2016
DOI: 10.1109/access.2016.2551199
|View full text |Cite
|
Sign up to set email alerts
|

Infectious Disease Containment Based on a Wireless Sensor System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(26 citation statements)
references
References 30 publications
0
26
0
Order By: Relevance
“…e node "degree centrality" was used to reveal the most active nodes in the network and how well a node is connected with its neighbours-a node degree is the number of edge incidents on a node. e "betweenness centrality" was used to measure how many pairs of nodes a node can be connected to through a shortest path, while the "closeness centrality" was used to measure how contagious an infected patient (a node) is to others [9,17,24,25]. Similarly, "2-reach centrality" was used to explore the proportion of nodes that can reach a given node in 2 steps or less while "eigenvector centrality" was used to measure the importance of a node depending on the importance of its neighbours.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…e node "degree centrality" was used to reveal the most active nodes in the network and how well a node is connected with its neighbours-a node degree is the number of edge incidents on a node. e "betweenness centrality" was used to measure how many pairs of nodes a node can be connected to through a shortest path, while the "closeness centrality" was used to measure how contagious an infected patient (a node) is to others [9,17,24,25]. Similarly, "2-reach centrality" was used to explore the proportion of nodes that can reach a given node in 2 steps or less while "eigenvector centrality" was used to measure the importance of a node depending on the importance of its neighbours.…”
Section: Discussionmentioning
confidence: 99%
“…Over the years, researchers have been exploring how the knowledge of network structures could influence public health measures. For example, network analysis based on connectivity centrality was used to identify high-risk people for targeted vaccination in an effort to contain the spread of infectious disease [17]. Network analysis was used to investigate whether the density of the network contacts of persons infected by Mycobacterium tuberculosis was more likely to be tested positive for tuberculosis (TB) compared to the occurrence of TB clusters detected through network connections with clusters detected by molecular genotyping [18].…”
Section: Introductionmentioning
confidence: 99%
“…Gao and Liu [18] focused on the impacts of human behaviors on worm propagation and proposed a two-layer network model to protect large-scale dynamic mobile networks. e short-range worm relies on the direct connections between hardware interfaces and currently tends to attack wireless sensor networks [19][20][21] and vehicular networks [22][23][24].…”
Section: Related Workmentioning
confidence: 99%
“…Equation (20) indicates that when the network changes, we only need to execute the SLP algorithm on the newly added nodes in the local environment and then run the merging program to avoid repetitive computation of the existing results. Figure 5 shows a three-step example of the SLP process.…”
Section: Online Community Managermentioning
confidence: 99%
“…The method used in [4], [5] is based on the analysis of the eigenvalues of the community graph matrix to vaccinate the nodes that maximize these eigenvalues. The authors of [6] have collected contacts between people using sensors and then modeled them by a graph. Suitable nodes for vaccination are then selected using the centrality metrics.…”
Section: Introductionmentioning
confidence: 99%