نتایج جستجو برای: financial scientists have always been eager to distinguish betweenwhether the price series could be random walk (unit root) or meanreverting processes.by a random walk we mean that accruing shocksto the system have permanent impacts and prices do not revert to theirprevious trend path
تعداد نتایج: 24616343 فیلتر نتایج به سال:
financial scientists have always been eager to distinguish between whether the price series could be random walk (unit root) or mean reverting processes.by a random walk we mean that accruing shocks to the system have permanent impacts and prices do not revert to their previous trend path, in addition, regarding to random walk processes the price series volatility could increase with out any li...
the main objective in sampling is to select a sample from a population in order to estimate some unknown population parameter, usually a total or a mean of some interesting variable. a simple way to take a sample of size n is to let all the possible samples have the same probability of being selected. this is called simple random sampling and then all units have the same probability of being ch...
به طور کلی در فرآیندهای مارکوف ارگودیک دو بعدی یافتن فرم بسته توزیع ایستا، تنها برای حالات خیلی خاص امکان پذیر است. با توجه به این مشکل و نیز با توجه به اهمیت توزیع ایستا، بررسی و مطالعه رفتار مجانبی توزیع ایستای این فرآیندها مورد توجه قرار گرفته است. زنجیر قدم زدن تصادفی دو بعدی که در برخی متون به آن، فرآیند qbd دو طرفه نیز می گویند، یکی از این فرآیندها است. یک فرآیند qbd زمان گسسته یک زنجیر م...
abstract: in the paper of black and scholes (1973) a closed form solution for the price of a european option is derived . as extension to the black and scholes model with constant volatility, option pricing model with time varying volatility have been suggested within the frame work of generalized autoregressive conditional heteroskedasticity (garch) . these processes can explain a number of em...
if the precise implementation of the principle of proportion and:balance between the violation and the penalty as well as the other dimensions could be considered as a stick yard for the imptementation of justice any lack of preciseness in carrying out such principle would not indeed be much too far from injustice . naturally ,if it would be imagined that the objective of balance between...
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
insurers have in the past few decades faced longevity risks - the risk that annuitants survive more than expected - and therefore need a new approach to manage this new risk. in this dissertation we survey methods that hedge longevity risks. these methods use securitization to manage risk, so using modern financial and insurance pricing models, especially wang transform and actuarial concepts, ...
abstract: about 60% of total premium of insurance industry is pertained?to life policies in the world; while the life insurance total premium in iran is less than 6% of total premium in insurance industry in 2008 (sigma, no 3/2009). among the reasons that discourage the life insurance industry is the problem of adverse selection. adverse selection theory describes a situation where the inf...
uncertainty in the financial market will be driven by underlying brownian motions, while the assets are assumed to be general stochastic processes adapted to the filtration of the brownian motions. the goal of this study is to calculate the accumulated wealth in order to optimize the expected terminal value using a suitable utility function. this thesis introduced the lim-wong’s benchmark fun...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید