To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Artificial intelligence (AI) systems are playing an overarching role in the disinformation phenomenon our world is currently facing. Such systems boost the problem not only by increasing opportunities to create realistic AI-generated fake content, but also, and essentially, by facilitating the dissemination of disinformation to a targeted audience and at scale by malicious stakeholders. This situation entails multiple ethical and human rights concerns, in particular regarding human dignity, autonomy, democracy, and peace. In reaction, other AI systems are developed to detect and moderate disinformation online. Such systems do not escape from ethical and human rights concerns either, especially regarding freedom of expression and information. Having originally started with ascending co-regulation, the European Union (EU) is now heading toward descending co-regulation of the phenomenon. In particular, the Digital Services Act proposal provides for transparency obligations and external audit for very large online platforms’ recommender systems and content moderation. While with this proposal, the Commission focusses on the regulation of content considered as problematic, the EU Parliament and the EU Council call for enhancing access to trustworthy content. In light of our study, we stress that the disinformation problem is mainly caused by the business model of the web that is based on advertising revenues, and that adapting this model would reduce the problem considerably. We also observe that while AI systems are inappropriate to moderate disinformation content online, and even to detect such content, they may be more appropriate to counter the manipulation of the digital ecosystem.
Compressible magnetohydrodynamic (MHD) turbulence is a common feature of astrophysical systems such as the solar atmosphere and interstellar medium. Such systems are rife with shock waves that can redistribute and dissipate energy. For an MHD system, three broad categories of shocks exist (slow, fast, and intermediate); however, the occurrence rates of each shock type are not known for turbulent systems. Here, we present a method for detecting and classifying the full range of MHD shocks applied to the Orszag–Tang vortex. Our results show that the system is dominated by fast and slow shocks, with far less-frequent intermediate shocks appearing most readily near magnetic reconnection sites. We present a potential mechanism that could lead to the formation of intermediate shocks in MHD systems, and study the coherency and abundances of shocks in compressible MHD turbulence.
Evidence demonstrates increased vulnerability to thoughts and behaviors related to suicide (i.e., suicidal ideation) in students. This study examined the interaction between insomnia-symptoms and student-status (students vs. non-students) on reports of suicidal thoughts of behaviors. A total of 363 (N = 363) university students and 300 (N = 300) members of the general population provided complete data on measures of insomnia-symptoms and suicidal ideation. Students indicated greater reports of both total and lifetime ideation while also considering suicidal behavior within the past year. However, no differences were observed in reports of possible future attempt(s) and the disclosure of suicidal thoughts and behaviors to another person. Moreover, students presenting concurrent symptoms of insomnia reported significantly elevated levels of suicidal ideation relative to nonstudents. These outcomes highlight the possible role of insomnia symptoms in accentuating suicidal thoughts and behaviors in the student population.
Proton electrochemical gradient-driven multidrug efflux activity of representatives of the major facilitator superfamily (MFS) of secondary active transporters contributes to antimicrobial resistance of pathogenic bacteria. Integral to the mechanism of these transporters is a proposed competition between substrate and protons for the binding site of the protein. The current work investigated the competition between protons and antimicrobial substrate for binding to the Escherichia coli MFS multidrug/H+ antiporter MdtM by measuring the quench of intrinsic protein fluorescence upon titration of substrate tetraphenylphosphonium into a solution of purified MdtM over a range of pH values between pH 8.8 and 5.9. The results, which revealed that protons inhibit binding of substrate to MdtM in a competitive manner, are consistent with those reported in a study on the related MFS multidrug/H+ antiporter MdfA and provide further evidence that competition for binding between substrate and protons is a general feature of secondary multidrug efflux.
We consider fragmentation processes with values in the space of marked partitions of $\mathbb{N}$, i.e. partitions where each block is decorated with a nonnegative real number. Assuming that the marks on distinct blocks evolve as independent positive self-similar Markov processes and determine the speed at which their blocks fragment, we get a natural generalization of the self-similar fragmentations of Bertoin (Ann. Inst. H. Poincaré Prob. Statist.38, 2002). Our main result is the characterization of these generalized fragmentation processes: a Lévy–Khinchin representation is obtained, using techniques from positive self-similar Markov processes and from classical fragmentation processes. We then give sufficient conditions for their absorption in finite time to a frozen state, and for the genealogical tree of the process to have finite total length.
This paper investigates the ordering properties of largest claim amounts in heterogeneous insurance portfolios in the sense of some transform orders, including the convex transform order and the star order. It is shown that the largest claim amount from a set of independent and heterogeneous exponential claims is more skewed than that from a set of independent and homogeneous exponential claims in the sense of the convex transform order. As a result, a lower bound for the coefficient of variation of the largest claim amount is established without any restrictions on the parameters of the distributions of claim severities. Furthermore, sufficient conditions are presented to compare the skewness of the largest claim amounts from two sets of independent multiple-outlier scaled claims according to the star order. Some comparison results are also developed for the multiple-outlier proportional hazard rates claims. Numerical examples are presented to illustrate these theoretical results.
Drawdown/regret times feature prominently in optimal stopping problems, in statistics (CUSUM procedure), and in mathematical finance (Russian options). Recently it was discovered that a first passage theory with more general drawdown times, which generalize classic ruin times, may be explicitly developed for spectrally negative Lévy processes [9, 20]. In this paper we further examine the general drawdown-related quantities in the (upward skip-free) time-homogeneous Markov process, and then in its (general) tax process by noticing the pathwise connection between general drawdown and the tax process.
In this paper we study the allocation problem of relevations in coherent systems. The optimal allocation strategies are obtained by implementing stochastic comparisons of different policies according to the usual stochastic order and the hazard rate order. As special cases of relevations, the load-sharing and minimal repair policies are further investigated. Sufficient (and necessary) conditions are established for various stochastic orderings. Numerical examples are also presented as illustrations.
Ethnoveterinary use of plants dates back to ancient times. This study aimed to validate purported efficacy of Sericocomopsis hildebrandtii and a concoction of Carissa edulis and Ximenia americana in treating Taenia solium cysticercosis in pigs. Twenty-four infected pigs were randomly allocated to T1, T2, and T0 groups, each with eight pigs. Each T1 pig was provided with 8 g of S. hildebrandtii root powder, whereas each T2 pig was given 8 g of the concoction. T0 was a control. The pigs were slaughtered 16 weeks post treatment and carcase dissections were performed to establish cyst numbers. T1 cyst numbers were significantly lower than those of T0 (p = .004) and T2 (p = .013). No difference was observed between T2 and T0. This study validated efficacy of S. hildebrandtii but not of X. americana and C. edulis. Further studies are necessary for validation and documentation of plants of ethnoveterinary importance.
Let $\mathbf{X}$ be a $p\times n$ random matrix whose entries are independent and identically distributed real random variables with zero mean and unit variance. We study the limiting behaviors of the 2-normal condition number k(p,n) of $\mathbf{X}$ in terms of large deviations for large n, with p being fixed or $p=p(n)\rightarrow\infty$ with $p(n)=o(n)$. We propose two main ingredients: (i) to relate the large-deviation probabilities of k(p,n) to those involving n independent and identically distributed random variables, which enables us to consider a quite general distribution of the entries (namely the sub-Gaussian distribution), and (ii) to control, for standard normal entries, the upper tail of k(p,n) using the upper tails of ratios of two independent $\chi^2$ random variables, which enables us to establish an application in statistical inference.
We revisit the forward algorithm, developed by Irle, to characterize both the value function and the stopping set for a large class of optimal stopping problems on continuous-time Markov chains. Our objective is to renew interest in this constructive method by showing its usefulness in solving some constrained optimal stopping problems that have emerged recently.
Random intersection graphs model networks with communities, assuming an underlying bipartite structure of communities and individuals, where these communities may overlap. We generalize the model, allowing for arbitrary community structures within the communities. In our new model, communities may overlap, and they have their own internal structure described by arbitrary finite community graphs. Our model turns out to be tractable. We analyze the overlapping structure of the communities, show local weak convergence (including convergence of subgraph counts), and derive the asymptotic degree distribution and the local clustering coefficient.
In the localization game on a graph, the goal is to find a fixed but unknown target node $v^\star$ with the least number of distance queries possible. In the jth step of the game, the player queries a single node $v_j$ and receives, as an answer to their query, the distance between the nodes $v_j$ and $v^\star$. The sequential metric dimension (SMD) is the minimal number of queries that the player needs to guess the target with absolute certainty, no matter where the target is.
The term SMD originates from the related notion of metric dimension (MD), which can be defined the same way as the SMD except that the player’s queries are non-adaptive. In this work we extend the results of Bollobás, Mitsche, and Prałat [4] on the MD of Erdős–Rényi graphs to the SMD. We find that, in connected Erdős–Rényi graphs, the MD and the SMD are a constant factor apart. For the lower bound we present a clean analysis by combining tools developed for the MD and a novel coupling argument. For the upper bound we show that a strategy that greedily minimizes the number of candidate targets in each step uses asymptotically optimal queries in Erdős–Rényi graphs. Connections with source localization, binary search on graphs, and the birthday problem are discussed.
Consider the strong subordination of a multivariate Lévy process with a multivariate subordinator. If the subordinate is a stack of independent Lévy processes and the components of the subordinator are indistinguishable within each stack, then strong subordination produces a Lévy process; otherwise it may not. Weak subordination was introduced to extend strong subordination, always producing a Lévy process even when strong subordination does not. Here we prove that strong and weak subordination are equal in law under the aforementioned condition. In addition, we prove that if strong subordination is a Lévy process then it is necessarily equal in law to weak subordination in two cases: firstly when the subordinator is deterministic, and secondly when it is pure-jump with finite activity.
Consider a Lamperti–Kiu Markov additive process $(J, \xi)$ on $\{+, -\}\times\mathbb R\cup \{-\infty\}$, where J is the modulating Markov chain component. First we study the finiteness of the exponential functional and then consider its moments and tail asymptotics under Cramér’s condition. In the strong subexponential case we determine the subexponential tails of the exponential functional under some further assumptions.
A classical result for the simple symmetric random walk with 2n steps is that the number of steps above the origin, the time of the last visit to the origin, and the time of the maximum height all have exactly the same distribution and converge when scaled to the arcsine law. Motivated by applications in genomics, we study the distributions of these statistics for the non-Markovian random walk generated from the ascents and descents of a uniform random permutation and a Mallows(q) permutation and show that they have the same asymptotic distributions as for the simple random walk. We also give an unexpected conjecture, along with numerical evidence and a partial proof in special cases, for the result that the number of steps above the origin by step 2n for the uniform permutation generated walk has exactly the same discrete arcsine distribution as for the simple random walk, even though the other statistics for these walks have very different laws. We also give explicit error bounds to the limit theorems using Stein’s method for the arcsine distribution, as well as functional central limit theorems and a strong embedding of the Mallows(q) permutation which is of independent interest.
We investigate spatial random graphs defined on the points of a Poisson process in d-dimensional space, which combine scale-free degree distributions and long-range effects. Every Poisson point is assigned an independent weight. Given the weight and position of the points, we form an edge between any pair of points independently with a probability depending on the two weights of the points and their distance. Preference is given to short edges and connections to vertices with large weights. We characterize the parameter regime where there is a non-trivial percolation phase transition and show that it depends not only on the power-law exponent of the degree distribution but also on a geometric model parameter. We apply this result to characterize robustness of age-based spatial preferential attachment networks.
Consider a homogeneous Poisson point process of the Euclidean plane and its Voronoi tessellation. The present note discusses the properties of two stationary point processes associated with the latter and depending on a parameter $\theta$. The first is the set of points that belong to some one-dimensional facet of the Voronoi tessellation and such that the angle with which they see the two nuclei defining the facet is $\theta$. The main question of interest on this first point process is its intensity. The second point process is that of the intersections of the said tessellation with a straight line having a random orientation. Its intensity is well known. The intersection points almost surely belong to one-dimensional facets. The main question here concerns the Palm distribution of the angle with which the points of this second point process see the two nuclei associated with the facet. We will give answers to these two questions and briefly discuss their practical motivations. We also discuss natural extensions to three dimensions.
In this paper an exact rejection algorithm for simulating paths of the coupled Wright–Fisher diffusion is introduced. The coupled Wright–Fisher diffusion is a family of multivariate Wright–Fisher diffusions that have drifts depending on each other through a coupling term and that find applications in the study of networks of interacting genes. The proposed rejection algorithm uses independent neutral Wright–Fisher diffusions as candidate proposals, which are only needed at a finite number of points. Once a candidate is accepted, the remainder of the path can be recovered by sampling from neutral multivariate Wright–Fisher bridges, for which an exact sampling strategy is also provided. Finally, the algorithm’s complexity is derived and its performance demonstrated in a simulation study.