Gain Comparison between NIFTY and Selected Stocks identified by SOM using Technical Indicators
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 2
Abstract
The main aim of every investor is to identify a stock that has potential to go up so that the investor can maximize possible returns on investment. After identification of stock the second important point of decisionmaking is the time to make entry in that particular stock so that investor can get maximum returns on investment in short period of time. There are many conventional techniques being used and these include technical and fundamental analysis. The main issue with any approach is the proper weighting of criteria to obtain a list of stocks that are suitable for investments. This paper proposes a method for stock picking and finding entry point of investment in stocks using a hybrid method consisting of self-organizing maps and selected technical indicators. The stocks selected using our method has given 37.14% better returns in a period of one and a half month in comparison to NIFTY
Authors and Affiliations
Dr. Asif Khan
Integration of Irreversible Gates in Reversible Circuits Using NCT Library
The reversible circuit synthesis problem can be reduced to permutation group. This allows Schreier-Sims Algorithm for the strong generating set-finding problem to be used to synthesize reversible circuits using...
A Short-Normalized Attack Graph Based Approach for Network Attack Analysis
Abstract: Attack graphs are the graphs which describe attack scenarios, play important roles in analyzing network threats. These attack graphs are able to reveal such potential threats by evaluating the all possibl...
Performance Evaluation of Voice and video conferencing For WIMAX Network under Various Modulation techniques
Abstract: Worldwide interoperability for Microwave Access (WIMAX) that based on 802.16d/e Orthogonal Frequency Division Multiplexing (OFDM) and based on adaptive Physical Layer (PHY), It provides wireless broadband to fi...
CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topi...
5 Pen Technology
Abstract: Computer affects our life in a much bigger way then most of us might have thought. It has become a compulsory requirement in most professions to be able to use computer software. The first computer invent...