Portfolio selection is an important issue for researchers and practitioners. In this paper, under
the assumption that security returns are given by experts’ evaluations rather than historical data,
we discuss the portfolio adjusting problem which takes transaction costs and diversification degree of
portfolio into consideration. Uncertain variables are employed to describe the security returns. In the
proposed mean-variance-entropy model, the uncertain mean value of the return is used to measure
investment return, the uncertain variance of the return is used to measure investment risk, and the
entropy is used to measure diversification degree of portfolio. In order to solve the proposed model,
a modified artificial bee colony (ABC) algorithm is designed. Finally, a numerical example is given
to illustrate the modelling idea and the effectiveness of the proposed algorithm.
1. Introduction
Portfolio selection deals with the problem of how to allocate investor’s wealth among different assets such that the investment goal can be achieved. Markowitz [1] originally proposed the mean-variance (M-V) model for portfolio selection in 1952, which has played an important role in the development of modern portfolio selection theory. The key principle of the M-V model is to use the expected return of a portfolio as the investment return and to use the variance (or standard deviation) of the expected returns of the portfolio as the investment risk. Markowitz’s M-V model for portfolio selection problems can be formulated mathematically in two ways: minimizing risk under prescribing a minimum acceptable expected return level and maximizing expected return under prescribing a maximum acceptable risk level. Since then, a number of scholars, including Sharp [2], Merton [3], Pang [4], Perold [5], Best and Grauer [6], Konno and Yamazaki [7], and Best and Hlouskova [8], proposed different mathematical methods for the development of portfolio models. All the above-mentioned researches assume that the security returns are random variables with probability distributions. In probability theory, probability density and probability distribution functions of a random variable are usually derived from historical data. However, in the real securities market, market imperfections make the security returns present vagueness and ambiguity so that sometimes security returns cannot be well reflected by historical data. Therefore, the prediction of security returns is determined largely by experts’ estimation and contains much subjective imprecision rather than randomness. With the extensive application of fuzzy set theory [9], many researchers, such as Tanaka and Guo [10], Carlsson et al. [11], Vercher et al. [12], Zhang et al. [13], Chen et al. [14], Tsaur [15], and Gupta et al. [16], have investigated the portfolio selection problem in fuzzy environment.
An important assumption for the above fuzzy portfolio problems is that security returns are fuzzy variables. However, as we research the problem deeper, we find that paradoxes will appear if fuzzy set is employed. For example, if a security return is regarded as a fuzzy variable, then we may assign it a membership function, suppose it is a triangular fuzzy variable ξ=(-0.02,0.03,0.08). Based on the membership function, the possibility theory will immediately conclude the following three propositions: (a) the return is exactly 0.03 with possibility measure 1; (b) the return is not 0.03 with possibility measure 1; and (c) “return is exactly 0.03” and “return is not exactly 0.03” are equally likely. However, it is doubtless that the belief degree of “return is exactly 0.03” is almost zero. On the other hand, “return is exactly 0.03” and “return is not exactly 0.03” have the same belief degree in possibility measure, which implies that the two events will happen equally likely. It seems that no human being can accept this conclusion. This paradox shows that those imprecise quantities like security returns cannot be quantified by possibility measure and then they are not fuzzy concepts. To avoid paradox, Liu [17] founded the uncertainty theory based on an axiomatic system of normality, self-duality, countable subadditivity, and product uncertain measure. Based on the uncertainty theory, much work has been done on the development of theoretical and practical work. Peng and Iwamura [18] proved a sufficient and necessary condition of uncertainty distribution. Chen and Liu [19] proved the existence and uniqueness theorem for uncertain differential equations. Gao [20] investigated the α-shortest path and the shortest path problem in uncertain networks. Ding and Gao [21] assumed that demand is uncertain variable and formulated an optimal (σ,S) policy for uncertain multiproduct newsboy problem. In the area of uncertain portfolio selection problems, Zhu [22] solved an uncertain optimal control problem and applied it to a portfolio selection model. Taking semiabsolute deviation as a risk measure, Liu and Qin [23] presented three mean semiabsolute deviation models under the assumption that security returns are uncertain variables. Huang [24] proposed two new mean-variance and mean-semivariance models in which security returns are given subject to experts’ estimations. Later, Huang [25] defined a new risk measurement, that is, a risk index, and further proposed a new mean-risk index selection method for portfolio selection based on the new risk measurement. Other portfolio selection methods based on uncertainty theory can be found in [26].
Artificial bee colony (ABC) algorithm is a fairly new metaheuristic proposed by Karaboga [27], which is based on simulating the foraging behavior of honey bee swarms. Based on some classic benchmark functions, the performance of the ABC algorithm was compared with that of some other population-based algorithms such as genetic algorithm (GA), differential evolution (DE), and particle swarm optimization (PSO) in [28–31]. Their research results demonstrated that the ABC algorithm is competitive to other population-based algorithms with an advantage of employing fewer control parameters. Recently, ABC algorithm has captured much attention and has been applied to many practical optimization problems including resource constrained project scheduling problem [32], reliability redundancy allocation problem [33], job shop scheduling problem [34], mechanical design problem [35], and traveling salesman problem [36]. A survey about applications of ABC algorithm is provided by Karaboga et al. in [37].
The purposes of this paper are to propose an uncertain portfolio adjusting model under the assumption that security returns are given mainly by experts’ estimations, in which four criteria, namely, return, risk, transaction cost, and diversification degree of portfolio, are considered, and to develop a modified ABC algorithm for solving the proposed portfolio problem. The rest of the paper is organized as follows. For better understanding of the paper, some necessary knowledge about uncertain variable will be introduced in Section 2. In Section 3, we will propose an uncertain mean-variance-entropy model for portfolio selection. In Section 4, we develop a modified ABC algorithm to solve the proposed model. After that, an example is given to illustrate the proposed model and the effectiveness of the proposed algorithm in Section 5. Finally, some concluding remarks are given in Section 6.
2. Preliminary
Next, we will introduce some fundamental concepts and properties of uncertainty theory, which will be used throughout this paper.
Definition 1 (Liu [17]).
Let Γ be a nonempty set and let L be a σ-algebra over Γ. Each element Λ∈L is called an event. A set function M{Λ} is called an uncertain measure if it satisfies the following three axioms.
(normality axiom): M{Γ}=1.
(duality axiom): M{Λ}+M{Λc}=1.
(subadditivity axiom): for every countable sequence of events {Λi}, we have
(1)M{⋃i=1∞Λi}≤∑i=1∞M{Λi}.
The triplet (Γ,L,M) is called an uncertainty space. In order to obtain an uncertain measure of compound event, a product uncertain measure was defined by Liu [38], thus producing the fourth axiom of uncertainty theory as follows.
(product axiom): let (Γk,Lk,Mk) be uncertainty spaces for k=1,2,…. Then the product uncertain measure M is an uncertain measure satisfying
(2)M{∏k=1∞Λk}=⋀k=1∞Mk{Λk}.
Definition 2 (Liu [17]).
An uncertain variable is a measurable function ξ from an uncertainty space (Γ,L,M) to the set of real numbers; that is, for any Borel set B of real numbers, the set
(3){ξ∈B}={γ∈Γ∣ξ(γ)∈B}
is an event.
In order to describe an uncertain variable, a concept of uncertainty distribution is defined as follows.
Definition 3 (Liu [17]).
The uncertainty distribution of an uncertain variable ξ is defined by
(4)Φ(x)=M{ξ≤x},
for any real number x.
Let ξ be an uncertain variable with continuous uncertainty distribution Φ. Then the inverse function Φ-1 is called the inverse uncertainty distribution of ξ.
Theorem 4 (Liu [39]).
Let ξ1,ξ2,…,ξn be independent uncertain variables with uncertainty distributions Φ1,Φ2,…,Φn, respectively. If f(x1,x2,…,xn) is strictly increasing with respect to x1,x2,…,xm and strictly decreasing with respect to xm+1,xm+2,…,xn, then ξ=f(ξ1,ξ2,…,ξn) is an uncertain variable with an inverse uncertainty distribution:(5)Ψ-1(α)=f(Φ1-1(α),…,Φm-1(α),Φm+1-1(1-α),…,000000Φn-1(1-α)).
Based on the uncertain measure, the definitions of the expected value and variance of an uncertain variable can be given as follows.
Definition 5 (Liu [17]).
Let ξ be an uncertain variable. Then the expected value of ξ is defined by
(6)E[ξ]=∫0+∞M{ξ≥x}-∫-∞0M{ξ≤x}
provided that at least one of the two integrals is finite.
As a useful representation of expected value, it has been proved by Liu [17] that
(7)E[ξ]=∫01Ψ-1(α)dα,
where Ψ-1 is the inverse uncertainty distribution of uncertain variable ξ.
Definition 6 (Liu [17]).
Let ξ be an uncertain variable with finite expected value e. Then the variance of ξ is defined by
(8)V[ξ]=E[(ξ-e)2].
Let ξ be an uncertain variable with expected value e. If we only know its uncertainty distribution Ψ, then the variance is
(9)V[ξ]=∫0+∞M{(ξ-e)2≥x}dx=∫0+∞M{(ξ≥e+x)∪(ξ≤e-x)}dx≤∫0+∞(M{ξ≥e+x}+M{ξ≤e-x})dx=∫0+∞(1-Ψ(e+x)+Ψ(e-x))dx=2∫0+∞x(1-Ψ(e+x)+Ψ(e-x))dx.
In this case, it is always assumed that the variance is
(10)V[ξ]=2∫0+∞x(1-Ψ(e+x)+Ψ(e-x))dx.
The expected value and variance of an uncertain variable satisfy the following properties.
Theorem 7 (Liu [38]).
Let ξ and η be independent uncertain variables with finite expected values. Then for any real numbers a and b, one has
(11)E[aξ+bη]=aE[ξ]+bE[η],V[aξ+b]=a2V[ξ].
3. Uncertain Portfolio Selection Model
Suppose that an investor starts with an existing portfolio and considers to reallocate his/her wealth among n securities. In order to describe the problem conveniently, we use the following notations.
xj: the proportion invested in security j,
rj: the return rate of security j,
lj: the lower bound constraint on security j,
uj: the upper bound constraint on security j,
kj: the constant rate of transaction cost for the security j,
j=1,2,…,n.
Transaction cost is an important factor considered by investors in financial markets. Arnott and Wanger [40] suggested that ignoring transaction costs would lead to an inefficient portfolio, whereas Sadjadi et al. [41] showed that adding transaction costs would assist decision makers to better understand the behavior of an efficient frontier. Similar to the researches in [42] and others, we assume that the transaction cost is a V-shaped function of differences between a new portfolio x=(x1,x2,…,xn) and the existing portfolio x0=(x10,x20,…,xn0). That is to say, the transaction cost of jth security can be expressed as
(12)cj=kj|xj-xj0|,j=1,2,…,n.
Hence, the total transaction cost of the shift from x0 to x is C(x;x0)=∑j=1nkj|xj-xj0|.
Furthermore, the net return on the portfolio after paying transaction costs is given by
(13)∑j=1nrjxj-∑j=1nkj|xj-xj0|.
For a new investor, it can be taken that xj0=0, j=1,2,…,n.
Barak et al. [43] pointed out that very small weighting of an asset will have no distinct influence on the portfolio’s return, but the administrative and monitoring costs will be increased. Similarly, very high weighting in any asset will cause investors to suffer from a larger risk. Thus, quantity constraints have to be included in the portfolio model. Specifically, a minimum lj and a maximum uj for each asset j are given, and we impose that either xj=0 or lj≤xj≤uj. In addition, one of the shortcomings of Markowitz’s model is that the portfolios are often extremely concentrated on a few assets, which is a contradiction to the notion of diversification [44]. As a result, some researchers, such as Jana et al. [44], Fang et al. [45], Kapur [46], and Zhang et al. [47], have applied the entropy measure proposed by Shannon [48] to infer how much the portfolio is diversified. In this paper, we also employ entropy to measure the diversification degree of portfolio. That is to say, we maximize the entropy function:
(14)S(x)=-∑j=1nxjlnxj.
Assume that the objective of the investor wants to minimize the portfolio risk, and to maximize both the portfolio return after paying the transaction costs and the diversification degree of portfolio. Thus, the portfolio selection problem can be formulated as the following three-objective programming problem:
(15)minV[∑j=1nrjxj-∑j=1nkj|xj-xj0|]maxE[(∑j=1nrjxj)-∑j=1nkj|xj-xj0|]max-∑j=1nxjlnxjs.t.∑j=1nxj=1,s.t.lj≤xj≤uj,j=1,2,…,n,s.t.xj≥0,j=1,2,…,n,
where V denotes the variance operators and E denotes the expected value operator.
There are many methods to solve the above multiobjective optimization problem (15). One basic method is to transfer the multiobjective optimization problem into a single-objective optimization problem. We can divide these methods into two different types. The first alternative is to construct only one evaluation function for optimization by weighting the multiple objective functions. Initial work on the weighted-sum method can be found in [49] with many subsequent applications and citations. Rao and Roy proposed a method for determining weights based on fuzzy set theory [50]. Marler and Arora provided insight into how the weighted-sum method works and have explored the significance of the weights with respect to preferences, the Pareto optimal set, and the objective-function values [51]. The second alternative is to select one important objective function as the objective function to optimize, while the rest of objective functions are defined as constrained conditions. For example, Marglin developed the ɛ-constraint method, where one individual objective function is minimized with an upper level constraint imposed on the other objective functions [52]. Ehrgott and Ruzika presented two modifications by first including slack variables in the formulation and second elasticizing the constraints and including surplus variables [53]. More researches for the multiobjective optimization methods can be found in [54–57]. In this paper, based on the second method, the problem (15) can be transformed into the following optimization problem:
(16)minV[∑j=1nrjxj-∑j=1nkj|xj-xj0|]s.t.E[(∑j=1nrjxj)-∑j=1nkj|xj-xj0|]≥μ0,s.t.-∑j=1nxjlnxj≥h0,s.t.∑j=1nxj=1,s.t.lj≤xj≤uj,j=1,2,…,n,s.t.xj≥0,j=1,2,…,n,
where μ0 is a required rate of return of portfolio and h0 is the minimum entropy level the investors can tolerate.
In order to apply model (16) in a practical investment problem, we need to estimate security returns. The favored method is to regard security returns as random variables and then according to the historical observation take the arithmetic mean as the expected returns. However, since the security returns, especially short term security returns, are sensitive to various economic and noneconomic factors, it is found in reality that sometimes the historical data can hardly reflect the future security returns. In this situation, security returns have to be given mainly by experts’ judgements and estimations rather than historical data. As is mentioned before, uncertainty theory provides a new tool to deal with subjective or empirical data. In this paper, we employ uncertain variables to describe the security returns. For the sake of simplicity, throughout this paper, the uncertain return rj is a zigzag uncertain variable rj~Z(aj,bj,cj), j=1,2,…,n. rj can be described with the following uncertainty distribution:
(17)Φj(r)={0,ifr≤aj,(r-a)2(b-a),ifaj≤r≤bj,(r+c-2b)2(c-b),ifbj≤r≤cj,1,ifr≥cj,
where aj<bj<cj.
According to Definitions 5 and 6, the expected value and the variance of the zigzag uncertain variable ξ~Z(a,b,c) are given as
(18)E[ξ]=a+2b+c4,V[ξ]=33α3+21α2β+11αβ2-β3384α,
where α=max{b-a,c-b} and β=min{b-a,c-b}.
Theorem 8 (Liu [38]).
Assume that ξ1 and ξ2 are independent zigzag uncertain variables Z(a1,b1,c1) and Z(a2,b2,c2), respectively. Then the sum ξ1+ξ2 is also a zigzag uncertain variable Z(a1+a2,b1+b2,c1+c2); that is,
(19)Z(a1,b1,c1)+Z(a2,b2,c2)=Z(a1+a2,b1+b2,c1+c2).
The product of a zigzag uncertain variable Z(a,b,c) and a scalar number k>0 is also a zigzag uncertain variable Z(ka,kb,kc); that is,
(20)k·Z(a,b,c)=Z(ka,kb,kc).
Therefore, for any real numbers xj≥0,j=1,2,…,n, the total uncertain return is still a zigzag uncertain variable in the form of
(21)rp=∑j=1nrjxj~Z(∑j=1najxj,∑j=1nbjxj,∑j=1ncjxj).
Furthermore, according to Theorem 7, the net uncertain expected return of the portfolio after paying transaction costs is given as
(22)E[rp-C(x)]=E[∑j=1nrjxj-∑j=1nkj|xj-xj0|]=E[∑j=1nrjxj]-∑j=1nkj|xj-xj0|=14∑j=1n(aj+2bj+cj)xj-∑j=1nkj|xj-xj0|,
and the uncertain variance of the portfolio after paying transaction costs is
(23)V[rp-C(x)]=V[∑j=1nrjxj-∑j=1nkj|xj-xj0|]=V[∑j=1nrjxj]=33M3+21M2m+11Mm2-m3384M=11M2128+7Mm128+11m2384-m3384M,
where
(24)M=max{∑j=1n(bj-aj)xj,∑j=1n(cj-bj)xj},m=min{∑j=1n(bj-aj)xj,∑j=1n(cj-bj)xj}.
To simplify the portfolio selection model, it seems reasonable to choose the securities in such a way that bj-aj≤cj-bj, j=1,2,…,n. Therefore, model (16) can be converted into the following crisp form:
(25)min11128(∑j=1n(cj-bj)xj)2+7128(∑j=1n(cj-bj)xj)min×(∑j=1n(bj-aj)xj)+11384(∑j=1n(bj-aj)xj)2min-(∑j=1n(bj-aj)xj)3384(∑j=1n(cj-bj)xj)s.t.14∑j=1n(aj+2bj+cj)xj-∑j=1nkj|xj-xj0|≥μ0,s.t.-∑j=1nxjlnxj≥h0,s.t.∑j=1nxj=1,s.t.lj≤xj≤uj,j=1,2,…,n,s.t.xj≥0,j=1,2,…,n.
It should be noted that the proposed uncertain portfolio model (25) is different from the Markowitz M-V model because it is based on the different theories. That is to say, if the security returns are characterized as random variables with probability distributions, we can study portfolio selection problems by probability theory, while if security returns are regarded as uncertain variables with uncertainty distributions, we can apply uncertainty theory to do researches on the relevant problems.
4. Modified ABC Algorithm4.1. Standard ABC Algorithm
Artificial bee colony (ABC) algorithm is a new swarm intelligence method which simulates intelligent foraging behavior of honey bees and it is initially proposed by Karaboga [27]. In the ABC algorithm, there are three types of bees: the employed bee, the onlooker bee, and the scout bee. Each of them plays different roles in the process: the employed bees stay on a food source and provide the neighborhood of the source in its memory; the onlooker bee gets the information of food sources from the employed bees in the hive and selects one of the food sources to gather the nectar; and the scout bee is responsible for finding a new food source.
In each successful algorithm, a robust search process, including exploitation and exploration process, must be implemented effectively. In the ABC algorithm, the employed bees and onlookers execute the exploitation process in the search space, while the scout bees execute the exploration process. There is only one employed bee around each food source. In other words, the number of employed bees is equal to the number of food sources around the hive. The positions of food sources represent possible solutions to the optimization problem and the nectar amount of a food source corresponds to the quality or fitness of the associated solution. The number of the employed bees or the onlooker bees is equal to the number of solutions in the population.
At the first step, the ABC generates a randomly distributed initial population P of SN solutions (food source positions), where SN denotes the size of population. Each solution Xi(i=1,2,…,SN) is a D-dimensional vector. Here, D is the number of optimization parameters. After initialization, the population is subjected to repeated cycles of four major steps: updating feasible solutions by employed bees, selection of feasible solutions by onlooker bees, updating feasible solutions by onlooker bees, and avoidance of suboptimal solutions by scout bees.
Updating Feasible Solutions by Employed Bees. In order to produce a new feasible food source from the old one in memory, the ABC uses the following expression:
(26)vij=xij+ϕij(xij-xkj),
where k∈1,2,…,SN and j∈1,2,…,D are randomly chosen indexes. Although k is determined randomly, it has to be different from i. ϕij is a random number in [-1,1].
If a new food source Vi is better than an old food source Xi, the old food source is replaced by the new food source. Otherwise, the old one is retained.
Selection of Feasible Solutions by Onlooker Bees. After all employed bees complete the search process, they share the information about their food sources with onlooker bees. An onlooker bee evaluates the nectar information obtained from all employed bees and chooses a food source depending on the probability value pi associated with that food source:(27)pi=fiti∑n=1SNfitn,
where fiti is the fitness value of the solution i which is proportional to nectar amount of the food source in the position i.
Updating Feasible Solutions by Onlooker Bees. Based on the information obtained from the employed bees, the onlooker bees select their feasible food sources. The selected food sources are then updated using (26); that is, an old food source is replaced by a new food source if the new food source is of a better quality.
Avoidance of Suboptimal Solutions by Scout Bees. If a position cannot be improved further through a predetermined number of cycles called limit, then employed bees will abandon the food source positions and become scout bees. This helps avoid suboptimal solutions. Assume that the abandoned source is Xi and j∈1,2,…,D; then the scout discovers a new food source by using the equation below:
(28)xi,j=xminj+rand(0,1)(xmaxj-xminj),
where j is determined randomly; it should be noticed that it has to be different from i.
The main steps of the standard ABC algorithm are given in Algorithm 1.
Algorithm 1: The framework of the standard ABC algorithm.
Generally speaking, diversity in initial population helps escape from local optima and good-quality initial solutions accelerate convergence speed in an evolutionary algorithm. If no information about the solution is available, then random initialization is the most commonly used method to initialize the population. However, this method may affect the algorithm performance on the convergence speed and the quality of the final solution. Recently, chaotic maps with ergodicity, irregularity, and the stochastic property have been adopted to initialize the population, and some good results have been shown in many applications [58, 59]. In this paper, chaos-based initialization method is employed to increase the population diversity and improve the global convergence.
A simplest chaotic map is logistic map, whose equation is the following:
(29)xn+1=μxn(1-xn),
where μ is a control parameter and xn is the nth chaotic number, where n denotes the iteration number. Obviously, xn∈(0,1) under the conditions that the initial x0∈(0,1). In particular, xn behaves as chaotic dynamics when μ=4 and x0∉{0,0.25,0.5,0.75,1}.
The pseudocode of the proposed chaotic initialization is given in Algorithm 2.
Algorithm 2: Chaotic initialization.
(1) set population size SN and dimension of solution D
// Randomly generate the initial value of chaotic variable cxi,j
(2) forj=1 to Ddo
(3) cx1,j=rand(0,1)
(4) whilecx1,j∈{0,0.25,0.5,0.75,1}do
(5) cx1,j=rand(0,1)
(6) end while
(7) end for
// The iterative process of chaotic initialization
(8) fori=1 to SN do
(9) forj=1 to Ddo
(10) xi,j=xminj+cxi,j(xmaxj-xminj)
(11) cxi+1,j=4cxi,j(1-cxi,j)
(12) end for
(13) end for
4.2.2. New Search Mechanism
The employed bee and onlooker bee produce a new feasible food source according to (26). However, the convergence performance of the algorithm is not good in some cases. Therefore, we proposed a modified search method to produce new solutions, in which forgetting factor and neighborhood factor are considered. This operation can be defined as follows:
(30)vi,j=φxi,j+ψϕij(xi,j-xk,j),
where φ is the forgetting factor, which expresses the memory strength for current food source, and it is decreased gradually. In addition, the quality of the neighborhood food source Xk also affects the convergence speed and quality of the final solution. Thus, the neighborhood factor ψ is introduced to accelerate the convergence speed by adjusting the radius of the search for new candidates. The φ and ψ are defined as follows:
(31)φ=ωmax-iterationMCN(ωmax-ωmin),ψ=ωmin+iterationMCN(ωmax-ωmin),
where the values of ωmax and ωmin represent the maximum and minimum percentage of the position adjustment for the employed bees or onlooker bees. With these selected values, the value of φ will linearly decrease and the value of ψ will linearly increase.
Moreover, in the scout bee phase, if the food source is abandoned, then the scouts produce a new food source by (28). However, to some extent, it has the defects of prematurity and stagnation. Therefore, the chaotic search technique is used to get out of the local optima and is specifically illustrated in Algorithm 3.
Algorithm 3: Chaotic search for scout bees.
(1) Set the maximum number of chaotic iteration
K=100
and iterative variable k=1
// The variable cxk,j denotes the jth chaotic variable in the kth iteration
(2) forj=1 to Ddo
(3) cxk,j=(xi,j-xminj)/(xmaxj-xminj)
(4) end for
(5) whilek<Kdo
(6) forj=1 to Ddo
(7) cxk+1,j=4cxk,j(1-cxk,j)
// V=[v1,…,vD] represents a candidate solution
(8) vj=xminj+cxk+1,j(xmaxj-xminj)
(9) end for
// Greedy selection is applied between {V,Xi}
(10) iff(V)>f(xi)
(11) Replace solution Xi with candidate solution V
(12) Set trial=0
(13) Break
(14) else
(15) Set trial(i)=trial(i)+1
(16) end if
(17) Set k=k+1
(18) end while
4.2.3. The Proposed Method
Based on the above discussions, the modified ABC algorithm can be well balanced between the exploration and exploitation. The pseudocode of the proposed algorithm is given in Algorithm 4.
Algorithm 4: Modified ABC algorithm.
(1) Set population size SN, the number of maximum cycles MCN and the control parameter limit
(2) Perform Algorithm 2 to fulfill the chaotic initialization
(3) while iteration ≤ MCN do
// The employed bees phase
(4) fori=1 to SN do
(5) Produce a new candidate food source Vi corresponding to food source Xi using (29)
(6) if (f(Vi)>f(Xi)) Thentrial(i)=0
(7) elsetrial(i)=trial(i)+1
(8) end if
(9) end for
(10)Calculate the fitness values of all food source and the probability values pi by using (27)
// The onlooker bees phase
(11)Set t=0,i=1
(12)whilet<SNdo
(13) ifrandom()<pithen
(14)Set t=t+1
(15)Produce a new candidate food source Vi for the onlooker bee
(16)iff(Vi)>f(Xi)thentrial(i)=0
(17)elsetrial(i)=trial(i)+1
(18)end if
(19) Set i=i+1
(20) ifi > SN then Set i=1
(21) end if
(22)end while
// The scout bees phase
(23)fori=1 to SN do
(24) iftrial(i) ≥ SN then
(25)Perform Algorithm 3 to implement chaotic search
(26) end if
(27)end for
(28)Set iteration=iteration+1
(29) end while
5. Numerical Example
In this section, we give a numerical example to illustrate the application of the uncertain mean-variance-entropy model with transaction costs and the effectiveness of the proposed algorithm. In the example, security returns cannot be well reflected by the historical data and are given by experts’ evaluations. The investor wants to select portfolios from 8 individual securities. Thus, we assume that the return of security j is a zigzag uncertain variable rj~Z(aj,bj,cj), j=1,2,…,8. The uncertainty distributions of security returns are given in Table 1. And other related portfolio parameters are also listed in Table 1.
The zigzag uncertain returns of 8 securities.
Security
1
2
3
4
5
6
7
8
aj
0.006
−0.017
0.085
0.050
0.163
−0.035
0.095
0.116
bj
0.011
−0.035
0.103
0.062
0.172
−0.082
0.161
0.235
cj
0.028
0.013
0.128
0.095
0.193
0.022
0.232
0.527
xj0
0.05
0.07
0.15
0.06
0.15
0.22
0.13
0.17
kj
0.002
0.005
0.003
0.001
0.004
0.002
0.005
0.003
lj
0.1
0.05
0.09
0.06
0.07
0.05
0.06
0.06
uj
0.35
0.35
0.35
0.35
0.35
0.35
0.35
0.35
To solve the proposed model (25) by the modified ABC algorithm, we let the number of food sources SN=20, the dimension of the problem D=8, maximum cycle number MCN=1000, and the control parameter limit=100. Moreover, in this section, a total of 10 runs for each experimental setting are conducted and the average results are given. The values of ωmax and ωmin are fixed to 1 and 0.2, respectively.
Suppose that the minimum entropy level h0=1.8 and the efficient portfolios under different expected returns are shown in Table 2. If the investor is not satisfied with any of the portfolios obtained, more portfolios can be obtained by varying the value of μ. From Table 2, we can see that the larger the return of portfolio is, the larger the risk of portfolio is. There is a tradeoff between the return and the risk. Moreover, for the different expected return μ, the optimal portfolios are also different.
The efficient portfolios with h0=1.8.
Security
x1
x2
x3
x4
x5
x6
x7
x8
Risk
μ0=0.07
0.349
0.050
0.137
0.072
0.222
0.050
0.060
0.060
0.0002236
μ0=0.09
0.309
0.050
0.090
0.098
0.283
0.050
0.060
0.060
0.0002255
μ0=0.11
0.136
0.063
0.212
0.068
0.350
0.050
0.060
0.060
0.0002406
Next, to demonstrate that the transaction costs have effect on the optimal portfolio selection, given h0=1.7 and μ=0.08, the efficient portfolios under different transaction costs are given in Table 3. It should be noted that, for simplicity, we only vary the transaction cost of security 5. We can see that although the proportions of securities 2, 4, and 6–8 are the same, the holdings of other securities are different. Simultaneously, we also see that the total transaction cost also increases.
The efficient portfolios under different transaction costs (μ0=0.08, h0=1.7).
Security
x1
x2
x3
x4
x5
x6
x7
x8
TC
k5=0
0.341
0.050
0.090
0.060
0.289
0.050
0.060
0.060
0.00188
k5=0.004
0.350
0.050
0.102
0.060
0.268
0.050
0.060
0.060
0.00234
k5=0.008
0.332
0.050
0.096
0.060
0.292
0.050
0.060
0.060
0.00298
k5=0.015
0.322
0.050
0.105
0.060
0.293
0.050
0.060
0.060
0.00394
Figure 1 gives comparison results of the optimal portfolio strategies under different diversification degrees; that is, h0=1.7, h0=1.8, h0=1.9, and h0=2.0. The result indicates that, as the diversification degree of the portfolio changes, the investors adopt different investment strategies.
Comparison results under different diversification degrees.
Figure 2 presents the performance of the ABC algorithm with respect to the choice of the lower and upper bounds. Moreover, to show the robustness of the proposed algorithm, we use relative error as the index; that is, (maximum-actualvalue)/maximum×100%, where the maximum is the maximal value of all the objective values calculated. The detailed results are shown in Table 4. Obviously, the relative errors do not exceed 1%. That is, the proposed algorithm is robust to set parameters.
Robustness analysis for the modified ABC algorithm (u0=0.08, h0=1.8).
SN
MCN
Limit
Objective value
Relative error (%)
10
1500
50
2.2474E-4
0
20
2000
100
2.2445E-4
0.13
20
1500
150
2.2424E-4
0.22
30
2500
150
2.2469E-4
0.02
30
2000
100
2.2369E-4
0.47
40
3000
200
2.2384E-4
0.4
40
1500
100
2.2406E-4
0.3
50
1500
100
2.2372E-4
0.45
60
2000
150
2.2371E-4
0.46
70
2000
50
2.2358E-4
0.52
The performance of the ABC algorithm under different bound constraints.
Table 5 presents a comparison of the modified ABC, ABC, and GA. From Table 5, it can be observed that, for the u0=0.09 and h0=1.75, the investment strategy obtained by modified ABC algorithm outperforms those produced by standard ABC algorithm and GA, because the global optimal value obtained by modified ABC algorithm is minimal. In addition, Figure 3 shows the convergence characteristic of modified ABC, ABC, and GA. Generally speaking, the modified ABC algorithm converges within 200 iterations, while ABC and GA algorithms converge within 400 and 430 iterations, respectively. All these results show that the modified ABC algorithm has a better performance and is efficient in finding optimal portfolios.
The comparison of the modified ABC, ABC, and GA (u0=0.09, h0=1.75).
Modified ABC
ABC
GA
x1
0.327
0.319
0.311
x2
0.050
0.050
0.061
x3
0.090
0.132
0.158
x4
0.060
0.060
0.060
x5
0.303
0.269
0.240
x6
0.050
0.050
0.050
x7
0.060
0.060
0.060
x8
0.060
0.060
0.060
Risk
2.203E-4
2.234E-4
2.270E-4
Convergence characteristics of the modified ABC, ABC, and GA (u0=0.08, h0=1.8).
6. Conclusion
Since the security market is so complex, sometimes security returns have to be predicted mainly by experts’ evaluations rather than historical data. This paper discusses a portfolio selection problem with returns given by experts’ evaluations. By taking the security returns as uncertain variables, this paper makes use of the uncertain expected value and uncertain variance to measure the return and risk of securities. Furthermore, we propose an uncertain mean-variance-entropy model for portfolio selection with transaction costs. After that, a modified ABC algorithm is developed to solve the proposed problem. Finally, a numerical example is presented to illustrate this modeling concept and to demonstrate the effectiveness of the proposed algorithm. The results show that the proposed method is applicable and effective for solving the portfolio selection problem.
Conflict of Interests
The author declares that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
The author thanks Professor Zhijun Wu for his valuable comments and suggestions. This research was supported by the Humanity and Social Science Youth Foundation of Ministry of Education of China (no. 13YJC630012), the National Natural Science Foundation of China (nos. 71240002 and 71102150), the Beijing Natural Science Foundation of China (no. 9142003), and the Beijing Philosophical Social Science Project of China (no. 13SHB015).
MarkowitzH.Portfolio selection195271779110.1111/j.1540-6261.1952.tb01525.xSharpW.A simplified model for portfolio analysis19639277293MertonR. C.An analytic derivation of the efficient frontier19721018511872PangJ. S.A new and efficient algorithm for a class of portfolio selection problems1980283, part 275476710.1287/opre.28.3.754MR576318PeroldA. F.Large-scale portfolio optimization198430101143116010.1287/mnsc.30.10.1143MR834098BestM. J.GrauerR. R.The efficient set mathematics when mean-variance problems are subject to general linear constraints199042210512010.1016/0148-6195(90)90027-A2-s2.0-38249020265KonnoH.YamazakiH.Mean absolute deviation portfolio optimization model and its application to Tokyo stock exchange19913751953110.1287/mnsc.37.5.519BestM. J.HlouskovaJ.The efficient frontier for bounded assets200052219521210.1007/s001860000073MR1797247ZBLl1103.913432-s2.0-0013129429ZadehL. A.Fuzzy sets19658338353MR02194272-s2.0-34248666540TanakaH.GuoP.Portfolio selection based on upper and lower exponential possibility distributions1999114111512610.1016/S0377-2217(98)00033-2ZBLl0945.910172-s2.0-0033114964CarlssonC.FullérR.MajlenderP.A possibilistic approach to selecting portfolios with highest utility score20021311132110.1016/S0165-0114(01)00251-2MR19208262-s2.0-0036779383VercherE.BermúdezJ. D.SeguraJ. V.Fuzzy portfolio optimization under downside risk measures20071361377Zbl1190.91140ZhangW. G.WangY. L.ChenZ. P.NieZ. K.Possibilistic mean-variance models and efficient frontiers for portfolio selection problem2007177132787280110.1016/j.ins.2007.01.030MR23232412-s2.0-34147128556ChenW.YangY.MaH.Fuzzy portfolio selection problem with different borrowing and lending rates2011201115 26324010.1155/2011/263240MR2811945TsaurR.Fuzzy portfolio model with different investor risk attitudes2013227238539010.1016/j.ejor.2012.10.0362-s2.0-84873727873GuptaP.MittalG.MehlawatM. K.Multiobjective expected value model for portfolio selection in fuzzy environment2013781765179110.1007/s11590-012-0521-5MR3132145ZBLl1287.900602-s2.0-84863602568LiuB.20071542ndBerlin, GermanySpringerStudies in Fuzziness and Soft ComputingMR2683154PengZ. X.IwamuraK.A sufficient and necessary condition of uncertainty distribution201013327728510.1080/09720502.2010.10700701MR27219562-s2.0-78651589344ChenX. W.LiuB.Existence and uniqueness theorem for uncertain differential equations201091698110.1007/s10700-010-9073-2MR26096342-s2.0-77952095341GaoY.Shortest path problem with uncertain arc lengths20116262591260010.1016/j.camwa.2011.07.058MR28317412-s2.0-80052406887DingS.GaoY.The (σ, S) policy for uncertain multi-product newsboy problem20144137693776ZhuY.Uncertain optimal control with application to a portfolio selection model201041753554710.1080/01969722.2010.511552ZBLl1225.931212-s2.0-77957789004LiuY.QinZ.Mean semi-absolute deviation model for uncertain portfolio optimization problem2012642993072-s2.0-84870050388HuangX.Mean-variance models for portfolio selection subject to experts' estimations20123955887589310.1016/j.eswa.2011.11.1192-s2.0-84855901334HuangX.A risk index model for portfolio selection with returns subject to experts' estimations201211445146310.1007/s10700-012-9125-xMR29997022-s2.0-84870653044HuangX.2010Berlin, GermanySpringerKarabogaD.An idea based on honeybee swarm for numerical optimization2005TR06Erciyes University, Engineering Faculty, Computer Engineering DepartmentKarabogaD.BasturkB.A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm200739345947110.1007/s10898-007-9149-xMR23461782-s2.0-35148821762KarabogaD.BasturkB.On the performance of artificial bee colony (ABC) algorithm20088168769710.1016/j.asoc.2007.05.0072-s2.0-34548479029KarabogaD.AkayB.A comparative study of artificial Bee colony algorithm2009214110813210.1016/j.amc.2009.03.090MR2541051ZBLl1169.650532-s2.0-67349273050KarabogaD.AkayB.A modified Artificial Bee Colony (ABC) algorithm for constrained optimization problems20111133021303110.1016/j.asoc.2010.12.0012-s2.0-79951858405ZiaratiK.AkbariR.ZeighamiV.On the performance of bee algorithms for resource-constrained project scheduling problem20111143720373310.1016/j.asoc.2011.02.0022-s2.0-79954620287YehW.HsiehT.Solving reliability redundancy allocation problems using an artificial bee colony algorithm201138111465147310.1016/j.cor.2010.10.0282-s2.0-79952992971BanharnsakunA.SirinaovakulB.AchalakulT.Job shop scheduling with the Best-so-far ABC201225358359310.1016/j.engappai.2011.08.0032-s2.0-84857458697AkayB.KarabogaD.Artificial bee colony algorithm for large-scale problems and engineering design optimization20122341001101410.1007/s10845-010-0393-42-s2.0-84865224703KarabogaD.GorkemliB.A combinatorial Artificial Bee Colony algorithm for traveling salesman problemProceedings of the International Symposium on Innovations in Intelligent Systems and Applications (INISTA '11)June 2011Istanbul, Turky505310.1109/INISTA.2011.59461252-s2.0-79961180341KarabogaD.GorkemliB.OzturkC.KarabogaN.A comprehensive survey: artificial bee colony (ABC) algorithm and applications201442215710.1007/s10462-012-9328-02-s2.0-84857833368LiuB.Why is there a need for uncertainty theory?2012613102-s2.0-84863012623LiuB.2010Berlin, GermanySpringerArnottR. D.WangerW. H.The measurement and control of trading costs19904667380SadjadiS. J.AryanezhadM. B.MoghaddamB. F.A dynamic programming approach to solve efficient frontier200460220321410.1007/s001860400367MR2099532ZBLl1107.910532-s2.0-10044246282ChenW.ZhangW. G.The admissible portfolio selection problem with transaction costs and an improved PSO algorithm2010389102070207610.1016/j.physa.2010.01.0162-s2.0-77649274741BarakS.AbessiM.ModarresM.Fuzzy turnover rate chance constraints portfolio model2013228114114710.1016/j.ejor.2013.01.036MR30394652-s2.0-84875215097JanaP.RoyT. K.MazumderS. K.Multi-objective possibilistic model for portfolio selection with transaction cost2009228118819610.1016/j.cam.2008.09.008MR2514277ZBLl1161.913952-s2.0-63349083678FangS.RajasekeraJ. R.TsaoH. J.1997Kluwer Academic10.1007/978-1-4615-6131-6MR1480409KapurJ. N.1990New Delhi, IndiaWiley Eastern LimitedMR1079544ZhangW.LiuY.XuW.A possibilistic mean-semivariance-entropy model for multi-period portfolio selection with transaction costs2012222234134910.1016/j.ejor.2012.04.023MR2949181ZBLl1253.911732-s2.0-84862297792ShannonC. E.1949Urbana, Ill, USAThe University of Illinois PressMR0032134ZadehL. A.Optimality and non-scalar-valued performance criteria196381596010.1109/TAC.1963.1105511RaoJ. R.RoyN.Fuzzy set-theoretic approach of assigning weights to objectives in multicriteria decision making19892081381138610.1080/00207728908910222MR1005682ZBLl0679.900792-s2.0-0024715994MarlerR. T.AroraJ. S.The weighted sum method for multi-objective optimization: new insights201041685386210.1007/s00158-009-0460-7MR2610844ZBLl1274.903592-s2.0-77952953568MarglinS.1967Cambridge, Mass, USAMIT PressEhrgottM.RuzikaS.Improved ε-constraint method for multiobjective programming2008138337539610.1007/s10957-008-9394-2MR24296872-s2.0-49249098311CohonJ. L.1978140New York, NY, USAAcademic PressMR533667ChankongV.HaimesY. Y.1983New York, NY, USAElsevierMR780745SinghH. K.RayT.SmithW.C-PSA: constrained Pareto simulated annealing for constrained multi-objective optimization2010180132499251310.1016/j.ins.2010.03.0212-s2.0-77950917250LuhandjulaM. K.RangoagaM. J.An approach to solving a fuzzy multiobjective programming problem2014232224925510.1016/j.ejor.2013.05.040MR31053772-s2.0-84879833021AlatasB.Chaotic bee colony algorithms for global numerical optimization20103785682568710.1016/j.eswa.2010.02.0422-s2.0-77951203649YangC. H.TsaiS. W.ChuangL. Y.An improved particle swarm optimization with double-bottom chaotic maps for numerical optimization2012219126027910.1016/j.amc.2012.06.015MR29495912-s2.0-84864284843