Skip to main content
Elsevier - PMC COVID-19 Collection logoLink to Elsevier - PMC COVID-19 Collection
. 2016 Apr 22;400:92–102. doi: 10.1016/j.jtbi.2016.04.018

A biologically inspired immunization strategy for network epidemiology

Yang Liu a, Yong Deng a,b,, Marko Jusup c,⁎⁎, Zhen Wang d,e,⁎⁎⁎
PMCID: PMC7094112  PMID: 27113785

Abstract

Well-known immunization strategies, based on degree centrality, betweenness centrality, or closeness centrality, either neglect the structural significance of a node or require global information about the network. We propose a biologically inspired immunization strategy that circumvents both of these problems by considering the number of links of a focal node and the way the neighbors are connected among themselves. The strategy thus measures the dependence of the neighbors on the focal node, identifying the ability of this node to spread the disease. Nodes with the highest ability in the network are the first to be immunized. To test the performance of our method, we conduct numerical simulations on several computer-generated and empirical networks, using the susceptible-infected-recovered (SIR) model. The results show that the proposed strategy largely outperforms the existing well-known strategies.

Keywords: Infectious agent, Physarum polycephalum, Heterogeneous topology, Degree centrality, Betweenness centrality, Closeness centrality, SIR model

Highlights

  • We study an efficient, bio-inspired immunization strategy for network epidemiology.

  • Inspiration stems from a single-celled, ameba-like organism, Physarum polycephalum.

  • Our strategy goes beyond the node degree in selecting targets for immunization.

  • The strategy performs considerably better than several well-known competitors.

1. Introduction

Infectious agents, in the broadest sense, can spread in a ‘population’ of humans, animals, and nowadays technological devices. In the case of an outbreak, the goal is to minimize the damage to the ‘population’ without violating the constraints of a limited budget. Achieving this goal in ‘populations’ other than the primitive, well-mixed ones is the main reason why the problems of (i) epidemics spreading in complex networks (Pastor-Satorras and Vespignani, 2001, Saumell-Mendiola et al., 2012, Zhou et al., 2012, Wang and Xiao, 2012, Buono et al., 2014) and (ii) the corresponding immunization strategies (Balthrop et al., 2004, Bauch and Earn, 2004, Schneider et al., 2011, Hébert-Dufresne et al., 2013) attracted considerable attention in the literature. Such a trend is further spurred by the outcomes of ineffectively controlled epidemics—exemplified by the severe acute respiratory syndrome (SARS) and the swine flu (Schneider et al., 2011)—which rapidly spread all over the world due to globalization and better means of transport (Colizza et al., 2007, Perra et al., 2012). An immediate concern, therefore, is the development of the effective countermeasures against epidemics, wherein immunization science plays an important, if not critical, role.

Multiple immunization strategies have been considered for complex networks. Uniform or random immunization (Pastor-Satorras and Vespignani, 2002) selects any node in the network with equal probability at each time step, which results in a strategy suitable for homogeneous networks, but ignores the fact that in highly heterogeneous networks eradicating an infective agent cannot be guaranteed regardless of the fraction of immunized nodes. Targeted immunization (Mirzasoleiman et al., 2012, Schneider et al., 2012) seeks to overcome this problem by selecting the nodes with the highest ability to spread the disease. Such ability is often measured in terms of degree centrality, defined as the number of ties a node has, or betweenness centrality, which indicates how often a node is located along the shortest route between two other nodes. A strategy based on degree centrality is highly effective, yet it neglects the structural significance of a node because the most connected nodes are not necessarily the ones that facilitate disease propagation from one dense cluster to another (Hébert-Dufresne et al., 2013). Betweenness centrality can be used to overcome such a shortcoming, but suffers from a considerable computational cost (Hébert-Dufresne et al., 2013). In general, targeted immunization requires global knowledge of network properties, which is impractical. Motivated by such an impracticality, so-called acquaintance immunization (Cohen et al., 2003, Gallos et al., 2007) was developed, whereby immunized nodes comprise only a small fraction of random neighbors of randomly selected nodes. Furthermore, a number of alternative and/or more specialized strategies have also been discussed (Fu et al., 2008, Lü et al., 2011, Gong et al., 2013, Wang et al., 2014, Yan et al., 2014). Owing to their immediate practical and economic implications, additional studies involving novel immunization strategies are still of considerable importance.

Herein we propose an efficient biologically inspired immunization strategy for network epidemiology. The term biologically inspired is used in the sense that we draw inspiration from a single-celled, ameba-like organism Physarum polycephalum, capable of transporting signals and nutrients through a dendritic (i.e. tree-like) network of tubular structures called pseudopodia (Nakagaki et al., 2000). Physarum is particularly interesting because of the ability to perform cellular computations of a sort, which lead to the solution of, for example, the shortest path problem. This and similar observations served as a basis for constructing a mathematical model of an adaptive transport network driven by Poiseuille flow that exhibits computational abilities much like Physarum itself (Tero et al., 2007). Subsequently, a Physarum-type algorithm has been used for solving the Steiner Minimum Tree problem (Tero et al., 2008, Tero et al., 2010), for optimizing network design (Tero et al., 2010, Watanabe et al., 2011, Liu et al., 2015, Song et al., 2014), and for a variety of other applications (Zhang et al., 2012, Zhang et al., 2013, Gao et al., 2013, Adamatzky, 2014, Adamatzky and Schubert, 2014).

The paper is organized as follows. In Section 2 we describe how to construct a Physarum model and modify it into a strategy for immunizing complex networks. Model properties and performance are examined in Section 3. In particular, we emphasize (i) the difference in functioning between the proposed strategy and other, well-known counterparts, (ii) the gain in performance by accounting for the structural importance of nodes, and (iii) the ability to capture the key attributes of a whole network based solely on the successive use of local information. Finally, in Section 4 we summarize the take-home message and discuss the potential drawbacks, as well as the future developments.

2. Methods

The proposed, biologically inspired strategy (denoted simply AS, where A stands for ameba) is constructed in three steps. First, we describe the Physarum model for the shortest path selection. We then modify the model by adding a noise factor to select the paths alternative to the shortest one along which the disease can still spread, albeit with a lower probability. Second, the original Physarum (single-source, single-sink) model is further modified to become a single-source, multi-sink model to consider the spread of the disease to multiple targets simultaneously. With these modifications, the model measures the dependence of each node in the network on the focal node. The third and final step in the construction of AS is motivated by the fact that applying the modified Physarum model to a large network is impractical due to a possible lack of information on the network structure or the high computational expense. Accordingly, for each focal node, a subnetwork consisting of the focal node itself and its R-step neighbors is separated from whole network, whereupon the model is applied to this R-local subnetwork. To test the performance of AS, we conduct numerical simulations on several computer-generated and empirical networks.

2.1. A Physarum model for the shortest paths selection

The shortest path selection by Physarum polycephalum is based on the transformations of tubular structures (pseudopodia) (Tero et al., 2007, Nakagaki et al., 2001) and a positive feedback from flow rates (Chae and Nguang, 2014, Zhang et al., 2014). Namely, high rates of the protoplasmic flow stimulate the diameter of pseudopodia to increase, whereas at low flow rates the diameter tends to decrease. The pseudopodia thickness thus adapts to the flow rate. More formally, we observe a set of nodes N, containing two end-nodes, i 1 and i 2 (for biological reasons also called food-source nodes), and any number of in-between nodes, iN. The edge connecting nodes i,jN is denoted as i–j and serves as a symbolic representation of a pseudopodium. Denoting by Q ij the flux through edge ij (i.e. from i to j) and assuming the flow through pseudopodia to be approximately Poiseuille flow, we obtain:

Qij=πrij48ξLij(pipj)=DijLij(pipj), (1)

where ξ is the viscosity coefficient of the sol, Dij=πrij4/8ξ is a measure of the conductivity of pseudopodia (with r ij being the radius), and pi is the pressure at node i. L ij is the length of edge ij. One interpretation for these lengths follows from the fact that Lij1 determines the importance of edge ij, which means that in an unweighted network Lij=1 for all possible is and js.

Pressures, pi in Eq. (1) are unknown. To obtain them, we further assume that in-between nodes are of zero capacity and that the sol conservation law is upheld, yielding at each node j, iΓ(j)Qij=0, j1,2, where i runs across the set of the nearest neighbors of j, Γ(j). For the source node, 1, and the sink node, 2, we have iΓ(1)Qi1=I0 and iΓ(2)Qi2=I0, respectively, where I 0 is the influx from the source node (or into the sink node). It follows:

iΓ(j)DijLij(pipj)={1forj=1,+1forj=2,0otherwise, (2)

where without any loss of generality I0=1. By further setting p2=0 as the basic pressure level, all pis can be determined from the above system of equations. Finally, using Eq. (1) all flows, Qij=Dij(pipj)/Lij, can also be obtained.

Experiments show that pseudopodia with higher flux rates are reinforced, while those with lower flux rates degenerate (Tero et al., 2007, Nakagaki et al., 2001). To accommodate this adaptive behavior of pseudopodia, the conductivities, D ij, are assumed to change according to the following equation:

ddtDij=f(|Qij|)aDij, (3)

where a is the decay rate. The functional form f(|Qij|) is, for simplicity, set to f(|Qij|)=b|Qij|, where b is a constant (Tero et al., 2007). We further simplify the notation by choosing the units in which b/a=1, implying that flow and conductivity have the same dimensions, that pressure has the dimension of length, and that the time, t=at, is dimensionless (in the following, we will suppress the prime because no confusion can occur). To solve Eq. (3), a semi-implicit scheme is used as follows:

Dijn+1Dijnδt=|Qijn|Dijn+1, (4)

where δt is a time step and the upper index, n, indicates the current moment in time. In this way, the time-varying conductivity, D ij, degenerates to zero for every path between the end-nodes, except the shortest one.

2.2. A noise factor for irrational path selection

The described Physarum model solves the shortest path problem, but that is not where our interest lies. To formulate an immunization strategy, it is necessary to consider the paths other than the shortest one. However, in the original Physarum model, the flow Q ij from node i to node j tends to unity if the edge ij is lying on the shortest path or tends to zero otherwise (Bonifaci et al., 2012). To account for other pathways as well, we rewrite Eq. (4) as follows:

Dijn+1Dijnδt=|Qijn|1γ+γ|Qijn|Dijn+1,(0<γ1) (5)

where γ is a noise factor. Similar to the noise in game theory (Wang et al., 2013, Wang et al., 2013), γ is introduced to disturb the mass flow distribution through the network's edges. Using the terminology from evolutionary biology, γ permits irrational selection. The modified model approaches the original as γ0.

2.3. Multi-foraging

For the purpose of devising an immunization strategy, in addition to modifying the model by a noise term, we wish to simultaneously consider the potential for the spread of the disease from a source node to multiple other nodes in the network. To achieve such a feat, we rewrite Eq. (2) as

iΓ(j)DijLij(pipj)={1forj=1,1n1forj={2,3,,n},0otherwise, (6)

where n is the number of nodes in the network. We call this model a multi-forage model because multiple sink-nodes can “forage” on a single source-node. By applying the multi-forage model, we are in a position to derive a proxy for the ability of the focal node to spread the disease.

2.4. A biologically inspired immunization strategy (AS)

The extended Physarum model has all the desired properties for formulating an immunization strategy, yet the information on the structure of the whole network may not exist. Even if such information is available, the model may not be applicable to a very large network for computational reasons (Becchetti et al., 2013). We therefore pursue an R-local approach that considers only a subnetwork of the focal node comprised of the focal node's R-level neighbors and all the accompanying edges. Specifically, a proxy for the focal node's ability to spread the disease is obtained through the following steps:

  • 1.

    Take ΓR(k), the set of all R-level neighbors of the focal node k.

  • 2.

    For each lΓR(k), one iteration of the model is run in which node l is the source and all other jΓR(k){k} are the sinks. Each iteration thus generates inflows (i.e. positive flows) Qij(k,l) along all edges ij in the selected R-local subnetwork of focal node k.

  • 3.

    The summation across all iterations, Qij(k)=lΓR(k)Qij(k,l), gives the so-called flow matrix.

  • 4.
    Finally, the ability of focal node k to spread the disease is quantified by a score:
    AS(k)=ijQij(k), (7)
    where ij symbolizes the summation over all the edges in the R-local subnetwork of focal node k.
  • 5.

    The focal node with the highest AS-score is the first to be immunized.

The first three steps of the described strategy may be somewhat difficult to understand using just a mathematical notation. Accordingly, these steps are illustrated in Fig. 1 . To distinguish focal node 1 from its first-level neighbors, we mark it with a wax-yellow color. The results of a single model iteration, in which node 3 is chosen as the source node, are shown in Fig. 1a. This iteration is immediately followed by another one (Fig. 1b), such that node 2 is the source node. The results are summed to produce the flow matrix in Fig. 1c. The AS-score for focal node 1 is obtained by repeating the process for all of 1's first-level neighbors and then summing the elements of the flow matrix across all edges.

Fig. 1.

Fig. 1

Internal functioning of AS. Node 1 marked with wax-yellow color is the focal node, whereas the other nodes are its first-level neighbors. Panels a and b show the results of two model iterations in which nodes 3 and 2 are selected as the source nodes, respectively. These results are summed to produce the so-called flow matrix in panel c. Upon running all possible iterations (see the accompanying text), the AS-score for the focal node is obtained by summing the elements of the flow matrix across all edges.

3. Results and discussion

Next, we examine several interesting properties of AS and test its performance against strategies based on degree centrality (DCS), betweenness centrality (BCS), and closeness centrality (CCS). Both stylized, computer-generated networks and real-world, empirical networks are used in the performance tests. Additionally, the success of immunization is tested in conjunction with a susceptible-infectious-recovered (SIR) model.

3.1. Properties of AS

The role of the noise factor and irrational path selection. The proposed immunization strategy is designed to quantify the ability of a focal node to spread the disease through the network. Put alternatively, we want to know (i) the extent to which the neighbors depend on the focal node and (ii) the relative importance of disease spreading pathways on which the focal node lies. Nodes 2, 3, and 4 in the inset of Fig. 2 , for example, are just partially dependent on node 1 because they are, among others, connected by pathways excluding the latter node. Node 5, by contrast, is fully dependent on node 1. Furthermore, if we consider the spread of the disease from node 5 to node 3, path 5-1-3 is the most direct, but the disease can spread through alternative paths 5-1-2-3 and 5-1-4-3. Such alternatives need to be taken into account to properly determine the ability of the focal node to spread the disease. The original Physarum model cannot yield the desired result. If we imagine for a moment that the link between nodes 1 and 3 is removed and assume that path 5-1-2-3 is just a tiny bit shorter than alternative path 5-1-4-3, all flow would be assigned to the former path. Node 4 would consequently be disregarded as irrelevant for the spread of the disease, while nodes 1 and 2 would (wrongly) be considered of equal relevance. However, the possibility of having an epidemic spread via both paths (i.e. 5-1-2-3 and 5-1-4-3) would suggest that nodes 2 and 4 should be seen almost as equivalents, whereas node 1 is of more immediate concern. The role of the noise factor, γ, is to resolve the described problem. Indeed, the three paths from node 5 to node 3 are properly distinguished in Fig. 2 based on the flows, if the value of the noise factor is set to some γ>0.5.

Fig. 2.

Fig. 2

The role of the noise factor and irrational path selection. The distribution of flows, Qs, along the different paths from node 5 to node 3 (in the inset) is shown as a function of the noise factor, γ. If γ>0.5, in addition to shortest path 5-1-3, some flow is equally distributed between the two remaining paths, 5-1-2-3 and 5-1-4-3, meaning that the relative importance of disease spreading pathways is correctly distinguished.

The advantage of AS over the other comparable strategies. To exemplify why AS should perform well at immunizing a networked population, Fig. 3 shows three networks in which the wax-yellow circle represents the focal node, whereas the other circles are its 1-step neighbors. The degree centrality strategy (DCS) fails to distinguish nodes 1 and i in Fig. 3a and b because it neglects how neighbors are connected among themselves. The betweenness centrality strategy (BCS) solves this problem, but by considering only the shortest paths, the strategy fails to distinguish nodes i and a in Fig. 3b and c. Using AS, however, we obtain AS(1)=5.4, AS(i)=8.0, and AS(a)=9.2, respectively, which highlights the capacity of the proposed strategy to classify nodes for immunization where the other comparable strategies leave us in the dark.

Fig. 3.

Fig. 3

The advantage of AS over the other comparable strategies. Schematic network representations in which the node marked with wax-yellow color is the focal node, whereas the other nodes are its first-level neighbors. DCS fails to distinguish between the focal nodes in panels a and b. BCS fails to do the same for the focal nodes in panels b and c. AS, by contrast, does not suffer from the same problems as illustrated by displayed AS-scores.

To further emphasize how different AS is from the other well-known strategies, we compare the results obtained using a simple, yet non-trivial network taken from Kitsak et al. (2010). Fig. 4 shows the first five nodes marked for immunization by each of the strategies. DCS and CCS, in fact, end up marking the same five nodes for immunization shown in Fig. 4a, albeit in a different order. Note, however, that DCS is ambiguous as to what the order should be because nodes 3–6 have the same degree. Without an additional criteria, there is no reason to prefer one node over the other (we actually followed the numbering of nodes). Although all strategies singled out nodes 1 and 16, this is where the similarities end. BCS and AS (Fig. 4b and c) go beyond the node degree to mark nodes 23 and 24, both with only two links, for immunization. Nonetheless, the best performer is AS because after the first five nodes are immunized, the biggest cluster that can get infected is of size three (containing nodes 2, 3, and 4), whereas the other strategies leave clusters of size four (DCS and CCS) and even size five (BCS) exposed.

Fig. 4.

Fig. 4

The performance of the considered immunization strategies in a simple, yet non-trivial network taken from Kitsak et al. (2010). Nodes marked for immunization by DCS and CCS (panel a), BCS (panel b), and AS (panel c). The best performer is AS in panel c because the biggest cluster left exposed after immunization is of size three (nodes 2, 3, and 4), whereas DCS and CCS in panel a leave the cluster of size four exposed (e.g. nodes 23 to 26) and BCS in panel b leaves the cluster of size 5 (nodes 2, 4, 5, 11, and 12) exposed to a disease.

3.2. Performance testing in stylized, computer-generated networks

To test the performance of AS, we plot the fraction of a network that can be infected, F, against the fraction of immunized nodes, q. The tests are first performed in four stylized, computer-generated networks, the two of which are of Erdős-Rényi (ER) random type, whereas the remaining two are of Albert-Barabási scale-free (SF) type (Erdos et al., 1959, Albert and Barabási, 2002). The results are shown in Fig. 5 . Although AS performs very well, its performance is matched by DCS, which may seem surprising at first. However, random networks are not supposed to have structurally important nodes in the sense of Hébert-Dufresne et al. (2013), i.e. nodes that connect dense clusters, but do not necessarily have a high degree themselves. In scale-free networks, by contrast, structurally important nodes are most likely the ones with a high degree. These results suggest that random and scale-free networks may be overly stylized for thorough performance testing of the considered immunization strategies.

Fig. 5.

Fig. 5

Performance testing in stylized, computer-generated networks. The fraction of the network that can be infected, F, is shown as a function of the fraction of immunized nodes, q, for DCS, BCS, CCS, and AS using ER network with k=4.13 (panel a), ER network with k=4.03 (panel b), SF network with α=2.576 and k=6 (panel c), and SF network with α=2.468 and k=6 (panel d). The error bars are derived from multiple realizations of the same simulation. The effectiveness of AS approximately matches that of DCS and outperforms that of BCS and CCS in random and scale-free networks likewise.

3.3. Performance testing in real-world, empirical networks

For the purpose of additional performance testing, we rely on four empirical networks as follows:

  • Email, a complex email network of an organization with over 1000 employees (Newman et al., 2002);

  • GR-QC, a collaborative scientific network between more than 5000 authors who submitted their articles to General Relativity and Quantum Cosmology category of arXiv e-print archive (Leskovec et al., 2007).

  • Power grid, a representation of connections between almost 5000 power stations in the western US (Watts and Strogatz, 1998);

  • Yeast, a protein-protein interaction network of yeast containing over 2000 proteins (Von Mering et al., 2002).

Aside from the fact that all these networks are well-documented and readily obtainable, the first two were selected for their relevance to the spread of computer viruses and the possibility of sharing some properties with the networks of human physical contacts. Power grid network is interesting in the context of the protection from cascading failures, whereby ‘immunized’ nodes should have redundant capacity to handle the extra load when another network element fails. ‘Immunizing’ Yeast network is admittedly an academic exercise, yet a useful one because the properties of empirical networks are not readily observed and analyzed in their stylized, computer-generated substitutes (Albert and Barabási, 2002). The descriptive statistics of the four selected networks are summarized in Table 1 .

Table 1.

Descriptive statistics of the four empirical networks used in performance testing.

Network n m kmax H C
Email 1133 5451 71 1.9421 0.2202
GR-QC 5242 14490 81 3.0512 0.5296
Power 4941 6594 19 1.4504 0.0801
Yeast 2375 11693 118 3.4756 0.3057

Quantities: network size (n), number of edges (m), maximum degree (kmax), degree heterogeneity (H=k2/k2), and clustering coefficient (C).

The results of performance testing in real-world, empirical networks are shown in Fig. 6 . AS is seen outperforming all three well-known strategies to which it was compared. Moreover, in Figs. 6b–d the performance of AS diverges from that of DCS, thus confirming our previous comment that random and scale-free networks are overly stylized to reveal the key properties of the considered immunization strategies necessary for a thorough evaluation. Another important point is that AS was designed to combine the qualities of DCS and BCS, meaning that AS should perform well when DCS is better than BCS (which is precisely the case in Fig. 5, for example), but also when it is the other way around (as exemplified in Fig. 6b and d). The ability of AS to perform as expected gives us some confidence that our design was successful and that AS should outperform the other strategies in an even more dramatic fashion if simulations incorporated the realistic elements of an epidemic.

Fig. 6.

Fig. 6

Performance testing in real-world, empirical networks. Fraction of the network that can be infected, F, is shown as a function of the fraction of immunized nodes, q, for DCS, BCS, CCS, and AS using the Email network (panel a), the GR-QC network (panel b), the Power network (panel c), and the Yeast network (panel d).

3.4. Performance testing in conjunction with the susceptible-infectious-recovered model

To incorporate the realistic elements of an epidemic into performance testing, we resort to a susceptible-infectious-recovered (SIR) epidemiological model (Albert et al., 2000, Newman, 2002, Castellano and Pastor-Satorras, 2010, Xia et al., 2012) defined as follows:

  • Each node of the network can be in one of the three possible states: susceptible, infected, or recovered;

  • Initially, nodes to be immunized are determined and removed from the network, including the incident links;

  • A node from which the rest of the network can be infected is randomly selected, whereas all the other nodes start in the susceptible state;

  • At each time step, infected nodes transmit the disease to their susceptible neighbors with probability λ;

  • Infected nodes recover with probability η, whereupon they get removed from the network.

The last two steps of the process outlined above are repeated until no infected nodes remain.

The results of performance testing in conjunction with the SIR model, where λ=0.2 and η=0.05, are shown in Fig. 7 . The performance is measured in terms of the infected fraction, Pi, and the recovered fraction, P r, of nodes as the functions of time. The former measure is instantaneous in nature, whereas the latter quantifies the cumulative effect of an epidemic. In a scale-free network, consistent with the results in Fig. 5, DCS is an effective immunization strategy, yet AS performs considerably better (Fig. 7a). In GR-QC network, based on Fig. 6b, one might expect that BCS rather than DCS performs well. Although this is precisely the case, AS achieves an even higher effectiveness (Fig. 7b). In the power network, judging from Fig. 6c, DCS is surprisingly weak, but such a lackluster performance may have been caused by a low fraction of immunized nodes (5%) in the presented example (Fig. 7c). More importantly, AS once again emerges as a clear victor. The same is even more pronounced in the Yeast network (Fig. 7d). In summary, the maximum infected fraction and the final recovered fraction are considerably (2–20 times) lower if AS is used instead of DCS, BCS, or CCS with the same fraction of immunized nodes.

Fig. 7.

Fig. 7

Performance testing in conjunction with SIR modeling. The infected fraction, Pi, and the recovered fraction, Pr, of nodes as the functions of time in SIR simulations. Shown are the comparisons between DCS, BCS, CCS, and AS (color coding as in Fig. 5 and Fig. 6) after having immunized fraction q=0.15 of nodes in an SF network with k=6 (panel a), q=0.08 of nodes in the GR-QC network (panel b), q=0.05 of nodes in the Power network (panel c), and q=0.15 of nodes in the Yeast network (panel d).

4. Conclusions and outlook

Achievements. We designed and tested a new, efficient network immunization strategy by drawing inspiration from an ameba-like organism, Physarum polycephalum. By looking at the dependence between any two nodes, we modified the original Physarum model with a noise factor for similar path finding. We then extended the model to include multi-foraging in order to obtain the dependence of other nodes on the focal one. This dependence is expressed in the form of a flow matrix, which indicates the ability of the focal node to spread the disease. Perhaps the most important properties of such a design are the ability to (i) distinguish situations that other comparable methods cannot and (ii) recognize structurally critical nodes that may not have a high degree themselves, yet they connect dense clusters of nodes.

Applicability. In the proposed strategy, immunized nodes are those with a higher ability to spread the disease as indicated by the AS-score. However, calculating such a score in reality may be difficult. The information on human physical contacts is hard to come by and even if the necessary information is available, a strong time-dependence is likely to cause erroneous assessments. The proposed method partly overcomes these difficulties by being local in the sense of Hébert-Dufresne et al. (2013). The information on a few R-local subnetworks can be used to start an immunization program, which can later be expanded in scope as the new information comes in. The results are encouraging in this context because, even if AS is applied locally, the attributes of the whole network are successfully revealed.

In view of the difficulties in applying the proposed (and any other) immunization strategy, it is important to admit that more success may be achieved in technological networks for which the relevant, structural information is more readily available. Another context in which the proposed strategy may be more applicable is the spread of a disease in a network of villages or towns, whereby an efficient immunization strategy may identify hotspots for implementing preventive measures with the most impact.

Outlook. Because the effectiveness of immunization programs may be hampered by a lack of information, perhaps the most immediate concern is to design the strategies that (i) perform well under information restrictions and (ii) can combine information from multiple sources. As for the restricted information, AS already functions locally, but achieves efficiency globally. To address the problem of combining several information sources, we may need to resort to the framework of multilayer networks (Wang et al., 2015), such that each network layer represents one type of information. Upon obtaining the AS-score in each layer separately, the results could be combined in a certain fashion to produce one overall score for the decision-making. In fact, optimizing the way in which the results are combined could be an interesting task for the field of intelligent computation (Du et al., 2016). Finally, the incentives for the different behavioral responses to an epidemic could be systematically incorporated into our framework by means of evolutionary game theory (Perc and Szolnoki, 2010, Wang et al., 2015).

Acknowledgments

This work is partially supported by National High Technology Research and Development Program of China (863 Program) (Grant No. 2013AA013801), National Natural Science Foundation of China (Grant Nos. 61174022, 61573290, and 61503237), China State Key Laboratory of Virtual Reality Technology and Systems, Beihang University (Grant No. BUAA-VR-14KF-02), and Japan Society for the Promotion of Science (JSPS) Postdoctoral Fellowship Program for Foreign Researchers (no. P13380) and an accompanying Grant-in-Aid for Scientific Research.

Contributor Information

Yong Deng, Email: prof.deng@hotmail.com.

Marko Jusup, Email: mjusup@gmail.com.

Zhen Wang, Email: zhenwang0@gmail.com.

Appendix A. Additional analyses

There are fundamental obstacles to analytically comparing the performance of various immunization strategies. Namely, a network's (mean–field) statistics translate into the statistics of nodes selected for immunization by each of the methods, which in turn determines the value of a common performance indicator (e.g. the largest fraction of nodes that can get infected after immunization, F). This sequence of dependencies is most easily seen by considering the workings of the degree centrality strategy, and is reflected in the fact that the simulated performance of each strategy varies greatly with the network structure. A more important consequence is that any analytical proof that one method is better than the others would have to start by assuming a mean–field statistic, and therefore would remain specific to such a statistic, largely diminishing the usefulness of this approach. Furthermore, mean–field statistics are generally known only for synthetic networks arising from the well-known (e.g. Erdős–Rényi and scale–free) algorithms, yet these networks fail to fully reveal how advantageous the proposed strategy (AS) is (Fig. 5). AS truly shines when applied to highly heterogeneous, real-world networks (Fig. 6, Fig. 7; also see below).

To strengthen the case for AS, we performed a number of analyses beside those found in the main text. First we compare how AS fares against a fairly recent immunization strategy called k-core (hereafter KCS) (Kitsak et al., 2010, Wei et al., 2015). A conceptual advantage of AS in comparison with KCS is that the latter strategy needs global knowledge to decompose a network and then identify the most influential nodes. AS, by contrast, relies only on local identification, meaning that the influence of each node is assessed from the information on the node's immediate neighborhood. Despite the information “handicap” of being local, AS manages to outperform KCS in all four real-world networks considered in the main text (Fig. A1 ). In addition, we provide the simulation results for the leader rank strategy (LRS) (Lü et al., 2011) which also appeared in the literature fairly recently. LRS in some instances (Fig. A2a and c) achieves almost the same efficiency as AS, yet we have not identified any examples in which the former strategy would outperform the latter.

Fig. A1.

Fig. A1

Comparison of AS with two recent immunization strategies. Fraction of the network that can be infected, F, is shown as a function of the fraction of immunized nodes, q, for KCS (k-core strategy), LRS (leader rank strategy), and AS using the Email network (panel a), the GR-QC network (panel b), the Power network (panel c), and the Yeast network (panel d).

Fig. A2.

Fig. A2

Performance testing in additional empirical networks: the case of the PGP network. Fraction of the network that can be infected, F (panels a–c), and the recovered fraction, Pr, of nodes in SIR simulations (panel d) are shown as the functions of the fraction of immunized nodes, q, for DCS, BCS, CCS, and AS.

To further solidify the leading position of AS, we acquired the information on three additional real-world networks and tested the performance of AS against the rival strategies. Networks used in these tests are:

The descriptive statistics of the three additional networks are summarized in Table A1 .

Table A1.

Descriptive statistics of the three additional empirical networks used in performance testing.

Network n m kmax H C
PGP 10,680 24,316 205 4.1465 0.2659
CA-HepPH 12,008 118,505 491 6.5830 0.6115
Twitter 65,911 185,737 233 2.5829 0.1823

Quantities: network size (n), number of edges (m), maximum degree (kmax), degree heterogeneity (H=k2/k2), and clustering coefficient (C).

The results of numerical simulations using the networks listed in Table A1 are shown in Fig. A2, Fig. A3, Fig. A4 . After immunization, we examine the largest fraction of the network that can get infected (F) and the recovered fraction of nodes in an SIR epidemic (P r). In all instances, the results are displayed as the functions of the fraction of immunized nodes (q). AS turns out to be a clear winner of these tests, outperforming its well-known competitors with a considerable margin. Overall, numerical tests strongly support the conclusion that AS offers new and improved power to identify nodes critical for the spread of infectious agents in network epidemiology.

Fig. A3.

Fig. A3

Performance testing in additional empirical networks: the case of the CA-HepPH network. Fraction of the network that can be infected, F (panels a–c), and the recovered fraction, Pr, of nodes in SIR simulations (panel d) are shown as the functions of the fraction of immunized nodes, q, for DCS, BCS, CCS, and AS.

Fig. A4.

Fig. A4

Performance testing in additional empirical networks: the case of the Twitter network. Fraction of the network that can be infected, F (panels a–c), and the recovered fraction, Pr, of nodes in SIR simulations (panel d) are shown as the functions of the fraction of immunized nodes, q, for DCS, BCS, CCS, and AS.

References

  1. Adamatzky A., Schubert T. Slime mold microfluidic logical gates. Mater. Today. 2014;17:86–91. [Google Scholar]
  2. Adamatzky A. Slime mould electronic oscillators. Microelectron. Eng. 2014;124:58–65. [Google Scholar]
  3. Albert R., Barabási A.-L. Statistical mechanics of complex networks. Rev. Mod. Phys. 2002;74:47. [Google Scholar]
  4. Albert R., Jeong H., Barabási A.-L. Error and attack tolerance of complex networks. Nature. 2000;406:378–382. doi: 10.1038/35019019. [DOI] [PubMed] [Google Scholar]
  5. Balthrop J., Forrest S., Newman M.E.J., Williamson M.M. Technological networks and the spread of computer viruses. Science. 2004;304:527–529. doi: 10.1126/science.1095845. [DOI] [PubMed] [Google Scholar]
  6. Bauch C.T., Earn D.J. Vaccination and the theory of games. Proc. Natl. Acad. Sci. USA. 2004;101:13391–13394. doi: 10.1073/pnas.0403823101. [DOI] [PMC free article] [PubMed] [Google Scholar]
  7. Becchetti, L., Bonifaci, V., Dirnberger, M., Karrenbauer, A., Mehlhorn, K., 2013. Physarum can compute shortest paths: convergence proofs and complexity bounds, In: Automata, Languages, and Programming, Springer, 2013, pp. 472–483.
  8. Boguñá M., Pastor-Satorras R., Díaz-Guilera A., Arenas A. Models of social networks based on social distance attachment. Phys. Rev. E. 2004;70:056122. doi: 10.1103/PhysRevE.70.056122. [DOI] [PubMed] [Google Scholar]
  9. Bonifaci V., Mehlhorn K., Varma G. Physarum can compute shortest paths. J. Theor. Biol. 2012;309:121–133. doi: 10.1016/j.jtbi.2012.06.017. [DOI] [PubMed] [Google Scholar]
  10. Buono C., Alvarez-Zuzek L.G., Macri P.A., Braunstein L.A. Epidemics in partially overlapped multiplex networks. PLOS One. 2014;9:e92200. doi: 10.1371/journal.pone.0092200. [DOI] [PMC free article] [PubMed] [Google Scholar]
  11. Castellano C., Pastor-Satorras R. Thresholds for epidemic spreading in networks. Phys. Rev. Lett. 2010;105:218701. doi: 10.1103/PhysRevLett.105.218701. [DOI] [PubMed] [Google Scholar]
  12. Chae S., Nguang S.K. SOS based robust h-infinity fuzzy dynamic output feedback control of nonlinear networked control systems. IEEE Trans. Cybern. 2014;44:1204–1213. doi: 10.1109/TCYB.2013.2281458. [DOI] [PubMed] [Google Scholar]
  13. Cohen R., Havlin S., Ben-Avraham D. Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 2003;91:247901. doi: 10.1103/PhysRevLett.91.247901. [DOI] [PubMed] [Google Scholar]
  14. Colizza V., Barrat A., Barthelemy M., Valleron A.-J., Vespignani A. Modeling the worldwide spread of pandemic influenza: baseline case and containment interventions. PLOS Med. 2007;4:e13. doi: 10.1371/journal.pmed.0040013. [DOI] [PMC free article] [PubMed] [Google Scholar]
  15. Du W.-B., Zhou X.-L., Jusup M., Wang Z. Physics of transportation: towards optimal capacity using the multilayer network framework. Sci. Rep. 2016;6:19059. doi: 10.1038/srep19059. [DOI] [PMC free article] [PubMed] [Google Scholar]
  16. Duch J., Arenas A. Community detection in complex networks using extremal optimization. Phys. Rev. E. 2005;72:027104. doi: 10.1103/PhysRevE.72.027104. [DOI] [PubMed] [Google Scholar]
  17. Erdős P., Rényi A. On random graphs I. Publ. Math. Debr. 1959;6:290–297. [Google Scholar]
  18. Fu X., Small M., Walker D.M., Zhang H. Epidemic dynamics on scale-free networks with piecewise linear infectivity and immunization. Phys. Rev. E. 2008;77:036113. doi: 10.1103/PhysRevE.77.036113. [DOI] [PubMed] [Google Scholar]
  19. Gallos L.K., Liljeros F., Argyrakis P., Bunde A., Havlin S. Improving immunization strategies. Phys. Rev. E. 2007;75:045104. doi: 10.1103/PhysRevE.75.045104. [DOI] [PubMed] [Google Scholar]
  20. Gao C., Wei D., Hu Y., Mahadevan S., Deng Y. A modified evidential methodology of identifying influential nodes in weighted networks. Physica A. 2013;392:5490–5500. [Google Scholar]
  21. Gong K., Tang M., Hui P.M., Zhang H.F., Younghae D., Lai Y.-C. An efficient immunization strategy for community networks. PLOS One. 2013;8:e83489. doi: 10.1371/journal.pone.0083489. [DOI] [PMC free article] [PubMed] [Google Scholar]
  22. Hébert-Dufresne L., Allard A., Young J.-G., Dubé L.J. Global efficiency of local immunization on complex networks. Sci. Rep. 2013;3:2171. doi: 10.1038/srep02171. [DOI] [PMC free article] [PubMed] [Google Scholar]
  23. Kitsak M., Gallos L.K., Havlin S., Liljeros F., Muchnik L., Stanley H.E., Makse H.A. Identification of influential spreaders in complex networks. Nat. Phys. 2010;6:888–893. [Google Scholar]
  24. Lü Z., Huang W. Iterated tabu search for identifying community structure in complex networks. Phys. Rev. E. 2009;80(2):026130. doi: 10.1103/PhysRevE.80.026130. [DOI] [PubMed] [Google Scholar]
  25. Lü L., Zhang Y.-C., Yeung C.H., Zhou T. Leaders in social networks, the delicious case. PLOS One. 2011;6:e21202. doi: 10.1371/journal.pone.0021202. [DOI] [PMC free article] [PubMed] [Google Scholar]
  26. Leskovec J., Kleinberg J., Faloutsos C. Graph evolution: densification and shrinking diameters. ACM Trans. Knowl. Discov. Data. 2007;1:2. [Google Scholar]
  27. Liu L., Song Y., Zhang H., Ma H., Vasilakos A. Physarum optimization: a biology-inspired algorithm for the steiner tree problem in networks. IEEE Trans. Comput. 2015;64:819–832. [Google Scholar]
  28. Mirzasoleiman B., Babaei M., Jalili M. Immunizing complex networks with limited budget. EPL (Europhys. Lett.) 2012;98:38004. [Google Scholar]
  29. Nakagaki T., Yamada H., Tóth Á. Intelligence maze-solving by an amoeboid organism. Nature. 2000;407 doi: 10.1038/35035159. 470–470. [DOI] [PubMed] [Google Scholar]
  30. Nakagaki T., Yamada H., Toth A. Path finding by tube morphogenesis in an amoeboid organism. Biophys. Chem. 2001;92:47–52. doi: 10.1016/s0301-4622(01)00179-x. [DOI] [PubMed] [Google Scholar]
  31. Newman M.E., Forrest S., Balthrop J. Email networks and the spread of computer viruses. Phys. Rev. E. 2002;66:035101. doi: 10.1103/PhysRevE.66.035101. [DOI] [PubMed] [Google Scholar]
  32. Newman M.E. Spread of epidemic disease on networks. Phys. Rev. E. 2002;66:016128. doi: 10.1103/PhysRevE.66.016128. [DOI] [PubMed] [Google Scholar]
  33. Pastor-Satorras R., Vespignani A. Epidemic spreading in scale-free networks. Phys. Rev. Lett. 2001;86:3200. doi: 10.1103/PhysRevLett.86.3200. [DOI] [PubMed] [Google Scholar]
  34. Pastor-Satorras R., Vespignani A. Immunization of complex networks. Phys. Rev. E. 2002;65:036104. doi: 10.1103/PhysRevE.65.036104. [DOI] [PubMed] [Google Scholar]
  35. Perc M., Szolnoki A. Coevolutionary games – a mini review. BioSystems. 2010;99:109–125. doi: 10.1016/j.biosystems.2009.10.003. [DOI] [PubMed] [Google Scholar]
  36. Perra N., Gonçalves B., Pastor-Satorras R., Vespignani A. Activity driven modeling of time varying networks. Sci. Rep. 2012;2:469. doi: 10.1038/srep00469. [DOI] [PMC free article] [PubMed] [Google Scholar]
  37. Saumell-Mendiola A., Serrano M.Á, Boguñá M. Epidemic spreading on interconnected networks. Phys. Rev. E. 2012;86:026106. doi: 10.1103/PhysRevE.86.026106. [DOI] [PubMed] [Google Scholar]
  38. Schneider C.M., Mihaljev T., Havlin S., Herrmann H.J. Suppressing epidemics with a limited amount of immunization units. Phys. Rev. E. 2011;84:061911. doi: 10.1103/PhysRevE.84.061911. [DOI] [PubMed] [Google Scholar]
  39. Schneider C.M., Mihaljev T., Herrmann H.J. Inverse targeting-an effective immunization strategy. EPL (Europhys. Lett.) 2012;98:46002. [Google Scholar]
  40. Song Y., Liu L., Ma H., Vasilakos A. A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 2014;11:417–430. [Google Scholar]
  41. Tero A., Kobayashi R., Nakagaki T. A mathematical model for adaptive transport network in path finding by true slime mold. J. Theor. Biol. 2007;244:553–564. doi: 10.1016/j.jtbi.2006.07.015. [DOI] [PubMed] [Google Scholar]
  42. Tero A., Yumiki K., Kobayashi R., Saigusa T., Nakagaki T. Flow-network adaptation in Physarum amoebae. Theor. Biosci. 2008;127:89–94. doi: 10.1007/s12064-008-0037-9. [DOI] [PubMed] [Google Scholar]
  43. Tero A., Nakagaki T., Toyabe K., Yumiki K., Kobayashi R. A method inspired by Physarum for solving the steiner problem. Int. J. Unconv. Comput. 2010;6:109–123. [Google Scholar]
  44. Tero A., Takagi S., Saigusa T., Ito K., Bebber D.P., Fricker M.D., Yumiki K., Kobayashi R., Nakagaki T. Rules for biologically inspired adaptive network design. Science. 2010;327:439–442. doi: 10.1126/science.1177894. [DOI] [PubMed] [Google Scholar]
  45. Von Mering C., Krause R., Snel B., Cornell M., Oliver S.G., Fields S., Bork P. Comparative assessment of large-scale data sets of protein-protein interactions. Nature. 2002;417:399–403. doi: 10.1038/nature750. [DOI] [PubMed] [Google Scholar]
  46. Wang Y., Xiao G. Epidemics spreading in interconnected complex networks. Phys. Lett. A. 2012;376:2689–2696. [Google Scholar]
  47. Wang Z., Szolnoki A., Perc M. Interdependent network reciprocity in evolutionary games. Sci. Rep. 2013;3:1183. doi: 10.1038/srep01183. [DOI] [PMC free article] [PubMed] [Google Scholar]
  48. Wang Z., Szolnoki A., Perc M. Optimal interdependence between networks for the evolution of cooperation. Sci. Rep. 2013;3:2470. doi: 10.1038/srep02470. [DOI] [PMC free article] [PubMed] [Google Scholar]
  49. Wang W., Tang M., Zhang H.-F., Gao H., Do Y., Liu Z.-H. Epidemic spreading on complex networks with general degree and weight distributions. Phys. Rev. E. 2014;90:042803. doi: 10.1103/PhysRevE.90.042803. [DOI] [PubMed] [Google Scholar]
  50. Wang Z., Andrews M.A., Wu Z.-X., Wang L., Bauch C.T. Coupled disease-behavior dynamics on complex networks: a review. Phys. Life Rev. 2015;15:1–29. doi: 10.1016/j.plrev.2015.07.006. [DOI] [PMC free article] [PubMed] [Google Scholar]
  51. Wang Z., Wang L., Szolnoki A., Perc M. Evolutionary games on multilayer networks: a colloquium. Eur. Phys. J. B. 2015;88:1–15. [Google Scholar]
  52. Watanabe S., Tero A., Takamatsu A., Nakagaki T. Traffic optimization in railroad networks using an algorithm mimicking an amoeba-like organism. Physarum plasmodium, Biosyst. 2011;105:225–232. doi: 10.1016/j.biosystems.2011.05.001. [DOI] [PubMed] [Google Scholar]
  53. Watts D.J., Strogatz S.H. Collective dynamics of “small-world” networks. Nature. 1998;393:440–442. doi: 10.1038/30918. [DOI] [PubMed] [Google Scholar]
  54. Wei B., Liu J., Wei D., Gao C., Deng Y. Weighted k-shell decomposition for complex networks based on potential edge weights. Physica A. 2015;420:277–283. [Google Scholar]
  55. Xia C., Wang L., Sun S., Wang J. An SIR model with infection delay and propagation vector in complex networks. Nonlin. Dyn. 2012;69:927–934. [Google Scholar]
  56. Yan S., Tang S., Pei S., Jiang S., Zheng Z. Dynamical immunization strategy for seasonal epidemics. Phys. Rev. E. 2014;90:022808. doi: 10.1103/PhysRevE.90.022808. [DOI] [PubMed] [Google Scholar]
  57. Zhang X., Zhang Y., Wei D., Deng Y. Solving shortest path problems with interval arcs based on an amoeboid organism algorithm. J. Inf. Comput. Sci. 2012;9:2081–2088. [Google Scholar]
  58. Zhang X., Huang S., Hu Y., Zhang Y., Mahadevan S., Deng Y. Solving 0–1 knapsack problems based on amoeboid organism algorithm. Appl. Math. Comput. 2013;219:9959–9970. [Google Scholar]
  59. Zhang H., Qin C., Jiang B., Luo Y. Online adaptive policy learning algorithm for h-infinity state feedback control of unknown affine nonlinear discrete-time systems. IEEE Trans. Cybern. 2014;44:2706–2718. doi: 10.1109/TCYB.2014.2313915. [DOI] [PubMed] [Google Scholar]
  60. Zhou J., Xiao G., Cheong S.A., Fu X., Wong L., Ma S., Cheng T.H. Epidemic reemergence in adaptive complex networks. Phys. Rev. E. 2012;85:036107. doi: 10.1103/PhysRevE.85.036107. [DOI] [PubMed] [Google Scholar]

Articles from Journal of Theoretical Biology are provided here courtesy of Elsevier

RESOURCES