Submitted:
08 May 2023
Posted:
09 May 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Technical background
2.1. Smart phone
2.2. The server
2.3. Low power Bluetooth technology
2.3.1. Advertising Package
2.3.2. RSSI
3. Risk Level Algorithm
3.1. The Personal risk Level Query
- The personal risk level at the previous time at the first current time.
- The personal risk level determined based on the detection information.
- The infection transmission probability at the previous time at the first current time.
- The regional risk level of the previous moment of the first current moment.
- The infection probability of the environment where the target person is exposed to.
3.2. The Regional risk Level Query
- The regional risk level of each target location at each moment is related to the following factors:
- The regional risk level of the target location at the previous moment of the second current moment.
- The disinfection coefficient at the previous time of the second current time.
- The personal risk level at the previous moment of the second current moment.
- The transmission probability of the infected person to the environment and the infection source dissipation coefficient.
3.3. The Early Warning
3.3.1. High-risk Person Warning
3.3.2. High-risk Areas Warning
4. System Structure Design
4.1. System Architecture
4.1.1. The Application Layer
4.1.2. The Business Logic Layer
- Bluetooth Broadcast: The smartphone periodically broadcasts a broadcast packet containing risk level information that is not connectable.
- Bluetooth scanning: Smartphone scans three broadcast channels and listens to broadcast packets broadcast by neighboring phones.
- Personal risk level update: The smartphone updates the current personal risk level at set intervals.
- Alarm: The smartphone measures RSSI values and uses them to estimate the distance to other devices in close proximity, including close contacts when the distance is less than a set distance. The pop-up alarm is triggered by sending a notification when a high-risk group is received.
- Map display: The front-end page displays the user's current location information, while marking the risk level with different color blocks in the map interface.
- Risk level update and maintenance: count the infected people in the current system every set time and update the current regional risk level. Update the risk level of people in the region every set time.
- Person and equipment management: it is possible to unify the management of software registration people and devices.
- Generate a list of encryption people: Compare to generate a list of close contacts.And then distribute the message to immediately inform close contacts to self-quarantine.
4.1.3. The Data Layer
5. Conclusion
References
- Velavan, T.P.; Meyer, C.G. The COVID-19 epidemic. Trop Med Int Health 2020, 25, 278–280. [Google Scholar] [CrossRef] [PubMed]
- Li, Q.; Guan, X.; Wu, P.; Wang, X.; Zhou, L.; Tong, Y.; Ren, R.; Leung, K.S.M.; Lau, E.H.Y.; Wong, J.Y.; et al. Early Transmission Dynamics in Wuhan, China, of Novel Coronavirus-Infected Pneumonia. N Engl J Med 2020, 382, 1199–1207. [Google Scholar] [CrossRef] [PubMed]
- Wang, D.; Hu, B.; Hu, C.; Zhu, F.; Liu, X.; Zhang, J.; Wang, B.; Xiang, H.; Cheng, Z.; Xiong, Y.; et al. Clinical Characteristics of 138 Hospitalized Patients With 2019 Novel Coronavirus-Infected Pneumonia in Wuhan, China. JAMA 2020, 323, 1061–1069. [Google Scholar] [CrossRef] [PubMed]
- Byambasuren, O.; Cardona, M.; Bell, K.; Clark, J.; McLaws, M.-L.; Glasziou, P. Estimating the extent of asymptomatic COVID-19 and its potential for community transmission: Systematic review and meta-analysis. Official Journal of the Association of Medical Microbiology and Infectious Disease Canada 2020, 5, 223–234. [Google Scholar] [CrossRef] [PubMed]
- Bai, Y.; Yao, L.; Wei, T.; Tian, F.; Jin, D.Y.; Chen, L.; Wang, M. Presumed Asymptomatic Carrier Transmission of COVID-19. JAMA 2020, 323, 1406–1407. [Google Scholar] [CrossRef] [PubMed]
- Rahmadani, F.; Lee, H. Hybrid Deep Learning-Based Epidemic Prediction Framework of COVID-19: South Korea Case. Applied Sciences 2020, 10. [Google Scholar] [CrossRef]
- Watkins, J. Preventing a covid-19 pandemic. BMJ 2020, 368, m810. [Google Scholar] [CrossRef]
- Bi, Q.; Wu, Y.; Mei, S.; Ye, C.; Zou, X.; Zhang, Z.; Liu, X.; Wei, L.; Truelove, S.A.; Zhang, T. Epidemiology and Transmission of COVID-19 in Shenzhen China: Analysis of 391 cases and 1,286 of their close contacts. medrxiv, 2003. [Google Scholar]
- Chakraborty, I.; Maity, P. COVID-19 outbreak: Migration, effects on society, global environment and prevention. Sci Total Environ 2020, 728, 138882. [Google Scholar] [CrossRef]
- Haleem, A.; Javaid, M.; Khan, I.H.; Vaishya, R. Significant Applications of Big Data in COVID-19 Pandemic. Indian J Orthop 2020, 1–3. [Google Scholar] [CrossRef]
- Zhou, C.; Su, F.; Pei, T.; Zhang, A.; Du, Y.; Luo, B.; Cao, Z.; Wang, J.; Yuan, W.; Zhu, Y.; et al. COVID-19: Challenges to GIS with Big Data. Geography and Sustainability 2020, 1, 77–87. [Google Scholar] [CrossRef]
- Pham, Q.-V.; Nguyen, D.C.; Huynh-The, T.; Hwang, W.-J.; Pathirana, P.N. Artificial intelligence (AI) and big data for coronavirus (COVID-19) pandemic: a survey on the state-of-the-arts. IEEE access 2020, 8, 130820–130839. [Google Scholar] [CrossRef] [PubMed]
- Sosa, J.P.; Ferreira Caceres, M.M.; Ross-Comptis, J.; Hathaway Iii, D.; Mehta, J.; Pandav, K.; Pakala, R.; Butt, M.; Dogar, Z.G.; Belizaire, M.-P.; et al. Web-Based Apps in the fight against COVID-19. Journal of Medical Artificial Intelligence 2021, 4, 1–1. [Google Scholar] [CrossRef]
- Lalmuanawma, S.; Hussain, J.; Chhakchhuak, L. Applications of machine learning and artificial intelligence for Covid-19 (SARS-CoV-2) pandemic: A review. Chaos Solitons Fractals 2020, 139, 110059. [Google Scholar] [CrossRef] [PubMed]
- Howell, B.; Potgieter, P.H. A tale of two contact-tracing apps–comparing Australia’s CovidSafe and New Zealand’s NZ Covid Tracer. Digital Policy, Regulation and Governance 2021, 23, 509–528. [Google Scholar] [CrossRef]
- Yang, F.; Heemsbergen, L.; Fordyce, R. Comparative analysis of China’s Health Code, Australia’s COVIDSafe and New Zealand’s COVID Tracer Surveillance Apps: a new corona of public health governmentality? Media International Australia 2021, 178, 182–197. [Google Scholar] [CrossRef]
- Currie, D.J.; Peng, C.Q.; Lyle, D.M.; Jameson, B.A.; Frommer, M.S. Stemming the flow: how much can the Australian smartphone app help to control COVID-19? Public Health Res Pract 2020, 30. [Google Scholar] [CrossRef] [PubMed]
- Kurita, J.; Sugawara, T.; Ohkusa, Y. Effectiveness of COCOA, a COVID-19 contact notification application, in Japan. medRxiv, 2007. [Google Scholar]
- Whaiduzzaman, M.; Hossain, M.R.; Shovon, A.R.; Roy, S.; Laszka, A.; Buyya, R.; Barros, A. A privacy-preserving mobile and fog computing framework to trace and prevent covid-19 community transmission. IEEE Journal of Biomedical and Health Informatics 2020, 24, 3564–3575. [Google Scholar] [CrossRef]
- Lan, G.Z.; Zhao, Z.; Lei, L. The Use of Health Code to Control the COVID-19 Pandemic: Achievements, Evaluations and Future Prospects. In Proceedings of the 2020 5th International Conference on Universal Village (UV); 2020; pp. 1–5. [Google Scholar]
- Liang, F. COVID-19 and health code: how digital platforms tackle the pandemic in China: Social Media+ Society; 2020.
- 韩宇南. 基于大数据的传染源定位方法、系统和存储介质. CN113939884A, 05 2020.
- Dey, A.K.; Wac, K.; Ferreira, D.; Tassini, K.; Hong, J.-H.; Ramos, J. Getting closer: an empirical investigation of the proximity of user to their smart phones. In Proceedings of the Proceedings of the 13th international conference on Ubiquitous computing, 2011; pp. 163–172.
- Wang, Y.; Yang, X.; Zhao, Y.; Liu, Y.; Cuthbert, L. Bluetooth positioning using RSSI and triangulation methods. In Proceedings of the 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC); 2013; pp. 837–842. [Google Scholar]
- Jeon, K.E.; She, J.; Soonsawad, P.; Ng, P.C. BLE Beacons for Internet of Things Applications: Survey, Challenges, and Opportunities. IEEE Internet of Things Journal 2018, 5, 811–828. [Google Scholar] [CrossRef]
- Hussain, S.R.; Mehnaz, S.; Nirjon, S.; Bertino, E. Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. IEEE Transactions on Mobile Computing 2018, 17, 927–944. [Google Scholar] [CrossRef]
- DeCuir, J. Introducing Bluetooth Smart: Part 1: A look at both classic and new technologies. IEEE Consumer Electronics Magazine 2014, 3, 12–18. [Google Scholar] [CrossRef]
- Minea, M.; Dumitrescu, C.; Costea, I.M.; Chiva, I.C.; Semenescu, A. Developing a Solution for Mobility and Distribution Analysis Based on Bluetooth and Artificial Intelligence. Sensors (Basel) 2020, 20. [Google Scholar] [CrossRef] [PubMed]
- Zhou, C.; Yuan, J.; Liu, H.; Qiu, J. Bluetooth Indoor Positioning Based on RSSI and Kalman Filter. Wireless Personal Communications 2017, 96, 4115–4130. [Google Scholar] [CrossRef]
- Welch, G.; Bishop, G. An introduction to the Kalman filter. 1995.
- Moriyama, M.; Hugentobler, W.J.; Iwasaki, A. Seasonality of respiratory viral infections. Annual review of virology 2020, 7, 83–101. [Google Scholar] [CrossRef] [PubMed]








Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).