The growth of COVID-19 cases in India is scaling high over the past weeks despite stringent lockdown policies. This study introduces a GPS-based tool, i.e., lockdown breaching index (LBI), which helps to determine the extent of breaching activities during the lockdown period. It is evaluated using the community mobility reports. This index ranges between 0 and 100, which implies the extent of following the lockdown policies. A score of 0 indicates that civilians strictly adhered to the guidelines while a score of 100 points to complete violation. Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS) is modified to compute the LBI. We considered fifteen states of India, where the spread of coronavirus is relatively dominant. A significant breaching activity is observed during the first phase of lockdown, and the intensity increased in the third and fourth phases of lockdown. Overall breaching activities are dominant in Bihar with LBI of 75.28. At the same time, it is observed that the majority of the people in Delhi adhered to the lockdown policies strictly, as reflected with an LBI score of 47.05, which is the lowest. Though an average rise of 3% breaching activities during the second phase of lockdown (L2.0) with reference to the first phase of lockdown (L1.0) is noticed in all the states, a decreasing trend is noticed in Delhi and Tamil Nadu. Since the beginning of third phase of lockdown L3.0, a significant rise in breaching activities is observed in every state considered for the analysis. The average LBI rise of 16.9% and 27.6% relative to L1.0 is observed at the end of L3.0 and L4.0, respectively. A positive spearman rank correlation of 0.88 is noticed between LBI and the cumulative confirmed cases. This correlation serves as evidence and enlightens the fact that the breaching activities could be one of the possible reasons that contributed to the rise in COVID-19 cases throughout lockdown.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7784625 | PMC |
http://dx.doi.org/10.1007/s41666-020-00086-0 | DOI Listing |
Environ Res
January 2025
School of Renewable Energy, Maejo University, Chiang Mai 50290, Thailand; College of Medical and Health Science, Asia University, Taichung, Taiwan.
This article has been retracted: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/locate/withdrawalpolicy).
View Article and Find Full Text PDFEnviron Res
January 2025
Department of Botany and Microbiology, College of Science, King Saud University, P.O. 2455, Riyadh, 11451, Saudi Arabia.
This article has been retracted: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/locate/withdrawalpolicy).
View Article and Find Full Text PDFEndocr Metab Immune Disord Drug Targets
January 2025
Amity Institute of Pharmacy, Amity University Haryana Chemistry Gurugram India.
Objectives: In the last two decades, scientists have gained a better understanding of several aspects of pituitary development. The signaling pathways that govern pituitary morphology and development have been identified, and the compensatory relationships among them are now known.
Aims: This paper aims to emphasize the wide variety of relationships between Pituitary Gland and Stem cells in hormone Production and disease prevention.
Tree Physiol
January 2025
Research Faculty of Agriculture, Hokkaido University, Sapporo, 060-8589, Japan.
Tree bark is a crucial tissue that defends tree stems from invasions by microorganisms. However, our understanding of the constitutive chemical defense mechanisms of the tree barks remains limited. Our group recently discovered that the inner bark of Sorbus commixta exhibited potent inhibitory effects on the growth of the white-rot fungus, Trametes versicolor.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Software, Faculty of Artificial Intelligence and Software, Gachon University, Seongnam-si, 13120, Republic of Korea.
Network security is crucial in today's digital world, since there are multiple ongoing threats to sensitive data and vital infrastructure. The aim of this study to improve network security by combining methods for instruction detection from machine learning (ML) and deep learning (DL). Attackers have tried to breach security systems by accessing networks and obtaining sensitive information.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!