首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Consider the model where there are II independent multivariate normal treatment populations with p×1p×1 mean vectors μiμi, i=1,…,Ii=1,,I, and covariance matrix ΣΣ. Independently the (I+1)(I+1)st population corresponds to a control and it too is multivariate normal with mean vector μI+1μI+1 and covariance matrix ΣΣ. Now consider the following two multiple testing problems.  相似文献   

2.
We consider a linear regression model with regression parameter β=(β1,…,βp)β=(β1,,βp) and independent and identically N(0,σ2)N(0,σ2) distributed errors. Suppose that the parameter of interest is θ=aTβθ=aTβ where aa is a specified vector. Define the parameter τ=cTβ-tτ=cTβ-t where the vector cc and the number tt are specified and aa and cc are linearly independent. Also suppose that we have uncertain prior information that τ=0τ=0. We present a new frequentist 1-α1-α confidence interval for θθ that utilizes this prior information. We require this confidence interval to (a) have endpoints that are continuous functions of the data and (b) coincide with the standard 1-α1-α confidence interval when the data strongly contradict this prior information. This interval is optimal in the sense that it has minimum weighted average expected length where the largest weight is given to this expected length when τ=0τ=0. This minimization leads to an interval that has the following desirable properties. This interval has expected length that (a) is relatively small when the prior information about ττ is correct and (b) has a maximum value that is not too large. The following problem will be used to illustrate the application of this new confidence interval. Consider a 2×22×2 factorial experiment with 20 replicates. Suppose that the parameter of interest θθ is a specified simple   effect and that we have uncertain prior information that the two-factor interaction is zero. Our aim is to find a frequentist 0.95 confidence interval for θθ that utilizes this prior information.  相似文献   

3.
We study a randomized adaptive design to assign one of the LL treatments to patients who arrive sequentially by means of an urn model. At each stage nn, a reward is distributed between treatments. The treatment applied is rewarded according to its response, 0?Yn?10?Yn?1, and 1-Yn1-Yn is distributed among the other treatments according to their performance until stage n-1n-1. Patients can be classified in K+1K+1 levels and we assume that the effect of this level in the response to the treatments is linear. We study the asymptotic behavior of the design when the ordinary least square estimators are used as a measure of performance until stage n-1n-1.  相似文献   

4.
In Hedayat and Pesotan [1992, Two-level factorial designs for main effects and selected two-factor interactions. Statist. Sinica 2, 453–464.] the concepts of a g(n,e)g(n,e)-design and a g(n,e)g(n,e)-matrix are introduced to study designs of nn factor two-level experiments which can unbiasedly estimate the mean, the nn main effects and ee specified two-factor interactions appearing in an orthogonal polynomial model and it is observed that the construction of a g-design is equivalent to the construction of a g  -matrix. This paper deals with the construction of D-optimal g(n,1)g(n,1)-matrices. A standard form for a g(n,1)g(n,1)-matrix is introduced and some lower and upper bounds on the absolute determinant value of a D-optimal g(n,1)g(n,1)-matrix in the class of all g(n,1)g(n,1)-matrices are obtained and an approach to construct D-optimal g(n,1)g(n,1)-matrices is given for 2?n?82?n?8. For two specific subclasses, namely a certain class of g(n,1)g(n,1)-matrices within the class of g(n,1)g(n,1)-matrices of index one and the class C(H)C(H) of g(8t+2,1)g(8t+2,1)-matrices constructed from a normalized Hadamard matrix H   of order 8t+4(t?1)8t+4(t?1) two techniques for the construction of the restricted D-optimal matrices are given.  相似文献   

5.
The problem of classifying all isomorphism classes of OA(N,k,s,t)OA(N,k,s,t)'s is shown to be equivalent to finding all isomorphism classes of non-negative integer solutions to a system of linear equations under the symmetry group of the system of equations. A branch-and-cut algorithm developed by Margot [2002. Pruning by isomorphism in branch-and-cut. Math. Programming Ser. A 94, 71–90; 2003a. Exploiting orbits in symmetric ILP. Math. Programming Ser. B 98, 3–21; 2003b. Small covering designs by branch-and-cut. Math. Programming Ser. B 94, 207–220; 2007. Symmetric ILP: coloring and small integers. Discrete Optim., 4, 40–62] for solving integer programming problems with large symmetry groups is used to find all non-isomorphic OA(24,7,2,2)OA(24,7,2,2)'s, OA(24,k,2,3)OA(24,k,2,3)'s for 6?k?116?k?11, OA(32,k,2,3)OA(32,k,2,3)'s for 6?k?116?k?11, OA(40,k,2,3)OA(40,k,2,3)'s for 6?k?106?k?10, OA(48,k,2,3)OA(48,k,2,3)'s for 6?k?86?k?8, OA(56,k,2,3)OA(56,k,2,3)'s, OA(80,k,2,4)OA(80,k,2,4)'s, OA(112,k,2,4)OA(112,k,2,4)'s, for k=6,7k=6,7, OA(64,k,2,4)OA(64,k,2,4)'s, OA(96,k,2,4)OA(96,k,2,4)'s for k=7,8k=7,8, and OA(144,k,2,4)OA(144,k,2,4)'s for k=8,9k=8,9. Further applications to classifying covering arrays with the minimum number of runs and packing arrays with the maximum number of runs are presented.  相似文献   

6.
We consider m×mm×m covariance matrices, Σ1Σ1 and Σ2Σ2, which satisfy Σ2-Σ1Σ2-Σ1=Δ, where ΔΔ has a specified rank. Maximum likelihood estimators of Σ1Σ1 and Σ2Σ2 are obtained when sample covariance matrices having Wishart distributions are available and rank(Δ)rank(Δ) is known. The likelihood ratio statistic for a test about the value of rank(Δ)rank(Δ) is also given and some properties of its null distribution are obtained. The methods developed in this paper are illustrated through an example.  相似文献   

7.
We consider paths in the plane with (1,01,0), (0,10,1), and (a,ba,b)-steps that start at the origin, end at height nn, and stay strictly to the left of a given non-decreasing right boundary. We show that if the boundary is periodic and has slope at most b/ab/a, then the ordinary generating function for the number of such paths ending at height n   is algebraic. Our argument is in two parts. We use a simple combinatorial decomposition to obtain an Appell relation or “umbral” generating function, in which the power znzn is replaced by a power series of the form znφn(z),znφn(z), where φn(0)=1.φn(0)=1. Then we convert (in an explicit way) the umbral generating function to an ordinary generating function by solving a system of linear equations and a polynomial equation. This conversion implies that the ordinary generating function is algebraic. We give several concrete examples, including an alternative way to solve the tennis ball problem.  相似文献   

8.
The enumeration of binary cyclic self-orthogonal codes of length 63 is used to prove that any cyclic quasi-symmetric 2-(63,15,35)2-(63,15,35) design with block intersection numbers x=3x=3 and y=7y=7 is isomorphic to the geometric design having as blocks the three-dimensional subspaces in PG(5,2)PG(5,2).  相似文献   

9.
This paper discusses a new perspective in fitting spatial point process models. Specifically the spatial point process of interest is treated as a marked point process where at each observed event xx a stochastic process M(x;t)M(x;t), 0<t<r0<t<r, is defined. Each mark process M(x;t)M(x;t) is compared with its expected value, say F(t;θ)F(t;θ), to produce a discrepancy measure at xx, where θθ is a set of unknown parameters. All individual discrepancy measures are combined to define an overall measure which will then be minimized to estimate the unknown parameters. The proposed approach can be easily applied to data with sample size commonly encountered in practice. Simulations and an application to a real data example demonstrate the efficacy of the proposed approach.  相似文献   

10.
This paper considered the estimation of the regression parameters of a general probit regression model. Accordingly, we proposed five ridge regression (RR) estimators for the probit regression models for estimating the parameters (β)(β) when the weighted design matrix is ill-conditioned and it is suspected that the parameter ββ may belong to a linear subspace defined by Hβ=hHβ=h. Asymptotic properties of the estimators are studied with respect to quadratic biases, MSE matrices and quadratic risks. The regions of optimality of the proposed estimators are determined based on the quadratic risks. Some relative efficiency tables and risk graphs are provided to illustrate the numerical comparison of the estimators. We conclude that when q≥3q3, one would uses PRRRE; otherwise one uses PTRRE with some optimum size αα. We also discuss the performance of the proposed estimators compare to the alternative ridge regression method due to Liu (1993).  相似文献   

11.
12.
Studying the right tail of a distribution, one can classify the distributions into three classes based on the extreme value index γγ. The class γ>0γ>0 corresponds to Pareto-type or heavy tailed distributions, while γ<0γ<0 indicates that the underlying distribution has a finite endpoint. The Weibull-type distributions form an important subgroup within the Gumbel class with γ=0γ=0. The tail behaviour can then be specified using the Weibull tail index. Classical estimators of this index show severe bias. In this paper we present a new estimation approach based on the mean excess function, which exhibits improved bias and mean squared error. The asserted properties are supported by simulation experiments and asymptotic results. Illustrations with real life data sets are provided.  相似文献   

13.
14.
This paper deals with sparse K2×J(J>2)K2×J(J>2) tables. Projection-method Mantel–Haenszel (MH) estimators of the common odds ratios have been proposed for K2×JK2×J tables, which include Greenland's generalized MH estimator as a special case. The method projects log-transformed MH estimators for all K2×2K2×2 subtables, which were called naive MH estimators, onto a linear space spanned by log odds ratios. However, for sparse tables it is often the case that naive MH estimators are unable to be computed. In this paper we introduce alternative naive MH estimators using a graph that represents K2×JK2×J tables, and apply the projection to these alternative estimators. The idea leads to infinitely many reasonable estimators and we propose a method to choose the optimal one by solving a quadratic optimization problem induced by the graph, where some graph-theoretic arguments play important roles to simplify the optimization problem. An illustration is given using data from a case–control study. A simulation study is also conducted, which indicates that the MH estimator tends to have a smaller mean squared error than the MH estimator previously suggested and the conditional maximum likelihood estimator for sparse tables.  相似文献   

15.
We consider the problem of estimating the mean θθ of an Np(θ,Ip)Np(θ,Ip) distribution with squared error loss ∥δ−θ∥2δθ2 and under the constraint ∥θ∥≤mθm, for some constant m>0m>0. Using Stein's identity to obtain unbiased estimates of risk, Karlin's sign change arguments, and conditional risk analysis, we compare the risk performance of truncated linear estimators with that of the maximum likelihood estimator δmleδmle. We obtain for fixed (m,p)(m,p) sufficient conditions for dominance. An asymptotic framework is developed, where we demonstrate that the truncated linear minimax estimator dominates δmleδmle, and where we obtain simple and accurate measures of relative improvement in risk. Numerical evaluations illustrate the effectiveness of the asymptotic framework for approximating the risks for moderate or large values of p.  相似文献   

16.
In this note we provide a counterexample which resolves conjectures about Hadamard matrices made in this journal. Beder [1998. Conjectures about Hadamard matrices. Journal of Statistical Planning and Inference 72, 7–14] conjectured that if HH is a maximal m×nm×n row-Hadamard matrix then m is a multiple of 4; and that if n   is a power of 2 then every row-Hadamard matrix can be extended to a Hadamard matrix. Using binary integer programming we obtain a maximal 13×3213×32 row-Hadamard matrix, which disproves both conjectures. Additionally for n being a multiple of 4 up to 64, we tabulate values of m   for which we have found a maximal row-Hadamard matrix. Based on the tabulated results we conjecture that a m×nm×n row-Hadamard matrix with m?n-7m?n-7 can be extended to a Hadamard matrix.  相似文献   

17.
Skew Dyck paths     
In this paper we study the class SS of skew Dyck paths, i.e. of those lattice paths that are in the first quadrant, begin at the origin, end on the x-axis, consist of up steps  U=(1,1)U=(1,1), down steps  D=(1,-1)D=(1,-1), and left steps  L=(−1,-1)L=(1,-1), and such that up steps never overlap with left steps. In particular, we show that these paths are equinumerous with several other combinatorial objects, we describe some involutions on this class, and finally we consider several statistics on SS.  相似文献   

18.
We consider the situation in which a 2m×2m2m×2m correlation matrix is naturally partitioned into a 2×22×2 form, where each submatrix is m×mm×m and we wish to test for the equality of the two correlation matrices appearing on the diagonal of the partitioned form. Standard tests for the equality of correlation matrices do not apply since the corresponding sample correlation matrices are correlated. We obtain Wald statistics under the assumption of multivariate normality as well as extensions that apply to elliptical distributions.  相似文献   

19.
20.
Super-simple cyclic designs are useful on constructing codes and designs such as superimposed codes, perfect hash families and optical orthogonal codes with index two. In this paper, we show that there exists a super-simple cyclic (v,4,λ)(v,4,λ) for 7?v?417?v?41 and all admissible λλ with two definite exceptions of (v,λ)=(9,3),(13,5)(v,λ)=(9,3),(13,5) and one possible exception of (v,λ)=(39,18)(v,λ)=(39,18). Some useful algorithms are explained for computer search and new designs are displayed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号