979 resultados para Private Vehicle Transportation.
Resumo:
Recent scholarship has considered the implications of the rise of voluntary private standards in food and the role of private actors in a rapidly evolving, de-facto ‘mandatory’ sphere of governance. Standards are an important element of this globalising private sphere, but are an element that has been relatively peripheral in analyses of power in agri-food systems. Sociological thought has countered orthodox views of standards as simple tools of measurement, instead understanding their function as a governance mechanism that transforms many things, and people, during processes of standardisation. In a case study of the Australian retail supermarket duopoly and the proprietary standards required for market access this paper foregrounds retailers as standard owners and their role in third-party auditing and certification. Interview data from primary research into Australia’s food standards captures the multifaceted role supermarkets play as standard-owners, who are found to impinge on the independence of third-party certification while enforcing rigorous audit practices. We show how standard owners, in attempting to standardize the audit process, generate tensions within certification practices in a unique example of ritualism around audit. In examining standards to understand power in contemporary food governance, it is shown that retailers are drawn beyond standard-setting into certification and enforcement, that is characterized by a web of institutions and actors whose power to influence outcomes is uneven.
Resumo:
The older adult population (65 years and over) represents a rapid growing segment of the population in many developed countries. Unlike earlier cohorts of older drivers that included many who were familiar with public transportation, the present cohort of older drivers historically has a greater reliance on the private automobile as their main form of transportation. Recent studies of older adults’ travel patterns reported automobile to be responsible for over 80% of the total number of hours spent on all trips. While older drivers, as a group, does not demonstrate a particular road risk, the evident demographic change and the increased physical fragility and severity of crash-related injuries makes older driver safety a prevalent public health issue. This study systematically reviewed the safety and mobility outcomes of existing strategies used internationally to manage older driver safety, with a specific focus on age-based testing (ABT), license restriction and self-regulation (i.e. voluntary limiting driving in potentially hazardous situations). ABT remains the most commonly adopted strategy by licensing authorities both within Australia and internationally. Heterogeneity in the development of functional declines, and in driving behaviours within the older driver population, makes age an unreliable index of driving capacity. Given the counter-productive safety and mobility outcomes of ABT strategies, their continued popularity within both the legislative and public domains remains problematic. Self-regulation may provide greater potential for reducing older drivers’ crash risk while maintaining their mobility and independence. The current body of literature on older drivers’ self-regulation is systematically reviewed. Despite being promoted by researchers and licensing authorities as a strategy to maintain older driver safety and mobility, the proportion of older drivers who self-regulate, and exactly how they do so, remains unclear. Future research on older drivers’ adoption of self-regulation, particularly the underlying psychological factors that underlies this process, is needed in order to promote its use within the older driver community.
Resumo:
Solutions to remedy the voltage disturbances have been mostly suggested only for industrial customers. However, not much research has been done on the impact of the voltage problems on residential facilities. This paper proposes a new method to reduce the effect of voltage dip and swell in smart grids equipped by communication systems. To reach this purpose, a voltage source inverter and the corresponding control system are employed. The behavior of a power system during voltage dip and swell are analyzed. The results demonstrate reasonable improvement in terms of voltage dip and swell mitigation. All simulations are implemented in MATLAB/Simulink environment.
Resumo:
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.
Resumo:
This study assessed the revised Behavioural Inhibition System (BIS), as conceptualised by Gray and McNaughton’s (2000) revised RST, by exposing participants to a loss-framed road safety message (emphasising the negative consequences of speeding behaviour) and a high performance motor vehicle promotional advertisement. Licensed young drivers (N = 40, aged 17–25 years) were randomly allocated to view either the message or both the message and advertisement. Participants then completed a computerised lexical decision task prior to completing three personality measures: Corr-Cooper RST-PQ, CARROT and Q-Task. It was predicted that those with a stronger BIS would demonstrate greater processing of these mixed message cues compared to weaker BIS individuals, and that this BIS effect would only be observed in the mixed cues condition (due to simultaneous activation of the incentive and punishment systems). Preliminary findings will be discussed in the context of the influence of personality traits on health message processing.
Resumo:
Real-time image analysis and classification onboard robotic marine vehicles, such as AUVs, is a key step in the realisation of adaptive mission planning for large-scale habitat mapping in previously unexplored environments. This paper describes a novel technique to train, process, and classify images collected onboard an AUV used in relatively shallow waters with poor visibility and non-uniform lighting. The approach utilises Förstner feature detectors and Laws texture energy masks for image characterisation, and a bag of words approach for feature recognition. To improve classification performance we propose a usefulness gain to learn the importance of each histogram component for each class. Experimental results illustrate the performance of the system in characterisation of a variety of marine habitats and its ability to operate onboard an AUV's main processor suitable for real-time mission planning.
Resumo:
This paper describes the experimental evaluation of a novel Autonomous Surface Vehicle capable of navigating complex inland water reservoirs and measuring a range of water quality properties and greenhouse gas emissions. The 16 ft long solar powered catamaran is capable of collecting water column profiles whilst in motion. It is also directly integrated with a reservoir scale floating sensor network to allow remote mission uploads, data download and adaptive sampling strategies. This paper describes the onboard vehicle navigation and control algorithms as well as obstacle avoidance strategies. Experimental results are shown demonstrating its ability to maintain track and avoid obstacles on a variety of large-scale missions and under differing weather conditions, as well as its ability to continuously collect various water quality parameters complimenting traditional manual monitoring campaigns.
