Search results for: secure communication
3016 A Psychosocial Approach to Community Development, Lessons from the Transition Town Movement in Italy
Authors: Anna Zoli
Abstract:
In recent years, we have been witnessing a surge of locally-sustained communities committed to promoting new ethical economies while fostering the full participation of socially excluded groups and individuals into the labor market. This article explores the practices of a particular community development model, Transition Towns, as implemented in Monteveglio, Italy. Data were gathered throughout two years long ethnography, using multiple qualitative techniques, namely participant observation, document analysis, and semi-structured interviews. Data were analyzed triangulating from multiple sources of evidence and using hybrid thematic analysis. Major findings show that Transition Town movement works on two main axes, vertical and horizontal. Vertical transition involves interactions with an overreaching political, economic, and social structure which is not transitioning, and therefore poses structural resistances to the transformative social change fostered by the TT. Conversely, horizontal transition involves intragroup dynamics within the communal relational and geographical spaces and therefore poses process resistances between 'self and others' to the interpersonal communication between TT members. The study concludes that a psychosocial approach to community development is essential in order to conflate macro-social dynamics and psychological processes that may obstacle grassroots social movements to thrive. Skills from psychosocial disciplines are a unique set that could facilitate communication and relational processes for community development, and ultimately enabling social change.Keywords: community development, grassroots social movements, psychosocial approaches, Transition Towns
Procedia PDF Downloads 1203015 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm
Authors: Vaibhav Barve
Abstract:
Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.Keywords: data embedding, decryption, encryption, reversible data hiding, steganography
Procedia PDF Downloads 2883014 The Lived Experience of Risk and Protective Contexts of Blind Successful University Students in Sidist Kilo Campus
Authors: Zelalem Markos Borko
Abstract:
The quality of life of people with blindness is significantly influenced by the level of resilience they possess. A qualitative approach of the descriptive phenomenological design was employed to address basic study objectives. The researcher purposely selected three blind graduate students from Sidist Kilo Campus and conducted a semi-structured interview to gather data. Data were analyzed by using thematic coding techniques. The present study found that personal characteristics such as commitment, living hope, motivation, positive self-esteem, self-confidence, and communication have shaped resiliency for successful university students with visual disabilities. The finding showed that the school environment is the place in which blind students had developed/experienced social, psychological, and economical competency and hope for their academic and entire life success. Furthermore, the finding showed that blind students had experienced individual, family, school, and community-related risks in the success track. Therefore, governmental and non-governmental organizations should provide training for students with visual impairments that focus on the individual traits that shape resilience for academic success, such as commitment, living hope, motivation, positive self-esteem, self-confidence, and communication and also community-oriented training should be to break the social stigma and discriminations for the individuals with the visual impairment.Keywords: blind students, risk and protective factors, lived experience, success
Procedia PDF Downloads 813013 Labour Productivity Measurement and Control Standards for Hotels
Authors: Kristine Joy Simpao
Abstract:
Improving labour productivity is one of the most enthralling and challenging aspects of managing hotels and restaurant business. The demand to secure countless productivity became an increasingly pivotal role of managers to survive and sustain the business. Besides making business profitable, they are in the doom to make every resource to become productive and effective towards achieving company goal while maximizing the value of organization. This paper examines what productivity means to the services industry, in particular, to the hotel industry. This is underpinned by an investigation of the extent of practice of respondent hotels to the labour productivity aspect in the areas of materials management, human resource management and leadership management and in a way, computing the labour productivity ratios using the hotel simple ratios of productivity in order to find a suitable measurement and control standards for hotels with SBMA, Olongapo City as the locale of the study. The finding shows that hotels labour productivity ratings are not perfect with some practices that are far below particularly on strategic and operational decisions in improving performance and productivity of its human resources. It further proves of the no significant difference ratings among the respondent’s type in all areas which indicated that they are having similar perception of the weak implementation of some of the indicators in the labour productivity practices. Furthermore, the results in the computation of labour productivity efficiency ratios resulted relationship of employees versus labour productivity practices are inversely proportional. This study provides a potential measurement and control standards for the enhancement of hotels labour productivity. These standards should also contain labour productivity customized for standard hotels in Subic Bay Freeport Zone to assist hotel owners in increasing the labour productivity while meeting company goals and objectives effectively.Keywords: labour productivity, hotel, measurement and control, standards, efficiency ratios, practices
Procedia PDF Downloads 3163012 Social Media Diffusion And Implications For Opinion Leadership In Northcentral Nigeria
Authors: Chuks Odiegwu-Enwerem
Abstract:
The classical notion of opinion leadership presupposes that the media is at the center of an effective and successful opinion leadership. Under this idea, an opinion leader is an active media user who consumes, understands, digests and interprets the messages for the understanding and acceptance/adoption by lower-end media users – whose access and understanding of media content are supposedly low. Because of their unique access to and presumed understanding of media functions and their content, opinion leaders are typically esteemed by those who look forward to and accept their opinions. Lazarsfeld and Katz’s two-step flow of communication theory is the basis of opinion leadership – propelled by limited access to the media. With the emergence and spread of social media and its unlimited access by all and sundry, however, the study interrogates the relevance and application of opinion leaders and, by implication, the two-step flow communication theory in Nigeria’s Northcentral region. It seeks to determine whether opinion leaders still exist in the picture and if they still exert considerable influence, especially in matters of political conversations and decision-making among the citizens of this area. It further explores whether the diffusion of social media is a reality and how the ‘low-end’ media users react to the new-found freedom of access to media, and how they are using it to inform their decisions on important matters as well as examines if they are still glued to their opinion leaders. This study explores the empirical dimensions of the two-step flow hypothesis in relation to the activities of social media to determine if a change has occurred and in what direction, using mixed methos of Survey and in-depth interviews. Our understanding and belief in some theoretical assumptions may be enhanced or challenged by the study outcome.Keywords: Opinion Leadership, Active Media User, Two-Step-Flow, Social media, Northcentral Nigeria
