Inicio  /  Information  /  Vol: 12 Par: 5 (2021)  /  Artículo
ARTÍCULO
TITULO

TraceAll: A Real-Time Processing for Contact Tracing Using Indoor Trajectories

Louai Alarabi    
Saleh Basalamah    
Abdeltawab Hendawi and Mohammed Abdalla    

Resumen

The rapid spread of infectious diseases is a major public health problem. Recent developments in fighting these diseases have heightened the need for a contact tracing process. Contact tracing can be considered an ideal method for controlling the transmission of infectious diseases. The result of the contact tracing process is performing diagnostic tests, treating for suspected cases or self-isolation, and then treating for infected persons; this eventually results in limiting the spread of diseases. This paper proposes a technique named TraceAll that traces all contacts exposed to the infected patient and produces a list of these contacts to be considered potentially infected patients. Initially, it considers the infected patient as the querying user and starts to fetch the contacts exposed to him. Secondly, it obtains all the trajectories that belong to the objects moved nearby the querying user. Next, it investigates these trajectories by considering the social distance and exposure period to identify if these objects have become infected or not. The experimental evaluation of the proposed technique with real data sets illustrates the effectiveness of this solution. Comparative analysis experiments confirm that TraceAll outperforms baseline methods by 40% regarding the efficiency of answering contact tracing queries.

 Artículos similares

       
 
Emin Aktan, Ivan Bartoli, Branko Gli?ic and Carlo Rainieri    
This paper summarizes the lessons learned after several decades of exploring and applying Structural Health Monitoring (SHM) in operating bridge structures. The challenges in real-time imaging and processing of large amounts of sensor data at various ban... ver más
Revista: Infrastructures

 
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari    
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac... ver más
Revista: Information

 
Jiahang Chen, Jan Reitz, Rebecca Richstein, Kai-Uwe Schröder and Jürgen Roßmann    
Advancing digitalization is reaching the realm of lightweight construction and structural?mechanical components. Through the synergistic combination of distributed sensors and intelligent evaluation algorithms, traditional structures evolve into smart se... ver más
Revista: Information

 
Jui-Fa Chen, Yu-Ting Liao and Po-Chun Wang    
Climate change has exacerbated severe rainfall events, leading to rapid and unpredictable fluctuations in river water levels. This environment necessitates the development of real-time, automated systems for water level detection. Due to degradation, tra... ver más
Revista: Water

 
Huda Lughbi, Mourad Mars and Khaled Almotairi    
The pervasive reach of social media like the X platform, formerly known as Twitter, offers unique opportunities for real-time analysis of cyberattack developments. By parsing and classifying tweets related to cyberattacks, we can glean valuable insights ... ver más
Revista: Information