Found 522 packages in 0.02 seconds
Penalized Log-Density Estimation Using Legendre Polynomials
We present a penalized log-density estimation method using Legendre polynomials with lasso penalty to adjust estimate's smoothness. Re-expressing the logarithm of the density estimator via a linear combination of Legendre polynomials, we can estimate parameters by maximizing the penalized log-likelihood function. Besides, we proposed an implementation strategy that builds on the coordinate decent algorithm, together with the Bayesian information criterion (BIC).
Relative Risk Regression Using the Log-Binomial Model
Methods for fitting log-link GLMs and GAMs to binomial data, including EM-type algorithms with more stable convergence properties than standard methods.
Fit Log-Ratio Lasso Regression for Compositional Data
Log-ratio Lasso regression for continuous, binary, and survival outcomes with (longitudinal) compositional features. See Fei and others (2024)
Odd Log-Logistic Generalized Gamma Probability Distribution
Density, distribution function, quantile function and random generation for the Odd Log-Logistic Generalized Gamma proposed in Prataviera, F. et al (2017)
Fits the Bayesian Piecewise Linear Log-Hazard Model
Contains posterior samplers for the Bayesian piecewise linear log-hazard and piecewise exponential hazard models, including Cox models. Posterior mean restricted survival times are also computed for non-Cox an Cox models with only treatment indicators. The ApproxMean() function can be used to estimate restricted posterior mean survival times given a vector of patient covariates in the Cox model. Functions included to return the posterior mean hazard and survival functions for the piecewise exponential and piecewise linear log-hazard models. Chapple, AG, Peak, T, Hemal, A (2020). Under Revision.
Log-Concave Distribution Estimation with Interval-Censored Data
We consider the non-parametric maximum likelihood estimation of the underlying distribution function, assuming log-concavity, based on mixed-case interval-censored data. The algorithm implemented is base on Chi Wing Chu, Hok Kan Ling and Chaoyu Yuan (2024,
Ordinal Outcomes: Generalized Linear Models with the Log Link
An implementation of the Log Cumulative Probability Model (LCPM) and Proportional Probability Model (PPM) for which the Maximum Likelihood Estimates are determined using constrained optimization. This implementation accounts for the implicit constraints on the parameter space. Other features such as standard errors, z tests and p-values use standard methods adapted from the results based on constrained optimization.
Log File Analysis in International Large-Scale Assessments
Enables users to handle the dataset cleaning for conducting specific analyses with the log files from two international educational assessments: the Programme for International Student Assessment (PISA, < https://www.oecd.org/pisa/>) and the Programme for the International Assessment of Adult Competencies (PIAAC, < https://www.oecd.org/skills/piaac/>). An illustration of the analyses can be found on the LOGAN Shiny app (< https://loganpackage.shinyapps.io/shiny/>) on your browser.
Identify, Ping, and Log Internet Provider Connection Data
To assist you with troubleshooting internet connection issues and assist in isolating packet loss on your network. It does this by allowing you to retrieve the top trace route destinations your internet provider uses, and recursively ping each server in series while capturing the results and writing them to a log file. Each iteration it queries the destinations again, before shuffling the sequence of destinations to ensure the analysis is unbiased and consistent across each trace route.
Parsing, Anonymizing and Visualizing Exported 'WhatsApp' Chat Logs
Imports 'WhatsApp' chat logs and parses them into a usable dataframe object. The parser works on chats exported from Android or iOS phones and on Linux, macOS and Windows. The parser has multiple options for extracting smileys and emojis from the messages, extracting URLs and domains from the messages, extracting names and types of sent media files from the messages, extracting timestamps from messages, extracting and anonymizing author names from messages. Can be used to create anonymized versions of data.