84 research outputs found

    An Empirical Analysis of Dynamic Multiscale Hedging using Wavelet Decomposition

    Get PDF
    This paper investigates the hedging effectiveness of a dynamic moving window OLS hedging model, formed using wavelet decomposed time-series. The wavelet transform is applied to calculate the appropriate dynamic minimum-variance hedge ratio for various hedging horizons for a number of assets. The effectiveness of the dynamic multiscale hedging strategy is then tested, both in- and out-of-sample, using standard variance reduction and expanded to include a downside risk metric, the time horizon dependent Value-at-Risk. Measured using variance reduction, the effectiveness converges to one at longer scales, while a measure of VaR reduction indicates a portion of residual risk remains at all scales. Analysis of the hedge portfolio distributions indicate that this unhedged tail risk is related to excess portfolio kurtosis found at all scales.Comment: To Appear: Journal of Futures Market

    An Empirical Analysis of Dynamic Multiscale Hedging using Wavelet Decomposition

    Get PDF
    This paper investigates the hedging effectiveness of a dynamic moving window OLS hedging model, formed using wavelet decomposed time-series. The wavelet transform is applied to calculate the appropriate dynamic minimum-variance hedge ratio for various hedging horizons for a number of assets. The effectiveness of the dynamic multiscale hedging strategy is then tested, both in- and out-of-sample, using standard variance reduction and expanded to include a downside risk metric, the time horizon dependent Value-at-Risk. Measured using variance reduction, the effectiveness converges to one at longer scales, while a measure of VaR reduction indicates a portion of residual risk remains at all scales. Analysis of the hedge portfolio distributions indicate that this unhedged tail risk is related to excess portfolio kurtosis found at all scales.

    Wavelet multiresolution analysis of financial time series

    Get PDF
    fi=vertaisarvioitu|en=peerReviewed

    Large Language Model as Attributed Training Data Generator: A Tale of Diversity and Bias

    Full text link
    Large language models (LLMs) have been recently leveraged as training data generators for various natural language processing (NLP) tasks. While previous research has explored different approaches to training models using generated data, they generally rely on simple class-conditional prompts, which may limit the diversity of the generated data and inherit systematic biases of LLM. Thus, we investigate training data generation with diversely attributed prompts (e.g., specifying attributes like length and style), which have the potential to yield diverse and attributed generated data. Our investigation focuses on datasets with high cardinality and diverse domains, wherein we demonstrate that attributed prompts outperform simple class-conditional prompts in terms of the resulting model's performance. Additionally, we present a comprehensive empirical study on data generation encompassing vital aspects like bias, diversity, and efficiency, and highlight three key observations: firstly, synthetic datasets generated by simple prompts exhibit significant biases, such as regional bias; secondly, attribute diversity plays a pivotal role in enhancing model performance; lastly, attributed prompts achieve the performance of simple class-conditional prompts while utilizing only 5\% of the querying cost of ChatGPT associated with the latter. We release the generated dataset and used prompts to facilitate future research. The data and code will be available on \url{https://github.com/yueyu1030/AttrPrompt}.Comment: Work in progress. A shorter version is accepted to the ICML DMLR worksho

    Applications of Airborne and Portable LiDAR in the Structural Determination, Management, and Conservation of Southeastern U.S. Pine Forests

    Get PDF
    Active remote sensing techniques, such as Light Detection and Ranging (LiDAR), have transformed the field of forestry and natural resource management in the last decade. Intensive assessments of forest resources and detailed structural assessments can now be accomplished faster and at multiple landscape scales. The ecological applications of having this valuable information at-hand are still only being developed. This work explores the use of two active remote sensing techniques, airborne and portable LiDAR for forestry applications in a rapidly changing landscape, Southeastern Coastal Pine woodlands. Understanding the strengths and weaknesses of airborne and portable LiDAR, the tools used to extract structural information, and how to apply these to managing fire regimes are key to conserving unique upland pine ecosystems. Measuring habitat structure remotely and predicting habitat suitability through modeling will allow for the management of specific species of interest, such as threatened and endangered species. Chapter one focuses on the estimation of canopy cover and height measures across a variety of conditions of secondary upland pine and hardwood forests at Tall Timbers Research Station, FL. This study is unique since it uses two independent high resolution small-footprint LiDAR datasets (years 2002 and 2008) and extensive field plot and transect sampling for validation. Chapter One explores different tools available for metric derivation and tree extraction from discrete return airborne LiDAR data, highlighting strengths and weaknesses of each. Field and LiDAR datasets yielded better correlations for stand level comparisons, especially in canopy cover and mean height data extracted. Individual tree crown extraction from airborne LiDAR data significantly under-reported the total number of trees reported in the field datasets using either Fusion/LVD and LiDAR Analyst (Overwatch). Chapter two evaluates stand structure at the site of one of the longest running fire ecology studies in the US, located at Tall Timbers Research Station (TTRS) in the southeastern U.S. Small footprint high resolution discrete return LiDAR was used to provide an understanding of the impact of multiple disturbance regimes on forest structure, especially on the 3-dimensional spatial arrangement of multiple structural elements and structural diversity indices. LiDAR data provided sensitive detection of structural metrics, diversity, and fine-scale vertical changes in the understory and mid-canopy structure. Canopy cover and diversity indices were shown to be statistically higher in fire suppressed and less frequently burned plots than in 1- and 2-year fire interval treated plots, which is in general agreement with the increase from 2- to 3-year fire return interval being considered an ecological threshold for these systems (Masters et al. 2005). The results from this study highlight the value of the use of LiDAR in evaluating disturbance impacts on the three-dimensional structure of pine forest systems, particularly over large landscapes. Chapter three uses an affordable portable LiDAR system, first presented by Parker et al. (2004) and further modified for extra portability, to provide an understanding of structural differences between old-growth and secondary-growth forests in the Red Hills area of southwestern Georgia and North Florida. It also provides insight into the strengths and weaknesses in structural determination of ground-based portable systems in contrast to airborne LiDAR systems. Structural plot metrics obtained from airborne and portable LiDAR systems presented some similarities (i.e. canopy cover), but distinct differences appeared when measuring canopy heights (maximum and mean heights) using these different methods. Both the airborne and portable systems were able to provide gap detection and canopy cover estimation at the plot level. The portable system, when compared to the airborne LiDAR sensor, provides an underestimation of canopy cover in open forest systems ([less than]50% canopy cover), but is more sensitive in detection of cover in hardwood woodland plots ([greater than]60% canopy cover). The strength of the portable LiDAR system lies in the detection of 3-dimensional fine structural changes (i.e. recruitment, encroachment) and with higher sensitivity in detecting lower canopy levels, often missed by airborne systems. Chapter four addresses a very promising application for fine-scale airborne LiDAR data, the creation of habitat suitability models for species of management and conservation concerns. This Chapter uses fine scale LiDAR metrics, such as canopy cover at various height strata, canopy height information, and a measure of horizontal vegetation distribution (clumped versus dispersed) to model the preferences of 10 songbirds of interest in southeast US woodlands. The results from this study highlight the rapidly changing nature of habitat conditions and how these impact songbird occurrence. Furthermore, Chapter four provides insight into the use of airborne LiDAR to provide specific management guidance to enhance the suitable habitat for 10 songbird species. The collection of studies presented here provides applied tools for the use of airborne and portable LiDAR for rapid assessment and responsive management in southeastern pine woodlands. The advantages of detecting small changes in three-dimensional vegetation structure and how these can impact habitat functionality and suitability for species of interest are explored throughout the next four chapters. The research presented here provides an original and important contribution in the application of airborne and portable LiDAR datasets in forest management and ecological studies

    University of Wollongong Postgraduate Calendar 2003

    Get PDF

    Dynamic block encryption with self-authenticating key exchange

    Get PDF
    One of the greatest challenges facing cryptographers is the mechanism used for key exchange. When secret data is transmitted, the chances are that there may be an attacker who will try to intercept and decrypt the message. Having done so, he/she might just gain advantage over the information obtained, or attempt to tamper with the message, and thus, misguiding the recipient. Both cases are equally fatal and may cause great harm as a consequence. In cryptography, there are two commonly used methods of exchanging secret keys between parties. In the first method, symmetric cryptography, the key is sent in advance, over some secure channel, which only the intended recipient can read. The second method of key sharing is by using a public key exchange method, where each party has a private and public key, a public key is shared and a private key is kept locally. In both cases, keys are exchanged between two parties. In this thesis, we propose a method whereby the risk of exchanging keys is minimised. The key is embedded in the encrypted text using a process that we call `chirp coding', and recovered by the recipient using a process that is based on correlation. The `chirp coding parameters' are exchanged between users by employing a USB flash memory retained by each user. If the keys are compromised they are still not usable because an attacker can only have access to part of the key. Alternatively, the software can be configured to operate in a one time parameter mode, in this mode, the parameters are agreed upon in advance. There is no parameter exchange during file transmission, except, of course, the key embedded in ciphertext. The thesis also introduces a method of encryption which utilises dynamic blocks, where the block size is different for each block. Prime numbers are used to drive two random number generators: a Linear Congruential Generator (LCG) which takes in the seed and initialises the system and a Blum-Blum Shum (BBS) generator which is used to generate random streams to encrypt messages, images or video clips for example. In each case, the key created is text dependent and therefore will change as each message is sent. The scheme presented in this research is composed of five basic modules. The first module is the key generation module, where the key to be generated is message dependent. The second module, encryption module, performs data encryption. The third module, key exchange module, embeds the key into the encrypted text. Once this is done, the message is transmitted and the recipient uses the key extraction module to retrieve the key and finally the decryption module is executed to decrypt the message and authenticate it. In addition, the message may be compressed before encryption and decompressed by the recipient after decryption using standard compression tools

    University of Wollongong Postgraduate Calendar 2001

    Get PDF

    University of Wollongong Undergraduate Calendar 2003

    Get PDF
    corecore