Overtaking behavior - driver behavior, Other Subject

Assignment Help:

Overtaking Behavior - Driver Behavior

One of the most dangerous operations in driving is to overtake another vehicle. The driver's attention is on his way forwards, and sometimes does not use the rear-view mirror or it is unhelpful because of the blind spot.

Crawford (1963) have concluded that drivers should not hesitate when commencing the overtaking manouevre as it has an impact on road safety and they will take a longer time to act. The overtaking failures contribute to fatal accidents.  

Gordon and Mart (1968) claimed in their study that drivers unable to estimate the overtaking distances and safety margins correctly because these depend on the speed of the involved vehicles especially the overtaken vehicle. In the research, they only focused on how drivers can estimate the required distances to overtake. 

Overtaking is the most complex driving subtask including observing, information processing, decision making, planning, manoeuvring, and other traffic. An overtaking maneuver consists of three phases:

a) diverting from the original lane,

b) driving straight in the adjacent lane, and

c) returning to the lane. The overtaking situation for a two-lane road.


Related Discussions:- Overtaking behavior - driver behavior

Operational management, in what way is product strategy linked to product d...

in what way is product strategy linked to product decision?

Meteorology, Meteorology: Meteorology is the interdisciplinary scientific ...

Meteorology: Meteorology is the interdisciplinary scientific study of the atmosphere. Studies in the field stretch back millennia, though significant progress in meteorology did n

Differences that exist between the two traditions, Problem: 1. Section...

Problem: 1. Section "the client and the self" refers. Critically compare the benefits of the two approaches. What could be the major factors affecting the use of such approach

Peer-to-peer network architecture, Compariso n to Peer-to-Peer architectur...

Compariso n to Peer-to-Peer architecture One more type of network architecture is recognized as peer-to-peer, because every host or instance of the program can at the same tim

Demilitarised zone, a) (i) Various technologies exist that ensure that an ...

a) (i) Various technologies exist that ensure that an e-banking organisation network boundaries are secure from cyber attacks and intrusion. Briefly describe any two technologies

Explain the term cognitive dissonance, Problem 1: (a) Explain the term ...

Problem 1: (a) Explain the term cognitive dissonance. (b) How can cognitive dissonance act as a powerful motivator? (c) How can the Attribution theory be used to motivate

Monitor network entities, Monitor network entities: Name         ...

Monitor network entities: Name                    : Net-Guard Reporter for LNMS. Environment           : Apache Server, Oracle, HTML, JavaScript, and PHP. N

Business Analysis, In the following scenario, state which entities and rela...

In the following scenario, state which entities and relationships are needed to create the following query: What is the average time it takes for suppliers to deliver our orders?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd