scholarly journals Adjustable Security Proportions in the Fuzzy Portfolio Selection under Guaranteed Return Rates

Mathematics ◽  
2021 ◽  
Vol 9 (23) ◽  
pp. 3026
Author(s):  
Yin-Yin Huang ◽  
I-Fei Chen ◽  
Chien-Liang Chiu ◽  
Ruey-Chyn Tsaur

Based on the concept of high returns as the preference to low returns, this study discusses the adjustable security proportion for excess investment and shortage investment based on the selected guaranteed return rates in a fuzzy environment, in which the return rates for selected securities are characterized by fuzzy variables. We suppose some securities are for excess investment because their return rates are higher than the guaranteed return rates, and the other securities whose return rates are lower than the guaranteed return rates are considered for shortage investment. Then, we solve the proposed expected fuzzy returns by the concept of possibility theory, where fuzzy returns are quantified by possibilistic mean and risks are measured by possibilistic variance, and then we use linear programming model to maximize the expected value of a portfolio’s return under investment risk constraints. Finally, we illustrate two numerical examples to show that the expected return rate under a lower guaranteed return rate is better than a higher guaranteed return rates in different levels of investment risks. In shortage investments, the investment proportion for the selected securities are almost zero under higher investment risks, whereas the portfolio is constructed from those securities in excess investments.

Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-10 ◽  
Author(s):  
Yunyun Sui ◽  
Jiangshan Hu ◽  
Fang Ma

Investors are concerned about the reliability and safety of their capital, especially its liquidity, when investing. This paper sets up a possibilistic portfolio selection model with liquidity constraint. In this model, the asset return and liquidity are fuzzy variables which follow the normal possibility distributions. Liquidity is measured as the turnover rate of the asset. On the basis of possibility theory, we transform the model into a quadratic programming problem to obtain its solution. We illustrate that, in the process of investment, investors can make better use of capital by choosing their investment portfolios according to their expected return and asset liquidity.


Author(s):  
WEIJUN XU ◽  
WEIDONG XU ◽  
HONGYI LI ◽  
WEIGUO ZHANG

Owing to the fluctuations in the financial markets, many financial variables such as expected return, volatility, or exchange rate may occur imprecisely. But many portfolio selection models consider precise input of these values. Therefore, this paper studies a multiobjective international asset allocation problem under fuzzy environment. In our portfolio selection model, both of the return risk and the exchange risk are considered. The coefficient matrices in the objectives and constraints and the decision value are considered as fuzzy variables. The calculation of the portfolio and efficient frontier is derived by considering the exchange risk in the fuzzy environment. An empirical study is performed based on a portfolio of six securities denominated in six different currencies, i.e., USD, EUR, JPY, CNY, HKD, and GBP. The α-level closed interval portfolio [Formula: see text] and the fuzzy efficient frontier are obtained with different values of α ∈ (0, 1]. The empirical results indicate that the fuzzy asset selection method is a useful tool for dealing with the imprecise problem in the real world.


Jurnal Varian ◽  
2018 ◽  
Vol 1 (2) ◽  
pp. 22-29
Author(s):  
Gilang Primajati

In the capital markets, especially the investment market, the establishment of a portfolio is something that must be understood by investors. Portfolio formation by investors to maximize profits as much as possible by minimizing the risk of losses that may occur. Portfolio diversification is defined as portfolio formation in such a way that it can reduce portfolio risk without sacrificing returns. Optimal portfolio with efficient-portfolio mean criteria, investors only invest in risk assets only. Investors do not include risk free assets in their portfolios. The efficient variance portfolio is defined as a portfolio that has minimum variance among the overall possible portfolio that can be formed, at the same expected return rate. The mean method of one constraint variant can be used as the basis for optimal portfolio determination. The shares of LQ-45 used are shares of AALI, BBCA, UNVR, TLKM and ADHI. AALI shares received a positive weight of 7%, BBCA 48%, UNVR 16%, TLKM 26% and ADHI 3%


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
R Bosco ◽  
S Gambelli ◽  
V Urbano ◽  
G Cevenini ◽  
G Messina

Abstract Background Sanitizing the operating theatres (OT) is important to minimize risk of post-operative infections. Disinfection procedures between one operation and another is less aggressive than final cleaning procedures, at the end of the day. Aim was assessing the difference of contamination: i) between different levels of disinfection; ii) before and after the use of a UVC Device (UVC-D). Methods Between December 2019/February 2020 a cross sectional study was conducted in OT in a real clinical context. 94 Petri dishes (PD) were used in 3 OT. Three different sanitation levels (SL1-3) were compared pre- and post-use of UVC-D: i) No cleaning after surgery (SL1); ii) after in-between cleaning (SL2); iii) after terminal cleaning (SL3). UVC-D was employed for 6 minutes, 3 minutes per bed side. PD were incubated at 36 °C and colony forming unit (CFU) counted at 48h. Descriptive statistic, Wilcoxon and Mann-Whitney tests were performed to assess the contamination levels in total, pre/post use of UVC-D, and between different sanitation levels, respectively. Results In total we had a mean of 3.39 CFU/PD (C.I. 2.05 - 4.74) and a median of 1 CFU/PD (Min. 0 - Max. 39), after UVC-D use we had a mean of 2.20 CFU/PD (C.I. 0.69 - 5.09) and a median of 0 CFU/PD (Min. 0 - Max. 133). The UVC-D led to a significant reduction of CFU (p < 0.001). Without UVC-D we had a significant CFU drop (p < 0.05) between SL1 and SL3. Using UVC-D, we observed significant reductions of contamination (p < 0.05) between SL3 and SL1. Comparing SL1 (median 0) post UVC-D use vs SL2 pre UVC-D use (median 0.5), and SL2 post UVC-D use (median 0) vs SL3 pre UVC-D use (median 1) we had a significant reduction of contamination (p < 0.05). Conclusions UVC-D improved environmental contamination in any of the three sanitation levels. Furthermore, the use of UVC-D alone was better than in-between and terminal cleaning. Although these encouraging results, the cleaning procedures executed by dedicated staff has to be considered. Key messages UVC are efficient to decrease contamination in operating theatres regardless of sanitation levels. The additional use of UVC technology to standard cleaning procedures significantly improves sanitation levels.


2020 ◽  
Vol 11 (1) ◽  
pp. 39
Author(s):  
Eric Järpe ◽  
Mattias Weckstén

A new method for musical steganography for the MIDI format is presented. The MIDI standard is a user-friendly music technology protocol that is frequently deployed by composers of different levels of ambition. There is to the author’s knowledge no fully implemented and rigorously specified, publicly available method for MIDI steganography. The goal of this study, however, is to investigate how a novel MIDI steganography algorithm can be implemented by manipulation of the velocity attribute subject to restrictions of capacity and security. Many of today’s MIDI steganography methods—less rigorously described in the literature—fail to be resilient to steganalysis. Traces (such as artefacts in the MIDI code which would not occur by the mere generation of MIDI music: MIDI file size inflation, radical changes in mean absolute error or peak signal-to-noise ratio of certain kinds of MIDI events or even audible effects in the stego MIDI file) that could catch the eye of a scrutinizing steganalyst are side-effects of many current methods described in the literature. This steganalysis resilience is an imperative property of the steganography method. However, by restricting the carrier MIDI files to classical organ and harpsichord pieces, the problem of velocities following the mood of the music can be avoided. The proposed method, called Velody 2, is found to be on par with or better than the cutting edge alternative methods regarding capacity and inflation while still possessing a better resilience against steganalysis. An audibility test was conducted to check that there are no signs of audible traces in the stego MIDI files.


De Jure ◽  
2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Daniel Haman ◽  
◽  
◽  

The difference between intent (dolus) and negligence (culpa) was rarely emphasized in codified medieval laws and regulations. When compared to the legal statements related to intent, negligence was mentioned even more rarely. However, there are some laws that distinguished between the two concepts in terms of some specific crimes, such as arson. This paper draws attention to three medieval Slavic legal documents – the Zakon Sudnyj LJudem (ZSLJ), the Vinodol Law and the Statute of Senj. They are compared with reference to regulations regarding arson, with the focus being on arson as a crime committed intentionally or out of negligence. The ZSLJ as the oldest known Slavic law in the world shows some similarities with other medieval Slavic legal codes, especially in the field of criminal law, since most of the ZSLJ’s articles are related to criminal law. On the other hand, the Vinodol Law is the oldest preserved Croatian law and it is among the oldest Slavic codes in the world. It was written in 1288 in the Croatian Glagolitic script and in the Croatian Chakavian dialect. The third document – the Statute of Senj – regulated legal matters in the Croatian littoral town of Senj. It was written in 1388 – exactly a century after the Vinodol Law was proclaimed. When comparing the Vinodol Law and the Statute of Senj with the Zakon Sudnyj LJudem, there are clear differences and similarities, particularly in the field of criminal law. Within the framework of criminal offenses, the act of arson is important for making a distinction between intent and negligence. While the ZSLJ regulates different levels of guilt, the Vinodol Law makes no difference between dolus and culpa. On the other hand, the Statute of Senj strictly refers to negligence as a punishable crime. Even though the ZSLJ is almost half a millennium older than the Statute of Senj and around 400 years older than the Vinodol Law, this paper proves that the ZSLJ defines the guilt and the punishment for arson much better than the other two laws.


Author(s):  
Efstratios Nikolaidis ◽  
Harley Cudney ◽  
Sophie Chen ◽  
Raphael T. Haftka ◽  
Raluca Rosca

Abstract This paper compares probabilistic and possibility-based methods for design against catastrophic failure under uncertainty. It studies the effect of the amount of information on the effectiveness of each method. The study is confined to problems where the boundary between survival and failure is sharp. First, the paper examines the theoretical foundations of probability and possibility. It also compares the two methods when they are used to assess the risk of a system. Finally, it compares the two methods on two design problems. A major difference between probability and possibility is in the axioms about the union of events. Because of this difference, probability and possibility calculi are fundamentally different and one cannot simulate possibility calculus using probabilistic models. It is shown that possibility-based methods can be less conservative than probability-based methods in systems with many failure modes. On the other hand, possibility-based methods tend to be more conservative than probability-based methods in systems that fail only if many unfavorable events occur simultaneously. Probabilistic methods are better than possibility-based methods if sufficient information is available. However, the latter can be better if little information is available. A principal reason is that it is easier to identify the most conservative possibilistic model than the most conservative probabilistic model that is consistent with the available information.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Hai Wang ◽  
Lei Dai ◽  
Yingfeng Cai ◽  
Long Chen ◽  
Yong Zhang

Traditional salient object detection models are divided into several classes based on low-level features and contrast between pixels. In this paper, we propose a model based on a multilevel deep pyramid (MLDP), which involves fusing multiple features on different levels. Firstly, the MLDP uses the original image as the input for a VGG16 model to extract high-level features and form an initial saliency map. Next, the MLDP further extracts high-level features to form a saliency map based on a deep pyramid. Then, the MLDP obtains the salient map fused with superpixels by extracting low-level features. After that, the MLDP applies background noise filtering to the saliency map fused with superpixels in order to filter out the interference of background noise and form a saliency map based on the foreground. Lastly, the MLDP combines the saliency map fused with the superpixels with the saliency map based on the foreground, which results in the final saliency map. The MLDP is not limited to low-level features while it fuses multiple features and achieves good results when extracting salient targets. As can be seen in our experiment section, the MLDP is better than the other 7 state-of-the-art models across three different public saliency datasets. Therefore, the MLDP has superiority and wide applicability in extraction of salient targets.


Algorithms ◽  
2021 ◽  
Vol 14 (10) ◽  
pp. 290
Author(s):  
Kai Ma ◽  
Ming-Jun Nie ◽  
Sen Lin ◽  
Jianlei Kong ◽  
Cheng-Cai Yang ◽  
...  

Accurate identification of insect pests is the key to improve crop yield and ensure quality and safety. However, under the influence of environmental conditions, the same kind of pests show obvious differences in intraclass representation, while the different kinds of pests show slight similarities. The traditional methods have been difficult to deal with fine-grained identification of pests, and their practical deployment is low. In order to solve this problem, this paper uses a variety of equipment terminals in the agricultural Internet of Things to obtain a large number of pest images and proposes a fine-grained identification model of pests based on probability fusion network FPNT. This model designs a fine-grained feature extractor based on an optimized CSPNet backbone network, mining different levels of local feature expression that can distinguish subtle differences. After the integration of the NetVLAD aggregation layer, the gated probability fusion layer gives full play to the advantages of information complementarity and confidence coupling of multi-model fusion. The comparison test shows that the PFNT model has an average recognition accuracy of 93.18% for all kinds of pests, and its performance is better than other deep-learning methods, with the average processing time drop to 61 ms, which can meet the needs of fine-grained image recognition of pests in the Internet of Things in agricultural and forestry practice, and provide technical application reference for intelligent early warning and prevention of pests.


Author(s):  
Sameer Sarhan Khaleel

Pot experiment is carried out at the greenhouse belongs to the college of Education-university of Al-Anbar during Winter season 2013/2014 to investigate the effect of application of different levels of bat guano (0, 4 and 8gm) on some yield  traits for two bread wheat Triticum aestivum L. Cvs, one is local cv. (Aliz) another one is imported from Australia (Eratom). The experimental treatments are distributed according factorial experiment arrangement using completely randomized blocks with three replicates. Some traits are measured as spikes no per plant, spike length, spike weight, grains nos. per spike and grains weight per pot. Results reveal that bat guano application of 8gm is significantly superior in the average of. It thus could be concluded that the application of bat guano at 8gm alone is the better than 4gm in some traits. However, the genetic affinity of local cv is dominated with 4gm application and of imported cv is to 8gm application. Therefore, it could be recommended to test the application of bat guano on the two cultivars across field environment


Sign in / Sign up

Export Citation Format

Share Document