Improving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers

Size: px
Start display at page:

Download "Improving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers"

Transcription

1 International Journal of Statistics an Probability; Vol 6, No 5; September 207 ISSN E-ISSN Publishe by Canaian Center of Science an Eucation Improving Estimation Accuracy in Nonranomize Response Questioning Methos by Multiple Answers Heiko Groenitz Working group Statistics, School of Business an Economics, Philipps-University Marburg, Germany Corresponence: Heiko Groenitz, Working group Statistics, School of Business an Economics, Philipps-University Marburg, Germany Receive: June 24, 207 Accepte: August 8, 207 Online Publishe: August, 207 oi:05539/ijspv6n5p0 Abstract URL: When private or stigmatizing characteristics are inclue in sample surveys, irect questions result in low cooperation of the responents To increase cooperation, inirect questioning proceures have been establishe in the literature Nonranomize response methos are one group of such proceures an have attracte much attention in recent years In this article, we consier four popular nonranomize response schemes an present a possibility to improve the estimation precision of these schemes The basic iea is to require multiple inirect answers from each responent We evelop a Fisher scoring algorithm for the maximum likelihoo estimation in the presente new schemes an show the better efficiency of the new schemes compare with the original esigns Keywors: Fisher scoring, inirect questioning, Löwner orer, privacy of responents, sample survey, sensitive characteristic Introuction Surveys are important tools in many isciplines of science, for instance, social science an economics Sometimes, variables which are viewe as private or stigmatizing are involve in the survey Examples for such sensitive variables are financial situation, political views, cheating in examinations, uneclare work, insurance frau, an iscrimination Direct questions on such characteristics will often yiel low cooperation of the responents, ie, answer refusal an untruthful answers will often occur Therefor, skilful questioning proceures that protect the interviewees privacy an eliver ata enabling statistical inference were evelope in the literature One group of proceures is the class of ranomize response (RR) methos In RR techniques, the responent conucts a ranom experiment an gives a certain inirect answer epening on the result of the ranom experiment For example, consier the following process with the sensitive attribute uneclare work an throwing a ie as ranom experiment: If the ie shows or 2, the interviewee answers the question Have you conucte work in the last year without eclaring this to the relevant public authorities? If the ie shows 3-6, the opposite question Di you eclare all your work in the last year to the relevant public authorities? must be respone The interviewer oes not observe the ranom experiment an hears only yes or no, but oes not know the question that is answere This protects the privacy Base on the inirect answers of many responents, the istribution of the sensitive variable can be estimate The escribe proceure correspons to the RR technique by Warner (965) Various other RR methos are available toay See, for example, Fox an Tracy (986), Chauhuri (20), Chauhuri an Christofies (203), or Chauhuri, Christofies an Rao (206) for overviews The ranom experiment in RR methos is a bit cumbersome an causes oubts on the suitability of RR methos for online surveys This motivate iverse authors to introuce nonranomize response (NRR) methos, for example, Yu, Tian, an (2008), Tan, Tian, an (2009),, Tian,, an Liu (2009) or Groenitz (204) In NRR schemes, an inirect answer that epens on the responent s outcome of an auxiliary characteristic must be given The auxiliary characteristic is efine on the same population which the sensitive characteristic is efine on Typically, the auxiliary characteristic is inepenent of the sensitive attribute an possesses a known istribution To give an example, we mention the characteristic escribing whether the responent s birthay is in January - April or not In NRR proceures, the responent woul give the same answer if he or she is aske again To improve the estimation efficiency of RR methos, some authors stuy repeate RR methos (Eriksson, 973; Alavi & Tajoini, 206; Groenitz, 206) Here, the interviewee must repeat the ranom experiment multiple times Say, we have two repetitions Depening on the sensitive characteristic an the result of the first repetition of the experiment, the first inirect answer must be given Depening on the sensitive characteristic an the result of the secon repetition, the secon inirect answer must be provie That is, two inirect answers are necessary In this article, we present some repeate NRR techniques We erive inference for these proceures an show that our 0

2 International Journal of Statistics an Probability Vol 6, No 5; 207 repeate NRR methos improve the estimation efficiency of the original NRR techniques The basic iea for repeate NRR techniques is to involve multiple ifferent auxiliary characteristics in the proceure For example, one can consier the characteristic escribing whether the responent s birthay is in January to April an the characteristic escribing whether the responent s telephone number ens on 0-6 In Section 2, we explain the NRR methos consiere in this paper In Section 3, we escribe the corresponing repeate NRR esigns The maximum likelihoo (ML) estimation an the estimation variance for the multiple-trial NRR schemes are aresse in Section 4 The accuracy gains of repeate NRR techniques in comparison with single-trial NRR techniques are emonstrate in Section 5 2 NRR Methos In this section, four NRR methos are escribe: The crosswise metho an the triangular metho (both Yu et al, 2008), the multi-category esign by et al (2009), an the iagonal technique by Groenitz (204) Let the sensitive characteristic be enote by X We give some concrete examples for X: (i) X {, 2} with X = if the person has pai the taxes for the last year correctly an X = 2 if he or she has evae taxes last year (ii) X {, 2} with X = if the person s annual income excees a certain value an X = 2 else (iii) X {, 2, 3} where X = hols if the person never has conucte insurance frau, X = 2 hols if the person has conucte insurance frau once or twice, an X = 3 hols if the person has conucte insurance frau three or more times (iv) X {, 2, 3, 4} where each value of X represents a certain income class For the crosswise an triangular metho, X {, 2}, ie, X with two categories, is require For the methos by et al (2009) an Groenitz (204), X can have an arbitrary number of categories coe by, 2,, k The triangular metho an the et al (2009) metho eman that the category X = is nonsensitive The crosswise metho can be applie for the examples (i) an (ii) The triangular metho can hanle example (i) The technique of et al (2009) is suitable for (iii) an the iagonal technique can be applie for (iii) an (iv) For each of the consiere NRR esigns, a nonsensitive auxiliary variable W is necessary The responents iniviual values of W must not be known to the interviewer or the survey agency W an X must be inepenent an W must possess a known istribution For the crosswise an triangular metho, W must have the categories W = an W = 2 For the et al (2009) metho an the iagonal technique, W must have the k categories W =,, W = k Examples for W with two categories were alreay given in the Introuction A W with k = 4 is as follows: Let W be base on the number forme by the last three igits of the interviewee s telephone number If this number is 624, , , an , we efine W =, W = 2, W = 3, an W = 4, respectively For example, the telephone number results in the number 722 an W = 2 In the survey, the responents provie an inirect answer A that epens on X an W Giving an inirect answer A protects the privacy The concrete answer schemes are: - Crosswise metho: For X = W = or X = W = 2, the answer A = must be given For other combinations of X an W, the inirect answer is A = 2 - Triangular metho: For X = W =, we have A = In the other cases, A = 2 is require - et al (2009) metho: For X =, the answer is the value of the nonsensitive variable, that is, A = W For X = i with i = 2,, k, the answer is the value of the sensitive characteristic, that is, A = X - Diagonal technique: The answer is given by the formula A = [(W X) mo k] +, however, the responents o not receive this mathematical formula Instea, they receive a table that illustrates the answer to give For example, for k = 4, Table is such a table 02

3 International Journal of Statistics an Probability Vol 6, No 5; 207 Table Table of require inirect answer A for iagonal technique X/W W = W = 2 W = 3 W = 4 X = X = X = X = Repeate NRR Methos In this section, we introuce a repeate version for each of the NRR methos from Section 2 Here, every responent gives multiple inirect answers We consier the case of two inirect answers in particular As preliminary consieration, let us fix some NRR scheme from Section 2 an assume that the responent shoul give a first inirect answer A base on the sensitive X an the nonsensitive auxiliary characteristic W an a secon inirect answer A 2 also base on X an W Then, A = A 2 always follows Consequently, the secon inirect answer oes not contain aitional information Thus, it oes not work to base both inirect answers on X an W The solution is to utilize a separate nonsensitive auxiliary attribute for each repetition Say, the nonsensitive auxiliary characteristic for the first an secon trial is enote by W an W 2, respectively For a fixe NRR scheme from Section 2, the interview proceure for the two-trial version is as follows The interviewee first gives the inirect answer A epening on X an W accoring to the fixe NRR scheme Afterwar, he or she gives the secon inirect answer A 2 epening on X an W 2 also accoring to the selecte NRR scheme For each NRR technique from Section 2, neither the responent s value of W nor the value of W 2 must be known to the interviewer or the survey agency For the crosswise an triangular metho, W, W 2 {, 2} is necessary For the et al (2009) an Groenitz (204) metho, W an W 2 both must have the categories,, k We make three further assumptions: The vector (W, W 2 ) an X are inepenent, W an W 2 are inepenent, an W an W 2 possess known istributions (W an W 2 are allowe to have ifferent istributions) These three assumptions can usually be seen as fulfille when the auxiliary characteristics are constructe, for example, from birthay perios, telephone numbers, or house numbers 4 Statistical Inference for Repeate NRR Designs We efine π i to be the proportion of persons in the population having X value equal to i (i =,, k) an set π = (π,, π k ) We now evelop the ML estimation for π for the repeate NRR esigns an a sample of size n rawn by simple ranom sampling with replacement The estimation variance is also aresse Fix one of the repeate NRR esigns an efine c i an c 2i to be the proportion of population units with W = i an W 2 = i, respectively Let the entry (i, j) of the k k matrix C be given by P(A = i X = j) Analog, let the entry (i, j) of the k k matrix C 2 be given by P(A 2 = i X = j) For the crosswise metho, we have C = ( ) ( ) c c 2 c2 c an C c 2 c 2 = 22 c 22 c 2 For the triangular metho, C = ( ) c 0 an C c 2 2 = ( c2 ) 0 c 22 hol For the technique by et al (2009), the first column of C equals (c,, c k ) The jth column of C for j = 2,, k has entry as jth component while the other components are 0 In the matrix C 2, the first column is (c 2,, c 2k ) The jth column of C 2 for j = 2,, k has entry as jth component an entry 0 for the other components For the iagonal technique, each row of C is a left-cyclic shift of the row above an the first row is (c,, c k ) Regaring C 2, each row is again a left-cyclic shift of the row above where the first row is now (c 2,, c 2k ) Consier a, a 2, x {,, k}, efine I = I (a, x) = {i {,, k} : W = i, X = x result in answer A = a }, I 2 = I 2 (a 2, x) = { j {,, k} : W 2 = j, X = x result in answer A 2 = a 2 }, I = I(a, a 2, x) = {(i, j) {,, k} 2 : (W, W 2 ) = (i, j), X = x yiel (A, A 2 ) = (a, a 2 )} 03

4 International Journal of Statistics an Probability Vol 6, No 5; 207 an obtain P(A = a,a 2 = a 2 X = x) = P(X = x) P(A = a, A 2 = a 2, X = x) = P(X = x) P(A = a, A 2 = a 2, W = w, W 2 = w 2, X = x) (w,w 2 ) I + (w,w 2 ) I P(A = a, A 2 = a 2, W = w, W 2 = w 2, X = x) = P(X = x) P(W = w, W 2 = w 2, X = x) + 0 (w,w 2 ) I = P(X = x) P(W = w ) P(W 2 = w 2 ) P(X = x) (w,w 2 ) I = P(W = w ) P(W 2 = w 2 ) = P(W = w ) P(W 2 = w 2 ) w I w 2 I 2 (w,w 2 ) I = P(A = a X = x) P(A 2 = a 2 X = x) = C (a, x) C 2 (a 2, x), where entry (p, q) of the matrix C an C 2 is enote by C (p, q) an C 2 (p, q), respectively Consequently, A an A 2 are conitionally inepenent As next step, we efine λ i j to be the joint proportion of population units with A = i an A 2 = j (i, j =,, k) These joint proportions are arrange in the column vector λ of length k 2 where we first sort by the value of A For example, for k = 3, λ is given by λ = (λ, λ 2, λ 3, λ 2, λ 22, λ 23, λ 3, λ 32, λ 33 ) It follows that λ = C (π,, π k ) where C is a k 2 k matrix an the jth column of C is given by C (:, j) C 2 (:, j) Here, C (:, j) an C 2 (:, j) represents the jth column of C an C 2, respectively, an the symbol stans for the Kronecker matrix prouct The Kronecker matrix prouct of two matrices R R r r 2 an S R s s 2 is efine as R R 2 R,r2 R S R 2 S R,r2 S R 2 R 22 R 2,r2 R S = R r, R r,2 R r,r 2 S = R 2 S R 22 S R 2,r2 S R r, S R r,2 S R r,r 2 S that is, R S is a matrix of size r s r 2 s 2 Thus, C is the columnwise Kronecker prouct of C an C 2 To give an example, for k = 3, we have C = C (, ) C 2 (, ) C (, 2) C 2 (, 2) C (, 3) C 2 (, 3) C (, ) C 2 (2, ) C (, 2) C 2 (2, 2) C (, 3) C 2 (2, 3) C (, ) C 2 (3, ) C (, 2) C 2 (3, 2) C (, 3) C 2 (3, 3) C (2, ) C 2 (, ) C (2, 2) C 2 (, 2) C (2, 3) C 2 (, 3) C (2, ) C 2 (2, ) C (2, 2) C 2 (2, 2) C (2, 3) C 2 (2, 3) C (2, ) C 2 (3, ) C (2, 2) C 2 (3, 2) C (2, 3) C 2 (3, 3) C (3, ) C 2 (, ) C (3, 2) C 2 (, 2) C (3, 3) C 2 (, 3) C (3, ) C 2 (2, ) C (3, 2) C 2 (2, 2) C (3, 3) C 2 (2, 3) C (3, ) C 2 (3, ) C (3, 2) C 2 (3, 2) C (3, 3) C 2 (3, 3) For the following, it is avisable to number the k 2 answer categories by,, k 2 where we first sort by answer A an then by A 2 For example, for k = 3, the numbering scheme is given by Table 2 Table 2 Answer categories,, 9 for A {, 2, 3} an A 2 {, 2, 3} answer category answer A answer A Let n l (l =,, k 2 ) be the observe absolute frequency of answer category l in the sample Furthermore, let C be the k 2 (k ) matrix that arises as follows from C: The jth column of C ( j =,, k ) is given by the ifference C(:, j) C(:, k) The log-likelihoo function is l(π,, π k ) = (n,, n k 2) log [ C (π,, π k ) + C(:, k) ], 04

5 International Journal of Statistics an Probability Vol 6, No 5; 207 with componentwise application of the logarithm The score function corresponing to l is ( s(π,, π k ) = [l (π,, π k )] = C n,, n ) k 2 λ λ k 2 For the secon erivative of l, we obtain Consequently, the Fisher matrix is l (π,, π k ) = C iag n,, n k 2 λ 2 λ 2 k 2 ( F = F(π,, π k ) = C n iag,, λ We maximize the log-likelihoo by a Fisher scoring algorithm However, other algorithms such as EM algorithm, Newton algorithm or Neler/Mea simplex algorithm are also possible Our Fisher scoring algorithm generates a sequence π (t) = (π (t),, π(t) k ), t =, 2,, via the rule λ k 2 C π (t+) = π (t) + [ F(π (t),, π(t) k )] s(π (t),, π(t) until convergence We enote the ML estimator for π = (π,, π k ) by ˆπ = (ˆπ,, ˆπ k ) The asymptotic variance of this ML estimator is given by [F(π,, π k )] An estimator for the asymptotic variance is [F(ˆπ,, ˆπ k )] 5 Precision Improvement We quantify the estimation inaccuracy by the trace of the asymptotic variance matrix of the ML estimator for π = (π,, π k ) For this variance matrix, we refer to the en of the previous section We start this section with a formal proof that the estimation inaccuracy of a two-trial NRR metho is always less than or equal to the estimation inaccuracy of the single-trial process Let A i j be the jth inirect answer of responent i (i =,, n, j =, 2) We set f A (a ) = P(A = a ), f A,A 2 (a, a 2 ) = P(A = a, A 2 = a 2 ), as well as f A2 A (a 2 a ) = P(A 2 = a 2 A = a ) The Fisher matrix can be written as F = F(π, π k ) = n E π log f A,A 2 (A, A 2 ) π log f A,A 2 (A, A 2 ) We have ) C k ) E π log f A,A 2 (A, A 2 ) π log f A,A 2 (A, A 2 ) [( = E π log f ( ) + ) π log f A (A ) ( π log f ( ) + )] π log f A (A ) = E π log f A (A ) π log f A (A ) + E π log f ( ) π log f ( ) [( ] + E + E ) π log f ( ) [( ) π log f A (A ) π log f A (A ) π log f ( ) In the following, we show that the last two summans are zero (zero matrix) We introuce the function g with ( ) g(a, a 2 ) = π log f (a 2 a ) π log f A (a ) ( ) = f A2 A (a 2 a ) π f (a 2 a ) π log f A (a ) ] 05

6 International Journal of Statistics an Probability Vol 6, No 5; 207 It is true that E [ ] g(a, A 2 ) A = a [ ( ) ] = E f A2 A (A 2 a ) π f (A 2 a ) π log f A (a ) A = a ( ) = f a 2 {,,k} A2 A (a 2 a ) π f (a 2 a ) π log f A (a ) f A2 A (a 2 a ) ( ) = π f (a 2 a ) π log f A (a ) a 2 {,,k} = π a 2 {,,k} = (0,, 0) f A2 A (a 2 a ) π log f A (a ) = 0 π log f A (a ) Consequently, E(E(g(A, A 2 ) A )) = E(g(A, A 2 )) = 0 hols That is, the thir summan is zero Regaring the fourth summan, we have E π log f A (A ) π log f ( ) { } = E π log f ( ) π log f A (A ) = 0 Thus, we obtain F = n E π log f A (A ) π log f A (A ) [( ) + n E π log f ( ) [( ) =: G + n E π log f ( ) π log f ( ) π log f ( ) ] ] () The matrix G = G(π, π k ) is the Fisher matrix if we only have observations on A,, A n, that is, if we only require one inirect answer per responent It follows from () that F G is positive-semiefinite By a known property of the Löwner orer (Norström, 989, p 4473), we obtain that G F is positive-semiefinite Thus, the trace of G is larger than or equal to the trace of F G is the asymptotic variance matrix of the ML estimator for π for one inirect answer per interviewee an F is the asymptotic variance matrix of the ML estimator for two inirect answers per interviewee Hence, we have shown that the estimation inaccuracy of a two-trial NRR metho is always less than or equal to the estimation inaccuracy of the single-trial process For numerical illustration, we now compute the estimation inaccuracy of our two-trial NRR techniques for concrete parameter specifications an make comparisons to the estimation inaccuracy of the single-trial versions For the crosswise metho, we set π = 08 an consier c {0, 02,, 09, } an c 2 {0, 02,, 09, } (2) The quantity n times the asymptotic variance of the ML estimator for π for the two-trial crosswise metho is presente for any combination of c an c 2 in the mile of Table 3 In the right column of Table 3, we provie the quantity n times the asymptotic variance of the ML estimator for π for the single-trial crosswise metho epening on the parameter c Here, the asymptotic variance for the single-trial version is ( ( C n iag /(C (π, π 2 ) ) ) ) C with C = C (:, ) C (:, 2) an / symbolizing componentwise ivision For the triangular metho, we again consier π = 08 an procee analogously to the crosswise metho The computational results for the triangular metho are given in Table 4 For the et al (2009) technique, we consier k = 3 categories, (π, π 2, π 3 ) = (06, 03, 0), an 0 istributions of an auxiliary variable as follows: 06

7 International Journal of Statistics an Probability Vol 6, No 5; 207 = ( ), c (2) = ( ), = ( ), c (4) = ( ), = ( ), c (6) = ( ), = ( ), c (8) = ( ), = ( ), c (0) = ( ) The first istribution is a uniform istribution The other vectors c (2),, c(0) were rawn ranomly The mile of Table 5 shows n times the trace of the asymptotic variance matrix of the ML estimator for (π, π 2 ) for the et al (2009) metho with two inirect answers per responent for each combination c (i) j) an c( The right column of this table provies the quantity n times the trace of the asymptotic variance of the ML estimator for (π, π 2 ) for the single-trial metho The asymptotic variance for the single-trial et al (2009) metho is ( ( C n iag /(C (π, π 2, π 3 ) ) ) ) C with C = [C (:, ) C (:, 3), C (:, 2) C (:, 3)] We finally come to the iagonal technique Say, we have k = 4 categories, the vector (π,, π 4 ) = (04, 03, 02, 0), an the 0 istributions of an auxiliary characteristic = ( ), c (2) = ( ), = ( ), c (4) = ( ), = ( ), c (6) = ( ), = ( ), c (8) = ( ), = ( ), c (0) = ( ) The istributions were chosen accoring to Groenitz (204, p 29) where we consiere σ {/20, 2/20,, 9/20, 0/20} in Groenitz (204, p 29) For the two-trial an single-trial iagonal technique, the results concerning estimation inaccuracy are given in Table 6 For the right column of this table, we remark that the asymptotic variance matrix of the ML estimator for (π, π 2, π 3 ) in the single-trial iagonal technique is equal to ( ( C n iag /(C (π,, π 4 ) ) ) ) C where C = [C (:, ) C (:, 4), C (:, 2) C (:, 4), C (:, 3) C (:, 4)] Altogether, the Tables 3-6 emonstrate that large efficiency gains are possible by two-trial NRR methos in comparison with single-trial NRR schemes Table 3 Inaccuracy crosswise metho inaccuracy two-trial crosswise metho single trial c /c

8 International Journal of Statistics an Probability Vol 6, No 5; 207 Note This table shows the quantity n times the asymptotic variance of the ML estimator for π for the crosswise metho For c = 05 in the single-trial proceure an c = c 2 = 05 in the two-trial proceure, the log-likelihoo oes not epen on π implying that ML estimation is not aequate in these cases Table 4 Inaccuracy triangular metho inaccuracy two-trial triangular metho single trial c /c Note This table provies the quantity n times the asymptotic variance of the ML estimator for π for the triangular metho Table 5 Inaccuracy for et al (2009) esign inaccuracy two-trial et al (2009) esign single trial c (2) c (4) c (6) c (8) c (0) c (2) c (4) c (6) c (8) c (0) Note This table shows n times the trace of the asymptotic variance matrix of the ML estimator for (π, π 2 ) for the et al (2009) metho Table 6 Inaccuracy for iagonal technique c (2) c (4) c (6) c (8) c (0) inaccuracy two-trial iagonal technique c (2) c (4) c (6) c (8) c (0) single trial Note This table presents n times the trace of the asymptotic variance matrix of the ML estimator for (π, π 2, π 3 ) for the iagonal metho by Groenitz (204) 08

9 International Journal of Statistics an Probability Vol 6, No 5; Summary NRR esigns for sensitive attributes have attracte much attention in the literature of the last years In this article, we have consiere two-trial versions of four NRR schemes In a two-trial esign, each person in the sample must provie two inirect answers Each answer epens on a separate auxiliary characteristic We have evelope the maximum likelihoo inference for the istribution of the sensitive variable an erive the asymptotic estimation variance Moreover, we analyze the gains in estimation precision by two inirect answers per responent instea of one inirect answer Acknowlegements The author thanks the Eitor an two anonymous reviewers for their comments an suggestions on the manuscript References Alavi, S M R, & Tajoini, M (206) Maximum Likelihoo Estimation of Sensitive Proportion Using Repeate Ranomize Response Techniques Journal of Applie Statistics, 43, Chauhuri, A (20) Ranomize Response an Inirect Questioning Techniques in Surveys Chapman & Hall/CRC Chauhuri, A, & Christofies, T C (203) Inirect Questioning in Sample Surveys Springer Chauhuri, A, Christofies, T C, & Rao, C R (206) Data Gathering, Analysis an Protection of Privacy Through Ranomize Response Techniques: Qualitative an Quantitative Human Traits Hanbook of Statistics 34, North Hollan Eriksson, S A (973) A New Moel for Ranomize Response International Statistical Review, 4, Fox, J A, & Tracy, PE (986) Ranomize Response - A Metho for Sensitive Surveys Sage Groenitz, H (204) A New Privacy-Protecting Survey Design for Multichotomous Sensitive Variables Metrika, 77, Groenitz, H (206) Vali Estimates for Repeate Ranomize Response Methos Journal of Applie Statistics, in press Norström, K (989) Some Further Aspects of the Löwner-Orering Antitonicity of the Moore-Penrose Inverse Communications in Statistics - Theory an Methos, 8, Tan, M T, Tian, G L, &, M L (2009) Sample Surveys with Sensitive Questions: A Nonranomize Response Approach The American Statistician, 63, M L, Tian, G L,, N S, & Liu, Z (2009) A New Non-ranomize Multi-category Response Moel for Surveys With a Single Sensitive Question: Design an Analysis Journal of the Korean Statistical Society, 38, Warner, S L (965) Ranomize Response: A Survey Technique for Eliminating Evasive Answer Bias Journal of the American Statistical Association, 60, Yu, J W, Tian, G L, &, M L (2008) Two New Moels for Survey Sampling With Sensitive Characteristic: Design an Analysis Metrika, 67, Copyrights Copyright for this article is retaine by the author(s), with first publication rights grante to the journal This is an open-access article istribute uner the terms an conitions of the Creative Commons Attribution license ( 09

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

New Statistical Test for Quality Control in High Dimension Data Set

New Statistical Test for Quality Control in High Dimension Data Set International Journal of Applie Engineering Research ISSN 973-456 Volume, Number 6 (7) pp. 64-649 New Statistical Test for Quality Control in High Dimension Data Set Shamshuritawati Sharif, Suzilah Ismail

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Diagonalization of Matrices Dr. E. Jacobs

Diagonalization of Matrices Dr. E. Jacobs Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Technical Report TTI-TR-2008-5 Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri UC San Diego Sham M. Kakae Toyota Technological Institute at Chicago ABSTRACT Clustering ata in

More information

A Modification of the Jarque-Bera Test. for Normality

A Modification of the Jarque-Bera Test. for Normality Int. J. Contemp. Math. Sciences, Vol. 8, 01, no. 17, 84-85 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1988/ijcms.01.9106 A Moification of the Jarque-Bera Test for Normality Moawa El-Fallah Ab El-Salam

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

A comparison of small area estimators of counts aligned with direct higher level estimates

A comparison of small area estimators of counts aligned with direct higher level estimates A comparison of small area estimators of counts aligne with irect higher level estimates Giorgio E. Montanari, M. Giovanna Ranalli an Cecilia Vicarelli Abstract Inirect estimators for small areas use auxiliary

More information

Online Appendix for Trade Policy under Monopolistic Competition with Firm Selection

Online Appendix for Trade Policy under Monopolistic Competition with Firm Selection Online Appenix for Trae Policy uner Monopolistic Competition with Firm Selection Kyle Bagwell Stanfor University an NBER Seung Hoon Lee Georgia Institute of Technology September 6, 2018 In this Online

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

A Review of Multiple Try MCMC algorithms for Signal Processing

A Review of Multiple Try MCMC algorithms for Signal Processing A Review of Multiple Try MCMC algorithms for Signal Processing Luca Martino Image Processing Lab., Universitat e València (Spain) Universia Carlos III e Mari, Leganes (Spain) Abstract Many applications

More information

Survey-weighted Unit-Level Small Area Estimation

Survey-weighted Unit-Level Small Area Estimation Survey-weighte Unit-Level Small Area Estimation Jan Pablo Burgar an Patricia Dörr Abstract For evience-base regional policy making, geographically ifferentiate estimates of socio-economic inicators are

More information

Spurious Significance of Treatment Effects in Overfitted Fixed Effect Models Albrecht Ritschl 1 LSE and CEPR. March 2009

Spurious Significance of Treatment Effects in Overfitted Fixed Effect Models Albrecht Ritschl 1 LSE and CEPR. March 2009 Spurious Significance of reatment Effects in Overfitte Fixe Effect Moels Albrecht Ritschl LSE an CEPR March 2009 Introuction Evaluating subsample means across groups an time perios is common in panel stuies

More information

Math 1B, lecture 8: Integration by parts

Math 1B, lecture 8: Integration by parts Math B, lecture 8: Integration by parts Nathan Pflueger 23 September 2 Introuction Integration by parts, similarly to integration by substitution, reverses a well-known technique of ifferentiation an explores

More information

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL

A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL 6th European Signal Processing Conference EUSIPCO 28, Lausanne, Switzerlan, August 25-29, 28, copyright by EURASIP A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL Leonaro Tomazeli

More information

A COMPARISON OF SMALL AREA AND CALIBRATION ESTIMATORS VIA SIMULATION

A COMPARISON OF SMALL AREA AND CALIBRATION ESTIMATORS VIA SIMULATION SAISICS IN RANSIION new series an SURVEY MEHODOLOGY 133 SAISICS IN RANSIION new series an SURVEY MEHODOLOGY Joint Issue: Small Area Estimation 014 Vol. 17, No. 1, pp. 133 154 A COMPARISON OF SMALL AREA

More information

Entanglement is not very useful for estimating multiple phases

Entanglement is not very useful for estimating multiple phases PHYSICAL REVIEW A 70, 032310 (2004) Entanglement is not very useful for estimating multiple phases Manuel A. Ballester* Department of Mathematics, University of Utrecht, Box 80010, 3508 TA Utrecht, The

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

Research Article When Inflation Causes No Increase in Claim Amounts

Research Article When Inflation Causes No Increase in Claim Amounts Probability an Statistics Volume 2009, Article ID 943926, 10 pages oi:10.1155/2009/943926 Research Article When Inflation Causes No Increase in Claim Amounts Vytaras Brazauskas, 1 Bruce L. Jones, 2 an

More information

Designing of Acceptance Double Sampling Plan for Life Test Based on Percentiles of Exponentiated Rayleigh Distribution

Designing of Acceptance Double Sampling Plan for Life Test Based on Percentiles of Exponentiated Rayleigh Distribution International Journal of Statistics an Systems ISSN 973-675 Volume, Number 3 (7), pp. 475-484 Research Inia Publications http://www.ripublication.com Designing of Acceptance Double Sampling Plan for Life

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

Applications of the Wronskian to ordinary linear differential equations

Applications of the Wronskian to ordinary linear differential equations Physics 116C Fall 2011 Applications of the Wronskian to orinary linear ifferential equations Consier a of n continuous functions y i (x) [i = 1,2,3,...,n], each of which is ifferentiable at least n times.

More information

2Algebraic ONLINE PAGE PROOFS. foundations

2Algebraic ONLINE PAGE PROOFS. foundations Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

A nonlinear inverse problem of the Korteweg-de Vries equation

A nonlinear inverse problem of the Korteweg-de Vries equation Bull. Math. Sci. https://oi.org/0.007/s3373-08-025- A nonlinear inverse problem of the Korteweg-e Vries equation Shengqi Lu Miaochao Chen 2 Qilin Liu 3 Receive: 0 March 207 / Revise: 30 April 208 / Accepte:

More information

The total derivative. Chapter Lagrangian and Eulerian approaches

The total derivative. Chapter Lagrangian and Eulerian approaches Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

Modeling time-varying storage components in PSpice

Modeling time-varying storage components in PSpice Moeling time-varying storage components in PSpice Dalibor Biolek, Zenek Kolka, Viera Biolkova Dept. of EE, FMT, University of Defence Brno, Czech Republic Dept. of Microelectronics/Raioelectronics, FEEC,

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

Introduction to Markov Processes

Introduction to Markov Processes Introuction to Markov Processes Connexions moule m44014 Zzis law Gustav) Meglicki, Jr Office of the VP for Information Technology Iniana University RCS: Section-2.tex,v 1.24 2012/12/21 18:03:08 gustav

More information

Logarithmic spurious regressions

Logarithmic spurious regressions Logarithmic spurious regressions Robert M. e Jong Michigan State University February 5, 22 Abstract Spurious regressions, i.e. regressions in which an integrate process is regresse on another integrate

More information

Combining Time Series and Cross-sectional Data for Current Employment Statistics Estimates 1

Combining Time Series and Cross-sectional Data for Current Employment Statistics Estimates 1 JSM015 - Surey Research Methos Section Combining Time Series an Cross-sectional Data for Current Employment Statistics Estimates 1 Julie Gershunskaya U.S. Bureau of Labor Statistics, Massachusetts Ae NE,

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

Mark J. Machina CARDINAL PROPERTIES OF "LOCAL UTILITY FUNCTIONS"

Mark J. Machina CARDINAL PROPERTIES OF LOCAL UTILITY FUNCTIONS Mark J. Machina CARDINAL PROPERTIES OF "LOCAL UTILITY FUNCTIONS" This paper outlines the carinal properties of "local utility functions" of the type use by Allen [1985], Chew [1983], Chew an MacCrimmon

More information

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods Hyperbolic Moment Equations Using Quarature-Base Projection Methos J. Koellermeier an M. Torrilhon Department of Mathematics, RWTH Aachen University, Aachen, Germany Abstract. Kinetic equations like the

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

Influence of weight initialization on multilayer perceptron performance

Influence of weight initialization on multilayer perceptron performance Influence of weight initialization on multilayer perceptron performance M. Karouia (1,2) T. Denœux (1) R. Lengellé (1) (1) Université e Compiègne U.R.A. CNRS 817 Heuiasyc BP 649 - F-66 Compiègne ceex -

More information

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation A Novel ecouple Iterative Metho for eep-submicron MOSFET RF Circuit Simulation CHUAN-SHENG WANG an YIMING LI epartment of Mathematics, National Tsing Hua University, National Nano evice Laboratories, an

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Systems & Control Letters

Systems & Control Letters Systems & ontrol Letters ( ) ontents lists available at ScienceDirect Systems & ontrol Letters journal homepage: www.elsevier.com/locate/sysconle A converse to the eterministic separation principle Jochen

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Keywors: multi-view learning, clustering, canonical correlation analysis Abstract Clustering ata in high-imensions is believe to be a har problem in general. A number of efficient clustering algorithms

More information

Estimation of District Level Poor Households in the State of. Uttar Pradesh in India by Combining NSSO Survey and

Estimation of District Level Poor Households in the State of. Uttar Pradesh in India by Combining NSSO Survey and Int. Statistical Inst.: Proc. 58th Worl Statistical Congress, 2011, Dublin (Session CPS039) p.6567 Estimation of District Level Poor Househols in the State of Uttar Praesh in Inia by Combining NSSO Survey

More information

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016 Noname manuscript No. (will be inserte by the eitor) Scaling properties of the number of ranom sequential asorption iterations neee to generate saturate ranom packing arxiv:607.06668v2 [con-mat.stat-mech]

More information

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix

More information

Hybrid Fusion for Biometrics: Combining Score-level and Decision-level Fusion

Hybrid Fusion for Biometrics: Combining Score-level and Decision-level Fusion Hybri Fusion for Biometrics: Combining Score-level an Decision-level Fusion Qian Tao Raymon Velhuis Signals an Systems Group, University of Twente Postbus 217, 7500AE Enschee, the Netherlans {q.tao,r.n.j.velhuis}@ewi.utwente.nl

More information

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences. S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial

More information

On the enumeration of partitions with summands in arithmetic progression

On the enumeration of partitions with summands in arithmetic progression AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics

More information

UNIFYING PCA AND MULTISCALE APPROACHES TO FAULT DETECTION AND ISOLATION

UNIFYING PCA AND MULTISCALE APPROACHES TO FAULT DETECTION AND ISOLATION UNIFYING AND MULISCALE APPROACHES O FAUL DEECION AND ISOLAION Seongkyu Yoon an John F. MacGregor Dept. Chemical Engineering, McMaster University, Hamilton Ontario Canaa L8S 4L7 yoons@mcmaster.ca macgreg@mcmaster.ca

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES MATHEMATICS OF COMPUTATION Volume 69, Number 231, Pages 1117 1130 S 0025-5718(00)01120-0 Article electronically publishe on February 17, 2000 EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION

More information

Gaussian processes with monotonicity information

Gaussian processes with monotonicity information Gaussian processes with monotonicity information Anonymous Author Anonymous Author Unknown Institution Unknown Institution Abstract A metho for using monotonicity information in multivariate Gaussian process

More information

Lecture 6: Calculus. In Song Kim. September 7, 2011

Lecture 6: Calculus. In Song Kim. September 7, 2011 Lecture 6: Calculus In Song Kim September 7, 20 Introuction to Differential Calculus In our previous lecture we came up with several ways to analyze functions. We saw previously that the slope of a linear

More information

Short Intro to Coordinate Transformation

Short Intro to Coordinate Transformation Short Intro to Coorinate Transformation 1 A Vector A vector can basically be seen as an arrow in space pointing in a specific irection with a specific length. The following problem arises: How o we represent

More information

Tutorial on Maximum Likelyhood Estimation: Parametric Density Estimation

Tutorial on Maximum Likelyhood Estimation: Parametric Density Estimation Tutorial on Maximum Likelyhoo Estimation: Parametric Density Estimation Suhir B Kylasa 03/13/2014 1 Motivation Suppose one wishes to etermine just how biase an unfair coin is. Call the probability of tossing

More information

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

Conservation Laws. Chapter Conservation of Energy

Conservation Laws. Chapter Conservation of Energy 20 Chapter 3 Conservation Laws In orer to check the physical consistency of the above set of equations governing Maxwell-Lorentz electroynamics [(2.10) an (2.12) or (1.65) an (1.68)], we examine the action

More information

Generalization of the persistent random walk to dimensions greater than 1

Generalization of the persistent random walk to dimensions greater than 1 PHYSICAL REVIEW E VOLUME 58, NUMBER 6 DECEMBER 1998 Generalization of the persistent ranom walk to imensions greater than 1 Marián Boguñá, Josep M. Porrà, an Jaume Masoliver Departament e Física Fonamental,

More information

Lecture 2: Correlated Topic Model

Lecture 2: Correlated Topic Model Probabilistic Moels for Unsupervise Learning Spring 203 Lecture 2: Correlate Topic Moel Inference for Correlate Topic Moel Yuan Yuan First of all, let us make some claims about the parameters an variables

More information

Optimization of Geometries by Energy Minimization

Optimization of Geometries by Energy Minimization Optimization of Geometries by Energy Minimization by Tracy P. Hamilton Department of Chemistry University of Alabama at Birmingham Birmingham, AL 3594-140 hamilton@uab.eu Copyright Tracy P. Hamilton, 1997.

More information

Optimal CDMA Signatures: A Finite-Step Approach

Optimal CDMA Signatures: A Finite-Step Approach Optimal CDMA Signatures: A Finite-Step Approach Joel A. Tropp Inst. for Comp. Engr. an Sci. (ICES) 1 University Station C000 Austin, TX 7871 jtropp@ices.utexas.eu Inerjit. S. Dhillon Dept. of Comp. Sci.

More information

The canonical controllers and regular interconnection

The canonical controllers and regular interconnection Systems & Control Letters ( www.elsevier.com/locate/sysconle The canonical controllers an regular interconnection A.A. Julius a,, J.C. Willems b, M.N. Belur c, H.L. Trentelman a Department of Applie Mathematics,

More information

MODELLING DEPENDENCE IN INSURANCE CLAIMS PROCESSES WITH LÉVY COPULAS ABSTRACT KEYWORDS

MODELLING DEPENDENCE IN INSURANCE CLAIMS PROCESSES WITH LÉVY COPULAS ABSTRACT KEYWORDS MODELLING DEPENDENCE IN INSURANCE CLAIMS PROCESSES WITH LÉVY COPULAS BY BENJAMIN AVANZI, LUKE C. CASSAR AND BERNARD WONG ABSTRACT In this paper we investigate the potential of Lévy copulas as a tool for

More information

ON THE OPTIMALITY SYSTEM FOR A 1 D EULER FLOW PROBLEM

ON THE OPTIMALITY SYSTEM FOR A 1 D EULER FLOW PROBLEM ON THE OPTIMALITY SYSTEM FOR A D EULER FLOW PROBLEM Eugene M. Cliff Matthias Heinkenschloss y Ajit R. Shenoy z Interisciplinary Center for Applie Mathematics Virginia Tech Blacksburg, Virginia 46 Abstract

More information

Euler equations for multiple integrals

Euler equations for multiple integrals Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................

More information

KNN Particle Filters for Dynamic Hybrid Bayesian Networks

KNN Particle Filters for Dynamic Hybrid Bayesian Networks KNN Particle Filters for Dynamic Hybri Bayesian Networs H. D. Chen an K. C. Chang Dept. of Systems Engineering an Operations Research George Mason University MS 4A6, 4400 University Dr. Fairfax, VA 22030

More information

A Short Note on Self-Similar Solution to Unconfined Flow in an Aquifer with Accretion

A Short Note on Self-Similar Solution to Unconfined Flow in an Aquifer with Accretion Open Journal o Flui Dynamics, 5, 5, 5-57 Publishe Online March 5 in SciRes. http://www.scirp.org/journal/oj http://x.oi.org/.46/oj.5.57 A Short Note on Sel-Similar Solution to Unconine Flow in an Aquier

More information

Placement and tuning of resonance dampers on footbridges

Placement and tuning of resonance dampers on footbridges Downloae from orbit.tu.k on: Jan 17, 19 Placement an tuning of resonance ampers on footbriges Krenk, Steen; Brønen, Aners; Kristensen, Aners Publishe in: Footbrige 5 Publication ate: 5 Document Version

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

Chapter 2 Lagrangian Modeling

Chapter 2 Lagrangian Modeling Chapter 2 Lagrangian Moeling The basic laws of physics are use to moel every system whether it is electrical, mechanical, hyraulic, or any other energy omain. In mechanics, Newton s laws of motion provie

More information

Periods of quadratic twists of elliptic curves

Periods of quadratic twists of elliptic curves Perios of quaratic twists of elliptic curves Vivek Pal with an appenix by Amo Agashe Abstract In this paper we prove a relation between the perio of an elliptic curve an the perio of its real an imaginary

More information

AN INTRODUCTION TO NUMERICAL METHODS USING MATHCAD. Mathcad Release 14. Khyruddin Akbar Ansari, Ph.D., P.E.

AN INTRODUCTION TO NUMERICAL METHODS USING MATHCAD. Mathcad Release 14. Khyruddin Akbar Ansari, Ph.D., P.E. AN INTRODUCTION TO NUMERICAL METHODS USING MATHCAD Mathca Release 14 Khyruin Akbar Ansari, Ph.D., P.E. Professor of Mechanical Engineering School of Engineering an Applie Science Gonzaga University SDC

More information

arxiv: v1 [math.st] 20 Jun 2017

arxiv: v1 [math.st] 20 Jun 2017 On the joint asymptotic istribution of the restricte arxiv:1706.06632v1 [math.st] 20 Jun 2017 estimators in multivariate regression moel Sévérien Nkurunziza an Youzhi Yu Abstract The main Theorem of Jain

More information

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation Relative Entropy an Score Function: New Information Estimation Relationships through Arbitrary Aitive Perturbation Dongning Guo Department of Electrical Engineering & Computer Science Northwestern University

More information

Quantile function expansion using regularly varying functions

Quantile function expansion using regularly varying functions Quantile function expansion using regularly varying functions arxiv:705.09494v [math.st] 9 Aug 07 Thomas Fung a, an Eugene Seneta b a Department of Statistics, Macquarie University, NSW 09, Australia b

More information

A Weak First Digit Law for a Class of Sequences

A Weak First Digit Law for a Class of Sequences International Mathematical Forum, Vol. 11, 2016, no. 15, 67-702 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1288/imf.2016.6562 A Weak First Digit Law for a Class of Sequences M. A. Nyblom School of

More information

Stable and compact finite difference schemes

Stable and compact finite difference schemes Center for Turbulence Research Annual Research Briefs 2006 2 Stable an compact finite ifference schemes By K. Mattsson, M. Svär AND M. Shoeybi. Motivation an objectives Compact secon erivatives have long

More information

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae

More information

An Approach for Design of Multi-element USBL Systems

An Approach for Design of Multi-element USBL Systems An Approach for Design of Multi-element USBL Systems MIKHAIL ARKHIPOV Department of Postgrauate Stuies Technological University of the Mixteca Carretera a Acatlima Km. 2.5 Huajuapan e Leon Oaxaca 69000

More information

Dot trajectories in the superposition of random screens: analysis and synthesis

Dot trajectories in the superposition of random screens: analysis and synthesis 1472 J. Opt. Soc. Am. A/ Vol. 21, No. 8/ August 2004 Isaac Amiror Dot trajectories in the superposition of ranom screens: analysis an synthesis Isaac Amiror Laboratoire e Systèmes Périphériques, Ecole

More information

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises

More information

CONTROL CHARTS FOR VARIABLES

CONTROL CHARTS FOR VARIABLES UNIT CONTOL CHATS FO VAIABLES Structure.1 Introuction Objectives. Control Chart Technique.3 Control Charts for Variables.4 Control Chart for Mean(-Chart).5 ange Chart (-Chart).6 Stanar Deviation Chart

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

ELEC3114 Control Systems 1

ELEC3114 Control Systems 1 ELEC34 Control Systems Linear Systems - Moelling - Some Issues Session 2, 2007 Introuction Linear systems may be represente in a number of ifferent ways. Figure shows the relationship between various representations.

More information

Lecture Note 2. 1 Bonferroni Principle. 1.1 Idea. 1.2 Want. Material covered today is from Chapter 1 and chapter 4

Lecture Note 2. 1 Bonferroni Principle. 1.1 Idea. 1.2 Want. Material covered today is from Chapter 1 and chapter 4 Lecture Note 2 Material covere toay is from Chapter an chapter 4 Bonferroni Principle. Iea Get an iea the frequency of events when things are ranom billion = 0 9 Each person has a % chance to stay in a

More information

THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE

THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE Journal of Soun an Vibration (1996) 191(3), 397 414 THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE E. M. WEINSTEIN Galaxy Scientific Corporation, 2500 English Creek

More information

arxiv: v1 [math.co] 29 May 2009

arxiv: v1 [math.co] 29 May 2009 arxiv:0905.4913v1 [math.co] 29 May 2009 simple Havel-Hakimi type algorithm to realize graphical egree sequences of irecte graphs Péter L. Erős an István Miklós. Rényi Institute of Mathematics, Hungarian

More information

DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS

DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS SHANKAR BHAMIDI 1, JESSE GOODMAN 2, REMCO VAN DER HOFSTAD 3, AND JÚLIA KOMJÁTHY3 Abstract. In this article, we explicitly

More information

BLOCK DESIGNS WITH NESTED ROWS AND COLUMNS

BLOCK DESIGNS WITH NESTED ROWS AND COLUMNS BLOCK DESIGNS WITH NESTED ROWS AND COLUMNS Rajener Parsa I.A.S.R.I., Lirary Avenue, New Delhi 110 012 rajener@iasri.res.in 1. Introuction For experimental situations where there are two cross-classifie

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri ITA, UC San Diego, 9500 Gilman Drive, La Jolla, CA Sham M. Kakae Karen Livescu Karthik Sriharan Toyota Technological Institute at Chicago, 6045 S. Kenwoo Ave., Chicago, IL kamalika@soe.ucs.eu

More information