299 research outputs found
Levy-stable distributions revisited: tail index > 2 does not exclude the Levy-stable regime
Power-law tail behavior and the summation scheme of Levy-stable distributions
is the basis for their frequent use as models when fat tails above a Gaussian
distribution are observed. However, recent studies suggest that financial asset
returns exhibit tail exponents well above the Levy-stable regime (). In this paper we illustrate that widely used tail index estimates (log-log
linear regression and Hill) can give exponents well above the asymptotic limit
for close to 2, resulting in overestimation of the tail exponent in
finite samples. The reported value of the tail exponent around 3 may
very well indicate a Levy-stable distribution with .Comment: To be published in Int. J. Modern Physics C (2001) vol. 12 no.
Goodness-of-Fit Tests for Symmetric Stable Distributions -- Empirical Characteristic Function Approach
We consider goodness-of-fit tests of symmetric stable distributions based on
weighted integrals of the squared distance between the empirical characteristic
function of the standardized data and the characteristic function of the
standard symmetric stable distribution with the characteristic exponent
estimated from the data. We treat as an unknown parameter,
but for theoretical simplicity we also consider the case that is
fixed. For estimation of parameters and the standardization of data we use
maximum likelihood estimator (MLE) and an equivariant integrated squared error
estimator (EISE) which minimizes the weighted integral. We derive the
asymptotic covariance function of the characteristic function process with
parameters estimated by MLE and EISE. For the case of MLE, the eigenvalues of
the covariance function are numerically evaluated and asymptotic distribution
of the test statistic is obtained using complex integration. Simulation studies
show that the asymptotic distribution of the test statistics is very accurate.
We also present a formula of the asymptotic covariance function of the
characteristic function process with parameters estimated by an efficient
estimator for general distributions
The influence of pre-radiation salivary flow rates and radiation dose on parotid salivary gland dysfunction in patients receiving radiotherapy for head and neck cancers
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/72238/1/j.1754-4505.1998.tb00913.x.pd
Systematic inference of the long-range dependence and heavy-tail distribution parameters of ARFIMA models
Long-Range Dependence (LRD) and heavy-tailed distributions are ubiquitous in natural and socio-economic data. Such data can be self-similar whereby both LRD and heavy-tailed distributions contribute to the self-similarity as measured by the Hurst exponent. Some methods widely used in the physical sciences separately estimate these two parameters, which can lead to estimation bias. Those which do simultaneous estimation are based on frequentist methods such as Whittleâs approximate maximum likelihood estimator. Here we present a new and systematic Bayesian framework for the simultaneous inference of the LRD and heavy-tailed distribution parameters of a parametric ARFIMA model with non-Gaussian innovations. As innovations we use the α-stable and t-distributions which have power law tails. Our algorithm also provides parameter uncertainty estimates. We test our algorithm using synthetic data, and also data from the Geostationary Operational Environmental Satellite system (GOES) solar X-ray time series. These tests show that our algorithm is able to accurately and robustly estimate the LRD and heavy-tailed distribution parameters
Comparison of algorithms that detect drug side effects using electronic healthcare databases
The electronic healthcare databases are starting to become more readily available and are thought to have excellent potential for generating adverse drug reaction signals. The Health Improvement Network (THIN) database is an electronic healthcare database containing medical information on over 11 million patients that has excellent potential for detecting ADRs. In this paper we apply four existing electronic healthcare database signal detecting algorithms (MUTARA, HUNT, Temporal Pattern Discovery and modified ROR) on the THIN database for a selection of drugs from six chosen drug families. This is the first comparison of ADR signalling algorithms that includes MUTARA and HUNT and enabled us to set a benchmark for the adverse drug reaction signalling ability of the THIN database. The drugs were selectively chosen to enable a comparison with previous work and for variety. It was found that no algorithm was generally superior and the algorithmsâ natural thresholds act at variable stringencies. Furthermore, none of the algorithms perform well at detecting rare ADRs
Mining multi-item drug adverse effect associations in spontaneous reporting systems
<p>Abstract</p> <p>Background</p> <p>Multi-item adverse drug event (ADE) associations are associations relating multiple drugs to possibly multiple adverse events. The current standard in pharmacovigilance is bivariate association analysis, where each single drug-adverse effect combination is studied separately. The importance and difficulty in the detection of multi-item ADE associations was noted in several prominent pharmacovigilance studies. In this paper we examine the application of a well established data mining method known as association rule mining, which we tailored to the above problem, and demonstrate its value. The method was applied to the FDAs spontaneous adverse event reporting system (AERS) with minimal restrictions and expectations on its output, an experiment that has not been previously done on the scale and generality proposed in this work.</p> <p>Results</p> <p>Based on a set of 162,744 reports of suspected ADEs reported to AERS and published in the year 2008, our method identified 1167 multi-item ADE associations. A taxonomy that characterizes the associations was developed based on a representative sample. A significant number (67% of the total) of potential multi-item ADE associations identified were characterized and clinically validated by a domain expert as previously recognized ADE associations. Several potentially novel ADEs were also identified. A smaller proportion (4%) of associations were characterized and validated as known drug-drug interactions.</p> <p>Conclusions</p> <p>Our findings demonstrate that multi-item ADEs are present and can be extracted from the FDAâs adverse effect reporting system using our methodology, suggesting that our method is a valid approach for the initial identification of multi-item ADEs. The study also revealed several limitations and challenges that can be attributed to both the method and quality of data.</p
Design of Experiments for Screening
The aim of this paper is to review methods of designing screening
experiments, ranging from designs originally developed for physical experiments
to those especially tailored to experiments on numerical models. The strengths
and weaknesses of the various designs for screening variables in numerical
models are discussed. First, classes of factorial designs for experiments to
estimate main effects and interactions through a linear statistical model are
described, specifically regular and nonregular fractional factorial designs,
supersaturated designs and systematic fractional replicate designs. Generic
issues of aliasing, bias and cancellation of factorial effects are discussed.
Second, group screening experiments are considered including factorial group
screening and sequential bifurcation. Third, random sampling plans are
discussed including Latin hypercube sampling and sampling plans to estimate
elementary effects. Fourth, a variety of modelling methods commonly employed
with screening designs are briefly described. Finally, a novel study
demonstrates six screening methods on two frequently-used exemplars, and their
performances are compared
Molecular excitation in the Interstellar Medium: recent advances in collisional, radiative and chemical processes
We review the different excitation processes in the interstellar mediumComment: Accepted in Chem. Re
Positive predictive value of automated database records for diabetic ketoacidosis (DKA) in children and youth exposed to antipsychotic drugs or control medications: a tennessee medicaid study
<p>Abstract</p> <p>Background</p> <p>Diabetic ketoacidosis (DKA) is a potentially life-threatening complication of treatment with some atypical antipsychotic drugs in children and <b>youth</b>. Because drug-associated DKA is rare, large automated health outcomes databases may be a valuable data source for conducting pharmacoepidemiologic studies of DKA associated with exposure to individual antipsychotic drugs. However, no validated computer case definition of DKA exists. We sought to assess the positive predictive value (PPV) of a computer case definition to detect incident cases of DKA, using automated records of Tennessee Medicaid as the data source and medical record confirmation as a "gold standard."</p> <p>Methods</p> <p>The computer case definition of DKA was developed from a retrospective cohort study of antipsychotic-related type 2 diabetes mellitus (1996-2007) in Tennessee Medicaid enrollees, aged 6-24 years. Thirty potential cases with any DKA diagnosis (ICD-9 250.1, ICD-10 E1x.1) were identified from inpatient encounter claims. Medical records were reviewed to determine if they met the clinical definition of DKA.</p> <p>Results</p> <p>Of 30 potential cases, 27 (90%) were successfully abstracted and adjudicated. Of these, 24 cases were confirmed by medical record review (PPV 88.9%, 95% CI 71.9 to 96.1%). Three non-confirmed cases presented acutely with severe hyperglycemia, but had no evidence of acidosis.</p> <p>Conclusions</p> <p>Diabetic ketoacidosis in children and youth can be identified in a computerized Medicaid database using our case definition, which could be useful for automated database studies in which drug-associated DKA is the outcome of interest.</p
The mimetic politics of lone-wolf terrorism
Written at a time of crisis in the project of social and political modernity, Fyodor Dostoevskyâs 1864 novel Notes from Underground offers an intriguing parallel for the twenty-first century lone-wolf; it portrays an abject, outcast, spiteful unnamed anti-hero boiling with rage, bitter with resentment and on the verge of radicalisation. A Girardian reading of the poetic truths contained in Dostoevskyâs work is able to provide important keys to explain the contemporary transformation from âfourth-waveâ religious terrorism to âfifth-waveâ lone-wolf terrorism. Such a reading argues that it is mimetic rivalry â rather than much-trumpeted forms of religious violence or cultural differences â that fuels the triangular relation between governments, terrorists and civilian victims at heart of terrorist acts. This approach is further able to blend social inquiry with an account of the individual, in fact anthropological, conditions of lone-wolf terrorism by tracing the globalisation of resentment and the individualisation of violence to the hyper-mimeticism characterising the globalisation of late modernity. Finally, a mimetic reading of âfifth-waveâ terrorism accounts for the turbulence of a global politics in which victimhood and scapegoating no longer have the ability to stabilise social order and warns against a future where violence proliferates and escalates unchecked
- âŠ