghua revised manuscript, contributed analysis criterion. Mr. JIANG Hao drew the Visio diagram. All authors commented on the manuscript draft and approved the submission.
Acknowledgements
This work was supported in part by the Foundation of Graduate Innovation Center in NUAA (kfjj20190707).
Conflict of Interest
The authors declare no competing interests.
References
International Air Transport Association. IATA forecasts passenger demand to double over 20 years[EB/OL]. (2016-10-18)[2020-06-12]. https://www.iata.org/en/pressroom/pr/2016-10-18-02/. [百度学术]
FENG Z. Shaping brand new future of civil aviation with intelligence[EB/OL]. (2019-05-17)[2020-06-12]. http://www.caac.gov.cn/en/XWZX/201905/t20190517_196228.html. [百度学术]
OLIVE X, MORIO J. Trajectory clustering of air traffic flows around airports[J]. Aerospace Science and Technology, 2019, 84: 776-781. [百度学术]
GALLEGO C E V, GOMEZ COMENDADOR V F, SAEZ NIETO F J, et al. Discussion on density-based clustering methods applied for automated identification of airspace flows[C]//Proceedings of 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC). London: IEEE, 2018: 1-10. [百度学术]
SALAUN E, GARIEL M, VELA A E, et al. Aircraft proximity maps based on data-driven flow modeling[J]. Journal of Guidance, Control, and Dynamics, 2012, 35(2): 563-577. [百度学术]
ECKSTEIN A. Automated flight track taxonomy for measuring benefits from performance based navigation[C]//Proceedings of 2009 Integrated Communications, Navigation and Surveillance Conference. Crystal City, VA, USA: IEEE, 2009: 1-12. [百度学术]
GARIEL M, SRIVASTAVA A N, FERON E. Trajectory clustering and an application to airspace monitoring[J]. IEEE Transactions on Intelligent Transportation Systems, 2011, 12(4): 1511-1524. [百度学术]
MURCA M C R, HANSMAN R J. Identification, characterization, and prediction of traffic flow patterns in multi-airport systems[J]. IEEE Transactions on Intelligent Transportation Systems, 2019, 20(5): 1683-1696. [百度学术]
BARRATT S T, KOCHENDERFER M J, BOYD S P. Learning probabilistic trajectory models of aircraft in terminal airspace from position data[J]. IEEE Transactions on Intelligent Transportation Systems, 2019, 20(9): 3536-3545. [百度学术]
ARNESON H, BOMBELLI A, SEGARRA-TORNE A, et al. Analysis of convective weather impact on pre-departure routing of flights from fort worth center to New York center[C]//Proceedings of NASA Center for AeroSpace Information (CASI). Hampton: NASA/Langley Research Center, 2017. [百度学术]
BOMBELLI A, SOLER L, TRUMBAUER E, et al. Strategic air traffic planning with fréchet distance aggregation and rerouting[J]. Journal of Guidance, Control, and Dynamics, 2017, 40(5): 1117-1129. [百度学术]
MARZUOLI A, GARIEL M, VELA A, et al. Data-based modeling and optimization of en route traffic[J]. Journal of Guidance, Control, and Dynamics, 2014, 37(6): 1930-1945. [百度学术]
NANDURI A, SHERRY L. Anomaly detection in aircraft data using recurrent neural networks (RNN)[C]//Proceedings of 2016 Integrated Communications Navigation and Surveillance (ICNS). [S.l.]: IEEE, 2016: 5C2-1-5C2-8. [百度学术]
MELNYK I, BANERJEE A, MATTHEWS B, et al. Semi-Markov switching vector autoregressive model-based anomaly detection in aviation systems[C]// Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. San Francisco, California, USA: Association for Computing Machinery, 2016: 1065-1074. [百度学术]
OLIVE X, BASORA L. Identifying anomalies in past en-route trajectories with clustering and anomaly detection methods[C]//Proceedings of ATM Seminar 2019. VIENNE, Austria: ATM, 2019. [百度学术]
CONDE R M M, DELAURA R, HANSMAN R J, et al. Trajectory clustering and classification for characterization of air traffic flows[C]//Proceedings of the 16th AIAA Aviation Technology, Integration, and Operations Conference. Washington, DC: American Institute of Aeronautics and Astronautics, 2016. [百度学术]
ANDRIENKO G, ANDRIENKO N, FUCHS G, et al. Clustering trajectories by relevant parts for air traffic analysis[J]. IEEE Transactions on Visualization and Computer Graphics, 2018, 24(1): 34-44. [百度学术]
CAAC. eAIP China[EB/OL]. [2020-06-12]. https://www.aischina.com/EN/indexEn.aspx. [百度学术]
ZHANG W, TAN X. Combining outlier detection and reconstruction error minimization for label noise reduction[C]//Proceedins of 2019 IEEE International Conference on Big Data and Smart Computing (BigComp). [S.l.]: IEEE, 2019: 1-4. [百度学术]
ZHANG W, WANG D, TAN X. Robust class-specific autoencoder for data cleaning and classification in the presence of label noise[J]. Neural Processing Letters, 2019, 50(2): 1845-1860. [百度学术]
LECUN Y, BENGIO Y, HINTON G. Deep learning[J]. Nature, 2015, 521(7553): 436-444. [百度学术]
HINTON G E, SALAKHUTDINOV R R. Reducing the dimensionality of data with neural networks[J]. Science, 2006, 313(5786): 504-507. [百度学术]
RODRIGUEZ A, LAIO A. Clustering by fast search and find of density peaks[J]. Science, 2014, 344(6191): 1492. [百度学术]
SCHUBERT E, SANDER J, ESTER M, et al. DBSCAN revisited, revisited: Why and how you should (still) use DBSCAN[J]. ACM Transactions Database System, 2017, 42(3): 1-19, 21. [百度学术]
OLIVE X, GRIGNARD J, DUBOT T, et al. Detecting controllers’ actions in past mode S data by autoencoder-based anomaly detection[C]//Proceedings of SESAR Innovation Days 2018. Salzburg, Austria: [s.n.], 2018. [百度学术]
XU Z, ZHANG H, WANG Y, et al. L1/2 regularization[J]. Science China Information Sciences, 2010, 53(6): 1159-1169. [百度学术]