241 resultados para auditory warning
Resumo:
This chapter is focussed on the research and development of an intelligent driver warning system (IDWS) as a means to improve road safety and driving comfort. Two independent IDWS case studies are presented. The first study examines the methodology and implementation for attentive visual tracking and trajectory estimation for dynamic scene segmentation problems. In the second case study, the concept of driver modelling is evaluated which can be used to provide useful feedback to drivers. In both case studies, the quality of IDWS is largely determined by the modelling capability for estimating multiple vehicle trajectories and modelling driving behaviour. A class of modelling techniques based on neural-fuzzy systems, which exhibits provable learning and modelling capability, is proposed. For complex modelling problems where the curse of dimensionality becomes an issue, a network construction algorithm based on Adaptive Spline Modelling of Observation Data (ASMOD) is also proposed.
Resumo:
Naming an object entails a number of processing stages, including retrieval of a target lexical concept and encoding of its phonological word form. We investigated these stages using the picture-word interference task in an fMRI experiment. Participants named target pictures in the presence of auditorily presented semantically related, phonologically related, or unrelated distractor words or in isolation. We observed BOLD signal changes in left-hemisphere regions associated with lexical-conceptual and phonological processing, including the midto-posterior lateral temporal cortex. However, these BOLD responses manifested as signal reductions for all distractor conditions relative to naming alone. Compared with unrelated words, phonologically related distractors showed further signal reductions, whereas only the pars orbitalis of the left inferior frontal cortex showed a selective reduction in response in the semantic condition. We interpret these findings as indicating that the word forms of lexical competitors are phonologically encoded and that competition during lexical selection is reduced by phonologically related distractors. Since the extended nature of auditory presentation requires a large portion of a word to be presented before its meaning is accessed, we attribute the BOLD signal reductions observed for semantically related and unrelated words to lateral inhibition mechanisms engaged after target name selection has occurred, as has been proposed in some production models.
Resumo:
The Drunk Driving Warning System is an alcohol interlock based on performance of the Critical Tracking Task (CTT). An evaluation was undertaken to determine CTT sensitivity to blood alcohol concentration (BAC), particularly at .05 g/100 ml. Subjects were 36 males in 3 age groups (18, 21 to 25, 35 years and above) divided into 2 alcohol consumption categories ("light" and "heavy"), and scored on 4 training and 2 test days (one alcohol and one placebo). The CTT performance declined as BAC increased and was significantly impaired at .05 BAC. However, performance was too variable for in-vehicle use. Age and alcohol consumption pattern were without effect.
Resumo:
Intrusion (unauthorized stepping-into/staying-in a hazardous area), as a common type of near-miss, is the prime cause of the majority of incidents on construction sites including fall from heights, and striking against or being struck by moving objects. Accidents often occur because workers take shortcuts moving about the site without fully perceiving the potential dangers. A number of researches have been devoted to developing methods to prevent such behaviors mainly based on the theory of Behavior-Based Safety (BBS), which aims to cultivate safety behaviors among workers in accordance with safety regulations. In current BBS practice, trained observers and safety supervisors are responsible for safety behavior inspections following safety plans and operation regulations. The observation process is time-consuming and its effectiveness depends largely on the observer’s safety knowledge and experience, which often results in omissions or bias. This paper presents a reformed safety behavior modification approach by integrating a location-based technology with BBS. Firstly, a detailed background is provided, covering current intrusion problems on site, existing use of BBS for behavior improvement, difficulties in achieving widespread adoption and potential technologies for location tracking and in-time feedback. Then, a conceptual framework of positioning technology-enhanced BBS is developed, followed by details of the corresponding on-line supporting system, Real Time Location System (RTLS) and Virtual Construction System (VCS). The application of the system is then demonstrated and tested in a construction site in Hong Kong. Final comments are made concerning further research direction and prospects for wider adoption.
Resumo:
'Warning constraint limit experience' is an installation comprising drawings, a large scale fabric work, and a performative video. This work explores the performative act of drawing and the limits of language and subjectivity. The fabric work acts as a bodily extension that both facilitates and constrains movement during the drawing process and operates as a provisional structure for viewing the work in the gallery. This work was developed and presented at The Lock-Up Cultural Centre, Newcastle NSW in 2011 and revised for the solo exhibition ‘I build my dwelling’, held at Metro Arts in 2012.
Resumo:
Waterfalls attract tourists because they are aesthetically appealing landscape features that are not part of everyday experience. It is generally understood that falls are usually seen at their best when there is a copious flow of water, especially after heavy rain. Guidebooks often contain this observation when referring to waterfalls, sometimes warning readers that the flow may be severely reduced during dry periods. Indeed, many visitors are disappointed when they see falls at such times. Some are saddened when the discharge of a waterfall has been depleted by the abstraction of water upstream for power generation or other purposes. While, for those in search of the Sublime or merely the superlative, size is often important, small waterfalls can give great pleasure to lovers of landscape beauty. According to guidebooks, however, even these falls are usually best seen after rain. Drawing on tourist and travel literature and personal journals from the eighteenth century to the present, and with reference to examples from different parts of the world, this paper discusses the importance of discharge in the tourist experience of waterfalls.
Resumo:
Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.
Resumo:
Project Diagnostics is a tool for construction industry stakeholders wishing to improve project delivery and outcomes. This software identifies areas of poor project health, then establishes probable root causes and provides suggested remedial measures. Its focus is to act as an advanced warning system for construction projects that are failing to meet predetermined objectives based on the critical success factors (CSFs) of cost, time, quality, safety, relationships, environment and stakeholder value.
Resumo:
How and why visualisations support learning was the subject of this qualitative instrumental collective case study. Five computer programming languages (PHP, Visual Basic, Alice, GameMaker, and RoboLab) supporting differing degrees of visualisation were used as cases to explore the effectiveness of software visualisation to develop fundamental computer programming concepts (sequence, iteration, selection, and modularity). Cognitive theories of visual and auditory processing, cognitive load, and mental models provided a framework in which student cognitive development was tracked and measured by thirty-one 15-17 year old students drawn from a Queensland metropolitan secondary private girls’ school, as active participants in the research. Seventeen findings in three sections increase our understanding of the effects of visualisation on the learning process. The study extended the use of mental model theory to track the learning process, and demonstrated application of student research based metacognitive analysis on individual and peer cognitive development as a means to support research and as an approach to teaching. The findings also forward an explanation for failures in previous software visualisation studies, in particular the study has demonstrated that for the cases examined, where complex concepts are being developed, the mixing of auditory (or text) and visual elements can result in excessive cognitive load and impede learning. This finding provides a framework for selecting the most appropriate instructional programming language based on the cognitive complexity of the concepts under study.
Resumo:
When complex projects go wrong they can go horribly wrong with severe financial consequences. We are undertaking research to develop leading performance indicators for complex projects, metrics to provide early warning of potential difficulties. The assessment of success of complex projects can be made by a range of stakeholders over different time scales, against different levels of project results: the project’s outputs at the end of the project; the project’s outcomes in the months following project completion; and the project’s impact in the years following completion. We aim to identify leading performance indicators, which may include both success criteria and success factors, and which can be measured by the project team during project delivery to forecast success as assessed by key stakeholders in the days, months and years following the project. The hope is the leading performance indicators will act as alarm bells to show if a project is diverting from plan so early corrective action can be taken. It may be that different combinations of the leading performance indicators will be appropriate depending on the nature of project complexity. In this paper we develop a new model of project success, whereby success is assessed by different stakeholders over different time frames against different levels of project results. We then relate this to measurements that can be taken during project delivery. A methodology is described to evaluate the early parts of this model. Its implications and limitations are described. This paper describes work in progress.
