A GPS Data-Based Index to Determine the Level of Adherence to COVID-19 Lockdown Policies in India.

J Healthc Inform Res

School of Engineering and Technology, BML Munjal University, Gurgaon, 122413 Haryana India.

Published: June 2021

The growth of COVID-19 cases in India is scaling high over the past weeks despite stringent lockdown policies. This study introduces a GPS-based tool, i.e., lockdown breaching index (LBI), which helps to determine the extent of breaching activities during the lockdown period. It is evaluated using the community mobility reports. This index ranges between 0 and 100, which implies the extent of following the lockdown policies. A score of 0 indicates that civilians strictly adhered to the guidelines while a score of 100 points to complete violation. Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS) is modified to compute the LBI. We considered fifteen states of India, where the spread of coronavirus is relatively dominant. A significant breaching activity is observed during the first phase of lockdown, and the intensity increased in the third and fourth phases of lockdown. Overall breaching activities are dominant in Bihar with LBI of 75.28. At the same time, it is observed that the majority of the people in Delhi adhered to the lockdown policies strictly, as reflected with an LBI score of 47.05, which is the lowest. Though an average rise of 3% breaching activities during the second phase of lockdown (L2.0) with reference to the first phase of lockdown (L1.0) is noticed in all the states, a decreasing trend is noticed in Delhi and Tamil Nadu. Since the beginning of third phase of lockdown L3.0, a significant rise in breaching activities is observed in every state considered for the analysis. The average LBI rise of 16.9% and 27.6% relative to L1.0 is observed at the end of L3.0 and L4.0, respectively. A positive spearman rank correlation of 0.88 is noticed between LBI and the cumulative confirmed cases. This correlation serves as evidence and enlightens the fact that the breaching activities could be one of the possible reasons that contributed to the rise in COVID-19 cases throughout lockdown.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7784625PMC
http://dx.doi.org/10.1007/s41666-020-00086-0DOI Listing

Publication Analysis

Top Keywords

breaching activities
20
lockdown policies
16
phase lockdown
16
lockdown
12
covid-19 cases
8
lockdown breaching
8
rise breaching
8
breaching
7
lbi
6
activities
5

Similar Publications

This article has been retracted: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/locate/withdrawalpolicy).

View Article and Find Full Text PDF

This article has been retracted: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/locate/withdrawalpolicy).

View Article and Find Full Text PDF

Objectives: In the last two decades, scientists have gained a better understanding of several aspects of pituitary development. The signaling pathways that govern pituitary morphology and development have been identified, and the compensatory relationships among them are now known.

Aims: This paper aims to emphasize the wide variety of relationships between Pituitary Gland and Stem cells in hormone Production and disease prevention.

View Article and Find Full Text PDF

Tree bark is a crucial tissue that defends tree stems from invasions by microorganisms. However, our understanding of the constitutive chemical defense mechanisms of the tree barks remains limited. Our group recently discovered that the inner bark of Sorbus commixta exhibited potent inhibitory effects on the growth of the white-rot fungus, Trametes versicolor.

View Article and Find Full Text PDF

Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering.

Sci Rep

January 2025

Department of Software, Faculty of Artificial Intelligence and Software, Gachon University, Seongnam-si, 13120, Republic of Korea.

Network security is crucial in today's digital world, since there are multiple ongoing threats to sensitive data and vital infrastructure. The aim of this study to improve network security by combining methods for instruction detection from machine learning (ML) and deep learning (DL). Attackers have tried to breach security systems by accessing networks and obtaining sensitive information.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!