Design of Quantitative Investment Strategy Based on Domestic Chip Industry
نویسندگان
چکیده
Select 59 concept stocks in the chip industry for quantitative analysis, use principal component analysis method and k-means clustering to process our financial indicators; historical simulation method, variance-covariance Monte Carlo calculate VaR value of each stock effective risk management. Based on Markowitz theory, frontier five is constructed, combined with utility investors different aversion levels, best portfolio selected obtain field, using Sharp ratio CV performance evaluation, corresponding investment suggestions are given.
منابع مشابه
design of an analog fuzzy logic controller chip
fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...
15 صفحه اولFDI and Domestic Investment: An Industry-Level View
Previous empirical work on the link between domestic and foreign investment provides mixed results which partly depend on the level of aggregation of the data. We argue that the aggregated home country implications of foreign direct investment (FDI) cannot be gauged using firm-level data. Aggregated data, in turn, miss channels through which domestic and foreign activities interact. Instead, in...
متن کاملcontrarian investment strategy based on reward-risk stock selection criteria
stock selection criteria play a key role in contrarian portfolio construction. the usual approach is applying cumulative return as stock selection criteria however applying this criterion leads to ranking stocks without considering investment risk. in this study, we analyze contrarian strategies that are based on reward–risk stock selection criteria in contrast to ordinary contrarian strategies...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
Cost-aware Topology Customization of Mesh-based Networks-on-Chip
Nowadays, the growing demand for supporting multiple applications causes to use multiple IPs onto the chip. In fact, finding truly scalable communication architecture will be a critical concern. To this end, the Networks-on-Chip (NoC) paradigm has emerged as a promising solution to on-chip communication challenges within the silicon-based electronics. Many of today’s NoC architectures are based...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Frontiers in business, economics and management
سال: 2022
ISSN: ['2766-824X']
DOI: https://doi.org/10.54097/fbem.v5i3.2040