60 research outputs found

    Sharp Bounds on Treatment Effects for Policy Evaluation

    Full text link
    For counterfactual policy evaluation, it is important to ensure that treatment parameters are relevant to the policies in question. This is especially challenging under unobserved heterogeneity, as is well featured in the definition of the local average treatment effect (LATE). Being intrinsically local, the LATE is known to lack external validity in counterfactual environments. This paper investigates the possibility of extrapolating local treatment effects to different counterfactual settings when instrumental variables are only binary. We propose a novel framework to systematically calculate sharp nonparametric bounds on various policy-relevant treatment parameters that are defined as weighted averages of the marginal treatment effect (MTE). Our framework is flexible enough to incorporate a large menu of identifying assumptions beyond the shape restrictions on the MTE that have been considered in prior studies. We apply our method to understand the effects of medical insurance policies on the use of medical services

    The Phenomenological Research on Higgs and dark matter in the Next-to-Minimal Supersymmetric Standard Model

    Full text link
    The Z3Z_3-invariant next-to-minimal supersymmetric standard model (NMSSM) can provide a candidate for dark matter (DM). It can also be used to explain the hypothesis that the Higgs signal observed on the Large Hadron Collider (LHC) comes from the contribution of the two lightest CP-even Higgs bosons, whose masses are near 125 GeV. At present, XENON1T, LUX, and PandaX experiments have imposed very strict restrictions on direct collision cross sections of {dark matter}. In this paper, we consider a scenario that the observed Higgs signal is the superposition of two mass-degenerate Higgs in the Z3Z_3-invariant NMSSM and scan the seven-dimension parameter space composing of λ,κ,tanβ,μ,Ak,At,M1\lambda, \kappa, \tan\beta, \mu, A_k, A_t, M_1 via the Markov chain Monte Carlo (MCMC) method. We find that the DM relic density, as well as the LHC searches for sparticles, especially the DM direct detections, has provided a strong limit on the parameter space. %Please check intended meaning has been retained. The allowed parameter space is featured by a relatively small μ300\mu \le 300 GeV and about tanβ(10,20)\tan\beta\in(10,20). In addition, the DM is Higgsino-dominated because of 2κλ>1|\frac{2\kappa}{\lambda}|>1. Moreover, the co-annihilation between χ~10\tilde{\chi}_1^0 and χ~1±\tilde{\chi}_1^\pm must be taken into account to obtain the reasonable DM relic density

    Fast Inverse Model Transformation: Algebraic Framework for Fast Data Plane Verification

    Full text link
    Data plane verification (DPV) analyzes routing tables and detects routing abnormalities and policy violations during network operation and planning. Thus, it has become an important tool to harden the networking infrastructure and the computing systems building on top. Substantial advancements have been made in the last decade and state-of-the-art DPV systems can achieve sub-us verification for an update of a single forwarding rule. In this paper, we introduce fast inverse model transformation (FIMT), the first theoretical framework to systematically model and analyze centralized DPV systems. FIMT reveals the algebraic structure in the model update process, a key step in fast DPV systems. Thus, it can systematically analyze the correctness of several DPV systems, using algebraic properties. The theory also guides the design and implementation of NeoFlash, a refactored version of Flash with new optimization techniques. Evaluations show that NeoFlash outperforms existing state-of-the-art centralized DPV systems in various datasets and reveal insights to key techniques towards fast DPV.Comment: 12 pages pre-referenc

    Towards Effective Network Intrusion Detection: A Hybrid Model Integrating Gini Index and GBDT with PSO

    Get PDF
    In order to protect computing systems from malicious attacks, network intrusion detection systems have become an important part in the security infrastructure. Recently, hybrid models that integrating several machine learning techniques have captured more attention of researchers. In this paper, a novel hybrid model was proposed with the purpose of detecting network intrusion effectively. In the proposed model, Gini index is used to select the optimal subset of features, the gradient boosted decision tree (GBDT) algorithm is adopted to detect network attacks, and the particle swarm optimization (PSO) algorithm is utilized to optimize the parameters of GBDT. The performance of the proposed model is experimentally evaluated in terms of accuracy, detection rate, precision, F1-score, and false alarm rate using the NSL-KDD dataset. Experimental results show that the proposed model is superior to the compared methods

    Six-month adherence to Statin use and subsequent risk of major adverse cardiovascular events (MACE) in patients discharged with acute coronary syndromes

    Get PDF
    Acknowledgements: The authors thank all participants who contributed to the study. Funding: CPACS-1 was funded by unrestricted educational grants from Guidant and Sanofi-Aventis, and grants from The Royal Australasian College of Physicians. AP is supported by an Australian National Heart Foundation Career Development Award. CPACS-2 was funded by an unrestricted grant from Sanofi-Aventis China. The George Institute for Global Health at Peking University Health Science Center sponsored the study and owns the data. Data analyses and reports were supported by Beijing Science and Technology Key Research Plan (D151100002215001). However, the authors are solely responsible for the design, analyses, the drafting and editing of the manuscript, and its final contents.Peer reviewedPublisher PD
    corecore