
A recently independent state, Timor-Leste, is progressing towards socioeconomic development, prioritizing women empowerment while its increased fertility rate (4.1) could hinder the growth due to an uncontrolled population. Currently, limited evidence shows that indicators of women's empowerment are associated with fertility preferences and rates. The objective of this study was to assess the association between women empowerment and fertility preferences of married women aged 15 to 49 years in Timor-Leste using nationally representative survey data. The study was conducted using the data of the latest Timor-Leste Demographic and Health Survey 2016. The study included 4040 rural residents and 1810 urban residents of Timor-Leste. Multinomial logistic regression has been performed to assess the strength of association between the exposures indicating women's empowerment and outcome (fertility preference). After adjusting the selected covariates, the findings showed that exposures that indicate women empowerment in DHS, namely, the employment status of women, house and land ownership, ownership of the mobile phone, and independent bank account status, contraceptive use, and the attitude of women towards negotiating sexual relations are significantly associated with fertility preferences. The study shows higher the level of education, the less likely were the women to want more children, and unemployed women were with a higher number of children. Our study also found that the attitude of violence of spouses significantly influenced women's reproductive choice. However, employment had no significant correlation with decision-making opportunities and contraceptive selection due to a lack of substantial data. Also, no meaningful data was available regarding decision-making and fertility preferences. Our findings suggest that women's empowerment governs decision-making in fertility preferences, causing a decline in the fertility rate.
Citation: Nandeeta Samad, Pranta Das, Segufta Dilshad, Hasan Al Banna, Golam Rabbani, Temitayo Eniola Sodunke, Timothy Craig Hardcastle, Ahsanul Haq, Khandaker Anika Afroz, Rahnuma Ahmad, Mainul Haque. Women's empowerment and fertility preferences of married women: analysis of demographic and health survey’2016 in Timor-Leste[J]. AIMS Public Health, 2022, 9(2): 237-261. doi: 10.3934/publichealth.2022017
[1] | Arjumand Seemab, Mujeeb ur Rehman, Jehad Alzabut, Yassine Adjabi, Mohammed S. Abdo . Langevin equation with nonlocal boundary conditions involving a ψ-Caputo fractional operators of different orders. AIMS Mathematics, 2021, 6(7): 6749-6780. doi: 10.3934/math.2021397 |
[2] | Dinghong Jiang, Chuanzhi Bai . On coupled Gronwall inequalities involving a ψ-fractional integral operator with its applications. AIMS Mathematics, 2022, 7(5): 7728-7741. doi: 10.3934/math.2022434 |
[3] | Weerawat Sudsutad, Chatthai Thaiprayoon, Aphirak Aphithana, Jutarat Kongson, Weerapan Sae-dan . Qualitative results and numerical approximations of the (k,ψ)-Caputo proportional fractional differential equations and applications to blood alcohol levels model. AIMS Mathematics, 2024, 9(12): 34013-34041. doi: 10.3934/math.20241622 |
[4] | Weerawat Sudsutad, Jutarat Kongson, Chatthai Thaiprayoon, Nantapat Jarasthitikulchai, Marisa Kaewsuwan . A generalized Gronwall inequality via ψ-Hilfer proportional fractional operators and its applications to nonlocal Cauchy-type system. AIMS Mathematics, 2024, 9(9): 24443-24479. doi: 10.3934/math.20241191 |
[5] | Qi Wang, Shumin Zhu . On the generalized Gronwall inequalities involving ψ-fractional integral operator with applications. AIMS Mathematics, 2022, 7(11): 20370-20380. doi: 10.3934/math.20221115 |
[6] | Qing Yang, Chuanzhi Bai, Dandan Yang . Finite-time stability of nonlinear stochastic ψ-Hilfer fractional systems with time delay. AIMS Mathematics, 2022, 7(10): 18837-18852. doi: 10.3934/math.20221037 |
[7] | Weerawat Sudsutad, Chatthai Thaiprayoon, Sotiris K. Ntouyas . Existence and stability results for ψ-Hilfer fractional integro-differential equation with mixed nonlocal boundary conditions. AIMS Mathematics, 2021, 6(4): 4119-4141. doi: 10.3934/math.2021244 |
[8] | A.G. Ibrahim, A.A. Elmandouh . Existence and stability of solutions of ψ-Hilfer fractional functional differential inclusions with non-instantaneous impulses. AIMS Mathematics, 2021, 6(10): 10802-10832. doi: 10.3934/math.2021628 |
[9] | Thabet Abdeljawad, Sabri T. M. Thabet, Imed Kedim, Miguel Vivas-Cortez . On a new structure of multi-term Hilfer fractional impulsive neutral Levin-Nohel integrodifferential system with variable time delay. AIMS Mathematics, 2024, 9(3): 7372-7395. doi: 10.3934/math.2024357 |
[10] | Choukri Derbazi, Zidane Baitiche, Mohammed S. Abdo, Thabet Abdeljawad . Qualitative analysis of fractional relaxation equation and coupled system with Ψ-Caputo fractional derivative in Banach spaces. AIMS Mathematics, 2021, 6(3): 2486-2509. doi: 10.3934/math.2021151 |
A recently independent state, Timor-Leste, is progressing towards socioeconomic development, prioritizing women empowerment while its increased fertility rate (4.1) could hinder the growth due to an uncontrolled population. Currently, limited evidence shows that indicators of women's empowerment are associated with fertility preferences and rates. The objective of this study was to assess the association between women empowerment and fertility preferences of married women aged 15 to 49 years in Timor-Leste using nationally representative survey data. The study was conducted using the data of the latest Timor-Leste Demographic and Health Survey 2016. The study included 4040 rural residents and 1810 urban residents of Timor-Leste. Multinomial logistic regression has been performed to assess the strength of association between the exposures indicating women's empowerment and outcome (fertility preference). After adjusting the selected covariates, the findings showed that exposures that indicate women empowerment in DHS, namely, the employment status of women, house and land ownership, ownership of the mobile phone, and independent bank account status, contraceptive use, and the attitude of women towards negotiating sexual relations are significantly associated with fertility preferences. The study shows higher the level of education, the less likely were the women to want more children, and unemployed women were with a higher number of children. Our study also found that the attitude of violence of spouses significantly influenced women's reproductive choice. However, employment had no significant correlation with decision-making opportunities and contraceptive selection due to a lack of substantial data. Also, no meaningful data was available regarding decision-making and fertility preferences. Our findings suggest that women's empowerment governs decision-making in fertility preferences, causing a decline in the fertility rate.
A network can be seen as a tangible manifestation of interconnected components. When comparing industrial networks to social networks, communication networks, or electrical networks, it becomes apparent that the entities involved in industrial networks are active participants in economic processes. These networks play a vital role in converting raw materials into the end products and services that are ultimately consumed by the public [1,2]. Consequently, the relationships between actors within industrial networks are often conceptualized through financial transactions that occur within the framework of long-term partnerships. These interconnected links are what make industrial networks viable and successful [3,4]. Typically, networks are utilized for data transfer, and certain networks are better suited for handling specific data volumes. Industrial networks enable the connection of various devices over long distances, facilitating communication between them by efficiently transmitting and receiving substantial volumes of data [5]. Therefore, the number of internet-connected devices in industrial settings has experienced a recent increase, primarily driven by emerging technologies in Internet of Things (IoT) networks [6]. While these technologies make administrative tasks easier, they also face the challenge of cyber attacks. One such system commonly used in industrial environments is Supervisory Control and Data Acquisition (SCADA) [7]. Sodinokibi, an affiliate of REvil, launched a Stuxnet [8] attack against Acer, while the Darkside cyber-criminal organization launched an attack against Colonial Pipeline [9].
Recently, hackers have been targeting not just traditional commercial networks but also industrial networks[10]. Twenty-one lines of code were demonstrated by the US government in 2007 as a potential means of damaging a power plant generator [11]. To render an out-of-phase generator, unless the attackers connected and disconnected it from the grid on a regular basis [12]. More than 80, 000 people in Ukraine were left without electricity after cyber-criminals hijacked the networks of two power distribution companies in late 2015 and early 2016 [13]. Hackers got into a German steel firm in 2015 and tampered with a blast furnace, severely damaging the plant [14]. An attack scenario is illustrated in Figure 1. These attack scenarios show that traditional systems cannot be adequately protected using standard security methods. Consequently, cyber security is increasingly becoming an inherent component of today's industrial networks [15].
Numerous security solutions, such as intrusion detection systems (IDS) based on machine learning (ML) and deep learning (DL) models [16], have been proposed by several research studies to protect industrial networks from both known and unknown (zero-day) attacks[17]. An IDS is software that monitors the network for any suspicious activities, like a failed network intrusion attempt or the use of a hacked account [18]. An IDS is considered to be the most effective form of security because it is designed to identify intrusions by spotting unusual anomalies in sensor data or actuator activity [19]. Hence, an IDS plays a crucial role in preserving the security of industrial networks [20].
There are a number of problems with the current batch of IDSs [21], such as poor detection rates, excessive false positives, and sluggish real-time functionality during attempted impersonations [22]. Due to insufficient security solutions, the attacker breaks the firewall to attack the networks, which results in a huge loss of confidential data of the industrial networks. They either sneak into the network and snitch the sensitive information without making any changes, or they obtain unauthorized access and modify the confidential data by encrypting, deleting, or tampering with it, thus, badly damaging the industrial network. The detection of malicious attacks in industrial networks is crucial, as these attacks can result in system failures, network disruptions [23], data damage, or the theft of confidential information [24]. Thus, enhancing the security of industrial networks necessitates the creation of reliable and efficient systems for detecting anomalies, based on continuous monitoring of the actual state of the system.
To automatically detect malicious attacks in real-time, DL algorithms exhibit a superior performance compared to traditional ML algorithms, particularly when handling large amounts of data[25]. DL is highly effective in detecting zero-day attacks and achieving a high detection rate [26], as it has the capability to automatically identify correlations within the data [27]. Therefore, in this study, DL algorithms convolutional neural networks (CNN) and deep belief networks (DBN) are used to develop an IDS which specifically meets the requirements of industrial network security. To improve detection rates while lowering training and generalization errors, we have proposed an integrated intrusion detection model that comprises three layers namely CNN, DENSE, and DBN. The reason for choosing CNN and DBN for IDS is due to their superior performance compared to other ML and DL methods [28]. The results show that the proposed model offers an optimal performance within a shorter time frame when compared to other models.
With the rise of interconnected networks, industrial networks are now relying on the vast amount of information available online. However, increasing integration has left industrial network security exposed to a variety of cyberattacks [29]. As such, it is imperative to integrate measures to detect these potential attacks and establish defense mechanisms [30]. One of the most effective solutions is the use of IDSs.
These systems keep an eye out for any suspicious behavior on a network and can spot intrusions by seeing potentially harmful abnormalities in sensor data or actuator activity [19]. The primary goal of this research study is to develop an improved model for IDSs that provides optimal accuracy rates and enhances the performance of evaluation measures used in experiments [31].
The use of ML and time series-based anomaly detection methods in [32] helps in monitoring industrial operations data present in networks for signs of cyber-attacks. The data analyzed include Modbus-based gas pipeline control traffic and OPC UA-based batch processing traffic. The resulting accuracy of 90.8% is slightly worse than before. The F1-score is doing quite well with a 94.9% recall. The algorithms still work well, despite a large amount of missing data in this dataset. In actual use, this will allow attacks on industrial networks to go undetected, which is a major security risk. To improve safety, more resources are needed.
The knowledge distillation triplet convolution neural network (KD-TCNN) model was developed to enhance the performance of IDS in industrial CPS. The proposed model reduces the computational cost and size by 86% while maintaining a 0.4% drop in accuracy compared to the current model. To process and analyze huge volumes of data and comprehend the relationships between categories in the teacher network, knowledge distillation aims to make the student network's outputs identical to those of the teacher network. To perform an efficient detection of intrusion, the model must undergo two stages of training: first, the preliminary training of the teacher model, and second, the training of the KD-TCNN model. To bridge the gap between similar inputs for knowledge distillation, deep metric learning is applied, which improves the performance of the student model [33].
