Fit a discrete time log it model to the expanded data set

Assignment Help Basic Computer Science
Reference no: EM131222449

Fit a discrete time log it model to the expanded data set considering the same predictors of first onset of GAD used to fit the Cox model (AG4CAT and SEXF). Make sure to recognize the complex design features when fitting the model, and don't forget to include age as a predictor in the model (see Section 10.5.5). Based on the design adjusted tests of significance for the parameters in this model, would we make the same inferences about the differences in the hazards for the four age groups and for females compared with males? Generate a table comparing the estimated odds ratios from the discrete time log it approach to the estimated hazard ratios from the Cox modeling approach.

Reference no: EM131222449

Questions Cloud

Does this assumption seem justified : (Stata Only) Test the assumption of proportional hazards for the four age groups using the graphical methods discussed in this chapter. Does this assumption seem justified? What would be an alternative analytic approach if this assumption seems vi..
Define the key success factors in the chosen industry : Analyze your organization's internal strengths and weaknesses. Consider factors such as personnel, finances, manufacturing capabilities, corporate culture, product or service pricing, current promotion, and so on.
Financial statement analysis : What is the acid-test ratio for the current year? What is the inventory turnover for the current year? What is days' sales in receivables for the current year?
Generate a table showing the data structure : Generate a table showing the data structure for the first two respondents in the NCS-R data set.
Fit a discrete time log it model to the expanded data set : Generate a table comparing the estimated odds ratios from the discrete time log it approach to the estimated hazard ratios from the Cox modeling approach.
Do students play chess game or just go watch a movie : In this report, you are going to survey American students on what they do in their leisure time. Do they play chess game or just go watch a movie?
Examine simple descriptive statistics for these variables : Examine simple descriptive statistics for these variables (means, proportions, ranges, and counts of missing values) keeping in mind that the full n is 5,334. Use a software tool of choice for this step.
Calculate the price of the bonds : Assuming that the yield to maturity of each bond remains at 8.4% over the next 4 years, calculate the price of the bonds at each of the following years to maturity. Round your answer to the nearest cent.
Supply chain flexibility and supply chain quality management : OMGT2087 - Logistics System - supply chain flexibility and supply chain quality management - provide critical analysis on the recent literature review in logistics/supply chain performance indicators and logistics/supply chain practices

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Follow the five steps of persuasion

Follow the five steps of persuasion: establishing credibility, acknowledging the audience's position, constructing a rationale, transplanting root elements, and asking for a response. Clearly define your position and supporting evidence, includi..

  Proposals coming from contractors who have unique skills

Proposals coming from contractors who have unique skills in providing goods and services are called:    a. best and final offers (BAFOs)    b. negotiated proposals

  Prevailing standards for wages and working conditions

Should a company like Apple require supplier to exceed- not just match- the prevailing standards for wages and working conditions in their home countries?

  When you need to return the value of a function

In C programming: When you need to return the value of a function and you are not allowed to use the normal return value of the function, could you do it using: Call_by_val or Call_by_reference?

  The insertion sort algorithm is employed

In some cases the insertion sort algorithm is employed with this algorithm as the list size grows smaller, explain why the bubble sort may not be the better choice

  Share your ideas and thoughts

When a hacker attacks a system, his primary concern is to erase any kind of digital footprints, which makes him invisible. The data recovery completely depends upon the intensity of the attack. With modern algorithms and data recovery techniques, ..

  Verify local police department-s findings on current case

Your computer investigation firm has been hired to verify local police department's findings on current case. Tension over the case is running high in the city.

  Create longitudinal records for the females

create longitudinal records for the females.

  Write a program that computes the quotient and remainder

Write a program that computes the quotient and remainder using IJVM instructions and mic1 software. Please provide IJVM instructions!

  Evaluate following integrals using simpson rule

Evaluate following integrals using simpson's rule and corrected simpson's rule (or richardson extrapolation in case the corrected simpson's is not applicable). In each case, use n = 2,4,8,16,32.

  Let alone windows

You're working with a typical user who doesn't know much of ANYTHING about computers, let alone Windows. They're notorious for losing track of documents they worked on, and they hate having to go into the Start menu to find programs. List three tw..

  Find the standard form of the equation

Find the standard form of the equation of the hyperbola satisfying the given conditions. Endpoints of transverse axis: (-6, 0), (6, 0); foci: (-7, 0), (-7, 0)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd