In this paper evaluate six exchange rate hedging strategies with financial
options from the OTC market in Colombia. Three hedging strategies for
importers and three for exporters were raised. The coverage for importers
was carried out with the traditional strategy of long call, bull call spread and
bull put spread, the last two correspond to options portfolios. The coverage
for importers was carried out with the traditional strategy of long put, bear
call spread and bear put spread, the last two correspond to options portfolios
to determine the best hedging strategy, the currency price was modeled with
a Wiener process and the VaR for the six covered scenarios was calculated
and compared with the VaR of the uncovered scenario. The results shown by
the six hedging strategies manage to mitigate the exchange risk, but the most
efficient strategies are the traditional ones for both importers and exporters.
1) The document discusses derivatives flock case risk and its effect on market sectors. It focuses on how ignorance in derivative pricing can lead speculators to follow false demand, known as flock case.
2) Flock case can negatively affect market sectors by directing production and demand away from real needs towards imagined demand based on speculation. This can misallocate resources and potentially reduce profits.
3) Derivatives markets are also interconnected with currency exchange, stock prices, commodity prices, and interest rates. Failure in derivatives markets can therefore transmit risk throughout the financial system and broader economy.
COMPARISON OF METHODS FOR THE RECOGNITION OF DERIVATIVE FINANCIAL PRODUCTS WI...IAEME Publication
In the global competition environment,the companies’ areas of usage regarding derivative financial products becamewidespread and these instruments started to take an important place in theliability statements of the businesses. In terms of financial accounting, thecompanies need to reflect the usage of derivative financial products in theirfinancial statements, and in terms of administrative accounting, they searchfor methods that will facilitate the follow-ups for the performance assessmentand decision making procedures regarding the processes of large scalederivatives.
The companies making investments in thederivatives in hopes of risk management or speculation acquire mutual rightsand liabilities through the contracts they make. For the assessment andrecognition of these rights and liabilities, the standards numbered TMS 32, TMS39, TFRS 7 and TFRS 9 were published by the Public Oversight Authority ofTurkey. These standards coincide with the standards published by theInternational Accounting Standards Board (IASB).
In this study, attention is drawn to theassessment and recognition of the derivatives in line with the aforementionedstandards, and alternative solutions are discussed.
Ib0010 international financial managementsmumbahelp
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Ib0010 & international financial managementsmumbahelp
This document provides information about getting fully solved assignments. Students can send their semester and specialization details to the provided email address or call the given phone number to get assignments. It then provides details of an International Financial Management assignment for semester 3, including the subject code, credits, marks and 5 questions that require answers. Students are advised to answer all questions and note the word count needed for longer answers.
The document provides an overview of fundamental analysis and technical analysis techniques used in security analysis. It discusses various fundamental analysis approaches like economy analysis, industry analysis, and company analysis. It also covers technical analysis indicators like Dow Theory, Elliott Wave Principle, chart types, chart patterns, and moving averages. Finally, it provides a brief introduction to the efficient market theory which states that security prices reflect all available information.
The document discusses hedging risks using derivatives and insurance policies. It describes how commercial banks use foreign currency derivatives like forwards, futures, swaps and options to hedge foreign exchange risk. It also outlines the types of risks that insurance companies consider in their policies, including pure risks that involve only loss or no loss, such as personal, property and liability risks. The document concludes by examining how insurance companies develop risk policies that evaluate market attractiveness and address the effects of investment volatility on available capital and risk capacity.
This document discusses various tools for hedging foreign currency risk. It begins by defining hedging as a risk management strategy used to reduce losses from price volatility. The main types of currency exposure are then outlined as transaction, translation, and operating. Various hedging tools are then described in detail, including forwards, futures, options, swaps, money markets, and leveraged spot markets. Specific examples are provided to illustrate how each tool can be used to hedge currency risk for a company conducting international business and trade.
1) The document discusses derivatives flock case risk and its effect on market sectors. It focuses on how ignorance in derivative pricing can lead speculators to follow false demand, known as flock case.
2) Flock case can negatively affect market sectors by directing production and demand away from real needs towards imagined demand based on speculation. This can misallocate resources and potentially reduce profits.
3) Derivatives markets are also interconnected with currency exchange, stock prices, commodity prices, and interest rates. Failure in derivatives markets can therefore transmit risk throughout the financial system and broader economy.
COMPARISON OF METHODS FOR THE RECOGNITION OF DERIVATIVE FINANCIAL PRODUCTS WI...IAEME Publication
In the global competition environment,the companies’ areas of usage regarding derivative financial products becamewidespread and these instruments started to take an important place in theliability statements of the businesses. In terms of financial accounting, thecompanies need to reflect the usage of derivative financial products in theirfinancial statements, and in terms of administrative accounting, they searchfor methods that will facilitate the follow-ups for the performance assessmentand decision making procedures regarding the processes of large scalederivatives.
The companies making investments in thederivatives in hopes of risk management or speculation acquire mutual rightsand liabilities through the contracts they make. For the assessment andrecognition of these rights and liabilities, the standards numbered TMS 32, TMS39, TFRS 7 and TFRS 9 were published by the Public Oversight Authority ofTurkey. These standards coincide with the standards published by theInternational Accounting Standards Board (IASB).
In this study, attention is drawn to theassessment and recognition of the derivatives in line with the aforementionedstandards, and alternative solutions are discussed.
Ib0010 international financial managementsmumbahelp
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Ib0010 & international financial managementsmumbahelp
This document provides information about getting fully solved assignments. Students can send their semester and specialization details to the provided email address or call the given phone number to get assignments. It then provides details of an International Financial Management assignment for semester 3, including the subject code, credits, marks and 5 questions that require answers. Students are advised to answer all questions and note the word count needed for longer answers.
The document provides an overview of fundamental analysis and technical analysis techniques used in security analysis. It discusses various fundamental analysis approaches like economy analysis, industry analysis, and company analysis. It also covers technical analysis indicators like Dow Theory, Elliott Wave Principle, chart types, chart patterns, and moving averages. Finally, it provides a brief introduction to the efficient market theory which states that security prices reflect all available information.
The document discusses hedging risks using derivatives and insurance policies. It describes how commercial banks use foreign currency derivatives like forwards, futures, swaps and options to hedge foreign exchange risk. It also outlines the types of risks that insurance companies consider in their policies, including pure risks that involve only loss or no loss, such as personal, property and liability risks. The document concludes by examining how insurance companies develop risk policies that evaluate market attractiveness and address the effects of investment volatility on available capital and risk capacity.
This document discusses various tools for hedging foreign currency risk. It begins by defining hedging as a risk management strategy used to reduce losses from price volatility. The main types of currency exposure are then outlined as transaction, translation, and operating. Various hedging tools are then described in detail, including forwards, futures, options, swaps, money markets, and leveraged spot markets. Specific examples are provided to illustrate how each tool can be used to hedge currency risk for a company conducting international business and trade.
Mb0053 international business managementsmumbahelp
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Managing transaction exposure and economic exposureMaica Batiancela
This document discusses foreign exchange exposure and its management. It defines three types of exposure - translation, transaction, and economic - and describes techniques for managing each type. Transaction exposure involves actual cash flows and can be hedged using forwards, futures, options, swaps and cross-hedging. Economic exposure is harder to hedge but diversification and strategic operational changes can help. While derivatives are commonly used, some companies have experienced large losses, so effective risk management is important.
Fin 401 international financial managementsmumbahelp
This document provides information about an assignment for an MBA course on international financial management. It gives the course code, credits, marks and instructions for answering the questions. The assignment is divided into two sets with three questions each. The questions cover topics like globalization, foreign exchange markets, swaps, measuring economic exposure, tools for managing foreign exchange risk, the adjusted present value model and forced disinvestment. Students are instructed to send their semester and specialization details to a provided email address or call a phone number for fully solved assignments.
MF0015 - INTERNATIONAL FINANCIAL MANAGEMENTsmumbahelp
This document provides information about getting fully solved assignments. It instructs students to send their semester and specialization name to an email address or call a phone number to receive assistance with assignments. It then provides an example of an assignment question related to international financial management that covers topics like forward markets, interest rate parity, cash concentration strategies, and international taxation. The assignment asks students to answer 6 questions in approximately 400 words each and provides an evaluation scheme for each question.
Ib0010 & international financial managementsmumbahelp
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Ib0010 & international financial managementsmumbahelp
This document provides information about obtaining fully solved assignments from an assignment assistance service. It lists contact information for students to send their semester and specialization details to receive solved assignments via email or to call for assistance. It also provides details of available assignments for various semesters and programs, including subject code, name, credits, marks, and evaluation scheme.
These Lecture series are relating the use R language software, its interface and functions required to evaluate financial risk models. Furthermore, R software applications relating financial market data, measuring risk, modern portfolio theory, risk modeling relating returns generalized hyperbolic and lambda distributions, Value at Risk (VaR) modelling, extreme value methods and models, the class of ARCH models, GARCH risk models and portfolio optimization approaches.
This document discusses hedging foreign exchange risk. It begins by defining exchange risk as the exposure individuals and firms face when investing or doing business abroad due to fluctuations in exchange rates, interest rates, and inflation between countries. It then examines various methods of calculating exposure, such as using value-at-risk models. The document also explores hedging techniques like using currency derivatives and forwards to minimize risk. Finally, it notes that while hedging can reduce volatility, it may also limit gains, so firms must decide if hedging aligns with their objectives.
CH 12 - MANAGING ECONOMIC EXPOSURE AND TRANSLATION.pptxahsenaykazim1
This document discusses three main ways that multinational companies manage economic exposure to exchange rate fluctuations:
1) Assessing economic exposure through analyzing sensitivity of financials and operations to exchange rate changes to understand magnitude and nature of exposure.
2) Restructuring operations, supply chains, and sourcing strategies to diversify reliance on vulnerable markets and currencies and minimize exposure.
3) Hedging exposure through financial instruments like forward contracts that lock in exchange rates to protect values of fixed assets and future cash flows from currency risks.
1) This research analyzes optimal asset allocation in the Saudi stock market using modern portfolio theory.
2) The researcher collected monthly price data for the top 20 companies from 2008-2013 and calculated returns to analyze risk and expected return.
3) Descriptive statistics showed non-normal return distributions with positive skewness and excess kurtosis. Variance analysis used minimum variance, efficient frontier, and tangency portfolio models to determine optimal allocations.
Mf0015 international financial managementsmumbahelp
Dear students get fully solved SMU MBA Fall 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
Counterparty Risk in the Over-The-Counter Derivatives MarketNikhil Gangadhar
This paper discusses counterparty risk that may stem from the over-the-counter (OTC) derivatives market in the wake of the 2008 financial crisis. The paper aims to assess potential losses to the financial system if one or more major banks or brokers default on their OTC derivative contracts. To estimate counterparty risk, the paper calculates potential losses under different scenarios, taking into account the exposure of the financial system to institutions and the probability that other institutions may also default if a major counterparty fails. The results are discussed in the context of ensuring banking system stability.
9.kalpesh arvind shah.subject international banking and foreign exchange riskKalpesh Arvind Shah
This document discusses hedging instruments for managing foreign exchange risk. It begins by defining foreign exchange exposure and classifying it into three categories: transaction exposure, translation exposure, and economic exposure. The document then discusses techniques for managing exposure, including forwards, futures, options, swaps, and combinations. It provides details on derivatives, focusing on forwards-based derivatives like forward contracts, swaps, and futures contracts. Specific types of swaps like interest rate swaps and currency swaps are explained.
This chapter provides an overview of financial risk and risk management. It defines key terms like risk and exposure. Financial risk can arise from market changes, counterparties, and internal failures. Risk management involves identifying risks, setting risk tolerance, and implementing strategies like diversification and derivatives. Derivatives contracts discussed include forwards, futures, options, and swaps. The role, criticisms, misuses, and career opportunities related to derivatives are also outlined.
management of foreign exchange and risk managementAjilal
This document discusses various techniques for managing foreign exchange risk and exposure. It begins by defining foreign exchange exposure and risk for business firms engaged in international business. It then discusses managing transaction risk through hedging techniques like forward hedges, money market hedges, option market hedges, and future hedges. It also discusses internal risk management techniques used by multinational companies like netting, matching, leading and lagging, and pricing policies. Finally, it discusses managing operating risk and translation exposure.
Development of depth map from stereo images using sum of absolute differences...nooriasukmaningtyas
This article proposes a framework for the depth map reconstruction using stereo images. Fundamentally, this map provides an important information which commonly used in essential applications such as autonomous vehicle navigation, drone’s navigation and 3D surface reconstruction. To develop an accurate depth map, the framework must be robust against the challenging regions of low texture, plain color and repetitive pattern on the input stereo image. The development of this map requires several stages which starts with matching cost calculation, cost aggregation, optimization and refinement stage. Hence, this work develops a framework with sum of absolute difference (SAD) and the combination of two edge preserving filters to increase the robustness against the challenging regions. The SAD convolves using block matching technique to increase the efficiency of matching process on the low texture and plain color regions. Moreover, two edge preserving filters will increase the accuracy on the repetitive pattern region. The results show that the proposed method is accurate and capable to work with the challenging regions. The results are provided by the Middlebury standard dataset. The framework is also efficiently and can be applied on the 3D surface reconstruction. Moreover, this work is greatly competitive with previously available methods.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
Control of a servo-hydraulic system utilizing an extended wavelet functional ...nooriasukmaningtyas
Servo-hydraulic systems have been extensively employed in various industrial applications. However, these systems are characterized by their highly complex and nonlinear dynamics, which complicates the control design stage of such systems. In this paper, an extended wavelet functional link neural network (EWFLNN) is proposed to control the displacement response of the servo-hydraulic system. To optimize the controller's parameters, a recently developed optimization technique, which is called the modified sine cosine algorithm (M-SCA), is exploited as the training method. The proposed controller has achieved remarkable results in terms of tracking two different displacement signals and handling external disturbances. From a comparative study, the proposed EWFLNN controller has attained the best control precision compared with those of other controllers, namely, a proportional-integralderivative (PID) controller, an artificial neural network (ANN) controller, a wavelet neural network (WNN) controller, and the original wavelet functional link neural network (WFLNN) controller. Moreover, compared to the genetic algorithm (GA) and the original sine cosine algorithm (SCA), the M-SCA has shown better optimization results in finding the optimal values of the controller's parameters.
Decentralised optimal deployment of mobile underwater sensors for covering la...nooriasukmaningtyas
This paper presents the problem of sensing coverage of layers of the ocean in three dimensional underwater environments. We propose distributed control laws to drive mobile underwater sensors to optimally cover a given confined layer of the ocean. By applying this algorithm at first the mobile underwater sensors adjust their depth to the specified depth. Then, they make a triangular grid across a given area. Afterwards, they randomly move to spread across the given grid. These control laws only rely on local information also they are easily implemented and computationally effective as they use some easy consensus rules. The feature of exchanging information just among neighbouring mobile sensors keeps the information exchange minimum in the whole networks and makes this algorithm practicable option for undersea. The efficiency of the presented control laws is confirmed via mathematical proof and numerical simulations.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
More Related Content
Similar to Evaluation of options portfolios for exchange rate hedges
Mb0053 international business managementsmumbahelp
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Managing transaction exposure and economic exposureMaica Batiancela
This document discusses foreign exchange exposure and its management. It defines three types of exposure - translation, transaction, and economic - and describes techniques for managing each type. Transaction exposure involves actual cash flows and can be hedged using forwards, futures, options, swaps and cross-hedging. Economic exposure is harder to hedge but diversification and strategic operational changes can help. While derivatives are commonly used, some companies have experienced large losses, so effective risk management is important.
Fin 401 international financial managementsmumbahelp
This document provides information about an assignment for an MBA course on international financial management. It gives the course code, credits, marks and instructions for answering the questions. The assignment is divided into two sets with three questions each. The questions cover topics like globalization, foreign exchange markets, swaps, measuring economic exposure, tools for managing foreign exchange risk, the adjusted present value model and forced disinvestment. Students are instructed to send their semester and specialization details to a provided email address or call a phone number for fully solved assignments.
MF0015 - INTERNATIONAL FINANCIAL MANAGEMENTsmumbahelp
This document provides information about getting fully solved assignments. It instructs students to send their semester and specialization name to an email address or call a phone number to receive assistance with assignments. It then provides an example of an assignment question related to international financial management that covers topics like forward markets, interest rate parity, cash concentration strategies, and international taxation. The assignment asks students to answer 6 questions in approximately 400 words each and provides an evaluation scheme for each question.
Ib0010 & international financial managementsmumbahelp
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Ib0010 & international financial managementsmumbahelp
This document provides information about obtaining fully solved assignments from an assignment assistance service. It lists contact information for students to send their semester and specialization details to receive solved assignments via email or to call for assistance. It also provides details of available assignments for various semesters and programs, including subject code, name, credits, marks, and evaluation scheme.
These Lecture series are relating the use R language software, its interface and functions required to evaluate financial risk models. Furthermore, R software applications relating financial market data, measuring risk, modern portfolio theory, risk modeling relating returns generalized hyperbolic and lambda distributions, Value at Risk (VaR) modelling, extreme value methods and models, the class of ARCH models, GARCH risk models and portfolio optimization approaches.
This document discusses hedging foreign exchange risk. It begins by defining exchange risk as the exposure individuals and firms face when investing or doing business abroad due to fluctuations in exchange rates, interest rates, and inflation between countries. It then examines various methods of calculating exposure, such as using value-at-risk models. The document also explores hedging techniques like using currency derivatives and forwards to minimize risk. Finally, it notes that while hedging can reduce volatility, it may also limit gains, so firms must decide if hedging aligns with their objectives.
CH 12 - MANAGING ECONOMIC EXPOSURE AND TRANSLATION.pptxahsenaykazim1
This document discusses three main ways that multinational companies manage economic exposure to exchange rate fluctuations:
1) Assessing economic exposure through analyzing sensitivity of financials and operations to exchange rate changes to understand magnitude and nature of exposure.
2) Restructuring operations, supply chains, and sourcing strategies to diversify reliance on vulnerable markets and currencies and minimize exposure.
3) Hedging exposure through financial instruments like forward contracts that lock in exchange rates to protect values of fixed assets and future cash flows from currency risks.
1) This research analyzes optimal asset allocation in the Saudi stock market using modern portfolio theory.
2) The researcher collected monthly price data for the top 20 companies from 2008-2013 and calculated returns to analyze risk and expected return.
3) Descriptive statistics showed non-normal return distributions with positive skewness and excess kurtosis. Variance analysis used minimum variance, efficient frontier, and tangency portfolio models to determine optimal allocations.
Mf0015 international financial managementsmumbahelp
Dear students get fully solved SMU MBA Fall 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
Counterparty Risk in the Over-The-Counter Derivatives MarketNikhil Gangadhar
This paper discusses counterparty risk that may stem from the over-the-counter (OTC) derivatives market in the wake of the 2008 financial crisis. The paper aims to assess potential losses to the financial system if one or more major banks or brokers default on their OTC derivative contracts. To estimate counterparty risk, the paper calculates potential losses under different scenarios, taking into account the exposure of the financial system to institutions and the probability that other institutions may also default if a major counterparty fails. The results are discussed in the context of ensuring banking system stability.
9.kalpesh arvind shah.subject international banking and foreign exchange riskKalpesh Arvind Shah
This document discusses hedging instruments for managing foreign exchange risk. It begins by defining foreign exchange exposure and classifying it into three categories: transaction exposure, translation exposure, and economic exposure. The document then discusses techniques for managing exposure, including forwards, futures, options, swaps, and combinations. It provides details on derivatives, focusing on forwards-based derivatives like forward contracts, swaps, and futures contracts. Specific types of swaps like interest rate swaps and currency swaps are explained.
This chapter provides an overview of financial risk and risk management. It defines key terms like risk and exposure. Financial risk can arise from market changes, counterparties, and internal failures. Risk management involves identifying risks, setting risk tolerance, and implementing strategies like diversification and derivatives. Derivatives contracts discussed include forwards, futures, options, and swaps. The role, criticisms, misuses, and career opportunities related to derivatives are also outlined.
management of foreign exchange and risk managementAjilal
This document discusses various techniques for managing foreign exchange risk and exposure. It begins by defining foreign exchange exposure and risk for business firms engaged in international business. It then discusses managing transaction risk through hedging techniques like forward hedges, money market hedges, option market hedges, and future hedges. It also discusses internal risk management techniques used by multinational companies like netting, matching, leading and lagging, and pricing policies. Finally, it discusses managing operating risk and translation exposure.
Similar to Evaluation of options portfolios for exchange rate hedges (15)
Development of depth map from stereo images using sum of absolute differences...nooriasukmaningtyas
This article proposes a framework for the depth map reconstruction using stereo images. Fundamentally, this map provides an important information which commonly used in essential applications such as autonomous vehicle navigation, drone’s navigation and 3D surface reconstruction. To develop an accurate depth map, the framework must be robust against the challenging regions of low texture, plain color and repetitive pattern on the input stereo image. The development of this map requires several stages which starts with matching cost calculation, cost aggregation, optimization and refinement stage. Hence, this work develops a framework with sum of absolute difference (SAD) and the combination of two edge preserving filters to increase the robustness against the challenging regions. The SAD convolves using block matching technique to increase the efficiency of matching process on the low texture and plain color regions. Moreover, two edge preserving filters will increase the accuracy on the repetitive pattern region. The results show that the proposed method is accurate and capable to work with the challenging regions. The results are provided by the Middlebury standard dataset. The framework is also efficiently and can be applied on the 3D surface reconstruction. Moreover, this work is greatly competitive with previously available methods.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
Control of a servo-hydraulic system utilizing an extended wavelet functional ...nooriasukmaningtyas
Servo-hydraulic systems have been extensively employed in various industrial applications. However, these systems are characterized by their highly complex and nonlinear dynamics, which complicates the control design stage of such systems. In this paper, an extended wavelet functional link neural network (EWFLNN) is proposed to control the displacement response of the servo-hydraulic system. To optimize the controller's parameters, a recently developed optimization technique, which is called the modified sine cosine algorithm (M-SCA), is exploited as the training method. The proposed controller has achieved remarkable results in terms of tracking two different displacement signals and handling external disturbances. From a comparative study, the proposed EWFLNN controller has attained the best control precision compared with those of other controllers, namely, a proportional-integralderivative (PID) controller, an artificial neural network (ANN) controller, a wavelet neural network (WNN) controller, and the original wavelet functional link neural network (WFLNN) controller. Moreover, compared to the genetic algorithm (GA) and the original sine cosine algorithm (SCA), the M-SCA has shown better optimization results in finding the optimal values of the controller's parameters.
Decentralised optimal deployment of mobile underwater sensors for covering la...nooriasukmaningtyas
This paper presents the problem of sensing coverage of layers of the ocean in three dimensional underwater environments. We propose distributed control laws to drive mobile underwater sensors to optimally cover a given confined layer of the ocean. By applying this algorithm at first the mobile underwater sensors adjust their depth to the specified depth. Then, they make a triangular grid across a given area. Afterwards, they randomly move to spread across the given grid. These control laws only rely on local information also they are easily implemented and computationally effective as they use some easy consensus rules. The feature of exchanging information just among neighbouring mobile sensors keeps the information exchange minimum in the whole networks and makes this algorithm practicable option for undersea. The efficiency of the presented control laws is confirmed via mathematical proof and numerical simulations.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Smart monitoring system using NodeMCU for maintenance of production machinesnooriasukmaningtyas
Maintenance is an activity that helps to reduce risk, increase productivity, improve quality, and minimize production costs. The necessity for maintenance actions will increase efficiency and enhance the safety and quality of products and processes. On getting these conditions, it is necessary to implement a monitoring system used to observe machines' conditions from time to time, especially the machine parts that often experience problems. This paper presents a low-cost intelligent monitoring system using NodeMCU to continuously monitor machine conditions and provide warnings in the case of machine failure. Not only does it provide alerts, but this monitoring system also generates historical data on machine conditions to the Google Cloud (Google Sheet), includes which machines were down, downtime, issues occurred, repairs made, and technician handling. The results obtained are machine operators do not need to lose a relatively long time to call the technician. Likewise, the technicians assisted in carrying out machine maintenance activities and online reports so that errors that often occur due to human error do not happen again. The system succeeded in reducing the technician-calling time and maintenance workreporting time up to 50%. The availability of online and real-time maintenance historical data will support further maintenance strategy.
Design and simulation of a software defined networkingenabled smart switch, f...nooriasukmaningtyas
Using sustainable energy is the future of our planet earth, this became not only economically efficient but also a necessity for the preservation of life on earth. Because of such necessity, smart grids became a very important issue to be researched. Many literatures discussed this topic and with the development of internet of things (IoT) and smart sensors, smart grids are developed even further. On the other hand, software defined networking is a technology that separates the control plane from the data plan of the network. It centralizes the management and the orchestration of the network tasks by using a network controller. The network controller is the heart of the SDN-enabled network, and it can control other networking devices using software defined networking (SDN) protocols such as OpenFlow. A smart switching mechanism called (SDN-smgrid-sw) for the smart grid will be modeled and controlled using SDN. We modeled the environment that interact with the sensors, for the sun and the wind elements. The Algorithm is modeled and programmed for smart efficient power sharing that is managed centrally and monitored using SDN controller. Also, all if the smart grid elements (power sources) are connected to the IP network using IoT protocols.
Efficient wireless power transmission to remote the sensor in restenosis coro...nooriasukmaningtyas
In this study, the researchers have proposed an alternative technique for designing an asymmetric 4 coil-resonance coupling module based on the series-to-parallel topology at 27 MHz industrial scientific medical (ISM) band to avoid the tissue damage, for the constant monitoring of the in-stent restenosis coronary artery. This design consisted of 2 components, i.e., the external part that included 3 planar coils that were placed outside the body and an internal helical coil (stent) that was implanted into the coronary artery in the human tissue. This technique considered the output power and the transfer efficiency of the overall system, coil geometry like the number of coils per turn, and coil size. The results indicated that this design showed an 82% efficiency in the air if the transmission distance was maintained as 20 mm, which allowed the wireless power supply system to monitor the pressure within the coronary artery when the implanted load resistance was 400 Ω.
Grid reactive voltage regulation and cost optimization for electric vehicle p...nooriasukmaningtyas
Expecting large electric vehicle (EV) usage in the future due to environmental issues, state subsidies, and incentives, the impact of EV charging on the power grid is required to be closely analyzed and studied for power quality, stability, and planning of infrastructure. When a large number of energy storage batteries are connected to the grid as a capacitive load the power factor of the power grid is inevitably reduced, causing power losses and voltage instability. In this work large-scale 18K EV charging model is implemented on IEEE 33 network. Optimization methods are described to search for the location of nodes that are affected most due to EV charging in terms of power losses and voltage instability of the network. Followed by optimized reactive power injection magnitude and time duration of reactive power at the identified nodes. It is shown that power losses are reduced and voltage stability is improved in the grid, which also complements the reduction in EV charging cost. The result will be useful for EV charging stations infrastructure planning, grid stabilization, and reducing EV charging costs.
Topology network effects for double synchronized switch harvesting circuit on...nooriasukmaningtyas
Energy extraction takes place using several different technologies, depending on the type of energy and how it is used. The objective of this paper is to study topology influence for a smart network based on piezoelectric materials using the double synchronized switch harvesting (DSSH). In this work, has been presented network topology for circuit DSSH (DSSH Standard, Independent DSSH, DSSH in parallel, mono DSSH, and DSSH in series). Using simulation-based on a structure with embedded piezoelectric system harvesters, then compare different topology of circuit DSSH for knowledge is how to connect the circuit DSSH together and how to implement accurately this circuit strategy for maximizing the total output power. The network topology DSSH extracted power a technique allows again up to in terms of maximal power output compared with network topology standard extracted at the resonant frequency. The simulation results show that by using the same input parameters the maximum efficiency for topology DSSH in parallel produces 120% more energy than topology DSSH-series. In addition, the energy harvesting by mono-DSSH is more than DSSH-series by 650% and it has exceeded DSSHind by 240%.
Improving the design of super-lift Luo converter using hybrid switching capac...nooriasukmaningtyas
In this article, an improvement to the positive output super-lift Luo converter (POSLC) has been proposed to get high gain at a low duty cycle. Also, reduce the stress on the switch and diodes, reduce the current through the inductors to reduce loss, and increase efficiency. Using a hybrid switch unit composed of four inductors and two capacitors it is replaced by the main inductor in the elementary circuit. It’s charged in parallel with the same input voltage and discharged in series. The output voltage is increased according to the number of components. The gain equation is modeled. The boundary condition between continuous conduction mode (CCM) and discontinuous conduction mode (DCM) has been derived. Passive components are designed to get high output voltage (8 times at D=0.5) and low ripple about (0.004). The circuit is simulated and analyzed using MATLAB/Simulink. Maximum power point tracker (MPPT) controls the converter to provide the most interest from solar energy.
Third harmonic current minimization using third harmonic blocking transformernooriasukmaningtyas
Zero sequence blocking transformers (ZSBTs) are used to suppress third harmonic currents in 3-phase systems. Three-phase systems where singlephase loading is present, there is every chance that the load is not balanced. If there is zero-sequence current due to unequal load current, then the ZSBT will impose high impedance and the supply voltage at the load end will be varied which is not desired. This paper presents Third harmonic blocking transformer (THBT) which suppresses only higher harmonic zero sequences. The constructional features using all windings in single-core and construction using three single-phase transformers explained. The paper discusses the constructional features, full details of circuit usage, design considerations, and simulation results for different supply and load conditions. A comparison of THBT with ZSBT is made with simulation results by considering four different cases
Power quality improvement of distribution systems asymmetry caused by power d...nooriasukmaningtyas
With an increase of non-linear load in today’s electrical power systems, the rate of power quality drops and the voltage source and frequency deteriorate if not properly compensated with an appropriate device. Filters are most common techniques that employed to overcome this problem and improving power quality. In this paper an improved optimization technique of filter applies to the power system is based on a particle swarm optimization with using artificial neural network technique applied to the unified power flow quality conditioner (PSO-ANN UPQC). Design particle swarm optimization and artificial neural network together result in a very high performance of flexible AC transmission lines (FACTs) controller and it implements to the system to compensate all types of power quality disturbances. This technique is very powerful for minimization of total harmonic distortion of source voltages and currents as a limit permitted by IEEE-519. The work creates a power system model in MATLAB/Simulink program to investigate our proposed optimization technique for improving control circuit of filters. The work also has measured all power quality disturbances of the electrical arc furnace of steel factory and suggests this technique of filter to improve the power quality.
Studies enhancement of transient stability by single machine infinite bus sys...nooriasukmaningtyas
Maintaining network synchronization is important to customer service. Low fluctuations cause voltage instability, non-synchronization in the power system or the problems in the electrical system disturbances, harmonics current and voltages inflation and contraction voltage. Proper tunning of the parameters of stabilizer is prime for validation of stabilizer. To overcome instability issues and get reinforcement found a lot of the techniques are developed to overcome instability problems and improve performance of power system. Genetic algorithm was applied to optimize parameters and suppress oscillation. The simulation of the robust composite capacitance system of an infinite single-machine bus was studied using MATLAB was used for optimization purpose. The critical time is an indication of the maximum possible time during which the error can pass in the system to obtain stability through the simulation. The effectiveness improvement has been shown in the system
Renewable energy based dynamic tariff system for domestic load managementnooriasukmaningtyas
To deal with the present power-scenario, this paper proposes a model of an advanced energy management system, which tries to achieve peak clipping, peak to average ratio reduction and cost reduction based on effective utilization of distributed generations. This helps to manage conventional loads based on flexible tariff system. The main contribution of this work is the development of three-part dynamic tariff system on the basis of time of utilizing power, available renewable energy sources (RES) and consumers’ load profile. This incorporates consumers’ choice to suitably select for either consuming power from conventional energy sources and/or renewable energy sources during peak or off-peak hours. To validate the efficiency of the proposed model we have comparatively evaluated the model performance with existing optimization techniques using genetic algorithm and particle swarm optimization. A new optimization technique, hybrid greedy particle swarm optimization has been proposed which is based on the two aforementioned techniques. It is found that the proposed model is superior with the improved tariff scheme when subjected to load management and consumers’ financial benefit. This work leads to maintain a healthy relationship between the utility sectors and the consumers, thereby making the existing grid more reliable, robust, flexible yet cost effective.
Energy harvesting maximization by integration of distributed generation based...nooriasukmaningtyas
The purpose of distributed generation systems (DGS) is to enhance the distribution system (DS) performance to be better known with its benefits in the power sector as installing distributed generation (DG) units into the DS can introduce economic, environmental and technical benefits. Those benefits can be obtained if the DG units' site and size is properly determined. The aim of this paper is studying and reviewing the effect of connecting DG units in the DS on transmission efficiency, reactive power loss and voltage deviation in addition to the economical point of view and considering the interest and inflation rate. Whale optimization algorithm (WOA) is introduced to find the best solution to the distributed generation penetration problem in the DS. The result of WOA is compared with the genetic algorithm (GA), particle swarm optimization (PSO), and grey wolf optimizer (GWO). The proposed solutions methodologies have been tested using MATLAB software on IEEE 33 standard bus system
Intelligent fault diagnosis for power distribution systemcomparative studiesnooriasukmaningtyas
Short circuit is one of the most popular types of permanent fault in power distribution system. Thus, fast and accuracy diagnosis of short circuit failure is very important so that the power system works more effectively. In this paper, a newly enhanced support vector machine (SVM) classifier has been investigated to identify ten short-circuit fault types, including single line-toground faults (XG, YG, ZG), line-to-line faults (XY, XZ, YZ), double lineto-ground faults (XYG, XZG, YZG) and three-line faults (XYZ). The performance of this enhanced SVM model has been improved by using three different versions of particle swarm optimization (PSO), namely: classical PSO (C-PSO), time varying acceleration coefficients PSO (T-PSO) and constriction factor PSO (K-PSO). Further, utilizing pseudo-random binary sequence (PRBS)-based time domain reflectometry (TDR) method allows to obtain a reliable dataset for SVM classifier. The experimental results performed on a two-branch distribution line show the most optimal variant of PSO for short fault diagnosis.
A deep learning approach based on stochastic gradient descent and least absol...nooriasukmaningtyas
More than eighty-five to ninety percentage of the diabetic patients are affected with diabetic retinopathy (DR) which is an eye disorder that leads to blindness. The computational techniques can support to detect the DR by using the retinal images. However, it is hard to measure the DR with the raw retinal image. This paper proposes an effective method for identification of DR from the retinal images. In this research work, initially the Weiner filter is used for preprocessing the raw retinal image. Then the preprocessed image is segmented using fuzzy c-mean technique. Then from the segmented image, the features are extracted using grey level co-occurrence matrix (GLCM). After extracting the fundus image, the feature selection is performed stochastic gradient descent, and least absolute shrinkage and selection operator (LASSO) for accurate identification during the classification process. Then the inception v3-convolutional neural network (IV3-CNN) model is used in the classification process to classify the image as DR image or non-DR image. By applying the proposed method, the classification performance of IV3-CNN model in identifying DR is studied. Using the proposed method, the DR is identified with the accuracy of about 95%, and the processed retinal image is identified as mild DR.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
Evaluation of options portfolios for exchange rate hedges
1. Indonesian Journal of Electrical Engineering and Computer Science
Vol. 21, No. 1, January 2021, pp. 406~411
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i1.pp406-411 406
Journal homepage: http://ijeecs.iaescore.com
Evaluation of options portfolios for exchange rate hedges
Miguel Jiménez-Gómez1
, Natalia Acevedo-Prins2
, Miguel Rojas-López3
1,3
Facultad de Minas, Universidad Nacional de Colombia, Medellín, Colombia
1,2
Facultad de Ciencias Económicas y Administrativas, Instituto Tecnológico Metropolitano–ITM, Colombia
Article Info ABSTRACT
Article history:
Received Mar 26, 2020
Revised Jun 27, 2020
Accepted Jul 13, 2020
In this paper evaluate six exchange rate hedging strategies with financial
options from the OTC market in Colombia. Three hedging strategies for
importers and three for exporters were raised. The coverage for importers
was carried out with the traditional strategy of long call, bull call spread and
bull put spread, the last two correspond to options portfolios. The coverage
for importers was carried out with the traditional strategy of long put, bear
call spread and bear put spread, the last two correspond to options portfolios
to determine the best hedging strategy, the currency price was modeled with
a Wiener process and the VaR for the six covered scenarios was calculated
and compared with the VaR of the uncovered scenario. The results shown by
the six hedging strategies manage to mitigate the exchange risk, but the most
efficient strategies are the traditional ones for both importers and exporters.
Keywords:
Exchange rate hedges
Options portfolios
Value at risk
This is an open access article under the CC BY-SA license.
Corresponding Author:
Miguel Jiménez-Gómez
Instituto Tecnológico Metropolitano-ITM
Universidad Nacional de Colombia
Calle 54 A #30-01, Medellín, Colombia
Email: luisjimenez@itm.edu.co
1. INTRODUCTION
Since the collapse of the Bretton Woods exchange system in March 1973, the international currency
market has developed towards currency liberalization. Since then, researchers have studied sources of
currency risk to understand why exchange rates fluctuate, because currency market fluctuations are more
frequent and exchange rate risk prevails. With the globalization of the economy, multinational companies
face this market risk. Therefore, how to manage foreign exchange risk has become important for companies
and researchers [1, 2].
Multinational companies with expected future cash flows in currencies are directly exposed to
exchange rate movements. This is known as exchange rate risk or currency risk. However, the other
companies are exposed indirectly (competitive environment). This exchange exposure also affects the value
of the company. In importing and exporting companies, with direct exposure to foreign exchange risk, the
exposure covers transactions such as accounts receivable or accounts payable in foreign currency. Companies
with indirect exposure, market risk arises from the competitive environment in which the company operates.
Companies that manufacture and sell only locally will be exposed to a strengthening of the local currency as
imports from competing companies become cheaper [3].
From the approach of the valuation of companies and the classical financial theory of Modigliani
and Miller, the financial hedges are not important and are not necessary to realize since the markets are
perfect and do not have frictions. However, from a modern approach where markets are imperfect, financial
hedges increase the value of companies. The above is due to the existence of financial difficulties [4-7].
Financial hedges avoid financial difficulties by obtaining a lower probability of default by reducing exposure
2. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Evaluation of options portfolios for exchange rate hedges (Miguel Jiménez-Gómez)
407
to foreign exchange risk, this causes companies to obtain more financing, better interest rates and higher tax
shields [8, 9]. From the above, the value of the company increases.
To mitigate foreign exchange risk, two means are used. One is financial coverage using financial
derivatives such as futures and financial options. The second is the operational coverage through the
operation of the organization [10]. When managing long-term currency risk, Ito et al. [11] they affirm that
companies must develop operational coverage strategies and financial coverage strategies. The main reasons
for the hedges are the minimization of the impact of currency movements on the cash flows of the companies
and the reduction of the probability of financial problems. There are different methods to quantify currency
risk. The classic measure is variance, measuring the variance of cash flows, but currently this has focused on
using the value at risk (VaR) and the conditional value at risk (CVaR). VaR is the possible loss with a
probability and a time horizon. CVaR is the conditional expectation of losses above VaR [12-14].
Financial derivatives such as futures and options can be used to hedge exchange rate risk. There is
scientific literature focused on exposure to exchange rate risk in the futures market. However, futures
contracts are standardized in the stock exchanges and this standardization increases the liquidity risk in the
futures market. On the other hand, hedging strategies with financial options are more flexible and varied and
do not require initial margin or margin of daily variation as in the future. In addition, since financial options
are non-linear financial instruments, they could be used to cover non-linear risk [15]. The financial currency
option gives the holder the right to buy or sell an amount of foreign currency at a specific price called strike
at expiration. For hedging purposes, a company can buy purchase options against the appreciation of the
foreign currency and buy a sale option against the depreciation of the foreign currency. In this way, financial
options are widely used to manage foreign exchange risk [16, 17]. Some studies that analyze exchange rate
hedges with financial options, may refer to [2, 18-24].
The objective of this paper is to quantify the exchange risk for importers and exporters in Colombia,
evaluate some hedging strategies with financial options and determine the best strategy that minimizes the
impact of currency variations on companies. The risk is quantified by means of the VaR by the Monte Carlo
simulation method. This paper contributes to the absence of studies in the literature that analyze exchange
hedging strategies with a portfolio of options in the Colombian market. Additionally, the way to quantify the
exchange risk with the VaR is novel because most studies do so based on the variance.
2. RESEARCH METHOD
Depending on the exposure to foreign exchange risk, the way of performing coverage depends.
There are currency buyers who have a risk exposure when the spot price of the currency increases. Likewise,
there is exchange risk with the sellers of the currency when the spot price decreases. This is the market risk
that importers and exporters have, respectively. The OTC (over the counter) market in Colombia offers
financial products to mitigate this risk, which can be done using call or put options. Importers use long call
options and exporters long put options for hedging purposes. In long call options the compensation is ST - K
when the difference is positive, otherwise, the compensation is zero. In long put options the compensation is
K - ST when the difference is positive, or zero when the difference is negative. The coverage strategies with
these options are the traditional strategies. The result of coverage with these options is shown in (1) and (2),
where ST corresponds to the price paid for the currency on the expiration date of the currency, and K1 or K2
the strike prices of each of the options. As with these strategies the options are purchased, Call1 represents
the value of the Call1 option premium with K1 and Put1 the premium of the Put option with K1.
𝐵𝑢𝑦𝑒𝑟 ℎ𝑒𝑑𝑔𝑒 𝑝𝑟𝑖𝑐𝑒𝐿𝑜𝑛𝑔 𝐶𝑎𝑙𝑙 = |−𝑆𝑇 + 𝑀𝑎𝑥[𝑆𝑇 − 𝐾1;0] − 𝐶𝑎𝑙𝑙1| (1)
𝑆𝑒𝑙𝑙𝑒𝑟 ℎ𝑒𝑑𝑔𝑒 𝑝𝑟𝑖𝑐𝑒𝐿𝑜𝑛𝑔 𝑃𝑢𝑡 = 𝑆𝑇 + 𝑀𝑎𝑥[𝐾1 − 𝑆𝑇; 0] − 𝑃𝑢𝑡1 (2)
There are other options coverage strategies offered in the OTC market in Colombia that make up
financial options portfolios. These portfolios are the combination of two or more options and have an
associated name. The portfolio of options called bull call spread is useful for importers, in this hedging
strategy, call options with a low strike (K1) are purchased and call options with higher strike (K2) are sold.
For the exporters the bear call spread portfolio is offered, this strategy consists of selling Call options with
low strike price (K1) and buying call options with higher strike (K2). The results of the hedges with these two
strategies for importers are shown in (3) and (4).
𝐵𝑢𝑦𝑒𝑟 ℎ𝑒𝑑𝑔𝑒 𝑝𝑟𝑖𝑐𝑒𝐵𝑢𝑙𝑙 𝐶𝑎𝑙𝑙 𝑆𝑝𝑟𝑒𝑎𝑑 = |−𝑆𝑇 + 𝐵𝑢𝑙𝑙 𝐶𝑎𝑙𝑙 𝑆𝑝𝑟𝑒𝑎𝑑| (3)
𝑆𝑒𝑙𝑙𝑒𝑟 ℎ𝑒𝑑𝑔𝑒 𝑝𝑟𝑖𝑐𝑒𝐵𝑒𝑎𝑟 𝐶𝑎𝑙𝑙 𝑆𝑝𝑟𝑒𝑎𝑑 = 𝑆𝑇 + 𝐵𝑒𝑎𝑟 𝐶𝑎𝑙𝑙 𝑆𝑝𝑟𝑒𝑎𝑑 (4)
3. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 406 - 411
408
The two previous hedging strategies can also be done with only Puts options, these strategies are
called bull put spread for importers and bear put spread for exporters. In (5) and (6) they show the result of
the coverage with these two options portfolios.
𝐵𝑢𝑦𝑒𝑟 ℎ𝑒𝑑𝑔𝑒 𝑝𝑟𝑖𝑐𝑒𝐵𝑢𝑙𝑙 𝑃𝑢𝑡 𝑆𝑝𝑟𝑒𝑎𝑑 = |−𝑆𝑇 + 𝐵𝑢𝑙𝑙 𝑃𝑢𝑡 𝑆𝑝𝑟𝑒𝑎𝑑| (5)
𝑆𝑒𝑙𝑙𝑒𝑟 ℎ𝑒𝑑𝑔𝑒 𝑝𝑟𝑖𝑐𝑒𝐵𝑒𝑎𝑟 𝑃𝑢𝑡 𝑆𝑝𝑟𝑒𝑎𝑑 = 𝑆𝑇 + 𝐵𝑒𝑎𝑟 𝑃𝑢𝑡 𝑆𝑝𝑟𝑒𝑎𝑑 (6)
The risk profiles of the six coverage strategies mentioned above are shown in Figure 1.
Figure 1. Coverage strategies
In this paper the six coverage strategies mentioned above were applied, the comparison is made with
the scenario without coverage corresponding to the value of ST. In this way, there are seven scenarios. ST was
modeled with the geometric brownian movement shown in (7) [25].
𝑆𝑇 = 𝑆0𝑒
[(𝜇−
𝜎2
2
)∆𝑇+𝜎√∆𝑇𝜖]
(7)
In (6) S0 is the market price of the currency at the time of modeling, µ is the expected value of the
continuous returns of a currency history, σ is the standard deviation, ∆T the period of time to model and ϵ is
the continuous random variable that it distributes as a normal Standard [26, 27]. Financial options were
valued by the black-scholes and merton method with the variation for currencies shown in (8), (9) and (10)
[28].
𝑐𝑎𝑙𝑙 = 𝑆0𝑒−𝑟𝑓𝑡
𝑁(𝑑+) − 𝐾𝑒−𝑟𝑡
𝑁(𝑑−) (8)
𝑝𝑢𝑡 = 𝐾𝑒−𝑟𝑡
𝑁(−𝑑−)−𝑆0𝑒−𝑟𝑓𝑡
𝑁(−𝑑+) (9)
𝑑± =
𝑙𝑜𝑔(
𝑆0
𝐾
)+(𝑟−𝑟𝑓±
1
2
𝜎2)𝑡
𝜎√𝑡
(10)
After modeling the spot price and calculating the options premiums, a Monte Carlo simulation with
50,000 iterations was carried out to determine the possible results of the six scenarios with coverage and the
scenario without coverage. The modeling and simulation were carried out for one month, calculating in each
scenario the prices without coverage corresponding to the expected spot price and the six prices with
4. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Evaluation of options portfolios for exchange rate hedges (Miguel Jiménez-Gómez)
409
coverage. To determine the benefits of coverage, the percentiles of 5% and 95% and the standard deviation
were calculated for both the uncovered price and the six covered prices. For importers the VaR is measured
with the 95% percentile and for exporters with the 5% percentile, this way of measuring the risk corresponds
to the VaR method by Monte Carlo simulation. It is expected that with coverage the VaR will decrease and in
turn the standard deviation. If the above occurs, it would be shown that the risk is reduced with coverage, in
this case the foreign exchange risk, because the volatility of the projected scenarios would be lower and there
would be less losses.
On the other hand, daily historical data of the five-year exchange rate was used from February 2015
to February 2020, obtaining 1,225 data. Because the models used are continuous logarithmic yields were
calculated. With these yields the average represents the drift (µ) and the standard deviation represents σ for
the geometric brownian movement. For the risk-free rates of Colombia (r), the interbank rate (IBR) in effect
for one month was used, the same was done for the United States free rate (rf), the American Treasury rate in
effect for one month was used. Then, the rates were converted to continuous time and divided by 12 to have
them in the same units as µ and σ.
3. RESULTS AND ANALYSIS
Three exchange hedging strategies for importers and three strategies for exporters in Colombia were
used. Six scenarios with coverage and one scenario without coverage were obtained. With the seven
scenarios, empirical distributions were obtained using the Monte Carlo simulation. The uncovered scenario
obtained a standard deviation of $ 123, 5% percentile of $ 3,209 and 95% percentile of $ 3,614. The
objective of each proposed coverage strategy is to obtain a smaller standard deviation and depending on
whether it is for exporter or importer, increase the value of the 5% percentile and decrease the value of the
95% percentile, respectively. For the exporter, the mitigated risk is evidenced if a higher value is obtained
from the worst scenarios for a currency seller, that is, the VaR decreases. For the importer, the risk is
mitigated if the worst-case scenario, measured by the VaR (95% percentile), is lower to obtain a purchase of
the currency at a better price, that is, the 95% percentile is lower. The above is evidenced in Table 1 with the
results of the six scenarios with coverage.
Table 1. Results six scenarios with coverage
Buyer Coverage
Call Bull Call Spread Bull Put Spread
Standard deviation $ 34 $ 108 $ 108
5% percentile $ 3,329 $ 3,246 $ 3,247
95% percentile (VaR) $ 3,419 $ 3,601 $ 3,601
Seller Coverage
Put Bear Call Spread Bear Put Spread
Standard deviation $ 92 $ 108 $ 108
5% percentile (VaR) $ 3,324 $ 3,246 $ 3,247
95% percentile $ 3,588 $ 3,601 $ 3,601
Each of the scenarios with coverage manages to mitigate the exchange risk. However, the best
hedging strategy is the traditional one, both for the importer and the exporter because the empirical
distributions of these scenarios have the lowest standard deviation and lower VaR. The strategies with
options portfolio reach similar results for importer and exporter coverage. It is emphasized that the empirical
distributions of the strategies with coverage with portfolio of options have the same breadth because they
have the same standard deviation. The traditional strategies, Long Call and Long Put, are the most efficient in
exchange coverage, although with some strategies with options portfolios lower premiums are paid and in
some cases, money is received for the options premiums. Table 2 shows the value that is paid or received for
each of the coverage strategies.
Table 2. Value of premiums for each coverage strategy
Strategy Premiun
Call -$ 119.303
Put -$ 25.233
Bull Call Spread -$ 37.069
Bull Put Spread $ 12.794
Bear Call Spread $ 37.069
Bear Put Spread -$ 12.794
5. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 406 - 411
410
A comparison of the empirical distributions is shown in Figure 2. In each graph, the frequency
histogram of the strategy with coverage is shown and the empirical distribution of the scenario without
coverage is superimposed (blue line). The long call and long put strategies have no symmetric distributions.
This is due to the fact that the strikes prices of the compensations make the final result decrease if it is Call
coverage or increases if it is Put coverage. On the other hand, the empirical distributions of the strategies with
options portfolios reach similar results and it is highlighted that they are similar to the empirical distribution
of the scenario without coverage.
Figure 2. Histogram of frequency scenario without coverage and distribution scenarios with coverage
4. CONCLUSION
In this paper evaluate exchange rate hedging strategies for importers and exporters in Colombia
using financial options portfolios. To measure the exchange risk, the 5% VaR is applied with a daily time
horizon. Three coverage strategies were proposed for both importers and exporters for a total of six scenarios
with coverage. Traditional Long Call and Long Put strategies and options portfolios called Bull Call Spread,
Bear Call Spread, Bull Put Spread and Bear Put Spread were evaluated. The six hedging strategies manage to
mitigate the exchange rate risk for importers and exporters in Colombia. The above was determined by
minimizing the risk measured by the VaR. The best coverage strategies are the traditional ones, although they
are the most expensive strategies because they have the highest premium values, particularly Long Call. The
other coverage strategies have similar results among them. It is proposed to carry out the research modeling
the price of the currency with a process of jumps or process of reversion to the average with jumps and, in
addition, to evaluate more hedging strategies with financial options that are offered in the OTC market in
Colombia and evaluating them with the premium values found by the Black-Scholes and Merton method and
with a variation of zero cost strategies for the options portfolios.
REFERENCES
[1] G. Li, J. Zhu, and J. Li, “Understanding bilateral exchange rate risks,” J. Int. Money Financ., vol. 68,
pp. 103–129, 2016.
[2] X. Yu, Z. Wan, X. Tu, and Y. Li, “The optimal multi-period hedging model of currency futures and options with
exponential utility,” J. Comput. Appl. Math., vol. 366, p. 112412, 2020.
[3] E. Hutson, E. Laing, and M. Ye, “Mutual fund ownership and foreign exchange risk in Chinese firms,” J. Int.
Financ. Mark. Institutions Money, vol. 60, pp. 169–192, 2019.
[4] M. M. Arnold, A. W. Rathgeber, and S. Stöckl, “Determinants of corporate hedging: A (statistical) meta-analysis,”
Q. Rev. Econ. Financ., vol. 54, no. 4, pp. 443–458, 2014.
6. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Evaluation of options portfolios for exchange rate hedges (Miguel Jiménez-Gómez)
411
[5] Y. Ayturk, A. Osman, and S. Yanik, “Corporate derivatives use and firm value: Evidence from Turkey,” Borsa
Istanbul Rev., vol. 16, no. 2, pp. 108–120, 2016.
[6] J. Chen and T. D. King, “Corporate hedging and the cost of debt,” J. Corp. Financ., vol. 29, pp. 221–245, 2014.
[7] C. W. Smith and R. M. Stulz, “The Determinants of Firms Hedging Policies,” J. Financ. Quant. Anal., vol. 20,
no. 4, pp. 391–405, 1985.
[8] D. Sprcic and Z. Sevic, “Determinants of corporate hedging decision: Evidence from Croatian and Slovenian
companies,” Res. Int. Bus. Financ., vol. 26, no. 1, pp. 1–25, 2012.
[9] D. M. Sprčić, M. Tekavcic, and Z. Sevic, “A review of the rationales for corporate risk management: fashion or the
need?,” Int. J. Econ. Sci. Appl. Res., vol. 1, no. 1, pp. 71–99, 2008.
[10] S. Vanitha and K. Saravanakumar, “The usage of gold and the investment analysis based on gold rate in India,” Int.
J. Electr. Comput. Eng., vol. 9, no. 5, pp. 4296–4301, 2019.
[11] T. Ito, S. Koibuchi, K. Sato, and J. Shimizu, “Exchange rate exposure and risk management: The case of Japanese
exporting firms,” J. Jpn. Int. Econ., vol. 41, pp. 17–29, 2016.
[12] S. Álvarez-díez, E. Alfaro-cid, and M. O. Fernández-blanco, “Hedging foreign exchange rate risk: Multi-currency
diversification,” Eur. J. Manag. BusinessEconomics, vol. 25, no. 1, pp. 2–7, 2016.
[13] P. Jorion, Value at risk: The new benchmark for managing financial risk, New York: McGraw Hill, 2002.
[14] O. Hadzic and S. Bisanovic, “Risk assessment for ancillary services,” Int. J. Electr. Comput. Eng., vol. 9, no. 3,
pp. 1561–1568, 2019.
[15] W. Guo, X. Yu, and Y. Jun, “Trade and currency options hedging model,” J. Comput. Appl. Math., vol. 343,
pp. 328–340, 2018.
[16] M. C. Chuang, C. H. Wen, and S. K. Lin, “Valuation and empirical analysis of currency options,” Int. Rev. Econ.
Financ., vol. 66, pp. 71–91, 2020.
[17] K. H. Kim, N. U. Kim, D. C. Ju, and J. H. Ri, “Efficient hedging currency options in fractional Brownian motion
model with jumps,” Phys. A Stat. Mech. its Appl., vol. 539, p. 122868, 2020.
[18] M. Barjaktarović, D. Karic, and R. Zecevic, “Currency options in function of currency risk hedging and
speculating,” Econ. Anal., vol. 44, no. 1-2, pp. 38–46, 2011.
[19] E. Bajo, M. Barbi, and S. Romagnoli, “Optimal corporate hedging using options with basis and production risk,”
North Am. J. Econ. Financ., vol. 30, pp. 56–71, 2014.
[20] D. Lien and Y. Tse, “Hedging downside risk: futures vs. options,” Int. Rev. Econ. Financ., vol. 10, no. 2,
pp. 159–169, 2001.
[21] A. Judge, “Why and how UK firms hedge,” Eur. Financ. Manag., vol. 12, no. 3, pp. 407–441, 2006.
[22] C. S. Tai, “Asymmetric currency exposure and currency risk pricing,” Int. Rev. Financ. Anal., vol. 17, no. 4,
pp. 647–663, 2008.
[23] K. M. E. Dominguez and L. L. Tesar, “Exchange rate exposure,” J. Int. Econ., vol. 68, no. 1, pp. 188–218, 2006.
[24] J. F. Solomon and N. L. Joseph, “Which corporate hedging motives are appropriate? An institutional shareholders’
perspective,” Int. J. Financ. Econ., vol. 5, no. 4, pp. 339–347, 2000.
[25] H. Kleinert and J. Korbel, “Option pricing beyond Black–Scholes based on double-fractional diffusion,” Physica A:
Statistical Mechanics and its Applications, vol. 449, pp. 200–214, 2016.
[26] J. Hull, Options, futures, and other derivatives, 8th ed. Boston: Pearson Education, 2012.
[27] N. R. Sari, W. F. Mahmudy, A. P. Wibawa, and E. Sonalitha, “Enabling external factors for inflation rate
forecasting using fuzzy neural system,” Int. J. Electr. Comput. Eng., vol. 7, no. 5, pp. 2746–2756, 2017.
[28] F. Black and M. Scholes, “The pricing of options and corporate liabilities,” J. Polit. Econ., vol. 81, no. 3,
pp. 637–654, 1973.