SIMULATION OF AN AIRPORT PASSENGER SECURITY SYSTEM. David R. Pendergraft Craig V. Robertson Shelly Shrader

Similar documents
PRAJWAL KHADGI Department of Industrial and Systems Engineering Northern Illinois University DeKalb, Illinois, USA

SIMULATION MODELING AND ANALYSIS OF A NEW INTERNATIONAL TERMINAL

Security Queue Management Plan

SIMULATION S ROLE IN BAGGAGE SCREENING AT THE AIRPORTS: A CASE STUDY. Suna Hafizogullari Gloria Bender Cenk Tunasar

TSA s Risk-Based Security Initiatives

A Multi-Agent Microsimulation Model of Toronto Pearson International Airport

Explain the passenger screening concepts. Identify the design, layout, and types of security checkpoints

American Airlines Next Top Model

Airport Simulation Technology in Airport Planning, Design and Operating Management

TSA s Initiatives to Enhance Hassle-Free Security

FACILITATION (FAL) DIVISION TWELFTH SESSION. Cairo, Egypt, 22 March to 2 April 2004

Air Transport Safety & Security Checklist

Appendix B Ultimate Airport Capacity and Delay Simulation Modeling Analysis

Todsanai Chumwatana, and Ichayaporn Chuaychoo Rangsit University, Thailand, {todsanai.c;

Flight Arrival Simulation

Evaluation of Quality of Service in airport Terminals

APPLICATION OF SIMULATION MODELS IN AIRPORT FACILITY DESIGN

INTERNAL AUDIT REPORT

Report to Congress Aviation Security Aircraft Hardening Program

Modeling Checked Baggage Requirements for Dallas/Fort Worth International Airport Eric Miller

SPADE-2 - Supporting Platform for Airport Decision-making and Efficiency Analysis Phase 2

Landside Safety Programs

Defining and Managing capacities Brian Flynn, EUROCONTROL

Buyer s Guide to Effective Upset Prevention & Recovery Training

APPENDIX D MSP Airfield Simulation Analysis

REVIEW OF THE STATE EXECUTIVE AIRCRAFT POOL

DEPARTMENT OF CIVIL AVIATION Airworthiness Notices EXTENDED DIVERSION TIME OPERATIONS (EDTO)

Appendix F International Terminal Building Main Terminal Departures Level and Boarding Areas A and G Alternatives Analysis

All-Weather Operations Training Programme

TRANSGENDER TRAVELERS

Official Journal of the European Union L 7/3

The Combination of Flight Count and Control Time as a New Metric of Air Traffic Control Activity

Quantitative Analysis of Passenger and Baggage Security Screening at Airports

STUDY OVERVIEW MASTER PLAN GOALS AND OBJECTIVES

The Aviation Rulemaking Committee is changing. how airworthiness directives are developed and implemented.

SIMAIR: A STOCHASTIC MODEL OF AIRLINE OPERATIONS

Name of Customer Representative: Bruce DeCleene, AFS-400 Division Manager Phone Number:

White Paper: Assessment of 1-to-Many matching in the airport departure process

Advanced Flight Control System Failure States Airworthiness Requirements and Verification

De-peaking Lufthansa Hub Operations at Frankfurt Airport

DRAFT. Airport Master Plan Update Sensitivity Analysis

PASSENGER JOURNEY. Our vision: a seamless, secure and efficient walking pace journey that is highly personalized throughout.

In-Service Data Program Helps Boeing Design, Build, and Support Airplanes

How much did the airline industry recover since September 11, 2001?

