145 research outputs found
Functional Sequential Treatment Allocation
Consider a setting in which a policy maker assigns subjects to treatments,
observing each outcome before the next subject arrives. Initially, it is
unknown which treatment is best, but the sequential nature of the problem
permits learning about the effectiveness of the treatments. While the
multi-armed-bandit literature has shed much light on the situation when the
policy maker compares the effectiveness of the treatments through their mean,
much less is known about other targets. This is restrictive, because a cautious
decision maker may prefer to target a robust location measure such as a
quantile or a trimmed mean. Furthermore, socio-economic decision making often
requires targeting purpose specific characteristics of the outcome
distribution, such as its inherent degree of inequality, welfare or poverty. In
the present paper we introduce and study sequential learning algorithms when
the distributional characteristic of interest is a general functional of the
outcome distribution. Minimax expected regret optimality results are obtained
within the subclass of explore-then-commit policies, and for the unrestricted
class of all policies
SmartTools: a generator of interactive environments tools
SmartTools is a development environment generator that provides a structure editor and semantic tools as main features. The well-known visitor pattern technique is commonly used for designing semantic analysis, it has been automated and extended. SmartTools is easy to use thanks to its graphical user interface designed with the Java Swing APIs. It is built with an open architecture convinient for a partial or total integration of SmartTools in other environments. It makes the addition of new software components in SmartTools easy. As a result of the modular architecture, we built a distributed instance of SmartTools which required minimal effort. Being open to the XML technologies offers all the features of Smart Tools to any language defined with those technologies. But most of all, with its open architecture, SmartTools takes advantage of all the developments made around those technologies, like DOM, through the XML APIs. The fast development of SmartTools (which is a young project, one year old) validates our choices of being open and generic. The main goal of this tool is to provide help and support for designing software development environments for programming languages as well as application languages defined with XML technologies
Combining hydrology and mosquito population models to identify the drivers of Rift Valley fever emergence in semi-arid regions of West Africa
BACKGROUND: Rift Valley fever (RVF) is a vector-borne viral zoonosis of increasing global importance. RVF virus (RVFV) is transmitted either through exposure to infected animals or through bites from different species of infected mosquitoes, mainly of Aedes and Culex genera. These mosquitoes are very sensitive to environmental conditions, which may determine their presence, biology, and abundance. In East Africa, RVF outbreaks are known to be closely associated with heavy rainfall events, unlike in the semi-arid regions of West Africa where the drivers of RVF emergence remain poorly understood. The assumed importance of temporary ponds and rainfall temporal distribution therefore needs to be investigated. METHODOLOGY/PRINCIPAL FINDINGS: A hydrological model is combined with a mosquito population model to predict the abundance of the two main mosquito species (Aedes vexans and Culex poicilipes) involved in RVFV transmission in Senegal. The study area is an agropastoral zone located in the Ferlo Valley, characterized by a dense network of temporary water ponds which constitute mosquito breeding sites. The hydrological model uses daily rainfall as input to simulate variations of pond surface areas. The mosquito population model is mechanistic, considers both aquatic and adult stages and is driven by pond dynamics. Once validated using hydrological and entomological field data, the model was used to simulate the abundance dynamics of the two mosquito species over a 43-year period (1961–2003). We analysed the predicted dynamics of mosquito populations with regards to the years of main outbreaks. The results showed that the main RVF outbreaks occurred during years with simultaneous high abundances of both species. CONCLUSION/SIGNIFICANCE: Our study provides for the first time a mechanistic insight on RVFV transmission in West Africa. It highlights the complementary roles of Aedes vexans and Culex poicilipes mosquitoes in virus transmission, and recommends the identification of rainfall patterns favourable for RVFV amplification
Eigenvector localization as a tool to study small communities in online social networks
We present and discuss a mathematical procedure for identification of small
"communities" or segments within large bipartite networks. The procedure is
based on spectral analysis of the matrix encoding network structure. The
principal tool here is localization of eigenvectors of the matrix, by means of
which the relevant network segments become visible. We exemplified our approach
by analyzing the data related to product reviewing on Amazon.com. We found
several segments, a kind of hybrid communities of densely interlinked reviewers
and products, which we were able to meaningfully interpret in terms of the type
and thematic categorization of reviewed items. The method provides a
complementary approach to other ways of community detection, typically aiming
at identification of large network modules
Correlated dynamics in egocentric communication networks
We investigate the communication sequences of millions of people through two
different channels and analyze the fine grained temporal structure of
correlated event trains induced by single individuals. By focusing on
correlations between the heterogeneous dynamics and the topology of egocentric
networks we find that the bursty trains usually evolve for pairs of individuals
rather than for the ego and his/her several neighbors thus burstiness is a
property of the links rather than of the nodes. We compare the directional
balance of calls and short messages within bursty trains to the average on the
actual link and show that for the trains of voice calls the imbalance is
significantly enhanced, while for short messages the balance within the trains
increases. These effects can be partly traced back to the technological
constrains (for short messages) and partly to the human behavioral features
(voice calls). We define a model that is able to reproduce the empirical
results and may help us to understand better the mechanisms driving technology
mediated human communication dynamics.Comment: 7 pages, 6 figure
De l'inefficacité du réseau social : des liens sociaux non mobilisés chez les patients atteints de cancer
International audienceDe nombreuses études sur les réseaux sociaux portent sur la question des ressources auxquelles un individu peut avoir accès à travers ses relations sociales. En s'intéressant aux réseaux qui ont « fonctionné », elles tentent alors de spécifier les facteurs ayant permis l'accès aux ressources. Mais peu de travaux se sont penchés sur les réseaux ayant échoué à fournir à l'individu le bien ou le service qu'il recherchait. Cet article se propose de discuter de ces réseaux « inefficaces » à travers le cas de patients atteints de cancer recherchant des informations relatives à leur pathologie. Les résultats indiquent que les causes de l'inefficacité du réseau sont à rechercher dans la non mobilisation des liens de la part des malades rencontrés. Un certain nombre de contraintes pèsent sur ces liens empêchant ainsi leur mobilisation
A social network approach to examine K-12 educational leaders’ influence on information diffusion on Twitter
This study investigated the relationship between the leader’s gender, leadership position, Twitter use, and influence on information diffusion in the communication network on Twitter. We collected the 30,200 latest tweets of 151 active Twitter users who held educational leadership positions. Results of social network analysis and multiple regression analyses suggest a gender inequality in the leader’s influence on information diffusion in the network. Findings also indicate no significant relationship between leadership position (district vs. building) and a leader\u27s influence in the network. Moreover, Twitter following was positively associated with the leader’s influence in the network, whereas the number of followers, weekly tweets, and the time of Twitter account creation did not predict the leader’s influence. Practical implications on how leaders use Twitter to disseminate information are discussed
Процесс анализа угроз, влияющих на экономическую устойчивость предприятия
На основании проведенного исследования были выявлены факторы возникновения угроз, их группировка по степени воздействию на экономическую устойчивость предприятий и рассмотрена формализация процесса анализа угроз экономической устойчивости предприятий. В условиях рыночной экономики невозможно управлять предприятием без учета влияния угроз, а для эффективного управления важно не только знать об их присутствии, а и правильно идентифицировать конкретную угрозу.На підставі проведеного дослідження були виявлені чинники виникнення загроз, їх угруповання по степені впливу на економічну стійкість підприємств і розглянута формалізація процесу аналізу загроз економічної стійкості підприємств. В умовах ринкової економіки неможливо керувати підприємством без вивчення впливу загроз, а для ефективного керування важливо не тільки знати про їх присутність, а і правильно ідентифікувати конкретну загрозу.On the basis of the conducted research the factors of origin of threats were exposed, their gourmet on a degree to influence on economic stability of enterprises and formalization of process of analysis of threats of economic stability of enterprises is considered. In the conditions of market economy it is impossible to manage an enterprise without taking into account influencing of threats, and for the effective management it is important not only to know about their presence, and to identify the concrete threat correctly
- …