SEEM: A simulation platform for modeling of infectious disease spreading

Size: px
Start display at page:

Download "SEEM: A simulation platform for modeling of infectious disease spreading"

Transcription

1 , pp SEEM: A simulation platform for modeling of infectious disease spreading Thai Quang Tung, Youngmahn Han, Insung Ahn Biomedical Prediction Lab, Biomedical HPC Technology Research Center, HPC-enabled Convergence Technology Research Division, Korea Institute of Science and Technology Information 245, Daehak-ro, Yuseong-gu, Daejeon, KOREA {tqtung, han, isahn}@kisti.re.kr Corresponding Author: isahn@kisti.re.kr Abstract. The Simulation Engine for Epidemiological Models (SEEM) is a compact computational software package for modeling of infectious disease spreading. Using SEEM's application programing interface (API), developers can construct compartmental models and proceed numerical simulation to study model dynamics. The system also provides a model definition language for which models can be described and stored in a highly readable plain text format. The file can later be parsed using SEEM's APIs or it can be feed to a command line application, included in the package, for simulation. SEEM system is a software platform whereupon advanced applications can be developed to support intricate features such as visual model editing, result visualization, and system dynamics analysis. Keywords: Simulation, Infectious disease, Epidemiological modeling, Compartmental model 1 Introduction The primary goal of studying infectious diseases is to improve control and reduce the infection in the population [1]. However, evaluating the efficacy of control strategies through controlled experiments is practically infeasible and unethical. Mathematical modeling provides a powerful tool for conducting such experiments. Thanks to the advent of computer, complex models that take into account the heterogeneous nature of diseases and population now can be constructed and studied with simulation and dynamics analysis software. These models can hold dozens to hundreds of equations which is exceedingly difficult to comprehend analytically. Computer simulation has now played an important role in the study of infectious disease spreading. Abundance of simulation software tools has been developed to aid the construction of models and analysis. Majority of tools usually are tailored for only a single specialized model, for example InfluSim[2], GLEAMViz[3], AsiaCap[4], FluTE[5]. In general, underlying structure of the model is encoded in the software itself whereas model ISSN: ASTL Copyright 2015 SERSC

2 parameters are adjustable through graphical user interface (GUI) widgets or command line/text based inputs. Thus, it is difficult to extend the model for difference diseases or populations with different heterogeneity structures. Other types of simulation software available in the forms of library packages working in designate computational platforms such as Matlab, R, Scientific computing Python. These packages might not be specialized for epidemiological modeling study. Instead, they are useful for any other research areas that use mathematical models. Their intended users are researchers who build models to study their interested problems. In this project, we develop a computational software package for epidemiological modeling with following features. The software provides a set of APIs for model construction/ modification, simulation and simple dynamic analysis such as batch simulation, parameter scanning. Beside, we also provide a command line tool for simple simulation whose input model can be written in text file using a highly readable language for model definition. The package can be a powerful platform-independent integration back-end for developing of simulation/visualization tools or server-side deployed application for dynamics analysis such as parameter optimization, sensitivity/uncertainty analysis. 2 Compartmental models Infectious disease spreading can be modeled with several methods. The most common approach is to divide under-study population into compartments then use differential equations to describe the dynamic transmission between compartments. Models constructed in this way are so named compartmental models. The other approaches are stochastic modelling and agent-based modelling. SEEM is restricted to only supporting compartmental models. The following text will give a brief introduction to the classical SIR model. This model has been modified, extended to adapt to difference types of diseases or disease control strategies One of the questions that attracted the attention of scientist was why disease would suddenly develop in a community and then disappear just as suddenly without infecting the entire community. Kermack and McKendrick[9] formulated a model that predict just such behaviour. The population understudy is divided into compartments, namely a susceptible class S, an infective class I, and a removal class R. Individuals in S have no immunity to the disease, so they might become infective if exposed to individuals in I, who are carrying the disease pathogen. Individuals in R are immunized to the disease and consequently do not affect the transmission dynamics in any way when they contact other individuals. Individuals in S move to I once they are become infective. Individuals in I move to R once they are recovered or died. These movements can be described using mathematical equations. The formulation is valid under the condition that following assumptions are justified: 1. On average, an infective individual makes contact sufficient to transmit infection with others per time unit, where N represents the population size. 2. A fraction of infected individuals leave the I class per unit time Copyright 2015 SERSC 7

3 3. There is no entry into or departure from the population, e.g. the population size N is not changed. Here, α and β are disease recovery rate and transmission rate, respectively. Let S(t), I(t) and R(t) be the time variant sizes of compartments. The disease transmission model can be formulated with these equations: Since is a constant, the last equation can be omitted from the model. The formalized system was successfully fitted to data from many epidemics, and it is easily analyze qualitatively. The analysis has been described in many referees, including [1]. 3 SEEM system components The system consists of two main modules, a model parser and a numerical solver for ordinary differential equation. 3.1 Model parser A convenient approach for simulation of epidemiological model is to hard-code model content in software data structures. Its implementation is thus much simpler and it leaves room for model authors to inject intricate parts of their model into the software. In SEEM, we choose not to limit users to a single designated model, instead, we provide a simple language for users to express their own models. Input models for simulation can be written in plain text files using SEEM's model definition language. Our software then parses the model content to convert it to internal data structures for simulation. The essence of the language is best understood through examining the example shown on Fig. 1. In order to parse models written in SEEM model definition language, we used context-free grammar to define the language then utilize flex and bison[10] to generate the model parser. Flex, a lexical analyzer, takes model as input text then tokenizes it into tokens. The bison tool will generate C source code for the parser from the grammar defined on the generated tokens. Once model is successfully parsed, its content is converted into programing data structures, being ready for simulation. 8 Copyright 2015 SERSC

4 3.2 ODEs solver A compartmental model is a set of ODEs whose time dependent variables are compartment sizes. Given an initial condition that defines the compartment sizes at the beginning of epidemic, in general, we would want to solver the ODEs in order to study its dynamics. However, majority of ODEs does not have analytical solution, it is sufficient to use numerical approximation of exact solution for practical applications. Approximated solution can be estimated via several methods of numerical integration. Computational software that implements the methods is so called ODEs solver. In SEEM, we integrated CVODE library from SUNDIALS[10], a highly efficient solver for stiff and non-stiff ordinary differential equations. 4 Model creation and simulation with SEEM The main part of SEEM is a core C++ library with a set of APIs for mode construction/ modification, model parsing, and simulation. The library can serve as a platformindependent integration for developing intricate simulation applications that include advanced features such as providing graphical user interface for model editing, manage simulation and dynamics analysis project, data visualization of simulation results. In Fig. 2, we introduce two sample code snips for model creation (left) and simulation (right). Beside the core library, SEEM includes a simple command line tool for simulation. In order to simulate a model, users have to write the model in a plain text file using the above mentioned language. The software includes a library of text-book compartmental model such as SIR and its few variations. Simulation results are output to con- Copyright 2015 SERSC 9

5 sole standard output with configurable formats including plain text, json and xml, for visualization or further data analysis. 5 Conclusions and future work This short paper goes over an ongoing project of developing a computational platform for epidemiological modeling. We explained core components of our prototype implementation and introduced a few basic features of the system. Our supporting APIs can help developers to implement various types of applications in order to aid the process of epidemiological modeling. The efficient ODEs solver used in our project promises to improve simulation performance on complex models with large numbers of mathematical equations and parameters, which make it suitable for integration into server side applications that handles extremely demanding tasks of model dynamics analysis. The model definition language introduced in our system provides users with a common standard for model construction and sharing. The command line tool included in the package can provide some basic features that may be sufficient for user that only need simple simulation and analysis. The ultimate goal of our project is to build a completed solution for supporting the research and application of infectious disease spreading using mathematical modeling. The solution may include GUI / web-based applications where scientists can construct, edit and share their models. Simulation and simple dynamical analysis can be followed with the supports of spatial and temporal data visualization. Resource demanding computational tasks, such as parameter optimization, uncertainty/ sensitivity analysis, are shifted to server side applications deployed on HPC-enabled system. The accomplishment of prototype system introduced in this paper is laying a promising foundation for our works in the future. References 1. Keeling, M. J.&Rohani, P.: Modeling Infectious Diseases in Humans and Animals Princeton Univ. Press (2008) 2. Eichner M, Schwehm M, Duerr HP, Brockmann SO: The influenza pandemic preparedness planning tool InfluSim. BMC Inf Dis, 7:17 (2007) 3. Van den Broeck W, Gioannini C, Goncalves B, Quaggiotto M, Colizza V, Vespignani A: The GLEAMviz computational tool, a publicly available software to explore realistic epidemic spreading scenarios at the global scale. BMC Infect Dis, 11:37 (2011) 4. M.L. Stein, J.W. Rudge, R. Coker, C. van der Weijden, R. Krumkamp, P. Hanvoravongchai, I. Chavez, W. Putthasri, B. Phommasack, W. Adisasmito, S. Touch, M. Sat le, Y.C. Hsu, M. Kretzschmar, A. Timen: Development of a resource modelling tool to support decision makers in pandemic influenza preparedness: the AsiaFluCap Simulator, BMC Public Health, 12, p. 870 (2012) 10 Copyright 2015 SERSC

6 5. D.L. Chao, M.E. Halloran, V.J. Obenchain, I.M. Longini Jr.: FluTE, a publicly available stochastic influenza epidemic simulation model, PLoS Comput. Biol., 6, p. e (2010) 6. Anylogic Company: Anylogic: Multimethod simulation software, 7. Rockwell Automation: Areana simulation software 8. Imagine That Inc.: ExtendSim simulation software, 9. Kermack, W. O. and McKendrick, A. G. "A Contribution to the Mathematical Theory of Epidemics." Proc. Roy. Soc. Lond. A 115, (1927) 10. Levine, John.: flex & bison. O'Reilly Media. ISBN (2008) 11. A. C. Hindmarsh, P. N. Brown, K. E. Grant, S. L. Lee, R. Serban, D. E. Shumaker, and C. S. Woodward: "SUNDIALS: Suite of Nonlinear and Differential/Algebraic Equation Solvers," ACM Transactions on Mathematical Software, 31(3), pp (2005) Copyright 2015 SERSC 11

PharmaSUG China. Compartmental Models in SAS: Application to Model Epidemics Ka Chun Chong and Benny Chung-Ying Zee

PharmaSUG China. Compartmental Models in SAS: Application to Model Epidemics Ka Chun Chong and Benny Chung-Ying Zee PharmaSUG China Compartmental Models in SAS: Application to Model Epidemics Ka Chun Chong and Benny Chung-Ying Zee Clinical for Clinical Research and Biostatistics, JC School of Public Health and Primary

More information

Modeling of Complex Social. MATH 800 Fall 2011

Modeling of Complex Social. MATH 800 Fall 2011 Modeling of Complex Social Systems MATH 800 Fall 2011 Complex SocialSystems A systemis a set of elements and relationships A complex system is a system whose behavior cannot be easily or intuitively predicted

More information

The coupling effect on VRTP of SIR epidemics in Scale- Free Networks

The coupling effect on VRTP of SIR epidemics in Scale- Free Networks The coupling effect on VRTP of SIR epidemics in Scale- Free Networks Kiseong Kim iames@kaist.ac.kr Sangyeon Lee lsy5518@kaist.ac.kr Kwang-Hyung Lee* khlee@kaist.ac.kr Doheon Lee* dhlee@kaist.ac.kr ABSTRACT

More information

Guide- Using GLEAMviz

Guide- Using GLEAMviz Guide- Using GLEAMviz Introduction At first glance, the GLEAMviz program may seem a bit daunting for the first-time user. This guide is meant to help you through the process of installation and set-up

More information

L Modeling and Simulating Social Systems with MATLAB

L Modeling and Simulating Social Systems with MATLAB 851-0585-04L Modeling and Simulating Social Systems with MATLAB Lecture 4 Cellular Automata Karsten Donnay and Stefano Balietti Chair of Sociology, in particular of Modeling and Simulation ETH Zürich 2011-03-14

More information

Modeling and Simulating Social Systems with MATLAB

Modeling and Simulating Social Systems with MATLAB Modeling and Simulating Social Systems with MATLAB Lecture 4 Cellular Automata Olivia Woolley, Tobias Kuhn, Dario Biasini, Dirk Helbing Chair of Sociology, in particular of Modeling and Simulation ETH

More information

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm 1 Introduction How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, 2015 5:00 pm In this assignment you will investigate the spread of disease on networks. In class

More information

GLEAMviz.org. The Global Epidemic and Mobility Model. GLEAMviz SIMULATOR CLIENT MANUAL. Version 6.6

GLEAMviz.org. The Global Epidemic and Mobility Model. GLEAMviz SIMULATOR CLIENT MANUAL. Version 6.6 GLEAMviz.org The Global Epidemic and Mobility Model GLEAMviz SIMULATOR CLIENT MANUAL Version 6.6 CONTENTS 01 02 03 04 INTRODUCTION 5 1.1 Release notes 7 1.2 License 7 1.3 Conditions of use 8 1.4 Client

More information

GLEAMviz.org. The Global Epidemic and Mobility Model. GLEAMviz SIMULATOR CLIENT MANUAL. Version 6.0

GLEAMviz.org. The Global Epidemic and Mobility Model. GLEAMviz SIMULATOR CLIENT MANUAL. Version 6.0 GLEAMviz.org The Global Epidemic and Mobility Model GLEAMviz SIMULATOR CLIENT MANUAL Version 6.0 CONTENTS 01 02 03 INTRODUCTION 5 1.1 Release notes 7 1.2 License 7 1.3 Conditions of use 8 1.4 Client installation

More information

Curve fitting. Lab. Formulation. Truncation Error Round-off. Measurement. Good data. Not as good data. Least squares polynomials.

Curve fitting. Lab. Formulation. Truncation Error Round-off. Measurement. Good data. Not as good data. Least squares polynomials. Formulating models We can use information from data to formulate mathematical models These models rely on assumptions about the data or data not collected Different assumptions will lead to different models.

More information

A Database Supported Modeling Environment for Pandemic Planning and Course of Action Analysis

A Database Supported Modeling Environment for Pandemic Planning and Course of Action Analysis A Database Supported Modeling Environment for Pandemic Planning and Course of Action Analysis Yifei Ma Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in

More information

System dynamic (SD) modeling. Lisa Brouwers

System dynamic (SD) modeling. Lisa Brouwers System dynamic (SD) modeling Lisa Brouwers Agenda Modelling and simulation Different type of models System dynamics SIR in Vensim Verification and validation Modelling process (steps in a simulation project)

More information

AGENT-BASED MODELING BOOTCAMP FOR HEALTH RESEARCHERS AUGUST 2012 A SIMPLE NETWORK-BASED INFECTION SPREAD AGENT-BASED MODEL

AGENT-BASED MODELING BOOTCAMP FOR HEALTH RESEARCHERS AUGUST 2012 A SIMPLE NETWORK-BASED INFECTION SPREAD AGENT-BASED MODEL Rating: Basic Prerequisites: Building a Minimalist Network-Based Model Framework Estimated Time Required: 1 hour This exercise rehearses basic steps that can be used to create a model of infection spread..

More information

NOTES2: Networks-of-Traces for Epidemic Spread Simulations

NOTES2: Networks-of-Traces for Epidemic Spread Simulations Georgia State University ScholarWorks @ Georgia State University Public Health Faculty Publications School of Public Health 2015 NOTES2: Networks-of-Traces for Epidemic Spread Simulations Sicong Liu Arizona

More information

Epidemic spreading on networks

Epidemic spreading on networks Epidemic spreading on networks Due date: Sunday October 25th, 2015, at 23:59. Always show all the steps which you made to arrive at your solution. Make sure you answer all parts of each question. Always

More information

Automating scientific and engineering computing

Automating scientific and engineering computing Automating scientific and engineering computing Elisha Sacks* Computer Science Department Princeton University Princeton, NJ 08544 Leo Joskowicz IBM T. J. Watson Research Center P.O. Box 704 Yorktown Heights,

More information

EXTENDING STEM TO WEB:

EXTENDING STEM TO WEB: EXTENDING STEM TO WEB: The Design and Development of a Web Extension to STEM Estuar, Ma. Regina Sabido, Jay Delfin Lara, Raymond Joseff Medina, Peter Paul Espina, Kennedy OUTLINE Background Context What

More information

2D & 3D Finite Element Method Packages of CEMTool for Engineering PDE Problems

2D & 3D Finite Element Method Packages of CEMTool for Engineering PDE Problems 2D & 3D Finite Element Method Packages of CEMTool for Engineering PDE Problems Choon Ki Ahn, Jung Hun Park, and Wook Hyun Kwon 1 Abstract CEMTool is a command style design and analyzing package for scientific

More information

Failure in Complex Social Networks

Failure in Complex Social Networks Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon

More information

Sensitivity Analysis. Nathaniel Osgood. NCSU/UNC Agent-Based Modeling Bootcamp August 4-8, 2014

Sensitivity Analysis. Nathaniel Osgood. NCSU/UNC Agent-Based Modeling Bootcamp August 4-8, 2014 Sensitivity Analysis Nathaniel Osgood NCSU/UNC Agent-Based Modeling Bootcamp August 4-8, 2014 Types of Sensitivity Analyses Variables involved One-way Multi-way Type of component being varied Parameter

More information

Tools for Remote Web Usability Evaluation

Tools for Remote Web Usability Evaluation Tools for Remote Web Usability Evaluation Fabio Paternò ISTI-CNR Via G.Moruzzi, 1 56100 Pisa - Italy f.paterno@cnuce.cnr.it Abstract The dissemination of Web applications is enormous and still growing.

More information

A Design of Building Group Management Service Framework for On-Going Commissioning

A Design of Building Group Management Service Framework for On-Going Commissioning , pp.84-88 http://dx.doi.org/10.14257/astl.2014.49.18 A Design of Building Group Management Service Framework for On-Going Commissioning Taehyung Kim 1, Youn Kwae Jeong 1 and Il Woo Lee 1, 1 Electronics

More information

Multi-Criterion Optimal Design of Building Simulation Model using Chaos Particle Swarm Optimization

Multi-Criterion Optimal Design of Building Simulation Model using Chaos Particle Swarm Optimization , pp.21-25 http://dx.doi.org/10.14257/astl.2014.69.06 Multi-Criterion Optimal Design of Building Simulation Model using Chaos Particle Swarm Optimization Young-Jin, Kim 1,*, Hyun-Su Kim 1 1 Division of

More information

A Project of System Level Requirement Specification Test Cases Generation

A Project of System Level Requirement Specification Test Cases Generation A Project of System Level Requirement Specification Test Cases Generation Submitted to Dr. Jane Pavelich Dr. Jeffrey Joyce by Cai, Kelvin (47663000) for the course of EECE 496 on August 8, 2003 Abstract

More information

Freeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks

Freeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks , pp.187-191 http://dx.doi.org/10.14257/astl.2014.63.41 Freeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks Hyeon-Jin Jeong 1, Seung-Sik Choi 1 1 Computer Engineering Department,

More information

Math 3820 Project. 1 Typeset or handwritten? Guidelines

Math 3820 Project. 1 Typeset or handwritten? Guidelines Math 3820 Project Guidelines Abstract These are some recommendations concerning the projects in Math 3820. 1 Typeset or handwritten? Although handwritten reports will be accepted, I strongly recommended

More information

Lightweight caching strategy for wireless content delivery networks

Lightweight caching strategy for wireless content delivery networks Lightweight caching strategy for wireless content delivery networks Jihoon Sung 1, June-Koo Kevin Rhee 1, and Sangsu Jung 2a) 1 Department of Electrical Engineering, KAIST 291 Daehak-ro, Yuseong-gu, Daejeon,

More information

Modeling with Uncertainty Interval Computations Using Fuzzy Sets

Modeling with Uncertainty Interval Computations Using Fuzzy Sets Modeling with Uncertainty Interval Computations Using Fuzzy Sets J. Honda, R. Tankelevich Department of Mathematical and Computer Sciences, Colorado School of Mines, Golden, CO, U.S.A. Abstract A new method

More information

A Personal Information Retrieval System in a Web Environment

A Personal Information Retrieval System in a Web Environment Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents 2015), pp.42-46 http://dx.doi.org/10.14257/astl.2015.87.10 A Personal Information Retrieval System in a Web Environment YoungDeok

More information

Design of Ontology Engine Architecture for L-V-C Integrating System

Design of Ontology Engine Architecture for L-V-C Integrating System , pp.225-230 http://dx.doi.org/10.14257/astl.2016.139.48 Design of Ontology Engine Architecture for L-V-C Integrating System Gap-Jun Son 1, Yun-Hee Son 2 and Kyu-Chul Lee * 1,2,* Department of Computer

More information

Programming Lecture 3

Programming Lecture 3 Programming Lecture 3 Expressions (Chapter 3) Primitive types Aside: Context Free Grammars Constants, variables Identifiers Variable declarations Arithmetic expressions Operator precedence Assignment statements

More information

Language Processing note 12 CS

Language Processing note 12 CS CS2 Language Processing note 12 Automatic generation of parsers In this note we describe how one may automatically generate a parse table from a given grammar (assuming the grammar is LL(1)). This and

More information

Temporal Networks. Hiroki Sayama

Temporal Networks. Hiroki Sayama Temporal Networks Hiroki Sayama sayama@binghamton.edu Temporal networks Networks whose topologies and activities change over time Heavily data-driven research E.g. human contacts (email, social media,

More information

Big Data Service Combination for Efficient Energy Data Analytics

Big Data Service Combination for Efficient Energy Data Analytics , pp.455-459 http://dx.doi.org/10.14257/astl.2016.139.90 Big Data Service Combination for Efficient Energy Data Analytics Tai-Yeon Ku, Wan-ki Park, Il-Woo Lee Energy IT Technology Research Section Hyper-connected

More information

Software Quality. Richard Harris

Software Quality. Richard Harris Software Quality Richard Harris Part 1 Software Quality 143.465 Software Quality 2 Presentation Outline Defining Software Quality Improving source code quality More on reliability Software testing Software

More information

Cloud Computing: "network access to shared pool of configurable computing resources"

Cloud Computing: network access to shared pool of configurable computing resources Large-Scale Networks Gossip-based Protocols Consistency for Large-Scale Data Replication Uwe Roehm / Vincent Gramoli School of Information Technologies The University of Sydney Page 1 Cloud Computing:

More information

Math 408R: UT Fall 2016

Math 408R: UT Fall 2016 Mini-Project 2: SIR using Matlab, Due October 7 In this assignment, you will be asked to run, modify, discuss, and print output from the SIREulers program you have on Matlab (which may be found on our

More information

A recursive point process model for infectious diseases.

A recursive point process model for infectious diseases. A recursive point process model for infectious diseases. Frederic Paik Schoenberg, UCLA Statistics Collaborators: Marc Hoffmann, Ryan Harrigan. Also thanks to: Project Tycho, CDC, and WHO datasets. 1 1.

More information

2009 Winton. Simulation Models

2009 Winton. Simulation Models 1 Verification and Validation of Simulation Models 2 Verification and Validation For simulation modeling verification and validation goes a step beyond the kind of testing done for ordinary software systems

More information

SISMID Module 11 Lab 1: EpiFire Tutorial

SISMID Module 11 Lab 1: EpiFire Tutorial SISMID Module 11 Lab 1: EpiFire Tutorial Thomas J. Hladish and Joel C. Miller July 2018 1 What s EpiFire? 1 EpiFire is an open source program for simulating epidemics on contact networks. You can either

More information

REQUIREMENTS ON WORM MITIGATION TECHNOLOGIES IN MANETS

REQUIREMENTS ON WORM MITIGATION TECHNOLOGIES IN MANETS REQUIREMENTS ON WORM MITIGATION TECHNOLOGIES IN MANETS Robert G. Cole and Nam Phamdo JHU Applied Physics Laboratory {robert.cole,nam.phamdo}@jhuapl.edu Moheeb A. Rajab and Andreas Terzis Johns Hopkins

More information

Models and Algorithms for Network Immunization

Models and Algorithms for Network Immunization Models and Algorithms for Network Immunization George Giakkoupis University of Toronto Aristides Gionis, Evimaria Terzi and Panayiotis Tsaparas University of Helsinki Abstract Recently, there has been

More information

A Graph-based Interpretation for Finding Solution Strategies of Contradiction Problems in the Butterfly Diagram

A Graph-based Interpretation for Finding Solution Strategies of Contradiction Problems in the Butterfly Diagram , pp.220-224 http://dx.doi.org/10.14257/astl.2016.139.47 A Graph-based Interpretation for Finding Solution Strategies of Contradiction Problems in the Butterfly Diagram Jung Suk Hyun 1 and Chan Jung Park

More information

Engineering 1000 Chapter 6: Abstraction and Modeling

Engineering 1000 Chapter 6: Abstraction and Modeling Engineering 1000 Chapter 6: Abstraction and Modeling Outline Why is abstraction useful? What are models? how are models different from theory and simulation? Examples from microelectronics Types of model

More information

Module 4. Computer-Aided Design (CAD) systems

Module 4. Computer-Aided Design (CAD) systems Module 4. Computer-Aided Design (CAD) systems Nowadays the design of complex systems is unconceivable without computers. The fast computers, the sophisticated developing environments and the well elaborated

More information

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Zhuozhao Li and Haiying Shen Dept. of Electrical and Computer Engineering Clemson University, SC, USA Kang Chen

More information

Fuzzy Mod. Department of Electrical Engineering and Computer Science University of California, Berkeley, CA Generalized Neural Networks

Fuzzy Mod. Department of Electrical Engineering and Computer Science University of California, Berkeley, CA Generalized Neural Networks From: AAAI-91 Proceedings. Copyright 1991, AAAI (www.aaai.org). All rights reserved. Fuzzy Mod Department of Electrical Engineering and Computer Science University of California, Berkeley, CA 94 720 1

More information

Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility

Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility Mayukh Nilay Khan May 13, 2010 Abstract Inspired by empirical studies researchers have tried to model various

More information

Supporting Collaborative 3D Editing over Cloud Storage

Supporting Collaborative 3D Editing over Cloud Storage , pp.33-37 http://dx.doi.org/10.14257/astl.2015.107.09 Supporting Collaborative 3D Editing over Cloud Storage Yeoun-Ui Ha 1, Jae-Hwan Jin 2, Myung-Joon Lee 3 Department of Electrical/Electronic and Computer

More information

Question Marks 1 /11 2 /4 3 /13 4 /5 5 /11 6 /14 7 /32 8 /6 9 /11 10 /10 Total /117

Question Marks 1 /11 2 /4 3 /13 4 /5 5 /11 6 /14 7 /32 8 /6 9 /11 10 /10 Total /117 CSC 326, Midterm November 3, 2005 Name: Student ID: Signature: You have 75 minutes to write the 10 questions on this examination. A total of 117 marks is available. Justify all of your answers You may

More information

Routing Performance Analysis in Delay Tolerant Networks

Routing Performance Analysis in Delay Tolerant Networks Routing Performance Analysis in Delay Tolerant Networks Presenter: Hao Liang Main References: [1] G. Resta and P. Santi, A framework for routing performance analysis in delay tolerant networks with application

More information

Information Technology Department, PCCOE-Pimpri Chinchwad, College of Engineering, Pune, Maharashtra, India 2

Information Technology Department, PCCOE-Pimpri Chinchwad, College of Engineering, Pune, Maharashtra, India 2 Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Adaptive Huffman

More information

On the parallelization of network diffusion models

On the parallelization of network diffusion models University of Iowa Iowa Research Online Theses and Dissertations Summer 2017 On the parallelization of network diffusion models Patrick Rhomberg University of Iowa Copyright 2017 Patrick Rhomberg This

More information

The Cantor Handbook. Alexander Rieder

The Cantor Handbook. Alexander Rieder Alexander Rieder 2 Contents 1 Introduction 5 2 Using Cantor 6 2.1 Cantor features....................................... 6 2.2 The Cantor backends.................................... 7 2.3 The Cantor Workspace...................................

More information

Vasileios Vlachos, Eirini Kalliamvakou and Diomidis Spinellis Athens University of Economics and Business. 11th Panhellenic Conference on Informatics

Vasileios Vlachos, Eirini Kalliamvakou and Diomidis Spinellis Athens University of Economics and Business. 11th Panhellenic Conference on Informatics Simulating Bandwidth-Limited Worms, One Graph to Rule Them All? Vasileios Vlachos, Eirini Kalliamvakou and Diomidis Spinellis Athens University of Economics and Business Rapid Malcode Is rapid malcode

More information

The Coral Project: Defending against Large-scale Attacks on the Internet. Chenxi Wang

The Coral Project: Defending against Large-scale Attacks on the Internet. Chenxi Wang 1 The Coral Project: Defending against Large-scale Attacks on the Internet Chenxi Wang chenxi@cmu.edu http://www.ece.cmu.edu/coral.html The Motivation 2 Computer viruses and worms are a prevalent threat

More information

Estimating HIV transmission rates with rcolgem

Estimating HIV transmission rates with rcolgem Estimating HIV transmission rates with rcolgem Erik M Volz August 6, 014 This vignette will demonstrate how to use structured coalescent models[1] to estimate epidemiological parameters given a pathogen

More information

Design and Implementation of 5 Stages Pipelined Architecture in 32 Bit RISC Processor

Design and Implementation of 5 Stages Pipelined Architecture in 32 Bit RISC Processor Design and Implementation of 5 Stages Pipelined Architecture in 32 Bit RISC Processor Abstract The proposed work is the design of a 32 bit RISC (Reduced Instruction Set Computer) processor. The design

More information

Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language

Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language Dong Han and Kilian Stoffel Information Management Institute, University of Neuchâtel Pierre-à-Mazel 7, CH-2000 Neuchâtel,

More information

Coupled PDEs with Initial Solution from Data in COMSOL 4

Coupled PDEs with Initial Solution from Data in COMSOL 4 Coupled PDEs with Initial Solution from Data in COMSOL 4 X. Huang, S. Khuvis, S. Askarian, M. K. Gobbert, and B. E. Peercy Department of Mathematics and Statistics, University of Maryland, Baltimore County

More information

Methods for Removing Links in A Network to Minimize the Spread of Infections

Methods for Removing Links in A Network to Minimize the Spread of Infections Methods for Removing Links in A Network to Minimize the Spread of Infections Apurba K. Nandi, Hugh R. Medal Industrial and Systems Engineering Mississippi State University PO Box 9542 Mississippi State,

More information

MEDILAB ADMINISTRATION: AN IMPLEMENTATION OF SECURE SYSTEM

MEDILAB ADMINISTRATION: AN IMPLEMENTATION OF SECURE SYSTEM MEDILAB ADMINISTRATION: AN IMPLEMENTATION OF SECURE SYSTEM Shamsher Singh Research Scholar (Department of Computer Science & Engineering), Lovely Professional University, Punjab, (India) ABSTRACT The concept

More information

arxiv: v2 [physics.soc-ph] 24 Dec 2018

arxiv: v2 [physics.soc-ph] 24 Dec 2018 Impact of origin-destination information in epidemic spreading Sergio Gómez,*, Alberto Fernández 2, Sandro Meloni 3,4, and Alex Arenas arxiv:804.0258v2 [physics.soc-ph] 24 Dec 208 Dept. Enginyeria Informàtica

More information

Search Costs vs. User Satisfaction on Mobile

Search Costs vs. User Satisfaction on Mobile Search Costs vs. User Satisfaction on Mobile Manisha Verma, Emine Yilmaz University College London mverma@cs.ucl.ac.uk, emine.yilmaz@ucl.ac.uk Abstract. Information seeking is an interactive process where

More information

A New Statistical Procedure for Validation of Simulation and Stochastic Models

A New Statistical Procedure for Validation of Simulation and Stochastic Models Syracuse University SURFACE Electrical Engineering and Computer Science L.C. Smith College of Engineering and Computer Science 11-18-2010 A New Statistical Procedure for Validation of Simulation and Stochastic

More information

PDF NUMERICAL METHODS TEMOTHY SOLUTIONS PRODUCT CATALOG

PDF NUMERICAL METHODS TEMOTHY SOLUTIONS PRODUCT CATALOG 18 January, 2018 PDF NUMERICAL METHODS TEMOTHY SOLUTIONS PRODUCT CATALOG Document Filetype: PDF 190.47 KB 0 PDF NUMERICAL METHODS TEMOTHY SOLUTIONS PRODUCT CATALOG The study of buckling loads, which often

More information

Using Artificial Neural Networks for Prediction Of Dynamic Human Motion

Using Artificial Neural Networks for Prediction Of Dynamic Human Motion ABSTRACT Using Artificial Neural Networks for Prediction Of Dynamic Human Motion Researchers in robotics and other human-related fields have been studying human motion behaviors to understand and mimic

More information

Continuous-time stochastic simulation of epidemics in R

Continuous-time stochastic simulation of epidemics in R Continuous-time stochastic simulation of epidemics in R Ben Bolker May 16, 2005 1 Introduction/basic code Using the Gillespie algorithm, which assumes that all the possible events that can occur (death

More information

A Virtual-Synchronized-File Based Privacy Protection System

A Virtual-Synchronized-File Based Privacy Protection System Vol.133 (Information Technology and Computer Science 2016), pp.29-33 http://dx.doi.org/10.14257/astl.2016. A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System

More information

Estimation of Unknown Parameters in Dynamic Models Using the Method of Simulated Moments (MSM)

Estimation of Unknown Parameters in Dynamic Models Using the Method of Simulated Moments (MSM) Estimation of Unknown Parameters in ynamic Models Using the Method of Simulated Moments (MSM) Abstract: We introduce the Method of Simulated Moments (MSM) for estimating unknown parameters in dynamic models.

More information

MATLAB Simulink Modeling and Simulation of Recurrent Neural Network for Solving Linear Programming Problems

MATLAB Simulink Modeling and Simulation of Recurrent Neural Network for Solving Linear Programming Problems International Conference on Mathematical Computer Engineering - ICMCE - 8 MALAB Simulink Modeling and Simulation of Recurrent Neural Network for Solving Linear Programming Problems Raja Das a a School

More information

Virtualized Testbed Development using Openstack

Virtualized Testbed Development using Openstack , pp.742-746 http://dx.doi.org/10.14257/astl.2015.120.147 Virtualized Testbed Development using Openstack Byeongok Kwak 1, Heeyoung Jung 1, 1 Electronics and Telecommunications Research Institute (ETRI),

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Scale-Free Networks Generation Properties Analysis Dynamic

More information

THE USE OF OPENCAVOK FINITE ELEMENT SOFTWARE IN UNDERGRADUATED COURSES OF MECHANICAL ENGINEERING

THE USE OF OPENCAVOK FINITE ELEMENT SOFTWARE IN UNDERGRADUATED COURSES OF MECHANICAL ENGINEERING THE USE OF OPENCAVOK FINITE ELEMENT SOFTWARE IN UNDERGRADUATED COURSES OF MECHANICAL ENGINEERING Pierre Lamary Roberto de Araújo Bezerra Ranon Bezerra Department of Mechanical Engineering, Federal University

More information

Architecture of the SMMD Media Service System

Architecture of the SMMD Media Service System 6th WSEAS International Conference on E-ACTIVITIES, Tenerife, Spain, December 14-16, 2007 172 Architecture of the SMMD Media Service System HyunSoon Shin, JaeKwan Yun, HaeRyong Lee, KwangRoh Park Digital

More information

Math Modeling in Java: An S-I Compartment Model

Math Modeling in Java: An S-I Compartment Model 1 Math Modeling in Java: An S-I Compartment Model Basic Concepts What is a compartment model? A compartment model is one in which a population is modeled by treating its members as if they are separated

More information

Algorithmic Problems in Epidemiology

Algorithmic Problems in Epidemiology Algorithmic Problems in Epidemiology Anil Vullikanti and Madhav Marathe Dept. of Computer Science and Virginia Bioinformatics Institute Virginia Tech Dynamics of epidemic How many infections? Questions

More information

Executive Summary for deliverable D6.1: Definition of the PFS services (requirements, initial design)

Executive Summary for deliverable D6.1: Definition of the PFS services (requirements, initial design) Electronic Health Records for Clinical Research Executive Summary for deliverable D6.1: Definition of the PFS services (requirements, initial design) Project acronym: EHR4CR Project full title: Electronic

More information

(F)lex & Bison/Yacc. Language Tools for C/C++ CS 550 Programming Languages. Alexander Gutierrez

(F)lex & Bison/Yacc. Language Tools for C/C++ CS 550 Programming Languages. Alexander Gutierrez (F)lex & Bison/Yacc Language Tools for C/C++ CS 550 Programming Languages Alexander Gutierrez Lex and Flex Overview Lex/Flex is a scanner generator for C/C++ It reads pairs of regular expressions and code

More information

Optimal Reactive Power Dispatch Using Hybrid Loop-Genetic Based Algorithm

Optimal Reactive Power Dispatch Using Hybrid Loop-Genetic Based Algorithm Optimal Reactive Power Dispatch Using Hybrid Loop-Genetic Based Algorithm Md Sajjad Alam Student Department of Electrical Engineering National Institute of Technology, Patna Patna-800005, Bihar, India

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Rashmi Gadbail,, 2013; Volume 1(8): 783-791 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK EFFECTIVE XML DATABASE COMPRESSION

More information

Multi-Hop Linear Network Based on LoRa

Multi-Hop Linear Network Based on LoRa , pp.29-33 http://dx.doi.org/10.14257/astl.2018.150.08 Multi-Hop Linear Network Based on LoRa Cong Tan Duong 1 and Myung Kyun Kim 1 1 44610 Dept. of IT Convergence, Univ. of Ulsan, Daehak-Ro 93, Nam-Gu,

More information

Multicomputer Research Desks for Simulation and Development of Control Systems

Multicomputer Research Desks for Simulation and Development of Control Systems Proceedings of the 17th World Congress The International Federation of Automatic Control Multicomputer Research Desks for Simulation and Development of Control Systems M.Kh. Dorri A.A. Roshchin Institute

More information

Composability Test of BOM based models using Petri Nets

Composability Test of BOM based models using Petri Nets I. Mahmood, R. Ayani, V. Vlassov and F. Moradi 7 Composability Test of BOM based models using Petri Nets Imran Mahmood 1, Rassul Ayani 1, Vladimir Vlassov 1, and Farshad Moradi 2 1 Royal Institute of Technology

More information

Remote Direct Storage Management for Exa-Scale Storage

Remote Direct Storage Management for Exa-Scale Storage , pp.15-20 http://dx.doi.org/10.14257/astl.2016.139.04 Remote Direct Storage Management for Exa-Scale Storage Dong-Oh Kim, Myung-Hoon Cha, Hong-Yeon Kim Storage System Research Team, High Performance Computing

More information

INCORPORATING ADVANCED PROGRAMMING TECHNIQUES IN THE COMPUTER INFORMATION SYSTEMS CURRICULUM

INCORPORATING ADVANCED PROGRAMMING TECHNIQUES IN THE COMPUTER INFORMATION SYSTEMS CURRICULUM INCORPORATING ADVANCED PROGRAMMING TECHNIQUES IN THE COMPUTER INFORMATION SYSTEMS CURRICULUM Charles S. Saxon, Eastern Michigan University, charles.saxon@emich.edu ABSTRACT Incorporating advanced programming

More information

Residual Networks And Attention Models. cs273b Recitation 11/11/2016. Anna Shcherbina

Residual Networks And Attention Models. cs273b Recitation 11/11/2016. Anna Shcherbina Residual Networks And Attention Models cs273b Recitation 11/11/2016 Anna Shcherbina Introduction to ResNets Introduced in 2015 by Microsoft Research Deep Residual Learning for Image Recognition (He, Zhang,

More information

CHAPTER 1. Introduction

CHAPTER 1. Introduction ME 475: Computer-Aided Design of Structures 1-1 CHAPTER 1 Introduction 1.1 Analysis versus Design 1.2 Basic Steps in Analysis 1.3 What is the Finite Element Method? 1.4 Geometrical Representation, Discretization

More information

Epidemic-style Communication Primitives Exploiting Network Topology Information

Epidemic-style Communication Primitives Exploiting Network Topology Information Epidemic-style Communication Primitives Exploiting Network Topology Information Mirco Musolesi and Cecilia Mascolo Department of Computer Science, University College London Gower Street, London, WC1E 6BT,

More information

Workshop - Model Calibration and Uncertainty Analysis Using PEST

Workshop - Model Calibration and Uncertainty Analysis Using PEST About PEST PEST (Parameter ESTimation) is a general-purpose, model-independent, parameter estimation and model predictive uncertainty analysis package developed by Dr. John Doherty. PEST is the most advanced

More information

Design optimization and design exploration using an open source framework on HPC facilities Presented by: Joel GUERRERO

Design optimization and design exploration using an open source framework on HPC facilities Presented by: Joel GUERRERO Workshop HPC Methods for Engineering CINECA (Milan, Italy). June 17th-19th, 2015. Design optimization and design exploration using an open source framework on HPC facilities Presented by: Joel GUERRERO

More information

Massachusetts Institute of Technology Sloan School of Management. Understanding Epidemics Using. VensimPLE. For use with VensimPLE, version 6.

Massachusetts Institute of Technology Sloan School of Management. Understanding Epidemics Using. VensimPLE. For use with VensimPLE, version 6. Massachusetts Institute of Technology Sloan School of Management Understanding Epidemics Using VensimPLE For use with VensimPLE, version 6.1 Originally developed by Nelson Repenning, MIT Sloan School of

More information

Robust Design Methodology of Topologically optimized components under the effect of uncertainties

Robust Design Methodology of Topologically optimized components under the effect of uncertainties Robust Design Methodology of Topologically optimized components under the effect of uncertainties Joshua Amrith Raj and Arshad Javed Department of Mechanical Engineering, BITS-Pilani Hyderabad Campus,

More information

Byte Index Chunking Approach for Data Compression

Byte Index Chunking Approach for Data Compression Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2, Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea {Ider555, jso, jeonggun.lee, yuko}@hallym.ac.kr 2

More information

Question Marks 1 /20 2 /16 3 /7 4 /10 5 /16 6 /7 7 /24 Total /100

Question Marks 1 /20 2 /16 3 /7 4 /10 5 /16 6 /7 7 /24 Total /100 CSC 460/660, Midterm March 14, 2005 Name: Student ID: Signature: You have 75 minutes to write the 7 questions on this examination. A total of 100 marks is available. Justify all of your answers You may

More information

Adaptive Filtering using Steepest Descent and LMS Algorithm

Adaptive Filtering using Steepest Descent and LMS Algorithm IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 4 October 2015 ISSN (online): 2349-784X Adaptive Filtering using Steepest Descent and LMS Algorithm Akash Sawant Mukesh

More information

Efficient Resources Allocation in Technological Processes Using an Approximate Algorithm Based on Random Walk

Efficient Resources Allocation in Technological Processes Using an Approximate Algorithm Based on Random Walk Efficient Resources Allocation in Technological Processes Using an Approximate Algorithm Based on Random Walk M.M. Bayas 1,2, V.M. Dubovoy 1 1 Department Computer Control Systems, Institute for Automatics,

More information

An Introduction to Agent Based Modeling with Repast Michael North

An Introduction to Agent Based Modeling with Repast Michael North An Introduction to Agent Based Modeling with Repast Michael North north@anl.gov www.cas.anl.gov Repast is an Agent-Based Modeling and Simulation (ABMS) Toolkit with a Focus on Social Simulation Our goal

More information

AIRFOIL SHAPE OPTIMIZATION USING EVOLUTIONARY ALGORITHMS

AIRFOIL SHAPE OPTIMIZATION USING EVOLUTIONARY ALGORITHMS AIRFOIL SHAPE OPTIMIZATION USING EVOLUTIONARY ALGORITHMS Emre Alpman Graduate Research Assistant Aerospace Engineering Department Pennstate University University Park, PA, 6802 Abstract A new methodology

More information

System Identification Algorithms and Techniques for Systems Biology

System Identification Algorithms and Techniques for Systems Biology System Identification Algorithms and Techniques for Systems Biology by c Choujun Zhan A Thesis submitted to the School of Graduate Studies in partial fulfillment of the requirements for the degree of Doctor

More information