By: David Johnston, James Mataras, Jesse Pirnat, Daniel Sanchez, Eric Shaw, Sean Vazquez, Brad Warren Stevens Institute of Technology Department of Quantitative.

Slides:



Advertisements
Similar presentations
Cover Slide ~ Semantic Web Pilot Program Elements ~ Presented by Cola Atkinson – BBN 07 May 2003.
Advertisements

DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Integrated Banking Systems Introduction: IBS-ITech combines powerful central accounting with the capacity to allow the work team to use automated, customizable.
Chapter 1 Business Driven Technology
First create and sign up for a blue host account Through the help of Blue Host create a WordPress website for the business After you created WordPress.
BI Web Intelligence 4.0. Business Challenges Incorrect decisions based on inadequate data Lack of Ad hoc reporting and analysis Delayed decisions.
TK 6413 / TK 5413 : ISLAMIC RISK MANAGEMENT TOPIC 6: VALUE AT RISK (VaR) 1.
Financial Risk Management Framework - Cash Flow at Risk
Quantsmile: Quantitative Portfolio Management Quantsmile: Quantitative Portfolio Management.
Factor Model Based Risk Measurement and Management R/Finance 2011: Applied Finance with R April 30, 2011 Eric Zivot Robert Richards Chaired Professor of.
Sagecrm.com/7.2 Introducing Sage CRM 7.2 Mark Green Business Consultant Pinnacle.
Gibbs Sampling Qianji Zheng Oct. 5th, 2010.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
FIN 685: Risk Management Topic 5: Simulation Larry Schrenk, Instructor.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Mr. Perminous KAHOME, University of Nairobi, Nairobi, Kenya. Dr. Elisha T.O. OPIYO, SCI, University of Nairobi, Nairobi, Kenya. Prof. William OKELLO-ODONGO,
Business Plug-In B2 Business Process.
Privileged and Confidential Strategic Approach to Asset Management Presented to October Urban Water Council Regional Seminar.
Application of SAS®! Enterprise Miner™ in Credit Risk Analytics
Accounts management software simplifies the process of accounting for any individual or for an organization. 3 Star Info takes utmost effort so that beyond.
IMA CIM Overview. IMA Mission “Provide a knowledge-sharing platform for business professionals where proven Internet.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Modeling Framework Generally modeling framework is made up of the following components: A set of biophysical modules that simulate biological and physical.
Estimating Market Value-at- Risk Using GPUs NVIDIA GPU Developer’s Summit, 2009 Matthew Dixon 1 Jike Chong 2 1 Department of Computer Science, UC Davis.
Firm-wide, Corporate Risk Management Risk Management Prof. Ali Nejadmalayeri, Dr N a.k.a. “Dr N”
1 Sustainable Withdrawal Rates and How Alternative Strategies Affect the Heirs Peter James Lingane, EA, CFP® Financial Security by Design Lafayette, CA.
CRESCENDO Full virtuality in design and product development within the extended enterprise Naples, 28 Nov
MBAD/F 619: Risk Analysis and Financial Modeling Instructor: Linda Leon Fall 2014
PO320: Reporting with the EPM Solution Keshav Puttaswamy Program Manager Lead Project Business Unit Microsoft Corporation.
Managing Organizations Informed decision making as a prerequisite for success Action Vision Mission Organizational Context Policies, Goals, and Objectives.
Using Business Scenarios for Active Loss Prevention Terry Blevins t
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Creating a Shared Vision Model. What is a Shared Vision Model? A “Shared Vision” model is a collective view of a water resources system developed by managers.
Client Confidential - Call for more information Telemet Orion The Smart Choice Integrates Integrates Portfolio Analytics and Attribution Portfolio.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Optimizing Multi-Period DFA Systems Professor John M. Mulvey Department of OR and Financial Engineering Bendheim Center for Finance Princeton University.
Chapter McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Risk and Capital Budgeting 13.
.  A multi layer architecture powered by Spring Framework, ExtJS, Spring Security and Hibernate.  Taken advantage of Spring’s multi layer injection.
Quantitative Project Risk Analysis 1 Intaver Institute Inc. 303, 6707, Elbow Drive S.W., Calgary AB Canada T2V 0E5
Intaver Institute Inc. Project and Portfolio Risk Management with RiskyProject Enterprise Project and Portfolio Risk Management with RiskyProject Enterprise.
New Trends in ALM Methodologies
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
© 2009 IBM Corporation Maximize Cost Savings While Improving Visibility Into Lines of Business Wendy Tam, CDC Product Marketing Manager
CSCE 548 Secure Software Development Security Operations.
Market Risk.
E-BILLING MOTIVATION. Introduction  E-billing is the electronic delivery of financial documents to the customer, that represents and replaces the conventional.
SUBLIME METRICS Group: Daniyal Ahmed M. Hashir Rizwan Rimsha Kabir JAN 2015 Supervisor: Dr. Abdul Basit Shaikh.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Web Technologies Lecture 6 State preservation. Motivation How to keep user data while navigating on a website? – Authenticate only once – Store wish list.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware iCARE : A Framework for Big Data Based.
PORTFOLIO MANAGEMENT.
PROPRIETARY  2003 Data Research Analysis & Consultancy Solutions All Rights Reserved. This is achieved by: Improving availability / reducing stock outs.
1 CASE STUDY ON DEUTSCHE BANK MARKET RISK MANAGEMENT SUBMITTED BY SNEHA B. SHAH SUBMITTED TO MS. MUDRA MISTRY 1.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Mobilizing Your SAS® Business Analytic Reports Falko Schulz Sr. Systems Engineer SAS Australia & New Zealand.
Strategic Information Systems Planning
Makes Insurance Smarter.
COMPANY NAME.
Updating the Value Proposition:
ANOMALY DETECTION FRAMEWORK FOR BIG DATA
Risk Management Basics
Attention CFOs How to tighten your belt and still survive May 18, 2017.
Security Engineering.
Personal Finance Portfolio Management App for Better ROI and Control As portfolios become more diverse, they naturally become more complex. This increased.
Model-Driven Analysis Frameworks for Embedded Systems
KEY INITIATIVE Financial Data and Analytics
SIMULATION IN THE FINANCE INDUSTRY BY HARESH JANI
Process Wind Tunnel for Improving Business Processes
Presentation transcript:

By: David Johnston, James Mataras, Jesse Pirnat, Daniel Sanchez, Eric Shaw, Sean Vazquez, Brad Warren Stevens Institute of Technology Department of Quantitative Finance: Professor Calhoun Department of Computer Science: Professor Klappholz

Table of Contents  Introduction  Requirements  Software Design  Features  Financial Models  Security  Challenges

Introduction  System will enable more efficient and effective portfolios and risk management  Providing tools and analytics to drive investment decisions  Tools to support portfolio construction, position and trade analysis, risk metrics, and monitoring performance  System features a market model to help identify risks and trading opportunities  Client may leverage these tools to build a custom strategy based on quantitative analysis

Objectives  Provide access to stock data without the need to pay for a subscription data source  Manage virtual trading accounts  Track portfolio performance  Risk forecasts and analytics  Analyze potential trades

Functional Requirements  Portfolio Tracking  Input a portfolio and enter trades in the system  From the online feed for market data, system will provide updated quotes and charting capability for viewing portfolio performance  Portfolio will be made up of cash and long equities  Will not maintain a margin account  Risk Management  System shall provide portfolio risk metrics  Volatility forecasts  Scenario analysis  Sensitivities and correlations  Value-at-Risk  User may also drill down to position-level granularity

Functional Requirements Cont.  Trade Analysis  With the risk management technology, the user shall be able to:  Analyze potential trades  Assess risk and return  See the effects on the portfolio as a whole

Software Design

Features and Usability  Multi platform usability  iPhone, Android, Tablet, Laptop/Desktop  Instant Access to Profile data and online data  Save all data on your profile online  Detailed graphing interface  No installation required!

Factor Model  Stock returns are explained by a set of factors  As well as an idiosyncratic component  We use 4 factors  Total market return  Market cap  Value  Momentum  Makes for a tractable model  Dimensionality reduction  Intuition

Regime Switching  Define a latent variable for the current regime  Returns in each regime are determined by a factor model with different parameters  Model dynamics using a Hidden Markov Model (HMM)  Regime transitions are described by a Markov process  Model calibration is data driven, using Machine Learning  Bayesian inference  Expectation-Maximization algorithm  Advantages over traditional factor models  Traditional factor models are Gaussian and stationary  Regime switching can generate behavior that better approximates empirical market dynamics  E.g. fat tails, heteroskedasticity, leverage effect, time-varying correlations

Forecasts and Analytics  Monte Carlo simulation based on model  Forecasts the distribution of returns  Perform risk analysis based on simulation results  Return and volatility forecasts  Value at Risk  Marginal impact of individual positions and potential trades

Security Requirements  Confidentiality  User Information  Account Password  Anonymity  Integrity  Data loss prevention  Data modification restrictions  Accessibility  In production: accessible anywhere at any time  Currently: only accessible on Stevens Campus

Security Risks  User Accounts  Session Management  Authentication Mechanisms  Data Communication  Source Verification  HTTPS  Input Validation  XSS, JavaScript Injection, SQL Injection etc.  Denial of Service (DoS)

Challenges: Implementation  Interfacing with live data  Integrating different technologies and algorithms in application  Wt C++ Framework  Caused significant setbacks  Was not familiar with any of the standard web tools and technologies: HTML5, CSS3, JavaScript, jQuery  Time constraints after moving off original Wt C++ web toolkit  Did not know about responsive web design  Gained familiarity and understanding of the traditional web technologies  Gained exposure to widely used Twitter Bootstrap framework and learned how responsive web design is done.

Challenges: Financial Modeling  Model research and development  Literature research and applied quantitative analysis  Algorithm implementation  Efficiency is critical  Data acquisition  Bloomberg Terminal  Data cleaning  Size of historical dataset