首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
统计学   3篇
  2018年   1篇
  2012年   1篇
  2003年   1篇
排序方式: 共有3条查询结果,搜索用时 0 毫秒
1
1.
The present paper focuses attention on the sensitivity of technical inefficiency to most commonly used one-sided distributions of the inefficiency error term, namely the truncated normal, the half-normal, and the exponential distributions. A generalized version of the half-normal, which does not embody the zero-mean restriction, is also explored. For each distribution, the likelihood function and the counterpart of the estimator of technical efficiency are explicitly stated (Jondrow, J., Lovell, C. A. K., Materov, I. S., Schmidt, P. ([1982]), On estimation of technical inefficiency in the stochastic frontier production function model, J. Econometrics19:233-238). Based on our panel data set, related to Tunisian manufacturing firms over the period 1983-1993, formal tests lead to a strong rejection of the zero-mean restriction embodied in the half normal distribution. Our main conclusion is that the degree of measured inefficiency is very sensitive to the postulated assumptions about the distribution of the one-sided error term. The estimated inefficiency indices are, however, unaffected by the choice of the functional form for the production function.  相似文献   
2.
We give a simple formula to calculate the speed of weighted random walks on nonnegative integers and on spherically symmetric trees.  相似文献   
3.
Outlier detection has been used extensively in data analysis to detect anomalous observation in data. It has important applications such as in fraud detection and robust analysis, among others. In this paper, we propose a method in detecting multiple outliers in linear functional relationship model for circular variables. Using the residual values of the Caires and Wyatt model, we applied the hierarchical clustering approach. With the use of a tree diagram, we illustrate the detection of outliers graphically. A Monte Carlo simulation study is done to verify the accuracy of the proposed method. Low probability of masking and swamping effects indicate the validity of the proposed approach. Also, the illustrations to two sets of real data are given to show its practical applicability.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号