Open
Published Online: 27 October 2020
Accepted: October 2020
Chaos 30, 101103 (2020); https://doi.org/10.1063/5.0023796
more...View Affiliations

Although there are various models of epidemic diseases, there are a few individual-based models that can guide susceptible individuals on how they should behave in a pandemic without its appropriate treatment. Such a model would be ideal for the current coronavirus disease 2019 (COVID-19) pandemic. Thus, here, we propose a topological model of an epidemic disease, which can take into account various types of interventions through a time-dependent contact network. Based on this model, we show that there is a maximum allowed number of persons one can see each day for each person so that we can suppress the epidemic spread. Reducing the number of persons to see for the hub persons is a key countermeasure for the current COVID-19 pandemic.
An epidemic disease is an area where a mathematical model has a potential power to derive how to suppress spreading of the disease. Although there are various types of models such as the famous Kermack and McKendrick model11. W. O. Kermack and A. G. McKendrick, “A contribution to the mathematical theory of epidemics,” Proc. R. Soc. London 115, 700–721 (1927). https://doi.org/10.1098/rspa.1927.0118 to agent-based models22. R. Bagni, R. Berchi, and P. Cariello, “A comparison of simulation models applied to epidemics,” J. Artif. Soc. Soc. Simul. 5(3) (2002), available at http://jasss.soc.surrey.ac.uk/5/3/5.html. and age-structured models,33. D. Schentzle, “An age-structured model of pre- and post-vaccination measles transmission,” IMA J. Math. Appl. Med. Biol. 1, 169–191 (1984). https://doi.org/10.1093/imammb/1.2.169 there are a few individual-based models that contain a limited number of assumptions and can be analyzed analytically to suggest to each individual how they should appropriately behave. Thus, here, we introduce a simple topological model of epidemic disease spreading. The key ingredient is a contact network among people for each day. This model can allow the time-varying nature for the underlying network topology due to possible countermeasures enforced by each government or each individual including susceptible persons. In addition, this model includes an infection history of an epidemic disease so that the disease states can match with the current coronavirus disease 2019 (COVID-19) epidemic more closely. The theoretical arguments based on the model directly show that hub persons should be the most paramount point to consider the countermeasures,44. A.-L. Barabási, Network Science (Cambridge University Press, Cambridge, 2016). especially in the current COVID-19 condition.
COVID-19 has been spreading worldwide and producing serious problems. The number of infected persons is 16 950 407, and the number of deaths is 664 961 as on 30 July 2020.55. See https://coronavirus.jhu.edu/map.html for the numbers of COVID-19 cases accessed 30 July 2020. However, because there are no effective existing vaccines or medicines specific for COVID-19 until now, currently, we can maintain social distancing from people,66. World Health Organization, “Considerations for quarantine of individuals in the context of containment for coronavirus disease (COVID-19),” Interim guidance, World Health Organization, 19 March 2020. wear a mask, and/or wash our hands. The second wave of COVID-19 is spreading in some countries, while the possibility and its scenarios for the second wave have been examined theoretically.7,87. J. Daunizeau, R. Moran, J. Brochard, J. Mattout, R. Frackowiak, and K. Friston, “Modelling lockdown-induced 2nd COVID waves in France” medRxiv (2020). https://doi.org/10.1101/2020.06.24.201394448. V. M. Eguíluz, J. Fernández-Gracia, J. P. Rodríguez, J. M. Pericàs, and C. Melián, “Risk of secondary infection waves of COVID-19 in an insular region: The case of the Balearic Islands, Spain,” medRxiv (2020). https://doi.org/10.1101/2020.05.03.20089623 In addition, more waves are expected9,109. S. M. Kissler, C. Tedijanto, E. Glodstein, Y. H. Grad, and M. Lipsitch, “Projecting the transmission dynamics of SARS-CoV-2 through the postpandemic period,” Science 368, 860–868 (2020). https://doi.org/10.1126/science.abb579310. K. Leung, J. T. Wu, D. Liu, and G. M. Leung, “First-wave COVID-19 transmissibility and severity in China outside Hubei after control measures, and second-wave scenario planning: A modelling impact assessment,” Lancet 395, 1382–1393 (2020). https://doi.org/10.1016/S0140-6736(20)30746-7 because infections from pre-symptomatic and asymptomatic infectious people are sufficient to sustain the current COVID-19 pandemic.1111. L. Ferretti, C. Wymant, M. Kendall, L. Zhao, A. Nurtay, L. Abeler-Dörner, M. Parker, D. Bonsall, and C. Fraser, “Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing,” Science 368, 619 (2020). https://doi.org/10.1126/science.abb6936 Here, our question is how many contacts per person for each day are few enough for suppressing the further spreading of COVID-19. We formulate a topological model for an epidemic disease and have a solid answer on the maximum number of contacts per day for each person.
The mainstream for the mathematical modeling of epidemic diseases is via differential equations.12,1312. M. Martcheva, An Introduction to Mathematical Epidemiology (Springer, New York, 2015).13. G. Chowell, L. Sattenspiel, S. Bansal, and C. Viboud, “Mathematical models to characterize early epidemic growth: A review,” Phys. Life Rev. 18, 66–97 (2016). https://doi.org/10.1016/j.plrev.2016.07.005 However, for example, the most popular Kermack and McKendrick model [Susceptible–Infected–Recovered (SIR) model]11. W. O. Kermack and A. G. McKendrick, “A contribution to the mathematical theory of epidemics,” Proc. R. Soc. London 115, 700–721 (1927). https://doi.org/10.1098/rspa.1927.0118 and the susceptible–infected–susceptible model1212. M. Martcheva, An Introduction to Mathematical Epidemiology (Springer, New York, 2015). are too macroscopic to derive countermeasures interpretable for each susceptible person to follow. To derive and/or evaluate countermeasures microscopically that we should enforce for each person’s level, we need to use an individual-based model such as agent-based models.22. R. Bagni, R. Berchi, and P. Cariello, “A comparison of simulation models applied to epidemics,” J. Artif. Soc. Soc. Simul. 5(3) (2002), available at http://jasss.soc.surrey.ac.uk/5/3/5.html. However, such a model has not considered the temporal change of the infecting probabilities depending on the time after the infection. In addition, such a model so far has not reached a criterion that each individual person can understand and follow for suppressing an epidemic spread, which is an important point for the current COVID-19 pandemic.
On the evening of 27 April 2020, we found that Professor Michael Small posted a preprint1414. M. Small and D. Cavanagh, “Modelling strong control measures for epidemic propagation with networks: A COVID-19 case study,” arXiv:2004.10396v4 (2020). and declared that the topology of a contact network is sufficient to understand an epidemic and take countermeasures. Instead of considering the reproduction number,1515. D. Adam, “The limits of R,” Nature 583, 346–348 (2020). https://doi.org/10.1038/d41586-020-02009-w which is hard to estimate from a short time series,1616. D. Faranda, I. P. Castillo, O. Hulme, A. Jezequel, J. S. W. Lamb, Y. Sato, and E. L. Thompson, “Asymptotic estimates of SARS-CoV-2 infection counts and their sensitivity to stochastic perturbation,” Chaos 30, 051107 (2020). https://doi.org/10.1063/5.0008834 their arguments are based on the topology of contact networks. It has been shown that the topology of the contact network is related to an epidemic spread on the network: for example, in a scale-free network, an epidemic is more likely to spread than in a regular lattice or a small-world network.1717. M. D. F. Shirley and S. P. Rushton, “The impacts of network topology on disease spread,” Ecol. Complex. 2, 287–299 (2005). https://doi.org/10.1016/j.ecocom.2005.04.005 A more mathematical work1818. A. Ganesh, L. Massoulié, and D. Towsley, “The effect of network topology on the spread of epidemics,” in Proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE, 2005). discusses how an epidemic spread will die out depending on the comparison between the speed of curing and the network’s spectral radius. Therefore, we were inspired by the work of Professor Small for constructing a topological model of an epidemic disease. In particular, rather than using the reproduction number, we would like to characterize the underlying time-dependent dynamics of an epidemic spread by a time-varying contact network or a temporal network.19–2119. P. Holme and J. Saramäki, “Temporal networks,” Phys. Rep. 519, 97–125 (2012). https://doi.org/10.1016/j.physrep.2012.03.00120. N. Masuda, K. Klemm, and V. M. Eguíluz, “Temporal networks: Slowing down diffusion by long lasting interactions,” Phys. Rev. Lett. 111, 188701 (2013). https://doi.org/10.1103/PhysRevLett.111.18870121. N. Masuda and P. Holme, “Predicting and controlling infectious disease epidemics using temporal networks,” F1000Prime Rep. 5, 6 (2013). https://doi.org/10.12703/P5-6 Due to the technical advancements, we have been able to collect time-dependent contact information, and such data have been widely analyzed.22–2522. C. Cattuto, W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, and A. Vespignani, “Dynamics of person-to-person interactions from distributed RFID sensor networks,” PLoS One 5, e11596 (2010). https://doi.org/10.1371/journal.pone.001159623. L. Isella, J. Stehlé, A. Barrat, C. Cattuto, J.-F. Pinton, and W. Van den Broeck, “What’s in a crowd? Analysis of face-to-face behavioral networks,” J. Theor. Biol. 271, 166–180 (2011). https://doi.org/10.1016/j.jtbi.2010.11.03324. M. Salathé, M. Kazandjieva, J. W. Lee, P. Levis, M. W. Feldman, and J. H. Jones, “A high-resolution human contact network for infectious disease transmission,” Proc. Natl. Acad. Sci. U.S.A. 107, 22020–22025 (2010). https://doi.org/10.1073/pnas.100909410825. A. Stopczynski, V. Sekara, P. Sapiezynski, A. Cuttone, M. M. Madsen, J. E. Larsen, and S. Lehmann, “Measuring large-scale social networks with high resolution,” PLoS One 9, e95978 (2014). https://doi.org/10.1371/journal.pone.0095978 Hence, our model will have a good affinity with such time-dependent contact information. Thus, we intend to construct an individual-based model that (i) can describe the current COVID-19 situation more accurately by using the infection history as well as contact networks and (ii) the model can be analyzed analytically so that we can obtain a topological criterion that can be implemented by each susceptible individual for suppressing the epidemic spread. This topological criterion is why we call our model a “topological epidemic model.”
Our model considers an individual person i in some area. Among them, we consider a time-varying contact matrix A ( t ) at day t. In particular, if persons i and j have at least a contact on day t, we have a i , j ( t ) = a j , i ( t ) = 1. Otherwise, we set a i , j ( t ) = a j , i ( t ) = 0. Therefore, we are considering a time-varying network topology or a temporal network.19–2119. P. Holme and J. Saramäki, “Temporal networks,” Phys. Rep. 519, 97–125 (2012). https://doi.org/10.1016/j.physrep.2012.03.00120. N. Masuda, K. Klemm, and V. M. Eguíluz, “Temporal networks: Slowing down diffusion by long lasting interactions,” Phys. Rev. Lett. 111, 188701 (2013). https://doi.org/10.1103/PhysRevLett.111.18870121. N. Masuda and P. Holme, “Predicting and controlling infectious disease epidemics using temporal networks,” F1000Prime Rep. 5, 6 (2013). https://doi.org/10.12703/P5-6 Considering a temporal network is important in the field of epidemiology because considering temporal information makes a contact analysis of disease spread more accurate.2626. P. Holme, “Temporal network structures controlling disease spreading,” Phys. Rev. E 94, 022305 (2016). https://doi.org/10.1103/PhysRevE.94.022305 The non-Markovian structure for edge occurrences may facilitate or depress diffusion;2727. I. Scholtes, N. Wider, R. Pfitzner, A. Garas, C. J. Tessone, and F. Schweitzer, “Causality-driven slow-down and speed-up of diffusion in non-Markovian temporal networks,” Nat. Commun. 5, 5024 (2014). https://doi.org/10.1038/ncomms6024 in particular, interaction patterns in a hospital facilitate the spreading of an epidemic.2828. J. P. Rodríguez, F. Ghanbarnejad, and V. M. Eguíluz, “Risk of coinfection outbreaks in temporal networks: A case study of a hospital contact network,” Front. Phys. 5, 46 (2017). https://doi.org/10.3389/fphy.2017.00046
Thus, here, we construct a model that calculates the expected number of infected persons at each day t. Our model may be regarded as a discretized version of the Susceptible–Exposed–Infected–Susceptible (SEIS) model,1212. M. Martcheva, An Introduction to Mathematical Epidemiology (Springer, New York, 2015). taking into account an infection history.
In our model, once a person is infected, then the person is called exposed. After K days, the exposed person becomes infectious, being able to infect others. This infectious state will last for Q K days at maximum and shift to a susceptible state again. Thus, the person becomes susceptible again. We also call people infected if they are either exposed or infectious. For each person, state s i ( t ) at time t corresponds to a Q-dimensional vector, where Q is the maximum number of days a person will stay in an infectious state after an infection. According to the statistics of COVID-19, Q seems to be around two weeks.6,116. World Health Organization, “Considerations for quarantine of individuals in the context of containment for coronavirus disease (COVID-19),” Interim guidance, World Health Organization, 19 March 2020.11. L. Ferretti, C. Wymant, M. Kendall, L. Zhao, A. Nurtay, L. Abeler-Dörner, M. Parker, D. Bonsall, and C. Fraser, “Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing,” Science 368, 619 (2020). https://doi.org/10.1126/science.abb6936 The first component of s i ( t ) corresponds to the first day of the infection, which is an exposed state. The second component of s i ( t ) corresponds to the second day of the infection. Thus, the qth component of s i ( t ) corresponds to the qth day of the infection for q = 1 , 2 , , Q. Let σ k be the rate at which a person will keep the exposed or infectious state for k days after the infection. Here, we assume that 0 < σ k < 1. Then, for person i, we can have the following dynamics for a day using a Q × Q matrix P i:
P i = [ 0 0 0 0 0 σ 1 0 0 0 0 0 σ 2 0 0 0 0 0 σ 3 0 0 0 0 0 σ Q 1 0 ] . (1)
For simplicity, we here assume that σ k is constant and σ k = σ. This matrix is similar to the model by Leslie;2929. P. H. Leslie, “On the use of matrices in certain population mathematics,” Biometrika 33, 183–212 (1945). https://doi.org/10.1093/biomet/33.3.183 thus, we can consider an infection history naturally. The matrix by Leslie was considered in an epidemic problem previously,3030. J. Gani and L. Stals, see https://openresearch-repository.anu.edu.au/bitstream/1885/73112/9/01_Gani_A_Leslie_Matrix_2013.pdf for “A Leslie matrix approach to an age-structured epidemic” (last accessed May 2, 2020). especially in an epidemic problem for deers.3131. D. R. Edmunds, M. J. Kauffman, B. A. Schumaker, F. G. Lindzey, W. E. Cook, T. J. Kreeger, R. G. Grogan, and T. E. Cornish, “Chronic wasting disease drives population decline of white-tailed deer,” PLoS One 11, e0161127 (2016). https://doi.org/10.1371/journal.pone.0161127
We also use the following Q × Q matrix γ i , j ( t ) for describing the process of infection:
γ i , j ( t ) = [ 0 0 0 γ i , j , K + 1 ( t ) γ i , j , K + 2 ( t ) γ i , j , Q ( t ) 0 0 0 0 0 0 0 0 0 0 0 0 ] , (2)
where we have γ i , j ( t ) ( 1 , k ) = 0 for k = 1 , 2 , , K, which corresponds to an exposed state, and γ i , j ( t ) ( 1 , k ) = γ i , j , k for k = K + 1 , K + 2 , , Q, which corresponds to an infectious state in the context of the SEIS model. It has been made clear that there is a median interval of 4.6 days between successive infections.3232. H. Nishiura, N. M. Linton, and A. R. Akhmetzhanov, “Serial interval of novel coronavirus (COVID-19) infections,” Int. J. Infect. Dis. 93, 284–286 (2020). https://doi.org/10.1016/j.ijid.2020.02.060 As an infection matrix from person j to person i, we have
a i , j ( t ) γ i , j , k ( t ) , (3)
where γ i , j , k ( t ) is the infection rate specific to susceptible person i at day t while the infectious person j is at k days after the infection. These definitions mean that an exposed person becomes infectious after K days and then the infectious person may infect another susceptible person between ( K + 1 ) and Q days after an infection. If exposed, Eq. (2) will contribute to the first component of s i ( t + 1 ). In addition, this γ i , j , k ( t ) may depend on how the potentially being exposed person i as well as the potentially being infecting person j take their countermeasures for the infection and how long the person i spends after their infection. The countermeasures include, but not limited to, wearing masks, gloves, and/or face shields as well as washing hands and other parts of their bodies.
Now, we are ready to define the whole system. Let s ( t ) be a vector combining all the states for everyone,
s ( t ) = [ s 1 ( t ) s 2 ( t ) s N ( t ) ] . (4)
Here,     means the transpose of a matrix. This s ( t ) is an N Q-dimensional vector. Let T ( t ) be the infection dynamics at day t,
T ( t ) = [ P 1 a 1 , 2 ( t ) γ 1 , 2 ( t ) a 1 , N ( t ) γ 1 , N ( t ) a 2 , 1 ( t ) γ 2 , 1 ( t ) P 2 a 2 , N ( t ) γ 2 , N ( t ) a N , 1 ( t ) γ N , 1 ( t ) a N , 2 ( t ) γ N , 2 ( t ) P N ] . (5)
This T ( t ) is an N Q × N Q matrix. Then, our day-resolution equation is as follows:
s ( t + 1 ) = T ( t ) s ( t ) . (6)
Here, s ( i 1 ) Q + q ( t ) is the probability that at day t, person i is at q days after an infection. From day t 0, the model can be simulated as
s ( t ) = T ( t 1 ) T ( t 2 ) T ( t 0 ) s ( t 0 ) . (7)
Thus, the total expected number of infected people at day t is written as
j = 1 N Γ ( q = Q ( j 1 ) + 1 Q j s q ( t ) ) , (8)
where the function Γ is defined as
Γ ( x ) = { x if x < 1 , 1 otherwise. (9)
This model is naturally taking into account an infection history of an epidemic, namely, how many days have passed after the infection. In the current setting, we are allowing the recovered people to be exposed more than once. This model may count each infected person more than once if the infectious person has contacts with the other infected persons. However, the total number of the infected persons shown in Eq. (8) does not exceed the number N of persons in this network.
It is easy to derive the upper bound of the dominant eigenvalue for T ( t ) as
min [ max j , k i j γ i , j , k ( t ) a i , j ( t ) + σ , max × { σ , max i k = K + 1 Q j i γ i , j , k ( t ) a i , j ( t ) } ] . (10)
For the derivation of the above upper bound, see the Appendix. From the viewpoint of suppressing the epidemic disease, the upper bound of Eq. (10) should be made as small as possible. This upper bound may be regarded as the upper bound of the basic reproduction number.1212. M. Martcheva, An Introduction to Mathematical Epidemiology (Springer, New York, 2015). In particular, if the upper bound is less than 1, we have
min [ max j , k i j a i , j ( t ) γ i , j , k ( t ) + σ , max × { σ , max i k = K + 1 Q j i γ i , j , k ( t ) a i , j ( t ) } ] < 1. (11)
Since we assumed 0 < σ < 1, this inequality can be simplified as
min [ max j , k i j γ i , j , k ( t ) a i , j ( t ) + σ , max i k = K + 1 Q j i γ i , j , k ( t ) a i , j ( t ) ] < 1. (12)
If Eq. (12) is satisfied, it implies that the basic reproduction number1212. M. Martcheva, An Introduction to Mathematical Epidemiology (Springer, New York, 2015). is less than 1; thus, we can suppress the spreading of the epidemic disease.
If we assume γ i , j , k ( t ) = γ k ( t ), then we have
min [ max j i j a i , j ( t ) max k γ k ( t ) + σ , max j i j a i , j ( t ) k = K + 1 Q γ k ( t ) ] < 1 , (13)
meaning that
max j i j a i , j ( t ) < max [ 1 σ max k γ k ( t ) , 1 k = K + 1 Q γ k ( t ) ] n c . (14)
This inequality means that hub persons should have fewer contacts than the theoretical bound n c per day. An important point of Eq. (14) is that the left hand side only depends on contacts by people, while the right hand side is mainly related to the properties of a disease. This n c is the maximum capacity of the number of persons we are allowed to see each day for each person for any initial conditions of an epidemic.
Note that k = K + 1 Q γ k ( t ) = G ( t ), where G ( t ) is the sum of γ k ( t ) at day t. This G ( t ) can be interpreted as the total number of infected persons per contact. Thus, if we define γ k ( t ) = G ( t ) f k ( t ), where f k ( t ) 0 and k = K + 1 Q f k ( t ) = 1, then we can change Eq. (14) to
max j i j a i , j ( t ) < 1 G ( t ) max [ 1 σ max k f k ( t ) , 1 ] = n c . (15)
As the units for the left hand side of Eq. (15) become contacts/patients, the units for G ( t ) are patients/contacts. Thus, if we let R 0 be the reproduction number (patients/patients) and M be the number of contacts per patient (contacts/patients), then on average, we may have
G ( t ) R 0 M . (16)
The excessive number of contacts per person for each day is defined as
max j i j a i , j ( t ) n c . (17)
We call this quantity the excessive contacts.
Moreover, if γ i , j , k ( t ) = γ ( t ) is constant across all the persons for each time after being infectious, then n c of Eq. (15) becomes
n c = max { 1 σ , 1 ( Q K ) } γ ( t ) . (18)
Furthermore, by assuming γ i , j , k ( t ) = γ ( t ), Eq. (14) can be changed as
γ ( t ) < max { 1 σ , 1 ( Q K ) } max j i j a i , j ( t ) . (19)
For example, if γ i , j , k ( t ) = γ ( t ) and the hub persons see at most three persons each day with Q = 14, K = 0, and σ = 0.9, the infection rate γ ( t ) should be less than 3.3% for suppressing the epidemic spread. Thus, we can control two things for reducing the spreading of the epidemic disease: we can reduce the number of people to see for each day for each person; we can reduce the infection rate γ ( t ) to allow the larger capacity of persons to see.
If the underlying contact network is scale-free,3333. A.-L. Barabási and R. Albert, “Emergence of scaling in random networks,” Science 286, 509–512 (1999). https://doi.org/10.1126/science.286.5439.509 max j i j a i , j ( t ) becomes large, and it is likely that we cannot stop spreading of the epidemic disease. If the underlying contact network is a typical small-world network in the sense of Watts and Strogatz3434. D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small-world’ networks,” Nature 393, 440–442 (1998). https://doi.org/10.1038/30918 and we have i j a i , j ( t ) small as well as almost constant over i, we can possibly suppress the spreading of the epidemic disease,3535. M. Karsai, M. Kivelä, R. K. Pan, K. Kaski, J. Kertész, A.-L. Barabási, and J. Saramäki, “Small but slow world: How network topology and burstiness slow down spreading,” Phys. Rev. E 83, 025102 (2011). https://doi.org/10.1103/PhysRevE.83.025102 while keeping the minimal interactions to sustain our daily lives.
Therefore, to design countermeasures for stop spreading an epidemic disease as well as sustaining our economic activities, we should introduce constraints on the maximal allowed numbers of people we can see for each day for each person by looking for an optimal contact network for day t that maximally stimulates our economies.
First, we verified the above analytical results with numerical simulations. In our numerical simulations, we first prepared two kinds of static networks: for each of the scale-free networks, we followed Barabási and Albert3333. A.-L. Barabási and R. Albert, “Emergence of scaling in random networks,” Science 286, 509–512 (1999). https://doi.org/10.1126/science.286.5439.509 to generate an underlying network randomly. Thus, the generated networks are intended to be neither assortative nor disassortative.44. A.-L. Barabási, Network Science (Cambridge University Press, Cambridge, 2016). For small-world networks, we first prepared the one-dimensional regular ring, where neighbors within distance 2 are connected. Then, we replaced a local connection with a long distance connection randomly with the probability 0.05. Furthermore, we set N = 500, Q = 14, and γ i , j , k ( t ) = 0.04. We assume that the spread of an epidemic starts from a person for each simulation.
When we varied K = 0 , 1 , , 13 and σ = 0.85 , 0.9, and 0.95, the infected persons grew as shown in Figs. 1 and 2. These figures show that the importance for the exposed state but not the infecting state as well as the rate at which the infected state is kept. In particular, if K is larger, the infection is more suppressed, while the infection is more likely to spread if σ is larger.
These results can also be summarized as in Fig. 3. Whether an outbreak occurs or not depends on each simulation (Fig. 3). However, the largest eigenvalue of T ( t ) is correlated well with the number of the infected persons with the probability higher than 0.2 at day 100 [Fig. 3(a); correlation coefficient: 0.2925; Table I]. This correlation is known in the existing literature, for example.3636. D.-W. Huang and Z.-G. Yu, “Dynamic-sensitive centrality of nodes in temporal networks,” Sci. Rep. 7, 41454 (2017). https://doi.org/10.1038/srep41454 In addition, we found that the number of infected people correlates positively with the maximum number of contacts per person for each day [Fig. 3(b); correlation coefficient: 0.2206] as well as negatively with the theoretical threshold n c [Fig. 3(c); correlation coefficient: 0.2079]. As a total, whether or not the excessive contacts [Eq. (17)] are greater becomes a good indicator for forecasting whether or not the number of infected persons at day 100 is 1 or greater [Fig. 3(d); Table II]. Moreover, please observe that Eq. (14) holds numerically as well: If the excessive contacts were negative, then outbreaks did not occur. However, if the excessive contacts become positive, outbreaks may have happened especially certainly for the small-world network examples. There are many cases (5655 cases) in the simulations shown in Table II, where the number of infected people at day 100 is less than 1 even if the excessive contacts are positive. To evaluate such cases more closely, we examined all the 100 cases each of ( σ , K ) = ( 0.9 , 2 ) and ( 0.95 , 4 ) for the scale-free networks and the 100 cases each of ( σ , K ) = ( 0.9 , 1 ) and ( 0.95 , 2 ) for the small-world networks using 100 different initial conditions for each network topology. We found that in these networks, the largest eigenvalue of T ( t ) is greater than 1 and the excessive contacts are positive. In addition, for each of these networks, there are some initial conditions from which a pandemic starts. Therefore, under the current COVID-19 situation where we do not have much direct treatment options, there is a certain value for a safer guideline, like Eq. (14) we introduced here, that each susceptible person can follow easily for suppressing the epidemic spread for sure.
Table icon
TABLE I. Classification results in Fig. 3(a).
The maximum for the absolute value of the eigenvalues The number of infected people is less than 1 The number of infected people is 1 or greater Total
1 or smaller 100% (6060) 0% (0) 100% (6060)
Greater than 1 36% (849) 64% (1491) 100% (2340)
Table icon
TABLE II. Classification results in Fig. 3(d).
The excessive contacts The number of infected people is less than 1 The number of infected people is 1 or greater Total
Zero or negative 100% (1254) 0% (0) 100% (1254)
Positive 79% (5655) 21% (1491) 100% (7146)
Tables I and II summarize the results of the largest eigenvalue of T ( t ) and those of excessive contacts, respectively. Both criteria are fine because the outbreaks do not occur if these criteria are less than the corresponding thresholds. On the other hand, comparison between Tables I and II imply that the largest eigenvalue of T ( t ) provides more reliable information for the outbreaks than the excessive contacts of Eq. (17). However, we need to know all the global information to derive the largest eigenvalue of T ( t ), while local contact information is sufficient for each individual person to examine the excessive contacts of Eq. (17). Thus, an advantage for using the excessive contacts is that each individual person can easily follow the criterion and decide how they should behave in each day.
Moreover, we also conducted simulations on time-varying small-world networks or, namely, temporal networks (Fig. 4). In these simulations, for each day, we generated a small-world network, which is perturbed from the one-dimensional ring as described above. Here, we set L = 500, K = 4, and γ i , j , k ( t ) = 0.04. Then, we ran the model for the time forward by applying different contact network structures every day. Therefore, this simulation can be regarded as a simulation within which we usually communicate with neighbors, but we sometimes travel for a long distance. In addition, we also assumed that there is a big gathering where half of the population gets together once in 7, 14, 21, and 28 days. The results are shown in Fig. 4. Even in this case, outbreaks of the epidemic were suppressed if the large gathering is once in 4 weeks. This property can be estimated from the following argument based on the means of the maximum eigenvalues for the underlying dynamics. The mean for the maximum eigenvalue of the usual day was about 0.96, while the mean for the day of the large gathering was about 1.69. Thus, the maximum eigenvalue for a τ day cycle of a big event can be estimated as 0.96 τ 1 × 1.69. By solving 0.96 τ 1 × 1.69 = 1, we found τ 14.2. Since the actual maximum eigenvalues fluctuate, this approximation roughly agrees with the results obtained in Fig. 4.
Furthermore, we conducted simulations using a more realistic γ k ( t ) for the COVID-19,1111. L. Ferretti, C. Wymant, M. Kendall, L. Zhao, A. Nurtay, L. Abeler-Dörner, M. Parker, D. Bonsall, and C. Fraser, “Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing,” Science 368, 619 (2020). https://doi.org/10.1126/science.abb6936 which follows the Weibull distribution3737. S. Thurner, R. Hanel, and P. Klimek, Introduction to the Theory of Complex Systems (Oxford University Press, Oxford, 2018). of a shape parameter of 2.826 and a scale parameter of 5.665. Then, the shape of infecting probability depending on the number of days after an infection looks as Fig. 5.
We varied G ( t ) between 0 and 2 randomly and ran simulations. We used either scale-free networks or small-world networks. We call the case of scale-free networks as the first type. For each step, we generated a scale-free network randomly as we did above. When we used small-world networks, we prepared two types of simulations, which are the second and third types. In the second type, we generated a network structure for each time starting from a ring, where neighbors within distance 2 are connected. In the third type, we generated a network structure similarly in the second type except that we started from a ring, where only neighbors within distance 1 are connected. In each type, we ran 300 simulations by setting the number of nodes to 500.
Then, we obtained the results shown in Fig. 6. We found that there are clear epidemic thresholds of G ( t ) 0.5 , 0.5 , 1.0 for the first, second, and third types of simulations, respectively. These epidemic thresholds of G ( t ) seem to be inversely related to the mean numbers of newly infecting local directions, which are 2, 2, and 1, respectively. The mean number of newly infecting local directions in the scale-free networks was obtained from the mean number of connections per node, while the corresponding mean numbers for the small work networks were obtained from the initial ring configurations as shown in Fig. 7. In addition, we found in Fig. 8 that the mean number of newly infecting local directions almost agrees with theoretical bounds n c to decide whether an epidemic occurred or not. In particular, the epidemic thresholds for n c for the first, second, and third types of simulations were about 2, 2, and 1 numerically, respectively. Therefore, these simulations show that our theoretical bound n c is a good means for distinguishing whether an epidemic is likely to occur or not. In particular, if the theoretical bound n c is larger than the mean number of newly infecting local directions, then an epidemic is likely to be prevented.
If we follow the above estimation as well as Eq. (16), we may conduct the following calculation. In the early 2020 in China, the reproduction number R 0 was identified as 2.0.1111. L. Ferretti, C. Wymant, M. Kendall, L. Zhao, A. Nurtay, L. Abeler-Dörner, M. Parker, D. Bonsall, and C. Fraser, “Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing,” Science 368, 619 (2020). https://doi.org/10.1126/science.abb6936 The number M of contacts per person in China in 2015 was estimated as 14.378 01 using the contact information of Ref. 3838. K. Prem, A. R. Cook, and M. Jit, “Projecting social contact matrices in 152 countries using contact surveys and demographic data,” PLoS Comput. Biol. 13, e1005697 (2017). https://doi.org/10.1371/journal.pcbi.1005697 and the demographic data at the United Nations’ site.3939. United Nations, Department of Economic and Social Affairs, Population Division, see https://population.un.org/wpp/DataQuery/ for World Population Prospects 2019; accessed 17 July 2020. If we assume that the underlying network is scale-free and drawn randomly for each time, G ( t ) could be G ( t ) R 0 M = 2.0 / 14.378 01 0.139. This value implies that the hub person may be able to meet at most n c = 1 / G ( t ) = 1 / 0.139 7.189 persons per day for suppressing an epidemic. If the underlying network is scale-free, the upper bound should be larger than 7.189. Although this estimated upper bound should be confirmed with actual data in the future, the number could convey how much we should restrict our daily activities.
We also applied the above statistics obtained from China in the early 2020 and examined whether or not COVID-19 will spread in a hospital based on the real data of human interactions in Ref. 4040. P. Vanhems, A. Barrat, C. Cattuoto, J.-F. Pinton, N. Khanafer, C. Régis, B.-A. Kim, B. Comte, and N. Voirin, “Estimating potential infection transmission routes in hospital wards using wearable proximity sensors,” PLoS One 8, e73970 (2013). https://doi.org/10.1371/journal.pone.0073970. We found that the maximum numbers of contacts per person per day in this hospital during the five days were 26, 40, 36, 34, and 34, respectively. Since these numbers are larger than the number of 7.189 shown above, there is a certain probability that COVID-19 would spread in the hospital if we do not take any countermeasures. Thus, if we have a contact network for a day among persons in a group, we can evaluate whether or not COVID-19 will be likely to spread in the group.
The strength of our model is that we are allowing the uncertainties for the underlying epidemic dynamics including its stochasticity. We only assume on how likely we get exposed when contacted with an infected person, γ ( t ), and how we recover from an epidemic disease, namely, σ, K, and Q. Our model can be simulated very realistically by using an actual contact network for each day, considering each individual person. However, we can also work on it theoretically because it is simple enough.
Our criterion of Eq. (14) is a sufficient condition for suppressing epidemic spread for any initial conditions. The meaning is clear because the left hand side depends on contacts by people only, while the right hand side is mainly related to the properties of an epidemic disease. In practice, some length of time is necessary for the epidemic to reach the hub persons before its spreading. In the above simulations of static scale-free networks of ( σ , K ) = ( 0.9 , 1 ), we have checked that a pandemic did not happen at day 100 if the hub persons are more than five links away from the source person of the infection. We are not sure how much we could generalize this result for a larger network. However, this observation implies how much the hub persons should be protected away from the infection. When we plan countermeasures practically, we do not have to consider all the persons in the whole area but a certain isolated cohort of persons for evaluating Eq. (14). It would be also an interesting open question to discuss the relationship between the microscopic quantity of Eq. (14) and a more macroscopic quantity of the epidemic threshold previously discussed by Speidel et al.4141. L. Speidel, K. Klemm, V. M. Eguíluz, and N. Masuda, “Temporal interactions facilitate endemicity in the susceptible-infected-susceptible epidemic model,” New J. Phys. 18, 073013 (2016). https://doi.org/10.1088/1367-2630/18/7/073013 on temporal networks.
Our work is not the first paper analytically relating a temporal network with an epidemic (see a recent review4242. R. Poastor-Satorras, C. Castellano, P. Van Mieghem, and A. Verspignani, “Epidemic processes in complex networks,” Rev. Mod. Phys. 87, 925–979 (2015). https://doi.org/10.1103/RevModPhys.87.925 on the topic bridging between epidemics and temporal networks). For example, Huang and Yu3636. D.-W. Huang and Z.-G. Yu, “Dynamic-sensitive centrality of nodes in temporal networks,” Sci. Rep. 7, 41454 (2017). https://doi.org/10.1038/srep41454 considered a model that can be regarded as a simpler version of the current model; Surano et al.4343. F. V. Surano, C. Bongiorno, L. Zino, M. Porfini, and A. Rizzo, “Backbone reconstruction in temporal networks from epidemic data,” Phys. Rev. E 100, 042306 (2019). https://doi.org/10.1103/PhysRevE.100.042306 tried to infer strong ties from spreading data; and Bodych et al.4444. M. Bodych, N. Ganguly, T. Krueger, A. Mukherjee, and R. Siegmung-Shultze, “Threshold-based epidemic dynamics in systems with memory,” Europhys. Lett. 116, 48004 (2016). https://doi.org/10.1209/0295-5075/116/48004 formulated a mathematical model, where k contacts are necessary to be infected. The epidemic spread may be facilitated if the older connections are more likely to appear,4545. M. Tizzani, “Dynamical processes and memory effects on temporal networks,” Ph.D. thesis (Università di Parma, 2019). while the epidemic spread may be made slower if successive inter-interaction intervals are positively correlated.4646. T. Hiraoka and H.-H. Jo, “Correlated bursts in temporal networks slow down spreading,” Sci. Rep. 8, 15321 (2018). https://doi.org/10.1038/s41598-018-33700-8 However, as far as we have searched, there has been no paper yet that considered an individual-based temporal network model that contains the history of infection and yields a criterion of Eq. (14) or similar, which can be interpreted by each susceptible individual person. This criterion interpretable by each susceptible individual person is the point we wanted to highlight in this paper.
In the future work, we will discuss an economic policy based on this model. At this stage, the above simple individual-based criterion becomes the key ingredient for the constraint.
In sum, we have introduced a topological model of epidemic disease spreading. The model is a time-varying linear matrix equation, allowing daily changes for the underlying contact network. By obtaining the upper bound for the dominant eigenvalue of the underlying dynamics, we discuss the implications for the obtained results. We found that hub persons are key for suppressing the spread of an epidemic disease. If we assume that the infection rate is common among all the persons, there is the maximal allowed number of persons whom we can see on each day for each person. Our simple message for the current COVID-19 pandemic is “keep contacts as few as possible.”
See the supplementary material for the MATLAB codes that are used for generating simulations of Figs. 1–4, 6, and 8 in this study.
We deeply appreciate Ms. Satoko Umino, the conversations with whom have brought us benefits during the manuscript preparation. Our research was supported by the JSPS KAKENHI (Grant No. JP18K11461).
Here, we show how to obtain our upper bound of Eq. (11).
Lemma 1
Suppose that a non-negative square matrix B = ( b i , j ) of size M × M is given. Then, the largest eigenvalue for B is upper bounded by min [ max j i = 1 M b i , j , max i j = 1 M b i , j ].
Proof.
We slightly modify the lines of a similar statement in Ref. 4747. M. Saito, Gyoretsu No Kaisekigaku (Calculus of Matrices) (Tokyo Tosho, Tokyo, 2017) (in Japanese)..
Let λ be the largest eigenvalue for B and x = ( x j ) and y = ( y i ), the corresponding right and left eigenvectors, respectively. We can generally assume that x 0 and y 0. Observe that x and y share the same largest eigenvalue λ because their characteristic equations4848. G. Strang, Linear Algebra and Its Applications, 4th ed. (Thomson Brooks, Belmont, CA, 2006). coincide [i.e., det ( B z I ) = det ( B z I ) = 0].
When we use x, we have
B x = λ x . (A1)
Let x l be the component of x whose absolute value | x j | is the largest among { x j }. Because x 0, we have | x l | 0. Then, we have
| λ | | x l | = | λ x l | = | j b l , j x j | j b l , j | x j | | x l | j b l , j . (A2)
Dividing | x l | by both sides, we have
| λ | j b l , j max i j b i , j . (A3)
When we use y, we have
y B = λ y . (A4)
If we take the transpose, then we have
B y = λ y . (A5)
Then, we can use the results of Eq. (A3) again to also have
| λ | max i j b i , j = max i j b j , i . (A6)
By combining Eq. (A3) with Eq. (A6), we have
| λ | min [ max j i b i , j , max i j b i , j ] . (A7)
Therefore, the lemma has been proven.
By using Lemma 1, it is straightforward to obtain Eq. (11).
The data that support the findings of this study are available within the article and its supplementary material.
  1. 1. W. O. Kermack and A. G. McKendrick, “A contribution to the mathematical theory of epidemics,” Proc. R. Soc. London 115, 700–721 (1927). https://doi.org/10.1098/rspa.1927.0118, Google ScholarCrossref
  2. 2. R. Bagni, R. Berchi, and P. Cariello, “A comparison of simulation models applied to epidemics,” J. Artif. Soc. Soc. Simul. 5(3) (2002), available at http://jasss.soc.surrey.ac.uk/5/3/5.html. Google Scholar
  3. 3. D. Schentzle, “An age-structured model of pre- and post-vaccination measles transmission,” IMA J. Math. Appl. Med. Biol. 1, 169–191 (1984). https://doi.org/10.1093/imammb/1.2.169, Google ScholarCrossref
  4. 4. A.-L. Barabási, Network Science (Cambridge University Press, Cambridge, 2016). Google Scholar
  5. 5. See https://coronavirus.jhu.edu/map.html for the numbers of COVID-19 cases accessed 30 July 2020. Google Scholar
  6. 6. World Health Organization, “Considerations for quarantine of individuals in the context of containment for coronavirus disease (COVID-19),” Interim guidance, World Health Organization, 19 March 2020. Google Scholar
  7. 7. J. Daunizeau, R. Moran, J. Brochard, J. Mattout, R. Frackowiak, and K. Friston, “Modelling lockdown-induced 2nd COVID waves in France” medRxiv (2020). https://doi.org/10.1101/2020.06.24.20139444, Google Scholar
  8. 8. V. M. Eguíluz, J. Fernández-Gracia, J. P. Rodríguez, J. M. Pericàs, and C. Melián, “Risk of secondary infection waves of COVID-19 in an insular region: The case of the Balearic Islands, Spain,” medRxiv (2020). https://doi.org/10.1101/2020.05.03.20089623, Google Scholar
  9. 9. S. M. Kissler, C. Tedijanto, E. Glodstein, Y. H. Grad, and M. Lipsitch, “Projecting the transmission dynamics of SARS-CoV-2 through the postpandemic period,” Science 368, 860–868 (2020). https://doi.org/10.1126/science.abb5793, Google ScholarCrossref
  10. 10. K. Leung, J. T. Wu, D. Liu, and G. M. Leung, “First-wave COVID-19 transmissibility and severity in China outside Hubei after control measures, and second-wave scenario planning: A modelling impact assessment,” Lancet 395, 1382–1393 (2020). https://doi.org/10.1016/S0140-6736(20)30746-7, Google ScholarCrossref
  11. 11. L. Ferretti, C. Wymant, M. Kendall, L. Zhao, A. Nurtay, L. Abeler-Dörner, M. Parker, D. Bonsall, and C. Fraser, “Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing,” Science 368, 619 (2020). https://doi.org/10.1126/science.abb6936, Google ScholarCrossref
  12. 12. M. Martcheva, An Introduction to Mathematical Epidemiology (Springer, New York, 2015). Google ScholarCrossref
  13. 13. G. Chowell, L. Sattenspiel, S. Bansal, and C. Viboud, “Mathematical models to characterize early epidemic growth: A review,” Phys. Life Rev. 18, 66–97 (2016). https://doi.org/10.1016/j.plrev.2016.07.005, Google ScholarCrossref
  14. 14. M. Small and D. Cavanagh, “Modelling strong control measures for epidemic propagation with networks: A COVID-19 case study,” arXiv:2004.10396v4 (2020). Google Scholar
  15. 15. D. Adam, “The limits of R,” Nature 583, 346–348 (2020). https://doi.org/10.1038/d41586-020-02009-w, Google ScholarCrossref
  16. 16. D. Faranda, I. P. Castillo, O. Hulme, A. Jezequel, J. S. W. Lamb, Y. Sato, and E. L. Thompson, “Asymptotic estimates of SARS-CoV-2 infection counts and their sensitivity to stochastic perturbation,” Chaos 30, 051107 (2020). https://doi.org/10.1063/5.0008834, Google ScholarScitation
  17. 17. M. D. F. Shirley and S. P. Rushton, “The impacts of network topology on disease spread,” Ecol. Complex. 2, 287–299 (2005). https://doi.org/10.1016/j.ecocom.2005.04.005, Google ScholarCrossref
  18. 18. A. Ganesh, L. Massoulié, and D. Towsley, “The effect of network topology on the spread of epidemics,” in Proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE, 2005). Google Scholar
  19. 19. P. Holme and J. Saramäki, “Temporal networks,” Phys. Rep. 519, 97–125 (2012). https://doi.org/10.1016/j.physrep.2012.03.001, Google ScholarCrossref
  20. 20. N. Masuda, K. Klemm, and V. M. Eguíluz, “Temporal networks: Slowing down diffusion by long lasting interactions,” Phys. Rev. Lett. 111, 188701 (2013). https://doi.org/10.1103/PhysRevLett.111.188701, Google ScholarCrossref
  21. 21. N. Masuda and P. Holme, “Predicting and controlling infectious disease epidemics using temporal networks,” F1000Prime Rep. 5, 6 (2013). https://doi.org/10.12703/P5-6, Google ScholarCrossref
  22. 22. C. Cattuto, W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, and A. Vespignani, “Dynamics of person-to-person interactions from distributed RFID sensor networks,” PLoS One 5, e11596 (2010). https://doi.org/10.1371/journal.pone.0011596, Google ScholarCrossref
  23. 23. L. Isella, J. Stehlé, A. Barrat, C. Cattuto, J.-F. Pinton, and W. Van den Broeck, “What’s in a crowd? Analysis of face-to-face behavioral networks,” J. Theor. Biol. 271, 166–180 (2011). https://doi.org/10.1016/j.jtbi.2010.11.033, Google ScholarCrossref
  24. 24. M. Salathé, M. Kazandjieva, J. W. Lee, P. Levis, M. W. Feldman, and J. H. Jones, “A high-resolution human contact network for infectious disease transmission,” Proc. Natl. Acad. Sci. U.S.A. 107, 22020–22025 (2010). https://doi.org/10.1073/pnas.1009094108, Google ScholarCrossref
  25. 25. A. Stopczynski, V. Sekara, P. Sapiezynski, A. Cuttone, M. M. Madsen, J. E. Larsen, and S. Lehmann, “Measuring large-scale social networks with high resolution,” PLoS One 9, e95978 (2014). https://doi.org/10.1371/journal.pone.0095978, Google ScholarCrossref
  26. 26. P. Holme, “Temporal network structures controlling disease spreading,” Phys. Rev. E 94, 022305 (2016). https://doi.org/10.1103/PhysRevE.94.022305, Google ScholarCrossref
  27. 27. I. Scholtes, N. Wider, R. Pfitzner, A. Garas, C. J. Tessone, and F. Schweitzer, “Causality-driven slow-down and speed-up of diffusion in non-Markovian temporal networks,” Nat. Commun. 5, 5024 (2014). https://doi.org/10.1038/ncomms6024, Google ScholarCrossref
  28. 28. J. P. Rodríguez, F. Ghanbarnejad, and V. M. Eguíluz, “Risk of coinfection outbreaks in temporal networks: A case study of a hospital contact network,” Front. Phys. 5, 46 (2017). https://doi.org/10.3389/fphy.2017.00046, Google ScholarCrossref
  29. 29. P. H. Leslie, “On the use of matrices in certain population mathematics,” Biometrika 33, 183–212 (1945). https://doi.org/10.1093/biomet/33.3.183, Google ScholarCrossref
  30. 30. J. Gani and L. Stals, see https://openresearch-repository.anu.edu.au/bitstream/1885/73112/9/01_Gani_A_Leslie_Matrix_2013.pdf for “A Leslie matrix approach to an age-structured epidemic” (last accessed May 2, 2020). Google Scholar
  31. 31. D. R. Edmunds, M. J. Kauffman, B. A. Schumaker, F. G. Lindzey, W. E. Cook, T. J. Kreeger, R. G. Grogan, and T. E. Cornish, “Chronic wasting disease drives population decline of white-tailed deer,” PLoS One 11, e0161127 (2016). https://doi.org/10.1371/journal.pone.0161127, Google ScholarCrossref
  32. 32. H. Nishiura, N. M. Linton, and A. R. Akhmetzhanov, “Serial interval of novel coronavirus (COVID-19) infections,” Int. J. Infect. Dis. 93, 284–286 (2020). https://doi.org/10.1016/j.ijid.2020.02.060, Google ScholarCrossref
  33. 33. A.-L. Barabási and R. Albert, “Emergence of scaling in random networks,” Science 286, 509–512 (1999). https://doi.org/10.1126/science.286.5439.509, Google ScholarCrossref
  34. 34. D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small-world’ networks,” Nature 393, 440–442 (1998). https://doi.org/10.1038/30918, Google ScholarCrossref
  35. 35. M. Karsai, M. Kivelä, R. K. Pan, K. Kaski, J. Kertész, A.-L. Barabási, and J. Saramäki, “Small but slow world: How network topology and burstiness slow down spreading,” Phys. Rev. E 83, 025102 (2011). https://doi.org/10.1103/PhysRevE.83.025102, Google ScholarCrossref
  36. 36. D.-W. Huang and Z.-G. Yu, “Dynamic-sensitive centrality of nodes in temporal networks,” Sci. Rep. 7, 41454 (2017). https://doi.org/10.1038/srep41454, Google ScholarCrossref
  37. 37. S. Thurner, R. Hanel, and P. Klimek, Introduction to the Theory of Complex Systems (Oxford University Press, Oxford, 2018). Google ScholarCrossref
  38. 38. K. Prem, A. R. Cook, and M. Jit, “Projecting social contact matrices in 152 countries using contact surveys and demographic data,” PLoS Comput. Biol. 13, e1005697 (2017). https://doi.org/10.1371/journal.pcbi.1005697, Google ScholarCrossref
  39. 39. United Nations, Department of Economic and Social Affairs, Population Division, see https://population.un.org/wpp/DataQuery/ for World Population Prospects 2019; accessed 17 July 2020. Google Scholar
  40. 40. P. Vanhems, A. Barrat, C. Cattuoto, J.-F. Pinton, N. Khanafer, C. Régis, B.-A. Kim, B. Comte, and N. Voirin, “Estimating potential infection transmission routes in hospital wards using wearable proximity sensors,” PLoS One 8, e73970 (2013). https://doi.org/10.1371/journal.pone.0073970, Google ScholarCrossref
  41. 41. L. Speidel, K. Klemm, V. M. Eguíluz, and N. Masuda, “Temporal interactions facilitate endemicity in the susceptible-infected-susceptible epidemic model,” New J. Phys. 18, 073013 (2016). https://doi.org/10.1088/1367-2630/18/7/073013, Google ScholarCrossref
  42. 42. R. Poastor-Satorras, C. Castellano, P. Van Mieghem, and A. Verspignani, “Epidemic processes in complex networks,” Rev. Mod. Phys. 87, 925–979 (2015). https://doi.org/10.1103/RevModPhys.87.925, Google ScholarCrossref
  43. 43. F. V. Surano, C. Bongiorno, L. Zino, M. Porfini, and A. Rizzo, “Backbone reconstruction in temporal networks from epidemic data,” Phys. Rev. E 100, 042306 (2019). https://doi.org/10.1103/PhysRevE.100.042306, Google ScholarCrossref
  44. 44. M. Bodych, N. Ganguly, T. Krueger, A. Mukherjee, and R. Siegmung-Shultze, “Threshold-based epidemic dynamics in systems with memory,” Europhys. Lett. 116, 48004 (2016). https://doi.org/10.1209/0295-5075/116/48004, Google ScholarCrossref
  45. 45. M. Tizzani, “Dynamical processes and memory effects on temporal networks,” Ph.D. thesis (Università di Parma, 2019). Google Scholar
  46. 46. T. Hiraoka and H.-H. Jo, “Correlated bursts in temporal networks slow down spreading,” Sci. Rep. 8, 15321 (2018). https://doi.org/10.1038/s41598-018-33700-8, Google ScholarCrossref
  47. 47. M. Saito, Gyoretsu No Kaisekigaku (Calculus of Matrices) (Tokyo Tosho, Tokyo, 2017) (in Japanese). Google Scholar
  48. 48. G. Strang, Linear Algebra and Its Applications, 4th ed. (Thomson Brooks, Belmont, CA, 2006). Google Scholar
  1. All article content, except where otherwise noted, is licensed under a Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).