Views 
   PDF Download PDF Downloads: 226

 Open Access -   Download full article: 

Physical Distancing Detection System with Distance Sensor for COVID-19 Prevention

Estifanos Tilahun Mihret*

Computer Science, Mettu University, Mettu, Ethiopia.

Corresponding Author E-mail: amirelove03@gmail.com

DOI : http://dx.doi.org/10.13005/ojcst16.01.05

Article Publishing History
Article Received on : 20 Jan 2023
Article Accepted on : 23 Feb 2023
Article Published : 27 Feb 2023
Plagiarism Check: Yes
Reviewed by: Dr. Harishchander Anandaram
Second Review by: Dr. Ishfaq Hussain
Final Approval by: Dr. Lim Eng Aik
Article Metrics
ABSTRACT:

COVID-19 is an ongoing pandemic and dangerous of coronavirus disease 2019. It caused by the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). COVID-19 spreads most often when people are physically close. And, it spreads very easily and sustainably through the air, primarily via small droplets or aerosols, as an infected person breaths, coughs, sneezes, sings or speaks. The recommended preventive measures include hand washing, covering one’s mouth when sneezing or coughing, physical distancing, wearing a face mask in public, ventilation and air-filtering, disinfecting surfaces, and monitoring and self-isolation for people exposed or symptomatic. Hence, this paper proposed the architecture of physical distancing detection system with distance sensor which deployed on UAV System with the help of BTS (2G/3G/4G/5G) to enrich the COVID-19 preventive measures, as well as I have also developed a few algorithms for distance sensor (on UAV System) operations which sensing, tagging and disseminating the current distance, position and waiting time of resident’s information, and forwarding schemes to respective infrastructures and suspected residents including the security forces.

KEYWORDS: COVID-19; COVID-19 Prevention; Distance Sensor; GPS; Physical Distancing; Social Distancing

Copy the following to cite this article:

Mihret E. T. Physical Distancing Detection System with Distance Sensor for COVID-19 Prevention. Orient.J. Comp. Sci. and Technol; 16(1).


Copy the following to cite this URL:

Mihret E. T. Physical Distancing Detection System with Distance Sensor for COVID-19 Prevention. Orient.J. Comp. Sci. and Technol; 16(1). Available from: https://bit.ly/3Y5WLZ1


Introduction

The COVID-19 pandemic, also known as the coronavirus pandemic, is an ongoing pandemic of coronavirus disease 2019 (COVID-19) caused by the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It was first identified in December 2019 in Wuhan, China 1. The outbreak was declared a Public Health Emergency of International Concern in January 2020 and a pandemic in March 2020. As of 27 October 2020, more than 43.5 million cases have been confirmed, with more than 1.15 million deaths attributed to COVID-19 2. COVID-19 spreads most often when people are physically close. And, it spreads very easily and sustainably through the air, primarily via small droplets or aerosols, as an infected person breaths, coughs, sneezes, sings or speaks. It may also be transmitted via contaminated surfaces, although this has not been conclusively demonstrated 3,4,5. Airborne transmission from aerosol formation is suspected to be the main mode of transmission. It can spread from an infected person for up to two days before they display symptoms, and from people who are asymptomatic. People remain infectious for seven to twelve days in moderate cases, and up to two weeks in severe cases.

Common symptoms include fever, cough, fatigue, breathing difficulties, and loss of smell and taste. Complications may include pneumonia and acute respiratory distress syndrome. The incubation period is typically around five days but may range from one to 14 days. There are several vaccine candidates in development, although none have completed clinical trials. There is no known specific antiviral medication, so primary treatment is currently symptomatic 6.

Recommended preventive measures include hand washing, covering one’s mouth when sneezing or coughing, physical distancing, wearing a face mask in public, ventilation and air-filtering, disinfecting surfaces, and monitoring and self-isolation for people exposed or symptomatic. Authorities worldwide have responded by implementing travel restrictions, lockdowns, workplace hazard controls, and facility closures. Many places have also worked to increase testing capacity and trace contacts of the infected.

Physical distancing (also known as social distancing) includes infection control actions intended to slow the spread of the disease by minimizing close contact between individuals. Methods include quarantines; travel restrictions; and the closing of schools, workplaces, stadiums, theatres, or shopping centers. Individuals may apply physical distancing methods by staying at home, limiting travel, avoiding crowded areas, using no-contact greetings, and physically distancing themselves from others 7,8. Many governments are now mandating or recommending physical distancing in regions affected by the outbreak. Non-cooperation with distancing measures in some areas has contributed to the further spread of the pandemic.

However, to enforce the rule of physical distancing by lockdown and related ways in developing countries such as Ethiopia, it is very tough because of their majority populations are living in hand-to-mouth life style. So, they need another method that is why this paper proposed.

In this paper, I have designed the architecture of physical distancing detection system with distance sensor which deployed on UAV System with the help of BTS (2G/3G/4G/5G) to enhance the COVID-19 preventive measures. Besides the architecture, I have also developed a few algorithms for UAV System operations which sensing, tagging and disseminating the current distance, position and waiting time of resident’s information, and forwarding schemes to respective infrastructures and suspected residents including the security force.

The paper is organized into two broad sections followed by conclusion, recommendations, acknowledgement and references. Section II describes about the related works in detail. And, section III gives a deep design of the architecture of the proposed solution with the developed algorithms.

Related Work

Enforcing Social Distancing Policies with Proximity Sensors

In 9 a proximity detection and contact tracing for COVID-19 has been presented. The press released different techniques to enhance the workplace safety by enforcing social distancing policies with proximity sensors. The main objectives of the press are to ensure that people are keeping the safe distance between each other and reduce virus interactions, avoid temporary shutdowns of operating factories with enhanced safety measures and track all the interactions between the infected and healthy people to identify a contamination cluster.

The press has presented five basic techniques or solutions to proximity detection and contact tracing for COVID-19. As a first technique, each employee can be equipped with a compact wearable proximity sensor which enables easy monitoring of interactions within the common areas, also working alongside security badges for access control when the sensors record that two or more people have exceeded the safety limit, it warns them with an audible or visual alarm. In addition, as an optional, there is a centralized monitoring of contact events which can afterwards help back-track contaminations chains, making it easy to locate contamination clusters. In the second technique, zoning policy enforcement, factory floor is subdivided into zones to limit spread of COVID-19. It help workers remain within their assigned zones by audio notification and optionally inform the management if worker repeatedly violates the zoning policy. In the third method, density policy enforcement, the audio warning help employees respect maximum density of shared areas (e.g. rest and food areas, meeting rooms). And, the employee to employee proximity monitoring takes in account distance and time. As like as the first method, this method also has two options. As a first option, there is a centralized monitoring and violation reporting, and as a second option, there is a back-tracking of infection chains. In the fourth method, sanitization of shared assets, the worker presence in front of shared-use asset can be analyzed using proximity detection. The asset requires only inexpensive Bluetooth Beacon and the disinfect assets based on usage metrics. And, it ensure traceability of cleaning operations with a list of visited WiFi/BLE SSIDs or another Abbeeway device. In the final method, Nurse-call bedside buttons in hospitals, the non-medical facilities get converted to hospitals to manage large influx of Coronavirus patients. The patients in these facilities need nurse call-buttons – Tracker has button and can locate bed. And also, the trackers can be used to monitor usage and prevent loss of medical equipment (e.g. Respirators).

The press has also presented in technical perspectives (from devices to screens – processing positioning information at the edge of the LPWA network to deliver actionable data to business applications) as follows:

The Abeeway Smart Badge™ detects other Smart Badges in the vicinity using BLE beaconing and scanning, it evaluates peer to peer proximity as well proximity to monitored shared-use assets. Devices send an alert when certain risk levels are exceeded (thresholds are configurable). Optionally, devices can be located using GPS, Low-power GPS, WiFi Sniffing or BLE.

Then the data about those encounters is transmitted via long range, ultra-low power LoRaWAN® wireless network on private or public infrastructure, providing low cost connectivity & low Total Cost of Ownership. Actility’s ThingPark Platform is used for devices and gateways operations support system (OSS), data transfer and security.

ThingPark platform transforms the date and allows IoT applications to leverage it via integrated API’s and drivers.

The platform is integrated with Business Applications and Clouds (AWS, IBM Cloud, Microsoft Azure, My Devices, PTC Thing Worx, Sales Force, WMW, etc). Those business applications provide policy compliance overview, back tracing capabilities and business rule engine.

Figure 1: Abeeway Platform [9]

Click here to View Figure

However, the work considered only the indoor surroundings such as business centers and industries, thus further exploration on outdoor conditions such as open market places and concerts are needed. Furthermore, the work completely depends on the behalf of the workers because of if one worker off the wearable proximity sensor, the work cannot enforce the social distancing policies. And also, the work presented the centralized monitoring of contact events as optional but it should be mandatory to ensure the enforcement of social distancing policies.

Enforcing Social Distancing Policies with Proximity Sensors

In 10 a comprehensive survey and open problems on enabling and emerging technologies for social distancing has been conducted. The work intentions to provide an inclusive background on social distancing as well as how emerging technologies, e.g., wireless and networking, machine learning, artificial intelligence (AI), computer vision, thermal, ultrasound can enable, encourage, and even enforce social distancing practice.

The authors have identified/proposed a practical social distancing scenarios in the survey. The scenarios can be briefly classified as follows:

Keeping Distance: In the scenario, various positioning and AI technologies can assist in keeping sufficient distance (e.g., 1.5m apart) among people. Based on that, when a person gets too close to another or a crowd, the person can be alerted (e.g., by smartphones).

Real-time Monitoring: Many wireless and related technologies can be utilized to monitor people and public places in real-time (without compromising citizens’ privacy). The purposes of such monitoring are to collect meaningful data (e.g., numbers of people inside buildings, contacts, symptoms, crowds, and social distancing measures violations) to facilitate social distancing.

Information System: Technologies such as Bluetooth, Ultra-wideband, Global Navigation Satellite Systems (GNSS), and thermal can be employed to collect the trajectory data of the infected individuals and the contacts that these individuals made.

Incentive: Social distancing has negative impacts on personal freedom and the economy. Therefore, incentive mechanisms are needed to encourage people to comply with social distancing measures (e.g., incentivize people to share their movement data and self-isolate). Optimization techniques and technologies such as Bluetooth, WiFi, and cellular together with economics tools like game theory, auctioning, and contract theory can facilitate those incentive mechanisms.

Scheduling: Various scheduling methods can be employed to increase the efficiency of workforce and home healthcare service scheduling, thereby decreasing the number of employees at workplaces and patients at hospitals. Moreover, scheduling techniques can also be applied for traffic control to reduce the number of vehicles and pedestrians on the street. Furthermore, technologies such as WiFi, Radio Frequency Identification (RFID), and Zigbee can be applied for building access scheduling.

Automation: In the social distancing context, autonomous vehicles such as medical robots and unmanned aerial vehicle (UAV) can be utilized to reduce the need for human presence in essential tasks, e.g., medical procedures and delivery services. Technologies such as ultra-wideband, GPS, ultrasound, and inertial sensors can be leveraged for the positioning and navigation of these autonomous vehicles.

Modelling and Prediction: AI technologies can be employed for pandemic data mining. The results can help to predict the future trends and movement of the infected and susceptible individuals. Moreover, AI-based classification algorithms can be leveraged to detect disease symptoms in public places.

However, all these proposed scenarios are not respect the citizens’ privacy as well as the scenarios are completely depends on the consensus of the residents.

Figure 2: Practical Social Distancing Scenarios [10]

Click here to View Figure

Figure 3: Application of Technologies to Different Social Distancing Scenarios [10]

Click here to View Figure

The work has presented an important open issues and challenges, (e.g., privacy-preserving, scheduling, and incentive mechanisms) in implementing social distancing in practice. As an example, instead of reacting with ad-hoc responses to COVID-19-like pandemics in the future, smart infrastructures (e.g., next-generation wireless systems like 6G, smart home/building, smart city, intelligent transportation systems) should incorporate a pandemic mode in its standard architecture/design.

Design of the Proposed Solution

As I have discussed in related work, different technologies are very significant to enforce the physical distancing policies. Most of current works on physical distancing enforcement are focusing on indoor environments and they completely depends on the behalf of the residents/workers because of if one resident/worker off the wearable proximity sensor (a technology that support to enforce the physical distancing policies), the resident/work cannot apply the policies. And also, the works presented the centralized monitoring of contact events as optional but it should be mandatory to ensure the enforcement of physical distancing policies. Hence, to overcome these limitations (particularly on outdoor/high coverage area) as much as possible, I have proposed the architecture of physical distancing detection system with distance sensor which deployed on UAV System with the help of BTS (2G/3G/4G/5G) to enrich the COVID-19 preventive measures, as well as I have also developed a few algorithms for distance sensor (on UAV System) operations which sensing, tagging and disseminating the current distance, position and waiting time of resident’s information, and forwarding schemes to respective infrastructures and residents including the security forces.

Architectures of the Proposed Solution

I describe and present the overall architecture of my proposed system on potential spots such as pedestrians’ walkways, restaurants, taxi fermatas, stadiums and open shopping centers as shown in Figure 1.4. As a first section, I describe and present my proposed distance sensor on UAV System operations which periodically sensing, tagging and disseminating the current distance, position and waiting time of resident’s information with MAVLink and other related packets. As a second section, approaches and objectives of forwarding models of the sensed information (tagged packets) to the respective infrastructures and residents including the security forces are discussed. And, as a final section, I discuss and present the general proposed architecture states.

Figure 1.4 shows the general low-level architecture of the proposed system on potential spots such as pedestrians’ walkways, restaurants, taxi fermatas, stadiums and open shopping centers. In this low level architecture, I have designed four major wireless and wired infrastructures (UAV System, UAV’s GCS (Gateway Control Station), BTS (2G/3G/4G/5G) and Central Control Station (like data center)) with their respective locations and the communication range of each wireless infrastructure is considered as an ideal cell.

I have supposed that the proposed single small UAV system is a full autonomous Quadrotor Drone (4 rotor wing) type which does not require any direct human intervention for flying (uplink communication) and it capable to hover on a specific area for a while. The system has deployed around on the potential spots/areas with about 10m altitude (height) of UAV flight from the ground and its transmission range covered nearby 150–200m, and completely confined by the transmission range of BTS (2G/3G/4G/5G). The drone has a hovering motion over the area of sensing operation and proceed a different types of communications such as with residents’ mobile phones, BTS (2G/3G/4G/5G) and central control station via IEEE 802.11b/g interface with the help of its CCT BS/GCS.

In the proposed architecture/model, I have only used a downlink communication that a UAV broadcasts the sensed information (tagged packet) within coverage area. In order to this, the residents’ mobile phones and GCS will receive the broadcasted packet via LOS or direct radio link of IEEE 802.11b/g communication. In addition, the GCS which being in the proposed model has also used as a gateway to facilitate a communication among UAV-to-BTS (2G/3G/4G/5G) and UAV-to-Central control station.

Whereas the BTS (2G/3G/4G/5G) network has designed on the road segment as one of the wireless access network infrastructures. I supposed that the BTS (2G/3G/4G/5G) cell covered about 1km which means it can completely cover the coverage area of the other deployed infrastructures as shown in Figure 1.4. And, the network can communicate with the UAV System through its core network (Base Station Center/BSC). As well as, the BTS (2G/3G/4G/5G) network can make a direct communication with residents’ mobile phones.

Central Control Station (Centralized Data Center) has also designed on the road segment. The control station is connected with Internet (Cloud/Gateway) to communicate with the designed infrastructures including the security forces’ mobile phone. Moreover, I have considered few basic assumptions when I design the proposed architecture. For instance, all residents and security forces have a mobile phone.

Figure 4: General Low-Level Architecture of the Proposed Solution

Click here to View Figure

Figure 1.5 that shown on the below depicts the overall high-level architecture that will be implemented in the proposed system in a potential spots like open markets. Generally, the architecture has four core modules, Unmanned Aerial Vehicle (UAV), BTS (2G, 3G, 4G, 5G – Mobile Networks), Central Control Station (Data Center) and Residents and Security Forces Mobile Phones respectively. And also there are four major proposed forwarding schemas that from Distance Sensor (DS) on UAV to Central Control Station (Data Center), Central Control Station (Data Center) to BTS (2G/3G/4G/5G, BTS (2G/3G/4G/5G) to Suspected Residents (Residents’ Mobile Phones), and Distance Sensor on UAV to Suspected Residents (Residents’ Mobile Phones).

In the UAV module, there are four major layers such as application, network & transport, processing unit, and communication layers respectively 11,12 as revealed in Figure 1.5 as shown below. The communication layer has capable to transmit and receive various data from/to other UAV and/or GCS via IEEE 802.11b/g based RF transceiver. In the processing unit layer, there are three major internal modules such UAV Controller (FCS), Task/Mission Manager and Sensor Unit. The primary operation of UAV controller is reads and analyzes data from a wide variety of sensors and produces a mission flight plan, and it has direct communications with sensor unit and task manager modules. Task/Mission Manager module is responsible for registering new and monitoring ongoing missions, and it has three direct communications such with sensor unit module, task manager module and communication interface layer. The third module of processing unit layer is a sensor unit which responsible for detecting and measuring a different stimulus and signal of UAV’s internal part and sensing operation area. In this module, there are many well-known sensors are installed, such as GPS for navigating a position of UAV and operation area, Distance Sensor (DS) for measuring the distance of residents being in the operation area and Timer for determine the waiting time among nearest residents from operation area. The network and transport layer of UAV is a fundamental layer that primarily responsible for routing a MAVLink packet 13 and end-to-end communication via UDP or TCP/IP respectively. Whereas, the last layer of UAV module is application layer that accountable for supporting and providing different services such as mapping, surveying, traffic controlling, military operation and border monitoring. However, those applications are depending on the type and capacity of UAV.

As presented in Figure 1.6, the 2G/3G/4G/5G – Mobile Networks module has two major components which named as BTS/NodeB/eNodeB (eNB) / gNB and BSC/EPC Server (Gateway) respectively. The BTS/NodeB/eNodeB(eNB)/gNB is a fixed base station that has GSM/UMTS/E-UTRAN/NR interfaces (radio technologies). And, it can transmit and receive different data and signals from/to residents and security forces mobile phones via its own transceiver antenna within a cell. Whereas, BSC/EPC Server (Gateway) has encapsulate and control the core network of 2G/3G/4G/5G which includes different respective gateways such as S-GW and PDN-GW.

The Central Control Station (Central Data Center) module which demonstrated in Figure 1.6 has three basic layers. They are core network, aggregation network, and access network. The core network layer is responsible for connecting the data center (central control station) to the Internet. The aggregate network layer is responsible to make interconnect together multiple access layer switches and also it is connected to each other by core network layer switches. Whereas, the access network layer is responsible for connecting end-users or end nodes such as PCs and printers. And it supposed to facilitate the continuous network connection of the end devices no matter where they are located. Moreover, all layers are connected to each other directly and indirectly.

As shown in Figure 1.6, the Residents and Security Forces Mobile Phones module has three major layers. They are hardware layer, middleware layer, and application layer respectively. The hardware layer is responsible to make a connection with the middleware layer services such as data storage, location management, and communication management. The middleware layer is responsible to facilitate a communication between hardware and application layers. The application layer is responsible to offer different services/application to user and to facilitate a communication with middleware layer.

Figure 5: General High-Level Architecture of the Proposed Solution.

Click here to View Figure

Figure 6: The Remaining Modules in General High-Level Architecture of the Proposed Solution

Click here to View Figure

The UAV Periodically Sensing, Tagging and Broadcasting of Residents Distance, Position and Waiting Time Information

In this section, I have proposed UAV periodically sensing, tagging and broadcasting operations of the current distance, position and waiting time of residents’ information with a single small UAV to enforce the physical distance policy. Next, I discussed every UAV’s proposed operation as follows.

Periodically Sensing Residents’ Distance, Position and Waiting Time Info within UAV Coverage Area

In this first task of the proposed high-level architecture model, I have only used a downlink communication that a UAV broadcasts the sensed information (tagged packet) within coverage area. In order to this, the residents’ mobile phones and GCS will receive the broadcasted packet via LOS or direct radio link of IEEE 802.11b/g communication. In this work, I have interested to periodically sense the distance, position and waiting time of residents within UAV’s transmission range. To achieve this, the UAV will periodically broadcast a beacon or Hello message to residents’ phone within its transmission range, and if the message is received by the residents then I will use a UAV’s DS, GPS and Timer to detect current distance, position and waiting time of residents respectively. As shown, in Figure 1.4, the UAV’s transmission range has covered the road and some potential spots; thus the residents who being in these spots would be detected by UAV’s sensors. And, the detected information will be organized as a danger or a warning information and stored in a payload of MAVLink packets as I have discussed follows.

Tagging a Sensed Information in a MAV Link

After completing the UAV’s sensing operation, the sensed information will be tagged in a MAV Link packet via UAV. In this tagging operation phase, I will organize the sensed information as a danger or a warning message. To proceed the organization process, I have proposed a model that helps me to arrange the sensed information in an easy manner. Additionally, this proposed model is not only significant for arranging the sensed information even it is very compulsory to forwarding the information to the respective infrastructures and residents including the security forces.

The Proposed Model of Danger and Warning Information

Generally, in the proposed model, any periodically sensed information in the coverage area of UAV System only consists the distance, position and waiting time between nearest residents. Then based on this circumstance, I have proposed a model of danger and warning info and optimize the forwarding of the information to the target infrastructures and residents. I have discussed this proposed model in details as shown as below.

I have assumed that if the distance between nearest residents is less than 2 meter and their waiting time for less than 1 minute, there is no a high likelihood to expose the COVID-19. And, the distance among the nearest residents denoted by D, their waiting time represented by T and the all sensed information which consists the distance, position and waiting time of residents within the coverage area of UAV denoted by I. Therefore, if the distance among the nearest residents is less than 2 meter and their waiting time is more than 1 minute, I will be classified as a danger information and tagged in the Danger Info module of the proposed work in the payload of MAV Link packet. Whereas if the distance among the nearest residents is less than 2 meter and also their waiting time is less than 1 minute, I will be classified as a warning information and then tagged in a Warning Info Module.

I = D < 2m  and T > 1m’ …….. Danger Info (DI)

I = D < 2m  and T < 1m’ ……. Warning Info (WI)

Where, D is distance, T is time, m is meter, and m’ is minute.

After accomplishing the tagging process, the UAV will proceed the forwarding schemes based on the tagged info.

Algorithm 1.1 shows the pseudo code of UAV sensing, tagging and broadcasting operations of resident’s info on potential spots.

Input: Residents n

Process

UAV (Drone) broadcast a beacon message in every 0.5 seond within its own range

While (Residents received a beaconed message) Do

UAV sense a current distance (D) among nearest residents  // by Distance Sensor (DS)

UAV sense a current position of residents   // by GPS

UAV sense a current waiting time (T) among nearest residents   // by Timer

IF (the current distance (D) among nearest residents < 2 meter && the current waiting time (T) among nearest residents > 1 minute)

 The UAV tag all of the above sensed information (I) in Danger Info module  //DI

Drone broadcast the tagged packet to the central control station via CCT BS

ENDIF

ELSE

IF (the current distance (D) among nearest residents < 2 meter && the current waiting time (T) among nearest residents < 1 minute)

  The UAV tag all of the above sensed information (I) in Warning Info Module //WI

Drone broadcast the tagged packet within its own coverage area

ENDIF

ENDWhile

Output: Residents Info on potential spots is sensed, tagged and broadcasted in a MAVLink Packet

The Proposed Forwarding Model of The Tagged Information To Infrastructures And Residents

In this section, I have discussed the proposed forwarding model of the tagged information to infrastructures and residents. Generally, there are two proposed forwarding schemes as stated below.

1st Forwarding Scheme

The distance sensor (DS), timer and GPS on UAV sense the current distance, waiting time and location of the residents on UAV’s coverage area. And, if the sensed distance is less than 2m and the waiting time is more than 1 minute then immediately the UAV forward the Danger Info to Central Control Station (CCS) via its own Ground Control Station (GCS), and the CCS check the location (the nearest) security forces and forward the info to them via BTS (2G/3G/4G/5G) as stated in Algorithm 1.2.

Input: Residents n

Process

While (GCS received the tagged packet from UAV) Do

 IF (the current distance (D) among nearest residents < 2 meter && the current waiting time (T) among nearest residents > 1 minute)

 GCS forward the tagged packet (DI) to the CCS

CCS forward the packet to Security forces (the nearest to suspected residents) via BTS (2G/3G/4G/5G)

ENDIF

ENDWhile

 Output: The Danger Info (DI) is forwarded and delivered to Security Forces who nearest to suspected residents

Algorithm 1.2: Algorithm for Forwarding of Danger Info to Security Forces who nearest to Suspected Residents

2nd Forwarding Scheme

The distance sensor (DS), timer and GPS on UAV sense the current distance, waiting time and location of the residents on UAV’s coverage area. And, if the sensed distance is less than 2m and the waiting time is less than 1 minute then immediately the UAV directly broadcast the Warning Info to the suspected residents who being on the UAV’s coverage area as stated in Algorithm 1.3.

Input: Residents n

 Process:

IF (the current distance (D) among nearest residents < 2 meter && the current waiting time (T) among nearest residents < 1 minute)

 UAV directly broadcast the tagged packet (WI) to the Suspected Residents who on being UAV’s Transmission Range

ENDIF

 Output: The Warning Info (WI) is directly forwarded/broadcasted to the suspected residents who being on UAV’s coverage area

Algorithm 1.3: Algorithm for Direct Forwarding/Broadcasting of Warning Info to Suspected Residents who being on UAV’s Transmission Range

Conclusion

The suggested preventive measures of COVID-19 by WHO include hand washing, covering one’s mouth when sneezing or coughing, physical distancing, wearing a face mask in public, ventilation and air-filtering, disinfecting surfaces, and monitoring and self-isolation for people exposed or symptomatic. Thus, this article proposed the architecture of physical distancing detection system with distance sensor which deployed on UAV System with the help of BTS (2G/3G/4G/5G) to enrich the COVID-19 preventive measures, as well as I have also developed a few algorithms for distance sensor (on UAV System) operations which sensing, tagging and disseminating the current distance, position and waiting time of resident’s information, and forwarding schemes to respective infrastructures and suspected residents including the security forces.

Recommendations

Though I did my best to propose the architecture of physical distancing detection system with distance sensor which deployed on UAV System with the help of BTS (2G/3G/4G/5G) to enrich the COVID-19 preventive measures, as well as I have also developed a few algorithms for distance sensor (on UAV System) operations which sensing, tagging and disseminating the current distance, position and waiting time of resident’s information, and forwarding schemes to respective infrastructures and residents including the security forces, I do not trust that the architecture is standard enough to incorporate potential matters in networking discipline. For example, despite the importance of the issue, I have not considered the security and privacy aspect of the networking science in my architecture since it was beyond the scope of this work. Thus, I hope that the proposed architecture can be enriched in such a way that the security is taken into account.

Regarding implementation (simulation), I have not considered/implemented the proposed architecture and forwarding algorithms. Therefore, I believe that the proposed architecture with its forwarding schemes can be enriched in such a way that their implementation is taken into account.

Furthermore, regarding infrastructure deployment consideration, I have not considered an optimal deployment of multiple UAVs (Drones) to proceed UAV’s operations (sensing, tagging, and broadcasting of the current distance, waiting time and location of the residents information within UAV coverage area) on different potential spots. Hence, I hope that the proposed architecture can be enriched in such a way that the optimal deployment of multiple drones on different potential spots is taken into account.

Acknowledgments

This work would not have been possible without the endless support of son of St. Merry, Almighty God, thus we praise always the name of him and his mother. In addition, this paper is dedicated for my beloved country, Ethiopia.

Conflict of Interest

The authors do not have any conflict of interest.

Funding Source

The author(s) received no financial support for the research, authorship, and/or publication of this article.

References

  1. “Novel Coronavirus – China”. World Health Organization (WHO). Retrieved 9 April 2020.
  2. “COVID-19 Dashboard by the Center for Systems Science and Engineering (CSSE) at Johns Hopkins University (JHU)”. ArcGIS. Johns Hopkins University. Retrieved 27 October 2020.
  3. “Transmission of COVID-19”. European Center for Disease Prevention and Control. Retrieved 12 September 2020.
  4. “Q&A: How is COVID-19 transmitted?”. World Health Organization (WHO). Retrieved 12 July 2020.
  5. “Transmission of SARS-CoV-2: Implications for Infection Prevention Precautions” (PDF). www.who.int. World Health Organization. 9 July 2020. Archived from the original on 9 July 2020. Retrieved 18 September 2020.
  6. “Q&A on COVID-19: Basic Facts”. www.ecdc.europa.eu. 25 September 2020. Retrieved 8 October 2020.
  7. “Advice for Public”. World Health Organization (WHO). Retrieved 8 February 2020.
  8. “Coronavirus Disease 2019 (COVID-19)”. U.S. Centers for Disease Control and Prevention (CDC). 11 February 2020. Retrieved 4 March 2020.
  9. “Proximity Detection and Contract Tracing for COVI-19”. Actility Newsletter. Press Release, Paris, France. Retrieved 31 July 2020.
  10. C. T. Nguyen, etal. 2020. Enabling and Emerging Technologies for Social Distancing: A Comprehensive Survey and Open Problems. arXiv:2005.02816v2 [physics.soc-ph].
  11. O. K. Sahingoz, “Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges”, Springer Science+Business Media Dordrecht, DOI 10.1007/s10846-013-9959-7, 2014.
  12. T. Kekec, B. C. Ustundag, M. A. Guney, A. Yildirim and M. Une, “A Modular Software Architecture for UAVs”, Sabanci University, Istanbul, Turkey.
  13. N. Reker, D. Troxell and D. Troy, “Universal UAV Payload Interface”, California Polytechnic State University, San Luis Obispo, USA, June 12, 2015.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.