Gonogo: An R Implementation of Test Methods to Perform, Analyze and Simulate Sensitivity Experiments

11/23/2020
by   Paul A. Roediger, et al.
0

This work provides documentation for a suite of R functions contained in gonogo.R. The functions provide sensitivity testing practitioners and researchers with an ability to conduct, analyze and simulate various sensitivity experiments involving binary responses and a single stimulus level (e.g., drug dosage, drop height, velocity, etc.). Included are the modern Neyer and 3pod adaptive procedures, as well as the Bruceton and Langlie. The latter two benchmark procedures are capable of being performed according to generalized up-down transformed-response rules. Each procedure is designated phase-one of a three-phase experiment. The goal of phase-one is to achieve overlapping data. The two additional (and optional) refinement phases utilize the D-optimal criteria and the Robbins-Monro-Joseph procedure. The goals of the two refinement phases are to situate testing in the vicinity of the median and tails of the latent response distribution, respectively.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/20/2022

Two eggs any style – generalizing egg-drop experiments

The egg-drop experiment introduced by Konhauser, Velleman, and Wagon, la...
research
07/08/2019

Simulating convection-coupled phase-change in enthalpy form with mixed finite elements

Melting and solidification processes are often affected by natural conve...
research
09/27/2022

D-optimal Approximate Design for Binary Regression and Quantal Response in Toxicology Studies

We provide a systematic treatment of D-optimal design for binary regress...
research
11/28/2018

Phase Collaborative Network for Multi-Phase Medical Imaging Segmentation

Integrating multi-phase information is an effective way of boosting visu...
research
07/27/2019

REP: Predicting the Time-Course of Drug Sensitivity

The biological processes involved in a drug's mechanisms of action are o...
research
12/04/2020

Automating Seccomp Filter Generation for Linux Applications

Software vulnerabilities in applications undermine the security of appli...

Please sign up or login with your details

Forgot password? Click here to reset