rss_2.0Land Forces Academy Review FeedSciendo RSS Feed for Land Forces Academy Review Forces Academy Review Feed Renaissance in Education: Unveiling the Transformative Potential of Digitization in Educational Institutions<abstract> <title style='display:none'>Abstract</title> <p>This paper examines the ongoing trend of digitization within educational institutions, analyzing the potential opportunities that lie ahead. As educational landscapes evolve, embracing digitization offers institutions a pathway to unlock a myriad of prospects. This research explores the current state of digitization in educational settings, highlighting the opportunities that arise from the integration of digital technologies. The driving forces behind significant changes in higher education include escalating operating costs, the emergence of micro and nano degrees, the surge in online learning, the influx of digitally-native students, and the overarching wave of digital transformation. Students are increasingly leveraging digital technologies to showcase a diverse array of tools, integrating structured learning environments into the fabric of higher education teaching. This research provides a comprehensive overview of digital transformation in higher education, evaluating the potential of digitalization and forecasting its prospects in the near future. Key concepts such as digital transformation, virtual reality (VR) technology, artificial intelligence (AI), and Technology, Entertainment, Design (TED) courses are examined as practical and indispensable elements shaping the future of education. Through a meticulous analysis, it becomes evident that digitalization marks only the initial phase in a broader process wherein institutions harness new technologies not merely to replicate old tasks but to redefine educational paradigms. Furthermore, the paper emphasizes that digital transformation necessitates the infusion of new management practices capable of harnessing the full potential of information and communication technologies (ICT). The journey towards the digital transformation of educational institutions involves a profound shift in mindset, encompassing innovative approaches to teaching, learning, and administration. As institutions embrace this transformative journey, they position themselves to create enhanced value for students and forge dynamic collaborations with partners in the evolving landscape of higher education.</p> </abstract>ARTICLEtrue Styles and Academic Performance Among Students<abstract> <title style='display:none'>Abstract</title> <p>The purpose of this study is to identify whether students’ academic performance is influenced by their learning style. The research addressed students in the field of educational sciences. To collect research data, a questionnaire was applied to a number of 143 students aged between 19 and 56 years. The research data were statistically analyzed using the Kruskal Wallis Test. The statistical results indicate significant differences between students with auditory, visual and practical learning styles depending on the academic performance and the year of study. Our results can be used in the teaching-learning process by the teacher.</p> </abstract>ARTICLEtrue Healthcare Cybersecurity Risk Management Complexity<abstract> <title style='display:none'>Abstract</title> <p>It is important to fully comprehend the critical role of the healthcare and public health sector in safeguarding the economy from various threats, including terrorism, infectious diseases, and natural disasters. The private ownership of many healthcare assets underscores the need for enhanced collaboration and information sharing between the public and private sectors. The COVID-19 pandemic has accelerated the digitalization of this sector, leading to a heightened risk of cyber threats. The increasing reliance on emerging technologies such as blockchain, the metaverse, and virtual reality is further exacerbating the cybersecurity landscape, with the projected cost of cybercrime exceeding $10 trillion in 2023 and an anticipated surge to nearly $24 trillion in the next four years. Human error remains the primary cause of cybersecurity incidents, accounting for 95% of reported cases, with insider threats contributing significantly. Despite increased cyber training and risk mitigation efforts, vulnerabilities continue to be rapidly exploited. This paper provides an in-depth analysis of cybersecurity risks in the healthcare sector, drawing on existing literature and theoretical frameworks to highlight the complex challenges in this evolving landscape.</p> </abstract>ARTICLEtrue of Using Artificial Intelligence in EU and UN Peacekeeping Activities<abstract> <title style='display:none'>Abstract</title> <p>The main purpose of writing this article was to show how disruptive technologies, including artificial intelligence and machine learning, can be used in military operations. We also covered how the UN and other international organisations have begun to regulate this rapidly exploding field from a policy perspective. We presented some of the technologies that use AI and made suggestions for their general military application and how these technologies can be used in peacetime operations. Artificial intelligence and intelligent devices can also bring enormous benefits in the areas of command and control systems, reconnaissance and intelligence activities. We also presented issues and dilemmas related to developments in this direction, such as ethical, liability, security and information protection problems and dilemmas.</p> </abstract>ARTICLEtrue Role of Civilian Cybersecurity Companies in Military Cyber Operations<abstract> <title style='display:none'>Abstract</title> <p>The Russia-Ukraine war has clearly shown that critical infrastructures are prime targets for cyber operations in addition to the physical domain. In practice, in many cases, these critical infrastructures are protected by civilian cybersecurity companies in the context of a managed security service, so their defense operations must necessarily be coordinated with military defense activities. This includes among others the sharing of information classified under different classification systems (national, EU, NATO) between different actors in national cyber defense, the inclusion of appropriate civilian experts in the armed forces, and the usage of cutting-edge cybersecurity technologies (e.g. AI-enabled solutions) that are first introduced for civilian use, with military organizations only having access to them later or possibly not encountering them at all due to procurement difficulties. The main goal of this paper is to introduce the existing opportunities and obstacles to civilians’ involvement in military cyber operations in the areas of legislation, technology, and human resources from the European perspective. Moreover, the paper deals with the actual questions of cybersecurity intelligence sharing between civilian and military entities and the European Union’s actions in order to improve the overall cybersecurity posture of the region.</p> </abstract>ARTICLEtrue Utilizing Advanced Pattern Recognition in Language Models for Software Vulnerability Analysis<abstract> <title style='display:none'>Abstract</title> <p>Enhancing software quality and security hinges on the effective identification of vulnerabilities in source code. This paper presents a novel approach that combines pattern recognition training with cloze-style examination techniques in a semi-supervised learning framework. Our methodology involves training a language model using the SARD and Devign datasets, which contain numerous examples of vulnerable code. During training, specific code sections are deliberately obscured, challenging the model to predict the hidden tokens. Through rigorous empirical testing, we demonstrate the effectiveness of our approach in accurately identifying code vulnerabilities. Our results highlight the significant advantages of employing pattern recognition training alongside cloze-style questioning, leading to improved accuracy in detecting vulnerabilities in source code.</p> </abstract>ARTICLEtrue Reduction Methods for an Emergency Diesel Generator Fitted Onboard a Large Container Vessel<abstract> <title style='display:none'>Abstract</title> <p>The current study is focused on the analysis of methods and means for reducing marine engine exhaust and greenhouse gases (GHGs). The research method consists in identifying equipments that have been applied in the case of small four-stroke marine engines used as emergency generators on board large ships, specifically the Cummins Qsb6.7-G16 model. The results, which were demonstrated by practical experiences of the different possible configurations for the engine studied showed high potential for reducing emissions, but the most suitable alternative is the Selective Catalytic Reduction (SCR).</p> </abstract>ARTICLEtrue Book Reading: The Changes in Self-Efficacy and Locus of Control in Minority Students: A Mixed Method Study<abstract> <title style='display:none'>Abstract</title> <p>The literature on college attrition rates has revealed that self-efficacy and locus of control play a critical role in academic performance and retention. However, despite the importance of students’ attitudes in academic performance, there have been few studies focused on how to develop students’ self-efficacy and internal locus of control. We examined the impact of motivational book reading on the promotion of self-efficacy and locus of control by leveraging a mixed method study, analyzing quantitative and qualitative data. One hundred diverse, business students participated in the research, where they read one motivational book and wrote essays to reflect their learning and took surveys that measured the quantitative variables before and after reading the book. The analysis revealed that motivational book reading significantly increased self-efficacy and locus of control of the participants. The qualitative analysis revealed that students expressed improvement in self-efficacy and internal locus of control after reading the book. The limitations, practical implications, and future research implications are discussed in this paper.</p> </abstract>ARTICLEtrue Aspects Related to Counterfeiting of Material Goods<abstract> <title style='display:none'>Abstract</title> <p>In recent years, there has been a noticeable increase in the production of counterfeit goods, ranging from luxury items to products that have serious repercussions on individuals’ well-being. This article presents the contributing factors to the rise of counterfeiting and its potential socio-economic impacts, including effects on innovation, business partnerships, environmental issues, employment rates and consumers. Research in the field of counterfeiting goods involves using a diverse set of methods to analyze and understand the phenomenon.Document research, such as legal documents, and analyses from international organizations, will give us information about the types of counterfeit goods, trade routes, and market trends.</p> </abstract>ARTICLEtrue Revolutionizing Real-Time Software Vulnerability Detection With Optimized GPT Framework<abstract> <title style='display:none'>Abstract</title> <p>The escalating complexity and sophistication of software vulnerabilities demand innovative approaches in cybersecurity. This study introduces a groundbreaking framework, named “CodeSentry”, employing a transformer-based model for vulnerability detection in software code. “CodeSentry” leverages a finely-tuned version of the Generative Pre-trained Transformer (GPT), optimized for pinpointing vulnerable code patterns across various benchmark datasets. This approach stands apart by its remarkable computational efficiency, making it suitable for real-time applications − a significant advancement over traditional, resource-intensive deep learning models like CNNs and LSTMs. Empirical results showcase “CodeSentry” achieving an impressive 92.65% accuracy in vulnerability detection, surpassing existing state-of-the-art methods such as SyseVR and VulDeBERT. This novel methodology marks a paradigm shift in vulnerability detection, blending advanced AI with practical application efficiency.</p> </abstract>ARTICLEtrue GPT-2 for Feature Extraction in Malware Detection: A Novel Approach to Cybersecurity<abstract> <title style='display:none'>Abstract</title> <p>In the rapidly advancing digital age, the surge in malware complexity presents a formidable challenge to cybersecurity efforts, rendering traditional signature-based detection methods increasingly obsolete. These methods struggle to keep pace with the swift evolution of malware, particularly with the emergence of polymorphic and metamorphic variants designed to bypass conventional detection. This study introduces a groundbreaking approach to malware detection by utilizing GPT-2, a cutting-edge language model developed by OpenAI, specifically for the purpose of feature extraction. By applying GPT-2’s deep learning capabilities to the EMBER and Drebin datasets, this research explores the model’s effectiveness in identifying malware through the intricate patterns present in binary data. Contrary to its original design for natural language processing, GPT-2’s application in this context demonstrates a significant potential for enhancing malware detection strategies. The model’s proficiency in extracting complex features from binary sequences marks a notable advancement over traditional methods, providing a more adaptive and robust mechanism for identifying malicious software. However, the study also acknowledges the challenges associated with the interpretability of deep learning models and their susceptibility to adversarial attacks, underscoring the imperative for ongoing innovation in the field of cybersecurity. This exploration into the unconventional use of GPT-2 for feature extraction in malware detection not only showcases the model’s versatility beyond language tasks but also sets a new precedent for the application of unsupervised learning models in enhancing cybersecurity defenses.</p> </abstract>ARTICLEtrue EFL Activities for Military Students: A Project-Based Learning Approach<abstract> <title style='display:none'>Abstract</title> <p>Project-based learning (PBL) is a teaching approach that centers around students working on real-world situations. It is a highly effective way to teach English language learners, as it allows them to practice their language skills in a meaningful and contextualized way. PBL is also an excellent method for teaching military students since it assists them in developing the skills and information required for success in their careers. PBL fosters teamwork and collaboration. Students work together on projects, learning how to communicate, delegate tasks, and resolve conflicts – skills that are vital in the workplace. PBL is hands-on and interactive, therefore when students apply concepts to solve real problems, they are more likely to retain the information and the knowledge becomes more memorable and meaningful. The present paper provides practical examples and arguments in favor of using project-based learning in EFL military classrooms as a means of enhancing language acquisition and fostering critical thinking skills.</p> </abstract>ARTICLEtrue Value of Critical Thinking in the Language Classroom<abstract> <title style='display:none'>Abstract</title> <p>The ability to think and make proper conclusions independently is referred to as critical thinking. Because of its prominence in teaching a foreign language, fostering critical thinking in students is now regarded as one of the objectives of foreign language educators. Critical thinking is a continuously evolving endeavor that values reading, investigating, and analyzing current events. Strategies to promote critical thinking in language learning may be adopted at all levels of language acquisition, from beginner to advanced, although the level of difficulty of the activities may vary based on language command. This article aims to discuss critical thinking in teaching a foreign language by highlighting first the importance of critical thinking, and then by presenting a series of strategies that help language educators in implementing critical thinking in language classroom.</p> </abstract>ARTICLEtrue at the Educational Level in the Teaching and Training of Generation “Z”<abstract> <title style='display:none'>Abstract</title> <p>This article aims to show how Generation Z, referred to as ‘digital natives’, see technology as inextricably linked to their existence, having grown up in the midst of the technological revolution. The article also highlights that this generation values self-directed learning, creativity and adaptability, utilising online resources, social media and visual language as natural forms of expression. Their proactive attitude also extends to entrepreneurship and embodies a do-it-yourself ethos, making them unique individuals who are constantly striving to improve themselves and acquire new skills. The study also seeks to highlight that most educators, especially those with some experience in the teaching profession, seek to adapt and update their teaching strategies because they are aware that technology can be used as a tool to increase learner engagement and improve learning outcomes.</p> </abstract>ARTICLEtrue the Ethical Dynamics of the Use of Artificial Intelligence (AI) in Hiring in Healthcare Organizations<abstract> <title style='display:none'>Abstract</title> <p>Artificial Intelligence (AI)-driven resume screening holds immense potential for improving the hiring process. However, organizations must actively address the ethical and bias challenges that may arise. This paper explores a consultant-based intervention research approach in a real-world healthcare organization. Integrating Artificial Intelligence (AI) in the healthcare industry has brought about transformative advancements in patient care, diagnostics, and administrative processes. Healthcare companies have recently embraced AI technologies to revolutionize their resume screening and hiring procedures. This paper explores the various ways in which healthcare organizations utilize AI in their talent acquisition endeavors. From optimizing candidate sourcing and screening to identifying top talent and enhancing diversity, AI-driven systems have demonstrated their efficacy in streamlining the hiring process. However, it is essential to address potential ethical and bias concerns and ensure that AI complements the human element in making informed and inclusive hiring decisions. By understanding the multifaceted applications of AI in healthcare companies’ hiring practices, this paper emphasizes the pivotal role that AI plays in shaping the future of healthcare talent acquisition.</p> </abstract>ARTICLEtrue Regarding the Connection Between Leadership and Motivation in the Logistics Activity in the Production Organizations<abstract> <title style='display:none'>Abstract</title> <p>The logistics services are represented by the logistic organizations through the characteristic features of the developed economies of the rich society. The mission of logistics can be found inside their centre. However, we well know that in the XXI century, the world economy is based on knowledge, and it is led by services, logistics being one of the main under the sector, next to the banking operations, tourism, education, or health. Taking into consideration that there are few studies which approach the part of leadership and motivation inside logistics, the main objective of research is to point out the relationship between leaders and employees, the type of leadership the company promotes, the motivation of the employees at the workplace inside the logistics department. The aim of the research is to offer a view of developing the abilities of leadership and motivation of the employees inside the logistics department. In this regard, a questionnaire was made and distributed to 30 people from the logistics department within the management and middle management group, inside a production profile company.</p> </abstract>ARTICLEtrue Hybrid Threats and their Societal Impact – Republic of Moldova Case Study<abstract> <title style='display:none'>Abstract</title> <p>Hybrid threats undermine societies and foster unrest. Russia’s brutal and unjustified war against Ukraine has changed Moldova’s geopolitical situation. As President Maia Sandu states “using the full range of hybrid threats - including false bomb threats, cyber-attacks, disinformation, calls for social unrest and open corruption – Russia has sought to destabilize the government, erode our democracy and jeopardize Moldova’s contribution to the security of Europe as a whole”. Through consultants, money transfers, and fostering corruption, Russia is interfering in Moldova’s political landscape. However, the international community is highly concerned and supports the Republic of Moldova through a wide range of measures and instruments. The goal of this article is to highlight the main hybrid actions, their impact on Moldovan society, and the state authority’s response in responding to these hybrid threats. Consequently, this article emphasizes the difficulty of ensuring political sustainability amid an intense hybrid warfare.</p> </abstract>ARTICLEtrue Accounting of the Result of the Financial Year and Its Components<abstract> <title style='display:none'>Abstract</title> <p>The performance that companies achieve is valuable information for most users and is essential in a market economy, while the provision of this information on the results achieved by the company as a result of carrying out activities to accomplish the set objectives is based on the data and information presented in the company’s annual financial statements.</p> <p>The scientific approach aims to present the role and importance of the profit and loss account, as well as of the main elements that generate it, in accordance with current legal provisions and accounting standards. The main aim was to summarize the basic principles and the manner in which they are documented in the accounting records to calculate profit or loss and profit redistribution.</p> </abstract>ARTICLEtrue in Learning: Applications in the Academic Environment<abstract> <title style='display:none'>Abstract</title> <p>The present study aims to verify the existence of correlations between autonomic regulation and controlled regulation, autonomous regulation and postintentional regulation, but also between controlled regulation and postintentional self-regulation. To achieve the aim of the present study, two questionnaires were used. 144 academic subjects (students) aged 20 and 21 participated in the study. The results of the study demonstrate that there are significant direct linear relationships between the three aspects.</p> </abstract>ARTICLEtrue Students with Disabilities at the “Nicolae Bălcescu” Land Forces Academy of Sibiu<abstract> <title style='display:none'>Abstract</title> <p>In 2010 Romania ratified the provisions stipulated in the Convention on the Rights of Persons with Disabilities. Various studies have highlighted the lack of opportunities, in almost all the domains of social life, for those that struggle with physical or cognitive disabilities, despite the fact that with adjustments, which sometimes require minor investments or just a change of mentality, they could become valuable resources for society. Our paper focuses on the manner in which the education of the students with disabilities can be facilitated at the “Nicolae Bălcescu” Land Forces Academy. Even though at present, in Romania, the military recruitment criteria do not permit the admission of students with disabilities for various reasons of security, numerous modalities can be found to integrate and to employ them, especially due to the endowment of the Academy and to the rapid advancement of technology.</p> </abstract>ARTICLEtrue