1,176 research outputs found
Resampling-based confidence regions and multiple tests for a correlated random vector
We derive non-asymptotic confidence regions for the mean of a random vector
whose coordinates have an unknown dependence structure. The random vector is
supposed to be either Gaussian or to have a symmetric bounded distribution, and
we observe i.i.d copies of it. The confidence regions are built using a
data-dependent threshold based on a weighted bootstrap procedure. We consider
two approaches, the first based on a concentration approach and the second on a
direct boostrapped quantile approach. The first one allows to deal with a very
large class of resampling weights while our results for the second are
restricted to Rademacher weights. However, the second method seems more
accurate in practice. Our results are motivated by multiple testing problems,
and we show on simulations that our procedures are better than the Bonferroni
procedure (union bound) as soon as the observed vector has sufficiently
correlated coordinates.Comment: submitted to COL
Social and cultural origins of motivations to volunteer a comparison of university students in six countries
Although participation in volunteering and motivations to volunteer (MTV) have received substantial attention on the national level, particularly in the US, few studies have compared and explained these issues across cultural and political contexts. This study compares how two theoretical perspectives, social origins theory and signalling theory, explain variations in MTV across different countries. The study analyses responses from a sample of 5794 students from six countries representing distinct institutional contexts. The findings provide strong support for signalling theory but less so for social origins theory. The article concludes that volunteering is a personal decision and thus is influenced more at the individual level but is also impacted to some degree by macro-level societal forces
Rearranging Edgeworth-Cornish-Fisher Expansions
This paper applies a regularization procedure called increasing rearrangement
to monotonize Edgeworth and Cornish-Fisher expansions and any other related
approximations of distribution and quantile functions of sample statistics.
Besides satisfying the logical monotonicity, required of distribution and
quantile functions, the procedure often delivers strikingly better
approximations to the distribution and quantile functions of the sample mean
than the original Edgeworth-Cornish-Fisher expansions.Comment: 17 pages, 3 figure
Soliton molecules in trapped vector Nonlinear Schrodinger systems
We study a new class of vector solitons in trapped Nonlinear Schrodinger
systems modelling the dynamics of coupled light beams in GRIN Kerr media and
atomic mixtures in Bose-Einstein condensates. These solitons exist for
different spatial dimensions, their existence is studied by means of a
systematic mathematical technique and the analysis is made for inhomogeneous
media
Theory of a Higher Order Phase Transition: Superconducting Transition in BKBO
We describe here the properties expected of a higher (with emphasis on the
order fourth) order phase transition. The order is identified in the sense
first noted by Ehrenfest, namely in terms of the temperature dependence of the
ordered state free energy near the phase boundary. We have derived an equation
for the phase boundary in terms of the discontinuities in thermodynamic
observables, developed a Ginzburg-Landau free energy and studied the
thermodynamic and magnetic properties. We also discuss the current status of
experiments on and other based superconductors,
the expectations for parameters and examine alternative explanations of the
experimental results.Comment: 18 pages, no figure
The Verifying Compiler: A Grand Challenge for Computing Research
Abstract. This contribution proposes a set of criteria that distinguish a grand challenge in science or engineering from the many other kinds of short-term or long-term research problems that engage the interest of scientists and engineers. As an example drawn from Computer Science, it revives an old challenge: the construction and application of a verifying compiler that guarantees correctness of a program before running it. Introduction. The primary purpose of the formulation and promulgation of a grand challenge is the advancement of science or engineering. A grand challenge represents a commitment by a significant section of the research community to work together towards a common goal, agreed to be valuable and achievable by a team effort within a predicted timescale. The challenge is formulated by th
New single-ended objective measure for non-intrusive speech quality evaluation
peer-reviewedThis article proposes a new output-based method for non-intrusive assessment of speech quality of voice communication systems and evaluates its performance. The method requires access to the processed (degraded) speech only, and is based on measuring perception-motivated objective auditory distances between the voiced parts of the output speech to appropriately matching references extracted from a pre-formulated codebook. The codebook is formed by optimally clustering a large number of parametric speech vectors extracted from a database of clean speech records. The auditory distances are then mapped into objective Mean Opinion listening quality scores. An efficient data-mining tool known as the self-organizing map (SOM) achieves the required clustering and mapping/reference matching processes. In order to obtain a perception-based, speaker-independent parametric representation of the speech, three domain transformation techniques have been investigated. The first technique is based on a perceptual linear prediction (PLP) model, the second utilises a bark spectrum (BS) analysis and the third utilises mel-frequency cepstrum coefficients (MFCC). Reported evaluation results show that the proposed method provides high correlation with subjective listening quality scores, yielding accuracy similar to that of the ITU-T P.563 while maintaining a relatively low computational complexity. Results also demonstrate that the method outperforms the PESQ in a number of distortion conditions, such as those of speech degraded by channel impairments.acceptedpeer-reviewe
Non-Markovian dynamics for an open two-level system without rotating wave approximation: Indivisibility versus backflow of information
By use of the two measures presented recently, the indivisibility and the
backflow of information, we study the non-Markovianity of the dynamics for a
two-level system interacting with a zero-temperature structured environment
without using rotating wave approximation (RWA). In the limit of weak coupling
between the system and the reservoir, and by expanding the time-convolutionless
(TCL) generator to the forth order with respect to the coupling strength, the
time-local non-Markovian master equation for the reduced state of the system is
derived. Under the secular approximation, the exact analytic solution is
obtained and the sufficient and necessary conditions for the indivisibility and
the backflow of information for the system dynamics are presented. In the more
general case, we investigate numerically the properties of the two measures for
the case of Lorentzian reservoir. Our results show the importance of the
counter-rotating terms to the short-time-scale non-Markovian behavior of the
system dynamics, further expose the relations between the two measures and
their rationality as non-Markovian measures. Finally, the complete positivity
of the dynamics of the considered system is discussed
Empirical Phi-Discrepancies and Quasi-Empirical Likelihood: Exponential Bounds
We review some recent extensions of the so-called generalized empirical likelihood method, when the Kullback distance is replaced by some general convex divergence. We propose to use, instead of empirical likelihood, some regularized form or quasi-empirical likelihood method, corresponding to a convex combination of Kullback and Ï2 discrepancies. We show that for some adequate choice of the weight in this combination, the corresponding quasi-empirical likelihood is Bartlett-correctable. We also establish some non-asymptotic exponential bounds for the confidence regions obtained by using this method. These bounds are derived via bounds for self-normalized sums in the multivariate case obtained in a previous work by the authors. We also show that this kind of results may be extended to process valued infinite dimensional parameters. In this case some known results about self-normalized processes may be used to control the behavior of generalized empirical likelihood
A data flow process for confidential data and its application in a health research project
Background
The use of linked healthcare data in research has the potential to make major contributions to knowledge generation and service improvement. However, using healthcare data for secondary purposes raises legal and ethical concerns relating to confidentiality, privacy and data protection rights. Using a linkage and anonymisation approach that processes data lawfully and in line with ethical best practice to create an anonymous (non-personal) dataset can address these concerns, yet there is no set approach for defining all of the steps involved in such data flow end-to-end. We aimed to define such an approach with clear steps for dataset creation, and to describe its utilisation in a case study linking healthcare data.
Methods
We developed a data flow protocol that generates pseudonymous datasets that can be reversibly linked, or irreversibly linked to form an anonymous research dataset. It was designed and implemented by the Comprehensive Patient Records (CPR) study in Leeds, UK.
Results
We defined a clear approach that received ethico-legal approval for use in creating an anonymous research dataset. Our approach used individual-level linkage through a mechanism that is not computer-intensive and was rendered irreversible to both data providers and processors. We successfully applied it in the CPR study to hospital and general practice and community electronic health record data from two providers, along with patient reported outcomes, for 365,193 patients. The resultant anonymous research dataset is available via DATA-CAN, the Health Data Research Hub for Cancer in the UK.
Conclusions
Through ethical, legal and academic review, we believe that we contribute a defined approach that represents a framework that exceeds current minimum standards for effective pseudonymisation and anonymisation. This paper describes our methods and provides supporting information to facilitate the use of this approach in research
- âŠ