Title: Homeland Security What Can Mathematics Do?
1Homeland Security What Can Mathematics Do?
Fred Roberts Chair, Rutgers University Homeland
Security Research Initiative Director, DIMACS
Center
2- Dealing with terrorism requires detailed planning
of preventive measures and responses. - Both require precise reasoning and extensive
analysis.
3- Experimentation or field trials are often
prohibitively expensive or unethical and do not
always lead to fundamental understanding. - Therefore, mathematical modeling becomes an
important experimental and analytical tool.
4- Mathematical models have become important tools
in preparing plans for defense against terrorist
attacks, especially when combined with powerful,
modern computer methods for analyzing and/or
simulating the models.
5What Can Math Models Do For Us?
6What Can Math Models Do For Us?
- Sharpen our understanding of fundamental
processes - Compare alternative policies and interventions
- Help make decisions.
- Prepare responses to terrorist attacks.
- Provide a guide for training exercises and
scenario development. - Guide risk assessment.
- Predict future trends.
7OUTLINE
- Examples of Homeland Security Research at Rutgers
that Use Mathematics - Examples of Research Projects I am Involved in
- One Example in Detail
8OUTLINE
- Examples of Homeland Security Research at Rutgers
that Use Mathematics - Examples of Research Projects I am Involved in
- One Example in Detail
9TRANSPORTATION AND BORDER SECURITY
- Pattern recognition for machine-assisted baggage
searches - The Math Linear algebra Pattern defined as
a vector - Border security decision support software
- The Math Computer models
10TRANSPORTATION AND BORDER SECURITY
- Statistical analysis of flight/aircraft
inspections - The Math Statistics
- Port-of-entry inspection algorithms
- The Math Statistics combinatorial
optimization
11TRANSPORTATION AND BORDER SECURITY
- Vessel tracking for homeland defense
- The Math
- geometry calculus
12COMMUNICATION SECURITY
- Resource-efficient security protocols for
providing data confidentiality and authentication
in cellular, ad hoc, and wireless local area
networks - The Math
- Network Analysis
- Number theory Cryptography
13COMMUNICATION SECURITY
- Exploiting analogies between computer viruses and
biological viruses - The Math Differential equations, dynamical
systems
14COMMUNICATION SECURITY
- Information privacy
- Identity theft
- Privacy of health care data
- The Math
- Number theory (cryptography),
- Statistics
15FOOD AND WATER SUPPLY SECURITY
- Using economic weapons to protect against
agroterrorism - The Math
- Game Theory
- Optimization
16SURVEILLANCE/DETECTION
- Detecting a bioterrorist attack using syndromic
surveillance - The Math
- Statistics, Data Mining, Discrete Math
Anthrax bacillus
17SURVEILLANCE/DETECTION
- Weapons detection and identification (dirty
bombs, plastic explosives) - The Math
- Linear algebra,
- Statistics,
- Data Mining (computer science)
18SURVEILLANCE/DETECTION
- Biometrics
- Face, gait, voice, iris recognition
- Non-verbal behavior detection (lying or telling
the truth?) (applications to interrogation) - The Math
- Optimization, linear algebra, statistics
19RESPONDING TO AN ATTACK
- Exposure/Toxicology
- Modeling dose received
- Rapid risk and exposure characterization
- The Math
- Differential Equations, Probability
20RESPONDING TO AN ATTACK
- Simulating evacuation of complex transportation
facilities - The Math
- Computer simulation
21RESPONDING TO AN ATTACK
- Emergency Communications
- Rapid networking at emergency locations
- Rapid telecollaboration
- The Math
- discrete math, network analysis
22OUTLINE
- Examples of Homeland Security Research at Rutgers
that Use Mathematics - Examples of Research Projects I am Involved in
- One Example in Detail
23The Bioterrorism Sensor Location Problem
24- Early warning is critical
- This is a crucial factor underlying governments
plans to place networks of sensors/detectors to
warn of a bioterrorist attack
The BASIS System
25Two Fundamental Problems
- Sensor Location Problem (SLP)
- Choose an appropriate mix of sensors
- decide where to locate them for best protection
and early warning
26Two Fundamental Problems
- Pattern Interpretation Problem (PIP) When
sensors set off an alarm, help public health
decision makers decide - Has an attack taken place?
- What additional monitoring is needed?
- What was its extent and location?
- What is an appropriate response?
27The Sensor Location Problem Algorithmic Tools
28Algorithmic Approaches I Greedy Algorithms
29Greedy Algorithms
- Find the most important location first and locate
a sensor there. - Find second-most important location.
- Etc.
- Builds on earlier work at Institute for Defense
Analyses (Grotte, Platt) - Steepest ascent approach.
- No guarantee of optimality.
- In practice, gets pretty close to optimal
solution.
30Algorithmic Approaches II Variants of Classic
Facility Location Theory Methods
31Location Theory
- Where to locate facilities to best serve users
- Often deal with a network with vertices, edges,
and distances along edges - Users u1, u2, , un located at vertices
- One approach locate the facility at vertex x
chosen so that - is minimized.
32Location Theory
1s represent distances along edges
33u1
u2
u3
xa ?d(x,ui)1124 xb ?d(x,ui)2013 xc ?
d(x,ui)3104 xd ?d(x,ui)2215 xe ?d(x,ui
)1326 xf ?d(x,ui)0235 xb is optimal
34Algorithmic Approaches II Variants of Classic
Location Theory Methods Complications
- We dont have a network with vertices and edges
we have points in a city - Sensors can only be at certain locations (size,
weight, power source, hiding place) - We need to place more than one sensor
- Instead of users, we have places where
potential attacks take place. - Potential attacks take place with certain
probabilities. - Wind, buildings, mountains, etc. add
complications.
35The Pattern Interpretation Problem
36The Pattern Interpretation Problem
- It will be up to the Decision Maker to decide how
to respond to an alarm from the sensor network.
37Approaching the PIP Minimizing False Alarms
38Approaching the PIP Minimizing False Alarms
- One approach Redundancy. Require two or more
sensors to make a detection before an alarm is
considered confirmed - Require same sensor to register two alarms
Portal Shield requires two positives for the same
agent during a specific time period.
39Approaching the PIP Minimizing False Alarms
- Redundancy II Place two or more sensors at or
near the same location. Require two proximate
sensors to give off an alarm before we consider
it confirmed. - Redundancy drawbacks cost, delay in confirming
an alarm.
40Approaching the PIP Using Decision Rules
- Existing sensors come with a sensitivity level
specified and sound an alarm when the number of
particles collected is sufficiently high above
threshold.
41Approaching the PIP Using Decision Rules
- Let f(x) number of particles collected at
sensor x in the past 24 hours. Sound an alarm if
f(x) gt T. - Alternative decision rule alarm if two sensors
reach 90 of threshold, three reach 75 of
threshold, etc. - Alarm if
- f(x) gt T for some x,
- or if f(x1) gt .9T and f(x2) gt .9T for some
x1,x2, - or if f(x1) gt .75T and f(x2) gt .75T and
f(x3) gt .75T for some x1,x2,x3.
42Monitoring Message Streams Algorithmic Methods
for Automatic Processing of Messages
43Objective
Monitor huge communication streams, in
particular, streams of textualized communication,
to automatically detect pattern changes and
"significant" events
Motivation monitoring email traffic, news,
communiques, faxes, voice intercepts (with speech
recogntion)
44Technical Approaches
- Given stream of text in any language.
- Decide whether "events" are present in the flow
of messages. - Event new topic or topic with unusual level of
activity. - Initial Problem Retrospective or Supervised
Event Identification Classification into
pre-existing classes. Given example messages on
events/topics of interest, algorithm detects
instances in the stream.
45- More Complex Problem Prospective Detection or
Unsupervised Filtering - Classes change - new classes or change meaning
- A difficult problem in statistics
- Recent new C.S. approaches
- Semi-supervised Learning
- Algorithm suggests a possible new event/topic
- Human analyst labels it determines its
significance
46The Approach Bag of Words
- List all the words of interest that may arise in
the messages being studied w1, w2,,wn - Bag of words vector b has k as the ith entry if
word wi appears k times in the message. - Sometimes, use bag of bits Vector of 0s and
1s count 1 if word wi appears in the message, 0
otherwise.
47The Approach Bag of Words
- Key idea how close are two such vectors?
- Known messages have been classified into
different groups group 1, group 2, - A message comes in. Which group should we put it
in? Or is it new? - You look at the bag of words vector associated
with the incoming message and see if fits
closely to typical vectors associated with a
given group.
48The Approach Bag of Words
- Your performance can improve over time.
- You learn how to classify better.
- Typically you do this automatically and try to
program a machine to learn from past data.
49Bag of Words Example
- Words
- w1 bomb, w2 attack, w3 strike
- w4 train, w5 plane, w6 subway
- w7 New York, w8 Los Angeles, w9 Madrid, w10
Tokyo, w11 London - w12 January, w13 March
50Bag of Words
- Message 1
- Strike Madrid trains on March 1.
- Strike Tokyo subway on March 2.
- Strike New York trains on March 11.
- Bag of words b1 (0,0,3,2,0,1,1,0,1,1,0,0,3)
- w1 bomb, w2 attack, w3 strike
- w4 train, w5 plane, w6 subway
- w7 New York, w8 Los Angeles, w9 Madrid, w10
Tokyo, w11 London - w12 January, w13 March
51Bag of Words
- Message 2
- Bomb Madrid trains on March 1.
- Attack Tokyo subway on March 2.
- Strike New York trains on March 11.
- Bag of words b2 (1,1,1,2,0,1,1,0,1,1,0,0,3)
- w1 bomb, w2 attack, w3 strike
- w4 train, w5 plane, w6 subway
- w7 New York, w8 Los Angeles, w9 Madrid, w10
Tokyo, w11 London - w12 January, w13 March
52Bag of Words
- Note that b1 and b2 are close
- b1 (0,0,3,2,0,1,1,0,1,1,0,0,3)
- b2 (1,1,1,2,0,1,1,0,1,1,0,0,3)
- Close could be measured using distance d(b1,b2)
number of places where b1,b2 differ (Hamming
distance between vectors). - Here d(b1,b2) 3
- The messages are similar could belong to the
same class of message.
53Bag of Words
- Message 3
- Go on on strike against Madrid trains on March 1.
- Go on strike against Tokyo subway on March 2.
- Go on strike against New York trains on March 11.
- Bag of words b3 same as b1.
- BUT message 3 is quite different from message
1. - Shows trickiness of problem. Maybe missing some
key words like go or maybe we should use pairs
of words like on strike (bigrams)
54Streaming Data
- We often have just one shot at the data as it
comes streaming by because there is so much of
it. This calls for powerful new algorithms.
55OUTLINE
- Examples of Homeland Security Research at Rutgers
that Use Mathematics - Examples of Research Projects I am Involved in
- One Example in Detail
56Mathematics and Bioterrorism Graph-theoretical
Models of Spread and Control of Disease
57Mathematics and Bioterrorism Graph-theoretical
Models of Spread and Control of Disease
Warning Next Few Slides Contain Graphic Material
58- Great concern about the deliberate introduction
of diseases by bioterrorists has led to new
challenges for mathematical scientists. -
smallpox
59- I got involved right after September 11 and the
anthrax attacks. -
anthrax
60- Bioterrorism issues are typical of many homeland
security issues. - The rest of this talk will emphasize
bioterrorism, but many of the messages apply to
homeland security in general.
Waiting on line to get smallpox vaccine during
New York City smallpox epidemic 1947
61Models of the Spread and Control of Disease
through Social Networks
- Diseases are spread through social networks.
- This is especially relevant to sexually
transmitted diseases such as AIDS. - Contact tracing is an important part of any
strategy to combat outbreaks of diseases such as
smallpox, whether naturally occurring or
resulting from bioterrorist attacks.
62The Basic Model
Social Network Graph Vertices People Edges
contact State of a Vertex simplest model 1
if infected, 0 if not infected (SI Model) More
complex models SI, SEI, SEIR, etc. S
susceptible, E exposed, I infected, R
recovered (or removed)
63Example of a Social Network
64More About States
Once you are infected, can you be cured? If you
are cured, do you become immune or can you
re-enter the infected state? We can build a
directed graph reflecting the possible ways to
move from state to state in the model.
65The State Diagram for a Smallpox Model
The following diagram is from a Kaplan-Craft-Wein
(2002) model for comparing alternative responses
to a smallpox attack. This has been considered by
the Centers for Disease Control (CDC) and Office
of Emergency Preparedness in Dept. of Health and
Human Services.
66(No Transcript)
67The Stages
- Row 1 Untraced and in various stages of
susceptibility or infectiousness. - Row 2 Traced and in various stages of the queue
for vaccination. - Row 3 Unsuccessfully vaccinated and in various
stages of infectiousness. - Row 4 Successfully vaccinated dead
68Moving From State to State
Let si(t) give the state of vertex i at time
t. Two states 0 and 1. Times are discrete t
0, 1, 2,
69Threshold Processes
Basic k-Threshold Process You change your state
at time t1 if at least k of your neighbors
have the opposite state at time t. Disease
interpretation? Cure if sufficiently many of your
neighbors are uninfected. Does this make sense?
70Threshold Processes II
Irreversible k-Threshold Process You change
your state from 0 to 1 at time t1 if at
least k of your neighbors have state 1 at
time t. You never leave state 1. Disease
interpretation? Infected if sufficiently many of
your neighbors are infected. Special Case k
1 Infected if any of your neighbors is
infected.
71Basic 2-Threshold Process
72(No Transcript)
73(No Transcript)
74Irreversible 2-Threshold Process
75(No Transcript)
76(No Transcript)
77Complications to Add to Model
- k 1, but you only get infected with a certain
probability. - You are automatically cured after you are in the
infected state for d time periods. - You become immune from infection (cant re-enter
state 1) once you enter and leave state 1. - A public health authority has the ability to
vaccinate a certain number of vertices, making
them immune from infection.
78Periodicity
State vector s(t) (s1(t), s2(t), ,
sn(t)). First example, s(1) s(3) s(5)
, s(0) s(2) s(4) s(6) Second example
s(1) s(2) s(3) ... In all of these
processes, because there is a finite set of
vertices, for any initial state vector s(0),
the state vector will eventually become periodic,
i.e., for some P and T, s(tP) s(t) for
all t gt T. The smallest such P is called the
period.
79Periodicity II
First example the period is 2. Second example
the period is 1. Both basic and irreversible
threshold processes are special cases of
symmetric synchronous neural networks. Theorem
(Goles and Olivos, Poljak and Sura) For
symmetric, synchronous neural networks, the
period is either 1 or 2.
80Periodicity III
When period is 1, we call the ultimate state
vector a fixed point. When the fixed point is
the vector s(t) (1,1,,1) or (0,0,,0), we
talk about a final common state. One problem of
interest Given a graph, what subsets S of the
vertices can force one of our processes to a
final common state with entries equal to the
state shared by all the vertices in S in the
initial state?
81Periodicity IV
Interpretation Given a graph, what subsets S
of the vertices should we plant a disease with so
that ultimately everyone will get it? (s(t) ?
(1,1,,1)) Economic interpretation What set of
people do we place a new product with to
guarantee saturation of the product in the
population? Interpretation Given a graph, what
subsets S of the vertices should we vaccinate
to guarantee that ultimately everyone will end up
without the disease? (s(t) ? 0,0,,0))
82Conversion Sets
Conversion set Subset S of the vertices that
can force a k-threshold process to a final common
state with entries equal to the state shared by
all the vertices in S in the initial state. (In
other words, if all vertices of S start in same
state x 1 or 0, then the process goes to a
state where all vertices are in state
x.) Irreversible k-conversion set if
irreversible process.
831-Conversion Sets
k 1. What are the conversion sets in a basic
1-threshold process?
841-Conversion Sets
k 1. The only conversion set in a basic
1-threshold process is the set of all vertices.
For, if any two adjacent vertices have 0 and 1 in
the initial state, then they keep switching
between 0 and 1 forever. What are the
irreversible 1-conversion sets?
85Irreversible 1-Conversion Sets
k 1. Every single vertex x is an
irreversible 1-conversion set if the graph is
connected. We make it 1 and eventually all
vertices become 1 by following paths from x.
86Conversion Sets for Odd Cycles
C2p1 2-threshold process. What is a conversion
set?
87Conversion Sets for Odd Cycles
C2p1. 2-threshold process. Place p1 1s in
alternating positions.
88(No Transcript)
89(No Transcript)
90Conversion Sets for Odd Cycles
We have to be careful where we put the initial
1s. p1 1s do not suffice if they are next to
each other.
91(No Transcript)
92(No Transcript)
93Irreversible Conversion Sets for Odd Cycles
What if we want an irreversible conversion set
under an irreversible 2-threshold process? Same
set of p1 vertices is an irreversible
conversion set. Moreover, everyone gets infected
in one step.
94Vaccination Strategies
If you didnt know whom a bioterrorist might
infect, what people would you vaccinate to be
sure that a disease doesnt spread very much?
(Vaccinated vertices stay at state 0 regardless
of the state of their neighbors.) Try odd cycles
again. Consider an irreversible 2-threshold
process. Suppose your adversary has enough supply
to infect two individuals. Strategy 1 Mass
vaccination make everyone 0 and immune in
initial state.
95Vaccination Strategies
In C5, mass vaccination means vaccinate 5
vertices. This obviously works. In practice,
vaccination is only effective with a certain
probability, so results could be different. Can
we do better than mass vaccination? What does
better mean? If vaccine has no cost and is
unlimited and has no side effects, of course we
use mass vaccination.
96Vaccination Strategies
What if vaccine is in limited supply? Suppose we
only have enough vaccine to vaccinate 2
vertices. Consider two different vaccination
strategies
Vaccination Strategy I
Vaccination Strategy II
97Vaccination Strategy I Worst Case (Adversary
Infects Two)Two Strategies for Adversary
Adversary Strategy Ia
Adversary Strategy Ib
98The alternation between your choice of a
defensive strategy and your adversarys choice of
an offensive strategy suggests we consider the
problem from the point of view of game
theory.The Food and Drug Administration is
studying the use of game-theoretic models in the
defense against bioterrorism.
99Vaccination Strategy I Adversary Strategy Ia
100Vaccination Strategy I Adversary Strategy Ib
101Vaccination Strategy II Worst Case (Adversary
Infects Two)Two Strategies for Adversary
Adversary Strategy IIa
Adversary Strategy IIb
102Vaccination Strategy II Adversary Strategy IIa
103Vaccination Strategy II Adversary Strategy IIb
104Conclusions about Strategies I and II
- If you can only vaccinate two individuals
- Vaccination Strategy II never leads to more than
two infected individuals, while Vaccination
Strategy I sometimes leads to three infected
individuals (depending upon strategy used by
adversary). - Thus, Vaccination Strategy II is better.
105k-Conversion Sets
k-conversion sets are complex. Consider the
graph K4 x K2.
106k-Conversion Sets II
Exercise (a). The vertices a, b, c, d, e form a
2-conversion set. (b). However, the vertices
a,b,c,d,e,f do not. Interpretation Immunizing
one more person can be worse! (Planting a
disease with one more person can be worse if you
want to infect everyone.) Note the same does
not hold true for irreversible k-conversion
sets.
107NP-Completeness
Problem Given a positive integer d and a graph
G, does G have a k-conversion set of size at
most d? Theorem (Dreyer 2000) This problem is
NP-complete for fixed k gt 2. (NP-complete
probably implies we will never have an efficient
computer algorithm for solving the
problem.) (Whether or not it is NP-complete for
k 2 remains open.) Same conclusions for
irreversible k-conversion set.
108k-Conversion Sets in Regular Graphs
G is r-regular if every vertex has degree
r. Set of vertices is independent if there are no
edges. Theorem (Dreyer 2000) Let G (V,E)
be a connected r-regular graph and D be a set
of vertices. (a). D is an irreversible
r-conversion set iff V-D is an independent
set. (b). D is an r-conversion set iff V-D
is an independent set and D is not an
independent set.
109k-Conversion Sets in Regular Graphs II
Corollary (Dreyer 2000) (a). The size of the
smallest irreversible 2- conversion set in Cn
is ceilingn/2. (b). The size of the smallest
2-conversion set in Cn is ceiling(n1)/2. ce
ilingx smallest integer at least as big as
x. This result agrees with our observation.
110k-Conversion Sets in Grids
Let G(m,n) be the rectangular grid graph with
m rows and n columns.
G(3,4)
111Toroidal Grids
The toroidal grid T(m,n) is obtained from the
rectangular grid G(m,n) by adding edges from
the first vertex in each row to the last and from
the first vertex in each column to the
last. Toroidal grids are easier to deal with
than rectangular grids because they form regular
graphs Every vertex has degree 4. Thus, we can
make use of the results about regular graphs.
112T(3,4)
1134-Conversion Sets in Toroidal Grids
Theorem (Dreyer 2000) In a toroidal grid T(m,n)
(a). The size of the smallest 4-conversion set
is maxn(ceilingm/2), m(ceilingn/2) m or n
odd mn/2 1 m, n even (b). The size of
the smallest irreversible 4-conversion set is as
above when m or n is odd, and it is mn/2
when m and n are even.
114Part of the Proof Recall that D is an
irreversible 4-conversion set in a 4-regular
graph iff V-D is independent. V-D
independent means that every edge u,v in G
has u or v in D. In particular, the ith row
must contain at least ceilingn/2 vertices in D
and the ith column at least ceilingm/2 vertices
in D (alternating starting with the end vertex of
the row or column). We must cover all rows and
all columns, and so need at least
maxn(ceilingm/2), m(ceilingn/2) vertices
in an irreversible 4-conversion set.
1154-Conversion Sets for Rectangular Grids
More complicated methods give Theorem (Dreyer
2000) The size of the smallest 4-conversion set
and smallest irreversible 4-conversion set in a
grid graph G(m,n) is 2m 2n - 4
floor(m-2)(n-2)/2
1164-Conversion Sets for Rectangular Grids
Consider G(3,3) 2m 2n - 4
floor(m-2)(n-2)/2 8. What is a smallest
4-conversion set and why 8?
1174-Conversion Sets for Rectangular Grids
Consider G(3,3) 2m 2n - 4
floor(m-2)(n-2)/2 8. What is a smallest
4-conversion set and why 8? All boundary
vertices have degree lt 4 and so must be included
in any 4-conversion set. They give a conversion
set.
118More Realistic Models
- Many oversimplifications. For instance
- What if you stay infected only a certain number
of days? - What if you are not necessarily infective for the
first few days you are sick? - What if your threshold k for changes from 0 to 1
changes depending upon how long you have been
uninfected?
119Alternative Models to Explore
Consider an irreversible process in which you
stay in the infected state (state 1) for d time
periods after entering it and then go back to the
uninfected state (state 0). Consider a
k-threshold process in which we vaccinate a
person in state 0 once k-1 neighbors are infected
(in state 1). Etc. -- let your imagination roam
free ...
120More Realistic Models
- Our models are deterministic. How do
probabilities enter? - What if you only get infected with a certain
probability if you meet an infected person? - What if vaccines only work with a certain
probability? - What if the amount of time you remain infective
exhibits a probability distribution?
121Alternative Model to Explore
Consider an irreversible 1-threshold process in
which you stay infected for d time periods and
then enter the uninfected state. Assume that you
get infected with probability p if at least one
of your neighbors is infected. What is the
probability that an epidemic will end with no one
infected?
122The Case d 2, p 1/2
Consider the following initial state
123The Case d 2, p 1/2
With probability 1/2, vertex a does not get
infected at time 1. Similarly for vertex
b. Thus, with probability 1/4, we stay in the
same states at time 1.
124The Case d 2, p 1/2
Suppose vertices are still in same states at time
1 as they were at time 0. With probability 1/2,
vertex a does not get infected at time 2.
Similarly for vertex b. Also after time 1,
vertices c and d have been infected for two
time periods and thus enter the uninfected
state. Thus, with probability 1/4, we get to the
following state at time 2
125(No Transcript)
126The Case d 2, p 1/2
Thus, with probability 1/4 x 1/4 1/16, we
enter this state with no one infected at time
2. However, we might enter this state at a later
time. It is not hard to show (using the theory
of finite Markov chains) that we will end in
state (0,0,0,0). (This is the only absorbing
state in an absorbing Markov chain.). Thus with
probability 1 we will eventually kill the disease
off entirely.
127The Case d 2, p 1/2
Is this realistic? What might we do to modify
the model to make it more realistic?
128How do we Analyze this or More Complex Models for
Graphs?
- Computer simulation is an important tool.
- Example At the Johns Hopkins University and the
Brookings Institution, Donald Burke and Joshua
Epstein have developed a simple model for a
region with two towns totalling 800 people. It
involves a few more probabilistic assumptions
than ours. They use single simulations as a
learning device. They also run large numbers of
simulations and look at averages of outcomes.
129How do we Analyze this or More Complex Models for
Graphs?
- Burke and Epstein are using the model to do what
if experiments - What if we adopt a particular vaccination
strategy? - What happens if we try different plans for
quarantining infectious individuals? - There is much more analysis of a similar nature
that can be done with graph-theoretical models.
130Would Graph Theory help with a deliberate
outbreak of Anthrax?
131- What about a deliberate release of smallpox?
132- Similar approaches, using mathematical models
based on mathematical methods, have proven useful
in many other fields, to -
- make policy
- plan operations
- analyze risk
- compare interventions
- identify the cause of observed events
133- Why shouldnt these approaches work in the
defense against bioterrorism?
134(No Transcript)