• Title/Summary/Keyword: Challenging work

Search Result 303, Processing Time 0.026 seconds

What's Next? Connecting the Past and Future of Business-IT Alignment Research

  • Joshy K. X.;Rahul Thakurta
    • Asia pacific journal of information systems
    • /
    • v.32 no.2
    • /
    • pp.395-434
    • /
    • 2022
  • The importance of Business-IT alignment has been well emphasized, and the topic has been a top management concern for the past four decades. The current business environment demands in response to digitalization have made Business-IT alignment even more challenging. We take on the challenge in this research by presenting a comprehensive review of the domain of Business-IT alignment, based on a conceptual model which we propose, to facilitate future theoretical work. The review brought out multiple representations of the concept of Business-IT alignment and the characterization of its antecedents, nature, and outcomes. Based on the treatment of the domain in the extant literature, we chart out possible areas of future explorations. By doing so, this research lays a foundation for continuing inquiry on Business-IT alignment and facilitating future theoretical work.

Robust Online Object Tracking with a Structured Sparse Representation Model

  • Bo, Chunjuan;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2346-2362
    • /
    • 2016
  • As one of the most important issues in computer vision and image processing, online object tracking plays a key role in numerous areas of research and in many real applications. In this study, we present a novel tracking method based on the proposed structured sparse representation model, in which the tracked object is assumed to be sparsely represented by a set of object and background templates. The contributions of this work are threefold. First, the structure information of all the candidate samples is utilized by a joint sparse representation model, where the representation coefficients of these candidates are promoted to share the same sparse patterns. This representation model can be effectively solved by the simultaneous orthogonal matching pursuit method. In addition, we develop a tracking algorithm based on the proposed representation model, a discriminative candidate selection scheme, and a simple model updating method. Finally, we conduct numerous experiments on several challenging video clips to evaluate the proposed tracker in comparison with various state-of-the-art tracking algorithms. Both qualitative and quantitative evaluations on a number of challenging video clips show that our tracker achieves better performance than the other state-of-the-art methods.

Application of Ecological Momentary Assessment in Studies with Rotation Workers in the Resources and Related Construction Sectors: A Systematic Review

  • Bernard Yeboah-Asiamah Asare;Suzanne Robinson;Dominika Kwasnicka;Daniel Powell
    • Safety and Health at Work
    • /
    • v.14 no.1
    • /
    • pp.10-16
    • /
    • 2023
  • Whilst Ecological momentary assessment (EMA) can provide important insights over time and across contexts among rotation workers whose work periods alternate with leave at home, it can also be challenging to implement in the resources and construction sectors. This review aimed to provide a summary of the methodological characteristics of EMA studies assessing health outcomes and related behaviors in rotation workers. Systematic searches in PubMed, Medline, EMBASE, CINAHL, PsycINFO, and Scopus were done to include 23 studies using EMA methods in assessing health-related outcomes and behaviors. EMA designs included daily diary: assessments once per day typically fixed at the end of day (47.8%), within day fixed interval time-based design: assessments on multiple times per day at certain times of day (17.4%) and combination of both designs (34.8%). Studies employed paper and pencil diaries (73.9%) and one or more electronic methods (60.9%): wrist-worn actigraphy device (52.2%) and online-based diaries (26.1%) for data collection. Most of the studies (91.3%) did not report prompting -EMAs by schedule alerts or compliance. Daily diary and within day fixed interval dairies designs are common, with the increasing use of electronic EMA delivery techniques. It is unclear how well participants adhere to assessment schedules, as these are inadequately reported. Researchers should report compliance-related information.

GNSS-Based PHC Pile Cutting Position Sensing Methodology (GNSS 기반 PHC 파일 절단위치 센싱 방법론에 관한 연구)

  • Cho, Se-Hyun;Yoou, Geon-Hee;Kim, Jun-Sang;Lee, Jun Ho;Hur, Je;Kim, Young Suk
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.05a
    • /
    • pp.387-388
    • /
    • 2023
  • PHC pile head cutting is an essential work in pile foundation construction. However, since the work has labor-intensive characteristics, there are problems such as productivity and safety. So in previous study PHC pile one-cutting head cutting automation equipment was developed to solve this problem. However, it has been investigated as a limitation that checking the cutting position of the PHC pile can be challenging in place where a rotary laser leveler cannot irradiate cutting position, as the sensing unit of the developed automated equipment utilizes an optical method. Therefore, the objective of this study is to delvelop a GNSS-based methodology for sensing the cutting position of PHC piles to overcome the limitations of the optical method and to examine its feasibility for field application. If the proposed methodology is applied to the construction site, it is expected that the convenience and productivity of the PHC pile cutting position sensing work will be improved.

  • PDF

A Method for Determining the Peak Level of Risk in Root Industry Work Environment using Machine Learning (기계학습을 이용한 뿌리산업 작업 환경 위험도 피크레벨 결정방법)

  • Sang-Min Lee;Jun-Yeong Kim;Suk-Chan Kang;Kyung-Jun Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.127-136
    • /
    • 2024
  • Because the hazardous working environments and high labor intensity of the root industry can potentially impact the health of workers, current regulations have focused on measuring and controlling environmental factors, on a semi-annual basis. However, there is a lack of quantitative criteria addressing workers' health conditions other than the physical work environment. This gap makes it challenging to prevent occupational diseases resulting from continuous exposure to harmful substances below regulatory thresholds. Therefore, this paper proposes a machine learning-based method for determining the peak level of risk in root industry work environments and enables real-time safety assessment in workplaces utilizing this approach.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Application and Its Typological Classification of Photographs Shown in Contemporary Art (현대미술에 나타난 사진의 활용과 그 유형학적 분류)

  • LEE, Kyung Ryul
    • Cross-Cultural Studies
    • /
    • v.33
    • /
    • pp.193-239
    • /
    • 2013
  • A photograph, which was applied to contemporary art, plays a very important role in the whole of the multiplied and diversified contemporary arts today. The application of photos, which were shown in contemporary art following the 1950s, can be classified into five types according to role and function of a photo in the process of developing a work. However, this classification is shown a little ambiguously. That is because photos of being utilized by artists are indicated very diversely depending on their artistic strategy and situation. As the first type, a few painters utilize a photo as mirror of reality in order to materialize a challenging and revolutionary idea with going against traditional picture in their pictorial practice. As the second classification, especially American painters utilize a photo as material component of forming their picture like photo-montage or collage. The combined application of this medium is first doing genre de-construction and hybridization of post-modernism in the 1980s while ultimately aiming at social criticism or political satire. The third type implies particularly a case that avant-garde artists utilize a photo as evidence of a work. In this case, a photo is employed as evidence of a work, which disappears in the temporal space essentially like body art, land art, and performance. Also, as the fourth type is a case of utilizing a photo for artistic concept of a work, not pictorial practice of picture, it is utilized often as important artistic strategy of conceptual artists. The final type of utilizing photo is a case of applying photo as formative tool on behalf of dye-stuffs or crayon in order to record a section of reality, which always continues regardless of event or meaning any more, in the traditional picture. In this case, a work is indicated as a photo of having a form of picture, namely, as Forme-tableau. The main subject is indicated there as a daily case of being repeated always the extremely common and revived theme.

An Analysis of Individual and Social Factors Affecting Occupational Accidents

  • Barkhordari, Amir;Malmir, Behnam;Malakoutikhah, Mahdi
    • Safety and Health at Work
    • /
    • v.10 no.2
    • /
    • pp.205-212
    • /
    • 2019
  • Background: Workforce health is one of the primary and most challenging issues, particularly in industrialized countries. This article aims at modeling the major factors affecting accidents in the workplace, including general health, work-family conflict, effort-reward imbalance, and internal and external locus of control. Methods: A cross-sectional study was conducted in Esfahan Steel Company in Iran. A total of 450 participants were divided into two groups-control and case-and the questionnaires were distributed among them. Data were collected through a 7-part questionnaire. Finally, the results were analyzed using SPSS 22.0 and Amos software. Results: All the studied variables had a significant relationship with the accident proneness. In the case group, general health with a coefficient of -0.37, worke-family conflict with 0.10, effort-reward imbalance with 0.10, internal locus of control with -0.07, and external locus of control with 0.40 had a direct effect on occupational stress. Occupational stress also had a positive direct effect on accident proneness with a coefficient of 0.47. In addition, fitness indices of control group showed general health (-0.35), worke-family conflict (0.36), effort-reward imbalance (0.13), internal locus of control (-0.15), and external locus of control (0.12) have a direct effect on occupational stress. Besides, occupational stress with a coefficient of 0.09 had a direct effect on accident proneness. Conclusion: It can be concluded that although previous studies and the present study showed the effect of stress on accident and accident proneness, some hidden and external factors such as work-family conflict, effort-reward imbalance, and external locus of control that affect stress should also be considered. It helps industries face less occupational stress and, consequently, less occurrence rates of accidents.

Host Responses from Innate to Adaptive Immunity after Vaccination: Molecular and Cellular Events

  • Kang, Sang-Moo;Compans, Richard W.
    • Molecules and Cells
    • /
    • v.27 no.1
    • /
    • pp.5-14
    • /
    • 2009
  • The availability of effective vaccines has had the most profound positive effect on improving the quality of public health by preventing infectious diseases. Despite many successful vaccines, there are still old and new emerging pathogens against which there is no vaccine available. A better understanding of how vaccines work for providing protection will help to improve current vaccines as well as to develop effective vaccines against pathogens for which we do not have a proper means to control. Recent studies have focused on innate immunity as the first line of host defense and its role in inducing adaptive immunity; such studies have been an intense area of research, which will reveal the immunological mechanisms how vaccines work for protection. Toll-like receptors (TLRs), a family of receptors for pathogen-associated molecular patterns on cells of the innate immune system, play a critical role in detecting and responding to microbial infections. Importantly, the innate immune system modulates the quantity and quality of long-term T and B cell memory and protective immune responses to pathogens. Limited studies suggest that vaccines which mimic natural infection and/or the structure of pathogens seem to be effective in inducing long-term protective immunity. A better understanding of the similarities and differences of the molecular and cellular events in host responses to vaccination and pathogen infection would enable the rationale for design of novel preventive measures against many challenging pathogens.

Damage detection for a beam under transient excitation via three different algorithms

  • Zhao, Ying;Noori, Mohammad;Altabey, Wael A.
    • Structural Engineering and Mechanics
    • /
    • v.64 no.6
    • /
    • pp.803-817
    • /
    • 2017
  • Structural health monitoring has increasingly been a focus within the civil engineering research community over the last few decades. With increasing application of sensor networks in large structures and infrastructure systems, effective use and development of robust algorithms to analyze large volumes of data and to extract the desired features has become a challenging problem. In this paper, we grasp some precautions and key points of the signal processing approach, wavelet, establish a relative reliable framework, and analyze three problems that require attention when applying wavelet based damage detection approach. The cases studies how to use optimal scales for extracting mode shapes and modal curvatures in a reinforced concrete beam and how to effectively identify damages using maximum curves of wavelet coefficient differences. Moreover, how to make a recognition based on the wavelet multi-resolution analysis, wavelet packet energy, and fuzzy sets is a meaningful topic that has been addressed in this work. The relative systematic work that compasses algorithms, structures and evaluation paves a way to a framework regarding effective structural health monitoring, orientation, decision and action.