• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23

Geometric Brownian Motion. The aim of this project is to gain an understanding of the Monte Carlo simulation method (Value-at-Risk measure) and to create a user-friendly piece of software that will allow investors to determine the potential risk a chosen

Extracts from this document...



Name: Tom Forward                                                          Year: 2010

Chapter 1: Introduction

A main factor that plays a big part in the price of a stock or shares is the economy, the economy was doing really well up until 2008 when the recession started, this caused share prices to drop dramatically and businesses having to close down. Customers began to spend less, this affected most companies as it caused a downturn in the economy. Investment levels dropped and businesses did not perform to the same standard. Investment became riskier as banks started to collapse, some even going bankrupt causing businesses to close down too. The recession in the past years (which is still ongoing) has led to fewer people investing and share prices decreasing. Due to this risk management has become important when investing.

1.1 Equity

Stocks are also known as equities or shares. An equity is when a stock or share is bought either privately or within a company, this can sometimes be risky because if the company does well in terms of valuation of the equity then the stock or shares bought would have been a good investment to the buyer and profit could be made, but if the company does badly, then the net worth of the stock or shares held is less than what its initial value was and a loss could be made through the returns generated. Risk measures need to be considered when investing in equities to avoid potential losses.

1.2 Aim of the project

The aim of this project is to gain an understanding of the Monte Carlo simulation method (Value-at-Risk measure) and to create a user-friendly piece of software that will allow investors to determine the potential risk a chosen stock has.

...read more.



In order to calculate a normally distributed random number with mean 0 and standard deviation 1 using this alternative method we need to implement the following formula:-


ε, is normally distributed random number

Riis simply a random number generated using the ‘rand()’ function found under ‘math & trig’.

In order to implement this function, 12 random numbers need to be generated using this generator. The values of the 12 figures will be added together using the ‘sum’ function and take 6 from this value. To generate more the row will just need to be copied down to the relevant number of rows needed, for example can be copied down to 1000. This will show 1000 normally distributed random numbers.

2.7 Historical data

The historical data needed has been collected in order for this project to be implemented and one way of creating a software that will allow investors to estimate future stock prices. The historical data is taken from DataStream via FTSE100 and will consist of three years’ worth of closing share prices for a number of various companies. Historical data is being used in order to estimate future stock prices. Stock prices are observed at fixed intervals of time that will be used in this project including daily, weekly and monthly. Volatility can be estimated by the movement of stock prices.

2.8 Risk Measure (V-a-R)

A well-known risk measure is Value at Risk (V-a-R); this was first used by major financial firms in the late 1980’s. This is a widely used risk measure of the risk of loss on a specific portfolio of financial assets and will be used in this project.Three different types of models exist for estimating Value at Risk, these include the variance-covariance (VCV) assuming that risk factor returns are always (jointly)

...read more.


The aims of the project have been met seeing that a user friendly software has been created in order to estimate future stock prices and calculate its V-a-R. Testing of the software has been successful with no errors and complications, results obtained have been appropriate easy to understand and can be based on real life financial situations.

From the initial design stage to the completion of the project there have been ups and downs throughout but with great motivation and support this has been a successful project!

Chapter 9: User Manual


This manual will guide the user through the software; each step will be illustrated and labelled, each label being explained. The main purpose of the software is to calculate stock prices using Geometric Brownian Motion, measuring its risk by V-a-R.

Before proceeding further the following requirements are needed; an operating system of Windows XP or newer and the software needed is Microsoft office 2007 (Excel). The software will need to be opened directly from the CD-Rom and not from a copied version on the system.

If the above are available to the user then it is time to get started!

Open the program from the CD-Rom into Microsoft Excel, ensure all security checks are in place, and enable macros. This will ensure that all functions will run accordingly. To enable macros click the ‘Office button’, this will be located on the top left hand corner of the Excel window, then go to ‘Excel options’ > ‘Trust center’ > ‘Trust center settings’ > ‘Enable all macros’.

Once all of the above are done and available to the user, the user can get started with using the software.

Chapter 10: References

Reading, to gain further understanding of the main topics:

Hull, John C., Options, Futures, and Other Derivatives, 5th ed., Prentice Hall, 2002.

Hull, John C., Fundamentals of futures and options markets, 7th ed., Pearson, 2011.

Neil A, Chriss., Black schools and beyond: Option pricing methods, McGraw-Hill companies,1997.

Tom Forward

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    Cisc v risc. To begin this assignment , I will outline the definition ...

    cisc architecture do 80% of the work and thought that this was wasteful. His idea of the risc approach came about from the ibm 801 mini computer and seen that there was a fast comtroller in a very large telephone switching system.

  2. OMC-R and CBSC ATP Overview

    cfreset tring-0 cfreset tring-1 19. Execute the following commands. Each test usually takes 10 seconds (-t 10) to complete. The first test will transmit on TX of Token Ring card 0 and receive on RX of Token Ring card 1. The second test will transmit on TX of Token Ring card 1 and receive on RX of Token Ring card 0.

  1. Qualitative Risk Analysis

    o Data precision. Precision describes the extent to which a risk is known and understood. It measures the extent of data available as well as the reliability of data. The source of the data that was used to identify the risk must be evaluated.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    and the values obtained are stored at the same address location of the array. The complete sequence of this flow is as shown in Figure 3.5. Figure 3.5 Resizing Algorithm Graphical Representation 3.3.4 Four Quadrant Algorithm Once the image is resized, the next step is to generate four 16-bit vectors.

  1. An Introduction to the IEEE 802.11p WAVE standard

    Discovery is the phase initiated when one vehicle wishes to make a connection with another of which its presence it is aware. This is then followed with the Connection phase, which is essentially a request for connection. If the vehicle receiving the request accepts the connection, both vehicles enter the

  2. Lifecycle Management Of Information Technology Project In Construction

    were wor?e for a??e??ing ?ocial importance of effect? (28 % reporting reliability), ?ocial ?ignificance of goal? (4% reporting reliability), and validation of appropriatene?? of procedure? (8% reporting reliability). ?everal procedure? have been u?ed that can provide reliability of que?tionnaire mea?urement method?, including te?t--rete?t, odd--even, Kendall'?

  1. Voice Messaging - testing compression software. ...

    A reduction of 50 percent or more is typical for a good-sized text file. Most programming languages are also very redundant because they use a relatively small collection of commands, which frequently go together in a set pattern. Files that include a lot of unique information, such as graphics or

  2. IP network design

    DfES Standards Fund Guidance ICT in Schools Standards Fund Grant 2004-05 Guidance for Schools and LEAs http://www.dfes.gov.uk/ictinschools/funding/ DfES Policy on Connectivity ICT in Schools Standards Fund Grant 2003-04 NGfL Grant 601a: Information for LEAs and Schools http://www.dfes.gov.uk/ictinschools/funding/composite.cfm?partid=46 2.1.2. Digital Subscriber Lines (DSL)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work