Skip to main content

Currently Skimming:

3 System Monitoring
Pages 29-35

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 29...
... This chapter identifies three key challenges and two high-priority research projects: • Challenges -- Data Completeness and Quality -- Data Fusion -- Collecting Data on the Performance of Human Operators • Research Projects -- Data Fusion, Completeness, and Quality -- Protecting Personally Identifiable Information 29
From page 30...
... SWIM is intended to replace legacy point-to-point system interfaces with a modern service-oriented architecture, thereby providing a common set of connections and data components. As of September 2017, SWIM streams are available for traffic flow management data, terminal radar data, flight plan data, and airspace data.
From page 31...
... For example, the SWIM Traffic Flow Management System provides a large set of flight data and flow information, including ­ flight planning data, aircraft positions, airport and route status, and predeparture flight status information. Flight position data come either from en route radar, which provides accurate and reliable data, or from oceanic position reports, which provide data that are less accurate, less reliable, and less consistent in terms of quality.
From page 32...
... This risk is increased when data are stored and are made available for post-event analysis. Collecting Data on the Performance of Human Operators Challenge Summary Statement: Data regarding operator performance that are essential to achieving the full potential of the envisioned IASMS cannot be collected in a timely fashion or at all, in part because of privacy and related concerns.
From page 33...
... or miscommunication, it is important to identify states and conditions that indicate an elevated risk state that involves human error and/or miscommunication. Key issues include how to identify those factors that contribute to elevated risk states related to human performance (e.g., high emotion, fatigue, or inattention, etc.)
From page 34...
... Analyses of data quality requirements will determine which IASMS functions are feasible, and they will provide a basis for setting alerting thresholds that result in a high probability of detecting elevated risk states and a low probability of false alarms. Protecting Personally Identifiable Information Research Project Summary Statement: Develop methods of de-identifying and/or protecting sensitive data in a way that does not preclude effective data fusion.
From page 35...
... This research project could assess the value to each stakeholder of collecting operator data so that all stakeholders understand the value of collecting and storing relevant data in terms of improving the safety of the NAS. For example, the research project could work with stakeholders to identify potentially unsafe conditions that could effectively be addressed using data on operator performance to identify data of particular interest and when it should be collected.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.