Examine the deviance/df statistics for each model

Assignment Help Basic Computer Science
Reference no: EM131241192

Margolin et al. (1981) provide data showing the number of revertant colonies of Salmonella in response to varying doses of quinoline. There are six different dose levels, and three independent observations per dose. The data are provided in the data frame salmonella from the aod package.

(a) Notice that the spacings among the dose levels are approximately constant on a log scale. Plot the response (y) against both dose and base-10 log-dose (log10(y+1)) and comment on any apparent trends. Note that we use base 10 here because the dose levels 10, 100, and 1000 are simply 1, 2, and 3 in base-10 log. The +1 is used in the log here because log10 0 is not defined, but log10 1 = 0. In this problem all logs should be taken this way.

(b) Estimate a Poisson regression model for y with either dose, log-dose, or a categorical version of dose (treat dose as a six-level categorical factor by using factor(dose) in the formula) as an explanatory variable. What conclusions can you draw based on tests for a dose effect?

(c) Examine the deviance/df statistics for each model. Do the model fits appear to be good? Explain.

(d) Plot the standardized residuals against fitted means for the two models that use dose in a numerical manner. Comment on what these plots tell you.

(e) Plot standardized residuals against fitted means for the model treating dose as categorical. There is no question about the linearity of the response or the appropriateness of the link function here. What does this plot suggest?

Reference no: EM131241192

Questions Cloud

State the merchandise should be included in inventory : In an annual audit on December 31, 2016, Novelty Company provided the following transactions: State whether the merchandise should be included in the inventory on December 31, 2016 and state the reason for each item
Conduct an influence analysis and draw conclusions : Re-estimate the logistic regression without observation 14 in the data set. For both the model with and without this observation, compare confidence intervals for the parameters, and plot the estimated probability of O-ring failure against tempera..
What is value of a 2 year fixed for floating compound swap : What is the value of a 2-year fixed-for-floating compound swap where the principal is $100 million and payments are made semiannually.
Consider monopolist with production cost function : Consider a monopolist with production cost function 40 + 20x, where x is the amount produced. Let D(p) = 50 - p/2 be the demand-price relationship. What is the elasticity of demand at the price p = 20. At the price p = 44, if the monopolist wishes to..
Examine the deviance/df statistics for each model : Plot standardized residuals against fitted means for the model treating dose as categorical. There is no question about the linearity of the response or the appropriateness of the link function here. What does this plot suggest?
What is the value of a 5 year swap : What is the value of a 5-year swap where LIBOR is paid in the usual way and in return LIBOR compounded at LIBOR is received on the other side?
Is sufficient data to determine profit maximizing price : You face a market of 30,000 buyers divided into 2 segments (A and B). The two segments are potentially different. From each segment you have picked a random sample and offered them a price. Assume that the demand curve(s), as usual, is a straight lin..
Perform the osius-rojek and stukel tests and draw conclusion : Perform the Hosmer-Lemeshow test using 10 groups. State hypotheses, test statistic, p-value, and conclusions. Also, examine the Pearson residuals from the groupings and indicate whether they show any particular pattern.
What is the reasoning for each main claim : What are the main claims of the paper? What is the reasoning for each main claim? What evidence is provided? What did you get from the paper?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Legal underpinnings of business law

The businesses are being sued for breach of contract. Create a matrix that lists each business, and compare and contrast your personal liability exposure as an owner as a result of the lawsuit.

  Demonstrate an ability to follow and fulfil specifications

Demonstrate technical proficiency through the successful and confident utilisation of the software techniques and tools demonstrated in the tutorial.

  Advantages and disadvantages of a multi-user os

Determine whether or not Windows (e.g., Vista, 7, 8, and 10) can be considered a multi-user operating system. Provide a rationale for your response.

  Discuss insertion and deletion and modification anomalies

Discuss insertion, deletion, and modification anomalies. Why are they considered bad. Illustrate with examples.

  View several videos from the scholars of change website

Reflect on how you would like to harness all you have learned to be an agent for social change in your community as a health care professional.View several videos from the Scholars of Change website.

  Integer expression evaluator this program must use stacks

this program must use stacks in order to evaluate integer expressions. your program need only implement the following

  Does standard unix operating system use nondiscretionary

Does the standard Unix operating system use a nondiscretionary access control? Explain your answer.

  Describe and explain internet protocol security

Group Portion As a group, describe and explain Internet protocol security (IPSec), and then as a group, decide who will be assigned the following topic or question: What are the services that are provided by IPSec?

  Intrinsic value of valero energy corp

Use the most recent financial reports of the chosen firm to calculate the intrinsic value of the stock. For this assignment, you will use two valuation methods to derive the firm's intrinsic value; an equity valuation model (specified below) and t..

  Which value border-collapse will give each cell of a table

Which value of border-collapse will give each cell of a table a border that can be specified independently of adjacent cells

  Define the purpose of any necessary triggers

Assume that COMPUTER_ASSIGNMENT in the EMPLOYEE-to-COMPUTER_ASSIGNMENT relationship is now mandatory (i.e., every employee must have at least one computer). Use Figure 6-28(b) as a boilerplate to define triggers for enforcing the required child be..

  Two mobile network routing protocols

OLSR and DSR are two mobile network routing protocols. Refer to [1] and briefly (in one paragraph) describe their similarities and differences.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd