You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

16 December 2022

An IoT-Based Wristband for Automatic People Tracking, Contact Tracing and Geofencing for COVID-19

,
,
,
and
1
School of Electronics Engineering, Vellore Institute of Technology, Chennai 600127, India
2
Centre for Smart Grid Technologies, Vellore Institute of Technology, Chennai 600127, India
*
Author to whom correspondence should be addressed.
This article belongs to the Section Internet of Things

Abstract

The coronavirus disease (COVID-19) pandemic has triggered a huge transformation in the use of existing technologies. Many innovations have been made in the field of contact tracing and tracking. However, studies have shown that there is no holistic system that integrates the overall process from data collection to the proper analysis of the data and actions corresponding to the results. It is critical to identify any contact with infected people and to ensure that they do not interact with others. In this research, we propose an IoT-based system that provides automatic tracking and contact tracing of people using radio frequency identification (RFID) and a global positioning system (GPS)-enabled wristband. Additionally, the proposed system defines virtual boundaries for individuals using geofencing technology to effectively monitor and keep track of infected people. Furthermore, the developed system offers robust and modular data collection, authentication through a fingerprint scanner, and real-time database management, and it communicates the health status of the individuals to appropriate authorities. The validation results prove that the proposed system identifies infected people and curbs the spread of the virus inside organizations and workplaces.

1. Introduction

The outbreak of the coronavirus disease (COVID-19) has had a huge impact on technologies related to healthcare []. Worldwide lockdowns, closure of business organizations and educational institutions, hospitals overwhelmed with patients, and government and healthcare professionals implementing various rules and regulations to bring the spread of COVID-19 under control have become common. The drawbacks of the facilities and services provided by various healthcare organizations worldwide were brought into the limelight because of COVID-19. Healthcare workers (HCWs) have faced many challenges during the pandemic []. Contact tracing is a major challenge faced by healthcare professionals. Following the concept that prevention is better than a cure, terminating the spread of the virus before it takes a toll on us is essential. It is vital to identify any contact with infected people and to ensure that they do not interact with others. The rapid community spread of COVID-19 is likely to increase if authorities are unable to successfully isolate patients and guarantee that contacts can separate themselves from others, necessitating severe mitigation efforts to contain the virus. Contact tracing involves contacting an infected/suspected infected person, collecting data from the person, and quarantining them. In this case, contact tracing depends on the data provided by the person, which are unreliable and time-consuming to collect. Contact tracing teams have encountered adversity, such as incorrect data, a lack of public responsibility and solidarity, a lack of knowledge, fear, stigmatization, and attacks and harassment.
Multiple coronavirus variants have been detected and are currently under investigation []. Each new variety raises new problems, such as whether people are more likely to become ill or whether COVID-19 vaccines are still effective []. As the virus evolves through mutations, new variants of concern emerge, such as the delta (B.1.671.2) variant, which is approximately twice as infectious as the earlier Omicron (B.1.1.5291) and BA lineages. The COVID XE variety is a hybrid of two Omicron variant strains, BA.1, the parent strain, and BA.2, which is a more contagious strain []. Since January 2020, the World Health Organization (WHO) has been evaluating and investigating the progression of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) in partnership with many nations, expert alliances, ministries, organizations, and scientists. The identification of specific variants of interest (VOIs) and variants of concern (VOCs) in late 2020 to address global tracking and studies, and ultimately to notify the ongoing response to the COVID-19 pandemic, has urged the classification of specific VOIs and VOCs. In many countries where VOCs are widely diffused, public health and social methods, such as infection prevention and control, have proven to be effective in reducing COVID-19 cases, hospitalizations, and fatalities.
Most business organizations and educational institutions are resuming in full swing [,]. Therefore, maintaining safety guidelines and safeguarding communities against the spread of coronavirus has become a major concern. Organizations should keep track of people’s health status and travel details so that they can be used whenever necessary. This process should be automated and cost-effective for all organizations to maximize utilization. Healthcare technology has grown tremendously in recent years. Every day, new inventions and products are designed for the advancement of humankind. All of these innovations should be made available to everyone in a more feasible manner. In the early days of the pandemic, state and district governments used several models to conduct contact tracing. However, the stigmatization associated with testing positive for COVID-19, as well as the imposition strategy used by the authorities to combat the disease, such as lockdowns and the distinction of confinement zones, struggled to motivate self-assessment and reporting by ordinary citizens. Currently, hospitals in India and other countries still face a lack of technology for the prevention of new cases, which exacerbates the lack of manpower. The present Internet of Things technology in our hospitals might be helpful for personal health monitoring [,,] but does not pay much attention to contact tracing, contact identification, and follow-up [].
The use of radiofrequency identification and a global positioning system in IoT-based tracking has proven to be one of the solutions that help prevent the spread of COVID-19 and minimize its effect []. Automating the contact tracing process, keeping track of people’s health status, maintaining the travel history of a person, and maintaining a secure environment by geofencing the location helps both the authorities and the people of the organization with increased efficiency and reduced time to maintain healthy circumstances [,,,,]. Therefore, the main motivation of this study is to maintain safety guidelines in an organization, thereby maintaining a safe and secure environment for people through prevention rather than cure. The proposed system helps achieve the goal of a robust territory within an organization more economically and efficiently, which is essential for a developing nation such as India.
The key contributions of this study are summarized as follows.
  • We developed an RFID and GPS-enabled wristband to monitor, track, and trace the travel path of the user.
  • We developed an IoT system that collects data from the RFID and GPS-enabled wristband and uploads data to the cloud, analyzes them, and alerts authorities based on the results.
  • We developed a fingerprint-based scanning system to provide additional authentication and verification of the user.
  • We developed a geofencing algorithm to create virtual boundaries around buildings, premises, or blocks and monitor the movement of infected people.
  • We created a robust and modular database that allows maintaining a record of the details, health status, and location of the users within the campus/organization.