Resumo:
The elaborated intrusion (EI) theory of desire (Kavanagh, Andrade, & May, 2005) attributes the motivational force of cravings to cognitive elaboration, including imagery, of apparently spontaneous thoughts that intrude into awareness. We report a questionnaire study in which respondents rated a craving for food or drink. Questionnaire items derived from EI theory formed a single factor alongside factors for anticipated reward/relief, resistance, and opportunity. In a multiple regression predicting strength of craving, the first three factors accounted for 36% of the variance. Opportunity did not enter the model. In a second study, the difference between individuals' strong and weak cravings to take part in a sporting activity was shown to be related to visual, auditory, and general imagery, and to anticipated reward or relief from engaging in the activity. Implications for treatment of craving-related disorders are discussed in the light of these results and of other research indicating that interference with imagery can reduce the strength of craving.
Resumo:
Purpose: Worldwide, the incidence of thick melanoma has not declined, and the nodular melanoma (NM) subtype accounts for nearly 40% of newly-diagnosed thick melanoma. To assess differences between patients with thin (≤2.00 mm) and thick (≥2.01 mm) nodular melanoma, we evaluated factors such as demographics, melanoma detection patterns, tumor visibility, and physician screening for NM alone and compared clinical presentation and anatomic location of NM with superficial spreading melanoma (SSM). Methods We utilized data from a large population-based study of Queensland (Australia) residents diagnosed with melanoma. Queensland residents aged 20 to 75 years with histologically confirmed first primary invasive cutaneous melanoma were eligible for the study, and all questionnaires were conducted by telephone (response rate 77.9%). Results During this four-year period, 369 patients with nodular melanoma were interviewed, of whom 56.7% were diagnosed with tumors ≤ 2.00 mm. Men, older individuals, and those who had not been screened by a physician in the past three years were more likely to have nodular tumors of greater thickness. Thickest nodular melanoma (4 mm+) was also most common in persons who had not been screened by a doctor within the past three years (OR 3.75; 95% CI 1.47-9.59). Forty-six percent of patients with thin nodular melanoma (≤ 2.00 mm) reported a change in color, compared with 64% of patients with thin SSM and 26% of patients with thick nodular melanoma (>2.00 mm). Conclusion Awareness of factors related to earlier detection of potentially fatal nodular melanomas, including the benefits of a physician examination, should be useful in enhancing public and professional education strategies. Particular awareness of clinical warning signs associated with thin nodular melanoma should allow for more prompt diagnosis and treatment of this subtype.
Resumo:
This study investigated the effects of visual status, driver age and the presence of secondary distracter tasks on driving performance. Twenty young (M = 26.8 years) and 19 old (M = 70.2 years) participants drove around a closed-road circuit under three visual (normal, simulated cataracts, blur) and three distracter conditions (none, visual, auditory). Simulated visual impairment, increased driver age and the presence of a distracter task detrimentally affected all measures of driving performance except gap judgments and lane keeping. Significant interaction effects were evident between visual status, age and distracters; simulated cataracts had the most negative impact on performance in the presence of visual distracters and a more negative impact for older drivers. The implications of these findings for driving behaviour and acquisition of driving-related information for people with common visual impairments are discussed
Resumo:
The Australian horror film is a fascinating specimen. While a tradition has antecedents in the silent era of cinema, and at times has produced popular and commercially successful titles, Australian horror films have existed among the shadows of Australian cinema. Within a national cinema funded by public subsidy to foster a sense of national identity, emphasizing ‘quality’ cultural films and refusing to recognize popular movie genres in attempt to differentiate itself from Hollywood, generic and low-culture horror films have been in opposition to these objectives. Consequently, horror movies have been heavily marginalized within public funding environments and mainstream film culture, and either ignored or despised by mainstream critics. The chapter provides a historical introduction to Australian horror cinema before reviewing a selection of recent Aussie horror titles, namely: Wolf Creek, Undead, Black Water, Dying Breed, Lost Things, Prey, Cut, Rogue and Storm Warning.