4.5 Article

Kala-azar elimination in a highly-endemic district of Bihar, India: A success story

Journal

PLOS NEGLECTED TROPICAL DISEASES
Volume 14, Issue 5, Pages -

Publisher

PUBLIC LIBRARY SCIENCE
DOI: 10.1371/journal.pntd.0008254

Keywords

-

Ask authors/readers for more resources

Background Visceral leishmaniasis (VL) or Kala-azar has been a major public health problem in Bihar, India, for several decades. A few VL infected districts including Vaishali have reported > 600 cases annually. Hence, in 2015, the Government of India entrusted ICMR-Rajendra Memorial Research Institute of Medical Sciences, Patna, to implement an integrated control strategy for achieving the VL elimination target (< 1 case per 10,000 people at the block level) in the Vaishali District of Bihar. Methodology This study was conducted between January 2015 and December 2016. An integrated control strategy including the spatio-temporal mapping of VL-case distribution, active case detection, chemical-based vector control using indoor residual spraying (IRS), community awareness campaigns, the training of IRS members, the training of medical doctors for effective treatment, daily monitoring and the supervision of IRS activities, logistic management, post-IRS quality assurance, epidemiological surveillance, and entomological monitoring was performed. An insecticide quantification test was performed for evaluating the IRS quality on sprayed walls. A modern compression pump was used to maintain spray quality on different wall surfaces. The impact of IRS was assessed through sand fly collection in human dwellings and cattle sheds in pre- and post-IRS. The insecticide susceptibility of local P. argentipes was performed before each IRS round (in February and June) during 2015-2016. Statistical analysis such as the mean, percentage, and 95% CI were used to summarize the results. Findings All 16 blocks of the Vaishali District achieved the VL elimination target in 2016. The integrated VL control strategy helped reduce the number of VL cases from 664 in 2014 to 163 in 2016 and the number of endemic villages from 282 in 2014 to 142 in 2016. The case reduction rate was increased from 22.6% in 2014 to 58.8% in 2016. On average, 74 VL infected villages became Kala-azar free each year from 2015 to 2016. Conclusions The results of this study suggest that the elimination of VL is possible from all endemic blocks of Bihar if the integrated Vaishali VL control strategy is applied under strong monitoring and supervision.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Software Engineering

HUDRS: hazy unpaired dataset for road safety

Akshay Juneja, Sunil Kumar Singla, Vijay Kumar

Summary: Dataset plays a crucial role in designing a defogging/dehazing framework for road safety. Existing synthetic datasets fail to adapt well to real-world scenarios, thus a new dataset containing real-roadside images is proposed in this paper. Experimental results reveal that the quality and performance of dehazed images depend on the dataset used.

VISUAL COMPUTER (2023)

Article Computer Science, Artificial Intelligence

Driver drowsiness detection using modified deep learning architecture

Vijay Kumar, Shivam Sharma, Ranjeet

Summary: This paper proposes a non-invasive approach to detect driver drowsiness by extracting facial features and applying them to a hybrid deep learning model. The proposed hybrid model, which combines modified InceptionV3 and LSTM network, outperforms other models in terms of performance measures and effectively detects driver fatigue.

EVOLUTIONARY INTELLIGENCE (2023)

Article Computer Science, Artificial Intelligence

Chaotic spotted hyena optimizer for numerical problems

Vijay Kumar, Dilbag Singh

Summary: This study proposes a novel optimization algorithm based on spotted hyenas' behavior, utilizing chaotic maps to fine-tune control parameters. Experimental results show that the algorithm outperforms existing metaheuristic algorithms in standardized test functions and engineering design problems.

EXPERT SYSTEMS (2023)

Review Computer Science, Interdisciplinary Applications

A Comprehensive Review of Computational Desmogging Techniques

Akshay Juneja, Vijay Kumar, Sunil Kumar Singla

Summary: The visibility of drivers is significantly reduced by atmospheric pollutants such as mist, fog, smog, smoke, and haze, leading to the failure of computer vision applications. Image desmogging techniques play a vital role in enhancing the performance of visibility restoration applications and have drawn the interest of researchers. This article provides an overview of recent advances in using desmogging architectures for visibility restoration and presents a general methodology for designing a desmogging model. It also reviews existing desmogging techniques and their quality metrics, software, and hardware specifications, as well as the applications and significance of these algorithms. The challenges and future scope of desmogging techniques are also discussed.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2023)

Article Engineering, Electrical & Electronic

Active contour and texture features hybrid model for breast cancer detection from ultrasonic images

Kamakshi Rautela, Dinesh Kumar, Vijay Kumar

Summary: Breast ultrasound is commonly used for early detection of breast cancer. However, existing geodesic-based methods require extensive prior knowledge to achieve the region of interest, and ultrasound images often suffer from noise and acoustic shadowing, reducing the accuracy of tumor detection. This article proposes a method that combines Active Contour and Texture Feature Vectors to find discriminative patterns. Experimental results show that this approach outperforms existing algorithms in terms of accuracy, recall, precision, Jaccard index, and F1 score.

INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY (2023)

Article Computer Science, Information Systems

Aethra-net: Single image and video dehazing using autoencoder

Akshay Juneja, Vijay Kumar, Sunil Kumar Singla

Summary: There is a great demand for a fast and efficient video dehazing system with low computational complexity among drivers during hazy winter nights. Existing video dehazing algorithms suffer from color distortion and are not suitable for videos with dense haze. The proposed Aethra-Net model, which uses a modified autoencoder and Resnet-101 layers, along with a vessel enhancement filter, outperforms existing dehazing models according to experimental results.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2023)

Article Computer Science, Information Systems

Steganography-based facial re-enactment using generative adversarial networks

Vijay Kumar, Sahil Sharma

Summary: This paper presents a technique for hiding secret messages in images using steganography during network transfer. The effectiveness of the facial re-enactment GAN (FRe-GAN) technique is shown through qualitative and quantitative results on various datasets. A comparative study is conducted to highlight the limitations of existing literature and motivate the proposed approach. The proposed steganography-based GAN model is experimented using benchmark facial datasets, and achieves superior qualitatively and quantitatively results compared to state-of-the-art systems.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Performance evaluation of drug synergy datasets using computational intelligence approaches

Pooja Rani, Kamlesh Dutta, Vijay Kumar

Summary: Drug synergy is a promising approach for malignant diseases, which can improve therapeutic efficacy, reduce toxicity, and overcome drug resistance. This study uses computational techniques to model the combined activity of anticancer drugs and analyzes their performance using various metrics. By utilizing existing datasets and computational techniques, researchers can accelerate the development of new drugs, saving both time and money.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Distracted driver detection using learning representations

Sahil Sharma, Vijay Kumar

Summary: With the increasing demand for electric vehicles and high-end vehicle technologies in the current market, attention is being given to distracted driver detection with the use of artificial intelligence. This paper proposes new strategies to improve the performance of driver detection methodology, including driver activity detection and driver fatigue detection systems. The proposed model achieved a classification accuracy of 99.69% in activity detection, compared to the state-of-the-art comparison's accuracy of 94.32%. The KNN classifier showed the best accuracy of 76.33% in detecting driver fatigue. Experimental results demonstrate the superiority of the proposed model over existing models, making it applicable in real-life environments.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Biochemical Research Methods

Drug synergy model for malignant diseases using deep learning

Pooja Rani, Kamlesh Dutta, Vijay Kumar

Summary: Drug synergy is a promising treatment option for malignancy, as it reduces toxicity and overcomes drug resistance. Computational techniques using artificial intelligence are being utilized to identify synergistic drug combinations, and a new deep-learning model called DrugSymby has been proposed for predicting drug combinations. The model achieved high performance and will be used to determine successful synergistic drug combinations and explore new possibilities.

JOURNAL OF BIOINFORMATICS AND COMPUTATIONAL BIOLOGY (2023)

Article Telecommunications

Security in IoT systems using natural language processing: Future challenges and directions

Yogendra Kumar, Vijay Kumar

Summary: The internet of things (IoT) is advancing human lives through intelligent services, but security challenges need to be addressed before its full potential can be realized. This study proposes integrating Natural Language Processing (NLP) with IoT systems to enhance security, investigating the current state of NLP and its applications. The study develops a system for identifying malicious behaviors in an IoT environment using n-gram and word-embedding techniques, and addresses security challenges and future directions for enhancing IoT security with NLP.

INTERNET TECHNOLOGY LETTERS (2023)

Review Computer Science, Artificial Intelligence

Computational deep air quality prediction techniques: a systematic review

Manjit Kaur, Dilbag Singh, Mohamed Yaseen Jabarulla, Vijay Kumar, Jusung Kang, Heung-No Lee

Summary: The growing population and industrialization have led to a significant increase in environmental pollution, especially air pollution. This has negative impacts on both the environment and human health, resulting in higher rates of illness and death. To address this urgent problem, the development of air quality prediction models has become a crucial area of research.

ARTIFICIAL INTELLIGENCE REVIEW (2023)

Article Computer Science, Information Systems

Advancements in arithmetic optimization algorithm: theoretical foundations, variants, and applications

Vijay Kumar

Summary: This study provides a thorough analysis of the arithmetic optimization algorithm (AOA), including its mathematical modeling and inspiration. The study investigates various variants of AOA, such as improved, binary, chaotic, hybrid, and multi-objective. It also discusses the applications of AOA and its variants in different research domains, as well as potential research directions. The study aims to assist young researchers in understanding the fundamental concepts of AOA and applying them to their own research issues.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

MLNet: Metaheuristics-Based Lightweight Deep Learning Network for Cervical Cancer Diagnosis

Manjit Kaur, Dilbag Singh, Vijay Kumar, Heung-No Lee

Summary: This paper proposes a metaheuristics-based lightweight deep learning network (MLNet) for automated cervical cancer diagnosis. Particle swarm optimization and dynamically hybrid niching differential evolution algorithms are used to optimize the hyper-parameters of the convolutional neural network. The experimental results demonstrate that MLNet outperforms existing models on three benchmark cervical cancer datasets.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Article Computer Science, Information Systems

Lightweight Biomedical Image Encryption Approach

Manjit Kaur, Ahmad Ali AlZubi, Dilbag Singh, Vijay Kumar, Heung-No Lee

Summary: This paper proposes a lightweight image encryption approach using compressive sensing and a modified seven-dimensional (MSD) hyperchaotic map for medical Internet of Things (MIoT) networks. The MSD is modified to generate more secure secret keys, and the NSCT is used for improved compressive sensing. Measurement matrices are generated using the secret keys obtained from MSD, and encryption is performed on compressed images using secret keys obtained from MSD. Comparative analyses verify the robustness, security, and statistical analysis performance of the proposed encryption approach.

IEEE ACCESS (2023)

No Data Available