Quick Abnormal-Bid-Detection Method for Construction Contract Auctions

Total Page:16

File Type:pdf, Size:1020Kb

Quick Abnormal-Bid-Detection Method for Construction Contract Auctions Loughborough University Institutional Repository Quick abnormal-bid-detection method for construction contract auctions This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: BALLESTEROS-PEREZ, P. ...et al., 2015. Quick abnormal-bid- detection method for construction contract auctions. Journal of Construction Engineering and Management, 141(7): 04015010 Additional Information: • This is an Open Access Article. It is published by Asce under the Creative Commons Attribution 4.0 Unported Licence (CC BY). Full details of this licence are available at: http://creativecommons.org/licenses/by/4.0/ Metadata Record: https://dspace.lboro.ac.uk/2134/32767 Version: Published Publisher: Asce Rights: This work is made available according to the conditions of the Creative Commons Attribution 4.0 International (CC BY 4.0) licence. Full details of this licence are available at: http://creativecommons.org/licenses/ by/4.0/ Please cite the published version. Quick Abnormal-Bid-Detection Method for Construction Contract Auctions Pablo Ballesteros-Pérez1; Martin Skitmore2; Raj Das3; and Maria Luisa del Campo-Hitschfeld4 Abstract: Noncompetitive bids have recently become a major concern in both public and private sector construction contract auctions. Consequently, several models have been developed to help identify bidders potentially involved in collusive practices. However, most of these models require complex calculations and extensive information that is difficult to obtain. The aim of this paper is to utilize recent developments for detecting abnormal bids in capped auctions (auctions with an upper bid limit set by the auctioner) and extend them to the more conventional uncapped auctions (where no such limits are set). To accomplish this, a new method is developed for estimating the values of bid distribution supports by using the solution to what has become known as the German Tank problem. The model is then demonstrated and tested on a sample of real construction bid data, and shown to detect cover bids with high accuracy. This paper contributes to an improved understanding of abnormal bid behavior as an aid to detecting and monitoring potential collusive bid practices. DOI: 10.1061/(ASCE)CO .1943-7862.0000978. This work is made available under the terms of the Creative Commons Attribution 4.0 International license, http:// creativecommons.org/licenses/by/4.0/. Author keywords: Bidding; Abnormal bid; Bid covering; Collusion; German Tank problem; Construction auctions; Contracting. Introduction So-called bid-covering or cover bidding is the most recurrent form of collusive arrangement in sealed bid auctions (Ishii 2008). In the bidding context, collusion (or bid rigging as it is sometimes It occurs when individuals or firms agree to submit bids in which known) occurs when businesses that would otherwise be expected either (1) a competitor agrees to submit a bid that is higher than the to be genuinely competing for work secretly conspire to raise prices bid of the designated winner, (2) a competitor submits a bid that or sometimes to lower the quality of goods or services for pur- is known to be insufficiently competitive to be accepted from the chasers in a bid process (OECD 2009). Collusive bids can be technical standpoint, or (3) a competitor submits a bid that contains particularly damaging in public procurement, since in Organization special contractual terms that are known to be unacceptable to the for Economic Cooperation and Development (OCED) countries, auctioneer (OECD 2007). Cover bids are also used in the well- for example, public procurement represents about 15% of gross known collusive arrangement of bid rotation (Porter and Zona domestic product (GDP; OECD 2007), a value even higher in other 1993; Ishii 2009), which involves participating firms continuing countries (Aoyagi and Fréchette 2009). Collusive practices also to bid while taking turns to be the winning bidder. absorb resources from procurers and taxpayers, since this action Thus, classifying bids as abnormal and combating collusion usually undermines the advantages of a competitive market and are primary concerns for auctioneers as those bidders who manage diminishes public confidence in the competitive process (Marshall to form a viable cartel or bidding ring (i.e., a group of companies and Marx 2009; Anderson and Cau 2011). Moreover, these are il- planning to restrict the amount of actual competition among the legal in many countries, involving considerable resources dedicated participants in one or several auctions) can seriously affect winning to prosecuting those companies involved (Bajari and Summers bid values (Blume and Heidhues 2008; Hu et al. 2011). As a result, 2002; Hendricks et al. 2008). Klemperer (2002) and Anderson et al. (2012) regard that collusion, as well as other competition policy issues, is being more important 1Assistant Professor, Departamento de Ingeniería y Gesti´on de la in the design of practical auctions than the budget-constraint, affili- Construcci´on, Faculty of Engineering, Universidad de Talca, Camino los ation, and risk-aversion issues that are often addressed in the main- Niches, km 1, Curic´o, Chile (corresponding author). E-mail: pballesteros@ stream theory of auctions. Downloaded from ascelibrary.org by 190.110.102.1 on 02/24/15. Copyright ASCE. For personal use only; all rights reserved. utalca.cl The literature proposes some forms of auction rules to discour- 2Professor, School of Civil Engineering and the Built Environment, age collusion, such as establishing a reserve price that is a function Queensland Univ. of Technology, Gardens Point, Brisbane, Australia. E-mail: [email protected] of cartel size (Graham and Marshall 1987), selecting efficient auc- 3Senior Lecturer, Dept. of Mechanical Engineering, Univ. of Auckland, tion mechanisms depending on the amount of correlation between 20 Symonds St., Auckland 1010, New Zealand. E-mail: r.das@auckland colluders (Laffont and Martimort 2000), exploiting informational .ac.nz asymmetries concerning potential colluders and including a nontri- 4Assistant Professor, Centro de Sistemas de Ingeniería, KIPUS, Faculty vial probability of not selling the object auctioned (Che and Kim of Engineering, Universidad de Talca, Camino los Niches, km 1., Curic´o, 2006, 2008), and including both effective ceiling and reserve prices Chile. E-mail: [email protected], [email protected] (Chowdhury 2008). However, collusion schemes are always diffi- Note. This manuscript was submitted on July 8, 2014; approved on January 5, 2015; published online on February 23, 2015. Discussion period cult to detect as they are typically negotiated in a strictly secretive open until July 23, 2015; separate discussions must be submitted for indi- way and are not usually evident from the results of a single auction, vidual papers. This paper is part of the Journal of Construction Engineer- as cover bids have to give the appearance of genuinely competitive ing and Management, © ASCE, ISSN 0733-9364/04015010(11)/$25.00. bids (Bajari and Summers 2002). An additional problem is that an © ASCE 04015010-1 J. Constr. Eng. Manage. J. Constr. Eng. Manage. effective strategy for avoiding collusion usually requires the auc- attention has been paid in the literature relating to the inner working tioneer to be able to predict the distribution function from which of the bidding rings or collusive bid groups (McAfee and McMillan bidders are assumed to draw their values and be aware of which 1992; Hendricks et al. 2008). Related work includes the Porter bidders belong to which cartel (Bajari and Summers 2002), while and Zona (1993, 1999) modeling of the probability of a bidder win- obtaining such information is intricate, if not impossible, in practice ning by assuming a bid function linear in observable cost factors. (Hu et al. 2011). Subsequent work (P. Bajari and L. Ye, “Competition versus collu- A collusive arrangement is often revealed only upon the appear- sion in procurement auctions: Identification and testing,” Working ance of a steady pattern of distrustful or abnormal behavior from Paper, Stanford University, Stanford, California, 2003) consistently several bidders over a period of time (OECD 2009). However, the observes the violation of the so-called conditional independence existence of such patterns does not necessarily act as evidence and exchangeability conditions, which must always be satisfied of collusion, as there may simply be decreasing returns to scale by a competitive bid strategy. of bidders’ cost functions or a change in market conditions. For Finally, Ballesteros–Pérez et al (2012a, 2013a, 2014) introduce example, lower marginal costs occur with firms with idle capacity a bid tender forecasting model that is partially reconfigured to (low current workload) and hence, when reflected in the bid, are detect extreme abnormal bidders in capped auctions (Ballesteros– relatively more likely to win the auction (Porter and Zona 1993; Pérez et al. 2013b). This method, which the writers term the Porter 2005). Despite this cautionary note, sets of tools that help Ballesteros–González–Canavate˜ method, is aimed at identifying identify particular bid behaviors as being collusive, or at least ab- bidders whose behavior is not conditionally independent and ex- normal, can be of use to auctioneers (Rasch and Wambach 2009). changeable, that is, not in accordance with a regular or predictable In this paper, we aim at identifying abnormal bids in either pub- pattern.
Recommended publications
  • Mathematical Statistics (Math 30) – Course Project for Spring 2011
    Mathematical Statistics (Math 30) – Course Project for Spring 2011 Goals: To explore methods from class in a real life (historical) estimation setting To learn some basic statistical computational skills To explore a topic of interest via a short report on a selected paper The course project has been divided into 2 parts. Each part will account for 5% of your grade, because the project accounts for 10%. Part 1: German Tank Problem Due Date: April 8th Our Setting: The Purple (Amherst) and Gold (Williams) armies are at war. You are a highly ranked intelligence officer in the Purple army and you are given the job of estimating the number of tanks in the Gold army’s tank fleet. Luckily, the Gold army has decided to put sequential serial numbers on their tanks, so you can consider their tanks labeled as 1,2,3,…,N, and all you have to do is estimate N. Suppose you have access to a random sample of k serial numbers obtained by spies, found on abandoned/destroyed equipment, etc. Using your k observations, you need to estimate N. Note that we won’t deal with issues of sampling without replacement, so you can consider each observation as an independent observation from a discrete uniform distribution on 1 to N. The derivations below should lead you to consider several possible estimators of N, from which you will be picking one to propose as your estimate of N. Historical Setting: This was a real problem encountered by statisticians/intelligence in WWII. The Allies wanted to know how many tanks the Germans were producing per month (the procedure was used for things other than tanks too).
    [Show full text]
  • Local Variation As a Statistical Hypothesis Test
    Int J Comput Vis (2016) 117:131–141 DOI 10.1007/s11263-015-0855-4 Local Variation as a Statistical Hypothesis Test Michael Baltaxe1 · Peter Meer2 · Michael Lindenbaum3 Received: 7 June 2014 / Accepted: 1 September 2015 / Published online: 16 September 2015 © Springer Science+Business Media New York 2015 Abstract The goal of image oversegmentation is to divide Keywords Image segmentation · Image oversegmenta- an image into several pieces, each of which should ideally tion · Superpixels · Grouping be part of an object. One of the simplest and yet most effec- tive oversegmentation algorithms is known as local variation (LV) Felzenszwalb and Huttenlocher in Efficient graph- 1 Introduction based image segmentation. IJCV 59(2):167–181 (2004). In this work, we study this algorithm and show that algorithms Image segmentation is the procedure of partitioning an input similar to LV can be devised by applying different statisti- image into several meaningful pieces or segments, each of cal models and decisions, thus providing further theoretical which should be semantically complete (i.e., an item or struc- justification and a well-founded explanation for the unex- ture by itself). Oversegmentation is a less demanding type of pected high performance of the LV approach. Some of these segmentation. The aim is to group several pixels in an image algorithms are based on statistics of natural images and on into a single unit called a superpixel (Ren and Malik 2003) a hypothesis testing decision; we denote these algorithms so that it is fully contained within an object; it represents a probabilistic local variation (pLV). The best pLV algorithm, fragment of a conceptually meaningful structure.
    [Show full text]
  • Contents 3 Parameter and Interval Estimation
    Probability and Statistics (part 3) : Parameter and Interval Estimation (by Evan Dummit, 2020, v. 1.25) Contents 3 Parameter and Interval Estimation 1 3.1 Parameter Estimation . 1 3.1.1 Maximum Likelihood Estimates . 2 3.1.2 Biased and Unbiased Estimators . 5 3.1.3 Eciency of Estimators . 8 3.2 Interval Estimation . 12 3.2.1 Condence Intervals . 12 3.2.2 Normal Condence Intervals . 13 3.2.3 Binomial Condence Intervals . 16 3 Parameter and Interval Estimation In the previous chapter, we discussed random variables and developed the notion of a probability distribution, and then established some fundamental results such as the central limit theorem that give strong and useful information about the statistical properties of a sample drawn from a xed, known distribution. Our goal in this chapter is, in some sense, to invert this analysis: starting instead with data obtained by sampling a distribution or probability model with certain unknown parameters, we would like to extract information about the most reasonable values for these parameters given the observed data. We begin by discussing pointwise parameter estimates and estimators, analyzing various properties that we would like these estimators to have such as unbiasedness and eciency, and nally establish the optimality of several estimators that arise from the basic distributions we have encountered such as the normal and binomial distributions. We then broaden our focus to interval estimation: from nding the best estimate of a single value to nding such an estimate along with a measurement of its expected precision. We treat in scrupulous detail several important cases for constructing such condence intervals, and close with some applications of these ideas to polling data.
    [Show full text]
  • Unpicking PLAID a Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol
    A preliminary version of this paper appears in the proceedings of the 1st International Conference on Research in Security Standardisation (SSR 2014), DOI: 10.1007/978-3-319-14054-4_1. This is the full version. Unpicking PLAID A Cryptographic Analysis of an ISO-standards-track Authentication Protocol Jean Paul Degabriele1 Victoria Fehr2 Marc Fischlin2 Tommaso Gagliardoni2 Felix Günther2 Giorgia Azzurra Marson2 Arno Mittelbach2 Kenneth G. Paterson1 1 Information Security Group, Royal Holloway, University of London, U.K. 2 Cryptoplexity, Technische Universität Darmstadt, Germany {j.p.degabriele,kenny.paterson}@rhul.ac.uk, {victoria.fehr,tommaso.gagliardoni,giorgia.marson,arno.mittelbach}@cased.de, [email protected], [email protected] October 27, 2015 Abstract. The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and private authentication between a smart card and a terminal. Originally developed by a unit of the Australian Department of Human Services for physical and logical access control, PLAID has now been standardized as an Australian standard AS-5185-2010 and is currently in the fast-track standardization process for ISO/IEC 25185-1. We present a cryptographic evaluation of PLAID. As well as reporting a number of undesirable cryptographic features of the protocol, we show that the privacy properties of PLAID are significantly weaker than claimed: using a variety of techniques we can fingerprint and then later identify cards. These techniques involve a novel application of standard statistical
    [Show full text]
  • Uniform Distribution
    Uniform distribution The uniform distribution is the probability distribution that gives the same probability to all possible values. There are two types of Uniform distribution uniform distributions: Statistics for Business Josemari Sarasola - Gizapedia x1 x2 x3 xN a b Discrete uniform distribution Continuous uniform distribution We apply uniform distributions when there is absolute uncertainty about what will occur. We also use them when we take a random sample from a population, because in such cases all the elements have the same probability of being drawn. Finally, they are also usedto create random numbers, as random numbers are those that have the same probability of being drawn. Statistics for Business Uniform distribution 1 / 17 Statistics for Business Uniform distribution 2 / 17 Discrete uniform distribution Discrete uniform distribution Distribution function i Probability function F (x) = P [X x ] = ; x = x , x , , x ≤ i N i 1 2 ··· N 1 P [X = x] = ; x = x1, x2, , xN N ··· 1 (N 1)/N − 1 1 1 1 1 1 1 1 1 1 N N N N N N N N N N i/N x1 x2 x3 xN 3/N 2/N 1/N x1 x2 x3 xi xN 1xN − Statistics for Business Uniform distribution 3 / 17 Statistics for Business Uniform distribution 4 / 17 Discrete uniform distribution Discrete uniform distribution Distribution of the maximum We draw a value from a uniform distribution n times. How is Notation, mean and variance distributed the maximum among those n values? Among n values, the maximum will be less than xi when all of them are less than xi: x1 + xN µ = 2 n i i i i 2 (xN x1 + 2)(xN x1) P [Xmax xi] = = X U(x1, x2, .
    [Show full text]
  • ELEC-E7130 Examples on Parameter Estimation
    ELEC-E7130 Examples on parameter estimation Samuli Aalto Department of Communications and Networking Aalto University September 25, 2018 1 Discrete uniform distribution U d(1;N), one unknown parameter N Let U d(1;N) denote the discrete uniform distribution, for which N 2 f1; 2;:::g and the point probabilities are given by 1 p(i) = PfX = ig = ; i 2 f1;:::;Ng: N It follows that N N X 1 X 1 N(N + 1) N + 1 E(X) = PfX = igi = i = = ; N N 2 2 i=1 i=1 N N X 1 X 1 N(N + 1)(2N + 1) E(X2) = PfX = igi2 = i2 = N N 6 i=1 i=1 (N + 1)(2N + 1) = ; 6 (N + 1)(2N + 1) N + 12 V(X) = E(X2) − (E(X))2 = − 6 2 (N + 1)(N − 1) N 2 − 1 = = : 12 12 1 1.1 Estimation of N: Method of Moments (MoM) d Consider an IID sample (x1; : : : ; xn) of size n from distribution U (1;N). The first (theoretical) moment equals N + 1 µ = E(X) = ; 1 2 and the corresponding sample moment is the sample meanx ¯n: n 1 X µ^ =x ¯ = x : 1 n n i i=1 Let N^ denote the estimator of the unknown parameter N. MoM estimation: By solving the requirement (for the first moment) that N^ + 1 µ^ = ; 1 2 we get the estimator MoM N^ = 2^µ1 − 1 = 2¯xn − 1: (1) 1.2 Estimation of N: Maximum Likelihood (ML) d Consider again an IID sample (x1; : : : ; xn) of size n from distribution U (1;N).
    [Show full text]
  • 1. Revivew of Normal Distributions (1) True/False Practice: (A) F(X)
    MATH 10B DISCUSSION SECTION PROBLEMS 4/11 { SOLUTIONS JAMES ROWAN 1. Revivew of normal distributions (1) True/False practice: 2 (a) f(x) = p 1 e−(x−4) =18 is a PDF for a random variable with mean 4 and standard deviation 3. 2π3 True . Recall that a normal random variable with mean µ and standard deviation σ has PDF 2 2 f(x) = p 1 e−(x−µ) =(2σ ). 2πσ (2) (Stewart/Day 12.5.73) The normal distribution models dispersion along a one-dimensional habitat like a coastline. Suppose the mean dispersal distance is 0 meters and the variance is 2 square meters. (a) What is the probability that an individual disperses more than 2 meters? We have a normal random variable with mean 0 and variance 2, and want to find the probability P (jXj ≥ 2). By transforming X into a standard normal variable (i.e. one withp mean 0 and variance 1), we can use a z-score table to look up probabilities.p We have thatpZ = X= 2 is a standard normal random variable, so P (jXj ≥ 2) = P (jZj ≥ 2) = 1 − 2P (0 ≤ Z ≤ 2). Looking at our z-score table, p we find that P (0 ≤ Z ≤ 2) ≈ 0:42, so that P (jXj ≥ 2) ≈ 0:16 . (b) What is the probability that an individual disperses less than 1 meter? We have a normal random variable with mean 0 and variance 2, and want to find the probability P (jXj ≤ 1). By transforming X into a standard normal variable (i.e. one withp mean 0 and variance 1), we can use a z-score table to look up probabilities.
    [Show full text]
  • Statistics.Pdf
    Part IB | Statistics Based on lectures by D. Spiegelhalter Notes taken by Dexter Chua Lent 2015 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after lectures. They are nowhere near accurate representations of what was actually lectured, and in particular, all errors are almost surely mine. Estimation Review of distribution and density functions, parametric families. Examples: bino- mial, Poisson, gamma. Sufficiency, minimal sufficiency, the Rao-Blackwell theorem. Maximum likelihood estimation. Confidence intervals. Use of prior distributions and Bayesian inference. [5] Hypothesis testing Simple examples of hypothesis testing, null and alternative hypothesis, critical region, size, power, type I and type II errors, Neyman-Pearson lemma. Significance level of outcome. Uniformly most powerful tests. Likelihood ratio, and use of generalised likeli- hood ratio to construct test statistics for composite hypotheses. Examples, including t-tests and F -tests. Relationship with confidence intervals. Goodness-of-fit tests and contingency tables. [4] Linear models Derivation and joint distribution of maximum likelihood estimators, least squares, Gauss-Markov theorem. Testing hypotheses, geometric interpretation. Examples, including simple linear regression and one-way analysis of variance. Use of software. [7] 1 Contents IB Statistics Contents 0 Introduction 3 1 Estimation 4 1.1 Estimators . .4 1.2 Mean squared error . .5 1.3 Sufficiency . .6 1.4 Likelihood . 10 1.5 Confidence intervals . 12 1.6 Bayesian estimation . 15 2 Hypothesis testing 19 2.1 Simple hypotheses . 19 2.2 Composite hypotheses . 22 2.3 Tests of goodness-of-fit and independence . 25 2.3.1 Goodness-of-fit of a fully-specified null distribution .
    [Show full text]
  • Estimating the Size of a Hidden Finite
    Estimating the size of a hidden finite set: large-sample behavior of estimators Si Cheng1, Daniel J. Eck2, and Forrest W. Crawford3;4;5;6 1. Department of Biostatistics, University of Washington 2. Department of Statistics, University of Illinois Urbana-Champaign 3. Department of Biostatistics, Yale School of Public Health 4. Department of Statistics & Data Science, Yale University 5. Department of Ecology & Evolutionary Biology, Yale University 6. Yale School of Management October 17, 2019 Abstract A finite set is \hidden" if its elements are not directly enumerable or if its size cannot be ascertained via a deterministic query. In public health, epidemiology, demography, ecology and intelligence analysis, researchers have developed a wide variety of indirect statistical approaches, under different models for sampling and observation, for estimating the size of a hidden set. Some methods make use of random sampling with known or estimable sampling probabilities, and others make structural assumptions about relationships (e.g. ordering or network information) between the elements that comprise the hidden set. In this review, we describe models and methods for learning about the size of a hidden finite set, with special attention to asymptotic properties of estimators. We study the properties of these methods under two asymptotic regimes, “infill” in which the number of fixed-size samples increases, but the population size remains constant, and “outfill” in which the sample size and population size grow together. Statistical properties under these two regimes can be dramatically different. Keywords: capture-recapture, German tank problem, multiplier method, network scale-up method 1 Introduction arXiv:1808.04753v2 [math.ST] 15 Oct 2019 Estimating the size of a hidden finite set is an important problem in a variety of scientific fields.
    [Show full text]
  • Arxiv:1507.04720V2 [Cs.DL] 18 Mar 2016
    Assessing evaluation procedures for individual researchers: the case of the Italian National Scientific QualificationI Moreno Marzolla∗ Department of Computer Science and Engineering, University of Bologna, Italy Abstract The Italian National Scientific Qualification (ASN) was introduced as a prerequisite for applying for tenured associate or full professor positions at state-recognized universities. The ASN is meant to attest that an individual has reached a suitable level of scientific maturity to apply for professorship positions. A five member panel, appointed for each scientific discipline, is in charge of evaluating applicants by means of quantitative indicators of impact and produc- tivity, and through an assessment of their research profile. Many concerns were raised on the appropriateness of the evaluation criteria, and in particular on the use of bibliometrics for the evaluation of individual researchers. Additional concerns were related to the perceived poor quality of the final evaluation reports. In this paper we assess the ASN in terms of appropriateness of the applied methodology, and the quality of the feedback provided to the applicants. We argue that the ASN is not fully compliant with the best practices for the use of bibliometric indicators for the evalua- tion of individual researchers; moreover, the quality of final reports varies considerably across the panels, suggesting that measures should be put in place to prevent sloppy practices in future ASN rounds. Keywords: National Scientific Qualification; ASN; Evaluation of individuals; Bibliometrics; Italy 1. Introduction The National Scientific Qualification (ASN) was introduced in 2010 as part of a global reform of the Italian university system. The new rules require that applicants for professorship positions in state-recognized universities must first acquire a national scientific qualification for the discipline and role applied to.
    [Show full text]
  • STAT 345 Spring 2018 Homework 9 - Estimation and Sampling Distributions I Name
    STAT 345 Spring 2018 Homework 9 - Estimation and Sampling Distributions I Name: Please adhere to the homework rules as given in the Syllabus. 1. Consider a population of people with high blood pressure (lets say Systolic BP = 135 mmHg). When a member of this population takes a certain medicine, their Systolic blood pressure will be reduced by by X mmHg where X is Normally distributed with mean µ = 12 and sd σ = 4. a) What is the probability that a single individual, upon taking this medicine, has their SBP decrease by less than 7 mmHg? b) In a random sample of 5 members of this population, what is the probability that their average SBP decreases by less than 7 mmHg? c) For a random sample of size n from this population (n = 1; 2; ··· 10), make a plot (using a computer) of the probability that the average SBP decrease is less than 7 mmHg. 2. Central Limit Theorem Calculations. a) Suppose that X1;X2; ··· X100 are independent and identically distributed Exponential RV's with λ = 1. Find the mean and variance of X¯. Use the CLT to approximate P (X¯ > 1:05). b) Suppose that X1;X2; ··· X144 are independent and identically distributed (continuous) Uniform distributed RV's with a = 0 and b = 6. Use the CLT and then work backwards to find x such that P (X¯ < x) = 0:05. c) Suppose that X1;X2 ··· X36 are independent and identically distributed Normally dis- tributed RV's with mean µ = 0 and standard deviation σ. Also assume that P (X¯ > 1) = 0:01.
    [Show full text]
  • Assignment 7: Confidence Intervals and Parametric Hypothesis Testing
    Department of Mathematics Ma 3/103 KC Border Introduction to Probability and Statistics Winter 2017 Assignment 7: Confidence Intervals and Parametric Hypothesis Testing Due Tuesday, February 28 by 4:00 p.m. at 253 Sloan Instructions: When asked for a confidence interval or a probability, give both a for- mula and an explanation for why you used that formula, and also give a numerical value when available. When asked to plot something, use informative labels (even if handwrit- ten), so the TA knows what you are plotting, attach a copy of the plot, and, if appropriate, the commands that produced it. No collaboration is allowed on optional exercises. Exercise 1 (Confidence Intervals) (45 pts) For this question, the calculations are trivial. What matters is your reason for doing them. You must explain and defend your reasoning. When we discussed confidence intervals for the mean of a normal distribution with unknown mean µ and known standard deviation σ, based on a sample of n indepen- dent random variables,√ we started with the maximum likelihood estimate µˆ, showed that (ˆµ − µ)/(σ/ √n) is a standard normal, and identified an interval [a, b] so that ¯ P(µ,σ2) ((ˆµ − µ)/(σ/ n) ∈ [a, b]) = 1 − α. We then found an interval [¯a(ˆµ), b(ˆµ)] so that µˆ − µ √ ∈ [a, b] ⇐⇒ µ ∈ [¯a(ˆµ), ¯b(ˆµ)], σ/ n and called that interval the 1 − α confidence interval for µ. Just to make sure we’re on the same page, Ma 3/103 Winter 2017 KC Border Assignment 7 2 1. (4 pts) what are the expressions for a¯(ˆµ) and ¯b(ˆµ)? (Hint: they depend on n, µˆ, zα/2, and σ.) Now consider the continuous “German tank problem.” Here the probability model is 1 0 6 x 6 θ f(x; θ) = θ 0 otherwise where θ > 0 is the unknown parameter.
    [Show full text]