Searched for: faculty%3A%22Electrical%255C%252BEngineering%252C%255C%252BMathematics%255C%252Band%255C%252BComputer%255C%252BScience%22
(1 - 12 of 12)
document
Roth, M. (author), Buishand, T.A. (author), Jongbloed, G. (author)
Rainfall extremes are thought to have increased over recent years. Typically linear trends have been considered to describe the temporal evolution of high quantiles of the daily rainfall distribution. For long records it is important to allow more flexibility. Quantile regression methods are available to estimate monotone trends for single...
journal article 2015
document
De Bruin, J. (author)
Record linkage is the procedure of bringing together information from two or more records that are believed to belong to the same entity. The linking of a pair of records without identifier should be based on attributes both records have in common. The probabilistic framework described by Fellegi and Sunter (1969) can be used for record linkage....
master thesis 2015
document
Becker, T. (author)
In this thesis several methods for variable selection for statistical models are examined. There is specific attention for variable selection in so called "dependent data", in which there exists a strong correlation between the independent variables.
bachelor thesis 2015
document
Roseboom, J. (author)
Tijdens het varen zijn er verschillende data gemeten. In deze data zitten fouten. Vanwege de fouten zijn er aannames opgesteld. De aannames worden getoetst. De data wordt gecorrigeerd, gebruikmakend van gewogen gemiddelden en kubische splines
bachelor thesis 2015
document
Smalbil, P.J. (author)
In statistics one often encounters the problem of estimating a function based on a given dataset. Sometimes shape properties such as monotonicity of the function are known. This property can be used in a non-parametric regression model. The iterative convex minorant(ICM) algorithm can be used to compute an estimate of a convex regression...
bachelor thesis 2015
document
Velthoen, J.J. (author)
In extreme value theory the focus is on the tails of the distribution. The main focus is to estimate the tail distribution for a rounded data set. To estimate this tail distribution the extreme value index should be estimated, but due to the rounded data this extreme value index oscillates heavily. Therefore a correct estimate can not be...
bachelor thesis 2014
document
Van der Aa, J.J.R.J.P. (author)
Certain banks offer its customers a new investment product, which is known as AEX-sparen. A minimal amount of 5000 Euro is put into a bank account and this will be returned after four months plus interest. The interest is the same as the AEX-Index has earned in the previous four months, but is maximized to 10 %. If the AEX-Index has gone down...
bachelor thesis 2011
document
Witte, B.I. (author)
Statistics deals with answering questions based on collected data. In medical applications, the quantity of interest can often not be observed directly. They are censored. It is a challenge to answer the question as precisely as possible based on the incomplete data. The quantity of interest can be censored in many different ways. In HIV vaccine...
doctoral thesis 2011
document
Lewandowski, D. (author)
doctoral thesis 2008
document
Van de Wiel, G.F. (author)
A probabilistic model for calculating oil spill volume in sea tanker accidents is presented. Accidents are specified as either collisions or groundings. Based on existing accident data, damage size is estimated given an accident. Using damage size a probability of rupture is calculated. Finally, outflow volume is determined.
master thesis 2008
document
Jongen, R.A. (author), Morshuis, P.H.F. (author), Gulski, E. (author), Smit, J.J. (author), Maksymiuk, J. (author), Janssen, A.L.J. (author)
journal article 2006
document
Shterev, I.D. (author), Lagendijk, R.L. (author)
Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks.1 The existence of good high dimensional lattices that can be efficiently implemented2–4 and incorporated into watermarking structures, made quantization-based watermarking schemes of practical...
conference paper 2005
Searched for: faculty%3A%22Electrical%255C%252BEngineering%252C%255C%252BMathematics%255C%252Band%255C%252BComputer%255C%252BScience%22
(1 - 12 of 12)