In this tutorial we demonstrate how one can use TKRISK to analyze vaccine response to COVID19. We create a simple model of contamination and show how vaccine and exposition can jointly affect the probability of being infected.
We review with this example the logic and applicability of Bayesian networks. We are able to closely match the analytical solution thanks to efficient sampling methods including low discrepancy sequences. This is the first of a three parts demo.
In this tutorial we demonstrate how one can use TKRISK to analyze vaccine response to COVID19. We create a simple model of contamination and show how vaccine and exposition can jointly affect the probability of being infected.
We review with this example the logic and applicability of Bayesian networks. We are able to closely match the analytical solution thanks to efficient sampling methods including low discrepancy sequences. This is the first of a three parts demo.
GRAPH THEORY
Including our PGM Graph Theory module will speed up and optimize several parts of the risk analysis
Features

Optimized code for operations on graph

Several implementations of graph algorithms

Benchmarked against standard libraries
References
[1] Bender, Edward A.; Williamson, S. Gill (2010). Lists, Decisions and Graphs. With an Introduction to Probability.
[2] Claude, Claude (1958). Théorie des graphes et ses applications. Paris: Dunod. English edition, Wiley 1961; Methuen & Co, New York 1962.
[3] Biggs, N.; Lloyd, E.; Wilson, R. (1986). Graph Theory, 1736–1936. Oxford University Press.
[4] Bondy, J. A.; Murty, U. S. R. (2008). Graph Theory. Springer. ISBN 9781846289699.
[5] Gross JL, Yellen J. Graph theory and its applications. CRC press; 2005 Sep 22.
[6] Berry A, Blair JR, Heggernes P, Peyton BW. Maximum cardinality search for computing minimal triangulations of graphs. Algorithmica. 2004 Aug;39(4):28798.
[7] Tarjan RE, Yannakakis M. Simple lineartime algorithms to test chordality of graphs, test acyclicity of hypergraphs, and selectively reduce acyclic hypergraphs. SIAM Journal on computing. 1984 Aug;13(3):56679.