研究生: |
陳姿穎 Chen, Chih-Ying |
---|---|
論文名稱: |
在具有無法檢出感染者的社交圖中估算總共感染人數 Estimating the Number of Infections with Undetectable Infected Persons in a Social Graph |
指導教授: |
張正尚
Chang, Cheng-Shang |
口試委員: |
李端興
Lee, Duan-Shin 洪樂文 Hong, Yao-Win 虞沛鐸 Yu, Pei-Duo |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 通訊工程研究所 Communications Engineering |
論文出版年: | 2022 |
畢業學年度: | 110 |
語文別: | 英文 |
論文頁數: | 50 |
中文關鍵詞: | 隨機圖 、獨立級聯模型 、重要性採樣 、估計感染數量 |
外文關鍵詞: | random graphs, independent cascade model, importance sampling, estimation of infected cases |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
難以發現的無症狀感染者是 COVID-19 的其中一個著名特點。因此,實際受到感
染的人數可能會遠大於官方所報告的人數。受此啟發,我們開始研究如何去估計社
交圖中真實的感染人數。在本文中,我們假設疾病的傳播是使用independent cascade model。當疾病傳播結束時,我們會在社交圖中觀察到受到感染並被檢測出來的點集合,我們將此情況稱作為一個事件 (Event)。
假設在疾病傳播開始時只存在單一病源,我們想(i)找到觀察到的事件發生的機率
(ii)估計給定事件的預期感染人數。為了解決這兩個問題,我們運用了隨機圖方法。
對於線圖,我們推導出了這兩個問題的閉合解。對於樹圖,我們提出了線性時間演算
法來計算這兩個值。對於一般圖,我們設計了基於最小Steiner樹的重要性採樣方法來估計這兩個值。最後模擬結果表示出,我們的重要性抽樣方法比標準模擬方法的相對
誤差要小得多。
One of the prominent features of COVID-19 is that asymptomatic infections are difficult to detect. As such, the actual number of infections might be much larger than the officially reported number. Motivated by this, we consider the problem of estimating the number
of infections with undetectable infections in a social graph. We use the independent cascade model for disease propagation in a graph. When the disease propagation ends, we observe an event that consists of a set of reported cases in the social graph. Assuming that there is a single source in the graph at the beginning of the disease propagation, we are interested in (i) finding the probability of the observed event and (ii) estimating the expected number of infections given that event. To address these two questions, we adopt a random graph approach. For line graphs, we derive closed-form expressions of
these two quantities. For trees, we propose linear-time algorithms to compute these two quantities. For general graphs, we devise efficient importance sampling methods based on Steiner minimal trees to estimate these two quantities. Our simulation results show that our importance sampling methods achieve much smaller relative errors than those of the standard simulation methods.
[1] E. Dong, H. Du, and L. Gardner, “An interactive web-based dashboard to track covid-19 in real time,” The Lancet infectious diseases, vol. 20, no. 5, pp. 533–534, 2020.
[2] R. Li, S. Pei, B. Chen, Y. Song, T. Zhang, W. Yang, and J. Shaman, “Substantial undocumented infection facilitates the rapid dissemination of novel coronavirus (sarscov-2),” Science, vol. 368, no. 6490, pp. 489–493, 2020.
[3] J. Shaman, “An estimation of undetected covid cases in France,” Nature, vol. 590, no. 6490, pp. 38–39, 2020.
[4] S. Bhatia, N. Imai, G. Cuomo-Dannenburg, M. Baguelin, A. Boonyasiri, A. Cori, Z. Cucunub´a, I. Dorigatti, R. FitzJohn, H. Fu et al., “Estimating the number of undetected covid-19 cases among travellers from mainland china,” Wellcome Open Research, vol. 5, 2020.
[5] B. F. Maier and D. Brockmann, “Effective containment explains subexponential growth in recent confirmed covid-19 cases in china,” Science, vol. 368, no. 6492, pp. 742–746, 2020.
[6] T. Zhou, Q. Liu, Z. Yang, J. Liao, K. Yang, W. Bai, X. Lu, and W. Zhang, “Preliminary prediction of the basic reproduction number of the wuhan novel coronavirus 2019-ncov,” Journal of Evidence-Based Medicine, vol. 13, no. 1, pp. 3–7, 2020.
[7] Y.-C. Chen, P.-E. Lu, C.-S. Chang, and T.-H. Liu, “A time-dependent sir model for covid-19 with undetectable infected persons,” IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp. 3279–3294, 2020.
[8] J. Dehning, J. Zierenberg, F. P. Spitzner, M. Wibral, J. P. Neto, M. Wilczek, and V. Priesemann, “Inferring change points in the spread of covid-19 reveals the effectiveness of interventions,” Science, 2020. [Online]. Available: https://science.sciencemag.org/content/early/2020/05/14/science.abb9789
[9] A. Kumar, P. K. Gupta, and A. Srivastava, “A review of modern technologies for tackling covid-19 pandemic,” Diabetes & Metabolic Syndrome: Clinical Research & Reviews, vol. 14, no. 4, pp. 569–573, 2020.
[10] D. Shah and T. Zaman, “Detecting sources of computer viruses in networks: theory and experiment,” in Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2010, pp. 203–214.
[11] Z. Wang, W. Dong, W. Zhang, and C. W. Tan, “Rumor source detection with multiple observations: Fundamental limits and algorithms,” ACM SIGMETRICS Performance Evaluation Review, vol. 42, no. 1, pp. 1–13, 2014.
[12] K. Cai, H. Xie, and J. C. Lui, “Information spreading forensics via sequential dependent snapshots,” IEEE/ACM Transactions on Networking, vol. 26, no. 1, pp. 478–491, 2018.
[13] K. Zhu and L. Ying, “Information source detection in the sir model: A samplepath-based approach,” IEEE/ACM Transactions on Networking, vol. 24, no. 1, pp. 408–421, 2014.
[14] A. Y. Lokhov, M. M´ezard, H. Ohta, and L. Zdeborov´a, “Inferring the origin of an epidemic with a dynamic message-passing algorithm,” Physical Review E, vol. 90, no. 1, p. 012801, 2014.
[15] Q. Dawkins, T. Li, and H. Xu, “Diffusion source identification on networks with statistical confidence,” arXiv preprint arXiv:2106.04800, 2021.
[16] B. Chang, E. Chen, F. Zhu, Q. Liu, T. Xu, and Z. Wang, “Maximum a posteriori estimation for information source detection,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50, no. 6, pp. 2242–2256, 2018.
[17] Y. Chai, Y. Wang, and L. Zhu, “Information sources estimation in time-varying networks,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2621–2636, 2021.
[18] C. Zhang, Q. Guo, L. Fu, X. Gan, and X. Wang, “Ite: A structural entropy based approach for source detection,” in IEEE INFOCOM 2021-IEEE Conference on Computer Communications. IEEE, 2021, pp. 1–10.
[19] P. Domingos and M. Richardson, “Mining the network value of customers,” in Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, 2001, pp. 57–66.
[20] D. Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of influence through a social network,” in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2003, pp. 137–146.
[21] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier, “Maximizing social influence in nearly optimal time,” in Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms. SIAM, 2014, pp. 946–957.
[22] Y. Tang, X. Xiao, and Y. Shi, “Influence maximization: Near-optimal time complexity meets practical efficiency,” in Proceedings of the 2014 ACM SIGMOD international conference on Management of data, 2014, pp. 75–86.
[23] P. W. Glynn and D. L. Iglehart, “Importance sampling for stochastic simulations,” Management science, vol. 35, no. 11, pp. 1367–1392, 1989.
[24] C.-S. Chang, P. Heidelberger, S. Juneja, and P. Shahabuddin, “Effective bandwidth and fast simulation of atm intree networks,” Performance Evaluation, vol. 20, no. 1-3, pp. 45–65, 1994.
[25] L. Kou, G. Markowsky, and L. Berman, “A fast algorithm for steiner trees,” Acta informatica, vol. 15, no. 2, pp. 141–145, 1981.
[26] K. Mehlhorn, “A faster approximation algorithm for the steiner problem in graphs,” Information Processing Letters, vol. 27, no. 3, pp. 125–128, 1988.
[27] L. L. Peterson and B. S. Davie, Computer networks: a systems approach. Elsevier,
2007.
[28] P. Bratley, B. L. Fox, and L. E. Schrage, A guide to simulation. Springer Science & Business Media, 2011.
[29] W. W. Zachary, “An information flow model for conflict and fission in small groups,” Journal of anthropological research, vol. 33, no. 4, pp. 452–473, 1977.