246 resultados para route maintenance protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We conducted on-road and simulator studies to explore the mechanisms underpinning driver-rider crashes. In Study 1 the verbal protocols of 40 drivers and riders were assessed at intersections as part of a 15km on-road route in Melbourne. Network analysis of the verbal transcripts highlighted key differences in the situation awareness of drivers and riders at intersections. In a further study using a driving simulator we examined in car drivers the influence of acute exposure to motorcyclists. In a 15 min simulated drive, 40 drivers saw either no motorcycles or a high number of motorcycles in the surrounding traffic. In a subsequent 45-60 min drive, drivers were asked to detect motorcycles in traffic. The proportion of motorcycles was manipulated so that there was either a high (120) or low (6) number of motorcycles during the drive. Those drivers exposed to a high number of motorcycles were significantly faster at detecting motorcycles. Fundamentally, the incompatible situation awareness at intersections by drivers and riders underpins the conflicts. Study 2 offers some suggestion for a countermeasure here, although more research around schema and exposure training to support safer interactions is needed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Driver behaviour at rail level crossings represents a key area for further research. This paper describes an on-road study comparing novice and experienced driver situation awareness at rural rail level crossings. Participants provided verbal protocols while driving a pre-determined rural route incorporating ten rail level crossings. Driver situation awareness was assessed using a network analysis approach. The analysis revealed key differences between novice and experienced drivers' situation awareness. In particular, the novice drivers seemed to be more reliant on rail level crossing warnings and their situation awareness was less focussed on the environment outside of the rail level crossing. In closing, the implications for rail level crossing safety are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The need to address on-road motorcycle safety in Australia is important due to the disproportionately high percentage of riders and pillions killed and injured each year. One approach to preventing motorcycle-related injury is through training and education. However, motorcycle rider training lacks empirical support as an effective road safety countermeasure to reduce crash involvement. Previous reviews have highlighted that risk-taking is a contributing factor in many motorcycle crashes, rather than merely a lack of vehicle-control skills (Haworth & Mulvihill, 2005; Jonah, Dawson & Bragg, 1982; Watson et al, 1996). Hence, though the basic vehicle-handling skills and knowledge of road rules that are taught in most traditional motorcycle licence training programs may be seen as an essential condition of safe riding, they do not appear to be sufficient in terms of crash reduction. With this in mind there is considerable scope for the improvement of program focus and content for rider training and education. This program of research examined an existing traditional pre-licence motorcycle rider training program and formatively evaluated the addition of a new classroom-based module to address risky riding; the Three Steps to Safer Riding program. The pilot program was delivered in the real world context of the Q-Ride motorcycle licensing system in the state of Queensland, Australia. Three studies were conducted as part of the program of research: Study 1, a qualitative investigation of delivery practices and student learning needs in an existing rider training course; Study 2, an investigation of the extent to which an existing motorcycle rider training course addressed risky riding attitudes and motives; and Study 3, a formative evaluation of the new program. A literature review as well as the investigation of learning needs for motorcyclists in Study 1 aimed to inform the initial planning and development of the Three Steps to Safer Riding program. Findings from Study 1 suggested that the training delivery protocols used by the industry partner training organisation were consistent with a learner-centred approach and largely met the learning needs of trainee riders. However, it also found that information from the course needs to be reinforced by on-road experiences for some riders once licensed and that personal meaning for training information was not fully gained until some riding experience had been obtained. While this research informed the planning and development of the new program, a project team of academics and industry experts were responsible for the formulation of the final program. Study 2 and Study 3 were conducted for the purpose of formative evaluation and program refinement. Study 2 served primarily as a trial to test research protocols and data collection methods with the industry partner organisation and, importantly, also served to gather comparison data for the pilot program which was implemented with the same rider training organisation. Findings from Study 2 suggested that the existing training program of the partner organisation generally had a positive (albeit small) effect on safety in terms of influencing attitudes to risk taking, the propensity for thrill seeking, and intentions to engage in future risky riding. However, maintenance of these effects over time and the effects on riding behaviour remain unclear due to a low response rate upon follow-up 24 months after licensing. Study 3 was a formative evaluation of the new pilot program to establish program effects and possible areas for improvement. Study 3a examined the short term effects of the intervention pilot on psychosocial factors underpinning risky riding compared to the effects of the standard traditional training program (examined in Study 2). It showed that the course which included the Three Steps to Safer Riding program elicited significantly greater positive attitude change towards road safety than the existing standard licensing course. This effect was found immediately following training, and mean scores for attitudes towards safety were also maintained at the 12 month follow-up. The pilot program also had an immediate effect on other key variables such as risky riding intentions and the propensity for thrill seeking, although not significantly greater than the traditional standard training. A low response rate at the 12 month follow-up unfortunately prevented any firm conclusions being drawn regarding the impact of the pilot program on self-reported risky riding once licensed. Study 3a further showed that the use of intermediate outcomes such as self-reported attitudes and intentions for evaluation purposes provides insights into the mechanisms underpinning risky riding that can be changed by education and training. A multifaceted process evaluation conducted in Study 3b confirmed that the intervention pilot was largely delivered as designed, with course participants also rating most aspects of training delivery highly. The complete program of research contributed to the overall body of knowledge relating to motorcycle rider training, with some potential implications for policy in the area of motorcycle rider licensing. A key finding of the research was that psychosocial influences on risky riding can be shaped by structured education that focuses on awareness raising at a personal level and provides strategies to manage future riding situations. However, the formative evaluation was mainly designed to identify areas of improvement for the Three Steps to Safer Riding program and found several areas of potential refinement to improve future efficacy of the program. This included aspects of program content, program delivery, resource development, and measurement tools. The planned future follow-up of program participants' official crash and traffic offence records over time may lend further support for the application of the program within licensing systems. The findings reported in this thesis offer an initial indication that the Three Steps to Safer Riding is a useful resource to accompany skills-based training programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We demonstrate a simple electrochemical route to produce uniformly sized gold nanospikes without the need for a capping agent or prior modification of the electrode surface, which are predominantly oriented in the {111} crystal plane and exhibit promising electrocatalytic and SERS properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis analyses the performance bounds of amplify-and-forward relay channels which are becoming increasingly popular in wireless communication applications. The statistics of cascaded Nakagami-m fading model which is a major obstacle in evaluating the outage of wireless networks is analysed using Mellin transform. Furthermore, the upper and the lower bounds for the ergodic capacity of the slotted amplify-and-forward relay channel, for finite and infinite number of relays are derived using random matrix theory. The results obtained will enable wireless network designers to optimize the network resources, benefiting the consumers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives This study introduces and assesses the precision of a standardized protocol for anthropometric measurement of the juvenile cranium using three-dimensional surface rendered models, for implementation in forensic investigation or paleodemographic research. Materials and methods A subset of multi-slice computed tomography (MSCT) DICOM datasets (n=10) of modern Australian subadults (birth—10 years) was accessed from the “Skeletal Biology and Forensic Anthropology Virtual Osteological Database” (n>1200), obtained from retrospective clinical scans taken at Brisbane children hospitals (2009–2013). The capabilities of Geomagic Design X™ form the basis of this study; introducing standardized protocols using triangle surface mesh models to (i) ascertain linear dimensions using reference plane networks and (ii) calculate the area of complex regions of interest on the cranium. Results The protocols described in this paper demonstrate high levels of repeatability between five observers of varying anatomical expertise and software experience. Intra- and inter-observer error was indiscernible with total technical error of measurement (TEM) values ≤0.56 mm, constituting <0.33% relative error (rTEM) for linear measurements; and a TEM value of ≤12.89 mm2, equating to <1.18% (rTEM) of the total area of the anterior fontanelle and contiguous sutures. Conclusions Exploiting the advances of MSCT in routine clinical assessment, this paper assesses the application of this virtual approach to acquire highly reproducible morphometric data in a non-invasive manner for human identification and population studies in growth and development. The protocols and precision testing presented are imperative for the advancement of “virtual anthropology” into routine Australian medico-legal death investigation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The E&P sector can learn much about asset maintenance from the space and satellite industry. Practitioners from both the upstream oil and gas industry and the space and satellite sector have repeatedly noted several striking similarities between the two industries over the years, which have in turn resulted in many direct comparisons in the media and industry press. The similarities between the two industries have even resulted in a modest amount of cross-pollinating between the respective supply chains. Because the operating conditions of both industries are so extreme, some oil and gas equipment vendors have occasionally sourced motors and other parts from aerospace contractors. Also, satellites are now being used to assess oil fires, detect subsidence in oil fields, measure oil spills, collect and transmit operational data from oil and gas fields, and monitor the movement of icebergs that might potentially collide with offshore oil and gas installations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates: - correlation between transit route passenger loading and travel distance - its implications on quality of service (QoS) and resource productivity. It uses Automatic Fare Collection (AFC) data across a weekday on a premium bus line in Brisbane, Australia. A composite load-distance factor is proposed as a new measure for profiling transit route on-board passenger comfort QoS. Understanding these measures and their correlation is important for planning, design, and operational activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates quality of service and resource productivity implications of transit route passenger loading and travel distance. Weekday Automatic Fare Collection data for a premium radial bus route in Brisbane, Australia, is used to investigate correlation between load factor and distance factor. Relationships between boardings and transit work indicate that distance factor generally increases with load factor. Time series analysis is then presented by examining each direction on an hour by hour basis. Inbound correlation is medium to strong across the entire span of service and strong for daytime services up to 19:30, while outbound correlation is strong across the entire span. Passengers tend to be making longer distance, peak direction commuter trips under the least comfortable conditions under stretched peak schedules than off-peak. Therefore productivity gains may be possible by adjusting fleet utilization during off-peak times. Weekday profiles by direction are established for a composite load-distance factor. A threshold corresponding to standing passengers on the Maximum Load Segment reveals that on-board loading and travel distance combined are more severe during the morning inbound peak than evening outbound peak, although the sharpness of the former suggests that encouraging shoulder peak travel during the morning would be more effective than evening peak. Further research suggested includes: consideration of travel duration factor, relating noise within hour to Peak Hour Factor, profiling load-distance factor across a range of case studies, and relating load-distance factor threshold to line length.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The cost of surgical instrumentation is a major investment for any operating theatre. Repair or premature replacement of instruments is an additional financial burden. Although instrument care, handling, cleaning and sterilisation are usually components of orientation programs for instrument processing personnel, it should also be included in the scrub nurse orientation program. A thorough knowledge of the historical development of instruments; instrument classification and purpose; and careful use and handling will equip the scrub nurse in fulfilling a vital role in preventative maintenance of surgical instrumentation

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As planners work to create more sustainable and liveable urban environments, a priority is to transition away from prioritising the automobile and towards enhancing the pedestrian experience. Thus, this research explores the experience of pedestrian accessibility in inner-urban higher-density Brisbane in Australia, drawing on findings from semi-structured in-depth interviews with 24 residents and over 100 hours of public place observations in three case-study neighbourhoods. The interviews took place in residents homes and explored their experience of higher density living and their neighbourhood, whilst observations were recorded through a combination of methods including photographs, sketch maps, recordings and field journals. Observation locations included retail and commercial space, roads, parkland and open space, with multiple observations at each location. A thematic analysis identified common themes in both interviews and the observations, with this paper focusing on residents’ lived experience in urban built environments. This analysis revealed that pedestrian accessibility is linked to access to local amenities and direct routes, aesthetics, sense of community, ownership of space and safety. In particular, observations revealed how pedestrian accessibility and route-taking works with, against or in spite of the design features of urban environments, as well as the importance of the social use of the built environment. Residents spoke about although walking quick and preferred for local amenities, the decision to walk was moderated by factors such as time of day and perceived safety. Measures to ensure and improve the pedestrian accessibility of urban areas needs to take into account the propensity for people to prefer and improvise direct routes (often to the detriment of traffic safety considerations), the importance of ongoing maintenance and upgrading of walking infrastructure and the importance of aesthetically pleasing and safe walking environments. By combining interviews and observations, this research highlights the current dominance of the automobile culture in Brisbane and the layers of meaning, experiences and complexity hidden within the pedestrian experience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wind power is one of the world's major renewable energy sources, and its utilization provides an important contribution in helping solve the energy problems of many countries. After nearly 40 years of development, China's wind power industry now not only manufactures its own massive six MW turbines but also has the largest capacity in the world with a national output of 50 million MW•h in 2010 and set to rise by eight times of that amount by 2020. This paper investigates this development route by analyzing relevant academic literature, statistics, laws and regulations, policies and research and industry reports. The main drivers of the development in the industry are identified as technologies, turbines, wind farm construction, pricing mechanism and government support systems, each of which is also divided into different stages with distinctive features. A systematic review of these aspects provides academics and practitioners with a better understanding of the history of the wind power industry in China and reasons for its rapid development with a view to enhancing progress in wind power development both in China and the world generally.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.