Search results for: online risks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4291

Search results for: online risks

2671 Learning the Most Common Causes of Major Industrial Accidents and Apply Best Practices to Prevent Such Accidents

Authors: Rajender Dahiya

Abstract:

Investigation outcomes of major process incidents have been consistent for decades and validate that the causes and consequences are often identical. The debate remains as we continue to experience similar process incidents even with enormous development of new tools, technologies, industry standards, codes, regulations, and learning processes? The objective of this paper is to investigate the most common causes of major industrial incidents and reveal industry challenges and best practices to prevent such incidents. The author, in his current role, performs audits and inspections of a variety of high-hazard industries in North America, including petroleum refineries, chemicals, petrochemicals, manufacturing, etc. In this paper, he shares real life scenarios, examples, and case studies from high hazards operating facilities including key challenges and best practices. This case study will provide a clear understanding of the importance of near miss incident investigation. The incident was a Safe operating limit excursion. The case describes the deficiencies in management programs, the competency of employees, and the culture of the corporation that includes hazard identification and risk assessment, maintaining the integrity of safety-critical equipment, operating discipline, learning from process safety near misses, process safety competency, process safety culture, audits, and performance measurement. Failure to identify the hazards and manage the risks of highly hazardous materials and processes is one of the primary root-causes of an incident, and failure to learn from past incidents is the leading cause of the recurrence of incidents. Several investigations of major incidents discovered that each showed several warning signs before occurring, and most importantly, all were preventable. The author will discuss why preventable incidents were not prevented and review the mutual causes of learning failures from past major incidents. The leading causes of past incidents are summarized below. Management failure to identify the hazard and/or mitigate the risk of hazardous processes or materials. This process starts early in the project stage and continues throughout the life cycle of the facility. For example, a poorly done hazard study such as HAZID, PHA, or LOPA is one of the leading causes of the failure. If this step is performed correctly, then the next potential cause is. Management failure to maintain the integrity of safety critical systems and equipment. In most of the incidents, mechanical integrity of the critical equipment was not maintained, safety barriers were either bypassed, disabled, or not maintained. The third major cause is Management failure to learn and/or apply learning from the past incidents. There were several precursors before those incidents. These precursors were either ignored altogether or not taken seriously. This paper will conclude by sharing how a well-implemented operating management system, good process safety culture, and competent leaders and staff contributed to managing the risks to prevent major incidents.

Keywords: incident investigation, risk management, loss prevention, process safety, accident prevention

Procedia PDF Downloads 56
2670 Proposals for the Practical Implementation of the Biological Monitoring of Occupational Exposure for Antineoplastic Drugs

Authors: Mireille Canal-Raffin, Nadege Lepage, Antoine Villa

Abstract:

Context: Most antineoplastic drugs (AD) have a potential carcinogenic, mutagenic and/or reprotoxic effect and are classified as 'hazardous to handle' by National Institute for Occupational Safety and Health Their handling increases with the increase of cancer incidence. AD contamination from workers who handle AD and/or care for treated patients is, therefore, a major concern for occupational physicians. As part of the process of evaluation and prevention of chemical risks for professionals exposed to AD, Biological Monitoring of Occupational Exposure (BMOE) is the tool of choice. BMOE allows identification of at-risk groups, monitoring of exposures, assessment of poorly controlled exposures and the effectiveness and/or wearing of protective equipment, and documenting occupational exposure incidents to AD. This work aims to make proposals for the practical implementation of the BMOE for AD. The proposed strategy is based on the French good practice recommendations for BMOE, issued in 2016 by 3 French learned societies. These recommendations have been adapted to occupational exposure to AD. Results: AD contamination of professionals is a sensitive topic, and the BMOE requires the establishment of a working group and information meetings within the concerned health establishment to explain the approach, objectives, and purpose of monitoring. Occupational exposure to AD is often discontinuous and 2 steps are essential upstream: a study of the nature and frequency of AD used to select the Biological Exposure Indice(s) (BEI) most representative of the activity; a study of AD path in the institution to target exposed professionals and to adapt medico-professional information sheet (MPIS). The MPIS is essential to gather the necessary elements for results interpretation. Currently, 28 urinary specific BEIs of AD exposure have been identified, and corresponding analytical methods have been published: 11 BEIs were AD metabolites, and 17 were AD. Results interpretation is performed by groups of homogeneous exposure (GHE). There is no threshold biological limit value of interpretation. Contamination is established when an AD is detected in trace concentration or in a urine concentration equal or greater than the limit of quantification (LOQ) of the analytical method. Results can only be compared to LOQs of these methods, which must be as low as possible. For 8 of the 17 AD BEIs, the LOQ is very low with values between 0.01 to 0.05µg/l. For the other BEIs, the LOQ values were higher between 0.1 to 30µg/l. Results restitution by occupational physicians to workers should be individual and collective. Faced with AD dangerousness, in cases of workers contamination, it is necessary to put in place corrective measures. In addition, the implementation of prevention and awareness measures for those exposed to this risk is a priority. Conclusion: This work is a help for occupational physicians engaging in a process of prevention of occupational risks related to AD exposure. With the current analytical tools, effective and available, the (BMOE) to the AD should now be possible to develop in routine occupational physician practice. The BMOE may be complemented by surface sampling to determine workers' contamination modalities.

