1 Lecture 16 Epidemics University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CS 791 Special Topics: Network Architectures and.

Slides:



Advertisements
Similar presentations
Probability in Propagation
Advertisements

Propagation in Networks
Work and play: Disease spread, social behaviour and data collection in schools Dr Jenny Gage, Dr Andrew Conlan, Dr Ken Eames.
Spread of Influence through a Social Network Adapted from :
DAVA: Distributing Vaccines over Networks under Prior Information
It’s a Small World by Jamie Luo. Introduction Small World Networks and their place in Network Theory An application of a 1D small world network to model.
School of Information University of Michigan Network resilience Lecture 20.
Efficient Control of Epidemics over Random Networks Marc Lelarge (INRIA-ENS) SIGMETRICS 09.
Introductory Lecture. What is Discrete Mathematics? Discrete mathematics is the part of mathematics devoted to the study of discrete (as opposed to continuous)
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
University of Buffalo The State University of New York Spatiotemporal Data Mining on Networks Taehyong Kim Computer Science and Engineering State University.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
On Computing Compression Trees for Data Collection in Wireless Sensor Networks Jian Li, Amol Deshpande and Samir Khuller Department of Computer Science,
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
CS2420: Lecture 19 Vladimir Kulyukin Computer Science Department Utah State University.
Modeling the spread of active worms Zesheng Chen, Lixin Gao, and Kevin Kwiat bearhsu - INFOCOM 2003.
Scheduling Algorithms for Wireless Ad-Hoc Sensor Networks Department of Electrical Engineering California Institute of Technology. [Cedric Florens, Robert.
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
CS 206 Introduction to Computer Science II 12 / 01 / 2008 Instructor: Michael Eckmann.
Modelling the control of epidemics by behavioural changes in response to awareness of disease Savi Maharaj (joint work with Adam Kleczkowski) University.
1 The epidemic in a closed population Department of Mathematical Sciences The University of Liverpool U.K. Roger G. Bowers.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
 Fundamental terms  Diseases vs. Diseases transmitted by a network  Branching Process  The SIR epidemic model  The SIS epidemic Model  5 Worst Computer.
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
Epidemiology Modeling the Spread of Disease Designing and Running Experiments Modeling and Simulation Module 1: Lesson 5.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
Online Social Networks and Media Epidemics and Influence.
Communication (II) Chapter 4
Lecture 23. Greedy Algorithms
Emerging Infectious Disease: A Computational Multi-agent Model.
V5 Epidemics on networks
Epidemic dynamics on networks Kieran Sharkey University of Liverpool NeST workshop, June 2014.
A Data Intensive High Performance Simulation & Visualization Framework for Disease Surveillance Arif Ghafoor, David Ebert, Madiha Sahar Ross Maciejewski,
Lecture 17 Trees CSCI – 1900 Mathematics for Computer Science Fall 2014 Bill Pine.
EpiFast: A Fast Algorithm for Large Scale Realistic Epidemic Simulations on Distributed Memory Systems Keith R. Bisset, Jiangzhuo Chen, Xizhou Feng, V.S.
 Propagation in Networks. Network Structure and Propagation  Diseases, fads, rumors, viral social media content all spread the same way in networks.
KNOWLEDGE DIFFUSION IN NANOTECHNOLOGY Jaebong Son 1.
1 Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense Cliff C. Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Epidemiology. Activity: 1.You will need to wear gloves for all class activities today. 2.Pick a random identification card up from the front desk (record.
E PIDEMIC SPREADING Speaker: Ao Weng Chon Advisor: Kwang-Cheng Chen 1.
Epidemic (Compartment) Models. Epidemic without Removal SI Process Only Transition: Infection Transmission SIS Process Two Transitions: Infection and.
Epidemics Pedro Ribeiro de Andrade Gilberto Câmara.
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
Simulation of Infectious Diseases Using Agent-Based Versus System Dynamics Models Omar Alam.
The Structure of the Web. Getting to knowing the Web How big is the web and how do you measure it? How many people use the web? How many use search engines?
I NFORMATION C ASCADE Priyanka Garg. OUTLINE Information Propagation Virus Propagation Model How to model infection? Inferring Latent Social Networks.
 Probability in Propagation. Transmission Rates  Models discussed so far assume a 100% transmission rate to susceptible individuals (e.g. Firefighter.
Class 21: Spreading Phenomena PartI
Siddhartha Gunda Sorabh Hamirwasia.  Generating small world network model.  Optimal network property for decentralized search.  Variation in epidemic.
Lecture 19 Minimal Spanning Trees CSCI – 1900 Mathematics for Computer Science Fall 2014 Bill Pine.
Models and Algorithms for Complex Networks
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Epidemics on Networks. Social networks Age 4–5Age 10–11.
Topics In Social Computing (67810) Module 2 (Dynamics) Cascades, Memes, and Epidemics (Networks Crowds & Markets Ch. 21)
Epidemics Pedro Ribeiro de Andrade Münster, 2013.
Contagion in Networks Networked Life NETS 112 Fall 2015 Prof. Michael Kearns.
Discrete Mathematics and Its Applications
Networked Life NETS 112 Fall 2018 Prof. Michael Kearns
Networked Life NETS 112 Fall 2017 Prof. Michael Kearns
Networked Life NETS 112 Fall 2014 Prof. Michael Kearns
Networked Life NETS 112 Fall 2016 Prof. Michael Kearns
Advanced Analysis of Algorithms
Diffusion in Networks Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale 1/17/2019.
Science in School  Issue 40: Summer 2017 
Epidemics Pedro Ribeiro de Andrade Gilberto Câmara
Susceptible, Infected, Recovered: the SIR Model of an Epidemic
Graphs: Shortest path and mst
Navigation and Propagation in Networks
Markus Schwehm and Martin Eichner free  traced, quarantine
Networked Life NETS 112 Fall 2019 Prof. Michael Kearns
Presentation transcript:

1 Lecture 16 Epidemics University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CS 791 Special Topics: Network Architectures and Economics

Outline  Epidemics  Branching process  SIR model  SIS model  SIRS model  Synchronization 2

Epidemiology  The study of populations and the transfer of disease between subsets of those populations.  Models the rate at which a healthy population becomes infected and recovers 3 What if we have a network of contact between individuals?

Worm/Virus Spreading in the Internet  How to control the spread of the threat by reinforcing local rules?  E.g.: What is the maximum probability of contagion between two neighbors so that the overall network is protected against a complete invasion by the threat?  How to model?  Resembles a lot to the epidemiology 4

Model Basics and Goals 5  A contagious threat/idea  Key goals:  Will the epidemic invade the whole network?  How long will the epidemic take to invade?  Contagion  One person “infects” another  p – probability that an infectious person transmits the threat to a neighbor he/she meets  k – # of new people an infected node meets during a time slot  Reproductive Number: R 0 – expected # of new nodes getting infected at a time slot

Branching Process 6  k = 3  A 3-ary tree

Branching Process  high p 7

Branching Process  low p 8

Branching Process  If R 0 < 1, the epidemic ends in a finite amount of time  How long time?  If R 0 > 1, the epidemic runs forever with a positive probability  How large is the probability?  Birth-Death Processes from queuing theory 9

SIR Model  Susceptible, Infected, Removed Model  The process  Some in I and some in S state initially  Each infectious node stay in the I state for t I slots  During each step an I node has p probability of infecting a susceptible neighbor  After t I slots, an I node “recovers” and goes to R state 10

SIR Model Susceptible: 11

SIR Model Infected 12

SIR Model  Removed 13

SIR Model  Recovered 14

SIR Model  Recovered 15

SIR Model and Network Shape  Network shape can change dynamics significantly..  p = 2/3, k = 2  R 0 = 4/3 > 1  A highly infectious threat  But, (1/3) 4 = 1/81 probability that the epidemic will stop at each step!  With probability 1, the epidemic will stop in a finite number of steps! 16

SIR Model and Percolation  Another way to look at the SIR model  Run the probability of contagion for each link  Then see if there is a path from the root(s) of the threat to a node  Helps to figure out if a particular node is more/less likely to be infected  Percolation Theory: Also used for understanding the end-to-end connectivity patterns 17

SIS Model  Only two states: Susceptible and Infected  The Removed state is eliminated  The process  Some in I and some in S state initially  Each infectious node stays in the I state for t I slots  During each step an I node has p probability of infecting a susceptible neighbor  After t I slots, an I node goes back to S state 18

SIS Model  More general and maybe more realistic  Can model larger set of scenarios  A threat disappearing and appearing over cycles  An inbounded supply of nodes 19

SIS and SIR Models 20

SIRS Model  Three states: Susceptible, Infected, Removed  The process  Some in I and some in S state initially  Each infectious node stays in the I state for t I slots  During each step an I node has p probability of infecting a susceptible neighbor  After t I slots, an I node goes back to R state and stays there for t R slots, and then returns to the S state 21

Synchronization  Small-world can change things..  c – probability that a node has long-range links  Again, network characteristics in action.. 22

Optimal Marketing – Revisited  Which k people should we “infect” so that the spread of the “disease” is as large as possible?  We can greedily pick these k people: first, pick the single best individual x1, then the best individual paired with x1, … 23

Optimal Marketing – Revisited  The problem is in general NP-Hard, even for 0/1 transmission probabilities.  The greedy algorithm picks an initial set of k people so that the spread is at least 63% as big as the largest possible spread over all k node starting sets. 24

Lecture 16: Summary  Reproductive number w.r.t. 1  Network shape has serious effects  Synchronization effects due to small- world 25

Lecture 16: Reading  Easley & Kleinberg, Chapter 21  Chen, Gao, and Kwiat, Modeling the Spread of Active Worms, IEEE INFOCOM,