364 resultados para collision avoidance
Resumo:
Collisions among trains and cars at road/rail level crossings (LXs) can have severe consequences such as high level of fatalities, injuries and significant financial losses. As communication and positioning technologies have significantly advanced, implementing vehicular ad hoc networks (VANETs) in the vicinity of unmanned LXs, generally LXs without barriers, is seen as an efficient and effective approach to mitigate or even eliminate collisions without imposing huge infrastructure costs. VANETs necessitate unique communication strategies, in which routing protocols take a prominent part in their scalability and overall performance, through finding optimised routes quickly and with low bandwidth overheads. This article studies a novel geo-multicast framework that incorporates a set of models for communication, message flow and geo-determination of endangered vehicles with a reliable receiver-based geo-multicast protocol to support cooperative level crossings (CLXs), which provide collision warnings to the endangered motorists facing road/rail LXs without barriers. This framework is designed and studied as part of a $5.5 m Government and industry funded project, entitled 'Intelligent-Transport-Systems to improve safety at road/rail crossings'. Combined simulation and experimental studies of the proposed geo-multicast framework have demonstrated promising outcomes as cooperative awareness messages provide actionable critical information to endangered drivers who are identified by CLXs.
Resumo:
Ethiopia has one of Africa’s fastest growing non-oil producing economies and an increasing level of motorisation (AfDB, OECD, UNDP, & UNECA, 2012). This rapidly increasing mobility has created some unique road safety concerns; however there is scant published information and related commentary (United Nations Economic Commission for Africa, 2009). The objective of this paper is to quantify police-reported traffic crashes in Ethiopia and characterise the existing state of road safety. Six years (July 2005 - June 2011) of police-reported crash data were analysed, consisting of 12,140 fatal and 29,454 injury crashes on the country’s road network. The 12,140 fatal crashes involved 1,070 drivers, 5,702 passengers, and 7,770 pedestrians, totalling 14,542 fatalities, an average of 1.2 road user fatalities per crash. An important and glaring trend that emerges is that more than half of the fatalities in Ethiopia involve pedestrians. The majority of the crashes occur during daytime hours, involve males, and involve persons in the 18-50 age group—Ethiopia’s active workforce. Crashes frequently occur in mid blocks or roadways. The predominant collision between motor vehicles and pedestrians was a rollover on a road tangent section. Failing to observe the priority of pedestrians and speeding were the major causes of crashes attributed by police. Trucks and minibus taxis were involved in the majority of crashes, while automobiles (small vehicles) were less involved in crashes relative to other vehicle types, partially because small vehicles tend to be driven fewer kilometres per annum. These data illustrate and justify a high priority to identify and implement effective programs, policies, and countermeasures focused on reducing pedestrian crashes.
Resumo:
Anxiety traits can be stable and permanent characteristics of an individual across time that is less susceptible of influences by a particular situation. One way to study trait anxiety in an experimental context is through the use of rat lines, selected according to contrasting phenotypes of fear and anxiety. It is not clear whether the behavioral differences between two contrasting rat lines in one given anxiety test are also present in others paradigms of state anxiety. Here, we examine the extent to which multiple anxiety traits generalize across selected animal lines originally selected for a single anxiety trait. We review the behavioral results available in the literature of eight rat genetic models of trait anxiety - namely Maudsley Reactive and Non-reactive rats, Floripa H and L rats, Tsukuba High and Low Emotional rats, High and Low Anxiety-related rats, High and Low Ultrasonic Vocalization rats, Roman High and Low Avoidance rats, Syracuse High and Low Avoidance rats, and Carioca High and Low Conditioned Freezing rats - across 11 behavioral paradigms of innate anxiety or aversive learning frequently used in the experimental setting. We observed both convergence and divergence of behavioral responses in these selected lines across the 11 paradigms. We find that predisposition for specific anxiety traits will usually be generalized to other anxiety provoking stimuli. However this generalization is not observed across all genetic models indicating some unique trait and state interactions. Genetic models of enhanced-anxiety related responses are beginning to help define how anxiety can manifest differently depending on the underlying traits and the current environmentally induced state.
Resumo:
Railway Bridges deteriorate over time due to different critical factors including, flood, wind, earthquake, collision, and environment factors, such as corrosion, wear, termite attack, etc. In current practice, the contributions of the critical factors, towards the deterioration of railway bridges, which show their criticalities, are not appropriately taken into account. In this paper, a new method for quantifying the criticality of these factors will be introduced. The available knowledge as well as risk analyses conducted in different Australian standards and developed for bridge-design will be adopted. The analytic hierarchy process (AHP) is utilized for prioritising the factors. The method is used for synthetic rating of railway bridges developed by the authors of this paper. Enhancing the reliability of predicting the vulnerability of railway bridges to the critical factors, will be the significant achievement of this research.
Resumo:
Previous research has shown that mobile phone use while driving can increase crash risk fourfold while texting results in 23 times greater crash risk for heavy vehicle drivers. However, mobile phone use has changed in recent years with the functional capabilities of smart phones to now also include a range of other common behaviours while driving such as using Facebook, emailing, the use of ‘apps’, and GPS. Research continues to show performance decrements for many such behaviours while driving, however many Australians still openly admit to illegal mobile phone use while driving despite ongoing enforcement efforts and public awareness campaigns. Of most concern are young drivers. ‘Apps’ available to restrict mobile phone use while in motion do not prevent use while a driver is stopped at traffic lights, so are therefore not a wholly viable solution. Vehicle manufacturers continue to develop in-vehicle technology to minimise distraction, however communication with the ‘outside world’ while driving is also perhaps a strong selling point for vehicles. Hence, the safety message that drivers should focus on the driving task solely and not use communication devices is unlikely to ever be internalised by many drivers. This paper reviews the available literature on the topic and argues that a better understanding of perceptions of mobile phone use while driving and motives for use are required to inform public awareness campaign development for specific road user groups. Additionally, illegal phone use while driving may be reinforced by not being apprehended (punishment avoidance), therefore stronger deterrence-focussed messages may also be beneficial.
Resumo:
Bicyclists are among the most vulnerable of road users, with high fatal crash rates. Although visibility aids have been widely advocated to help prevent bicycle-vehicle conflicts, to date no study has investigated, among crash-involved cyclists, the kind of visibility aids they were using at the time of the crash. This study undertook a detailed investigation of visibility factors involved in bicyclist-motor-vehicle crashes. We surveyed 184 bicyclists (predominantly from Australia via internet cycling forums) who had been involved in motor vehicle collisions regarding the perceived cause of the collision, ambient weather and general visibility, as well as the clothing and bicycle lights used by the bicyclist. Over a third of the crashes occurred in low light levels (dawn, dusk or night-time), which is disproportionate given that only a small proportion of bicyclists typically ride at these times. Importantly, 19% of these bicyclists reported not using bicycle lights at the time of the crash, and only 34% were wearing reflective clothing. Only two participants (of 184) nominated bicyclist visibility as the cause of the crash: 61% attributed the crash to driver inattention. These findings demonstrate that crash-involved bicyclists tend to under-rate and under-utilise visibility aids as a means of improving their safety.
Resumo:
This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.
Resumo:
Conditions of bridges deteriorate with age, due to different critical factors including, changes in loading, fatigue, environmental effects and natural events. In order to rate a network of bridges, based on their structural condition, the condition of the components of a bridge and their effects on behaviour of the bridge should be reliably estimated. In this paper, a new method for quantifying the criticality and vulnerability of the components of the railway bridges in a network will be introduced. The type of structural analyses for identifying the criticality of the components for carrying train loads will be determined. In addition to that, the analytical methods for identifying the vulnerability of the components to natural events whose probability of occurrence is important, such as, flood, wind, earthquake and collision will be determined. In order to maintain the practicality of this method to be applied to a network of thousands of railway bridges, the simplicity of structural analysis has been taken into account. Demand by capacity ratios of the components at both safety and serviceability condition states as well as weighting factors used in current bridge management systems (BMS) are taken into consideration. It will be explained what types of information related to the structural condition of a bridge is required to be obtained, recorded and analysed. The authors of this paper will use this method in a new rating system introduced previously. Enhancing accuracy and reliability of evaluating and predicting the vulnerability of railway bridges to environmental effects and natural events will be the significant achievement of this research.
Resumo:
Determining what consequences are likely to serve as effective punishment for any given behaviour is a complex task. This chapter focuses specifically on illegal road user behaviours and the mechanisms used to punish and deter them. Traffic law enforcement has traditionally used the threat and/or receipt of legal sanctions and penalties to deter illegal and risky behaviours. This process represents the use of positive punishment, one of the key behaviour modification mechanisms. Behaviour modification principles describe four types of reinforcers: positive and negative punishments and positive and negative reinforcements. The terms ‘positive’ and ‘negative’ are not used in an evaluative sense here. Rather, they represent the presence (positive) or absence (negative) of stimuli to promote behaviour change. Punishments aim to inhibit behaviour and reinforcements aim to encourage it. This chapter describes a variety of punishments and reinforcements that have been and could be used to modify illegal road user behaviours. In doing so, it draws on several theoretical perspectives that have defined behavioural reinforcement and punishment in different ways. Historically, the main theoretical approach used to deter risky road use has been classical deterrence theory which has focussed on the perceived certainty, severity and swiftness of penalties. Stafford and Warr (1993) extended the traditional deterrence principles to include the positive reinforcement concept of punishment avoidance. Evidence of the association between punishment avoidance experiences and behaviour has been established for a number of risky road user behaviours including drink driving, unlicensed driving, and speeding. We chose a novel way of assessing punishment avoidance by specifying two sub-constructs (detection evasion and punishment evasion). Another theorist, Akers, described the idea of competing reinforcers, termed differential reinforcement, within social learning theory (1977). Differential reinforcement describes a balance of reinforcements and punishments as influential on behaviour. This chapter describes comprehensive way of conceptualising a broad range of reinforcement and punishment concepts, consistent with Akers’ differential reinforcement concept, within a behaviour modification framework that incorporates deterrence principles. The efficacy of three theoretical perspectives to explain self-reported speeding among a sample of 833 Australian car drivers was examined. Results demonstrated that a broad range of variables predicted speeding including personal experiences of evading detection and punishment for speeding, intrinsic sensations, practical benefits expected from speeding, and an absence of punishing effects from being caught. Not surprisingly, being younger was also significantly related to more frequent speeding, although in a regression analysis, gender did not retain a significant influence once all punishment and reinforcement variables were entered. The implications for speed management, as well as road user behaviour modification more generally, are discussed in light of these findings. Overall, the findings reported in this chapter suggest that a more comprehensive approach is required to manage the behaviour of road users which does not rely solely on traditional legal penalties and sanctions.
Resumo:
This paper describes the theory and practice for a stable haptic teleoperation of a flying vehicle. It extends passivity-based control framework for haptic teleoperation of aerial vehicles in the longest intercontinental setting that presents great challenges. The practicality of the control architecture has been shown in maneuvering and obstacle-avoidance tasks over the internet with the presence of significant time-varying delays and packet losses. Experimental results are presented for teleoperation of a slave quadrotor in Australia from a master station in the Netherlands. The results show that the remote operator is able to safely maneuver the flying vehicle through a structure using haptic feedback of the state of the slave and the perceived obstacles.
Resumo:
Latex allergy is a serious, possibly life threatening health hazard in the perioperative environment. Policy and procedures should be developed to identify patients who may be sensitive to latex and to ensure the avoidance of latex products in their care. Healthcare workers should also take steps to avoid exposure and protect themselves from hypersensitivity reactions.
Resumo:
Considering the wide spectrum of situations that it may encounter, a robot navigating autonomously in outdoor environments needs to be endowed with several operating modes, for robustness and efficiency reasons. Indeed, the terrain it has to traverse may be composed of flat or rough areas, low cohesive soils such as sand dunes, concrete road etc. . .Traversing these various kinds of environment calls for different navigation and/or locomotion functionalities, especially if the robot is endowed with different locomotion abilities, such as the robots WorkPartner, Hylos [4], Nomad or the Marsokhod rovers. Numerous rover navigation techniques have been proposed, each of them being suited to a particular environment context (e.g. path following, obstacle avoidance in more or less cluttered environments, rough terrain traverses...). However, seldom contributions in the literature tackle the problem of selecting autonomously the most suited mode [3]. Most of the existing work is indeed devoted to the passive analysis of a single navigation mode, as in [2]. Fault detection is of course essential: one can imagine that a proper monitoring of the Mars Exploration Rover Opportunity could have avoided the rover to be stuck during several weeks in a dune, by detecting non-nominal behavior of some parameters. But the ability to recover the anticipated problem by switching to a better suited navigation mode would bring higher autonomy abilities, and therefore a better overall efficiency. We propose here a probabilistic framework to achieve this, which fuses environment related and robot related information in order to actively control the rover operations.
Resumo:
"Taxation law can be an incredibly complex subject to absorb, particularly when time is limited. Written specifically for students, Principles of Taxation Law 2014 brings much needed clarity to this area of law. Utilising many methods to make this often daunting subject achievable, particular features of the 2014 edition include: seven parts: overview and structure, principles of income, deductions and offsets, timing issues, investment and business entities, tax avoidance and administration, and indirect taxes; clearly structured chapters within those parts grouped under helpful headings;flowcharts, diagrams and tables, end of chapter practice questions, and case summaries; an appendix containing all of the up to date and relevant rates; and the online self-testing component mentor, which provides questions for students of both business and law. Every major aspect of the Australian tax system is covered, with chapters on topics such as goods and services tax, superannuation, offsets, partnerships, capital gains tax, trusts, company tax and tax administration.All chapters have been thoroughly revised"-- Publishers website
Resumo:
The notion of sovereignty is central to any international tax issue. While a nation is free to design its tax laws as it sees fit and raise revenue in accordance with the needs of its citizens, it is not possible to undertake such a task in isolation. In a world of cross-border investments and business transactions, all tax regimes impact on one another. Tax interactions between sovereign states cannot be avoided. Ultimately, the interactions mean that a nation must decide whether to engage in both collaboration and coordination with other nations and supranational bodies alike or maintain an individualised stance in relation to its tax policy. Whatever the decision, there is arguably an exercise in national sovereignty in some form. In the context of an international tax regime, whether that regime is interpreted broadly as meaning international norms generally adopted by nations around the world or domestic regimes legislating for cross-border transactions, rhetoric around national fiscal sovereignty takes on many different forms. At one end of the spectrum it is relied upon by financial secrecy jurisdictions (tax havens) as a defence to their position on the basis that ‘other’ nations cannot interfere with the fiscal sovereignty of a jurisdiction. At the other end of the spectrum, it is argued that profit shifting and international tax avoidance if not stopped is, in and of itself, a threat to a nation’s fiscal sovereignty on the basis that it threatens the ability to tax and raise the revenue needed. This paper considers a modern conceptualisation of sovereignty along with its role within international tax coordination and collaboration to argue that a move towards a more unified approach to addressing international base erosion and profit shifting may be the ultimate exercise of national fiscal sovereignty. By using the current transfer pricing regime as a case study, this paper posits that it is not merely enough to have international agreement on allocation rules to be applied, but that the ultimate exercise of national sovereignty is political agreement with other states to ensure that it is governments which determine the allocational basis of worldwide profits to be taxed. In doing so, it is demonstrated that the arm’s length pricing requirement of the current transfer pricing regime, rather than providing governments with the ability to determine the location of profits, is providing multinational entities with the ultimate power to determine that location. If left unchecked, this will eventually erode a nation’s ability to capture the required tax revenue and, as a consequence, may be deemed a failure by nation states to exercise their fiscal sovereignty.
Resumo:
Newman and Nelson (2012) describe three ‘dances’ to explain the vacillating psychological states of trauma survivors: the dance of approach and avoidance; the dance of fragmentation and integration; and the dance of resilience and vulnerability. The first pair of seemingly opposite responses describes how survivors at times cope by ‘approaching’ the trauma, for example by gathering information about what happened; whilst at other times, the same person will cope by ‘avoiding’ the trauma by engaging in activities which distract them from the memory of the trauma or having to deal with the consequences of it. The ‘dance’ of fragmentation and integration describes the opposing individual or group experiences encountered after traumas or disasters. Individuals may experience fragmentation, or emotional disconnection, from the trauma as an adaptive means of survival. The ‘dance’ of resilience and vulnerability refers to an individual’s ability to ‘process’ trauma and return to a resilient state in which they re-learn to trust people and the world around them and ‘bounce back’ to a state of being resilient again. This paper will illustrate how an understanding of the three dances can be used to enable survivors of child sexual assault to engage with the media to tell their stories. I will give current examples from six months of journalism research, collaboration and writing of a series of news stories and features which broke an exclusive story simultaneously in The Australian and The Times in London during 2013.