Literature DB >> 23894326

Bursty communication patterns facilitate spreading in a threshold-based epidemic dynamics.

Taro Takaguchi1, Naoki Masuda, Petter Holme.   

Abstract

Records of social interactions provide us with new sources of data for understanding how interaction patterns affect collective dynamics. Such human activity patterns are often bursty, i.e., they consist of short periods of intense activity followed by long periods of silence. This burstiness has been shown to affect spreading phenomena; it accelerates epidemic spreading in some cases and slows it down in other cases. We investigate a model of history-dependent contagion. In our model, repeated interactions between susceptible and infected individuals in a short period of time is needed for a susceptible individual to contract infection. We carry out numerical simulations on real temporal network data to find that bursty activity patterns facilitate epidemic spreading in our model.

Entities:  

Mesh:

Year:  2013        PMID: 23894326      PMCID: PMC3716695          DOI: 10.1371/journal.pone.0068629

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


Introduction

Communication between individuals is a fundament of human society. Nowadays technologies such as sensor devices and online communication services provide us with records of interaction between individuals, including face-to-face conversations, e-mail exchanges, and phone calls, in massive amounts. Such data often consist of a sequence of interaction events. Each event is represented by a triplet, i.e., the IDs of two individuals involved in the event and the time of the event. One traditional way to characterize such data is to represent them as an aggregated network, in which the links are drawn between two nodes (i.e., individuals) that communicate in at least one event, and investigate structural properties of the aggregated static networks [1]. Another and richer representation of this type of data is to model them as temporal networks, in which the links between two nodes exist only at the time of an event [2]. Effects of temporal networks on contagious phenomena, such as infectious diseases and rumors, have been investigated by various authors. To simulate spreading dynamics on temporal networks, we read the events in an empirical event sequence one by one in the chronological order and possibly update the states (e.g., susceptible and infected) of the two nodes involved in the event. Karsai and colleagues simulated the susceptible-infected (SI) model on temporal networks and found that bursty activity patterns slow down contagions [3]; Bursty activity patterns are identified with a long-tailed distribution of the interevent times (IETs) [4], [5]. The slowing down occurs because, at an arbitrary time point, the average time to the next event is longer for the long-tailed IET distribution than for the exponential IET distribution with the same mean. In other words, after an individual gets infected, it tends to take longer time to infect the neighbors under the long-tailed as compared to exponential IET distribution. Other numerical [6], [7] and analytical [8]–[10] results also support that the long-tailed IET distribution mitigates contagion. However, the burstiness was reported to accelerate contagion on a different data set [11] and a different type of epidemic dynamics. Our understanding of the effect of the burstiness, and other temporal structures, on contagious processes is still elusive. In the present study, we show that bursty activity patterns facilitate epidemic spreading in a variant of the deterministic threshold model [12], [13]. In standard models of epidemics including the SI, susceptible-infected-recovered (SIR), and susceptible-exposed-infected-recovered (SEIR) models, which have been employed in the literature cited above, a susceptible node gets infected from an infected neighbor with a constant probability in an event, regardless of the amount of exposure to infected neighbors in the past. However, history-dependent thresholding effects in which the thresholding operates on the concentration of the pathogen have been reported for some infectious diseases mediated by bacteria, such as the tuberculosis and the dysentery [14]. In the case of information propagation, the exposure to the information increases one's interest in a topic, and the attractiveness of a topic decays in time in the absence of stimulus [15], [16]. We may need multiple interactions to persuade others to do something, and repeated contacts in a short period can be more effective than those dispersed over a long period. In general, contacts with the same person need not be as influential as the same number of contacts with different persons. In this work, we do not model such effects but focus on the limit where contacts are worth equally much. To consider this type of infection, we generalize the deterministic threshold model to the case of history dependence and memory decay and simulate the proposed model on temporal network data.

Results

Simulation protocols and data sets

Each node is assumed to have an internal variable denoted by (), which represents, for example, the concentration of a pathogen in the individual or the individual's interest in a topic. Initially, to equal to zero for all . We assume that node is in the susceptible () state before exceeds a threshold value and that node is in the infected () state once exceeds . Each node is in either state. Nodes in state never return to state ; our model is an extension of the SI model. Therefore, the number of nodes monotonically increases in time. It should be noted that the SI model was used in place of the more realistic SIR model in previous literature on static [17] and temporal [3], [11] networks. This is because the initial growth phase, which determines the possibility of large-scale spreading initiating from a small number of infected individuals, is the same between the SI and SIR models. When node in state interacts with an node through an event, is increased by unity. In the absence of interaction with nodes, is assumed to decay exponentially in time. In other words, is given bywhereand is the time of an event between node and an node, and is the decay time constant. An example time course of is shown in Figure 1.
Figure 1

for in Email data set.

We set . The vertical ticks in the box plot in the bottom indicate the times of the events that involve node .

for in Email data set.

We set . The vertical ticks in the box plot in the bottom indicate the times of the events that involve node . The model contains two parameters and and can be regarded as a variant of the deterministic threshold model [12], [13]. Although we assume that all the nodes have the same values of and for simplicity, it is straightforward to generalize the model in the case of heterogeneous parameter values. We simulate our model numerically on empirical temporal networks in the following way. At , we select a node as initial seed and set its state to . All the other nodes are initially in state . Then, we chronologically read the event sequence one by one and update and the states of the two nodes involved in the event. Because our model is deterministic, the final infection size (i.e., fraction of nodes at time , where is the time of the last event in the data set), denoted by , is unique for given initial seed , , and . We examine spreading dynamics starting from all the possible initial seeds, except for the results shown in Figure 2 for which we select the node with the maximum number of events as the seed.
Figure 2

Dependence of the final infection size on and .

(a), (b) Original temporal networks. (c), (d) Randomized temporal networks. (a), (c) in Conference data set. (b), (d) in Email data set. No infection occurs in the blank parameter regions. The parameter values for which at least one infection occurs are colored.

Dependence of the final infection size on and .

(a), (b) Original temporal networks. (c), (d) Randomized temporal networks. (a), (c) in Conference data set. (b), (d) in Email data set. No infection occurs in the blank parameter regions. The parameter values for which at least one infection occurs are colored. We use two data sets. The first data set, called Conference in the following, is the face-to-face conversation log between attendees of a scientific conference [18]. The second data set, called Email, is the record of e-mail exchanges between the members of a university [19]. In the second data set, we neglect the direction of the interaction (i.e., from sender to receiver) for simplicity. The basic statistics of the data sets are summarized in Table 1.
Table 1

Statistics of the two data sets.

ConferenceEmail
Number of nodes (N)1133,188
Number of events20,808309,125
Recording period3 days83 days
Time resolution20 sec1 sec

Effects of the burstiness on infection size

In Figures 2(a) and 2(b), we plot the dependence of final infection size on and for initial seed node having the maximum number of events in Conference and Email data sets, respectively. In the blank parameter region, no infection occurs such that . Naturally, increases with and decreases with . Next, we carry out the same set of simulations on the randomized temporal networks for the sake of comparison. To this end, we use the so-called randomly-permuted-times randomization, in which the time stamps of all the events are randomly shuffled [2], [3], [6]. The randomization eliminates temporal properties of the original temporal networks such as bursty activity patterns and the pairwise correlations of the IETs, whereas it conserves all the properties of the aggregated networks, i.e., weighted adjacency matrix. In addition, daily and weekly activity patterns are conserved at the population level although they are not conserved for each individual. For the randomized temporal networks, the dependence of on and are shown in Figures 2(c) and 2(d) for Conference and Email data sets, respectively. We find that the parameter region in which infection occurs is larger for the original temporal networks (colored regions in Figures 2(a) and 2(b)) than for the randomized temporal networks (colored regions in Figures 2(c) and 2(d)) for intermediate values of ( and for Conference and Email data sets, respectively). In the original data sets, the nodes tend to have many events in bursty periods and be quiescent in other periods. The randomization procedure eliminates bursty activity patterns. Therefore, can reach in such a bursty period for the original but not randomized temporal networks if and take intermediate values. In the randomized data sets, tends to decay faster than it grows, although the number of events per node is the same between the original and randomized data. For Email data set, for the randomized data set (Figure 2(d)) is larger than that for the original data set (Figure 2(b)) when is large and is small. This is mainly because the randomization considerably increases the reachability ratio of initial seed . The reachability ratio of a node is defined as the fraction of nodes that we can reach from the node by tracing the events in the chronological order [20]. If every event can elicit infection, which is the case when is large and is small, is approximated by the reachability ratio of node . The reachability ratio of node in Email data set is equal to 0.7458 and 0.9981 for the original and randomized data sets, respectively. In contrast, the reachability ratio of node in Conference data set is equal to 0.9642 and 1 for the original and randomized data sets, respectively; the difference is smaller than in the case of Email data set. In Figure 3, the average final infection size , defined as the average of over all the nodes , is plotted as a function of for two values of for each data set. Figure 3 indicates that for the original temporal networks is larger than that for the randomized temporal networks for a broad range of for both data sets. For Email data set, the values for the original data set are similar to or larger than those for the randomized data set, even for large (Figures 3(c) and 3(d)). These results are apparently inconsistent with the fact that is larger for the randomized data set than for the original data set (Figures 2(b) and 2(d)) for large . The inconsistency may be caused by the competition between two opposite effects of the randomization. First, the randomization tends to increase the reachability ratio of each node to enhance epidemic spreading. Second, the randomization eliminates the burstiness to suppress epidemic spreading. For nodes involved in many events, the first effect would dominate the second effect (Figures 2(b) and 2(d)) and vice versa for nodes involved in a small number of events. We will also discuss this point in Discussion.
Figure 3

Average final infection size for (a), (b) Conference and (c), (d) Email data sets.

Squares and circles correspond to the original and randomized temporal networks, respectively. We set (a) , (b) , (c) , and (d) .

Average final infection size for (a), (b) Conference and (c), (d) Email data sets.

Squares and circles correspond to the original and randomized temporal networks, respectively. We set (a) , (b) , (c) , and (d) . In the bond percolation on static networks, the probability that single bonds are open (independent of different bonds) is the sole parameter that determines the possibility that the entire network has a giant component [1]. Motivated by this picture, we hypothesize that the results shown in Figures 2 and 3 are largely explained by the bursty nature of events on single links. In other words, we speculate that the structure of the aggregated networks or correlation between event sequences on different links do not much influence the results. To test the hypothesis, we separately examine the event sequence on each link. For each link, i.e., node pair with at least one event, is defined as the time required for node to be infected since node is infected at time . We emphasize that we do not consider influences from other nodes on in this analysis. We take the time average of , denoted by , over . A problem with the time averaging is that is indefinite for sufficiently large because does not get infected by time . Therefore, we adopt the boundary condition in which the first events between nodes and virtually replay after . We denote the time of the first event between and by . If we temporarily set , it takes at most for node starting with to be infected from node , where and is the last time before which is finite. Therefore, we set for . This boundary condition is the same as that is used in Ref. [21] for defining the average temporal path length. If is indefinite (i.e., infection never occurs between and ), is set to infinite. We define denoted by as the average of over the 20% links with the largest numbers of events, because the majority of the links possesses a small number of events in both data sets. This thresholding leaves 441 and 6,932 links for Conference and Email data sets, respectively. for the original and randomized temporal networks are shown for various and values for Conference (Figures 4(a) and 4(b)) and Email (Figures 4(c) and 4(d)) data sets. Because infection can be induced only through a single link in the present simulations, we examined values that are much smaller than those used in Figures 2 and 3. For both data sets, for the original temporal networks (Figures 4(a) and 4(c)) is larger than that for the randomized networks (Figures 4(b) and 4(d)) for intermediate values of ( and for Conference and Email data sets, respectively). The behavior of is consistent with the results of the network-based simulations (Figures 2 and 3).
Figure 4

Average single-link infection rate for (a), (b) Conference and (c), (d) Email data sets.

(a), (c) Original temporal networks. (b), (d) Randomized temporal networks.

Average single-link infection rate for (a), (b) Conference and (c), (d) Email data sets.

(a), (c) Original temporal networks. (b), (d) Randomized temporal networks.

Discussion

We numerically simulated a variant of the deterministic threshold model on empirical temporal networks. We found that the average final infection size for the empirical temporal networks is larger than those for the randomized temporal networks in a broad parameter region (Figures 2 and 3). The bursty nature of the IETs on single links has a sufficient explanatory power for the results of the network-based simulations (Figure 4). The burstiness promoted epidemic spreading when the decay exponent takes an intermediate value ( and (seconds) for Conference and Email data sets, respectively). This range of may be practical because the influence of a pathogen that an individual has received may last for hours to days. The finding that the burstiness facilitates the spreading also sheds light on a function of the redundant interaction events. We previously found that about 80% of the events are redundant in the sense that they affect little on bridging efficient temporal paths in Conference data set [22]. However, for the spreading dynamics in our model, such redundant events play a crucial role in increasing within bursty periods. Threshold models can be generalized to temporal networks in several ways. Reference [23], for example, considers a sliding window where only contacts within the window matters for the spreading. The authors examined two types of threshold rules–whether the threshold operates on all the total number of contacts with I in the interval or on the fraction of such contacts. The output was data dependent, but for most of their datasets, the results for the present model are similar to their results in the case of an absolute threshold. This suggests that we should be careful in generalizing our results too much (even though they should probably hold true for email and conference contacts). In the previous section, we mentioned two possible consequences of the randomization of temporal networks: weakened burstiness and enhanced reachability. To disentangle the contribution of the two factors to epidemic spreading is difficult, because the two factors are simultaneously affected by the present randomization scheme. Therefore, looking for alternative randomization procedures or generative models of temporal networks in which burstiness and reachability are independently controlled is warranted for future work.
  18 in total

1.  Entropy of dialogues creates coherent structures in e-mail traffic.

Authors:  Jean-Pierre Eckmann; Elisha Moses; Danilo Sergi
Journal:  Proc Natl Acad Sci U S A       Date:  2004-09-24       Impact factor: 11.205

2.  What's in a crowd? Analysis of face-to-face behavioral networks.

Authors:  Lorenzo Isella; Juliette Stehlé; Alain Barrat; Ciro Cattuto; Jean-François Pinton; Wouter Van den Broeck
Journal:  J Theor Biol       Date:  2010-12-03       Impact factor: 2.691

3.  Message passing approach for general epidemic models.

Authors:  Brian Karrer; M E J Newman
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2010-07-02

4.  A generalized model of social and biological contagion.

Authors:  P S Dodds; D J Watts
Journal:  J Theor Biol       Date:  2005-02-21       Impact factor: 2.691

5.  Network reachability of real-world contact sequences.

Authors:  Petter Holme
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2005-04-15

6.  Modeling bursts and heavy tails in human dynamics.

Authors:  Alexei Vázquez; João Gama Oliveira; Zoltán Dezsö; Kwang-Il Goh; Imre Kondor; Albert-László Barabási
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2006-03-24

7.  Impact of non-Poissonian activity patterns on spreading processes.

Authors:  Alexei Vazquez; Balázs Rácz; András Lukács; Albert-László Barabási
Journal:  Phys Rev Lett       Date:  2007-04-10       Impact factor: 9.161

8.  Dynamics of indirectly transmitted infectious diseases with immunological threshold.

Authors:  Richard I Joh; Hao Wang; Howard Weiss; Joshua S Weitz
Journal:  Bull Math Biol       Date:  2008-12-19       Impact factor: 1.758

9.  Robust dynamic classes revealed by measuring the response function of a social system.

Authors:  Riley Crane; Didier Sornette
Journal:  Proc Natl Acad Sci U S A       Date:  2008-09-29       Impact factor: 11.205

10.  Path lengths, correlations, and centrality in temporal networks.

Authors:  Raj Kumar Pan; Jari Saramäki
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2011-07-18
View more
  14 in total

1.  Complex contagion process in spreading of online innovation.

Authors:  Márton Karsai; Gerardo Iñiguez; Kimmo Kaski; János Kertész
Journal:  J R Soc Interface       Date:  2014-12-06       Impact factor: 4.118

2.  Analysing livestock network data for infectious disease control: an argument for routine data collection in emerging economies.

Authors:  G L Chaters; P C D Johnson; S Cleaveland; J Crispell; W A de Glanville; T Doherty; L Matthews; S Mohr; O M Nyasebwa; G Rossi; L C M Salvador; E Swai; R R Kao
Journal:  Philos Trans R Soc Lond B Biol Sci       Date:  2019-07-08       Impact factor: 6.237

Review 3.  Coevolution spreading in complex networks.

Authors:  Wei Wang; Quan-Hui Liu; Junhao Liang; Yanqing Hu; Tao Zhou
Journal:  Phys Rep       Date:  2019-07-29       Impact factor: 25.600

4.  Bursty properties revealed in large-scale brain networks with a point-based method for dynamic functional connectivity.

Authors:  William Hedley Thompson; Peter Fransson
Journal:  Sci Rep       Date:  2016-12-19       Impact factor: 4.379

5.  Short-term activity cycles impede information transmission in ant colonies.

Authors:  Thomas O Richardson; Jonas I Liechti; Nathalie Stroeymeyt; Sebastian Bonhoeffer; Laurent Keller
Journal:  PLoS Comput Biol       Date:  2017-05-10       Impact factor: 4.475

6.  From static to temporal network theory: Applications to functional brain connectivity.

Authors:  William Hedley Thompson; Per Brantefors; Peter Fransson
Journal:  Netw Neurosci       Date:  2017-06-01

7.  Dynamics of social contagions with local trend imitation.

Authors:  Xuzhen Zhu; Wei Wang; Shimin Cai; H Eugene Stanley
Journal:  Sci Rep       Date:  2018-05-09       Impact factor: 4.379

8.  Evolution of cooperation on temporal networks.

Authors:  Aming Li; Lei Zhou; Qi Su; Sean P Cornelius; Yang-Yu Liu; Long Wang; Simon A Levin
Journal:  Nat Commun       Date:  2020-05-08       Impact factor: 14.919

9.  Predicting and controlling infectious disease epidemics using temporal networks.

Authors:  Naoki Masuda; Petter Holme
Journal:  F1000Prime Rep       Date:  2013-03-04

10.  Lifetime-preserving reference models for characterizing spreading dynamics on temporal networks.

Authors:  Mingwu Li; Vikyath D Rao; Tim Gernat; Harry Dankowicz
Journal:  Sci Rep       Date:  2018-01-15       Impact factor: 4.379

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.