35,290 research outputs found

    Decision Support Software for Probabilistic Risk Assessment Using Bayesian Networks

    Get PDF

    Quantifying uncertainty in pest risk maps and assessments : adopting a risk-averse decision maker’s perspective

    Get PDF
    Pest risk maps are important decision support tools when devising strategies to minimize introductions of invasive organisms and mitigate their impacts. When possible management responses to an invader include costly or socially sensitive activities, decision-makers tend to follow a more certain (i.e., risk-averse) course of action. We presented a new mapping technique that assesses pest invasion risk from the perspective of a risk-averse decision maker. We demonstrated the method by evaluating the likelihood that an invasive forest pest will be transported to one of the U.S. states or Canadian provinces in infested firewood by visitors to U.S. federal campgrounds. We tested the impact of the risk aversion assumption using distributions of plausible pest arrival scenarios generated with a geographically explicit model developed from data documenting camper travel across the study area. Next, we prioritized regions of high and low pest arrival risk via application of two stochastic ordering techniques that employed, respectively, first- and second-degree stochastic dominance rules, the latter of which incorporated the notion of risk aversion. We then identified regions in the study area where the pest risk value changed considerably after incorporating risk aversion. While both methods identified similar areas of highest and lowest risk, they differed in how they demarcated moderate-risk areas. In general, the second-order stochastic dominance method assigned lower risk rankings to moderate-risk areas. Overall, this new method offers a better strategy to deal with the uncertainty typically associated with risk assessments and provides a tractable way to incorporate decisionmaking preferences into final risk estimates, and thus helps to better align these estimates with particular decision-making scenarios about a pest organism of concern. Incorporation of risk aversion also helps prioritize the set of locations to target for inspections and outreach activities, which can be costly. Our results are especially important and useful given the huge number of camping trips that occur each year in the United States and Canada

    The Programmable City

    Get PDF
    AbstractThe worldwide proliferation of mobile connected devices has brought about a revolution in the way we live, and will inevitably guide the way in which we design the cities of the future. However, designing city-wide systems poses a new set of challenges in terms of scale, manageability and citizen involvement. Solving these challenges is crucial to making sure that the vision of a programmable Internet of Things (IoT) becomes reality. In this article we will analyse these issues and present a novel programming approach to designing scalable systems for the Internet of Things, with an emphasis on smart city applications, that addresses these issues

    Quantifying uncertainty in pest risk maps and assessments : adopting a risk-averse decision maker’s perspective

    Get PDF
    Pest risk maps are important decision support tools when devising strategies to minimize introductions of invasive organisms and mitigate their impacts. When possible management responses to an invader include costly or socially sensitive activities, decision-makers tend to follow a more certain (i.e., risk-averse) course of action. We presented a new mapping technique that assesses pest invasion risk from the perspective of a risk-averse decision maker. We demonstrated the method by evaluating the likelihood that an invasive forest pest will be transported to one of the U.S. states or Canadian provinces in infested firewood by visitors to U.S. federal campgrounds. We tested the impact of the risk aversion assumption using distributions of plausible pest arrival scenarios generated with a geographically explicit model developed from data documenting camper travel across the study area. Next, we prioritized regions of high and low pest arrival risk via application of two stochastic ordering techniques that employed, respectively, first- and second-degree stochastic dominance rules, the latter of which incorporated the notion of risk aversion. We then identified regions in the study area where the pest risk value changed considerably after incorporating risk aversion. While both methods identified similar areas of highest and lowest risk, they differed in how they demarcated moderate-risk areas. In general, the second-order stochastic dominance method assigned lower risk rankings to moderate-risk areas. Overall, this new method offers a better strategy to deal with the uncertainty typically associated with risk assessments and provides a tractable way to incorporate decisionmaking preferences into final risk estimates, and thus helps to better align these estimates with particular decision-making scenarios about a pest organism of concern. Incorporation of risk aversion also helps prioritize the set of locations to target for inspections and outreach activities, which can be costly. Our results are especially important and useful given the huge number of camping trips that occur each year in the United States and Canada

    Bibliometrics of systematic reviews : analysis of citation rates and journal impact factors

    Get PDF
    Background: Systematic reviews are important for informing clinical practice and health policy. The aim of this study was to examine the bibliometrics of systematic reviews and to determine the amount of variance in citations predicted by the journal impact factor (JIF) alone and combined with several other characteristics. Methods: We conducted a bibliometric analysis of 1,261 systematic reviews published in 2008 and the citations to them in the Scopus database from 2008 to June 2012. Potential predictors of the citation impact of the reviews were examined using descriptive, univariate and multiple regression analysis. Results: The mean number of citations per review over four years was 26.5 (SD +/-29.9) or 6.6 citations per review per year. The mean JIF of the journals in which the reviews were published was 4.3 (SD +/-4.2). We found that 17% of the reviews accounted for 50% of the total citations and 1.6% of the reviews were not cited. The number of authors was correlated with the number of citations (r = 0.215, P =5.16) received citations in the bottom quartile (eight or fewer), whereas 9% of reviews published in the lowest JIF quartile (<=2.06) received citations in the top quartile (34 or more). Six percent of reviews in journals with no JIF were also in the first quartile of citations. Conclusions: The JIF predicted over half of the variation in citations to the systematic reviews. However, the distribution of citations was markedly skewed. Some reviews in journals with low JIFs were well-cited and others in higher JIF journals received relatively few citations; hence the JIF did not accurately represent the number of citations to individual systematic reviews

    Are developers fixing their own bugs?: Tracing bug-fixing and bug-seeding committers

    Get PDF
    This is the post-print version of the Article. The official published version can be accessed from the link below - Copyright @ 2011 IGI GlobalThe process of fixing software bugs plays a key role in the maintenance activities of a software project. Ideally, code ownership and responsibility should be enforced among developers working on the same artifacts, so that those introducing buggy code could also contribute to its fix. However, especially in FLOSS projects, this mechanism is not clearly understood: in particular, it is not known whether those contributors fixing a bug are the same introducing and seeding it in the first place. This paper analyzes the comm-central FLOSS project, which hosts part of the Thunderbird, SeaMonkey, Lightning extensions and Sunbird projects from the Mozilla community. The analysis is focused at the level of lines of code and it uses the information stored in the source code management system. The results of this study show that in 80% of the cases, the bug-fixing activity involves source code modified by at most two developers. It also emerges that the developers fixing the bug are only responsible for 3.5% of the previous modifications to the lines affected; this implies that the other developers making changes to those lines could have made that fix. In most of the cases the bug fixing process in comm-central is not carried out by the same developers than those who seeded the buggy code.This work has been partially funded by the European Commission, under the ALERT project (ICT-258098)
    corecore