Next Article in Journal
A Study of Multivalent q-starlike Functions Connected with Circular Domain
Next Article in Special Issue
A Soft-Rough Set Based Approach for Handling Contextual Sparsity in Context-Aware Video Recommender Systems
Previous Article in Journal
Single-Machine Scheduling with Rejection and an Operator Non-Availability Interval
Previous Article in Special Issue
Fuzzy Positive Implicative Filters of Hoops Based on Fuzzy Points
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Portfolio Choice Problem in the Framework of Expected Utility Operators †

by
Irina Georgescu
1,* and
Louis Aimé Fono
2,*
1
Academy of Economic Studies, Department of Economic Informatics and Cybernetics, Bucharest University of Economics, Piaţa Romana No 6 R 70167, Oficiul Postal 22, 70167 Bucharest, Romania
2
Laboratory of Mathematics and Department of Mathematics and Computer Sciences, Faculty of Sciences, University of Douala, Douala P.O. Box 24157, Cameroon
*
Authors to whom correspondence should be addressed.
A part of this work has been done under Research Grant No. 17-497RG/MATHS/AF/AC_G-FR3240297728 offered by The World Academy of Sciences (TWAS) to the Applied Mathematics to Social Sciences Research Group of the Laboratory of Mathematics, University of Douala, Cameroon. The second author (a member of the Group) sincerely thanks TWAS.
Mathematics 2019, 7(8), 669; https://doi.org/10.3390/math7080669
Submission received: 27 June 2019 / Revised: 21 July 2019 / Accepted: 23 July 2019 / Published: 26 July 2019
(This article belongs to the Special Issue Fuzziness and Mathematical Logic )

Abstract

:
Possibilistic risk theory starts from the hypothesis that risk is modeled by fuzzy numbers. In particular, in a possibilistic portfolio choice problem, the return of a risky asset will be a fuzzy number. The expected utility operators have been introduced in a previous paper to build an abstract theory of possibilistic risk aversion. To each expected utility operator, one can associate the notion of possibilistic expected utility. Using this notion, we will formulate in this very general context a possibilistic portfolio choice problem. The main results of the paper are two approximate calculation formulas for the corresponding optimization problem. The first formula approximates the optimal allocation with respect to risk aversion and investor’s prudence, as well as the first three possibilistic moments. Besides these parameters, in the second formula, the temperance index of the utility function and the fourth possibilistic moment appear.

1. Introduction

The portfolio choice problem becomes an important topic in the economic and financial literature by the mean-variance model of Markowitz [1] and by the immediate next contributions due to Merton [2], Samuelson [3], Fama [4], etc. Today, there is a wide variety of portfolio choice problems and a rich literature dedicated to them (see, e.g., [5,6,7]) (in the paper were mentioned those references that had a direct relationship with the models and the results obtained). For example, the work in [5] overviewed some econometric approaches to portfolio choice problems, among which were plug-in estimation and Bayesian decision theory. This paper follows the research stream generated by the investment model from [8,9] (see also [6], Chapter 4, or [7], Chapter 5).
An agent investing wealth w 0 in a risk-free asset and a risky asset is interested in determining the optimal proportion in which to divide w 0 between the two assets. The mathematical model is a decision problem (called the standard portfolio choice problem) formulated in the context of von Neumann–Morgenstern expected utility [5,6,7,8,9]. The agent will choose the optimal wealth allocation in the risky asset by determining the solution of an optimization problem. An exact solution of the optimization problem is difficult to obtain; therefore, approximate solutions have been searched. Using Taylor-type approximations, various forms of approximate solutions have been found with respect to two classes of parameters: indicators of the investor’s risk performance (absolute risk aversion, prudence, temperance, etc.) and various moments of the return of the risky asset (see [10,11,12,13,14]).
Thereby, the solutions of the optimization problems from [6], Chapter 4, or [7], Chapter 5, are expressed only according to the Arrow–Pratt absolute risk aversion index [8,9] associated with the investor’s utility function and the expected value and variance corresponding to the investment risk. In the works [10,12], solutions were obtained depending on the Arrow–Pratt index, the Kimball prudence index [15,16], and the first three moments of risk. A more complex form of the solution, depending on the four moments and the indices of absolute risk aversion, prudence, and temperance [16], was proven in [13]. Another form of the solution in which the first four moments appear was obtained in [11].
The investment moments in the mentioned papers were probabilistic, and the return of the risky asset was a random variable. In real life, one can consider a risky asset as a fuzzy number. Then, considering a mathematical context consisting of a weighting function f, a fuzzy number A, and a utility function u , one can define some notions of possibilistic expected utility, and by the particularization of u, one can obtain various indicators associated with the fuzzy number A (the expected value, variance, moments, etc.) (see [17,18,19,20,21], etc.). Depending on the choice of the triple ( f , A , u ) , different themes of risk theory have been treated: risk aversion [22,23,24], optimal saving and prudence [25,26,27], precautionary saving [28], risk assessment in grid computing (Chapter 7 of [18]), and the fuzzy pay-off method [18,29]. In the work [30], a possibilistic portfolio problem was formulated using the notion of possibilistic expected utility from [24] based on the framework of Zadeh’ s possibility theory [31]. We determined an approximate calculation formula of the optimal solution in terms of the first three possibilistic moments of the fuzzy numbers representing the return of the risky asset and the investor’s risk aversion and prudence indicators.
On the other hand, in [23] or [20], the notion of possibilistic expected utility different from the one from [24] was proposed. Using this notion, we can formulate another possibilistic portfolio choice problem, with a different solution from [24]. The expected utility operators were introduced in [32] to elaborate a general theory of possibilistic risk aversion. Each expected utility operator defines the notion of possibilistic expected utility. By particularization, we obtained the possibilistic expected utilities of [23,24]. Each expected utility operator verifies a property of linearity with respect to the utility function. In [33], a new class of operators (called Jensen-type operators) was introduced, which no longer verify the linearity property, but which still allow for the development of a theory of risk aversion (including an Arrow–Pratt theorem). In addition, Tassak et al. [34] and Sadefo et al. [35] developed an approach based on credibility theory, which we do not consider in this paper.
In this paper, we will formulate a standard portfolio choice problem in the context where asset return is a triangular fuzzy number and by means of a remarkable class of expected utility operators, namely D-operators. The first result of the paper (Proposition 5) is an approximate calculation formula of the optimal solution depending on the risk aversion and prudence indicators, as well as the first three moments defined by means of the considered D-operator. The second result (Theorem 1) is a more refined approximation formula of the optimal solution: besides the above-mentioned parameters, in the solution component appear the investor’s temperance and the fourth-order T-moment. In the proof of Theorem 1 is used the formula from Proposition 5, which explains their presentation as separate entities. Furthermore, the formula from Proposition 5 is much simpler than the one from Theorem 1 and can be preferred in some calculations. We noticed that forms of the optimal solution from the problems associated with the D-operators from [23,24] were obtained. The two results of the paper can produce useful formulas and in the case of other particular D-operators (e.g., for convex combinations of D-operators from [23,24]).
In Section 2, by analogy with the notion of (probabilistic) expected utility from classical von Neumann–Morgenstern utility theory, two different notions of possibilistic expected utilities are recalled. The definitions of expected utility operators and the two usual examples are also recalled. By a natural property of derivability, the D-operators are introduced, offering a general framework for the study of the possibilistic portfolio choice problem.
Section 3 states our portfolio choice problem and proposes the T-standard model (T is a D-operator) and solutions of the model. More precisely, the model is formulated, and the way to find two approximate optimal solutions for the optimization problem associated with such a model is analyzed. The first one is in terms of the risk aversion and prudence of the utility function of the investor and the first three T-moments associated with a fuzzy number A in the component of the excess return (in the case of a small portfolio risk). The second approximate formula is based on the above-mentioned indicators and on the investor’s temperance and the fourth-order moment. Section 4 contains some concluding remarks.

2. Review of Possibilistic Expected Utility Theories and Introduction to D-Operators

2.1. Possibilistic Expected Utility and Possibilistic Variance of a Fuzzy Number

The von Neumann–Morgenstern expected utility theory ( E U -theory), a natural framework to study risk parameters phenomena, is based on two elements ([6,7,8]):
  • a utility function u representing an agent;
  • a random variable X representing the risk.
Thus, the (probabilistic) expected utility E ( u ( X ) ) , defined as the mean value of the random variable u ( X ) , is the fundamental notion of E U -theory providing the indicators associated with X such as expected value, variance, moments, covariance, etc. In addition, by means of u and its derivatives, notions describing various attitudes of the agent towards risk are defined, such as: risk aversion, prudence, temperance, etc. (see [6,7,8,9,15]).
In real life, there are many uncertain situations that are not described by probability theory, but by Zadeh’s possibility theory [31]. Accordingly, it is necessary to develop a possibilistic E U -theory built starting from the following three elements:
  • a utility function u representing an agent;
  • a fuzzy number A representing the risk (with the level sets [ A ] γ = [ a 1 ( γ ) , a 2 ( γ ) ] , γ [ 0 , 1 ] );
  • a weighting function f : [ 0 , 1 ] R (f is a non-negative and increasing function that satisfies 0 1 f ( γ ) d γ = 1 ).
Based on three elements, the two following concepts of possibilistic expected utilities were introduced [17,19,23,24]:
E 1 ( f , u ( A ) ) = 1 2 0 1 [ u ( a 1 ( γ ) ) + u ( a 2 ( γ ) ) ] f ( γ ) d γ
and:
E 2 ( f , u ( A ) ) = 0 1 [ 1 a 2 ( γ ) a 1 ( γ ) a 1 ( γ ) a 2 ( γ ) u ( x ) d x ] f ( γ ) d γ .
Note that all the integrals that appear in this paper will be assumed finite.
Let us specify two particular cases of these two concepts.
(1)
Setting u = 1 R (the identity of R ) in these concepts, the two possibilistic expected utilities introduce the same notion of possibilistic expected value:
E f ( A ) = E 1 ( f , 1 R ( A ) ) = E 2 ( f , 1 R ( A ) ) = 1 2 0 1 [ a 1 ( γ ) + a 2 ( γ ) ] f ( γ ) d γ .
(2)
Setting u ( x ) = ( x E f ( A ) ) 2 in these concepts, two possibilistic variances are obtained (these two types of possibilistic variance were studied in several papers (see, e.g., [17,18,19,20,21]) and were applied in the study of different possibilistic models [18,22,25,29,30,36,37,38]):
V a r 1 ( f , A ) = 1 2 0 1 [ ( a 1 ( γ ) E f ( A ) ) 2 + ( a 2 ( γ ) E f ( A ) ) 2 ] f ( γ ) d γ ,
and:
V a r 2 ( f , A ) = 0 1 [ 1 a 2 ( γ ) a 1 ( γ ) a 1 ( γ ) a 2 ( γ ) ( x E f ( A ) ) 2 d x ] f ( γ ) d γ .
Let us end this subsection by recalling one type of fuzzy number useful in this paper ([20], Definition 2.3.3): A triangular fuzzy number A = ( a , α , β ) with a R and α , β 0 is defined by:
A ( t ) = 1 a t α a α t a , 1 t a β a t a + β , 0 o t h e r w i s e .
Then, the level sets of A are [ A ] γ = [ a 1 ( γ ) , a 2 ( γ ) ] , with a 1 ( γ ) = a ( 1 γ ) α and a 2 ( γ ) = a + ( 1 γ ) β for any γ [ 0 , 1 ] , and the support of A is s u p p ( A ) = ( a α , a + β ) .
By Example 3.3.10 from [20], the possibilistic expected value E f ( A ) associated with the triangular fuzzy number A = ( a , α , β ) has the form: E f ( A ) = a + β α 6 .
In the following subsection, we will recall the definition of the expected utility operators and a few generalities on them [20,30]. We will introduce the D-operators by a property regulating the behavior of an expected utility operator towards the derivation of the utility function with respect to a parameter.
We will denote by F the set of fuzzy numbers and C ( R ) the set of continuous functions from R to R . For each a R , we denote by a ¯ : R R the constant function a ¯ ( x ) = a , for x R . 1 R will be the identity function of R . We fix a weighting function f : [ 0 , 1 ] R .

2.2. Expected Utility Operators and D-Operators

Let us recall the expected utility operators.
Definition 1
([20,30]). An (f-weighted) expected utility operator is a function T : F × C ( R ) R such that for any a , b R , g , h C ( R ) and A F , the following conditions are fulfilled:
(a) 
T ( A , 1 R ) = E f ( A ) ;
(b) 
T ( A , a ¯ ) = a ;
(c) 
T ( A , a g + b h ) = a T ( A , g ) + b T ( A , h ) ;
(d) 
g h implies T ( A , g ) T ( A , h ) .
The real number T ( A , g ) will be called the generalized possibilistic expected utility of A w.r.t. f and g.
Several times in the paper, we will write T ( A , g ( x ) ) instead of T ( A , g ) .
For any integer k 1 , we define:
  • the k th -order T-moment of A: T ( A , g ) , where g ( x ) = x k for any x R ;
  • the k th -order central T-moment of A: T ( A , g ) , where g ( x ) = ( x E f ( A ) ) k for any x R .
In particular, we have the following notions:
  • the T-variance of A: V a r T ( A ) = T ( A , ( x E f ( A ) ) 2 ) ;
  • the T-skewness of A: S k T ( A ) = T ( A , ( x E f ( A ) ) 3 ) ;
  • the T-kurtosis of A: K T ( A ) = T ( A , ( x E f ( A ) ) 4 ) .
The most studied expected utility operators are defined in the following two examples.
Example 1
([24,32]). The expected utility operator S 1 : F × C ( R ) R is defined by:
S 1 ( A , g ) = 1 2 0 1 [ g ( a 1 ( γ ) ) + g ( a 2 ( γ ) ) ] f ( γ ) d γ .
for any fuzzy number A whose level sets are [ A ] γ = [ a 1 ( γ ) , a 2 ( γ ) ] , γ [ 0 , 1 ] and for any g C ( R ) .
Example 2
([24,32]). The expected utility operator S 2 : F × C ( R ) R is defined by S 2 ( A , g ) = 0 1 [ 1 a 2 ( γ ) a 1 ( γ ) a 1 ( γ ) a 2 ( γ ) g ( x ) d x ] f ( γ ) d γ , for any fuzzy number A whose level sets are [ A ] γ = [ a 1 ( γ ) , a 2 ( γ ) ] , γ [ 0 , 1 ] and for any g C ( R ) .
In the rest of this subsection, we will introduce and study D-operators useful throughout this paper. For that, we consider the set U of functions g ( x , λ ) : R 2 R satisfying the following property: g ( x , λ ) is continuous with respect to x and of class C n with respect to λ .
Definition 2.
An expected utility operator T : F × U R is called derivable with respect to parameter λ (D-operator) if for any fuzzy number A and for any function g ( x , λ ) U , the following conditions are fulfilled:
(D1)
The function λ T ( A , g ( . , λ ) ) is derivable (with respect to λ);
(D2) 
T ( A , g ( . , λ ) λ ) = d d λ T ( A , g ( . , λ ) ) .
Let us give two examples.
Proposition 1.
The expected utility operators S 1 and S 2 are D-operators.
Let us establish some properties of D-operators.
Proposition 2.
Let a 1 , a 2 R , g , h U and the function u = a 1 g + a 2 h . Then:
(a) 
u U .
(b) 
For any fuzzy number A , the following equality holds:
d d λ T ( A , u ( . , λ ) ) = a 1 d d λ T ( A , g ( . , λ ) ) + a 2 d d λ T ( A , h ( . , λ ) ) .
Proof. 
Property (a) is immediate. For (b), we will notice first that u ( . , λ ) λ = a 1 g ( . , λ ) λ + a 2 h ( . , λ ) λ . Thus, applying Definition 1 (c) and Property ( D 2 ), we obtain:
d d λ T ( A , u ( . , λ ) ) = T ( A , u ( . , λ ) λ ) = a 1 T ( A , g ( . , λ ) λ ) + a 2 T ( A , h ( . , λ ) λ ) = a 1 d d λ T ( A , g ( . , λ ) ) + a 2 d d λ T ( A , h ( . , λ ) ) .
In rest of this paper, we will define the model, in the general framework of an E U -theory associated with a D-operator and a possibilistic investment model called the T-standard model. We will then examine the optimal solution of the obtained model.

