28 research outputs found
On the suboptimality of path-dependent pay-offs in LĂ©vy markets.
Cox & Leland (2000) use techniques from the field of stochastic control theory to show that in the particular case of a Brownian motion for the asset returns all risk averse decisionmakers with a fixed investment horizon prefer path-independent payoffs over path-dependent ones. We will provide a novel and simple proof for the Cox&Leland result and we will extend it to general, not necessarily complete, LĂ©vymarkets. It is also shown that in these markets optimal path-independent pay-offs have final values increasing with the underlying asset value. Our results imply that path-dependent investment payoffs, the use of which is widespread in financial markets, do not appear to offer good value for risk averse decisionmakers with a fixed investment horizonResearch; Approximation; Distribution; Risk; Risk measure; Lognormal; Random variables; Variables; Lower bounds; Choice; Variance; Goodness of fit; Actuarial; Problems; Framework; Requirements; Credit; Portfolio; Impact; Software; Value; Data; Markets; Market; Field; Control; Control theory; Theory; Brownian motion; Investment; IT; Optimal;
Asset correlations: shifting tides.
The Basel II accord outlines a general framework for determining regulatory capital requirements for credit risk portfolios. Different obligors usually operate independent socio-economic environments and these structural correlations are the main reason why regulatory capital is needed. Therefore, it is not surprising that an important component of the regulatory regime for capital is the asset correlation between obligors. Basel II has set a range for corporate asset correlations from 8 to 24 %, the exact value depending on several individual firm characteristics.We use monthly asset value data to calculate asset correlations and compare these with Basel II as well as results from other papers. Our results are in line with literature but a clear difference is found between the majority of these results and the results from Basel II and some major software providers. We discuss these differences and offer some explanations as an attempt to reconcile the differences. The impact of horizon is considered as wellResearch; Approximation; Distribution; Risk; Risk measure; Lognormal; Random variables; Variables; Lower bounds; Choice; Variance; Goodness of fit; Actuarial; Problems; Framework; Requirements; Credit; Portfolio; Impact; Software; Value; Data;
Closed form representations and properties of the generalised Wendland functions
In this paper we investigate the generalisation of Wendlandâs compactly supported radial basis functions to the case where the smoothness parameter is not assumed to be a positive integer or half-integer and the parameter â, which is chosen to ensure positive definiteness, need not take on the minimal value. We derive sufficient and necessary conditions for the generalised Wendland functions to be positive definite and deduce the native spaces that they generate. We also provide closed form representations for the generalised Wendland functions in the case when the smoothness parameter is an integer and where the parameter â is any suitable value that ensures positive definiteness, as well as closed form representations for the Fourier transform when the smoothness parameter is a positive integer or half-integer
Closed form representations and properties of the generalised Wendland functions
In this paper we investigate the generalisation of Wendlandâs compactly
supported radial basis functions to the case where the smoothness
parameter is not assumed to be a positive integer or half-integer and the
parameter â, which is chosen to ensure positive definiteness, need not take
on the minimal value. We derive sufficient and necessary conditions for
the generalised Wendland functions to be positive definite and deduce
the native spaces that they generate. We also provide closed form representations
for the generalised Wendland functions in the case when the
smoothness parameter is an integer and where the parameter â is any
suitable value that ensures positive definiteness, as well as closed form
representations for the Fourier transform when the smoothness parameter
is a positive integer or half-integer
The implementation of the situational control concept of information security in automated training systems
The main approaches to ensuring security of information in the automated training systems are considered, need of application of situational management of security of information for the automated training systems is proved, the mathematical model and a problem definition of situational control is offered, the technique of situational control of security of information is developed.The purpose of the study. The aim of the study is to base the application of situational control of information security by subsystem of the control and protection of information in automated learning systems and to develop implementation methods of the situational control concept.Materials and methods. It is assumed that the automated learning system is a fragment of a larger information system that contains several information paths, each of them treats different information in the protection degree from information, containing constituting state secrets, to open access information.It is considered that the technical methods, measures and means of information protection in automated learning systems implement less than half (30%) functions of subsystems of control and protection information. The main part of the functions of this subsystem are organizational measures to protect information. It is obvious that the task of ensuring the security of information in automated learning systems associated with the adoption of decisions on rational selection and proper combination of technical methods and institutional arrangements. Conditions of practical application of automated learning systems change over time and transform the situation of such a decision, and this leads to the use of situational control methods.When situational control is implementing, task of the protection of information in automated learning system is solved by the subsystem control and protection of information by distributing the processes ensuring the security of information and resources of subsystem elements of the automated learning system to meet changing conditions of operation.When the event, associated with the emergence of threats to the information security related to one of the elements of a situation to a variety of destabilizing factors is checked in the system, the formation of the base of alternative control actions sets of situational management is formed, then the sets of the admissible solutions of the situational control options are formed.The best solution provides an extremum of the objective function of situational control of information security.Results. The main approaches to ensuring the information security in automated learning systems are considered, the necessity of the use of situational control of security in automated learning systems is based, mathematical model and problem statement of situational control are offered, the method of situational control of information protection is developed.Conclusion. Developed method of situational control of information security in automated learning systems, involves the participation of the operator in the development and decision-making (dialogue procedures statement of objectives situational control, the formation of the base of alternative sets of control actions, etc.).Another important feature of this technique is the necessity of using previously developed models (models of decision-making situation, a model of coordination and planning of operation of a subsystem of the control and protection of information, models of information processing about the status of the subsystem analysis models and evaluation of results) and the database obtained on the basis of operating experience of information protection systems in the automated learning systems.The implementation of the concept of situational control of information security ensures the timely adaptation of the algorithms and parameters of the information security system to changes in the external environment and the nature of tasks within the education systems and on this basis allows to improve the characteristics of the information protection system in the automated learning systems
Asset correlations: shifting tides
The Basel II accord outlines a general framework for determining regulatory capital requirements for credit risk portfolios. Different obligors usually operate independent socio-economic environments and these structural correlations are the main reason why regulatory capital is needed. Therefore, it is not surprising that an important component of the regulatory regime for capital is the asset correlation between obligors. Basel II has set a range for corporate asset correlations from 8 to 24 %, the exact value depending on several individual firm characteristics.We use monthly asset value data to calculate asset correlations and compare these with Basel II as well as results from other papers. Our results are in line with literature but a clear difference is found between the majority of these results and the results from Basel II and some major software providers. We discuss these differences and offer some explanations as an attempt to reconcile the differences. The impact of horizon is considered as wellstatus: publishe
Wendland functions with increasing smoothness converge to a Gaussian
The Wendland functions are a class of compactly supported radial basis functions with a user-specified smoothness parameter. We prove that with an appropriate rescaling of the variables, both the original and the "missing" Wendland functions converge uniformly to a Gaussian as the smoothness parameter approaches infinity. We also explore the convergence numerically with Wendland functions of different smoothness. © 2013 Springer Science+Business Media New York