Next Article in Journal
Investigating Detectability of Infrared Radiation Based on Image Evaluation for Engine Flame
Previous Article in Journal
Secure Degrees of Freedom in Networks with User Misbehavior
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Credibilistic Mean-Semi-Entropy Model for Multi-Period Portfolio Selection with Background Risk

School of Management and Engineering, Capital University of Economics and Business, Beijing 100010, China
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(10), 944; https://doi.org/10.3390/e21100944
Submission received: 4 September 2019 / Revised: 23 September 2019 / Accepted: 24 September 2019 / Published: 26 September 2019

Abstract

:
In financial markets, investors will face not only portfolio risk but also background risk. This paper proposes a credibilistic multi-objective mean-semi-entropy model with background risk for multi-period portfolio selection. In addition, realistic constraints such as liquidity, cardinality constraints, transaction costs, and buy-in thresholds are considered. For solving the proposed multi-objective problem efficiently, a novel hybrid algorithm named Hybrid Dragonfly Algorithm-Genetic Algorithm (HDA-GA) is designed by combining the advantages of the dragonfly algorithm (DA) and non-dominated sorting genetic algorithm II (NSGA II). Moreover, in the hybrid algorithm, parameter optimization, constraints handling, and external archive approaches are used to improve the ability of finding accurate approximations of Pareto optimal solutions with high diversity and coverage. Finally, we provide several empirical studies to show the validity of the proposed approaches.

1. Introduction

As a research field, portfolio selection is used to accomplish the investments in financial markets by spreading investors’ capital among several different assets considering return and risk. Since the pioneering work of Markowitz [1] in single-period investment problems, the mean–variance portfolio selection problem has attracted much attention and has become a research hotspot. By introducing different risk measures, a large variety of portfolio selection models have been presented, such as the mean–variance–skewness model [2], the mean-conditional value at risk (CVaR) model [3], the mean-value at risk (VaR) model [4], the mean-semi-variance model [5] and the minimax risk model [6]. In addition, entropy can also be used as a risk measure because it does not depend on symmetric membership functions and can be calculated from non-metric data. Philippatos and Wilson [7] first replaced variance with entropy as a risk measure. Later, Rödder et al.  [8] provided a new and efficient method for determining the portfolio weights on the basis of a rule inference mechanism with both maximum entropy and minimum relative entropy. Nawrocki and Harding [9] provided two alternative weighted computations of entropy to measure portfolio risk. Usta and Kantar [10] presented a multi-objective model founded on mean, variance, skewness and entropy to adequately diversify the portfolio. Yu et al. [11] discussed the performance of the models with diverse entropy measures by comparing the mean–variance efficiency, portfolio values, and diversity.
Traditionally, researchers dealt with the uncertainty of portfolio selection problems by applying probability theory. For example, Beraldi et al. [12] proposed a mean-CVaR model considering a complex transaction cost structure, and designed a specialized Branch and Bound method to solve the proposed model. Huang [13] built a new type of model based on a risk curve. However, many non-probabilistic elements, such as economics, politics and social circumstances, exist in real capital markets and affect investment decisions. With the introduction of fuzzy set theory  [14], an increasing number of scholars began to investigate the portfolio selection problems in the fuzzy environment. Assuming that the returns are fuzzy, there exist numerous papers employing possibility theory for fuzzy portfolio selections; see, for example, Vercher et al. [15], Chen [16], Jana et al. [17], Chen and Tsaur [18], Liu and Zhang [19], and Chen and Xu [20]. Although possibility theory is widely used, it has limitations. For instance, it is not self-dual. To overcome this drawback, Liu [21] proposed credibility theory. Under the framework of the credibility theory, Gupta et al. [22] presented a multi-objective expected value model using risk, liquidity, short-term return, and long-term return. Gupta et al. [23] proposed a multi-criteria credibilistic portfolio rebalancing model considering portfolio risk as a risk curve. Liu et al. [24] built a class of credibilistic mean-CVaR portfolio optimization models. Huang [25] provided two credibility-based portfolio selection models according to two types of chance criteria. Li et al. [26] discussed a maximum likelihood estimation and a minimum entropy estimation for expected value and variance of normal fuzzy numbers in fuzzy portfolio selection. Jalota et al.  [27] modeled return, illiquidity, and risk of different kinds of assets by using L-R fuzzy numbers in a credibilistic framework. Deng et al. [28] built a mean-entropy model in the framework of credibility theory. Xu et al. [29] proposed a credibilistic semi-variance project portfolio model with skewness risk constraints.
In reality, except for portfolio risk, investors frequently face background risks such as losses of human capital, pensions, unexpected health-related costs, labor incomes, and real estate investments. Therefore, an increasing number of scholars have studied portfolio selection problems with background risk. Alghalith [30] introduced a dynamic investment model to illustrate the impact of background risk and found a negative correlation between the background risk and portfolio risk. Huang and Wang [31] analyzed the characteristics of the portfolio with background risk under a mean–variance framework. Jiang et al. [32] discussed the influence of background risk in the framework of the mean–variance model. Biptista [33] proposed a mean–variance model considering background risk and analyzed the circumstances under which investors can optimally entrust the portfolio managers to administer their wealth. Biptista [34] introduced mental accounts as well as background risk into portfolio selection and derived the efficient portfolio frontier. In addition to the above studies, few researchers considered background risk in fuzzy portfolio selection problems. Thus, to the best of our knowledge, the only exceptions are the following two studies. Xu et al. [35] provided a fuzzy portfolio selection model taking the vagueness of the investors’ performances and background risk into account. Li et al.  [36] gave a possibility-based portfolio selection model considering background risk.
All of the previous literature is in the framework of single-period. However, investment is a long-term process, and investors need to redistribute their funds over time. Numerous scholars have studied portfolio selection problems from single-period to multi-period cases. Some representative works on multi-period portfolio selections include Chen et al. [37], Zhang et al. [38], Liagkouras and Metaxiotis [39], Li et al. [40], and Zhang et al. [41]. On the other hand, several researchers have researched multi-period portfolio selection problems based on credibility theory. Typically, Mehlawat  [42] developed credibility-based multi-objective models taking multi-choice aspiration levels into consideration for multi-period portfolio optimization problems. Mohebei and Najafi [43] presented a multi-period mean-VaR model by combining the credibility theory with a scenario tree. Liu et al.  [44] designed a credibilistic multi-period mean-LAD-entropy model considering bankruptcy control and bound constraints. Zhang and Liu [45] gave a credibility-based model with a bankruptcy risk control constraint for solving multi-period portfolio selection problems. Guo et al.  [46] formulated a multi-period credibilistic mean–variance model with the terminal return constraint and V-shaped transaction cost.
In recent years, swarm intelligence-based optimization techniques have attracted increased attention. A literature review reveals the effectiveness of swarm intelligence algorithms in solving complex optimization problems, such as the salp swarm algorithm (SSA) [47], the artificial bee colony algorithm (ABC) [48], the firefly algorithm (FA) [49], and the particle swarm optimization (PSO) [50]. The dragonfly algorithm (DA) is a fairly novel swarm intelligence optimization technique proposed by Mirjalili [51] and is based on the static and dynamic swarming behaviors of dragonflies in nature. Compared with the non-dominated sorting genetic algorithm II (NSGA II) and PSO, DA has advantages in dealing with optimization problems and has been applied in many fields. Recently, Mirjalili [51] proposed a multi-objective dragonfly algorithm (MODA) and applied it to submarine propeller optimization problems. Amroune et al.  [52] used a hybrid dragonfly optimization algorithm and support vector regression to solve a power system voltage stability assessment problem. Suresh and Sreejith  [53] used the dragonfly algorithm to solve static economic dispatch with solar energy. Mafarja et al.  [54] presented a variety of S-shaped and V-shaped transfer functions to balance the exploration and exploitation in the binary dragonfly algorithm. Khadanga et al.  [55] proposed a hybrid dragonfly and pattern search algorithm approach and used it in tilt integral derivative controller design. Ghanem and Jantan [56] combined ABC and DA to train a multi-layer perceptron. Sree and Murugan  [57] developed a memory-based hybrid dragonfly algorithm with the concept of PSO g b e s t and p b e s t for solving three engineering design problems.
Although numerous studies have been performed for multi-period fuzzy portfolio selections, few studies have considered background risk under the framework of credibility theory. Moreover, to date, the application of the DA algorithm in portfolio selection problems is relatively rare. The purpose of this paper is to investigate the multi-period portfolio selection problem with background risk in the framework of credibility theory. The main contributions of this paper are as follows: (1) We formulate a credibility-based mean-semi-entropy multi-period portfolio model, considering background risk and several constraints, namely cardinality, liquidity, and buy-in thresholds; (2) We develop a new meta-heuristic approach, combining the strengths of DA and NSGA II. In the proposed algorithm, parameter optimization, constraints handling, and external archive approaches are proposed to improve the ability of finding accurate approximations of Pareto optimal solutions with high diversity and coverage; (3) We run several experiments based on ZDT benchmark functions and a real-world empirical application to verify the effectiveness of the proposed methods.
The rest of this paper is organized as follows: Section 2 describes the preliminaries. In Section 3, we build a multi-period credibility-based mean-semi-entropy model considering background risk. Section 4 discusses the solution method and proposes a hybrid algorithm. In Section 5, numerical experiments are examined to verify the validity of the proposed model and the hybrid algorithm. In Section 6, we submit our conclusions.

2. Preliminaries

Let Θ be a nonempty set. Assume that P is the power set of Θ . Each element in P is called an event. In order to present an axiomatic definition of credibility, it is necessary to assign a number C r { A } to each event A. C r { A } indicates the credibility that the event will happen. Θ has the following mathematical axioms:
Axiom 1
(Normality). C r { Θ } = 1,
Axiom 2
(Monotonicity). C r { A } C r { B } wherever A B ,
Axiom 3
(Self-Duality). C r { A } + C r { A c } = 1 for any event A,
Axiom 4
(Maximality). C r { U i A i } = s u p i C r { A i } for any event { A i } with s u p i C r { A } < 0.5 .
If the set function C r satisfies the aforementioned four axioms, the { Θ , P , C r } will be credibility space.
Definition 1.
Let ξ be a fuzzy variable defined on the credibility space { Θ , P , C r } with membership function μ { x } . For any set A of real numbers, the credibility is defined as
C r ξ A = 1 2 sup x A μ ( x ) + 1 sup x A c μ ( x ) .
Credibility measure is an increasing function of set A. It is obvious that the credibility measure is self-dual.
Definition 2.
Let ξ be a fuzzy variable; the expected value of ξ is defined as
E ξ = 0 C r ξ r d r 0 C r ξ r d r .
Theorem 1.
Let ξ be a fuzzy variable with a finite expected value; let μ and ν be any given two real numbers. Then,
E [ μ ξ + ν ] = μ E [ ξ ] + ν .
Theorem 2.
Suppose that ξ and η are two independent fuzzy variables. The expected value of these variables are finite. Then, for any numbers μ and ν,
E [ μ ξ + ν η ] = μ E [ ξ ] + ν E [ η ] .
Example 1.
The expected value for the trapezoidal fuzzy variable ξ = ξ a , ξ b , ξ c , ξ d is given by
E ξ = ξ a + ξ b + ξ c + ξ d 4 .
For the sake of determining the credibility of a fuzzy event, the trapezoidal fuzzy variable ξ has a membership function illustrated below:
μ ( r ) = r ξ a ξ b ξ a , if ξ a r ξ b , 1 , if ξ b r ξ c , ξ d r ξ d ξ c , if ξ c r ξ d , 0 , otherwise .
Then, the credibility of fuzzy event { ξ r } is given as below:
C r { ξ r } = 0 , if r ξ a , r ξ a 2 ( ξ b ξ a ) , if ξ a r ξ b , 1 2 , if ξ b r ξ c , ξ d 2 ξ c + r 2 ( ξ d ξ c ) , if ξ c r ξ d , 1 , otherwise .

3. Mean-Semi-Entropy Model for Credibilistic Multi-Period Portfolio Selection

3.1. Notation

At the beginning of the investment, we assume that the investor’s initial wealth is W 1 . The investor allocates W 1 among n risky assets and a risk-free asset at the start of T 1 period and acquires the ultimate wealth at the final period T. As a matter of convenience, we list all the symbols used below:
  • i: the exponents for the n risky assets, i = 1 , 2 , n .
  • t: the exponents for the T investment period, t = 1 , 2 , T .
  • W t : the wealth accumulated at the start of the t - th investment period.
  • x i t : the proportion of the whole wealth that investor spreads to the i - th risky asset during the t - th investment period.
  • r i t : fuzzy variables that represent the return rate on the i - th risky asset during the t - th investment period, r i t = ( α i t a , α i t b , α i t c , α i t d ) .
  • r f : the variable that represents the return rate on the risk-free asset.
  • r b : the fuzzy variable that represents the return rate on background asset, r b = ( ξ a , ξ b , ξ c , ξ d ) .
  • u b i t : the upper limit that can be assigned to the i - th risky asset during the t - th investment period.
  • l b i t : the lower limit that can be assigned to the i - th risky asset during the t - th investment period.
  • f i t : the cost on transaction of the i - th risky asset during the t - th investment period.
  • L i t : the fuzzy variables that represent the turnover rates on the i - th risky asset during the t - th investment period, L i t = ( β i t a , β i t b , β i t c , β i t d ) .
  • L t : the acceptable minimum expected liquidity during the t - th investment period.
  • m i t : the 0–1 variables expressing whether the i - th risky asset is chosen for the portfolio during the t - th investment period or not:
    m i t = 1 , if the i - th risky asset is chosen to the portfolio during the t - th period , 0 , otherwise ,
  • Z t : the desired number of risky assets that can be chosen for each investment interval.

3.2. Objective Functions

3.2.1. Maximize Ultimate Wealth

According to Equations (3) and (5), the expected value of the portfolio x t during the t - th investment period is
E i = 1 n x i t r i t = i = 1 n α i t a + α i t b + α i t c + α i t d 4 x i t .
Moreover, from Equation (5), the expected value of the background asset is
E ( r b ) = ξ a + ξ b + ξ c + ξ d 4 .
Additionally, we apply a V-shaped function that expresses the differences between the two diverse portfolios of the two adjacent periods. Then, the expense on transaction of the i - th risky asset during the t - th investment period is f i t | x i t x i t 1 | . Furthermore, from Equations (8) and (9), the net return rate at period t can be denoted as
R t = E i = 1 n x i t r i t f t + ( 1 i = 1 n x i t ) r f + E ( r b ) = i = 1 n α i t a + α i t b + α i t c + α i t d 4 x i t i = 1 n f i t | x i t x i t 1 | + ξ a + ξ b + ξ c + ξ d 4 + ( 1 i = 1 n x i t ) r f .
Then, the expected value of the wealth at the beginning of the period t + 1 is expressed as W t + 1 = W t ( 1 + R t ) . Thus, after accomplishing the investment through the entirety of investment periods, from Equation (10), the ultimate wealth at the end of the period T is denoted as
W T + 1 = W 1 t = 1 T 1 + R t = W 1 t = 1 T 1 + i = 1 n α i t a + α i t b + α i t c + α i t d 4 x i t i = 1 n f i t | x i t x i t 1 | + ξ a + ξ b + ξ c + ξ d 4 + ( 1 i = 1 n x i t ) r f .

3.2.2. Minimize Risk

Fuzzy entropy has been extensively applied to characterize uncertainty since Luca and Termini [58] first defined a non-probabilistic entropy in the framework of fuzzy set entropy. Since then, various definitions for fuzzy entropy have been proposed; see, for example, Li and Liu [59], Zhou et al.  [60], Qin et al. [61], and  Xu et al. [62]. Fuzzy entropy is more convenient than fuzzy variance because it does not depend on symmetric membership functions and can be calculated from non-metric data. It is used to express the uncertainty of both low and high extreme returns. However, what investors really dislike is the downside uncertainty. Therefore, fuzzy semi-entropy introduced by Zhou et al. [60] matches reality more exactly as the downside risk measure. In this section, we used the semi-entropy to quantify the portfolio downside risk.
Definition 3.
Assume that there is a continuous fuzzy variable δ whose expected value E [ δ ] is finite. The function o ( x ) is equal to C r { δ = x } . Then, the  semi-entropy of δ is defined as [60]
S e δ = + S o x d x ,
where S t = t ln t 1 t ln 1 t and
o x i = o x i , if x i e , 0 , otherwise .
Because of S e 0 = 0 , the semi-entropy of δ can be transformed into
S e [ δ ] = E [ ξ ] S o x d x .
Theorem 3.
Suppose there is a continuous fuzzy variable δ whose expected value E [ δ ] is finite. Then, for these two real numbers λ and ω with λ > 0 ,
S e [ λ δ + ω ] = λ S e [ δ ] .
Example 2.
Suppose δ is a fuzzy trapezoidal variable with δ = δ a , δ b , δ c , δ d whose expected value E [ δ ] = ( δ a + δ b + δ c + δ d ) / 4 . Then, the semi-entropy
S e [ δ ] = δ b δ a ρ ζ ρ , if E [ δ ] δ b , δ b δ a 2 + ( δ a + δ c + δ d 3 δ b ) ln 2 4 , if δ b < E [ δ ] δ c , δ b δ a 2 + δ c δ b ln 2 + ζ τ , otherwise ,
where ρ = ( δ b + δ c + δ d 3 δ a ) / 8 ( δ b δ a ) , τ = ( 3 δ d δ a δ b δ c ) / 8 ( δ d δ c ) , and ζ χ = χ 2 ln χ 1 χ 2 ln 1 χ .
Furthermore, according to Equation (16), we obtain the cumulative portfolio risk with background risk as follows:
S e = t = 1 T s e i = 1 n x i t r i t + s e ( r b )
In Equation (17), according to the definition of semi-entropy and Equation (16),
s e ( r i t ) = ( b i t a i t ) ρ i t ζ ( ρ i t ) , if E ( r i t ) b i t , b i t a i t 2 + ( a i t + c i t + d i t 3 b i t ) ln 2 4 , if b i t < E ( r i t ) c i t , b i t a i t 2 + ( c i t b i t ) ln 2 + ζ ( τ i t ) , otherwise ,
where ρ i t = ( b i t + c i t + d i t 3 a i t ) / 8 ( b i t a i t ) , τ i t = ( 3 d i t a i t b i t c i t ) / 8 ( d i t c i t ) , and  ζ χ = χ 2 ln χ 1 χ 2 ln 1 χ .
Similarly, the semi-entropy of background asset
s e ( r b ) = ( ξ b ξ a ) ρ ζ ( ρ b ) , if E ( r b ) ξ b , ξ b ξ a 2 + ( ξ a + ξ c + ξ d 3 ξ b ) ln 2 4 , if ξ b < E ( r b ) ξ c , ξ b ξ a 2 + ( ξ c ξ b ) ln 2 + ζ ( τ b ) , otherwise ,
where ρ b = ( ξ b + ξ c + ξ d 3 ξ a ) / 8 ( ξ b ξ a ) , τ b = ( 3 ξ d ξ a ξ b ξ c ) / 8 ( ξ d ξ c ) , and  ζ χ = χ 2 ln χ 1 χ 2 ln 1 χ .

3.3. Constraints

  • Liquidity
    In the process of making a portfolio decision, one of the key elements that should be considered is liquidity for investors. It measures the degree of probability that investors will convert an asset into income. Investors prefer assets with higher liquidity because their returns tend to rise over time. Generally, liquidity is measured by the turnover rate of assets. Because turnover rates cannot be precisely predicted, we suppose that the turnover rates of risky assets are fuzzy variables characterized by trapezoidal numbers. On account of the former discussion, by Equation (5), the constraint of the portfolio liquidity is expressed as
    E i = 1 n x i t L i t = i = 1 n x i t β i t a + β i t b + β i t c + β i t d 4 L t , t = 1 , T .
  • The desired number of risky assets that are selected into the portfolio during the t - th investment period is expressed as
    i = 1 n m i t = Z , i = 1 , 2 , n , t = 1 , 2 , T .
  • The risk-free asset constrained in each period is
    i = 1 n x i t < 1 , i = 1 , 2 , n , t = 1 , 2 , T .
  • The lower and upper limits that can be assigned to the i - th risky asset during the t - th investment period are given as
    l b i t x i t u b i t , i = 1 , 2 , n , t = 1 , 2 , T .
  • Whether the i - th risky asset is selected into the portfolio during the t - th investment period is shown as
    m i t { 0 , 1 } , i = 1 , 2 , n , t = 1 , 2 , T .
  • No short selling of assets during any investment period
    x i t 0 , i = 1 , 2 , n , t = 1 , 2 , T .

3.4. The Proposed Model

Over the entire investment horizons, investor intends to obtain the greatest final wealth and minimize the risk at the same time to find a first-rank invest strategy. Then, we supply the multi-objective model for multi-period portfolio selection problems in the following:
M a x W 1 t = 1 T 1 + i = 1 n α i t a + α i t b + α i t c + α i t d 4 x i t i = 1 n f i t | x i t x i t 1 | + ξ a + ξ b + ξ c + ξ d 4 + ( 1 i = 1 n x i t ) r f , M i n t = 1 T s e i = 1 n x i t r i t + s e ( r b ) subject to Constraints ( 20 ) ( 25 )
s e ( r i t ) and s e ( r b ) in the proposed model are defined by Equations (18) and (19), respectively.

4. The Proposed Hybrid Algorithm

4.1. Standard Dragonfly Algorithm (DA)

The static and dynamic swarming behaviors of dragonflies inspire the DA algorithm. These two behaviors represent the exploration phase and the exploitation phase, which are two major phases of the meta-heuristic algorithm. Five diverse operators determine the movement of swarm dragonflies:
  • Separation
    For the individual i, its separation is calculated as S i = k = 1 N ( P P n k ) . P n k denotes the k - th adjacent individual’s position. P denotes the current individual’s position. N is the number of neighboring individuals.   
  • Alignment
    For the individual i, its alignment is given as A i = k = 1 N V k / N , where V k is the velocity of the neighboring individual k.   
  • Cohesion
    For the individual i, the cohesion is calculated as C i = k = 1 N P n k / N P .   
  • Attraction and Distraction
    For the individual i, the index for an individual being attracted by a food source is evaluated as F i = P + P , where P + is the food source’s position. In addition, the index for an individual fleeing an enemy is calculated as E i = P + P , where P is the enemy’s position.
In order to find some new individuals in the search space, two vectors are employed. The step vector Δ P is used to update the locations of individuals, and the position vector P is introduced for simulating movements of the individuals. The movement directions of the individuals are given by the Δ P . If an individual has at least one neighbor, then Δ P is evaluated as
Δ P t + 1 = s S i + a A i + c C i + f F i + e E i + ω Δ P t .
In Equation (27), the separation weight is indicated by s, the alignment weight is shown by a, the cohesion weight is represented by c, and the food element and the enemy element are denoted as f and e, respectively. Furthermore, t is the iteration counter. According to Δ P in Equation (27), P is given as
P t + 1 = P t + Δ P t + 1 .
If an individual has no neighbors, the Lévy Flight equation will be applied to update P. This equation can improve the randomness, global search capacity and chaotic behavior of individuals. P is calculated as
P t + 1 = P t + L e ´ v y ( d ) P t .
In Equation (29), the equation of Lévy flight is
L e ´ v y ( χ ) = 0.01 × η 1 × γ | η 2 | 1 ϑ .
In Equation (30), η 1 and η 2 are two random numbers taking values in [ 0 , 1 ] , and  ϑ is a constant, γ is calculated as
γ = Γ 1 + ϑ × sin π ϑ 2 Γ 1 + ϑ 2 × ϑ × 2 ϑ 1 2 1 ϑ ,
where Γ ( χ ) = ( χ + 1 ) ! .

4.2. The Hybrid DA-GA for the Proposed Model

A good metaheuristic algorithm should better balance exploration and exploitation processes. The exploration process is used to investigate the new search space to find great global optima, while the exploitation process is used to focus on the search of local areas. Excessive exploitation results in premature convergence, while overmuch exploration leads to slow convergence. DA has advantages in exploring the global search space by using the food source and enemy source. However, the use of Lévy Flight results in a large movement that leads to local convergence and pushes the algorithm apart from the global optimum  [56]. In addition, NSGA II, developed by Deb et al.  [63], is a well-known meta-heuristic approach for solving multi-objective optimization problems. It has an improved mechanism that depends on the non-domination rank and the crowding distance and conducts constraints by using an adapted explanation of dominance instead of the penalty functions. Thus, NSGA II has a good ability to attain diverse and uniformly distributed Pareto solutions. In this paper, for the sake of solving the proposed model efficiently, a novel hybrid algorithm named HDA-GA is developed by combining the strengths of DA and NSGA II.

4.2.1. Parameter Optimization

In the static swarm of DA, the probability of alignments is low, while the probability of cohesion is high. In order to enhance the information exchange of the dragonflies from global exploration to local exploitation, dragonflies are assigned with higher alignment weights and lower cohesion weights when the global space is explored and designed on the contrary when the local area is exploited. Therefore, the exponential function is introduced to adjust the swarming elements a and c. The factors a and c are given as follows:
a = e h ,
c = e h ,
where h is adaptively decreased as the iteration increases.
Moreover, in order to enhance the randomness, the standard DA selected the positions of food source P + and enemy P by using a roulette-wheel mechanism. However, in the global search space, it may lead to poor exploration ability. Inspired by the ideas in [51], we propose a new method for choosing food sources and enemies. P g b e s t and P g w o r s t are defined as the best and the worst solutions in each iteration. The selections of P + and P are given as follows:
P + = P g b e s t ,
P = P g w o r s t .

4.2.2. Constraints Handling

Note that the standard DA only considered the non-constrained situation. However, there exist constraints in the proposed model that cannot be ignored. In this paper, to handle the constraints, we employ the constrained domination approach proposed by Deb et al. [63].
If any of the conditions below is true, a solution S k is constrained-dominated by another solution S j . (1) Both solutions are feasible, and solution S k is dominated by solution S j ; (2) The feasible solution is S j , but the infeasible one is S k ; (3) Both are infeasible, but comparing the constrained violations of these two solutions, the violation solution S j has is smaller.
For the t t h inequality constraint g t ( s ) 0 and equality constraint h t ( s ) = 0 , the constrained violation is estimated as
C V t = m a x { 0 , g t ( s ) } , t = 1 , 2 , G , m a x { h t ( s ) ι , 0 } , t = G + 1 , G + H ,
where ι is a tolerance coefficient that violates the equality constraints. After the normalization of c v t , the constrained violation of solution S j is given as
C V j = t = 1 G + H C V t .
For the purpose of drifting the solutions towards the Pareto front and making the Pareto-optimal set as diverse as possible, a joint strategy combining the constrained non-dominated sorting and crowding distance assignment is implemented. In the strategy, how close a solution is to its neighbors is measured by crowding distance d i s t a n c e k . Diversity improves with larger d i s t a n c e k . In the proposed algorithm, the crowding distance d i s t a n c e k measure introduced by Deb et al.  [63] is employed and calculated as follows:
d i s t a n c e k = F 1 ( k + 1 ) F 1 ( k 1 ) F 1 m a x F 1 m i n + F 2 ( k + 1 ) F 2 ( k 1 ) F 2 m a x F 2 m i n .
In Equation (38), the maximum and minimum of the first objective function is shown as F 1 m a x and F 1 m i n , respectively. Similarly, the maximum and minimum of the second objective function are illustrated as F 2 m a x and F 2 m i n , respectively. The constrained non-dominated sorting pseudo-code is summarized as Algorithm 1.
Algorithm 1 Constrained non-dominated sorting.
1:
Classify feasible and infeasible groups in the population by Equation (37)
2:
For p = 1 to f e a s i b l e _ p o p u l a t i o n do
3:
  Calculate S p , a set of solutions that the p t h individual dominates
4:
  Calculate n p , the number of individuals that dominate the p t h individual
5:
End for
6:
Create first front whose n p = 0
7:
While ( n p > 0 )
8:
  Create subsequent fronts by traversing S p
9:
  Crowding distance assignment by Equation (38)
10:
End While
11:
For q = 1 to i n f e a s i b l e _ p o p u l a t i o n do
12:
  Sort infeasible individual by Equations (36) and (37)
13:
End for
14:
Combine the feasible and infeasible solutions

4.2.3. External Archive

An external archive is widely used to solve multi-objective problems and to maintain the Pareto optimal solutions during optimization. The standard MODA applies an archive to retain the best elite solutions and updates the archive with respect to the non-dominated sorting. However, the updating progress deletes the infeasible solutions directly. It did not consider the constrained situation either. Based on constrained dominate rules and crowding distance, an external archive is used to improve the speed of convergence and retain the diversity of the solution set. The archive is divided into two subsets, A r c h i v e 1 and A r c h i v e 2 . A r c h i v e 1 saves solutions obtained by DA, while A r c h i v e 2 saves solutions solved by NSGA II. Finally, A r c h i v e 1 and A r c h i v e 2 make up a new set N e w _ A r c h i v e for the next generation. Initially, this archive is empty. As the iteration goes by, feasible and infeasible solutions enter the archive, and the size of the archive may be huge. If the archive is full, one or more than one solution may be deleted. The progress of this method is summarized as pseudo-code shown in Algorithm 2.
Through the above discussions, Algorithm 3 describes the proposed hybrid algorithm. In the hybrid algorithm, both DA and NSGA II start with the same initial population. The external archive is divided into two parts, where one retains feasible solutions and the other saves infeasible solutions during each iteration. Each of the two parts is evolved by a respective algorithm and then recombined in the updating archive process.
Algorithm 2 Update archive.
1:
Classify the population by Equation (37)
2:
Divide the archive to A r c h i v e 1 whose C V t = 0 and A r c h i v e 2 Whose C V t 0
3:
While ( N A r c h i v e 1 > 0 )
4:
  estimate the rank of each solution according to the Equation (37)
5:
  Constrained non-dominated sorting by Algorithm 1
6:
  Calculate the crowding distance by Equation (38)
7:
End While
8:
While ( N A r c h i v e 2 > 0 )
  Sort by Equation (37)
  Set the distance to i n f
9:
End While
Algorithm 3 The pseudo-codes of the HDA-GA.
1:
Define the m a x _ i t e r , A r c h i v e M a x S i z e , u b , l b and r
2:
Initialize X i by X i = r a n d o m ( u b l b ) + l b and Δ X i by Δ X i = r a n d o m ( u b l b ) + l b
3:
Calculate the initialized objective function values
4:
Initialized constrained non-dominated sorting by Algorithm 1
5:
While ( t m a x _ i t e r )
6:
  Update neighboring radius and the factors w , s , a , c , f e
7:
  Calculate the objective function values
8:
  Update The Archive with respect to Algorithm 2
9:
  Select the Food source and Enemy from A r c h i v e 1
10:
  If A r c h i v e A r c h i v e M a x S i z e
11:
   Select individuals from the particular front based on crowding distance by Equation (38)
12:
  end if
13:
  For i = 1 to A r c h i v e 1 do
14:
   Find their neighbors with respect to the Euclidean distance
15:
   Calculate S , A , C , F a n d E
16:
   If an individual has one neighbor at least
17:
    Update Δ X t by Equation (27) and X t + 1 by Equation (28)
18:
   end if
19:
   If an individual has no neighbor
20:
    Update X t + 1 by Equation (29)
21:
   end if
22:
  end for
23:
  For j = 1 to A r c h i v e 2
24:
   Selected()
25:
   Crossover()
26:
   Mutation()
27:
  end for
28:
End While

5. Numerical Experiments

For the sake of verifying the usefulness of the proposed methods, numerical empirical examples introduced by Mehlawat [42] are presented. The fuzzy return rates of the 10 risky assets in each period are presented in Table 1, and Table 2 shows the fuzzy turnover rates of these 10 risky assets. The background asset returns are given by experts’ estimations.
In this empirical study, we hypothetically set the initial wealth as W 1 = 1 , the lower and upper bounds are set as u i t = 0.1 and l i t = 0.5 , respectively, the unit transaction cost is f t = 0.003 , and the desired number of risky assets chosen for the portfolio during the t - th investment period is Z t = 5 . In addition, we assume that n = 10 and T = 3 . The fuzzy variable r b = ( 0.080 , 0.090 , 0.109 , 0.121 ) is the return rate on a background asset, the return rate on risk-free assets is r f = 0.01 , and the accepted minimum expected liquidities during each investment interval are designed as L 1 = 0.0045 , L 2 = 0.0035 , and L 3 = 0.0025 .

5.1. Parameter Settings

Six algorithms, HDA-GA, NSGA II [63], the multi-objective dragonfly algorithm (MODA) [51], the multi-objective particle swarm algorithm (MOPSO) [50], the multi-objective salp swarm algorithm (MOSSA) [47], and the multi-objective artificial bee algorithm (MOABC) [48], are compared in these experiments. The parameters of each algorithm are set as follows:
HDA-GA: p o p u l a t i o n _ s i z e = 100 , m a x _ i t e r = 400 , the probability of individual mutation p m = 1 / n , the crossover distribution exponent e t a c = 20 , and the mutation distribution exponent e t a m = 100 .
The parameters in NSGA II and MODA are equal to those in HDA-GA.
MOPSO: The modulus of personal learning c 1 is 1, the modulus of global learning c 2 is 2, and the initial weight w is 0.5.
MOSSA: The initial range r is 0.2, and the initial max velocity V m a x is 0.04.
MOABC: The f o o d _ N u m b e r is 200, and the l i m i t is 50.
In addition, each algorithm independently runs 30 times, and the average results are obtained after running.

5.2. Performance Measure Metrics

Five performance metrics, GD, Spacing, Diversity, CM and MPFE, are selected to compare the performances of the algorithms.
Generation Distance (GD): This convergence metric is employed to compute the distance between the approximated Pareto frontier and the true Pareto frontier. It is calculated as [63]
G D = m = 1 N d m 2 N ,
where N is the number of the obtained solutions, and d m is the minimum Euclidean distance between each of the obtained solutions and the true Pareto frontier. A smaller value of GD means that the obtained Pareto frontier is closer to the true Pareto frontier.
Spacing: This diversity metric is applied to measure the propagate of the obtained values. It is evaluated as [64]
S p a c i n g = 1 N 1 k = 1 N ( d a v e d k ) 2 ,
where d k is the minimum distance between the k t h solution and its adjacent solutions, d k = min i ( s = 1 N | F s i F s j | ) , and d a v e is the average distance of d k . A smaller value of Spacing indicates that the obtained solutions are in a better distribution.
Diversity: This diversity metric measures the spread and distribution of the obtained solutions. It is given as [63]
D i v e r s i t y = d e + d b + k = 1 N 1 | d k d a v e | d e + d b + ( N 1 ) d a v e ,
where d e and d b are the distance between the boundary of the obtained solutions and the extreme values of the true Pareto frontier. A smaller value of Diversity means a better distribution and spread of obtained solutions.
Convergence Metric (CM): This convergence metric measures the extent of convergence to the true Pareto frontier. It is computed as [63]
C M = m = 1 N d m N ,
where d m is the Euclidean distance between the solution obtained with the algorithm and the nearest solution on the Pareto frontier. The smaller the value of this metric is, the better the convergence toward the true Pareto frontier.
Maximum Pareto front error (MPFE): This convergence-diversity metric is employed to measure the quality of the obtained solutions in terms of diversity and convergence on a single scale. It is expressed as [64]
M P F E = max P min s q = 1 Q ( F q s F q p ) 2 ,
where Q is the number of objective functions and P is the number of the Pareto solutions. MPFE aims to find the maximum minimum distance between each solution obtained with the algorithm and the corresponding nearest solution on the Pareto frontier. The convergence and the diversity of the algorithm improve with smaller values of this metric.

5.3. Experimental Results Based on the Zdt Functions

In this section, we select four ZDT functions as benchmarks and present a comparison of these functions to verify the validity of the proposed HDA-GA. The details of the four ZDT functions are in Appendix A. Table 3 and Table 4 show the best ( B e s t ), mean ( M e a n ) and standard deviation ( S D ) of the five performance metrics. The bold fonts indicate better results. It can be easily observed that the proposed HDA-GA is superior to the other five algorithms within the five performance metrics.
ZDT1 is a relatively easier problem than the other three ZDT problems. From Table 3, MOPSO and MOSSA have better S D than HDA-GA. However, HDA-GA has the smallest M e a n of the five metrics among the six algorithms, which means that HDA-GA converges to the Pareto frontier with the best distribution, spread, and diversity.
Five disjoint curves make up the Pareto front of ZDT3. With respect to GD and Diversity, although MOPSO can obtain the B e s t , HDA-GA performs better between M e a n and S D . In addition, HDA-GA has the smallest B e s t and M e a n of two metrics, CM and MPFE. Moreover, HDA-GA owns a better Spacing than others, which means solutions produced by HDA-GA have a better distribution than others.
ZDT6 is another difficult problem for many multi-objective optimization algorithms to achieve a set of solutions with good convergence and diversity. From Table 4, for GD and CM, although MOPSO has smaller S D , HDA-GA performs better in B e s t and M e a n than the others. For diversity metrics Spacing and Diversity, solutions produced by HDA-GA spread out better over the Pareto frontier with a better distribution. The results of MPFE demonstrate a superior convergence and diversity ability of HDA-GA.
For ZDT2, although MOPSO and MOSSA perform more stably than HDA-GA with respect to GD and Spacing, HDA-GA has the smallest M e a n , B e s t and S D of Diversity, CM and MPFE, which indicates that HDA-GA finds a better distribution and spread with a smaller convergence metric than others.
Based on the above discussion, HDA-GA has a superior convergence and diversity ability with a better distribution and spread. It indicates that HDA-GA outperforms the other algorithms in most of the performance metrics.

5.4. Experimental Results Based on the Proposed Model

This section presents three cases with different cardinality constraints. For the proposed model, the minimum ( M i n ), maximum ( M a x ), mean ( M e a n ), standard deviation ( S D ) and range ( R a n g e ) of the results found by six different algorithms are revealed in Table 5. The bold fonts indicate better results. Given the comparisons among the six algorithms, HDA-GA can own the smallest mean value in all the cases. In addition, according to the comparison of m i n and m a x index, we can see that HDA-GA can acquire a set of non-dominated solutions with better distribution. Finally, the comparison of R a n g e index illustrates that HDA-GA can search space reliably and extensively. Although the MODA is more stable than the HDA-GA in terms of S D index, it is easier for MODA to fall into local optimization. These results indicated that HDA-GA performs better than the other algorithms.
Moreover, for a fair comparison of the performances among the algorithms, GD, Spacing, Diversity, CM, and MPFE are employed as the performance measurement metrics. Table 6 presents some results in terms of the five metrics above. For GD and CM, the index values indicate results obtained by the proposed HDA-GA are closer to the Pareto front than the other algorithms in the three cases. Meanwhile, for Spacing and Diversity, HDA-GA performs better than the other algorithms, which means that it finds a better spread and distribution metric than others. Moreover, for MPFE, HDA-GA has a superior convergence and diversity ability.
Figure 1, Figure 2 and Figure 3 display the Pareto front and the efficient frontiers of the six algorithms under the three cases above. It can be seen that the proposed HDA-GA can obtain a set of non-dominated solutions that approach the Pareto front properly. Moreover, we can see that the proposed HDA-GA performs better with accurate convergence, preferable coverage, and better diversity.

5.5. Experimental Results with and without Background Risk

We present four cases to analyze the impact of background risk in the proposed model. Case 1: Without background risk asset (BR); Case 2: With background risk asset B R 1 whose fuzzy return is r b 1 = ( 0 , 024 , 0.027 , 0.0327 , 0.0363 ) ; Case 3: With background asset B R 2 whose fuzzy return is r b 2 = ( 0 , 040 , 0.045 , 0.0545 , 0.0605 ) ; Case 4: With background asset B R 3 whose fuzzy return is r b 3 = ( 0 , 080 , 0.090 , 0.109 , 0.121 ) . The experimental results indicate that the background risk has a significant impact on the portfolio selection.
From Table 7, it can be observed that cases considering background risk have higher returns and risk than that without background risk. Ignoring background risk will cause the underestimation of risk and the reduction of return in the actual investment.
In addition, Figure 4 shows the Pareto frontiers of the above four cases. The shapes of the Pareto frontiers are approximately the same, and the Pareto frontier moves right as the background risk is concerned. It can be observed that there is a positive correlation between the background asset return and portfolio return. When the risk is the same, a portfolio with background risk can obtain a higher return than that without background risk. It indicates that considering background risk avoids the reduction of return in the actual investment and the ignorance of the potential income in the actual investment. Moreover, the risk of background assets is positively correlated with portfolio risk. When the return is the same, a portfolio with background risk is riskier than one without background risk. Considering background risk can prevent investors from underestimating the investment risk and ignoring the potential risk.

6. Conclusions

In the real world, investors usually need to optimize the portfolio strategies from time to time. In this paper, we proposed a mean-semi-entropy model based on the credibility theory by taking buy-in thresholds, cardinality, liquidity, and transaction costs into account. In particular, background risk is also considered in the proposed model. To solve the proposed multi-objective model, a hybrid algorithm, HDA-GA, combining the advantages of dragonfly algorithm (DA) and non-dominated sorting genetic algorithm II (NSGA II), is developed. Finally, we conducted a series of experiments to demonstrate the effectiveness of the proposed model and the hybrid algorithm. The numerical results showed that (1) the proposed algorithm HDA-GA is superior to the other five algorithms, namely, NSGA II, MODA, MOPSO, MOSSA, and MOABC, with accurate convergence, preferable coverage, and better diversity; (2) the mean-semi-entropy model can lead to more distributive investments; and (3) considering background risk will prevent investors from the underestimation of risk in the actual investment.
Future research directions include but are not limited to the following: (1) considering a more general transaction cost structure as in Beraldi et al. [12]; (2) extending the proposed model by adding other constraints of real markets such as minimum transaction lots, skewness, and class constraints; and (3) applying other metaheuristic algorithms such as the estimation of distribution algorithm (EDA), the krill herd (KH) algorithm, and bacterial foraging optimization (BFO) for solving the proposed model.

Author Contributions

Conceptualization, formal analysis, visualization, and supervision, J.Z.; validation, investigation, data curation, writing–original draft preparation, Q.L.; methodology, software, resources, writing–review and editing, and project administration, J.Z. and Q.L.

Funding

This research was supported by the Humanity and Social Science Foundation of Ministry of Education of China (No. 19YJAZH005).

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
HDA-GAHybrid Dragonfly Algorithm-Genetic Algorithm
NSGA IINon-Dominated Sorting Genetic Algorithm II
DADragonfly algorithm
MODAMulti-objective dragonfly algorithm
PSOParticle swarm optimization
MOPSOMulti-objective particle swarm optimization
SSASalp swarm algorithm
MOSSAMulti-objective salp swarm algorithm
ABCArtificial bee colony algorithm
MOABCMulti-objective artificial bee colony algorithm
FAFirefly algorithm
EDEstimation of distribution algorithm
KHKrill herd algorithm
BFOBacterial foraging optimization
VaRValue at risk
CVaRConditional value at risk
LADLower absolute deviation
BRBackground risk asset
GDGeneration distance
CMConvergence Metric
MPFEMaximum Pareto front error
SDStandard deviation

Appendix A. Multi-Objective Test Functions Utilized in This Paper

  • ZDT1
    M i n f 1 ( x ) = x 1 M i n f 2 ( x ) = g ( x ) ( 1 x 1 g ( x ) ) g ( x ) = 1 + 9 n 1 i = 2 n x i , where : 0 x 1 , n = 30 .
  • ZDT2
    M i n f 1 ( x ) = x 1 M i n f 2 ( x ) = g ( x ) [ 1 ( x 1 g ( x ) ) 2 ] g ( x ) = 1 + 9 n 1 i = 2 n x i , where : 0 x 1 , n = 30 .
  • ZDT3
    M i n f 1 ( x ) = x 1 M i n f 2 ( x ) = g ( x ) [ 1 x 1 g ( x ) x 1 g ( x ) sin ( 10 π x i ) ] g ( x ) = 1 + 9 n 1 i = 2 n x i , where : 0 x 1 , n = 30 .
  • ZDT6
    M i n f 1 ( x ) = 1 e x p ( 4 x 1 ) sin 6 ( 6 π x 1 ) M i n f 2 ( x ) = g ( x ) [ 1 ( f 1 ( x ) g ( x ) ) 2 ] g ( x ) = 1 + 9 [ ( i = 2 n x i ) ( n 1 ) ] 0.25 , where : 0 x 1 , n = 10 .

References

  1. Markowitz, H. Portfolio selection. J. Financ. 1952, 7, 77–91. [Google Scholar]
  2. Chen, W.; Wang, Y.; Gupta, P.; Mehlawat, M.K. A novel hybrid heuristic algorithm for a new uncertain mean–variance–skewness portfolio selection model with real constraints. Appl. Intell. 2018, 48, 2996–3018. [Google Scholar] [CrossRef]
  3. Yao, H.; Li, Z.; Lai, Y. Mean-CVaR portfolio selection: A nonparametric estimation framework. Comput. Oper. Res. 2013, 40, 1014–1022. [Google Scholar] [CrossRef]
  4. Benati, S.; Rizzi, R. A mixed integer linear programming formulation of the optimal mean/value-at-risk portfolio problem. Eur. J. Oper. Res. 2007, 176, 423–434. [Google Scholar] [CrossRef]
  5. Chen, W.; Li, D.; Lu, S.; Liu, W. Multi-period mean-semivariance portfolio optimization based on uncertain measure. Soft Comput. 2019, 23, 6231–6247. [Google Scholar] [CrossRef]
  6. Li, B.; Sun, Y.; Aw, G.; Teo, K.L. Uncertain portfolio optimization problem under a minimax risk measure. Appl. Math. Model. 2019, 76, 274–281. [Google Scholar] [CrossRef]
  7. Philippatos, G.C.; Wilson, C.J. Entropy, market risk, and the selection of efficient portfolios. Appl. Econ. 1972, 4, 209–220. [Google Scholar] [CrossRef]
  8. Rödder, W.; Gartner, I.R.; Rudolph, S. An entropy-driven expert system shell applied to portfolio selection. Expert Syst. Appl. 2010, 37, 7509–7520. [Google Scholar] [CrossRef]
  9. Nawrocki, D.N.; Harding, W.H. State-value weighted entropy as a measure of investment risk. Appl. Econ. 1986, 18, 411–419. [Google Scholar] [CrossRef]
  10. Usta, I.; Kantar, Y.M. Mean-variance–skewness-entropy measures: A multi-objective approach for portfolio selection. Entropy 2011, 13, 117–133. [Google Scholar] [CrossRef]
  11. Yu, J.R.; Lee, W.Y.; Chiou, W.J.P. Diversified portfolios with different entropy measures. Appl. Math. Comput. 2014, 241, 47–63. [Google Scholar] [CrossRef]
  12. Beraldi, P.; Violi, A.; Ferrara, M.; Ciancio, C.; Pansera, B. Dealing with complex transcation costs in portfolio management. Ann. Oper. Res. 2019. [Google Scholar] [CrossRef]
  13. Huang, X. Portfolio selection with a new definition of risk. Eur. J. Oper. Res. 2008, 186, 351–357. [Google Scholar] [CrossRef]
  14. Zadeh, L.A. Fuzzy Sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  15. Vercher, E.; Bermúdez, J.D.; Segura, J.V. Fuzzy portfolio optimization under downside risk measures. Fuzzy Sets Syst. 2007, 158, 769–782. [Google Scholar] [CrossRef]
  16. Chen, W. Artificial bee colony algorithm for constrained possibilistic portfolio optimization problem. Phys. A 2015, 429, 125–139. [Google Scholar] [CrossRef]
  17. Jana, P.; Roy, T.K.; Mazumder, S.K. Multi-objective possibilistic model for portfolio selection with transaction cost. J. Comput. Appl. Math. 2009, 228, 188–196. [Google Scholar] [CrossRef]
  18. Chen, I.F.; Tsaur, R.C. Fuzzy portfolio selection using a weighted function of possibilistic mean and variance in business cycles. Int. J. Fuzzy Syst. 2016, 18, 151–159. [Google Scholar] [CrossRef]
  19. Liu, Y.J.; Zhang, W.G. Fuzzy portfolio selection model with real features and different decision behaviors. Fuzzy Optim. Decis. Mak. 2018, 17, 317–336. [Google Scholar] [CrossRef]
  20. Chen, W.; Xu, W. A hybrid multiobjective bat algorithm for fuzzy portfolio optimization with real-world constraints. Int. J. Fuzzy Syst. 2019, 21, 291–307. [Google Scholar] [CrossRef]
  21. Liu, B. Uncertainty Theory; Springer: Berlin, Germany, 2009; pp. 191–231. [Google Scholar]
  22. Gupta, P.; Mittal, G.; Mehlawat, M.K. Multiobjective expected value model for portfolio selection in fuzzy environment. Optim. Lett. 2013, 7, 1765–1791. [Google Scholar] [CrossRef]
  23. Gupta, P.; Mittal, G.; Mehlawat, M.K. A multicriteria optimization model of portfolio rebalancing with transaction costs in fuzzy environment. Memet. Comput. 2014, 6, 61–74. [Google Scholar] [CrossRef]
  24. Liu, N.; Chen, Y.; Liu, Y. Optimizing portfolio selection problems under credibilistic CVaR criterion. J. Intell. Fuzzy Syst. 2018, 34, 335–347. [Google Scholar] [CrossRef]
  25. Huang, X. Fuzzy chance-constrained portfolio selection. Appl. Math. Comput. 2006, 177, 500–507. [Google Scholar] [CrossRef]
  26. Li, X.; Qin, Z.; Ralescu, D. Credibilistic parameter estimation and its application in fuzzy portfolio selection. Iran. J. Fuzzy Syst. 2011, 8, 57–65. [Google Scholar]
  27. Jalota, H.; Thakur, M.; Mittal, G. Modelling and constructing membership function for uncertain portfolio parameters: A credibilistic framework. Expert Syst. Appl. 2017, 71, 40–56. [Google Scholar] [CrossRef]
  28. Deng, X.; Zhao, J.; Li, Z. Sensitivety analysis of the fuzzy mean-entropy portfolio model with transaction costs based on credibility theory. Int. J. Fuzzy Syst. 2018, 20, 209–218. [Google Scholar] [CrossRef]
  29. Xu, W.; Liu, G.; Li, H.; Luo, W. A study on project portfolio models with skewness risk and staffing. Int. J. Fuzzy Syst. 2017, 19, 2033–2047. [Google Scholar] [CrossRef]
  30. Alghalith, M. The impact of background risk. Phys. A 2012, 391, 6506–6508. [Google Scholar] [CrossRef]
  31. Huang, H.H.; Wang, C.P. Portfolio selection and portfolio frontier with background risk. N. Am. Econ. Financ. 2013, 26, 177–196. [Google Scholar] [CrossRef]
  32. Jiang, C.; Ma, Y.; An, Y. An analysis of portfolio selection with background risk. J. Bank Financ. 2010, 34, 3055–3060. [Google Scholar] [CrossRef]
  33. Baptista, A.M. Optimal delegated portfolio management with background risk. J. Bank Financ. 2008, 32, 977–985. [Google Scholar] [CrossRef]
  34. Baptista, A.M. Portfolio selection with mental accounts and background risk. J. Bank Financ. 2012, 36, 968–980. [Google Scholar] [CrossRef]
  35. Xu, W.; Deng, X.; Li, J. A new fuzzy portfolio model based on background risk using MCFOA. Int. J. Fuzzy Syst. 2015, 17, 246–255. [Google Scholar] [CrossRef]
  36. Li, T.; Zhang, W.; Xu, W. A fuzzy portfolio selection model with background risk. Appl. Math. Comput. 2015, 256, 505–513. [Google Scholar] [CrossRef]
  37. Chen, W.; Li, D.; Liu, Y.J. A novel hybrid ICA-FA algorithm for multi-period uncertain portfolio optimization model based on multiple criteria. IEEE Trans. Fuzzy Syst. 2019, 27, 1023–1036. [Google Scholar] [CrossRef]
  38. Zhang, W.G.; Liu, Y.J.; Xu, W.J. A new fuzzy programming approach for multi-period portfolio optimization with return demand and risk control. Fuzzy Sets Syst. 2014, 246, 107–126. [Google Scholar] [CrossRef]
  39. Liagkouras, K.; Metaxiotis, K. Multi-period mean–variance fuzzy portfolio optimization model with transaction costs. Eng. Appl. Artif. Intell. 2018, 67, 260–269. [Google Scholar] [CrossRef]
  40. Li, B.; Zhu, Y.; Sun, Y.; Aw, G.; Teo, K.L. Multi-period portfolio selection problem under uncertain environment with bankruptcy constraint. Appl. Math. Model. 2018, 56, 539–550. [Google Scholar] [CrossRef] [Green Version]
  41. Zhang, W.G.; Liu, Y.J.; Xu, W.J. A possibilistic mean-semivariance-entropy model for multi-period portfolio selection with transaction costs. Eur. J. Oper. Res. 2012, 222, 341–349. [Google Scholar] [CrossRef]
  42. Mehlawat, M.K. Credibilitic mean-entropy modles for multi-period portfolio selection with multi-choice aspiration levels. Inf. Sci. 2016, 345, 9–26. [Google Scholar] [CrossRef]
  43. Mohebbi, N.; Najafi, A.A. Credibilistic multi-period portfolio optimization based on scenario tree. Physical A. 2018, 492, 1302–1316. [Google Scholar] [CrossRef]
  44. Liu, Y.J.; Zhang, W.G.; Zhang, Q. Credibilistic multi-period portfolio optimization model with bankruptcy control and affine recourse. Appl. Soft. Comput. 2016, 38, 890–906. [Google Scholar] [CrossRef]
  45. Zhang, W.G.; Liu, Y.J. Credibilitic mean–variance model for multi-period portfolio selection problem with risk control. OR Spectr. 2014, 36, 113–132. [Google Scholar] [CrossRef]
  46. Guo, S.; Yu, L.; Li, X.; Kar, S. Fuzzy multi-period portfolio selection with different investment horizons. Eur. J. Oper. Res. 2016, 254, 1026–1035. [Google Scholar] [CrossRef]
  47. Faris, H.; Mafarja, M.M.; Heidari, A.A.; Aljarah, I.; Al-Zoubi, A.M.; Mirjalili, S.M.; Fujita, H. An efficient binary Salp Swarm Algorithm with crossover scheme for feature selection problems. Knowl. Based Syst. 2018, 154, 43–67. [Google Scholar] [CrossRef]
  48. Karaboga, D.; Basturk, B. A powerful and efficient algorithm for numerical function optimization: Artificial bee colony (ABC) algorithm. J. Glob. Optim. 2007, 39, 459–471. [Google Scholar] [CrossRef]
  49. Yang, X.S. Firefly algorithms, stochastic test functions and design optimisation optimization. Int. J. Bio-Inspired Comput. 2010, 2, 78–84. [Google Scholar] [CrossRef]
  50. Valle, Y.; Venayagamoorthy, G.K.; Mohagheghi, S.; Hernandez, J.C.; Harley, R.G. Particle swarm optimization: Basic concepts, variants and applications in power systems. IEEE Trans. Evol. Comput. 2008, 12, 171–195. [Google Scholar] [CrossRef]
  51. Mirjalili, S. Dragonfly algorithm: A new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput. Appl. 2016, 27, 1053–1073. [Google Scholar] [CrossRef]
  52. Amroune, M.; Bouktir, T.; Musirin, I. Power system voltage stability assessment using a hybrid approach combining dragonfly optimization algorithm and support vector regression. Arab. J. Sci. Eng. 2018, 43, 3023–3036. [Google Scholar] [CrossRef]
  53. Suresh, V.; Sreejith, S. Generation dispatch of combined solar thermal systems using dragonfly algorithm. Computing 2017, 99, 59–80. [Google Scholar] [CrossRef]
  54. Mafarja, M.; Aljarah, I.; Heidari, A.A.; Faris, H.; Fournier-Viger, P.; Li, X.; Mirjalili, S. Binary Dragonfly Optimization for Feature Selection using Time-Varying Transfer functions. Knowl. Based Syst. 2018, 161, 185–204. [Google Scholar] [CrossRef]
  55. Khadanga, R.K.; Padhy, S.; Panda, S.; Kumar, A. Design and analysis of tilt integral derivative controller for frequency control in an islanded microgrid: A novel hybrid dragonfly and pattern search algorithm approach. Arab. J. Sci. Eng. 2018, 43, 3103–3114. [Google Scholar] [CrossRef]
  56. Ghanem, W.A.H.M.; Jantan, A. A cognitively inspired hybridization of artificial bee colony and dragonfly algorithms for training multi-layer perceptrons. Cogn. Comput. 2018, 10, 1096–1134. [Google Scholar] [CrossRef]
  57. Sree, R.K.S.; Murugan, S. Memory based hybrid dragonfly algorithm for numerical optimization problems. Expert Syst. Appl. 2017, 83, 63–780. [Google Scholar]
  58. Luca, A.D.; Termini, S. A definition of a nonprobabilistic entropy in the setting of fuzzy sets theory. Inf. Control 1972, 20, 301–312. [Google Scholar] [CrossRef] [Green Version]
  59. Li, P.; Liu, B. Entropy of credibility distributions for fuzzy variables. IEEE Trans. Fuzzy Syst. 2008, 16, 123–129. [Google Scholar]
  60. Zhou, J.; Li, X.; Pedrycz, W. Mean-semi-entropy models of fuzzy portfolio selection. IEEE Trans. Fuzzy Syst. 2016, 24, 1627–1636. [Google Scholar] [CrossRef]
  61. Qin, Z.; Li, X.; Ji, X. Portfolio selection based on fuzzy cross-entropy. J. Comput. Appl. Math. 2009, 228, 139–149. [Google Scholar] [CrossRef] [Green Version]
  62. Xu, J.; Zhou, X.; Wu, D.D. Portfolio selection using λ mean and hybrid entropy. Ann. Oper. Res. 2009, 185, 213–229. [Google Scholar] [CrossRef]
  63. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef] [Green Version]
  64. Jiang, S.; Ong, Y.S.; Zhang, J.; Feng, L. Consistencies and contradictions of performance metrics in multiobjective optimization. IEEE Trans. Cybern. 2014, 44, 2391–2404. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The approximate Pareto front and six algorithm efficient front when Z = 3.
Figure 1. The approximate Pareto front and six algorithm efficient front when Z = 3.
Entropy 21 00944 g001
Figure 2. The approximate Pareto front and six algorithm efficient front when Z = 5.
Figure 2. The approximate Pareto front and six algorithm efficient front when Z = 5.
Entropy 21 00944 g002
Figure 3. The approximate Pareto front and six algorithm efficient front when Z = 7.
Figure 3. The approximate Pareto front and six algorithm efficient front when Z = 7.
Entropy 21 00944 g003
Figure 4. The Pareto frontier of the mean-semi entropy model with and without background risk.
Figure 4. The Pareto frontier of the mean-semi entropy model with and without background risk.
Entropy 21 00944 g004
Table 1. The fuzzy returns of 10 risky assets at each period.
Table 1. The fuzzy returns of 10 risky assets at each period.
Asset t = 1 t = 2 t = 3
A1(0.08026, 0.10069, 0.12130, 0.13173)(0.10026, 0.12207, 0.13013, 0.15017)(0.09026, 0.10691, 0.12513, 0.13452)
A2(0.09829, 0.11543, 0.12143, 0.14589)(0.06258, 0.08535, 0.10541, 0.15459)(0.08829, 0.10525, 0.12520, 0.15259)
A3(0.07615, 0.11306, 0.13807, 0.16765)(0.09124, 0.11256, 0.13251, 0.14215)(0.07159, 0.09031, 0.12945, 0.14255)
A4(0.09381, 0.12810, 0.14143, 0.16572)(0.09371, 0.11810, 0.12714, 0.13257)(0.08381, 0.10810, 0.11271, 0.13157)
A5(0.08967, 0.10913, 0.12837, 0.14783)(0.10260, 0.11569, 0.12564, 0.14625)(0.09130, 0.11234, 0.12645, 0.15978)
A6(0.06357, 0.09286, 0.11786, 0.15772)(0.07357, 0.09265, 0.11246, 0.13976)(0.09584, 0.10563, 0.12622, 0.15561)
A7(0.04961, 0.08562, 0.10804, 0.13464)(0.09961, 0.10562, 0.12880, 0.14841)(0.09961, 0.10562, 0.11380, 0.12541)
A8(0.08464, 0.11570, 0.12319, 0.16425)(0.09464, 0.11206, 0.12232, 0.14425)(0.05464, 0.07014, 0.09319, 0.10643)
A9(0.05946, 0.08855, 0.10729, 0.12638)(0.08240, 0.10974, 0.11322, 0.14494)(0.07240, 0.08597, 0.12202, 0.14936)
A10(0.05311, 0.09298, 0.11933, 0.13920)(0.09036, 0.10410, 0.11179, 0.12239)(0.06311, 0.08298, 0.10259, 0.12892)
Table 2. The fuzzy turnover rates of 10 risky assets at each period.
Table 2. The fuzzy turnover rates of 10 risky assets at each period.
Asset t = 1 t = 2 t = 3
A1(0.00106, 0.00282, 0.00528, 0.00704)(0.00101, 0.00276, 0.00517, 0.00690)(0.00079, 0.00217, 0.00406, 0.00542)
A2(0.00031, 0.00083, 0.00156, 0.00208)(0.00028, 0.00074, 0.00139, 0.00185)(0.00033, 0.00087, 0.00164, 0.00218)
A3(0.00365, 0.00973, 0.01825, 0.02433)(0.00310, 0.00827, 0.01551, 0.02068)(0.00383, 0.01071, 0.02007, 0.02677)
A4(0.00143, 0.00382, 0.00717, 0.00956)(0.00122, 0.00337, 0.00631, 0.00841)(0.00136, 0.00352, 0.00653, 0.00870)
A5(0.00114, 0.00305, 0.00572, 0.00763)(0.00143, 0.00382, 0.00658, 0.00954)(0.00116, 0.00308, 0.00578, 0.00771)
A6(0.00189, 0.00505, 0.00947, 0.01262)(0.00218, 0.00581, 0.01089, 0.01451)(0.00199, 0.00530, 0.00994, 0.01325)
A7(0.00130, 0.00348, 0.00652, 0.00869)(0.00102, 0.00285, 0.00535, 0.00678)(0.00137, 0.00365, 0.00685, 0.00913)
A8(0.00413, 0.01102, 0.02067, 0.02756)(0.00356, 0.00948, 0.01819, 0.02425)(0.00380, 0.01014, 0.01943, 0.01943)
A9(0.00100, 0.00267, 0.00501, 0.00668)(0.00101, 0.00272, 0.00511, 0.00688)(0.00095, 0.00246, 0.00461, 0.00634)
A10(0.00151, 0.00403, 0.00755, 0.01007)(0.00159, 0.00419, 0.00808, 0.01078)(0.00141, 0.00367, 0.00703, 0.00927)
Table 3. Performance measure metrics of six algorithms on ZDT1 and ZDT2.
Table 3. Performance measure metrics of six algorithms on ZDT1 and ZDT2.
HAD-GANSGA IIMODAMOPSOMOSSAMOABC
ZDT1GDBest0.0040950.0126020.0231300.0054910.0080200.008363
Mean0.0102850.0314970.0114410.0307930.0119190.015718
SD0.0056170.0158240.0076830.0152260.0030690.009775
SpacingBest0.0059000.0083650.0125680.0048560.0072060.011102
Mean0.0103550.0712180.0203280.0523850.0139500.016263
SD0.0037160.0513340.0726080.0082720.0039250.004636
DiversityBest0.6892520.7670961.0566720.9281130.9989260.710941
Mean0.7774301.1910560.9529470.8770771.0611260.808524
SD0.0475910.0955290.1099090.0166300.0276910.085882
CMBest0.0290470.0443610.1534250.0448490.0683400.066786
Mean0.0852820.1228080.2482060.0996760.0976920.096000
SD0.0522820.0661760.0489900.1387300.0238380.025184
MPFEBest0.008740.0099920.0111390.0089250.0093850.00959
Mean0.0131080.0201810.1334480.0155290.0157170.031373
SD0.1947640.0138810.8898160.0031050.0090570.04551
ZDT2GDBest0.0050930.0200290.0242640.0058980.0060690.006479
Mean0.0063090.0511670.0434030.0070230.0200660.023395
SD0.0026250.0203650.0182870.0010990.0172940.129870
SpacingBest0.0061590.0073130.0147460.0102940.0096190.919671
Mean0.0081660.0540160.1179200.0176020.0136380.064095
SD0.0030140.0771590.2066880.0063100.0029570.078074
DiversityBest0.7432510.7563271.0212220.8873921.0162170.784003
Mean0.7559970.9232111.1868580.9476671.0547200.919671
SD0.0104330.1223690.1156580.0343930.0290560.113666
CMBest0.0408080.1201440.1862540.0514570.0429420.065679
Mean0.0434010.2526160.3317720.0612960.1038520.044393
SD0.0033480.0921780.1247650.0101390.0078460.053198
MPFEBest0.0025470.0199300.0059160.0085240.0076520.010034
Mean0.0151760.0311350.3826250.0173010.0506120.526517
SD0.0070830.0135840.5074890.0069490.0754551.000795
Table 4. Performance measure metrics of six algorithms on ZDT3 and ZDT6.
Table 4. Performance measure metrics of six algorithms on ZDT3 and ZDT6.
HAD-GANSGA IIMODAMOPSOMOSSAMOABC
ZDT3GDBest0.0549760.0539210.0602900.0487830.0540160.076657
Mean0.0572060.0575360.0666870.0599190.0573730.140799
SD0.0014610.0027030.0042120.0077670.0018380.088669
SpacingBest0.0031120.0032330.0070770.0101650.0043140.013413
Mean0.0037800.0038120.0140800.0273490.0091670.114245
SD0.0003840.0005750.0073980.0110830.0027700.096158
DiversityBest0.6809600.7016850.9865960.4196541.0586330.697293
Mean0.7240770.7999061.0662690.7273881.0924020.985891
SD0.0195160.1402850.0511400.1593160.0307960.154812
CMBest0.0402880.4391920.4898420.0866130.4374590.099388
Mean0.3197700.4723520.5452380.4172180.4629730.748504
SD0.1845900.0228930.0350110.1463610.0170120.413275
MPFEBest0.0371820.3464550.4425620.0408910.1129030.046752
Mean0.1439450.4411650.4626490.1798910.4028550.368856
SD0.0185450.0263560.0107570.0661360.0968120.210216
ZDT6GDBest0.0021960.0028220.0337990.0035170.0164970.046591
Mean0.0041730.0122940.0475190.0045300.0329950.097141
SD0.0026530.0132620.0063110.0008390.0092790.035186
SpacingBest0.0051240.0037380.0039840.0074070.0056880.041192
Mean0.0058710.0059750.0128570.0089120.0181660.234823
SD0.0006910.0007730.0112540.0008680.0094420.100987
DiversityBest0.3329900.3892670.9430620.6723220.9629660.945702
Mean0.4151850.5296281.0537060.7914661.1704241.293588
SD0.0443680.1453360.0524850.0526400.1679270.231229
CMBest0.0183280.0880360.1788230.0282550.1356870.350734
Mean0.0372110.1731930.3362640.0378780.2952320.652836
SD0.0256010.1197730.0877340.0075650.0889860.291829
MPFEBest0.0441720.080620.3826230.073090.1601580.105027
Mean0.0731360.1609310.495140.0751840.2910020.274393
SD0.0115180.1201230.0440120.0020940.0973230.114017
Table 5. Performance comparison among six different algorithms with different Z.
Table 5. Performance comparison among six different algorithms with different Z.
HDA-GANSGAIIMODAMOPSOMOSSAMOABC
Z = 3WealthMin1.6334951.6325141.5504071.6146021.5307611.585684
Max1.7942251.7935991.6216011.7703281.7715381.766484
Mean1.7207481.7206651.5765141.6926211.6628771.687489
SD0.0473060.0481210.0101120.0430210.0637230.050568
Range0.1607290.1610850.0711930.1557260.2407760.180800
RiskMin0.0446040.0465450.0494350.0493480.0452430.047369
Max0.0629590.0630110.0634540.0642550.0633460.06455
Mean0.0537310.0542310.0540220.0552330.0540410.055383
SD0.0047560.0048950.0010890.0044420.0060540.005441
Range0.0183550.0164670.0140190.0149070.0181030.017181
Z = 5WealthMin1.6787831.6805101.7494341.6859861.6959411.698884
Max1.7814191.7743211.7564401.7719441.7571591.772371
Mean1.7350281.7312731.7291111.7283451.7259901.733189
SD0.0299460.0276530.0018880.0268050.0193540.021908
Range0.1026360.0938110.0070060.0859590.0612180.073487
RiskMin0.0509420.0535510.0625240.0539700.0528480.056144
Max0.0617260.0631950.0631530.0624560.0610500.063553
Mean0.0559670.0577510.0629160.0579060.0560940.058972
SD0.0030320.0026640.0001750.0025850.0023500.002017
Range0.0107840.0096430.0006290.0084860.0082030.007409
Z = 7WealthMin1.6604931.659511.6713541.6810381.734731.720436
Max1.7819331.7798031.7179091.7754011.7795981.769565
Mean1.732061.725571.6926631.7265561.725781.73148
SD0.0366460.0365710.0113380.0280860.0127980.014475
Range0.1214400.1202930.0465550.0943630.0448680.049128
RiskMin0.0522770.0523440.0532720.0539890.0590380.058292
Max0.0630280.0629110.0584480.0636550.0642460.063573
Mean0.0566000.0570570.0568640.0580960.0614120.060949
SD0.0030830.002950.0012120.0027720.0014090.001512
Range0.0107500.0105670.0051760.0096660.0052080.005281
Table 6. Performance metrics of the six algorithms on the mean-semi entropy model with different Z.
Table 6. Performance metrics of the six algorithms on the mean-semi entropy model with different Z.
HDA-GANSGAIIMODAMOPSOMOSSAMOABC
Z = 3GDBest0.0011380.0071730.0087570.0150830.0091750.002060
Mean0.0062580.0094650.0142470.0200710.0124660.007076
SD0.0022850.0011910.0029160.0024690.0022990.003275
SpacingBest0.0002960.0021060.0008910.0002050.0010160.000189
Mean0.0008880.0050120.0028010.0052050.0025560.001058
SD0.0003230.0029220.0019770.0037970.0018020.001812
DiversityBest0.4350840.4976520.6398210.9158700.9973450.447954
Mean0.6136860.6530830.8312361.1043901.1938950.691140
SD0.0997870.1171870.1123710.1365440.0847150.155494
CMBest0.0098770.0120990.0655450.0103960.0108390.010649
Mean0.0175810.0382970.0992940.0349600.0289050.018102
SD0.0032060.0193150.0155910.0126290.0145360.005368
MPFEBest0.0008630.0037660.0121490.0137590.0235230.015990
Mean0.0075910.0087850.0371460.0689170.0411190.028185
SD0.0030980.0026670.0432480.0483730.0158460.008006
Z = 5GDBest0.0010860.0028110.0018480.0026880.0024660.001113
Mean0.0021150.0035830.0044790.0035670.0027780.002491
SD0.0008200.0005230.0031930.0003800.0001990.001141
SpacingBest0.0002050.0012180.0002380.0002220.0001100.000238
Mean0.0002590.0035000.0005170.0003440.0003470.000300
SD0.0000450.0019660.0002230.0005390.0115920.000052
DiversityBest0.4599790.5257120.8289620.9991471.0076700.557988
Mean0.6641170.7145270.9601981.0228431.0290920.778562
SD0.0894680.1467120.0616470.0410300.0115920.129619
CMBest0.0152000.0193720.0358380.0183790.0259840.018212
Mean0.0348330.0354170.0576720.0623080.0350360.047096
SD0.0114540.0118890.0085790.0256950.0105520.014139
MPFEBest0.0037080.0043250.0046650.0029450.0051100.004495
Mean0.0084690.0130770.0105450.0173730.0098360.024503
SD0.0032300.0046180.0042180.0145760.0034710.003540
Z = 7GDBest0.0013660.001620.0053710.0037090.0017740.001997
Mean0.0024640.0028780.0098590.0071050.0030420.002565
SD0.0006550.0007360.0049020.0024030.0013230.000356
SpacingBest0.000370.0005430.0001610.0002630.0001530.000662
Mean0.0005390.0006520.0050970.0012050.0005490.004011
SD9.65E-058.19E-050.0145450.0010140.00060.002734
DiversityBest0.3973320.4214020.8201680.7123050.8201680.43828
Mean0.5692110.6566520.9721330.9196161.0426660.777421
SD0.1110230.0829870.0791580.1789010.0584290.178272
CMBest0.0124270.015070.0467930.0273990.0177040.016771
Mean0.0237860.0277210.1000740.0482980.024110.024321
SD0.0090230.0073490.1133230.0127330.0050120.002925
MPFEBest0.0029810.0032870.003470.0056160.004470.005449
Mean0.0065610.0068540.0071690.0092350.0074570.007862
SD0.0030140.0027520.0029620.0053040.0018640.001628
Table 7. Comparison of the proposed models with and without background assets.
Table 7. Comparison of the proposed models with and without background assets.
Without BRWith BR1With BR2With BR3
WealthMin1.1850221.3805771.4602921.678783
Max1.2410511.4935391.5680641.781419
Mean1.2159201.4425301.5204261.735028
SD0.0153810.0345630.0319540.029946
RiskMin0.0251200.0396750.0432030.050942
Max0.0328790.0519870.0545440.061726
Mean0.0288550.0448790.0481880.055967
SD0.0020520.0034970.0032790.003032

Share and Cite

MDPI and ACS Style

Zhang, J.; Li, Q. Credibilistic Mean-Semi-Entropy Model for Multi-Period Portfolio Selection with Background Risk. Entropy 2019, 21, 944. https://doi.org/10.3390/e21100944

AMA Style

Zhang J, Li Q. Credibilistic Mean-Semi-Entropy Model for Multi-Period Portfolio Selection with Background Risk. Entropy. 2019; 21(10):944. https://doi.org/10.3390/e21100944

Chicago/Turabian Style

Zhang, Jun, and Qian Li. 2019. "Credibilistic Mean-Semi-Entropy Model for Multi-Period Portfolio Selection with Background Risk" Entropy 21, no. 10: 944. https://doi.org/10.3390/e21100944

APA Style

Zhang, J., & Li, Q. (2019). Credibilistic Mean-Semi-Entropy Model for Multi-Period Portfolio Selection with Background Risk. Entropy, 21(10), 944. https://doi.org/10.3390/e21100944

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop