Integral equations for the heterogeneous, Markovian SIS process with time-dependent rates in time-variant networks

Size: px
Start display at page:

Download "Integral equations for the heterogeneous, Markovian SIS process with time-dependent rates in time-variant networks"

Transcription

1 Integral equations for the heterogeneous, Markovian SIS process with time-dependent rates in time-variant networks P. Van Mieghem Delft University of Technology 2 April 208 Abstract We reformulate the governing equation for the nodal infection probability of the eact heterogeneous SIS process with time-dependent infection and curing rates on any network into two equivalent integral equations, that provide a di erent view on and a more natural description of the SIS dynamic process in temporal or time-variant networks. From the integral equations, we deduce general bounds. Introduction A huge number of papers has studied the SIS epidemic process on networks [], mainly because of three reasons. First, the SIS epidemic models a simpli ed version of a di usion process, which describes a kind of transport between nodes of its underlying graph [2]. Transport of items between nodes is major function of a network and is often approimated to rst order by an epidemic type of stochastic di usion, such as real viruses and diseases in a population, malware in digital communication networks and the spread of information (ideas, opinions, news, alarms, etc.) in social networks. Second and as earlier mentioned in [3], the SIS epidemic process is one of the simplest members of a particularly popular class of dynamic processes on networks called the Local rule-global emergent properties (LrGep) class, where the collective action of the local rules eecuted at each node gives rise to a comple, emergent global behavior. Some eamples of the LrGep-class are epidemic models (such as SIS and SIR) and more general reaction-di usion processes [], the Ising spin model [4], the Kuramoto coupled-oscillator model [5], sandpiles as models for self-organized criticality [6, 7, 8] and opinion models [9, 0]. Many LrGep models depend heavily on the underlying network topology and feature, in general, a phase transition []. The phase transition of the SIS and SIR epidemic models are similar to that of the Kuramoto-type of synchronization models, an observation that has received attention in human brain networks (see e.g. [2]). Third, we believe that the Markovian SIS epidemic model has the highest potential to analytically study that phase transition in networks. Pursuing the latter is still a worthwhile endeavor, because, so far, there does not eist (apart from asymptotic Faculty of Electrical Engineering, Mathematics and Computer Science, P.O Bo 503, 2600 GA Delft, The Netherlands; P.F.A.VanMieghem@tudelft.nl

2 studies [3]) an eact analysis, not even for the complete graph [4]. Before continuing, we remark that the phase transition in SIS and SIR epidemics occurs due to a change in the parameters (ratio of infection to curing rate) of the model, which might be di erent from a phase transition due to the non-linear dynamics of the process. Both the SIS and SIR Markovian model on any network are linear processes (as any Markov process [5]) and linear dynamic processes do not ehibit jumps, limit cycles nor chaotic behavior that may occur in some non-linear processes [6]. Here, the most general description of a heterogeneous Markovian SIS process with time-dependent rates on a time-variant network is recast into integral equations. Our main results are the derivations of integral equations (7) and (9) from the SIS governing di erential equation for the nodal infection probability, from which bounds are deduced in Section 4. 2 Markovian SIS governing equation The graph G of the network consists of the set N of N nodes and the set L of L links and is represented by an N N adjacency matri A with elements a ij = if there is a directed link from node i to j, else a ij = 0. The eact heterogeneous Markovian SIS governing equation [7, 5, 8] for the infection probability E [X i ] = Pr [X i = ] of node i is de [X i (t)] = E " i X i (t) + ( X i (t)) # ki a ki X k (t) where the Bernoulli random variable X i 2 f0; g de nes the two possible states, the infected state X i = and the healthy state X i = 0 of node i. The nodal curing is a Poisson process with rate i, while the infection from node k towards node i is also described by a Poisson process with rate ki. All Poisson processes are independent. When node i is infected at time t and X i (t) =, only the rst term in () on the right-hand side between the brackets [:] a ects and decreases with rate i the change in infection probability with time d Pr[X i(t)=] (left-hand side in ()). When node i by a rate P N k= kia ki X k (t) due to all its infected, direct neighbors. We de ne the nodal curing vector e = ( ; 2 ; : : : ; N ) and the weighted adjacency matri A e with element ea ij = ij a ij. Both the topology is healthy and X i (t) = 0, only the second term between the brackets [:] increases d Pr[X i(t)=] and the rates may dependent upon time; thus e A is generally a time-variant, asymmetric matri with zero elements on the diagonal (ea ii = 0 for all i N). An epidemic spreads along infectious links, which are network links with one end node infected and the other end node healthy. The probability that there is an infectious link directed from node i to j is Pr [X i = ; X j = 0] = E [X i ( X j )] = E [X i ] E [X i X j ] (2) which vanishes if i = j. With the de nition (2), the SIS governing equation () becomes de [X i (t)] + i (t) E [X i (t)] = k= () ea ki (t) Pr [X k (t) = ; X i (t) = 0] (3) k= These joint probabilities Pr [X k = ; X i = 0] in a Markovian SIS process can be determined precisely as shown in [7, 5], but require the knowledge of the joint probabilities over all triples of nodal 2

3 states, which in turn requires all combinations of four nodal states and so on. Eventually, the eact determination leads to 2 N linear di erential equations and this eponentially large number in N is a nger print of the NP-hard nature of SIS epidemics on networks. Using in (3) the conditional probability Pr [X k = ; X i = 0] = Pr [X k = jx i = 0] Pr [X i = 0] and E [X i ] = Pr [X i = 0], an alternative form of the heterogeneous Markovian SIS governing equation is de [X i (t)] + f i (t) + b i (t)g E [X i (t)] = b i (t) (4) where the overall infection rate of the healthy node i from all its neighbors is b i (t) = ea ki (t) Pr [X k (t) = jx i (t) = 0] (5) k= which will play a crucial role in the sequel. If de[x i(t)] = 0 at a time t = > 0, then the infection probability Pr [X i () = ] = E [X i ()] of node i is etremal and equal to Pr [X i () = ] = b i () i () + b i () (6) which resembles [9] the steady-state infection probability of node i in the N-Intertwined Mean-Field Approimation (NIMFA) [20], that led to a partial fraction epansion [2]. 3 An integral equation for Markovian SIS epidemics In appendi A, we reformulate a linear di erential equation of the type of the SIS di erential equation (4) into an integral equation. We apply (2) to the SIS di erential equation (4) and deduce the integral equation Pr [X i (t) = 0] = i (s) e s f i(u)+b i (u)gdu ds + Pr [X i () = 0] e f i(u)+b i (u)gdu connecting the healthy probability of node i at any two time points t and. The integral representation (7) may more naturally describe temporal networks [22], whose topology (and thus adjacency matri) changes over time. The complicating quantity in (7) is b i (t) de ned in (5), where the infectious treat ea ki (u) Pr [X k (u) = jx i (u) = 0] towards the healthy node i from its neighbor k, depends on the product of three independent factors: (7) the link eistence a ki (u) at time u which enables the transmission, the infection rate ki (u) at time u which characterizes the strength of the infectious activity and the likeliness Pr [X k (u) = jx i (u) = 0] of transmission over link k! i, because the SIS process only spreads over infectious links. The positive integrand in (7) shows that the probability that node i is healthy is always positive in a nite graph, provided that the curing rate i (s) is not zero at all times s 2 (0; t] and the infection rates ij are nite. When the time t increases while < t is ed and the curing rate i (u) i;min > 0, the last term containing the in uence of Pr [X i () = 0] at time on the actual healthy probability at time t disappears eponentially fast. The asymptotic time regime follows from (7) as lim Pr [X i (t) = 0] = lim t! t! i (s) e R s f i(u)+b i (u)gdu ds 3 e f i(u)+b i (u)gdu

4 Using de Hospital s rule and assuming that the limits lim t! i (t) = i; and lim t! ea ki (t) = ea ki; in (5) eist, we nd that lim Pr [X i (t) = 0] = t! i; i; + P N k= ea ki; lim t! Pr [X k (t) = jx i (t) = 0] which has the form (6) of an etremal probability. The governing equation () does not contain information to conclude that lim t! Pr [X k (t) = jx i (t) = 0] = 0, but, in any nite graph [23, 5], the SIS epidemic process ends in the absorbing, all-healthy state where lim t! Pr [X i (t) = 0] = for any node i 2 N. In other words, the infection has disappeared in the network after su ciently long time. The homogeneous case with ed rates ( ij (t) =, i (t) = and e ective infection rate = ) is the simplest version of the general epression (7), Pr [X i (t) = 0] = e (t s) e P N k= a ki s Pr[X k(u)=jx i (u)=0]du ds + Pr [X i () = 0] e (t ) e P N k= a ki Pr[X k(u)=jx i (u)=0]du (8) The homogeneous NIMFA reformulation, where v k (u) approimates the nodal infection probability Pr [X k (u) = ] by assuming independence such that v k (u) = Pr [X k (u) = ] = Pr [X k (u) = jx i (u) = 0], follows from (8) with v k (u) = v i (t) = e (+d i)(t v k (u) as s) e P N k= a ki s vk(u)du ds + v i () e (+d i)(t ) e P N k= a ki v k(u)du For an SIS Markovian process with ed rates, we know [24] that E [X i X j ] E [X i ] E [X j ], so that Pr [X k (u) = jx i (u) = 0] Pr [X k (u) = ]. Then, (8) shows that NIMFA lower bounds the healthy nodal probability, Pr [X i (t) = 0] v i (t), as found earlier [3]. 3. An alternative integral equation to (7) We demonstrate in Appendi B that the integral equation (7) is equivalent to ln Pr [Xi (t) = 0] = Pr [X i () = 0] i (u) Pr [X i (u) = ] Pr [X i (u) = 0] du A general integrated governing equation is presented in (28) in Appendi B. b i (u) du (9) By the mean-value theorem (see e.g. [5, Chapter 5]), there eist a point in time 2 [; t] for which (9) equals ln Pr[Xi (t)=0] Pr[X i ()=0] Pr [X i () = ] = i () t Pr [X i () = ] b i () (0) If the interval [; t] is not large, we may assume that Pr [X i () = ] at a particular (unknown) time is a good approimation for Pr [X i (u) = ] at any time point u 2 (; t). Thus, for a suitably chosen timestep h = t time approimation,, we may transform the continuous-time setting from (0) or from (27) into a discrete Pr [X i (t k+ ) = 0] = Pr [X i (t k ) = 0] e h i (t k ) Pr[X i (t k )=] Pr[X i (t k )=] 4 b i (t k )

5 where the (k + )-th time slot is epressed in terms of the k-th time slot, in which the infection probability Pr [X i (u) = ] = Pr [X i (t k ) = ] is constant for all u 2 [t k ; t k + h) in time slot k and t k+ = t k + h. Such approimation might be valuable for an actual disease spread over a timevariant contact network, especially when additional information about the conditional probability Pr [X k (t k ) = jx i (t k ) = 0] can be obtained. After solving (0) for Pr [X i () = ], we obtain Pr [X i () = ] = b i () + i () + b i () + Pr[X ln i (t)=0] Pr[X i ()=0] t ln Pr[X i (t)=0] Pr[X i ()=0] t and () resembles the etremal probability (6), but now complemented by the di erential quotient ln(pr[x i(t)=0]) ln(pr[x i ()=0]) t that involves the infection probabilities at the beginning time and ending time t of the interval [; t]. This generalized form () for a particular (unknown) time may suggest that each infection probability at time t obeys, to rst order, the etremal probability form Pr [X i (t) = ] = i (t) r i (t)+r i (t), in which r i (t) is a correction to the infectious link activity b i (t) = P N k= ea ki (t) Pr [X k (t) = jx i (t) = 0] at time t towards node i, when healthy, from all its infected neighbors. The SIS process possesses a quasi-stationary regime, also called the metastable regime. In the metastable regime, the nodal infection or healthy probability hardly changes anymore. Hence, if both time and t belong to the metastable regime, then Pr [X i (t) = 0] ' Pr [X i () = 0] ' Pr [X i (u) = 0] for u 2 [; t], so that () reduces to the equilibrium form given by the etremal probability (6). However, it is possible that Pr [X i (t) = 0] = Pr [X i () = 0] for a time and t in the transient regime as reported in [8], but where Pr [X i (u) = 0] for u 2 [; t] is not equal to Pr [X i (t) = 0] = Pr [X i () = 0] so that the etremal probability form () may not be a good approimation for those intermediate time points u 2 [; t]. The SIS process in some graphs may be not unimodal, implying that there is more than one nite time at which etremes (satisfying de[x i(t)] = 0 and (6)) are reached. 4 Bounds In addition to a general conveity bound (29) derived in Appendi B, we will deduce an upper and lower bound for Pr [X i (t) = ] by bounding () where i (; t) ea ik (u) du ea ki (u) Pr [X k (u) = jx i (u) = 0] du i (; t) ea ik (u) du i (; t) = i (; t) = ma Pr [X k (u) = jx i (u) = 0] (2) k2n i and u2[;t] min Pr [X k (u) = jx i (u) = 0] (3) k2n i and u2[;t] and N i denotes the set of neighbors of node i. Thus, i (; t) (and similarly for i (; t) ) is the probability of occurrence of the most (least) infectious link incident to a healthy node i during Non-unimodality was rst observed by Joel Miller and communicated to me. 5

6 the time interval [; t]. The de nition (2) for ed and small = c and large t = T suggests that the higher i (c; T ) is, the better node i is reachable. Hence, i (c; T ) can be considered as a centrality or importance measure for node i, such as betweenness, closeness and the diagonal element of the pseudo-inverse of the Laplacian [2] and suggests that i (c; T ) may be approimated by topology information from the adjacency matri A. By the non-negative SIS correlation property [24], we have Pr [X k (u) = jx i (u) = 0] Pr [X k (u) = ], so that i (; t) The minimum i (; t) in (7) produces the upper bound Pr [X i (t) = 0] i (s) e ma Pr [X k (u) = ] (4) k2n i and u2[;t] s f i (u)+ i (;t) e d i (u)gdu ds + Pr [X i () = 0] e f i (u)+ i (;t) e d i (u)gdu where d e i (u) = P N k= ea ik (u) is the time-dependent, weighted degree of node i. The maimum i (; t) in (7) produces the lower bound We use Pr [X i (t) = 0] i (s) e s f i (u)+ i (;t) e d i (u)gdu ds + Pr [X i () = 0] e i (s) er s f i (u)+ i (;t) e d i (u)gdu ds = e f i (u)+ i (;t) e d i (u)gdu i (; t) f i (u)+ i (;t) e d i (u)gdu ed i (s) er s 0 f i (u)+ i (;t) e d i (u)gdu ds in the above bounds for Pr [X i (t) = 0] to obtain bounds for the probability Pr [X i (t) = ] that node i is infected at time t: Pr [X i (t) = ] i (; t) Pr [X i (t) = ] i (; t) ed i (s) e ed i (s) e s f i (u)+ i (;t) e d i (u)gdu ds + Pr [X i () = ] e s f i (u)+ i (;t) e d i (u)gdu ds + Pr [X i () = ] e f i (u)+ i (;t) e d i (u)gdu f i (u)+ i (;t) e d i (u)gdu The rst integral over s in the above bounds is always positive, but generally di cult to evaluate. The inequalities for the homogenous case with constant rates simplify to Pr [X i (t) = ] i (; t) d i + e (+ i(;t)d i )(t ) Pr [X i () = ] + i (; t) d i Pr [X i (t) = ] i (; t) d i + e (+ i(;t)d i )(t ) Pr [X i () = ] + i (; t) d i i (; t) d i + i (; t) d i i (; t) d i + i (; t) d i with equality at t =. The upper bound (analogously for the lower bound) only eceeds (5) (6) i (;t)d i + i (;t)d i for nite time t provided the infection probability at time is Pr [X i () = ] > i(;t)d i + i (;t)d i. These bounds (5) and (6) resemble the time-dependent solution of a general continuous-time two-state Markov process [5, p. 23], which is also the underlying basis for NIMFA as eplained in [2, Sec. 2. and Fig..]. After su ciently large time t = T to ignore the initial condition at time (i.e. e T Pr [X i () = ] << ), the inequalities (5) and (6) simply with = to i (; T ) d i + i (; T ) d i Pr [X i (T ) = ] 6 i (; T ) d i + i (; T ) d i (7)

7 Similarly, the etremal probability (6) for constant rates can be bounded as i (; ) d i + i (; ) d i Pr [X i () = ] i (; ) d i + i (; ) d i The correspondence with (7) indicates that the quasi-stationary (or metastable) SIS regime attained after time T operates around the maimal value within bounds depending on infectious links. The smaller the di erence i (; T ) i (; T ), the sharper and more promising the above bounds will be. Also, (7) supports the earlier claim based upon () that the nodal infection probability can be approimated by Pr [X i (t) = ] r i i (t)+r i. De ning the maimum possible infection probability v ma = ma k2n and u2[0;t ] Pr [X k (u) = ] in the interval [0; T ], then the upper bound on i (; t) in (4) shows that i (0; T ) v ma and the upper bound in (7) is v mad i Pr [X i (T ) = ] + v ma d i whereas the corresponding upper bound for the steady-state infection probability v i in NIMFA [5, Theorem on p. 464] obeys v i d i + d i If v ma occurs at node i, the above upper bound becomes v ma d i, v ma d i d ma vmad i +v mad i and, equivalently for For any regular graph with degree r, we thus observe that Pr [X i (T ) = ] r, while equality holds in NIMFA. Despite the lack of a companion of (4) for the minimum min = min i2n i (0; t) in (3), we can proceed similarly, min d i + min d i Pr [X i (T ) = ] If the minimum possible infection probability v min in the interval [0; T ] occurs at node k, then min d min + min d min mind k + min d k v min from which an upper bound for the e ective infection rate follows as min d min v min v min (8) More equations for the e ective infection rate of this type are presented in Appendi C. 5 Summary Integral equations (7) and (9) for the most general Markovian setting of SIS epidemics are derived. The analysis illustrates that only the N rst, linear Markovian equations (, 4, 3) for the nodal infection probabilities alone out of the 2 N other equations for joint probabilities are elegantly bounded by the etremal probability form (6,) and the bounds resemble the behavior of the corresponding N non-linear NIMFA equations. 7

8 References [] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespignani. Epidemic processes in comple networks. Review of Modern Physics, 87(3): , September 205. [2] P. Van Mieghem, K. Devrien, and H. Cetinay. Pseudo-inverse of the Laplacian and best spreader node in a network. Physical Review E, 96(3):0323, September 207. [3] P. Van Mieghem and R. van de Bovenkamp. Accuracy criterion for the mean- eld approimation in SIS epidemics on networks. Physical Review E, 9(3):03282, March 205. [4] L. Onsager. Crystal statistics: A two-dimensional model with an order-disorder transition. Physical Review, 65(3 and 4):7 49, February 944. [5] S. H. Strogatz. From Kuramoto to Crawford: eploring the onset of synchronization in populations of coupled oscillators. Physica D, 43: 20, [6] P. Bak, C. Tang, and K. Wiesenfeld. Self-organized criticality: An eplanation of /f noise. Physical Review Letters, 59(4):38 384, July 987. [7] K.-I. Goh, D.-S. Lee, B. Kahng, and D. Kim. Sandpile on scale-free networks. Physical Review Letters, 9(4):4870, October [8] T. Kleiberg and P. Van Mieghem. Self-organization of Internet paths. IFIP Fourth International Workshop on Self-Organizing Systems, December 9-, ETH Zurich, Switzerland, [9] C. Castellano, S. Fortunato, and V. Loreto. Statistical physics of social dynamics. Reviews of Modern Physics, 8:59 646, April-June [0] Q. Li, L. A. Braunstein, H. Wang, J. Shao, H. E. Stanley, and S. Havlin. Non-consensus opinion models on comple networks. Journal of Statistical Physics, 5(-2):92 2, 203. [] H. E. Stanley. Introduction to Phase Transitions and Critical Phenomena. Oford University Press, July 987. [2] J. Meier, X. Zhou, A. Hillebrand, P. Tewarie, C. J. Stam, and P. Van Mieghem. The epidemic spreading model and the direction of information ow in brain networks. NeuroImage, 52: , 207. [3] E. Cator and P. Van Mieghem. Susceptible-Infected-Susceptible epidemics on the complete graph and the star graph: Eact analysis. Physical Review E, 87():028, January 203. [4] P. Van Mieghem. Time evolution of SIS epidemics in the complete graph. Delft University of Technology, Report ( [5] P. Van Mieghem. Performance Analysis of Comple Networks and Systems. Cambridge University Press, Cambridge, U.K., 204. [6] S. H. Strogatz. Non-linear dynamics and chaos. Addison-Wesley Publishing Company, Reading, Massachusetts, USA, 994. [7] E. Cator and P. Van Mieghem. Second order mean- eld SIS epidemic threshold. Physical Review E, 85(5):056, May 202. [8] P. Van Mieghem. Universality of the SIS prevalence in networks. Delft University of Technology, Report ( arxiv: , 206. [9] P. Van Mieghem, J. Omic, and R. E. Kooij. Virus spread in networks. IEEE/ACM Transactions on Networking, 7(): 4, February [20] K. Devrien and P. Van Mieghem. Universal mean- eld framework for SIS epidemics on networks, based on graph partitioning and the isoperimetric inequality. Physical Review E, 96(5):05234, November 207. [2] P. Van Mieghem. The N - Intertwined SIS epidemic network model. Computing, 93(2):47 69, 20. [22] P. Holme and J. Saramäki. Temporal networks. Physics Reports, 59:97 25, 202. [23] P. Van Mieghem and E. Cator. Epidemics in networks with nodal self-infections and the epidemic threshold. Physical Review E, 86():066, July

9 [24] E. Cator and P. Van Mieghem. Nodal infection in Markovian SIS and SIR epidemics on networks are non-negatively correlated. Physical Review E, 89(5):052802, 204. [25] P. M. Morse and H. Feshbach. Methods of Theoretical Physics. McGraw-Hill Book Company, New York, 978. [26] P. Van Mieghem. SIS epidemics with time-dependent rates describing ageing of information spread and mutation of pathogens. Delft University of Technology, Report ( [27] P. Van Mieghem, F. D. Sahneh, and C. Scoglio. Eact Markovian SIR and SIS epidemics on networks and an upper bound for the epidemic threshold. Proceedings of the 53rd IEEE Conference on Decision and Control (CDC204), December 5-7, Los Angeles, CA, USA, 204. [28] P. Van Mieghem. Approimate formula and bounds for the time-varying SIS prevalence in networks. Physical Review E, 93(5):05232, 206. [29] Q. Liu and P. Van Mieghem. Evaluation of an analytic, approimate formula for the time-varying SIS prevalence in di erent networks. Physica A, 47: , 207. [30] P. Van Mieghem and K. Devrien. An Epidemic Perspective on the Cut Size in Networks. Delft University of Technology, Report ( A Linear rst order di erential equation We rewrite (4) as df (t) + g (t) f (t) = g (t) i (t) (9) where f (t) = E [X i (t)] and g (t) = i (t) + b i (t) = G (f (t)), where G (:) is an unknown function. Since the dependence of g (t) on f (t) is unknown, the solution of the di erential equation (9) (see e.g. [25, Sec. 5.2]) f (t) = ep 0 Z s g (u) du ep g (u) du (g (s) i (s)) ds + f (0) 0 0 epresses f (t) in terms of g (t) and thus results in an integral equation for f (t), rather than in its solution. After integrating the rst term, Z s ep g (u) du g (s) ds = ep g (u) du and some rearrangements, we arrive at f (t) = (s) ep 0 s g (u) du ds + f f (0)g ep We rewrite the di erential equation (4) with the de nition b i (t) in (5) as 0 g (u) du d Pr [X i (t) = 0] + f i (t) + b i (t)g Pr [X i (t) = 0] = i (t) (22) Only if is a constant (independent of time) and assuming that G (h (t)) = i + b i (t) eists and is known, then the above di erential equation becomes with h (t) = Pr [X i (t) = 0] = dh (t) + G (h (t)) h (t) = i f (t), (20) (2) 9

10 whose solution is Z h(t) h(0) i d G () = t Let dh() d = i G(), then H (h (t)) H (h (0)) = t and the eplicit solution is h (t) = H (t + H (h (0))). For the particular eample where g (t) = f (t), the di erential equation (9) becomes a generalized logistic or non-linear Bernoulli di erential equation df(t) f (t) = f 2 (t), which describes, in the mean- eld approimation, the probability v (t) of infection in a node at time t in a regular graph G with degree r obeying dv (t) = r (t) v (t) ( v (t)) (t) v (t) (23) where the infection rate (t) and the curing rate (t) are general non-negative real functions of time t. By the same technique variation of a constant, we nd in [26] the solution R t ep 0 (r (u) (u)) du v (t) = v 0 + r 0 (s) ep R s 0 (r (u) (u)) du ds where v 0 is the initial fraction of infected nodes. (24) B The function p i (t; q) and proofs of (9) We give two proofs of (9): after introducing the function p i (t; q) in (25), the rst proof transforms the integral equation (7) into (9), while the second proof of (9) is based on the governing SIS equation (). Proof : Let us denote p i (t; q) = Pr [X i (t) = 0] e q f i(u)+b i (u)gdu (25) where q is an arbitrary point in time, then the integral equation (7) can be recast as p i (t; q) p i (; q) = i (s) er s q f i(u)+b i (u)gdu ds After invoking the de nition (25), we obtain an integral equation in p i (t; q), p i (t; q) p i (; q) = i (s) p i (s; q) ds (26) Pr [X i (s) = 0] Since the integrand is non-negative, then p i (t; q) p i (; q) for t > and p i (t; q) is non-decreasing in time t. Given p i (; q), we can iterate the integral equation (26). After n iterations, we obtain the series of multiple integrals, Z p i (t; q) t p i (; q) = i (t ) Pr [X i (t ) = 0] + i (t ) Pr [X i (t ) = 0] i (t ) Pr [X i (t ) = 0] n p i (t n ; q) p i (; q) i (t 2 ) 2 Pr [X i (t 2 ) = 0] i (t n ) n Pr [X i (t n ) = 0] 0

11 Using the multiple integral formula (which can be veri ed by partial integration ) yields i (t ) Pr [X i (t ) = 0] n p i (t; q) p i (; q) = + X k= Z t k! The last integral can be bounded as Z i (t ) tn Pr [X i (t ) = 0] Z i (t 2 ) tn 2 Pr [X i (t 2 ) = 0] k Z i (s) ds t + Pr [X i (s) = 0] p i (t n ; q) p i (; q) i (t n ) n Pr [X i (t n ) = 0] = n! Z i (t ) tn Pr [X i (t ) = 0] i (t n ) n Pr [X i (t n ) = 0] p Z i (t; q) t p i (; q) n! n i (s) ds Pr [X i (s) = 0] p i (t n ; q) p i (; q) and illustrates that the series converges in any nite interval when n!. Hence, p i (t; q) p i (; q) = + X k= Z t k! k Z i (s) ds t = ep Pr [X i (s) = 0] i (t n ) n Pr [X i (t n ) = 0] n i (s) ds Pr [X i (s) = 0] i (s) ds Pr [X i (s) = 0] Introducing the de nition (25) of p i (t; ) results in which can be rewritten as (9). Pr [X i (t) = 0] e f i(u)+b i (u)gdu Pr [X i () = 0] i (s) ds = ep Pr [X i (s) = 0] Proof 2: We can generalize (9) to any integrable function h () = dh() d as (27) H (Pr [X i (t) = 0]) H (Pr [X i () = 0]) = h (Pr [X i (u) = 0]) d Pr [X i (u) = 0] du du Introducing the governing SIS equation (22) for the healthy probability Pr [X i (u) = 0] leads to the general formula H (q)j Pr[X i(t)=0] Pr[X i ()=0] = h (Pr [X i (u) = 0]) i (u) Pr [X i (u) = ] where the special case h () = leads to (9).! ea ki (u) Pr [X k (u) = ; X i (u) = 0] du k= (28) Lemma Provided that the curing rate i (t), the function p t+ i (t; q), de ned in (25), is i (0) conve for all time t. Proof: Di erentiating (26) with respect to time t yields dp i (t; q) = i (t) Pr [X i (t) = 0] p i (t; q) A second di erentiation, in which we use the above rst order di erential, leads to ( d 2 ) p i (t; q) d i (t) i (t) 2 2 = + p i (t; q) Pr [X i (t) = 0] Pr [X i (t) = 0]

12 and d 2 p i (t; q) 2 = i (t) + 0 i (t) i (t) Pr [X i (t) = 0] Introducing the governing equation (22) yields d Pr [X i (t) = 0] i (t) p i (t; q) (Pr [X i (t) = 0]) 2 d 2 p i (t; q) 2 = 0 i (t) i (t) + i (t) + b i (t) i (t) p i (t; q) Pr [X i (t) = 0] which is always non-negative provided 0 i (t) i (t) + i (t) 0, which is, after integration, equivalent to the condition stated in Lemma. As a consequence of Lemma, we conclude for a constant curing rate i (t) = i that p i (t; q) is always conve. Applying the conveity de nition (see e.g. [5, p. 0]), p i (u + ( ) v; q) p i (u; q) + ( ) p i (v; q) with 2 [0; ] where i (t) obeys the condition in Lemma, then the epression (27), after choosing = u, leads to a bound involving the healthy probability where the time e = u + ( ) v 2 [u; v]: e R u+( u )v i (s)ds Pr[X i (s)=0] + ( ) er v u i (s)ds Pr[X i (s)=0] (29) C The prevalence and e ective infection rate Summing (3) over all nodes and rewritten in terms of the prevalence " # y (t) = Pr [X i (t) = ] = E X i (t) N N i= de ned as the epected fraction of infected nodes in a graph at time t, yields i= (30) dy (t) + N i (t) E [X i (t)] = N i= ea ki (t) Pr [X k = ; X i = 0] i= k= Only when all curing rates i (t) = (t) are equal, we nd a di erential equation in the prevalence dy (t) + (t) y (t) = N ea ki (t) Pr [X k = ; X i = 0] i= k= Earlier, we have demonstrated in [27] and further studied in [28, 29], that dy (t ; ) = y (t ; ) + h i N E w (t ; ) T Qw (t ; ) where t = t is the scaled time, Q = A is the Laplacian of the graph G with = diag(d ; d 2 ; : : : ; d N ) and d i is the degree of node i in G, and the Bernoulli vector w = (X ; X 2 ; : : : ; X N ). If we con ne ourselves for simplicity to ed rates and a time-invariant topology, then the comparison with (3) shows that the average number of links in the cut-set between healthy and infected nodes is (3) E w T Qw = a ki Pr [X k = ; X i = 0] (32) i= k= 2

13 which is investigated further in [30]. In the metastable regime, the homogeneous case with ed rates ( ij (t) =, i (t) = ) and time-invariant topology a ki (t) = a ki in (6) with (5) satis es to a very good approimation Pr [X i () = ] = P N k= a ki Pr [X k () = jx i () = 0] + P N k= a ki Pr [X k () = jx i () = 0] from which the e ective infection rate = is solved as = Pr [X i () = ] P N k= a ki Pr [X k () = ; X i () = 0] (33) The e ective infection rate can also be solved 2 from (3) with (32) in terms of the prevalence as = y () N P N i= P N k= a ki Pr [X k () = ; X i () = 0] (34) We revisit the deduction 3 from [27] and rewrite (34) as = P N k= Pr [X k () = ] P N i= a ki Pr [X i () = 0jX k () = ] P N k= Pr [X k () = ] for a time, somewhere in the metastable regime (see Section 3.). Now Pr [X i (t) = 0jX k (t) = ] = Pr [X i (t) = 0] Pr [X k (t) = ] Pr [X k (t) = jx i (t) = 0] appears as the probability that node i is healthy given an infected neighbor k, which opposes the dual conditional probability Pr [X k (t) = jx i (t) = 0] above and both conditional probabilities are only equal when Pr [X i (t) = 0] = Pr [X k (t) = ], i.e. when both nodes have equal probability to be in an opposite state at any time t. Upper and lower bounding in the usual way leads to min kn i= a ki Pr [X i () = 0jX k () = ] ma kn Using the degree d i = P N j= a ij and con ning to the lower bound, we have min kn i= a ki Pr [X i () = 0jX k () = ] a ki Pr [X i () = 0jX k () = ] min min Pr [X i () = 0jX l () = ] d k kn (i;l)2l After a similar treatment of the upper bound, we arrive at i= d min min Pr [X i () = 0jX l () = ] d ma ma Pr [X i () = 0jX k () = ] (35) (i;l)2l (i;l)2l We remark that min = min i2n i () = min (i;l)2l and u2[0;] Pr [X k (u) = jx i (u) = 0], epressed in dual conditional probability, appears in (8) and is di erent from the above. 2 Also by summing (33) over all nodes after obvious manipulations. 3 Earlier, (34) has already appeared in the proof of Theorem in [5, p. 458] and in [27]. The last part of the proof in [5, p. 459] was, unfortunately erroneous and thus also Theorem 7.3.2, as reported in [28]. 3

SIS epidemics on Networks

SIS epidemics on Networks SIS epidemics on etworks Piet Van Mieghem in collaboration with Eric Cator, Ruud van de Bovenkamp, Cong Li, Stojan Trajanovski, Dongchao Guo, Annalisa Socievole and Huijuan Wang 1 EURADOM 30 June-2 July,

More information

Die-out Probability in SIS Epidemic Processes on Networks

Die-out Probability in SIS Epidemic Processes on Networks Die-out Probability in SIS Epidemic Processes on etworks Qiang Liu and Piet Van Mieghem Abstract An accurate approximate formula of the die-out probability in a SIS epidemic process on a network is proposed.

More information

Network Science & Telecommunications

Network Science & Telecommunications Network Science & Telecommunications Piet Van Mieghem 1 ITC30 Networking Science Vision Day 5 September 2018, Vienna Outline Networks Birth of Network Science Function and graph Outlook 1 Network: service(s)

More information

Spectral Graph Theory for. Dynamic Processes on Networks

Spectral Graph Theory for. Dynamic Processes on Networks Spectral Graph Theory for Dynamic Processes on etworks Piet Van Mieghem in collaboration with Huijuan Wang, Dragan Stevanovic, Fernando Kuipers, Stojan Trajanovski, Dajie Liu, Cong Li, Javier Martin-Hernandez,

More information

On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study

On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study The 1 st Net-X (2017) On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study Cong Li Adaptive Networks and Control Lab, Fudan University Collaborators: Xiaojie Li, Jianbo Wang,

More information

Epidemics in Complex Networks and Phase Transitions

Epidemics in Complex Networks and Phase Transitions Master M2 Sciences de la Matière ENS de Lyon 2015-2016 Phase Transitions and Critical Phenomena Epidemics in Complex Networks and Phase Transitions Jordan Cambe January 13, 2016 Abstract Spreading phenomena

More information

Gi en Demand for Several Goods

Gi en Demand for Several Goods Gi en Demand for Several Goods Peter Norman Sørensen January 28, 2011 Abstract The utility maimizing consumer s demand function may simultaneously possess the Gi en property for any number of goods strictly

More information

WE FOCUS ON A simple continuous-time model for the

WE FOCUS ON A simple continuous-time model for the IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 1, FEBRUARY 2009 1 Virus Spread in Networks Piet Van Mieghem, Member, IEEE, Jasmina Omic, and Robert Kooij Abstract The influence of the network characteristics

More information

Lecture VI Introduction to complex networks. Santo Fortunato

Lecture VI Introduction to complex networks. Santo Fortunato Lecture VI Introduction to complex networks Santo Fortunato Plan of the course I. Networks: definitions, characteristics, basic concepts in graph theory II. III. IV. Real world networks: basic properties

More information

A new centrality measure for probabilistic diffusion in network

A new centrality measure for probabilistic diffusion in network ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 5, No., September 204 ISSN : 2322-557 A new centrality measure for probabilistic diffusion in network Kiyotaka Ide, Akira Namatame,

More information

A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS

A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS U.P.B. Sci. Bull., Series A, Vol. 76, Iss. 2, 2014 ISSN 1223-7027 A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS Yilun SHANG 1 Epidemiological network models study the spread

More information

M445: Heat equation with sources

M445: Heat equation with sources M5: Heat equation with sources David Gurarie I. On Fourier and Newton s cooling laws The Newton s law claims the temperature rate to be proportional to the di erence: d dt T = (T T ) () The Fourier law

More information

Approximate inference, Sampling & Variational inference Fall Cours 9 November 25

Approximate inference, Sampling & Variational inference Fall Cours 9 November 25 Approimate inference, Sampling & Variational inference Fall 2015 Cours 9 November 25 Enseignant: Guillaume Obozinski Scribe: Basile Clément, Nathan de Lara 9.1 Approimate inference with MCMC 9.1.1 Gibbs

More information

An Optimal Control Problem Over Infected Networks

An Optimal Control Problem Over Infected Networks Proceedings of the International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 15-16 214 Paper No. 125 An Optimal Control Problem Over Infected Networks Ali Khanafer,

More information

Fixed Point Theorem and Sequences in One or Two Dimensions

Fixed Point Theorem and Sequences in One or Two Dimensions Fied Point Theorem and Sequences in One or Two Dimensions Dr. Wei-Chi Yang Let us consider a recursive sequence of n+ = n + sin n and the initial value can be an real number. Then we would like to ask

More information

The Spreading of Epidemics in Complex Networks

The Spreading of Epidemics in Complex Networks The Spreading of Epidemics in Complex Networks Xiangyu Song PHY 563 Term Paper, Department of Physics, UIUC May 8, 2017 Abstract The spreading of epidemics in complex networks has been extensively studied

More information

Optimally decreasing the spectral radius of a graph by link removals

Optimally decreasing the spectral radius of a graph by link removals Optimally decreasing the spectral radius of a graph by link removals Piet Van Mieghem, Dragan Stevanović y, Fernando Kuipers, Cong Li, Ruud van de Bovenkamp, Daijie Liu and Huijuan Wang Delft University

More information

Analytically tractable processes on networks

Analytically tractable processes on networks University of California San Diego CERTH, 25 May 2011 Outline Motivation 1 Motivation Networks Random walk and Consensus Epidemic models Spreading processes on networks 2 Networks Motivation Networks Random

More information

Source Locating of Spreading Dynamics in Temporal Networks

Source Locating of Spreading Dynamics in Temporal Networks Source Locating of Spreading Dynamics in Temporal Networks Qiangjuan Huang School of Science National University of Defense Technology Changsha, Hunan, China qiangjuanhuang@foxmail.com «Supervised by Professor

More information

dx dx x sec tan d 1 4 tan 2 2 csc d 2 ln 2 x 2 5x 6 C 2 ln 2 ln x ln x 3 x 2 C Now, suppose you had observed that x 3

dx dx x sec tan d 1 4 tan 2 2 csc d 2 ln 2 x 2 5x 6 C 2 ln 2 ln x ln x 3 x 2 C Now, suppose you had observed that x 3 CHAPTER 8 Integration Techniques, L Hôpital s Rule, and Improper Integrals Section 8. Partial Fractions Understand the concept of a partial fraction decomposition. Use partial fraction decomposition with

More information

Generalized Epidemic Mean-Field Model for Spreading Processes Over Multilayer Complex Networks

Generalized Epidemic Mean-Field Model for Spreading Processes Over Multilayer Complex Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 5, OCTOBER 2013 1609 Generalized Epidemic Mean-Field Model for Spreading Processes Over Multilayer Complex Networks Faryad Darabi Sahneh, Member,IEEE,CaterinaScoglio,Member,IEEE,and

More information

Nonlinear Oscillations and Chaos

Nonlinear Oscillations and Chaos CHAPTER 4 Nonlinear Oscillations and Chaos 4-. l l = l + d s d d l l = l + d m θ m (a) (b) (c) The unetended length of each spring is, as shown in (a). In order to attach the mass m, each spring must be

More information

Directed graphs and mysterious complex eigenvalues

Directed graphs and mysterious complex eigenvalues Directed graphs and mysterious complex eigenvalues Piet Van Mieghem! Delft University of Technology version 1: 5 Dec 018 for Nathanís birthday Abstract After the addition of one directed link with weight!>0

More information

(a) Show that there is a root α of f (x) = 0 in the interval [1.2, 1.3]. (2)

(a) Show that there is a root α of f (x) = 0 in the interval [1.2, 1.3]. (2) . f() = 4 cosec 4 +, where is in radians. (a) Show that there is a root α of f () = 0 in the interval [.,.3]. Show that the equation f() = 0 can be written in the form = + sin 4 Use the iterative formula

More information

Time: 1 hour 30 minutes

Time: 1 hour 30 minutes Paper Reference(s) 6665/01 Edecel GCE Core Mathematics C Silver Level S Time: 1 hour 0 minutes Materials required for eamination papers Mathematical Formulae (Green) Items included with question Nil Candidates

More information

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence ECS 289 F / MAE 298, Lecture 15 May 20, 2014 Diffusion, Cascades and Influence Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic thresholds

More information

Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks

Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Zesheng Chen Department of Computer Science Indiana University - Purdue University Fort Wayne, Indiana 4685 Email: chenz@ipfw.edu

More information

Notes on Mathematical Expectations and Classes of Distributions Introduction to Econometric Theory Econ. 770

Notes on Mathematical Expectations and Classes of Distributions Introduction to Econometric Theory Econ. 770 Notes on Mathematical Expectations and Classes of Distributions Introduction to Econometric Theory Econ. 77 Jonathan B. Hill Dept. of Economics University of North Carolina - Chapel Hill October 4, 2 MATHEMATICAL

More information

Susceptible-infected-susceptible epidemics on networks with general infection and cure times

Susceptible-infected-susceptible epidemics on networks with general infection and cure times PHYSICAL REVIEW E 87,686(3) Susceptible-infected-susceptible epidemics on networks with general infection and cure times E. Cator,,* R. van de Bovenkamp,, and P. Van Mieghem, Faculty of Science, Radboud

More information

State Space and Hidden Markov Models

State Space and Hidden Markov Models State Space and Hidden Markov Models Kunsch H.R. State Space and Hidden Markov Models. ETH- Zurich Zurich; Aliaksandr Hubin Oslo 2014 Contents 1. Introduction 2. Markov Chains 3. Hidden Markov and State

More information

It is convenient to introduce some notation for this type of problems. I will write this as. max u (x 1 ; x 2 ) subj. to. p 1 x 1 + p 2 x 2 m ;

It is convenient to introduce some notation for this type of problems. I will write this as. max u (x 1 ; x 2 ) subj. to. p 1 x 1 + p 2 x 2 m ; 4 Calculus Review 4.1 The Utility Maimization Problem As a motivating eample, consider the problem facing a consumer that needs to allocate a given budget over two commodities sold at (linear) prices p

More information

Taylor Series and Series Convergence (Online)

Taylor Series and Series Convergence (Online) 7in 0in Felder c02_online.te V3 - February 9, 205 9:5 A.M. Page CHAPTER 2 Taylor Series and Series Convergence (Online) 2.8 Asymptotic Epansions In introductory calculus classes the statement this series

More information

Stochastic modelling of epidemic spread

Stochastic modelling of epidemic spread Stochastic modelling of epidemic spread Julien Arino Department of Mathematics University of Manitoba Winnipeg Julien Arino@umanitoba.ca 19 May 2012 1 Introduction 2 Stochastic processes 3 The SIS model

More information

Chapter 5 Symbolic Increments

Chapter 5 Symbolic Increments Chapter 5 Symbolic Increments The main idea of di erential calculus is that small changes in smooth functions are approimately linear. In Chapter 3, we saw that most microscopic views of graphs appear

More information

Answer Key 1973 BC 1969 BC 24. A 14. A 24. C 25. A 26. C 27. C 28. D 29. C 30. D 31. C 13. C 12. D 12. E 3. A 32. B 27. E 34. C 14. D 25. B 26.

Answer Key 1973 BC 1969 BC 24. A 14. A 24. C 25. A 26. C 27. C 28. D 29. C 30. D 31. C 13. C 12. D 12. E 3. A 32. B 27. E 34. C 14. D 25. B 26. Answer Key 969 BC 97 BC. C. E. B. D 5. E 6. B 7. D 8. C 9. D. A. B. E. C. D 5. B 6. B 7. B 8. E 9. C. A. B. E. D. C 5. A 6. C 7. C 8. D 9. C. D. C. B. A. D 5. A 6. B 7. D 8. A 9. D. E. D. B. E. E 5. E.

More information

Dynamical models of HIV-AIDS e ect on population growth

Dynamical models of HIV-AIDS e ect on population growth Dynamical models of HV-ADS e ect on population growth David Gurarie May 11, 2005 Abstract We review some known dynamical models of epidemics, given by coupled systems of di erential equations, and propose

More information

Chapter 3 Single Random Variables and Probability Distributions (Part 1)

Chapter 3 Single Random Variables and Probability Distributions (Part 1) Chapter 3 Single Random Variables and Probability Distributions (Part 1) Contents What is a Random Variable? Probability Distribution Functions Cumulative Distribution Function Probability Density Function

More information

Multidimensional partitions of unity and Gaussian terrains

Multidimensional partitions of unity and Gaussian terrains and Gaussian terrains Richard A. Bale, Jeff P. Grossman, Gary F. Margrave, and Michael P. Lamoureu ABSTRACT Partitions of unity play an important rôle as amplitude-preserving windows for nonstationary

More information

LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC

LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC R. G. DOLGOARSHINNYKH Abstract. We establish law of large numbers for SIRS stochastic epidemic processes: as the population size increases the paths of SIRS epidemic

More information

Growing a Network on a Given Substrate

Growing a Network on a Given Substrate Growing a Network on a Given Substrate 1 Babak Fotouhi and Michael G. Rabbat Department of Electrical and Computer Engineering McGill University, Montréal, Québec, Canada Email: babak.fotouhi@mail.mcgill.ca,

More information

Lecture 4.2 Finite Difference Approximation

Lecture 4.2 Finite Difference Approximation Lecture 4. Finite Difference Approimation 1 Discretization As stated in Lecture 1.0, there are three steps in numerically solving the differential equations. They are: 1. Discretization of the domain by

More information

Partial Fractions. dx dx x sec tan d 1 4 tan 2. 2 csc d. csc cot C. 2x 5. 2 ln. 2 x 2 5x 6 C. 2 ln. 2 ln x

Partial Fractions. dx dx x sec tan d 1 4 tan 2. 2 csc d. csc cot C. 2x 5. 2 ln. 2 x 2 5x 6 C. 2 ln. 2 ln x 460_080.qd //04 :08 PM Page CHAPTER 8 Integration Techniques, L Hôpital s Rule, and Improper Integrals Section 8. Partial Fractions Understand the concept of a partial fraction decomposition. Use partial

More information

THE near-threshold behavior, i.e. the behavior around the

THE near-threshold behavior, i.e. the behavior around the etwork localization is unalterable by infections in bursts Qiang Liu and Piet Van Mieghem arxiv:80.0880v [physics.soc-ph] Dec 08 Abstract To shed light on the disease localization phenomenon, we study

More information

Stochastic modelling of epidemic spread

Stochastic modelling of epidemic spread Stochastic modelling of epidemic spread Julien Arino Centre for Research on Inner City Health St Michael s Hospital Toronto On leave from Department of Mathematics University of Manitoba Julien Arino@umanitoba.ca

More information

Training, Search and Wage Dispersion Technical Appendix

Training, Search and Wage Dispersion Technical Appendix Training, Search and Wage Dispersion Technical Appendix Chao Fu University of Wisconsin-Madison October, 200 Abstract This paper combines on-the-job search and human capital theory to study the coexistence

More information

The minimal spectral radius of graphs with a given diameter

The minimal spectral radius of graphs with a given diameter Linear Algebra and its Applications 43 (007) 408 419 www.elsevier.com/locate/laa The minimal spectral radius of graphs with a given diameter E.R. van Dam a,, R.E. Kooij b,c a Tilburg University, Department

More information

Chapter 9. Derivatives. Josef Leydold Mathematical Methods WS 2018/19 9 Derivatives 1 / 51. f x. (x 0, f (x 0 ))

Chapter 9. Derivatives. Josef Leydold Mathematical Methods WS 2018/19 9 Derivatives 1 / 51. f x. (x 0, f (x 0 )) Chapter 9 Derivatives Josef Leydold Mathematical Methods WS 208/9 9 Derivatives / 5 Difference Quotient Let f : R R be some function. The the ratio f = f ( 0 + ) f ( 0 ) = f ( 0) 0 is called difference

More information

CSCI-6971 Lecture Notes: Probability theory

CSCI-6971 Lecture Notes: Probability theory CSCI-6971 Lecture Notes: Probability theory Kristopher R. Beevers Department of Computer Science Rensselaer Polytechnic Institute beevek@cs.rpi.edu January 31, 2006 1 Properties of probabilities Let, A,

More information

Pricing of Cyber Insurance Contracts in a Network Model

Pricing of Cyber Insurance Contracts in a Network Model Pricing of Cyber Insurance Contracts in a Network Model Stefan Weber Leibniz Universität Hannover www.stochastik.uni-hannover.de (joint work with Matthias Fahrenwaldt & Kerstin Weske) WU Wien December

More information

Chapter 6. Nonlinear Equations. 6.1 The Problem of Nonlinear Root-finding. 6.2 Rate of Convergence

Chapter 6. Nonlinear Equations. 6.1 The Problem of Nonlinear Root-finding. 6.2 Rate of Convergence Chapter 6 Nonlinear Equations 6. The Problem of Nonlinear Root-finding In this module we consider the problem of using numerical techniques to find the roots of nonlinear equations, f () =. Initially we

More information

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor

More information

Spreading and Opinion Dynamics in Social Networks

Spreading and Opinion Dynamics in Social Networks Spreading and Opinion Dynamics in Social Networks Gyorgy Korniss Rensselaer Polytechnic Institute 05/27/2013 1 Simple Models for Epidemiological and Social Contagion Susceptible-Infected-Susceptible (SIS)

More information

Lecture 3: September 10

Lecture 3: September 10 CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 3: September 10 Lecturer: Prof. Alistair Sinclair Scribes: Andrew H. Chan, Piyush Srivastava Disclaimer: These notes have not

More information

Tail Approximation of the Skew-Normal by the Skew-Normal Laplace: Application to Owen s T Function and the Bivariate Normal Distribution

Tail Approximation of the Skew-Normal by the Skew-Normal Laplace: Application to Owen s T Function and the Bivariate Normal Distribution Journal of Statistical and Econometric ethods vol. no. 3 - ISS: 5-557 print version 5-565online Scienpress Ltd 3 Tail Approimation of the Skew-ormal by the Skew-ormal Laplace: Application to Owen s T Function

More information

Reconciling two-component power spectra

Reconciling two-component power spectra Reconciling two-component power spectra Charles L. Rino Institute for Scienti c Research, Boston College, Chestnut Hill, MA, USA and Charles S. Carrano Institute for Scienti c Research, Boston College,

More information

The incomplete gamma functions. Notes by G.J.O. Jameson. These notes incorporate the Math. Gazette article [Jam1], with some extra material.

The incomplete gamma functions. Notes by G.J.O. Jameson. These notes incorporate the Math. Gazette article [Jam1], with some extra material. The incomplete gamma functions Notes by G.J.O. Jameson These notes incorporate the Math. Gazette article [Jam], with some etra material. Definitions and elementary properties functions: Recall the integral

More information

Math 1B Final Exam, Solution. Prof. Mina Aganagic Lecture 2, Spring (6 points) Use substitution and integration by parts to find:

Math 1B Final Exam, Solution. Prof. Mina Aganagic Lecture 2, Spring (6 points) Use substitution and integration by parts to find: Math B Final Eam, Solution Prof. Mina Aganagic Lecture 2, Spring 20 The eam is closed book, apart from a sheet of notes 8. Calculators are not allowed. It is your responsibility to write your answers clearly..

More information

Estimating network degree distributions from sampled networks: An inverse problem

Estimating network degree distributions from sampled networks: An inverse problem Estimating network degree distributions from sampled networks: An inverse problem Eric D. Kolaczyk Dept of Mathematics and Statistics, Boston University kolaczyk@bu.edu Introduction: Networks and Degree

More information

Markov-modulated interactions in SIR epidemics

Markov-modulated interactions in SIR epidemics Markov-modulated interactions in SIR epidemics E. Almaraz 1, A. Gómez-Corral 2 (1)Departamento de Estadística e Investigación Operativa, Facultad de Ciencias Matemáticas (UCM), (2)Instituto de Ciencias

More information

1. Sets A set is any collection of elements. Examples: - the set of even numbers between zero and the set of colors on the national flag.

1. Sets A set is any collection of elements. Examples: - the set of even numbers between zero and the set of colors on the national flag. San Francisco State University Math Review Notes Michael Bar Sets A set is any collection of elements Eamples: a A {,,4,6,8,} - the set of even numbers between zero and b B { red, white, bule} - the set

More information

MEI Core 2. Sequences and series. Section 1: Definitions and Notation

MEI Core 2. Sequences and series. Section 1: Definitions and Notation Notes and Eamples MEI Core Sequences and series Section : Definitions and Notation In this section you will learn definitions and notation involving sequences and series, and some different ways in which

More information

Agreement algorithms for synchronization of clocks in nodes of stochastic networks

Agreement algorithms for synchronization of clocks in nodes of stochastic networks UDC 519.248: 62 192 Agreement algorithms for synchronization of clocks in nodes of stochastic networks L. Manita, A. Manita National Research University Higher School of Economics, Moscow Institute of

More information

A Study on Relationship between Modularity and Diffusion Dynamics in Networks from Spectral Analysis Perspective

A Study on Relationship between Modularity and Diffusion Dynamics in Networks from Spectral Analysis Perspective A Study on Relationship between Modularity and Diffusion Dynamics in Networks from Spectral Analysis Perspective Kiyotaka Ide, Akira Namatame Department of Computer Science National Defense Academy of

More information

Potential Game approach to virus attacks in network with general topology

Potential Game approach to virus attacks in network with general topology Potential Game approach to virus attacks in network with general topology François-Xavier Legenvre, Yezekael Hayel, Eitan Altman To cite this version: François-Xavier Legenvre, Yezekael Hayel, Eitan Altman.

More information

A node-based SIRS epidemic model with infective media on complex networks

A node-based SIRS epidemic model with infective media on complex networks A node-based SIRS epidemic model with infective media on complex networks Leyi Zheng a and Longkun Tang, a, b arxiv:191.111v1 [physics.soc-ph] 1 Jan 219 a Fujian Province University Key Laboratory of Computation

More information

THE inverse tangent function is an elementary mathematical

THE inverse tangent function is an elementary mathematical A Sharp Double Inequality for the Inverse Tangent Function Gholamreza Alirezaei arxiv:307.983v [cs.it] 8 Jul 03 Abstract The inverse tangent function can be bounded by different inequalities, for eample

More information

Review of elements of Calculus (functions in one variable)

Review of elements of Calculus (functions in one variable) Review of elements of Calculus (functions in one variable) Mainly adapted from the lectures of prof Greg Kelly Hanford High School, Richland Washington http://online.math.uh.edu/houstonact/ https://sites.google.com/site/gkellymath/home/calculuspowerpoints

More information

Lecture 5: Rules of Differentiation. First Order Derivatives

Lecture 5: Rules of Differentiation. First Order Derivatives Lecture 5: Rules of Differentiation First order derivatives Higher order derivatives Partial differentiation Higher order partials Differentials Derivatives of implicit functions Generalized implicit function

More information

Phase Transitions of an Epidemic Spreading Model in Small-World Networks

Phase Transitions of an Epidemic Spreading Model in Small-World Networks Commun. Theor. Phys. 55 (2011) 1127 1131 Vol. 55, No. 6, June 15, 2011 Phase Transitions of an Epidemic Spreading Model in Small-World Networks HUA Da-Yin (Ù ) and GAO Ke (Ô ) Department of Physics, Ningbo

More information

Polynomial Functions of Higher Degree

Polynomial Functions of Higher Degree SAMPLE CHAPTER. NOT FOR DISTRIBUTION. 4 Polynomial Functions of Higher Degree Polynomial functions of degree greater than 2 can be used to model data such as the annual temperature fluctuations in Daytona

More information

= 1 2 x (x 1) + 1 {x} (1 {x}). [t] dt = 1 x (x 1) + O (1), [t] dt = 1 2 x2 + O (x), (where the error is not now zero when x is an integer.

= 1 2 x (x 1) + 1 {x} (1 {x}). [t] dt = 1 x (x 1) + O (1), [t] dt = 1 2 x2 + O (x), (where the error is not now zero when x is an integer. Problem Sheet,. i) Draw the graphs for [] and {}. ii) Show that for α R, α+ α [t] dt = α and α+ α {t} dt =. Hint Split these integrals at the integer which must lie in any interval of length, such as [α,

More information

Errata for the ASM Study Manual for Exam P, Fourth Edition By Dr. Krzysztof M. Ostaszewski, FSA, CFA, MAAA

Errata for the ASM Study Manual for Exam P, Fourth Edition By Dr. Krzysztof M. Ostaszewski, FSA, CFA, MAAA Errata for the ASM Study Manual for Exam P, Fourth Edition By Dr. Krzysztof M. Ostaszewski, FSA, CFA, MAAA (krzysio@krzysio.net) Effective July 5, 3, only the latest edition of this manual will have its

More information

Question 1. (8 points) The following diagram shows the graphs of eight equations.

Question 1. (8 points) The following diagram shows the graphs of eight equations. MAC 2233/-6 Business Calculus, Spring 2 Final Eam Name: Date: 5/3/2 Time: :am-2:nn Section: Show ALL steps. One hundred points equal % Question. (8 points) The following diagram shows the graphs of eight

More information

Identifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda 4

Identifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda 4 Int. J. Complex Systems in Science vol. 3(1) (2013), pp. 97 105 Identifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda

More information

Course. Print and use this sheet in conjunction with MathinSite s Maclaurin Series applet and worksheet.

Course. Print and use this sheet in conjunction with MathinSite s Maclaurin Series applet and worksheet. Maclaurin Series Learning Outcomes After reading this theory sheet, you should recognise the difference between a function and its polynomial epansion (if it eists!) understand what is meant by a series

More information

TOPICS IN HOMOGENIZATION OF DIFFERENTIAL EQUATIONS 7

TOPICS IN HOMOGENIZATION OF DIFFERENTIAL EQUATIONS 7 TOPICS IN HOMOGENIZATION OF DIFFERENTIAL EQUATIONS 7. Two-scale asymptotic epansions method We will illustrate this method by applying it to an elliptic boundary value problem for the unknown u : æ R given

More information

A Basic Course in Real Analysis Prof. P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur

A Basic Course in Real Analysis Prof. P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur A Basic Course in Real Analysis Prof. P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur Lecture - 36 Application of MVT, Darbou Theorem, L Hospital Rule (Refer Slide

More information

Time: 1 hour 30 minutes

Time: 1 hour 30 minutes Paper Reference(s) 6666/0 Edecel GCE Core Mathematics C4 Gold Level (Harder) G Time: hour 0 minutes Materials required for eamination Mathematical Formulae (Green) Items included with question papers Nil

More information

Practice Midterm Solutions

Practice Midterm Solutions Practice Midterm Solutions Math 4B: Ordinary Differential Equations Winter 20 University of California, Santa Barbara TA: Victoria Kala DO NOT LOOK AT THESE SOLUTIONS UNTIL YOU HAVE ATTEMPTED EVERY PROBLEM

More information

Kalavakkam, Chennai, , Tamilnadu, INDIA 2,3 School of Advanced Sciences. VIT University Vellore, , Tamilnadu, INDIA

Kalavakkam, Chennai, , Tamilnadu, INDIA 2,3 School of Advanced Sciences. VIT University Vellore, , Tamilnadu, INDIA International Journal of Pure and Applied Mathematics Volume 09 No. 4 206, 799-82 ISSN: 3-8080 (printed version); ISSN: 34-3395 (on-line version) url: http://www.ijpam.eu doi: 0.2732/ijpam.v09i4.4 PAijpam.eu

More information

The N-intertwined SIS epidemic network model

The N-intertwined SIS epidemic network model Computing 0 93:47 69 DOI 0.007/s00607-0-055-y The N-intertwined SIS epidemic network model Piet Van Mieghem Received: September 0 / Accepted: 7 September 0 / Published online: 3 October 0 The Authors 0.

More information

Global Stability of a Computer Virus Model with Cure and Vertical Transmission

Global Stability of a Computer Virus Model with Cure and Vertical Transmission International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 3, Issue 1, January 016, PP 16-4 ISSN 349-4840 (Print) & ISSN 349-4859 (Online) www.arcjournals.org Global

More information

arxiv: v1 [cond-mat.stat-mech] 6 Mar 2008

arxiv: v1 [cond-mat.stat-mech] 6 Mar 2008 CD2dBS-v2 Convergence dynamics of 2-dimensional isotropic and anisotropic Bak-Sneppen models Burhan Bakar and Ugur Tirnakli Department of Physics, Faculty of Science, Ege University, 35100 Izmir, Turkey

More information

Economics Bulletin, 2012, Vol. 32 No. 1 pp Introduction. 2. The preliminaries

Economics Bulletin, 2012, Vol. 32 No. 1 pp Introduction. 2. The preliminaries 1. Introduction In this paper we reconsider the problem of axiomatizing scoring rules. Early results on this problem are due to Smith (1973) and Young (1975). They characterized social welfare and social

More information

1 Which sets have volume 0?

1 Which sets have volume 0? Math 540 Spring 0 Notes #0 More on integration Which sets have volume 0? The theorem at the end of the last section makes this an important question. (Measure theory would supersede it, however.) Theorem

More information

The Optimal Depletion of Exhaustible Resources: A Complete Characterization.

The Optimal Depletion of Exhaustible Resources: A Complete Characterization. The Optimal Depletion of haustible Resources: A Complete Characterization. Hassan Benchekroun a and Cees Withagen b Abstract We provide the closed form solution to the Dasgupta-Heal-Solow-Stiglitz (DHSS)

More information

TMA 4195 Mathematical Modeling, 30 November 2006 Solution with additional comments

TMA 4195 Mathematical Modeling, 30 November 2006 Solution with additional comments TMA 495 Mathematical Modeling, 30 November 006 Solution with additional comments Problem A cookbook states a cooking time of 3.5 hours at the oven temperature T oven For a 0 kg (American) turkey, 7 hours

More information

Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population

Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Ruzhang Zhao, Lijun Yang Department of Mathematical Science, Tsinghua University, China. Corresponding author. Email: lyang@math.tsinghua.edu.cn,

More information

Improved Bounds on the Epidemic Threshold of Exact SIS Models on Complex Networks

Improved Bounds on the Epidemic Threshold of Exact SIS Models on Complex Networks Improved Bounds on the Epidemic Threshold of Exact SIS Models on Complex Networks Navid Azizan Ruhi, Christos Thrampoulidis and Babak Hassibi Abstract The SIS (susceptible-infected-susceptible) epidemic

More information

Probabilistic Graphical Models

Probabilistic Graphical Models School of Computer Science Probabilistic Graphical Models Gaussian graphical models and Ising models: modeling networks Eric Xing Lecture 0, February 5, 06 Reading: See class website Eric Xing @ CMU, 005-06

More information

Link Operations for Slowing the Spread of Disease in Complex Networks. Abstract

Link Operations for Slowing the Spread of Disease in Complex Networks. Abstract PACS: 89.75.Hc; 88.80.Cd; 89.65.Ef Revision 1: Major Areas with Changes are Highlighted in Red Link Operations for Slowing the Spread of Disease in Complex Networks Adrian N. Bishop and Iman Shames NICTA,

More information

Stochastic Processes

Stochastic Processes Introduction and Techniques Lecture 4 in Financial Mathematics UiO-STK4510 Autumn 2015 Teacher: S. Ortiz-Latorre Stochastic Processes 1 Stochastic Processes De nition 1 Let (E; E) be a measurable space

More information

Labor Economics, Lecture 11: Partial Equilibrium Sequential Search

Labor Economics, Lecture 11: Partial Equilibrium Sequential Search Labor Economics, 14.661. Lecture 11: Partial Equilibrium Sequential Search Daron Acemoglu MIT December 6, 2011. Daron Acemoglu (MIT) Sequential Search December 6, 2011. 1 / 43 Introduction Introduction

More information

Corrections to Theory of Asset Pricing (2008), Pearson, Boston, MA

Corrections to Theory of Asset Pricing (2008), Pearson, Boston, MA Theory of Asset Pricing George Pennacchi Corrections to Theory of Asset Pricing (8), Pearson, Boston, MA. Page 7. Revise the Independence Axiom to read: For any two lotteries P and P, P P if and only if

More information

Quantum Dynamics. March 10, 2017

Quantum Dynamics. March 10, 2017 Quantum Dynamics March 0, 07 As in classical mechanics, time is a parameter in quantum mechanics. It is distinct from space in the sense that, while we have Hermitian operators, X, for position and therefore

More information

LIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE

LIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE International Journal of Applied Mathematics Volume 31 No. 18, 41-49 ISSN: 1311-178 (printed version); ISSN: 1314-86 (on-line version) doi: http://dx.doi.org/1.173/ijam.v31i.6 LIMITING PROBABILITY TRANSITION

More information

ECS 289 / MAE 298, Lecture 7 April 22, Percolation and Epidemiology on Networks, Part 2 Searching on networks

ECS 289 / MAE 298, Lecture 7 April 22, Percolation and Epidemiology on Networks, Part 2 Searching on networks ECS 289 / MAE 298, Lecture 7 April 22, 2014 Percolation and Epidemiology on Networks, Part 2 Searching on networks 28 project pitches turned in Announcements We are compiling them into one file to share

More information

Nonnegative and spectral matrix theory Lecture notes

Nonnegative and spectral matrix theory Lecture notes Nonnegative and spectral matrix theory Lecture notes Dario Fasino, University of Udine (Italy) Lecture notes for the first part of the course Nonnegative and spectral matrix theory with applications to

More information

DIFFERENTIATION RULES

DIFFERENTIATION RULES 3 DIFFERENTIATION RULES DIFFERENTIATION RULES 3.6 Derivatives of Logarithmic Functions In this section, we: use implicit differentiation to find the derivatives of the logarithmic functions and, in particular,

More information