Research Article On Estimating the Linear-by-Linear Parameter for Ordinal Log-Linear Models: A Computational Study
|
|
- Amy Crawford
- 5 years ago
- Views:
Transcription
1 International Scholarly Research Network ISRN Computational Mathematics Volume 22, Article ID 3445, 2 pages doi:.542/22/3445 Research Article On Estimating the Linear-by-Linear Parameter for Ordinal Log-Linear Models: A Computational Study Eric J. Beh and Thomas B. Farver 2 School of Mathematical and Physical Sciences, University of Newcastle, Callaghan, NSW 238, Australia 2 School of Veterinary Medicine, University of California, Davis, Davis, CA 9566, USA Correspondence should be addressed to Eric J. Beh, eric.beh@newcastle.edu.au Received 7 January 22; Accepted 5 March 22 Academic Editors: T. Allahviranloo, H. J. Ruskin, P. B. Vasconcelos, and Q.-W. Wang Copyright 22 E. J. Beh and T. B. Farver. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Estimating linear-by-linear association has long been an important topic in the analysis of contingency tables. For ordinal variables, log-linear models may be used to detect the strength and magnitude of the association between such variables, and iterative procedures are traditionally used. Recently, studies have shown, by way of example, three non-iterative techniques can be used to quickly and accurately estimate the parameter. This paper provides a computational study of these procedures, and the results show that they are extremely accurate when compared with estimates obtained using Newton s unidimensional method.. Introduction During the 97s and 98s parameter estimation procedures for ordinal log-linear and ordinal association models gained considerable attention in the literature. For example, Haberman [], Goodman [2, 3], Agresti [4], and Gilula and Haberman [5] all considered various approaches to obtain the maximum likelihood estimate (MLE of the parameters of such models. Recently there has been a renewed interest paid to estimation methods for these ordinal models. Galindo-Garre and Vermunt [6] considered two adaptations of Goodman s [2] approach while Ait-Sidi-Allal et al. [7] considered an iterative procedure based on Fisher s scoring algorithm. These approaches can involve computationally intensive procedures and are therefore subject to a number of problems including the poor choice of starting values, or the slow (or even lack of convergence of the algorithm. A different approach to estimating parameters from ordinal log-linear (or association models is to consider the direct, iterative-free, estimation procedure originally proposed by Beh and Davy [8] and recently extended by Beh and Farver [9]. The latter authors presented three noniterative estimation procedures for estimating the association parameter for such models and empirically demonstrated (by considering 4 commonly analysed contingency tables of varying dimension and sample size that these noniterative procedures can provide estimates that are statistically indistinguishable when compared with the estimate obtained using Newton s unidimensional method. By performing a computational study, this paper will explore the accuracy and reliability of Newton s method and four noniterative procedures on randomly generated contingency tables with a fixed association parameter. Such a study will be made by first briefly describing the ordinal loglinear model (Section 2 and Newton s method (Section 3.. A brief mathematical description of the non-iterative techniquesofbehandfarver[9]willbemadeinsection 3.2.The calculation of the standard error of these estimates is considered in Section 3.3. Section 4. describes the mechanism by which contingency tables of varying dimension and association parameter are generated, while the results of the study are discussed in Section 4.2. Section 5 provides an overview of these findings. 2. The Ordinal Log-Linear Model SupposeweconsideranI J two-way contingency table, N, where the (i, jth cell entry is given by n ij for i =,..., I and j =,..., J. Let the grand total of N be n, and let the matrix of joint relative frequencies be P, so that the (i, jth cell entry
2 2 ISRN Computational Mathematics is p ij = n ij /n and I J i= j= p ij =. Define the ith row marginal proportion by p i = J j= p ij, and define the jth column marginal proportion by p j = I i= p ij. When the row and column variables both consist of ordered categories, the logarithm of the (i, jthcellmaybereconstitutedby considering the following ordinal log-linear model: ln m ij = μ + α i + β j + φ(u i u ( v j v, ( where m ij is the expected cell frequency of the (i, jth cell. For this model μ is the grand mean and α i and β j are the main effects associated with the ith row category and jth column category, respectively, and are constrained so that I i= α i = J j= β j =. These parameters may be estimated such that μ = ln(n + I i= α i = ln ( p i I β j = ln ( p j J ln ( p i + J ln ( p i, i= J ln ( p j, j= J ln ( p j, j= see Beh and Davy [8]. Model ( requires the specification of u i which is the score associated with the ith row category. When the row categories are ordered, these scores can be arranged in ascending, or descending, order depending on the structure of the row variable. Similarly, v j is the score associated with the jth column category for an ordinal column variable; the scores are arranged in ascending (or descending order. For (, u and v are the weighted means of u i and v j, respectively, where the weights are the marginal relative proportions. The relationship between the two-ordered categorical variables may be determined by estimating the parameter φ. This parameter is the measure of linear-by-linear association, and its interpretation is aided by considering that the logodds ratio measure is ( mij m i+,j+ ln = φ(u i+ u i ( v j+ v j. (3 m i,j+ m i+,j Therefore, if equidistant scores are chosen to reflect the ordered structure of the variables so that u 2 u = = u I u I = andv 2 v = = v J v J =, then φ is the common log-odds ratio of the contingency table. If one considers the log-linear model (, then the (i, jth cell can be reconstituted by considering the association model (2 m ij = α i β j exp [ φ(u i u ( v j v ], (4 where α i and β j are subject to the constraint I i= α i = J j= β j = and are treated here as nuisance parameters. The estimation of φ can be carried out by using Newton s unidimensional method considered by Goodman [2] if only one set of scores is fixed. One may also refer to Haberman [], Agresti ([4], Appendix B, Nelder and Wedderburn [], and Galindo-Garre and Vermunt [6] for iterative algorithms. Recently, non-iterative approaches have been proposed for estimating φ. Beh and Davy[8] originally considered such an approach for estimating φ. This work has since been expanded upon by Beh and Farver [9] who proposed another three non-iterative procedures for estimating this parameter and discussed the calculation of the corresponding standard errors. By performing an empirical study, they demonstrated that such non-iterative procedures estimate φ with as much precision as Newton s method. Such an approach allows one to easily, and directly, estimate the linear-by-linear parameter without resorting to iterative techniques. This paper continues the study undertaken by Beh and Farver [9] by providing an evaluation of the performance and accuracy of Newton s method, and the four non-iterative procedures, for estimating the parameter φ from model (. 3. On Estimating φ 3.. Newton s Unidimensional Method. There are a number of iterative procedures that may be used for estimating φ from the log-linear model (. These include the iterative proportional fitting algorithm as described by Agresti ([4], pp and Nelder and Wedderburn s [] quasilikelihood approach. In this paper we will consider Newton s unidimensional method due to its relative simplicity and popularity. A brief description of Newton s method for estimating φ will be provided here although Beh and Farver [9] described it in more detail. Suppose that each of the cell frequencies of a contingency table N, n ij, are independent Poisson random variables. Also denote the expected value of n ij (under some model to be m ij. In this paper the expected value of n ij is determined by considering (4. The (t + th iteration of Newton s method involves updating the MLE of φ, denotedas φ (t+, using the estimate obtained fromthe tth iteration such that Ii= J j=(u i u ( v j v ( n ij m (t ij φ (t+ N = φ (t N + Ii= J j= (u i u 2( v j v 2 m (t ij until convergence is reached. This is achieved when φ (t+ N φ (t N <ε, for some reasonably small value of ε. Herem (t ij is just (4 with φ (t N in place of φ. When this stopping criterion is satisfied, the MLE of φ using Newton s method, φ N, is the final iterative estimate φ (t+ N. This method is adopted in this paper for obtaining the MLE of φ where ε =.. To initiate Newton s method, a starting value of φ ( N = is used which coincides with independence between the two categorical variables. The standard error of the MLE of φ using the iterative procedure described by (5is SE ( φ N = I J i= j= (u i u 2( v j v, (6 2 mij where m ij is the estimated value of n ij given φ N.There are some adaptations of Newton s unidimensional method N (5
3 ISRN Computational Mathematics 3 that can be included to entice it to converge faster, be more accurate,or both. Beh andfarver [9] consider some possible ways of doing this Noniterative Procedures. The computational study considered in this paper evaluates four non-iterative procedures for estimating φ. The first approach is φ LogNI = σ I σ J J i= j= p i p j (u i u ( v j v ( pij ln, p i p j (7 where σ 2 I = I i= u 2 i p i ( I i= u i p i 2 and σ 2 J = J j= v 2 j p j ( J j= v j p j 2 andistermedthelog-noniterative estimate or LogNI estimate of φ. The LogNI estimate (7 is guaranteed to exist when p ij >, for all i and j, and so is restricted to the case where none of the cell frequencies observed in a contingency table are zero. When there exist zero cell frequencies in the contingency table, this problem may be simply overcome by substituting small values where the zeros are observed. Agresti ([], p. 397 points out that in some situations, especially where a saturated model is considered, replacing zero cells with.5 is appropriate, although in other circumstances adding.5 may create problems. An alternative approach to approximating the natural logarithm present in the LogNI estimate (7 is to consider instead ( ( pij pij p i p j ln 2 (8 p i p j p ij + p i p j which takes into account that p ij /(p i p j. Alternatively, the second-order approximation ( pij pij p ln 2 ( i p j + ( 3 pij p i p j p i p j p ij + p i p j 3 p ij + p i p j (9 may also be considered. By adopting these two approximations of the logarithm function, two estimates of φ are obtained by considering φ LogNI = 2 σ I σ J J i= j= φ LogNI2 = 2 J p i p j (u i u σ I σ J i= j= p i p j (u i u ( v j v ( p ij p i p j, p ij + p i p j ( vj v ( pij p i p j p ij + p i p j + 3 ( pij p i p j p ij + p i p j 3, ( which are referred to as the LogNI and LogNI2 estimates of φ, respectively. An alternative way to deal with the problem of zero cell frequencies is to use another approximation of the logarithm function that is present in the Log NI estimate (7. For example, by considering only the first term in the power series expansion of the function ( pij ln p i p j p ij p i p j, ( the LogNI estimate (7 can be approximated to yield an alternative estimate of φ φ BDNI = J p ij (u i u ( v j v. (2 σ I σ J i= j= This estimate was originally proposed in Beh and Davy [8] and so is termed the BD-noniterative estimate or simply the BDNI estimate of φ and is the fourth non-iterative estimation approach evaluated in the present simulation study Standard Error of the Noniterative Estimates. Beh and Farver [9] show, by considering the BDNI estimate (2, the standard error of φ BDNI is SE ( φ BDNI = [ σ I σ J n ]. (3 However, (3 is equivalent to the standard error (6 when the row and column variables are completely independent. To show this, consider the standard error (6. When the two categorical variables are independent so that m ij = np i p j, then φ =. Therefore (6 can be alternatively expressed as SE ( φ = J = n (u i u 2( v j v 2 pi p j i= j= J ( = n (u i u 2 p i vj v 2 p j i= j= [ ] = nσi 2 σj 2 = [ σ I σ J n ]. (4 This standard error provides an indication of the maximum standard error that one would obtain for a contingency table with sample size n. For the computational study considered in this paper, the standard error of the non-iterative estimates is calculated using (6. 4. The Computational Study 4.. Randomly Generating a Contingency Table. In order to study the accuracy and reliability of Newton s method and the four non-iterative procedures described above, we consider a simple procedure for generating a two-way contingency table of dimension I J given a value of φ and sample size n. The procedure involves selecting an independent
4 4 ISRN Computational Mathematics Table : Mean estimate (and standard error of φ using Newton s unidimensional method, φ N, based on 2 simulated contingency tables with a specified value of φ and n =. Size of contingency table True φ ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (.97.2 (.6.74 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (.55.4 ( ( ( ( (.62.6 (.68.2 ( ( ( ( ( ( ( ( (.54.4 ( ( ( ( ( (.6.4 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (.3.2 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (.24.4 ( ( ( ( ( (.8.8 (.32.2 ( (.3.6 ( ( ( ( ( ( ( ( ( (.67.3 ( ( (.2.4 ( (.9.4 ( (.24.5 ( ( ( ( ( ( ( ( (.7.94 ( (.9.28 ( ( ( ( (.45.5 (.78. ( (.83. ( (.65.3 ( ( (.3.65 ( ( ( ( ( ( ( ( ( (.7 and random sample of I pseudo-marginal row proportions, denoted by p i, from a uniform distribution from the interval [, ]. A sample of J pseudo-marginal column proportions, p j, is generated in a similar manner. The random marginal proportions of the ith row and jth column can therefore be obtained such that p i = p i p j Ii=, p j = p J i j= p, (5 j respectively, ensuring that I i= p i = and J j= p j =. Given these randomly generated marginal proportions and the pre-defined scores used to reflect the ordered structure of the categories, the mean row and column scores are u = s I (i p i, J ( v = s J j p j, (6 i= j=
5 ISRN Computational Mathematics 5 Table 2: Mean estimate (and standard error of φ using φ LogNI based on 2 simulated contingency tables with a specified value of φ and n. The values in bold are where the mean of the 2 P values obtained from the Wald test (of the difference between the estimated and true parameter is significant at the % level. The italicised values are significant at the 5% level. Size of contingency table True φ (.24 (.6 (.828 (.583 (.6 (.448 (.346 (.32 (.239 ( (.276 (.233 (.783 (.629 (.63 (.446 (.344 (.37 (.24 ( (.287 (.93 (.824 (.62 (.65 (.423 (.338 (.3 (.236 ( (.263 (.88 (.773 (.67 (.689 (.434 (.339 (.299 (.23 ( (.245 (.45 (.765 (.574 (.6 (.424 (.38 (.28 (.22 ( (.27 (.3 (.75 (.545 (.64 (.389 (.296 (.259 (.79 ( (.228 (.55 (.748 (.598 (.629 (.386 (.265 (.232 (.5 ( (.238 (.3 (.845 (.58 (.56 (.385 (.24 (.25 (.22 ( (.288 (.69 (.7 (.56 (.535 (.324 (.28 (.75 (.2 ( (.263 (.28 (.639 (.463 (.493 (.298 (.85 (.45 (.79 ( (.2665 (.8 (.77 (.49 (.469 (.275 (.54 (.24 (.55 ( (.276 (.967 (.65 (.42 (.442 (.234 (.35 (. (.39 ( (.2247 (.995 (.698 (.394 (.429 (.29 (.5 (.85 (.28 ( (.285 (.85 (.533 (.36 (.376 (.86 (.88 (.63 (.8 ( (.958 (.944 (.57 (.39 (.338 (.57 (.7 (.49 (.2 ( (.2227 (.97 (.494 (.286 (.334 (.37 (.53 (.39 (.8 ( (.2224 (.774 (.435 (.27 (.299 (.5 (.43 (.28 (.6 ( (.785 (.795 (.42 (.25 (.29 (.8 (.32 (.8 (.4 (.4 respectively. For this computational study, natural row scores, {s I (i = i : i =, 2,..., I} and natural column scores {s J (j = j : j =, 2,..., J} were chosen to reflect the ordinal structure of the categories. However, any scoring procedure may be considered to reflect the ordinal structure of categorical variables such as midrank scores [2] and Nishisato scores [3]. The (i, jth joint marginal cell frequency is then calculated based on the ordinal log-linear model ( such that ñ ij = exp [ μ + α i + β j + φ(u i u ( v j v ], (7 where ñ ij is the frequency observed in the (i, jth cell, given the randomly generated marginal proportions, the predetermined φ value, and μ = ln(n + I α i = ln ( p i I β j = ln ( p j J i= ln ( p i + J i= J j= ln ( p i, ln ( p j. J ln ( p j, j= (8
6 6 ISRN Computational Mathematics Table 3: Mean estimate (and standard error of φ using φ LogNI based on 2 simulated contingency tables with a specified value of φ and n. The values in bold are where the mean of the 2 P values obtained from the Wald test (of the difference between the estimated and true parameter is significant at the % level. The italicised values are significant at the 5% level. Size of contingency table True φ (.24 (.6 (.829 (.583 (.6 (.448 (.346 (.32 (.239 ( (.2759 (.234 (.785 (.63 (.63 (.446 (.344 (.37 (.24 ( (.287 (.93 (.824 (.62 (.65 (.423 (.338 (.3 (.236 ( (.254 (.99 (.773 (.67 (.689 (.434 (.339 (.299 (.23 ( (.245 (.45 (.765 (.574 (.6 (.424 (.38 (.28 (.23 ( (.27 (. (.753 (.546 (.64 (.39 (.297 (.26 (.82 ( (.2275 (.55 (.749 (.62 (.629 (.388 (.269 (.236 (.59 ( (.23 (.34 (.846 (.526 (.563 (.389 (.248 (.24 (.35 ( (.265 (.7 (.79 (.56 (.539 (.33 (.23 (.89 (.2 ( (.273 (.27 (.644 (.473 (.499 (.3 (.24 (.66 (.4 ( (.2685 (.27 (.726 (.43 (.469 (.29 (.78 (.5 (.85 ( (.276 (.972 (.69 (.446 (.456 (.256 (.65 (.3 (.7 ( (.2242 (.3 (.7 (.428 (.447 (.24 (.4 (.22 (.6 ( (.27 (.2 (.563 (.397 (.399 (.22 (.27 (.3 (.48 ( (.98 (.96 (.539 (.355 (.366 (.98 (.4 (.9 (.4 ( (.226 (.98 (.542 (.322 (.37 (.8 (.99 (.8 (.33 ( (.2244 (.86 (.47 (.37 (.34 (.46 (.89 (.68 (.29 ( (.785 (.823 (.439 (.35 (.337 (.6 (.77 (.56 (.25 (.9 It is apparent that the ñ ij values obtained will not be guaranteed to be integers. Therefore, each cell value is rounded to the nearest integer to obtain the randomly generated contingency table. Thus, the sample size of n specified in the algorithm is only an approximate sample size value Results. The computational study performed in this paper is based on random contingency tables (using the procedure described in Section 4. of different dimensions with a sample size of approximately. Tables were generated with the following dimensions: 2 2, 2 3, 2 4, 2 5, 3 3, 3 4, 3 5, 4 4, 4 5, and 5 5. For each dimension, 2 random tables were generated each with a fixed value of φ; the φ values considered in this paper were,.,.5, and. to.5 at increments of.. In terms of the exponent of φ (i.e., the common log-odds ratio of the table, these are equivalent to,.,.5, and. to 4.48, respectively. In practice, the common log-odds ratio may be negative; however, for the purposes of exploring the behaviour of Newton s unidimensional method and the four non-iterative procedures (the LogNI, LogNI, LogNI2, and BDNI estimates against the true value of φ,werestrictedour attention to positive φ values. A preliminary investigation revealed that randomly generated contingency tables with a negative φ behaved in a similar manner to tables generated with a positive φ value. Tables, 2, 3, 4, and 5 provide a summary of the mean estimate and standard error (in parentheses of φ from the 2 randomly generated contingency tables. Table summarises the results obtained using Newton s method, and
7 ISRN Computational Mathematics 7 Table 4: Mean estimate (and standard error of φ using φ LogNI2 based on 2 simulated contingency tables with a specified value of φ and n. The values in bold are where the mean of the 2 P values obtained from the Wald test (of the difference between the estimated and true parameter is significant at the % level. The italicised values are significant at the 5% level. Size of contingency table True φ (.24 (.6 (.828 (.583 (.6 (.448 (.346 (.32 (.239 ( (.276 (.233 (.783 (.629 (.63 (.446 (.344 (.37 (.24 ( (.287 (.93 (.824 (.62 (.65 (.423 (.338 (.3 (.236 ( (.262 (.88 (.773 (.67 (.689 (.434 (.339 (.299 (.23 ( (.245 (.45 (.765 (.574 (.6 (.424 (.38 (.28 (.22 ( (.27 (.6 (.752 (.545 (.64 (.389 (.296 (.259 (.79 ( (.228 (.55 (.748 (.599 (.629 (.386 (.266 (.233 (.54 ( (.239 (.3 (.845 (.52 (.56 (.386 (.242 (.28 (.28 ( (.277 (.69 (.74 (.59 (.54 (.326 (.223 (.8 (.2 ( (.267 (.26 (.64 (.466 (.494 (.32 (.93 (.55 (.94 ( (.267 (.2 (.79 (.422 (.462 (.28 (.66 (.39 (.75 ( (.276 (.968 (.6 (.43 (.447 (.243 (.52 (.8 (.6 ( (.2247 (.996 (.7 (.4 (.435 (.225 (.26 (.8 (.5 ( (.276 (.9 (.546 (.379 (.384 (.25 (.3 (.9 (.4 ( (.938 (.948 (.52 (.337 (.35 (.8 (.99 (.78 (.32 ( (.2236 (.97 (.57 (.35 (.35 (.64 (.85 (.68 (.26 ( (.223 (.786 (.45 (.297 (.32 (.46 (.75 (.57 (.23 ( (.784 (.86 (.42 (.282 (.34 (.42 (.64 (.45 (.9 (.6 Table 2 provides a summary of the accuracy of φ LogNI (7 for estimating φ. Table 3 summarises the results obtained by considering φ LogNI ( to estimate the parameter while Tables 4 and 5 summarise output when using φ LogNI2 (7 and φ BDNI (2, respectively. We also took into consideration the number of iterations needed for Newton s method to converge to four decimal places. Thus, Table 6 summarises the median number of iterations needed for convergence to occur. Also summarised in this table is the range (maximum and minimum of the number of iterations observed for the each set of 2 simulated tables. Table and Figure show that Newton s method is very accurate for estimating φ. The Wald statistic of the mean parameter estimate indicates that such a procedure gives estimates of φ that are statistically indistinguishable from the true estimate for all sized contingency tables and φ values. However, the number of iterations needed for Newton s method to estimate the parameter varies greatly depending on the size of the contingency table and the magnitude of φ (Table 6. Contingency tables of small dimension and small φ required no more than about iterations for convergence to four decimal places to occur. Due to the accuracy of Newton s method, the legends attached to Figure highlighting the varying table sizes have been omitted. Table 6 shows that for contingency tables of all dimensions considered, if φ is larger than.8, then the number of iterations for convergence was nearly always larger than with a median number of iterations ranging from 2
8 8 ISRN Computational Mathematics Table 5: Mean estimate (and standard error of φ using φ BDNI based on 2 simulated contingency tables with a specified value of φ and n. The values in bold are where the mean of the 2 P values obtained from the Wald test (of the difference between the estimated and true parameter is significant at the % level. The italicised values are significant at the 5% level. Size of contingency table True φ (.24 (.6 (.829 (.583 (.6 (.448 (.346 (.32 (.239 ( (.2745 (.236 (.787 (.63 (.63 (.446 (.344 (.37 (.24 ( (.282 (.93 (.823 (.62 (.65 (.423 (.338 (.3 (.236 ( (.225 (.87 (.773 (.66 (.688 (.434 (.339 (.299 (.23 ( (.237 (.43 (.765 (.574 (.6 (.424 (.38 (.28 (.24 ( (.998 (.3 (.754 (.546 (.64 (.39 (.299 (.262 (.84 ( (.2243 (.52 (.749 (.62 (.628 (.389 (.272 (.24 (.64 ( (.23 (.28 (.833 (.528 (.564 (.393 (.253 (.22 (.42 ( (.23 (.68 (.72 (.56 (.54 (.337 (.238 (.98 (.3 ( (.258 (.2 (.645 (.479 (.53 (.39 (.24 (.76 (.3 ( (.2568 (.26 (.728 (.437 (.476 (.32 (.9 (.62 (.94 ( (.249 (.969 (.627 (.455 (.464 (.269 (.78 (.42 (.79 ( (.292 (.996 (.739 (.437 (.458 (.254 (.53 (.34 (.69 ( (.2 (. (.57 (.4 (.43 (.236 (.4 (.5 (.55 ( (.859 (.963 (.55 (.37 (.383 (.23 (.26 (.2 (.45 ( (.2 (.973 (.553 (.34 (.386 (.97 (. (.9 (.37 ( (.28 (.788 (.489 (.337 (.359 (.8 (. (.76 (.32 ( (.752 (.836 (.46 (.324 (.356 (.77 (.86 (.63 (.27 (.7 (for a 2 2 contingency table to 9769 (for a 5 5table. For the 2 randomly generated 5 5 contingency tables, the number of iterations until convergence was achieved ranging from an economical 9 iterations to nearly 35. Table 2 and Figure 2 show that of the four non-iterative procedures, using φ LogNI to estimate φ came closest to matching the performance of Newton s method. There were 5 cases out of 8 total cases where the mean estimate of φ obtained using φ LogNI was different from the true φ at the % level of significance. Ten of these 5 cases occurred when estimating a φ>. in a contingency table having a dimension of 4 5or5 5. Due to the accuracy of the φ LogNI estimate, the legends attached to Figure 2 highlighting the varying table sizes have been omitted. Tables 3, 4, and 5 and the corresponding figures show that the estimators φ LogNI, φ LogNI2,and φ BDNI are stable and accurate for relatively small contingency tables and where φ is also small (not exceeding approximately.5. However they performed poorly for relatively large tables with a large parameter value, continually underestimating the parameter. Figures 3, 4 and 5 graphically verify these results. Using φ LogNI2 resulted in 3 cases (out of 8 total cases where the mean estimate of φ was different from the true φ value (at the % level of significance with 23 of these 3 cases occurring when estimating a φ. in a contingency table having a dimension of 3 5, 4 4, 4 5, or 5 5. Using φ LogNI resulted in 35 cases where the mean estimate of φ was statistically different from the true φ value with 27 of these 35
9 ISRN Computational Mathematics 9 Table 6: Median number of iterations needed for Newton s unidimensional method to converge to four decimal places. In parenthesis is the range of iterations for the 2 simulated contingency tables. Size of contingency table True φ ( 7 ( 6 ( 9 ( 4 ( 3 ( 4 ( 3 (2-3 ( 3 ( (2 4 (2 3 (2 95 (2 4 (2 5 (2-3 (2-3 (2-3 (2-3 ( (3 3 ( 7 (2 6 (4 6 (4 6 (4-5 (4-5 (4-5 (4-5 ( (3 29 (4 7 (5 8 (5 8 (4 6 (5 7 (5 7 (5 7 (6 8 ( (5 3 (7 2 (7 (7 (7 (7 (7 5 (8 3 (9 7 ( (3 23 (9 29 (9 28 (9 5 (9 5 (9 7 ( 22 ( 9 (2 27 ( (7 25 (6 6 ( 25 ( 23 ( 22 (2 26 (3 33 (4 47 (6 49 ( (4 26 (2 56 (3 28 (4 3 (3 3 (6 47 (8 53 (8 57 (23 8 ( ( 26 (5 32 (6 33 (7 66 (6 47 (8 6 (2 8 (23 98 (3 39 ( (4 737 (7 39 (9 52 (2 67 (9 43 (2 7 (26 5 (3 26 (25 95 ( (8 47 (2 4 (23 58 (25 64 (22 49 (24 4 (32 6 (38 88 (6 352 ( (9 39 (24 46 (27 76 (29 4 (26 (32 6 (39 27 ( ( ( (6 987 (27 83 (7 ( (3 22 (42 28 ( (66 48 (99 73 ( ( (4 983 (38 87 ( (39 8 ( (57 58 (68 59 (5 237 ( (28 28 (36 94 (44 8 (5 2 (46 2 ( ( (29 97 (99 32 ( ( ( ( ( ( (69 44 (35 4 (54 66 ( ( ( ( ( ( (63 43 ( ( ( (24 74 ( (38 92 (57 26 (74 32 (4 94 ( (3 7 ( ( ( ( cases occurring when estimating a φ.9 in a contingency table having a dimension of 3 5, 4 4, 4 5or5 5. Using φ BDNI resulted in 43 cases where the mean estimate of φ was statistically different from the true φ value with 3 of these 43 cases occurring when estimating a φ.8 in a contingency table having a dimension of 3 5, 4 4, 4 5or5 5. Two hundred (2 contingency tables of dimension 4 5 were randomly generated (using the algorithm described in Section 4. withφ =.4 and sample size approximately. For these tables, Figure 6 illustrates the stability of each of the five estimation procedures and summarises the P value obtained from the Wald test of the estimates φ N, φ LogNI, φ LogNI, φ LogN2,and φ BDNI when compared with φ =.4. All five methods provide reliable and accurate estimates of the parameter and, for all the tables generated, are statistically indistinguishable when compared with the true value of the parameter. These figures show that Newton s method (Figure 6(a provides the most reliable estimate since
10 ISRN Computational Mathematics Mean of simulated φ.5 Mean of simulated φ True φ Figure : Graphical view of the performance of Newton s unidimensional method for estimating φ. Mean estimate of parameter versus true parameter for the different values of φ and contingency tables of varying dimension..5.5 True φ Figure 4: Graphical view of the performance of φ LogNI2 (7 for estimating φ. Mean estimate of parameter versus true parameter for the different values of φ and contingency tables of varying dimension..5 Mean of simulated φ.5.5 Mean of simulated φ.5 3x5 4x4 5x5 2x2 2x3 2x4 3x3 2x5 3x4 4x5.5.5 True φ Figure 2: Graphical view of the performance of φ LogNI (7 for estimating φ. Mean estimate of parameter versus true parameter for the different values of φ and contingency tables of varying dimension..5.5 True φ Figure 5: Graphical view of the performance of φ BDNI (2 for estimating φ. Mean estimate of parameter versus true parameter for the different values of φ and contingency tables of varying dimension. Mean of simulated φ True φ Figure 3: Graphical view of the performance of φ LogNI (forestimating φ. Mean estimate of parameter versus true parameter for the different values of φ and contingency tables of varying dimension. the P value calculated from each of the 2 tables is consistently near.. Of the non-iterative procedures Figure 6(b shows that φ LogNI is nearly as stable (although slightly more variable when compared with Newton s method. The three remaining non-iterative procedures also behave well, but provide poorer estimates of φ than Newton s method or φ LogNI. Figure 6(c shows that φ LogNI2 provides estimates that are closer to φ than φ LogNI Figure 6(d shows that the P value of φ LogNI is centred around.7 while Figure 6(c shows that the P value of φ LogNI2 is centred around.9. This is to be expected since φ LogNI is a first-order approximation of the LogNI estimate (7 while φ LogNI2 is its second-order approximation. For the tables, these two non-iterative estimation procedures provide more accurate estimates of φ than φ BDNI. Figure 6(e shows that the P value from the Wald test of the estimate is centred around.5.
11 ISRN Computational Mathematics.8.8 P-value.4 P-value (a Simulation (b Simulation.8.8 P-value.4 P-value (c Simulation (d Simulation.8 P-value (e Simulation Figure 6: The P-values obtained from the Wald Test comparing the true φ value against (a φ N (b φ LogNI,(c φ LogNI2,(d φ LogNI and (e φ BDNI.TheseP-values are based on the estimates obtained from randomly generating 2 contingency tables of dimension 4 5whereφ =.4 and n.
12 2 ISRN Computational Mathematics 5. Discussion Iterative procedures can be computationally very intensive. Certainly for those contingency tables that are of large dimension, or where φ is large (but unknown, the number of iterations needed for convergence to occur can be excessively large. This is not necessarily a major issue for those who are experienced in statistical programming. However, for those researchers that are not, a simple direct estimationprocedurecanprovetobeadvantageous.thispaper has demonstrated the benefit of considering alternative, iteration-free, procedures for estimating the linear-by-linear parameter of an ordinal log-linear, and its related association model. For small contingency tables (in terms of dimension and φ any of the non-iterative procedures considered in this paper will produce estimates that are statistically similar to their true value. For large contingency tables with moderately small values of φ (less than.4, any of the non-iterative procedures will work extremely well without the need for programming and executing iterative procedures. Of the four non-iterative procedures considered in this paper, φ LogNI (7 providesmoreaccurateandreliable results than its counterparts. In fact there were only a few cases where the estimate produced was statistically different (according to the Wald test from the true parameter value. However, an inspection of Table 2 reveals that these differences appear negligible and that such a result can be attributed to the very small standard error of the non-iterative estimate. Certainly Figure 2 shows the accurate performance of φ LogNI. The enhanced accuracy of φ LogNI, when compared with the remaining non-iterative estimates, is not unexpected since it is easily obtained by rearranging (4 and aggregating across i and j. Since φ BDNI, φ LogNI,and φ LogNI2 are calculated using functional approximations of φ LogNI, this latter procedure will always produce more accurate estimates. Such a conclusion is observed by considering the results in Section 4. One can also observe the relative accuracy of the noniterative methods. Since the right-hand side of ( is less than its left-hand side, φ BDNI > φ LogNI φ for all contingency tables. This is indeed the case when comparing the results summarised in Tables 2 and 5. This inequality becomes more severe for contingency tables of relatively large dimension. For similar reasons φ LogNI < φ LogNI2, and this is clear when comparing Table 3 with Table 4.However,suchaconsideration is not a trivial exercise since it allows one to better understand how many terms (from the approximation of the logarithm function will yield an accurate and reliable estimate of φ. Beh and Davy [8], who originally considered the accuracy of the non-iterative estimation procedures for ordinal loglinear models, showed from a practical perspective that φ BDNI will produce accurate estimates of the true parameter. The more extensive study by Beh and Farver [9] confirmed these findings. However, the approximation ( is valid only if <p ij /(p i p j. If only the positive values of this ratio are considered, φ BDNI will provide reasonably good estimates of φ only when p ij /(p i p j foralli and j. Therefore, such a result suggests that the BDNI procedure will produce better estimates of φ for relatively small contingency tables than for larger tables. The computations performed here have focused on generating contingency tables with a sample size of approximately. Further investigations need to be undertaken to study the behaviour of the non-iterative estimation procedures for varying sample sizes. Preliminary investigations reveal that, for contingency tables with a sample size exceeding about 2, the estimate φ LogNI is similar to the estimate obtained using Newton s unidimensional method and the true parameter. Further work on the application of such noniterative procedures needs investigating for other types of models of association for ordinal contingency tables. References [] S. J. Haberman, Log linear models for frequency tables with ordered classifications, Biometrics, vol. 3, no. 4, pp , 974. [2] L. A. Goodman, Simple models of the analysis of association in cross-classifications having ordered categories, the American Statistical Association, vol. 74, pp , 979. [3] L. A. Goodman, The analysis of cross-classified data having ordered and/or unordered categories: association models, correlation models, and asymmetry models for contingency tables with or without missing entries, The Annals of Statistics, vol. 3, pp. 69, 985. [4] A. Agresti, Analysis of Ordinal Categorical Data, Wiley,New York, NY, USA, 984. [5] Z. Gilula and S. J. Haberman, Canonical analysis of contingency tables by maximum likelihood, JournaloftheAmerican Statistical Association, vol. 8, pp , 986. [6] F. Galindo-Garre and J. K. Vermunt, The order-restricted association model: two estimation algorithms and issues in testing, Psychometrika, vol. 69, no. 4, pp , 24. [7] M. L. Aït-Sidi-Allal, A. Baccini, and A. M. Mondot, A new algorithm for estimating the parameters and their asymptotic covariance in correlation and association models, Computational Statistics and Data Analysis, vol. 45, no. 3, pp , 24. [8] E. J. Beh and P. J. Davy, A non-iterative alternative to ordinal log-linear models, Applied Mathematics and Decision Sciences, vol. 8, no. 2, pp , 24. [9]E.J.BehandT.B.Farver, Anevaluationofnon-iterative methods for estimating the linear-by-linear parameter of ordinal log-linear models, The Australian and New Zealand Statistics, vol. 5, no. 3, pp , 29. [] J. A. Nelder and R. W. M. Wedderburn, Generalized linear models, the Royal Statistical Society A, vol. 35, pp , 972. [] A. Agresti, Categorical Data Analysis, Wiley,Hoboken,NJ, USA, 2nd edition, 22. [2] V. N. Nair, Testing in industrial experiments with ordered categorical data, Technometrics, vol. 28, no. 4, pp , 986. [3] S. Nishisato and P. S. Arri, Nonlinear programming approach to optimal scaling of partially ordered categories, Psychometrika, vol. 4, no. 4, pp , 975.
13 Advances in Operations Research Volume 24 Advances in Decision Sciences Volume 24 Applied Mathematics Algebra Volume 24 Probability and Statistics Volume 24 The Scientific World Journal Volume 24 International Differential Equations Volume 24 Volume 24 Submit your manuscripts at International Advances in Combinatorics Mathematical Physics Volume 24 Complex Analysis Volume 24 International Mathematics and Mathematical Sciences Mathematical Problems in Engineering Mathematics Volume 24 Volume 24 Volume 24 Volume 24 Discrete Mathematics Volume 24 Discrete Dynamics in Nature and Society Function Spaces Abstract and Applied Analysis Volume 24 Volume 24 Volume 24 International Stochastic Analysis Optimization Volume 24 Volume 24
Research Article n-digit Benford Converges to Benford
International Mathematics and Mathematical Sciences Volume 2015, Article ID 123816, 4 pages http://dx.doi.org/10.1155/2015/123816 Research Article n-digit Benford Converges to Benford Azar Khosravani and
More informationResearch Article The Structure of Reduced Sudoku Grids and the Sudoku Symmetry Group
International Combinatorics Volume 2012, Article ID 760310, 6 pages doi:10.1155/2012/760310 Research Article The Structure of Reduced Sudoku Grids and the Sudoku Symmetry Group Siân K. Jones, Stephanie
More informationDynamic Programming in Real Life: A Two-Person Dice Game
Mathematical Methods in Operations Research 2005 Special issue in honor of Arie Hordijk Dynamic Programming in Real Life: A Two-Person Dice Game Henk Tijms 1, Jan van der Wal 2 1 Department of Econometrics,
More informationEFFECTS OF PHASE AND AMPLITUDE ERRORS ON QAM SYSTEMS WITH ERROR- CONTROL CODING AND SOFT DECISION DECODING
Clemson University TigerPrints All Theses Theses 8-2009 EFFECTS OF PHASE AND AMPLITUDE ERRORS ON QAM SYSTEMS WITH ERROR- CONTROL CODING AND SOFT DECISION DECODING Jason Ellis Clemson University, jellis@clemson.edu
More information6.1 (CD-ROM TOPIC) USING THE STANDARDIZED NORMAL DISTRIBUTION TABLE
.1: (CD-ROM Topic) Using the Standardized Normal Distribution Table CD-1.1 (CD-ROM TOPIC) USING THE STANDARDIZED NORMAL DISTRIBUTION TABLE Any set of normally distributed data can be converted to its standardized
More informationCharacteristics of Routes in a Road Traffic Assignment
Characteristics of Routes in a Road Traffic Assignment by David Boyce Northwestern University, Evanston, IL Hillel Bar-Gera Ben-Gurion University of the Negev, Israel at the PTV Vision Users Group Meeting
More informationUsing Administrative Records for Imputation in the Decennial Census 1
Using Administrative Records for Imputation in the Decennial Census 1 James Farber, Deborah Wagner, and Dean Resnick U.S. Census Bureau James Farber, U.S. Census Bureau, Washington, DC 20233-9200 Keywords:
More informationSOURCES OF ERROR IN UNBALANCE MEASUREMENTS. V.J. Gosbell, H.M.S.C. Herath, B.S.P. Perera, D.A. Robinson
SOURCES OF ERROR IN UNBALANCE MEASUREMENTS V.J. Gosbell, H.M.S.C. Herath, B.S.P. Perera, D.A. Robinson Integral Energy Power Quality Centre School of Electrical, Computer and Telecommunications Engineering
More informationCitation for published version (APA): Nutma, T. A. (2010). Kac-Moody Symmetries and Gauged Supergravity Groningen: s.n.
University of Groningen Kac-Moody Symmetries and Gauged Supergravity Nutma, Teake IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please
More informationEvaluation-Function Factors
Evaluation-Function Factors T.A. Marsland Computing Science Department University of Alberta Edmonton Canada T6G 2H1 ABSTRACT The heart of a chess program is its evaluation function, since it is this component
More informationOptimum Beamforming. ECE 754 Supplemental Notes Kathleen E. Wage. March 31, Background Beampatterns for optimal processors Array gain
Optimum Beamforming ECE 754 Supplemental Notes Kathleen E. Wage March 31, 29 ECE 754 Supplemental Notes: Optimum Beamforming 1/39 Signal and noise models Models Beamformers For this set of notes, we assume
More informationAdvanced electromagnetism and electromagnetic induction
Advanced electromagnetism and electromagnetic induction This worksheet and all related files are licensed under the Creative Commons Attribution License, version 1.0. To view a copy of this license, visit
More informationSIGNIFICANT advances in hardware technology have led
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 5, SEPTEMBER 2007 2733 Concentric Anchor Beacon Localization Algorithm for Wireless Sensor Networks Vijayanth Vivekanandan and Vincent W. S. Wong,
More informationGREATER CLARK COUNTY SCHOOLS PACING GUIDE. Algebra I MATHEMATICS G R E A T E R C L A R K C O U N T Y S C H O O L S
GREATER CLARK COUNTY SCHOOLS PACING GUIDE Algebra I MATHEMATICS 2014-2015 G R E A T E R C L A R K C O U N T Y S C H O O L S ANNUAL PACING GUIDE Quarter/Learning Check Days (Approx) Q1/LC1 11 Concept/Skill
More informationImpacts of Policies on Poverty
Module 009 Impacts of Policies on Poverty Impacts of Policies on Poverty by Lorenzo Giovanni Bellù, Agricultural Policy Support Service, Policy Assistance Division, FAO, Rome, Italy Paolo Liberati, University
More informationHigh-speed Noise Cancellation with Microphone Array
Noise Cancellation a Posteriori Probability, Maximum Criteria Independent Component Analysis High-speed Noise Cancellation with Microphone Array We propose the use of a microphone array based on independent
More informationDice Games and Stochastic Dynamic Programming
Dice Games and Stochastic Dynamic Programming Henk Tijms Dept. of Econometrics and Operations Research Vrije University, Amsterdam, The Netherlands Revised December 5, 2007 (to appear in the jubilee issue
More informationComparison of Two Alternative Movement Algorithms for Agent Based Distillations
Comparison of Two Alternative Movement Algorithms for Agent Based Distillations Dion Grieger Land Operations Division Defence Science and Technology Organisation ABSTRACT This paper examines two movement
More information(i) Understanding the basic concepts of signal modeling, correlation, maximum likelihood estimation, least squares and iterative numerical methods
Tools and Applications Chapter Intended Learning Outcomes: (i) Understanding the basic concepts of signal modeling, correlation, maximum likelihood estimation, least squares and iterative numerical methods
More informationImproved Draws for Highland Dance
Improved Draws for Highland Dance Tim B. Swartz Abstract In the sport of Highland Dance, Championships are often contested where the order of dance is randomized in each of the four dances. As it is a
More information(i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters
FIR Filter Design Chapter Intended Learning Outcomes: (i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters (ii) Ability to design linear-phase FIR filters according
More informationSTRATEGY AND COMPLEXITY OF THE GAME OF SQUARES
STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES FLORIAN BREUER and JOHN MICHAEL ROBSON Abstract We introduce a game called Squares where the single player is presented with a pattern of black and white
More informationOptimization Techniques for Alphabet-Constrained Signal Design
Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques
More informationNovember 11, Chapter 8: Probability: The Mathematics of Chance
Chapter 8: Probability: The Mathematics of Chance November 11, 2013 Last Time Probability Models and Rules Discrete Probability Models Equally Likely Outcomes Probability Rules Probability Rules Rule 1.
More informationEffects of Basis-mismatch in Compressive Sampling of Continuous Sinusoidal Signals
Effects of Basis-mismatch in Compressive Sampling of Continuous Sinusoidal Signals Daniel H. Chae, Parastoo Sadeghi, and Rodney A. Kennedy Research School of Information Sciences and Engineering The Australian
More informationResearch Article Knight s Tours on Rectangular Chessboards Using External Squares
Discrete Mathematics, Article ID 210892, 9 pages http://dx.doi.org/10.1155/2014/210892 Research Article Knight s Tours on Rectangular Chessboards Using External Squares Grady Bullington, 1 Linda Eroh,
More informationMultihop Routing in Ad Hoc Networks
Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline
More informationTrip Assignment. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1. 2 Link cost function 2
Trip Assignment Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents 1 Overview 1 2 Link cost function 2 3 All-or-nothing assignment 3 4 User equilibrium assignment (UE) 3 5
More informationMIMO Receiver Design in Impulsive Noise
COPYRIGHT c 007. ALL RIGHTS RESERVED. 1 MIMO Receiver Design in Impulsive Noise Aditya Chopra and Kapil Gulati Final Project Report Advanced Space Time Communications Prof. Robert Heath December 7 th,
More information(i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters
FIR Filter Design Chapter Intended Learning Outcomes: (i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters (ii) Ability to design linear-phase FIR filters according
More informationResearch Article Analysis of Population Diversity of Dynamic Probabilistic Particle Swarm Optimization Algorithms
Mathematical Problems in Engineering Volume 4, Article ID 765, 9 pages http://dx.doi.org/.55/4/765 Research Article Analysis of Population Diversity of Dynamic Probabilistic Particle Swarm Optimization
More informationMIMO Channel Capacity in Co-Channel Interference
MIMO Channel Capacity in Co-Channel Interference Yi Song and Steven D. Blostein Department of Electrical and Computer Engineering Queen s University Kingston, Ontario, Canada, K7L 3N6 E-mail: {songy, sdb}@ee.queensu.ca
More informationNon-overlapping permutation patterns
PU. M. A. Vol. 22 (2011), No.2, pp. 99 105 Non-overlapping permutation patterns Miklós Bóna Department of Mathematics University of Florida 358 Little Hall, PO Box 118105 Gainesville, FL 326118105 (USA)
More informationCracking the Sudoku: A Deterministic Approach
Cracking the Sudoku: A Deterministic Approach David Martin Erica Cross Matt Alexander Youngstown State University Youngstown, OH Advisor: George T. Yates Summary Cracking the Sodoku 381 We formulate a
More informationNON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday
NON-OVERLAPPING PERMUTATION PATTERNS MIKLÓS BÓNA Abstract. We show a way to compute, to a high level of precision, the probability that a randomly selected permutation of length n is nonoverlapping. As
More informationChapter 3 Learning in Two-Player Matrix Games
Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play
More informationCALCULATING SQUARE ROOTS BY HAND By James D. Nickel
By James D. Nickel Before the invention of electronic calculators, students followed two algorithms to approximate the square root of any given number. First, we are going to investigate the ancient Babylonian
More informationTransmit Power Allocation for BER Performance Improvement in Multicarrier Systems
Transmit Power Allocation for Performance Improvement in Systems Chang Soon Par O and wang Bo (Ed) Lee School of Electrical Engineering and Computer Science, Seoul National University parcs@mobile.snu.ac.r,
More informationSAMPLE. This chapter deals with the construction and interpretation of box plots. At the end of this chapter you should be able to:
find the upper and lower extremes, the median, and the upper and lower quartiles for sets of numerical data calculate the range and interquartile range compare the relative merits of range and interquartile
More informationGuess the Mean. Joshua Hill. January 2, 2010
Guess the Mean Joshua Hill January, 010 Challenge: Provide a rational number in the interval [1, 100]. The winner will be the person whose guess is closest to /3rds of the mean of all the guesses. Answer:
More informationAppendix III Graphs in the Introductory Physics Laboratory
Appendix III Graphs in the Introductory Physics Laboratory 1. Introduction One of the purposes of the introductory physics laboratory is to train the student in the presentation and analysis of experimental
More informationImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain 2 Image enhancement is a process, rather a preprocessing step, through which an original image is made suitable for a specific application. The application scenarios
More informationFOUR TOTAL TRANSFER CAPABILITY. 4.1 Total transfer capability CHAPTER
CHAPTER FOUR TOTAL TRANSFER CAPABILITY R structuring of power system aims at involving the private power producers in the system to supply power. The restructured electric power industry is characterized
More informationLab S-3: Beamforming with Phasors. N r k. is the time shift applied to r k
DSP First, 2e Signal Processing First Lab S-3: Beamforming with Phasors Pre-Lab: Read the Pre-Lab and do all the exercises in the Pre-Lab section prior to attending lab. Verification: The Exercise section
More informationSome of the proposed GALILEO and modernized GPS frequencies.
On the selection of frequencies for long baseline GALILEO ambiguity resolution P.J.G. Teunissen, P. Joosten, C.D. de Jong Department of Mathematical Geodesy and Positioning, Delft University of Technology,
More informationImage Filtering. Median Filtering
Image Filtering Image filtering is used to: Remove noise Sharpen contrast Highlight contours Detect edges Other uses? Image filters can be classified as linear or nonlinear. Linear filters are also know
More informationBBO-Benchmarking of the GLOBAL method for the Noisy Function Testbed
BBO-Benchmarking of the GLOBAL method for the Noisy Function Testbed László Pál Tibor Csendes Sapientia - Hungarian University of Szeged University of Transylvania 7 Szeged, P.O. Box, Miercurea-Ciuc, Piata
More information28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies
8th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies A LOWER BOUND ON THE STANDARD ERROR OF AN AMPLITUDE-BASED REGIONAL DISCRIMINANT D. N. Anderson 1, W. R. Walter, D. K.
More information37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game
37 Game Theory Game theory is one of the most interesting topics of discrete mathematics. The principal theorem of game theory is sublime and wonderful. We will merely assume this theorem and use it to
More informationModule 7. Accounting for quantization/digitalization e ects and "o -scale" values in measurement
Module 7 Accounting for quantization/digitalization e ects and "o -scale" values in measurement Prof. Stephen B. Vardeman Statistics and IMSE Iowa State University March 4, 2008 Steve Vardeman (ISU) Module
More information2010 Census Coverage Measurement - Initial Results of Net Error Empirical Research using Logistic Regression
2010 Census Coverage Measurement - Initial Results of Net Error Empirical Research using Logistic Regression Richard Griffin, Thomas Mule, Douglas Olson 1 U.S. Census Bureau 1. Introduction This paper
More informationSite-specific seismic hazard analysis
Site-specific seismic hazard analysis ABSTRACT : R.K. McGuire 1 and G.R. Toro 2 1 President, Risk Engineering, Inc, Boulder, Colorado, USA 2 Vice-President, Risk Engineering, Inc, Acton, Massachusetts,
More informationA Signal Space Theory of Interferences Cancellation Systems
A Signal Space Theory of Interferences Cancellation Systems Osamu Ichiyoshi Human Network for Better 21 Century E-mail: osamu-ichiyoshi@muf.biglobe.ne.jp Abstract Interferences among signals from different
More informationGouvernement du Québec Ministère de l Éducation, ISBN
Gouvernement du Québec Ministère de l Éducation, 2004 04-00908 ISBN 2-550-43699-7 Legal deposit Bibliothèque nationale du Québec, 2004 1. INTRODUCTION This Definition of the Domain for Summative Evaluation
More informationEcon 172A - Slides from Lecture 18
1 Econ 172A - Slides from Lecture 18 Joel Sobel December 4, 2012 2 Announcements 8-10 this evening (December 4) in York Hall 2262 I ll run a review session here (Solis 107) from 12:30-2 on Saturday. Quiz
More informationThe effects of uncertainty in forest inventory plot locations. Ronald E. McRoberts, Geoffrey R. Holden, and Greg C. Liknes
The effects of uncertainty in forest inventory plot locations Ronald E. McRoberts, Geoffrey R. Holden, and Greg C. Liknes North Central Research Station, USDA Forest Service, Saint Paul, Minnesota 55108
More informationarxiv: v1 [math.co] 24 Nov 2018
The Problem of Pawns arxiv:1811.09606v1 [math.co] 24 Nov 2018 Tricia Muldoon Brown Georgia Southern University Abstract Using a bijective proof, we show the number of ways to arrange a maximum number of
More informationHARMONIC INSTABILITY OF DIGITAL SOFT CLIPPING ALGORITHMS
HARMONIC INSTABILITY OF DIGITAL SOFT CLIPPING ALGORITHMS Sean Enderby and Zlatko Baracskai Department of Digital Media Technology Birmingham City University Birmingham, UK ABSTRACT In this paper several
More informationTheory of Probability - Brett Bernstein
Theory of Probability - Brett Bernstein Lecture 3 Finishing Basic Probability Review Exercises 1. Model flipping two fair coins using a sample space and a probability measure. Compute the probability of
More informationTwo-person symmetric whist
Two-person symmetric whist Johan Wästlund Linköping studies in Mathematics, No. 4, February 21, 2005 Series editor: Bengt Ove Turesson The publishers will keep this document on-line on the Internet (or
More informationTopspin: Oval-Track Puzzle, Taking Apart The Topspin One Tile At A Time
Salem State University Digital Commons at Salem State University Honors Theses Student Scholarship Fall 2015-01-01 Topspin: Oval-Track Puzzle, Taking Apart The Topspin One Tile At A Time Elizabeth Fitzgerald
More informationSECTION 6: ROOT LOCUS DESIGN
SECTION 6: ROOT LOCUS DESIGN MAE 4421 Control of Aerospace & Mechanical Systems 2 Introduction Introduction 3 Consider the following unity feedback system 3 433 Assume A proportional controller Design
More informationSequencing and Scheduling for Multi-User Machine-Type Communication
1 Sequencing and Scheduling for Multi-User Machine-Type Communication Sheeraz A. Alvi, Member, IEEE, Xiangyun Zhou, Senior Member, IEEE, Salman Durrani, Senior Member, IEEE, and Duy T. Ngo, Member, IEEE
More informationPermutation Tableaux and the Dashed Permutation Pattern 32 1
Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen, Lewis H. Liu, Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin 7, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn
More informationDistribution of Aces Among Dealt Hands
Distribution of Aces Among Dealt Hands Brian Alspach 3 March 05 Abstract We provide details of the computations for the distribution of aces among nine and ten hold em hands. There are 4 aces and non-aces
More informationSystem Identification and CDMA Communication
System Identification and CDMA Communication A (partial) sample report by Nathan A. Goodman Abstract This (sample) report describes theory and simulations associated with a class project on system identification
More informationJoint Distributions, Independence Class 7, Jeremy Orloff and Jonathan Bloom
Learning Goals Joint Distributions, Independence Class 7, 8.5 Jeremy Orloff and Jonathan Bloom. Understand what is meant by a joint pmf, pdf and cdf of two random variables. 2. Be able to compute probabilities
More informationMathematics of Magic Squares and Sudoku
Mathematics of Magic Squares and Sudoku Introduction This article explains How to create large magic squares (large number of rows and columns and large dimensions) How to convert a four dimensional magic
More informationDyck paths, standard Young tableaux, and pattern avoiding permutations
PU. M. A. Vol. 21 (2010), No.2, pp. 265 284 Dyck paths, standard Young tableaux, and pattern avoiding permutations Hilmar Haukur Gudmundsson The Mathematics Institute Reykjavik University Iceland e-mail:
More informationarxiv: v1 [math.co] 8 Oct 2012
Flashcard games Joel Brewster Lewis and Nan Li November 9, 2018 arxiv:1210.2419v1 [math.co] 8 Oct 2012 Abstract We study a certain family of discrete dynamical processes introduced by Novikoff, Kleinberg
More informationAvoiding consecutive patterns in permutations
Avoiding consecutive patterns in permutations R. E. L. Aldred M. D. Atkinson D. J. McCaughan January 3, 2009 Abstract The number of permutations that do not contain, as a factor (subword), a given set
More informationTable of Contents...2. About the Tutorial...6. Audience...6. Prerequisites...6. Copyright & Disclaimer EMI INTRODUCTION Voltmeter...
1 Table of Contents Table of Contents...2 About the Tutorial...6 Audience...6 Prerequisites...6 Copyright & Disclaimer...6 1. EMI INTRODUCTION... 7 Voltmeter...7 Ammeter...8 Ohmmeter...8 Multimeter...9
More informationQuasi-Orthogonal Space-Time Block Coding Using Polynomial Phase Modulation
Florida International University FIU Digital Commons Electrical and Computer Engineering Faculty Publications College of Engineering and Computing 4-28-2011 Quasi-Orthogonal Space-Time Block Coding Using
More informationMETHOD FOR MAPPING POSSIBLE OUTCOMES OF A RANDOM EVENT TO CONCURRENT DISSIMILAR WAGERING GAMES OF CHANCE CROSS REFERENCE TO RELATED APPLICATIONS
METHOD FOR MAPPING POSSIBLE OUTCOMES OF A RANDOM EVENT TO CONCURRENT DISSIMILAR WAGERING GAMES OF CHANCE CROSS REFERENCE TO RELATED APPLICATIONS [0001] This application claims priority to Provisional Patent
More informationEmpirical Path Loss Models
Empirical Path Loss Models 1 Free space and direct plus reflected path loss 2 Hata model 3 Lee model 4 Other models 5 Examples Levis, Johnson, Teixeira (ESL/OSU) Radiowave Propagation August 17, 2018 1
More informationCommunication over MIMO X Channel: Signalling and Performance Analysis
Communication over MIMO X Channel: Signalling and Performance Analysis Mohammad Ali Maddah-Ali, Abolfazl S. Motahari, and Amir K. Khandani Coding & Signal Transmission Laboratory Department of Electrical
More informationImproving the Generalized Likelihood Ratio Test for Unknown Linear Gaussian Channels
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 4, APRIL 2003 919 Improving the Generalized Likelihood Ratio Test for Unknown Linear Gaussian Channels Elona Erez, Student Member, IEEE, and Meir Feder,
More informationCryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017
Name: Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017 INSTRUCTIONS Read Carefully Time: 50 minutes There are 5 problems. Write your name legibly at the top of this page. No calculators
More information124 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 45, NO. 1, JANUARY 1997
124 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 45, NO. 1, JANUARY 1997 Blind Adaptive Interference Suppression for the Near-Far Resistant Acquisition and Demodulation of Direct-Sequence CDMA Signals
More informationAntennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO
Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and
More informationA Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity
1970 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 12, DECEMBER 2003 A Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity Jie Luo, Member, IEEE, Krishna R. Pattipati,
More informationModule 7-4 N-Area Reliability Program (NARP)
Module 7-4 N-Area Reliability Program (NARP) Chanan Singh Associated Power Analysts College Station, Texas N-Area Reliability Program A Monte Carlo Simulation Program, originally developed for studying
More informationChapter Two "Bipolar Transistor Circuits"
Chapter Two "Bipolar Transistor Circuits" 1.TRANSISTOR CONSTRUCTION:- The transistor is a three-layer semiconductor device consisting of either two n- and one p-type layers of material or two p- and one
More informationADAPTIVE channel equalization without a training
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 9, SEPTEMBER 2005 1427 Analysis of the Multimodulus Blind Equalization Algorithm in QAM Communication Systems Jenq-Tay Yuan, Senior Member, IEEE, Kun-Da
More informationThe meaning of planning margins in a post-rrc-06 situation
- 1 - Document INFO/5-E The meaning of planning margins in a post-rrc-06 situation 1. Introduction As a result of decisions taken during the RRC-04 the concept of margins was introduced in order to simplify
More informationOn the GNSS integer ambiguity success rate
On the GNSS integer ambiguity success rate P.J.G. Teunissen Mathematical Geodesy and Positioning Faculty of Civil Engineering and Geosciences Introduction Global Navigation Satellite System (GNSS) ambiguity
More informationAn Optimization Approach for Real Time Evacuation Reroute. Planning
An Optimization Approach for Real Time Evacuation Reroute Planning Gino J. Lim and M. Reza Baharnemati and Seon Jin Kim November 16, 2015 Abstract This paper addresses evacuation route management in the
More informationExpansion/Analysis of a Card Trick Comprised of Transformations in 2-Dimensional Matrices Aaron Kazam Sherbany, Clarkstown North High School, NY
Expansion/Analysis of a Card Trick Comprised of Transformations in 2-Dimensional Matrices Aaron Kazam Sherbany, Clarkstown North High School, NY This paper illustrates the properties of a card trick which
More informationThroughput Performance of an Adaptive ARQ Scheme in Rayleigh Fading Channels
Southern Illinois University Carbondale OpenSIUC Articles Department of Electrical and Computer Engineering -26 Throughput Performance of an Adaptive ARQ Scheme in Rayleigh Fading Channels A. Mehta Southern
More informationAPPENDIX 2.3: RULES OF PROBABILITY
The frequentist notion of probability is quite simple and intuitive. Here, we ll describe some rules that govern how probabilities are combined. Not all of these rules will be relevant to the rest of this
More informationPermutations with short monotone subsequences
Permutations with short monotone subsequences Dan Romik Abstract We consider permutations of 1, 2,..., n 2 whose longest monotone subsequence is of length n and are therefore extremal for the Erdős-Szekeres
More informationA Factorial Representation of Permutations and Its Application to Flow-Shop Scheduling
Systems and Computers in Japan, Vol. 38, No. 1, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J85-D-I, No. 5, May 2002, pp. 411 423 A Factorial Representation of Permutations and Its
More informationA COMPARISON OF SITE-AMPLIFICATION ESTIMATED FROM DIFFERENT METHODS USING A STRONG MOTION OBSERVATION ARRAY IN TANGSHAN, CHINA
A COMPARISON OF SITE-AMPLIFICATION ESTIMATED FROM DIFFERENT METHODS USING A STRONG MOTION OBSERVATION ARRAY IN TANGSHAN, CHINA Wenbo ZHANG 1 And Koji MATSUNAMI 2 SUMMARY A seismic observation array for
More informationECC419 IMAGE PROCESSING
ECC419 IMAGE PROCESSING INTRODUCTION Image Processing Image processing is a subclass of signal processing concerned specifically with pictures. Digital Image Processing, process digital images by means
More informationDefense Technical Information Center Compilation Part Notice
UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADPO 11345 TITLE: Measurement of the Spatial Frequency Response [SFR] of Digital Still-Picture Cameras Using a Modified Slanted
More informationTrial version. Resistor Production. How can the outcomes be analysed to optimise the process? Student. Contents. Resistor Production page: 1 of 15
Resistor Production How can the outcomes be analysed to optimise the process? Resistor Production page: 1 of 15 Contents Initial Problem Statement 2 Narrative 3-11 Notes 12 Appendices 13-15 Resistor Production
More informationAutomatic Enumeration and Random Generation for pattern-avoiding Permutation Classes
Automatic Enumeration and Random Generation for pattern-avoiding Permutation Classes Adeline Pierrot Institute of Discrete Mathematics and Geometry, TU Wien (Vienna) Permutation Patterns 2014 Joint work
More informationEXPLAINING THE SHAPE OF RSK
EXPLAINING THE SHAPE OF RSK SIMON RUBINSTEIN-SALZEDO 1. Introduction There is an algorithm, due to Robinson, Schensted, and Knuth (henceforth RSK), that gives a bijection between permutations σ S n and
More informationSome Fine Combinatorics
Some Fine Combinatorics David P. Little Department of Mathematics Penn State University University Park, PA 16802 Email: dlittle@math.psu.edu August 3, 2009 Dedicated to George Andrews on the occasion
More informationOn the Combination of Constraint Programming and Stochastic Search: The Sudoku Case
On the Combination of Constraint Programming and Stochastic Search: The Sudoku Case Rhydian Lewis Cardiff Business School Pryfysgol Caerdydd/ Cardiff University lewisr@cf.ac.uk Talk Plan Introduction:
More information