You are on page 1of 5

Foreign Literature

As mentioned by Almagor and Picascia (2020). A contact-tracing strategy has been


deemed necessary to contain the spread of COVID-19 following the relaxation of lockdown
measures. Using an agent-based model, we explore one of the technology-based strategies
proposed, a contact-tracing smartphone app. The model simulates the spread of COVID-19 in a
population of agents on an urban scale. Agents are heterogeneous in their characteristics and are
linked in a multi-layered network representing the social structure—including households,
friendships, employment and schools. We explore the interplay of various adoption rates of the
contact-tracing app, different levels of testing capacity, and behavioural factors to assess the
impact on the epidemic. Results suggest that a contact tracing app can contribute substantially to
reducing infection rates in the population when accompanied by a sufficient testing capacity or
when the testing policy prioritises symptomatic cases. As user rate increases, prevalence of
infection decreases. With that, when symptomatic cases are not prioritised for testing, a high rate
of app users can generate an extensive increase in the demand for testing, which, if not met with
adequate supply, may render the app counterproductive. This points to the crucial role of an
efficient testing policy and the necessity to upscale testing capacity.

Paraphrased:

According to Almagor and Picascia (2020), Following the easing of lockdown restrictions, a
contact-tracing method was deemed required to control the spread of COVID-19. Researchers
evaluate one of the proposed technology-based techniques, a contact-tracing smartphone app,
using an agent-based model. On an urban scale, the model resembles the spread of COVID-19 in
a population of agents. Agents have a wide range of characteristics and are connected in a multi-
layered network that depicts the social structure, which includes houses, friendships, employment,
and education. Researchers look at how the pandemic is influenced by varied contact-tracing app
adoption rates, testing capacity, and behavioral factors. The data suggest that, when paired with
sufficient testing capacity or a testing strategy that prioritizes symptomatic individuals, a contact
tracking app can considerably lower infection rates in the community. The prevalence of infection
decreases as the number of users increases. When symptomatic cases aren't prioritized for
testing, a large number of app users can result in a significant rise in testing demand, which, if not
met with enough supply, can make the app ineffective. It highlights the essential significance of an
effective testing policy and the need to upscale testing capacity.

According to Akinbi, et. al (2021), Contact tracing apps can greatly support testing, tracing,
isolating, and quarantine measures in the attempt to mitigate and slow the spread of the SARS-
Cov-2 virus by speeding up processes of reporting and contact tracing through improved digital
data flow, proximity tracing and geolocation tracking. It could play a pivotal role given the ubiquity
of internet-connected devices and increase the speed of surveillance of a large population of
smartphone users in almost real-time to know where the infection hotspots are. As lockdown
measures are gradually being lifted in many countries, contact tracing apps are central to control
strategies during the de-escalation of social distancing. 

Paraphrased:
According to Akinbi, et. al (2021), By speeding up reporting and contact tracing processes
through enhanced digital data flow proximity tracing and geolocation tracking. Contact tracing
applications can significantly improve testing, tracing, isolating, and quarantine procedures to limit
and halt the spread of the SARS-Cov-2 virus. Given the widespread usage of internet-connected
devices, it might play a key role in speeding up the surveillance of a huge population of
smartphone users to locate infection hotspots in real-time. When lockdown limitations are
progressively lifted in many countries, contact tracing applications are critical to regulating
procedures throughout the de-escalation of social isolation.

According to Bradshaw, W. J et al., (2021) Contact tracing is critical to controlling COVID-


19, but most protocols only “forward-trace” to notify people who were recently exposed. Using a
stochastic branching-process model, we find that “bidirectional” tracing to identify infector
individuals and their other infectees robustly improves outbreak control. In our model, bidirectional
tracing more than doubles the reduction in effective reproduction number (Reff) achieved by
forward-tracing alone, while dramatically increasing resilience to low case ascertainment and test
sensitivity. The greatest gains are realised by expanding the manual tracing window from 2 to 6
days pre-symptom-onset or, alternatively, by implementing high-uptake smartphone-based
exposure notification; however, to achieve the performance of the former approach, the latter
requires nearly all smartphones to detect exposure events. With or without exposure notification,
our results suggest that implementing bidirectional tracing could dramatically improve COVID-19
control.

Paraphrased:

According to Bradshaw et al. (2021), COVID-19 control requires contact tracking, but most
methods are just "forward-trace" to alert those who have recently been exposed. Researchers
discover that using a stochastic branching-process model to identify infector persons and their
other infectees enhances epidemic control significantly. Bidirectional tracing is more than twice the
effective reproduction number (Reff) decrease obtained by forward tracing alone in this model.
While also improving test sensitivity and resilience to poor case ascertainment. Expanding the
manual tracing window from 2 to 6 days before the symptom start or applying high-uptake
smartphone-based exposure notification yields the best results. However, the latter strategy
requires virtually all smartphones to detect exposure events to reach the performance of the
former approach. The findings imply that adopting bidirectional tracking, with or without exposure
warning, might significantly enhance COVID-19 management.

 
According to Hoffman, A. S (2020) As restrictions begin to be loosened or lifted entirely, the
use of so-called contact tracing apps has figured prominently in many jurisdictions’ plans to reopen
society. Critics have questioned the utility of such technologies on a number of fronts, both
practical and ethical. However, little has been said about the ways in which the normative design
choices of app developers, and the products that result therefrom, might contribute to ethical
reflection and wider political debate. Drawing from scholarship in critical design and human–
computer interaction, this paper examines the development of a QR code-based tracking

Paraphrased:

According to Hoffman (2020), The use of so-called contact tracing applications has played
substantially in many governments' attempts to reopen society as restrictions are eased or lifted
outright. On a variety of fronts, both practical and ethical, critics have questioned the efficacy of
such technology. However, little has been stated about how app developers' normative design
decisions and the products that come from them might contribute to ethical thought and larger
political discourse. This study discusses the creation of a QR code-based tracking system,
drawing on critical design and human-computer interaction literature.

According to Gowtham, et, al. (2019) Nowadays, Radio Frequency IDentification (RFID)
cum Biometric based Access Control System (ACS) is gaining popularity for authenticating the
employees of any organization, which ensures that only the employees granted permission to get
into the organizational complex. However, visitors from various organization need to be granted
entry into the complex, without which organization does not function effectively as all the
organization invariably depend on other organization/ companies/firms for their growth. Contrary to
this, most of the terrorist attacks are accessed, planned and implemented through visitors. Thus it
becomes highly essential to implement highly effective method/system to ensure the genuineness
of visitors to any organization. One such system, namely Visitor Gate Pass Management System
[VGPMS] is illustrated with its features.

Paraphrased:

According to Gowtham et al. (2019), The features of one such system, the Visitor Gate
Pass Management System [VGPMS], are shown. Radio Frequency Identification (RFID) or
Biometric-based Access Control System (ACS) is becoming more prevalent for authenticating
workers in any company, guaranteeing that only those employees who have been granted
authorization are permitted to access the complex. Visitors from other organizations, on the other
hand, must be allowed access to the complex. Otherwise, the organization will not operate
efficiently, as all organizations rely on the growth of other institutions. Despite this, the majority of
terrorist acts are accessed, planned, and carried out by visitors. As a result, implementing a highly
effective approach to confirm the validity of visitors to any company becomes quite essential.

According to Gunawan and E. A. et, al. (2017) Nowadays, security is a part that consent by
many institution including academic for example in University campus, some of campus have been
implement automatic system in campus area to control visitor to enter University also for the staffs
and students, but the system is in standalone with introduce new gate pass. Most of University has
been use Information Technology (IT) in application for academic system such as student
information, registration, results information, etc. In this paper discuss on integration of student
information to gate pass system then do not require new card or pass for every student to enter
campus area. Gate pass system is required information to match to database that who allow
entering to campus, normally a new database is create for the system. In this case, University has
student and staff database including lecturer, thus to be efficient the data in existing database can
be use and integration using protocol that gate pass system give a command to database as
request then verification of those data. Currently, student database stored in server room and the
place far away from gate pass system, in order to make it transaction faster for visitor to enter then
a mini database is setup onsite of gate system, but periodic updating is require or every new
update in database. Results shows, database stored in student information system is more than
30,000 number of student and transaction time is less than 1 second and in average cycle time is
5.5 seconds for motorcycle lane and 7 seconds for car, that mean time for visitor to access gate
pass system for entry campus is most reasonable.

Paraphrased:

According to Gunawan et al. (2017), Nowadays, security is a part that many institutions,
including academic institutions. For example, some university campuses have implemented an
automatic system in the campus area to control visitors to the university, as well as staff and
students, but the system is standalone with the introduction of new gate passes. Most universities
have used Information Technology (IT) in academic systems such as student information,
registration, and results reporting. This article discusses how to integrate student information with
a gate pass system so that each student does not need a new card or permit to enter the campus
area. The information from the gate pass system must be linked to a database that allows access
to campus; in many situations, a separate database is created specifically for the system. In this
situation, the university has a student and staff database, which includes lecturers; hence, to be
more efficient, the data in the current database may be used and integrated via a protocol in which
the gate pass system sends a request to the database, which is then verified. Student data is
currently stored in a server room that is separate from the gate pass system. A small database
has been developed onsite of the gate system to make transactions faster for visitors. However, it
requires regular updating or every new change in the database. The database in the student
information system has over 30,000 students, and the transaction time is less than one second,
according to the results. The average amount of time it takes visitors to access the campus gate
pass system is acceptable, with a cycle duration of 5.5 seconds for motorcycles and 7 seconds for
autos.

Almagor, J., Picascia, S. (2020, December 17) Exploring the effectiveness of a COVID-19
contact tracing app using an agent-based model. Sci Rep 10, 22235. [Online]. Available:
https://doi.org/10.1038/s41598-020-79000-y

Akinbi, A., Forshaw, M. & Blinkhorn, V. (2021). Contact tracing apps for the COVID-19
pandemic: a systematic literature review of challenges and future directions for neo-liberal
societies. Health Inf Sci Syst 9, 18. [Online].
Available:https://link.springer.com/article/10.1007/s13755-021-00147-7

Sunico, R. J., Argana, E., & Dumale, M. (2020, October). Development and evaluation of
Automated Gate Pass System. Research Gate Net. [Online]. Available:
https://www.researchgate.net/profile/Elwin-Argana-
2/publication/344755724_Development_and_Evaluation_of_Automated_Gate_Pass_System/links/
5f8e3cc3299bf1b53e3470a1/Development-and-Evaluation-of-Automated-Gate-Pass-System.pdf.

Hernandez, E. A., & Tillman, D. A. (2018). Improving School Safety in the E-Learning Era.
In E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher
Education (). Association for the Advancement of Computing in Education (AACE). pp. 356-360,
October 2018. [Online]. Available: https://www.researchgate.net/profile/Elwin-Argana-
2/publication/344755724_Development_and_Evaluation_of_Automated_Gate_Pass_System/links/
5f8e3cc3299bf1b53e3470a1/Development-and-Evaluation-of-Automated-Gate-Pass-System.pdf.

T. Sathishkumar, et, al. (July, 2019). "Automation of Visitor Gate Pass Management
System," [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8993173

Gunawan and E. A. Kadir. (September, 2017). Integration protocol student academic


information to campus RFID gate pass system. [Online]. Available:

https://ieeexplore.ieee.org/abstract/document/8239197

You might also like