4,085 research outputs found

    Comment: The 2005 Neyman Lecture: Dynamic Indeterminism in Science

    Full text link
    Comment on ``The 2005 Neyman Lecture: Dynamic Indeterminism in Science'' [arXiv:0808.0620]Comment: Published in at http://dx.doi.org/10.1214/07-STS246A the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Selection of Statistical Software for Solving Big Data Problems for Teaching

    Get PDF
    The need for analysts with expertise in big data software is becoming more apparent in 4 today’s society. Unfortunately, the demand for these analysts far exceeds the number 5 available. A potential way to combat this shortage is to identify the software sought by 6 employers and to align this with the software taught by universities. This paper will 7 examine multiple data analysis software – Excel add-ins, SPSS, SAS, Minitab, and R – and 8 it will outline the cost, training, statistical methods/tests/uses, and specific uses within 9 industry for each of these software. It will further explain implications for universities and 10 students (PDF

    Improving Colon Cancer Screening in a Resident Ambulatory Clinic

    Get PDF
    AIM Statement: Our aim at Wednesday JHAP was to increase the rate of colorectal cancer screenings from 44.3% to 60% from September 2016 to May 2017 (9 months)https://jdc.jefferson.edu/patientsafetyposters/1032/thumbnail.jp

    Corpus-Level End-to-End Exploration for Interactive Systems

    Full text link
    A core interest in building Artificial Intelligence (AI) agents is to let them interact with and assist humans. One example is Dynamic Search (DS), which models the process that a human works with a search engine agent to accomplish a complex and goal-oriented task. Early DS agents using Reinforcement Learning (RL) have only achieved limited success for (1) their lack of direct control over which documents to return and (2) the difficulty to recover from wrong search trajectories. In this paper, we present a novel corpus-level end-to-end exploration (CE3) method to address these issues. In our method, an entire text corpus is compressed into a global low-dimensional representation, which enables the agent to gain access to the full state and action spaces, including the under-explored areas. We also propose a new form of retrieval function, whose linear approximation allows end-to-end manipulation of documents. Experiments on the Text REtrieval Conference (TREC) Dynamic Domain (DD) Track show that CE3 outperforms the state-of-the-art DS systems.Comment: Accepted into AAAI 202

    Do Parenting and Family Characteristics Moderate the Relation between Peer Victimization and Antisocial Behavior? A 5‐year Longitudinal Study

    Full text link
    Past research has demonstrated that relationships with peers and parents play salient roles in various child outcomes. However, little research has examined the confluence of these two factors in the context of peer victimization. In particular, little is known about which family and parental factors mitigate or intensify the impact of adverse peer relations. The current study bridged this gap by testing whether maternal support and family conflict moderated the association between peer victimization and antisocial behavior. Moderation effects were found for girls but not boys. Cross‐lagged path analyses of nationally representative longitudinal data (N = 1046; 53 percent boys; Time 1: Mage = 10.7) showed that, among girls, higher levels of maternal warmth and mother–child communication significantly attenuated the link between early peer victimization and later antisocial outcomes. By contrast, greater family conflict significantly increased antisocial outcomes among girls who experienced peer victimization. For boys, early peer victimization significantly predicted antisocial outcomes, regardless of parenting and family factors. All findings remained significant even after controlling for preexisting antisocial tendencies and demographic factors, as well as for the stability of victimization in the model.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/115896/1/sode12118.pd
    • 

    corecore