• Title/Summary/Keyword: Portfolio Optimization

Search Result 69, Processing Time 0.029 seconds

A Study on the Analyzing CRM Strategy of Local Distribution Firm Using the System Dynamics (중소기업 CRM 전략에 관한 시스템 다이내믹스 접근)

  • Park, Ki-Nam;Kim, Byung-Chan
    • The Journal of Information Systems
    • /
    • v.20 no.1
    • /
    • pp.127-146
    • /
    • 2011
  • Coping with the rapid change of competition in retail industry, retail firms have dreamed various differentiation strategy to obtain their added value and their life. And they have considered CRM strategy that can differentiate with other retail firms in order to develop some new differentiation factors. So we searched new factors that is best for "T store" and found CRM strategy such as the optimization for product portfolio considering private-brand products and the optimization for product display for customer demands. This study is meaningful in that it has suggested a new CRM strategy model, which can manage new various differentiation factors of a retail firms considering its core competence. We verified and altered retail firm's business model using system dynamics. By simulation results, CRM strategy need long time to obtain visible and satisfactory performance of "T store".

Optimization of Information Security Investment Portfolios based on Data Breach Statistics: A Genetic Algorithm Approach (침해사고 통계 기반 정보보호 투자 포트폴리오 최적화: 유전자 알고리즘 접근법)

  • Jung-Hyun Lim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.201-217
    • /
    • 2020
  • Information security is an essential element not only to ensure the operation of the company and trust with customers but also to mitigate uncertain damage by preventing information data breach. Therefore, It is important to select appropriate information security countermeasures and determine the appropriate level of investment. This study presents a decision support model for the appropriate investment amount for each countermeasure as well as an optimal portfolio of information countermeasures within a limited budget. We analyze statistics on the types of information security breach by industry and derive an optimal portfolio of information security countermeasures by using genetic algorithms. The results of this study suggest guidelines for investing in information security countermeasures in various industries and help to support objective information security investment decisions.

Design for Landfill Gas Appliation by Low Calorific Gas Turbine and Green House Optimization Technology (Low Calorific Gasturbine 매립지 적용 및 유리온실 운용기술 설계)

  • Hur, Kwang-Beom;Park, Jung-Keuk;Lee, Jung-Bin;Rhim, Sang-Gyu
    • New & Renewable Energy
    • /
    • v.6 no.2
    • /
    • pp.27-32
    • /
    • 2010
  • Low Calorific Gas Turbine (LCGT) has been developed as a next generation power system using landfill gas (LFG) and biogas made from various organic wastes, food Waste, waste water and Livestock biogas. Low calorific fuel purification by pretreatment system and carbon dioxide fixation by green house system are very important design target for the optimum applications of LCGT. Main troubles of Low Calorific Gas Turbine system was derived from the impurities such as hydro sulfide, siloxane, water contained in biogas. Even if the quality of the bio fuel is not better than natural gas, LCGT may take low quality gas fuel and environmental friendly power system. The mechanical characterisitics of LCGT system is a high energy efficiency (>70%), wide range of output power (30 kW - 30 MW class) and very clean emission from power system (low NOx). A green house has been designed for four different carbon dioxide concentration from ambient air to 2000 ppm by utilizing the exhaust gas and hot water from LCGT system. LCGT is expected to contribute achieving the target of Renewable Portfolio Standards (RPS).

A Study on the Portfolio Performance Evaluation using Actor-Critic Reinforcement Learning Algorithms (액터-크리틱 모형기반 포트폴리오 연구)

  • Lee, Woo Sik
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.25 no.3
    • /
    • pp.467-476
    • /
    • 2022
  • The Bank of Korea raised the benchmark interest rate by a quarter percentage point to 1.75 percent per year, and analysts predict that South Korea's policy rate will reach 2.00 percent by the end of calendar year 2022. Furthermore, because market volatility has been significantly increased by a variety of factors, including rising rates, inflation, and market volatility, many investors have struggled to meet their financial objectives or deliver returns. Banks and financial institutions are attempting to provide Robo-Advisors to manage client portfolios without human intervention in this situation. In this regard, determining the best hyper-parameter combination is becoming increasingly important. This study compares some activation functions of the Deep Deterministic Policy Gradient(DDPG) and Twin-delayed Deep Deterministic Policy Gradient (TD3) Algorithms to choose a sequence of actions that maximizes long-term reward. The DDPG and TD3 outperformed its benchmark index, according to the results. One reason for this is that we need to understand the action probabilities in order to choose an action and receive a reward, which we then compare to the state value to determine an advantage. As interest in machine learning has grown and research into deep reinforcement learning has become more active, finding an optimal hyper-parameter combination for DDPG and TD3 has become increasingly important.

THREE-STAGED RISK EVALUATION MODEL FOR BIDDING ON INTERNATIONAL CONSTRUCTION PROJECTS

  • Wooyong Jung;Seung Heon Han
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.534-541
    • /
    • 2011
  • Risk evaluation approaches for bidding on international construction projects are typically partitioned into three stages: country selection, project classification, and bid-cost evaluation. However, previous studies are frequently under attack in that they have several crucial limitations: 1) a dearth of studies about country selection risk tailored for the overseas construction market at a corporate level; 2) no consideration of uncertainties for input variable per se; 3) less probabilistic approaches in estimating a range of cost variance; and 4) less inclusion of covariance impacts. This study thus suggests a three-staged risk evaluation model to resolve these inherent problems. In the first stage, a country portfolio model that maximizes the expected construction market growth rate and profit rate while decreasing market uncertainty is formulated using multi-objective genetic analysis. Following this, probabilistic approaches for screening bad projects are suggested through applying various data mining methods such as discriminant logistic regression, neural network, C5.0, and support vector machine. For the last stage, the cost overrun prediction model is simulated for determining a reasonable bid cost, while considering non-parametric distribution, effects of systematic risks, and the firm's specific capability accrued in a given country. Through the three consecutive models, this study verifies that international construction risk can be allocated, reduced, and projected to some degree, thereby contributing to sustaining stable profits and revenues in both the short-term and the long-term perspective.

  • PDF

A Study on Global Blockchain Economy Ecosystem Classification and Intelligent Stock Portfolio Performance Analysis (글로벌 블록체인 경제 생태계 분류와 지능형 주식 포트폴리오 성과 분석)

  • Kim, Honggon;Ryu, Jongha;Shin, Woosik;Kim, Hee-Woong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.3
    • /
    • pp.209-235
    • /
    • 2022
  • Starting from 2010, blockchain technology, along with the development of artificial intelligence, has been in the spotlight as the latest technology to lead the 4th industrial revolution. Furthermore, previous research regarding blockchain's technological applications has been ongoing ever since. However, few studies have been examined the standards for classifying the blockchain economic ecosystem from a capital market perspective. Our study is classified into a collection of interviews of software developers, entrepreneurs, market participants and experts who use blockchain technology to utilize the blockchain economic ecosystem from a capital market perspective for investing in stocks, and case study methodologies of blockchain economic ecosystem according to application fields of blockchain technology. Additionally, as a way that can be used in connection with equity investment in the capital market, the blockchain economic ecosystem classification methodology was established to form an investment universe consisting of global blue-chip stocks. It also helped construct an intelligent portfolio through quantitative and qualitative analysis that are based on quant and artificial intelligence strategies and evaluate its performances. Lastly, it presented a successful investment strategy according to the growth of blockchain economic ecosystem. This study not only classifies and analyzes blockchain standardization as a blockchain economic ecosystem from a capital market, rather than a technical, point of view, but also constructs a portfolio that targets global blue-chip stocks while also developing strategies to achieve superior performances. This study provides insights that are fused with global equity investment from the perspectives of investment theory and the economy. Therefore, it has practical implications that can contribute to the development of capital markets.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Optimal Transmission Expansion Planning Considering the Uncertainties of Power Market (전력시장 불확실성을 고려한 최적 송전시스템 확장계획)

  • Son, Min-Kyun;Kim, Jin-O
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.560-566
    • /
    • 2008
  • Today, as the power trades between generation companies and power customer are liberalized, the uncertainty level of operated power system is rapidly increased. Therefore, transmission operators as decision makers for transmission expansion are required to establish a deliberate investment plan for effective operations of transmission facilities considering forecasted conditions of power system. This paper proposes the methodology for the optimal solution of transmission expansion in deregulated power system. The paper obtains the expected value of transmission congestion cost for various scenarios by using occurrence probability. In addition, the paper assumes that increasing rates of loads are the probability distribution and indicates the location of expanded transmission line, the time for transmission expansion with the minimum cost for the future by performing the Montecarlo simulation. To minimize the investment risk as the variance of the congestion cost, Mean-Variance Markowitz portfolio theory is applied to the optimization model by the penalty factor of the variance. By the case study, the optimal solution for transmission expansion plan considering the feature of market participants is obtained.

A DEEP LEARNING ALGORITHM FOR OPTIMAL INVESTMENT STRATEGIES UNDER MERTON'S FRAMEWORK

  • Gim, Daeyung;Park, Hyungbin
    • Journal of the Korean Mathematical Society
    • /
    • v.59 no.2
    • /
    • pp.311-335
    • /
    • 2022
  • This paper treats Merton's classical portfolio optimization problem for a market participant who invests in safe assets and risky assets to maximize the expected utility. When the state process is a d-dimensional Markov diffusion, this problem is transformed into a problem of solving a Hamilton-Jacobi-Bellman (HJB) equation. The main purpose of this paper is to solve this HJB equation by a deep learning algorithm: the deep Galerkin method, first suggested by J. Sirignano and K. Spiliopoulos. We then apply the algorithm to get the solution to the HJB equation and compare with the result from the finite difference method.

Hierarchical Risk Parity Portfolio Optimization via Nonlinear Measures Considering Finite Size Effects (유한 크기 효과를 고려한 비선형 의존성 지표를 활용한 계층적 리스크 패리티 모형 기반 포트폴리오 최적화 )

  • Insu Choi;Woo Chang Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.8-10
    • /
    • 2023
  • 본 연구는 계층적 리스크 패리티 (Hierarchical Risk Parity, HRP) 포트폴리오 방법론과 정규화된 상호 정보 거리의 결합을 연구하였다. 이때, 한정된 이동창에서 발생할 수 있는 유한 크기 효과(finite size effects) 문제를 극복하기 위해 무작위로 섞인 NID 값에 대한 평균치를 제공함에 따라 NID 를 활용한 새로운 포트폴리오 최적화 방법을 제안한다. 본 연구의 결과는 NID 를 통합한 HRP 포트폴리오가 기존 방법론에 비해 통계적 장점과 함께 더욱 효율적이며 안정적임을 보여준다.