Evaluate the null hypothesis, Database Management System

Assignment Help:

1.Suppose you are given a dataset that consists of a random sample of tasters, on which the following variables were obtained:

(y) Zpref = taste preference for green beans stored in brine solution (data is centered)

(x1) saltc = level of salt in brine

(x2) sugarc = level of sugar in brine

(x3) saltc2 = salt*salt or salt-squared

(x4) sugarc2 = sugar*sugar or sugar-squared

The researchers are interested in how varying the levels of salt and/or sugar in a brine solution influence taste preferences of canned green beans packed in a brine solution. Please answer the following questions.

Notation: You may write models without subscripts

(e.g. y = b0 + b1 x1 + e is fine)

a. Write the full and restricted models which - in a models comparison framework - would evaluate the null hypothesis that neither salt nor sugar have a significant linear or curvilinear relationship with taste preference.

b. Using the full model from part a, write the restricted model that implies that sugar has no influence on taste preference.

c. Suppose you were to see the following SAS code in your program editor window:

PROC REG;

MODEL zpref = saltc sugarc saltc2 sugarc2;

QTERMS: Test saltc2=0, sugarc2=0;

In WORDS, what is the hypothesis being tested in the test statement labeled QTERMS?

Write the full and restricted models used to evaluate the QTERMS hypothesis.

d. Compared to the full model in a, write the restricted model that simultaneously implies that a) the linear effect of sugar conditional on level of salt is zero, AND b) the linear effects of salt and sugar are equal to each other, AND c) the curvilinear effects of salt and sugar are equal to each other. Give the SAS PROC REG code needed to evaluate this hypothesis.


Related Discussions:- Evaluate the null hypothesis

Define the term- making common behaviour abstract, Making Common Behaviour ...

Making Common Behaviour Abstract Let us define abstraction "Abstraction means to focus on the necessary, inherent aspects of an entity and ignoring its accidental features". O

What is the need of a log in a dbms, What is the need of a log in a DBMS? B...

What is the need of a log in a DBMS? Briefly describe the various types of records that are normally present in a log.            Ans:  The system log, which is generally writt

What is a phantom deadlock, What is a Phantom Deadlock? In distributed...

What is a Phantom Deadlock? In distributed deadlock detection, the delay in propagating local information might cause the deadlock detection algorithms to recognize deadlocks

Remove partial dependancy, , write the relational schema, and draw the new ...

, write the relational schema, and draw the new dependency diagrams. Identify the normal forms for each table structure you created

How the time stamps are implemented, How the time stamps are implemented ...

How the time stamps are implemented Use the value of the system clock as the time stamp. That is a transaction's time stamp is equivalent to the value of the clock when the tra

Define the concept of object diagram, Define the concept of Object Diagram ...

Define the concept of Object Diagram An object diagram shows a set of the objects and their relationships with each other at a point of time. In a static view, object diagram

Decompose the table - 3nf or bcnf, Decompose the table with the following ...

Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF. A long-standing international treaty am

Differentiate between a unique key and a primary key, Differentiate between...

Differentiate between a unique key and a primary key. - By default, clustered index on column are created by primary key while nonclustered index are created by unique key.

Explain difference between volatile, Explain the difference between the thr...

Explain the difference between the three storage types - volatile, non volatile and stable.             Ans: Volatile storage: if storage media loses data while power goes off,

Wound-wait scheme-deadlock prevention, " Wound-wait" scheme : It is based o...

" Wound-wait" scheme : It is based on a preemptive method. It is based on a simple rule:                   If Ti requests a database resource that is held by Tj

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd