936 resultados para Class analysis


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Latent class regression models are useful tools for assessing associations between covariates and latent variables. However, evaluation of key model assumptions cannot be performed using methods from standard regression models due to the unobserved nature of latent outcome variables. This paper presents graphical diagnostic tools to evaluate whether or not latent class regression models adhere to standard assumptions of the model: conditional independence and non-differential measurement. An integral part of these methods is the use of a Markov Chain Monte Carlo estimation procedure. Unlike standard maximum likelihood implementations for latent class regression model estimation, the MCMC approach allows us to calculate posterior distributions and point estimates of any functions of parameters. It is this convenience that allows us to provide the diagnostic methods that we introduce. As a motivating example we present an analysis focusing on the association between depression and socioeconomic status, using data from the Epidemiologic Catchment Area study. We consider a latent class regression analysis investigating the association between depression and socioeconomic status measures, where the latent variable depression is regressed on education and income indicators, in addition to age, gender, and marital status variables. While the fitted latent class regression model yields interesting results, the model parameters are found to be invalid due to the violation of model assumptions. The violation of these assumptions is clearly identified by the presented diagnostic plots. These methods can be applied to standard latent class and latent class regression models, and the general principle can be extended to evaluate model assumptions in other types of models.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A protein of a biological sample is usually quantified by immunological techniques based on antibodies. Mass spectrometry offers alternative approaches that are not dependent on antibody affinity and avidity, protein isoforms, quaternary structures, or steric hindrance of antibody-antigen recognition in case of multiprotein complexes. One approach is the use of stable isotope-labeled internal standards; another is the direct exploitation of mass spectrometric signals recorded by LC-MS/MS analysis of protein digests. Here we assessed the peptide match score summation index based on probabilistic peptide scores calculated by the PHENYX protein identification engine for absolute protein quantification in accordance with the protein abundance index as proposed by Mann and co-workers (Rappsilber, J., Ryder, U., Lamond, A. I., and Mann, M. (2002) Large-scale proteomic analysis of the human spliceosome. Genome Res. 12, 1231-1245). Using synthetic protein mixtures, we demonstrated that this approach works well, although proteins can have different response factors. Applied to high density lipoproteins (HDLs), this new approach compared favorably to alternative protein quantitation methods like UV detection of protein peaks separated by capillary electrophoresis or quantitation of protein spots on SDS-PAGE. We compared the protein composition of a well defined HDL density class isolated from plasma of seven hypercholesterolemia subjects having low or high HDL cholesterol with HDL from nine normolipidemia subjects. The quantitative protein patterns distinguished individuals according to the corresponding concentration and distribution of cholesterol from serum lipid measurements of the same samples and revealed that hypercholesterolemia in unrelated individuals is the result of different deficiencies. The presented approach is complementary to HDL lipid analysis; does not rely on complicated sample treatment, e.g. chemical reactions, or antibodies; and can be used for projective clinical studies of larger patient groups.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the Iron Range Strike of 1916, working-class wives picketed alongside their husbands in a conflict-ridden and dangerous setting. Mine deputies abused immigrant women on the picket lines and in their homes, with several disquieting reports receiving statewide attention in Minnesota. Many middle-class reformers in the Twin Cities grew sympathetic to the plight of northern mining families and became controversially involved the labor struggle. Some middleclass women worked alongside working-class wives and radical organizers from the Industrial Workers of the World (IWW). At the center of this gendered analysis is the cross-class cooperation between an upper-middle class woman, Lenora Austin Hamlin, a radical reformer, Elizabeth Gurley Flynn, and the story of a working-class housewife, Mikla Masonovich. This study will ask how authentic, prevalent, and unproblematic their stories of cross-class cohesive action actually were. In answering this, it will address and identify those factors that impeded women’s potential for unity. “Flash in the Pan” argues that as a result of both real and perceived differences, these networks of women remained isolated, inhibiting each from gaining sufficient power to work cohesively, and marginalizing their influence. Drawing upon a variety of sources, including media representations in newspapers, and archives of social, labor and women’s organizations, this regional study lends state-level insight into the larger gender-labor historiography.