SlideShare a Scribd company logo
Computing Transformations Transforming variables Transformations for normality Transformations for linearity
Transformations: Transforming variables to satisfy assumptions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transformations change the measurement scale In the diagram to the right, the values of 5 through 20 are plotted on the different scales used in the transformations.  These scales would be used in plotting the horizontal axis of the histogram depicting the distribution.  When comparing values measured on the decimal scale to which we are accustomed, we see that each transformation changes the distance between the benchmark measurements. All of the transformations increase the distance between small values and decrease the distance between large values.  This has the effect of moving the positively skewed values to the left, reducing the effect of the skewing and producing a distribution that more closely resembles a normal distribution.
Transformations: Computing transformations in SPSS ,[object Object],[object Object]
Transformations: Two forms for computing transformations ,[object Object],[object Object],[object Object]
Transformations: Functions and formulas for transformations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transformations: Transformation of positively skewed variables ,[object Object],[object Object],[object Object]
Transformations: Example of positively skewed variable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transformations: Transformation of negatively skewed variables ,[object Object],[object Object],[object Object]
Transformations: Example of negatively skewed variable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transformations: The Square Transformation for Linearity ,[object Object],[object Object],[object Object]
Transformations: Example of the square transformation ,[object Object],[object Object],[object Object],[object Object]
Transformations: Transformations for normality Both the histogram and the normality plot for  Total Time Spent on the Internet  (netime) indicate that the variable is not normally distributed.
Transformations: Determine whether reflection is required Skewness, in the table of Descriptive Statistics, indicates whether or not reflection (reversing the values) is required in the transformation. If Skewness is positive, as it is in this problem, reflection is not required.  If Skewness is negative, reflection is required.
Transformations: Compute the adjustment to the argument In this problem, the minimum value is 0, so 1 will be added to each value in the formula, i.e. the argument to the SPSS functions and formula for the inverse will be:  netime + 1.
Transformations: Computing the logarithmic transformation To compute the transformation, select the  Compute … command from the  Transform  menu.
Transformations: Specifying the transform variable name and function First , in the  Target Variable  text box, type a name for the log transformation variable, e.g.  “lgnetime“.  Second , scroll down the list of functions to find LG10, which calculates logarithmic values use a base of 10.  (The logarithmic values are the power to which 10 is raised to produce the original number.) Third , click on the up arrow button to move the highlighted function to the Numeric Expression text box.
Transformations: Adding the variable name to the function First , scroll down the list of variables to locate the variable we want to transform.  Click on its name so that it is highlighted. Second , click on the right arrow button.  SPSS will replace the highlighted text in the function (?) with the name of the variable.
Transformations: Adding the constant to the function Following the rules stated for determining the constant that needs to be included in the function either to prevent mathematical errors, or to do reflection, we include the constant in the function argument.  In this case, we add 1 to the netime variable. Click on the OK button to complete the compute request.
Transformations: The transformed variable The transformed variable which we requested SPSS compute is shown in the data editor in a column to the right of the other variables in the dataset.
Transformations: Computing the square root transformation To compute the transformation, select the  Compute … command from the  Transform  menu.
Transformations: Specifying the transform variable name and function First , in the  Target Variable  text box, type a name for the square root transformation variable, e.g.  “sqnetime“.  Second , scroll down the list of functions to find SQRT, which calculates the square root of a variable.  Third , click on the up arrow button to move the highlighted function to the Numeric Expression text box.
Transformations: Adding the variable name to the function Second , click on the right arrow button.  SPSS will replace the highlighted text in the function (?) with the name of the variable. First , scroll down the list of variables to locate the variable we want to transform.  Click on its name so that it is highlighted.
Transformations: Adding the constant to the function Following the rules stated for determining the constant that needs to be included in the function either to prevent mathematical errors, or to do reflection, we include the constant in the function argument.  In this case, we add 1 to the netime variable. Click on the OK button to complete the compute request.
Transformations: The transformed variable The transformed variable which we requested SPSS compute is shown in the data editor in a column to the right of the other variables in the dataset.
Transformations: Computing the inverse transformation To compute the transformation, select the  Compute … command from the  Transform  menu.
Transformations: Specifying the transform variable name and formula First , in the  Target Variable  text box, type a name for the inverse transformation variable, e.g.  “innetime“.  Second , there is not a function for computing the inverse, so we type the formula directly into the  Numeric Expression  text box. Third , click on the  OK  button to complete the compute request.
Transformations: The transformed variable The transformed variable which we requested SPSS compute is shown in the data editor in a column to the right of the other variables in the dataset.
Transformations: Adjustment to the argument for the square transformation In this problem, the minimum value is 0, no adjustment is needed for computing the square.  If the minimum was a number less than zero, we would add the absolute value of the minimum (dropping the sign) as an adjustment to the variable. It is mathematically correct to square a value of zero, so the adjustment to the argument for the square transformation is different.  What we need to avoid are negative numbers, since the square of a negative number produces the same value as the square of a positive number.
Transformations: Computing the square transformation To compute the transformation, select the  Compute … command from the  Transform  menu.
Transformations: Specifying the transform variable name and formula First , in the  Target Variable  text box, type a name for the inverse transformation variable, e.g.  “s2netime“.  Second , there is not a function for computing the square, so we type the formula directly into the  Numeric Expression  text box. Third , click on the  OK  button to complete the compute request.
Transformations: The transformed variable The transformed variable which we requested SPSS compute is shown in the data editor in a column to the right of the other variables in the dataset.
Using the script to compute transformations When the script tests assumptions, it will create the transformations that are checked. If you want to retain the transformed variable to use in an analysis, clear the checkbox that tells the script to delete the transformed variables it created.
The transformed variables The transformed variables are added to the data editor. The variable names attempt to identify the transformation in the variable name. The variable labels fully identify the transformation, including the function and formula used to compute it.
Which transformation to use The recommendation of which transform to use is often summarized in a pictorial chart like the above.  In practice, it is difficult to determine which distribution is most like your variable. It is often more efficient to compute all transformations and examine the statistical properties of each.

More Related Content

What's hot

Simple correlation
Simple correlationSimple correlation
Simple correlation
Ibrahim Lubbad
 
Linear regression and correlation analysis ppt @ bec doms
Linear regression and correlation analysis ppt @ bec domsLinear regression and correlation analysis ppt @ bec doms
Linear regression and correlation analysis ppt @ bec doms
Babasab Patil
 
correlation and regression
correlation and regressioncorrelation and regression
correlation and regression
Keyur Tejani
 
Linear Correlation
Linear Correlation Linear Correlation
Linear Correlation
Tarek Tawfik Amin
 
Covariance and correlation
Covariance and correlationCovariance and correlation
Covariance and correlation
Rashid Hussain
 
Correlation and regression
Correlation and regressionCorrelation and regression
Correlation and regression
ANCYBS
 
Correlation and regression
Correlation and regressionCorrelation and regression
Correlation and regression
Mohit Asija
 
Linear regression
Linear regressionLinear regression
Linear regression
Learnbay Datascience
 
9. parametric regression
9. parametric regression9. parametric regression
9. parametric regression
Lahore Garrison University
 
Correlation
CorrelationCorrelation
Correlation
Anjali Awasthi
 
Topic 15 correlation spss
Topic 15 correlation spssTopic 15 correlation spss
Topic 15 correlation spss
Sizwan Ahammed
 
R linear regression
R   linear regressionR   linear regression
R linear regression
Learnbay Datascience
 
Logistic regression
Logistic regressionLogistic regression
Logistic regression
Ayurdata
 
S1 pb
S1 pbS1 pb
Correlation and regression
Correlation and regressionCorrelation and regression
Correlation and regression
Antony Raj
 
Correlation
CorrelationCorrelation
Correlation
rkalidasan
 
Ch14 multiple regression
Ch14 multiple regressionCh14 multiple regression
Ch14 multiple regression
Krittima Suwanphorung
 
Exploring bivariate data
Exploring bivariate dataExploring bivariate data
Exploring bivariate data
Ulster BOCES
 

What's hot (18)

Simple correlation
Simple correlationSimple correlation
Simple correlation
 
Linear regression and correlation analysis ppt @ bec doms
Linear regression and correlation analysis ppt @ bec domsLinear regression and correlation analysis ppt @ bec doms
Linear regression and correlation analysis ppt @ bec doms
 
correlation and regression
correlation and regressioncorrelation and regression
correlation and regression
 
Linear Correlation
Linear Correlation Linear Correlation
Linear Correlation
 
Covariance and correlation
Covariance and correlationCovariance and correlation
Covariance and correlation
 
Correlation and regression
Correlation and regressionCorrelation and regression
Correlation and regression
 
Correlation and regression
Correlation and regressionCorrelation and regression
Correlation and regression
 
Linear regression
Linear regressionLinear regression
Linear regression
 
9. parametric regression
9. parametric regression9. parametric regression
9. parametric regression
 
Correlation
CorrelationCorrelation
Correlation
 
Topic 15 correlation spss
Topic 15 correlation spssTopic 15 correlation spss
Topic 15 correlation spss
 
R linear regression
R   linear regressionR   linear regression
R linear regression
 
Logistic regression
Logistic regressionLogistic regression
Logistic regression
 
S1 pb
S1 pbS1 pb
S1 pb
 
Correlation and regression
Correlation and regressionCorrelation and regression
Correlation and regression
 
Correlation
CorrelationCorrelation
Correlation
 
Ch14 multiple regression
Ch14 multiple regressionCh14 multiple regression
Ch14 multiple regression
 
Exploring bivariate data
Exploring bivariate dataExploring bivariate data
Exploring bivariate data
 

Viewers also liked

Ted Open Translation Explained Chinese 20090517
Ted Open Translation Explained Chinese 20090517Ted Open Translation Explained Chinese 20090517
Ted Open Translation Explained Chinese 20090517TEDtoChina
 
Large renovations and what you need to know 2010
Large renovations and what you need to know 2010Large renovations and what you need to know 2010
Large renovations and what you need to know 2010
Wo Built
 
Large Renovations And What You Need To Know
Large Renovations And What You Need To KnowLarge Renovations And What You Need To Know
Large Renovations And What You Need To Know
Wo Built
 
Aviation Business 2.0
Aviation Business 2.0Aviation Business 2.0
Aviation Business 2.0
michelleraines
 
Most idola
Most idolaMost idola
Most idola
JacekKupras
 
Overview of the Implementing Innovation Course
Overview of the Implementing Innovation CourseOverview of the Implementing Innovation Course
Overview of the Implementing Innovation Course
Brad Power
 
Pc Ware Datasenter Løsninger 2009
Pc Ware   Datasenter Løsninger 2009Pc Ware   Datasenter Løsninger 2009
Pc Ware Datasenter Løsninger 2009siggen64
 
Wolce 2012 role
Wolce 2012 role Wolce 2012 role
Wolce 2012 role
Gillian Palmer
 
Delfinki Lato 2009
Delfinki Lato 2009Delfinki Lato 2009
Delfinki Lato 2009JacekKupras
 
Globeatnightpakiet
GlobeatnightpakietGlobeatnightpakiet
Globeatnightpakiet
JacekKupras
 
Lawrence Wang: social media and TEDx
Lawrence Wang: social media and TEDxLawrence Wang: social media and TEDx
Lawrence Wang: social media and TEDx
TEDtoChina
 
Redesign Brand Identity Of TEDtoChina
Redesign Brand Identity Of TEDtoChinaRedesign Brand Identity Of TEDtoChina
Redesign Brand Identity Of TEDtoChina
TEDtoChina
 
Obliterate your Customer Processes
Obliterate your Customer ProcessesObliterate your Customer Processes
Obliterate your Customer Processes
Brad Power
 
McNessie Agile Delivery based supply chain
McNessie   Agile Delivery based supply chainMcNessie   Agile Delivery based supply chain
McNessie Agile Delivery based supply chain
TheHolloway
 
Virtual Astronaut Muscleinonmuscles
Virtual Astronaut   MuscleinonmusclesVirtual Astronaut   Muscleinonmuscles
Virtual Astronaut MuscleinonmusclesJacekKupras
 
Who am i?
Who am i?Who am i?
Informatyka: Gimnazjum i liceum.
Informatyka: Gimnazjum i liceum.Informatyka: Gimnazjum i liceum.
Informatyka: Gimnazjum i liceum.
JacekKupras
 
I can haz ads: kitteh's guide tu fazebuk advertizing
I can haz ads: kitteh's guide tu fazebuk advertizingI can haz ads: kitteh's guide tu fazebuk advertizing
I can haz ads: kitteh's guide tu fazebuk advertizing
Jeff Ebbing
 
程乐华 心理学艺术化
程乐华 心理学艺术化程乐华 心理学艺术化
程乐华 心理学艺术化
TEDtoChina
 

Viewers also liked (20)

Ted Open Translation Explained Chinese 20090517
Ted Open Translation Explained Chinese 20090517Ted Open Translation Explained Chinese 20090517
Ted Open Translation Explained Chinese 20090517
 
Large renovations and what you need to know 2010
Large renovations and what you need to know 2010Large renovations and what you need to know 2010
Large renovations and what you need to know 2010
 
Large Renovations And What You Need To Know
Large Renovations And What You Need To KnowLarge Renovations And What You Need To Know
Large Renovations And What You Need To Know
 
Aviation Business 2.0
Aviation Business 2.0Aviation Business 2.0
Aviation Business 2.0
 
Most idola
Most idolaMost idola
Most idola
 
Overview of the Implementing Innovation Course
Overview of the Implementing Innovation CourseOverview of the Implementing Innovation Course
Overview of the Implementing Innovation Course
 
Atlantislaunch
AtlantislaunchAtlantislaunch
Atlantislaunch
 
Pc Ware Datasenter Løsninger 2009
Pc Ware   Datasenter Løsninger 2009Pc Ware   Datasenter Løsninger 2009
Pc Ware Datasenter Løsninger 2009
 
Wolce 2012 role
Wolce 2012 role Wolce 2012 role
Wolce 2012 role
 
Delfinki Lato 2009
Delfinki Lato 2009Delfinki Lato 2009
Delfinki Lato 2009
 
Globeatnightpakiet
GlobeatnightpakietGlobeatnightpakiet
Globeatnightpakiet
 
Lawrence Wang: social media and TEDx
Lawrence Wang: social media and TEDxLawrence Wang: social media and TEDx
Lawrence Wang: social media and TEDx
 
Redesign Brand Identity Of TEDtoChina
Redesign Brand Identity Of TEDtoChinaRedesign Brand Identity Of TEDtoChina
Redesign Brand Identity Of TEDtoChina
 
Obliterate your Customer Processes
Obliterate your Customer ProcessesObliterate your Customer Processes
Obliterate your Customer Processes
 
McNessie Agile Delivery based supply chain
McNessie   Agile Delivery based supply chainMcNessie   Agile Delivery based supply chain
McNessie Agile Delivery based supply chain
 
Virtual Astronaut Muscleinonmuscles
Virtual Astronaut   MuscleinonmusclesVirtual Astronaut   Muscleinonmuscles
Virtual Astronaut Muscleinonmuscles
 
Who am i?
Who am i?Who am i?
Who am i?
 
Informatyka: Gimnazjum i liceum.
Informatyka: Gimnazjum i liceum.Informatyka: Gimnazjum i liceum.
Informatyka: Gimnazjum i liceum.
 
I can haz ads: kitteh's guide tu fazebuk advertizing
I can haz ads: kitteh's guide tu fazebuk advertizingI can haz ads: kitteh's guide tu fazebuk advertizing
I can haz ads: kitteh's guide tu fazebuk advertizing
 
程乐华 心理学艺术化
程乐华 心理学艺术化程乐华 心理学艺术化
程乐华 心理学艺术化
 

Similar to Computingtransformations Spring2005

Transformation of variables
Transformation of variablesTransformation of variables
Transformation of variables
tripurajyothireddy
 
Data Transformation
Data TransformationData Transformation
Data Transformation
ArmanArafatAnik
 
BUS 308 Week 4 Lecture 3 Developing Relationships in Exc.docx
  BUS 308 Week 4 Lecture 3 Developing Relationships in Exc.docx  BUS 308 Week 4 Lecture 3 Developing Relationships in Exc.docx
BUS 308 Week 4 Lecture 3 Developing Relationships in Exc.docx
ShiraPrater50
 
Week 4 Lecture 12 Significance Earlier we discussed co.docx
Week 4 Lecture 12 Significance Earlier we discussed co.docxWeek 4 Lecture 12 Significance Earlier we discussed co.docx
Week 4 Lecture 12 Significance Earlier we discussed co.docx
cockekeshia
 
Bootcamp of new world to taken seriously
Bootcamp of new world to taken seriouslyBootcamp of new world to taken seriously
Bootcamp of new world to taken seriously
khaled125087
 
Machine learning session4(linear regression)
Machine learning   session4(linear regression)Machine learning   session4(linear regression)
Machine learning session4(linear regression)
Abhimanyu Dwivedi
 
Predicting US house prices using Multiple Linear Regression in R
Predicting US house prices using Multiple Linear Regression in RPredicting US house prices using Multiple Linear Regression in R
Predicting US house prices using Multiple Linear Regression in R
Sotiris Baratsas
 
FSE 200AdkinsPage 1 of 10Simple Linear Regression Corr.docx
FSE 200AdkinsPage 1 of 10Simple Linear Regression Corr.docxFSE 200AdkinsPage 1 of 10Simple Linear Regression Corr.docx
FSE 200AdkinsPage 1 of 10Simple Linear Regression Corr.docx
budbarber38650
 
A Systematic Approach To Probabilistic Pointer Analysis
A Systematic Approach To Probabilistic Pointer AnalysisA Systematic Approach To Probabilistic Pointer Analysis
A Systematic Approach To Probabilistic Pointer Analysis
Monica Franklin
 
Assignment 01
Assignment 01Assignment 01
Machine learning
Machine learningMachine learning
Machine learning
Shreyas G S
 
Data Science - Part XII - Ridge Regression, LASSO, and Elastic Nets
Data Science - Part XII - Ridge Regression, LASSO, and Elastic NetsData Science - Part XII - Ridge Regression, LASSO, and Elastic Nets
Data Science - Part XII - Ridge Regression, LASSO, and Elastic Nets
Derek Kane
 
Computing transformations
Computing transformationsComputing transformations
Computing transformations
Tarun Gehlot
 
Linear logisticregression
Linear logisticregressionLinear logisticregression
Linear logisticregression
kongara
 
chapter 2 post optimality.pptx
chapter 2 post optimality.pptxchapter 2 post optimality.pptx
chapter 2 post optimality.pptx
DejeneDay
 
ET DAH SI HAN HAN ADIKNYA SI WIDIANTORO RIBUT MULU SAMA ABANG WIDI
ET DAH SI HAN HAN ADIKNYA SI WIDIANTORO RIBUT MULU SAMA ABANG WIDIET DAH SI HAN HAN ADIKNYA SI WIDIANTORO RIBUT MULU SAMA ABANG WIDI
ET DAH SI HAN HAN ADIKNYA SI WIDIANTORO RIBUT MULU SAMA ABANG WIDI
IrlanMalik
 
01 algebra
01 algebra01 algebra
01 algebra
Murad Kasasbeh
 
working with python
working with pythonworking with python
working with python
bhavesh lande
 
Building a Regression Model using SPSS
Building a Regression Model using SPSSBuilding a Regression Model using SPSS
Building a Regression Model using SPSS
Zac Bodner
 
Simplex Algorithm
Simplex AlgorithmSimplex Algorithm
Simplex Algorithm
Aizaz Ahmad
 

Similar to Computingtransformations Spring2005 (20)

Transformation of variables
Transformation of variablesTransformation of variables
Transformation of variables
 
Data Transformation
Data TransformationData Transformation
Data Transformation
 
BUS 308 Week 4 Lecture 3 Developing Relationships in Exc.docx
  BUS 308 Week 4 Lecture 3 Developing Relationships in Exc.docx  BUS 308 Week 4 Lecture 3 Developing Relationships in Exc.docx
BUS 308 Week 4 Lecture 3 Developing Relationships in Exc.docx
 
Week 4 Lecture 12 Significance Earlier we discussed co.docx
Week 4 Lecture 12 Significance Earlier we discussed co.docxWeek 4 Lecture 12 Significance Earlier we discussed co.docx
Week 4 Lecture 12 Significance Earlier we discussed co.docx
 
Bootcamp of new world to taken seriously
Bootcamp of new world to taken seriouslyBootcamp of new world to taken seriously
Bootcamp of new world to taken seriously
 
Machine learning session4(linear regression)
Machine learning   session4(linear regression)Machine learning   session4(linear regression)
Machine learning session4(linear regression)
 
Predicting US house prices using Multiple Linear Regression in R
Predicting US house prices using Multiple Linear Regression in RPredicting US house prices using Multiple Linear Regression in R
Predicting US house prices using Multiple Linear Regression in R
 
FSE 200AdkinsPage 1 of 10Simple Linear Regression Corr.docx
FSE 200AdkinsPage 1 of 10Simple Linear Regression Corr.docxFSE 200AdkinsPage 1 of 10Simple Linear Regression Corr.docx
FSE 200AdkinsPage 1 of 10Simple Linear Regression Corr.docx
 
A Systematic Approach To Probabilistic Pointer Analysis
A Systematic Approach To Probabilistic Pointer AnalysisA Systematic Approach To Probabilistic Pointer Analysis
A Systematic Approach To Probabilistic Pointer Analysis
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
 
