• Tidak ada hasil yang ditemukan

Guidance on the choices of frailty software

N/A
N/A
Protected

Academic year: 2023

Membagikan "Guidance on the choices of frailty software"

Copied!
192
0
0

Teks penuh

Online Figure 11.8: 2 estimates when the frailty was generated from an inverse Gaussian and the number of clusters is small (N = 15, censoring 15%). Online Figure 13.1: SE(1) estimate of when frailty was generated from an inverse Gaussian and used a small percentage of censoring (N = 60, censoring 15%). Online Figure 13.2: SE(1) estimates of when frailty was generated from an inverse Gaussian and used a small percentage of censoring (N = 60, censoring 45%).

Online Figure 13.3: SE( 1) estimate of when frailty was generated from an inverse Gaussian and used a large percentage of censoring (N = 60, censoring 85%). Online Figure 13.4: SE(1) estimate of when frailty was generated from an inverse Gaussian and used a small percentage of censoring and a smaller number of clusters (N= 30, censoring 15%). Online Figure 13.5: SE(1) estimate of when frailty was generated from an inverse Gaussian and used a small percentage of censoring and a smaller number of clusters (N= 30, censoring 45%).

Web-Figure 13.6: SE(1) estimates when the vulnerability was generated from an inverse Gauss and used a large censorship rate and a smaller number of clusters (N = 30, censorship 85%). Web Figure 13.7: SE(1) estimates when the vulnerability was generated from an inverse Gaussian and used a small censorship rate and fewer number of clusters (N=15, censorship15%). Web Figure 13-8: SE(1) estimates when the vulnerability was generated from an inverse Gaussian and used a small censorship rate and fewer number of clusters (N=15, censorship 45%).

Web-Figure 13.9: SE(1) estimates when the vulnerability was generated from an inverse Gauss and used a large censorship rate and a smaller number of clusters (N = 15, censorship 85%).

Effect of Changing Number of Clusters

Online Figure 13.11: 2 estimates when a small number of clusters were used under moderate censoring and frailty generated from a gamma distribution. Online Figure 13.12:✓estimates when a small number of clusters were used under moderate censoring and power generated from a gamma distribution. Online Figure 13.13: 1 estimates when a small number of clusters were used under moderate censoring and frailty generated from a log-normal distribution.

Web-Figure 13.19:1 estimates when a small number of clusters were used under strict censorship and vulnerability generated by a gamma distribution. Web-Figure 13.20: 2estimates when a small number of clusters were used under strict censorship and vulnerability generated by a gamma distribution. Web-Figure 13.21: ✓estimate when a small number of clusters were used under strict censorship and vulnerability generated by a gamma distribution.

Web Figure 13.28: 1estimates when a large number of clusters were used under moderate censoring and frailty generated from a gamma distribution. Web Figure 13.29: 2estimates when a large number of clusters were used under moderate censoring and frailty generated from a gamma distribution. Web Figure 13.30:✓estimates when a large number of clusters were used under moderate censoring and frailty generated from a gamma distribution.

Online Figure 13.31: 1 estimates when a large number of clusters were used under moderate censoring and frailty generated from a log-normal distribution. Online Figure 13.40: 1 estimates when a moderate number of clusters was used under mild censoring and skewness generated from the gamma distribution. Online Figure 13.41: 2 estimates when a moderate number of clusters was used under mild censoring and frailty generated from the gamma distribution.

Web figure 13.42: ✓estimates when moderate number of clusters were used under light censoring and frailty generated from a gamma distribution. Web Figure 13.43: 1estimates when moderate number of clusters were used under light censoring and frailty generated from a log-normal distribution. Web Figure 13.60:✓estimates when a moderate number of clusters were used under severe censoring and frailty generated by a gamma distribution.

Web Figure 13.63:✓estimates when a moderate number of clusters were used under strict censorship and vulnerability generated from a log-normal distribution. Web Figure 13.66:✓estimates when a moderate number of clusters were used under strict censorship and vulnerability generated by an inverse Gaussian distribution.

Effects of changing ✓ for N = 15

Web Figure 13.68: 2estimates when a small number of clusters were used under mild censoring, frailty generated from a gamma distribution and✓= 0.1. Web Figure 13.69: ✓estimates when a small number of clusters were used under mild censoring, frailty generated from a gamma distribution and✓= 0.1. Web Figure 13.76: 1estimates when a small number of clusters were used under moderate censoring, frailty generated from a gamma distribution and✓= 0.1.

Online Figure 13.85: 1 estimates when a small number of clusters were used under strict censoring, censoring, frailty generated from a gamma distribution and ✓= 0.1. Online Figure 13.94: 1 estimates when a small number of clusters were used under mild censoring, the frailty generated from the gamma distribution and ✓= 0.5. Online Figure 13.95: 2scores when a small number of clusters were used under mild censoring, frailty generated from a gamma distribution and ✓= 0.5.

Online Figure 13.96: ✓estimates when a small number of clusters were used under mild censoring, the frailty generated from the gamma distribution and ✓= 0.5. Online Figure 13,112: 1 estimates when a small number of clusters were used under strict censoring, censoring, frailty generated from a gamma distribution and ✓= 0.5. Online Figure 13,121: 1 estimates when a small number of clusters under mild censoring, a frailty generated from a gamma distribution and ✓= 1, were used.

Web Figure 13.122: 2estimates when a small number of clusters were used under mild censoring, frailty generated from a gamma distribution and✓= 1. Web Figure 13.123: ✓estimates when a small number of clusters were used under mild censoring, frailty generated from a gamma distribution and✓= 1. Web Figure 13.124: 1estimates when a small number of clusters were used under mild censoring, frailty generated from a log-normal distribution and✓= 1.

Online Figure 13.139: 1 estimate when a small number of clusters was used under strict censoring, frailty generated from a gamma distribution in✓= 1. Online Figure 13.148: 1 estimate when a small number of clusters was used under soft censoring, frailty generated from gamma distributions in✓= 3. Online Figure 13.149: 2estimates when a small number of clusters under mild censoring was used, a weakness generated from a gamma in✓= 3 distribution.

Web-Figure 13.150: ✓estimates when a small number of clusters were used under mild censorship, vulnerability generated by a gamma distribution and ✓= 3. Web-Figure 13.151: 1estimates when a small number of clusters were used under mild censorship, vulnerability generated by a lognormal distribution and✓= 3.

Referensi

Dokumen terkait

Dengan demikian dapat disimpulkan bahwa Listening Fun adalah media pembelajaran interaktif berbasis android untuk latihan listening siswa kelas VIII SMP Soerjo Alam Ngajum