نتایج جستجو برای: specifically we use geometric brownian motion gbm and jump

تعداد نتایج: 17157407  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

2001
Josep Perelló Jaume Masoliver

Option pricing is mainly based on ideal market conditions which are well represented by the Geometric Brownian Motion (GBM) as market model. We study the effect of non-ideal market conditions on the price of the option. We focus our attention on two crucial aspects appearing in real markets: The influence of heavy tails and the effect of colored noise. We will see that both effects have opposit...

2007
Karl Sigman

Fundamental to many applications in financial engineering is the normal (Gaussian) distribution. It is the building block for simulating such basic stochastic processes as Brownian motion and geometric Brownian motion. In this section, we will go over algorithms for generating univariate normal rvs and learn how to use such algorithms for constructing sample paths of Brownian motion and geometr...

2008
Karl Sigman

Fundamental to many applications in financial engineering is the normal (Gaussian) distribution. It is the building block for simulating such basic stochastic processes as Brownian motion and geometric Brownian motion. In this section, we will go over algorithms for generating univariate normal rvs and learn how to use such algorithms for constructing sample paths of Brownian motion and geometr...

Journal: :alexandria engineering journal 2021

The geometric Brownian motion (GBM) model is a mathematical that has been used to asset price paths. By incorporating Hurst parameter GBM characterize long-memory phenomenon, the fractional (GFBM) was introduced, which allows its disjoint increments be correlated. This paper investigates accuracy of and GFBM in modelling Malaysia’s crude palm oil simulation, see display persistent or anti-persi...

Journal: :Annals OR 2012
Christina Erlwein Gautam Mitra Diana Roman

The Geometric Brownian motion (GBM) is a standard method for modeling financial time series. An important criticism of this method is that the parameters of the GBM are assumed to be constants; due to this fact, GBM has been considered unable to properly capture important features, like extreme behaviour or volatility clustering. We propose an approach by which, the parameters of the GBM follow...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1391

reinsurance is widely recognized as an important instrument in the capital management of an insurance company as well as its risk management tool. this thesis is intended to determine premium rates for different types of reinsurance policies. also, given the fact that the reinsurance coverage of every company depends upon its reserves, so different types of reserves and the method of their calc...

Journal: :Journal of Computational and Applied Mathematics 2022

We study the numerical evaluation of several functions appearing in small time expansion distribution time-integral geometric Brownian motion as well its joint with terminal value underlying motion. A precise these distributions is relevant for simulation stochastic volatility models log-normally distributed volatility, and Asian option pricing Black-Scholes model. derive series expansions dist...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید