1 challenges for discrete mathematics and theoretical computer science in homeland security

116
1 Mathematics and Theoretical Computer Science in Homeland Security

Post on 20-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

1

Challenges for Discrete Mathematicsand Theoretical Computer Science

in Homeland Security

Page 2: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

2

Great concern about the deliberate introduction of diseases by bioterrorists has led to new challenges for mathematical scientists.

smallpox

Page 3: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

3

Bioterrorism issues are typical of many homeland security issues.

This talk will emphasize bioterrorism, but many of the “messages” apply to homeland security in general.

Waiting on lineto get smallpoxvaccine during New York Citysmallpox epidemic

Page 4: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

4

Outline1. The role of mathematical sciences in the fight for homeland security and against bioterrorism.

2. Methods of computational and mathematical epidemiology

2a. Other areas of mathematical sciences

2b. Discrete math and theoretical CS

3. Graph-theoretical models of spread and control of disease

Page 5: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

5

Dealing with bioterrorism requires detailed planning of preventive measures and responses.

Both require precise reasoning and extensive analysis.

Page 6: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

6

Understanding infectious systems requires being able to reason about highly complex biological systems, with hundreds of demographic and epidemiological variables.

Intuition alone is insufficient to fully understand the dynamics of such systems.

Page 7: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

7

Experimentation or field trials are often prohibitively expensive or unethical and do not always lead to fundamental understanding.

Therefore, mathematical modeling becomes an important experimental and analytical tool.

Page 8: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

8

Mathematical models have become important tools in analyzing the spread and control of infectious diseases and plans for defense against bioterrorist attacks, especially when combined with powerful, modern computer methods for analyzing and/or simulating the models.

Page 9: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

9

What Can Math Models Do For Us?

Page 10: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

10

What Can Math Models Do For Us?•Sharpen our understanding of fundamental processes

•Compare alternative policies and interventions

•Help make decisions.

•Prepare responses to bioterrorist attacks.

•Provide a guide for training exercises and scenario development.

•Guide risk assessment.

•Predict future trends.

Page 11: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

11

What are the challenges for mathematical scientists in the defense against disease?

This question led DIMACS, the Center for Discrete Mathematics and Theoretical Computer Science, to launch a “special focus” on this topic.

Post-September 11 events soon led to an emphasis on bioterrorism.

Page 12: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

12

DIMACS Special Focus on Computational and Mathematical

Epidemiology 2002-2005

Anthrax

Page 13: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

13

Methods of Math. and Comp. Epi.Math. models of infectious diseases go back to Daniel Bernoulli’s mathematical analysis of smallpox in 1760.

Page 14: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

14

Hundreds of math. models since have:

•highlighted concepts like core population in STD’s;

Page 15: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

15

•Made explicit concepts such as herd immunity for vaccination policies;

Page 16: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

16

•Led to insights about drug resistance, rate of spread of infection, epidemic trends, effects of different kinds of treatments.

Page 17: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

17

The size and overwhelming complexity of modern epidemiological problems -- and in particular the defense against bioterrorism -- calls for new approaches and tools.

Page 18: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

18

The Methods of Mathematical and Computational Epidemiology

•Statistical Methods–long history in epidemiology–changing due to large data sets involved

•Dynamical Systems–model host-pathogen systems, disease spread–difference and differential equations–little systematic use of today’s powerful computational methods

Page 19: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

19

The Methods of Mathematical and Computational Epidemiology

•Probabilistic Methods–stochastic processes, random walks, percolation, Markov chain Monte Carlo methods–simulation–need to bring in more powerful computational tools

Page 20: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

20

Discrete Math. and Theoretical Computer Science

• Many fields of science, in particular molecular biology, have made extensive use of DM broadly defined.

Page 21: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

21

Discrete Math. and Theoretical Computer Science Cont’d

•Especially useful have been those tools that make use of the algorithms, models, and concepts of TCS.

•These tools remain largely unused and unknown in epidemiology and even mathematical epidemiology.

Page 22: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

22

DM and TCS Continued•These tools are made especially relevant to epidemiology because of:

–Geographic Information Systems

Page 23: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

23

DM and TCS Continued–Availability of large and disparate computerized databases on subjects relating to disease and the relevance of modern methods of data mining.

Page 24: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

24

DM and TCS Continued–Availability of large and disparate computerized databases on subjects relating to disease and the relevance of modern methods of data mining:

–Issues involve•detection•surveillance (monitoring)•streaming data analysis•clustering•visualization of data

Page 25: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

25

DM and TCS Continued–The increasing importance of an evolutionary point of view in epidemiology and the relevance of DM/TCS methods of phylogenetic tree reconstruction.

Page 26: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

26

DM and TCS Continued–The increasing importance of an evolutionary point of view in epidemiology and the relevance of DM/TCS methods of phylogenetic tree reconstruction.

•Heavy use of DM in phylogenetic tree reconstruction•Might help in identification of source of an infectious agent

Page 27: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

27

A Sampling of What is Happening at DIMACS

“Working Group” on Mathematical Sciences Challenges in Defense Against Bioterrorism

Working Group on Disease Surveillance and Detection

Working Group on Vaccination Strategies

Computer Security: W.G. on Analogies between Computer Viruses and Biological Viruses

Page 28: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

28

A Sampling of What is Happening at DIMACS

Research Project on Monitoring Message Streams

Research Project on Sharing Information between Databases

Special Focus on Communications Security

Special Focus on Computational and Mathematical Epidemiology

Page 29: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

29

Models of the Spread and Control of Disease through Social Networks

•Diseases are spread through social networks.

•This is especially relevant to sexually transmitted diseases such as AIDS.

•“Contact tracing” is an important part of any strategy to combat outbreaks of diseases such as smallpox, whether naturally occurring or resulting from bioterrorist attacks.

Page 30: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

30

The Basic ModelSocial Network = GraphVertices = PeopleEdges = contact

State of a Vertex: simplest model: 1 if infected, 0 if not infected(SI Model)

More complex models: SI, SEI, SEIR, etc.S = susceptible, E = exposed, I = infected, R = recovered (or removed)

Page 31: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

31

More About StatesOnce you are infected, can you be cured?If you are cured, do you become immune or can you re-enter the infected state?

We can build a digraph reflecting the possible ways to move from state to state in the model.

Page 32: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

32

The State Diagram for a Smallpox Model

The following diagram is from a Kaplan-Craft-Wein (2002) model for comparing alternative responses to a smallpox attack. This is being considered by the CDC and Office of Homeland Security.

Page 33: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

33

Page 34: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

34

The Stages

Row 1: “Untraced” and in various stages of susceptibility or infectiousness.

Row 2: Traced and in various stages of the queue for vaccination.

Row 3: Unsuccessfully vaccinated and in various stages of infectiousness.

Row 4: Successfully vaccinated; dead

Page 35: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

35

Moving From State to State

Let si(t) give the state of vertex i at time t.

Two states 0 and 1.

Times are discrete: t = 0, 1, 2, …

Page 36: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

36

Majority ProcessesBasic Majority Process: You change your state at time t+1 if a majority of your neighbors have the opposite state at time t.

(No change in case of “ties”)

Useful in models of spread of opinion.

Disease interpretation? Cure if majority of your neighbors are uninfected. Does this make sense?

Page 37: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

37

Majority Processes II

Irreversible Majority Process: You change your state from 0 to 1 at time t+1 if a majority of your neighbors have state 1 at time t. You never leave state 1.

(No change in case of “ties”)

Disease interpretation? Infected if sufficiently many of your neighbors are infected.

