299 research outputs found

    Levy-stable distributions revisited: tail index > 2 does not exclude the Levy-stable regime

    Full text link
    Power-law tail behavior and the summation scheme of Levy-stable distributions is the basis for their frequent use as models when fat tails above a Gaussian distribution are observed. However, recent studies suggest that financial asset returns exhibit tail exponents well above the Levy-stable regime (0<α≀20<\alpha\le 2). In this paper we illustrate that widely used tail index estimates (log-log linear regression and Hill) can give exponents well above the asymptotic limit for α\alpha close to 2, resulting in overestimation of the tail exponent in finite samples. The reported value of the tail exponent α\alpha around 3 may very well indicate a Levy-stable distribution with α≈1.8\alpha\approx 1.8.Comment: To be published in Int. J. Modern Physics C (2001) vol. 12 no.

    Goodness-of-Fit Tests for Symmetric Stable Distributions -- Empirical Characteristic Function Approach

    Full text link
    We consider goodness-of-fit tests of symmetric stable distributions based on weighted integrals of the squared distance between the empirical characteristic function of the standardized data and the characteristic function of the standard symmetric stable distribution with the characteristic exponent α\alpha estimated from the data. We treat α\alpha as an unknown parameter, but for theoretical simplicity we also consider the case that α\alpha is fixed. For estimation of parameters and the standardization of data we use maximum likelihood estimator (MLE) and an equivariant integrated squared error estimator (EISE) which minimizes the weighted integral. We derive the asymptotic covariance function of the characteristic function process with parameters estimated by MLE and EISE. For the case of MLE, the eigenvalues of the covariance function are numerically evaluated and asymptotic distribution of the test statistic is obtained using complex integration. Simulation studies show that the asymptotic distribution of the test statistics is very accurate. We also present a formula of the asymptotic covariance function of the characteristic function process with parameters estimated by an efficient estimator for general distributions

    Systematic inference of the long-range dependence and heavy-tail distribution parameters of ARFIMA models

    Get PDF
    Long-Range Dependence (LRD) and heavy-tailed distributions are ubiquitous in natural and socio-economic data. Such data can be self-similar whereby both LRD and heavy-tailed distributions contribute to the self-similarity as measured by the Hurst exponent. Some methods widely used in the physical sciences separately estimate these two parameters, which can lead to estimation bias. Those which do simultaneous estimation are based on frequentist methods such as Whittle’s approximate maximum likelihood estimator. Here we present a new and systematic Bayesian framework for the simultaneous inference of the LRD and heavy-tailed distribution parameters of a parametric ARFIMA model with non-Gaussian innovations. As innovations we use the α-stable and t-distributions which have power law tails. Our algorithm also provides parameter uncertainty estimates. We test our algorithm using synthetic data, and also data from the Geostationary Operational Environmental Satellite system (GOES) solar X-ray time series. These tests show that our algorithm is able to accurately and robustly estimate the LRD and heavy-tailed distribution parameters

    Comparison of algorithms that detect drug side effects using electronic healthcare databases

    Get PDF
    The electronic healthcare databases are starting to become more readily available and are thought to have excellent potential for generating adverse drug reaction signals. The Health Improvement Network (THIN) database is an electronic healthcare database containing medical information on over 11 million patients that has excellent potential for detecting ADRs. In this paper we apply four existing electronic healthcare database signal detecting algorithms (MUTARA, HUNT, Temporal Pattern Discovery and modified ROR) on the THIN database for a selection of drugs from six chosen drug families. This is the first comparison of ADR signalling algorithms that includes MUTARA and HUNT and enabled us to set a benchmark for the adverse drug reaction signalling ability of the THIN database. The drugs were selectively chosen to enable a comparison with previous work and for variety. It was found that no algorithm was generally superior and the algorithms’ natural thresholds act at variable stringencies. Furthermore, none of the algorithms perform well at detecting rare ADRs

    Mining multi-item drug adverse effect associations in spontaneous reporting systems

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Multi-item adverse drug event (ADE) associations are associations relating multiple drugs to possibly multiple adverse events. The current standard in pharmacovigilance is bivariate association analysis, where each single drug-adverse effect combination is studied separately. The importance and difficulty in the detection of multi-item ADE associations was noted in several prominent pharmacovigilance studies. In this paper we examine the application of a well established data mining method known as association rule mining, which we tailored to the above problem, and demonstrate its value. The method was applied to the FDAs spontaneous adverse event reporting system (AERS) with minimal restrictions and expectations on its output, an experiment that has not been previously done on the scale and generality proposed in this work.</p> <p>Results</p> <p>Based on a set of 162,744 reports of suspected ADEs reported to AERS and published in the year 2008, our method identified 1167 multi-item ADE associations. A taxonomy that characterizes the associations was developed based on a representative sample. A significant number (67% of the total) of potential multi-item ADE associations identified were characterized and clinically validated by a domain expert as previously recognized ADE associations. Several potentially novel ADEs were also identified. A smaller proportion (4%) of associations were characterized and validated as known drug-drug interactions.</p> <p>Conclusions</p> <p>Our findings demonstrate that multi-item ADEs are present and can be extracted from the FDA’s adverse effect reporting system using our methodology, suggesting that our method is a valid approach for the initial identification of multi-item ADEs. The study also revealed several limitations and challenges that can be attributed to both the method and quality of data.</p

    Design of Experiments for Screening

    Full text link
    The aim of this paper is to review methods of designing screening experiments, ranging from designs originally developed for physical experiments to those especially tailored to experiments on numerical models. The strengths and weaknesses of the various designs for screening variables in numerical models are discussed. First, classes of factorial designs for experiments to estimate main effects and interactions through a linear statistical model are described, specifically regular and nonregular fractional factorial designs, supersaturated designs and systematic fractional replicate designs. Generic issues of aliasing, bias and cancellation of factorial effects are discussed. Second, group screening experiments are considered including factorial group screening and sequential bifurcation. Third, random sampling plans are discussed including Latin hypercube sampling and sampling plans to estimate elementary effects. Fourth, a variety of modelling methods commonly employed with screening designs are briefly described. Finally, a novel study demonstrates six screening methods on two frequently-used exemplars, and their performances are compared

    Molecular excitation in the Interstellar Medium: recent advances in collisional, radiative and chemical processes

    Full text link
    We review the different excitation processes in the interstellar mediumComment: Accepted in Chem. Re

    Positive predictive value of automated database records for diabetic ketoacidosis (DKA) in children and youth exposed to antipsychotic drugs or control medications: a tennessee medicaid study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Diabetic ketoacidosis (DKA) is a potentially life-threatening complication of treatment with some atypical antipsychotic drugs in children and <b>youth</b>. Because drug-associated DKA is rare, large automated health outcomes databases may be a valuable data source for conducting pharmacoepidemiologic studies of DKA associated with exposure to individual antipsychotic drugs. However, no validated computer case definition of DKA exists. We sought to assess the positive predictive value (PPV) of a computer case definition to detect incident cases of DKA, using automated records of Tennessee Medicaid as the data source and medical record confirmation as a "gold standard."</p> <p>Methods</p> <p>The computer case definition of DKA was developed from a retrospective cohort study of antipsychotic-related type 2 diabetes mellitus (1996-2007) in Tennessee Medicaid enrollees, aged 6-24 years. Thirty potential cases with any DKA diagnosis (ICD-9 250.1, ICD-10 E1x.1) were identified from inpatient encounter claims. Medical records were reviewed to determine if they met the clinical definition of DKA.</p> <p>Results</p> <p>Of 30 potential cases, 27 (90%) were successfully abstracted and adjudicated. Of these, 24 cases were confirmed by medical record review (PPV 88.9%, 95% CI 71.9 to 96.1%). Three non-confirmed cases presented acutely with severe hyperglycemia, but had no evidence of acidosis.</p> <p>Conclusions</p> <p>Diabetic ketoacidosis in children and youth can be identified in a computerized Medicaid database using our case definition, which could be useful for automated database studies in which drug-associated DKA is the outcome of interest.</p

    The mimetic politics of lone-wolf terrorism

    Get PDF
    Written at a time of crisis in the project of social and political modernity, Fyodor Dostoevsky’s 1864 novel Notes from Underground offers an intriguing parallel for the twenty-first century lone-wolf; it portrays an abject, outcast, spiteful unnamed anti-hero boiling with rage, bitter with resentment and on the verge of radicalisation. A Girardian reading of the poetic truths contained in Dostoevsky’s work is able to provide important keys to explain the contemporary transformation from ‘fourth-wave’ religious terrorism to ‘fifth-wave’ lone-wolf terrorism. Such a reading argues that it is mimetic rivalry – rather than much-trumpeted forms of religious violence or cultural differences – that fuels the triangular relation between governments, terrorists and civilian victims at heart of terrorist acts. This approach is further able to blend social inquiry with an account of the individual, in fact anthropological, conditions of lone-wolf terrorism by tracing the globalisation of resentment and the individualisation of violence to the hyper-mimeticism characterising the globalisation of late modernity. Finally, a mimetic reading of ‘fifth-wave’ terrorism accounts for the turbulence of a global politics in which victimhood and scapegoating no longer have the ability to stabilise social order and warns against a future where violence proliferates and escalates unchecked
    • 

    corecore