132 resultados para Dangerous consumptions


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driving on an approach to a signalized intersection while distracted is particularly dangerous, as potential vehicular conflicts and resulting angle collisions tend to be severe. Given the prevalence and importance of this particular scenario, the decisions and actions of distracted drivers during the onset of yellow lights are the focus of this study. Driving simulator data were obtained from a sample of 58 drivers under baseline and handheld mobile phone conditions at the University of Iowa - National Advanced Driving Simulator. Explanatory variables included age, gender, cell phone use, distance to stop-line, and speed. Although there is extensive research on drivers’ responses to yellow traffic signals, the examination has been conducted from a traditional regression-based approach, which does not necessary provide the underlying relations and patterns among the sampled data. In this paper, we exploit the benefits of both classical statistical inference and data mining techniques to identify the a priori relationships among main effects, non-linearities, and interaction effects. Results suggest that novice (16-17 years) and young drivers’ (18-25 years) have heightened yellow light running risk while distracted by a cell phone conversation. Driver experience captured by age has a multiplicative effect with distraction, making the combined effect of being inexperienced and distracted particularly risky. Overall, distracted drivers across most tested groups tend to reduce the propensity of yellow light running as the distance to stop line increases, exhibiting risk compensation on a critical driving situation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we are going to consider how language and practice interact in the process of supporting the learning of students with diverse abilities. You will learn that it is necessary for teachers to understand that while labels carry an administrative function in schools, when used carelessly they operate to stigmatise and exclude those whom we are working to include. This chapter will introduce the concept of equity and explain how the dilemma of difference emerges when we try to determine who should receive support and how. The chapter will also explain how an appreciation of language can help to inform and transform our pedagogy. An example of inclusion in action is provided to illustrate how inclusive language in practice can promote deep cultural changes that benefit both students and teachers. The process of determining appropriate and effective education of students with additional support requirements is troubled by what some refer to as the ‘dilemma of difference’. This dilemma derives mainly from the nature of language and our need to use certain words, terms and categories in order to share common understandings. Without these, educators cannot hope to arrive on the same page, yet such words can take on a life of their own; influencing thoughts, perspectives and attitudes in ways that far outstrip original intentions. The drive for clarity, however, through definition and diagnostic classification can ultimately obscure because of the cultural meanings that become invested within these terms through their use over time and in different professional contexts. In effect, trying to define “difference” in order to provide the right support to particular students is a process that entrenches normative boundaries that in turn create, accentuate and stigmatise whatever we have decided constitutes difference. Language is thus a powerful and dangerous weapon but, like other weapons, language can both hurt and defend. Understanding the power of language enables educators to use it both wisely and safely to the maximum benefit of their students. This chapter will discuss how teachers can recognise and support their students in ways that avoid stigma and the closure of stereotyping.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Boron–nitrogen containing compounds with high hydrogen contents as represented by ammonia borane (NH3BH3) have recently attracted intense interest for potential hydrogen storage applications. One such compound is [(NH3)2BH2]B3H8 with a capacity of 18.2 wt% H. Two safe and efficient synthetic routes to [(NH3)2BH2]B3H8 have been developed for the first time since it was discovered 50 years ago. The new synthetic routes avoid a dangerous starting chemical, tetraborane (B4H10), and afford a high yield. Single crystal X-ray diffraction analysis reveals N–Hδ+Hδ−–B dihydrogen interactions in the [(NH3)2BH2]B3H8·18-crown-6 adduct. Extended strong dihydrogen bonds were observed in pure [(NH3)2BH2]B3H8 through crystal structure solution based upon powder X-ray analysis. Pyrolysis of [(NH3)2BH2]B3H8 leads to the formation of hydrogen gas together with appreciable amounts of volatile boranes below 160 °C.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ambiguity resolution plays a crucial role in real time kinematic GNSS positioning which gives centimetre precision positioning results if all the ambiguities in each epoch are correctly fixed to integers. However, the incorrectly fixed ambiguities can result in large positioning offset up to several meters without notice. Hence, ambiguity validation is essential to control the ambiguity resolution quality. Currently, the most popular ambiguity validation is ratio test. The criterion of ratio test is often empirically determined. Empirically determined criterion can be dangerous, because a fixed criterion cannot fit all scenarios and does not directly control the ambiguity resolution risk. In practice, depending on the underlying model strength, the ratio test criterion can be too conservative for some model and becomes too risky for others. A more rational test method is to determine the criterion according to the underlying model and user requirement. Miss-detected incorrect integers will lead to a hazardous result, which should be strictly controlled. In ambiguity resolution miss-detected rate is often known as failure rate. In this paper, a fixed failure rate ratio test method is presented and applied in analysis of GPS and Compass positioning scenarios. A fixed failure rate approach is derived from the integer aperture estimation theory, which is theoretically rigorous. The