This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Effective edge-based approach for promoting the spreading of SIR model

Dan Yang1, Jiajun Xian2∗, Liming Pan3,2, Wei Wang4,2, Tao Zhou1 1 Web Sciences Center, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China 2 School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China 3 School of Computer Science and Technology, Nanjing Normal University, Nanjing, Jiangsu, 210023, China 4 Cybersecurity Research Institute, Sichuan University, Chengdu, 610065, China E-mail: *[email protected]
Abstract

Promoting some typical spreading dynamics, for instance, the spreading of information, commercial message, vaccination guidance, innovation, and political movement, can bring benefits to all aspects of the socio–economic systems. In this study, we propose a strategy for promoting the spreading of the susceptible–infected–recovered model, which is widely applied to describe these common spreading dynamics in real life. Specifically, we first quantify the potential influence that the addition of each latent edge (that is, edges that do not exist before) could cause to the spreading dynamics. Then, we strategically add the latent edges to the original networks according to the potential influence of each latent edge. Numerical simulations verify the effectiveness of our strategy and demonstrate that our strategy outperforms several static strategies, namely, adding the latent edges between nodes with the largest degree or eigenvector centrality. This study provides an effective way of promoting the spreading of the susceptible–infected–recovered model by modifying the network structure slightly and helps in understanding what a better network structure for the spreading dynamics is. Besides, the theoretical framework established in this study provides inspirations for the further investigations of edge–based promoting strategies for other spreading models.

pacs:
89.75.Hc, 87.19.X-, 87.23.Ge

1 Introduction

The subject of promoting the spreading dynamics in networked systems is attracting substantial attention from multiple disciplines, for instance, computer science, statistical physics, and network science [1, 2]. Maximizing the spreading prevalence of some common spreading dynamics, including the spreading of information, vaccination guidance, innovation, commercial message, and political movement, can bring benefits to all aspects of the socio-economic systems [3, 4, 5, 6, 7]. The study of promoting these spreading dynamics is of great importance in both theoretical and practical perspectives.

Understanding the evolutionary mechanisms of the spreading dynamics in real life and building suitable models to describe them play essential roles in developing promoting strategies. Various spreading models have been proposed for spreading dynamics with different evolutionary mechanisms. For instance, in some simple contagions (e.g., information diffusion and innovation spreading) where the infected individuals could infect the susceptible ones by a single contact, the classic susceptible–infected–susceptible (SIS) model [8, 9], susceptible–infected–recovered (SIR) model  [10, 11] and many of their extensions [12, 13, 14, 15, 16] have been widely applied. Besides, for some complex contagions (e.g., behavior adoption [17] and political information spreading [18, 19]), researchers have proposed the threshold model which incorporates the social reinforcement mechanism (i.e., the mechanism that the susceptible individuals becoming infected with a probability that increases with the cumulative number of contacts with the infected ones) [20, 21]. More spreading models with other complex mechanisms can be found in  [22, 23, 24].

Based on these spreading models, researchers go further to develop strategies to promote or enhance the spreading dynamics. Some of the researchers focus on designing effective transmission strategies [25, 26, 27, 28, 29, 30] such as developing smart protocols to avoid invalid contacts (for instance, the contact between two infected nodes). Besides, some of the researchers are committed to identifying vital nodes [31, 32, 33, 34, 35, 36, 37, 38] with high centralities (for instance, degree, betweenness, and closeness centrality); and they suggest that selecting these vital nodes to the initial seeds can maximizing the spreading prevalence. Recently, several researchers find that structural perturbations (that is, modifying the network structure slightly) can be used for promoting spreading dynamics as well [39, 40, 41].

Nevertheless, despite all of these efforts, no previous study has investigated the problem of how to effectively promote the spreading dynamics of the SIR model by structural perturbations, to the best of our knowledge. To fill up this research blankness, we propose an effective edge–based strategy for promoting the SIR spreading dynamics in this study. The SIR model is first proposed to study the epidemic transmission. Later on, researchers extend it to various other contagion processes, including information diffusion, innovation spreading, promotion of commercial products and the spread of political movements [42, 43, 44, 45, 46, 47, 48, 49]. Our strategy enhances the spreading dynamics of the SIR model by adding edges that do not exist before. To be specific, we first develop a mathematical model to quantify the influence that the addition of each latent edge (i.e., each edge that does not exist in the original network) could cause to the spreading dynamics. This developed mathematical model is able to facilitate the determination of the spreading prevalence of the SIR model as well. Then, we strategically add the latent edges to the original networks according to the influence of each latent edge. Note that our strategy incorporates both the information of network structure and spreading dynamics. This study will show that our strategy is effective and outperforms those static approaches, such as adding the latent edge between nodes with the highest degree or eigenvector centrality.

We organize this paper as follows. First, Sec. 2 describes the spreading model and our strategy in detail. Then, Sec. 3 gives the theoretical framework for determining the influence of each latent edge. Further, Sec. 4 presents the numerical simulations to verify the effectiveness of our strategy. Finally, Sec. 5 concludes the paper.

2 Model description

In this study, we consider a discrete-time SIR dynamics that runs on a complex network GG with adjacency matrix AA. The number of nodes and edges of GG is denoted by NN and MM, respectively. Generally, each node in this model will be assigned with one of three different states, that is, the susceptible state (S), the informed (or infected) state (I), or the recovered state (R). Denote the state of node ii by εi\varepsilon_{i}; thus, εi{S,I,R}\varepsilon_{i}\in\{S,I,R\}. Initially, all the nodes are set to be in the S state. Then, a small fraction of nodes are selected to be in the I state. For every time step, every node in the I state will infect or inform each of its neighbors in the S state with the transmission probability λ\lambda. After the transmission process, each node in the I state will turn to the R state with the recovery probability γ\gamma. We refer to β=λ/γ\beta=\lambda/\gamma as the effective transmission probability. The spreading dynamics will be terminated once there is no node in the I state, and the fraction ρ\rho of nodes in the R state after the termination of spreading dynamics is referred to as the spreading prevalence.

According to the evolutionary rules of the SIR model described in the above paragraph, we can obtain the probabilities of nodes and edges in different states when the dynamics is terminated, for instance, the probability P(εi=R)P(\varepsilon_{i}=R) of node ii being in R state or the joint probability P(εi=R,εj=S)P(\varepsilon_{i}=R,\varepsilon_{j}=S) of edge (i,j)(i,j) being in RS state. Our objective is to maximize the spreading prevalence of the discrete-time SIR dynamics that runs on top of the network GG by adding a fraction of latent edges, i.e., the edges that do not exist in the original network GG before. To determine which latent edge should be added first, we need a measure to rank the influence of each latent edge.

Consider we add a latent edge (i,j)(i,j) to the original network GG. If the final states of nodes ii and jj are εi=εj=S\varepsilon_{i}=\varepsilon_{j}=S, then this added edge will make no difference to the spreading prevalence since both node ii and jj will still be in the S state and influence no other node. Similarly, if the final states of nodes ii and jj are supposed to be εi=εj=R\varepsilon_{i}=\varepsilon_{j}=R, then adding an edge between them will barely bring new nodes to the I state because nodes ii and jj will be infected or informed regardless of whether they are directly connected. Therefore, only when the final states are εi=R\varepsilon_{i}=R and εj=S\varepsilon_{j}=S (or εi=S\varepsilon_{i}=S and εj=R\varepsilon_{j}=R), the spreading prevalence will be increased by adding an edge between nodes ii and jj. Take the former situation as an example, that is, the situation when the final states of nodes ii and jj are εi=R\varepsilon_{i}=R and εj=S\varepsilon_{j}=S, respectively. In this case, if we add an edge between nodes ii and jj, and node ii gets infected or informed in the time t0t_{0}, then node ii can bring node jj into the I state with probability λ\lambda in the time t0+1t_{0}+1. When it comes to the time t0+2t_{0}+2, as a new node in the I state, node jj goes ahead to influence its neighbors in the S state. Obviously, if node jj has a large expected number of neighbors whose final states are S, then adding the edge (i,j)(i,j) can bring a large number of new nodes into the I state and increases the final spreading prevalence. Therefore, we only consider node jj and its neighbors whose final states are S. For convenience, we refer to node jj and its neighbors who have a final state of S as the candidate nodes. Then, the expected number of new infected or informed nodes that come from the candidate nodes after adding the latent edge (i,j)(i,j) can be calculated as

σ¯ij=λP(εi=R)P(εj=S)[1+r=1NAjrλP(εr=S|εj=S)],{\overline{\sigma}}_{ij}=\lambda P(\varepsilon_{i}=R)P(\varepsilon_{j}=S)[1+\sum_{r=1}^{N}A_{jr}\lambda P(\varepsilon_{r}=S|\varepsilon_{j}=S)], (1)

where P(εr=S|εj=S)P(\varepsilon_{r}=S|\varepsilon_{j}=S) is the conditional probability that node rr is in the S state when jj is in the S state. Similarly, we can obtain the expected number σ¯ji{\overline{\sigma}}_{ji} when the final states of nodes ii and jj are εi=S\varepsilon_{i}=S and εj=R\varepsilon_{j}=R, respectively. Take both cases of σ¯ij{\overline{\sigma}}_{ij} and σ¯ji{\overline{\sigma}}_{ji} into consideration, we define the influence of latent edge (i,j)(i,j) as

σij=σ¯ij+σ¯ji.\sigma_{ij}={\overline{\sigma}}_{ij}+{\overline{\sigma}}_{ji}. (2)

Our approach to effectively promote the spreading dynamics of the SIR model is based on adding the latent edge with the highest influence σij\sigma_{ij}. Thus, we refer to our strategy as the latent–edge–influence (LEI) strategy. Hereafter, the problem reduces to solving Eq. (2), that is, finding the probabilities of nodes in different states and the conditional probabilities.

3 Theoretical analysis

In this section, we will develop a new theoretical framework to study the discrete–time SIR spreading dynamics on complex networks. Based on this developed framework, Eq. (2) can be well solved.

Inspired by the epidemic link equations (ELE) model proposed by Matamalas et al. [50], we first define a set of discrete–time equations for the probabilities of edges in different states and then solve the equations at the final state. For the sake of simplicity, we denote the joint probabilities P(εi=X,εj=Y)P(\varepsilon_{i}=X,\varepsilon_{j}=Y) as ΘijXY\Theta^{XY}_{ij}, where X,Y{S,I,R}X,Y\in\{S,I,R\}. The evolution of these denoted joint probabilities depends on each other according to the evolutionary rules of the SIR model.

For instance, the iteration of ΘijII(t)\Theta^{II}_{ij}(t) sponges on ΘijSS\Theta^{SS}_{ij}, ΘijSI\Theta^{SI}_{ij}, and ΘijIS\Theta^{IS}_{ij}. Specifically, we can obtain the iteration formula of ΘijII(t)\Theta^{II}_{ij}(t) as follows:

ΘijII(t+1)\displaystyle\Theta^{II}_{ij}(t+1) =\displaystyle= ΘijSS(t)(1qij(t))(1qji(t))\displaystyle\Theta^{SS}_{ij}(t)(1-q_{ij}(t))(1-q_{ji}(t)) (3)
+\displaystyle+ ΘjiSI(t)(1γ)(1(1λ)qji(t))\displaystyle\Theta^{SI}_{ji}(t)(1-\gamma)(1-(1-\lambda)q_{ji}(t))
+\displaystyle+ ΘijSI(t)(1γ)(1(1λ)qij(t))+ΘijII(t)(1γ)2,\displaystyle\Theta^{SI}_{ij}(t)(1-\gamma)(1-(1-\lambda)q_{ij}(t))+\Theta^{II}_{ij}(t)(1-\gamma)^{2},

where qij(t)q_{ij}(t) represents the probability that node ii (in the S sate) is not brought into the I state by any of its neighbors (excluding jj). Note that Eq. (3) has taken into account all the possible state changes of nodes ii and jj. Given the states of nodes ii and jj at time t+1t+1 as εi(t+1)=εj(t+1)=I\varepsilon_{i}(t+1)=\varepsilon_{j}(t+1)=I, the first term of Eq. (3) considers the situation when εi(t)=εj(t)=S\varepsilon_{i}(t)=\varepsilon_{j}(t)=S and both nodes ii and jj are brought into the state I by their neighbors at time tt. Besides, the second term represents that the states of nodes ii and jj at time tt are εi(t)=I\varepsilon_{i}(t)=I and εj(t)=S\varepsilon_{j}(t)=S, respectively, and then node ii holds its state but node jj is brought into the state II by its neighbors. Moreover, the third term accounts for that the state of node ii (j)(j) is εi(t)=S\varepsilon_{i}(t)=S [εj(t)=I][\varepsilon_{j}(t)=I] at time tt and then node ii is brought into the state II while node jj holds its state. Last, the fourth term considers that nodes ii and jj are both in the state II at time tt and remain in the state II when it comes to time t+1t+1.

Similarly, the iteration formulas of joint probabilities ΘijSS(t)\Theta^{SS}_{ij}(t) and ΘijRR(t)\Theta^{RR}_{ij}(t) can be obtained as

ΘijSS(t+1)\displaystyle\Theta^{SS}_{ij}(t+1) =\displaystyle= ΘijSS(t)qij(t)qji(t)\displaystyle\Theta^{SS}_{ij}(t)q_{ij}(t)q_{ji}(t) (4)

and

ΘijRR(t+1)=ΘijII(t)γ2+ΘijRI(t)γ+ΘjiRI(t)γ+ΘijRR(t),\Theta^{RR}_{ij}(t+1)=\Theta^{II}_{ij}(t)\gamma^{2}+\Theta^{RI}_{ij}(t)\gamma+\Theta^{RI}_{ji}(t)\gamma+\Theta^{RR}_{ij}(t), (5)

respectively. Note that for the joint probability ΘijXY(t)\Theta^{XY}_{ij}(t), where X=YX=Y and X{S,I,R}X\in\{S,I,R\}, we should have ΘijXY(t)=ΘjiXY(t)\Theta^{XY}_{ij}(t)=\Theta^{XY}_{ji}(t). However, if XYX\neq Y, ΘijXY(t)\Theta^{XY}_{ij}(t) and ΘjiXY(t)\Theta^{XY}_{ji}(t) may have different values. That is to say, we should calculate ΘijXY(t)\Theta^{XY}_{ij}(t) and ΘjiXY(t)\Theta^{XY}_{ji}(t) separately for a single edge (i,j)(i,j) when XYX\neq Y. We obtain the expressions of these asymmetric joint probabilities, i.e., ΘijSI(t)\Theta^{SI}_{ij}(t), ΘijSR(t)\Theta^{SR}_{ij}(t), and ΘijIR(t)\Theta^{IR}_{ij}(t) as follows:

ΘijSI(t+1)=ΘijSS(t)qij(t)(1qji(t))+ΘijSI(t)(1λ)qij(t)(1γ),\displaystyle\Theta^{SI}_{ij}(t+1)=\Theta^{SS}_{ij}(t)q_{ij}(t)(1-q_{ji}(t))+\Theta^{SI}_{ij}(t)(1-\lambda)q_{ij}(t)(1-\gamma), (6)
ΘijSR(t+1)=ΘijSI(t)(1λ)qij(t)γ+ΘijSR(t)qij(t),\Theta^{SR}_{ij}(t+1)=\Theta^{SI}_{ij}(t)(1-\lambda)q_{ij}(t)\gamma+\Theta^{SR}_{ij}(t)q_{ij}(t), (7)

and

ΘijIR(t+1)\displaystyle\Theta^{IR}_{ij}(t+1) =\displaystyle= ΘijSR(t)(1qij(t))+ΘijIR(t)(1γ)\displaystyle\Theta^{SR}_{ij}(t)(1-q_{ij}(t))+\Theta^{IR}_{ij}(t)(1-\gamma) (8)
+\displaystyle+ ΘijII(t)(1γ)γ+ΘijSI(t)(1(1λ)qij(t))γ.\displaystyle\Theta^{II}_{ij}(t)(1-\gamma)\gamma+\Theta^{SI}_{ij}(t)(1-(1-\lambda)q_{ij}(t))\gamma.

In addition, qij(t)q_{ij}(t) in Eqs. (3)–(8) can be expressed as

qij(t)=r=1,rjN(1λArihir(t)),\displaystyle q_{ij}(t)=\prod_{r=1,r\neq j}^{N}(1-\lambda A_{ri}h_{ir}(t)), (9)

where hij(t)=P[εj(t)=I|εi(t)=S]h_{ij}(t)=P[\varepsilon_{j}(t)=I|\varepsilon_{i}(t)=S] stands for the probability that node jj is in the I state when node ii is in the S state. The conditional probability hij(t)h_{ij}(t) can be expressed as

hij(t)=ΘijSI(t)ΘijSI(t)+ΘijSS(t)+ΘijSR(t).h_{ij}(t)={\frac{\Theta_{ij}^{SI}(t)}{\Theta_{ij}^{SI}(t)+\Theta_{ij}^{SS}(t)+\Theta_{ij}^{SR}(t)}}. (10)

Iterating Eqs. (3)–(8) from any meaningful initial condition [e.g., ΘijSI(0)=ΘjiSI(0)=ρ0(1ρ0)\Theta_{ij}^{SI}(0)=\Theta_{ji}^{SI}(0)=\rho_{0}(1-\rho_{0}), ΘijII(0)=ρ02\Theta_{ij}^{II}(0)=\rho_{0}^{2}, ΘijSS(0)=(1ρ0)2\Theta_{ij}^{SS}(0)=(1-\rho_{0})^{2} and ΘijRR(0)=ΘijSR(0)=ΘjiSR(0)=ΘijIR(0)=ΘjiIR(0)=0\Theta_{ij}^{RR}(0)=\Theta_{ij}^{SR}(0)=\Theta_{ji}^{SR}(0)=\Theta_{ij}^{IR}(0)=\Theta_{ji}^{IR}(0)=0] can give the probability of any possible state of edge (i,j)(i,j) at the final state. For a network made up of NN nodes and MM edges, we will have 9M9M equations in total for determining the probabilities of states of all the edges. We refer to the approach of using the 9M9M equations to solve the SIR model as the SIR–edge–equations (SIRee) approach. Denote the final value of ΘijXY(t)\Theta_{ij}^{XY}(t) as ΘijXY\Theta_{ij}^{XY}. Then, we can obtain the probabilities of node ii in R as

ρi=1kij=1NAij(ΘijRR+ΘjiSR).\displaystyle\rho_{i}=\frac{1}{k_{i}}\sum_{j=1}^{N}A_{ij}(\Theta_{ij}^{RR}+\Theta_{ji}^{SR}). (11)

Thus, the spreading prevalence can be computed as

ρ=1Ni=1N1kij=1NAij(ΘjiRR+ΘjiSR)\displaystyle\rho=\frac{1}{N}\sum_{i=1}^{N}\frac{1}{k_{i}}\sum_{j=1}^{N}A_{ij}(\Theta_{ji}^{RR}+\Theta_{ji}^{SR}) (12)

Besides, we can get the conditional probability P(εr=S|εj=S)P(\varepsilon_{r}=S|\varepsilon_{j}=S) in Eq. (2) as

P(εr=S|εj=S)=ΘjrSSΘjrSS+ΘjrSR.\displaystyle P(\varepsilon_{r}=S|\varepsilon_{j}=S)=\frac{\Theta_{jr}^{SS}}{\Theta_{jr}^{SS}+\Theta_{jr}^{SR}}. (13)

Define short notations for convenience as follows,

oi=(1+r=1NλAirΘirSSΘirSS+ΘirSR).\displaystyle o_{i}=(1+\sum_{r=1}^{N}\lambda A_{ir}\frac{\Theta_{ir}^{SS}}{\Theta_{ir}^{SS}+\Theta_{ir}^{SR}}). (14)

Substituting Eqs. (11) and (13) back into Eq. (2) yields the following expression of latent edge influence σij\sigma_{ij}:

σij=λρi(1ρj)oj+λ(1ρi)ρjoi.\displaystyle\sigma_{ij}=\lambda\rho_{i}(1-\rho_{j})o_{j}+\lambda(1-\rho_{i})\rho_{j}o_{i}. (15)

Eq. (15) reveals that the influence of each latent edge depends on both the network structure (e.g. the adjacency matrices AA) and the spreading dynamics (e.g. λ\lambda and γ\gamma). As described in Sec. 2, our strategy for promoting the spreading of the SIR model on networks is based on the addition of the latent edge with highest influence σij\sigma_{ij} iteratively. In order to ensure that we really add the current latent edge with the highest influence, we need to resolve Eqs. (3)–(8) and recalculate Eq. (15) after adding any single edge because the network structure changes after each edge addition.

4 Simulation results

This section will present extensive numerical simulations on both synthetic and real–world networks to verify the effectiveness of our approach.

To begin with, we test the agreement between our SIR–ee numerical approach proposed in Sec. 3 and the empirical simulations for the SIR model. Figs. 1 (a) and (b) show the spreading prevalences predicted by Eq. (12) and obtained by Monte Carlo simulations on two synthetic scale-free (SF) networks G1G_{1} and G2G_{2}, respectively. These two SF networks have the same degree exponent α=2.3\alpha=2.3 but different average degrees. Specifically, G1G_{1} has an average degree of k1=5\left\langle k_{1}\right\rangle=5 while G2G_{2} has an average degree of k2=3\left\langle k_{2}\right\rangle=3. More information about these two synthetic networks can be found in Tab. 1. As can be seen, there is a marked agreement between the results of our SIR–ee numerical approach and Monte Carlo simulations in the full range of effective transmission probability β\beta on both the synthetic network we studied. Thus, it is valid to use our SIR–ee approach to determine the global impact of the SIR model.

Refer to caption
Figure 1: (Color online) Spreading prevalence ρ\rho versus effective transmission probability β\beta. The spreading prevalence predicted by Eq. 12 (solid lines) or obtained by Monte Carlo simulations (circles) on the scale–free network with average degree (a) k1=5\left\langle k_{1}\right\rangle=5 or (b) k2=3\left\langle k_{2}\right\rangle=3. The degree exponents of these two networks are both set to be α=2.3\alpha=2.3. More detailed information of these two synthetic networks can be found in Tab. 1. The recovery probability in the SIR model is set as γ=0.5\gamma=0.5.

Then, we go further to test the performance of our strategy in promoting the spreading of the SIR model on the two synthetic SF networks. As described in Sec. 3, our strategy is to add the latent edge LL, which has the highest influence σij\sigma_{ij} calculated by Eq. (15) iteratively. After the addition of a single edge, we resolve Eqs. (3)–(8) and recalculate Eq. (15) to ensure that we really add the current latent edge with the highest influence. For comparison, we also test three additional strategies. First, we consider the approach to add the latent edge LDL^{D}, which has the largest degree product fdf^{d}, that is, the product of the degree of the nodes connected by the latent edge. This strategy is referred to as the degree–product (DP) strategy in the rest of the paper. Similarly, we also consider the strategy to add the latent edge LEL^{E}, which has the largest eigenvector centrality product fef^{e}, that is, the product of the eigenvector centrality of the nodes connected by the latent edge. We refer to this strategy as the eigenvector–centrality–product (ECP) strategy. Last, we carry out the strategy to add the latent edge LRL^{R} selected by random and refer to this strategy as the random (RD) strategy. Note that we recalculate all the measures in the three strategies after the addition of any single edge, as in the case of our strategy.

Refer to caption
Figure 2: (Color online) Correlations between the theoretical edge ranks and the numerical edge ranks. The normalized numerical rank ζ\zeta of the optimal latent edge selected by strategy LEI (pink solid line), strategy DP (orange dashed line) or strategy ECP (green dotted line) on the SF network with average degree (a) k1=5\left\langle k_{1}\right\rangle=5 or (c) k2=3\left\langle k_{2}\right\rangle=3. The Spearman’s rank correlation coefficient msm_{s} between the theoretical edge ranks scored by strategy LEI (pink solid line), strategy DP (orange dashed line), or strategy ECP (green dotted line) and the numerical edge ranks on the SF networks with average degree (b) k1=5\left\langle k_{1}\right\rangle=5 or (d) k2=3\left\langle k_{2}\right\rangle=3. The corresponding degree exponents of both these two synthetic networks are α=2.3\alpha=2.3. More information about these two synthetic networks is presented in Tab. 1. We have set the recovery probability of the SIR model to be γ=0.5\gamma=0.5.

Denote ρ^\hat{\rho} as the incremental spreading prevalence obtained by the SIR–ee numerical approach after adding the selected latent edge. Then we rank all the latent edges according to the values of ρ^\hat{\rho}. We call this kind of edge rank the numerical edge rank rr and denote the normalized numerical edge rank as ζ=r/Ml\zeta=r/M_{l}, where MlM_{l} is the number of all the latent edges. Fig. 2 presents the correlations between the theoretical edge ranks scored by different strategies and the numerical edge ranks. Specifically, Figs. 2 (a) and (b) demonstrate that the normalized edge rank of the optimal latent edge LL selected by our strategy is close to 1/Ml1/M_{l} for the full range of effective transmission probability β\beta on both the networks G1G_{1} and G2G_{2}. The results prove that our strategy performs well in finding the optimal latent edge, which is the key step in promoting strategies. However, the normalized edge ranks of the optimal edges LDL^{D} and LEL^{E} become large when β\beta is big. Besides, Figs. 2 (c) and (d) also show the Spearman rank correlations msm_{s} between the theoretical edge ranks scored by different strategies and the numerical edge ranks, that is,

ms=16l=1Ml(rlr^l)2Ml(Ml21)m_{s}=1-6\frac{\sum^{M_{l}}_{l=1}(r_{l}-\hat{r}_{l})^{2}}{M_{l}(M_{l}^{2}-1)}, (16)

where rlr_{l} and r^l\hat{r}_{l} denote the theoretical edge rank and numerical edge rank of edge ll, respectively. It can be seen that the Spearman rank correlation between the theoretical edge ranks scored by our strategy and the numerical edge ranks is close to 11 for the full range of effective transmission probability β\beta on both networks. This suggests that our strategy can well predict the overall numerical ranks of the latent edges. However, the Spearman correlation between the theoretical edge ranks scored by the strategy DP or ECP, and the numerical edge ranks are close to 11 only for β\beta of small values. This can be explained by the fact that nodes with a high degree or eigenvector centrality will be infected or informed with a larger probability compared with those nodes with small centralities when β\beta is small. If we add the latent edges between them, then these high–centrality nodes together with their neighbors can form an infected or informed cluster that facilitates the spreading. Thus the DP and ECP strategies perform well in finding the optimal latent edge or predicting the overall numerical ranks when β\beta is small. However, when β\beta becomes large, the globally spreading outbreak occurs; thus, connecting the nodes with high centralities becomes unnecessary, but additional connections to those nodes with low centrality are required for the promoting of the spreading. Therefore, both the DP and ECP strategies fail. Note that random strategy is useless in finding the optimal latent edge or predicting the numerical ranks of the latent edges; thus, we have not included the corresponding results of random strategy here. All in all, Fig. 2 shows strong evidence for the potential superiority of our strategy in promoting the spreading of the SIR model.

Refer to caption
Figure 3: (Color online) Performance of different strategies versus effective transmission probability β\beta. The original spreading prevalence on the SF network (black dash–dot–dot line) with average degree (a) k1=5\left\langle k_{1}\right\rangle=5 or (b) k2=3\left\langle k_{2}\right\rangle=3. The corresponding spreading prevalences after adding a number of N/2N/2 edges using strategy LEI, DP, ECP and RD are denoted by pink solid line, orange dashed line, green dotted line and yellow dash–dot line, respectively. The degree exponents of both these two synthetic networks are α=2.3\alpha=2.3 and the recovery probability of the SIR model is γ=0.5\gamma=0.5. Tab. 1 shows the detailed information of these two synthetic networks.
Refer to caption
Figure 4: (Color online) Spreading prevalence ρ\rho versus incremental average degree ka\left\langle k^{a}\right\rangle. The spreading prevalence as a function of the incremental average degree on the SF networks with original average degree (a) k1=5\left\langle k_{1}\right\rangle=5 or (b) k2=3\left\langle k_{2}\right\rangle=3. We compare the results of strategy LEI (pink solid line), strategy DP (orange dashed line), strategy ECP (green dotted line) and strategy RD (yellow dash–dot line). The recovery probabilities of the SIR model on the two networks are both set to be γ=0.5\gamma=0.5. Besides, we choose the transmission probabilities λ\lambda such that the original spreading prevalences of the SIR model are about ρ=0.8\rho=0.8 for both the networks, i.e., λ=0.252\lambda=0.252 and λ=0.487\lambda=0.487 for the network with original average degree k1=5\left\langle k_{1}\right\rangle=5 and k2=3\left\langle k_{2}\right\rangle=3, respectively. The detailed information of the two synthetic SF networks is shown in Tab. (1).
Refer to caption
Figure 5: (Color online) Incremental spreading prevalence ρ^\hat{\rho} versus effective transmission probability β\beta. The incremental spreading prevalence after adding a number of N/2N/2 edges by strategy LEI (pink solid line) , strategy DP (orange dashed line), strategy ECP (green dotted line) or strategy RD (yellow dash–dot line) as a function of the effective transmission probability on the real–world network (a) ca–CSphd, (b) 1138–bus, (c) Air traffic control, (d) web–EPA, (e) tech–routers–rf , (f) Physicians, (g) inf–USAir97, (h) econ–wm1, or (i) Jazz musicians. Detailed information of these real–world networks is presented in Tab. (1) and the recovery probability in the SIR model is set as γ=0.5\gamma=0.5.

Afterward, Figs. 3 and 4 give intuitive demonstrations of the performance of different strategies on the two synthetic networks from two perspectives. On the one hand, Fig. 3 compares the original spreading prevalence and the spreading prevalence after adding a number of N/2N/2 edges (that is, increasing the average degree of the network by 11) using different strategies. The results lead to the conclusion that our strategy performs the best in promoting the spreading of the SIR model for the full range of the effective transmission probability β\beta on both networks. Meanwhile, the DP and ECP strategies have good performance only when β\beta is small, and the RD strategy performs well only for β\beta of large values. It also should be mentioned that the incremental spreading prevalences are much larger in the more sparse network G2G_{2} after adding the same number of edges by our strategy. That is to say, the effectiveness of our strategy is more obvious in sparse networks, which are common in the real world. On the other hand, Fig. 4 demonstrates that our strategy can bring the fastest full–blown break–out of the SIR model. In the numerical simulations, we set the recovery probability to be γ=0.5\gamma=0.5 and choose the transmission probability λ\lambda such that the original spreading prevalence of the SIR model is about ρ=0.8\rho=0.8 for both the two synthetic networks, that is, λ=0.252\lambda=0.252 and λ=0.487\lambda=0.487 for G1G_{1} and G2G_{2}, respectively. It can be observed that our strategy performs the best in increasing the spreading prevalence to ρ=1\rho=1 on both networks. Besides, the DP and ECP strategy both perform worse than the RD strategy since the value of effective transmission probabilities β\beta are relatively large on both networks. These results about the three strategies (i.e., DP strategy, ECP strategy, and RD strategy) coincide with the findings we obtained from Fig. 3. Sum up, Figs. 3 and 4 give the direct proofs of the effectiveness and superiority of our strategy.

Finally, we test our strategy on 99 real–world networks: (a) ca—CSphd [51]; (b) 1138—bus [51]; (c) Air traffic control [52]; (d) web-EPA [51]; (e) tech-routers-rf [51] ; (f) Physicians [52]; (g) inf-USAir97 [51]; (h) econ-wm1 [51]; and (i) Jazz musicians [52]. Detailed information of these real–world networks is presented in Tab. 1. They cover a wide range of average degree (between 2.035 and 27.697). We plot the incremental spreading prevalence ρ^\hat{\rho} after increasing the average degree by 11 (that is, adding a number of N/2N/2 edges) as a function of the effective transmission probability β\beta in Fig. 5. It can be seen that our strategy leads to the largest incremental spreading prevalence ρ^\hat{\rho} for the full range of effective transmission probability β\beta on all the 99 real–world networks. Besides, the DP and ECP strategies perform better than the random strategy only for β\beta of small values. Moreover, the incremental spreading prevalence ρ^\hat{\rho} is larger in the network with a smaller average degree. The results of these real–world networks are in concordance with the conclusions we draw on the synthetic networks G1G_{1} and G2G_{2}.

Table 1: Basic statistics of the two synthetic networks and nine real–world networks employed in this study: the number of nodes NN, the number of edges MM, the maximum degree kmaxk_{max}, the average degree k\left\langle k\right\rangle, and the second moment of the degree distribution k2\left\langle k^{2}\right\rangle.
Name NN MM kmaxk_{max} k\left\langle k\right\rangle k2\left\langle k^{2}\right\rangle
SF2.3 200 500 14 5 31.27
sparse SF2.3 200 500 9 3 11.92
ca–CSphd 1025 1043 46 2.035 12.166
1138–bus 1038 1458 17 2.562 9.814
Air traffic control 1226 2408 34 3.928 28.899
web-EPA 4253 8897 175 4.184 118.451
tech-routers-rf 2113 6632 109 6.277 135.704
Physicians 117 465 26 7.95 79.162
inf-USAir97 332 2126 139 12.807 568.163
econ-wm1 258 2389 106 18.519 917.434
Jazz musicians 198 2742 100 27.697 1070.242

5 Conclusions

Promoting some typical spreading dynamics (for instance, the spreading of information, vaccination guidance, commercial message, innovation, and political movements) in networked systems can be of both theoretical and practical importance. In this study, we proposed an effective edge–based strategy for promoting the spreading dynamics of the SIR model on complex networks.

To be specific, we first quantified the potential influence that the addition of each latent edge could cause to the spreading dynamics by a mathematical model. This mathematical model could also facilitate the determination of the spreading prevalence. Then, we strategically added the latent edges to the original networks according to the potential influence of each latent edge. Note that previous approaches for promoting the spreading dynamics on complex networks mostly only consider either the structure of networks or spreading dynamics. However, our strategy incorporates both the information of network structure and spreading dynamics. Extensive numerical simulations verified the effectiveness of our strategy and demonstrated that our strategy outperforms those static approaches, such as adding the latent edge between nodes with the highest degree or eigenvector centrality.

This study provides an effective approach for promoting the spreading of the SIR model by modifying the network structure slightly and helps to understand what a better network structure for the spreading dynamics is. Besides, the theoretical framework we developed in this study offers inspirations for further investigations on edge–based promoting strategies for other spreading models.

Acknowledgements

This work was partially supported by the China Postdoctoral Science Special Foundation (Grant No. 2019T120829), National Natural Science Foundation of China (Grant Nos. 61903266), Fundamental Research Funds for the Central Universities, and Sichuan Science and Technology Program (NO. 20YYJC4001).

References

References

  • [1] Morone F and Makse H A 2015 Nature 524 65
  • [2] Pan L, Wang W, Cai S and Zhou T 2019 Physical Review E 100 022316
  • [3] Wang Z, Bauch C T, Bhattacharyya S, d’Onofrio A, Manfredi P, Perc M, Perra N, Salathe M and Zhao D 2016 Physics Reports 664 1–113
  • [4] Gong M, Yan J, Shen B, Ma L and Cai Q 2016 Information Sciences 367 600–614
  • [5] Del Ferraro G, Moreno A, Min B, Morone F, Pérez-Ramírez Ú, Pérez-Cervera L, Parra L C, Holodny A, Canals S and Makse H A 2018 Nature Communications 9 2274
  • [6] Hu Y, Ji S, Jin Y, Feng L, Stanley H E and Havlin S 2018 Proceedings of the National Academy of Sciences 115 7468–7472
  • [7] Lokhov A Y and Saad D 2017 Proceedings of the National Academy of Sciences 114 E8138–E8146
  • [8] Fu X, Small M, Walker D M and Zhang H 2008 Physical Review E 77 036113
  • [9] Xian J, Yang D, Pan L and Wang W 2020 arXiv:2002.06567
  • [10] Daley D J and Kendall D G 1964 Nature 204 1118–1118
  • [11] Daley D J and Kendall D G 1965 IMA Journal of Applied Mathematics 1 42–55
  • [12] Wang Z, Zhang H and Wang Z 2014 Chaos, Solitons & Fractals 61 1–7
  • [13] Sun G Q, Jusup M, Jin Z, Wang Y and Wang Z 2016 Physics of Life Reviews 19 43–73
  • [14] Zuzek L A, Stanley H and Braunstein L 2015 Scientific Reports 5 12151
  • [15] Wang Z, Guo Q, Sun S and Xia C 2019 Applied Mathematics and Computation 349 134–147
  • [16] Xia C, Wang Z, Zheng C, Guo Q, Shi Y, Dehmer M and Chen Z 2019 Information Sciences 471 185–200
  • [17] Aral S and Nicolaides C 2017 Nature Communications 8 14753
  • [18] Romero D M, Meeder B and Kleinberg J 2011 Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter Proceedings of the 20th International Conference on World Wide Web (ACM) pp 695–704
  • [19] Centola D and Macy M 2007 American Journal of Sociology 113 702–734
  • [20] Watts D J 2002 Proceedings of the National Academy of Sciences of the United States of America 99 5766–5771
  • [21] Lü L, Chen D B and Zhou T 2011 New Journal of Physics 13 123005
  • [22] Wang W, Liu Q H, Liang J, Hu Y and Zhou T 2019 Physics Reports 820 1–51
  • [23] Boccaletti S, Bianconi G, Criado R, Del Genio C I, Gómez-Gardeñes J, Romance M, Sendiña-Nadal I, Wang Z and Zanin M 2014 Physics Reports 544 1–122
  • [24] Wang Z, Andrews M A, Wu Z X, Wang L and Bauch C T 2015 Physics of Life Reviews 15 1–29
  • [25] Yang R, Zhou T, Xie Y B, Lai Y C and Wang B H 2008 Physical Review E 78 066109
  • [26] Gao L, Wang W, Pan L, Tang M and Zhang H F 2016 Scientific Reports 6 38220
  • [27] Yang R, Huang L and Lai Y C 2008 Physical Review E 78 026111
  • [28] Roshani F and Naimi Y 2012 Physical Review E 85 036109
  • [29] Gao L, Wang W, Shu P, Gao H and Braunstein L A 2017 Europhysics Letters 118 18001
  • [30] Cui P B, Wang W, Cai S M, Zhou T, Lai Y C et al. 2018 Physical Review E 98 052311
  • [31] Lü L, Chen D, Ren X L, Zhang Q M, Zhang Y C and Zhou T 2016 Physics Reports 650 1–63
  • [32] Liao H, Mariani M S, Medo M, Zhang Y C and Zhou M Y 2017 Physics Reports 689 1–54
  • [33] Xin Y, Gao C, Wang Z, Zhen X and Li X 2019 IEEE Access 7 92070–92078
  • [34] Chen W, Wang C and Wang Y 2010 Scalable influence maximization for prevalent viral marketing in large-scale social networks Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining pp 1029–1038
  • [35] Riquelme F and González-Cantergiani P 2016 Information Processing & Management 52 949–975
  • [36] Kitsak M, Gallos L K, Havlin S, Liljeros F, Muchnik L, Stanley H E and Makse H A 2010 Nature Physics 6 888–893
  • [37] Lü L, Zhou T, Zhang Q M and Stanley H E 2016 Nature Communications 7 10168
  • [38] Chen W, Wang Y and Yang S 2009 Efficient influence maximization in social networks Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining pp 199–208
  • [39] Aguirre J, Papo D and Buldú J M 2013 Nature Physics 9 230–234
  • [40] Milanese A, Sun J and Nishikawa T 2010 Physical Review E 81 046112
  • [41] Van Mieghem P, Wang H, Ge X, Tang S and Kuipers F A 2010 The European Physical Journal B 76 643–652
  • [42] Xian J, Yang D, Pan L, Wang W and Wang Z 2019 Chaos: An Interdisciplinary Journal of Nonlinear Science 29 113123
  • [43] Zhu K and Ying L 2014 IEEE/ACM Transactions on Networking 24 408–421
  • [44] Shulgin B, Stone L and Agur Z 1998 Bulletin of Mathematical Biology 60 1123–1148
  • [45] Zhao L, Cui H, Qiu X, Wang X and Wang J 2013 Physica A: Statistical Mechanics and its Applications 392 995–1003
  • [46] Chen Z, Zhu K and Ying L 2016 IEEE Transactions on Network Science and Engineering 3 17–31
  • [47] Wu J, Gao Z and Sun H 2004 Modern Physics Letters B 18 1537–1542
  • [48] Woo J, Son J and Chen H 2011 An sir model for violent topic diffusion in social media Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics (IEEE) pp 15–19
  • [49] Xian J, Yang D, Pan L, Liu M and Wang W 2020 Journal of Statistical Mechanics: Theory and Experiment 2020 023402
  • [50] Matamalas J T, Arenas A and Gómez S 2018 Science Advances 4 eaau4212
  • [51] Rossi R A and Ahmed N K 2015 The network data repository with interactive graph analytics and visualization AAAI URL http://networkrepository.com
  • [52] Kunegis J 2013 Konect: The koblenz network collection Proceedings of the 22nd International Conference on World Wide Web WWW ’13 Companion (New York, NY, USA: Association for Computing Machinery) pp 1343–1350 ISBN 9781450320382 URL https://doi.org/10.1145/2487788.2488173