scholarly journals MP020: Do real-time Twitter metrics correlate with traditional emergency medicine post-conference speaker evaluations?

CJEM ◽  
2016 ◽  
Vol 18 (S1) ◽  
pp. S73-S73
Author(s):  
S.H. Yiu ◽  
S. Dewhirst ◽  
C. Lee ◽  
A. Jalaili ◽  
J.R. Frank

Introduction: Traditional post-conference speaker evaluations are inconsistently completed; meanwhile, real time social media tools such as Twitter are increasingly used in conferences. We sought to determine whether a correlation exists between traditional conference evaluation for a speaker and the number of real-time tweets it generated using data from a CAEP conference. Methods: This study utilized a retrospective design. The hashtag #CAEP14 was prospectively registered with Symplur, an online Twitter management tool, so that all tweets related to CAEP conference 2014 were stored. A tweet was associated with a session if it mentioned the speaker name, or if the tweet content and timing closely matched that of the session in the schedule. A tweet classification system was developed to differentiate original tweets from retweets, and quotes from comments generating further discussion. Two authors assessed and coded the first 200 tweets together to ensure a uniform approach to coding, and then independently coded the remaining tweets. Discrepancies were resolved by consensus. One author reviewed post-conference speaker evaluation, and abstracted the value corresponding to the question “The speaker was an effective communicator”. We present descriptive statistics and correlation analyses. Results: A total of 3,804 tweets were collected, with 2,218 (58.3%) associated with a session. Forty-eight (48%) (131 out of 274) of sessions receiving at least one tweet, with a mean of 11.7 tweets per session (95% CI of 0 to 57.5). In comparison, only 31% (85 out of 274) of sessions received a formal post conference speaker evaluation (p<0.005). For sessions that received at least one traditional post-conference evaluation, there was no significant correlation between the number of tweets and evaluation scores (R=0.087). This can be attributed to the fact that there was minimal variation between evaluation scores (median = 3.6 out of 5, IQR of 3.4 to 3.7). Conclusion: There was no correlation between the number of real-time tweets and traditional post-conference speaker evaluation. However, many sessions which received no formal speaker evaluation generated tweets, and the number of tweets was highly variable between sessions. Thus, Twitter metrics might be useful for conference organizers to supplement formal speaker evaluations.

Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


2019 ◽  
Vol 20 (5) ◽  
pp. 999-1014 ◽  
Author(s):  
Stephen B. Cocks ◽  
Lin Tang ◽  
Pengfei Zhang ◽  
Alexander Ryzhkov ◽  
Brian Kaney ◽  
...  

Abstract The quantitative precipitation estimate (QPE) algorithm developed and described in Part I was validated using data collected from 33 Weather Surveillance Radar 1988-Doppler (WSR-88D) radars on 37 calendar days east of the Rocky Mountains. A key physical parameter to the algorithm is the parameter alpha α, defined as the ratio of specific attenuation A to specific differential phase KDP. Examination of a significant sample of tropical and continental precipitation events indicated that α was sensitive to changes in drop size distribution and exhibited lower (higher) values when there were lower (higher) concentrations of larger (smaller) rain drops. As part of the performance assessment, the prototype algorithm generated QPEs utilizing a real-time estimated and a fixed α were created and evaluated. The results clearly indicated ~26% lower errors and a 26% better bias ratio with the QPE utilizing a real-time estimated α as opposed to using a fixed value as was done in previous studies. Comparisons between the QPE utilizing a real-time estimated α and the operational dual-polarization (dual-pol) QPE used on the WSR-88D radar network showed the former exhibited ~22% lower errors, 7% less bias, and 5% higher correlation coefficient when compared to quality controlled gauge totals. The new QPE also provided much better estimates for moderate to heavy precipitation events and performed better in regions of partial beam blockage than the operational dual-pol QPE.


Author(s):  
Paul Oehlmann ◽  
Paul Osswald ◽  
Juan Camilo Blanco ◽  
Martin Friedrich ◽  
Dominik Rietzel ◽  
...  

AbstractWith industries pushing towards digitalized production, adaption to expectations and increasing requirements for modern applications, has brought additive manufacturing (AM) to the forefront of Industry 4.0. In fact, AM is a main accelerator for digital production with its possibilities in structural design, such as topology optimization, production flexibility, customization, product development, to name a few. Fused Filament Fabrication (FFF) is a widespread and practical tool for rapid prototyping that also demonstrates the importance of AM technologies through its accessibility to the general public by creating cost effective desktop solutions. An increasing integration of systems in an intelligent production environment also enables the generation of large-scale data to be used for process monitoring and process control. Deep learning as a form of artificial intelligence (AI) and more specifically, a method of machine learning (ML) is ideal for handling big data. This study uses a trained artificial neural network (ANN) model as a digital shadow to predict the force within the nozzle of an FFF printer using filament speed and nozzle temperatures as input data. After the ANN model was tested using data from a theoretical model it was implemented to predict the behavior using real-time printer data. For this purpose, an FFF printer was equipped with sensors that collect real time printer data during the printing process. The ANN model reflected the kinematics of melting and flow predicted by models currently available for various speeds of printing. The model allows for a deeper understanding of the influencing process parameters which ultimately results in the determination of the optimum combination of process speed and print quality.


2018 ◽  
Vol 10 (1) ◽  
pp. 51-55 ◽  
Author(s):  
David Diller ◽  
Lalena M. Yarris

ABSTRACT Background  Twitter is increasingly recognized as an instructional tool by the emergency medicine (EM) community. In 2012, the Council of Residency Directors in Emergency Medicine (CORD) recommended that EM residency programs' Twitter accounts be managed solely by faculty. To date, little has been published regarding the patterns of Twitter use by EM residency programs. Objective  We analyzed current patterns in Twitter use among EM residency programs with accounts and assessed conformance with CORD recommendations. Methods  In this mixed methods study, a 6-question, anonymous survey was distributed via e-mail using SurveyMonkey. In addition, a Twitter-based search was conducted, and the public profiles of EM residency programs' Twitter accounts were analyzed. We calculated descriptive statistics and performed a qualitative analysis on the data. Results  Of 168 Accreditation Council for Graduate Medical Education–accredited EM programs, 88 programs (52%) responded. Of those programs, 58% (51 of 88) reported having a program-level Twitter account. Residents served as content managers for those accounts in the majority of survey respondents (61%, 28 of 46). Most programs did not publicly disclose the identity or position of their Twitter content manager. We found a wide variety of applications for Twitter, with EM programs most frequently using Twitter for educational and promotional purposes. There is significant variability in the numbers of followers for EM programs' Twitter accounts. Conclusions  Applications and usage among EM residency programs are varied, and are frequently not consistent with current CORD recommendations.


Author(s):  
Ana Clariza Natanauan ◽  
Jenmart Bonifacio ◽  
Mikael Manuel ◽  
Rex Bringula ◽  
John Benedic Enriquez

This descriptive-exploratory study attempted to give the readers a portrait of cyber café gamers in Manila. It determined the profile of gamers, their gaming usage, and their purposes of cyber café gaming. Descriptive statistics revealed that most of the respondents were Manila settlers, students, pursuing or had obtained college degrees, male, young, Roman Catholic, single, belonged to middle-income class, and played games in cyber cafés in the afternoon once to twice a week. One-way chi-square showed that frequency of gaming was not equally distributed in a week and gamers showed tendency to play games in a cyber in a particular time of the day. Real-time strategy games were the most frequently played games in cyber cafés. To recreate, to relieve boredom, and to have fun were the top three reasons in playing games in cyber cafés. Conclusions and directions for future research were also presented.


2017 ◽  
Author(s):  
Javier López-Solano ◽  
Alberto Redondas ◽  
Thomas Carlund ◽  
Juan J. Rodriguez-Franco ◽  
Henri Diémoz ◽  
...  

Abstract. The high spatial and temporal variability of aerosols make networks capable of measuring their properties in near real time of high scientific interest. In this work we present and discuss results of an aerosol optical depth algorithm to be used in the European Brewer Network, which provides data in near real time of more than 30 spectrophotometers located from Tamanrasset (Algeria) to Kangerlussuaq (Greenland). Using data from the Brewer Intercomparison Campaigns in the years 2013 and 2015, and the period in between, plus comparisons with Cimel sunphotometers and UVPFR instruments, we check the precision, stability, and uncertainty of the Brewer AOD in the ultraviolet range from 300 to 320 nm. Our results show a precision better than 0.01, an uncertainty of less than 0.05, and a stability similar to that of the ozone measurements for well-maintained instruments. We also discuss future improvements to our algorithm with respect to the input data, their processing, and the characterization of the Brewer instruments for the measurement of aerosols.


2021 ◽  
Vol 7 (167) ◽  
pp. 46-50
Author(s):  
S. Burlutska ◽  
O. Chabanenko

The world has not yet come up with a single recipe for fighting corruption. But thanks to constant progress, anti-corruption strategies are replenished with effective innovation mechanisms. The global experience of using blockchain opens up new prospects for eliminating corruption in the world. Blockchain is an opportunity not only to modernize outdated functional systems, but also to apply new, more effective means of combating corruption and cybercrime. One of the main advantages of the blockchain is that all network participants have a register of transaction data. Therefore, if someone decides to hide, delete or change their recalculations in the accounting book, then copies of these transactions still remain in tens of thousands of other users and the system immediately accesses them. Therefore, a few minutes will be enough to solve the issues of detecting a crime. Today, it is worth highlighting 3 types of widespread use of blockchain technology in the fight against corruption: identity verification, asset registration and tracking of monetary transactions. For example, you can check the purpose of money transfers in real time, see salary payments, and compare prices among suppliers. Like any type of crime, corruption in human society cannot be completely excluded. However, decentralized platforms functioning on blockchain technology, already today, firstly, can directly bring together the customer and the executor, and secondly, all the conditions agreed upon by the participants can then be easily verified (thus, it will be impossible to imperceptibly inflate the price when using blockchain). Blockchain technology is in demand because it creates an unprecedented degree of trust in information in relationships between individuals and public organizations, or between the state, people and private institutions.


2009 ◽  
Vol 56 (3) ◽  
pp. 379-396
Author(s):  
Alice Guyot ◽  
Stefan Berwing ◽  
Maria Lauxen-Ulbrich

The aim of our paper is to identify explanatory variables for income disparities between women and men across different regional types. Using data from the BA Employment Panel (BEP) descriptive statistics show that the gender pay gap grows wider from core regions to periphery. The main explanatory variables for the income differentials are vocational education in the men's case and size of enterprise in the women's case. Whereas in the case of women the importance of vocational status increases and the importance of size of enterprise decreases from rural areas to urban areas.


2019 ◽  
Vol 8 (1) ◽  
pp. 42-53
Author(s):  
Audhi Ahmad Balya ◽  
Marcella Alika Hutabarat ◽  
Djoni Hartono

The Main Objectives of this study are to check whether Indonesian households suffer from energy poverty or not, as well as to determine the accessibility to certain modern energy accesses (LPG and Electricity) and the energy cost burden that Indonesian households must bear. Using data from SUSENAS 2014, this research is conducted by utilizing descriptive statistics analysis and  Cross-Section OLS to achieve the objectives. It was found that there is no single Island Cluster in Indonesia suffers from energy cost burden. There are also differences in accessibility of modern energy and its relation to energy expenditure, especially in Maluku and Papua.


Sign in / Sign up

Export Citation Format

Share Document