tracing and identifying persons in response to the
COVID-19 pandemic. In this perspective, several
applications were suggested, with official
government support in some countries. Several states
recognize that the value of such apps needs to be
considered within the context of wider public health
measures and the stage of the spread of the infection.
These mobile applications seem to be very interesting
as they can help in identifying the infected persons,
contact tracing and averting, symptoms checking and
contact notification contacts etc.
Since the beginning of the COVID-19 pandemic,
many smartphone apps have been developed, some of
them by public authorities. Moreover, the World
Health Organization (WHO) is working on an
application that can provide medically- approved
information and inform the users based on their
symptoms (WHO, 2020). This standalone application
comes besides the WhatsApp-based messaging
(WHO, August 2020).
However, the Covid-19 mobile apps must have
full compliance and ensure privacy legislation and
data protection. These Privacy worries have been
raised, especially about systems that are established
on tracking the geographical location of application
users. A of lot of measurements are taken to deal with
such problems, like the use of the anonymized data,
which does not consist of storing data in centralized
databases...
In the case of Morocco, the police have been using
a mobile application to follow on individuals that do
not respect the travel restrictions imposed to fight
Covid-19. With the same objective, we propose in
this study a new efficient system for controlling the
COVID-19 pandemic. This digital system is based on
a mathematical formalism to ensure confinement
control while respecting privacy data protection. This
solution can widely control the R0 parameter by
controlling the citizens mobility.
As presented in the following sections of this
paper, the proposed system uses a new concept called
the Discrete Localization Algorithm (DLA) and can
help to widely control R0 index with data protection.
The main objective of our system is twofold. On
one hand, it targets the authorization strategy control
and congestion suppression by automatically
generating authorizations to go out of the house or
those delivered by the job office with respect of the
data privacy. On the other hand, the system targets
data census by collecting information on people’s
mobility and compliance to confinement rules. Our
system therefore solves problems related to the time
delays in the measurements and control of the R0
parameter.
This study presents Graph theory and Minimum
Spanning Tree algorithm as well as details on the
Discrete Localization Algorithm (DLA), including
simulations.
2 GRAPH THEORY AND
MINIMUM SPANNING TREE
Our approach is based on graph theory and minimum
spanning tree. Thus, each city (region or country) can
be rep- resented by its corresponding undirected and
connected graph G(B; E) where B is the set of vertices
(nodes) representing different police control point,
and E is the set of links between nodes (itineraries).
Each vertex of B is indicated by an index i € 1, ..., N.
e
ij
identifies the edge between the nodes B
i
and B
j
as
represented in figure 1.
For the connected graph G (B; E), the minimum
spanning tree (MST) problem is focused on finding a
spanning tree with minimum total edge weight. This
problem has been widely considered and is a sub-
problem of many known network problems. Its
applicable in wireless networks and VLSI design
(AFP, 2020), (Tseng, 1998), (Zheng, 1996) and many
graph problems such as connectivity checking (Maon,
1986), (Tarjan, 1985). It is also used on ovarian and
bronchial cancer detection and various other medical
analyses (Brinkhuis, 1997), and network evolvement
(Matos, 2002).
Boruvka, Kruskal, and Prim algorithms provide a
large number of the known algorithms. Since
Kruskals algorithm works on arranged edges and
MST edges are likely to be among the θ(nlog(n))
smallest weight edges, partial sorting of edges work
greatly to find out lighter edges (Brennan, 1982),
(Paredes, 2006).
Filtering of edges connecting nodes makes the
algorithm very faster (Kershenbaum ,1972).
Figure 1: An example illustrating an undirected graph