962 resultados para Car owners


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wheel–rail interaction is one of the most important research topics in railway engineering. It involves track impact response, track vibration and track safety. Track structure failures caused by wheel–rail impact forces can lead to significant economic loss for track owners through damage to rails and to the sleepers beneath. Wheel–rail impact forces occur because of imperfections in the wheels or rails such as wheel flats, irregular wheel profiles, rail corrugations and differences in the heights of rails connected at a welded joint. A wheel flat can cause a large dynamic impact force as well as a forced vibration with a high frequency, which can cause damage to the track structure. In the present work, a three-dimensional (3-D) finite element (FE) model for the impact analysis induced by the wheel flat is developed by use of the finite element analysis (FEA) software package ANSYS and validated by another validated simulation. The effect of wheel flats on impact forces is thoroughly investigated. It is found that the presence of a wheel flat will significantly increase the dynamic impact force on both rail and sleeper. The impact force will monotonically increase with the size of wheel flats. The relationships between the impact force and the wheel flat size are explored from this finite element analysis and they are important for track engineers to improve their understanding of the design and maintenance of the track system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: This research investigates older people’s use of transportation to develop strategies for age-friendly transportation within the community. Methods: Data for this study was derived from Global Positioning System (GPS) tracking of thirteen people aged 55 years and older, together with self-report information recorded in travel diaries about daily activities undertaken outside the home over a period of seven days. Semi-structured interviews were aided by individual maps to investigate engagement in out-of-home activities and verify the recorded GPS data. Results: Overall, participants were highly reliant on the car for daily commuting. Walking, biking and public transport options were unattractive due to environmental conditions, accessibility and usability. Conclusion: Participation within the community and access to services is facilitated by private and public transportation. It is therefore critical to address accessibility and usability issues faced by older people to enable them to maintain their mobility, and ensure access to services, especially when driving ceases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The deployment of new emerging technologies, such as cooperative systems, allows the traffic community to foresee relevant improvements in terms of traffic safety and efficiency. Vehicles are able to communicate on the local traffic state in real time, which could result in an automatic and therefore better reaction to the mechanism of traffic jam formation. An upstream single hop radio broadcast network can improve the perception of each cooperative driver within radio range and hence the traffic stability. The impact of a cooperative law on traffic congestion appearance is investigated, analytically and through simulation. Ngsim field data is used to calibrate the Optimal Velocity with Relative Velocity (OVRV) car following model and the MOBIL lane-changing model is implemented. Assuming that congestion can be triggered either by a perturbation in the instability domain or by a critical lane changing behavior, the calibrated car following behavior is used to assess the impact of a microscopic cooperative law on abnormal lane changing behavior. The cooperative law helps reduce and delay traffic congestion as it increases traffic flow stability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The focus of governments on increasing active travel has motivated renewed interest in cycling safety. Bicyclists are up to 20 times more likely to be involved in serious injury crashes than drivers so understanding the relationship among factors in bicyclist crash risk is critically important for identifying effective policy tools, for informing bicycle infrastructure investments, and for identifying high risk bicycling contexts. This study aims to better understand the complex relationships between bicyclist self reported injuries resulting from crashes (e.g. hitting a car) and non-crashes (e.g. spraining an ankle) and perceived risk of cycling as a function of cyclist exposure, rider conspicuity, riding environment, rider risk aversion, and rider ability. Self reported data from 2,500 Queensland cyclists are used to estimate a series of seemingly unrelated regressions to examine the relationships among factors. The major findings suggest that perceived risk does not appear to influence injury rates, nor do injury rates influence perceived risks of cycling. Riders who perceive cycling as risky tend not to be commuters, do not engage in group riding, tend to always wear mandatory helmets and front lights, and lower their perception of risk by increasing days per week of riding and by increasing riding proportion on bicycle paths. Riders who always wear helmets have lower crash injury risk. Increasing the number of days per week riding tends to decrease both crash injury and non crash injury risk (e.g. a sprain). Further work is needed to replicate some of the findings in this study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australia should introduce a transformative use exception. Transformative use is an important part of the copyright balance: it provides a mechanism through which to balance the rights of past authors against the interests of future authors. In the interests of promoting creativity and innovation, the impact of copyright law on the ability of Australians to create new works should be minimised. The scope of a transformative use exception should be based primarily on demonstrable harm to the direct licensing interests of copyright owners – the core of copyright. Importantly, however, there are unresolved questions about fairness that need to be more clearly addressed before the appropriate scope of a transformative use exception can be determined. This submission does not directly address the desirability of introducing a broader fair use right. It is likely that an open ended fair use exception is required to provide a more adequate balance between copyright owners and non-transformative users of copyright. If a broad fair use style exception is introduced, it would likely be desirable to include transformative uses within that exception. This submission, however, takes the more limited position that regardless of whether a fair use exception is introduced, an exception that permits unlicensed transformative uses is required in Australian copyright law.