Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Risk Analysis

Implementing The Heston Option Pricing Model In Object-Oriented Cython, Brandon Hardin Dec 2017

Implementing The Heston Option Pricing Model In Object-Oriented Cython, Brandon Hardin

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

The 1973 Black-Scholes model, a revolutionary option pricing formula whose price is 'relatively close to observed prices, makes an assumption that the volatility is constant and thus, deterministic. This causes some inefficiencies and patterns in the pricing of options due to the model providing evidence of the volatility smile' of the volatility. Many scholars have suggested that the volatility should be modelled by a stochastic process and the (1993) Heston Model is one of many proposed solutions to remedy this problem. The Heston Model allows for the 'smile' by defining the volatility as a stochastic process. This thesis considers a …


Identification Of Reverse Engineering Candidates Utilizing Machine Learning And Aircraft Cannibalization Data, Marc Banghart Oct 2017

Identification Of Reverse Engineering Candidates Utilizing Machine Learning And Aircraft Cannibalization Data, Marc Banghart

International Journal of Aviation, Aeronautics, and Aerospace

As military aircraft continue to remain in service and age, cannibalization of parts is increasing. Proactive identification of parts that are at high risk for cannibalization will inform engineering processes such as reverse engineering, thus allowing potentially reducing lead time to develop new parts. The research objective was to develop a causal structure that can be used for prediction of when cannibalization actions may occur. Bayesian networks allow encoding of causality between various descriptive features given a data set. The method utilized a tabu search algorithm, identified the underlying causal structure and the associated node probabilities. The method is then …