65,538 research outputs found

    Pricing and Hedging Asian Basket Options with Quasi-Monte Carlo Simulations

    Get PDF
    In this article we consider the problem of pricing and hedging high-dimensional Asian basket options by Quasi-Monte Carlo simulation. We assume a Black-Scholes market with time-dependent volatilities and show how to compute the deltas by the aid of the Malliavin Calculus, extending the procedure employed by Montero and Kohatsu-Higa (2003). Efficient path-generation algorithms, such as Linear Transformation and Principal Component Analysis, exhibit a high computational cost in a market with time-dependent volatilities. We present a new and fast Cholesky algorithm for block matrices that makes the Linear Transformation even more convenient. Moreover, we propose a new-path generation technique based on a Kronecker Product Approximation. This construction returns the same accuracy of the Linear Transformation used for the computation of the deltas and the prices in the case of correlated asset returns while requiring a lower computational time. All these techniques can be easily employed for stochastic volatility models based on the mixture of multi-dimensional dynamics introduced by Brigo et al. (2004).Comment: 16 page

    Generalization of coloring linear transformation

    Get PDF
    The paper is focused on the technique of linear transformation between correlated and uncorrelated Gaussian random vectors, which is more or less commonly used in the reliability analysis of structures. These linear transformations are frequently needed to transform uncorrelated random vectors into correlated vectors with a prescribed covariance matrix (coloring transformation), and also to perform an inverse (whitening) transformation, i.e. to decorrelate a random vector with a non-identity covariance matrix. Two well-known linear transformation techniques, namely Cholesky decomposition and eigendecomposition (also known as principal component analysis, or the orthogonal transformation of a covariance matrix), are shown to be special cases of the generalized linear transformation presented in the paper. The proposed generalized linear transformation is able to rotate the transformation randomly, which may be desired in order to remove unwanted directional bias. The conclusions presented herein may be useful for structural reliability analysis with correlated random variables or random fields

    Generation of correlated Rayleigh fading channels for accurate simulationof promising wireless communication systems

    Get PDF
    In this paper, a generalized method is proposed for the accurate simulation of equal/ unequal power correlated Rayleigh fading channels to overcome the shortcomings of existing methods. Spatial and spectral correlations are also considered in this technique for different transmission conditions. It employs successive coloring for the inphase and quadrature components of successive signals using real correlation vector of successive signal envelopes rather than complex covariance matrix of the Gaussian signals which is utilized in conventional methods. Any number of fading signals with any desired correlations of successive envelope pairs in the interval [0, 1] can be generated with high accuracy. Moreover, factorization of the desired covariance matrix is avoided to overcome the shortcomings and high computational complexity of conventional methods. Extensive simulations of different representative scenarios demonstrate the effectiveness of the proposedtechnique. The simplicity and accuracy of this method will help the researchers to study and simulate the impact of fading correlation on the performance evaluation of various multi-antenna and multicarrier communication systems. Moreover, it enables the engineers for efficient design and deployment of new schemes for feasible wireless application

    Random quantum correlations and density operator distributions

    Get PDF
    Consider the question: what statistical ensemble corresponds to minimal prior knowledge about a quantum system ? For the case where the system is in fact known to be in a pure state there is an obvious answer, corresponding to the unique unitarily-invariant measure on the Hilbert sphere. However, the problem is open for the general case where states are described by density operators. Here two approaches to the problem are investigated. The first approach assumes that the system is randomly correlated with a second system, where the ensemble of composite systems is described by a random pure state. Results for qubits randomly correlated with other systems are presented, including average entanglement entropies. It is shown that maximum correlation is guaranteed in the limit as one system becomes infinite-dimensional. The second approach relies on choosing a metric on the space of density operators, and generating a corresponding ensemble from the induced volume element. Comparisons between the approaches are made for qubits, for which the second approach (based on the Bures metric) yields the most symmetric, and hence the least informative, ensemble of density operators.Comment: 13 pages, no figures; a new page of additional notes at end draws attention to 3 new references and their relevanc

    Self-similar prior and wavelet bases for hidden incompressible turbulent motion

    Get PDF
    This work is concerned with the ill-posed inverse problem of estimating turbulent flows from the observation of an image sequence. From a Bayesian perspective, a divergence-free isotropic fractional Brownian motion (fBm) is chosen as a prior model for instantaneous turbulent velocity fields. This self-similar prior characterizes accurately second-order statistics of velocity fields in incompressible isotropic turbulence. Nevertheless, the associated maximum a posteriori involves a fractional Laplacian operator which is delicate to implement in practice. To deal with this issue, we propose to decompose the divergent-free fBm on well-chosen wavelet bases. As a first alternative, we propose to design wavelets as whitening filters. We show that these filters are fractional Laplacian wavelets composed with the Leray projector. As a second alternative, we use a divergence-free wavelet basis, which takes implicitly into account the incompressibility constraint arising from physics. Although the latter decomposition involves correlated wavelet coefficients, we are able to handle this dependence in practice. Based on these two wavelet decompositions, we finally provide effective and efficient algorithms to approach the maximum a posteriori. An intensive numerical evaluation proves the relevance of the proposed wavelet-based self-similar priors.Comment: SIAM Journal on Imaging Sciences, 201

    Enabling Multi-level Trust in Privacy Preserving Data Mining

    Full text link
    Privacy Preserving Data Mining (PPDM) addresses the problem of developing accurate models about aggregated data without access to precise information in individual data record. A widely studied \emph{perturbation-based PPDM} approach introduces random perturbation to individual values to preserve privacy before data is published. Previous solutions of this approach are limited in their tacit assumption of single-level trust on data miners. In this work, we relax this assumption and expand the scope of perturbation-based PPDM to Multi-Level Trust (MLT-PPDM). In our setting, the more trusted a data miner is, the less perturbed copy of the data it can access. Under this setting, a malicious data miner may have access to differently perturbed copies of the same data through various means, and may combine these diverse copies to jointly infer additional information about the original data that the data owner does not intend to release. Preventing such \emph{diversity attacks} is the key challenge of providing MLT-PPDM services. We address this challenge by properly correlating perturbation across copies at different trust levels. We prove that our solution is robust against diversity attacks with respect to our privacy goal. That is, for data miners who have access to an arbitrary collection of the perturbed copies, our solution prevent them from jointly reconstructing the original data more accurately than the best effort using any individual copy in the collection. Our solution allows a data owner to generate perturbed copies of its data for arbitrary trust levels on-demand. This feature offers data owners maximum flexibility.Comment: 20 pages, 5 figures. Accepted for publication in IEEE Transactions on Knowledge and Data Engineerin
    corecore