Skip to main content

Research on Application of ATC Operation Security Based on Data Mining

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11067))

Included in the following conference series:

  • 2087 Accesses

Abstract

In order to study the applicability of data mining in the study of ATC operational safety, take the six typical factors that may affect the safety of ATC as the former, and the level of unsafe incidents in ATC as the next term, use correlation analysis and Apriori algorithm, And set a reasonable degree of confidence in the rules, the degree of support for the rules, analysis of air traffic insecurity incidents. Taking the general ATC operational safety incident as an example, the results show that the data mining has applicability in the problem of ATC operational safety, and each of the influencing factors has a certain relevance; Each of the preceding factors has an impact on the safety of ATC operations, but the degree of impact is different. Among them, the factors that have a greater impact are mainly control load, airspace environment and control equipment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mckinskey Global institute, Big Data: The next frontier innovation, competition and productivity, May 2011

    Google Scholar 

  2. FAA: SWIM core Architecture evolution concepts. MITRE Technical report MTR90193. Mitre, McLean, VA (2009)

    Google Scholar 

  3. Inniss, T.R.: Seasonal clustering technique for time series data. Eur. J. Oper. Res. 175(1), 376–384 (2006)

    Article  MathSciNet  Google Scholar 

  4. Murca, M.C.R., Delaura, R., Hansman, R.J., et al.: Trajectory clustering and classification for characterization of air traffic flows. In: AIAA Aviation Technology, Integration, and Operations Conference, p. 3760 (2015)

    Google Scholar 

  5. Xu, N., Donohue, G., Laskey, K.B., et al.: Estimation of delay propagation in aviation system using Bayesian network. USA (2016)

    Google Scholar 

  6. Anderson, T.K.: Kernel density estimation and K-means clustering to profile road accident hotspots. Accid. Anal. Prev. 41(3), 359–364 (2009)

    Article  Google Scholar 

  7. Wang, H.H.: The application of the mining of association rules in analysis of traffic accidents. Anhui University (2011)

    Google Scholar 

  8. Bongiorno, C., Gurtner, G., Lillo, F., et al.: Statistical characterization of deviations from planned flight trajectories in air traffic management. J. Air Transp. Manag. 58, 152–163 (2017)

    Article  Google Scholar 

  9. Zhou, J.L.: Risk identification and analysis of air traffic control based on text data and radiotelephony data. Civil Aviation Flight University of China (2017)

    Google Scholar 

  10. Habib, A.A., Govindaraju, R.: Success measures evaluation for mobile commerce using text mining based on customer tweets. In: IOP Conference Series: Materials Science and Engineering, vol. 319, no. 1, p. 012009 (2018)

    Article  Google Scholar 

  11. Janani, G., Devi, N.R.: Road traffic accidents analysis using data mining techniques. JITA J. Inf. Technol. Appl. 14(2) (2016)

    Google Scholar 

  12. Huang, W.C, Jia, L., Peng, D.G.: Apriori-based association rule algorithm and its application in power plant. J. Syst. Simul. 266–271 (2018)

    Google Scholar 

  13. Wu, F.D.: Application research of enrollment management based on apriori algorithm. Hebei University (2014)

    Google Scholar 

  14. Kumar, B.S., Rukmani, K.V.: Implementation of web usage mining using APRIORI and FP growth algorithms. Int. J. Adv. Netw. Appl. 1(06), 400–404 (2010)

    Google Scholar 

  15. Zhang, Y.X., Wang, X.R., Wu, M.G.: Evaluation of the unconventional operational risks for the air traffic control based on the fuzzy hierarchical analysis process and the cloud model. J. Saf. Environ. 16(4), 42–47 (2016)

    Google Scholar 

  16. Du, H.B., Wang, X.L.: Risk identification of airport traffic control tower based on flow diagram. China Saf. Sci. J. 20(6), 80–87 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaoyue Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Z., Zhang, J., Wang, S. (2018). Research on Application of ATC Operation Security Based on Data Mining. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11067. Springer, Cham. https://doi.org/10.1007/978-3-030-00018-9_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00018-9_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00017-2

  • Online ISBN: 978-3-030-00018-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics