Multi-level block permutation

نویسندگان

  • Anderson M. Winkler
  • Matthew A. Webster
  • Diego Vidaurre
  • Thomas E. Nichols
  • Stephen M. Smith
چکیده

Under weak and reasonable assumptions, mainly that data are exchangeable under the null hypothesis, permutation tests can provide exact control of false positives and allow the use of various non-standard statistics. There are, however, various common examples in which global exchangeability can be violated, including paired tests, tests that involve repeated measurements, tests in which subjects are relatives (members of pedigrees) - any dataset with known dependence among observations. In these cases, some permutations, if performed, would create data that would not possess the original dependence structure, and thus, should not be used to construct the reference (null) distribution. To allow permutation inference in such cases, we test the null hypothesis using only a subset of all otherwise possible permutations, i.e., using only the rearrangements of the data that respect exchangeability, thus retaining the original joint distribution unaltered. In a previous study, we defined exchangeability for blocks of data, as opposed to each datum individually, then allowing permutations to happen within block, or the blocks as a whole to be permuted. Here we extend that notion to allow blocks to be nested, in a hierarchical, multi-level definition. We do not explicitly model the degree of dependence between observations, only the lack of independence; the dependence is implicitly accounted for by the hierarchy and by the permutation scheme. The strategy is compatible with heteroscedasticity and variance groups, and can be used with permutations, sign flippings, or both combined. We evaluate the method for various dependence structures, apply it to real data from the Human Connectome Project (HCP) as an example application, show that false positives can be avoided in such cases, and provide a software implementation of the proposed approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Joint Encryption and Watermarking Technique Using Block Cipher and Wavelet

This paper proposes a joint encryption and watermarking technique based on random block permutation and DWT with the motivation to enhance the security of the multimedia content. The original image is sectioned into the blocks and shuffle the blocks using random permutation, In this technique copyright information is concealed into an encrypted image. Based on the results, permutation of blocks...

متن کامل

The CSQUARE Transform

In this paper we show how to combine the design concepts of the SQUARE and CS block ciphers to produce a pseudo-random permutation CSQUARE suitable for use in block cipher and hash design with a very high multi-round trail weight. The new design inherits the hardware efficiency of the SQUARE linear transform pattern as well as the efficiency of the fast pseudo-Hadamard transform over a finite f...

متن کامل

A Multi-objective Immune System for a New Bi-objective Permutation Flowshop Problem with Sequence-dependent Setup Times

 We present a new mathematical model for a permutation flowshop scheduling problem with sequence-dependent setup times considering minimization of two objectives, namely makespan and weighted mean total earliness/tardiness. Only small-sized problems with up to 20 jobs can be solved by the proposed integer programming approach. Thus, an effective multi-objective immune system (MOIS) is ...

متن کامل

Sorting Separable Permutations by Restricted Multi-break Rearrangements

A multi-break rearrangement generalizes most of genome rearrangements, such as block-interchanges, transpositions and reversals. A k-break cuts k adjacencies over a permutation, and forms k new adjacencies by joining the extremities according to an arbitrary matching. Block-interchange distance is a polynomial problem, but the transposition and the reversal distances are both NP-hard problems. ...

متن کامل

Comments on “An Image Encryption Scheme Based on Rotation Matrix Bit-Level Permutation and Block Diffusion”

Recently, an image encryption scheme based on rotation matrix bit-level permutation and block diffusion was proposed [Y Zhang, D Xiao. Commun Nonlinear Sci Numer Simulat. 2014, 19:74-82]. In this paper, this image encryption scheme was studied in detail and its defects of low encryption speed and weak security were pointed out. This scheme with one round was crypt-analyzed successfully with the...

متن کامل

Fuzzy Multi-objective Permutation Flow Shop Scheduling Problem with Fuzzy Processing Times under Learning and Aging Effects

In industries machine maintenance is used in order to avoid untimely machine fails as well as to improve production effectiveness. This research regards a permutation flow shop scheduling problem with aging and learning effects considering maintenance process. In this study, it is assumed that each machine may be subject to at most one maintenance activity during the planning horizon. The objec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 123  شماره 

صفحات  -

تاریخ انتشار 2015