Investigation of Utility-Based Alerting Lee Winder Jim Kuchar International Center for Air Transportation MIT FAA/NASA Joint University Program FAA Technical.

Slides:



Advertisements
Similar presentations
Acknowledgements to Jim Kuchar
Advertisements

Introduction to Transportation Systems. PART II: FREIGHT TRANSPORTATION.
FAA/Eurocontrol TIM 9 on Performance Metrics – INTEGRA Rod Gingell 16 May 2002.
Modeling Conflicts of Multiple Independent Alerting Systems Lixia Song James K. Kuchar Massachusetts Institute of Technology.
Chapter 14 Schedule Risk Management Dr. Ayham Jaaron Second Semester 2010/2011.
A Survey on Tracking Methods for a Wireless Sensor Network Taylor Flagg, Beau Hollis & Francisco J. Garcia-Ascanio.
Chapter 4: Linear Models for Classification
PROBABILISTIC ASSESSMENT OF THE QSAR APPLICATION DOMAIN Nina Jeliazkova 1, Joanna Jaworska 2 (1) IPP, Bulgarian Academy of Sciences, Sofia, Bulgaria (2)
Statistical NLP: Lecture 11
Introduction to Fault Diagnosis and Isolation(FDI) By Hariharan Kannan.
x – independent variable (input)
Parameterising Bayesian Networks: A Case Study in Ecological Risk Assessment Carmel A. Pollino Water Studies Centre Monash University Owen Woodberry, Ann.
Psychological Aspects of Risk Management and Technology – G. Grote ETHZ, Fall09 Psychological Aspects of Risk Management and Technology – Overview.
Perceptron-based Global Confidence Estimation for Value Prediction Master’s Thesis Michael Black June 26, 2003.
Distributed Reinforcement Learning for a Traffic Engineering Application Mark D. Pendrith DaimlerChrysler Research & Technology Center Presented by: Christina.
Experiments and Dynamic Treatment Regimes S.A. Murphy Univ. of Michigan January, 2006.
Thanks to Nir Friedman, HU
Review Rong Jin. Comparison of Different Classification Models  The goal of all classifiers Predicating class label y for an input x Estimate p(y|x)
TCAS Basics Capt Craig Hinkley. 2 TCAS HISTORY  Two planes collided over the Grand Canyon  Alternative airborne version using transponders.
Copyright © Cengage Learning. All rights reserved. 16 Quality Control Methods.
Aeronautics & Astronautics Autonomous Flight Systems Laboratory All slides and material copyright of University of Washington Autonomous Flight Systems.
Interoperability of Airborne Collision Avoidance Systems Lixia Song James K. Kuchar Massachusetts Institute of Technology.
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
Computer Vision Lecture 8 Performance Evaluation.
Quality Indicators (Binary ε-Indicator) Santosh Tiwari.
1 Bayesian methods for parameter estimation and data assimilation with crop models Part 2: Likelihood function and prior distribution David Makowski and.
. Center TRACON Automation System (CTAS) Traffic Management Advisor (TMA) Transportation authorities around the globe are working to keep air traffic moving.
MIT ICAT MIT ICAT. MIT ICAT MIT ICAT Motivation Adverse Weather Significantly Impacts Flight Operations Safety % All US Accidents Efficiency --
WHAT IS SYSTEM SAFETY? The field of safety analysis in which systems are evaluated using a number of different techniques to improve safety. There are.
ASSTAR User Forum #1 Rome 4th April 2006 ASAS-TN2 Second Workshop ASSTAR Safety Approach and Preliminary Issues Dr Giuseppe GRANIERO, SICTA
Computerised Air Traffic Management Tools - Benefits and Limitations OMAR BASHIR (March 2005)
02/18/05© 2005 University of Wisconsin Last Time Radiosity –Converting the LTE into the radiosity equation –Solving with Gauss-Seidel relaxation –Form.
An Automated Airspace Concept for the Next Generation Air Traffic Control System Todd Farley, David McNally, Heinz Erzberger, Russ Paielli SAE Aerospace.
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
Advanced Speed Guidance for Merging and Sequencing Techniques Chris Sweeney Thomas Jefferson High School for Science and Technology MITRE Corporation Center.
Exploration Strategies for Learned Probabilities in Smart Terrain Dr. John R. Sullins Youngstown State University.
Forward-Scan Sonar Tomographic Reconstruction PHD Filter Multiple Target Tracking Bayesian Multiple Target Tracking in Forward Scan Sonar.
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
Chapter 4 Control Charts for Measurements with Subgrouping (for One Variable)
Required Total System Performance (RTSP) Bernard Miaillier EUROCONTROL Agenda Item 3 EUROCONTROL.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Advanced Decision Architectures Collaborative Technology Alliance An Interactive Decision Support Architecture for Visualizing Robust Solutions in High-Risk.
CSCI 4310 Lecture 6: Adversarial Tree Search. Book Winston Chapter 6.
SOFTWARE PROJECT MANAGEMENT
Adversarial Search Chapter Games vs. search problems "Unpredictable" opponent  specifying a move for every possible opponent reply Time limits.
Theories and Hypotheses. Assumptions of science A true physical universe exists Order through cause and effect, the connections can be discovered Knowledge.
"Classical" Inference. Two simple inference scenarios Question 1: Are we in world A or world B?
Machine Design Under Uncertainty. Outline Uncertainty in mechanical components Why consider uncertainty Basics of uncertainty Uncertainty analysis for.
Preventing Overfitting Problem: We don’t want to these algorithms to fit to ``noise’’ Reduced-error pruning : –breaks the samples into a training set and.
Probabilistic Scenario Analysis Institute for Water Resources 2009 Charles Yoe, PhD
Decision Making Under Uncertainty CMSC 471 – Spring 2014 Class #12– Thursday, March 6 R&N, Chapters , material from Lise Getoor, Jean-Claude.
01/20151 EPI 5344: Survival Analysis in Epidemiology Cox regression: Introduction March 17, 2015 Dr. N. Birkett, School of Epidemiology, Public Health.
Classification Ensemble Methods 1
USE OF INTENT INFORMATION IN AIRCRAFT CONFORMANCE MONITORING
1 Chapter 17 2 nd Part Making Complex Decisions --- Decision-theoretic Agent Design Xin Lu 11/04/2002.
Håkan L. S. YounesDavid J. Musliner Carnegie Mellon UniversityHoneywell Laboratories Probabilistic Plan Verification through Acceptance Sampling.
IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.
Decision Tree Analysis. Definition A Decision Tree is a graphical presentation of a decision-making process within a business which aims to highlight.
Dynamics of Reward Bias Effects in Perceptual Decision Making Jay McClelland & Juan Gao Building on: Newsome and Rorie Holmes and Feng Usher and McClelland.
Lecture 1.31 Criteria for optimal reception of radio signals.
COmbining Probable TRAjectories — COPTRA
CS b659: Intelligent Robotics
Chapter 11: Project Risk Management
Probabilistic Robotics
Air Carrier Continuing Analysis and Surveillance System (CASS)
Software Reliability Models.
Knowing When to Stop: An Examination of Methods to Minimize the False Negative Risk of Automated Abort Triggers RAM XI Training Summit October 2018 Patrick.
Test Drop Rules: If not:
CS 416 Artificial Intelligence
Presumptions Subgroups (samples) of data are formed.
Presentation transcript:

Investigation of Utility-Based Alerting Lee Winder Jim Kuchar International Center for Air Transportation MIT FAA/NASA Joint University Program FAA Technical Center January 9-10, 2003

Alerting System An alerting system is automation that monitors some human-operated system and issues guidance to operators when needed to avoid an incident. Examples: terrain, traffic, windshear, internal aircraft systems Have been very successful in preventing accidents, but also occasionally contribute to accidents Systems being pushed toward increasing capability and complexity -- current design methods may not be able to keep up (e.g., TCAS took approx 10 years to develop, another 10 years of tweaking in operation)

Example: Alerting for Aircraft Collision Avoidance No alert Alert triggers evasion guidance !

Uncertainty Causes Alerting Failures nominal safe nominal unsafe ! ! ! correct detection induced incident nuisance alert Alerting system design requires trade-off between good and bad outcomes

Drivers of Alerting System Performance Alerting System operational exposure (likelihood of and type of threat encounters) operator training and experience uncertainties Alerting Logic Philosophy (e.g., use time-to-collision, or probability of collision?) Future state trajectory model (simple projection, worst-case, probabilistic?) Quality of alerting outcomes (false alarms, correct detections)

Research Objectives We currently only have a qualitative understanding of how the inputs to alerting system design affect alerting quality Goal: generate quantitative understanding of alerting system behavior so that system performance can be improved Extend prior work on modeling alerting system behavior Develop principled methods for design of alerting systems New methods for selecting alerting thresholds More accurate models of future trajectories Articulate benefit of different design methods as function of the problem being addressed (may be better to use approach A in high-certainty situation but approach B in low-certainty situation)