Page 38: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

38

Basic Majority Process

Page 39: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

39

Page 40: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

40

Page 41: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

41

Irreversible Majority Process

Page 42: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

42

Page 43: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

43

Page 44: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

44

Aside: Distributed ComputingMajority processes are studied in distributed computing. Goal: Eliminate damage caused by failed processors (vertices) or at least to restrict their influence.Do this by maintaining replicated copies of crucial data and, when a fault occurs, letting a processor change “state” if a majority of its neighbors are in a different state.Other applications of similar ideas in distributed computing: distributed database management, quorum systems, fault local mending.

Page 45: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

45

Threshold Processes

Basic k-Threshold Process: You change your state at time t+1 if at least k of your neighbors have the opposite state at time t.

Disease interpretation? Same issue as basic majority processes.

Page 46: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

46

Threshold Processes II

Irreversible k-Threshold Process: You change your state from 0 to 1 at time t+1 if at least k of your neighbors have state 1 at time t. You never leave state 1.

Disease interpretation? Infected if sufficiently many of your neighbors are infected.

Special Case k = 1: Infected if any of your neighbors is infected.

Page 47: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

47

Basic 2-Threshold Process

Page 48: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

48

Page 49: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

49

Page 50: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

50

Irreversible 2-Threshold Process

Page 51: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

51

Page 52: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

52

Page 53: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

53

Complications to Add to Model•k = 1, but you only get infected with a certain probability.

•You are automatically cured after you are in the infected state for d time periods.

•You become immune from infection (can’t re-enter state 1) once you enter and leave state 1.

•A public health authority has the ability to “vaccinate” a certain number of vertices, making them immune from infection.

Page 54: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

54

PeriodicityState vector: s(t) = (s1(t), s2(t), …, sn(t)).

First example, s(1) = s(3) = s(5) = …,s(0) = s(2) = s(4) = s(6) = …

Second example: s(1) = s(2) = s(3) = ...

In all of these processes, because there is a finite set of vertices, for any initial state vector s(0), the state vector will eventually become periodic, i.e., for some P and T, s(t+P) = s(t) for all t > T.

The smallest such P is called the period.

Page 55: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

55

Periodicity IIFirst example: the period is 2.

Second example: the period is 1.

Both basic and irreversible majority processes and threshold processes are special cases of symmetric synchronous neural networks.

Theorem (Goles and Olivos, Poljak and Sura): For symmetric, synchronous neural networks, the period is either 1 or 2.

Page 56: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

56

Periodicity IIIWhen period is 1, we call the ultimate state vector a fixed point.

When the fixed point is the vector s(t) = (1,1,…,1) or (0,0,…,0), we talk about a final common state.

One problem of interest: Given a graph, what subsets S of the vertices can force one of our processes to a final common state with entries equal to the state shared by all the vertices in S in the initial state?

Page 57: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

57

Periodicity IVInterpretation: Given a graph, what subsets S of the vertices should we plant a disease with so that ultimately everyone will get it? (s(t) (1,1,…,1))

Economic interpretation: What set of people do we place a new product with to guarantee “saturation” of the product in the population?

Interpretation: Given a graph, what subsets S of the vertices should we vaccinate to guarantee that ultimately everyone will end up without the disease? (s(t) 0,0,…,0))

Page 58: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

58

Conversion SetsConversion set: Subset S of the vertices that can force one of our processes to a final common state with entries equal to the state shared by all the vertices in S in the initial state. (In other words, if all vertices of S start in same state x = 1 or 0, then the process goes to a state where all vertices are in state x.)

Irreversible conversion set if irreversible process.

k-conversion set or irreversible k-conversion set if a k-threshold process.

Page 59: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

59

1-Conversion Setsk = 1.

What are the conversion sets in a basic 1-threshold process?

Page 60: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

60

1-Conversion Setsk = 1.

The only conversion set in a basic 1-threshold process is the set of all vertices. For, if any two adjacent vertices have 0 and 1 in the initial state, then they keep switching between 0 and 1 forever.

What are the irreversible 1-conversion sets?

Page 61: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

61

Irreversible 1-Conversion Setsk = 1.

Every single vertex x is an irreversible 1-conversion set if the graph is connected. We make it 1 and eventually all vertices become 1 by following paths from x.

Page 62: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

62

Conversion Sets for Odd Cycles

C2p+1

Majority process.

What is a conversion set?

Page 63: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

63

Conversion Sets for Odd Cycles

C2p+1.

Majority process.

Place p+1 1’s in “alternating” positions.

Page 64: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

64

Page 65: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

65

Page 66: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

66

Conversion Sets for Odd Cycles

We have to be careful where we put the initial 1’s. p+1 1’s do not suffice if they are next to each other.

Page 67: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

67

Page 68: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

68

Page 69: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

69

Conversion Sets for Odd Cycles

k-threshold process.

k = 2: This is the same as a majority process.

k = 3: Nothing ever changes.

Page 70: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

70

Irreversible Conversion Sets for Odd Cycles

What if we want an irreversible conversion set under the majority process?

Same set of p+1 vertices is an irreversible conversion set. Moreover, everyone gets infected in one step.

Page 71: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

71

Vaccination StrategiesIf you didn’t know whom a bioterrorist might infect, what people would you vaccinate to be sure that a disease doesn’t spread very much? (Vaccinated vertices stay at state 0 regardless of the state of their neighbors.)

Try odd cycles again. Consider an irreversible 2-threshold process. Suppose your adversary has enough supply to infect two individuals.

Strategy 1: “Mass vaccination”: make everyone 0 and immune in initial state.

Page 72: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

72

Vaccination Strategies In C5, mass vaccination means vaccinate 5 vertices. This obviously works.

In practice, vaccination is only effective with a certain probability, so results could be different.

Can we do better than mass vaccination?

What does better mean? If vaccine has no cost and is unlimited and has no side effects, of course we use mass vaccination.

Page 73: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

73

Vaccination Strategies What if vaccine is in limited supply? Suppose we only have enough vaccine to vaccinate 2 vertices.Consider two different vaccination strategies:

Vaccination Strategy I Vaccination Strategy II

Page 74: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

74

Vaccination Strategy I: Worst Case (Adversary Infects Two)

Two Strategies for Adversary

Adversary Strategy Ia Adversary Strategy Ib

Page 75: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

75

The “alternation” between your choice of a defensive strategy and your adversary’s choice of an offensive strategy suggests we consider the problem from the point of view of game theory.

The Food and Drug Administration is studying the use of game-theoretic models in the defense against bioterrorism.

Page 76: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

76

Vaccination Strategy I Adversary Strategy Ia

Page 77: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

77

Vaccination Strategy I Adversary Strategy Ib

Page 78: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

78

Vaccination Strategy II: Worst Case (Adversary Infects Two)

Two Strategies for Adversary

Adversary Strategy IIa Adversary Strategy IIb

Page 79: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

79

Vaccination Strategy II Adversary Strategy IIa

Page 80: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

80

Vaccination Strategy II Adversary Strategy IIb

Page 81: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

81

Conclusions about Strategies I and II

If you can only vaccinate two individuals:

Vaccination Strategy II never leads to more than two infected individuals, while Vaccination Strategy I sometimes leads to three infected individuals (depending upon strategy used by adversary).

Thus, Vaccination Strategy II is better.

Page 82: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

82

k-Conversion Setsk-conversion sets are complex.

Consider the graph K4 x K2.

Page 83: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

83

k-Conversion Sets II

Exercise: (a). The vertices a, b, c, d, e form a 2-conversion set.

(b). However, the vertices a,b,c,d,e,f do not.

Interpretation: Immunizing one more person can be worse! (Planting a disease with one more person can be worse if you want to infect everyone.)

Note: the same does not hold true for irreversible k-conversion sets.

Page 84: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

84

NP-CompletenessProblem: Given a positive integer d and a graph G, does G have a k-conversion set of size at most d?

Theorem (Dreyer 2000): This problem is NP-complete for fixed k > 2.

(Whether or not it is NP-complete for k = 2 remains open.)

Same conclusions for irreversible k-conversion set.

Page 85: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

85

k-Conversion Sets in Regular GraphsG is r-regular if every vertex has degree r.

Theorem (Dreyer 2000): Let G = (V,E) be a connected r-regular graph and D be a set of vertices.

(a). D is an irreversible r-conversion set iff V-D is an independent set.

(b). D is an r-conversion set iff V-D is an independent set and D is not an independent set.

Page 86: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

86

k-Conversion Sets in Regular Graphs II

Corollary (Dreyer 2000): (a). The size of the smallest irreversible 2- conversion set in Cn is ceiling[n/2].

(b). The size of the smallest 2-conversion set in Cn is ceiling[(n+1)/2].

ceiling[x] = smallest integer at least as big as x.

This result agrees with our observation.

Page 87: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

87

k-Conversion Sets in Regular Graphs III

Proof: (a). Cn is 2-regular. The largest independent set has size floor[n/2], where floor[x] = largest integer no bigger than x. Thus, the smallest D so that V-D is independent has size ceiling[n/2]. (b). If n is odd, taking the first, third, …, nth vertices around the cycle gives a set that is not independent and whose complement is independent. If n is even, every vertex set of size n/2 with an independent complement is itself independent, so an additional vertex is needed.

Page 88: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

88

k-Conversion Sets in TreesThe simplest case is when every internal vertex of the tree has degree > k.Leaf = vertex of degree 1; internal vertex = not a leaf.

Can you guess a 2-conversion set here?

Page 89: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

89

k-Conversion Sets in TreesCan you guess a 2-conversion set here?

All the leaves have to be in it. This will suffice.

Page 90: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

90

Page 91: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

91

Page 92: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

92

k-Conversion Sets in Trees

Theorem (Dreyer 2000): Let T be a tree and every internal vertex have degree > k, where k > 1. Then the smallest k-conversion set and the smallest irreversible conversion set have size equal to the number of leaves of the tree.

Page 93: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

93

k-Conversion Sets in Grids

Let G(m,n) be the rectangular grid graph with m rows and n columns.

G(3,4)

Page 94: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

94

Toroidal GridsThe toroidal grid T(m,n) is obtained from the rectangular grid G(m,n) by adding edges from the first vertex in each row to the last and from the first vertex in each column to the last.

Toroidal grids are easier to deal with than rectangular grids because they form regular graphs: Every vertex has degree 4. Thus, we can make use of the results about regular graphs.

Page 95: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

95

T(3,4)

Page 96: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

96

4-Conversion Sets in Toroidal Grids

Theorem (Dreyer 2000): In a toroidal grid T(m,n)

(a). The size of the smallest 4-conversion set is

max{n(ceiling[m/2]), m(ceiling[n/2])} m or n odd

mn/2 + 1 m, n even

(b). The size of the smallest irreversible 4-conversion set is as above when m or n is odd, and it is mn/2 when m and n are even.

{

Page 97: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

97

Part of the Proof: Recall that D is an irreversible 4-conversion set in a 4-regular graph iff V-D is independent.

V-D independent means that every edge {u,v} in G has u or v in D. In particular, the ith row must contain at least ceiling[n/2] vertices in D and the ith column at least ceiling[m/2] vertices in D (alternating starting with the end vertex of the row or column).

We must cover all rows and all columns, and so need at least max{n(ceiling[m/2]), m(ceiling[n/2])} vertices in an irreversible 4-conversion set.

Page 98: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

98

4-Conversion Sets for Rectangular Grids

More complicated methods give:

Theorem (Dreyer 2000): The size of the smallest 4-conversion set and smallest irreversible 4-conversion set in a grid graph G(m,n) is

2m + 2n - 4 + floor[(m-2)(n-2)/2]

Page 99: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

99

4-Conversion Sets for Rectangular Grids

Consider G(3,3):

2m + 2n - 4 + floor[(m-2)(n-2)/2] = 8.

What is a smallest 4-conversion set and why 8?

Page 100: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

100

4-Conversion Sets for Rectangular GridsConsider G(3,3):

2m + 2n - 4 + floor[(m-2)(n-2)/2] = 8.

What is a smallest 4-conversion set and why 8?

All boundary vertices have degree < 4 and so must be included in any 4-conversion set. They give a conversion set.

Page 101: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

101

More Realistic Models

Many oversimplifications. For instance:

•What if you stay infected only a certain number of days?

•What if you are not necessarily infective for the first few days you are sick?

•What if your threshold k for changes from 0 to 1 changes depending upon how long you have been uninfected?

Page 102: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

102

Alternative Models to Explore

Consider an irreversible process in which you stay in the infected state (state 1) for d time periods after entering it and then go back to the uninfected state (state 0).

Consider a k-threshold process in which we vaccinate a person in state 0 once k-1 neighbors are infected (in state 1).

Etc. -- let your imagination roam free ...

Page 103: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

103

More Realistic ModelsOur models are deterministic. How do probabilities enter?

•What if you only get infected with a certain probability if you meet an infected person?

•What if vaccines only work with a certain probability?

•What if the amount of time you remain infective exhibits a probability distribution?

Page 104: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

104

Alternative Model to Explore

Consider an irreversible 1-threshold process in which you stay infected for d time periods and then enter the uninfected state.

Assume that you get infected with probability p if at least one of your neighbors is infected.

What is the probability that an epidemic will end with no one infected?

Page 105: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

105

The Case d = 2, p = 1/2

Consider the following initial state:

Page 106: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

106

The Case d = 2, p = 1/2

With probability 1/2, vertex a does not get infected at time 1.

Similarly for vertex b.

Thus, with probability 1/4, we stay in the same states at time 1.

Page 107: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

107

The Case d = 2, p = 1/2Suppose vertices are still in same states at time 1 as they were at time 0. With probability 1/2, vertex a does not get infected at time 2.

Similarly for vertex b.

Also after time 1, vertices c and d have been infected for two time periods and thus enter the uninfected state.

Thus, with probability 1/4, we get to the following state at time 2:

Page 108: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

108

Page 109: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

109

The Case d = 2, p = 1/2

Thus, with probability 1/4 x 1/4 = 1/16, we enter this state with no one infected at time 2.

However, we might enter this state at a later time.

It is not hard to show (using the theory of finite Markov chains) that we will end in state (0,0,0,0). (This is the only absorbing state in an absorbing Markov chain.). Thus: with probability 1 we will eventually kill the disease off entirely.

Page 110: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

110

The Case d = 2, p = 1/2

Is this realistic? What might we do to modify the model to make it more realistic?

Page 111: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

111

How do we Analyze this or More Complex Models for Graphs?

Computer simulation is an important tool.

Example: At the Johns Hopkins University and the Brookings Institution, Donald Burke and Joshua Epstein have developed a simple model for a region with two towns totalling 800 people. It involves a few more probabilistic assumptions than ours. They use single simulations as a learning device. They also run large numbers of simulations and look at averages of outcomes.

Page 112: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

112

How do we Analyze this or More Complex Models for Graphs?

Burke and Epstein are using the model to do “what if” experiments:

What if we adopt a particular vaccination strategy?

What happens if we try different plans for quarantining infectious individuals?

There is much more analysis of a similar nature that can be done with graph-theoretical models.

Page 113: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

113

Would Graph Theory help with a deliberate outbreak of Anthrax?

Page 114: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

114

What about a deliberate release of smallpox?

Page 115: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

115

Similar approaches, using mathematical models based in DM/TCS, have proven useful in many other fields, to:

•make policy

•plan operations

•analyze risk

•compare interventions

•identify the cause of observed events

Page 116: 1 Challenges for Discrete Mathematics and Theoretical Computer Science in Homeland Security

116

Why shouldn’t these approaches work in the defense against bioterrorism?