Mathematics and Bioterrorism: Graphtheoretical Models of Spread and Control of Disease 1 Great concern about the deliberate introduction of diseases by bioterrorists has led to new challenges for mathematical scientists. smallpox 2 Bioterrorism issues are typical of many homeland security issues. This talk will emphasize bioterrorism, but many of the “messages” apply to homeland security in general. Waiting on line to get smallpox vaccine during New York City smallpox epidemic 3 Outline 1. The role of mathematical sciences in the fight against bioterrorism. 2. Methods of computational and mathematical epidemiology 2a. Other areas of mathematical sciences 2b. Discrete math and theoretical CS 3. Graph-theoretical models of spread and control 4 of disease Dealing with bioterrorism requires detailed planning of preventive measures and responses. Both require precise reasoning and extensive analysis. 5 Understanding infectious systems requires being able to reason about highly complex biological systems, with hundreds of demographic and epidemiological variables. Intuition alone is insufficient to fully understand 6 the dynamics of such systems. Experimentation or field trials are often prohibitively expensive or unethical and do not always lead to fundamental understanding. Therefore, mathematical modeling becomes an important experimental and analytical tool. 7 Mathematical models have become important tools in analyzing the spread and control of infectious diseases and plans for defense against bioterrorist attacks, especially when combined with powerful, modern computer methods for analyzing and/or simulating the models. 8 What Can Math Models Do For Us? 9 What Can Math Models Do For Us? •Sharpen our understanding of fundamental processes •Compare alternative policies and interventions •Help make decisions. •Prepare responses to bioterrorist attacks. •Provide a guide for training exercises and scenario development. •Guide risk assessment. •Predict future trends. 10 What are the challenges for mathematical scientists in the defense against disease? This question led DIMACS, the Center for Discrete Mathematics and Theoretical Computer Science, to launch a “special focus” on this topic. Post-September 11 events soon led to an emphasis on bioterrorism. 11 DIMACS Special Focus on Computational and Mathematical Epidemiology 2002-2005 Anthrax 12 Methods of Math. and Comp. Epi. Math. models of infectious diseases go back to Daniel Bernoulli’s mathematical analysis of smallpox in 1760. 13 Hundreds of math. models since have: •highlighted concepts like core population in STD’s; 14 •Made explicit concepts such as herd immunity for vaccination policies; 15 •Led to insights about drug resistance, rate of spread of infection, epidemic trends, effects of different kinds of treatments. 16 The size and overwhelming complexity of modern epidemiological problems -- and in particular the defense against bioterrorism -- calls for new approaches and tools. 17 The Methods of Mathematical and Computational Epidemiology •Statistical Methods –long history in epidemiology –changing due to large data sets involved •Dynamical Systems –model host-pathogen systems, disease spread –difference and differential equations –little systematic use of today’s powerful computational methods 18 The Methods of Mathematical and Computational Epidemiology •Probabilistic Methods –stochastic processes, random walks, percolation, Markov chain Monte Carlo methods –simulation –need to bring in more powerful computational tools 19 Discrete Math. and Theoretical Computer Science • Many fields of science, in particular molecular biology, have made extensive use of DM broadly defined. 20 Discrete Math. and Theoretical Computer Science Cont’d •Especially useful have been those tools that make use of the algorithms, models, and concepts of TCS. •These tools remain largely unused and unknown in epidemiology and even mathematical 21 epidemiology. What are DM and TCS? DM deals with: •arrangements •designs •codes •patterns •schedules •assignments 22 TCS deals with the theory of computer algorithms. During the first 30-40 years of the computer age, TCS, aided by powerful mathematical methods, especially DM, probability, and logic, had a direct impact on technology, by developing models, data structures, algorithms, and lower bounds that are now at the core of computing. 23 DM and TCS Continued •These tools are made especially relevant to epidemiology because of: –Geographic Information Systems 24 DM and TCS Continued –Availability of large and disparate computerized databases on subjects relating to disease and the relevance of modern methods of data mining. 25 DM and TCS Continued –Availability of large and disparate computerized databases on subjects relating to disease and the relevance of modern methods of data mining: –Issues involve •detection •surveillance (monitoring) •streaming data analysis •clustering •visualization of data 26 DM and TCS Continued –The increasing importance of an evolutionary point of view in epidemiology and the relevance of DM/TCS methods of phylogenetic tree reconstruction. 27 DM and TCS Continued –The increasing importance of an evolutionary point of view in epidemiology and the relevance of DM/TCS methods of phylogenetic tree reconstruction. •Heavy use of DM in phylogenetic tree reconstruction •Might help in identification of source of an infectious agent 28 Models of the Spread and Control of Disease through Social Networks •Diseases are spread through social networks. •This is especially relevant to sexually transmitted diseases such as AIDS. •“Contact tracing” is an important part of any strategy to combat outbreaks of diseases such as smallpox, whether naturally occurring or resulting from bioterrorist attacks. 29 The Basic Model Social Network = Graph Vertices = People Edges = contact State of a Vertex: simplest model: 1 if infected, 0 if not infected (SI Model) More complex models: SI, SEI, SEIR, etc. S = susceptible, E = exposed, I = infected, R = recovered (or removed) 30 More About States Once you are infected, can you be cured? If you are cured, do you become immune or can you re-enter the infected state? We can build a digraph reflecting the possible ways to move from state to state in the model. 31 The State Diagram for a Smallpox Model The following diagram is from a Kaplan-CraftWein (2002) model for comparing alternative responses to a smallpox attack. This is being considered by the CDC and Office of Homeland Security. 32 33 The Stages Row 1: “Untraced” and in various stages of susceptibility or infectiousness. Row 2: Traced and in various stages of the queue for vaccination. Row 3: Unsuccessfully vaccinated and in various stages of infectiousness. Row 4: Successfully vaccinated; dead 34 Moving From State to State Let si(t) give the state of vertex i at time t. Two states 0 and 1. Times are discrete: t = 0, 1, 2, … 35 Threshold Processes Basic k-Threshold Process: You change your state at time t+1 if at least k of your neighbors have the opposite state at time t. Disease interpretation? Cure if sufficiently many of your neighbors are uninfected. Does this make sense? 36 Threshold Processes II Irreversible k-Threshold Process: You change your state from 0 to 1 at time t+1 if at least k of your neighbors have state 1 at time t. You never leave state 1. Disease interpretation? Infected if sufficiently many of your neighbors are infected. Special Case k = 1: Infected if any of your neighbors is infected. 37 Basic 2-Threshold Process 38 39 40 Irreversible 2-Threshold Process 41 42 43 Complications to Add to Model •k = 1, but you only get infected with a certain probability. •You are automatically cured after you are in the infected state for d time periods. •You become immune from infection (can’t reenter state 1) once you enter and leave state 1. •A public health authority has the ability to “vaccinate” a certain number of vertices, making 44 them immune from infection. Periodicity State vector: s(t) = (s1(t), s2(t), …, sn(t)). First example, s(1) = s(3) = s(5) = …, s(0) = s(2) = s(4) = s(6) = … Second example: s(1) = s(2) = s(3) = ... In all of these processes, because there is a finite set of vertices, for any initial state vector s(0), the state vector will eventually become periodic, i.e., for some P and T, s(t+P) = s(t) for all t > T. The smallest such P is called the period. 45 Periodicity II First example: the period is 2. Second example: the period is 1. Both basic and irreversible threshold processes are special cases of symmetric synchronous neural networks. Theorem (Goles and Olivos, Poljak and Sura): For symmetric, synchronous neural networks, the 46 period is either 1 or 2. Periodicity III When period is 1, we call the ultimate state vector a fixed point. When the fixed point is the vector s(t) = (1,1,…,1) or (0,0,…,0), we talk about a final common state. One problem of interest: Given a graph, what subsets S of the vertices can force one of our processes to a final common state with entries equal to the state shared by all the vertices in S in the initial state? 47 Periodicity IV Interpretation: Given a graph, what subsets S of the vertices should we plant a disease with so that ultimately everyone will get it? (s(t) (1,1,…,1)) Economic interpretation: What set of people do we place a new product with to guarantee “saturation” of the product in the population? Interpretation: Given a graph, what subsets S of the vertices should we vaccinate to guarantee that ultimately everyone will end up without the 48 disease? (s(t) 0,0,…,0)) Conversion Sets Conversion set: Subset S of the vertices that can force a k-threshold process to a final common state with entries equal to the state shared by all the vertices in S in the initial state. (In other words, if all vertices of S start in same state x = 1 or 0, then the process goes to a state where all vertices are in state x.) Irreversible k-conversion set if irreversible process. 49 1-Conversion Sets k = 1. What are the conversion sets in a basic 1-threshold process? 50 1-Conversion Sets k = 1. The only conversion set in a basic 1-threshold process is the set of all vertices. For, if any two adjacent vertices have 0 and 1 in the initial state, then they keep switching between 0 and 1 forever. What are the irreversible 1-conversion sets? 51 Irreversible 1-Conversion Sets k = 1. Every single vertex x is an irreversible 1conversion set if the graph is connected. We make it 1 and eventually all vertices become 1 by following paths from x. 52 Conversion Sets for Odd Cycles C2p+1 2-threshold process. What is a conversion set? 53 Conversion Sets for Odd Cycles C2p+1. 2-threshold process. Place p+1 1’s in “alternating” positions. 54 55 56 Conversion Sets for Odd Cycles We have to be careful where we put the initial 1’s. p+1 1’s do not suffice if they are next to each other. 57 58 59 Irreversible Conversion Sets for Odd Cycles What if we want an irreversible conversion set under an irreversible 2-threshold process? Same set of p+1 vertices is an irreversible conversion set. Moreover, everyone gets infected in one step. 60 Vaccination Strategies If you didn’t know whom a bioterrorist might infect, what people would you vaccinate to be sure that a disease doesn’t spread very much? (Vaccinated vertices stay at state 0 regardless of the state of their neighbors.) Try odd cycles again. Consider an irreversible 2threshold process. Suppose your adversary has enough supply to infect two individuals. Strategy 1: “Mass vaccination”: make everyone 0 61 and immune in initial state. Vaccination Strategies In C5, mass vaccination means vaccinate 5 vertices. This obviously works. In practice, vaccination is only effective with a certain probability, so results could be different. Can we do better than mass vaccination? What does better mean? If vaccine has no cost and is unlimited and has no side effects, of course we 62 use mass vaccination. Vaccination Strategies What if vaccine is in limited supply? Suppose we only have enough vaccine to vaccinate 2 vertices. Consider two different vaccination strategies: Vaccination Strategy I Vaccination Strategy II 63 Vaccination Strategy I: Worst Case (Adversary Infects Two) Two Strategies for Adversary Adversary Strategy Ia Adversary Strategy Ib 64 The “alternation” between your choice of a defensive strategy and your adversary’s choice of an offensive strategy suggests we consider the problem from the point of view of game theory. The Food and Drug Administration is studying the use of game-theoretic models in the defense against bioterrorism. 65 Vaccination Strategy I Adversary Strategy Ia 66 Vaccination Strategy I Adversary Strategy Ib 67 Vaccination Strategy II: Worst Case (Adversary Infects Two) Two Strategies for Adversary Adversary Strategy IIa Adversary Strategy IIb 68 Vaccination Strategy II Adversary Strategy IIa 69 Vaccination Strategy II Adversary Strategy IIb 70 Conclusions about Strategies I and II If you can only vaccinate two individuals: Vaccination Strategy II never leads to more than two infected individuals, while Vaccination Strategy I sometimes leads to three infected individuals (depending upon strategy used by adversary). Thus, Vaccination Strategy II is better. 71 k-Conversion Sets k-conversion sets are complex. Consider the graph K4 x K2. 72 k-Conversion Sets II Exercise: (a). The vertices a, b, c, d, e form a 2conversion set. (b). However, the vertices a,b,c,d,e,f do not. Interpretation: Immunizing one more person can be worse! (Planting a disease with one more person can be worse if you want to infect everyone.) Note: the same does not hold true for irreversible k-conversion sets. 73 NP-Completeness Problem: Given a positive integer d and a graph G, does G have a k-conversion set of size at most d? Theorem (Dreyer 2000): This problem is NPcomplete for fixed k > 2. (Whether or not it is NP-complete for k = 2 remains open.) Same conclusions for irreversible k-conversion set. 74 k-Conversion Sets in Regular Graphs G is r-regular if every vertex has degree r. Set of vertices is independent if there are no edges. Theorem (Dreyer 2000): Let G = (V,E) be a connected r-regular graph and D be a set of vertices. (a). D is an irreversible r-conversion set iff V-D is an independent set. (b). D is an r-conversion set iff V-D is an 75 independent set and D is not an independent set. k-Conversion Sets in Regular Graphs II Corollary (Dreyer 2000): (a). The size of the smallest irreversible 2conversion set in Cn is ceiling[n/2]. (b). The size of the smallest 2-conversion set in Cn is ceiling[(n+1)/2]. ceiling[x] = smallest integer at least as big as x. This result agrees with our observation. 76 k-Conversion Sets in Regular Graphs III Proof: (a). Cn is 2-regular. The largest independent set has size floor[n/2], where floor[x] = largest integer no bigger than x. Thus, the smallest D so that V-D is independent has size ceiling[n/2]. (b). If n is odd, taking the first, third, …, nth vertices around the cycle gives a set that is not independent and whose complement is independent. If n is even, every vertex set of size n/2 with an independent complement is itself independent, so an additional vertex is needed. 77 k-Conversion Sets in Grids Let G(m,n) be the rectangular grid graph with m rows and n columns. G(3,4) 78 Toroidal Grids The toroidal grid T(m,n) is obtained from the rectangular grid G(m,n) by adding edges from the first vertex in each row to the last and from the first vertex in each column to the last. Toroidal grids are easier to deal with than rectangular grids because they form regular graphs: Every vertex has degree 4. Thus, we can make use of the results about regular graphs. 79 T(3,4) 80 4-Conversion Sets in Toroidal Grids Theorem (Dreyer 2000): In a toroidal grid T(m,n) (a). The size of the smallest 4-conversion set is max{n(ceiling[m/2]), m(ceiling[n/2])} m or n odd { mn/2 + 1 m, n even (b). The size of the smallest irreversible 4conversion set is as above when m or n is 81 odd, and it is mn/2 when m and n are even. Part of the Proof: Recall that D is an irreversible 4-conversion set in a 4-regular graph iff V-D is independent. V-D independent means that every edge {u,v} in G has u or v in D. In particular, the ith row must contain at least ceiling[n/2] vertices in D and the ith column at least ceiling[m/2] vertices in D (alternating starting with the end vertex of the row or column). We must cover all rows and all columns, and so need at least max{n(ceiling[m/2]), m(ceiling[n/2])} 82 vertices in an irreversible 4-conversion set. 4-Conversion Sets for Rectangular Grids More complicated methods give: Theorem (Dreyer 2000): The size of the smallest 4conversion set and smallest irreversible 4conversion set in a grid graph G(m,n) is 2m + 2n - 4 + floor[(m-2)(n-2)/2] 83 4-Conversion Sets for Rectangular Grids Consider G(3,3): 2m + 2n - 4 + floor[(m-2)(n-2)/2] = 8. What is a smallest 4-conversion set and why 8? 84 4-Conversion Sets for Rectangular Grids Consider G(3,3): 2m + 2n - 4 + floor[(m-2)(n-2)/2] = 8. What is a smallest 4-conversion set and why 8? All boundary vertices have degree < 4 and so must be included in any 4-conversion set. They give 85 a conversion set. More Realistic Models Many oversimplifications. For instance: •What if you stay infected only a certain number of days? •What if you are not necessarily infective for the first few days you are sick? •What if your threshold k for changes from 0 to 1 changes depending upon how long you have been 86 uninfected? Alternative Models to Explore Consider an irreversible process in which you stay in the infected state (state 1) for d time periods after entering it and then go back to the uninfected state (state 0). Consider a k-threshold process in which we vaccinate a person in state 0 once k-1 neighbors are infected (in state 1). Etc. -- let your imagination roam free ... 87 More Realistic Models Our models are deterministic. How do probabilities enter? •What if you only get infected with a certain probability if you meet an infected person? •What if vaccines only work with a certain probability? •What if the amount of time you remain infective exhibits a probability distribution? 88 Alternative Model to Explore Consider an irreversible 1-threshold process in which you stay infected for d time periods and then enter the uninfected state. Assume that you get infected with probability p if at least one of your neighbors is infected. What is the probability that an epidemic will end with no one infected? 89 The Case d = 2, p = 1/2 Consider the following initial state: 90 The Case d = 2, p = 1/2 With probability 1/2, vertex a does not get infected at time 1. Similarly for vertex b. Thus, with probability 1/4, we stay in the same states at time 1. 91 The Case d = 2, p = 1/2 Suppose vertices are still in same states at time 1 as they were at time 0. With probability 1/2, vertex a does not get infected at time 2. Similarly for vertex b. Also after time 1, vertices c and d have been infected for two time periods and thus enter the uninfected state. Thus, with probability 1/4, we get to the following 92 state at time 2: 93 The Case d = 2, p = 1/2 Thus, with probability 1/4 x 1/4 = 1/16, we enter this state with no one infected at time 2. However, we might enter this state at a later time. It is not hard to show (using the theory of finite Markov chains) that we will end in state (0,0,0,0). (This is the only absorbing state in an absorbing Markov chain.). Thus: with probability 1 we will eventually kill the disease off entirely. 94 The Case d = 2, p = 1/2 Is this realistic? What might we do to modify the model to make it more realistic? 95 How do we Analyze this or More Complex Models for Graphs? Computer simulation is an important tool. Example: At the Johns Hopkins University and the Brookings Institution, Donald Burke and Joshua Epstein have developed a simple model for a region with two towns totalling 800 people. It involves a few more probabilistic assumptions than ours. They use single simulations as a learning device. They also run large numbers of simulations 96 and look at averages of outcomes. How do we Analyze this or More Complex Models for Graphs? Burke and Epstein are using the model to do “what if” experiments: What if we adopt a particular vaccination strategy? What happens if we try different plans for quarantining infectious individuals? There is much more analysis of a similar nature 97 that can be done with graph-theoretical models. Would Graph Theory help with a deliberate outbreak of Anthrax? 98 What about a deliberate release of smallpox? 99 Similar approaches, using mathematical models based in DM/TCS, have proven useful in many other fields, to: •make policy •plan operations •analyze risk •compare interventions •identify the cause of observed events 100 Why shouldn’t these approaches work in the defense against bioterrorism? 101