Advanced operational analytics

FORECASTING FUTURE ACTIVITY

SAMTRANS TITLE VI STANDARDS AND POLICIES

Memorandum. Roger Millar, Secretary of Transportation. Date: April 5, Interstate 90 Operations and Mercer Island Mobility

According to FAA Advisory Circular 150/5060-5, Airport Capacity and Delay, the elements that affect airfield capacity include:

The Improvement of Baggage Handling System

FACILITATION (FAL) DIVISION TWELFTH SESSION. Cairo, Egypt, 22 March to 2 April 2004

TSA Pre (PreCheck) Standard Screening. Dwarfism Awareness Month

CAPAN Methodology Sector Capacity Assessment

Applicability / Compatibility of STPA with FAA Regulations & Guidance. First STAMP/STPA Workshop. Federal Aviation Administration

THIRTEENTH AIR NAVIGATION CONFERENCE

DESIGNATED PILOT EXAMINER. Skill Test Standards. for

Project: Implications of Congestion for the Configuration of Airport Networks and Airline Networks (AirNets)

Forecast and Overview

Intent to Request Approval from OMB of One New Public Collection of. Information: Law Enforcement Officers (LEOs) Flying Armed

DEVELOPMENT OF TOE MIDFIELD TERMINAL IROJECT CAPACITY ENHANCEMENT REPORT DEPARTMENT OF AVIATION TOM FOERSTER CHAIRMAN BARBARA HAFER COMMISSIONER

Analysis of Air Transportation Systems. Airport Capacity

CENTRAL OREGON REGIONAL TRANSIT MASTER PLAN

ACRP Problem Statement No Recommended Allocation: -- ACRP Airport Baggage Handling Opportunity

Flight Operations Briefing Notes

Research on Aviation Security*

OPTIMAL PUSHBACK TIME WITH EXISTING UNCERTAINTIES AT BUSY AIRPORT

Runway Length Analysis Prescott Municipal Airport

Application of Queueing Theory to Airport Related Problems

A Coevolutionary Simulation of Real-Time Airport Gate Scheduling

FAA/HSAC PART 135 SYSTEM SAFETY RISK MANAGEMENT SAFETY ELEMENT TRAINING OF FLIGHT CREWMEMBERS JOB AID Revision 1

FUTURE PASSENGER PROCESSING. ACRP New Concepts for Airport Terminal Landside Facilities

Evaluation of Strategic and Tactical Runway Balancing*

SMS HAZARD ANALYSIS AT A UNIVERSITY FLIGHT SCHOOL

Security Needs Of The Transport Sector: Athens International Airport

1.231J/16.781J/ESD.224J Airport Systems Fall Security and BHS. Amedeo R. Odoni. Massachusetts Institute of Technology.

Materna Integrated Passenger Services (Materna ips)

Cross-sectional time-series analysis of airspace capacity in Europe

Abstract. Introduction

UC Berkeley Working Papers

Executive Summary. MASTER PLAN UPDATE Fort Collins-Loveland Municipal Airport

[Docket No. FAA ; Directorate Identifier 2005-NM-056-AD; Amendment ; AD ]

U.S. Forest Service National Minimum Protocol for Monitoring Outstanding Opportunities for Solitude

Revenue Management in a Volatile Marketplace. Tom Bacon Revenue Optimization. Lessons from the field. (with a thank you to Himanshu Jain, ICFI)

WHEREAS, the City operates and manages Rapid City Regional Airport (RAP); and

Brief Recap of Project to Date

Forecast of Aviation Activity

Intent to Request Renewal From OMB of One Current Public Collection of. AGENCY: Transportation Security Administration, DHS.

Real-time route planning streamlines onboard operations, reduces fuel burn and delays, and improves on-time performance.

Glossary and Acronym List

FIXED-SITE AMUSEMENT RIDE INJURY SURVEY FOR NORTH AMERICA, 2016 UPDATE

Quantitative Analysis of the Adapted Physical Education Employment Market in Higher Education

An Air Travel Security Planning Map

Preparatory Course in Business (RMIT) SIM Global Education. Bachelor of Applied Science (Aviation) (Top-Up) RMIT University, Australia

SAN JOSÉ INTERNATIONAL AIRPORT

U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION National Policy

ATTEND Analytical Tools To Evaluate Negotiation Difficulty

Chapter 4 Terminal Facility Requirements and Alternatives

Analysis of Mode Switching Behavior of PUP Main Campus Students to Pasig River Ferry Service

OPERATING DIRECTIVE Number: D Aviation Authority Revised: 03/25/15

Airport Accessibility

Transcription:

Proceedings of the 2004 Winter Simulation Conference R.G. Ingalls, M. D. Rossetti, J. S. Smith, and B. A. Peters, eds. SIMULATION OF AN AIRPORT PASSENGER SECURITY SYSTEM David R. Pendergraft Craig V. Robertson Shelly Shrader Accenture LLP One Freedom Square 11951 Freedom Drive Reston, VA 20190-5651, U.S.A. ABSTRACT As part of the new security environment at the nation s airports, discrete event simulation modeling was applied shortly after 9-11 to understand the operational dynamics of passenger security screening in conjunction with the redesign of the passenger checkpoint. In a rapid six week effort, a discrete event simulation model was built to represent the passenger and luggage screening system at Baltimore Washington International Airport (BWI). BWI was the first airport to undergo enhancement, and the project was reported in BWI s Subtle But Serious Security, Washington Post, March 4, 2002. After the value of simulation was demonstrated at BWI, the simulation methodology was applied to develop resource requirements at all Category X and I airports in the United States. 1 INTRODUCTION Security measures allow the public to continue to live normal lives in an increasingly dangerous world. Because of the increasing dangers, security precautions are becoming standard part of daily life. The cost to the public for increased security includes inconvenience and time delays. In response to these concerns, an initiative was started to redesign the passenger checkpoint process to adhere to security policy while minimizing inconvenience to the public. At the heart of the challenge was to design a passenger checkpoint process which adhered to policy directives, provided a consistent passenger experience, and met or exceeded agreed upon service levels. In support of this effort it was decided to build a baseline (As-Is) simulation model which adequately described the dynamic balance between passenger demand, airport characteristics, process flow, policy directives, and staffing. The baseline model was used as a foundation for alternative future (To-Be) designs. The concept was to rapidly prototype and evaluate the merits of alternative designs and include the knowledge capital gained into the next generation of designs. This process was repeated until the final design emerged. With the final process designed approved and implemented, the simulation effort could move into a new phase which focused on policy development and developing resource requirements. 2 THE APPROACH The Simulation Modeling Approach was comprised of several key activities that contributed to the creation of an As Is and a To Be capacity simulation. The simulation creation process began with an intensive data collection effort that was structured around three main areas: 1. Process Decomposition A graphical depiction of the As Is sequence of events customers follow from curb to gate was developed. The process was broken down into basic activities in a highly structured manner. The simulation team used the As-Is Process Flows as the blue print for the simulation design. 2. Process times & percentages Process decomposition serves as the blue print in which more detailed data is captured for the simulation. Process times including the minimum, mode, and maximum were captured for each activity through a time motion study. Percentages for each decision area of the process (e.g. alarm rates) were captured to lead customers through the proper sequence of events for the situation. 3. Distribution of customer arrivals Customer arrival volumes and patterns were captured using the departure schedule and the airline loading factors. Customer behavior information such as ticket counter versus curbside check in was also captured. This information created an accurate customer arrival pattern at the security checkpoint.

