Skip to main content
PLOS ONE logoLink to PLOS ONE
. 2013 Dec 20;8(12):e83489. doi: 10.1371/journal.pone.0083489

An Efficient Immunization Strategy for Community Networks

Kai Gong 1,2, Ming Tang 1,2,3,*, Pak Ming Hui 2,*, Hai Feng Zhang 4, Do Younghae 3, Ying-Cheng Lai 3,5
Editor: Attila Szolnoki6
PMCID: PMC3869806  PMID: 24376708

Abstract

An efficient algorithm that can properly identify the targets to immunize or quarantine for preventing an epidemic in a population without knowing the global structural information is of obvious importance. Typically, a population is characterized by its community structure and the heterogeneity in the weak ties among nodes bridging over communities. We propose and study an effective algorithm that searches for bridge hubs, which are bridge nodes with a larger number of weak ties, as immunizing targets based on the idea of referencing to an expanding friendship circle as a self-avoiding walk proceeds. Applying the algorithm to simulated networks and empirical networks constructed from social network data of five US universities, we show that the algorithm is more effective than other existing local algorithms for a given immunization coverage, with a reduced final epidemic ratio, lower peak prevalence and fewer nodes that need to be visited before identifying the target nodes. The effectiveness stems from the breaking up of community networks by successful searches on target nodes with more weak ties. The effectiveness remains robust even when errors exist in the structure of the networks.

Introduction

Epidemics could lead to a serious loss in life and have a huge impact on the economy, as we witnessed during the outbreaks of SARS (severe acute respiratory syndromes) in 2003 and H1N1 Influenza A virus in 2009 [1][3]. The problem of preventing an epidemic in time is of great importance and it has attracted much attention from researchers across different fields [4][12]. While immunization and quarantine are the two basic measures [13][15], finding an efficient way of identifying the targets to be immunized or quarantined so as to suppress an infection effectively remains a pressing issue [16].

The hubs, individuals with high centrality, in complex networks are commonly believed to be the most influential nodes as they could affect their many neighboring nodes [17]. Kitsak et al. pointed out that the nodes with a high Inline graphic-shell are more influential spreaders in some real networks [18]. Undoubtedly, it is important to identify such influential nodes, but an effective method would require global information about the network structure. In these global strategies, the influential hubs can be identified by centrality measures, such as the degree centrality [19], [20], eigenvector centrality [21], and betweenness centrality [22], [23]. Such global strategies, however, become impractical for large-scale networks. Another type of method requires only local information. The acquaintance immunization strategy (henceforth labeled as ACQ) [24] in which random acquaintances of randomly chosen nodes are immunized is an example of local search algorithms. ACQ was shown to be an efficient algorithm for large-scale networks with broad-degree distributions [24].

Community structure at the mesoscale level is ubiquitous in a variety of real complex systems [25], [26] such as Facebook [27], [28] and Twitter [29], which plays an important role in the dynamics of epidemics [30][35]. In the presence of communities, the weak ties connecting a pair of nodes belonging to different communities, called the bridge nodes [36][38], provide the pathways for information and diseases to propagate from one community to another. These bridge nodes were found to be more important than the hubs in diffusing information through community networks [39][41]. Therefore, identifying the bridge nodes in community networks are crucial in preventing epidemic outbreaks [42][44]. Deterministic and stochastic algorithms have been designed to search for the bridge nodes [45]. Chen et al. [46] proposed an immunization strategy based on an equal graph partitioning algorithm to identify the minimum group that separates a network into several clusters of approximately equal size. The role of the minimum separator group is similar to that of the bridge nodes connecting different communities. The algorithm is effective in that only a small immunization ratio is needed, which is the fraction of immunized nodes. However, the algorithm requires the structural information of the whole network. Similar to other global strategies, it becomes impractical due to the high computing cost and, more fundamentally, the lack the complete information in large networks. Salathe and Jones [45] proposed the community bridge finder (CBF), which is a stochastic algorithm to search for the bridge nodes based only on local structural information, and found that the method is more efficient than immunization strategies targeting different kinds of hubs.

Community networks typically exhibit a heterogeneous distribution in the number of weak ties originating from a bridge node [36], [47]. In the worldwide air traffic network, for example, bridge nodes can be divided into four classes: nonhub connector nodes, nonhub kinless nodes, connector hubs, and kinless hubs [48]. It was found that immunizing bridge hubs that connect a community to many other communities could protect a network efficiently against epidemics [49]. Identifying the bridge hubs with a larger number of weak ties, however, is quite challenging as the mesoscopic-scale community structure is difficult to resolve for large-scale networks [50]. It is against this backdrop that we propose an immunization strategy that identifies the bridge hubs by random walks in an expanding friendship circle. The strategy, which we call bright-hub detector (BHD) relies only on local structural information. We compare results obtained by BHD with ACQ and CBF strategies and find that it performs better in simulated networks and empirical community networks generated from real data. Simulation results also show that our strategy has the merit of being robust against noise.

Results

To illustrate the community structure in real-world networks and the necessity of an algorithm that focuses on identifying the bridge hubs, we have analyzed the heterogeneity of bridge nodes in the networks of students in five universities in the US using Facebook data. Details on constructing the networks from data are given in the Materials and Methods section. Figure 1 shows the cumulative probability density Inline graphic that a bridge node has a degree Inline graphic or higher in the students' Facebook networks of Caltech, Princeton, Georgetown, Oklahoma, and North Carolina. The distributions indicate that it is important to identify the bridge nodes with more weak ties, in addition to identifying only the bridge nodes as in CBF.

Figure 1. Cumulative distributions of the number of weak ties in five empirical networks.

Figure 1

For every network, the community structure is detected by the method proposed by Newman and Girvan [55]. Weak ties and bridge nodes are then identified. The number of weak ties emanating from each bridge node is recorded to give the cumulative distribution. Results are shown for students' networks for Caltech (red squares), Princeton (green circles), Georgetown (blue up triangles), Oklahoma (cyan down triangles) and North Carolina (magenta diamonds).

