Literature DB >> 32288059

Immunization strategy based on the critical node in percolation transition.

Yang Liu1, Bo Wei2, Zhen Wang3, Yong Deng1,4.   

Abstract

The problem of finding a better immunization strategy for controlling the spreading of the epidemic with limited resources has attracted much attention since its great theoretical significance and wide application. In this letter, we propose a novel and successful targeted immunization strategy based on percolation transition. Our strategy repeatedly looks for the critical nodes for immunizing. The critical node, which leads to the emergence of the giant connected component as the degree threshold increases, is determined when the maximal second-largest connected component disappears. To test the effectiveness of the proposed method, we conduct the experiments on several artificial networks and real-world networks. The results show that the proposed method outperforms the degree centrality strategy, the betweenness centrality strategy and the adaptive degree centrality strategy with 18% to 50% fewer immunized nodes for same amount of immunization.
Copyright © 2015 Elsevier B.V. All rights reserved.

Entities:  

Keywords:  Critical nodes; Degree threshold; Immunization strategy; Percolation transition

Year:  2015        PMID: 32288059      PMCID: PMC7125864          DOI: 10.1016/j.physleta.2015.09.017

Source DB:  PubMed          Journal:  Phys Lett A        ISSN: 0375-9601            Impact factor:   2.654


Introduction

Epidemic spreading and controlling in complex networks has attracted much attention from various research fields [1], [2], [3], [4]. In the real world, there are usually only a few infection sources in the early stage of the spreading process. However, it is possible that these infected sources spread the epidemic to large area in the world within a few days if the epidemic is ineffectively controlled [5], such as the outbreak of severe acute respiratory syndrome (SARS) and swine flu [6]. An immediate concern, therefore, is the development of the effective countermeasures against epidemics, wherein immunization science plays an important, if not critical, role. A feasible and effective immunization strategy can save thousands of human lives with low cost. Over the past decades, many immunization strategies have been extensively investigated [7], [8], [9]. So far, it is still an open problem. In the complex networks, numerous strategies have been proposed to immunize nodes, such as random immunization strategy [10], target immunization strategy [10], acquaintance immunization strategy [11], [12], active immunization strategy [13] and other related scenarios [14], [15], [16]. For a given fraction of immunized nodes, a good immunization strategy should make the susceptible size, which is always dependent on the largest connected component of a network, as small as possible [17], [6]. It is widely accepted that the most efficient immunization strategies are based on targeted strategies [18], [19], [17]. The target immunization, making use of the network heterogeneity characteristic, is first to identify the importance of each node and then removes the nodes from the highest importance to the lowest until the network reaches the certain immunization fraction. As degree is the basic and the most accessible property of networks, numerous efficient immunization strategies are directly or indirectly based on it [11], [12], [20], [21], [22]. The degree centrality immunization strategy makes use of the network heterogeneity characteristic and selects nodes with larger degree for immunization [20]. It was also extended to the multilayer networks in [21], [22]. However, those strategies always neglect some important nodes without larger degree, such as in community networks. Recently, percolation transition in complex networks has attracted people's attention, including the universal loopless percolation transition by randomly removing links from networks [23], traffic percolation by decreasing the velocity threshold of the roads [24] and others [25], [26]. In this letter, motivated by Refs. [24], [27], we proposed a novel immunization strategy. Following the percolation transition in Ref. [24] (where the giant cluster of local flows disintegrates when the second largest cluster reaches its maximum), the main idea of the proposed method is to find the critical nodes, which lead to the emergence of the giant connected component, for immunizing. Different from the degree centrality immunization strategy, the proposed method can find the critical nodes which may be not holding the largest degree. In addition, our method works only based on the degree property compared to Refs. [23], [24]. To test the performance of our proposed strategy, we conduct the experiments on Erdős–Rényi (ER) networks [28], scale-free (SF) networks [29] and also several real-world networks. The results show that the proposed method has 18% to 50% improvement than the degree centrality strategy, the betweenness centrality strategy and the adaptive degree centrality strategy (for the networks studied here). The rest of the letter is organized as follows. In Section 2, the proposed strategy is described; in Section 3, related experiments are conducted and experimental results are evaluated and conclusions are presented in Section 4.

Method

Consider a network where N and E are the set of nodes and edges, respectively. For a given degree threshold , let be the subnetwork of G, which is constructed by the whole nodes whose degree values are not larger than and the whole edges where nodes and . Let and correspond to the largest and the second-largest connected components of , respectively. In this way, the function and of are constructed. The critical degree threshold is determined as follows: s.t. Let be the set of incoming nodes which is the node set difference between and where is the node set of . Order the node in as (assign a unique label to each node), and then orderly add them into the network one by one. In this way, the function is constructed and the critical node is defined as: s.t. where denotes the number of nodes of the second-largest component of the network composed with the nodes of and the nodes . To illustrate how to determine the critical node, the largest connected component of the network of coauthorships between scientists [30], [31] is considered. In order to clearly understand, we obtain the experimental network (Fig. 1 (a)) by removing the little isolated components after the removal of node 51 and node 52. After a node is immunized, id values are renumbered, but the ordering of nodes induced by the ids remains the same as in [31]. From Fig. 1(b) to Fig. 1(c), increases as increases. In Fig. 1(d), the critical degree threshold is obtained, and then the critical node is determined. The details of and of are shown in Fig. 2 where the critical node is that connecting the largest connected component with the maximal second-largest connected component. We also obtain the other critical nodes until the predetermined fraction of nodes to immunize by repeating this process on the largest connected component of the network after the critical node removal.
Fig. 1

Critical node of the network. (a) A representation of all nodes. The size of a node is proportional to its degree: node 4 holds the largest degree. (b) A representation of subnetwork when . The largest and second-largest connected component are clarified by purple and green, respectively. And others with gray belong to the smaller connected component. (c) A representation of subnetwork when . (d) The critical node (red) is obtained when . (For interpretation of the references to color in this figure, the reader is referred to the web version of this article.)

Fig. 2

(a) The number of nodes of the largest (LCC) and second-largest (SLCC) connected component (black square) and (red circle) versus the degree threshold . (b) The number of nodes in as a function of and the number of nodes of the second-largest component versus ranked label j. The critical node (223) is determined as the maximal second-largest connected component disappears. (For interpretation of the references to color in this figure, the reader is referred to the web version of this article.)

Critical node of the network. (a) A representation of all nodes. The size of a node is proportional to its degree: node 4 holds the largest degree. (b) A representation of subnetwork when . The largest and second-largest connected component are clarified by purple and green, respectively. And others with gray belong to the smaller connected component. (c) A representation of subnetwork when . (d) The critical node (red) is obtained when . (For interpretation of the references to color in this figure, the reader is referred to the web version of this article.) (a) The number of nodes of the largest (LCC) and second-largest (SLCC) connected component (black square) and (red circle) versus the degree threshold . (b) The number of nodes in as a function of and the number of nodes of the second-largest component versus ranked label j. The critical node (223) is determined as the maximal second-largest connected component disappears. (For interpretation of the references to color in this figure, the reader is referred to the web version of this article.)

Results

To test the effectiveness of the proposed strategy, critical-node strategy (CNS), we plot F (the fraction of the size of the largest connected component that can be infected) versus q (the fraction of immunized nodes) for several artificial networks (including Erdős–Rényi (ER) networks [28] and Barabási–Albert (BA) model networks [29] in Fig. 3 ) and empirical networks from different fields in Fig. 4 : the electrical power grid of the western United States (Power Grid) [32], [33], [34], a trust network of mutual signing based on the pretty good privacy algorithm (PGP network) [35], [36], [37], [38], collaboration network of arxiv condensed matter (ca-CondMat) [39], [40], and email communication network from Enron (email-Enron) [41], [42], [43]. The detailed information of the networks is shown in Table 1 . Note that we here remove 58 self-loop edges from the source data of ca-CondMat.
Fig. 3

The fraction F of the size of the largest connected component that can be infected versus the fraction of immunized nodes q for DCS, BCS, ADCS and CNS for (a) ER network with N = 104 and 〈k〉 = 3.50, (b) BA network with N = 104 and 〈k〉 = 4.0. We also show the error bars in F, which are derived from simulating realization.

Fig. 4

The fraction F of the size of the largest connected component versus the fraction of immunized nodes q for DCS, EGP, ADCS and CNS for (a) the Power Grid network, (b) the PGP network, (c) the ca-CondMat network, (d) the email-Enron network.

Table 1

Some statistical properties of the real-world networks: network size (n), edge number (m), average degree 〈k〉, maximum degree , degree heterogeneity (), degree assortativity (r), clustering coefficient (〈C〉).

NetworknmkkmaxHrC
Power Grid494165942.6691191.45040.00350.0801
PGP10 68024 3164.55362054.14650.23820.2659
ca-CondMat23 13393 4398.07842792.73050.13400.6334
email-Enron36 692183 83110.0202138313.9796−0.11080.4970
The fraction F of the size of the largest connected component that can be infected versus the fraction of immunized nodes q for DCS, BCS, ADCS and CNS for (a) ER network with N = 104 and 〈k〉 = 3.50, (b) BA network with N = 104 and 〈k〉 = 4.0. We also show the error bars in F, which are derived from simulating realization. The fraction F of the size of the largest connected component versus the fraction of immunized nodes q for DCS, EGP, ADCS and CNS for (a) the Power Grid network, (b) the PGP network, (c) the ca-CondMat network, (d) the email-Enron network. Some statistical properties of the real-world networks: network size (n), edge number (m), average degree 〈k〉, maximum degree , degree heterogeneity (), degree assortativity (r), clustering coefficient (〈C〉). We compare the efficiency of the CNS to the degree centrality strategy (DCS), the betweenness centrality strategy (BCS), the equal graph partitioning strategy (EGP) and the adaptive degree centrality strategy (ADCS). In the ADCS we immunize a node by recalculating the importance of every node after the immunized node removal. For both of ER and BA networks, the CNS exhibits notable advantage of less nodes to be immunized compared to the other strategies. Regarding to threshold point , where F approaches 0 , the CNS shows over 50% improvement than the DCS and BCS, 18% in ER network and 26% in BA network than ADCS. For the real-world networks, the CNS also shows a larger improvement, over 50%, against both DCS, and gives an advantage of over 30% compared to ADCS. To further evaluate the performance of the proposed strategy, the susceptible-infectious-recovery (SIR) epidemic spreading model [44], [45] is used to evaluate the immunization effectiveness on the BA network, the PGP network, the ca-CondMat network and the email-Enron network. In the SIR model, each node belongs to one state of the susceptible state, the infected state and the recovered state. At the initial stage, the immunized nodes are removed from the network, including the incident links. We set one node that is randomly selected from the remaining network or networks (may be some disconnected subnetworks after immunized) to be infected to investigate the transmissibility of this node, and the others to be susceptible. At each time step, the infected nodes infect its susceptible neighbors with infection rate λ, and they recover with rate η. The recovered nodes are removed from the network. This process is repeated until there is no infected node in the network. The simulation results are shown in Fig. 5 and Fig. 6 . In the simulations we use and for strong infection situation. For all of the networks studied here, the recovered fraction is significantly (42 to 77 times) lower when using the CNS compared to the ADCS with the same fraction of immunization doses.
Fig. 5

Infected fraction and recovered fraction of time steps for the SIR simulation. Comparison between the CNS and ADCS for (a) immunizing a fraction q = 0.11 of the nodes in the BA network with α = 2.6, N = 104 and 〈k〉 = 4, (b) immunizing a fraction q = 0.045 of the nodes in the PGP network, (c) immunizing a fraction q = 0.12 of the nodes in the ca-CondMat network, (d) immunizing a fraction q = 0.075 of the nodes in the email-Enron network. 104 independent simulation for each network.

Fig. 6

Final recovered fraction versus the fraction of immunized nodes q for ADCS and CNS for (a) BA network with N = 104 and 〈k〉 = 4, (b) the PGP network, (c) the ca-CondMat network, (d) the email-Enron network. 104 independent simulation for each network.

Infected fraction and recovered fraction of time steps for the SIR simulation. Comparison between the CNS and ADCS for (a) immunizing a fraction q = 0.11 of the nodes in the BA network with α = 2.6, N = 104 and 〈k〉 = 4, (b) immunizing a fraction q = 0.045 of the nodes in the PGP network, (c) immunizing a fraction q = 0.12 of the nodes in the ca-CondMat network, (d) immunizing a fraction q = 0.075 of the nodes in the email-Enron network. 104 independent simulation for each network. Final recovered fraction versus the fraction of immunized nodes q for ADCS and CNS for (a) BA network with N = 104 and 〈k〉 = 4, (b) the PGP network, (c) the ca-CondMat network, (d) the email-Enron network. 104 independent simulation for each network. In Fig. 7 , we also investigate the threshold of the network parameters of ER and BA networks for different immunization strategies. The threshold is defined as the fraction of nodes immunized or removed for which F approaches 0 . In all networks tested here, the proposed strategy exhibits obviously effectiveness of lower compared to the other immunization strategies. Although increases with increasing the average degree , the curves of CNS are far below curves of DCS, BCS and ADCS.
Fig. 7

The threshold of average node degree 〈k〉 for the DCS, BCS, ADCS and CNS for (a) ER networks with N = 104, (b) BA networks with N = 104.

The threshold of average node degree 〈k〉 for the DCS, BCS, ADCS and CNS for (a) ER networks with N = 104, (b) BA networks with N = 104. Finally, comparing Fig. 4(a) and Fig. 4(d), the results show that the proposed method is more effective in assortatively mixed networks where high degree nodes tend to connect to other high degree nodes, which is a common feature for many real networks [46], [47]. In the disassortative networks, high degree nodes mostly have neighbors with a small number of connections. Our strategy identifies the critical node only based on the largest and the second-largest connected components. It is expected that the proposed strategy will immunize or remove some low degree nodes (shown as Fig. 8 (a) where and Fig. 8(b) where ), which is the critical node of two components, at the early stage. However, those components are also connected by some high degree nodes. The immunization threshold is quickly reached after those low degree nodes removal ( on the BA network and on the email-Enron network). To summarize, the proposed method is more effective in assortatively mixed networks. In the disassortative networks, our strategy performs worse than other methods when low immunized fraction of nodes is conducted. However, it will outperform the others if we increase the immunized fraction of nodes.
Fig. 8

The degree of nodes versus the fraction of immunized nodes q for BCS, ADCS and CNS for (a) the BA network, (b) the email-Enron network, (c) the PGP network, (d) the Power Grid network.

The degree of nodes versus the fraction of immunized nodes q for BCS, ADCS and CNS for (a) the BA network, (b) the email-Enron network, (c) the PGP network, (d) the Power Grid network.

Conclusion

In this letter, we have developed and applied a novel method as an efficient network immunization strategy based on the percolation transition. The proposed strategy chooses the immunization fraction of nodes by repeatedly looking for the critical node, which leads to the emergence of the giant connected component as the degree threshold increases, in the largest connected network. To test the performance of the proposed method, we conduct the experiments on several artificial and real-world networks. The results show that the proposed method is more effective in assortatively mixed networks. In the disassortative networks, our strategy performs worse than other methods when low immunized fraction of nodes is conducted. However, it will outperform the others if we increase the immunized fraction of nodes. To summarize, our strategy holds the advantage of 18% to 50% compared to the degree centrality strategy, the betweenness centrality strategy and the adaptive degree centrality strategy.
  32 in total

1.  Attack vulnerability of complex networks.

Authors:  Petter Holme; Beom Jun Kim; Chang No Yoon; Seung Kee Han
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2002-05-07

2.  Clustering drives assortativity and community structure in ensembles of networks.

Authors:  David V Foster; Jacob G Foster; Peter Grassberger; Maya Paczuski
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2011-12-20

3.  Inducing effect on the percolation transition in complex networks.

Authors:  Jin-Hua Zhao; Hai-Jun Zhou; Yang-Yu Liu
Journal:  Nat Commun       Date:  2013       Impact factor: 14.919

4.  Finding a better immunization strategy.

Authors:  Yiping Chen; Gerald Paul; Shlomo Havlin; Fredrik Liljeros; H Eugene Stanley
Journal:  Phys Rev Lett       Date:  2008-07-31       Impact factor: 9.161

5.  Epidemic spreading on complex networks with general degree and weight distributions.

Authors:  Wei Wang; Ming Tang; Hai-Feng Zhang; Hui Gao; Younghae Do; Zong-Hua Liu
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2014-10-06

6.  Percolation transition in dynamical traffic network with evolving critical bottlenecks.

Authors:  Daqing Li; Bowen Fu; Yunpeng Wang; Guangquan Lu; Yehiel Berezin; H Eugene Stanley; Shlomo Havlin
Journal:  Proc Natl Acad Sci U S A       Date:  2014-12-31       Impact factor: 11.205

7.  Spread of epidemic disease on networks.

Authors:  M E J Newman
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2002-07-26

8.  Precise calculation of a bond percolation transition and survival rates of nodes in a complex network.

Authors:  Hirokazu Kawamoto; Hideki Takayasu; Henrik Jeldtoft Jensen; Misako Takayasu
Journal:  PLoS One       Date:  2015-04-17       Impact factor: 3.240

9.  Immunization of epidemics in multiplex networks.

Authors:  Dawei Zhao; Lianhai Wang; Shudong Li; Zhen Wang; Lin Wang; Bo Gao
Journal:  PLoS One       Date:  2014-11-17       Impact factor: 3.240

10.  An efficient immunization strategy for community networks.

Authors:  Kai Gong; Ming Tang; Pak Ming Hui; Hai Feng Zhang; Do Younghae; Ying-Cheng Lai
Journal:  PLoS One       Date:  2013-12-20       Impact factor: 3.240

View more
  2 in total

1.  Optimization of targeted node set in complex networks under percolation and selection.

Authors:  Yang Liu; Xi Wang; Jürgen Kurths
Journal:  Phys Rev E       Date:  2018-07       Impact factor: 2.529

Review 2.  Pattern transitions in spatial epidemics: Mechanisms and emergent properties.

Authors:  Gui-Quan Sun; Marko Jusup; Zhen Jin; Yi Wang; Zhen Wang
Journal:  Phys Life Rev       Date:  2016-08-09       Impact factor: 11.025

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.