275 research outputs found

    Adaptive Variable Selection for Sequential Prediction in Multivariate Dynamic Models

    Full text link
    We discuss Bayesian model uncertainty analysis and forecasting in sequential dynamic modeling of multivariate time series. The perspective is that of a decision-maker with a specific forecasting objective that guides thinking about relevant models. Based on formal Bayesian decision-theoretic reasoning, we develop a time-adaptive approach to exploring, weighting, combining and selecting models that differ in terms of predictive variables included. The adaptivity allows for changes in the sets of favored models over time, and is guided by the specific forecasting goals. A synthetic example illustrates how decision-guided variable selection differs from traditional Bayesian model uncertainty analysis and standard model averaging. An applied study in one motivating application of long-term macroeconomic forecasting highlights the utility of the new approach in terms of improving predictions as well as its ability to identify and interpret different sets of relevant models over time with respect to specific, defined forecasting goals.Comment: 23 pages, 11 figure

    Prior Influence in Bayesian Statistics

    Get PDF
    1 online resource (PDF, 71 pages

    Local Predicitive Influence

    Get PDF
    1 online resource (PDF, 15 pages

    Explaining the Perfect Sampler.

    Get PDF
    In 1996, Propp and Wilson introduced coupling from the past (CFTP), an algorithm for generating a sample from the exact stationary distribution of a Markov chain. In 1998, Fill proposed another so–called perfect sampling algorithm. These algorithms have enormous potential in Markov Chain Monte Carlo (MCMC) problems because they eliminate the need to monitor convergence and mixing of the chain. This article provides a brief introduction to the algorithms, with an emphasis on understanding rather than technical detail.Coupling from the past; Fill's algorithm; Markov Chain Monte Carlo; Stochastic processes;

    Liberty Bell Hospital: A Case Study In Employee Information Systems Fraud

    Get PDF
    Information systems provide an attractive opportunity for dishonest employees in sensitive job positions to develop and implement a fraudulent scheme. Many different types of technical information systems controls help prevent these situations from occurring and can also detect occurrences after they have happened. However, in some cases, employees are able to circumvent critical segregation of duties. In addition, management of a company may override traditional internal controls in order to achieve business objectives. Overriding internal controls can produce an environment that is conducive to fraud.Internal auditors with an information systems specialty can often identify red flags prior to fraudulent acts taking place in the organization. This allows an organization to utilize preventive measures to reduce the likelihood of a fraud occurring. In a specific situation where an information system fraud is suspected, internal auditors are often charged with leading the investigation. This case analyzes an employee fraud involving a breakdown of internal information technology and management controls, falsification of business records, and a lack of segregation of duties. This case is designed for use in either an undergraduate auditing, information systems security, accounting ethics, internal auditing, computer ethics or other related class. Its primary purpose is to introduce students to a very common type of employee fraud and to illustrate how professional guidance can be applied in such a situation. While the case is based on a true situation, all identities have been modified to protect each individuals right to privacy

    Hemlock Woolly Adelgid and Elongate Hemlock Scale Induce Changes in Foliar and Twig Volatiles of Eastern Hemlock

    Get PDF
    Eastern hemlock (Tsuga canadensis) is in rapid decline because of infestation by the invasive hemlock woolly adelgid (Adelges tsugae; \u27HWA\u27) and, to a lesser extent, the invasive elongate hemlock scale (Fiorinia externa; \u27EHS\u27). For many conifers, induced oleoresin-based defenses play a central role in their response to herbivorous insects; however, it is unknown whether eastern hemlock mobilizes these inducible defenses. We conducted a study to determine if feeding by HWA or EHS induced changes in the volatile resin compounds of eastern hemlock. Young trees were experimentally infested for 3 years with HWA, EHS, or neither insect. Twig and needle resin volatiles were identified and quantified by gas chromatography/mass spectrometry. We observed a suite of changes in eastern hemlock\u27s volatile profile markedly different from the largely terpenoid-based defense response of similar conifers. Overall, both insects produced a similar effect: most twig volatiles decreased slightly, while most needle volatiles increased slightly. Only HWA feeding led to elevated levels of methyl salicylate, a signal for systemic acquired resistance in many plants, and benzyl alcohol, a strong antimicrobial and aphid deterrent. Green leaf volatiles, often induced in wounded plants, were increased by both insects, but more strongly by EHS. The array of phytochemical changes we observed may reflect manipulation of the tree\u27s biochemistry by HWA, or simply the absence of functional defenses against piercing-sucking insects due to the lack of evolutionary contact with these species. Our findings verify that HWA and EHS both induce changes in eastern hemlock\u27s resin chemistry, and represent the first important step toward understanding the effects of inducible chemical defenses on hemlock susceptibility to these exotic pests
    • …
    corecore