Search results for: cybersecurity strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3752

Search results for: cybersecurity strategy

3632 The Stability Analysis and New Torque Control Strategy of Direct-Driven PMSG Wind Turbines

Authors: Jun Liu, Feihang Zhou, Gungyi Wang

Abstract:

This paper expounds on the direct-driven PMSG wind power system control strategy, and analyses the stability conditions of the system. The direct-driven PMSG wind power system may generate the intense mechanical vibration, when wind speed changes dramatically. This paper proposes a new type of torque control strategy, which increases the system damping effectively, mitigates mechanical vibration of the system, and enhances the stability conditions of the system. The simulation results verify the reliability of the new torque control strategy.

Keywords: damping, direct-driven PMSG wind power system, mechanical vibration, torque control

Procedia PDF Downloads 308
3631 Information Technology and Occupational Safety and Health

Authors: Muhammad Afiq Anaqi Bin Baharudin, Muhammad Izamuddin Bin Mohd Nasir, Syarifuddin Bin Sujuanda, Muhammad Syahmi Rusyaidi Bin Sham Suddin, Danish Hakimi Bin Kamaruzaman, Muhammad Haqimi Nazim Bin Hasmanizam, Mohammad Akmal Zakwan Bin Amran, Muhammad Alparizi Bin Latif

Abstract:

By improving efficiency and production, information technology (IT) has transformed working environments, but it has also created new threats to occupational safety and health (OSH). This study evaluates the literature that has already been written on the subject of IT and OSH, identifies major findings and discussion points, and highlights gaps in the material that call for additional research. The study's findings, which look at how IT affects OSH in a sizable multinational organization, are also presented in the report. According to the report, IT poses a number of OSH problems, such as ergonomic dangers, eye strain, dangers related to cybersecurity, and psychological hazards. The report suggests using tactics like providing comfortable workstations, encouraging a healthy balance between work and life, and putting strong cybersecurity safeguards in place to reduce these dangers. The implications of these findings for OSH and IT are discussed in the paper's conclusion, and it emphasizes the need for more study and action to address these dangers and promote healthy and secure working environments in the age of digitization.

Keywords: information technology, occupational safety and health (OSH), ergonomic, hazards, workplace.

Procedia PDF Downloads 91
3630 Dialogue Journals as an EFL Learning Strategy in the Preparatory Year Program: Learners' Attitudes and Perceptions

Authors: Asma Alyahya

Abstract:

This study attempts to elicit the perceptions and attitudes of EFL learners of the Preparatory Year Program at KSU towards dialogue journal writing as an EFL learning strategy. The descriptive research design used incorporated both qualitative and quantitative instruments to accomplish the objectives of the study. A learners’ attitude questionnaire and follow-up interviews with learners from a randomly selected representative sample of the participants were employed. The participants were 55 female Saudi university students in the Preparatory Year Program at King Saud University. The analysis of the results indicated that the PYP learners had highly positive attitudes towards dialogue journal writing in their EFL classes and positive perceptions of the benefits of the use of dialogue journal writing as an EFL learning strategy. The results also revealed that dialogue journals are considered an effective EFL learning strategy since they fulfill various needs for both learners and instructors. Interestingly, the analysis of the results also revealed that Saudi university level students tend to write about personal topics in their dialogue journals more than academic ones.

Keywords: dialogue journals, EFL, learning strategy, writing

Procedia PDF Downloads 437
3629 Mental Contrasting with Implementation Intentions: A Metacognitive Strategy on Educational Context

Authors: Paula Paulino, Alzira Matias, Ana Margarida Veiga Simão

Abstract:

Self-regulated learning (SRL) directs students in analyzing proposed tasks, setting goals and designing plans to achieve those goals. The literature has suggested a metacognitive strategy for goal attainment known as Mental Contrasting with Implementation Intentions (MCII). This strategy involves Mental Contrasting (MC), in which a significant goal and an obstacle are identified, and Implementation Intentions (II), in which an "if... then…" plan is conceived and operationalized to overcome that obstacle. The present study proposes to assess the MCII process and whether it promotes students’ commitment towards learning goals during school tasks in sciences subjects. In this investigation, we intended to study the MCII strategy in a systemic context of the classroom. Fifty-six students from middle school and secondary education attending a public school in Lisbon (Portugal) participated in the study. The MCII strategy was explicitly taught in a procedure that included metacognitive modeling, guided practice and autonomous practice of strategy. A mental contrast between a goal they wanted to achieve and a possible obstacle to achieving that desire was instructed, and then the formulation of plans in order to overcome the obstacle identified previously. The preliminary results suggest that the MCII metacognitive strategy, applied to the school context, leads to more sophisticated reflections, the promotion of learning goals and the elaboration of more complex and specific self-regulated plans. Further, students achieve better results on school tests and worksheets after strategy practice. This study presents important implications since the MCII has been related to improved outcomes and increased attendance. Additionally, MCII seems to be an innovative process that captures students’ efforts to learn and enhances self-efficacy beliefs during learning tasks.

Keywords: implementation intentions, learning goals, mental contrasting, metacognitive strategy, self-regulated learning

Procedia PDF Downloads 206
3628 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 195
3627 Mapping the Potential and Development Strategy of Digital Economy in Indonesia

Authors: Jordan Putra Cahyono, Tiara Ayu Kusumaningtyas, Mohtar Rasyid

Abstract:

This article aims to map the potential and strategy of digital economy develop-ment in Indonesia by using literature study and secondary data analysis. In the Indonesian context, the digital economy is attracting attention, especially amid the COVID-19 pandemic, which has brought substantial changes in economic activi-ties. This research aims to provide new insights into the potential and develop-ment strategies of the digital economy in Indonesia. This article also evaluates the effectiveness and efficiency of digital economic development strategies imple-mented in Indonesia. A literature review concluded that Indonesia has great po-tential to develop the digital economy with favorable conditions, including a large population, improved ICT infrastructure, and relatively liberalized regulations. Using qualitative and quantitative approaches, this research covers the subject of the potential and strategies for developing a digital economy in Indonesia. This article presents the research results, which are then discussed in the context of the potential and strategy of digital economy development in Indonesia. This article is expected to contribute to understanding Indonesia's digital economy and stimulate further discussion to formulate a robust development strategy and appropriate regulatory framework.

Keywords: indonesia's digital economy, ICT infrastructure, development strategy, potential

Procedia PDF Downloads 33
3626 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 155
3625 Sliding Mode Control of Variable Speed Wind Energy Conversion Systems

Authors: Zine Souhila Rached, Mazari Benyounes Bouzid, Mohamed Amine, Allaoui Tayeb

Abstract:

Wind energy has many advantages, it does not pollute and it is an inexhaustible source. However, its high cost is a major constraint, especially on the less windy sites. The purpose of wind energy systems is to maximize energy efficiency, and extract maximum power from the wind speed. In other words, having a power coefficient is maximum and therefore the maximum power point tracking. In this case, the MPPT control becomes important.To realize this control, strategy conventional proportional and integral (PI) controller is usually used. However, this strategy cannot achieve better performance. This paper proposes a robust control of a turbine which optimizes its production, that is improve the quality and energy efficiency, namely, a strategy of sliding mode control. The proposed sliding mode control strategy presents attractive features such as robustness to parametric uncertainties of the turbine; the proposed sliding mode control approach has been simulated on three-blade wind turbine. The simulation result under Matlab\Simulink has validated the performance of the proposed MPPT strategy.

Keywords: wind turbine, maximum power point tracking, sliding mode, energy conversion systems

Procedia PDF Downloads 583
3624 Challenge of Net-Zero Carbon Construction and Measurement of Energy Consumption and Carbon Emission Reduction to Climate Change, Economy and Job Growths in Hong Kong and Australia

Authors: Kwok Tak Kit

Abstract:

Under the Paris Agreement 2015, the countries committed to address and combat the climate change and its negative impacts and agree to the target of reducing the global greenhouse gas (GHG) emission substantially by limiting the global temperature to 20C above the pre-industrial level in this century. A internationally Submit named “ 26th United Nations Climate Conference” (COP26) was held in Glasgow in 2021 with all committed countries agreed to the finalize the outstanding element in Paris Agreement and Glasgow Climate Pact to keep 1.50C. In this paper, we will focus on the basic approach of waste strategy, recycling policy, circular economy strategy, net-zero strategy and sustainability strategy and the importance of the elements which affect the carbon emission, waste generation and energy conservation will be further reviewed with recommendation for future study.

Keywords: net-zero carbon, climate change, carbon emission, energy consumption

Procedia PDF Downloads 159
3623 Weighted Data Replication Strategy for Data Grid Considering Economic Approach

Authors: N. Mansouri, A. Asadi

Abstract:

Data Grid is a geographically distributed environment that deals with data intensive application in scientific and enterprise computing. Data replication is a common method used to achieve efficient and fault-tolerant data access in Grids. In this paper, a dynamic data replication strategy, called Enhanced Latest Access Largest Weight (ELALW) is proposed. This strategy is an enhanced version of Latest Access Largest Weight strategy. However, replication should be used wisely because the storage capacity of each Grid site is limited. Thus, it is important to design an effective strategy for the replication replacement task. ELALW replaces replicas based on the number of requests in future, the size of the replica, and the number of copies of the file. It also improves access latency by selecting the best replica when various sites hold replicas. The proposed replica selection selects the best replica location from among the many replicas based on response time that can be determined by considering the data transfer time, the storage access latency, the replica requests that waiting in the storage queue and the distance between nodes. Simulation results utilizing the OptorSim show our replication strategy achieve better performance overall than other strategies in terms of job execution time, effective network usage and storage resource usage.

Keywords: data grid, data replication, simulation, replica selection, replica placement

Procedia PDF Downloads 237
3622 Analysis of Organizational Factors Effect on Performing Electronic Commerce Strategy: A Case Study of the Namakin Food Industry

Authors: Seyed Hamidreza Hejazi Dehghani, Neda Khounsari

Abstract:

Quick growth of electronic commerce in developed countries means that developing nations must change in their commerce strategies fundamentally. Most organizations are aware of the impact of the Internet and e-Commerce on the future of their firm, and thus, they have to focus on organizational factors that have an effect on the deployment of an e-Commerce strategy. In this situation, it is essential to identify organizational factors such as the organizational culture, human resources, size, structure and product/service that impact an e-commerce strategy. Accordingly, this research specifies the effects of organizational factors on applying an e-commerce strategy in the Namakin food industry. The statistical population of this research is 95 managers and employees. Cochran's formula is used for determination of the sample size that is 77 of the statistical population. Also, SPSS and Smart PLS software were utilized for analyzing the collected data. The results of hypothesis testing show that organizational factors have positive and significant effects of applying an e-Commerce strategy. On the other hand, sub-hypothesizes show that effectiveness of the organizational culture and size criteria were rejected and other sub-hypothesis were accepted.

Keywords: electronic commerce, organizational factors, attitude of managers, organizational readiness

Procedia PDF Downloads 253
3621 Analyzing Essential Patents of Mobile Communication Based on Patent Portfolio: Case Study of Long Term Evolution-Advanced

Authors: Kujhin Jeong, Sungjoo Lee

Abstract:

In the past, cross-licensing was made up of various application or commercial patents. Today, cross-licensing is restricted to essential patents, which has emphasized their importance significantly. Literature has shown that patent portfolio provides information for patent protection or strategy decision-making, but little empirical research has found strategic tool of essential patents. This paper will highlight four types of essential patent portfolio and analysis about each strategy in the field of LTE-A. Specifically we collected essential patents of mobile communication company through ETSI (European Telecommunication Standards Institute) and build-up portfolio activity, concentration, diversity, and quality. Using these portfolios, we can understand each company’s strategic character about the technology of LTE-A and comparison analysis of financial results. Essential patents portfolio displays a mobile communication company’s strategy and its strategy’s impact on the performance of a company.

Keywords: essential patent, portfolio, patent portfolio, essential patent portfolio

Procedia PDF Downloads 357
3620 The Effectiveness of Humanoid Diagram Teaching Strategy on Retention Rate of Novice Nurses in Taiwan

Authors: Yung-Hui Tang, Yan-Chiou Ku, Li-Chi Huang

Abstract:

Aim: The aim of this study is to explore the effect of the Humanoid Diagram Teaching (HDT) strategy on novice nurses’ care ability and retention rate. Methods: This study was a quasi-experimental study using two groups concurrently with repeat measurements sample consisted of 24 novice nurses (12 in each experimental and control group) in a medical center in southern Taiwan. Both groups all received regular training program (nursing standard techniques and practices, concept map, mini-CEX, CbD, and clinical education and training), and experimental group added the HDT program. The HDT strategy includes the contents of patients’ body humanoid drawing and discussion for 30 minutes each time, three times a week, and continually for four weeks. The effectiveness of HDT was evaluated by mini-CEX, CbD and clinical assessment and retention rate at the 3rd month and 6th month. Results: The novice nurses' care ability were examined, only CbD score in the control group was improved in the 3rd month and with statistical difference, p = .003. The mini-CEX and CbD in the experimental group were significantly improved in both the first and third month with statistical differences p = .00. Although mini-CEX and CbD in the experimental group were higher than the control group, but there was no significant difference p > .05. Retention rate of the experimental group in the third month and sixth month was significantly higher than the control group, and there was a statistically significant difference p < .05. Conclusions: The study reveals that HDT strategy can help novice nurses learning, enhancing their knowledge and technical capability, analytical skills in case-based caring, and retention. The HDT strategy can be served as an effective strategy for novice training for better nurse retention rate.

Keywords: humanoid diagram teaching strategy, novice nurses retention, teaching strategy of nurse retention, visual learning mode

Procedia PDF Downloads 147
3619 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network

Authors: Phillip Garrad, Saritha Unnikrishnan

Abstract:

The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.

Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing

Procedia PDF Downloads 82
3618 A Study on the Strategy for Domestic Space Industry Activation

Authors: Hangil Park, Hwayeon Song, Jingyung Sim

Abstract:

In this study, a business ecosystem of a domestic space industry is comprehensively analyzed to derive the influence factors. The priority level of each element as well as the disparity between the ideal and reality are investigated through a literature review and an expert survey. The three major influence factors determined are: (a) investment scale and approach, (b) propulsion system, and (c) industrialization with overseas expansion. Related issues based on the current status are evaluated, followed by a proposed activation strategy. This research's findings offer a direction for R&D budget allocation and law system maintenance for the activation of the domestic space industry.

Keywords: space industry, activation, strategy, business ecosystem

Procedia PDF Downloads 345
3617 Compensation Strategies and Their Effects on Employees' Motivation and Organizational Citizenship Behaviour in Some Manufacturing Companies in Lagos, Nigeria

Authors: Ade Oyedijo

Abstract:

This paper reports the findings of a study on the strategic and organizational antecedents and effects of two opposing pay patterns used by some manufacturing companies in Lagos Nigeria with particular reference to the behavioural correlates of the pay strategies considered. The assumed relationship between pay strategies and some organizational correlates such as business and corporate strategies and firm size was considered problematic in view of their likely implications for employee motivation and citizenship behaviour and firm performance. The survey research method was used for the study. Structured, close ended questions were used to collect primary data from the respondents. A multipart Likert scale was used to measure the pay orientations of the respondent firms and the job and organizational involvement of the respondent employees. Utilizing hierarchical linear regression method and "t-test" to analyze the data obtained from 48 manufacturing companies of various sizes and strategies, it was found that the dominant pattern of employee compensation in the sampled manufacturing companies. The study also revealed that the choice of a pay strategy was strongly influenced by organizational size as well as the type of business and corporate level strategies adopted by afirm. Firms pursuing a strategy of related and unrelated diversification are more likely to adopt the algorithmic compensation system than single product firms because of their relatively larger size and scope. However; firms that pursue a competitive advantage through a business level strategy of cost efficiency are more likely to use the experiential, variable pay strategy. The study found that an algorithmic compensation strategy is as effective as experiential compensation strategy in the promotion of organizational citizenship behaviour and motivation of employees.

Keywords: compensation, corporate strategy, business strategy, motivation, citizenship behaviour, algorithmic, experiential, organizational commitment, work environment

Procedia PDF Downloads 361
3616 The effect of Reflective Thinking on Iranian EFL Learners’ Language Learning Strategy Use, L2 Proficiency, and Beliefs about Second Language Learning and Teaching

Authors: Mohammad Hadi Mahmoodi, Mojtaba Farahani

Abstract:

The present study aimed at investigating whether reflective thinking differentiates Iranian EFL learners regarding language learning strategy use, beliefs about language learning and teaching, and L2 proficiency. To this end, the researcher adopted a mixed method approach. First, 94 EFL learners were asked to complete Reflective Thinking Questionnaire (Kember et al., 2000), Beliefs about Language Learning and Teaching Inventory (Horwitz, 1985), Strategy Inventory for Language Learning (Oxford, 1990), and Oxford Quick Placement Test. The results of three separate one-way ANOVAs indicated that reflective thinking significantly differentiates Iranian EFL learners concerning: (a)language learning strategy use, (b) beliefs about language learning and teaching, and (c) general language proficiency. Furthermore, to see where the differences lay, three separate post-hoc Tukey tests were run the results of which showed that learners with different levels of reflectivity (high, mid, and low) were significantly different from each other in all three dependent variables. Finally, to increase the validity of the findings thirty of the participants were interviewed and the results were analyzed through template organizing style method (Crabtree & Miller, 1999). The results of the interview analysis supported the results of quantitative data analysis.

Keywords: reflective thinking, language learning strategy use, beliefs toward language learning and teaching

Procedia PDF Downloads 632
3615 English Learning Strategy and Proficiency Level of the First Year Students, International College, Suan Sunandha Rajabhat University

Authors: Kanokrat Kunasaraphan

Abstract:

The purpose of the study was to identify whether English language learning strategies commonly used by the first year students at International College, Suan Sunandha Rajabhat University include six direct and indirect strategies. The study served to explore whether there was a difference in these students’ use of six direct and indirect English learning strategies between the different levels of their English proficiency. The questionnaire used as a research instrument was comprised of two parts: General information of participants and the Strategy Inventory for Language Learning (SILL). The researcher employed descriptive statistics and one-way ANOVA (F-test) to analyze the data. The results of the analysis revealed that English learning strategies commonly used by the first year students include six direct and indirect strategies, including differences in strategy use of the students with different levels of English proficiency. Recommendations for future research include the study of language learning strategy use with other research methods focusing on other languages, specific language skills, and/or the relationship of language learning strategy use and other factors in other programs and/or institutions.

Keywords: English learning strategies, direct strategies, indirect strategies, proficiency level

Procedia PDF Downloads 287
3614 Open Innovation Strategy (OIS) Paradigm and an OIS Capabilities Model

Authors: Anastasis D. Petrou

Abstract:

Innovation and strategy discussions do highlight open innovation as a new paradigm in business. Yet, a number of stumbling blocks in the form of closed innovation principles weaved into the fabric of a traditional business model stand in the way of the new paradigm’s momentum to increase value in various business contexts. The paper argues that businesses considering an engagement with the open innovation paradigm would need to take steps to improve their multiplicative, absorptive and relational capabilities, respectively. The needed improvements would amount to a business model evolutionary transformation and eventually bring about a paradigm overhaul in business. The transformation is worth staging over time to ensure that open innovation is developed across interconnected and partnered areas of strategic importance. This article develops an open innovation strategy (OIS) capabilities model, and employs examples from different industries to briefly discuss OIS’s potential to augment business value in a number of suggested areas for future research.

Keywords: close innovation, open innovation paradigm, open innovation strategy (OIS) paradigm, OIS capabilities model, multiplicative capability, absorptive capability, relational capability

Procedia PDF Downloads 488
3613 Effect of the Keyword Strategy on Lexical Semantic Acquisition: Recognition, Retention and Comprehension in an English as Second Language Context

Authors: Fatima Muhammad Shitu

Abstract:

This study seeks to investigate the effect of the keyword strategy on lexico–semantic acquisition, recognition, retention and comprehension in an ESL context. The aim of the study is to determine whether the keyword strategy can be used to enhance acquisition. As a quasi- experimental research, the objectives of the study include: To determine the extent to which the scores obtained by the subjects, who were trained on the use of the keyword strategy for acquisition, differ at the pre-tests and the post–tests and also to find out the relationship in the scores obtained at these tests levels. The sample for the study consists of 300 hundred undergraduate ESL Students in the Federal College of Education, Kano. The seventy-five lexical items for acquisition belong to the lexical field category known as register, and they include Medical, Agriculture and Photography registers (MAP). These were divided in the ratio twenty-five (25) lexical items in each lexical field. The testing technique was used to collect the data while the descriptive and inferential statistics were employed for data analysis. For the purpose of testing, the two kinds of tests administered at each test level include the WARRT (Word Acquisition, Recognition, and Retention Test) and the CCPT (Cloze Comprehension Passage Test). The results of the study revealed that there are significant differences in the scores obtained between the pre-tests, and the post–tests and there are no correlations in the scores obtained as well. This implies that the keyword strategy has effectively enhanced the acquisition of the lexical items studied.

Keywords: keyword, lexical, semantics, strategy

Procedia PDF Downloads 288
3612 Developing a Model of Teaching Writing Based On Reading Approach through Reflection Strategy for EFL Students of STKIP YPUP

Authors: Eny Syatriana, Ardiansyah

Abstract:

The purpose of recent study was to develop a learning model on writing, based on the reading texts which will be read by the students using reflection strategy. The strategy would allow the students to read the text and then they would write back the main idea and to develop the text by using their own sentences. So, the writing practice was begun by reading an interesting text, then the students would develop the text which has been read into their writing. The problem questions are (1) what kind of learning model that can develop the students writing ability? (2) what is the achievement of the students of STKIP YPUP through reflection strategy? (3) is the using of the strategy effective to develop students competence In writing? (4) in what level are the students interest toward the using of a strategy In writing subject? This development research consisted of some steps, they are (1) need analysis (2) model design (3) implementation (4) model evaluation. The need analysis was applied through discussion among the writing lecturers to create a learning model for writing subject. To see the effectiveness of the model, an experiment would be delivered for one class. The instrument and learning material would be validated by the experts. In every steps of material development, there was a learning process, where would be validated by an expert. The research used development design. These Principles and procedures or research design and development .This study, researcher would do need analysis, creating prototype, content validation, and limited empiric experiment to the sample. In each steps, there should be an assessment and revision to the drafts before continue to the next steps. The second year, the prototype would be tested empirically to four classes in STKIP YPUP for English department. Implementing the test greatly was done through the action research and followed by evaluation and validation from the experts.

Keywords: learning model, reflection, strategy, reading, writing, development

Procedia PDF Downloads 345
3611 A Priori, Transcendental and Naturalistic Argument: Three Defense Strategies for Realism

Authors: SanXi Wu

Abstract:

A priori argument is a kind of reductio ad absurdum provided by Colin McGinn on the premise of accepting the basic rules of Dummett. The core part of the theory is to analyze the three joint positions besides realism and make them invalid, thus proving the rationality of the stance of realism. However, this argument strategy is vulnerable to skepticism because it delays the skeptical problem. In addition to McGinn, John Searle offers a linguistic transcendental argument strategy, which regards realism as the comprehensible condition that all normal activities of understanding must assume, while skepticism does not enjoy the same status. However, Searle's transcendental argument does not solve the problem of the relationship between realist presupposition and representational presupposition. Strawson, Hume, Reid, Wittgenstein, and others provide a naturalistic argument for realism. In this argument, realism is either a priori commitment from nature, or our second nature, or even a background belief that is fundamentally immovable. The key to this argument is to provide a quietistic treatment that ultimately invalidates our anti-realist myths. In comparison, the naturalistic argument is a more promising one. In this paper, methods of theoretical analysis and comparative research are used in order to demonstrate that in the face of skepticism, McGinn's a priori strategy and Searle's transcendental strategy are untenable, while Strawson and others' naturalistic strategy may resist the pressure of skepticism and make realism possible.

Keywords: a priori argument, transcendental argument, naturalism, realism, skepticism

Procedia PDF Downloads 21
3610 Ownership and Shareholder Schemes Effects on Airport Corporate Strategy in Europe

Authors: Dimitrios Dimitriou, Maria Sartzetaki

Abstract:

In the early days of the of civil aviation, airports are totally state-owned companies under the control of national authorities or regional governmental bodies. From that time the picture has totally changed and airports privatisation and airport business commercialisation are key success factors to stimulate air transport demand, generate revenues and attract investors, linked to reliable and resilience of air transport system. Nowadays, airport's corporate strategy deals with policies and actions, affecting essential the business plans, the financial targets and the economic footprint in a regional economy they serving. Therefore, exploring airport corporate strategy is essential to support the decision in business planning, management efficiency, sustainable development and investment attractiveness on one hand; and define policies towards traffic development, revenues generation, capacity expansion, cost efficiency and corporate social responsibility. This paper explores key outputs in airport corporate strategy for different ownership schemes. The airport corporations are grouped in three major schemes: (a) Public, in which the public airport operator acts as part of the government administration or as a corporised public operator; (b) Mixed scheme, in which the majority of the shares and the corporate strategy is driven by the private or the public sector; and (c) Private, in which the airport strategy is driven by the key aspects of globalisation and liberalisation of the aviation sector. By a systemic approach, the key drivers in corporate strategy for modern airport business structures are defined. Key objectives are to define the key strategic opportunities and challenges and assess the corporate goals and risks towards sustainable business development for each scheme. The analysis based on an extensive cross-sectional dataset for a sample of busy European airports providing results on corporate strategy key priorities, risks and business models. The conventional wisdom is to highlight key messages to authorities, institutes and professionals on airport corporate strategy trends and directions.

Keywords: airport corporate strategy, airport ownership, airports business models, corporate risks

Procedia PDF Downloads 283
3609 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 102
3608 Creeping Control Strategy for Direct Shift Gearbox Based on the Investigation of Temperature Variation of the Wet Clutch

Authors: Biao Ma, Jikai Liu, Man Chen, Jianpeng Wu, Liyong Wang, Changsong Zheng

Abstract:

Proposing an appropriate control strategy is an effective and practical way to address the overheat problems of the wet multi-plate clutch in Direct Shift Gearbox under the long-time creeping condition. To do so, the temperature variation of the wet multi-plate clutch is investigated firstly by establishing a thermal resistance model for the gearbox cooling system. To calculate the generated heat flux and predict the clutch temperature precisely, the friction torque model is optimized by introducing an improved friction coefficient, which is related to the pressure, the relative speed and the temperature. After that, the heat transfer model and the reasonable friction torque model are employed by the vehicle powertrain model to construct a comprehensive co-simulation model for the Direct Shift Gearbox (DSG) vehicle. A creeping control strategy is then proposed and, to evaluate the vehicle performance, the safety temperature (250 ℃) is particularly adopted as an important metric. During the creeping process, the temperature of two clutches is always under the safety value (250 ℃), which demonstrates the effectiveness of the proposed control strategy in avoiding the thermal failures of clutches.

Keywords: creeping control strategy, direct shift gearbox, temperature variation, wet clutch

Procedia PDF Downloads 103
3607 Simulation of Obstacle Avoidance for Multiple Autonomous Vehicles in a Dynamic Environment Using Q-Learning

Authors: Andreas D. Jansson

Abstract:

The availability of inexpensive, yet competent hardware allows for increased level of automation and self-optimization in the context of Industry 4.0. However, such agents require high quality information about their surroundings along with a robust strategy for collision avoidance, as they may cause expensive damage to equipment or other agents otherwise. Manually defining a strategy to cover all possibilities is both time-consuming and counter-productive given the capabilities of modern hardware. This paper explores the idea of a model-free self-optimizing obstacle avoidance strategy for multiple autonomous agents in a simulated dynamic environment using the Q-learning algorithm.

Keywords: autonomous vehicles, industry 4.0, multi-agent system, obstacle avoidance, Q-learning, simulation

Procedia PDF Downloads 113
3606 A Comparative Study of Language Learning Strategy Use of Iranian Kurdish Bilingual and Persian Monolingual in EFL Context

Authors: Reza Khani, Ziba Hosseini

Abstract:

This study was an attempt to investigate the difference between learners of Iranian Kurdish–Persian bilingual language and Persian monolinguals, regarding language strategy use (LLS). The participants of the study were 120 monolingual Persian and 120 bilingual Kurdish studying English as a foreign language (EFL). Data were collected using strategy inventory for language learning SILL. The results show bilingual reported higher use of language learning strategies in all categories of SILL except memory strategies.

Keywords: language learning, memory, monolingual, comparative study

Procedia PDF Downloads 375
3605 Religious Tourism the Core Strategy of Shaping Life Style: Evidences from Iran

Authors: Mostafa Jafari

Abstract:

Religious tourism is the core strategy of shaping Iranian's life-style. Why and How? This paper answers to this question. Theoretical base: From strategic marketing point of view, Life style is pattern of believes values, interests and acts. Strategy can be defined as a set of continuous important decisions. Here, strategy is making decisions about the target place and vehicle of touristic travel due to reform and redefine the self-identity and shaping life style. Methodology: Target society of this research is the selected residents of three provinces at northwest of Iran. The data collection instrument is interview and questionnaire and the collected data analysis by SEM (structural Equation Modeling) and LISREL software. Results: The primary results show that variety of touristic travels play an important role on shaping new life style of Iranian people. The target places of touristic travel (Europe, USA. Japan and etc.) are at the second priority. The number of foreign friends is at the third position. The fourth criteria are the number of travels. Among all kind of touristic travels the religious tourism from competitive point of view plays the main role. Findings: The geometry of Iranian life style are shaping and reshaping through some domestic and international tourism strategies particular religious strategy. During the dynamic trend of identity redefine, so many Iranians put the quantity and quality of their touristic travel on the first priority.

Keywords: religious tourism, core strategy, shaping life style

Procedia PDF Downloads 388
3604 Exploring the Contribution of Dynamic Capabilities to a Firm's Value Creation: The Role of Competitive Strategy

Authors: Mona Rashidirad, Hamid Salimian

Abstract:

Dynamic capabilities, as the most considerable capabilities of firms in the current fast-moving economy may not be sufficient for performance improvement, but their contribution to performance is undeniable. While much of the extant literature investigates the impact of dynamic capabilities on organisational performance, little attention has been devoted to understand whether and how dynamic capabilities create value. Dynamic capabilities as the mirror of competitive strategies should enable firms to search and seize new ideas, integrate and coordinate the firm’s resources and capabilities in order to create value. A careful investigation to the existing knowledge base remains us puzzled regarding the relationship among competitive strategies, dynamic capabilities and value creation. This study thus attempts to fill in this gap by empirically investigating the impact of dynamic capabilities on value creation and the mediating impact of competitive strategy on this relationship. We aim to contribute to dynamic capability view (DCV), in both theoretical and empirical senses, by exploring the impact of dynamic capabilities on firms’ value creation and whether competitive strategy can play any role in strengthening/weakening this relationship. Using a sample of 491 firms in the UK telecommunications market, the results demonstrate that dynamic sensing, learning, integrating and coordinating capabilities play a significant role in firm’s value creation, and competitive strategy mediates the impact of dynamic capabilities on value creation. Adopting DCV, this study investigates whether the value generating from dynamic capabilities depends on firms’ competitive strategy. This study argues a firm’s competitive strategy can mediate its ability to derive value from its dynamic capabilities and it explains the extent a firm’s competitive strategy may influence its value generation. The results of the dynamic capabilities-value relationships support our expectations and justify the non-financial value added of the four dynamic capability processes in a highly turbulent market, such as UK telecommunications. Our analytical findings of the relationship among dynamic capabilities, competitive strategy and value creation provide further evidence of the undeniable role of competitive strategy in deriving value from dynamic capabilities. The results reinforce the argument for the need to consider the mediating impact of organisational contextual factors, such as firm’s competitive strategy to examine how they interact with dynamic capabilities to deliver value. The findings of this study provide significant contributions to theory. Unlike some previous studies which conceptualise dynamic capabilities as a unidimensional construct, this study demonstrates the benefits of understanding the details of the link among the four types of dynamic capabilities, competitive strategy and value creation. In terms of contributions to managerial practices, this research draws attention to the importance of competitive strategy in conjunction with development and deployment of dynamic capabilities to create value. Managers are now equipped with solid empirical evidence which explains why DCV has become essential to firms in today’s business world.

Keywords: dynamic capabilities, resource based theory, value creation, competitive strategy

Procedia PDF Downloads 221
3603 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 61