Search results

1 – 10 of over 28000
Article
Publication date: 15 November 2021

Keng Yang, Hanying Qi and Qian Huang

Existing studies on the relationship between task description and task performance are insufficient, with many studies considering description length rather than content to…

Abstract

Purpose

Existing studies on the relationship between task description and task performance are insufficient, with many studies considering description length rather than content to measure quality or only evaluating a single aspect of task performance. To address this gap, this study analyzes the linguistic styles of task descriptions from 2,545 tasks on the Taskcn.com crowdsourcing platform.

Design/methodology/approach

An empirical analysis was completed for task description language styles and task performance. The paper used text mining tool Simplified Chinese Linguistic Inquiry and Word Count to extract eight linguistic styles, namely readability, self-distancing, cognitive complexity, causality, tentative language, humanizing personal details, normative information and language intensity. And it tests the relationship between the eight language styles and task performance.

Findings

The study found that more cognitive complexity markers, tentative language, humanized details and normative information increase the quantity of submissions for a task. In addition, more humanized details and normative information in a task description improves the quality of task. Conversely, the inclusion of more causal relationships in a task description reduces the quantity of submissions. Poorer readability of the task description, less self-estrangement and higher language intensity reduces the quality of the task.

Originality/value

This study first reveals the importance of the linguistic styles used in task descriptions and provides a reference for how to attract more task solvers and achieve higher quality task performance by improving task descriptions. The research also enriches existing knowledge on the impact of linguistic styles and the applications of text mining.

Details

Industrial Management & Data Systems, vol. 122 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Open Access
Article
Publication date: 16 March 2022

Ryo Sakurai

This study was conducted to understand students' achievements in learning and to improve the overall curriculum of the first-year experience course.

Abstract

Purpose

This study was conducted to understand students' achievements in learning and to improve the overall curriculum of the first-year experience course.

Design/methodology/approach

In this study, a series of questionnaire-based surveys were conducted on students enrolled in the Introductory Seminar for Policy Science, a mandatory first-year experience course offered in the first semester (from April to July) at a university in Japan. The studies were conducted in 2015 (n = 29), 2016 (n = 29) and 2017 (n = 31).

Findings

Results revealed that, regardless of the year, students deepened their understanding of policy science and gained increased confidence to explain what group works and reports are throughout the semester. In addition, students' level of worry about life at the university decreased throughout the course in all three years. A stepwise multiple regression analysis (n = 84) revealed that those students who knew what policy science was (B = 0.271) and had the confidence to write their opinions in reports (B = 0.264) more likely answered that they knew what they wanted to study over four years at the university.

Originality/value

This study revealed that the mandatory first-year experience course taught by the same instructor generated similar educational effects for different students in different years. The results elucidated the progressive effects of different components of the course, eliminating possibilities of any bias or specific characteristics of a single group of students.

Details

Journal of Applied Research in Higher Education, vol. 15 no. 1
Type: Research Article
ISSN: 2050-7003

Keywords

Book part
Publication date: 20 November 2020

L. P. Barreto, A. S. Silva and R. C. Ferreira

Identifying and managing supply chain risk is crucial for the competitiveness of a company. However, research focused on the risks of supply chain operations in Brazil is scarce…

Abstract

Identifying and managing supply chain risk is crucial for the competitiveness of a company. However, research focused on the risks of supply chain operations in Brazil is scarce. The purpose of this study is to analyze and assess the risk of cargo theft in the country. The methodology adopted is deductive and based on an analysis of historical data from January 2015 to November 2017, aiming to evaluate risk based on probability and impact. The findings unveil a scenario of criminality of transporting goods in Brazil, where the use of force, violence, and threats to steal goods is most likely to occur en route or when parked in key locations on the way to the distribution center. On the other hand, the higher impact cargo crimes are concentrated en route to the customer. This chapter provides a better understanding of the risks of transporting goods by road in Brazil and contributes to a more efficient supply chain design by identifying the risks and assessing the primary locations of the crimes along with their modi operandi and the period of the day during which the crime occurs.

Details

Supply Chain Management and Logistics in Emerging Markets
Type: Book
ISBN: 978-1-83909-333-3

Keywords

Book part
Publication date: 15 May 2023

Birol Yıldız and Şafak Ağdeniz

Purpose: The main aim of the study is to provide a tool for non-financial information in decision-making. We analysed the non-financial data in the annual reports in order to show…

Abstract

Purpose: The main aim of the study is to provide a tool for non-financial information in decision-making. We analysed the non-financial data in the annual reports in order to show the usage of this information in financial decision processes.

Need for the Study: Main financial reports such as balance sheets and income statements can be analysed by statistical methods. However, an expanded financial reporting framework needs new analysing methods due to unstructured and big data. The study offers a solution to the analysis problem that comes with non-financial reporting, which is an essential communication tool in corporate reporting.

Methodology: Text mining analysis of annual reports is conducted using software named R. To simplify the problem, we try to predict the companies’ corporate governance qualifications using text mining. K Nearest Neighbor, Naive Bayes and Decision Tree machine learning algorithms were used.

Findings: Our analysis illustrates that K Nearest Neighbor has classified the highest number of correct classifications by 85%, compared to 50% for the random walk. The empirical evidence suggests that text mining can be used by all stakeholders as a financial analysis method.

Practical Implications: Combining financial statement analyses with financial reporting analyses will decrease the information asymmetry between the company and stakeholders. So stakeholders can make more accurate decisions. Analysis of non-financial data with text mining will provide a decisive competitive advantage, especially for investors to make the right decisions. This method will lead to allocating scarce resources more effectively. Another contribution of the study is that stakeholders can predict the corporate governance qualification of the company from the annual reports even if it does not include in the Corporate Governance Index (CGI).

Details

Contemporary Studies of Risks in Emerging Technology, Part B
Type: Book
ISBN: 978-1-80455-567-5

Keywords

Article
Publication date: 23 March 2012

Seyed Hadi Hoseinie, Mohammad Ataei, Reza Khalokakaie, Behzad Ghodrati and Uday Kumar

Longwall mining is a special mining method with high productivity and smooth operation and the drum shearer is known as the most important component in longwall mines due to its…

2048

Abstract

Purpose

Longwall mining is a special mining method with high productivity and smooth operation and the drum shearer is known as the most important component in longwall mines due to its direct role in the coal cutting and production process. Therefore, its reliability is important in keeping the mine production at a desired level. Hence, reliability analysis is essential in identifying and removing existing problems of this machine in order to achieve a better production condition. This paper seeks to learn about the reliability of the shearer machine in order to locate critical subsystems. The improvement of the reliability of the critical subsystems, to enhance the optimum operation of the shearer machine, is the main objective of this research.

Design/methodology/approach

A basic methodology was used in this paper for the reliability modeling of the shearer machine. First, failure and performance data from a two‐year period at the Tabas Coal Mine‐Iran was classified and sorted. The tests for validating the assumption of independent and identical distribution (iid) of TBF data are done and the best modeling method for each subsystem was selected among the renewal process, homogeneous Poisson process and non‐homogeneous Poisson process. Finally, the reliability of subsystems and the machine were assessed.

Findings

The study revealed that six important subsystems of the shearer machine are; water system, haulage, electrical system, hydraulic system, cutting arms, and cable system. Pareto analysis shows that the 30 percent of failures and stoppages of the shearer were related to the water system and this system is the most critical subsystem of the machine. The failure rate analysis shows that the failure rates of the hydraulic, haulage and electrical systems were decreasing, meanwhile, the failure rates of the water system, cutting arms and cable system were increasing. The reliability of drum shearer reaches the zero value after 100 hours.

Originality/value

This paper, for the first time, defines a practical set of subsystems for the coal shearer based on field data and machine design.

Details

Journal of Quality in Maintenance Engineering, vol. 18 no. 1
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 13 December 2019

Yang Li and Xuhua Hu

The purpose of this paper is to solve the problem of information privacy and security of social users. Mobile internet and social network are more and more deeply integrated into…

Abstract

Purpose

The purpose of this paper is to solve the problem of information privacy and security of social users. Mobile internet and social network are more and more deeply integrated into people’s daily life, especially under the interaction of the fierce development momentum of the Internet of Things and diversified personalized services, more and more private information of social users is exposed to the network environment actively or unintentionally. In addition, a large amount of social network data not only brings more benefits to network application providers, but also provides motivation for malicious attackers. Therefore, under the social network environment, the research on the privacy protection of user information has great theoretical and practical significance.

Design/methodology/approach

In this study, based on the social network analysis, combined with the attribute reduction idea of rough set theory, the generalized reduction concept based on multi-level rough set from the perspectives of positive region, information entropy and knowledge granularity of rough set theory were proposed. Furthermore, it was traversed on the basis of the hierarchical compatible granularity space of the original information system and the corresponding attribute values are coarsened. The selected test data sets were tested, and the experimental results were analyzed.

Findings

The results showed that the algorithm can guarantee the anonymity requirement of data publishing and improve the effect of classification modeling on anonymous data in social network environment.

Research limitations/implications

In the test and verification of privacy protection algorithm and privacy protection scheme, the efficiency of algorithm and scheme needs to be tested on a larger data scale. However, the data in this study are not enough. In the following research, more data will be used for testing and verification.

Practical implications

In the context of social network, the hierarchical structure of data is introduced into rough set theory as domain knowledge by referring to human granulation cognitive mechanism, and rough set modeling for complex hierarchical data is studied for hierarchical data of decision table. The theoretical research results are applied to hierarchical decision rule mining and k-anonymous privacy protection data mining research, which enriches the connotation of rough set theory and has important theoretical and practical significance for further promoting the application of this theory. In addition, combined the theory of secure multi-party computing and the theory of attribute reduction in rough set, a privacy protection feature selection algorithm for multi-source decision table is proposed, which solves the privacy protection problem of feature selection in distributed environment. It provides a set of effective rough set feature selection method for privacy protection classification mining in distributed environment, which has practical application value for promoting the development of privacy protection data mining.

Originality/value

In this study, the proposed algorithm and scheme can effectively protect the privacy of social network data, ensure the availability of social network graph structure and realize the need of both protection and sharing of user attributes and relational data.

Details

Library Hi Tech, vol. 40 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Book part
Publication date: 7 October 2015

Azizah Ahmad

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive…

Abstract

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive advantage provided by BI capability is not well researched. To fill this gap, this study attempts to develop a model for successful BI deployment and empirically examines the association between BI deployment and sustainable competitive advantage. Taking the telecommunications industry in Malaysia as a case example, the research particularly focuses on the influencing perceptions held by telecommunications decision makers and executives on factors that impact successful BI deployment. The research further investigates the relationship between successful BI deployment and sustainable competitive advantage of the telecommunications organizations. Another important aim of this study is to determine the effect of moderating factors such as organization culture, business strategy, and use of BI tools on BI deployment and the sustainability of firm’s competitive advantage.

This research uses combination of resource-based theory and diffusion of innovation (DOI) theory to examine BI success and its relationship with firm’s sustainability. The research adopts the positivist paradigm and a two-phase sequential mixed method consisting of qualitative and quantitative approaches are employed. A tentative research model is developed first based on extensive literature review. The chapter presents a qualitative field study to fine tune the initial research model. Findings from the qualitative method are also used to develop measures and instruments for the next phase of quantitative method. The study includes a survey study with sample of business analysts and decision makers in telecommunications firms and is analyzed by partial least square-based structural equation modeling.

The findings reveal that some internal resources of the organizations such as BI governance and the perceptions of BI’s characteristics influence the successful deployment of BI. Organizations that practice good BI governance with strong moral and financial support from upper management have an opportunity to realize the dream of having successful BI initiatives in place. The scope of BI governance includes providing sufficient support and commitment in BI funding and implementation, laying out proper BI infrastructure and staffing and establishing a corporate-wide policy and procedures regarding BI. The perceptions about the characteristics of BI such as its relative advantage, complexity, compatibility, and observability are also significant in ensuring BI success. The most important results of this study indicated that with BI successfully deployed, executives would use the knowledge provided for their necessary actions in sustaining the organizations’ competitive advantage in terms of economics, social, and environmental issues.

This study contributes significantly to the existing literature that will assist future BI researchers especially in achieving sustainable competitive advantage. In particular, the model will help practitioners to consider the resources that they are likely to consider when deploying BI. Finally, the applications of this study can be extended through further adaptation in other industries and various geographic contexts.

Details

Sustaining Competitive Advantage Via Business Intelligence, Knowledge Management, and System Dynamics
Type: Book
ISBN: 978-1-78441-764-2

Keywords

Article
Publication date: 1 November 2005

Mohamed Hammami, Youssef Chahir and Liming Chen

Along with the ever growingWeb is the proliferation of objectionable content, such as sex, violence, racism, etc. We need efficient tools for classifying and filtering undesirable…

Abstract

Along with the ever growingWeb is the proliferation of objectionable content, such as sex, violence, racism, etc. We need efficient tools for classifying and filtering undesirable web content. In this paper, we investigate this problem through WebGuard, our automatic machine learning based pornographic website classification and filtering system. Facing the Internet more and more visual and multimedia as exemplified by pornographic websites, we focus here our attention on the use of skin color related visual content based analysis along with textual and structural content based analysis for improving pornographic website filtering. While the most commercial filtering products on the marketplace are mainly based on textual content‐based analysis such as indicative keywords detection or manually collected black list checking, the originality of our work resides on the addition of structural and visual content‐based analysis to the classical textual content‐based analysis along with several major‐data mining techniques for learning and classifying. Experimented on a testbed of 400 websites including 200 adult sites and 200 non pornographic ones, WebGuard, our Web filtering engine scored a 96.1% classification accuracy rate when only textual and structural content based analysis are used, and 97.4% classification accuracy rate when skin color related visual content based analysis is driven in addition. Further experiments on a black list of 12 311 adult websites manually collected and classified by the French Ministry of Education showed that WebGuard scored 87.82% classification accuracy rate when using only textual and structural content‐based analysis, and 95.62% classification accuracy rate when the visual content‐based analysis is driven in addition. The basic framework of WebGuard can apply to other categorization problems of websites which combine, as most of them do today, textual and visual content.

Details

International Journal of Web Information Systems, vol. 1 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 October 2019

Balaraju Jakkula, Govinda Raj M. and Murthy Ch.S.N.

Load haul dumper (LHD) is one of the main ore transporting machineries used in underground mining industry. Reliability of LHD is very significant to achieve the expected targets…

Abstract

Purpose

Load haul dumper (LHD) is one of the main ore transporting machineries used in underground mining industry. Reliability of LHD is very significant to achieve the expected targets of production. The performance of the equipment should be maintained at its highest level to fulfill the targets. This can be accomplished only by reducing the sudden breakdowns of component/subsystems in a complex system. The identification of defective component/subsystems can be possible by performing the downtime analysis. Hence, it is very important to develop the proper maintenance strategies for replacement or repair actions of the defective ones. Suitable maintenance management actions improve the performance of the equipment. This paper aims to discuss this issue.

Design/methodology/approach

Reliability analysis (renewal approach) has been used to analyze the performance of LHD machine. Allocations of best-fit distribution of data sets were made by the utilization of Kolmogorov–Smirnov (K–S) test. Parametric estimation of theoretical probability distributions was made by utilizing the maximum likelihood estimate (MLE) method.

Findings

Independent and identical distribution (IID) assumption of data sets was validated through trend and serial correlation tests. On the basis of test results, the data sets are in accordance with IID assumption. Therefore, renewal process approach has been utilized for further investigation. Allocations of best-fit distribution of data sets were made by the utilization of Kolmogorov–Smirnov (K–S) test. Parametric estimation of theoretical probability distributions was made by utilizing the MLE method. Reliability of each individual subsystem has been computed according to the best-fit distribution. In respect of obtained reliability results, the reliability-based preventive maintenance (PM) time schedules were calculated for the expected 90 percent reliability level.

Research limitations/implications

As the reliability analysis is one of the complex techniques, it requires strategic decision making knowledge for the selection of methodology to be used. As the present case study was from a public sector company, operating under financial constraints the conclusions/findings may not be universally applicable.

Originality/value

The present study throws light on this equipment that need a tailored maintenance schedule, partly due to the peculiar mining conditions, under which they operate. This study mainly focuses on estimating the performance of four numbers of well-mechanized LHD systems with reliability, availability and maintainability (RAM) modeling. Based on the drawn results, reasons for performance drop of each machine were identified. Suitable recommendations were suggested for the enhancement of performance of capital intensive production equipment. As the maintenance management is only the means for performance improvement of the machinery, PM time intervals were estimated with respect to the expected rate of reliability level.

Details

Journal of Quality in Maintenance Engineering, vol. 26 no. 2
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 19 December 2022

Sukjin You, Soohyung Joo and Marie Katsurai

The purpose of this study is to explore to which extent data mining research would be associated with the library and information science (LIS) discipline. This study aims to…

Abstract

Purpose

The purpose of this study is to explore to which extent data mining research would be associated with the library and information science (LIS) discipline. This study aims to identify data mining related subject terms and topics in representative LIS scholarly publications.

Design/methodology/approach

A large set of bibliographic records over 38,000 was collected from a scholarly database representing the fields of LIS and the data mining, respectively. A multitude of text mining techniques were applied to investigate prevailing subject terms and research topics, such as influential term analysis and Dirichlet multinomial regression topic modeling.

Findings

The findings of this study revealed the relationship between the LIS and data mining research domains. Various data mining method terms were observed in recent LIS publications, such as machine learning, artificial intelligence and neural networks. The topic modeling result identified prevailing data mining related research topics in LIS, such as machine learning, deep learning, big data and among others. In addition, this study investigated the trends of popular topics in LIS over time in the recent decade.

Originality/value

This investigation is one of a few studies that empirically investigated the relationships between the LIS and data mining research domains. Multiple text mining techniques were employed to delineate to which extent the two research domains would be associated with each other based on both at the term-level and topic-level analysis. Methodologically, the study identified influential terms in each domain using multiple feature selection indices. In addition, Dirichlet multinomial regression was applied to explore LIS topics in relation to data mining.

Details

Aslib Journal of Information Management, vol. 76 no. 1
Type: Research Article
ISSN: 2050-3806

Keywords

1 – 10 of over 28000