Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 28501 - 28530 of 302482

Full-Text Articles in Physical Sciences and Mathematics

Symmetry-Inspired Analysis Of Biological Networks, Ian Leifer Jun 2022

Symmetry-Inspired Analysis Of Biological Networks, Ian Leifer

Dissertations, Theses, and Capstone Projects

The description of a complex system like gene regulation of a cell or a brain of an animal in terms of the dynamics of each individual element is an insurmountable task due to the complexity of interactions and the scores of associated parameters. Recent decades brought about the description of these systems that employs network models. In such models the entire system is represented by a graph encapsulating a set of independently functioning objects and their interactions. This creates a level of abstraction that makes the analysis of such large scale system possible. Common practice is to draw conclusions about …


A Simple Data Mixing Prior For Improving Self-Supervised Learning, Sucheng Ren, Huiyu Wang, Zhengqi Gao, Shengfeng He, Alan Yuille, Yuyin Zhou, Cihang Xie Jun 2022

A Simple Data Mixing Prior For Improving Self-Supervised Learning, Sucheng Ren, Huiyu Wang, Zhengqi Gao, Shengfeng He, Alan Yuille, Yuyin Zhou, Cihang Xie

Research Collection School Of Computing and Information Systems

Data mixing (e.g., Mixup, Cutmix, ResizeMix) is an essential component for advancing recognition models. In this paper, we focus on studying its effectiveness in the self-supervised setting. By noticing the mixed images that share the same source images are intrinsically related to each other, we hereby propose SDMP, short for Simple Data Mixing Prior, to capture this straightforward yet essential prior, and position such mixed images as additional positive pairs to facilitate self-supervised representation learning. Our experiments verify that the proposed SDMP enables data mixing to help a set of self-supervised learning frameworks (e.g., MoCo) achieve better accuracy and out-of-distribution …


Rhythmedge: Enabling Contactless Heart Rate Estimation On The Edge, Zahid Hasan, Emon Dey, Sreenivasan Ramasamy Ramamurthy, Nirmalya Roy, Archan Misra Jun 2022

Rhythmedge: Enabling Contactless Heart Rate Estimation On The Edge, Zahid Hasan, Emon Dey, Sreenivasan Ramasamy Ramamurthy, Nirmalya Roy, Archan Misra

Research Collection School Of Computing and Information Systems

The primary contribution of this paper is designing and prototyping a real-time edge computing system, RhythmEdge, that is capable of detecting changes in blood volume from facial videos (Remote Photoplethysmography; rPPG), enabling cardio-vascular health assessment instantly. The benefits of RhythmEdge include non-invasive measurement of cardiovascular activity, real-time system operation, inexpensive sensing components, and computing. RhythmEdge captures a short video of the skin using a camera and extracts rPPG features to estimate the Photoplethysmography (PPG) signal using a multi-task learning framework while offloading the edge computation. In addition, we intelligently apply a transfer learning approach to the multi-task learning framework to …


Learning To Solve Routing Problems Via Distributionally Robust Optimization, Jiang Yuan, Yaoxin Wu, Zhiguang Cao Jun 2022

Learning To Solve Routing Problems Via Distributionally Robust Optimization, Jiang Yuan, Yaoxin Wu, Zhiguang Cao

Research Collection School Of Computing and Information Systems

Recent deep models for solving routing problems always assume a single distribution of nodes for training, which severely impairs their cross-distribution generalization ability. In this paper, we exploit group distributionally robust optimization (group DRO) to tackle this issue, where we jointly optimize the weights for different groups of distributions and the parameters for the deep model in an interleaved manner during training. We also design a module based on convolutional neural network, which allows the deep model to learn more informative latent pattern among the nodes. We evaluate the proposed approach on two types of wellknown deep models including GCN …


Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison Jun 2022

Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison

Computer Science: Faculty Publications and Other Works

Perform a phishing experiment to see how many people fall victim. This study was approved by the Loyola IRB


Officers: Operational Framework For Intelligent Crime-And-Emergency Response Scheduling, Jonathan David Chase, Siong Thye Goh, Tran Phong, Hoong Chuin Lau Jun 2022

Officers: Operational Framework For Intelligent Crime-And-Emergency Response Scheduling, Jonathan David Chase, Siong Thye Goh, Tran Phong, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In the quest to achieve better response times in dense urban environments, law enforcement agencies are seeking AI-driven planning systems to inform their patrol strategies. In this paper, we present a framework, OFFICERS, for deployment planning that learns from historical data to generate deployment schedules on a daily basis. We accurately predict incidents using ST-ResNet, a deep learning technique that captures wide-ranging spatio-temporal dependencies, and solve a large-scale optimization problem to schedule deployment, significantly improving its scalability through a simulated annealing solver. Methodologically, our approach outperforms our previous works where prediction was done using Generative Adversarial Networks, and optimization was …


Justice And The Mathematics Classroom: Realizing The Goals Of The Amte Standards For Preparing Teachers Of Mathematics, Shandy Hauk, Marilyn Strutchens, Dorothy Y. White, Jennifer Bay-Williams, Jenq Jong Tsay, Billy Jackson Jun 2022

Justice And The Mathematics Classroom: Realizing The Goals Of The Amte Standards For Preparing Teachers Of Mathematics, Shandy Hauk, Marilyn Strutchens, Dorothy Y. White, Jennifer Bay-Williams, Jenq Jong Tsay, Billy Jackson

School of Mathematical and Statistical Sciences Faculty Publications and Presentations

This chapter is an introduction to justice in the post-secondary context of mathematics courses for prospective teachers. The chapter is a research-to-practice report (i.e., it describes an aspect of instruction and discusses how it is informed by, connects to, or is illustrative of findings from research). While the reader might be any type of mathematics teacher educator, the focus here is supporting those who teach mathematics content courses for elementary school teacher candidates. In addition to having an effect on discipline-specific knowledge, college mathematics classes contribute to the ways candidates communicate in/with/through mathematics in working with children. The chapter includes …


General Rogue Wave Solutions To The Sasa-Satsuma Equation, Chengfa Wu, Guangxiong Zhang, Changyan Shi, Bao-Feng Feng Jun 2022

General Rogue Wave Solutions To The Sasa-Satsuma Equation, Chengfa Wu, Guangxiong Zhang, Changyan Shi, Bao-Feng Feng

School of Mathematical and Statistical Sciences Faculty Publications and Presentations

General rogue wave solutions to the Sasa-Satsuma equation are constructed by the Kadomtsev-Petviashvili (KP) hierarchy reduction method. These solutions are presented in three different forms. The first form is expressed in terms of recursively defined differential operators while the second form shares a similar solution structure except that the differential operators are no longer recursively defined. Instead of using differential operators, the third form is expressed by Schur polynomials.


National Climate Data Graphical Plotting Software Review, Melissa Barnes Jun 2022

National Climate Data Graphical Plotting Software Review, Melissa Barnes

University Honors Theses

This is a review of an undergraduate Computer Science Capstone project. The paper discusses the development process, what software tools were used, the challenges faced during the development process, and what the software does. The software described in this paper is a python program that utilizes United States county-scoped climate and drought data from the National Climate Data Center to create visualizations and mathematical calculations. The software has an interactive user interface that displays various graphs, heat maps and calculated values. Elevation and population data estimates for populated areas in most counties is also provided. Users may select any set …


Understanding Ch4 Emissions From Compostables: An Exploration Of Local Ch4 Emissions From Landfilled Compostables And The Efficacy Of Emission Mitigation Via Anaerobic Biogas Digestion, Jordan-Yoosuf Aljbour Jun 2022

Understanding Ch4 Emissions From Compostables: An Exploration Of Local Ch4 Emissions From Landfilled Compostables And The Efficacy Of Emission Mitigation Via Anaerobic Biogas Digestion, Jordan-Yoosuf Aljbour

University Honors Theses

Methane (CH4) is the second most abundant anthropogenic greenhouse gas within the atmosphere, comprising ~16% of the total anthropogenic greenhouse gas composition on Earth. It has an ~12-year lifetime relative to its eventual oxidation via reaction with tropospheric hydroxyl radicals (OH), and has a 100-year indirect global warming potential (GWP) approximately ranging between 28-36 [Environmental Protection Agency, 2021]. In recent years, the observed average global concentration of atmospheric CH4 has increased by ~11.0% from 2020 (~15.3 ppb) to 2021 (~17.0 ppb) [Dlugokencky et al., 1994; National Oceanic and Atmospheric Administration, 2022]. With …


Ethical Implications For Children’S Use Of Search Tools In An Educational Setting, Monica Landoni, Theo Huibers, Emiliana Murgia, Maria Soledad Pera Jun 2022

Ethical Implications For Children’S Use Of Search Tools In An Educational Setting, Monica Landoni, Theo Huibers, Emiliana Murgia, Maria Soledad Pera

Computer Science Faculty Publications and Presentations

In the classroom, search tools enable students to access online resources. While these tools have many benefits in theory, in practice there are also ethical issues to consider. In this article, we discuss a number of ethics-related problems teachers are faced with and they need to find solutions for. Based on our own research experience developing and deploying information discovery tools for the classroom (both in a traditional classroom setting and on the Internet due to the ongoing outbreak of COVID-19), we share insights about ethics and the role of the expert-in-the-loop, teachers, both as co-design partners and liaisons between …


Town Of Colonial Beach Survey Of Central And Castlewood Beaches, Donna A. Milligan, C. Scott Hardaway Jr., Cameron W. Green, Alexander R. Milligan Jun 2022

Town Of Colonial Beach Survey Of Central And Castlewood Beaches, Donna A. Milligan, C. Scott Hardaway Jr., Cameron W. Green, Alexander R. Milligan

Reports

The Town of Colonial Beach occupies a peninsula between the Potomac River and Monroe Bay. Approximately 2.5 miles of the shoreline is publicly-owned. Two areas on the Potomac River have been enhanced as recreational beaches for swimming and sunbathing. Central Beach is located just south of the Town Pier and is the main recreational beach. Castlewood Beach is south of Central Beach near the entrance to Monroe Bay.


Multi-View Scheduling Of Onboard Live Video Analytics To Minimize Frame Processing Latency, Shengzhong Liu, Tianshi Wang, Hongpeng Guo, Xinzhe Fu, Philip David, Maggie Wigness, Archan Misra, Tarek Abdelzaher Jun 2022

Multi-View Scheduling Of Onboard Live Video Analytics To Minimize Frame Processing Latency, Shengzhong Liu, Tianshi Wang, Hongpeng Guo, Xinzhe Fu, Philip David, Maggie Wigness, Archan Misra, Tarek Abdelzaher

Research Collection School Of Computing and Information Systems

This paper presents a real-time multi-view scheduling framework for DNN-based live video analytics at the edge to minimize frame processing latency. The work is motivated by applications where a higher frame rate is important, not to miss actions of interest. Examples include defense, border security, and intruder detection applications where sensors (in this paper, cameras) are deployed to monitor key roads, chokepoints, or passageways to identify events of interest (and intervene in real-time). Supporting a higher frame rate entails lowering frame processing latency. We assume that multiple cameras are deployed with partially overlapping views. Each camera has access to limited …


Codem: Conditional Domain Embeddings For Scalable Human Activity Recognition, Abu Zaher Md Faridee, Avijoy Chakma, Zahid Hasan, Nirmalya Roy, Archan Misra Jun 2022

Codem: Conditional Domain Embeddings For Scalable Human Activity Recognition, Abu Zaher Md Faridee, Avijoy Chakma, Zahid Hasan, Nirmalya Roy, Archan Misra

Research Collection School Of Computing and Information Systems

We explore the effect of auxiliary labels in improving the classification accuracy of wearable sensor-based human activity recognition (HAR) systems, which are primarily trained with the supervision of the activity labels (e.g. running, walking, jumping). Supplemental meta-data are often available during the data collection process such as body positions of the wearable sensors, subjects' demographic information (e.g. gender, age), and the type of wearable used (e.g. smartphone, smart-watch). This information, while not directly related to the activity classification task, can nonetheless provide auxiliary supervision and has the potential to significantly improve the HAR accuracy by providing extra guidance on how …


A Practical Comparison Of Quantum And Classical Leaderless Consensus, Paul Robert Griffin, Dimple Mevada Jun 2022

A Practical Comparison Of Quantum And Classical Leaderless Consensus, Paul Robert Griffin, Dimple Mevada

Research Collection School Of Computing and Information Systems

Quantum computing is coming of age and being explored in many business areas for either solving difficult problems or improving business processes. Distributed ledger technology (DLT) is now embedded in many businesses and continues to mature. Consensus, at the heart of DLTs, has practical scaling issues and, as we move into needing bigger datasets, bigger networks and more security, the problem is ever increasing. Consensus agreement is a non-deterministic problem which is a good match to quantum computers due to the probabilistic nature of quantum phenomena. In this paper, we show that quantum nodes entangled in a variety of network …


You Have Earned A Trophy: Characterize In-Game Achievements And Their Completions, Haewoon Kwak Jun 2022

You Have Earned A Trophy: Characterize In-Game Achievements And Their Completions, Haewoon Kwak

Research Collection School Of Computing and Information Systems

Achievement systems have been actively adopted in gaming platforms to maintain players’ interests. Among them, trophies in PlayStation games are one of the most successful achievement systems. While the importance of trophy design has been casually discussed in many game developers’ forums, there has been no systematic study of the historical dataset of trophies yet. In this work, we construct a complete dataset of PlayStation games and their trophies and investigate them from both the developers’ and players’ perspectives.


High-Resolution Face Swapping Via Latent Semantics Disentanglement, Yangyang Xu, Bailin Deng, Junle Wang, Yanqing Jing, Jia Pan, Shengfeng He Jun 2022

High-Resolution Face Swapping Via Latent Semantics Disentanglement, Yangyang Xu, Bailin Deng, Junle Wang, Yanqing Jing, Jia Pan, Shengfeng He

Research Collection School Of Computing and Information Systems

We present a novel high-resolution face swapping method using the inherent prior knowledge of a pre-trained GAN model. Although previous research can leverage generative priors to produce high-resolution results, their quality can suffer from the entangled semantics of the latent space. We explicitly disentangle the latent semantics by utilizing the progressive nature of the generator, deriving structure at-tributes from the shallow layers and appearance attributes from the deeper ones. Identity and pose information within the structure attributes are further separated by introducing a landmark-driven structure transfer latent direction. The disentangled latent code produces rich generative features that incorporate feature blending …


Class Re-Activation Maps For Weakly-Supervised Semantic Segmentation, Zhaozheng Chen, Tan Wang, Xiongwei Wu, Xian-Sheng Hua, Hanwang Zhang, Qianru Sun Jun 2022

Class Re-Activation Maps For Weakly-Supervised Semantic Segmentation, Zhaozheng Chen, Tan Wang, Xiongwei Wu, Xian-Sheng Hua, Hanwang Zhang, Qianru Sun

Research Collection School Of Computing and Information Systems

Extracting class activation maps (CAM) is arguably the most standard step of generating pseudo masks for weakly supervised semantic segmentation (WSSS). Yet, we find that the crux of the unsatisfactory pseudo masks is the binary cross-entropy loss (BCE) widely used in CAM. Specifically, due to the sum-over-class pooling nature of BCE, each pixel in CAM may be responsive to multiple classes co-occurring in the same receptive field. To this end, we introduce an embarrassingly simple yet surprisingly effective method: Reactivating the converged CAM with BCE by using softmax crossentropy loss (SCE), dubbed ReCAM. Given an image, we use CAM to …


Catching Both Gray And Black Swans: Open-Set Supervised Anomaly Detection, Choubo Ding, Guansong Pang, Chunhua Shen Jun 2022

Catching Both Gray And Black Swans: Open-Set Supervised Anomaly Detection, Choubo Ding, Guansong Pang, Chunhua Shen

Research Collection School Of Computing and Information Systems

Despite most existing anomaly detection studies assume the availability of normal training samples only, a few labeled anomaly examples are often available in many real-world applications, such as defect samples identified during random quality inspection, lesion images confirmed by radiologists in daily medical screening, etc. These anomaly examples provide valuable knowledge about the application-specific abnormality, enabling significantly improved detection of similar anomalies in some recent models. However, those anomalies seen during training often do not illustrate every possible class of anomaly, rendering these models ineffective in generalizing to unseen anomaly classes. This paper tackles open-set supervised anomaly detection, in which …


Revisiting Local Descriptor For Improved Few-Shot Classification, Jun He, Richang Hong, Xueliang Liu, Mingliang Xu, Qianru Sun Jun 2022

Revisiting Local Descriptor For Improved Few-Shot Classification, Jun He, Richang Hong, Xueliang Liu, Mingliang Xu, Qianru Sun

Research Collection School Of Computing and Information Systems

Few-shot classification studies the problem of quickly adapting a deep learner to understanding novel classes based on few support images. In this context, recent research efforts have been aimed at designing more and more complex classifiers that measure similarities between query and support images but left the importance of feature embeddings seldom explored. We show that the reliance on sophisticated classifiers is not necessary, and a simple classifier applied directly to improved feature embeddings can instead outperform most of the leading methods in the literature. To this end, we present a new method, named DCAP, for few-shot classification, in which …


Generative Flows With Invertible Attentions, Rhea Sanjay Sukthanker, Zhiwu Huang, Suryansh Kumar, Radu Timofte, Luc Van Gool Jun 2022

Generative Flows With Invertible Attentions, Rhea Sanjay Sukthanker, Zhiwu Huang, Suryansh Kumar, Radu Timofte, Luc Van Gool

Research Collection School Of Computing and Information Systems

Flow-based generative models have shown an excellent ability to explicitly learn the probability density function of data via a sequence of invertible transformations. Yet, learning attentions in generative flows remains understudied, while it has made breakthroughs in other domains. To fill the gap, this paper introduces two types of invertible attention mechanisms, i.e., map-based and transformer-based attentions, for both unconditional and conditional generative flows. The key idea is to exploit a masked scheme of these two attentions to learn long-range data dependencies in the context of generative flows. The masked scheme allows for invertible attention modules with tractable Jacobian determinants, …


Blocklens: Visual Analytics Of Student Coding Behaviors In Block-Based Programming Environments., Sean Tung, Huan Wei, Haotian Li, Yong Wang, Meng Xia, Huamin. Qu Jun 2022

Blocklens: Visual Analytics Of Student Coding Behaviors In Block-Based Programming Environments., Sean Tung, Huan Wei, Haotian Li, Yong Wang, Meng Xia, Huamin. Qu

Research Collection School Of Computing and Information Systems

Block-based programming environments have been widely used to introduce K-12 students to coding. To guide students effectively, instructors and platform owners often need to understand behaviors like how students solve certain questions or where they get stuck and why. However, it is challenging for them to effectively analyze students’ coding data. To this end, we propose BlockLens, a novel visual analytics system to assist instructors and platform owners in analyzing students’ block-based coding behaviors, mistakes, and problem-solving patterns. BlockLens enables the grouping of students by question progress and performance, identification of common problem-solving strategies and pitfalls, and presentation of insights …


Shunted Self-Attention Via Multi-Scale Token Aggregation, Sucheng Ren, Daquan Zhou, Shengfeng He, Jiashi Feng, Xinchao Wang Jun 2022

Shunted Self-Attention Via Multi-Scale Token Aggregation, Sucheng Ren, Daquan Zhou, Shengfeng He, Jiashi Feng, Xinchao Wang

Research Collection School Of Computing and Information Systems

Recent Vision Transformer (ViT) models have demonstrated encouraging results across various computer vision tasks, thanks to its competence in modeling long-range dependencies of image patches or tokens via self-attention. These models, however, usually designate the similar receptive fields of each token feature within each layer. Such a constraint inevitably limits the ability of each self-attention layer in capturing multi-scale features, thereby leading to performance degradation in handling images with multiple objects of different scales. To address this issue, we propose a novel and generic strategy, termed shunted selfattention (SSA), that allows ViTs to model the attentions at hybrid scales per …


Co-Advise: Cross Inductive Bias Distillation, Sucheng Ren, Zhengqi Gao, Tiany Hua, Zihui Xue, Yonglong Tian, Shengfeng He, Hang Zhao Jun 2022

Co-Advise: Cross Inductive Bias Distillation, Sucheng Ren, Zhengqi Gao, Tiany Hua, Zihui Xue, Yonglong Tian, Shengfeng He, Hang Zhao

Research Collection School Of Computing and Information Systems

The inductive bias of vision transformers is more relaxed that cannot work well with insufficient data. Knowledge distillation is thus introduced to assist the training of transformers. Unlike previous works, where merely heavy convolution-based teachers are provided, in this paper, we delve into the influence of models inductive biases in knowledge distillation (e.g., convolution and involution). Our key observation is that the teacher accuracy is not the dominant reason for the student accuracy, but the teacher inductive bias is more important. We demonstrate that lightweight teachers with different architectural inductive biases can be used to co-advise the student transformer with …


Metaformer Is Actually What You Need For Vision, Weihao Yu, Mi Luo, Pan Zhou, Chenyang Si, Yichen Zhou, Xinchao Wang, Jiashi Feng, Shuicheng Yan Jun 2022

Metaformer Is Actually What You Need For Vision, Weihao Yu, Mi Luo, Pan Zhou, Chenyang Si, Yichen Zhou, Xinchao Wang, Jiashi Feng, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Transformers have shown great potential in computer vision tasks. A common belief is their attention-based token mixer module contributes most to their competence. However, recent works show the attention-based module in transformers can be replaced by spatial MLPs and the resulted models still perform quite well. Based on this observation, we hypothesize that the general architecture of the transformers, instead of the specific token mixer module, is more essential to the model's performance. To verify this, we deliberately replace the attention module in transformers with an embarrassingly simple spatial pooling operator to conduct only basic token mixing. Surprisingly, we observe …


A Generalized Family Of Exponentiated Composite Distributions, Bowen Liu, Malwane Ananda Jun 2022

A Generalized Family Of Exponentiated Composite Distributions, Bowen Liu, Malwane Ananda

Mathematical Sciences Faculty Research

In this paper, we propose a new family of distributions, by exponentiating the random variables associated with the probability density functions of composite distributions. We also derive some mathematical properties of this new family of distributions, including the moments and the limited moments. Specifically, two special models in this family are discussed. Three real datasets were chosen, to assess the performance of these two special exponentiated-composite models. When fitting to these three datasets, these three special exponentiated-composite distributions demonstrate significantly better performance, compared to the original composite distributions.


Unrestricted Factor Analysis: A Powerful Alternative To Confirmatory Factor Analysis, Jan-Benedict E.M. Steenkamp, Alberto Maydeu-Olivares Jun 2022

Unrestricted Factor Analysis: A Powerful Alternative To Confirmatory Factor Analysis, Jan-Benedict E.M. Steenkamp, Alberto Maydeu-Olivares

Faculty Publications

The gold standard for modeling multiple indicator measurement data is confirmatory factor analysis (CFA), which has many statistical advantages over traditional exploratory factor analysis (EFA). In most CFA applications, items are assumed to be pure indicators of the construct they intend to measure. However, despite our best efforts, this is often not the case. Cross-loadings incorrectly set to zero can only be expressed through the correlations between the factors, leading to biased factor correlations and to biased structural (regression) parameter estimates. This article introduces a third approach, which has emerged in the psychometric literature, viz., unrestricted factor analysis (UFA). UFA …


Out-Of-Core Gpu Path Tracing On Large Instanced Scenes Via Geometry Streaming, Jeremy Berchtold Jun 2022

Out-Of-Core Gpu Path Tracing On Large Instanced Scenes Via Geometry Streaming, Jeremy Berchtold

Master's Theses

We present a technique for out-of-core GPU path tracing of arbitrarily large scenes that is compatible with hardware-accelerated ray-tracing. Our technique improves upon previous works by subdividing the scene spatially into streamable chunks that are loaded using a priority system that maximizes ray throughput and minimizes GPU memory usage. This allows for arbitrarily large scaling of scene complexity. Our system required under 19 minutes to render a solid color version of Disney's Moana Island scene (39.3 million instances, 261.1 million unique quads, and 82.4 billion instanced quads at a resolution of 1024x429 and 1024spp on an RTX 5000 (24GB memory …


Sediment Characteristics Of The Chesapeake Bay And Its Tributaries, Virginia Province: Data Files, Gary F. Anderson Jun 2022

Sediment Characteristics Of The Chesapeake Bay And Its Tributaries, Virginia Province: Data Files, Gary F. Anderson

Data

During the 1990’s, Dr. Maynard Nichols and colleagues at the Virginia Institute of Marine Science compiled digital databases of sediment observations in the Chesapeake Bay and other coastal bays and rivers. These projects were performed under several cooperative agreements with NOAA, EPA and USGS. This particular dataset covers the Chesapeake Bay for bulk properties and contaminants. Additional references are provided below. The original files and filenames are provided without edit. See the readme.txt file for overall explanation of the datasets and individual .DOC files for the data dictionary and further data processing information for each waterbody.


Statistical Modeling Of Longitudinal Medical Cost Data, Shikun Wang Jun 2022

Statistical Modeling Of Longitudinal Medical Cost Data, Shikun Wang

Dissertations & Theses (Open Access)

Projecting the future cancer care cost is critical in health economics research and policy making. An indispensable step is to estimate cost trajectories from an incident cohort of cancer patients using longitudinal medical cost data, accounting for terminal events such as death, and right censoring due to loss of follow-up. Since the cost of cancer care and survival are correlated, a scientifically meaningful quantity for inference in this context is the mean cost trajectory conditional on survival. Many standard approaches for longitudinal and survival analysis are not valid for the problem. The research for my Ph.D. dissertation consists of three …