Not a big fun of option though I do love Monte Carlo method. A bank has written a call option on one stock and a put option on another stock. Fo

 

Financial engineering problem…

Not a big fun of option though I do love Monte Carlo method. A bank has written a call option on one stock and a put option on another stock. For the first option the stock price is 50, the strike price is 51, the volatility is 28% per annum, and the time to maturity is 9 months. For the second option the stock price is 20, the strike price is 19, and the volatility is 25% per annum, and the time to maturity is 1 year. Neither stock pays a dividend. The risk-free rate is 6% per annum, and the correlation between stock price returns is 0.4.

1. Using C/C++ or Java or Matlab to calculate the 10-day 99% Monte Carlo Simulation based VaR for the portfolio. Set the number of simulation to 5000.

2. What else data is required to calculate the 10-day 99% Historical based VaR for the portfolio?

The Future of Your Personal Data - Privacy vs Monetization | Stuart Lacey | TEDxBermuda

all assignments for professor foley

1.Prepare a one to two page paper on some of the various types of data mining and statistical software and the features thereof.  Please double space your paper and cite your sources.

2.  After observing the TED Talk on Big Data, prepare a one page paper on the TED Talk

https://www.ted.com/talks/tricia_wang_the_human_insights_missing_from_big_data/reading-list?rss

3.  Prepare a one page paper on Data Mining Methods. You may research the internet for more information. Please double space your paper and cite your sources. 

4.  

After viewing the following Ted Talk on Big Data and privacy, prepare a one page paper on this Ted Talk topic “The Future of your Personal Data”.

The Future of Your Personal Data – Privacy vs Monetization | Stuart Lacey | TEDxBermuda (Links to an external site.)The Future of Your Personal Data - Privacy vs Monetization | Stuart Lacey | TEDxBermuda 

What are some steps that you can do to protect yourself online?

Please double space your paper and cite your sources.

Cloud Computing and Digital Forensics

Review in 500 words or more the video below called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Statistical analysis using R

  

Final Exam DPEE

Note: 

· For demonstrating conceptual understanding, you are required to work on the model that is easier to handle or compute, not necessarily the more suitable (or more complicated) model for the dataset. Follow the question description. 

· You don’t need to check the assumption of a model unless the question asks for it. For example, if the question asks you to make prediction based on a model, you don’t need to check the assumption for the model before making prediction. 

· For any of the testing (hypothesis test) problem, define Ho/Ha, compute the test statistic, report the exact p value, and state the conclusion. The default alpha value is 5%, unless specify. 

· Elaborate your reasoning clearly and show relevant plots, R results, and tables to support your opinion in each step and conclusion. 

· Submit the Rmd file and the corresponding pdf file knitted from it, along with your answer, this format is similar to your homework. 

· The data is real, just like the project you are working on. Hence it is possible that even after the remedial method has been done, the model is still not perfect. When this happens, evaluation will be based on the level you execute the methods covered in Stat512 to improve the model. Don’t worry if your model is not perfect, try your best to demonstrate the skill set you learn in this class. 

Study the data with a linear analysis and complete the problems. The data set, dataDPEE.csv has 3 continues predictors and two categorical predictors. 

  

Problem 1. Consider only the first order model with X1, X2 and X3, perform the following hypothesis. 

a. (10) whether X1 can be dropped from the full model. 

> dpeemod <- lm(y ~ x1 + x2 + x3)

> plot(dpee)

> summary(dpeemod)

Call:

lm(formula = y ~ x1 + x2 + x3)

Residuals:

Min 1Q Median  3Q Max 

-15.948 -11.640 -1.480 6.402 31.650 

Coefficients:

Estimate Std. Error t value Pr(>|t|) 

(Intercept) 90.79017 22.07408 4.113 0.00106 **

x1 -0.68731 0.47959 -1.433 0.17377 

x2 -0.47047 0.24227 -1.942 0.07254 . 

x3 -0.06845 0.46523 -0.147 0.88513 

Signif. codes: 0 ‘***’ 0.001 ‘**’ 0.01 ‘*’ 0.05 ‘.’ 0.1 ‘ ’ 1

Residual standard error: 14.75 on 14 degrees of freedom

Multiple R-squared: 0.6257, Adjusted R-squared: 0.5455 

F-statistic: 7.8 on 3 and 14 DF, p-value: 0.002652

 

Ho: X1 is significant and cannot be dropped from the model.

Ha: X1 can be dropped from the model. 

Using the model Y~X1 + X2 + X3, 

b. (10) whether X1 can be dropped from the model containing only X1 and X2. 

  

Problem 2 (10) Consider the first order model with X1, X2 and X3, simultaneously estimate parameters (beta1, beta2 and beta3)  with a confidence level of 75%. 

  

Problem 3 (20) Perform appropriate analysis to diagnose the potential issues with the first order full mode with X1 X2 and X3, improve the model as much as possible with the methods covered in Stat512. You should also consider the assumption checking for your revised model.  

  

Problem 4 

a. (10) Compute AIC, BIC, and PRESSP to compare the following two models. 

· The model on the first order terms for X1 and X2 and the interaction term X1X2.

· The model on the first order terms for X1, X2 and X3 

Do they all yield the same better model? If not, explain. 

b. (10) Select the model that you think is better to predict the mean response value, then predict the mean response for the following case, at a confident level of 99%. 

  

x1

x2

x3

 

45

36

45

Problem 5 

X4 and X5 are two factors on Y.

a. (10) Is there any significant interaction effect between X4 and X5 on Y? 

b. (10) With the ANOVA method, compute the 95% confidence interval for the following difference, respectively: 

D1= The difference in the mean of Y when (X4=high, X5=less) and (X4=high, X5=more) 

D2= The difference in the mean of Y when (X4=low, X5=less) and (X4=low, X5=more) 

c. (10) With the ANOVA method, compute the 95% confidence interval for 

D1-D2

Where D1 and D2 are described in b. 

How is your result related to a? 

Interm1

  For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available. You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format. 

ITM- Graded assignment 2

 You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be? 

Practical connection to the Subject

Subject Name : Business Intelligence

Assignment:

Provide a reflection of at least 500 words  (double spaced) of how the knowledge, skills, or theories of  this course have been applied, or could be applied, in a practical  manner to your current work environment. If you are not currently  working, share times when you have or could observe these theories and  knowledge could be applied to an employment opportunity in your field of  study. 

Requirements:

Provide a 500 word (double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you  are not employed, demonstrate a connection to your desired work  environment. 

Note:  I am currently not applied so you can write this assignment as how the subject knowledge is used for  future