523 research outputs found

    State Differences in the Application of Medical Frailty under the Affordable Care Act

    Get PDF
    This poster explains a study that examines how states undergoing Medicaid expansion differ in their treatment of the “medically frail” population. The medically frail are individuals who may need the extra benefits offered by traditional Medicaid. The results provide needed information to policymakers that are interested in improving access among vulnerable populations in the 23 states that have not yet implemented Medicaid expansion, but may do so in the future. While regulations provide categories that qualify for medical frailty, each state is free to use their own method of determining who meets the definition. There is a need for ongoing study to determine whether state differences in how medical frailty is addressed are associated with differences in access by persons with high medical need. Presented at the AcademyHealth Annual Research Meeting

    Model Guided Application for Investigating Particle Number (PN) Emissions in GDI Spark Ignition Engines

    Get PDF
    &lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Model guided application (MGA) combining physico-chemical internal combustion engine simulation with advanced analytics offers a robust framework to develop and test particle number (PN) emissions reduction strategies. The digital engineering workflow presented in this paper integrates the &lt;i&gt;k&lt;/i&gt;inetics &amp;amp; SRM Engine Suite with parameter estimation techniques applicable to the simulation of particle formation and dynamics in gasoline direct injection (GDI) spark ignition (SI) engines. The evolution of the particle population characteristics at engine-out and through the sampling system is investigated. The particle population balance model is extended beyond soot to include sulphates and soluble organic fractions (SOF). This particle model is coupled with the gas phase chemistry precursors and is solved using a sectional method. The combustion chamber is divided into a wall zone and a bulk zone and the fuel impingement on the cylinder wall is simulated. The wall zone is responsible for resolving the distribution of equivalence ratios near the wall, a factor that is essential to account for the formation of soot in GDI SI engines. In this work, a stochastic reactor model (SRM) is calibrated to a single-cylinder test engine operated at 12 steady state load-speed operating points. First, the flame propagation model is calibrated using the experimental in-cylinder pressure profiles. Then, the population balance model parameters are calibrated based on the experimental data for particle size distributions from the same operating conditions. Good agreement was obtained for the in-cylinder pressure profiles and gas phase emissions such as NO&lt;sub&gt;x&lt;/sub&gt;. The MGA also employs a reactor network approach to align with the particle sampling measurements procedure, and the influence of dilution ratios and temperature on the PN measurement is investigated. Lastly, the MGA and the measurements procedure are applied to size-resolved chemical characterisation of the emitted particles.&lt;/div&gt;&lt;/div&gt;</jats:p

    Adversarial Initialization - when your network performs the way I want -

    Get PDF
    The increase in computational power and available data has fueled a wide deployment of deep learning in production environments. Despite their successes, deep architectures are still poorly understood and costly to train. We demonstrate in this paper how a simple recipe enables a market player to harm or delay the development of a competing product. Such a threat model is novel and has not been considered so far. We derive the corresponding attacks and show their efficacy both formally and empirically. These attacks only require access to the initial, untrained weights of a network. No knowledge of the problem domain and the data used by the victim is needed. On the initial weights, a mere permutation is sufficient to limit the achieved accuracy to for example 50% on the MNIST dataset or double the needed training time. While we can show straightforward ways to mitigate the attacks, the respective steps are not part of the standard procedure taken by developers so far
    • 

    corecore