SlideShare a Scribd company logo
1 of 8
Download to read offline
IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 05, Issue 02 (February. 2015), ||V2|| PP 01-08
International organization of Scientific Research 1 | P a g e
Discrete-Time Constrained Portfolio Optimization: Strong
Duality Analysis
Lan Yi*
1.Management School, Jinan University, Guangzhou 510632, China
Abstract: - We study in this paper the strong duality for discrete-time convex constrained portfolio selection
problems when adopting a risk neutral computational approach. In contrast to the continuous-time models, there
is no known result of the existence conditions in discrete-time models to ensure the strong duality. Investigating
the relationship among the primal problem, the Lagrangian dual and the Pliska’s dual, we prove in this paper
that the strong duality can be always guaranteed for constrained convex portfolio optimization problems in
discrete-time models when the constraints are expressed by a set of convex inequalities.
Keywords: Portfolio optimization; incomplete market; utility; investment constraints; duality; martingale
approach.
I. INTRODUCTION
We consider in this paper the issue of strong duality for convex inequality constrained portfolio
selection problems in a discrete financial model. The continuous version of this problem has been investigated
extensively since 1992 and some prominent results have been achieved. Xu and Shreve [3,4] show that convex
duality approach succeeds in solving problems with no-short-selling constraint. Cvitanic and Karatzas [2]
develop convex duality theory for general convex constrained portfolio optimization problems. As Cvitanic and
Karatzas [2] confine admissible policies to be bounded adapted processes that make the wealth process
nonnegative, the utility function used in their model, U(), is defined on (0,+) and satisfies (i)cU'(c) is
nondecreasing on (0,), and (ii) there exist some (0,1) and (1,) such that U'(x)U'(x),  x(0,).
Cvitanic and Karatzas [2] introduce then a family of unconstrained problems and build up the corresponding
dual problem. Finally, they prove the strong duality theorem that the optimal solution of the dual problem also
solves the primal problem.
For discrete financial models studied in this paper, we define admissible policies to be general bounded
adapted processes and thus define the objective utility on the entire R. Similar to Cvitanic and Karatzas [2],
Pliska [1] introduces a family of unconstrained problems for a constrained discrete financial model and gives the
strong duality condition under which the optimal solution of the dual problem also solves the primal problem.
However, to our knowledge, there is no known result in the literature on the existence condition such that the
strong duality condition can be ensured to hold in a discrete-time model as the continuous-time model does.
In this paper, we would like to close the gap between continuous-time models and discrete-time models,
and prove that the strong duality condition always holds in discrete-time models when utility function satisfies
cU'(c+)< forcR and <<. We build up in Section 2 a discrete-time financial model, and formulate
the constrained portfolio selection problem mathematically. We discuss in Section 3 the Pliska’s dual problem
and present the strong duality theorem. We derive in Section 4 the main result of this paper: Theory of
guaranteed strong duality. We demonstrate our results via an illustrative example in Section 5 before we
conclude our paper in Section 6.
II. MATHEMATICAL FORMULATION
We consider a financial market, consisting of n risky assets and one risk free asset, in which investors
make their investment decisions at multiple time instants, t=0,1,,T1. Let( , ,{ } , )t t P F F be the filtrated
probability space, where 1: { , , }K    is the sample space with K finite samples. Denote the stochastic
process of the risky securities’ returns as 0, , 1{ }t t T μ μ  , where ( (1), , ( ))'t t t n μ  is a random
vector, and the bond return process as 0, , 1{ }t t Tr  r  , where tr is a deterministic scalar. Denote
0, , 1{ }t t TR  R  as the extra return process with ( (1), ( ))'t t tR R R n  and ( ) ( )t t tR i i r  .
Furthermore, we introduce two assumptions on the financial market, which guarantee the completeness of
the market.
Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis
International organization of Scientific Research 2 | P a g e
Assumption 2.1.(i) At any time t, there exist : ( 1)t
tm n  elements
1
, , tm
t tA A , such that
1 tm
t tA A    , ,i j
t tA A i j     , and
1
( , , )tm
t t tA A F ; (ii) ti m  ,
( 1)( 1)
1
i n j i
t tA A  
  for j=1,,n+1; (iii) The assets’ return matrix
( 1)( 1) 1 ( 1)
( 1) ( 1)
( ) ( )t
t t
i n i n
t t t n n
r r
A A   
  
 
 
 μ μ


is full rank for any
i
t tA F .
Assumption 2.2.The financial market is arbitrage-free.
An investor with initial wealth v would like to invest her wealth in the market. Denote her
self-financing trading strategies as 0,1, , 1{ }t t T     , where ( (1), , ( ))'t t t n    with ( )t i being
the dollar amount invested in ith risky security at time t. Let tV be the portfolio value at time t. The dollar
amount invested in the bond at time t is then
1
( )
n
t t
i
V i

  . Therefore, the wealth process satisfies
1 ' .t t t t tV V r R    (1)
We assume in this paper that, when there is no constraint on trading strategies, the market governed by the
stochastic difference equation described above,
1
0
' ;
, 0,1, , 1;
,
t t t t t
n
t
V V r R
t T
V v


  

  
 
 
satisfies both Assumptions 2.1 and 2.2, thus being a complete market.
The subject we study in this paper is a constrained portfolio selection problem. Under the condition that
t is constrained in a convex set tK , the investor pursues her investment by maximizing her expected utility of
the terminal wealth, ( ):U     , where U(,) is assumed to be differentiable, strictly increasing and
concave for each . For example, { ; ( ) 0, 1, , }n
t t t i i n     K   when short selling is
prohibited. In summary, the mathematical model of the investor’s constrained portfolio selection problem is
posted as follows,
1
0
[ ( )]
. . ( )' ;
( )
, 0,1, , 1;
.
T
t t t t t
n
t t
max E U V
s t V V r R
P
t T
V v





  

   
 
K  
If tK is a subset of
n
 , problem (P) is a portfolio selection problem in an incomplete market, as some
contingent claims can not be hedged by any admissible portfolios due to the constraints.
III. RISK NEUTRAL COMPUTATIONAL APPROACH
Following Pliska [1], we define the support function of tK as
( ) ( )' .t tt t tsup    K
The effective domain of ( )t  is then given by
{ ; ( ) }.n
t t t     K 
Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis
International organization of Scientific Research 3 | P a g e
We introduce the predictable stochastic process : { ; 0,1, , 1, }t t tt T     K . Let D be the set of
all such processes of . For each D, we construct an auxiliary market M with the following modified
returns,
tr

( )
,t
t
t
r
V 
 

( )t i
 
( )
( ) ( ), 1, , ,t
t t
t
i i i n
V
 
    
1tV
  ( )' ,t t t tV r R  

where ( (1), , ( ))'t t tR R R n  
  with ( ) ( )t t tR i i r  
  = ( ) ( )t tR i i .
When 0tV
 , we let t tr r
 and ( ) ( ) ( )t t ti i i
    . Notice that t
tV 

is the proportional trading
strategy adopted in Pliska [1].
The first step in the risk neutral computational approach (see [1]) is to embed the primal constrained
portfolio selection problem (P) into a family of unconstrained portfolio selection problems in M ,
1
0
[ ( )]
. . ( )' ;
( )
; 0,1, , 1;
.
T
t t t t t
n
t
max E U V
s t V V r R
P
t T
V v


   
 




 

  
 
 
Note that Assumption 2.1 still holds in the auxiliary market M , as the return matrix in the auxiliary market
M is obtained by performing some elementary transformations on the return matrix of the original market,
due to the predictability of process .
Thus, problem ( )P
for given D can be still efficiently solved by using the martingale-like
approach in [1].
It is easy to see that, for t  , 0,1, , 1t t T K  ,
TV 
 1 1 1 1 1 1 1( )' [ ( ) ( )' ]T T T T T T TV r R
            
 1 1 1 1( )'T T T TV r R
   
 2 2 2 2 1 1 1[ ( )' ] ( )'T T T T T T TV r R r R  
        


1 11
00 1
( )'
T TT
t t t i
tt i t
v r R r
 
  
  
 .TV
Due to the increasing property of the utility function, we can get the following weak duality.
Proposition 3.1. Weak dualityLet J(v) be the optimal value of primal problem (P) and ( )J v
be the optimal
value of problem ( )P
. Then
( ) ( ), .J v J v
  D
As for any D , ( )J v
offers an upper bound for J(v), the second step in the risk neutral
computational approach [1] is to find the tightest upper bound by solving the following dual problem,
*
( ) ( ),DD argmin J v
 
such that, hopefully, the optimal solution to the unconstrained problem in the market *

M will turn out to be
the optimal solution to the constrained problem in the primal constrained market and the corresponding optimal
Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis
International organization of Scientific Research 4 | P a g e
objective values will coincide, i.e.,
*
( )J v
= J(v). We call the dual problem (D) in this paper as the Pliska’s
dual of (P).
Proposition 3.2. Strong Duality (see [1])Suppose that for some ˆ D, the optimal trading strategy of
ˆ
( )P
, ˆ , satisfies
(a) ˆt t K ,
(b) ˆ ˆˆ( ) ' 0t t t     .
Then ˆ is optimal for the primal constrained portfolio selection problem (P), and
ˆ
( ) ( ) ( )J v J v J v 
 
for all D.
A crucial question is the existence guarantee of such a ˆ for achieving strong duality. Pliska states the
following in [1]: The obvious candidate for such a ˆ is
*
 , the solution of the dual problem (D). After
computing
*
 , you then check whether
*
 , the optimal trading strategy for
*
( )P
, satisfies conditions (a)
and (b) in Proposition 3.2. If both conditions are satisfied, then
*
 will be optimal for the primal constrained
portfolio selection problem (P). However, as emphasized in [1], there is no known result to guarantee such an
existence.
The main purpose of this paper is to present a guaranteed strong duality result when convex set tK is
specified by a set of convex inequalities.
IV. GUARANTEED STRONG DUALITY
Let us consider problem (P), where feasible convex set tK is specified by a set of convex inequalities,
{ ; ( ) },t t tG b  K (2)
where
1 2
: ( , , )'td
t t t tG G G G  with
2i
tG  being a second order continuous differentiable convex
function, i = 1, …, k, and tb is a td dimensional vector.
As we know, the primal problem (P) can be tackled either as a stochastic control problem, where the trading
strategy at time t, t , is a tF -measurable stochastic random vector, or as a static optimization problem, where
all the realizations of t are considered separately based on our discrete financial model. In the latter case, the
objective function in (P) can be reformulated as follows,
1 11
00 1
( ) ( ( ))' ( ) .
T TT
t t t i
tt i t
P U v r R r

   
 
   
 
 
 
  
Notice that ( ) ( )i
t t tA   if
i
tA  , due to the tree structure of the market. The decision vectors are
( )i
t tA for t=0,1,,T1 and 1, ,( 1)t
i n  . When we deal with the primal problem (P) as a static one,
we first formulate its Lagrangian dual problem.
Given { ; ( ) }t t tG b  K , the Lagrangian dual of problem (P) is given as follows,
( )LD
( 1)1
'
0
( ( )) [ ( ( ))]
t
nT
i i
t t t t t t
t i
min max A b G A   


 
1 11
00 1
( ) ( ( ))' ( ) ,i
T TT
t t t
tt i t
P U v r R r

   
 
   
 
  
 
  
where 0,1, , 1{ }t t T     is a nonnegative adapted process. As problem (P) is convex, there is no duality gap
between problems (P) and ( )LD from the strong duality theorem. Furthermore, a process pair
* *
( , ) 
satisfying the first order condition,
1 1 11
*
00 1 1
[1 '( ( )' ( ) ) ]i
t
T T TT
i
t t t t i t iA
tt i t i t
E U v r R A r R r
  
    
    * *
( ( ))' '( ( )) 0,i i
t t t t tA G A   (3)
Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis
International organization of Scientific Research 5 | P a g e
* *
( ( ))'[ ( ( ))] 0,i i
t t t t t tA b G A   (4)
for 1, ,( 1)t
i n  and t=0,1,,T1, where
1
( )'
'( ) ,
( )'
t
t t k
t
G
G
G

 
 
 
 
  
 

solves both the primal and the Lagrangian dual problems.
Theorem 4.1.Assume that the concave utility function further satisfies
cU'(c+)<, (5)
for all c and (,+). For the process pair
* *
( , )  specified in (3) and (4), respectively, let
*
( )i
t tA 
* *
( '( ( )))' ( )
,
( )
i i
t t t t t
i
t t
G A A
A
 


(6)
for 1, ,( 1)t
i n  and t=0,1,,T1, where
( ) :i
t tA 
1 1 11
? *
00 1 1
[1 '( ( ) ( ) ) ].i
t
T T TT
i
t t t t i iA
tt i t i t
E U v r R A r r
  
    
   
Then
*
t t K ,
*
t  tK ,
*
{ }t solves
*
( )P
and
* * *
( ) ( )' 0,t t t     (7)
for t=0,1,,T1.
Proof. The conclusion of
*
t t K is due to the strong duality between the primal problem (P) and the
Lagrangiandual ( )LD . The following is clear from (5),
* * *
( ( ))'( '( ( )))' ( )i i i
t t t t t t tA G A A  
1 1 11
* *
00 1 1
[1 '( ( )' )( )' ]i
t
T T TT
t t t i t t iA
tt i t i t
E U v r R r R r 
  
    
     .  (8)
As
* * * * *
( ) ( ) ( ( ))'( ) 0.5( )' ( )( )i i i i i
t t t t t t t t t t t t t tG G G HG b                 for some 
between t and
*
t , i=1,,k, where ( )i
tHG  is the Hessian matrix, we have
*
( )i
t t tG    * * *
( ) ( )i i i
t t t t t tb G G     * *
0.5( )' ( )( ).i
t t t t tHG      
Since
* *
( )'( ( )) 0t t t tb G   , we further have
* *
( )' '( )t t t tG    * * * *
( )' '( ) 0.5( )'t t t t tG    tH  * * *
( )' '( ) ,t t tG     (9)
where
tH 1
( , ',k
t tH H  
i
tH * *
( )' ( )( ) 0.i
t t t t tHG       
Therefore,
*
( ( ))i
t tA   *
( ( ))' ( )t t
i i
t t t tsup A A   K 
* *
( ( ))'( '( ( ))' ( ), ( ))
( )t t
i i i i
t t t t t t t t t
i
t t
A G A A A
sup
A

  



K
 ,
which implies
*
t t K .
The following is clear from (9),
* * *
( ) ( )'t t t t     * * *
{ ( )' } ( )'t t t t t tsup      K
Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis
International organization of Scientific Research 6 | P a g e

* * * ? * *
( )' '( ) ( ) ( '( ))'
( )
( )t t
it t t t t t t t
ti
t t t
G G
sup A
A

     
 
 
K

* * * * *
( )' '( ) ( )' '( )
( )t t
t t t t t t t t
i
t t
G G
sup
A

     



K
 0.
Furthermore, we can check that
*
 satisfies the following optimality condition of problem
*
( )P
,
( ) :i
t tA 
*
*
1
[1 ( )i
t
T
t t iA
i t
E R r

 
  
* *
1 11
* *
00 1
'( ( )'( ) )]
T TT
t t t t i
tt i t
U v r R r 
 
 
  
    0.
Actually, we can derive the following equation by (7),
*
TV
 * *
1 11
* *
00 1
( ) '( )
T TT
t t t t i
tt i t
v r R r 
 
 
  
   
1 11
*
00 1
( )' .
T TT
t t t i T
tt i t
v r R r V
 
  
  
Therefore, the following equation can be derived from (3) and (6),
( )i
t tA 
* *
1
*
1
[1 '( )( ) ]i
t
T
T t t iA
i t
E U V R r 


 
  
*
1
*
1
[1 '( )( ) ]i
t
T
T t t iA
i t
E U V R r


 
 
 * *
1 1
*
1 1
[1 '( ) ] [1 '( ) ]i i
t t
T T
T t i T t iA A
i t i t
E U V R r E U V r 

 
   
 

* *1 1
* * * *
t t
1 1
( ' )' ( ' )'
T T
i i
t t t t
i t i ti i
r r
G G
r r
 
   
 
   
 
 0.
Hence,
*
 solves
*
( )P
.
Remark 4.1 If the optimal
* *
( , )  for the Pliska’s dual problem can be derived, and matrix
*
'( )t tG  are
nonsingular, then the unique optimal Lagrangian multiplier
*
 for the Lagrangian dual problem can be found
as,
*
( )i
t tA  *
( '( ( )))'i
t t tG A . (10)
When some matrix
*
'( )t tG  are singular or even not square, the optimal Lagrangiancan not be uniquely
determined by the relationship (6).
5. Illustrative Examples
Example 1. We study now a single-period investment example with one risky asset and no short-selling
constraint to illustrate the relationship of the primal problem, the Lagrangian dual problem and the Pliska’s
dual problem. The primal problem ( )P is given as follows,
1
0 1
[ ( )]
( ) . . ;
0.
max E U V
P s t V vr R





 
 
While the corresponding Lagrangian dual is
0 ( ):min f max   [ ( )] ,E U vr R  
the associated Pliska’s dual is
0 ( ):min g max  
( )
[ ( ( ) )].E U v r R
v
 
     
We can depict the objective functions of the two dual problems in the same figure. Two situations may
occur according to different returns of risky security, R. Figure 1 represents the situation when the optimal
Lagrangian multiplier
*
 is bigger than zero. In such a situation,
*
 and the corresponding dual parameter
*
 may not be equal. However, both the optimal objective values are equal to the optimal objective value of
primal problem.
Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis
International organization of Scientific Research 7 | P a g e
Figure 1: Situation with optimal parameters bigger than 0
Figure 2 illustrates the situation when the optimal Lagrangian multiplier
*
 equals to zero. In such a situation,
both
*
 and the corresponding parameter
*
 are equal to zero, and the optimal objective values of the
lagrangian dual and the Pliska’s dual are still equal to the optimal objective value of the primal problem.
Figure 2: Situation with optimal parameters equal to 0
Example 2. Consider Example 5.11 in [1] which is a two-period problem with short-selling prohibited, the bond
return rate given as 1 1r r  and the price process for the single risky asset and the probability measure
specified as follows:

0 ( )  1( )  P()
1 8/5 9/8 1/4
2 8/5 6/8 1/4
3 4/5 6/4 1/4
4 4/5 3/4 1/4
Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis
International organization of Scientific Research 8 | P a g e
An investor with a log utility function, U(V)=ln(V), enters the financial market with initial wealth v=1. The
optimal dual parameter , trading strategies and wealth process have been derived in [1]. More specifically, the
corresponding optimal process
*
 is
* * *
0 1 1 2 1 3 4
1
0, ({ , }) , ({ , }) 0,
16
        
and the optimal trading strategies are
* * *
0 1 1 2 1 3 4
5 2
, ({ , }) 0, ({ , }) ,
3 3
        
yielding the corresponding optimal terminal wealth process as
1 1 2 1 3 4
2
({ , }) 2, ({ , }) ,
3
V V    
2 1 2 2 2 3 2 4
1
( ) 2, ( ) 2, ( ) 1, ( ) .
2
V V V V      
Solving the Lagrangian dual problem,
min max  2 0 0 1 1 2 1 1 2( ( )) ({ , }) ({ , })E ln V          1 3 4 1 3 4({ , }) ({ , }),     
gives rise the optimal Lagrangian parameter process,
*
 ,
* * *
0 1 1 2 1 3 4
1
0, ({ , }) , ({ , }) 0.
64
        
It can be verified that the optimal trading strategies derived from the Lagrangian dual and Pliska’s dual are
exactly the same, and, furthermore, (6) holds.
V. CONCLUSION
By identifying the relationship between the Lagrangian dual and Pliska’s dual for the constrained
portfolio selection problem, we have derived in this paper a guaranteed strong duality result for a class of
discrete-time constrained convex portfolio selection problems. More specifically, we ensure the existence of an
optimal  in the strong duality conditions of [1] to guarantee the success of the risk neutral computational
approach.
The authors declare that there is no conflict of interests.
REFERENCES
[1] S. R. Pliska, Introduction to Mathematical Finance: Discrete Time Models, Blackwell, Oxford, UK, 1997.
[2] J. Cvitanic and I. Karatzas, Convex duality in constrained portfolio optimization, The Annual of Applied
Probability, 2(1992), 767–618.
[3] G. L. Xu and S. E. Shreve, A duality method for optimal consumption and investment under short-selling
prohibition. i. general market coefficients, The Annals of Applied Probability, 2(1992), 87–112.
[4] G. L. Xu and S. E. Shreve, A duality method for optimal consumption and investment under short-selling
prohibition. ii. Constant market coefficients, The Annals of Applied Probability, 2(1992), 314–328.
[5] J. C. Cox and C. F. Huang, Optimal consumption and portfolio policies when asset prices follow a
diffusion process, Journal of Economic Theory, 49(1989), 33–83.
[6] R. T. Rockafellar, Convex Analysis, Princeton, NJ: Princetion University Press, (1970).
[7] J. Harrison and D. Kreps, Martingales and multiperiod securities markets, Journal of Economic Theory,
20(1979), 381–408.
[8] J. Harrison and S. Pliska, Martingales and stochastic integrals in the theory of continuous trading,
Stochastic Process, 11(1981), 215–260.
[9] I. Klein and L. C. G. Rogers, Duality in optimal investment and consumption problems with market
frictions, Mathematical Finance, 17(2007), 225–24.

More Related Content

What's hot

Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)tanafuyu
 
P, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardP, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardAnimesh Chaturvedi
 
Language Model (D3L1 Deep Learning for Speech and Language UPC 2017)
Language Model (D3L1 Deep Learning for Speech and Language UPC 2017)Language Model (D3L1 Deep Learning for Speech and Language UPC 2017)
Language Model (D3L1 Deep Learning for Speech and Language UPC 2017)Universitat Politècnica de Catalunya
 
Np completeness-Design and Analysis of Algorithms
Np completeness-Design and Analysis of Algorithms Np completeness-Design and Analysis of Algorithms
Np completeness-Design and Analysis of Algorithms adeel990
 
Np completeness
Np completenessNp completeness
Np completenessRajendran
 
Introduction to NP Completeness
Introduction to NP CompletenessIntroduction to NP Completeness
Introduction to NP CompletenessGene Moo Lee
 
Np Completeness
Np CompletenessNp Completeness
Np CompletenessRajan Shah
 
Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)Tatsuya Yokota
 
Analysis and Design of Algorithms notes
Analysis and Design of Algorithms  notesAnalysis and Design of Algorithms  notes
Analysis and Design of Algorithms notesProf. Dr. K. Adisesha
 

What's hot (20)

Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
 
P versus NP
P versus NPP versus NP
P versus NP
 
P, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardP, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-Hard
 
Fd25951958
Fd25951958Fd25951958
Fd25951958
 
Language Model (D3L1 Deep Learning for Speech and Language UPC 2017)
Language Model (D3L1 Deep Learning for Speech and Language UPC 2017)Language Model (D3L1 Deep Learning for Speech and Language UPC 2017)
Language Model (D3L1 Deep Learning for Speech and Language UPC 2017)
 
Np completeness-Design and Analysis of Algorithms
Np completeness-Design and Analysis of Algorithms Np completeness-Design and Analysis of Algorithms
Np completeness-Design and Analysis of Algorithms
 
Np completeness
Np completenessNp completeness
Np completeness
 
P vs NP
P vs NP P vs NP
P vs NP
 
27 NP Completness
27 NP Completness27 NP Completness
27 NP Completness
 
Introduction to NP Completeness
Introduction to NP CompletenessIntroduction to NP Completeness
Introduction to NP Completeness
 
Mm2521542158
Mm2521542158Mm2521542158
Mm2521542158
 
070
070070
070
 
Np Completeness
Np CompletenessNp Completeness
Np Completeness
 
Regularization
RegularizationRegularization
Regularization
 
Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)
 
Invariant-Free Clausal Temporal Resolution
Invariant-Free Clausal Temporal ResolutionInvariant-Free Clausal Temporal Resolution
Invariant-Free Clausal Temporal Resolution
 
NP completeness
NP completenessNP completeness
NP completeness
 
Np completeness
Np completenessNp completeness
Np completeness
 
Margrabe option
Margrabe optionMargrabe option
Margrabe option
 
Analysis and Design of Algorithms notes
Analysis and Design of Algorithms  notesAnalysis and Design of Algorithms  notes
Analysis and Design of Algorithms notes
 

Viewers also liked

Sos маркетинг: 10 шагов для защиты своего бизнес в кризис
Sos маркетинг: 10 шагов для защиты своего бизнес в кризисSos маркетинг: 10 шагов для защиты своего бизнес в кризис
Sos маркетинг: 10 шагов для защиты своего бизнес в кризисInternational Marketing Group Ukraine
 
live rugby France vs England
live rugby France vs Englandlive rugby France vs England
live rugby France vs Englandleagelhouners
 
Make Impression combining video and print
Make Impression combining video and printMake Impression combining video and print
Make Impression combining video and printMikko Niemelä
 
New Microsoft PowerPoint Presentation
New Microsoft PowerPoint PresentationNew Microsoft PowerPoint Presentation
New Microsoft PowerPoint Presentationzahid arshid
 
Bases filosoficasleg.yorg.sist.educ.mex.
Bases filosoficasleg.yorg.sist.educ.mex.Bases filosoficasleg.yorg.sist.educ.mex.
Bases filosoficasleg.yorg.sist.educ.mex.Gabriela Castillo
 
watching France vs England live
watching France vs England live watching France vs England live
watching France vs England live leagelhouners
 
Ideas Don’t Pay the Bills.
Ideas Don’t Pay the Bills.Ideas Don’t Pay the Bills.
Ideas Don’t Pay the Bills.Bill Gelwick
 

Viewers also liked (20)

Sos маркетинг: 10 шагов для защиты своего бизнес в кризис
Sos маркетинг: 10 шагов для защиты своего бизнес в кризисSos маркетинг: 10 шагов для защиты своего бизнес в кризис
Sos маркетинг: 10 шагов для защиты своего бизнес в кризис
 
live rugby France vs England
live rugby France vs Englandlive rugby France vs England
live rugby France vs England
 
C05222124
C05222124C05222124
C05222124
 
Make Impression combining video and print
Make Impression combining video and printMake Impression combining video and print
Make Impression combining video and print
 
H05224754
H05224754H05224754
H05224754
 
Bono metamorfico
Bono metamorficoBono metamorfico
Bono metamorfico
 
New Microsoft PowerPoint Presentation
New Microsoft PowerPoint PresentationNew Microsoft PowerPoint Presentation
New Microsoft PowerPoint Presentation
 
Bases filosoficasleg.yorg.sist.educ.mex.
Bases filosoficasleg.yorg.sist.educ.mex.Bases filosoficasleg.yorg.sist.educ.mex.
Bases filosoficasleg.yorg.sist.educ.mex.
 
watching France vs England live
watching France vs England live watching France vs England live
watching France vs England live
 
D05222528
D05222528D05222528
D05222528
 
I05225564
I05225564I05225564
I05225564
 
A05210109
A05210109A05210109
A05210109
 
E05222936
E05222936E05222936
E05222936
 
Welcome to earnwell copy
Welcome to earnwell   copyWelcome to earnwell   copy
Welcome to earnwell copy
 
Cara Kerja CPU
Cara Kerja CPUCara Kerja CPU
Cara Kerja CPU
 
Bono metamorfico jpm organ
Bono metamorfico jpm organBono metamorfico jpm organ
Bono metamorfico jpm organ
 
Bono reiki jp morgan
Bono reiki jp morganBono reiki jp morgan
Bono reiki jp morgan
 
Ideas Don’t Pay the Bills.
Ideas Don’t Pay the Bills.Ideas Don’t Pay the Bills.
Ideas Don’t Pay the Bills.
 
my_cv_WP
my_cv_WPmy_cv_WP
my_cv_WP
 
G05224246
G05224246G05224246
G05224246
 

Similar to A05220108

IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...
IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...
IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...IRJET Journal
 
COVARIANCE ESTIMATION AND RELATED PROBLEMS IN PORTFOLIO OPTIMI
COVARIANCE ESTIMATION AND RELATED PROBLEMS IN PORTFOLIO OPTIMICOVARIANCE ESTIMATION AND RELATED PROBLEMS IN PORTFOLIO OPTIMI
COVARIANCE ESTIMATION AND RELATED PROBLEMS IN PORTFOLIO OPTIMICruzIbarra161
 
Martingales Stopping Time Processes
Martingales Stopping Time ProcessesMartingales Stopping Time Processes
Martingales Stopping Time ProcessesIOSR Journals
 
A Stochastic Model by the Fourier Transform of Pde for the Glp - 1
A Stochastic Model by the Fourier Transform of Pde for the Glp - 1A Stochastic Model by the Fourier Transform of Pde for the Glp - 1
A Stochastic Model by the Fourier Transform of Pde for the Glp - 1IJERA Editor
 
equity, implied, and local volatilities
equity, implied, and local volatilitiesequity, implied, and local volatilities
equity, implied, and local volatilitiesIlya Gikhman
 
Last my paper equity, implied, and local volatilities
Last my paper equity, implied, and local volatilitiesLast my paper equity, implied, and local volatilities
Last my paper equity, implied, and local volatilitiesIlya Gikhman
 
The price density function, a tool for measuring investment risk,volatility a...
The price density function, a tool for measuring investment risk,volatility a...The price density function, a tool for measuring investment risk,volatility a...
The price density function, a tool for measuring investment risk,volatility a...Tinashe Mangoro
 
Expanding further the universe of exotic options closed pricing formulas in t...
Expanding further the universe of exotic options closed pricing formulas in t...Expanding further the universe of exotic options closed pricing formulas in t...
Expanding further the universe of exotic options closed pricing formulas in t...caplogic-ltd
 
Uncertain Volatility Models
Uncertain Volatility ModelsUncertain Volatility Models
Uncertain Volatility ModelsSwati Mital
 
Option local and volatility 2 25 2014
Option local and volatility 2 25 2014Option local and volatility 2 25 2014
Option local and volatility 2 25 2014Ilya Gikhman
 
Market risk and liquidity of the risky bonds
Market risk and liquidity of the risky bondsMarket risk and liquidity of the risky bonds
Market risk and liquidity of the risky bondsIlya Gikhman
 
Quantitative Methods for Counterparty Risk
Quantitative Methods for Counterparty RiskQuantitative Methods for Counterparty Risk
Quantitative Methods for Counterparty RiskVolatility
 
Slides FIS5.pdfOutline1 Fixed Income DerivativesThe .docx
Slides FIS5.pdfOutline1 Fixed Income DerivativesThe .docxSlides FIS5.pdfOutline1 Fixed Income DerivativesThe .docx
Slides FIS5.pdfOutline1 Fixed Income DerivativesThe .docxbudabrooks46239
 
A Stochastic Limit Approach To The SAT Problem
A Stochastic Limit Approach To The SAT ProblemA Stochastic Limit Approach To The SAT Problem
A Stochastic Limit Approach To The SAT ProblemValerie Felton
 
Black Scholes pricing consept
Black Scholes pricing conseptBlack Scholes pricing consept
Black Scholes pricing conseptIlya Gikhman
 
Black scholes pricing consept
Black scholes pricing conseptBlack scholes pricing consept
Black scholes pricing conseptIlya Gikhman
 
Normality_assumption_for_the_log_re.pdf
Normality_assumption_for_the_log_re.pdfNormality_assumption_for_the_log_re.pdf
Normality_assumption_for_the_log_re.pdfVasudha Singh
 
CVA In Presence Of Wrong Way Risk and Early Exercise - Chiara Annicchiarico, ...
CVA In Presence Of Wrong Way Risk and Early Exercise - Chiara Annicchiarico, ...CVA In Presence Of Wrong Way Risk and Early Exercise - Chiara Annicchiarico, ...
CVA In Presence Of Wrong Way Risk and Early Exercise - Chiara Annicchiarico, ...Michele Beretta
 

Similar to A05220108 (20)

IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...
IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...
IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...
 
COVARIANCE ESTIMATION AND RELATED PROBLEMS IN PORTFOLIO OPTIMI
COVARIANCE ESTIMATION AND RELATED PROBLEMS IN PORTFOLIO OPTIMICOVARIANCE ESTIMATION AND RELATED PROBLEMS IN PORTFOLIO OPTIMI
COVARIANCE ESTIMATION AND RELATED PROBLEMS IN PORTFOLIO OPTIMI
 
Martingales Stopping Time Processes
Martingales Stopping Time ProcessesMartingales Stopping Time Processes
Martingales Stopping Time Processes
 
A Stochastic Model by the Fourier Transform of Pde for the Glp - 1
A Stochastic Model by the Fourier Transform of Pde for the Glp - 1A Stochastic Model by the Fourier Transform of Pde for the Glp - 1
A Stochastic Model by the Fourier Transform of Pde for the Glp - 1
 
equity, implied, and local volatilities
equity, implied, and local volatilitiesequity, implied, and local volatilities
equity, implied, and local volatilities
 
Last my paper equity, implied, and local volatilities
Last my paper equity, implied, and local volatilitiesLast my paper equity, implied, and local volatilities
Last my paper equity, implied, and local volatilities
 
Calisto 2016a 251116
Calisto 2016a 251116Calisto 2016a 251116
Calisto 2016a 251116
 
The price density function, a tool for measuring investment risk,volatility a...
The price density function, a tool for measuring investment risk,volatility a...The price density function, a tool for measuring investment risk,volatility a...
The price density function, a tool for measuring investment risk,volatility a...
 
Expanding further the universe of exotic options closed pricing formulas in t...
Expanding further the universe of exotic options closed pricing formulas in t...Expanding further the universe of exotic options closed pricing formulas in t...
Expanding further the universe of exotic options closed pricing formulas in t...
 
Uncertain Volatility Models
Uncertain Volatility ModelsUncertain Volatility Models
Uncertain Volatility Models
 
Option local and volatility 2 25 2014
Option local and volatility 2 25 2014Option local and volatility 2 25 2014
Option local and volatility 2 25 2014
 
Market risk and liquidity of the risky bonds
Market risk and liquidity of the risky bondsMarket risk and liquidity of the risky bonds
Market risk and liquidity of the risky bonds
 
Quantitative Methods for Counterparty Risk
Quantitative Methods for Counterparty RiskQuantitative Methods for Counterparty Risk
Quantitative Methods for Counterparty Risk
 
Slides FIS5.pdfOutline1 Fixed Income DerivativesThe .docx
Slides FIS5.pdfOutline1 Fixed Income DerivativesThe .docxSlides FIS5.pdfOutline1 Fixed Income DerivativesThe .docx
Slides FIS5.pdfOutline1 Fixed Income DerivativesThe .docx
 
Cambridge
CambridgeCambridge
Cambridge
 
A Stochastic Limit Approach To The SAT Problem
A Stochastic Limit Approach To The SAT ProblemA Stochastic Limit Approach To The SAT Problem
A Stochastic Limit Approach To The SAT Problem
 
Black Scholes pricing consept
Black Scholes pricing conseptBlack Scholes pricing consept
Black Scholes pricing consept
 
Black scholes pricing consept
Black scholes pricing conseptBlack scholes pricing consept
Black scholes pricing consept
 
Normality_assumption_for_the_log_re.pdf
Normality_assumption_for_the_log_re.pdfNormality_assumption_for_the_log_re.pdf
Normality_assumption_for_the_log_re.pdf
 
CVA In Presence Of Wrong Way Risk and Early Exercise - Chiara Annicchiarico, ...
CVA In Presence Of Wrong Way Risk and Early Exercise - Chiara Annicchiarico, ...CVA In Presence Of Wrong Way Risk and Early Exercise - Chiara Annicchiarico, ...
CVA In Presence Of Wrong Way Risk and Early Exercise - Chiara Annicchiarico, ...
 

More from IOSR-JEN

More from IOSR-JEN (20)

C05921721
C05921721C05921721
C05921721
 
B05921016
B05921016B05921016
B05921016
 
A05920109
A05920109A05920109
A05920109
 
J05915457
J05915457J05915457
J05915457
 
I05914153
I05914153I05914153
I05914153
 
H05913540
H05913540H05913540
H05913540
 
G05913234
G05913234G05913234
G05913234
 
F05912731
F05912731F05912731
F05912731
 
E05912226
E05912226E05912226
E05912226
 
D05911621
D05911621D05911621
D05911621
 
C05911315
C05911315C05911315
C05911315
 
B05910712
B05910712B05910712
B05910712
 
A05910106
A05910106A05910106
A05910106
 
B05840510
B05840510B05840510
B05840510
 
I05844759
I05844759I05844759
I05844759
 
H05844346
H05844346H05844346
H05844346
 
G05843942
G05843942G05843942
G05843942
 
F05843238
F05843238F05843238
F05843238
 
E05842831
E05842831E05842831
E05842831
 
D05842227
D05842227D05842227
D05842227
 

Recently uploaded

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

A05220108

  • 1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 02 (February. 2015), ||V2|| PP 01-08 International organization of Scientific Research 1 | P a g e Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis Lan Yi* 1.Management School, Jinan University, Guangzhou 510632, China Abstract: - We study in this paper the strong duality for discrete-time convex constrained portfolio selection problems when adopting a risk neutral computational approach. In contrast to the continuous-time models, there is no known result of the existence conditions in discrete-time models to ensure the strong duality. Investigating the relationship among the primal problem, the Lagrangian dual and the Pliska’s dual, we prove in this paper that the strong duality can be always guaranteed for constrained convex portfolio optimization problems in discrete-time models when the constraints are expressed by a set of convex inequalities. Keywords: Portfolio optimization; incomplete market; utility; investment constraints; duality; martingale approach. I. INTRODUCTION We consider in this paper the issue of strong duality for convex inequality constrained portfolio selection problems in a discrete financial model. The continuous version of this problem has been investigated extensively since 1992 and some prominent results have been achieved. Xu and Shreve [3,4] show that convex duality approach succeeds in solving problems with no-short-selling constraint. Cvitanic and Karatzas [2] develop convex duality theory for general convex constrained portfolio optimization problems. As Cvitanic and Karatzas [2] confine admissible policies to be bounded adapted processes that make the wealth process nonnegative, the utility function used in their model, U(), is defined on (0,+) and satisfies (i)cU'(c) is nondecreasing on (0,), and (ii) there exist some (0,1) and (1,) such that U'(x)U'(x),  x(0,). Cvitanic and Karatzas [2] introduce then a family of unconstrained problems and build up the corresponding dual problem. Finally, they prove the strong duality theorem that the optimal solution of the dual problem also solves the primal problem. For discrete financial models studied in this paper, we define admissible policies to be general bounded adapted processes and thus define the objective utility on the entire R. Similar to Cvitanic and Karatzas [2], Pliska [1] introduces a family of unconstrained problems for a constrained discrete financial model and gives the strong duality condition under which the optimal solution of the dual problem also solves the primal problem. However, to our knowledge, there is no known result in the literature on the existence condition such that the strong duality condition can be ensured to hold in a discrete-time model as the continuous-time model does. In this paper, we would like to close the gap between continuous-time models and discrete-time models, and prove that the strong duality condition always holds in discrete-time models when utility function satisfies cU'(c+)< forcR and <<. We build up in Section 2 a discrete-time financial model, and formulate the constrained portfolio selection problem mathematically. We discuss in Section 3 the Pliska’s dual problem and present the strong duality theorem. We derive in Section 4 the main result of this paper: Theory of guaranteed strong duality. We demonstrate our results via an illustrative example in Section 5 before we conclude our paper in Section 6. II. MATHEMATICAL FORMULATION We consider a financial market, consisting of n risky assets and one risk free asset, in which investors make their investment decisions at multiple time instants, t=0,1,,T1. Let( , ,{ } , )t t P F F be the filtrated probability space, where 1: { , , }K    is the sample space with K finite samples. Denote the stochastic process of the risky securities’ returns as 0, , 1{ }t t T μ μ  , where ( (1), , ( ))'t t t n μ  is a random vector, and the bond return process as 0, , 1{ }t t Tr  r  , where tr is a deterministic scalar. Denote 0, , 1{ }t t TR  R  as the extra return process with ( (1), ( ))'t t tR R R n  and ( ) ( )t t tR i i r  . Furthermore, we introduce two assumptions on the financial market, which guarantee the completeness of the market.
  • 2. Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis International organization of Scientific Research 2 | P a g e Assumption 2.1.(i) At any time t, there exist : ( 1)t tm n  elements 1 , , tm t tA A , such that 1 tm t tA A    , ,i j t tA A i j     , and 1 ( , , )tm t t tA A F ; (ii) ti m  , ( 1)( 1) 1 i n j i t tA A     for j=1,,n+1; (iii) The assets’ return matrix ( 1)( 1) 1 ( 1) ( 1) ( 1) ( ) ( )t t t i n i n t t t n n r r A A            μ μ   is full rank for any i t tA F . Assumption 2.2.The financial market is arbitrage-free. An investor with initial wealth v would like to invest her wealth in the market. Denote her self-financing trading strategies as 0,1, , 1{ }t t T     , where ( (1), , ( ))'t t t n    with ( )t i being the dollar amount invested in ith risky security at time t. Let tV be the portfolio value at time t. The dollar amount invested in the bond at time t is then 1 ( ) n t t i V i    . Therefore, the wealth process satisfies 1 ' .t t t t tV V r R    (1) We assume in this paper that, when there is no constraint on trading strategies, the market governed by the stochastic difference equation described above, 1 0 ' ; , 0,1, , 1; , t t t t t n t V V r R t T V v              satisfies both Assumptions 2.1 and 2.2, thus being a complete market. The subject we study in this paper is a constrained portfolio selection problem. Under the condition that t is constrained in a convex set tK , the investor pursues her investment by maximizing her expected utility of the terminal wealth, ( ):U     , where U(,) is assumed to be differentiable, strictly increasing and concave for each . For example, { ; ( ) 0, 1, , }n t t t i i n     K   when short selling is prohibited. In summary, the mathematical model of the investor’s constrained portfolio selection problem is posted as follows, 1 0 [ ( )] . . ( )' ; ( ) , 0,1, , 1; . T t t t t t n t t max E U V s t V V r R P t T V v                K   If tK is a subset of n  , problem (P) is a portfolio selection problem in an incomplete market, as some contingent claims can not be hedged by any admissible portfolios due to the constraints. III. RISK NEUTRAL COMPUTATIONAL APPROACH Following Pliska [1], we define the support function of tK as ( ) ( )' .t tt t tsup    K The effective domain of ( )t  is then given by { ; ( ) }.n t t t     K 
  • 3. Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis International organization of Scientific Research 3 | P a g e We introduce the predictable stochastic process : { ; 0,1, , 1, }t t tt T     K . Let D be the set of all such processes of . For each D, we construct an auxiliary market M with the following modified returns, tr  ( ) ,t t t r V     ( )t i   ( ) ( ) ( ), 1, , ,t t t t i i i n V        1tV   ( )' ,t t t tV r R    where ( (1), , ( ))'t t tR R R n     with ( ) ( )t t tR i i r     = ( ) ( )t tR i i . When 0tV  , we let t tr r  and ( ) ( ) ( )t t ti i i     . Notice that t tV   is the proportional trading strategy adopted in Pliska [1]. The first step in the risk neutral computational approach (see [1]) is to embed the primal constrained portfolio selection problem (P) into a family of unconstrained portfolio selection problems in M , 1 0 [ ( )] . . ( )' ; ( ) ; 0,1, , 1; . T t t t t t n t max E U V s t V V r R P t T V v                       Note that Assumption 2.1 still holds in the auxiliary market M , as the return matrix in the auxiliary market M is obtained by performing some elementary transformations on the return matrix of the original market, due to the predictability of process . Thus, problem ( )P for given D can be still efficiently solved by using the martingale-like approach in [1]. It is easy to see that, for t  , 0,1, , 1t t T K  , TV   1 1 1 1 1 1 1( )' [ ( ) ( )' ]T T T T T T TV r R               1 1 1 1( )'T T T TV r R      2 2 2 2 1 1 1[ ( )' ] ( )'T T T T T T TV r R r R              1 11 00 1 ( )' T TT t t t i tt i t v r R r          .TV Due to the increasing property of the utility function, we can get the following weak duality. Proposition 3.1. Weak dualityLet J(v) be the optimal value of primal problem (P) and ( )J v be the optimal value of problem ( )P . Then ( ) ( ), .J v J v   D As for any D , ( )J v offers an upper bound for J(v), the second step in the risk neutral computational approach [1] is to find the tightest upper bound by solving the following dual problem, * ( ) ( ),DD argmin J v   such that, hopefully, the optimal solution to the unconstrained problem in the market *  M will turn out to be the optimal solution to the constrained problem in the primal constrained market and the corresponding optimal
  • 4. Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis International organization of Scientific Research 4 | P a g e objective values will coincide, i.e., * ( )J v = J(v). We call the dual problem (D) in this paper as the Pliska’s dual of (P). Proposition 3.2. Strong Duality (see [1])Suppose that for some ˆ D, the optimal trading strategy of ˆ ( )P , ˆ , satisfies (a) ˆt t K , (b) ˆ ˆˆ( ) ' 0t t t     . Then ˆ is optimal for the primal constrained portfolio selection problem (P), and ˆ ( ) ( ) ( )J v J v J v    for all D. A crucial question is the existence guarantee of such a ˆ for achieving strong duality. Pliska states the following in [1]: The obvious candidate for such a ˆ is *  , the solution of the dual problem (D). After computing *  , you then check whether *  , the optimal trading strategy for * ( )P , satisfies conditions (a) and (b) in Proposition 3.2. If both conditions are satisfied, then *  will be optimal for the primal constrained portfolio selection problem (P). However, as emphasized in [1], there is no known result to guarantee such an existence. The main purpose of this paper is to present a guaranteed strong duality result when convex set tK is specified by a set of convex inequalities. IV. GUARANTEED STRONG DUALITY Let us consider problem (P), where feasible convex set tK is specified by a set of convex inequalities, { ; ( ) },t t tG b  K (2) where 1 2 : ( , , )'td t t t tG G G G  with 2i tG  being a second order continuous differentiable convex function, i = 1, …, k, and tb is a td dimensional vector. As we know, the primal problem (P) can be tackled either as a stochastic control problem, where the trading strategy at time t, t , is a tF -measurable stochastic random vector, or as a static optimization problem, where all the realizations of t are considered separately based on our discrete financial model. In the latter case, the objective function in (P) can be reformulated as follows, 1 11 00 1 ( ) ( ( ))' ( ) . T TT t t t i tt i t P U v r R r                     Notice that ( ) ( )i t t tA   if i tA  , due to the tree structure of the market. The decision vectors are ( )i t tA for t=0,1,,T1 and 1, ,( 1)t i n  . When we deal with the primal problem (P) as a static one, we first formulate its Lagrangian dual problem. Given { ; ( ) }t t tG b  K , the Lagrangian dual of problem (P) is given as follows, ( )LD ( 1)1 ' 0 ( ( )) [ ( ( ))] t nT i i t t t t t t t i min max A b G A        1 11 00 1 ( ) ( ( ))' ( ) ,i T TT t t t tt i t P U v r R r                      where 0,1, , 1{ }t t T     is a nonnegative adapted process. As problem (P) is convex, there is no duality gap between problems (P) and ( )LD from the strong duality theorem. Furthermore, a process pair * * ( , )  satisfying the first order condition, 1 1 11 * 00 1 1 [1 '( ( )' ( ) ) ]i t T T TT i t t t t i t iA tt i t i t E U v r R A r R r             * * ( ( ))' '( ( )) 0,i i t t t t tA G A   (3)
  • 5. Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis International organization of Scientific Research 5 | P a g e * * ( ( ))'[ ( ( ))] 0,i i t t t t t tA b G A   (4) for 1, ,( 1)t i n  and t=0,1,,T1, where 1 ( )' '( ) , ( )' t t t k t G G G                solves both the primal and the Lagrangian dual problems. Theorem 4.1.Assume that the concave utility function further satisfies cU'(c+)<, (5) for all c and (,+). For the process pair * * ( , )  specified in (3) and (4), respectively, let * ( )i t tA  * * ( '( ( )))' ( ) , ( ) i i t t t t t i t t G A A A     (6) for 1, ,( 1)t i n  and t=0,1,,T1, where ( ) :i t tA  1 1 11 ? * 00 1 1 [1 '( ( ) ( ) ) ].i t T T TT i t t t t i iA tt i t i t E U v r R A r r             Then * t t K , * t  tK , * { }t solves * ( )P and * * * ( ) ( )' 0,t t t     (7) for t=0,1,,T1. Proof. The conclusion of * t t K is due to the strong duality between the primal problem (P) and the Lagrangiandual ( )LD . The following is clear from (5), * * * ( ( ))'( '( ( )))' ( )i i i t t t t t t tA G A A   1 1 11 * * 00 1 1 [1 '( ( )' )( )' ]i t T T TT t t t i t t iA tt i t i t E U v r R r R r               .  (8) As * * * * * ( ) ( ) ( ( ))'( ) 0.5( )' ( )( )i i i i i t t t t t t t t t t t t t tG G G HG b                 for some  between t and * t , i=1,,k, where ( )i tHG  is the Hessian matrix, we have * ( )i t t tG    * * * ( ) ( )i i i t t t t t tb G G     * * 0.5( )' ( )( ).i t t t t tHG       Since * * ( )'( ( )) 0t t t tb G   , we further have * * ( )' '( )t t t tG    * * * * ( )' '( ) 0.5( )'t t t t tG    tH  * * * ( )' '( ) ,t t tG     (9) where tH 1 ( , ',k t tH H   i tH * * ( )' ( )( ) 0.i t t t t tHG        Therefore, * ( ( ))i t tA   * ( ( ))' ( )t t i i t t t tsup A A   K  * * ( ( ))'( '( ( ))' ( ), ( )) ( )t t i i i i t t t t t t t t t i t t A G A A A sup A        K  , which implies * t t K . The following is clear from (9), * * * ( ) ( )'t t t t     * * * { ( )' } ( )'t t t t t tsup      K
  • 6. Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis International organization of Scientific Research 6 | P a g e  * * * ? * * ( )' '( ) ( ) ( '( ))' ( ) ( )t t it t t t t t t t ti t t t G G sup A A            K  * * * * * ( )' '( ) ( )' '( ) ( )t t t t t t t t t t i t t G G sup A           K  0. Furthermore, we can check that *  satisfies the following optimality condition of problem * ( )P , ( ) :i t tA  * * 1 [1 ( )i t T t t iA i t E R r       * * 1 11 * * 00 1 '( ( )'( ) )] T TT t t t t i tt i t U v r R r             0. Actually, we can derive the following equation by (7), * TV  * * 1 11 * * 00 1 ( ) '( ) T TT t t t t i tt i t v r R r             1 11 * 00 1 ( )' . T TT t t t i T tt i t v r R r V         Therefore, the following equation can be derived from (3) and (6), ( )i t tA  * * 1 * 1 [1 '( )( ) ]i t T T t t iA i t E U V R r         * 1 * 1 [1 '( )( ) ]i t T T t t iA i t E U V R r        * * 1 1 * 1 1 [1 '( ) ] [1 '( ) ]i i t t T T T t i T t iA A i t i t E U V R r E U V r            * *1 1 * * * * t t 1 1 ( ' )' ( ' )' T T i i t t t t i t i ti i r r G G r r                0. Hence, *  solves * ( )P . Remark 4.1 If the optimal * * ( , )  for the Pliska’s dual problem can be derived, and matrix * '( )t tG  are nonsingular, then the unique optimal Lagrangian multiplier *  for the Lagrangian dual problem can be found as, * ( )i t tA  * ( '( ( )))'i t t tG A . (10) When some matrix * '( )t tG  are singular or even not square, the optimal Lagrangiancan not be uniquely determined by the relationship (6). 5. Illustrative Examples Example 1. We study now a single-period investment example with one risky asset and no short-selling constraint to illustrate the relationship of the primal problem, the Lagrangian dual problem and the Pliska’s dual problem. The primal problem ( )P is given as follows, 1 0 1 [ ( )] ( ) . . ; 0. max E U V P s t V vr R          While the corresponding Lagrangian dual is 0 ( ):min f max   [ ( )] ,E U vr R   the associated Pliska’s dual is 0 ( ):min g max   ( ) [ ( ( ) )].E U v r R v         We can depict the objective functions of the two dual problems in the same figure. Two situations may occur according to different returns of risky security, R. Figure 1 represents the situation when the optimal Lagrangian multiplier *  is bigger than zero. In such a situation, *  and the corresponding dual parameter *  may not be equal. However, both the optimal objective values are equal to the optimal objective value of primal problem.
  • 7. Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis International organization of Scientific Research 7 | P a g e Figure 1: Situation with optimal parameters bigger than 0 Figure 2 illustrates the situation when the optimal Lagrangian multiplier *  equals to zero. In such a situation, both *  and the corresponding parameter *  are equal to zero, and the optimal objective values of the lagrangian dual and the Pliska’s dual are still equal to the optimal objective value of the primal problem. Figure 2: Situation with optimal parameters equal to 0 Example 2. Consider Example 5.11 in [1] which is a two-period problem with short-selling prohibited, the bond return rate given as 1 1r r  and the price process for the single risky asset and the probability measure specified as follows:  0 ( )  1( )  P() 1 8/5 9/8 1/4 2 8/5 6/8 1/4 3 4/5 6/4 1/4 4 4/5 3/4 1/4
  • 8. Discrete-Time Constrained Portfolio Optimization: Strong Duality Analysis International organization of Scientific Research 8 | P a g e An investor with a log utility function, U(V)=ln(V), enters the financial market with initial wealth v=1. The optimal dual parameter , trading strategies and wealth process have been derived in [1]. More specifically, the corresponding optimal process *  is * * * 0 1 1 2 1 3 4 1 0, ({ , }) , ({ , }) 0, 16          and the optimal trading strategies are * * * 0 1 1 2 1 3 4 5 2 , ({ , }) 0, ({ , }) , 3 3          yielding the corresponding optimal terminal wealth process as 1 1 2 1 3 4 2 ({ , }) 2, ({ , }) , 3 V V     2 1 2 2 2 3 2 4 1 ( ) 2, ( ) 2, ( ) 1, ( ) . 2 V V V V       Solving the Lagrangian dual problem, min max  2 0 0 1 1 2 1 1 2( ( )) ({ , }) ({ , })E ln V          1 3 4 1 3 4({ , }) ({ , }),      gives rise the optimal Lagrangian parameter process, *  , * * * 0 1 1 2 1 3 4 1 0, ({ , }) , ({ , }) 0. 64          It can be verified that the optimal trading strategies derived from the Lagrangian dual and Pliska’s dual are exactly the same, and, furthermore, (6) holds. V. CONCLUSION By identifying the relationship between the Lagrangian dual and Pliska’s dual for the constrained portfolio selection problem, we have derived in this paper a guaranteed strong duality result for a class of discrete-time constrained convex portfolio selection problems. More specifically, we ensure the existence of an optimal  in the strong duality conditions of [1] to guarantee the success of the risk neutral computational approach. The authors declare that there is no conflict of interests. REFERENCES [1] S. R. Pliska, Introduction to Mathematical Finance: Discrete Time Models, Blackwell, Oxford, UK, 1997. [2] J. Cvitanic and I. Karatzas, Convex duality in constrained portfolio optimization, The Annual of Applied Probability, 2(1992), 767–618. [3] G. L. Xu and S. E. Shreve, A duality method for optimal consumption and investment under short-selling prohibition. i. general market coefficients, The Annals of Applied Probability, 2(1992), 87–112. [4] G. L. Xu and S. E. Shreve, A duality method for optimal consumption and investment under short-selling prohibition. ii. Constant market coefficients, The Annals of Applied Probability, 2(1992), 314–328. [5] J. C. Cox and C. F. Huang, Optimal consumption and portfolio policies when asset prices follow a diffusion process, Journal of Economic Theory, 49(1989), 33–83. [6] R. T. Rockafellar, Convex Analysis, Princeton, NJ: Princetion University Press, (1970). [7] J. Harrison and D. Kreps, Martingales and multiperiod securities markets, Journal of Economic Theory, 20(1979), 381–408. [8] J. Harrison and S. Pliska, Martingales and stochastic integrals in the theory of continuous trading, Stochastic Process, 11(1981), 215–260. [9] I. Klein and L. C. G. Rogers, Duality in optimal investment and consumption problems with market frictions, Mathematical Finance, 17(2007), 225–24.