Working closely with the process design team, the simulation team collected and refined the required data. Combining all of the collected data with the process decomposition model essentially created the blueprint for the As Is simulation. It was used as a baseline of comparison for future process improvement ideas generated by the process team. Improvement ideas were captured and compared to the baseline during rapid prototyping for To Be process selection. Once the To Be process design was selected, the To Be simulation was refined for further experimentation purposes. Figure 1 graphically depicts the simulation creation process used in the effort and its relationship to the process redesign. The approach for obtaining the number of passengers who arrive at the airport starts with the number of airline seats available per day. The number of seats available was then reduced by the number of empty seats on the aircrafts. At that point, the number of passengers departing from the given airport was known. The third step was to apply the transfer percents and remove passengers who transferred from one flight to another and would not go through the security process. At this point, the number of passengers who arrive at the airport and the passengers departure time was known. The fourth and final step was to calculate at what time the passengers arrive at the airport. The passenger arrival distribution described how early a passenger would arrive at the airport in advance of the departing flight time. Using the passenger arrival distributions, the number of passengers arriving in 10-minute intervals prior to their flight was calculated for each flight. The final step was to organize the passenger arrival times into the raw number of arrivals during 30-minute periods for the 24- hour day. The 7-day model is built by repeating the process for the remaining 6 days of the week. The above technique was used to produce the passenger arrival pattern for one week. Figure 2 graphically depicts the passenger daily arrival pattern for a typical week at BWI pier C. Passenger Arrivals Figure 1: Using Simulation in the Process Redesign Process 3 DEMAND MODELING Robertson, Shrader, Pendergraft, Johnson and Silbert (2002) provides a detailed procedure for modeling passenger arrivals. Modeling the passenger arrival process estimated how many passengers arrived at the airport during each day and time of day. The demand modeling approach summarized the passenger data into the number of passengers who arrived at the airport in time intervals or time buckets. The raw passenger volume per time interval was the end product of the analysis and was referred to as the passenger arrival pattern. From the raw airport passenger arrival pattern, additional analysis generated the passenger arrival pattern at different points in the process (check-in, baggage security, security checkpoint, etc.). The arrival patterns were then converted from the raw arrivals per interval into the appropriate arrival rates required for nonstationary Poisson arrival processes. The passenger arrival pattern for the checkpoint was generated using several key inputs: passenger arrival behavior, flight schedules, aircraft capacity, load factors and transfer rates. These factors were combined to generate the time dependent passenger demand for the terminal security check-point. PAX 2500 2000 1500 1000 500 0 12:00 AM 12:30 AM 1:00 AM 1:30 AM 2:00 AM 2:30 AM 3:00 AM 3:30 AM 4:00 AM 4:30 AM 5:00 AM 5:30 AM 6:00 AM 6:30 AM 7:00 AM 7:30 AM 8:00 AM 8:30 AM 9:00 AM 9:30 AM 10:00 AM 10:30 AM 11:00 AM 11:30 AM 12:00 PM 12:30 PM 1:00 PM 1:30 PM 2:00 PM 2:30 PM 3:00 PM 3:30 PM 4:00 PM 4:30 PM 5:00 PM 5:30 PM 6:00 PM 6:30 PM 7:00 PM 7:30 PM 8:00 PM 8:30 PM 9:00 PM 9:30 PM 10:00 PM 10:30 PM 11:00 PM 11:30 PM Time Monday Tuesday Wednesday Thursday Friday Satur day Sunday Figure 2: Intra-Day Passenger Arrival Pattern for 7 Days for a Large International Airport Validation of the model was accomplished by observing actual passenger arrivals at the security checkpoint lines. During passenger observation, the time at which each passenger joined the security checkpoint line was recorded. Observations were made during all major peaks and troughs. The collected observation data was organized into the same format as the passenger arrival pattern for comparison to the model. The passenger arrival data series was divided into peak and non-peak days. 4 SIMULATION DESIGN The simulation design was started by creating a decomposition of the process beginning with the passenger check-in process and moving through the passenger s exit of the terminal security checkpoint. The decision was made to

