Next Article in Journal
Flexible Sample Environments for the Investigation of Soft Matter at the European Spallation Source: Part III—The Macroscopic Foam Cell
Next Article in Special Issue
Route Path Selection Optimization Scheme Based Link Quality Estimation and Critical Switch Awareness for Software Defined Networks
Previous Article in Journal
Three-Dimensional Reconstruction-Based Vibration Measurement of Bridge Model Using UAVs
Previous Article in Special Issue
International Airline Alliance Network Design with Uncertainty
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Protection Strategy for Edge-Weighted Graphs in Disease Spread

by
Ronald Manríquez
1,*,
Camilo Guerrero-Nancuante
2,* and
Carla Taramasco
3,4,*
1
Laboratorio de Investigación Lab[e]saM, Departamento de Matemática y Estadística, Universidad de Playa Ancha, 2340000 Valparaíso, Chile
2
Escuela de Enfermería, Universidad de Valparaíso, 2520000 Viña del Mar, Chile
3
Escuela de Ingeniería Civil Informática, Universidad de Valparaíso, 2340000 Valparaíso, Chile
4
Centro Nacional de Sistemas de Información en Salud, 8320000 Santiago, Chile
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2021, 11(11), 5115; https://doi.org/10.3390/app11115115
Submission received: 6 May 2021 / Revised: 21 May 2021 / Accepted: 26 May 2021 / Published: 31 May 2021
(This article belongs to the Special Issue Design of Reliable and Robust Networks)

Abstract

:
Fake news, viruses on computer systems or infectious diseases on communities are some of the problems that are addressed by researchers dedicated to study complex networks. The immunization process is the solution to these challenges and hence the importance of obtaining immunization strategies that control these spreads. In this paper, we evaluate the effectiveness of the DIL-W α ranking in the immunization of nodes that are attacked by an infectious disease that spreads on an edge-weighted graph using a graph-based SIR model. The experimentation was done on real and scale-free networks and the results illustrate the benefits of this ranking.

1. Introduction

For more than 2 decades, the complex networks have been the focus of many researchers due to their multiple applications in economy, traffic problems, spread of diseases, electrical networks, biological systems and the famous social networks (see for instance [1,2,3,4,5,6,7]). Furthermore, in discrete mathematics the most important object is the graph.
Modeling the spread of disease over networks has many applications in real life. For example, rumors or spam that spread on large social networks such as Facebook or Twitter [8], viruses that spread through computer systems [9], or diseases that spread over a population such as it does the actual SARS-CoV-2 (see for instance [10]). This leads to solve the problem of totally or partially controlling these spreads.
It is well known that a set of nodes can spread disease over the entire network. The nodes that have this characteristic are called influencing nodes or spreader nodes. Consequently, determining this type of nodes is crucial for the objective of controlling spreads over networks. That is, we can prevent the spread of contagious diseases over a network by immunizing the influencing nodes. In that direction, efforts have been directed in many investigations in the last time. Among them, Pastor-Satorras and Vespignani in [11] concluded that uniform random immunization of nodes does not lead to the eradication of infections in all networks, while targeted immunization drastically reduces the vulnerability of the network to epidemic attacks. In [12] the authors provided a purely local strategy, which requires minimal information about the randomly selected nodes. Tong et al. [13] proposed NetShield: an effective immunization strategy which use the properties of matrix perturbation. A few years later (2016) its NetShield+ variant appears to balance the optimization quality and speed [14]. The authors in [15] use different features of the organization of the network to identify influential diffusers. In 2014 and 2015 Zhang and Prakash developed DAVA and DAVA-fast, two methods in which all infected nodes merge into a supernode by constructing a weighted dominator tree of the input network [16,17]. Song et al. in [18] provided NIIP, which selects k nodes to immunize over a period of time. For each time point, the NIIP algorithm will take decisions about which nodes to immunize given the estimated value of k for that time point. In [19], Gupta et al. also agree that community structure is important for understanding the spread of an epidemic. Wang et al. propose a dynamic minimization model of the influence of a rumor with the user experience (DRIMUX), considering both the global popularity and the individual attraction of the rumor [20]. GraphShield method is developed by Wijayanto and Murata in [21] taking into account the function of infection flow, graphics connectivity and top-grade centrality. Saxena et al. designed a method to identify the best ranked nodes in order to control an epidemic through immunizations [22]. Ghalmane et al. analyzed the nonoverlapping community structure network based on an immunization strategy, recognizing the relevance of the node given the characteristics of the communities [23], while the same author asserts that modular centrality must include the influences of the nodes both in their own communities and in others [24]. In [25] the authors introduced ReProtect and ReProtect-p methods, which divide the size of protection budget into several turns and protect nodes according to the currently observed temporal snapshot of dynamic networks. Tang et al. [26] proposed the weighted K-order propagation number algorithm to extract the disease propagation based on the network topology to evaluate the node importance.
In [27], the authors show that the DIL-W α ranking provides good results, regarding the rate of decline in network efficiency (more details in [28]). Furthermore, one of the good qualities of the DIL-W α ranking is that it recognizes the importance of bridge nodes, these nodes are those that connect the peripheral nodes and the peripheral groups with the rest of the network (see more details in [29]). This attribute is inherited from the version of the DIL ranking for graphs not weighted at the edges (see [30]). For this reason, we have chosen this ranking to evaluate its effectiveness in the immunization of nodes that are attacked by an infectious disease that spreads on an edge-weighted graph. The immunization is done according to the importance ranking list produced by DIL-W α ranking. The effectiveness is measured with the ratio of vertices that remain uninfected at the end of the disease over the total numbers of vertices subject to budget protection. The experimentation was done on real and scale-free networks.
The paper is organized as follows. Section 2 contains generalities about graph theory and the DIL-W α ranking. In Section 3, we provide definitions of the protection of a graph when a disease spreads on it. Moreover, we state the protection strategy. Section 4 is devoted to run simulations on test networks (Zacharys karate club network, Wild birds network, Sandy authors network and CAG-mat72 network) and scale-free networks and it also provides a discussion about the results. Moreover, we address the variation in the survival rate when the protection budget is modified. Finally, we give the conclusions in Section 5.

2. Basic Definitions

2.1. Graphs

The following definitions come from [31,32].
Definition 1.
A graph G is a finite nonempty set V of objects called vertices together with a possibly empty set E of 2-element subsets of V called edges.
To indicate that a graph G has vertex set V and edge set E, we write G = ( V , E ) . If the set of vertices is V = { v 1 , v 2 , , v n } , then the edge between vertex v i and vertex v j is denoted by e i j .
If e i j is an edge of G, then v i and v j are adjacent vertices. Two adjacent vertices are referred to as neighbors of each other. The set of neighbors of a vertex v is called the open neighborhood of v (or simply the neighborhood of v) and is denoted by N ( v ) . If e i j and e j k are distinct edges in G, then e i j and e j k are adjacent edges.
Definition 2.
The number of vertices in a graph G is the order of G and the number of edges is the size of G.
Definition 3.
The degree of a vertex v in a graph G, denoted by d e g ( v ) , is the number of vertices in G that are adjacent to v. Thus, the degree of v is the number of vertices in its neighborhood N ( v ) .
On the other hand, an important generalization of the simple graph consists in the definition of weighted graph, more specifically edge-weighted graph. Informally, an edge-weighted graph is a graph whose edges have been assigned a weight.
Definition 4.
An edge-weighted graph is a pair ( G , w ) where G = ( V , E ) is a graph and w : E R is a weight function. If e i j E then w ( e i j ) = w i j .
The adjacency matrix of G is the n × n matrix A ( G ) = [ a i j ] , or simply A = [ a i j ] , where
a i j = w i j if e i j E ( G ) 0 if e i j E ( G ) .
Definition 5.
The strength of a vertex v i , denoted by S ( v i ) , is defined as the sum of the weights of all edges incident to it, this is to say
S ( v i ) = v j N ( v i ) w i j .

2.2. DIL-W α Ranking

The following definition comes from [27,33].
Let us consider an undirected weighted graph ( G , w ) with G = ( V , E ) and V = { v 1 , v 2 , , v n } .
Definition 6
(Degree centrality [33]). The degree centrality of v i V of an edge-weighted graph ( G , w ) , denoted by C D w α ( v i ) , is defined as
C D w α ( v i ) = d e g ( v i ) ( 1 α ) · S ( v i ) α ,
where α [ 0 , 1 ] .
The parameter α is called tuning parameter. Notice that when α = 0 then C D w α ( v i ) = d e g ( v i ) and when α = 1 then C D w α ( v i ) = S ( v i ) .
Definition 7
(Importance edge [27]). The importance of an edge e i j E , denoted by I α ( e i j ) , is defined as
I α ( e i j ) = C D w α ( v i ) p i α · C D w α ( v j ) p j α λ α ,
where, for k { i , j } , p k α = ( p + 1 ) ( 1 α ) · t k α with p is the number of triangles, one edge of the triangle is e i j , t k α is the weight of the sum of the edges incident to v k that form a triangle with e i j and λ α = p ( 1 α ) · t i + t j α 2 + 1 .
Definition 8
(Contribution [27]). The contribution that v i V makes to the importance of the edge e i j , denoted by W α ( e i j ) , is defined as
W α ( e i j ) = I α ( e i j ) · C D w α ( v i ) w i j α C D w α ( v i ) + C D w α ( v j ) 2 w i j α ,
where w i j is the weight of e i j .
Definition 9
(Importance of vertex DIL-W α [27]). The importance of a vertex v i V , denoted by L α ( v i ) , is defined as
L α ( v i ) = C D w α ( v i ) + v j N ( v i ) W α ( e i j ) .
From the definition of Degree centrality (Definition 6) proposed by Opsahl in [33], we can see that when the tuning parameter α is 0 the Definitions 7, 8 and 9 of importance edge, contribution, and importance of vertex respectively, are the same than the proposed by Liu et al. in [30] for an undirected and unweighted network.

3. Strategy Protection

In this section, we provide definitions of the protection of a graph when a disease spreads on it. Moreover, we state the protection strategy.
Definition 10.
Protecting a vertex means removing all of its corresponding edge (See Figure 1).
It is also possible to find in the literature that protecting a vertex means removing the vertex from the graph. See for instance [13].
Definition 11.
The numbers of vertices allowed to protect is called protection budget, denoted by k.
It is clear that k Z + .
Definition 12.
We will say that the survival rate, denoted by σ, is the ratio of vertices that remain uninfected at the end of disease over the total numbers of vertices.
Therefore, our problem is: given a graph G = ( E , V ) , SIR model, and a protection budget k, the goal is to find a set of vertices S V such that
θ * = arg max S V σ ,
with | S | = k . However, the problem (2) is NP-Hard (see [34]).
It is well known that an index to measure the connection of a graph is the efficiency of the networks (see [35]). High connectivity of the graph indicates high efficiency. In [27] the authors show that the DIL-W α ranking provides good results, regarding the rate of decline in network efficiency (more details in [28]), when it comes to eliminating the nodes best positioned by this ranking. One of the good qualities of the DIL-W α ranking is that it recognizes the importance of bridge nodes (see more in [29]). This quality is inherited from the version of the DIL ranking for graphs not weighted at the edges (see [30]). For this reason, we have chosen this ranking to evaluate its effectiveness in the immunization of nodes that are attacked by an infectious disease that spreads on an edge-weighted graph.
From the results in [36], we have that 5% to 10% of important nodes can cause the entire network to fail. According to the latter, our protection budget k will be 10% of the network nodes.
In summary, we protect the ten percent of the network nodes according to the importance ranking list produced by DIL-W α .

4. Simulation of Disease Spread with Protection and Analysis Results

4.1. Data and Methodology

The protection tests are carried out on 4 networks, these are: Zacharys karate club network [37] (with 34 nodes and 78 edges), wild bird network [38] (with 131 nodes and 1444 edges), Sandy authors network [39] (with 86 nodes and 124 edges), and CAG-mat72 (with 72 nodes and 678 edges) where each network will have the immunization corresponding to the 10% of its highest ranked nodes according to the DIL-W α ranking [27], strength of the node [40], weighted betweenness centrality [41], weighted closeness centrality [42], and Laplacian centrality for undirected and edge-weighted graph [43]. For the ranking DIL-W α , we consider 3 different values for α , they are 0, 0.5 and 1. In this way, we compare how the protection performs according to the value of α . Finally, the databases of our test networks can be found in [44].

4.2. Simulation of Disease

In this work, we use a graph-based SIR model in the same way as in [10], that is, each individual is represented by a vertex in an edge-weighted graph. At time t, each vertex v i is in a state v i t belonging to S = { 0 , 1 , 1 } , where 0 , 1 and 1 represent the three discrete states: susceptible (S), infected (I) and recovered (R). Let G be an edge-weighted graph. We set
N I ( v i ) = v N ( v i ) : v I .
At time t + Δ t , the vertex v i will change of state according to probabilistic rules:
  • The probability ( P I ( v i ) ) that a susceptible vertex v i is infected by one of its neighbors is given by
    P I ( v i ) = v j N I ( v i ) ρ Δ t · w i j ,
    where ρ is a purely biological factor and representative of the disease and w i j is the weight of the edge e i j . Notice that the expression (4) can be deduced from the infection model called q-influence, assuming q = ρ . (see [45,46]).
  • The probability ( P R ( v i ) ) that an infected vertex v i at time t will recover is given by
    P R ( v i ) = δ Δ t ,
    where δ is the recovery rate.
Moreover, we assume that the disease is present for a certain period of time and when individuals recover, they are immune.
The initial population contains one infected node and all the simulations considering δ = 1 15 . For each network, it was consider a different ρ , so in each case the percentage of population affected is similar. Table 1 shows the different ρ for each test network.
Finally, 2000 simulations on each network of disease were performed. Figure 2 shows the results.
In Sandy authors and CAG-mat72 networks the DIL-W 0 ranking performs the best with respect to the minimum peak of the infected curve, respectively. Furthermore, DIL-W 0.5 ranking comes second in both networks. The Strength and Laplacian rankings perform the best with respect to the minimum peak of the infected curve in Zachary karate club network. The DIL-W 0.5 and DIL-W 1 rankings are in fourth and fifth place respectively. However, the computational complexity of Laplacian and Strength is O ( n · max v V ( d e g ( v ) ) and O ( m ) respectively, while DIL-W α has a computational complexity of O ( n · < k > ) (see [30] or [27]), where n is the total number of vertices of the graph, m is the total number of edges of the graph, and < k > is the average degree of vertices in the graph. In Wild bird network, DIL-W 1 performs better in the same criterion.
On the other hand, regarding the decrease of the infected curve, DIL-W α performs the best in Wild bird, Sandy authors, and CAG-mat72 networks. The Laplacian is better on the Zachary network. The above is summarized in the survival rate. In Table 2, we can see the survival rates obtained according to the protections applied to each network.

4.3. Survival Rate

In this Section, we address the variation in the survival rate ( σ ) when the protection budget (k) is modified. As we have seen in the above Section, k is the 10% of the network nodes. The variation of k is between 5 and 50 percent of the network nodes. On each test network and each protection budget 2000 simulations were done. Figure 3 shows the results.
We can see that, at the beginning (that is considering k = 5 % ), DIL-W α is always among the first 3 places with the highest survival rate in Wild bird, Zachary karate club, and Sandy authors networks. Even in the CAG-mat72 network it ranks fourth, very close to the tops.
With the 10% protection budget, DIL-W 0 , DIL-W 0.5 , and DIL-W 1 perform best with the top three spots on Wild birds and CAG-mat72 networks. It similarly happens in Sandy-authors network since DIL-W 1 has a very close rate to that generated by the betweenness ranking ( 0.9613 and 0.9616 respectively). In Zachary karate club network the strength ranking performs better with this protection budget. The DIL-W 0 ranking occupies the third position behind Laplacian ranking who performs second. However, DIL-W 0 has minor computational complexity than Laplacian.
Finally, with 50% of the network nodes as the protection budget, in the CAG-mat72 network DIL-W 0 and DIL-W 1 rankings are better performed. In the Wild-birds network, the betweenness and strength rankings finish with the best performance respectively. The DIL-W 1 ranking follows. In the Sandy authors network, DIL-W 0.5 performs better while in the Zachary network, betweenness and strength displace DIL-W 1 to third place. Table A1,Table A2,Table A3 and Table A4 show in detail the survival rates according to the protection budget in each test network (see Appendix A).

4.4. Scale-Free Network

The scale-free networks are networks whose distribution degree follows a power law distribution with an exponent between 2 and 3. The study of epidemics and disease dynamics on scale-free networks is a relevant theoretical issue [47], because this networks are a model for the spread of sexually transmitted diseases (see for instance [48]) or a model to explain the early spread of COVID-19 in China (see [49]). Many works that address this type of network in spread of disease can be found in the literature. See for instance [50,51,52,53].
Following the previous structure, we analyze the protection on a Scale-free network using the model proposed by Albert-László Barabási and Réka Albert in [54]. The variables size of the graph (N) and the average degree of the vertices (d) were studied with respect to the survival rate. The weights are uniformly distributed between 1 and 10. Finally, 5000 simulations on each network were done, considering ρ = 0.011 , δ = 1 14 , and the initial population containing one infected vertex.
In the same direction as before, we analyze the variation of σ according to the change of k. For that, we fix d = 5 and N = 100 . The results obtained are the same as those obtained in the previous Section, this is to say, the ranking DIL-W α performs the best. Indeed, with k = 5 % the best is DIL-W 1 . For the following protection values, DIL-W 0 performs the best very close to Strength ranking (see Figure 4). In Appendix A, Table A5 shows in detail σ according to k.
In the variation of the network size, we fix d = 5 and k = 10 % of the network nodes. The DIL-W α ranking performs the best as well as the Strength ranking when α = 1 or α = 0 . It is clear that the survival rate is increasing along with the size of the network, when we consider DIL-W α . Figure 5 shows σ as a function of the size of the network.
When σ is a function of the average contact, we fix N = 100 and k = 10 % of the network nodes. The best performance is for the DIL-W 1 ranking up to the average of 30 contacts, that is, 30% of the total network nodes. The survival rate is decreasing because the higher the average number of contacts, the greater the probability of contagion. Figure 6 shows the results. (See Appendix A, Table A6, to see in detail σ according to d.)
Remark 1.
If the weights are uniformly distributed between ϵ and 1, with ϵ close to 0, then the results are equals to the above.
Finally, in order to illustrate in a simple way why the DIL-W α ranking has better performance in test networks and on free scale networks, let us consider a free scale network with N = 15 , d = 3 and weights on the edges uniformly distributed between 1 and 10. When we apply the DIL-W 1 ranking, the first 3 places are occupied by nodes 3, 5 and 1 respectively. These nodes are precisely bridge nodes and when protecting them, according to Definition 10, the graph loses connectivity. If we apply the Strength ranking, the first 3 places are occupied by nodes 3, 1 and 4 respectively. Note that the order in which it positions the nodes and the importance it gives to node 4 makes the lost of network connectivity less than the lost when applying DIL-W 1 . (See Figure 7).

5. Conclusions

In this paper, we evaluate the effectiveness of the DIL-W α ranking in the immunization of nodes that are attacked by an infectious disease that spreads on an edge-weighted graph using a graph-based SIR model. This protection strategy shows better survival rates in 3 of the four networks that we have considered, conditioned to the protection budget equal to 10% of the network nodes. In the case where DIL-W α does not perform better than the other strategies, it is still a good alternative due to its lower computational complexity.
When we modify the protection budget, the DIL-W α ranking continues to show itself as one of the 3 main immunization strategies with the best survival rate. Even for more than a value of α . Again, when it is not in the top places, with respect to performance, its computational complexity makes DIL-W α a good alternative to choose over the others.
In the case of scale-free networks, the DIL-W α ranking maintains the trend of obtaining better survival rates than the other compared rankings when the protection budget is modified. The size of the network does not affect this result, because DIL-W α reaches the first place with α = 0 or α = 1 . Something similar happens when modifying the average number of contacts, DIL-W 1 has the best performance up to 30% of total nodes.
An interesting and complex task to solve is to determine which value of α will be chosen in certain networks so that the ranking generated would be the optimal one. Not always the same value makes the best performance. However, when considering this method, there are as many rankings as there are numbers between 0 and 1.

Author Contributions

The authors R.M., C.G.-N. and C.T. contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported and funded by Agencia Nacional de Investigación y Desarrollo (ANID), COVID0739 project.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The source code of our analysis and network files can be found at https://github.com/RonaldManriquez/Protection-DIL-W.git from 5 May 2021.

Conflicts of Interest

The authors declare that they have no conflict of interest. The funders had no role in the design of the study; in the collection, analysis, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Appendix A

Survival rates ( σ ), according to different protection budgets in each test network.
Table A1. σ according to different values of k in Zachary karate club Network.
Table A1. σ according to different values of k in Zachary karate club Network.
Zachary Karate Club Network
DIL-W 0 DIL-W 0.5 DIL-W 1 StrengthClosenessBetweennessLaplacian
5%0.83910.84340.83540.84060.80280.80160.8353
10%0.89450.89120.89410.90500.82100.88890.9015
15%0.93920.93670.93590.94370.89890.93330.9437
20%0.95100.95250.95580.95680.92760.94970.9551
25%0.95430.95790.95770.95930.95480.95180.9567
30%0.95780.95850.95720.95890.95800.95400.9597
40%0.95910.96030.96590.96770.95930.96810.9606
50%0.96570.96550.96670.96950.96030.97050.9662
Table A2. σ according to different values of k in Wild birds Network.
Table A2. σ according to different values of k in Wild birds Network.
Wild Birds Network
DIL-W 0 DIL-W 0.5 DIL-W 1 StrengthClosenessBetweennessLaplacian
5%0.73550.73940.64470.61880.66960.64110.6212
10%0.78710.79420.73750.70400.73260.69520.7022
15%0.87210.88630.87600.86250.81490.79660.8654
20%0.90110.90590.90760.89430.84860.83990.8980
25%0.91350.91550.92080.91300.88260.86760.9078
30%0.91500.92260.92610.93030.89800.89410.9114
40%0.93610.93270.94810.95400.90180.94570.9272
50%0.95000.96260.97100.97620.90460.97660.9462
Table A3. σ according to different values of k in Sandy authors Network.
Table A3. σ according to different values of k in Sandy authors Network.
Sandy Authors Network
DIL-W 0 DIL-W 0.5 DIL-W 1 StrengthClosenessBetweennessLaplacian
5%0.93010.92920.92960.83950.88170.93120.8329
10%0.96710.96370.96130.95350.94340.96150.9382
15%0.97380.97270.96920.97060.95130.96860.9616
20%0.97490.97990.97600.97790.95580.97640.9645
25%0.97710.98190.98220.97980.95680.98080.9773
30%0.97950.98370.98320.98270.97000.98290.9791
40%0.98240.98520.98480.98390.96800.98530.9824
50%0.98250.98700.98600.98600.96700.98600.9837
Table A4. σ according to different values of k in CAG-mat72 Network.
Table A4. σ according to different values of k in CAG-mat72 Network.
CAG-mat72 Network
DIL-W 0 DIL-W 0.5 DIL-W 1 StrengthClosenessBetweennessLaplacian
5%0.72140.76410.76320.77340.77140.72560.7779
10%0.89470.88860.87920.86850.84510.80770.8706
15%0.91850.93080.93300.92300.89930.90850.9090
20%0.93230.94520.94580.94460.92850.90940.9302
25%0.94640.95620.95810.95880.94440.91310.9351
30%0.95780.96570.96720.96310.96460.93120.9426
40%0.97100.97450.97500.97190.97200.94560.9679
50%0.97700.98090.98070.97790.97810.94580.9758
Table A5. σ according to different values of k in a Scale-free Network.
Table A5. σ according to different values of k in a Scale-free Network.
Scale-Free Network
DIL-W 0 DIL-W 0.5 DIL-W 1 StrengthClosenessBetweennessLaplacian
5%0.22350.23590.27730.28450.17480.23200.2312
10%0.86100.59650.68930.85930.39010.68570.6264
15%0.94370.75850.95280.91680.66220.87340.9155
20%0.97630.92980.96360.96090.74310.90920.9174
25%0.98040.94420.98030.96840.76350.96370.9497
30%0.98530.97100.98520.98370.85090.97780.9519
40%0.98820.97550.98750.98570.92680.98630.9671
50%0.98970.98450.98870.98750.93590.98840.9830
Table A6. σ according to different values of d in a Scale-free Network.
Table A6. σ according to different values of d in a Scale-free Network.
Scale-Free Network
DIL-W 0 DIL-W 0.5 DIL-W 1 StrengthClosenessBetweennessLaplacian
20.98410.96670.98420.98380.92840.98470.9800
50.84110.60320.84100.83730.47830.80460.7692
100.11430.11700.13110.11180.11040.11930.1107
300.10320.10430.10590.10370.10460.10410.1061
500.10410.10450.10460.10500.10530.10480.1043

References

  1. Almasi, S.; Hu, T. Measuring the importance of vertices in the weighted human disease network. PLoS ONE 2019, 14, e0205936. [Google Scholar] [CrossRef] [Green Version]
  2. An, X.L.; Zhang, L.; Li, Y.Z.; Zhang, J.G. Synchronization analysis of complex networks with multi-weights and its application in public traffic network. Phys. A Stat. Mech. Appl. 2014, 412, 149–156. [Google Scholar] [CrossRef]
  3. Crossley, N.; Mechelli, A.; Vértes, P.; Winton-Brown, T.; Patel, A.; Ginestet, C.; McGuire, P.; Bullmore, E. Cognitive relevance of the community structure of the human brain functional coactivation network. Proc. Natl. Acad. Sci. USA 2013, 110, 11583–11588. [Google Scholar] [CrossRef] [Green Version]
  4. Wang, G.; Cao, Y.; Bao, Z.Y.; Han, Z.X. A novel local-world evolving network model for power grid. Acta Phys. Sin. 2009, 6, 58. [Google Scholar]
  5. Demongeot, J.; Ghassani, M.; Rachdi, M.; Ouassou, I.; Taramasco, C. Archimedean copula and contagion modeling in epidemiology. Netw. Heterog. Media 2013, 8, 149. [Google Scholar] [CrossRef]
  6. Montenegro, E.; Cabrera, E.; González, J.; Manríquez, R. Linear representation of a graph. Bol. Da Soc. Parana. De Matemática 2019, 37, 97–102. [Google Scholar] [CrossRef] [Green Version]
  7. Pastor-Satorras, R.; Vespignani, A. Epidemic Spreading in Scale-Free Networks. Phys. Rev. Lett. 2001, 86, 3200–3203. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Guess, A.; Nagler, J.; Tucker, J. Less than you think: Prevalence and predictors of fake news dissemination on Facebook. Sci. Adv. 2019, 5, eaau4586. [Google Scholar] [CrossRef] [Green Version]
  9. Yang, X.; Yang, L. Towards the epidemiological modeling of computer viruses. Discret. Dyn. Nat. Soc. 2012, 2012, 259671. [Google Scholar] [CrossRef]
  10. Manríquez, R.; Guerrero-Nancuante, C.; Martínez, F.; Taramasco, C. Spread of Epidemic Disease on Edge-Weighted Graphs from a Database: A Case Study of COVID-19. Int. J. Environ. Res. Public Health 2021, 18. [Google Scholar] [CrossRef] [PubMed]
  11. Pastor-Satorras, R.; Vespignani, A. Immunization of complex networks. Phys. Rev. E 2002, 65, 036104. [Google Scholar] [CrossRef] [Green Version]
  12. Cohen, R.; Havlin, S.; Ben-Avraham, D. Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 2003, 91, 247901. [Google Scholar] [CrossRef] [Green Version]
  13. Tong, H.; Prakash, B.A.; Tsourakakis, C.; Eliassi-Rad, T.; Faloutsos, C.; Chau, D. On the Vulnerability of Large Graphs. In Proceedings of the 2010 IEEE International Conference on Data Mining, Sydney, NSW, Australia, 13–17 December 2010; pp. 1091–1096. [Google Scholar] [CrossRef]
  14. Chen, C.; Tong, H.; Prakash, B.A.; Tsourakakis, C.E.; Eliassi-Rad, T.; Faloutsos, C.; Chau, D. Node immunization on large graphs: Theory and algorithms. IEEE Trans. Knowl. Data Eng. 2015, 28, 113–126. [Google Scholar] [CrossRef] [Green Version]
  15. Hébert-Dufresne, L.; Allard, A.; Young, J.G.; Dubé, L.J. Global efficiency of local immunization on complex networks. Sci. Rep. 2013, 3, 1–8. [Google Scholar] [CrossRef] [Green Version]
  16. Zhang, Y.; Prakash, B.A. Dava: Distributing vaccines over networks under prior information. In Proceedings of the 2014 SIAM International Conference on Data Mining, Philadelphia, PA, USA, 24–26 April 2014; pp. 46–54. [Google Scholar]
  17. Zhang, Y.; Prakash, B.A. Data-aware vaccine allocation over large networks. ACM Trans. Knowl. Discov. Data (TKDD) 2015, 10, 1–32. [Google Scholar] [CrossRef]
  18. Song, C.; Hsu, W.; Lee, M. Node immunization over infectious period. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, Melbourne, Australia, 19–23 October 2015; pp. 831–840. [Google Scholar]
  19. Gupta, N.; Singh, A.; Cherifi, H. Community-based immunization strategies for epidemic control. In Proceedings of the IEEE 2015 7th international conference on communication systems and networks (COMSNETS), Bangalore, India, 6–10 January 2015; pp. 1–6. [Google Scholar]
  20. Wang, B.; Chen, G.; Fu, L.; Song, L.; Wang, X. Drimux: Dynamic rumor influence minimization with user experience in social networks. IEEE Trans. Knowl. Data Eng. 2017, 29, 2168–2181. [Google Scholar] [CrossRef]
  21. Wijayanto, A.W.; Murata, T. Flow-aware vertex protection strategy on large social networks. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Sydney, NSW, Australia, 31 July–3 August 2017; pp. 58–63. [Google Scholar]
  22. Saxena, C.; Doja, M.; Ahmad, T. Group based centrality for immunization of complex networks. Phys. A Stat. Mech. Appl. 2018, 508, 35–47. [Google Scholar] [CrossRef] [Green Version]
  23. Ghalmane, Z.; El Hassouni, M.; Cherifi, H. Immunization of networks with non-overlapping community structure. Soc. Netw. Anal. Min. 2019, 9, 1–22. [Google Scholar] [CrossRef] [Green Version]
  24. Ghalmane, Z.; Cherifi, C.; Cherifi, H.; El Hassouni, M. Centrality in complex networks with overlapping community structure. Sci. Rep. 2019, 9, 1–29. [Google Scholar] [CrossRef] [Green Version]
  25. Wijayanto, A.W.; Murata, T. Effective and scalable methods for graph protection strategies against epidemics on dynamic networks. Appl. Netw. Sci. 2019, 4, 1–31. [Google Scholar] [CrossRef] [Green Version]
  26. Tang, P.; Song, C.; Ding, W.; Ma, J.; Dong, J.; Huang, L. Research on the node importance of a weighted network based on the k-order propagation number algorithm. Entropy 2020, 22, 364. [Google Scholar] [CrossRef] [Green Version]
  27. Manríquez, R.; Guerrero-Nancuante, C.; Martínez, F.; Taramasco, C. A Generalization of the Importance of Vertices for an Undirected Weighted Graph. Symmetry 2021, 13, 902. [Google Scholar] [CrossRef]
  28. Ren, Z.; Shao, F.; Liu, J.; Guo, Q.; Wang, B.H. Node importance measurement based on the degree and clustering coefficient information. Acta Phys. Sin. 2013, 62, 128901. [Google Scholar]
  29. Musiał, K.; Juszczyszyn, K. Properties of bridge nodes in social networks. In International Conference on Computational Collective Intelligence; Springer: Berlin/Heidelberg, Germany, 2009; pp. 357–364. [Google Scholar]
  30. Liu, J.; Xiong, Q.; Shi, W.; Shi, X.; Wang, K. Evaluating the importance of nodes in complex networks. Phys. A Stat. Mech. Appl. 2016, 452, 209–219. [Google Scholar] [CrossRef] [Green Version]
  31. Chartrand, G.; Lesniak, L. Graphs and Digraphs, 1st ed.; Springer: Berlin/Heidelberg, Germany, 1996. [Google Scholar]
  32. West, D.B. Introduction to Graph Theory, 2nd ed.; Prentice Hall: Upper Saddle River, NJ, USA, 2001. [Google Scholar]
  33. Opsahl, T.; Agneessens, F.; Skvoretz, J. Node centrality in weighted networks: Generalizing degree and shortest paths. Soc. Netw. 2010, 32, 245–251. [Google Scholar] [CrossRef]
  34. Vinterbo, S.A. Privacy: A machine learning view. IEEE Trans. Knowl. Data Eng. 2004, 16, 939–948. [Google Scholar] [CrossRef]
  35. Latora, V.; Marchiori, M. Efficient Behavior of Small-World Networks. Phys. Rev. Lett. 2001, 87, 198701. [Google Scholar] [CrossRef] [Green Version]
  36. Lai, Y.; Motter, A.; Nishikawa, T. Attacks and cascades in complex networks. In Complex Networks; Springer: Berlin/Heidelberg, Germany, 2004; pp. 299–310. [Google Scholar]
  37. Zachary, W.W. An Information Flow Model for Conflict and Fission in Small Groups. J. Anthropol. Res. 1977, 33, 452–473. [Google Scholar] [CrossRef] [Green Version]
  38. Firth, J.A.; Sheldon, B.C. Experimental manipulation of avian social structure reveals segregation is carried over across contexts. Proc. R. Soc. B Biol. Sci. 2015, 282, 20142350. [Google Scholar] [CrossRef] [Green Version]
  39. Imrich, W.; Klavzar, S. Product Graphs: Structure and Recognition; Wiley: Hoboken, NJ, USA, 2000. [Google Scholar]
  40. Barrat, A.; Barthelemy, M.; Pastor-Satorras, R.; Vespignani, A. The architecture of complex weighted networks. Proc. Natl. Acad. Sci. USA 2004, 101, 3747–3752. [Google Scholar] [CrossRef] [Green Version]
  41. Brandes, U. A faster algorithm for betweenness centrality. J. Math. Sociol. 2001, 25, 163–177. [Google Scholar] [CrossRef]
  42. Newman, M. Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Phys. Rev. E 2001, 64, 016132. [Google Scholar] [CrossRef] [Green Version]
  43. Qi, X.; Fuller, E.; Wu, Q.; Wu, Y.; Zhang, C.Q. Laplacian centrality: A new centrality measure for weighted networks. Inf. Sci. 2012, 194, 240–253. [Google Scholar] [CrossRef]
  44. Rossi, R.; Ahmed, N.K. The Network Data Repository with Interactive Graph Analytics and Visualization. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, Austin, TX, USA, 25–30 January 2015. [Google Scholar]
  45. Zhang, Z.; Wang, H.; Wang, C.; Fang, H. Modeling epidemics spreading on social contact networks. IEEE Trans. Emerg. Top. Comput. 2015, 3, 410–419. [Google Scholar] [CrossRef] [Green Version]
  46. Pastor-Satorras, R.; Castellano, C.; Van Mieghem, P.; Vespignani, A. Epidemic processes in complex networks. Phys. Rev. Lett. 2015, 87, 925–980. [Google Scholar]
  47. Liu, J.; Zhang, T. Epidemic spreading of an SEIRS model in scale-free networks. Commun. Nonlinear Sci. Numer. Simul. 2011, 16, 3375–3384. [Google Scholar] [CrossRef]
  48. Liu, M.-X.; Jiong, R. Modelling the spread of sexually transmitted diseases on scale-free networks. Chin. Phys. B 2009, 1, 2115–2120. [Google Scholar]
  49. Song, W.; Zang, P.; Ding, Z.; Fang, X.; Zhu, L.; Zhu, Y.; Bao, C.; Chen, F.; Wu, M.; Peng, Z. Massive migration promotes the early spread of COVID-19 in China: A study based on a scale-free network. Infect. Dis. Poverty 2020, 9, 1–8. [Google Scholar] [CrossRef]
  50. Schneeberger, A.; Mercer, C.; Gregson, S.; Ferguson, N.; Nyamukapa, C.; Anderson, R.; Johnson, A.; Garnett, G. Scale-free networks and sexually transmitted diseases: A description of observed patterns of sexual contacts in Britain and Zimbabwe. Sex. Transm. Dis. 2004, 31, 380–387. [Google Scholar] [CrossRef]
  51. Moreno, Y.; Vazquez, A. Disease spreading in structured scale-free networks. Eur. Phys. J. B-Condens. Matter Complex Syst. 2003, 31, 265–271. [Google Scholar] [CrossRef] [Green Version]
  52. Yang, P.; Wang, Y. Dynamics for an SEIRS epidemic model with time delay on a scale-free network. Phys. A Stat. Mech. Appl. 2019, 527, 121290. [Google Scholar] [CrossRef]
  53. Ke, H.; Yi, T. Immunization for scale-free networks by random walker. Chin. Phys. 2006, 15, 2782. [Google Scholar] [CrossRef]
  54. Barabási, A.; Albert, R. Emergence of Scaling in Random Networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The left side shows a graph without protection or infection. On the right side, we see an infected node (red) and a protected node (green) in the same graph.
Figure 1. The left side shows a graph without protection or infection. On the right side, we see an infected node (red) and a protected node (green) in the same graph.
Applsci 11 05115 g001
Figure 2. On the right, curve of infected with and without protection on each network. On the left, only curves of infected with protection according to the different rankings.
Figure 2. On the right, curve of infected with and without protection on each network. On the left, only curves of infected with protection according to the different rankings.
Applsci 11 05115 g002
Figure 3. σ as a function of k on each network.
Figure 3. σ as a function of k on each network.
Applsci 11 05115 g003
Figure 4. σ as a function of k on a Scale-free network with N = 100 and d = 5 .
Figure 4. σ as a function of k on a Scale-free network with N = 100 and d = 5 .
Applsci 11 05115 g004
Figure 5. σ as a function of N on a Scale-free network with d = 5 .
Figure 5. σ as a function of N on a Scale-free network with d = 5 .
Applsci 11 05115 g005
Figure 6. σ as a function of d on a Scale-free network.
Figure 6. σ as a function of d on a Scale-free network.
Applsci 11 05115 g006
Figure 7. Scale-free network with N = 15 and d = 3 . In cyan, the first 3 places generated by DIL-W 1 ranking. In purple, the first 3 places generated by Strength ranking.
Figure 7. Scale-free network with N = 15 and d = 3 . In cyan, the first 3 places generated by DIL-W 1 ranking. In purple, the first 3 places generated by Strength ranking.
Applsci 11 05115 g007
Table 1. Different ρ for each test network.
Table 1. Different ρ for each test network.
Zachary Karate ClubWild BirdSandy AuthorsCAG-mat72
ρ 0.15 0.23 0.12 0.0052
Table 2. Survival rate in each network according to the protection ranking with a protection budget of 10% of the network nodes.
Table 2. Survival rate in each network according to the protection ranking with a protection budget of 10% of the network nodes.
ZacharyWild BirdsSandy AuthorsCAG-mat72
DIL-W 0 0.89460.78710.96710.8947
DIL-W 0.5 0.89120.79430.96370.8887
DIL-W 1 0.89410.73750.96130.8792
Strength0.90510.70410.95360.8685
Closeness0.82110.73270.94350.8451
Betweenness0.88900.69520.96160.8078
Laplacian0.90160.70230.93820.8707
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Manríquez, R.; Guerrero-Nancuante, C.; Taramasco, C. Protection Strategy for Edge-Weighted Graphs in Disease Spread. Appl. Sci. 2021, 11, 5115. https://doi.org/10.3390/app11115115

AMA Style

Manríquez R, Guerrero-Nancuante C, Taramasco C. Protection Strategy for Edge-Weighted Graphs in Disease Spread. Applied Sciences. 2021; 11(11):5115. https://doi.org/10.3390/app11115115

Chicago/Turabian Style

Manríquez, Ronald, Camilo Guerrero-Nancuante, and Carla Taramasco. 2021. "Protection Strategy for Edge-Weighted Graphs in Disease Spread" Applied Sciences 11, no. 11: 5115. https://doi.org/10.3390/app11115115

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop