Serveur d'exploration sur les relations entre la France et l'Australie

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Epidemic Contact Tracing via Communication Traces

Identifieur interne : 002A11 ( Pmc/Curation ); précédent : 002A10; suivant : 002A12

Epidemic Contact Tracing via Communication Traces

Auteurs : Katayoun Farrahi [Royaume-Uni] ; Rémi Emonet [France] ; Manuel Cebrian [États-Unis, Australie]

Source :

RBID : PMC:4006791

Abstract

Traditional contact tracing relies on knowledge of the interpersonal network of physical interactions, where contagious outbreaks propagate. However, due to privacy constraints and noisy data assimilation, this network is generally difficult to reconstruct accurately. Communication traces obtained by mobile phones are known to be good proxies for the physical interaction network, and they may provide a valuable tool for contact tracing. Motivated by this assumption, we propose a model for contact tracing, where an infection is spreading in the physical interpersonal network, which can never be fully recovered; and contact tracing is occurring in a communication network which acts as a proxy for the first. We apply this dual model to a dataset covering 72 students over a 9 month period, for which both the physical interactions as well as the mobile communication traces are known. Our results suggest that a wide range of contact tracing strategies may significantly reduce the final size of the epidemic, by mainly affecting its peak of incidence. However, we find that for low overlap between the face-to-face and communication interaction network, contact tracing is only efficient at the beginning of the outbreak, due to rapidly increasing costs as the epidemic evolves. Overall, contact tracing via mobile phone communication traces may be a viable option to arrest contagious outbreaks.


Url:
DOI: 10.1371/journal.pone.0095133
PubMed: 24787614
PubMed Central: 4006791

Links toward previous steps (curation, corpus...)


Links to Exploration step

PMC:4006791

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Epidemic Contact Tracing via Communication Traces</title>
<author>
<name sortKey="Farrahi, Katayoun" sort="Farrahi, Katayoun" uniqKey="Farrahi K" first="Katayoun" last="Farrahi">Katayoun Farrahi</name>
<affiliation wicri:level="1">
<nlm:aff id="aff1">
<addr-line>Department of Computing, Goldsmiths, University of London, London, United Kingdom</addr-line>
</nlm:aff>
<country xml:lang="fr">Royaume-Uni</country>
<wicri:regionArea>Department of Computing, Goldsmiths, University of London, London</wicri:regionArea>
</affiliation>
</author>
<author>
<name sortKey="Emonet, Remi" sort="Emonet, Remi" uniqKey="Emonet R" first="Rémi" last="Emonet">Rémi Emonet</name>
<affiliation wicri:level="1">
<nlm:aff id="aff2">
<addr-line>Department of Machine Learning, Laboratoire Hubert Curien, Saint-Etienne, France</addr-line>
</nlm:aff>
<country xml:lang="fr">France</country>
<wicri:regionArea>Department of Machine Learning, Laboratoire Hubert Curien, Saint-Etienne</wicri:regionArea>
</affiliation>
</author>
<author>
<name sortKey="Cebrian, Manuel" sort="Cebrian, Manuel" uniqKey="Cebrian M" first="Manuel" last="Cebrian">Manuel Cebrian</name>
<affiliation wicri:level="1">
<nlm:aff id="aff3">
<addr-line>Media Laboratory, Massachusetts Institute of Technology, Cambridge, Massachusetts, United States of America</addr-line>
</nlm:aff>
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Media Laboratory, Massachusetts Institute of Technology, Cambridge, Massachusetts</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<nlm:aff id="aff4">
<addr-line>Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California, United States of America</addr-line>
</nlm:aff>
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<nlm:aff id="aff5">
<addr-line>National Information and Communications Technology Australia, Melbourne, Victoria, Australia</addr-line>
</nlm:aff>
<country xml:lang="fr">Australie</country>
<wicri:regionArea>National Information and Communications Technology Australia, Melbourne, Victoria</wicri:regionArea>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">24787614</idno>
<idno type="pmc">4006791</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4006791</idno>
<idno type="RBID">PMC:4006791</idno>
<idno type="doi">10.1371/journal.pone.0095133</idno>
<date when="2014">2014</date>
<idno type="wicri:Area/Pmc/Corpus">002B61</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">002B61</idno>
<idno type="wicri:Area/Pmc/Curation">002A11</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Curation">002A11</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">Epidemic Contact Tracing via Communication Traces</title>
<author>
<name sortKey="Farrahi, Katayoun" sort="Farrahi, Katayoun" uniqKey="Farrahi K" first="Katayoun" last="Farrahi">Katayoun Farrahi</name>
<affiliation wicri:level="1">
<nlm:aff id="aff1">
<addr-line>Department of Computing, Goldsmiths, University of London, London, United Kingdom</addr-line>
</nlm:aff>
<country xml:lang="fr">Royaume-Uni</country>
<wicri:regionArea>Department of Computing, Goldsmiths, University of London, London</wicri:regionArea>
</affiliation>
</author>
<author>
<name sortKey="Emonet, Remi" sort="Emonet, Remi" uniqKey="Emonet R" first="Rémi" last="Emonet">Rémi Emonet</name>
<affiliation wicri:level="1">
<nlm:aff id="aff2">
<addr-line>Department of Machine Learning, Laboratoire Hubert Curien, Saint-Etienne, France</addr-line>
</nlm:aff>
<country xml:lang="fr">France</country>
<wicri:regionArea>Department of Machine Learning, Laboratoire Hubert Curien, Saint-Etienne</wicri:regionArea>
</affiliation>
</author>
<author>
<name sortKey="Cebrian, Manuel" sort="Cebrian, Manuel" uniqKey="Cebrian M" first="Manuel" last="Cebrian">Manuel Cebrian</name>
<affiliation wicri:level="1">
<nlm:aff id="aff3">
<addr-line>Media Laboratory, Massachusetts Institute of Technology, Cambridge, Massachusetts, United States of America</addr-line>
</nlm:aff>
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Media Laboratory, Massachusetts Institute of Technology, Cambridge, Massachusetts</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<nlm:aff id="aff4">
<addr-line>Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California, United States of America</addr-line>
</nlm:aff>
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<nlm:aff id="aff5">
<addr-line>National Information and Communications Technology Australia, Melbourne, Victoria, Australia</addr-line>
</nlm:aff>
<country xml:lang="fr">Australie</country>
<wicri:regionArea>National Information and Communications Technology Australia, Melbourne, Victoria</wicri:regionArea>
</affiliation>
</author>
</analytic>
<series>
<title level="j">PLoS ONE</title>
<idno type="eISSN">1932-6203</idno>
<imprint>
<date when="2014">2014</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>Traditional contact tracing relies on knowledge of the interpersonal network of physical interactions, where contagious outbreaks propagate. However, due to privacy constraints and noisy data assimilation, this network is generally difficult to reconstruct accurately. Communication traces obtained by mobile phones are known to be good proxies for the physical interaction network, and they may provide a valuable tool for contact tracing. Motivated by this assumption, we propose a model for contact tracing, where an infection is spreading in the physical interpersonal network, which can never be fully recovered; and contact tracing is occurring in a communication network which acts as a proxy for the first. We apply this dual model to a dataset covering 72 students over a 9 month period, for which both the physical interactions as well as the mobile communication traces are known. Our results suggest that a wide range of contact tracing strategies may significantly reduce the final size of the epidemic, by mainly affecting its peak of incidence. However, we find that for low overlap between the face-to-face and communication interaction network, contact tracing is only efficient at the beginning of the outbreak, due to rapidly increasing costs as the epidemic evolves. Overall, contact tracing via mobile phone communication traces may be a viable option to arrest contagious outbreaks.</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Salathe, M" uniqKey="Salathe M">M Salathé</name>
</author>
<author>
<name sortKey="Freifeld, Cc" uniqKey="Freifeld C">CC Freifeld</name>
</author>
<author>
<name sortKey="Mekaru, Sr" uniqKey="Mekaru S">SR Mekaru</name>
</author>
<author>
<name sortKey="Tomasulo, Af" uniqKey="Tomasulo A">AF Tomasulo</name>
</author>
<author>
<name sortKey="Brownstein, Js" uniqKey="Brownstein J">JS Brownstein</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Balcan, D" uniqKey="Balcan D">D Balcan</name>
</author>
<author>
<name sortKey="Vespignani, A" uniqKey="Vespignani A">A Vespignani</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Balcan, D" uniqKey="Balcan D">D Balcan</name>
</author>
<author>
<name sortKey="Goncalves, B" uniqKey="Goncalves B">B Gonçalves</name>
</author>
<author>
<name sortKey="Hu, H" uniqKey="Hu H">H Hu</name>
</author>
<author>
<name sortKey="Ramasco, Jj" uniqKey="Ramasco J">JJ Ramasco</name>
</author>
<author>
<name sortKey="Colizza, V" uniqKey="Colizza V">V Colizza</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Balcan, D" uniqKey="Balcan D">D Balcan</name>
</author>
<author>
<name sortKey="Colizza, V" uniqKey="Colizza V">V Colizza</name>
</author>
<author>
<name sortKey="Goncalves, B" uniqKey="Goncalves B">B Gonçalves</name>
</author>
<author>
<name sortKey="Hu, H" uniqKey="Hu H">H Hu</name>
</author>
<author>
<name sortKey="Ramasco, Jj" uniqKey="Ramasco J">JJ Ramasco</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Eagle, N" uniqKey="Eagle N">N Eagle</name>
</author>
<author>
<name sortKey="Pentland, As" uniqKey="Pentland A">AS Pentland</name>
</author>
<author>
<name sortKey="Lazer, D" uniqKey="Lazer D">D Lazer</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Jones, Jj" uniqKey="Jones J">JJ Jones</name>
</author>
<author>
<name sortKey="Settle, Je" uniqKey="Settle J">JE Settle</name>
</author>
<author>
<name sortKey="Bond, Rm" uniqKey="Bond R">RM Bond</name>
</author>
<author>
<name sortKey="Fariss, Cj" uniqKey="Fariss C">CJ Fariss</name>
</author>
<author>
<name sortKey="Marlow, C" uniqKey="Marlow C">C Marlow</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Salathe, M" uniqKey="Salathe M">M Salathé</name>
</author>
<author>
<name sortKey="Jones, Jh" uniqKey="Jones J">JH Jones</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Salathe, M" uniqKey="Salathe M">M Salathé</name>
</author>
<author>
<name sortKey="Kazandjieva, M" uniqKey="Kazandjieva M">M Kazandjieva</name>
</author>
<author>
<name sortKey="Lee, Jw" uniqKey="Lee J">JW Lee</name>
</author>
<author>
<name sortKey="Levis, P" uniqKey="Levis P">P Levis</name>
</author>
<author>
<name sortKey="Feldman, Mw" uniqKey="Feldman M">MW Feldman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Stehle, J" uniqKey="Stehle J">J Stehlé</name>
</author>
<author>
<name sortKey="Voirin, N" uniqKey="Voirin N">N Voirin</name>
</author>
<author>
<name sortKey="Barrat, A" uniqKey="Barrat A">A Barrat</name>
</author>
<author>
<name sortKey="Cattuto, C" uniqKey="Cattuto C">C Cattuto</name>
</author>
<author>
<name sortKey="Colizza, V" uniqKey="Colizza V">V Colizza</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Isella, L" uniqKey="Isella L">L Isella</name>
</author>
<author>
<name sortKey="Romano, M" uniqKey="Romano M">M Romano</name>
</author>
<author>
<name sortKey="Barrat, A" uniqKey="Barrat A">A Barrat</name>
</author>
<author>
<name sortKey="Cattuto, C" uniqKey="Cattuto C">C Cattuto</name>
</author>
<author>
<name sortKey="Colizza, V" uniqKey="Colizza V">V Colizza</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wesolowski, A" uniqKey="Wesolowski A">A Wesolowski</name>
</author>
<author>
<name sortKey="Eagle, N" uniqKey="Eagle N">N Eagle</name>
</author>
<author>
<name sortKey="Tatem, Aj" uniqKey="Tatem A">AJ Tatem</name>
</author>
<author>
<name sortKey="Smith, Dl" uniqKey="Smith D">DL Smith</name>
</author>
<author>
<name sortKey="Noor, Am" uniqKey="Noor A">AM Noor</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Eames, Kt" uniqKey="Eames K">KT Eames</name>
</author>
<author>
<name sortKey="Keeling, Mj" uniqKey="Keeling M">MJ Keeling</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Crandall, Dj" uniqKey="Crandall D">DJ Crandall</name>
</author>
<author>
<name sortKey="Backstrom, L" uniqKey="Backstrom L">L Backstrom</name>
</author>
<author>
<name sortKey="Cosley, D" uniqKey="Cosley D">D Cosley</name>
</author>
<author>
<name sortKey="Suri, S" uniqKey="Suri S">S Suri</name>
</author>
<author>
<name sortKey="Huttenlocher, D" uniqKey="Huttenlocher D">D Huttenlocher</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Tsimring, L" uniqKey="Tsimring L">L Tsimring</name>
</author>
<author>
<name sortKey="Huerta, R" uniqKey="Huerta R">R Huerta</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Madan, A" uniqKey="Madan A">A Madan</name>
</author>
<author>
<name sortKey="Cebrian, M" uniqKey="Cebrian M">M Cebrian</name>
</author>
<author>
<name sortKey="Moturu, S" uniqKey="Moturu S">S Moturu</name>
</author>
<author>
<name sortKey="Farrahi, K" uniqKey="Farrahi K">K Farrahi</name>
</author>
<author>
<name sortKey="Pentland, S" uniqKey="Pentland S">S Pentland</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">PLoS One</journal-id>
<journal-id journal-id-type="iso-abbrev">PLoS ONE</journal-id>
<journal-id journal-id-type="publisher-id">plos</journal-id>
<journal-id journal-id-type="pmc">plosone</journal-id>
<journal-title-group>
<journal-title>PLoS ONE</journal-title>
</journal-title-group>
<issn pub-type="epub">1932-6203</issn>
<publisher>
<publisher-name>Public Library of Science</publisher-name>
<publisher-loc>San Francisco, USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">24787614</article-id>
<article-id pub-id-type="pmc">4006791</article-id>
<article-id pub-id-type="publisher-id">PONE-D-13-30076</article-id>
<article-id pub-id-type="doi">10.1371/journal.pone.0095133</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Research Article</subject>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Biology and Life Sciences</subject>
<subj-group>
<subject>Population Biology</subject>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Computer and Information Sciences</subject>
<subj-group>
<subject>Computer Modeling</subject>
</subj-group>
<subj-group>
<subject>Information Technology</subject>
<subj-group>
<subject>Data Mining</subject>
</subj-group>
</subj-group>
<subj-group>
<subject>Network Analysis</subject>
<subj-group>
<subject>Social Networks</subject>
</subj-group>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Engineering and Technology</subject>
<subj-group>
<subject>Signal Processing</subject>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Medicine and Health Sciences</subject>
<subj-group>
<subject>Epidemiology</subject>
<subj-group>
<subject>Infectious Disease Epidemiology</subject>
<subject>Social Epidemiology</subject>
<subject>Spatial Epidemiology</subject>
</subj-group>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Social Sciences</subject>
<subj-group>
<subject>Sociology</subject>
<subj-group>
<subject>Communications</subject>
<subject>Social Mobility</subject>
</subj-group>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Epidemic Contact Tracing via Communication Traces</article-title>
<alt-title alt-title-type="running-head">Epidemic Contact Tracing via Communication Traces</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Farrahi</surname>
<given-names>Katayoun</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="cor1">
<sup>*</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Emonet</surname>
<given-names>Rémi</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Cebrian</surname>
<given-names>Manuel</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
<xref ref-type="aff" rid="aff4">
<sup>4</sup>
</xref>
<xref ref-type="aff" rid="aff5">
<sup>5</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<label>1</label>
<addr-line>Department of Computing, Goldsmiths, University of London, London, United Kingdom</addr-line>
</aff>
<aff id="aff2">
<label>2</label>
<addr-line>Department of Machine Learning, Laboratoire Hubert Curien, Saint-Etienne, France</addr-line>
</aff>
<aff id="aff3">
<label>3</label>
<addr-line>Media Laboratory, Massachusetts Institute of Technology, Cambridge, Massachusetts, United States of America</addr-line>
</aff>
<aff id="aff4">
<label>4</label>
<addr-line>Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California, United States of America</addr-line>
</aff>
<aff id="aff5">
<label>5</label>
<addr-line>National Information and Communications Technology Australia, Melbourne, Victoria, Australia</addr-line>
</aff>
<contrib-group>
<contrib contrib-type="editor">
<name>
<surname>Lambiotte</surname>
<given-names>Renaud</given-names>
</name>
<role>Editor</role>
<xref ref-type="aff" rid="edit1"></xref>
</contrib>
</contrib-group>
<aff id="edit1">
<addr-line>University of Namur, Belgium</addr-line>
</aff>
<author-notes>
<corresp id="cor1">* E-mail:
<email>k.farrahi@gold.ac.uk</email>
</corresp>
<fn fn-type="conflict">
<p>
<bold>Competing Interests: </bold>
The authors have declared that no competing interests exist.</p>
</fn>
<fn fn-type="con">
<p>Conceived and designed the experiments: KF RE MC. Performed the experiments: KF RE. Analyzed the data: KF RE MC. Wrote the paper: KF RE MC.</p>
</fn>
</author-notes>
<pub-date pub-type="collection">
<year>2014</year>
</pub-date>
<pub-date pub-type="epub">
<day>1</day>
<month>5</month>
<year>2014</year>
</pub-date>
<volume>9</volume>
<issue>5</issue>
<elocation-id>e95133</elocation-id>
<history>
<date date-type="received">
<day>10</day>
<month>7</month>
<year>2013</year>
</date>
<date date-type="accepted">
<day>24</day>
<month>3</month>
<year>2014</year>
</date>
</history>
<permissions>
<copyright-year>2014</copyright-year>
<copyright-holder>Farrahi et al</copyright-holder>
<license>
<license-p>This is an open-access article distributed under the terms of the
<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License</ext-link>
, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
</license>
</permissions>
<abstract>
<p>Traditional contact tracing relies on knowledge of the interpersonal network of physical interactions, where contagious outbreaks propagate. However, due to privacy constraints and noisy data assimilation, this network is generally difficult to reconstruct accurately. Communication traces obtained by mobile phones are known to be good proxies for the physical interaction network, and they may provide a valuable tool for contact tracing. Motivated by this assumption, we propose a model for contact tracing, where an infection is spreading in the physical interpersonal network, which can never be fully recovered; and contact tracing is occurring in a communication network which acts as a proxy for the first. We apply this dual model to a dataset covering 72 students over a 9 month period, for which both the physical interactions as well as the mobile communication traces are known. Our results suggest that a wide range of contact tracing strategies may significantly reduce the final size of the epidemic, by mainly affecting its peak of incidence. However, we find that for low overlap between the face-to-face and communication interaction network, contact tracing is only efficient at the beginning of the outbreak, due to rapidly increasing costs as the epidemic evolves. Overall, contact tracing via mobile phone communication traces may be a viable option to arrest contagious outbreaks.</p>
</abstract>
<funding-group>
<funding-statement>Manuel Cebrian is funded by the Australian Government as represented by The Department of Broadband, Communications and the Digital Economy, and The Australian Research Council through the ICT Centre of Excellence program. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.</funding-statement>
</funding-group>
<counts>
<page-count count="11"></page-count>
</counts>
</article-meta>
</front>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Asie/explor/AustralieFrV1/Data/Pmc/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002A11 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Curation/biblio.hfd -nk 002A11 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Asie
   |area=    AustralieFrV1
   |flux=    Pmc
   |étape=   Curation
   |type=    RBID
   |clé=     PMC:4006791
   |texte=   Epidemic Contact Tracing via Communication Traces
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/Pmc/Curation/RBID.i   -Sk "pubmed:24787614" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/Pmc/Curation/biblio.hfd   \
       | NlmPubMed2Wicri -a AustralieFrV1 

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Dec 5 10:43:12 2017. Site generation: Tue Mar 5 14:07:20 2024