Skip to main content
Log in

On formation of security portfolio with uniform distribution by logarithmic criterion and priority risk component

  • Control in Social Economic Systems, Medicine, and Biology
  • Published:
Automation and Remote Control Aims and scope Submit manuscript

Abstract

Consideration was given to the optimal formation of the security portfolio by the logarithmic criterion for two uniformly distributed risk securities and one riskless security. For the criterial function, concavity was established and the explicit form was presented, the lower and upper estimates of the criterial function and their corresponding strategies were determined. An example of using the relations obtained was discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kibzun, A.I., Goryainova, E.R., and Naumov, A.V., Teoriya veroyatnostei i matematicheskaya statistika. Bazovyi kurs s primerami i zadachami (Probability Theory and Mathematical Statistics. Basic Course with Examples and Problems), Moscow: Fizmatlit, 2007.

    Google Scholar 

  2. Kan, Yu.S. and Kibzun, A.I., Zadachi stokhasticheskogo programmirovaniya s veroyatnostnymi kriteriyami (Problems of Stochastic Programming with Probabilistic Criteria), Moscow: Fizmatlit, 2009.

    MATH  Google Scholar 

  3. Markowitz, H.M., Portfolio Selection, J. Finance, 1952, vol. 7, no. 1, pp. 77–91.

    Google Scholar 

  4. Kelly, J.L., A New Interpretation of Information Rate, Bell Syst. Tech. J., 1956, no. 35, pp. 917–926.

    Google Scholar 

  5. Ziemba, W.T. and Wickson, R.G., Stochastic Optimization Models in Finance, Singapore: World Scientific, 2006.

    Book  MATH  Google Scholar 

  6. MacLean, L.C., Thorp, E.O., Zhao, Y., et al., How Does the Fortune’s Formula Kelly Capital Growth Model Perform?, J. Portfolio Manag., 2011, vol. 37, no. 4, pp. 96–111.

    Article  Google Scholar 

  7. Nesterov, Yu.E., Polyak, B.T., and Nazin, S.A., Vvedenie v vypukluyu optimizatsiyu (Introduction to Convex Optimization), Moscow: MTsNMO, 2010.

    Google Scholar 

  8. Vanderbei, R.J. and Shanno, D.F., An Interior-Point Algorithm for Nonconvex Nonlinear Programming, Comput. Optim. Appl., 1999, vol. 13, nos. 1–3, pp. 231–252.

    Article  MATH  MathSciNet  Google Scholar 

  9. Benson, H.Y., Shanno, D.F., and Vanderbei, R.J., Interior-Point Methods for Nonconvex Nonlinear Programming: Filter Methods and Merit Functions, Comput. Optim. Appl., 2002, vol. 23, no. 2, pp. 257–272.

    Article  MATH  MathSciNet  Google Scholar 

  10. Shiryaev, A.N., Veroyatnost’ (Probability), Moscow: MTsNMO, 2004.

    Google Scholar 

  11. Fikhtengol’ts, G.M., Kurs differentsial’nogo i integral’nogo ischisleniya (Course of Differential and Integral Calculus), Moscow: Fizmatlit, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. N. Ignatov.

Additional information

Original Russian Text © A.N. Ignatov, A.I. Kibzun, 2014, published in Avtomatika i Telemekhanika, 2014, No. 3, pp. 87–105.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ignatov, A.N., Kibzun, A.I. On formation of security portfolio with uniform distribution by logarithmic criterion and priority risk component. Autom Remote Control 75, 481–495 (2014). https://doi.org/10.1134/S0005117914030060

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0005117914030060

Keywords

Navigation