28 results on '"Zimand P"'
Search Results
2. A tale of two paths to vaccine acceptance: self-interest and collective interest effect, mediated by institutional trust, and moderated by gender
- Author
-
Ofrit Kol, Dorit Zimand-Sheiner, and Shalom Levy
- Subjects
History of scholarship and learning. The humanities ,AZ20-999 ,Social Sciences - Abstract
Abstract Coronavirus and other prevailing viruses continue to remain a health threat and challenge the efforts of institutions to promote vaccination acceptance. The current study’s aim is to propose a conceptual framework explaining the role of individual motivators (such as self-interest and collective interest) in shaping attitudes toward vaccination while emphasizing the pivotal role of institutional trust as a mediator and gender as a moderator. Data were collected via an online panel survey among Israelis (N = 464), and SEM statistics were used to test the model empirically. The path analysis model supports the positive direct effect of collective interest and the negative effect of self-interest. Additionally, it shows an indirect effect through the mediation effect of institutional trust and gender moderation. Therefore, institutional trust may significantly influence self-interest people’s attitudes toward vaccines. Furthermore, since females process information more comprehensively, their developed trustworthiness in institutions has an increased impact on vaccine acceptance. Theoretical and practical implications are discussed.
- Published
- 2024
- Full Text
- View/download PDF
3. Optimal Coding Theorems in Time-Bounded Kolmogorov Complexity
- Author
-
Lu, Zhenjian, Oliveira, Igor C., and Zimand, Marius
- Subjects
Computer Science - Computational Complexity - Abstract
The classical coding theorem in Kolmogorov complexity states that if an $n$-bit string $x$ is sampled with probability $\delta$ by an algorithm with prefix-free domain then K$(x) \leq \log(1/\delta) + O(1)$. In a recent work, Lu and Oliveira [LO21] established an unconditional time-bounded version of this result, by showing that if $x$ can be efficiently sampled with probability $\delta$ then rKt$(x) = O(\log(1/\delta)) + O(\log n)$, where rKt denotes the randomized analogue of Levin's Kt complexity. Unfortunately, this result is often insufficient when transferring applications of the classical coding theorem to the time-bounded setting, as it achieves a $O(\log(1/\delta))$ bound instead of the information-theoretic optimal $\log(1/\delta)$. We show a coding theorem for rKt with a factor of $2$. As in previous work, our coding theorem is efficient in the sense that it provides a polynomial-time probabilistic algorithm that, when given $x$, the code of the sampler, and $\delta$, it outputs, with probability $\ge 0.99$, a probabilistic representation of $x$ that certifies this rKt complexity bound. Assuming the security of cryptographic pseudorandom generators, we show that no efficient coding theorem can achieve a bound of the form rKt$(x) \leq (2 - o(1)) \cdot \log(1/\delta) +$ poly$(\log n)$. Under a weaker assumption, we exhibit a gap between efficient coding theorems and existential coding theorems with near-optimal parameters. We consider pK$^t$ complexity [GKLO22], a variant of rKt where the randomness is public and the time bound is fixed. We observe the existence of an optimal coding theorem for pK$^t$, and employ this result to establish an unconditional version of a theorem of Antunes and Fortnow [AF09] which characterizes the worst-case running times of languages that are in average polynomial-time over all P-samplable distributions., Comment: Full version of a paper to be presented at ICALP 2022
- Published
- 2022
4. Online matching games in bipartite expanders and applications
- Author
-
Bauwens, Bruno and Zimand, Marius
- Subjects
Computer Science - Data Structures and Algorithms - Abstract
We study connections between expansion in bipartite graphs and efficient online matching modeled via several games. In the basic game, an opponent switches {\em on} and {\em off} nodes on the left side and, at any moment, at most $K$ nodes may be on. Each time a node is switched on, it must be irrevocably matched with one of its neighbors. A bipartite graph has $e$-expansion up to $K$ if every set $S$ of at most $K$ left nodes has at least $e\#S$ neighbors. If all left nodes have degree $D$ and $e$ is close to $D$, then the graph is a lossless expander. We show that lossless expanders allow for a polynomial time strategy in the above game, and, furthermore, with a slight modification, they allow a strategy running in time $O(D \log N)$, where $N$ is the number of left nodes. Using this game and a few related variants, we derive applications in data structures and switching networks. Namely, (a) 1-query bitprobe storage schemes for dynamic sets (previous schemes work only for static sets),(b) explicit space- and time-efficient storage schemes for static and dynamic sets with non-adaptive access to memory (the first fully dynamic dictionary with non-adaptive probing using almost optimal space), and (c) non-explicit constant depth non-blocking $N$-connectors with poly$(\log N)$ time path finding algorithms whose size is optimal within a factor of $O(\log N)$ (previous connectors are double-exponentially slower)., Comment: The exposition has been improved and a few minor issues have been fixed
- Published
- 2022
5. 27 Open Problems in Kolmogorov Complexity
- Author
-
Romashchenko, Andrei, Shen, Alexander, and Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Computational Complexity - Abstract
The paper proposes open problems in classical Kolmogorov complexity. Each problem is presented with background information and thus the article also surveys some recent studies in the area., Comment: The paper has appeared in the Open Problems column of SIGACT News
- Published
- 2022
6. Online matching in lossless expanders
- Author
-
Zimand, Marius
- Subjects
Computer Science - Data Structures and Algorithms - Abstract
Bauwens and Zimand [BZ 2019] have shown that lossless expanders have an interesting online matching property. The result appears in an implicit form in [BZ 2019]. We present an explicit version of this property which is directly amenable to typical applications, prove it in a self-contained manner that clarifies the role of some parameters, and give two applications. A $(K, \epsilon)$ lossless expander is a bipartite graph such that any subset $S$ of size at most $K$ of nodes on the left side of the bipartition has at least $(1-\epsilon) D |S|$ neighbors, where $D$ is the left degree.The main result is that any such graph, after a slight modification, admits $(1-O(\epsilon)D, 1)$ online matching up to size $K$. This means that for any sequence $S=(x_1, \ldots, x_K)$ of nodes on the left side of the bipartition, one can assign in an online manner to each node $x_i$ in $S$ a set $A_i$ consisting of $(1-O(\epsilon))$ fraction of its neighbors so that the sets $A_1, \ldots, A_K$ are pairwise disjoint. "Online manner" refers to the fact that, for every $i$, the set of nodes assigned to $x_i$ only depends on the nodes assigned to $x_1, \ldots, x_{i-1}$. The first application concerns storage schemes for representing a set $S$, so that a membership query "Is $x \in S$?" can be answered probabilistically by reading a single bit. All the previous one-probe storage schemes were for a static set $S$. We show that a lossless expander can be used to construct a one-probe storage scheme for dynamic sets, i.e., sets in which elements can be inserted and deleted without affecting the representation of other elements. The second application is about non-blocking networks., Comment: Abstract shortened to meet arxiv requirements
- Published
- 2021
7. Universal codes in the shared-randomness model for channels with general distortion capabilities
- Author
-
Bauwens, Bruno and Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Computational Complexity ,68P30 - Abstract
We put forth new models for universal channel coding. Unlike standard codes which are designed for a specific type of channel, our most general universal code makes communication resilient on every channel, provided the noise level is below the tolerated bound, where the noise level t of a channel is the logarithm of its ambiguity (the maximum number of strings that can be distorted into a given one). The other more restricted universal codes still work for large classes of natural channels. In a universal code, encoding is channel-independent, but the decoding function knows the type of channel. We allow the encoding and the decoding functions to share randomness, which is unavailable to the channel. There are two scenarios for the type of attack that a channel can perform. In the oblivious scenario, codewords belong to an additive group and the channel distorts a codeword by adding a vector from a fixed set. The selection is based on the message and the encoding function, but not on the codeword. In the Hamming scenario, the channel knows the codeword and is fully adversarial. For a universal code, there are two parameters of interest: the rate, which is the ratio between the message length k and the codeword length n, and the number of shared random bits. We show the existence in both scenarios of universal codes with rate 1-t/n - o(1), which is optimal modulo the o(1) term. The number of shared random bits is O(log n) in the oblivious scenario, and O(n) in the Hamming scenario, which, for typical values of the noise level, we show to be optimal, modulo the constant hidden in the O() notation. In both scenarios, the universal encoding is done in time polynomial in n, but the channel-dependent decoding procedures are in general not efficient. For some weaker classes of channels we construct universal codes with polynomial-time encoding and decoding., Comment: Removed the mentioning of online matching, which is not used here
- Published
- 2020
8. Universal almost optimal compression and Slepian-Wolf coding in probabilistic polynomial time
- Author
-
Bauwens, Bruno and Zimand, Marius
- Subjects
Computer Science - Information Theory ,68Q30, 94A24, 94A15 ,F.2.3 - Abstract