The data from the Integrated Automation lab's process control plant was utilized to gather metrics pertaining to ICS. CNNs were employed to assess the efficiency of detecting injection attacks. A three-layer CNN architecture with rectified linear activation unit (ReLU) activation and a SoftMax classification layer was constructed to distinguish between benign and malicious data. The proposed CNN model's efficacy was gauged through a range of metrics such as F1-score, accuracy, recall, precision, and Cohen's kappa coefficient. In terms of performance, CNN demonstrated a superiority over other deep learning algorithms. However, the outcome depends on the program and data utilized. By combining various DL and ML techniques, the effectiveness of the security mechanism can be further improved. Alternative DL techniques such as recurrent neural networks (RNN) can also be employed [34].
The intrusion detection system based on CNN has the capability to identify different attack types, which were evaluated using datasets such as Network Security Laboratory-Knowledge Discovery and Data Mining (NSL-KDD) and University of New South Wales-Network Behavior 15 (UNSW-NB 15). Performance indicators such as recall, F1-score, and precision, were calculated and contrasted to those of other DL techniques. A CNN has been tested on the NSL-KDD and UNSW-NB 15 datasets for intrusion detection, resulting in an improved detection accuracy when compared to previous CNN-based methods. However, when it came to classifying attacks with multiple classes, the CNN did not perform better than other DL-based IDSs, such as SAE and DBN. For a more specific and accurate development, creating a dataset within the ICS context should be considered. MATLAB can be used to capture real-time network traffic data and DL algorithms can then be applied to this network for enhanced results [35].
The use of a Stacked Auto-encoder (SAE) combined with a CNN can reduce high-dimensional data to generalizations and essential characteristics that describe the machine tool's operating state. The process begins with the use of an unsupervised SAE for generic feature extraction from industrial process data. The proposed model's effectiveness in the updated production line is then validated by fine-tuning a one-dimensional CNN classifier with supervised data. It is evident from the experimental results that the proposed model is a potent and versatile solution for monitoring machine tool production data, minimizing the complexity features with high-dimensional, and having positive economic impacts on the industry [36].
A proposed model for SCADA [37] network data detection has been suggested as a means of creating a secure architecture for ICS networks. The proposed architecture creates two ensemble-based detection methods by combining a DBN with a conventional classifier, such as a support vector machine (SVM). The results of the experiments support the effectiveness of the proposed DBN ensemble approach in addressing the DBN structure selection problem and providing dependable attack detection for the secure operation of SCADA systems. However, the approach has some limitations, including using a neural network (NN)-based classifier within the DBN framework. Although DBNs are effective in extracting features from raw data, the NN-based classifiers they use can limit their pattern recognition precision. Additionally, the proposed training method for the DBN is not designed for real-time situations [38].
A proposed method for diagnosing intrusions in industrial robots, based on joint DBN information fusion technology, addresses the limitations of the traditional fault diagnosis model. These limitations include low precision, inefficiency, instability, and a slow time-to-diagnosis in cases of multiple faults. To test the method, the researchers chose an industrial robot with a problem in one of its joint bearings. The results showed that the developed fault diagnostic approach is effective, with a test set accuracy of 97.96%. The proposed method has several advantages over the traditional diagnostic model, including a faster diagnosis time and an improved diagnosis efficiency, making it better suited for diagnosing multiple faults [39].
The detection of cyberattacks on SCADA-based industrial control systems (ICS) is addressed in a study that introduces the first-ever population extremal optimization (PEO)-based DBN network detection technique (PEO-DBN). To further improve the detection performance, a new ensemble learning strategy, called EnPEO-DBN, is proposed to combine the PEO-DBN approach. The simulation results depicted that the proposed PEO-DBN and EnPEO-DBN have superior performance compared to other methods and can be considered promising solutions for detecting cyberattacks on SCADA-based ICS. To speed up the fitness evaluation process, future work can take advantage of surrogate-assisted models, such as a Gaussian process regression or a Bayesian optimization [40].
As a means of securing IoT networks, [41] presented a hybrid DBN cyber intrusion detection system. In order to construct better attack detectors for network traffic, researchers have studied and addressed DBN's drawbacks. The results from the analysis are then integrated into a SoftMax Regression model to improve the security and accuracy of detection. The hybrid DBN model was trained and evaluated based on the original and unaltered dataset generated by the system. In terms of detecting and classifying intrusions, the suggested hybrid DBN model had a 99.72 % success rate. According to these findings, the model outperformed the current IDS. Further, the hybrid model offered a roughly 5% greater accuracy improvements compared to pre-hybrid DBN-based systems.
An interesting approach is used as a solution that aims to combine the strengths of two popular machine learning techniques: Long short-term memory (LSTM) and DBNs. By using LSTM to enhance the representation power of traditional shallow machine learning, and DBNs to extract non-linear components from the data, the researchers hope to achieve both high accuracy and high processing speed. The results of their approach appear to be promising, with recall rates as high as 97.3% and area under the curve (AUC) as high as 0.927, suggesting that this combination of techniques could be effective for solving complex problems in machine learning. However, as mentioned, this area of research is still being explored, and more work needs to be done to fully understand the trade-offs between precision, speed, and other factors when using this hybrid approach [42].
The KDD-98 dataset, produced by the "Defense Advanced Research Projects Agency's Knowledge Discovery and Data Mining program" in 1998, was the first publicly available intrusion detection dataset, though it contained flaws like duplicate records [43]. NSL-KDD, introduced in 2009, improved on KDD-98, though KDD-99 still had issues like outdated attack methods and inaccurate network parameters [43]. The Cooperative Association for Internet Data Analysis (CAIDA) dataset, introduced in 2007 had limited information on DDoS attacks [44]. The University of Brescia (UNIBS) database (2009) by Gringoli et al. focused on profiling popular web apps but was unsuitable for detecting anomalies [45]. The Information Security Centre of Excellence (ISCX) 2012 dataset by Shiravi et al. had two network configurations (α and β) but lacked Hypertext Transfer Protocol Secure (HTTPS) protocol traffic [46]. DDoS 2016, released in 2016 by Alkassasbeh et al., was not useful for multi-step attack detection. The ADFA Linux (ADFA-LD) and ADFA Windows Datasets (ADFA-WD) were created using system call traces, but attackers can hide their tracks. Canadian Institute for Cybersecurity Intrusion Detection System (CIC-IDS) 2017 had 80 network parameters from a five-day simulated test but had missing values and no information on multi-stage attacks. TUIDS, developed by Tezpur University, used a hybrid of packet and flow formats but couldn't simulate multi-step attacks.
The new Multi-Step Cyber Attack (MSCAD) [47] dataset overcomes the limitations of prior methods by serving as a new benchmark for IDS. The MSCAD stands out with its ability to detect complex, multi-stage attacks, which are carried out through a variety of techniques such as volume-based DDoS, site crawling, and network-based DDoS. This dataset is built on a full network infrastructure and contains no duplicates or missing data, making it ready for use in training IDS systems without any further cleaning [48]. The attributes of the MSCAD have been compared to those in the literature, including the dataset used, evaluation measures, k-fold validation, balancing strategy, and response time, as presented in Table 1.
Author | Dataset | Evaluation measure | K-Fold validation | Balancing strategy | Response time |
[32] | Modbus, OPC-UA | Accuracy, Precision, Recall, F-1 score | No | No | High |
[38] | SCADA network | Accuracy, Precision | Yes | No | Medium |
[39] | Industrial robot | Accuracy | No | No | Low |
[40] | SCADA network | Accuracy | No | No | Medium |
[35] | NSL-KDD, UNSW-NB15 | Accuracy, Precision, Recall, F-1 score | Yes | No | Medium |
[34] | PCP from IAE | Accuracy, Precision, Recall, F-1 score | No | No | High |
[41] | SCADA network | Accuracy, F-1 score | No | No | Medium |
[33] | NSL-KDD, CIC-IDS 2017 | Accuracy, Precision, F-1 score | Yes | Yes | High |
[42] | NSL-KDD | Accuracy, Precision, Recall, F-1 score | No | No | Medium |
[36] | Collected data from industry production line | Accuracy | No | No | Medium |
Proposed Model | Multi-step cyber attack dataset | Accuracy, Precision, Recall, F-1, G-mean score | Yes | Yes | Low |
The following section comes up with a comprehensive overview of the proposed methodology. The data has undergone pre-processing and has been trained and tested. The diagram in Figure 2 showcases the general structure and flow of the model. The implementation involves the use of two DL algorithms, with a thorough explanation of how the CNN and DBN components are integrated into the proposed scheme.
There are several public network datasets available for intrusion detection, such as KDD-98, NSL-KDD [43], CAIDA [44], UNIBS [45], ISCX 2012 [46], DDos 2016, ADFA-LD and ADFA-WD, CIC-ID 2017, and TUIDS. This experiment makes use of the MSCAD [20] dataset for industrial networks, as it is the latest dataset available and features a variety of attack scenarios that are well-suited for detecting multi-step attacks, as demonstrated in Table 2.
Classe | Encoding | Records |
Brute force | 0 | 88, 502 |
HTTP DDoS | 1 | 641 |
ICMP flood | 2 | 45 |
Normal | 3 | 28, 501 |
Port scan | 4 | 11, 081 |
Web crawler | 5 | 28 |
Before analyzing a data set, it must undergo data cleaning, which consists of correcting or removing any incorrect, redundant, or otherwise undesired information. Data cleansing aims to remove ambiguity and other issues from your data. We must have clean data (i.e., information that our costly data analysis tools can process [49]).
Each dataset consists of many entries. Before training a model, inspecting a dataset for missing and undefined entries is essential. Training the model will produce errors if any data record includes an unexpectedly blank or undefined value. We should ensure that the dataset does not have any confusing data before training a model by cleaning it first. Several approaches [50,51] are available for removing redundant or unclear entries from data sets. The dataset was cleansed using Python libraries (Pandas and NumPy) [52] and functions that provide true or false Boolean values to test for missing and enduring values. If this is true, then some of the values in the dataset are missing or infinite; however, if it is false, then the cleaning of the dataset is completed. The datasets were cleaned by converting all undefined records into blank spaces. Once the undefined values were transformed, the dataset was further refined by removing all empty entries and replacing any remaining undefined values with empty ones.
To achieve numericalization, one must first construct a string-to-integer encoding system and then individually apply it to each string. Typically, the attributes or labels of the datasets we work with, are available throughout multiple columns. These labels can be composed of either words or numbers. Typically, training data is labeled with either a phrase that makes it understandable or in a human-readable format. The process of label encoding [53] involves transforming human-readable labels into a format that can be processed by computers. This allows machine learning [54] algorithms to make more informed decisions based on these labels and is an essential step in the preparation of structured datasets for supervised learning. The label encoder searches for labels ranging from zero to n-1 and gives numerical values to these labels. This experiment quantifies categorical attributes using the label encoder method.
During machine learning model training, data normalization reduces the impact of feature scales. Thus, our model can converge to accurate weights, therefore enhancing its accuracy. Normalization increases the model's capacity to predict outputs by bringing the features into a condition of homogeneity. The process of rescaling a numeric attribute with a real value to the interval 0 to 1 is what normalization means. This decreases the effect of the feature size on the training procedure [55]. Consequently, this leads to improved coefficients following the training. Normalization is a technique applied to datasets with varying value ranges, such as when one feature has values ranging from 0 to 1 and another has values ranging from 100 to 1000. This helps to equalize the data and makes it easier for the machine-learning model to be trained effectively.
The selected dataset in this experiment has features with varied range values; for example, some features have extremely high range values while others have extremely low range values. If we train the model using these variables, it will fail. This problem can be addressed by employing the normalization approach, which can be done by this equation to transform all non-zero values into one.
Xnorm=X−XminXmax−Xmin | (3.1) |
The experiment's model is based on a dataset with a substantial number of records. Prior to training and testing the model, it's critical to guarantee that each class has the same amount of examples. This can be achieved through the use of balancing techniques such as oversampling and undersampling. Oversampling raises the minority class's percentage to the majority class, whereas undersampling decreases the majority class's share to match the minority class. However, oversampling can lead to overfitting because it involves repetitive data. The dataset used for this experiment was imbalanced, so we applied two balancing techniques, the Synthetic Minority Oversampling Technique (SMOTE) [56] and SMOTETomek, to ensure that the dataset was representative of the entire population.
