Skip to main content
IEEE - PMC COVID-19 Collection logoLink to IEEE - PMC COVID-19 Collection
. 2020 Jun 19;8:115655–115661. doi: 10.1109/ACCESS.2020.3003750

Risk-Aware Identification of Highly Suspected COVID-19 Cases in Social IoT: A Joint Graph Theory and Reinforcement Learning Approach

Bowen Wang 1, Yanjing Sun 1, Trung Q Duong 2, Long D Nguyen 3, Lajos Hanzo 4,
PMCID: PMC8043494  PMID: 34192110

Abstract

The recent outbreak of the coronavirus disease 2019 (COVID-19) has rapidly become a pandemic, which calls for prompt action in identifying suspected cases at an early stage through risk prediction. To suppress its further spread, we exploit the social relationships between mobile devices in the Social Internet of Things (SIoT) to help control its propagation by allocating the limited protective resources to the influential so-called high-degree individuals to stem the tide of precipitated spreading. By exploiting the so-called differential contact intensity and the infectious rate in susceptible-exposed-infected-removed (SEIR) epidemic model, the resultant optimization problem can be transformed into the minimum weight vertex cover (MWVC) problem of graph theory. To solve this problem in a high-dynamic random network topology, we propose an adaptive scheme by relying on the graph embedding technique during the state representation and reinforcement learning in the training phase. By relying on a pair of real-life datasets, the results demonstrate that our scheme can beneficially reduce the epidemiological reproduction rate of the infection. This technique has the potential of assisting in the early identification of COVID-19 cases.

Keywords: Social Internet of Thing (SIoT), COVID-19, reinforcement learning, graph theory

I. Introduction

The coronavirus disease 2019 (COVID-19) has spread over 215 countries with the numbers of infected cases and deaths still increasing. As of the 19th April 2020, a cumulative total of 2,228,455 (154,309) cases (fatalities) were reported in the world. During this outbreak, every aspect of our daily lives has been deeply impacted. One of the gravest challenges is its high human-to-human transmission rate via droplet inhalation or contact with contaminated surfaces. Recent studies have demonstrated that asymptomatic patients are particularly contagious [1], [2], because people tend to avoid contact with others showing obvious symptoms, but asymptomatic people cannot be readily identified. Therefore, early identification of suspected cases and the judicious allocation of limited medical resources is vital [3].

Recently, both ‘big data’ analysis and human social networking solutions were proposed for detecting suspected cases during an epidemic. For example, in [4], the authors proposed a spatio-temporal model termed as HiRES, which relies on a risk map for detecting suspected individuals based on the trajectory of big data and mean-field theory. In [5], the authors proposed a sentinel node detection strategy for disease surveillance by relying on social networks. However, the latency in the associated trajectory and inaccuracy of social data may render these models somewhat inefficient. Hence, a deep-routed research-question arises, namely how to take advantage of both the real-time social data and of accurate trajectory data for identifying suspected virus careers. In [6], the authors proposed the Social Internet of Things (SIoT) concept, which paves a new way for building the social relationships among devices without human intervention. Despite the delay in human data feedback, portable equipment such as smart phones and wearable devices may be employed for sensing, computation and communications, while relying on positioning information to perform real-time symptom recognition, contact tracking and data exchange. For example, the so-called co-located object relationship (C-LOR) of the SIoT characterizes the geographic location similarity of two devices, while the social object relationship (SOR) quantifies the contact intensity, when the device-owners are in each others’ proximity, which are useful for identifying the individuals at risk of infection.

By collecting the data from SIoT, the complex networks of virus transmission may be viewed as a weighted undirectional graph (WUG), where each vertex represents a mobile user, each edge indicates the contact between two users and the vertex weight is related to the probability of becoming infected. Based on this graph, we will identify those vertices which may have high impact on other vertices, corresponding to the influential individuals in a resource-constrained environment, since the medical resources such as surgical masks and nucleic acid detection reagents are scarce. Hence, the optimization objective is to select high-risk vertices within a limited budget of resources to minimize the propagation rate of the epidemic. This epidemic propagation rate minimization problem of identifying the suspected COVID-19 cases in SIoT may be viewed to be analogous to the rumor influence minimization problem of identifying the highly influential nodes in mobile social networks. The latter can be further transformed into the classic minimum-weight vertex cover (MWVC) problem of graph theory [7]. Most prior studies resorted to heuristic algorithms or to local search for solving MWVC problems at an acceptable complexity [8]. However, considering the dynamically evolving network topology over time, recomputing the solution from scratch is time-consuming. As an efficient decision-making technique in dynamic environments, reinforcement learning has been widely used in the field of wireless communications, aerospace, power system, etc [9], [10]. In [11], the authors proposed an adaptive strategy based on graph embedding and reinforcement learning for solving the associated combinatorial optimization problem, which inspired us to design an adaptive identification scheme for highly suspected COVID-19 cases in response to these topology changes.

The main contributions of this paper are summarized as follows:

  • By using the dynamic WUG model, we propose a new network topology of SIoT-aided inter-device social relationship establishment process, which takes into account the fact that the network structure evolves dynamically throughout the epidemic propagation.

  • We conceive the high-risk vertex selection problem relying on the MWVC framework and propose a risk-aware adaptive identification algorithm based on joint graph embedding and reinforcement learning for solving the MWVC problem in a dynamic topology.

  • We conduct simulations based on a pair of realistic datasets to demonstrate that our proposed scheme is efficient in suppressing the propagation speed in both large-scale and small-scale scenarios. Besides, we evaluate our proposed scheme on the Erdos-Renyi social graph relying on adjustable contact probability to verify the scalability.

The rest of this paper is outlined as follows. First our system model is presented and then our optimization problem is formulated in Section II. The adaptive scheme for identifying the suspected cased with high risk is illustrated in Section III. Simulation results are shown in Section IV, followed by concluding remarks in Section V.

II. System Model and Problem Formulation

In the absence of global restrictions COVID-19 spreads without limits since many asymptomatic carriers are contagious. To characterize the spread of COVID-19, we consider the modified susceptible-exposed-infected-removed (SEIR) epidemic model, where asymptomatic individuals are based on [12]. When a susceptible individual comes in contact with either a symptomatic or asymptomatic individual, the probability of being exposed is Inline graphic or Inline graphic, respectively. Furthermore, the probability of those exposed individuals being symptomatic or asymptomatic is Inline graphic or Inline graphic, respectively. Finally, the probability of being removed from the set through recovery or death is Inline graphic.

Naturally, the rate of propagation is also influenced by contact intensity, as determined by the contact frequency and duration. As shown in Fig. 1, each device can rely on the global positioning system (GPS), wireless network signaling, human social networks, radio frequency identification (RFID), bluetooth, and Wifi to track their owner’s contacts, perform co-location detection, and establish relationship with other devices through owner control and relationship management modules [6]. Then, the collected data will be gathered and aggregated by mobile vehicles or unmanned aerial vehicles, and finally delivered to the edge data center for real-time data analysis and decision-making. Herein, we mainly focus on the decision-making process since the data collection and analysis problems are beyond the scope of this paper and can be addressed by several existing works [3], [4]. Given a time span Inline graphic which is discretized into Inline graphic time slots, the average contact intensity between two users Inline graphic and Inline graphic can be denoted as [13]

II.

where Inline graphic represents the total number of contacts before the time slot Inline graphic, while Inline graphic is the corresponding contact duration. Note that even short exposures such as two seconds of contact are perilous and multiple short contacts do increase the overall risk of exposure. Furthermore, the weight of each contact is quantified by Eq. (1), where a short exposure time corresponds to a low weight.

FIGURE 1.

FIGURE 1.

Framework of our proposed scheme for MWVC.

Given an individual set Inline graphic, the network topology at time slot Inline graphic can be abstracted as a WUG Inline graphic, where Inline graphic denotes the vertex set, Inline graphic denotes the edge set, and Inline graphic denotes the vertex weight, and can be

II.

where Inline graphic and Inline graphic represent the symptomatic and asymptomatic neighbors of Inline graphic, respectively. Note that the parameter Inline graphic quantifies the degree of risk. It is worth mentioning that the corresponding edge Inline graphic can only be inserted into Inline graphic if the social distance between the pair of vertices Inline graphic and Inline graphic in their contact is lower than a certain threshold. Note that the social distance threshold was initially three inches as declared by the World Health Organization (WHO), because the authors of [14] found that people who kept at least three inches of social distance between them were able to reduce the infection rate by approximately 82%. As a further result [1], the authors have demonstrated that two meters of social distance reduced infection rate by approximately 96%, since this social distance can prevent the transmission of droplets [14]. Hence here we use the latter metric as the threshold of social distance.

In a resource-constrained environment, we assume that the arrival process of medical resources obeys the Poisson distribution with arrival rate Inline graphic. Hence, we have to allocate these resources to those individuals at high-risk of being exposed in order to cut off the transmission paths, i.e. to remove the corresponding edges from Inline graphic. Let Inline graphic, Inline graphic, Inline graphic, and Inline graphic denote the number of infected individuals, all the individuals, all available resource blocks and the detected individuals, respectively. Here, we assume that a resource block can only be assigned to a single individual for detection. Therefore, the optimization problem is that of minimizing the infection rate (propagation speed), which can be formulated as

II.

where Inline graphic indicates that the number of detected individuals should be no higher than that of the available resources. In graph theory, a vertex cover of Inline graphic is a subset of the vertex set Inline graphic so that for every edge, at least one of its endpoints belongs to Inline graphic. The MWVC is a vertex cover having the lowest possible number of vertices and sum weights. For the convenience of problem transformation, we turn the edge weights into negative values.

Proposition 1 (Detection Threshold):

The MWVC of Inline graphic is the minimum number of vertices required for cuttikng off all the transmission paths (remove all edge) from Inline graphic.

Proof:

Considering the definition of MWVC, all edges can be omitted by removing the edges connected to Inline graphic and meanwhile the Inline graphic has the minimum size, which concludes the proposition 1.

Therefore, the problem (3) can be naturally transformed into a MWVC problem. It is worth mentioning that we consider the MWVC rather than MVC, because the former outperforms the latter when the size of minimum vertex cover exceeds the resources available. Next, we will investigate how to select higher-risk vertices from a MWVC.

III. Adaptive Identification Scheme

In this section, we propose an adaptive identification scheme, which incrementally identifies the high-risk vertices instead of identifying all of them at once. More specifically, the adaptive identification process is divided into several rounds. In each round, our scheme can dynamically block the epidemic propagation based on a snapshot of the current network topology. Upon considering the case of Inline graphic at time slot Inline graphic, selecting any Inline graphic vertices from the set of Inline graphic for detection will lead to different results. Given a limited budget, we should grant different priorities according to the associated hazard levels, which can be quantified by the vertex weight.

Since we have to dynamically find MWVC in the face of evolving network topologies obeying different graph structures, we first utilize the graph embedding process, in which each vertex can be represented by a Inline graphic-dimensional vector paving the way for the learning phase. This is because reinforcement learning is more efficient when processing low-dimensional vectors than graphs. Similar to [11], we capitalize on the deep learning architecture termed as Structure2Vec [15] for graph embedding, which computes a Inline graphic-dimensional feature embedding Inline graphic for each vertex Inline graphic. Initially, we set Inline graphic and the update strategy can be formulated as [11]

III.

where the neighbor set Inline graphic is equivalent to Inline graphic, ’relu’ represents the rectified linear unit, i.e., Inline graphic, Inline graphic is a binary variable, which indicates, whether the state is being selected or not, Inline graphic are model parameters, and Inline graphic represents the edge weight in graph embedding, which is determined by the structural similarity (structural distance) Inline graphic, i.e., Inline graphic. Note that Inline graphic can be calculated by dynamic time warping (DTW) [15].

When the computation process of graph embedding is completed and the representation Inline graphic of the selected vertex set Inline graphic is obtained, we then define the evaluation function Inline graphic, where Inline graphic is the associated neural network parameter. When Inline graphic obtained at the final slot, the pooled embedding of the entire graph Inline graphic can be represented as Inline graphic. In this way, Inline graphic can be approximated by

III.

where Inline graphic denotes the concatenation operator and Inline graphic.

Next, we will invoke reinforcement learning for determining the function Inline graphic. In the neural network, the Inline graphic-step fitted Q-Learning [11] is invoked to train Inline graphic. We define the states, actions and rewards in the reinforcement learning framework as follows:

  • States: the selected vertices for detection at slot Inline graphic, i.e., Inline graphic.

  • Transition: the state variable Inline graphic.

  • Actions: push a new vertex into Inline graphic.

  • Rewards: the reward function Inline graphic is defined as the change in the cost function after taking action Inline graphic and transitioning to a new state Inline graphic, which can be expressed as
    graphic file with name M84.gif
    Note that we set a penalty of −1 for the increment in vertex number and Inline graphic for the increment in weight to ensure that we can find a MWVC.

The training phase based on Inline graphic-step fitted Q-learning is illustrated in Algorithm 1. Note that the termination criterion is whether the MWVC is achieved, i.e. whether all edges are covered, while the sum weights are minimum.

Algorithm 1 Q-Learning Based Training for MWVC

  • 1:

    Input: Adjacency matrix of Inline graphic

  • 2:

    Output: Parameter Inline graphic

  • 3:

    Experience replay memory Inline graphic is initialized to Inline graphic

  • 4:

    for episode Inline graphic do

  • 5:

    Initialize the state Inline graphic to empty set

  • 6:

    for Inline graphic do

  • 7:

    Inline graphic

  • 8:
    graphic file with name M95.gif
  • 9:

    Push Inline graphic into Inline graphic, i.e., Inline graphic

  • 10:

    if Inline graphic then

  • 11:

    Push tuple Inline graphic to Inline graphic

  • 12:

    Randomly sample batch from Inline graphic

  • 13:

    Update Inline graphic by stochastic gradient descent to minimize the squared loss Inline graphic for Inline graphic

  • 14:

    end if

  • 15:

    end for

  • 16:

    end for

Note that the Inline graphic-step Q-learning can handle the issue of delayed rewards during an episode by waiting Inline graphic steps before updating the parameters. This fits our scenario quite naturally, where the final objective value is only revealed after the addition of a series of vertices. In this way, the reward received so far can be used for estimating that in the future more accurately. Hence, the parameter Inline graphic in the squared loss function can be expressed as

III.

Furthermore, the fitted Q-iteration will rely on experience replay for updating the Q-function using a batch of samples instead of updating it sample-by-sample. In this process, the cumulative rewards Inline graphic can be represented by Inline graphic. Based on the above discussion, our risk-aware adaptive identification (RAI) algorithm can be summarized in Algorithm 2.

Algorithm 2 Risk-Aware Adaptive Identification (RAI)

  • 1:

    Input: Adjacency matrix of current snapshot of Inline graphic, i.e., Inline graphic, available resource Inline graphic

  • 2:

    Output: A set of vertices Inline graphic at risk of being infected

  • 3:

    Initialize the state Inline graphic to empty set

  • 4:

    Each vertex in Inline graphic is embeded into a Inline graphic-dimensional vector using Eq. (4) and (5)

  • 5:

    Search for the MWVC Inline graphic using the Algorithm 1

  • 6:

    if Inline graphic then

  • 7:

    Select Inline graphic vertices from Inline graphic as Inline graphic based on the ascending order of their weights

  • 8:

    else

  • 9:

    Inline graphic

  • 10:

    end if

As shown in Fig. 1, when the furst stage of contact tracking is accomplished, graph embedding is performed to obtain the “node score” (green bars), which quantifies the degree of risk from the perspective of graph structure. In the final stage, reinforcement learning is invoked for solving the MWVC by considering both the node score and weight. The specific nodes associated with a high degree of risk are marked in red.

IV. Simulation Results

In this section, we first evaluate our proposed scheme on the Erdos-Renyi social graph [16] relying on adjustable contact probability (edge insertion probability) and then on a pair of real-world datasets [12], [17]. The data in [12] collected from a primary school was used for evaluating our proposed scheme on a small-scale dynamic network and that in [17] collected from a museum was used for characterizing our proposed scheme on a large-scale dynamic network. In the dataset [17], 410 vertices are connected by 17,298 edges and the time span of 1 hour is discretized into 8 time slots. By contrast, in [12], 242 vertices are connected by 125,773 edges and the time span of 1 hour is discretized into 18 time slots.

In the learning phase, we set the batch size to 64, embedding dimension size to 64, the number of iterations to 5, Inline graphic to 5, Inline graphic to 0.05, training size to 10000, and the learning rate to 0.0001 based on [11]. For the SEIR model, we set the Inline graphic to 0.8, Inline graphic to 0.4, Inline graphic to 0.7, and Inline graphic to 0.3 based on the current data analysis about COVID-19 [4]. The initial number of randomly infected individuals is Inline graphic, where Inline graphic represents the number of all vertices in the initial stage. The arrival rate of resources ranges from 0 to 0.05 per second. Note that the vertices corresponding to the removed individuals will be removed from the current snapshot.

To comprehensively characterize our proposed scheme, we further compare RAI to four benchmarks: 1) degree centrality (to measure the risk of being infected by neighbors) selects Inline graphic vertices with highest degree in the current snapshot [18], 2) betweenness centrality (to measure the risk of being infected on a large scale) can be calculated by

IV.

where Inline graphic denotes the number of shortest paths connecting Inline graphic and Inline graphic, and Inline graphic denotes those shortest paths passing through Inline graphic [18], 3) closeness centrality (measure the risk of being infected on a small scale) can be calculated by

IV.

where Inline graphic denotes the length of shortest paths connecting Inline graphic and Inline graphic [18], and 4) Q-learning based greedy algorithm for MVC (abbreviated as “GreedyMVC”) [11], which approximates the set of MVC nodes of the input graph by greedily selecting the uncovered edge having the maximum sum of degrees of its endpoints. Then we protect Inline graphic nodes from this unordered MVC set.

To verify the scalability and efficiency of our proposed scheme, we have conducted simulations relying on the classic Erdos-Renyi social graph, which is representative of most of the popular graph structures associated with varying contact probability. Fig. 2 shows the infection rate vs. contact probability, when the arrival rate of resources is set to 0.04 per second and the number of vertices is set to 100. The contact duration obeys the normal distribution associated with the expectation of 30s and standard deviation of 5s. The number of contacts obeys a Poisson distribution and the arrival rate is randomly chosen from Inline graphic per time slot. The time span of 1 hour is discretized into 10 time slots. We can observe that our proposed RAI always outperforms other methods upon increasing the contact probability. Compared to the scenario of “without detection”, our proposed scheme achieves approximately 43% infection rate reduction, when the contact probability is set to 0.8, which demonstrates the efficiency of early detection of highly suspected cases. Furthermore, since the degree and closeness centralities always select those specific vertices which are close to each other in the crowded parts of the graph, they exhibit a higher propagation rate than that of betweenness centrality (selecting the vertices which are in most of the multi-hop neighbor sets of other vertices) when the graph becomes dense, i.e., the number of edges becomes high.

FIGURE 2.

FIGURE 2.

Infection rate versus the varying contact probability.

In Fig. 3 and Fig. 4, we study the impact of early detection based on two different real-world datasets. As clearly seen from these two figures, the proposed RAI scheme always outperforms the other methods upon increasing the arrival rate of resources for both datasets. In the small-scale scenario, the dominant form of infection is direct person-to-person transmission (one-hop transmission), while in the large-scale scenario, the cross infection (multi-hop transmission) becomes dominant. When the resources are very scarce, say for an arrival rate below 0.02 per second, the degree centrality method outperforms the “GreedyMVC”, because the degree centrality represents the degree of risk better within a limited budget. Upon increasing the arrival rate, the “GreedyMVC” performs better, because it can cut off more transmission paths within a certain budget. Note that the performance achieved by closeness centrality is better than that of betweenness centrality based on the dataset [12], but based worse on [17]. This is because the closeness centrality is efficient in small-scale scenarios (the selected vertices rapidly infect their one-hop neighbors) while the betweenness centrality is efficient in large-scale scenarios (the selected vertices can infect more multi-hop neighbors).

FIGURE 3.

FIGURE 3.

Infection rate versus the arrival rate of resource on dataset [12].

FIGURE 4.

FIGURE 4.

Infection rate versus the arrival rate of resource on dataset [17].

Finally, we discuss some characteristics inferred from the simulation and experimental results. Although the COVID-19 datasets are not available, Fig. 2 readily justifies that the proposed method outperforms the graph-theoretic methods for diverse graph structures. This is because the control efficiency is only related to the graph structures determined by the densities of the vertices and edges, plus the vertex weight. On one hand, the graph embedding is eminently suitable for extracting the centrality features of different graph structures. On the other hand, by solving the MWVC, the vertex weight is also considered. Since the traditional graph-theoretic based methods only consider the centrality feature, our proposed method would outperform the graph-theoretic based methods, regardless of the specific nature of the dataset.

Secondly, we justify the employment of reinforcement learning. Generally, traditional techniques of solving the graph optimization problem cam be classified into three main categories: exact algorithms, approximate algorithms and heuristic algorithms [11]. The exact algorithms perform well for small-scale scenarios, but their complexity tends to become prohibitive for large-scale scenarios. The approximate algorithms tend to have realistic complexity, but fail to provide sufficiently strong optimality guarantees. Finally, the heuristic algorithms tend to be efficient, but lack of theoretical guarantees. However, all three types of algorithms may only adapt to partial graph structures and thus their performance may be degraded in dynamically time-varying environments. Fortunately, this problem can be solved by reinforcement learning. It was demosntrated by extensive simulations in [11] that reinforcement learning based algorithms are capable of performing well in continuously envolving graph structures. Although different real datasets correspond to different scenarios, the graph structures inferred can typically be handled by relying on the Erdos-Renyi social graph. Futhermore, the reward function and other parameters are also influenced by the specific graph structures. As for the reward function, we carefully take into account the specific number of vertices and the vertex weight, which allows us to satisfy both the “minimum-weight” and “minimum set cover” conditions. Hence, the reward function used in the paper is suitable for the MWVC problem in the context of different graph structures. For other learning related parameters, the authors of [11] have indeed justified that this setting is suitable for most graph structures and thus we do not discuss this issue in detail. In conclusion, our proposed scheme exhibits excellent scalability and it is expected to perform well for diverse datasets, including COVID-19 datasets.

V. Conclusion

In this paper, we have studied how to exploit the social relationships between mobile devices in SIoT to help control the infection rate by the early identification of suspected COVID-19 cases. Then, we transformed the optimization problem into a MWVC problem and proposed a RAI algorithm for solving this problem for a dynamic network topology. By relying on a pair of realistic datasets, we demonstrate that our scheme substantially reduces the epidemic infection rate compared to the benchmarks in both large-scale and small-scale scenarios. In conclusion, the proposed technique is eminently suitable for disease control and prevention by relying on the early identification of COVID-19 cases. At the time of writing no COVID-19 dataset is available concerning the accurate contact history of a crowd and their subsequent health conditions, but no doubt, real-life datasets will soon be available. This contribution may however assist both governments and other decision-making authorities in their decision making. In our future research we will use more data sources to verify and revise this early identification scheme at an increased accuracy.

Biographies

graphic file with name wang-3003750.gif

Bowen Wang received the Ph.D. degree in information and communication engineering from the China University of Mining and Technology, Xuzhou, China, in 2020. He is currently with the Xuzhou Engineering Research Center of Intelligent Industry Safety and Emergency Collaboration, as a Research Fellow, and with China University of Mining and Technology, as an Associate Professor. He was also a Visiting Ph.D. Student with the School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast. He was awarded the Best Paper Award in INISCOM 2019. His research interests include matching theory, graph theory, UAV communications, and Social Internet of Things (SIoT).

graphic file with name sun-3003750.gif

Yanjing Sun (Member, IEEE) received the Ph.D. degree in information and communication engineering from the China University of Mining and Technology, Xuzhou, China, in 2008. He is currently with the Xuzhou Engineering Research Center of Intelligent Industry Safety and Emergency Collaboration, as a Research Fellow, and with the China University of Mining and Technology, as a Professor. His current research interests include IBFD communications, embedded real-time system, wireless sensor networks and cyber-physical systems.

graphic file with name duong-3003750.gif

Trung Q. Duong (Senior Member, IEEE) received the Ph.D. degree in telecommunications systems from the Blekinge Institute of Technology (BTH), Sweden, in 2012. He is currently with Queen’s University Belfast, U.K., where he was a Lecturer (Assistant Professor), from 2013 to 2017, and a Reader (Associate Professor), in 2018. His current research interests include the Internet of Things (IoT), wireless communications, molecular communications, and signal processing. He is the author or a coauthor of over 330 technical articles published in scientific journals (200 articles) and presented at international conferences (136 papers). He was awarded the Best Paper Award at the IEEE Vehicular Technology Conference (VTC-Spring), in 2013, IEEE International Conference on Communications (ICC) 2014, IEEE Global Communications Conference (GLOBECOM) 2016, and IEEE Digital Signal Processing Conference (DSP) 2017. He is a recipient of the prestigious Royal Academy of Engineering Research Fellowship, from 2016 to 2021, and has won the prestigious Newton Prize, in 2017. He currently serves as an Editor for the IEEE Transactions on Wireless Communications and the IEEE Transactions on Communications and a Lead Senior Editor for the IEEE Communications Letters.

graphic file with name nguye-3003750.gif

Long D. Nguyen (Member, IEEE) was born in Dong Nai, Vietnam. He received the B.S. degree in electrical and electronics engineering and the M.S. degree in telecommunication engineering from the Ho Chi Minh City University of Technology (HCMUT), Vietnam, in 2013 and 2015, respectively, and the Ph.D. degree in electronics and electrical engineering from Queen’s Univerisity Belfast (QUB), U.K., in 2018. He was a Research Fellow with Queen’s University Belfast, for a part of Newton Project, from 2018 to 2019. He is currently with Dong Nai University, Vietnam, as an Assistant Professor, and Duy Tan University as an Adjunct Assistant Professor. His research interests include convex optimization techniques for resource management in wireless communications, energy efficiency approaches (heterogeneous networks, relay networks, cell-free networks, and massive MIMO), and real-time embedded optimization for wireless networks and the Internet of Things (IoT).

graphic file with name hanzo-3003750.gif

Lajos Hanzo (Fellow, IEEE) received the master’s and Ph.D. degrees from the Technical University (TU) of Budapest, in 1976 and 1983, respectively, and the D.Sc. degree from the University of Southampton, in 2004, and the Honorary Doctorates from the TU of Budapest, in 2009, and the University of Edinburgh, in 2015. He is a Foreign Member of the Hungarian Academy of Sciences and a former Editor-in-Chief of the IEEE Press. He has served several terms as Governor of both IEEE ComSoc and of VTS. He has published 1900+ contributions at IEEE Xplore, 19 Wiley-IEEE Press books and has helped the fast-track career of 123 Ph.D. students. Over 40 of them are Professors at various stages of their careers in academia and many of them are leading scientists in the wireless industry. He is also a Fellow of the Royal Academy of Engineering (FREng), of the IET and of EURASIP. (http://www-mobile.ecs.soton.ac.uk, https://en.wikipedia.org/wiki/Lajos_Hanzo)

Funding Statement

This work was supported in part by the Royal Academy of Engineering (RAEng) through the RAEng Research Fellowships Schemer under Grant RF14151422, in part by the Researcher Links through the Newton Fund Partnership under Grant 527612186, and in part by the U.K. Department for Business, Energy and Industrial Strategy and delivered by the British Council. L. Hanzo would like to acknowledge the financial support of the Engineering and Physical Sciences Research Council projects EP/N004558/1, EP/P034284/1, EP/P034284/1, EP/P003990/1 (COALESCE), of the Royal Society’s Global Challenges Research Fund Grant as well as of the European Research Council’s Advanced Fellow Grant QuantCom.

References

  • [1].Giordano G., Blanchini F., Bruno R., Colaneri P., Di Filippo A., Di Matteo A., and Colaneri M., “Modelling the COVID-19 epidemic and implementation of population-wide interventions in Italy,” Nature Med., vol. 26, no. , pp. 1–6, Apr. 2020. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [2].Rothe C., Schunk M., Sothmann P., Bretzel G., Froeschl G., Wallrauch C., Zimmer T., Thiel V., Janke C., Guggemos W., Seilmaier M., Drosten C., Vollmar P., Zwirglmaier K., Zange S., Wölfel R., and Hoelscher M., “Transmission of 2019-nCoV infection from an asymptomatic contact in Germany,” New England J. Med., vol. 382, no. 10, pp. 970–971, Mar. 2020. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [3].Shi F., Wang J., Shi J., Wu Z., Wang Q., Tang Z., He K., Shi Y., and Shen D., “Review of artificial intelligence techniques in imaging data acquisition, segmentation and diagnosis for COVID-19,” IEEE Rev. Biomed. Eng., early access, Apr. 16, 2020, doi: 10.1109/RBME.2020.2987975. [DOI] [PubMed]
  • [4].Zhou C., Yuan W., Wang J., Xu H., Jiang Y., Wang X., Wen Q. H., and Zhang P., “Detecting suspected epidemic cases using trajectory big data,” 2020, arXiv:2004.00908. [Online]. Available: http://arxiv.org/abs/2004.00908
  • [5].Herrera J. L., Srinivasan R., Brownstein J. S., Galvani A. P., and Meyers L. A., “Disease surveillance on complex social networks,” PLOS Comput. Biol., vol. 12, no. 7, Jul. 2016, Art. no. e1004928. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [6].Atzori L., Iera A., Morabito G., and Nitti M., “The social Internet of Things (SIoT)—When social networks meet the Internet of Things: Concept, architecture and network characterization,” Comput. Netw., vol. 56, no. 16, pp. 3594–3608, Nov. 2012. [Google Scholar]
  • [7].He Z., Cai Z., Yu J., Wang X., Sun Y., and Li Y., “Cost-efficient strategies for restraining rumor spreading in mobile social networks,” IEEE Trans. Veh. Technol., vol. 66, no. 3, pp. 2789–2800, Mar. 2017. [Google Scholar]
  • [8].Cai S., Hou W., Lin J., and Li Y., “Improving local search for minimum weight vertex cover by dynamic strategies,” in Proc. Twenty-Seventh Int. Joint Conf. Artif. Intell., Stockholm, Sweden, Jul. 2018, pp. 1412–1418. [Google Scholar]
  • [9].Mu C. and Zhang Y., “Learning-based robust tracking control of quadrotor with time-varying and coupling uncertainties,” IEEE Trans. Neural Netw. Learn. Syst., vol. 31, no. 1, pp. 259–273, Jan. 2020. [DOI] [PubMed] [Google Scholar]
  • [10].Mu C., Zhang Y., Jia H., and He H., “Energy-storage-based intelligent frequency control of microgrid with stochastic model uncertainties,” IEEE Trans. Smart Grid, vol. 11, no. 2, pp. 1748–1758, Mar. 2020. [Google Scholar]
  • [11].Dai H., Khalil E. B., Zhang Y., Dilkina B., and Song L., “Learning combinatorial optimization algorithms over graphs,” in Proc. Adv. Neural Inf. Proc. Syst., Dec. 2017, pp. 6348–6358. [Google Scholar]
  • [12].Gemmetto V., Barrat A., and Cattuto C., “Mitigation of infectious disease at school: Targeted class closure vs school closure,” BMC Infectious Diseases, vol. 14, no. 1, p. 695, Dec. 2014. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [13].Wang B., Sun Y., Duong T. Q., Nguyen L. D., and Zhao N., “Security enhanced content sharing in social IoT: A directed hypergraph-based learning scheme,” IEEE Trans. Veh. Technol., vol. 69, no. 4, pp. 4412–4425, Apr. 2020. [Google Scholar]
  • [14].Chu D. K., Akl E. A., Duda S., Solo K., S, Yaacoub, and Schünemann H. J., “Physical distancing, face masks, and eye protection to prevent person-to-person transmission of SARS-CoV-2 and COVID-19: A systematic review and meta-analysis,” Lancet, Jun. 2020, doi: 10.1016/S0140-6736(20)31142-9. [DOI] [PMC free article] [PubMed]
  • [15].Ribeiro L. F. R., Saverese P. H. P., and Figueiredo D. R., “Struc2vec: Learning node representations from structural identity,” in Proc. 23rd ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, New York, NY, USA, Aug. 2017, pp. 385–394. [Google Scholar]
  • [16].Newman M. E. J., Watts D. J., and Strogatz S. H., “Random graph models of social networks,” Proc. Nat. Acad. Sci. USA, vol. 99, no. 1, pp. 2566–2572, Feb. 2002. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [17].Isella L., Stehlé J., Barrat A., Cattuto C., Pinton J.-F., and Van den Broeck W., “What’s in a crowd? Analysis of face-to-face behavioral networks,” J. Theor. Biol., vol. 271, no. 1, pp. 166–180, Feb. 2011. [DOI] [PubMed] [Google Scholar]
  • [18].Aadithya K. V., Ravindran B., Michalak T. P., and Jennings N. R., “Efficient computation of the Shapley value for centrality in networks,” in Internet and Network Economics, Saberi A., Ed. Berlin, Germany: Springer, 2010, pp. 1–13. [Google Scholar]

Articles from Ieee Access are provided here courtesy of Institute of Electrical and Electronics Engineers

RESOURCES