criteria table for ratio test is computed based on extensive data simulations in the approach. The real-time users can determine the ratio test criterion by looking up the criteria table. This method has been applied in medium distance GPS ambiguity resolution but multi-constellation and high dimensional scenarios haven't been discussed so far. In this paper, a general ambiguity validation model is derived based on hypothesis test theory, and fixed failure rate approach is introduced, especially the relationship between ratio test threshold and failure rate is examined. In the last, Factors that influence fixed failure rate approach ratio test threshold is discussed according to extensive data simulation. The result shows that fixed failure rate approach is a more reasonable ambiguity validation method with proper stochastic model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Oceania has a relatively low level of crime prevalence yet in the smaller and under-developed PICs we have shown that transnational crime has become increasingly common. A risk contained but potentially dangerous if state failure or fragility undermines law enforcement capacities. We predict that as the pace of globalization quickens and the demand for raw materials and resources grows some parts of the Pacific will be prone to criminal enterprises run by both indigenous and foreign crime groups. Australia and New Zealand will remain attractors of illicit goods notably ATS but will in turn be source countries for diminishing fish stock such as beche de mere and abalone as well forest timber. Finally the role of states such as Australia and New Zealand in helping to maintain law enforcement capacities throughout the region will be crucial if organized crime in Oceania is to be kept in check while demand for illicit resources grow.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Oceania has a relatively low level of crime prevalence yet in the smaller and under-developed PICs we have shown that transnational crime has become increasingly common. A risk contained but potentially dangerous if state failure or fragility undermines law enforcement capacities. We predict that as the pace of globalization quickens and the demand for raw materials and resources grows some parts of the Pacific will be prone to criminal enterprises run by both indigenous and foreign crime groups. Australia and New Zealand will remain attractors of illicit goods notably ATS but will in turn be source countries for diminishing fish stock such as beche de mere and abalone as well forest timber. Finally the role of states such as Australia and New Zealand in helping to maintain law enforcement capacities throughout the region will be crucial if organized crime in Oceania is to be kept in check while demand for illicit resources grow.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driving can be dangerous, especially for young and inexperienced drivers. To help address the issue of inexperience a gamified logbook application was developed for Learner drivers. The application aims to encourage learners to undertake a wider range of practice, while also making it easier to record their mandatory practice sessions. This paper reports on the design of this application, focusing on the effect that adding gamification can have on the usability and user experience of the application and the importance of playability testing for gamified systems. Two versions of the application were developed, one with game elements and one without game elements. This paper presents findings from a study that compares the user experience of these two versions of the application with twelve recent Learner drivers. Overall, participants reported that the gamified version was more engaging and motivating than the non-gamified version, however neither versions were preferred over the other. We theorise that this may have occurred due to a number of usability issues that arose, including an increased difficulty in learnability due to the added game elements. These design issues are important to address in future gamified system designs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mass flows on volcanic islands generated by volcanic lava dome collapse and by larger-volume flank collapse can be highly dangerous locally and may generate tsunamis that threaten a wider area. It is therefore important to understand their frequency, emplacement dynamics, and relationship to volcanic eruption cycles. The best record of mass flow on volcanic islands may be found offshore, where most material is deposited and where intervening hemipelagic sediment aids dating. Here we analyze what is arguably the most comprehensive sediment core data set collected offshore from a volcanic island. The cores are located southeast of Montserrat, on which the Soufriere Hills volcano has been erupting since 1995. The cores provide a record of mass flow events during the last 110 thousand years. Older mass flow deposits differ significantly from those generated by the repeated lava dome collapses observed since 1995. The oldest mass flow deposit originated through collapse of the basaltic South Soufriere Hills at 103-110 ka, some 20-30 ka after eruptions formed this volcanic center. A ∼1.8 km3 blocky debris avalanche deposit that extends from a chute in the island shelf records a particularly deep-seated failure. It likely formed from a collapse of almost equal amounts of volcanic edifice and coeval carbonate shelf, emplacing a mixed bioclastic-andesitic turbidite in a complex series of stages. This study illustrates how volcanic island growth and collapse involved extensive, large-volume submarine mass flows with highly variable composition. Runout turbidites indicate that mass flows are emplaced either in multiple stages or as single events.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Adopting a traffic safety culture approach, this paper identifies and discusses the ongoing challenge of promoting the road safety message in Australia. It is widely acknowledged that mass media and public education initiatives have played a critical role in the significant positive changes witnessed in community attitudes to road safety in the last three to four decades. It could be argued that mass media and education have had a direct influence on behaviours and attitudes, as well as an indirect influence through signposting and awareness raising functions in conjunction with enforcement. Great achievements have been made in reducing fatalities on Australia’s roads; a concept which is well understood among the international road safety fraternity. How well these achievements are appreciated by the general Australian community however, is not clear. This paper explores the lessons that can be learnt from successes in attitudinal and behaviour change in regard to seatbelt use and drink driving in Australia. It also identifies and discusses key challenges associated with achieving further positive changes in community attitudes and behaviours, particularly in relation to behaviours that may not be perceived by the community as dangerous, such as speeding and mobile phone use while driving. Potential strategies for future mass media and public education campaigns to target these challenges are suggested, including ways of harnessing the power of contemporary traffic law enforcement techniques, such as point-to-point speed enforcement and in-vehicle technologies, to help spread the road safety message.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Shakespeare’s Hamlet has in recent years been used by a number of young adult novels to define and authorise representations of gendered adolescent subjectivity. In so doing, these novels attend not only to Shakespeare’s play but also to other adaptations of the play. For example, the long cultural history of Ophelia being used as a template for depicting adolescent femininity as risky or dangerous is as influential as the play itself in early twenty-first century novels. This paper reads such novels for the ways in which codes of gender and of genre circulate in adolescent fiction when linked explicitly with Shakespearean texts and traditions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The term 'penal populism' is now reflexively used by criminologists to describe what many see as a dominant trend within penal policymaking in many western countries. The epithet 'populist' is used with no Jess frequency by media and other public commentators to refer (always pejoratively) to this or that political announcement, policy or style of political leadership, whether the context be specifically related to crime or some other arena of public affairs. In most accounts 'penal populism' (or 'populist punitiveness': Bottoms, 1995) is treated as a composite term. The two words are inseparably coupled and it is the penal that receives most of the detailed attention. As in more general political commentary, populism is tacitly understood as a negative and rather dangerous phenomenon, suggestive of manipulation, shallow-ness and demagoguery: in short, a corruption of normal, healthy democratic politics. As against such accounts, I want to suggest that debate about penal policymaking and its future -and particularly the prospects for more progressive policymaking in the area -would be assisted if populism was taken more seriously both conceptually and politically. This requires a decoupling of the concept of populism from what is habitually taken to be its punitive partner and that which defines its content. Currently the term is used without clear definition, let alone conceptual elaboration, to reference political pathology. Instead populism should be examined as a regular, meaningful dimension of contemporary political practice that has to be understood and engaged, not just denounced and extirpated. That is, I am seeking to make a case for bringing populism in from the despised margins to the centre of political practice and reflection. I will also briefly consider some of the implications this may have for penal politics specifically.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Design of hydraulic turbines has often to deal with hydraulic instability. It is well-known that Francis and Kaplan types present hydraulic instability in their design power range. Even if modern CFD tools may help to define these dangerous operating conditions and optimize runner design, hydraulic instabilities may fortuitously arise during the turbine life and should be timely detected in order to assure a long-lasting operating life. In a previous paper, the authors have considered the phenomenon of helical vortex rope, which happens at low flow rates when a swirling flow, in the draft tube conical inlet, occupies a large portion of the inlet. In this condition, a strong helical vortex rope appears. The vortex rope causes mechanical effects on the runner, on the whole turbine and on the draft tube, which may eventually produce severe damages on the turbine unit and whose most evident symptoms are vibrations. The authors have already shown that vibration analysis is suitable for detecting vortex rope onset, thanks to an experimental test campaign performed during the commissioning of a 23 MW Kaplan hydraulic turbine unit. In this paper, the authors propose a sophisticated data driven approach to detect vortex rope onset at different power load, based on the analysis of the vibration signals in the order domain and introducing the so-called "residual order spectrogram", i.e. an order-rotation representation of the vibration signal. Some experimental test runs are presented and the possibility to detect instability onset, especially in real-time, is discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The monstrous landscape and the revenge of nature are recurring motifs in Australian cinema. In the horror genre, the idea of the monstrous landscape emerges from, and builds upon, an established tradition in Australian cinema in which landscape functions not just as a setting for action, but also as a character in its own right. Rather than a picturesque wilderness or countryside, or a serene natural world untainted by civilisation – representations common in landscape cinema celebrating positive aspects of the Australian ‘outback’ – the monstrous landscape is a dangerous, malevolent and threatening force. Drawing upon themes also common in Australian Gothic narratives such as entrapment in a hostile environment, isolation and fear of the unknown (Turcotte, 1988, see also Jonathan Rayner’s essay in this volume), the monstrous landscape acts according to its own logic indecipherable to non-Indigenous Australians and is represented in terms of its alien-ness and inhuman horror.