14 resultados para Nebraska. State Railway Commission
em Queensland University of Technology - ePrints Archive
Resumo:
On the back of the growing capacity of networked digital information technologies to process and visualise large amounts of information in a timely, efficient and user-driven manner we have seen an increasing demand for better access to and re-use of public sector information (PSI). The story is not a new one. Share knowledge and together we can do great things; limit access and we reduce the potential for opportunity. The two volumes of this book seek to explain and analyse this global shift in the way we manage public sector information. In doing so they collect and present papers, reports and submissions on the topic by leading authors and institutions from across the world. These in turn provide people tasked with mapping out and implementing information policy with reference material and practical guidance. Volume 1 draws together papers on the topic by policymakers, academics and practitioners while Volume 2 presents a selection of the key reports and submissions that have been published over the last few years.
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Resumo:
Many infrastructure and necessity systems such as electricity and telecommunication in Europe and the Northern America were used to be operated as monopolies, if not state-owned. However, they have now been disintegrated into a group of smaller companies managed by different stakeholders. Railways are no exceptions. Since the early 1980s, there have been reforms in the shape of restructuring of the national railways in different parts of the world. Continuous refinements are still conducted to allow better utilisation of railway resources and quality of service. There has been a growing interest for the industry to understand the impacts of these reforms on the operation efficiency and constraints. A number of post-evaluations have been conducted by analysing the performance of the stakeholders on their profits (Crompton and Jupe 2003), quality of train service (Shaw 2001) and engineering operations (Watson 2001). Results from these studies are valuable for future improvement in the system, followed by a new cycle of post-evaluations. However, direct implementation of these changes is often costly and the consequences take a long period of time (e.g. years) to surface. With the advance of fast computing technologies, computer simulation is a cost-effective means to evaluate a hypothetical change in a system prior to actual implementation. For example, simulation suites have been developed to study a variety of traffic control strategies according to sophisticated models of train dynamics, traction and power systems (Goodman, Siu and Ho 1998, Ho and Yeung 2001). Unfortunately, under the restructured railway environment, it is by no means easy to model the complex behaviour of the stakeholders and the interactions between them. Multi-agent system (MAS) is a recently developed modelling technique which may be useful in assisting the railway industry to conduct simulations on the restructured railway system. In MAS, a real-world entity is modelled as a software agent that is autonomous, reactive to changes, able to initiate proactive actions and social communicative acts. It has been applied in the areas of supply-chain management processes (García-Flores, Wang and Goltz 2000, Jennings et al. 2000a, b) and e-commerce activities (Au, Ngai and Parameswaran 2003, Liu and You 2003), in which the objectives and behaviour of the buyers and sellers are captured by software agents. It is therefore beneficial to investigate the suitability or feasibility of applying agent modelling in railways and the extent to which it might help in developing better resource management strategies. This paper sets out to examine the benefits of using MAS to model the resource management process in railways. Section 2 first describes the business environment after the railway 2 Modelling issues on the railway resource management process using MAS reforms. Then the problems emerge from the restructuring process are identified in section 3. Section 4 describes the realisation of a MAS for railway resource management under the restructured scheme and the feasible studies expected from the model.
Resumo:
Mandatory data breach notification has become a matter of increasing concern for law reformers. In Australia, this issue was recently addressed as part of a comprehensive review of privacy law conducted by the Australian Law Reform Commission (ALRC) which recommended a uniform national regime for protecting personal information applicable to both the public and private sectors. As in all federal systems, the distribution of powers between central and state governments poses problems for national consistency. In the authors’ view, a uniform approach to mandatory data breach notification has greater merit than a ‘jurisdiction specific’ approach epitomized by US state-based laws. The US response has given rise to unnecessary overlaps and inefficiencies as demonstrated by a review of different notification triggers and encryption safe harbors. Reviewing the US response, the authors conclude that a uniform approach to data breach notification is inherently more efficient.
Resumo:
This paper introduces an event-based traffic model for railway systems adopting fixed-block signalling schemes. In this model, the events of trains' arrival at and departure from signalling blocks constitute the states of the traffic flow. A state transition is equivalent to the progress of the trains by one signalling block and it is realised by referring to past and present states, as well as a number of pre-calculated look-up tables of run-times in the signalling block under various signalling conditions. Simulation results are compared with those from a time-based multi-train simulator to study the improvement of processing time and accuracy.
Resumo:
In December 1993, the Commonwealth Assistant Treasurer., Mr George Gear announced an Inquiry into Charitable Organisations in Australia. The inquiry would be undertaken by the Industry Commission, the structure charged by the Commonwealth to oversight its micro-economic reform agenda. The inquiry had been on the Industry Commission's forward workplan since 1992. In July 1993 a draft terms of reference was prepared for comment by the State Premiers...
Resumo:
The draft report of the Industry Commission's charitable organisations inquiry introduces a new term for nonprofit organisations delivering human services. The new term is "community social welfare organisation" or "CSWO". The report recommends that tax deductibility of donations be extended such organisations. It then hints at making the definition of CSWO a standard criteria for state taxation exemptions. This paper examines the definition of the new term community social welfare organisation and charts its possible consequences if adopted by the federal government. The promise of tax deductibility status to previously shunned organisations is largely illusory. The Commission's aim of simplification through clarification of the definition is flawed and will not reduce the administration costs for the Australian Tax Office (ATO) or organisations.
Resumo:
Collisions between pedestrians and vehicles continue to be a major problem throughout the world. Pedestrians trying to cross roads and railway tracks without any caution are often highly susceptible to collisions with vehicles and trains. Continuous financial, human and other losses have prompted transport related organizations to come up with various solutions addressing this issue. However, the quest for new and significant improvements in this area is still ongoing. This work addresses this issue by building a general framework using computer vision techniques to automatically monitor pedestrian movements in such high-risk areas to enable better analysis of activity, and the creation of future alerting strategies. As a result of rapid development in the electronics and semi-conductor industry there is extensive deployment of CCTV cameras in public places to capture video footage. This footage can then be used to analyse crowd activities in those particular places. This work seeks to identify the abnormal behaviour of individuals in video footage. In this work we propose using a Semi-2D Hidden Markov Model (HMM), Full-2D HMM and Spatial HMM to model the normal activities of people. The outliers of the model (i.e. those observations with insufficient likelihood) are identified as abnormal activities. Location features, flow features and optical flow textures are used as the features for the model. The proposed approaches are evaluated using the publicly available UCSD datasets, and we demonstrate improved performance using a Semi-2D Hidden Markov Model compared to other state of the art methods. Further we illustrate how our proposed methods can be applied to detect anomalous events at rail level crossings.
Resumo:
Passively protected railway crossings are a major rail safety issue in Australia. Such crossings cannot be upgraded as such crossings are too numerous and the cost involved is prohibitive. Advanced Driver Assistance Systems (ADAS) have been shown to improve road safety and are widely used. These systems could be a solution to improve safety of passively protected crossings at a lower cost. Such complementary ADAS could result in driver’s over-trust due to the absence of Humane Machine Interface reflecting the quality of the information or the state of the ADAS (failure status). This paper demonstrates that driver’s exposure to crossing exhibiting fail-safe and non-fail safe properties could result in improperly allocating trust between technologies. We conducted a driving simulator study where participants (N=58) were exposed to three types of level crossing warning system on passive and active crossings. The results show that a significant proportion of participants over-trust the ADAS. Such drivers exhibit the same driving performance with the ADAS as when exposed to infrastructure based active crossing protection. They do not take the necessary safety precautions as they have a faster speed approach, reduced number of gaze toward the rail tracks and fail to stop at the crossing.
Resumo:
10 page document containing expert assessment of shortcomings of Western Australian State Planning Policy SPP3.7- Planning for Bushfire Risk Management. Document produced on behalf of QUT and submitted to and published by the WAPC as part of their public consultation process for their draft policy.
Resumo:
The advent of the Australian Charities and Not-for-profits Commission (ACNC) in 2012 and submission of Annual Information Statements (AIS) in 2013 by those charities which registered with them, have allowed new measures to be taken of charities and their activities. This report examines the filed AIS data for Queensland charities and compares it with the overall Australian population of charities.
Resumo:
There are currently 23,500 level crossings in Australia, broadly divided active level crossings with flashing lights; and passive level crossings controlled by stop and give way signs. The current strategy is to annually upgrade passive level crossings with active controls within a given budget, but the 5,900 public passive crossings are too numerous to be upgraded all. The rail industry is considering alternative options to treat more crossings. One of them is to use lower cost equipment with reduced safety integrity level, but with a design that would fail to a safe state: in case of the impossibility for the system to know whether a train is approaching, the crossing changes to a passive crossing. This is implemented by having a STOP sign coming in front of the flashing lights. While such design is considered safe in terms of engineering design, questions remain on human factors. In order to evaluate whether such approach is safe, we conducted a driving simulator study where participants were familiarized with the new active crossing, before changing the signage to a passive crossing. Our results show that drivers treated the new crossing as an active crossing after the novelty effect had passed. While most participants did not experience difficulties with the crossing being turned back to a passive crossing, a number of participants experienced difficulties stopping in time at the first encounter of such passive crossing. Worse, a number of drivers never realized the signage had changed, highlighting the link between the decision to brake and stop at an active crossing to the lights flashing. Such results show the potential human factor issues of changing an active crossing to a passive crossing in case of failure of the detection of the train.
Introducing a new limit states design concept to railway concrete sleepers: An Australian experience
Resumo:
Over 50 years, a large number of research and development projects with respect to the use of cementitious and concrete materials for manufacturing railway sleepers have been significantly progressed in Australia, Europe, and Japan (Wang, 1996; Murray and Cai, 1998; Wakui and Okuda, 1999; Esveld, 2001; Freudenstein and Haban, 2006; Remennikov and Kaewunruen, 2008). Traditional sleeper materials are timber, steel, and concrete. Cost-efficiency, superior durability, and improved track stability are the main factors toward significant adoption of concrete materials for railway sleepers. The sleepers in a track system, as shown in Figure 1, are subjected to harsh and aggressive external forces and natural environments across a distance. Many systemic problems and technical issues associated with concrete sleepers have been tackled over decades. These include pre-mature failures of sleepers, concrete cancer or ettringite, abrasion of railseats and soffits, impact damages by rail machinery, bond-slip damage, longitudinal and lateral instability of track system, dimensional instability of sleepers, nuisance noise and vibration, and so on (Pfeil, 1997; Gustavson, 2002; Kaewunruen and Remennikov, 2008a,b, 2013). These issues are, however, becoming an emerging risk for many countries (in North and South Americas, Asia, and the Middle East) that have recently installed large volumes of concrete sleepers in their railway networks (Federal Railroad Administration, 2013). As a result, it is vital to researchers and practitioners to critically review and learn from previous experience and lessons around the world.