scholarly journals Safety Barriers Identification, Classification, and Ways to Improve Safety Performance in the Architecture, Engineering, and Construction (AEC) Industry: Review Study

2021 ◽  
Vol 13 (6) ◽  
pp. 3316
Author(s):  
Mohammed N. Maliha ◽  
Yazan I. Abu Aisheh ◽  
Bassam A. Tayeh ◽  
Ali Almalki

The Architecture, Engineering, and Construction (AEC) industry is one of the most dangerous industries due to its unique nature. Safety is a critical issue in developed and developing countries. The main objective of this paper was to identify and classify the barriers that hinder the implementation of safety in projects and ways to improve safety performance. The method used in this paper includes a heavy review of many sources related to the safety barriers in the AEC industry, including a process of identification and classification of these barriers, after which we discuss the most popular methods between them, based on the appearance of it in the sources which were reviewed. Then, the ways to improve safety performance were viewed in AEC industry. Based on that, it was found that there are the following 4 categories associated with safety barriers: (1) Behavior Barriers; (2) Management Barriers; (3) Awareness Barriers; and (4) Culture Barriers. At the same time, the most popular barriers are based on appearance in sources: lack of safety training, lack of commitment, work pressure is high when deadlines are approaching, and low level education, lack of experience, and lack of knowledge. The many ways to improve safety performance are illustrated in the end of this paper. The results of this paper show the importance of safety and that the actual safety of the projects should be focused on in order to reduce injuries, accidents, and reduce barriers of applying safety, which will enhance the sustainability and development of safe environments within in AEC industry.

2020 ◽  
Author(s):  
Kunal Srivastava ◽  
Ryan Tabrizi ◽  
Ayaan Rahim ◽  
Lauryn Nakamitsu

<div> <div> <div> <p>Abstract </p> <p>The ceaseless connectivity imposed by the internet has made many vulnerable to offensive comments, be it their physical appearance, political beliefs, or religion. Some define hate speech as any kind of personal attack on one’s identity or beliefs. Of the many sites that grant the ability to spread such offensive speech, Twitter has arguably become the primary medium for individuals and groups to spread these hurtful comments. Such comments typically fail to be detected by Twitter’s anti-hate system and can linger online for hours before finally being taken down. Through sentiment analysis, this algorithm is able to distinguish hate speech effectively through the classification of sentiment. </p> </div> </div> </div>


Author(s):  
Marc N. Potenza ◽  
Kyle A. Faust ◽  
David Faust

As digital technology development continues to expand, both its positive and negative applications have also grown. As such, it is essential to continue gathering data on the many types of digital technologies, their overall effects, and their impact on public health. The World Health Organization’s inclusion of Gaming Disorder in the eleventh edition of the International Classification of Disease (ICD-11) indicates that some of the problematic effects of gaming are similar to those of substance-use disorders and gambling. Certain behaviors easily engaged in via the internet may also lead to compulsive levels of use in certain users, such as shopping or pornography use. In contrast, digital technologies can also lead to improvements in and wider accessibility to mental health treatments. Furthermore, various types of digital technologies can also lead to benefits such as increased productivity or social functioning. By more effectively understanding the impacts of all types of digital technologies, we can aim to maximize their benefits while minimizing or preventing their negative impacts.


Author(s):  
Kim P. Roberts ◽  
Katherine R. Wood ◽  
Breanne E. Wylie

AbstractOne of the many sources of information easily available to children is the internet and the millions of websites providing accurate, and sometimes inaccurate, information. In the current investigation, we examined children’s ability to use credibility information about websites when learning about environmental sustainability. In two studies, children studied two different websites and were tested on what they had learned a week later using a multiple-choice test containing both website items and new distracters. Children were given either no information about the websites or were told that one of the websites (the noncredible website) contained errors and they should not use any information from that website to answer the test. In both studies, children aged 7- to 9-years reported information from the noncredible website even when instructed not to, whereas the 10- to 12-year-olds used the credibility warning to ‘edit out’ information that they had learned from the noncredible website. In Study 2, there was an indication that the older children spontaneously assessed the credibility of the website if credibility markers were made explicit. A plausible explanation is that, although children remembered information from the websites, they needed explicit instruction to bind the website content with the relevant source (the individual websites). The results have implications for children’s learning in an open-access, digital age where information comes from many sources, credible and noncredible. Education in credibility evaluation may enable children to be critical consumers of information thereby resisting misinformation provided through public sources.


2007 ◽  
Vol 87 (5) ◽  
pp. 1255-1256 ◽  
Author(s):  
Angel Guerra ◽  
Xavier Martinell ◽  
Angel F. González ◽  
Michael Vecchione ◽  
Joaquin Gracia ◽  
...  

Many observers have noted that the sea is full of loud sounds, both ongoing and episodic. Among the many sources of natural ambient noise are wave action, physical processes such as undersea earthquakes, and biological activities of shrimps, fish, dolphins and whales. Despite interest by acoustics experts, sound production by cephalopods has been reported only twice, both involving squid. The ‘faint poppings’ produced were thought to result from fluttering of the thin external lips of the squid's funnel while water is being expelled through it. Otherwise, no information is available on cephalopod sounds. Here we present a noise produced by a stressed common octopus. The event was filmed and recorded in the wild. The hypothesis we offer to explain how this sound was produced is cavitation, which has been documented in several biological systems. In our case, the water expelled through the funnel may have created a jet with a velocity so high that the turbulent pressure dropped locally below the vapour pressure of the water. Seawater contains gas microbubbles, which will grow in size when they are entrained in the region of low pressure. Subsequently, the bubbles collapse violently when pressure rises again. The sound produced by the octopus is like a gunshot, and distinct lights observed at the same time contradict the existence of a simple pressure wave and point to the possible presence of gas-bubbles, which would change the light intensity by reflection and refraction of the sunlight. This behaviour seems to be a defensive strategy to escape from vibration-sensitive predators.


2018 ◽  
Vol 18 (2) ◽  
pp. 110-129 ◽  
Author(s):  
Evan Alaa Nadhim ◽  
Carol K.H. Hon ◽  
Bo Xia ◽  
Ian Stewart ◽  
Dongping Fang

Retrofitting works has become increasingly important in the construction industry, as it plays an effective role in providing solutions to maintain, upgrade or change the functions to the existing or aged buildings. Very often, safety issues of retrofitting works are underestimated because there may be unreported accidents in small projects and there is no separate classification of accident statistics for the retrofitting works within the construction industry. As safety climate is widely regarded as a contributing factor to safety performance, the aim of this research was to examine the relationship between safety climate and safety performance in retrofitting works context. The safety climate questionnaire NOSACQ-50 has been employed to measure safety climate in retrofitting works. Field patrols were undertaken to distribute the safety questionnaires to the local worksites that undertake retrofits in Brisbane, Queensland, Australia. 264 valid questionnaires were collected. SEM was employed to examine the existence and strength of the relationship between safety climate and safety performance. PLS-SEM was utilised to estimate the parameters of the structural model. The model has exposed a positive relationship between safety climate and safety performance in retrofitting context. This research was the first to examine the relationship between the second order latent variables. A positive relationship (0.60 with 36 percent of explained variance) was found between safety climate and safety performance.


2022 ◽  
Vol 12 (1) ◽  
pp. 50
Author(s):  
Kendall Hartley ◽  
Alberto Andújar

The smartphone has become an integral part of the education landscape. While there has been significant smartphone research in education under the guise of m-learning, the unique role of the device suggests that m-learning may not be an appropriate characterization. The purpose of this paper is to review the use of m-learning as a primary descriptor for smartphone- and learning-related research. In support of this goal, the paper reviews the definitions associated with m-learning, smartphones, and related technologies from the perspective of educational research. In addition, a review of author keywords of research on smartphones in education is used to provide context to the classification of the research. Finally, three theoretically guided smartphone programs are presented as evidence of the unique nature of smartphone and learning research. This review concludes with recommendations for the characterization of future research.


2021 ◽  
Author(s):  
Agumasie Semahegn ◽  
Kwasi Torpey ◽  
Adom Manu ◽  
Nega Assefa ◽  
Naana Agyeman ◽  
...  

Abstract Background: Ethiopia is signatory to various international and regional conventions, agreements and protocols related to violence against women, yet the many women suffer violence. To date, very little is known about how these conventions and protocols are implemented, and the barriers associated with implementation. Our study explored the barriers to implementation of domestic violence against women prevention policies and enablers in the Northwestern Ethiopia.Methods: We conducted in-depth interviews, key informant interviews and focus group discussions among a total of 43 participants purposefully selected from different sectors and communities. Data were transcribed, coded and thematically analyzed using NVivo 11 software.Results: Community-traditional gender-norms, budget constraints, poor planning and non-adherence to planned activities, lack of commitment, poor integration and inter-sectoral collaboration served as barriers to implementation of policies aimed at preventing domestic violence in Ethiopia. However, enablers of domestic implementation of violence prevention programs include community health extension program, women development ‘army’, policy frameworks, government’s political willingness, presence of school-based gender clubs.Conclusions: The implementation of existing evidence and policies was still poor at the community level due to lack of inter-sectoral collaboration, poor integration and stakeholders with competing priorities among others. Future intervention programs that would sustain and synergized domestic violence prevention, should integrate intersectoral collaboration and service within existing program.


2018 ◽  
Vol 25 (4) ◽  
pp. 74
Author(s):  
Alfredo Silveira Araújo Neto ◽  
Marcos Negreiros

The rapid advances in technologies related to the capture and storage of data in digital format have allowed to organizations the accumulation of a volume of information extremely high, constituted a higher proportion of data in unstructured format, represented by texts. However, it is noted that the retrieval of useful information from these large repositories has been a very challenging activity. In this context, data mining is presented as a self-discovery process that acts on large databases and enables the knowledge extraction from raw text documents. Among the many sources of textual documents are electronic diaries of justice, which are intended to make public officially all the acts of the Judiciary. Despite the publication in digital form has provided improvements represented by the removal of imperfections related to divulgation at printed format, it is observed that the application of data mining methods could render more rapid analysis of its contents. In this sense, this article establishes a tool capable of automatically grouping and categorizing digital procedural acts, based on the evaluation of text mining techniques applied to groups determination activity. In addition, the strategy of defining the descriptors of the groups, that is usually conducted based on the most frequent words in the documents, was evaluated and remodeled in order to use, instead of words, the most regularly identified concepts in the texts.


1986 ◽  
Vol 149 (2) ◽  
pp. 172-190 ◽  
Author(s):  
Richard Mayou ◽  
Keith Hawton

There have been many reports of psychiatric disorder in medical populations, but few have used standard methods on representative patient groups. Even so, there is consistent evidence for considerable psychiatric morbidity in in-patient, out-patient and casualty department populations, much of which is unrecognised by hospital doctors. We require a better classification of psychiatric disorder in the general hospital, improved research measures, and more evidence about the nature and course of the many different types of problem so that we can provide precise advice for their management of routine clinical practice.


Author(s):  
John Chiverton ◽  
Kevin Wells

This chapter applies a Bayesian formulation of the Partial Volume (PV) effect, based on the Benford distribution, to the statistical classification of nuclear medicine imaging data: specifically Positron Emission Tomography (PET) acquired as part of a PET-CT phantom imaging procedure. The Benford distribution is a discrete probability distribution of great interest for medical imaging, because it describes the probabilities of occurrence of single digits in many sources of data. The chapter thus describes the PET-CT imaging and post-processing process to derive a gold standard. Moreover, this chapter uses it as a ground truth for the assessment of a Benford classifier formulation. The use of this gold standard shows that the classification of both the simulated and real phantom imaging data is well described by the Benford distribution.


Sign in / Sign up

Export Citation Format

Share Document