Deutsches Institut für Ernährungsforschung Potsdam-Rehbrücke. DAG program (v0.21)

Size: px
Start display at page:

Download "Deutsches Institut für Ernährungsforschung Potsdam-Rehbrücke. DAG program (v0.21)"

Transcription

1 Deutsches Institut für Ernährungsforschung Potsdam-Rehbrücke DAG program (v0.21) Causal diagrams: A computer program to identify minimally sufficient adjustment sets SHORT TUTORIAL Sven Knüppel May 12,

2 General notes Confounding is an important source of bias in epidemiologic studies. With the introduction of causal diagrams (directed acyclic graphs, DAG) a new approach to conceptualize confounding and new rules to identify the minimal sufficient adjustment set have been established (Greenland, Pearl & Robins, Epidemiology, 1999, 10(1):37-48). The DAG program is a analysis tool, designed to select minimal sufficient adjustment sets within directed acyclic graphs. The first version (v0.12) of the DAG program can be used as MS DOS command line program. Using the framework Qt ( we have developed a Windows GUI that allows analyzing and changing causal diagrams more easier. 2

3 General notes If you use DAG program (v0.21), you need the same input files as they used in the previous version. To visualize causal diagrams we refer to the webtool DAGitty ( developed by Johannes Textor (University of Luebeck). Please note that we continuously improve the DAG program. If you have any problems, would like to report a bug or comment on the DAG program, please send an to sven.knueppel@dife.de. 3

4 Background: How to identify a minimally sufficient set? Definition: Back-door criterion A set of variables S satisfies the back-door criterion of exposure and outcome in a DAG if: (i) no node in S is a descendant of exposure; and (ii) S blocks every path between exposure and outcome that contains an arrow into exposure. Theorem If a set of variables S satisfies the back-door criterion, then the causal effect of exposure on outcome is identifiable. Pearl, Causality, 2009, p.79 4

5 Background: How to identify a minimally sufficient set? Theorem The problem of finding a minimum d-separating set S for exposure and outcome in a dag G is equivalent to the problem of finding a minimum separating set for exposure and outcome in the undirected moral graph. Acid and Campos (1996), p10 As introduction of the usage of moral graph see Pearl, Causality (2009, pp ) or Shrier and Platt (2008). 5

6 Citing DAG program If you use DAG program in any published work, please cite both the software (as an electronic resource/url) and the research letter describing the methods. Package: Author: URL: DAG program (including version number) Sven Knüppel Knüppel S, Stang A (2010) DAG program: identifying minimal sufficient adjustment sets. Epidemiology,21(1):159. 6

7 Run DAG program The DAG program runs as Windows program and can be started by clicking on the program icon. While running the program you need to set variable information and a graph description (adjacency list or adjacency matrix). If you wish to determine if a given set of covariates is a sufficient, minimally sufficient, or insufficient then specify these sets. 7

8 Main window 8

9 Input data: variable information The variable information is a white-space (space or tab) delimited text consisting of two columns: Column 1: Name of variable Alphanumeric value (without blanks or other white-spaces) Column 2: Measurement status Measurement status is set to 1 if the variable is measured otherwise it is set to 0. The first line must contain the exposure of interest. The second line needs to contain the event of interest. Thereafter, you can add covariates in any order. Add the variable information in the variable information text field. 9

10 Input data: graph description Adjacency list ( edge statements ) The first possibility to define a DAG is a list of white-space delimited edge statements. All statements are edge statements that name a tail node (parent) and a list of head nodes (childs). Edge starts from the parent and means edge from parent to child_1, to child_2 etc. Only one edge statement is allowed per line. Every parent needs to be described in this file. For further information see section examples. Add the graph description in the Adjacency matrix / Adjacency list text field. 10

11 Input data: graph description Adjacency matrix The second possibility to define a DAG is a adjacency matrix that describes the graph by a matrix containing all arrow directions. Create a matrix consisting of all variables in the same order as in the information text field and code their connection by 1 (arrow) and 0 (no arrow). For better understanding see the examples. Add the graph description in the Adjacency matrix / Adjacency list text field. 11

12 Example 1: Classical confounder triangle Suppose the following DAG is given. E is the exposure of interest, D is the outcome, and C is a possible confounder. All three variables are measured. Create information and graph description. 1. Variable information 2. Definition of causal graph E C? D Variable name E 1 D 1 C 1 Status 1 = measured 0 = unmeasured 1th line: exposure 2nd line: outcome Other variable(s) a. Adjacency list ( edge statements ) edge from parent to child_1, to child_2 etc. E D C E D The edge statement E D makes an edge from E to D. The next edge statement C E D makes an edge from C to E and another from C to D. 12

13 Example 1: Find minimally sufficient set 13

14 Example 1: Variable description 14

15 Example 1: Graph description and minimally sufficient set Suppose the following DAG is given. E is the exposure of interest, D is the outcome, and C is a possible confounder. All three variables are measured. Create information and graph description. 1. Variable information 2. Definition of causal graph E C? D Variable name E 1 D 1 C 1 Status 1 = measured 0 = unmeasured 1th line: exposure 2nd line: outcome Other variable(s) a. Adjacency list ( edge statements ) edge from parent to child_1, to child_2 etc. E D C E D The edge statement E D makes an edge from E to D. The next edge statement C E D makes an edge from C to E and another from C to D. 15

16 Example 1: Classical confounder triangle (cont.) Suppose the following DAG is given. E is the exposure of interest, D is the outcome, and C is a possible confounder. All three variables are measured. C Alternatively, you can specify the DAG with an adjacency matrix. E? D 2. Definition of causal graph b. Adjacency matrix Make a matrix of all arrow directions. Set 1 if there is an arrow otherwise set 0. to E D C E From D C

17 Example 1: Classical confounder triangle (cont.) 17

18 Example 2: DAG including collider adjustment A B C E Z? D Variable information E 1 D 1 A 1 B 1 C 1 Z 1 Adjacency list E D A E Z B Z D C Z D Z E D 18

19 Example 2: Variable description Variable information Adjacency list 19

20 Example 3: Specification of a set of covariates Suppose the DAG from example 2 is given. A B C Z E? D We would like to test three different sets of covariates if they are sufficient. Set 1 = {A} Set 2 = {A, Z} Set 3 = {A, B, C, Z} Additional to the variable information and graph definition we need a definition which specified the test sets. 20

21 Example 3: Specification of a set of covariates The numbers are the path numbers from the graph description. 21

22 Example 3: Specification of a set of covariates 22

23 Remark DAG program distincts between three types of paths: Front-door paths: starting with in arrow pointing away from the exposure Back-door paths: starting with an arrow pointing into the exposure Other paths: starting with an arrow pointing away from the outcome Other paths are unconditional no biasing paths. Other paths could be opened by conditioning on a specified set. 23

24 Remark If a specified set contains a descendant of exposure or outcome, the total effect might not estimated. In this case the found minimally sufficient set conditional on specified set (MSA) means that all backdoor and other paths are closed conditional on this MSA. Those MSAs must not fullfill the Backdoor criterion and therefore should be used carefully. Direct paths from outcome to exposure are not allowed because this would violate the temporality assumption that the exposure should not be a consequence of the outcome. Such a path would create a loop between exposure and outcome. 24

25 Loading existing files To load a graph you need the two input files: Variable information (often saved as *.info) Graph description file (often saved as *.txt) By clicking on File>New you can load the graph. 25

26 Loading existing files 26

27 Save You can save your result by clicking on File>Save. 27

28 Save 28

29 Options It is possible to specify the maximum number to show paths and it is also possible to set a upper limit for counting paths. 29

30 Integrated examples Sehrndt A, Stang A, Lehmkuhl E, Regitz-Zagrosek V, Babitsch B (2010). Influence of the socioeconomic status on the health related quality of life in patients before and after coronary artery bypass grafting an example of using DAG. Presentation at DAG workshop of DGEpi at BAuA (Berlin), 26.Nov.2010 Polzer et al. personal communication, Schipf S, Haring R, Friedrich N, Nauck M, Lau K, Alte D, Stang A, Völzke H, Wallaschofski H. Low total testosterone is associated with increased risk of incident type 2 diabetes mellitus in men: Results from the study of health in pomerania (SHIP). The Aging Male, in press. Shrier I, Platt WP Reducing bias through directed acyclic graphs. BMC Medical Research Methodology 2008, 8:70. Acid S, De Campos LM. An algorithm for finding minimum d-separating sets in belief networks. In Proceedings of the twelfth Conference of Uncertainty in Artificial Intelligence, pages 3-10,

31 References Acid S, De Campos L.M. (1996).. An algorithm for finding minimum d-separating sets in belief networks. In Proceedings of the twelfth Conference of Uncertainty in Artificial Intelligence, pages 3-10 Clark, J. and Holton, D.A. (1994). Graphentheorie. Grundlagen und Anwendungen. Heidelberg: Spektrum Akad. Vlg. Glymour, M.M. and Greenland, S. (2008). Causal diagrams. Ch. 12 in: Rothman, K.J., Greenland, S., Lash,T.L. Modern Epidemiology, 3rd ed. Philadelphia: Lippincott. Greenland, S., Pearl, J. and Robins, J.M. (1999). Causal diagrams for epidemiologic research. Epidemiology, 10, Greenland, S. and Brumback, B.A. (2002). An overview of relations among causal modelling methods. International Journal of Epidemiology, 31, Hernán, M.A., Hernandez-Diaz, S., Werler, M.M., Mitchell, A.A. (2002). Causal knowledge as a prerequisite for confounding evaluation. American Journal of Epidemiology, 155,

32 References Pearl, J. (1995). Causal diagrams for empirical research (with discussion). Biometrika,82, Pearl, J. (2009). Causality. New York: Cambridge University Press. 2nd Edition. Pearl, J., (2009). Causal inference in statistics: An overview. Statistics Surveys, 3, Robins, J.M. (2001). Data, design, and background knowledge in etiologic inference. Epidemiology;12: Schipf S, Haring R, Friedrich N, Nauck M, Lau K, Alte D, Stang A, Völzke H, Wallaschofski H. (2010). Low total testosterone is associated with increased risk of incident type 2 diabetes mellitus in men: Results from the study of health in pomerania (SHIP). The Aging Male. in press. 32

33 References Sehrndt A, Stang A, Lehmkuhl E, Regitz-Zagrosek V, Babitsch B (2010). Influence of the socioeconomic status on the health related quality of life in patients before and after coronary artery bypass grafting an example of using DAG. Presentation at DAG workshop of DGEpi at BAuA (Berlin), 26.Nov.2010 Shrier I, Platt W.P. (2008). Reducing bias through directed acyclic graphs. BMC Medical Research Methodology, 8:70. Skienna S.S. (2008). The Algorithm Design Manual, 2n ed., Berlin, Springer. Spirtes, P., Glymour, C., Scheines, R. (2001). Causation, Prediction, and Search, 2nd ed. Cambridge, MA: MIT Press. 33

34 Sven Knüppel Department Epidemiology Deutsches Institut für Ernährungsforschung German Institute of Human Nutrition Potsdam-Rehbrücke DAG program: Thanks to Johannes Textor, Juliane Hardt, Dagmar Drogan, and Karina Meidtner for helpful comments. Special thanks to Andreas Stang and Charles Poole for their helpful comments on the first version of DAG program. 34

Deutsches Institut für Ernährungsforschung. DAG-Programm I: Minimierung von Confounding bei komplexen kausalen Graphen (directed acyclic graphs)

Deutsches Institut für Ernährungsforschung. DAG-Programm I: Minimierung von Confounding bei komplexen kausalen Graphen (directed acyclic graphs) Deutsches Institut für Ernährungsforschung DAG-Programm I: Minimierung von Confounding bei komplexen kausalen Graphen (directed acyclic graphs) Sven Knüppel 1, Johannes Textor 2 Workshop 26. November 2010

More information

Causal Inference and Major League Baseball

Causal Inference and Major League Baseball Causal Inference and Major League Baseball Jamie Thornton Department of Mathematical Sciences Montana State University May 4, 2012 A writing project submitted in partial fulfillment of the requirements

More information

5 Directed acyclic graphs

5 Directed acyclic graphs 5 Directed acyclic graphs (5.1) Introduction In many statistical studies we have prior knowledge about a temporal or causal ordering of the variables. In this chapter we will use directed graphs to incorporate

More information

Epidemiologists typically seek to answer causal questions using statistical data:

Epidemiologists typically seek to answer causal questions using statistical data: c16.qxd 2/8/06 12:43 AM Page 387 Y CHAPTER SIXTEEN USING CAUSAL DIAGRAMS TO UNDERSTAND COMMON PROBLEMS IN SOCIAL EPIDEMIOLOGY M. Maria Glymour Epidemiologists typically seek to answer causal questions

More information

Commentary: Is it time to redefine Cognitive Epidemiology?

Commentary: Is it time to redefine Cognitive Epidemiology? Commentary: Is it time to redefine Cognitive Epidemiology? Archana Singh-Manoux 1,2,3 * Corresponding author & address: 1 INSERM, U1018 Centre for Research in Epidemiology and Population Health Hôpital

More information

Commentator: A Front-End User-Interface Module for Graphical and Structural Equation Modeling

Commentator: A Front-End User-Interface Module for Graphical and Structural Equation Modeling Commentator: A Front-End User-Interface Module for Graphical and Structural Equation Modeling Trent Mamoru Kyono May 2010 Technical Report R-364 Cognitive Systems Laboratory Department of Computer Science

More information

Module 223 Major A: Concepts, methods and design in Epidemiology

Module 223 Major A: Concepts, methods and design in Epidemiology Module 223 Major A: Concepts, methods and design in Epidemiology Module : 223 UE coordinator Concepts, methods and design in Epidemiology Dates December 15 th to 19 th, 2014 Credits/ECTS UE description

More information

Analysis of Algorithms, I

Analysis of Algorithms, I Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

More information

A Comparison of Novel and State-of-the-Art Polynomial Bayesian Network Learning Algorithms

A Comparison of Novel and State-of-the-Art Polynomial Bayesian Network Learning Algorithms A Comparison of Novel and State-of-the-Art Polynomial Bayesian Network Learning Algorithms Laura E. Brown Ioannis Tsamardinos Constantin F. Aliferis Vanderbilt University, Department of Biomedical Informatics

More information

Network Analysis of Project Communication Based on Graph Theory

Network Analysis of Project Communication Based on Graph Theory Proceedings of the 8th International Conference on Innovation & Management 481 Network Analysis of Project Communication Based on Graph Theory Naoki Ohshima 1, Akihito Kawashima 2 1 School of MOT, Yamaguchi

More information

Chapter 14 Managing Operational Risks with Bayesian Networks

Chapter 14 Managing Operational Risks with Bayesian Networks Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian

More information

The PageRank Citation Ranking: Bring Order to the Web

The PageRank Citation Ranking: Bring Order to the Web The PageRank Citation Ranking: Bring Order to the Web presented by: Xiaoxi Pang 25.Nov 2010 1 / 20 Outline Introduction A ranking for every page on the Web Implementation Convergence Properties Personalized

More information

XPC Algorithms For Structured Learning in Bayesian Networks

XPC Algorithms For Structured Learning in Bayesian Networks An Algorithm to Handle Structural Uncertainties in Learning Bayesian Network Cleuber Moreira Fernandes Politec Informática Ltda SIG quadra 4 lote 173, Zip Code 70.610-440, Brasília, DF, Brazil cleuber@compeduc.net

More information

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline

More information

Monitoring the Behaviour of Credit Card Holders with Graphical Chain Models

Monitoring the Behaviour of Credit Card Holders with Graphical Chain Models Journal of Business Finance & Accounting, 30(9) & (10), Nov./Dec. 2003, 0306-686X Monitoring the Behaviour of Credit Card Holders with Graphical Chain Models ELENA STANGHELLINI* 1. INTRODUCTION Consumer

More information

A Hybrid Anytime Algorithm for the Construction of Causal Models From Sparse Data.

A Hybrid Anytime Algorithm for the Construction of Causal Models From Sparse Data. 142 A Hybrid Anytime Algorithm for the Construction of Causal Models From Sparse Data. Denver Dash t Department of Physics and Astronomy and Decision Systems Laboratory University of Pittsburgh Pittsburgh,

More information

Model-based Synthesis. Tony O Hagan

Model-based Synthesis. Tony O Hagan Model-based Synthesis Tony O Hagan Stochastic models Synthesising evidence through a statistical model 2 Evidence Synthesis (Session 3), Helsinki, 28/10/11 Graphical modelling The kinds of models that

More information

Confounding in health research

Confounding in health research Confounding in health research Part 1: Definition and conceptual issues Madhukar Pai, MD, PhD Assistant Professor of Epidemiology McGill University madhukar.pai@mcgill.ca 1 Why is confounding so important

More information

Data Structures and Algorithms Written Examination

Data Structures and Algorithms Written Examination Data Structures and Algorithms Written Examination 22 February 2013 FIRST NAME STUDENT NUMBER LAST NAME SIGNATURE Instructions for students: Write First Name, Last Name, Student Number and Signature where

More information

Graphical Models for Recovering Probabilistic and Causal Queries from Missing Data

Graphical Models for Recovering Probabilistic and Causal Queries from Missing Data Graphical Models for Recovering Probabilistic and Causal Queries from Missing Data Karthika Mohan and Judea Pearl Cognitive Systems Laboratory Computer Science Department University of California, Los

More information

A permutation can also be represented by describing its cycles. What do you suppose is meant by this?

A permutation can also be represented by describing its cycles. What do you suppose is meant by this? Shuffling, Cycles, and Matrices Warm up problem. Eight people stand in a line. From left to right their positions are numbered,,,... 8. The eight people then change places according to THE RULE which directs

More information

Commentary: A structural approach to Berkson s fallacy and a guide to a history of opinions about it

Commentary: A structural approach to Berkson s fallacy and a guide to a history of opinions about it 515 International Journal of Epidemiology, 2014, Vol. 43, No. 2 the hospital population by any device that does not involve the acquisition of data which would themselves answer the primary question. For

More information

A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases

A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases Gerardo Canfora Bice Cavallo University of Sannio, Benevento, Italy, {gerardo.canfora,bice.cavallo}@unisannio.it ABSTRACT In

More information

Learning a Bayesian network model for predicting wildfire behavior

Learning a Bayesian network model for predicting wildfire behavior Learning a Bayesian network model for predicting wildfire behavior K. Zwirglmaier, P. Papakosta, D. Straub Engineering Risk Analysis Group, Technische Universität München, Germany ABSTRACT: A Bayesian

More information

Many research questions in epidemiology are concerned. Estimation of Direct Causal Effects ORIGINAL ARTICLE

Many research questions in epidemiology are concerned. Estimation of Direct Causal Effects ORIGINAL ARTICLE ORIGINAL ARTICLE Maya L. Petersen, Sandra E. Sinisi, and Mark J. van der Laan Abstract: Many common problems in epidemiologic and clinical research involve estimating the effect of an exposure on an outcome

More information

UCINET Visualization and Quantitative Analysis Tutorial

UCINET Visualization and Quantitative Analysis Tutorial UCINET Visualization and Quantitative Analysis Tutorial Session 1 Network Visualization Session 2 Quantitative Techniques Page 2 An Overview of UCINET (6.437) Page 3 Transferring Data from Excel (From

More information

Microsoft Project 2010

Microsoft Project 2010 Tutorial 1: Planning a Project Microsoft Project 2010 In Tutorial Section 1.1 you will: Learn project management terminology Understand the benefits of project management Explore the Project 2010 window

More information

Causal inference from big data: Theoretical foundations and the data-fusion problem Elias Bareinboim and Judea Pearl

Causal inference from big data: Theoretical foundations and the data-fusion problem Elias Bareinboim and Judea Pearl Written for the Proceedings of the National Academy of ciences. r450 2015/6/30 23:48 page 1 #1 Causal inference from big data: Theoretical foundations and the data-fusion problem Elias Bareinboim and Judea

More information

Week 3&4: Z tables and the Sampling Distribution of X

Week 3&4: Z tables and the Sampling Distribution of X Week 3&4: Z tables and the Sampling Distribution of X 2 / 36 The Standard Normal Distribution, or Z Distribution, is the distribution of a random variable, Z N(0, 1 2 ). The distribution of any other normal

More information

Prospective, retrospective, and cross-sectional studies

Prospective, retrospective, and cross-sectional studies Prospective, retrospective, and cross-sectional studies Patrick Breheny April 3 Patrick Breheny Introduction to Biostatistics (171:161) 1/17 Study designs that can be analyzed with χ 2 -tests One reason

More information

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,

More information

Graphical Modeling for Genomic Data

Graphical Modeling for Genomic Data Graphical Modeling for Genomic Data Carel F.W. Peeters cf.peeters@vumc.nl Joint work with: Wessel N. van Wieringen Mark A. van de Wiel Molecular Biostatistics Unit Dept. of Epidemiology & Biostatistics

More information

Handling missing data in Stata a whirlwind tour

Handling missing data in Stata a whirlwind tour Handling missing data in Stata a whirlwind tour 2012 Italian Stata Users Group Meeting Jonathan Bartlett www.missingdata.org.uk 20th September 2012 1/55 Outline The problem of missing data and a principled

More information

Center for Causal Discovery (CCD) of Biomedical Knowledge from Big Data University of Pittsburgh Carnegie Mellon University Pittsburgh Supercomputing

Center for Causal Discovery (CCD) of Biomedical Knowledge from Big Data University of Pittsburgh Carnegie Mellon University Pittsburgh Supercomputing Center for Causal Discovery (CCD) of Biomedical Knowledge from Big Data University of Pittsburgh Carnegie Mellon University Pittsburgh Supercomputing Center Yale University PIs: Ivet Bahar, Jeremy Berg,

More information

General and Abdominal Adiposity and Risk of Death in Europe

General and Abdominal Adiposity and Risk of Death in Europe Deutsches Institut für Ernährungsforschung Potsdam-Rehbrücke General and Abdominal Adiposity and Risk of Death in Europe Tobias Pischon Department of Epidemiology German Institute of Human Nutrition Potsdam-Rehbruecke

More information

Randomized trials versus observational studies

Randomized trials versus observational studies Randomized trials versus observational studies The case of postmenopausal hormone therapy and heart disease Miguel Hernán Harvard School of Public Health www.hsph.harvard.edu/causal Joint work with James

More information

Model Simulation in Rational Software Architect: Business Process Simulation

Model Simulation in Rational Software Architect: Business Process Simulation Model Simulation in Rational Software Architect: Business Process Simulation Mattias Mohlin Senior Software Architect IBM The BPMN (Business Process Model and Notation) is the industry standard notation

More information

Accept And Refund Payments In A PayPal Personal Account

Accept And Refund Payments In A PayPal Personal Account Accept And Refund Payments In A PayPal Personal Account If you run a PayPal personal account, when payment is received, it does not get credited automatically to your account. The merchant has to Login

More information

My work provides a distinction between the national inputoutput model and three spatial models: regional, interregional y multiregional

My work provides a distinction between the national inputoutput model and three spatial models: regional, interregional y multiregional Mexico, D. F. 25 y 26 de Julio, 2013 My work provides a distinction between the national inputoutput model and three spatial models: regional, interregional y multiregional Walter Isard (1951). Outline

More information

Gephi Tutorial Visualization

Gephi Tutorial Visualization Gephi Tutorial Welcome to this Gephi tutorial. It will guide you to the basic and advanced visualization settings in Gephi. The selection and interaction with tools will also be introduced. Follow the

More information

JustClust User Manual

JustClust User Manual JustClust User Manual Contents 1. Installing JustClust 2. Running JustClust 3. Basic Usage of JustClust 3.1. Creating a Network 3.2. Clustering a Network 3.3. Applying a Layout 3.4. Saving and Loading

More information

Agenda. Interface Agents. Interface Agents

Agenda. Interface Agents. Interface Agents Agenda Marcelo G. Armentano Problem Overview Interface Agents Probabilistic approach Monitoring user actions Model of the application Model of user intentions Example Summary ISISTAN Research Institute

More information

Business Intelligence Overview. BW/BI Security. BW/BI Architecture. Business Explorer (BEx) BW/BI BEx Tools Overview. What is BEx?

Business Intelligence Overview. BW/BI Security. BW/BI Architecture. Business Explorer (BEx) BW/BI BEx Tools Overview. What is BEx? SAP Business Warehouse/Business Intelligence Reporting Business Explorer (BEx) Washington State HRMS Business Warehouse/Business Intelligence (BW/BI) BW/BI Power User Workshop Materials General Topics

More information

Introduction to Microsoft Access 2010

Introduction to Microsoft Access 2010 Introduction to Microsoft Access 2010 A database is a collection of information that is related. Access allows you to manage your information in one database file. Within Access there are four major objects:

More information

Bayesian Statistics: Indian Buffet Process

Bayesian Statistics: Indian Buffet Process Bayesian Statistics: Indian Buffet Process Ilker Yildirim Department of Brain and Cognitive Sciences University of Rochester Rochester, NY 14627 August 2012 Reference: Most of the material in this note

More information

Introduction to Microsoft Access 2013

Introduction to Microsoft Access 2013 Introduction to Microsoft Access 2013 A database is a collection of information that is related. Access allows you to manage your information in one database file. Within Access there are four major objects:

More information

Graphical Analyses of Clinical Trial Safety Data

Graphical Analyses of Clinical Trial Safety Data Graphical Analyses of Clinical Trial Safety Data Haijun Ma, Kefei Zhou, Amy ia, Matt Austin, George Li, Michael Connell 08/10/07, GBE Scientific Forum verview Current situation of clinical trial safety

More information

Microsoft Access Rollup Procedure for Microsoft Office 2007. 2. Click on Blank Database and name it something appropriate.

Microsoft Access Rollup Procedure for Microsoft Office 2007. 2. Click on Blank Database and name it something appropriate. Microsoft Access Rollup Procedure for Microsoft Office 2007 Note: You will need tax form information in an existing Excel spreadsheet prior to beginning this tutorial. 1. Start Microsoft access 2007. 2.

More information

Euler Paths and Euler Circuits

Euler Paths and Euler Circuits Euler Paths and Euler Circuits An Euler path is a path that uses every edge of a graph exactly once. An Euler circuit is a circuit that uses every edge of a graph exactly once. An Euler path starts and

More information

When to use Excel. When NOT to use Excel 9/24/2014

When to use Excel. When NOT to use Excel 9/24/2014 Analyzing Quantitative Assessment Data with Excel October 2, 2014 Jeremy Penn, Ph.D. Director When to use Excel You want to quickly summarize or analyze your assessment data You want to create basic visual

More information

CS&SS / STAT 566 CAUSAL MODELING

CS&SS / STAT 566 CAUSAL MODELING CS&SS / STAT 566 CAUSAL MODELING Instructor: Thomas Richardson E-mail: thomasr@u.washington.edu Lecture: MWF 2:30-3:20 SIG 227; WINTER 2016 Office hour: W 3.30-4.20 in Padelford (PDL) B-313 (or by appointment)

More information

APA-STYLE TABLES in MICROSOFT WORD 2007

APA-STYLE TABLES in MICROSOFT WORD 2007 Twin Cities Writing Center APA-STYLE TABLES in MICROSOFT WORD 2007 Before inserting a table into your paper, make sure a table is an appropriate way to communicate your information. Read about the use

More information

TimeValue Software Due Date Tracking and Task Management Software

TimeValue Software Due Date Tracking and Task Management Software User s Guide TM TimeValue Software Due Date Tracking and Task Management Software File In Time Software User s Guide Copyright TimeValue Software, Inc. (a California Corporation) 1992-2010. All rights

More information

1 Definitions. Supplementary Material for: Digraphs. Concept graphs

1 Definitions. Supplementary Material for: Digraphs. Concept graphs Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.

More information

Chapter 2 Introduction to Sequence Analysis for Human Behavior Understanding

Chapter 2 Introduction to Sequence Analysis for Human Behavior Understanding Chapter 2 Introduction to Sequence Analysis for Human Behavior Understanding Hugues Salamin and Alessandro Vinciarelli 2.1 Introduction Human sciences recognize sequence analysis as a key aspect of any

More information

Hands on Microsoft Project (Part I) From a WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle.

Hands on Microsoft Project (Part I) From a WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle. Planning and Managing Software Projects 2011-12 Class 10 Hands on Microsoft Project (Part I) From a WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle.org

More information

Application of the TETRAD II Program to the Study of Student Retention in U.S. Colleges

Application of the TETRAD II Program to the Study of Student Retention in U.S. Colleges From: AAAI Technical Report WS-94-03. Compilation copyright 1994, AAAI (www.aaai.org). All rights reserved. Application of the TETRAD II Program to the Study of Student Retention in U.S. Colleges Marek

More information

Large-Sample Learning of Bayesian Networks is NP-Hard

Large-Sample Learning of Bayesian Networks is NP-Hard Journal of Machine Learning Research 5 (2004) 1287 1330 Submitted 3/04; Published 10/04 Large-Sample Learning of Bayesian Networks is NP-Hard David Maxwell Chickering David Heckerman Christopher Meek Microsoft

More information

Lab 2: MS ACCESS Tables

Lab 2: MS ACCESS Tables Lab 2: MS ACCESS Tables Summary Introduction to Tables and How to Build a New Database Creating Tables in Datasheet View and Design View Working with Data on Sorting and Filtering 1. Introduction Creating

More information

Best Practice Manual Testing of E2E processes using SAP Solution Manager 7.1 - Test Option 1. Marcus Wefers, ALM Solution Management, AGS, SAP AG

Best Practice Manual Testing of E2E processes using SAP Solution Manager 7.1 - Test Option 1. Marcus Wefers, ALM Solution Management, AGS, SAP AG Best Practice Manual Testing of E2E processes using SAP Solution Manager 7.1 - Test Option 1 Marcus Wefers, ALM Solution Management, AGS, SAP AG Agenda 1. Approaches for manual testing of E2E Business

More information

INCIDENT INVESTIGATION BASED ON CAUSALITY NETWORKS

INCIDENT INVESTIGATION BASED ON CAUSALITY NETWORKS IChemE SYMPOSIUM SERIES NO. 153 INCIDENT INVESTIGATION BASED ON CAUSALITY NETWORKS Yukiyasu Shimada 1, Rafael Batres 2, Tetsuo Fuchino 3 and Toshinori Kawabata 1 1 Chemical Safety Research Group, National

More information

A Review And Evaluations Of Shortest Path Algorithms

A Review And Evaluations Of Shortest Path Algorithms A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing

More information

Service Desk Manager QUICK TIP: Service Desk Manager 12.6 Upgrade New Features and Known Issues

Service Desk Manager QUICK TIP: Service Desk Manager 12.6 Upgrade New Features and Known Issues Service Desk Manager QUICK TIP: Service Desk Manager 12.6 Upgrade New Features and Known Issues New Features: Firefox Functionality Analysts now have the ability to use the most up-to-date versions of

More information

ABAQUS/CAE Tutorial: Analysis of an Aluminum Bracket

ABAQUS/CAE Tutorial: Analysis of an Aluminum Bracket H. Kim FEA Tutorial 1 ABAQUS/CAE Tutorial: Analysis of an Aluminum Bracket Hyonny Kim last updated: August 2004 In this tutorial, you ll learn how to: 1. Sketch 2D geometry & define part. 2. Define material

More information

Chapter 6. Using the SQL Server

Chapter 6. Using the SQL Server Chapter 6 Using the SQL Server BC30 Using the SQL Server 1 5/2010 Content 1 Installing and setting up the SQL Server... 3 2 Exporting an SQL database... 7 3 Importing an SQL database... 9 4 Opening the

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

NetBeans Profiler is an

NetBeans Profiler is an NetBeans Profiler Exploring the NetBeans Profiler From Installation to a Practical Profiling Example* Gregg Sporar* NetBeans Profiler is an optional feature of the NetBeans IDE. It is a powerful tool that

More information

Scheduling Document Creation

Scheduling Document Creation Scheduling Document Creation What is a Schedule in epm? Schedules The epm Schedule application is an integral part of the Portfolio Management suite of applications. Start and end dates for each summary

More information

Simple Graphs Degrees, Isomorphism, Paths

Simple Graphs Degrees, Isomorphism, Paths Mathematics for Computer Science MIT 6.042J/18.062J Simple Graphs Degrees, Isomorphism, Types of Graphs Simple Graph this week Multi-Graph Directed Graph next week Albert R Meyer, March 10, 2010 lec 6W.1

More information

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software

More information

An Application of the G-formula to Asbestos and Lung Cancer. Stephen R. Cole. Epidemiology, UNC Chapel Hill. Slides: www.unc.

An Application of the G-formula to Asbestos and Lung Cancer. Stephen R. Cole. Epidemiology, UNC Chapel Hill. Slides: www.unc. An Application of the G-formula to Asbestos and Lung Cancer Stephen R. Cole Epidemiology, UNC Chapel Hill Slides: www.unc.edu/~colesr/ 1 Acknowledgements Collaboration with David B. Richardson, Haitao

More information

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph

More information

Microsoft Project From the WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle.org

Microsoft Project From the WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle.org Planning and Managing Software Projects 2010-11 Session 6 Microsoft Project From the WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle.org Credits 2 These

More information

The Basics of Graphical Models

The Basics of Graphical Models The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures

More information

Using graphical modelling in official statistics

Using graphical modelling in official statistics Quaderni di Statistica Vol. 6, 2004 Using graphical modelling in official statistics Richard N. Penny Fidelio Consultancy E-mail: cpenny@xtra.co.nz Marco Reale Mathematics and Statistics Department, University

More information

A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems

A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems Proceedings of 10 th International Conference on User Modeling, pp423-427 Edinburgh, UK, July 24-29, 2005. Springer-Verlag Berlin Heidelberg 2005 A Framework of Context-Sensitive Visualization for User-Centered

More information

IPDET Module 6: Descriptive, Normative, and Impact Evaluation Designs

IPDET Module 6: Descriptive, Normative, and Impact Evaluation Designs IPDET Module 6: Descriptive, Normative, and Impact Evaluation Designs Intervention or Policy Evaluation Questions Design Questions Elements Types Key Points Introduction What Is Evaluation Design? Connecting

More information

Correlational Research

Correlational Research Correlational Research Chapter Fifteen Correlational Research Chapter Fifteen Bring folder of readings The Nature of Correlational Research Correlational Research is also known as Associational Research.

More information

Network Analysis: Lecture 1. Sacha Epskamp 02-09-2014

Network Analysis: Lecture 1. Sacha Epskamp 02-09-2014 : Lecture 1 University of Amsterdam Department of Psychological Methods 02-09-2014 Who are you? What is your specialization? Why are you here? Are you familiar with the network perspective? How familiar

More information

2: Entering Data. Open SPSS and follow along as your read this description.

2: Entering Data. Open SPSS and follow along as your read this description. 2: Entering Data Objectives Understand the logic of data files Create data files and enter data Insert cases and variables Merge data files Read data into SPSS from other sources The Logic of Data Files

More information

Getting Started with the DCHR Service Desk. District Service Management Program

Getting Started with the DCHR Service Desk. District Service Management Program Getting Started with the DCHR Service Desk District Service Management Program October 30, 2008 Contacting the District Service Management Group You can access the District Service Management group s website

More information

Cloud UC Call Recording Interface in SAP dashboard

Cloud UC Call Recording Interface in SAP dashboard FUSION CLOUD UC CALL RECORDING ADMIN GUIDE Contents: INTRODUCTION...3 LOGGING ON...4 HOME TAB (DASHBOARD)...6 First Look...6 Calls by Category...8 Frequent Callers...9 Calls by Location... 10 Call Handler

More information

Visual Analysis Tool for Bipartite Networks

Visual Analysis Tool for Bipartite Networks Visual Analysis Tool for Bipartite Networks Kazuo Misue Department of Computer Science, University of Tsukuba, 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan misue@cs.tsukuba.ac.jp Abstract. To find hidden features

More information

ACCESS 2007 BASICS. Best Practices in MS Access. Information Technology. MS Access 2007 Users Guide. IT Training & Development (818) 677-1700

ACCESS 2007 BASICS. Best Practices in MS Access. Information Technology. MS Access 2007 Users Guide. IT Training & Development (818) 677-1700 Information Technology MS Access 2007 Users Guide ACCESS 2007 BASICS Best Practices in MS Access IT Training & Development (818) 677-1700 Email: training@csun.edu Website: www.csun.edu/it/training Access

More information

The Main Page of RE STATS will provide the range of data at the very top of the page.

The Main Page of RE STATS will provide the range of data at the very top of the page. RE STATS Navigator can be accessed from Tempo under the Financials Tab at the top. It will be your bottom option under the drop down menu. The Main Page of RE STATS will provide the range of data at the

More information

Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms

Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms InfoPath 2013 Web Enabled (Browser) forms Creating Web Enabled

More information

Segmenting sales forecasting accuracy

Segmenting sales forecasting accuracy Segmenting sales forecasting accuracy An ABC-XYZ-analysis on the accuracy of Neural Networks, SAP APO-DP and Judgmental Forecasting at Beiersdorf Michael Tramnitzke Dr. Sven Crone 2 The target of the study:

More information

15.062 Data Mining: Algorithms and Applications Matrix Math Review

15.062 Data Mining: Algorithms and Applications Matrix Math Review .6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop

More information

. 0 1 10 2 100 11 1000 3 20 1 2 3 4 5 6 7 8 9

. 0 1 10 2 100 11 1000 3 20 1 2 3 4 5 6 7 8 9 Introduction The purpose of this note is to find and study a method for determining and counting all the positive integer divisors of a positive integer Let N be a given positive integer We say d is a

More information

FDA s Vulnerability Assessment Software tool

FDA s Vulnerability Assessment Software tool FDA s Vulnerability Assessment Software tool Quick Instruction Guide The FDA s Vulnerability Assessment Software tool uses the CARVER + Shock methodology. The software tool is a user-friendly, interactive

More information

Working with Tables: How to use tables in OpenOffice.org Writer

Working with Tables: How to use tables in OpenOffice.org Writer Working with Tables: How to use tables in OpenOffice.org Writer Title: Working with Tables: How to use tables in OpenOffice.org Writer Version: 1.0 First edition: January 2005 First English edition: January

More information

Dealing with Missing Data

Dealing with Missing Data Dealing with Missing Data Roch Giorgi email: roch.giorgi@univ-amu.fr UMR 912 SESSTIM, Aix Marseille Université / INSERM / IRD, Marseille, France BioSTIC, APHM, Hôpital Timone, Marseille, France January

More information

Tutorial 2 Online and offline Ship Visualization tool Table of Contents

Tutorial 2 Online and offline Ship Visualization tool Table of Contents Tutorial 2 Online and offline Ship Visualization tool Table of Contents 1.Tutorial objective...2 1.1.Standard that will be used over this document...2 2. The online tool...2 2.1.View all records...3 2.2.Search

More information

Circuits 1 M H Miller

Circuits 1 M H Miller Introduction to Graph Theory Introduction These notes are primarily a digression to provide general background remarks. The subject is an efficient procedure for the determination of voltages and currents

More information

SAS/GRAPH Network Visualization Workshop 2.1

SAS/GRAPH Network Visualization Workshop 2.1 SAS/GRAPH Network Visualization Workshop 2.1 User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2009. SAS/GRAPH : Network Visualization Workshop

More information

DETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS

DETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS Hacettepe Journal of Mathematics and Statistics Volume 33 (2004), 69 76 DETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS Hülya Olmuş and S. Oral Erbaş Received 22 : 07 : 2003 : Accepted 04

More information

THE TOP TEN TIPS FOR USING QUALTRICS AT BYU

THE TOP TEN TIPS FOR USING QUALTRICS AT BYU THE TOP TEN TIPS FOR USING QUALTRICS AT BYU TIP #1: CREATING A SURVEY FROM A COPY AND COLLABORATING ON SURVEYS TIP #2: CREATING AND USING PANELS TIP #3: LIBRARIES AND HOW TO USE THEM TIP #4: BASIC SKIP

More information

Enterprise Organization and Communication Network

Enterprise Organization and Communication Network Enterprise Organization and Communication Network Hideyuki Mizuta IBM Tokyo Research Laboratory 1623-14, Shimotsuruma, Yamato-shi Kanagawa-ken 242-8502, Japan E-mail: e28193@jp.ibm.com Fusashi Nakamura

More information

Visualizing e-government Portal and Its Performance in WEBVS

Visualizing e-government Portal and Its Performance in WEBVS Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR ccfong@umac.mo Abstract An e-government

More information

SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS

SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS UDC: 004.8 Original scientific paper SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS Tonimir Kišasondi, Alen Lovren i University of Zagreb, Faculty of Organization and Informatics,

More information