A game theory-based COVID-19 close contact detecting method with edge computing collaboration.

Yue Shen, Bowen Liu, Xiaoyu Xia, Lianyong Qi, Xiaolong Xu, Wanchun Dou
Author Information
  1. Yue Shen: State Key Laboratory for Novel Software Technology, Nanjing University, China.
  2. Bowen Liu: State Key Laboratory for Novel Software Technology, Nanjing University, China.
  3. Xiaoyu Xia: School of Computing Technologies, RMIT University, Melbourne, Australia.
  4. Lianyong Qi: College of Computer and Software, China University of Petroleum (East China), China.
  5. Xiaolong Xu: School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China.
  6. Wanchun Dou: State Key Laboratory for Novel Software Technology, Nanjing University, China.

Abstract

People all throughout the world have suffered from the COVID-19 pandemic. People can be infected after brief contact, so how to assess the risk of infection for everyone effectively is a tricky challenge. In view of this challenge, the combination of wireless networks with edge computing provides new possibilities for solving the COVID-19 prevention problem. With this observation, this paper proposed a game theory-based COVID-19 close contact detecting method with edge computing collaboration, named GCDM. The GCDM method is an efficient method for detecting COVID-19 close contact infection with users' location information. With the help of edge computing's feature, the GCDM can deal with the detecting requirements of computing and storage and relieve the user privacy problem. Technically, as the game reaches equilibrium, the GCDM method can maximize close contact detection completion rate while minimizing the latency and cost of the evaluation process in a decentralized manner. The GCDM is described in detail and the performance of GCDM is analyzed theoretically. Extensive experiments were conducted and experimental results demonstrate the superior performance of GCDM over other three representative methods through comprehensive analysis.

Keywords

References

  1. IEEE Trans Cybern. 2022 May;52(5):3632-3644 [PMID: 32915761]
  2. IEEE Trans Med Imaging. 2020 Aug;39(8):2688-2700 [PMID: 32396075]
  3. Internet Things (Amst). 2020 Sep;11:100222 [PMID: 38620477]
  4. IEEE/ACM Trans Comput Biol Bioinform. 2021 May-Jun;18(3):912-921 [PMID: 32750846]
  5. IEEE Trans Med Imaging. 2020 Aug;39(8):2676-2687 [PMID: 32406829]
  6. Comput Graph. 2022 Aug;106:1-8 [PMID: 35637696]
  7. IEEE Trans Med Imaging. 2020 Aug;39(8):2653-2663 [PMID: 32730215]
  8. IEEE Trans Med Imaging. 2020 Aug;39(8):2615-2625 [PMID: 33156775]
  9. IEEE Trans Industr Inform. 2021 Feb 05;17(9):6480-6488 [PMID: 37981916]

Word Cloud

Created with Highcharts 10.0.0GCDMCOVID-19methodcontactcomputingedgeclosedetectingcangamePeopleinfectionchallengeproblemtheory-basedcollaborationperformancethroughoutworldsufferedpandemicinfectedbriefassessriskeveryoneeffectivelytrickyviewcombinationwirelessnetworksprovidesnewpossibilitiessolvingpreventionobservationpaperproposednamedefficientusers'locationinformationhelpcomputing'sfeaturedealrequirementsstoragerelieveuserprivacyTechnicallyreachesequilibriummaximizedetectioncompletionrateminimizinglatencycostevaluationprocessdecentralizedmannerdescribeddetailanalyzedtheoreticallyExtensiveexperimentsconductedexperimentalresultsdemonstratesuperiorthreerepresentativemethodscomprehensiveanalysisDecentralizedEdgeGametheory

Similar Articles

Cited By