988 resultados para vulnerable road user
Resumo:
OBJECTIVE Little research has examined user perceptions of medication warnings about driving. Consumer perceptions of the Australian national approach to medication warnings about driving are examined. The Australian approach to warning presentation is compared with an alternative approach used in France. Visual characteristics of the warnings and overall warning readability are investigated. Risk perceptions and behavioral intentions associated with the warnings are also examined. METHOD Surveys were conducted with 358 public hospital outpatients in Queensland, Australia. Extending this investigation is a supplementary comparison study of French hospital outpatients (n = 75). RESULTS The results suggest that the Australian warning approach of using a combination of visual characteristics is important for consumers but that the use of a pictogram could enhance effects. Significantly higher levels of risk perception were found among the sample for the French highest severity label compared to the analogous mandatory Australian warning, with a similar trend evident in the French study results. The results also indicated that the French label was associated with more cautious behavioral intentions. CONCLUSION The results are potentially important for the Australian approach to medication warnings about driving impairment. The research contributes practical findings that can be used to enhance the effectiveness of warnings and develop countermeasures in this area. Hospital pharmacy patients should include persons with the highest level of likelihood of knowledge and awareness of medication warning labeling. Even in this context it appears that a review of the Australian warning system would be useful particularly in the context of increasing evidence relating to associated driving risks. Reviewing text size and readability of messages including the addition of pictograms, as well as clarifying the importance of potential risk in a general community context, is recommended for consideration and further research.
Resumo:
This project investigated 1) Australian web designers’ cultural perceptions towards Australian Indigenous users and 2) Australian Indigenous cultural features in terms of user interface design. In doing so, it reviews the literature of cross-cultural user interface design by focusing on feasible models and arguments to articulate and integrate Australian Indigenous Internet users’ cultural needs of web user interface. The online survey results collected from 101 Indigenous users and 126 Web designers showed a distinctive difference between them on the integration of Indigenous users' cultural in Web sites. The interview data collected from 14 Indigenous users and 14 web designers suggested practical approaches to the design implications of Indigenous culture.
Resumo:
Computational models represent a highly suitable framework, not only for testing biological hypotheses and generating new ones but also for optimising experimental strategies. As one surveys the literature devoted to cancer modelling, it is obvious that immense progress has been made in applying simulation techniques to the study of cancer biology, although the full impact has yet to be realised. For example, there are excellent models to describe cancer incidence rates or factors for early disease detection, but these predictions are unable to explain the functional and molecular changes that are associated with tumour progression. In addition, it is crucial that interactions between mechanical effects, and intracellular and intercellular signalling are incorporated in order to understand cancer growth, its interaction with the extracellular microenvironment and invasion of secondary sites. There is a compelling need to tailor new, physiologically relevant in silico models that are specialised for particular types of cancer, such as ovarian cancer owing to its unique route of metastasis, which are capable of investigating anti-cancer therapies, and generating both qualitative and quantitative predictions. This Commentary will focus on how computational simulation approaches can advance our understanding of ovarian cancer progression and treatment, in particular, with the help of multicellular cancer spheroids, and thus, can inform biological hypothesis and experimental design.
Resumo:
The study investigated the influence of traffic and land use parameters on metal build-up on urban road surfaces. Mathematical relationships were developed to predict metals originating from fuel combustion and vehicle wear. The analysis undertaken found that nickel and chromium originate from exhaust emissions, lead, copper and zinc from vehicle wear, cadmium from both exhaust and wear and manganese from geogenic sources. Land use does not demonstrate a clear pattern in relation to the metal build-up process, though its inherent characteristics such as traffic activities exert influence. The equation derived for fuel related metal load has high cross-validated coefficient of determination (Q2) and low Standard Error of Cross-Validation (SECV) values indicates that the model is reliable, while the equation derived for wear-related metal load has low Q2 and high SECV values suggesting its use only in preliminary investigations. Relative Prediction Error values for both equations are considered to be well within the error limits for a complex system such as an urban road surface. These equations will be beneficial for developing reliable stormwater treatment strategies in urban areas which specifically focus on mitigation of metal pollution.
Resumo:
Urban road dust comprises of a range of potentially toxic metal elements and plays a critical role in degrading urban receiving water quality. Hence, assessing the metal composition and concentration in urban road dust is a high priority. This study investigated the variability of metal composition and concentrations in road dust in 4 different urban land uses in Gold Coast, Australia. Samples from 16 road sites were collected and tested for selected 12 metal species. The data set was analyzed using both univariate and multivariate techniques. Outcomes of the data analysis revealed that the metal concentrations in road dust differ considerably within and between different land uses. Iron, aluminum, magnesium and zinc are the most abundant in urban land uses. It was also noted that metal species such as titanium, nickel, copper and zinc have the highest concentrations in industrial land use. The study outcomes revealed that soil and traffic related sources as key sources of metals deposited on road surfaces.
Resumo:
Term-based approaches can extract many features in text documents, but most include noise. Many popular text-mining strategies have been adapted to reduce noisy information from extracted features; however, text-mining techniques suffer from low frequency. The key issue is how to discover relevance features in text documents to fulfil user information needs. To address this issue, we propose a new method to extract specific features from user relevance feedback. The proposed approach includes two stages. The first stage extracts topics (or patterns) from text documents to focus on interesting topics. In the second stage, topics are deployed to lower level terms to address the low-frequency problem and find specific terms. The specific terms are determined based on their appearances in relevance feedback and their distribution in topics or high-level patterns. We test our proposed method with extensive experiments in the Reuters Corpus Volume 1 dataset and TREC topics. Results show that our proposed approach significantly outperforms the state-of-the-art models.
Resumo:
This study assessed the revised Behavioural Inhibition System (BIS), as conceptualised by Gray and McNaughton’s (2000) revised RST, by exposing participants to a loss-framed road safety message (emphasising the negative consequences of speeding behaviour) and a high performance motor vehicle promotional advertisement. Licensed young drivers (N = 40, aged 17–25 years) were randomly allocated to view either the message or both the message and advertisement. Participants then completed a computerised lexical decision task prior to completing three personality measures: Corr-Cooper RST-PQ, CARROT and Q-Task. It was predicted that those with a stronger BIS would demonstrate greater processing of these mixed message cues compared to weaker BIS individuals, and that this BIS effect would only be observed in the mixed cues condition (due to simultaneous activation of the incentive and punishment systems). Preliminary findings will be discussed in the context of the influence of personality traits on health message processing.
Resumo:
Scenario 1 A buys a two storey commercial building built along the only street frontage to the property. Vehicles cannot reach the rear of the property as the building extends across the entire width of the land. A bought the building with full knowledge that vehicular access to the rest of the property had been compromised by a desire to obtain maximum street frontage for the building which was occupied by a commercial tenant. On street parking is scarce in the surrounding area. A (to the knowledge of the adjoining owner B) constructs a carpark at the rear of the building. The employees of A’s tenant have been using the carpark obtaining access via a driveway on B’s land. To formalise this arrangement, A seeks a right of way for vehicles to travel down B’s driveway to access the carpark...
Resumo:
We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.
Resumo:
Mitchell critiques Georges Perec's Life a User's Manual, which articulates compellingly the confluence of literature and architecture studies that emerged in the late twentieth century. He argues the Perec's novel diverges from this tradition, for, rather than being a search for origins and true expression, Life a User's Manual denies the very possibility of originality. He adds that Perec's architext is de-constructive and ironic.
Resumo:
This paper describes the design and implementation of a wireless neural telemetry system that enables new experimental paradigms, such as neural recordings during rodent navigation in large outdoor environments. RoSco, short for Rodent Scope, is a small lightweight user-configurable module suitable for digital wireless recording from freely behaving small animals. Due to the digital transmission technology, RoSco has advantages over most other wireless modules of noise immunity and online user-configurable settings. RoSco digitally transmits entire neural waveforms for 14 of 16 channels at 20 kHz with 8-bit encoding which are streamed to the PC as standard USB audio packets. Up to 31 RoSco wireless modules can coexist in the same environment on non-overlapping independent channels. The design has spatial diversity reception via two antennas, which makes wireless communication resilient to fading and obstacles. In comparison with most existing wireless systems, this system has online user-selectable independent gain control of each channel in 8 factors from 500 to 32,000 times, two selectable ground references from a subset of channels, selectable channel grounding to disable noisy electrodes, and selectable bandwidth suitable for action potentials (300 Hz–3 kHz) and low frequency field potentials (4 Hz–3 kHz). Indoor and outdoor recordings taken from freely behaving rodents are shown to be comparable to a commercial wired system in sorting for neural populations. The module has low input referred noise, battery life of 1.5 hours and transmission losses of 0.1% up to a range of 10 m.
Resumo:
As the Journal of Media Innovations comes into existence, this article reflects on the first and most obvious question: just what do we mean by “media innovations”? Drawing on the examples of a range of recent innovations in media technologies and practices, initiated by a variety of media audiences, users, professionals, and providers, it explores the interplay between the different drivers of innovation and the effects of such innovation on the complex frameworks of contemporary society and the media ecology which supports it. In doing so, this article makes a number of key observations: first, it notes that media innovation is an innovation in media practices at least as much as in media technologies, and that changes to the practices of media both reflect and promote societal changes as well – media innovations are never just media technology innovations. Second, it shows that the continuing mediatisation of society, and the shift towards a more widespread participation of ordinary users as active content creators and media innovators, make it all the more important to investigate in detail these interlinked, incremental, everyday processes of media and societal change – media innovations are almost always also user innovations. Finally, it suggests that a full understanding of these processes as they unfold across diverse interleaved media spaces and complex societal structures necessarily requires a holistic perspective on media innovations, which considers the contemporary media ecology as a crucial constitutive element of societal structures and seeks to trace the repercussions of innovations across both media and society – media innovations are inextricably interlinked with societal innovations (even if, at times, they may not be considered to be improvements to the status quo).
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.