During an investigation using Forensic Investigative Genetic Genealogy, which is a novel approach for solving violent crimes and identifying human remains, reference testing-when law enforcement requests a DNA sample from a person in a partially constructed family tree-is sometimes used when an investigation has stalled. Because the people considered for a reference test have not opted in to allow law enforcement to use their DNA profile in this way, reference testing is viewed by many as an invasion of privacy and by some as unethical. We generalize an existing mathematical optimization model of the genealogy process by incorporating the option of reference testing.
View Article and Find Full Text PDFThe genealogy process is typically the most time-consuming part of-and a limiting factor in the success of-forensic genetic genealogy, which is a new approach to solving violent crimes and identifying human remains. We formulate a stochastic dynamic program that-given the list of matches and their genetic distances to the unknown target-chooses the best decision at each point in time: which match to investigate (i.e.
View Article and Find Full Text PDFProc Natl Acad Sci U S A
June 2020
Although the backlog of untested sexual assault kits in the United States is starting to be addressed, many municipalities are opting for selective testing of samples within a kit, where only the most probative samples are tested. We use data from the San Francisco Police Department Criminalistics Laboratory, which tests all samples but also collects information on the samples flagged by sexual assault forensic examiners as most probative, to build a standard machine learning model that predicts (based on covariates gleaned from sexual assault kit questionnaires) which samples are most probative. This model is embedded within an optimization framework that selects which samples to test from each kit to maximize the Combined DNA Index System (CODIS) yield (i.
View Article and Find Full Text PDFJ Forensic Sci
July 2018
Motivated by the debate over how to deal with the huge backlog of untested sexual assault kits in the U.S.A.
View Article and Find Full Text PDFBallistic imaging systems can help solve crimes by comparing images of cartridge cases, which are recovered from a crime scene or test-fired from a gun, to a database of images obtained from past crime scenes. Many U.S.
View Article and Find Full Text PDFFecal microbiota transplantation is being assessed as a treatment for chronic microbiota-related diseases such as ulcerative colitis. Results from an initial randomized trial suggest that remission rates depend on unobservable features of the fecal donors and observable features of the patients. We use mathematical modeling to assess the efficacy of pooling stools from different donors during multiple rounds of treatment.
View Article and Find Full Text PDFThe U.S. is the main country in the world that delivers its food assistance primarily via transoceanic shipments of commodity-based in-kind food.
View Article and Find Full Text PDFCourt-mandated downsizing of the CA prison system has led to a redistribution of detainees from prisons to CA county jails, and subsequent jail overcrowding. Using data that is representative of the LA County jail system, we build a mathematical model that tracks the flow of individuals during arraignment, pretrial release or detention, case disposition, jail sentence, and possible recidivism during pretrial release, after a failure to appear in court, during non-felony probation and during felony supervision. We assess 64 joint pretrial release and split-sentencing (where low-level felon sentences are split between jail time and mandatory supervision) policies that are based on the type of charge (felony or non-felony) and the risk category as determined by the CA Static Risk Assessment tool, and compare their performance to that of the policy LA County used in early 2014, before split sentencing was in use.
View Article and Find Full Text PDFBackground: Fecal microbiota transplantation is an effective treatment for recurrent Clostridium difficile infection and is being investigated as a treatment for other microbiota-associated diseases. To facilitate these activities, an international public stool bank has been created, which screens donors and processes stools in a standardized manner. The goal of this research is to use mathematical modeling and analysis to optimize screening and donor management at the stool bank.
View Article and Find Full Text PDFBackground: Motivated by the observation that children suffering from undernutrition are more likely to experience disease and are more likely to die if they do contract a disease, mathematical modelling is used to explore the ramifications of targeting preventive disease measures to undernutritioned children.
Methods: A malaria model is constructed with superinfection and heterogeneous susceptibility, where a portion of this susceptibility is due to undernutrition (as measured by weight-for-age z scores); so as to isolate the impact of supplementary food on malaria from the influence of confounding factors, the portion of the total susceptibility that is due to undernutrition is estimated from a large randomized trial of supplementary feeding. Logistic regression is used to estimate mortality given malaria infection as a function of weight-for-age z scores.
Motivated by the lack of randomized controlled trials with an intervention-free control arm in the area of child undernutrition, we fit a trivariate model of weight-for-age z score (WAZ), height-for-age z score (HAZ) and diarrhea status to data from an observational study of supplementary feeding (100 kCal/day for children with WAZ [Formula: see text]) in 17 Guatemalan communities. Incorporating time lags, intention to treat (i.e.
View Article and Find Full Text PDFMotivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification.
View Article and Find Full Text PDFFirearms identification imaging systems help solve crimes by comparing newly acquired images of cartridge casings or bullets to a database of images obtained from past crime scenes. We formulate an optimization problem that bases its matching decisions not only on the similarity between pairs of images, but also on the time and spatial location of each new acquisition and each database entry. The objective is to maximize the detection probability subject to a constraint on the false positive rate.
View Article and Find Full Text PDFDue to the health and economic costs of childhood obesity, coupled with studies suggesting the benefits of comprehensive (dietary, physical activity and behavioral counseling) intervention, the United States Preventive Services Task Force recently recommended childhood screening and intervention for obesity beginning at age six. Using a longitudinal data set consisting of the body mass index of 3164 children up to age 18 and another longitudinal data set containing the body mass index at ages 18 and 40 and the presence or absence of disease (hypertension and diabetes) at age 40 for 747 people, we formulate and numerically solve - separately for boys and girls - a dynamic programming problem for the optimal biennial (i.e.
View Article and Find Full Text PDFProc Natl Acad Sci U S A
March 2013
Several aid groups have proposed strategies for allocating ready-to-use (therapeutic and supplementary) foods to children in developing countries. Analysis is needed to investigate whether there are better alternatives. We use a longitudinal dataset of 5,657 children from Bwamanda to construct a bivariate time-series model that tracks each child's height-for-age z score (HAZ) and weight-for-height z score (WHZ) throughout the first 5 y of life.
View Article and Find Full Text PDFTo address growing concerns over childhood obesity, the United States Preventive Services Task Force (USPSTF) recently recommended that children undergo obesity screening beginning at age 6. An Expert Committee recommends starting at age 2. Analysis is needed to assess these recommendations and investigate whether there are better alternatives.
View Article and Find Full Text PDFBackground: Recent studies show that transfusing older blood may lead to increased mortality. This raises the issue of whether transfusing fresher blood can be achieved without jeopardizing blood availability.
Study Design And Methods: We propose a simple family of policies that is defined by a single threshold: rather than transfusing the oldest available blood that is younger than 42 days, we transfuse the oldest blood that is younger than the threshold, and if there is no blood younger than the threshold then we transfuse the youngest blood that is older than the threshold.
We superimpose a radiation fallout model onto a traffic flow model to assess the evacuation versus shelter-in-place decisions after the daytime ground-level detonation of a 10-kt improvised nuclear device in Washington, DC. In our model, ≈ 80k people are killed by the prompt effects of blast, burn, and radiation. Of the ≈ 360k survivors without access to a vehicle, 42.
View Article and Find Full Text PDFWe construct a mathematical model of aerosol (i.e., droplet-nuclei) transmission of influenza within a household containing one infected and embed it into an epidemic households model in which infecteds occasionally infect someone from another household; in a companion paper, we argue that the contribution from contact transmission is trivial for influenza and the contribution from droplet transmission is likely to be small.
View Article and Find Full Text PDFWe develop a mathematical optimization model at the intersection of homeland security and immigration, that chooses various immigration enforcement decision variables to minimize the probability that a terrorist can successfully enter the United States across the U.S.-Mexico border.
View Article and Find Full Text PDFWe formulate and analyze an optimal stopping problem concerning a terrorist who is attempting to drive a nuclear or radiological weapon toward a target in a city center. In our model, the terrorist needs to travel through a two-dimensional lattice containing imperfect radiation sensors at some of the nodes, and decides at each node whether to detonate the bomb or proceed. We consider five different scenarios containing various informational structures and two different sensor array topologies: the sensors are placed randomly or they form an outer wall around the periphery of the city.
View Article and Find Full Text PDFMotivated by the desire to assess nonpharmaceutical interventions for pandemic influenza, we seek in this study to quantify the routes of transmission for this disease. We construct a mathematical model of aerosol (i.e.
View Article and Find Full Text PDFMotivated by the failure of current methods to control dengue fever, we formulate a mathematical model to assess the impact on the spread of a mosquito-borne viral disease of a strategy that releases adult male insects homozygous for a dominant, repressible, lethal genetic trait. A dynamic model for the female adult mosquito population, which incorporates the competition for female mating between released mosquitoes and wild mosquitoes, density-dependent competition during the larval stage, and realization of the lethal trait either before or after the larval stage, is embedded into a susceptible-exposed-infectious-susceptible human-vector epidemic model for the spread of the disease. For the special case in which the number of released mosquitoes is maintained in a fixed proportion to the number of adult female mosquitoes at each point in time, we derive mathematical formulas for the disease eradication condition and the approximate number of released mosquitoes necessary for eradication.
View Article and Find Full Text PDFWe develop a mathematical model to find the optimal inspection strategy for detecting a nuclear weapon (or nuclear material to make a weapon) from being smuggled into the United States in a shipping container, subject to constraints of port congestion and an overall budget. We consider an 11-layer security system consisting of shipper certification, container seals, and a targeting software system, followed by passive (neutron and gamma), active (gamma radiography), and manual testing at overseas and domestic ports. Currently implemented policies achieve a low detection probability, and improved security requires passive and active testing of trusted containers and manually opening containers that cannot be penetrated by radiography.
View Article and Find Full Text PDF