{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:08:33Z","timestamp":1772024913022,"version":"3.50.1"},"reference-count":43,"publisher":"Emerald","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,25]]},"abstract":"<jats:sec>\n                    <jats:title>Purpose<\/jats:title>\n                    <jats:p>The purpose of this study is to exploit the lowest common ancestor technique in an m-ary data aggregation tree in the fog computing-enhanced IoT to assist in contact tracing in COVID-19. One of the promising characteristics of the Internet of Things (IoT) that can be used to save the world from the current crisis of COVID-19 pandemic is data aggregation. As the number of patients infected by the disease is already huge, the data related to the different attributes of patients such as patient thermal image record and the previous health record of the patient is going to be gigantic. The authors used the technique of data aggregation to efficiently aggregate the sensed data from the patients and analyse it. Among the various inferences drawn from the aggregated data, one of the most important is contact tracing. Contact tracing in COVID-19 deals with finding out a person or a group of persons who have infected or were infected by the disease.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Design\/methodology\/approach<\/jats:title>\n                    <jats:p>The authors propose to exploit the technique of lowest common ancestor in an m-ary data aggregation tree in the Fog-Computing enhanced IoT to help the health-care experts in contact tracing in a particular region or community. In this research, the authors argue the current scenario of COVID-19 pandemic, finding the person or a group of persons who has\/have infected a group of people is of extreme importance. Finding the individuals who have been infected or are infecting others can stop the pandemic from worsening by stopping the community transfer. In a community where the outbreak has spiked, the samples from either all the persons or the patients showing the symptoms are collected and stored in an m-ary tree-based structure sorted over time.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Findings<\/jats:title>\n                    <jats:p>Contact tracing in COVID-19 deals with finding out a person or a group of persons who have infected or were infected by the disease. The authors exploited the technique of lowest common ancestor in an m-ary data aggregation tree in the fog-computing-enhanced IoT to help the health-care experts in contact tracing in a particular region or community. The simulations were carried randomly on a set of individuals. The proposed algorithm given in Algorithm 1 is executed on the samples collected at level-0 of the simulation model, and to aggregate the data and transmit the data, the authors implement Algorithm 2 at the level-1. It is found from the results that a carrier can be easily identified from the samples collected using the approach designed in the paper.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Practical implications<\/jats:title>\n                    <jats:p>The work presented in the paper can aid the health-care experts fighting the COVID-19 pandemic by reducing the community transfer with efficient contact tracing mechanism proposed in the paper.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Social implications<\/jats:title>\n                    <jats:p>Fighting COVID-19 efficiently and saving the humans from the pandemic has huge social implications in the current times of crisis.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Originality\/value<\/jats:title>\n                    <jats:p>To the best of the authors\u2019 knowledge, the lowest common ancestor technique in m-ary data aggregation tree in the fog computing-enhanced IoT to contact trace the individuals who have infected or were infected during the transmission of COVID-19 is first of its kind proposed. Creating a graph or an m-ary tree based on the interactions\/connections between the people in a particular community like location, friends and time, the authors can attempt to traverse it to find out who infected any two persons or a group of persons or was infected by exploiting the technique of finding out the lowest common ancestor in a m-ary tree.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1108\/ijpcc-08-2020-0110","type":"journal-article","created":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T02:49:40Z","timestamp":1599792580000},"page":"461-475","source":"Crossref","is-referenced-by-count":1,"title":["On contact tracing in COVID-19 (SARS-CoV-2) pandemic using lowest common ancestor in m-ary data aggregation tree in the fog-computing enhanced internet of things"],"prefix":"10.1108","volume":"18","author":[{"given":"Ab Rouf","family":"Khan","sequence":"first","affiliation":[{"name":"National Institute of Technology Srinagar Department of Computer Science and Engineering, , Srinagar,","place":["India"]}]},{"given":"Mohammad Ahsan","family":"Chishti","sequence":"additional","affiliation":[{"name":"National Institute of Technology Srinagar Department of Computer Science and Engineering, , Srinagar,","place":["India"]}]}],"member":"140","published-online":{"date-parts":[[2020,9,15]]},"reference":[{"issue":"1","key":"2026022507181790900_ref001","doi-asserted-by":"crossref","DOI":"10.1137\/0205011","article-title":"On finding lowest common ancestor in trees","volume":"5","author":"Aho","year":"1976","journal-title":"Siam J. Comput"},{"key":"2026022507181790900_ref002","doi-asserted-by":"publisher","DOI":"10.1038\/nature03475","article-title":"That \u2018internet of things\u2019 thing","author":"Ashton","year":"2009","journal-title":"RFID Journal"},{"key":"2026022507181790900_ref003","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/S2589-7500(20)30133-3","article-title":"The need for privacy with public digital contact tracing during the COVID-19 pandemic","author":"Bengio","year":"2020","journal-title":"Digital Health"},{"key":"2026022507181790900_ref004","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2342509.2342513","volume-title":"Proceedings of the first edition of the MCC workshop on Mobile cloud computing \u2013 MCC \u201812","author":"Bonomi","year":"2012"},{"issue":"6","key":"2026022507181790900_ref005","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","article-title":"Fog and IoT: an overview of research opportunities","volume":"3","author":"Chiang","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"key":"2026022507181790900_ref006","doi-asserted-by":"publisher","first-page":"102181","DOI":"10.1016\/j.ijinfomgt.2020.102181","article-title":"COVID-19, digital privacy, and the social limits on data-focused public health responses","author":"Fahey","year":"2020","journal-title":"International Journal of Information Management"},{"key":"2026022507181790900_ref007","doi-asserted-by":"publisher","first-page":"21","DOI":"10.13140\/RG.2.2.20158.89922","article-title":"A reference architecture for the internet of things","author":"Fremantle","year":"2014"},{"issue":"7","key":"2026022507181790900_ref008","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of things (IoT): a vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Generation Computer Systems"},{"key":"2026022507181790900_ref010","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/ICICCS.2016.7542301","volume-title":"2016 1st International Conference on Innovation and Challenges in Cyber Security, ICICCS 2016, (ICICCS)","author":"Gupta","year":"2016"},{"issue":"9","key":"2026022507181790900_ref009","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1002\/spe.2509","article-title":"iFogSim: a toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments","volume":"47","author":"Gupta","year":"2017","journal-title":"Software: Practice and Experience"},{"key":"2026022507181790900_ref011","doi-asserted-by":"publisher","first-page":"99083","DOI":"10.1109\/ACCESS.2020.2998042","article-title":"Evaluating how smartphone contact tracing technology can reduce the spread of infectious diseases: the case of COVID-19","volume":"8","author":"Hern\u00e1ndez-Orallo","year":"2020","journal-title":"IEEE Access"},{"key":"2026022507181790900_ref028","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/NGMAST.2016.17","article-title":"Energy efficient fog servers for internet of things information piece delivery (IoTIPD) in a smart city vehicular environment","author":"Igder","year":"2016","journal-title":"10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)"},{"issue":"2","key":"2026022507181790900_ref012","article-title":"Data aggregation mechanisms in the internet of things: a study, qualitative and quantitative analysis","volume":"2","author":"Khan","year":"2020","journal-title":"International Journal of Computing and Digital Systems"},{"key":"2026022507181790900_ref034","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110059","article-title":"Applications of machine learning and artificial intelligence for covid-19 (SARS-CoV-2) pandemic: a review","volume":"139","author":"Lalmuanawma","year":"2020","journal-title":"Chaos, Solitons and Fractals. Elsevier"},{"key":"2026022507181790900_ref013","volume-title":"IEEE Spectrum","author":"Law","year":"2020"},{"key":"2026022507181790900_ref016","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","article-title":"The internet of things: a survey","author":"Li","year":"2015"},{"issue":"1","key":"2026022507181790900_ref014","doi-asserted-by":"publisher","first-page":"44","DOI":"10.26599\/TST.2019.9010023","article-title":"Approximate data aggregation in sensor equipped IoT networks","volume":"25","author":"Li","year":"2020","journal-title":"Tsinghua Science and Technology"},{"issue":"6490","key":"2026022507181790900_ref015","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1126\/science.abb3221","article-title":"Substantial undocumented infection facilitates the rapid dissemination of novel coronavirus (SARS-CoV-2)","volume":"368","author":"Li","year":"2020","journal-title":"Science"},{"key":"2026022507181790900_ref017","doi-asserted-by":"publisher","DOI":"10.1016\/S1473-3099(20)30512-0","article-title":"Case isolation, contact tracing, and physical distancing are pillars of COVID-19 pandemic control, not optional choices","author":"Macintyre","year":"2020","journal-title":"The Lancet Infectious Diseases"},{"key":"2026022507181790900_ref018","first-page":"1","author":"Mahmud","year":"2019","journal-title":"Modelling and Simulation of Fog and Edge Computing Environments Using iFogSim Toolkit"},{"key":"2026022507181790900_ref019","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3002490","article-title":"COVID-19 contact trace app deployments: learnings from Australia and Singapore","author":"Michael Katina","year":"2020","journal-title":"IEEE Consumer Elctronics Magzine"},{"key":"2026022507181790900_ref020","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3002492","article-title":"Getting behind COVID-19 contact trace apps: the Google\u2013Apple partnership","author":"Michael","year":"2020","journal-title":"IEEE Consumer Elctronics Magzine"},{"key":"2026022507181790900_ref021","doi-asserted-by":"publisher","DOI":"10.1109\/CIOT.2016.7872914","article-title":"Edge-fog cloud: a distributed cloud for internet of things computations","author":"Mohan","year":"2017"},{"issue":"4","key":"2026022507181790900_ref022","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.medmal.2020.03.006","article-title":"No evidence of rapid antiviral clearance or clinical benefit with the combination of hydroxychloroquine and azithromycin in patients with severe COVID-19 infection","volume":"50","author":"Molina","year":"2020","journal-title":"M\u00e9decine et Maladies Infectieuses"},{"key":"2026022507181790900_ref023","unstructured":"Organization, W.H\n          , (WHO) (2020), \u201cCoronavirus disease 2019 (COVID-19) (accessed: July 2020)\u201d, available at:www.who.int\/publications-detail\/infection-prevention-and-control-during-health-care-when-novel-coronavirus-(ncov)-infection-is-suspected-20200125"},{"key":"2026022507181790900_ref024","doi-asserted-by":"publisher","DOI":"10.1016\/j.idm.2020.06.008","article-title":"Using statistics and mathematical modelling to understand infectious disease outbreaks: COVID-19 as an example","volume":"5","author":"Overton","year":"2020","journal-title":"Infectious Disease Modelling"},{"key":"2026022507181790900_ref027a","doi-asserted-by":"publisher","DOI":"10.1108\/IJPCC-06-2020-0060","article-title":"SARS n-CoV2-19 detection from chest x-ray images using deep neural networks","author":"Pandit","year":"2020","journal-title":"International Journal of Pervasive Computing and Communications"},{"key":"2026022507181790900_ref025","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.jnca.2017.08.006","article-title":"Data aggregation mechanisms in the internet of things: a systematic review of the literature and recommendations for future research","volume":"97","author":"Pourghebleh","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"2026022507181790900_ref027","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.hlpt.2020.04.005","article-title":"Defending against the novel coronavirus (COVID-19) outbreak: how can the internet of things (IoT) help to save the world?","volume":"9","author":"Rahman","year":"2020","journal-title":"Health Policy and Technology"},{"key":"2026022507181790900_ref029","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.puhe.2020.06.045","article-title":"COVID-19 contact tracing apps: the \u2018elderly paradox","volume":"185","author":"Rizzo","year":"2020","journal-title":"Public Health. The Royal Society for Public