PANDEXIT is a tool for helping decision makers through the simulation of alternatives scenarios with a realistic agent-based model. We are using very high performance algorithms.
ADGS developed a COVID-19 pandemic exit model to simulate and analyse the effects of releasing the current lockdown, using Emergent Behavior algorithmes. The simulation evaluates the outcome of different policies that could be applied and their implementation using an estimate of the evolution of the pandemic in several scenarios, like re-opening kindergartens, schools and universities, re-opening small shops, administrations or letting younger people circulate.
It uses real world demographic (age, sex, ethnicity), human behavior, transportation routes and workplaces data, to build a realistic "organic" simulation with a resolution beyond what any statistical model could achieve.
The results ARE NOT STATISTICS but are actually based on the real behavior of the people. With enough data, the level of precision obtained is in a totally different league from the current models used by all other countries.
This product, named "PANDEXIT".
ADGS developed a COVID-19 pandemic exit model to simulate and analyse the effects of releasing the current lockdown, using Emergent Behavior algorithmes. The simulation evaluates the outcome of different policies that could be applied and their implementation using an estimate of the evolution of the pandemic in several scenarios, like re-opening kindergartens, schools and universities, re-opening small shops, administrations or letting younger people circulate.
It uses real world demographic (age, sex, ethnicity), human behavior, transportation routes and workplaces data, to build a realistic "organic" simulation with a resolution beyond what any statistical model could achieve.
The results ARE NOT STATISTICS but are actually based on the real behavior of the people. With enough data, the level of precision obtained is in a totally different league from the current models used by all other countries.
This product, named "PANDEXIT".
ADGS developed a COVID-19 pandemic exit model to simulate and analyse the effects of releasing the current lockdown, using Emergent Behavior algorithmes. The simulation evaluates the outcome of different policies that could be applied and their implementation using an estimate of the evolution of the pandemic in several scenarios, like re-opening kindergartens, schools and universities, re-opening small shops, administrations or letting younger people circulate.
It uses real world demographic (age, sex, ethnicity), human behavior, transportation routes and workplaces data, to build a realistic "organic" simulation with a resolution beyond what any statistical model could achieve.
The results ARE NOT STATISTICS but are actually based on the real behavior of the people. With enough data, the level of precision obtained is in a totally different league from the current models used by all other countries.
This product, named "PANDEXIT".
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data Driven Innovation
Machine learning and data mining algorithms construct predictive models and decision making systems based on big data. Big data are the digital traces of human activities - opinions, preferences, movements, lifestyles, ... - hence they reflect all human biases and prejudices. Therefore, the models learnt from big data may inherit all such biases, leading to discriminatory decisions. In my talk, I discuss many real examples, from crime prediction to credit scoring to image recognition, and how we can tackle the problem of discovering discrimination using the very same approach: data mining.
Quantified Self movement allows to collect a lot of
personal data which can be used to nurture the model
of the users. Evenly, when aggregated, these personal
data become a picture of the people of a space in a City
Model. This model can be fed also by data coming from
crowdsensing. The resulting City Model can be used to
provide personalized services to citizen, and to increase
people awareness about their behaviour that can help
in promoting collective behavioural change. The paper
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Jason Hong
Keynote talk I gave at the Mobile and Cloud Workshop at Mobisys 2014. I talk about my experiences and reflections on privacy, focusing on (1) Urban Analytics, (2) Google Glass, and (3) PrivacyGrade.
ADGS developed a COVID-19 pandemic exit model to simulate and analyse the effects of releasing the current lockdown, using Emergent Behavior algorithmes. The simulation evaluates the outcome of different policies that could be applied and their implementation using an estimate of the evolution of the pandemic in several scenarios, like re-opening kindergartens, schools and universities, re-opening small shops, administrations or letting younger people circulate.
It uses real world demographic (age, sex, ethnicity), human behavior, transportation routes and workplaces data, to build a realistic "organic" simulation with a resolution beyond what any statistical model could achieve.
The results ARE NOT STATISTICS but are actually based on the real behavior of the people. With enough data, the level of precision obtained is in a totally different league from the current models used by all other countries.
This product, named "PANDEXIT".
ADGS developed a COVID-19 pandemic exit model to simulate and analyse the effects of releasing the current lockdown, using Emergent Behavior algorithmes. The simulation evaluates the outcome of different policies that could be applied and their implementation using an estimate of the evolution of the pandemic in several scenarios, like re-opening kindergartens, schools and universities, re-opening small shops, administrations or letting younger people circulate.
It uses real world demographic (age, sex, ethnicity), human behavior, transportation routes and workplaces data, to build a realistic "organic" simulation with a resolution beyond what any statistical model could achieve.
The results ARE NOT STATISTICS but are actually based on the real behavior of the people. With enough data, the level of precision obtained is in a totally different league from the current models used by all other countries.
This product, named "PANDEXIT".
ADGS developed a COVID-19 pandemic exit model to simulate and analyse the effects of releasing the current lockdown, using Emergent Behavior algorithmes. The simulation evaluates the outcome of different policies that could be applied and their implementation using an estimate of the evolution of the pandemic in several scenarios, like re-opening kindergartens, schools and universities, re-opening small shops, administrations or letting younger people circulate.
It uses real world demographic (age, sex, ethnicity), human behavior, transportation routes and workplaces data, to build a realistic "organic" simulation with a resolution beyond what any statistical model could achieve.
The results ARE NOT STATISTICS but are actually based on the real behavior of the people. With enough data, the level of precision obtained is in a totally different league from the current models used by all other countries.
This product, named "PANDEXIT".
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data Driven Innovation
Machine learning and data mining algorithms construct predictive models and decision making systems based on big data. Big data are the digital traces of human activities - opinions, preferences, movements, lifestyles, ... - hence they reflect all human biases and prejudices. Therefore, the models learnt from big data may inherit all such biases, leading to discriminatory decisions. In my talk, I discuss many real examples, from crime prediction to credit scoring to image recognition, and how we can tackle the problem of discovering discrimination using the very same approach: data mining.
Quantified Self movement allows to collect a lot of
personal data which can be used to nurture the model
of the users. Evenly, when aggregated, these personal
data become a picture of the people of a space in a City
Model. This model can be fed also by data coming from
crowdsensing. The resulting City Model can be used to
provide personalized services to citizen, and to increase
people awareness about their behaviour that can help
in promoting collective behavioural change. The paper
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Jason Hong
Keynote talk I gave at the Mobile and Cloud Workshop at Mobisys 2014. I talk about my experiences and reflections on privacy, focusing on (1) Urban Analytics, (2) Google Glass, and (3) PrivacyGrade.
‘The State of Mobile Data for Social Good’ report is a collaboration between UN Global Pulse and the GSMA, the global mobile telecommunications industry association. The report, which identifies over 200 projects or studies leveraging mobile data for social good, aims to survey the landscape today, assess the current barriers to scale, and make recommendations for a way forward. It details some of the main challenges with using mobile data for social good and provides a set of actions that (i) can spur investment and use, (ii) ensure cohesion of efforts and of customer privacy and data protection frameworks and (iii) build technical capacity.
Abstract: As location‐enabled technologies are becoming ubiquitous, our location is being shared with an ever‐growing number of external services. Issues revolving around location privacy — or geoprivacy — therefore concern the vast majority of the population, largely without knowing how the underlying technologies work and what can be inferred from an individual’s location (especially if recorded over longer periods of time). Research, on the other hand, has largely treated this topic from isolated standpoints, most prominently from the technological and ethical points of view. This talk will therefore reflect upon the current state of geoprivacy from a broader perspective. It integrates technological, ethical, legal, and educational aspects and clarifies how they interact and shape how we deal with the corresponding technology, both individually and as a society. The fictional couple of Jane and Tom is used as a running example to illustrate how common it has become to share our location information, and how it can be used — both for good and for worse.
Presentation at ESCAIDE 2016 by Thibaut Jombart. The R Epidemics Consortium: Building the next generation of statistical tools for outbreak response using R
An overview about Artificial intelligence and its patterns, different tools, framework,industry examples, demo. The deviation from conventional approach.
Nowadays security has become a major concern for everyone. Due to busy schedules, we don’t get enough time to look around or keep watch on our surroundings, because of which we don’t notice the unusual activity leading to a higher crime rate and becoming a major concern. The assailants have mastered themselves in hiding behind the cover of innocence and goodwill and execute their plan when they feel it’s the right time which has led to a crime rate 47 . Crime is a primary issue which needs to be controlled and so does the crime rate. Our project “Biometric Security Bags” is based on the problems we face most often in our life. It is a basic idea to create a bag which is secured by biometric lock and code lock which will be dual authentication with a GPS and GSM system will help us to keep our belongings safe. We will also introduce a mini camera which will capture our surroundings. The bag can be used for multipurpose security of our valuables and at the same time for security of human. Deepti Rana | Ashwini Karnale | Divyashruti Mane | Mangal Kotkar "Biometric Security Bags" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd37998.pdf Paper URL : https://www.ijtsrd.com/computer-science/other/37998/biometric-security-bags/deepti-rana
As per studies conducted by the University of California, it is observed that crime in any area follows the same pattern as that of earthquake aftershocks. It is difficult to predict an earthquake, but once it happens the aftershocks following it are quite predictable. Same is true for the crimes happening in a geographical area.
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
Digital Forensics for Artificial
Intelligence (AI ) Systems:
AI systems make decisions impacting our daily life Their actions might cause accidents, harm or, more generally, violate
regulations either intentionally or not and consequently might be considered suspects for various events. In this lecture we explore how digital forensics can be performed for AI based systems.
The International Journal of Computational Science, Information Technology an...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
‘The State of Mobile Data for Social Good’ report is a collaboration between UN Global Pulse and the GSMA, the global mobile telecommunications industry association. The report, which identifies over 200 projects or studies leveraging mobile data for social good, aims to survey the landscape today, assess the current barriers to scale, and make recommendations for a way forward. It details some of the main challenges with using mobile data for social good and provides a set of actions that (i) can spur investment and use, (ii) ensure cohesion of efforts and of customer privacy and data protection frameworks and (iii) build technical capacity.
Abstract: As location‐enabled technologies are becoming ubiquitous, our location is being shared with an ever‐growing number of external services. Issues revolving around location privacy — or geoprivacy — therefore concern the vast majority of the population, largely without knowing how the underlying technologies work and what can be inferred from an individual’s location (especially if recorded over longer periods of time). Research, on the other hand, has largely treated this topic from isolated standpoints, most prominently from the technological and ethical points of view. This talk will therefore reflect upon the current state of geoprivacy from a broader perspective. It integrates technological, ethical, legal, and educational aspects and clarifies how they interact and shape how we deal with the corresponding technology, both individually and as a society. The fictional couple of Jane and Tom is used as a running example to illustrate how common it has become to share our location information, and how it can be used — both for good and for worse.
Presentation at ESCAIDE 2016 by Thibaut Jombart. The R Epidemics Consortium: Building the next generation of statistical tools for outbreak response using R
An overview about Artificial intelligence and its patterns, different tools, framework,industry examples, demo. The deviation from conventional approach.
Nowadays security has become a major concern for everyone. Due to busy schedules, we don’t get enough time to look around or keep watch on our surroundings, because of which we don’t notice the unusual activity leading to a higher crime rate and becoming a major concern. The assailants have mastered themselves in hiding behind the cover of innocence and goodwill and execute their plan when they feel it’s the right time which has led to a crime rate 47 . Crime is a primary issue which needs to be controlled and so does the crime rate. Our project “Biometric Security Bags” is based on the problems we face most often in our life. It is a basic idea to create a bag which is secured by biometric lock and code lock which will be dual authentication with a GPS and GSM system will help us to keep our belongings safe. We will also introduce a mini camera which will capture our surroundings. The bag can be used for multipurpose security of our valuables and at the same time for security of human. Deepti Rana | Ashwini Karnale | Divyashruti Mane | Mangal Kotkar "Biometric Security Bags" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd37998.pdf Paper URL : https://www.ijtsrd.com/computer-science/other/37998/biometric-security-bags/deepti-rana
As per studies conducted by the University of California, it is observed that crime in any area follows the same pattern as that of earthquake aftershocks. It is difficult to predict an earthquake, but once it happens the aftershocks following it are quite predictable. Same is true for the crimes happening in a geographical area.
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
Digital Forensics for Artificial
Intelligence (AI ) Systems:
AI systems make decisions impacting our daily life Their actions might cause accidents, harm or, more generally, violate
regulations either intentionally or not and consequently might be considered suspects for various events. In this lecture we explore how digital forensics can be performed for AI based systems.
The International Journal of Computational Science, Information Technology an...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Understanding User Needs and Satisfying ThemAggregage
https://www.productmanagementtoday.com/frs/26903918/understanding-user-needs-and-satisfying-them
We know we want to create products which our customers find to be valuable. Whether we label it as customer-centric or product-led depends on how long we've been doing product management. There are three challenges we face when doing this. The obvious challenge is figuring out what our users need; the non-obvious challenges are in creating a shared understanding of those needs and in sensing if what we're doing is meeting those needs.
In this webinar, we won't focus on the research methods for discovering user-needs. We will focus on synthesis of the needs we discover, communication and alignment tools, and how we operationalize addressing those needs.
Industry expert Scott Sehlhorst will:
• Introduce a taxonomy for user goals with real world examples
• Present the Onion Diagram, a tool for contextualizing task-level goals
• Illustrate how customer journey maps capture activity-level and task-level goals
• Demonstrate the best approach to selection and prioritization of user-goals to address
• Highlight the crucial benchmarks, observable changes, in ensuring fulfillment of customer needs
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
3. What is PandExit?
1. PandExit is
a. An agent based simulation and forecasting tool,
including people/places/transports in the model.
b. Capable of evaluating the outcomes of
alternative scenarios depending on external
circumstances or internal policies of a country.
c. An assistant for informed decision making.
3
4. What PandExit is not?
1. PandExit is NOT
a. A real time tracking system.
b. Another statistical model.
c. A tool to predict the exact number of cases or
deaths in a certain point in time.
4
5. “An agent based model is a class of computing models
which simulate actions and interactions of a set of
autonomous agents, with the objective of understanding
and predicting the behavior of a system as a whole.
9. Places
… following its daily
routine in a virtual world,
commuting between his
home and his job, or the
s c h o o l , o r t h e
supermarket...
9
10. Transports
… using his car, or a taxi,
or a combination of metro
and bus, or walking ...
10
11. Other activities
… and performing other
activities that correspond
to his demographic or age
profile.
11
12. Geography and geometry
1. Geography is not geometry
a. Geography is territorially large
i. World
ii. Country
iii. Province
iv. Region.
b. Geometry is smaller but more detailed
i. Plant, stadium, hospital, casino, airport
ii. Building
iii. Floor
12
13. Examples of simulations with geometry
1. Pandexit supports both geography and geometry
a. Geography
i. We will see examples in section 5.
b. Geometry
i. Evacuation of spectators in stadiums...
ii. … or other types of building.
iii. Movement of personnel on a plant floor.
iv. Queueing times in complex scenarios
13
14. Example in a Casino
14
Zones more likely to
become infection areas for
customers in a Casino.
Pandexit can use security
cameras to allow real time
visualization of risky
customer behavior.
15. 2.
How does it relate to the pandemic?
The model is specialized for infections
15
16. How does it relate to the pandemic?
PandExit allows to estimate the
evolution of the COVID-19 pandemic
using the precise demographic,
territorial, and economic characteristics,
and evaluating the spread according to
different policies like closing sets of
businesses or restricting internal travel.
16
30. “A small-world network is a network, whether social, of
information, abstract, or any kind, in which most nodes
are not neighbours of one another, but the neighbours of
any given node are likely to be neighbours of each other
and most nodes can be reached from every other node by
a small number of hops or steps.
31. 31
Source: Generalization of the small-world effect on a model approaching the Erdős–Rényi random graph, Benjamin F. Mayer, Scientific Reports, 9
32. Normal scenario - Social hubs and centrality
32
● Schools
● Restaurants/bars/cafes
● Religious places
● Public transport
● Supermarkets
33. The risk of small-world network effects
33
Which industries or
activities can be
allowed without
risking the
formation of a
small network?
36. Creating synthetic social networks
36
Source: Modeling Social Networks in Geographic Space, Approach and Empirical Application. Theo Arentze, Pauline van
den Berg, Harry Timmermans. Environment and Planning, 2012, vol. 44, pag. 1101-1120.
37. Friendship formation model
37
Source: Modeling Social Networks in Geographic Space, Approach and Empirical Application. Theo Arentze, Pauline van
den Berg, Harry Timmermans. Environment and Planning, 2012, vol. 44, pag. 1101-1120.
Probability of friendship depends on
● Homophily
○ Age
○ Nationality
○ Socioeconomic profile
● Geographic distance
● Transitivity or existence of common friends
38. Real world social networks
38
Source: Modeling Social Networks in Geographic Space, Approach and Empirical Application. Theo Arentze, Pauline van
den Berg, Harry Timmermans. Environment and Planning, 2012, vol. 44, pag. 1101-1120.
39. 5.
Qatar and MINDEF prototypes
A prototype is worth one thousand meetings
39
41. MINDEF Prototype
1. Approximately 50.000 agents.
a. Students, teachers, and personnel of military
schools following information provided by
MINDEF (Ministry of Defense) of Argentina.
b. Additional family members added to complete
household data.
2. Nine military schools included.
3. Transports generated through statistical means.
41
42. Limitation of the MINDEF prototype
1. Infections coming from outside the considered group
are not modeled, only internal spread.
a. The rest of the country data is needed.
2. Home coordinates are assigned randomly inside the city
or district of residence.
a. Precise home data will improve the simulation.
3. Family and household structure was created through
statistical means and not with real data
a. Person by person demographic data will improve the simulation.
4. The transport network has been simplified.
42
44. QATAR prototype
1. One agent per person, 2.78 million agents.
a. Adults and children with age and nationality
following following public census information.
b. Household conformation follows statistical
patterns of public census information.
2. Home coordinates are assigned inside zones using
density data extracted through computer vision.
3. Transports generated through statistical means.
44
46. Limitation of the QATAR prototype
1. Infections coming from outside the country are not
modeled, only internal spread.
a. Travelling data is needed, as well as data from other countries.
2. Home coordinates are assigned inside zones using
density data extracted through computer vision.
a. Precise home/workplace data will improve the simulation.
3. Family and household structure was created through
statistical means and not with real data.
a. Person by person demographic data will improve the simulation.
4. The transport network has been simplified.
46
48. How to proceed?
▸ Integrate reasonable scenarios
▹ Internal frontiers
▹ Specific policies
▹ Essential jobs
▹ Non-essential jobs
▸ Load detailed data from the country
▹ People
▹ Homes/Workplaces
▹ Transports
▹ School, hospitals, etc.
48