Keywords: antineoplastic drugs, urine, occupational exposure, biological monitoring of occupational exposure, biological exposure indice

Procedia PDF Downloads 131
2669 HTML5 Online Learning Application with Offline Web, Location Based, Animated Web, Multithread, and Real-Time Features

Authors: Sheetal R. Jadhwani, Daisy Sang, Chang-Shyh Peng

Abstract:

Web applications are an integral part of modem life. They are mostly based upon the HyperText Markup Language (HTML). While HTML meets the basic needs, there are some shortcomings. For example, applications can cease to work once user goes offline, real-time updates may be lagging, and user interface can freeze on computationally intensive tasks. The latest language specification HTML5 attempts to rectify the situation with new tools and protocols. This paper studies the new Web Storage, Geolocation, Web Worker, Canvas, and Web Socket APIs, and presents applications to test their features and efficiencies.

Keywords: HTML5, web worker, canvas, web socket

Procedia PDF Downloads 297
2668 Impulsivity Predicts Gambling Intention via Upward than Downward Counterfactual Thinking among Nigerians Youths

Authors: Larry O. Awo, Precious I. Nwachukwu

Abstract:

The increase in proliferation of gambling venues in Nigeria in the last decade has led to an increase in gambling prevalence among the youths who have shown signs of problem gambling and its associated risks and pressures to parents and therapists. The present study sought to investigate the roles of counterfactual thinking (CFT) forms (upward CFT vs downward CFT) in the relationship between impulsivity and gambling intention of 371 Nigerian youths who have gambled prior to the study (mean age = 17.37, SD = 4.13). Hayes PROCESS macro result revealed that, after controlling for age, downward CFT was negatively associated with and contributed to a decrease in gambling intention, while upward CFT was positively associated with and contributed to an increase in gambling intention. Mediation analysis result showed that upward CFT amplified the contribution of impulsivity to gambling intention. The association between impulsivity and gambling was partially weakened by downward CFT, even though this weakness was not significant. We conclude that gambling therapies should encourage packages that attenuate upward CFT impulsivity and at the same time, increase downward CFT skills.

Keywords: upward counterfactuals, downward counterfactuals, gambling intention, nigerian youths

Procedia PDF Downloads 100
2667 Co-Creational Model for Blended Learning in a Flipped Classroom Environment Focusing on the Combination of Coding and Drone-Building

Authors: A. Schuchter, M. Promegger

Abstract:

The outbreak of the COVID-19 pandemic has shown us that online education is so much more than just a cool feature for teachers – it is an essential part of modern teaching. In online math teaching, it is common to use tools to share screens, compute and calculate mathematical examples, while the students can watch the process. On the other hand, flipped classroom models are on the rise, with their focus on how students can gather knowledge by watching videos and on the teacher’s use of technological tools for information transfer. This paper proposes a co-educational teaching approach for coding and engineering subjects with the help of drone-building to spark interest in technology and create a platform for knowledge transfer. The project combines aspects from mathematics (matrices, vectors, shaders, trigonometry), physics (force, pressure and rotation) and coding (computational thinking, block-based programming, JavaScript and Python) and makes use of collaborative-shared 3D Modeling with clara.io, where students create mathematics knowhow. The instructor follows a problem-based learning approach and encourages their students to find solutions in their own time and in their own way, which will help them develop new skills intuitively and boost logically structured thinking. The collaborative aspect of working in groups will help the students develop communication skills as well as structural and computational thinking. Students are not just listeners as in traditional classroom settings, but play an active part in creating content together by compiling a Handbook of Knowledge (called “open book”) with examples and solutions. Before students start calculating, they have to write down all their ideas and working steps in full sentences so other students can easily follow their train of thought. Therefore, students will learn to formulate goals, solve problems, and create a ready-to use product with the help of “reverse engineering”, cross-referencing and creative thinking. The work on drones gives the students the opportunity to create a real-life application with a practical purpose, while going through all stages of product development.

Keywords: flipped classroom, co-creational education, coding, making, drones, co-education, ARCS-model, problem-based learning

Procedia PDF Downloads 117
2666 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)

Authors: Wafa' Slaibi Alsharafat

Abstract:

Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.

Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection

Procedia PDF Downloads 471
2665 Financial Products Held by University Students: An Empirical Study from the Czech Republic

Authors: Barbora Chmelikova

Abstract:

Current financial markets offer a wide range of financial products to the consumers. However, access to the financial products is not always provided or guaranteed, particularly in less developed countries. For this reason, financial inclusion is an important component in the modern society. This paper investigates financial inclusion and what financial products are held by university students majoring in finance fields. The OECD methodology was used to examine the awareness and use of financial products. The study was conducted via online questionnaire at Masaryk University in the Czech Republic among finance students. The results show that the students use current and savings accounts more than any other financial products.

Keywords: financial inclusion, financial products, personal finance, university students

Procedia PDF Downloads 372
2664 Site-based Internship Experiences: From Research to Implementation and Community Collaboration

Authors: Jamie Sundvall, Lisa Jennings

Abstract:

Site based field internship learning (SBL) is an educational approach within a Master’s of Social Work (MSW) university field placement department that promotes a more streamlined approach to the integration of theory and evidence based practices for social work students. The SBL model is founded on research in the field, consideration of current work force needs, United States national trends of MSW graduate skill and knowledge deficits, educational trends in students pursing a master’s degree in social work, and current social problems that require unique problem solving skills. This study explores the use of site-based learning in a hybrid social work program. In this setting, site based learning pairs online education courses and social work field education to create training opportunities for social work students within their own community and cultural context. Students engage in coursework in an online setting with both synchronous and asynchronous features that facilitate development of core competencies for MSW students. Through the SBL model, students are then partnered with faculty in a virtual course room and a university vetted site within their community. The study explores how this model of learning creates community partnerships, through which students engage in a learning loop to develop social work skills, while preparing students to address current community, social, and global issues with the engagement of technology. The goal of SBL is to more effectively equip social work students for practice according to current workforce demands, provide access to education and care to populations who have limited access, and create self-sustainable partnerships. Further, the model helps students learn integration of evidence based practices and helps instructors more effectively teach integration of ethics into practice. The study found that the SBL model increases the influence and professional relevance of the social work profession, and ultimately facilitates stronger approaches to integrating theory into practice. Current implementation of the practice in the United States will be presented in the study. dditionally, future research conceptualization of SBL models will be presented, in order to collaborate on advancing best approaches of translating theory into practice, according to the current needs of the profession and needs of social work students.

Keywords: collaboration, fieldwork, research, site-based learning, technology

Procedia PDF Downloads 123
2663 A Long Tail Study of eWOM Communities

Authors: M. Olmedilla, M. R. Martinez-Torres, S. L. Toral

Abstract:

Electronic Word-Of-Mouth (eWOM) communities represent today an important source of information in which more and more customers base their purchasing decisions. They include thousands of reviews concerning very different products and services posted by many individuals geographically distributed all over the world. Due to their massive audience, eWOM communities can help users to find the product they are looking for even if they are less popular or rare. This is known as the long tail effect, which leads to a larger number of lower-selling niche products. This paper analyzes the long tail effect in a well-known eWOM community and defines a tool for finding niche products unavailable through conventional channels.

Keywords: eWOM, online user reviews, long tail theory, product categorization, social network analysis

Procedia PDF Downloads 416
2662 Gluteal Augmentation: A Historical Perspective on Society's Fascination with Buttock Size

Authors: Shane R. Jackson

Abstract:

Gluteal augmentation with fat grafting, commonly referred to as the Brazilian Butt Lift, is the fastest-growing cosmetic surgical procedure, despite the risks and controversy that surrounds it. While many commentators attribute this rise in popularity with current societal trends towards public sharing of private life, the fascination with buttock size is in fact a much older human trait. By searching beyond medical literature and delving into historical sources, from ancient civilisations, through the Renaissance and Victorian eras to the ‘Instagram generation’ of the present day, this paper examines the differences – and similarities – in society’s ideal buttock shape and size. Furthermore, the ways in which these various cultures have altered their appearance to achieve this ideal are also examined, looking at the influence of the broader historical context. A deeper understanding of the historical, cultural and psychosocial factors that influence a patient’s desire for buttock augmentation allows the clinician to formulate a well-rounded surgical plan.

Keywords: augmentation, Brazilian butt lift, buttock, fat graft, gluteal

Procedia PDF Downloads 194
2661 The Environmental Conflict over the Trans Mountain Pipeline Expansion in Burnaby, British Columbia, Canada

Authors: Emiliano Castillo

Abstract:

The aim of this research is to analyze the origins, the development and possible outcomes of the environmental conflict between grassroots organizations, indigenous communities, Kinder Morgan Corporation, and the Canadian government over the Trans Mountain pipeline expansion in Burnaby, British Columbia, Canada. Building on the political ecology and the environmental justice theoretical framework, this research examines the impacts and risks of tar sands extraction, production, and transportation on climate change, public health, the environment, and indigenous people´s rights over their lands. This study is relevant to the environmental justice and political ecology literature because it discusses the unequal distribution of environmental costs and economic benefits of tar sands development; and focuses on the competing interests, needs, values, and claims of the actors involved in the conflict. Furthermore, it will shed light on the context, conditions, and processes that lead to the organization and mobilization of a grassroots movement- comprised of indigenous communities, citizens, scientists, and non-governmental organizations- that draw significant media attention by opposing the Trans Mountain pipeline expansion. Similarly, the research will explain the differences and dynamics within the grassroots movement. This research seeks to address the global context of the conflict by studying the links between the decline of conventional oil production, the rise of unconventional fossil fuels (e.g. tar sands), climate change, and the struggles of low-income, ethnic, and racial minorities over the territorial expansion of extractive industries. Data will be collected from legislative documents, policy and technical reports, scientific journals, newspapers articles, participant observation, and semi-structured interviews with representatives and members of the grassroots organizations, indigenous communities, and Burnaby citizens that oppose the Trans Mountain pipeline. These interviews will focus on their perceptions of the risks of the Trans Mountain pipeline expansion; the roots of the anti-tar sands movement; the differences and dynamics within the movement; and the strategies to defend the livelihoods of local communities and the environment against tar sands development. This research will contribute to the understanding of the underlying causes of the environmental conflict between the Canadian government, Kinder Morgan, and grassroots organizations over tar sands extraction, production, and transportation in Burnaby, British Columbia, Canada. Moreover, this work will elucidate the transformations of society-nature relationships brought by tar sands development. Research findings will provide scientific information about how the resistance movement in British Columbia can challenge the dominant narrative on tar sands, exert greater influence in environmental politics, and efficiently defend Indigenous people´s rights to lands. Furthermore, this research will shed light into how grassroots movements can contribute towards the building of more inclusive and sustainable societies.

Keywords: environmental conflict, environmental justice, extractive industry, indigenous communities, political ecology, tar sands

Procedia PDF Downloads 276
2660 The Effects of Different Doses of Caffeine on Young Futsal Players

Authors: Saead Rostami, Seyyed Hadi Hosseini Alavije, Aliakbar Torabi, Mohammad Bekhradi

Abstract:

This study is about The effects of different doses of caffeine on young Futsal players. Young futsal players of selected ShahinShahr(a city in Esfahan province, Iran) team are sampled (24 people of 18.3±1.9 year- old). All players are members of youth team playing in Esfahan counties league. Having at least 5 years of experience, 2 practices and 1 match per week and lacking any limitation in the past 6 months are the most important requirements for sampling the players. Next, the study topic, its method, its uses, as ell possible risks are explained to the players. They signed a consent letter to take part in the study. Interest in the use of caffeine as an ergogenic aid has increased since the International Olympic Committee lifted the partial ban on its use. Caffeine has beneficial effects on various aspects of athletic performance, but its effects on training have been neglected. The purpose of this study was to investigate the acute effect of caffeine on testosterone and cortisole in young futsal players.

Keywords: anabolic, catabolic, performance, testosterone cortisol ratio, RAST test

Procedia PDF Downloads 344
2659 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 354
2658 Building a Lean Construction Body of Knowledge

Authors: Jyoti Singh, Ahmed Stifi, Sascha Gentes

Abstract:

The process of construction significantly contributes to high level of risks, complexity and uncertainties leading to cost and time overrun, customer dissatisfaction etc. lean construction is important as it is a comprehensive system of tools and concepts focusing on moving closer to customer satisfaction by understanding the process, identifying the waste and eliminating it. The proposed work includes identification of knowledge areas from lean perspective, lean tools/concepts used in lean construction and establishing a relationship matrix between knowledge areas and lean tools/concepts, thus developing and building up a lean construction body of knowledge (LCBOK), i.e. a guide to lean construction, aiming to provide guidelines to manage individual projects and also helping construction industry to minimise waste and maximize value to the customer. In this study, we identified 8 knowledge areas and 62 lean tools/concepts from lean perspective and also one tool can help to manage two or more knowledge areas.

Keywords: knowledge areas, lean body matrix, lean construction, lean tools

Procedia PDF Downloads 433
2657 The Role of ICT in Engaging Youth in Agricultural Transformation of Africa

Authors: Adebola Adedugbe

Abstract:

Agriculture is the mainstay of most countries in Africa. It employs up to 90 percent of the rural workforce, who are mostly youth and women. Engaging youths in Information and Communications Technology (ICT) in agriculture is critical to economic and agricultural development of the African continent. The objective of this paper is to identify and mobilize the potentials of young Africans in agriculture through ICT and recognize their role as the dominant driver for sustainable agricultural development in Africa. This paper identifies the role of ICT as a tool for attracting youths to agriculture. The development of ICT is important in stimulating youths in SME’s to compete favorably and effectively as a way to fight poverty through job and wealth creation. It is one of the strategies for promoting entrepreneurship by increasing the availability and diversity of online information.

Keywords: Africa, agriculture, ICT, tool, youth

Procedia PDF Downloads 448
2656 Exploration of Barriers and Challenges to Innovation Process for SMEs: Possibilities to Promote Cooperation Between Scientific and Business Institutions to Address it

Authors: Indre Brazauskaite, Vilte Auruskeviciene

Abstract:

Significance of the study is outlined through current strategic management challenges faced by SMEs. First, innovation is recognized as competitive advantage in the market, having ever changing market conditions. It is of constant interest from both practitioners and academics to capture and capitalize on business opportunities or mitigate the foreseen risks. Secondly, it is recognized that integrated system is needed for proper implementation of innovation process, especially during the period of business incubation, associated with relatively high risks of new product failure. Finally, ability to successful commercialize innovations leads to tangible business results that allow to grow organizations further. This is particularly relevant to SMEs due to limited structures, resources, or capabilities. Cooperation between scientific and business institutions could be a tool of mutual interest to observe, address, and further develop innovations during the incubation period, which is the most demanding and challenging during the innovation process. Material aims to address the following problematics: i) indicate the major barriers and challenges in innovation process that SMEs are facing, ii) outline the possibilities for these barriers and challenges to be addressed by cooperation between scientific and business institutions. Basis for this research is stage-by-stage integrated innovation management process which presents existing challenges and needed aid in operational decision making. The stage-by-stage innovation management process exploration highlights relevant research opportunities that have high practical relevance in the field. It is expected to reveal the possibility for business incubation programs that could combine interest from both – practices and academia. Methodology. Scientific meta-analysis of to-date scientific literature that explores innovation process. Research model is built on the combination of stage-gate model and lean six sigma approach. It outlines the following steps: i) pre-incubation (discovery and screening), ii) incubation (scoping, planning, development, and testing), and iii) post-incubation (launch and commercialization) periods. Empirical quantitative research is conducted to address barriers and challenges related to innovation process among SMEs that limits innovations from successful launch and commercialization and allows to identify potential areas for cooperation between scientific and business institutions. Research sample, high level decision makers representing trading SMEs, are approached with structured survey based on the research model to investigate the challenges associated with each of the innovation management step. Expected findings. First, the current business challenges in the innovation process are revealed. It will outline strengths and weaknesses of innovation management practices and systems across SMEs. Secondly, it will present material for relevant business case investigation for scholars to serve as future research directions. It will contribute to a better understanding of quality innovation management systems. Third, it will contribute to the understanding the need for business incubation systems for mutual contribution from practices and academia. It can increase relevance and adaptation of business research.

Keywords: cooperation between scientific and business institutions, innovation barriers and challenges, innovation measure, innovation process, SMEs

Procedia PDF Downloads 147
2655 Predicting Personality and Psychological Distress Using Natural Language Processing

Authors: Jihee Jang, Seowon Yoon, Gaeun Son, Minjung Kang, Joon Yeon Choeh, Kee-Hong Choi

Abstract:

Background: Self-report multiple choice questionnaires have been widely utilized to quantitatively measure one’s personality and psychological constructs. Despite several strengths (e.g., brevity and utility), self-report multiple-choice questionnaires have considerable limitations in nature. With the rise of machine learning (ML) and Natural language processing (NLP), researchers in the field of psychology are widely adopting NLP to assess psychological constructs to predict human behaviors. However, there is a lack of connections between the work being performed in computer science and that psychology due to small data sets and unvalidated modeling practices. Aims: The current article introduces the study method and procedure of phase II, which includes the interview questions for the five-factor model (FFM) of personality developed in phase I. This study aims to develop the interview (semi-structured) and open-ended questions for the FFM-based personality assessments, specifically designed with experts in the field of clinical and personality psychology (phase 1), and to collect the personality-related text data using the interview questions and self-report measures on personality and psychological distress (phase 2). The purpose of the study includes examining the relationship between natural language data obtained from the interview questions, measuring the FFM personality constructs, and psychological distress to demonstrate the validity of the natural language-based personality prediction. Methods: The phase I (pilot) study was conducted on fifty-nine native Korean adults to acquire the personality-related text data from the interview (semi-structured) and open-ended questions based on the FFM of personality. The interview questions were revised and finalized with the feedback from the external expert committee, consisting of personality and clinical psychologists. Based on the established interview questions, a total of 425 Korean adults were recruited using a convenience sampling method via an online survey. The text data collected from interviews were analyzed using natural language processing. The results of the online survey, including demographic data, depression, anxiety, and personality inventories, were analyzed together in the model to predict individuals’ FFM of personality and the level of psychological distress (phase 2).

Keywords: personality prediction, psychological distress prediction, natural language processing, machine learning, the five-factor model of personality

Procedia PDF Downloads 76
2654 Fine-Grained Sentiment Analysis: Recent Progress

Authors: Jie Liu, Xudong Luo, Pingping Lin, Yifan Fan

Abstract:

Facebook, Twitter, Weibo, and other social media and significant e-commerce sites generate a massive amount of online texts, which can be used to analyse people’s opinions or sentiments for better decision-making. So, sentiment analysis, especially fine-grained sentiment analysis, is a very active research topic. In this paper, we survey various methods for fine-grained sentiment analysis, including traditional sentiment lexicon-based methods, machine learning-based methods, and deep learning-based methods in aspect/target/attribute-based sentiment analysis tasks. Besides, we discuss their advantages and problems worthy of careful studies in the future.

Keywords: sentiment analysis, fine-grained, machine learning, deep learning

Procedia PDF Downloads 257
2653 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS

Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili

Abstract:

Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.

Keywords: construction, debris flow, geoinformatics systems, program RAMMS

Procedia PDF Downloads 142
2652 Low-Temperature Silanization of Medical Vials: Chemical Bonding and Performance

Authors: Yuanping Yang, Ruolin Zhou, Xingyu Liu, Lianbin Wu

Abstract:

Based on the challenges of silanization of pharmaceutical glass packaging materials, the silicone oil high-temperature baking method consumes a lot of energy; silicone oil is generally physically adsorbed on the inner surface of the medical vials, leading to protein adsorption on the surface of the silicone oil and fall off, so that the number of particles in the drug solution increases, which brings potential risks to people. In this paper, a new silanizing method is proposed. High-efficiency silanization is achieved by grafting trimethylsilyl groups to the inner surface of medical vials by chemical bond at low temperatures. The inner wall of the vial successfully obtained stable hydrophobicity, and the water contact Angle of the surface reached 100°~110°. With the increase of silicified reagent concentration, the water resistance of corresponding treatment vials increased gradually. This treatment can effectively reduce the risk of pH value increase and sodium ion leaching.

Keywords: low-temperature silanization, medical vials, chemical bonding, hydrophobicity

Procedia PDF Downloads 76
2651 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 233
2650 The Efficacy of Government Strategies to Control COVID 19: Evidence from 22 High Covid Fatality Rated Countries

Authors: Imalka Wasana Rathnayaka, Rasheda Khanam, Mohammad Mafizur Rahman

Abstract:

TheCOVID-19 pandemic has created unprecedented challenges to both the health and economic states in countries around the world. This study aims to evaluate the effectiveness of governments' decisions to mitigate the risks of COVID-19 through proposing policy directions to reduce its magnitude. The study is motivated by the ongoing coronavirus outbreaks and comprehensive policy responses taken by countries to mitigate the spread of COVID-19 and reduce death rates. This study contributes to filling the knowledge by exploiting the long-term efficacy of extensive plans of governments. This study employs a Panel autoregressive distributed lag (ARDL) framework. The panels incorporate both a significant number of variables and fortnightly observations from22 countries. The dependent variables adopted in this study are the fortnightly death rates and the rates of the spread of COVID-19. Mortality rate and the rate of infection data were computed based on the number of deaths and the number of new cases per 10000 people.The explanatory variables are fortnightly values of indexes taken to investigate the efficacy of government interventions to control COVID-19. Overall government response index, Stringency index, Containment and health index, and Economic support index were selected as explanatory variables. The study relies on the Oxford COVID-19 Government Measure Tracker (OxCGRT). According to the procedures of ARDL, the study employs (i) the unit root test to check stationarity, (ii) panel cointegration, and (iii) PMG and ARDL estimation techniques. The study shows that the COVID-19 pandemic forced immediate responses from policymakers across the world to mitigate the risks of COVID-19. Of the four types of government policy interventions: (i) Stringency and (ii) Economic Support have been most effective and reveal that facilitating Stringency and financial measures has resulted in a reduction in infection and fatality rates, while (iii) Government responses are positively associated with deaths but negatively with infected cases. Even though this positive relationship is unexpected to some extent in the long run, social distancing norms of the governments have been broken by the public in some countries, and population age demographics would be a possible reason for that result. (iv) Containment and healthcare improvements reduce death rates but increase the infection rates, although the effect has been lower (in absolute value). The model implies that implementation of containment health practices without association with tracing and individual-level quarantine does not work well. The policy implication based on containment health measures must be applied together with targeted, aggressive, and rapid containment to extensively reduce the number of people infected with COVID 19. Furthermore, the results demonstrate that economic support for income and debt relief has been the key to suppressing the rate of COVID-19 infections and fatality rates.

Keywords: COVID-19, infection rate, deaths rate, government response, panel data

Procedia PDF Downloads 73
2649 Enquiry Based Approaches to Teaching Grammar and Differentiation in the Senior Japanese Classroom

Authors: Julie Devine

Abstract:

This presentation will look at the approaches to teaching grammar taken over two years with students studying Japanese in the last two years of high school. The main focus is an enquiry based approach to grammar introduction and a three tier system using videos and online support material to allow for differentiation and personalised learning in the classroom. The aim is to create space for motivated students to do some higher order activities using the target pattern to solve problems and create scenarios. Less motivated students have time to complete basic exercises and struggling students have some time with the teacher in smaller groups.

Keywords: differentiation, digital technologies, personalised learning plans, student engagement

Procedia PDF Downloads 163
2648 Voluntary Information of Intellectual Capital Disclosed Online by Public Spanish Universities

Authors: Yolanda Ramírez, Ángel Tejada, Agustín Baidez

Abstract:

The purpose of this paper is to examine the quality of voluntary intellectual capital disclosure by public Spanish universities on their websites. To this end, a content analysis was used to analyze the websites of 50 public Spanish universities i 2016. The results of this study show that human capital was the most disclosed category with relational capital being the least frequently disclosed in Spain. However, the quality of structural capital disclosures was higher than relational and human capital. Finally, most IC disclosures were narrative in nature.

Keywords: intellectual capital, quality disclosure, websites, universities, Spain

Procedia PDF Downloads 227
2647 A Survey of Crowdsourcing Technology

Authors: Qianjia Cheng, Hongquan Jiang

Abstract:

Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency and high quality, make crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker and Amazon Mechanical Turk(Mturk) tend to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on the workflow, quality control, cost control and delay control, introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research direction in this area.

Keywords: application, crowdsourcing, crowdsourcing platform, system architecture

Procedia PDF Downloads 68
2646 A Comparative Evaluation of Cognitive Load Management: Case Study of Postgraduate Business Students

Authors: Kavita Goel, Donald Winchester

Abstract:

In a world of information overload and work complexities, academics often struggle to create an online instructional environment enabling efficient and effective student learning. Research has established that students’ learning styles are different, some learn faster when taught using audio and visual methods. Attributes like prior knowledge and mental effort affect their learning. ‘Cognitive load theory’, opines learners have limited processing capacity. Cognitive load depends on the learner’s prior knowledge, the complexity of content and tasks, and instructional environment. Hence, the proper allocation of cognitive resources is critical for students’ learning. Consequently, a lecturer needs to understand the limits and strengths of the human learning processes, various learning styles of students, and accommodate these requirements while designing online assessments. As acknowledged in the cognitive load theory literature, visual and auditory explanations of worked examples potentially lead to a reduction of cognitive load (effort) and increased facilitation of learning when compared to conventional sequential text problem solving. This will help learner to utilize both subcomponents of their working memory. Instructional design changes were introduced at the case site for the delivery of the postgraduate business subjects. To make effective use of auditory and visual modalities, video recorded lectures, and key concept webinars were delivered to students. Videos were prepared to free up student limited working memory from irrelevant mental effort as all elements in a visual screening can be viewed simultaneously, processed quickly, and facilitates greater psychological processing efficiency. Most case study students in the postgraduate programs are adults, working full-time at higher management levels, and studying part-time. Their learning style and needs are different from other tertiary students. The purpose of the audio and visual interventions was to lower the students cognitive load and provide an online environment supportive to their efficient learning. These changes were expected to impact the student’s learning experience, their academic performance and retention favourably. This paper posits that these changes to instruction design facilitates students to integrate new knowledge into their long-term memory. A mixed methods case study methodology was used in this investigation. Primary data were collected from interviews and survey(s) of students and academics. Secondary data were collected from the organisation’s databases and reports. Some evidence was found that the academic performance of students does improve when new instructional design changes are introduced although not statistically significant. However, the overall grade distribution of student’s academic performance has changed and skewed higher which shows deeper understanding of the content. It was identified from feedback received from students that recorded webinars served as better learning aids than material with text alone, especially with more complex content. The recorded webinars on the subject content and assessments provides flexibility to students to access this material any time from repositories, many times, and this enhances students learning style. Visual and audio information enters student’s working memory more effectively. Also as each assessment included the application of the concepts, conceptual knowledge interacted with the pre-existing schema in the long-term memory and lowered student’s cognitive load.

Keywords: cognitive load theory, learning style, instructional environment, working memory

Procedia PDF Downloads 140
2645 A Case Study of Meningoencephalitis following Le Fort I Osteotomy

Authors: Ryan Goh, Nicholas Beech

Abstract:

Introduction: Le Fort I Osteotomies, although are common procedures in Oral and Maxillofacial Surgery, carry a degree of risk of unfavourable propagation of the down-fracture of the maxilla. This may be the first reported case in the literature for meningoencephalitis to occur following a Le Fort I Osteotomy. Case: A 32-year-old female was brought into the Emergency Department four days after a Le Fort I Osteotomy, with a Glasgow Coma Scale (GCS) of 8 (E3V1M4). A Computed Tomography (CT) Head showed a skull base fracture at the right sphenoid sinus. Lumbar puncture was completed, and Klebsiella oxytoca was found in the Cerebrospinal Fluid (CSF). She was treated with Meropenem, and rapidly improved thereafter. CSF rhinorrhoea was identified when she was extubated, which was successfully managed via a continuous lumbar drain. She was discharged on day 14 without any neurological deficits. Conclusion: The most likely aspect of the Le Fort I Osteotomy to obtain a skull base fracture is during the pterygomaxillary disjunction. Care should always be taken to avoid significant risks of skull base fractures, CSF rhinorrhoea, meningitis and encephalitis.

Keywords: meningitis, orthognathic surgery, post-operative complication, skull base, rhinorrhea

Procedia PDF Downloads 121
2644 Social Information Seeking: Studying the Effect of Question Type on Responses in Social Q&A Sites

Authors: Arshia Ayoub, Zahid Ashraf Wani

Abstract:

With the introduction of online social Q&A sites, people are able to reach each other efficiently for information seeking and simultaneously creating social bonds. There prevails an issue of low or no response for some questions posed by an information seeker on these sites. So this study tries to understand the effect of question type on responses in Social Q & A sites. The study found that among the answered queries, majority of them were answered within 24 hours of posting the questions and surprisingly most replies were received within one hour of posting. It was observed that questions of general information type were most likely to be answered followed by verification type.

Keywords: community‐based services, information seeking, social search, social Q&A site

Procedia PDF Downloads 172
2643 Telecom Infrastructure Outsourcing: An Innovative Approach

Authors: Irfan Zafar

Abstract:

Over the years the Telecom Industry in the country has shown a lot of progress in terms of infrastructure development coupled with the availability of telecom services. This has however led to the cut throat completion among various operators thus leading to reduced tariffs to the customers. The profit margins have seen a reduction thus leading the operators to think of other avenues by adopting new models while keeping the quality of service intact. The outsourcing of the network and the resources is one such model which has shown promising benefits which includes lower costs, less risk, higher levels of customer support and engagement, predictable expenses, access to the emerging technologies, benefiting from a highly skilled workforce, adaptability, focus on the core business while reducing capital costs. A lot of research has been done on outsourcing in terms of reasons of outsourcing and its benefits. However this study is an attempt to analyze the effects of the outsourcing on an organizations performance (Telecommunication Sector) considering the variables (1) Cost Reduction (2) Organizational Performance (3) Flexibility (4) Employee Performance (5) Access to Specialized Skills & Technology and the (6) Outsourcing Risks.

Keywords: outsourcing, ICT, telecommunication, IT, networking

Procedia PDF Downloads 393
2642 Fault Tree Analysis and Bayesian Network for Fire and Explosion of Crude Oil Tanks: Case Study

Authors: B. Zerouali, M. Kara, B. Hamaidi, H. Mahdjoub, S. Rouabhia

Abstract:

In this paper, a safety analysis for crude oil tanks to prevent undesirable events that may cause catastrophic accidents. The estimation of the probability of damage to industrial systems is carried out through a series of steps, and in accordance with a specific methodology. In this context, this work involves developing an assessment tool and risk analysis at the level of crude oil tanks system, based primarily on identification of various potential causes of crude oil tanks fire and explosion by the use of Fault Tree Analysis (FTA), then improved risk modelling by Bayesian Networks (BNs). Bayesian approach in the evaluation of failure and quantification of risks is a dynamic analysis approach. For this reason, have been selected as an analytical tool in this study. Research concludes that the Bayesian networks have a distinct and effective method in the safety analysis because of the flexibility of its structure; it is suitable for a wide variety of accident scenarios.

Keywords: bayesian networks, crude oil tank, fault tree, prediction, safety

Procedia PDF Downloads 655