146 research outputs found

    Portfolio management:will hodling cryptos maximize investor returns?

    Get PDF
    Abstract. Background and Objectives: This thesis aims to investigate whether adding cryptocurrencies to a portfolio of traditional assets enhances the portfolio performance. Moreover, the previous research conducted in this area focused only on Bitcoin. This study devotes to examine the benefits of 18 cryptocurrencies together, which have been selected based on their market capitalization. Out of these 18 cryptocurrencies under study, we also aim to analyze the effects of the more recent additions in the crypto market, which is a stable coin and a utility coin, thereby making our study relevant to the present-day innovations in the crypto space. In addition to this, since the Blockchain and Cryptocurrency technology are newly founded ideations in the financial ecosystem, we scheme to provide a brief overview of this technology by taking into consideration aspects such as their advantages, disadvantages, types of blockchain and cryptocurrencies along with their working and the market players involved for their functioning. Data and Methodology: The times series data was obtained from Coinmarketcap and Yahoo Finance. The time period of research was from 01st January 2014 to 28th February 2020. We employ the Mean-Variance analysis of Markowitz (1952) and Sharpe-ratio of Sharpe (1964) and calculate the mean returns, standard deviation, and Sharpe-ratio and optimize three sets of portfolios: Maximization of Sharpe-ratio (with no short sale), Maximization of Sharpe-ratio (with short sale) and a Minimum Variance portfolio. Results: Results showcase that including cryptocurrencies in a portfolio of traditional assets, provides an improved Sharpe-ratio in comparison to the standard portfolio, which consists of traditional assets only. Moreover, on the construction of the correlation matrix, overall there is no significant correlation among the cryptocurrencies and traditional assets. Results also state that despite Bitcoin being the leader in the crypto space with a market dominance of 62%, it shows lower benefits in the portfolios constructed. However, on the other hand, we found exceptional results by the inclusion of other altcoins and Utility coin (Binance Coin). Furthermore, it should also be noted that cryptocurrencies are risky assets where, although they provide high returns than traditional assets, but they also exhibit extreme volatility. Moreover, the results are based on the limited availability of historical data for most of the cryptoassets, due to which conclusion from the results must be drawn with caution. However, cryptocurrencies have the potential to be analyzed and included for diversification benefits

    Potential Function for Diatomic Molecules

    Get PDF

    Design and Verification of a Pipelined Advanced Encryption Standard (AES) Encryption Algorithm with a 256-bit Cipher Key Using the UVM Methodology

    Get PDF
    Encryption is the process of altering information to make it unreadable by anyone except those having the key that allows them to change information back to the original readable form. Encryption is important because it allows you to securely protect the data that you don’t want anyone else to have access to. Today, the Advanced Encryption Standard (AES) is the most widely adopted encryption method. Till date there are no cryptanalytic attacks discovered against AES. Hence the verification of the hardware implementation of the AES Core is of utmost importance. In this research paper, the design and verification of a pipelined AES hardware module using a 256-bit cipher key is discussed in detail. The verification environment is developed using the Universal Verification Methodology (UVM) and SystemVerilog. The verification environment will validate the implementation of the AES Encryption Algorithm by comparing the outputs of the hardware design Design Under Test and a reference model developed in C

    Hast Mudra: Hand Sign Gesture Recognition Using LSTM

    Get PDF
    Even though using the most natural way of communication is sign language, deaf and mute people find it challenging to socialize. A language barrier is erected between regular people and D&M individuals due to the structure of sign language, which is distinct from text. They converse by using vision-based communication as a result. The gestures can be easily understood by others if there is a standard interface that transforms sign language to visible text. As a result, R&D has been done on a vision-based interface system that will allow D&M persons to communicate without understanding one another's languages. In this project, first gathered     and acquired data and created a dataset, after which extracting useful data from the images. Keywords After verification and trained data and model using the (LSTM) algorithm, TensorFlow, and Keras technology, classified the gestures according to alphabet. Using our own dataset, this system achieved an accuracy of around 86.75% in an experimental test. system uses the (LSTM) algorithm to process images and data

    On the planarity of line Mycielskian graph of a graph

    Get PDF
    The line Mycielskian graph of a graph G, denoted by Lμ(G) is defined as the graph obtained from L(G) by adding q+1 new vertices E' = ei' : 1 ≤  i ≤  q and e, then for 1 ≤  i ≤  q , joining ei' to the neighbours of ei  and  to e. The vertex e is called the root of Lμ(G).  This research paper deals with the characterization of planarity of line Mycielskian Graph Lμ(G) of a graph. Further, we also obtain the characterization on outerplanar, maximal planar, maximal outerplanar, minimally nonouterplanar and 1-planar of Lμ(G).Keywords :  Planar graph, Outerplanar, Maximal planar, Maximal outerplanar, Minimally nonouterplanar and 1-planar.2010 AMS subject classifications : 05C07, 05C10, 05C38, 05C60, 05C76

    Cactus Graphs with Cycle Blocks and Square Product Labeling

    Get PDF
    A graph G is known to be square product labeling, if there exists a bijection f from V (G) to {1, 2, 3,..., p} which induces f* from E(G) to N, defined by f*(uv) = f(u)^2 f(v)^2 is injective for each uv in E(G), for which the labeling pattern of edges are distinct. G is considered to be square product graph, if it admits a square product labeling. In this article, the results are obtained on square product labeling for some cactus graphs with cycle blocks

    Multiobjective Fuzzy Linear Programming Under Uncertain Resource Parameters

    Get PDF
    Source: ICHE Conference Archive - https://mdi-de.baw.de/icheArchiv
    corecore