Machine learning
Machine learningMachine learning
Machine learning
 
Data Science - Part XII - Ridge Regression, LASSO, and Elastic Nets
Data Science - Part XII - Ridge Regression, LASSO, and Elastic NetsData Science - Part XII - Ridge Regression, LASSO, and Elastic Nets
Data Science - Part XII - Ridge Regression, LASSO, and Elastic Nets
 
Computing transformations
Computing transformationsComputing transformations
Computing transformations
 
Linear logisticregression
Linear logisticregressionLinear logisticregression
Linear logisticregression
 
chapter 2 post optimality.pptx
chapter 2 post optimality.pptxchapter 2 post optimality.pptx
chapter 2 post optimality.pptx
 
ET DAH SI HAN HAN ADIKNYA SI WIDIANTORO RIBUT MULU SAMA ABANG WIDI
ET DAH SI HAN HAN ADIKNYA SI WIDIANTORO RIBUT MULU SAMA ABANG WIDIET DAH SI HAN HAN ADIKNYA SI WIDIANTORO RIBUT MULU SAMA ABANG WIDI
ET DAH SI HAN HAN ADIKNYA SI WIDIANTORO RIBUT MULU SAMA ABANG WIDI
 
01 algebra
01 algebra01 algebra
01 algebra
 
working with python
working with pythonworking with python
working with python
 
Building a Regression Model using SPSS
Building a Regression Model using SPSSBuilding a Regression Model using SPSS
Building a Regression Model using SPSS
 
Simplex Algorithm
Simplex AlgorithmSimplex Algorithm
Simplex Algorithm
 

More from 1Leu

Vointa.Activitate.Insincte
Vointa.Activitate.InsincteVointa.Activitate.Insincte
Vointa.Activitate.Insincte1Leu
 
Tulburari De Atentie Si Memorie
Tulburari De Atentie Si MemorieTulburari De Atentie Si Memorie
Tulburari De Atentie Si Memorie1Leu
 
Tulburari Ale Somnului
Tulburari Ale SomnuluiTulburari Ale Somnului
Tulburari Ale Somnului1Leu
 
Tulburarea Bipolara
Tulburarea BipolaraTulburarea Bipolara
Tulburarea Bipolara1Leu
 
Sindromul Alcoolismului Fetal
Sindromul Alcoolismului FetalSindromul Alcoolismului Fetal
Sindromul Alcoolismului Fetal1Leu
 
Sindromul Prader Willi
Sindromul Prader WilliSindromul Prader Willi
Sindromul Prader Willi1Leu
 
Sindromul X Fragil
Sindromul X FragilSindromul X Fragil
Sindromul X Fragil1Leu
 
Sindromul Down
Sindromul DownSindromul Down
Sindromul Down1Leu
 
Reprezentarile Sociale
Reprezentarile SocialeReprezentarile Sociale
Reprezentarile Sociale1Leu
 
Psihologia Si Stiintele Cognitive
Psihologia Si Stiintele CognitivePsihologia Si Stiintele Cognitive
Psihologia Si Stiintele Cognitive1Leu
 
Persoana Cu Deficienta Usoara Si Moderata Caracteristici
Persoana Cu Deficienta Usoara Si Moderata   CaracteristiciPersoana Cu Deficienta Usoara Si Moderata   Caracteristici
Persoana Cu Deficienta Usoara Si Moderata Caracteristici1Leu
 
Prezentare Protocol Adhd
Prezentare Protocol AdhdPrezentare Protocol Adhd
Prezentare Protocol Adhd1Leu
 
Nativism
NativismNativism
Nativism1Leu
 
Metode De Cercetare îN Psihologia Socială
Metode De Cercetare îN Psihologia SocialăMetode De Cercetare îN Psihologia Socială
Metode De Cercetare îN Psihologia Socială1Leu
 
Leadership
LeadershipLeadership
Leadership1Leu
 
îNvăţArea
îNvăţAreaîNvăţArea
îNvăţArea1Leu
 
Istorie Neurostiinte
Istorie NeurostiinteIstorie Neurostiinte
Istorie Neurostiinte1Leu
 
Istoricul Psihologiei Sociale
Istoricul Psihologiei SocialeIstoricul Psihologiei Sociale
Istoricul Psihologiei Sociale1Leu
 
Introducere îN Psihologia EvoluţIonistă 2
Introducere îN Psihologia EvoluţIonistă 2Introducere îN Psihologia EvoluţIonistă 2
Introducere îN Psihologia EvoluţIonistă 21Leu
 
