IEEE Computational Intelligence Magazine - November 2020 - 25

-formulated the R t 's updating function by introducing external factors (e.g. interventions and mobility). Thus, the estimated R t curve is largely constrained by the factors that are
considered in the model.
Data Assimilation [20] lends itself naturally to this problem
since it provides a framework to enable dynamically updating
the model states and parameters when new observations
become available while also taking into account model and
observation uncertainty. Data assimilation technologies, such
as Kalman filter and variational method [21], have been widely used in signal tracking, oceanology, environment monitoring and weather forecasting where physical models and
observation data are assimilated to produce accurate predictions. Data assimilation for epidemiological modeling was first
proposed in [22] where compartment models were used as
the underlying model for assimilation. In [25] and [26], estimating time-varying parameters in the compartment models
was further investigated. To the authors' best knowledge, our
work is the first study to apply data assimilation to the renewal process-based model.

suppression to disentangle the intervention effects. As illustrated in Figure 1, we uste two complementary metrics p t and
D t to model these factors, respectively.
The suppression effects mainly shorten the infectious period
of the infected population, corresponding to the truncation of
b ^ x h along the horizontal axis. We use a time-varying parameter D t to denote the effective infectious window induced by
suppression. The mitigation effects attenuate the overall infectiousness by shielding the susceptible population, corresponding to the scaling in the vertical direction. We introduce another
time-varying parameter p t to describe this attenuation effect
induced by mitigation. Formally, we parameterize the evolution
of the infectiousness profile as:

III. Epidemic Modeling of COVID-19 Transmission

Therefore, the impact of intervention measures on R t
reduction is disentangled: mitigation factor p t attenuates the
overall infectiousness through shielding the susceptible population, and suppression factor D t shortens the infectious period

In this section, we propose a time-varying renewal process with
two complementary parameters p t and D t to model the
evolving infectiousness profile. We adopted a time-varying
renewal process for epidemic modeling. The renewal process
[8] of infectious disease transmission is:
	

where the unit-normalized transmission rate w ^ x h is the probability density function of generation time, i.e. the interval
between the primary infection and the secondary infection. In
the early stage without intervention, the infectiousness profile
remains time-independent as the baseline b 0 ^ x h which
describes the transmission dynamics when the susceptible population is infinite. The corresponding R is the well-known
basic reproduction number R 0. In reality, the infectiousness
profile b ^ x h will evolve with time t, therefore we introduce
b t ^ x h to address the change in its distribution caused by intervention measures.
To quantify the impacts of intervention measures to the
evolution of R t, we propose two factors: mitigation and

0

x
x

1 Dt
(3)
$ Dt

Dt
0

Baseline Infectiveness Profile
β(τ )

0

R $ w ^ x h (2)

b0 ^xh $ pt

R t = p t $ 8b 0 ^ x h dx (4)

	

∞

b^xh =

'

Accordingly, the instantaneous reproductive number R t can
be derived:

I ^ t h = 8I ^t - x h b ^ x h dx (1)

where I ^ t h is the incident infection on time t and b ^ x h is the
infectiousness profile. The infectiousness profile means that a
primary case infected x time ago (i.e. with the infection-age x )
can now generate new secondary cases at a rate of b ^ x h, describing a homogenous mixing process. b ^ x h is related to biological,
behavioral and environmental factors. We can calculate the
reproduction number R as the area under the curve of b ^ x h,
which is the overall number of secondary cases infected by a
primary case. Further, b ^ x h can be rewritten as:
	

bt ^xh =

	

R0 > 1
τ

2m

Mitigation Effect

Suppression Effect

β(τ )

β(τ )
pt
τ

Dt

τ

Instantaneous Infectiveness Profile
β(τ )

Rt < 1
τ
FIGURE 1 Disentangling the reduction of reproduction number into
mitigation and suppression factors.

NOVEMBER 2020 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE

25



IEEE Computational Intelligence Magazine - November 2020

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - November 2020

Contents
IEEE Computational Intelligence Magazine - November 2020 - Cover1
IEEE Computational Intelligence Magazine - November 2020 - Cover2
IEEE Computational Intelligence Magazine - November 2020 - Contents
IEEE Computational Intelligence Magazine - November 2020 - 2
IEEE Computational Intelligence Magazine - November 2020 - 3
IEEE Computational Intelligence Magazine - November 2020 - 4
IEEE Computational Intelligence Magazine - November 2020 - 5
IEEE Computational Intelligence Magazine - November 2020 - 6
IEEE Computational Intelligence Magazine - November 2020 - 7
IEEE Computational Intelligence Magazine - November 2020 - 8
IEEE Computational Intelligence Magazine - November 2020 - 9
IEEE Computational Intelligence Magazine - November 2020 - 10
IEEE Computational Intelligence Magazine - November 2020 - 11
IEEE Computational Intelligence Magazine - November 2020 - 12
IEEE Computational Intelligence Magazine - November 2020 - 13
IEEE Computational Intelligence Magazine - November 2020 - 14
IEEE Computational Intelligence Magazine - November 2020 - 15
IEEE Computational Intelligence Magazine - November 2020 - 16
IEEE Computational Intelligence Magazine - November 2020 - 17
IEEE Computational Intelligence Magazine - November 2020 - 18
IEEE Computational Intelligence Magazine - November 2020 - 19
IEEE Computational Intelligence Magazine - November 2020 - 20
IEEE Computational Intelligence Magazine - November 2020 - 21
IEEE Computational Intelligence Magazine - November 2020 - 22
IEEE Computational Intelligence Magazine - November 2020 - 23
IEEE Computational Intelligence Magazine - November 2020 - 24
IEEE Computational Intelligence Magazine - November 2020 - 25
IEEE Computational Intelligence Magazine - November 2020 - 26
IEEE Computational Intelligence Magazine - November 2020 - 27
IEEE Computational Intelligence Magazine - November 2020 - 28
IEEE Computational Intelligence Magazine - November 2020 - 29
IEEE Computational Intelligence Magazine - November 2020 - 30
IEEE Computational Intelligence Magazine - November 2020 - 31
IEEE Computational Intelligence Magazine - November 2020 - 32
IEEE Computational Intelligence Magazine - November 2020 - 33
IEEE Computational Intelligence Magazine - November 2020 - 34
IEEE Computational Intelligence Magazine - November 2020 - 35
IEEE Computational Intelligence Magazine - November 2020 - 36
IEEE Computational Intelligence Magazine - November 2020 - 37
IEEE Computational Intelligence Magazine - November 2020 - 38
IEEE Computational Intelligence Magazine - November 2020 - 39
IEEE Computational Intelligence Magazine - November 2020 - 40
IEEE Computational Intelligence Magazine - November 2020 - 41
IEEE Computational Intelligence Magazine - November 2020 - 42
IEEE Computational Intelligence Magazine - November 2020 - 43
IEEE Computational Intelligence Magazine - November 2020 - 44
IEEE Computational Intelligence Magazine - November 2020 - 45
IEEE Computational Intelligence Magazine - November 2020 - 46
IEEE Computational Intelligence Magazine - November 2020 - 47
IEEE Computational Intelligence Magazine - November 2020 - 48
IEEE Computational Intelligence Magazine - November 2020 - 49
IEEE Computational Intelligence Magazine - November 2020 - 50
IEEE Computational Intelligence Magazine - November 2020 - 51
IEEE Computational Intelligence Magazine - November 2020 - 52
IEEE Computational Intelligence Magazine - November 2020 - 53
IEEE Computational Intelligence Magazine - November 2020 - 54
IEEE Computational Intelligence Magazine - November 2020 - 55
IEEE Computational Intelligence Magazine - November 2020 - 56
IEEE Computational Intelligence Magazine - November 2020 - 57
IEEE Computational Intelligence Magazine - November 2020 - 58
IEEE Computational Intelligence Magazine - November 2020 - 59
IEEE Computational Intelligence Magazine - November 2020 - 60
IEEE Computational Intelligence Magazine - November 2020 - 61
IEEE Computational Intelligence Magazine - November 2020 - 62
IEEE Computational Intelligence Magazine - November 2020 - 63
IEEE Computational Intelligence Magazine - November 2020 - 64
IEEE Computational Intelligence Magazine - November 2020 - 65
IEEE Computational Intelligence Magazine - November 2020 - 66
IEEE Computational Intelligence Magazine - November 2020 - 67
IEEE Computational Intelligence Magazine - November 2020 - 68
IEEE Computational Intelligence Magazine - November 2020 - 69
IEEE Computational Intelligence Magazine - November 2020 - 70
IEEE Computational Intelligence Magazine - November 2020 - 71
IEEE Computational Intelligence Magazine - November 2020 - 72
IEEE Computational Intelligence Magazine - November 2020 - 73
IEEE Computational Intelligence Magazine - November 2020 - 74
IEEE Computational Intelligence Magazine - November 2020 - 75
IEEE Computational Intelligence Magazine - November 2020 - 76
IEEE Computational Intelligence Magazine - November 2020 - Cover3
IEEE Computational Intelligence Magazine - November 2020 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com