43 resultados para Alert
Resumo:
This paper presents an approach to providing better safety for adolescents playing online games. We highlight an emerging paedophile presence in online games and offer a general framework for the design of monitoring and alerting tools. Our method is to monitor and detect relationships forming with a child in online games, and alert if the relationship indicates an offline meeting with the child has been arranged or has the potential to occur. A prototype implementation with demonstrative components of the framework has been created and is introduced. The prototype demonstration and evaluation uses a teen rated online relationship-building environment for its case study, specifically the predominant Massive Multiplayer Online Game (MMO) World of Warcraft.
Resumo:
Purpose. To investigate evidence-based visual field size criteria for referral of low-vision (LV) patients for mobility rehabilitation. Methods. One hundred and nine participants with LV and 41 age-matched participants with normal sight (NS) were recruited. The LV group was heterogeneous with diverse causes of visual impairment. We measured binocular kinetic visual fields with the Humphrey Field Analyzer and mobility performance on an obstacle-rich, indoor course. Mobility was assessed as percent preferred walking speed (PPWS) and number of obstacle-contact errors. The weighted kappa coefficient of association (κr) was used to discriminate LV participants with both unsafe and inefficient mobility from those with adequate mobility on the basis of their visual field size for the full sample and for subgroups according to type of visual field loss and whether or not the participants had previously received orientation and mobility training. Results. LV participants with both PPWS <38% and errors >6 on our course were classified as having inadequate (inefficient and unsafe) mobility compared with NS participants. Mobility appeared to be first compromised when the visual field was less than about 1.2 steradians (sr; solid angle of a circular visual field of about 70° diameter). Visual fields <0.23 and 0.63 sr (31 to 52° diameter) discriminated patients with at-risk mobility for the full sample and across the two subgroups. A visual field of 0.05 sr (15° diameter) discriminated those with critical mobility. Conclusions. Our study suggests that: practitioners should be alert to potential mobility difficulties when the visual field is less than about 1.2 sr (70° diameter); assessment for mobility rehabilitation may be warranted when the visual field is constricted to about 0.23 to 0.63 sr (31 to 52° diameter) depending on the nature of their visual field loss and previous history (at risk); and mobility rehabilitation should be conducted before the visual field is constricted to 0.05 sr (15° diameter; critical).
Resumo:
Solar ultraviolet (UV) radiation causes a range of skin disorders as well as affecting vision and the immune system. It also inhibits development of plants and animals. UV radiation monitoring is used routinely in some locations in order to alert the population to harmful solar radiation levels. There is ongoing research to develop UV-selective-sensors [1–3]. A personal, inexpensive and simple UV-selective-sensor would be desirable to measure UV intensity exposure. A prototype of such a detector has been developed and evaluated in our laboratory. It comprises a sealed two-electrode photoelectrochemical cell (PEC) based on nanocrystalline TiO2. This abundant semiconducting oxide, which is innocuous and very sta-ble, is the subject of intense study at present due to its application in dye sensitized solar cells (DSSC) [4]. Since TiO2 has a wide band gap (EG = 3.0 eV for rutile and EG = 3.2 eV for anatase), it is inher-ently UV-selective, so that UV filters are not required. This further reduces the cost of the proposed photodetector in comparison with conventional silicon detectors. The PEC is a semiconductor–electrolyte device that generates a photovoltage when it is illuminated and a corresponding photocur-rent if the external circuit is closed. The device does not require external bias, and the short circuit current is generally a linear function of illumination intensity. This greatly simplifies the elec-trical circuit needed when using the PEC as a photodetector. DSSC technology, which is based on a PEC containing nanocrystalline TiO2 sensitized with a ruthenium dye, holds out the promise of solar cells that are significantly cheaper than traditional silicon solar cells. The UV-sensor proposed in this paper relies on the cre-ation of electron–hole pairs in the TiO2 by UV radiation, so that it would be even cheaper than a DSSC since no sensitizer dye is needed. Although TiO2 has been reported as a suitable material for UV sensing [3], to the best of our knowledge, the PEC configuration described in the present paper is a new approach. In the present study, a novel double-layer TiO2 structure has been investigated. Fabrication is based on a simple and inexpensive technique for nanostructured TiO2 deposition using microwave-activated chemical bath deposition (MW-CBD) that has been reported recently [5]. The highly transparent TiO2 (anatase) films obtained are densely packed, and they adhere very well to the transparent oxide (TCO) substrate [6]. These compact layers have been studied as contacting layers in double-layer TiO2 structures for DSSC since improvement of electron extraction at the TiO2–TCO interface is expected [7]. Here we compare devices incorporating a single mesoporous nanocrystalline TiO2 structure with devices based on a double structure in which a MW-CBD film is situated between the TCO and the mesoporous nanocrystalline TiO2 layer. Besides improving electron extraction, this film could also help to block recombination of electrons transferred to the TCO with oxidized species in the electrolyte, as has been reported in the case of DSSC for compact TiO2 films obtained by other deposition tech-niques [8,9]. The two types of UV-selective sensors were characterized in detail. The current voltage characteristics, spectral response, inten-sity dependence of short circuit current and response times were measured and analyzed in order to evaluate the potential of sealed mesoporous TiO2-based photoelectrochemical cells (PEC) as low cost personal UV-photodetectors.
Resumo:
Approximately 20 years have passed now since the NTSB issued its original recommendation to expedite development, certification and production of low-cost proximity warning and conflict detection systems for general aviation [1]. While some systems are in place (TCAS [2]), ¡¨see-and-avoid¡¨ remains the primary means of separation between light aircrafts sharing the national airspace. The requirement for a collision avoidance or sense-and-avoid capability onboard unmanned aircraft has been identified by leading government, industry and regulatory bodies as one of the most significant challenges facing the routine operation of unmanned aerial systems (UAS) in the national airspace system (NAS) [3, 4]. In this thesis, we propose and develop a novel image-based collision avoidance system to detect and avoid an upcoming conflict scenario (with an intruder) without first estimating or filtering range. The proposed collision avoidance system (CAS) uses relative bearing ƒÛ and angular-area subtended ƒê , estimated from an image, to form a test statistic AS C . This test statistic is used in a thresholding technique to decide if a conflict scenario is imminent. If deemed necessary, the system will command the aircraft to perform a manoeuvre based on ƒÛ and constrained by the CAS sensor field-of-view. Through the use of a simulation environment where the UAS is mathematically modelled and a flight controller developed, we show that using Monte Carlo simulations a probability of a Mid Air Collision (MAC) MAC RR or a Near Mid Air Collision (NMAC) RiskRatio can be estimated. We also show the performance gain this system has over a simplified version (bearings-only ƒÛ ). This performance gain is demonstrated in the form of a standard operating characteristic curve. Finally, it is shown that the proposed CAS performs at a level comparable to current manned aviations equivalent level of safety (ELOS) expectations for Class E airspace. In some cases, the CAS may be oversensitive in manoeuvring the owncraft when not necessary, but this constitutes a more conservative and therefore safer, flying procedures in most instances.
Resumo:
Pedestrians’ use of mp3 players or mobile phones can pose the risk of being hit by motor vehicles. We present an approach for detecting a crash risk level using the computing power and the microphone of mobile devices that can be used to alert the user in advance of an approaching vehicle so as to avoid a crash. A single feature extractor classifier is not usually able to deal with the diversity of risky acoustic scenarios. In this paper, we address the problem of detection of vehicles approaching a pedestrian by a novel, simple, non resource intensive acoustic method. The method uses a set of existing statistical tools to mine signal features. Audio features are adaptively thresholded for relevance and classified with a three component heuristic. The resulting Acoustic Hazard Detection (AHD) system has a very low false positive detection rate. The results of this study could help mobile device manufacturers to embed the presented features into future potable devices and contribute to road safety.
Resumo:
An increase in the likelihood of navigational collisions in port waters has put focus on the collision avoidance process in port traffic safety. The most widely used on-board collision avoidance system is the automatic radar plotting aid which is a passive warning system that triggers an alert based on the pilot’s pre-defined indicators of distance and time proximities at the closest point of approaches in encounters with nearby vessels. To better help pilot in decision making in close quarter situations, collision risk should be considered as a continuous monotonic function of the proximities and risk perception should be considered probabilistically. This paper derives an ordered probit regression model to study perceived collision risks. To illustrate the procedure, the risks perceived by Singapore port pilots were obtained to calibrate the regression model. The results demonstrate that a framework based on the probabilistic risk assessment model can be used to give a better understanding of collision risk and to define a more appropriate level of evasive actions.
Resumo:
Introduction: Previous studies investigating mothers’ sleep in the postpartum period commonly demonstrated elevated levels of sleepiness in this population. A Karolinska Sleepiness Scale (KSS) rating of 5 or above is associated with an exponential increase in vehicle crash risk. To date, no studies have investigated the relationship between mothers’ sleep in the postpartum period and their driving behaviour. Methods: Sleep-wake diary data was collected from 14 mother-infant dyads during two 7-day assessment periods when the infants were 6 and 12 weeks old. The mothers’ indicated all driving episodes during these weeks and their respective sleepiness level using the KSS. Semi-structured interviews were conducted with the mothers when their infant was 12 weeks old. Results: The infants slept significantly more than their mothers at 6 weeks and 12 weeks of age. During both time points, mothers and infants had a similar number of night awakenings (waking between 22:00 and 06:00), with some mothers experiencing greater than 19 awakenings over 7 nights. Notably, 36% of the mothers did not experience a continuous sleep period longer than 4.5 hours when their infant was 6 weeks old. A total of 141 driving episodes were reported during the 7 day assessment period when the infants were 6 weeks old. Over 50% of the driving episodes were denoted with a KSS score of 5 or above. Strategies mothers cited they employed during this period included only driving when feeling alert, postponing driving until another person is present, and driving in the morning when less sleepy. Conclusion: Mothers are experiencing disrupted sleep at night and some mothers do not obtain more than 4.5 hours of continuous sleep during the early postpartum weeks. In this sample, some mothers reported self-regulating driving behaviour, however over half of the driving episodes were undertaken with a sleepiness rating linked with elevated crash risk.
Resumo:
Road traffic accidents can be reduced by providing early warning to drivers through wireless ad hoc networks. When a vehicle detects an event that may lead to an imminent accident, the vehicle disseminates emergency messages to alert other vehicles that may be endangered by the accident. In many existing broadcast-based dissemination schemes, emergency messages may be sent to a large number of vehicles in the area and can be propagated to only one direction. This paper presents a more efficient context aware multicast protocol that disseminates messages only to endangered vehicles that may be affected by the emergency event. The endangered vehicles can be identified by calculating the interaction among vehicles based on their motion properties. To ensure fast delivery, the dissemination follows a routing path obtained by computing a minimum delay tree. The multicast protocol uses a generalized approach that can support any arbitrary road topology. The performance of the multicast protocol is compared with existing broadcast protocols by simulating chain collision accidents on a typical highway. Simulation results show that the multicast protocol outperforms the other protocols in terms of reliability, efficiency, and latency.
Resumo:
Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggregate experimentation that correlate responses to sites with and without indicators. We report on a laboratory experiment using eye-tracking to follow the behavior of self-identified computer experts as they share information across popular social media websites. The use of eye-tracking equipment allows us to explore possible behavioral differences in the way experts perceive web browser security cues, as opposed to non-experts. Unfortunately, due to the use of self-identified experts, technological issues with the setup, and demographic anomalies, our results are inconclusive. We describe our initial experimental design, lessons learned in our experimentation, and provide a set of steps for others to follow in implementing experiments using unfamiliar technologies, eye-tracking specifically, subjects with different experience with the laboratory tasks, as well as individuals with varying security expertise. We also discuss recruitment and how our design will address the inherent uncertainties in recruitment, as opposed to design for an ideal population. Some of these modifications are generalizable, together they will allow us to run a larger 2x2 study, rather than a study of only experts using two different single sign-on systems.
Resumo:
Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.
Resumo:
Since the first destination image studies were published in the early 1970s, the field has become one of the most popular in the tourism literature. While reviews of the destination image literature show no commonly agreed conceptualisation of the construct, researchers have predominantly used structured questionnaires for measurement. There has been criticism that the way some of these scales have been selected means a greater likelihood of attributes being irrelevant to participants. This opens up the risk of stimulating uninformed responses. The issue of uninformed response was first raised as a source of error 60 years ago. However, there has been little, if any, discussion in relation to destination image measurement, studies of which often require participants to provide opinion-driven rather than fact-based responses. This paper reports the trial of a ‘don’t know’ (DK) non-response option for participants in two destination image questionnaires. It is suggested the use of a DK option provides participants with an alternative to i) skipping the question, ii) using the scale midpoint to denote neutrality, or iii) providing an uninformed response. High levels of DK usage by participants can then alert the marketer of the need to improve awareness of destination performance for potential salient attributes.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.
Resumo:
An emerging theme for a nation transiting into a sustainable future is the provision of a low carbon (dioxide) environment. Carbon emission reduction is therefore important for the industry and community as a whole. Buildings contribute immensely to total greenhouse gas emissions, so pragmatic actions need to be taken to cut the amount of carbon emitted by the construction industry. These typically involve strategies such as energy-saving features in the design, construction and operation of building projects. However, a variety of characteristics of the markets and stakeholders involved are suppressing their development. This paper reports on a series of interviews with a variety of Hong Kong construction project participants aimed at identifying the drivers of, and obstacles to, the construction industry's attempts to reduce carbon emissions. The results confirm the main actions currently undertaken are energy efficiency enhancement, green procurement, research and development activities, waste/water management and other technical measures such as the provision of thermal insulation. The majority of the drivers are economical in nature, suggesting that financial aids, and particularly government incentives, are likely to be useful motivators. Also suggested is the increased promotion of the benefits of environmental sustainability to the wider community, in order to alert the general public to the need for reducing the amount of carbon originating from building usage.
Resumo:
Road crashes contribute to a significant amount of child mortality and morbidity in Australia. In fact, passenger injuries contribute to the majority of child crash road trauma. A number of factors contribute to child injury and death in motor vehicles, including inappropriate seating position, inappropriate choice of restraint, and incorrect installation and use of child restraints. Prior to March 2010, child restraint legislation in Queensland only required children twelve months and younger to be seated in a properly adjusted and fastened child restraint. This legislation left older infants and young children potentially suboptimally protected. From March 2010, new legislation specified seating position and type of child restraint required, depending on the age of the child. This research was underpinned by the Health Belief Model (HBM), which explores health related behaviour, behaviour change, environmental factors influencing behaviour change (including legislative changes) and is flexible enough to be used in relation to parents' health practices for their children, rather than parent health directly. This thesis investigates the extent to which the changes to child restraint legislation have led parents in regional areas of Queensland to use appropriate restraint practices for their children and determines the extent to which the constructs of the HBM, parental perceptions, barriers and environmental factors contribute to the appropriateness of child seating and restraint use. Study One included three sets of observations taken in two regional cities of Queensland prior to the legislative amendment, during an educative period of six months, and after the enactment of the legislation. Each child's seating position and restraint type were recorded. Results showed that the proportion of children observed occupying the front seat decreased by 15.6 per cent with the announcement the legislation. There was no decrease in front seat use at the enactment of the legislation. The proportion of children observed using dedicated child restraints increased by 8.8 per cent with the announcement of the legislation when there was one child in the vehicle. Further, there was a 10.1 per cent increase in the proportion of children observed using a seat belt that fit with the announcement when there was one child in the vehicle and with the enactment of the legislation regardless of the number of children in the vehicle (21.8 per cent for one child, 39.7 per cent for two children and 40.2 per cent for three or more children). Study Two comprised initial intercept interviews, later followed up by telephone, with parents with children aged eight years and younger at the announcement and telephone interviews at the enactment of the legislation in one regional city in Queensland. Parents reported their child restraint practices, and opinions, knowledge and understanding of the requirements of the new legislation. Parent responses were analysed in terms of the constructs in the HBM. When asked which seating position their child 'usually' used, parents reported child front seat use was nil (0.0 per cent) and did not change with the enactment of the legislative amendment. However, when parents were asked whether they allowed children to use the front seat at some point within the six months prior to the interview, reported child front seat use was 7 (5.4 per cent) children at T2 and 10 (9.6 per cent) at T3. Reported use of age-appropriate child restraints did not increase with the enactment of the legislation (p = 0.77, ns). Parents reported restraint practices were classed as either appropriate or inappropriate. Parents who reported appropriate restraint practices were those whose children were sitting in optimal restraints and seating positions for their age according to the requirements of the legislation. Parents who reported inappropriate restraint practices were those who had one or more children who were suboptimally restrained or seated for their age according to the requirements of the legislation. Neither parents' perceptions about their susceptibility of being in a crash nor the likelihood of severity of child injury if involved in a crash yielded significant differences in the appropriateness of reported parent restraint practices over time with the enactment of the legislation. A trend in the data suggested parents perceived a benefit to using appropriate restraint practices was to avoid fines and demerit points. Over 75 per cent of parents who agreed that child restraints provide better protection for children than an adult seat belt reported appropriately seating and restraining their children (2 (1) = 8.093, p<.05). The self-efficacy measure regarding parents' confidence in installing a child restraint showed a significant association with appropriate parental restraint practices (2 (1) = 7.036, p<.05). Results suggested that some parents may have misinterpreted the announcement of the legislative amendment as the announcement of the enforcement of the legislation instead. Some parents who correctly reported details of the legislation did not report appropriate child restraint practices. This finding shows that parents' knowledge of the legislative amendment does not necessarily have an impact on their behaviour to appropriately seat and restrain children. The results of these studies have important implications for road safety and the prevention of road-related injury and death to children in Queensland. Firstly, parents reported feeling unsure of how to install restraints, which suggests that there may be children travelling in restraints that have not been installed correctly, putting them at risk. Interventions to alert and encourage parents to seek advice when unsure about the correct installation of child restraints could be considered. Secondly, some parents in this study although they were using the most appropriate restraint for their children, reported using a type that was not the most appropriate restraint for the child's age according to the legislation. This suggests that intervention may be effective in helping parents make a more accurate choice of the most appropriate type of restraint to use with children, especially as the child ages and child restraint requirements change. Further research could be conducted to ascertain the most effective methods of informing and motivating parents to use the most appropriate restraints and seating positions for their children, as these results show a concerning disparity between reported restraint practices and those that were observed.
Resumo:
The purpose of this chapter is to address the question of how communication studies can prove its value in relation to corporate social responsibility (CSR). As many disciplines seek to understand CSR, the role of communication has been relatively underexplored despite its prevalence in demonstrating and shaping social responsibility positions and practice. Literature review. The literature review points to what we consider as four aces. Communication studies alert us to (1) how meaning is constructed through communication, something that has implications for the management of organizations as publics hold different views of CSR and expect different things from them; (2) how a dialogue between an organization and its publics should unfold; (3) how practices of transparency can assist organizations to come across as trustworthy actors; and, importantly, (4) how a complexity view is fruitful to grasp the CSR communication process. These four key themes could be instructive for practitioners who want to argue for and demonstrate the usefulness of strategic communication for the management of CSR and bridge meso and macro levels of analysis.