similar to: investigating interactions with mixed models

Displaying 20 results from an estimated 400 matches similar to: "investigating interactions with mixed models"

2007 Jul 05
0
t-values for two-way interactions
I have a model with 3 fixed factors (type, stress, MorD) and two significant two-way interactions (type*stress, stress*MorD). x$summary # Estimate Std.Error DF t.value pvals ci950 ci990 ci999 #(Intercept) 241.738 8.757 994 27.606 0e+00 TRUE TRUE TRUE #typePsPr -26.516 5.905 994 -4.490 1e-05 TRUE TRUE TRUE #stressPN -21.820
2011 Apr 21
2
dovecot.org broken
Serving it temporarily from a machine in my home. I'll move it to better hosting in a few days. And I guess I should make it more fail safe some day soon.. Lets see if mailman happens to work now.
2011 Apr 21
0
dovecot.org broken
am 21.04.11 20:31 schrieb Timo Sirainen <tss at iki.fi>: > Serving it temporarily from a machine in my home. I'll move it to better hosting in a few days. And I guess I should make it more fail safe some day soon.. > > Lets see if mailman happens to work now. > yes, it works ;) -- Mit freundlichen Gr??en, Jim Knuth P.S.: Bitte HTML-Mails! Zufallszitat: Sport ist Mord
2006 Oct 06
2
lmer output
When I do lmer models I only get Estimate, Standard Error and t value in the output for the fixed effects. Is there a way I get degrees of freedom and p values as well? I'm a very new to R, so sorry if this a stupid question. Thank you - Mike Mike Ford Centre for Speech and Language Department of Experimental Psychology Downing Street Cambridge CB2 3EB Tel: +44 (0) 1223 766559 Fax: +44
2009 Jun 10
2
Vista + R = *!!?@
Hello People of R, Is there any way that I can get R to function properly using Vista. I get very strange output using lmer, as in no p-values. Is there ANY way I can fix this. Thank you for your time, John Townsend-Mehler PhD Candidate Department of Zoology Michigan State University
2008 Aug 01
2
How to get the p-value from lmer on a longitudinal analysis
Hi, I have a modelo like this: Yvar <- c(0, 0, 0, 0, 1, 0, 0, 0, 1, 2, 1, 1, 2, 3, 6, 6, 3, 3, 4) TIME <- 4:22 ID <- rep("PlotA",19) m <- lmer(Yvar~TIME+(TIME|ID),family=poisson) anova(m) summary(m) How to get the p-value for this case? Thanks Ronaldo -- Just because you're paranoid doesn't mean they AREN'T after you. -- > Prof. Ronaldo Reis J?nior |
2007 Feb 20
1
Simplification of Generalised Linear mixed effects models using glmmPQL
Dear R users I have built several glmm models using glmmPQL in the following structure: m1<-glmmPQL(dev~env*har*treat+dens, random = ~1|pop/rep, family = Gamma) (full script below, data attached) I have tried all the methods I can find to obtain some sort of model fit score or to compare between models using following the deletion of terms (i.e. AIC, logLik, anova.lme(m1,m2)), but I
2008 Aug 01
1
Major difference in the outcome between SPSS and R statisticalprograms
First off, Marc Schwartz posted this link earlier today, read it. http://cran.r-project.org/doc/FAQ/R-FAQ.html#Why-are-p_002dvalues-not-di splayed-when-using-lmer_0028_0029_003f Second, your email is not really descriptive enough. I have no idea what OR is, so I have no reaction. Third, you're comparing estimates from different methods of estimation. lmer will give standard errors that
2012 Feb 23
0
Investigating what actually happens / debugging
In short, I have an application which executes another application, a so called client loader. I would simply like to know which parameter the client loader passes to the other executable. It seems to me that this should not be hard to do, but I have not been able to figure out how. Please enlighten me in case you know how this may be achieved. In short, I'd like to execute the application
2015 Jan 28
0
Investigating international calls fraud
Le 28/01/2015 22:03, Steven McCann a ?crit : > Hello, Hi > > I'm investigating a situation where there was a hundreds of minutes of > calls from an internal SIP extension to an 855 number in Cambodia, > resulting in a crazy ($25,000+) bill from the phone company. I'm > investigating, but can anyone provide some feedback on what's happened > here? I'm
2015 Jan 28
0
Investigating international calls fraud
I?ve seen the following exploits of Asterisk / FreePBX boxes: 1) Default PlcmSpIp username and password for Polycom provisioning 2) Insecure SIP usernames and secrets 3) FreePBX GUI accessable from the internet 4) OS remote exploit (maybe ssh/ssl exploit) Mitigation options: 1) Don?t use an easy to guess or default password on provisioning servers. 2) Use secure secrets. Users never
2013 Aug 28
0
Investigating memory performance: bare metal vs. xen-pv vs. xen-hvm
I''ve been trying to compare memory access speed between bare-metal, xen-pv and xen-pvhvm (hvm with pv drivers). In all 3 setups I''m running the same kernel (3.6.6), built with support for xen, on a 64 core AMD Opteron 6378. The output of xm info (relevant parts): machine : x86_64 nr_cpus : 64 nr_nodes : 8 cores_per_socket : 16
2015 Jan 29
0
Investigating international calls fraud
It's very unlikely that this was an employee calling Mom for 66 hours (I'm assuming these calls appeared on a single bill). It's also unlikely that someone "inside" would benefit financially from making these calls. (Follow the money!) Don't discount the possibility that you've overlooked something in the firewall. Meanwhile, does the client need to do international
2015 Jan 28
0
Investigating international calls fraud
Hmm the calls are made during the day (and sometimes very early in the morning). Right now it looks like someone actually made these calls. If that is the case it's somewhat comforting to know the system wasn't compromised. However, the $25,000 phone bill still remains. Yikes. $6.25 per minute to Cambodia seems quite steep to me. On Wed, Jan 28, 2015 at 6:07 PM, Duncan Turnbull <duncan
2015 Jan 29
1
Investigating international calls fraud
Did you have a look at the phone it self already? Is call forwarding activated or something and can you call the phone/extension from externally? I have seen this in the past where an employee enabled call forwarding on the phone and once at home he or family called the phone which forwarded the call to abroad. Good luck. Michel. Op 29-01-15 om 12:51 schreef dk at donkelly.biz: > It's
2015 Jan 28
1
Investigating international calls fraud
You don't mention if the phone is remote, or local. Although you do mention it had a default user/pass. If the UI of the phone was/is accessible from the I'net, the GUI does have the ability to place a call from it, that is one way the calls could have been placed. From: asterisk-users-bounces at lists.digium.com [mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of Steven
2008 Oct 15
1
investigating interaction term for a model of Gross Primary Productivity
I am trying to investigate the interaction term in the below. The paradigm in aquatic systems is that algal production is either nitrogen (TIN) or Phosphorus limited, and I am trying to investigate this- what is the best way to go about investigating the interaction term. I have some thoughts on the above, but I will withhold them to see what others think. Thanks for your help. d <-
2010 Aug 26
1
Investigating suspected cache corruption
Hi David and all, I?ve read the mail you posted in the Dovecot list. We?re are having this same problem in a site which is very similar to yours. We also migrated from Courier to Dovecot nearly 9 months ago, and every now and then users complain about slowness in the imap connection. We fix it by removing the index files in the user's maildir. We use Horde as webmail, but the problem
2009 Oct 14
1
Investigating suspected cache corruption
Hi All, I'm running Dovecot 1.1.11 for a site of about 7000 active users with a Squirrelmail frontend. We migrated from Courier (big shout to everyone who worked on the wonderful part of the Dovecot wiki that deals with Courier migration) and I have been extremely happy with the performance gains Dovecot has given us. Not only is the IMAP part of Squirrelmail faster, but our same
2015 Jan 28
1
Investigating international calls fraud
Do you have DISA setup? We're seeing lots of attackers running scripts that send digits until they strike a DISA, misconfigured mailbox, etc. (Assuming it wasn't a stupid employee forwarding an inbound call to a 9xxxxxxx number etc). Have a look at SecAst (www.generationd.com) - it detects callers sending too many digits, monitors digit dialing speeds, etc. to help identify and block