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this thesis, we consider Bayesian inference on the detection of variance change-point models with scale mixtures of normal (for short SMN) distributions. This class of distributions is symmetric and thick-tailed and includes as special cases: Gaussian, Student-t, contaminated normal, and slash distributions. The proposed models provide greater flexibility to analyze a lot of practical data, which often show heavy-tail and may not satisfy the normal assumption. As to the Bayesian analysis, we specify some prior distributions for the unknown parameters in the variance change-point models with the SMN distributions. Due to the complexity of the joint posterior distribution, we propose an efficient Gibbs-type with Metropolis- Hastings sampling algorithm for posterior Bayesian inference. Thereafter, following the idea of [1], we consider the problems of the single and multiple change-point detections. The performance of the proposed procedures is illustrated and analyzed by simulation studies. A real application to the closing price data of U.S. stock market has been analyzed for illustrative purposes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While voxel-based 3-D MRI analysis methods as well as assessment of subtracted ictal versus interictal perfusion studies (SISCOM) have proven their potential in the detection of lesions in focal epilepsy, a combined approach has not yet been reported. The present study investigates if individual automated voxel-based 3-D MRI analyses combined with SISCOM studies contribute to an enhanced detection of mesiotemporal epileptogenic foci. Seven consecutive patients with refractory complex partial epilepsy were prospectively evaluated by SISCOM and voxel-based 3-D MRI analysis. The functional perfusion maps and voxel-based statistical maps were coregistered in 3-D space. In five patients with temporal lobe epilepsy (TLE), the area of ictal hyperperfusion and corresponding structural abnormalities detected by 3-D MRI analysis were identified within the same temporal lobe. In two patients, additional structural and functional abnormalities were detected beyond the mesial temporal lobe. Five patients with TLE underwent epileptic surgery with favourable postoperative outcome (Engel class Ia and Ib) after 3-5 years of follow-up, while two patients remained on conservative treatment. In summary, multimodal assessment of structural abnormalities by voxel-based analysis and SISCOM may contribute to advanced observer-independent preoperative assessment of seizure origin.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: In recent years, treatment options for human immunodeficiency virus type 1 (HIV-1) infection have changed from nonboosted protease inhibitors (PIs) to nonnucleoside reverse-transcriptase inhibitors (NNRTIs) and boosted PI-based antiretroviral drug regimens, but the impact on immunological recovery remains uncertain. METHODS: During January 1996 through December 2004 [corrected] all patients in the Swiss HIV Cohort were included if they received the first combination antiretroviral therapy (cART) and had known baseline CD4(+) T cell counts and HIV-1 RNA values (n = 3293). For follow-up, we used the Swiss HIV Cohort Study database update of May 2007 [corrected] The mean (+/-SD) duration of follow-up was 26.8 +/- 20.5 months. The follow-up time was limited to the duration of the first cART. CD4(+) T cell recovery was analyzed in 3 different treatment groups: nonboosted PI, NNRTI, or boosted PI. The end point was the absolute increase of CD4(+) T cell count in the 3 treatment groups after the initiation of cART. RESULTS: Two thousand five hundred ninety individuals (78.7%) initiated a nonboosted-PI regimen, 452 (13.7%) initiated an NNRTI regimen, and 251 (7.6%) initiated a boosted-PI regimen. Absolute CD4(+) T cell count increases at 48 months were as follows: in the nonboosted-PI group, from 210 to 520 cells/muL; in the NNRTI group, from 220 to 475 cells/muL; and in the boosted-PI group, from 168 to 511 cells/muL. In a multivariate analysis, the treatment group did not affect the response of CD4(+) T cells; however, increased age, pretreatment with nucleoside reverse-transcriptase inhibitors, serological tests positive for hepatitis C virus, Centers for Disease Control and Prevention stage C infection, lower baseline CD4(+) T cell count, and lower baseline HIV-1 RNA level were risk factors for smaller increases in CD4(+) T cell count. CONCLUSION: CD4(+) T cell recovery was similar in patients receiving nonboosted PI-, NNRTI-, and boosted PI-based cART.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

When changing the API of a framework, we need to migrate its clients. This is best done automatically. In this paper, we focus on API migration where the mechanism for inversion of control changes. We propose to use dynamic analysis for such API migration since structural refactorings alone are often not sufficient. We consider JExample as a case-study. JExample extends JUnit with first-class dependencies and fixture injection. We investigate how dynamically collected information about test coverage and about instances under test can be used to detect dependency injection candidates.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This contribution addresses the substantial tax privilege for businesses introduced by the German Inheritance Tax Act 2009. Advocates of the vast or even entire tax exemption for businesses stress the potential damage of the inheritance tax on businesses, as those often lack liquidity to meet tax liability. This submission tackles this issue empirically based on data of the German Inheritance Tax Statistics and the SOEP. The results indicate that former German inheritance tax law has not endangered transferred businesses. Hence, there is no need for the tremendous tax privilege for businesses in current German inheritance tax law. An alternative flat inheritance tax without tax privileges, which meets revenue neutrality per tax class according to current tax law, provokes in some cases relative high tax loads which might trouble businesses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the adaptations of the writing system in Internet language in mainland China from a sociolinguistic perspective. A comparison is also made of the adaptations in mainland China with those that Su (2003) found in Taiwan. In Computer-Mediated Communication (CMC), writing systems are often adapted to compensate for their inherent inadequacies (such as difficulty in input). Su (2003) investigates the creative uses of the writing system on the electronic bulletin boards (BBS) of two college student organizations in Taipei, Taiwan, and identifies four popular and creative uses of the Chinese writing system: stylized English, stylized Taiwanese-accented Mandarin, stylized Taiwanese, and the recycling of a transliteration alphabet used in elementary education. According to Coupland (2001; cited in Su 2003), stylization is “the knowing deployment of culturally familiar styles and identities that are marked as deviating from those predictably associated with the current speaking context”. Within this framework and drawing on the data in previous publications on Internet language and online sources, this study identifies five types of adaptations in mainland China’s Internet language: stylized Mandarin (e.g., 漂漂 piāopiāo for 漂亮 ‘beautiful’), stylized dialect-accented Mandarin (e.g., 灰常 huīcháng for 非常 ‘very much’), stylized English (e.g., 伊妹儿 yīmèier for ‘email’), stylized initials (e.g., bt 变态 biàntài for ‘abnormal’; pk, short form for ‘player kill’), and stylized numbers (e.g., 9494 jiùshi jiùshi 就是就是 ‘that is it’). The Internet community is composed of highly mobile individuals and thus forms a weak-tie social network. According to Milroy and Milroy (1992), a social network with weak ties is often where language innovation takes place. Adaptations of the Chinese writing system in Internet language provide interesting evidence for the innovations within a weak-tie social network. Our comparison of adaptations in mainland China and Taiwan shows that, in maximizing the effectiveness and functionality of their communication, participants of Internet communication are confronted with different language resources and situations, including differences in Romanization systems, English proficiency level, and attitudes towards English usage. As argued by Milroy and Milroy (1992), a weak-tie social network model can bridge the social class and social network. In the Internet community, the degree of diversity of the stylized linguistic varieties indexes the virtual and/or social status of its participants: the more diversified one’s Internet language is, the higher is his/her virtual and/or social status.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fifty members of a novel class of antimicrobial compounds, 2-(4-R-phenoxymethyl)benzoic acid thioureides, were synthesized and characterized with respect to their activities against three parasites of human relevance, namely the protozoa Giardia lamblia and Toxoplasma gondii, and the larval (metacestode) stage of the tapeworm Echinococcus multilocularis. To determine the selective toxicity of these compounds, the human colon cancer cell line Caco2 and primary cultures of human foreskin fibroblasts (HFF) were also investigated. The new thioureides were obtained in a three-step-reaction process and subsequently characterized by their physical constants (melting point, solubility). The chemical structures were elucidated by (1)H NMR, (13)C NMR, IR spectral methods and elemental analysis. The analyses confirmed the final and intermediate compound structures and the synthesis. The compounds were then tested on the parasites in vitro. All thioureides, except two compounds with a nitro group, were totally ineffective against Giardia lamblia. 23 compounds inhibited the proliferation of T. gondii, three of them with an IC(50) of approximately 1 microM. The structural integrity of E. multilocularis metacestodes was affected by 22 compounds. In contrast, HFF were not susceptible to any of these thioureides, while Caco2 cells were affected by 17 compounds, two of them inhibiting proliferation with an IC(50) in the micromolar range. Thioureides may thus present a promising class of anti-infective agents.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although an increasing number of studies of technological, institutional and organizational change refer to the concepts of path dependence and path creation, few attempts have been made to consider these concepts explicitly in their methodological accounts. This paper addresses this gap and contributes to the literature by developing a comprehensive methodology that originates from the concepts of path dependence and path creation – path constitution analysis (PCA) – and allows for the integration of multi-actor constellations on multiple levels of analysis within a process perspective. Based upon a longitudinal case study in the field of semiconductors, we illustrate PCA ‘in action’ as a template for other researchers and critically examine its adequacy. We conclude with implications for further path-oriented inquiries.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With a steady increase of regulatory requirements for business processes, automation support of compliance management is a field garnering increasing attention in Information Systems research. Several approaches have been developed to support compliance checking of process models. One major challenge for such approaches is their ability to handle different modeling techniques and compliance rules in order to enable widespread adoption and application. Applying a structured literature search strategy, we reflect and discuss compliance-checking approaches in order to provide an insight into their generalizability and evaluation. The results imply that current approaches mainly focus on special modeling techniques and/or a restricted set of types of compliance rules. Most approaches abstain from real-world evaluation which raises the question of their practical applicability. Referring to the search results, we propose a roadmap for further research in model-based business process compliance checking.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article provides a legal and economic analysis of private copying levies in the EU, against the background of the Copyright Directive (2001/29), a number of recent rulings by the European Court of Justice and the recommendations presented by mediator Vitorino earlier this year. It concludes that notwithstanding these rulings and recommendations, there remains a lack of concordance on the relevance of contractual stipulations and digital rights management technologies (DRM) for setting levies, and the concept of harm. While Mr Vitorino and AG Sharpston (in the Opinion preceding VG Wort v. Kyocera) use different lines of reasoning to argue that levies raised on authorised copies would lead to double payment, the Court of Justice’s decision in VG Wort v. Kyocera seems to conclude that such copies should nonetheless be levied. If levies are to provide fair compensation for harm resulting from acts of private copying, economic analysis suggests one should distinguish between various kinds of private copies and take account of the extent to which the value said copies have for consumers can be priced into the purchase. Given the availability of DRM (including technical protection measures), the possibility of such indirect appropriation leads to the conclusion that the harm from most kinds of private copies is de minimis and gives no cause for levies. The user value of copies from unauthorised sources (e.g. from torrent networks or cyber lockers), on the other hand, cannot be appropriated indirectly by rightholders. It is, however, an open question in references for preliminary rulings pending at the Court of Justice whether these copies are included in the scope of the private copying exception or limitation and can thus be levied for. If they are not, as currently happens in several EU Member States, legal and economic analysis leads to the conclusion that the scope of private copying acts giving rise to harm susceptible of justifying levies is gradually diminishing.