Who Do You Know? A Simulation Study of Infectious Disease Control Through Contact Tracing Benjamin Armbruster and Margaret L. Brandeau Stanford University.

Slides:



Advertisements
Similar presentations
Probability in Propagation
Advertisements

Contact Evaluation Your name Institution/organization Meeting Date International Standards 18, 19.
The Connection Between STDs and HIV
Great Theoretical Ideas in Computer Science
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Great Theoretical Ideas in Computer Science for Some.
Tuberculosis in Children: Prevention Module 10C - March 2010.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
National Institute for Public Health and the Environment Comparison of network models for STI transmission and intervention: how useful are they for public.
Direction Election in Flocking Swarms Ohad Ben-Shahar, Shlomi Dolev Andrey Dolgin, Michael Segal Ben-Gurion University of the Negev.
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks E. Gelal, K. Pelechrinis, T.S. Kim, I. Broustis Srikanth V. Krishnamurthy,
Importance Sampling. What is Importance Sampling ? A simulation technique Used when we are interested in rare events Examples: Bit Error Rate on a channel,
Math 308 Discrete Mathematics Discrete Mathematics deals with “Separated” or discrete sets of objects (rather than continuous sets) Processes with a sequence.
Insights from economic- epidemiology Ramanan Laxminarayan Resources for the Future, Washington DC.
Efficiently Sharing Common Data HTCondor Week 2015 Zach Miller Center for High Throughput Computing Department of Computer Sciences.
June 27, 2005 Predicting Human Papilloma Virus Prevalence and Vaccine Policy Effectiveness Courtney Corley Department of Computer Science University of.
HIV Prevention Understanding the HIV virus is very important. Each of us needs information, not only for ourselves, but to be able to discuss it with others.
2-Day Introduction to Agent-Based Modelling Day 2: Session 5 Variables and Debugging.
Yi Wang, Bhaskar Krishnamachari, Qing Zhao, and Murali Annavaram 1 The Tradeoff between Energy Efficiency and User State Estimation Accuracy in Mobile.
Cost-Effectiveness Problem l You have a $1.5 billion budget to spend on any combination of these programs:
The United States air transportation network analysis Dorothy Cheung.
Operational Research in the 21 st Century. International Union Against Tuberculosis and Lung Disease (The Union) World’s oldest humanitarian organization.
Tuberculosis in Ealing - Housing. What is TB Tuberculosis, or TB, is a disease caused by a germ (Mycobacterium tuberculosis). TB usually affects the lungs,
Control of Tuberculosis in Australia Guy B. Marks Woolcock Institute of Medical Research Department of Respiratory Medicine, Liverpool Hospital.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Brandy L. Rapatski Juan Tolosa Richard Stockton College of NJ A Model for the Study of HIV/AIDS.
V5 Epidemics on networks
ACT: Attachment Chain Tracing Scheme for Virus Detection and Control Jintao Xiong Proceedings of the 2004 ACM workshop on Rapid malcode Presented.
Mung Bean Activity Finding a ‘true’ average Somewhere in the pound of Mung beans is the ‘true average’ of the Mung Beans How many beans do you have to.
Network theory 101 Temporal effects What we are interested in What kind of relevant temporal /topological structures are there? Why? How does.
Dynamic Random Graph Modelling and Applications in the UK 2001 Foot-and-Mouth Epidemic Christopher G. Small Joint work with Yasaman Hosseinkashi, Shoja.
Transmission of pandemic (H1N1) 2009 influenza on international flights – Australia 2009 Acknowledgements Ruth Foxwell, Leslee Roberts, Kamalini Lokuge,
Coevolution of Epidemics, Social Networks, and Individual Behavior: A Case Study Joint work with Achla Marathe, and Madhav Marathe Jiangzhuo Chen Network.
Utility Maximization. Utility and Consumption ▫Concept of utility offers a way to study choices that are made in a more or less rational way. ▫Utility.
I NFORMATION C ASCADE Priyanka Garg. OUTLINE Information Propagation Virus Propagation Model How to model infection? Inferring Latent Social Networks.
 Probability in Propagation. Transmission Rates  Models discussed so far assume a 100% transmission rate to susceptible individuals (e.g. Firefighter.
Collaborative TB/HIV Activities. Collaborative TB/HIV activities A.To establish the mechanisms for collaboration B.To decrease the burden of TB in PLWHA.
Routing and Scheduling in Multistage Networks using Genetic Algorithms Advisor: Dr. Yi Pan Chunyan Ji 3/26/01.
Centre for Economics & Policy in Health Canolfan Economeg a Pholisi Iechyd (CEPhI) A Parenting Programme for Children at Risk of Developing Conduct Disorder:
CS 590 Term Project Epidemic model on Facebook
A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets MobiHoc 2001.
Siddhartha Gunda Sorabh Hamirwasia.  Generating small world network model.  Optimal network property for decentralized search.  Variation in epidemic.
RUN Modelling the Dynamics of HIV/AIDS Epidemics in a Heterosexual Transmission; focus on Nigerian Situation By AKPA, ONOJA MATTHEW And OYEJOLA, BENJAMINE.
2/22/2016© Hal Perkins & UW CSEP-1 CSE P 501 – Compilers Register Allocation Hal Perkins Winter 2008.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
1 Lecture 16 Epidemics University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CS 791 Special Topics: Network Architectures and.
Project 1 : Phase 1 22C:021 CS II Data Structures.
An Improved Acquaintance Immunization Strategy for Complex Network.
© J. Christopher Beck Lecture 16: Local Search.
Presented by Yu-Shun Wang Advisor: Frank, Yeong-Sung Lin Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for networks of Honeypots.
1 Preparedness for an Emerging Infection Niels G Becker National Centre for Epidemiology and Population Health Australian National University This presentation.
Designing Multi-hop Wireless Backhaul Networks with Delay Guarantees Girija Narlikar, Gordon Wilfong, and Lisa Zhang Bell Lab. Infocom 2006.
HIV/AIDS The times they are a changing Roxana Rogers David Stanton Office of HIV/AIDS.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Looking at Bayes’ Theorem with a Tree Diagram An alternate way of “reversing the conditioning” on conditional probabilities.
Improving Multi-Core Performance Using Mixed-Cell Cache Architecture
Looking at Bayes’ Theorem with a Tree Diagram
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
Classifying Solutions to Systems of Equations
Chapter 25: Paired t-Test
Brian Lafferty Virus on a Network.
En Wang 1,2 , Yongjian Yang 1 , and Jie Wu 2
Small World Networks Scotty Smith February 7, 2007.
Department of Computer Science University of York
Throughput-Optimal Broadcast in Dynamic Wireless Networks
Measuring contact patterns with wearable sensors: methods, data characteristics and applications to data-driven simulations of infectious diseases  A.
Hongchao Zhou, Fei Liu, Xiaohong Guan
Presentation transcript:

Who Do You Know? A Simulation Study of Infectious Disease Control Through Contact Tracing Benjamin Armbruster and Margaret L. Brandeau Stanford University

Contact Tracing Health care provider’s perspective: 1.Infected person found (index case) 2.Treated 3.Asked for list of contacts 4.Contacts found and tested 5.If contact infected go to step 1. Standard practice for Tuberculosis (TB) Common for HIV and other STDs –called partner notification

1 54 susceptible infected ? being tested node 2 infected Contact Tracing

5 1 4 susceptible infected ? being tested node 2 infects nodes 1,4,5 Contact Tracing

5 1 4 susceptible infected ? being tested node 4 gets tested (maybe has symptoms) ? Contact Tracing

5 1 4 susceptible infected ? being tested node 4 tests positive, gets treated becomes a contact tracing index case names nodes 1,2,3,6,7 as contacts nodes 1,2,3,6,7 scheduled to be tested ? ? ? ? ? Contact Tracing

5 1 4 susceptible infected ? being tested node 3 tests negative ? ? ? ? Contact Tracing

5 1 4 susceptible infected ? being tested node 6 tests negative ? ? ? Contact Tracing

5 1 4 susceptible infected ? being tested ? ?? node 1 tests positive, gets treated becomes a contact tracing index case names nodes 2,4 as contacts node 4 already tested testing node 2 gets higher priority as named by both nodes 1,4 Contact Tracing

susceptible infected ? being tested ? ? node 2 tests positive, gets treated becomes a contact tracing index case names nodes 1,4,5 as contacts nodes 1,4 already tested node 5 scheduled to be tested Contact Tracing

susceptible infected ? being tested ? node 5 tests positive, gets treated becomes a contact tracing index case names node 2 as a contact node 2 already tested Contact Tracing

susceptible infected ? being tested node 7 tests negative Contact Tracing

Outline Details of the simulation What is the optimal contact tracing policy? Does spending more money help? Conclusions Limitations and future work

Simulation Dynamics t 1 90 days t 2 30 days t 3 90 days t 4,t 5 5 days η 1/9000 new cases/day/person d i = number of infected neighbors of node i

Network A small-word graph with n nodes: 1.Create nodes 0,...,n-1 2.Connect node i to i±1,2 (mod n) 3.Add link (i,j) with probability 1/n n =500 people

Simulation Details Each prevalence data point is the Average over many ( ) runs Error bars show 95% confidence interval Steady-state prevalence in a run: 1.Infect a random node 2.Simulate for 5 years 3.Average the prevalence at the end of day 181, day 182,...

Contact Tracing Policy Budget B Currently tracing 1.Tutankhamen 2.Frederic Chopin 3.Eleanor Roosevelt … B empty slot ? ? ? ? ?

5 9 8 Contact Tracing Policy Budget B New index case: choose k contacts to trace

5 9 8 Contact Tracing Policy Budget B New index case: choose k contacts to trace Once we have time 1.Niels Abel 2.node 2 3.node 3 4.node 7 5.…

Contact Tracing Policy Budget B New index case: choose k contacts to trace If we have resources, then trace from top of list Currently tracing 1.Tutankhamen 2.Frederic Chopin 3.Eleanor Roosevelt … B empty slot Once we have time 1.Niels Abel 2.node 2 3.node 3 4.node 7 5.…

Contact Tracing Policy Budget B New index case: choose k contacts to trace If we have resources, then trace from top of list Currently tracing 1.Tutankhamen 2.Frederic Chopin 3.Eleanor Roosevelt … B Niels Abel Once we have time 1.node 2 2.node 3 3.node 7 4.…

k=5 B=8 Which Policy is Best?

How Many Contacts to Trace per Index Case?

Increasing the Budget

What is the Best Level of Contact Tracing? α=$10,000 n = 500

Choosing α Resource allocation problem –total budget B total –budget b i for program i s.t. b 1 + · · · +b m ≤ B total –benefit f i (b i ) maxf 1 (b 1 )+ · · · +f m (b m ) s.t.b 1 + · · · +b m ≤ B total

Cost Effectiveness Resource allocation problem –total budget B total –budget b i for program i s.t. b 1 + · · · +b m ≤ B total –benefit f i (b i ) –cost effectiveness 1 / f i ′(b i ) minmax i 1 / f i ′(b i ) s.t.b 1 + · · · +b m ≤ B total α=α=

Budget Allocation 1.Choose α large 2.For each program –find b i s.t. α = 1 / f i ′(b i ) –if doesn't exist, then set b i =0 3.Calculate money spent b 1 + · · · +b m 4.If >B total, then –decrease α a bit –go to step 2 5.Else at optimal allocation

Conclusions First detailed model of contact tracing Found a better prioritization of contacts Diminishing returns to scale Cost-effectiveness should play a role when choosing a budget

Limitations / Future Work Dynamics are missing –a latent or asymptomatic stage –the male-female distinction –variety of exogenous infections Network stylized: –pairs, pair-formation needed for HIV / STDs Policy gives no priority to vulnerable contacts Genotype information Dynamic control