To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Images can be powerful; and, as the saying goes, “with great power comes great responsibility.” Today, the world is suffused with images through various media, and people have come to expect pictures to tell them stories. With increased computational power, images of quantitative data are increasingly part of the “stories” one commonly sees and are powerful in communicating research findings. Many of these images are informative and effective; others are confusing, convey little actual information, or, sadly, are used to intentionally mislead for ideological reasons. Network science has always used compelling images to tell stories about structures, and the field is therefore particularly suited to make the most use of this era of data visualization. But given the vastly expanded palette of visualization available today, how does the researcher decide what is a good network image?
Where do networks come from? Numerous theories direct us to the causes of networks (e.g., homophily, triadic closure, physical proximity), some emphasizing outside factors (exogenous causes) and others emphasizing point-in-time network structure (endogenous causes) as shaping a network’s future trajectory. So far, we have examined such causal theories using cross-sectional snapshots in the form of metrics (centrality, density), partitions (clusters), and maps or spaces (visualization). These approaches generally suffer from a lack of stochastic features and observational overdetermination: for example, we observe a pattern in a given school on a given day, but that pattern could result from actor preferences and constraints in the setting. Disentangling such effects requires an inferential approach to probabilistically examine various effects. To the extent that we want to identify causal forces shaping the networks, understanding the unfolding of relations in time – how the individual ties in a network (the dyads joined by one or more relations) and the entire structure of these relations emerge and evolve – is crucial for testing network theories.
Stop. Take a moment to look around. What do you see? No matter where you are, you are likely perceiving a world consisting of things. Maybe you are reading this book in a coffee shop, and if so, you probably see people, cups, books, chairs, and so on. You see a world of objects with properties, yourself included: white cups are on wooden tables, people sitting in chairs are reading books and talking with one another. At the same time, you are a subject, responding to this world and actively bringing yourself and these objects into interrelation. And yet, the world of objects with properties that you are perceiving is but one slice of a complex reality.
Knowing the burden of severe disease caused by influenza is essential for disease risk communication, to understand the true impact of vaccination programmes and to guide public health and disease control measures. We estimated the number of influenza-attributable hospitalisations in Spain during the 2010–2011 to 2019–2020 seasons – based on the hospitalisations due to severe acute respiratory infection (SARI) in Spain using the hospital discharge database and virological influenza information from the Spanish Influenza Sentinel Surveillance System (SISSS). The weekly numbers of influenza-attributable hospitalisations were calculated by multiplying the weekly SARI hospitalisations by the weekly influenza virus positivity, obtained from the SISSS in each season, stratified by age group and sex. The influenza-related hospitalisation burden is age-specific and varies significantly by influenza season. People aged 65 and over yielded the highest average influenza-attributable hospitalisation rates per season (615.6 per 100,000), followed by children aged under 5 (251.2 per 100,000). These results provide an essential contribution to influenza control and to improving existing vaccination programmes, as well as to the optimisation and planning of health resources and policies.
We conducted a retrospective, analytical cross-sectional and single-centre study that included 190 hospitalised COVID-19 patients in the Fujian Provincial Hospital South Branch between December 2022 and January 2023 to analyse the correlation of viral loads of throat swabs with clinical progression and outcomes. To normalise the Ct value as quantification of viral loads, we used RNase P gene as internal control gene and subtracted the Ct value of SARS-CoV-2 N gene from the Ct value of RNase P gene, termed △Ct. Most patients were discharged (84.2%), and only 10 (5.6%) individuals who had a lower △Ct value died. The initial △Ct value of participants was also significantly correlated with some abnormal laboratory characteristics, and the duration time of SARS-CoV-2 was longer in patients with severe symptoms and a lower △Ct value at admission. Our study suggested that the △Ct value may be used as a predictor of disease progression and outcomes in hospitalised COVID-19 patients.
A set of vertices in a graph is a Hamiltonian subset if it induces a subgraph containing a Hamiltonian cycle. Kim, Liu, Sharifzadeh, and Staden proved that for large $d$, among all graphs with minimum degree $d$, $K_{d+1}$ minimises the number of Hamiltonian subsets. We prove a near optimal lower bound that takes also the order and the structure of a graph into account. For many natural graph classes, it provides a much better bound than the extremal one ($\approx 2^{d+1}$). Among others, our bound implies that an $n$-vertex $C_4$-free graph with minimum degree $d$ contains at least $n2^{d^{2-o(1)}}$ Hamiltonian subsets.
Statistical profiling of job seekers is an attractive option to guide the activities of public employment services. Many hope that algorithms will improve both efficiency and effectiveness of employment services’ activities that are so far often based on human judgment. Against this backdrop, we evaluate regression and machine-learning models for predicting job-seekers’ risk of becoming long-term unemployed using German administrative labor market data. While our models achieve competitive predictive performance, we show that training an accurate prediction model is just one element in a series of design and modeling decisions, each having notable effects that span beyond predictive accuracy. We observe considerable variation in the cases flagged as high risk across models, highlighting the need for systematic evaluation and transparency of the full prediction pipeline if statistical profiling techniques are to be implemented by employment agencies.
Let $\mathcal{F}$ be an intersecting family. A $(k-1)$-set $E$ is called a unique shadow if it is contained in exactly one member of $\mathcal{F}$. Let ${\mathcal{A}}=\{A\in \binom{[n]}{k}\colon |A\cap \{1,2,3\}|\geq 2\}$. In the present paper, we show that for $n\geq 28k$, $\mathcal{A}$ is the unique family attaining the maximum size among all intersecting families without unique shadow. Several other results of a similar flavour are established as well.
Plasmodium vivax is the most frequent and widely distributed cause of recurring malaria. It is a public health issue that mostly occurs in Southeast Asia, followed by the Middle East, Latin, and South Americas and sub-Saharan Africa. Although it is commonly known as an etiologic agent of malaria with mild clinical manifestations, it can lead to severe complications. It has been neglected and understudied for a long time, due to its low mortality, culturing infeasibility, and mild clinical manifestations in comparison to P. falciparum. Despite the mild clinical issues commonly rose for P. vivax, the correlation between the clinical manifestations exhibited by patients with severe and non-severe complications and the genetic diversity of parasites responsible for the disease is not clear. An investigation was carried out between 2011 and 2021 on patients referred to Avicenne Hospital for suspected P. vivax infection. Upon arrival, they underwent clinical and biological examinations. The lateral flow test and LAMP-PCR confirmed the presence of malaria parasites, Plasmodium sp‥ Microscopic examination revealed the presence of Plasmodium parasites with a parasitaemia between 0.01 and 0.38%. Conventional PCR amplifications targeting 714 bp DNA fragment of small subunit ribosomal DNA (SSU-rDNA) followed by bidirectional sequencing allowed us to identify the parasites as P. vivax. The neighbor-joining (NJ) phylogenetic tree revealed that P. vivax sequences processed in the present study clustered in two well-differentiated and supported clades. It included a bigger clade including P. vivax specimens of all our patients together with homonymous sequences from Indonesia, India, and El Salvador and the second clade encompassed the sequences from Yemen and India. In addition, the clustering displayed by the median-joining network agreed well with the topology of the phylogenetic tree generated by the neighbor-joining analysis. No correlation between the clinical manifestation of patients with severe and non-severe complications, encompassing diverse geographical origins, and the genetic diversity of parasites was observed since all sequences demonstrated a high homogeneity. These findings can be helpful in getting knowledge about the population genetics of P. vivax and taking proper control management strategies against these parasites.
Candidates arrive sequentially for an interview process which results in them being ranked relative to their predecessors. Based on the ranks available at each time, a decision mechanism must be developed that selects or dismisses the current candidate in an effort to maximize the chance of selecting the best. This classical version of the ‘secretary problem’ has been studied in depth, mostly using combinatorial approaches, along with numerous other variants. We consider a particular new version where, during reviewing, it is possible to query an external expert to improve the probability of making the correct decision. Unlike existing formulations, we consider experts that are not necessarily infallible and may provide suggestions that can be faulty. For the solution of our problem we adopt a probabilistic methodology and view the querying times as consecutive stopping times which we optimize with the help of optimal stopping theory. For each querying time we must also design a mechanism to decide whether or not we should terminate the search at the querying time. This decision is straightforward under the usual assumption of infallible experts, but when experts are faulty it has a far more intricate structure.
We consider the problem of optimally maintaining an offshore wind farm in which major components progressively degrade over time due to normal usage and exposure to a randomly varying environment. The turbines exhibit both economic and stochastic dependence due to shared maintenance setup costs and their common environment. Our aim is to identify optimal replacement policies that minimize the expected total discounted setup, replacement, and lost power production costs over an infinite horizon. The problem is formulated using a Markov decision process (MDP) model from which we establish monotonicity of the cost function jointly in the degradation level and environment state and characterize the structure of the optimal replacement policy. For the special case of a two-turbine farm, we prove that the replacement threshold of one turbine depends not only on its own state of degradation but also on the state of degradation of the other turbine in the farm. This result yields a complete characterization of the replacement policy of both turbines by a monotone curve. The policies characterized herein can be used to optimally prescribe timely replacements of major components and suggest when it is most beneficial to share costly maintenance resources.
This paper analyzes the training process of generative adversarial networks (GANs) via stochastic differential equations (SDEs). It first establishes SDE approximations for the training of GANs under stochastic gradient algorithms, with precise error bound analysis. It then describes the long-run behavior of GAN training via the invariant measures of its SDE approximations under proper conditions. This work builds a theoretical foundation for GAN training and provides analytical tools to study its evolution and stability.
While the previous chapter covered probability on events, in this chapter we will switch to talking about random variables and their corresponding distributions. We will cover the most common discrete distributions, define the notion of a joint distribution, and finish with some practical examples of how to reason about the probability that one device will fail before another.
The general setting in statistics is that we observe some data and then try to infer some property of the underlying distribution behind this data. The underlying distribution behind the data is unknown and represented by random variable (r.v.) . This chapter will briefly introduce the general concept of estimators, focusing on estimators for the mean and variance.
This chapter deals with one of the most important aspects of systems modeling, namely the arrival process. When we say “arrival process” we are referring to the sequence of arrivals into the system. The most widely used arrival process model is the Poisson process. This chapter defines the Poisson process and highlights its properties. Before we dive into the Poisson process, it will be helpful to review the Exponential distribution, which is closely related to the Poisson process.