Network Science in NDSSL at Virginia Tech

Slides:



Advertisements
Similar presentations
UNICEF Programme on Pandemic Prevention & Preparedness.
Advertisements

Will the Avian Flu Become the Next Epidemic?
Aim: What impact did the Black Plague have on the world?
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Communicable Disease Surveillance & Response WHO-WPRO Pandemic (H1N1) 2009 situation and response in the Western Pacific Region Takeshi Kasai Communicable.
Using Geographical Information System tool in containing influenza pandemic threats Republic of Lebanon Ministry of Public Health Epidemiological Surveillance.
University of Buffalo The State University of New York Spatiotemporal Data Mining on Networks Taehyong Kim Computer Science and Engineering State University.
Presentation Topic : Modeling Human Vaccinating Behaviors On a Disease Diffusion Network PhD Student : Shang XIA Supervisor : Prof. Jiming LIU Department.
1 Avian Influenza Rapid Response Team Training. 2 What is a Rapid Response Team? A team of professionals that investigates suspected cases of avian influenza.
Strategic Planning Chapter 5 Revitalizing Bermuda.
Presentation Topic : Vaccination Deployment in Protection against Influenza A (H1N1) Infection PhD Student : Shang XIA Supervisor : Prof. Jiming LIU Department.
Avian Influenza H5N1 Reactive Antibodies BA 468x Technology Commercialization.
EPIDEMIOLOGY AND PREVENTION OF INFLUENZA. Introduction Unique epidemiology: – Seasonal attack rates of 10% to 30% – Global epidemics Influenza viruses.
Developing a vaccine and how a pandemic could occur.
1 ECONOMIC IMPACTS OF A PANDEMIC Dr. Mike Walden Reynolds Distinguished Professor & Extension Economist North Carolina State University.
Learning Goals Appreciate that events on the other side of the world affect us.
EpiFast: A Fast Algorithm for Large Scale Realistic Epidemic Simulations on Distributed Memory Systems Keith R. Bisset, Jiangzhuo Chen, Xizhou Feng, V.S.
PRE-PANDEMIC VACCINATION MAY HALT THE SPREAD OF A PANDEMIC MATHEMATIC MODELING.
Result of gap analysis and framework of action required in coming five months August rd Meeting of National Influenza Centres in the Western.
Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Responding To An Infection Transmission Emergency Jim Koopman MD MPH University of Michigan Center for the Study of Complex Systems & Dept. of Epidemiology.
Technology for Homeland Security PANDEMIC SCENARIO By Kevin G. Coleman
Advisor: Professor Sabounchi
The Vermont Department of Health Update on Pandemic Threat Cort Lohff, MD, MPH State Epidemiologist Guidance Support Prevention Protection.
Optimal Interventions in Infectious Disease Epidemics: A Simulation Methodology Jiangzhuo Chen Network Dynamics & Simulation Science Laboratory INFORMS.
Comparison of Individual Behavioral Interventions and Public Mitigation Strategies for Containing Influenza Epidemic Joint work with Chris Barrett, Stephen.
1 Monitoring and Early Warning for Internet Worms Authors: Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst Publish: 10th.
Epidemiology of Swine Influenza H1N1 Amman 5/5/2009 Dr. Labib Sharif Associate Prof. Of Epidemiology Faculty of Veterinary Medicine Jordan University of.
Avian Influenza H5N1 The Next Pandemic? May 9, 2006.
1 July 2008 e Global summary of the AIDS epidemic, December 2007 Total33 million [30 – 36 million] Adults30.8 million [28.2 – 34.0 million] Women15.5 million.
Core Epidemiology Slides
Global summary of the HIV and AIDS epidemic, December 2003
Chapter 11: Nursing in Pandemics and Emergency Preparedness.
Managing Pandemics Health. Health: Managing Pandemics OUTLINE What is a pandemic? Long term disease management: Malaria Sudden pandemic outbreaks: Ebola.
PANDEMIC INFLUENZA M. Rony Francois, MD, MSPH, PhD
Internet Quarantine: Requirements for Containing Self-Propagating Code
Beth Roland 8th Grade Science
AHI + Humanitarian Action
Global summary of the AIDS epidemic, December 2007
Ebola, Avian Flu & HIV/AIDS
Public Policy and Managing Bioterrorism
Global summary of the AIDS epidemic, 2008
Avian Influenza A (H5N1) “Bird Flu”
Globalisation 3: The role of technology
ECONOMIC IMPACTS OF A PANDEMIC
Global summary of the AIDS epidemic, 2008
ECONOMIC IMPACTS OF A PANDEMIC
Diseases Unit 3.
Near Field Communication (NFC) Market
Gerard Mulder Smart Wells Global Implementation Leader,
OUTBREAK.
Types of Diffusion Name: Period: Relocation Diffusion
Global Digital Fitness Market : Trends, Forecast, and Opportunity Analysis 1.
Epidemics and Pandemics
Global summary of the HIV and AIDS epidemic, December 2004
BC Science Connections 8
The role of the OIE in biological threat reduction
Human- Environment Interaction
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
Outbreaks Epidemics Pandemics
Global summary of the AIDS epidemic, December 2007
Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Cutaneous Inhalation
Diseases Unit 3.
Global Summary of the HIV and AIDS Epidemic December 2004
Introduction to Internet Worm
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Core epidemiology slides
July 2018 Core epidemiology slides.
Avian Influenza: Protecting Flocks, Protecting People
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

Network Science in NDSSL at Virginia Tech 2009 HPC User Forum 21 April 2009 Roanoke, Virginia

Two Examples Wireless epidemics Epidemic simulations

What people do to study this? Wireless Epidemics 20.7 million smart devices were shipped in North America in 2007 and more expected in years to come Expected growth of 150% in smart phone market Ubiquity of smart digital devices lead to amplified opportunities for malware attacks Open APIs result in buggy third party applications for smart devices What people do to study this? Use mathematical modeling to predict the impact Useful and scalable, but not accurate Simulation studies of the wireless networks with worm implemented Accurate, not scalable (500 nodes -> 2 days) We build models for studying them through a parallel discrete event simulator Very little accuracy lost, but provides scalability (35000 -> 1 hour)

EpiNet Simulation Framework Activity-based mobility models device mobility Sub-location modeling constructs wireless networks at activity locations Malware manifestation models worm and protocol characteristics What do we study with this? Understand the spread Detection strategies Response schemes for handling outbreaks Evaluate strategies Conclusions Network structure significantly alter the spread More reason to consider realistic proximity networks Early/late interventions are not that different Dynamic interventions are required to be studied Graphic of comparison of early versus late interventions with degree rank

Avian Influenza: The Threat 9 regional outbreaks in the last 11 years Southeast Asia from 2003-2005 Economic loss of $10 billion US 62 deaths Global concern: influenza pandemic Possible fatalities: ~150 million deaths

Large Transmission System 145903 poultry farms in the US Farm sizes range from 1 to 5,000,000 birds Avian influenza: avian-to-avian transmission among farms One initially infected farm (node): #17196 ~2500 miles

Simulated Virus Diffusion time = t0 largest network size 144381 nodes 414 million edges initially infected node (red nodes have contracted virus)

Vulnerability Maps for 3 Networks Network M Network L phase transition < 2000 infections 1700-10000 infections > 10000 infections community ≡ nodes within a geographic zone possessing high vulnerability

What Gives Rise To a Large Attack Size? Red lines are boundaries between northern and southern communities Boundary region is an area of low vulnerability The virus must cross this divide for large attack size The aforementioned divide is the dominant one, but there are others Consequently, we have “speed up” and “slow down” of the virus spread network M, only those simulations resulting in large attack size