In a lossless compression system with target lengths, a compressor ${\cal C}$ maps an integer $m$ and a binary string $x$ to an $m$-bit code $p$, and if $m$ is sufficiently large, a decompressor ${\cal D}$ reconstructs $x$ from $p$. We call a pair $(m,x)$ $\textit{achievable}$ for $({\cal C},{\cal D})$ if this reconstruction is successful. We introduce the notion of an optimal compressor ${\cal C}_\text{opt}$, by the following universality property: For any compressor-decompressor pair $({\cal C}, {\cal D})$, there exists a decompressor ${\cal D}'$ such that if $(m,x)$ is achievable for $({\cal C},{\cal D})$, then $(m+\Delta, x)$ is achievable for $({\cal C}_\text{opt}, {\cal D}')$, where $\Delta$ is some small value called the overhead. We show that there exists an optimal compressor that has only polylogarithmic overhead and works in probabilistic polynomial time. Differently said, for any pair $({\cal C}, {\cal D})$, no matter how slow ${\cal C}$ is, or even if ${\cal C}$ is non-computable, ${\cal C}_{\text{opt}}$ is a fixed compressor that in polynomial time produces codes almost as short as those of ${\cal C}$. The cost is that the corresponding decompressor is slower. We also show that each such optimal compressor can be used for distributed compression, in which case it can achieve optimal compression rates, as given in the Slepian-Wolf theorem, and even for the Kolmogorov complexity variant of this theorem. Moreover, the overhead is logarithmic in the number of sources, and unlike previous implementations of Slepian-Wolf coding, meaningful compression can still be achieved if the number of sources is much larger than the length of the compressed strings., Comment: 26 pages
- Published
- 2019
9. Secret key agreement from correlated data, with no prior information
- Author
-
Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Cryptography and Security - Abstract
A fundamental question that has been studied in cryptography and in information theory is whether two parties can communicate confidentially using exclusively an open channel. We consider the model in which the two parties hold inputs that are correlated in a certain sense. This model has been studied extensively in information theory, and communication protocols have been designed which exploit the correlation to extract from the inputs a shared secret key. However, all the existing protocols are not universal in the sense that they require that the two parties also know some attributes of the correlation. In other words, they require that each party knows something about the other party's input. We present a protocol that does not require any prior additional information. It uses space-bounded Kolmogorov complexity to measure correlation and it allows the two legal parties to obtain a common key that looks random to an eavesdropper that observes the communication and is restricted to use a bounded amount of space for the attack. Thus the protocol achieves complexity-theoretical security, but it does not use any unproven result from computational complexity. On the negative side, the protocol is not efficient in the sense that the computation of the two legal parties uses more space than the space allowed to the adversary., Comment: Several small errors have been fixed and the presentation has been improved, following the reviewers' observations
- Published
- 2019
10. On a conditional inequality in Kolmogorov complexity and its applications in communication complexity
- Author
-
Romashchenko, Andrei and Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,Computer Science - Information Theory - Abstract
Romashchenko and Zimand~\cite{rom-zim:c:mutualinfo} have shown that if we partition the set of pairs $(x,y)$ of $n$-bit strings into combinatorial rectangles, then $I(x:y) \geq I(x:y \mid t(x,y)) - O(\log n)$, where $I$ denotes mutual information in the Kolmogorov complexity sense, and $t(x,y)$ is the rectangle containing $(x,y)$. We observe that this inequality can be extended to coverings with rectangles which may overlap. The new inequality essentially states that in case of a covering with combinatorial rectangles, $I(x:y) \geq I(x:y \mid t(x,y)) - \log \rho - O(\log n)$, where $t(x,y)$ is any rectangle containing $(x,y)$ and $\rho$ is the thickness of the covering, which is the maximum number of rectangles that overlap. We discuss applications to communication complexity of protocols that are nondeterministic, or randomized, or Arthur-Merlin, and also to the information complexity of interactive protocols., Comment: 15 pages, 1 figure
- Published
- 2019
11. Help me if you can: the advantage of farmers’ altruistic message appeal in generating engagement with social media posts during COVID-19
- Author
-
Zimand-Sheiner, Dorit, Kol, Ofrit, and Levy, Shalom
- Published
- 2022
- Full Text
- View/download PDF
12. An operational characterization of mutual information in algorithmic information theory
- Author
-
Romashchenko, Andrei and Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Computational Complexity - Abstract
We show that the mutual information, in the sense of Kolmogorov complexity, of any pair of strings $x$ and $y$ is equal, up to logarithmic precision, to the length of the longest shared secret key that two parties, one having $x$ and the complexity profile of the pair and the other one having $y$ and the complexity profile of the pair, can establish via a probabilistic protocol with interaction on a public channel. For $\ell > 2$, the longest shared secret that can be established from a tuple of strings $(x_1, \ldots , x_\ell)$ by $\ell$ parties, each one having one component of the tuple and the complexity profile of the tuple, is equal, up to logarithmic precision, to the complexity of the tuple minus the minimum communication necessary for distributing the tuple to all parties. We establish the communication complexity of secret key agreement protocols that produce a secret key of maximal length, for protocols with public randomness. We also show that if the communication complexity drops below the established threshold, then only very short secret keys can be obtained., Comment: 39 pages, 2 figures. A brief version of this work has been presented at 45th International Colloquium on Automata, Languages, and Programming (ICALP), Prague, July 10-13, 2018
- Published
- 2017
13. Distributed compression through the lens of algorithmic information theory: a primer
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,Computer Science - Information Theory - Abstract
Distributed compression is the task of compressing correlated data by several parties, each one possessing one piece of data and acting separately. The classical Slepian-Wolf theorem (D. Slepian, J. K. Wolf, IEEE Transactions on Inf. Theory, 1973) shows that if data is generated by independent draws from a joint distribution, that is by a memoryless stochastic process, then distributed compression can achieve the same compression rates as centralized compression when the parties act together. Recently, the author (M. Zimand, STOC 2017) has obtained an analogue version of the Slepian-Wolf theorem in the framework of Algorithmic Information Theory (also known as Kolmogorov complexity). The advantage over the classical theorem, is that the AIT version works for individual strings, without any assumption regarding the generative process. The only requirement is that the parties know the complexity profile of the input strings, which is a simple quantitative measure of the data correlation. The goal of this paper is to present in an accessible form that omits some technical details the main ideas from the reference (M. Zimand, STOC 2017).
- Published
- 2017
14. List approximation for increasing Kolmogorov complexity
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,Computer Science - Information Theory ,Mathematics - Logic - Abstract
It is impossible to effectively modify a string in order to increase its Kolmogorov complexity. But is it possible to construct a few strings, not longer than the input string, so that most of them have larger complexity? We show that the answer is yes. We present an algorithm that on input a string $x$ of length $n$ returns a list with $O(n^2)$ many strings, all of length $n$, such that 99\% of them are more complex than $x$, provided the complexity of $x$ is less than $n - \log \log n - O(1)$. We obtain similar results for other parameters, including a polynomial-time construction., Comment: This version corrects a bug in the previous version, which unfortunately is published in the proceedings of STACS 2017. Theorem 1.1 holds with parameters that are slightly weaker than previously claimed
- Published
- 2016
15. Kolmogorov complexity version of Slepian-Wolf coding
- Author
-
Zimand, Marius
- Subjects
Computer Science - Information Theory - Abstract
Alice and Bob are given two correlated n-bit strings x_1 and, respectively, x_2, which they want to losslessly compress and send to Zack. They can either collaborate by sharing their strings, or work separately. We show that there is no disadvantage in the second scenario: Alice and Bob, without knowing the other party's string, can achieve almost optimal compression in the sense of Kolmogorov complexity. Furthermore, compression takes polynomial time and can be made at any combination of lengths that satisfy some necessary conditions (modulo additive polylog terms). More precisely, there exist probabilistic algorithms E_1, E_2, and deterministic algorithm D, with E_1 and E_2 running in polynomial time, having the following behavior: if n_1, n_2 are two integers satisfying n_1 + n_2 \geq C(x_1,x_2), n_1 \geq C(x_1 | x_2), n_2 \geq C(x_2 | x_1), then for i \in {1,2}, E_i on input x_i and n_i outputs a string of length n_i + \polylog n such that D on input E_1(x_1), E_2(x_2) reconstructs (x_1,x_2) with high probability (where C(x) denotes the plain Kolmogorov complexity of x, and C(x \mid y) is the complexity of x conditioned by y). Our main result is more general, as it deals with the compression of any constant number of correlated strings. It is an analog in the framework of algorithmic information theory of the classic Slepian-Wolf Theorem, a fundamental result in network information theory, in which x_1 and x_2 are realizations of two discrete random variables formed by drawing independently n times from a joint distribution. Also, in the classical result, the decompressor needs to know the joint distribution of the sources. In our result no type of independence is assumed and the decompressor does not have any apriori information about the sources that are compressed, and it still is the case that distributed compression is on a par with centralized compression., Comment: Accepted at STOC 2017. This revision has a few minor changes
- Published
- 2015
16. List Approximation for Increasing Kolmogorov Complexity
- Author
-
Marius Zimand
- Subjects
Kolmogorov complexity ,random strings ,extractors ,Mathematics ,QA1-939 - Abstract
It is impossible to effectively modify a string in order to increase its Kolmogorov complexity. However, is it possible to construct a few strings, no longer than the input string, so that most of them have larger complexity? We show that the answer is yes. We present an algorithm that takes as input a string x of length n and returns a list with O(n2) strings, all of length n, such that 99% of them are more complex than x, provided the complexity of x is less than n−loglogn−O(1). We also present an algorithm that obtains a list of quasi-polynomial size in which each element can be produced in polynomial time.
- Published
- 2021
- Full Text
- View/download PDF
17. Deconstructing the Blueprint for Infringement: Remedying Flawed Interpretations of the § 120(a) Exception to Architecture Copyrights.
- Author
-
Zimand, Margalit
- Abstract
The article addresses the flawed interpretations of Section 120(a) exception to architecture copyrights in the U.S. Architectural Works Copyright Protection Act of 1990 (AWCPA). Topics include how the Congress failed to perceive the ambiguities of the interpretation, the history of the inclusion of architecture in the Berne Convention and the U.S. implementation of the Convention, a background on AWCPA, and the linguistic points that were in contention during its drafting.
- Published
- 2024
- Full Text
- View/download PDF
18. Short lists with short programs in short time
- Author
-
Bauwens, Bruno, Makhlin, Anton, Vereshchagin, Nikolay, and Zimand, Marius
- Published
- 2018
- Full Text
- View/download PDF
19. On Optimal Language Compression for Sets in PSPACE/poly
- Author
-
Vinodchandran, N. V. and Zimand, Marius
- Published
- 2015
- Full Text
- View/download PDF
20. A (local) apple a day: pandemic-induced changes in local food buying, a generational cohort perspective
- Author
-
Kol, Ofrit, Zimand-Sheiner, Dorit, and Levy, Shalom
- Abstract
The COVID-19 pandemic has caused disruptive change in agri-food distribution around the world and accelerated local food buying which creates new challenges for managers in the food industry. The purposes of this study are to construct and empirically test a conceptual model that integrates expectancy value theory with social and environmental values (pro-environmental behaviour, altruism and ethnocentricity) in order to explain this change in buying behaviour. In addition, the predictive model is examined among various generational cohorts. For the purposes of this research, an online panel study was conducted, employing a stratified sampling method (n= 672). The results reveal that social and environmental values have a significant effect on consumer positive attitude toward buying, intention to buy, and actual change in local food buying. Nevertheless, the effects differ among generational cohorts emphasising the different roles of social and environmental values among generations on sustainable consumption. Recommendations for practitioners and policy makers are suggested.
- Published
- 2023
- Full Text
- View/download PDF
21. Clinical evaluation of Sofia Rapid Antigen Assay for detection of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) among emergency department to hospital admissions
- Author
-
Smith, Richard D., Johnson, J. Kristie, Clay, Colleen, Girio-Herrera, Leo, Stevens, Diane, Abraham, Michael, Zimand, Paul, Ahlman, Mark, Gimigliano, Sheri, Zhao, Richard, Hildenbrand, Cynthia, Barrueto, Fermin, and Leekha, Surbhi
- Abstract
AbstractObjective:To determine the utility of the Sofia SARS rapid antigen fluorescent immunoassay (FIA) to guide hospital-bed placement of patients being admitted through the emergency department (ED).Design:Cross-sectional analysis of a clinical quality improvement study.Setting:This study was conducted in 2 community hospitals in Maryland from September 21, 2020, to December 3, 2020. In total, 2,887 patients simultaneously received the Sofia SARS rapid antigen FIA and SARS-CoV-2 RT-PCR assays on admission through the ED.Methods:Rapid antigen results and symptom assessment guided initial patient placement while confirmatory RT-PCR was pending. The sensitivity, specificity, positive predictive values, and negative predictive values of the rapid antigen assay were calculated relative to RT-PCR, overall and separately for symptomatic and asymptomatic patients. Assay sensitivity was compared to RT-PCR cycle threshold (Ct) values. Assay turnaround times were compared. Clinical characteristics of RT-PCR–positive patients and potential exposures from false-negative antigen assays were evaluated.Results:For all patients, overall agreement was 97.9%; sensitivity was 76.6% (95% confidence interval [CI], 71%–82%), and specificity was 99.7% (95% CI, 99%–100%). We detected no differences in performance between asymptomatic and symptomatic individuals. As RT-PCR Ct increased, the sensitivity of the antigen assay decreased. The mean turnaround time for the antigen assay was 1.2 hours (95% CI, 1.0–1.3) and for RT-PCR it was 20.1 hours (95% CI, 18.9–40.3) (P< .001). No transmission from antigen-negative/RT-PCR–positive patients was identified.Conclusions:Although not a replacement for RT-PCR for detection of all SARS-CoV-2 infections, the Sofia SARS antigen FIA has clinical utility for potential initial timely patient placement.
- Published
- 2022
- Full Text
- View/download PDF
22. Kinetics of SARS-CoV-2 antibody responses pre-COVID-19 and post-COVID-19 convalescent plasma transfusion in patients with severe respiratory failure: an observational case–control study
- Author
-
Klein, Matthew N, Wang, Elizabeth Wenqian, Zimand, Paul, Beauchamp, Heather, Donis, Caitlin, Ward, Matthew D, Martinez-Hernandez, Aidaelis, Tabatabai, Ali, Baddley, John W, Bloch, Evan M, Mullins, Kristin E, and Fontaine, Magali J
- Abstract
AimsWhile the SARS-CoV-2 pandemic may be contained through vaccination, transfusion of convalescent plasma (CCP) from individuals who recovered from COVID-19 (CCP) is considered an alternative treatment. We investigate if CCP transfusion in patients with severe respiratory failure increases plasma titres of SARS-CoV-2 antibodies and improves clinical outcomes.MethodsPatients with COVID-19 (n=34) were consented for CCP transfusion and serial blood draws pretransfusion and post-transfusion. Plasma SARS-CoV-2 antireceptor binding domain (RBD) IgG and IgM titres were measured by ELISA serially, and compared with serial plasma titre levels from control patients (n=68). The primary outcome was survival at 30 days, and secondary outcomes were length of ventilator and/or extracorporeal membrane oxygenation (ECMO) support, length of stay (LOS) in the hospital and in the intensive care unit (ICU). Outcomes were compared with matched control patients (n=34). Kinetics of antibodies and clinical outcomes were compared using LOess regression and ORs, respectively.ResultsPrior to CCP transfusion, 74% of patients were anti-RBD seropositive for IgG (median 1:3200), and 81% were anti-RBD IgM seropositive (median 1:320), while 16% were seronegative. The kinetics of antibody titres in CCP recipients were similar to controls. CCP recipients presented with similar survival, duration on ventilatory and/or ECMO support, as well as ICU and hospital LOS compared with controls.ConclusionsCCP transfusion did not increase the kinetics of SARS-CoV2 antibodies and did not result in improved clinical outcomes in patients with COVID-19 with severe respiratory failure, suggesting that CCP may not be indicated in this category of patients.
- Published
- 2022
- Full Text
- View/download PDF
23. It makes a difference! Impact of social and personal message appeals on engagement with sponsored posts
- Author
-
Zimand Sheiner, Dorit, Kol, Ofrit, and Levy, Shalom
- Abstract
Purpose: Grounded in uses and gratifications (U&G) theory and relying on the congruence/incongruence approaches, the current research aims to contribute to the study of interactive marketing by measuring the effectiveness of social and personal sponsored post message appeals on consumer psychological and behavioral engagement. A conceptual framework is suggested. Design/methodology/approach: Data were collected during a field experiment conducted on Facebook, consisting of two sponsored Facebook post campaigns, followed by a survey distributed to consumers who were exposed to the experiment. Findings: A structural path model suggests that the congruence of the social message appeal of sponsored Facebook posts leads directly to psychological engagement that follows affective response. This path elevates an indirect effect toward behavioral engagement. Additionally, it was found that the incongruence of the personal message appeal of sponsored Facebook posts leads directly to behavioral engagement. Originality/value: The novelty of the current research focuses on the unexplored subject of sponsored Facebook post message appeal effectiveness. Based on U&G theory applied to social media and the (in)congruence approaches, the study suggests a new dichotomy of message appeal for digital advertising, i.e. social vs. personal message strategies. Consumer engagement with the two appeals adds value to theory and practice by conceptualizing the effect of sponsored post content strategies on consumer engagement in Facebook while incorporating ad content with a hierarchical process.
- Published
- 2021
- Full Text
- View/download PDF
24. A Brief on Short Descriptions
- Author
-
Teutsch, Jason and Zimand, Marius
- Abstract
We discuss research developments on the complexity of shortest programs since the turn of the millennium. In particular, we will delve into the phenomenon of list approximation: while it's impossible to compute the shortest description for a given string, we can efficiently generate a short list of candidates which includes a (nearly) shortest description.
- Published
- 2016
- Full Text
- View/download PDF
25. On Approximate Decidability of Minimal Programs
- Author
-
Teutsch, Jason and Zimand, Marius
- Abstract
An index e in a numbering of partial-recursive functions is called minimal if every lesser index computes a different function from e. Since the 1960s, it has been known that, in any reasonable programming language, no effective procedure determines whether or not a given index is minimal. We investigate whether the task of determining minimal indices can be solved in an approximate sense. Our first question, regarding the set of minimal indices, is whether there exists an algorithm that can correctly label 1 out of k indices as either minimal or nonminimal. Our second question, regarding the function that computes minimal indices, is whether one can compute a short list of candidate indices that includes a minimal index for a given program. We give negative answers to both questions for the important case of numberings with linearly bounded translators.
- Published
- 2015
- Full Text
- View/download PDF
26. Chlorhexidine Gluconate Bathing Program to Reduce Health Care-Associated Infections in Both Critically Ill and Non-Critically Ill Patients.
- Author
-
Chapman L, Hargett L, Anderson T, Galluzzo J, and Zimand P
- Subjects
- Baths, Chlorhexidine analogs & derivatives, Critical Illness, Delivery of Health Care, Humans, Intensive Care Units, Anti-Infective Agents, Local, Cross Infection prevention & control
- Abstract
Background: Critical care nurses take care of patients with complicated, comorbid, and compromised conditions. These patients are at risk for health care-associated infections, which affect patients' lives and health care systems in various ways., Objective: To gauge the impact of routinely bathing patients with 4% chlorhexidine gluconate solution on the incidence of health care-associated infections in a medical-surgical intensive care unit and a postoperative telemetry unit; to outline the framework for a hospital-wide presurgical chlorhexidine gluconate bathing program and share the results., Methods: A standard bathing protocol using a 4% chlorhexidine gluconate solution was developed. The protocol included time studies, training, monitoring, and surveillance of health care-associated infections., Results: Consistent patient bathing with 4% chlorhexidine gluconate was associated with a 52% reduction in health care-associated infections in a medical-surgical intensive care unit. The same program in a postoperative telemetry unit yielded a 45% reduction in health care-associated infections., Conclusion: A comprehensive daily 4% chlorhexidine gluconate bathing program can be implemented with standardized protocols and detailed instructions and can significantly reduce the incidence of health care-associated infections in intensive care unit and non-intensive care unit hospital settings., (©2021 American Association of Critical-Care Nurses.)
- Published
- 2021
- Full Text
- View/download PDF
27. Population Decline in COPD Admissions During the COVID-19 Pandemic Associated with Lower Burden of Community Respiratory Viral Infections.
- Author
-
So JY, O'Hara NN, Kenaa B, Williams JG, deBorja CL, Slejko JF, Zafari Z, Sokolow M, Zimand P, Deming M, Marx J, Pollak AN, and Reed RM
- Subjects
- Female, Humans, Male, Middle Aged, Pandemics, Prevalence, Retrospective Studies, SARS-CoV-2, Seasons, Symptom Flare Up, COVID-19 epidemiology, Communicable Disease Control, Hospitalization statistics & numerical data, Pulmonary Disease, Chronic Obstructive epidemiology, Respiratory Tract Diseases epidemiology, Respiratory Tract Diseases virology
- Abstract
Background: The Coronavirus disease 2019 (COVID-19) pandemic has led to widespread implementation of public health measures, such as stay-at-home orders, social distancing, and masking mandates. In addition to decreasing spread of severe acute respiratory syndrome coronavirus 2, these measures also impact the transmission of seasonal viral pathogens, which are common triggers of chronic obstructive pulmonary disease (COPD) exacerbations. Whether reduced viral prevalence mediates reduction in COPD exacerbation rates is unknown., Methods: We performed retrospective analysis of data from a large, multicenter health care system to assess admission trends associated with community viral prevalence and with initiation of COVID-19 pandemic control measures. We applied difference-in-differences analysis to compare season-matched weekly frequency of hospital admissions for COPD prior to and after implementation of public health measures for COVID-19. Community viral prevalence was estimated using regional Centers for Disease Control and Prevention test positivity data and correlated to COPD admissions., Results: Data involving 4422 COPD admissions demonstrated a season-matched 53% decline in COPD admissions during the COVID-19 pandemic, which correlated to community viral burden (r = 0.73; 95% confidence interval, 0.67-0.78) and represented a 36% greater decline over admission frequencies observed in other medical conditions less affected by respiratory viral infections (incidence rate ratio 0.64; 95% confidence interval, 0.57-0.71, P < .001). The post-COVID-19 decline in COPD admissions was most pronounced in patients with fewer comorbidities and without recurrent admissions., Conclusion: The implementation of public health measures during the COVID-19 pandemic was associated with decreased COPD admissions. These changes are plausibly explained by reduced prevalence of seasonal respiratory viruses., (Copyright © 2021 Elsevier Inc. All rights reserved.)
- Published
- 2021
- Full Text
- View/download PDF
28. Assessment of Machine Learning vs Standard Prediction Rules for Predicting Hospital Readmissions.
- Author
-
Morgan DJ, Bame B, Zimand P, Dooley P, Thom KA, Harris AD, Bentzen S, Ettinger W, Garrett-Ray SD, Tracy JK, and Liang Y
- Subjects
- Female, Humans, Length of Stay, Male, Maryland epidemiology, Medicare statistics & numerical data, Middle Aged, Prognosis, Research Design standards, Risk Factors, United States, Hospitalization economics, Hospitalization statistics & numerical data, Machine Learning, Patient Readmission economics, Patient Readmission statistics & numerical data, Risk Assessment methods, Risk Assessment standards
- Abstract
Importance: Hospital readmissions are associated with patient harm and expense. Ways to prevent hospital readmissions have focused on identifying patients at greatest risk using prediction scores., Objective: To identify the type of score that best predicts hospital readmissions., Design, Setting, and Participants: This prognostic study included 14 062 consecutive adult hospital patients with 16 649 discharges from a tertiary care center, suburban community hospital, and urban critical access hospital in Maryland from September 1, 2016, through December 31, 2016. Patients not included as eligible discharges by the Centers for Medicare & Medicaid Services or the Chesapeake Regional Information System for Our Patients were excluded. A machine learning rank score, the Baltimore score (B score) developed using a machine learning technique, for each individual hospital using data from the 2 years before September 1, 2016, was compared with standard readmission risk assessment scores to predict 30-day unplanned readmissions., Main Outcomes and Measures: The 30-day readmission rate evaluated using various readmission scores: B score, HOSPITAL score, modified LACE score, and Maxim/RightCare score., Results: Of the 10 732 patients (5605 [52.2%] male; mean [SD] age, 54.56 [22.42] years) deemed to be eligible for the study, 1422 were readmitted. The area under the receiver operating characteristic curve (AUROC) for individual rules was 0.63 (95% CI, 0.61-0.65) for the HOSPITAL score, which was significantly lower than the 0.66 for modified LACE score (95% CI, 0.64-0.68; P < .001). The B score machine learning score was significantly better than all other scores; 48 hours after admission, the AUROC of the B score was 0.72 (95% CI, 0.70-0.73), which increased to 0.78 (95% CI, 0.77-0.79) at discharge (all P < .001). At the hospital using Maxim/RightCare score, the AUROC was 0.63 (95% CI, 0.59-0.69) for HOSPITAL, 0.64 (95% CI, 0.61-0.68) for Maxim/RightCare, and 0.66 (95% CI, 0.62-0.69) for modified LACE score. The B score was 0.72 (95% CI, 0.69-0.75) 48 hours after admission and 0.81 (95% CI, 0.79-0.84) at discharge. In directly comparing the B score with the sensitivity at cutoff values for modified LACE, HOSPITAL, and Maxim/RightCare scores, the B score was able to identify the same number of readmitted patients while flagging 25.5% to 54.9% fewer patients., Conclusions and Relevance: Among 3 hospitals in different settings, an automated machine learning score better predicted readmissions than commonly used readmission scores. More efficiently targeting patients at higher risk of readmission may be the first step toward potentially preventing readmissions.
- Published
- 2019
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.