Traditional Alerting Threshold Design Traditional methodology: Build threshold directly in physical state space (used in every current on-board alerting system, most other alerting systems) Iterative trajectory simulations aid choosing and and tuning threshold parameters for best performance Simple, but may not really capture the actual design tradeoffs v1v1 r, r h, h v2v2 r r, h, h … hazard alert space state vector, [ r, r, h, h, v, … ]

Probabilistic Alert Analysis Idea: P(SA), P(FA) represent the fundamental performance types to trade off Beginning to be introduced, e.g., CTAS and URET conflict probes State vector [ r, r, h, h, v, … ] Probabilistic metrics P(False Alarm | nominal traj) Measure of need to act P(Safe Alert | alert traj) Measure of alert safety nominal alert [ r, r, h, h, v, … ] hazard

Probabilistic Alert Analysis (“System Operating Characteristic”) P(False Alarm) = P(safe | nominal traj) P(Safe Alert) = P(safe | alert traj) Threshold operating point Ideal operating point nearer ideal point, better tradeoff Greater safety Greater need for alert

Threshold Design in SOC Design Space Achieve desired performance trade-off by defining threshold in SOC space Unresolved issue: just how should the threshold be defined in SOC space? P(False Alarm) = P(safe | nominal traj) P(Safe Alert) = P(safe | alert traj) SOC alert space

Utility-based Alerting Philosophy Possible decision metrics Physical metrics (time, distance…) SOC metrics Utility Previous research (e.g. Pritchett): “nuisance alerts” and nonconformance indicate operator/pilot has a preferred internal evasion strategy for the hazard. Utility decision theory: A “rational” agent acts to maximize its expected outcome utility. Notion: Design alerting system as a rational utility-based agent. 1. Assign numerical utility to different trajectory outcomes. 2. At each moment compute expected utility for different alert options (alert now, defer alert). 3. Defer alerting until it has greater expected utility than not alerting.

Experimental Testbed x(t + Δt) = v Δt w = Gaussian white sequence y(t + Δt) = y(t) + u + w u = Alert input = 0, nominal (defer alert) u evade, constant bias y collision hazard y(t + Δt) y(t) x v Δt alert = first u evade defer alert Any input sequence allowed

Experimental System Outcome Utilities Outcome utility definitions Safe outcome and no alert occurred+U 0 Safe outcome and alert occurred+U 1 < U 0 Collision with or without alert0 y x post alert nominal U0U0 0 0 U1U1

Utility Computation u A recursive algorithm can yield an approximate E[ Utility ] for each point in time for each input option (alert or defer). For this simple system, can also propagate E[ Utility ] backward from the end states. u evade u nom y x f(y, u nom ) u nom max E[ Utility ] u

Trajectory Modeling Nominal Avoidance current state In traditional trajectory models (in fact, in all models in current use) the future state trajectory is propagated assuming a single control behavior is used (e.g., if no alert is issued, state will continue along Nominal trajectory forever). Simple, but the safety along the Nominal branch is actually probably higher than predicted because we could divert from that branch later.

Trajectory Modeling More accurate modeling is possible by including potential for future alerts: Nominal Avoidance current state Potential future alerting actions This provides a more accurate estimate of safety (or utility) along each branch. This type of multiple-branch model was implemented in the experimental testbed. This modeling comes at a cost of complexity -- the tradeoff between complexity and performance is one aspect we will be investigating further.

Expected Utility for Different Actions E[ Utility ] Alert Action E[ Utility ] Nominal Action (Deferred Alert) x x y y

Utility-based Alert Threshold x y E[ Utility | defer ] – E[ Utility | alert ] = 0 higher utility by deferring alert in this region higher utility by alerting in this region

Mapping of Utility-based Alert Regions into SOC Space nonalert space threshold alert space P(FA) P(SA)

Next Steps Use experimental testbed to explore alerting threshold design methods Overall expected utility of the system as function of Different threshold design methods Different utility assignments Different modeling complexity (single-branch vs. multiple branch) Effect of varying process uncertainty on performance Ultimate goal: articulate the relationships between alerting system inputs and system quality (ref earlier figure)

The End

SOC Distribution of Alert Outcomes P(False Alarm) = P(safe | never an alert) P(Safe Alert) = P(safe | alert) SOC Domain of alert distribution Outcomes where no alert was needed or occurred Collision before alert Correct rejection distribution

Expected Utility Surfaces E[ Utility ] Alert Action E[ Utility ] Nominal Action (Deferred Alert) xx y y these would be better as simple 2-D contour plots I think, but you probably don’t have time to do that now. Just be sure to walk people through them -- where is the hazard, which way does the state move through the plot, why is it shaped the way it is…