1,190 research outputs found

    Using Column Generation to Solve Extensions to the Markowitz Model

    Full text link
    We introduce a solution scheme for portfolio optimization problems with cardinality constraints. Typical portfolio optimization problems are extensions of the classical Markowitz mean-variance portfolio optimization model. We solve such type of problems using a method similar to column generation. In this scheme, the original problem is restricted to a subset of the assets resulting in a master convex quadratic problem. Then the dual information of the master problem is used in a sub-problem to propose more assets to consider. We also consider other extensions to the Markowitz model to diversify the portfolio selection within the given intervals for active weights.Comment: 16 pages, 3 figures, 2 tables, 1 pseudocod

    Predicting Fraud Apps Using Hybrid Learning Approach: A Survey

    Get PDF
    Each individual in the planet are mobile phone users in fact smart-phone users with android applications. So, due to this attractiveness and well-known concept there will be a hasty growth in mobile technology. And in addition in information mining, mining the required information from a fastidious application is exceptionally troublesome. Consolidating these two ideas of ranking frauds in android market and taking out required information is gone exceptionally tough.The mobile phone Apps has developed at massive speed in some years; as for march 2017, there are nearby 2.8 million Apps at google play and 2.2 Apps at Google Apps store. In addition, there are over 400,000 self-governing app developers all fighting for the attention of the same potential clients. The Google App Store saw 128,000 new business apps alone in 2014 and the mobile gaming category alone has contest to the tune of almost 300,000 apps. Here the major need to make fraud search in Apps is by searching the high ranked applications up to 30-40 which may be ranked high in some time or the applications which are in those high ranked lists should be confirmed but this is not applied for thousands of applications added per day. So, go for wide examination by applying some procedure to every application to judge its ranking. Discovery of ranking fraud for mobile phone applications, require a flawless, fraud less and result that show correct application accordingly provide ranking; where really make it occur by searching fraud of applications. They create fraud of App by ranked high the App by methods using such human water armies and bot farms; where they create fraud by downloading application through different devices and provide fake ratings and reviews. So, extract critical data connecting particular application such as review which was called comments and lots of other information, to mine and place algorithm to identify fakeness in application rank

    A Study On Secure Data Storage In Public Clouds

    Get PDF
    This paper focuses on the study of various existing cloud storage mechanisms with their related security frameworks for realizing the efficient cloud storage in a secured environment. The key feature for the growing popularity of cloud computing relies on the efficient management of stored data in a highly secure way for remote accessing. Ensuring the integrity and availability of user’s data stored in the cloud has always been an important aspect for its quality of service. While storing data in cloud, lots of issues with respect to security are being cropping out as clients have no direct physical control over their outsourced data. In addition, their vulnerabilities to external threats are increasing as cloud provides storage and accessing services via world-wide domain networking. This study will help in identifying different performance measures for secure available of data in cloud storage mechanisms

    Study of Post-Modernism and Post-Structuralism

    Full text link
    Post- Modernism was not the invention of literary critics, but literature can certainly claim to be one of the most important laboratories of postmodernism. Literary postmodernism has tended to be focused on one kind of writing, namely, narrative fiction. It seems oddly fitting that what Hutcheon says “poetics of postmodernism” should turn out to be most in evidence in its fiction. One might almost say that the move from modernism to postmodernism involves a move from poetry to fiction. Modernism had also been characterized by efforts to establish the dignity and seriousness of the novel by developing for it a kind of poetics, centered on principles of structure. This poetics operated according to the principles of a scenography

    Ď„*- GENERALIZED SEMICLOSED SETS IN TOPOLOGICAL SPACES

    Get PDF
    In this paper, we introduce a new class of sets called -generalized semiclosed sets and -generalized semiopen sets in topological spaces and study some of their properties

    Membangun Customer Relationship Management dalam Bisnis

    Full text link
    Customer relationship management dapat dijadikan alat oleh Perusahaan dalam mengembangkan bisnisnya agar mendapat perhatian dari customer dan pasar. Paper ini disusun berdasarkan penelitian yang menggambarkan hubungan bisnis dan pengaruh pelanggan terhadap Perusahaan, serta bagaimana sebuah customer relationship management dapat membantu Perusahaan dalam meraih pangsa pasar. Data dan informasi dalam studi ini didapatkan dari studi pustaka yang mengacu pada buku referensi dan jurnal yang berhubungan dengan topik yang ada. Paper ini memberi pengetahuan tentang pencapaian tujuan Perusahaan yang didukung penerapan customer relationship management
    • …
    corecore