include the passenger entry processes to accurately model the impact of those processes on security checkpoint demand. In fact, the simulation demonstrated the buffering effect of check-in counters which are inadequately staffed by airline personnel. This effect has an overall positive impact on the security checkpoint performance, but has an overall negative impact for customer experience. In general, the high level process steps considered in the overall process design were: Passenger Check-in, Baggage Security, Terminal Checkpoint Security, Passenger Boarding, and Exception Handling. Each area was decomposed into several deeper layers for the purpose of creating the As-Is and the To-Be design. The simulation design focused on the first three process steps. The following description provides a broad overview of the process steps included in the simulation. The description is not meant to be an exhaustive description of everything considered, but should illustrate the approach used to mimic the processes the passenger experiences at the airport in the simulation. The simulation design starts where the demand modeling ends. Arrivals were generated using a constant arrival rate and call thinning techniques to dynamically change the arriving passenger rate for each time interval. Once passengers enter the airport they have several options of where to check-in larger bags or the option to precede directly to the security checkpoint. These passengers either have no baggage or are checking-in at their gate. The percentage which describes the passengers using the different alternatives is known as the by-pass ratio and was provided by airlines as a data element. Passengers checking larger bags were also subject to the possibility of further bag screening at the Explosive Detection System (EDS). The model was designed to accommodate a percentage (including 100%) of all checked bags. Each step of the process at the EDS was built into the simulation which again was modeled to account for the impacts of the EDS process at the terminal security checkpoint. Following check-in, passengers then enter the security checkpoint queue. Before entering the security checkpoint, the passenger further determines whether she is carrying a special item that requires a separate search. If the passenger has any special items, such a laptop computer or camera equipment, the passenger removes this item for special screening. Special searches were modeled as time delays corresponding to its associated distribution. Before entering the security checkpoint, the passenger further determines whether she is carrying any personal items to be removed. Generally, the passenger removes items such as keys, coins, jewelry, etc. that may interfere the security tests performed in the security checkpoint. If the passenger has any such items, the passenger removes these items and positions these items for screening with their personal luggage. The decision process for divesting personal items was not explicitly modeled. The number of personal items were modeled with a discrete distribution which included all personal items placed on the x-ray regardless of the checkpoint entry decision process. Once the passenger loads the luggage on the x-ray, the baggage screening process and the passenger screening process run separate, but simultaneously. Loaded baggage and personal items enter a device (typically an x-ray) that allows security officials to view the contents. The screening device (or the personnel manning the device) may produce an alarm. If an alarm is produced, then the alarm must be resolved before that baggage is allowed through the security checkpoint. Also, even if an alarm is not produced, the baggage may be randomly selected for a more thorough search based on policy. All alarms were modeled using a static branch probability set during initialization of the simulation. Alarm resolution was not explicitly modeled, but rather the time delay incurred by the combinations of tasks performed created by probabilistic branches. Once the final task was performed the alarm was considered resolved. Random searches were modeled using a policy compliance level (0 to 1) which was used as a probabilistic decision of using available resources. Resolving an alarm entails a more thorough examination of the baggage. First, security officials generally locate the passenger, so that the passenger may view any examination of his baggage. Security officials may then perform a screening using an alternative technical device such as an Electronic Trace Detector (ETD) and/or a manual search of the baggage to identify the cause for the alarm. In reality, the manual search may vary according to the results of the initial findings. Specifically, the manual search may vary depending on whether a restricted item was identified during x-ray screening. Restricted items are objects such as pocket knifes, nail files, and tweezers that passengers may not carry on the plane. When a restricted item is seen during screening, the security officials may do a quick manual search to locate and confiscate that restricted item. However, if screening did not identify a particular item, then the security official does an extensive manual search in order to identify the cause for the alarm. For modeling purposes, the intricacies of linking the findings from the initial screening to the more in-depth search has been left for a future model enhancement. The current simulation models all manual searches with the same distribution based on the time motion studies conducted during data collection. It should be noted that other security tasks or combinations of tasks associated with the additional screening have been incorporated into the screening process. The screening of passengers generally includes the use of some type of rapid testing device, such as a magnetometer (MDD) also known as a Walk Through Metal Detector. A certain percentage of the people will activate an alarm thereby requiring resolution of the alarm. Increasing the sensitivity of the device may be simulated by increasing the percentage of people that set off the alarm. Also, a certain percentage of passengers may be randomly selected for more extensive screening, even if these people do not activate the alarm.

Alarm resolution for a passenger may require a combination of searches. For instance, a wand search, a shoe inspection, and possibly other tests may be required to resolve the alarm. These tests are meant to identify the cause for the original alarm condition. In the wand search, a security official uses a handheld metal detector to identify objects causing the alarm. A security official may also manually inspect a passenger s shoes or send the shoes through an x-ray. Other security tests (e.g., a frisk) may also be performed as necessary. Again, alarm resolution was not explicitly modeled. The same approach was used for modeling passenger alarm resolution that was used in baggage alarm resolution presented above. Finally, once the passenger has successfully traversed the security processes, they collect their personal items and exits the checkpoint. 5 WORKING IN A VIRTUAL ENVIRONMENT The As Is environment was created by using all of the information gathered during the effort. The information was combined and used as input into the simulation creating the virtual As Is model. Once validated, the model of the As Is was used as a baseline to compare future To Be design alternatives. The alternative To Be process designs were rapidly prototyped by the process team and compared to the As Is baseline in the virtual environment. The results were analyzed and new designs created. The simulation verified that agreed to performance levels were met or exceeded. The process team continued these iterations until the final To Be process design was created. Finally, the simulated results of each design experiment were documented to provide a history of the design alternatives considered. 6 POLICY DEVELOPMENT The simulation team provided analytic support for airport operations focusing on resources requirements (equipment & staffing), process performance, customer experience and cost. The simulation team assisted with policy development by providing decision makers with quantitative modeling support and analysis. This support was provided in addition to standard sensitivity analysis for decision makers to develop fact based recommendations for policy decisions concerning the following issues: The development of the 85/10 methodology where 85% of passengers wait less than 10 minutes Checkpoint staffing requirements (required number of wanders, number of bag searchers, etc ) for standard configurations Checkpoint equipment requirements (required number of x-rays, shoe x-rays, MDDs, ETDs, etc.) for standard configurations Recommended staffing for peak volume operations Continuous (random) policy compliance levels for wanding and ETDs Alternative gender-based wanding policy impact Impact of allowing meeters and greeters to enter sterile areas beyond the passenger security checkpoint Impact of eliminating MDDs and hand wanding all passengers Check-in counter wait time impact on security checkpoint demand and wait times Higher MDD alarm rate impact on checkpoint operations Reduced staffing impact on checkpoint operations The team also provided more limited analytic support and thought leadership concerning policies on crisis management, consequence management, and the following areas: Resource Requirements Employee work rules (impact of number of breaks, lunch, training etc.) Reduced lane staffing requirements (impacts of reduced staff on checkpoint operations) Reduced airport staffing requirements (optimized scheduling of shared resources across airport) New staffing requirements based on process changes (i.e. checkpoint selectee screening) Annual labor planning based on seasonal demand (Workforce management on annual basis) Process Changes Process changes or re-designs (i.e. new security directives which change process steps or time) New technology inserted into the existing or redesigned process Emergency response planning (Concourse dumps, checkpoint shutdowns, etc.) Customer experience Alternative service level requirements (i.e. different service levels for non-peak operations) Alternative queue management techniques Designated & dedicated lanes and lines, such as designated lanes for premium customers It is important to note that many of these issues were analyzed across all the areas addressed above. Our experiments showed that changes in one area typically impact other areas significantly. All policies have cost impacts, which must be addressed prior to implementing the policy. The assessment for any potential policy must consider both the associated cost and operational impacts. In fact, the detailed analysis of the operational impacts typically drives the cost estimate. This

places the operational impact analysis team in the best position to analyze impacts to both operations and cost. 7 RESULTS The simulation created at BWI proved successful at adequately describing and predicting impacts of system changes. Due to the time frames allowed, a formal validation process was not used to validate the model; however, the simulation was able to accurately mimic checkpoint performance under a host of different scenarios. The model proved invaluable to the overall successful checkpoint process redesign effort and provided valuable insights to policy development. The effort was considered so successful that the simulation and demand modeling methodology was later used to develop resource requirements (x-rays, metal detectors, ETDs, etc..) for all 80 Category X & I airports in the United States. REFERENCES Robertson C. V., S. Shrader, D. R. Pendergraft, L. M. Johnson and K. S. Silbert (2002). The Role of Modeling Demand. In proceedings of the 2002 Winter Simulation Conference. ed. E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes. 1454-1455. Available online via <http://www.informs-cs. org/wsc02papers/198.pdf> [accessed September 10, 2004]. AUTHOR BIOGRAPHIES DAVID PENDERGRAFT is a senior manager in Accenture s Government practice. Along with his simulation duties, he is the chief of staff of Accenture s local business development efforts in Washington D.C. CRAIG ROBERTSON is a manager in Accenture's Customer Relationship Management practice. He specializes in applying Operations Research and Management Science methodologies to process improvement and cost reduction SHELLY SHRADER was formerly a manager in Accenture s Customer Relationship Management practice. She currently works for Hewlett Packard in their Information Technology organization. "Copyright 2004 Accenture. All rights reserved." Pendergraft, Robertson, and Shrader