Heavy-tailed value-at-risk analysis for Malaysian stock exchange
This article investigates the comparison of power-law value-at-risk (VaR) evaluation with quantile and non-linear time-varying volatility approaches. A simple Pareto distribution is proposed to account the heavy-tailed property in the empirical distribution of returns. Alternative VaR measurement su...
| Main Author: | CHIN, W |
|---|---|
| Format: | Article |
| Published: |
ELSEVIER SCIENCE BV
2008
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2656/ |
Similar Items
Stock Trend Prediction With Neural Network Techniques
by: Mohd Haris Lye Abdullah,
Published: (2003)
by: Mohd Haris Lye Abdullah,
Published: (2003)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
KM implementation in Malaysian telecommunication industry: An empirical analysis
by: Chong, Chin Wei, et al.
Published: (2006)
by: Chong, Chin Wei, et al.
Published: (2006)
A Comparison Between Inter-Asterisk eXchange
Protocol and Jingle Protocol: Session Time
by: Haj Aliwi, H. S., et al.
Published: (2016)
by: Haj Aliwi, H. S., et al.
Published: (2016)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Numerical And Approximate- Analytical Solution Of Fuzzy Initial Value Problems
by: Al-Jassar, Ali Fareed Jameel
Published: (2015)
by: Al-Jassar, Ali Fareed Jameel
Published: (2015)
Fuzzy-Monte Carlo Simulation For Risk Analysis In Investment Project Evaluation
by: Hamundu, Ferdinand Murni
Published: (2011)
by: Hamundu, Ferdinand Murni
Published: (2011)
The Returns of Variable Moving Average Rules in China, Hong Kong, Singaporean and Malaysian Stock Markets
by: Ming-Ming, Lai, et al.
Published: (2008)
by: Ming-Ming, Lai, et al.
Published: (2008)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
S-Cart, Intelligent self check-out trolley in hypermarket.
Creation of value proposition for intelligent self-checkout trolley.
by: Koh, Peik See
Published: (2010)
by: Koh, Peik See
Published: (2010)
Health Technos Private Limited (HTPL)
Intelligent Health Monitoring System
(IHMS)
Identification Of Criteria For Assessing
Risk Factors In Diabetes And Hypertension
by: Syed Abdul, Benzakhlr Faizal
Published: (2009)
by: Syed Abdul, Benzakhlr Faizal
Published: (2009)
Identifying Criteria For The Implementation Of Augmented Reality In Malaysian Tourism Industry
by: Ahmed, Abdul Salam Waqar
Published: (2022)
by: Ahmed, Abdul Salam Waqar
Published: (2022)
Social Sciences, Arts And Humanities Research Collaboration: The Malaysian Coverage
by: Hussain, Husriati
Published: (2014)
by: Hussain, Husriati
Published: (2014)
The Use Of Graphic Calculators In Malaysian Secondary Schools:Students Perception And Teachers Constraints.
by: Hasan, Husna, et al.
Published: (2005)
by: Hasan, Husna, et al.
Published: (2005)
An ant algorithm for single-hop wavelength assignment in WDM mesh network
by: Chin, , TS
Published: (2005)
by: Chin, , TS
Published: (2005)
"To Tell Or Not To Tell?" : Incorporating Disclosure And Privacy Requirements In Web Portal Design For Malaysian Cancer Patients.
by: Zakaria, Nasriah
Published: (2007)
by: Zakaria, Nasriah
Published: (2007)
Parametric and non-parametric approaches in evaluating martingale hypothesis of energy spot markets
by: Cheong, Chin Wen
Published: (2011)
by: Cheong, Chin Wen
Published: (2011)
E-Blook: Study Of The Acceptance Level Of Malaysian Bloggers To Adopt Collaborative Writing Medium To Self-Publish Ebook.
by: Wong, Si-Maan
Published: (2010)
by: Wong, Si-Maan
Published: (2010)
Antecedents And Consequences Of Cyberloafing Among Knowledge Workers In Malaysian Msc Status Companies: The Moderating
Effect Of Duration On
Cyberloafing Breaks
by: Saidin, Siti Salina
Published: (2019)
by: Saidin, Siti Salina
Published: (2019)
A Menu Planning Model Using Hybrid Genetic Algorithm And Fuzzy Reasoning: A Study On Malaysian Geriatric Cancer Patients
by: Ngo , Hea Choon
Published: (2016)
by: Ngo , Hea Choon
Published: (2016)
Profiling Ict Academics At Malaysian
Research Universities (Rus) On Their
Commercialization Approaches
Based On Personal Attributes: A
Grounded Theory Study
by: Othman, Hafizul
Published: (2015)
by: Othman, Hafizul
Published: (2015)
A Bayesian approach to classify conference papers
by: Khor, , Kok-Chin, et al.
Published: (2006)
by: Khor, , Kok-Chin, et al.
Published: (2006)
Predictive call admission control algorithm for power-controlled wireless systems
by: Chin, Choong Ming, et al.
Published: (2006)
by: Chin, Choong Ming, et al.
Published: (2006)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
A HYBRID GENETIC ALGORITHM FOR OPTICAL ORTHOGONAL CODE CONSTRUCTION
by: Ho, C. K., et al.
Published: (2003)
by: Ho, C. K., et al.
Published: (2003)
Benchmark circuit complexity validation using binary decision diagram characteristics
by: Mills,, Bruce, et al.
Published: (2006)
by: Mills,, Bruce, et al.
Published: (2006)
Image analysis by Tchebichef moments
by: Mukundan, Ramakrishnan, et al.
Published: (2001)
by: Mukundan, Ramakrishnan, et al.
Published: (2001)
An Efficiency Analysis Of Seaports Using Extended
Window Analysis, Malmquist Index And Simar-wilson
Approach
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
Probabilistic ensemble simplified fuzzy ARTMAP for sonar target differentiation
by: Loo, Chu Kiong, et al.
Published: (2006)
by: Loo, Chu Kiong, et al.
Published: (2006)
CPT212 – Design & Analysis of Algorithms
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CIT504 – ANALYSIS, DESIGN AND MANAGEMENT OF INFORMATION SYSTEMS
CSI503 – INFORMATION SYSTEM ANALYSIS AND DESIGN - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
Analysis on spatial and temporal features of gait kinematics
by: Wan Noorshahida Mohd Isa,
Published: (2005)
by: Wan Noorshahida Mohd Isa,
Published: (2005)
Lexical Functions For Ants Based Semantic Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Cancer Diet System: User Requirement Analysis
by: Saludin, Farhana Aini
Published: (2010)
by: Saludin, Farhana Aini
Published: (2010)
Topic Modeling in Sentiment Analysis: A Systematic Review
by: Toqir A., Rana, et al.
Published: (2016)
by: Toqir A., Rana, et al.
Published: (2016)
CPT 201- DESIGN & ANALYSIS OF ALGORITHMS OKT 04
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CTD 502 - SYSTEM ANALYSIS AND DESIGN SEPT 1997.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1997)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1997)
Similar Items
-
Stock Trend Prediction With Neural Network Techniques
by: Mohd Haris Lye Abdullah,
Published: (2003) -
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007) -
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006) -
KM implementation in Malaysian telecommunication industry: An empirical analysis
by: Chong, Chin Wei, et al.
Published: (2006) -
A Comparison Between Inter-Asterisk eXchange
Protocol and Jingle Protocol: Session Time
by: Haj Aliwi, H. S., et al.
Published: (2016)