The technology described herein relates generally to portfolio management and more specifically to risk calculation in portfolio management.
In conducting portfolio management, it is often desirable to identify the risk involved with certain investments to help determine the attractiveness of an investment instrument or combination of investment instruments. For example, one may desire to identify a value at risk associated with an investment portfolio. A value at risk measure (VaR) summarizes the worst loss over a target horizon with a given level of confidence.
Systems and methods are provided for simulating a portfolio risk of a portfolio managed according to one or more portfolio management rules. An initial holding amount of an investment instrument may be received, and a portfolio management rule may be received. One or more risk factors may be simulated a first time period into the future. An adjustment amount is determined based on the portfolio management rule and the one or more risk factors simulated a first time period into the future and the holding amount of the investment instrument may be adjusted based on the adjustment amount. The one or more risk factors may be simulated a second time period into the future, and a portfolio risk value may be calculated based on the adjusted holding amount and the one or more risk factors simulated a second time period into the future.
As another example, a system may include a data processor and a computer-readable memory, where the computer-readable memory includes instructions for commanding the data processor to perform a method. In the method, an initial holding amount of an investment instrument may be received, and a portfolio management rule may be received. One or more risk factors may be simulated a first time period into the future. An adjustment amount is determined based on the portfolio management rule and the one or more risk factors simulated a first time period into the future and the holding amount of the investment instrument may be adjusted based on the adjustment amount. The one or more risk factors may be simulated a second time period into the future, and a portfolio risk value may be calculated based on the adjusted holding amount and the one or more risk factors simulated a second time period into the future.
As a further example, a computer-readable memory may be encoded within instructions for commanding a data processor to perform a method. In the method, an initial holding amount of an investment instrument may be received, and a portfolio management rule may be received. One or more risk factors may be simulated a first time period into the future. An adjustment amount is determined based on the portfolio management rule and the one or more risk factors simulated a first time period into the future and the holding amount of the investment instrument may be adjusted based on the adjustment amount. The one or more risk factors may be simulated a second time period into the future, and a portfolio risk value may be calculated based on the adjusted holding amount and the one or more risk factors simulated a second time period into the future.
In traditional risk management, portfolios are assumed static (e.g., they do not change over time and market states). While this assumption may be appropriate for market risk management over a short time horizon, such an approach may be undesirable in other contexts where longer time horizons are the focus. Thus, a portfolio simulator 104 may enable a risk management system that better accommodates the dynamic nature of a portfolio.
Dynamic trading strategies allow one to track risk over time, rather than using a static framework with a single time step or a model for extrapolating risk. Trading strategies can be modeled through event-based rules. For example, arbitrary rules may be applied that take any information from a scenario and use that information to adjust the portfolio, resulting in a portfolio whose composition is both time-dependent and scenario-dependent to more accurately represent an actively managed portfolio. Stop-loss orders, delta hedging, duration matching, and other strategies may be represented by one or more portfolio management rules that can be simulated by a portfolio simulator. The introduction of dynamic trading strategies enables tools of risk management, such as Monte Carlo simulation, historical simulation, covariance simulation, scenario simulation, and stress testing to be applied to asset/liability and credit management situations. Such valuation models that account for portfolio effects can significantly improve the accuracy of calculations. A dynamic portfolio may be modeled utilizing one or more portfolio management rules. Such rules may be easy to communicate and can capture the nature of a firm's behavior, while being robust under uncertainty.
The users 102 can interact with the portfolio simulator 104 through a number of ways, such as over one or more networks 108. Server(s) 106 accessible through the network(s) 108 can host the portfolio simulator 104. One or more data stores 110 can store the data to be analyzed by the portfolio simulator 104 as well as any intermediate or final data generated by the portfolio simulator 104. The one or more data stores 110 may contain many different types of data associated with the process, including risk factor data 112, portfolio management rules 114, as well as other data. The portfolio simulator 104 can be an integrated web-based reporting and analysis tool that provides users flexibility and functionality for simulating a portfolio risk. It should be understood that the portfolio simulator 104 could also be provided on a stand-alone computer for access by a user 102.
A portfolio may include financial instruments, such as stocks, options, and futures; credit instruments, such as loans, bonds, and options; commodities, such as gas, pork bellies, and wheat; and currencies, such as the Japanese Yen, the U.S. Dollar, and the British Pound. The value of a portfolio may be calculated according to the following formula:
where N is the number of instruments in the portfolio, R is the number of risk factors, rfj is the value of risk factor j, hi is the number of holdings of instrument i, and pi(rf1, rf2, . . . , rfR) represents the value (price) of instrument i, as a function of risk factors 1 . . . R.
The value of the examples described above may be somewhat limited in that the holdings of the portfolios are assumed to be constant at each step. This assumption may not be realistic for longer time horizons (e.g., greater than 2 days), where adjustments to the portfolio may be made, such as is the case in credit risk and asset liability management.
At 502, the system is initialized to include the time horizon for the simulation (T), the size of the time step to be taken at each generation t, where t≦T, and the number of draws to be taken at each time step, n. The system is primed with a base case at 504. For example, the base case may include starting values for all of the risk factors, instruments, holdings, and initial portfolio value. A time step is taken at 506, where, at 508, each risk factor is perturbed n times from the base case, giving n simulated market states at a first time period in the future, where rfj,d,1=rfj,0,0+εj,d,1, where rfj,d,t is the value of risk factor j along draw path d in {1, 2, . . . , n} at time t, εj,d,t is a random adjustment computed from a random draw, and rfj,0,0 is the base case value for risk factor j.
At 510, for each of the simulated market states d in {1, 2, . . . , n}, the portfolio is priced. At 512, trading strategies may be run. For example, trading strategies may be represented by one or more portfolio management rules that are evaluated at 512. A collection of one or more portfolio management decision rules can be used to represent a user's (firm's) behavior. Implementations of rules can leverage a broad range of technologies, such as from the field of artificial intelligence. A decision rule may take the form of if ( . . . ) then ( . . . ). The decision rule has a left side and a right side. The left side is matched against what is true in the world (facts) or what is believed to be true (beliefs). The right hand side describes what actions should be taken given the left hand side is, or is believed to be, true. Facts can be represented using predicate logic, first-order logic, or higher order logics. Beliefs may be represented by belief networks, neural networks, or any reasoning technology such as probabilistic or deterministic. Actions may be many things, such as asserting new facts about the world, updating databases, updating beliefs, computing results.
Decision rules can be grouped to form portfolio management trading strategies. The rules within a trading strategy can execute within an expert system. Expert systems are very good for modeling expert behavior. An expert system may allow rules to run in parallel, represent knowledge through higher order logics, reach inferences through forward chaining, and construct facts through backward chaining. Expert systems may also simplify the construction of robust rules and allow for efficient execution of forward chaining, such as via the CLIPS system. The use of forward chaining may capture non-linear relationships between rules.
With reference back to
Holding 1: h1,0,0=10;
Holding 2: h2,0,0=10;
Price of holding 1: p1(rf1, rf2, rf3)=rf1+10;
Price of holding 2: p2(rf1, rf2, rf3)=rf2+rf3;
Time steps: s=2;
Draws: d=10.
The risk factors and prices of the holdings at t=0 are:
rf1,0,0=4
rf2,0,0=2
rf3,0,0=7
p1(rf1,0,0,rf2,0,0,rf3,0,0)=14
p2(rf1,0,0,rf2,0,0,rf3,0,0)=11,
which results in an initial portfolio value of (14*10)+(9*10)=230. The following portfolio management rules are to be applied as a trading strategy for the simulation:
1. if p2(rf1,d,s,rf2,d,s,rf3,d,s)≦5 then h2,d,s=½h2,d,(s−1) and h1,d,s=h1,d,(s−1)+2; and
2. if h1,d,s−h2,d,s≧10 then h2,d,s=h2,d,(s−1)+1 and h1,d,s=h1,d,(s−1)−1.
Table 1, depicted in
The value at risk calculation for the first time step is calculated based on the confidence level of 90%. In this example, the worst return at a 90% confidence interval is −31% at draw d=1, which corresponds with a value at risk of 73.
Table 5, depicted in
A disk controller 960 interfaces with one or more optional disk drives to the system bus 952. These disk drives may be external or internal floppy disk drives such as 962, external or internal CD-ROM, CD-R, CD-RW or DVD drives such as 964, or external or internal hard drives 966. As indicated previously, these various disk drives and disk controllers are optional devices.
Each of the element managers, real-time data buffer, conveyors, file input processor, database index shared access memory loader, reference data buffer and data managers may include a software application stored in one or more of the disk drives connected to the disk controller 960, the ROM 956 and/or the RAM 958. Preferably, the processor 954 may access each component as required.
A display interface 968 may permit information from the bus 952 to be displayed on a display 970 in audio, graphic, or alphanumeric format. Communication with external devices may optionally occur using various communication ports 972.
In addition to the standard computer-type components, the hardware may also include data input devices, such as a keyboard 973, or other input device 974, such as a microphone, remote control, pointer, mouse and/or joystick.
This written description uses examples to disclose the invention, including the best mode, and also to enable a person skilled in the art to make and use the invention. The patentable scope of the invention may include other examples. For example, the systems and methods may include data signals conveyed via networks (e.g., local area network, wide area network, internet, combinations thereof, etc.), fiber optic medium, carrier waves, wireless networks, etc. for communication with one or more data processing devices. The data signals can carry any or all of the data disclosed herein that is provided to or from a device.
Additionally, the methods and systems described herein may be implemented on many different types of processing devices by program code comprising program instructions that are executable by the device processing subsystem. The software program instructions may include source code, object code, machine code, or any other stored data that is operable to cause a processing system to perform the methods and operations described herein. Other implementations may also be used, however, such as firmware or even appropriately designed hardware configured to carry out the methods and systems described herein.
The systems' and methods' data (e.g., associations, mappings, data input, data output, intermediate data results, final data results, etc.) may be stored and implemented in one or more different types of computer-implemented data stores, such as different types of storage devices and programming constructs (e.g., RAM, ROM, Flash memory, flat files, databases, programming data structures, programming variables, IF-THEN (or similar type) statement constructs, etc.). It is noted that data structures describe formats for use in organizing and storing data in databases, programs, memory, or other computer-readable media for use by a computer program.
The computer components, software modules, functions, data stores and data structures described herein may be connected directly or indirectly to each other in order to allow the flow of data needed for their operations. It is also noted that a module or processor includes but is not limited to a unit of code that performs a software operation, and can be implemented for example as a subroutine unit of code, or as a software function unit of code, or as an object (as in an object-oriented paradigm), or as an applet, or in a computer script language, or as another type of computer code. The software components and/or functionality may be located on a single computer or distributed across multiple computers depending upon the situation at hand.
It may be understood that as used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein and throughout the claims that follow, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise. Finally, as used in the description herein and throughout the claims that follow, the meanings of “and” and “or” include both the conjunctive and disjunctive and may be used interchangeably unless the context expressly dictates otherwise; the phrase “exclusive or” may be used to indicate situation where only the disjunctive meaning may apply.
This application claims priority to U.S. Provisional Application No. 61/326,890, filed Apr. 22, 2010, entitled “Computer-Implemented Systems and Methods for Implementing Dynamic Trading Strategies in Risk Computations.” The entirety of which is herein incorporated by reference.
Number | Date | Country | |
---|---|---|---|
61326890 | Apr 2010 | US |