145 research outputs found

    Functional Sequential Treatment Allocation

    Full text link
    Consider a setting in which a policy maker assigns subjects to treatments, observing each outcome before the next subject arrives. Initially, it is unknown which treatment is best, but the sequential nature of the problem permits learning about the effectiveness of the treatments. While the multi-armed-bandit literature has shed much light on the situation when the policy maker compares the effectiveness of the treatments through their mean, much less is known about other targets. This is restrictive, because a cautious decision maker may prefer to target a robust location measure such as a quantile or a trimmed mean. Furthermore, socio-economic decision making often requires targeting purpose specific characteristics of the outcome distribution, such as its inherent degree of inequality, welfare or poverty. In the present paper we introduce and study sequential learning algorithms when the distributional characteristic of interest is a general functional of the outcome distribution. Minimax expected regret optimality results are obtained within the subclass of explore-then-commit policies, and for the unrestricted class of all policies

    SmartTools: a generator of interactive environments tools

    Get PDF
    SmartTools is a development environment generator that provides a structure editor and semantic tools as main features. The well-known visitor pattern technique is commonly used for designing semantic analysis, it has been automated and extended. SmartTools is easy to use thanks to its graphical user interface designed with the Java Swing APIs. It is built with an open architecture convinient for a partial or total integration of SmartTools in other environments. It makes the addition of new software components in SmartTools easy. As a result of the modular architecture, we built a distributed instance of SmartTools which required minimal effort. Being open to the XML technologies offers all the features of Smart Tools to any language defined with those technologies. But most of all, with its open architecture, SmartTools takes advantage of all the developments made around those technologies, like DOM, through the XML APIs. The fast development of SmartTools (which is a young project, one year old) validates our choices of being open and generic. The main goal of this tool is to provide help and support for designing software development environments for programming languages as well as application languages defined with XML technologies

    Combining hydrology and mosquito population models to identify the drivers of Rift Valley fever emergence in semi-arid regions of West Africa

    Get PDF
    BACKGROUND: Rift Valley fever (RVF) is a vector-borne viral zoonosis of increasing global importance. RVF virus (RVFV) is transmitted either through exposure to infected animals or through bites from different species of infected mosquitoes, mainly of Aedes and Culex genera. These mosquitoes are very sensitive to environmental conditions, which may determine their presence, biology, and abundance. In East Africa, RVF outbreaks are known to be closely associated with heavy rainfall events, unlike in the semi-arid regions of West Africa where the drivers of RVF emergence remain poorly understood. The assumed importance of temporary ponds and rainfall temporal distribution therefore needs to be investigated. METHODOLOGY/PRINCIPAL FINDINGS: A hydrological model is combined with a mosquito population model to predict the abundance of the two main mosquito species (Aedes vexans and Culex poicilipes) involved in RVFV transmission in Senegal. The study area is an agropastoral zone located in the Ferlo Valley, characterized by a dense network of temporary water ponds which constitute mosquito breeding sites. The hydrological model uses daily rainfall as input to simulate variations of pond surface areas. The mosquito population model is mechanistic, considers both aquatic and adult stages and is driven by pond dynamics. Once validated using hydrological and entomological field data, the model was used to simulate the abundance dynamics of the two mosquito species over a 43-year period (1961–2003). We analysed the predicted dynamics of mosquito populations with regards to the years of main outbreaks. The results showed that the main RVF outbreaks occurred during years with simultaneous high abundances of both species. CONCLUSION/SIGNIFICANCE: Our study provides for the first time a mechanistic insight on RVFV transmission in West Africa. It highlights the complementary roles of Aedes vexans and Culex poicilipes mosquitoes in virus transmission, and recommends the identification of rainfall patterns favourable for RVFV amplification

    Eigenvector localization as a tool to study small communities in online social networks

    Full text link
    We present and discuss a mathematical procedure for identification of small "communities" or segments within large bipartite networks. The procedure is based on spectral analysis of the matrix encoding network structure. The principal tool here is localization of eigenvectors of the matrix, by means of which the relevant network segments become visible. We exemplified our approach by analyzing the data related to product reviewing on Amazon.com. We found several segments, a kind of hybrid communities of densely interlinked reviewers and products, which we were able to meaningfully interpret in terms of the type and thematic categorization of reviewed items. The method provides a complementary approach to other ways of community detection, typically aiming at identification of large network modules

    Correlated dynamics in egocentric communication networks

    Get PDF
    We investigate the communication sequences of millions of people through two different channels and analyze the fine grained temporal structure of correlated event trains induced by single individuals. By focusing on correlations between the heterogeneous dynamics and the topology of egocentric networks we find that the bursty trains usually evolve for pairs of individuals rather than for the ego and his/her several neighbors thus burstiness is a property of the links rather than of the nodes. We compare the directional balance of calls and short messages within bursty trains to the average on the actual link and show that for the trains of voice calls the imbalance is significantly enhanced, while for short messages the balance within the trains increases. These effects can be partly traced back to the technological constrains (for short messages) and partly to the human behavioral features (voice calls). We define a model that is able to reproduce the empirical results and may help us to understand better the mechanisms driving technology mediated human communication dynamics.Comment: 7 pages, 6 figure

    De l'inefficacité du réseau social : des liens sociaux non mobilisés chez les patients atteints de cancer

    Get PDF
    International audienceDe nombreuses études sur les réseaux sociaux portent sur la question des ressources auxquelles un individu peut avoir accès à travers ses relations sociales. En s'intéressant aux réseaux qui ont « fonctionné », elles tentent alors de spécifier les facteurs ayant permis l'accès aux ressources. Mais peu de travaux se sont penchés sur les réseaux ayant échoué à fournir à l'individu le bien ou le service qu'il recherchait. Cet article se propose de discuter de ces réseaux « inefficaces » à travers le cas de patients atteints de cancer recherchant des informations relatives à leur pathologie. Les résultats indiquent que les causes de l'inefficacité du réseau sont à rechercher dans la non mobilisation des liens de la part des malades rencontrés. Un certain nombre de contraintes pèsent sur ces liens empêchant ainsi leur mobilisation

    A social network approach to examine K-12 educational leaders’ influence on information diffusion on Twitter

    Get PDF
    This study investigated the relationship between the leader’s gender, leadership position, Twitter use, and influence on information diffusion in the communication network on Twitter. We collected the 30,200 latest tweets of 151 active Twitter users who held educational leadership positions. Results of social network analysis and multiple regression analyses suggest a gender inequality in the leader’s influence on information diffusion in the network. Findings also indicate no significant relationship between leadership position (district vs. building) and a leader\u27s influence in the network. Moreover, Twitter following was positively associated with the leader’s influence in the network, whereas the number of followers, weekly tweets, and the time of Twitter account creation did not predict the leader’s influence. Practical implications on how leaders use Twitter to disseminate information are discussed

    Процесс анализа угроз, влияющих на экономическую устойчивость предприятия

    Get PDF
    На основании проведенного исследования были выявлены факторы возникновения угроз, их группировка по степени воздействию на экономическую устойчивость предприятий и рассмотрена формализация процесса анализа угроз экономической устойчивости предприятий. В условиях рыночной экономики невозможно управлять предприятием без учета влияния угроз, а для эффективного управления важно не только знать об их присутствии, а и правильно идентифицировать конкретную угрозу.На підставі проведеного дослідження були виявлені чинники виникнення загроз, їх угруповання по степені впливу на економічну стійкість підприємств і розглянута формалізація процесу аналізу загроз економічної стійкості підприємств. В умовах ринкової економіки неможливо керувати підприємством без вивчення впливу загроз, а для ефективного керування важливо не тільки знати про їх присутність, а і правильно ідентифікувати конкретну загрозу.On the basis of the conducted research the factors of origin of threats were exposed, their gourmet on a degree to influence on economic stability of enterprises and formalization of process of analysis of threats of economic stability of enterprises is considered. In the conditions of market economy it is impossible to manage an enterprise without taking into account influencing of threats, and for the effective management it is important not only to know about their presence, and to identify the concrete threat correctly
    corecore