Introducere îN Psihologia EvoluţIonistă 1
Introducere îN Psihologia EvoluţIonistă 1Introducere îN Psihologia EvoluţIonistă 1
Introducere îN Psihologia EvoluţIonistă 11Leu
 

More from 1Leu (20)

Vointa.Activitate.Insincte
Vointa.Activitate.InsincteVointa.Activitate.Insincte
Vointa.Activitate.Insincte
 
Tulburari De Atentie Si Memorie
Tulburari De Atentie Si MemorieTulburari De Atentie Si Memorie
Tulburari De Atentie Si Memorie
 
Tulburari Ale Somnului
Tulburari Ale SomnuluiTulburari Ale Somnului
Tulburari Ale Somnului
 
Tulburarea Bipolara
Tulburarea BipolaraTulburarea Bipolara
Tulburarea Bipolara
 
Sindromul Alcoolismului Fetal
Sindromul Alcoolismului FetalSindromul Alcoolismului Fetal
Sindromul Alcoolismului Fetal
 
Sindromul Prader Willi
Sindromul Prader WilliSindromul Prader Willi
Sindromul Prader Willi
 
Sindromul X Fragil
Sindromul X FragilSindromul X Fragil
Sindromul X Fragil
 
Sindromul Down
Sindromul DownSindromul Down
Sindromul Down
 
Reprezentarile Sociale
Reprezentarile SocialeReprezentarile Sociale
Reprezentarile Sociale
 
Psihologia Si Stiintele Cognitive
Psihologia Si Stiintele CognitivePsihologia Si Stiintele Cognitive
Psihologia Si Stiintele Cognitive
 
Persoana Cu Deficienta Usoara Si Moderata Caracteristici
Persoana Cu Deficienta Usoara Si Moderata   CaracteristiciPersoana Cu Deficienta Usoara Si Moderata   Caracteristici
Persoana Cu Deficienta Usoara Si Moderata Caracteristici
 
Prezentare Protocol Adhd
Prezentare Protocol AdhdPrezentare Protocol Adhd
Prezentare Protocol Adhd
 
Nativism
NativismNativism
Nativism
 
Metode De Cercetare îN Psihologia Socială
Metode De Cercetare îN Psihologia SocialăMetode De Cercetare îN Psihologia Socială
Metode De Cercetare îN Psihologia Socială
 
Leadership
LeadershipLeadership
Leadership
 
îNvăţArea
îNvăţAreaîNvăţArea
îNvăţArea
 
Istorie Neurostiinte
Istorie NeurostiinteIstorie Neurostiinte
Istorie Neurostiinte
 
Istoricul Psihologiei Sociale
Istoricul Psihologiei SocialeIstoricul Psihologiei Sociale
Istoricul Psihologiei Sociale
 
Introducere îN Psihologia EvoluţIonistă 2
Introducere îN Psihologia EvoluţIonistă 2Introducere îN Psihologia EvoluţIonistă 2
Introducere îN Psihologia EvoluţIonistă 2
 
Introducere îN Psihologia EvoluţIonistă 1
Introducere îN Psihologia EvoluţIonistă 1Introducere îN Psihologia EvoluţIonistă 1
Introducere îN Psihologia EvoluţIonistă 1
 

Recently uploaded

Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 

Recently uploaded (20)

Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 

Computingtransformations Spring2005

  • 1. Computing Transformations Transforming variables Transformations for normality Transformations for linearity
  • 2.
  • 3. Transformations change the measurement scale In the diagram to the right, the values of 5 through 20 are plotted on the different scales used in the transformations. These scales would be used in plotting the horizontal axis of the histogram depicting the distribution. When comparing values measured on the decimal scale to which we are accustomed, we see that each transformation changes the distance between the benchmark measurements. All of the transformations increase the distance between small values and decrease the distance between large values. This has the effect of moving the positively skewed values to the left, reducing the effect of the skewing and producing a distribution that more closely resembles a normal distribution.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Transformations: Transformations for normality Both the histogram and the normality plot for Total Time Spent on the Internet (netime) indicate that the variable is not normally distributed.
  • 14. Transformations: Determine whether reflection is required Skewness, in the table of Descriptive Statistics, indicates whether or not reflection (reversing the values) is required in the transformation. If Skewness is positive, as it is in this problem, reflection is not required. If Skewness is negative, reflection is required.
  • 15. Transformations: Compute the adjustment to the argument In this problem, the minimum value is 0, so 1 will be added to each value in the formula, i.e. the argument to the SPSS functions and formula for the inverse will be: netime + 1.
  • 16. Transformations: Computing the logarithmic transformation To compute the transformation, select the Compute … command from the Transform menu.
  • 17. Transformations: Specifying the transform variable name and function First , in the Target Variable text box, type a name for the log transformation variable, e.g. “lgnetime“. Second , scroll down the list of functions to find LG10, which calculates logarithmic values use a base of 10. (The logarithmic values are the power to which 10 is raised to produce the original number.) Third , click on the up arrow button to move the highlighted function to the Numeric Expression text box.
  • 18. Transformations: Adding the variable name to the function First , scroll down the list of variables to locate the variable we want to transform. Click on its name so that it is highlighted. Second , click on the right arrow button. SPSS will replace the highlighted text in the function (?) with the name of the variable.
  • 19. Transformations: Adding the constant to the function Following the rules stated for determining the constant that needs to be included in the function either to prevent mathematical errors, or to do reflection, we include the constant in the function argument. In this case, we add 1 to the netime variable. Click on the OK button to complete the compute request.
  • 20. Transformations: The transformed variable The transformed variable which we requested SPSS compute is shown in the data editor in a column to the right of the other variables in the dataset.
  • 21. Transformations: Computing the square root transformation To compute the transformation, select the Compute … command from the Transform menu.
  • 22. Transformations: Specifying the transform variable name and function First , in the Target Variable text box, type a name for the square root transformation variable, e.g. “sqnetime“. Second , scroll down the list of functions to find SQRT, which calculates the square root of a variable. Third , click on the up arrow button to move the highlighted function to the Numeric Expression text box.
  • 23. Transformations: Adding the variable name to the function Second , click on the right arrow button. SPSS will replace the highlighted text in the function (?) with the name of the variable. First , scroll down the list of variables to locate the variable we want to transform. Click on its name so that it is highlighted.
  • 24. Transformations: Adding the constant to the function Following the rules stated for determining the constant that needs to be included in the function either to prevent mathematical errors, or to do reflection, we include the constant in the function argument. In this case, we add 1 to the netime variable. Click on the OK button to complete the compute request.
  • 25. Transformations: The transformed variable The transformed variable which we requested SPSS compute is shown in the data editor in a column to the right of the other variables in the dataset.
  • 26. Transformations: Computing the inverse transformation To compute the transformation, select the Compute … command from the Transform menu.
  • 27. Transformations: Specifying the transform variable name and formula First , in the Target Variable text box, type a name for the inverse transformation variable, e.g. “innetime“. Second , there is not a function for computing the inverse, so we type the formula directly into the Numeric Expression text box. Third , click on the OK button to complete the compute request.
  • 28. Transformations: The transformed variable The transformed variable which we requested SPSS compute is shown in the data editor in a column to the right of the other variables in the dataset.
  • 29. Transformations: Adjustment to the argument for the square transformation In this problem, the minimum value is 0, no adjustment is needed for computing the square. If the minimum was a number less than zero, we would add the absolute value of the minimum (dropping the sign) as an adjustment to the variable. It is mathematically correct to square a value of zero, so the adjustment to the argument for the square transformation is different. What we need to avoid are negative numbers, since the square of a negative number produces the same value as the square of a positive number.
  • 30. Transformations: Computing the square transformation To compute the transformation, select the Compute … command from the Transform menu.
  • 31. Transformations: Specifying the transform variable name and formula First , in the Target Variable text box, type a name for the inverse transformation variable, e.g. “s2netime“. Second , there is not a function for computing the square, so we type the formula directly into the Numeric Expression text box. Third , click on the OK button to complete the compute request.
  • 32. Transformations: The transformed variable The transformed variable which we requested SPSS compute is shown in the data editor in a column to the right of the other variables in the dataset.
  • 33. Using the script to compute transformations When the script tests assumptions, it will create the transformations that are checked. If you want to retain the transformed variable to use in an analysis, clear the checkbox that tells the script to delete the transformed variables it created.
  • 34. The transformed variables The transformed variables are added to the data editor. The variable names attempt to identify the transformation in the variable name. The variable labels fully identify the transformation, including the function and formula used to compute it.
  • 35. Which transformation to use The recommendation of which transform to use is often summarized in a pictorial chart like the above. In practice, it is difficult to determine which distribution is most like your variable. It is often more efficient to compute all transformations and examine the statistical properties of each.