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intelligent Transport Systems (ITS) resembles the infrastructure for ubiquitous computing in the car. It encompasses a) all kinds of sensing technologies within vehicles as well as road infrastructure, b) wireless communication protocols for the sensed information to be exchanged between vehicles (V2V) and between vehicles and infrastructure (V2I), and c) appropriate intelligent algorithms and computational technologies that process these real-time streams of information. As such, ITS can be considered a game changer. It provides the fundamental basis of new, innovative concepts and applications, similar to the Internet itself. The information sensed or gathered within or around the vehicle has led to a variety of context-aware in-vehicular technologies within the car. A simple example is the Anti-lock Breaking System (ABS), which releases the breaks when sensors detect that the wheels are locked. We refer to this type of context awareness as vehicle/technology awareness. V2V and V2I communication, often summarized as V2X, enables the exchange and sharing of sensed information amongst cars. As a result, the vehicle/technology awareness horizon of each individual car is expanded beyond its observable surrounding, paving the way to technologically enhance such already advanced systems. In this chapter, we draw attention to those application areas of sensing and V2X technologies, where the human (driver), the human’s behavior and hence the psychological perspective plays a more pivotal role. The focal points of our project are illustrated in Figure 1: In all areas, the vehicle first (1) gathers or senses information about the driver. Rather than to limit the use of such information towards vehicle/technology awareness, we see great potential for applications in which this sensed information is then (2) fed back to the driver for an increased self-awareness. In addition, by using V2V technologies, it can also be (3) passed to surrounding drivers for an increased social awareness, or (4), pushed even further, into the cloud, where it is collected and visualized for an increased, collective urban awareness within the urban community at large, which includes all city dwellers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many state of the art vision-based Simultaneous Localisation And Mapping (SLAM) and place recognition systems compute the salience of visual features in their environment. As computing salience can be problematic in radically changing environments new low resolution feature-less systems have been introduced, such as SeqSLAM, all of which consider the whole image. In this paper, we implement a supervised classifier system (UCS) to learn the salience of image regions for place recognition by feature-less systems. SeqSLAM only slightly benefits from the results of training, on the challenging real world Eynsham dataset, as it already appears to filter less useful regions of a panoramic image. However, when recognition is limited to specific image regions performance improves by more than an order of magnitude by utilising the learnt image region saliency. We then investigate whether the region salience generated from the Eynsham dataset generalizes to another car-based dataset using a perspective camera. The results suggest the general applicability of an image region salience mask for optimizing route-based navigation applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For the evaluation, design, and planning of traffic facilities and measures, traffic simulation packages are the de facto tools for consultants, policy makers, and researchers. However, the available commercial simulation packages do not always offer the desired work flow and flexibility for academic research. In many cases, researchers resort to designing and building their own dedicated models, without an intrinsic incentive (or the practical means) to make the results available in the public domain. To make matters worse, a substantial part of these efforts pertains to rebuilding basic functionality and, in many respects, reinventing the wheel. This problem not only affects the research community but adversely affects the entire traffic simulation community and frustrates the development of traffic simulation in general. For this problem to be addressed, this paper describes an open source approach, OpenTraffic, which is being developed as a collaborative effort between the Queensland University of Technology, Australia; the National Institute of Informatics, Tokyo; and the Technical University of Delft, the Netherlands. The OpenTraffic simulation framework enables academies from geographic areas and disciplines within the traffic domain to work together and contribute to a specific topic of interest, ranging from travel choice behavior to car following, and from response to intelligent transportation systems to activity planning. The modular approach enables users of the software to focus on their area of interest, whereas other functional modules can be regarded as black boxes. Specific attention is paid to a standardization of data inputs and outputs for traffic simulations. Such standardization will allow the sharing of data with many existing commercial simulation packages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Queensland Government has implemented strategies promoting a shift from individual car use to active transport, a transition which requires drivers to adapt to sharing the road with increased numbers of people cycling through transport network. For this to occur safely, changes in both road infrastructure and road user expectations and behaviors will be needed. Creating separate cycle infrastructure does not remove the need for cyclists to commence, cross or finish travel on shared roads. Currently intersections are one of the predominant shared road spaces where crashes result in cyclists being injured or killed. This research investigates how Brisbane cyclists and drivers perceive risk when interacting with other road users at intersections. The current study replicates a French study conducted by co-authors Chaurand and Delhomme in 2011 and extends it to assess gender effects which have been reported in other Australian cycling research. An online survey was administered to experienced cyclists and drivers. Participants rated the level of risk they felt when imagining a number of different road situations. Based on the earlier French study it is expected that perceived crash risk will be influenced both by the participant’s mode of travel and the type of interacting vehicle and perceived risk will be greater when the interaction is with a car than a bicycle. It is predicted that risk perception will decrease as the level of experience increases and that male participants will have a higher perception of skill and lower perception of risk than females. The findings of this Queensland study will provide a valuable insight into perceived risk and the traffic behaviours of drivers and cyclists when interacting with other road users and results will be available for presentation at the Congress.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper begins by providing an overview of bike share programs, followed by a critical examination of the growing body of literature on these programs. This synthesis of previous works, both peer-reviewed and grey, includes an identification of the current gaps in knowledge related to the impacts of bike sharing programs. This synthesis represents a critically needed evaluation of the current state of global bike share research, in order to better understand, and maximize the effectiveness of current and future programs. Several consistent themes have emerged within the growing body of research on bike share programs. Firstly, the importance bike share members place on convenience and value for money appears paramount in their motivation to sign up and use these programs. Secondly, and somewhat counter intuitively, scheme members are more likely to own and use private bicycles than non-members. Thirdly, users demonstrate a greater reluctance to wear helmets than private bicycle riders and helmets have acted as a deterrent in jurisdictions in which helmets are mandatory. Finally, and perhaps most importantly from a sustainable transport perspective, the majority of scheme users are substituting from sustainable modes of transport rather than the car.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Series reactors are used in distribution grids to reduce the short-circuit fault level. Some of the disadvantages of the application of these devices are the voltage drop produced across the reactor and the steep front rise of the transient recovery voltage (TRV), which generally exceeds the rating of the associated circuit breaker. Simulations were performed to compare the characteristics of a saturated core High-Temperature Superconducting Fault Current Limiter (HTS FCL) and a series reactor. The design of the HTS FCL was optimized using the evolutionary algorithm. The resulting Pareto frontier curve of optimum solution is presented in this paper. The results show that the steady-state impedance of an HTS FCL is significantly lower than that of a series reactor for the same level of fault current limiting. Tests performed on a prototype 11 kV HTS FCL confirm the theoretical results. The respective transient recovery voltages (TRV) of the HTS FCL and an air core reactor of comparable fault current limiting capability are also determined. The results show that the saturated core HTS FCL has a significantly lower effect on the rate of rise of the circuit breaker TRV as compared to the air core reactor. The simulations results are validated with shortcircuit test results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on the implementation of a non-invasive electroencephalography-based brain-computer interface to control functions of a car in a driving simulator. The system is comprised of a Cleveland Medical Devices BioRadio 150 physiological signal recorder, a MATLAB-based BCI and an OKTAL SCANeR advanced driving experience simulator. The system utilizes steady-state visual-evoked potentials for the BCI paradigm, elicited by frequency-modulated high-power LEDs and recorded with the electrode placement of Oz-Fz with Fz as ground. A three-class online brain-computer interface was developed and interfaced with an advanced driving simulator to control functions of the car, including acceleration and steering. The findings are mainly exploratory but provide an indication of the feasibility and challenges of brain-controlled on-road cars for the future, in addition to a safe, simulated BCI driving environment to use as a foundation for research into overcoming these challenges.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Failure to give way by motor vehicles is a factor in many collisions with both powered and unpowered two wheelers (TWs). Motor vehicle drivers often report that they did not see the TW, but research has shown that motor vehicle drivers who have experience riding a motorcycle are less likely to fail to detect motorcycles. The research reported here examines whether this phenomenon extends to detection of bicycles and whether car drivers who have experience with one mode of TW show improved detection of the other mode. A driving simulator study was conducted in an Australian urban setting which incorporated some of the most common car-TW crash scenarios. Participants with car-only, car plus motorcycle, car plus bicycle, and car plus bicycle plus motorcycle experience operated a car simulator. Their interactions with both types of TWs were measured in terms of visual detection, lateral distance and speed when approaching and passing. The effects of different levels of colour and lighting of the TWs on driver responses were also examined. The attitudes of participants towards TWs were measured in a questionnaire.