Resumo:
This paper describes a novel Autonomous Surface Vehicle capable of navigating throughout complex inland water storages and measuring a range of water quality properties and greenhouse gas emissions. The 16 ft long solar powered catamaran can collect this information throughout the water column whilst the vehicle is moving. A unique feature of this ASV is its integration into a storage scale floating sensor network to allow remote mission uploads, data download and adaptive sampling strategies. This paper provides an overview of the vehicle design and operation including control, laser-based obstacle avoidance, and vision-based inspection capabilities. Experimental results are shown illustrating its ability to continuously collect key water quality parameters and compliment intensive manual monitoring campaigns.
Resumo:
This paper describes the development of a novel vision-based autonomous surface vehicle with the purpose of performing coordinated docking manoeuvres with a target, such as an autonomous underwater vehicle, at the water's surface. The system architecture integrates two small processor units; the first performs vehicle control and implements a virtual force based docking strategy, with the second performing vision-based target segmentation and tracking. Furthermore, the architecture utilises wireless sensor network technology allowing the vehicle to be observed by, and even integrated within an ad-hoc sensor network. Simulated and experimental results are presented demonstrating the autonomous vision- based docking strategy on a proof-of-concept vehicle.
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
User-generated content plays a pivotal role in the current social media. The main focus, however, has been on the explicitly generated user content such as photos, videos and status updates on different social networking sites. In this paper, we explore the potential of implicitly generated user content, based on users’ online consumption behaviors. It is technically feasible to record users’ consumption behaviors on mobile devices and share that with relevant people. Mobile devices with such capabilities could enrich social interactions around the consumed content, but it may also threaten users’ privacy. To understand the potentials of this design direction we created and evaluated a low-fidelity prototype intended for photo sharing within private groups. Our prototype incorporates two design concepts, namely, FingerPrint and MoodPhotos that leverage users’ consumption history and emotional responses. In this paper, we report user values and user acceptance of this prototype from three participatory design workshops.
Resumo:
Musculoskeletal pain is commonly reported by police officers. A potential cause of officer discomfort is a mismatch between vehicle seats and the method used for carrying appointments. Twenty-five police officers rated their discomfort while seated in: (1) a standard police vehicle seat, and (2) a vehicle seat custom-designed for police use. Discomfort was recorded in both seats while wearing police appointments on: (1) a traditional appointments belt, and (2) a load-bearing vest / belt combination (LBV). Sitting in the standard vehicle seat and carrying appointments on a traditional appointments belt were both associated with significantly elevated discomfort. Four vehicle seat features were most implicated as contributing to discomfort: back rest bolster prominence; lumbar region support; seat cushion width; and seat cushion bolster depth. Authorising the carriage of appointments using a LBV is a lower cost solution with potential to reduce officer discomfort. Furthermore, the introduction of custom-designed vehicle seats should be considered.
Resumo:
In this paper, an integrated inter-vehicles wireless communications and positioning system supporting alternate positioning techniques is proposed to meet the requirements of safety applications of Cooperative Intelligent Transportation Systems (C-ITS). Recent advances have repeatedly demonstrated that road safety problems can be to a large extent addressed via a range of technologies including wireless communications and positioning in vehicular environments. The novel communication stack utilizing a dedicated frequency spectrum (e.g. at 5.9 GHz band), known as Dedicated Short-Range Communications (DSRC), has been particularly designed for Wireless Access in Vehicular Environments (WAVE) to support safety applications in highly dynamic environments. Global Navigation Satellite Systems (GNSS) is another essential enabler to support safety on rail and roads. Although current vehicle navigation systems such as single frequency Global Positioning System (GPS) receivers can provide route guidance with 5-10 meters (road-level) position accuracy, positioning systems utilized in C-ITS must provide position solutions with lane-level and even in-lane-level accuracies based on the requirements of safety applications. This article reviews the issues and technical approaches that are involved in designing a vehicular safety communications and positioning architecture; it also provides technological solutions to further improve vehicular safety by integrating the DSRC and GNSS-based positioning technologies.
Resumo:
At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.
Resumo:
Temporary Traffic Control Plans (TCP’s), which provide construction phasing to maintain traffic during construction operations, are integral component of highway construction project design. Using the initial design, designers develop estimated quantities for the required TCP devices that become the basis for bids submitted by highway contractors. However, actual as-built quantities are often significantly different from the engineer’s original estimate. The total cost of TCP phasing on highway construction projects amounts to 6–10% of the total construction cost. Variations between engineer estimated quantities and final quantities contribute to reduced cost control, increased chances of cost related litigations, and bid rankings and selection. Statistical analyses of over 2000 highway construction projects were performed to determine the sources of variation, which later were used as the basis of development for an automated-hybrid prediction model that uses multiple regressions and heuristic rules to provide accurate TCP quantities and costs. The predictive accuracy of the model developed was demonstrated through several case studies.