SlideShare a Scribd company logo
Spreading Phenomena in Complex Networks
Shubhabrata Ghosh Manojit Chakraborty Souvik Das Pallavi Mazumder
Heritage Institute of Technology, Kolkata
Dept. of Computer Science and Engineering
April 3, 2017
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 1 / 62
Contents
Introduction
Epidemic Modelling
Network Epidemics
Contact Networks
Beyond the degree distribution
Immunization
Epidemic Prediction
Figure: Pathogen
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 2 / 62
A Story to Start
On the night of February 21, 2003, a physician from southern China checked into the
Metropole Hotel in Hong Kong.He previously treated patients suering from a disease that
was called atypical pneumonia.
Next day, after leaving the hotel, he went to the local hospital, this time as a patient. He
died there several days later of atypical pneumonia
That night sixteen other guests of the Metropole Hotel also contracted the disease that
was named Severe Acute Respiratory Syndrome, or SARS.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 3 / 62
A Story to Start
These guests carried the SARS virus with them
to Hanoi, Singapore, and Toronto, sparking
outbreaks in each of those cities.
Super Spreader
The physician became an example of a Super
Spreader, an individual who is responsible for a
disproportionate number of infections during an
epidemic.
Hubs
A network theorist will recognize Super
Spreaders as Hubs, nodes with an exceptional
number of links in the contact network on
which a disease spreads
.
Figure: Super Spreaders
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 4 / 62
Introduction
Complex Networks are everywhere.They crop up wherever there are interactions between actors.
Phenomena Agent Network
Venereal disease Pathogens Sexual network
Research Paper Scientists Citation network
Rumor spreading Information, memes Communication network
Computer viruses Digital viruses Internet network
Bedbugs Parasitic insects Hotel-traveler network
Malaria Plasmodium Mosquito-human Network
Table: Dierent agents and corresponding networks
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 5 / 62
Network Representation
Networks portray the interactions between dierent actors.
Actors or individuals are nodes/vertices in
the graph
If there's interaction between two nodes,
there's an edge/link between them
The links can have weights or intensities
signifying the strength of connections
The links can be directed, like in the web
graph. There's a directed link between two
nodes (pages) A and B if there's a
hyperlink to B from A
Figure: Networks
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 6 / 62
Population Representation
As time progresses, human population has been demonstrated using dierent representations by
various scientists. Each representation gave a better analogy than its previous one.
Homogeneous Mixing
Random Network by Erdos-Renyi (1959) [1]
Scale Free Network by Albert-Barabasi (1999) [2]
Figure: Random Network Figure: Scale Free Network
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 7 / 62
Degree Distribution-Random Network
Figure: Random Network plot
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 8 / 62
Degree Distribution:Scale Free Network
Figure: Scale Free Network plot
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 9 / 62
SUSCEPTIBLE-INFECTED (SI) MODEL
At rst we will simply demonstrate dierent epidemic models on Homogeneous Mixing
representation of a population.
S: Susceptible individuals.
I: Infected individuals, when infected they
can infect others continuously
N: Total population.
β: Likelihood of transmission of disease
from Infected to Susceptible
k: average number of contacts a typical
individual has
Susceptible contacts per unit of time
βkS
N
Overall rate of infection
dI(t)
dt
=
I(t)βkS(t)
N
Figure: SI Model
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 10 / 62
SI Model
di
dt
= iβks, By solving this equation,
i =
i0e βkt
1 − i0 + i0e βkt
At the beginning the fraction of infected individuals
increases exponentially
With time an infected individual encounters fewer
and fewer susceptible individuals. Hence the growth
of i slows for large t
Figure: SI Model Graph
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 11 / 62
Susceptible Infected Susceptible(SIS) Model
It has the same two states as the SI
Model, susceptible and infected.
The dierence is now infected individuals
recover at a xed rate µ, becoming
susceptible again
The equation describing the dynamics of this
model :-
di
dt
= βki(1 − i) − µi
Figure: SIS Model
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 12 / 62
SIS Model
Figure: SIS Model Graph
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 13 / 62
Susceptible Infected Recovered(SIR) Model
In the SIR model recovered individuals
enter a recovered state, meaning that they
develop immunity rather than becoming
susceptible again.
The dierential equations for the
susceptible s, infected i and the removed r
state.
ds
dt
= −βki(1 − r − i)
di
dt
= −µi + βki(1 − r − i)
dr
dt
= µi
Figure: SIR Model
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 14 / 62
SIR Model
Figure: SIR Model
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 15 / 62
Comparison between Models
Figure: Comparing SI, SIS, SIR Models
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 16 / 62
Network Epidemics
Network Epidemics
Individual can transmit a pathogen only to those
they come into contact with, hence pathogens
spread on a complex contact network. .
These contact networks are often scale-free, hence
 k  is not sucient to characterize their
topology.
The failure of the basic hypotheses prompted a
fundamental revision of the epidemic modeling
framework by Romualdo Pastor-Satorras and
Alessandro Vespignani in 2001[3] Figure: The Great Plague
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 17 / 62
SI Model on a Network
Degree Block Approximation
A mathematical formalism that is used to
distinguish nodes based on their degree.
This assumes that nodes with the same
degree are statistically equivalent.
Thus, the fraction of nodes with degree k
that are infected among all Nk degree-k
nodes in the network is denoted by:
ik =
Ik
Nk
Figure: Degree Block Approximation
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 18 / 62
SI Model on a Network
The total fraction of infected nodes is the sum of all infected degree-k nodes:
i = k pkik
Given the dierent node degrees, we write the SI model for each degree k separately:
dik
dt
=β(1 − ik)kθk
The infection rate is proportional to β and the fraction of degree-k nodes that are not yet
infected, is (1 − ik).
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 19 / 62
SI Model(Homogeneous) vs SI Model(Network)
The average degree  k  in case of homogenous mixing is replaced with each node's
actual degree k.
The density function θk represents the fraction of infected neighbors of a susceptible node
k. But in case of homogenous mixing assumption θk is simply the fraction of the infected
nodes, i.
While, in case of homogenous mixing, there's just a single equation which explains the time
dependent behavior of the whole system. But in a network,
dik
dt
=β(1 − ik)kθk represents a
system of kmax coupled equations, one equation for each degree present in the network.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 20 / 62
SI Model on a Network
On solving the equation:
dik
dt
= β(1 − ik)kθk, we get:
ik = io(1 +
k( k  −1)
 k2
 −  k 
(e
t
τSI
-1))
where (τSI
) is the characteristic time for the
spread of the pathogen.
τSI
=
 k 
β( k2
 −  k )
Figure: SI Model
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 21 / 62
SI Model on a Network
The higher the degree of a node, the more
likely that it becomes infected. For any time
t we can write ik = g(t) + kf(t), indicating
that the group of nodes with higher degree
has a higher fraction of infected nodes
(Figure alongside).
Since i = k pkik, the total fraction of
infected nodes grows with time as:
i =
kmax
0
ik pk dk
= i0(1 +
( k 2 −  k )
 k2  −  k 
(e
t
τSI − 1)
Figure: Fraction of Infected Nodes in SI Model
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 22 / 62
Network Epidemics
Now we will derive τSI
for dierent networks. But before that we need to know what are the
two types of networks we are concerned with.
Random Networks
A random network consists of N nodes where each node pair is connected with probability p.
For a large N, it's degree distribution follows Poisson's distribution.
Scale Free Network
This is a network whose degree distribution follows a power law. That is, the fraction P(k) of
nodes in the network having k connections to other nodes goes for large values of k as: P(k)
∼ k−γ where 2γ3.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 23 / 62
τSI
FOR DIFFERENT NETWORKS
Random Networks
Here,  k2 = k  ( k  +1), obtaining τ ER
SI
=
1
β  k 
which is the same for homogenous networks.
Scale-free network with γ ≥ 3
If the contract network is scale-free with degree exponent γ ≥ 3, both k and k2 are
nite. Consequently τSI
is also nite and the spreading dynamics is similar to a random
network but with an altered τSI
.
Scale-free network with γ ≤ 3
For γ ≤ 3 in the N → ∞ limit k2 → ∞ hence
τSI
=
 k 
β( k2
 −  k )
predicts τSI
→ 0 In other words, the spread of a pathogen on a
scale-free network is instantaneous.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 24 / 62
SIS Model on a Network
In case of Epidemic Modeling, the equation for SI model was:
dik
dt
= β(1 − ik)kθk
The continuum equation describing the dynamics of the SIS model on a network is a
straightforward extension of the SI model
dik
dt
= β(1 − ik)kθk − µik
The dierence between the two equations is the presence of the recovery term -µik.
This changes the characteristic time of the epidemic to:
τSIS
=
 k 
β( k2
 −µ  k )
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 25 / 62
Spreading Rate for Different Networks
Spreading Rate
Spreading rate(λ) of a pathogen is dened as the ratio of transmission probability β and the
recovery rate µ. λ =
β
µ
The higher is λ, the more likely that the disease will spread. Yet, the number of infected
individuals does not increase gradually with λ. Rather, the pathogen can spread only if its
spreading rate exceeds an epidemic threshold λc.
Random Network
For a random network the epidemic threshold, λc =
1
 k  +1
If λ  λc, the pathogen will spread until it reaches an endemic state, where a nite
fraction i(λ) of the population is infected at any time.
If λ  λc, the pathogen dies out, i.e. i(λ)=0.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 26 / 62
Vanishing Epidemic Threshold
Scale-Free Network
For a scale-free network the epidemic
threshold, λc =
 k 
 k2 
As for a scale-free network k2 diverges
in the N→ ∞ limit, for large networks the
epidemic threshold is expected to vanish.
Figure: Epidemic Threshold
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 27 / 62
Epidemic Models on Networks
CONCLUSION :
In a large scale-free
network τ=0
In large scale-free
network λc=0
Figure: Epidemic Models On Networks
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 28 / 62
Contact Networks
Network epidemics predicts that the speed with
which a pathogen spreads depends on the degree
distribution of the relevant contact network.
We found that k2 aects both the characteristic
time τ and the epidemic threshold λc.
None of the precious ndings are consequential if
the network on which a pathogen spreads is
random- in that case the predictions of network
epidemics are indistinguishable from the predictions
of the traditional epidemic models encountered in
the previous slides. Figure: Face-to-face Contact Network
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 29 / 62
Sexually Transmitted diseases
HIV, the pathogen responsible for AIDS, spreads
mainly through sexual intercourse.
The scale-free nature of the sexual network indicates
that most individuals have relatively few sexual
partners. A few individuals, however, had a high
number of sexual partners during their lifetime.
Consequently the sexual network has a high k2,
which lowers both τ and λc.
Figure: The Sex Web
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 30 / 62
Airborne Diseases
To predict the spread of pathogens, we
must know how far infected individuals
travel.
In the context of epidemic phenomena, the
most studied mobility data comes from air
travel, the mode of transportation that
determines the speed with which a
pathogen moves around the globe.
Consequently the air transportation
network, that connects airports with direct
ights, plays a key role in modeling and
predicting the spread of pathogens Figure: Air Transportation Network
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 31 / 62
Network Science
Networks are powerful models of complex
systems in various domains.
Due to limitations of data collection
techniques,static network representation of
a given system was studied earlier.
Many real-world systems are not static but
change over time.
Today it has become possible to record
temporal changes in network structure (or
topology).
Figure: Activity of Police (blue) and Fascists
(black) obtained from time slices.(by months)
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 32 / 62
Temporal Network
Many studies performed under the assumption
of static network structures can now be
extended to take into account the network's
dynamics.
Data on time-varying networks are becoming
accessible across a variety of contexts.
This avalanche of data is prompting a surge of
activity in the eld of temporal networks
Figure: Temporal Network showing social
interactions
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 33 / 62
Aggregated Network
To accurately predict an epidemic process we
must consider the fact that pathogens spread
on temporal networks, a topic of increasing
interest in network science
By ignoring the temporality of these contact
patterns, we typically overestimate the speed
and the extent of an outbreak.
Figure: Aggregated Network showing social
interactions
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 34 / 62
Social Interactions
The timing of the interactions between two
connected nodes is random.
This means that the interevent times between
consecutive contacts follow an exponential
distribution, resulting in a random but uniform
sequence of events
Therefore the contact patterns have an
uneven,'bursty' character in time Figure: Social Media websites are popular among
all age groups
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 35 / 62
Degree Correlation
Many social networks are assortative,
implying that high degree nodes tend to
connect to other high degree nodes. Do
they aect the spread of a pathogen?
Assortative correlations decrease λc and
dissasortative correlations increase it
Despite the changes in λc, for the SIS
model the epidemic threshold vanishes for
a scale-free network with diverging second
moment, whether the network is
assortative, neutral or disassortative Figure: Graph showing appearance of certain
minerals in certain foods
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 36 / 62
Social Interactions
The mobile phone network allows us to explore
the role of tie strengths and communities on
spreading phenomena.
The spread of information on a weighted
mobile call graph, where the probability that a
node passes information to one of its neighbors
is proportional to the strength of the tie
between them. Figure: Temporal Network showing social
interactions
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 37 / 62
Spreading conversation
Spreading in a small network
neighborhood, following the real link
weights.The information is released from
the red node, the arrow weight indicating
the tie strength.
The simulation was repeated 1,000 times.
The size of the arrowheads is proportional
to the number of times the information
was passed along the corresponding
direction, and the color indicates the total
number of transmissions along that link.
Figure: Link weight and communities
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 38 / 62
Spreading conversation
Same in as previous case,but we assume
that each link has the same weight
w = wij 
In the control simulation the information
tends to follow the shortest path. When
the link weights are taken into account,
information ows along a longer backbone
with strong ties.
Figure: Link weight and communities
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 39 / 62
Contagion
Simple contagion is the process we
explored so far: It is sucient to come
into contact with an infected individual to
be infected. The spread of memes,
products and behavior is often described
by Complex contagion
The dierence between simple and
complex contagion is well captured by
Twitter data.
Figure: two types of contagion
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 40 / 62
Immunization
Immunization strategies specify how vaccines,
treatments or drugs are distributed in the
population.
Yet, often cost considerations, the diculty of
reaching all individuals at risk, and real or
perceived side eects of the treatment prohibit
full coverage.
Figure: Patient being injected
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 41 / 62
Immunization
The main purpose of immunization is to
protect the immunized individual from an
infection.
Secondary purpose is to reduce the speed
with which the pathogen spreads in a
population.
Eective degree of each susceptible node
changes from  k  to  k  (1 − g), which
decreases the spreading rate of the pathogen
from λ =
β
µ
to λ = λ(1 − g)
Figure: Vaccines are indispensable to stop spread
of diseases
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 42 / 62
Random Network
If the pathogen spreads on a random network, for a high g the spreading rate λ could fall
below the epidemic threshold.The immunization rate gc is calculated as
gc = 1 −
µ
β  k  +1
if vaccination increases the fraction of immunized individuals above
gc, it pushes the spreading rate under the epidemic threshold λc.
In this case τ becomes negative and the pathogen dies out naturally. This explains why
health ocial encourage a high fraction of the population take the inuenza vaccine.
Similarly, a condom not only protects the individual who uses it from contacting the HIV,
but also decrease the rate at which AIDS spreads in the sexual network.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 43 / 62
Heterogeneous Network
In heterogeneous networks a virus can be
eradicated by increasing the epidemic threshold
through hub immunization. The gure shows
that, more hubs are immunized (i.e. the smaller
is k'max), the larger is λc, increasing the
chance that the disease dies out. Immunizing
the hubs changes the network on which the
disease spreads
Figure: immunization in heterogeneous networks
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 44 / 62
Heterogeneous Network
For heterogeneous network the equation
becomes gc = 1 −
µ  k 
β  k2 
let us consider a digital virus spreading on the
email network. If we make the email network
random and undirected, we have  k2 =3.26.
Using λ=1 in we obtain gc=0.76.
Yet, the email network is scale free with
 k2 =1,271 (undirected version).In this case
predicts gc=0.997 for λ=1. Figure: immunization in heterogeneous networks
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 45 / 62
Epidemic Eradication
Figure: Rahima Banu,the last smallpox infected patient in Bangladesh in 1976
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 46 / 62
A Light in Darkness
During much of its history, humanity has been
helpless when faced with a pandemic. Lacking
drugs and vaccines, infectious diseases
repeatedly swept through continents,
decimating the world's population.
Despite the spectacular medical advances, we
have eective vaccines only against a small
number of pathogens. Consequently
transmission- reducing and
quarantine-based measures remain the main
tools of health professionals in combatting new
pathogens.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 47 / 62
Realtime Prediction
The real-time prediction of an epidemic
outbreak is a very recent development.
The 2009 H1N1 outbreak was the rst
beneciary of these developments, becoming
the rst pandemic whose spread was predicted
in real time.
The emergence of any new pathogen raises
several key questions.these questions are
addressed using powerful epidemic simulators.
Figure: Ebola virus
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 48 / 62
REAL-TIME FORECAST
Epidemic forecast aims to foresee the real time spread of a pathogen, predicting the number
of infected individuals expected each week in each major city.
GLEAM( Global Epidemic and Mobility computational model )
GLEAM maps each geographic location into the nodes of a network.
Transport between these nodes, representing the links, are provided by global
transportation data, like airline schedules.
GLEAM estimates the epidemic parameters, like the transmission rate or reproduction
number, using a network-based approach.
It relies on chronological data that captures the worldwide spread of the pandemic, rather
than medical reports.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 49 / 62
Modeling the 2009 H1N1 Pandemic
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 50 / 62
Modeling the 2009 H1N1 Pandemic
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 51 / 62
Modelling the 2009 H1N1 Pandemic
For H1N1, the predictions were compared with data
collected from surveillance and virologic sources in 48
countries during the full course of the pandemic.
Peak Time
Peak time corresponds to the week when most
individuals are infected in a particular country.
Early Peak
GLEAM predicted that the H1N1 epidemic will peak
out in November, rather than in January or February,
the typical peak time of inuenza- like viruses.
The Impact of Vaccination
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 52 / 62
What if Analysis
By incorporating the time and nature of each containment and mitigation procedure,
simulations can estimate the eciency of specic contingency plans.
Travel Restrictions
Given the important role air travel plays in the
spread of a pathogen, faced with a dangerous
pandemic, like an Ebola outbreak the rst
instinct is to restrict travel.
For example, there was a 40% decline in travel
to and from Mexico in May 2009, during the
H1N1 outbreak.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 53 / 62
What If Analysis
Antiviral Treatment
During the 2009 H1N1 pandemic Canada,
Germany, Hong Kong, Japan, the UK, and the
USA distributed antiviral drugs to mitigate the
impact of the disease. This prompted modelers
to ask what would have been the impact if all
countries that had drug stockpiles would have
distributed it to their population.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 54 / 62
Spread of a Pandemic
Effective Distance
Before there was a strong correlation
between the time of the outbreak and the
physical distance from the origin of the
outbreak.
Today, with airline travel, physical distance
has lost its relevance for epidemic
phenomena.
Thus, we replace the conventional
geographic distance with an eective
distance derived from the mobility
network [4].
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 55 / 62
Spread of a Pandemic
Mobility Network
Each link is directed and
weighted, characterized by a ux
fraction 0 ≤ pij ≤ 1,fraction of
travelers that leave node i and
arrive at node j
The spread of a pathogen is
dominated by the most probable
trajectories predicted by the
mobility matrix pij. So, the
eective distance dij between
two connected locations i and j
dij = (1 − lnpij) ≥ 0
Note that dij = dji Figure: Mobility Network
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 56 / 62
Spread of a pandemic
Figure: The spread of a pandemic with an initial outbreak in Hong Kong.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 57 / 62
Mobility Network
A surprising but welcome aspect of epidemic forecast is that the predictions of dierent models
are rather similar, despite the fact that they use dierent mobility data.
The eective distance helps us understand why the various model predictions converge. We can
write the arrival time of a pathogen to location a as
Ta =
deff (P)
Veff (β, R0, γ, )
We see that the relative arrival times are independent of the epidemiological parameters. For
example, for an outbreak that starts at node i, the ratio of the arrival times to nodes j and l is
Ta(j/i)
Ta(l/i)
=
deff (j/i)
deff (l/i)
i.e. the ratio depends only on the eective distances. Therefore, the relative arrival times of the
disease depend only on the topology of the mobility network.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 58 / 62
Effective Distance and Arrival Time
1 Geographic Distance
Arrival times vs. geographic distance from
its source (Mexico) for the 2009 H1N1
pandemic.
2 Eective Distance
Epidemic arrival time Ta vs. eective
distance Deff for H1N1, demonstrating
the strong correlations between the
eective distance
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 59 / 62
Summary
The joint advances in data collection and network epidemics have oered the capability to
predict the real-time spread of a pathogen. The developed models can help design
response and mitigation scenarios.
Interestingly, the recent success of epidemic forecast is not due to the improved
understanding of the underlying biology of infectious pathogens.
When it comes to the spreading of a pathogen, the epidemic parameters are of secondary
importance. The most important factor is the structure of the mobility network.
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 60 / 62
References
[1] P. Erd®s and A. Rényi. On random graphs, I. Publicationes Mathematicae (Debrecen),
6:290-297 (1959).
[2] A.L. Barabási and R.Albert. Emergence of scaling in random networks. Science,
286:509-512 (1999).
[3] R. Pastor-Satorras and A. Vespignani. Epidemic spreading in scalefree networks. Physical
Review Letters, 86:3200-3203 (2001).
[4] D. Brockmann and D. Helbing. The Hidden Geometry of Complex, Network-Driven
Contagion Phenomena. Science, 342:1337-1342 (2014).
Picture Courtesy : A.L. Barabási. Spreading phenomena. Network Science, 1:379-436 (2016)
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 61 / 62
Thank you
c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 62 / 62

More Related Content

What's hot

Social network analysis part ii
Social network analysis part iiSocial network analysis part ii
Social network analysis part ii
THomas Plotkowiak
 
Graph Neural Network - Introduction
Graph Neural Network - IntroductionGraph Neural Network - Introduction
Graph Neural Network - Introduction
Jungwon Kim
 
Statistical models in simulation
Statistical models in simulationStatistical models in simulation
Statistical models in simulation
Vishruth Kumar
 
06 Community Detection
06 Community Detection06 Community Detection
06 Community Detection
Duke Network Analysis Center
 
Term weighting
Term weightingTerm weighting
Term weighting
Primya Tamil
 
Graph Representation Learning
Graph Representation LearningGraph Representation Learning
Graph Representation Learning
Jure Leskovec
 
Hardware Trojan detection using Clock sweeping method
Hardware Trojan detection using Clock sweeping methodHardware Trojan detection using Clock sweeping method
Hardware Trojan detection using Clock sweeping method
Ashish Maurya
 
Clinical prediction models
Clinical prediction modelsClinical prediction models
Clinical prediction models
Maarten van Smeden
 
Bayesian Network 을 활용한 예측 분석
Bayesian Network 을 활용한 예측 분석Bayesian Network 을 활용한 예측 분석
Bayesian Network 을 활용한 예측 분석
datasciencekorea
 
Representation learning on graphs
Representation learning on graphsRepresentation learning on graphs
Representation learning on graphs
Deakin University
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
Sujoy Bag
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
CloudTechnologies
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
Mayuri Patil
 
Ppt
PptPpt
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
Pluribus One
 
Improving epidemiological research: avoiding the statistical paradoxes and fa...
Improving epidemiological research: avoiding the statistical paradoxes and fa...Improving epidemiological research: avoiding the statistical paradoxes and fa...
Improving epidemiological research: avoiding the statistical paradoxes and fa...
Maarten van Smeden
 
Overview of Health Informatics
Overview of Health InformaticsOverview of Health Informatics
Overview of Health Informatics
Nawanan Theera-Ampornpunt
 
Explainable AI is not yet Understandable AI
Explainable AI is not yet Understandable AIExplainable AI is not yet Understandable AI
Explainable AI is not yet Understandable AI
epsilon_tud
 
Machine Learning in Healthcare Diagnostics
Machine Learning in Healthcare DiagnosticsMachine Learning in Healthcare Diagnostics
Machine Learning in Healthcare Diagnostics
Larry Smarr
 
Social Media Mining - Chapter 7 (Information Diffusion)
Social Media Mining - Chapter 7 (Information Diffusion)Social Media Mining - Chapter 7 (Information Diffusion)
Social Media Mining - Chapter 7 (Information Diffusion)
SocialMediaMining
 

What's hot (20)

Social network analysis part ii
Social network analysis part iiSocial network analysis part ii
Social network analysis part ii
 
Graph Neural Network - Introduction
Graph Neural Network - IntroductionGraph Neural Network - Introduction
Graph Neural Network - Introduction
 
Statistical models in simulation
Statistical models in simulationStatistical models in simulation
Statistical models in simulation
 
06 Community Detection
06 Community Detection06 Community Detection
06 Community Detection
 
Term weighting
Term weightingTerm weighting
Term weighting
 
Graph Representation Learning
Graph Representation LearningGraph Representation Learning
Graph Representation Learning
 
Hardware Trojan detection using Clock sweeping method
Hardware Trojan detection using Clock sweeping methodHardware Trojan detection using Clock sweeping method
Hardware Trojan detection using Clock sweeping method
 
Clinical prediction models
Clinical prediction modelsClinical prediction models
Clinical prediction models
 
Bayesian Network 을 활용한 예측 분석
Bayesian Network 을 활용한 예측 분석Bayesian Network 을 활용한 예측 분석
Bayesian Network 을 활용한 예측 분석
 
Representation learning on graphs
Representation learning on graphsRepresentation learning on graphs
Representation learning on graphs
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 
Ppt
PptPpt
Ppt
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Improving epidemiological research: avoiding the statistical paradoxes and fa...
Improving epidemiological research: avoiding the statistical paradoxes and fa...Improving epidemiological research: avoiding the statistical paradoxes and fa...
Improving epidemiological research: avoiding the statistical paradoxes and fa...
 
Overview of Health Informatics
Overview of Health InformaticsOverview of Health Informatics
Overview of Health Informatics
 
Explainable AI is not yet Understandable AI
Explainable AI is not yet Understandable AIExplainable AI is not yet Understandable AI
Explainable AI is not yet Understandable AI
 
Machine Learning in Healthcare Diagnostics
Machine Learning in Healthcare DiagnosticsMachine Learning in Healthcare Diagnostics
Machine Learning in Healthcare Diagnostics
 
Social Media Mining - Chapter 7 (Information Diffusion)
Social Media Mining - Chapter 7 (Information Diffusion)Social Media Mining - Chapter 7 (Information Diffusion)
Social Media Mining - Chapter 7 (Information Diffusion)
 

Similar to Spreading Phenomena in Social Networks

A unified prediction of computer virus spread in connected networks
A unified prediction of computer virus spread in connected networksA unified prediction of computer virus spread in connected networks
A unified prediction of computer virus spread in connected networksUltraUploader
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approach
Elena Sügis
 
Machine Learning of Epidemic Processes in Networks
Machine Learning of Epidemic Processes in NetworksMachine Learning of Epidemic Processes in Networks
Machine Learning of Epidemic Processes in Networks
Francisco Rodrigues, Ph.D.
 
Adaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt CerigoAdaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt CerigoDaniel Burkhardt Cerigo
 
Important spreaders in networks: exact results on small graphs
Important spreaders in networks: exact results on small graphsImportant spreaders in networks: exact results on small graphs
Important spreaders in networks: exact results on small graphs
Petter Holme
 
Simplicial closure & higher-order link prediction
Simplicial closure & higher-order link predictionSimplicial closure & higher-order link prediction
Simplicial closure & higher-order link prediction
Austin Benson
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
Tin180 VietNam
 
Properties and Impact of Vicinity in Mobile Opportunistic Networks
Properties and Impact of Vicinity in Mobile Opportunistic NetworksProperties and Impact of Vicinity in Mobile Opportunistic Networks
Properties and Impact of Vicinity in Mobile Opportunistic Networks
tiphainepn
 
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
cscpconf
 
Iaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer inIaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer in
Iaetsd Iaetsd
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagationUltraUploader
 
A Survey on Clustering Concepts in Data Mining
A Survey on Clustering Concepts in Data MiningA Survey on Clustering Concepts in Data Mining
A Survey on Clustering Concepts in Data Mining
Shanmuga Priyan Thiagarajan
 
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
csandit
 
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Subhajit Sahu
 
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Subhajit Sahu
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
ijasuc
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
jake henry
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
ijasuc
 
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACHAN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
ijasuc
 
Statistical Physics of Complex Dynamics
Statistical Physics of Complex DynamicsStatistical Physics of Complex Dynamics
Statistical Physics of Complex Dynamics
Hang-Hyun Jo
 

Similar to Spreading Phenomena in Social Networks (20)

A unified prediction of computer virus spread in connected networks
A unified prediction of computer virus spread in connected networksA unified prediction of computer virus spread in connected networks
A unified prediction of computer virus spread in connected networks
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approach
 
Machine Learning of Epidemic Processes in Networks
Machine Learning of Epidemic Processes in NetworksMachine Learning of Epidemic Processes in Networks
Machine Learning of Epidemic Processes in Networks
 
Adaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt CerigoAdaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt Cerigo
 
Important spreaders in networks: exact results on small graphs
Important spreaders in networks: exact results on small graphsImportant spreaders in networks: exact results on small graphs
Important spreaders in networks: exact results on small graphs
 
Simplicial closure & higher-order link prediction
Simplicial closure & higher-order link predictionSimplicial closure & higher-order link prediction
Simplicial closure & higher-order link prediction
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
Properties and Impact of Vicinity in Mobile Opportunistic Networks
Properties and Impact of Vicinity in Mobile Opportunistic NetworksProperties and Impact of Vicinity in Mobile Opportunistic Networks
Properties and Impact of Vicinity in Mobile Opportunistic Networks
 
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
 
Iaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer inIaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer in
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagation
 
A Survey on Clustering Concepts in Data Mining
A Survey on Clustering Concepts in Data MiningA Survey on Clustering Concepts in Data Mining
A Survey on Clustering Concepts in Data Mining
 
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
 
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
 
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACHAN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
 
Statistical Physics of Complex Dynamics
Statistical Physics of Complex DynamicsStatistical Physics of Complex Dynamics
Statistical Physics of Complex Dynamics
 

More from Manojit Chakraborty

Community detection
Community detectionCommunity detection
Community detection
Manojit Chakraborty
 
Python Programming Tutorial 1
Python Programming Tutorial 1Python Programming Tutorial 1
Python Programming Tutorial 1
Manojit Chakraborty
 
NCRAST Talk on Clustering
NCRAST Talk on ClusteringNCRAST Talk on Clustering
NCRAST Talk on Clustering
Manojit Chakraborty
 
Research Poster
Research PosterResearch Poster
Research Poster
Manojit Chakraborty
 
GRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONSGRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONS
Manojit Chakraborty
 

More from Manojit Chakraborty (6)

Community detection
Community detectionCommunity detection
Community detection
 
Python Programming Tutorial 1
Python Programming Tutorial 1Python Programming Tutorial 1
Python Programming Tutorial 1
 
NCRAST Talk on Clustering
NCRAST Talk on ClusteringNCRAST Talk on Clustering
NCRAST Talk on Clustering
 
Research Poster
Research PosterResearch Poster
Research Poster
 
manojitcv
manojitcvmanojitcv
manojitcv
 
GRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONSGRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONS
 

Recently uploaded

My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
AnirbanRoy608946
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 

Recently uploaded (20)

My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 

Spreading Phenomena in Social Networks

  • 1. Spreading Phenomena in Complex Networks Shubhabrata Ghosh Manojit Chakraborty Souvik Das Pallavi Mazumder Heritage Institute of Technology, Kolkata Dept. of Computer Science and Engineering April 3, 2017 c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 1 / 62
  • 2. Contents Introduction Epidemic Modelling Network Epidemics Contact Networks Beyond the degree distribution Immunization Epidemic Prediction Figure: Pathogen c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 2 / 62
  • 3. A Story to Start On the night of February 21, 2003, a physician from southern China checked into the Metropole Hotel in Hong Kong.He previously treated patients suering from a disease that was called atypical pneumonia. Next day, after leaving the hotel, he went to the local hospital, this time as a patient. He died there several days later of atypical pneumonia That night sixteen other guests of the Metropole Hotel also contracted the disease that was named Severe Acute Respiratory Syndrome, or SARS. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 3 / 62
  • 4. A Story to Start These guests carried the SARS virus with them to Hanoi, Singapore, and Toronto, sparking outbreaks in each of those cities. Super Spreader The physician became an example of a Super Spreader, an individual who is responsible for a disproportionate number of infections during an epidemic. Hubs A network theorist will recognize Super Spreaders as Hubs, nodes with an exceptional number of links in the contact network on which a disease spreads . Figure: Super Spreaders c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 4 / 62
  • 5. Introduction Complex Networks are everywhere.They crop up wherever there are interactions between actors. Phenomena Agent Network Venereal disease Pathogens Sexual network Research Paper Scientists Citation network Rumor spreading Information, memes Communication network Computer viruses Digital viruses Internet network Bedbugs Parasitic insects Hotel-traveler network Malaria Plasmodium Mosquito-human Network Table: Dierent agents and corresponding networks c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 5 / 62
  • 6. Network Representation Networks portray the interactions between dierent actors. Actors or individuals are nodes/vertices in the graph If there's interaction between two nodes, there's an edge/link between them The links can have weights or intensities signifying the strength of connections The links can be directed, like in the web graph. There's a directed link between two nodes (pages) A and B if there's a hyperlink to B from A Figure: Networks c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 6 / 62
  • 7. Population Representation As time progresses, human population has been demonstrated using dierent representations by various scientists. Each representation gave a better analogy than its previous one. Homogeneous Mixing Random Network by Erdos-Renyi (1959) [1] Scale Free Network by Albert-Barabasi (1999) [2] Figure: Random Network Figure: Scale Free Network c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 7 / 62
  • 8. Degree Distribution-Random Network Figure: Random Network plot c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 8 / 62
  • 9. Degree Distribution:Scale Free Network Figure: Scale Free Network plot c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 9 / 62
  • 10. SUSCEPTIBLE-INFECTED (SI) MODEL At rst we will simply demonstrate dierent epidemic models on Homogeneous Mixing representation of a population. S: Susceptible individuals. I: Infected individuals, when infected they can infect others continuously N: Total population. β: Likelihood of transmission of disease from Infected to Susceptible k: average number of contacts a typical individual has Susceptible contacts per unit of time βkS N Overall rate of infection dI(t) dt = I(t)βkS(t) N Figure: SI Model c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 10 / 62
  • 11. SI Model di dt = iβks, By solving this equation, i = i0e βkt 1 − i0 + i0e βkt At the beginning the fraction of infected individuals increases exponentially With time an infected individual encounters fewer and fewer susceptible individuals. Hence the growth of i slows for large t Figure: SI Model Graph c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 11 / 62
  • 12. Susceptible Infected Susceptible(SIS) Model It has the same two states as the SI Model, susceptible and infected. The dierence is now infected individuals recover at a xed rate µ, becoming susceptible again The equation describing the dynamics of this model :- di dt = βki(1 − i) − µi Figure: SIS Model c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 12 / 62
  • 13. SIS Model Figure: SIS Model Graph c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 13 / 62
  • 14. Susceptible Infected Recovered(SIR) Model In the SIR model recovered individuals enter a recovered state, meaning that they develop immunity rather than becoming susceptible again. The dierential equations for the susceptible s, infected i and the removed r state. ds dt = −βki(1 − r − i) di dt = −µi + βki(1 − r − i) dr dt = µi Figure: SIR Model c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 14 / 62
  • 15. SIR Model Figure: SIR Model c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 15 / 62
  • 16. Comparison between Models Figure: Comparing SI, SIS, SIR Models c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 16 / 62
  • 17. Network Epidemics Network Epidemics Individual can transmit a pathogen only to those they come into contact with, hence pathogens spread on a complex contact network. . These contact networks are often scale-free, hence k is not sucient to characterize their topology. The failure of the basic hypotheses prompted a fundamental revision of the epidemic modeling framework by Romualdo Pastor-Satorras and Alessandro Vespignani in 2001[3] Figure: The Great Plague c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 17 / 62
  • 18. SI Model on a Network Degree Block Approximation A mathematical formalism that is used to distinguish nodes based on their degree. This assumes that nodes with the same degree are statistically equivalent. Thus, the fraction of nodes with degree k that are infected among all Nk degree-k nodes in the network is denoted by: ik = Ik Nk Figure: Degree Block Approximation c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 18 / 62
  • 19. SI Model on a Network The total fraction of infected nodes is the sum of all infected degree-k nodes: i = k pkik Given the dierent node degrees, we write the SI model for each degree k separately: dik dt =β(1 − ik)kθk The infection rate is proportional to β and the fraction of degree-k nodes that are not yet infected, is (1 − ik). c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 19 / 62
  • 20. SI Model(Homogeneous) vs SI Model(Network) The average degree k in case of homogenous mixing is replaced with each node's actual degree k. The density function θk represents the fraction of infected neighbors of a susceptible node k. But in case of homogenous mixing assumption θk is simply the fraction of the infected nodes, i. While, in case of homogenous mixing, there's just a single equation which explains the time dependent behavior of the whole system. But in a network, dik dt =β(1 − ik)kθk represents a system of kmax coupled equations, one equation for each degree present in the network. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 20 / 62
  • 21. SI Model on a Network On solving the equation: dik dt = β(1 − ik)kθk, we get: ik = io(1 + k( k −1) k2 − k (e t τSI -1)) where (τSI ) is the characteristic time for the spread of the pathogen. τSI = k β( k2 − k ) Figure: SI Model c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 21 / 62
  • 22. SI Model on a Network The higher the degree of a node, the more likely that it becomes infected. For any time t we can write ik = g(t) + kf(t), indicating that the group of nodes with higher degree has a higher fraction of infected nodes (Figure alongside). Since i = k pkik, the total fraction of infected nodes grows with time as: i = kmax 0 ik pk dk = i0(1 + ( k 2 − k ) k2 − k (e t τSI − 1) Figure: Fraction of Infected Nodes in SI Model c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 22 / 62
  • 23. Network Epidemics Now we will derive τSI for dierent networks. But before that we need to know what are the two types of networks we are concerned with. Random Networks A random network consists of N nodes where each node pair is connected with probability p. For a large N, it's degree distribution follows Poisson's distribution. Scale Free Network This is a network whose degree distribution follows a power law. That is, the fraction P(k) of nodes in the network having k connections to other nodes goes for large values of k as: P(k) ∼ k−γ where 2γ3. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 23 / 62
  • 24. τSI FOR DIFFERENT NETWORKS Random Networks Here, k2 = k ( k +1), obtaining τ ER SI = 1 β k which is the same for homogenous networks. Scale-free network with γ ≥ 3 If the contract network is scale-free with degree exponent γ ≥ 3, both k and k2 are nite. Consequently τSI is also nite and the spreading dynamics is similar to a random network but with an altered τSI . Scale-free network with γ ≤ 3 For γ ≤ 3 in the N → ∞ limit k2 → ∞ hence τSI = k β( k2 − k ) predicts τSI → 0 In other words, the spread of a pathogen on a scale-free network is instantaneous. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 24 / 62
  • 25. SIS Model on a Network In case of Epidemic Modeling, the equation for SI model was: dik dt = β(1 − ik)kθk The continuum equation describing the dynamics of the SIS model on a network is a straightforward extension of the SI model dik dt = β(1 − ik)kθk − µik The dierence between the two equations is the presence of the recovery term -µik. This changes the characteristic time of the epidemic to: τSIS = k β( k2 −µ k ) c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 25 / 62
  • 26. Spreading Rate for Different Networks Spreading Rate Spreading rate(λ) of a pathogen is dened as the ratio of transmission probability β and the recovery rate µ. λ = β µ The higher is λ, the more likely that the disease will spread. Yet, the number of infected individuals does not increase gradually with λ. Rather, the pathogen can spread only if its spreading rate exceeds an epidemic threshold λc. Random Network For a random network the epidemic threshold, λc = 1 k +1 If λ λc, the pathogen will spread until it reaches an endemic state, where a nite fraction i(λ) of the population is infected at any time. If λ λc, the pathogen dies out, i.e. i(λ)=0. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 26 / 62
  • 27. Vanishing Epidemic Threshold Scale-Free Network For a scale-free network the epidemic threshold, λc = k k2 As for a scale-free network k2 diverges in the N→ ∞ limit, for large networks the epidemic threshold is expected to vanish. Figure: Epidemic Threshold c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 27 / 62
  • 28. Epidemic Models on Networks CONCLUSION : In a large scale-free network τ=0 In large scale-free network λc=0 Figure: Epidemic Models On Networks c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 28 / 62
  • 29. Contact Networks Network epidemics predicts that the speed with which a pathogen spreads depends on the degree distribution of the relevant contact network. We found that k2 aects both the characteristic time τ and the epidemic threshold λc. None of the precious ndings are consequential if the network on which a pathogen spreads is random- in that case the predictions of network epidemics are indistinguishable from the predictions of the traditional epidemic models encountered in the previous slides. Figure: Face-to-face Contact Network c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 29 / 62
  • 30. Sexually Transmitted diseases HIV, the pathogen responsible for AIDS, spreads mainly through sexual intercourse. The scale-free nature of the sexual network indicates that most individuals have relatively few sexual partners. A few individuals, however, had a high number of sexual partners during their lifetime. Consequently the sexual network has a high k2, which lowers both τ and λc. Figure: The Sex Web c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 30 / 62
  • 31. Airborne Diseases To predict the spread of pathogens, we must know how far infected individuals travel. In the context of epidemic phenomena, the most studied mobility data comes from air travel, the mode of transportation that determines the speed with which a pathogen moves around the globe. Consequently the air transportation network, that connects airports with direct ights, plays a key role in modeling and predicting the spread of pathogens Figure: Air Transportation Network c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 31 / 62
  • 32. Network Science Networks are powerful models of complex systems in various domains. Due to limitations of data collection techniques,static network representation of a given system was studied earlier. Many real-world systems are not static but change over time. Today it has become possible to record temporal changes in network structure (or topology). Figure: Activity of Police (blue) and Fascists (black) obtained from time slices.(by months) c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 32 / 62
  • 33. Temporal Network Many studies performed under the assumption of static network structures can now be extended to take into account the network's dynamics. Data on time-varying networks are becoming accessible across a variety of contexts. This avalanche of data is prompting a surge of activity in the eld of temporal networks Figure: Temporal Network showing social interactions c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 33 / 62
  • 34. Aggregated Network To accurately predict an epidemic process we must consider the fact that pathogens spread on temporal networks, a topic of increasing interest in network science By ignoring the temporality of these contact patterns, we typically overestimate the speed and the extent of an outbreak. Figure: Aggregated Network showing social interactions c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 34 / 62
  • 35. Social Interactions The timing of the interactions between two connected nodes is random. This means that the interevent times between consecutive contacts follow an exponential distribution, resulting in a random but uniform sequence of events Therefore the contact patterns have an uneven,'bursty' character in time Figure: Social Media websites are popular among all age groups c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 35 / 62
  • 36. Degree Correlation Many social networks are assortative, implying that high degree nodes tend to connect to other high degree nodes. Do they aect the spread of a pathogen? Assortative correlations decrease λc and dissasortative correlations increase it Despite the changes in λc, for the SIS model the epidemic threshold vanishes for a scale-free network with diverging second moment, whether the network is assortative, neutral or disassortative Figure: Graph showing appearance of certain minerals in certain foods c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 36 / 62
  • 37. Social Interactions The mobile phone network allows us to explore the role of tie strengths and communities on spreading phenomena. The spread of information on a weighted mobile call graph, where the probability that a node passes information to one of its neighbors is proportional to the strength of the tie between them. Figure: Temporal Network showing social interactions c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 37 / 62
  • 38. Spreading conversation Spreading in a small network neighborhood, following the real link weights.The information is released from the red node, the arrow weight indicating the tie strength. The simulation was repeated 1,000 times. The size of the arrowheads is proportional to the number of times the information was passed along the corresponding direction, and the color indicates the total number of transmissions along that link. Figure: Link weight and communities c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 38 / 62
  • 39. Spreading conversation Same in as previous case,but we assume that each link has the same weight w = wij In the control simulation the information tends to follow the shortest path. When the link weights are taken into account, information ows along a longer backbone with strong ties. Figure: Link weight and communities c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 39 / 62
  • 40. Contagion Simple contagion is the process we explored so far: It is sucient to come into contact with an infected individual to be infected. The spread of memes, products and behavior is often described by Complex contagion The dierence between simple and complex contagion is well captured by Twitter data. Figure: two types of contagion c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 40 / 62
  • 41. Immunization Immunization strategies specify how vaccines, treatments or drugs are distributed in the population. Yet, often cost considerations, the diculty of reaching all individuals at risk, and real or perceived side eects of the treatment prohibit full coverage. Figure: Patient being injected c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 41 / 62
  • 42. Immunization The main purpose of immunization is to protect the immunized individual from an infection. Secondary purpose is to reduce the speed with which the pathogen spreads in a population. Eective degree of each susceptible node changes from k to k (1 − g), which decreases the spreading rate of the pathogen from λ = β µ to λ = λ(1 − g) Figure: Vaccines are indispensable to stop spread of diseases c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 42 / 62
  • 43. Random Network If the pathogen spreads on a random network, for a high g the spreading rate λ could fall below the epidemic threshold.The immunization rate gc is calculated as gc = 1 − µ β k +1 if vaccination increases the fraction of immunized individuals above gc, it pushes the spreading rate under the epidemic threshold λc. In this case τ becomes negative and the pathogen dies out naturally. This explains why health ocial encourage a high fraction of the population take the inuenza vaccine. Similarly, a condom not only protects the individual who uses it from contacting the HIV, but also decrease the rate at which AIDS spreads in the sexual network. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 43 / 62
  • 44. Heterogeneous Network In heterogeneous networks a virus can be eradicated by increasing the epidemic threshold through hub immunization. The gure shows that, more hubs are immunized (i.e. the smaller is k'max), the larger is λc, increasing the chance that the disease dies out. Immunizing the hubs changes the network on which the disease spreads Figure: immunization in heterogeneous networks c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 44 / 62
  • 45. Heterogeneous Network For heterogeneous network the equation becomes gc = 1 − µ k β k2 let us consider a digital virus spreading on the email network. If we make the email network random and undirected, we have k2 =3.26. Using λ=1 in we obtain gc=0.76. Yet, the email network is scale free with k2 =1,271 (undirected version).In this case predicts gc=0.997 for λ=1. Figure: immunization in heterogeneous networks c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 45 / 62
  • 46. Epidemic Eradication Figure: Rahima Banu,the last smallpox infected patient in Bangladesh in 1976 c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 46 / 62
  • 47. A Light in Darkness During much of its history, humanity has been helpless when faced with a pandemic. Lacking drugs and vaccines, infectious diseases repeatedly swept through continents, decimating the world's population. Despite the spectacular medical advances, we have eective vaccines only against a small number of pathogens. Consequently transmission- reducing and quarantine-based measures remain the main tools of health professionals in combatting new pathogens. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 47 / 62
  • 48. Realtime Prediction The real-time prediction of an epidemic outbreak is a very recent development. The 2009 H1N1 outbreak was the rst beneciary of these developments, becoming the rst pandemic whose spread was predicted in real time. The emergence of any new pathogen raises several key questions.these questions are addressed using powerful epidemic simulators. Figure: Ebola virus c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 48 / 62
  • 49. REAL-TIME FORECAST Epidemic forecast aims to foresee the real time spread of a pathogen, predicting the number of infected individuals expected each week in each major city. GLEAM( Global Epidemic and Mobility computational model ) GLEAM maps each geographic location into the nodes of a network. Transport between these nodes, representing the links, are provided by global transportation data, like airline schedules. GLEAM estimates the epidemic parameters, like the transmission rate or reproduction number, using a network-based approach. It relies on chronological data that captures the worldwide spread of the pandemic, rather than medical reports. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 49 / 62
  • 50. Modeling the 2009 H1N1 Pandemic c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 50 / 62
  • 51. Modeling the 2009 H1N1 Pandemic c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 51 / 62
  • 52. Modelling the 2009 H1N1 Pandemic For H1N1, the predictions were compared with data collected from surveillance and virologic sources in 48 countries during the full course of the pandemic. Peak Time Peak time corresponds to the week when most individuals are infected in a particular country. Early Peak GLEAM predicted that the H1N1 epidemic will peak out in November, rather than in January or February, the typical peak time of inuenza- like viruses. The Impact of Vaccination c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 52 / 62
  • 53. What if Analysis By incorporating the time and nature of each containment and mitigation procedure, simulations can estimate the eciency of specic contingency plans. Travel Restrictions Given the important role air travel plays in the spread of a pathogen, faced with a dangerous pandemic, like an Ebola outbreak the rst instinct is to restrict travel. For example, there was a 40% decline in travel to and from Mexico in May 2009, during the H1N1 outbreak. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 53 / 62
  • 54. What If Analysis Antiviral Treatment During the 2009 H1N1 pandemic Canada, Germany, Hong Kong, Japan, the UK, and the USA distributed antiviral drugs to mitigate the impact of the disease. This prompted modelers to ask what would have been the impact if all countries that had drug stockpiles would have distributed it to their population. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 54 / 62
  • 55. Spread of a Pandemic Effective Distance Before there was a strong correlation between the time of the outbreak and the physical distance from the origin of the outbreak. Today, with airline travel, physical distance has lost its relevance for epidemic phenomena. Thus, we replace the conventional geographic distance with an eective distance derived from the mobility network [4]. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 55 / 62
  • 56. Spread of a Pandemic Mobility Network Each link is directed and weighted, characterized by a ux fraction 0 ≤ pij ≤ 1,fraction of travelers that leave node i and arrive at node j The spread of a pathogen is dominated by the most probable trajectories predicted by the mobility matrix pij. So, the eective distance dij between two connected locations i and j dij = (1 − lnpij) ≥ 0 Note that dij = dji Figure: Mobility Network c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 56 / 62
  • 57. Spread of a pandemic Figure: The spread of a pandemic with an initial outbreak in Hong Kong. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 57 / 62
  • 58. Mobility Network A surprising but welcome aspect of epidemic forecast is that the predictions of dierent models are rather similar, despite the fact that they use dierent mobility data. The eective distance helps us understand why the various model predictions converge. We can write the arrival time of a pathogen to location a as Ta = deff (P) Veff (β, R0, γ, ) We see that the relative arrival times are independent of the epidemiological parameters. For example, for an outbreak that starts at node i, the ratio of the arrival times to nodes j and l is Ta(j/i) Ta(l/i) = deff (j/i) deff (l/i) i.e. the ratio depends only on the eective distances. Therefore, the relative arrival times of the disease depend only on the topology of the mobility network. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 58 / 62
  • 59. Effective Distance and Arrival Time 1 Geographic Distance Arrival times vs. geographic distance from its source (Mexico) for the 2009 H1N1 pandemic. 2 Eective Distance Epidemic arrival time Ta vs. eective distance Deff for H1N1, demonstrating the strong correlations between the eective distance c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 59 / 62
  • 60. Summary The joint advances in data collection and network epidemics have oered the capability to predict the real-time spread of a pathogen. The developed models can help design response and mitigation scenarios. Interestingly, the recent success of epidemic forecast is not due to the improved understanding of the underlying biology of infectious pathogens. When it comes to the spreading of a pathogen, the epidemic parameters are of secondary importance. The most important factor is the structure of the mobility network. c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 60 / 62
  • 61. References [1] P. Erd®s and A. Rényi. On random graphs, I. Publicationes Mathematicae (Debrecen), 6:290-297 (1959). [2] A.L. Barabási and R.Albert. Emergence of scaling in random networks. Science, 286:509-512 (1999). [3] R. Pastor-Satorras and A. Vespignani. Epidemic spreading in scalefree networks. Physical Review Letters, 86:3200-3203 (2001). [4] D. Brockmann and D. Helbing. The Hidden Geometry of Complex, Network-Driven Contagion Phenomena. Science, 342:1337-1342 (2014). Picture Courtesy : A.L. Barabási. Spreading phenomena. Network Science, 1:379-436 (2016) c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 61 / 62
  • 62. Thank you c Manojit Chakraborty (HIT-K) Spreading Phenomena April 3, 2017 62 / 62