We present results of three different strategies (ACQ, CBF and BHD) on choosing immunizing nodes in simulated and empirical community networks within the susceptible-infected-recovered (SIR) epidemiological model. Briefly, simulated networks of different modularity Inline graphic are generated by randomly connecting communities, which are themselves random networks, following the algorithm in Ref. [45]. Empirical networks are constructed from Facebook data of students in each of five US universities, with a link defined by two students being online friends and belonging to the same dormitory or the same major in the same year of study. Table 1 lists the properties of these empirical networks. Details about network construction, the three strategies, and SIR dynamics are given in the Materials and Methods section. The ACQ, CBF and BHD strategies rely only on local structural information. In ACQ [24], a node is randomly picked and then a neighbor of the chosen node is randomly selected for immunization. The algorithm has a higher chance to immunize the hubs. In CBF [45], a step forward in a self-avoiding walk is checked for a bridge between communities by examining the existence of links or paths from the neighbors of the last node back to the nodes visited in the trail of the self-avoiding walk. The node before crossing the bridge is then identified as the bridge node and immunized. In addition, the supplementary rule of immunizing a node that has been visited twice by self-avoiding walks would pick up some hubs. Here, we implemented CBF as given in Ref. [45]. The bridge-hub detector (BHD) that we proposed in this paper extends the self-avoiding searching scheme to examining the overlap and the existence of links from all the neighbors of the last node back to the union of the friendship circles of all the nodes in the trail of the walk. A pair of nodes, a bridge node and a bridge hub, are searched for immunization via a self-avoiding walk (Readers are referred to the Materials and Methods section for more information). In the SIR model, the parameters Inline graphic and Inline graphic are the transmission rate and the recovery probability, respectively. The extent of an epidemic is characterized by the final epidemic ratio Inline graphic, the fraction of the population ever infected at the end of the epidemic, and the peak prevalence Inline graphic, the highest density of infected nodes in the population at a time during the epidemic.

Table 1. Structural Properties of the five empirical networks.

Network N E M Q r H C Inline graphicdInline graphic Inline graphickInline graphic
Inline graphic 647 7,047 13 0.675 0.187 6.517 0.443 3.166 21.784
Inline graphic 5,580 156,935 8 0.817 0.039 6.366 0.298 4.316 56.252
Inline graphic 8,183 245,510 42 0.814 0.106 6.280 0.268 4.218 60.005
Inline graphic 13,515 276,126 67 0.774 0.327 8.240 0.266 4.108 40.862
Inline graphic Inline graphic 15,425 332,314 70 0.779 0.217 6.941 0.233 4.346 43.086

Structural properties including the network size (N), number of edges (E), the community number (M), modularity (Q) [55], degree assortativity (r) [56], degree heterogeneity (H = Inline graphic/Inline graphic)), clustering coefficient(C), average shortest path length (Inline graphic) and average degree (Inline graphic) are tabulated for each of the five empirical networks.

To compare the performances of ACQ and CBF with that of BHD, we have carried out the SIR dynamics on simulated networks with different modularity. For a given immunization coverage Inline graphic, i.e., fraction of immunized nodes, the final epidemic ratio Inline graphic is obtained for each of the three strategies. The differences Inline graphic and Inline graphic would indicate the performance of ACQ and CBF relative to BHD. Figure 2 shows the differences for various combinations of the modularity Inline graphic and coverage Inline graphic. The differences are positive over most of the Inline graphic-Inline graphic space, with BHD leading to about Inline graphic (Inline graphic) of fewer nodes being infected than ACQ (CBF). The results indicate that BHD is, in general, more effective in suppressing an epidemic. There are patches in the Inline graphic-Inline graphic space that BHD is out-performed by ACQ and CBF. This is particularly apparent for networks with a strong community structure characterized by a high modularity. For example, both ACQ and CBF perform better in networks with Inline graphic[0.95,0.97]. In these cases, an epidemic outbreak is mostly restricted in a local community and thus the better strategies are those that could confine and suppress an epidemic to within the community that the outbreak starts. Immunizing the hubs with large degrees as in ACQ and CBF can prevent epidemic spreading within a community more efficiently. BHD spends some of the immunization coverage on removing nodes that belong to neighboring communities rather than the community of the outbreak itself and this becomes less effective in saving the nodes within the outbreak community from infection than ACQ and CBF.

Figure 2. Comparison of efficacy of immunization algorithms in simulated networks.

Figure 2

The difference in the final epidemic ratios (a) (left panel) Inline graphic between ACQ and BHD, and (b) (right panel) Inline graphic between CBF and BHD, are shown for simulated networks with different network modularity Inline graphic and immunization coverage Inline graphic. The colors indicate the differences in percentages (see color codes). Results are obtained by averaging over Inline graphic realizations for each pair of Inline graphic and Inline graphic values. The parameters associated with the SIR dynamics are Inline graphic and Inline graphic.

Figure 3 shows the results of Inline graphic and Inline graphic obtained for the empirical networks. In most cases, the final epidemic ratio is smaller for BHD than ACQ and CBF. For example, Inline graphic is on average Inline graphic (Inline graphic) smaller than Inline graphic (Inline graphic for the Caltech network, Inline graphic (Inline graphic) smaller for the Princeton network, and Inline graphic (Inline graphic) smaller for the Georgetown University network. For the Oklahoma University network, Inline graphic is about Inline graphic (Inline graphic) smaller than Inline graphic (Inline graphic) when the immunization coverage is not too small, e.g. Inline graphic (Inline graphic). Similarly, Inline graphic is about Inline graphic (Inline graphic) smaller than Inline graphic (Inline graphic) at Inline graphic (Inline graphic) for the North Carolina University network. In the Oklahoma and North Carolina networks, BHD is out-performed by CBF when the immunization coverage is low. The ability of CBF to immunize the bridge nodes and some hubs makes it more effective in networks with a high assortativity and heterogeneity. As shown in Table 1, the degree assortativity Inline graphic and heterogeneity Inline graphic are Inline graphic (Inline graphic) and Inline graphic (Inline graphic) for the Oklahoma (North Carolina) University network. For an immunization coverage of Inline graphic, BHD performs better in all empirical networks than both ACQ and CBF, with a maximum in Inline graphic near this coverage. When the coverage is higher (e.g. Inline graphic), the differences in Inline graphic for the three algorithms diminish, as the many immunized nodes would tend to be effective in breaking up a community and suppress an epidemic regardless of the algorithm. The results for the differences in peak prevalence are given in Figure S1 and the features are essentially the same as those in Figure 3.

Figure 3. Comparison of efficacy of immunization algorithms in empirical networks.

Figure 3

The differences in the final epidemic ratios Inline graphic (left panel) and Inline graphic (right panel) using different immunization algorithms are shown for each of the five empirical networks as a function of the immunization coverage Inline graphic. A positive value indicates that BHD is more effective than the other algorithms. Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic.

Whether an algorithm is effective in preventing an epidemic is closely related to its effectiveness in breaking up the network after immunizing or removing a certain fraction of nodes [51]. Let Inline graphic, with Inline graphic denoting ACQ, CBF and BHD, be the size of the giant component of the resulting network using the algorithm Inline graphic and an immunization coverage Inline graphic, and Inline graphic be the size of the giant component of the network before applying an immunization algorithm. The relative difference Inline graphic is a measure of how effective BHD breaks up a network relative to ACQ (and CBF). Figure 4 shows the results of Inline graphic for the five empirical networks. The positive Inline graphic values in almost all the cases indicate that BHD is more effective. The results show a similar trend as a function of Inline graphic as in the differences in final epidemic ratio shown in Figure 3. Percentage wise, Inline graphic is smaller than Inline graphic and Inline graphic for the same values of Inline graphic in the same empirical network. It is a result of the removal of some bridge hubs (bridge nodes with more weak links to other communities), by BHD, which would result in a network that has a smaller mean degree. This is indeed the case, as shown in Figure S2. The geometry of the resulting network also affects the duration of an epidemic. In particular, resulting networks with smaller mean degree lead to a longer duration, as the disease can only spread by infecting one node after another. BHD is therefore expected to have a longer epidemic duration, despite a smaller final epidemic ratio and prevalence. Figure S3 shows that the epidemic duration is slightly longer for BHD, as compared with those with ACQ and CBF.

Figure 4. Comparison of giant components of different immunization algorithms in empirical networks.

Figure 4

The difference in the sizes of the giant component Inline graphic (left panel) and Inline graphic (right panel) using different immunization algorithms are shown for each of the five empirical networks as a function of the immunization coverage Inline graphic, where Inline graphic is the size of the giant component before an immunization algorithm is applied. A positive value indicates that BHD is more effective in breaking up the network. Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic.

The effectiveness of BHD is further illustrated in Figure 5, which compares the number of weak ties of the bridge hubs and bridge nodes identified for immunization using BHD with that of the bridge nodes identified by CBF. The results show that BHD indeed can identify the nodes with more weak links for removal. In addition, the bridge nodes identified by BHD carry more weak ties than those identified by CBF, further improving the effectiveness. In the Princeton University network, however, the large mean community size (see Table 1) makes it difficult for both BHD and CBF to search for the bridge nodes.

Figure 5. Comparison of average number of weak ties among immunized bridge hubs identified by BHD, bridge nodes identified by BHD and bridge nodes identified by CBF. BHD identifies a pair of nodes for immunization via a self-avoiding walk algorithm.

Figure 5

One node is a bridge hub and another a bridge node. The average number of weak ties among these two types of immunized nodes [red squares (BHD hubs) and gray diamonds (BHD nodes)] are shown for different values of immunization coverage Inline graphic, together with the results from immunized bridge nodes identified by CBF (blue circles). Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic. For comparison, the results based on the method proposed by Newman and Girvan [55] are shown as the green dashed lines.

A more efficient algorithm is one that visits fewer nodes before identifying the targeted nodes for immunization. Let Inline graphic and Inline graphic be the numbers of nodes visited by the self-avoiding walks before getting at the targeted nodes. Figure 6 gives Inline graphic for the five empirical networks. For small immunization coverage (Inline graphic), Inline graphic, indicating that BHD is a more efficient algorithm.

Figure 6. Comparison of number of nodes visited before identifying immunization nodes in CBF and BHD.

Figure 6

The ratio Inline graphic is shown of the number of nodes visited by the self-avoiding walks in CBF and BHD for achieving an immunization coverage Inline graphic. A large Inline graphic implies a longer search for immunization nodes. The results show that BHD identifies the immunization nodes faster than CBF for Inline graphic. Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic.

Another aspect of an effective algorithm is the robustness to errors or noise in network information. Such errors are common in social networks due to, for example, the inconsistency for two individuals to express their relationship [52]. Using an empirical network, we have tested the robustness of BHD by adding or removing a number of links from the network. SIR dynamics is then studied on the modified network without and with the BHD algorithm. The resulting final epidemic ratios are denoted by Inline graphic and Inline graphic, respectively. Figure 7 shows the results of Inline graphic R_BHDInline graphic for different numbers of links added or removed, with a constant immunization coverage of Inline graphic. The results show that BHD performs well even when the networks are modified randomly. More results corresponding to other values of immunization coverage are shown in Figure S4.

Figure 7. Robustness of BHD in networks with noise as modeled by random addition and removal of links.

Figure 7

The quantity Inline graphic is shown as a function of the number of links randomly added to or removed from an empirical network, where Inline graphic and Inline graphic are the final epidemic ratios when BHD is applied and not applied to the modified network, respectively. The robustness of BHD is indicated by the relatively stable values of Inline graphic. Results are shown for each of the five empirical networks as labeled. The immunization coverage is Inline graphic. The SIR parameters are Inline graphic and Inline graphic. Results are obtained by averaging over Inline graphic realizations for each value of added and removed links.

Summary and Discussion

The heterogeneous distribution of weak ties in real-world community networks points to the importance of the bridge hubs in the control of transmission of information or diseases but these nodes are difficult to identify. We have proposed and studied the effectiveness of a bridge-hub detector strategy. It is a local strategy searching for bridge nodes and bridge hubs based on the idea of referencing to an expanding friendship circle as a self-avoiding walk proceeds. We applied BHD to simulated networks and empirical networks among students in five US universities constructed by using social network data. In general, BHD is more effective in preventing an epidemic when compared with other local immunization strategies such as ACQ and CBF, for a practical range of immunization coverage. It gives a smaller final epidemic ratio and peak prevalence. Its effectiveness can be attributed to better identification of immunized nodes that carry more weak ties than those picked up by ACQ and CBF. BHD thus breaks up the community networks more effectively and suppresses an epidemic. Although BHD and CBF are both based on self-avoiding walks, BHD is more efficient in that it identifies the immunization nodes after visiting fewer nodes. The good performance of BHD remains robust even when errors exist in the structure of the underlying network.

In general, BHD is capable of identifying bridge nodes with more weak ties and it is particularly useful in dealing with community networks with a broad distribution in the number of weak ties among the bridge nodes. It can be readily generalized to other tasks. For example, mistakenly chosen nodes could be reduced by requiring that a node must have been identified twice or more times before it is immunized. The algorithm can also be applied to overlapping [50] and time-varying [53] community networks.

Materials and Methods

We have studied the effectiveness of our local immunization strategy in simulated and empirical community networks using the susceptible-infected-recovered (SIR) epidemiological model. Here, we give the details with respect to the following issues: community-network construction, bridge-hub detector algorithm, and SIR dynamics.

Simulated and empirical community networks

The simulated community networks of different modularity Inline graphic are generated by the algorithm given in Ref. [45]. There are Inline graphic independent random communities. In each community, Inline graphic nodes are randomly connected so that the mean degree is Inline graphic. These communities are then connected randomly by Inline graphic links. The simulated community network thus has a total of Inline graphic nodes and Inline graphic undirected links. We used the same set of parameters as in Ref. [45], namely Inline graphic, Inline graphic, Inline graphic, and Inline graphic. After generating the network, the modularity Inline graphic can be evaluated according to the definition given in Ref. [25]. The modularity Inline graphic can be varied by rewiring some inter-community links into intra-community links, following the rewiring procedures given in Ref. [45]. While the modularity increases with rewiring, the degree heterogeneity remains nearly unchanged.

Empirical community networks are constructed using the collegiate social network data from Facebook (www.facebook.com) studied in Ref. [27]. The data of five universities in the US are studied (Available: https://code.google.com/p/socialnetworksimulation/). They include data of students from the California Institute of Technology (Caltech), Princeton University, Georgetown University, University of Oklahoma, and University of North Carolina. The data provide information on the dormitory, majoring subject and year of class of the members. Based on the data, a community network is constructed [45] by linking up two members when (i) they are online friends of each other, and (ii) they belong to the same dormitory or the same major in the same year of study. The largest connected component of the network is then retained for carrying out our study. Basic statistical properties of the five empirical networks are given in Table 1. These networks exhibit the small-world character with a high clustering coefficient and a short average path length. The high modularity indicates a strong community feature.

Local Immunization Strategies and Bridge-Hub Detector

The present paper compares results based on our bridge-hub detector algorithm (BHD) with those obtained by other local strategies based on acquaintance immunization (ACQ) and the community bridge finder (CBF). Before discussing the BHD algorithm, we outline the ideas behind ACQ and CBF.

The ACQ algorithm immunizes randomly chosen acquaintances of randomly chosen nodes [24]. In ACQ, a node is picked randomly and then a neighbor of the chosen node is picked randomly for immunization. The procedure is then repeated until the desired immunization coverage is achieved. Therefore, a node that is a neighbor of many other nodes, i.e., a hub, will have a higher chance to be chosen for immunization. The algorithm does not require any information about the degree of the nodes. It is efficient for large networks with a broad degree distribution. A similar algorithm that requires a node to be chosen two times according to the ACQ random-pick processes (ACQ2) before it is immunized has also been studied [24]. Comparing with ACQ, ACQ2 has a higher probability of immunizing the hubs.

Bridge nodes are important for transmission through community networks, but ACQ does not aim at the bridge nodes. In contrast, CBF is designed to search for bridge nodes [45]. It is an algorithm based on self-avoiding walks. To identify a bridge and its associated bridge node for immunization, a self-avoiding walk is executed starting from a randomly chosen node Inline graphic. The following procedure is taken after every step when the walk has visited three or more nodes (see Figure 8). For a walk after Inline graphic steps (Inline graphic), the set of all nodes visited in the Inline graphic steps so far is denoted by Inline graphic for all Inline graphic. Thus, Inline graphic is the node that the walk currently locates after step Inline graphic and Inline graphic is the node visited at step Inline graphic. The first check is to examine whether the node Inline graphic has a link or several links to the nodes in the set Inline graphic other than the link between Inline graphic and Inline graphic. If it is the case, the self-avoiding walk continues to step Inline graphic. If not, then Inline graphic is considered a possible target of a bridge node. To determine whether the node Inline graphic is a bridge node, two nodes are randomly chosen among all the possible nodes that the walk could go in step Inline graphic, i.e., two neighbors of the node Inline graphic are randomly chosen from all the neighbors (except the node Inline graphic due to the self-avoiding restriction of the walk). In the case that there is only one neighbor to choose from, the only neighbor will be considered. If there exists a path from any of the two chosen nodes back to any node in the set Inline graphic, then the node Inline graphic will not be regarded as a bridge node and the walk moves on from Inline graphic to some node Inline graphic. If there exists no path back to the set Inline graphic from both of the chosen nodes, Inline graphic is regarded as a bridge node that connects two communities and it will be immunized. A new self-avoiding walk will start again at another randomly chosen node and the procedure is repeated until the desired immunization ratio is achieved. The idea behind CBF is that a community is formed by a circle of close friends, and thus when the two randomly chosen neighbors of Inline graphic cannot be traced back to the community that Inline graphic belongs to, the link between Inline graphic and Inline graphic is likely to be a bridge between two communities and so the node Inline graphic is a bridge node. In practice, two additional checks are implemented to shorten the computing time [45]. Firstly, the number of nodes registered in a running path is kept at the length of ten, using the latest ten nodes visited. Secondly, the number of visits by any random walk for each node is recorded. When the number Inline graphic of visits equals a certain number (Inline graphic in Ref. [45]), the node is immunized. We have implemented CBF following the algorithm in Ref. [45], where it has been shown that, without prior knowledge of the community structure, CBF is more efficient than ACQ and other immunization strategies that target at the different kinds of hubs. In its design, CBF does not aim at identifying the bridge hubs. In real-world community networks such as those in Facebook [47], worldwide air traffic network [48], and the five collegiate community networks studied here, the heterogeneous distribution in the number of weak ties among bridge nodes indicates the importance of bridge hubs. Figure 9 shows an example of a bridge hub through a visualization of the students' network in Caltech.

Figure 8. Schematic illustration of CBF strategy and BHD strategy.

Figure 8

The CBF strategy: (a) A self-avoiding walk starts at a randomly chosen node Inline graphic. (b)-(c) The walk visited Inline graphic after two steps. The node Inline graphic does not have any other links back to Inline graphic and Inline graphic other than the link that took the walk from Inline graphic to Inline graphic. The node Inline graphic is a potential candidate of a bridge node. Two neighbors of Inline graphic, namely Inline graphic and Inline graphic, are randomly picked and each is examined for connections to the visited set of nodes. As Inline graphic has links with Inline graphic and Inline graphic, the target node Inline graphic is dismissed as a bridge node and the walk continues. (d) The walk moves to Inline graphic after three steps. The node Inline graphic has links to previously visited nodes Inline graphic and Inline graphic, and thus the walk continues. (e) The walk moves to Inline graphic after four steps. The node Inline graphic does not have any other links back to previously visited nodes other than the link that took the walk from Inline graphic to Inline graphic. The node Inline graphic is a potential target of a bridge node. Two neighbors of Inline graphic are randomly chosen. (f) If Inline graphic and Inline graphic are chosen, these nodes do not connect back to the previously visited nodes and Inline graphic is identified as a bridge node and immunized. The BHD strategy: (a) A self-avoiding walk starts at a randomly chosen node Inline graphic. (b)-(c) The walk visited Inline graphic, Inline graphic and Inline graphic after two steps. The set Inline graphic is the union of all the neighboring nodes or friendship circles of Inline graphic, Inline graphic and Inline graphic, as shaded in (c). (d) The walk moves to Inline graphic after three steps. The friendship circle Inline graphic of node Inline graphic consists of Inline graphic, Inline graphic, Inline graphic, and Inline graphic. As all the nodes in Inline graphic either belong to Inline graphic or have a link to at least a node in Inline graphic, the node Inline graphic is not a potential target for immunization. (e) The union of friendship circles is updated to Inline graphic as shaded. The walk continues and reaches node Inline graphic after four steps. The friendship circle Inline graphic of Inline graphic consists of Inline graphic, Inline graphic, Inline graphic, Inline graphic and Inline graphic, among them Inline graphic and Inline graphic do not belong to Inline graphic and do not have a link to nodes in Inline graphic. The node Inline graphic is then identified as a bridge node for immunization. In addition, among those nodes in Inline graphic that cannot be linked back to Inline graphic, one node, e.g., Inline graphic, is randomly chosen and identified as a bridge hub for immunization.

Figure 9. Visualizing the community structure and a bridge hub in the Caltech network.

Figure 9

The Caltech network can be divided into 13 communities based on the method of Newman and Girvan [55], as illustrated by the different colors. Also illustrated is a bridge hub Inline graphic that carries the largest number of weak ties and connects with other bridge nodes labeled as Inline graphic to Inline graphic. The number on a weak tie shows the difference in the numbers of weak ties originated from the node Inline graphic and the bridge node at the other end of the weak tie.

We propose a bridge-hub detector (BHD) for more effective immunization in community networks. It is a local algorithm based on an expanding friendship circle and it does not rely on prior knowledge of the community structure. As in CBF, the algorithm starts with a self-avoiding walk at a randomly chosen node. The following procedure is taken after every step when the walk has visited three or more sites (see Figure 8). Let Inline graphic be the node that the walker locates after step Inline graphic and Inline graphic be the set of all neighbors of the node Inline graphic. For a walk up to Inline graphic steps (Inline graphic), the following steps are carried out between the set Inline graphic and the set Inline graphic. The set Inline graphic is the union of all the friendship circles of all the nodes visited by the walker up to the step Inline graphic and it expands as the self-avoiding walk proceeds. Apparently, we have Inline graphic. If every other node in Inline graphic either already belongs to the set Inline graphic or has at least a link to the nodes within Inline graphic, Inline graphic will not be taken as the target of immunization and Inline graphic will be updated to Inline graphic. The self-avoiding walk then moves on from Inline graphic. Otherwise, there must be at least a node in Inline graphic that is not a member in Inline graphic and is not connected to the nodes in Inline graphic. The node Inline graphic is then targeted for immunization. In addition, among the nodes in Inline graphic that do not belong to Inline graphic and cannot be linked back to Inline graphic, one node (call it Inline graphic) is randomly chosen for immunization. A pair of nodes, Inline graphic and Inline graphic, are immunized and the self-avoiding walk stops. A new walk is initiated at another randomly chosen node again. The procedure is repeated until the desired immunization ratio is achieved. Similar to the idea in ACQ, the immunized node Inline graphic in every self-avoiding walk is likely to be a bridge hub in the presence of heterogeneous distribution of weak ties among the bridge nodes, while Inline graphic is a bridge node. The algorithm is illustrated schematically in Figure 8. Practically, we terminate a walk when it fails to identify immunization nodes after 20 steps. As in CBF, BHD is effective when the search for immunization nodes begins after Inline graphic steps. Figure S5 in Supporting Information gives results when the search begins after different numbers of steps. Through computational complexity analysis (see Text S1 in Supporting Information for more details), the algorithms ACQ, CBF and BHD take on the worst-case run times that go as Inline graphic, Inline graphic and Inline graphic, respectively. For the different algorithms working on systems with the same parameters (the same network size Inline graphic and immunization ratio Inline graphic etc.), ACQ is the fastest, followed by CBF and BHD is the slowest. On a sparse network with small Inline graphic, BHD will have almost the same computational complexity as CBF.

Epidemic Dynamics

The susceptible-infected-recovered (SIR) epidemiological model [54] is used to test the performance of different immunization strategies on community networks. In the model, each node in the network represents an individual that can be in one of three states: susceptible (S), infected (I), or refractory/recovered (R); and each link represents a connection that could spread a disease. When an immunization strategy is executed, a percentage of nodes are first removed from the network by implementing ACQ, CBF or BHD. The remaining nodes are set to the susceptible state. To initiate an infection, a node is randomly chosen and turned into the I state. In a time step, a susceptible node will be infected with a probability Inline graphic, where i is the number of infected nodes among the connected neighbors of the node. Here, Inline graphic is a parameter characterizing the transmission rate. Meanwhile, an infected node has a recovery probability Inline graphic to turn into the R state. Once an individual is in the R state, there will be no further change. In the simulations, the parameters are taken to be Inline graphic and Inline graphic to ensure an outbreak and the state of every node is updated synchronously in every time step. The dynamics ends when all infected nodes have recovered. The resulting population contains nodes only in the S state and R state. We record the final epidemic ratio Inline graphic corresponding to the density of R nodes at the end of the epidemic, the peak prevalence Inline graphic corresponding to the highest density of infected nodes in the network during the epidemic, and the duration of epidemic before the dynamics ends, and compare these quantities for ACQ, CBF and BHD.

Supporting Information

Figure S1

Comparison of peak prevalence of immunization algorithms in empirical networks. The differences in the peak prevalence (left panel) Inline graphic between ACQ and BHD, and (right panel) Inline graphic between CBF and BHD are shown for each of the five empirical networks as a function of the immunization coverage Inline graphic. A positive value indicates that BHD is more effective than the other algorithms. The comparison is similar in features with those shown in Figure 3 for the differences in the final epidemic ratios. Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic.

(EPS)

Figure S2

Comparison of residual mean degrees of different immunization algorithms in empirical networks. The differences in the mean degrees Inline graphic (left panel) and Inline graphic (right panel) using different immunization algorithms are shown for each of the five empirical networks as a function of the immunization coverage Inline graphic. Here, Inline graphic is the mean degree of the network before an immunization algorithm is applied. A positive value indicates that BHD is more effective in reducing the mean degree and thus breaking up the network. Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic.

(EPS)

Figure S3

Comparison of duration of epidemic of different immunization algorithms in empirical networks. The differences in the duration of epidemic between ACQ and BHD (left panel) and between CBF and BHD (right panel) are shown for each of the five empirical networks as a function of the immunization coverage Inline graphic. Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic.

(EPS)

Figure S4

Robustness of BHD in networks with noise as modeled by addition and removal of links for Inline graphic immunization coverage. As in Figure 7, the quantity Inline graphic is shown as a function of the number of links randomly added to or removed from an empirical network. Results are shown for each of the five empirical networks as labeled. The immunization coverage is Inline graphic. The SIR parameters are Inline graphic and Inline graphic. Results are obtained by averaging over Inline graphic realizations for each value of added and removed links.

(EPS)

Figure S5

Effects of starting the search for immunization nodes from different number of steps on the final epidemic ratio. Results in the main text and figures are obtained by starting the search for immunization nodes two steps after a self-avoiding walk began. Here, results for starting the search after 1, 2, 3, 4, 5 steps are shown for each of the five empirical networks.

(EPS)

Text S1

Computational Complexity Analysis.

(PDF)

Funding Statement

This work was partially supported by the National Natural Science Foundation of China (Grants Nos. 11105025, 11005001) and the Fundamental Research Funds for the Central Universities (Grant No. ZYGX2012J075). P. M. Hui acknowledges the support of a Direct Grant for Research from the Faculty of Science at the Chinese University of Hong Kong in 2013-14. Y. Do acknowledges Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (NRF-2013R1A1A2010067). K. Gong acknowledges the support from the Program of Outstanding PhD Candidate in Academic Research by UESTC (Grant No. YBXSZC20131027). Y.-C. Lai was supported by AFOSR under Grant No. FA9550-10-1-0083. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

References

  • 1. Jones JH, Handcock MS (2003) Sexual contacts and epidemic thresholds. Nature 423: 605–606. [DOI] [PubMed] [Google Scholar]
  • 2. Grenfell B, Bjrnstad O (2005) Sexually transmitted diseases: Epidemic cycling and immunity. Nature 433: 366–367. [DOI] [PubMed] [Google Scholar]
  • 3.Keeling M, Rohani P (2007) Modeling Infectious Diseases in Humans and Animals. Princeton University Press.
  • 4. Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang D (2006) Complex networks: Structure and dynamics. Phys Rep 424: 175–308. [Google Scholar]
  • 5. Pastor-Satorras R, Vespignani A (2001) Epidemic spreading in scale-free networks. Phys Rev Lett 86: 3200–3203. [DOI] [PubMed] [Google Scholar]
  • 6. Barthelemy M, Barrat A, Pastor-Satorras R, Vespignani A (2004) Velocity and hierarchical spread of epidemic outbreaks in scale-free networks. Phys Rev Lett 92: 178701. [DOI] [PubMed] [Google Scholar]
  • 7. Newman MEJ (2005) Threshold effects for two pathogens spreading on a network. Phys Rev Lett 95: 108701. [DOI] [PubMed] [Google Scholar]
  • 8. Bootsma MC, Ferguson NM (2007) The effect of public health measures on the 1918 influenza pandemic in U.S. cities. Proc Natl Acad Sci USA 104: 7588–7593. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 9. Cauchemez S, Valleron AJ, Boëlle PY, Flahault A, Ferguson NM (2008) Estimating the impact of school closure on influenza transmission from Sentinel data. Nature 452: 750–754. [DOI] [PubMed] [Google Scholar]
  • 10. Halloran ME, Ferguson NM, Eubank S, Longini IM, Cummings DAT, et al. (2008) Modeling targeted layered containment of an influenza pandemic in the United States. Proc Natl Acad Sci USA 105: 4639–4644. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 11. Ruan ZY, Tang M, Liu ZH (2012) Epidemic spreading with information-driven vaccination. Phys Rev E 86: 036117. [DOI] [PubMed] [Google Scholar]
  • 12. Zhou J, Xiao G, Cheong SA, Fu X, Wong L, et al. (2012) Epidemic reemergence in adaptive complex networks. Phys Rev E 85: 036107. [DOI] [PubMed] [Google Scholar]
  • 13. Ferguson NM, Cummings DAT, Cauchemez S, Fraser C, Riley S, et al. (2005) Strategies for containing an emerging influenza pandemic in Southeast Asia. Nature 437: 209–214. [DOI] [PubMed] [Google Scholar]
  • 14. Ferguson NM, Cummings DAT, Fraser C, Cajka JC, Cooley PC, et al. (2006) Strategies for mitigating an influenza pandemic. Nature 442: 448–452. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 15. Wang L, Zhang Y, Huang T, Li X (2012) Estimating the value of containment strategies in delaying the arrival time of an influenza pandemic: A case study of travel restriction and patient isolation. Phys Rev E 86: 032901. [DOI] [PubMed] [Google Scholar]
  • 16. Madar N, Kalisky T, Cohen R, ben Avraham D, Havlin S (2004) Immunization and epidemic dynamics in complex networks. Eur Phys J B 38: 269–276. [Google Scholar]
  • 17. Moreno Y, Pastor-Satorras R, Vespignani A (2002) Epidemic outbreaks in complex heterogeneous networks. Eur Phys J B 26: 521–529. [DOI] [PubMed] [Google Scholar]
  • 18. Kitsak M, Gallos LK, Havlin S, Liljeros F, Muchnik L, et al. (2010) Identification of influential spreaders in complex networks. Nat Phys 6: 888–893. [Google Scholar]
  • 19. Pastor-Satorras R, Vespignani A (2002) Immunization of complex networks. Phys Rev E 65: 036104. [DOI] [PubMed] [Google Scholar]
  • 20. Christley RM, Pinchbeck GL, Bowers RG, Clancy D, French NP, et al. (2005) Infection in social networks: Using network analysis to identify high-risk individuals. Am J Epidemiol 162: 1024–1031. [DOI] [PubMed] [Google Scholar]
  • 21. Yuu Y, Tetsuya Y (2012) A comparative study of community structure based node scores for network immunization. Lecture Notes in Computer Science 7669: 328–337. [Google Scholar]
  • 22. Zhang HF, Li KZ, Fu XC, Wang BH (2009) An efficient control strategy of epidemic spreading on scale-free networks. Chinese Phys Lett 26: 068901. [Google Scholar]
  • 23. Newman MEJ (2005) A measure of betweenness centrality based on random walks. Soc Networks 27: 39–54. [Google Scholar]
  • 24. Cohen R, Havlin S, ben Avraham D (2003) Efficient immunization strategies for computer networks and populations. Phys Rev Lett 91: 247901. [DOI] [PubMed] [Google Scholar]
  • 25. Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc Natl Acad Sci USA 99: 7821–7826. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 26. Lancichinetti A, Kivela M, Saramaki J, Fortunato S (2010) Characterizing the community structure of complex networks. PLoS ONE 5: 0011976. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 27. Traud AL, Kelsic ED, Mucha PJ, Porter MA (2011) Comparing community structure to characteristics in online collegiate social networks. SIAM review 53: 526–543. [Google Scholar]
  • 28. Ferrara E (2012) Community structure discovery in facebook. International Journal of Social Network Mining 1: 67–90. [Google Scholar]
  • 29. Goncalves B, Perra N, Vespignani A (2011) Modeling users’ activity on twitter networks: Validation of dunbar’s number. PLoS ONE 6: 0022656. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 30. Liu ZH, Hu B (2005) Epidemic spreading in community networks. Europhys Lett 72: 315. [Google Scholar]
  • 31. Huang L, Park K, Lai YC (2006) Information propagation on modular networks. Phys Rev E 73: 035103. [DOI] [PubMed] [Google Scholar]
  • 32. Huang W, Li CG (2007) Epidemic spreading in scale-free networks with community structure. J Stat Mech 01: P01014. [Google Scholar]
  • 33. Wu XY, Liu ZH (2008) How community structure influences epidemic spread in social networks. Physica A 387: 623–630. [Google Scholar]
  • 34. Chu X, Guan J, Zhang Z, Zhou S (2009) Epidemic spreading in weighted scale-free networks with community structure. J Stat Mech 07: P07043. [Google Scholar]
  • 35. Zhou J, Liu ZH (2009) Epidemic spreading in communities with mobile agents. Physica A 388: 1228–1236. [Google Scholar]
  • 36. Guimera R, Amaral LAN (2005) Functional cartography of complex metabolic networks. Nature 433: 895–900. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 37. Gong K, Tang M, Yang H, Shangl MS (2011) Variability of contact process in complex networks. CHAOS 21: 043130. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 38. Shu PP, Tang M, Gong K, Liu Y (2012) Effects of weak ties on epidemic predictability in community networks. CHAOS 22: 043124. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 39. Onnela JP, Saramaki J, Hyvonen J, Szabo G, Lazer D, et al. (2007) Structure and tie strengths in mobile communication networks. Proc Natl Acad Sci USA 104: 7332–7336. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 40. Centola D, Macy M (2007) Complex Contagions and the Weakness of Long Ties. AJS 113: 702–734. [Google Scholar]
  • 41. Zhao J, Wu J, Xu K (2010) Weak ties: subtle role of information diffusion in online social networks. Phys Rev E 82: 016105. [DOI] [PubMed] [Google Scholar]
  • 42. Masuda N (2009) Immunization of networks with community structure. New J Phys 11: 123018. [Google Scholar]
  • 43. Mihalik A, Csermely P (2011) Heat shock partially dissociates the overlapping modules of the yeast protein-protein interaction network: a systems level model of adaptation. PLoS Comput Biol 7: 1002187. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 44. Yang H, Tang M, Zhang HF (2012) Efficient community-based control strategies in adaptive networks. New J Phys 14: 123017. [Google Scholar]
  • 45. Salathe M, Jones JH (2010) Dynamics and control of diseases in networks with community structure. PLoS Comput Biol 6: 1000736. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 46. Chen YP, Paul G, Havlin S, Liljeros F, Stanley HE (2008) Finding a better immunization strategy. Phys Rev Lett 101: 058701. [DOI] [PubMed] [Google Scholar]
  • 47.Ferrar E, Meo P, Fiumara G, Provetti A (2012) The role of strong and weak ties in facebook: a community structure perspective. arXiv:12030535v1.
  • 48. Guimerà R, Mossa S, Turtschi A, Amaral LAN (2005) The worldwide air transportation network: Anomalous centrality, community structure, and cities’ global roles. Proc Natl Acad Sci USA 102: 7794. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 49.Hébert-Dufresne L, Allard A, Young JG, Dubé LJ (2012). Global efficiency of local immunization on complex networks. arXiv:1208.5768. [DOI] [PMC free article] [PubMed]
  • 50. Fortunato S (2010) Community detection in graphs. Phys Rep 486: 75–174. [Google Scholar]
  • 51. Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65: 056109. [DOI] [PubMed] [Google Scholar]
  • 52. Lu LY, Zhang YC, Yeung CH, Zhou T (2011) Leaders in social networks, the delicious case. PLoS ONE 6: 21202. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 53. Holme P, Saramäki J (2012) Temporal networks. Phys Rep 519: 97–125. [Google Scholar]
  • 54.Keeling MJ, Rohani P (2008) Modeling infectious diseases in humans and animals. Princeton University Press.
  • 55. Newman MEJ, Girvan M (2004) Finding and evaluating community structure in networks. Phys Rev E 69: 026113. [DOI] [PubMed] [Google Scholar]
  • 56. Newman MEJ (2002) Assortative mixing in networks. Phys Rev Lett 89: 208701. [DOI] [PubMed] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

Figure S1

Comparison of peak prevalence of immunization algorithms in empirical networks. The differences in the peak prevalence (left panel) Inline graphic between ACQ and BHD, and (right panel) Inline graphic between CBF and BHD are shown for each of the five empirical networks as a function of the immunization coverage Inline graphic. A positive value indicates that BHD is more effective than the other algorithms. The comparison is similar in features with those shown in Figure 3 for the differences in the final epidemic ratios. Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic.

(EPS)

Figure S2

Comparison of residual mean degrees of different immunization algorithms in empirical networks. The differences in the mean degrees Inline graphic (left panel) and Inline graphic (right panel) using different immunization algorithms are shown for each of the five empirical networks as a function of the immunization coverage Inline graphic. Here, Inline graphic is the mean degree of the network before an immunization algorithm is applied. A positive value indicates that BHD is more effective in reducing the mean degree and thus breaking up the network. Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic.

(EPS)

Figure S3

Comparison of duration of epidemic of different immunization algorithms in empirical networks. The differences in the duration of epidemic between ACQ and BHD (left panel) and between CBF and BHD (right panel) are shown for each of the five empirical networks as a function of the immunization coverage Inline graphic. Results are obtained by averaging over Inline graphic realizations for each value of Inline graphic.

(EPS)

Figure S4

Robustness of BHD in networks with noise as modeled by addition and removal of links for Inline graphic immunization coverage. As in Figure 7, the quantity Inline graphic is shown as a function of the number of links randomly added to or removed from an empirical network. Results are shown for each of the five empirical networks as labeled. The immunization coverage is Inline graphic. The SIR parameters are Inline graphic and Inline graphic. Results are obtained by averaging over Inline graphic realizations for each value of added and removed links.

(EPS)

Figure S5

Effects of starting the search for immunization nodes from different number of steps on the final epidemic ratio. Results in the main text and figures are obtained by starting the search for immunization nodes two steps after a self-avoiding walk began. Here, results for starting the search after 1, 2, 3, 4, 5 steps are shown for each of the five empirical networks.

(EPS)

Text S1

Computational Complexity Analysis.

(PDF)


Articles from PLoS ONE are provided here courtesy of PLOS

RESOURCES