A Test of the Long Memory Hypothesis Based on Self-Similarity

被引:6
|
作者
Davidson, James [1 ]
Rambaccussing, Dooruj [2 ]
机构
[1] Univ Exeter, Econ, Exeter, Devon, England
[2] Univ Dundee, Econ, Dundee, Scotland
关键词
long memory; skip-sampling; log-periodogram regression;
D O I
10.1515/jtse-2013-0036
中图分类号
O1 [数学]; C [社会科学总论];
学科分类号
03 ; 0303 ; 0701 ; 070101 ;
摘要
This paper develops a new test of true versus spurious long memory, based on log-periodogram estimation of the long memory parameter using skip-sampled data. A correction factor is derived to overcome the bias in this estimator due to aliasing. The procedure is designed to be used in the context of a conventional test of significance of the long memory parameter, and a composite test procedure is described that has the properties of known asymptotic size and consistency. The test is implemented using the bootstrap, with the distribution under the null hypothesis being approximated using a dependent-sample bootstrap technique to approximate short-run dependence following fractional differencing. The properties of the test are investigated in a set of Monte Carlo experiments. The procedure is illustrated by applications to exchange rate volatility and dividend growth series.
引用
收藏
页码:115 / 141
页数:27
相关论文
共 50 条
  • [41] Self-similarity based image edge detection
    Zhang, ZB
    ELECTRONIC IMAGING AND MULTIMEDIA TECHNOLOGY III, 2002, 4925 : 275 - 279
  • [42] Loss of Self-Similarity Detection Using Exact and Asymptotic Self-Similarity Models
    Rohani, Mohd Fo'ad
    Maarof, Mohd Aizaini
    Selamat, Ali
    Kettani, Houssain
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 571 - 581
  • [43] A New Local Self-similarity Descriptor Based on Structural Similarity Index
    Yang Hongbo
    Hou Xia
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 615 - +
  • [44] Self-similarity based lightweight intrusion detection method
    Kwon, Hyukmin
    Kim, Eunjin
    Yu, Song Jin
    Kim, Huy Kang
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3683 - 3690
  • [45] Network Calculus Based on Priority in Self-Similarity Flow
    Li Qing-hua
    Cao Hong
    Wu Yu-feng
    Xia Zhuo-qun
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 43 (13): : 264 - 270
  • [46] Host identification based on self-similarity of network activity
    Huang, Lisheng
    Zhao, Guanling
    Li, Lu
    Zhang, Fengjun
    COMPUTER COMMUNICATIONS, 2022, 191 : 467 - 476
  • [47] Vortex Generator Flow Model Based on Self-Similarity
    Velte, Clara Marika
    AIAA JOURNAL, 2013, 51 (02) : 526 - 529
  • [48] A DoS Detection Method Based on Composition Self-Similarity
    Jian-Qi, Zhu
    Feng, Fu
    Kim, Chong-kwon
    Ke-xin, Yin
    Yan-Heng, Liu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (05): : 1463 - 1478
  • [49] Chaotic Signal Denoising Algorithm Based on Self-Similarity
    HUANG Jinwang
    LYU Shanxiang
    CHEN Yue
    Chinese Journal of Electronics, 2021, 30 (03) : 482 - 488
  • [50] Chaotic Signal Denoising Algorithm Based on Self-Similarity
    Huang Jinwang
    Lyu Shanxiang
    Chen Yue
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 482 - 488