CINXE.COM

J Maiti - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>J Maiti - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="T5fa0i9dKyVJ6cm1lCHhgU9uqQSuRfGmzICh0ILKXaB0LiSO6N1E3l5uFqGFDqfg3fgU1O/2mCcgFuR4LUZetQ==" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-77f7b87cb1583fc59aa8f94756ebfe913345937eb932042b4077563bebb5fb4b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-9e8218e1301001388038e3fc3427ed00d079a4760ff7745d1ec1b2d59103170a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-b2b823dd904da60a48fd1bfa1defd840610c2ff414d3f39ed3af46277ab8df3b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="author" content="j maiti" /> <meta name="description" content="J Maiti: 24 Followers, 1 Following, 77 Research papers. Research interests: Goodness of Fit, Psychological, and Structural Equation Model." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '92477ec68c09d28ae4730a4143c926f074776319'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15276,"monthly_visitors":"113 million","monthly_visitor_count":113458213,"monthly_visitor_count_in_millions":113,"user_count":277574237,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732831978000); window.Aedu.timeDifference = new Date().getTime() - 1732831978000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-bdb9e8c097f01e611f2fc5e2f1a9dc599beede975e2ae5629983543a1726e947.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-bae13f9b51961d5f1e06008e39e31d0138cb31332e8c2e874c6d6a250ec2bb14.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-19a25d160d01bde427443d06cd6b810c4c92c6026e7cb31519e06313eb24ed90.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://independent.academia.edu/MaitiJ" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-e032f1d55548c2f2dee4eac9fe52f38beaf13471f2298bb2ea82725ae930b83c.js" defer="defer"></script><script>Aedu.rankings = { showPaperRankingsLink: false } $viewedUser = Aedu.User.set_viewed( {"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ","photo":"https://0.academia-photos.com/163294954/94743178/83704597/s65_j.maiti.jpeg","has_photo":true,"is_analytics_public":false,"interests":[{"id":93174,"name":"Goodness of Fit","url":"https://www.academia.edu/Documents/in/Goodness_of_Fit"},{"id":87626,"name":"Psychological","url":"https://www.academia.edu/Documents/in/Psychological"},{"id":214510,"name":"Structural Equation Model","url":"https://www.academia.edu/Documents/in/Structural_Equation_Model"},{"id":75582,"name":"Quantization","url":"https://www.academia.edu/Documents/in/Quantization"},{"id":568878,"name":"Covariance Matrix","url":"https://www.academia.edu/Documents/in/Covariance_Matrix"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://independent.academia.edu/MaitiJ&quot;,&quot;location&quot;:&quot;/MaitiJ&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;independent.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/MaitiJ&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-1590b111-cda9-4fd8-adf8-be0378f91d60"></div> <div id="ProfileCheckPaperUpdate-react-component-1590b111-cda9-4fd8-adf8-be0378f91d60"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="J Maiti" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/163294954/94743178/83704597/s200_j.maiti.jpeg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">J Maiti</h1><div class="affiliations-container fake-truncate js-profile-affiliations"></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="J" data-follow-user-id="163294954" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="163294954"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">24</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">1</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="163294954" href="https://www.academia.edu/Documents/in/Goodness_of_Fit"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://independent.academia.edu/MaitiJ&quot;,&quot;location&quot;:&quot;/MaitiJ&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;independent.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/MaitiJ&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Goodness of Fit&quot;]}" data-trace="false" data-dom-id="Pill-react-component-954dde02-2884-4356-a324-93bc47baa0f1"></div> <div id="Pill-react-component-954dde02-2884-4356-a324-93bc47baa0f1"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="163294954" href="https://www.academia.edu/Documents/in/Psychological"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Psychological&quot;]}" data-trace="false" data-dom-id="Pill-react-component-c7c9d0de-ed34-4737-adec-c104f7d996b8"></div> <div id="Pill-react-component-c7c9d0de-ed34-4737-adec-c104f7d996b8"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="163294954" href="https://www.academia.edu/Documents/in/Structural_Equation_Model"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Structural Equation Model&quot;]}" data-trace="false" data-dom-id="Pill-react-component-81ba69dc-b9ca-4c35-bfcc-e0b1d84d037e"></div> <div id="Pill-react-component-81ba69dc-b9ca-4c35-bfcc-e0b1d84d037e"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="163294954" href="https://www.academia.edu/Documents/in/Quantization"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Quantization&quot;]}" data-trace="false" data-dom-id="Pill-react-component-2c2ba789-4acd-45c1-8e9f-d72a43258962"></div> <div id="Pill-react-component-2c2ba789-4acd-45c1-8e9f-d72a43258962"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="163294954" href="https://www.academia.edu/Documents/in/Covariance_Matrix"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Covariance Matrix&quot;]}" data-trace="false" data-dom-id="Pill-react-component-4d8413c1-f3d5-4957-90d7-c39750518207"></div> <div id="Pill-react-component-4d8413c1-f3d5-4957-90d7-c39750518207"></div> </a></div></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by J Maiti</h3></div><div class="js-work-strip profile--work_container" data-work-id="78796345"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796345/Dynamic_Functional_Bandwidth_Kernel_Based_SVM_An_Efficient_Approach_for_Functional_Data_Analysis"><img alt="Research paper thumbnail of Dynamic Functional Bandwidth Kernel-Based SVM: An Efficient Approach for Functional Data Analysis" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796345/Dynamic_Functional_Bandwidth_Kernel_Based_SVM_An_Efficient_Approach_for_Functional_Data_Analysis">Dynamic Functional Bandwidth Kernel-Based SVM: An Efficient Approach for Functional Data Analysis</a></div><div class="wp-workCard_item"><span>Advances in Intelligent Systems and Computing</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796345"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796345"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796345; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796345]").text(description); $(".js-view-count[data-work-id=78796345]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796345; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796345']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796345, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796345]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796345,"title":"Dynamic Functional Bandwidth Kernel-Based SVM: An Efficient Approach for Functional Data Analysis","translated_title":"","metadata":{"publisher":"Springer Singapore","publication_name":"Advances in Intelligent Systems and Computing"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796345/Dynamic_Functional_Bandwidth_Kernel_Based_SVM_An_Efficient_Approach_for_Functional_Data_Analysis","translated_internal_url":"","created_at":"2022-05-08T19:18:25.039-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Dynamic_Functional_Bandwidth_Kernel_Based_SVM_An_Efficient_Approach_for_Functional_Data_Analysis","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":20339071,"url":"https://link.springer.com/content/pdf/10.1007/978-981-15-9927-9_65"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796344"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796344/Predicting_and_Analysing_Pedestrian_Injury_Severity_A_Machine_Learning_Based_Approach"><img alt="Research paper thumbnail of Predicting and Analysing Pedestrian Injury Severity: A Machine Learning-Based Approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796344/Predicting_and_Analysing_Pedestrian_Injury_Severity_A_Machine_Learning_Based_Approach">Predicting and Analysing Pedestrian Injury Severity: A Machine Learning-Based Approach</a></div><div class="wp-workCard_item"><span>Proceedings of the Seventh International Conference on Mathematics and Computing</span><span>, 2022</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796344"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796344"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796344; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796344]").text(description); $(".js-view-count[data-work-id=78796344]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796344; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796344']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796344, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796344]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796344,"title":"Predicting and Analysing Pedestrian Injury Severity: A Machine Learning-Based Approach","translated_title":"","metadata":{"publisher":"Springer Singapore","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Proceedings of the Seventh International Conference on Mathematics and Computing"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796344/Predicting_and_Analysing_Pedestrian_Injury_Severity_A_Machine_Learning_Based_Approach","translated_internal_url":"","created_at":"2022-05-08T19:18:24.923-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Predicting_and_Analysing_Pedestrian_Injury_Severity_A_Machine_Learning_Based_Approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[],"urls":[{"id":20339070,"url":"https://link.springer.com/content/pdf/10.1007/978-981-16-6890-6_36"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796343"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796343/IoT_Based_Laser_Trip_Wire_System_for_Safety_and_Security_in_Industries"><img alt="Research paper thumbnail of IoT-Based Laser Trip Wire System for Safety and Security in Industries" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796343/IoT_Based_Laser_Trip_Wire_System_for_Safety_and_Security_in_Industries">IoT-Based Laser Trip Wire System for Safety and Security in Industries</a></div><div class="wp-workCard_item"><span>Internet of Things</span><span>, 2022</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796343"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796343"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796343; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796343]").text(description); $(".js-view-count[data-work-id=78796343]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796343; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796343']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796343, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796343]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796343,"title":"IoT-Based Laser Trip Wire System for Safety and Security in Industries","translated_title":"","metadata":{"publisher":"CRC Press","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Internet of Things"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796343/IoT_Based_Laser_Trip_Wire_System_for_Safety_and_Security_in_Industries","translated_internal_url":"","created_at":"2022-05-08T19:18:24.834-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"IoT_Based_Laser_Trip_Wire_System_for_Safety_and_Security_in_Industries","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":9135,"name":"The Internet of Things","url":"https://www.academia.edu/Documents/in/The_Internet_of_Things"},{"id":14725,"name":"Internet of Things","url":"https://www.academia.edu/Documents/in/Internet_of_Things"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796342"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796342/Root_Cause_Analysis_of_Incidents_Using_Text_Clustering_and_Classification_Algorithms"><img alt="Research paper thumbnail of Root Cause Analysis of Incidents Using Text Clustering and Classification Algorithms" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796342/Root_Cause_Analysis_of_Incidents_Using_Text_Clustering_and_Classification_Algorithms">Root Cause Analysis of Incidents Using Text Clustering and Classification Algorithms</a></div><div class="wp-workCard_item"><span>Proceedings of ICETIT 2019</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The purpose of this study is to cluster the injury narratives to extract the root causes behind t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The purpose of this study is to cluster the injury narratives to extract the root causes behind the accidents. Analysis is done on incident data collected from the database of an integrated steel plant. Key terms generated from the clustering of incident scenario help us in finding root causes of that particular incident. This study also proposed specific measures to the management that would improve the safety performance. This study uses text document clustering to discover the hidden factors and causes behind the incidents. Understanding previous accidents is necessary to avoid future accidents. However, for companies, management of large accident databases, and accurately classifying accident narratives are very challenging issues. Therefore, the aim of this study is to accurately classify accident reports using text classification approaches and evaluate their usefulness. The study used two machine learning (ML) algorithms, namely random forest (RF), and support vector machine (SVM) and found that SVM performed best in classifying the accident narratives. Further, SVM was experimented with different tokenization of the preprocessed narratives to get more reliable results.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796342"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796342"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796342; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796342]").text(description); $(".js-view-count[data-work-id=78796342]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796342; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796342']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796342, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796342]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796342,"title":"Root Cause Analysis of Incidents Using Text Clustering and Classification Algorithms","translated_title":"","metadata":{"abstract":"The purpose of this study is to cluster the injury narratives to extract the root causes behind the accidents. Analysis is done on incident data collected from the database of an integrated steel plant. Key terms generated from the clustering of incident scenario help us in finding root causes of that particular incident. This study also proposed specific measures to the management that would improve the safety performance. This study uses text document clustering to discover the hidden factors and causes behind the incidents. Understanding previous accidents is necessary to avoid future accidents. However, for companies, management of large accident databases, and accurately classifying accident narratives are very challenging issues. Therefore, the aim of this study is to accurately classify accident reports using text classification approaches and evaluate their usefulness. The study used two machine learning (ML) algorithms, namely random forest (RF), and support vector machine (SVM) and found that SVM performed best in classifying the accident narratives. Further, SVM was experimented with different tokenization of the preprocessed narratives to get more reliable results.","publisher":"Springer International Publishing","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Proceedings of ICETIT 2019"},"translated_abstract":"The purpose of this study is to cluster the injury narratives to extract the root causes behind the accidents. Analysis is done on incident data collected from the database of an integrated steel plant. Key terms generated from the clustering of incident scenario help us in finding root causes of that particular incident. This study also proposed specific measures to the management that would improve the safety performance. This study uses text document clustering to discover the hidden factors and causes behind the incidents. Understanding previous accidents is necessary to avoid future accidents. However, for companies, management of large accident databases, and accurately classifying accident narratives are very challenging issues. Therefore, the aim of this study is to accurately classify accident reports using text classification approaches and evaluate their usefulness. The study used two machine learning (ML) algorithms, namely random forest (RF), and support vector machine (SVM) and found that SVM performed best in classifying the accident narratives. Further, SVM was experimented with different tokenization of the preprocessed narratives to get more reliable results.","internal_url":"https://www.academia.edu/78796342/Root_Cause_Analysis_of_Incidents_Using_Text_Clustering_and_Classification_Algorithms","translated_internal_url":"","created_at":"2022-05-08T19:18:24.717-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Root_Cause_Analysis_of_Incidents_Using_Text_Clustering_and_Classification_Algorithms","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":131237,"name":"Cluster Analysis","url":"https://www.academia.edu/Documents/in/Cluster_Analysis"}],"urls":[{"id":20339069,"url":"http://link.springer.com/content/pdf/10.1007/978-3-030-30577-2_63"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796341"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796341/Prediction_of_Occupational_Incidents_Using_Proactive_and_Reactive_Data_A_Data_Mining_Approach"><img alt="Research paper thumbnail of Prediction of Occupational Incidents Using Proactive and Reactive Data: A Data Mining Approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796341/Prediction_of_Occupational_Incidents_Using_Proactive_and_Reactive_Data_A_Data_Mining_Approach">Prediction of Occupational Incidents Using Proactive and Reactive Data: A Data Mining Approach</a></div><div class="wp-workCard_item"><span>Industrial Safety Management</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Prediction of occupational incidents is an important task for any industry. To do this, reactive ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Prediction of occupational incidents is an important task for any industry. To do this, reactive data has been used by most of the previous studies in this domain. As an extension of the existing works, the present study has used the underused proactive data coupled with reactive data to establish the predictive models so that the information inherent in both data sets could be better utilized. The main aim of the study is to predict the incident outcomes using mixed data set comprising reactive and proactive data together. Two decision tree classifiers, i.e. classification and regression tree (CART) and C5.0, have been implemented with tenfold cross validation. Furthermore, the ensemble technique, namely adaptive boosting has been implemented to increase the classification accuracy. Results show that boosted C5.0 produces higher accuracy than others for the prediction task. Furthermore, the rules obtained produce the insight of the incidents. The limitation of the present study includes the use of less amount of data and the requirement of experts’ domain knowledge for a large span of time. Future scope of the study includes the proper feature selection for preparation of the mixed data set and building the better classification algorithm for better prediction of occurrence of accidents. The present work sets out the potential use of both types of data sources together.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796341"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796341"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796341; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796341]").text(description); $(".js-view-count[data-work-id=78796341]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796341; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796341']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796341, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796341]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796341,"title":"Prediction of Occupational Incidents Using Proactive and Reactive Data: A Data Mining Approach","translated_title":"","metadata":{"abstract":"Prediction of occupational incidents is an important task for any industry. To do this, reactive data has been used by most of the previous studies in this domain. As an extension of the existing works, the present study has used the underused proactive data coupled with reactive data to establish the predictive models so that the information inherent in both data sets could be better utilized. The main aim of the study is to predict the incident outcomes using mixed data set comprising reactive and proactive data together. Two decision tree classifiers, i.e. classification and regression tree (CART) and C5.0, have been implemented with tenfold cross validation. Furthermore, the ensemble technique, namely adaptive boosting has been implemented to increase the classification accuracy. Results show that boosted C5.0 produces higher accuracy than others for the prediction task. Furthermore, the rules obtained produce the insight of the incidents. The limitation of the present study includes the use of less amount of data and the requirement of experts’ domain knowledge for a large span of time. Future scope of the study includes the proper feature selection for preparation of the mixed data set and building the better classification algorithm for better prediction of occurrence of accidents. The present work sets out the potential use of both types of data sources together.","publisher":"Springer Singapore","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Industrial Safety Management"},"translated_abstract":"Prediction of occupational incidents is an important task for any industry. To do this, reactive data has been used by most of the previous studies in this domain. As an extension of the existing works, the present study has used the underused proactive data coupled with reactive data to establish the predictive models so that the information inherent in both data sets could be better utilized. The main aim of the study is to predict the incident outcomes using mixed data set comprising reactive and proactive data together. Two decision tree classifiers, i.e. classification and regression tree (CART) and C5.0, have been implemented with tenfold cross validation. Furthermore, the ensemble technique, namely adaptive boosting has been implemented to increase the classification accuracy. Results show that boosted C5.0 produces higher accuracy than others for the prediction task. Furthermore, the rules obtained produce the insight of the incidents. The limitation of the present study includes the use of less amount of data and the requirement of experts’ domain knowledge for a large span of time. Future scope of the study includes the proper feature selection for preparation of the mixed data set and building the better classification algorithm for better prediction of occurrence of accidents. The present work sets out the potential use of both types of data sources together.","internal_url":"https://www.academia.edu/78796341/Prediction_of_Occupational_Incidents_Using_Proactive_and_Reactive_Data_A_Data_Mining_Approach","translated_internal_url":"","created_at":"2022-05-08T19:18:24.596-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Prediction_of_Occupational_Incidents_Using_Proactive_and_Reactive_Data_A_Data_Mining_Approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1262914,"name":"Industrial Safety Management","url":"https://www.academia.edu/Documents/in/Industrial_Safety_Management"}],"urls":[{"id":20339068,"url":"http://link.springer.com/content/pdf/10.1007/978-981-10-6328-2_6"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796340"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796340/Text_clustering_based_deep_neural_network_for_prediction_of_occupational_accident_risk_A_case_study"><img alt="Research paper thumbnail of Text-clustering based deep neural network for prediction of occupational accident risk: A case study" class="work-thumbnail" src="https://attachments.academia-assets.com/85714990/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796340/Text_clustering_based_deep_neural_network_for_prediction_of_occupational_accident_risk_A_case_study">Text-clustering based deep neural network for prediction of occupational accident risk: A case study</a></div><div class="wp-workCard_item"><span>2018 International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP)</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5abd34df3a7ec87ed788559ffd68299a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714990,&quot;asset_id&quot;:78796340,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714990/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796340"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796340"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796340; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796340]").text(description); $(".js-view-count[data-work-id=78796340]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796340; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796340']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796340, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5abd34df3a7ec87ed788559ffd68299a" } } $('.js-work-strip[data-work-id=78796340]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796340,"title":"Text-clustering based deep neural network for prediction of occupational accident risk: A case study","translated_title":"","metadata":{"publisher":"IEEE","grobid_abstract":"Predicting occupational accident risk using both structured and unstructured (text) data is broadly an unexplored area of research. Unstructured texts, i.e., incident narratives often remain unutilized or under-utilized. Besides the explicit attributes present in the dataset, there exist a large number of hidden attributes in different forms, which are hardly explored by the traditional machine learning algorithms. Therefore, we propose a methodology that utilizes both text-based clustering, namely Expectation Maximization (EM) algorithm for unstructured text analysis and deep neural network (DNN) for prediction of accident risk using the accident data collected from a steel plant in India. EM-based DNN shows the maximum accuracy equal to 83.59% in the prediction of risk while compared to other algorithms, namely single DNN, support vector machine, and random forest. In addition, it is also explored that the use of text data enhances the prediction accuracy in accident analysis.","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"2018 International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP)","grobid_abstract_attachment_id":85714990},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796340/Text_clustering_based_deep_neural_network_for_prediction_of_occupational_accident_risk_A_case_study","translated_internal_url":"","created_at":"2022-05-08T19:18:24.471-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714990,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714990/thumbnails/1.jpg","file_name":"PID5613477.pdf","download_url":"https://www.academia.edu/attachments/85714990/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Text_clustering_based_deep_neural_networ.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714990/PID5613477-libre.pdf?1652063450=\u0026response-content-disposition=attachment%3B+filename%3DText_clustering_based_deep_neural_networ.pdf\u0026Expires=1732801874\u0026Signature=RIKqN1y-c1RiUgDkXkERnetf0TjLy9mxP92HoMOVi-Vk5uMRUE7Ae8b4Mn-InJSzNStuRw2wFW2BCto71tQbBLQTSNfulCmNS6ZixoLsEkj4HhYV8lU0xoF~~fcz8O2IQdY0vY6GAetJBv5f7xlAWNxO9yrXY9M1KDg9frVfEaAgmm3k4baFFo9Cjo~Dnh1wbT4VIPQCIEENiweHIiVaT1oAO0Pz0fC-P7D2mbZD7XiUwUfmK9v9BB2oHotFIeNIw2whe9pgNZiKdM3Ltz7I34nw~YA6KifuxTxxrigmxQQjJYVmE7CFCNbRXSV7rkskh4tEfIiAQHqEDdjOcIpnAA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Text_clustering_based_deep_neural_network_for_prediction_of_occupational_accident_risk_A_case_study","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714990,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714990/thumbnails/1.jpg","file_name":"PID5613477.pdf","download_url":"https://www.academia.edu/attachments/85714990/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Text_clustering_based_deep_neural_networ.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714990/PID5613477-libre.pdf?1652063450=\u0026response-content-disposition=attachment%3B+filename%3DText_clustering_based_deep_neural_networ.pdf\u0026Expires=1732801874\u0026Signature=RIKqN1y-c1RiUgDkXkERnetf0TjLy9mxP92HoMOVi-Vk5uMRUE7Ae8b4Mn-InJSzNStuRw2wFW2BCto71tQbBLQTSNfulCmNS6ZixoLsEkj4HhYV8lU0xoF~~fcz8O2IQdY0vY6GAetJBv5f7xlAWNxO9yrXY9M1KDg9frVfEaAgmm3k4baFFo9Cjo~Dnh1wbT4VIPQCIEENiweHIiVaT1oAO0Pz0fC-P7D2mbZD7XiUwUfmK9v9BB2oHotFIeNIw2whe9pgNZiKdM3Ltz7I34nw~YA6KifuxTxxrigmxQQjJYVmE7CFCNbRXSV7rkskh4tEfIiAQHqEDdjOcIpnAA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":1211304,"name":"Artificial Neural Network","url":"https://www.academia.edu/Documents/in/Artificial_Neural_Network"}],"urls":[{"id":20339067,"url":"http://xplorestaging.ieee.org/ielx7/8681778/8692798/08692881.pdf?arnumber=8692881"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796339"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796339/COVID_19_Outbreak_A_Data_driven_Optimization_Model_for_Allocation_of_Patients"><img alt="Research paper thumbnail of COVID-19 Outbreak: A Data-driven Optimization Model for Allocation of Patients" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796339/COVID_19_Outbreak_A_Data_driven_Optimization_Model_for_Allocation_of_Patients">COVID-19 Outbreak: A Data-driven Optimization Model for Allocation of Patients</a></div><div class="wp-workCard_item"><span>Computers &amp; Industrial Engineering</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">COVID-19 is an unprecedented pandemic that puts the entire world at stake and the healthcare syst...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">COVID-19 is an unprecedented pandemic that puts the entire world at stake and the healthcare systems across the globe have faced pressing challenges. The number of COVID-19 patients increases rapidly every day. The hospitals across many countries are starving to provide adequate service to the patients due to the shortage of resources and as a consequence, patients do not get admitted to hospitals on time, which in turn creates panic and might contribute to the spread of the pandemic. Under this resource constraint situation, this study proposes a data-driven optimization model for patient allocation in hospitals. First, a compartmental model is developed for characterizing the spread of the COVID-19 virus. Then, Pareto analysis is carried out to identify the most COVID-affected cities. An optimization model is then developed for optimal patient allocation in hospitals in different cities. Finally, a sensitivity analysis is also conducted to investigate the robustness of our decision model. Using published data for Indian cities, obtained from different websites, the proposed methodology has been validated. Experimental results reveal that the proposed model offers some efficient strategies for optimal allocation of patients. A total of ten cities are identified as the most affected. Besides, four factors, namely cooperation, distances between cities, number of patients, and bed capacity per city emerge as important determinants.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796339"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796339"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796339; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796339]").text(description); $(".js-view-count[data-work-id=78796339]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796339; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796339']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796339, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796339]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796339,"title":"COVID-19 Outbreak: A Data-driven Optimization Model for Allocation of Patients","translated_title":"","metadata":{"abstract":"COVID-19 is an unprecedented pandemic that puts the entire world at stake and the healthcare systems across the globe have faced pressing challenges. The number of COVID-19 patients increases rapidly every day. The hospitals across many countries are starving to provide adequate service to the patients due to the shortage of resources and as a consequence, patients do not get admitted to hospitals on time, which in turn creates panic and might contribute to the spread of the pandemic. Under this resource constraint situation, this study proposes a data-driven optimization model for patient allocation in hospitals. First, a compartmental model is developed for characterizing the spread of the COVID-19 virus. Then, Pareto analysis is carried out to identify the most COVID-affected cities. An optimization model is then developed for optimal patient allocation in hospitals in different cities. Finally, a sensitivity analysis is also conducted to investigate the robustness of our decision model. Using published data for Indian cities, obtained from different websites, the proposed methodology has been validated. Experimental results reveal that the proposed model offers some efficient strategies for optimal allocation of patients. A total of ten cities are identified as the most affected. Besides, four factors, namely cooperation, distances between cities, number of patients, and bed capacity per city emerge as important determinants.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Computers \u0026 Industrial Engineering"},"translated_abstract":"COVID-19 is an unprecedented pandemic that puts the entire world at stake and the healthcare systems across the globe have faced pressing challenges. The number of COVID-19 patients increases rapidly every day. The hospitals across many countries are starving to provide adequate service to the patients due to the shortage of resources and as a consequence, patients do not get admitted to hospitals on time, which in turn creates panic and might contribute to the spread of the pandemic. Under this resource constraint situation, this study proposes a data-driven optimization model for patient allocation in hospitals. First, a compartmental model is developed for characterizing the spread of the COVID-19 virus. Then, Pareto analysis is carried out to identify the most COVID-affected cities. An optimization model is then developed for optimal patient allocation in hospitals in different cities. Finally, a sensitivity analysis is also conducted to investigate the robustness of our decision model. Using published data for Indian cities, obtained from different websites, the proposed methodology has been validated. Experimental results reveal that the proposed model offers some efficient strategies for optimal allocation of patients. A total of ten cities are identified as the most affected. Besides, four factors, namely cooperation, distances between cities, number of patients, and bed capacity per city emerge as important determinants.","internal_url":"https://www.academia.edu/78796339/COVID_19_Outbreak_A_Data_driven_Optimization_Model_for_Allocation_of_Patients","translated_internal_url":"","created_at":"2022-05-08T19:18:24.350-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"COVID_19_Outbreak_A_Data_driven_Optimization_Model_for_Allocation_of_Patients","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"}],"urls":[{"id":20339066,"url":"https://api.elsevier.com/content/article/PII:S0360835221005799?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796338"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796338/Machine_learning_in_occupational_accident_analysis_A_review_using_science_mapping_approach_with_citation_network_analysis"><img alt="Research paper thumbnail of Machine learning in occupational accident analysis: A review using science mapping approach with citation network analysis" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796338/Machine_learning_in_occupational_accident_analysis_A_review_using_science_mapping_approach_with_citation_network_analysis">Machine learning in occupational accident analysis: A review using science mapping approach with citation network analysis</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract The present study reviews the publications that examine the application of machine learn...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract The present study reviews the publications that examine the application of machine learning (ML) approaches in occupational accident analysis. The review process includes four phases of analysis, namely bibliometric search, descriptive analysis, scientometric analysis, and citation network analysis (CNA). In the bibliometric search, a total of 232 articles are systematically screened out from 1995 to 2019 (up to May). Then, descriptive analysis and scientometric analysis are carried out to find the influences of journals, authors, authors’ keywords, articles/documents, and countries/regions in developing the domain. Thereafter, CNA is carried out to classify the publications according to the research themes and methods used. From this extensive review, several key findings are obtained in the application of ML approaches in occupational accident analysis. USA, China, and Taiwan are the leading countries/regions in publishing articles. The four major research domains are (i) prediction of incident outcomes, (ii) extraction of rule based patterns, (iii) prediction of injury risk, and (iv) prediction of injury severity. Then, a taxonomy of the ML algorithms used is developed. Finally, research gaps and safety issues are highlighted and the scope for future is discussed.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796338"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796338"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796338; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796338]").text(description); $(".js-view-count[data-work-id=78796338]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796338; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796338']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796338, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796338]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796338,"title":"Machine learning in occupational accident analysis: A review using science mapping approach with citation network analysis","translated_title":"","metadata":{"abstract":"Abstract The present study reviews the publications that examine the application of machine learning (ML) approaches in occupational accident analysis. The review process includes four phases of analysis, namely bibliometric search, descriptive analysis, scientometric analysis, and citation network analysis (CNA). In the bibliometric search, a total of 232 articles are systematically screened out from 1995 to 2019 (up to May). Then, descriptive analysis and scientometric analysis are carried out to find the influences of journals, authors, authors’ keywords, articles/documents, and countries/regions in developing the domain. Thereafter, CNA is carried out to classify the publications according to the research themes and methods used. From this extensive review, several key findings are obtained in the application of ML approaches in occupational accident analysis. USA, China, and Taiwan are the leading countries/regions in publishing articles. The four major research domains are (i) prediction of incident outcomes, (ii) extraction of rule based patterns, (iii) prediction of injury risk, and (iv) prediction of injury severity. Then, a taxonomy of the ML algorithms used is developed. Finally, research gaps and safety issues are highlighted and the scope for future is discussed.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Safety Science"},"translated_abstract":"Abstract The present study reviews the publications that examine the application of machine learning (ML) approaches in occupational accident analysis. The review process includes four phases of analysis, namely bibliometric search, descriptive analysis, scientometric analysis, and citation network analysis (CNA). In the bibliometric search, a total of 232 articles are systematically screened out from 1995 to 2019 (up to May). Then, descriptive analysis and scientometric analysis are carried out to find the influences of journals, authors, authors’ keywords, articles/documents, and countries/regions in developing the domain. Thereafter, CNA is carried out to classify the publications according to the research themes and methods used. From this extensive review, several key findings are obtained in the application of ML approaches in occupational accident analysis. USA, China, and Taiwan are the leading countries/regions in publishing articles. The four major research domains are (i) prediction of incident outcomes, (ii) extraction of rule based patterns, (iii) prediction of injury risk, and (iv) prediction of injury severity. Then, a taxonomy of the ML algorithms used is developed. Finally, research gaps and safety issues are highlighted and the scope for future is discussed.","internal_url":"https://www.academia.edu/78796338/Machine_learning_in_occupational_accident_analysis_A_review_using_science_mapping_approach_with_citation_network_analysis","translated_internal_url":"","created_at":"2022-05-08T19:18:24.212-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Machine_learning_in_occupational_accident_analysis_A_review_using_science_mapping_approach_with_citation_network_analysis","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[{"id":20339065,"url":"https://api.elsevier.com/content/article/PII:S0925753520302976?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796337"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796337/A_comprehensive_methodology_for_quantification_of_Bow_tie_under_type_II_fuzzy_data"><img alt="Research paper thumbnail of A comprehensive methodology for quantification of Bow-tie under type II fuzzy data" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796337/A_comprehensive_methodology_for_quantification_of_Bow_tie_under_type_II_fuzzy_data">A comprehensive methodology for quantification of Bow-tie under type II fuzzy data</a></div><div class="wp-workCard_item"><span>Applied Soft Computing</span><span>, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796337"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796337"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796337; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796337]").text(description); $(".js-view-count[data-work-id=78796337]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796337; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796337']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796337, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796337]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796337,"title":"A comprehensive methodology for quantification of Bow-tie under type II fuzzy data","translated_title":"","metadata":{"publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Applied Soft Computing"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796337/A_comprehensive_methodology_for_quantification_of_Bow_tie_under_type_II_fuzzy_data","translated_internal_url":"","created_at":"2022-05-08T19:18:24.076-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_comprehensive_methodology_for_quantification_of_Bow_tie_under_type_II_fuzzy_data","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems"},{"id":305,"name":"Applied Mathematics","url":"https://www.academia.edu/Documents/in/Applied_Mathematics"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":897823,"name":"Elsevier","url":"https://www.academia.edu/Documents/in/Elsevier"}],"urls":[{"id":20339064,"url":"https://api.elsevier.com/content/article/PII:S1568494621000715?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796336"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796336/An_innovative_integrated_modelling_of_safety_data_using_multiple_correspondence_analysis_and_fuzzy_discretization_techniques"><img alt="Research paper thumbnail of An innovative integrated modelling of safety data using multiple correspondence analysis and fuzzy discretization techniques" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796336/An_innovative_integrated_modelling_of_safety_data_using_multiple_correspondence_analysis_and_fuzzy_discretization_techniques">An innovative integrated modelling of safety data using multiple correspondence analysis and fuzzy discretization techniques</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract In this study, we have proposed an innovative integrated methodology to handle a mix of ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract In this study, we have proposed an innovative integrated methodology to handle a mix of categorical and numeric safety data. We have augmented the traditional multiple correspondence analysis (MCA) through the use of fuzzy discretization approach, t-SNE technique and fuzzy c-means clustering. The fuzzy discretization approach transforms the continuous variables to categorical variables to make them analyzable using MCA. R2-profile is adopted to obtain the best number of hidden dimensions representing the maximum categorical information. Then, t-SNE technique is used to represent the high dimensional categorical information in a 2D map to visualize the significant categorical associations. Then, fuzzy c-means clustering (FCM) is used to group the categories in different clusters based on their membership degree. To determine the optimal number of clusters, cluster validity indices are used. Davies-Bouldin (DB) Index, Dunn’s (DU) Index and Silhouette (SW) coefficients are used to determine the quality of clustering solutions. The proposed methodology is tested using electric overhead traveling (EOT) crane related near-miss incidents and found that our approach is effective. From managerial implication point of view, several safety rules are generated and subsequent safety countermeasures are proposed. Further, the results obtained through FCM is compared with K-means (KM) algorithm and unsupervised fuzzy c-means clustering (UPFCM). FCM outperforms KM and UPFCM on the basis of quality of solutions.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796336"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796336"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796336; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796336]").text(description); $(".js-view-count[data-work-id=78796336]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796336; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796336']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796336, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796336]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796336,"title":"An innovative integrated modelling of safety data using multiple correspondence analysis and fuzzy discretization techniques","translated_title":"","metadata":{"abstract":"Abstract In this study, we have proposed an innovative integrated methodology to handle a mix of categorical and numeric safety data. We have augmented the traditional multiple correspondence analysis (MCA) through the use of fuzzy discretization approach, t-SNE technique and fuzzy c-means clustering. The fuzzy discretization approach transforms the continuous variables to categorical variables to make them analyzable using MCA. R2-profile is adopted to obtain the best number of hidden dimensions representing the maximum categorical information. Then, t-SNE technique is used to represent the high dimensional categorical information in a 2D map to visualize the significant categorical associations. Then, fuzzy c-means clustering (FCM) is used to group the categories in different clusters based on their membership degree. To determine the optimal number of clusters, cluster validity indices are used. Davies-Bouldin (DB) Index, Dunn’s (DU) Index and Silhouette (SW) coefficients are used to determine the quality of clustering solutions. The proposed methodology is tested using electric overhead traveling (EOT) crane related near-miss incidents and found that our approach is effective. From managerial implication point of view, several safety rules are generated and subsequent safety countermeasures are proposed. Further, the results obtained through FCM is compared with K-means (KM) algorithm and unsupervised fuzzy c-means clustering (UPFCM). FCM outperforms KM and UPFCM on the basis of quality of solutions.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Safety Science"},"translated_abstract":"Abstract In this study, we have proposed an innovative integrated methodology to handle a mix of categorical and numeric safety data. We have augmented the traditional multiple correspondence analysis (MCA) through the use of fuzzy discretization approach, t-SNE technique and fuzzy c-means clustering. The fuzzy discretization approach transforms the continuous variables to categorical variables to make them analyzable using MCA. R2-profile is adopted to obtain the best number of hidden dimensions representing the maximum categorical information. Then, t-SNE technique is used to represent the high dimensional categorical information in a 2D map to visualize the significant categorical associations. Then, fuzzy c-means clustering (FCM) is used to group the categories in different clusters based on their membership degree. To determine the optimal number of clusters, cluster validity indices are used. Davies-Bouldin (DB) Index, Dunn’s (DU) Index and Silhouette (SW) coefficients are used to determine the quality of clustering solutions. The proposed methodology is tested using electric overhead traveling (EOT) crane related near-miss incidents and found that our approach is effective. From managerial implication point of view, several safety rules are generated and subsequent safety countermeasures are proposed. Further, the results obtained through FCM is compared with K-means (KM) algorithm and unsupervised fuzzy c-means clustering (UPFCM). FCM outperforms KM and UPFCM on the basis of quality of solutions.","internal_url":"https://www.academia.edu/78796336/An_innovative_integrated_modelling_of_safety_data_using_multiple_correspondence_analysis_and_fuzzy_discretization_techniques","translated_internal_url":"","created_at":"2022-05-08T19:18:23.951-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"An_innovative_integrated_modelling_of_safety_data_using_multiple_correspondence_analysis_and_fuzzy_discretization_techniques","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":897823,"name":"Elsevier","url":"https://www.academia.edu/Documents/in/Elsevier"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[{"id":20339063,"url":"https://api.elsevier.com/content/article/PII:S0925753520302253?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796335"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796335/A_novel_data_mining_approach_for_analysis_of_accident_paths_and_performance_assessment_of_risk_control_systems"><img alt="Research paper thumbnail of A novel data mining approach for analysis of accident paths and performance assessment of risk control systems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796335/A_novel_data_mining_approach_for_analysis_of_accident_paths_and_performance_assessment_of_risk_control_systems">A novel data mining approach for analysis of accident paths and performance assessment of risk control systems</a></div><div class="wp-workCard_item"><span>Reliability Engineering &amp; System Safety</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract The data mining researches to facilitate the process of safety management is fairly new,...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract The data mining researches to facilitate the process of safety management is fairly new, compared to other industrial management domains. The implementation of appropriate, effective, and safe risk control systems (RCSs) is vital to ensure zero-accident and zero-harm vision of industrial work-systems. In this work, we propose a data mining based tool to analyze accident paths from incident data and assess the performance of RCSs. Our work upgrades the existing pattern analysis methods through three new types of analyses (i) temporal frequent itemset generation (T-FIG) for studying the time effect on patterns, (ii) elevated severity itemset generation (ESIG) for examining the risk reduction due to RCSs, and (iii) High impact itemset generation (High_impact_IG) to identify accident paths with high risk. T-FIG and ESIG assist in performance assessment of preventive and mitigating RCSs, respectively. The results from each of the analyses are compared and eight types of inferences regarding the performance of RCSs are drawn. The proposed methodology is applied to 612 incident records reported during steel making process in a steel manufacturing plant. It was found that there are four accident paths which have ineffective preventive and mitigating RCSs, have high risk and are probable to recur in future. Two among four of these paths include hot metal/steel/slag as the hazardous element and three of them are due to damaged/degraded/poorly maintained equipment. Moreover, the case study also demonstrates that proposed data mining approach is an effective and easy to use tool for performance assessment of RCSs and accident path analysis.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796335"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796335"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796335; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796335]").text(description); $(".js-view-count[data-work-id=78796335]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796335; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796335']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796335, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796335]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796335,"title":"A novel data mining approach for analysis of accident paths and performance assessment of risk control systems","translated_title":"","metadata":{"abstract":"Abstract The data mining researches to facilitate the process of safety management is fairly new, compared to other industrial management domains. The implementation of appropriate, effective, and safe risk control systems (RCSs) is vital to ensure zero-accident and zero-harm vision of industrial work-systems. In this work, we propose a data mining based tool to analyze accident paths from incident data and assess the performance of RCSs. Our work upgrades the existing pattern analysis methods through three new types of analyses (i) temporal frequent itemset generation (T-FIG) for studying the time effect on patterns, (ii) elevated severity itemset generation (ESIG) for examining the risk reduction due to RCSs, and (iii) High impact itemset generation (High_impact_IG) to identify accident paths with high risk. T-FIG and ESIG assist in performance assessment of preventive and mitigating RCSs, respectively. The results from each of the analyses are compared and eight types of inferences regarding the performance of RCSs are drawn. The proposed methodology is applied to 612 incident records reported during steel making process in a steel manufacturing plant. It was found that there are four accident paths which have ineffective preventive and mitigating RCSs, have high risk and are probable to recur in future. Two among four of these paths include hot metal/steel/slag as the hazardous element and three of them are due to damaged/degraded/poorly maintained equipment. Moreover, the case study also demonstrates that proposed data mining approach is an effective and easy to use tool for performance assessment of RCSs and accident path analysis.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Reliability Engineering \u0026 System Safety"},"translated_abstract":"Abstract The data mining researches to facilitate the process of safety management is fairly new, compared to other industrial management domains. The implementation of appropriate, effective, and safe risk control systems (RCSs) is vital to ensure zero-accident and zero-harm vision of industrial work-systems. In this work, we propose a data mining based tool to analyze accident paths from incident data and assess the performance of RCSs. Our work upgrades the existing pattern analysis methods through three new types of analyses (i) temporal frequent itemset generation (T-FIG) for studying the time effect on patterns, (ii) elevated severity itemset generation (ESIG) for examining the risk reduction due to RCSs, and (iii) High impact itemset generation (High_impact_IG) to identify accident paths with high risk. T-FIG and ESIG assist in performance assessment of preventive and mitigating RCSs, respectively. The results from each of the analyses are compared and eight types of inferences regarding the performance of RCSs are drawn. The proposed methodology is applied to 612 incident records reported during steel making process in a steel manufacturing plant. It was found that there are four accident paths which have ineffective preventive and mitigating RCSs, have high risk and are probable to recur in future. Two among four of these paths include hot metal/steel/slag as the hazardous element and three of them are due to damaged/degraded/poorly maintained equipment. Moreover, the case study also demonstrates that proposed data mining approach is an effective and easy to use tool for performance assessment of RCSs and accident path analysis.","internal_url":"https://www.academia.edu/78796335/A_novel_data_mining_approach_for_analysis_of_accident_paths_and_performance_assessment_of_risk_control_systems","translated_internal_url":"","created_at":"2022-05-08T19:18:23.826-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_novel_data_mining_approach_for_analysis_of_accident_paths_and_performance_assessment_of_risk_control_systems","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"},{"id":897823,"name":"Elsevier","url":"https://www.academia.edu/Documents/in/Elsevier"}],"urls":[{"id":20339062,"url":"https://api.elsevier.com/content/article/PII:S0951832020305421?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796334"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796334/Application_of_optimized_machine_learning_techniques_for_prediction_of_occupational_accidents"><img alt="Research paper thumbnail of Application of optimized machine learning techniques for prediction of occupational accidents" class="work-thumbnail" src="https://attachments.academia-assets.com/85714992/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796334/Application_of_optimized_machine_learning_techniques_for_prediction_of_occupational_accidents">Application of optimized machine learning techniques for prediction of occupational accidents</a></div><div class="wp-workCard_item"><span>Computers &amp; Operations Research</span><span>, 2019</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5b7d996a1a855f5dfc271ca92cc51397" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714992,&quot;asset_id&quot;:78796334,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714992/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796334"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796334"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796334; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796334]").text(description); $(".js-view-count[data-work-id=78796334]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796334; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796334']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796334, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5b7d996a1a855f5dfc271ca92cc51397" } } $('.js-work-strip[data-work-id=78796334]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796334,"title":"Application of optimized machine learning techniques for prediction of occupational accidents","translated_title":"","metadata":{"publisher":"Elsevier BV","grobid_abstract":"This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. Highlights  Both categorical data and unstructured text data have been analysed.  Incident outcomes are predicted using GA and PSO optimized SVM and ANN approaches.  PSO-SVM outperforms other algorithms in terms of accuracy (i.e., 90.67%).  Nine useful rules are extracted using PSO-SVM based C5.0 algorithm.  Root causes of incidents have been identified.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Computers \u0026 Operations Research","grobid_abstract_attachment_id":85714992},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796334/Application_of_optimized_machine_learning_techniques_for_prediction_of_occupational_accidents","translated_internal_url":"","created_at":"2022-05-08T19:18:23.703-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714992,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714992/thumbnails/1.jpg","file_name":"j.cor.2018.02.02120220509-1-ni2wic.pdf","download_url":"https://www.academia.edu/attachments/85714992/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Application_of_optimized_machine_learnin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714992/j.cor.2018.02.02120220509-1-ni2wic-libre.pdf?1652063457=\u0026response-content-disposition=attachment%3B+filename%3DApplication_of_optimized_machine_learnin.pdf\u0026Expires=1732801874\u0026Signature=LG2WolrjkZRW0QeW0vATdUyxg0xaIUvivqiQ708X1rcAAwszjHLs9YzILHej27zxZEXaSAuGkhj8~omZPtxT4psrXOnEwSE70ZglWZubHP-dqDGZYR6yHQWD0KI7PrCxrbpc0-ftRTIsn9-xNDCuRmexmcjscmt9CfrpnafsP95Jx3Wx5mwPD8g7stu1t2AfPGIQRsQMXu9nya-vuRNNuq3W8jvIySmg0nSsB-X1MzrX4q2AM71VsB9BU-eoGgqNpgDuMNLpc1RFfWmUMbC9tGryDEpu~MhqDYvKKcBAxZygNaRB~qYgDQA3nj75XLxtSLCRG0n1amakvBzmgnM8Fg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Application_of_optimized_machine_learning_techniques_for_prediction_of_occupational_accidents","translated_slug":"","page_count":38,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714992,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714992/thumbnails/1.jpg","file_name":"j.cor.2018.02.02120220509-1-ni2wic.pdf","download_url":"https://www.academia.edu/attachments/85714992/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Application_of_optimized_machine_learnin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714992/j.cor.2018.02.02120220509-1-ni2wic-libre.pdf?1652063457=\u0026response-content-disposition=attachment%3B+filename%3DApplication_of_optimized_machine_learnin.pdf\u0026Expires=1732801874\u0026Signature=LG2WolrjkZRW0QeW0vATdUyxg0xaIUvivqiQ708X1rcAAwszjHLs9YzILHej27zxZEXaSAuGkhj8~omZPtxT4psrXOnEwSE70ZglWZubHP-dqDGZYR6yHQWD0KI7PrCxrbpc0-ftRTIsn9-xNDCuRmexmcjscmt9CfrpnafsP95Jx3Wx5mwPD8g7stu1t2AfPGIQRsQMXu9nya-vuRNNuq3W8jvIySmg0nSsB-X1MzrX4q2AM71VsB9BU-eoGgqNpgDuMNLpc1RFfWmUMbC9tGryDEpu~MhqDYvKKcBAxZygNaRB~qYgDQA3nj75XLxtSLCRG0n1amakvBzmgnM8Fg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":305,"name":"Applied Mathematics","url":"https://www.academia.edu/Documents/in/Applied_Mathematics"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning"},{"id":4593,"name":"Occupational Health \u0026 Safety","url":"https://www.academia.edu/Documents/in/Occupational_Health_and_Safety"},{"id":43981,"name":"Optimization","url":"https://www.academia.edu/Documents/in/Optimization"},{"id":51531,"name":"Pergamon","url":"https://www.academia.edu/Documents/in/Pergamon"},{"id":63857,"name":"Categorical data analysis","url":"https://www.academia.edu/Documents/in/Categorical_data_analysis"},{"id":162271,"name":"Decision Tree","url":"https://www.academia.edu/Documents/in/Decision_Tree"},{"id":556845,"name":"Numerical Analysis and Computational Mathematics","url":"https://www.academia.edu/Documents/in/Numerical_Analysis_and_Computational_Mathematics"},{"id":3657206,"name":"Rule generation","url":"https://www.academia.edu/Documents/in/Rule_generation"}],"urls":[{"id":20339061,"url":"https://api.elsevier.com/content/article/PII:S0305054818300601?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796333"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796333/Reduction_of_life_cycle_costs_for_a_contemporary_helicopter_through_improvement_of_reliability_and_maintainability_parameters"><img alt="Research paper thumbnail of Reduction of life cycle costs for a contemporary helicopter through improvement of reliability and maintainability parameters" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796333/Reduction_of_life_cycle_costs_for_a_contemporary_helicopter_through_improvement_of_reliability_and_maintainability_parameters">Reduction of life cycle costs for a contemporary helicopter through improvement of reliability and maintainability parameters</a></div><div class="wp-workCard_item"><span>International Journal of Quality &amp; Reliability Management</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Purpose The modern helicopters are designed with maximum serviceability and long life expectancy ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Purpose The modern helicopters are designed with maximum serviceability and long life expectancy to ensure minimum life cycle cost. The purpose of this paper is to present a framework to incorporate the customer requirements on reliability and maintainability (R&amp;M) parameters into the design and development phase of a contemporary helicopter, and to discuss the way to capture operational data to establish and improve the R&amp;M parameters to reduce life cycle cost. Design/methodology/approach From the analysis, it is established that the reliability and maintainability cost is the major contributor to the life cost. The significant reliability and maintainability parameters which influence R&amp;M cost are identified from analysis. The operational and design data of a contemporary helicopter are collected, compiled and analyzed to establish and improve the reliability and maintainability parameters. Findings The process depicted in the paper is followed for a contemporary helicopter and su...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796333"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796333"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796333; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796333]").text(description); $(".js-view-count[data-work-id=78796333]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796333; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796333']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796333, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796333]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796333,"title":"Reduction of life cycle costs for a contemporary helicopter through improvement of reliability and maintainability parameters","translated_title":"","metadata":{"abstract":"Purpose The modern helicopters are designed with maximum serviceability and long life expectancy to ensure minimum life cycle cost. The purpose of this paper is to present a framework to incorporate the customer requirements on reliability and maintainability (R\u0026M) parameters into the design and development phase of a contemporary helicopter, and to discuss the way to capture operational data to establish and improve the R\u0026M parameters to reduce life cycle cost. Design/methodology/approach From the analysis, it is established that the reliability and maintainability cost is the major contributor to the life cost. The significant reliability and maintainability parameters which influence R\u0026M cost are identified from analysis. The operational and design data of a contemporary helicopter are collected, compiled and analyzed to establish and improve the reliability and maintainability parameters. Findings The process depicted in the paper is followed for a contemporary helicopter and su...","publisher":"Emerald","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"International Journal of Quality \u0026 Reliability Management"},"translated_abstract":"Purpose The modern helicopters are designed with maximum serviceability and long life expectancy to ensure minimum life cycle cost. The purpose of this paper is to present a framework to incorporate the customer requirements on reliability and maintainability (R\u0026M) parameters into the design and development phase of a contemporary helicopter, and to discuss the way to capture operational data to establish and improve the R\u0026M parameters to reduce life cycle cost. Design/methodology/approach From the analysis, it is established that the reliability and maintainability cost is the major contributor to the life cost. The significant reliability and maintainability parameters which influence R\u0026M cost are identified from analysis. The operational and design data of a contemporary helicopter are collected, compiled and analyzed to establish and improve the reliability and maintainability parameters. Findings The process depicted in the paper is followed for a contemporary helicopter and su...","internal_url":"https://www.academia.edu/78796333/Reduction_of_life_cycle_costs_for_a_contemporary_helicopter_through_improvement_of_reliability_and_maintainability_parameters","translated_internal_url":"","created_at":"2022-05-08T19:18:23.571-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Reduction_of_life_cycle_costs_for_a_contemporary_helicopter_through_improvement_of_reliability_and_maintainability_parameters","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":73149,"name":"Business and Management","url":"https://www.academia.edu/Documents/in/Business_and_Management"}],"urls":[{"id":20339060,"url":"https://www.emeraldinsight.com/doi/full-xml/10.1108/IJQRM-11-2016-0199"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796332"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796332/Decision_support_system_for_safety_improvement_An_approach_using_multiple_correspondence_analysis_t_SNE_algorithm_and_K_means_clustering"><img alt="Research paper thumbnail of Decision support system for safety improvement: An approach using multiple correspondence analysis, t-SNE algorithm and K-means clustering" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796332/Decision_support_system_for_safety_improvement_An_approach_using_multiple_correspondence_analysis_t_SNE_algorithm_and_K_means_clustering">Decision support system for safety improvement: An approach using multiple correspondence analysis, t-SNE algorithm and K-means clustering</a></div><div class="wp-workCard_item"><span>Computers &amp; Industrial Engineering</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract An attempt has been made to develop a decision support system (DSS) for safety improveme...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract An attempt has been made to develop a decision support system (DSS) for safety improvement using a multi-step knowledge discovery process involving multiple correspondence analysis (MCA), t-SNE algorithm and K-means clustering. MCA is used for dimension reduction and perceptual mapping from categorical data. Usually, the first two dimensions are used for perceptual mapping if these two dimensions explain a significant percentage of variance. Otherwise, the traditional method of two dimensional mapping, leads to loss of important categorical information involved with other dimensions. Considering the above, a novel R2-profile approach, as an alternate to inertia based approach, is adopted to obtain the desired number of dimensions to be retained without loss of significant amount of information. t-SNE technique reduces the high dimensional data into two dimensional (2D) map, which provides the associations amongst different categories. K-means clustering grouped the 2D categories in homogenous clusters as per the similarities of the categories. A novel kernel category based chi-square distance method is proposed to identify sub-clusters within a cluster which subsequently provides useful rules for safety improvement. The methodology also provides a logical approach of dimension reduction in a form called ‘funnel diagram’. Finally, the DSS is applied to analysing near miss incidents occurred in electric overhead traveling (EOT) crane operations in a steel plant. Several safety rules are identified and safety interventions are proposed.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796332"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796332"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796332; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796332]").text(description); $(".js-view-count[data-work-id=78796332]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796332; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796332']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796332, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796332]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796332,"title":"Decision support system for safety improvement: An approach using multiple correspondence analysis, t-SNE algorithm and K-means clustering","translated_title":"","metadata":{"abstract":"Abstract An attempt has been made to develop a decision support system (DSS) for safety improvement using a multi-step knowledge discovery process involving multiple correspondence analysis (MCA), t-SNE algorithm and K-means clustering. MCA is used for dimension reduction and perceptual mapping from categorical data. Usually, the first two dimensions are used for perceptual mapping if these two dimensions explain a significant percentage of variance. Otherwise, the traditional method of two dimensional mapping, leads to loss of important categorical information involved with other dimensions. Considering the above, a novel R2-profile approach, as an alternate to inertia based approach, is adopted to obtain the desired number of dimensions to be retained without loss of significant amount of information. t-SNE technique reduces the high dimensional data into two dimensional (2D) map, which provides the associations amongst different categories. K-means clustering grouped the 2D categories in homogenous clusters as per the similarities of the categories. A novel kernel category based chi-square distance method is proposed to identify sub-clusters within a cluster which subsequently provides useful rules for safety improvement. The methodology also provides a logical approach of dimension reduction in a form called ‘funnel diagram’. Finally, the DSS is applied to analysing near miss incidents occurred in electric overhead traveling (EOT) crane operations in a steel plant. Several safety rules are identified and safety interventions are proposed.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Computers \u0026 Industrial Engineering"},"translated_abstract":"Abstract An attempt has been made to develop a decision support system (DSS) for safety improvement using a multi-step knowledge discovery process involving multiple correspondence analysis (MCA), t-SNE algorithm and K-means clustering. MCA is used for dimension reduction and perceptual mapping from categorical data. Usually, the first two dimensions are used for perceptual mapping if these two dimensions explain a significant percentage of variance. Otherwise, the traditional method of two dimensional mapping, leads to loss of important categorical information involved with other dimensions. Considering the above, a novel R2-profile approach, as an alternate to inertia based approach, is adopted to obtain the desired number of dimensions to be retained without loss of significant amount of information. t-SNE technique reduces the high dimensional data into two dimensional (2D) map, which provides the associations amongst different categories. K-means clustering grouped the 2D categories in homogenous clusters as per the similarities of the categories. A novel kernel category based chi-square distance method is proposed to identify sub-clusters within a cluster which subsequently provides useful rules for safety improvement. The methodology also provides a logical approach of dimension reduction in a form called ‘funnel diagram’. Finally, the DSS is applied to analysing near miss incidents occurred in electric overhead traveling (EOT) crane operations in a steel plant. Several safety rules are identified and safety interventions are proposed.","internal_url":"https://www.academia.edu/78796332/Decision_support_system_for_safety_improvement_An_approach_using_multiple_correspondence_analysis_t_SNE_algorithm_and_K_means_clustering","translated_internal_url":"","created_at":"2022-05-08T19:18:23.446-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Decision_support_system_for_safety_improvement_An_approach_using_multiple_correspondence_analysis_t_SNE_algorithm_and_K_means_clustering","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"},{"id":131237,"name":"Cluster Analysis","url":"https://www.academia.edu/Documents/in/Cluster_Analysis"}],"urls":[{"id":20339059,"url":"https://api.elsevier.com/content/article/PII:S0360835218306478?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796331"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796331/Text_document_clustering_based_cause_and_effect_analysis_methodology_for_steel_plant_incident_data"><img alt="Research paper thumbnail of Text-document clustering-based cause and effect analysis methodology for steel plant incident data" class="work-thumbnail" src="https://attachments.academia-assets.com/85714991/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796331/Text_document_clustering_based_cause_and_effect_analysis_methodology_for_steel_plant_incident_data">Text-document clustering-based cause and effect analysis methodology for steel plant incident data</a></div><div class="wp-workCard_item"><span>International Journal of Injury Control and Safety Promotion</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="63ec93110bc1b7b979fe00d318fa1b3e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714991,&quot;asset_id&quot;:78796331,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714991/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796331"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796331"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796331; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796331]").text(description); $(".js-view-count[data-work-id=78796331]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796331; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796331']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796331, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "63ec93110bc1b7b979fe00d318fa1b3e" } } $('.js-work-strip[data-work-id=78796331]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796331,"title":"Text-document clustering-based cause and effect analysis methodology for steel plant incident data","translated_title":"","metadata":{"publisher":"Informa UK Limited","grobid_abstract":"The purpose of this study is to develop a text clustering-based cause and effect analysis methodology for incident data to unfold the root causes behind the incidents. A cause-effect diagram is usually prepared by using experts' knowledge which may fail to capture all the causes present at a workplace. On the other hand, the description of incidents provided by the workers in the form of incident reports is typically a rich data source and can be utilized to explore the causes and sub-causes of incidents. In this study, data were collected from an integrated steel plant. The text data were analysed using singular value decomposition (SVD) and expectation-maximization (EM) algorithm. Results suggest that text-document clustering can be used as a feasible method for exploring the hidden factors and trends from the description of incidents occurred at workplaces. The study also helped in finding out the anomaly in incident reporting.","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"International Journal of Injury Control and Safety Promotion","grobid_abstract_attachment_id":85714991},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796331/Text_document_clustering_based_cause_and_effect_analysis_methodology_for_steel_plant_incident_data","translated_internal_url":"","created_at":"2022-05-08T19:18:23.327-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714991,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714991/thumbnails/1.jpg","file_name":"17457300.2018.145646820220509-1-yy5qy2.pdf","download_url":"https://www.academia.edu/attachments/85714991/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Text_document_clustering_based_cause_and.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714991/17457300.2018.145646820220509-1-yy5qy2-libre.pdf?1652063453=\u0026response-content-disposition=attachment%3B+filename%3DText_document_clustering_based_cause_and.pdf\u0026Expires=1732835577\u0026Signature=TaHHo-Tc-uh0cnxbpOp5W7PUH5WlDCUDJRZd0cJdExeTyq2uzOF-jDNyNLkDq6Ikz7j630ZRWt6LIyN~Ik80RMV~cNQRg4kEJ4eZp79K5SjLSe4llLArzQpx2gE0vMIIdck96bl-m-WxQTIEigll5Rc7ZHkwJcWQGtXQwq3jRIb3TF-Un5po4oMjU8fwGgE~BI7Fsnt~GFvtjS5RCjD0NyfhQglI82K2wOIJK1y4aarAVpyA8xhngn37FSbJTU1458F3ONu6XYpz7VrF~ZSqSQcgaPRXEzCG3XfgFyoGDe~g8FwwiLPWamrxjJ2HL3m3AgO2rV3Eri3PmdqLGpzcgw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Text_document_clustering_based_cause_and_effect_analysis_methodology_for_steel_plant_incident_data","translated_slug":"","page_count":12,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714991,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714991/thumbnails/1.jpg","file_name":"17457300.2018.145646820220509-1-yy5qy2.pdf","download_url":"https://www.academia.edu/attachments/85714991/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Text_document_clustering_based_cause_and.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714991/17457300.2018.145646820220509-1-yy5qy2-libre.pdf?1652063453=\u0026response-content-disposition=attachment%3B+filename%3DText_document_clustering_based_cause_and.pdf\u0026Expires=1732835577\u0026Signature=TaHHo-Tc-uh0cnxbpOp5W7PUH5WlDCUDJRZd0cJdExeTyq2uzOF-jDNyNLkDq6Ikz7j630ZRWt6LIyN~Ik80RMV~cNQRg4kEJ4eZp79K5SjLSe4llLArzQpx2gE0vMIIdck96bl-m-WxQTIEigll5Rc7ZHkwJcWQGtXQwq3jRIb3TF-Un5po4oMjU8fwGgE~BI7Fsnt~GFvtjS5RCjD0NyfhQglI82K2wOIJK1y4aarAVpyA8xhngn37FSbJTU1458F3ONu6XYpz7VrF~ZSqSQcgaPRXEzCG3XfgFyoGDe~g8FwwiLPWamrxjJ2HL3m3AgO2rV3Eri3PmdqLGpzcgw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":131237,"name":"Cluster Analysis","url":"https://www.academia.edu/Documents/in/Cluster_Analysis"},{"id":410370,"name":"Public health systems and services research","url":"https://www.academia.edu/Documents/in/Public_health_systems_and_services_research-1"}],"urls":[{"id":20339058,"url":"https://www.tandfonline.com/doi/pdf/10.1080/17457300.2018.1456468"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796330"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796330/An_Application_of_Logit_Model_to_Injury_Experience_Data"><img alt="Research paper thumbnail of An Application of Logit Model to Injury Experience Data" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796330/An_Application_of_Logit_Model_to_Injury_Experience_Data">An Application of Logit Model to Injury Experience Data</a></div><div class="wp-workCard_item"><span>Mineral Resources Engineering</span><span>, 1999</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The influence of various casual factors on the severity of injury was examined using the 4-year i...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The influence of various casual factors on the severity of injury was examined using the 4-year injury data from a group of underground coal mines. Although there are many factors that could affect the injury severity: miners&amp;#39; age, experience, occupation, injury-location, shift-time and specific-mine were chosen as the affecting variables. The logit model was applied for this analysis. The bivariate analysis was conducted to separately study the effect of each of the factors on the severity of injury and to estimate the odds of severe injuries. For the case study mines, it was concluded that the injury severity varies by age, occupation, injury-location, shift-time and specific-mine. However, experience in general does not have any significant effect on it.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796330"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796330"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796330; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796330]").text(description); $(".js-view-count[data-work-id=78796330]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796330; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796330']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796330, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796330]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796330,"title":"An Application of Logit Model to Injury Experience Data","translated_title":"","metadata":{"abstract":"The influence of various casual factors on the severity of injury was examined using the 4-year injury data from a group of underground coal mines. Although there are many factors that could affect the injury severity: miners\u0026#39; age, experience, occupation, injury-location, shift-time and specific-mine were chosen as the affecting variables. The logit model was applied for this analysis. The bivariate analysis was conducted to separately study the effect of each of the factors on the severity of injury and to estimate the odds of severe injuries. For the case study mines, it was concluded that the injury severity varies by age, occupation, injury-location, shift-time and specific-mine. However, experience in general does not have any significant effect on it.","publisher":"World Scientific Pub Co Pte Lt","publication_date":{"day":null,"month":null,"year":1999,"errors":{}},"publication_name":"Mineral Resources Engineering"},"translated_abstract":"The influence of various casual factors on the severity of injury was examined using the 4-year injury data from a group of underground coal mines. Although there are many factors that could affect the injury severity: miners\u0026#39; age, experience, occupation, injury-location, shift-time and specific-mine were chosen as the affecting variables. The logit model was applied for this analysis. The bivariate analysis was conducted to separately study the effect of each of the factors on the severity of injury and to estimate the odds of severe injuries. For the case study mines, it was concluded that the injury severity varies by age, occupation, injury-location, shift-time and specific-mine. However, experience in general does not have any significant effect on it.","internal_url":"https://www.academia.edu/78796330/An_Application_of_Logit_Model_to_Injury_Experience_Data","translated_internal_url":"","created_at":"2022-05-08T19:18:23.210-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"An_Application_of_Logit_Model_to_Injury_Experience_Data","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":146671,"name":"Mineral Resources","url":"https://www.academia.edu/Documents/in/Mineral_Resources"}],"urls":[{"id":20339057,"url":"http://www.worldscientific.com/doi/pdf/10.1142/S0950609899000244"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796329"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796329/Segmented_point_process_models_for_work_system_safety_analysis"><img alt="Research paper thumbnail of Segmented point process models for work system safety analysis" class="work-thumbnail" src="https://attachments.academia-assets.com/85714988/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796329/Segmented_point_process_models_for_work_system_safety_analysis">Segmented point process models for work system safety analysis</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2017</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e1befc2d40b59a11d64a6f76400894ec" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714988,&quot;asset_id&quot;:78796329,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714988/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796329"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796329"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796329; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796329]").text(description); $(".js-view-count[data-work-id=78796329]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796329; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796329']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796329, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e1befc2d40b59a11d64a6f76400894ec" } } $('.js-work-strip[data-work-id=78796329]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796329,"title":"Segmented point process models for work system safety analysis","translated_title":"","metadata":{"publisher":"Elsevier BV","grobid_abstract":"This study proposes a new scheme for measurement of safety performance in work systems using segmented point process models that can capture the points of changes in the working conditions as well as changes in safety initiatives. Data, collected from an underground coal mine, were analyzed using homogeneous (HPP) as well as non-homogeneous (NHPP) point process models. Time between occurrences (TBO) and number of occurrences (NOC) were modeled followed by the development of loss functions. The methodology can be used to monitor safety performance and to check safety program effectiveness. The findings of the case study application showed that the injury occurrences data fit the models for (i) 'all incidents' and 'first aid' cases with one change point at 458 days, (ii) 'near-miss' case with one change point at 441 days, and (iii) 'minor' injury case with two-change points at 11 days and 375 days, respectively.","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Safety Science","grobid_abstract_attachment_id":85714988},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796329/Segmented_point_process_models_for_work_system_safety_analysis","translated_internal_url":"","created_at":"2022-05-08T19:18:23.042-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714988,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714988/thumbnails/1.jpg","file_name":"108391.pdf","download_url":"https://www.academia.edu/attachments/85714988/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Segmented_point_process_models_for_work.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714988/108391-libre.pdf?1652063443=\u0026response-content-disposition=attachment%3B+filename%3DSegmented_point_process_models_for_work.pdf\u0026Expires=1732835577\u0026Signature=L-A~zYX8bdcVQBQNwly9zfnZ~OAdoOMGvuy0icCczSOpfeAB-Z8k7jqZODGyqL7wyFRWjym2KTagMFlCcxnT6IR17JIPwqJOVWSZpJkOBZD0yAuXxs74vJOZcp~siiCc4y8KwzrzTB~x4nSpLNOlsxfu72MpRyR6um1QSzhXy8vNowZ9rNXHDA0Jknml7kWvoTBmRVOfEWtWqneXtiCEyFoCw6~uwHwp9jENl7~lPFH5fWE6WGWFvM6uAxPm~b89B7Q8TX1Wq93Udsh337xEF0EfHcRrmCSisor9uQGWWqRlnj7hnkTNWRxwevkWDuGHSji2XdB~7sGILEKY26H1Mg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Segmented_point_process_models_for_work_system_safety_analysis","translated_slug":"","page_count":3,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714988,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714988/thumbnails/1.jpg","file_name":"108391.pdf","download_url":"https://www.academia.edu/attachments/85714988/download_file?st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Segmented_point_process_models_for_work.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714988/108391-libre.pdf?1652063443=\u0026response-content-disposition=attachment%3B+filename%3DSegmented_point_process_models_for_work.pdf\u0026Expires=1732835577\u0026Signature=L-A~zYX8bdcVQBQNwly9zfnZ~OAdoOMGvuy0icCczSOpfeAB-Z8k7jqZODGyqL7wyFRWjym2KTagMFlCcxnT6IR17JIPwqJOVWSZpJkOBZD0yAuXxs74vJOZcp~siiCc4y8KwzrzTB~x4nSpLNOlsxfu72MpRyR6um1QSzhXy8vNowZ9rNXHDA0Jknml7kWvoTBmRVOfEWtWqneXtiCEyFoCw6~uwHwp9jENl7~lPFH5fWE6WGWFvM6uAxPm~b89B7Q8TX1Wq93Udsh337xEF0EfHcRrmCSisor9uQGWWqRlnj7hnkTNWRxwevkWDuGHSji2XdB~7sGILEKY26H1Mg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":472306,"name":"Workplace health and safety","url":"https://www.academia.edu/Documents/in/Workplace_health_and_safety"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796328"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796328/Human_error_identification_and_risk_prioritization_in_overhead_crane_operations_using_HTA_SHERPA_and_fuzzy_VIKOR_method"><img alt="Research paper thumbnail of Human error identification and risk prioritization in overhead crane operations using HTA, SHERPA and fuzzy VIKOR method" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796328/Human_error_identification_and_risk_prioritization_in_overhead_crane_operations_using_HTA_SHERPA_and_fuzzy_VIKOR_method">Human error identification and risk prioritization in overhead crane operations using HTA, SHERPA and fuzzy VIKOR method</a></div><div class="wp-workCard_item"><span>Expert Systems with Applications</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT Human error identification and subsequent prioritization are the foremost tasks involved...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ABSTRACT Human error identification and subsequent prioritization are the foremost tasks involved in HRA. In this study a methodology is developed for performing these tasks with an application to overhead crane operations. The application of the present methodology will help to understand how the risk associated with the human errors propagates through different hierarchy levels. The methodology provides a framework for quantifying the risk of different human errors using the experts’ subjective opinions only. The incorporation of fuzzy VIKOR technique enables us develop a ranking mechanism for the failure modes where the individual constituent components are non-commensurable in nature. The developed ranking mechanism helps the decision makers in optimal allocation of safety critical resources, used for risk mitigation purposes.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796328"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796328"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796328; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796328]").text(description); $(".js-view-count[data-work-id=78796328]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796328; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796328']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796328, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796328]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796328,"title":"Human error identification and risk prioritization in overhead crane operations using HTA, SHERPA and fuzzy VIKOR method","translated_title":"","metadata":{"abstract":"ABSTRACT Human error identification and subsequent prioritization are the foremost tasks involved in HRA. In this study a methodology is developed for performing these tasks with an application to overhead crane operations. The application of the present methodology will help to understand how the risk associated with the human errors propagates through different hierarchy levels. The methodology provides a framework for quantifying the risk of different human errors using the experts’ subjective opinions only. The incorporation of fuzzy VIKOR technique enables us develop a ranking mechanism for the failure modes where the individual constituent components are non-commensurable in nature. The developed ranking mechanism helps the decision makers in optimal allocation of safety critical resources, used for risk mitigation purposes.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"Expert Systems with Applications"},"translated_abstract":"ABSTRACT Human error identification and subsequent prioritization are the foremost tasks involved in HRA. In this study a methodology is developed for performing these tasks with an application to overhead crane operations. The application of the present methodology will help to understand how the risk associated with the human errors propagates through different hierarchy levels. The methodology provides a framework for quantifying the risk of different human errors using the experts’ subjective opinions only. The incorporation of fuzzy VIKOR technique enables us develop a ranking mechanism for the failure modes where the individual constituent components are non-commensurable in nature. The developed ranking mechanism helps the decision makers in optimal allocation of safety critical resources, used for risk mitigation purposes.","internal_url":"https://www.academia.edu/78796328/Human_error_identification_and_risk_prioritization_in_overhead_crane_operations_using_HTA_SHERPA_and_fuzzy_VIKOR_method","translated_internal_url":"","created_at":"2022-05-08T19:18:22.953-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Human_error_identification_and_risk_prioritization_in_overhead_crane_operations_using_HTA_SHERPA_and_fuzzy_VIKOR_method","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":51531,"name":"Pergamon","url":"https://www.academia.edu/Documents/in/Pergamon"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796327"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796327/Development_of_a_relative_risk_model_for_roof_and_side_fall_fatal_accidents_in_underground_coal_mines_in_India"><img alt="Research paper thumbnail of Development of a relative risk model for roof and side fall fatal accidents in underground coal mines in India" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796327/Development_of_a_relative_risk_model_for_roof_and_side_fall_fatal_accidents_in_underground_coal_mines_in_India">Development of a relative risk model for roof and side fall fatal accidents in underground coal mines in India</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2009</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">... The main reasons for roof and side fall accidents in Indian underground coal mines are well d...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">... The main reasons for roof and side fall accidents in Indian underground coal mines are well documented by Kejriwal (2002) based on his survey of accidents in Indian mines for the last 100 years. ... This retrospective study also confirms the findings of Kejriwal (2002). ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796327"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796327"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796327; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796327]").text(description); $(".js-view-count[data-work-id=78796327]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796327; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796327']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796327, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796327]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796327,"title":"Development of a relative risk model for roof and side fall fatal accidents in underground coal mines in India","translated_title":"","metadata":{"abstract":"... The main reasons for roof and side fall accidents in Indian underground coal mines are well documented by Kejriwal (2002) based on his survey of accidents in Indian mines for the last 100 years. ... This retrospective study also confirms the findings of Kejriwal (2002). ...","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2009,"errors":{}},"publication_name":"Safety Science"},"translated_abstract":"... The main reasons for roof and side fall accidents in Indian underground coal mines are well documented by Kejriwal (2002) based on his survey of accidents in Indian mines for the last 100 years. ... This retrospective study also confirms the findings of Kejriwal (2002). ...","internal_url":"https://www.academia.edu/78796327/Development_of_a_relative_risk_model_for_roof_and_side_fall_fatal_accidents_in_underground_coal_mines_in_India","translated_internal_url":"","created_at":"2022-05-08T19:18:22.871-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Development_of_a_relative_risk_model_for_roof_and_side_fall_fatal_accidents_in_underground_coal_mines_in_India","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":80317,"name":"Coal Mining","url":"https://www.academia.edu/Documents/in/Coal_Mining"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796326"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796326/Development_of_worksystem_safety_capability_index_WSCI_"><img alt="Research paper thumbnail of Development of worksystem safety capability index (WSCI)" class="work-thumbnail" src="https://attachments.academia-assets.com/85714986/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796326/Development_of_worksystem_safety_capability_index_WSCI_">Development of worksystem safety capability index (WSCI)</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2010</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5003d5a6185c60c8932d56d2bc0c025b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714986,&quot;asset_id&quot;:78796326,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714986/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796326"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796326"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796326; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796326]").text(description); $(".js-view-count[data-work-id=78796326]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796326; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796326']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796326, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5003d5a6185c60c8932d56d2bc0c025b" } } $('.js-work-strip[data-work-id=78796326]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796326,"title":"Development of worksystem safety capability index (WSCI)","translated_title":"","metadata":{"publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2010,"errors":{}},"publication_name":"Safety Science"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796326/Development_of_worksystem_safety_capability_index_WSCI_","translated_internal_url":"","created_at":"2022-05-08T19:18:22.786-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714986,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714986/thumbnails/1.jpg","file_name":"j.ssci.2010.05.01020220509-1-oc76i3.pdf","download_url":"https://www.academia.edu/attachments/85714986/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Development_of_worksystem_safety_capabil.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714986/j.ssci.2010.05.01020220509-1-oc76i3-libre.pdf?1652063445=\u0026response-content-disposition=attachment%3B+filename%3DDevelopment_of_worksystem_safety_capabil.pdf\u0026Expires=1732835577\u0026Signature=TzW~DOM26HGMQH3VzlF~zM0xRQz2-7osPWSk7kRkmazc1JQlL86yJZlIcAMZv3D1JRozzXff3V6d-E~0E-wDhxK~YvVjqZBDwzhXXNpeqzPKtmj5rWMrDTp5qovpeO0f8GnPSws1G08Z9fnEcOaIqXMIC0T~SzJoQzIyhgqPZ5ag3CllMGFmiAYCg5Xt5nOWJdaIZy-2C1V0jbofcfwI7VPvz9fJxGxbsXmV9iLpbzquWoVsDtdPNi2t7J1nuy69-ytAKCPACzsm06UNnTWy1UJG23O5cX61XJ1toBEIH8XQYYaX2ybKuZI8mLx34Px7g5FSjfiTm9BHQP6JI35bzw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Development_of_worksystem_safety_capability_index_WSCI_","translated_slug":"","page_count":11,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714986,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714986/thumbnails/1.jpg","file_name":"j.ssci.2010.05.01020220509-1-oc76i3.pdf","download_url":"https://www.academia.edu/attachments/85714986/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Development_of_worksystem_safety_capabil.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714986/j.ssci.2010.05.01020220509-1-oc76i3-libre.pdf?1652063445=\u0026response-content-disposition=attachment%3B+filename%3DDevelopment_of_worksystem_safety_capabil.pdf\u0026Expires=1732835577\u0026Signature=TzW~DOM26HGMQH3VzlF~zM0xRQz2-7osPWSk7kRkmazc1JQlL86yJZlIcAMZv3D1JRozzXff3V6d-E~0E-wDhxK~YvVjqZBDwzhXXNpeqzPKtmj5rWMrDTp5qovpeO0f8GnPSws1G08Z9fnEcOaIqXMIC0T~SzJoQzIyhgqPZ5ag3CllMGFmiAYCg5Xt5nOWJdaIZy-2C1V0jbofcfwI7VPvz9fJxGxbsXmV9iLpbzquWoVsDtdPNi2t7J1nuy69-ytAKCPACzsm06UNnTWy1UJG23O5cX61XJ1toBEIH8XQYYaX2ybKuZI8mLx34Px7g5FSjfiTm9BHQP6JI35bzw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="14028823" id="papers"><div class="js-work-strip profile--work_container" data-work-id="78796345"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796345/Dynamic_Functional_Bandwidth_Kernel_Based_SVM_An_Efficient_Approach_for_Functional_Data_Analysis"><img alt="Research paper thumbnail of Dynamic Functional Bandwidth Kernel-Based SVM: An Efficient Approach for Functional Data Analysis" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796345/Dynamic_Functional_Bandwidth_Kernel_Based_SVM_An_Efficient_Approach_for_Functional_Data_Analysis">Dynamic Functional Bandwidth Kernel-Based SVM: An Efficient Approach for Functional Data Analysis</a></div><div class="wp-workCard_item"><span>Advances in Intelligent Systems and Computing</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796345"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796345"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796345; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796345]").text(description); $(".js-view-count[data-work-id=78796345]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796345; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796345']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796345, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796345]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796345,"title":"Dynamic Functional Bandwidth Kernel-Based SVM: An Efficient Approach for Functional Data Analysis","translated_title":"","metadata":{"publisher":"Springer Singapore","publication_name":"Advances in Intelligent Systems and Computing"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796345/Dynamic_Functional_Bandwidth_Kernel_Based_SVM_An_Efficient_Approach_for_Functional_Data_Analysis","translated_internal_url":"","created_at":"2022-05-08T19:18:25.039-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Dynamic_Functional_Bandwidth_Kernel_Based_SVM_An_Efficient_Approach_for_Functional_Data_Analysis","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":20339071,"url":"https://link.springer.com/content/pdf/10.1007/978-981-15-9927-9_65"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796344"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796344/Predicting_and_Analysing_Pedestrian_Injury_Severity_A_Machine_Learning_Based_Approach"><img alt="Research paper thumbnail of Predicting and Analysing Pedestrian Injury Severity: A Machine Learning-Based Approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796344/Predicting_and_Analysing_Pedestrian_Injury_Severity_A_Machine_Learning_Based_Approach">Predicting and Analysing Pedestrian Injury Severity: A Machine Learning-Based Approach</a></div><div class="wp-workCard_item"><span>Proceedings of the Seventh International Conference on Mathematics and Computing</span><span>, 2022</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796344"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796344"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796344; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796344]").text(description); $(".js-view-count[data-work-id=78796344]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796344; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796344']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796344, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796344]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796344,"title":"Predicting and Analysing Pedestrian Injury Severity: A Machine Learning-Based Approach","translated_title":"","metadata":{"publisher":"Springer Singapore","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Proceedings of the Seventh International Conference on Mathematics and Computing"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796344/Predicting_and_Analysing_Pedestrian_Injury_Severity_A_Machine_Learning_Based_Approach","translated_internal_url":"","created_at":"2022-05-08T19:18:24.923-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Predicting_and_Analysing_Pedestrian_Injury_Severity_A_Machine_Learning_Based_Approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[],"urls":[{"id":20339070,"url":"https://link.springer.com/content/pdf/10.1007/978-981-16-6890-6_36"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796343"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796343/IoT_Based_Laser_Trip_Wire_System_for_Safety_and_Security_in_Industries"><img alt="Research paper thumbnail of IoT-Based Laser Trip Wire System for Safety and Security in Industries" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796343/IoT_Based_Laser_Trip_Wire_System_for_Safety_and_Security_in_Industries">IoT-Based Laser Trip Wire System for Safety and Security in Industries</a></div><div class="wp-workCard_item"><span>Internet of Things</span><span>, 2022</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796343"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796343"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796343; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796343]").text(description); $(".js-view-count[data-work-id=78796343]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796343; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796343']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796343, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796343]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796343,"title":"IoT-Based Laser Trip Wire System for Safety and Security in Industries","translated_title":"","metadata":{"publisher":"CRC Press","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Internet of Things"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796343/IoT_Based_Laser_Trip_Wire_System_for_Safety_and_Security_in_Industries","translated_internal_url":"","created_at":"2022-05-08T19:18:24.834-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"IoT_Based_Laser_Trip_Wire_System_for_Safety_and_Security_in_Industries","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":9135,"name":"The Internet of Things","url":"https://www.academia.edu/Documents/in/The_Internet_of_Things"},{"id":14725,"name":"Internet of Things","url":"https://www.academia.edu/Documents/in/Internet_of_Things"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796342"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796342/Root_Cause_Analysis_of_Incidents_Using_Text_Clustering_and_Classification_Algorithms"><img alt="Research paper thumbnail of Root Cause Analysis of Incidents Using Text Clustering and Classification Algorithms" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796342/Root_Cause_Analysis_of_Incidents_Using_Text_Clustering_and_Classification_Algorithms">Root Cause Analysis of Incidents Using Text Clustering and Classification Algorithms</a></div><div class="wp-workCard_item"><span>Proceedings of ICETIT 2019</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The purpose of this study is to cluster the injury narratives to extract the root causes behind t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The purpose of this study is to cluster the injury narratives to extract the root causes behind the accidents. Analysis is done on incident data collected from the database of an integrated steel plant. Key terms generated from the clustering of incident scenario help us in finding root causes of that particular incident. This study also proposed specific measures to the management that would improve the safety performance. This study uses text document clustering to discover the hidden factors and causes behind the incidents. Understanding previous accidents is necessary to avoid future accidents. However, for companies, management of large accident databases, and accurately classifying accident narratives are very challenging issues. Therefore, the aim of this study is to accurately classify accident reports using text classification approaches and evaluate their usefulness. The study used two machine learning (ML) algorithms, namely random forest (RF), and support vector machine (SVM) and found that SVM performed best in classifying the accident narratives. Further, SVM was experimented with different tokenization of the preprocessed narratives to get more reliable results.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796342"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796342"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796342; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796342]").text(description); $(".js-view-count[data-work-id=78796342]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796342; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796342']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796342, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796342]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796342,"title":"Root Cause Analysis of Incidents Using Text Clustering and Classification Algorithms","translated_title":"","metadata":{"abstract":"The purpose of this study is to cluster the injury narratives to extract the root causes behind the accidents. Analysis is done on incident data collected from the database of an integrated steel plant. Key terms generated from the clustering of incident scenario help us in finding root causes of that particular incident. This study also proposed specific measures to the management that would improve the safety performance. This study uses text document clustering to discover the hidden factors and causes behind the incidents. Understanding previous accidents is necessary to avoid future accidents. However, for companies, management of large accident databases, and accurately classifying accident narratives are very challenging issues. Therefore, the aim of this study is to accurately classify accident reports using text classification approaches and evaluate their usefulness. The study used two machine learning (ML) algorithms, namely random forest (RF), and support vector machine (SVM) and found that SVM performed best in classifying the accident narratives. Further, SVM was experimented with different tokenization of the preprocessed narratives to get more reliable results.","publisher":"Springer International Publishing","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Proceedings of ICETIT 2019"},"translated_abstract":"The purpose of this study is to cluster the injury narratives to extract the root causes behind the accidents. Analysis is done on incident data collected from the database of an integrated steel plant. Key terms generated from the clustering of incident scenario help us in finding root causes of that particular incident. This study also proposed specific measures to the management that would improve the safety performance. This study uses text document clustering to discover the hidden factors and causes behind the incidents. Understanding previous accidents is necessary to avoid future accidents. However, for companies, management of large accident databases, and accurately classifying accident narratives are very challenging issues. Therefore, the aim of this study is to accurately classify accident reports using text classification approaches and evaluate their usefulness. The study used two machine learning (ML) algorithms, namely random forest (RF), and support vector machine (SVM) and found that SVM performed best in classifying the accident narratives. Further, SVM was experimented with different tokenization of the preprocessed narratives to get more reliable results.","internal_url":"https://www.academia.edu/78796342/Root_Cause_Analysis_of_Incidents_Using_Text_Clustering_and_Classification_Algorithms","translated_internal_url":"","created_at":"2022-05-08T19:18:24.717-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Root_Cause_Analysis_of_Incidents_Using_Text_Clustering_and_Classification_Algorithms","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":131237,"name":"Cluster Analysis","url":"https://www.academia.edu/Documents/in/Cluster_Analysis"}],"urls":[{"id":20339069,"url":"http://link.springer.com/content/pdf/10.1007/978-3-030-30577-2_63"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796341"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796341/Prediction_of_Occupational_Incidents_Using_Proactive_and_Reactive_Data_A_Data_Mining_Approach"><img alt="Research paper thumbnail of Prediction of Occupational Incidents Using Proactive and Reactive Data: A Data Mining Approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796341/Prediction_of_Occupational_Incidents_Using_Proactive_and_Reactive_Data_A_Data_Mining_Approach">Prediction of Occupational Incidents Using Proactive and Reactive Data: A Data Mining Approach</a></div><div class="wp-workCard_item"><span>Industrial Safety Management</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Prediction of occupational incidents is an important task for any industry. To do this, reactive ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Prediction of occupational incidents is an important task for any industry. To do this, reactive data has been used by most of the previous studies in this domain. As an extension of the existing works, the present study has used the underused proactive data coupled with reactive data to establish the predictive models so that the information inherent in both data sets could be better utilized. The main aim of the study is to predict the incident outcomes using mixed data set comprising reactive and proactive data together. Two decision tree classifiers, i.e. classification and regression tree (CART) and C5.0, have been implemented with tenfold cross validation. Furthermore, the ensemble technique, namely adaptive boosting has been implemented to increase the classification accuracy. Results show that boosted C5.0 produces higher accuracy than others for the prediction task. Furthermore, the rules obtained produce the insight of the incidents. The limitation of the present study includes the use of less amount of data and the requirement of experts’ domain knowledge for a large span of time. Future scope of the study includes the proper feature selection for preparation of the mixed data set and building the better classification algorithm for better prediction of occurrence of accidents. The present work sets out the potential use of both types of data sources together.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796341"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796341"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796341; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796341]").text(description); $(".js-view-count[data-work-id=78796341]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796341; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796341']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796341, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796341]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796341,"title":"Prediction of Occupational Incidents Using Proactive and Reactive Data: A Data Mining Approach","translated_title":"","metadata":{"abstract":"Prediction of occupational incidents is an important task for any industry. To do this, reactive data has been used by most of the previous studies in this domain. As an extension of the existing works, the present study has used the underused proactive data coupled with reactive data to establish the predictive models so that the information inherent in both data sets could be better utilized. The main aim of the study is to predict the incident outcomes using mixed data set comprising reactive and proactive data together. Two decision tree classifiers, i.e. classification and regression tree (CART) and C5.0, have been implemented with tenfold cross validation. Furthermore, the ensemble technique, namely adaptive boosting has been implemented to increase the classification accuracy. Results show that boosted C5.0 produces higher accuracy than others for the prediction task. Furthermore, the rules obtained produce the insight of the incidents. The limitation of the present study includes the use of less amount of data and the requirement of experts’ domain knowledge for a large span of time. Future scope of the study includes the proper feature selection for preparation of the mixed data set and building the better classification algorithm for better prediction of occurrence of accidents. The present work sets out the potential use of both types of data sources together.","publisher":"Springer Singapore","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Industrial Safety Management"},"translated_abstract":"Prediction of occupational incidents is an important task for any industry. To do this, reactive data has been used by most of the previous studies in this domain. As an extension of the existing works, the present study has used the underused proactive data coupled with reactive data to establish the predictive models so that the information inherent in both data sets could be better utilized. The main aim of the study is to predict the incident outcomes using mixed data set comprising reactive and proactive data together. Two decision tree classifiers, i.e. classification and regression tree (CART) and C5.0, have been implemented with tenfold cross validation. Furthermore, the ensemble technique, namely adaptive boosting has been implemented to increase the classification accuracy. Results show that boosted C5.0 produces higher accuracy than others for the prediction task. Furthermore, the rules obtained produce the insight of the incidents. The limitation of the present study includes the use of less amount of data and the requirement of experts’ domain knowledge for a large span of time. Future scope of the study includes the proper feature selection for preparation of the mixed data set and building the better classification algorithm for better prediction of occurrence of accidents. The present work sets out the potential use of both types of data sources together.","internal_url":"https://www.academia.edu/78796341/Prediction_of_Occupational_Incidents_Using_Proactive_and_Reactive_Data_A_Data_Mining_Approach","translated_internal_url":"","created_at":"2022-05-08T19:18:24.596-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Prediction_of_Occupational_Incidents_Using_Proactive_and_Reactive_Data_A_Data_Mining_Approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1262914,"name":"Industrial Safety Management","url":"https://www.academia.edu/Documents/in/Industrial_Safety_Management"}],"urls":[{"id":20339068,"url":"http://link.springer.com/content/pdf/10.1007/978-981-10-6328-2_6"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796340"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796340/Text_clustering_based_deep_neural_network_for_prediction_of_occupational_accident_risk_A_case_study"><img alt="Research paper thumbnail of Text-clustering based deep neural network for prediction of occupational accident risk: A case study" class="work-thumbnail" src="https://attachments.academia-assets.com/85714990/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796340/Text_clustering_based_deep_neural_network_for_prediction_of_occupational_accident_risk_A_case_study">Text-clustering based deep neural network for prediction of occupational accident risk: A case study</a></div><div class="wp-workCard_item"><span>2018 International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP)</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5abd34df3a7ec87ed788559ffd68299a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714990,&quot;asset_id&quot;:78796340,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714990/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796340"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796340"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796340; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796340]").text(description); $(".js-view-count[data-work-id=78796340]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796340; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796340']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796340, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5abd34df3a7ec87ed788559ffd68299a" } } $('.js-work-strip[data-work-id=78796340]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796340,"title":"Text-clustering based deep neural network for prediction of occupational accident risk: A case study","translated_title":"","metadata":{"publisher":"IEEE","grobid_abstract":"Predicting occupational accident risk using both structured and unstructured (text) data is broadly an unexplored area of research. Unstructured texts, i.e., incident narratives often remain unutilized or under-utilized. Besides the explicit attributes present in the dataset, there exist a large number of hidden attributes in different forms, which are hardly explored by the traditional machine learning algorithms. Therefore, we propose a methodology that utilizes both text-based clustering, namely Expectation Maximization (EM) algorithm for unstructured text analysis and deep neural network (DNN) for prediction of accident risk using the accident data collected from a steel plant in India. EM-based DNN shows the maximum accuracy equal to 83.59% in the prediction of risk while compared to other algorithms, namely single DNN, support vector machine, and random forest. In addition, it is also explored that the use of text data enhances the prediction accuracy in accident analysis.","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"2018 International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP)","grobid_abstract_attachment_id":85714990},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796340/Text_clustering_based_deep_neural_network_for_prediction_of_occupational_accident_risk_A_case_study","translated_internal_url":"","created_at":"2022-05-08T19:18:24.471-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714990,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714990/thumbnails/1.jpg","file_name":"PID5613477.pdf","download_url":"https://www.academia.edu/attachments/85714990/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Text_clustering_based_deep_neural_networ.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714990/PID5613477-libre.pdf?1652063450=\u0026response-content-disposition=attachment%3B+filename%3DText_clustering_based_deep_neural_networ.pdf\u0026Expires=1732801874\u0026Signature=RIKqN1y-c1RiUgDkXkERnetf0TjLy9mxP92HoMOVi-Vk5uMRUE7Ae8b4Mn-InJSzNStuRw2wFW2BCto71tQbBLQTSNfulCmNS6ZixoLsEkj4HhYV8lU0xoF~~fcz8O2IQdY0vY6GAetJBv5f7xlAWNxO9yrXY9M1KDg9frVfEaAgmm3k4baFFo9Cjo~Dnh1wbT4VIPQCIEENiweHIiVaT1oAO0Pz0fC-P7D2mbZD7XiUwUfmK9v9BB2oHotFIeNIw2whe9pgNZiKdM3Ltz7I34nw~YA6KifuxTxxrigmxQQjJYVmE7CFCNbRXSV7rkskh4tEfIiAQHqEDdjOcIpnAA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Text_clustering_based_deep_neural_network_for_prediction_of_occupational_accident_risk_A_case_study","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714990,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714990/thumbnails/1.jpg","file_name":"PID5613477.pdf","download_url":"https://www.academia.edu/attachments/85714990/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Text_clustering_based_deep_neural_networ.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714990/PID5613477-libre.pdf?1652063450=\u0026response-content-disposition=attachment%3B+filename%3DText_clustering_based_deep_neural_networ.pdf\u0026Expires=1732801874\u0026Signature=RIKqN1y-c1RiUgDkXkERnetf0TjLy9mxP92HoMOVi-Vk5uMRUE7Ae8b4Mn-InJSzNStuRw2wFW2BCto71tQbBLQTSNfulCmNS6ZixoLsEkj4HhYV8lU0xoF~~fcz8O2IQdY0vY6GAetJBv5f7xlAWNxO9yrXY9M1KDg9frVfEaAgmm3k4baFFo9Cjo~Dnh1wbT4VIPQCIEENiweHIiVaT1oAO0Pz0fC-P7D2mbZD7XiUwUfmK9v9BB2oHotFIeNIw2whe9pgNZiKdM3Ltz7I34nw~YA6KifuxTxxrigmxQQjJYVmE7CFCNbRXSV7rkskh4tEfIiAQHqEDdjOcIpnAA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":1211304,"name":"Artificial Neural Network","url":"https://www.academia.edu/Documents/in/Artificial_Neural_Network"}],"urls":[{"id":20339067,"url":"http://xplorestaging.ieee.org/ielx7/8681778/8692798/08692881.pdf?arnumber=8692881"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796339"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796339/COVID_19_Outbreak_A_Data_driven_Optimization_Model_for_Allocation_of_Patients"><img alt="Research paper thumbnail of COVID-19 Outbreak: A Data-driven Optimization Model for Allocation of Patients" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796339/COVID_19_Outbreak_A_Data_driven_Optimization_Model_for_Allocation_of_Patients">COVID-19 Outbreak: A Data-driven Optimization Model for Allocation of Patients</a></div><div class="wp-workCard_item"><span>Computers &amp; Industrial Engineering</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">COVID-19 is an unprecedented pandemic that puts the entire world at stake and the healthcare syst...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">COVID-19 is an unprecedented pandemic that puts the entire world at stake and the healthcare systems across the globe have faced pressing challenges. The number of COVID-19 patients increases rapidly every day. The hospitals across many countries are starving to provide adequate service to the patients due to the shortage of resources and as a consequence, patients do not get admitted to hospitals on time, which in turn creates panic and might contribute to the spread of the pandemic. Under this resource constraint situation, this study proposes a data-driven optimization model for patient allocation in hospitals. First, a compartmental model is developed for characterizing the spread of the COVID-19 virus. Then, Pareto analysis is carried out to identify the most COVID-affected cities. An optimization model is then developed for optimal patient allocation in hospitals in different cities. Finally, a sensitivity analysis is also conducted to investigate the robustness of our decision model. Using published data for Indian cities, obtained from different websites, the proposed methodology has been validated. Experimental results reveal that the proposed model offers some efficient strategies for optimal allocation of patients. A total of ten cities are identified as the most affected. Besides, four factors, namely cooperation, distances between cities, number of patients, and bed capacity per city emerge as important determinants.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796339"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796339"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796339; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796339]").text(description); $(".js-view-count[data-work-id=78796339]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796339; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796339']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796339, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796339]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796339,"title":"COVID-19 Outbreak: A Data-driven Optimization Model for Allocation of Patients","translated_title":"","metadata":{"abstract":"COVID-19 is an unprecedented pandemic that puts the entire world at stake and the healthcare systems across the globe have faced pressing challenges. The number of COVID-19 patients increases rapidly every day. The hospitals across many countries are starving to provide adequate service to the patients due to the shortage of resources and as a consequence, patients do not get admitted to hospitals on time, which in turn creates panic and might contribute to the spread of the pandemic. Under this resource constraint situation, this study proposes a data-driven optimization model for patient allocation in hospitals. First, a compartmental model is developed for characterizing the spread of the COVID-19 virus. Then, Pareto analysis is carried out to identify the most COVID-affected cities. An optimization model is then developed for optimal patient allocation in hospitals in different cities. Finally, a sensitivity analysis is also conducted to investigate the robustness of our decision model. Using published data for Indian cities, obtained from different websites, the proposed methodology has been validated. Experimental results reveal that the proposed model offers some efficient strategies for optimal allocation of patients. A total of ten cities are identified as the most affected. Besides, four factors, namely cooperation, distances between cities, number of patients, and bed capacity per city emerge as important determinants.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Computers \u0026 Industrial Engineering"},"translated_abstract":"COVID-19 is an unprecedented pandemic that puts the entire world at stake and the healthcare systems across the globe have faced pressing challenges. The number of COVID-19 patients increases rapidly every day. The hospitals across many countries are starving to provide adequate service to the patients due to the shortage of resources and as a consequence, patients do not get admitted to hospitals on time, which in turn creates panic and might contribute to the spread of the pandemic. Under this resource constraint situation, this study proposes a data-driven optimization model for patient allocation in hospitals. First, a compartmental model is developed for characterizing the spread of the COVID-19 virus. Then, Pareto analysis is carried out to identify the most COVID-affected cities. An optimization model is then developed for optimal patient allocation in hospitals in different cities. Finally, a sensitivity analysis is also conducted to investigate the robustness of our decision model. Using published data for Indian cities, obtained from different websites, the proposed methodology has been validated. Experimental results reveal that the proposed model offers some efficient strategies for optimal allocation of patients. A total of ten cities are identified as the most affected. Besides, four factors, namely cooperation, distances between cities, number of patients, and bed capacity per city emerge as important determinants.","internal_url":"https://www.academia.edu/78796339/COVID_19_Outbreak_A_Data_driven_Optimization_Model_for_Allocation_of_Patients","translated_internal_url":"","created_at":"2022-05-08T19:18:24.350-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"COVID_19_Outbreak_A_Data_driven_Optimization_Model_for_Allocation_of_Patients","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"}],"urls":[{"id":20339066,"url":"https://api.elsevier.com/content/article/PII:S0360835221005799?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796338"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796338/Machine_learning_in_occupational_accident_analysis_A_review_using_science_mapping_approach_with_citation_network_analysis"><img alt="Research paper thumbnail of Machine learning in occupational accident analysis: A review using science mapping approach with citation network analysis" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796338/Machine_learning_in_occupational_accident_analysis_A_review_using_science_mapping_approach_with_citation_network_analysis">Machine learning in occupational accident analysis: A review using science mapping approach with citation network analysis</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract The present study reviews the publications that examine the application of machine learn...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract The present study reviews the publications that examine the application of machine learning (ML) approaches in occupational accident analysis. The review process includes four phases of analysis, namely bibliometric search, descriptive analysis, scientometric analysis, and citation network analysis (CNA). In the bibliometric search, a total of 232 articles are systematically screened out from 1995 to 2019 (up to May). Then, descriptive analysis and scientometric analysis are carried out to find the influences of journals, authors, authors’ keywords, articles/documents, and countries/regions in developing the domain. Thereafter, CNA is carried out to classify the publications according to the research themes and methods used. From this extensive review, several key findings are obtained in the application of ML approaches in occupational accident analysis. USA, China, and Taiwan are the leading countries/regions in publishing articles. The four major research domains are (i) prediction of incident outcomes, (ii) extraction of rule based patterns, (iii) prediction of injury risk, and (iv) prediction of injury severity. Then, a taxonomy of the ML algorithms used is developed. Finally, research gaps and safety issues are highlighted and the scope for future is discussed.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796338"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796338"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796338; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796338]").text(description); $(".js-view-count[data-work-id=78796338]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796338; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796338']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796338, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796338]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796338,"title":"Machine learning in occupational accident analysis: A review using science mapping approach with citation network analysis","translated_title":"","metadata":{"abstract":"Abstract The present study reviews the publications that examine the application of machine learning (ML) approaches in occupational accident analysis. The review process includes four phases of analysis, namely bibliometric search, descriptive analysis, scientometric analysis, and citation network analysis (CNA). In the bibliometric search, a total of 232 articles are systematically screened out from 1995 to 2019 (up to May). Then, descriptive analysis and scientometric analysis are carried out to find the influences of journals, authors, authors’ keywords, articles/documents, and countries/regions in developing the domain. Thereafter, CNA is carried out to classify the publications according to the research themes and methods used. From this extensive review, several key findings are obtained in the application of ML approaches in occupational accident analysis. USA, China, and Taiwan are the leading countries/regions in publishing articles. The four major research domains are (i) prediction of incident outcomes, (ii) extraction of rule based patterns, (iii) prediction of injury risk, and (iv) prediction of injury severity. Then, a taxonomy of the ML algorithms used is developed. Finally, research gaps and safety issues are highlighted and the scope for future is discussed.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Safety Science"},"translated_abstract":"Abstract The present study reviews the publications that examine the application of machine learning (ML) approaches in occupational accident analysis. The review process includes four phases of analysis, namely bibliometric search, descriptive analysis, scientometric analysis, and citation network analysis (CNA). In the bibliometric search, a total of 232 articles are systematically screened out from 1995 to 2019 (up to May). Then, descriptive analysis and scientometric analysis are carried out to find the influences of journals, authors, authors’ keywords, articles/documents, and countries/regions in developing the domain. Thereafter, CNA is carried out to classify the publications according to the research themes and methods used. From this extensive review, several key findings are obtained in the application of ML approaches in occupational accident analysis. USA, China, and Taiwan are the leading countries/regions in publishing articles. The four major research domains are (i) prediction of incident outcomes, (ii) extraction of rule based patterns, (iii) prediction of injury risk, and (iv) prediction of injury severity. Then, a taxonomy of the ML algorithms used is developed. Finally, research gaps and safety issues are highlighted and the scope for future is discussed.","internal_url":"https://www.academia.edu/78796338/Machine_learning_in_occupational_accident_analysis_A_review_using_science_mapping_approach_with_citation_network_analysis","translated_internal_url":"","created_at":"2022-05-08T19:18:24.212-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Machine_learning_in_occupational_accident_analysis_A_review_using_science_mapping_approach_with_citation_network_analysis","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[{"id":20339065,"url":"https://api.elsevier.com/content/article/PII:S0925753520302976?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796337"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796337/A_comprehensive_methodology_for_quantification_of_Bow_tie_under_type_II_fuzzy_data"><img alt="Research paper thumbnail of A comprehensive methodology for quantification of Bow-tie under type II fuzzy data" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796337/A_comprehensive_methodology_for_quantification_of_Bow_tie_under_type_II_fuzzy_data">A comprehensive methodology for quantification of Bow-tie under type II fuzzy data</a></div><div class="wp-workCard_item"><span>Applied Soft Computing</span><span>, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796337"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796337"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796337; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796337]").text(description); $(".js-view-count[data-work-id=78796337]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796337; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796337']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796337, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796337]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796337,"title":"A comprehensive methodology for quantification of Bow-tie under type II fuzzy data","translated_title":"","metadata":{"publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Applied Soft Computing"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796337/A_comprehensive_methodology_for_quantification_of_Bow_tie_under_type_II_fuzzy_data","translated_internal_url":"","created_at":"2022-05-08T19:18:24.076-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_comprehensive_methodology_for_quantification_of_Bow_tie_under_type_II_fuzzy_data","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems"},{"id":305,"name":"Applied Mathematics","url":"https://www.academia.edu/Documents/in/Applied_Mathematics"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":897823,"name":"Elsevier","url":"https://www.academia.edu/Documents/in/Elsevier"}],"urls":[{"id":20339064,"url":"https://api.elsevier.com/content/article/PII:S1568494621000715?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796336"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796336/An_innovative_integrated_modelling_of_safety_data_using_multiple_correspondence_analysis_and_fuzzy_discretization_techniques"><img alt="Research paper thumbnail of An innovative integrated modelling of safety data using multiple correspondence analysis and fuzzy discretization techniques" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796336/An_innovative_integrated_modelling_of_safety_data_using_multiple_correspondence_analysis_and_fuzzy_discretization_techniques">An innovative integrated modelling of safety data using multiple correspondence analysis and fuzzy discretization techniques</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract In this study, we have proposed an innovative integrated methodology to handle a mix of ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract In this study, we have proposed an innovative integrated methodology to handle a mix of categorical and numeric safety data. We have augmented the traditional multiple correspondence analysis (MCA) through the use of fuzzy discretization approach, t-SNE technique and fuzzy c-means clustering. The fuzzy discretization approach transforms the continuous variables to categorical variables to make them analyzable using MCA. R2-profile is adopted to obtain the best number of hidden dimensions representing the maximum categorical information. Then, t-SNE technique is used to represent the high dimensional categorical information in a 2D map to visualize the significant categorical associations. Then, fuzzy c-means clustering (FCM) is used to group the categories in different clusters based on their membership degree. To determine the optimal number of clusters, cluster validity indices are used. Davies-Bouldin (DB) Index, Dunn’s (DU) Index and Silhouette (SW) coefficients are used to determine the quality of clustering solutions. The proposed methodology is tested using electric overhead traveling (EOT) crane related near-miss incidents and found that our approach is effective. From managerial implication point of view, several safety rules are generated and subsequent safety countermeasures are proposed. Further, the results obtained through FCM is compared with K-means (KM) algorithm and unsupervised fuzzy c-means clustering (UPFCM). FCM outperforms KM and UPFCM on the basis of quality of solutions.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796336"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796336"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796336; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796336]").text(description); $(".js-view-count[data-work-id=78796336]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796336; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796336']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796336, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796336]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796336,"title":"An innovative integrated modelling of safety data using multiple correspondence analysis and fuzzy discretization techniques","translated_title":"","metadata":{"abstract":"Abstract In this study, we have proposed an innovative integrated methodology to handle a mix of categorical and numeric safety data. We have augmented the traditional multiple correspondence analysis (MCA) through the use of fuzzy discretization approach, t-SNE technique and fuzzy c-means clustering. The fuzzy discretization approach transforms the continuous variables to categorical variables to make them analyzable using MCA. R2-profile is adopted to obtain the best number of hidden dimensions representing the maximum categorical information. Then, t-SNE technique is used to represent the high dimensional categorical information in a 2D map to visualize the significant categorical associations. Then, fuzzy c-means clustering (FCM) is used to group the categories in different clusters based on their membership degree. To determine the optimal number of clusters, cluster validity indices are used. Davies-Bouldin (DB) Index, Dunn’s (DU) Index and Silhouette (SW) coefficients are used to determine the quality of clustering solutions. The proposed methodology is tested using electric overhead traveling (EOT) crane related near-miss incidents and found that our approach is effective. From managerial implication point of view, several safety rules are generated and subsequent safety countermeasures are proposed. Further, the results obtained through FCM is compared with K-means (KM) algorithm and unsupervised fuzzy c-means clustering (UPFCM). FCM outperforms KM and UPFCM on the basis of quality of solutions.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Safety Science"},"translated_abstract":"Abstract In this study, we have proposed an innovative integrated methodology to handle a mix of categorical and numeric safety data. We have augmented the traditional multiple correspondence analysis (MCA) through the use of fuzzy discretization approach, t-SNE technique and fuzzy c-means clustering. The fuzzy discretization approach transforms the continuous variables to categorical variables to make them analyzable using MCA. R2-profile is adopted to obtain the best number of hidden dimensions representing the maximum categorical information. Then, t-SNE technique is used to represent the high dimensional categorical information in a 2D map to visualize the significant categorical associations. Then, fuzzy c-means clustering (FCM) is used to group the categories in different clusters based on their membership degree. To determine the optimal number of clusters, cluster validity indices are used. Davies-Bouldin (DB) Index, Dunn’s (DU) Index and Silhouette (SW) coefficients are used to determine the quality of clustering solutions. The proposed methodology is tested using electric overhead traveling (EOT) crane related near-miss incidents and found that our approach is effective. From managerial implication point of view, several safety rules are generated and subsequent safety countermeasures are proposed. Further, the results obtained through FCM is compared with K-means (KM) algorithm and unsupervised fuzzy c-means clustering (UPFCM). FCM outperforms KM and UPFCM on the basis of quality of solutions.","internal_url":"https://www.academia.edu/78796336/An_innovative_integrated_modelling_of_safety_data_using_multiple_correspondence_analysis_and_fuzzy_discretization_techniques","translated_internal_url":"","created_at":"2022-05-08T19:18:23.951-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"An_innovative_integrated_modelling_of_safety_data_using_multiple_correspondence_analysis_and_fuzzy_discretization_techniques","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":897823,"name":"Elsevier","url":"https://www.academia.edu/Documents/in/Elsevier"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[{"id":20339063,"url":"https://api.elsevier.com/content/article/PII:S0925753520302253?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796335"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796335/A_novel_data_mining_approach_for_analysis_of_accident_paths_and_performance_assessment_of_risk_control_systems"><img alt="Research paper thumbnail of A novel data mining approach for analysis of accident paths and performance assessment of risk control systems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796335/A_novel_data_mining_approach_for_analysis_of_accident_paths_and_performance_assessment_of_risk_control_systems">A novel data mining approach for analysis of accident paths and performance assessment of risk control systems</a></div><div class="wp-workCard_item"><span>Reliability Engineering &amp; System Safety</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract The data mining researches to facilitate the process of safety management is fairly new,...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract The data mining researches to facilitate the process of safety management is fairly new, compared to other industrial management domains. The implementation of appropriate, effective, and safe risk control systems (RCSs) is vital to ensure zero-accident and zero-harm vision of industrial work-systems. In this work, we propose a data mining based tool to analyze accident paths from incident data and assess the performance of RCSs. Our work upgrades the existing pattern analysis methods through three new types of analyses (i) temporal frequent itemset generation (T-FIG) for studying the time effect on patterns, (ii) elevated severity itemset generation (ESIG) for examining the risk reduction due to RCSs, and (iii) High impact itemset generation (High_impact_IG) to identify accident paths with high risk. T-FIG and ESIG assist in performance assessment of preventive and mitigating RCSs, respectively. The results from each of the analyses are compared and eight types of inferences regarding the performance of RCSs are drawn. The proposed methodology is applied to 612 incident records reported during steel making process in a steel manufacturing plant. It was found that there are four accident paths which have ineffective preventive and mitigating RCSs, have high risk and are probable to recur in future. Two among four of these paths include hot metal/steel/slag as the hazardous element and three of them are due to damaged/degraded/poorly maintained equipment. Moreover, the case study also demonstrates that proposed data mining approach is an effective and easy to use tool for performance assessment of RCSs and accident path analysis.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796335"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796335"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796335; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796335]").text(description); $(".js-view-count[data-work-id=78796335]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796335; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796335']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796335, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796335]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796335,"title":"A novel data mining approach for analysis of accident paths and performance assessment of risk control systems","translated_title":"","metadata":{"abstract":"Abstract The data mining researches to facilitate the process of safety management is fairly new, compared to other industrial management domains. The implementation of appropriate, effective, and safe risk control systems (RCSs) is vital to ensure zero-accident and zero-harm vision of industrial work-systems. In this work, we propose a data mining based tool to analyze accident paths from incident data and assess the performance of RCSs. Our work upgrades the existing pattern analysis methods through three new types of analyses (i) temporal frequent itemset generation (T-FIG) for studying the time effect on patterns, (ii) elevated severity itemset generation (ESIG) for examining the risk reduction due to RCSs, and (iii) High impact itemset generation (High_impact_IG) to identify accident paths with high risk. T-FIG and ESIG assist in performance assessment of preventive and mitigating RCSs, respectively. The results from each of the analyses are compared and eight types of inferences regarding the performance of RCSs are drawn. The proposed methodology is applied to 612 incident records reported during steel making process in a steel manufacturing plant. It was found that there are four accident paths which have ineffective preventive and mitigating RCSs, have high risk and are probable to recur in future. Two among four of these paths include hot metal/steel/slag as the hazardous element and three of them are due to damaged/degraded/poorly maintained equipment. Moreover, the case study also demonstrates that proposed data mining approach is an effective and easy to use tool for performance assessment of RCSs and accident path analysis.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Reliability Engineering \u0026 System Safety"},"translated_abstract":"Abstract The data mining researches to facilitate the process of safety management is fairly new, compared to other industrial management domains. The implementation of appropriate, effective, and safe risk control systems (RCSs) is vital to ensure zero-accident and zero-harm vision of industrial work-systems. In this work, we propose a data mining based tool to analyze accident paths from incident data and assess the performance of RCSs. Our work upgrades the existing pattern analysis methods through three new types of analyses (i) temporal frequent itemset generation (T-FIG) for studying the time effect on patterns, (ii) elevated severity itemset generation (ESIG) for examining the risk reduction due to RCSs, and (iii) High impact itemset generation (High_impact_IG) to identify accident paths with high risk. T-FIG and ESIG assist in performance assessment of preventive and mitigating RCSs, respectively. The results from each of the analyses are compared and eight types of inferences regarding the performance of RCSs are drawn. The proposed methodology is applied to 612 incident records reported during steel making process in a steel manufacturing plant. It was found that there are four accident paths which have ineffective preventive and mitigating RCSs, have high risk and are probable to recur in future. Two among four of these paths include hot metal/steel/slag as the hazardous element and three of them are due to damaged/degraded/poorly maintained equipment. Moreover, the case study also demonstrates that proposed data mining approach is an effective and easy to use tool for performance assessment of RCSs and accident path analysis.","internal_url":"https://www.academia.edu/78796335/A_novel_data_mining_approach_for_analysis_of_accident_paths_and_performance_assessment_of_risk_control_systems","translated_internal_url":"","created_at":"2022-05-08T19:18:23.826-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_novel_data_mining_approach_for_analysis_of_accident_paths_and_performance_assessment_of_risk_control_systems","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"},{"id":897823,"name":"Elsevier","url":"https://www.academia.edu/Documents/in/Elsevier"}],"urls":[{"id":20339062,"url":"https://api.elsevier.com/content/article/PII:S0951832020305421?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796334"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796334/Application_of_optimized_machine_learning_techniques_for_prediction_of_occupational_accidents"><img alt="Research paper thumbnail of Application of optimized machine learning techniques for prediction of occupational accidents" class="work-thumbnail" src="https://attachments.academia-assets.com/85714992/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796334/Application_of_optimized_machine_learning_techniques_for_prediction_of_occupational_accidents">Application of optimized machine learning techniques for prediction of occupational accidents</a></div><div class="wp-workCard_item"><span>Computers &amp; Operations Research</span><span>, 2019</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5b7d996a1a855f5dfc271ca92cc51397" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714992,&quot;asset_id&quot;:78796334,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714992/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796334"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796334"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796334; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796334]").text(description); $(".js-view-count[data-work-id=78796334]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796334; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796334']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796334, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5b7d996a1a855f5dfc271ca92cc51397" } } $('.js-work-strip[data-work-id=78796334]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796334,"title":"Application of optimized machine learning techniques for prediction of occupational accidents","translated_title":"","metadata":{"publisher":"Elsevier BV","grobid_abstract":"This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. Highlights  Both categorical data and unstructured text data have been analysed.  Incident outcomes are predicted using GA and PSO optimized SVM and ANN approaches.  PSO-SVM outperforms other algorithms in terms of accuracy (i.e., 90.67%).  Nine useful rules are extracted using PSO-SVM based C5.0 algorithm.  Root causes of incidents have been identified.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Computers \u0026 Operations Research","grobid_abstract_attachment_id":85714992},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796334/Application_of_optimized_machine_learning_techniques_for_prediction_of_occupational_accidents","translated_internal_url":"","created_at":"2022-05-08T19:18:23.703-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714992,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714992/thumbnails/1.jpg","file_name":"j.cor.2018.02.02120220509-1-ni2wic.pdf","download_url":"https://www.academia.edu/attachments/85714992/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Application_of_optimized_machine_learnin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714992/j.cor.2018.02.02120220509-1-ni2wic-libre.pdf?1652063457=\u0026response-content-disposition=attachment%3B+filename%3DApplication_of_optimized_machine_learnin.pdf\u0026Expires=1732801874\u0026Signature=LG2WolrjkZRW0QeW0vATdUyxg0xaIUvivqiQ708X1rcAAwszjHLs9YzILHej27zxZEXaSAuGkhj8~omZPtxT4psrXOnEwSE70ZglWZubHP-dqDGZYR6yHQWD0KI7PrCxrbpc0-ftRTIsn9-xNDCuRmexmcjscmt9CfrpnafsP95Jx3Wx5mwPD8g7stu1t2AfPGIQRsQMXu9nya-vuRNNuq3W8jvIySmg0nSsB-X1MzrX4q2AM71VsB9BU-eoGgqNpgDuMNLpc1RFfWmUMbC9tGryDEpu~MhqDYvKKcBAxZygNaRB~qYgDQA3nj75XLxtSLCRG0n1amakvBzmgnM8Fg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Application_of_optimized_machine_learning_techniques_for_prediction_of_occupational_accidents","translated_slug":"","page_count":38,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714992,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714992/thumbnails/1.jpg","file_name":"j.cor.2018.02.02120220509-1-ni2wic.pdf","download_url":"https://www.academia.edu/attachments/85714992/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Application_of_optimized_machine_learnin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714992/j.cor.2018.02.02120220509-1-ni2wic-libre.pdf?1652063457=\u0026response-content-disposition=attachment%3B+filename%3DApplication_of_optimized_machine_learnin.pdf\u0026Expires=1732801874\u0026Signature=LG2WolrjkZRW0QeW0vATdUyxg0xaIUvivqiQ708X1rcAAwszjHLs9YzILHej27zxZEXaSAuGkhj8~omZPtxT4psrXOnEwSE70ZglWZubHP-dqDGZYR6yHQWD0KI7PrCxrbpc0-ftRTIsn9-xNDCuRmexmcjscmt9CfrpnafsP95Jx3Wx5mwPD8g7stu1t2AfPGIQRsQMXu9nya-vuRNNuq3W8jvIySmg0nSsB-X1MzrX4q2AM71VsB9BU-eoGgqNpgDuMNLpc1RFfWmUMbC9tGryDEpu~MhqDYvKKcBAxZygNaRB~qYgDQA3nj75XLxtSLCRG0n1amakvBzmgnM8Fg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":305,"name":"Applied Mathematics","url":"https://www.academia.edu/Documents/in/Applied_Mathematics"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning"},{"id":4593,"name":"Occupational Health \u0026 Safety","url":"https://www.academia.edu/Documents/in/Occupational_Health_and_Safety"},{"id":43981,"name":"Optimization","url":"https://www.academia.edu/Documents/in/Optimization"},{"id":51531,"name":"Pergamon","url":"https://www.academia.edu/Documents/in/Pergamon"},{"id":63857,"name":"Categorical data analysis","url":"https://www.academia.edu/Documents/in/Categorical_data_analysis"},{"id":162271,"name":"Decision Tree","url":"https://www.academia.edu/Documents/in/Decision_Tree"},{"id":556845,"name":"Numerical Analysis and Computational Mathematics","url":"https://www.academia.edu/Documents/in/Numerical_Analysis_and_Computational_Mathematics"},{"id":3657206,"name":"Rule generation","url":"https://www.academia.edu/Documents/in/Rule_generation"}],"urls":[{"id":20339061,"url":"https://api.elsevier.com/content/article/PII:S0305054818300601?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796333"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796333/Reduction_of_life_cycle_costs_for_a_contemporary_helicopter_through_improvement_of_reliability_and_maintainability_parameters"><img alt="Research paper thumbnail of Reduction of life cycle costs for a contemporary helicopter through improvement of reliability and maintainability parameters" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796333/Reduction_of_life_cycle_costs_for_a_contemporary_helicopter_through_improvement_of_reliability_and_maintainability_parameters">Reduction of life cycle costs for a contemporary helicopter through improvement of reliability and maintainability parameters</a></div><div class="wp-workCard_item"><span>International Journal of Quality &amp; Reliability Management</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Purpose The modern helicopters are designed with maximum serviceability and long life expectancy ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Purpose The modern helicopters are designed with maximum serviceability and long life expectancy to ensure minimum life cycle cost. The purpose of this paper is to present a framework to incorporate the customer requirements on reliability and maintainability (R&amp;M) parameters into the design and development phase of a contemporary helicopter, and to discuss the way to capture operational data to establish and improve the R&amp;M parameters to reduce life cycle cost. Design/methodology/approach From the analysis, it is established that the reliability and maintainability cost is the major contributor to the life cost. The significant reliability and maintainability parameters which influence R&amp;M cost are identified from analysis. The operational and design data of a contemporary helicopter are collected, compiled and analyzed to establish and improve the reliability and maintainability parameters. Findings The process depicted in the paper is followed for a contemporary helicopter and su...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796333"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796333"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796333; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796333]").text(description); $(".js-view-count[data-work-id=78796333]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796333; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796333']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796333, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796333]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796333,"title":"Reduction of life cycle costs for a contemporary helicopter through improvement of reliability and maintainability parameters","translated_title":"","metadata":{"abstract":"Purpose The modern helicopters are designed with maximum serviceability and long life expectancy to ensure minimum life cycle cost. The purpose of this paper is to present a framework to incorporate the customer requirements on reliability and maintainability (R\u0026M) parameters into the design and development phase of a contemporary helicopter, and to discuss the way to capture operational data to establish and improve the R\u0026M parameters to reduce life cycle cost. Design/methodology/approach From the analysis, it is established that the reliability and maintainability cost is the major contributor to the life cost. The significant reliability and maintainability parameters which influence R\u0026M cost are identified from analysis. The operational and design data of a contemporary helicopter are collected, compiled and analyzed to establish and improve the reliability and maintainability parameters. Findings The process depicted in the paper is followed for a contemporary helicopter and su...","publisher":"Emerald","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"International Journal of Quality \u0026 Reliability Management"},"translated_abstract":"Purpose The modern helicopters are designed with maximum serviceability and long life expectancy to ensure minimum life cycle cost. The purpose of this paper is to present a framework to incorporate the customer requirements on reliability and maintainability (R\u0026M) parameters into the design and development phase of a contemporary helicopter, and to discuss the way to capture operational data to establish and improve the R\u0026M parameters to reduce life cycle cost. Design/methodology/approach From the analysis, it is established that the reliability and maintainability cost is the major contributor to the life cost. The significant reliability and maintainability parameters which influence R\u0026M cost are identified from analysis. The operational and design data of a contemporary helicopter are collected, compiled and analyzed to establish and improve the reliability and maintainability parameters. Findings The process depicted in the paper is followed for a contemporary helicopter and su...","internal_url":"https://www.academia.edu/78796333/Reduction_of_life_cycle_costs_for_a_contemporary_helicopter_through_improvement_of_reliability_and_maintainability_parameters","translated_internal_url":"","created_at":"2022-05-08T19:18:23.571-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Reduction_of_life_cycle_costs_for_a_contemporary_helicopter_through_improvement_of_reliability_and_maintainability_parameters","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":73149,"name":"Business and Management","url":"https://www.academia.edu/Documents/in/Business_and_Management"}],"urls":[{"id":20339060,"url":"https://www.emeraldinsight.com/doi/full-xml/10.1108/IJQRM-11-2016-0199"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796332"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796332/Decision_support_system_for_safety_improvement_An_approach_using_multiple_correspondence_analysis_t_SNE_algorithm_and_K_means_clustering"><img alt="Research paper thumbnail of Decision support system for safety improvement: An approach using multiple correspondence analysis, t-SNE algorithm and K-means clustering" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796332/Decision_support_system_for_safety_improvement_An_approach_using_multiple_correspondence_analysis_t_SNE_algorithm_and_K_means_clustering">Decision support system for safety improvement: An approach using multiple correspondence analysis, t-SNE algorithm and K-means clustering</a></div><div class="wp-workCard_item"><span>Computers &amp; Industrial Engineering</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract An attempt has been made to develop a decision support system (DSS) for safety improveme...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract An attempt has been made to develop a decision support system (DSS) for safety improvement using a multi-step knowledge discovery process involving multiple correspondence analysis (MCA), t-SNE algorithm and K-means clustering. MCA is used for dimension reduction and perceptual mapping from categorical data. Usually, the first two dimensions are used for perceptual mapping if these two dimensions explain a significant percentage of variance. Otherwise, the traditional method of two dimensional mapping, leads to loss of important categorical information involved with other dimensions. Considering the above, a novel R2-profile approach, as an alternate to inertia based approach, is adopted to obtain the desired number of dimensions to be retained without loss of significant amount of information. t-SNE technique reduces the high dimensional data into two dimensional (2D) map, which provides the associations amongst different categories. K-means clustering grouped the 2D categories in homogenous clusters as per the similarities of the categories. A novel kernel category based chi-square distance method is proposed to identify sub-clusters within a cluster which subsequently provides useful rules for safety improvement. The methodology also provides a logical approach of dimension reduction in a form called ‘funnel diagram’. Finally, the DSS is applied to analysing near miss incidents occurred in electric overhead traveling (EOT) crane operations in a steel plant. Several safety rules are identified and safety interventions are proposed.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796332"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796332"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796332; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796332]").text(description); $(".js-view-count[data-work-id=78796332]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796332; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796332']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796332, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796332]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796332,"title":"Decision support system for safety improvement: An approach using multiple correspondence analysis, t-SNE algorithm and K-means clustering","translated_title":"","metadata":{"abstract":"Abstract An attempt has been made to develop a decision support system (DSS) for safety improvement using a multi-step knowledge discovery process involving multiple correspondence analysis (MCA), t-SNE algorithm and K-means clustering. MCA is used for dimension reduction and perceptual mapping from categorical data. Usually, the first two dimensions are used for perceptual mapping if these two dimensions explain a significant percentage of variance. Otherwise, the traditional method of two dimensional mapping, leads to loss of important categorical information involved with other dimensions. Considering the above, a novel R2-profile approach, as an alternate to inertia based approach, is adopted to obtain the desired number of dimensions to be retained without loss of significant amount of information. t-SNE technique reduces the high dimensional data into two dimensional (2D) map, which provides the associations amongst different categories. K-means clustering grouped the 2D categories in homogenous clusters as per the similarities of the categories. A novel kernel category based chi-square distance method is proposed to identify sub-clusters within a cluster which subsequently provides useful rules for safety improvement. The methodology also provides a logical approach of dimension reduction in a form called ‘funnel diagram’. Finally, the DSS is applied to analysing near miss incidents occurred in electric overhead traveling (EOT) crane operations in a steel plant. Several safety rules are identified and safety interventions are proposed.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Computers \u0026 Industrial Engineering"},"translated_abstract":"Abstract An attempt has been made to develop a decision support system (DSS) for safety improvement using a multi-step knowledge discovery process involving multiple correspondence analysis (MCA), t-SNE algorithm and K-means clustering. MCA is used for dimension reduction and perceptual mapping from categorical data. Usually, the first two dimensions are used for perceptual mapping if these two dimensions explain a significant percentage of variance. Otherwise, the traditional method of two dimensional mapping, leads to loss of important categorical information involved with other dimensions. Considering the above, a novel R2-profile approach, as an alternate to inertia based approach, is adopted to obtain the desired number of dimensions to be retained without loss of significant amount of information. t-SNE technique reduces the high dimensional data into two dimensional (2D) map, which provides the associations amongst different categories. K-means clustering grouped the 2D categories in homogenous clusters as per the similarities of the categories. A novel kernel category based chi-square distance method is proposed to identify sub-clusters within a cluster which subsequently provides useful rules for safety improvement. The methodology also provides a logical approach of dimension reduction in a form called ‘funnel diagram’. Finally, the DSS is applied to analysing near miss incidents occurred in electric overhead traveling (EOT) crane operations in a steel plant. Several safety rules are identified and safety interventions are proposed.","internal_url":"https://www.academia.edu/78796332/Decision_support_system_for_safety_improvement_An_approach_using_multiple_correspondence_analysis_t_SNE_algorithm_and_K_means_clustering","translated_internal_url":"","created_at":"2022-05-08T19:18:23.446-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Decision_support_system_for_safety_improvement_An_approach_using_multiple_correspondence_analysis_t_SNE_algorithm_and_K_means_clustering","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"},{"id":131237,"name":"Cluster Analysis","url":"https://www.academia.edu/Documents/in/Cluster_Analysis"}],"urls":[{"id":20339059,"url":"https://api.elsevier.com/content/article/PII:S0360835218306478?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796331"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796331/Text_document_clustering_based_cause_and_effect_analysis_methodology_for_steel_plant_incident_data"><img alt="Research paper thumbnail of Text-document clustering-based cause and effect analysis methodology for steel plant incident data" class="work-thumbnail" src="https://attachments.academia-assets.com/85714991/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796331/Text_document_clustering_based_cause_and_effect_analysis_methodology_for_steel_plant_incident_data">Text-document clustering-based cause and effect analysis methodology for steel plant incident data</a></div><div class="wp-workCard_item"><span>International Journal of Injury Control and Safety Promotion</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="63ec93110bc1b7b979fe00d318fa1b3e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714991,&quot;asset_id&quot;:78796331,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714991/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796331"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796331"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796331; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796331]").text(description); $(".js-view-count[data-work-id=78796331]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796331; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796331']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796331, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "63ec93110bc1b7b979fe00d318fa1b3e" } } $('.js-work-strip[data-work-id=78796331]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796331,"title":"Text-document clustering-based cause and effect analysis methodology for steel plant incident data","translated_title":"","metadata":{"publisher":"Informa UK Limited","grobid_abstract":"The purpose of this study is to develop a text clustering-based cause and effect analysis methodology for incident data to unfold the root causes behind the incidents. A cause-effect diagram is usually prepared by using experts' knowledge which may fail to capture all the causes present at a workplace. On the other hand, the description of incidents provided by the workers in the form of incident reports is typically a rich data source and can be utilized to explore the causes and sub-causes of incidents. In this study, data were collected from an integrated steel plant. The text data were analysed using singular value decomposition (SVD) and expectation-maximization (EM) algorithm. Results suggest that text-document clustering can be used as a feasible method for exploring the hidden factors and trends from the description of incidents occurred at workplaces. The study also helped in finding out the anomaly in incident reporting.","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"International Journal of Injury Control and Safety Promotion","grobid_abstract_attachment_id":85714991},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796331/Text_document_clustering_based_cause_and_effect_analysis_methodology_for_steel_plant_incident_data","translated_internal_url":"","created_at":"2022-05-08T19:18:23.327-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714991,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714991/thumbnails/1.jpg","file_name":"17457300.2018.145646820220509-1-yy5qy2.pdf","download_url":"https://www.academia.edu/attachments/85714991/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Text_document_clustering_based_cause_and.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714991/17457300.2018.145646820220509-1-yy5qy2-libre.pdf?1652063453=\u0026response-content-disposition=attachment%3B+filename%3DText_document_clustering_based_cause_and.pdf\u0026Expires=1732835577\u0026Signature=TaHHo-Tc-uh0cnxbpOp5W7PUH5WlDCUDJRZd0cJdExeTyq2uzOF-jDNyNLkDq6Ikz7j630ZRWt6LIyN~Ik80RMV~cNQRg4kEJ4eZp79K5SjLSe4llLArzQpx2gE0vMIIdck96bl-m-WxQTIEigll5Rc7ZHkwJcWQGtXQwq3jRIb3TF-Un5po4oMjU8fwGgE~BI7Fsnt~GFvtjS5RCjD0NyfhQglI82K2wOIJK1y4aarAVpyA8xhngn37FSbJTU1458F3ONu6XYpz7VrF~ZSqSQcgaPRXEzCG3XfgFyoGDe~g8FwwiLPWamrxjJ2HL3m3AgO2rV3Eri3PmdqLGpzcgw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Text_document_clustering_based_cause_and_effect_analysis_methodology_for_steel_plant_incident_data","translated_slug":"","page_count":12,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714991,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714991/thumbnails/1.jpg","file_name":"17457300.2018.145646820220509-1-yy5qy2.pdf","download_url":"https://www.academia.edu/attachments/85714991/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Text_document_clustering_based_cause_and.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714991/17457300.2018.145646820220509-1-yy5qy2-libre.pdf?1652063453=\u0026response-content-disposition=attachment%3B+filename%3DText_document_clustering_based_cause_and.pdf\u0026Expires=1732835577\u0026Signature=TaHHo-Tc-uh0cnxbpOp5W7PUH5WlDCUDJRZd0cJdExeTyq2uzOF-jDNyNLkDq6Ikz7j630ZRWt6LIyN~Ik80RMV~cNQRg4kEJ4eZp79K5SjLSe4llLArzQpx2gE0vMIIdck96bl-m-WxQTIEigll5Rc7ZHkwJcWQGtXQwq3jRIb3TF-Un5po4oMjU8fwGgE~BI7Fsnt~GFvtjS5RCjD0NyfhQglI82K2wOIJK1y4aarAVpyA8xhngn37FSbJTU1458F3ONu6XYpz7VrF~ZSqSQcgaPRXEzCG3XfgFyoGDe~g8FwwiLPWamrxjJ2HL3m3AgO2rV3Eri3PmdqLGpzcgw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":131237,"name":"Cluster Analysis","url":"https://www.academia.edu/Documents/in/Cluster_Analysis"},{"id":410370,"name":"Public health systems and services research","url":"https://www.academia.edu/Documents/in/Public_health_systems_and_services_research-1"}],"urls":[{"id":20339058,"url":"https://www.tandfonline.com/doi/pdf/10.1080/17457300.2018.1456468"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796330"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796330/An_Application_of_Logit_Model_to_Injury_Experience_Data"><img alt="Research paper thumbnail of An Application of Logit Model to Injury Experience Data" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796330/An_Application_of_Logit_Model_to_Injury_Experience_Data">An Application of Logit Model to Injury Experience Data</a></div><div class="wp-workCard_item"><span>Mineral Resources Engineering</span><span>, 1999</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The influence of various casual factors on the severity of injury was examined using the 4-year i...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The influence of various casual factors on the severity of injury was examined using the 4-year injury data from a group of underground coal mines. Although there are many factors that could affect the injury severity: miners&amp;#39; age, experience, occupation, injury-location, shift-time and specific-mine were chosen as the affecting variables. The logit model was applied for this analysis. The bivariate analysis was conducted to separately study the effect of each of the factors on the severity of injury and to estimate the odds of severe injuries. For the case study mines, it was concluded that the injury severity varies by age, occupation, injury-location, shift-time and specific-mine. However, experience in general does not have any significant effect on it.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796330"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796330"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796330; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796330]").text(description); $(".js-view-count[data-work-id=78796330]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796330; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796330']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796330, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796330]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796330,"title":"An Application of Logit Model to Injury Experience Data","translated_title":"","metadata":{"abstract":"The influence of various casual factors on the severity of injury was examined using the 4-year injury data from a group of underground coal mines. Although there are many factors that could affect the injury severity: miners\u0026#39; age, experience, occupation, injury-location, shift-time and specific-mine were chosen as the affecting variables. The logit model was applied for this analysis. The bivariate analysis was conducted to separately study the effect of each of the factors on the severity of injury and to estimate the odds of severe injuries. For the case study mines, it was concluded that the injury severity varies by age, occupation, injury-location, shift-time and specific-mine. However, experience in general does not have any significant effect on it.","publisher":"World Scientific Pub Co Pte Lt","publication_date":{"day":null,"month":null,"year":1999,"errors":{}},"publication_name":"Mineral Resources Engineering"},"translated_abstract":"The influence of various casual factors on the severity of injury was examined using the 4-year injury data from a group of underground coal mines. Although there are many factors that could affect the injury severity: miners\u0026#39; age, experience, occupation, injury-location, shift-time and specific-mine were chosen as the affecting variables. The logit model was applied for this analysis. The bivariate analysis was conducted to separately study the effect of each of the factors on the severity of injury and to estimate the odds of severe injuries. For the case study mines, it was concluded that the injury severity varies by age, occupation, injury-location, shift-time and specific-mine. However, experience in general does not have any significant effect on it.","internal_url":"https://www.academia.edu/78796330/An_Application_of_Logit_Model_to_Injury_Experience_Data","translated_internal_url":"","created_at":"2022-05-08T19:18:23.210-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"An_Application_of_Logit_Model_to_Injury_Experience_Data","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":146671,"name":"Mineral Resources","url":"https://www.academia.edu/Documents/in/Mineral_Resources"}],"urls":[{"id":20339057,"url":"http://www.worldscientific.com/doi/pdf/10.1142/S0950609899000244"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796329"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796329/Segmented_point_process_models_for_work_system_safety_analysis"><img alt="Research paper thumbnail of Segmented point process models for work system safety analysis" class="work-thumbnail" src="https://attachments.academia-assets.com/85714988/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796329/Segmented_point_process_models_for_work_system_safety_analysis">Segmented point process models for work system safety analysis</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2017</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e1befc2d40b59a11d64a6f76400894ec" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714988,&quot;asset_id&quot;:78796329,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714988/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796329"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796329"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796329; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796329]").text(description); $(".js-view-count[data-work-id=78796329]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796329; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796329']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796329, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e1befc2d40b59a11d64a6f76400894ec" } } $('.js-work-strip[data-work-id=78796329]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796329,"title":"Segmented point process models for work system safety analysis","translated_title":"","metadata":{"publisher":"Elsevier BV","grobid_abstract":"This study proposes a new scheme for measurement of safety performance in work systems using segmented point process models that can capture the points of changes in the working conditions as well as changes in safety initiatives. Data, collected from an underground coal mine, were analyzed using homogeneous (HPP) as well as non-homogeneous (NHPP) point process models. Time between occurrences (TBO) and number of occurrences (NOC) were modeled followed by the development of loss functions. The methodology can be used to monitor safety performance and to check safety program effectiveness. The findings of the case study application showed that the injury occurrences data fit the models for (i) 'all incidents' and 'first aid' cases with one change point at 458 days, (ii) 'near-miss' case with one change point at 441 days, and (iii) 'minor' injury case with two-change points at 11 days and 375 days, respectively.","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Safety Science","grobid_abstract_attachment_id":85714988},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796329/Segmented_point_process_models_for_work_system_safety_analysis","translated_internal_url":"","created_at":"2022-05-08T19:18:23.042-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714988,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714988/thumbnails/1.jpg","file_name":"108391.pdf","download_url":"https://www.academia.edu/attachments/85714988/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Segmented_point_process_models_for_work.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714988/108391-libre.pdf?1652063443=\u0026response-content-disposition=attachment%3B+filename%3DSegmented_point_process_models_for_work.pdf\u0026Expires=1732835577\u0026Signature=L-A~zYX8bdcVQBQNwly9zfnZ~OAdoOMGvuy0icCczSOpfeAB-Z8k7jqZODGyqL7wyFRWjym2KTagMFlCcxnT6IR17JIPwqJOVWSZpJkOBZD0yAuXxs74vJOZcp~siiCc4y8KwzrzTB~x4nSpLNOlsxfu72MpRyR6um1QSzhXy8vNowZ9rNXHDA0Jknml7kWvoTBmRVOfEWtWqneXtiCEyFoCw6~uwHwp9jENl7~lPFH5fWE6WGWFvM6uAxPm~b89B7Q8TX1Wq93Udsh337xEF0EfHcRrmCSisor9uQGWWqRlnj7hnkTNWRxwevkWDuGHSji2XdB~7sGILEKY26H1Mg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Segmented_point_process_models_for_work_system_safety_analysis","translated_slug":"","page_count":3,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714988,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714988/thumbnails/1.jpg","file_name":"108391.pdf","download_url":"https://www.academia.edu/attachments/85714988/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&st=MTczMjgzMTk3Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Segmented_point_process_models_for_work.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714988/108391-libre.pdf?1652063443=\u0026response-content-disposition=attachment%3B+filename%3DSegmented_point_process_models_for_work.pdf\u0026Expires=1732835577\u0026Signature=L-A~zYX8bdcVQBQNwly9zfnZ~OAdoOMGvuy0icCczSOpfeAB-Z8k7jqZODGyqL7wyFRWjym2KTagMFlCcxnT6IR17JIPwqJOVWSZpJkOBZD0yAuXxs74vJOZcp~siiCc4y8KwzrzTB~x4nSpLNOlsxfu72MpRyR6um1QSzhXy8vNowZ9rNXHDA0Jknml7kWvoTBmRVOfEWtWqneXtiCEyFoCw6~uwHwp9jENl7~lPFH5fWE6WGWFvM6uAxPm~b89B7Q8TX1Wq93Udsh337xEF0EfHcRrmCSisor9uQGWWqRlnj7hnkTNWRxwevkWDuGHSji2XdB~7sGILEKY26H1Mg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":472306,"name":"Workplace health and safety","url":"https://www.academia.edu/Documents/in/Workplace_health_and_safety"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796328"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796328/Human_error_identification_and_risk_prioritization_in_overhead_crane_operations_using_HTA_SHERPA_and_fuzzy_VIKOR_method"><img alt="Research paper thumbnail of Human error identification and risk prioritization in overhead crane operations using HTA, SHERPA and fuzzy VIKOR method" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796328/Human_error_identification_and_risk_prioritization_in_overhead_crane_operations_using_HTA_SHERPA_and_fuzzy_VIKOR_method">Human error identification and risk prioritization in overhead crane operations using HTA, SHERPA and fuzzy VIKOR method</a></div><div class="wp-workCard_item"><span>Expert Systems with Applications</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT Human error identification and subsequent prioritization are the foremost tasks involved...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ABSTRACT Human error identification and subsequent prioritization are the foremost tasks involved in HRA. In this study a methodology is developed for performing these tasks with an application to overhead crane operations. The application of the present methodology will help to understand how the risk associated with the human errors propagates through different hierarchy levels. The methodology provides a framework for quantifying the risk of different human errors using the experts’ subjective opinions only. The incorporation of fuzzy VIKOR technique enables us develop a ranking mechanism for the failure modes where the individual constituent components are non-commensurable in nature. The developed ranking mechanism helps the decision makers in optimal allocation of safety critical resources, used for risk mitigation purposes.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796328"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796328"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796328; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796328]").text(description); $(".js-view-count[data-work-id=78796328]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796328; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796328']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796328, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796328]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796328,"title":"Human error identification and risk prioritization in overhead crane operations using HTA, SHERPA and fuzzy VIKOR method","translated_title":"","metadata":{"abstract":"ABSTRACT Human error identification and subsequent prioritization are the foremost tasks involved in HRA. In this study a methodology is developed for performing these tasks with an application to overhead crane operations. The application of the present methodology will help to understand how the risk associated with the human errors propagates through different hierarchy levels. The methodology provides a framework for quantifying the risk of different human errors using the experts’ subjective opinions only. The incorporation of fuzzy VIKOR technique enables us develop a ranking mechanism for the failure modes where the individual constituent components are non-commensurable in nature. The developed ranking mechanism helps the decision makers in optimal allocation of safety critical resources, used for risk mitigation purposes.","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"Expert Systems with Applications"},"translated_abstract":"ABSTRACT Human error identification and subsequent prioritization are the foremost tasks involved in HRA. In this study a methodology is developed for performing these tasks with an application to overhead crane operations. The application of the present methodology will help to understand how the risk associated with the human errors propagates through different hierarchy levels. The methodology provides a framework for quantifying the risk of different human errors using the experts’ subjective opinions only. The incorporation of fuzzy VIKOR technique enables us develop a ranking mechanism for the failure modes where the individual constituent components are non-commensurable in nature. The developed ranking mechanism helps the decision makers in optimal allocation of safety critical resources, used for risk mitigation purposes.","internal_url":"https://www.academia.edu/78796328/Human_error_identification_and_risk_prioritization_in_overhead_crane_operations_using_HTA_SHERPA_and_fuzzy_VIKOR_method","translated_internal_url":"","created_at":"2022-05-08T19:18:22.953-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Human_error_identification_and_risk_prioritization_in_overhead_crane_operations_using_HTA_SHERPA_and_fuzzy_VIKOR_method","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":51531,"name":"Pergamon","url":"https://www.academia.edu/Documents/in/Pergamon"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796327"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/78796327/Development_of_a_relative_risk_model_for_roof_and_side_fall_fatal_accidents_in_underground_coal_mines_in_India"><img alt="Research paper thumbnail of Development of a relative risk model for roof and side fall fatal accidents in underground coal mines in India" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/78796327/Development_of_a_relative_risk_model_for_roof_and_side_fall_fatal_accidents_in_underground_coal_mines_in_India">Development of a relative risk model for roof and side fall fatal accidents in underground coal mines in India</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2009</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">... The main reasons for roof and side fall accidents in Indian underground coal mines are well d...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">... The main reasons for roof and side fall accidents in Indian underground coal mines are well documented by Kejriwal (2002) based on his survey of accidents in Indian mines for the last 100 years. ... This retrospective study also confirms the findings of Kejriwal (2002). ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796327"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796327"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796327; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796327]").text(description); $(".js-view-count[data-work-id=78796327]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796327; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796327']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796327, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78796327]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796327,"title":"Development of a relative risk model for roof and side fall fatal accidents in underground coal mines in India","translated_title":"","metadata":{"abstract":"... The main reasons for roof and side fall accidents in Indian underground coal mines are well documented by Kejriwal (2002) based on his survey of accidents in Indian mines for the last 100 years. ... This retrospective study also confirms the findings of Kejriwal (2002). ...","publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2009,"errors":{}},"publication_name":"Safety Science"},"translated_abstract":"... The main reasons for roof and side fall accidents in Indian underground coal mines are well documented by Kejriwal (2002) based on his survey of accidents in Indian mines for the last 100 years. ... This retrospective study also confirms the findings of Kejriwal (2002). ...","internal_url":"https://www.academia.edu/78796327/Development_of_a_relative_risk_model_for_roof_and_side_fall_fatal_accidents_in_underground_coal_mines_in_India","translated_internal_url":"","created_at":"2022-05-08T19:18:22.871-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Development_of_a_relative_risk_model_for_roof_and_side_fall_fatal_accidents_in_underground_coal_mines_in_India","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":80317,"name":"Coal Mining","url":"https://www.academia.edu/Documents/in/Coal_Mining"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78796326"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78796326/Development_of_worksystem_safety_capability_index_WSCI_"><img alt="Research paper thumbnail of Development of worksystem safety capability index (WSCI)" class="work-thumbnail" src="https://attachments.academia-assets.com/85714986/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78796326/Development_of_worksystem_safety_capability_index_WSCI_">Development of worksystem safety capability index (WSCI)</a></div><div class="wp-workCard_item"><span>Safety Science</span><span>, 2010</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5003d5a6185c60c8932d56d2bc0c025b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85714986,&quot;asset_id&quot;:78796326,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85714986/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78796326"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78796326"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78796326; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78796326]").text(description); $(".js-view-count[data-work-id=78796326]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78796326; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78796326']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78796326, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5003d5a6185c60c8932d56d2bc0c025b" } } $('.js-work-strip[data-work-id=78796326]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78796326,"title":"Development of worksystem safety capability index (WSCI)","translated_title":"","metadata":{"publisher":"Elsevier BV","publication_date":{"day":null,"month":null,"year":2010,"errors":{}},"publication_name":"Safety Science"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78796326/Development_of_worksystem_safety_capability_index_WSCI_","translated_internal_url":"","created_at":"2022-05-08T19:18:22.786-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":163294954,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85714986,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714986/thumbnails/1.jpg","file_name":"j.ssci.2010.05.01020220509-1-oc76i3.pdf","download_url":"https://www.academia.edu/attachments/85714986/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Development_of_worksystem_safety_capabil.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714986/j.ssci.2010.05.01020220509-1-oc76i3-libre.pdf?1652063445=\u0026response-content-disposition=attachment%3B+filename%3DDevelopment_of_worksystem_safety_capabil.pdf\u0026Expires=1732835577\u0026Signature=TzW~DOM26HGMQH3VzlF~zM0xRQz2-7osPWSk7kRkmazc1JQlL86yJZlIcAMZv3D1JRozzXff3V6d-E~0E-wDhxK~YvVjqZBDwzhXXNpeqzPKtmj5rWMrDTp5qovpeO0f8GnPSws1G08Z9fnEcOaIqXMIC0T~SzJoQzIyhgqPZ5ag3CllMGFmiAYCg5Xt5nOWJdaIZy-2C1V0jbofcfwI7VPvz9fJxGxbsXmV9iLpbzquWoVsDtdPNi2t7J1nuy69-ytAKCPACzsm06UNnTWy1UJG23O5cX61XJ1toBEIH8XQYYaX2ybKuZI8mLx34Px7g5FSjfiTm9BHQP6JI35bzw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Development_of_worksystem_safety_capability_index_WSCI_","translated_slug":"","page_count":11,"language":"en","content_type":"Work","owner":{"id":163294954,"first_name":"J","middle_initials":null,"last_name":"Maiti","page_name":"MaitiJ","domain_name":"independent","created_at":"2020-07-10T04:46:00.412-07:00","display_name":"J Maiti","url":"https://independent.academia.edu/MaitiJ"},"attachments":[{"id":85714986,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85714986/thumbnails/1.jpg","file_name":"j.ssci.2010.05.01020220509-1-oc76i3.pdf","download_url":"https://www.academia.edu/attachments/85714986/download_file?st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&st=MTczMjgzMTk3OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Development_of_worksystem_safety_capabil.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85714986/j.ssci.2010.05.01020220509-1-oc76i3-libre.pdf?1652063445=\u0026response-content-disposition=attachment%3B+filename%3DDevelopment_of_worksystem_safety_capabil.pdf\u0026Expires=1732835577\u0026Signature=TzW~DOM26HGMQH3VzlF~zM0xRQz2-7osPWSk7kRkmazc1JQlL86yJZlIcAMZv3D1JRozzXff3V6d-E~0E-wDhxK~YvVjqZBDwzhXXNpeqzPKtmj5rWMrDTp5qovpeO0f8GnPSws1G08Z9fnEcOaIqXMIC0T~SzJoQzIyhgqPZ5ag3CllMGFmiAYCg5Xt5nOWJdaIZy-2C1V0jbofcfwI7VPvz9fJxGxbsXmV9iLpbzquWoVsDtdPNi2t7J1nuy69-ytAKCPACzsm06UNnTWy1UJG23O5cX61XJ1toBEIH8XQYYaX2ybKuZI8mLx34Px7g5FSjfiTm9BHQP6JI35bzw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":603594,"name":"Safety Science","url":"https://www.academia.edu/Documents/in/Safety_Science"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences"},{"id":3763225,"name":"Medical and Health Sciences","url":"https://www.academia.edu/Documents/in/Medical_and_Health_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "619ae7c1a624992bda90cca0ab4fae9659e0bc29ee0debf7c7e3ecb484816afe", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="L7imCXIyNothdzyJSizD721PcgW3QnfYmR0/jQmec60UAVhVtbJZcHbw451bA4WO/9nP1fbxHll1i3olphJwuA==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://independent.academia.edu/MaitiJ" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="wSsNqgEjWTR26rZ+x/Llcac7sXTXmwGS2oyso2tRvL76kvP2xqM2z2FtaWrW3aMQNa0MpJYoaBM2GukLxN2/qw==" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10