Health"},{"key":"2026022507181790900_ref030","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1017\/CBO9781107415324.004","article-title":"The internet of things: an overview \u2013 understanding the issues and challenges of a more connected world","author":"Rose","year":"2015","journal-title":"The Internet Society (ISOC)"},{"key":"2026022507181790900_ref031","doi-asserted-by":"publisher","first-page":"699","DOI":"10.23919\/ICACT.2017.7890183","volume-title":"International Conference on Advanced Communication Technology, ICACT","author":"Sain","year":"2017"},{"key":"2026022507181790900_ref032","doi-asserted-by":"publisher","first-page":"67830","DOI":"10.1109\/ACCESS.2018.2878640","article-title":"Improving quality of data: IoT data aggregation using device to device communications","volume":"6","author":"Sanyal","year":"2018","journal-title":"IEEE Access"},{"issue":"6","key":"2026022507181790900_ref033","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1137\/0217079","article-title":"On finding lowest common ancestors: simplification and parallelization","volume":"17","author":"Schieber","year":"1988","journal-title":"SIAM Journal on Computing"},{"issue":"6","key":"2026022507181790900_ref035","doi-asserted-by":"publisher","first-page":"85","DOI":"10.9790\/9622-0706048588","article-title":"Internet of things: architecture, issues and applications","volume":"7","author":"Sethi","year":"2017","journal-title":"International Journal of Engineering Research and Applications"},{"issue":"7","key":"2026022507181790900_ref036","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1109\/I-SMAC.2017.8058246","article-title":"Internet of things: vision, application areas and research challenges","volume":"10","author":"Shahid","year":"2017","journal-title":"Proceedings of the International Conference on IoT in Social, Mobile, Analytics and Cloud, I-SMAC 2017. Elsevier B.V"},{"issue":"4","key":"2026022507181790900_ref026","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.dsx.2020.04.041","article-title":"Internet of things (IoT) applications to fight against COVID-19 pandemic","volume":"14","author":"Singh","year":"2020","journal-title":"Diabetes and Metabolic Syndrome: Clinical Research and Reviews. Elsevier Ltd"},{"key":"2026022507181790900_ref037","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.81","volume-title":"2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber","author":"Tang","year":"2013"},{"key":"2026022507181790900_ref038","doi-asserted-by":"publisher","first-page":"104762","DOI":"10.1016\/j.antiviral.2020.104762","article-title":"Of chloroquine and COVID-19","volume":"177","author":"Touret","year":"2020","journal-title":"Antiviral Research"},{"key":"2026022507181790900_ref039","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MCE.2020.2992034","article-title":"EasyBand: a wearable for safety-aware mobility during pandemic outbreak","author":"Tripathy","year":"2020"},{"key":"2026022507181790900_ref040","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/CAMAD.2014.7033259","volume-title":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","author":"Yannuzzi","year":"2014"},{"key":"2026022507181790900_ref041","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/2757384.2757397","volume-title":"Proceedings of the 2015 Workshop on Mobile Big Data \u2013 Mobidata \u201815","author":"Yi","year":"2015"},{"key":"2026022507181790900_ref042","doi-asserted-by":"publisher","first-page":"101713","DOI":"10.1016\/j.sysarc.2020.101713","article-title":"MMDA: multidimensional and multidirectional data aggregation for edge computing-enhanced IoT","volume":"106","author":"Zeng","year":"2020","journal-title":"Journal of Systems Architecture, Elsevier B.V"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-08-2020-0110\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ijpcc\/article-pdf\/18\/5\/461\/10205421\/ijpcc-08-2020-0110en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ijpcc\/article-pdf\/18\/5\/461\/10205421\/ijpcc-08-2020-0110en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:20:51Z","timestamp":1772022051000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ijpcc\/article\/18\/5\/461\/162379\/On-contact-tracing-in-COVID-19-SARS-CoV-2-pandemic"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,15]]},"references-count":43,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,11,25]]}},"URL":"https:\/\/doi.org\/10.1108\/ijpcc-08-2020-0110","relation":{},"ISSN":["1742-7371","1742-738X"],"issn-type":[{"value":"1742-7371","type":"print"},{"value":"1742-738X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,15]]}}}