-
Impact on Mobility and Environmental data of COVID-19 Lockdown on Florence Area
Authors:
C. Badii,
P. Bellini,
S. Bilotta,
D. Bologna,
D. Cenni,
A. Difino,
A. Ipsaro Palesi,
N. Mitolo,
P. Nesi,
G. Pantaleo,
I. Paoli,
M. Paolucci,
M. Soderi
Abstract:
According to the changed operative conditions due to lockdown and successive reopening a number of facts can be analysed. The main effects have been detected on: mobility, environment, social media and people flows. While in this first report only mobility, transport and environment are reported. The analysis performed identified a strong reduction of the mobility and transport activities, and in…
▽ More
According to the changed operative conditions due to lockdown and successive reopening a number of facts can be analysed. The main effects have been detected on: mobility, environment, social media and people flows. While in this first report only mobility, transport and environment are reported. The analysis performed identified a strong reduction of the mobility and transport activities, and in the pollutants. The mobility reduction has been assessed to be quite coherent with respect to what has been described by Google Global mobility report. On the other hand, in this paper a number of additional aspects have been put in evidence providing detailed aspects on mobility and parking that allowed us to better analyze the impact of the reopening on an eventual revam** of the infection. To this end, the collected data from the field have been compared from those of google and some considerations with respect to the Imperial college Report 20 have been derived. For the pollutant aspects, a relevant reduction on most of them has been measured and rationales are reported.
△ Less
Submitted 7 May, 2020;
originally announced May 2020.
-
A Policy-oriented Agent-based Model of Recruitment into Organized Crime
Authors:
Gian Maria Campedelli,
Francesco Calderoni,
Mario Paolucci,
Tommaso Comunale,
Daniele Vilone,
Federico Cecconi,
Giulia Andrighetto
Abstract:
Criminal organizations exploit their presence on territories and local communities to recruit new workforce in order to carry out their criminal activities and business. The ability to attract individuals is crucial for maintaining power and control over the territories in which these groups are settled. This study proposes the formalization, development and analysis of an agent-based model (ABM)…
▽ More
Criminal organizations exploit their presence on territories and local communities to recruit new workforce in order to carry out their criminal activities and business. The ability to attract individuals is crucial for maintaining power and control over the territories in which these groups are settled. This study proposes the formalization, development and analysis of an agent-based model (ABM) that simulates a neighborhood of Palermo (Sicily) with the aim to understand the pathways that lead individuals to recruitment into organized crime groups (OCGs). Using empirical data on social, economic and criminal conditions of the area under analysis, we use a multi-layer network approach to simulate this scenario. As the final goal, we test different policies to counter recruitment into OCGs. These scenarios are based on two different dimensions of prevention and intervention: (i) primary and secondary socialization and (ii) law enforcement targeting strategies.
△ Less
Submitted 10 January, 2020;
originally announced January 2020.
-
Partner selection supported by opaque reputation promotes cooperative behavior
Authors:
Valerio Capraro,
Francesca Giardini,
Daniele Vilone,
Mario Paolucci
Abstract:
Reputation plays a major role in human societies, and it has been proposed as an explanation for the evolution of cooperation. While the majority of previous studies equates reputation with a transparent and complete history of players' past decisions, in real life, reputations are often ambiguous and opaque. Using web-based experiments, we explore the extent to which opaque reputation works in is…
▽ More
Reputation plays a major role in human societies, and it has been proposed as an explanation for the evolution of cooperation. While the majority of previous studies equates reputation with a transparent and complete history of players' past decisions, in real life, reputations are often ambiguous and opaque. Using web-based experiments, we explore the extent to which opaque reputation works in isolating defectors, with and without partner selection opportunities. Our results show that low reputation works as a signal of untrustworthiness, whereas medium or high reputation are not taken into account by participants for orienting their choices. We also find that reputation without partner selection does not promote cooperative behavior; that is, defectors do not turn into cooperators only for the sake of getting a positive reputation. Finally, in a third study, we find that, when reputation is pivotal to selection, then a substantial proportion of would-be-defectors turn into cooperators. Taken together, these results provide insights on the characteristics of reputation and on the way in which humans make use of it when selecting partners but also when knowing that they will be selected.
