160 likes | 394 Views
Applying Knowledge Representation to Runway Incursion. csci477 – Senior Design Capstone Class FAA Airport Design Competition for Universities Spring, 2007. The Problem of Runway Safety/Runway Incursion. Airports are complicated places with many safety requirements.
E N D
Applying Knowledge Representation to Runway Incursion csci477 – Senior Design Capstone Class FAA Airport Design Competition for Universities Spring, 2007
The Problem of Runway Safety/Runway Incursion • Airports are complicated places with many safety requirements. • How do they manage safety? • How are they held accountable? • Can airports be designed to be safer? • In particular, there are many techniques to mitigate the incursion risks found at airports. • How are airports made aware of them? • Which are most effective? • Real-time incursion detection and recovery is a critical function of air-traffic control. • What techniques are available? • How can new techniques be introduced to airports?
The Technology Challenge • Can the information required to answer the questions raised by the previous slide be captured and used by computers? • Yes, use an AI Knowledge Representation (KR) system. • So, tools to aid in airport design, and real-time intrusion detection and recovery can be based on a KR system? • Yes. • Will such a system be able to justify its decisions with explanations? • Yes.
USC Incursion Mitigation (USC-IM) Client Airport Designer USC Incursion Mitigation System Airport Info Rules Risks Coverages InfoGathering Risk Analysis Mitigation Synthesis Mitigation Techniques Incursion Risks Incursion Mitigations Incursion Mitigation Plan
Demo • Give one when we have one to give.
USC-IM Solution • A KR solution to programming intelligent systems • A Software Agent solution to programming cooperative behavior
Passenger Strategy Call Ambulence(150) Airport Strategy 1 Redirect Traffic-Plan 1 Incursion Alert Flash Stop Sign Coverage Design InfoGathering Risk Analysis Policy Synthesis Planner USC-IM Add Strategy OK Airport Strategy 1 Redirect Traffic-Plan 1 Incursion Alert Flash Stop Sign Passenger Strategy Call Ambulance Capacity 150
LAX – Commercial Airport Flights: 3000/day Runway 7 – Mixed use Mitigation Design InfoGathering Risk Analysis Mitigation Synthesis LAX USC-IM Add Info Airport Strategy 1 Redirect Traffic-Plan 1 Incursion Alert Flash Stop Sign Passenger Strategy Call Ambulance Capacity 150 OK LAX – Commercial Airport Flights: 3000/day Runway 7 – Mixed use
Mitigation Design InfoGathering Risk Analysis Mitigation Synthesis LAX USC-IM -Risk Analysis Runway Airport Interruption Risk; Airplane Property Risk Airplane Cargo Risk OK Rule: Having a mixed use runway means an Airport Interruption Risk. Airport Strategy 1 Redirect Traffic-Plan 1 Incursion Alert Flash Stop Sign Passenger Strategy Call Ambulance Capacity 150 Rule: Having airplanes means a Property Risk. LAX: Runway Airport Interruption Risk Airplane Property Risk Airplane Cargo Risk LAX – Commercial Airport Flights: 3000/day Runway 7 – Mixed use Rule: Airplanes with cargo and passengers means a Cargo Passenger Risk.
Mitigation Design InfoGathering Risk Analysis Mitigation Synthesis Nation Oil USC-IM Policy Match OK Airport Strategy 1 Redirect Traffic-Plan 1 Incursion Alert Flash Stop Sign Passenger Strategy Call Ambulance Capacity 150 LAX: Runway Airport Interruption Risk Airplane Property Risk Airplane Cargo Risk LAX – Commercial Airport Flights: 3000/day Runway 7 – Mixed use LAX:l Airport Strategy 1 ll Passenger Strategy l
Real-Time Incursion Detection and Recovery • Same model (with concepts about airplane, trucks, etc. having positions, moving on surfaces, etc. • Rules about incursions: If a plane is moving on a mixed-use runway, and another vehicle is on a surface that crosses it, then you have a Possible-Collision Risk. • Find mitigation instances for the risk, sort them for relevance, and present them.
Accountability • Systems should know what’s going on. • Inferences can be traced and explained. • People hate systems that act like black boxes, especially when they misbehave. Sophisticated explanations and justifications give users confidence
The Real-Time Incursion Process • Real-Time data is read. • Risk rules are applied and risks found (mostly by reconstructing the original risk analysis that led to covering strategies). • The strategies whose actions mitigate the risk are found and presented to the controller. • The controller assesses the situation and makes selections. [Could this be done automatically?] • How to present multiple incursion and their mitigation strategies is, of course, a human factors problem.
USC Intrusion Management Intelligent, Extendible Tools • USC IM - Next Wave safety application • Capturing and organizing common knowledge • Using deductive power to solve problems • Aids for planning and improving airports • Aids for real-time detection and recovery • Using the same knowledge base for each activity