Analysis and Prediction about Yields Rate of Security Investment Based on R Software

被引:0
|
作者
Wang, Lu [1 ]
Zhang, Yingying [1 ]
机构
[1] Chongqing Univ, Coll Math & Stat, Dept Stat & Actuarial Sci, Chongqing, Peoples R China
关键词
R Software; Portfolio Selection; Rate of Yield; Normal Distribution Fitting; Test of Normality; Prediction; Exponential Smoothing;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
With the fantastic spurt of science and modern technology throughout the world, employing statistical techniques as the guidance of investment has become a new trend in finance field. R software is providing us a scientific platform for effective investment. Using R software as a basic tool, this paper discusses in detail about the normality hypothesis of yields rate which plays a significant role in the portfolio selection theory by Harry Markowitz. Firstly, we conduct normal distribution fitting of the hypothesis through line chart, histogram, curve of kernel density estimation, curve of empirical distribution function, and QQ chart. Secondly, we verify the normality hypothesis by the Shapiro-Wilk test and the Kolmogorov-Smirnov test Finally we use the expectancy method and the exponential smoothing to make corresponding prediction, and arrive at the conclusion that the exponential smoothing is superior to the expectancy method.
引用
收藏
页码:171 / 176
页数:6
相关论文
共 50 条
  • [31] Prediction Model of Network Security Situation Based on Regression Analysis
    Xia Wei-wei
    Wang Hai-feng
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 616 - 619
  • [32] Study on prediction of energy security in beijing based on scenario analysis
    Liu, Yuan-Xin
    Feng, Tian-Tian
    Yang, Yi-Sheng
    Yuan, Jian-Ping
    Journal of Convergence Information Technology, 2012, 7 (23) : 425 - 434
  • [33] Network security situation prediction based on singular spectrum analysis
    Wang, Jizhi
    Hu, Bo
    Jiang, Jianguo
    Liu, Jiqiang
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 1778 - 1781
  • [34] Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing
    Suman
    Khan, R. A.
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 366 - 380
  • [35] Statement-Level Software Defect Prediction Based on Improved R-Transformer
    Zhu, Yulei
    Zhang, Yufeng
    Chen, Zhenbang
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (11)
  • [36] Security capability analysis of software-based heterogeneous redundant execution system
    Ma B.
    Zhang Z.
    Ren Q.
    Zhang G.
    Wu J.
    Zhang, Zheng (ponyzhang@126.com), 1600, Editorial Board of Journal on Communications (42): : 1 - 11
  • [37] Software architecture based inter-feature analysis of safety and security interactions
    Priyadarshini
    Greiner, Simon
    Massierer, Maike
    Aktouf, Oum-El-Kheir
    2024 19TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE, EDCC, 2024, : 165 - 168
  • [38] Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis
    Alqahtani, Mohammed A.
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [39] Feature-based software architecture analysis to identify safety and security interactions
    Priyadarshini
    Greiner, Simon
    Massierer, Maike
    Aktouf, Oum-E-Kheir
    2023 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE, ICSA, 2023, : 12 - 22
  • [40] Relationship Structure Analysis on Determinants of Enterprise Information Security Investment Decision Based on ISM
    Li X.
    Du S.
    IEEE Engineering Management Review, 2022, 50 (03): : 200 - 212