首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
We consider m×mm×m covariance matrices, Σ1Σ1 and Σ2Σ2, which satisfy Σ2-Σ1Σ2-Σ1=Δ, where ΔΔ has a specified rank. Maximum likelihood estimators of Σ1Σ1 and Σ2Σ2 are obtained when sample covariance matrices having Wishart distributions are available and rank(Δ)rank(Δ) is known. The likelihood ratio statistic for a test about the value of rank(Δ)rank(Δ) is also given and some properties of its null distribution are obtained. The methods developed in this paper are illustrated through an example.  相似文献   

3.
We consider the problem of estimating the mean θθ of an Np(θ,Ip)Np(θ,Ip) distribution with squared error loss ∥δ−θ∥2δθ2 and under the constraint ∥θ∥≤mθm, for some constant m>0m>0. Using Stein's identity to obtain unbiased estimates of risk, Karlin's sign change arguments, and conditional risk analysis, we compare the risk performance of truncated linear estimators with that of the maximum likelihood estimator δmleδmle. We obtain for fixed (m,p)(m,p) sufficient conditions for dominance. An asymptotic framework is developed, where we demonstrate that the truncated linear minimax estimator dominates δmleδmle, and where we obtain simple and accurate measures of relative improvement in risk. Numerical evaluations illustrate the effectiveness of the asymptotic framework for approximating the risks for moderate or large values of p.  相似文献   

4.
Consider the model where there are II independent multivariate normal treatment populations with p×1p×1 mean vectors μiμi, i=1,…,Ii=1,,I, and covariance matrix ΣΣ. Independently the (I+1)(I+1)st population corresponds to a control and it too is multivariate normal with mean vector μI+1μI+1 and covariance matrix ΣΣ. Now consider the following two multiple testing problems.  相似文献   

5.
For a random sample of size nn from an absolutely continuous random vector (X,Y)(X,Y), let Yi:nYi:n be iith YY-order statistic and Y[j:n]Y[j:n] be the YY-concomitant of Xj:nXj:n. We determine the joint pdf of Yi:nYi:n and Y[j:n]Y[j:n] for all i,j=1i,j=1 to nn, and establish some symmetry properties of the joint distribution for symmetric populations. We discuss the uses of the joint distribution in the computation of moments and probabilities of various ranks for Y[j:n]Y[j:n]. We also show how our results can be used to determine the expected cost of mismatch in broken bivariate samples and approximate the first two moments of the ratios of linear functions of Yi:nYi:n and Y[j:n]Y[j:n]. For the bivariate normal case, we compute the expectations of the product of Yi:nYi:n and Y[i:n]Y[i:n] for n=2n=2 to 8 for selected values of the correlation coefficient and illustrate their uses.  相似文献   

6.
A ridge function with shape function g   in the horizontal direction is a function of the form g(x)h(y,0)g(x)h(y,0). Along each horizontal line it has the shape g(x)g(x), multiplied by a function h(y,0)h(y,0) which depends on the y-value of the horizontal line. Similarly a ridge function with shape function g   in the vertical direction has the form g(y)h(x,π/2)g(y)h(x,π/2). For a given shape function g it may or may not be possible to represent an arbitrary   function f(x,y)f(x,y) as a superposition over all angles of a ridge function with shape g   in each direction, where h=hf=hf,gh=hf=hf,g depends on the functions f and g   and also on the direction, θ:h=hf,g(·,θ)θ:h=hf,g(·,θ). We show that if g   is Gaussian centered at zero then this is always possible and we give the function hf,ghf,g for a given f(x,y)f(x,y). For highpass or for odd shapes g  , we show it is impossible to represent an arbitrary f(x,y)f(x,y), i.e. in general there is no hf,ghf,g. Note that our problem is similar to tomography, where the problem is to invert the Radon transform, except that the use of the word inversion is here somewhat “inverted”: in tomography f(x,y)f(x,y) is unknown and we find it by inverting the projections of f  ; here, f(x,y)f(x,y) is known, g(z)g(z) is known, and hf(·,θ)=hf,g(·,θ)hf(·,θ)=hf,g(·,θ) is the unknown.  相似文献   

7.
8.
We consider paths in the plane with (1,01,0), (0,10,1), and (a,ba,b)-steps that start at the origin, end at height nn, and stay strictly to the left of a given non-decreasing right boundary. We show that if the boundary is periodic and has slope at most b/ab/a, then the ordinary generating function for the number of such paths ending at height n   is algebraic. Our argument is in two parts. We use a simple combinatorial decomposition to obtain an Appell relation or “umbral” generating function, in which the power znzn is replaced by a power series of the form znφn(z),znφn(z), where φn(0)=1.φn(0)=1. Then we convert (in an explicit way) the umbral generating function to an ordinary generating function by solving a system of linear equations and a polynomial equation. This conversion implies that the ordinary generating function is algebraic. We give several concrete examples, including an alternative way to solve the tennis ball problem.  相似文献   

9.
In this paper, we study a random field U?(t,x)U?(t,x) governed by some type of stochastic partial differential equations with an unknown parameter θθ and a small noise ??. We construct an estimator of θθ based on the continuous observation of N   Fourier coefficients of U?(t,x)U?(t,x), and prove the strong convergence and asymptotic normality of the estimator when the noise ?? tends to zero.  相似文献   

10.
11.
We consider a linear regression model with regression parameter β=(β1,…,βp)β=(β1,,βp) and independent and identically N(0,σ2)N(0,σ2) distributed errors. Suppose that the parameter of interest is θ=aTβθ=aTβ where aa is a specified vector. Define the parameter τ=cTβ-tτ=cTβ-t where the vector cc and the number tt are specified and aa and cc are linearly independent. Also suppose that we have uncertain prior information that τ=0τ=0. We present a new frequentist 1-α1-α confidence interval for θθ that utilizes this prior information. We require this confidence interval to (a) have endpoints that are continuous functions of the data and (b) coincide with the standard 1-α1-α confidence interval when the data strongly contradict this prior information. This interval is optimal in the sense that it has minimum weighted average expected length where the largest weight is given to this expected length when τ=0τ=0. This minimization leads to an interval that has the following desirable properties. This interval has expected length that (a) is relatively small when the prior information about ττ is correct and (b) has a maximum value that is not too large. The following problem will be used to illustrate the application of this new confidence interval. Consider a 2×22×2 factorial experiment with 20 replicates. Suppose that the parameter of interest θθ is a specified simple   effect and that we have uncertain prior information that the two-factor interaction is zero. Our aim is to find a frequentist 0.95 confidence interval for θθ that utilizes this prior information.  相似文献   

12.
Super-simple cyclic designs are useful on constructing codes and designs such as superimposed codes, perfect hash families and optical orthogonal codes with index two. In this paper, we show that there exists a super-simple cyclic (v,4,λ)(v,4,λ) for 7?v?417?v?41 and all admissible λλ with two definite exceptions of (v,λ)=(9,3),(13,5)(v,λ)=(9,3),(13,5) and one possible exception of (v,λ)=(39,18)(v,λ)=(39,18). Some useful algorithms are explained for computer search and new designs are displayed.  相似文献   

13.
Let {Xn,n?1}{Xn,n?1} be a sequence of independent identically distributed random variables, taking nonnegative integer values. An observation XnXn is a tie for the maximum if Xn=max{X1,…,Xn-1}Xn=max{X1,,Xn-1}. In this paper, we obtain weak and strong laws of large numbers and central limit theorems for the cumulative number of ties for the maximum among the first nn observations.  相似文献   

14.
We determine a credible set A   that is the “best” with respect to the variation of the prior distribution in a neighborhood ΓΓ of the starting prior π0(θ)π0(θ). Among the class of sets with credibility γγ under π0π0, the “optimally robust” set will be the one which maximizes the minimum probability of including θθ as the prior varies over ΓΓ. This procedure is also Γ-minimaxΓ-minimax with respect to the risk function, probability of non-inclusion. We find the optimally robust credible set for three neighborhood classes ΓΓ, the ε-contaminationε-contamination class, the density ratio class and the density bounded class. A consequence of this investigation is that the maximum likelihood set is seen to be an optimal credible set from a robustness perspective.  相似文献   

15.
16.
17.
18.
Consider a mixture problem consisting of k classes. Suppose we observe an s-dimensional random vector X   whose distribution is specified by the relations P(X∈A|Y=i)=Pi(A)P(XA|Y=i)=Pi(A), where Y   is an unobserved class identifier defined on {1,…,k}{1,,k}, having distribution P(Y=i)=piP(Y=i)=pi. Assuming the distributions PiPi having a common covariance matrix, elegant identities are presented that connect the matrix of Fisher information in Y   on the parameters p1,…,pkp1,,pk, the matrix of linear information in X, and the Mahalanobis distances between the pairs of P  's. Since the parameters are not free, the information matrices are singular and the technique of generalized inverses is used. A matrix extension of the Mahalanobis distance and its invariant forms are introduced that are of interest in their own right. In terms of parameter estimation, the results provide an independent of the parameter upper bound for the loss of accuracy by esimating p1,…,pkp1,,pk from a sample of XXs, as compared with the ideal estimator based on a random sample of YYs.  相似文献   

19.
In Hedayat and Pesotan [1992, Two-level factorial designs for main effects and selected two-factor interactions. Statist. Sinica 2, 453–464.] the concepts of a g(n,e)g(n,e)-design and a g(n,e)g(n,e)-matrix are introduced to study designs of nn factor two-level experiments which can unbiasedly estimate the mean, the nn main effects and ee specified two-factor interactions appearing in an orthogonal polynomial model and it is observed that the construction of a g-design is equivalent to the construction of a g  -matrix. This paper deals with the construction of D-optimal g(n,1)g(n,1)-matrices. A standard form for a g(n,1)g(n,1)-matrix is introduced and some lower and upper bounds on the absolute determinant value of a D-optimal g(n,1)g(n,1)-matrix in the class of all g(n,1)g(n,1)-matrices are obtained and an approach to construct D-optimal g(n,1)g(n,1)-matrices is given for 2?n?82?n?8. For two specific subclasses, namely a certain class of g(n,1)g(n,1)-matrices within the class of g(n,1)g(n,1)-matrices of index one and the class C(H)C(H) of g(8t+2,1)g(8t+2,1)-matrices constructed from a normalized Hadamard matrix H   of order 8t+4(t?1)8t+4(t?1) two techniques for the construction of the restricted D-optimal matrices are given.  相似文献   

20.
The problem of classifying all isomorphism classes of OA(N,k,s,t)OA(N,k,s,t)'s is shown to be equivalent to finding all isomorphism classes of non-negative integer solutions to a system of linear equations under the symmetry group of the system of equations. A branch-and-cut algorithm developed by Margot [2002. Pruning by isomorphism in branch-and-cut. Math. Programming Ser. A 94, 71–90; 2003a. Exploiting orbits in symmetric ILP. Math. Programming Ser. B 98, 3–21; 2003b. Small covering designs by branch-and-cut. Math. Programming Ser. B 94, 207–220; 2007. Symmetric ILP: coloring and small integers. Discrete Optim., 4, 40–62] for solving integer programming problems with large symmetry groups is used to find all non-isomorphic OA(24,7,2,2)OA(24,7,2,2)'s, OA(24,k,2,3)OA(24,k,2,3)'s for 6?k?116?k?11, OA(32,k,2,3)OA(32,k,2,3)'s for 6?k?116?k?11, OA(40,k,2,3)OA(40,k,2,3)'s for 6?k?106?k?10, OA(48,k,2,3)OA(48,k,2,3)'s for 6?k?86?k?8, OA(56,k,2,3)OA(56,k,2,3)'s, OA(80,k,2,4)OA(80,k,2,4)'s, OA(112,k,2,4)OA(112,k,2,4)'s, for k=6,7k=6,7, OA(64,k,2,4)OA(64,k,2,4)'s, OA(96,k,2,4)OA(96,k,2,4)'s for k=7,8k=7,8, and OA(144,k,2,4)OA(144,k,2,4)'s for k=8,9k=8,9. Further applications to classifying covering arrays with the minimum number of runs and packing arrays with the maximum number of runs are presented.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号