643 resultados para Safety-critical software


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This multidisciplinary research advanced the current understanding of self-regulation – a critical component in safe and sustainable mobility for older adults. It investigates the sociodemographic and psychosocial factors that underlies older adults' self-regulation, and examines their travel behaviours using a combination of self-report, in-vehicle and wearable devices. This research developed a novel theoretical model that significantly predicts self-regulation and objectively driving behaviours among older drivers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Safety of repair, maintenance, alteration, and addition (RMAA) works have long been neglected because RMAAworks are often minute and only last for a short period of time. With rising importance of the RMAA sector in many developed societies, safety of RMAA works has begun to draw attention. Many RMAA contracting companies are small- and medium-sized enterprises (SMEs) that do not have comprehensive safety management systems. Existing safety legislation and regulations for new construction sites are not fully applicable to RMAAworks. Instead of relying on explicit and well-established safety systems, tacit safety knowledge plays an extremely important role in RMAA projects. To improve safety of RMAAworks, safety knowledge should be better managed. However, safety knowledge is difficult to capture in RMAA works. This study aims to examine safety management practices of RMAA contracting companies to see how safety knowledge of RMAA projects is managed. Findings show that RMAA contracting companies undertaking large-scale RMAA projects have more initiatives of safety management. Safety management of small-scale RMAA works relies heavily on the motivation of site supervisors and self-regulation of workers. Better tacit knowledge management improves safety performance. To enhance safety capability of RMAA contracting companies, a knowledge sharing culture should be cultivated. The government should provide assistance to SMEs to implement proper safety management practices in small-sized projects. Potentials of applying computer software technology in RMAA projects to capture, store, and retrieve safety information should be explored. Employees should be motivated to share safety knowledge by giving proper recognition to those who are willing to share.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect criticalnational infrastructure and critical information infrastructure. In particular,this protection is crucial for the proper functioning of a modern society and for a government to fulfill one of its most important prerogatives – namely, the protection of its people. Computer networks have many benefits that governments, corporations, and individuals alike take advantage of in order to promote and perform their duties and roles. Today, there is almost complete dependence on private sector telecommunication infrastructures and the associated computer hardware and software systems.1 These infrastructures and systems even support government and defense activity.2 This Article discusses possible attacks on critical information infrastructures and the government reactions to these attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper elaborates on the Cybercars-2 Wireless Communication Framework for driverless city vehicles, which is used for Vehicle-to-Vehicle and Vehicle-to-Infrastructure communication. The developed framework improves the safety and efficiency of driverless city vehicles. Furthermore, this paper also elaborates on the vehicle control software architecture. On-road tests of both the communication framework and its application for real-time decision making show that the communication framework is reliable and useful for improving the safe operation of driverless city vehicles.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Engineering design processes are necessary to attain the requisite standards of integrity for high-assurance safety-related systems. Additionally, human factors design initiatives can provide critical insights that parameterise their development. Unfortunately, the popular perception of human factors as a “forced marriage” between engineering and psychology often provokes views where the ‘human factor’ is perceived as a threat to systems design. Some popular performance-based standards for developing safety-related systems advocate identifying and managing human factors throughout the system lifecycle. However, they also have a tendency to fall short in their guidance on the application of human factors methods and tools, let alone how the outputs generated can be integrated in to various stages of the design process. This case study describes a project that converged engineering with human factors to develop a safety argument for new low-cost railway level crossing technology for system-wide implementation in Australia. The paper enjoins the perspectives of a software engineer and cognitive psychologist and their involvement in the project over two years of collaborative work to develop a safety argument for low-cost level crossing technology. Safety and reliability requirements were informed by applying human factors analytical tools that supported the evaluation and quantification of human reliability where users interfaced with the technology. The project team was confronted with significant challenges in cross-disciplinary engagement, particularly with the complexities of dealing with incongruences in disciplinary language. They were also encouraged to think ‘outside the box’ as to how users of a system interpreted system states and ehaviour. Importantly, some of these states, while considered safe within the boundary of the constituent systems that implemented safety-related functions, could actually lead the users to engage in deviant behaviour. Psychology explained how user compliance could be eroded to levels that effectively undermined levels of risk reduction afforded by systems. Linking the engineering and psychology disciplines intuitively, overall safety performance was improved by introducing technical requirements and making design decisions that minimized the system states and behaviours that led to user deviancy. As a commentary on the utility of transdisciplinary collaboration for technical specification, the processes used to bridge the two disciplines are conceptualised in a graphical model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Malaria