3. T-Standard Model in the Possibilistic Portfolio Problem

We will begin the subsection with the short description of the probabilistic investment model from [6] (pp. 55–56), which will serve as the starting point in the construction of our T-standard model. Then, we state our model with its underlying portfolio optimization problem.

3.1. Portfolio Choice Problem and the T-Standard Model

An agent invests an initial wealth w 0 in a risk-free asset (bonds) and in a risky asset (stocks). We will assume that the agent has a utility function u of class C 2 , increasing and concave. The amount invested in the risky asset will be denoted by α ; thus, w 0 α will be the amount invested in the risk-free asset.
The return of the risky asset is a random variable X 0 . Let r be the return of the risk-free asset and x a value of X 0 . The future wealth of the risk-free strategy will be ( w 0 α ) ( 1 + r ) , and the value of the portfolio ( w 0 α , α ) will be w + α ( x r ) (by [6], pp. 65–66) where w = w 0 ( 1 + r ) . Then, the investor follows the determination of that α , which would be the solution of the optimization problem:
max α E ( u ( w + α ( X 0 r ) ) ) .
Denoting X = X 0 r as the excess return, the problem (1) can be written as:
max α E ( u ( w + α X ) ) .
In the monographs [6,7] and in the works [12,13,14], Problem (2) was studied when the portfolio risk was small, i.e., the excess return X had the form X = k μ + Y where μ > 0 and Y was a random variable with E ( Y ) = 0 . Then, Model (2) obtains the form:
max α E ( u ( w + α ( μ k + Y ) ) )
called the probabilistic standard model.
In the following, the model (3) will inspire us in the choice of the hypotheses and in the formulation of the T-standard model.
We will fix a weighting function f : [ 0 , 1 ] R and a D-operator T : F × U R .
At the base of the construction of the T-standard model are the following assumptions:
(H1)
The return of the risky asset is a fuzzy number B 0 ;
(H2)
The formulation of the optimization problem will use the notion of generalized possibilistic expected utility associated with the D-operator T (see the previous section).
We will denote by B the possibilistic excess return B 0 r . We will be in the case of a small possibilistic portfolio risk (see also [30]), i.e., B = k μ + A , where μ > 0 and A is a fuzzy number with E f ( A ) = 0 . In this case, E f ( B ) = k μ .
Inspired by Model (3), we will consider the optimization problem:
max α T ( A , u ( w + α ( k μ + x ) ) ) .
having the total utility function:
V ( α ) = T ( A , u ( w + α ( k μ + x ) ) ) .
Taking into account condition ( D 2 ) from Definition 2, we can compute the derivatives of V ( α ) defined by Equation (7):
V ( α ) = d d α T ( A , u ( w + α ( k μ + x ) ) ) = T ( A , ( k μ + x ) u ( w + α ( k μ + x ) ) )
V ( α ) = T ( A , ( k μ + x ) 2 u ( w + α ( k μ + x ) ) ) .
By the hypothesis, u 0 ; thus, using Conditions (d) and (b) from Definition 1, from Equation (7), it will follow that V ( α ) 0 . We have proven that the function V ( α ) is concave.
Let α ( k ) be the solution of the optimization problem max α V ( α ) , where V ( α ) has the form of Equation (5). By Equation (6), the first-order condition V ( α ( k ) ) = 0 will be written as:
T ( A , ( k μ + x ) u ( w + α ( k ) ( k μ + x ) ) ) = 0 .
As in the case of the probabilistic model from [7], we assume α ( 0 ) = 0 .
Assuming that α ( k ) is of class C n , we will look for Taylor-type approximations of the solution α ( k ) of Equation (8):
α ( k ) j = 0 n k j j ! α ( j ) ( 0 ) .
We approximate the derivative u ( w + α ( k μ + x ) ) by:
u ( w + α ( k μ + x ) ) j = 0 n u ( j + 1 ) ( w ) j ! α j ( k μ + x ) j .
from which, by multiplying by k μ + x , one obtains:
( k μ + x ) u ( w + α ( k μ + x ) ) j = 0 n u ( j + 1 ) ( w ) j ! α j ( k μ + x ) j + 1 .
Taking into account Condition (c) of Definition 1, from Equation (10) it follows that:
T ( A , ( k μ + x ) u ( w + α ( k μ + x ) ) ) j = 0 n u ( j + 1 ) ( w ) j ! α j T ( A , ( k μ + x ) j + 1 )
By the previous approximation, the first-order condition defined by Equation (8) gets the form:
j = 0 n u ( j + 1 ) ( w ) j ! ( α ( k ) ) j T ( A , ( k μ + x ) j + 1 ) 0 .
The approximation (11) is an n th -order equation in the unknown α ( k ) . In most cases, it is difficult to find the exact solution; thus, different forms of approximate calculation for α ( k ) will be searched.
In the following subsection, we establish approximate calculation formulas for α ( k ) in which appear the indicators of absolute risk aversion and prudence of the utility function u defined as follows: the Arrow–Pratt index of absolute risk aversion r u ( w ) = u ( w ) u ( w ) (see [8,9]) and the Kimball prudence index P u ( w ) = u ( w ) u ( w ) (see [15]).

3.2. Optimal Allocation Based on Absolute Risk Aversion and Prudence

We will consider the optimization problem (5), keeping all the notations from Section 3.1.
We will search for an approximation of the optimal allocation α ( k ) of the form:
α ( k ) α ( 0 ) + k α ( 0 ) + 1 2 k 2 α ( 0 ) = k α ( 0 ) + 1 2 k 2 α ( 0 ) .
The two first key results of this paper determined the approximate values of α ( 0 ) and α ( 0 ) by means of risk aversion and prudence.
Proposition 3.
α ( 0 ) μ T ( A , x 2 ) 1 r u ( w ) .
Proof. 
For n = 1 , Equation (11) gets the form:
u ( w ) T ( A , k μ + x ) + α ( k ) u ( w ) T ( A , ( k μ + x ) 2 ) 0 .
By Definition 1, we have T ( A , k μ + x ) = k μ + T ( A , x ) = k μ + E f ( A ) . Deriving Equation (13) with respect to k and taking into account ( D 2 ) , we will obtain:
u ( w ) μ + u ( w ) [ α ( k ) T ( A , ( k μ + x ) 2 ) + 2 α ( k ) μ T ( A , k μ + x ) ] 0 .
Setting k = 0 and considering that α ( 0 ) = 0 , we have u ( w ) μ + u ( w ) T ( A , x 2 ) α ( 0 ) 0 , from which it follows immediately that α ( 0 ) μ T ( A , x 2 ) u ( w ) u ( w ) = μ T ( A , x 2 ) 1 r u ( w ) .
Proposition 4.
α ( 0 ) P u ( w ) ( r u ( w ) ) 2 T ( A , x 3 ) ( T ( A , x 2 ) ) 3 μ 2 .
Proof. 
For n = 2 , Equation (11) becomes:
u ( w ) T ( A , k μ + x ) + u ( w ) α ( k ) T ( A , ( k μ + x ) 2 ) + u ( w ) 2 ( α ( k ) ) 2 T ( A , ( k μ + x ) 3 ) 0 .
We recall that T ( A , k μ + x ) = k μ + E f ( A ) = k μ . We derive the above relation with respect to k, considering ( D 2 ):
u ( w ) μ + u ( w ) [ α ( k ) T ( A , ( k μ + x ) 2 + 2 α ( k ) μ T ( A , k μ + x ) ]
+ u ( w ) 2 [ 2 α ( k ) α ( k ) T ( A , ( k μ + x ) 3 ) + 3 ( α ( k ) ) 2 μ T ( A , ( k μ + x ) 2 ) ] 0 .
Deriving one more time with respect to k, setting k = 0 , and considering α ( 0 ) = 0 and E f ( A ) = 0 , we will obtain:
u ( w ) α ( 0 ) T ( A , x 2 ) + u ( w ) ( α ( 0 ) ) 2 T ( A , x 3 ) 0
from which one obtains:
α ( 0 ) u ( w ) u ( w ) T ( A , x 3 ) T ( A , x 2 ) ( α ( 0 ) ) 2 .
Taking into account Proposition 3 and by using the Arrow–Pratt index of absolute risk aversion and the Kimball prudence index, it follows that:
α ( 0 ) P u ( w ) ( r u ( w ) ) 2 T ( A , x 3 ) ( T ( A , x 2 ) ) 3 μ 2 .
The following first main result of this paper established the first approximate value of the solution of our T-model.
Proposition 5.
The optimal allocation α ( k ) can be approximated as:
α ( k ) μ r u ( w ) 1 T ( A , x 2 ) k + 1 2 μ 2 P u ( w ) ( r u ( w ) ) 2 T ( A , x 3 ) ( T ( A , x 2 ) ) 3 k 2 .
Proof. 
α ( 0 ) and α ( 0 ) are replaced in Equation (12) with their approximate values from Propositions 3 and 4. □
Remark 1.
Since E f ( A ) = 0 , it follows that T ( A , x 2 ) = V a r T ( A ) and T ( A , x 3 ) = S k T ( A ) . Thus, by Proposition 5, the optimal allocation α ( k ) can be approximated by:
α ( k ) μ r u ( w ) 1 V a r T ( A ) k + 1 2 μ 2 P u ( w ) ( r u ( w ) ) 2 S k T ( A ) ( V a r T ( A ) ) 3 k 2 .
As seen from Equation (14), α ( k ) is expressed according to:
  • the Arrow–Pratt index r u ( w ) and the prudence index P u ( w )
  • the T-variance V a r T ( A ) and the T-skewness S k T ( A ) .
Let us display some examples of our solution.
Example 3.
We consider the utility function u ( w ) = w a a with a 0 . A simple computation shows that r u ( w ) = 1 a w ; P u ( w ) = 2 a w and T u ( w ) = 3 a w , from which it follows that 1 r u ( w ) = w 1 a and P u ( w ) ( r u ( w ) ) 2 = 2 a ( 1 a ) 2 w .
Replacing 1 r u ( w ) and P u ( w ) ( r u ( w ) ) 2 in the expression of α ( k ) from Proposition 5, we find:
α ( k ) k μ w ( 1 a ) T ( A , x 2 ) [ 1 + k μ 2 2 a 1 a T ( A , x 3 ) ( T ( A , x 2 ) ) 3 ] .
We assume that the weighting function is f ( γ ) = 2 γ , A = ( b , α , β ) is a triangular fuzzy number with E f ( A ) = 0 , and T is the D-operator S 1 from Example 1.
By [38], Remark 2.1 (a) and (b), we have:
S 1 ( A , x 2 ) = V a r T 1 ( A ) = α 2 + β 2 + α β 18 ,
and:
S 1 ( A , x 3 ) = S k T 1 ( A ) = 19 ( β 2 α 2 ) 1080 + α β ( β α ) 72 .
Then, Formula (3) becomes:
α ( k ) 18 k μ w ( 1 a ) ( α 2 + β 2 + α β ) [ 1 + 9 k μ ( 2 a ) 1 a 57 ( β 2 α 2 ) 10 + 9 α β ( β α ) 2 ( α 2 + β 2 + α β ) 3 ] .
In the case of a symmetric triangular fuzzy number A = ( b , α ) , we have b = 0 , α = β , and the previous formula becomes:
α ( k ) 6 μ w ( 1 a ) α 2 k .
Example 4.
Assume that the utility function u is HARA-type (see [7], Section 3.6): u ( w ) = ζ ( δ + w γ ) 1 γ for δ + w γ > 0 .
According to [7], Section 3.6, we have: r u ( w ) = ( δ + w γ ) 1 and P u ( w ) = γ + 1 γ ( δ + w γ ) 1 , from which it follows that: 1 r u ( w ) = δ + w γ and P u ( w ) ( r u ( w ) ) 2 = γ + 1 γ ( δ + w γ ) .
Replacing in Equation (14) 1 r u ( w ) and P u ( w ) ( r u ( w ) ) 2 with the values obtained above, the optimal allocation α ( k ) will be approximated as:
α ( k ) k μ ( δ + w γ ) 1 V a r T ( A ) + 1 2 ( k μ ) 2 γ + 1 γ ( δ + w γ ) S k T ( A ) ( V a r T ( A ) ) 3 .
Assume that the weighting function f has the form f ( t ) = 2 t , t [ 0 , 1 ] . The risk A is a triangular fuzzy number A = ( b , α , β ) with E f ( A ) = 0 , and T is the D-operator S 1 . By Equations (15) and (16), in this case, the previous formula will get the form:
α ( k ) 18 μ ( δ + w γ ) 1 α 2 + β 2 + α β k + 18 3 2 μ 2 γ + 1 γ ( δ + w γ ) 19 ( β 2 α 2 ) 1080 + α β ( β α ) 72 ( α 2 + β 2 + α β ) 3 k 2 .
In the following subsection, we shall prove an approximate calculation formula for the optimal allocation α ( k ) in terms of the following parameters:
  • the indicators of risk aversion, prudence, and temperance associated with the utility function u;
  • T-variance, T-skewness, and T-kurtosis associated with the fuzzy number A.

3.3. Optimal Allocation in Terms of Absolute Risk Aversion, Prudence, and Temperance

To find the way the temperance indicator T u ( w ) = u i v ( w ) u ( w ) appears in the optimal solution α ( k ) , we will write Formula (9) for n = 3 :
α ( k ) k α ( 0 ) + 1 2 k 2 α ( 0 ) + 1 3 ! k 3 α ( 0 ) .
The following third key result of this paper established an approximate calculation formula for α ( 0 ) . The Proof is in Appendix A.
Proposition 6.
The real numbers α ( 0 ) , α ( 0 ) , and α ( 0 ) from Equation (17) verify the following dependence relation:
α ( 0 ) T ( A , x 2 ) + 6 α ( 0 ) μ 2 3 P u ( w ) [ α ( 0 ) α ( 0 ) T ( A , x 3 ) +
3 μ ( α ( 0 ) ) 2 T ( A , x 2 ) ] + + T u ( w ) P u ( w ) ( α ( 0 ) ) 3 T ( A , x 4 ) 0 .
Using the dependence relation of Proposition 6, we will present below a more refined formula of the approximate calculation of the optimal solution α ( k ) . Thus, the second main result of this paper established the approximate value of the optimal solution of our model.
Theorem 1.
α ( k ) μ r u ( w ) 1 T ( A , x 2 ) k + 1 2 ( μ ) 2 P u ( w ) ( r u ( w ) ) 2 T ( A , x 3 ) ( T ( A , x 2 ) ) 3 k 2 + ( μ 3 r u ( w ) 1 ( T ( A , x 2 ) ) 2 + 1 2 μ 3 ( P u ( w ) ) 2 ( r u ( w ) ) 3 ( T ( A , x 3 ) ) 2 ( T ( A , x 2 ) ) 5 + 3 2 μ 3 P u ( w ) ( r u ( w ) ) 2 1 ( T ( A , x 2 ) ) 2 1 6 μ 3 T u ( w ) P u ( w ) ( r u ( w ) ) 3 T ( A , x 4 ) ( T ( A , x 2 ) ) 4 ) k 3 .
Proof. 
According to Equation (12) and Proposition 5,
k α ( 0 ) + 1 2 k 2 α ( 0 ) k μ r u ( w ) 1 T ( A , x 2 ) + 1 2 ( k μ ) 2 P u ( w ) ( r u ( w ) ) 2 T ( A , x 3 ) ( T ( A , x 2 ) ) 3 .
We remark that in the component of Equation (17), besides the expression of Equation (18), 1 3 ! k 3 α ( 0 ) appears. We will compute this term using the dependence relation between α ( 0 ) , α ( 0 ) , and α ( 0 ) from Proposition 6.
Taking into account the approximate values of α ( 0 ) and α ( 0 ) from Propositions 3 and 4, a simple computation shows that:
  • 1 3 ! k 3 6 α ( 0 ) μ 2 = ( k μ ) 3 r u ( w ) 1 T ( A , x 2 ) ,
  • 1 3 ! k 3 3 P u ( w ) α ( 0 ) α ( 0 ) T ( A , x 3 ) = 1 2 ( k μ ) 3 ( P u ( w ) ) 2 ( r u ( w ) ) 3 ( T ( A , x 3 ) ) 2 T ( A , x 2 ) ) 4 ,
  • 1 3 ! k 3 9 P u ( w ) μ ( α ( 0 ) ) 2 T ( A , x 2 ) = 3 2 ( k μ ) 3 P u ( w ) ( r u ( w ) ) 2 1 ( T ( A , x 2 ) ,
  • 1 3 ! k 3 ( α ( 0 ) ) 3 T ( A , x 4 ) T u ( w ) P u ( w ) = 1 6 ( k μ ) 3 T u ( w ) P u ( w ) ( r u ( w ) ) 3 T ( A , x 4 ) ( T ( A , x 2 ) ) 3 .
Multiplying the identity of Proposition 6 by 1 3 ! k 3 and taking into account the four equalities above, it follows:
1 3 ! k 3 α ( 0 ) T ( A , x 2 ) + ( k μ ) 3 r u ( w ) 1 T ( A , x 2 ) 1 2 ( k μ ) 3 ( P u ( w ) ) 2 ( r u ( w ) ) 3 ( T ( A , x 3 ) ) 2 ( T ( A , x 2 ) ) 4
3 2 ( k μ ) 3 P u ( w ) ( r u ( w ) ) 2 1 T ( A , x 2 ) + 1 6 ( k μ ) 3 T u ( w ) P u ( w ) ( r u ( w ) ) 3 T ( A , x 4 ) ( T ( A , x 2 ) ) 3 0 .
From this equation, we find the value of 1 3 ! k 3 α ( 0 ) :
1 3 ! k 3 α ( 0 ) ( k μ ) 3 r u ( w ) 1 ( T ( A , x 2 ) ) 2 + 1 2 ( k μ ) 3 ( P u ( w ) ) 2 ( r u ( w ) ) 3 ( T ( A , x 3 ) ) 2 ( T ( A , x 2 ) ) 5
+ 3 2 ( k μ ) 3 P u ( w ) ( r u ( w ) ) 2 1 ( T ( A , x 2 ) ) 2 1 6 ( k μ ) 3 T u ( w ) P u ( w ) ( r u ( w ) ) 3 T ( A , x 4 ) ( T ( A , x 2 ) ) 4 .
Replacing in Equation (17), k α ( 0 ) + 1 2 k 2 α ( 0 ) with the value from Equation (18) and 1 3 ! k 3 α ( 0 ) with the above-computed value, it follows for α ( k ) the approximate value from the enunciation. □
We rewrite our second main result by means of the four first-order central moments of the risky asset.
Corollary 1.
α ( k ) μ r u ( w ) 1 V a r T ( A ) k + 1 2 ( μ ) 2 P u ( w ) ( r u ( w ) ) 2 S k T ( A ) ( V a r T ( A ) ) 3 k 2 +
[ μ 3 r u ( w ) 1 ( V a r T ( A ) ) 2 + 1 2 μ 3 ( P u ( w ) ) 2 ( r u ( w ) ) 3 ( S k T ( A ) ) 2 ( V a r T ( A ) ) 5
+ 3 2 μ 3 P u ( w ) ( r u ( w ) ) 2 1 ( V a r T ( A ) ) 2 1 6 μ 3 T u ( w ) P u ( w ) ( r u ( w ) ) 3 K T ( A ) ( V a r T ( A ) ) 4 ] k 3 .
Proof. 
Since E f ( A ) = 0 , we will have T ( A , x 2 ) = V a r T ( A ) , T ( A , x 3 ) = S k T ( A ) , and T ( A , x 4 ) = K T ( A ) . □
The approximate expression of α ( k ) from Corollary 1 is quite complicated. Therefore, we denote:
F 1 = 1 r u ( w ) 1 V a r T ( A ) ; F 2 = P u ( w ) ( r u ( w ) ) 2 S k T ( A ) ( V a r T ( A ) ) 3 ; F 3 = 1 r u ( w ) 1 ( V a r T ( A ) ) 2 ; F 4 = ( P u ( w ) ) 2 ( r u ( w ) ) 3 ( S k T ( A ) ) 2 ( V a r T ( A ) ) 5 ; F 5 = P u ( w ) ( r u ( w ) ) 2 1 ( V a r T ( A ) ) 2 ; and F 6 = T u ( w ) P u ( w ) ( r u ( w ) ) 3 K T ( A ) ( V a r T ( A ) ) 4 .
From Corollary 1, we will obtain:
Remark 2.
The approximate value of the optimal allocation α ( k ) will be computed with the following formula:
α ( k ) k μ F 1 + 1 2 ( k μ ) 2 F 2 ( k μ ) 3 [ F 3 1 2 F 4 3 2 F 5 + 1 6 F 6 ] .
To obtain the approximate value of α ( k ) , we will compute first: F 1 , …, F 6 with the previous formulas, then these will be replaced in Equation (19).
One notices that the expression of the optimal solution from Proposition 5 appears in the component of the more general formula of Theorem 1 (in the form of the first two terms). The fact that the proof of Theorem 1 uses the expression from Proposition 5 imposes the separate presentation of the two forms of the approximate solution. Since the formula from Theorem 1 leads to quite complicated calculations, in some cases, the form of the solution from Remark 2 might be preferred.
Example 5.
We consider the possibilistic portfolio Problem 4 with the initial data:
  • the weighting function is f ( t ) = 2 t , t [ 0 , 1 ]
  • the agent’s utility function is u ( w ) = w a , a > 0 .
Then, by Example 3, we have: r u ( w ) = 1 a w ; P u ( w ) = 2 a w ; T u ( w ) = 3 a w ; 1 r u ( w ) = w 1 a ; and P u ( w ) ( r u ( w ) ) 2 = 2 a ( 1 a ) 2 w .
Moreover, we will have: ( P u ( w ) ) 2 ( r u ( w ) ) 3 = ( 2 a ) 2 ( 1 a ) 3 w and T u ( w ) P u ( w ) ( r u ( w ) ) 3 = 3 a ( 2 a ) ( 1 a ) 3 w 3 .
Replacing in ( F i ) i 1 , 2 , 3 , 4 , 5 , 6 , it follows that: F 1 = w 1 a 1 V a r T ( A ) ; F 2 = ( 2 a ) w ( 1 a ) 2 S k T ( A ) ( V a r T ( A ) ) 3 ; F 3 = w 1 a 1 ( V a r T ( A ) ) 3 ; F 4 = ( 2 a ) 2 w ( 1 a ) 3 ( S k T ( A ) ) 2 ( V a r T ( A ) ) 5 ; F 5 = ( 2 a ) w ( 1 a ) 2 1 ( V a r T ( A ) ) 2 ; and F 6 = ( 3 a ) w 3 ( 2 a ) ( 1 a ) 3 K T ( A ) ( V a r T ( A ) ) 4 .
Assume that the risk is represented by the triangular fuzzy number A = ( b , α , β ) and T is the D-operator S 1 . Then, V a r S 1 ( A ) and S k S 1 ( A ) can be computed with Formulas (15) and (16). By [38], Remark 2.1 (2), for K S 1 ( A ) , we have the following value:
T ( A , x 4 ) = K S 1 ( A ) = β 2 α 2 72 + 5 ( α 4 + β 4 ) 432 + 2 α β ( α 2 + β 2 ) 135 .
Replacing the values of V a r S 1 ( A ) , S k S 1 ( A ) , and K S 1 ( A ) in the above expressions of F 1 F 6 , we find the following forms of them:
F 1 = w 1 a 18 α 2 + β 2 + α β ,
F 2 = ( 2 a ) w ( 1 a ) 2 18 3 [ 19 ( β 2 α 2 ) 1080 + α β ( β α ) 72 ] ( α 2 + β 2 + α β ) 3 ,
F 3 = w 1 a 18 3 ( α 2 + β 2 + α β ) 3 ,
F 4 = ( 2 a ) 2 w ( 1 a ) 3 18 5 [ 19 ( β 2 α 2 ) 1080 + α β ( β α ) 72 ] 2 ( α 2 + β 2 + α β ) 5 ,
F 5 = ( 2 a ) w ( 1 a ) 2 324 ( α 2 + β 2 + α β ) 2 , and
F 6 = ( 3 a ) w 3 ( 2 a ) ( 1 a ) 3 1458 α 2 β 2 + 1215 ( α 4 + β 4 ) + 2 × 18 4 135 α β ( α 2 + β 2 ) ( α 2 + β 2 + α β ) 4 .
Replacing the obtained values of F 1 , …, F 6 in Equation (19), one obtains the approximate value of the optimal allocation α ( k ) .

4. Concluding Remarks

In this paper, we addressed the optimization portfolio problem in the framework of a possibilistic E U -theory when the risky asset is a fuzzy number.
The first contribution of the paper was the introduction of special expected utility operators, called D-operators. These were defined by preserving the partial derivability of the utility function with respect to a parameter, which allowed the study of the first-order conditions of the optimization problems. The second contribution of the paper was the formulation of a possibilistic portfolio choice problem inside of E U -theory associated with a D-operator T. The third contribution was the proof of an approximate formula for the solution of the optimization problem associated with that portfolio problem based on the indicators of the investor’s preferences (risk aversion, prudence, temperance) and the possibilistic moments associated with T. The form of the approximate solution depended on the fixed D-operator T .
In a future paper, we will analyze the way the probability-possibility transformation of [39] acts on the portfolio choice problems and on their solutions. Furthermore, we will research how by applying the Vercher et al. procedure [40] to a dataset one obtains a possibilistic choice problem having the form of the one studied in this paper. By applying the formulas from Proposition 5 and Theorem 1, we will be able to obtain approximate solutions of the resulting choice problem. Finding some procedures (theoretical or empirical) to choose the most appropriate D-operator depending on a consistent dataset remains an open problem. Another open problem is in the context of the D-operator, to study models with two types of risk, besides the investment risk from the standard model to appear as a background risk. Both the investment risk and the background risk can be either random variables or fuzzy numbers; thus, we would have four models per total. For each of the four background risk models, we should find approximations of the corresponding optimization problems, such that in the particular case T = S 1 are found the results from [30].

Author Contributions

The authors contributed to the work equally.

Funding

This work has been done under Research Grant No. 17-497RG/MATHS/AF/AC_G-FR3240297728 offered by The World Academy of Sciences (TWAS) to the Applied Mathematics to Social Sciences Research Group of the Laboratory of Mathematics, University of Douala, Cameroon.

Acknowledgments

The authors thank the three reviewers and the editor for the suggestions which led to an improved version of the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Proposition 6

Proof. 
For n = 3 , the first-order condition (11) gets the form
u ( w ) T ( A , k μ + x ) + u ( w ) α ( k ) T ( A , ( k μ + x ) 2 ) + u ( w ) 2 ( α ( k ) ) 2 T ( A , ( k μ + x ) 3 ) + u i v ( w ) 3 ! ( α ( k ) ) 3 T ( A , ( k μ + x ) 4 ) 0 .
From the previous section, we know that T ( A , k μ + x ) = k μ . For a better structure of the computations, we will denote T 1 ( k ) = α ( k ) T ( A , ( k μ + x ) 2 ) , T 2 ( k ) = ( α ( k ) ) 2 T ( A , ( k μ + x ) 3 ) and T 3 ( k ) = ( α ( k ) ) 3 T ( A , ( k μ + x ) 4 ) .
With these notations, the above equation will be written as:
u ( w ) k μ + u ( w ) T 1 ( k ) + u ( w ) 2 T 2 ( k ) + u i v ( w ) 3 ! T 3 ( k ) 0 .
From this, deriving three times, one will obtain:
u ( w ) T 1 ( k ) + u ( w ) 2 T 2 ( k ) + u i v ( w ) 3 ! T 3 ( k ) 0 .
For k = 0 , it follows that:
u ( w ) T 1 ( 0 ) + u ( w ) 2 T 2 ( 0 ) + u i v ( w ) 3 ! T 3 ( 0 ) 0 .
We recall from calculus that for the three-times derivable functions f, g, we have:
( f g ) = f g + 3 f g + 3 f g + f g .
Formula (A2) will be used to determine T 1 ( 0 ) , T 2 ( 0 ) , and T 3 ( 0 ) .
The computation of T 1 ( 0 ) :
By Formula (A2), we have:
T 1 ( k ) = α ( k ) T ( A , ( k μ + x ) 2 ) + 3 α ( k ) d d k T ( A , ( k μ + x ) 2 )
+ 3 α ( k ) d 2 d k 2 T ( A , ( k μ + x ) 2 ) + α ( k ) d 3 d k 3 T ( A , ( k μ + x ) 2 ) .
Applying Condition ( D 2 ) , we will have: d d k T ( A , ( k μ + x ) 2 ) = 2 μ T ( A , k μ + x ) = 2 μ 2 k and d 2 d k 2 T ( A , ( k μ + x ) 2 ) = 2 μ 2 , from which it follows that d d k T ( A , ( k μ + x ) 2 ) | k = 0 = 0 and d 2 d k 2 T ( A , ( k μ + x ) 2 ) | k = 0 = 2 μ 2 .
Replacing these values in the above expression of T 1 ( k ) and knowing that α ( 0 ) = 0 , it will follow that:
T 1 ( 0 ) = α ( 0 ) T ( A , x 2 ) + 6 α ( 0 ) μ 2 .
The computation of T 2 ( 0 ) :
If we denote g ( k ) = ( α ( k ) ) 2 , then knowing Formula (A2), T 2 ( k ) is written as:
T 2 ( k ) = g ( k ) T ( A , ( k μ + x ) 3 ) + 3 g ( k ) d d k T ( A , ( k μ + x ) 3 ) +
3 g ( k ) d 2 d k 2 T ( A , ( k μ + x ) 3 ) + g ( k ) d 3 d k 3 T ( A , ( k μ + x ) 3 ) .
To determine T 2 ( 0 ) , we will compute the values of all terms in the component of T 2 ( k ) for k = 0 .
We remark that: g ( k ) = ( α ( k ) ) 2 ; g ( 0 ) = 0 ; g ( k ) = 2 α ( k ) α ( k ) ; g ( 0 ) = 0 ; g ( k ) = 2 [ α ( k ) α ( k ) + ( α ( k ) ) 2 ] ; g ( 0 ) = 2 ( α ( 0 ) ) 2 ; g ( k ) = 2 [ α ( k ) α ( k ) + 3 α ( k ) α ( k ) ] ; and g ( 0 ) = 6 α ( 0 ) α ( 0 ) .
Applying Condition ( D 2 ) , we will compute the new derivatives: d d k T ( A , ( k μ + x ) 3 ) = 3 μ T ( A , ( k μ + x ) 2 ) ; d d k T ( A , ( k μ + x ) 3 ) | k = 0 = 3 μ T ( A , x 2 ) ; and d 2 d k 2 T ( A , ( k μ + x ) 3 ) = 6 μ 2 T ( A , k μ + x ) = 6 μ 3 k .
With these computations, we obtain the expression of T 2 ( 0 ) :
T 2 ( 0 ) = g ( 0 ) T ( A , x 3 ) + 3 g ( 0 ) 3 μ T ( A , x 2 ) = 6 α ( 0 ) α ( 0 ) T ( A , x 3 ) + 18 μ ( α ( 0 ) ) 2 T ( A , x 2 ) .
The computation of T 3 ( 0 ) :
We denote h ( k ) = ( α ( k ) ) 3 . By the previous expression of T 3 ( k ) and formula (A2), we have:
T 3 ( k ) = h ( k ) T ( A , ( k μ + x ) 4 ) + 3 h ( k ) d d k T ( A , ( k μ + x ) 4 )
+ 3 h ( k ) d 2 d k 2 T ( A , ( k μ + x ) 4 ) + h ( k ) d 3 d k 3 T ( A , ( k μ + x ) 4 ) .
By a simple computation, one obtains h ( 0 ) = h ( 0 ) = h ( 0 ) = 0 ; and h ( 0 ) = 6 ( α ( 0 ) ) 3 .
From this, setting k = 0 in the above expression of T 3 ( k ) , it follows that:
T 3 ( k ) = h ( 0 ) T ( A , x 4 ) = ( 6 α ( 0 ) ) 3 T ( A , x 4 ) .
Replacing the found values of T 1 ( 0 ) , T 2 ( 0 ) , and T 3 ( 0 ) in Equation (A1), one obtains:
u ( w ) [ α ( 0 ) T ( A , x 2 ) + 6 α ( 0 ) μ 2 ]
+ u ( w ) 2 [ 6 α ( 0 ) α ( 0 ) T ( A , x 3 ) + 18 μ ( α ( 0 ) ) 2 T ( A , x 2 ) ]
+ u i v ( w ) 6 [ 6 ( α ( 0 ) ) 3 T ( A , x 4 ) ] 0 .
Dividing by u ( w ) and taking into account that u i v ( w ) u ( w ) = T u ( w ) P u ( w ) , it follows the equation from Proposition 6. □

References

  1. Markowitz, H.M. Portfolio Selection. J. Financ. 1952, 7, 77–91. [Google Scholar]
  2. Merton, R.C. Lifetime Potfolio Selection under Uncertainty. The Continuous Time Case. Rev. Econ. Stat. 1969, 51, 247–257. [Google Scholar] [CrossRef]
  3. Samuelson, P.A. Lifetime Portfolio Selection by Dynamic Stochastic Programming. Rev. Econ. Stat. 1969, 51, 239–246. [Google Scholar] [CrossRef]
  4. Fama, E.F. Multiperiod Consumption-Investment Decisions. Am. Econ. Rev. 1970, 60, 163–174. [Google Scholar]
  5. Brandt, M. Portfolio Choice Problems. In Handbook of Financial Econometrics, Volume 1: Tools and Techniques; Ait-Sahalia, Y., Hansen, L.P., Eds.; North Holland: Amsterdam, The Netherlands, 2010. [Google Scholar]
  6. Eeckhoudt, L.; Gollier, C.; Schlesinger, H. Economic and Financial Decisions under Risk; Princeton University Press: Princeton, NJ, USA, 2005. [Google Scholar]
  7. Gollier, C. The Economics of Risk and Time; MIT: Cambridge, MA, USA, 2004. [Google Scholar]
  8. Arrow, K.J. Essays in the Theory of Risk Bearing; North Holland: Amsterdam, The Netherlands, 1970. [Google Scholar]
  9. Pratt, J.W. Risk Aversion in the Small and in the Large. Econometrica 1964, 32, 122–136. [Google Scholar] [CrossRef]
  10. Athayde, G.; Flores, R. Finding a Maximum Skewness Portfolio General Solution to Three-Moments Portfolio Choice. J. Econ. Dyn. Control 2004, 28, 1335–1352. [Google Scholar] [CrossRef]
  11. Le Courtois, O. On Prudence, Temperance, and Monoperiodic Portfolio Optimization. In Proceedings of the Risk and Choice: A Conference in Honor of Louis Eeckhoudt, Toulouse, France, 12–13 July 2012. [Google Scholar]
  12. Garlappi, L.; Skoulakis, G. Taylor Series Approximations to Expected Utility and Optimal Portfolio Choice. Math. Financ. Econ. 2011, 5, 121–156. [Google Scholar] [CrossRef]
  13. Ñiguez, T.M.; Paya, I.; Peel, D. Pure Higher-Order Effects in the Portfolio Choice Model. Financ. Res. Lett. 2016, 19, 255–260. [Google Scholar] [CrossRef]
  14. Zakamulin, V.; Koekebakker, S. Portfolio Performance Evaluation with Generalized Sharpe Ratios: Beyond the Mean and Variance. J. Bank. Financ. 2009, 33, 1242–1254. [Google Scholar] [CrossRef]
  15. Kimball, M.S. Precautionary Saving in the Small and in the Large. Econometrica 1990, 58, 53–73. [Google Scholar] [CrossRef]
  16. Kimball, M.S. Precautionary Motives for Holding Assets, New Palgrave Dictionary of Money and Finance; MacMillan Press: London, UK; Stockton Publishers: New York, NY, USA, 1992; Volume 3, pp. 158–161. [Google Scholar]
  17. Carlsson, C.; Fulle´r, R. On Possibilistic Mean Value and Variance of Fuzzy Numbers. Fuzzy Sets Syst. 2001, 122, 315–326. [Google Scholar] [CrossRef]
  18. Carlsson, C.; Fulle´r, R. Possibility for Decision; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  19. Fulle´r, R.; Majlender, P. On Weighted Possibilistic Mean and Variance of Fuzzy Numbers. Fuzzy Sets Syst. 2003, 136, 363–374. [Google Scholar] [CrossRef]
  20. Georgescu, I. Possibility Theory and the Risk; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  21. Zhang, W.G.; Wang, Y.L. A Comparative Analysis of Possibilistic Variances and Covariances of Fuzzy Numbers. Fundam. Inform. 2008, 79, 257–263. [Google Scholar]
  22. Collan, M.; Fedrizzi, M.; Luukka, P. Possibilistic Risk Aversion in Group Decisions: Theory with Application in the Insurance of Giga-investments Valued through the Fuzzy Pay-off Method. Soft Comput. 2017, 21, 4375–4386. [Google Scholar] [CrossRef]
  23. Georgescu, I. Possibilistic Risk Aversion. Fuzzy Sets Syst. 2009, 160, 2608–2619. [Google Scholar] [CrossRef]
  24. Georgescu, I. A Possibilistic Approach to Risk Aversion. Soft Comput. 2010, 15, 795–801. [Google Scholar] [CrossRef]
  25. Lucia-Casademunt, A.M.; Georgescu, I. Optimal Saving and Prudence in a Possibilistic Framework. In DCAI, Advances in Intelligent Systems and Computing; Springer: Cham, Switzerland, 2013; Volume 217, pp. 61–68. [Google Scholar]
  26. Georgescu, I. Risk Aversion, Prudence and Mixed Optimal Saving Models. Kybernetika 2014, 50, 706–724. [Google Scholar] [CrossRef]
  27. Georgescu, I.; Kinnunen, J. Mixed Models for Risk Aversion, Optimal Saving and Prudence. Fuzzy Econ. Rev. 2016, 21, 47–70. [Google Scholar] [CrossRef]
  28. Georgescu, I.; Cristóbal-Campoamor, A.; Lucia-Casademunt, A.M. A Possibilistic and Probabilistic Approach to Precautionary Saving. Panoeconomicus 2017, 64, 273–295. [Google Scholar] [CrossRef]
  29. Mezei, J. A Quantitative View on Fuzzy Numbers. Ph.D. Thesis, Turku Centre for Computer Science, Turku, Finland, 2011. [Google Scholar]
  30. Georgescu, I. The Effect of Prudence on the Optimal Allocation in Possibilistic and Mixed Models. Mathematics 2018, 6, 133. [Google Scholar] [CrossRef]
  31. Zadeh, L.A. Fuzzy Sets as a Basis for a Theory of Possibility. Fuzzy Sets Syst. 1978, 1, 3–28. [Google Scholar] [CrossRef]
  32. Georgescu, I. Expected Utility Operators and Possibilistic Risk Aversion. Soft Comput. 2012, 16, 1671–1680. [Google Scholar] [CrossRef]
  33. Kaluszka, M.; Kreszowiec, M. On Risk Aversion under Fuzzy Random Data. Fuzzy Sets Syst. 2017, 328, 35–53. [Google Scholar] [CrossRef]
  34. Tassak, C.D.; Sadefo, J.K.; Fono, L.A.; Andjiga, N.G. Characterization of Order Dominances on Fuzzy Variables for Portfolio Selection with Fuzzy Returns. J. Oper. Res. Soc. 2017, 68, 1491–1502. [Google Scholar] [CrossRef]
  35. Sadefo, J.K.; Tassak, C.D.; Fono, L.A. Moments and Semi-moments for Fuzzy Portfolios Selection. Insur. Math. Econ. 2012, 51, 517–530. [Google Scholar] [CrossRef]
  36. Majlender, P. A Normative Approach to Possibility Theory and Decision Support. Ph.D. Thesis, Turku Centre for Computer Science, Turku, Finland, 2004. [Google Scholar]
  37. Thavaneswaran, A.; Thiagarajahb, K.; Appadoo, S.S. Fuzzy Coefficient Volatility (FCV) Models with Applications. Math. Comput. Model. 2007, 45, 777–786. [Google Scholar] [CrossRef]
  38. Thavaneswaran, A.; Appadoo, S.S.; Paseka, A. Weighted Possibilistic Moments of Fuzzy Numbers with Applications to GARCH Modeling and Option Pricing. Math. Comput. Model. 2009, 49, 352–368. [Google Scholar] [CrossRef]
  39. Dubois, D.; Foulloy, L.; Mauris, G.; Prade, H. Probability–Possibility Transformations, Triangular Fuzzy Sets and Probabilistic Inequalities. Reliab. Comput. 2004, 10, 273–297. [Google Scholar] [CrossRef]
  40. Vercher, E.; Bermudez, J.D.; Segura, J.V. Fuzzy Portfolio Optimization under Downside Risk Measures. Fuzzy Sets Syst. 2007, 158, 769–782. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

Georgescu, I.; Fono, L.A. A Portfolio Choice Problem in the Framework of Expected Utility Operators. Mathematics 2019, 7, 669. https://doi.org/10.3390/math7080669

AMA Style

Georgescu I, Fono LA. A Portfolio Choice Problem in the Framework of Expected Utility Operators. Mathematics. 2019; 7(8):669. https://doi.org/10.3390/math7080669

Chicago/Turabian Style

Georgescu, Irina, and Louis Aimé Fono. 2019. "A Portfolio Choice Problem in the Framework of Expected Utility Operators" Mathematics 7, no. 8: 669. https://doi.org/10.3390/math7080669

APA Style

Georgescu, I., & Fono, L. A. (2019). A Portfolio Choice Problem in the Framework of Expected Utility Operators. Mathematics, 7(8), 669. https://doi.org/10.3390/math7080669

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop