Integral equations for the heterogeneous, Markovian SIS process with time-dependent rates in time-variant networks
|
|
- Leonard Leslie Greer
- 5 years ago
- Views:
Transcription
1 Integral equations for the heterogeneous, Markovian SIS process with time-dependent rates in time-variant networks P. Van Mieghem Delft University of Technology 2 April 208 Abstract We reformulate the governing equation for the nodal infection probability of the eact heterogeneous SIS process with time-dependent infection and curing rates on any network into two equivalent integral equations, that provide a di erent view on and a more natural description of the SIS dynamic process in temporal or time-variant networks. From the integral equations, we deduce general bounds. Introduction A huge number of papers has studied the SIS epidemic process on networks [], mainly because of three reasons. First, the SIS epidemic models a simpli ed version of a di usion process, which describes a kind of transport between nodes of its underlying graph [2]. Transport of items between nodes is major function of a network and is often approimated to rst order by an epidemic type of stochastic di usion, such as real viruses and diseases in a population, malware in digital communication networks and the spread of information (ideas, opinions, news, alarms, etc.) in social networks. Second and as earlier mentioned in [3], the SIS epidemic process is one of the simplest members of a particularly popular class of dynamic processes on networks called the Local rule-global emergent properties (LrGep) class, where the collective action of the local rules eecuted at each node gives rise to a comple, emergent global behavior. Some eamples of the LrGep-class are epidemic models (such as SIS and SIR) and more general reaction-di usion processes [], the Ising spin model [4], the Kuramoto coupled-oscillator model [5], sandpiles as models for self-organized criticality [6, 7, 8] and opinion models [9, 0]. Many LrGep models depend heavily on the underlying network topology and feature, in general, a phase transition []. The phase transition of the SIS and SIR epidemic models are similar to that of the Kuramoto-type of synchronization models, an observation that has received attention in human brain networks (see e.g. [2]). Third, we believe that the Markovian SIS epidemic model has the highest potential to analytically study that phase transition in networks. Pursuing the latter is still a worthwhile endeavor, because, so far, there does not eist (apart from asymptotic Faculty of Electrical Engineering, Mathematics and Computer Science, P.O Bo 503, 2600 GA Delft, The Netherlands; P.F.A.VanMieghem@tudelft.nl
2 studies [3]) an eact analysis, not even for the complete graph [4]. Before continuing, we remark that the phase transition in SIS and SIR epidemics occurs due to a change in the parameters (ratio of infection to curing rate) of the model, which might be di erent from a phase transition due to the non-linear dynamics of the process. Both the SIS and SIR Markovian model on any network are linear processes (as any Markov process [5]) and linear dynamic processes do not ehibit jumps, limit cycles nor chaotic behavior that may occur in some non-linear processes [6]. Here, the most general description of a heterogeneous Markovian SIS process with time-dependent rates on a time-variant network is recast into integral equations. Our main results are the derivations of integral equations (7) and (9) from the SIS governing di erential equation for the nodal infection probability, from which bounds are deduced in Section 4. 2 Markovian SIS governing equation The graph G of the network consists of the set N of N nodes and the set L of L links and is represented by an N N adjacency matri A with elements a ij = if there is a directed link from node i to j, else a ij = 0. The eact heterogeneous Markovian SIS governing equation [7, 5, 8] for the infection probability E [X i ] = Pr [X i = ] of node i is de [X i (t)] = E " i X i (t) + ( X i (t)) # ki a ki X k (t) where the Bernoulli random variable X i 2 f0; g de nes the two possible states, the infected state X i = and the healthy state X i = 0 of node i. The nodal curing is a Poisson process with rate i, while the infection from node k towards node i is also described by a Poisson process with rate ki. All Poisson processes are independent. When node i is infected at time t and X i (t) =, only the rst term in () on the right-hand side between the brackets [:] a ects and decreases with rate i the change in infection probability with time d Pr[X i(t)=] (left-hand side in ()). When node i by a rate P N k= kia ki X k (t) due to all its infected, direct neighbors. We de ne the nodal curing vector e = ( ; 2 ; : : : ; N ) and the weighted adjacency matri A e with element ea ij = ij a ij. Both the topology is healthy and X i (t) = 0, only the second term between the brackets [:] increases d Pr[X i(t)=] and the rates may dependent upon time; thus e A is generally a time-variant, asymmetric matri with zero elements on the diagonal (ea ii = 0 for all i N). An epidemic spreads along infectious links, which are network links with one end node infected and the other end node healthy. The probability that there is an infectious link directed from node i to j is Pr [X i = ; X j = 0] = E [X i ( X j )] = E [X i ] E [X i X j ] (2) which vanishes if i = j. With the de nition (2), the SIS governing equation () becomes de [X i (t)] + i (t) E [X i (t)] = k= () ea ki (t) Pr [X k (t) = ; X i (t) = 0] (3) k= These joint probabilities Pr [X k = ; X i = 0] in a Markovian SIS process can be determined precisely as shown in [7, 5], but require the knowledge of the joint probabilities over all triples of nodal 2
3 states, which in turn requires all combinations of four nodal states and so on. Eventually, the eact determination leads to 2 N linear di erential equations and this eponentially large number in N is a nger print of the NP-hard nature of SIS epidemics on networks. Using in (3) the conditional probability Pr [X k = ; X i = 0] = Pr [X k = jx i = 0] Pr [X i = 0] and E [X i ] = Pr [X i = 0], an alternative form of the heterogeneous Markovian SIS governing equation is de [X i (t)] + f i (t) + b i (t)g E [X i (t)] = b i (t) (4) where the overall infection rate of the healthy node i from all its neighbors is b i (t) = ea ki (t) Pr [X k (t) = jx i (t) = 0] (5) k= which will play a crucial role in the sequel. If de[x i(t)] = 0 at a time t = > 0, then the infection probability Pr [X i () = ] = E [X i ()] of node i is etremal and equal to Pr [X i () = ] = b i () i () + b i () (6) which resembles [9] the steady-state infection probability of node i in the N-Intertwined Mean-Field Approimation (NIMFA) [20], that led to a partial fraction epansion [2]. 3 An integral equation for Markovian SIS epidemics In appendi A, we reformulate a linear di erential equation of the type of the SIS di erential equation (4) into an integral equation. We apply (2) to the SIS di erential equation (4) and deduce the integral equation Pr [X i (t) = 0] = i (s) e s f i(u)+b i (u)gdu ds + Pr [X i () = 0] e f i(u)+b i (u)gdu connecting the healthy probability of node i at any two time points t and. The integral representation (7) may more naturally describe temporal networks [22], whose topology (and thus adjacency matri) changes over time. The complicating quantity in (7) is b i (t) de ned in (5), where the infectious treat ea ki (u) Pr [X k (u) = jx i (u) = 0] towards the healthy node i from its neighbor k, depends on the product of three independent factors: (7) the link eistence a ki (u) at time u which enables the transmission, the infection rate ki (u) at time u which characterizes the strength of the infectious activity and the likeliness Pr [X k (u) = jx i (u) = 0] of transmission over link k! i, because the SIS process only spreads over infectious links. The positive integrand in (7) shows that the probability that node i is healthy is always positive in a nite graph, provided that the curing rate i (s) is not zero at all times s 2 (0; t] and the infection rates ij are nite. When the time t increases while < t is ed and the curing rate i (u) i;min > 0, the last term containing the in uence of Pr [X i () = 0] at time on the actual healthy probability at time t disappears eponentially fast. The asymptotic time regime follows from (7) as lim Pr [X i (t) = 0] = lim t! t! i (s) e R s f i(u)+b i (u)gdu ds 3 e f i(u)+b i (u)gdu
4 Using de Hospital s rule and assuming that the limits lim t! i (t) = i; and lim t! ea ki (t) = ea ki; in (5) eist, we nd that lim Pr [X i (t) = 0] = t! i; i; + P N k= ea ki; lim t! Pr [X k (t) = jx i (t) = 0] which has the form (6) of an etremal probability. The governing equation () does not contain information to conclude that lim t! Pr [X k (t) = jx i (t) = 0] = 0, but, in any nite graph [23, 5], the SIS epidemic process ends in the absorbing, all-healthy state where lim t! Pr [X i (t) = 0] = for any node i 2 N. In other words, the infection has disappeared in the network after su ciently long time. The homogeneous case with ed rates ( ij (t) =, i (t) = and e ective infection rate = ) is the simplest version of the general epression (7), Pr [X i (t) = 0] = e (t s) e P N k= a ki s Pr[X k(u)=jx i (u)=0]du ds + Pr [X i () = 0] e (t ) e P N k= a ki Pr[X k(u)=jx i (u)=0]du (8) The homogeneous NIMFA reformulation, where v k (u) approimates the nodal infection probability Pr [X k (u) = ] by assuming independence such that v k (u) = Pr [X k (u) = ] = Pr [X k (u) = jx i (u) = 0], follows from (8) with v k (u) = v i (t) = e (+d i)(t v k (u) as s) e P N k= a ki s vk(u)du ds + v i () e (+d i)(t ) e P N k= a ki v k(u)du For an SIS Markovian process with ed rates, we know [24] that E [X i X j ] E [X i ] E [X j ], so that Pr [X k (u) = jx i (u) = 0] Pr [X k (u) = ]. Then, (8) shows that NIMFA lower bounds the healthy nodal probability, Pr [X i (t) = 0] v i (t), as found earlier [3]. 3. An alternative integral equation to (7) We demonstrate in Appendi B that the integral equation (7) is equivalent to ln Pr [Xi (t) = 0] = Pr [X i () = 0] i (u) Pr [X i (u) = ] Pr [X i (u) = 0] du A general integrated governing equation is presented in (28) in Appendi B. b i (u) du (9) By the mean-value theorem (see e.g. [5, Chapter 5]), there eist a point in time 2 [; t] for which (9) equals ln Pr[Xi (t)=0] Pr[X i ()=0] Pr [X i () = ] = i () t Pr [X i () = ] b i () (0) If the interval [; t] is not large, we may assume that Pr [X i () = ] at a particular (unknown) time is a good approimation for Pr [X i (u) = ] at any time point u 2 (; t). Thus, for a suitably chosen timestep h = t time approimation,, we may transform the continuous-time setting from (0) or from (27) into a discrete Pr [X i (t k+ ) = 0] = Pr [X i (t k ) = 0] e h i (t k ) Pr[X i (t k )=] Pr[X i (t k )=] 4 b i (t k )
5 where the (k + )-th time slot is epressed in terms of the k-th time slot, in which the infection probability Pr [X i (u) = ] = Pr [X i (t k ) = ] is constant for all u 2 [t k ; t k + h) in time slot k and t k+ = t k + h. Such approimation might be valuable for an actual disease spread over a timevariant contact network, especially when additional information about the conditional probability Pr [X k (t k ) = jx i (t k ) = 0] can be obtained. After solving (0) for Pr [X i () = ], we obtain Pr [X i () = ] = b i () + i () + b i () + Pr[X ln i (t)=0] Pr[X i ()=0] t ln Pr[X i (t)=0] Pr[X i ()=0] t and () resembles the etremal probability (6), but now complemented by the di erential quotient ln(pr[x i(t)=0]) ln(pr[x i ()=0]) t that involves the infection probabilities at the beginning time and ending time t of the interval [; t]. This generalized form () for a particular (unknown) time may suggest that each infection probability at time t obeys, to rst order, the etremal probability form Pr [X i (t) = ] = i (t) r i (t)+r i (t), in which r i (t) is a correction to the infectious link activity b i (t) = P N k= ea ki (t) Pr [X k (t) = jx i (t) = 0] at time t towards node i, when healthy, from all its infected neighbors. The SIS process possesses a quasi-stationary regime, also called the metastable regime. In the metastable regime, the nodal infection or healthy probability hardly changes anymore. Hence, if both time and t belong to the metastable regime, then Pr [X i (t) = 0] ' Pr [X i () = 0] ' Pr [X i (u) = 0] for u 2 [; t], so that () reduces to the equilibrium form given by the etremal probability (6). However, it is possible that Pr [X i (t) = 0] = Pr [X i () = 0] for a time and t in the transient regime as reported in [8], but where Pr [X i (u) = 0] for u 2 [; t] is not equal to Pr [X i (t) = 0] = Pr [X i () = 0] so that the etremal probability form () may not be a good approimation for those intermediate time points u 2 [; t]. The SIS process in some graphs may be not unimodal, implying that there is more than one nite time at which etremes (satisfying de[x i(t)] = 0 and (6)) are reached. 4 Bounds In addition to a general conveity bound (29) derived in Appendi B, we will deduce an upper and lower bound for Pr [X i (t) = ] by bounding () where i (; t) ea ik (u) du ea ki (u) Pr [X k (u) = jx i (u) = 0] du i (; t) ea ik (u) du i (; t) = i (; t) = ma Pr [X k (u) = jx i (u) = 0] (2) k2n i and u2[;t] min Pr [X k (u) = jx i (u) = 0] (3) k2n i and u2[;t] and N i denotes the set of neighbors of node i. Thus, i (; t) (and similarly for i (; t) ) is the probability of occurrence of the most (least) infectious link incident to a healthy node i during Non-unimodality was rst observed by Joel Miller and communicated to me. 5
6 the time interval [; t]. The de nition (2) for ed and small = c and large t = T suggests that the higher i (c; T ) is, the better node i is reachable. Hence, i (c; T ) can be considered as a centrality or importance measure for node i, such as betweenness, closeness and the diagonal element of the pseudo-inverse of the Laplacian [2] and suggests that i (c; T ) may be approimated by topology information from the adjacency matri A. By the non-negative SIS correlation property [24], we have Pr [X k (u) = jx i (u) = 0] Pr [X k (u) = ], so that i (; t) The minimum i (; t) in (7) produces the upper bound Pr [X i (t) = 0] i (s) e ma Pr [X k (u) = ] (4) k2n i and u2[;t] s f i (u)+ i (;t) e d i (u)gdu ds + Pr [X i () = 0] e f i (u)+ i (;t) e d i (u)gdu where d e i (u) = P N k= ea ik (u) is the time-dependent, weighted degree of node i. The maimum i (; t) in (7) produces the lower bound We use Pr [X i (t) = 0] i (s) e s f i (u)+ i (;t) e d i (u)gdu ds + Pr [X i () = 0] e i (s) er s f i (u)+ i (;t) e d i (u)gdu ds = e f i (u)+ i (;t) e d i (u)gdu i (; t) f i (u)+ i (;t) e d i (u)gdu ed i (s) er s 0 f i (u)+ i (;t) e d i (u)gdu ds in the above bounds for Pr [X i (t) = 0] to obtain bounds for the probability Pr [X i (t) = ] that node i is infected at time t: Pr [X i (t) = ] i (; t) Pr [X i (t) = ] i (; t) ed i (s) e ed i (s) e s f i (u)+ i (;t) e d i (u)gdu ds + Pr [X i () = ] e s f i (u)+ i (;t) e d i (u)gdu ds + Pr [X i () = ] e f i (u)+ i (;t) e d i (u)gdu f i (u)+ i (;t) e d i (u)gdu The rst integral over s in the above bounds is always positive, but generally di cult to evaluate. The inequalities for the homogenous case with constant rates simplify to Pr [X i (t) = ] i (; t) d i + e (+ i(;t)d i )(t ) Pr [X i () = ] + i (; t) d i Pr [X i (t) = ] i (; t) d i + e (+ i(;t)d i )(t ) Pr [X i () = ] + i (; t) d i i (; t) d i + i (; t) d i i (; t) d i + i (; t) d i with equality at t =. The upper bound (analogously for the lower bound) only eceeds (5) (6) i (;t)d i + i (;t)d i for nite time t provided the infection probability at time is Pr [X i () = ] > i(;t)d i + i (;t)d i. These bounds (5) and (6) resemble the time-dependent solution of a general continuous-time two-state Markov process [5, p. 23], which is also the underlying basis for NIMFA as eplained in [2, Sec. 2. and Fig..]. After su ciently large time t = T to ignore the initial condition at time (i.e. e T Pr [X i () = ] << ), the inequalities (5) and (6) simply with = to i (; T ) d i + i (; T ) d i Pr [X i (T ) = ] 6 i (; T ) d i + i (; T ) d i (7)
7 Similarly, the etremal probability (6) for constant rates can be bounded as i (; ) d i + i (; ) d i Pr [X i () = ] i (; ) d i + i (; ) d i The correspondence with (7) indicates that the quasi-stationary (or metastable) SIS regime attained after time T operates around the maimal value within bounds depending on infectious links. The smaller the di erence i (; T ) i (; T ), the sharper and more promising the above bounds will be. Also, (7) supports the earlier claim based upon () that the nodal infection probability can be approimated by Pr [X i (t) = ] r i i (t)+r i. De ning the maimum possible infection probability v ma = ma k2n and u2[0;t ] Pr [X k (u) = ] in the interval [0; T ], then the upper bound on i (; t) in (4) shows that i (0; T ) v ma and the upper bound in (7) is v mad i Pr [X i (T ) = ] + v ma d i whereas the corresponding upper bound for the steady-state infection probability v i in NIMFA [5, Theorem on p. 464] obeys v i d i + d i If v ma occurs at node i, the above upper bound becomes v ma d i, v ma d i d ma vmad i +v mad i and, equivalently for For any regular graph with degree r, we thus observe that Pr [X i (T ) = ] r, while equality holds in NIMFA. Despite the lack of a companion of (4) for the minimum min = min i2n i (0; t) in (3), we can proceed similarly, min d i + min d i Pr [X i (T ) = ] If the minimum possible infection probability v min in the interval [0; T ] occurs at node k, then min d min + min d min mind k + min d k v min from which an upper bound for the e ective infection rate follows as min d min v min v min (8) More equations for the e ective infection rate of this type are presented in Appendi C. 5 Summary Integral equations (7) and (9) for the most general Markovian setting of SIS epidemics are derived. The analysis illustrates that only the N rst, linear Markovian equations (, 4, 3) for the nodal infection probabilities alone out of the 2 N other equations for joint probabilities are elegantly bounded by the etremal probability form (6,) and the bounds resemble the behavior of the corresponding N non-linear NIMFA equations. 7
8 References [] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespignani. Epidemic processes in comple networks. Review of Modern Physics, 87(3): , September 205. [2] P. Van Mieghem, K. Devrien, and H. Cetinay. Pseudo-inverse of the Laplacian and best spreader node in a network. Physical Review E, 96(3):0323, September 207. [3] P. Van Mieghem and R. van de Bovenkamp. Accuracy criterion for the mean- eld approimation in SIS epidemics on networks. Physical Review E, 9(3):03282, March 205. [4] L. Onsager. Crystal statistics: A two-dimensional model with an order-disorder transition. Physical Review, 65(3 and 4):7 49, February 944. [5] S. H. Strogatz. From Kuramoto to Crawford: eploring the onset of synchronization in populations of coupled oscillators. Physica D, 43: 20, [6] P. Bak, C. Tang, and K. Wiesenfeld. Self-organized criticality: An eplanation of /f noise. Physical Review Letters, 59(4):38 384, July 987. [7] K.-I. Goh, D.-S. Lee, B. Kahng, and D. Kim. Sandpile on scale-free networks. Physical Review Letters, 9(4):4870, October [8] T. Kleiberg and P. Van Mieghem. Self-organization of Internet paths. IFIP Fourth International Workshop on Self-Organizing Systems, December 9-, ETH Zurich, Switzerland, [9] C. Castellano, S. Fortunato, and V. Loreto. Statistical physics of social dynamics. Reviews of Modern Physics, 8:59 646, April-June [0] Q. Li, L. A. Braunstein, H. Wang, J. Shao, H. E. Stanley, and S. Havlin. Non-consensus opinion models on comple networks. Journal of Statistical Physics, 5(-2):92 2, 203. [] H. E. Stanley. Introduction to Phase Transitions and Critical Phenomena. Oford University Press, July 987. [2] J. Meier, X. Zhou, A. Hillebrand, P. Tewarie, C. J. Stam, and P. Van Mieghem. The epidemic spreading model and the direction of information ow in brain networks. NeuroImage, 52: , 207. [3] E. Cator and P. Van Mieghem. Susceptible-Infected-Susceptible epidemics on the complete graph and the star graph: Eact analysis. Physical Review E, 87():028, January 203. [4] P. Van Mieghem. Time evolution of SIS epidemics in the complete graph. Delft University of Technology, Report ( [5] P. Van Mieghem. Performance Analysis of Comple Networks and Systems. Cambridge University Press, Cambridge, U.K., 204. [6] S. H. Strogatz. Non-linear dynamics and chaos. Addison-Wesley Publishing Company, Reading, Massachusetts, USA, 994. [7] E. Cator and P. Van Mieghem. Second order mean- eld SIS epidemic threshold. Physical Review E, 85(5):056, May 202. [8] P. Van Mieghem. Universality of the SIS prevalence in networks. Delft University of Technology, Report ( arxiv: , 206. [9] P. Van Mieghem, J. Omic, and R. E. Kooij. Virus spread in networks. IEEE/ACM Transactions on Networking, 7(): 4, February [20] K. Devrien and P. Van Mieghem. Universal mean- eld framework for SIS epidemics on networks, based on graph partitioning and the isoperimetric inequality. Physical Review E, 96(5):05234, November 207. [2] P. Van Mieghem. The N - Intertwined SIS epidemic network model. Computing, 93(2):47 69, 20. [22] P. Holme and J. Saramäki. Temporal networks. Physics Reports, 59:97 25, 202. [23] P. Van Mieghem and E. Cator. Epidemics in networks with nodal self-infections and the epidemic threshold. Physical Review E, 86():066, July
9 [24] E. Cator and P. Van Mieghem. Nodal infection in Markovian SIS and SIR epidemics on networks are non-negatively correlated. Physical Review E, 89(5):052802, 204. [25] P. M. Morse and H. Feshbach. Methods of Theoretical Physics. McGraw-Hill Book Company, New York, 978. [26] P. Van Mieghem. SIS epidemics with time-dependent rates describing ageing of information spread and mutation of pathogens. Delft University of Technology, Report ( [27] P. Van Mieghem, F. D. Sahneh, and C. Scoglio. Eact Markovian SIR and SIS epidemics on networks and an upper bound for the epidemic threshold. Proceedings of the 53rd IEEE Conference on Decision and Control (CDC204), December 5-7, Los Angeles, CA, USA, 204. [28] P. Van Mieghem. Approimate formula and bounds for the time-varying SIS prevalence in networks. Physical Review E, 93(5):05232, 206. [29] Q. Liu and P. Van Mieghem. Evaluation of an analytic, approimate formula for the time-varying SIS prevalence in di erent networks. Physica A, 47: , 207. [30] P. Van Mieghem and K. Devrien. An Epidemic Perspective on the Cut Size in Networks. Delft University of Technology, Report ( A Linear rst order di erential equation We rewrite (4) as df (t) + g (t) f (t) = g (t) i (t) (9) where f (t) = E [X i (t)] and g (t) = i (t) + b i (t) = G (f (t)), where G (:) is an unknown function. Since the dependence of g (t) on f (t) is unknown, the solution of the di erential equation (9) (see e.g. [25, Sec. 5.2]) f (t) = ep 0 Z s g (u) du ep g (u) du (g (s) i (s)) ds + f (0) 0 0 epresses f (t) in terms of g (t) and thus results in an integral equation for f (t), rather than in its solution. After integrating the rst term, Z s ep g (u) du g (s) ds = ep g (u) du and some rearrangements, we arrive at f (t) = (s) ep 0 s g (u) du ds + f f (0)g ep We rewrite the di erential equation (4) with the de nition b i (t) in (5) as 0 g (u) du d Pr [X i (t) = 0] + f i (t) + b i (t)g Pr [X i (t) = 0] = i (t) (22) Only if is a constant (independent of time) and assuming that G (h (t)) = i + b i (t) eists and is known, then the above di erential equation becomes with h (t) = Pr [X i (t) = 0] = dh (t) + G (h (t)) h (t) = i f (t), (20) (2) 9
10 whose solution is Z h(t) h(0) i d G () = t Let dh() d = i G(), then H (h (t)) H (h (0)) = t and the eplicit solution is h (t) = H (t + H (h (0))). For the particular eample where g (t) = f (t), the di erential equation (9) becomes a generalized logistic or non-linear Bernoulli di erential equation df(t) f (t) = f 2 (t), which describes, in the mean- eld approimation, the probability v (t) of infection in a node at time t in a regular graph G with degree r obeying dv (t) = r (t) v (t) ( v (t)) (t) v (t) (23) where the infection rate (t) and the curing rate (t) are general non-negative real functions of time t. By the same technique variation of a constant, we nd in [26] the solution R t ep 0 (r (u) (u)) du v (t) = v 0 + r 0 (s) ep R s 0 (r (u) (u)) du ds where v 0 is the initial fraction of infected nodes. (24) B The function p i (t; q) and proofs of (9) We give two proofs of (9): after introducing the function p i (t; q) in (25), the rst proof transforms the integral equation (7) into (9), while the second proof of (9) is based on the governing SIS equation (). Proof : Let us denote p i (t; q) = Pr [X i (t) = 0] e q f i(u)+b i (u)gdu (25) where q is an arbitrary point in time, then the integral equation (7) can be recast as p i (t; q) p i (; q) = i (s) er s q f i(u)+b i (u)gdu ds After invoking the de nition (25), we obtain an integral equation in p i (t; q), p i (t; q) p i (; q) = i (s) p i (s; q) ds (26) Pr [X i (s) = 0] Since the integrand is non-negative, then p i (t; q) p i (; q) for t > and p i (t; q) is non-decreasing in time t. Given p i (; q), we can iterate the integral equation (26). After n iterations, we obtain the series of multiple integrals, Z p i (t; q) t p i (; q) = i (t ) Pr [X i (t ) = 0] + i (t ) Pr [X i (t ) = 0] i (t ) Pr [X i (t ) = 0] n p i (t n ; q) p i (; q) i (t 2 ) 2 Pr [X i (t 2 ) = 0] i (t n ) n Pr [X i (t n ) = 0] 0
11 Using the multiple integral formula (which can be veri ed by partial integration ) yields i (t ) Pr [X i (t ) = 0] n p i (t; q) p i (; q) = + X k= Z t k! The last integral can be bounded as Z i (t ) tn Pr [X i (t ) = 0] Z i (t 2 ) tn 2 Pr [X i (t 2 ) = 0] k Z i (s) ds t + Pr [X i (s) = 0] p i (t n ; q) p i (; q) i (t n ) n Pr [X i (t n ) = 0] = n! Z i (t ) tn Pr [X i (t ) = 0] i (t n ) n Pr [X i (t n ) = 0] p Z i (t; q) t p i (; q) n! n i (s) ds Pr [X i (s) = 0] p i (t n ; q) p i (; q) and illustrates that the series converges in any nite interval when n!. Hence, p i (t; q) p i (; q) = + X k= Z t k! k Z i (s) ds t = ep Pr [X i (s) = 0] i (t n ) n Pr [X i (t n ) = 0] n i (s) ds Pr [X i (s) = 0] i (s) ds Pr [X i (s) = 0] Introducing the de nition (25) of p i (t; ) results in which can be rewritten as (9). Pr [X i (t) = 0] e f i(u)+b i (u)gdu Pr [X i () = 0] i (s) ds = ep Pr [X i (s) = 0] Proof 2: We can generalize (9) to any integrable function h () = dh() d as (27) H (Pr [X i (t) = 0]) H (Pr [X i () = 0]) = h (Pr [X i (u) = 0]) d Pr [X i (u) = 0] du du Introducing the governing SIS equation (22) for the healthy probability Pr [X i (u) = 0] leads to the general formula H (q)j Pr[X i(t)=0] Pr[X i ()=0] = h (Pr [X i (u) = 0]) i (u) Pr [X i (u) = ] where the special case h () = leads to (9).! ea ki (u) Pr [X k (u) = ; X i (u) = 0] du k= (28) Lemma Provided that the curing rate i (t), the function p t+ i (t; q), de ned in (25), is i (0) conve for all time t. Proof: Di erentiating (26) with respect to time t yields dp i (t; q) = i (t) Pr [X i (t) = 0] p i (t; q) A second di erentiation, in which we use the above rst order di erential, leads to ( d 2 ) p i (t; q) d i (t) i (t) 2 2 = + p i (t; q) Pr [X i (t) = 0] Pr [X i (t) = 0]
12 and d 2 p i (t; q) 2 = i (t) + 0 i (t) i (t) Pr [X i (t) = 0] Introducing the governing equation (22) yields d Pr [X i (t) = 0] i (t) p i (t; q) (Pr [X i (t) = 0]) 2 d 2 p i (t; q) 2 = 0 i (t) i (t) + i (t) + b i (t) i (t) p i (t; q) Pr [X i (t) = 0] which is always non-negative provided 0 i (t) i (t) + i (t) 0, which is, after integration, equivalent to the condition stated in Lemma. As a consequence of Lemma, we conclude for a constant curing rate i (t) = i that p i (t; q) is always conve. Applying the conveity de nition (see e.g. [5, p. 0]), p i (u + ( ) v; q) p i (u; q) + ( ) p i (v; q) with 2 [0; ] where i (t) obeys the condition in Lemma, then the epression (27), after choosing = u, leads to a bound involving the healthy probability where the time e = u + ( ) v 2 [u; v]: e R u+( u )v i (s)ds Pr[X i (s)=0] + ( ) er v u i (s)ds Pr[X i (s)=0] (29) C The prevalence and e ective infection rate Summing (3) over all nodes and rewritten in terms of the prevalence " # y (t) = Pr [X i (t) = ] = E X i (t) N N i= de ned as the epected fraction of infected nodes in a graph at time t, yields i= (30) dy (t) + N i (t) E [X i (t)] = N i= ea ki (t) Pr [X k = ; X i = 0] i= k= Only when all curing rates i (t) = (t) are equal, we nd a di erential equation in the prevalence dy (t) + (t) y (t) = N ea ki (t) Pr [X k = ; X i = 0] i= k= Earlier, we have demonstrated in [27] and further studied in [28, 29], that dy (t ; ) = y (t ; ) + h i N E w (t ; ) T Qw (t ; ) where t = t is the scaled time, Q = A is the Laplacian of the graph G with = diag(d ; d 2 ; : : : ; d N ) and d i is the degree of node i in G, and the Bernoulli vector w = (X ; X 2 ; : : : ; X N ). If we con ne ourselves for simplicity to ed rates and a time-invariant topology, then the comparison with (3) shows that the average number of links in the cut-set between healthy and infected nodes is (3) E w T Qw = a ki Pr [X k = ; X i = 0] (32) i= k= 2
13 which is investigated further in [30]. In the metastable regime, the homogeneous case with ed rates ( ij (t) =, i (t) = ) and time-invariant topology a ki (t) = a ki in (6) with (5) satis es to a very good approimation Pr [X i () = ] = P N k= a ki Pr [X k () = jx i () = 0] + P N k= a ki Pr [X k () = jx i () = 0] from which the e ective infection rate = is solved as = Pr [X i () = ] P N k= a ki Pr [X k () = ; X i () = 0] (33) The e ective infection rate can also be solved 2 from (3) with (32) in terms of the prevalence as = y () N P N i= P N k= a ki Pr [X k () = ; X i () = 0] (34) We revisit the deduction 3 from [27] and rewrite (34) as = P N k= Pr [X k () = ] P N i= a ki Pr [X i () = 0jX k () = ] P N k= Pr [X k () = ] for a time, somewhere in the metastable regime (see Section 3.). Now Pr [X i (t) = 0jX k (t) = ] = Pr [X i (t) = 0] Pr [X k (t) = ] Pr [X k (t) = jx i (t) = 0] appears as the probability that node i is healthy given an infected neighbor k, which opposes the dual conditional probability Pr [X k (t) = jx i (t) = 0] above and both conditional probabilities are only equal when Pr [X i (t) = 0] = Pr [X k (t) = ], i.e. when both nodes have equal probability to be in an opposite state at any time t. Upper and lower bounding in the usual way leads to min kn i= a ki Pr [X i () = 0jX k () = ] ma kn Using the degree d i = P N j= a ij and con ning to the lower bound, we have min kn i= a ki Pr [X i () = 0jX k () = ] a ki Pr [X i () = 0jX k () = ] min min Pr [X i () = 0jX l () = ] d k kn (i;l)2l After a similar treatment of the upper bound, we arrive at i= d min min Pr [X i () = 0jX l () = ] d ma ma Pr [X i () = 0jX k () = ] (35) (i;l)2l (i;l)2l We remark that min = min i2n i () = min (i;l)2l and u2[0;] Pr [X k (u) = jx i (u) = 0], epressed in dual conditional probability, appears in (8) and is di erent from the above. 2 Also by summing (33) over all nodes after obvious manipulations. 3 Earlier, (34) has already appeared in the proof of Theorem in [5, p. 458] and in [27]. The last part of the proof in [5, p. 459] was, unfortunately erroneous and thus also Theorem 7.3.2, as reported in [28]. 3
SIS epidemics on Networks
SIS epidemics on etworks Piet Van Mieghem in collaboration with Eric Cator, Ruud van de Bovenkamp, Cong Li, Stojan Trajanovski, Dongchao Guo, Annalisa Socievole and Huijuan Wang 1 EURADOM 30 June-2 July,
More informationDie-out Probability in SIS Epidemic Processes on Networks
Die-out Probability in SIS Epidemic Processes on etworks Qiang Liu and Piet Van Mieghem Abstract An accurate approximate formula of the die-out probability in a SIS epidemic process on a network is proposed.
More informationNetwork Science & Telecommunications
Network Science & Telecommunications Piet Van Mieghem 1 ITC30 Networking Science Vision Day 5 September 2018, Vienna Outline Networks Birth of Network Science Function and graph Outlook 1 Network: service(s)
More informationSpectral Graph Theory for. Dynamic Processes on Networks
Spectral Graph Theory for Dynamic Processes on etworks Piet Van Mieghem in collaboration with Huijuan Wang, Dragan Stevanovic, Fernando Kuipers, Stojan Trajanovski, Dajie Liu, Cong Li, Javier Martin-Hernandez,
More informationOn Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study
The 1 st Net-X (2017) On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study Cong Li Adaptive Networks and Control Lab, Fudan University Collaborators: Xiaojie Li, Jianbo Wang,
More informationEpidemics in Complex Networks and Phase Transitions
Master M2 Sciences de la Matière ENS de Lyon 2015-2016 Phase Transitions and Critical Phenomena Epidemics in Complex Networks and Phase Transitions Jordan Cambe January 13, 2016 Abstract Spreading phenomena
More informationGi en Demand for Several Goods
Gi en Demand for Several Goods Peter Norman Sørensen January 28, 2011 Abstract The utility maimizing consumer s demand function may simultaneously possess the Gi en property for any number of goods strictly
More informationWE FOCUS ON A simple continuous-time model for the
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 1, FEBRUARY 2009 1 Virus Spread in Networks Piet Van Mieghem, Member, IEEE, Jasmina Omic, and Robert Kooij Abstract The influence of the network characteristics
More informationLecture VI Introduction to complex networks. Santo Fortunato
Lecture VI Introduction to complex networks Santo Fortunato Plan of the course I. Networks: definitions, characteristics, basic concepts in graph theory II. III. IV. Real world networks: basic properties
More informationA new centrality measure for probabilistic diffusion in network
ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 5, No., September 204 ISSN : 2322-557 A new centrality measure for probabilistic diffusion in network Kiyotaka Ide, Akira Namatame,
More informationA BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS
U.P.B. Sci. Bull., Series A, Vol. 76, Iss. 2, 2014 ISSN 1223-7027 A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS Yilun SHANG 1 Epidemiological network models study the spread
More informationM445: Heat equation with sources
M5: Heat equation with sources David Gurarie I. On Fourier and Newton s cooling laws The Newton s law claims the temperature rate to be proportional to the di erence: d dt T = (T T ) () The Fourier law
More informationApproximate inference, Sampling & Variational inference Fall Cours 9 November 25
Approimate inference, Sampling & Variational inference Fall 2015 Cours 9 November 25 Enseignant: Guillaume Obozinski Scribe: Basile Clément, Nathan de Lara 9.1 Approimate inference with MCMC 9.1.1 Gibbs
More informationAn Optimal Control Problem Over Infected Networks
Proceedings of the International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 15-16 214 Paper No. 125 An Optimal Control Problem Over Infected Networks Ali Khanafer,
More informationFixed Point Theorem and Sequences in One or Two Dimensions
Fied Point Theorem and Sequences in One or Two Dimensions Dr. Wei-Chi Yang Let us consider a recursive sequence of n+ = n + sin n and the initial value can be an real number. Then we would like to ask
More informationThe Spreading of Epidemics in Complex Networks
The Spreading of Epidemics in Complex Networks Xiangyu Song PHY 563 Term Paper, Department of Physics, UIUC May 8, 2017 Abstract The spreading of epidemics in complex networks has been extensively studied
More informationOptimally decreasing the spectral radius of a graph by link removals
Optimally decreasing the spectral radius of a graph by link removals Piet Van Mieghem, Dragan Stevanović y, Fernando Kuipers, Cong Li, Ruud van de Bovenkamp, Daijie Liu and Huijuan Wang Delft University
More informationAnalytically tractable processes on networks
University of California San Diego CERTH, 25 May 2011 Outline Motivation 1 Motivation Networks Random walk and Consensus Epidemic models Spreading processes on networks 2 Networks Motivation Networks Random
More informationSource Locating of Spreading Dynamics in Temporal Networks
Source Locating of Spreading Dynamics in Temporal Networks Qiangjuan Huang School of Science National University of Defense Technology Changsha, Hunan, China qiangjuanhuang@foxmail.com «Supervised by Professor
More informationdx dx x sec tan d 1 4 tan 2 2 csc d 2 ln 2 x 2 5x 6 C 2 ln 2 ln x ln x 3 x 2 C Now, suppose you had observed that x 3
CHAPTER 8 Integration Techniques, L Hôpital s Rule, and Improper Integrals Section 8. Partial Fractions Understand the concept of a partial fraction decomposition. Use partial fraction decomposition with
More informationGeneralized Epidemic Mean-Field Model for Spreading Processes Over Multilayer Complex Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 5, OCTOBER 2013 1609 Generalized Epidemic Mean-Field Model for Spreading Processes Over Multilayer Complex Networks Faryad Darabi Sahneh, Member,IEEE,CaterinaScoglio,Member,IEEE,and
More informationNonlinear Oscillations and Chaos
CHAPTER 4 Nonlinear Oscillations and Chaos 4-. l l = l + d s d d l l = l + d m θ m (a) (b) (c) The unetended length of each spring is, as shown in (a). In order to attach the mass m, each spring must be
More informationDirected graphs and mysterious complex eigenvalues
Directed graphs and mysterious complex eigenvalues Piet Van Mieghem! Delft University of Technology version 1: 5 Dec 018 for Nathanís birthday Abstract After the addition of one directed link with weight!>0
More information(a) Show that there is a root α of f (x) = 0 in the interval [1.2, 1.3]. (2)
. f() = 4 cosec 4 +, where is in radians. (a) Show that there is a root α of f () = 0 in the interval [.,.3]. Show that the equation f() = 0 can be written in the form = + sin 4 Use the iterative formula
More informationTime: 1 hour 30 minutes
Paper Reference(s) 6665/01 Edecel GCE Core Mathematics C Silver Level S Time: 1 hour 0 minutes Materials required for eamination papers Mathematical Formulae (Green) Items included with question Nil Candidates
More informationECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence
ECS 289 F / MAE 298, Lecture 15 May 20, 2014 Diffusion, Cascades and Influence Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic thresholds
More informationToward Understanding Spatial Dependence on Epidemic Thresholds in Networks
Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Zesheng Chen Department of Computer Science Indiana University - Purdue University Fort Wayne, Indiana 4685 Email: chenz@ipfw.edu
More informationNotes on Mathematical Expectations and Classes of Distributions Introduction to Econometric Theory Econ. 770
Notes on Mathematical Expectations and Classes of Distributions Introduction to Econometric Theory Econ. 77 Jonathan B. Hill Dept. of Economics University of North Carolina - Chapel Hill October 4, 2 MATHEMATICAL
More informationSusceptible-infected-susceptible epidemics on networks with general infection and cure times
PHYSICAL REVIEW E 87,686(3) Susceptible-infected-susceptible epidemics on networks with general infection and cure times E. Cator,,* R. van de Bovenkamp,, and P. Van Mieghem, Faculty of Science, Radboud
More informationState Space and Hidden Markov Models
State Space and Hidden Markov Models Kunsch H.R. State Space and Hidden Markov Models. ETH- Zurich Zurich; Aliaksandr Hubin Oslo 2014 Contents 1. Introduction 2. Markov Chains 3. Hidden Markov and State
More informationIt is convenient to introduce some notation for this type of problems. I will write this as. max u (x 1 ; x 2 ) subj. to. p 1 x 1 + p 2 x 2 m ;
4 Calculus Review 4.1 The Utility Maimization Problem As a motivating eample, consider the problem facing a consumer that needs to allocate a given budget over two commodities sold at (linear) prices p
More informationTaylor Series and Series Convergence (Online)
7in 0in Felder c02_online.te V3 - February 9, 205 9:5 A.M. Page CHAPTER 2 Taylor Series and Series Convergence (Online) 2.8 Asymptotic Epansions In introductory calculus classes the statement this series
More informationStochastic modelling of epidemic spread
Stochastic modelling of epidemic spread Julien Arino Department of Mathematics University of Manitoba Winnipeg Julien Arino@umanitoba.ca 19 May 2012 1 Introduction 2 Stochastic processes 3 The SIS model
More informationChapter 5 Symbolic Increments
Chapter 5 Symbolic Increments The main idea of di erential calculus is that small changes in smooth functions are approimately linear. In Chapter 3, we saw that most microscopic views of graphs appear
More informationAnswer Key 1973 BC 1969 BC 24. A 14. A 24. C 25. A 26. C 27. C 28. D 29. C 30. D 31. C 13. C 12. D 12. E 3. A 32. B 27. E 34. C 14. D 25. B 26.
Answer Key 969 BC 97 BC. C. E. B. D 5. E 6. B 7. D 8. C 9. D. A. B. E. C. D 5. B 6. B 7. B 8. E 9. C. A. B. E. D. C 5. A 6. C 7. C 8. D 9. C. D. C. B. A. D 5. A 6. B 7. D 8. A 9. D. E. D. B. E. E 5. E.
More informationDynamical models of HIV-AIDS e ect on population growth
Dynamical models of HV-ADS e ect on population growth David Gurarie May 11, 2005 Abstract We review some known dynamical models of epidemics, given by coupled systems of di erential equations, and propose
More informationChapter 3 Single Random Variables and Probability Distributions (Part 1)
Chapter 3 Single Random Variables and Probability Distributions (Part 1) Contents What is a Random Variable? Probability Distribution Functions Cumulative Distribution Function Probability Density Function
More informationMultidimensional partitions of unity and Gaussian terrains
and Gaussian terrains Richard A. Bale, Jeff P. Grossman, Gary F. Margrave, and Michael P. Lamoureu ABSTRACT Partitions of unity play an important rôle as amplitude-preserving windows for nonstationary
More informationLAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC
LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC R. G. DOLGOARSHINNYKH Abstract. We establish law of large numbers for SIRS stochastic epidemic processes: as the population size increases the paths of SIRS epidemic
More informationGrowing a Network on a Given Substrate
Growing a Network on a Given Substrate 1 Babak Fotouhi and Michael G. Rabbat Department of Electrical and Computer Engineering McGill University, Montréal, Québec, Canada Email: babak.fotouhi@mail.mcgill.ca,
More informationLecture 4.2 Finite Difference Approximation
Lecture 4. Finite Difference Approimation 1 Discretization As stated in Lecture 1.0, there are three steps in numerically solving the differential equations. They are: 1. Discretization of the domain by
More informationPartial Fractions. dx dx x sec tan d 1 4 tan 2. 2 csc d. csc cot C. 2x 5. 2 ln. 2 x 2 5x 6 C. 2 ln. 2 ln x
460_080.qd //04 :08 PM Page CHAPTER 8 Integration Techniques, L Hôpital s Rule, and Improper Integrals Section 8. Partial Fractions Understand the concept of a partial fraction decomposition. Use partial
More informationTHE near-threshold behavior, i.e. the behavior around the
etwork localization is unalterable by infections in bursts Qiang Liu and Piet Van Mieghem arxiv:80.0880v [physics.soc-ph] Dec 08 Abstract To shed light on the disease localization phenomenon, we study
More informationStochastic modelling of epidemic spread
Stochastic modelling of epidemic spread Julien Arino Centre for Research on Inner City Health St Michael s Hospital Toronto On leave from Department of Mathematics University of Manitoba Julien Arino@umanitoba.ca
More informationTraining, Search and Wage Dispersion Technical Appendix
Training, Search and Wage Dispersion Technical Appendix Chao Fu University of Wisconsin-Madison October, 200 Abstract This paper combines on-the-job search and human capital theory to study the coexistence
More informationThe minimal spectral radius of graphs with a given diameter
Linear Algebra and its Applications 43 (007) 408 419 www.elsevier.com/locate/laa The minimal spectral radius of graphs with a given diameter E.R. van Dam a,, R.E. Kooij b,c a Tilburg University, Department
More informationChapter 9. Derivatives. Josef Leydold Mathematical Methods WS 2018/19 9 Derivatives 1 / 51. f x. (x 0, f (x 0 ))
Chapter 9 Derivatives Josef Leydold Mathematical Methods WS 208/9 9 Derivatives / 5 Difference Quotient Let f : R R be some function. The the ratio f = f ( 0 + ) f ( 0 ) = f ( 0) 0 is called difference
More informationCSCI-6971 Lecture Notes: Probability theory
CSCI-6971 Lecture Notes: Probability theory Kristopher R. Beevers Department of Computer Science Rensselaer Polytechnic Institute beevek@cs.rpi.edu January 31, 2006 1 Properties of probabilities Let, A,
More informationPricing of Cyber Insurance Contracts in a Network Model
Pricing of Cyber Insurance Contracts in a Network Model Stefan Weber Leibniz Universität Hannover www.stochastik.uni-hannover.de (joint work with Matthias Fahrenwaldt & Kerstin Weske) WU Wien December
More informationChapter 6. Nonlinear Equations. 6.1 The Problem of Nonlinear Root-finding. 6.2 Rate of Convergence
Chapter 6 Nonlinear Equations 6. The Problem of Nonlinear Root-finding In this module we consider the problem of using numerical techniques to find the roots of nonlinear equations, f () =. Initially we
More informationSocial Influence in Online Social Networks. Epidemiological Models. Epidemic Process
Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor
More informationSpreading and Opinion Dynamics in Social Networks
Spreading and Opinion Dynamics in Social Networks Gyorgy Korniss Rensselaer Polytechnic Institute 05/27/2013 1 Simple Models for Epidemiological and Social Contagion Susceptible-Infected-Susceptible (SIS)
More informationLecture 3: September 10
CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 3: September 10 Lecturer: Prof. Alistair Sinclair Scribes: Andrew H. Chan, Piyush Srivastava Disclaimer: These notes have not
More informationTail Approximation of the Skew-Normal by the Skew-Normal Laplace: Application to Owen s T Function and the Bivariate Normal Distribution
Journal of Statistical and Econometric ethods vol. no. 3 - ISS: 5-557 print version 5-565online Scienpress Ltd 3 Tail Approimation of the Skew-ormal by the Skew-ormal Laplace: Application to Owen s T Function
More informationReconciling two-component power spectra
Reconciling two-component power spectra Charles L. Rino Institute for Scienti c Research, Boston College, Chestnut Hill, MA, USA and Charles S. Carrano Institute for Scienti c Research, Boston College,
More informationThe incomplete gamma functions. Notes by G.J.O. Jameson. These notes incorporate the Math. Gazette article [Jam1], with some extra material.
The incomplete gamma functions Notes by G.J.O. Jameson These notes incorporate the Math. Gazette article [Jam], with some etra material. Definitions and elementary properties functions: Recall the integral
More informationMath 1B Final Exam, Solution. Prof. Mina Aganagic Lecture 2, Spring (6 points) Use substitution and integration by parts to find:
Math B Final Eam, Solution Prof. Mina Aganagic Lecture 2, Spring 20 The eam is closed book, apart from a sheet of notes 8. Calculators are not allowed. It is your responsibility to write your answers clearly..
More informationEstimating network degree distributions from sampled networks: An inverse problem
Estimating network degree distributions from sampled networks: An inverse problem Eric D. Kolaczyk Dept of Mathematics and Statistics, Boston University kolaczyk@bu.edu Introduction: Networks and Degree
More informationMarkov-modulated interactions in SIR epidemics
Markov-modulated interactions in SIR epidemics E. Almaraz 1, A. Gómez-Corral 2 (1)Departamento de Estadística e Investigación Operativa, Facultad de Ciencias Matemáticas (UCM), (2)Instituto de Ciencias
More information1. Sets A set is any collection of elements. Examples: - the set of even numbers between zero and the set of colors on the national flag.
San Francisco State University Math Review Notes Michael Bar Sets A set is any collection of elements Eamples: a A {,,4,6,8,} - the set of even numbers between zero and b B { red, white, bule} - the set
More informationMEI Core 2. Sequences and series. Section 1: Definitions and Notation
Notes and Eamples MEI Core Sequences and series Section : Definitions and Notation In this section you will learn definitions and notation involving sequences and series, and some different ways in which
More informationAgreement algorithms for synchronization of clocks in nodes of stochastic networks
UDC 519.248: 62 192 Agreement algorithms for synchronization of clocks in nodes of stochastic networks L. Manita, A. Manita National Research University Higher School of Economics, Moscow Institute of
More informationA Study on Relationship between Modularity and Diffusion Dynamics in Networks from Spectral Analysis Perspective
A Study on Relationship between Modularity and Diffusion Dynamics in Networks from Spectral Analysis Perspective Kiyotaka Ide, Akira Namatame Department of Computer Science National Defense Academy of
More informationPotential Game approach to virus attacks in network with general topology
Potential Game approach to virus attacks in network with general topology François-Xavier Legenvre, Yezekael Hayel, Eitan Altman To cite this version: François-Xavier Legenvre, Yezekael Hayel, Eitan Altman.
More informationA node-based SIRS epidemic model with infective media on complex networks
A node-based SIRS epidemic model with infective media on complex networks Leyi Zheng a and Longkun Tang, a, b arxiv:191.111v1 [physics.soc-ph] 1 Jan 219 a Fujian Province University Key Laboratory of Computation
More informationTHE inverse tangent function is an elementary mathematical
A Sharp Double Inequality for the Inverse Tangent Function Gholamreza Alirezaei arxiv:307.983v [cs.it] 8 Jul 03 Abstract The inverse tangent function can be bounded by different inequalities, for eample
More informationReview of elements of Calculus (functions in one variable)
Review of elements of Calculus (functions in one variable) Mainly adapted from the lectures of prof Greg Kelly Hanford High School, Richland Washington http://online.math.uh.edu/houstonact/ https://sites.google.com/site/gkellymath/home/calculuspowerpoints
More informationLecture 5: Rules of Differentiation. First Order Derivatives
Lecture 5: Rules of Differentiation First order derivatives Higher order derivatives Partial differentiation Higher order partials Differentials Derivatives of implicit functions Generalized implicit function
More informationPhase Transitions of an Epidemic Spreading Model in Small-World Networks
Commun. Theor. Phys. 55 (2011) 1127 1131 Vol. 55, No. 6, June 15, 2011 Phase Transitions of an Epidemic Spreading Model in Small-World Networks HUA Da-Yin (Ù ) and GAO Ke (Ô ) Department of Physics, Ningbo
More informationPolynomial Functions of Higher Degree
SAMPLE CHAPTER. NOT FOR DISTRIBUTION. 4 Polynomial Functions of Higher Degree Polynomial functions of degree greater than 2 can be used to model data such as the annual temperature fluctuations in Daytona
More information= 1 2 x (x 1) + 1 {x} (1 {x}). [t] dt = 1 x (x 1) + O (1), [t] dt = 1 2 x2 + O (x), (where the error is not now zero when x is an integer.
Problem Sheet,. i) Draw the graphs for [] and {}. ii) Show that for α R, α+ α [t] dt = α and α+ α {t} dt =. Hint Split these integrals at the integer which must lie in any interval of length, such as [α,
More informationErrata for the ASM Study Manual for Exam P, Fourth Edition By Dr. Krzysztof M. Ostaszewski, FSA, CFA, MAAA
Errata for the ASM Study Manual for Exam P, Fourth Edition By Dr. Krzysztof M. Ostaszewski, FSA, CFA, MAAA (krzysio@krzysio.net) Effective July 5, 3, only the latest edition of this manual will have its
More informationQuestion 1. (8 points) The following diagram shows the graphs of eight equations.
MAC 2233/-6 Business Calculus, Spring 2 Final Eam Name: Date: 5/3/2 Time: :am-2:nn Section: Show ALL steps. One hundred points equal % Question. (8 points) The following diagram shows the graphs of eight
More informationIdentifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda 4
Int. J. Complex Systems in Science vol. 3(1) (2013), pp. 97 105 Identifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda
More informationCourse. Print and use this sheet in conjunction with MathinSite s Maclaurin Series applet and worksheet.
Maclaurin Series Learning Outcomes After reading this theory sheet, you should recognise the difference between a function and its polynomial epansion (if it eists!) understand what is meant by a series
More informationTOPICS IN HOMOGENIZATION OF DIFFERENTIAL EQUATIONS 7
TOPICS IN HOMOGENIZATION OF DIFFERENTIAL EQUATIONS 7. Two-scale asymptotic epansions method We will illustrate this method by applying it to an elliptic boundary value problem for the unknown u : æ R given
More informationA Basic Course in Real Analysis Prof. P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur
A Basic Course in Real Analysis Prof. P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur Lecture - 36 Application of MVT, Darbou Theorem, L Hospital Rule (Refer Slide
More informationTime: 1 hour 30 minutes
Paper Reference(s) 6666/0 Edecel GCE Core Mathematics C4 Gold Level (Harder) G Time: hour 0 minutes Materials required for eamination Mathematical Formulae (Green) Items included with question papers Nil
More informationPractice Midterm Solutions
Practice Midterm Solutions Math 4B: Ordinary Differential Equations Winter 20 University of California, Santa Barbara TA: Victoria Kala DO NOT LOOK AT THESE SOLUTIONS UNTIL YOU HAVE ATTEMPTED EVERY PROBLEM
More informationKalavakkam, Chennai, , Tamilnadu, INDIA 2,3 School of Advanced Sciences. VIT University Vellore, , Tamilnadu, INDIA
International Journal of Pure and Applied Mathematics Volume 09 No. 4 206, 799-82 ISSN: 3-8080 (printed version); ISSN: 34-3395 (on-line version) url: http://www.ijpam.eu doi: 0.2732/ijpam.v09i4.4 PAijpam.eu
More informationThe N-intertwined SIS epidemic network model
Computing 0 93:47 69 DOI 0.007/s00607-0-055-y The N-intertwined SIS epidemic network model Piet Van Mieghem Received: September 0 / Accepted: 7 September 0 / Published online: 3 October 0 The Authors 0.
More informationGlobal Stability of a Computer Virus Model with Cure and Vertical Transmission
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 3, Issue 1, January 016, PP 16-4 ISSN 349-4840 (Print) & ISSN 349-4859 (Online) www.arcjournals.org Global
More informationarxiv: v1 [cond-mat.stat-mech] 6 Mar 2008
CD2dBS-v2 Convergence dynamics of 2-dimensional isotropic and anisotropic Bak-Sneppen models Burhan Bakar and Ugur Tirnakli Department of Physics, Faculty of Science, Ege University, 35100 Izmir, Turkey
More informationEconomics Bulletin, 2012, Vol. 32 No. 1 pp Introduction. 2. The preliminaries
1. Introduction In this paper we reconsider the problem of axiomatizing scoring rules. Early results on this problem are due to Smith (1973) and Young (1975). They characterized social welfare and social
More information1 Which sets have volume 0?
Math 540 Spring 0 Notes #0 More on integration Which sets have volume 0? The theorem at the end of the last section makes this an important question. (Measure theory would supersede it, however.) Theorem
More informationThe Optimal Depletion of Exhaustible Resources: A Complete Characterization.
The Optimal Depletion of haustible Resources: A Complete Characterization. Hassan Benchekroun a and Cees Withagen b Abstract We provide the closed form solution to the Dasgupta-Heal-Solow-Stiglitz (DHSS)
More informationTMA 4195 Mathematical Modeling, 30 November 2006 Solution with additional comments
TMA 495 Mathematical Modeling, 30 November 006 Solution with additional comments Problem A cookbook states a cooking time of 3.5 hours at the oven temperature T oven For a 0 kg (American) turkey, 7 hours
More informationModelling of the Hand-Foot-Mouth-Disease with the Carrier Population
Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Ruzhang Zhao, Lijun Yang Department of Mathematical Science, Tsinghua University, China. Corresponding author. Email: lyang@math.tsinghua.edu.cn,
More informationImproved Bounds on the Epidemic Threshold of Exact SIS Models on Complex Networks
Improved Bounds on the Epidemic Threshold of Exact SIS Models on Complex Networks Navid Azizan Ruhi, Christos Thrampoulidis and Babak Hassibi Abstract The SIS (susceptible-infected-susceptible) epidemic
More informationProbabilistic Graphical Models
School of Computer Science Probabilistic Graphical Models Gaussian graphical models and Ising models: modeling networks Eric Xing Lecture 0, February 5, 06 Reading: See class website Eric Xing @ CMU, 005-06
More informationLink Operations for Slowing the Spread of Disease in Complex Networks. Abstract
PACS: 89.75.Hc; 88.80.Cd; 89.65.Ef Revision 1: Major Areas with Changes are Highlighted in Red Link Operations for Slowing the Spread of Disease in Complex Networks Adrian N. Bishop and Iman Shames NICTA,
More informationStochastic Processes
Introduction and Techniques Lecture 4 in Financial Mathematics UiO-STK4510 Autumn 2015 Teacher: S. Ortiz-Latorre Stochastic Processes 1 Stochastic Processes De nition 1 Let (E; E) be a measurable space
More informationLabor Economics, Lecture 11: Partial Equilibrium Sequential Search
Labor Economics, 14.661. Lecture 11: Partial Equilibrium Sequential Search Daron Acemoglu MIT December 6, 2011. Daron Acemoglu (MIT) Sequential Search December 6, 2011. 1 / 43 Introduction Introduction
More informationCorrections to Theory of Asset Pricing (2008), Pearson, Boston, MA
Theory of Asset Pricing George Pennacchi Corrections to Theory of Asset Pricing (8), Pearson, Boston, MA. Page 7. Revise the Independence Axiom to read: For any two lotteries P and P, P P if and only if
More informationQuantum Dynamics. March 10, 2017
Quantum Dynamics March 0, 07 As in classical mechanics, time is a parameter in quantum mechanics. It is distinct from space in the sense that, while we have Hermitian operators, X, for position and therefore
More informationLIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE
International Journal of Applied Mathematics Volume 31 No. 18, 41-49 ISSN: 1311-178 (printed version); ISSN: 1314-86 (on-line version) doi: http://dx.doi.org/1.173/ijam.v31i.6 LIMITING PROBABILITY TRANSITION
More informationECS 289 / MAE 298, Lecture 7 April 22, Percolation and Epidemiology on Networks, Part 2 Searching on networks
ECS 289 / MAE 298, Lecture 7 April 22, 2014 Percolation and Epidemiology on Networks, Part 2 Searching on networks 28 project pitches turned in Announcements We are compiling them into one file to share
More informationNonnegative and spectral matrix theory Lecture notes
Nonnegative and spectral matrix theory Lecture notes Dario Fasino, University of Udine (Italy) Lecture notes for the first part of the course Nonnegative and spectral matrix theory with applications to
More informationDIFFERENTIATION RULES
3 DIFFERENTIATION RULES DIFFERENTIATION RULES 3.6 Derivatives of Logarithmic Functions In this section, we: use implicit differentiation to find the derivatives of the logarithmic functions and, in particular,
More information