SMOTE generates synthetic information using a k-nearest neighbor algorithm. The first phase of SMOTE involves randomly selecting data from the minority class and then determining those data's k-nearest neighbors. Then, the random data and the k-nearest neighbor are utilized to generate synthetic data. There is a version of the SMOTE called the Borderline-SMOTE. The name implies a connection to borders, which is indeed the case. In Borderline-SMOTE, synthetic data are generated only along the decision boundary between the two classes, whereas in SMOTE, they are generated randomly between the two classes [57]. The SMOTEENN and SMOTETomek sampling methods include oversampling (SMOTE) and undersampling (ENN, Tomek). SMOTE generates synthetic class samples to establish a statistical parity, whilst the latter is used to clean redundant information at the boundary of two classes to increase separation.
We have proposed an integrated intrusion detection model that is a combination of CNN and DBN. The proposed model contains three layers: CNN, DENSE, and DBN, which are depicted in Figure 2. All of the models utilized in the proposed model's layers are extensively explained for understanding. The model enhanced the performance for the detection of attacks [58] and reduced the response and training time in industrial networks.
Convolutional neural networks (CNNs) are a powerful tool for discovering features, as they reduce the need for human input[59]. The primary objective of CNN is to learn the most significant features of the input data [60]. A CNN is comprised of pooling layers, convolutional layers, and fully connected (FC) layers [61], which can be stacked to form a CNN architecture as illustrated in Figure 3. These layers also incorporate an activation function, which is a crucial aspect of their function [62]. The convolutional layer performs a mathematical operation, known as the convolution, between the input and a filter of size M×M to extract features from the input data. As the filter is moved over the input, the dot product of its M×M dimensions and the input is calculated, and the output is forwarded to the succeeding layer [63].
The pooling layer commonly comes after the convolutional layer, reduces the size of the feature matrix, expedites training, and minimizes the number of parameters to avoid the overfitting problem. The pooling layer typically follows the convolutional layer and serves to reduce the size of the feature matrix, speed up training, and reduce the number of parameters to prevent overfitting issues [64].
The neurons, weights, and biases in a fully connected (FC) layer play a significant role in establishing connections between the neurons of consecutive layers. These layers are usually the final ones to be added in a CNN architecture and precede the output layer. A significant aspect of CNN models is the activation function, which determines which pieces of information from the model should be forwarded to the output nodes and which should be disregarded, thereby making the network less linear. The activation functions in a CNN model are responsible for determining whether a neuron is activated or not [65].
The proposed model incorporates a DENSE layer for enhanced and expedited responses. This layer effectively combines CNN and DBN. The layer has 66 parameters on both the input and output sides. The ReLU (rectified linear activation unit) was utilized in this experiment. To better represent complicated relationships between the inputs and outputs of a neural network, the ReLU function transforms the linear function's output into a nonlinear one. The output of each neuron in a particular layer of a neural network is transmitted into the ReLU function. The output of the ReLU function is then utilized as the input for the subsequent neural network layer. The ReLU function efficiently solves the vanishing gradient problem and is significantly quicker than earlier activation functions. The vanishing gradient problem hinders the network's ability to learn when the gradient of the loss function with respect to the network's weights becomes negligible. Given that the binary derivative of the ReLU function, proves the effectiveness for non-negative values between 0 and 1, it has the potential to address the problem of vanishing gradients in deep neural networks. This property ensures that the gradient does not decrease excessively as the network becomes deeper. It is mathematically represented as:
RELU(x)={0 if x<0x if x>=0 | (3.2) |
The machine learning technology known as a DBN differs significantly from a DNN in several significant ways. They use a feed-forward neural network to process networks and feature a feed-forward architecture with numerous hidden layers. DBNs were designed to replace conventional neural networks during deeply layered network training because of their sluggish learning, the tendency to become caught in local minima due to poor parameter selection, and a necessity for many training datasets [66].
The deep belief network's unsupervised learning algorithm is made up of belief networks and restricted boltzmann machines (RBMs). DBN is a multi-layered belief network, similar to a perceptron and backpropagation neural network, where each layer must be trained before training the DBN as a whole. This is achieved by using the greedy algorithm, which trains the RBMs one by one until they are all trained. DBN has a layered architecture, with the upper two levels being associative memory and the bottom layer consisting of visible units. The relationships between the lower layers are indicated by arrows pointing toward the layer closest to the data.
The lowest layers of the DBN use directed acyclic connections to convert the associative memory into quantifiable data, with the lowest layer of visible units accepting either binary or real data as the input. Like RBM, DBN has no intra-layer connections, with hidden units representing the characteristics that embody the relationships in the data as represented in Figure 4. The two levels are linked by a matrix of proportional weights, W, with the units of each layer being connected to the layer above them [66]. Common activation functions used in DBN include ReLU, SoftMax, tanH, and sigmoid, each with a specific use. Sigmoid and SoftMax functions are typically used for binary classification models, while SoftMax functions are used for multiclass classification using Eq (3.3).
σ(→z)i=ezi∑Kj=1ezj | (3.3) |
The proposed model is implemented using Python, version 3.9, because it is a language that is frequently used for these kinds of studies. We used the Keras package of the TensorFlow library because Keras is easy to implement and it is a structural package. For coding purposes, the Jupyter Notebook was utilized since it displays the results after every code cell. In this experiment, Windows 10 Pro was used with an I5-6th Gen Laptop. The laptop contained a 2.4 GHz processor and 8 GB of RAM.
The model's performance was assessed through an evaluation process. An improvement in the model's results leads to an increase in its performance, while subpar results reveal differences in performance. Researchers often validate the model using accuracy, precision, recall, F1-score, and G-mean score based on the false negative (FN), true negative (TN), false positive (FP), and true positive (TP). The model's performance is evaluated in terms of attack detection using various metrics. During the model development, 80% of the dataset was utilized and pre-processed. The data were then subjected to evaluation and the performance was analyzed based on these metrics [67].
Accuracy in a machine learning classification model refers to the fraction of accurate classifications to the total number of negative and positive observations. Precision measures the accuracy of positive predictions and is equivalent to reliability and positive predictive value. Recall measures the model's capability to identify TP results and is synonymous with the TP rate. The F1-score combines precision and recall to provide a single metric that reflects the model's overall performance. The geometric mean, which is calculated by taking the nth root of the product of all numbers in a set, where n represents the number of observations, provides a single equivalence threshold that combines the true negative rate with the true positive rate.
GM=n√x1×x2×...xn | (4.1) |
In our study, we carried out experiments for the proposed model using two approaches. The first experiment involved comparing our proposed model with traditional models without utilizing any balancing strategy. In the second experiment, we compared the proposed model with other models using two balancing techniques: SMOTE and SMOTETomek. The proposed model was evaluated using the Multi-Step Cyber-attack dataset.
The performance of the proposed approach was evaluated against the results from [48] in terms of the G-mean score, as depicted in Figure 5. Our proposed approach outperformed the G-mean scores of the Decision Tree (DT) and Random Forest (RF) in [48]. During the training process, five epochs were used. The G-mean score for the proposed approach was 0.813, which is more optimum than [48] scores of 0.710 and 0.650. The model has been enhanced by incorporating the Adam optimizer, with the loss function set as sparse categorical entropy. The activation function of SoftMax was used in the output layer.
The proposed model outperformed all the other traditional models and also outperforms the accuracy score of [47], as shown in Table 3. The comparison between the CNN and the proposed approach is illustrated in Figure 6. The proposed model achieved the highest results for all selected metrics among all the models, as indicated in Table 3. Furthermore, the response time of the proposed model was less compared to other models. The proposed model was tested using 3220 instances with a batch size of 32 and verbose set to 1.
References | Mode | Accuracy | Precision | Recall | F1-score | G-Mean |
[47] | 0.825 | 0.942 | 0.911 | 0.926 | x | |
[48] | DT | x | x | x | x | 0.71 |
RF | x | x | x | x | 0.65 | |
Other techniques | NB | 0.787 | 0.462 | 0.627 | 0.313 | x |
DNN | 0.687 | 0.114 | 0.166 | 0.135 | x | |
LSTM | 0.99 | 0.708 | 0.668 | 0.682 | x | |
GRU | 0.97 | 0.554 | 0.522 | 0.532 | x | |
CNN | 0.993 | 0.813 | 0.77 | 0.788 | x | |
RNN | 0.99 | 0.777 | 0.753 | 0.763 | x | |
Proposed method | CNN-DBN | 0.996 | 0.82 | 0.779 | 0.801 | 0.81 |
The proposed approach was compared with [47] and with [48] using the SMOTE balancing strategy, as shown in Figure 7. The results show that the proposed approach outperforms [47] with higher accuracy, precision, recall, and F1-score and [48] higher G-mean scores. The training process was conducted over five epochs and the G-mean score for the proposed approach was 0.975, while the G-mean scores for [48] using DT and RF were 0.780 and 0.790, respectively. This indicates the superiority of the proposed model. The sparse categorical entropy loss function was utilized in the training process, and the model was tested on the Adam optimizer. The output layer was activated using the SoftMax activation function for multi-class classification.
The proposed model was compared to other traditional models, as shown in Table 4, and the results indicate that it surpassed their performance. The comparison between the CNN and the suggested model using SMOTE is presented in Figure 8. The proposed model exhibits the highest accuracy, recall, precision, and F1-score score when compared to the other models, as displayed in Table 4. Additionally, it has a faster response time than the other models. The performance of our model was evaluated on the MSCAD dataset, using 13, 276 instances with a batch size of 32 and verbose set to 1. The results confirm that the proposed approach outperforms the other models, with 20% of the data being used for testing.
References | Model | Accuracy | Precision | Recall | F1-score | G-Mean |
[47] | 0.825 | 0.942 | 0.911 | 0.926 | x | |
[48] | DT | x | x | x | x | 0.78 |
RF | x | x | x | x | 0.79 | |
Other techniques | NB | 0.641 | 0.644 | 0.641 | 0.573 | x |
DNN | 0.166 | 0.027 | 0.166 | 0.047 | x | |
LSTM | 0.97 | 0.97 | 0.971 | 0.97 | x | |
GRU | 0.943 | 0.932 | 0.945 | 0.943 | x | |
CNN | 0.972 | 0.971 | 0.972 | 0.971 | x | |
RNN | 0.954 | 0.954 | 0.956 | 0.955 | x | |
Proposed method | CNN-DBN | 0.976 | 0.976 | 0.975 | 0.975 | 0.97 |
Our proposed approach surpassed the [47] accuracy, precision, recall, and F1-score and achieved a SMOTETomek G-mean score of 0.978, as demonstrated in Figure 9. This score succeeds the G-mean scores of both the DT and RF methods described in [48]. The G-mean scores for [48] DT and RF were 0.830 and 0.820, respectively, showcasing the superior performance of our model. The model was trained using the Adam optimizer, and the activation function named SoftMax was utilized in the final layer. The process of training took place over five epochs and utilized the sparse categorical entropy loss function.
In Figure 10, we compared the performance of the proposed technique with that of a CNN using SMOTETomek. The results are presented in Table 5, which includes the results of both the proposed model and other traditional models. The proposed model outperforms other models in terms of F1-score score, precision, recall, and accuracy, as demonstrated in Table 5. Additionally, our model has a faster response time compared to other models. The model was tested on 13, 233 instances using a batch size of 32 and a verbose level of 1 on the MSCAD dataset. The results clearly show that the suggested model produces more optimal scores than other models, even though the scores of the CNN model are slightly lower. However, the CNN model has a longer response time compared to the proposed approach.
References | Model | Accuracy | Precision | Recall | F1-score | G-Mean |
[47] | 0.825 | 0.942 | 0.911 | 0.926 | x | |
[48] | DT | x | x | x | x | 0.83 |
RF | x | x | x | x | 0.82 | |
Other techniques | NB | 0.643 | 0.648 | 0.643 | 0.574 | x |
DNN | 0.167 | 0.278 | 0.166 | 0.047 | x | |
LSTM | 0.968 | 0.97 | 0.969 | 0.968 | x | |
GRU | 0.937 | 0.934 | 0.939 | 0.943 | x | |
CNN | 0.971 | 0.972 | 0.972 | 0.971 | x | |
RNN | 0.953 | 0.955 | 0.954 | 0.954 | x | |
Proposed method | CNN-DBN | 0.981 | 0.979 | 0.978 | 0.979 | 0.98 |
In comparison to previous models, the experimental results demonstrate that the proposed approach provides optimal performance and quicker response time. As shown in Table 3, all scores were evaluated without using any balancing strategy. The CNN accuracy is near to the proposed approach accuracy but it takes more time to execute than our approach. With our proposed methodology, we can also identify binary-class and multi-class attacks. The proposed model has the best accuracy of 99.6%. It also provides a precision of 82%, recall of 77.9%, F1-score of 80.1%, and a G-mean score of 0.813 which provides an improved solution.
The performance of the proposed approach utilizing SMOTE is presented in Table 4. It is evident from the results that the proposed approach outperforms all other models and has a faster execution time. The performance of CNN and LSTM models came closest to the suggested model, but they took much longer to execute. Our model achieved equal precision and accuracy of 97.6%, whereas a recall has a value of 97.5% and a G-mean score of 0.975.
The results of combining SMOTE (oversampling) and Tomek (undersampling), referred to as SMOTETomek, are presented in Table 5. The Table depicts that the proposed model performs more optimally than others in terms of F1-score, G-mean score, recall, accuracy, and precision. Although the CNN model can be compared to the proposed approach, it takes a longer time to execute. The proposed method is suitable for detecting binary as well as multi-class intrusion with a faster response time. In contrast, the proposed model has the best accuracy of 98.1%, provides the best precision of 97.9%, recall of 97.8%, F1-score of 97.9% compared to [47], and the G-mean score of 0.973 compared to [48].
The response time was also calculated for the DL models which were used with the same dataset. Our proposed model responded faster when compared with all the models without using any balancing strategy. The response time for the proposed model is 20 seconds, while for RNN, CNN, GRU, and LSTM, the response time is 41 seconds, 22 seconds, 122 seconds, and 113 seconds, respectively. In contrast to other models, the CNN exhibits a shorter response time. Therefore, we compare the response time of the proposed model with that of the CNN to evaluate its efficiency. By employing SMOTE, the response time for the proposed model is recorded as 14 seconds, while for the CNN, it is 17 seconds. Additionally, when utilizing SMOTETomek, the response time for the proposed model is 13 seconds, whereas, for the CNN, it is 15 seconds. These results clearly demonstrate the effectiveness of the proposed model in terms of response time.
The exponential growth of industrial networks and inadequate security assessments pave the way for cyber attackers to cause significant losses and damage to confidential data and sensitive information. A DL-based architecture for intrusion detection in industrial networks is presented in this research. The model employs the use of CNN and DBN algorithms to enhance its performance and reduce both training and response times. The proposed framework's performance was evaluated through experiments on the MSCAD. The experimental findings demonstrated that, in comparison to other conventional models, the suggested approach achieves optimal results with a 99.6% accuracy without using any balancing strategy, 97.6% accuracy using SMOTE, and 98.1% accuracy rate using SMOTETomek for the tested dataset. This extensive research work achieves a high accuracy rate for any anomaly in a short time. It warns the administrator of the industrial network that the system has detected an attack. The administrator then investigates the matter to stop the attacker from getting off the system. The network industry will benefit from this study to design attack-detection devices. In the future, when the IDS detects any intrusion, the same IDS, also prevents the network from intrusion and blocks it. This auto-prevention technique will save the industrial network from losing sensitive information. When the system detects an attack, it should block the next data packet from getting access into the network, thus making the network safe for communication and other industrial purposes. Moreover, other balancing techniques such as SamplePairing, ADASYN, etc will be used to improve the performance of the proposed model in the future as well.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code (NU/RG/SERC/12/3).
The authors declare there is no conflict of interest.
[1] |
Guinness L, Paul RC, Martins JS, et al. (2018) Determinants of health care utilization: the case of Timor-Leste. Int Health 10: 412-420. https://doi.org/10.1093/inthealth/ihy044. doi: 10.1093/inthealth/ihy044
![]() |
[2] | Witter S, Bertone M, Dale E, et al. World Health Organization, Geneva. Health Financing in Fragile and Conflict-Affected Situations: A Review of The Evidence (2020) .Available from: https://www.who.int/publications/i/item/health-financing-policy-in-fragile-conflict-affected-situations. |
[3] |
Bertone MP, Jowett M, Dale E, et al. (2019) Health financing in fragile and conflict-affected settings: What do we know, seven years on? Soc Sci Med 232: 209-219. https://doi.org/10.1016/j.socscimed.2019.04.019. doi: 10.1016/j.socscimed.2019.04.019
![]() |
[4] |
Qin VM, Hone T, Millett C, et al. (2018) The impact of user charges on health outcomes in low-income and middle-income countries: a systematic review. BMJ Glob Health 3: e001087https://doi.org/10.1136/bmjgh-2018-001087. doi: 10.1136/bmjgh-2018-001087
![]() |
[5] |
McKinnon B, Harper S, Kaufman JS (2015) Who benefits from removing user fees for facility-based delivery services? Evidence on socioeconomic differences from Ghana, Senegal, and Sierra Leone. Soc Sci Med 135: 117-123. https://doi.org/10.1016/j.socscimed.2015.05.003. doi: 10.1016/j.socscimed.2015.05.003
![]() |
[6] |
McKinnon B, Harper S, Kaufman JS, et al. (2015) Removing user fees for facility-based delivery services: a difference-in-differences evaluation from ten sub-Saharan African countries. Health Policy Plan 30: 432-441. https://doi.org/10.1093/heapol/czu027. doi: 10.1093/heapol/czu027
![]() |
[7] | The World Bank Health Equity and Financial Protection Report–Timor-Leste (2014) .Available from: https://documents1.worldbank.org/curated/en/959881467992506455/pdf/103445-WP-P146116-Timor-Leste-Health-Equity-and-Financial-Protection-Report-FINAL-PUBLIC.pdf. |
[8] |
Mackenbach JP, Valverde JR, Artnik B, et al. (2018) Trends in health inequalities in 27 European countries. Proc Natl Acad Sci U S A 115: 6440-6445. https://doi.org/10.1073/pnas.1800028115. doi: 10.1073/pnas.1800028115
![]() |
[9] |
Leão T, Campos-Matos I, Bambra C, et al. (2018) Welfare states, the great recession, and health: trends in educational inequalities in self-reported health in 26 European countries. PLoS One 13: e0193165https://doi.org/10.1371/journal.pone.0193165. doi: 10.1371/journal.pone.0193165
![]() |
[10] |
Besnier E, Thomson K, Stonkute D, et al. (2019) Which public health interventions are effective in reducing morbidity, mortality, and health inequalities from infectious diseases amongst children in low-income and middle-income countries (LMICs): protocol for an umbrella review. BMJ Open 9: e032981https://doi.org/10.1136/bmjopen-2019-032981. doi: 10.1136/bmjopen-2019-032981
![]() |
[11] | The Democratic Republic of Timor-Leste Timor-Leste Strategic Development Plan 2011–2030, 2013 Available from: https://www.adb.org/sites/default/files/linked-documents/cobp-tim-2014-2016-sd-02.pdf. |
[12] |
Wing K, Low G, Sharma M, et al. (2018) Building a national eye-care service in post-conflict Timor-Leste. Bull World Health Organ 96: 716-722. https://doi.org/10.2471/BLT.18.212506. doi: 10.2471/BLT.18.212506
![]() |
[13] |
Guest GD, Scott DF, Xavier JP, et al. (2017) Surgical capacity building in Timor-Leste: a review of the first 15 years of the Royal Australasian College of Surgeons-led Australian Aid program. ANZ J Surg 87: 436-440. https://doi.org/10.1111/ans.13768. doi: 10.1111/ans.13768
![]() |
[14] |
Watters DA, McCaig E, Nagra S, et al. (2019) Surgical training programs in the South Pacific, Papua New Guinea and Timor Leste. Br J Surg 106: e53-e61. https://doi.org/10.1002/bjs.11057. doi: 10.1002/bjs.11057
![]() |
[15] |
Asante AD, Martins N, Otim ME, et al. (2014) Retaining doctors in rural Timor-Leste: a critical appraisal of the opportunities and challenges. Bull World Health Organ 92: 277-282. https://doi.org/10.2471/BLT.13.123141. doi: 10.2471/BLT.13.123141
![]() |
[16] |
Hou X, Witter S, Zaman RU, et al. (2016) What do health workers in Timor-Leste want, know and do? Findings from a national health labor market survey. Hum Resour Health 14: 69https://doi.org/10.1186/s12960-016-0164-1. doi: 10.1186/s12960-016-0164-1
![]() |
[17] | UNFPA, Plan International and República Democrática de Timor-Leste. Teenage pregnancy and early marriage in Timor-Leste. Research on the decision-making pathways of young women in the municipalities of Covalima, Aileu, and Dili, 2017 Available from: https://timor-leste.unfpa.org/sites/default/files/pub-pdf/TPEM%20REPORT_ENGLISH_LOW%20DEF%20-%2048%20pages.pdf. |
[18] |
Kennedy E, Gray N, Azzopardi P, et al. (2011) Adolescent fertility and family planning in East Asia and the Pacific: a review of DHS reports. Reprod Health 8: 11https://doi.org/10.1186/1742-4755-8-11. doi: 10.1186/1742-4755-8-11
![]() |
[19] |
Gray N, Azzopardi P, Kennedy E, et al. (2013) Improving adolescent reproductive health in Asia and the Pacific: do we have the data? A review of DHS and MICS surveys in nine countries. Asia Pac J Public Health 25: 134-144. https://doi.org/10.1177/1010539511417423. doi: 10.1177/1010539511417423
![]() |
[20] |
de Vargas Nunes Coll C, Ewerling F, Hellwig F, et al. (2019) Contraception in adolescence: the influence of parity and marital status on contraceptive use in 73 low- and middle-income countries. Reprod Health 16: 21https://doi.org/10.1186/s12978-019-0686-9. doi: 10.1186/s12978-019-0686-9
![]() |
[21] |
Yaya S, Zegeye B, Ahinkorah BO, et al. (2020) Inequality in fertility rate among adolescents: evidence from Timor-Leste demographic and health surveys 2009–2016. Arch Public Health 78: 98https://doi.org/10.1186/s13690-020-00484-1. doi: 10.1186/s13690-020-00484-1
![]() |
[22] |
Kennedy E, Binder G, Humphries-Waa K, et al. (2020) Gender inequalities in health and wellbeing across the first two decades of life: an analysis of 40 low-income and middle-income countries in the Asia-Pacific region. Lancet Glob Health 8: e1473-e1488. https://doi.org/10.1016/S2214-109X(20)30354-5. doi: 10.1016/S2214-109X(20)30354-5
![]() |
[23] |
Rees SJ, Tol W, Mohsin M, et al. (2016) A high-risk group of pregnant women with elevated levels of conflict-related trauma, intimate partner violence, symptoms of depression, and other forms of mental distress in post-conflict Timor-Leste. Transl Psychiatry 6: e725https://doi.org/10.1038/tp.2015.212. doi: 10.1038/tp.2015.212
![]() |
[24] | Asian Development Bank Timor-Leste. Country Gender Assessment, 2017 Available from: https://www.adb.org/sites/default/files/institutional-document/84126/timor-leste-country-gender-assessment.pdf. |
[25] | Nguyen A, Darcy A, Kelly L CARE rapid gender analysis COVID-19 Timor-Leste. Care, 2020 Available from: https://reliefweb.int/sites/reliefweb.int/files/resources/20200515%20Timor-Leste%20Rapid%20Gender%20Analysis%20COVID-FINAL.pdf. |
[26] | World Health Organization Global and regional estimates of violence against women: prevalence and health effects of intimate partner violence and non-partner sexual violence, 2017 Available from: https://apps.who.int/iris/bitstream/handle/10665/85239/9789241564625_eng.pdf. |
[27] | Plan International, Save the Children Because We Matter. Addressing COVID-19 and violence against girls in Asia-Pacific, 2020 Available from: https://reliefweb.int/sites/reliefweb.int/files/resources/PI_STC_BecauseWeMatterPolicyBrief-FINAL.pdf. |
[28] | Niner S Barlake: an exploration of marriage practices and issues of women's status in Timor-Leste, 2012 Available from: https://research.monash.edu/en/publications/barlake-an-exploration-of-marriage-practices-and-issues-of-womens. |
[29] | Roque R (2013) Marriage traps: colonial interactions with indigenous marriage ties in East Timor. Brit Acad Scholarship Online https://doi.org/10.5871/bacad/9780197265246.003.0011. |
[30] |
Samanta T (2020) Women's empowerment as self-compassion? Empirical observations from India. PLoS One 15: e0232526https://doi.org/10.1371/journal.pone.0232526. doi: 10.1371/journal.pone.0232526
![]() |
[31] | Samari G (2019) Women's empowerment in Egypt: the reliability of a complex construct. Sex Reprod Health Matters 27: 1586816https://doi.org/10.1080/26410397.2019.1586816. |
[32] |
Singh SK, Sharma B, Vishwakarma D, et al. (2019) Women's empowerment and use of contraception in India: macro and micro perspectives emerging from NFHS-4 (2015–16). Sex Reprod Healthc 19: 15-23. https://doi.org/10.1016/j.srhc.2018.11.003. doi: 10.1016/j.srhc.2018.11.003
![]() |
[33] | United Nations Department of Economic and Social Affairs. World fertility and family planning 2020, 2020 Available from: https://www.un.org/development/desa/pd/sites/www.un.org.development.desa.pd/files/files/documents/2020/Aug/un_2020_worldfertilityfamilyplanning_highlights.pdf. |
[34] | Sudharsanan N, Bloom DE (2018) Future directions for the demography of aging: proceedings of a workshop. The demography of aging in low- and middle-income countries: chronological versus functional perspectives Washington (DC): National Academies Press (US), Available from: https://www.ncbi.nlm.nih.gov/books/NBK513069/. |
[35] | Kurjak A, Carrera JM (2005) Declining fertility in the developed world and high maternal mortality in developing countries—how do we respond? J Perinat Med 33: 95-99. https://doi.org/10.1515/JPM.2005.017. |
[36] |
Sánchez-Barricarte JJ (2017) Mortality-fertility synergies during the demographic transition in the developed world. Popul Stud 71: 155-170. https://doi.org/10.1080/00324728.2017.1294701. doi: 10.1080/00324728.2017.1294701
![]() |
[37] |
Bongaarts J (2003) Completing the fertility transition in the developing world: The role of educational differences and fertility preferences. Popul Stud 57: 321-335. https://doi.org/10.1080/0032472032000137835. doi: 10.1080/0032472032000137835
![]() |
[38] |
Ahmed S, Li Q, Liu L, et al. (2012) Maternal deaths averted by contraceptive use: an analysis of 172 countries. Lancet 380: 111-125. https://doi.org/10.1016/S0140-6736(12)60478-4. doi: 10.1016/S0140-6736(12)60478-4
![]() |
[39] | Basu A, Bharati P, Mukhopadhyay B, et al. Fertility decline and differences in less-developed countries: an anthropological microstudy of some communities of West Bengal, India, and Upper Khumbu, Nepal, 1981 Available from: https://pubmed.ncbi.nlm.nih.gov/7348192/. |
[40] |
Barham T, Champion B, Foster AD, et al. (2021) Thirty-five years later: Long-term effects of the Matlab maternal and child health/family planning program on older women's well-being. Proc Natl Acad Sci U S A 118: e2101160118https://doi.org/10.1073/pnas.2101160118. doi: 10.1073/pnas.2101160118
![]() |
[41] |
Rogers E, Stephenson R (2018) Examining temporal shifts in the proximate determinants of fertility in low- and middle-income countries. J Biosoc Sci 50: 551-568. https://doi.org/10.1017/S0021932017000529. doi: 10.1017/S0021932017000529
![]() |
[42] |
Wulifan JK, Brenner S, Jahn A, et al. (2016) A scoping review on determinants of unmet need for family planning among women of reproductive age in low- and middle-income countries. BMC Womens Health 16: 2https://doi.org/10.1186/s12905-015-0281-3. doi: 10.1186/s12905-015-0281-3
![]() |
[43] |
Atake EH, Gnakou Ali P (2019) Women's empowerment and fertility preferences in high fertility countries in sub-Saharan Africa. BMC Womens Health 19: 54https://doi.org/10.1186/s12905-019-0747-9. doi: 10.1186/s12905-019-0747-9
![]() |
[44] |
Haque R, Alam K, Rahman SM, et al. (2021) Women's empowerment and fertility decision-making in 53 low and middle resource countries: a pooled analysis of demographic and health surveys. BMJ Open 11: e045952https://doi.org/10.1136/bmjopen-2020-045952. doi: 10.1136/bmjopen-2020-045952
![]() |
[45] |
Yaya S, Odusina EK, Uthman OA, et al. (2020) What does women's empowerment have to do with malnutrition in sub-Saharan Africa? Evidence from demographic and health surveys from 30 countries. Glob Health Res Policy 5: 1https://doi.org/10.1186/s41256-019-0129-8. doi: 10.1186/s41256-019-0129-8
![]() |
[46] |
Abreha SK, Zereyesus YA (2021) Women's empowerment and infant and child health status in sub-Saharan Africa: a systematic review. Matern Child Health J 25: 95-106. https://doi.org/10.1007/s10995-020-03025-y. doi: 10.1007/s10995-020-03025-y
![]() |
[47] |
Upadhyay UD, Gipson JD, Withers M, et al. (2014) Women's empowerment and fertility: a review of the literature. Soc Sci Med 115: 111-120. https://doi.org/10.1016/j.socscimed.2014.06.014. doi: 10.1016/j.socscimed.2014.06.014
![]() |
[48] |
Prata N, Fraser A, Huchko MJ, et al. (2017) Women's empowerment and family planning: a review of the literature. J Biosoc Sci 49: 713-743. https://doi.org/10.1017/S0021932016000663. doi: 10.1017/S0021932016000663
![]() |
[49] |
Chung H, van der Horst M (2018) Women's employment patterns after childbirth and the perceived access to and use of flexitime and teleworking. Hum Relat 71: 47-72. https://doi.org/10.1177/0018726717713828. doi: 10.1177/0018726717713828
![]() |
[50] |
Van den Broeck G, Maertens M (2015) Female employment reduces fertility in rural Senegal. PLoS One 10: e0122086https://doi.org/10.1371/journal.pone.0122086. doi: 10.1371/journal.pone.0122086
![]() |
[51] |
Götmark F, Andersson M (2020) Human fertility in relation to education, economy, religion, contraception, and family planning programs. BMC Public Health 20: 265https://doi.org/10.1186/s12889-020-8331-7. doi: 10.1186/s12889-020-8331-7
![]() |
[52] |
Sheikh SM, Loney T (2018) Is educating girls the best investment for South Asia? Association between female education and fertility choices in South Asia: a systematic review of the literature. Front Public Health 6: 172https://doi.org/10.3389/fpubh.2018.00172. doi: 10.3389/fpubh.2018.00172
![]() |
[53] | Ononokpono DN, Odimegwu CO, Usoro NA (2020) Contraceptive use in Nigeria: Does social context matter? Afr J Reprod Health 24: 133-142. https://doi.org/10.29063/ajrh2020/v24i1.14. |
[54] |
Na M, Jennings L, Talegawkar SA, et al. (2015) Association between women's empowerment and infant and child feeding practices in sub-Saharan Africa: an analysis of Demographic and Health Surveys. Public Health Nutr 18: 3155-3165. https://doi.org/10.1017/S1368980015002621. doi: 10.1017/S1368980015002621
![]() |
[55] |
Bado AR, Sathiya Susuman A (2016) Women's education and health inequalities in under-five mortality in selected sub-Saharan African countries, 1990–2015. PLoS One 11: e0159186https://doi.org/10.1371/journal.pone.0159186. doi: 10.1371/journal.pone.0159186
![]() |
[56] |
Gudbrandsen NH (2013) Female autonomy and fertility in Nepal. South Asia Econ J 14: 157-173. https://doi.org/10.1177/1391561413477945. doi: 10.1177/1391561413477945
![]() |
[57] | Khare S (2021) Impact of women's education on decision making regarding their children affairs. J Sci Res 65: 144-149. https://doi.org/10.37398/JSR.2021.650424. |
[58] |
Nkoka O, Lee D, Chuang KY, et al. (2021) Multilevel analysis of the role of women's empowerment on use of contraceptive methods among married Cambodian women: evidence from demographic health surveys between 2005 and 2014. BMC Womens Health 21: 9https://doi.org/10.1186/s12905-020-01141-z. doi: 10.1186/s12905-020-01141-z
![]() |
[59] |
Shittu WO, Abdullah A (2019) Fertility, education, and female labor participation: Dynamic panel analysis of ASEAN-7 countries. Int J Soc Econ 46: 66-82. https://doi.org/10.1108/IJSE-11-2017-0559. doi: 10.1108/IJSE-11-2017-0559
![]() |
[60] | Asian Development Bank Gender equality in the labor market in the Philippines. Asian Development Bank, 2013 Available from: https://www.adb.org/sites/default/files/publication/31194/gender-equality-labor-market-philippines.pdf. |
[61] |
Nguyen TT, Darnell A, Weissman A, et al. (2020) Social, economic, and political events affect gender equity in China, Nepal, and Nicaragua: a matched, interrupted time-series study. Glob Health Action 13: 1712147https://doi.org/10.1080/16549716.2020.1712147. doi: 10.1080/16549716.2020.1712147
![]() |
[62] |
de Loenzien M, Mac QNH, Dumont A (2021) Women's empowerment and elective cesarean section for a single pregnancy: a population-based and multivariate study in Vietnam. BMC Pregnancy Childbirth 21: 3https://doi.org/10.1186/s12884-020-03482-x. doi: 10.1186/s12884-020-03482-x
![]() |
[63] |
Anik AI, Islam MR, Rahman MS (2021) Do women's empowerment and socioeconomic status predict the adequacy of antenatal care? A cross-sectional study in five South Asian countries. BMJ Open 11: e043940https://doi.org/10.1136/bmjopen-2020-043940. doi: 10.1136/bmjopen-2020-043940
![]() |
[64] | American Bar Association Women's entrepreneurship in Timor-Leste: an assessment of opportunities, barriers, and a path forward. Key findings and recommendations, 2021 Available from: https://www.americanbar.org/content/dam/aba/directories/roli/timorleste/wagetimorleste.pdf. |
[65] |
Sebayang SK, Efendi F, Astutik E (2019) Women's empowerment and the use of antenatal care services: analysis of demographic health surveys in five Southeast Asian countries. Women Health 59: 1155-1171. https://doi.org/10.1080/03630242.2019.1593282. doi: 10.1080/03630242.2019.1593282
![]() |
[66] |
Phan L (2016) Measuring women's empowerment at household level using DHS data of four Southeast Asian countries. Soc Indic Res 126: 359-378. https://doi.org/10.1007/s11205-015-0876-y. doi: 10.1007/s11205-015-0876-y
![]() |
[67] |
Khanal V, Brites da Cruz JL, Mishra SR, et al. (2015) Under-utilization of antenatal care services in Timor-Leste: results from Demographic and Health Survey 2009–2010. BMC Pregnancy Childbirth 15: 211https://doi.org/10.1186/s12884-015-0646-5. doi: 10.1186/s12884-015-0646-5
![]() |
[68] | United Nations Educational, Scientific and Cultural Organization Literacy rates continue to rise from one generation to the next, 2017 Available from: http://uis.unesco.org/sites/default/files/documents/fs45-literacy-rates-continue-rise-generation-to-next-en-2017_0.pdf. |
[69] |
Gupta MD, Zhenghua J, Bohua L, et al. (2015) Why is son preference so persistent in East and South Asia? A cross-country study of China, India, and the Republic of Korea. J Dev Stud 40: 153-187. https://doi.org/10.1080/00220380412331293807. doi: 10.1080/00220380412331293807
![]() |
[70] |
Hesketh T, Lu L, Xing ZW (2011) The consequences of son preference and sex-selective abortion in China and other Asian countries. CMAJ 183: 1374-1377. https://doi.org/10.1503/cmaj.101368. doi: 10.1503/cmaj.101368
![]() |
[71] |
Channon MD, Puri M, Gietel-Basten S, et al. (2021) Prevalence and correlates of sex-selective abortions and missing girls in Nepal: evidence from the 2011 Population Census and 2016 Demographic and Health Survey. BMJ Open 11: e042542https://doi.org/10.1136/bmjopen-2020-042542. doi: 10.1136/bmjopen-2020-042542
![]() |
[72] |
Hoq MN (2020) Influence of the preference for sons on contraceptive use in Bangladesh: a multivariate analysis. Heliyon 6: e05120https://doi.org/10.1016/j.heliyon.2020.e05120. doi: 10.1016/j.heliyon.2020.e05120
![]() |
[73] |
Miller BD (2001) Female-selective abortion in Asia: patterns, policies, and debates. Am Anthropol 103: 1083-1095. https://doi.org/10.1525/aa.2001.103.4.1083. doi: 10.1525/aa.2001.103.4.1083
![]() |
[74] |
Ganatra B (2008) Maintaining access to safe abortion and reducing sex ratio imbalances in Asia. Reprod Health Matters 16: 90-98. https://doi.org/10.1016/S0968-8080(08)31394-9. doi: 10.1016/S0968-8080(08)31394-9
![]() |
[75] |
Browne TK (2017) How sex selection undermines reproductive autonomy. J Bioeth Inq 14: 195-204. https://doi.org/10.1007/s11673-017-9783-z. doi: 10.1007/s11673-017-9783-z
![]() |
[76] |
Chakrabarti A (2017) Female land ownership and fertility in Nepal. J Dev Stud 54: 1698-1715. https://doi.org/10.1080/00220388.2017.1400017. doi: 10.1080/00220388.2017.1400017
![]() |
[77] |
Mishra K, Sam A (2016) Does women's land ownership promote their empowerment? Empirical evidence from Nepal. World Dev 78: 360-371. https://doi.org/10.1016/j.worlddev.2015.10.003. doi: 10.1016/j.worlddev.2015.10.003
![]() |
[78] |
Seidu AA, Aboagye RG, Okyere J, et al. (2021) Women's autonomy in household decision-making and safer sex negotiation in sub-Saharan Africa: an analysis of data from 27 Demographic and Health Surveys. SSM Popul Health 14: 100773https://doi.org/10.1016/j.ssmph.2021.100773. doi: 10.1016/j.ssmph.2021.100773
![]() |
[79] |
Seidu AA, Ahinkorah BO, Ameyaw EK, et al. (2020) What has women's reproductive health decision-making capacity and other factors got to do with pregnancy termination in sub-Saharan Africa? Evidence from 27 cross-sectional surveys. PLoS One 15: e0235329https://doi.org/10.1371/journal.pone.0235329. doi: 10.1371/journal.pone.0235329
![]() |
[80] |
Atteraya MS, Kimm H, Song IH (2014) Women's autonomy in negotiating safer sex to prevent HIV: findings from the 2011 Nepal Demographic and Health Survey. AIDS Educ Prev 26: 1-12. https://doi.org/10.1521/aeap.2014.26.1.1. doi: 10.1521/aeap.2014.26.1.1
![]() |
[81] |
Debnath S (2015) The impact of household structure on female autonomy in developing countries. J Dev Stud 51: 485-502. https://doi.org/10.1080/00220388.2014.983909. doi: 10.1080/00220388.2014.983909
![]() |
[82] |
Do M, Kurimoto N (2012) Women's empowerment and choice of contraceptive methods in selected African countries. Int Perspect Sex Reprod Health 38: 23-33. https://doi.org/10.1363/3802312. doi: 10.1363/3802312
![]() |
[83] |
Some SYM, Pu C, Huang SL (2021) Empowerment and use of modern contraceptive methods among married women in Burkina Faso: a multilevel analysis. BMC Public Health 21: 1498https://doi.org/10.1186/s12889-021-11541-x. doi: 10.1186/s12889-021-11541-x
![]() |
[84] |
Maxwell L, Devries K, Zionts D, et al. (2015) Estimating the effect of intimate partner violence on women's use of contraception: a systematic review and meta-analysis. PLoS One 10: e0118234https://doi.org/10.1371/journal.pone.0118234. doi: 10.1371/journal.pone.0118234
![]() |
[85] |
Maxwell L, Brahmbhatt H, Ndyanabo A, et al. (2018) The impact of intimate partner violence on women's contraceptive use: evidence from the Rakai Community Cohort Study in Rakai, Uganda. Soc Sci Med 209: 25-32. https://doi.org/10.1016/j.socscimed.2018.04.050. doi: 10.1016/j.socscimed.2018.04.050
![]() |
[86] |
Forrest W, Arunachalam D, Navaneetham K (2018) Intimate partner violence and contraceptive use in India: the moderating influence of conflicting fertility preferences and contraceptive intentions. J Biosoc Sci 50: 212-226. https://doi.org/10.1017/S002193201700013X. doi: 10.1017/S002193201700013X
![]() |
[87] |
Williams CM, Larsen U, McCloskey LA (2008) Intimate partner violence and women's contraceptive use. Violence Against Wom 14: 1382-1396. https://doi.org/10.1177/1077801208325187. doi: 10.1177/1077801208325187
![]() |
[88] |
Dalal K, Andrews J, Dawad S (2012) Contraception use and associations with intimate partner violence among women in Bangladesh. J Biosoc Sci 44: 83-94. https://doi.org/10.1017/S0021932011000307. doi: 10.1017/S0021932011000307
![]() |
[89] |
Rabbi AMF (2014) Factors influencing fertility preference of a developing country during demographic transition: evidence from Bangladesh. SE Asian J Public Health 4: 23-30. https://doi.org/10.3329/seajph.v4i2.23691. doi: 10.3329/seajph.v4i2.23691
![]() |
[90] | Calache H, Christian B, Mamerto M, et al. (2019) An epidemiological study of dental caries and associated risk factors among primary school children in the Aileu Municipality, Timor-Leste. Rural Remote Health 19: 5322https://doi.org/10.22605/RRH5322. |
[91] |
Thompson S, Mercer MA, Hofstee M, et al. (2019) Connecting mothers to care: effectiveness and scale-up of an mHealth program in Timor-Leste. J Glob Health 9: 020428https://doi.org/10.7189/jogh.09.020428. doi: 10.7189/jogh.09.020428
![]() |
[92] |
Ung M, Boateng GO, Armah FA, et al. (2014) Negotiation for safer sex among married women in Cambodia: the role of women's autonomy. J Biosoc Sci 46: 90-106. https://doi.org/10.1017/S0021932013000151. doi: 10.1017/S0021932013000151
![]() |
[93] |
Marphatia AA, Ambale GS, Reid AM (2017) Women's marriage age matters for public health: a review of the broader health and social implications in South Asia. Front Public Health 5: 269https://doi.org/10.3389/fpubh.2017.00269. doi: 10.3389/fpubh.2017.00269
![]() |
[94] |
Wild KJ, Gomes L, Fernandes A, et al. (2019) Responding to violence against women: a qualitative study with midwives in Timor-Leste. Women Birth 32: e459-e466. https://doi.org/10.1016/j.wombi.2018.10.008. doi: 10.1016/j.wombi.2018.10.008
![]() |
[95] |
Meiksin R, Meekers D, Thompson S, et al. (2015) Domestic violence, marital control, and family planning, maternal, and birth outcomes in Timor-Leste. Matern Child Health J 19: 1338-1347. https://doi.org/10.1007/s10995-014-1638-1. doi: 10.1007/s10995-014-1638-1
![]() |
[96] |
Taft AJ, Powell RL, Watson LF (2015) The impact of violence against women on reproductive health and child mortality in Timor-Leste. Aust N Z J Public Health 39: 177-181. https://doi.org/10.1111/1753-6405.12339. doi: 10.1111/1753-6405.12339
![]() |
[97] |
Wallace HJ, McDonald S, Belton S, et al. (2018) What influences a woman's decision to access contraception in Timor-Leste? Perceptions from Timorese women and men. Cult Health Sex 12: 1317-1332. https://doi.org/10.1080/13691058.2018.1433330. doi: 10.1080/13691058.2018.1433330
![]() |
[98] |
Richards E (2015) The Catholic Church and reproductive health and rights in Timor-Leste: contestation, negotiation, and cooperation. Cult Health Sex 17: 343-358. https://doi.org/10.1080/13691058.2014.966255. doi: 10.1080/13691058.2014.966255
![]() |
[99] |
Nie J, Unger JA, Thompson S, et al. (2016) Does mobile phone ownership predict better utilization of maternal and newborn health services? A cross-sectional study in Timor-Leste. BMC Pregnancy Childbirth 16: 183https://doi.org/10.1186/s12884-016-0981-1. doi: 10.1186/s12884-016-0981-1
![]() |
[100] |
Khanal V, Lee AH, da Cruz JL, et al. (2014) Factors associated with non-utilization of health service for childbirth in Timor-Leste: evidence from the 2009–2010 demographic and health survey. BMC Int Health Hum Rights 14: 14https://doi.org/10.1186/1472-698X-14-14. doi: 10.1186/1472-698X-14-14
![]() |
[101] |
Mandal M, Muralidharan A, Pappa S (2017) A review of measures of women's empowerment and related gender constructs in family planning and maternal health program evaluations in low- and middle-income countries. BMC Pregnancy Childbirth 17: 342https://doi.org/10.1186/s12884-017-1500-8. doi: 10.1186/s12884-017-1500-8
![]() |
[102] |
Shimamoto K, Gipson JD (2017) Examining the mechanisms by which women's status and empowerment affect skilled birth attendant use in Senegal: a structural equation modeling approach. BMC Pregnancy Childbirth 17: 341https://doi.org/10.1186/s12884-017-1499-x. doi: 10.1186/s12884-017-1499-x
![]() |
[103] | The World Bank Timor-Leste-Total fertility rate, 2020 Available from: https://knoema.com/atlas/Timor-Leste/Fertility-rate. |
[104] |
Summers KH, Baird TD, Woodhouse E, et al. (2020) Mobile phones and women's empowerment in Maasai communities: How men shape women's social relations and access to phones. J Rural Stud 77: 126-137. https://doi.org/10.1016/j.jrurstud.2020.04.013. doi: 10.1016/j.jrurstud.2020.04.013
![]() |
[105] |
Beaujoin C, Bila A, Bicaba F, et al. (2021) Women's decision-making power in a context of free reproductive healthcare and family planning in rural Burkina Faso. BMC Womens Health 21: 272https://doi.org/10.1186/s12905-021-01411-4. doi: 10.1186/s12905-021-01411-4
![]() |
[106] |
Yaya S, Uthman OA, Ekholuenetale M, et al. (2018) Women empowerment as an enabling factor of contraceptive use in sub-Saharan Africa: a multilevel analysis of cross-sectional surveys of 32 countries. Reprod Health 15: 214https://doi.org/10.1186/s12978-018-0658-5. doi: 10.1186/s12978-018-0658-5
![]() |
[107] |
Blackstone SR (2017) Women's empowerment, household status and contraception use in Ghana. J Biosoc Sci 49: 423-434. https://doi.org/10.1017/S0021932016000377. doi: 10.1017/S0021932016000377
![]() |
[108] |
Whidden C, Keita Y, Treleaven E, et al. (2021) Women's empowerment, intrahousehold influences, and health system design on modern contraceptive use in rural Mali: a multilevel analysis of cross-sectional survey data. Reprod Health 18: 55https://doi.org/10.1186/s12978-020-01061-z. doi: 10.1186/s12978-020-01061-z
![]() |
[109] | Asian Development Bank Timor-Leste Country Gender Assessment, 2014 Available from: https://www.adb.org/sites/default/files/institutional-document/84126/timor-leste-country-gender-assessment.pdf. |
[110] |
Afulani PA, Altman M, Musana J, et al. (2017) Conceptualizing pathways linking women's empowerment and prematurity in developing countries. BMC Pregnancy Childbirth 17: 338https://doi.org/10.1186/s12884-017-1502-6. doi: 10.1186/s12884-017-1502-6
![]() |
[111] | Croft TN, Marshall AMJ, Allen CK, et al. (2018) Guide to DHS Statistics Rockville, Maryland, USA: ICF (version 2), Available from: https://dhsprogram.com/pubs/pdf/DHSG1/Guide_to_DHS_Statistics_DHS-7_v2.pdf. |
[112] | General Directorate of Statistics (GDS) Ministry of Health and ICF, 2018. Timor-Leste Demographic and Health Survey, 2016 Available from: https://www.dhsprogram.com/publications/publication-fr329-dhs-final-reports.cfm. |
[113] | United Nations Human Rights Office of the United Nations High Commissioner for Human Rights (OHCHR). Convention on the rights of the child adopted and opened for signature, ratification, and accession by General Assembly resolution 44/25 of 20 November 1989. Entry into force 2 September 1990, in accordance with article 49, 1990 Available from: https://www.ohchr.org/Documents/ProfessionalInterest/crc.pdf. |
[114] |
Efevbera Y, Bhabha J (2020) Defining and deconstructing girl child marriage and applications to global public health. BMC Public Health 20: 1547https://doi.org/10.1186/s12889-020-09545-0. doi: 10.1186/s12889-020-09545-0
![]() |
[115] |
Zaman M, Koski A (2020) Child marriage in Canada: a systematic review. PLoS One 15: e0229676https://doi.org/10.1371/journal.pone.0229676. doi: 10.1371/journal.pone.0229676
![]() |
[116] |
Paul P, Chouhan P, Zaveri A (2019) Impact of child marriage on nutritional status and anemia of children under 5 years of age: empirical evidence from India. Public Health 177: 95-101. https://doi.org/10.1016/j.puhe.2019.08.008. doi: 10.1016/j.puhe.2019.08.008
![]() |
[117] |
Khan S, Zaheer S, Safdar NF (2019) Determinants of stunting, underweight and wasting among children < 5 years of age: evidence from 2012–2013 Pakistan demographic and health survey. BMC Public Health 19: 358https://doi.org/10.1186/s12889-019-6688-2. doi: 10.1186/s12889-019-6688-2
![]() |
[118] |
Elnakib S, Hussein SA, Hafez S, et al. (2021) Drivers and consequences of child marriage in a context of protracted displacement: a qualitative study among Syrian refugees in Egypt. BMC Public Health 21: 674https://doi.org/10.1186/s12889-021-10718-8. doi: 10.1186/s12889-021-10718-8
![]() |
[119] |
Yaya S, Odusina EK, Bishwajit G (2019) Prevalence of child marriage and its impact on fertility outcomes in 34 sub-Saharan African countries. BMC Int Health Hum Rights 19: 33https://doi.org/10.1186/s12914-019-0219-1. doi: 10.1186/s12914-019-0219-1
![]() |
[120] |
Bhan N, Gautsch L, McDougal L, et al. (2019) Effects of parent-child relationships on child marriage of girls in Ethiopia, India, Peru, and Vietnam: evidence from a prospective cohort. J Adolesc Health 65: 498-506. https://doi.org/10.1016/j.jadohealth.2019.05.002. doi: 10.1016/j.jadohealth.2019.05.002
![]() |
[121] |
Raj A, Salazar M, Jackson EC, et al. (2019) Students, and brides: a qualitative analysis of the relationship between girls' education and early marriage in Ethiopia and India. BMC Public Health 19: 19https://doi.org/10.1186/s12889-018-6340-6. doi: 10.1186/s12889-018-6340-6
![]() |
[122] | UNICEF Child marriage: latest trends and future prospects, 2018 Available from: https://data.unicef.org/resources/child-marriage-latest-trends-and-future-prospects/. |
[123] | Nour NM Child marriage: a silent health and human rights issue, 2009 Avaliable from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2672998/pdf/RIOG002001_0051.pdf. |
[124] |
Marphatia AA, Saville NM, Amable GS, et al. (2020) How much education is needed to delay women's age at marriage and first pregnancy? Front Public Health 7: 396https://doi.org/10.3389/fpubh.2019.00396. doi: 10.3389/fpubh.2019.00396
![]() |
[125] | United Nations Human Rights Office of the High Commission. Convention on consent to, marriage, minimum age for marriage, and registration of marriages. Opened for signature and ratification by General Assembly resolution 1763 A (XVII) of November 7, 1962. Entry into force: December 9, 1964, in accordance with article 6, 2021 Available from: https://www.ohchr.org/Documents/ProfessionalInterest/convention.pdf. |
[126] | United Nations Development Program. Challenges & Opportunities. Our Focus: Gender equality, 2021 Available from: https://www.tl.undp.org/content/timor_leste/en/home/gender-equality.html. |
[127] | International Women's Health Coalition The facts on child marriage, 2021 Available from: https://iwhc.org/resources/facts-child-marriage/. |
[128] | Bhabha J, Kelly O Child marriage and the right to education: evidence from India. Evidence submitted to the Office of High Commission of Human Rights. University of Harvard, 2013 Available from: https://www.ohchr.org/Documents/Issues/Women/WRGS/ForcedMarriage/NGO/HavardUniversityFXB3.pdf. |
[129] |
Abera M, Nega A, Tefera Y, et al. (2020) Early marriage and women's empowerment: the case of child-brides in Amhara National Regional State, Ethiopia. BMC Int Health Hum Rights 20: 30https://doi.org/10.1186/s12914-020-00249-5. doi: 10.1186/s12914-020-00249-5
![]() |
[130] |
Aychiluhm SB, Tesema AK, Tadesse AW (2021) Early marriage and its determinants among married reproductive age group women in Amhara Regional State, Ethiopia: a multilevel analysis. Biomed Res Int 2021: 1969721https://doi.org/10.1155/2021/1969721. doi: 10.1155/2021/1969721
![]() |
[131] |
Alhuzai NA (2020) The adjustment process of young Bedouin women who were child brides. J Community Psychol 48: 1882-1897. https://doi.org/10.1002/jcop.22379. doi: 10.1002/jcop.22379
![]() |
[132] |
Ahinkorah BO, Dickson KS, Seidu AA (2018) Women decision-making capacity and intimate partner violence among women in sub-Saharan Africa. Arch Public Health 76: 5https://doi.org/10.1186/s13690-018-0253-9. doi: 10.1186/s13690-018-0253-9
![]() |
[133] |
Sanawar SB, Islam MA, Majumder S, et al. (2019) Women's empowerment and intimate partner violence in Bangladesh: investigating the complex relationship. J Biosoc Sci 51: 188-202. https://doi.org/10.1017/S0021932018000068. doi: 10.1017/S0021932018000068
![]() |
[134] | Warner X The Asia Foundation. New study reveals patterns of violence against women in Timor-Leste, 2015 Available from: https://asiafoundation.org/2015/12/09/new-study-reveals-patterns-of-violence-against-women-in-timor-leste/. |
[135] | The Asia Foundation Women's economic empowerment in Timor-Leste, 2016 Available from: https://www.think-asia.org/bitstream/handle/11540/9330/TimorLesteWEPECON.pdf?sequence=1. |
[136] |
Samari G (2019) Education and fertility in Egypt: mediation by women's empowerment. SSM Popul Health 9: 100488https://doi.org/10.1016/j.ssmph.2019.100488. doi: 10.1016/j.ssmph.2019.100488
![]() |
[137] |
Thurston RC, Matthews KA (2019) Women and children first: promoting empowerment through resistance education-reply. JAMA Intern Med 179: 278-279. https://doi.org/10.1001/jamainternmed.2018.7813. doi: 10.1001/jamainternmed.2018.7813
![]() |
[138] |
McClelland KI, Petrany SM, Davies TH (2019) Women and children first: promoting empowerment through resistance education. JAMA Intern Med 179: 277-278. https://doi.org/10.1001/jamainternmed.2018.7837. doi: 10.1001/jamainternmed.2018.7837
![]() |
[139] |
Patidar H (2018) Women's empowerment and fertility behavior among the tribals of Rajasthan, India. Space Cult India 5: 129-139. https://doi.org/10.20896/saci.v5i3.285. doi: 10.20896/saci.v5i3.285
![]() |
[140] | Dasvarma GL, Lina H, Kosal S, et al. (2018) Fertility preferences in Cambodia. Family demography in Asia. A comparative analysis of fertility preferences Edward Elgar Publishing, https://doi.org/10.4337/9781785363559.00010. |
[141] |
Andersen SH, Ozcan B (2021) The effects of unemployment on fertility. Adv Life Course Res 49: 100401https://doi.org/10.1016/j.alcr.2020.100401. doi: 10.1016/j.alcr.2020.100401
![]() |
[142] |
Miettinen A, Jalovaara M (2020) Unemployment delays first birth but not for all. Life stage and educational differences in the effects of employment uncertainty on first births. Adv Life Course Res 43: 100320https://doi.org/10.1016/j.alcr.2019.100320. doi: 10.1016/j.alcr.2019.100320
![]() |
[143] |
Honjo K, Iso H, Ikeda A, et al. (2020) Cross-sectional association between employment status and self-rated health among middle-aged Japanese women: The influence of socioeconomic conditions and work-life conflict. J Epidemiol 30: 396-403. https://doi.org/10.2188/jea.JE20190005. doi: 10.2188/jea.JE20190005
![]() |
[144] |
Esteban-Gonzalo S, Aparicio M, Estaban-Gonzalo L (2018) Employment status, gender and health in Spanish women. Women Health 58: 744-758. https://doi.org/10.1080/03630242.2017.1353574. doi: 10.1080/03630242.2017.1353574
![]() |
[145] |
Prettner K, Strulik H (2017) Gender equity and the escape from poverty. Oxf Econ Pap 69: 55-74. https://doi.org/10.1093/oep/gpw043. doi: 10.1093/oep/gpw043
![]() |
[146] |
Doepke M, Tertilt M (2018) Women's empowerment, the gender gap in desired fertility, and fertility outcomes in developing countries. AEA Pap Proc 108: 358-362. https://doi.org/10.1257/pandp.20181085. doi: 10.1257/pandp.20181085
![]() |
[147] |
Samari G (2017) First birth and the trajectory of women's empowerment in Egypt. BMC Pregnancy Childbirth 17: 362https://doi.org/10.1186/s12884-017-1494-2. doi: 10.1186/s12884-017-1494-2
![]() |
[148] |
Kalwij A (2000) The effects of female employment status on the presence and number of children. J Popul Econ 13: 221-239. https://doi.org/10.1007/s001480050135. doi: 10.1007/s001480050135
![]() |
[149] |
Behrman J, Duvisac S (2017) The relationship between women's paid employment and women's stated son preference in India. Demographic Res 36: 1601-1636. https://doi.org/10.4054/DemRes.2017.36.52. doi: 10.4054/DemRes.2017.36.52
![]() |
[150] |
Muanda MF, Ndongo GP, Lauren J, et al. (2017) Barriers to modern contraceptive use in rural areas in DRC. Cult Health Sex 19: 1011-1023. https://doi.org/10.1080/13691058.2017.1286690. doi: 10.1080/13691058.2017.1286690
![]() |
[151] |
Najafi-Sharjabad F, Yahya SZS, Rahman HA, et al. (2013) Barriers of modern contraceptive practices among Asian women: a mini literature review. Glob J Health Sci 5: 181-192. https://doi.org/10.5539/gjhs.v5n5p181. doi: 10.5539/gjhs.v5n5p181
![]() |
[152] | Kahraman K, Göç G, Taşkın S, et al. (2012) Factors influencing the contraceptive method choice: a university hospital experience. J Turk Ger Gynecol Assoc 13: 102-105. https://doi.org/10.5152/jtgga.2012.07. |
[153] | National Institutes of Health US Department of Health and Human Services. What are the different types of contraception? Know the 5 main types of contraception, 2017 Available from: https://www.nichd.nih.gov/health/topics/contraception/conditioninfo/types. |
[154] |
Ajayi AI, Adeniyi OV, Akpan W (2018) Use of traditional and modern contraceptives among childbearing women: findings from a mixed-methods study in two southwestern Nigerian states. BMC Public Health 18: 604https://doi.org/10.1186/s12889-018-5522-6. doi: 10.1186/s12889-018-5522-6
![]() |
[155] |
Withers M, Dworkin SL, Zakaras JM, et al. (2015) ‘Women now wear trousers’: men's perceptions of family planning in the context of changing gender relations in western Kenya. Cult Health Sex 17: 1132-1146. https://doi.org/10.1080/13691058.2015.1043144. doi: 10.1080/13691058.2015.1043144
![]() |
[156] | Wigglesworth A, Niner S, Arunachalam D, et al. Attitudes and perceptions of young men towards gender equality and violence in Timor-Leste, 2015 Avaliable from: https://vc.bridgew.edu/cgi/viewcontent.cgi?article=1799&context=jiws. |
[157] | Tadesse M, Teklie H, Yazew G, et al. Women's empowerment as a determinant of contraceptive use in Ethiopia. Further analysis of the 2011 Ethiopia Demographic and Health Survey, 2013 Available from: https://dhsprogram.com/pubs/pdf/FA82/FA82.pdf. |
[158] | The World Bank Fertility rate, total (births per woman)—Indonesia, 2021 Available from: https://data.worldbank.org/indicator/SP.DYN.TFRT.IN?locations=ID. |
[159] | Rabbi AMF Relationship between contraceptive prevalence rate and total fertility rate: revisiting the empirical model, 2014 Available from: https://dpsdu.edu.bd/images/1RelationshipbetweenContraceptivePrevalenceRate.pdf. |
[160] | Larsson C, Stanfors M (2014) Women's education, empowerment, and contraceptive use in sub-Saharan Africa: findings from recent demographic and health surveys. Afr Pop Stud 28: 1022-1034. https://doi.org/10.11564/28-0-554. |
![]() |
![]() |
1. | Arjumand Seemab, Mujeeb ur Rehman, Jehad Alzabut, Yassine Adjabi, Mohammed S. Abdo, Langevin equation with nonlocal boundary conditions involving a ψ-Caputo fractional operators of different orders, 2021, 6, 2473-6988, 6749, 10.3934/math.2021397 | |
2. | Kanoktip Kotsamran, Weerawat Sudsutad, Chatthai Thaiprayoon, Jutarat Kongson, Jehad Alzabut, Analysis of a Nonlinear ψ-Hilfer Fractional Integro-Differential Equation Describing Cantilever Beam Model with Nonlinear Boundary Conditions, 2021, 5, 2504-3110, 177, 10.3390/fractalfract5040177 | |
3. | Dinghong Jiang, Chuanzhi Bai, On coupled Gronwall inequalities involving a ψ-fractional integral operator with its applications, 2022, 7, 2473-6988, 7728, 10.3934/math.2022434 | |
4. | Badreddine Meftah, Djamal Foukrach, Some new Gronwall–Bellman–Bihari type integral inequality associated with ψ-Hilfer fractional derivative, 2023, 0, 0174-4747, 10.1515/anly-2022-1073 | |
5. | Marisa Kaewsuwan, Rachanee Phuwapathanapun, Weerawat Sudsutad, Jehad Alzabut, Chatthai Thaiprayoon, Jutarat Kongson, Nonlocal Impulsive Fractional Integral Boundary Value Problem for (ρk,ϕk)-Hilfer Fractional Integro-Differential Equations, 2022, 10, 2227-7390, 3874, 10.3390/math10203874 | |
6. | Songkran Pleumpreedaporn, Weerawat Sudsutad, Chatthai Thaiprayoon, Juan E. Nápoles, Jutarat Kongson, A Study of ψ-Hilfer Fractional Boundary Value Problem via Nonlinear Integral Conditions Describing Navier Model, 2021, 9, 2227-7390, 3292, 10.3390/math9243292 | |
7. | Weerawat Sudsutad, Chatthai Thaiprayoon, Bounmy Khaminsou, Jehad Alzabut, Jutarat Kongson, A Gronwall inequality and its applications to the Cauchy-type problem under ψ-Hilfer proportional fractional operators, 2023, 2023, 1029-242X, 10.1186/s13660-023-02929-x | |
8. | Ayoub Louakar, Ahmed Kajounı, Khalid Hilal, Hamid Lmou, A Class of Implicit Fractional ψ-Hilfer Langevin Equation with Time Delay and Impulse in the Weighted Space, 2024, 7, 2651-4001, 88, 10.33434/cams.1425019 | |
9. | Hacen Serrai, Brahim Tellab, Sina Etemad, İbrahim Avcı, Shahram Rezapour, Ψ-Bielecki-type norm inequalities for a generalized Sturm–Liouville–Langevin differential equation involving Ψ-Caputo fractional derivative, 2024, 2024, 1687-2770, 10.1186/s13661-024-01863-1 | |
10. | Weerawat Sudsutad, Jutarat Kongson, Chatthai Thaiprayoon, Nantapat Jarasthitikulchai, Marisa Kaewsuwan, A generalized Gronwall inequality via ψ-Hilfer proportional fractional operators and its applications to nonlocal Cauchy-type system, 2024, 9, 2473-6988, 24443, 10.3934/math.20241191 |
Author | Dataset | Evaluation measure | K-Fold validation | Balancing strategy | Response time |
[32] | Modbus, OPC-UA | Accuracy, Precision, Recall, F-1 score | No | No | High |
[38] | SCADA network | Accuracy, Precision | Yes | No | Medium |
[39] | Industrial robot | Accuracy | No | No | Low |
[40] | SCADA network | Accuracy | No | No | Medium |
[35] | NSL-KDD, UNSW-NB15 | Accuracy, Precision, Recall, F-1 score | Yes | No | Medium |
[34] | PCP from IAE | Accuracy, Precision, Recall, F-1 score | No | No | High |
[41] | SCADA network | Accuracy, F-1 score | No | No | Medium |
[33] | NSL-KDD, CIC-IDS 2017 | Accuracy, Precision, F-1 score | Yes | Yes | High |
[42] | NSL-KDD | Accuracy, Precision, Recall, F-1 score | No | No | Medium |
[36] | Collected data from industry production line | Accuracy | No | No | Medium |
Proposed Model | Multi-step cyber attack dataset | Accuracy, Precision, Recall, F-1, G-mean score | Yes | Yes | Low |
Classe | Encoding | Records |
Brute force | 0 | 88, 502 |
HTTP DDoS | 1 | 641 |
ICMP flood | 2 | 45 |
Normal | 3 | 28, 501 |
Port scan | 4 | 11, 081 |
Web crawler | 5 | 28 |
References | Mode | Accuracy | Precision | Recall | F1-score | G-Mean |
[47] | 0.825 | 0.942 | 0.911 | 0.926 | x | |
[48] | DT | x | x | x | x | 0.71 |
RF | x | x | x | x | 0.65 | |
Other techniques | NB | 0.787 | 0.462 | 0.627 | 0.313 | x |
DNN | 0.687 | 0.114 | 0.166 | 0.135 | x | |
LSTM | 0.99 | 0.708 | 0.668 | 0.682 | x | |
GRU | 0.97 | 0.554 | 0.522 | 0.532 | x | |
CNN | 0.993 | 0.813 | 0.77 | 0.788 | x | |
RNN | 0.99 | 0.777 | 0.753 | 0.763 | x | |
Proposed method | CNN-DBN | 0.996 | 0.82 | 0.779 | 0.801 | 0.81 |
References | Model | Accuracy | Precision | Recall | F1-score | G-Mean |
[47] | 0.825 | 0.942 | 0.911 | 0.926 | x | |
[48] | DT | x | x | x | x | 0.78 |
RF | x | x | x | x | 0.79 | |
Other techniques | NB | 0.641 | 0.644 | 0.641 | 0.573 | x |
DNN | 0.166 | 0.027 | 0.166 | 0.047 | x | |
LSTM | 0.97 | 0.97 | 0.971 | 0.97 | x | |
GRU | 0.943 | 0.932 | 0.945 | 0.943 | x | |
CNN | 0.972 | 0.971 | 0.972 | 0.971 | x | |
RNN | 0.954 | 0.954 | 0.956 | 0.955 | x | |
Proposed method | CNN-DBN | 0.976 | 0.976 | 0.975 | 0.975 | 0.97 |
References | Model | Accuracy | Precision | Recall | F1-score | G-Mean |
[47] | 0.825 | 0.942 | 0.911 | 0.926 | x | |
[48] | DT | x | x | x | x | 0.83 |
RF | x | x | x | x | 0.82 | |
Other techniques | NB | 0.643 | 0.648 | 0.643 | 0.574 | x |
DNN | 0.167 | 0.278 | 0.166 | 0.047 | x | |
LSTM | 0.968 | 0.97 | 0.969 | 0.968 | x | |
GRU | 0.937 | 0.934 | 0.939 | 0.943 | x | |
CNN | 0.971 | 0.972 | 0.972 | 0.971 | x | |
RNN | 0.953 | 0.955 | 0.954 | 0.954 | x | |
Proposed method | CNN-DBN | 0.981 | 0.979 | 0.978 | 0.979 | 0.98 |
Author | Dataset | Evaluation measure | K-Fold validation | Balancing strategy | Response time |
[32] | Modbus, OPC-UA | Accuracy, Precision, Recall, F-1 score | No | No | High |
[38] | SCADA network | Accuracy, Precision | Yes | No | Medium |
[39] | Industrial robot | Accuracy | No | No | Low |
[40] | SCADA network | Accuracy | No | No | Medium |
[35] | NSL-KDD, UNSW-NB15 | Accuracy, Precision, Recall, F-1 score | Yes | No | Medium |
[34] | PCP from IAE | Accuracy, Precision, Recall, F-1 score | No | No | High |
[41] | SCADA network | Accuracy, F-1 score | No | No | Medium |
[33] | NSL-KDD, CIC-IDS 2017 | Accuracy, Precision, F-1 score | Yes | Yes | High |
[42] | NSL-KDD | Accuracy, Precision, Recall, F-1 score | No | No | Medium |
[36] | Collected data from industry production line | Accuracy | No | No | Medium |
Proposed Model | Multi-step cyber attack dataset | Accuracy, Precision, Recall, F-1, G-mean score | Yes | Yes | Low |
Classe | Encoding | Records |
Brute force | 0 | 88, 502 |
HTTP DDoS | 1 | 641 |
ICMP flood | 2 | 45 |
Normal | 3 | 28, 501 |
Port scan | 4 | 11, 081 |
Web crawler | 5 | 28 |
References | Mode | Accuracy | Precision | Recall | F1-score | G-Mean |
[47] | 0.825 | 0.942 | 0.911 | 0.926 | x | |
[48] | DT | x | x | x | x | 0.71 |
RF | x | x | x | x | 0.65 | |
Other techniques | NB | 0.787 | 0.462 | 0.627 | 0.313 | x |
DNN | 0.687 | 0.114 | 0.166 | 0.135 | x | |
LSTM | 0.99 | 0.708 | 0.668 | 0.682 | x | |
GRU | 0.97 | 0.554 | 0.522 | 0.532 | x | |
CNN | 0.993 | 0.813 | 0.77 | 0.788 | x | |
RNN | 0.99 | 0.777 | 0.753 | 0.763 | x | |
Proposed method | CNN-DBN | 0.996 | 0.82 | 0.779 | 0.801 | 0.81 |
References | Model | Accuracy | Precision | Recall | F1-score | G-Mean |
[47] | 0.825 | 0.942 | 0.911 | 0.926 | x | |
[48] | DT | x | x | x | x | 0.78 |
RF | x | x | x | x | 0.79 | |
Other techniques | NB | 0.641 | 0.644 | 0.641 | 0.573 | x |
DNN | 0.166 | 0.027 | 0.166 | 0.047 | x | |
LSTM | 0.97 | 0.97 | 0.971 | 0.97 | x | |
GRU | 0.943 | 0.932 | 0.945 | 0.943 | x | |
CNN | 0.972 | 0.971 | 0.972 | 0.971 | x | |
RNN | 0.954 | 0.954 | 0.956 | 0.955 | x | |
Proposed method | CNN-DBN | 0.976 | 0.976 | 0.975 | 0.975 | 0.97 |
References | Model | Accuracy | Precision | Recall | F1-score | G-Mean |
[47] | 0.825 | 0.942 | 0.911 | 0.926 | x | |
[48] | DT | x | x | x | x | 0.83 |
RF | x | x | x | x | 0.82 | |
Other techniques | NB | 0.643 | 0.648 | 0.643 | 0.574 | x |
DNN | 0.167 | 0.278 | 0.166 | 0.047 | x | |
LSTM | 0.968 | 0.97 | 0.969 | 0.968 | x | |
GRU | 0.937 | 0.934 | 0.939 | 0.943 | x | |
CNN | 0.971 | 0.972 | 0.972 | 0.971 | x | |
RNN | 0.953 | 0.955 | 0.954 | 0.954 | x | |
Proposed method | CNN-DBN | 0.981 | 0.979 | 0.978 | 0.979 | 0.98 |