Procedia PDF Downloads 703011 Associations between Parental Divorce Process Variables and Parent-Child Relationships Quality in Young Adulthood
Authors: Klara Smith-Etxeberria
Abstract:
main goal of this study was to analyze the predictive ability of some variables associated with the parental divorce process alongside attachment history with parents on both, mother-child and father-child relationship quality. Our sample consisted of 173 undergraduate and vocational school students from the Autonomous Community of the Basque Country. All of them belonged to a divorced family. Results showed that adequate maternal strategies during the divorce process (e.g.: stable, continuous and positive role as a mother) was the variable with greater predictive ability on mother-child relationships quality. In addition, secure attachment history with mother also predicted positive mother-child relationships. On the other hand, father-child relationship quality was predicted by adequate paternal strategies during the divorce process, such as his stable, continuous and positive role as a father, along with not badmouthing the mother and promoting good mother-child relationships. Furthermore, paternal negative emotional state due to divorce was positively associated with father-child relationships quality, and both, history of attachment with mother and with father predicted father-child relationships quality. In conclusion, our data indicate that both, paternal and maternal strategies for children´s adequate adjustment during the divorce process influence on mother-child and father-child relationships quality. However, these results suggest that paternal strategies during the divorce process have a greater predictive ability on father-child relationships quality, whereas maternal positive strategies during divorce determine positive mother-child relationships among young adults.Keywords: father-child relationships quality, mother-child relationships quality, parental divorce process, young adulthood
Procedia PDF Downloads 2583010 Data Compression in Ultrasonic Network Communication via Sparse Signal Processing
Authors: Beata Zima, Octavio A. Márquez Reyes, Masoud Mohammadgholiha, Jochen Moll, Luca de Marchi
Abstract:
This document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled using PIC255 piezoelectric material. The special shape of the FSAT, allows for focusing wave energy in a certain direction, accordingly to the frequency components of its actuation signal, which makes available a larger monitored area. The process begins when a FSAT detects and records reflection from damage in the structure, this signal is then encoded and prepared for transmission, using a combined approach, based on Compressed Sensing Matching Pursuit and Quadrature Amplitude Modulation (QAM). After codification of the signal is in binary chars the information is transmitted between the nodes in the network. The message reaches the last node, where it is finally decoded and processed, to be used for damage detection and localization purposes. The main aim of the investigation is to determine the location of detected damage using reconstructed signals. The study demonstrates that the special steerable capabilities of FSATs, not only facilitate the detection of damage but also permit transmitting the damage information to a chosen area in a specific direction of the investigated structure.Keywords: data compression, ultrasonic communication, guided waves, FEM analysis
Procedia PDF Downloads 1243009 Social Network Roles in Organizations: Influencers, Bridges, and Soloists
Authors: Sofia Dokuka, Liz Lockhart, Alex Furman
Abstract:
Organizational hierarchy, traditionally composed of individual contributors, middle management, and executives, is enhanced by the understanding of informal social roles. These roles, identified with organizational network analysis (ONA), might have an important effect on organizational functioning. In this paper, we identify three social roles – influencers, bridges, and soloists, and provide empirical analysis based on real-world organizational networks. Influencers are employees with broad networks and whose contacts also have rich networks. Influence is calculated using PageRank, initially proposed for measuring website importance, but now applied in various network settings, including social networks. Influencers, having high PageRank, become key players in shaping opinions and behaviors within an organization. Bridges serve as links between loosely connected groups within the organization. Bridges are identified using betweenness and Burt’s constraint. Betweenness quantifies a node's control over information flows by evaluating its role in the control over the shortest paths within the network. Burt's constraint measures the extent of interconnection among an individual's contacts. A high constraint value suggests fewer structural holes and lesser control over information flows, whereas a low value suggests the contrary. Soloists are individuals with fewer than 5 stable social contacts, potentially facing challenges due to reduced social interaction and hypothetical lack of feedback and communication. We considered social roles in the analysis of real-world organizations (N=1,060). Based on data from digital traces (Slack, corporate email and calendar) we reconstructed an organizational communication network and identified influencers, bridges and soloists. We also collected employee engagement data through an online survey. Among the top-5% of influencers, 10% are members of the Executive Team. 56% of the Executive Team members are part of the top influencers group. The same proportion of top influencers (10%) is individual contributors, accounting for just 0.6% of all individual contributors in the company. The majority of influencers (80%) are at the middle management level. Out of all middle managers, 19% hold the role of influencers. However, individual contributors represent a small proportion of influencers, and having information about these individuals who hold influential roles can be crucial for management in identifying high-potential talents. Among the bridges, 4% are members of the Executive Team, 16% are individual contributors, and 80% are middle management. Predominantly middle management acts as a bridge. Bridge positions of some members of the executive team might indicate potential micromanagement on the leader's part. Recognizing the individuals serving as bridges in an organization uncovers potential communication problems. The majority of soloists are individual contributors (96%), and 4% of soloists are from middle management. These managers might face communication difficulties. We found an association between being an influencer and attitude toward a company's direction. There is a statistically significant 20% higher perception that the company is headed in the right direction among influencers compared to non-influencers (p < 0.05, Mann-Whitney test). Taken together, we demonstrate that considering social roles in the company might indicate both positive and negative aspects of organizational functioning that should be considered in data-driven decision-making.Keywords: organizational network analysis, social roles, influencer, bridge, soloist
Procedia PDF Downloads 1043008 Oral Fluency: A Case Study of L2 Learners in Canada
Authors: Maaly Jarrah
Abstract:
Oral fluency in the target language is what many second language learners hope to achieve by living abroad. Research in the past has demonstrated the role informal environments play in improving L2 learners' oral fluency. However, living in the target country and being part of its community does not ensure the development of oral fluency skills. L2 learners' desire to communicate and access to speaking opportunities in the host community are key in achieving oral fluency in the target language. This study attempts to identify differences in oral fluency, specifically speech rate, between learners who communicate in the L2 outside the classroom and those who do not. In addition, as the desire to communicate is a crucial factor in developing oral fluency, this study investigates whether or not learners' desire to speak the L2 outside the classroom plays a role in their frequency of L2 use outside the classroom. Finally, given the importance of the availability of speaking opportunities for L2 learners in order to practice their speaking skills, this study reports on the participants' perceptions of the speaking opportunities accessible to them in the target community while probing whether or not their perceptions differed based on their oral fluency level and their desire to communicate. The results suggest that exposure to the target language and daily communication with the native speakers is strongly related to the development of learners' oral fluency. Moreover, the findings suggest that learners' desire to communicate affects their frequency of communication in their L2 outside the classroom. At the same time, all participants, regardless of their oral fluency level and their desire to communicate, asserted that speaking opportunities beyond the classroom are very limited. Finally, the study finds there are marked differences in the perceptions learners have regarding opportunities for learning offered by the same language program. After reporting these results, the study concludes with recommendations for ESL programs that serve international students.Keywords: ESL programs, L2 Learners, oral fluency, second language
Procedia PDF Downloads 4773007 Chinese Speakers’ Language Attitudes Towards English Accents: Comparing Mainland and Hong Kong English Major Students’ Accent Preferences in ELF Communication
Authors: Jiaqi XU, Qingru Sun
Abstract:
Accent plays a crucial role in second language (L2) learners’ performance in the schooling context in the era of globalization, where English is adopted as a lingua franca (ELF). Previous studies found that Chinese mainland students prefer American English accents, whereas the young generations in Hong Kong prefer British accents. However, these studies neglect the non-native accents of English and fail to elaborate much about why the L2 learners differ in accent preferences between the two regions. Therefore, this research aims to bridge the research gap by 1) including both native and non-native varieties of English accents: American accent, British accent, Chinese Mandarin English accent, and Hong Kong English accent; and 2) uncovering and comparing the deeper reasons for the similar or/and different accent preferences between the Chinese mainland and Hong Kong speakers. This research designed a questionnaire including objective and subjective questions to investigate the students’ accent inclinations and the attitudes and reasons behind their linguistic choices. The questionnaire was distributed to eight participants (4 Chinese mainland students and 4 Hong Kong students) who were postgraduate students at a Hong Kong university. Based on the data collection, this research finds out one similarity and two differences between the Chinese mainland and Hong Kong students’ attitudes. The theories of identity construction and standard language ideology are further applied to analyze the reasons behind the similarities and differences and to evaluate how language attitudes intertwine with their identity construction and language ideology.Keywords: accent, language attitudes, identity construction, language ideology, ELF communication
Procedia PDF Downloads 1613006 Shared Heart with a Common Atrial Complex and Persistent Right Dorsal Aorta in Conjoined Twins
Authors: L. C. Prasanna, Antony Sylvan D’Souza, Kumar M. R. Bhat
Abstract:
Although life as a conjoined twin would seem intolerable, there has recently been an increased interest in this subject because of the increasing number of cases where attempts have been made to separate them surgically. We have reviewed articles on cardiovascular anomalies in conjoined twins and presenting rarest anomaly in dicephalus parapagus fetus having two heads attached to one body from the neck or upper chest downwards, with a pair of limbs and a set of reproductive organs. Both the twins shared a common thoracic cavity with a single sternum. When the thoracic cavity was opened, a common anterior mediastinum was found. On opening the pericardium, two separate, closely apposed hearts were exposed. The two cardia are placed side by side. The left heart was slightly larger than the right and were joined at the atrial levels. Four atrial appendages were present, two for each twin. The atrial complex was a common chamber posterior to the ventricles. A single large tributary which could be taken as inferior vena cava drains into the common atrial chamber. In this case, the heart could not be assigned to either twin and therefore, it is referred to as the shared heart within a common pericardial sac. The right and left descending thoracic aorta have joined with each other just above the diaphragm to form a common descending thoracic aorta which has an opening in the diaphragm to be continued as common abdominal aorta which has a normal branching pattern. Upon an interior dissection, it is observed that the two atria have a wide communication which could be a wide patent foramen ovale and this common atrial cavity has a communication with a remnant of a possible common sinus venosus.Keywords: atrium, congenital anomaly, conjoined twin, sinus venosus
Procedia PDF Downloads 3943005 The Yak of Thailand: Folk Icons Transcending Culture, Religion, and Media
Authors: David M. Lucas, Charles W. Jarrett
Abstract:
In the culture of Thailand, the Yak serve as a mediated icon representing strength, power, and mystical protection not only for the Buddha, but for population of worshipers. Originating from the forests of China, the Yak continue to stand guard at the gates of Buddhist temples. The Yak represents Thai culture in the hearts of Thai people. This paper presents a qualitative study regarding the curious mix of media, culture, and religion that projects the Yak of Thailand as a larger than life message throughout the political, cultural, and religious spheres. The gate guardians, or gods as they are sometimes called, appear throughout the religious temples of Asian cultures. However, the Asian cultures demonstrate differences in artistic renditions (or presentations) of such sentinels. Thailand gate guards (the Yak) stand in front of many Buddhist temples, and these iconic figures display unique features with varied symbolic significance. The temple (or wat), plays a vital role in every community; and, for many people, Thailand’s temples are the country’s most endearing sights. The authors applied folk-nography as a methodology to illustrate the importance of the Thai Yak in serving as meaningful icons that transcend not only time, but the culture, religion, and mass media. The Yak represent mythical, religious, artistic, cultural, and militaristic significance for the Thai people. Data collection included interviews, focus groups, and natural observations. This paper summarizes the perceptions of the Thai people concerning their gate sentries and the relationship, communication, connection, and the enduring respect that Thai people hold for their guardians of the gates.Keywords: communication, culture, folknography, icon, image, media, protection, religion, yak
Procedia PDF Downloads 3993004 Flood Devastation Assessment Through Mapping in Nigeria-2022 using Geospatial Techniques
Authors: Hafiz Muhammad Tayyab Bhatti, Munazza Usmani
Abstract:
One of nature's most destructive occurrences, floods do immense damage to communities and economic losses. Nigeria country, specifically southern Nigeria, is known for being prone to flooding. Even though periodic flooding occurs in Nigeria frequently, the floods of 2022 were the worst since those in 2012. Flood vulnerability analysis and mapping are still lacking in this region due to the very limited historical hydrological measurements and surveys on the effects of floods, which makes it difficult to develop and put into practice efficient flood protection measures. Remote sensing and Geographic Information Systems (GIS) are useful approaches to detecting, determining, and estimating the flood extent and its impacts. In this study, NOAA VIIR has been used to extract the flood extent using the flood water fraction data and afterward fused with GIS data for some zonal statistical analysis. The estimated possible flooding areas are validated using satellite imagery from the Moderate Resolution Imaging Spectroradiometer (MODIS). The goal is to map and studied flood extent, flood hazards, and their effects on the population, schools, and health facilities for each state of Nigeria. The resulting flood hazard maps show areas with high-risk levels clearly and serve as an important reference for planning and implementing future flood mitigation and control strategies. Overall, the study demonstrated the viability of using the chosen GIS and remote sensing approaches to detect possible risk regions to secure local populations and enhance disaster response capabilities during natural disasters.Keywords: flood hazards, remote sensing, damage assessment, GIS, geospatial analysis
Procedia PDF Downloads 1373003 Annexing the Strength of Information and Communication Technology (ICT) for Real-time TB Reporting Using TB Situation Room (TSR) in Nigeria: Kano State Experience
Authors: Ibrahim Umar, Ashiru Rajab, Sumayya Chindo, Emmanuel Olashore
Abstract:
INTRODUCTION: Kano is the most populous state in Nigeria and one of the two states with the highest TB burden in the country. The state notifies an average of 8,000+ TB cases quarterly and has the highest yearly notification of all the states in Nigeria from 2020 to 2022. The contribution of the state TB program to the National TB notification varies from 9% to 10% quarterly between the first quarter of 2022 and second quarter of 2023. The Kano State TB Situation Room is an innovative platform for timely data collection, collation and analysis for informed decision in health system. During the 2023 second National TB Testing week (NTBTW) Kano TB program aimed at early TB detection, prevention and treatment. The state TB Situation room provided avenue to the state for coordination and surveillance through real time data reporting, review, analysis and use during the NTBTW. OBJECTIVES: To assess the role of innovative information and communication technology platform for real-time TB reporting during second National TB Testing week in Nigeria 2023. To showcase the NTBTW data cascade analysis using TSR as innovative ICT platform. METHODOLOGY: The State TB deployed a real-time virtual dashboard for NTBTW reporting, analysis and feedback. A data room team was set up who received realtime data using google link. Data received was analyzed using power BI analytic tool with statistical alpha level of significance of <0.05. RESULTS: At the end of the week-long activity and using the real-time dashboard with onsite mentorship of the field workers, the state TB program was able to screen a total of 52,054 people were screened for TB from 72,112 individuals eligible for screening (72% screening rate). A total of 9,910 presumptive TB clients were identified and evaluated for TB leading to diagnosis of 445 TB patients with TB (5% yield from presumptives) and placement of 435 TB patients on treatment (98% percentage enrolment). CONCLUSION: The TB Situation Room (TBSR) has been a great asset to Kano State TB Control Program in meeting up with the growing demand for timely data reporting in TB and other global health responses. The use of real time surveillance data during the 2023 NTBTW has in no small measure improved the TB response and feedback in Kano State. Scaling up this intervention to other disease areas, states and nations is a positive step in the right direction towards global TB eradication.Keywords: tuberculosis (tb), national tb testing week (ntbtw), tb situation rom (tsr), information communication technology (ict)
Procedia PDF Downloads 713002 Persuasive Communication on Social Egg Freezing in California from a Framing Theory Perspective
Authors: Leila Mohammadi
Abstract:
This paper presents the impact of persuasive communication implemented by fertility clinics websites, and how this information influences women at their decision-making for undertaking this procedure. The influential factors for women decisions to do social egg freezing (SEF) are analyzed from a framing theory perspective, with a specific focus on the impact of persuasive information on women’s decision making. This study follows a quantitative approach. A two-phase survey has been conducted to examine the interest rate to undertake SEF. In the first phase, a questionnaire was available during a month (May 2015) to women to answer whether or not they knew enough information of this process, with a total of 230 answers. The second phase took place in the two last weeks of July 2015. All the respondents were invited to a seminars called ‘All about egg freezing’ and afretwards they were requested to answer the second questionnaire. After the seminar, in which they were given an extensive amount of information about egg freezing, a total of 115 women replied the questionnaire. The collected data during this process were analyzed using descriptive statistics. Most of the respondents changed their opinion in the second questionaire which was after receiving information. Although in the first questionnaire their self-evaluation of having knowledge about this process and the implemented technologies was very high, they realized that they still need to access more information from different sources in order to be able to make a decision. The study reached the conclusion that persuasive and framed information by clinics would affect the decisions of these women. Despite the reasons women have to do egg freezing and their motivations behind it, providing people necessary information and unprejudiced data about this process (such as its positive and negative aspects, requirements, suppositions, possibilities and consequences) would help them to make a more precise and reasonable decision about what they are buying.Keywords: decision making, fertility clinics, framing theory, persuasive information, social egg freezing
Procedia PDF Downloads 2513001 Factors Affecting Access to Education: The Experiences of Parents of Children Who Are Deaf or Hard of Hearing
Authors: Hanh Thi My Nguyen
Abstract:
The purpose of this research is to examine the experiences of parents of children who are deaf or hard of hearing in supporting their children to access education in Vietnam. Parents play a crucial role in supporting their children to gain full access to education. It was widely reported that parents of those children confronted a range of problems to support their children to access education. To author’s best knowledge, there has been a lack of research exploring the experiences of those parents in literature. This research examines factors affecting those parents in supporting their children to access education. To conduct the study, qualitative approach using a phenomenological research design was chosen to explore the central phenomena. Ten parents of children who were diagnosed as deaf or hard of hearing and aged 6-9 years were recruited through the support of the Association of Parents of Children with Hearing Impairment. Participants were interviewed via telephone with a mix of open and closed questions; interviews were audio recorded, transcribed and thematically analysed. The research results show that there are nine main factors that affected the parents in this study in making decisions relating to education for their children including: lack of information resources, perspectives of those parents on communication approaches, the families’ financial capacity, the psychological impact on the participants after their children’ diagnosis, the attitude of family members, attitude of school administrators, lack of local schools and qualified teachers, and current education system for the deaf in Vietnam. Apart from those factors, the lack of knowledge of the participants’ partners about deaf education and the partners’ employment are barriers to educational access and successful communication with their child.Keywords: access to education, deaf, hard of hearing, parents experience
Procedia PDF Downloads 1363000 Through-Bolt Moment Connection in HSS Column
Authors: Bardia Khafaf, Mehrdad Ghaffari, Amir Hussein Samakar
Abstract:
It is currently desirable to use Hollow Square Sections (HSS) in moment resistant structures in construction of building because they offer fewer restrictions for designing and more useful space while adhering to build design codes. This paper present a through bolt connection in HSS column. This connection meets building code standards that require the moment resistant connections to deflect and absorb energy resulting from gravity and seismic loads. Connection through bolts is installed and pretension to provide the connection strength needed to make a beam–column moment rigid zone. A rigid joint is typically used to resist lateral forces by holding columns and beams fixed in relation to one another. With bolted moment frames using HSS columns, a through–bolt connection could be used to secure the beam and end plate to the column. However, when multiple columns and beams are used to span a length of building, the use of through-bolts would necessities aligning multiple beams simultaneously to the columns. In the case of a linear span, the assembly process requires the holes of a first beam end plate to be aligned with through bolt holes in a column and aligning the holes of a second, opposing beam plate with the column through bolt, then inserting the through bolts in each hole for tightening with nuts and washers. In moment resistant building, a problem arises when assembling beams to columns where multiple beams and columns are required. Through bolt, moment connections are among the economical, practical and not difficult rigid steel connection for HSS column building. In this paper, the results of numerous analytical studies performed for moment structures with HSS columns with through bolt based on AISC standard codes are shown.Keywords: through bolt, moment resistant connection, HSS columns section, construction engineering
Procedia PDF Downloads 4692999 Fear-Mongering and Its Antidotes: The Case of the Hungarian Anti-Migrant Campaign
Authors: Zsofia Nagy
Abstract:
A sharp increase in the number of refugees crossing Hungary during 2015, coupled with the Hungarian government’s agenda-setting strategy led to a powerful anti-migrant campaign in public, framing asylum-seekers as external threats to the country. While this campaign was, by and large, unchallenged by the Hungarian parliamentary opposition, Two-Tailed Dog Party, a Hungarian mock-party launched a counter-billboard campaign attacking the governmental discourse. Taking the latter as a case of digitally supported civic action, the paper first discusses two theoretical problems related to contemporary social movements: the problem of voice and the problem of participation. Afterward the paper presents the case of the Hungarian anti-migrant billboard campaign led by the government and the counter-billboard campaign and examines their action repertoires. It argues that a number of strategic differences are noteworthy: contrasts between traditional and digital methods, the reliance on the ’spirals of silence’ on the one hand and the breaking of this very silence on the other, where people are holding a minority opinion were given a platform and visibility in public. On a deeper level, the counter-campaign challenged the hegemonic views about public discourse. It effectively contrasted the government’s one-to-many, top-bottom approach to political communication with a campaign that relied on many-to-many communication and a bottom-up approach. While it is true that through memetic engineering, the original governmental messages were altered and the outcomes were brought back to the streets of Hungary; the effects of the two campaigns nevertheless reinforced the original anti-migrant focus of the political agenda.Keywords: counterpublics, migration, refugees, social movements
Procedia PDF Downloads 2342998 Hybrid Velocity Control Approach for Tethered Aerial Vehicle
Authors: Lovesh Goyal, Pushkar Dave, Prajyot Jadhav, GonnaYaswanth, Sakshi Giri, Sahil Dharme, Rushika Joshi, Rishabh Verma, Shital Chiddarwar
Abstract:
With the rising need for human-robot interaction, researchers have proposed and tested multiple models with varying degrees of success. A few of these models performed on aerial platforms are commonly known as Tethered Aerial Systems. These aerial vehicles may be powered continuously by a tether cable, which addresses the predicament of the short battery life of quadcopters. This system finds applications to minimize humanitarian efforts for industrial, medical, agricultural, and service uses. However, a significant challenge in employing such systems is that it necessities attaining smooth and secure robot-human interaction while ensuring that the forces from the tether remain within the standard comfortable range for the humans. To tackle this problem, a hybrid control method that could switch between two control techniques: constant control input and the steady-state solution, is implemented. The constant control approach is implemented when a person is far from the target location, and error is thought to be eventually constant. The controller switches to the steady-state approach when the person reaches within a specific range of the goal position. Both strategies take into account human velocity feedback. This hybrid technique enhances the outcomes by assisting the person to reach the desired location while decreasing the human's unwanted disturbance throughout the process, thereby keeping the interaction between the robot and the subject smooth.Keywords: unmanned aerial vehicle, tethered system, physical human-robot interaction, hybrid control
Procedia PDF Downloads 982997 Technical Aspects of Closing the Loop in Depth-of-Anesthesia Control
Authors: Gorazd Karer
Abstract:
When performing a diagnostic procedure or surgery in general anesthesia (GA), a proper introduction and dosing of anesthetic agents are one of the main tasks of the anesthesiologist. However, depth of anesthesia (DoA) also seems to be a suitable process for closed-loop control implementation. To implement such a system, one must be able to acquire the relevant signals online and in real-time, as well as stream the calculated control signal to the infusion pump. However, during a procedure, patient monitors and infusion pumps are purposely unable to connect to an external (possibly medically unapproved) device for safety reasons, thus preventing closed-loop control. The paper proposes a conceptual solution to the aforementioned problem. First, it presents some important aspects of contemporary clinical practice. Next, it introduces the closed-loop-control-system structure and the relevant information flow. Focusing on transferring the data from the patient to the computer, it presents a non-invasive image-based system for signal acquisition from a patient monitor for online depth-of-anesthesia assessment. Furthermore, it introduces a UDP-based communication method that can be used for transmitting the calculated anesthetic inflow to the infusion pump. The proposed system is independent of a medical device manufacturer and is implemented in Matlab-Simulink, which can be conveniently used for DoA control implementation. The proposed scheme has been tested in a simulated GA setting and is ready to be evaluated in an operating theatre. However, the proposed system is only a step towards a proper closed-loop control system for DoA, which could routinely be used in clinical practice.Keywords: closed-loop control, depth of anesthesia (DoA), modeling, optical signal acquisition, patient state index (PSi), UDP communication protocol
Procedia PDF Downloads 2172996 Quantifying the UK’s Future Thermal Electricity Generation Water Use: Regional Analysis
Authors: Daniel Murrant, Andrew Quinn, Lee Chapman
Abstract:
A growing population has led to increasing global water and energy demand. This demand, combined with the effects of climate change and an increasing need to maintain and protect the natural environment, represents a potentially severe threat to many national infrastructure systems. This has resulted in a considerable quantity of published material on the interdependencies that exist between the supply of water and the thermal generation of electricity, often known as the water-energy nexus. Focusing specifically on the UK, there is a growing concern that the future availability of water may at times constrain thermal electricity generation, and therefore hinder the UK in meeting its increasing demand for a secure, and affordable supply of low carbon electricity. To provide further information on the threat the water-energy nexus may pose to the UK’s energy system, this paper models the regional water demand of UK thermal electricity generation in 2030 and 2050. It uses the strategically important Energy Systems Modelling Environment model developed by the Energy Technologies Institute. Unlike previous research, this paper was able to use abstraction and consumption factors specific to UK power stations. It finds that by 2050 the South East, Yorkshire and Humber, the West Midlands and North West regions are those with the greatest freshwater demand and therefore most likely to suffer from a lack of resource. However, it finds that by 2050 it is the East, South West and East Midlands regions with the greatest total water (fresh, estuarine and seawater) demand and the most likely to be constrained by environmental standards.Keywords: climate change, power station cooling, UK water-energy nexus, water abstraction, water resources
Procedia PDF Downloads 2942995 Smoking, Bullying, and Being Bullied among Secondary School Students: Their Associations with Attachment Styles
Authors: Ruziana Masiran, Hamidin Awang, Cheah Y. T. Jun, Nor Fauziah Hashim, Archana Premkumar, Mohd. Feizel Aisiddiq, Mohd. Fakharuddin
Abstract:
Risk behaviours among secondary school students are common and show an increasing trend over the years. Existing attachment styles between the students and their parents influence the psychosocial development of this group of population hence contributing to the adoption of risk behaviours. The aim of this study was to determine the associations between three risk behaviours; smoking, bullying and being bullied among secondary school students and their styles of attachment to parents in a district in Malaysia. Using multistage simple random sampling, a cross-sectional study was designed with the level of significance, α set at 0.05. The validated self-administered Inventory of Parent and Peer Attachment (IPPA) and Youth Risk Behaviours Surveillance Questionnaire focusing on smoking and bullying were utilized. Secondary school students aged 13 to 17 years old from ten schools in the district of Hulu Langat, Malaysia were sampled. Prevalence of smoking was 15.8%, bullying 8.5% and being bully victims 19.0%. It was found that male gender was a significant risk factor for smoking (p < 0.001), while being Chinese (OR=0.156, 95%CI=0.029-0.837, p=0.030) and having married parents (OR=0.490, 95%CI=0.302-0.796, p=0.490) are protective against smoking. Students with insecure attachment to mothers (OR=1.650, 95%CI=1.018-2.675, p=0.042) and fathers (OR=2.039, 95%CI=1.285-3.234, p=0.002) are at 1.6 and 2 times risk respectively to smoke compared to those with secure attachment. The odds of male students bullying is almost twice than that for female students (OR=2.017, 95%CI=1.416-2.873, p < 0.001), and the odds of being bullied is 1.5 times higher for male students (OR=1.519, 95%CI=1.183-1.950, p=0.001). Those who are insecurely attached to fathers are at 1.8 times higher risk to be bullies (OR=1.867, 95%CI=1.272-2.740, p < 0.001) and 1.5 times higher risk to be bullied (OR=1.546, 95%CI=1.026-2.329, p=0.037). In conclusion, insecure attachment shows a strong association with smoking, bullying and being bullied among secondary school students in Malaysia.Keywords: attachment styles, bullied, bullying, insecure attachment, risk behaviours, smoking and attachment
Procedia PDF Downloads 3322994 ZigBee Wireless Sensor Nodes with Hybrid Energy Storage System Based on Li-Ion Battery and Solar Energy Supply
Authors: Chia-Chi Chang, Chuan-Bi Lin, Chia-Min Chan
Abstract:
Most ZigBee sensor networks to date make use of nodes with limited processing, communication, and energy capabilities. Energy consumption is of great importance in wireless sensor applications as their nodes are commonly battery-driven. Once ZigBee nodes are deployed outdoors, limited power may make a sensor network useless before its purpose is complete. At present, there are two strategies for long node and network lifetime. The first strategy is saving energy as much as possible. The energy consumption will be minimized through switching the node from active mode to sleep mode and routing protocol with ultra-low energy consumption. The second strategy is to evaluate the energy consumption of sensor applications as accurately as possible. Erroneous energy model may render a ZigBee sensor network useless before changing batteries. In this paper, we present a ZigBee wireless sensor node with four key modules: a processing and radio unit, an energy harvesting unit, an energy storage unit, and a sensor unit. The processing unit uses CC2530 for controlling the sensor, carrying out routing protocol, and performing wireless communication with other nodes. The harvesting unit uses a 2W solar panel to provide lasting energy for the node. The storage unit consists of a rechargeable 1200 mAh Li-ion battery and a battery charger using a constant-current/constant-voltage algorithm. Our solution to extend node lifetime is implemented. Finally, a long-term sensor network test is used to exhibit the functionality of the solar powered system.Keywords: ZigBee, Li-ion battery, solar panel, CC2530
Procedia PDF Downloads 3742993 Satellite Connectivity for Sustainable Mobility
Authors: Roberta Mugellesi Dow
Abstract:
As the climate crisis becomes unignorable, it is imperative that new services are developed addressing not only the needs of customers but also taking into account its impact on the environment. The Telecommunication and Integrated Application (TIA) Directorate of ESA is supporting the green transition with particular attention to the sustainable mobility.“Accelerating the shift to sustainable and smart mobility” is at the core of the European Green Deal strategy, which seeks a 90% reduction in related emissions by 2050 . Transforming the way that people and goods move is essential to increasing mobility while decreasing environmental impact, and transport must be considered holistically to produce a shared vision of green intermodal mobility. The use of space technologies, integrated with terrestrial technologies, is an enabler of smarter traffic management and increased transport efficiency for automated and connected multimodal mobility. Satellite connectivity, including future 5G networks, and digital technologies such as Digital Twin, AI, Machine Learning, and cloud-based applications are key enablers of sustainable mobility.SatCom is essential to ensure that connectivity is ubiquitously available, even in remote and rural areas, or in case of a failure, by the convergence of terrestrial and SatCom connectivity networks, This is especially crucial when there are risks of network failures or cyber-attacks targeting terrestrial communication. SatCom ensures communication network robustness and resilience. The combination of terrestrial and satellite communication networks is making possible intelligent and ubiquitous V2X systems and PNT services with significantly enhanced reliability and security, hyper-fast wireless access, as well as much seamless communication coverage. SatNav is essential in providing accurate tracking and tracing capabilities for automated vehicles and in guiding them to target locations. SatNav can also enable location-based services like car sharing applications, parking assistance, and fare payment. In addition to GNSS receivers, wireless connections, radar, lidar, and other installed sensors can enable automated vehicles to monitor surroundings, to ‘talk to each other’ and with infrastructure in real-time, and to respond to changes instantaneously. SatEO can be used to provide the maps required by the traffic management, as well as evaluate the conditions on the ground, assess changes and provide key data for monitoring and forecasting air pollution and other important parameters. Earth Observation derived data are used to provide meteorological information such as wind speed and direction, humidity, and others that must be considered into models contributing to traffic management services. The paper will provide examples of services and applications that have been developed aiming to identify innovative solutions and new business models that are allowed by new digital technologies engaging space and non space ecosystem together to deliver value and providing innovative, greener solutions in the mobility sector. Examples include Connected Autonomous Vehicles, electric vehicles, green logistics, and others. For the technologies relevant are the hybrid satcom and 5G providing ubiquitous coverage, IoT integration with non space technologies, as well as navigation, PNT technology, and other space data.Keywords: sustainability, connectivity, mobility, satellites
Procedia PDF Downloads 1332992 Polarization of Lithuanian Society on Issues Related to Language Politics
Authors: Eglė Žurauskaitė, Eglė Gudavičienė
Abstract:
The goal of this paper is to reveal how polarization is constructed through the use of impoliteness strategies. In general, media helps to spread various ideas very fast, and it means that processes of polarization are best revealed in computer-mediated communication (CMC) contexts. For this reason, data for the research was collected from online texts about a current, very diverse topic in Lithuania - Lithuanian language policy and regulations, because this topic is causing a lot of tension in Lithuanian society. Computer-mediated communication allows users to edit their message before they send it. It means that addressees carefully select verbal expressions to convey their message. In other words, each impoliteness strategy and its verbal expression were created intentionally. Impoliteness strategies in this research are understood as various ways to reach a communicative goal: belittle the other. To reach the goal, the public opinions of various Lithuanian public figures (e. g., cultural people, politicians, officials) were collected from new portals in 2019–2023 and analyzed using both quantitative and qualitative approaches. First, problematic aspects of the language policy, for which public figures complain, were identified. Then instances when public figures take a defensive position were analyzed: how they express this position and what it reveals about Lithuanian culture. Findings of this research demonstrate how concepts of impoliteness theory can be applied in analyzing the process of polarization in Lithuanian society on issues related to the State language policy. Also, to reveal how polarization is constructed, these tasks were set: a) determine which impoliteness strategies are used throughout the process of creating polarization, b) analyze how they were expressed verbally (e. g., as an advice, offer, etc.).Keywords: impoliteness, Lithuanian language policy, polarization, impoliteness strategies
Procedia PDF Downloads 572991 The Impact of Work Stress on Professionals' Life and Health: The Usage of Instant Messaging Applications
Authors: Pui-Lai To, Chechen Liao, Ming-Chi Sung
Abstract:
Work and family life are the most important areas for men and women today. Every professional is required to meet and fulfill the responsibilities of work and family roles. Although the development and popularity of communication technology bring a lot of benefits, including effective and efficient communication, may also generate conflicts between work and family life. Since mobile devices and the applications of mobile devices, such as instant messages, are ubiquitous, the boundaries of work and family roles are increasingly blurred. Professionals may be in the risk of work over-loading and work-family conflict. This study examines the impact of work stress on professionals’ life and health in the context of instant messaging application of smart phone. This study uses a web-based questionnaire to collect samples. The questionnaires are sent via virtual community sites, instant messaging applications, and e-mail. The study develops and empirically validates a work-family conflict model by integrating the pressure theory and technostress factors. The causal relationship between variables in the research model is tested. In terms of data analysis, Partial Least Square (PLS) in Structural Equation Modeling (SEM) is used for sample analysis and research model testing. The results of this study are as follows. First, both the variables of work-related stress and technological violations positively affect the work-family conflict. Second, both the variables of work-loading and technology-overloading have no effect on work-family conflict. Third, work-family conflict has negative effect on job satisfaction, family satisfaction, physical health, and mental health.Keywords: mental health, physical health, technostress, work-family conflict, work-related stress
Procedia PDF Downloads 3002990 A Corporate Social Responsibility Project to Improve the Democratization of Scientific Education in Brazil
Authors: Denise Levy
Abstract:
Nuclear technology is part of our everyday life and its beneficial applications help to improve the quality of our lives. Nevertheless, in Brazil, most often the media and social networks tend to associate radiation to nuclear weapons and major accidents, and there is still great misunderstanding about the peaceful applications of nuclear science. The Educational Portal Radioatividades (Radioactivities) is a corporate social responsibility initiative that takes advantage of the growing impact of Internet to offer high quality scientific information for teachers and students throughout Brazil. This web-based initiative focusses on the positive applications of nuclear technology, presenting the several contributions of ionizing radiation in different contexts, such as nuclear medicine, agriculture techniques, food safety and electric power generation, proving nuclear technology as part of modern life and a must to improve the quality of our lifestyle. This educational project aims to contribute for democratization of scientific education and social inclusion, approaching society to scientific knowledge, promoting critical thinking and inspiring further reflections. The website offers a wide variety of ludic activities such as curiosities, interactive exercises and short courses. Moreover, teachers are offered free web-based material with full instructions to be developed in class. Since year 2013, the project has been developed and improved according to a comprehensive study about the realistic scenario of ICTs infrastructure in Brazilian schools and in full compliance with the best e-learning national and international recommendations.Keywords: information and communication technologies, nuclear technology, science communication, society and education
Procedia PDF Downloads 3262989 Developing a Cloud Intelligence-Based Energy Management Architecture Facilitated with Embedded Edge Analytics for Energy Conservation in Demand-Side Management
Authors: Yu-Hsiu Lin, Wen-Chun Lin, Yen-Chang Cheng, Chia-Ju Yeh, Yu-Chuan Chen, Tai-You Li
Abstract:
Demand-Side Management (DSM) has the potential to reduce electricity costs and carbon emission, which are associated with electricity used in the modern society. A home Energy Management System (EMS) commonly used by residential consumers in a down-stream sector of a smart grid to monitor, control, and optimize energy efficiency to domestic appliances is a system of computer-aided functionalities as an energy audit for residential DSM. Implementing fault detection and classification to domestic appliances monitored, controlled, and optimized is one of the most important steps to realize preventive maintenance, such as residential air conditioning and heating preventative maintenance in residential/industrial DSM. In this study, a cloud intelligence-based green EMS that comes up with an Internet of Things (IoT) technology stack for residential DSM is developed. In the EMS, Arduino MEGA Ethernet communication-based smart sockets that module a Real Time Clock chip to keep track of current time as timestamps via Network Time Protocol are designed and implemented for readings of load phenomena reflecting on voltage and current signals sensed. Also, a Network-Attached Storage providing data access to a heterogeneous group of IoT clients via Hypertext Transfer Protocol (HTTP) methods is configured to data stores of parsed sensor readings. Lastly, a desktop computer with a WAMP software bundle (the Microsoft® Windows operating system, Apache HTTP Server, MySQL relational database management system, and PHP programming language) serves as a data science analytics engine for dynamic Web APP/REpresentational State Transfer-ful web service of the residential DSM having globally-Advanced Internet of Artificial Intelligence (AI)/Computational Intelligence. Where, an abstract computing machine, Java Virtual Machine, enables the desktop computer to run Java programs, and a mash-up of Java, R language, and Python is well-suited and -configured for AI in this study. Having the ability of sending real-time push notifications to IoT clients, the desktop computer implements Google-maintained Firebase Cloud Messaging to engage IoT clients across Android/iOS devices and provide mobile notification service to residential/industrial DSM. In this study, in order to realize edge intelligence that edge devices avoiding network latency and much-needed connectivity of Internet connections for Internet of Services can support secure access to data stores and provide immediate analytical and real-time actionable insights at the edge of the network, we upgrade the designed and implemented smart sockets to be embedded AI Arduino ones (called embedded AIduino). With the realization of edge analytics by the proposed embedded AIduino for data analytics, an Arduino Ethernet shield WizNet W5100 having a micro SD card connector is conducted and used. The SD library is included for reading parsed data from and writing parsed data to an SD card. And, an Artificial Neural Network library, ArduinoANN, for Arduino MEGA is imported and used for locally-embedded AI implementation. The embedded AIduino in this study can be developed for further applications in manufacturing industry energy management and sustainable energy management, wherein in sustainable energy management rotating machinery diagnostics works to identify energy loss from gross misalignment and unbalance of rotating machines in power plants as an example.Keywords: demand-side management, edge intelligence, energy management system, fault detection and classification
Procedia PDF Downloads 2512988 Nonlinear Estimation Model for Rail Track Deterioration
Authors: M. Karimpour, L. Hitihamillage, N. Elkhoury, S. Moridpour, R. Hesami
Abstract:
Rail transport authorities around the world have been facing a significant challenge when predicting rail infrastructure maintenance work for a long period of time. Generally, maintenance monitoring and prediction is conducted manually. With the restrictions in economy, the rail transport authorities are in pursuit of improved modern methods, which can provide precise prediction of rail maintenance time and location. The expectation from such a method is to develop models to minimize the human error that is strongly related to manual prediction. Such models will help them in understanding how the track degradation occurs overtime under the change in different conditions (e.g. rail load, rail type, rail profile). They need a well-structured technique to identify the precise time that rail tracks fail in order to minimize the maintenance cost/time and secure the vehicles. The rail track characteristics that have been collected over the years will be used in developing rail track degradation prediction models. Since these data have been collected in large volumes and the data collection is done both electronically and manually, it is possible to have some errors. Sometimes these errors make it impossible to use them in prediction model development. This is one of the major drawbacks in rail track degradation prediction. An accurate model can play a key role in the estimation of the long-term behavior of rail tracks. Accurate models increase the track safety and decrease the cost of maintenance in long term. In this research, a short review of rail track degradation prediction models has been discussed before estimating rail track degradation for the curve sections of Melbourne tram track system using Adaptive Network-based Fuzzy Inference System (ANFIS) model.Keywords: ANFIS, MGT, prediction modeling, rail track degradation
Procedia PDF Downloads 3352987 A Case Study of the Political Determinant of Health on the Public Health Crisis of Malaria in Nigeria
Authors: Bisola Olumegbon
Abstract:
Globally, there were about 229 million cases of malaria in 2022. The sub-Saharan African region accounted for 92% of the reported cases and 94% of deaths. Nigeria had the highest number of malaria cases and deaths, representing 27% of global cases. This scholarly project was a case study guided by the political determinants of health. Triangulation of data using thematic analysis was used to identify the political determinants of malaria in Nigeria and to understand how the concept of interaction contributes to the persistence of the disease. The analysis involved a deductive and inductive approach based on the literature review and the evidence of political determinants gathered in the data. Participants’ in-depth interviews were used to collect data from frontline personnel. Data triangulation was done using thematic analysis, a method used to identify patterns and themes in qualitative data. The study findings revealed a correlation between political determinants of health and malaria management efforts in Nigeria. Some influencing factors included voting challenges, inadequate funding, lack of health priority from the government, noncompliance among patients, and hurdles to effective communication. The findings suggest a need to deliberately increase dedication to the political agenda, provide sufficient financial resources, enhance communication, and active community involvement to address the persistent malaria endemic effectively. Further study is recommended to identify interventions to address identified factors of political determinants of health to reduce malaria in Nigeria. Such intervention must involve collaboration with diverse stakeholders such as policymakers, healthcare professionals, community leaders, and researchers.Keywords: malaria, malaria management, health worker, stakeholders, political determinant of health
Procedia PDF Downloads 71