16,503 research outputs found

    Optimization Heuristics for Determining Internal Rating Grading Scales

    Get PDF
    Basel II imposes regulatory capital on banks related to the default risk of their credit portfolio. Banks using an internal rating approach compute the regulatory capital from pooled probabilities of default. These pooled probabilities can be calculated by clustering credit borrowers into different buckets and computing the mean PD for each bucket. The clustering problem can become very complex when Basel II regulations and real-world constraints are taken into account. Search heuristics have already proven remarkable performance in tackling this problem as complex as it is. A Threshold Accepting algorithm is proposed, which exploits the inherent discrete nature of the clustering problem. This algorithm is found to outperform alternative methodologies already proposed in the literature, such as standard k-means and Differential Evolution. Besides considering several clustering objectives for a given number of buckets, we extend the analysis further by introducing new methods to determine the optimal number of buckets in which to cluster banks' clients.credit risk, probability of default, clustering, Threshold Accepting, Differential Evolution

    Optimization Heuristics for Determining Internal Rating Grading Scales

    Get PDF
    Basel II imposes regulatory capital on banks related to the default risk of their credit portfolio. Banks using an internal rating approach compute the regulatory capital from pooled probabilities of default. These pooled probabilities can be calculated by clustering credit borrowers into different buckets and computing the mean PD for each bucket. The clustering problem can become very complex when Basel II regulations and real-world constraints are taken into account. Search heuristics have already proven remarkable performance in tackling this problem as complex as it is. A Threshold Accepting algorithm is proposed, which exploits the inherent discrete nature of the clustering problem. This algorithm is found to outperform alternative methodologies already proposed in the literature, such as standard k-means and Differential Evolution. Besides considering several clustering objectives for a given number of buckets, we extend the analysis further by introducing new methods to determine the optimal number of buckets in which to cluster banks' clients.credit risk, probability of default, clustering, Threshold Accepting, Differential Evolution

    The development of a program analysis environment for Ada

    Get PDF
    A unit level, Ada software module testing system, called Query Utility Environment for Software Testing of Ada (QUEST/Ada), is described. The project calls for the design and development of a prototype system. QUEST/Ada design began with a definition of the overall system structure and a description of component dependencies. The project team was divided into three groups to resolve the preliminary designs of the parser/scanner: the test data generator, and the test coverage analyzer. The Phase 1 report is a working document from which the system documentation will evolve. It provides history, a guide to report sections, a literature review, the definition of the system structure and high level interfaces, descriptions of the prototype scope, the three major components, and the plan for the remainder of the project. The appendices include specifications, statistics, two papers derived from the current research, a preliminary users' manual, and the proposal and work plan for Phase 2

    Space station advanced automation

    Get PDF
    In the development of a safe, productive and maintainable space station, Automation and Robotics (A and R) has been identified as an enabling technology which will allow efficient operation at a reasonable cost. The Space Station Freedom's (SSF) systems are very complex, and interdependent. The usage of Advanced Automation (AA) will help restructure, and integrate system status so that station and ground personnel can operate more efficiently. To use AA technology for the augmentation of system management functions requires a development model which consists of well defined phases of: evaluation, development, integration, and maintenance. The evaluation phase will consider system management functions against traditional solutions, implementation techniques and requirements; the end result of this phase should be a well developed concept along with a feasibility analysis. In the development phase the AA system will be developed in accordance with a traditional Life Cycle Model (LCM) modified for Knowledge Based System (KBS) applications. A way by which both knowledge bases and reasoning techniques can be reused to control costs is explained. During the integration phase the KBS software must be integrated with conventional software, and verified and validated. The Verification and Validation (V and V) techniques applicable to these KBS are based on the ideas of consistency, minimal competency, and graph theory. The maintenance phase will be aided by having well designed and documented KBS software

    Aerodynamic parameter identification for an unmanned aerial vehicle

    Get PDF
    A dissertation submitted to the Faculty of Engineering and the Built Environment, School of Mechanical, Industrial and Aeronautical Engineering, University of the Witwatersrand, in fulfilment of the requirements for the degree of Master of Science in Engineering. Johannesburg, May 2016The present work describes the practical implementation of systems identification techniques to the development of a linear aerodynamic model for a small low-cost UAV equipped with a basic navigational and inertial measurement systems. The assessment of the applicability of the techniques were based on determining whether adequate aerodynamic models could be developed to aid in the reduction of wind tunnel testing when characterising new UAVs. The identification process consisted of postulating a model structure, flight test manoeuvre design, data reconstruction, aerodynamic parameter estimation, and model validation. The estimators that were used for the post-flight identification were the output error maximum likelihood method and an iterated extended Kalman filter with a global smoother. SIDPAC and FVSysID systems identification toolboxes were utilised and modified where appropriate. The instrumentation system on board the UAV consisted of three-axis accelerometers and gyroscopes, a three-axis vector magnetometer and GPS tracking while data was logged at 25 Hz. The angle of attack and angle of sideslip were not measured directly and were estimated using tailored data reconstruction methods. Adequate time domain lateral model correlation with flight data was achieved for the cruise flight condition. Adequacy was assessed against Theil’s inequality coefficients and Theil’s covariance. It was found that the simplified estimation algorithms based on the linearized equations of motion yielded the most promising model matches. Due to the high correlation between the pitch damping derivatives, the longitudinal analysis did not yield valid model parameter estimates. Even though the accuracy of the resulting models was below initial expectations, the detailed data compatibility analysis provided valuable insight into estimator limitations, instrumentation requirements and test procedures for systems identification on low-cost UAVs.MT201

    Threshold Accepting for Credit Risk Assessment and Validation

    Get PDF
    According to the latest Basel framework of Banking Supervision, financial institutions should internally assign their borrowers into a number of homogeneous groups. Each group is assigned a probability of default which distinguishes it from other groups. This study aims at determining the optimal number and size of groups that allow for statistical ex post validation of the efficiency of the credit risk assignment system. Our credit risk assignment approach is based on Threshold Accepting, a local search optimization technique, which has recently performed reliably in credit risk clustering especially when considering several realistic constraints. Using a relatively large real-world retail credit portfolio, we propose a new technique to validate ex post the precision of the grading system.credit risk assignment, Threshold Accepting, statistical validation
    • …
    corecore