933 resultados para collision avoidance


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Safety at railway level crossings (RLX) is one part of a wider picture of safety within the whole transport system. Governments, the rail industry and road organisations have used a variety of countermeasures for many years to improve RLX safety. New types of interventions are required in order to reduce the number of crashes and associated social costs at railway crossings. This paper presents the results of a large research program which aimed to assess the effectiveness of emerging Intelligent Transport Systems (ITS) interventions, both on-road and in-vehicle based, to improve the safety of car drivers at RLXs in Australia. The three most promising technologies selected from the literature review and focus groups were tested in an advanced driving simulator to provide a detailed assessment of their effects on driver behaviour. The three interventions were: (i) in-vehicle visual warning using a GPS/smartphone navigation-like system, (ii) in-vehicle audio warning and; (iii) on-road intervention known as valet system (warning lights on the road surface activated as a train approaches). The effects of these technologies on 57 participants were assessed in a systematic approach focusing on the safety of the intervention, effects on the road traffic around the crossings and driver’s acceptance of the technology. Given that the ITS interventions were likely to provide a benefit by improving the driver’s awareness of the crossing status in low visibility conditions, such conditions were investigated through curves in the track before arriving at the crossing. ITS interventions were also expected to improve driver behaviour at crossings with high traffic (blocking back issue), which were also investigated at active crossings. The key findings are: (i) interventions at passive crossings are likely to provide safety benefits; (ii) the benefits of ITS interventions on driver behaviour at active crossings are limited; (iii) the trialled ITS interventions did not show any issues in terms of driver distraction, driver acceptance or traffic delays; (iv) these interventions are easy to use, do not increase driver workload substantially; (v) participants’ intention to use the technology is high and; (vi) participants saw most value in succinct messages about approaching trains as opposed to knowing the RLX locations or the imminence of a collision with a train.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In June 2012 Prime Minister Gillard appointed an Expert Panel on Asylum Seekers to provide advice on policy options 'to prevent asylum seekers rising their lives on dangerous boat journeys to Australia'. This article examines the establishment of that Committee against the backdrop of an increasing number of boat arrivals, of deaths at sea and the failure of Government policy responses to prevent them. It examines the recommendations of the Expert Panel and considers the punitive outcome of some of these recommendations including the 'no advantage' test. It evaluates Kevin Rudd's Regional Resettlement Arrangement with Papua New Guinea and concludes that Australian and regional initiatives need to focus on protection of asylum seekers, not deterrence or avoidance of international obligations

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper provides a three-layered framework to monitor the positioning performance requirements of Real-time Relative Positioning (RRP) systems of the Cooperative Intelligent Transport Systems (C-ITS) that support Cooperative Collision Warning (CCW) applications. These applications exploit state data of surrounding vehicles obtained solely from the Global Positioning System (GPS) and Dedicated Short-Range Communications (DSRC) units without using other sensors. To this end, the paper argues the need for the GPS/DSRC-based RRP systems to have an autonomous monitoring mechanism, since the operation of CCW applications is meant to augment safety on roads. The advantages of autonomous integrity monitoring are essential and integral to any safety-of-life system. The autonomous integrity monitoring framework proposed necessitates the RRP systems to detect/predict the unavailability of their sub-systems and of the integrity monitoring module itself, and, if available, to account for effects of data link delays and breakages of DSRC links, as well as of faulty measurement sources of GPS and/or integrated augmentation positioning systems, before the information used for safety warnings/alarms becomes unavailable, unreliable, inaccurate or misleading. Hence, a monitoring framework using a tight integration and correlation approach is proposed for instantaneous reliability assessment of the RRP systems. Ultimately, using the proposed framework, the RRP systems will provide timely alerts to users when the RRP solutions cannot be trusted or used for the intended operation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Small firms are popularly viewed as resistant to complying with regulation. Harmonisation of Australia’s state-based work health and safety regimes is a significant regulatory change. In this article, we consider the likely responses of small firms to work health and safety harmonisation and argue that a range of choices are open to small firm owner-managers. These choices are shaped by individuals’ world views and are influenced by elements in the firms’ context. A significant element is the public narrative of work health and safety harmonisation, which can be understood by using discourse and sense-making concepts. Our analysis of small firm owner-manager choices takes into account small firms’ embeddedness in their regulatory context and the influence on organisational decision-making of the narrative of work health and safety harmonisation. The dominant narrative is arguably silent on the benefits of the work health and safety regulatory change and therefore the response of small firms is likely to be avoidance or minimalism. Non-compliance could be the result due to poor awareness of opportunities arising from this regulatory change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The extensive use of alkoxyamines in controlled radical polymerisation and polymer stabilisation is based on rapid cycling between the alkoxyamine (R1R2NO–R3) and a stable nitroxyl radical (R1R2NO•) via homolysis of the labile O–C bond. Competing homolysis of the alkoxyamine N–O bond has been predicted to occur for some substituents leading to production of aminyl and alkoxyl radicals. This intrinsic competition between the O–C and N–O bond homolysis processes has to this point been difficult to probe experimentally. Herein we examine the effect of local molecular structure on the competition between N–O and O–C bond cleavage in the gas phase by variable energy tandem mass spectrometry in a triple quadrupole mass spectrometer. A suite of cyclic alkoxyamines with remote carboxylic acid moieties (HOOC–R1R2NO–R3) were synthesised and subjected to negative ion electrospray ionisation to yield [M – H]− anions where the charge is remote from the alkoxyamine moiety. Collision-induced dissociation of these anions yield product ions resulting, almost exclusively, from homolysis of O–C and/or N–O bonds. The relative efficacy of N–O and O–C bond homolysis was examined for alkoxyamines incorporating different R3 substituents by varying the potential difference applied to the collision cell, and comparing dissociation thresholds of each product ion channel. For most R3 substituents, product ions from homolysis of the O–C bond are observed and product ions resulting from cleavage of the N–O bond are minor or absent. A limited number of examples were encountered however, where N–O homolysis is a competitive dissociation pathway because the O–C bond is stabilised by adjacent heteroatom(s) (e.g., R3 = CH2F). The dissociation threshold energies were compared for different alkoxyamine substituents (R3) and the relative ordering of these experimentally determined energies is shown to correlate with the bond dissociation free energies, calculated by ab initio methods. Understanding the structure-dependent relationship between these rival processes will assist in the design and selection of alkoxyamine motifs that selectively promote the desirable O–C homolysis pathway.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Work zone safety studies have traditionally relied on historical crash records—an approach which is reactive in nature as it requires crashes to accumulate first before taking any preventive actions. However, detailed and accurate data on work zone crashes are often not available, as is the case for Australian road work zones. The lack of reliable safety records and the reactive nature of the crash-based safety analysis approach motivated this research to seek alternative and proactive measures of safety. Various surrogate measures of safety have been developed in the traffic safety literature including time to collision, time to accident, gap time, post encroachment time, required deceleration rate, proportion of stopping distances, lateral distance to departure, and time to departure. These measures express how close road-user(s) are from a potential crash by analysing their movement trajectories. A review of this fast-growing literature is presented in this paper from the viewpoint of applying the measures to untangle work zone safety issues. The review revealed that the use of the surrogate measures is very limited for analysing work zone safety, although numerous studies have used these measures for analysing safety in other parts of the road network, such as intersections and motorway ramps. There exist great opportunities for adopting this proactive safety assessment approach to transform work zone safety for both roadworkers and motorists.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The reinforcing effects of aversive outcomes on avoidance behaviour are well established. However, their influence on perceptual processes is less well explored, especially during the transition from adolescence to adulthood. Using electroencephalography, we examined whether learning to actively or passively avoid harm can modulate early visual responses in adolescents and adults. The task included two avoidance conditions, active and passive, where two different warning stimuli predicted the imminent, but avoidable, presentation of an aversive tone. To avoid the aversive outcome, participants had to learn to emit an action (active avoidance) for one of the warning stimuli and omit an action for the other (passive avoidance). Both adults and adolescents performed the task with a high degree of accuracy. For both adolescents and adults, increased N170 event-related potential amplitudes were found for both the active and the passive warning stimuli compared with control conditions. Moreover, the potentiation of the N170 to the warning stimuli was stable and long lasting. Developmental differences were also observed; adolescents showed greater potentiation of the N170 component to danger signals. These findings demonstrate, for the first time, that learned danger signals in an instrumental avoidance task can influence early visual sensory processes in both adults and adolescents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A framework supporting the systematic development of safety cases for Unmanned Aircraft System (UAS) operations in a broad range of civil and commercial applications is presented. The case study application is the use of UAS for disaster response. In those States where regulations do not preclude UAS operations altogether, approvals for UAS operations can be granted on a case-by-case basis contingent on the provision of a safety case acceptable to the relevant National Airworthiness Authority (NAA). A safety case for UAS operations must show how the risks associated with the hazards have been managed to an acceptable level. The foundational components necessary for structuring and assessing these safety cases have not yet been proposed. Barrier-bow-tie models are used in this paper to structure the safety case for the two primary hazards of 1) a ground impact, and 2) a Mid-Air Collision (MAC). The models establish the set of Risk Control Variables (RCVs) available to reduce the risk. For the ground-impact risk model, seven RCVs are identified which in combination govern the probability of an accident. Similarly, ten RCVs are identified within the MAC model. The effectiveness of the RCVs and how they can implemented in terms of processes, policies, devices, practices, or other actions for each of the case-study applications are discussed. The framework presented can provide for the more systematic and consistent regulation of UAS through a "safety target" approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose To investigate the effect of different levels of refractive blur on real-world driving performance measured under day and nighttime conditions. Methods Participants included 12 visually normal, young adults (mean age = 25.8 ± 5.2 years) who drove an instrumented research vehicle around a 4 km closed road circuit with three different levels of binocular spherical refractive blur (+0.50 diopter sphere [DS], +1.00 DS, +2.00 DS) compared with a baseline condition. The subjects wore optimal spherocylinder correction and the additional blur lenses were mounted in modified full-field goggles; the order of testing of the blur conditions was randomized. Driving performance was assessed in two different sessions under day and nighttime conditions and included measures of road signs recognized, hazard detection and avoidance, gap detection, lane-keeping, sign recognition distance, speed, and time to complete the course. Results Refractive blur and time of day had significant effects on driving performance (P < 0.05), where increasing blur and nighttime driving reduced performance on all driving tasks except gap judgment and lane keeping. There was also a significant interaction between blur and time of day (P < 0.05), such that the effects of blur were exacerbated under nighttime driving conditions; performance differences were evident even for +0.50 DS blur relative to baseline for some measures. Conclusions The effects of blur were greatest under nighttime conditions, even for levels of binocular refractive blur as low as +0.50 DS. These results emphasize the importance of accurate and up-to-date refractive correction of even low levels of refractive error when driving at night.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Strengthening of metallic structures using carbon fibre reinforced polymer (CFRP) has become a smart strengthening option over the conventional strengthening method. Transverse impact loading due to accidental vehicular collision can lead to the failure of existing steel hollow tubular columns. However, knowledge is very limited on the behaviour of CFRP strengthened steel members under dynamic impact loading condition. This paper deals with the numerical simulation of CFRP strengthened square hollow section (SHS) steel columns under transverse impact loading to predict the behaviour and failure modes. The transverse impact loading is simulated using finite element (FE) analysis based on numerical approach. The accuracy of the FE modelling is ensured by comparing the predicted results with available experimental tests. The effects of impact velocity, impact mass, support condition, axial loading and CFRP thickness are examined through detail parametric study. The impact simulation results indicate that the strengthening technique shows an improved impact resistance capacity by reducing lateral displacement of the strengthened column about 58% compared to the bare steel column. Axial loading plays an important role on the failure behaviour of tubular column.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This cross-sectional study examined the association between controlling feeding practices and children's appetite traits. The secondary aim studied the relationship between controlling feeding practices and two proxy indicators of diet quality. Participants were 203 Australian-Indian mothers with children aged 1-5 years. Controlling feeding practices (pressure to eat, restriction, monitoring) and children's appetite traits (. food approach traits: food responsiveness, enjoyment of food, desire to drink, emotional overeating; food avoidance traits: satiety responsiveness, slowness in eating, fussiness and emotional undereating) were measured using self-reported, previously validated scales/questionnaires. Children's daily frequency of consumption of core and non-core foods was estimated using a 49-item list of foods eaten (yes/no) in the previous 24 hours as an indicator of diet quality. Higher pressure to eat was associated with higher scores for satiety responsiveness, slowness in eating, fussiness and lower score for enjoyment of food. Higher restriction was related to higher scores for food responsiveness and emotional overeating. Higher monitoring was inversely associated with fussiness, slowness in eating, food responsiveness and emotional overeating and positively associated with enjoyment of food. Pressure to eat and monitoring were related to lower number of core and non-core foods consumed in the previous 24 hours, respectively. All associations remained significant after adjusting for maternal and child covariates (n = 152 due to missing data). In conclusion, pressure to eat was associated with higher food avoidance traits and lower consumption of core foods. Restrictive feeding practices were associated with higher food approach traits. In contrast, monitoring practices were related to lower food avoidance and food approach traits and lower non-core food consumption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Safety is one of the major world health issues, and is even more acute for “vulnerable” road users, pedestrians and cyclists. At the same time, public authorities are promoting the active modes of transportation that involve these very users for their health benefits. It is therefore important to understand the factors and designs that provide the best safety for vulnerable road users and encourage more people to use these modes. Qualitative and quantitative shortcomings of collisions make it necessary to use surrogate measures of safety in studying these modes. Some interactions without a collision such as conflicts can be good surrogates of collisions as they are more frequent and less costly. To overcome subjectivity and reliability challenges, automatic conflict analysis using video cameras and deriving users’ trajectories is a solution to overcome shortcomings of manual conflict analysis. The goal of this paper is to identify and characterize various interactions between cyclists and pedestrians at bus stops along bike paths using a fully automated process. Three conflict severity indicators are calculated and adapted to the situation of interest to capture those interactions. A microscopic analysis of users’ behavior is proposed to explain interactions more precisely. Eventually, the study aims to show the capability of automatically collecting and analyzing data for pedestrian-cyclist interactions at bus stops along segregated bike paths in order to better understand the actual and perceived risks of these facilities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-length block cipher based compression functions assuming that the underlying block cipher has no weaknesses. They showed that 12 out of 64 possible compression functions are collision and (second) preimage resistant. Black, Rogaway and Shrimpton formally proved this result in the ideal cipher model. However, in the indifferentiability security framework introduced by Maurer, Renner and Holenstein, all these 12 schemes are easily differentiable from a fixed input-length random oracle (FIL-RO) even when their underlying block cipher is ideal. We address the problem of building indifferentiable compression functions from the PGV compression functions. We consider a general form of 64 PGV compression functions and replace the linear feed-forward operation in this generic PGV compression function with an ideal block cipher independent of the one used in the generic PGV construction. This modified construction is called a generic modified PGV (MPGV). We analyse indifferentiability of the generic MPGV construction in the ideal cipher model and show that 12 out of 64 MPGV compression functions in this framework are indifferentiable from a FIL-RO. To our knowledge, this is the first result showing that two independent block ciphers are sufficient to design indifferentiable single-block-length compression functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social marketing by Western governments that use fear tactics and threatening information to promote anti-drinking messages has polarized ‘binge drinking’ and ‘moderate drinking’ through a continuum that implies benefits and harms for both individuals and society. With the goal of extending insights into social marketing approaches that promote safer drinking cultures in Australia, we discuss findings from a study that examines alcohol consumers' moderate-drinking intentions. By applying the theory of planned behaviour and emotions theory, we discuss survey results from a sample of alcohol consumers, which demonstrate that positively framed value propositions that evoke happiness and love are more influential in the processing of an alcohol moderation message for alcohol consumers. The key limitations of this study are the cross-sectional nature of the data and the focal-dependent variable being behavioural intentions rather than behaviours. Research insight into the stronger influence of positive emotions on processing an alcohol moderation message establishes an important avenue for future social marketing communications that moves beyond negative, avoidance appeals to promote behaviour change in drinkers. These research findings will benefit professionals involved in developing social change campaigns that promote and reinforce consumers' positive intentions, with messages about the benefits of controlled, moderate drinking.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).