1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RSB [31]
2 years ago
14

Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error

rates obtained for M1 are 30.5, 32.2, 20.7, 20.6,31.0, 41.0, 27.7, 26.0, 21.5, 26.0. The error rates for M1 are 22.4, 14.5, 22.4, 19.6,20.7, 20.4, 22.1, 19.4, 16.2, 35.0.
Is one model significantly better than the other considering a significance level of 1%.?
Computers and Technology
1 answer:
Ksivusya [100]2 years ago
6 0

Answer:

Since the calculated t value does not fall in the critical region we accept H0 and  conclude that  one model is not significantly better than the other at 1% level of significance.

Explanation:

When the observations from two samples are paired either naturally or by design , we find the difference between two observations of each pair. Treating the differences as a random sample from a normal population with mean μd =μ1-μ2 and unknown standard deviation σd we perform one sample t- test on them. This is called paired difference t- test.

M1               M2           Difference            d²

                                  d= (M1-M2)

30.5,         22.4,         8.1                       65.61          

32.2,       14.5,           17.7                      313.29

20.7,       22.4,          -1.7                       8.3521

20.6,       19.6,             1.0                        1

31.0,       20.7,             10.3                     106.09

41.0,      20.4,             20.6                    424.36

27.7,      22.1,              5.6                      31.36

26.0,      19.4,            6.6                         43.56

21.5,       16.2,            5.3                         28.09                    

<u>26.0.       35.0.            -9.0                      81.0          </u>

<u>∑ 329.2     213.1           64.5                    1102.7121</u>

<u />

<u>Now </u>

d` = ∑di/n = 64.5/10= 6.45

sd² = ∑(di-d`)²/n-1= 1/n-1 [ ∑di²- (∑di)²/n]

     =1/9[ 1102.7121 - (64.5)²/10 ]

       =[1102.7121 - 416.025/9]

       = 79.298

sd= 8.734

We state our null and alternate hypotheses as

H0 : μd= 0   and Ha: μd≠0

The significance level is set at ∝ = 0.01

The test statistic under H0  is

t= d`/ sd/√n

which has a t distribution with n-1 degrees of freedom.

The critical region is  t ≥ t (0.005,9)= 3.250

Calculating t

t= 6.45 / 8.734/ √10

t = 6.45 / 8.734/3.162

t= 6.45 / 2.7621

t= 2.335

Since the calculated t value does not fall in the critical region we accept H0 and  conclude that  one model is not significantly better than the other at 1% level of significance.

You might be interested in
A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used?
riadik2000 [5.3K]

Answer:

c

Explanation:

3 0
2 years ago
Read 2 more answers
A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in th
Natalka [10]

Answer:

c. The share to the file server is disconnected.

Explanation:

Sharing a file to the file server is the same as saving the document to the file server as the most important function of file server is storage. Therefore if one is getting an error message of not being able to find the saved file and to verify the location of '\\FileServer\Docs', it means that the saved files are no longer available anywhere on the server and even in the computer of the user.

8 0
3 years ago
Read 2 more answers
In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
Brrunno [24]

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

5 0
3 years ago
Read 2 more answers
QUICKLY PLEASE!!!
Elza [17]

Answer: As the conventional etiquette, which lays out rules of ethics in social contexts, the purpose of netiquette is to help create and sustain a friendly, relaxed and productive atmosphere for online contact, as well as to avoid putting pressure on the system and creating tension between users.

Explanation:

7 0
3 years ago
What is a symbol such as a heavy dot or another character that precedes a text in a power point
Fantom [35]

Answer:

<em>I </em><em>think </em><em>the </em><em>answer </em><em>is </em><em>a </em><em>bullet.</em>

<em>Hope </em><em>this </em><em>helps</em>

4 0
1 year ago
Other questions:
  • Which network could NOT carry commercial traffic?
    5·1 answer
  • Which of the following matching is true concerning the Protocol Data Unit (PDU) and its corresponding OSI layer location?
    15·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational sta
    13·1 answer
  • Check examples of a good work ethic. *
    6·1 answer
  • Ann needs to share information about a new hiring policy. She needs to communicate this information to more than one hundred emp
    15·2 answers
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • Edhesive 3.5 code practice quetion one
    9·1 answer
  • What is 2+2 I need to know hurry
    12·2 answers
  • 7. A(n) is the address of a document or other file accessible on the Internet.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!