101 research outputs found

    VIETNAMESE ENGLISH-MAJORED STUDENTS’ USE OF LISTENING STRATEGIES

    Get PDF
    The crucial role of listening skill in language learning has been well acknowledged, yet attention to this skill remains modest. Numerous studies investigating learners’ listening performance have identified listening strategies as a key factor contributing to the success of effective listeners. This study, using a Likert-scale questionnaire, examined the listening strategies employed by 81 Vietnamese English-majored students, who were divided into two groups - effective and less effective listeners based on an IELTS proficiency test. Findings showed that listening strategies were used at a relatively high level with the metacognitive group employed most frequently compared to cognitive and socio-affective strategies. Lowering anxiety, predicting and planning, resourcing, repetition, and cooperation were found most commonly employed individual strategies. Although no significant differences were found between the groups’ use of the three overarching strategy categories, several discrepancies were identified concerning their use of individual strategies, which provides important implications for listening pedagogical adjustments in this particular context. Article visualizations

    Explainable Information Security: Development of a Construct and Instrument

    Get PDF
    Despite the increasing efforts to encourage information security (InfoSec) compliance, employees’ refusal to follow and adopt InfoSec remains a challenge for organisations. Advancements in the behavioural InfoSec field have recently highlighted the importance of developing usable and employeecentric InfoSec that can motivate InfoSec compliance more effectively. In this research, we conceptualise the theoretical structure for a new concept called explainable InfoSec and develop a research instrument for collecting data about this concept. Data was then collected from 724 office workers via an online survey. Exploratory and confirmatory factor analyses were performed to validate the theoretical structure of the explainable InfoSec construct, and we performed structural equation modelling to examine the construct’s impact on intention to comply with organisational InfoSec. The validated theoretical structure of explainable InfoSec consists of two dimensions, fairness and transparency, and the construct was found to positively influence compliance intention

    Digital Kaizen: An Approach for Conducting Large-Scale Digital Transformation Projects

    Get PDF
    While digital transformation creates opportunities across all industries, many businesses still do not know how to embark on this journey and hesitate to commit resources to such an unclear initiative. By using the interpretive case study method, this paper investigates how Digital Kaizen–a philosophy that focuses on making continuous digital improvements–could guide large-scale digital transformation activities in incremental steps. Our findings show that the adoption of Digital Kaizen has urged the investigated organization to continuously address cross-functional issues that are aligned with their strategic business goals, through implementing incremental digital changes that improve business processes and people engagement. Subsequently, these activities lead to sustainable and scalable digital transformation success that re-defines the organization’s value creation processes and identity. This research suggests a new strategy for conducting large-scale digital transformation, by integrating Kaizen philosophy into digital transformation practices

    Active Voltage Control (AVC) for Reducing Three-phase Voltage Fluctuations

    Get PDF
    The paper presents an active voltage compensator (AVC) to prevent voltage fluctuations on the load in both voltage’s rise and fall directions. This AVC is designed based on modeling a three-phase four-branch inverter according to the large-signal average model and the small-signal model—calculation and design of d-q channel controller and 0 channel controller by the frequency-domain method. This AVC significantly reduces production interruptions while protecting equipment life reduction. The theory results are proven through MATLAB/Simulink simulation

    Exploring Value Co-Destruction Process in Customer Interactions with AI-Powered Mobile Applications

    Get PDF
    Background: Mobile applications have emerged as important touchpoints for addressing service requests and optimizing human resources. Within the service industry, the integration of artificial intelligence (AI) into these applications has enabled the inference of product demand, provision of personalized service offers, and enhancement of overall firm value. Customers now engage with these apps to stay informed, seek guidance, and make purchases. It is important to recognize that the interactive and human-like qualities of AI can either foster the co-creation of value with customers or potentially lead to the co-destruction of customer value. Although prior research has examined the process of value co-creation, the present study aims to investigate the underlying factors contributing to the value co-destruction process, specifically within AI-powered mobile applications. Method: Our research employs topic modelling and content analysis to examine the value co-destruction process that occurs when customers engage with AI apps. We analyze 7,608 negative reviews obtained from eleven AI apps available on Google Play and App Store AI apps. Results: Our findings reveal six distinct types of value - utilitarian, hedonic, symbolic, social, epistemic, and economic value - that can be co-destroyed during the process. System failure, self-threat and privacy violation are some contributing factors to this value co-destruction process. These values change over time and vary depending on the type of app. Conclusion: Theoretically, our findings extend the concept of value co-destruction in the context of AI apps. We also offer practical recommendations for designing an AI app in a more service-friendly way

    The Effect of ENSO on Hydrological Structure and Environment in the South Central Coast – Vietnam

    Get PDF
    ENSO (El Niño-Southern Oscillation) phenomena have impacted on the hydrodynamic regime and environmental factors of the tropical ocean in general. In case of Vietnamese South-Central Waters, impacts of ENSO only focused on issues of changing seasonal wind, seawater temperature anomalies, changing of water masses as the air-sea interaction. Based on several data sets collecting in the period of 2003-2017, new finding of seawater temperature, salinity and environmental factors was identified in the water masses of Vietnamese South-Central Waters. The highest salinity was 35.4 ‰. During the El Nino event, increasing water temperature and salinity caused to move the deeper water masses to be closer to the sea surface than that initial depth in the neutral period. During the La Nina event, the temperature of most water masses reduced by 0.1-3°C, and then these water masses could be affected to the deeper layer. During the phase from strong ENSO event towards the neutral time, nutrient salts of the 4 water masses were lower concentration in the neutral year, causing the lack of phosphorus in sea surface water masses

    Dynamic system with no equilibrium and its chaos anti-synchronization

    Get PDF
    Recently, systems with chaos and the absence of equilibria have received a great deal of attention. In our work, a simple five-term system and its anti-synchronization are presented. It is special that the system has a hyperbolic sine nonlinearity and no equilibrium. Such a system generates chaotic behaviours, which are verified by phase portraits, positive Lyapunov exponent as well as an electronic circuit. Moreover, the system displays multistable characteristic when changing its initial conditions. By constructing an adaptive control, chaos anti-synchronization of the system with no equilibrium is obtained and illustrated via a numerical example

    Design of Mobile Manipulator for Fire Extinguisher Testing. Part I Key Specifications and Conceptual Design

    Full text link
    All flames are extinguished as early as possible, or fire services have to deal with major conflagrations. This leads to the fact that the quality of fire extinguishers has become a very sensitive and important issue in firefighting. Inspired by the development of automatic fire fighting systems, this paper proposes key specifications based on the standard of fire extinguishers that is ISO 7165:2009 and ISO 11601:2008, and feasible solutions to design a mobile manipulator for automatically evaluating the quality or, more specifically, power of fire extinguishers. In addition, a part of the mechanical design is also discussed.Comment: 10 pages, 8 figures, the 7th International Conference on Advanced Engineering, Theory and Application

    Perforator Mapping of the Superficial and Deep Inferior Epigastric Artery in the Abdominal Region of the Vietnamese

    Get PDF
    BACKGROUND: Previous studies worldwide have investigated the anatomy of the perforators of the deep inferior epigastric arteries to figure out the navigation patterns of the perforators on the abdominal wall. This has been inconsistent amongst the researchers about how to select the perforator to increase the blood supply area for the flap. AIM: To explore the blood supply area of the perforators of the superficial and deep inferior epigastric artery in the abdominal region of the Vietnamese by dissection and 64-slice multislice computed tomography (64-slice MSCT). METHODS: A descriptive cross-sectional study Center from September 2014 to September 2016 on two groups including 30 cadavers fixed by formalin 10% in Anatomy Department of UPNT, and 37 patients getting the 64-slice MSCT abdominal arteries angiogram. RESULTS: The superficial epigastric arteries at the level of the inguinal ligament were located in the middle region, with 96% (right) and 88.5% (left). The anterior superior iliac spine level was in the middle, and lateral regions of 68% and 32% respectively. The level of the umbilical cord was in the lateral region with 66.7% and 85.7%, respectively. There were about 6 perforators of the deep inferior epigastric arteries located in the navel area. These perforators were 70% in the medial region and 30% in the middle region. CONCLUSION: Mapping the blood supply based on the fourth space in the abdominal region in which the superfical inferior epigastric arteries supplied the lateral area. The middle and the internal ones were the perforators of the deep inferior epigastric arteries
    • …
    corecore