The Art of Writing: A Creative Odyssey

By Shashikant Nishant Sharma

 Writing is more than just words on paper; it’s an art form that allows individuals to express their thoughts, emotions, and imagination in a unique and captivating way. The art of writing is a dynamic and evolving process that involves creativity, discipline, and a deep understanding of language. In this article, we will explore the key elements of the art of writing and how aspiring writers can hone their craft.

  1. Embrace Creativity:
    At the heart of the art of writing is creativity. Allow your imagination to roam freely, breaking free from the constraints of reality. Create vivid worlds, intriguing characters, and compelling narratives that transport your readers to new realms. Embracing creativity means being open to unconventional ideas and finding inspiration in the mundane and extraordinary alike.

  2. Master the Craft of Language:
    Language is the painter’s palette, and words are the colors. Mastering the craft of language involves understanding the nuances of grammar, syntax, and vocabulary. Develop a rich and varied vocabulary to paint detailed images with your words. Experiment with different writing styles, tones, and voices to discover your unique literary fingerprint.

  3. Find Your Voice:
    Every writer has a distinct voice that sets them apart. It’s the tone, style, and perspective that make your writing uniquely yours. Finding your voice requires self-discovery and a willingness to be authentic in your expression. Don’t be afraid to experiment until you discover the voice that feels most natural and resonant with your inner self.

  4. Cultivate Discipline:
    While creativity fuels the art of writing, discipline provides the structure. Set aside dedicated time for writing, establish goals, and stay committed to your craft. Discipline is the force that turns fleeting ideas into tangible stories. Whether it’s a daily writing routine or a structured timeline for completing projects, cultivating discipline is essential for consistent and meaningful output.

  5. Edit and Revise:
    The first draft is just the beginning. The true art of writing involves the meticulous process of editing and revising. Be prepared to scrutinize your work, refine your language, and polish your prose. Editing is where the raw material transforms into a polished masterpiece. Embrace feedback from others and be open to making necessary changes to enhance the overall impact of your writing.

  6. Emotionally Connect with Your Audience:
    Great writing is not just about conveying information; it’s about evoking emotions. Whether it’s laughter, tears, or contemplation, strive to emotionally connect with your audience. Infuse your writing with authenticity and vulnerability, allowing readers to relate to the human experience within your words.

Conclusion:
The art of writing is a dynamic and deeply personal journey. It involves a harmonious blend of creativity, language mastery, self-discovery, discipline, and emotional connection. Aspiring writers should approach their craft with a sense of wonder and a commitment to continuous growth. Through the art of writing, individuals have the power to inspire, challenge, and transport readers to new worlds, making it a truly transformative and timeless form of expression.

References

Raimes, A. (1998). Teaching writing. Annual review of applied linguistics18, 142-167.

Sharma, S. N. How to Write a Grant Proposal in an Effective Manner to get Projects.

Weigle, S. C. (2002). Assessing writing. Cambridge University Press.


Survey on Real Time Hand Gestures Recognition Using Convolutional Neural Network

by Kirti Sahu & Ashish Kumar Khare

 

ABSTRACT

Gesture Recognition is one of the most important part of research today. Many new algorithms are being developed recently in today‟s upcoming technologies. In the day to day life, mobile devices like phones or tablets are very common and being widely used among all people of world. These devices are connected with high speed networks and provide strong communications. These devices are often an enormous help    for    the people    that aren’t ready to communicate properly and even in emergency conditions.    For    a    disabled one    that isn’t able to speak     or an     individual who      speaks special language, these devices are often a boon as understanding, translating and speaking systems for these peopleThis chapter   discusses transportable android based hand sign recognition system which may be employed by disabled people. This paper presents comprehensive review on vision-basedhand gesture recognition, with a stress on    dynamic   hand   gestures.   First, quick introduction   of the   essential concepts and the classification of hand gesture recognition techniques are given. Then, variety of popular related technologies and interesting applications are reviewed. Finally, we give some discussion on the present challenges   and   open    questions during this area and mean an inventory of possible directions for future work.

Keywords: Python, NumPy, TensorFlow, Tflearn, Keras, Convolutional Neural Network, Training, Classification.

 

INTRODUCTION

Sign Language may be a well-structured code gesture,    every     gesture     has     meaning assigned thereto. Sign Language is that the only means of communication for deaf people. With the advancement of science and technology many techniques are developed not only to attenuate the matter of deaf people but also to implement it in several fields. But if the pc are often programmed in such how that it can translate signing to text format, the difference between the traditional people and therefore the deaf community can be minimized. We have proposed asystem which is in a position to acknowledge the varied alphabets of Indian signing for Human-Computer interaction giving more accurate results minimum of possible time. It will not only benefit the deaf and dumb people of India but also might be utilized in various applications within the technology field.

 

LITERATURE SURVEY

The contributions of various scholars are studied for survey and analysing the merits and demerits in order to enhance the consequences for making the system work better.

 

In Paper [1], Abhishek B, Kanya Krishi, Meghana M, Mohammed Daaniyaal, Anupama H S have proposed a system on Hand Gesture Recognition using Machine Learning Algorithms. The main focus of this is to recognize the human gestures using mathematical algorithms for human computer interaction. Only a few modes of Human-Computer Interaction exist, they are: through keyboard, mouse, touch screens etc. Each of these devices has their own limitations when it comes to adapting more versatile hardware in computers. Gesture recognition is one among the essential techniques to create user-friendly interfaces. Usually gestures are often originated from any bodily motion orstate, but commonly originate from the face or hand. Gesture recognition enables users to interact with the devices without physically touching them. This paper describes how hand gestures are trained to perform certain actions like switching pages, scrolling up or down in a page. The importance of gesture recognition lies in building efficient human-machine interaction. 

 

In paper [2], Jay Prakash, Uma Kant Gautam has proposed a Hand Gesture Recognition using Computer Vision Based Approach, Hand Gesture Recognition, Human Computer Interface (HCI), Instrumented Glove, Non-Verbal language. Hand Gesture Recognition System works like this : first user gives input to the system by making hand gestures, then system scanned the gestures by using cam or sensor and deducts it into signal and passes the program, now its program responsibility to first accept the signal then examine what is the input given using gestures, then check if there is any corresponding data is saved into dataset then result will be obtained in the output device.

 

In paper [3], Amit Chaurasia and Harshul Shire have proposed a system SNCHAR: Sign language Character Recognition using Keras, TensorFlow, Scikit, and Pyttsx3. This project “SNCHAR: Sign language Character Recognition” system is a python-based application. It uses live video as input, and predicts the letters the user is gesturing in the live feed. It captures the gestures, and recognizes the area of hand gesture skin colour intensity object. It separates the gesture area from the rest of the frame, and feeds that part to their trained model. This pre-trained model, using the hand gesture as input predicts a value that represents an alphabet. This alphabet is displayed on the screen. User can hear the text predicted on the screen by pressing “P” on the keyboard. The predicted text can be erased if required by using “Z” from the keyboard. At one hand, the project is capable of capturing the live feed and converting the gestures into the corresponding alphabets. 

In Paper [4], D. Nagajyothi, M. Srilatha and V. Jyothi have proposed a Hand Gesture Method to Speech Conversion using Image Segmentation and Feature Extraction Algorithm. In this system, the detection of skin colour and region segmentation is performed during the segmentation stage. RGB colour space, cbr colour space, HS colour space, Normalized RGB HSV are skin colour segmentation techniques. From these values the skin colour is detected. The RGB values lies in between a boundary for skin pixels and it varies for non-skin pixels. With this RGB ratio they  can identify whether the skin pixel belong to the skin region or not. Skin region detection algorithm is applied for each gesture and it is applied to skin region to find the colour. This system not only recognizes gesture indications it develops speech system. From the results they have obtained accuracy up to 80%.

 

In paper [5], T. Chandraleka, Balasubramanian R, Balasubramanian S, Karthikeyan S and Jayaraj R have proposed a system on Hand Gesture Robot Car using ADXL 335. In this System, Arduino, Microcontroller, Transmitter, Receiver are used. The outer frame work was done using tyres and supporting board is fixed to it and the tyres are each other with steel road of suitable capacity and which the tyres are connected to the board using wires and also the motors are fixed to the tyres for rotation purpose. Radio signals are transmitted using transmitter module Without any physical connection, the embedded system is used to interact with each other. After successful completion the working loads were improving the project. Even the mounting of ultrasonic sensor and other sensors for the complete information about the place where the car is being operated & make it useful for the society. The most important feature is to interact with the application from the distance object without any physical contact.

 

In paper [6], Sankara Gomathi.S, Amutha. S, Sridhar.G and Jayaprakasan.M have proposed a system Interpretation of Formal Semantics from Hand Gesture to Text using Proficient Contour Tracing Technique. In this system, Contour Tracing, Hand gesture, SVM, Feature Extraction, TOF, IoT are used. In this project, semantics are classified by support vector machine with trained datasets. The recognised hand gestures are displayed as text. Their main objective is to resolve the problem of facing interviewer for vocally impaired individuals. This helps them to build their confidence and eradicate their inferiority complex compared to other methods. In the interpretation of framework, conversion of sign to text, Image captured from camera is binaries, noise is expelled, boundaries of finger is detected and corresponding text is displayed as an output to the receiver.

 

In paper [7], Abdul Khader, Muhammad Thouseef, Akbar Ali and Ahamad Irfan have proposed a system on Efficient Gesture based Language Recognition using SVM and Lloyd‟s Algorithm. In this work, they have actualized a presumable exact strategy to perceive static gestures or image frames from a live camera or video data. As Hand Gesture Recognition is identified with two noteworthy fields of image processing and AI (machine learning). APIs that can be utilized to implement different strategies and methods in these fields. 

 

In paper [8], Rajesh George  Rajan  and  M  Judith Leo have proposed Comprehensive Analysis on Sign Language Recognition System. The human- machine interaction is developed through  the gesture recognition system. In the previous years, most of the researchers had done their research in static hand gesture recognition. Some works have been reported for recognition of dynamic hand gesture.   Also,   facial   expressions aren’t included in most  generally used  systems. Developing systems which are capable of recognizing both hand and facial gestures may be a key challenge during this area. In this paper they have discussed different sign language recognition approaches using different acquisition methods. By using the different data acquisition methods like sensor-based gloves, Kinect, leap motion controller etc. 

 

In paper [9], S. Shivashankara and S. Srinath have proposed a system on American Sign Language Recognition System using Bounding Box and Palm FEATURES Extraction Techniques. Bounding Box Technique, Canny Edge Detector, CIE Colour Model are used. This research paper exhibits an inventive framework, to achieve the transliteration of 24 static alphabets (Letter J and Z not included as they involve hand movement) of American Sign Language into English text and achieved an average recognition rate of 98.21% which is the best in recent (papers published in year 2017, and 2018) existing traditional work carried out. This paper also summarizes the system architecture, state of art, data collection for the proposed work, proposed system design, and the detailed results evaluation by showing comparative graphical depiction of the proposed technique with the existing techniques average recognition rate and also depicts the average gesture recognition rate chart by considering various factors like background complexity, background colour, location, time, distance, angle, mobile camera resolution, and illumination. This paper also highlights on face detection and edge detection technique, and also the various hand / palm features extraction techniques.

 

In paper [10], Shreyas Rajan, Rahul Nagarajan, Akash Kumar Sahoo, M. Gowtham Sethupati have proposed a system on Interpretation and Translation of American Sign Language for Hearing Impaired Individuals using Image Processing. This project mainly focuses on the development of software that can convert American Sign Language to Communicative English Language and vice-versa. This is accomplished via Image- Processing. The latter is a system that does a few activities on a picture, to acquire an improved  picture or to extricate some valuable data from it. Image processing in this project is done by using MATLAB, software by MathWorks. The latter is programmed in a way that it captures the live image of the hand gesture. The captured gestures are put under the spotlight by being distinctively coloured in contrast with the black background. 

 

In paper [11], S. Chandrasekhar and N.N. Mhala have proposed a system on High-speed Integration of Kinect V2 Data for Identification of Hand Gesture in Real time Movements. Hand gesture recognition is extremely critical for human-PC connection. This manuscript presents a narrative constant strategy for human-hand gesture recognition. There a framework for the discovery of quick gesture movement by utilizing a direct indicator of hand developments utilizing information combination technique. In their system, the hand area is removed from the foundation with the foundation subtraction strategy. At long last, the framework has been approved by methods for the Kinect v2 application actualized. The time requirement is recognized and the recognition is quick contrasted with other ongoing minutes. The timing analysis is compared, and the average time using data fusion method is 63ms. By using fast integration of data, the average time is 45ms. The time taken for recognition  of hand gesture is been improved. 

 

In paper [12], E. Padmalatha, S. Sailekya, R. Ravinder Reddy, Ch. Anil Krishna  and  K. Divyarsha have proposed system  on  Sign Language Recognition. There are many recognized sign language standards that have been defined such as ASL (American Sign Language), IPSL (Indo Pakistan Sign Language), etc., which define what sign means what. ASL is the most widely used sign language by the deaf and  dumb  community.The deaf and dumb use sign language to communicate among themselves with the knowledge of the standard      sign      language.      But      they      cant communicate with the remainder of the planet as most of the people are unaware of the existence and therefore the usage of the signing. This method aims to remove this communication barrier between the disabled and the rest of the world by recognizing and translating the hand gestures and convert it into speech. The CNN model fetched 99.4% accuracy while training and testing with the dataset. 

In paper [13], L. Latha and M. Kaviya have proposed system on A Real Time System for Two Ways Communication of Hearing and Speech Impaired People. The gestures shown by the impaired people will be captured and the corresponding voice            output is produced together way and   therefore    the before the voice input by normal people is taken and the periodic gesture are going to be showed them as another.   This   system    uses    RASPBERRY    PI kit because the hardware, where a Pi camera, LCD display, Speaker and   Microphone are   going   to be attached alongside it. First the image acquisition is carried where it captures the input  image  and  then image pre-processing is done to extract the foreground image from the background, then  feature extraction iscarried out to extract the necessary details. 

 

In paper [14], Suthagar S., K. S. Tamilselvan, P. Balakumar, B. Rajalakshmi and C. Roshini have proposed a system on Translation of Sign Language for Deaf and Dumb People. Their project objective isto analyse and translate the sign language that is hand gestures into text and voice. For this process, Realtime Image made by deafmute people is captured and it is given as input to the pre-processor. Then, feature extraction process by using algorithm and classification by using SVM (support Vector Machine) can be done. After the text of corresponding sign has been produced. The obtained output is converted into voice with use of MATLAB. Thus, hand  gestures made by deaf-mute people has been analysed and translated into text and voice for  better communication. In this proposed model an attempt has been made to design a system which can recognize the sign language of alphabets and number. 

 

In paper [15], V. Padmanabhan, M. Sornalatha have proposed system for dumb people Hand gesture recognition and voice conversion system. In this system, Gesture, Flex sensor, accelerometer, microcontroller, TTS are used. This project aims to lower the communication gap between the mute community and additionally the quality world. The projected methodology interprets language into speech. The system overcomes the required time difficulties of dumb people and improves their manner. Compared with existing system  the projected arrangement is compact and is feasible to hold to any places. This system converts the language in associate passing voice that’swell explicable by blind and ancient people.  


 

Table 1: Comparison on Various Methods Used in Hand Gestures

S. No

Paper

Technique

Result

Issues

 

1

Hand Gesture Recognition using Machine Learning Algorithms

Gesture Recognition, Human Computer Interaction, User- friendly Interface.

Each of these devices has their own limitations when it comes to adapting more versatile hardware in computers.

They are interpreted as gestures by the computer to perform actions like switching the pages, scrolling up or down the page. The system is built using OpenCV and TensorFlow object

detector.

 

2

Hand Gesture Recognition

Computer Vision Based Approach, Hand Gesture Recognition, Human Computer Interface (HCI), Instrumented Glove, Non-Verbal language

Hand Gesture Recognition System works like this: first user give input to the system by making hand gestures, then system scanned the gestures by using cam or sensor and deducts it into signal and passes the program, now its program responsibility to first

accept the signal

Examine what is the input given using gestures, then check if there is any corresponding data is saved into dataset then they will get their result.

 

3

SNCHAR: Sign

language Character Recognition

Keras, TensorFlow, Scikit, and Pyttsx3

Different images were tested and found that the new technique of TensorFlow was found to show some

results.

Moreover, there were difficulties to attain a 57% accuracy.

 

4

Hand Gesture Method to Speech Conversion using Image Segmentation and Feature Extraction Algorithm

HSV colour model, Pattern Recognition, Tracking and Segmentation.

The RGB values lies in between a boundary for skin pixels and it varies for non-skin pixels. With this RGB ratio they can identify whether the skin pixel belong to the skin region or not. Skin region detection algorithm is applied for each gesture and it is applied to skin region to find the colour.

The issue is the system was not able to achieve the proper image capturing and colour detection problems.

 

 

 

5

Interpretation and Translation of American Sign Language for Hearing Impaired Individuals using Image Processing

Feature Extraction, Edge Detection, Segmentation

Their system translates the detected gesture into actions such as opening websites and launchingapplications like VLC Player and PowerPoint. The dynamic gesture is used to shuffle through the slides in presentation. Our results show that an intuitive HCI can be achieved with minimum hardware requirements.

System that did not utilize any markers, hence making it more user friendly and low cost. In this gesture recognition system, they have aimed to provide gestures, covering almost all aspects of HCI such as system functionalities, launching of applications and opening some popular websites.

 

6

High speed Integration of Kinect V2 Data for Identification of Hand Gesture inReal timeMovements

Gesture Recognition, Human Computer Interaction, Kinect V2 system

The time requirement is recognized and the recognition is quick contrasted with other ongoing minutes. The timing analysis is compared, and the average time using data fusion method is

63ms

Outcome of the module is inappropriate.

 

7

Sign Language Recognition

SVM, CNN, HSV

colour model

A dataset containing all the gestures are present. Each gesture folder consists of 2400 images which is used for training and testing the model. There are 47 gestures but more can be added by the users.

As the hand segmentation is dependent on the colour of the hand, if the objects in the background match the skin colour, it could distort the binarized threshold image. Due to similar gestures that exist in ASL, the final accuracy of classification depends on the environment

and image processing techniques.

 

8

 SVM, MATLAB

Hand detection, Segmentation and Hand Tracking

An attempt has been made to design a system which can recognize the sign language of alphabets and number. 11 different features from image has been extracted to make a feature vector database. SVM and neural network is used for classifying the different sign- language    word   and hence for recognition.

The result obtained for the system is not appropriate and could recognise the images properly.

 

9

Hand Gesture Recognition and Voice conversion system for dumb people

Gesture, Flex Sensor, TTS, Microcontroller

The     language interprets into some text kind displayed on the digital display screen, to facilitate

the deaf people.

The main issue is recognition algorithm is reduced to 60% – 80%.

 

CONCLUSION AND FUTURE WORK 

In this project, we present hand tracking and segmentation algorithm that is both accurate and computationally efficient. The importance of gesture recognition lies in building efficient human- machine interaction. This paper describes how the implementation of the system is completed based upon the     pictures captured, and       the waythey’re interpreted as gestures by the pc to perform actions like switching the pages, scrolling up or down the page. They were able to create robust gesture recognition system that did not utilize any markers, hence making it more user friendly and low cost. In this gesture recognition system, we have aimed to provide gestures, covering almost all aspects of HCI such as system functionalities, launching of applications and opening some popular websites. In future we would like to improve the accuracy further and add more gestures to implement more functions. Finally, we target to extend our domain scenarios and apply our tracking mechanism into variety of hardware including digital TV and mobile devices. We also aim to extend this mechanism to range of users including disabled users.

 



 

REFERENCES

[1]   Abhishek B, Kanya Krishi, Meghana M, Mohammed Daaniyaal, Anupama H S “Hand Gesture Recognition using Machine Learning Algorithms” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-1, May 2019.

 

[2]   Jay Prakash, Uma Kant Gautam “Hand Gesture Recognition”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277- 3878, Volume-7 Issue-6C, April 2019.

 

[3]   Amit Chaurasia, Harshul Shire, “SNCHAR: Sign language Character Recognition”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-3, September 2019.

 

[4]   D. Nagajyothi, M. Srilatha, V. Jyothi “Hand Gesture Method to Speech Conversion using Image Segmentation and Feature Extraction Algorithm” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, November 2019

 

[5]   T. Chandraleka, Balasubramanian R, Balasubramanian S, Karthikeyan S, Jayaraj R “Hand Gesture Robot Car using ADXL 335” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, November 2019.

 

 

[6]   Sankara Gomathi.S, Amutha. S, Sridhar.G, Jayaprakasan.M “Interpretation of Formal Semantics from Hand Gesture to Text using Proficient Contour Tracing Technique” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277- 3878, Volume-8, Issue-2S11, September 2019.

 

[7]   Abdul Khader, Muhammad Thouseef, Akbar Ali, Ahamad Irfan “Efficient Gesture based Language Recognition using SVM and Lloyd‟s Algorithm” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-2S3, July 2019.

 

[8]   Rajesh George Rajan, M Judith Leo “A comprehensive Analysis on Sign Language Recognition System” International Journal of RecentTechnology and Engineering (IJRTE) ISSN: 2277- 3878, Volume-7, Issue-6, March 2019.

 

[9]   S. Shivashankara, S. Srinath “An American Sign Language Recognition System using Bounding Box and Palm FEATURES Extraction Techniques” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-7 Issue-4S, November 2018.

 

[10] Shreyas Rajan, Rahul Nagarajan, Akash Kumar Sahoo, M. Gowtham Sethupati “Interpretation and Translation of American Sign Language for Hearing Impaired Individuals using Image Processing” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, November 2019.

 

[11] S. Chandrasekhar, N.N. Mhala “High-speed Integration of Kinect V2 Data for Identification of Hand Gesture in Real time Movements” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, November 2019.

 

[12] E. Padmalatha, S. Sailekya, R. Ravinder Reddy, Ch. Anil Krishna, K. Divyarsha “Sign Language Recognition” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277- 3878, Volume-8 Issue-3, September2019.

 

[13] L. LATHA, M. KAVIYA “A Real Time System for Two Ways Communication of Hearing and Speech Impaired People” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277- 3878, Volume-7 Issue-4S2, December 2018.

 

[14] Suthagar S., K. S. Tamilselvan, P. Balakumar, B. Rajalakshmi, C. Roshini “Translation of Sign Language for Deaf and Dumb People” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-5, January 2020.

 

[15] V. Padmanabhan, M. Sornalatha “Hand gesture recognition and voice conversion system for dumb people” International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014.

LINK to DOWNLOAD PDF

Unlocking Academic Excellence: The Benefits of Using Google Scholar

 By Shashikant Nishant Sharma

In the digital age, researchers, academics, and students are fortunate to have access to powerful tools that facilitate the discovery of scholarly content. Google Scholar stands out as one such tool that has revolutionized the way we access and engage with academic literature. This article explores the myriad benefits of using Google Scholar and how it has become an indispensable resource in the pursuit of knowledge.

  1. Comprehensive Academic Search Engine

Google Scholar serves as a comprehensive academic search engine, indexing scholarly articles, theses, books, conference papers, and patents. Its vast database covers a wide range of disciplines, ensuring that users have access to a diverse array of research materials.

  1. Free Access to Scholarly Content

One of the standout features of Google Scholar is its commitment to open access. Many of the search results on Google Scholar provide free access to the full text or a preprint version of the scholarly content. This democratization of information is invaluable for researchers and students with limited access to institutional resources.

  1. User-Friendly Interface

Google Scholar’s user-friendly interface makes it accessible to users of all backgrounds. The simple search bar and intuitive design allow for easy navigation, ensuring that users can quickly find relevant academic resources without being overwhelmed by complex features.

  1. Citation Tracking

Researchers and academics can track citations of their own work or explore the impact of a particular article through Google Scholar. This feature aids in understanding the influence and relevance of scholarly publications within the academic community.

  1. Alerts and Notifications

Google Scholar offers a personalized experience through its alert and notification system. Users can set up alerts for specific keywords, authors, or topics of interest. This ensures that they stay informed about the latest developments in their field without actively searching for new publications.

  1. Integration with Library Resources

Many institutions integrate Google Scholar with their library resources, providing users with direct access to full-text articles available through their subscriptions. This seamless integration enhances the research experience for students and researchers within academic institutions.

  1. Advanced Search Options

For users looking for more refined search results, Google Scholar offers advanced search options. Researchers can use specific filters to narrow down results based on publication dates, authors, journals, or keywords, making it easier to find the most relevant information for their research.

  1. Multilingual Search Capabilities

Google Scholar supports multiple languages, making it a global platform for academic research. This inclusivity allows researchers from around the world to access and contribute to the vast pool of scholarly knowledge available on the platform.

Conclusion

In conclusion, the benefits of using Google Scholar are manifold. From its user-friendly interface to its extensive database and open access initiatives, Google Scholar has become an indispensable tool for academics, researchers, and students alike. By facilitating the efficient discovery of scholarly content, Google Scholar continues to play a pivotal role in advancing knowledge and fostering collaboration within the global academic community. Embracing this powerful platform is not just a convenience but a key step towards unlocking the doors to academic excellence.

References


Halevi, G., Moed, H., & Bar-Ilan, J. (2017). Suitability of Google Scholar as a source of scientific information and as a source of data for scientific evaluation—Review of the literature. Journal of informetrics11(3), 823-834.

Jacsó, P. (2005). Google Scholar: the pros and the cons. Online information review29(2), 208-214.

Mayr, P., & Walter, A. K. (2007). An exploratory study of Google Scholar. Online information review31(6), 814-830.

Mikki, S. (2009). Google scholar compared to web of science. A literature review. Nordic Journal of Information Literacy in Higher Education1(1).

Sharma, S. N. (2023). Understanding Citations: A Crucial Element of Academic Writing.

Call for Papers: International Journal of Research (IJR)

 Dear esteemed researchers and scholars,

The International Journal of Research (IJR) invites submissions for consideration in our esteemed publication. As a reputable and scholarly journal committed to advancing knowledge across diverse fields, we encourage researchers, academicians, and professionals to contribute their original research papers, review articles, case studies, and scholarly works.

IJR seeks to publish high-quality, peer-reviewed manuscripts covering a wide spectrum of disciplines including, but not limited to:

  • Science and Technology
  • Engineering
  • Medicine and Healthcare
  • Social Sciences
  • Business and Management
  • Arts and Humanities
  • Education
  • Interdisciplinary Studies

Submission Guidelines:

  • Manuscripts should be original and previously unpublished.
  • Papers must adhere to the journal’s formatting and citation style.
  • All submissions undergo a rigorous peer-review process to ensure scholarly excellence.
  • Authors are requested to submit their manuscripts online via our website or email to ijr@ijrjournal.com.

Important Dates:

  • Submission Deadline: 30 of each month
  • Notification of Acceptance: Within a week
  • Publication Date: Within a week of Acceptance

Authors are encouraged to review our submission guidelines and policies available on our website for detailed information on manuscript preparation and submission procedures.

We look forward to receiving your scholarly contributions and fostering a collaborative platform for impactful research dissemination.

Best regards,

[International Journal of Research (IJR)]
[Website: www.ijrjournal.com]

The Compliance With Covid-19 Health Protocols At St. Paul University Surigao

  

Jobelle S. Teves, MAN, RN (jobelle.teves@spus.edu.ph)

Marcu Augustu E. Mantilla (mantillamarcu@gmail.com)

Jichell Grace A. Basol (jichellbasol@gmail.com)

Lucy L. Teves, PhD, RN (ORCID No. 0000-0003-0939-2824)

 

              The novel COVID-19 disease rapidly spread worldwide and was declared a pandemic by the World Health Organization (WHO, 2020). The study aimed to evaluate the compliance of the college students, faculty, and non-teaching staff with COVID-19 health protocols at St. Paul University Surigao. The study used a quantitative descriptive survey that made use of adherence to health protocol, where the calculated sample size for the participants’ occupation at the St. Paul University Surigao – Main campus was 379. The statistical method applied to the collected data was Mean and Standard Deviation, Frequency of Percentage Distribution, and Analysis of Variance. Findings drawn from the study and interpretations of the data gathered, the majority of participants are students 86.54%, according to their occupation. Moreover, there is no significant degree of variance in the compliance with COVID-19 health protocols in the occupation of the participants in terms of No Facemask, No Entry and Screening Prior to Entry. However, there is a significant degree of variance in the indicators of Physical Distancing, Practice Respiratory Etiquette, Hand washing and Hand disinfection, and Information dissemination. Therefore, it is recommended in this study that the administrators of St. Paul University Surigao continue to apply no facemask, no entry, practice respiratory etiquette, hand washing and hand disinfection and screening prior to entry while improving and developing different approaches on physical distancing, practice respiratory etiquette, hand washing and hand disinfection, and information dissemination to better cater the groups to further improve compliance to the health protocols. Future researchers are encouraged to further examine the differences and group them according to their profiles, address the same research problem in a different setting, context or location. The researchers also recommend conducting research that focuses on utilizing a convergent parallel design and incorporating natural observation. This research approach will provide valuable insights into the implementation and effectiveness of health protocols in promoting a safe and healthy environment for students, staff, and the wider school community.

 

Keywords: COVID-19, Compliance, Health Protocols

 

 

 

 

INTRODUCTION

A coronavirus outbreak (COVID-19) in 2019 put everyone’s health in danger. The severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) that causes this Coronavirus disease 2019 (COVID-19), which is highly contagious and has killed more than 6 million people worldwide, has had a devastating impact on the world’s demographics and is now the most significant global health crisis since the influenza pandemic of 1918. (Cascella et al., 2022). In addition, this virus mainly spreads through contact with an infected person’s cough or sneeze. The virus can also spread when a person touches something that has the virus on it before touching their eyes, nose, or mouth. Virus COVID-19 can survive for up to 72 hours (Bakar & Rosbi, 2020).

 

            Allegrante et al. (2020) assert that in order to effectively prevent the spread of COVID-19, health education and information must be targeted at various subpopulations and accurate, understandable, convincing, and relevant information must be provided. World Health Organization (WHO) and Centers for Disease Control and Prevention (CDC) have stated that one of the main prevention measures for the entire population is the appropriate use of personal protective equipment (PPE) as well as the adoption of effective hygiene systems (Cirrincione et al., 2022).

 

            Moreover, necessary precautions have been put in place to stop the spread of the virus and lower mortality rates, such as the requirement that everyone wears masks, consistent hand washing and hand sanitizing, social isolation, avoiding crowded places, remote working, and postponing public events. So, following COVID-19 prevention guidelines could assist to lower the prevalence of other infectious diseases like influenza, pneumonia, and Mycobacterium tuberculosis (Dadras, et al., 2021).

 

            Compliance with COVID-19 health protocols is crucial in preventing the spread of the virus and protecting public health. The specific protocols may vary based on recommendations from health authorities and the prevailing situation. The Department of Health’s report from 2021 states that physical separation and hygiene standards will be needed in all venues, so when neighborhood businesses restart operations, they must adhere to hygiene standards to stop the spread of the virus. To ensure the security of staff, customers, and patients, health facilities and DOH divisions have modified their standards and procedures. Alternative work arrangements, utilizing virtual platforms to their fullest potential, and ensuring that infection control protocols are carefully followed are some strategies. As a result, following government directives and public health advice is essential in lowering transmission rates during the COVID -19 pandemic, which is a worldwide health emergency. Nevertheless, a small percentage of people reportedly disregard laws and regulations (Banai et al., 2021). Compliance with COVID-19 health protocols is crucial in preventing the spread of the virus and protecting public health. The specific protocols may vary based on recommendations from health authorities and the prevailing situation. 

 

            In this study, the researchers were eager to compile and assess the safety and health practices currently used at St. Paul University Surigao as required by the government to stop the spread of the virus and also to protect its staff and students. The researchers primarily focused on the compliance by the teachers, students, and non-teaching staff to health protocols implemented at St. Paul University Surigao. Additionally, since the start of face-to-face sessions in the academic year 2022–2023, St. Paul University Surigao has strictly adhered to the government’s necessary health procedures.

 

 

Conceptual Framework of the Study

This study focused on the examination of COVID-19 health protocols, building upon the research conducted by Daniel et al. (2022). The research highlighted the importance of complying with health protocols during the pandemic. The study recommended various practical measures, including hand washing in public spaces, maintaining physical distance, wearing masks, avoiding crowded areas, practicing respiratory etiquette, engaging in physical exercise, taking vitamins or supplements, and adopting a balanced diet. The implementation of these health protocols is crucial in preventing the transmission of COVID-19 within the community. It is essential for society to adhere to these protocols in order to effectively control the spread of the pandemic. Additionally, the health protocols support society’s efforts to remain productive while staying safe. To raise public awareness, all institutions must work together (Saputra et al, 2020; Christiarini et al, 2020; as cited in Christian, 2021). 

 

            The focus of this study, on the other hand, is based on the concept of Daniel et al., (2022) which supports health protocols such as hand washing in public spaces, physical distancing, frequency of using the mask, and avoiding crowded places which were highly correlated. Hence, in this study, the researchers focused on the health protocols practiced at St. Paul University Surigao which were similar to the concept of Daniel et al., (2022) such as no facemask means no entry, physical distancing, practicing respiratory etiquette, hand washing and disinfection, information dissemination, and screening prior to entry. 

Figure 1:  Schematic Diagram

 

 

 

 

 

 

 

 

 

 

 

METHOD

This study used descriptive-survey research design. This design investigates the compliance of the participants without any of them being managed or controlled by the researcher. This method is suitable since the purpose of the research is to evaluate participants’ compliance. Moreover, information on compliance with health practices was gathered using a standardized survey questionnaire.

 

Participants 

The researchers selected the faculty, non–teaching staff, and students at St. Paul University, Surigao. The participants were randomly selected using the multistage Cluster Sampling method to form a sample. The researchers procured the lists of the faculty, non-teaching staff, and students to get the sample size of targeted participants. Sample participants were taken using Slovin’s formula, used to calculate the sample size (326) given the population size (1,759) and a margin of error (e) which is computed as n=N/(1+Ne2). 

 

Instrument

In this study, a researcher-made questionnaire based on the Health Services COVID-19 Implementing Guidelines of St. Paul University, Surigao (2020) was used as a survey questionnaire to collect data from the respondents. Consequently, the researchers have selected the following indicators: 1.) No facemask, no entry; 2.) Physical distancing; 3.) Practice respiratory etiquette; 4.) Hand washing and disinfection; 5.) information dissemination; and 6.) entry screening to evaluate compliance with minimum health standards implemented at St. Paul University, Surigao. Faculty, non-teaching staff, and college students were asked to describe themselves in reference to verbal interpretation: always, often, sometimes, and never in the qualitative description; excellent compliance, good compliance, average compliance, and poor compliance.

 

 

Data Analysis

 

The following statistical tools were used to answer the specific problems:

 

Frequency Count and Percentage Distribution. This tool was used to determine the occupation of the participants.

 

Mean and Standard Deviation. This tool was utilized to determine the effectiveness of the participant’s compliance.

The following are the basis for the interpretation of data:

 

ANOVA (Analysis of Variance). This tool was employed to measure the degree of variance in the extent of compliance among the three group which are: college students, faculty, and non-teaching staff.

 

 

RESULTS AND DISCUSSION

 

This chapter presents, analyzes, and interprets the data gathered. The presentation follows the sequence of problems posed in Chapter 1.

Occupation of the Participants

            Table 1 shows the profile of the participants on whether they are faculty, students, or non-teaching staff.

 Table 1.

             Occupation of the Participants.

Occupation

f (n=379)

%

Faculty

21

5.54

Non-teaching Staff

30

7.92

Student

328

86.54

 

            
            The table provided information that in terms of their occupation, it can be noticed that most of the participants are students. Specifically, 328 (86%) are students, Participants from the faculty and non–teaching staff were 21 (5.54%) and 30 (7.92%).

 


 

Mean and Standard Deviation on The Compliance with COVID-19 Health Protocols at St. Paul University Surigao

 

Table 2 presents the compliance with COVID-19 health protocols in terms of No Facemask, No Entry.

 

Table 2.

The Compliance with COVID-19 Health Protocols in terms of No Facemask, No Entry

Indicators

Mean

SD

VI

QD

No Facemask, No Entry

I wear facemask upon entering the school premises.

3.70

0.68

A

EC

I wear a facemask that covers both the nose and mouth.

3.69

0.68

A

EC

I wear facemask even in classrooms/offices.

3.51

0.77

A

EC

Average:

3.64

0.71

A

EC

Legend: A-Always; EC-Excellent Compliance

            As shown in table 2, the indicator, “I wear facemask upon entering the school premises,” got the highest mean (M=3.70, SD=68), and verbally interpreted as Always with a qualitative description of Excellent Compliance. This means that it was prominent that the people entering the school premises would wear facemasks. While the indicator, “I wear a facemask even in classroom/offices,” got the lowest mean (M=3.51, SD=0.77), it is still verbally interpreted as Alwayswith a qualitative description of Excellent Compliance. Despite being the lowest indicator, it still yielded a highly valued description. 

 

A study from Liang et al. (2020), found that masks shield other populations against respiratory virus infections and demonstrated the general effectiveness of masks in reducing the spread of respiratory virus infections. While wearing a mask may not keep people from getting COVID-19, it can help lower the odds. If they are sick, a mask can help keep germs from infecting others. If they are healthy, a mask can help keep respiratory droplets from someone who is sick from landing in their noses and mouth.

 

            On average, the compliance with the COVID-19 health protocols in terms of “No facemask, No Entry” got the mean of M=3.64, SD=0.71 with a qualitative description of Excellent Compliance.

Mean and Standard Deviation on The Compliance with COVID-19 Health Protocols at St. Paul University Surigao

 

Table 3 presents the compliance with COVID-19 health protocols in terms of Physical Distancing.

 

Table 3.

The Compliance with COVID-19 Health Protocols in terms of Physical Distancing

Indicators

Mean

SD

VI

QD

Physical Distancing

I observe physical distancing of at least (1) meter or six feet at all times.

2.57

1.02

O

GC

I follow the designated entrance and exit routes to minimize congestion.

3.49

0.76

A

EC

I follow the floor markings and other signages that are visible in the school premises.

3.27

0.75

A

EC

Average:

3.11

0.84

O

GC

Legend: A-Always; O-Often; EC-Excellent Compliance; GC-Good Compliance

            As shown in Table 3, the indicator, “I follow the designated entrance and exit routes to minimize congestion,” got the highest mean (M=3.49, SD=0.76), and verbally interpreted as Always with a qualitative description of Excellent Compliance. In addition, the indicator, “I follow the floor markings and other signages that are visible in the school premises,” got a high mean as well (M=3.27, SD=0.75), verbally interpreted as Always with a qualitative description of Excellent Compliance. This points that the respondents were compliant in following signages and routes to reduce possible contractions of the COVID-19. However, the indicator, “I observe physical distancing of at least (1) meter or six feet at all times,” got the lowest mean (M=2.57, SD=1.02) and verbally interpreted as Often with a qualitative description of Good Compliance. Despite having acceptable results, results reveal that the respondents were slightly challenged in distancing themselves apart by one meter.

 

            As COVID – 19 vaccinations roll out, people may be less compliant in socially distancing themselves. According to a study from Teslya, A. (2022), people may perceive themselves protected from COVID – 19, relying on a reduction in transmission brought on by increased vaccine coverage, therefore complying less. This is corroborated by a study from Andersson et al., (2021), where an increased focused on vaccines may result in low compliance to public health recommendations and hasten the spread of COVID – 19. 

 

            On average, the compliance with the COVID-19 health protocols in terms of “Physical distancing” got the mean of M=3.11, SD=0.84 with a qualitative description of Good Compliance.

Mean and Standard Deviation on The Compliance with COVID-19 Health Protocols at St. Paul University Surigao

 

Table 4 presents the compliance with COVID-19 health protocols in terms of Practice Respiratory Etiquette.

 

Table 4.

The Compliance with COVID-19 Health Protocols in terms of Practice Respiratory Etiquette

Indicators

Mean

SD

VI

QD

Practice Respiratory Etiquette

I cover my mouth and nose when coughing and sneezing using a tissue, handkerchief, or with my inner elbow.

3.57

0.74

A

EC

I avoid touching my eyes, nose and mouth.

3.18

0.79

O

GC

I wash my hands with soap and water after coughing and/or sneezing. 

3.27

0.77

A

EC

Average:

3.34

0.76

A

EC

Legend: A-Always; O-Often; EC-Excellent Compliance; GC-Good Compliance

            As shown in Table 4, the indicator, “I cover my mouth and nose when coughing and sneezing using a tissue, handkerchief, or with my inner elbow,” got the highest mean (M=3.57, SD=0.74), and verbally interpreted as Always with a qualitative description of Excellent Compliance. Additionally, the indicator, “I wash my hands with soap and water after coughing and sneezing,” gained a high mean (M=3.27, SD=0.77), and verbally interpreted as Always with a qualitative description of Excellent Compliance. Conversely, the indicator, “I avoid touching my eyes, nose, and mouth,” got the lowest mean (M=3.18, SD=0.79), verbally interpreted as Often with a qualitative description of Good Compliance. The data presented above points that most of the respondents would cover themselves when they cough and sneeze and would wash their hands after thoroughly. However, they found it hard to avoid touching their eyes, noses and mouth. According to Patel, et al., (2020), A possible decline of respiratory hygiene was observed after the lockdown was lifted because people were less afraid in contracting the COVID – 19. 

 

            On average, the compliance with the COVID-19 health protocols in terms of “Practice Respiratory Etiquette” got the mean of M=3.34, SD=0.76 with a qualitative description of Excellent Compliance.

 

Mean and Standard Deviation on The Compliance with COVID-19 Health Protocols at St. Paul University Surigao

 

Table 5 presents the compliance with COVID-19 health protocols in terms of Hand Washing and Hand Disinfection.

 

Table 5.

The Compliance with COVID-19 Health Protocols in terms of Hand Washing and Hand Disinfection

Indicators

Mean

SD

VI

QD

Hand washing and Hand disinfection

I use liquid hand soap and clean water that are accessible in all hand washing stations.

3.44

0.76

A

EC

I wash my hands for at least 20 seconds while inside the campus.

2.71

1.08

O

GC

I use alcohol with 70% isopropyl or ethyl which are available in every classroom/office.

3.63

0.73

A

EC

Average:

3.26

0.86

A

EC

Legend: A-Always; O-Often; EC-Excellent Compliance; GC-Good Compliance

            As presented in Table 5, the indicator, “I use alcohol with 70% isopropyl or ethyl which are available in every classroom/office,” got the highest mean (M=3.63, SD=0.73) and verbally interpreted as Always with a qualitative description of Excellent Compliance. However, the indicator, “I wash my hands for at least 20 seconds while inside the campus,” got the lowest mean (M=2.71, SD=1.08), and verbally interpreted as Often with a qualitative description of Good Compliance. Washing hands for at least 20 seconds while inside the campus was less likely observed and the people preferred using alcohol instead.

 

            According to a study by Roy et al. (2020), disinfection using the right and recommended physical or chemical disinfectants will not only reduce the spread of the illness but will also greatly help to flatten the curve. It is equally important to wash your hands with soap and water or with products containing alcohol.

 

            On average, the compliance with the COVID-19 health protocols in terms of “Hand washing and Hand disinfection” got the mean of M=3.26, SD=0.86 with a qualitative description of Excellent Compliance.

Mean and Standard Deviation on The Compliance with COVID-19 Health Protocols at St. Paul University Surigao

 

Table 6 presents the compliance with COVID-19 health protocols in terms of Information Dissemination.

 

Table 6.

The Compliance with COVID-19 Health Protocols in terms of Information Dissemination

Indicators

Mean

SD

VI

QD

Information dissemination

I use the official Facebook Page of the Health Services to update myself on health concerns and reminders, especially about COVID-19

2.64

1.09

O

GC

I follow the posters that are placed inside the campus to remind me of the following: Hand washing, Cough and sneeze etiquette, Proper disposal of waste, Physical distancing 

3.36

0.75

A

EC

Average:

3.00

0.92

O

GC

Legend: A-Always; O-Often; EC-Excellent Compliance; GC-Good Compliance

            As shown in Table 6, the indicator, “I follow the posters that are placed inside the campus to remind me of the following: Hand washing, Cough and sneeze etiquette, Proper disposal of waste, Physical distancing,” got the highest mean among the two (M=3.36, SD=0.75), and verbally interpreted as Always with a qualitative description of Excellent Compliance. Indicating that the posters placed around the campus was effective. 

 

            Contrastingly, the indicator, “I use the official Facebook Page of the Health Services to update myself on health concerns and reminders, especially about COVID-19,” acquired a low mean (M=2.64, SD=1.09), and verbally interpreted as Often with a qualitative description of Good Compliance. Pointing that most of the respondents would update themselves on Facebook with regards to health updates. However, though the indicator acquired an acceptable result, it also shows that the posters placed inside the campus was effectively followed more than by checking into the Facebook page itself.

 

            On average, the compliance with the COVID-19 health protocols in terms of “Information dissemination” got the mean of M=3.00, SD=0.92 with a qualitative description of Good Compliance.

Mean and Standard Deviation on The Compliance with COVID-19 Health Protocols at St. Paul University Surigao

 

Table 7 presents the compliance with COVID-19 health protocols in terms of Screening Prior to Entry.

 

 

 

 

 

Table 7.

The Compliance with COVID-19 Health Protocols in terms of Screening Prior to Entry

Indicators

Mean

SD

VI

QD

Screening Prior to Entry

I check myself prior to going to school to ensure that I can enter the school premises.

3.57

0.75

A

EC

Using the non-contact thermometer, I check if my temperature is below 37.5 °C.

3.54

0.77

A

EC

I use the treated foot bath that is placed on the entrance gate to disinfect my footwear.

3.34

0.99

A

EC

Average:

3.48

0.84

A

EC

Legend: A-Always; EC-Excellent Compliance

            

As shown in Table 7, indicator one, “I check myself prior to going to school to ensure that I can enter the school premises,” got the highest mean (M=3.57, SD=0.75), and verbally interpreted as Always with a qualitative description of Excellent Compliance. The indicator, “Using the non-contact thermometer, I check if my temperature is below 37.5 °C,”also got a high mean (M=3.54, SD=0.77), with a verbal interpretation of Always and a qualitative description of Excellent Compliance. While the indicator, “I use the treated foot bath that is placed on the entrance gate to disinfect my footwear,”although having the lowest mean (M=3.34, SD=0.99), is still verbally interpreted as Always with a qualitative description of Excellent Compliance. All three indicators acquired high results. This means that the respondents would thoroughly check themselves prior to entry and followed proper screening. Measures of prevention, protection, screening, isolation and distribution have been shown to be efficient in similar settings (Basile et al., 2021).

 

            On average, the compliance with the COVID-19 health protocols in terms of “Screening Prior to Entry” got the mean of M=3.31, SD=0.82 with a qualitative description of Excellent Compliance.

Mean and Standard Deviation on The Compliance with COVID-19 Health Protocols at St. Paul University Surigao

 

Table 8 presents the summary on the compliance with COVID-19 health protocols at St. Paul University Surigao

 

Table 8.

Summary on The Compliance with COVID-19 Health Protocols at St. Paul University Surigao

The Compliance with Covid-19 Health Protocols

Mean

SD

VI

QD

No Facemask, No Entry

3.64

0.71

A

EC

Physical Distancing

3.11

0.84

O

GC

Practice Respiratory Etiquette

3.34

0.76

A

EC

Hand washing and Hand disinfection

3.26

0.86

A

EC

Information dissemination

3.00

0.92

O

GC

Screening Prior to Entry

3.48

0.84

A

EC

General Average:

3.31

0.82

A

EC

Legend:

Scale

Range

Verbal Interpretation

Qualitative Description

4

3.25-4.00

Always (A)

Excellent Compliance (EC)

3

2.50-3.24

Often (O)

Good Compliance (GC)

2

1.75-2.49

Sometimes (S)

Average Compliance (AC)

1

1.00-1.74

Never (N)

Poor Compliance (PC)

 

            Based on Table 8, the respondents gave the highest overall rating on No Facemask, No Entry (M=3.64, SD=0.71), which is verbally interpreted as Always and qualitatively described as Excellent Compliance.

 

            Consecutively, the second-highest variable as evaluated by the respondents is Screening Prior to Entry with the mean of M=3.48, SD=0.84, and is verbally interpreted as Always with a qualitative description of Excellent Compliance.

 

            Lastly, Information Dissemination got the lowest average (M=3.00, SD=0.92), verbally interpreted as Often and qualitatively described as Good Compliance.

 

            In general, The Compliance with COVID-19 Health Protocols at St. Paul University Surigao got the overall mean of M=3.31, SD=0.82 and verbally interpreted as Always with a qualitative description of Excellent Compliance.


 

Significant Difference between The Compliance with COVID-19 Health Protocols at St. Paul University Surigao and the Occupation of the Participants

 

            The table below present the significant difference between The Compliance with COVID-19 Health Protocols at St. Paul University Surigao and the Occupation of the Participants.

 

Table 9.

Significant Difference on The Compliance with COVID-19 Health Protocols at St. Paul University Surigao and the Occupation of the Participants with respect to their Occupation

 

Dependent

Sum of Squares

df

Mean Square

F

p-value

Decision

No Facemask, No Entry

0.28

2

0.14

0.37

0.694

Do not reject Ho

Physical Distancing

4.47

2

2.23

5.71

0.004

Reject Ho

Practice Respiratory Etiquette

2.31

2

1.15

3.14

0.045

Reject Ho

Hand washing and Hand disinfection

5.30

2

2.65

7.18

0.001

Reject Ho

Information dissemination

9.13

2

4.57

8.63

0.000

Reject Ho

Screening Prior to Entry

2.63

2

1.31

2.69

0.069

Do not reject Ho

 

As to the significant difference between the occupation of the participants and the variables No Facemask, No Entry and Screening Prior to Entry, findings revealed that there is no significant difference between both variables (p-values=0.694 and 0.069, respectively). 

 

            However, as to the significant difference between the occupation of the participants and the variables Physical DistancingPractice Respiratory EtiquetteHand washing and Hand disinfectionInformation dissemination, findings revealed that there is significant difference between these variables (p-values=0.004, 0.045, 0.001, 0.000, respectively).

 

 

Findings

 

           Based on the analysis and interpretations done on the data gathered, the different findings in this study, based on each statement of the problems articulated, summarized as follows:

 

1.     As to the occupation of the participants, majority of the participants are students (328 or 86.54%).

 

          2. As to Compliance with COVID-19 Health Protocols at St. Paul University Surigao: 

                      2.1 No Facemask, No Entry is excellently complied with an average mean of 3.64, and I wear facemask upon entering the school premises is qualitatively described as Excellent Compliance (M=3.70, SD=0.68).

                      2.2 Physical Distancing had good compliance with an average mean of 3.11, and I follow the designated entrance and exit routes to minimize congestion is qualitatively described as Excellent Compliance (M=3.49, SD=0.76). 

 

                      2.3 Practice Respiratory Etiquette is excellently complied with an average mean of 3.34, and I cover my mouth and nose when coughing and sneezing using a tissue, handkerchief, or with my inner elbow is qualitatively described as Excellent Compliance (M=3.57, SD=0.74). 

 

                      2.4 Hand Washing and Hand Disinfection is excellently complied with an average mean of 3.26, and I use alcohol with 70% isopropyl or ethyl which are available in every classroom/office is qualitatively described as Excellent Compliance (M=3.63, SD=0.73).  

 

                      2.5 Information Dissemination had good compliance with an average mean of 3.00, and I follow the posters that are placed inside the campus to remind me of the following: Hand washing, Cough and sneeze etiquette, Proper disposal of waste, Physical distancing is qualitatively described as Excellent Compliance (M=3.36, SD=0.75). 

 

                      2.6 Screening Prior to Entry is excellently complied with an average mean of 3.48, and I check myself prior to going to school to ensure that I can enter the school premises is qualitatively described as Excellent Compliance (M=3.57, SD=0.75).

 

         3. There is no significant degree of variance in the compliance with COVID-19 health protocols in the occupation of the participants in terms of No Facemask, No Entry and Screening Prior to Entry (p-values=0.694 and 0.069, respectively). However, there is a significant degree of variance in the indicators Physical Distancing, Practice Respiratory Etiquette, Hand washing and Hand disinfection, Information dissemination (p-values=0.004, 0.045, 0.001, 0.000, respectively).

 

 

Conclusion

 

 

The conclusions that may be drawn from the study’s findings are as follows: 

 

            The study and interpretations of the data gathered, the majority of participants are students (86.54%), according to their occupation. Moreover, there is no significant degree of variance in the compliance with COVID-19 health protocols in the occupation of the participants in terms of No Facemask, No Entry and Screening Prior to Entry. However, there is a significant degree of variance in the indicators Physical Distancing, Practice Respiratory Etiquette, Hand washing and Hand disinfection, and Information dissemination. This suggests that health protocols are effective in maintaining clean facilities on campus, the administrator of St. Paul University Surigao may continue to use them as a health guideline.

 

 

 

 

 

 

Recommendations

 

 

1.     The school administration can continue to apply no facemask, no entry, practice respiratory etiquette, hand washing and hand disinfection and screening prior to entry as safety health protocols inside the facilities to be complied by the teachers, students and non – teaching staff. 

 

2.     However, the school administration may need to improve physical distancing and information dissemination as safety health protocols to be complied by the teachers, students and non – teaching staff.

 

3.     In terms of physical distancing, practice respiratory etiquette, hand washing and hand disinfection, and information dissemination, the school administration may develop different approaches to better cater the groups to further improve compliance to the health protocols.

 

4.     Future researchers could further examine the differences and group them according to their profiles, address the same research problem in a different setting, context or location. Future researchers of St. Paul University Surigao are encouraged to address the problem in this event and furthermore, look into finding ways to help mitigate the effects of COVID – 19 and improving the lives of everyone affected. The researchers also recommend conducting research that focuses on utilizing a convergent parallel design and incorporating natural observation. This research approach will provide valuable insights into the implementation and effectiveness of health protocols in promoting a safe and healthy environment for students, staff, and the wider school community.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

REFERENCES

Allegrante, J.P., Auld, M.E., Natarajan, S. (2020). Preventing covid 19 and its sequela:     “There             is no magic bullet… it’s just behavior” American Journal of   Preventive       Medicine.                    https://doi.org/10.1016/j.amepre.2020.05.004

Andersson, O., Campos-Mercade, P., Meier, A. N., & Wengström, E. (2021). Anticipation           of COVID-19 vaccines reduces willingness to socially distance. Journal of Health   Economics80, 102530. https://doi.org/10.1016/j.jhealeco.2021.102530

Backer, J., Mollema, L., Vos, E., Klinkenberg, D., Klis, F., Melker, H., Holf, S., Wallinga,

J. (2021). Impact of physical distancing measures against COVID-19 on contacts and mixing patterns: repeated cross-sectional surveys, the Netherlands, 2016 17,       April 2020 and June 2020. Eurosurveillance. https://www.eurosurveillance.org/content/10.2807/15607917.ES.2021.26.8.2000994?crawler=true#abstract_content

Bakar, N.A., Rosbi, S. (2020). Effect of coronavirus disease to tourism industry.   International    Journal of Advanced Engineering Research and Science.           https://ijaers.com/detail/effect-of-coronavirus-disease-covid-19-to-tourism            industry/

Banai, I., Banai, B., Mikloušić, I. (2021). Beliefs in COVID-19 conspiracy theories,          compliance with the preventive measures, and trust in government medical   officials. https://link.springer.com/article/10.1007/s12144-021-01898-y#Sec21

Breidablik, H., Lysebo, D., Johannessen, L., Skare, A., Andersen, J., Kleiven, O. (2020).

Effects             of hand disinfection with alcohol hand rub, ozonized water, or soap and water: time for   reconsideration? Science Direct. https://www.sciencedirect.com/science/article/pii/S0195670120301134

Cai, M., Lou, H., Meng, X., Cui, Y., Wang, W. (2022). Influence of information attributes           on information dissemination in public health emergencies. Humanities and Social Sciences Communications. https://www.nature.com/articles/s41599-022-01278-    2#Sec29

Cascella, M., Rajnik, M., Aleem, A., Dulebohn, S.C., Napoli, R.D. (2022). Features,         Evaluation, and Treatment of Coronavirus.            https://www.ncbi.nlm.nih.gov/books/NBK554776/

Chea, B., Bolt, A., Chaab, M., Dincer, I. (2021). Assessment of effectiveness of optimum   physical distancing phenomena for COVID-19. AIP Publishing LLC.         https://aip.scitation.org/doi/full/10.1063/5.0046429

Christian, A.C.S., Sa’id, M. (2021). Public obedience to health protocols during covid-19 pandemic in Indonesia: A perspective from health belief model theory. Journal of        Social Sciences and Humanities.ojs.pnb.ac.id/index.php/SOSHUM/

Chu, D., Akl, A., Duda, S., Solo, K., Yaacoub, S., Schunemann, H. (2020). Physical

distancing, face masks, and eye protection to prevent person-to-person transmission of SARS-CoV-2 and COVID-19: a systematic review and meta-        analysis. Science Direct. https://www.sciencedirect.com/science/article/pii/S0140673620311429#cesec10

Chiodni, J. (2020). Good Practice Guidance for Providing a Travel Health Service.          National Library of Medicine.             https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7679228/

Chavez, S., Long, B., Koyfman, A., Liang, S. (2021).Coronavirus Disease (COVID-19): A 

primer for emergency physicians. Science Direct. https://www.sciencedirect.com/science/article/pii/S0735675720301789

Cirrincione, L., Plescia, F., Ledda, C., Rapisardo, V., Martorana, D., Lacca, G., Argo, A.,             Zerbo, S., Vitale, E., Vinnikov, D., Cannizzaro, E. (2022). Covid 19 pandemic:          New    prevention and protection measure. https://www.mdpi.com/2071    1050/14/8/4766

Claresta, A., Christian, S. (2021). Public Obedience to Health Protocols during Covid-19 

Pandemic in Indonesia: A Perspective from Health Belief Model Theory. Soshum: Jurnal Sosial dan Humaniora. https://ojs.pnb.ac.id/index.php/SOSHUM/article/view/2549

Coronavirus & COVID-19: Glossary of Terms | UVA Health. (n.d). UVA Health. Retrieved         April 22, 2022, from                                                               https://uvahealth.com/services/covid19-glossary#:%7E:text=The    %20coronavirus          %20that           %20causes%20COVID,acute%20respiratory%20syndrome          %20coronavirus                      %202.&text=The%20name%20of%20the%20illness,for      %20%22coronavirus%20disease           %202019.%E2%80%9D

Dadras, O., Alinaghi, S., Karimi, A., Mohsseni, M., Barzegary, A., Vahedi, F., Pashaei, 

Z., Mirzapour, P., Fakhfouri, A., Zargari, G., Saeidi, S., Mojdeganlou, H., Badri, H., Qaderi, K., Behnezhad, Mehraeen, E. (2021). Effects of COVID-19 prevention procedures on other common infections: a systematic review. European Journal of Medical Research. https://eurjmedres.biomedcentral.com/articles/10.1186/s40001-021-00539-1

Daniel, D., Kurniawan, A., Pinawati, A., Thohira, M., Annaduzzaman, M. (2022). The     COVID-19 health protocol among university students: Case studies in thress cities    in Indonesia. International Journal of Environmental Research and Public Health.             https://doi.org/10.3390/ijerph191710630

Department of Health. (2021). The new normal for health.

            https://doh.gov.ph/sites/default/files/publications/The-New-Normal-for-Health.pdf

Deviante, R., Michael, T. (2021). Accountability of mosque administrators against            violation of Covid-19 health protocols in the mosque environment. International     Journal            of Research in Business and Social Science. https://ssbfnet.com/ojs/index.php/ijrbs/article/view/1050

Edet, C., Harry, A., Wegbom, A., Raimi, O., Fagbamigbe, A., Kiri, V. (2020). Face Mask 

Utilization in the Era of COVID-19: Nigeria Experience. Research Square. https://assets.researchsquare.com/files/rs-103515/v1/61079b39-e6e0-48ed-bac5-6fdc55311762.pdf?c=1631860114

Eikenberry, S., Mancuso, M., Iboi, E., Eikenberry, K., Kuang, Y., Kostelich, E., Gumel, 

A.        (2020). To mask or not to mask: Modeling the potential for face mask use by the general public to curtail the COVID-19 pandemic. Science Direct. https://www.sciencedirect.com/science/article/pii/S2468042720300117

Fadda, M., Albanese, E., Suggs, L. (2020). When a COVID-19 vaccine is ready, will we   all be   ready for it? Springer Link.             https://link.springer.com/article/10.1007/s00038-020-          01404-4

Jones, N., Qureshi, Z., Temple, R., Larwood, J., Greenhalgh, T., Bourouiba, L. (2020). 

Two metres or one: what is the evidence for physical distancing in covid-19? BMJ Publishing Group Ltd. https://www.bmj.com/content/370/bmj.m3223

Lathifa, A., Kamalia, F., Putra, F., Nuryanti, L. (2021). Student Compliance in Doing       Health             Protocols during the Covid-19 Pandemic. Proceding of Inter-Islamic      University       Conference on Psychology.    https://press.umsida.ac.id/index.php/iiucp/article/view/598

Liang, M., Gao, L., Cheng, C., Zhou, Q., Uy, J., Heiner, K., Sun, C. (2020). Efficacy of 

face mask in preventing respiratory virus transmission: A systematic review and meta analysis. Science Direct. https://www.sciencedirect.com/science/article/pii/S1477893920302301#sec5

Liao, M., Liu, H., Wang, X., Hu, X., Huang, Y., Liu, X., Brenan, K., Mecha, J., Nirmalan,           M., Lu, J. (2021). A technical review of face mask wearing in preventing   respiratory COVID-19 transmission. Science Direct.             https://www.sciencedirect.com/science/article/pii/S1359029421000017#coi0010

Ma, R., Deng, Z., Wu, M. (2020). Effects of Health Information Dissemination on User    Follows and Likes during COVID-19 Outbreak in China: Data and Content       Analysis. International Journal of Environmental Research and Public Health.        https://www.mdpi.com/1660-4601/17/14/5081

Marano, N. (2020). Considerations for Health Screening for COVID-19 at Points of         Entry. Journal of Travel Medicine. https://www.cdc.gov/coronavirus/2019-        ncov/downloads/global-covid-19/Point-of-Entry-Screening-for-COVID-19.pdf

Nsawotebba, A., Ibanda, I., Ssewanyana, I., Ogwok, P., Ocen, F., Okiira, C., Kagirita, A., 

Mujuni, D., Tugumisirize, D., Kabugo, J., Nyombi, A., Majwala, R., Bagaya, B.,…, Nabadda, S. (2021). Effectiveness of thermal screening in detection of COVID-19 among truck drivers at Mutukula Land Point of Entry, Uganda. PLOS Org. https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0251150#sec018

Offei, M., Salifu, Y., Adewale, B., Bayuo, J., Puko, R., Lokko, E. (2021). A rapid review of the               use of face mask in preventing the spread of COVID-19. Science Direct.            https://www.sciencedirect.com/science/article/pii/S2666142X20300126

Patel, D., Desai, R., Parmar, J., Ramavat, M. (2020). A cross-sectional study regarding 

respiratory etiquette and stress during novel coronavirus pandemic. National Journal of Physiology, Pharmacy and Pharmacology. http://www.njppp.com/fulltext/28-1597733221.pdf

Pelatihan, B., Cikarang, K. (2020). Implementation of health protocols in PUSKESMAS   offices in pandemic. MONAS Jurnal Inovasi Aparatur. https://ejournal-          bpsdm.jakarta.go.id/index.php/monas/article/view/52

Roy, A., Parida, S., Bhatia, V. (2020). Role of disinfection and hand hygiene: a COVID-19 

perspective. International Journal of Community Medicine and Public Health. https://www.researchgate.net/profile/Swayam-Parida/publication/342505016_Role_of_disinfection_and_hand_hygiene_a_COVID-19_perspective/links/5f268487458515b729fb4dbe/Role-of-disinfection-and-hand-hygiene-a-COVID-19-perspective.pdf

Sarmiento, P., Sarmiento, C., Tolentino, R. (2021). Face-to-face classes during COVID-

19: a    call for deliberate and well-planned school health protocols in the Philippine context. Journal of Public Health. https://academic.oup.com/jpubhealth/article/43/2/e305/6130168

Taylor, C. (2020). Information Dissemination. Cyberhoot. 

https://cyberhoot.com/cybrary/dissemination-of-information/

Teslya, A. (2022, November 19). The importance of sustained compliance with physical   distancing during COVID-19 vaccination rollout. Nature.            https://www.nature.com/articles/s43856-022-00207-3

Villar, T., Chorda, V., Gascch, A., Tudela, D. (2018). Cooperative Learning and Hand 

Disinfection in Nursing Students. Scielo Organization. http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S0120-53072018000200009

Virginia Department of Health (VDN). (2021). Respiratory Hygiene and Cough Etiquette.

https://www.vdh.virginia.gov/content/uploads/sites/3/2016/01/RespiratoryHygieneCoughEtiquette_FAQ.pdf

 

 

 

 

 

 


 

<

p align=”center” class=”MsoNormal” style=”font-size: medium;text-align: center”> 

Dr B R Ambedkar’s Social Philosophy and Humanism

 Dr. M Govindaraju

Assistant Professor

Department of Philosophy

Bangalore University, Bengaluru-560056.

Abstract 

This paper attempts to analyze some of the important issues of humanism and social philosophy raised by Dr. B. R. Ambedkar. The study of philosophy, as a world outlook, includes the entire existence, the being in its totality. There are two main areas of philosophy: epistemology and metaphysics. “Epistemology is the theory of knowledge. An important province of philosophical theory, the doctrine on man’s ability to cognize reality, on the sources, forms, and methods of the truth and ways of attaining it”. Metaphysics studies the highest principles of all that exists, which are inaccessible to the senses. Comprehensible only to speculative reason and indispensable to all sciences.

Keywords: Social Philosophy, Epistemology, philosophical theory and Dr.B.R. Ambedkar

Introduction 

Is Dr. Ambedkar’s philosophy restricted to epistemology and metaphysics? Sincerely, this does not correspond to what the great Indian and Western philosophers were generally confined to, and as a consequence, their speculative reasoning extended beyond human concerns of immediate nature. Dr. Ambedkar was personally involved in a human scenario in which he and his community, India’s dejected and disturbed people, were reduced to the ashes of graveyards; they were almost non-entities as human beings in their own country. Could he then afford to limit his studies to epistemology and metaphysics alone? 

Dr. Ambedkar has recognized the human faculties of sense and reason as the main sources of knowledge, and his metaphysical position is obviously non-theistic because he does not indulge in the question of ‘Ayyaktani’ nature as one finds in the tradition of Buddha’s philosophy and religion. Dr. Ambedkar has made his position very clear regarding the questions of the immortal soul, God, Karma, Rebirth, transmigration, etc. The proper study of mankind is the main theme of his philosophy; that is, his analysis is confined to man’s relation to society, wherein ethics and religion play a very significant role.

Philosophical views about man by Dr. Ambedkar. In today’s human scenario, society and politics are intertwined. Dr. Ambedkar’s humanism ideology is a result of the scenario that existed in India previous to and after his birth on April 14th, 1891. Let us now go further into his social and humanitarian ideas.

The social philosophy

The focus of social philosophy is on “the social unity of mankind, and seeks to interpret the significance of the special aspects of human life in relation to that unity.” A social philosophy stands for a correct knowledge of human connections and encompasses the ideas that bring people together in their minds and hearts. It indicates that social philosophy is the philosophical justification of value and position in relation to humanity’s oneness. It takes into account the current information at the same time. Suggests beliefs and values that can bring people together for a similar goal. That is why Dr. Ambedkar examined and analyzed not only the current structural and functional components of Indian society, particularly Hindu society. 

“Negatively, Ambedkar rejects the Hindu social philosophy propounded in the Bhagavad-Gita, which is based on the Triguna of Sankhya philosophy and which, in his opinion, is a cruel perversion of Kapil’s philosophy and has made the caste system and the system of graded equality the Law of Hindu Social Life.” Dr. Ambedkar says it at the same time. Positively, Ambedkar’s social philosophy can be summed up in three words: “Liberty, Equality, and Fraternity.” Clearly, Dr. Ambedkar’s social philosophy is based on the “values of justice, liberty, equality, and fraternity,” and he desired for future institutions to be built in the direction of such a social system.

Ethical standard

When the three principles of Liberty, Equality, and Fraternity are combined, they establish an esthetical standard, or esthetical norm, against which we can judge what an individual does, what a community believes, and what a nation aspires. “Every man should have a life philosophy, because everyone needs a standard against which to measure his behavior.” And philosophy is nothing more than a measuring stick.” 

According to Dr. Ambedkar, the same ethical criteria can be used to assess the nature of a nation. If a nation is founded on authoritarianism and tyranny and is constantly dominated by a group of people or a single family member, as we have seen in India, it cannot allow for the development and flourishing of a free society, and hence it is not a democratic nation. A decent nation has a constitution that incorporates the ideas of justice, liberty, equality, and fraternity and aspires for its citizens to establish an egalitarian society. From this perspective, Dr. Ambedkar’s societal philosophy is nothing more than an ethical norm or standard against which to assess the behavior of an individual and the institutions of society.

Dr. Ambedkar, as he has previously said, rejects Hindu social philosophy because it does not meet his ethical standards. His ethical standard teaches and upholds the ideas of liberty and equality, whereas the Hindu social ideal does not only deny them in theory but also in fact. The Hindu social ideology also contradicts the Indian Constitution, which supports a life of justice, liberty, equality, and fraternity. The caste system is effectively a denial of all social and political objectives as stated and visualized in the Indian Constitution.

Though liberty and equality have an important role in Dr. Ambedkar’s social and political design, he believes that unrestricted liberty destroys the actual sense of equality and that total equality leaves no room for liberty. Only a correct balance of liberty and equality can benefit both the individual and society. Dr. Ambedkar has emphasized the need for liberty to establish a foundation for equality and equality to defend liberty; both must be woven together for the benefit of society’s most vulnerable members.

Law and morality

Dr. Ambedkar’s conception of social existence The law also plays an important role, but only as a safeguard against violations of liberty and equality. He did not believe that the rule of law could protect against violations of liberty and equality. He elevated fraternity to the highest level as the only real shield against the denial of liberty and equality. Fraternity is another term for men’s social fraternity and spiritual oneness. Religion is yet another label for metaphysical speculation. “Law is secular,” he explained.

Morality, specifically social brotherhood of men, has been given a prominent role in Dr. Ambedkar’s plan of social relations in order to bring men together. The law is vital, but it has taken a back seat. Law, on the other hand, is a required institution, a state liberty, to defend man against injustice, tyranny, exploitation, and suppression. Law is intended to regulate a minority of people only when there are disagreements and disturbances among them, whereas morality binds a majority of people in both peaceful and turbulent times. Most people in rural villages in India or in the interiors of our society are unaware of the law and how it might aid them on numerous occasions, yet they are just as excellent. They appear to be more submissive to state laws than those who enact laws and are well-versed in the role of law. “Man does not have to be moral in order to please God.” Man must love himself for his own good.”

Dr. Ambedkar’s social and ethical theory encourages people to organize themselves on the basis of liberty, equality, and fraternity, and only in this way can they be liberated from superstitution, fanaticism, dogmatism, ritualism, caste, varna, untouchability, and so on. Ambedkar highlighted that every individual must have liberty in all legitimate ways with his or her co-religionists, and that every citizen’s fellow being in a community must be treated with equal respect and dignity insofar as they are common citizens.  Much as they are common citizens of a nation, fellow beings in a society must be treated with equal respect and dignity. A ‘shared code of conduct’ should be developed by the people who live in a specific culture and nation. If they are allowed to marry among themselves, dine together, and work together in all aspects of life, they will become a united people with the strength and strategy to grow with energy and vitality in the direction of pace and progress. Common rules of conduct would also limit the spread of group moralities and pave the path for a more peaceful existence for all members of society. They would be able to promote justice and peace, and therefore establish social and spiritual connection among themselves.

 

The good life

The nature of good life is inherent in the unity and harmony- internal and external, as Dr. Ambedkar imagined it. Harmony is the correct means of inspiring a man to live a happy life. A variety of intellectuals and philosophers have attempted to explain the essence of the happy life in various ways. According to Dr. Ambedkar, the good life is one devoted to the protection and promotion of the ideals of liberty, equality, and fraternity in order to disseminate education and enlightenment among the people. Karuna and Maitri (love and fraternity) encourage such a life, which is guided by proper understanding, i.e. Pragya. 

Lord Buddha’s teachings have influenced the entire concept of living a good life. If the good life is to be sustained, it requires knowledge, kindness, and courage. It need love, faith, inspiration, and logic. It also necessitates a courageous view, a broad intellect, and an open heart, rather than a rigid and dead system of human relations, old or modern.

Dr. Ambedkar’s concept of the good life necessitates an endless number of favorable social conditions. It also requires a favorable political and economic position in society, but it cannot be realized without individual and social obligations that fellow citizens must meet. To live a happy life–a true life of liberty, equality, and fraternity–a man must have a good education, cooperation, a suitable income, friends, and other civic amenities. All of these things are dependent, to varied degrees, on the social and spiritual unity of a community’s members, and they may also be aided by political institutions such as law and state. The state can offer a legal framework for a broad peaceful environment in which all citizens can exercise their rights and responsibilities. In other words, the good life can be enjoyed in a just and peaceful community devoid of any caste and creed problems. A democratic state is also a great tool for creating favorable conditions for its citizens. 

A true religion, such as Lord Buddha’s, can assist people in achieving and maintaining the texture of a happy life. All the ingredients of a good life, according to Dr. Ambedkar, are contained in the teachings of Lord Buddha, the Compassionate One, and true to his world, the learned Doctor decided and declared: “Buddhism is a true religion and lead a life guided by three principles of knowledge, right path, and compassion.” Pragya (understanding as opposed to superstition and supernaturalism), Karuna (love), and Samta (equality) are all taught in Buddhism. This is what man desires in order to live a decent and happy life.

 

Social responsibility

Theistic charm, i.e. hope for betterment by divine grace, which is extremely natural in Hinduism, Islam, and Christianity, has no place in Dr. Ambedkar’s philosophical, ethical, and religious concepts. In the current circumstances, his dedication to a secular perspective of society within a humanist framework is the most relevant principle. Man bears sole responsibility for his or her own social and economic well-being as a result of Ambedkar’s conviction in fraternity, what man chooses he chooses for everyone, and in fashioning himself, he designs not only his own being, but also the beings of others in society. The basis of Dr. Ambedkar’s social and ethical philosophy is man’s responsibility to fulfil individual and social commitments. Responsibility is more important than anything else in sustaining correct relations between man and man.

Dr. Ambedkar believed in the bright future of mankind because he had an unwavering confidence in man’s social obligation as a result of his strong conviction in empirical man. Noble was his goal, sublime and wonderful was his purpose in the service of humanity’s forgotten people. He restored human rights that are needed for a good and happy life to all depressed classes and poorer sectors of Indian society. Ambedkar also underlined the importance of corresponding tasks for members of society in order to promote peace in human connections. 

The inspiring base

Humanism serves as the foundation for all of Dr. Ambedkar’s philosophical, ethical, and religious views because it was this empirically-based individual who lived in society and was the proper subject of his research. His philosophy was based on the fundamental tenet that “the true measure of man is worth, not birth”—that is, that “man is the measure of all things.” The Mahakarunika received a profound and majestic revelation of the harmony between man and society based on the ideals of liberty, equality, and fraternity through the Lord Buddha. Everyone must agree with his humanist viewpoint because it is so natural and essential. His thought developed out of social and economic need based on humanism, and his strategy included peace, consent, and persuasion. By virtue of law, morality, and religion, Dr. Ambedkar was destined to struggle for a change in social and political life. The worried men have undoubtedly understood that, and they will continue to understand it till the miserable people are unified and social at their own feet. They must see the need for a philosophy or religion that could unify them in opposition to the pervasive manifestations of casteism and untouchability.

Dr. Ambedkar’s unwavering relationship with the oppressed, the lowly, and the destitute, among whom he was born, was the source of his confidence. His humanistic philosophy was inspired by the unhappy people. He was certain that Hinduism did not pass “the test of social utility or the test of individual justice” because he had personally experienced the pains, sorrows, and suffering of being an untouchable, the lowest man in Hindu society. Dr. Ambedkar meticulously studied Indian history before coming to his own understanding of the message and purpose rooted in humanism and Buddhism. His main objective was to increase the social and political awareness of their human rights among the lower classes. He wanted them to prepare themselves for a “social revolution” and spiritual enlightenment through education. Education alone could create a sense of new thinking among the depressed classed for organization and agitation.

Dr. Ambedkar’s social, ethical, and educational worldview always attempted to lift depressed people’s eyes toward unity and emancipation via education and religion, and to engage their minds and understanding to transform their thoughts and old behavioral patterns. In other words, Dr. Ambedkar wanted his philosophy to be the driving force behind both the expansion of human mental capacities and the emergence of social life. He was not content with simply having a new philosophical purpose. Dr. Ambedkar was not only a couch potato; he was a unique individual who devoted his entire life to the service and emancipation of the oppressed as well as the nation. The service of suffering people, of the heart, the strength of the mind, and the reason of the just conscience for the interest of the many, for the happiness of the many—that is, “bahujan hitaya bahugan sukhaya”—can be said with confidence of everything he fought for, cooperated with, revolted against, and contributed to. In a nutshell, one can only do it if they adhere to the Buddha’s teachings.

Conclusions 

The following are some examples of Dr. Ambedkar’s humanism philosophy from a social, ethical, and religious standpoint:

1.      Philosophy engages in epistemological and metaphysical hypotheses because it serves as a yardstick for judging human behavior. 

2.     Since they meet the secular requirements of fairness and utility, social and ethical aspects of life are more pertinent to a man who lives in society.

3.     The trinity principle of liberty, equality, and fraternity upholds social and ethical philosophy and serves as a moral yardstick for judging the morality and character of individuals.

4.     Although morality, as a close ally of fraternity, is more significant than law in governing interpersonal relationships in general, both are the pillars of human society.

5.     Because the concepts of a permanent soul and God are philosophical conjectures, morality is not only a way of living, but also the law of human life.

6.     The good life is that which protects principles of liberty, equality and fraternity and promotes the values of karuna (love), maitri (brotherhood) and pragya (understanding).

7.     The importance of societal and individual responsibility cannot be overstated; it develops from the fraternal relationship between men and keeps responsible men healthy and content while also helping others.

8.     Philosophical, ethical, and religious concepts must be based in humanism and Buddhism, and the circumstance in which people are compelled to live and behave without conscience and reason must serve as the motivation for all of this.

9.     The best way to inspire people’s social consciousness and bring about the highest ideals of intelligence and human togetherness is through humanist education.

10.  The centre of religion is man in relation to man, not animal sacrifice, superstition, or the immortal soul. Religion is vital for a free society, spiritual harmony, and progress. include God.

11.  The primary goals of morality and religion are to rebuild and make the world happier, and this is only achievable thanks to Lord Buddha’s teachings, according to which all people are created equally and are valued according to their intrinsic worth.

         To summarize Dr. Ambedkar’s humanism philosophy, we may say that the ideas he upheld are still important, motivating, and relevant for all oppressed people around the world as well as the Dalit’s of India. He persuaded the Indians that they must stop erecting walls of exclusivity and inequality around them and instead become more open, tolerant, and inclusive if they are to achieve peace and harmony. He did not accept man-made inequalities of an unethical character.  According to Dr. Ambedkar’s, human society will change when we change, both internally and outside, especially when it comes to those who resist the modernization of Indian culture. The philosophy of the leader of the oppressed serves this purpose even today to bring the people together for the transformation of our social and economic life. The wise person must uphold the dignity of human life and its legal rights, and they must work passionately for social justice and spiritual unity. However, he advised the oppressed people to keep up their resistance to the forces of exploitation and oppression rather than repaying injustice with more injustice or even to be cooperative and obedient to either injustice or inequity. In reality, Dr. Ambedkar’s wanted youngsters to get ready to contribute to reshaping society in line with the principles and rules outlined in the Indian Constitution as well as his philosophy of the Nine Gems. It is our best chance at surviving the future, escaping the tragedies of the past, and improving the world for people now.

  

Bibliography

1.     Buddharakkhit: The Buddha and his Dhamma Venerable Acharya (Buddhavacham Trust Maha Bodhi society Bangalore India) 2005, Vol. I & II, 1-PP, Bangalore 2005, India.

2.     Dr.Jatava Dr. Ambedkar and Humanise, ABD, Publishers 1999, Jaipur, India.

3.     Kuber W.N: Dr. Ambedkar A Critical Studies, People’s publishing house,1979- New Delhi.

4.     Rodrigues Valerian: Dr. Ambedkar A Critical Studies, People’s publishing house,1979- New Delhi.

5.     Naik C.D: The Essential Writings of B.R Ambedkar Published Oxford University Press,2003. New Delhi: Thoughts and Philosophy of Dr. Ambedkar’s, Published Sarups Sons 2003, New Delhi.

6.     A History of Japanese Religion, edited by KAZAUO Kasahara.

7.     Samvada (Kannada); Dr. Nataraj Huliyar (Ed.) Monthly Magazine, June 2006.

8.     SHAPES of Japanese Buddhism edited Yuren Kasharo, Koyu Sonoda.   

 

 

A Research to Study Concerns Regarding the Security of Cloud Computing

  

 

Sairam Madasu

8347 Sandstone Crest Lane, Indian Land, South Carolina 29707

Email: Rammadasu5@gmail.com



Abstract — 

Concerning the safety of data stored in the cloud is the focus of this article.   The most recent advancements in computing have caused a sea shift in how people see the architecture and development of IT systems.   As the dangers and threats to sensitive information continue to grow, this article will discuss the many methods now in use throughout the world to keep it safe. In addition, the concept of an encryption/decryption algorithm-based, simple, safe, and privacy-preserving system for inter-cloud data exchange against unauthorised access is presented. Since we are storing the data on the Third Party CloudService, and the CloudComputing Providers/Data owner pose the greatest security risk, encryption of the data in the cloud is essential. As a result, it is in everyone’s best interest for the consumer to encrypt the data before sending it to a third-party service provider like a host. The RSA algorithm, built on the Prime Factorization approach and the Extended Euclidean Theorem, is the focus of this study.With RSA encryption, we’ve reduced the risk of a phishing attempt or other intrusion.

 

Keywords — Artificial Intelligence, Automotive Industry, Technology, Machine Learning, Cybersecurity.

                                                                                                                                                           I.        Introduction

The concept of cloud computing is relatively new, and many companies are hesitant to adopt it because they are concerned about the safety of their data when it is stored on the cloud and managed by a third party.  One of the most straightforward definitions of cloud computing is “the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.” This is one of the various definitions of cloud computing that are currently accessible.[1] Cloud computing is utilized increasingly as a service since it hosts the data of individuals on their own resources, therefore minimizing the cost of infrastructure and offering protection for the data of end users. Cloud computing has a number of benefits and advantages, but one of the most significant concerns is about the data security, data integrity, and data maintenance. It is of the utmost importance for cloud service providers to use multiple mechanisms and algorithms that encrypt the data, depending to the kind of data, in order to guarantee the data’s safety.[2]

                                                                                                                                                               II.       Objective

The research aimed to fulfill the following objectives:

·      To study concerns regarding the security of cloud computing

·      How secure are the providers of cloud services?

·      Discussions and result

 


                                                                                                                                                        III.      Methodology

One   of   the   most   common   and

important question often be in the mind of

the organization that to store the data on a

third   party cloud   service   provider or   to

make   and   internal   organization   cloud.

Many a times the data is at most sensitive

like Army   Nuclear   Codes   or   the   Future

Plan   of the   Government etc.   So, storing

these types of data on Third party cloud are

risky business, so it is recommended that to

make an internal cloud storage. 

The   paper   is   about   the   data

security techniques   used for   securing the

data on cloud, through   Encryption   of the

data with the help of powerful Algorithm

and   also, it   discusses   the   potential   threat

and the solution for the same

One   of   the   most   common   and

important question often be in the mind of

the organization that to store the data on a

third   party cloud   service   provider or   to

make   and   internal   organization   cloud.

Many a times the data is at most sensitive

like Army   Nuclear   Codes   or   the   Future

Plan   of the   Government etc.   So, storing

these types of data on Third party cloud are

risky business, so it is recommended that to

make an internal cloud storage. 

The   paper   is   about   the   data

security techniques   used for   securing the

data on cloud, through   Encryption   of the

data with the help of powerful Algorithm

and   also, it   discusses   the   potential   threat

and the solution for the same

The topic of whether an organisation should build their own internal cloud infrastructure or store their data with a third-party cloud service provider is one of the most typical and essential questions that arises inside an organisation. There are several instances in which the data is at its most sensitive, such as Army Nuclear Codes or the Future Plan of the Government, etc.   Therefore, keeping this kind of data on a cloud service provided by a third party is a dangerous business move; therefore, it is recommended that an internal cloud storage be created. The article examines the data security approaches that are utilised for safeguarding the data on cloud by encryption of the data with the assistance of sophisticated algorithms. Additionally, the paper addresses the possible danger as well as the remedy for the same.

                                                                                                      IV.      How secure are the providers of cloud services?

There is a rising need for cloud computing that is able to guard against security attacks that are becoming more complex. To meet this problem, vendors of cloud services will need to change their practices. When it comes to convincing consumers that their data is secure, having the most recent security certifications, in particular ISO 27001 and Cyber Essentials Plus, is very necessary. [3] Governments and other regulatory organizations impose a myriad of legal obligations on firms that keep data, including the necessity that these organizations have data protection officers and submit to compliance audits conducted by a third party.

 

If a firm does to perform these requirements, the company may be subject to hefty penalties or perhaps experience a loss of business. Vendors, such as Amazon Web Services and Microsoft Azure, subject their data security to regular assessments and updates in order to pinpoint any vulnerable places in their infrastructure and guarantee that their service is adequately secured.[4]

 

Methods for Reducing Dangers to Data in the Cloud

 

Backup of Data

It is essential that businesses back up their data in case their cloud service goes down. The strongest security against technical problems and ransomware assaults is regular data backups. Without this safeguard, it is risky to transfer data from physical to cloud storage. If you want to protect your data from being lost in the case of a natural disaster, hacker attack, or physical disaster, you should back it up in more than one place.

 

Analyze Existing Cloud Settings

Businesses may optimize their use of cloud services by conducting periodic configuration reviews. Businesses that rely on a single service are at danger of vendor lock-in since it is difficult to migrate their data to a new provider. Spreading data storage out over several locations or suppliers may assist protect against this, ensuring that no data or services are lost in the case of an assault on a single location. Misconfigured cloud services, however, pose a threat to data security and must be checked often.

 

Testing for Infiltration

One of the biggest concerns about cloud storage is the possibility of cyber assaults. When vulnerabilities in online applications are discovered by penetration testing, they may be patched up before they are exploited. Companies can prevent vulnerabilities from being exploited by simulating cyber-attacks.

 

Authentication using Multiple Factors

One of the most important aspects of cloud computing security is limiting access to just authorized users. Unauthorized users are unable to access cloud services thanks to two-factor authentication’s access limitations. The security of data is maintained without affecting the user experience when a password is combined with another factor, such as a one-time code.

 

Staff Development

Businesses should have procedures in place to avoid the deletion of data by mistake. Employees should get enough training on how to use the cloud to prevent inadvertent harm. Regular reviews of user rights and network-based monitoring of employee access to information may assist reduce the risk of insider attacks.[5]

 

Data Security: An Integral Aspect of Cloud Computing | Cuelogic

FIGURE 1. CLOUD SECURITY

                                                                                                                                             V.       Discussions and result

In the encrypting the data using the RSA algorithm in order to offer data security on the cloud and ensure that only those who are concerned will have access to the data. The RSA algorithm is a block cypher that encrypts every message and maps each encrypted message to an integer.   It includes both the public key and the private key, both of which are used in the encryption and decryption processes of the data, respectively. In this particular technique, the public key is accessible to anybody, but the Private key is only known to the individual who owns the material. The client or the Cloud service provider is responsible for carrying out the decryption process once the encryption procedure has been completed. The encryption procedure may be carried out by either party.   After the data have been encrypted using the public key, we will be able to decrypt them using the corresponding Private key as soon as the encryption process has been completed. The protection of one’s privacy and the secrecy of one’s data are at the forefront of every customer who stores their information in the cloud. After the data has been uploaded, there should be a guarantee that no one else, not even the Service Provider, can access or know anything about the data.  Therefore, the client themselves may upload the data once it has been encrypted, which decreases the risk of data loss since only the customer knows the private key for the specific public key.[6]

                                                                                     VI.      CONCERNS REGARDING THE SECURITY OF CLOUD COMPUTING

The research will explore the primary challenge that necessitates the implementation of data security, despite the fact that there are several security risks associated with the act of storing data on the cloud.

 

A. The term “Data Integrity” refers to the fact that any time one user accesses, deletes, or reformats the contents of a file, that change should be reflected across all of the users who have permission to view that specific file. This concept is known as “Multitenancy,” and it applies to businesses that use cloud computing to store their information and therefore have a large number of employees and departments.   When numerous users try to access shared data at the same time, the system may sometimes crash. If a hacker knows certain Alteration Codes, they may be able to access the data while the system is down. Multitenancy may be an unusually unsafe practice because of this. Verifying the user before to making use of the data is one way to prevent an issue of this kind from occurring. In order to circumvent problems associated with multitenancy, cloud computing makes use of a number of different approaches.

 

B.  In virtualization, a copy of a fully operational operating system is created inside another operating system so that it may share the resources of the original operating system.   When installing a guest operating system on a host system as a virtual machine, the component known as a hypervisor is required. The shared operating system computer is at its most susceptible when it is being used with the Hypervisor; if the hypervisor is hacked, then the data will also be jeopardized. 

 

C.  The data may be in the form of a file that is stored on the cloud and may be requested for use at some other site while it is in transit. This occurs while the data is being uploaded or downloaded onto or out of the cloud, respectively. Since those who eavesdrop on the data and have the capacity to edit or alter it while it is being sent are a greater threat to the data while it is in transit than to the data while it is at rest, the only way to ensure the safety of the data is to encrypt it.[7]

 

How to Ensure Data Security in Cloud Computing - IndustryWired

FIGURE 2: – CLOUD SECURITY 

 

CONCLUSION

Cloud computing offers several advantages, including the ability to help businesses simplify their processes and reduce the expense of maintaining physical safe data storage. Due to the ever-present risk of data breaches, it is vital to take into account the potential security risks that are connected with keeping data in the cloud. A corporation may face far-reaching repercussions as a result of the theft or loss of sensitive information. However, the dangers to data security posed by cloud computing may be reduced by implementing the appropriate preventative measures. Protecting sensitive data with numerous backups and verifying that cloud service providers are in conformity with relevant regulations are two procedures that absolutely cannot be skipped. It is possible to cut down on the likelihood of a data leak by doing regular penetration tests on the cloud and providing employees with adequate training. Companies are able to securely store their data in the cloud and take advantage of the numerous advantages offered by this game-changing technology if they first have an awareness of the security concerns associated with cloud computing and then adopt the right security procedures. 

          
    References

[1]Patil Madhubala R., “Survey on security concerns in cloud computing,” 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015. doi:10.1109/icgciot.2015.7380697 

[2]Patil Madhubala R., “Survey on security concerns in cloud computing,” 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015. doi:10.1109/icgciot.2015.7380697 

[3] “An overview of cloud computing security concerns,” International Research Journal of Modernization in Engineering Technology and Science, 2023. doi:10.56726/irjmets33230 

[4] Figure 6.3 security and privacy concerns kept individuals from using cloud computing, 2014. doi:10.1787/888933586369 

[5] G. K. Shyam and M. A. Ansari, “Security concerns in cloud computing,” International Journal of Trend in Scientific Research and Development, vol. Volume-2, no. Issue-5, pp. 2296–2301, 2018. doi:10.31142/ijtsrd18306 

[6] S. Pal, “Cloud computing,” Cloud Computing Service and Deployment Models, pp. 191–207. doi:10.4018/978-1-4666-2187-9.ch010 

[7] “A review on security concerns in cloud computing,” International Journal of Science and Research (IJSR), vol. 5, no. 3, pp. 871–874, 2016. doi:10.21275/v5i3.nov161993

 

 

 

 

 

 

 

Stormwater Modelling Within Three Catchments Using MIDUSS V2.25: Real Time Simulation Model To analyze stormwater within catchments

Isaac Odoi Danquah

diok1982@yahoo.com

Water Resources Engineer, Goldrain Mountain Company Limited, Koforidua – Eastern Region, Ghana.

ABSTRACT

Runoff generation within a catchment area is dependent on stormwater generated and overland flow after a precipitation for a given duration. Modelling using water resources engineering softwares becomes very import as one sorts for data, model and simulate into the future. This is able to give real time result after good work for future prediction and forecasting. This is the reason for this research work and the use of MIDUSS version 2.25 to model stormwater within three catchments. The 100min rainfall gave the maximum rainfall intensity to be 113.686mm/hr. This generated a runoff volume for pervious and impervious surface to be 268.92m3 and 239.17m3 respectively. Values of 9.606mm and 34.168mm are the runoff depths for pervious and impervious surfaces over areas of 2.8ha and 0.7ha. Stormwater volume of several depths will continue to be generated after a given duration of precipitation over impervious areas. This may lead to flooding hence the need for good hydraulic structures of adequate capacity for conveyance downstream for safety within a catchment.  

Keywords: stormwater, catchment, modelling, Miduss, runoff, flooding, precipitation, impervious, pervious, abstraction.



1          INTRODUCTION

Every catchment area and the amount of runoff generated as stormwater after a given rainfall. It depends on two parameters which is the pervious and impervious nature of the catchment. In a given storm, initial abstraction or infiltration takes place for a given duration before runoff generation begins after saturation of the soil. This usually occurs on pervious areas where water can penetrate into the soil. On impervious surfaces such as parking lots, concrete areas, pavements etc, runoff generation begins instantly since there is no initial abstraction or infiltration. Runoff generation is dependent on time of concentration within the catchment area. The maximum time taken for a raindrop that falls farthest away in a catchment area to drain to the outlet point is called the time of concentration. The time of concentration depends on the distance and the water velocity. Runoff volume and depth is high for impervious areas than pervious areas within the same catchment area. Runoffs generated within a given catchment area ends up in drainage systems, conduits, networked pipe system and finally in streams and oceans downstream of the catchment. This is the case in undeveloped countries like Ghana. In the well developed countries like the USA, Scotland, UK, Germany, Dubai and others, they end up in sewerage systems in addition to streams, rivers and oceans for treatment before final disposal into other systems for recycling or into streams and oceans. Runoffs do not build up instantly upon rainfall but takes time within a catchment or forested area as abstraction is very high in such areas. High amount of runoff generation within an impervious area which is not collected and channeled into drains and conduits may result in flooding within the catchment. This usually happens in urbanized areas where most areas are impervious with areas such as parking lots, pavements, concrete areas etc. it therefore becomes important to model such stormwater within an urbanized catchment area for a given return period. There is the likelihood that within a given a return period, a rainfall of high intensity will happen. This will result in flooding because drainage systems of inadequate capacity will not be able to channel such stormwater downstream effectively. Hence for good drainage system design and construction, it’s important to model stormwater within catchments to avoid future contingencies. Stormwater tools such as StormTac, Infoworks Collection Systems (Infoworks CS), Sustainable drainage systems such as for example permeable pavings, ponds and green roofs (SuDS) Studio, Model for Urban Stormwater Improvement Conceptualizatio (MUSIC), SWMM, XPSWMM, StormCad, Civilstorm, Civil 3D – Storm and Sanitary analysis etc to model stormwater within a catchment area for prediction, forecasting and management of stormwater within the catchment for the benefit of mankind. Such tools are able to predict, forecast to a higher degree of which engineers, planners and urban developers are able to design and construct drainage systems and sewerage systems and hence flood controls within urbanized areas. 

Stormwater generated within a catchment comes with a higher degree of contaminants and pollutants since runoffs generated collects a lot of debris and waste materials. Pollutants can be nutrients, heavy metals, bacteria, organic compounds and oils. These contaminants may originate from for example traffic pollutions, sewage systems, atmospheric deposition and oil leakage from vehicles. If such untreated stormwater do not end up in storm treatment facility and treated before discharge, they end up polluting water bodies and inhabitants. Storm treatment facilities therefore becomes a needed facicility in every country for stormwater treatment but that cannot be seen in Ghana. Such pollutants even end up in homes during storm because of bad housing systems, drainage designs and construction especially those living in flood prone areas within a catchment. Very high intensity rainfall for long duration generates runoff of high depth and volume which requires fast and correct runoff collection into drainage systems. If this is not rightly done within the catchment, flooding occurs posing threats to people living in flood prone areas. Wrong catchment delineation and time of concentration determination will result in wrong runoff determination hence inadequacy in drainage designs and resultant construction. This is why engineers and planners in developed countries are in constant stormwater modelling using different models and tools since there is constant increase and decrease in impervious and pervious areas respectively. 

This research work therefore sorts to model stormwater generation within three catchment using MIDUSS version 2.25 to predict and forecast what is going on and can be done in a community within Ghana during a given rainfall duration. Ghana as a country has two rainfall seasons in the southern part. The June – July peak rainfall results in a given high rainfall duration over the region and resultant stormwater generation. This storm generates runoffs of given depths which ends up in drains and conduits of varied capacity. Some of these drains are able to channel the stormwater downstream safely into streams, rivers and ocean. Drians of inadequate capacity and full of debris and contaminants ends up channeling stormwater on roads and homes. Modelling such stormwater will help to forecast, predict and obtain real time knowledge on how to manage stormwater in Ghana and other developing countries where there are no proper sewerage systems and storm treatment facilities to treat such storm waters before channeling downstream and into streams, rivers and oceans.

2. RELATED WORKS ON STORMWATER MODELLING

2.1       Stormwater modelling and management within catchments

During precipitation within a catchments for a given duration, storms of varied depths and volumes are generated. These are channeled into drains of varied sizes to be moved downstream as proper management practicesPrecipitated water that does not infiltrate into the ground or is intercepted by vegetation may become surface runoff (Ven Te Chow, 1988). Precipitation includes both liquid and solid water particles, such as rain, snow or hail.  When stormwater is formed as a result of rainfall or snowmelt it runs off to a recipient. The land area whose water drains into a particular watercourse is called the catchment of the watercourse (Hendriks, 2010). Principally all rainwater that rains into a catchment, which does not evaporate or is absorbed by plants, will eventually drain into the same watercourse (SMHI, 2009).The size of the catchment affects how much water will be present in the watercourse. Emissions of pollutants in the catchment area will likely have an impact on the recipient. Three catchments are separated by a water divide and a catchment can be divided into sub-catchments (SMHI, 2013) as in this research work which considers three catchments or sub basins (Danquah, 2013). Stormwater modelling is very important as it results in proper management of stormwater to avoid contingencies and havocs within a catchment area. Modelling stormwater within catchments helps forecast and predict the nature and what will happen when runoffs are generated after a severe runoff within the catchment. Such modellings allows storms to be channeled into watercourses or to stormwater treatment facilities for safe storage and treatment before use again. Good stormwater treatment facilities from well designed and constructed hydraulic structures by engineers in developed countries have served the purpose of safe stormwater channeling into safe systems.

2.2       Stormwater management and importance

Stormwater management within catchments especially in well urbanized areas is very important in avoidance of future contingencies. Stormwater management and channeling by drains and conduits into watercourses and stormwater treatment facilities is very important to avoid flooding and making the environment dirty and full of debris after rainstorms (Danquah, 2013). Development of natural areas and densification of cities increases the percentage of impervious surfaces and at the same time vegetation and permeable surfaces decrease which affect the natural water balance (Svenskt Vatten AB, 2004). In forested areas, often only a few percent of the precipitation becomes surface runoff, while in an urban area with a high proportion of impervious surfaces the surface runoff can be up to 80-90% of the precipitation (Adielsson, 2012). When rain falls over an urban area large amounts of stormwater are formed and the runoff occurs faster than for example in a forested area (Svenskt vatten AB, 2011a) since the area is well urbanized. When developing or redeveloping an area it is therefore important for land use planners to investigate how the change might affect the stormwater flows and the stormwater quantity (Lind, 2015). An assessment can then be made regarding the capacity of the existing stormwater system and if the system is in need of an expansion or modification.  The amount of pollutants on the surfaces that the stormwater possesses during the runoff will determine how much pollution the water will contain, and different surfaces can contain different amounts and types of pollutants (Lind, 2015). For example, a small country road with a small amount of traffic will contribute with less pollution than a highway with heavy traffic (Persson, et al., 2009). It is therefore also important to study how changes in land use in an area may affect the amount of pollutants in the stormwater (Lind, 2015).

2.3       Storm Water Management Model (SWMM)

Increases in urbanization and conversion of land for urban use has resulted in increased areas of impervious surfaces and, as a consequence, increases in runoff volumes and peak flow rates (Chunlin et. al., 2014). Studies have shown that urban stormwater runoff contains a variety of pollutants such as sediment, organic material, microorganisms, nutrients, and heavy metals (Selvakumar et. al., 2006; Krometis et. al., 2009; Yang et. al., 2015) which can all seriously impact public health and threaten environmental quality (Rauch et. al., 2012). In urban areas, pollutants accumulate on urban surfaces and are then washed off by stormwater during wet weather (Zhang et. al., 2014). Urban runoff pollution problems are more difficult to control than steady-state point discharges because of intermittent and unpredictable rainfall and runoff, the large variety of pollutants involved, and the complex environmental setting (Characklis et. al., 1997; German et. al., 2002; Vaze et. al., 2004; Walsh et. al., 2012). Regular monitoring studies cannot provide sufficient data to support urban non-point pollution research. Because of the increased need to control non-point pollution and to reuse stormwater, hydrological models that can provide a thorough understanding of the basic hydrological and hydraulic processes are increasingly applied in urban settings (Peterson et. al., 2006). Field observation data have played an important role in developing urban hydrological models (Ouyang et. al., 2012). Since it was developed by the U.S. Environmental Protection Agency, the Storm Water Management Model (SWMM) has become one of the most widely used rainfall runoff models for simulating hydrological processes and water quality in urban areas (Barco et. al., 2008; Shorshani et. al., 2014; Walsh et. al., 2014). SWMM has been applied to all types of stormwater management – from urban drainage (Alias, 2014) to flood routing (Hsu, 2000).

 

2.3.1    Storm Water Management Model description

SWMM is a comprehensive hydrological and water quality simulation model used for single or continuous events of runoff in urban areas (Rossman, 2005). SWMM comprises four computational blocks, namely RUNOFF, STORAGE/ TREATMENT, TRANSPORT and EXTRAN. Hydrograph and pollutograph are generated by the RUNOFF block (Chow et. al, 2012). The basic input parameters required to simulate hydrograph are rainfall hyetograph and the sub catchments physical characteristics. In this analysis, the kinematic wave routing method with 5-min time steps was used for calculating runoff transport (Chow et. al., 2012). The infiltration loss on pervious area was estimated by Horton equation because of the availability of soil data. Pollutograph is generated by RUNOFF block based on the volume of storm runoff and catchment antecedent conditions (i.e. dry weather days, street sweeping data and land use). The stormwater pollutant loading is predicted based on the mechanism of build-up and wash-off processes (Chow et. al., 2012) For a given constituent, build-up can be computed either as a fraction of dust and dirt accumulation, or areal accumulation. The areal accumulation described by mass loading/curb length/dry day (kg/km/day) is used in most studies. The exponential build-up equation is used to simulate surface accumulation of constituent and the exponential wash-off equation for simulating the wash-off process (Chow et. al., 2012).

 

2.4 MIDUSS version 2.25

MIDUSS is the software obtained for the modelling of storm water within three catchments in this research work. MIDUSS is windows-based software that helps one to engineer complex drainage networks to convey flow hydrographs from single event storms. MIDUSS allows one to;

·      Generate hydrographs using a variety of built-in hydrological models

·      Design a network of pipes, channels, culverts, ponds, infiltration trenches, cascading pipes, diversions – all with preliminary sizing done automatically and flood routing where appropriate

·      Use interactive design and immediate feedback to quickly optimize each element as you progress downstream

·      Use automatic mode to analyze and adjust your complete design under more severe storms

·      Concentrate on engineering; robust error detection and step-by-step prompts are provided throughout

·      Import/export hyetographs or hydrographs at virtually any stage

MIDUSS is a toolkit that brings together many accepted hydrologic models and hydraulic design methodologies into one software package. MIDUSS is a balance between hydrologic simulation and drainage design engineering. It includes a lot of hydrologic models (Storm, runoff and infiltration) and it excels at helping one to design the best drainage network to convey your hydrographs (www.miduss.com). 

2.5       Stormwater development from Rainfall 

When designing stormwater systems the return period, the duration and the rain intensity are of importance in order to design a better stormwater system. The return period is how often a given rainfall, with a certain intensity and duration, recur (Lind, 2015).  The return period of a rainfall is usually referred to as 1, 10, 50 or 100-year rainfall. A 10-year rainfall returns on average 1 time in 10 years and a 100 – year rainfall returns 1 time/100 year (Lind, 2015). This rainfall happens to be the highest rainfall likely to be experienced once a life time within the stipulated period. To select a suitable return period when designing a conduit, consideration need to be taken regarding to if the area in question is enclosed or not and if it is located inside city settlements. An enclosed area is an area where the water cannot be diverted by gravity (Lind, 2015). The duration of the rain is how long the rain lasts, and is usually expressed in number of minutes. Rainfall intensity shows how much it rains per unit time and area, and is expressed in l / s ∙ ha (Svenskt Vatten AB, 2004). The following types of rainfall data can be used for design and modelling of stormwater systems as can be seen in this modelling research.

• Historical rainfalls and rainfall series from precipitation measurements. Rainfall measurements can be made with a weighty rain gauge or a tipping bucket rain gauge. Historical rainfalls can be data for a single-event rainfall or it can be long-term continuous rainfall series (Lind, 2015).

• Uniform time distribution rainfall. Such rainfalls are the maximum average intensity for a single rainfall during a given duration (Lind, 2015).

• Design Storms. Design storms are special rainfalls used in the analysis and design of sewer systems. The flow that are linked to a certain design storm is assumed to have the same return period as the storm (Lind, 2015). 

3          STORMWATER MODELLING USING MIDUSS V2.25

3.1       Catchment Analysis

Catchment is the land area whose water drains into a particular watercourse. With three catchment consideration, it implies the draining of all runoffs after stormwater within the catchment into another and final discharge into watercourses. Runoffs are always generated after a given rainfall duration where there is initial abstraction or infiltration on pervious surfaces and final runoff build up after saturation. 

Fig. 1: Rainfall intensity over the catchment

A 100min time duration rainfall intensity was considered over the three catchment areas to access runoff generation, runoff volume and depth. In analyzing catchment three as shown in Fig 2 below, the total catchment area for the impervious areas is 0.7ha and pervious surface area is 2.89ha. The time of concentration for impervious and pervious areas is 26.857min and 3.823min respectively. Time of concentration is the maximum time taken for a raindrop that falls farthest away in a catchment area to drain to the outlet point. The time of concentration depends on the distance and the water velocity. Time of concentration analysis would have given a nice results if consideration is for the same catchment area for both impervious and pervious surfaces. The real time catchment areas considered for this modelling is very large as compared to impervious areas in communities in Ghana. Most of the pervious areas are compacted surfaces with stones coverage where there will be initial abstraction after precipitation before runoff generation into drains, conduits and water courses. The other pervious areas within catchment 3 and the other two catchment areas are vegetation’s comprising of plants and different species of crops. In such areas, there is high rate of infiltration after precipitation and runoff generation is around 5% which even end up being infiltrated into the soil. Therefore as can be seen in Fig. 2, the catchment area for the pervious surfaces is 2.8ha. The impervious area is 0.7ha during this modelling and simulation which is a real time scenario for most areas and communities in Ghana. These areas are usually made of concrete pavement, compacted clay areas where infiltration is 0% and 3% respectively after stormwater over the catchment. The total surface area over catchment 3 is 3.5ha as seen in Fig. 2 for this modelling. Total runoff generation after stormwater is dependent on catchment area characteristics. The maximum intensity over a 100min rainfall duration is 113.686mm/hr as depicted in Fig 1. Runoff generation in catchment areas for pervious areas in most communities in Ghana is very slow or not at all as compared to impervious areas. The southern part of Ghana as a country is forested and full of vegetation as compared to countries like Dubai. Hence one do not see much runoff over catchment areas during precipitations as compared to the western world countries like Germany, UK, Canada and USA. There are no stormwater treatment facilities to treat storm waters. Even the drains to take such storm waters downstream are not in good shapes and of inadequate capacities. And if of adequate capacities, full of debris and sand hence resulting in settling of stormwater in drains. 

Fig. 2: Catchment three analysis

3.2       Runoff generation on pervious and impervious surfaces

The three catchment considered for this modelling comprises of pervious and impervious areas. In considering catchment 3 alone, the pervious and impervious areas are 2.8ha and 0.7ha respectively as depicted in Fig 2. This is comparable to real life catchment areas situation in most communities in Ghana. The pervious areas are very large and impervious areas very small comprising of concretes, cemented areas, roads with drains and compacted clay areas. The pervious areas comprises of vegetated areas, bare soil grounds which experiences initial abstraction before runoff generation. Runoff generation occurs on both pervious and impervious areas within the catchment areas under consideration. Fig 3 gives a clear indication of the runoff generation over the impervious and pervious areas within the catchment areas during the modelling. In sampling a runoff of 0.1714 over catchment 3 as in Fig 3, 0.1496 and 0.02174 runoff was generated over the impervious and pervious areas respectively. Runoff generated during a storm over a catchment on impervious areas end up collected and channeled into drains and conduits. Most drains on roads in communities in Ghana have been there for ages and hence in bad shapes. Newly constructed roads have drains filled with sand, debris, standing water breeding mosquitoes after bad engineering works and construction. Runoffs ending in such drains end up on roads. On a daily stormwater over a catchment analysis, one can see waste materials, debris, sand on roads and in the environment after runoff generation hence making the environment and roads unattractive after precipitations. In communities in Ghana, almost all runoffs generated ends up in watercourse or in water bodies. Observation on a daily stormwater and runoff generation into a water body or river will give you an interesting results in most communities in Ghana. One can see, plastic waste, sand, debris, food waste all swimming through the water downstream. This makes the water unattractive and unhealthy for human consumption and usage. Runoff generated by pervious areas end up been infiltrated into the soil and little runoffs generated after saturation. Vegetated areas do not experience runoffs but high rate of infiltration and evapotranspiration after a given storm. 

Fig 3: Runoff generation over the pervious and impervious areas

3.3       Runoff volume and depth

Runoff volume and depth depends on stormwater and runoff generation for a given duration over a catchment area. For a given runoff volume and depth, catchment area characteristics such as imperviousness or perviousness and hydraulic structures will contribute to runoff generation hence volume and depth. Fig 2 above gives a clear indication of the runoff volume and depth over the pervious and impervious areas after 100min rainfall duration of which the maximum rainfall intensity is 113.868mm/hr. After the modeling, the runoff volume for pervious and impervious surface is 268.92m3 and 239.17m3 respectively. Values of 9.606mm and 34.168mm are the runoff depths for pervious and impervious surfaces over areas of 2.8ha and 0.7ha. 

Fig 4: Rainfall nature on pervious and impervious surfaces

Runoff generation in most communities and cities in Ghana are comparable to what is happening in other developed countries but channeling downstream through drains and conduits is what is different. Drain construction in Ghana by Ghanaian engineers isn’t perfectly done as most drains end up with inadequate capacity and full of debris, sand and waste materials. So such drains are unable to carry runoffs from drains to downstream and into watercourses. Most areas in communities in Ghana are vegetated and pervious with little impervious areas. This results in more infiltration and evapotranspiration as compared to runoff generation within a catchment as considered in the three catchments in this modelling. Runoff generation on impervious areas after stormwater needs to be carried downstream by drains of adequate capacity if not flooding can occur. Rainfall intensity and duration over most communities are small hence drains and hydraulic structures are able to contain and carry stormwater downstream and into watercourses. Return period is very important during design and construction of hydraulic structures. This is the why flooding and bad rainfall situations are rare in life as it occurs once in a life time. Accra does experiences heavy rainfall during the June July rainfall in Ghana where flooding mostly occurs. Accra for instance have bad housing siting system, bad drainage system and drains full of waste materials, sand, plastic materials etc. All these materials reduces the drain capacity resulting in high runoff volume resulting in overland flows. Decrease in depth in drains which is a rare scenario in developed countries. This is why Accra in Ghana for instance experiences yearly flooding resulting in the loss of lives and properties worth thousands of cedis, dollars and pound sterling’s.  

3.4       impacts of stormwater on impervious and pervious surfaces

Poor environment, impervious areas and hydraulic structures results in unhealthy generated runoffs into drains and watercourses. Most communities in Ghana have unhealthy and untidy environment which results in runoffs full of waste materials and plastic waste ending in rivers and streams after downpours. This reduces the beauty and aesthetic nature of the river making it unhealthy for drinking and meeting domestic water demands. Stormwater resulting in runoffs on impervious areas makes the environment untidy and unhealthy each time there is precipitation over a catchment area in most communities in Ghana. Stormwater on pervious areas is not much seen in most communities in Ghana as most areas are vegetated and small in imperviousness. Catchment areas for modelling are good vegetated land areas with high rate of abstraction and infiltration. Evapotranspiration also reduces the amount of stormwater reaching land to result in runoff generation. Since most communities in Ghana are full of vegetation and forest zones, interception of rainwater by plant leaves reduces the amount of water reaching land for infiltration or abstraction and further runoff generation after saturation. With this in mind, one expect runoff generation from a given stormwater over the same catchment area for both pervious and impervious areas not to be the same. Evapotranspiration will reduce the amount of generated runoff over the pervious area from stormwater as compared to impervious areas. Since impervious areas are free areas comprising of parking lots, concrete areas, compacted sands etc hence no resultant evapotranspiration from plants and vegetated areas. There is no or little runoff generation over pervious areas due to high rate of abstraction and infiltration over the catchment area. 

 

4          Conclusion

Modelling has become an important tool to simulate into what can become reality and predict for the future. MIDUSS V2.25 hence becomes an important tool to model and simulate stormwater and runoff generation characteristics within a catchment. Modelling gave a beautiful results using MIDUSS after analyzing 100min rainfall within three catchment areas. The 100min rainfall gave the maximum rainfall intensity to be 113.686mm/hr. This generated a runoff volume for pervious and impervious surface to be 268.92m3 and 239.17m3 respectively. Values of 9.606mm and 34.168mm are the runoff depths for pervious and impervious surfaces over areas of 2.8ha and 0.7ha. Modelling and sampling communities in Ghana to access and analyze stormwater over catchment areas indicated that generated runoffs end up in drains of inadequate capacity. Some filled with sands, debris, bushes, plastic hence reducing drain capacity. This results in runoff ending on roads, car parks, pavements and important areas full of debris, plastic waste, food waste, human waste etc. It also leads to flooding in cities especially during rainy season and rainfall of high intensity over the catchment areas such as in areas like Accra in Ghana. Runoffs of high velocities are able to move such waste materials into streams and rivers distorting the beauty and aesthetics of the river and high rate of contamination hence unable to meet water demand. It therefore deems important to construct drains and conduits of adequate capacity to carry all stormwater downstream and into water courses safely. It is again of importance to design and construct stormwater treatment facilities to treat and recycle waste water and channeled back into the system for good usage such as in watering lawns and gardens.

Acknowledgment

I thank the Almighty God for the completion of this modelled research work successfully. God bless all those who contributed to the success of this work. God bless you all. 

References

·       Adielsson, S., 2012. Hantering av föroreningar i dagvatten – Internationella erfarenheter och svenska utmaningar – Referat, Stockholm: Dagvattenguiden.

·       Alias N., LIU A., Egodawatta P., Goonetilleke A., 2014, Sectional analysis of the pollutant wash-off process based on runoff hydrograph. Journal of Environmental Management, 134, 63. 

·       Barco J., Wong K.M., Stenstrom M.K., 2008, Automatic calibration of the US EPA SWMM model for a large urban catchment. Journal of Hydraulic Engineering-Asce, 134, 466. 

·       Chunlin l., Miao l., Yuanman h., Jiping g., Fengyun s., Yanyan x., 2014, Characterization and first flush analysis in road and roof runoff in Shenyang, China. Water Science & Technology, 70, 397. 

·       Characklis G.W., Wiesner M.R., 1997, Particles, metals, and water quality in runoff from large urban watershed. Journal of Environmental Engineering-Asce, 123, 753.

·       Chow M. F., Yusop Z., Toriman M. E., 2012, Modelling runoff quantity and quality in tropical urban catchments using Storm Water Management Model.

·       Danquah I. O., 2013, Climate change and its impacts on flooding in Accra – Greater Accra Metropolitan Assembly, Msc Thesis, Pg 39.

·       German J., Svensson G., 2002, Metal content and particle size distribution of street sediments and street sweeping waste. Water Science and Technology, 46, 191.

·       Hendriks, M. R., 2010. Introduction to physical hydrology. ISBN: 0199296847, New York: Oxford University Press Inc.

·       Hsu M.H., Chen S.H., Chang T.J., 2000, Inundation simulation for urban drainage basin with storm sewer system. Journal of Hydrology, 234, 21.

·       Krometis L., Drummey P., Characklis G., Sobsey M., 2009, Impact of Microbial Partitioning on Wet Retention Pond Effectiveness. Journal of Environmental Engineering, 135, 758.

·       Lind, J., 2015, Stormwater Modelling Tools: a comparison and evaluation.

·       Ouyang W., Guo B., Hao F., Huang H., LI J., Gong Y., 2012, Modeling urban storm rainfall runoff from diverse underlying surfaces and application for control design in Beijing. Journal of Environmental Management, 113, 467.

·       Peterson E.W., Wicks C.M., 2006, Assessing the importance of conduit geometry and physical parameters in karst systems using the storm water management model (SWMM). Journal of Hydrology, 329, 294. 

·       Persson, P., Gallardo, I., Kallioniemi, K. & Foltyn, A.-. M., 2009. PlanPM Dagvatten, ISBN/ISSN-nr: 978-91-86079-66-6, Malmö: Länsstyrelsen i Skåne Län.

·       Rauch W., Ledin A., Eriksson E., Deletic A., Hunt III W.F., 2012, Stormwater in urban areas. Water Research, 46, 6588.

·       Rossman L.A., 2005, Storm water management model (SWMM) version 5.0: user’s manual. Office of research and development, US Environmental Protection Agency, Cincinnati.

·       SMHI, 2009. Avrinningsområde |Hydrologi. [Online]  Available at: http://www.smhi.se/kunskapsbanken/hydrologi/avrinningsomrade-1.6704 [Accessed 07 04 2014].

·       SMHI, 2013. Hydrologiska begrepp. [Online]  Available at: http://www.smhi.se/kunskapsbanken/hydrologiska-begrepp-1.29125 [Accessed 07 04 2014].

·       Shorshani M.F., Bonhomme C., Petrucci G., Andr M., Seigneur C., 2014, Road traffic impact on urban water quality: a step towards integrated traffic, air and stormwater modelling. Environmental Science and Pollution Research, 21, 5297.

·       Svenskt Vatten AB, 2004. Dimensionering av allmänna avloppsledningar, P90. ISSN, Motala: Svenskt Vatten AB.

·       Svenskt vatten AB, 2011a. Hållbar dag-och dränvattenhantering – Råd vid planering och utformning (P105). ISSN 1651-4947, Stockholm: Svenskt Vatten AB.

·      Svenskt Vatten AB, 2004. Dimensionering av allmänna avloppsledningar, P90. ISSN, Motala: Svenskt Vatten AB.

·      Svenskt Vatten, 2011b. Nederbördsdata vid dimensionering och analys av avloppssystem, s.l.: ISSN 1651-4947, Svenskt Vatten AB.

·       Selvakumar A., Borst M., 2006, Variation of microorganism concentrations in urban stormwater runoff with land use and seasons. Journal of Water and Health, 4, 109. 

·       Vaze J., Chiew F., 2004, Nutrient Loads Associated with Different Sediment Sizes in Urban Stormwater and Surface Pollutants. Journal of Environmental Engineering, 130, 391, 2004. 

·       Ven Te Chow, D. R. M. L. W. M., 1988. Applied Hydrology. ISBN: 9780071001748: McGraw Hill Higher Education.

·       Walsh C.J., Fletcher T.D., Burns M.J., 2012, Urban Stormwater Runoff: A New Class of Environmental Flow Problem. PLoS ONE, 7, e45814.

·       Walsh T.C., Pomeroy C.A., Burian S.J., 2014, Hydrologic modeling analysis of a passive, residential rainwater harvesting program in an urbanized, semi-arid watershed. Journal of Hydrology, 508, 240. 

·       www.miduss.com

·       Yang X.L., LI T.K., Hua K.K., Zhang Y.L., 2015, Investigation of First Flushes in a Small Rural-Agricultural Catchment. Polish Journal of Environmental Studies, 24, 381. 

·       Zhang Q., Wang X., Hou P., Wan W., LI R., Ren Y., Ouyang Z., 2014, Quality and seasonal variation of rainwater harvested from concrete, asphalt, ceramic tile and green roofs in Chongqing, China. Journal of Environmental Management, 132, 178. 

 

<

p class=”MsoNormal” style=”line-height: 15.693334px;text-align: justify”> 

Planning and Management in Companies

 by Shashikant Nishant Sharma 

Planning and management play crucial roles in the growth and success of a company. Here are some ways in which planning and management can help a company in its growth:

Setting Clear Goals: Effective planning and management involve setting clear and achievable goals for the company. These goals provide direction and focus, enabling the company to work towards specific objectives. By defining growth targets and milestones, planning and management help align the efforts of employees and resources towards the company’s expansion.

Strategic Decision-making: Planning and management facilitate strategic decision-making processes. They involve assessing market trends, analyzing competition, and identifying opportunities for growth. Through comprehensive planning and effective management, a company can make informed decisions regarding product development, market entry, expansion strategies, and resource allocation.

Resource Allocation: Planning and management help allocate resources effectively, ensuring they are used efficiently to support growth. This includes managing financial resources, human capital, technology, and other assets. By carefully planning and managing resources, a company can optimize its operations, streamline processes, and minimize waste, ultimately contributing to its growth.

Risk Management: Planning and management involve identifying and managing risks that may impede growth. By conducting thorough risk assessments, developing contingency plans, and implementing risk mitigation strategies, a company can navigate uncertainties and minimize potential setbacks. Effective risk management enables the company to seize opportunities while safeguarding its assets and reputation.

Organizational Structure and Alignment: Planning and management play a critical role in establishing and maintaining an effective organizational structure. They define roles, responsibilities, and reporting lines, ensuring clarity and alignment within the company. A well-structured organization promotes efficient communication, collaboration, and coordination, enabling the company to adapt to growth and scale operations effectively.

Monitoring and Evaluation: Planning and management involve continuous monitoring and evaluation of the company’s performance. By setting key performance indicators (KPIs) and regularly assessing progress, management can identify areas for improvement and take corrective actions. This data-driven approach enables the company to optimize processes, capitalize on growth opportunities, and adapt strategies as needed.

Adaptability and Flexibility: Effective planning and management foster adaptability and flexibility, crucial traits for sustained growth. Companies that can adjust their plans and strategies based on changing market conditions and customer needs are more likely to thrive. By regularly reviewing and updating plans, management can ensure the company remains responsive to evolving trends and remains agile in its operations.

In summary, planning and management provide a structured approach to growth by setting clear goals, making strategic decisions, optimizing resource allocation, managing risks, establishing organizational structures, monitoring performance, and promoting adaptability. By leveraging these practices, companies can position themselves for sustainable growth and long-term success.