skip to main content
10.1145/3358331.3358397acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiamConference Proceedingsconference-collections
research-article

The Analysis and Application of Airport Security Process System Model based on Optimization

Published:17 October 2019Publication History

ABSTRACT

The security measures to prevent passengers from hijacking or destroying aircraft and to keep all passengers safe during their travel become more and more important after the "9.11" terrorist attacks. But the passengers spend much more time at the security checkpoint for their flight. For finding the bottlenecks in the security check, the author builds a service quality model to minimize the inconvenience of passengers based on the maximize security. By analysis the data about how passengers proceed through each step of the security screening process, the author uses per capita waiting time of the queue to identify where problem areas exist in the current process. Based on this, the author proposes two potential modifications to improve passenger throughput and reduce variance in waiting time. After the change, the waiting time is short obviously. Considering the cultural norms that shape the local rules of social interaction, the author needs to make a sensitivity analysis about the airport security process computer system model. By setting special crowd, it could expedite passenger throughput and reduce variance. Finally, based on the service quality model, the author proposes policy and procedural recommendations to the security managers for specific cultures and traveler types.

References

  1. Gu Y. Zheng M. Research on Dynamic Allocations of Airport Security Check Resources. (2016), 46(5), 67--72.Google ScholarGoogle Scholar
  2. Jiang X. X. Zhou H. Optimization Research on Process and Layout of Terminal Security Check. (2015), 45(3): 25--34.Google ScholarGoogle Scholar
  3. Gao, ST. Modified models about security check in airports. MSMEE 2017. (2017), 575--578.Google ScholarGoogle ScholarCross RefCross Ref
  4. Yang, YR. Optimizing the Throughput at an Airport Security Check Point. ICMMCT 2017. (2017), 1456.Google ScholarGoogle ScholarCross RefCross Ref
  5. Li, JL. Modeling and Optimizing the Process of Airport Security Checking. CMSAM 2017.(2017), 108--116.Google ScholarGoogle Scholar
  6. Zhou, HYR. Optimization Research on Process of Airport Security Check. ICMMCT 2017. (2017), 332--335.Google ScholarGoogle Scholar
  7. Zhou, HYR. Application of Erlang Queuing Model in Process of Airport ICMMCT 2017. (2017), 329--331.Google ScholarGoogle Scholar
  8. Huang Y. Experimental study on passive control of low velocity cavity flow. shanghai: Shanghai Jiao Tong University, (2012).Google ScholarGoogle Scholar
  9. Li Z. Debashis B. Hamed A. Numerical Simulation of Sidewall Effects on the Acoustic Field in Transonic Cavity. (2007), 1456.Google ScholarGoogle Scholar
  10. Fei R. T. The analysis and improvement of security checks[J]. ACADEMIC EXCHANGE.(2014), 185: 104--106.Google ScholarGoogle Scholar
  11. Jaromír Široký, Pavlína Hlavsová. Optimizing process of check-in and security check at airport terminals. MATEC Web of Conferences. (2018), 1003.Google ScholarGoogle Scholar
  12. Haodi Wang. The Establishment and Optimization of Airport Security Check Process Model. YAC 2017. (2017), 1026--1030.Google ScholarGoogle Scholar

Index Terms

  1. The Analysis and Application of Airport Security Process System Model based on Optimization

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      AIAM 2019: Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing
      October 2019
      418 pages
      ISBN:9781450372022
      DOI:10.1145/3358331

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 October 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate100of285submissions,35%
    • Article Metrics

      • Downloads (Last 12 months)13
      • Downloads (Last 6 weeks)3

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader