FOREWORD
This Book is published by Directorate of Alumni Relations, Manipal University
Jaipur. Manipal University Jaipur (MUJ) was launched in 2011 on an invitation
from the Government of Rajasthan as a self-financed State University. MUJ has
redefined academic excellence in the region with the Manipal way of learning,
inspiring students of all disciplines to learn and innovate through hands-on practical
experience. The purpose of the Directorate of Alumni Relations (DoAR) is to foster
a spirit of loyalty and to promote the general welfare of the University. The
Directorate supports the organization's goals to strengthen the ties between alumni,
the community, and the organization. Any educational institution's reputation
depends upon satisfactory results, academic achievements, co-curricular activities,
and its alumni, who are among the main stakeholders of the institutions. They
contribute immensely to the development of the University in multiple dimensions.
The recent trends that emerge from research is based on individual and collective
adherence to core values of objectivity, integrity, accountability, and stewardship of
Resent trends in Science and Engineering is intended to the publication of original
research articles as well as review articles, with emphasis on unsolved problems and
open questions in all sciences & Emerging technologies in Engineering. Social
sciences research (SSR) is an enterprise that is continuously evolving, but not
without some debilitating issues that impede the realization of its full potential and
usefulness. The book covers Sciences, Engineering and Social Sciences topics, such
as bioinformatics, computer sciences, physical sciences, chemical Sciences,
environmental sciences, management sciences, engineering technologies and
applications. Subsequently, all related field of social sciences are included within the
scope of the Recent Trends in Sciences, Engineering and Social Sciences.
Jaipur, India 11 December 21
Editors
This book is
Dedicated to our Stakeholders and
Directorate of Alumni Relations,
Manipal University Jaipur
Acknowledgment
We would like to express our gratitude and appreciation to all
those who gave us the possibility to complete this book directly or
indirectly. A special thanks to Prof. K Ramnarayan, Chairperson, Prof.
G. K. Prabhu, President, Prof. N. N. Sharma, Pro-President, Dr. Nitu
Bhatnagar, Registrar, Deans, Directors, HoDs of Manipal University
Jaipur for their stimulating suggestions and encouragement helped us to
coordinate especially in writing this book chapters.
We would also like to acknowledge the efforts of the alumni of
Manipal University Jaipur and their mentors, supervisors, coauthors in
achieving the goal as well as their encouragement to maintain our
progress in track.
We appreciate the crucial role of Dr. Karamadai Subban
Shivraj, Chief Librarian, Manipal University Jaipur at our workplace,
who gave the exemplary provision to use all required and the necessary
materials to complete this task.
A special thanks goes to Decennial Year event committee,
Department Alumni Coordinators and Nuclear Members who gave us
an unconditional support and a salient assistance during the
accomplishment of this task.
Contents
Chapter Title Page
No.
1 AUGMENTED REALITY INTRODUCTION AND APPLICATIONS
1
2 LUNG CANCER DETECTION USING IMAGE PROCESSING 12
3 SURVEY OF 5G ANTENNA FOR INDUSTRIAL AUTOMATION APPLICATIONS
19
4 KATHPUTLI 34
5 DIGITAL EDUCATION TURBULENCE AMONG EDUCATORS AND LEARNERS DURING THE COVID-19 PANDEMIC IN INDIA
64
6 INFLUENCE OF SOCIAL MEDIA ADDICTION ON ANXIETY, DEPRESSION, AND STRESS
76
7 ANALYSIS OF PREDICTIVE PATROLLING USING EXPLORATORY ANALYTICS
89
8 SENTIMENT ANALYSIS OF TWEETS TO DETERMINE POLITICAL OUTCOMES USING MACHINE LEARNING TECHNIQUES
102
9 ANALYSIS OF CRIME PREDICTION ALGORITHMS 111
10 BIO- PSYCHOSOCIAL CORRELATES OF DRUG ABUSE IN ADULTS AND ADOLESCENTS
132
11 FACTORS INFLUENCING RESPONSIBLE CONSUMPTION DURING POST COVID 19
154
12 FINANCIAL LITERACY LEVELS ACROSS POPULATION GROUPS
160
13 SYNTHESIS AND MÖSSBAUER SPECTROSCOPY OF MARCASITE FES2 NANOPARTICLES
172
14 CHEMICAL CHARACTERIZATION AND BIOLOGICAL ACTIVITY OF SILVER NANOPARTICLES BIOSYNTHESISED FROM EXTRACTS OF CISSUS SP.: NATURAL BONE HEALING HERB
184
15 PROSTITUTION IN INDIA-SOCIO-LEGAL PERSPECTIVE 194
16 GENDER NEUTRALITY VIS-A-VIS STATUTORY PROVISION
201
1
CHAPTER 1
AUGMENTED REALITY INTRODUCTION
AND APPLICATIONS
Suman Bhakar Department of Computer and Communication Engineering Manipal University Jaipur [email protected] Devershi Pallavi Bhatt* Department of Computer Application School of Basic Sciences Manipal University Jaipur [email protected] (Corresponding Author) Vivek Sharma Department of Computer and Communication Engineering Manipal University Jaipur [email protected] Jitendra Singh Yadav Department of Computer and Communication Engineering Manipal University Jaipur [email protected] ******************************************************************** Abstract: Due to such dependency on robots, numerous research fields and proposal
have been aimed develop more methodologies. These can be helped to execute tasks
by robots within a time frame having minimum human interference and without any
delay. In this research, glyph detection system through Augmented Reality has been
proposed for fiducial glyph detection by machine/robots at minimum latency time.
Keywords: Augmented Reality, Latency, Glyph
********************************************************************
2
Introduction
Augmented Reality plays a significant role in enhancing the perception of users
towards the interaction with the real world. It is a key to detect displayed
information coming from virtual objects where users failed to identify it with their
senses. Primarily, this technology can be utilized in two areas such as in repairing of
complex mechanical devices and in medical applications. For example, during
surgery, doctors can use AR technique to visualize the internal things of human
body as a see through Head Mount Displays (HMD) [6-7]. It can be combined with
real time 3D sensors to scan a human body without any cuttings which reduces the
risk of performing operation. In case of complex machinery, it becomes quite
difficult to read and memorize the instructions from hand manual. AR makes the
whole procedure simple by representing the 3D drawing with systematic procedure
for handling the tool or device [8]. These are all real time system based applications
which motivate us to develop more methodologies for making it available to
common people also.
A real time system can be described as a system that is used to regulate an
environment by gathering data, formulating them and giving back the outcome
rapidly within time frame to influence the environment at that time. It is an
application program which performs the action under the time frame in a manner
that the user senses it for an instant. Real–Time Computing (RTC) depicts the
programming frameworks and hardware which is subjected to a ‘real time
restriction’ [9]. This restriction is used for an instance that is transmitting from an
event to system response. Real-time programs must ensure response inside indicated
time requirements, commonly known as ‘deadlines’ [10]. The accuracy of these
sorts of systems relies on upon their temporal features and in addition their
functional characteristics. Applications that are based on real-time responses are
frequently measured in milliseconds, and often in microseconds. Systems that
depends upon real-time, execute its task within a given time interval and time frame.
On the other hand, systems that are not operating in real time fail to execute the task
within a specified time frame. Here time is a very important and crucial factor and if
the system fails to execute within a timeframe then the result will be disastrous. In
3
these applications, latency plays a vital role and it must be less than a particular
measure value to render the result successful.
In spite of promising future of real time applications, there are still challenges which
need to be addressed, particularly with latency factor of machine/robots which is the
most vital component in getting effective and accurate results. There are a number of
factors which affects the latency in real-time applications such as LUX, distance,
camera processing time etc. It is thus imperative to study and propose a glyph
detection system that helps to minimize the latency factor in terms of various
challenging conditions.
Principles of AR World
AR and VR share many technologies and have lot of things are in common.
However, to differentiate between AR and VR, it is important to observe their
behavior towards the real world. Computer-generated virtual surroundings prefer
Head Mount Displays (HMDs) [11]. These have the potential to replace the real
world entirely with a synthetic environment generated by computers. Some certain
conditions such as with closed-view HMD, it covers the sight of users that makes
them blind with the removal of electrical power. On the other hand, AR supplements
are based on the concept of see-through HMDs [11]. It superimposes the real world
with virtual objects upon the wearer's view. Theoretically, the aim of the AR system
is to provide a seamless performance by the amalgam of two different worlds (reel
objects with real world objects).
Another constraint effectively used to illustrate AR known as latency. Latency is
defined as the delay in activity and response. Such end-to-end system delay causes
registration error. Latency plays a pivotal role while using HMD for AR and VR. As
compared with VR, AR requires registration that is much more accurate. Visual
conflicts arise due to registration errors in between the images of real and virtual
worlds. The differences in the sensitivity of human visual system and resolution of
human eye made the conflictions easy to detect [11]. Even the detection of tiny
offsets becomes easy in the images of virtual and real worlds. For instance while
wearing head mounted displays if the user moves his head, then the HMD should
4
show the changes in the virtual world instantly. Any huge delay, in this process, will
make the user’s mind dismiss the authenticity of the virtual world. High latency
while using Augmented Reality can make virtual objects or images misaligned with
real world environment and in turn reduces the performance and efficiency of the
system.
Main principle of this research is to reduce the latency and increase the efficiency of
AR system my using Glyph recognition with image processing technique. It has
been sorted out the end to end system delay which is also considered to be as
dynamic error due to the random movements in user’s position.
Advantages and Applications of Augmented Reality
AR shows its potential to sort out several challenges faced by users. Several
professionals are engaging themselves in the advancement of AR system. AR now
involves in users life with the completion of their day-to-day tasks [12]. Augmented
reality features some of the major benefits that are as follows:
• Industrial purpose- AR makes the things easier to carry industrial tasks such
as hard labor work of weight lifting conducted by robots or machines. In
addition, automatic operations with any manual help to control the machines.
• Product marketing for users- Professionals performs such tasks very easily,
which make the AR system a good choice for product detection. User can
obtain all the data about the product by merely scan the material or
packaging.
• Military applications- AR applications show their worth in several military
operations. In US military, soldiers can estimate their surroundings before
entering in enemy’s location. It also provides them hideout to attack their
enemies in better way.
• Education sector- AR has modernized and simplified the communications
between students and their teachers [22]. It helps the students to access the
data in form of text and images from textbooks anytime and anywhere. They
just need to scan the custom codes obtained from their organizations. In
addition, it provides a high-tech training methodology to the students.
5
• Corporate communication- AR reduces the gap between investors,
employees and employers with their communication set-up. If they are all
participating through AR content, the data will be in authorized hand only. It
is resulting as higher sales and profits by effectively compete with opponents.
• Reviews of sales and design- It requires a separate display for each product
during design and sales in order to create prototypes and loads of packaging
that is not at all a cost efficient process. AR performs the access and
customization of product by just scanning their look, shape and size. It can
be done through smart phones and devices.
The potential applications of this research are as under:
Real time system based application
Boston dynamics
Computation minimum latency
Machine
Robotics and bot application
Problem Definition
Nowadays, augmented reality has focused on robotic and real world application.
Real world entity and robotics are predictable through marker (glyph) based and
marker less (without glyph) technique in the field of augmented reality system.
Accurate 2D and 3D glyph detection with least delay time known as latency is the
key issue in the AR system. Where, robot and real world applications are conducting
the action through marker based or marker-less techniques. However, there is the
detection and registration complexity in markerless technique. Therefore, marker
based is more efficient then markerless technique. There is a certain issue in existing
detection technique through motion camera. Therefore, optimized process is needed
to detect the 3D and 2D glyph more accurately. Latency also plays a vital role in the
field of robotics and real time based applications where, action performs within
specific time frame. Thus, with the innovation in the theory of augmented reality and
rapid expansion of robots, there is a requirement to develop an algorithm for glyph
detection with the formulation of least delay time.
6
Objectives
The primary aim of this research is to conduct broad analytical as well theoretical
studies on augmented reality. The main issues to be analyzed in this research work
are stated as:
• To enhance the quality of the glyph apply image processing (IP prototype)
technique on glyph.
• To reduce the latency histogram analysis performed with the help of
pixilation algorithm to determine the noise present in the glyph.
• Glyph detection and determine the angle of glyph with respect to Pc camera
apply A forge. Net framework and 3D pose estimation algorithm.
• To develop computation proposed algorithm to recognize the (2D, 3D) glyph
at different angle, distance and luminous with minimum delay time.
• To compare and analyze the results, obtained from the both 2D detection and
3D detection.
• To Plot the graph result of 2D detection time and 3D detection time with
ideal value of system.
• To compute the percentage of latency improvement or accuracy of 2D glyph
with respect to 3D detection system.
Key Contributions
In this research, an attempt has been made to develop a new augmented reality
system which has a direct application in the robot navigation. Infrared optical
markers projected in the real world environment are analyzed by the robot and
pattern Ids are generated in this process. This framework empowers the robot to
control a complex movement by the robot instructions analogous to the pattern IDs.
A model framework is developed to execute basic experiments of remote robot
mapping.
This research includes glyph recognition with ‘Aforge.net framework’ for designing
the augmented reality system [5]. In addition, Posit estimation is preferred here for
the determination of location and orientation of glyph respecting camera. Image
processing with glyph recognition technique improves the communication to do
action at minimum latency time to Aurduino Uno controller. The simulation process
7
has been undertaken by virtual connection between C# application with Aforge.net
framework and Aurduino.Aforge.NET Framework’ in combination with C#
language to lay down a principle for development of applications that provides
image object detection abilities [5].
Various researches has been undertaken to differentiate and detect the object from
the background environment to determine the exact location and position of the
target object in the surrounding environment. In the same manner, Posit estimation
approach that is albeit unnoticeable in almost all applications provides the high level
of precision at the same time in distinguishing location and direction of the fiducial
marker regarding the camera [12]. However, latency plays a pivotal role in
increasing the overall efficiency of the machine/robot remains an underdeveloped
study. This application can be usefully in enhancing different abilities of robot, for
example, precise detection of object and movement of the same in the minimum
time or within the required time frame. Various factors such as distance from camera
to glyph, LUX, camera response time which affects the detection of arm of the
machine/robot are analyzed in this research.
The research has been undertaken in the same direction looking at tremendous
applications of such glyph detection augmented reality system and study the light
intensity as well as challenging distance between glyph and camera that affects the
fiducial glyph detection process by the camera accurately.
After problem identification, there is a need for developing an infrared glyph based
augmented reality system in order to minimize the latency for machine /robotic
applications. In our daily life, this research reports the involvement of augmented
reality as machines and robotics. The glyph based augmented reality system
minimize the latency under adverse conditions such as camera processing time,
distance between camera/glyph and luminous which affects the detection of object
through servo motor speed.
Dissertation Outline
This thesis is organized in total seven chapters presenting the details of theory,
literature review, AR techniques with recognition process and experimental work
8
comprising hardware design, assessment and investigation along with optimization
techniques for enhancing the performance of newly developed AR system.
The primary overview of AR system, its principles, advantages, applications
following with the main contributions of research work and objectives have already
been presented in Section One.
Further dissertation has been briefly outlined as follows:
Section Two provides an inclusive literature review on AR communication including history, origination and modelling schemes with their performance characteristics. This chapter presents the existing techniques with their main gaps and active research fields. This chapter also discusses the possible introduced methods that can be used to enhance the reliability of AR world. It discusses all the present scenario need to be deal with in order to develop an optimized system. This chapter can be useful to compare the developed methodology with the existing systems and their performance evaluations. Section Three focuses on the development of glyph detection system with its model
diagram. It includes the hardware section and the detailed examination of
experimental performance evaluation. Hardware set - up and designing of system
their technical specifications are outlined first. It includes the interfacing between
Ardunio and server motor. It includes the 2D and 3D detection techniques with
accuracy. Delays based on angles have been noted and observe their influence on
virtual reality. Real world applications based on dynamic errors have been illustrated
further.
Section four describes the latency factor. Histogram technique is used for noise
calculation present in communication link. A test bench is developed to calculate the
latency factor present in AR and try to minimize it for optimized performance.
Glyph recognition is explained here for computing and processing of data obtained
from variations in the luminous and glyph detection at different challenging distance
(feet) [12]. Image processing creates the glyph for augmented process and further
provides the image in its structured matrix representation. Posit algorithm processes
the glyph detection at the location and orientation of image with respect to camera
[12].
9
Section Five illustrates in detail the calculation of response time with or without
Glyph rectifiers. In this chapter a novel detection method is proposed for the
detection of actual process time. This chapter elaborates the calculation of system
actual time to capture the glyph with the augmented process [5]. In addition ideal
and actual transmission flow rate have been estimated by the use of designed
hardware.
Section Six explains and discusses the outcomes coming from simulation techniques
and algorithms which are designed by Glyph technique with image processing. It
includes the findings and their contributions in the research work. Graphical
representations and statistical analysis have been made on findings.
Finally, Section Seven includes the conclusions of this research work. It summarizes
the major contributions with findings. A discussion has been made and some
suggestions are included as the future directions.
Conclusion
Augmented Reality systems proposed an extraordinary world of visuals that
superimposes with the real element and computer-generated graphics. In this
research chapter is introduced the brief introduction about augmented reality and
problem definition along with motivation. Also, discussed the different section
which, defines the illustrate working of the proposed work.
References & Bibliography
1. R. Dnddera, C. Jia, V. Popescu, C. Nita-Rotaru, M. Dark, and C. S. York,
“Virtual Classroom Extension For Effective Distance Education,” IEEE
Computer Graphics and Applications, pp. 64-74, 2008.
2. W. Piekarski, B. Avery, B. H. Thomas, and P. Malbezin, “Hybrid Indoor and
Outdoor Tracking for Mobile 3D Mixed Reality,” Washington, DC, USA,
IEEE, pp. 266-267, 2003.
3. H. Liu, et al., “Mobile localization based on received signal strength and
pearson’s correlation coefficient,” International Journal of Distributed Sensor
Networks, vol. 2015, pp. 10, 2015.
10
4. A. Mulloni, and T. Drummond, “Real-time detection and tracking for
augmented reality on mobile phones,” IEEE Transactions on Visualization
and Computer Graphics, vol. 16, no. 3, pp. 355-368, 2010.
5. H. Liu, et al., “Mobile localization based on received signal strength and
pearson’s correlation coefficient,” International Journal of Distributed Sensor
Networks, vol. 2015, pp. 10, 2015.
6. W. Piekarski, B. Avery, B. H. Thomas, and P. Malbezin, “Hybrid Indoor and
Outdoor Tracking for Mobile 3D Mixed Reality,” Washington, DC, USA,
IEEE, pp. 266-267, 2003.
7. Bejczy, K. Antal, W. S. Kim, and S. C. Venema, “The phantom robot:
Predictive displays for tele-operation with time delay,” NASA Tech Brief 16,
7,item #104. From JPL new technology report NPO-18277/7794, July 1992.
8. Mc Farland, and E. Richard, “CGI delay compensation,” NASA Technical
Memorandum S6703, 1986.
9. G. D. Hager, and P. N. Belhumeur, “Real-time tracking of image regions
with changes in geometry and illumination,” In Proceedings of IEEE CVPR,
1996.
10. N. Dalal, and B. Triggs, “Histograms of oriented gradients for human
detection,” IEEE Computer Society Conference on Computer Vision and
Pattern Recognition, vol. 1, pp.886-893, 2005.
11. K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image
recognition,” In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pp. 770-778, 2016.
12. D. Borland, and R. M. Taylor II, “Rainbow color map (still) considered
harmful,” IEEE Computer Graphics and Applications, vol. 27, no. 2, pp. 14–
17, March 2007.
13. P. Anandan, “A computational framework and an algorithm for the
measurement of visual motion,” International Journal of Computer Vision,
vol. 2, pp. 283-310, 1989.
14. M. Uenohara, and T. Kanade, “Vision-based object registration for real time
image overlay,” In Proceedings of Computer Vision, Virtual Reality, and
Robotics in Medicine, pp. 13–22, 1995.
11
15. S. Feiner, B. MacIntyre, and D. Seligmann, “Knowledge-based augmented
reality,” Commun. ACM, vol. 36, no. 7, pp. 52-62, July 1993.
16. R. Dnddera, C. Jia, V. Popescu, C. Nita-Rotaru, M. Dark, and C. S. York,
“Virtual classroom extension for effective distance education,” IEEE
Computer Graphics and Applications, pp. 64-74, Jan./Feb. 2008.
17. Y. Shi, W. Xie, and G. Xu, “Smart remote classroom: creating a revolutionary
real-time interactive distance learning,” Proceedings of International
Conference on Web-Based Learning, LNCS 2436, 2002.
18. Azuma, Ronald, and G. Bishop, “Improving static and dynamic registration
in a see-through HMD,” In Computer Graphics, Annual Conference Series
(Proceedings of SIGGRAPH), pp. 197-204, 1994.
19. J. F. Rodgrigues, A. J. Traina, M. C. F. De Oliveira, and C. Traina, “Reviewing
data visualization: an analytical taxonomical study,” In Tenth International
Conference on Information Visualization, pp. 713-720, 2006.
20. Saipullah, and K. Muzzammil, “OpenCV based real-time video processing
using android smart phone,” International Journal of Computer Technology
and Electronics Engineering, vol. 1, no. 3, pp. 1-6, 2012.
21. J. J. Lugo, and A. Zell, “Frame- work for autonomous on-board navigation
with the AR drone,” Journal of Intelligent and Robotic Systems, vol. 73,
issue: 1-4, pp. 401-412, 2014.
22. M. Tuceryan, Y. Genc, and N. Navab, “Single-point active alignment method
(SPAAM) for optical see-through HMD calibration for augmented reality,”
In:, pp. 259-276, 2002.
12
CHAPTER 2
LUNG CANCER DETECTION USING IMAGE PROCESSING
Devershi Pallavi Bhatt Department of Computer Application School of Basic Sciences Manipal University Jaipur [email protected] Suman Bhakar* Department of Computer and Communication Engineering Manipal University Jaipur [email protected] (Corresponding Author) Vivek Sharma Department of Computer and Communication Engineering Manipal University Jaipur [email protected] ******************************************************************** Abstract: Lung cancer diagnosis is a challenging and difficult task. Radiologists face challenges in diagnose the Lung nodules accurately. Among men Lung Cancer is the most common kind of cancer and among women near to lung cancer, breast cancer has the second-highest mortality rate. According to clinical statistics, one out of eight women in their lives is diagnosed with breast cancer. Nevertheless, frequent clinical assessments and self-tests aid early detections and thereby improve the chance of survival significantly. Invasive tumor detection methods accelerate cancer spread to neighboring regions. A more reliable, effective, precise, and efficient, non-invasive cancer detection system is therefore needed. A computer program for error-free lung cancer detection using a CT scan is proposed in this report. Deep learning techniques such as convolution neural networks, sparse autoencoder and sparse autoencoder are used in this framework. They assess and evaluate the results of these methodologies with existing techniques. The analysis shows that the autoencoder stacked sparse performs better than other techniques. Keywords: Lung, Neural network, Deep learning ********************************************************************
13
Introduction
Lung cancer is one of the world's deadly diseases that easily destroy people's lives.
People's deaths due to lung cancer rise exponentially. The lung cancer detection and
diagnostic device are required to minimize the situation, to assist the radiologist and to
save a human life. In 2012 there have been about 1.83 million new cases of lung cancer
and over 1.5 million deaths are predicted, according to global cancer statistics [1].
In Ethiopia Lung Cancers Deaths were 1.584 or 0.25 percent of total fatalities
according to latest data released in 2017 by the World Health Organization. Medical
system imaging generates large quantities of medical picture with relevant disease
information. The medical picture is one of the important areas of study with many
illnesses in the fields of medical problems. Medical image processing is used in
analyzing, using different methods of medical image analysis to extract information
or expertise from all medical pictures and to solve medical problems. There are a
variety of medical imaging techniques that have been used to scan our bodies.
Figure 1: Chest X-Ray Image [1]
Tomography (CT scan), Positron Emission Tomography (PET), mammography, X-
ray, and Magnetic Resonance Image (MRI), ultrasound and so on are used to
diagnose and detect disease early [2]. However, computed tomography (CT scan)
imaging is one of the best imaging techniques in the field of lung cancer detection
and diagnosis, because it exposes any suspected and unsuspected CT-controlled lung
cancer nodules.
14
Bronchial Carcinoma
CT with special 3-D CAD systems are recognized and measured as the best standard
in the diagnosis of lung cancer. Discovering lung cancer in its early stages is
extremely critical. The 5-year survival rate for a lung cancer of specific stage is sixty
percentage, that explains that people who have that cancer are, on average, about
sixty percentage, people are likely to be alive for almost five years of detection.
Lung cancer is very critical, and it affects more victims than other cancers like breast
cancer, prostate cancer and colon cancer. The key cause for this is the asymptomatic
development of this cancer. If the lung cancer is found in its early stages, there is
chance of survival rate to a great extent according to the American Cancer Society.
The random detection of lung cancer in its initial stage in the x-ray image is
incredibly challenging. It is a fact that round lesions varying from 5–10 mm are
easily overlook.
Figure 2: Image Processing in Cancer Detection
Image processing for the identification of cancer is used. The detection of cancer
cells has proved to be successful. Two phases are primarily used for image pre-
processing. Segmentation of images Augmentation of images Separation is aimed
primarily to isolate the cells from the background and to improve images by
improving the contrast between cells of the cancer and the complete image scan of
the brain, lung, etc.
15
Image Segmentation
The first step is to divide the picture. Segmentation divides an image into its main
parts. Depending on the issue, the level of this subdivision is carried. It means that
when the tumor 's surface is identified; the segmentation will cease. The key goal is
therefore to separate the tumor from its context. surface is the key problem in the
edge detection process; Therefore, the scan appears very dim, which makes the edge
detection technique very confusing. Two steps have been taken to resolve the issue.
1. Histogram equalization
2. Thresholding
Histograms were equalized to increase the gray level near the edge of the image.
Equalized image thresholding is applied for obtaining a bilateral picture of the
cancer cells with gray level 1 and gray level 0 of the background.
Histogram Equalization
The histogram in an image shows how often the several gray levels in the image are
relatively frequent. Histogram modeling approaches provide a complexity technique
for adjusting the dynamic range and the contrast of a picture by modifying the
picture to the desired form of its intensity histogram. Histogram modelling operator
uses non- linear and non-monotonic transfer features to map amid input and output
image pixel intensity values. [4] The histogram equalization utilizes a monotonous,
nonlinear mapping that re-assigns the pixel intensity in the input frame such that the
final output consists of a single intensity distribution. The original image and
histogram equalized picture.
Thresholding
The areas of the image that match necessary objects to the areas of the image that
correspond to the background are very helpful to separate. Thresholding also
provides a simple and effective way to conduct this segmentation based on the
different intensities or colors of the front and background areas of an image. The
input of a threshold is a grey scale or color image. The output is a binary image
representing the segmentation in the event of a simple implementation. The
16
backdrop is displayed by black pixels and the foreground is shown by white pixels.
A single parameter known as the intensity threshold is specified for the segmentation
in simple operation. Every pixel in the picture is compared to the threshold in a
single pass. If the pixel intensity is greater than the threshold, the pixel is set to
white in the display. On the other hand, it is set to black if it is below the threshold.
Image Enhancement
In contrast, the fundamental change in the picture is change. A contrast from the
normal region with the tumor may occur on an MRI but below the human perception
threshold. Thus, a sharpening filter is added in the digital picture to enhance the
contrast between the normal region and the tumor region, thus greatly enhancing the
image contrast.
Conclusion
A variety of problem areas such as finance, medicine, engineering, geology, physics,
and biology were effectively applied to neural networks. Statistically, due to their
potential use in prediction and classification problems, neural networks are
interesting.The non-linear data-driven autonomous adaptive forms are artificial
neural networks (ANNs). ANN is a dominant modeling tool, especially in the case of
unknown data relationship. ANN can recognize and study associated patterns
between input data sets and the relevant goal values. Following preparation, ANN
can predict the outcomes of new, independent input data. ANNs mimic the human
brain learning process and can handle nonlinear and complex data problems even
when the detail.
References & Bibliography
1. R. Dnddera, C. Jia, V. Popescu, C. Nita-Rotaru, M. Dark, and C. S. York,
“Virtual Classroom Extension For Effective Distance Education,” IEEE
Computer Graphics and Applications, pp. 64-74, 2008.
2. W. Piekarski, B. Avery, B. H. Thomas, and P. Malbezin, “Hybrid Indoor and
Outdoor Tracking for Mobile 3D Mixed Reality,” Washington, DC, USA,
IEEE, pp. 266-267, 2003.
17
3. H. Liu, et al., “Mobile localization based on received signal strength and
pearson’s correlation coefficient,” International Journal of Distributed Sensor
Networks, vol. 2015, pp. 10, 2015.
A. Mulloni, and T. Drummond, “Real-time detection and tracking for
augmented reality on mobile phones,” IEEE Transactions on Visualization
and Computer Graphics, vol. 16, no. 3, pp. 355-368, 2010.
4. H. Liu, et al., “Mobile localization based on received signal strength and
pearson’s correlation coefficient,” International Journal of Distributed Sensor
Networks, vol. 2015, pp. 10, 2015.
5. W. Piekarski, B. Avery, B. H. Thomas, and P. Malbezin, “Hybrid Indoor and
Outdoor Tracking for Mobile 3D Mixed Reality,” Washington, DC, USA,
IEEE, pp. 266-267, 2003.
6. Bejczy, K. Antal, W. S. Kim, and S. C. Venema, “The phantom robot:
Predictive displays for tele-operation with time delay,” NASA Tech Brief 16,
7,item #104. From JPL new technology report NPO-18277/7794, July 1992.
7. Mc Farland, and E. Richard, “CGI delay compensation,” NASA Technical
Memorandum S6703, 1986.
8. G. D. Hager, and P. N. Belhumeur, “Real-time tracking of image regions
with changes in geometry and illumination,” In Proceedings of IEEE CVPR,
1996.
9. N. Dalal, and B. Triggs, “Histograms of oriented gradients for human
detection,” IEEE Computer Society Conference on Computer Vision and
Pattern Recognition, vol. 1, pp.886-893, 2005.
10. K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image
recognition,” In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pp. 770-778, 2016.
11. D. Borland, and R. M. Taylor II, “Rainbow color map (still) considered
harmful,” IEEE Computer Graphics and Applications, vol. 27, no. 2, pp. 14–
17, March 2007.
12. P. Anandan, “A computational framework and an algorithm for the
measurement of visual motion,” International Journal of Computer Vision,
vol. 2, pp. 283-310, 1989.
18
13. M. Uenohara, and T. Kanade, “Vision-based object registration for real time
image overlay,” In Proceedings of Computer Vision, Virtual Reality, and
Robotics in Medicine, pp. 13–22, 1995.
14. S. Feiner, B. MacIntyre, and D. Seligmann, “Knowledge-based augmented
reality,” Commun. ACM, vol. 36, no. 7, pp. 52-62, July 1993.
15. R. Dnddera, C. Jia, V. Popescu, C. Nita-Rotaru, M. Dark, and C. S. York,
“Virtual classroom extension for effective distance education,” IEEE
Computer Graphics and Applications, pp. 64-74, Jan./Feb. 2008.
16. Y. Shi, W. Xie, and G. Xu, “Smart remote classroom: creating a revolutionary
real-time interactive distance learning,” Proceedings of International Conference
on Web-Based Learning, LNCS 2436, 2002.
17. Azuma, Ronald, and G. Bishop, “Improving static and dynamic registration
in a see-through HMD,” In Computer Graphics, Annual Conference Series
(Proceedings of SIGGRAPH), pp. 197-204, 1994.
18. J. F. Rodgrigues, A. J. Traina, M. C. F. De Oliveira, and C. Traina, “Reviewing
data visualization: an analytical taxonomical study,” In Tenth International
Conference on Information Visualization, pp. 713-720, 2006.
19. Saipullah, and K. Muzzammil, “OpenCV based real-time video processing
using android smart phone,” International Journal of Computer Technology
and Electronics Engineering, vol. 1, no. 3, pp. 1-6, 2012.
20. J. J. Lugo, and A. Zell, “Frame- work for autonomous on-board navigation
with the AR drone,” Journal of Intelligent and Robotic Systems, vol. 73,
issue: 1-4, pp. 401-412, 2014.
21. M. Tuceryan, Y. Genc, and N. Navab, “Single-point active alignment method
(SPAAM) for optical see-through HMD calibration for augmented reality,”
In:, pp. 259-276, 2002.
19
CHAPTER 3
SURVEY OF 5G ANTENNA FOR INDUSTRIAL
AUTOMATION APPLICATIONS
Tapan Nahar
Research Scholar
Department of Electronics & Communication Engineering
Manipal University Jaipur, India.
Sanyog Rawat
Professor
Department of Electronics & Communication Engineering
Manipal University Jaipur, India.
[email protected] (Corresponding Author)
******************************************************************** Abstract: High performance millimeter-wave 5G antenna solution is required in
industrial automation which can effectively mitigate the problems associated with
currently used wireless technologies such as high latency or response time, insecure
communication, low transmission and reception speed, limited bandwidth, lower
capacity of network, connectivity issues due to multiple devices on network,
congestion in the radio channels, higher energy consumption and higher cost of
wired circuits and maintenance. Cost efficient solution is needed, which could
replace the computer based or programmable logic controller based hard wired
automation. To execute a highly flexible wireless automation of industries,
technology must be support mission-critical services which needs high reliability,
deterministic traffic properties and very low communication delays. Further, should
enable process optimization and communication for time critical/ non-time critical,
Intra/inter-enterprise communication between connected products, remote control,
video driven interaction between cobots and humans. 5G will provide wide
bandwidth than 4G LTE (long-term evolution) and Wi-Fi (wireless-fidelity), faster
connection, low latency and higher capacity support to connect thousands of devices
in smaller area which will accelerate production facilities. It’s ability to integrate
20
with time-sensitive networking (TSN) will support to achieve goal of smart
industries and enhancing the Ethernet to become more “deterministic”, available on
time with high reliability, reduced jitter and small latency. This paper presents the
survey of current issues of wireless industrial automations, requirement of 5G, and
review of 5G antennas for industrial automation applications.
Keywords: 5G, millimeter-wave antenna, wireless industrial automation, Industry
4.0, Industrial IoT (Internet of Things)
******************************************************************** Introduction
Industry 4.0, Industrial IoT, and the smart factory are the future technologies of
industrial production [1]. Manufacturing plant and intra logistics planning should be
more flexible, automated, and efficient, which necessitates the use of the appropriate
communication architecture and complete connectivity. The implementation of 5G
in the industry will offer up a lot of new capabilities [1], [2]. Researchers are
extremely interested in 5G-based industrial automation. Collaborative industrial
robots (cobots) are in high demand. It is critical to integrate 5G with robots. In
robotics, real-time control is implemented through the use of sensors for a variety of
functions. It necessitates the use of several complicated protocols, numerous sensors,
and more flexible and intelligent motion control. Due to severe connection latency,
implementing real-time control utilising an external PC is extremely difficult, if not
impossible. A 5G-based public network / personal network might close this gap, thus
further research is needed in this area [2].
5G is the most recent improvement in future wireless communication technology
that has yet to be introduced in India. The ideal millimetre wave antenna for 5G has
yet to be discovered. High data rates, large bandwidth, and low latency services will
be provided via millimetre wave bands [3]. The strength of 5G mobile networks will
enable ultra-high definition video streaming, conferencing, and broadcasting at
higher mobility without losing connection, industrial automation using billions of
device-to-device connectivity, mission-critical applications such as tele-surgery and
driverless cars due to low latency and highly reliable 5G networks, and increased
21
productivity due to real-time, high-quality data analytics [4]. In all of these
applications, a low-cost planar mm wave antenna will be utilised to transmit and
receive millimetre wave signals, which is appealing to automated smart industries
due to the high data rate and low latency that can be obtained [5].
The fourth industrial revolution is underway in the automation business, with fully
networked and automated "cyber-physical" plants in the works. This transformation
requires efficient plant networking and media-free communication of commodities
and equipment, and effective digitization is a vital component of that. The 3rd
Generation Partnership Programme (3GPP) is sponsoring the 5G system, which will
provide concepts and technologies that will make manufacturing businesses more
efficient. Wireless automation now accounts for 4% of the industrial automation
industry [1], [2]. Technology must enable mission-critical services that require high
dependability, predictable traffic characteristics, and extremely minimal communication
latency in order to implement a highly flexible wireless automation of industries.
Process optimization and communication for time-critical/non-time-critical, intra-
/inter-enterprise communication between linked goods, remote control, and video-
driven interaction between cobots and humans should also be possible [6].
This chapter is divided into seven sections. Introduction of future generation
industrial automation is introduced in Section 1. Section 2 describes requirements of
industries in terms of automation. Challenges in currently used industrial automations
are presented in Section 3. Section 4 highlights the role of 5G in industrial
automation. Investigation of reported works in 5G antenna for industrial applications
are discussed in Section 5. Section 6 consists of challenges in the 5G antennas.
Chapter is concluded in Section 7.
Requirements of Industrial Automation
There are various operations and application which is required in Industry 4.0 or
future generation wireless industrial automation [1]–[3].
• Controlling or Operating the instruments from remote place, like assembly
line robotic systems on the manufacturing plant. Welding, painting, and
assembling are examples of typical uses [1].
22
• Remotely managing supply chain equipment, for example, an employee can
manage untethered robots; common examples include unmanned ground
vehicles or forklifts [3].
• Monitoring the instruments from remote location, like the transmission of
diagnostic information, promises that maintenance team are ready to perform
repair work as needed [2].
• Machine-to-machine communication: machine-to-machine communication
in a closed loop to improve industrial processes [1], [3].
• Intra- and inter-enterprise information exchange: allowing monitoring assets
scattered across wider geographical locations across the production process [3].
• Assistance towards augmented reality in designing, service, and repairing
(through simulations): augmented reality can be used to support in the
accomplishment of procedural tasks in the design, servicing, and maintenance
domains [2].
• Wireless networks for transmission [1].
Challenges of Industrial Automation
Predictive and prescriptive maintenance plans, self-healing manufacturing lines with
near 0% downtime, remote control procedures, autonomous robots, and augmented
reality systems are all part of Industry 4.0. These capabilities necessitate improved
factory-floor connection. As a result, wireless communication is becoming more
business and mission important, necessitating increasingly demanding dependability,
latency, and security requirements. Not all wireless technologies can keep up with
today's smart industrial demands [1], [2].
Wireless solutions that are now accessible have a slew of issues. Manufacturing
nowadays is based on the integration of several systems, which results in large
amounts of data being produced. This massive growth in data collecting requires
quicker transmission and analysis with broadband capability and small response
time (latency), which is a significant problem for present technology. The current
frequency range employed in wireless technologies such as Bluetooth and WLAN
has a significant risk of being hacked. Because of the complexity of these wireless
protocols, there are unforeseen dangers in wireless equipment solutions which could
23
enable hackers to take control of a machine. The lack of available bandwidth on
wireless networks, as well as interference from competing services, is a major
concern [1], [3], [7]. With billions of devices, radio channel congestion is a major
issue. Adaptive frequency hopping (AFH) allows a Bluetooth device to discard
channels with a lot of data collisions. The effectiveness in a mixed-signal environment
is unclear, and collisions and data losses will occur if the radio formats do not
identify one other. Due to interference from the environment, an industrial sensor
that loses its control signal or ceases operating might have disastrous effects. Real-
time control is difficult, if not impossible, due to communication latency. For a
machine with more than 100 sensors and/or actuators, factory automation necessitates a
response time of less than 10 milliseconds. The transmission of raw sensor data at a
rapid update rate necessitates a lot of bandwidth. The proper operation of most
enterprises relies heavily on equipment maintenance. Depending on how long a
process is paused, an unexpected breakdown of equipment can cost a company a lot
of money. It is necessary to have a device or technology that can support augmented
reality solutions. Costly programmable logic circuits (PLCs), PC-based automation,
and hardwired circuits are being replaced by low-cost 5G-based antenna receivers
[1], [2].
Role of 5G in Industrial Automation
Upcoming communication systems are projected to transform present industry
structure by meeting demanding standards for ultra-high dependability and ultra-low
latency. In this vein, Millimeter-wave communication, which runs at frequencies
from 30 to 100 GHz, is the essential to execute future industrial automation. 5G is
quickly becoming the preferred link, acting as a conduit for data flow across all
elements of the industrial environment. To address the aforementioned issues, a
high-performance millimeter-wave 5G antenna should be used in 5G-based
industrial automation processes. Wide band and high gain millimeter-wave antennas
with narrow beamwidth and scanning capabilities will be developed, allowing for
high speed, low latency, low jitter, enhanced connection, increased capacity, cost-
effective, low power consumption, and highly dependable systems [7]–[10].
Because of their simplicity of manufacture on PCB (printed circuit board) together
24
with other electronics components and circuitry, microstrip antennas are becoming
increasingly popular. These are increasing at a faster rate in the communication
sectors because to their light weight and small size. Because of their cost-effectiveness,
planar construction, low profile, and simple production procedures, they may be
incorporated and suitable for embedded antennas. These antennas may be used to get
linear and circular polarisation radiation characteristics as well as multiband
operations [11].
The use of a high-performance millimeter-wave 5G antenna can alleviate problems
in the wireless automation sector. The millimeter-wave spectrum's wide bandwidth
will allow for minimal latency and speedier transmission [12],[13]. Since of their
narrow coverage range, millimeter-wave frequencies are a preferable choice for
interior communication because they have a lower risk of being hacked. Numerous
devices can access multiple channels and interact without interference or radio
collisions due to the lack of other services in the millimetre wave range and the
availability of free spectrum. It also offers improved connection, more capacity, and
a lower risk of interference. The 5G spectrum can help minimise response time. The
use of millimeter-wave antenna systems can allow a high update rate. 5G will
provide ultra-high-definition video services and ultra-fast internet speeds, allowing
for augmented reality solutions such as video broadcasting to deliver real-time help
and services from professionals. By replacing hefty PCs and hardwired electronics
with millimeter-wave 5G antenna receivers, the overall system cost will be
decreased [1], [2], [14].
Investigation of 5G Antennas
Currently, industrial automation antennas operate in the sub 1 GHz and sub 6 GHz
bands. Microwave antennas, which have an omnidirectional radiation pattern and a
restricted bandwidth, are used in industrial automation. Collinear array antennas
(high gain antennas that transmit signal in multiple directions), width antennas
(mobile worker applications), Yagi antennas (directional antennas), parabolic
reflector antennas (narrow beam antennas), and low profile panel antennas/chip
antennas are some of the most common industrial antennas. Wi-Fi, Bluetooth, RFID,
Multiband GSM, WLAN, and ZigBee are examples of common wireless technologies
25
that are employed [1]. Frequencies from 2.4 GHz to 5 GHz is utilized by the
antennas. Restricted bandwidth, high latency, limited data rate, large size, limited
battery life, reduced security, limited number of connected devices, tiny signal to
noise ratio, and other issues plague these antennas and technology [3]. Low-profile
5G antennas for industrial applications that support the millimeter-wave spectrum
are required to address these concerns. Due to the lack of other commercial uses, the
millimeter-wave spectrum is open to the public and allows ultra-wideband, low-
latency, high-capacity communication. Multiple input multiple output (MIMO)
transceivers are employed at Millimeter-wave frequencies to give a high signal
quality, noise suppression, wide band operations, directional properties, and support
a large number of users. Despite the fact that this radio wave behaviour was
traditionally thought to create signal interference, MIMO-enabled antennas can take
use of it to increase communication performance [15]. All 802.11n wireless
products, in fact, feature MIMO, which is important for allowing such devices to
deliver much higher communication speeds. Despite the fact that this radio wave
behaviour was traditionally thought to create signal interference, MIMO-enabled
antennas can take use of it to increase communication performance. Antenna
installation challenges include frequency and polarity considerations, mounting
position difficulties, safety concerns, and gain calculation [16], [17].
Because there has yet to be a 5G spectrum auction in India due to prohibitively high
prices, telecom firms are hesitant to acquire it, and development on 5G antennas
continues. The Indian government is assisting businesses in implementing Industry
4.0. Bajaj Auto, Maruti Suzuki, Ford, Hyundai, Tata Nano, and others have already
started automating their manufacturing plants in India with Collaborative Robots.
The government has pledged over $1 billion to start plants in Tamil Nadu, Himachal
Pradesh, Andhra Pradesh, Gujarat, and Rajasthan, among other states. With the help
of the IISc Centre for Product Design and Manufacturing, India's first smart industry
is taking shape in Bangalore, where machines can communicate with one another [3].
Various 5G antennas for Industrial IoT applications have been mentioned in the
literature. Paper [5] demonstrates multiband small twin band and triple band
antennas. A printed dipole with quarter wave monopole is used in this dual band
26
antenna, which is manufactured using a Rogers RT5880LZ with a height of 0.254
mm. The proposed structure operates in two bands at 5.8 GHz and 28 GHz, with
percentage bandwidths of 9.6% and 20.17 percent, respectively. Another quarter
wave monopole is put on top to provide triple band functioning. The proposed
antenna has a bandwidth of 12.71 percent, 11.32 percent, and 18.3 percent for the
3.5 GHz, 5.8 GHz, and 28 GHz bands, respectively. Variable gain is one of the
structure's key flaws. Paper [1] describes a robust dual-virtual-patch antenna array
for factory automation. The array of radiating elements uses patches of tinned steel
and substrate of a foam PVC (Polyvinyl chloride) material. Foamed PVC substrate
has a low moisture absorption rate, is lightweight, and has adequate chemical
resistance. The proposed antenna has a decent gain of 9.8 dBi, although it has a
narrowband characteristic. Paper [11] shows a compact flexible conformal antenna
built of acrylic sheet. The proposed antenna has multiband capabilities and is
inexpensive, although it has restricted bandwidth and gain. Paper [18] describes a
four port super wideband MIMO antenna. A CSRR (complementary split ring
resonator) and an L-shaped slit are carved into the sickle-shaped antenna element to
prevent Bluetooth, Wireless local area networks, and satellite communication. Its
disadvantages include its large size and limited gain. Paper [19] shows a
multifunctional MIMO antenna that can operate in several bands. To eliminate
mutual coupling between components, a two-element patch array is employed on the
top layer, and a Structure of T-shape is placed in the lower metallic layer. The
proposed antenna is made out of FR4 and has a gain of 2.7 dBi. This antenna's main
drawbacks are its large bulk and restricted bandwidth. Paper [10] describes half-
circular patch antenna with ultra wide band characteristics for IoT applications. The
proposed antenna may operate in several bands and has good impedance matching,
but its size is a major drawback. These articles give a comprehensive overview of
current antenna system research and development in the realm of industrial
automation.
In nations such as Germany, China, South Korea, the United States, and the United
Kingdom, millimeter-wave and multiband antennas are utilised for wireless
industrial automation. Due to the lack of commercial usage, the millimeter-wave
spectrum has a large amount of open bandwidth. mmWave bands have significantly
27
less interference than the busy unlicensed 2.4 GHz region, where many current
industrial wireless systems operate. Due to the high data rate and small size of
directional antennas at this range, radio-frequency identification (RFID) is also
moving towards millimetre wave identifiers (MMID). Machine-to-machine
communication with ultra-high reliability and minimal latency is possible because to
millimeter-wave antennas. The vast bandwidth of the millimeter-wave spectrum can
pave the way for a wide range of new industrial automation capabilities. The
Millimeter-wave band's huge bandwidth can open the path for a slew of wireless
factory automation capabilities. Automated visual monitoring and control,
smart logistics tracking, image guided robotic assembly, and fault identification are
all possible uses for wireless smart cameras. Robots, equipment, and other factory
automated systems having vision capabilities can interact effectively with things and
travel safely through their environments [1], [3].
Antennas employ a variety of technologies such as multiple input multiple output
[15], sophisticated beam forming [20], and smart approaches to enable multipath
communication, a high signal to noise ratio, and the ability to handle a larger
number of devices in a noisy environment. To reduce millimeter-wave losses, high-
efficiency and high-gain antennas are used. Outdoor communication is done with
directional antennas, while indoor communication is done with omnidirectional
antennas. The capacity of an antenna to operate in several bands and polarizations
needs a multi-layered design. A dependable multi-layering approach can ensure that
the substrate is used efficiently in these antennas. Ericsson, a Swedish multinational,
has announced 5G-based automated plants in China, Finland, the United States,
Sweden, Texas, Lewisville, and North America, where improved antenna will be
manufactured to power 5G networks for wireless automation. For IoT, Nokia teamed
up with Omron and NTT Docomo. Telia and Nokia worked with Intel to test a 5G
smart factory at 28 GHz. In its Nanjing factory, Ericsson collaborated with China
Mobile to test 1,000 high-precision screwdrivers that were automatically connected.
Ericsson's facility in Estonia is experimenting with broadband IoT [1], [3].
Various antennas for 5G-based IoT and industrial automation have been reported in
the literature. Paper [10] describes a multiband shared aperture antenna. The
proposed antenna works in the sub-6 GHz and millimeter-wave bands. The antenna
28
is made up of concentric slots on the ground plane that are fed via an open ended
microstrip feed line. The antenna in question can operate in the octaband frequency
range. The antenna's gain variation is a significant constraint. Maintaining a constant
gain throughout a wide range of operations is difficult. In paper [8] a 2*2 high gain
slotted patch array was shown. The proposed structure has a high gain of 23.9 dB
and efficiency of 99.9%, although it has a huge volume and limited bandwidth.
Paper [21] describes a dual band meandered line monopole antenna. Low gain is a
key shortcoming of the discussed antenna, which has a very small size of 0.250.3
mm2 and operates in dual bands at 28 GHz and 60 GHz. Paper [7] discusses a
textile-based electromagnetic band gap antenna. The proposed antenna has a flexible
design and is acceptable for operation, although it has a significant gain limitation.
Paper [16] describes an eight-port, four-element MIMO antenna. Between inter-
elements, spatial diversity is exploited. Although the presented antenna covers a
wide range of 5G NR bands, it has a low gain. Performance comparisons of various
antennas for 5G based industrial automation is shown in Table1.
Table 1: Literature Survey of 5G Antennas for Industrial Automation
Technique Merits Demerits a printed dipole with quarter wave monopole which are fabricated on Rogers RT5880LZ with thickness of 0.254 mm [5]
Resonates at 3.5 GHz, 5.8 GHz and 28 GHz band with bandwidth of 12.71%, 11.32% and 18.3% respectively.
Variable gain is major limitations of this structure
A durable dual-virtual-patch antenna array [1]
low moisture absorption, light weight and sufficient chemical resistance properties, good gain of 9.8 dBi
Narrowband operations
compact flexible conformal antenna made on acrylic sheet [11]
multiband operations and low cost
limited bandwidth and gain
CSRR (complementary split ring resonator) and an slit of L-shape are carved into the antenna of sickle-shape [18]
super wideband MIMO operation
Large size and limited gain
Two element patch array is used on top layer and T shaped element is introduced in ground plane [19]
multiband MIMO operation, reduced mutual coupling
Large size and limited bandwidth
29
semi-circular patch antenna [9]
multiband operation with good impedance matching
large size
concentric slots designed on ground plane and feed by open ended microstrip feed line [10]
octa-band operations Variation in gain
2*2 high gain slotted patch array [8]
high gain of 23.9 dB and efficiency of 99.9%
large volume and limited bandwidth
meandered line monopole antenna [21]
very small size of 0.25×0.3 mm2 and operates in dual band at 28 GHz and 60 GHz
low gain
Textile based Electromagnetic band gap antenna [7]
flexible design and suitable operation
limited gain
Eight port four element MIMO antenna [16]
covers various 5G NR band low gain
Challenges of 5G antenna for Industrial Automation
High connection losses, small scale fading and shadowing impact of millimeter
Wave band, narrow coverage range, reflections due to metallic body and
intermediate barriers, and other factors are major challenges in 5G antenna design.
Because the wavelength of 5G millimeter wave frequencies is so narrow, diffraction
around obstructions is a concern. Non-line of sight propagation is influenced by
considerable attenuation and minimum multipath connectivity, while line of sight
propagation is attenuated due to absorption by barriers. There have been very few
works on MIMO antennas at millimeter wave frequencies to far, with the majority of
work planned in the sub-6 GHz or microwave spectrum. MIMO antennas operating
in the millimeter wave range are required to develop for 5G in order to enable wide
bandwidth and high data rates with improved SNR and capacity. Very low side lobe
levels in the antenna radiation pattern are necessary for steerable beam
characteristics. There have been very few studies on 2D beam steering. At the mm
wave band, 2D beam steering is essential to enhance the signal quality, suppress
noise and reduce link losses. Circular polarized antennas will be more beneficial in
reducing polarization mismatching losses. At the mm wave bands, there are very few
works on circularly polarized antennas. Although only a few studies have reported
30
antennas with gains of 19 to 22 dB, there are other drawbacks such as big size,
complex design, limited beam scanning range, and low bandwidth. There have been
reports of 5G antennas with broadband properties in the literature, but they are
constrained by low gain [7], [16], [21].
Conclusion
With millimeter-wave 5G antennas, machine-to-machine communication with ultra-
high dependability and lowest latency is conceivable. The millimeter-wave spectrum's
huge bandwidth can open the path for many other modern factory automation services.
Automated visual tracking and surveillance, smart logistics inventory control, image
guided robotic assembly, and fault identification are among uses that can benefit
from wireless smart cameras technology. Robots, machines, and other factory
automation systems having vision capabilities can engage meaningfully with things
and travel safely through their environments. Antennas use a range of technologies
to provide multipath communication, a high signal quality, noise suppression, and
the capacity to manage a higher number of devices in a noisy environment,
including multiple input multiple output, advanced beam formation, and smart
solutions. Antennas which have good gain and efficiency are utilized to decrease
millimeter-wave losses. Directional antennas are used for outdoor communication,
whereas omnidirectional antennas are used for internal communication.
References & Bibliography
1. Parthiban P. IoT Antennas for Industry 4.0 – Design and Manufacturing with
an Example. In: 2020 IEEE International IOT, Electronics and Mechatronics
Conference (IEMTRONICS). ; 2020:1-5. doi:10.1109/IEMTRONICS51293.
2020.9216349
2. Aleksy M, Dai F, Enayati N, Rost P, Pocovi G. Utilizing 5G in Industrial
Robotic Applications. In: 2019 7th International Conference on Future
Internet of Things and Cloud (FiCloud). ; 2019:278-284. doi:10.1109/
FiCloud.2019.00046
3. Andrews JG, Buzzi S, Choi W, et al. What Will 5G Be? Published online
May 12, 2014. http://arxiv.org/abs/1405.2957
4. Nahar T, Rawat S. Survey of various bandwidth enhancement techniques
31
used for 5G antennas. Int J Microw Wirel Technol. Published online 2021:1–
21. doi:10.1017/S1759078720001804
5. Ruchi, Patnaik A, Kartikeyan M V. Compact dual and triple band antennas
for 5G-IOT applications. Int J Microw Wirel Technol. Published online 2021:
1–8. doi:10.1017/S1759078721000301
6. Hong W, Baek KH, Lee Y, Kim Y, Ko ST. Study and prototyping of
practically large-scale mmWave antenna systems for 5G cellular devices.
IEEE Commun Mag. 2014;52(9):63-69. doi:10.1109/MCOM.2014.6894454
7. Wissem ELM, Sfar I, Osman L, Ribero J-M. A Textile EBG-Based Antenna
for Future 5G-IoT Millimeter-Wave Applications. Electronics. 2021;10(2).
doi:10.3390/electronics10020154
8. Mohamed MY, Dini AM, Soliman MM, Imran AZM. Design of <tex>$2\
times 2$</tex> Microstrip Patch Antenna Array at 28 GHz for Millimeter
Wave Communication. In: 2020 IEEE International Conference on
Informatics, IoT, and Enabling Technologies (ICIoT). ; 2020:445-450.
doi:10.1109/ICIoT48696.2020.9089458
9. Ranjan P, Kumar A, Joshi BC. UWB Semi-circular Patch Antenna for IoT
Applications. In: 2021 2nd International Conference for Emerging
Technology (INCET). ; 2021:1-5. doi:10.1109/INCET51464.2021.9456239
10. Hussain R. Shared-Aperture Slot-Based Sub-6-GHz and mm-Wave IoT
Antenna for 5G Applications. IEEE Internet Things J. 2021;8(13):10807-
10814. doi:10.1109/JIOT.2021.3050383
11. Singh D, Jha KR, Sharma SK. Low Cost Flexible Antenna for IoT Applications.
In: 2020 IEEE International Symposium on Antennas and Propagation and
North American Radio Science Meeting. ; 2020:1929-1930. doi:10.1109/
IEEECONF35879.2020.9329548
12. Solomitckii D, Orsino A, Andreev S, Koucheryavy Y, Valkama M.
Characterization of mmWave Channel Properties at 28 and 60 GHz in Factory
Automation Deployments. In: 2018 IEEE Wireless Communications and
Networking Conference (WCNC). ; 2018:1-6. doi:10.1109/WCNC.2018.
8377337
13. Alonzo M, Baracca P, Khosravirad SR, Buzzi S. URLLC for Factory
32
Automation: an Extensive Throughput-Reliability Analysis of D-MIMO. In:
WSA 2020; 24th International ITG Workshop on Smart Antennas. ; 2020:1-6.
14. Hong W, Baek K-H, Lee Y, Kim Y, Ko S-T. Study and prototyping of
practically large-scale mmWave antenna systems for 5G cellular devices.
IEEE Commun Mag. 2014;52(9):63-69. doi:10.1109/MCOM.2014.6894454
15. Frangieh T, Musilmani N, Sarkis R. MIMO Performance Evaluation of 5G
Antennas for Virtual Reality Applications. In: 2019 PhotonIcs Electromagnetics
Research Symposium - Spring (PIERS-Spring). ; 2019:2728-2734. doi:10.1109/
PIERS-Spring46901.2019.9017408
16. Chattha HT, Ishfaq MK, Khawaja BA, Sharif A, Sheriff N. Compact Multiport
MIMO Antenna System for 5G IoT and Cellular Handheld Applications. IEEE
Antennas Wirel Propag Lett. 2021;20(11):2136-2140. doi:10.1109/LAWP.
2021.3059419
17. Zhang S, Ying Z, Xiong J, He S. Ultrawideband MIMO/Diversity Antennas
With a Tree-Like Structure to Enhance Wideband Isolation. IEEE Antennas
Wirel Propag Lett. 2009;8:1279-1282. doi:10.1109/LAWP.2009.2037027
18. Kumar P, Urooj S, Malibari A. Design and Implementation of Quad-Element
Super-Wideband MIMO Antenna for IoT Applications. IEEE Access.
2020;8:226697-226704. doi:10.1109/ACCESS.2020.3045534
19. Tyagi D, Kumar S, Kumar R. Multifunctional Antenna Design for Internet of
Things Applications. In: 2021 7th International Conference on Advanced
Computing and Communication Systems (ICACCS). Vol 1. ; 2021:557-560.
doi:10.1109/ICACCS51430.2021.9441696
20. Ansari M, Zhu H, Shariati N, Guo YJ. Compact Planar Beamforming Array
With Endfire Radiating Elements for 5G Applications. IEEE Trans Antennas
Propag. 2019;67(11):6859-6869. doi:10.1109/TAP.2019.2925179
21. Burasa P, Djerafi T, Wu K. A 28 GHz and 60 GHz Dual-Band On-Chip
Antenna for 5G-Compatible IoT-Served Sensors in Standard CMOS Process.
IEEE Trans Antennas Propag. 2021;69(5):2940-2945. doi:10.1109/TAP.
2020.3025236
33
TAPAN NAHAR is presently Ph.D Scholar in Electronics and
Communication Department, Manipal University Jaipur, India. He
graduated with Bachelor of Engineering (BE) in Electronics and
Communication from Global Institute of Technology, Jaipur, India
in 2009. He did his M.Tech degree in the Digital Communication
from Poornima College of Engineering, Jaipur, India in 2015. He is having
experience of many years in teaching to undergraduate disciplines. He is pursuing
PhD degree in the research area of planar antennas for 5G mobile technology. He
has to his credit several technical papers in International & National Conferences
and books on various subjects.
SANYOG RAWAT is presently associated with Electronics and
Communication Engineering Department, Manipal University
Jaipur. He has been into teaching and research for more than
seventeen years. He graduated with Bachelor of Engineering (B.E.)
in Electronics and Communication, Master of Technology (M.Tech)
in Microwave Engineering and Ph.D in the field of Planar Antennas.
Dr. Rawat has been engaged actively in the research areas and published more than
80 research papers in peer-reviewed International Journals, Book series and
IEEE/Springer conferences. He has organized several workshops, seminars, national
and international conferences. He has been empanelled in the editorial board of
various national and International Journals. He has supervised nearly 30 M.Tech
Dissertations and 05 Ph.D’s and guiding 06 scholars for Ph.D. He has also edited the
books on proceedings of the International conference on Soft Computing Theories
and Applications (SoCTA-2016, 2017), proceedings of International Conference on
Smart Systems, Innovations and Computing (SSIC-2017) and International
Conference on Engineering Vibrations, Communication and Information Processing
(ICoEVCI, 2018) for Springer publication. His current research interests include
reconfigurable RF printed circuits, passive and active microwave integrated circuits.
He has visited countries like Japan, Thailand, Malaysia, UAE and Indonesia for
academic and research work. He is also a member of several academic and
professional bodies i.e. Fellow IETE, Member IE and ISLE.
34
CHAPTER 4
KATHPUTLI
The Art of Rajasthan
Satakshi Bisen
Student, Master of Fashion Management
National Institute of Fashion Technology
Kolkata, West Bengal- 700098, India
******************************************************************** Abstract: The Rajasthan Kathputli, an attractive art because it’s a part of Rajasthan’s
rich culture and the style of presentation that this craft offers. Music plays a very
important role. It is always amusing to see brightly colored puppets dancing on stage
in quirky steps, making squeaky noises. There are different stages of making
Kathputli and many people involved in it. The research highlights the decline in this
art and the economic status of market and artisans. The research looks into the
making of Kathputli and also looking into the problems and solutions.
Keywords: Kathputli Making, Kathputli Market, Livelihood, Supply Management,
Artisans Productivity, Community, Factors Analysis.
******************************************************************** Introduction
Embellished with beautiful bright coloured clothes, large beautiful eyes, nimble
limbs that dance in from of fascinate audience, it is not a dance performance
performed by living beings, but the puppets move with the fingers of puppeteer [2].
The Kathputli in Rajasthan are one among the well- known sources of amusement
within the state. Kathputli is an ancient sort of artistic expression that’s a variation of
storytelling or human staging. It is a well-known form of folk entertainment. In this
art a drama is created that’s primarily acted out by specific character and
manipulated by a puppeteer. Kathputli dance and performance is one among the
main tourist attractions of Rajasthan [10].
35
The word Kathputli made from two words “Kath” that means wood and “Putli”
which means toy. Traditionally it was earlier promoted by kings and well-off
families [22].
Figure 1: Kathputli
Roots of Kathputli
The community involved in craft belongs to nomadic community known as Putli
Bhatt or Nat. Originally, they belonged to Nagaur area in the Marwar region. Bhatt’s
are the performing artists who moved from cities to countries to showcase the Art
[18]. They entertained gatherings by narrating the stories and achievements of
mythological characters and social traditions. They gained popularity among the
royal kingdoms of Rajasthan and received great honour and appreciations from the
Royal Courts of Kings and Queens [21].
Figure 2: Traditional Kathputli [21]
Today Bhatt community settled in different parts of Rajasthan and are still practicing
this traditional art. The language they speak is Marwari. Rajasthan is the hub of
Kathputli tradition.
36
Figure 3: Kathputli Show
Figure 4: Kathputli show organized by the people of Helping Hand, NGO
Design Inspiration
The inspirations for the design of Kathputli taken from the culture and tradition of
the stories supported by the legends of the specific region/ locality. These are
moulded by the regional costumes and ornaments. The Rajasthan historical tale or
local legends were the themes to play [11]. The most common characters involved
are Raja, Rani, Anarkali, Jogi, Sapera, Jadugar (King, Queen, Court Dancer, Saint,
Snake Charmer, Magician)
Figure 5: Common faces of Kathputli [2]
37
Figure 6: The Kathputli face depicting dancer [2]
Figure 7: Faces of Mughal Emperor [2]
Figure 8: The Chinese Kathputli face [2]
Figure 9: Image of Rakshasa (Demon) [2]
38
Figure 10: Face of Yogi (Saint) [2]
The Kathputli are very famous art around the world and are related to royal families
and native rulers. Other characters involved in the performance are Kacchi Ghodi,
Came, Elephant, hangings, etc. The another most famous characters are Amar Singh
Rathore, Maharana Pratap, Heer Ranjha, etc. [7] and nowadays the Kathputlis
helped in creating awareness through their performances on the themes like AIDS,
Polio, Child Marriages, Dowry and many other social evils [2].
Figure 11: Heer Ranjha
Apart from the basic Kathputli made, there are many other types that were not used
for shows, they are promoted as gifting and installation.
39
• Out of all, the one of the interesting one was Sunday-Monday, it is like one
head on either side of the wooden log. While marketing this product they
used a slogan -
“Sunday ho ya Monday, roz khaao aande, kal se jaao school, nahi gauge toh
roz padenge dande.”
Figure 12: Sunday- Monday Kathputli
• 4 faced puppet - It is like head is carved in all four sides of the wooden log.
Figure 13: 4 Faced Kathputli
40
• Life sized puppet- The puppet is sized up to 10ft tall. and is made of
thermocol. This are only used for installation.
Figure 14: Life Sized Kathputli
Making of Kathputli
The Kathputli are highly embellished with colourful, make-up made up of Adoo or
Mango wood stuffed with cotton. A very attractive features of these Kathputli is
their elongated and stylized eyes. These are generally one and half feet in height.
There is difference in male and female Kathputli. Female Kathputli don’t have legs
while the male ones have legs with footwears. They have free body movement; with
their hands, neck and shoulders.
Figure 15: Kathputli (Near Hawa Mahal, Jaipur)
41
Kathputli are made up of wood, the wood used is Adoo, this is a plant on which
goats fed and the other wood used is mango tree wood. There is legible weight
difference in both of the wood. The Kathputli made by Adoo wood is comparatively
lighter in weight then mango wood. Mango wood is soft and easy to be carved, but
the availability of Adoo is more and is cheaper. After carving the Adoo wood is left
to dry in the sun, it shrinks and creates dents but that does not happen in mango wood.
Figure 16: Cutting of Adoo wood and basic carving
Tools and raw material used to make Kathputli-
1) Wood
2) Cloth pieces
3) Stuffing material like cotton
4) Needle
5) Paints and paint brushes
6) Woolen yarn
7) Ribbons/ laces
8) Chalk Matti
9) Sand paper
10) Carving knife
11) Touch wood (used as a top layer, to give shinning)
12) Hammer and Nails to attach strings
42
Process of Making
After buying the wood, as the wood is a bit moist, it is left to dry in the sun. (now it
depends on the season, what amount of time it takes to dry)
Figure 17: Moist Adoo wood set in sun for drying
The puppet making process starts with the making of face. The artist uses dry logs of
wood to carve out faces of the puppets. Different characters have carved differently
as per their facial expression. This process is called “Chilaai”.
Artist carving the faces of puppet with the help of carving knife.
Figure 18: Semi dried Adoo wood
43
Figure 19: Top layer of wood being removed
Figure 20: Wood being carved and basic facial feature of the
Kathputli are being carved out of it
Figure 21: Kathputli face
The wood log used to carve is semi-moist so that the shape to be carved out of it is
carved easily. After the carving is done it is left to dry properly in sun.
44
Once it is dried up, it is rubbed with sandpaper and a paste is applied on it, which is
called “Chalk Matti”. This paste is applied on the Kathputli face because when the
Kathputli is left to dry in sun after carving it shrinks and cracks and dents appear on
it, so this paste helps to fill the gap and even out the top most layer. Further, it is kept
in the open so that the moisture is worn off.
Figure 22: Chalk Matti
Figure 23: Chalk Matti applied on the Kathputli face
After that the extra dust of dried Chalk Matti is removed with the sand paper and
then the paint is applied on Kathputli.
45
Figure 24: Sand paper used to even out the top surface of the Kathputli face
Then, firstly a base coat is applied which ranges from pale white color to matching
the skin color (double coating of the base) and then eyes, lips and other detailing is
done. Then the top coat of touch wood is applied for shinning and to protect it from
damage and then it is left to dry again.
Figure 25: White base coat being applied on the Kathputli face
46
Figure 26: Detailing done on the face of the Kathputli
Figure 27: Detailing done on the face of Kathputli
Figure 28: Detailing done on the face of Kathputli
Once the head of Kathputli is dried completely, decoration of these starts with
stitching of its cloth. These clothes, are usually hand stitched and stuffed with old
rags and clothes (legs are made with saree fall). And then the ornamentation of these
47
craft is done by lacing its garment and putting a jewelry or an instrument etc. And at
the end strings are attached to it, as these are string puppet, attaching string is the
most important step. Artisan use these strings to manipulate the puppet during the
performance. They are attached to neck, shoulder hands, legs and head of the
puppet. These strings are strong thread usually woolen threads are used to bear the
load of the puppet.
Figure 29: Kathputli head and hand stuffed with materials
Figure 30: Stitching bottom of the garment to attach it to head
Figure 31: Adjusting the garment to the head of Kathputli
48
Figure 32: Fixing the garment with needle and thread to the
head of the Kathputli
Figure 33: After fixing the garments, lacing is done on the Kathputli to
give it a traditional look
Figure 34: The look after lacing
To give the bottom part of Kathputli a better look an extra layer of fabric at the inner
side of the garment is attached to give it a fluffed look.
49
Figure 35: Layer of fabric is attached
Figure 36: After stitched it is attached to the bottom fabric of Kathputli
Figure 37: The final look
Figure 38: The women is ornamented with choonri and tika and male with flute
50
Once all the garment and ornamentation work are done, finally strings are to
be attached to the Kathputli head, shoulder, hands, legs and neck to make a free
movement for the show. and now the Kathputli is ready for the show.
Field Visit
The research was done in a slum area in Lal Kothi named as Kathputlinagar,
Jaipur. It is the home for Kathputli artisans.
Figure 39: Area in front of Kathputlinagar
Figure 40: Locality
51
Figure 41: Toilets constructed by government
Figure 42: Dwellings of Kathputlinagar
Figure 43: Pre-school of the area
Figure 44: Playground in Locality
52
The above shown field once was a dump yard. A German student who was on his
research tour, reached to this place and saw dumpster and planned to change that
area into a place where children of Kathputlinagar can play, and also painted this
place with different cartoon characters, and beautified the place.
Figure 45: Painted wall of Playground
Figure 46: Top view of Kathputlinagar
Figure 47: The smiling childhood
53
Kathputlinagar Survey
Roughly 5000 people live in this slum area. Their most common source of income is
crafting Kathputli, music, snake charming, folk performances and other work
include low- skilled works. This area is in the central part of Jaipur city having the
government offices like Rajasthan Housing Board, The Rajasthan High court and the
Employee State Insurance Offices [12].
Figure 48: Map view of Kathputlinagar, Jaipur
The artists of Kathputlinagar gave very warm welcome to all the researchers and
always ready to talk about their art.
Conversations with artists
Anil Bhatt works at a hotel in Vaishalinagar, Jaipur, as a puppet show organizer. His
whole family is involved in this craft. They were 10 brothers and sisters. According
to him they earn Rs. 10,000 per 3 shows. They conduct shows in the cities of
Rajasthan as well as outside the state. They have also performed shows in Germany,
Iraq, France, New York, etc. and the expense occurred for the travel and stay is
barred by the people calling them to perform.
54
Figure 49: Anil Bhatt
Figure 50: Anil Bhatt showcase their art
A woman named Tabassum belongs to Uttar Pradesh and lived in Kathputlinagar
from the past 15 years. She has 3 children and out of them she could hardly manage
the education fees of one child.
Jagdish Bhatt is the persons who is known for the making of King and Queen
Kathputli. His Kathputli are ornamented very well.
Figure 51: King & Queen Kathputli
55
Figure 52: Carving the King's head
Figure 53: The craftsperson Jagdish Bhai
Figure 54: Head carving of King Prithvi Raj Chauhan
56
The craftsperson Bhajanlal is a person who makes the life sized Kathputli. The size
ranges from 6ft – 10ft. these are mostly used for the installation purpose only. They
are not made with wood, instead from that a thermocol is used and sticked together
with glue and paper. They are the customized Kathputli made as per the client’s
requirement. The cost of one life size Kathputli is around Rs. 60,000.
Figure 55: Life sized Kathputli by Bhajanlal
This is identified that from the one-meter saree only one garment is made and the
cost of per saree could be around Rs. 150 to 200. The overall cost of making one
Kathputli is Rs. 300-400 but as per the market rate the cost of one medium size
Kathputli is Rs. 100- 150.
From the data it is very clear that. The artisans did not get the fruitful cost for their
handworks. And as per the market research it is in highlights that the demand of
Kathputli is declining and it is limited up to the occasion decorative items which the
planners takes from the sellers on rent.
57
Literature Review
According to the study of [6] it is found that Kathputli shows are the most powerful
tool for education as it made people aware of the social problems that the country
face and try to give the possible solutions. it is hence considered to be the ancient art
of Storytelling.
[3] observed that the artisans make Kathputli to entertain people but struggle to meet
end needs.
[10] have discovered the pressure of falling demand of Kathputli due to the poor
income of artisans and their growing families which led to the artisans to taking up
alternate professions for their survival.
[20] identified that the art of Kathputli is dying because of lack of interest in modern
era and fails to take up modern social issues in its shows.
According to the study conducted by [20] it is found that the biggest reason of
decline in the demand is its competition from Electronic media which becomes the
most preferred way of entertainment. Peoples loose interest in watching these show
as they found the electronic media more appealing and comfortable. And this creates
lack of interest in buying this traditional form of art.
[1] found out that the Kathputli has descended to the level of begging as there were
no social respect for the artisans and sellers.
According to [19] it is identified that there is lack of Craze among the youth due to
the growing internet access and lacking the knowledge about our traditional arts.
According to the interviews conducted by [3] it is heard that NO ONE CARES
ABOUT KATHPUTLI ANYMORE it is found that due to less promotions of this art
there is rapid decline in the business of community and that pushes the community
to poverty.
In the research conducted by [4] the sale of Kathputli fluctuates as per seasons and is
only limited to the point of attractions only for foreigners and may be sometimes
used by some event planners.
58
Aims and Objectives
• To study the evolution of the Kathputli art form over the years
• To study the handworks required with the tools and techniques used to make
Kathputli come to life
• To study the livelihood of the artisans involved in the art and their
perspective in the art with interviews and observations
• To analyse the demand of Kathputli in Market today and also the perspective
of the sellers.
• To find out the factors affecting the steep decline in the consumer buying
pattern
• To conclude with some recommendations for the marketers and artisans
operating in this industry.
Research Methodology
The research design used in the study is partly exploratory where the attention is at
discovering various ideas and providing a comprehensive presentation of a
phenomena. This particular design is used for the analysis to be more precise through
investigation. The other design used is of the descriptive type, where the study is
aimed at describing briefly the traits of the cluster and the art form which is under
study [14].
The method of research adopted was of the survey type, [23] which means that
information was collected from a group of people and was analysed to get to a
particular conclusion. A part of the study is also based on comparative study which
has been done to compare the product attributes and the overall market opportunities
available for this particular craft [5].
The research is based on quasi- quantitative data [24] which means that data was
collected by asking questions to the artisans belonging to the area Kathputlinagar.
This was done to closely identify the factors affecting the steep decline in the
demand of Kathputli craft, further affecting the overall market opportunities.
In the study, a mix of both primary and secondary data has been used [13]. Primary
data is the one which was collected through direct and first approach and on the
59
other hand secondary data is the one which was collected through other sources like
clusters records, prints in journals, magazines, books and similar sources. Secondary
data has also been collected by going through various research papers, journals, and
magazines. Primary data, for the research, was collected through non-structured and
informal interviews from the artisans practicing this craft.
The data was primarily collected through personal interviews for a better understanding
of their thinking and opinions. Descriptive research analysis is further done so that
specific patterns relating to the consumers’ purchase patterns can be identified [8]
and conclusions could be based on these findings and appropriate steps could be
taken for the artisans’ betterment.
The sampling element consists of each and every craftsperson who belongs to
Kathputlinagar, Jaipur and has been interviewed [15]. The sampling frame [15]
consists of the all people relevant to the research under study.
All the responses were collected from people working in this art. The survey was
conducted over a period of five days, in the second week of September, 2019.
Findings and Discussions
Despite of being near to the government sectors, this slum area and its people faces a
lot of problems in terms of Housing, Hygiene, Sanitation, Education, and many
more social issues.
The houses are very small and half constructed by the government. The roofs are
covered with irons and rocks. A typical family of Kathputlinagar consists of 5 to 7
family members living in small house with one or maximum two rooms, kitchen/
cooking facilities are often outside the house. A small washroom facility might be
available in just 20% of the houses, rest of the slum have to move to few steps to use
public toilets provided by the government. They also need to collect the water from
the common government tap which is only available at 5 am for 2 hours every
morning [12].
The people of Kathputlinagar struggles with disease and illness due to bad hygienic
and sanitation problems. For Kathputlinagar it is most common to go in the public
60
toilets constructed by government or in the open fields which is a garbage disposal
area. An open drainage system in the slum runs like river having water full of bacteria.
The most common illness found there are diarrhoea, cholera and malaria [12].
There were only one school up to eighth standard and after that the children have to
travel to Bankrot for further studies in Helping Hand School. The children who are
not able to manage the travelling cost, left their studies and engage in making
Kathputli.
The people of the community still not aware about the concept of family planning,
hence they have such big families and this may be one of the reasons why child
marriage still prevails in this community.
The government hesitates to give the facilities because they think that this will
acknowledge the existence of the slum [12].
With the introduce of new style, forma and techniques of artistic exchange affected
the art of Kathputli [20].
There is a gap between the Kathputliwalas to market and customer. The value of
Kathputli was ranging from low range to a very high range and they were more
inclined for home décor rather than shows. Now for a new trend people are adapting
Kathputli for events but the order for the art is directly taken from the artisans in a
wholesale rate so a proper income is not earned as expected sometimes. The sellers
sometimes don’t get the Kathputli as expected and after GST the artisans and shop
keepers do not receive the income as expected.
After market analysis then comes the area of the homes of artisans. There is
suffocating squalor and the flimsy housing structures lining both side of a string of
cramped, trashed choked alleys, the squat concrete huts had an air of solidity but the
whole family from generations lived there. These artists lived in a legal settlement
without running water, electricity or sanitation [17]. But they managed to survive
and wants to give education to their children but they lack behind in this too as they
can’t afford the cost related to education and also, they believe in child marriage
61
because of which the children of artisans had to leave the studies in between and
start earning with their parents. The main gap which was seen from this sort of
research and study is the sale of Kathputli which fluctuates as per season which
leads to the financial issues of the family, overall it is struggle for the artisans.
Conclusions
The art is imbibed in the blood of Kathputlinagar residents and they don’t see this
only as a source of living but also a pure divine for them. Every family came up with
different stories some are hopeful, whereas some motivates. A motivated story arose
when people with no place in their house, made puppets on street with other
puppeteers. People are very hard working.
The Self-Help Groups (SHG) should approach and consequently supporting the
women on their way to self- employment and also contributing to a common fund
which is then used to meet the needs during emergency on the basis of mutual help.
Lack of education and training is the most effective problem of Kathputlinagar and
for this the activities like learning and earning should be promoted by the government
for such slums. The government should provide day care centres where infants get
basic health check-ups, healthy food and education and these activities should be
formalized on the continuous basis. There is need to overall development of
Kathputlinagar by NGOs or local authorities and will initiate improvement wherever
possible in terms of hygienic conditions and the essential basic needs [12].
As the profession continues from one generation to other, Kathputli may have a
distorted future as the tradition of adapting family profession dies. But, the people of
Kathputlinagar still believes that the future generation is free to make their choices
in their career but they will always be attached to their roots [18]. Also, the other
reason of decline in the art is due to the impact of digital age.
It is very surprising to see that surrounded by all the crisis, the people of Kathputlinagar
still carrying their rich artistic and cultural heritage [1].
The importance of culture which foreigner give to Kathputli is more respectful and
appreciated and the artisans want a support to rise in their own country for the better
future and survival of their families.
62
The artisans must be recognised and rewarded which motivates them to continue the
art form.
With the adaption of modernity among youth there should be the birth of modern
themes and well as the international scenes that creates a new interest for the
traditional Kathputli to flourish [20].
References and Bibliography
1. Ali, Mir Ahammad. "Puppets of India." (2018).
2. Baral, Bibhudutta, Anisha Crasto and Anushree Kumar. "Kathputli- Making
of Puppet." n.d.
3. Chandola, Mohini. "The lost art of Kathputli." India Interior (2019).
4. Chattopadhyay, Anindita. "Puppetry as a form of Mass Communication:
Indian perspective." Community & Communication 5 (2017).
5. Esser, Frank and Rens Vliegenthart. "The International Encyclopedia of
Communication Research Methods." 2017.
6. Ganguly, Nivedita. "The ancient art of storytelling." (2014).
7. Grund, Francoise and Puran Bhatt. "Kathputli Ka Khel." (2012).
8. Kalsbeek, Reneta. "Where to Start With The 4 Types of Analytics." Iteration
Insights (2020).
9. "Kathputli." Handmade in Rajasthan (n.d.).
10. "Kathputli- Jaipur." (n.d.).
11. "Kathputli- The Puppet Dance of Rajasthan." Culture of Rajasthan n.d.
12. "Kathputlinagar, Jaipur "The Puppet Maker Slum"." Saarthak Initiatives of
Relevance n.d.
13. Kothari, C. R. Research Methodology. New Age International (P), Limited,
2004.
14. Kothari, C. R. "Research Methodology- Methods and Techniques." Kothari,
C. R. Research Methodology. New Age International (P) Limited, Publishers,
2004. 35-36.
15. Kumar, Ranjit. Research Methodology: a step-by-step guide for beginners .
New Delhi: Sage Publications, 2011.
63
16. Lundie, Philne. "Male consumers’ expectations of the fit of ready-to-wear
business apparel and the influence on the purchase decision." 2017.
17. Maverickbird. "Puppeteers, Magicians and Fire Eaters of Delhi." (2017).
18. Mishra, Vaibhavi. "Kathputli: String puppetry from Rajasthan." (2019).
19. Parmar, Atul Kumar Singh. "Tradition of Kathputli." (2020).
20. Singhania, Nitin. "Art and Culture." Secure Synopsis (2020).
21. "The Amazing History of Kathputli Art." (2015).
22. "The Story of Kathputli." (2010).
23. "Types of research." 2009.
24. Wagh, Sulbha. "Benedictine University." Monday October 2021.
researchguides. ben.edu. <https://researchguides.ben.edu/c.php?g=282050
&p=4036581#:~:text=Primary%20data%20refers%20to%20the,collected%2
0by%20someone%20else%20earlier.&text=Surveys%2C%20observations%
2C%20experiments%2C%20questionnaire,journal%20articles%2C%20inter
nal%20records%20e>.
64
CHAPTER 5
DIGITAL EDUCATION TURBULENCE AMONG EDUCATORS
AND LEARNERS DURING THE COVID-19 PANDEMIC IN INDIA
Geeta Khanwani Research Scholar Department of Psychology Manipal University Jaipur Dr. Suyesha Singh* Assistant Professor Department of Psychology Manipal University Jaipur [email protected] (Corresponding Author) ******************************************************************** Abstract: The era of digitalisation worked as a boon for the human population across the globe during the turmoil phase of covid-19 pandemic wherein the only possible and accessible way for communication was ‘digital platforms’. The gigantic hit of covid-19 pandemic brutally affected majorly all realms of human population out of which the two major areas i.e., health and economic crisis seize the attention of global organizations resulted in shadowing of other equally relevant areas out of which one of them is ‘educational turbulence’ faced by the educators and learners due the sudden grounding of ‘digital education’. The concept of digital education was emerging in the developing countries such as in India prior to the pandemic but sudden grounding of full-fledged digital educational action plan just to continue educational activities during the covid-19 restrictive phase remarkably challenged the educators and learner’s population. Hence, it is crucial to explore the educators and learner’s perspectives towards digital education especially under the light of turmoil phase of Covid-19 pandemic. Therefore, the present study aims to explore the educators and learner’s perspective towards the digital education during the restrictive phase of covid-19 pandemic in India. For exploring the challenges and issues faced by educators and learners towards the digital education system during the Covid-19 pandemic, secondary and tertiary data was retrieved from the various databases. Based on the review of studies, several gaps were identified, paradigm
65
shift from face-to-face educational system to digital education system worked as a ray of hope to trespass the educational turbulence but there is quite a limited understanding on the adaptation perspective of the Indian educators and learners towards a full-fledged digital education system which was implemented in no time after the restrictive phase of covid-19 pandemic. Henceforth, it is important to understand the Indian educators and learner’s perspective towards digital educational system during the surge of covid-19 pandemic. This study highlights the Indian educators and learner’s perspectives, challenges and adaption towards the digital education system especially during the restrictive phase of covid-19 pandemic which will also contribute towards the formation of better policies and intervention models for strengthening the grounding of digital education system in India. Keywords: Digital education, Educators, Learners, Covid-19 pandemic
******************************************************************** Introduction
The gigantic hit of covid-19 pandemic landed the global population into a health
disastrous state majorly affected all realms of human population. The sudden
implementation of Covid-19 pandemic restrictions created an imaginary fencing
over the physical movements of the social beings due to which several nations
around the globe imposed a nationwide lockdown as a drive to limit the human
transmission of coronavirus. Similarly, Indian government also announced its first-
ever nationwide lockdown on 25th March 2020 restricted all social beings under the
lockdown norms. The restrictive phase of lockdown confined full-fledged human
activities resulted in wide acceptance of digital grounding from managing economical
flow to continuing educational activities [1,2,3]. Due to the unprecedented glitch on
health and economical domain, majority of the global organizational focus turned to
uplift the health and economical downfall because of which educational turbulence
remained uncovered during the restrictive phase of Covid-19 pandemic, wherein
educational system transit from traditional face-to-face educational grounding to
full-fledged digital educational system. Digital educational system was in the
emerging stage prior to the covid-19 pandemic especially in the developing nations
like India but rapid adoption of full-fledged digital educational system showed the
dualistic nature i.e., on one side, it remarkedly offer the opportunity to the
66
technological outlook in the realm of educational system but on a contrary, sudden
transitory phase challenged the educator and learner population due to the hazy
digital educational model in the early phase of covid-19 pandemic restrictions. It has
been reported that some educational institutions temporarily seized the onsite
educational activities for the learners in the initial phase of covid-19 pandemic
lockdown while some private educational institutes in no time shifted to the digital
education system as a mode of educational continuation but the unprecedented
nature of covid-19 pandemic transitory state landed Indian educators and learners
under the baffling state. In current times, human population has adopted the ‘new
normal’ and geared-up for the continuation of human activities in all realms of
human working but only educational system is still in the wavering state wherein
most of the educational institutes remained closed for the learners as it has been
anticipated that maintaining the precautionary grounds for health and safety among
the learners will be quite challenging if the educational institutes adopt the prior
traditional educational system [4,5,6,7,8]. Therefore, it crucial to understand the
perspective of Indian educators and learners towards digital educational system so as
to formulate a better intervention model promoting the robust educational system in
India especially in the challenging times such as covid-19 pandemic.
Digital Educational System Among Educators in India
Digital education system introduced as a well-designed model for the young India
prior to the covid-19 pandemic where most of the educational institutes especially
urban areas universities/ schools, adopted smart-classroom using digital technologies
such as, artificial intelligence, audio-visual learning mode, etc, blended with the
traditional face-to-face learning method to enhance the educational quality for the
learners. While the digital educational system was in the budding stage where
several training programmes were initiated by the educational organizations to
upskill the educators towards digital education sudden invasion of covid-19
pandemic burdensome the Indian educators into an impromptu state where they were
supposed to shift towards digital teaching mode with limited training and
technological equipment’s support in no time. It has been reported that initial
restrictive phase of covid-19 pandemic rose major challenges among the Indian
67
educators such as, limited digital training, limited or no proper digital equipment’s
for online classes conduction, limited or no internet accessibility, high-internet
pricing, limited and inadequate workspace set-up, more time investment for the
preparation of presentations and lectures, over-stretched working hours, handling
technical glitches, limited support and accessibility from the technical teams,
managing online interaction with the learners over the face-to-face live interactions,
etc, in short, rapidly adopting the new normal online education system without any
adequate prior training [9,10]. No doubt, rapid transition from traditional educational
system to full-fledged digital educational system created a state of educational
turbulence among the Indian educators but in no time, Indian educators well-versed
with the online learning system and created a new opportunity for digital educational
grounding for young India. Indian educators adopted the digital educational model
as an opportunity to reach to masses at same time, record the lectures and circulate
them among learners residing in various areas of the globe, preparing the presentations
using the digitalisation, blending the traditional learning with the digital learning,
etc, in brief, unfolding the grounds of digitalisation to build the advance educational
system [11,12,13].
Digital Educational System Among Learners in India
An unforeseen digital educational system adopted as a mode of continuation of
educational activities during the restrictive phase of covid-19 pandemic which
worked as the only possible solution to overcome the obstructive wave of covid-19
pandemic and regulate the academic calendar as per the given time frame. But this
rapid overnight shifting drifted the young scholars into two board categories wherein
young learners faced the digital divide situation especially in a middle to low-
income countries like India [14,15,16]. On one side, young learner especially living
in urban areas smoothly adopted digital education system with the help of some
formal guidelines and training from their respective educational institutes, hi-tech
generation was also equipped with the hi-tech devices and high-speed internet
accessibility, etc, in brief, majorly urban scholars quick-witted to adapt digitalisation
as a mode of learning. While, on a contrary, it has also been reported that approximately
320 million Indian learners faced the rift of digital divide due to several disparities
68
such as, economical, gender differences, resources, etc [17,18,19]. Digital divide
became a major challenge in the realm of digital education system as most of the
Indian learners faced the digital drift during the restrictive phase of covid-19
pandemic as a resulted in seizing of educational activities for the under-privileged
learner’s population. Another, major challenges reported among the Indian learners
were lack of prominent digital training and guidance, limited availability of
technical resources, lack of motivation towards learning, limited attention span,
feeling of psychological distress due to disturbed academic calendar, academic
activities restricted the other extra-curriculum activities, technical glitches, lack of
learning quality, etc, in brief, majority of the learners faced difficulties in adopting
the sudden transitory phase of unprecedented digital educational grounding and
unfortunately some learners cannot even get the privileged to unfold the realm of
digital education system [20,21,22].
Indian Government Interventions Towards Digital Educational System
In the era of digitalisation, India also formerly adopted the digital platforming in
year 2015 to promote the E-networking among Indian population. Certainly, digital
divide was reported in the population due to economical and regional disparities. To
overcome from the digital drift, Government of India launched ‘BharatNet’ program
for bridging the digital gap between urban and rural Indian population. The sudden
outbreak of covid-19 pandemic drastically shifted all human activities towards the
digital grounding where the massive struggle of digital divide among Indian
population was highlighted under the reports. India being the second largest youthful
country faced the significant trouble of digital divide due to which majority of the
young scholars doesn’t even get the opportunity to access the digital world of
learning. To overcome from the hazardous effect of digital divide in Indian digital
education system, Indian government launched several digital education programmes to
promote digital education among the underprivileged population of India, several
initiatives taken by the Indian government are as follows:
National Digital Educational Architecture (NDEA): The programme was initiated
by the Indian government from the union budget 2020-21 aimed to strengthen the
69
digital infrastructure and support to the digital learning activities to promote digital
education system among educators and learners.
PM eVIDHYA Programme: Another digital education programme was launched in
May 2020 expected to benefit approximately 25 crore learners. The programme
aimed to ease the digital education system for the educators and learners by making
a more flexible and convenient e-learning platform where esteemed universities can
also offer distance/e-learning programmes to the scholars.
DIKSHA: As digital education transformation was already initiated in India prior to
the covid-19 pandemic, DIKSHA (Digital Information for Knowledge Sharing) was
launched in September, 2017, which offers e-learning of school-curriculum based
learning for educators and learners.
SWAYAM: Another major e-learning portal was launched by Indian government in
year 2017 which provides dynamic online courses at an affordable cost to all citizens
of India especially designed for underprivileged learning population.
NISHTHA: National Initiative for School Heads and Teachers Holistic Advancement
(NISHTHA) programme was launched from the union budget 2020-21 to promote
the training of schools and teachers towards digital educational system. It is
estimated that about 5.6 million educators will be enrolled under this programme to
upskill their digital educational training.
Thus, Indian government has been continuously hammering to strengthening the
roots of digitalisation in India especially digital educational system which will allow
the Indian educators and students to share the learning platforms using the advancement
of technological domain. Additionally, constant efforts have been applied by the
public and private sectors of India to equip the young scholars with the advance
realms of digital education [23,24,25,26].
Conclusion
To summarize India’s digitalisation drive has been spreading fiercely from economical
to educational grounds. Digital education drive has been significantly adopted by the
70
Indian government to establish digital infrastructure and upskill the young learners
with the advanced digitalisation. Prior to covid-19 pandemic, digitalisation was
slithering among the Indian population with the aim to reach masses by year 2025
and upskill the Indian population with strengthen digital infrastructure and
dominance. But unprecedented outbreak of covid-19 pandemic restricted most of the
human activities under the virtual boundaries. Similarly, educational institutional
activities also rolled under the covid-19 restrictive phase resulted in closure of all
educational institutes for an indefinite period due to which educational system transit
from traditional face-to-face learning method to full-fledged digital educational
system in no time with no prior formal training. The transitory phase of sudden
adoption of digital education system created educational turbulence for both
educators and learners especially in low-middle-income countries like India, where
digital education was in emerging stage prior to the pandemic.
Henceforth, the present study aimed to understand the perspectives of Indian
educators and learners towards full-fledged digital educational system especially
during the restrictive phase of covid-19 pandemic. It has been concluded that digital
education showed the dualistic nature i.e., on one side it worked as a ray of hope for
educators and learners to adopt a reform movement of digitalisation with hi-tech
quality of education but on a contrary, it triggered the challenges in front of the
educators and learners due to which one of the major concerns i.e., ‘digital divide’
issue outstands during the pandemic phase. To conquer the challenges of educators
and learners and create an equivalent opportunity for all young scholars and
educators, Indian government also initiated several digital educations drives to
promote and strengthen the digital education infrastructure and upskilling the
educators and learners population of India. A suggestive digital education
intervention model has been represented in Figure 1:
71
DIGITAL EDUCATION SYSTEM IN INDIA
PUBLIC SECTOR PRIVATE SECTOR
Government Intervention
Programmes Reaching Masses via Traditional media as well i.e., radio, TV, etc
Equipping underprivileged population with Hi-tech devices
and training. Promoting Small-groups
educational system
Facilitating formal digital training program for both learners and
educators. Promoting upskilling the new
realms of digitalisation by both learners and educators.
Educational institutes initiatives towards equipping learners and
educators with Hi-tech resources. Blended learning with e-learning
with face-to-face learning
Consistent Feedbacks from Learners and
Educators
Research Studies
Better
Intervention Model
Figure 1: Digital Education System in India Model
Limitations
A shortcoming of the present study is that it is a narrative review study based upon
existing literature not following quantitative research design. Another limitation is
that this study has majorly focused on perspective of Indian educators and learners
towards digital education system in India especially during the restrictive phase of
covid-19 pandemic. In addition, majorly digital education system domain has been
discussed under the present review due to specificity of a board digitalisation
domain doesn’t get much light.
72
Research Implications
To our best of knowledge, this is the first investigation to understand the perspective
of both Indian educators and learners towards digital education system especially
during the restrictive phase of Covid-19 pandemic. Furthermore, this review supports
the existing literature on the perspective of educators and learners towards digital
education system especially during the unprecedented events like Covid-19 pandemic.
For the future researches, it is recommended that consideration of cross-sectional
and longitudinal study can contribute towards an in-depth understanding of
perspective of educators and learners towards digital education system especially
during the varying timeline of the covid-19 pandemic situations. Additionally,
cultural and regional dynamics can also be considered so as to understand the
dynamic perspectives of educators and learners in India under the dynamic grounds.
Furthermore, studies can also explore the void of ‘digital divide’ prevailing in Indian
culture due to various disparities.
References and Bibliography
1. Economic Times. "One year since a complete lockdown was announced, we
look back on how India fought COVID." Economic Times, 24 Mar. 2021,
economictimes.indiatimes.com/news/india/one-year-since-a-complete-
lockdown-was-announced-we-look-back-on-how-india-fought-covid/early-
rules-about-masks/slideshow/81662797.cms.
2. Government of India. "#IndiaFightsCorona COVID-19." MyGov.in, 3 Apr.
2020, www.mygov.in/covid-19.
3. UNICEF. "Assessing Impact of the COVID-19 Pandemic." UNICEF, 2021,
www.unicef.org/india/reports/assessing-impact-covid-19-pandemic.
4. Press Trust of India. "Digital Initiatives Taken In Education During Covid
Will Be Strengthened: MoE." NDTV.com, 13 July 2021, www.ndtv.com/
education/digital-initiatives-taken-in-education-during-pandemic-will-be-
strengthened-institutionalised-moe.
5. Deka, K., and S. Anand. "COVID-19 fallout: The impact on education in
India." India Today, 4 Jan. 2021, www.indiatoday.in/magazine/news-makers/
story/20210111-school-of-hard-knocks-1755078-2021-01-03.
73
6. Mathivanan, Sandeep K., et al. "Adoption of E-Learning during Lockdown
in India." International Journal of System Assurance Engineering and
Management, 2021.
7. Li, C., and F. Lalani. "The COVID-19 pandemic has changed education
forever. This is how." World Economic Forum, 29 Apr. 2020, www.weforum.
org/agenda/2020/04/coronavirus-education-global-covid19-online-digital-
learning/.
8. Jena, Pravat K. "Online Learning During Lockdown Period For Covid-19 In
India." International Journal of Multidisciplinary Educational Research,
vol. 9, no. 5, 2020.
9. Pokhrel, Sumitra, and Roshan Chhetri. "A Literature Review on Impact of
COVID-19 Pandemic on Teaching and Learning." Higher Education for the
Future, vol. 8, no. 1, 2021, pp. 133-141.
10. Sornapudi, S. D., and Devi, G. P. “Digital Teaching in India during Covid-
19: Teachers Perspective”. Kala Sarovar (UGC Care Group-1 Journal), Vol.
23, no. 2, 2020.
11. Kulal, Abhinandan, and Anupama Nayak. "A study on perception of teachers
and students toward online classes in Dakshina Kannada and Udupi District."
Asian Association of Open Universities Journal, vol. 15, no. 3, 2020, pp.
285-296.
12. Jai, A. "Online classes are a bane or boon: A teacher’s perspective." The
Times of India, 27 Mar. 2021, timesofindia.indiatimes.com/readersblog/
myrenditions/online-classes-are-a-bane-or-boon-a-teachers-perspective-
30613/.
13. Sharma, D., and Singh. A. “E-Learning In India During Covid-19: Challenges
And Opportunities”. European Journal of Molecular & Clinical Medicine,
Vol. 7, no. 7, 2020.
14. Bast, Felix. "Perception of Online Learning Among Students From India Set
Against the Pandemic." Frontiers in Education, vol. 6, 2021.
15. Hasan, Naziya, et al. (2020). “Online Teaching-Learning During Covid-19
Pandemic: Students’ Perspective.” The Online Journal of Distance Education
and e-Learning, vol. 8, no. 4, 2020.
74
16. Muthuprasad, T., et al. "Students’ perception and preference for online
education in India during COVID -19 pandemic." Social Sciences &
Humanities Open, vol. 3, no. 1, 2021, p. 100101.
17. Gaur, Rakhi, et al. "Barriers encountered during online classes among
undergraduate nursing students during COVID-19 pandemic in India."
International Journal of Research in Medical Sciences, vol. 8, no. 10, 2020,
p. 3687.
18. Dhawan, Shivangi. "Online Learning: A Panacea in the Time of COVID-19
Crisis." Journal of Educational Technology Systems, vol. 49, no. 1, 2020,
pp. 5-22.
19. Nambiar, D. “The impact of online learning during COVID-19: students’ and
teachers’ perspective.” The International Journal of Indian Psychology, Vol.
8, no. 2, 2020, pp. 783-793.
20. Gopal, Ram, et al. "Impact of online classes on the satisfaction and
performance of students during the pandemic period of COVID 19."
Education and Information Technologies, vol. 26, no. 6, 2021, pp. 6923-
6947.
21. Patil, Vishwanath, et al. "A Perspective Study: Online Education/ Classes for
Students to Aid During Covid-19 Pandemic." Innovative Teaching and
Learning Process during COVID 19, 2020, pp. 18-19.
22. Modi, S., and R. Postaria. "How COVID-19 Deepens the Digital Education
Divide in India." UNICEF Global Development Commons, 2020, gdc.unicef.
org/resource/how-covid-19-deepens-digital-education-divide-india.
23. IBEF. "Digital education initiatives." Business Opportunities in India:
Investment Ideas, Industry Research, Reports | IBEf, 12 Aug. 2021,
www.ibef.org/blogs/digital-education-initiatives.
24. Government of India. India Report Digital Education. Department of School
Education & Literacy, Ministry of Human Resource Development,
Government of India, 2020, https://www.education.gov.in/sites/upload_
files/mhrd/files/India_Report_Digital_Education_0.pdf
25. Singh, Madanjit, et al. "Indian government E-learning initiatives in response
to COVID-19 crisis: A case study on online learning in Indian higher
75
education system." Education and Information Technologies, vol. 26,
no. 6, 2021, pp. 7569-7607.
26. PJ Academy. "Digital initiatives in India contributing to the functioning of
the education system." The Times of India, 2021, timesofindia. indiatimes.
com/readersblog/pracin-jain-academy/digital-initiatives-in-india-
contributing-to-the-functioning-of-the-education-system-29770/.
76
CHAPTER 6
INFLUENCE OF SOCIAL MEDIA ADDICTION ON
ANXIETY, DEPRESSION, AND STRESS
Regina Bahl
Department of Psychology
Manipal University Jaipur
Dr. V. Vineeth Kumar
Associate Professor
Department of Psychology
Manipal University Jaipur
[email protected] (Corresponding Author)
******************************************************************** Abstract: Today social media has become an essential medium of human interactions.
Many individuals spent a significant amount of time interacting with others on
various social media platforms. Routinely spending too much time on social media
platforms or social media addiction can lead to adverse psychological consequences
among human beings. Thus, the study's objective was to assess social media
addiction's role in stress, anxiety, and depression among adults. For assessing this, a
sample of 140 participants between eighteen to forty years of age was administered
Bergan Social Media Addiction Scale and Depression, Anxiety, and Stress Scale.
The data was collected online. Descriptive analysis indicated the time spent by
social media users on different platforms. Similarly, Pearson correlation and linear
regression analysis were conducted on the data using SPSS 21. The results revealed
a significant association of social media addiction with stress, anxiety, and depression.
However, there was no significant difference between males and females on social
media addiction and other psychological problems. Thus, the current study highlights
the role of social media addiction in various psychological problems in individuals.
Keywords: Social Media, Facebook, Instagram, DASS, Disorders, Addiction
********************************************************************
77
Introduction
Social media addiction is the abuse of social media platforms. Just like substance
abuse, the entire work and social life of the addict are ruined. The person becomes
aloof and withdraws from society. This leads to depression and stress. But [1] found
that using social media was not related to both depression and stress. Anxiety is
another phenomenon associated with social media addiction. Social media addicts
check their mobile phones as soon as they get up. This is the same as nicotine
addicts who smoke cigarettes when they get up. The individual develops anxiety.
But contradictory findings by [2] suggest that social media can be used to manage
anxiety positively during the Pandemic situation.
Depression is also linked with social media addiction. It is the persistent sadness and
low mood. People compare their own social life with others and they start feeling
depressed. The social media addicts feel lonely and believe that they are missing out
on social activities. People compulsively browse the profiles of others. In opposition
to this idea, [3] found that social media use was not related to depression for each
person. Another phenomenon, the fear of missing out (FOMO) is seen in social
media addicts. The addict fears losing their friends when they look at the pictures of
their online friends enjoying themselves without them. This also leads to anxiety and
insecurities. Opposed to this fact, [4] conclude that social media abuse led to a
decline in depression. According to the recent literature, [5], [6], and [7] also suggests
that depression was strongly associated with social media.
Recent evidence shows that social media causes a lot of stress. When the social
media addict faces online rejection, particularly through dating websites, the person
faces psychological stress which is a gateway for further mental health problems like
anxiety and depression. Recent evidence suggests that Twitter also leads to sleep
disturbances and stress. The same is the case with other platforms like Facebook and
Instagram. Social media addiction is also the same as other addictions. Stress,
depression, and anxiety are in a reciprocal relationship with social media addiction.
They aggravate each other. Contrary to this aspect, [8] did not find any significant
associations between social media and stress.
78
Earlier, there was a time when newspapers and magazines were the only sources of
information and entertainment. The mental health of the people was better in those
times. There were more social gatherings, people read books and engaged in outdoor
activities. Then came the television. People became more inclined towards a
sedentary lifestyle. There was less outdoor activity and thus more strain on mental
health. Now, the present is dominated by the internet. It is an obstacle to the
psychological growth of the people. Adult health, as well as adolescent psychological
health, suffers. Excess of anything can become worse. Mental health problems are
increasing for which one of the causes is the world wide web. The reward system of
the brain is highjacked which leads to the never-ending cycle of internet abuse.
Methodology
The methodological details of the research entitled “Influence of Social
Media Addiction on Anxiety, Depression, and Stress” are elaborated.
Objectives
The primary objective is to study the covariation among the variables anxiety,
depression, and stress concerning social media addiction.
• To study the impact of social media addiction on anxiety.
• To study the role of social media addiction on depression.
• To study the impact of social media addiction on stress.
Hypotheses
• H1 There is a significant relationship between social media addiction and
anxiety.
• H2 There is a significant relationship between social media addiction and
stress.
• H3 There is a significant relationship between social media addiction and
depression.
Research Design
Data collection was done using the method of snowball sampling. The voluntary
consent of the participants was obtained. The sample included 140 individuals
79
falling in the age group of 18 to 40 years. The instructions were provided in each
online questionnaire.
Sample of the Study
140 individuals with an age range of 18 to 40 years participated in the study. There
were 91 females and 41 males. People from varied educational backgrounds,
professionals, and self-employed took part.
Tools Used
The self-report psychological questionnaires administered are discussed below:
• Depression, Anxiety and Stress Scale (DASS 21)
• Bergan Social Media Addiction Scale
Socio-demographic details were collected which included questions on daily time
spent on the internet and social media, time of checking phone first time in the
morning, and type of social media platform used.
Depression, Anxiety and Stress Scale (DASS 21) developed by S.H Lovibond and P.
F Lovibond has 21 items and three scales for anxiety, depression, and stress. The
Cronbach's Alpha Reliability for each scale was computed. They were .806, .845,
and .869 for the stress, anxiety, and depression scale respectively.
Bergan Social Media Addiction Scale is a six-item questionnaire by Cecilie Schou
Andreassen. It is used to assess whether the individuals are social media addicts. The
Cronbach's Alpha Reliability was computed and found to be 0.642.
Procedure
A google form that included DASS 21 and Bergan Social Media Addiction Scale
was created and sent through WhatsApp and Facebook messenger. The voluntary
consent of the participants was obtained. The instructions were provided in each
online questionnaire. There was a positive response from the participants who were
from various age groups and educational backgrounds. The data collection method
used was snowball sampling and 166 responses were collected. According to the
inclusion and exclusion criteria, 140 people falling in the age group of 18 to 40 years
80
were selected. A few responses of those who were below 18 years and above 40
years of age were discarded. There was an unequal number of male and female
responses, so the final sample consisted of 49 males and 91 females. There were
both professionals and self-employed. Once all the responses were received, a
google spreadsheet was created and scoring was done as per the given procedures.
The raw scores were then put to statistical analysis using IBM SPSS 21 software.
Pearson correlation, descriptive statistics, t-test, and regression analyses were applied.
Statistical Analysis
The raw scores were analyzed with the help of IBM SPSS 21. Pearson correlation,
descriptive statistics, t-test, and regression analyses were applied.
Results and Discussion
The purpose of this research work was to study the combined impact of stress,
anxiety, and depression on social media addiction along with its impact on these
variables.
The graph given below compares the number of males with females in the total
sample. There are 49 males as compared with 91 females in a sample of 140
participants.
Figure 1: Total Number of males and females
The pie chart below shows that in the total sample of 140 individuals, the maximum
uses Instagram (41%) while Facebook is used by 24% of the participants. Twitter
49
91
140
0
20
40
60
80
100
120
140
160
Males Females Total
81
and Snapchat have almost the same number of users that is 16% and 15% respectively.
But dating websites have the least 4%, users.
Figure 2: Type of social media used
The graph given below compares the number of hours spent daily on social media
with the hours spent on the internet. Most of the sample fits in the category of
spending less than an hour to 6 hours on social media. But in comparison with
internet time, the majority spend around 6 hours which can stretch to above 9 hours
in a day. This can be due to the internet-based work individuals do.
Figure 3: Hours spent on the internet and social media
Addiction is when the person does that activity right after getting up in the morning.
For example, the case of nicotine addicts who smoke in the morning. This happens
122, 41%
73, 24%
47, 16%
45, 15%
12, 4%
Social Media Type
Intagram
snapchat
dating websites/ apps
32
57
29
6 4 0
21
55
101
126
0
20
40
60
80
100
120
140
less than 1 1 to 3 3 to 6 6 to 9 above 9
Hours Spent
social media internet
82
with social media addiction also. Information on the morning time for checking
phone was collected and the following graph shows that many participants check
their phone between 5 am to 10 am. Participants check their phones after 10 am also
but the data was collected during the Covid 19 pandemic and the individuals are
working or studying from home, so they do not get up early on their usual time.
Figure 4: Time for Checking Phone
Statistical Analysis of the data using the SPSS software shows many interesting
findings. Tables 1 and 2 show the Descriptive Statistics for gender differences and
variables age, stress, anxiety, depression, and social media. Table 3 depicts the
results for the Pearson correlation among the given variables.
Table 1: Descriptive Statistics for Variables Under Study
Minimum Maximum Mean Std. Deviation
Statistic Statistic Statistic Std. Error Statistic
Age 18 40 23.03 .4 4.74 Social Media Addiction 6 25 14.25 .34 4.06
Stress 0 21 6.66 .38 4.52 Anxiety 0 21 5.16 .4 4.83
Depression 0 21 5.90 .44 5.18
48
60
34
0
10
20
30
40
50
60
70
B/w 5-8am B/w 8-10am After 10am
Time for Checking Phone
83
Table 2: Gender-Related Statistics
Frequency Percent Valid Percent Cumulative Percent
Valid
male 49 35.0 35.0 35.0
Female 91 65.0 65.0 100.0
Total 140 100.0 100.0
Table 3: Correlation between
Variables Age Social media addiction Stress Anxiety
Social media addiction 0.5
Stress -0.15 0.29**
Anxiety -0.14 0.24** 0.75**
Depression -.029 0.26** 0.78** 0.75** *P<.05, **p<.01
Table 3 shows the Pearson Correlation findings for the variables age, anxiety, stress,
depression, and social media addiction. While evaluating the findings, it was found
that except age, all the other variables, namely, anxiety, stress, depression, and social
media addiction are positively correlated with each other. This shows that there is a
significant positive relationship between each variable. The correlation among them
was found to be significant at the 0.01 level.
A significant positive relationship was found between social media addiction and
stress (r = 0.29, p < 0.01). This shows that as the time spent on social media
increases, stress increases. Since the variables are positively correlated, it can also be
considered that as the stress increases, social media addiction also increases. The
reason is that when one is under stress, he turns to addictive things like social media.
When under stress, people try to express themselves with social media. This
increases the frequency of social media and ultimately leads to addiction. The
negative activities on social media, like rejection and bullying, all cause stress. The
work that that is left behind due to this addiction also causes stress. Social media
addiction leads to dissatisfaction, obsession with self, and communication problems
which is a cause of stress. This finding supports the second hypothesis.
84
A significant positive relationship was found between social media addiction and
anxiety (r = 0.24, p < 0.01). The reason for the variables to be positively correlated
is that excessive exposure to social media leads to anxiety. Otherwise, also, any
addiction causes anxiety. Sometimes people fear that they are missing out on friends.
This phenomenon is also called fear of missing out (FOMO). Also, the person feels
inferior, becomes aloof, and isolates himself. There is a vulnerability to cybercrime.
The body image issues which arise after looking at pictures of others lead to anxiety.
People browse through the profile of friends and the smiling pictures of travel and
social gathering cause a feeling of lacking. So, social media is a source of anxiety.
This result proves the first hypothesis.
A significant positive relationship was found between social media addiction and
depression (r = 0.26, p < 0.01). This is because social media addiction aggravates
depression and depression makes an individual more prone to addictions. Social
media usually causes unhappiness. While looking at the happy photos of others, the
individuals feel sad and believe that their life lacks the same cheer which others
have. Nobody knows what is behind the curtain. This leads to sadness, feeling empty
and people withdraw themselves from friends and family. Also, the anxiety that is
again, increased by social media addiction, combines with depression and has a
double impact. The entire routine, interpersonal relationships, and work-life get
disrupted which is also a diagnosis for depression. All this shows that depression and
social media addiction are positively correlated which is proof for the third hypothesis.
Tables 4.1, 4.2, and 4.3 describe the result of linear regression analyses. The primary
objective was to study the combined relationship of anxiety, depression, and stress
with social media addiction. The result shows that social media addiction is a
predictor for all three dependant variables, namely anxiety, depression, and stress.
Social media addiction is the independent variable and any variation in it causes
significant changes in the other dependent variables.
85
Table 4: Regression Analysis Summary for S0T Predicting AT
Variable B β t p
Constant 1.165 0.8 0.425
Social media addiction 0.281 0.236 2.853 .005 Adjusted R2 = 0.49, F (2,229) = 8.139, p = .005**
In table 4.1, social media addiction is the independent variable and anxiety is the
dependant variable. Here, p = 0.005 (significant at 0.01 level.) This shows that social
media can predict anxiety. The adjusted R2 shows that 49% variance in anxiety is
explained by social media addiction. The results support the first hypothesis.
Table 5: Regression Analysis Summary for S0T Predicting ST
Variable B β t P
Constant 2.02 1.506 0.134
Social media addiction 0.325 0.236 3.595 0.000 Adjusted R2 = 0.79, F (2,229) = 12.922, p = .000**
Table 4.2 represents, again, social media addiction as the predictor variable and
stress as the dependent variable. Since p = 0.001, the model is significant. It shows
that social media addiction predicts stress levels. Adjusted R2 = 0.79 which proves
that 79% variance in stress levels is explained by social media addiction. The results
prove the second hypothesis.
Table 6: Regression Analysis Summary for S0T Predicting DT
Variable B β t p
Constant 1.147 0.739 0.461
S0T 0.334 0.262 3.184 0.02 Adjusted R2 = 0.062, F (2,229) = 10.135, p = 0.02*
Table 4.3 describes that depression is the dependant variable that can be predicted by
social media addiction. According to the results, p = 0.02 which shows that it is a
86
statistically significant model. So, social media addiction can predict depression.
Since the adjusted R2 is 0.062, it means that a 6.2% variance in depression can be
explained by social media addiction. The third hypothesis is proved. Given below is
Table 5 which describes the independent t-test results for gender differences among
the variables anxiety, depression, stress, and social media addiction.
Table 7: t-test comparison between genders
Variable Gender N M SD SEM t-test p
Social Media Addiction Male 49 14.12 3.74 0.534 -0.27
-0.28
0.79
Female 91 14.32 4.242 0.445 0.78
Stress Male 49 6.43 4.993 0.705 -0.44
-0.42
0.66
Female 91 6.78 4.299 0.451 0.68
Anxiety Male 49 4.33 4.249 0.607 -1.51 0.13
Female 91 5.62 5.079 0.532 -1.596 0.11
Depression Male 49 5.33 5.524 0.789 -0.96 0.33
Female 91 6.21 4.986 0.523 -0.93 0.35 An independent t-test was applied to compare the differences in anxiety, depression,
stress levels, and social media addiction among males (N= 49) and females (N= 91).
The Levene’s test for social media addiction (F = 0.600, p = 0.44) is insignificant.
Also, the result for t-test is insignificant (t = -0.27, p = 0.79). This shows no gender
differences exist for social media addiction. Similarly, the Levene's test for stress
levels (F = 1.33, p= .25) is not significant. The t-test result is also insignificant (t = -
.44, p= .66) which shows no gender differences exist among stress levels. Levene’s
test numerical value for gender differences in anxiety is F= 1.89, p= .17 (statistically
insignificant). Also, t = -1.51, p=.13 is not significant which proves no gender
differences exist in anxiety levels. In the case of the variable depression also,
Levene’s F = .52, p= .47 which is not significant and t = -.92, p =.34 which is again
not significant. So, there are no differences among males and females in depression
levels. Therefore, the independent t-test results prove that no gender differences exist
in the study entitled ‘Anxiety, Depression, and Stress in Social Media Addiction.’
87
The statistical analysis results are supported by [9] who found that anxiety, stress,
and depression were in a significant positive relationship with social media,
particularly Facebook.
Conclusion
Looking at the results, it has been found that an association exists between anxiety,
depression, and stress concerning social media addiction. The obtained graphs reveal
that on average, people spend around 1 hour stretching to 6 hours and even more on
social media platforms with a majority using Instagram. It had been found that many
participants check their phones right after getting up in the morning. Pearson
Correlation results prove that a significant relationship exists between anxiety,
depression, stress, and social media addiction. Regression Analysis findings also
reveal that social media addiction can predict anxiety, depression, and stress. But t-
test results show that no gender differences exist among any of the variables.
Therefore, it can be concluded that there is a combined relationship of anxiety,
stress, and depression with social media addiction.
Limitations
• The number of females was more than the number of males in the sample.
• Individuals below the age of 18 and above the age of 40 were not included.
• The study was not tested concerning specific social media platforms
• WhatsApp was considered a messenger app and not included as a social
media platform.
References and Bibliography
1. Aalbers, George, et al. "Social media and depression symptoms: A network
perspective." Journal of Experimental Psychology: General 148.8 (2019):
1454.
2. Cauberghe, Verolien, et al. "How adolescents use social media to cope with
feelings of loneliness and anxiety during COVID-19 lockdown."
Cyberpsychology, Behavior, and Social Networking 24.4 (2021): 250-257.
88
3. Aalbers, George, et al. "Social media and depression symptoms: A network
perspective." Journal of Experimental Psychology: General 148.8 (2019):
1454.
4. Rodriguez, Micaela, George Aalbers, and Richard J. McNally. "Idiographic
network models of social media use and depression symptoms." Cognitive
Therapy and Research (2021): 1-9.
5. Haand, Rahmatullah, and Zhao Shuwang. "The relationship between social
media addiction and depression: a quantitative study among university
students in Khost, Afghanistan." International Journal of Adolescence and
Youth 25.1 (2020): 780-786. DOI:10.1080/02673843.2020.1741407
6. Culpepper, Morgan. Exploring the Relationships of Social Media Usage and
Symptoms of Anxiety and Depression in Adolescents. Diss. Abilene Christian
University, 2020.
7. Yoon, Sunkyung, et al. "Is social network site usage related to depression? A
meta-analysis of Facebook–depression relations." Journal of affective
disorders 248 (2019): 65-72. https://doi.org/10.1016/j.jad.2019.01.026
8. Ngien, Annabel, and Shaohai Jiang. "The Effect of Social Media on Stress
among Young Adults during COVID-19 Pandemic: Taking into Account
Fatalism and Social Media Exhaustion." Health Communication (2021): 1-8.
9. Hughes, Sean. "Effects of social media on depression anxiety and stress."
(2018).
89
CHAPTER 7
ANALYSIS OF PREDICTIVE PATROLLING USING
EXPLORATORY ANALYTICS
Anurag Bhatnagar
Pranshu Gupta
Shreay Mittal
Venkatesh Gauri Shankar*
[email protected] (Corresponding Author)
Bali Devi
Nikhar Bhatnagar
Kuntal Gaur
School of School of Computing and IT
Manipal University Jaipur
Jaipur, Rajasthan, India
******************************************************************** Abstract: In recent years, the police force has strengthened its traditional crime
reporting methods. New technological advances that increase production through
crime recording aid your investigations. The data is not the only record of a crime.
They also contain valuable information. The crime scene can be linked according to
the offender's modus operandi (MO), suggest which offenders may be responsible
for the crime, and identify those who work on the team. Perpetrator (criminal network).
We cannot predict crime because it is neither systematic nor random. Furthermore,
modern technology and high-tech methods can also help criminals to commit their
crimes. According to the Criminal Records Office, serious crimes such as robbery
and arson are on the decline. Although criminal activities such as murder, sexual
abuse, and gang rape are on the rise. Even if we cannot predict who may be the
victim of a crime. We can infer the possibility of it happening in this place. The
prediction of the results cannot be 100% accurate.
Keywords: Machine leering, data analysis, python
********************************************************************
90
Introduction
Crime is dangerous and faces common social problems around the world. They
affect the quality of life, economic growth, and national reputation. In recent years,
the crime rate has increased significantly.
We cannot predict crime because it is neither systematic nor random. Furthermore,
modern technology and high-tech methods can also help criminals to commit their
crimes. According to the Criminal Records Office, serious crimes such as robbery
and arson are on the decline. Although criminal activities such as murder, sexual
abuse, and gang rape are on the rise. Even if we cannot predict who may be the
victim of a crime. We can infer the possibility of it happening in this place. The
prediction of the results cannot be 100% accurate.
In recent years, the police force has strengthened its traditional crime reporting
methods. New technological advances that increase production through crime
recording aid your investigations. The data is not the only record of a crime. They
also contain valuable information. The crime scene can be linked according to the
offender's modus operandi (MO), suggest which offenders may be responsible for
the crime, and identify those who work on the team. Perpetrator (criminal network).
It's not easy for law enforcement analysts to understand the inherent complexity of
law enforcement data, and the problem is even more complicated. When a team
analyzes, because each member does not have all the relevant facts, the relevant
information can be lost. By generating millions of records, human reasoning will
fail. Therefore, a set of tools is needed to help analyze the data to make the best use
of limited resources.
Predictive police analysis and crime analysis focused on time and space have
increasingly attracted the attention of different scientific circles and have been used
as effective police tools. The purpose of this article is to provide an overview and
assessment of the latest technologies in space crime prediction in terms of investigation
design and technology.
91
Data Used
A. Data set and source
Boston government data is used in the project because it comes from a site that is
run by the city government (data.boston.gov). It has a total of 16 things. These are
the things that are important for the study: the type of crime that happened, where it
happened, when it happened, and how long it took. From 2015 to 20 years, the
history of crimes will be used as the training dataset in this phase. It's the first step.
Data that can't be used to predict crimes is removed in the pre-processing phase.
This includes data that doesn't have the correct values or is redundant. This will be
used in the next modules.
METHODOLOGY
To make predictions, a method called predictive modelling is used. This method can
build models and predict what will happen. When you use this method, you use
different algorithms for machine learning to figure out how things work. The
algorithms learn from the data that was used to train them (used to generate
predictions). There are two parts: regression and how the model is classed, which are
broken down into two separate parts: These models are based on studying how
trends and variables work together to predict constant variables. The task of
categorization is to label the data values that were thought up based on the data, so
they can be found. There are two ways to learn how to classify patterns, supervised
learning, and unsupervised learning, both of which work. It is already known which
class labels will be used to build the classification model in supervised learning, so
there is no need to figure that out. They are not known in unsupervised learning, so
this is how these class names are. Here, we talk about supervised learning.
Figure 1: Methodology of Work
92
B. Data collection and Preprocessing
When you get information from a lot of different places, you can use it to make
machine learning models. https://data.boston.gov/dataset/crime-incident-reports-
august-2015-to-date-source-new-system. In this case, the data storage method
should be able to deal with what is going on. Remove infinite or blank values from
the data that could make your model not work as well as it should. This is called
"data preprocessing." Step 1: In this stage, the data set is changed to make it easier
for the machine learning model to work with it.
Figure 2: Bar Chart of statistical intervention
Figure 3: Area Plot of statistical intervention
93
Figure 4: Correlation graph of statistical intervention
C. Model Assortment
● Support Vector Machine:
Using support vector technology is very good for regression, forecasting time series,
and classifying challenges, among other things. Compared with recurrent neural
networks, the performance of support vector machines can be measured. Therefore,
support vector machines have been used to predict crime hotspots, and to predict
diseases such as diabetes and prediabetes. Because we can prototype non-linear
relationships consistently. It works well for the time series that you want. Crime data
set K grouping should be used to choose a subset of the data set. It will use this
algorithm to figure out what to call each data point in the selected set. When the
crime rate is lower than a certain rate, it's called the "hot spot." When the crime rate
is higher than a certain rate, it's called the "hot spot."
● K-nearest Neighbour:
The test set and the train set are linked by this tool. A class label will be used if a
given test set is very similar to the training set. If that is the case, the class label will
be used. A lot of people have trouble when the training set has a lot less information.
To make it better, different techniques have been used, like the K-NN algorithm.
This method is in the field of supervised learning. We can use data mining, intrusion
94
detection, and pattern recognition in these fields, too. In this case, the result is that
the person joins a class. Categorize a thing based on the votes of your next-door
neighbours. There, the object is placed with its closest or most familiar neighbour.
This is what "the object" means in English
Figure 5: SVM notation
● Decision trees:
It is one of the most popular ways to classify and predict things. Decision trees are
one of them. Its structure is like a tree, with each branch representing a characteristic
test, and each leaf node representing the category label. There is a test for each
intermediate node, and each branch shows the final product of the test and each leaf
node has the category label. This is how it works: Most of the time, the target
variable is a group of things. Decision trees can be used to figure out how likely it is
that a given record fits into each category. They can also be used to classify records
(assigning records to the most similar classes).
Figure 6: Decision Tree
● Extra Tree classifier:
This is how to combine the results of many different decision trees that were found
in the forest. The random forest classifier looks a lot like this one, but it isn't the
95
same thing at all. Only this is different: the way the decision tree looks in a forest,
which is the only thing. In the new forest, each decision tree is made from the same
training set that was used in the first forest, so it looks the same. This is how it
works: It picks a random feature set from the common feature set and adds it to its
own decision tree at each test node of its own decision tree. Decision trees must
choose the best characteristic from this set of randomly chosen traits, based on some
math rules. People come up with a lot of different decision trees because of this.
● Artificial Neural Network:
Artificial neural networks are made with the help of biological neurons. They mimic
the process of deciding in the human brain. It has a lot of parts that work together to
deal with and solve the problem. A lot of old data is used to figure out what will
happen when we look at it. It can do more common and flexible things than traditional
statistical methods can. It can also be used better than other statistical methods. Each
time we changed the weights, we looked at these to figure out how the input and
output were linked when we did it again. Ann can do things and look for patterns to
learn more about the world around her. A connection is shown between the input
neuron and the output neuron. This is how it works: Neurons come in different
weights. It is made by multiplying the input by multiplying the entrance and then
looking at how close it is to a certain amount. In this case, the output comes out this
way. In this case, it is called a result or a result.
TRAINING AND TESTING
In this step, after verifying the hypothesis of the algorithm, we choose. Train the
model based on the training samples provided. After training, model performance
will be verified based on error and precision. Finally, use some invisible data to test
the trained model and verify the performance of the model according to various
performance parameters based on the problem.
96
Figure 7: Dataset Before Preprocessing
Figure 8: Dataset After Preprocessing
There are two ways to use the sklearn library when you're training. You can divide
the data into two groups: one for training and one for testing. Our training size was
about 78,000 points and our test size was about 19600. This is how it worked out:
We trained with a size of about 784,000 points and then we tested with about 19600
points. Here, five models, like the one in method [1], are used for training. Each
model was tested with a different set of parameters. When that was done, different
models were trained, and their f-beta scores (accuracy) were found, then. For KNN,
you need to set parameters njobs and weight. Their values are set to -1 and even. It's
also the same thing with the decision tree. The weight of each category is a
parameter for that one. In this case, this parameter's value is set to "balance," and the
same is true for all other models. There should be 100 hidden layers and the adam
solver set up for MLP to work best. The figure shows that SVC takes a long time to
learn, so it can't be used. As long as we want to look for MLP, it doesn't have a good
score for accuracy and f-beta accuracy. So, MLP isn't the best choice.
97
D. Model evaluation and Metrics
Evaluation: To see how well the classification models that were used for classifying
and predicting things worked. Accuracy and beta-score are two of the metrics that
are looked at. Preciseness is a way to measure how well you can find positive cases
out of all the other possible cases.
q = tv (tv + fv)
Next, we'll talk about recall, which is a measure that correctly picks out positive
cases from all the real positive cases.
rc = tv (tv + fnv)
Accuracy is one of the most common metrics, and it only looks at the values that are
right. It doesn't care about the values that are wrong. F-beta score is used instead of
accuracy to measure how well things are going.
accuracy = tv + tnv (tv + fv + tnv + fnv)
F beta-Score is the harmonic sum of Recall and precision. It gives a better measure
of incorrectly classified cases than Accuracy Metric. This is because F beta-Score is
the harmonic sum of Recall and precision.
F beta score = (2 ∗ (rc ∗ q)) (rc + q)
Tv stands for true positive; fv stands for false positive; fnv stands for false negative;
tnv stands for true negative; rc stands for recall; and q stands for precision, which
means that each of these words refers to a different thing.
E. Identify the Headings
As per various review papers. KNN most frequently provides the best accuracy.
Hence for our study, we will not omit KNN. Metrics for KNN relating to our model
looks like the following.
98
It is a way to group things. It's a class member that comes out of the K-NN classification method. Most of the people who live near an object vote for it. The object is thought to be the most common type of thing in its k [1] next-door neighbour. The algorithm can be used to look at data about crimes. Assuming a home burglary happens, the house next door is also easy to break into because criminals think security is low and the theft can be done again in the same place. Because of this, crime is more likely to happen in areas near where the last crime happened. So, location is important to think about. If you think about the date, you can also think about how important it is Because the distance factor is used to classify things, it's important to figure out how far away the test area is from the training area. Because this is the case, use the latitude and longitude as coordinates and figure out the distance factor as a coordinates and distance factor.
If the date also considers the factor, you must calculate the number of days (), and
then calculate the distance factor as
K-NN is used to solve the problem. Euclidean distance implied by the square and square root is calculated every time it is done. Each training set's calculation distance can be done in parallel with OpenMP, which is a type of parallel processing technology. Because the square and the square root are not used, the distance from Manhattan is found out. This can also be done at the same time. After you figure out the distance, use an effective classification method to figure out which neighbours are the closest. Then, assign the crime attribute type with the highest voting rate to the k [1] neighbours.
Figure 9: Shows the data that is to be tested i.e. finding what crime can
happen at a given location
99
The third phase is called a "pattern identification" phase, and it should help you
figure out what kinds of crimes there are. We use the apriori algorithm to figure out
where there are a lot of crimes. You can use Apriori to figure out which rules in the
database are most important for highlighting general trends. When this stage is done,
there is a crime pattern for a certain place. Here, think about the characteristics of
each place, such as whether or not there is a VIP there, how sensitive the area is,
how much attention it gets, and whether or not there is a criminal group there. If a
new case comes up, and if it continues with the same crime pattern, it can be said
that there is a chance that crime will happen after getting a general crime pattern for
its place. Police officers can better use resources if they know more about the
employer. In areas where crime is likely to happen, they can provide safety or
patrols, set the robbery or CCTV alarm, and use the apriori algorithm. It will cause
crime to happen more often in certain places. People who do the same thing over
and over again may do the same thing in the same place where there are other people
who do the same thing over and over again. We are looking at some factors that
could help us find criminal patterns. E.G: When you put the pattern after the
microphone, it looks like this. Before this, there was a pattern of attributes 1, 2, 3, 4,
and 5. Attributes 1, 3, 4, and 5 are the same as attributes 1, 2, 3, 4, and 5. Crimes
only happen if the same thing happens again in the same day. If any of these things
happen, it can be said that there was a crime.
Conclusion
With this project, we aim to identify some patterns in crime data collected from
Boston. The prediction may not be 100% accurate as stated earlier. Our project
provides meager assistance to authorities by visualizing their thought process when
they decide what is to be patrolled next.
100
References and Bibliography
1. Nicolas Gakrelidz, “Predicting London Crime Rates Using Machine Learning”,
January 14, 2017
2. RAND corporation, “Predictive Policing - the role of crime forecasting in
law enforcement operations, Mar. 02, 2015
3. Tahani Almanie, Rsha Mirza and Elizabeth Lor, “CRIME PREDICTION
BASED ON CRIME TYPES AND USING SPATIAL AND TEMPORAL
CRIMINAL HOTSPOTS”, International Journal of Data Mining & Knowledge
Management Process (IJDKP) Vol.5, No.4, July 2015
4. Rizwan Iqbal1*, Masrah Azrifah Azmi Murad2, Aida Mustapha3, Payam
Hassany Shariat Panahy4, and Nasim Khanahmadliravi5, An Experimental
Study of Classification Algorithms for Crime Prediction,Volume: 6, Issue: 3,
Pages: 1-7, 2013
5. Devi B, Shankar VG, Srivastava S, Srivastava DK (2020) AnaBus: A
proposed sampling retrieval model for business and historical data analytics.
In: Sharma N, Chakrabarti A, Balas V (eds) Data management, analytics and
innovation. Advances in intelligent systems and computing, vol 1016.
Springer, Singapore. https://doi.org/10.1007/978-981-13-9364-8_14
6. Shankar VG, Devi B, Srivastava S (2019) DataSpeak: data extraction,
aggregation, and classification using big data novel algorithm. In:
Computing, communication and signal processing. Advances in intelligent
systems and computing, vol 810. Springer, Singapore. /https://doi.org/10.
1007/978-981-13-1513-8_16
7. Goel V, Jangir V, Shankar VG (2020) DataCan: robust approach for genome
cancer data analysis. In: Sharma N, Chakrabarti A, Balas V (eds) Data
management, analytics and innovation. Advances in intelligent systems and
computing, vol 1016. Springer, Singapore. https://doi.org/10.1007/978-981-
13-9364-8_12
8. Shankar VG, Jangid M, Devi B, Kabra S (2018) Mobile big data: Malware
and its analysis. In: Proceedings of first international conference on smart
system, innovations and computing. Smart innovation, systems and
technologies, vol 79. Springer, Singapore, pp 831–842. https://doi.org/
10.1007/978-981-10-5828-8_79
101
9. Shankar V.G., Devi B., Bhatnagar A., Sharma A.K., Srivastava D.K. (2021)
Indian Air Quality Health Index Analysis Using Exploratory Data Analysis.
In: Sharma D.K., Son L.H., Sharma R., Cengiz K. (eds) Micro-Electronics
and Telecommunication Engineering. Lecture Notes in Networks and
Systems, vol 179. Springer, Singapore. https://doi.org/10.1007/978-981-33-
4687-1_51
10. Shankar V.G., Devi B., Sachdeva U., Harsola H. (2021) Real-Time Human
Body Tracking System for Posture and Movement Using Skeleton-Based
Segmentation. In: Sharma D.K., Son L.H., Sharma R., Cengiz K. (eds)
Micro-Electronics and Telecommunication Engineering. Lecture Notes in
Networks and Systems, vol 179. Springer, Singapore. https://doi.org/10.
1007/978-981-33-4687-1_48
11. Bhatnagar A., Shankar V.G., Devi B., Bhatnagar N. (2021) An Efficient
Model for High Availability Data in Hadoop 1.2.1. In: Sharma D.K., Son
L.H., Sharma R., Cengiz K. (eds) Micro-Electronics and Telecommunication
Engineering. Lecture Notes in Networks and Systems, vol 179. Springer,
Singapore. https://doi.org/10.1007/978-981-33-4687-1_53
12. Devi B., Shankar V.G., Srivastava S., Nigam K., Narang L. (2021) Racist
Tweets-based Sentiment Analysis Using Individual and Ensemble
Classifiers. In: Sharma D.K., Son L.H., Sharma R., Cengiz K. (eds) Micro-
Electronics and Telecommunication Engineering. Lecture Notes in Networks
and Systems, vol 179. Springer, Singapore. https://doi.org/10.1007/978-981-
33-4687-1_52
13. Devi B., Srivastava S., Verma V.K. (2021) Predictive Analysis of
Alzheimer’s Disease Based on Wrapper Approach Using SVM and KNN. In:
Senjyu T., Mahalle P.N., Perumal T., Joshi A. (eds) Information and
Communication Technology for Intelligent Systems. ICTIS 2020. Smart
Innovation, Systems and Technologies, vol 196. Springer, Singapore.
https://doi.org/10.1007/978-981-15-7062-9_71
102
CHAPTER 8
SENTIMENT ANALYSIS OF TWEETS TO DETERMINE
POLITICAL OUTCOMES USING MACHINE LEARNING
TECHNIQUES
Anurag Bhatnagar*
[email protected] (Corresponding Author)
R. Raj
S. Kalikar
Venkatesh Gauri Shankar
Kuntal Gaur
Nikhar Bhatnagar
Bali Devi*
Manipal University Jaipur
******************************************************************** Abstract: The aim of this paper is to discuss and elaborate the machine learning
techniques that have been used and are currently being implemented to extract the
sentiment of tweets that have been posted by a non-specific demographic. We have
also chosen to provide direction to this by pertaining to a specific goal, which is to
predict the outcome of the amount of support or critique a political entity gets
through the analysis of these tweets, hence the tweets pertain to only a political
influence. By the use of machine learning techniques such as polarization and
sentiment score extraction, this task is achievable, as discussed further. Twitter has
been chosen as the suitable social medium for this project as it is the most politically
charged, open platform that allows the masses to voice their opinions without any
third party influenced regulations.
Keywords: Machine leering, data analysis, python
********************************************************************
103
Introduction:
Twitter is a microblogging and social media service where users, commonly knows as “tweeters”, can upload or post descriptive messages and interact with other posts and users. It has features such as like, follow, and retweet, which allows other users to interact with each other globally. Users are able to curate what they want to see on their feed, as well as voice opinions on subjects of all kinds with a higher degree of freedom, as compared to other social media platforms. It is also the platform that has popularized the use of hashtags, which are words followed by the “#” symbol, which acts as an encapsulating word for the entirety of the tweet. These hashtags are of massive importance on this platform as they can be subjects of millions of peoples’ discourse habits, and can highlight a lot of important issue, making everything more accessible than ever. Coming to a political discourse standpoint, Twitter can both stand for emptions, or can cause more of a backlashing response, and this makes out to be one of the most integral part of twitter. It can control the rise and de-escalation of any outbreaks or disagreements, irrespective of what the subject of discussion is. Being an anonymous space, there is no fear of the consequences of censorship, which in itself is a rare event on the platform. All political entities, be it parties, leader, or members, use Twitter as a platform to interact, publicize, promote, and criticize the options available in the existing political space. Due to the diverse variety of beliefs, opinions, and people in themselves, it is the ideal platform to gather information on what different demographics of masses want, like, and dislike about political entities that are soon to govern states and countries, while also providing wholesome criticism to push the boundaries of an entity’s working. Literature Review
Twitter Sentiment Analysis Using Machine Learning Techniques.
In [1] the authors, Bac Le and Huy Nguyen have very elegantly explained about the presence of features in tweets and briefly explained the steps to follow in the procedure of feature extraction. They mentioned that before feature extraction, preprocessing is important to carry out in order to remove the usage of emoticons, informal slang and typos. They have stated that there are various feature reduction methods which can be applied to the tweets involving a two-phase process which requires feature extraction and removal to create regular text, and then further feature reduction to filter more features.
104
They have defined two types of features: ‘Representative Feature’ which is the information representative of a class and, ‘Unique Feature’ which is the information that helps in creating distinction amongst classes. A feature vector stores the number of occurrences of positive and negative word instances in a tweet. The 8 different features used are: tags for speech, special keywords, presence of negation, emoticons, number of positive keywords, number of negative keywords, number of positive hashtags and number of negative hashtags. Sentiment Analysis in Twitter using Machine Learning Techniques
In [2] the authors, Neethu M S and Rajasree R have talked about the shortcomings faced during the process analyzing sentiments in tweets. They have asked to address two main issues in any type of machine-based tweet analyzer: first, the number of misspellings and slangs is much more as compared to other domains and second, Twitter users post messages and comments on an array of topics unlike blogs, news and other sites which generally refer to a particular agenda. The authors have warned about the following challenges that people face in
sentiment analysis:
a) There are more neutral tweets than positive or negative ones.
b) A tweet is limited to 14 characters, so it is very unique as a critique.
Sentiment Analysis of Political Tweets: Towards an Accurate Classifier.
In [3] the authors, Akshat Bakliwal et al have focused on describing the procedure of sentiment analysis by taking up the case study of the Irish Genral Election of February 2011. They have explained the process of sentiment analysis in a more complex setup which involves the sentiment being classified as a topic specific quantification, and not a general document, the documents being the tweets and the topic being politics. The authors have carried out a 3-step-class sentiment classification experiments on a
dataset of 2,624 tweets originated during the preliminary run-up to the Irish General
Elections in February 2011. In this, they found out that there has been study on the
usage of emoticons being used positively or negatively and hashtags being used to
express sentiment in tweets as a proxy for sentiment analysis.
105
Following this, the authors performed annotation using the 6 labels as follows: pos: Tweets which possess positive perspectives towards the topic, neg: Tweets which possess negative perspectives towards the topic, mix: Tweets which carry both positive and negative perspectives towards the topic taking both factors, neu: Tweets which have an indifferent perspective towards the topic and nen: Tweets which are written in non-English languages. These are the counts of supportive, critical and indifferent words going by each of the three lexicons and the appropriate sentiment scores for the overall dataset of tweets. This data was then used to monitor the sentiment and predict the election results. Deep Learning for Hate Speech Detection in Tweets.
In [4] the authors Pinkesh Badjatiya et al have attempted to explain first the baseline
methods and then some different approaches.
Baseline Methods: As baselines, there are three extensive representations. (1) Char n-grams: It is the most efficient and precise method using character n-grams for hate speech detection. (2) TF-IDF: TF-IDF are contemporary features used for classifying text accordingly. (3) BoWV: Bag of Words Vector approach uses the net mean of the word embeddings to formulate the profile of a sentence. Proposed Approaches: A set of three neural network architectures are examined for the task, described as follows. For each method, the word embeddings are initialized with one of the two: random embeddings, or GloVe embeddings. (1) CNN: Inspired by Kim et. al’s work on using CNNs for classification and analysis of sentiment, CNNs are leveraged for hate detection. (2) LSTM: Unlike the much implemented feed-forward neural networks, recurrent neural networks like LSTMs have the ability to use their internal memory and carry out the processing of arbitrary sequences of inputs. LSTMs are used to capture long range dependencies in tweets, which may play a role in hate speech detection. (3) FastText: It represents a narrowed down result based system by average of word vectors, quite alike the BoWV model, but allows the updating of word vectors using back-propagation while in training as compared to the static word representation in the BoWV model, allowing the model to intricately adjust the word representations according to the task.
106
Twitter Sentiment Analysis: A Political View.
In [5], the authors J. Pinto, T. Vijaya Murari, and S. Kelur have very elaborately put
forward that their version of sentiment classification is divided into 5 different
classes, but only the final end classifier is used to carry out the implementation. The
relevant tweets are segregated on the basis of the expressed attributed sentiment they
have. Semantic analysis is done and driven from the WordNet sentiment dictionary
subsequently after categorization and training.
They have considered two methods for dataset sentiment extraction:
a) Symbolic approach
b) Machine Learning Strategy
The authors, while testing and scraping data from the relevant dataset, used the “bag
of words” method using the Vader sentiment analyzer as medium to score the picked
tweets. Based on these scores, the tweets are considered “trained” and a new dataset
is created. There was a necessity of the conversion of upper-case letters to lower
case for the most efficient sentiment analysis result. Supervised Machine Learning
techniques were employed as they do well in sentiment categorization.
For enhancement, they plan to perform the same on Bigdata frameworks to cut down
on time for twitter data classification.
Twitter Sentiment Analysis using a Knowledge based Approach through
Machine Learning
In [6], the authors R. Suchdev, P. Kotkar, and R. Ravindran have elegantly written
about how their main concern was classifying the opinions or emotions expressed
withing generalized text. They have explained about how a sentiment summarization
system uses the documents to be analyzed as inputs, then generates a detailed
document that summarizes the opinions stated in the documents earlier.
To determine overall sentiment, the sentiment of each word is first determined
individually, assigned a value or a score, and is combined with the use of aggregation
functions. Different classifier techniques and feature vectors are used for word-by-
word sentiment analysis using the knowledge based approach.
107
Personalization of Political Discourse on Social Media.
Here in [7], the author Cristina Moise suggests that online social ecosystem contains
a suite of services and applications that provide a way to summarize and outline data
found online, offline or through social media platforms, Twitter point in case. It
assists to make a monitored environment for reviewed audiences, assessing voter
behaviour during the entire time of the campaign.
The authors observed that there is a direct relationship between the following a
political entity has on social media and the following political outcome, for example,
the results of an election.
They specify that it is crucial that we take into account the informal tone of the
message, as well as specialized language commonly used on internet forums. Research
also suggests that voting substantially increases when a political entity increases it’s
presence and reach on social media.
After the author analyzed general competitor reactions, after studying how the
following they have reacts and what are their evolutions over time towards the
motivation to vote, they go through with the next step which is data correlation an
discovery.
As a conclusion, the author also includes competition analysis to get an overall idea
of how the political entity in question is placed with respect to their competition.
Natural Language Processing for Sentiment Analysis: An Exploratory Analysis
on Tweets
In this paper [8], the authors W. Chong, B. Selvaretnam, and L. Soon have presented
their preliminary experiments on tweet sentiment analysis, especially with regards
too Natural Language Processing.
NLP categorizes expressions of specific subjects, and classifies the polarity of
sentiment by assigning a quantified score to lexicon. NLP classifies by identifying
text fragments and the subject, then carries out sentiment classification separately
instead of taking all of the lexicology and assuming a generalized subject. No fixed
108
template would be appropriate for a text-based sorter as the inputs may vary vastly,
with different contexts.
Sentiment analysis of texts and tweets differ, as texts assume that there is a larger
length article that talks about the subject, whereas tweets are of a shorter length, so
share a very specific subject and sentiment throughout. These methods are then used
to extract user opinion and sentiment from tweets.
In-depth read of Political Sentiment Orientation on Twitter.
The authors M. Ansari, M. Aziz, and M. Siddiqui in [9] very articulately discuss
unsupervised techniques that bank on lexicon, an array of keywords which define
boundaries of positive and negative, and estimates the outcome on the basis of the
occurrence of subsequent keywords with respect each another, or by frequency
calculation of all the terms.
The authors define a clear correlation of these said keywords to given political
parties, case in hand being the Bhartiya Janata Party (BJP) and the Indian National
Congress (INC), but also taking into account Other Parties.
They claim that it is quite viable for parties to resort to Twitter during a campaign to
publicly promote candidates, put forward their party policies, take part in stand-offs
and debates, and also call out their competition.
Some approaches the authors delved into are:
1) ID: A different ID assigned to each tweet, preferably using a numerical ID
and to keep the users anonymous. The main idea is to get the number of
people belonging to any of the campaigns.
2) Text: Displays the original tweet which had been written by the original
poster.
3) Three columns, two of them being data on to the two major parties in the
country (i.e., BJP and Congress) and one more for any other contending
party. The support for all three columns is taken together, quantified,
converted to decimal as it serves as an easy classified depiction.
109
Moving onto pre-processing,
1) Unconventional lexicon is filtered out, for example hashtags, emoticons, etc.
2) Copied tweets and retweets are filtered out to maintain individuality and
uniqueness.
3) Removal of standard stop words is done as they do not contribute.
4) At the end, after the compilation, all upper-case letters are converted to lower
case for uniformity.
References and Bibliography
1. Pinto, Joylin Priya, Vijaya Murari, T. Kelur, & Soumya. Twitter Sentiment
Analysis Using Machine Learning Techniques. International Journal of
Advanced Trends in Computer Science and Engineering, 9(1), 723-729.
2. Neethu M S & Rajasree R. Sentiment Analysis in Twitter using Machine
Learning Techniques. *SEM 2013 - 2nd Joint Conference on Lexical and
Computational Semantics, 2, 450-454.
3. A. Bakliwal, J. Foster et al. Sentiment Analysis of Political Tweets: Towards
an Accurate Classifier. Proceedings of the Workshop on Language Analysis
in Social Media, 2013, 49-58.
4. Badjatiya, Pinkesh Gupta, Shashank Gupta, Manish Varma & Vasudeva.
Deep Learning for Hate Speech Detection in Tweets Pinkesh, 2, 759-760.
5. J. Pinto, T. Vijaya Murari, S. Kelur. Twitter sentiment analysis: A political
view. International Journal of Advanced Trends in Computer Science and
Engineering, 2020, Vol. 9, 723-729.
6. R. Suchdev, P. Kotkar, R. Ravindran et al. Twitter Sentiment Analysis using
Machine Learning and Knowledge-based Approach. International Journal of
Computer Applications, 2014, Vol. 103, 36-40.
7. C. Moise. Personalization of Political Discoures On Social Media.
Proceedings of the LT4DHCSEE in conjunction with RANLP 2017, September,
39-43
8. W. Chong, B. Selvaretnam, L. Soon. Natural Language Processing for
Sentiment Analysis: An Exploratory Analysis on Tweets. Proceedings - 2014
110
4th International Conference on Artificial Intelligence with Applications in
Engineering and Technology, ICAIET 2014, 2014, 212-217.
9. M. Ansari, M. Aziz, M. Siddiqui et al. Analysis of Political Sentiment
Orientations on Twitter. Procedia Computer Science, 2020, Vol. 167, 1821-
1828.
10. Duncombe, C. (2019). The Politics of Twitter: Emotions and the Power of
Social Media. International Political Sociology, 13(4), 409–429. doi:10.
1093/ips/olz013
111
CHAPTER 9
ANALYSIS OF CRIME PREDICTION ALGORITHMS
Anurag Bhatnagar
Aarushi Batta
Niharika Marwah
Venkatesh Gauri Shankar
Bali Devi*
[email protected] (Corresponding Author)
Nikhar Bhatnagar
Kuntal Gaur
School of School of Computing and IT
Manipal University Jaipur
Jaipur, Rajasthan, India
******************************************************************** Abstract: "The Minority Report" was written by Philip K. Dick in 1956, and it
talked about how crime could be predicted before it even happened. There is a well-
known 2002 movie with the same name that tells the storey. The storey is about
three mutants who are in a pool and can see weeks into the future. Analysing crime
and its prevention is a methodological approach for identifying patterns and trends
in crimes committed by small populations. We studied various types of predictive
models like linear regression, logistic regression, SVMs and decision trees which
were used by different researchers. The work aims at studying the research of other
scholars and producing an output.
Keywords: crime, regression, algorithms, machine learning, datasets, data mining,
********************************************************************
112
Introduction
"The Minority Report" was written by Philip K. Dick in 1956, and it talked about
how crime could be predicted before it even happened. There is a well-known 2002
movie with the same name that tells the storey. The storey is about three mutants
who are in a pool and can see weeks into the future. As well as reading stories, it is
possible to predict what crimes will happen in the city in the next few years. There
are computer algorithms that can be used to figure out how the market works. They
use information from many sources to figure out how the market works. Crimes
happen in the same places repeatedly, and algorithms often use this to make more
money. It's also possible to make some of these inferences based on the known
factors that lead to certain crimes, as well. When police make a prediction, they will
do more patrols in cities at the right times and places where and when crimes are
likely to happen. People who are ultimate felons might be less likely to do
something that isn't legal if there are police around. This would cut down on how
many crimes there.
Crime activities are on a gradual increase in India over the past few years and is
proving to have a devastating social impact.[1] With the advancement in technology,
some people can commit various types of crimes now. This is led to a sudden
increase in the cases of murder, robbery, cyber-crime, etc. As a result of these
activities, there is an urgent need for analysis of crime and to find a way to reduce
the crime rate. Crime analysis is done to find patterns or trends for the upcoming
years by taking into consideration their previous year's data. By using the latest
technical developments to the advantage, we came up with this project to predict the
crime distribution in various states of India using machine learning algorithms.
There is the idea that when we can look through a lot of data to look for patterns that
can help us figure out what we need, crimes can be a lot easier to predict. People
who write this paper will be using a lot of different regression models. These models
are called linear, logit, support vector, support vector regression, decision tree, and
more. Using regression analysis for this project is the key to form a proper
relationship between the dependent and the independent variables that are present in
our dataset. Eventually, the conclusions that will be drawn from this project will help
113
the police to deploy their resources in the concerned areas accordingly. With the help
of this project, we intend to contribute to society and help it make a better and safer
place for us as well as for our future generations.
Classes of crime in India are:
Murder – Section 302 of IPC
Dowry Death- Section 304 B of IPC
Attempt to Murder- Section 307 of IPC
Voluntarily causing grievous hurt- Section 326 of IPC
Rape- Section 376 of IPC
Literature Review
If you build a machine learning model, it's likely that you'll use a different dataset
for each city. This means that the assumption is going to be different in each case.
There are a lot of different ways classification models can be used. They can be used
for things like predicting the weather, banking and finances, and security. [1]
Classification techniques were used to help police find criminals. KNN, DBSCAN
clustering, and K means were used to classify things into groups. They were used to
predict crime. Six cities in the Indian state of Tamil Nadu were used to run these
algorithms, and they worked well.
It was important to use a dataset where the data was broken down into different
groups in [4.] To see where new sample places were, this was done. For example, it
looked at things like the time of day and year that the crime was done to see how
well the KNN algorithm worked. It turned out to be 40% correct. They used logistical
regression, decision trees, the Bayesian theorem, and the Support Vector Machine to
make their model, which is what they used to make it. Python was used to teach
people how to do multivariate analysis, build multivariate analysis, and figure out
what class they should put their data into. For example, they wanted to figure out
which option best matched the destination value. They looked at options such as
hour and longitude as well as day, week, week, and month as well as the destination
value (Divisions of Crime). This way, we turned each option value into a separate
attribute. We then turned each option value into either 0, 1, or both. To do regression
114
on the training dataset, there were a lot of different ways to do it, so it was split into
two groups: training and testing. All of the tests were done this way. To get the test
data's results, the method that caused the least damage was used.
The KNN method is used to figure out what kind of crime will happen, when, and
where.
For continuous variables, two of the most common metrics were used to figure out
how accurate they were, and they were used to see how well they worked. Two of
them are called the Root Mean Squared error (RMSE) and Mean Absolute error
(MAE).
The work successfully achieved higher accuracy in prediction which was proved by
the values of RMSE and MAE, which had reduced significantly.
Table 1: Result comparison[5]
Previous Calculated MAE 0.1598 0.0064 RMSE 0.3997 0.0802
KNN SCORE 0.9323 0.9951 Over the past several years, the crime rate has increased to such a high point that we
must start looking at methods that will help reduce this rate. It helped them write this
paper when they used machine learning algorithms like the Support Vector Machine
(SVM), K-nearest neighbour (KNN), Decision trees, and Artificial Neural Networks
(ANN) to help them. (ANN). A dataset from San Francisco will be used in this paper
when it is done. When you look at the dataset, you'll see that it has eight attributes
called Date and Description as well as 884k data points. After converting the
categorical data to numerical data, and removing the outliers, they split the dataset
into 2 parts that are the training and the test set having 80% and 20% data
respectively. This was followed by applying the various models and calculating their
accuracy and f-beta score. The conclusion drawn was that KNN, decision tree, and
the extra tree classifier were giving optimal results with an accuracy of about 79%-
81%. Whereas SVM was taking a lot of time to train the dataset so, it is not an
optimal model for this data.
115
Predicting what type of crime is most likely to happen in a specific area in the
upcoming years gives an edge to the police department and helps them to organize
various activities to prevent it from happening. To serve this purpose the authors of
this paper are trying to make a computer-based prediction system [2] that could be
suitable for the townships of Chile. The dataset is of the capital city of Chile which
is commonly known as the metropolitan region. It comprises of 37 townships.
By taking into consideration the phenomena of “repeat and near-repeat victimization”
also known as the Prospective Method [3]. By using this method, we were able to
predict the number of crimes during a single police shift. The “Dempster -Shafer
Theory Method” [4] and a method made with the help of the Wavelet Transform
known as the multi-kernel method which helps to predict the Spatio-temporal ratios
of crime risk over an area. The average prediction rate was 45.29% but, in some
areas, the prediction rate was above 50%, making it extremely useful for the Chilean
police.
To get insights into the types of crimes committed in the city of Indore, Madhya
Pradesh, and to reduce their rate they used the KNN Algorithm. KNN is a supervised
classification algorithm. After preprocessing and cleaning the dataset, an extra tree
classifier technique was used to calculate the importance of each feature of the
dataset.
In the next step, it was split into two groups: a training set (80%) and a test set
(20%). (20 percent). (20%) After that, they used the elbow method to figure out the
value of k. They then used the k-means clustering algorithm to figure out the
average value of different groups by using the elbow method. Root Mean Square
Error, Root Mean Square Error, Root Mean Square Error It was a lot of the model's
general accuracy that worked out well.
With the increase in technology over time, and all the data is available on the
internet, the crime rate has increased. Various statistical models were applied to the
data taken from the NCRB website of crime rates of India in the past 13 years from
2001 to 2013. The data from 2001 to 2011 was used to predict the rate of crime in
116
the years 2012 and 2013. The models which were used are Weighted Moving Average
(WMA), Function Coefficient Regression (FCR), Arithmetic Geometric Progression
(AGP).
After the implementation of these three models, AGP had the highest accuracy of
89% to 90%. In this model, all the terms are taken as weights of the past year and
then are used to compute the next year’s data. [6]
The general form of AGP is:
a, (a+d) r, (a+2d) r2 .
This is how Mugdha Sharma et al. came up with a new ID3 algorithm. It shows the
importance of attributes that have little value but a lot of importance, rather than
attributes with a lot of value and little importance. In this way, they could solve the
problem of having to choose between a lot of important traits. Tests show that an
ID3 algorithm that is more advanced comes up with more reasonable and simple
rules for classifying things. To look into crimes through emails, someone also
suggested using the Z-crime tool. [6] He and his team came up with a hidden link
algorithm that can find hidden links in the networks of people who have done bad
things together. They show the possible crime partner and other networks that aren't
part of the main network. Each node is also looked at in this paper. These graphs
show what each node is important for in the network and how important they are.
Find out who is the most powerful, how important this person is to the network, and
how this person fits into the network. People who read this paper talked about how
to stop crimes from happening before they happen, how to look at the network of co-
offenders in India, and how to figure out how the network of offenders will look in
the future. He and his team came up with Forensic Tool Kit 4.0, which lets you look
at data from afar and see how it looks. [7] In remote data, you can look at process
information, service information, driver information, network device, and network
information, as well as other types of information. This tool makes the file and looks
at the information in it, then sends it to you. This tool can also be used to look at the
computer where the attack is taking place, too. To solve crimes, physical and logical
memory data is looked at with the help of the police. A group of people, such as K.
117
Zakir Hussain and other people, used data processing methods to look at how
criminals acted in this case. In this paper, they came up with a way to look at crime
investigation data (CIA). Use: This tool was used by law enforcement to help them
solve crimes that were very bad. It was backed up by evidence from the crime scene
and from people who were there at the time. Both in terms of how the study was
done, and in terms of how it was done, the study was done It helped us figure out
who the unknown person was, as well as how to interview and go to court. [9]
Every state's crime rate is looked at by Shiju Sathyadevan et al. through the
collection of knowledge, the classification of it, the identification of patterns and
trends, and the visualisation of it. They do this way. It was made with Naive Bayes
classifiers. They used them to make a model that could be used to classify each type
of crime. In this case, you already know the category for a group of coaching data
points and want to know the category for the other coaching data point. Decision
trees are often used to look for crime patterns and make predictions with the help of
Apriori algorithms, as shown in [11]. Heap maps show how big each thing is. The
colour dark means there aren't many things going on. An algorithm called a choice
tree is often used to look for emails that aren't safe. Iterative Optimiser3 is a better
version of this algorithm that picks better features. [12]. It's better and faster to use
decision trees when these important things are taken into account. In this case, we
used a genetic algorithm to figure out how best to change the parameters of a
decision tree. supervised learning methods and NLP methods are used to classify
data. Machine Learning can predict crimes, and these two methods are used for this.
Another way to predict crime is to combine data with deep neural networks [13]. K-
means clustering is used to look at time and site data from the CLEAR system to
figure out how likely it is that someone will do something bad. There is a lot of
information in the data set about how often crimes happen and what kinds of things
they have, like a description or a month, day, hour, and more. It mostly talks about
the algorithm that can work with both categorical and numerical values, but it also
talks about how it works.
When you buy crime analysis software, it comes with a lot of different ways to work
with your data. Cops can use it to figure out what happened [15]. A clustering
118
algorithm can be used to look at crime datasets and see how crimes are linked, as
shown in figure 16. It makes it easier to figure out and figure out how crimes have
changed over time and how they came to be. If you start with random points, K-
means will make a group that looks like this: This makes it easier to get to the best
place in the area [17]. Because of this, the data was split into groups based on the
information axis that had the best variance for assigning the first centroid for K-
Means clustering, so this worked out well. When it comes to the clustering process,
so far it has been found that the proposed method does not have to go through as
many iterations, which speeds it up In the Hidden Markov Model (HMM), merge
sort is often used to group things together.
"Optimised K Means" is an algorithm that Krishnendu S.G and others used. They
broke the work into two parts. Using the Elbow method, the most important
centroids were found in the first phase. This method is used to find the best K value.
A set of 8 random data items was used to start the process in the first phase. A lot of
this, too. After a lot of repetition, the distance between each piece of data and the
centre is calculated, and the cluster with the closest centre is chosen for each piece
of data. After the first phase, or phase one, the space between each data item and
each starting point is calculated in a second phase, or phase two. This phase is called
phase two. Clusters with close centroids are then grouped together, as shown in this
figure. There are groups of data points that each one is linked to, and the distance to
them will be recorded. If we want to make sure that everything is working properly,
we'll have to change the cluster's centre once more. A lot of the same things are done
over and over again until the new cluster value is good enough to match the old one.
This is what the researcher used to do their work: Spyder 3.7. [19]
In [20], a crime prediction is made on a set of data from Chicago. Various machine
learning models are used during this process. Comparisons of models like KNN,
Naive Bayes, and SVM have been done in this paper, and it's done now Based on the
dataset and features chosen, it has been found that prediction can change. [20] found
that KNN had a prediction accuracy of 78%, Gaussian NB had a prediction accuracy
of 64%, and SVC had a prediction accuracy of only 31%.
119
In paper [3,] algorithms like KNN and neural networks are made, tested, and used to
predict crime in San Francisco. The paper also shows how the algorithms work.
It has been found that a lot of machine learning models use datasets from different
cities with different features, so the predictions are different in each case. Classification
models are used for many different things, like predicting the weather, banking and
finances, and security [3]. Predicting crimes with data mining was Sunil Yadav et
al's main goal. They used four algorithms as the main tool. The Apriori rule, K
Means, Naive Bayes algorithm, and Correlation & Regression are all examples of
these. In the apriori algorithm, they used the result of K means as an input. This
allowed them to see if there was a connection between other traits. Before weka
could use the data, it had to be cleaned up a little bit. After that, the data was
transferred to weka and, as a result, we found an association using weka. According
to the results of apriori, there was a link between people charged with crimes and
people found not guilty in that same year. This result said that if more people are
arrested, then more people are freed, and more people end up being found not guilty.
As the rape case was finished for 10 people, they found that the number of people
who were found not guilty turned out to be 2.449. [21]
When Bradley et al. came up with a way to improve the start points of clustering
algorithms, like the k-means clustering algorithm, they came up with a way to do
this. This is what they did: They showed how to change the start line of a general
type of clustering algorithm very quickly and very quickly. All the clustering
algorithms, like K-means, used iterative techniques. The process usually leads to at
least one "local minima," but it can take a while. Because they used this method over
and over again, the algorithm was able to get to a far better local minimum value. In
order to see how well the K-means algorithm clusters a given set of data, we start
with a new set of data that has been better. In the tests, they found that it takes a lot
less time to refine a database than cluster the whole database.
When Likas et al. used K-Means to group things around the world, they came up
with a way to do it that was very easy. Method: It was a small step toward clustering
that animatedly added one cluster centre at a time to the global exploration process.
It ran the k-means algorithm from the right starting points. That's not all they came
120
up with. As a result, this can often be done without having a big effect on how well
the answer is written down. Often, the best way to solve a clustering problem with
M groups is to do a lot of small searches for the best answer.
Neighbor Sharing was chosen because of this. Therefore, it was chosen. People who
came up with this method named it "NSS-AK." Yanfeng Zhang and his team thought
of it for this method. Is it possible to use this to figure out how many clusters you
need for your project? Using this method, the NSS-AK method looks for places
where there are a lot of people and then picks the first cluster centres from these
places. In order to pick the first cluster centres, AE and the NSF were used. Each one
shows the number of things there are in the world and how close they are to each
other near where they live. In this paper, these people came up with a way to do k-
means clustering that was very efficient and used influence factors to make it even
more efficient. In this way, things are put together. Has two parts. It can figure out
the right value of k and pick the right places in the dataset if it looks good. A way to
figure out if two groups of people should join. People use algorithms to make things
run more quickly. A theorem is put forward and proven, then it is used to speed up
the algorithm so it can run more quickly.
Telugu Maddileti et al., proposed a system made entirely on the basis of research
work. They made use of the following algorithm Logistic Regression, Decision Tree
classification, Random Forest classification. The dataset used in this work was that
of India and of crimes committed throughout the years of 2001-2018 which was
available on dataset world. They came out with an accuracy of 95.12 for random
forest selection, 78.955 for Logistic classification and 51.068 for decision tree
classification. After the result analysis they concluded that decision tree algorithm
was relatively poor as compared to two others as it had shown the least accuracy.[26]
There were a lot of different models used to predict crime in Mississippi, and the
results were 83 percent, 88%, and 67% for each one of them [27]. It's been found
that a lot of machine learning algorithms are used on data sets that include different
places with different features, so the predictions change in every case.
121
It came from kaggle.com, and we used logistic regression, K-Nearest Neighbors
(KNN), Decision Tree Classification, and Bayesian methods to look at the data, as
shown in this video. It's done by getting rid of the empty fields and filling in the
blanks. It was 78.73 percent for the KNN and 78.60 percent for the decision tress
classifier, In this table, we show how well each of the above machine learning
algorithms does. SVC was used by 31 percent of people and Naive Bayes Gaussian
by 64.60 percent of the people. Clean and process the model before it is used to
train.
Somayyeh Aghababaei and other people came up with a way to figure out what will
happen next.: They turned trend prediction into a task that could be done by grouping
things together. To figure out how strong they thought the person was, they used a
set of dictionary books. With the last idea, they also came up with a way to get a
small number of tweets from Twitter by taking a sample. [29] Twitter content was all
they used to show that content and crime trends are linked, even though they used
only Twitter content. Philly was full of crime, but also a lot of violence and crime.
As far as I can tell, predictions seem to be based on what kind of crime was done.
Some crimes, like burglary and sex crimes, had a lot to do with what people shared
on Twitter.
Crime prediction issues were dealt with in many ways. Using traditional methods,
which are used by law enforcement, is mostly about making maps of hotspots. These
maps can only be used in certain places and can't be used in other places. Usually,
there are ways to get more information about spatial features, like how far a person
is from intersections and highways, schools and businesses, and more about the
neighbourhood [31] [32].
We can think about future crimes in terms of the crimes that have already been done,
like Mohler et al. [32, 33]. Another study looked at how the social fabric of a
neighbourhood affects crime [34, 35]. They looked at how well mobile network
activity could predict whether someone was going to get sick or not [36, 5]. Social-
behavioral factors like the personality of a community and how well-educated
people are are being investigated to see how they affect crimes. These factors are
122
often used as extra tools to help make the prediction model work. If there are more
people in the world, it may not be easy to see how the huge society affects different
things.
In this modern era, where there is an increase in technology, the capability of people
to commit a crime has also increased. Nowadays, you can find information about
someone directly through the internet, just by the touch of your mobile or computer.
Since the methods by which a particular crime can be commenced are rising so
should the ability to deal with these types of crimes.
Crime Rate can be predicted based on various parameters such as the location of the
crime, age of the person committing the crime, gender of the person, by taking into
consideration if the person has any previous criminal record, etc. At first, the dataset
of a particular area is taken into consideration. Then it undergoes data preprocessing
and when the dataset is devoid of duplicate and irrelevant data then we use Machine
Learning Algorithms to predict the crime rate of the chosen area.
The accuracy of the prediction depends upon numerous variables present in the
dataset and may vary. Many researchers have also found that the prediction of crime
rate also depends on what type of dataset is used either regression or classification.
Mainly, classification is when you must predict a label whereas in the case of
regression it is about foreseeing a quantity.
In [1], crime was predicted using the geographical features of the location. The case
study of Taoyuan was considered. Taoyuan is one of the largest cities in Taiwan. The
dataset was from 2015 to 2016 having around 20,000 total crime cases. The prediction
target of this dataset was vehicle theft because it is affected by the change in
environmental conditions around it. Various machine learning models were applied
to the dataset, and it was found that deep neural networks (DNN) had the highest
accuracy, This research paper exhibits the significance of the geographic component
design for further enhancing execution and informative capacity. As stated in [2],
there is a need to find patterns and clues which can be used to predict the jewel theft
murder by analyzing various arguments present in the dataset. The proposed method
123
is to use data mining as well as machine learning algorithms to build an automated
tool that can do the prediction in a comparatively small amount of time. Unified
Modelling Language was also used to virtually represent the architecture of the
crime scene also, after testing various models’ decision tree algorithm was selected
to obtain the desired results. Nowadays, many websites provide accurately and
enrich datasets of almost every place around the world. Similarly, one of such sites
named Kaggle was used to access the crime detection problem dataset in the city of
San Francisco in [3], the chosen dataset has labeled data, but it is too large so, it is
reduced to 8000 records by taking help of K-means clustering algorithm. The format
of some features was also changed, for example, the date was removed from yyyy-
mm-dd hh:mm:ss, and time was converted to cartesian coordinates. Eventually,
KNN, Parzen Windows, and Neural Networks were implemented. By analyzing the
data, they also concluded that the majority of crime was committed between midday
and midnight and also that artificial neural network was the most accurate algorithm.
R.R Shah proposed that [4] that by applying various data modeling techniques such
as KNN, SVM, Logistic regression to predict the number of crimes in Vancouver
city of Canada. The data consisted of many independent variables such as latitude,
longitude, year, month, day, hour as well as the location which helped to predict the
number of crimes (dependent variable). The approach used in this paper [5] is to use
data mining tools to their full advantage. The objective of the paper is to find
dubious emails which may contain some information about any criminal activities.
They are then put under the suspicious category with the help of a decision tree
algorithm to help us find such emails and pave a way to know a little bit more about
criminal activities. The authors of this paper [5] also named the tool “Z-Crime”
where the Z stands for Zero which in turn is their aim to minimize the crime rate and
eventually bring it close to zero. Data mining is the method involved with examining
gigantic volumes of information to find business knowledge that assists
organizations with tackling issues, reduce hazards, and take advantage of new
freedoms. Isha and Varun Jasuja [6] analyzed different ways of wheat production
given multiple factors. The reason this was important to them was that they both
lived in India where agriculture is the main culture that is followed so, they wanted
to find various methods to help this practice. In [7] the objective is to calculate
124
cyber-crime in an area using distinct methods, then the data collected using these
methods is stored in the form of a log file and saved in the database. After that
forensic toolkit is used for data analysis and helps to find the forensic evidence
which in turn helps the police department in their criminal investigations.
Criminal science is a region that centers on the logical investigation of crime and
criminal conduct and is an interaction that expects to distinguish criminal attributes.
It is quite possibly the main field where the utilization of information mining
strategies can create significant outcomes. An expansive examination of unlawful
action uncovers that all criminal conduct shares a typical arrangement of widespread
standards. This paper [8] solely focuses on observing the criminal behavior of the
culprit using many data mining models. In [9], the data is taken from various
websites, blogs, and social media platforms then the data is bonded together in the
form of a single database with the help of MongoDB. Naïve Bayes algorithm is later
used for prediction, as it is a supervised learning algorithm so the data must be
labeled. The criminal data is categorized into various types such as robbery, rape,
sex abuse, burglary, etc. The dataset had a zero-frequency problem but by using
Naïve Bayes it was also settled and was successful in predicting the crime-prone
areas in India on any given day. H. Benjamin Fredrick David and A. Suruliandi’s
[10] main aim to write this paper was to put together information that is available on
the internet along with other geospatial information and then by using NLP methods
and other data mining techniques and eventually help divide data into various
categories. The quantitative analysis [10] delivered results that show the rise in the
precision level of classification given utilizing the GA to improve the boundaries.
This happens in light of the capacity of the GA to get familiar with the ideal qualities
and afterward it is applied to set the boundary to ideal worth when performing
estimation. Additionally, the Precision, Recall, and F-esteem fluctuate from the
dataset and the framework. This shows the SIIMCO performing admirably when
characterized as far as the measurements. In this paper [11] a basic test that took the
help of an Apriori model was performed to find whether it can be used to find
similar patterns or designs following the bicycle theft dataset, as noted by the police
department. An Apriori algorithm continues by distinguishing the successive
125
individual things in the information within the database and increasing them to
larger things sets if those thing sets show up adequately frequently within the dataset
and variables related to modus operandi also played a major role.
When the total number of observations is to be divided into a particular number of
clusters, taking the help of the nearest mean is known as K- means clustering
algorithm. Similarly, in [12] K-means algorithm was taken into effect for examining
crime in England and Wales along with the rapid miner tool. The dataset that was
chosen had five attributes: Year, Homicide, Attempted Murder, Child destruction,
and causing death by careless driving. Five clusters were formed depicting the
depleting homicide crime numbers from 1990 to 2011. The dataset used in this paper
[13] was taken from Integrated Network for Societal Conflict Research (INSCR)
official website. The data is of various states of India having multiple attributes such
as year, dacoity, crimes concerning murder, etc. Test results demonstrated that the
procedure utilized for the forecast is exact and quick. The four clusters had the
following observations: C0: Crime is consistent, C1: Crime is increasing or in
motion, C2: Crime is, for the most part, expanding, C3: Few crimes are in flux. The
crime dataset used in [14] depicts all the offenses of India from the year 2013 to the
year 2018. Here, a mixture of both K- means clustering algorithm, as well as the
rapid miner tool, was used to predict the crime rate in the upcoming years and to
bring about precautions in the future to reduce it.
By using the K-means algorithm, the results which are initialized in the starting
attains the local optima. So, to beat this drawback another strategy was proposed in
this paper [15] where a specialty of the initialization segment of K-Means so that the
overall performance of clustering is enhanced so modified centroid selection method
was used. The proposed bunching method is assessed utilizing a unique dataset,
specifically, Wine, Iris, Glass, and Leukemia. Also, by using this the clustering time
was decreased. The execution has been done in Python language [16], to find which
Indian state has the greatest number of criminals by taking the help of the clustering
algorithms and then by looking at the clusters that were formed. Eventually, to help
the government to have greater awareness. The dataset used had 1053 total values,
but they were not in a particular range so, to ease the prediction process normalization
126
was performed. In conclusion, the number of male criminals was maximum in
cluster two and are from Madhya Pradesh whereas the female criminals in cluster six
were in high amounts and mostly were from Maharashtra.
For this paper [17], the data records were provided by the Chicago Police
department and the dataset was taken from Kaggle in CSV format. The dataset had
to undergo data preprocessing as it had many null values which were gotten rid of by
using this command df. dropna(), here df stands for data frame. After that, all the 10k
entries in the data set had to go through feature scaling. Then the dataset was divided
into a training set and testing set. The training set was around 70% - 80% on the
other hand the testing set was 20%-30% of the total data available. The actual
number of criminals arrested by the police department for their offenses was only
32.8%. Various algorithms such as K nearest neighbor, Support Vector Machine,
Decision trees were used. The KNN model had an accuracy of 0.78, SVC had 0.31
and the Decision Tree classifier had 0.78 as well. Many graphs such as scatter, bar,
pie and line were made visualizing all the results made by the algorithm on this
dataset.
Conclusions
The study of various research told us about the different algorithms and ways to
predict crimes based on different areas, place and time. Among all the algorithms
used, regression and decision tree algorithm were the most common. However,
decision tree gave relatively low accuracy as compared to other algorithms. KNN
algorithms was frequently used too, and the results show an impeccable accuracy.
The prediction of crimes if done through any of these methods will result in a more
efficient crime solving and a comparatively less crime rate.
References and Bibliography
1. Lin, Ying-Lung, Tenge-Yang Chen, and Liang-Chih Yu. "Using machine
learning to assist crime prevention." In 2017 6th IIAI International Congress
on Advanced Applied Informatics (IIAI-AAI), pp. 1029-1030. IEEE, 2017.
2. Kim, Suhong, Param Joshi, Parminder Singh Kalsi, and Pooya Taheri.
"Crime Analysis Through Machine Learning." In 2018 IEEE 9th Annual
127
Information Technology, Electronics and Mobile Communication
Conference (IEMCON), pp. 415-420. IEEE, 2018
3. M. V. Barnadas, Machine learning applied to crime prediction, Thesis,
Universitat Politècnica de Catalunya, Barcelona, Spain, Sep. 2016.
4. Crime Prediction Using Machine Learning Sacramento Stateathena.ecs.csus.
edu › ~shahr › progress_report by RR Shah - 2003
5. Mugdha Sharma. “Z - CRIME: A Data Mining Tool for the Detection of
Suspicious Criminal Activities Based on Decision Tree”, International
Conference on Data Mining and Intelligent Computing, 5-6 September, 2014.
6. SushantBharti, Ashutosh Mishra. “Prediction of Future possible offender’s
network and role of offender’s”, Fifth International Conference on Advances
in Computing and Communications, 2015.
7. Prashant K. Khobragade and Latesh G. Malik. “Data Generation and Analysis
for Digital Forensic Application using Data mining”, Fourth International
Conference on Communication Systems and Network Technologies, 2014.
8. K. ZakirHussain, M. Durairaj and G. RabialahaniFarzana. “Criminal
Behavior Analysis By Using Data Mining Techniques”, IEEE-International
Conference on Advances in Engineering, Science and Management (ICAESM -
2012), March 30-31, 2012.
9. Shiju Sathyadevan M.S, Surya Gangadharan: Crime Analysis and Prediction
Using Data Mining,in Networks Soft Computing(ICNSC),(2014) First
International Conference.
10. H. Benjamin Fredrick David1, A. Suruliandi: Survey on crime analysis and
prediction using data mining techniques. Department of Computer Science
and Engineering, Manonmaniam Sundaranar University, India. Ictact journal
on soft computing, april(2017)
11. Peng Chen, Justin Kurland, Modus Operandi: Time, Place, A Simple Apriori
Algorithm Experiment for Crime Pattern Detection(2018).9th International
Conference on IISA.
12. Jyoti Agarwal, Renuka Nagpal, RajniSehgal: Crime Analysis using K-Means
Clustering (2013).
128
13. Malathi. A & Dr. S. SanthoshBaboo: An Enhanced (Algorithmto Predict a
Future Crime using Data Mining. (International Journal of Computer
Applications (0975 – 8887) Volume 21– No.1, May 2011)
14. Khushabu A. Bokde, Tiksha P. Kakade, Dnyaneshwari S. Tumsare, Chetan
G. Wadhai: Crime Analysis Using K Means Clustering (2018). https://www.
ijert.org/crime- analysis-using-k-means-clustering.
15. Mrs. S. Sujatha, Mrs. A. Shanthi Sona: New Fast K-Means Clustering
Algorithm using Modified Centroid Selection Method(2013)
16. Keerthi A, Remya M S, Nitha L: Detection of Credit Card Frauds Using
Hidden Markov Model With Improved K-Means Clustering Algorithm
(2015). https://www.ijarcs/article/download/1239/1227.
17. Crime Analysis and Prediction using Optimized K-Means Algorithm RA. K,”
Crime Prediction and Analysis Using Machine Learning” in International
Research Journal of Engineering and Technology (IRJET), Volume: 05 Issue:
09 | Sep 2018
18. [18] Yadav, S., Timbadia, M., Yadav, A., Vishwakarma, R., & Yadav, N.
(2017, April). Crime pattern detection, analysis & prediction. In Electronics,
Communication and Aerospace Technology (ICECA), 2017 International
conference of (Vol. 1, pp. 225- 230). IEEE.
19. P. S. Bradley, and U. M. Fayyad, “Refining Initial Points for K-Means
Clustering,” ACM, Proceedings of the 15th International Conference on
Machine Learning, pp. 91- 99, 1998.
20. Aristidis Likas, Nikos Vlassis, and Jakob J. Verbeek, “The global k-means
clustering algorithm,” The Journal of Pattern Recognition society, Elsevier,
vol. 36, no. 2, pp. 451-461, 2003.
21. Yanfeng Zhang; Xiaofei Xu; Yunming Ye; “NSS- AKmeans: An
Agglomerative Fuzzy K-means clustering method with automatic selection
of cluster number”, 2nd International Conference on Advanced Computer
Control (ICACC), Vol. 2, Pp. 32 – 38, 2010.
22. Mingwei Leng; Haitao Tang; Xiaoyun Chen; “An Efficient K-means
Clustering Algorithm Based on Influence Factors”, Eighth ACIS International
129
Conference on Software Engineering, Artificial Intelligence, Networking,
and Parallel/Distributed Computing (SNPD), Vol. 2, Pp. 815 – 820, 2007.
23. Crime Data Analysis Using Machine Learning Models Telugu Maddileti1,
Vaddemani Sai Madhav2, K V Sai Sashank3, G. Shriphad Rao4
24. McClendon, Lawrence, and Natarajan Meghanathan. "Using machine
learning algorithms to analyze crime data." Machine Learning and
Applications: An International Journal (MLAIJ) 2.1 (2015): 1-12
25. Alkesh Bharati, Dr Sarvanaguru RA. K,” Crime Prediction and Analysis
Using Machine Learning” in International Research Journal of Engineering
and Technology (IRJET), Volume: 05 Issue: 09 | September 2018
26. S. Aghababaei and M. Makrehchi, "Mining Social Media Content for Crime
Prediction," 2016 IEEE/WIC/ACM International Conference on Web
Intelligence (WI), 2016, pp. 526-531, doi: 10.1109/WI.2016.0089.
27. S. Chainey, L. Tompson, and S. Uhlig, “The utility of hotspot mapping for
predicting spatial patterns of crime,” Security Journal, vol. 21, no. 1, pp. 4–
28, 2008.
28. X. Wang and D. E. Brown, “The spatio-temporal modeling for criminal
incidents,” Security Informatics, vol. 1, no. 1, pp. 1–17, 2012.
29. G. O. Mohler, M. B. Short, P. J. Brantingham, F. P. Schoenberg, and G. E.
Tita, “Self-exciting point pro- cess modeling of crime,” Journal of the
American Statistical Association, vol. 106, no. 493, 2011.
30. G. E. Tita and A. Boessen, “Social networks and the ecology of crime: using
social network data to understand the spatial distribution of crime,” The
SAGE Handbook of Criminological Research Methods, p. 128, 2011.
31. A. B. George E. Tita, “9 social networks and the ecol- ogy of crime: Using
social network data to understand the spatial distribution of crime,” pp. 128–
143, 2012.
32. J. R. Hipp, C. T. Butts, R. Acton, N. N. Nagle, and A. Boessen, “Extrapolative
simulation of neighborhood networks based on population spatial distribution:
Do they predict crime?” Social Networks, vol. 35, no. 4, pp. 614–625, 2013.
33. A. Bogomolov, B. Lepri, J. Staiano, N. Oliver, F. Pi- anesi, and A. Pentland,
“Once upon a crime: Towards crime prediction from demographics and
130
mobile data,” in Proceedings of the 16th International Conference on
Multimodal Interaction. ACM, 2014, pp. 427–434.
34. M. Traunmueller, G. Quattrone, and L. Capra, “Mining mobile phone data to
investigate urban crime theories at scale,” in Social Informatics. Springer,
2014, pp. 396–411.
35. J. Q. Wilson and R. J. Herrnstein, Crime Human Nature: The Definitive
Study of the Causes of Crime. Simon and Schuster, 1998.
36. Devi B, Shankar VG, Srivastava S, Srivastava DK (2020) AnaBus: A
proposed sampling retrieval model for business and historical data analytics.
In: Sharma N, Chakrabarti A, Balas V (eds) Data management, analytics and
innovation. Advances in intelligent systems and computing, vol 1016.
Springer, Singapore. https://doi.org/10.1007/978-981-13-9364-8_14
37. Shankar VG, Devi B, Srivastava S (2019) DataSpeak: data extraction,
aggregation, and classification using big data novel algorithm. In: Computing,
communication and signal processing. Advances in intelligent systems and
computing, vol 810. Springer, Singapore. https://doi.org/10. 1007/978-981-
13-1513-8_16
38. Goel V, Jangir V, Shankar VG (2020) DataCan: robust approach for genome
cancer data analysis. In: Sharma N, Chakrabarti A, Balas V (eds) Data
management, analytics and innovation. Advances in intelligent systems and
computing, vol 1016. Springer, Singapore. https://doi.org/10.1007/978-981-
13-9364-8_12
39. Shankar VG, Jangid M, Devi B, Kabra S (2018) Mobile big data: Malware
and its analysis. In: Proceedings of first international conference on smart
system, innovations and computing. Smart innovation, systems and
technologies, vol 79. Springer, Singapore, pp 831–842. https://doi.org/
10.1007/978-981-10-5828-8_79
40. Shankar V.G., Devi B., Bhatnagar A., Sharma A.K., Srivastava D.K. (2021)
Indian Air Quality Health Index Analysis Using Exploratory Data Analysis.
In: Sharma D.K., Son L.H., Sharma R., Cengiz K. (eds) Micro-Electronics
and Telecommunication Engineering. Lecture Notes in Networks and
131
Systems, vol 179. Springer, Singapore. https://doi.org/10.1007/978-981-33-
4687-1_51
41. Shankar V.G., Devi B., Sachdeva U., Harsola H. (2021) Real-Time Human
Body Tracking System for Posture and Movement Using Skeleton-Based
Segmentation. In: Sharma D.K., Son L.H., Sharma R., Cengiz K. (eds)
Micro-Electronics and Telecommunication Engineering. Lecture Notes in
Networks and Systems, vol 179. Springer, Singapore. https://doi.org/10.
1007/978-981-33-4687-1_48
132
CHAPTER 10
BIO- PSYCHOSOCIAL CORRELATES OF DRUG ABUSE IN
ADULTS AND ADOLESCENTS
Regina Bahl Department of Psychology
Manipal University Jaipur
Dr. Geetika Tankha* Department of Psychology
Manipal University Jaipur
[email protected] (Corresponding Author)
******************************************************************** Abstract: Drug abuse is a global hazard that ruins lives and families. The present review assesses the biological, psychological, and sociocultural correlates that negatively influence the problem of drug abuse in adults and adolescents. In the beginning, the concept and prevalence of drug abuse are discussed. Then the review narrows down to the adolescent-specific correlates like family background, smoking history, and parental conflicts. It was found that death in the family and divorce are the risk factors while strong parental rules reduce drug abuse. The role of psychological correlates like personality, social anxiety, depression, and individual factors that are different for every person are described. The individual-specific factors are stress, coping, motivation, impulsivity, and trauma. Followed by the psychological factors, biological correlates that are genetics, brain changes, and role of neurotransmitters are elaborated. Lastly, socio-cultural correlates of drug abuse are also discussed. The gender differences and the influence of parenting were seen while no significant urban-rural differences have been found. But a strong association between drug abuse and crime could be found. People with criminal records have a history of drug abuse. Also, people engage in crime so that they have some money to buy drugs. But, no single cause of drug abuse could be found. There is an interactive roleplay of psychological, biological, and socio-cultural factors. Keywords: Drug abuse, genetics, adolescents, biological factors, psychological factors ********************************************************************
133
Introduction
Drug Abuse is using a substance in large amounts even if there are significant
problems in psychological, social, health, or work-related spheres. It leads to
maladaptive behaviors, for example, picking up fights when intoxicated. Also, drug
abuse is a hazardous problem in both adults and adolescents that interferes with
societal growth. No specific cause of drug abuse has ever been found. The available
literature points out biological, psychological, and sociocultural correlates of drug
abuse.
Abusing drugs for some time leads to dependence. Substance abuse disorders are a
result of this dependence. At the time of dependence on drugs, more and more
amount of the drug intake needs to be increased so that the ‘high’ is achieved. The
body becomes tolerant to the drug. This is when the physiological changes in the
body’s mechanisms negatively influence the removal of the drug from our bodies.
Then, if an individual does not take the drug on which he is dependent, it would lead
to withdrawal symptoms for the respective drug. For example, sweating.
According to DSM 5, there are ten substances categorized as drugs, namely, tobacco,
alcohol, cannabis, hallucinogens, caffeine, opioids, sedatives, inhalants, stimulants,
and anxiolytics. The brain reward system is activated during drug abuse. Pleasurable
feelings or ‘high’ is induced.
Drug abuse is the result of addiction to substances. The addicted individual longs for
the drug and cannot abstain from it. Mood and behavior are negatively influenced
when the drug cannot be abused. Daily functioning in the spheres of social, work,
and interpersonal growth is affected. The families are badly impacted since the
children in the house also learn to abuse the drug. The family income is also
impacted since the money earned is used in purchasing the drug. If the drug becomes
unaffordable, the addicted individual takes the help of crime. Then comes a vicious
cycle of drug abuse and crime. According to [1], 271 million population consumed
drugs in 2016. There are 188 million cannabis users, which makes it the most abused
drug. Its prevalence rate is 3.8 percent, worldwide.
134
The survey by National Drug Dependence Treatment Centre (NDDTC), 2018 revealed
that 2.8% of people in India abused cannabis. Heroine became the most commonly
abused opioid, with 1.14% abusers. 1.08% and 18 lakh adults abuse sedatives and
inhalants respectively. Lastly, around 0.1% of Indians abuse cocaine.
Figure 1: Comparison of Drug abuse in India (Image: socialjustice.nic.in)
[2] found that drugs are more abused in Indian slums as compared with the rest of
the population. Tobacco is the most abused drug, 53.9% of those living in slums
abuse it.
The riskiest age range for drug abuse is 12 to 17 years. Adolescence is the
developmental period and drug abuse during this time is extremely harmful to
overall growth. Also, the academic growth of the teen is negatively affected. The
adolescent begins to miss lectures, becomes distracted and inclined towards other
risky behaviors. Delinquency is a parallel that runs alongside drug abuse.
Biological factors responsible for this hazard are neurotransmitter imbalance,
structural changes in the brain along with genetics. Also, abnormalities in the
connectivity within the brain and problems with the default mode network are
probable biological factors responsible for the problem of drug abuse.
Among the psychological factors, personality, social anxiety, depression, and those
individualistic factors that are specific to each person are correlated with drug abuse.
Personality is the unique characteristic way of responding to individuals and
situations. Social anxiety is the fear of being negatively evaluated and getting
135
embarrassed in social situations. Depression is the persistent sadness along with loss
of interest in activities that were once enjoyed. It involves impairment in daily
functioning like sleep- disturbance, fatigue, loss of appetite, etc. Individual factors
are those that differ for each person and can include coping, levels of motivation,
sensation-seeking, impulsiveness, trauma, and sleep disturbance.
Social Correlates are differences in drug abuse that are related to gender. It includes
what type of drug is abused more amongst males and females. Social correlates also
include differences in terms of urban and rural areas. Data is collected to find out the
scenario of drug abuse in urban areas and rural areas. The findings are compared.
The drug abuse trends in both types of regions are studied and concluded. Also,
there is always a relationship between drug abuse and the crime done by the
individual who consumes drugs. Sometimes crime is also done to afford the drug.
Another social correlate is what impact does parenting has on the likelihood of an
individual engaging in drug abuse. Parenting strategies or styles have a huge role in
causing or preventing drug abuse. Socio-cultural correlates are basically, the impact
of society and culture on the probability of the person engaging in drug abuse.
The recent findings claim that the most abused drug is cannabis or marijuana. It is
also famous for the names ‘weed’ and ‘pot’. Drug abuse is a global hazard that
affects numerous people and is fatal especially during the developmental period. It
affects the growth of the brain particularly at this time when there are hormonal
changes also.
Drug Abuse in Adolescence
Adolescence is a time of growth in terms of physiological and psychological factors.
There are hormonal changes as well as changes taking place in the brain and any
indulgence in drugs can be hazardous.
136
Figure 2: Factors affecting Drug Abuse in Adolescence
Adolescent Family Background
Findings reveal that death, divorce, higher income, and education along with parents
abusing drugs were risk factors for adolescent drug abuse. Parental rules that
disallow drugs and religion were linked with lower chances for the same. [3] found
that adolescents whose parents had a higher income and education abused more
drugs like marijuana and cocaine in their young adulthood. [4], claimed that
adolescents whose fathers abused drugs had a higher chance for the same. [5]
studied adolescents whose both or one parent abused drugs and found that death and
divorce were risk factors. [6] also found that parental practices, rules that restrict
drugs lead to lesser drug abuse in adolescents. Adolescents whose parents abused
cannabis start to abuse it themselves. [7] state that adolescents whose parents abuse
non-prescription opioids and smoke had higher chances to do the same. Religion
was associated with lesser drug abuse risks. The family background of the adolescent is
very crucial since parental practices, rules, habits in parents, income, and education
have a huge impact on adolescent drug abuse.
Smoking History and Drug Abuse
Some findings suggest that smoking is a risk factor for drug abuse, particularly
marijuana. Others claim that marijuana abuse is itself a risk factor for smoking.
Whereas, results also suggest the parallel abuse of marijuana and smoking. [8] found
that marijuana abuse is a risk factor for smoking in female adolescents. [9], claim
that smoking is associated with the risk of cocaine and marijuana abuse in
Parental Conflicts and
Adolescent Drug Abuse
Smoking History
and Drug Abuse
Adolescent Family
Background
137
adolescents. [10], suggest that both adults and adolescents abuse marijuana and
nicotine side by side which strengthens nicotine dependence. [11] surveyed a sample
of adolescents and found that they use many types of tobacco products that are
linked with later marijuana abuse. Findings from the available literature, suggest that
drug abuse and smoking together increase dependence. Tobacco abuse alongside
drugs contributes to further risk in adolescence.
Parental Conflicts and Adolescent Drug Abuse
Studies claim that death and conflicts between parents are associated with drug
abuse in adolescents. According to [12], the death of a parent is a major risk for
teens to start abusing drugs, and divorce of parents is also a risk for the early onset
of drug abuse, particularly for girls. [13], claim that those teens who experienced
divorce between their parents were higher on substance abuse disorders. Conflicts
between parents, death of a parent, smoking alongside drug abuse, and the family
background of the adolescent are the crucial correlates of drug abuse during the
developmental period.
Psychological Correlates of Drug Abuse
Personality, social anxiety, and depression along with individual factors that are
different for each person are the psychological factors associated with drug abuse.
Role of Personality
Findings suggest that drug abuse is comorbid with a borderline personality disorder.
Conflicting relations with others and problems with self-image, mood, and impulsivity
are the characteristic problems in this disorder. Aggression, hostility, and neuroticism
are associated with drug abuse. Aggression is the behavior aimed at harming others
and destroying resources around them. Hostility is openly showing that one is
opposed to someone or something. Neuroticism is one of the Big Five Factors. The
person high on neuroticism is overly anxious and worried.
[14] studied medical students who abused drugs and found that they were high on
aggression and hostility. [15] report that drug abuse-related disorders are comorbid
with a borderline personality disorder. According to DSM 5, unstable interpersonal
138
relations, problems with self-image, emotions along impulsive behavior are
characteristics of borderline personality disorder. [16] found that females who
abused methamphetamine were high on neuroticism. The person high on this trait
worries a lot and is anxious. They were not conscientious, agreeable, or open to
novelty. Personality is the unique characteristic way of responding to people and
circumstances. As seen from available studies, some personality factors are positively
correlated with drug abuse.
Depression as Correlate
Recent Evidence suggests that depression is positively associated with drug abuse.
According to DSM 5, substance abuse is usually linked with depression. [17]
conducted a literature review and found that people smoke as a way to cope with
depression. [18] stated that major depression and opioid abuse were correlated.
Chronic feelings of sadness, loss of interest in enjoyable activities, and impairment
in daily functioning are features of depression. The present findings match that of
DSM 5 and support the concept of depression being correlated with drug abuse.
Social anxiety as Correlate
Some studies claim social anxiety to be positively associated with drug abuse while
few suggest that there is no association. According to DSM 5, people use substances
to deal with social anxiety. [19] found that a higher need for cannabis was felt during
social anxiety. [20] studied a sample of 56 adolescents who smoked and abused
marijuana. They found that social anxiety was not associated with drug abuse. [21],
carried out a longitudinal study and found that more social anxiety leads to lesser
interaction with the peer group that in turn leads to lesser cannabis abuse. [22]
studied fMRI results of drug abusers with social anxiety disorder and found that
there were structural abnormalities in the brain. [23] found that people smoked
cigarettes to avoid social anxiety. The fear of being negatively judged by people and
being embarrassed in situations involving people is social anxiety. Most studies but
not by all have found a correlation between drug abuse and social anxiety.
Individual Factors
The findings reveal that trauma, ways of coping, lower levels of motivation, and
higher impulsivity have a role in drug abuse. Sensation seeking also results in drug
139
abuse. Sleep Deprivation is a result of drug abuse along with stress being
significantly correlated.
Trauma as the Trigger
Studies claim that trauma is positively correlated with drug abuse. Trauma is a
severe emotional response after a major stressor. [24] studied people who abused
opioids and found that the trauma they faced could predict drug abuse and the
intensity of trauma meant more drug dependency. [25] found that abuse during and
after childhood was positively linked with consuming drugs. The above studies lead
us to the conclusion that drug abuse comes after trauma and the severity of drug
abuse is linked with trauma severity.
Role of Motivation
Motivation is the willingness and enthusiasm to fulfill our psychological, physiological,
work-related, or any other need. The recent finding by [26] suggests that people who
abused drugs have low levels of motivation.
Table 1: Individual Factors as Psychological Correlates
S.No. Individual Factors as Psychological Correlates
1 Trauma as the Trigger
2 Stress as the Correlate
3 Drug abuse and Coping
4 Role of Motivation
5 Drug Abuse: A result of sensation seeking
6 Impulsivity: A Predisposing Factor Stress as a Correlate
The recent findings claim that stress and drug abuse are positively related. Stress
negatively affects those brain areas that are responsible for addiction. Incentive
sensitization creates a predisposition for stress and drug abuse as comorbid
conditions. [27], the need for drugs and stress is positively correlated. [28] studied
recent evidence and suggested that more stress leads to more tobacco abuse. [29]
suggests that childhood and later life stressors result in drug addiction and relapse.
140
[30] claims that stress affects those brain circuits which play a role in addiction. [31]
state that stress and drug abuse become comorbid conditions because of the
predisposition due to the reward being uncertain leading to incentive sensitization.
According to the incentive sensitization theory of substance abuse, drugs create a
neuron sensitivity in the brain and lead to further craving. [32] claimed that cannabis
abuse and being unable to tolerate stress are positively correlated.
The given studies emphasize the fact that stress hampers the functioning of those
brain regions that have a strong role in addiction. Stress and drug abuse are
comorbid conditions. Incentive Sensitization theory also suggests the same.
Drug abuse and Coping
The recent evidence suggests that ways of coping and drug abuse are positively
correlated. Coping is a physiological and psychological way to deal with environmental
stressors. According to the available studies, people who use maladaptive ways of
coping also engage in drug abuse.
[33] found that the females who use strategies for active coping engage more in
drugs abuse. [34] found that people who had drug abuse disorders engaged in
maladaptive coping and disengagement. It can be concluded that drug abuse during
coping with situations is more evident in females with active coping and those with
drug abuse disorders.
Drug Abuse: A result of sensation seeking
Available literature suggests that there is a major role played by the sensation-seeking factor in drug abuse. This is the will to experience thrill, excitation, and novel experiences. [35] studied drug abusers and found that they were high on sensation seeking while their siblings were not. [36] found that sensation seeking could predict nicotine, alcohol, and marijuana abuse. [37] suggest that the correlation between sensation seeking and smoke was more intense in teenagers. [38] claim that sensation seeking was a risk factor for abusing drugs. [39] conducted a study among 300 medical students. They found that sensation seeking was correlated with alcohol abuse and smoke. Evidence suggests that the individualistic factor of sensation seeking has a role in people abusing drugs like nicotine, marijuana, alcohol, and others.
141
Impulsivity: A Predisposing Factor
The evidence suggests a strong correlation between impulsivity and drug abuse.
Impulsivity is the lack of control or doing things suddenly. The consequences for
lack of control are not considered. [40] claim that there is a significant correlation
between impulsivity and drug abuse, particularly heroin and opioids. [41] found that
impulsivity could be observed in those who abused methamphetamine. [42] found
that there is a role of dopamine receptors in the correlation between impulsivity and
drug abuse, mainly, methamphetamine abuse.
[43] suggest that adolescents who engage in tobacco abuse, marijuana abuse, and
alcohol abuse are high on the factor of impulsivity. People who are high on
impulsiveness abuse more drugs. There is a link between impulsivity and abusing
drugs like methamphetamine, heroin, opioids, tobacco, etc.
Self Esteem- Drug Abusers
Studies suggest that self-esteem has a role in drug abuse. Self-esteem is the
individual’s belief in his/ her abilities. [44] found that the development of self-
esteem in teenagers promotes alcohol and cannabis abuse. Self-esteem depends upon
the quality of parenting. [45] conducted a comparative study and found that those
who did not abuse drugs had higher self-esteem than the drug abusers. [46], suggest
that self-esteem has a role in drug abuse. [47] also claim that self-esteem is strongly
linked with drug abuse. To conclude, that self-esteem, particularly at the time of its
development during adolescence has a huge role in drug abuse.
Biological Correlates of Drug Abuse
According to available literature, drug abuse has a strong genetic base along with the
interplay of neurotransmitters and changes in the brain structure and volume of grey
matter. Connectivity in the brain regions and default mode network also impacts
drug abuse.
Genetics
The findings claim that genes do have some role to play in drug addiction. Research
has identified some variants of genes. [48] claim that some genetic variants have
142
been found to play a role in opioid addiction. A very small role for these genetic
variants has been identified so far. According to [49] some genes have an effect the
addiction to drugs. [50] revealed that there is a role of some genes in the brain’s
reward system. According to recent evidence, some genetic variants that are
responsible for drug abuse influence the brain reward system.
Brain Changes
The available findings state that there are abnormalities with the volume of grey
matter in regions of the brain along with structural abnormalities and connectivity
between the regions of the brain. Also, abnormal connectivity within the default
mode network of the brain could be seen. [51] conducted fMRI of heroin abusers
and compared it with those who did not take the drug. They found that there were
abnormalities in the connectivity for different regions of the brain in those who
abused heroin. [52] carried out a meta-analysis of the available MRIs for drug
abusers. They found that there was a reduction in the grey matter for the regions of
the prefrontal cortex. [53] have found that there are abnormalities with the volume
of the Para hippocampus and orbitofrontal lobe. Also, the size of the limbic striatum
is increased. [54] studied cocaine abusers and compared them with non-abusers.
They found structural abnormalities and changes in the grey matter volume of
various parts of the brain in the cocaine abusers in comparison with non-abusers.
[55] conducted fMRI of heroin abusers and compared it with the non-abusers. They
found that abnormal connectivity in the default mode network of the brain for the
individuals who abused heroin.
Neurotransmitters
Using the available evidence, it can be concluded that the levels of various
neurotransmitters affect drug addiction. [56] found that dopamine and serotonin
have a role in drug abuse, particularly cocaine. [57] state that receptors of N-methyl-
D-aspartate play a role in drug abuse. As studies suggest, there is a primary role of
neurotransmitters mainly, dopamine and serotonin, and N-methyl-D-aspartate receptors
in drug abuse.
143
Socio-Cultural Correlates of Drug Abuse
Looking at the available literature, it can be concluded that the quality of parenting
impacts drug abuse. No significant differences between the drug intake of urban and
rural people could be seen. A strong correlation between crime and drug abuse has
been found. Lastly, in terms of gender differences, the adult drug-abusing population
comprises more males than females. The young population of drug abusers does not
show any such significant differences based on gender.
The Influence of Parenting
Studies claim that adolescents of a demanding parent will be less likely to abuse
drugs while the teen of a responsive parent is more likely to do the same.
Adolescents of authoritarian parents were the most prone to drug abuse. The teens of
indulging parents were the least prone.
According to [58] the parenting dimension of demandingness meant lesser drug
abuse, while more responsiveness meant more drug abuse in teenagers. A demanding
parent is the one who controls every aspect of the child’s behavior while the
responsive parent is the one who provides a lot of warmth. [59] found that there
were more chances to engage in alcohol abuse if the parents were authoritarian while
lesser chances for the same if the parents had adopted an indulging style of
parenting. Those parents who neglected their teens or were authoritarian were found
to be even worse than the authoritative parenting style. Authoritarian parents are
those who are too strict and display lesser warmth, indulgent parents are controlling,
while ignorant parents provide full freedom without rules. Lastly, authoritative
parents are those who provide both freedom and warmth in combination with strict
rules.
According to [60] claimed that adolescents of parents who abused drugs themselves
were facing the maximum risk for the same. Quality parenting practices lowered the
risk for drug abuse while no effect could be seen in those teens who had open
conversations about drugs with their parents.
[61] suggest that teens whose parents did not provide them adequate attention were
at the highest risk for marijuana abuse. Growing age reduced the effect of protection
144
for the authoritative parenting style, while there was no link between abusing
marijuana and how much attention was given to the teen by parents.
Gender Differences in Drug Abuse
Recent evidence points out that in the adult population, there are more drug abusers
in males but these differences cannot be seen in the young population of drug
abusers. [62] claim that drug abuse differences in terms of gender can be found only
in adults where males are two to three times more prone than females to abuse
drugs. This cannot be seen in teens. [63] suggest that males start drug abuse before
females but, they abuse more methamphetamine than males. Also, the onset of
methamphetamine is later in males than females. [64] point out that female adolescents
are ahead of male adolescents in the non-prescription use of psychotherapeutics.
Whereas, male adolescents abuse more marijuana. In young adults also, females
engage more in cocaine abuse and again non-prescription psychotherapeutic abuse.
In the total drug abuse population, males are more than females and they are more
prone to abuse non-prescription psychotherapeutics along with marijuana.
Association Between Drug Abuse and Crime
The studies reveal that there is a strong correlation between crime and drug abuse.
People who abuse drugs engage in criminal activity side by side. [65] claim that
drug abuse is positively correlated with social reputation, which is the beliefs held
about a particular group or individual in society, and moral disengagement, which is
the way some people make themselves understand that the immoral they do is also
moral so that they can perform that immoral task. According to [66] most of the
people accused of a crime are engaged in drug abuse. [67] found that people engage
in crime so that they could get some monetary benefit to afford drugs. To conclude,
it has been seen that crime and drug abuse go hand in hand. People with criminal
records have been seen abusing drugs also.
Drug Abuse: Urban-Rural Differences
Most findings suggest that there are no major differences in the trends of drug abuse
in urban and rural areas. Few studies claim that people living in urban areas abuse
more drugs. [68] claim that people living in urban areas engaged in more drug abuse
145
than those who lived in rural areas. [69] state that people living in both urban and
rural areas had similar trends of drug abuse. Looking at the above findings, no
urban-rural differences exist in terms of drug abuse. People living in both places do
consume drugs in similar trends.
Conclusion
Drug abuse is a widespread global hazard. There is an interplay of biological,
psychological, and socio-cultural factors in the growing problem of drug abuse.
During adolescence, smoking history has a positive correlation with drug abuse.
Also, the family background that includes parental education and income is again
correlated with the problem of drug abuse. Parental conflicts, parental substance
abuse, and death have a negative impact and increase the likelihood of teen drug
abuse. Strong parental rules lower the chances of drug abuse. In adults, psychological
correlates are personality, social anxiety, and depression along with individual
factors that are specific to the person. There are mixed findings concerning the
relationship between social anxiety and drug abuse. Depression is positively
correlated with the same. Individual factors linked to drug abuse are, for example,
trauma, sensation-seeking, coping, motivation, and so forth. Genetics, structural
brain changes and connectivity, neurotransmitters, grey matter volume, and default
mode network are responsible biological correlates in drug abuse. Concerning socio-
cultural correlates, parenting quality and crime are associated with the problem of
drug abuse. No significant urban-rural differences could be found. Lastly, in terms of
gender, more adult males abuse drugs, but again, no such differences are prevalent in
the young population.
Suggestions
• People should be aware of the harmful impact of cannabis as it is the most
abused drug. It causes memory-related problems, the risk for bronchitis and
asthma. Also, cannabis predisposes an individual towards schizophrenia.
• Psychological help should be provided to those families of adolescents who
have faced death, divorce, or any other conflicts. These conflicts make the
teen more vulnerable to drug abuse. So, psychological help is needed to
prevent the likelihood of the occurrence of this hazard.
146
• Parental substance abuse should be curbed as it badly impacts adolescents.
Then, they start abusing substances themselves. It encourages smoking,
which is further correlated with drug abuse. Early exposure to substances
during adolescence, particularly, is very harmful.
• Most importantly, treatment for drug abuse should be given on an immediate
basis. Early intervention can prevent further deterioration and can stop the
problem from going out of control.
• Empirical data can be used to study the effect of personality traits on drug
abuse. Personality has an impact on each aspect of our behavior. So, using
empirical data, more information can be gathered about its impact on drug
abuse. It can aid in prevention and treatment.
• Family support should be encouraged. It ensures security for the client after
recovery. Strong family support can prevent the individual from beginning to
abuse drugs again. It also helps the client to return to normal life.
• Lastly, to reduce teenage drug abuse, there should be workshops in schools
that emphasize the harmful effects of drugs and help to spread awareness.
Prevention is always better than early intervention.
References and Bibliography
1. United Nations Office on Drugs and Crime. (2019). World Drug Report
2019: 35 million people worldwide suffer from drug use disorders while only
1 in 7 people receive treatment.
2. Ghulam, Ram, et al. "Drug abuse in slum population." Indian journal of
psychiatry 58.1 (2016): 83.doi: 10.4103/0019-5545.174390
3. Humensky, Jennifer L. "Are adolescents with high socioeconomic status
more likely to engage in alcohol and illicit drug use in early adulthood?."
Substance abuse treatment, prevention, and policy 5.1 (2010): 1-10.
4. Kendler, K. S., et al. "The rearing environment and risk for drug abuse: a
Swedish national high-risk adopted and not adopted co-sibling control
study." Psychological Medicine 46.7 (2016): 1359-1366. https://doi.org/10.
1017/S0033291715002858
147
5. Kendler, Kenneth S., et al. "Maternal half-sibling families with discordant
fathers: a contrastive design assessing cross-generational paternal genetic
transmission of alcohol use disorder, drug abuse and major depression."
Psychological medicine 50.6 (2020): 973-980. https://doi.org/10.1017/S0033
291719000874
6. Vermeulen-Smit, E., et al. "The role of general parenting and cannabis-
specific parenting practices in adolescent cannabis and other illicit drug use."
Drug and Alcohol Dependence 147 (2015): 222-228. https://doi.org/10.
1016/j.drugalcdep.2014.11.014
7. Griesler, Pamela C., et al. "Nonmedical prescription opioid use by parents
and adolescents in the US." Pediatrics 143.3 (2019). https://doi.org/10.1542/
peds.2018-2354
8. Nguyen, Trang Quynh, et al. "Does Marijuana use at ages 16–18 predict
initiation of daily cigarette smoking in late adolescence and early adulthood?
A propensity score analysis of add health data." Prevention Science 20.2
(2019): 246-256.
9. Keyes, Katherine M., Ava Hamilton, and Denise B. Kandel. "Birth cohorts
analysis of adolescent cigarette smoking and subsequent marijuana and
cocaine use." American journal of public health 106.6 (2016): 1143-1149.
https://doi.org/10.2105/AJPH.2016.303128
10. Wang, Julie B., et al. "Medical marijuana legalization and cigarette and
marijuana co-use in adolescents and adults." Drug and alcohol dependence
166 (2016): 32-38. https://doi.org/10.1016/j.drugalcdep.2016.06.016
11. Audrain-McGovern, Janet, et al. "Adolescent e-cigarette, hookah, and
conventional cigarette use and subsequent marijuana use." Pediatrics 142.3
(2018). https://doi.org/10.1542/peds.2017-3616
12. Doran, K. A., Watkins, N. K., Duckworth, J. C., & Waldron, M. (2019).
Paternal death, parental divorce, and timing of first substance use in an
ethnically diverse sample, Journal of Child and Adolescent Substance Abuse,
28(2), #83-91#. https://doi.org/10.1080/1067828X.2019.1580234
13. Tebeka, Sarah, et al. "Parental divorce or death during childhood and
adolescence and its association with mental health." The Journal of nervous
148
and mental disease 204.9 (2016): 678-685.doi: 10.1097/NMD.000000
0000000549
14. Bucher, Joshua T., Duc M. Vu, and Mohammadreza Hojat. "Psychostimulant
drug abuse and personality factors in medical students." Medical teacher 35.1
(2013): 53-57.
15. Sansone, Randy A., and Lori A. Sansone. "Substance use disorders and
borderline personality: Common bedfellows." Innovations in clinical
neuroscience 8.9 (2011): 10.
16. Hojjat, Seyed Kaveh, et al. "Personality traits and identity styles in
methamphetamine-dependent women: A comparative study." Global journal
of health science 8.1 (2016): 14. doi: 10.5539/gjhs.v8n1p14
17. Mathew, Amanda R., et al. "Cigarette smoking and depression comorbidity:
systematic review and proposed theoretical model." Addiction 112.3 (2017):
401-412. https://doi.org/10.1111/add.13604
18. Edlund, Mark J., et al. "Opioid abuse and depression in adolescents: Results
from the National Survey on Drug Use and Health." Drug and alcohol
dependence 152 (2015): 131-138.
19. Buckner, Julia D., et al. "Cannabis craving in response to laboratory-induced
social stress among racially diverse cannabis users: The impact of social
anxiety disorder." Journal of Psychopharmacology 30.4 (2016): 363-369.
20. Cloutier, Renee M., Heidemarie Blumenthal, and Emily R. Mischel. "An
examination of social anxiety in marijuana and cigarette use motives among
adolescents." Substance use & misuse 51.3 (2016): 408-418.
21. Nelemans, Stefanie A., et al. "Longitudinal associations between social
anxiety symptoms and cannabis use throughout adolescence: the role of peer
involvement." European child & adolescent psychiatry 25.5 (2016): 483-492.
22. Yang, Xun, et al. "Network analysis reveals disrupted functional brain
circuitry in drug-naive social anxiety disorder." Neuroimage 190 (2019):
213-223. https://doi.org/10.1016/j.neuroimage.2017.12.011
23. Buckner, Julia D., Michael J. Zvolensky, and Elizabeth M. Lewis. "Smoking
and social anxiety: the role of false safety behaviors." Cognitive behaviour
therapy 49.5 (2020): 374-384.
149
24. Garami, Julia, et al. "Examining perceived stress, childhood trauma and
interpersonal trauma in individuals with drug addiction." Psychological
reports 122.2 (2019): 433-450. https://doi.org/10.1177%2F0033294118
764918
25. Mandavia, Amar, et al. "Exposure to childhood abuse and later substance
use: Indirect effects of emotion dysregulation and exposure to trauma."
Journal of Traumatic Stress 29.5 (2016): 422-429. https://doi.org/10.1002/
jts.22131
26. Preston, Kenzie L., et al. "Exacerbated craving in the presence of stress and
drug cues in drug-dependent patients." Neuropsychopharmacology 43.4
(2018): 859-867. https://doi.org/10.1016/j.copsyc.2019.10.005
27. Torres, Oscar V., and Laura E. O'Dell. "Stress is a principal factor that
promotes tobacco use in females." Progress in Neuro-Psychopharmacology
and Biological Psychiatry 65 (2016): 260-268. https://doi.org/10.1016/j.
pnpbp.2015.04.005
28. Cadet, Jean Lud. "Epigenetics of stress, addiction, and resilience: therapeutic
implications." Molecular neurobiology 53.1 (2016): 545-560.
29. Andersen, Susan L. "Stress, sensitive periods, and substance abuse."
Neurobiology of stress 10 (2019): 100140.
30. Hellberg, Samantha N., Trinity I. Russell, and Mike JF Robinson. "Cued for
risk: Evidence for an incentive sensitization framework to explain the
interplay between stress and anxiety, substance abuse, and reward uncertainty in
disordered gambling behavior." Cognitive, Affective, & Behavioral
Neuroscience 19.3 (2019): 737-758.
31. Farris, Samantha G., et al. "Anxiety sensitivity and distress intolerance as
predictors of cannabis dependence symptoms, problems, and craving: The
mediating role of coping motives." Journal of studies on alcohol and drugs
77.6 (2016): 889-897. https://doi.org/10.15288/jsad.2016.77.889
32. Stevens-Watkins, Danelle, et al. "John Henryism active coping as a cultural
correlate of substance abuse treatment participation among African American
women." Journal of substance abuse treatment 63 (2016): 54-60. https://doi.
org/10.1016/j.jsat.2016.01.004
150
33. Adan, Ana, Juan Manuel Antúnez, and José Francisco Navarro. "Coping
strategies related to treatment in substance use disorder patients with and
without comorbid depression." Psychiatry Research 251 (2017): 325-332.
34. Bahorik, Amber L., et al. "Motivation deficits and use of alcohol and illicit
drugs among individuals with schizophrenia." Psychiatry research 253
(2017): 391-397.
35. Ersche, Karen D., et al. "Drug addiction endophenotypes: impulsive versus
sensation-seeking personality traits." Biological psychiatry 68.8 (2010): 770-
773. https://doi.org/10.1016/j.biopsych.2010.06.015
36. Meil, William M., et al. "Sensation seeking and executive deficits in relation
to alcohol, tobacco, and marijuana use frequency among university students:
Value of ecologically based measures." Addictive behaviors 62 (2016): 135-
144. https://doi.org/10.1016/j.addbeh.2016.06.014
37. Lydon‐Staley, David M., and Charles F. Geier. "Age‐varying associations
between cigarette smoking, sensation seeking, and impulse control through
adolescence and young adulthood." Journal of research on adolescence 28.2
(2018): 354-367. https://doi.org/10.1111/jora.12335
38. Regan, Timothy, et al. "Sensation seeking, sexual orientation, and drug abuse
symptoms in a community sample of emerging adults." Behavioural
pharmacology 31.1 (2020): 102-107.doi: 10.1097/FBP.0000000000000523
39. Karami-Matin, Ba, et al. "Sensation seeking is related to cigarette smoking
and alcohol drinking among college students?." International Journal of
Tropical Medicine 11.2 (2016): 28-32.
40. Jones, Jermaine D., et al. "The effects of heroin administration and drug cues
on impulsivity." Journal of clinical and experimental neuropsychology 38.6
(2016): 709-720. https://doi.org/10.1080/13803395.2016.1156652
41. Jones, Hannah W., et al. "Increased self-reported impulsivity in
methamphetamine users maintaining drug abstinence." The American journal
of drug and alcohol abuse 42.5 (2016): 500-506. https://doi.org/10.1080/
00952990.2016.1192639
151
42. London, E. D. "Impulsivity, stimulant abuse, and dopamine receptor
signaling." Advances in Pharmacology 76 (2016): 67-84. https://doi.org/10.
1016/bs.apha.2016.01.002
43. Chuang, Cheng-Wei I., et al. "Impulsivity and history of behavioral
addictions are associated with drug use in adolescents." Addictive behaviors
74 (2017): 41-47.
44. Oshri, Assaf, et al. "Developmental growth trajectories of self-esteem in
adolescence: associations with child neglect and drug use and abuse in young
adulthood." Journal of youth and adolescence 46.1 (2017): 151-164.
45. Gupta, Anjali, and Roopali Sharma. "Attachment Style, Emotional Maturity
and Self-Esteem among Adults with and Without Substance Abuse." The
International Journal of Indian Psychology 3.2 (2016): 77-90.
46. Greger, Hanne K., et al. "Childhood maltreatment, psychopathology and
well-being: The mediator role of global self-esteem, attachment difficulties
and substance use." Child abuse & neglect 70 (2017): 122-133. https://doi.
org/10.1016/j.chiabu.2017.06.012
47. Ersöğütçü, Filiz, and Sibel Asi Karakaş. "Social functioning and self-esteem
of substance abuse patients." Archives of psychiatric nursing 30.5 (2016):
587-592. https://doi.org/10.1016/j.apnu.2016.03.007
48. Crist, Richard C., Benjamin C. Reiner, and Wade H. Berrettini. "A review of
opioid addiction genetics." Current opinion in psychology 27 (2019): 31-35.
49. Levran, Orna, Vadim Yuferov, and Mary Jeanne Kreek. "The genetics of the
opioid system and specific drug addictions." Human genetics 131.6 (2012):
823-842.
50. Nestler, Eric J. "Transcriptional mechanisms of drug addiction." Clinical
Psychopharmacology and Neuroscience 10.3 (2012): 136.
51. Ma, Ning, et al. "Addiction related alteration in resting-state brain
connectivity." Neuroimage 49.1 (2010): 738-744. https://doi.org/10.1016/j.
neuroimage.2009.08.037
52. Ersche, Karen D., et al. "Meta-analysis of structural brain abnormalities
associated with stimulant drug dependence and neuroimaging of addiction
152
vulnerability and resilience." Current opinion in neurobiology 23.4 (2013):
615-624. https://doi.org/10.1016/j.conb.2013.02.017
53. Ersche, Karen D., et al. "Distinctive personality traits and neural correlates
associated with stimulant drug use versus familial risk of stimulant
dependence." Biological psychiatry 74.2 (2013): 137-144.
54. Ersche, Karen D., et al. "Abnormal structure of frontostriatal brain systems is
associated with aspects of impulsivity and compulsivity in cocaine
dependence." Brain 134.7 (2011): 2013-2024.
55. Ma, Ning, et al. "Abnormal brain default-mode network functional
connectivity in drug addicts." PloS one 6.1 (2011): e16560. https://doi.org/10
.1371/journal.pone.0016560
56. Broderick, Patricia A. "Cocaine and Neuromolecular Imaging of
Neurotransmitters in the Brain: BRODERICK PROBE® Laurate
Nanobiosensors in Mesocorticolimbic Neurons and the Nucleus Accumbens:
Sex and Genes." Neuropathology of Drug Addictions and Substance Misuse.
Academic Press, 2016. 74-85.
57. Daneshparvar, Hamidreza, et al. "NMDA receptor subunits change in the
prefrontal cortex of pure-opioid and multi-drug abusers: a post-mortem
study." European archives of psychiatry and clinical neuroscience 269.3
(2019): 309-315.
58. Valente, Juliana Y., Hugo Cogo-Moreira, and Zila M. Sanchez. "Evaluating
the effects of parenting styles dimensions on adolescent drug use: secondary
analysis of# Tamojunto randomized controlled trial." European child &
adolescent psychiatry 29.7 (2020): 979-987.https://doi.org/10.1007/s00787-
019-01410-9
59. Garcia, Oscar F., et al. "Alcohol use and abuse and motivations for drinking
and non-drinking among Spanish adolescents: do we know enough when we
know parenting style?." Psychology & health 35.6 (2020): 645-664.
https://doi.org/10.1080/08870446.2019.1675660
60. Vázquez, Alejandro L., et al. "The influence of perceived parenting on
substance initiation among Mexican children." Addictive behaviors 97
(2019): 97-103. https://doi.org/10.1016/j.addbeh.2019.05.026
153
61. Merianos, Ashley L., et al. "Authoritative Parenting Behaviors and Marijuana
Use Based on Age Among a National Sample of Hispanic Adolescents." The
journal of primary prevention 41.1 (2020): 51-69. https://doi.org/10.1007/
s10935-019-00576-x
62. Buccelli, C., et al. "Gender differences in drug abuse in the forensic
toxicological approach." Forensic science international 265 (2016): 89-95.
63. Simpson, Jamie L., et al. "Psychological burden and gender differences in
methamphetamine-dependent individuals in treatment." Journal of
psychoactive drugs 48.4 (2016): 261-269. https://doi.org/10.1080/02791072.
2016.1213470
64. Cotto, Jessica H., et al. "Gender effects on drug use, abuse, and dependence:
a special analysis of results from the National Survey on Drug Use and
Health." Gender medicine 7.5 (2010): 402-413.
65. Passini, Stefano. "The delinquency–drug relationship: The influence of social
reputation and moral disengagement." Addictive behaviors 37.4 (2012): 577-
579. https://doi.org/10.1016/j.addbeh.2012.01.012
66. Payne, Jason, and Antonette Gaffney. "How much crime is drug or alcohol
related? Se-reported attributions of police detainees." Trends and Issues in
Crime and Criminal Justice 439 (2012): 1-6.
67. Felson, Richard B., and Jeremy Staff. "Committing economic crime for drug
money." Crime & Delinquency 63.4 (2017): 375-390. https://doi.org/10.1177
%2F0011128715591696
68. Rigg, Khary K., and Shannon M. Monnat. "Urban vs. rural differences in
prescription opioid misuse among adults in the United States: Informing
region specific drug policies and interventions." International Journal of
Drug Policy 26.5 (2015): 484-491. https://doi.org/10.1016/j.drugpo.2014.
10.001
69. Wang, Karen H., William C. Becker, and David A. Fiellin. "Prevalence and
correlates for nonmedical use of prescription opioids among urban and rural
residents." Drug and alcohol dependence 127.1-3 (2013): 156-162. https://
doi.org/10.1016/j.drugalcdep.2012.06.027
154
CHAPTER 11
FACTORS INFLUENCING RESPONSIBLE CONSUMPTION
DURING POST COVID 19
Anmol Mehta-Research Scholar*
School of Business and Commerce
Manipal University Jaipur
[email protected] (Corresponding Author)
Dr. Meenakshi Sharma
Asst. Professor
School of Business and Commerce
Manipal University Jaipur
Dr. Umesh Solanki
Associate Professor
Tapmi School of Business
Manipal University Jaipur
******************************************************************** Abstract: Covid 19 has disrupted the world in many ways. In this era, it is very
important to study the responsible consumption as it has been observed that during
this time a lot of people have hoarded the daily necessities and also the consumption
of masks and PPE kits was highly exceeded. This paper will throw a light on how
responsible consumption could help us reach a better future for all.
Keywords: Responsible Consumption, COVID 19, responsible consumption behavior
******************************************************************** Introduction
The Sustainable development goals are also known as millennium goals have been
adopted by the United Nations way back in 2015 focusing on 2030. They are aimed
to end the poverty, to protect the Earth in best possible manner and to ensure that all
155
the people all over the world enjoy peace and prosperity. These are interconnected
goals and acting on one goals can help in achieving the other goals as well.
The goal no 12 is Responsible Consumption and Production. It is aimed at achieving
more with the less options. It can help significantly in poverty elevation and lead to
greener economies. Earth has given us abundant resources. We should act in a
responsible manner that we are able to meet the current needs without compromising
the needs of the future generations.
Consumption in a Responsible Manner Behavior is described as acting in a manner
that it has the least influence on the environment in order to meet human needs not
only now, but in the future as well. People try to practice sustainable consumption,
which in turn helps them in making better use of resources which leads to less waste
and pollution. The most common way to achieve this is by doing more with less. To
put it another way, we can meet our needs and desires without diminishing the
planet's natural resources.[5]
We have studied variables that have affected responsible consumption behavior post
covid-19.
Review of Literature
According to cf. Stern, 1992a; Kruse, 1995, there is a problem globally of less
natural resources, the growing population and pollution. Psychology is working
towards developing societies that are least exploitive in the use of the natural
resources present on planet Earth.
According to Foppa et al., 1995; Guagnano et al., 1995, Vining& Ebreo, 1992; ,
Hines et al., 1986r87; Granzin & Olsen, 1991; such sort of behaviours influences
could be seen in the ecological domain. [1]
According to (Sharifah A. Haron et al.) in the past research has been done on
environmentally conscious behavior and they have examined that various factors
tend to influence such kind of behaviour. They are environmental knowledge and the
ability to understand and to evaluate the impact that the society is causing on the
whole of ecosystem.
156
According to (Othman et al.) who has studied the Malaysian teenagers’ the
environmental attitudes and knowledge have been found to influence gender and
ethnicity. It was noticed that the girls during their teenage had developed habits
towards the environmental issues. The author also found that the teenagers in China
were also more knowledgeable about the environmental issues compared to Indians
and Malaysians. The author further mentioned that the overall knowledge of
teenagers belonging to Malaysia was low especially in students belonging to arts
stream when compared with students belonging to science stream.
1. Objective of the study
• To study the influence of environmental value on responsible consumption
behavior post Covid 19
• To study the influence of environmental awareness responsible consumption
behavior post Covid 19
• To study the influence of environmental knowledge on responsible
consumption behavior post Covid 19
• To identify if any difference exist in responsible consumption behaviour post
Covid 19 between male and female students
Hypothesis
• H1A : Environmental value has positive influence on Responsible
Consumption Behavior post Covid 19
• H2A : Environmental awareness has positive influence on Responsible
Consumption Behavior post Covid 19
• H3A : Environmental knowledge has positive influence on Responsible
Consumption Behavior post Covid 19
• H4A : Gender will have significant relation with Responsible Consumption
Behavior post Covid 19
Research Methodology
1. Scope of study :- Final Year University students (Young Consumer}
2. Questionnaire :- Environmental Value:-Franz X. Bogner, 2018
Environmental Awareness:- Arba’at Hassan, et al, 2010 [3]
157
Environmental Knowledge :- Sharifah A. Haron, et al. 2005 [4]
Responsible Consumption Behavior:- The General Ecological Behaviour
(GEB) scale by Kaiser, (1998) [2]
3. Type of Study:- Descriptive
4. Sampling technique:- Convenient Sampling Method
5. Sample Size:-30
6. Sample unit:- University Students
7. Analysis:- ANOVA, Regression.
Tables
Data Analysis
Descriptive Statistics
Mean Std. Deviation N
Responsible Consumption Behaviour 3.872605 0.494578 30
Environmental Awareness 3.955556 0.512879 30
Environmental Knowledge 3.9 0.380302 30
Environmental Value 3.815171 0.369467 30 (Bases on calculation by the authors)
Summary of the Model
Model B Std. Error
T Sig. 95.0% Confidence
Interval for B
Low Bound
Upper Bound
Constant 4.711759 1.163912 4.048209 0.000412 2.319304 7.104214
EA 0.13485 0.211121 0.63872 0.528591 -0.56881 0.299117
EK 0.18773 0.274493 0.683915 0.50079 -0.3765 0.751959
EV -0.27205 0.301928 -0.90103 0.375842 -0.89267 0.348575 (Bases on calculation by the authors)
RCB = 4.711759 + 0.13485 EA+0.18773 EK - 0.27205EV
158
● H1A:- Environmental Value is negatively related to Responsible consumption
behaviour.
● H2A:- Environmental Awareness is positively related to Responsible
consumption behaviour.
● H3A:- Environmental Knowledge is positively related to Responsible
consumption behaviour
Relationship of Responsible consumption behaviour and Gender
Sum of Squares df Mean Square F Sig.
Between Groups 0.210355 0.210355 0.210355 0.826327 0.371095
Within Groups 7.127864 7.127864 0.254567
Total 7.338219 7.338219 (Bases on calculation by the authors)
H0 is not rejected and hence, it can be said that responsible consumption behaviour
does not depend on gender.
Findings
• All the three factors are found to be least significant predictor of responsible
consumption behavior post Covid 19.
• Out of the three predictors environmental knowledge has the most influence
on responsible consumption behavior post Covid 19
• Whereas environmental value has the least influence on responsible
consumption behavior post Covid 19
• During the study it is also found that gender does not have an effect on
responsible consumption behavior post Covid 19
Conclusion
Researcher has studied the University students as they are the ones who will take up
the job and become the earning members of the family. They will be the ones who
will be the decision makers in the coming times. The researcher has identified that
the young consumers have not been inclined towards responsible consumption
159
considering the studied factors during and post covid times. It has also shown that
gender does not have effect on responsible consumption behavior post Covid 19
In the literature review it was found as per (VANTAMAY , 2019, Kasetsart
University, Bangkok) it was discovered that it is important as the young consumers
are going to be the decision makers in the coming future. The author focusses on
making early habits for such consumers. If they form sustainable habits this would
help in achieving the responsible consumption goal. Hence for the study young
consumers specially students in the age group of 18-25 were studied.
References and Bibliography
1. Hines, J. M. et al. “Analysis and synthesis of research on responsible
environmental behavior: a meta-analysis”. Journal of Environmental Education
18 (1986): 1 8. Print.
2. Kaiser, F. G. “A general measure of ecological behavior”. Journal of Applied
Social Psychology 28 (1998): n. pag. Print.
3. Albarracín, Dolores et al. “Theories of Reasoned Action and Planned
Behavior as Models of Condom Use: A Meta-Analysis”. Psychological bulletin
127.1 (2001): 142–161. Web.
4. Arbuthnot, Jack. “The Roles of Attitudinal and Personality Variables in the
Prediction of Environmental Behavior and Knowledge”. Environment and
behavior 9.2 (1977): 217–232. Web.
5. Martin, en Titouan Chassagne. “Sustainable Consumption and Production”.
N.p., 13 Jan 2015. Web. 11 Des 2021.
160
CHAPTER 12
FINANCIAL LITERACY LEVELS ACROSS
POPULATION GROUPS
Pranav Vashista*
Founder
Millenials on Money LLP
Faridabad Haryana
[email protected] (Corresponding Author)
MitaliMadhu Salklan
Student (MBBS, 3rd Proof),
Pandit Bhagwat Dayal Sharma Post Graduate Institute of Medical Sciences,
Rohtak - 124001, Haryana
******************************************************************** Abstract: People are expected to make a variety of financial transactions and
decisions on savings, investment, borrowing on a daily basis. However, the process
is complex in the current environment in an array of financial instruments and
options available. Financial literacy of common people is therefore an area of
interest and is an imperative skill for grass root consumers. Enhancement of
financial literacy should, therefore, be based on the existing knowledge of the
consumers and form the basis of development of training and skill enhancement
methodologies. An online survey was conducted using a validated combined
Cumurovic-Lusardi scale to identify financial literacy levels across genders, educational
status, occupation, and income groups. Individual responses were collated across the
socio-demographic characteristics and analysed. The percentage of correct response
was more than 60%, being highest for the question on fluctuation in the financial
instruments (90.33% correct responders) and lowest (61%) for investment funds.
Mean score identified was 4.433+1.43 with non-significant difference between the
sociodemographic groups. Difference between the groups who have undergone
previous training and those who find it to be important as compared to those who do
161
not find it important was statistically significant. Most affirm that financial literacy
is much needed but their primary source is their family or rely on information
available online rather on expertise and curated programmes. Financial literacy
levels do not differ between genders, age groups, education levels or work profiles.
Change in attitudes towards is needed to enhance literacy levels.
Keywords: Cumurovic-Lusardi scale, financial training, investment funds, stocks
******************************************************************** Introduction
The digital era has opened many options and avenues for money management which
people are expected to do. Persons are expected to decide their options for saving,
spending and investment. The task is even more important in India where the social
security is meagre and a high percentage of population is below the poverty line.
Financial literacy is a relatively new concept [1] and focuses on enabling
management of income by an individual [2].
It is a vast subject requiring processing economic information and make informed
decisions about financial planning, wealth accumulation, debt, and pensions3.
Requiring an understanding and knowledge of day to day financial dealings
affecting behaviour towards money including earning, spending, and generation of
income. A number of survey studies have been conducted on different population
groups focussing on different facets of the literacy[4,5,6].
The present study was undertaken to identify financial literacy in urban India
population across all age groups using a standardized questionnaire7. This
instrument named as Combined Cumurovic-Lusardi (CL) questionnaire, has a
Cronbach’s Alpha of 0.62 and has good correlation with other existing scales
proposed in literature[8-15].
Methodology
Survey population
A cross sectional online survey was conducted from 30th November 2021 to 12th
December 2021. The survey questionnaire prepared was circulated on the social media
sites (including WhatsApp®, Facebook®, Telegram®, etc.) to students, entrepreneurs,
162
working professionals individually and various groups requesting them to forward
the questionnaire to their colleagues and peers.
All individuals, above the age of 18 years, irrespective of gender, education,
occupation were invited to participate in the survey. A sample of minimum 300 was
proposed for the study. The attempt was to reach to as many individuals as possible
through social media.
Questionnaire
A Questionnaire was created on Google Forms comprising of 3 parts. First section
was a brief about the objectives of the survey, and the consent of the participants.
Second section was socio-demographic information including age, gender, educational
qualification, occupation and previous financial knowledge. Third section was the 6-
item questionnaire (CL scale) with fixed options. Fourth section contained 4 questions
as to if they think financial literacy is important for them and how much are the
willing to spend to enhance their knowledge. Two questions where they have learnt
the financial know how and when a person should be exposed to financial
knowledge had multiple options.
The face validity of the questionnaire was assessed by an economics educator and
researcher about 20 years of experience and another a researcher in public health
with 20 years of experience.
Statistical analysis
Frequencies of responses was counted. Correct response scores to the questionnaire
were counted for the CL questionnaire. Mean and SD of the score was calculated
and compared between genders, age group, occupation, financial training and
perception of importance. Comparison according to demographic characteristics was
done using independent samples t-test or one-way analysis of variance (ANOVA), as
appropriate. The statistical significance level was set at p < 0.05 (two-sided).
Descriptive responses to questions on source of knowledge and stage when a person
is exposed were counted.
163
Results
Responses received
The survey was conducted from 30th November 21 to 13th December 21. The
response rate was approximately one response per hour.
Socio-demographic profile
Age of the participants was between 18 to 75 years, with 55% below the age of 30
years. The number of male participants was more than female participants, with 90%
being graduates or above (Table 1).
Table 1: Socio-demographic profile of responders
Socio-demography Variable Number Percentage
Age
18-25 126 42%
26 – 30 40 13.33%
31 – 35 15 5%
36 – 40 21 7%
41 – 45 31 10.33%
46 – 50 35 11.67%
51 – 55 14 4.67%
56 – 60 14 4.67%
61 – 65 1 0.33%
66 – 70 2 0.67%
71 – 75 1 0.33%
Gender
Male 194 64.67%,
Female 105 35.00%
Prefer not to say 1 0.33%
Qualification
Schooling 22 7%
Diploma 8 2.67%
Bachelors degree 140 46.67%
Masters degree 117 39%
PhD 13 4.33%
Occupation Student 51 17%
Entrepreneur & self employed 78 26%
164
Socio-demography Variable Number Percentage
Private Job 83 27.67%
Family Business 48 16%
Government Job 32 10.67%
Homemaker 6 2%
Retired 2 0.67%
Previous financial training Yes 54 18%
No 246 82% Response to financial literacy questions
Response to the questions was mandatory in the survey and had fixed choice (Table
2). The percentage of correct response was more than 60%, being highest for the
question on fluctuation in the financial instruments (90.33% correct responders) and
lowest (61%) for investment funds.
Table 2: Response to questions
Quest no.
Query Response options Number of responders
Percentage
1 Buying a single share is safer than buying an equity fund.
True or false?
True 78 26% False 222 74%
2 You have Rs 100/- on your savings account with 2%
interest per year. How much will you have after 5 years if
you let your money grow
109.56
23
7.66%
110.41 200 66.67% 111.43 77 25.67%
3 Your savings account earns 1% interest per year, and
inflation amounts to 2% per year. How much can you buy
after one year with the money in your savings
account?
More Than Today 26 8.66% Same as today 36 12%
Less Than Today 238 79.33%
4 Which investment normally has the largest fluctuations?
Savings Account 04 1.33% Fixed Interest 05
1.66%
Securities
Shares 271
90.33%
165
Mutual Funds 20 6.66% 5 Which of the following
statements best describes the main task of the stock
market?
The stock market predicts stock profits
11 3.66%
The stock market leads to an increase
in stock prices
18 6%
The stock market leads to an increase
in stock prices
225 75%
None of the above 46 15.33% 6 Which of the following
statements is correct? Once you have
invested in a mutual fund, you cannot
withdraw the money in the first year
32 10.66%
Investment funds can invest in several assets, e.g., shares
and bonds
183 61%
Investment funds pay a guaranteed
return, which depends on the past
performance
39 13%
None of the above 46 15.33%
166
Total score of participants
The demographic variables did not affect the scores and there was no significant
difference between the various groups. Prior financial knowledge and importance of
training were the only factors affecting the scores (Table 3).
Table 3: Score of participants with respect to demographic variables
Variable Score + SD
Significance
Age
18-25 (n=126) 4.67+1.40
0.068* 26 – 40 (n=76) 4.05+1.41
41 – 60 (n=98) 4.43+1.43
Gender Male (n=194) 4.52+1.45
0.962 Female (n=105) 4.28+1.39
Qualification
Schooling (n=22) 4.12+1.71
0.935* Bachelors degree (n=148) 4.45+1.42
Masters degree (n=117) 4.45+1.37
PhD (n=13) 4.31+1.84
Occupation
Self employed, business (n=126) 4.48+1.33
0.301* Job & retires (n=117) 4.28+1.57
Students & home makers (n=57) 4.62+1.33
Previous financial training (Independent t test)
Yes (n=54) 5.06+1.09 0.002
No (n=246) 4.30+1.46
Importance of training
Yes (n=278) 4.47+1.39
0.000 No (n=06) 2.00+1.26
May be (n=16) 4.69+1.35 *Independent t test $One way ANOVA
Importance of financial literacy
Since importance of training was identified to be a variable affecting level of
financial literacy, the responses received were further segregated as per the
demographics (Table 4).
167
Table 4: Importance of financial literacy
Importance of financial training
Amount that participants can spend in a year to gain financial knowledge
Variable Yes No Maybe No spending
Less Than Rs. 1000
More than Rs 1000
No fixed limit
Male (n=194 ) 180 4 10 52 25 30 87
Female (n=105) 97 2 6 32 21 14 38
Age
18-25 years (n=126) 117 5 4 39 21 14 52
26 – 40 years (n=76) 70 1 5 22 13 13 28
41-75years (n= 98) 91 1 6 23 12 17 46
Previous financial training
Yes(n=54) 52 1 1 5 9 8 32
No(n=246) 226 5 15 79 37 36 94 Financial know how
In response to the question on where they get their financial know how from, 132
(44%) responded that they got their financial knowhow from their family, and for
42% online videos was an important source (Table 5). One participant mentioned
bank officials and one mentioned asset manager as their source of information.
Table 5: Source of information
Variable Number* Percentage Family 132 44% Friends 71 23.67% Books 26 8.67% Self enrolled courses 38 12.67% Seminars 46 15.33% College education 62 20.67% School education 18 6% Online videos 126 42% Online blogs 55 18.33% News / Newspapers 06 2% *multiple responses
168
As regards the age at which the person should be exposed to money concepts almost
all the participants were of the opinion that it should be at the education
Table 6: Age of exposure
Variable Number* Percentage
Middle school 130 43.33%
Senior school 133 44.33%
College 113 37.67%
Young professionals 79 26.33%
Middle age 34 11.33%
Pensioners 29 9.67%
Jab jaago 3 1% *multiple responses
Discussion
The new Combined Cumurovic-Lusardi(measure is a 6-item instrument developed
by correlation and multidimensional scaling of 6 previously existing instruments to
give a better representation of financial literacy than the scales being used
separately. The scale was identified to be more reliable with high external validity.
Considering that an online survey was being conducted, this scale was found to be
most suitable requiring minimal time. Additional questions were added to identify
previously existing financial know how and perception of importance of financial
literacy by the participants.
There is a significant difference between the participants attitudes towards training
and if they have taken previous trainings in their scores for financial literacy levels.
Scores across age, gender, occupation were not significantly different.
Although almost all participants affirmed that financial training is important, half of
them would not want to spend any money on gaining it and most of the participants
rely on family, friends and information available online rather on relying on experts.
The level of literacy though present however, may not therefore lead to an actual
change in behaviour and attitudes towards money in such cases.
169
It is imperative that measures are taken to improve attitudes towards money and
making the participants understand the importance of financial literacy before
measure are taken to enhance literacy levels.
The survey had a mass outreach by electronic media, required only a few minutes of
time and the participants were ready to complete the survey. The strengths of the
study are that real time data could be collected in a short period of time, on digital
platform from all age groups and different service profiles.
The study limitations are that the survey was conducted only for a period of 2 days,
the sample was not statistically calculated and the sampling was non-probabilistic.
The persons who were active on social media, are more likely to be responders,
rather than those who have limited activity on social media. Although, presently
there are no means to identify the same, there is a possibility that these persons have
a larger exposure to economic and financial information available on social media.
Also, though participants were from all age groups, number of participants dwindled
with age, which could be due to technological challenges, or other practical limitations.
The study also does not assess how literacy actually translates into behaviour and
attitudes towards money for which larger studies are required.
Conclusion
Participants surveyed in the study had a reasonable level of financial literacy. Most
affirm that it is needed but their primary source is their family or rely on information
available online rather on expertise and curated programmes.
170
References and Bibliography
1. Kempson, Elaine et al. “Measuring Financial Capability: An Exploratory
Study for the Financial Services Authority”. Financial Services Authority,
June 2005
2. Louw, Jurgens, et al. “Financial Literacy Needs of South African Third-Year
University Students”. International Business & Economics Research Journal,
vol. 12, no. 4, 2013, pp. 439-50
3. Lusardi, Annamaria and Olivia SMitchell. “The Economic Importance of
Financial Literacy: Theory and Evidence”. J Econ Lit., vol. 52, no. 1, 2014,
pp. 5-44
4. Agarwalla,Sobhesh Kumar, et al.“Financial Literacy among Working Young
in Urban India”. WorldDevelopment, vol. 67, 2015 pp. 101–09
5. Thapa, Bharat Singh and Surendra RajNepal. “Financial Literacy in Nepal: A
Survey Analysis from College Students”. NRB Economic Review, 2015, pp.
50-74
6. Potrich, Ani Caroline Grigion et al. “Development of a financial literacy
model for university students”. Management Research Review, vol. 39, no. 3,
2016, pp. 356 – 76
7. Rieger, Marc Oliver. “How to Measure Financial Literacy?”J. Risk Financial
Manag., vol. 13, 2020, pp. 324
8. Alexeev, Natalia et al. Evaluation of a financial literacy test using classical
test theory and item response theory. Journal of Family and Economic Issues,
vol. 35, 2014, pp. 516–31
9. Anderson, Anders et al. “Precautionary savings, retirement planning and
misperceptions of financial literacy”. Journal of Financial Economics, vol.
126, 2017, pp. 383–98.
10. Bianchi, Milo. “Financial literacy and portfolio dynamics”. The Journal of
Finance, vol. 73, 2018, pp. 831–59.
11. Burke, Mary A and Michael Manz. “Economic literacy and inflation
expectations: evidence from a laboratory experiment”. Journal of Money, Credit
and Banking, vol. 46, 2014, pp. 1421–56.
171
12. Cumurovi´c Aida and Walter Hyll. “Financial literacy and self-employment”.
Journal of Consumer Affairs, vol. 53, 2019, pp. 455–87
13. Gathergood John, and JörgWeber. “Financial literacy, present bias and
alternative mortgage products”. Journal of Banking & Finance, vol. 78,
2017, pp. 58–83.
14. Lusardi, Annamaria and Olivia SMitchell. “Financial literacy around the world:
an overview”. Journal of Pension Economics & Finance, vol. 10, 2011, pp.
497–508
15. Van Ooijen,Raun and Maarten CJ van Rooij. Mortgage risks, debt literacy
and financial advice. Journal of Banking & Finance,vol. 72, 2016, pp. 201–17.
172
CHAPTER 13
SYNTHESIS AND MÖSSBAUER SPECTROSCOPY OF
MARCASITE FES2 NANOPARTICLES
Govind Singh Chandrawat
Department of physics, ISR, IPS Academy Indore, Indore, India
Department of physics, Manipal University Jaipur, Jaipur, India.
Jitendra Tripathi
Department of physics, ISR, IPS Academy Indore, Indore, India
Jaiveer Singh
Department of physics, ISR, IPS Academy Indore, Indore, India
Anupam Kumar Sharma*
Department of physics, Manipal University Jaipur, Jaipur, India.
[email protected] (Corresponding Author)
******************************************************************** Abstract: Seeing the possible applications in solar cells and Batteries, we reported
the synthetization and characteristics of FeS2 Marcasite nanoparticles (NPs). Iron
sulfide nano particles were prepared using a Polyol method. X-ray diffraction
(XRD) confirmed the crystal structure of FeS2 nnaoparticles that produced a mean
crystal size of 15.4 nm. The FeS2 NPs were also investigated using Mössbauer
Spectroscopy. Due to large energy and small line widths of Gamma rays, Mössbauer
Spectroscopy gives higher resolution and for this reason this technique is extensively
used here. FeS2 Marcasite sample shows magnetic (Fe2O3) phase as confirmed from
Mossbauer technique. Raman spectroscopy used for vibrational properties and
EDAX was used to find out the chemical composition.
Keywords: Iron sulfide, Nano Particles, Mössbauer Spectroscopy, Polyol method.
********************************************************************
173
Introduction
Much effort has been devoted to the development of advanced anode materials for
lithium-ion batteries (LIBs) to meet the ever-increasing demand for future energy
storage applications [1]. Transition-metal sulfides have received much interest
because of their applications in simplistic producibility, high capacity and
environmental friendly nature [2, 3, 4]. It is reported in the literature that FeS2, exists
in two phases one is pyrite and another one is marcasite. Pyrite-FeS2 has cubic
crystalline structure, while marcasite-FeS2 possesses the orthorhombic structure.
Marcasite shows large electrical conductivity as compared to pyrite due to lower
energy gap [1, 5, 6].
Previous work carried out on Iron Sulfide (FeS2) system, largely depends on X-ray
inspections and analysis of their electrical and magnetic characteristics. From the
Mössbauer Spectroscopy it is found that (FeS2) system has diamagnetic or
paramagnetic properties. For structural and chemical properties and find out the
stability, Rietveld refinement, EDAX and Zeta potential also performed. Vibrational
Properties also carried out using the Raman and FTIR Spectroscopy. For topographical
image FESEM also performed in previous study [7-15]. Iron sulphides are
considered as advanced inorganic materials in relevant applications, such as high-
energy density batteries, photo-electrolysis, solar energy conversion, precursors for
the synthesis of superconductors and chalcogenides [16-20].
Experimental Techniques
Synthesis of FeS2 Nanoparticles and Materials Used
In the synthesis method, analytic reagent grade chemicals were employed.
FeCl3·6H2O (Ferric Chloride), NH2CSNH2 (Thiourea) were purchased from Thomas
baker and C2H6O2 (Ethylene Glycol) from Merck, India
Synthesis of FeS2 Nanoparticles
FeS2 NPs were synthesized by using the well known Polyol method [15]. 1.0 g
(3.699 mmol) of FeCl3·6H2O and 0.75 g (3.2842mmol) of thiourea (NH2CSNH2)
were mixed in 50 ml of ethylene glycol (EG). This mixture was annealed at 180°C
for 3 hours. Due to the production of FeS2 nanocrystals, a dark precipitate resulted.
174
This solution was brought to 27 °C and cleaned using ethanol. This procedure was
repeated 4-5 times to unsheathe nanoparticles. Different techniques for example X
ray diffraction (XRD), Energy Dispersive X-Ray Analysis (EDAX), Raman and
Mossbauer spectroscopy measurements employed on the particles dried at 60°C.
Characterization
For chemical composition analysis Energy dispersive x-ray spectrometer (EDXS) of
Model INCA Oxford was used which is attached with Scanning Electron
Microscope FModel JEOL JSM 5600. For the XRD, the Bruker D8 Advance
diffractometer of UGC DAE-CSR, Indore was used. The Cu-Kα x-ray source with
wavelength 1.54 Å used in the present study. The 2θ range was taken from 20-70°.
The Raman spectroscopy done on the Lab RAM HR Visible instrument (Horiba
Jobin Yuvon) using a Ar+ ion laser at room temperature using λ =488 nm in the
wave number range from 200 to 450 cm-1.
The Mössbauer spectrum was recorded using a proportional counter at room
temperature with the self-assembled multichannel analyzer (controlled unit) in a
constant acceleration. Co/Rh used as a source. The source is vibrated using an
electromagnet as a drive unit. This instrument is capable to perform transmission
and conversion electron modes. Using a superconducting magnet, the system can
provide temperature from 4.2 to 1000 K using an external magnetic field of 7 Tesla
(both parallel and perpendicular geometries). The Excitation energy (Eγ) 14.4 KeV
was used and the velocity range (drive unit speed) was -12 to +12 mm/s (48.075 neV
=1 mm/s). Normos Software, a DOS-based programme, was used to fit the
Mössbauer data properly. For calibration, a natural iron spectrum was used [21].
Results and Discussion
EDAX
Figure 1 shows the EDAX of synthesized Marcasite FeS2 nanoparticles,
demonstrating standard emission maxima of Fe and S elements. The computable
examination depicted that the atomic % ratio of Fe to S is 46.58:53.42, that provides
the FeS2 Marcasite form. According to EDAX maxima, it was seen that Fe lines Kβ3,
Kα1, Kβ1 correspond to energy 7.0850, 6.4038, 0.7185 KeV and S lines Kα1, Kα2,
175
correspond to energy 2.3078, 2.3066 KeV is observed (see table 1 for different
parameters) [5]. Apart from desired elemental presence, one peak of chlorine K
corresponding 0.2020KeV with 0.00 atomic percentages was present in the sample
as shown in figure which is negligible [1].
X-ray Diffraction
For the structural characterization X-ray Diffraction was performed. Figure 2
represents the X-ray diffraction layout of FeS2 NP. Various Bragg peaks can be seen
in the recorded diffraction pattern corresponds to crystal planes (111), (200), (211),
(300),(222),(230) and (231) at 2θ values ~25.59°, 30.06°, 36.32°, 47.72°, 52.48°
respectively. They are related to FeS2 Marcasite and matches with JCPDS No.
370475 [1, 22].
The average crystalline size (L) calculated using Scherrer formula:
)cos(9.0θλ
BL =
(1)
In the above relation, λ=X-ray wavelength, B= FWHM of diffraction maxima, K =
correction factor and θ= Bragg angle. The mean crystal size was observed to be~
15.39 nm. Homogeneous and well adherent NPs have been obtained, exhibiting a
black colour to the naked eye. The lattice constant was found of Marcasite with
Orthorhombic structure (a≠ b ≠ c) is a=5.97Å, b=6.03Å, c=5.94Å.
Raman Technique
To study the vibrational properties of FeS2 Marcasite NPs, the Raman measurement
was performed. The micro-Raman spectrum of FeS2 NPs is depicted in Figure 3.
Three well-known peaks may be seen at 218.4 cm-1, 282.3 cm-1 and 316.3 cm-1 that
are agree well with the literature reports of FeS2 Marcasite structure [1, 23-24].
Mossbauer Technique
To study the magnetic properties, Mössbauer technique was employed on FeS2
Marcasite NPs. The Mössbauer spectrum of FeS2 Marcasite NPs can be seen in
figure 4. Normos Software, which runs on DOS, was used to fit the spectrum and
176
yielded variables such as I.S (Isomer shift), Q. S. (quadrupole splitting) and H. S.
(hyperfine splitting) [21].
Mössbauer spectra of the Marcasite FeS2 NP are very similar in case of doublet to
pyrite. We observed that the magnetic structure produced from H. S. (Hyperfine
Splitting) and non-magnetic compound produced from Q. S. (Quadrupole splitting).
The Mössbauer parameters are given in Table 2, indicating no significant change in
the doublet configuration of the Marcasite FeS2 NP. However, this does not mean
that there are no impurities phase present in the samples.
2nd doublet at room temperature the mean electric Q. S. (∆EQ), mean I.S. (δ), of the
Marcasite NPs are 0.7199±.0208 mm/s and 0.3755± 0.0128 mm/s respectively and
Line Width 0.6345±.0313 mm/s and Area (%) 37.34 [25-27]
In innate iron, the induced magnetic field was found to be 33 Tesla. At 1st Sextant
due to the Induced Magnetic Field (BHF) 30.68±0.094 (Tesla) the mean electric Q.
S. (∆EQ), and mean I. S. (δ), of Marcasite FeS2 NPs are 0.861± 0.032 mm/s and
0.4385± 0.0163mm/s respectively and line width 0.7583± 0.0466 mm/s and Area
(%) 62.66. The hyperfine splitting shows that impurities Fe2O3 Phase, in the Marcasite
lattice. In contrast, no evidence of a singlet peak corresponding to FeS [28, 29].
Acknowledgments
The authors are thankful to UGC-DAE CSR Indore for furnishing experimental
amenities. We are particularly thankful to Dr. Mukul Gupta (XRD), Dr. V. Reddy
(Mossbauer) and Dr. V. Sathe (Raman) for their help in the measurements.
Conclusion
FeS2 Marcasite NPs successfully synthesized using the Polyol method. The mean
crystal size of FeS2 Marcasite NPs was found 15.4 nm. Using the EDAX it is found
that in the sample negligible carbon is present. Raman spectra show the Ag vibration
mode of FeS2. From Mössbauer it is found that Marcasite was found diamagnetic
but due to the Fe2O3 impurities Phase the induced magnetic field was found the
30.68±0.094 Tesla.
177
References & Bibliography
1. Hong-Hong Fan, Huan-Huan Li, Ke-Cheng Huang, Chao Ying Fan, Xiao-
Ying Zhang, Xing-Long Wu, and Jing-Ping Zhang, Metastable Marcasite-
FeS2 as a New Anode Material for Lithium-Ion Batteries: CNFs-Improved
Lithiation/Delithiation Reversibility and Li-Storage Properties, ACS Appl.
Mater. Interfaces, 9, 12, 10708–10716 (2017), https://doi.org/10.1021/
acsami.7b00578
2. Susan E. Habas, Heather A. S. Platt, Maikel F. A. M. van Hest, David S.
Ginley, Low-Cost Inorganic Solar Cells: From Ink To Printed Device, Chem.
Rev., 110(11), 6571-6594 (2010). https://doi.org/10.1021/cr100191d
3. Alec Kirkeminde, Brian A. Ruzicka, Rui Wang, Sarah Puna, Hui Zhao,
Shenqiang Ren, Synthesis and Optoelectronic Properties of Two-Dimensional
FeS2 Nanoplates, ACS Appl. Mater. Interfaces, 4(3), 1174-1177 (2012).
https://doi.org/10.1021/am300089f
4. Miguel Cabán-Acevedo, Matthew S. Faber, Yizheng Tan, Robert J. Hamers,
and Song Jin, Synthesis and Properties of Semiconducting Iron Pyrite (FeS2)
Nanowires, Nano Lett., 12(4), 1977-1982(2012). https://doi.org/10.1021/nl
2045364
5. Tingting Li, Zuoxing Guo, Xiaoying Li, Zhennan Wu, Kuo Zhang, Huiwen
Liu, Haizhu Sun, Yi Liu, Hao Zhang, Colloidal synthesis of marcasite FeS2
nanoparticles with improved electrochemical performance. RSC Advances,
5(120), 98967–98970 (2015). https://doi.org/10.1039/C5RA22610D
6. Corinne Arrouvela, Surfaces, Interfaces and Crystal Growth of Marcasite
FeS2, Materials Research. 2021; 24(1): e20200383 https://doi.org/10.1590/
1980-5373-MR-2020-0383
7. F. Hulliger and E. Moorer, Semiconductivity in pyrite, marcasite and
arsenopyrite phases, Journal of Physics and Chemistry of Solids, 26(2), 429-
433(1965). https://doi.org/10.1016/0022-3697(65)90173-3
8. Haakon Haraldsen, Wilhelm Klemm, Magneto chemical studies. XV. About
the magnetic behavior of some sulphides with a pyrite structure, Journal of
inorganic and general chemistry, 223(4), 409-416 (1935). https://doi.org/10.
1002/zaac.19352230413
178
9. A. Serres, On some compounds of cobalt and iron with very weak and
constant paramagnetism, J. Phys. Radium 14, 689 (1953). https://doi.org/10.
1051/jphysrad:019530014012068901
10. L. Pauling, The Nature of the Chemical Bond (Cornell U. P., New York,
1960).
11. L. Pauling and M.L. Haggins, Covalent Radii of Atoms and Interatomic
Distances in Crystals containing Electron-Pair Bonds, Zeitschrift Für
Kristallographie - Crystalline Materials, 87(1-6), 205-238 (1934).
https://doi.org/10. 1524/zkri.1934.87.1.205
12. J. Tripathi; G. S. Chandrawat; J. Singh; S. Tripathi; A. Sharma , Correlation
among local structure, magnetic, structural and electronic properties in
Polyol synthesized iron sulfide (FeS2) nanoparticles, Journal of Alloys and
Compounds, Vol. 861, 157977 (2021). https://doi.org/10.1016/j.jallcom.2020.
157977
13. G.S. Chandrawat, J. Tripathi, A. Sharma, J. Singh, S. Tripathi, Jyotsna
Chouhan, Study of Structural and Optical Properties of FeS2 Nanoparticles
Prepared by Polyol Method, Journal of Nano and Electronics Physics , Vol.
12 No 2, 02016 (3pp) (2020). https://doi.org/10.21272/jnep.12(2).02016
14. G. S. Chandrawat, J. Tripathi, A. Sharma, J. Singh, and S. Tripathi, The
effect of surfactant on structural properties of FeS2 nanoparticles, AIP
Conference Proceedings 2265, 030099 (2020). https://doi.org/10.1063/5.
0017468
15. G. S. Chandrawat, J. Singh, J. Tripathi, S. Tripathi, A. Sharma, M. Gupta, V.
Sathe, Synthesis And Structural Characterization of FeS2 Nanoparticles
Using Rietveld Refinement, AIP Conference Proceedings 2100, 020023
(2019). https://doi.org/10.1063/1.5098577
16. Helmut Tributsch, Metal Sulfides in Photovoltaic, Photoelectrochemical and
Solar Biological Energy Conversion, Studies in Inorg. Chem.; Vol. 5: 277-
310 (1984). https://doi.org/10.1016/B978-0-444-42355-9.50019-0
17. A. S. Arico, V. Antonucci, N. Giordano, F. Crea, P. L. Antonucci,
Photoelectrochemical behavior of thermally activated natural pyrite-based
photoelectrodes, Materials Chem. and Phys.; Vol. 28 (1):75-87(1991).
179
https://doi.org/10.1016/0254-0584(91)90054-X
18. A. G. Ritchie, P. G. Bowles, D. P. Scattergood, Lithium-ion/iron sulphide
rechargeable batteries, J. Power Sources, Vol. 136 (2), 276-280 (2004).
https://doi.org/10.1016/j.jpowsour.2004.03.043
19. Enbo Shangguan, Jing Li, Zhaorong Chang, Quanmin Li, Xiao-Zi Yuan,
FeS/C composite as high-performance anode material for alkaline nickel–
iron rechargeable batteries, J. Power Sources, 291, 29-39 (2015).
https://doi.org/10.1016/j.jpowsour.2015.05.019
20. Hector K. Vivanco, Efrain E. Rodriguez, The intercalation chemistry of
layered iron chalcogenide superconductors, Journal of Solid State Chemistry,
242 (2), 3-21(2016). https://doi.org/10.1016/j.jssc.2016.04.008
21. Richard A. Brand, Normos Mössbauer fit program (Laboratory of Applied
Physics, Duisburg, 1990).
22. Hongfei Cheng, Qinfu Liu, Shuai Zhang, Shaoqing Wang, Ray L. Frost,
Evolved gas analysis of coal-derived pyrite/marcasite, J Therm Anal
Calorim, 116, 887–894 (2014). https://doi.org/10.1007/s10973-013-3595-0
23. Markasit: Rruff data base; Marcasite R060882, Bob Jenkins.
https://rruff.info/Marcasite
24. Feng Jiang, Lauren T. Peckler, and Anthony J. Muscat, Phase Pure Pyrite
FeS2 Nanocubes Synthesized Using Oleylamine as Ligand, Solvent, and
Reductant, Crystal Growth & Design, 15 (8), 3565–3572 (2015).
https://doi.org/10.1021/acs.cgd.5b00751
25. R. Garg, & V. K. Garg, Mössbauer electric-field gradient study in FeS2
(marcasite). Applied Physics, 16(2), 175–178(1978).
https://doi.org/10.1007/BF00930383
26. R. Garg, V. K. Garg, & Y. Nakamura, Magnetic properties of iron marcasite
FeS2. Hyperfine Interactions, 67(1-4), 447–451(1991). https://doi.org/10.
1007/BF02398183
27. Vijayendra K. Garg, Mossbauer Studies of Iron Sulphide Minerals, Brazilian
Journal of Physics, Vol. 10, NP 3, 1980. http://sbfisica.org.br/bjp/download/
v10/v10a37.pdf
180
28. Joana Thiel, James M. Byrne, Andreas Kappler, Bernhard Schink, Michael
Pester, Pyrite formation from FeS and H2S is mediated through microbial
redox activity, Proceedings of the National Academy of Sciences of the
United States of America, 116(14), 6897–6902 (2019). https://doi.org/10.
1073/pnas.1814412116
29. E. A. Ferrow, B. A. Sjöberg, Oxidation of Pyrite Grains: A Mössbauer
spectroscopy and mineral magnetism study, Hyperfine Interactions, 163, 95–
108 (2005). https://doi.org/10.1007/s10751-005-9199-8 .
181
Figures
Figure 1: EDAX spectrum of prepared Marcasite FeS2 NP
Figure 2: XRD patterns of prepared Marcasite FeS2 NP
182
Figure 3: Raman Spectra of prepared Marcasite FeS2 NP
Figure 4: Mössbauerspectra ofprepared Marcasite FeS2 NP
183
Tables
Table 1: EDAX Parameters of Marcasite FeS2 NPs
Element Weight% Atomic%
C K 0.00 0.00
S K 39.70 53.42
Fe K 60.30 46.58
Table 2: Mossbauer parameter of Marcasite FeS2 NPs
Doublet Signal Marcasite Sextant Signal Marcasite
I. S. (mm/s) 0.3755± 0.0128 I. S. (mm/s) 0.4385 ± 0.0163
Q. S. (mm/s) 0.7199± 0.0208 Q. S. (mm/s) 0.8610 ± 0.0326
Line with (mm/s) 0.6345± 0.0313 Line with (mm/s) 0.7583 ± 0.0466
- - BHF (Tesla) 30.68 ± 0.094
184
CHAPTER 14
CHEMICAL CHARACTERIZATION AND BIOLOGICAL
ACTIVITY OF SILVER NANOPARTICLES BIOSYNTHESISED
FROM EXTRACTS OF CISSUS SP.: NATURAL BONE
HEALING HERB
Smita Purohit
Department of Botany
The IIS University, Jaipur
Rajasthan, India
Divya Pancholi
Department of Botany
The IIS University, Jaipur
Rajasthan, India
Niranjan Kunwar
Department of Botany
The IIS University, Jaipur
Rajasthan, India
Swati Gupta
Department of Biosciences
Manipal University Jaipur
Rajasthan, India
Rohit Jain*
Department of Biosciences
Manipal University Jaipur
Rajasthan, India
[email protected] (Corresponding Author)
185
******************************************************************** Abstract: Green synthesis of AgNPs from leaf and stem extracts of Cissus sps. and
their characterization was performed in the present study. Soxhlet method was used
for extraction of metabolites from stem and leaves of Cissus quadrangularis and
Cissus rotundifolia using two different solvents (methanol and ethyl acetate).
Phytochemical profiling of the extracts confirmed the presence of flavonoids and
tannins in all the extracts except in ethyl acetate extract of C. quadrangularis stem
and C. rotundifolia leaves. Presence of alkaloids and tannins was detected in ethyl
acetate extract and dicholoromethane extract of C. quadrangularis stem and C.
rotundifolia leaves, respectively. Saponins were present in both methanol and
dicholoromethane extracts of C. rotundifolia stems and ethyl acetate extract of C.
quadrangularis stem. Ag NPs were biosynthesized from both leaf and stem extracts
and were characterized through SEM and FTIR. Antimicrobial assays of all the four
crude extracts of C. quadrangularis and NPs derived from leaf and stem extract
revealed that none of the crude extracts showed antimicrobial potential against either
Proteus vulgaris or Micrococcus, whereas nanoparticles derived from stem extracts
showed significant antimicrobial potential, with higher (~2.5 times) activity against
P. vulgaris than that against Micrococcus. On the contrary, all extracts of C.
rotundifolia except dichloromethane leaves extract exhibited antimicrobial activity
against both pathogens. Nanoparticles biosynthesized from leaf and stem extracts of
C. rotundifolia exhibited higher activity than the crude extracts against P. vulgaris,
while it was similar to the crude extracts against Micrococcus. This study therefore
indicates that the rich phytochemical profile and antimicrobial potential of C.
rotundifolia extracts can further be used to develop efficient and non-toxic herbal
drugs formulations against various pathogenic microbes.
Keywords: hathjod, antimicrobial activity, phytochemical analysis, Micrococcus, P.
vulgaris
******************************************************************* Introduction
Nanotechnology has emerged as a revolutionary concept in past few decades and has
markedly extended its applications in agriculture industry by facilitating the
development of various strategies for plant disease management and enhancement in
186
crop productivity [1, 2]. High surface area, activation of novel reactive groups and
unique physicochemical properties of nanomaterials has drawn significant attention
towards development and use of nanomaterials for management of plant diseases [3, 4].
Various types of metal and metal oxide nanoparticles have been developed for
remediation of many plant pathogens including Phoma glomerata in pea, Sunhemp
rosette virus in bean and Meloidogyne incognita in okra and tomato [2]. Among all
metal nanoparticles used so far, silver nanoparticles are most effective due to their
broad-spectrum antimicrobial efficacy. However, toxicity of AgNPs in plants has
been reported due to release of toxic Ag+ ions and stress caused by these NPs,
application of AgNPs at large scale is still limited [2].
Synthesis of silver nanoparticles using plant extracts have gained lot of impetus in
past few decades due to faster synthesis rate, higher stability, more diversity in size
and shape, lower synthesis cost, and environment friendly approach [5]. Some of the
common plants that have been used for green synthesis of silver nanoparticles
include Moringa oleifera, Azadirachta Indica, Xanthium Strumerium, Tinospora
Cordifolia, Brassica Rapa and Red onion [3, 6-11].
Cissus, member of grape family Vitaceae is known as natural reservoir of an
important medicinal compound, resveratrol. This compound has been well reported
to exhibit wide range of pharmaceutical properties including cardioprotection,
chemoprotection, and many more (Bertelli and Das 2009; Das et al. 2011).
C. qudrangularis L. and C. rotundifolia (Forsk.) Vahl are two important medicinal
plants of the grape family known for their diverse medicinal applications in Indian
medicinal system. These are known as natural bone healing plants and have been
used for the purpose since ancient times [12]. Different plant parts of both the plants
have been reported to exhibit therapeutic properties against various disorders
including asthma, syphilis, tumors, haemorrhoids, menorrhagia, leucorrhoea, scurvy,
obesity and gout [13-17]. Apart from being used as nutritional supplement, Cissus
sp. also exhibit pharmaceutical properties including antioxidant, anti-inflammatory,
analgesic, anti-diabetic, anti-neurodegenerative, analgesic, gastroprotective and
antimicrobial [18-20].
187
Therefore, in the present study, antimicrobial potential of different plants parts of
both C. quadrangularis and C. rotundifolia has been studied. Further, the extracts of
different plants parts have also been used to synthesize silver nanoparticles and for a
comparative assessment of their antimicrobial activity with that of the respective
crude extracts. This study provides new insights into some important medicinal
properties and phytochemical composition of these two invaluable medicinal plants.
Materials and Methods
Collection of plant material
The stem and leaf samples of C. quadrangularis and C. rotundifolia were collected
from Smriti Kulish Van Biodiversity Park, Jaipur, Rajasthan, India. Samples were
thoroughly washed under running tap water, air dried, crushed into fine powder and
stored at 4oC till further use.
All the reagents and chemicals used in the study were procured from Himedia, India
Extraction of metabolites
Dried plant material (stem - S; leaf - L) was extracted using Soxhlet apparatus
(Borosil, India) for 24 h in different solvents (Methanol (M) & Ethyl acetate (Ea) -
C. quadrangularis (CQ); Methanol (M) and Dichloromethane (Dm) - C. rotundifolia
(CR)). The resulting extracts were filtered, concentrated upto 1 ml volume and stored at
4oC till further use.
Qualitative phytochemical profiling
All the extracts were analysed for the presence of alkaloids, flavonoids, saponins,
tannins and phenols using standard Hager’s test, lead acetate solution test, foam test
and ferric chloride test, respectively.
Biosynthesis of silver nanoparticles (AgNPs) using Cissus extracts
5 ml of extract was mixed with equal volume of 0.1 M AgNO3 solution and the
mixture was incubated at RT for 20 min or until the color of the mixture changed
from green to dark brown. The nanoparticles were extracted from the mix by
centrifugation at 8000 rm for 30 min. The pellet was resuspended in double distilled
water and stored at 4oC till further use.
188
Characterization of AgNPs
The chemical composition and shape of the synthesized AgNPs was determined
using FTIR and SEM, respectively as per method reported by [21]
Antimicrobial activity
Antimicrobial activity of all the crude extracts and biosynthesized AgNPs was
performed using disc diffusion method. Briefly, sterilized filter paper discs of 6 mm
diameter were dipped in different extracts and AgNP solution and transferred onto
nutrient agar petri plates pre-inoculated with 24 h culture of Micrococcus and P.
vulgaris. The plates were then incubated at 37oC for 24 h and the zone of inhibition
were recorded.
Results
Yield of extracts
Yield of all four extracts has been provided in Table 1. Maximum yield from CQ-S
and CR-S was obtained in methanolic extracts and that of CQ-L and CR-L was
obtained in methanolic and dichloromethane extracts, respectively.
Table 1: Yield of C. quadrangularis and C. rotundifolia extracts
obtained in different solvents
Solvent Yield (g/20 g sample)
CQ-L CR-L CQ-S CR-S
Methanol 1.08 0.67 0.87 1.53
Ethyl acetate 0.77 0.66
Dichloromethane 1.78 0.49
CQ: C. quadrangularis; CR: C. rotundifolia; L: leaf; S: stem Phytochemical constituents of different extracts
Tannins were present in all the extracts of both CQ and CR, while alkaloids were
present only in ethyl acetate extract of CQ-S and dichloromethane extract of CR-L.
The detailed information about the metabolite presence has been summarized in
Table 2.
189
Table 2: Phytochemical profile of different extracts of C. quadrangularis
and C. rotundifolia
Type of Secondary Metabolite
Type of Extract
CQ-L (M)
CQ-L (Ea)
CR-L (M)
CR-L (DM)
CQ-S (M)
CQ-S (Ea)
CR-S (M)
CR-S (DM)
Alkaloids - - - + - + - -
Flavonoids + + + - + - + +
Tannins + + + + + + + +
Saponin - - - - + + + + Morphological characteristics of biosynthesized AgNPs
The SEM images confirmed the size of AgNPs to be ~200 nm, and were majorly
spherical in shape. The AgNPs were present in aggregated form (Figure 1).
Figure 1: SEM image of AgNPs biosynthesized from methanolic leaf
extract of CQ at 50,000 x magnification
Chemical composition of biosynthesized AgNPs
The FTIR spectrum of the biosynthesized AgNPs from different extracts were
almost similar (Figure 2). The peaks at 1624 cm-1 and 1521 cm-1 represents C=O
(carbonyl group) and C–N groups, respectively. Presence of peak at 1748 cm-1
confirms presence of medium stretch from C=O bond due to dimer formation.
190
Wavenumber 2851 cm-1 corresponds to weak carbonyl (C=O) vibrations, wherein
1458 2851 cm-1 corresponds to C=C vibrations. Further, presence of peak at 1248
cm-1 and 791 cm-1 confirmed presence of N–H bond. The C–N bond stretching
represented by peak at 1035 cm−1 is probably due to aliphatic amines. A downward
shift in the FTIR spectra of AgNPs indicates binding functional groups at their
surface. Such downward shift was recorded in C=O and C-N peaks and an upward
shift was recorded in O-H peak.
Figure 2: FTIR spectrum of AgNPs biosynthesized from methanolic extracts of
(a) CQ-L, (b) CQ-S, (c) CR-L, and (d) CR-S
Antimicrobial activity
Only AgNPs biosynthesized from stem and leaf extract of CQ showed significant
antimicrobial activity against both the microbes, while all the crude extracts and
AgNPs biosynthesized from CR exhibited antimicrobial activity (Table 3). CQ-S
synthesized AgNPs showed maximum activity against P. vulgaris and that against
Micrococcus was noted for methanolic extract of CR-L & CR-S and CR-S AgNPs.
a b
c d
191
Table 3: Antimicrobial activity exhibited by different crude extracts and
biosynthesized AgNPs against Micrococcus and P. vulgaris
Extract Zone of Inhibition (mm)
P. vulgaris Micrococcus
CQS Methanol 0 0
CQL Methanol 0 0
CQS Ethyl acetate 0 0
CQL Ethyl acetate 0 0
CQS Nanoparticle 22 9
CRS Methanol 10 10
CRL Methanol 11 10
CRS Dichloromethane 10 8
CRL Dichloromethane 0 7
CRS Nanoparticle 10 10
CRL Nanoparticle 15 9 Conclusion
The present study was aimed to explore the biomedical potential of different extracts
derived from stem and leaf of C. quadrangularis and C. rotundifolia. Phytochemical
profiling of the extracts confirmed the presence of flavonoids and tannins in all the
extracts. Antimicrobial assays of all the four crude extracts of C. quadrangularis and
NPs derived from leaf and stem extract revealed that none of the crude extracts
showed antimicrobial potential against either Proteus vulgaris or Micrococcus, whereas
nanoparticles derived from stem extracts showed significant antimicrobial potential,
with higher (~2.5 times) activity against P. vulgaris than that against Micrococcus.
On the contrary, all extracts of C. rotundifolia except dichloromethane leaves extract
exhibited antimicrobial activity against both pathogens. Nanoparticles biosynthesized
from leaf and stem extracts of C. rotundifolia exhibited higher activity than the
crude extracts against P. vulgaris, while it was similar to the crude extracts against
Micrococcus. This study therefore indicates that the rich phytochemical profile and
antimicrobial potential of C. rotundifolia extracts can further be used to develop
efficient and non-toxic herbal drugs formulations against various pathogenic microbes.
192
References & Bibliography
1. Worrall, E A, et al. “Nanotechnology for plant disease management”.
Agronomy 8 (2018): 1-24.
2. Prasad, R, Plant Nanobionics. 2019: Springer.
3. Narayanan, K B and H H Park “Antifungal activity of silver nanoparticles
synthesized using turnip leaf extract (Brassica rapa L.) against wood rotting
pathogens”. European Journal of Plant Pathology 140 (2014): 185-192.
4. Saharan, Vi, et al. “Synthesis of chitosan based nanoparticles and their in
vitro evaluation against phytopathogenic fungi”. International Journal of
Biological Macromolecules 62 (2013): 677-683.
5. Iravani, S “Green synthesis of metal nanoparticles using plants”. Green
Chemistry 13 (2011): 2638-2650.
6. Mittal, Jitendra, et al. “Phytofabrication of nanoparticles through plant as
nanofactories”. Advances in Natural Sciences: Nanoscience and
Nanotechnology 5 (2014): 043002.
7. Mittal, Jitendra, Rohit Jain, and Madan Mohan Sharma “Phytofabrication of
silver nanoparticles using aqueous leaf extract of Xanthium strumerium L.
and their bactericidal efficacy”. Advances in Natural Sciences: Nanoscience
and Nanotechnology 8 (2017): 025011.
8. Mittal, J, et al. “Unveiling the cytotoxicity of phytosynthesised silver
nanoparticles using Tinospora cordifolia leaves against human lung
adenocarcinoma A549 cell line”. IET nanobiotechnology 14 (2020): 230-238.
9. Mehwish, HM, et al. “Green synthesis of a silver nanoparticle using Moringa
oleifera seed and its applications for antimicrobial and sun-light mediated
photocatalytic water detoxification”. Journal of Environmental Chemical
Engineering 9 (2021): 105290.
10. Abdullah, HSTSH, et al. “Green synthesis, characterization and applications
of silver nanoparticle mediated by the aqueous extract of red onion peel”.
Environ. Pollut. 271 (2021): 116295.
11. Ahmed, S, et al. “Green synthesis of silver nanoparticles using Azadirachta
indica aqueous leaf extract”. Journal of Radiation Research and Applied
Sciences 9 (2016): 1-7.
193
12. Stohs, SJ and SD Ray “A review and evaluation of the efficacy and safety of
Cissus quadrangularis extracts”. Phytother. Res. 27 (2013): 1107-1114.
13. Sen, M and B Dash “A review on phytochemical and pharmacological
aspects of Cissus quadrangularis L”. Int. J. Green Pharm. 6 (2012): 169-173.
14. Chanda, S, Y Baravalia, and K Nagani “Spectral analysis of methanol extract
of Cissus quadrangularis L. stem and its fractions”. J. Pharmacogn. Phytochem.
2 (2013):
15. Murthy, KNC, et al. “Antioxidant and antimicrobial activity of Cissus
quadrangularis L”. J. Med. Food 6 (2003): 99-105.
16. Mishra, G, S Srivastava, and BP Nagori “Pharmacological and therapeutic
activity of Cissus quadrangularis: An overview”. Int. J. Pharmtech. Res. 2
(2010): 1298-1310.
17. Kumar, ST, A Anandan, and M Jegadeesan “Identification of chemical
compounds in Cissus quadrangularis L. Variant I of different samples using
GC-MS analysis”. Arch. Appl. Sci. Res. 4 (2012): 1782-1787.
18. Jainu, M and CSS Devi “Gastroprotective action of Cissus quadrangularis
extract against NSAID induced gastric ulcer: role of proinflammatory
cytokines and oxidative damage”. Chem.-Biol. Interact. 161 (2006): 262-
270.
19. Mate, GS, et al. “Evaluation of anti-nociceptive activity of Cissus
quadrangularis on albino mice”. Int. J. Green Pharm. 2 (2008): 118-121.
20. Vijayalakshmi, G, OS Aysha, and S Valli “Antibacterial and phytochemical
analysis of cissus quadrangularis on selected uti pathogens and molecular
characterization for phylogenetic analysis of Klebsiella pneumoniae”. World
J. Pharm. Pharm. Sci. 4 (2015): 1702-1713.
21. Gupta, S, et al. “Surface morphology and physicochemical characterization
of thermostable moringa gum: a potential pharmaceutical excipient”. ACS
Omega 5 (2020): 29189-29198.
194
CHAPTER 15
PROSTITUTION IN INDIA-SOCIO-LEGAL PERSPECTIVE
Damyanti Kanwar Rathore
Research Scholar
Manipal University Jaipur
Dr. Sunita Khatana*
Assistant Professor
Manipal University Jaipur
[email protected] (Corresponding Author)
******************************************************************** Abstract: The term Prostitution is ordinarily utilized in enactment ordered in the
nineteenth and twentieth hundreds of years to allude to sex work. The terms'
prostitution' and 'whore' have negative connotations and are believed by backers of
sex worker s to defame. It is a result of this explanation that the term sex work/sex
specialist is liked here, and the term prostitution/whore is utilized just when
straightforwardly citing the source. Here has consistently been a discussion about
the bearing that the nation should move in, all things considered. There's a clear
division between hostile to dealing associations from one perspective and sex
worker s' privileges associations on the other which has prompted methodologies
that advocate the nullification of sex work rather than ensuring the freedoms of
ladies in sex work. India has neglected to perceive the underestimation, weaknesses
and common liberties of sex workers.
Keyword: Prostitution, Socio-Legal Perspective
********************************************************************
Introduction
Characterizing every one of the terms pertinent to the review is significant as it eliminates all questions and sets the heading of the paper. The accompanying meanings of 'sex worker' and 'prostitution' are embraced by the UNDP report named 'Sex Work and the Law in Asia and the Pacific', distributed in October 2012[1]:
195
The term 'sex worker' alludes to "all grown-ups who sell or trade sex for cash, labor
and products (e.g., transport). It is utilized to allude to sex worker s, including
consenting female, male, and transsexual individuals who get cash or merchandise in
return for sexual administrations, either routinely or periodically. They incorporate
consenting to youngsters who are eighteen years or more established. If an
individual has been pressured into selling sex and is selling sex automatically, the
inclination isn't to allude to the individual as a 'sex specialist'. Sex work is named
'immediate' or 'circuitous'. Direct sex worker s recognize themselves as sex worker s
and make money by selling sex. Circuitous sex worker s as a rule don't depend on
selling sex as their first kind of revenue and may function as servers, beauticians,
knead young ladies, road merchants, or lager advancement young ladies and
supplement their pay by selling sex. For the most part, they don't recognize as sex
worker s."
The term Prostitution is ordinarily utilized in enactment ordered in the nineteenth
and twentieth hundreds of years to allude to sex work. The terms' prostitution' and
'whore' have negative connotations and are believed by backers of sex worker s to
defame. It is a result of this explanation that the term sex work/sex specialist is liked
here, and the term prostitution/whore is utilized just when straightforwardly citing
the source.
This paper sees sex work in India, extensively zeroing in on the social perspective
and attempts to distinguish the connection between the occupation and the Indian
culture.
Goals
• To comprehend the discussions about the legitimization of sex work in India.
• To observe the advantages and disadvantages of sex work for individuals
locked in.
• To see how hostile to dealing estimates make sex worker s more helpless.
196
History
Different sources talk about the 'devadasis' or 'Vishkanyas' or 'Nagarvadhus' which
demonstrates the presence of a framework fairly comparative if not by and large as
old as one existing today. These sources likewise talk about the further corruption of
the current framework with the passage of the Britishers who presented the idea of
casual sexual encounters prompting a decrease in sanctuary moves. Expanded
utilization of sex worker s started during the Company rule in India. Military-run
whorehouses obtained ladies and young ladies from rustic regions and were paid by
the military straightforwardly.
As of now, there are around 20 million sex workers in India, out of which 35% are
underneath the age of 18 years (Human Rights report). As per gauges, there are a
large portion of a billion youngsters in massage parlors in India. These kids are sold
by their folks for cash or are survivors of misuse. Countless young ladies brought for
body exchanging are from Nepal. India is home to numerous seedy areas of town
which are available in pretty much every state. The accompanying guide shows the
area of eight of the biggest seedy areas of town in the country.
Sex work and related laws
The Immoral Trafficking (Prevention) Act, 1956 and section 372 and 373 of the
Indian Penal Code[2] are the essential laws in India that arrangement with sex work
in India. ITPA targets abrogating and restricting sex work at last. Section 372 and
373 confine the selling and buying of minors for sex work.
Prostitution is legitimate in India however requesting, pimping and massage parlors
are illicit. Purchasing sex is legitimate here, however selling is restricted. In an
article distributed in The Hindu on October 24, 2014, named NCW Chief for
sanctioning sex exchange, the then NCW Chief, Lalitha Kumaramangalam, upheld
legitimizing sex exchange. She said that without any guideline, sex worker s are
compelled to serve customers in unhygienic conditions influencing their wellbeing.
She said that enactment would cover different angles like working hours, medical
services, compensation, and training and monetary choices for their relatives.[3]
197
Umberto Bacchi in a Reuters article distributed on December 12, 2018, discussed a
report as per which legitimizing Prostitution would bring down brutality and
infection. The examination, distributed in a diary PLOS Medicine, investigated
information from in excess of 130 examinations on 33 nations - from Britain to
Uganda - distributed in logical diaries between 1990 to 2018. It found sex worker s
who had been presented to severe policing like capture or jail were multiple times
bound to encounter sexual or actual viciousness by customers, accomplices and
other people.[4]
There has consistently been a discussion about the bearing that the nation should
move in, all things considered. There's a clear division between hostile to dealing
associations from one perspective and sex worker s' privileges associations on the
other which has prompted methodologies that advocate the nullification of sex work
rather than ensuring the freedoms of ladies in sex work. India has neglected to
perceive the underestimation, weaknesses and common liberties of sex workers.
Amazingly, the ITPA in real life impacts the existences of sex worker s by
condemning work, family and the option to bring up kids; the right to protection;
uncalled for or constrained ousting and expulsion from homes or some other spot;
and by nullifying grown-up assent.[5]
Pros of sex work for the sex workers
Prostitution goes about as a type of revenue for certain individuals where an
individual participates in sexual demonstrations in return for cash. Germany and the
Netherlands are models where Prostitution is controlled as a calling. Prostitution
goes about as a wellspring of fulfillment for individuals who are purchasing as well
as for some who are selling. A few investigations guarantee that a few whores feel
approved and engaged, countless indoor sex worker s are accounted for to encounter
an increment in confidence. Now and again, Prostitution has been giving a similarly
better way of life to individuals engaged with Prostitution than previously. In any
case, this has been for the most part found in the space of authorized prostitution
zones. One late review has shown that Rhode Island observed the assault pace of
state decay fundamentally because of the presence of legitimate indoor Prostitution
from 2003 to 2009. Hence if this review is to be accepted, one might say that the
198
presence of Prostitution (legitimate) prompts a decrease in assault. Yet, it can't be
said without a doubt if the diminishing in assault rates in Rhode Island was
unadulterated due to Prostitution and not different measures/activities. Prostitution
has been utilized as a wellspring of sex for individuals who are impaired, which has
demonstrated supportive in settling their requirement for sexual relations.[6]
Cons of sex work for sex workers
sex worker s may find leaving from the calling troublesome. For ladies who are dealt
from Nepal to India, there is an exceptionally insignificant shot at leaving. The
business of Prostitution energizes misuse, persistent stockpile of injury, concealment
of ladies engaged with Prostitution. There is a high danger of physically communicated
sicknesses, for example, HIV for individuals who trade sex as a kind of revenue. The
nations where Prostitution is occurring underground, unprotected sex prompts
undesirable pregnancies. [7] Therefore, whores are being compelled to end their
pregnancies. Prostitution prompts illegal exploitation, business sex ventures and
youngster dealing alongside compromising the well being of whores. As per an
article in the World Development in 2012 that nations with sanctioned Prostitution
have detailed having a measurably more extensive frequency of illegal exploitation
inflows. It is a generally held view that Prostitution debases the ethics of a person as
individuals who utilize this assistance can't handle their sexual cravings, which is
unfortunate and inadmissible by society. The disgrace corresponded with Prostitution in
the public arena has been there, the local area consistently peers down on individuals
engaged with Prostitution.
Conclusion
As shown by different sources, wasteful enemy of dealing laws have made sex
worker s considerably more powerless. The sex worker s confined when the
whorehouses are struck are shipped off restoration and amendment homes. After the
salvage, they are placed in 'safe guardianship' and made to sign an oath expressing
they won't ever return to the calling. [8] The sex worker s are constantly checked out
with hatred by the general public or casualties who should be protected. Nobody at
any point thinks about imagine a scenario in which some sex worker s must choose
the option to stay in the work essentially on the grounds that there could be no other
199
type of revenue. Defective laws are far and away more terrible than no mediation by
any stretch of the imagination. The police treat them without risk of punishment. In
a meeting, a sex worker in Songachi said that when she fled from her first
whorehouse and reached a cop, he assaulted her alongside three different men.
Eventually, she returned to one more house of ill-repute in a similar region.
Recommendation
1. Sex specialists have a top to bottom information on the sex business and are
the only ones to have encountered life as a sex workers. They ought to be the
main impetus behind enemy of dealing measures, not the inadvertent blow-
back of decides that mean to save them.
2. Laws pointed toward giving sex workers one more occupation after they are
saved from houses of ill-repute should appear.
3. Society requirements to acknowledge individuals occupied with this work
eventually on schedule. Talks or workshops can be led to sharpen the general
population about the equivalent.
4. There are various areas of society to see how they see sex workers and
afterward the discoveries can be utilized to additionally figure out how the
connection among local area and sex workers can be improved.
5. The police should be the ones who assist with sex workers and not exploit
them. The choice of rebuffing such work force can be investigated to
advance the circumstance.
References and Bibliography
1. Godwin John, “Sex Work and the Law in Asia and the Pacific Laws, HIV
and human rights in the context of sex work”, October 2012, file:///C:/
Users/91978/Downloads/HIV-2012-SexWorkAndLaw.pdf.
2. Ratanlal Ranchhoddas. Ratanlal & Dhirajlal’s the Indian Penal Code (Act
XLV of 1860). New Delhi :Wadhwa & Co., 2007.
3. The hindu, ramachandran smriti, “NCW chief for legalising sex work,”
October 28, 2014, https://www.thehindu.com/news/national/ncw-chief-for-
legalising-sex-trade/article11086511.ece.
200
4. Bacchi Umberto, Thomson Reuters Foundation, “Legalizing prostitution
lowers violence and disease”, December 12, 2018, https://www.reuters.com/
article/us-global-women-prostitution-iduskbn1oa28n
5. ibid
6. Anand Sonali , Gandhi Bhawna, “Prostitution in India: Sociological Aspect
and Judicial Response”,International Journal of Law Management and
Humanities volume 4,Issue 5,Page 1863-1870, https://www.ijlmh.com/paper/
prostitution-in-india-sociological-aspect-and-judicial-response
7. Kumar Ravi , “Understanding the Socio- Economic and Legal Context of
Prostitution and Sex Trafficking on Women in India”,Indian Journal of Law
and HumanBehavior, Volume 5 Number 3 September December 2019,
https://www.rfppl.co.in/subscription/upload_pdf/KV%20Ravi%20Kumar%2
04_10181.pdf
8. Dkhar Anamika, Gupta Avik, “Socio-Legal Obliteration Of Sex Workers”,
October 01, 2020,International Journal of Advanced Legal Research
201
CHAPTER 16
GENDER NEUTRALITY VIS-A-VIS STATUTORY PROVISION
Ms. Neha Jain Research Scholar Manipal University (Jaipur) Dr. Sunita Singh Khatna Assistant Professor Manipal University Jaipur [email protected] (Corresponding Author) ******************************************************************** Abstract: We have been brought up in a culture where society directs that men ought to be brave, dominant and strong, while women are expected to be fragile and submissive. Women tolerate a number of assaults, aggressive behavior at home, harassment, and so on, but it would be oppressive towards men if we don't recognize that they go through these outrages, shocks and monstrosities as well. Abusive behavior at home and forceful conduct at home against men is now not a deviation, but rather an authentic issue. The domestic violence and aggressive behavior at home against men is at this point not a deviation, but a genuine issue. The term 'manliness ' and 'masculinity ' burdens men throughout of their lives. The possibility of sexual impartiality inside the crime thing alludes back to the possibility of correspondence inside the prevalence of the freedoms surprisingly paying little heed to their sex. At the point when we endeavor to search for equity of these men through our Constitutional arrangements or Indian Penal Code or some other law, we understand that there's seldom any arrangement which shields the honor and character of men in our general public. Remembering, the vulnerable state of all kinds of people in the general public, being a newborn child or a grown-up or even a senior resident, it is important for the public and law to take all the genders on impartial laws. There is an urgent requirement for a Gender Neutral Society. Uniformity and equality among gender should be in genuine expressions, and not simply to us and books. Sexual impartiality is inherently associated with sustainable development economical, academic fulfillment and political establishment. There is a need to make the world a better place for each and every gender irrespective of any biasness. Keywords: Domestic violence, men casualties, India, unbiased and gender-neutral laws. ********************************************************************
202
Introduction
Gender equity Rights of one, Revocation or Abrogation of another?
The legal structure of a country is built totally on its society. The idea of gender
neutrality inside the felony thing states back equality as a concept inside the
popularity of the rights of all people regardless of their genders. The meaning of
equality in words of Aristotle's dictum is that ‘equality approach treating likes alike,
in contrast to, unalike’. The Oxford Dictionary defines ‘Gender Neutrality’ as an
adjective which is suitable for, or relevant to, each character irrespective of gender,
but it's far slightly practicable in modern-day global where legal guidelines are
misused which might be meant for protection.
Apparently, the law seems, on one hand is gift and blessing for individuals in
abusive and violent relationships. Nonetheless, a cautious assessment shows that,
underneath the ploy of "women welfare", is emphatically one-sided towards ladies
and somewhat offers little or no importance to men.
The laws concerning maltreatment of women beginning from sexual to monetary
doesn't recognize the maltreatment a male deals, showing a difference inside the
criminal mechanism. Albeit (despite the fact that) females are in more range of
sufferers paralleled to guys, the figure is slowly falling in the face of false claims
against innocuous men.
In the prehistoric development and culture young women have been given the very
standing as that of men, they were managed in basically the same manner and
carried on with an honorable and deferential life. Afterward, as we progressed and
our civilization developed and enlarge, provisions for women fall. Females, who
have been managed as equivalents, begun generalized and begun losing their respect
and the position they occupy in society. Women had been taken advantage through
men and tagged as vulnerable segment or the "significantly less honorable" segment
of the general public. The mistreatment towards women developed to such a volume
that a revolt was essential as a method for keeping the equilibrium among nature's
two imperative manifestations, male and females; later which there has been the idea
203
of woman's rights known as ‘Feminism’ which assisted with increasing vertical push
the distinction of ladies. Other than the legitimate structure, a change in the public
eye's pattern toward the philosophy of woman's rights has also assumed a central
part. ‘Feminism’ by Merriam-Webster “idea of the political, economic and social
equality of the sexes.” Still it is painful truth, despite society's shift, the country is
unsuccessful to embrace a realistic method to it, misinterpreting it as for benefit of
single gender, namely women, resulting to faux feminism i.e women leading to
pseudo feminism. Our society has finally arrived at a point where women have equal
rights and protection, despite the fact that we still see examples in our daily lives
where women take advantage of this socially, economically, and in all other parts of
life.
But if we look around, we are able to identify the indistinguishable matters where
men too harassed, by women and now and again through different men. At the point
when we endeavor to search for equity of men by our Constitutional arrangements or
Indian Penal Code etc, one can conclude that there's rarely any arrangement which
protects the honor and role of men in our general public. Is modesty exclusive to
women, just they only confront provocation in the public arena? Does a man haven't
any modesty in any respect? It isn't truthful to preconceive that only females face
violence? It is not good to pre-establish that only women suffers harassment? Isn't it
untrue to assume that only women are subjected to mental or physical torture or
other forms of violence, while males are spared?
Keeping in mind the hopeless state of all kinds of people in the general public, being
a newborn child or a grown-up or even a senior resident, it is vital for the general
public to take on sexually unbiased laws or gender neutral laws. The impact of these
regulations places an undue advantage to women for intimidation and extortion in
marital disagreements, causing irreparable harm to spouses and their relatives and, in
some cases, leading to their death [1]. Why, then, the regulations pertaining to these
horrible criminalities exclusively safe females, not males?
The idea of equality, fairness and discrimination cherished under - Article14 [2],
Art.15 [3], and in Art15 (3) “state is empower to make special provision for women
204
and children”. Article 39(a) [4] giving its residents, people, equivalent right to a
sufficient means to livelihood. The article 39(d), article 42 [5], and Article 51A (e) [6].
Similarly preamble and article 7 and 8 of UDHR, 1948 guarantees that “individuals
are equal before law and are authorized equal protection without discrimination”.
Article 3 of the Covenant on Economic Social Cultural and in Civil and Political
Rights 1966, “contributes that parties to contract to assure equivalent freedoms for
people, provided in agreements”.
'Because of the simultaneous action of Article 15(1) and (3), the State may
discriminate in favor of women against men, but it may not discriminate in favor of
men against women,' according to a leading case [7]. Discrimination would be
acceptable as long as it was not solely based on gender.' The Indian Penal Code,
provides shields to women against wrongdoing and unfairness for example, ‘Section
294, Section 326, Section 354, Section 376 [8], and section 498A’ [9]. Examining
the constitutional legitimacy of I.P.C. Sec. 498 A. If a wife has a statute to protect
herself from her husband's cruelty, why doesn't a husband have one?
Presently the equilibrium of scale has shifted towards women [10].
The Criminal Law Amendment Act of 1983 (Chapter XX-A) [11] included a
segment 498A (Chapter XX-A). This precaution, however, has evolved into a just
and multifunctional blade against man. According to the Malimath Committee
Report [12], when a grievance or FIR is filed in 498A of IPC, it provides a simple
instrument to police to capture, otherwise take steps for capturing man and his
family members termed in the complaint devoid of inherent worth of the accusations
or conducting an initial investigation [13].
In 237th report on 'compounding of IPC offences,' the Law Commission of India
strongly suggested that section 498A, be made compoundable with the court's
consent. This isn't for first time the organization has made a suggestion like this; it
did so in its 154th and 177th reports, respectively, in 1996 and 2001, Justice
Malimath Committee's report on ' Reform of Criminal justice System' also suggested
the same. There was a constant request to bring relaxation in the provision [14].
205
In renowned instance [15] the Apex Court expressed that such complaints were
made with sole object to harass the companion (husband) and offspring of spouse
and "allowing or permitting the complainant to pursue this grievance could be an
abuse of the method of regulation” and observed the complete renewal of section
498A of Indian Penal Code is required. A criminal complaint was recorded charging
that the wife attacked at Mumbai by all accused named in complaint and a demand
for a luxury vehicle was made.
Why do all the legal guidelines pertaining to such horrible crimes protect women but
not men? The only section which safeguard men’s modesty is 377of IPC.
The Domestic Violence Act, does not recognize male a victim/perpetrator of abuse
and violence, only accepts that females can be victim of violence. According to this
law, only a women can file a complaints as victim, against her husband and his
family members. In ‘Harjinder Kaur and others v. Territory of P&H,’ a grievance
had been recorded by wife u/s 498A against husband's relatives, including his 5
sisters who were the petitioners in the current criminal proceeding. The high court
observed the way that one of the sisters had been married and dwelling somewhere
else beginning around 1994, when his brother got married making their involvement
unlikely and went on to observe that “it appears that a wider net has been knitted so
as to rope in the present petitioners”. It is plainly noticeable that a man, who is a
survivor of aggressive behavior at home, has no privileges under this law.
Another fundamental flaw in this regulation is that it facilitates abuse, making it
difficult for women to resist impulse for "teaching a lesson" to their male companion
by filing frivolous and dishonest lawsuits. Reflecting degree of its misapplication,
the 'Crime in India 2012 Statistics'- NCRB,2012 Report takes note of that the pace
of charge-sheeting u/s 498A is pretty much as high as 93.6% while conviction rate is
just about as low as 15%.
A similar pattern is as of now being seen in the cases of ‘Anti-Dowry’ provisions
provided in section 304B ‘Dowry Death’ [16], which is being abused to the point
where the Supreme Court has had to intervene and named it "Legal Terrorism".
206
Section 498A [17] of the Indian Penal Code, otherwise called "anti-dowry
harassment law”. Further it clarifies ‘cruelty’, a dubious and vague term, to think
about even normal activities and action by the husband’s family as harassment for
dowry. The wife's complaint is enough to make a man arrest. Consequently trivial
conjugal disagreements added up as dowry harassment cases, as the risk of an arrest
gives seriously negotiating power to a women confronting dissolution of marriage.
There has been condemnation for such laws by legislators through the Law
Commission reports, from men's freedoms groups, some women' rights groups,
youngsters and children’s right groups, senior citizen groups and even human right
groups. The Supreme Court has named broad abuse of this law as "legal terrorism”
and has mentioned such outrageous observable facts over and again in a few of its
decisions, but surprisingly this law still operates in practice and not been demolished.
The answer is, because it serves the interests of the “bail industry” and the women in
civilization who suffered a lot and still suffer believing that they are the only victim
in society, irrespective of this law absurdity.
The legislators and legal framework doesn't safeguard men from these embarrassing
and shamming claims resulting in self-destruction as suicide. However, while
delivering land mark judgment in [18], the Apex Court decided "the cruelty is of two
kind one is mental and other is physical. It might be true that physical cruelty is
generally by husband being a strong one but at the same time this can’t be said to be
universally true. It is also vice versa in the case of mental cruelty. But in the
majority of cases of mental cruelty it is almost the wife who causes mental cruelty to
the husband."
Females may misinterpret a casual brush of the shoulder as eve-teasing/prodding,
and others may go so far as to purposefully startle a man that if he doesn't pay cash,
she will bring him to prison for something quite similar, according to social media
recordings. Some females have begun to use extortion in various forms with the goal
of receiving money. The primary goal of this provision was to create a society free
of family conflicts. Indeed, in divorce disputes, even an untrue statement of cruelty
can become a reason for cruelty. Different High Courts have labelled bogus
instances of polygamy against spouse [19] or in the Dowry Prohibition Act, 1961, as
207
well as the IPC [20] as cruelty. The intention, according to the Supreme Court, to
remove at the very underpinnings of the dowry risk. However, by abusing the
clause, novel form of legal terrorism has emerged.
The Hon'ble Apex Court [23] held in a case which challenge constitutionality of
provision was challenged has observed that New Legal Terrorism might release if
clause is abused. Is it possible that a legal provision has become synonymous with a
highly undesirable concept such as terrorism? It is a doubtful and debatable query
hence requires a clear inspection of socio-legal situation. In ‘arnesh kumar v state of
bihar’ 2014, SC directed to “police and magistrate that fair treatment and true
process to be followed before arrest and detainment and rules of D.K Basu ought to
be followed”. It decided that no automatic arrest and detainment be made in such
offense". Accordingly arrest under sec.498A raged down to 2.20lakh to 1.86lakh in
2015.
The observation of Hon'ble Apex Court that "Tragically countless of these false
complaints have overflowed the courts as well as led to social agitation and unrest
swaying harmony, peace, bliss and happiness of the society" [24], evidently shows
the regulation are producing outrageous dread in civilization.
Conclusion
With the modern development inside the socio-criminal system, the need to realize
the rights of the men in pursuance of all legal provision the affirmation and
acknowledgment of these rights and privileges has become unavoidable.
Another component of these laws being constantly violated is undeniable. According
to a report released by Delhi Commission of Women (DCW), "53.2 percent of the
rape cases registered in Delhi between April 2013 and July 2014 were judged to be
'false and fake' [25]."
Once more, Justice Verma Committee of 2012 had leaned toward “gender-neutral
laws totally in its report and the Criminal Law (Amendment) Ordinance 2013 was
published in the gazette of India which upheld the Committee's view. In the spirit of
impartial laws, inappropriate behavior, sexual harassment, voyeurism and stalking
208
were added to the Indian Penal Code and certain alterations and cancellations were
made to Indian Penal Code, Code of Criminal Procedure and Evidence Act. But the
ordinance on making all laws gender neutral lasted for 58 days and was repealed and
replaced by The Criminal law (Amendment) Act 2013 which again brought to light
gender specific laws”[26].
It's disheartening and sad that gender-neutrality is seen as a "response against
women's freedom" or a "backlash against feminism," when it is actually footstep
toward achieving equality for ending the never-ending clash amongst genders that
serves as a barrier for growth, per one class's rights trumping another's.
The Society needs gender-neutral laws immediately. Equality and equity must exists
in actual phrases, not just merely in minds or to papers. Gender neutrality is
intrinsically associated with maintainable events, sustainable development,
scholastic achievement and political strengthening. The need is to make the world a
better place for generations by eliminating all legal distinctions about violence. It
will be legal when all people are treated equally, and we will be able to achieve a
great future for both men and women in society.
As a result, the state has reached to a stage where gender neutral legislation are
required to protect the sanctity of Fundamental Rights.
References and Bibliography
1. 498a.org, http:// www.498a org/legaltorture. html, 20 November 2010.
2. Shukla, V N, and Mahendra P. Singh. V.n. Shukla's Constitution of India.
Lucknow: Eastern Book Co, 1990, edition13th (2017), art14‘equality before
law and equal protection of law’.
3. Art15 “Prohibition of discrimination on grounds of religion, race, caste, sex,
or place of birth”.
4. ibid.
5. Jain, Mahabir P. Indian Constitutional Law. Bombay: N.M. Tripathi, 1962,
article-39‘with equal pay for equal work’, article-42‘just and humane
conditions of work and maternity relief’.
209
6. Renouncing the practices derogatory to the dignity of women’.
7. Vijaylakshmi vs. Punjab University, AIR 2003 SC 3331.
8. (Punishment for obscene acts or words in public) Ratanlal Ranchhoddas.
Ratanlal & Dhirajlal's the Indian Penal Code (Act XLV of 1860). New Delhi
:Wadhwa & Co., 2007, Section 326 (Protection of women against Acid
Attacks), Section 354 (Outraging modesty of Women), Section 376
(Punishment for rape),
9. Section 498A’ [9] (Husband or relative of husband of a woman subjecting
her to cruelty).
10. Legal India ,Dhawesh Pahuja, “Cruelty against husband in India”
www.legalindia.in/cruelty-against-huband.
11. Relating to cruelty by husband or relatives of husbands to combat social evil
of dowry and matrimonial atrocities against married women, Act 46 of 1983.
12. Government of India, https://lawcommissionofindia.nic.in/reports/report
243.pdf
13. Government of India Law commission of India, https://lawcommission
ofindia.nic.in/reports/report237.
14. Dr Partha Partim Mitra, “A new look on matrimonial cruelty with criminal
law”, Indian Bar Review, Vol XL(1)2013, p.87.
15. Preeti Gupta Vs. Province of Jharkhand, AIR 2010 SC 3363.
16. Ratanlal Ranchhoddas. Ratanlal & Dhirajlal's the Indian Penal Code (Act
XLV of 1860). New Delhi :Wadhwa & Co., 2007.
17. Section 498A “Husband or relative of husband of a woman subjecting her to
cruelty– Whoever, being the husband or the relative of the husband of a
woman, subjects such woman to cruelty shall be punishable with
imprisonment for a term which may extend to three years and shall also be
liable to fine.
18. Dr. N. G. Dastane Vs. Mrs. S. Dastane, AIR 1975 SC 1534.
19. Raj Vs. Raj, AIR 1986 pat. 362.
20. Kalpana Vs. Surendra, AIR 1985 All 253.
21. Sushil Kumar Sharma Vs. Union of India, AIR 2005 SC 3100.
22. Ashok Kumar Vs. Vijay Laxmi, AIR 1992 Del. 182.
210
23. Shushil Kumar Sharma vs. Association of India, AIR 2005 SC 3100.
24. Preeti Gupta Vs. State of Jharkand, AIR 2010 SC 3363.
25. India today, https://www.indiatoday.in/india/north/story/false-rape-cases-in-
delhi-delhi-commission-of-women-233222-2014-12-29.
26. Government of India, Ministry of Home Affairs, Committee on Reforms on
Criminal Justice System https://www.mha.gov.in/sites/default/files/criminal
_justice_system.pdf.