Solved

Finding Upper Control and Lower control

Posted on 2013-05-30
2
307 Views
Last Modified: 2013-06-05
How do I find the UCL and the LCL for the following data:
0.551
0.546
0.547
0.548
0.547
0.547
0.538
0.546
0.542
0.543
0.545
0.547
0.543
0.548
0.545
0.554
0.549
0.546
0.545
0.553
0.549
0.541
0.542
0.545
0.546
0.552
0.546
0.546
0.545
0.547
0.548
0.547
0.545
0.54
0.545
0
Comment
Question by:Jamie33
2 Comments
 
LVL 29

Expert Comment

by:serialband
ID: 39209824
0
 
LVL 37

Accepted Solution

by:
TommySzalapski earned 500 total points
ID: 39210373
That link details it nicely. The only thing I would change is that I would say you should use the corrected sample standard deviation if you are calculating it from your data.
http://en.wikipedia.org/wiki/Standard_deviation#Corrected_sample_standard_deviation
If you calculated the biased standard deviation using the ehow link, then just take that result and multiply it by sqrt(N/(N-1)) to get the corrected sample standard deviation.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Complex Job scheduler software 6 232
Help with OLE and multiple Word documents 8 234
Virtual to physical address: bits being lost in translation? 13 207
Removing Duplicate Code 6 174
Pretext and Context: In this series, I wish to design the data model of systems in question. I will start by defining the scope and boundaries of the system, followed by subsystems involved, then finally the entities in those systems and subsystems…
"Disruption" is the most feared word for C-level executives these days. They agonize over their industry being disturbed by another player - most likely by startups.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question