首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 217 毫秒
1.
2.
The paper develops constrained Bayes and empirical Bayes estimators in the random effects ANOVA model under balanced loss functions. In the balanced normal–normal model, estimators of the Bayes risks of the constrained Bayes and constrained empirical Bayes estimators are provided which are correct asymptotically up to O(m-1)O(m-1), that is the remainder term is o(m-1)o(m-1), mm denoting the number of strata.  相似文献   

3.
The purpose of the present work is to extend the work of Gupta et al. (2010) to s  -level column balanced supersaturated designs. Addition of runs to an existing E(χ2)-optimalE(χ2)-optimal supersaturated design and to study the optimality of the resulting design is an important issue. This paper considers the study of the optimality of the resulting design. A lower bound to E(χ2)E(χ2) has been obtained for the extended supersaturated designs. Some examples and a small catalogue of E(χ2)-optimalE(χ2)-optimal supersaturated designs are also presented.  相似文献   

4.
This paper considers the problem of testing a sub-hypothesis in homoscedastic linear regression models where errors form long memory moving average processes and designs are non-random. Unlike in the random design case, asymptotic null distribution of the likelihood ratio type test based on the Whittle quadratic form is shown to be non-standard and non-chi-square. Moreover, the rate of consistency of the minimum Whittle dispersion estimator of the slope parameter vector is shown to be n-(1-α)/2n-(1-α)/2, different from the rate n-1/2n-1/2 obtained in the random design case, where αα is the rate at which the error spectral density explodes at the origin. The proposed test is shown to be consistent against fixed alternatives and has non-trivial asymptotic power against local alternatives that converge to null hypothesis at the rate n-(1-α)/2n-(1-α)/2.  相似文献   

5.
We consider paths in the plane with (1,01,0), (0,10,1), and (a,ba,b)-steps that start at the origin, end at height nn, and stay strictly to the left of a given non-decreasing right boundary. We show that if the boundary is periodic and has slope at most b/ab/a, then the ordinary generating function for the number of such paths ending at height n   is algebraic. Our argument is in two parts. We use a simple combinatorial decomposition to obtain an Appell relation or “umbral” generating function, in which the power znzn is replaced by a power series of the form znφn(z),znφn(z), where φn(0)=1.φn(0)=1. Then we convert (in an explicit way) the umbral generating function to an ordinary generating function by solving a system of linear equations and a polynomial equation. This conversion implies that the ordinary generating function is algebraic. We give several concrete examples, including an alternative way to solve the tennis ball problem.  相似文献   

6.
In this paper, we study Lebesgue densities on (0,∞)d(0,)d that are non-increasing in each coordinate, while keeping all other coordinates fixed, from the perspective of local asymptotic minimax lower bound theory. In particular, we establish a local optimal rate of convergence of the order n−1/(d+2)n1/(d+2).  相似文献   

7.
8.
9.
We consider the problem of estimating the mean θθ of an Np(θ,Ip)Np(θ,Ip) distribution with squared error loss ∥δ−θ∥2δθ2 and under the constraint ∥θ∥≤mθm, for some constant m>0m>0. Using Stein's identity to obtain unbiased estimates of risk, Karlin's sign change arguments, and conditional risk analysis, we compare the risk performance of truncated linear estimators with that of the maximum likelihood estimator δmleδmle. We obtain for fixed (m,p)(m,p) sufficient conditions for dominance. An asymptotic framework is developed, where we demonstrate that the truncated linear minimax estimator dominates δmleδmle, and where we obtain simple and accurate measures of relative improvement in risk. Numerical evaluations illustrate the effectiveness of the asymptotic framework for approximating the risks for moderate or large values of p.  相似文献   

10.
Let (X, Y  ) be a Rd×R-valuedRd×R-valued random vector. In regression analysis one wants to estimate the regression function m(x)?E(Y|X=x)m(x)?E(Y|X=x) from a data set. In this paper we consider the rate of convergence for the k-nearest neighbor estimators in case that X   is uniformly distributed on [0,1]d[0,1]d, Var(Y|X=x)Var(Y|X=x) is bounded, and m is (p, C)-smooth. It is an open problem whether the optimal rate can be achieved by a k  -nearest neighbor estimator for 1<p≤1.51<p1.5. We solve the problem affirmatively. This is the main result of this paper. Throughout this paper, we assume that the data is independent and identically distributed and as an error criterion we use the expected L2 error.  相似文献   

11.
We consider a linear regression model with regression parameter β=(β1,…,βp)β=(β1,,βp) and independent and identically N(0,σ2)N(0,σ2) distributed errors. Suppose that the parameter of interest is θ=aTβθ=aTβ where aa is a specified vector. Define the parameter τ=cTβ-tτ=cTβ-t where the vector cc and the number tt are specified and aa and cc are linearly independent. Also suppose that we have uncertain prior information that τ=0τ=0. We present a new frequentist 1-α1-α confidence interval for θθ that utilizes this prior information. We require this confidence interval to (a) have endpoints that are continuous functions of the data and (b) coincide with the standard 1-α1-α confidence interval when the data strongly contradict this prior information. This interval is optimal in the sense that it has minimum weighted average expected length where the largest weight is given to this expected length when τ=0τ=0. This minimization leads to an interval that has the following desirable properties. This interval has expected length that (a) is relatively small when the prior information about ττ is correct and (b) has a maximum value that is not too large. The following problem will be used to illustrate the application of this new confidence interval. Consider a 2×22×2 factorial experiment with 20 replicates. Suppose that the parameter of interest θθ is a specified simple   effect and that we have uncertain prior information that the two-factor interaction is zero. Our aim is to find a frequentist 0.95 confidence interval for θθ that utilizes this prior information.  相似文献   

12.
Supersaturated designs (SSDs) offer a potentially useful way to investigate many factors with only few experiments in the preliminary stages of experimentation. This paper explores how to construct E(fNOD)E(fNOD)-optimal mixed-level SSDs using k-cyclic generators. The necessary and sufficient conditions for the existence of mixed-level k-circulant SSDs with the equal occurrence property are provided. Properties of the mixed-level k  -circulant SSDs are investigated, in particular, the sufficient condition under which the generator vector produces an E(fNOD)E(fNOD)-optimal SSD is obtained. Moreover, many new E(fNOD)E(fNOD)-optimal mixed-level SSDs are constructed and listed. The method here generalizes the one proposed by Liu and Dean [2004. kk-circulant supersaturated designs. Technometrics 46, 32–43] for two-level SSDs and the one due to Georgiou and Koukouvinos [2006. Multi-level k-circulant supersaturated designs. Metrika 64, 209–220] for the multi-level case.  相似文献   

13.
We consider batch queueing systems M/MH/1M/MH/1 and MH/M/1MH/M/1 with catastrophes. The transient probability functions of these queueing systems are obtained by a Lattice Path Combinatorics approach that utilizes randomization and dual processes. Steady state distributions are also determined. Generalization to systems having batches of different sizes are discussed.  相似文献   

14.
In Hedayat and Pesotan [1992, Two-level factorial designs for main effects and selected two-factor interactions. Statist. Sinica 2, 453–464.] the concepts of a g(n,e)g(n,e)-design and a g(n,e)g(n,e)-matrix are introduced to study designs of nn factor two-level experiments which can unbiasedly estimate the mean, the nn main effects and ee specified two-factor interactions appearing in an orthogonal polynomial model and it is observed that the construction of a g-design is equivalent to the construction of a g  -matrix. This paper deals with the construction of D-optimal g(n,1)g(n,1)-matrices. A standard form for a g(n,1)g(n,1)-matrix is introduced and some lower and upper bounds on the absolute determinant value of a D-optimal g(n,1)g(n,1)-matrix in the class of all g(n,1)g(n,1)-matrices are obtained and an approach to construct D-optimal g(n,1)g(n,1)-matrices is given for 2?n?82?n?8. For two specific subclasses, namely a certain class of g(n,1)g(n,1)-matrices within the class of g(n,1)g(n,1)-matrices of index one and the class C(H)C(H) of g(8t+2,1)g(8t+2,1)-matrices constructed from a normalized Hadamard matrix H   of order 8t+4(t?1)8t+4(t?1) two techniques for the construction of the restricted D-optimal matrices are given.  相似文献   

15.
16.
17.
18.
The problem of classifying all isomorphism classes of OA(N,k,s,t)OA(N,k,s,t)'s is shown to be equivalent to finding all isomorphism classes of non-negative integer solutions to a system of linear equations under the symmetry group of the system of equations. A branch-and-cut algorithm developed by Margot [2002. Pruning by isomorphism in branch-and-cut. Math. Programming Ser. A 94, 71–90; 2003a. Exploiting orbits in symmetric ILP. Math. Programming Ser. B 98, 3–21; 2003b. Small covering designs by branch-and-cut. Math. Programming Ser. B 94, 207–220; 2007. Symmetric ILP: coloring and small integers. Discrete Optim., 4, 40–62] for solving integer programming problems with large symmetry groups is used to find all non-isomorphic OA(24,7,2,2)OA(24,7,2,2)'s, OA(24,k,2,3)OA(24,k,2,3)'s for 6?k?116?k?11, OA(32,k,2,3)OA(32,k,2,3)'s for 6?k?116?k?11, OA(40,k,2,3)OA(40,k,2,3)'s for 6?k?106?k?10, OA(48,k,2,3)OA(48,k,2,3)'s for 6?k?86?k?8, OA(56,k,2,3)OA(56,k,2,3)'s, OA(80,k,2,4)OA(80,k,2,4)'s, OA(112,k,2,4)OA(112,k,2,4)'s, for k=6,7k=6,7, OA(64,k,2,4)OA(64,k,2,4)'s, OA(96,k,2,4)OA(96,k,2,4)'s for k=7,8k=7,8, and OA(144,k,2,4)OA(144,k,2,4)'s for k=8,9k=8,9. Further applications to classifying covering arrays with the minimum number of runs and packing arrays with the maximum number of runs are presented.  相似文献   

19.
20.
A ridge function with shape function g   in the horizontal direction is a function of the form g(x)h(y,0)g(x)h(y,0). Along each horizontal line it has the shape g(x)g(x), multiplied by a function h(y,0)h(y,0) which depends on the y-value of the horizontal line. Similarly a ridge function with shape function g   in the vertical direction has the form g(y)h(x,π/2)g(y)h(x,π/2). For a given shape function g it may or may not be possible to represent an arbitrary   function f(x,y)f(x,y) as a superposition over all angles of a ridge function with shape g   in each direction, where h=hf=hf,gh=hf=hf,g depends on the functions f and g   and also on the direction, θ:h=hf,g(·,θ)θ:h=hf,g(·,θ). We show that if g   is Gaussian centered at zero then this is always possible and we give the function hf,ghf,g for a given f(x,y)f(x,y). For highpass or for odd shapes g  , we show it is impossible to represent an arbitrary f(x,y)f(x,y), i.e. in general there is no hf,ghf,g. Note that our problem is similar to tomography, where the problem is to invert the Radon transform, except that the use of the word inversion is here somewhat “inverted”: in tomography f(x,y)f(x,y) is unknown and we find it by inverting the projections of f  ; here, f(x,y)f(x,y) is known, g(z)g(z) is known, and hf(·,θ)=hf,g(·,θ)hf(·,θ)=hf,g(·,θ) is the unknown.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号