3. Proposed System Design

In this section, the design approach is described. Our system is designed in such a way that helps guarantee that individuals adhere to public health rules, which will directly contribute to minimizing the rate at which the virus spreads across the population, thereby dampening the peak. With a slower spread, few patients require critical care for serious illnesses on any given day. The main concepts required to understand the operation of this system are RFID technology and geofencing.
The use of RFID technology in a wristband can help create a safe environment for users []. Each wristband has a unique ID and can be detected using a second device that may be handheld or freestanding. The second device can be found on the premises of an organization, such as schools and offices. A short scan of the wristband might instantly display a “cannot enter” or “enter” signal on the gadget, indicating an individual’s health state. Status codes or classifications, such as healthy, recovered, and quarantined, were used.
The operation of the wristband and database is under the authority of the organization. It is responsible for checking the status of people trying to enter the premises. The organization will also have each person’s location data, which will help it trace his/her path if he/she tests positive later. The organization also has the responsibility to alert other people inside the premises of the number of sick people they might have come in contact with. The organization is also responsible for informing others of the location points of a person who tests positive.

3.1. Methodology

Each person in an organization will be provided with an RFID wristband, which will have a unique ID, along with GPS tracking. The unique ID will be linked to the relevant details related to a particular person, such as name, live location, and health status, and will be stored in cloud systems, such as Google Cloud. Thus, RFID readers, who act as location checkpoints, are present. These RFID readers will be located in different areas inside the organization’s premises, such as at the entrance and blocks. When the fingerprint which is used for authentication and the RFID and GPS wristband is scanned, the person’s information, location coordinates, and health status are reflected in the database. The status of a person is observed and the person is permitted accordingly. Furthermore, there is a facility that can change the user’s health status. The organization is located in a geofenced location. If an unhealthy/sick person attempts to enter an organization’s premises, an alert is issued. Those who must be isolated are monitored continuously. If it is necessary to track a person’s whereabouts inside an organization continuously, then their routes can be traced using the GPS visualization tool. Periodically, an email regarding the daily records of health conditions inside the organization is sent to all its members. A website with restricted access was developed to control and access the database about the details and health conditions of the organization’s members. The proposed system assumes the wearing of a wristband is compulsory in an organization. So, it may add some discomfort to the users. Additionally, there may be electromagnetic exposure associated with the RFID tag. However, the level of radiation is considerably low in intensity and short in duration. Furthermore, the application works better when there is a real-time integration with government applications, such as Aarogya setu, to fetch the health status of the members of the organization.

3.2. Wristband

The wristband side of our prototype consists of an RFID wristband that contains essential user information and the user status that would be used to validate a user’s entry inside the organization’s premise. In addition, the prototype included a GPS module that continuously monitored and tracked the location coordinates of the user. The GPS module used for creating the prototype was the NEO-6M GPS, which was programmed using NodeMCU. The circuit diagram of the wristband components is shown in Figure A1 in Appendix A.

3.3. Reader

The reader consists of an RFID reader, a fingerprint module, and an LCD. The circuit diagram of the RFID reader is shown in Figure A2 in Appendix A. The RFID reader used for this purpose operates at a frequency of 13.56 MHz and is connected to a NodeMCU. The fingerprint module used for creating the prototype is the R307 fingerprint scanner, which is connected to an Arduino that aids in processing information received by the fingerprint scanner.

3.4. User Interface

A robust web application aids in protecting user data and ensuring highly limited access, that is, only to officials within an organization who are going to be in charge of this process. In addition, while handling large databases and multiple user entries, a website makes data visualization more convenient than a mobile app. Furthermore, websites can be opened on all devices (mobile, desktops, and laptops). In addition, bringing new updates or applications across all mobile devices through a website is much easier. Finally, because we did not extract any information from the user’s phone, a website serves the basic requirement conveniently and cost-effectively.

3.5. IoT System Design Architecture

Figure 1 depicts the IoT system architecture used in this study: The sensors responsible for the input of data are the MFRC522 RFID reader, fingerprint scanner, and Neo 6M GPS module. The ESP8266 IC controls the data flow from the sensors to the database, whereas the Atmega controller of Arduino controls the data coming from the fingerprint sensor. The gateways used were HTTP and HTML, the data were sent over HTTP to Google spreadsheets from the NodeMCU, and live location visualization was performed using HTML. The Wi-Fi module of the NodeMCU sends data to the cloud over the Internet. These data can then be visualized on end devices such as PCs and mobile phones.
Figure 1. IoT system architecture of the proposed system.

3.6. Data Flow Architecture

Figure 2 explains the sequence of the data flow. The data can be dumped into RFID memory blocks by using the same reader (MFRC522). The passive 13.56 MHz RFID cards that we used had a memory of 1 kb. The 1 Kb EEPROM’s memory is divided into 16 sectors, each with four blocks, for a total of 64 blocks. Each block is composed of 16 bytes. After the data have been written to the RFID memory blocks, they can be read by the reader with a single scan.
Figure 2. Data flow architecture of the proposed system.
The data from the RFID reader and GPS modules flow through the NodeMCU, whereas the serial data from the fingerprint sensor flow through the Arduino microcontroller. The user data are then sent to Google Cloud by calling the HTTP port, and the live GPS data are visualized using HTML. The data are stored in Google spreadsheets, and data analysis can be visualized on the end devices. We also created an interactive website that takes the data from the spreadsheets and makes them available to the authorities for final analysis and visualization.

4. Implementation of Proposed System

This section describes the implementation of the proposed system, the flow diagrams, and the algorithms. Our proposed system involves the sequential occurrence of events and data flows. To obtain this process, RFID and GPS enable wristbands to be issued by an organization. All students and employees were given one device for each. The default status in every RFID wristband is “HEALTHY”. As the users get tested for COVID-19 and receive their test results, if the results are negative, the status remains “HEALTHY”. If the user tests positive for coronavirus, the hospital, which previously collected his/her institutional details during the test, will share the user’s status with his/her organization. The organization then updates the new status of the user’s wristband.
The organization will refer to the GPS and RFID reader data and inform other people who might have come in contact with the infected person. At the end of the day, an email will be sent to all the users, alerting them about the number of sick/quarantined people who were on the premises, so that others can get themselves tested. The entire process continues in a loop. Thus, from Figure 3, we can see that the operation of the wristband and the database is under the authority of the organization. They are responsible for checking the status of people trying to enter the premises. The organization also has the responsibility to alert other people inside the premises of the number of sick people they might have come in contact with.
Figure 3. Flow diagram of COVID-19 contact tracing process.
Contact tracing flow is the most vital part of this research. Figure 3 illustrates a contact tracing flow diagram that explains the technical aspects that are working in the background of the process flow. While Figure 4 describes the entire process of the proposed system. Here, we assume that the organization has made the wearing of wristbands compulsory. Thus, wearing it is mandatory for all users before entering the organization’s premises. The organization will be a geofenced region, i.e., if the user’s status is “SICK” or “QUARANTINE” and he/she attempts to come within “x” m distance of the geofenced area, then an alert will go off. The geofencing process is explained in detail in the following section. If the user wants to enter the premises, their band is scanned at the entrance by the RFID reader. If the user’s status is “SICK”/“QUARANTINE”, then he/she will not be allowed to enter. If the status is “HEALTHY”/“RECOVERED”, they are allowed to enter. All wristbands are GPS-enabled and continuously record the user’s location inside the organization’s premises. The GPS continuously tracks the user’s location and stores the data online. These data can only be accessed by the institution in the contact tracing process if any user tests positive.
Figure 4. Overall block diagram of automatic people tracking and contact tracing system.

4.1. Code Level Flow

The flow diagram shown in Figure 5 depicts the operation of the code that controls RFID and GPS data. This algorithm, based on the Arduino Integrated Development Environment (IDE) platform, explains in detail the operation of the code.
Figure 5. Flow chart of data collection, verification, and storage.

4.2. Geofencing

Geofencing is a location-based service in which a mobile device or RFID wristband enters or exits a virtual boundary set up around a geographical area, known as a geofence, and an app or other software uses GPS, RFID, Wi-Fi, or cellular data to activate a pre-programmed action. Depending on how a geofence is set up, it can send push notifications, SMS, email, etc., allowing us to track how users travel around the premises. In this study, specific blocks inside the campus/premises were geofenced if required. The geofence can work in two ways: (a) issuing an alert if a person goes out of the geofenced area and (b) issuing an alert if a person tries to enter the geofenced area. Both options can be chosen according to the requirements. Administrators can use geofencing to set up triggers such as push notifications and email alerts. This can also be used to increase user awareness. The logic behind geofencing is illustrated in the flow diagram shown in Figure 6. This algorithm, based on the Arduino IDE platform, explains the operation of the code behind geofencing in detail.
Figure 6. Flow chart for geofencing logic of the system.

4.3. Data Analysis and Visualization

We intend to protect user data and ensure highly limited access, that is, only to officials within an organization who are going to be in charge of this process. When handling big databases and multiple user entries, a website makes data visualization more convenient than a mobile app. As we do not extract any information from the user’s phone, a website serves the basic requirement more conveniently and cost-effectively.
We created a website that holds all information and actions required to operate the entire system. The website has the following features. (a) We can enter the website for the first time by clicking on the “Enter” button on the lightbox that pops up. (b) The website homepage, which is open to all, can be viewed. The homepage contains data on services provided, opening hours, and contact information. (c) However, a person viewing a website cannot access any database for data analysis without logging in. For extra security, only those authorized to access the website will be able to log in. They have to provide their email ID, and after we approve the information, the authorities are allowed to log in. (d) After logging in, the “Update Status” and “User Details” pages can be accessed. (e) On the “Update Status” page, all information, both overall and corresponding to each user, is available. (f) The data files, daily data analysis, GPS visualization, and the “Update user status” button will be available. (g) The “Update user status” is connected to the “User Details” page, where after entering the necessary information about the user, his/her health status can be changed according to his/her test reports. (h) There is also an option for operators to go to their profiles and make any changes to their information if required.

5. Results and Discussion

The experimental set-up of the proposed system hardware, along with the COM port window of Arduino IDE and the respective log screen is shown in Figure 7. The COM window shows the scanning and publishing of user information and the log screen display the live user information. Figure 8 illustrates the scanning of RFID, publishing of respective tag ID, location, and health status of the subject in the COM as well as log window. Each person in an organization will be provided with an RFID tag, which will have a unique ID along with GPS tracking. The unique ID will be linked to the user details such as name, live location, and health status. Fingerprint verification helps to authenticate the users. The fingerprint of the user is mapped with the respective RFID tag to prevent any misuse of identity. A geofencing algorithm was developed to create virtual boundaries for the virus-infected user. It defines the longitude, latitude, and radius of each infected user and keeps monitoring them. The algorithm issues an alert message whenever the user moves out of the geofenced area or any other user enters the geofenced region. Table 2 highlights the novelty of our proposed work in contrast to the existing works.
Figure 7. Experimental setup along with a status update in the COM port window and log screen.
Figure 8. Location and status update in the COM port window and log screen after the RFID tag was scanned.
Table 2. Comparison of our proposed work with the existing literature.

5.1. Log Datasheet

The log datasheet is used to collect the data whenever the RFID wristband is scanned. Figure A4 in Appendix A presents the typical log data page with live user information. In the COM window, the “Scan RFID band” message is displayed. When the wristband is scanned in the COM window, the unique ID, message, location, and whether the perimeter is accessed or not breached are displayed, and the data are published in the log datasheet. Figure A3 in Appendix A presents the COM window of Arduino IDE, showing the scanning and publishing of user information.
The wristband was scanned and the data were simultaneously published on the sheet. A successful message is displayed in the COM window. The first column in the sheet is the date and time of the card being scanned. Then, the following information is obtained: the name of the person, location in an organization, the different places where the wristband has been scanned, the status of the person (recovered, quarantine, healthy), action (whether the person can or cannot enter), latitude, longitude, and access to the organization. Access is granted according to geographical location and status. When a person enters a geofenced area, the message “Perimeter accessed” is published to the datasheet, and when the person is quite far from the area, a “No breach” message is published. When the person’s status is quarantine, the action is “Cannot enter”; accordingly, when the person is healthy, the action is “Enter”. These changes can be noted in the datasheet. The count vs. status chart is updated automatically as the wristband is scanned, and the number of healthy, recovered, and quarantined wristbands is counted and updated automatically.
On sheet 2, the list of student names, their email IDs, the subject, the body part, and the count were also updated automatically using the formula. When in sheet 1, the wristband is scanned automatically, and the chart in sheet 1 and count in sheet 2 are updated. This information is primarily used to send emails. In sheet 3, the day-wise analysis, which is the entire history along with a date and the count of healthy, quarantined, and recovered individuals, can be visualized. This particular chart shown in Figure 9 was also published as a separate URL and sent along with the email.
Figure 9. Information sheet for daily analysis of recorded data.

5.2. GPS Datasheet

In the GPS datasheet, the continuous GPS data of a particular user are logged. The date, time, latitude, and longitude of one user were recorded and published on the sheet with a time interval of 6–7 s. Data were entered into the sheet when the GPS was turned on. In the COM window, the message is displayed when the data are being published, and a successful message is displayed when the data are written in the sheet. Figure A5 in Appendix A displays the COM window showing the individual GPS data. Google Maps were used to determine the current location of a person. When data are entered into the current location, the person can be visualized using the IP address. The red mark on Google Maps indicates the current location of the person. To see the entire route of the person, that is, the complete route of the person being continuously entered into the Excel sheet, the Excel sheet needs to be converted into a KML file, a keyhole markup language file, so that when the file is opened on Google Earth, the entire route traveled by the person is visualized. Figure 10 depicts the mapping of a user’s path for the contact tracing process. The red line on Google Earth shows the entire root traveled by the person.
Figure 10. Detailed mapping of a user’s path for the contact tracing process.

5.3. Web Portal

A website that integrates all the tasks and functions of this study was created. The site “COVID-19 status monitoring” has a welcome page and a list of the services provided, the wristband, updating status, GPS monitoring, and a few other professional details such as contact ID and open hours.
On the website, there are provisions for changing the status of a person. The first and last names, user IDs, and health statuses should be updated. Once the changes have been made and the submit button has been clicked, the respective authorities receive an email. The status is updated at the backend, and changes can be observed in the log datasheet when the wristband is scanned again.
For “GPS visualization”, there is a provision to change the Excel sheet into a KML file that can be viewed on Google Earth. The website will also have a “GPS repository” for every person in the organization, as presented in Figure A6 in Appendix A. The live location where the wristband was scanned last will be opened by clicking the “open live GPS location button”, and the entire GPS history of the person will also be saved here and can be opened by clicking the “open GPS history” button.

5.4. Update Status

Updating the status of users is an important aspect of this study. To update the status of the user, the “COVID-19 status monitoring website” can be used. Once the changes have been made and the submitted button has been clicked, the concerned authorities will receive an email with all details filled in. This change is also updated in the “Status Update” table, which can be viewed by the authorities. Figure A7 in Appendix A illustrates the sample status update record. These changes were noted and updated in the RFID wristband at the back end. When this card was scanned again, a new status was entered into the log datasheet. The database of the application and the web portal have restricted access. Login credentials are required to access the user information. Thus, the data collected through wristbands are accessible only to authorized people.

5.5. Sending Updates to the Users

Along with daily data collection and analysis, users were informed about the current status of their surroundings. We used Integromat software to send automated emails to users at periodic time intervals. The email ID was registered with the site, and an Excel sheet was created with all the required details added to the scenario. The contents of the Excel spreadsheet were updated automatically. The counts of the healthy, quarantined, and recovered are sent, and the day-wise analysis link is attached to the email. An email was sent from the registered email ID to the list of recipients added to an Excel spreadsheet. The email can be scheduled once a week, every day, or every month, according to the requirements of the organization. In this way, users are constantly updated about their organization’s status and can prepare themselves accordingly.

6. Conclusions

In this research work, we developed a fully automated IoT system to track people, trace contacts, and define virtual boundaries for COVID-19-infected people. The presented solution can be deployed in educational institutions or organizations to quickly identify COVID-19 patients and avoid the further spreading of the virus. The RFID and GPS-enabled wristband not only tracks the present location of the user but additionally, it records the entire travel path of the user and their contacts. The fingerprint scanner helps to authenticate people and avoids any misuse of wristbands. The proposed geofencing algorithm not only defines the boundaries for infected people but also checks whether the infected people stayed within the geofenced boundary. Furthermore, the algorithm generates an alarm whenever the infected people move out of the designated boundary. The proposed system integrates all the modules in real time and communicates the health status, travel path, and contact history to authorized people through email and a secure web portal.

Limitations and Future Work

The organization must be equipped with proper internet connectivity and Wi-Fi facilities to effectively monitor the individuals. Passive RFID tags were used for this research. Hence, it cannot be used to calculate the proximity between the users. Since the system was designed to function within an organization, the safety and contact tracing of members outside the organizational premise cannot be guaranteed. The presented work can be extended to monitor elderly people and patients suffering from illnesses such as Alzheimer’s and dementia. Furthermore, active RFID tags can be used to sense the proximity between the users, and hence, the social distancing between the users can be verified. The source code of the proposed implementation is publicly available on the GitHub repository (https://github.com/vravidvk/IoTwristband, accessed on 25 September 2022).

Author Contributions

Conceptualization, V.R.; Investigation, V.R.; Writing—original draft, S.M., V.K., S.S. and V.R.; Writing—review & editing, V.R. and S.S.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The datasets generated or analysed during the study are available from the corresponding author on reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Circuit Diagrams and Results

Figure A1 represents the circuit diagram of the wristband components and Figure A2 displays the circuit diagram of the RFID reader.
Figure A1. Circuit diagram of GPS and NodeMCU connection in the wristband.
Figure A2. Circuit diagram of the RFID reader.
Figure A3. The COM window of Arduino IDE showing the scanning and publishing of user information.
Figure A4. Log data page with live user information.
Figure A5. COM window of Arduino IDE showing the publishing of individual GPS data.
Figure A6. Respective links for GPS history and live location.
Figure A7. Overall status update track record.

References

  1. Vargo, D.; Zhu, L.; Benwell, B.; Yan, Z. Digital technology use during COVID-19 pandemic: A rapid review. Hum. Behav. Emerg. Technol. 2021, 3, 13–24. [Google Scholar] [CrossRef]
  2. Drissi, N.; Ouhbi, S.; Marques, G.; de la Torre Díez, I.; Ghogho, M.; Janati Idrissi, M.A. A systematic literature review on e-mental health solutions to assist health care workers during COVID-19. Telemed. e-Health 2021, 27, 594–602. [Google Scholar] [CrossRef] [PubMed]
  3. Iacopetta, D.; Ceramella, J.; Catalano, A.; Saturnino, C.; Pellegrino, M.; Mariconda, A.; Longo, P.; Sinicropi, M.S.; Aquaro, S. COVID-19 at a glance: An up-to-date overview on variants, drug design and therapies. Viruses 2022, 14, 573. [Google Scholar] [CrossRef] [PubMed]
  4. Liang, H.Y.; Wu, Y.; Yau, V.; Yin, H.X.; Lowe, S.; Bentley, R.; Ahmed, M.A.; Zhao, W.; Sun, C. SARS-CoV-2 Variants, Current Vaccines and Therapeutic Implications for COVID-19. Vaccines 2022, 10, 1538. [Google Scholar] [CrossRef] [PubMed]
  5. Berno, G.; Fabeni, L.; Matusali, G.; Gruber, C.E.M.; Rueca, M.; Giombini, E.; Garbuglia, A.R. SARS-CoV-2 Variants Identification: Overview of Molecular Existing Methods. Pathogens 2022, 11, 1058. [Google Scholar] [CrossRef]
  6. Chandra, M.; Kumar, K.; Thakur, P.; Chattopadhyaya, S.; Alam, F.; Kumar, S. Digital technologies, healthcare and COVID-19: Insights from developing and emerging nations. Health Technol. 2022, 12, 547–568. [Google Scholar] [CrossRef]
  7. Chowdhury, D.; Banerjee, S.; Sannigrahi, M.; Chakraborty, A.; Das, A.; Dey, A.; Dwivedi, A.D. Federated learning based COVID-19 detection. Expert Syst. 2022, e13173. [Google Scholar] [CrossRef]
  8. Kaushik, K.; Dahiya, S.; Singh, R.; Dwivedi, A.D. Role of Blockchain in Forestalling Pandemics. In Proceedings of the 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Delhi, India, 10–13 December 2020; IEEE: Manhattan, NY, USA, 2020; pp. 32–37. [Google Scholar]
  9. Nair, P.J.; Ravi, V. Intelligent, Automated, and Web Application-Based Cradle Monitoring System. In Handbook of Smart Materials, Technologies, and Devices; Hussain, C.M., Di Sia, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar] [CrossRef]
  10. Sinha, N.; Ravi, V. Implementation of health monitoring system using mixed environment. Indian J. Sci. Technol. 2015, 8, 1–7. [Google Scholar] [CrossRef]
  11. Ajaz, F.; Naseem, M.; Sharma, S.; Shabaz, M.; Dhiman, G. COVID-19: Challenges and its technological solutions using IoT. Curr. Med. Imaging 2022, 18, 113–123. [Google Scholar] [CrossRef]
  12. Sivasankar, G.; Anand, A.P. Internet of Things based Wearable Smart Gadget for COVID-19 Patients Monitoring. In Proceedings of the 2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, India, 24–26 March 2022; IEEE: Manhattan, NY, USA, 2022; pp. 130–134. [Google Scholar]
  13. Yang, C.; Wang, W.; Li, F.; Yang, D. An IoT-Based COVID-19 Prevention and Control System for Enclosed Spaces. Future Internet 2022, 14, 40. [Google Scholar] [CrossRef]
  14. Lavric, A.; Petrariu, A.I.; Mutescu, P.M.; Coca, E.; Popa, V. Internet of Things Concept in the Context of the COVID-19 Pandemic: A Multi-Sensor Application Design. Sensors 2022, 22, 503. [Google Scholar] [CrossRef]
  15. Abd El-Haleem, A.M.; Mohamed, N.E.D.M.; Abdelhakam, M.M.; Elmesalawy, M.M. A Machine Learning Approach for Movement Monitoring in Clustered Workplaces to Control COVID-19 Based on Geofencing and Fusion of Wi-Fi and Magnetic Field Metrics. Sensors 2022, 22, 5643. [Google Scholar] [CrossRef]
  16. Abd El-Haleem, A.M.; Salama, A.I.; Anany, M.G.; Abdelhakam, M.M.; Khalaf, G.A.; Elmesalawy, M.M. IoT Enabled Geofencing-Based System for Monitoring and Enforcing COVID-19 Control Measures in Workplaces, Service Areas and Distributed Home Quarantine. In Proceedings of the 2022 9th International Conference on Electrical and Electronics Engineering (ICEEE), Turkey, Alanya, 29–31 March 2022; IEEE: Manhattan, NY, USA, 2022; pp. 290–295. [Google Scholar]
  17. Ogundokun, R.O.; Awotunde, J.B.; Adeniyi, E.A.; Misra, S. Application of the Internet of Things (IoT) to Fight the COVID-19 Pandemic. In Intelligent Internet of Things for Healthcare and Industry; Springer: Berlin/Heidelberg, Germany, 2022; pp. 83–103. [Google Scholar]
  18. Shahroz, M.; Ahmad, F.; Younis, M.S.; Ahmad, N.; Boulos, M.N.K.; Vinuesa, R.; Qadir, J. COVID-19 Digital Contact Tracing Applications and Techniques: A Review Post Initial Deployments; Elsevier: Amsterdam, The Netherlands, 2021. [Google Scholar]
  19. Rajasekar, S.J.S. An Enhanced IoT Based Tracing and Tracking Model for COVID-19 Cases; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
  20. Sicari, S.; Rizzardi, A.; Coen-Porisini, A. Alberto Coen-Porisini, Home Quarantine Patient Monitoring in the Era of COVID-19 Disease; Elsevier: Amsterdam, The Netherlands, 2021. [Google Scholar]
  21. Jahmunah, V.; Sudarshan, V.K.; Oh, S.L.; Gururajan, R.; Gururajan, R.; Zhou, X.; Tao, X.; Faust, O.; Ciaccio, E.J.; Ng, K.H.; et al. Future IoT tools for COVID-19 contact tracing and prediction: A review of the state-of-the-science. Int. J. Imaging Syst. Technol. 2021, 31, 455–471. [Google Scholar] [CrossRef]
  22. Vedaei, S.S.; Fotovvat, A.; Mohebbian, M.R.; Rahman, G.M.; Wahid, K.A.; Babyn, P.; Marateb, H.R.; Mansourian, M.; Sami, R. COVID-SAFE: An IoT-Based System for Automated Health Monitoring and Surveillance in Post-Pandemic Life. IEEE Access 2020, 8, 188538. [Google Scholar] [CrossRef]
  23. Tan, J.; Sumpena, E.; Zhuo, W.; Zhao, Z.; Liu, M.; Chan, S. Geofencing for COVID-19 Home Quarantine Enforcement. IEEE Internet Things Mag. 2020, 3, 24–29. [Google Scholar] [CrossRef]
  24. Karthi, P.; Jayakumar, M. Smart Integrating Digital Contact Tracing with IoMT for COVID-19 using RFID and GPS. J. Xi’an Shiyou Univ. Nat. Sci. Ed. 2020, 16, 38–43. [Google Scholar]
  25. Tekler, Z.D.; Low, R.; Gunay, B.; Andersen, R.K.; Blessing, L. A scalable Bluetooth Low Energy approach to identify occupancy patterns and profiles in office spaces. Build. Environ. 2020, 171, 106681. [Google Scholar] [CrossRef]
  26. Baronti, P.; Barsocchi, P.; Chessa, S.; Mavilia, F.; Palumbo, F. Indoor bluetooth low energy dataset for localization, tracking, occupancy, and social interaction. Sensors 2018, 18, 4462. [Google Scholar] [CrossRef]
  27. Filippoupolitis, A.; Oliff, W.; Loukas, G. Occupancy detection for building emergency management using BLE beacons. In Proceedings of the International Symposium on Computer and Information Sciences 2016, Krakow, Poland, 27–28 October 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 233–240. [Google Scholar]
  28. Tekler, Z.D.; Low, R.; Blessing, L. An alternative approach to monitor occupancy using bluetooth low energy technology in an office environment. J. Phys. Conf. Ser. 2019, 1343, 012116. [Google Scholar] [CrossRef]
  29. Huang, K.; He, K.; Du, X. A hybrid method to improve the BLE-based indoor positioning in a dense bluetooth environment. Sensors 2019, 19, 424. [Google Scholar] [CrossRef]
  30. Ng, P.C.; Spachos, P.; Plataniotis, K.N. COVID-19 and your smartphone: BLE-based smart contact tracing. IEEE Syst. J. 2021, 15, 5367–5378. [Google Scholar] [CrossRef] [PubMed]
  31. Filippoupolitis, A.; Oliff, W.; Loukas, G. Bluetooth low energy based occupancy detection for emergency management. In Proceedings of the 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS), Granada, Spain, 14–16 December 2016; pp. 31–38. [Google Scholar]
  32. Tekler, Z.D.; Low, R.; Yuen, C.; Blessing, L. Plug-Mate: An IoT-based occupancy-driven plug load management system in smart buildings. Build. Environ. 2022, 223, 109472. [Google Scholar] [CrossRef]
  33. Balaji, B.; Xu, J.; Nwokafor, A.; Gupta, R.; Agarwal, Y. Sentinel: Occupancy based HVAC actuation using existing WiFi infrastructure within commercial buildings. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, Roma, Italy, 11–15 November 2013; pp. 1–14. [Google Scholar]
  34. Saleem, K.; Saleem, M.; Zeeshan, R.; Javed, A.R.; Alazab, M.; Gadekallu, T.R.; Suleman, A. Situation-aware BDI reasoning to detect early symptoms of COVID-19 using smartwatch. IEEE Sens. J. 2022. [Google Scholar] [CrossRef]
  35. Shakeel, T.; Habib, S.; Boulila, W.; Koubaa, A.; Javed, A.R.; Rizwan, M.; Gadekallu, T.R.; Sufiyan, M. A survey on COVID-19 impact in the healthcare domain: Worldwide market implementation, applications, security and privacy issues, challenges and future prospects. Complex Intell. Syst. 2022, 1–32. [Google Scholar] [CrossRef]
  36. Anantharajah, H.; Harika, K.; Jayasinghe, A.; Aibin, M. COVID-19 Contact Tracing Using BLE and RFID for Data Protection and Integrity. In Proceedings of the 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 1–4 December 2021; pp. 0190–0196. [Google Scholar]
  37. Moremada, C.; Sandeepa, C.; Dissanayaka, N.; Gamage, T.; Liyanage, M. Energy efficient contact tracing and social interaction based patient prediction system for COVID-19 pandemic. J. Commun. Netw. 2021, 23, 390–407. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.