rapid diagnostic tests (RDTs) are increasingly used by remote health personnel with minimal training in laboratory techniques. RDTs must, therefore, be as simple, safe and reliable as possible. Transfer of blood from the patient to the RDT is critical to safety and accuracy, and poses a significant challenge to many users. Blood transfer devices were evaluated for accuracy and precision of volume transferred, safety and ease of use, to identify the most appropriate devices for use with RDTs in routine clinical care. Methods: Five devices, a loop, straw-pipette, calibrated pipette, glass capillary tube, and a new inverted cup device, were evaluated in Nigeria, the Philippines and Uganda. The 227 participating health workers used each device to transfer blood from a simulated finger-prick site to filter paper. For each transfer, the number of attempts required to collect and deposit blood and any spilling of blood during transfer were recorded. Perceptions of ease of use and safety of each device were recorded for each participant. Blood volume transferred was calculated from the area of blood spots deposited on filter paper. Results: The overall mean volumes transferred by devices differed significantly from the target volume of 5 microliters (p < 0.001). The inverted cup (4.6 microliters) most closely approximated the target volume. The glass capillary was excluded from volume analysis as the estimation method used is not compatible with this device. The calibrated pipette accounted for the largest proportion of blood exposures (23/225, 10%); exposures ranged from 2% to 6% for the other four devices. The inverted cup was considered easiest to use in blood collection (206/ 226, 91%); the straw-pipette and calibrated pipette were rated lowest (143/225 [64%] and 135/225 [60%] respectively). Overall, the inverted cup was the most preferred device (72%, 163/227), followed by the loop (61%, 138/227). Conclusions: The performance of blood transfer devices varied in this evaluation of accuracy, blood safety, ease of use, and user preference. The inverted cup design achieved the highest overall performance, while the loop also performed well. These findings have relevance for any point-of-care diagnostics that require blood sampling.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Enterprise Resource Planning (ERP) systems are integrated enterprise-wide standard information systems that automate all aspects of an organisations’ business processes. The ERP philosophy is that business systems incorporating sales, marketing, manufacturing, distribution, personnel and finance modules can be supported by a single integrated system with all of the company’s data captured in a central database. The ERP packages of vendors such as SAP, Baan, J.D. Edwards and Intentia represent more than a common systems platform for a business. They prescribe information blueprints of how organisation’s business processes should operate. In this paper, the scale and strategic importance of ERP systems is identified and the problem of ERP implementation is defined. Five company examples are analysed using a Critical Success Factors (CSFs) theoretical framework. The paper offers a framework for managers which provides the basis for developing an ERP implementation strategy. The case analysis identifies different approaches to ERP implementation, highlights the critical role of legacy systems in influencing the implementation process, and identifies the importance of business process change and software configuration in addition to factors already cited in the literature such as top management support and communication. The implications of the results and future research opportunities are outlined.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As organisations increasingly engage in the selection, purchase, and adoption of packaged software products, how these activities are carried out in practice becomes increasingly relevant for researchers and practitioners. Our focus in this paper is to propose a framework for understanding the packaged software selection process. The functionalist literature on this area of study suggests a number of generic recommendations, which are based on rational assumptions about the process and view the decision making that takes place as producing the “best technology solution.’” To explore this, we conducted a longitudinal, in-depth study of packaged software selection in a small organisation. For interpretation of the case, we draw upon the Social Construction of Technology, a theoretical framework arguing that technology is socially constituted and regarding the process of development as contradictory and uncertain. We offer a number of contributions. First, we further our understanding of packaged software selection with the critique that we offer of the functionalist literature, drawing insights from the emerging critical/constructivist literature and expanding our domain of interest to encompass the wider environment. Second, we weave this together with our experiences in the field, drawing on social constructivism for theoretical support, to develop a framework of packaged software selection that shows how various actors shape the process.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Injury is the leading cause of death among young people (AIHW, 2008). A primary contributing factor to injury among adolescents is risk taking behaviour, including road related risks such as risky bicycle and motorcycle use and riding with dangerous or drink-drivers. Injury rates increase dramatically throughout adolescence, at the same time as adolescents are becoming more involved in risk taking behaviour. Also throughout this period, adolescents‟ connectedness to school is decreasing (Monahan, Oesterle & Hawkins, 2010; Whitlock, 2004). School connectedness refers to „the extent to which students feel personally accepted, respected, included, and supported by others in the school‟ (Goodenow, 1993, p. 80), and has been repeatedly shown to be a critical protective factor in adolescent development. For example, school connectedness has been shown to be associated with decreased risk taking behaviour, including violence and alcohol and other drug use (e.g., Resnick et al., 1997), as well as with decreased transport risk taking and vehicle related injuries (Chapman et al., accepted April 2011). This project involved the pilot evaluation of a school connectedness intervention (a professional development program for teachers) to reduce adolescent risk taking behaviour and injury. This intervention has been developed for use as a component of the Skills for Preventing Injury in Youth (SPIY) curriculum based injury prevention program for early adolescents. The objectives of this research were to: 1. Implement a trial School Connectedness intervention (professional development program for teachers) in ACT high schools, and evaluate using comparison high schools. 2. Determine whether the School Connectedness program impacts on adolescent risk taking behaviour and associated injuries (particularly transport risks and injuries). 3. Evaluate the process effectiveness of the School Connectedness program.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Lack of detailed and accurate safety records on incidents in Australian work zones prevents a thorough understanding of the relevant risks and hazards. Consequently it is difficult to select appropriate treatments for improving the safety of roadworkers and motorists alike. This paper presents a method for making informed decisions about safety treatments by 1) identifying safety issues and hazards in work zones, 2) understanding the attitudes and perceptions of both roadworkers and motorists, 3) reviewing the effectiveness of work zone safety treatments according to existing research, and 4) incorporating local expert opinion on the feasibility and usefulness of the safety treatments. Using data collected through semi-structured interviews with roadwork personnel and online surveys of Queensland drivers, critical safety issues were identified. The effectiveness of treatments for addressing the issues was understood through rigorous literature review and consultations with local road authorities. Promising work zone safety treatments include enforcement, portable rumble strips, perceptual measures to imply reduced lane width, automated or remotely-operated traffic lights, end of queue measures, and more visible and meaningful signage.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Drawing from experience internationally, on recent and important developments in regulatory theory, and upon models and approaches constructed during the author's empirical research, this book addresses the question: how can law influence the internal self-regulation of organisations in order to make them more responsive to occupational health and safety concerns? In this context, it is argued that Occupational Health and Safety management systems have the potential to stimulate models of self-organisation within firms in such a way as to make them self-reflective and to encourage informal self-critical reflection about their occupational health and safety performance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Structural equation modeling (SEM) is a versatile multivariate statistical technique, and applications have been increasing since its introduction in the 1980s. This paper provides a critical review of 84 articles involving the use of SEM to address construction related problems over the period 1998–2012 including, but not limited to, seven top construction research journals. After conducting a yearly publication trend analysis, it is found that SEM applications have been accelerating over time. However, there are inconsistencies in the various recorded applications and several recurring problems exist. The important issues that need to be considered are examined in research design, model development and model evaluation and are discussed in detail with reference to current applications. A particularly important issue concerns the construct validity. Relevant topics for efficient research design also include longitudinal or cross-sectional studies, mediation and moderation effects, sample size issues and software selection. A guideline framework is provided to help future researchers in construction SEM applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The estimation of the critical gap has been an issue since the 1970s, when gap acceptance was introduced to evaluate the capacity of unsignalized intersections. The critical gap is the shortest gap that a driver is assumed to accept. A driver’s critical gap cannot be measured directly and a number of techniques have been developed to estimate the mean critical gaps of a sample of drivers. This paper reviews the ability of the Maximum Likelihood technique and the Probability Equilibrium Method to predict the mean and standard deviation of the critical gap with a simulation of 100 drivers, repeated 100 times for each flow condition. The Maximum Likelihood method gave consistent and unbiased estimates of the mean critical gap. Whereas the probability equilibrium method had a significant bias that was dependent on the flow in the priority stream. Both methods were reasonably consistent, although the Maximum Likelihood Method was slightly better. If drivers are inconsistent, then again the Maximum Likelihood method is superior. A criticism levelled at the Maximum Likelihood method is that a distribution of the critical gap has to be assumed. It was shown that this does not significantly affect its ability to predict the mean and standard deviation of the critical gaps. Finally, the Maximum Likelihood method can predict reasonable estimates with observations for 25 to 30 drivers. A spreadsheet procedure for using the Maximum Likelihood method is provided in this paper. The PEM can be improved if the maximum rejected gap is used.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Critical to the research of urban morphologists is the availability of historical records that document the urban transformation of the study area. However, thus far little work has been done towards an empirical approach to the validation of archival data in this field. Outlined in this paper, therefore, is a new methodology for validating the accuracy of archival records and mapping data, accrued through the process of urban morphological research, so as to establish a reliable platform from which analysis can proceed. The paper particularly addresses the problems of inaccuracies in existing curated historical information, as well as errors in archival research by student assistants, which together give rise to unacceptable levels of uncertainty in the documentation. The paper discusses the problems relating to the reliability of historical information, demonstrates the importance of data verification in urban morphological research, and proposes a rigorous method for objective testing of collected archival data through the use of qualitative data analysis software.