△ Less
Submitted 7 October, 2016; v1 submitted 6 October, 2016;
originally announced October 2016.
-
Reducing individuals' risk sensitiveness can promote positive and non-alarmist views about catastrophic events in an agent-based simulation
Authors:
Daniele Vilone,
Francesca Giardini,
Mario Paolucci,
Rosaria Conte
Abstract:
We present a cognitive model of opinion dynamics which studies the behavior of a population of interacting individuals in the context of risk of natural disaster. In particular, we investigate the response of the individuals to the information received by institutional sources about the correct behaviors for prevention and harm reduction. The results of our study show that alarmist opinions are mo…
▽ More
We present a cognitive model of opinion dynamics which studies the behavior of a population of interacting individuals in the context of risk of natural disaster. In particular, we investigate the response of the individuals to the information received by institutional sources about the correct behaviors for prevention and harm reduction. The results of our study show that alarmist opinions are more likely to be adopted by populations, since worried people
△ Less
Submitted 15 November, 2016; v1 submitted 15 September, 2016;
originally announced September 2016.
-
Partner selection supports reputation-based cooperation in a Public Goods Game
Authors:
Daniele Vilone,
Francesca Giardini,
Mario Paolucci
Abstract:
In dyadic models of indirect reciprocity, the receivers' history of giving has a significant impact on the donor's decision. When the interaction involves more than two agents things become more complicated, and in large groups cooperation can hardly emerge. In this work we use a Public Goods Game to investigate whether publicly available reputation scores may support the evolution of cooperation…
▽ More
In dyadic models of indirect reciprocity, the receivers' history of giving has a significant impact on the donor's decision. When the interaction involves more than two agents things become more complicated, and in large groups cooperation can hardly emerge. In this work we use a Public Goods Game to investigate whether publicly available reputation scores may support the evolution of cooperation and whether this is affected by the kind of network structure adopted. Moreover, if agents interact on a bipartite graph with partner selection cooperation can thrive in large groups and in a small amount of time.
△ Less
Submitted 20 April, 2015; v1 submitted 24 October, 2014;
originally announced October 2014.
-
Towards a living earth simulator
Authors:
M. Paolucci,
D. Kossman,
R. Conte,
P. Lukowicz,
P. Argyrakis,
A. Blandford,
G. Bonelli,
S. Anderson,
S. de Freitas,
B. Edmonds,
N. Gilbert,
M. Gross,
J. Kohlhammer,
P. Koumoutsakos,
A. Krause,
B. -O. Linnér,
P. Slusallek,
O. Sorkine,
R. W. Sumner,
D. Helbing
Abstract:
The Living Earth Simulator (LES) is one of the core components of the FuturICT architecture. It will work as a federation of methods, tools, techniques and facilities supporting all of the FuturICT simulation-related activities to allow and encourage interactive exploration and understanding of societal issues. Society-relevant problems will be targeted by leaning on approaches based on complex sy…
▽ More
The Living Earth Simulator (LES) is one of the core components of the FuturICT architecture. It will work as a federation of methods, tools, techniques and facilities supporting all of the FuturICT simulation-related activities to allow and encourage interactive exploration and understanding of societal issues. Society-relevant problems will be targeted by leaning on approaches based on complex systems theories and data science in tight interaction with the other components of FuturICT. The LES will evaluate and provide answers to real-world questions by taking into account multiple scenarios. It will build on present approaches such as agent-based simulation and modeling, multiscale modelling, statistical inference, and data mining, moving beyond disciplinary borders to achieve a new perspective on complex social systems.
△ Less
Submitted 6 April, 2013;
originally announced April 2013.
-
Cuntz-Krieger algebras and wavelets on fractals
Authors:
Matilde Marcolli,
Anna Maria Paolucci
Abstract:
We consider representations of Cuntz--Krieger algebras on the Hilbert space of square integrable functions on the limit set, identified with a Cantor set in the unit interval. We use these representations and the associated Perron-Frobenius and Ruelle operators to construct families of wavelets on these Cantor sets.
We consider representations of Cuntz--Krieger algebras on the Hilbert space of square integrable functions on the limit set, identified with a Cantor set in the unit interval. We use these representations and the associated Perron-Frobenius and Ruelle operators to construct families of wavelets on these Cantor sets.
△ Less
Submitted 5 August, 2009;
originally announced August 2009.
-
Multiresolution wavelet analysis of integer scale Bessel functions
Authors:
Sergio Albeverio,
Palle E. T. Jorgensen,
Anna M. Paolucci
Abstract:
We identify multiresolution subspaces giving rise via Hankel transforms to Bessel functions. They emerge as orthogonal systems derived from geometric Hilbert-space considerations, the same way the wavelet functions from a multiresolution scaling wavelet construction arise from a scale of Hilbert spaces. We study the theory of representations of the $C^{\ast}$-algebra $% O_{ν+1}$ arising from thi…
▽ More
We identify multiresolution subspaces giving rise via Hankel transforms to Bessel functions. They emerge as orthogonal systems derived from geometric Hilbert-space considerations, the same way the wavelet functions from a multiresolution scaling wavelet construction arise from a scale of Hilbert spaces. We study the theory of representations of the $C^{\ast}$-algebra $% O_{ν+1}$ arising from this multiresolution analysis. A connection with Markov chains and representations of $O_{ν+1}$ is found. Projection valued measures arising from the multiresolution analysis give rise to a Markov trace for quantum groups $SO_q$.
△ Less
Submitted 16 May, 2007; v1 submitted 15 May, 2007;
originally announced May 2007.
-
Learning Features that Predict Cue Usage
Authors:
Barbara Di Eugenio,
Johanna D. Moore,
Massimo Paolucci
Abstract:
Our goal is to identify the features that predict the occurrence and placement of discourse cues in tutorial explanations in order to aid in the automatic generation of explanations. Previous attempts to devise rules for text generation were based on intuition or small numbers of constructed examples. We apply a machine learning program, C4.5, to induce decision trees for cue occurrence and plac…
▽ More
Our goal is to identify the features that predict the occurrence and placement of discourse cues in tutorial explanations in order to aid in the automatic generation of explanations. Previous attempts to devise rules for text generation were based on intuition or small numbers of constructed examples. We apply a machine learning program, C4.5, to induce decision trees for cue occurrence and placement from a corpus of data coded for a variety of features previously thought to affect cue usage. Our experiments enable us to identify the features with most predictive power, and show that machine learning can be used to induce decision trees useful for text generation.
△ Less
Submitted 21 October, 1997;
originally announced October 1997.
-
Flaw Selection Strategies for Partial-Order Planning
Authors:
M. E. Pollack,
D. Joslin,
M. Paolucci
Abstract:
Several recent studies have compared the relative efficiency of alternative flaw selection strategies for partial-order causal link (POCL) planning. We review this literature, and present new experimental results that generalize the earlier work and explain some of the discrepancies in it. In particular, we describe the Least-Cost Flaw Repair (LCFR) strategy developed and analyzed by Joslin and…
▽ More
Several recent studies have compared the relative efficiency of alternative flaw selection strategies for partial-order causal link (POCL) planning. We review this literature, and present new experimental results that generalize the earlier work and explain some of the discrepancies in it. In particular, we describe the Least-Cost Flaw Repair (LCFR) strategy developed and analyzed by Joslin and Pollack (1994), and compare it with other strategies, including Gerevini and Schubert's (1996) ZLIFO strategy. LCFR and ZLIFO make very different, and apparently conflicting claims about the most effective way to reduce search-space size in POCL planning. We resolve this conflict, arguing that much of the benefit that Gerevini and Schubert ascribe to the LIFO component of their ZLIFO strategy is better attributed to other causes. We show that for many problems, a strategy that combines least-cost flaw selection with the delay of separable threats will be effective in reducing search-space size, and will do so without excessive computational overhead. Although such a strategy thus provides a good default, we also show that certain domain characteristics may reduce its effectiveness.
△ Less
Submitted 31 May, 1997;
originally announced June 1997.