The structure of engineered infrastructure systems can be represented by a layered architecture. The relationship between physical components of many types of these systems has been well studied and modelled. The engineered design of these systems can account for some of their characteristics such as robustness, flexibility, reliability. We believe that the resilience, or adaptive capacity, of these systems cannot be described merely by studying the engineered components of such systems. This requires studying what we refer to as the protocol layers. The protocol layer is where humans interact with the engineered elements of the system through the collection and processing of information with the aim of producing a control activity on the system. In the first part of this study we look at several formulations of a generic layered transportation system, to discuss the importance of protocols in adaptive capability. In the second part, we take a brief historical look at an important American intermodal inland waterway transportation system, The Tennessee Valley Authority. From this system we extract some basic protocol layers and discuss how the success or failure of this system has resulted from these protocol layers.
more »
« less
Online Control for Adaptive Tapering of Medications
We investigate adaptive protocols for the elimination or reduction of the use of medications or addictive substances. We formalize this problem as online optimization, minimizing the cumulative dose subject to constraints on individual well-being. We adapt a model of addiction from the psychology literature and show how it can be described by a class of linear time-invariant systems. For such systems, the optimal policy amounts to taking the smallest dose that maintains well-being. We derive a simple protocol based on integral control that requires no system identification, only needing approximate knowledge of the instantaneous dose response. This protocol is robust to model misspecification and is able to maintain an individual's well-being during the tapering process. Numerical experiments demonstrate that the adaptive protocol outperforms non-adaptive methods in terms of both maintenance of well-being and rate of dose reduction.
more »
« less
- Award ID(s):
- 2326498
- PAR ID:
- 10517681
- Publisher / Repository:
- IEEE
- Date Published:
- ISBN:
- 979-8-3503-0124-3
- Page Range / eLocation ID:
- 4067 to 4074
- Format(s):
- Medium: X
- Location:
- Singapore, Singapore
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Developing PET reconstruction algorithms with improved low-count capabilities may provide a timely and costeffective means of reducing radiation dose in promising clinical applications such as immuno-PET that require long-lived radiotracers. For many PET clinics, the reconstruction protocol consists of postsmoothed ordered-sets expectation-maximization (OSEM) reconstruction, but penalized likelihood methods based on total-variation (TV) regularization could substantially reduce dose. We performed a task-based comparison of postsmoothed OSEM and higher-order TV (HOTV) reconstructions using simulated images of a contrast-detail phantom. An anthropomorphic visual-search model observer read the images in a location-known receiver operating characteristic (ROC) format. Acquisition counts, target uptake, and target size were study variables, and the OSEM postfiltering was task-optimized based on count level. A psychometric analysis of observer performance for the selected task found that the HOTV algorithm allowed a two-fold reduction in dose compared to the optimized OSEM algorithm.more » « less
-
Dachman-Soled, Dana (Ed.)Adaptive security is a highly desirable property in the design of secure protocols. It tolerates adversaries that corrupt parties as the protocol proceeds, as opposed to static security where the adversary corrupts the parties at the onset of the execution. The well-accepted folklore is that static and adaptive securities are equivalent for perfectly secure protocols. Indeed, this folklore is backed up with a transformation by Canetti et al. (EUROCRYPT'01), showing that any perfectly secure protocol that is statically secure and satisfies some basic requirements is also adaptively secure. Yet, the transformation results in an adaptively secure protocol with inefficient simulation (i.e., where the simulator might run in super-polynomial time even if the adversary runs just in polynomial time). Inefficient simulation is problematic when using the protocol as a sub-routine in the computational setting. Our main question is whether an alternative efficient transformation from static to adaptive security exists. We show an inherent difficulty in achieving this goal generically. In contrast to the folklore, we present a protocol that is perfectly secure with efficient static simulation (therefore also adaptively secure with inefficient simulation), but for which efficient adaptive simulation does not exist (assuming the existence of one-way permutations). In addition, we prove that the seminal protocol of Ben-Or, Goldwasser and Wigderson (STOC'88) is secure against adaptive, semi-honest corruptions with efficient simulation. Previously, adaptive security of the protocol, as is, was only known either for a restricted class of circuits, or for all circuits but with inefficient simulation.more » « less
-
Identifying the right dose is one of the most important decisions in drug development. Adaptive designs are promoted to conduct dose-finding clinical trials as they are more efficient and ethical compared with static designs. However, current techniques in response-adaptive designs for dose allocation are complex and need significant computational effort, which is a major impediment for implementation in practice. This study proposes a Bayesian nonparametric framework for estimating the dose-response curve, which uses a piecewise linear approximation to the curve by consecutively connecting the expected mean response at each dose. Our extensive numerical results reveal that a first-order Bayesian nonparametric model with a known correlation structure in prior for the expected mean response performs competitively when compared with the standard approach and other more complex models in terms of several relevant metrics and enjoys computational efficiency. Furthermore, structural properties for the optimal learning problem, which seeks to minimize the variance of the target dose, are established under this simple model. Summary of Contribution: In this work, we propose a methodology to derive efficient patient allocation rules in response-adaptive dose-finding clinical trials, where computational issues are the main concern. We show that our methodologies are competitive with the state-of-the-art methodology in terms of solution quality, are significantly more computationally efficient, and are more robust in terms of the shape of the dose-response curve, among other parameter changes. This research fits in “the intersection of computing and operations research” as it adapts operations research techniques to produce computationally attractive solutions to patient allocation problems in dose-finding clinical trials.more » « less
-
Abstract The ongoing COVID-19 global pandemic has necessitated evaluating various disinfection technologies for reducing viral transmission in public settings. Ultraviolet (UV) radiation can inactivate pathogens and viruses but more insight is needed into the performance of different UV wavelengths and their applications. We observed greater than a 3-log reduction of SARS-CoV-2 infectivity with a dose of 12.5 mJ/cm 2 of 254 nm UV light when the viruses were suspended in PBS, while a dose of 25 mJ/cm 2 was necessary to achieve a similar reduction when they were in an EMEM culture medium containing 2%(v/v) FBS, highlighting the critical effect of media in which the virus is suspended, given that SARS-CoV-2 is always aerosolized when airborne or deposited on a surface. It was found that SARS-CoV-2 susceptibility (a measure of the effectiveness of the UV light) in a buffer such as PBS was 4.4-fold greater than that in a cell culture medium. Furthermore, we discovered the attenuation of UVC disinfection by amino acids, vitamins, and niacinamide, highlighting the importance of determining UVC dosages under a condition close to aerosols that wrap the viruses. We developed a disinfection model to determine the effect of the environment on UVC effectiveness with three different wavelengths, 222 nm, 254 nm, and 265 nm. An inverse correlation between the liquid absorbance and the viral susceptibility was observed. We found that 222 nm light was most effective at reducing viral infectivity in low absorbing liquids such as PBS, whereas 265 nm light was most effective in high absorbing liquids such as cell culture medium. Viral susceptibility was further decreased in N95 masks with 222 nm light being the most effective. The safety of 222 nm was also studied. We detected changes to the mechanical properties of the stratum corneum of human skins when the 222 nm accumulative exposure exceeded 50 J/cm 2 .The findings highlight the need to evaluate each UV for a given application, as well as limiting the dose to the lowest dose necessary to avoid unnecessary exposure to the public.more » « less
An official website of the United States government
