Search or add a thesis

Advanced Search (Beta)
Home > Determination of Sample Size and Comparison of Estimation Methods in Multilevel Models

Determination of Sample Size and Comparison of Estimation Methods in Multilevel Models

Thesis Info

Access Option

External Link

Author

Sabz Ali

Program

PhD

Institute

Islamia Collage Peshawar

City

Peshawar

Province

KPK

Country

Pakistan

Thesis Completing Year

2018

Thesis Completion Status

Completed

Subject

Statistics

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/11037/1/Sabz%20Ali_Statistics_2018_ICP_Peshawar_18.09.2019.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676725847213

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


The main purpose of this study was to examine the impact of sample size on multilevel model estimates and their standard errors under different methods of estimations. Three different studies were designed to achieve the objectives of the study. In study 1, two level binary logistic random intercept and random slope regression model was used. The performance of two estimation methods was observed under varying conditions of the design factors i.e the number of groups, group sizes and intraclass correlation (ICC). Maximum Likelihood (ML) with adaptive quadrature and Penalized Quasi-likelihood (PQL) methods of estimation were used in study 1. Similarly, three categories and five categories two level ordinal logistic random intercept and random slope regression models were used in study 2. The performance of ML and PQL methods of estimation was observed under varying conditions of the design factors i.e., the number of groups, group sizes, ICC and distribution of category responses. Moreover, a two level random intercept and random slope linear regression model was used in study 3. The performance of Restricted Maximum Likelihood Method (REML) and Bootstrap by means of Minimum Norm Quadratic Unbiased Estimators (MINQUE) was observed under varying conditions of the design factors. In all the three studies relative parameter bias and 95% confidence interval coverage rates were used to assess accuracy and precision of estimates and their standard errors. Further, empirical power rates were also computed in study 1 and study 2.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

’’نگارشاتِ راشد‘‘ اور صاحب ِ کتاب

’’نگارشاتِ راشد‘‘ اور صاحبِ کتاب
حافظ محمد اکرم راشدؔ سے میرے دیرینہ اور دیر پا تعلقات ہیں ، یہ ایک علمی خاندان سے تعلق رکھتے ہیں۔ اِن کے بزرگوں کے دینِ اسلام کے میدان میں لگائے ہوئے شجر سایہ دار مسحور کن ماحول پیش کر رہے ہیں اور تشنگانِ علم کی پیاس بجھانے کے لیے دورانِ سفر طلباء کے راستے میں آنے والی جہالت اور کم علمی کی تپش اور دھوپ کو رفع کرنے میں مثالی کردار ادا کر رہے ہیں ۔ میں نے صرف کتاب اور صاحبِ کتاب کے بارے میں چند سطور ضبط تحریر میں لانے کے لیے اپنے قلم کو اذنِ خرام دینا ہے ۔موصوف قلم کے میدان کے شاہسوار ہیں ، ندائے حق کی ادارت ہو، منظور العارفین کی تدوین ہو ، یا منظورالعارفین ٹرسٹ کا قیام ہو، موصوف پیش پیش نظر آتے ہیں ،آپ ہمارے ادارے منظور العارفین ٹرسٹ کے ساتھ قلب و اذہان کی جملہ قویٰ کے ساتھ وابستہ رہے ہیں ۔ مُرور ایّام کے ساتھ پیرانہ سالی اور ضعف کا شکار ہو کر کچھ عرصہ سے گوشہ نشین ہیں تاہم تحریر سے عشق کی حد تک لگائو کی بنا پر کوئی نہ کوئی شاہ پارہ تخلیق کرتے رہتے ہیں ۔ آپ کالم نویس ہونے کے ساتھ ساتھ ایک عظیم خوش نویس بھی ہیں عارفوالااور اس کے مضافات میں خطاطی کے حوالے سے ان کا ایک نام ہے ۔ دنیوی اور دینی تعلیم کے امتزاج کے حامل ہیں اور اپنی ایک شناخت رکھتے ہیں ۔ سرکاری ادارہ میں رئیس مدرسہ کے فرائض سر انجام دے چکے ہیں ۔
مذہبی خدمات کے حوالے سے اِن کی خدمات مہر نیم روز کی طرح واضح ہیں ۔ مرکزی جامع مسجد -N بلاک عارفوالا کی امامت اور خطابت کے فرائض بحسن و خوبی سر انجام دے رہے ہیں۔صاحب ورع اور تقویٰ ہونا اِن کی...

Fighting Odds in Domestic Sphere: Mothers’ Role to Alter Cultural Values Governing Daughters’ Rights in Pakistan

Feminism begins at home. To test this question this article is based on findings of a survey and discussion with three generations of mothers, who had struggled for ensuring rights of their daughters in particular. They represent diverse ethnic groups of Pakistan. True, in an overall patriarchal environment, mothers are blamed for perpetuating son preference and socializing the daughters to a submissive role, but it is also true that mothers of somewhat different inclination have been continuously resisting the odds put in their daughters’ ways to enjoy and progress in life. Even in rural areas, illiterate mothers’ have been asserting for daughter’s education, mobility, cultural participation and choice in marriage. Mothers have been promoting daughters’ rights, a struggle which can be labeled as ‘activism in domestic space’, which is transmitted and reinforced down the generations of mothers. Thus the role of mothers in changing cultural values and gender stereotypes is essential to be studied. They have the agency for taking initiatives in a domain which instills feminism very successfully in an unnoticeable way. The study proves that even mothers can be corrosive for patriarchy. Selection of three generations of mothers from rural and urban areas and different ethnic groups provides a good cross-section and shows the trend in various sociological regions.

Efficient and Anonymous Multi-Server Authentication and Key Agreement Protocol Framework

On our way to switching from single-server to multi-server authentication, one of the great challenges is to design a secure and computationally efficient multi-server authentication protocol. Multi-server Authentication (MSA) relieves the user of separate and individualized registration procedures from various service providers in a network. Following MSA paradigm, a user gets registered from a trusted authority first, and then the former may benefit itself from any service being offered by any service provider without registering again, engendering overhead efficiency. Another objective for switching towards multi-server architecture was to relieve the user of maintaining multiple passwords as much as the number of servers. A robust MSA architecture makes the access of sever-oriented network services not only convenient but also readily available for users. The remote internet authentication often entails the type of multiserver authentications, which further underscores the need of MSA protocol’s efficiency and robustness against threats. The service providers in an MSA-based network authenticate and verify the users on the basis of credentials provided by Registration Centre (RC) to the users during registration phase. In traditional MSA protocols, service providers consult online RC for verifying the user’s authenticity after receiving a login request. Besides, we witness MSA protocols where RC is bypassed during mutual authentication between user and service provider. The latter class of schemes takes less communicational cost and eliminates few bottlenecks, perceptibly, due to bypassing trusted RC from mutual authentication phase. The research academia came up with many authentication protocols lately, to enhance security and minimizing communicational overhead. However, the presented solutions are costly due to employing expensive bilinear operations, on the first hand. Besides, there are light-weight MSA protocols as well, nevertheless bearing many other drawbacks making those protocols unfit for practical implementations. We address these problems by presenting a novel multi-server authentication protocol framework that is not only efficient but also free of the hassle of key management and distribution problems. The protocol framework comprises a blend of the usage of selected crypto-primitives, messages and participating entities in such a way that leads to overall efficiency and achieves the security objectives as well. In this dissertation, we present state-ofthe-art review on MSA-based protocols and then propose corresponding protocols to address the above limitations. Our proposed work not only contributes a light-weight multi-server authentication protocol framework that could establish mutual authentication without RC engagement, but also improves upon many MSA schemes (Trusted and Non-trusted environment) to enhance security and reduce communication or computational delay for establishment of an authenticated session key between user and server. To prove the security claims, the formal security analysis is performed for each protocol and the results are also validated and verified using automated simulation tools.