Two Factor Full Factorial Design with Replications

Similar documents
Random Bit Generation and Stream Ciphers

Introduction to Wireless Coding and Modulation

Introduction to Wireless Coding and Modulation

Wireless Physical Layer Concepts: Part II

8.6 Jonckheere-Terpstra Test for Ordered Alternatives. 6.5 Jonckheere-Terpstra Test for Ordered Alternatives

Introduction to Wireless Signal Propagation

Digital Data Communication Techniques

Pseudorandom Number Generation and Stream Ciphers

Wireless Physical Layer Concepts: Part III

Lectures 15/16 ANOVA. ANOVA Tests. Analysis of Variance. >ANOVA stands for ANalysis Of VAriance >ANOVA allows us to:

Comparing Means. Chapter 24. Case Study Gas Mileage for Classes of Vehicles. Case Study Gas Mileage for Classes of Vehicles Data collection

Wireless Networking: Trends and Issues

Measurement Systems Analysis

Introduction to 60 GHz Millimeter Wave Multi-Gigabit Wireless Networks

Chapter 25. One-Way Analysis of Variance: Comparing Several Means. BPS - 5th Ed. Chapter 24 1

CSE 190: 3D User Interaction. Lecture #17: 3D UI Evaluation Jürgen P. Schulze, Ph.D.

IEOR 130 Methods of Manufacturing Improvement Fall, 2018, Prof. Leachman Homework Assignment 8, Due Tuesday Nov. 13

Introduction to Cellular Networks: 1G/2G/3G

Assessing Measurement System Variation

Time Iteration Protocol for TOD Clock Synchronization. Eric E. Johnson. January 23, 1992

Overview. Introduction to 60 GHz Millimeter Wave Multi-Gigabit Wireless Networks. 60GHz Frequency Allocations. 60 GHz Power Limits

Lecture 26 ANNOUNCEMENTS OUTLINE. Self-biased current sources BJT MOSFET Guest lecturer Prof. Niknejad

IE 361 Module 4. Metrology Applications of Some Intermediate Statistical Methods for Separating Components of Variation

Starting Experimental Design

Jednoczynnikowa analiza wariancji (ANOVA)

Repeated Measures Twoway Analysis of Variance

Classwork Example 1: Exploring Subtraction with the Integer Game

IE 361 Module 23. Prof. Steve Vardeman and Prof. Max Morris. Iowa State University

Prices of digital cameras

IEOR 130 Methods of Manufacturing Improvement Fall, 2017, Prof. Leachman Solutions to Homework Assignment 8

Week 15. Mechanical Waves

Antenna Characterization for Bluetooth-based Travel Time Data Collection

University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences. Homework #9 Solution

Physics 2310 Lab #5: Thin Lenses and Concave Mirrors Dr. Michael Pierce (Univ. of Wyoming)

Scheduling in WiMAX Networks

1. LTE: Key Features. 2. OFDMA and SC-FDMA 3. Evolved Packet Core (EPC) 4. LTE Frame Structure 5. Resource Allocation.

Alberta Reliability Standard Frequency Response and Frequency Bias Setting BAL-003-AB-1.1

Better Ways to Illuminate: Effects of Box Type

CSE 166: Image Processing. Overview. What is an image? Representing an image. What is image processing? History. Today

Supplementary Figures

2. Carrier Aggregation 3. Coordinated Multipoint Operation 4. Small Cells 5. Inter-Cell Interference Coordination Raj Jain

OFDM Channel Modeling for WiMAX

Standard BAL Frequency Response and Frequency Bias Setting

Week 4: Experiment 24. Using Nodal or Mesh Analysis to Solve AC Circuits with an addition of Equivalent Impedance

High Precision Positioning Unit 1: Accuracy, Precision, and Error Student Exercise

Poverty in the United Way Service Area

ITEC 2600 Introduction to Analytical Programming. Instructor: Prof. Z. Yang Office: DB3049

Introduction to Source Coding

I STATISTICAL TOOLS IN SIX SIGMA DMAIC PROCESS WITH MINITAB APPLICATIONS

Optimum Beamforming. ECE 754 Supplemental Notes Kathleen E. Wage. March 31, Background Beampatterns for optimal processors Array gain

Evaluation of CPU Frequency Transition Latency

GRAPHS & CHARTS. Prof. Rahul C. Basole CS/MGT 8803-DV > January 23, 2017 INFOVIS 8803DV > SPRING 17

CSCI3390-Lecture 8: Undecidability of a special case of the tiling problem

December 12, FGCU Invitational Mathematics Competition Statistics Team

Estimate (95% C.I.) Ev/Trt. Studies

Outline of the Lecture

USE OF BASIC ELECTRONIC MEASURING INSTRUMENTS Part II, & ANALYSIS OF MEASUREMENT ERROR 1

Example #2: Factorial Independent Groups Design. A data set was created using summary data presented by Wicherts, Dolan and

Section 3 Correlation and Regression - Worksheet

Overview GAME THEORY. Basic notions

Excel Manual X Axis Label Below Chart 2010 >>>CLICK HERE<<<

Analyzing Data Properties using Statistical Sampling Techniques

I STATISTICAL TOOLS IN SIX SIGMA DMAIC PROCESS WITH MINITAB APPLICATIONS

Histogram equalization

Performance Evaluation of Wedm Machining on Incoloy800 by TAGUCHI Method

Standard Development Timeline

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

Lecture 4: Spatial Domain Processing and Image Enhancement

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory

Target Echo Information Extraction

Introduction to 4G LTE-Advanced

Exercise 4 Exploring Population Change without Selection

Electronic Plans Management Training. Submitting a Revision to Approved Plans (RTAP) Application & Uploading Drawings

An Enhanced Floor Estimation Algorithm for Indoor Wireless Localization Systems Using Confidence Interval Approach

Evaluation of CPU Frequency Transition Latency

2010 Census Coverage Measurement - Initial Results of Net Error Empirical Research using Logistic Regression

This page intentionally left blank

Introduction to (Networked) Game Theory. Networked Life NETS 112 Fall 2014 Prof. Michael Kearns

Department of Mechanical and Aerospace Engineering. MAE334 - Introduction to Instrumentation and Computers. Final Examination.

Try what you learned (and some new things too)

!"#$%&'("&)*("*+,)-(#'.*/$'-0%$1$"&-!!!"#$%&'(!"!!"#$%"&&'()*+*!

Lecture 3 - Regression

Binary Addition. Boolean Algebra & Logic Gates. Recap from Monday. CSC 103 September 12, Binary numbers ( 1.1.1) How Computers Work

CS 445 HW#2 Solutions

Jordan Tabov, Kliment Vasilev, Asen Velchev. A mathematical model of monetary circulation in mediaeval Bulgaria

Lecture 1. Introduction

Stat 20: Intro to Probability and Statistics

Mixed Strategies; Maxmin

N. J. Gotelli & A. M. Ellison A Primer of Ecological Statistics. Sinauer Associates, Sunderland, Massachusetts

Geostatistical estimation applied to highly skewed data. Dr. Isobel Clark, Geostokos Limited, Alloa, Scotland

Session 5 Variation About the Mean

Power Supply Networks: Analysis and Synthesis. What is Power Supply Noise?

Instructions [CT+PT Treatment]

CCMR Educational Programs

Computing Nash Equilibrium; Maxmin

Transmission Availability Data System 2008 Automatic Outage Metrics and Data Report Region: RFC

proc plot; plot Mean_Illness*Dose=Dose; run;

CSC C85 Embedded Systems Project # 1 Robot Localization

SPIRE MATHS Stimulating, Practical, Interesting, Relevant, Enjoyable Maths For All

This document is a preview generated by EVS

Transcription:

Two Factor Full Factorial Design with Replications Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: 22-1

Overview Model Computation of Effects Estimating Experimental Errors Allocation of Variation ANOVA Table and F-Test Confidence Intervals For Effects 22-2

Model Replications allow separating out the interactions from experimental errors. Model: With r replications Here, 22-3

Model (Cont) The effects are computed so that their sum is zero: The interactions are computed so that their row as well as column sums are zero: The errors in each experiment add up to zero: 22-4

Computation of Effects Averaging the observations in each cell: Similarly, Use cell means to compute row and column effects. 22-5

Example 22.1: Code Size 22-6

Example 22.1: Log Transformation 22-7

Example 22.1: Computation of Effects An average workload on an average processor requires a code size of 10 3.94 (8710 instructions). Processor W requires 10 0.23 (=1.69) less code than avg processor. Processor X requires 10 0.02 (=1.05) less than an average processor and so on. The ratio of code sizes of an average workload on processor W and X is 10 0.21 (= 1.62). 22-8

Example 22.1: Interactions Check: The row as well column sums of interactions are zero. Interpretation: Workload I on processor W requires 0.02 less log code size than an average workload on processor W or equivalently 0.02 less log code size than I on an average processor. 22-9

Estimated Response: Computation of Errors Error in the kth replication: Example 22.2: Cell mean for (1,1) = 3.8427 Errors in the observations in this cell are: 3.8455-3.8427 = 0.0028 3.8191-3.8427 = -0.0236, and 3.8634-3.8427 = 0.0208 Check: Sum of the three errors is zero. 22-10

Allocation of Variation Interactions explain less than 5% of variation may be ignored. 22-11

Degrees of freedoms: Analysis of Variance 22-12

ANOVA for Two Factors w Replications 22-13

Example 22.4: Code Size Study All three effects are statistically significant at a significance level of 0.10. 22-14

Confidence Intervals For Effects Use t values at ab(r-1) degrees of freedom for confidence intervals 22-15

Example 22.5: Code Size Study From ANOVA table: s e =0.03. The standard deviation of processor effects: The error degrees of freedom: ab(r-1) = 40 use Normal tables For 90% confidence, z 0.95 = 1.645 90% confidence interval for the effect of processor W is: 1 t s 1 = -0.2304 1.645 0.0060 = -0.2304 0.00987 = (-0.2406, -0.2203) The effect is significant. 22-16

Example 22.5: Conf. Intervals (Cont) The intervals are very narrow. 22-17

Example 22.5: CI for Interactions 22-18

Example 22.5: Visual Tests No visible trend. Approximately linear normality is valid. 22-19

Summary Replications allow interactions to be estimated SSE has ab(r-1) degrees of freedom Need to conduct F-tests for MSA/MSE, MSB/MSE, MSAB/MSE 22-20

Exercise 22.1 Measured CPU times for three processors A1, A2, and A3, on five workloads B1, B2, through B5 are shown in the table. Three replications of each experiment are shown. Analyze the data and answer the following: Are the processors different from each other at 90% level of confidence? What percent of variation is explained by the processor-workload interaction? Which effects in the model are not significant at 90% confidence. 22-21

Homework 22 Submit answer to Exercise 22.1. Show all numerical values. 22-22

Scan This to Download These Slides Raj Jain http://rajjain.com 22-23

Related Modules CSE567M: Computer Systems Analysis (Spring 2013), https://www.youtube.com/playlist?list=pljgg94etkypjekjnaa1n_1x0bwwnyzcof CSE473S: Introduction to Computer Networks (Fall 2011), https://www.youtube.com/playlist?list=pljgg94etkypjwospmh8azcgy5e_10tidw Wireless and Mobile Networking (Spring 2016), https://www.youtube.com/playlist?list=pljgg94etkypkeb0nzyn9tss_hcd5c4wxf CSE571S: Network Security (Fall 2011), https://www.youtube.com/playlist?list=pljgg94etkypkvzfvtuthcpfjxumyyg93u Video Podcasts of Prof. Raj Jain's Lectures, https://www.youtube.com/channel/ucn4-5wznp9-ruozqms-8nuw 22-24