• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month

# Instrument Calibration.

Extracts from this document...

Introduction

## Introduction

A new device that measures the concentration of fluorescence requires calibration. The device is calibrated using the calibration line , method of least square estimation can be used to estimate the parameters α and β and the validity of the estimates using measurement readings from observed data.

The following are the measurements of fluorescence y, of a substance, A, in known concentrations x in μg/m3, using the new device.

 Fluorescence (y) 1 8 16 24 32 38 Concentration (x) 0 2 4 6 8 10

## Description of Data

The fluorescence (y) of a substance, A and its concentration (x) has a linear relationship, where concentration (x) increases as fluorescence (y) of the substance increases.

A linear model will be fitted to the observed data. The model is as follows: Straight-line regression

1. Fluorescence (y) is the dependent variable
2. Concentration (x) is called the regressor variable.  1, 2, … , n

here = e = Error

ei is the error in the ith observation yi.

## Assumption on the errors

1. {ei} are mutually independent
2. E(ei) = 0
3. Var(ei) = σ2  We assume ei’s are normal i.e.        ei ~ N(0, σ2) 1, 2, … , n

## Regression by Formula

Middle

16.05

23.62

31.19

38.76

Total 0.095

-0.476

-0.048

0.381

0.810

-0.762

0.000

For the model to be a good fit to the data we require the sum of the errors equal zero.  ### Variance-covariance matrix    The above variance-covariance matrix gives , and ### Design matrix

Below is the full fitted model for the data.  Analysis of Variance
 Source Sum of squares df Mean (SS) F ratio Due to regression    Error SS (residual SS)   Total  The ratio is distributed as F with (1, n –2 ) df.

Here we reject the null hypothesis that β = 0 if the > Fα, 1, n – 2

Rejecting the null hypothesis implies that the variable x influences the variable y.  That is the concentration increases as the fluorescence of substance A increases.

Analysis of Variance

Source            DF         SS         MS         F      P

Regression         1    1003.21    1003.21   2478.53  0.000

Error              4       1.62       0.40

Total              5    1004.83

From the ANOVA table we see that the P-value is 0.000 < 0.01, which is significant at the 1% significance level. We can conclude there is overwhelming evidence to reject the null hypothesis in favour of the alternative hypothesis, i.e. the concentration depends on fluorescence of the substance.

## Goodness of fit in regression

Having found the best straight line, the next question is how well it describes the data.

Conclusion and make the subject of the formula.   When y = 17.5

## Given some the predictor is just , the error is given by Where  hence     = (17.35, 17.65) with 90% confidence.

Conclusion

## The regression model fitted for the data is of the form: where is the dependent variable is the intercept is the slope of the regression coefficient is the independent variable is the error term.

• ## You cannot assume that the regression line is valid outside the range of the data.

• You can interpolate, but you cannot extrapolate.

In the model the unknown parameter α and β where calculated. From the 90% confidence interval we know we have a good estimate for the gradient β of the model however more data is required before anything very definite can be said about the intercept of the model the parameter α.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

## Found what you're looking for?

• Start learning 29% faster today
• 150,000+ documents available
• Just £6.99 a month

Not the one? Search for your essay title...
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month

# Related University Degree Computer Science essays

1. ## IP network design

Care must be taken to prevent overloading on a NAT device, or devices. The resource requirements (e.g. CPU load and memory) for NAT are proportionate to the number of hosts on the network, and not the bandwidth of the network.

2. ## So in order to understand what the main areas where organisation should be aware ...

This is called Port Scanning. For the hacker it is critical to identify listening ports, because it helps him identify the operating system and application in use. The services detected as listening may suffer from vulnerabilities which may result from two reasons: * Mis-Configuration of the service * The version

1. ## Interlanguage and the Error analysis

This is called fossilization. Fossilization occurs in most language learners. Fossilized structure can be realized as errors or as correct target language forms. If the learner has reached the stage of development, in which 1 feature in the interlanguage has assumed the same form in the target language, than fossilization of the correct form will occur.

2. ## Avon, which began its operations in 1886, is a global manufacturer and marketer of ...

and that all associates and employees has opportunities for development and advancement. Avon has a history of being recognized as a leader in corporate diversity, with more women in management positions (86%) than any other Fortune 500 company. In fact, half of our Board of Directors is female.

1. ## The purpose of this project is to discuss the issues associated with the deployment ...

The motivation for developing WAP was to extend Internet technologies to wireless networks, bearers and devices. Just as earlier versions of WAP anticipated developments in image displays, public-key infrastructure (PKI) and end-to-end security, messaging, push technology, and a number of W3C and IETF standards, WAP 2.0 capitalizes on a wide

2. ## In order to determine the effectiveness of auditing programs in promoting energy savings, the ...

�Conventional R2 vs. raw moment r2 In non-constant models, SSR = SST - SSE, then the conventional R2 = 1 - SSE can be SST negative. Raw moment r2 is introduced to overcome the problem. It is calculated by 1- SSE .

1. ## Wireless LANs, WLANs are now deployed at great pace both on company premises and ...

802 [Pekka Nikander, 2002], this paper describes the use of 802.1x to set up interesting public WLAN usage scenarios such as "closed community membership" and "pre-paid pay- per-use accounts". Secondly this paper briefly describes concepts of IEEE 802.11, IEEE 802.1x, IETF EAP and IETF RADIUS.

2. ## Database projects in MS Access.

The project will involve the candidate in identifying a problem requiring information technology tools and techniques for its possible solution and then selecting the appropriate tool or tools for the solution of the problem. The emphasis in the major project will be on the candidate's ability to produce a high • Over 160,000 pieces
of student written work
• Annotated by
experienced teachers
• Ideas and feedback to 