SlideShare a Scribd company logo
1 of 16
Download to read offline
Stat310            Transformations


                            Hadley Wickham
Monday, 16 February 2009
1. Recap
               2. Exponential derivation
               3. Transforming random variables
                      1. Distribution function technique
                      2. Change of variables technique
               4. Interesting properties of cdf


Monday, 16 February 2009
Recap
                     f (x) = cx 0 < x < 10
                   • What is the cdf?
                   • What must c be for f to be a pdf?
                   • What is P(2 < X < 8)?




Monday, 16 February 2009
Exponential


                   • Derivation
                   • Moment generating function




Monday, 16 February 2009
Your turn
                   Let Y be the amount of time until I make a
                   mistake on the board. Assume Y ~
                   Exp(10) (i.e. I make 10 mistakes per hour).
                   If I go for 30 minutes without making a
                   mistake, what’s the probability I go for 40
                   minutes without making a mistake?
                   i.e. What is P(Y > 40 | Y > 30) ? How
                   does it compare to P(Y > 10)?

Monday, 16 February 2009
Memorylessness

                   • In general, if Y is exponential
                   • P(Y > y + a | Y > y ) = P(Y > a)
                   • Can you prove that?
                   • No memory




Monday, 16 February 2009
Transformations



Monday, 16 February 2009
Example
                    x      -5       0        5      10    20
                 f(x)      0.2     0.1       0.3    0.1   0.3

                   Let X be a discrete random variable with
                   pmf f as defined above.
                   Write out the pmfs for:
                   A=X+2         B = 3*X   C = X2


Monday, 16 February 2009
Continuous
                   Let X ~ Unif(0, 1)
                   What are the distributions
                   of the following variables?
                   A = 10 X
                   B = 5X + 3
                   C=      X2




Monday, 16 February 2009
Transformations
                     Distribution     Change of
                      function         variable
                     technique        technique




Monday, 16 February 2009
Distribution function
                                 technique

                   X = Unif(0, 1)
                   Y = X2
                   P(Y < y) =   P(X2<   y) = P(X < √y)
                   ...




Monday, 16 February 2009
Your turn

                   X ~ Exponential(θ)
                   Y = log(X)


                   Find fY(y). Does y have a named
                   distribution?


Monday, 16 February 2009
Change of variables
                   If Y = u(X), and
                   v is the inverse of u, X = v(Y)
                   then
                   fY(y) = fX(v(y)) |v’(y)|




Monday, 16 February 2009
Your turn

                   X ~ Exponential(θ). Y = log(X).
                   What is fY(y)?
                   X ~ Uniform(0, 10). Y =   X2.

                   What is fY(y)?




Monday, 16 February 2009
Theorem 3.5-1
                   IF
                   Y ~ Uniform(0, 1)
                   F a cdf
                   THEN
                   X=      F -1(Y)   is a rv with cdf F(x)
                   (Assume F strictly increasing for simplicity)


Monday, 16 February 2009
Theorem 3.5-2
                   IF
                   X has cdf F
                   Y = F(X)
                   THEN
                   Y ~ Uniform(0, 1)
                   (Assume F strictly increasing for simplicity)



Monday, 16 February 2009

More Related Content

More from Hadley Wickham (20)

27 development
27 development27 development
27 development
 
27 development
27 development27 development
27 development
 
24 modelling
24 modelling24 modelling
24 modelling
 
23 data-structures
23 data-structures23 data-structures
23 data-structures
 
Graphical inference
Graphical inferenceGraphical inference
Graphical inference
 
R packages
R packagesR packages
R packages
 
22 spam
22 spam22 spam
22 spam
 
21 spam
21 spam21 spam
21 spam
 
20 date-times
20 date-times20 date-times
20 date-times
 
19 tables
19 tables19 tables
19 tables
 
18 cleaning
18 cleaning18 cleaning
18 cleaning
 
17 polishing
17 polishing17 polishing
17 polishing
 
16 critique
16 critique16 critique
16 critique
 
15 time-space
15 time-space15 time-space
15 time-space
 
14 case-study
14 case-study14 case-study
14 case-study
 
13 case-study
13 case-study13 case-study
13 case-study
 
12 adv-manip
12 adv-manip12 adv-manip
12 adv-manip
 
11 adv-manip
11 adv-manip11 adv-manip
11 adv-manip
 
11 adv-manip
11 adv-manip11 adv-manip
11 adv-manip
 
10 simulation
10 simulation10 simulation
10 simulation
 

Recently uploaded

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 

Recently uploaded (20)

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

10 Transformations

  • 1. Stat310 Transformations Hadley Wickham Monday, 16 February 2009
  • 2. 1. Recap 2. Exponential derivation 3. Transforming random variables 1. Distribution function technique 2. Change of variables technique 4. Interesting properties of cdf Monday, 16 February 2009
  • 3. Recap f (x) = cx 0 < x < 10 • What is the cdf? • What must c be for f to be a pdf? • What is P(2 < X < 8)? Monday, 16 February 2009
  • 4. Exponential • Derivation • Moment generating function Monday, 16 February 2009
  • 5. Your turn Let Y be the amount of time until I make a mistake on the board. Assume Y ~ Exp(10) (i.e. I make 10 mistakes per hour). If I go for 30 minutes without making a mistake, what’s the probability I go for 40 minutes without making a mistake? i.e. What is P(Y > 40 | Y > 30) ? How does it compare to P(Y > 10)? Monday, 16 February 2009
  • 6. Memorylessness • In general, if Y is exponential • P(Y > y + a | Y > y ) = P(Y > a) • Can you prove that? • No memory Monday, 16 February 2009
  • 8. Example x -5 0 5 10 20 f(x) 0.2 0.1 0.3 0.1 0.3 Let X be a discrete random variable with pmf f as defined above. Write out the pmfs for: A=X+2 B = 3*X C = X2 Monday, 16 February 2009
  • 9. Continuous Let X ~ Unif(0, 1) What are the distributions of the following variables? A = 10 X B = 5X + 3 C= X2 Monday, 16 February 2009
  • 10. Transformations Distribution Change of function variable technique technique Monday, 16 February 2009
  • 11. Distribution function technique X = Unif(0, 1) Y = X2 P(Y < y) = P(X2< y) = P(X < √y) ... Monday, 16 February 2009
  • 12. Your turn X ~ Exponential(θ) Y = log(X) Find fY(y). Does y have a named distribution? Monday, 16 February 2009
  • 13. Change of variables If Y = u(X), and v is the inverse of u, X = v(Y) then fY(y) = fX(v(y)) |v’(y)| Monday, 16 February 2009
  • 14. Your turn X ~ Exponential(θ). Y = log(X). What is fY(y)? X ~ Uniform(0, 10). Y = X2. What is fY(y)? Monday, 16 February 2009
  • 15. Theorem 3.5-1 IF Y ~ Uniform(0, 1) F a cdf THEN X= F -1(Y) is a rv with cdf F(x) (Assume F strictly increasing for simplicity) Monday, 16 February 2009
  • 16. Theorem 3.5-2 IF X has cdf F Y = F(X) THEN Y ~ Uniform(0, 1) (Assume F strictly increasing for simplicity) Monday, 16 February 2009