Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Refer to the example and program on all-subsets regression from Section 5.1.3 with the placekicking data set. Run the genetic algorithm using AICc and include pairwise interactions in the model with marginality = TRUE (no pairwise interactions between variables are considered unless both variables are in the model as well). Use set.seed(837719911) prior to using glmulti(). Note that the function will take a few minutes to run.

(a) Report the best model and its AICc. Compare this to the AICc from the best model found without interactions. Do the interactions improve the model?

(b) How many models are within 2 AICc units of the best model? What does this imply about our confidence in having found the best model?

(c) How many generations did the algorithm produce?

(d) Rerun the algorithm, but do not rerun the set.seed() code. This will cause the algorithm to use different random numbers. Re-examine the same items as requested in (a) - (c) and compare to what you obtained initially.

(e) Rerun the algorithm and the original set.seed() code, increasing the mutation probability to 0.01 (add the argument value mutrate = 0.01; the default is 0.001). Report the results as requested in parts (a) - (c). Are the results any different from those in (a) - (c)? Note that in this context, increasing the mutation probability increases the probability that a variable is randomly added to or removed from a model. In general, increasing the mutation probability can make the algorithm better at finding the top models, but can increase run time.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91994874

Have any Question?


Related Questions in Computer Engineering

Couriers such as ups and fedex complete on service and

Couriers such as UPS and FedEx complete on service and price. One way to reduce cost is to keep labor cost low by hiring and laying off workers to meet the demand. This strategy requires managers to hire and train new wo ...

Please solve the following question using java format

please solve the following question using java format (*Solution can include*if needed* ( if statement, switch, while ) not arrays*) Write a program which performs the following: a) Prompts the user to enter a number N b ...

Question what steps should be taken to detect alleged

Question : What steps should be taken to detect alleged industrial/cyberespionage? Discuss the implications of each of the steps proposed.

Reflective journal entryneed reflective journal entry on

Reflective Journal Entry Need Reflective Journal Entry on writing a Background Assignment The Topic;: One of the most common questions that new students learning programming students ask is what programming language shou ...

In my sample database i need to use select statements to

In my sample database I need to use SELECT statements to find the following: 1) Find the full names of supervisors together with the total number of employees directly supervised by each one of them. 2) Find the full nam ...

System analysis project 4 can you answer the 4 questions at

System Analysis project 4: can you answer the 4 questions at the task section, thank you. Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company ...

In relation to internet connectivity both you and the

In relation to Internet connectivity, both you and the chemists at Plains Research are concerned about security. What network device or devices can be used to address the concern about security?

In a survey of 100 people 40 were casual drinkers event d

In a survey of 100 people, 40 were casual drinkers (event D), and 60 did not drink (event D). Of the ones who drank, 6 had minor headaches. Of the non-drinkers, 9 had minor headaches. Let D represent set of surveyed peop ...

What are the best practices to follow for microsoft windows

What are the best practices to follow for Microsoft Windows network security. Which two would you start with and why?

When using todays digital cameras file sizes are often

When using today's digital cameras file sizes are often saved in a format that is well over 1 Megabyte. This may be great for high definition photo reproductions but is a disaster for uploading to the web. Images on your ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As