NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Yamaguchi, Kazuhiro; Okada, Kensuke – Journal of Educational and Behavioral Statistics, 2020
In this article, we propose a variational Bayes (VB) inference method for the deterministic input noisy AND gate model of cognitive diagnostic assessment. The proposed method, which applies the iterative algorithm for optimization, is derived based on the optimal variational posteriors of the model parameters. The proposed VB inference enables…
Descriptors: Bayesian Statistics, Statistical Inference, Cognitive Measurement, Mathematics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Karabatsos, George – Grantee Submission, 2017
This article introduces a Bayesian method for testing the axioms of additive conjoint measurement. The method is based on an importance sampling algorithm that performs likelihood-free, approximate Bayesian inference using a synthetic likelihood to overcome the analytical intractability of this testing problem. This new method improves upon…
Descriptors: Bayesian Statistics, Measurement, Statistical Analysis, Statistical Inference
Peer reviewed Peer reviewed
Direct linkDirect link
Lu, Zhenqiu Laura; Zhang, Zhiyong; Lubke, Gitta – Multivariate Behavioral Research, 2011
"Growth mixture models" (GMMs) with nonignorable missing data have drawn increasing attention in research communities but have not been fully studied. The goal of this article is to propose and to evaluate a Bayesian method to estimate the GMMs with latent class dependent missing data. An extended GMM is first presented in which class…
Descriptors: Bayesian Statistics, Statistical Inference, Computation, Models
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference