Search
Now showing items 1-10 of 38
Calculation of operational loss distribution via Bayesian MCMC algorithm: Evidence from China's commercial banks
(IEEE Computer Society, 2011)
This paper reviews the operational risk data of China's commercial banks from 1994 to 2008, and studies its type of distribution. In order to precisely capture the profile of the operational loss and event distribution of ...
A modified Monte Carlo em algorithm for a three-parameter distribution
(IEEE Computer Society, 2011)
Statistical inference of a three-parameter distribution with closed-form mean residual life function is studied for complete and Type-II censored data. Because the log-likelihood function for this new distribution is not ...
Non-parametric identification of structural nonlinearity with limited input and output measurements
(Trans Tech Publications, 2011)
In this paper, a technique is proposed for non-parametric identification of structural nonlinearity with limited input and output measurements. The identification algorithm is based on the classical Kalman estimator for ...
Multilevel thresholding based on exponential cross entropy and niche chaotic particle swarm optimization
(Springer Verlag, 2011)
The existing method of threshold selection based on maximal Shannon entropy or exponential entropy neglects the relationship between object and background to some extent. Aimed at the above-mentioned problem, a threshold ...
Personalized recommendation using implicit interaction information
(IEEE Computer Society, 2011)
Currently, the information in the internet is becoming explosive. In order to help the users searching the items they are interested in, such as, the news, the books, in this paper, we propose an automatic personalized ...
A survey of application-level protocol identification based on machine learning
(IEEE Computer Society, 2011)
Application-level protocol identification has attracted great interests in academia and become a relatively independent research realm. With the rapid development of Internet and the protocols complicated day by day, the ...
Overview of video-based vehicle detection technologies
(IEEE Computer Society, 2011)
In this paper, we first reviewed different kinds of vehicle detection methods and pointed out that the video based detection technique is the most advantageous method. Then we introduced several of video based vehicle ...
Per-path interference cancellation for multi-cell channel estimation in TD-SCDMA downlink system
(Institute of Electrical and Electronics Engineers Inc., 2011)
The non-orthogonality among basic midamble sequences causes inter-cell interference to the channel estimation in TD-SCDMA downlink receiver at UEs. To mitigate this kind of interference, per-chip interference cancellation ...
A retrieval system of vehicles based on recognition of license plates
(IEEE Computer Society, 2011)
It is a laborious process for people to search vehicles from a large amount of video volumes. We build a retrieval system of vehicles using a novel method which recognizes license plate from surveillance videos. The core ...
An efficient algorithm for indoor location based on RFID
(IEEE Computer Society, 2011)
Location Identification Based on Dynamic Active Radio Frequency Identification (RFID) Calibration (LANDMARC) is a typical system for indoor location using active RFID technology, where k-nearest algorithm is applied including ...