Next Article in Journal
An FTwNB Shield: A Credit Risk Assessment Model for Data Uncertainty and Privacy Protection
Previous Article in Journal
Imaging Hyperspectral Feature Fusion for Estimation of Rapeseed Pod’s Water Content and Recognition of Pod’s Maturity Level
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Improved Genetic Algorithm for Multi-Period Fractional Programming Portfolio Optimization Model in Fuzzy Environment

1
School of Mathematics and Information Science, North Minzu University, Yinchuan 750021, China
2
The Collaborative Innovation Center for Scientific Computing and Intelligent Information Processing, North Minzu University, Yinchuan 750021, China
3
The Key Laboratory of Intelligent Information and Big Data Processing, North Minzu University, Yinchuan 750021, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(11), 1694; https://doi.org/10.3390/math12111694
Submission received: 23 April 2024 / Revised: 26 May 2024 / Accepted: 27 May 2024 / Published: 29 May 2024

Abstract

:
The complexity of historical data in financial markets and the uncertainty of the future, as well as the idea that investors always expect the least risk and the greatest return. This study presents a multi-period fractional portfolio model in a fuzzy environment, taking into account the limitations of asset quantity, asset position, transaction cost, and inter-period investment. This is a mixed integer programming NP-hard problem. To overcome the problem, an improved genetic algorithm (IGA) is presented. The IGA contribution mostly involves the following three points: (i) A cardinal constraint processing approach is presented for the cardinal constraint conditions in the model; (ii) Logistic chaotic mapping was implemented to boost the initial population diversity; (iii) An adaptive golden section variation probability formula is developed to strike the right balance between exploration and development. To test the model’s logic and the performance of the proposed algorithm, this study picks stock data from the Shanghai Stock Exchange 50 for simulated investing and examines portfolio strategies under various limitations. In addition, the numerical results of simulated investment are compared and analyzed, and the results show that the established models are in line with the actual market situation and the designed algorithm is effective, and the probability of obtaining the optimal value is more than 37.5% higher than other optimization algorithms.

1. Introduction

Investment portfolio selection is a popular issue in today’s financial engineering. It focuses mostly on how to appropriately deploy assets in order to diversify risk and obtain higher returns than bank savings and government bonds. The introduction of the Markowitz [1] mean-variance (MV) portfolio model in 1952 marks the beginning of modern portfolio problem research. Since that time, several quantitative methodologies based on the MV model have been created and used in portfolio decision-making [2,3,4,5]. Nonetheless, given the unpredictability of asset returns, as well as the complexity and variety of the real world, it is necessary to examine how to develop a realistic, efficient, and practical investment portfolio model. Similarly, with the rapid advancement of artificial intelligence, the goal is to figure out how to employ intelligent algorithms to solve such issues quickly and efficiently, which represents the ideal marriage of finance and computer science.
The investment market is riddled with difficult-to-assess uncertainty. Investors are unable to obtain trustworthy and effective market information as a result of these uncertainties, and they can only estimate the approximate range of risks and rewards. The fuzzy set theory proposed by Zadeh [6] has provided a fresh approach to this problem. This theory has found widespread application in a wide range of fields, including portfolio optimization, management optimization, resource allocation, and chemical engineering. Katagiri and Ishii [7] were the first to apply fuzzy set theory to the subject of portfolio selection, employing fuzzy uncertainty to describe the uncertainty factors in the securities market. Fuzzy set theory provides powerful analytical tools as well as a new perspective on portfolio selection difficulties.To begin addressing this issue, one must first establish how to cope with portfolio return volatility. Fuzzy numbers with probability or belief distributions are frequently used to estimate the returns on risky assets. Pahade and Jha [8], for example, changed portfolio selection using possibility theory rather than probability theory. They created a portfolio selection model based on the potential semi-absolute deviation approach, taking into account investor preferences and stock features. Pahade and Jha [9] utilized credibility theory (a major field of fuzzy set theory) to extend Markowitz’s mean-variance portfolio selection model to a mean-variance-skewness model. They proposed a polynomial goal programming approach to deal with it. Gupta [10] simulates asset returns and investors’ perception of the stock market (pessimistic, optimistic, or neutral), and uses average absolute semi-deviation and conditional value at risk (CVaR) as risk measures, respectively, to develop a multi-cycle and multi-objective portfolio optimization model. To solve the model, the actual coded genetic algorithm was utilized. Mehlawat, Gupta, and Khan [11] proposes a new confidence function to accommodate investor attitudes (pessimistic, optimistic, or neutral) and capture return expectations, replacing variance as a measure of quantified risk with a more realistic mean-absolute semi-likelihood and solving the resulting confidence model with a real-coded genetic algorithm. Gao, Sheng, Wang, et al. [12] proposed an artificial swarm algorithm based on a new mechanism of direction learning and elite learning for the fuzzy portfolio selection problem.
Due to the complexity of financial trading markets and numerous variables such as transaction costs, management charges, and the trading complexity involved in investments, it is neither suitable nor feasible to select too many types and quantities of assets in an investment portfolio. This would result in investors not having the resources to handle these assets properly, perhaps resulting in losses. To better match the investment portfolio model to the real investment environment, cardinality constraints on the number of assets in the portfolio must be enforced. Vercher and Bermúdez [13] suggested utilizing the fuzzy mean-absolute deviation framework, a cardinality-constrained multi-objective optimization problem, for designing efficient portfolios. Leung, Wang, and Che [14] proposed a cooperative optimization technique for cardinality-constrained portfolio selection based on brain dynamics. In the same year, they also created a dual-time-scale, dual-neural-dynamics approach [15], which they utilized to handle the cardinality-constrained portfolio re-balancing optimization problem. Meng and Zhou [16] developed a multi-period fuzzy mean-variance-liquidity portfolio selection model under uncertain conditions by adding transaction costs, cardinality restrictions, and limited constraints. To solve this problem, they created an enhanced differential evolution method. It is clear that adding cardinality limitations into portfolio models is critical, with broad relevance and practical value. Zhao, Chen, Zhan, et al. [17] presented MoCCPOP and MPCoPSO algorithms based on the MPMO framework, established a BLS strategy based on particle update and a HEC strategy based on archive update, and effectively addressed the multi-objective issue in the MoCCPOP model. Yang, Qian, Yang, et al. [18] propose a new collaborative MOEA with diffused population generation (DPG-SMOEA), which addresses premature convergence and insufficient population diversity by integrating MOEA with a diffusion model. Deliktas and Ustun [19] propose a fuzzy MULTIMOORA method based on correlation coefficient and standard deviation (CCSD) and an integrated method based on mean-variance-ranking cardinal-constrained portfolio optimization (MVRCCPO) to extend the classical mean-variance cardinal-constrained portfolio optimization model. Alshraideh, Mahafzah, Eyal Salman, et al. [20] use a new genetic algorithm (GA) as a search technique to find the required test data according to the branch criterion. The test stored PL/SQL program units. Chen, Li, and Liu [21] proposed a multi-period uncertain portfolio model with cardinality constraints and proposed an improved ICA-FA algorithm for the model. Liu [22] proposed a multi-period portfolio performance evaluation model under realistic assumptions of return demand, risk control, base constraint, and batch constraint. A new feasibility-based particle swarm optimization (NFBPSO) algorithm was designed to solve the model. It employs a genetic algorithm to solve CCSD instead of the dominant rules of Deliktas and Ustun. Yang, Chen, Liu, et al. [23] proposed a multi-period possibility mean-semi-variance combination selection model with multiple short-selling constraints, which was established on the basis of three types of short-selling constraints, namely total short-selling proportion constraint, short-selling base constraint, and upper and lower bound constraint, and a simulated annealing multi-particle swarm optimization algorithm was designed to solve this problem. It is clear that including a cardinality restriction into a portfolio model is critical, and it has broad relevance and practical value.
Contemporary researchers’ research on portfolio optimization mainly aims to improve and expand the standard MV model in the following three directions: (i) simplification of type and quantity, input data; (ii) introduction of alternative risk measures; (iii) incorporation of real-world constraints. The research focus of this paper mainly focuses on (ii) and (iii) and the method design of solving this kind of problem. The aim of this research work is twofold. Firstly, a new fuzzy fractional programming multi-cycle portfolio selection model, MMFVCCPO, is established by means of a mean-variance framework and the concept of fractional programming under realistic constraints, such as transaction cost, cap of shareholding, and base of portfolio. The purpose of introducing the fractional programming concept is to analyze investment risk and return at the same level, so that there is no priority between the two goals, and to avoid the defect of the general multi-objective model that needs to sacrifice one goal to fulfill the other goal when solving. Assuming that the rate of return of securities is an uncertain variable, its value is obtained by processing the historical data according to the objective frequency statistical method.
In the presence of the above constraints and the objective function based on fractions, the resulting portfolio selection problem is NP-complete. Therefore, it is difficult to solve the proposed model using traditional optimization methods. In addition, the use of realistic constraints such as those described above is considered to be highly advantageous for obtaining an efficient actual portfolio. With these insights in mind, we propose a new heuristic, called IGA, which is based on genetic algorithms with two improvements. In the IGA method proposed in this paper, firstly, the logistic chaotic mapping method is introduced into the population initialization process, and secondly, a golden section variation probability formula is proposed, which is large in the early stage and small in the later stage. The two improvements make the algorithm achieve the best balance between exploration and development. Thus, portfolio selection is more balanced than existing heuristics.
Considering that there are few studies on the uncertain portfolio model based on fractional programming, and the above practical constraints are not taken into account at the same time, the research work in this paper combines the characteristics of two heuristic methods that have been thoroughly studied in the optimization field, modeling and simulating investment in the multi-period environment of fractional programming, pursuing continuous investment period, and balancing risk–return objectives. It can be seen that our model is more consistent with the real investment behavior and investor psychology. We also propose an IGA for the combinatorial selection problem, which integrates the logistic chaotic mapping method and improved golden section variation probability formula into the genetic algorithm to achieve the optimal balance of exploration and development. To illustrate our work, we selected some representative portfolio models based on uncertainty theory for detailed comparison (Table 1). As can be seen from Table 1, the model proposed in this paper is not only a new portfolio selection model but also a new heuristic method to solve complex uncertain portfolio problems, and is indeed a novel contribution to the existing literature.
The rest of this article is arranged as follows. Section 2 briefly reviews the related concepts of fuzzy set theory. In Section 3, the construction process of the fuzzy fractional programming multi-period portfolio selection model with realistic constraints is presented. In Section 4, we propose a cardinal constraint processing method for the cardinal constraint in the model, which makes the model more flexible and can adapt to the needs of different investors and meet the investment psychology of different investors. To solve this problem, an improved IGA is proposed. In Section 5, the validity of the model and algorithm is verified by simulation experiments. See Figure 1 for a detailed graphic summary.

2. Preliminaries

Fuzzy set theory was first proposed by Zadeh [6], which is mainly used to describe the fuzzy uncertainty of information. Fuzzy number is actually a special form of fuzzy set. Fuzzy number and its related concepts are briefly introduced below.
Definition 1 
([27]). Assuming X ˜ is a mapping of X to the range [ 0 , 1 ] , where A ˜ : X [ 0 , 1 ] , X A ˜ ( X ) , say X ˜ is fuzzy set on the X, and the function A ˜ ( . ) is the membership function of fuzzy set A ˜ , A ˜ ( x ) called x for fuzzy sets A ˜ membership degree.
Definition 2 
([27]). Fuzzy set A ˜ has membership function A ˜ ( x ) : X [ 0 , 1 ] ; to call it fuzzy number A ˜ , it must meet the following conditions:
(1)
A ˜ is regular, exist  x 0 R make A ˜ ( x 0 ) = 1 ;
(2)
A ˜ ( x ) is convex, means when x , y R , have λ [ 0 , 1 ] , and also have A ˜ ( λ x + ( 1 λ ) y ) m i n { A ˜ ( x ) , A ˜ ( y ) }  ;
(3)
A ˜ ( x ) is upper semi-continuous and bounded, which means  ε [ 0 , 1 ] , grep A ˜ ε = { x R | A ˜ ( x ) > ε } is A ˜ a fuzzy support set;
(4)
s u p ( A ˜ ) = { x | x R , A ˜ ( x ) > 0 }  is a compact set, which also is a support set of A ˜ .
Definition 3 
([9]). A fuzzy number A ˜ F ( U )  ,  A ˜ = ( a , b , α , β ) is a trapezoid fuzzy number for interval [a,b], α is the fuzzy number left width, β is the right width of the fuzzy number. The fuzzy number can be derived from this A ˜ = ( a , b , α , β ) In γ− level cut sets [ A ˜ ] γ = [ a ( γ ) , a ¯ ( γ ) ] = [ a α ( 1 γ ) , b + β ( 1 γ ) ] the following probability mean and variance are:
M ( A ˜ ) = 1 2 ( M ( A ˜ ) + M + ( A ˜ ) ) = 0 1 γ ( a ( γ ) + a ¯ ( γ ) ) d γ
V a r ( A ˜ ) = 0 1 γ [ ( M ( A ˜ ) a ( γ ) ) 2 + ( M ( A ˜ ) a ¯ ( γ ) ) 2 ] d γ = 1 2 0 1 γ ( a ¯ ( γ ) a ( γ ) ) 2 d γ
Assuming  A ˜ = ( a , b , α , β )  is a trapezoidal fuzzy number, then its membership function [28] can be expressed as:
μ A ˜ ( x ) = 1 a x α , a α x a , 1 , a x b , 1 x b β , b x b + β , 0 , e l s e .
The γ − level cut of the trapezoidal fuzzy number A ˜ is: [ A ˜ ] γ = [ a ( γ ) , a ¯ ( γ ) ] , of which a ( γ ) = a α ( 1 γ ) a ¯ ( γ ) = b + β ( 1 γ ) ,   γ [ 0 , 1 ]  .  γ  is called the confidence level or confidence level,  a ( γ )  and  a ¯ ( γ ) ,  respectively, are  γ − the left and right endpoints of the horizontal cut set.
Therefore, based on Definition 3, the possibility mean and possibility variance of the trapezoidal fuzzy number are expressed as follows:
M ( A ˜ ) = a + b 2 + ( β α ) 6
V a r ( A ˜ ) = ( b a 2 + α + β 6 ) ] 2 + 1 72 [ ( α + β ) 2 + ( ( α β ) 2 ]
Theorem 1 
([29]). Assuming the A ˜ 1 , A ˜ 2 , , A ˜ n Mathematics 12 01694 i001 is any given n fuzzy numbers, and λ 1 , λ 2 , , λ n is a real number, then
V a r ( i = 1 n λ i A ˜ i ) = i = 1 n λ 2 V a r ( Φ ( λ i ) A ˜ i ) + 2 i < j = 1 n | λ i λ j | C o v ( Φ ( λ i ) A ˜ i , Φ ( λ j ) A ˜ j ) ,
where Φ ( x ) is a symbolic function.

3. Fuzzy Multi-Period Portfolio Model

This section is divided into two parts. The first part is the explanation of the related symbols used in this paper. The second part is the process of establishing a fuzzy multi-period portfolio model considering various practical constraints.

3.1. Related Symbol Specification

Suppose investors distribute their wealth among n securities with uncertain returns to obtain the final wealth for period T. Assume that the rates of return of different periods are independent of each other, and the rate of return R i t ( i = 1 , 2 , , n ; t = 1 , 2 , , T ) is represented as a trapezoidal fuzzy variable. For convenience, we present the economic implications of the symbols used in this article in Table 2.

3.2. Fractional Programming Multi-Period Portfolio Model with Realistic Constraints in Fuzzy Environment

As mentioned earlier, incorporating constraints such as cardinality constraints into the portfolio selection model will result in more realistic and reasonable portfolios. In this paper, we consider several practical constraints to improve the portfolio selection model.
  • Cardinality constraint
The number of investments in a large number of securities cannot exceed a predefined upper limit, and this number is referred to as the cardinality. If asset i is held in period t, z i t = 1 ; otherwise, z i t = 0 . The specific situation can be represented as follows:
z i t = 1 , Holding   assets , 0 , else .
Assuming that the maximum limit for the number of assets in a portfolio in period t is K, the cardinality constraint is expressed as follows:
i = 1 n z i t K , t = 1 , 2 , , T .
  • Asset holding limits
To ensure that the investment allocation for each security is within a specific range, with a given minimum ε i and maximum δ i , such that 0 ε i t x i t δ i t 1 , considering the cardinality constraint mentioned above, the representation of investment portfolio asset holding with cardinality constraint can be obtained as follows:
l i t z i t x i t μ i t z i t , i = 1 , 2 , , n , t = 1 , 2 , , T .
  • Limit on the proportion of total investment
In the investment process, it is generally assumed that the sum of the investment proportion of assets is 1, that is
i = 1 n x i t = 1 , t = 1 , 2 , , T .
  • Terminal wealth
As defined in Definition 3, the fuzzy possibility mean of the portfolio return in period t can be represented as follows:
E ( i = 1 n x i t r i t ) = i = 1 n x i t ( a i t + b i t 2 + ( β i t α i t ) 6 ) .
In the real stock exchange market, transaction cost has a great impact on investment return, which will directly affect the final return of the investment portfolio. Similar to the study in the literature [29], this paper adopts the V-shaped transaction cost function. That is, the transaction cost of securities i in period t can be expressed as:
C i t = c i t | x i t x i , t 1 | , i = 1 , 2 , , n ; t = 1 , 2 , , T ,
where c i t represents the transaction cost rate in period t, x i , t 1 = ( x 1 , t 1 , x 2 , t 1 , , x n , t 1 ) is the investment portfolio in period t − 1, and x i , t = ( x 1 , t , x 2 , t , , x n , t ) is the current investment portfolio in period t. Therefore, the total investment cost of Phase t is
C t = i = 1 n C i t = i = 1 n c i t | x i t x i , t 1 | , t = 1 , 2 , , T .
Taking into account the transaction costs, the fuzzy possibility mean of the net return of the portfolio in period t, after deducting the transaction costs, can be calculated as follows:
E ( R N t ) = i = 1 n x i t ( a i t + b i t 2 + β i t α i t 6 ) i = 1 n c i t | x i t x i , t 1 | .
Furthermore, there exists the following relationship between the fuzzy expected value of the end-of-period t wealth and the fuzzy expected value of the end-of-period t − 1 wealth:
M t = M t 1 E ( R N t ) .
By repeatedly iterating the above equation, we can obtain the expected values of the terminal wealth, M T T W , and cumulative wealth, M T A W , over the entire investment period, represented as follows:
M T T W = M 0 t = 1 T ( 1 + E ( R N t ) ) .
M T A W = M 0 t = 1 T ( 1 + E ( R N t ) ) .
  • Fuzzy risk
According to Definition 3, the possibility variance, V a r , of the investment portfolio x t = ( x 1 t , x 2 t , , x n t ) in period t can be represented as:
V a r ( R N t ) = V a r ( i = 1 n x i t r ˜ i t ) = i = 1 n x i t 2 V a r ( r ˜ i t ) + 2 i < j = 1 n x i t x j t C o v ( r ˜ i t , r ˜ j t ) = [ i = 1 n x i t ( b i t a i t 2 + α i t + β i t 6 ) ] 2 + 1 72 [ ( i = 1 n x i t ( α i t + β i t ) ) 2 + ( i = 1 n x i t ( α i t β i t ) ) 2 ] .
Furthermore, according to Definition 3 and Theorem 1, the final risk obtained by multiplying the risks of each period of the investment portfolio over the entire investment period is:
V a r T T = t = 1 T V a r ( i = 1 n x i t r ˜ i t ) = t = 1 T [ i = 1 n x i t 2 V a r ( r ˜ i t ) + 2 i < j = 1 n x i t x j t C o v ( r ˜ i t , r ˜ j t ) ] = t = 1 T { [ i = 1 n x i t ( b i t a i t 2 + α i t + β i t 6 ) ] 2 + 1 72 [ ( i = 1 n x i t ( α i t + β i t ) ) 2 ( i = 1 n x i t ( α i t β i t ) ) 2 ] } .
Similarly, using Definition 3 and Theorem 1, we can also derive the cumulative risk of the investment portfolio over the entire investment period [26] as:
V a r T A = t = 1 T V a r ( i = 1 n x i t r ˜ i t ) = t = 1 T [ i = 1 n x i t 2 V a r ( r ˜ i t ) + 2 i < j = 1 n x i t x j t C o v ( r ˜ i t , r ˜ j t ) ] = t = 1 T { [ i = 1 n x i t ( b i t a i t 2 + α i t + β i t 6 ) ] 2 + 1 72 [ ( i = 1 n x i t ( α i t + β i t ) ) 2 + ( i = 1 n x i t ( α i t β i t ) ) 2 ] } .
In the securities market, investors usually want to reduce risk while increasing the return on their investment portfolios. However, maintaining this perfect equilibrium is frequently difficult in practice, and concessions must be made. In this study, we develop an investment portfolio model with the goal function of minimizing the product of risk and return ratios over various periods. This seeks to establish as much balance as possible between the two objectives. The return on the portfolio in period t is determined based on the performance in period t − 1, allowing investment outcomes to be transmitted over many periods. Based on this, and assuming that the expected return is more than α and the risk is less than β , we develop the fractional programming multi-period investment portfolio model MMFVCCPO, which has realistic constraints in a fuzzy environment and can be represented as:
m i n f ( x ) = t = 1 T [ i = 1 n x i t ( b i t a i t 2 + α i t + β i t 6 ) ] 2 + 1 72 [ ( i = 1 n x i t ( α i t + β i t ) ) 2 + ( i = 1 n x i t ( α i t β i t ) ) 2 ] i = 1 n x i t ( a i t + b i t 2 + β i t α i t 6 ) i = 1 n c i | x i t x i , t 1 | s . t . i = 1 n x i t ( a i t + b i t 2 + β i t α i t 6 ) i = 1 n c i | x i t x i , t 1 | α t , t = 1 , 2 , , T . M t = M t 1 [ i = 1 n x i t ( a i t + b i t 2 + β i t α i t 6 ) i = 1 n c i | x i t x i , t 1 | ] , t = 1 , 2 , , T . [ i = 1 n x i t ( b i t a i t 2 + α i t + β i t 6 ) ] 2 + ( i = 1 n x i t ( α i t + β i t ) ) 2 72 + ( i = 1 n x i t ( α i t β i t ) ) 2 72 β t , t = 1 , 2 , , T . i = 1 n z i t K , t = 1 , 2 , , T . z i t { 0 , 1 } , i = 1 , 2 , , n , t = 1 , 2 , , T . l i t z i t x i t μ i t z i t , i = 1 , 2 , , n , t = 1 , 2 , , T . i = 1 n x i t = 1 , t = 1 , 2 , , T .
The MMFVCCPO model’s goal function is to minimize the product of the risk–return ratios of each period throughout the whole investment term. The aim is to reduce the product of each period’s risk–return ratios while assuring the lowest risk–return ratio in each period. The model’s first constraint stipulates that the investment portfolio’s return in period t must be greater than or equal to the specified α t . The second constraint indicates that the expected value of the wealth method at the beginning of the t period is calculated memorically on the basis of the previous period, reflecting the continuity of multi-period investment. The third restriction specifies that the investment portfolio’s risk in period t cannot exceed β t . The fourth restriction reflects the amount of assets in the investment portfolio in period t, which must be fewer than or equal to K. The fifth constraint, which is a binary vector with values of 0 or 1, represents the holding status of an asset in the investment portfolio. The sixth constraint reflects a restriction on the investment percentage in asset i, which requires the investment proportion in asset i to be between 0 l i x i μ i 1 . The seventh criterion is the aggregate of investment proportions, which must be greater than one.
It should be observed that each of the preceding constraints has T smaller constraints, each of which corresponds to T periods. The following are the benefits of adding fractional programming: (1) It reduces the complexity of the problem by converting the original multi-objective problem to a single-objective problem. (2) When comparing risk and return, it attempts to minimize risk while maximizing return, treating both objectives equally. It is not necessary to give up the weight of one goal in order to achieve the other, i.e., there is no priority differential. It can, to some extent, strike an ideal balance between the two goals.

4. Solution Method for Model

This section is divided into two parts. The first part introduces the method of constraint processing in the model. The second part is an improved genetic algorithm for the model.

4.1. Constraint Processing Method (Semi-Penalty Function Method)

The semi-penalized function approach solves nonlinear constrained optimization problems numerically. It converts complicated restrictions into penalty terms in the objective function, resulting in a sequence of optimization problems with smaller constraints.This approach is used in this study to address the first three constraints in the MMFVCCPO model. In the model, the penalty terms for the equality and inequality requirements are defined as follows:
h 1 ( x ) = ( M t M t 1 [ i = 1 n x i t ( a i t + b i t 2 + ( β i t α i t ) 6 ) i = 1 n c i | x i t x i , t 1 | ] ) 2 ; h 2 ( x ) = ( m a x { 0 , α t i = 1 n x i t ( a i t + b i t 2 + ( β i t α i t ) 6 ) i = 1 n c i | x i t x i , t 1 | } ) 2 ; h 3 ( x ) = ( m a x { 0 , [ i = 1 n x i t ( b i t a i t 2 + α i t + β i t 6 ) ] 2 + i = 1 n x i t ( α i t + β i t ) ) 2 72 + i = 1 n x i t ( α i t β i t ) ) 2 72 β t } ) 2 .
Based on the equation above, the penalty function for the MMFVCCPO model is defined as follows:
F ( x ) = f ( x ) + L ( h 1 ( x ) + h 2 ( x ) + h 3 ( x ) ) ,
where f ( x ) represents the objective function value and L represents the penalty factors applied to the equality and inequality constraints. Thus, the MMFVCCPO model can be formulated as the constrained optimization problem SPFM as follows:
S P F M : m i n F ( x ) = t = 1 T V a r ( R N t ) M ( R N t ) + L ( h 1 ( x ) + h 2 ( x ) + h 3 ( x ) ) s . t . i = 1 n z i t K , t = 1 , 2 , , T . z i t { 0 , 1 } , i = 1 , 2 , , n , t = 1 , 2 , , T . l i t z i t x i t μ i t z i t , i = 1 , 2 , , n , t = 1 , 2 , , T . i = 1 n x i t = 1 , t = 1 , 2 , , T .
The investment portfolio model is turned into a sequence of restricted optimization problems to solve the penalty coefficients using the semi-penalized function approach described above. Furthermore, in the methodology part, this study develops an approach for dealing with cardinality restrictions and uses normalization methods to deal with additional constraints individually. For further information, please see Section 4.2. Using the semi-penalty function method to deal with constraints can ensure that, when an infeasible solution occurs, a penalty is imposed to ensure that the solution is in the feasible region. Secondly, the cardinality constraint processing strategy and normalization method also ensure that the solution is in the feasible domain before proceeding to the next step, so the IGA designed in this paper can ensure that the global optimal solution is obtained.
The SPFM model remains a nonlinear mixed-integer fractional programming problem after being processed using the semi-penalized function approach, which is challenging to solve using typical optimization methods. To solve the SPFM model, we offer an enhanced genetic algorithm dubbed IGA, which incorporates the semi-penalized function technique. In this part, we will first study the traditional genetic algorithm before introducing modifications such as the penalty function technique.

4.2. The Proposed Improved Genetic Algorithm, IGA

This part mainly includes the basic genetic algorithm, improved genetic algorithm, and convergence proof of improved algorithm.

4.2.1. Basic Genetic Algorithm

The genetic algorithm (GA) is a random search optimization approach based on natural selection and population genetic mechanisms. It was developed by Professor J. H. Holland [30] of the University of Michigan and is now widely utilized in optimization issues in a variety of engineering domains. It simulates the replication, crossover, and variation phenomena that occur in natural selection and heredity and applies the concept of survival of the fittest by Michalewicz [31] to start from any initial population and efficiently searching for a coded parameter space through the randomization technology of selection, crossover, and mutation operations to generate a group of individuals more suitable for the environment, which ensures the population evolves to better and better regions in the search space, so that generation after generation continues to reproduce and evolve, eventually converges on a group of individuals that are most adapted to the environment, resulting in a high-quality solution to the issue. As a result, genetic algorithms may be viewed as a process of continual development of a population of viable solutions. It is worth mentioning that the five key elements of a genetic algorithm are parameter coding, starting population setup, fitness function design, genetic operation design, and control parameter setting. The following are the primary characteristics of the genetic algorithm (Algorithm 1): (1) It directly act on the structural object, with no qualification for derivation or function continuity. (2) Using the probabilistic optimization approach, the optimum search space may be generated and directed automatically without the need for specific rules, and the search direction can be altered adaptively.
(1) 
Select Operator: The procedure of picking excellent people from a group and weeding out bad people is referred to as a selection operation. To ensure that the next generation is a good individual, select individuals using the roulette method to the greatest extent individual, i, for the selected probability p i ( x ) = F i ( x ) F i ( x ) , where F i is individual i s fitness value and F i ( x ) is the sum of all individual fitness values in the population.
(2) 
Crossover operator: Cross operation refers to the operation of replacing and recombining part of the structure of two parent individuals to produce a new individual; the purpose of cross is to produce a new individual in the next generation. Randomly selected from two individuals, to exchange, to the parent genes passed on to the next generation, to produce a new individual. Chromosome a k and chromosome a l on j make a cross as follows:
a k j = b a l j + ( 1 b ) a k j a l j = b a k j + ( 1 b ) a l j ,
where b is a random number in the range [ 0 , 1 ] .
(3) 
Mutation operator: Mutation manipulation occurs when the gene values on some locus in the coding string of an individual chromosome are replaced with the remaining alleles on that locus to form a new individual. The mutation operation of the first j gene, a i j , of the first individual, i, is:
a i j = a i j + ( a i j a m a x ) · f ( g ) , r 0.5 a i j + ( a m i n a i j ) · f ( g ) , r 0.5 ,
where a m a x is a i j ceiling, a m i n is a i j floor, f ( g ) = r 2 ( 1 g G m a x ) 2 r 2 for the random number, g for the current number of iterations, G m a x for the maximum number of iterations, r to [ 0 , 1 ] random number.
Algorithm 1 Pseudo−Code of the Standard Genetic Algorithm
Input: Set initialization parameters;
Output: Optimum solution;
 1:
Generate the initial population;
 2:
Calculate the fitness function and estimate;
 3:
for  i = 1 G m a x  do
 4:
    Update individuals with selection, crossover, and mutation operations;
 5:
end for
 6:
return Optimum solution.

4.2.2. The Proposed Improved Genetic Algorithm, IGA

In the literature [32,33,34], the theoretical concept of the genetic algorithm is elaborated in detail, and the latest progress of the genetic algorithm in recent years is analyzed, summarized, and prospected. Based on this, it can be seen that, for the heuristic algorithm, it is very important to find a balance between exploration and exploitation. Exploration refers to the movement of discovering completely new areas in the search space, while exploitation refers to the movement of focusing the search in the vicinity of promising known solutions during the search. Based on the above discussion, an improved IGA is proposed to solve the SPFM model, which has both 0–1 and general integral constraints. In particular, we use logistic chaos mapping to generate chaotic initial sequences and an improved golden ratio variation probability formula to control individual randomization motion. Using this strategy, the balance of exploration and development ability is further improved, and good results are obtained.The improved IGA algorithm provides portfolio strategies under different constraints that satisfy the clear constraints imposed by investors. The flow chart of the improved algorithm is shown in Figure 2.
(1)
Population initialization
A D-dimensional vector is randomly generated using decimal real coding, with each chromosome as a real vector. Then, a non-periodic, non-convergent chaotic sequence sensitive to initial values is generated using logistic mapping. The logistic mapping formula is as follows:
x i + 1 , t = μ x i t ( 1 x i t ) ,
where μ [ 0 , 4 ] is the mapping parameter and is the random number of μ [ 0 , 4 ] . The use of a chaotic sequence to generate the initial population makes the initial solution more evenly distributed in the solution space, which helps to enhance the diversity of the population, jump out of the local optimal, achieve global balance, and obtain better results than the pseudo-random number calculation.
(2)
Cardinality constraint process
Here, we propose a cardinal constraint processing strategy for the cardinal constraint i = 1 n z i t K , so that the cardinal constraint can be handled more reasonably and effectively and play a more significant role in simulating investment. In addition, the model can meet the needs of different investors for the investment base by changing the maximum limit of the base in the simulation process, so as to increase the applicability of the model and take into account the impact of realistic factors to achieve the purpose of maximum investment return and minimum risk. The method is divided into the following two steps:
(a)
Calculation is not zero in each individual chromosome number P, where P = i = 1 n z i t K , K for a given the biggest asset investment base;
(b)
Determine whether the value of P satisfies the inequality constraint p 0 . If the inequality is satisfied, proceed to the next step. Otherwise, randomly select x i t at the corresponding position of p of z i t and set it to 0, so that the value of P satisfies the inequality constraint p 0 , and the specific pseudo-code is Algorithm 2.
Algorithm 2 Cardinality Constraint Handling Strategy
Input: Initial S z i t = 0
Output: Initial population X
 1:
for  i = 1 n  do
 2:
    if  x i t ( i ) 0  then
 3:
         z i t = 1 ;
 4:
    else
 5:
         z i t = 0 ;
 6:
    end if
 7:
     S z i t = S z i t + z i t ;
 8:
end for
 9:
p = S z i t K ;
 10:
if  p > 0  then
 11:
    for  i = 1 n  do
 12:
         t = r a n d p e r m ( S z i t , P ) ;
 13:
    end for
 14:
     x i t ( t ) = 0 ;
 15:
end if
 16:
return Initial population X
(3)
Adaptive golden section mutation operator
In order to reduce the probability of a mutation in a good individual gene causing a significant decline in fitness when the number of iterations is high, an adaptive mutation operator is proposed. The specific feature is that in order to expand the search scope of the optimal path and improve the mutation probability when the number of algorithm iterations is relatively small, the mutation probability gradually decreases with the increase of the number of iterations, so as to prevent the good individuals from introducing bad genes due to mutations in the later period. Since the variation performance of a single variable fitted with an exponential function is more suitable for the evolution process of a population, the golden section variation probability formula designed in this paper is as follows:
p m = p m a x e x p ( λ G n o w ( 1 λ ) G m a x ) ,
where p m is the mutation probability, p m a x is the maximum value of the mutation probability, G m a x is the preset maximum number of iterations, G n o w is the current number of iterations, and G n o w [ 1 , G m a x ] . In this paper, the idea of the golden section is introduced, and λ is set as 0.618, corresponding to 1 λ = 0.382 , which can make the variation probability change in the golden ratio trend to a certain extent and increase the population diversity. In addition, to a certain extent, it can avoid the situation that the algorithm cannot converge as soon as possible because the mutation probability is too large. Based on the mutation probability obtained by the above formula, a random method is adopted to select individuals from the population for mutation operation to produce a new generation of individuals.
(4)
Evaluation function
The fitness function is also called the evaluation function, which refers to the degree of superiority of an individual in the survival of a population. It is mainly used to judge the fitness of individuals through individual characteristics, which is used to distinguish the “good and bad” of individuals. The degree of infeasible solutions depends not only on the number of constraints violated but also on the number of solutions at hand. However, the degree of a feasible solution is always mixed, equal to its objective function value. Therefore, according to the penalty function method discussed in Section 4.1, the fitness function, F ( x ) , of the SPFM model can be expressed as:
F ( x ) = f ( x ) + L ( h 1 ( x ) + h 2 ( x ) + h 3 ( x ) ) .
the initial value of the penalty factor L 0 = 0.01 , and the iterative formula is L = G n o w ( G n o w + 10 ) . The pseudo-code of the improved algorithm is shown in (Algorithm 3).
Algorithm 3 Pseudo-Code of the Improved IGA
Input: Set initialization parameters;
Output: Optimum solution
 1:
Generate the initial population X by chaotic mapping method with Formula (27);
 2:
To process the population X by Algorithm 2;
 3:
Normalization of the initial population X by
X ( i ) = x i x 1 + x 2 + x 3 + + x n ;
 4:
Calculate the fitness value and determine whether the termination criteria are met. If yes, the iteration is terminated and the optimal solution is output; otherwise, the next step is continued;
 5:
for  i = 1 G m a x  do
 6:
    Update individuals with selection and cross operations;
 7:
    Calculated mutation probability by
 8:
p m = p m a x e x p ( λ G n o w ( 1 λ ) G m a x ) ;
    then update individuals by mutation operation;
 9:
end for
 10:
return Optimum solution
(5)
Complexity analysis of IGA
Time complexity reflects the execution efficiency of an algorithm and refers to the relationship between the execution time and the input value. Let T C ( n ) be the time complexity of IGA. T C ( n ) can be obtained by the formula:
T C ( n ) = O ( M N ) ,
where M is the maximum number of iterations of the algorithm and N is the population size.

4.2.3. Proof of Convergence for IGA

In this section, we prove the convergence of the improved genetic algorithm by building a series convergence model. For a global optimization problem, the optimal solution is first assumed to be x , then the optimal value is f ( x ) . The optimal solution of the improved genetic algorithm in the t iteration is x b e s t t , and accordingly f ( x b e s t t ) is the current optimal value. According to the convergence theorem of series, the equivalent condition of the improved genetic algorithm to find the global optimal value is that some f ( x b e s t t ) is in the δ neighborhood of the optimal value f ( x ) . For any δ > 0 , | f ( x b e s t t ) f ( x ) | δ was established.
In the iterative process of improving the genetic algorithm, each iteration will obtain an optimal individual. We define the set of these individuals as follows:
X b e s t = x b e s t 1 , x b e s t 2 , , x b e s t t , , x b e s t G m a x .
In the above formula, G m a x is the maximum number of iterations. Obviously, the sequence Θ can be constructed according to the above formula as follows:
Θ = θ 1 , θ 2 , , θ G m a x θ t = f ( x b e s t t ) , t = 1 , 2 , , G m a x .
According to the update strategy selected by the optimal individual, in the improved genetic algorithm the individual change strategy can ensure that the optimal value of each generation must not be inferior to the previous generation, that is, f ( x b e s t t ) f ( x b e s t t 1 ) . It can be seen that the following formula is valid:
θ 1 θ 2 θ G m a x .
With the continuous evolution of the population, individuals in the population will continue to move closer to the range of the optimal solution; that is, the probability that the optimal value searched by the current population will enter the δ neighborhood of the global optimal value gradually increases. The optimal values of the current population, f ( x b e s t t ) , converge to the global optimal value, f ( x ) , probability and are defined as follows:
p t = | f ( x b e s t t ) f ( x ) | δ , θ 1 , θ 2 , , θ G m a x .
According to the above two formulas, the following relationship can be obtained:
p 1 p 2 p t , t = 1 , 2 , , G m a x .
Therefore, the probability that the current optimal value does not converge to the global optimal value after the t iteration is:
p t = ( 1 p 1 ) ( 1 p 2 ) ( 1 p t ) .
From the above formula, we can see that p t is monotonically decreasing, so the following formula is valid:
p t = ( 1 p 1 ) ( 1 p 2 ) ( 1 p t 1 ) ( 1 p t ) ( 1 p 1 ) ( 1 p 1 ) ( 1 p 1 ) ( 1 p 1 ) = ( 1 p 1 ) t ,
where p 1 is probability, meet 0 p 1 1 , in which 0 ( 1 p 1 ) 1 . After t iterations, the following formula can be obtained:
l i m t ( 1 p t ) t = 0 .
As can be seen from the above formula, after several iterations the probability that the improved genetic algorithm does not converge to the optimal value is 0. Therefore, as the number of iterations increases, the improved genetic algorithm will eventually converge to the global optimal solution, f ( x ) , with probability 1, q.e.d.

5. Numerical Example

In this study, we improved the genetic algorithm to better solve the SPFM problem. In order to explain the idea of our model and the algorithm designed, this paper selects all the sample stocks in the SSE 50 as the research object. However, since the 50 sample stocks of the SSE 50 are adjusted every six months, the fund will adjust its position, so the transferred stocks have a certain negative and the transferred stocks have a certain positive. The 50 stocks of SSE 50 are dynamically adjusted. Considering the concept that the sample stocks should have strong stability, and in order to ensure that the research results are more valuable for reference, it is necessary to screen the 50 stocks of SSE 50 to remove the stocks with obvious problems, fewer selections, serious lack of year data, and inconsistent data. The stocks in the previous dynamic adjustment list of the Shanghai Stock Exchange 50 were retained rather than fixed (no obvious problems, always selected, complete and consistent data, and easy to obtain), and finally 30 alternative sample stocks with stable performance were obtained. All trading-day data of these stocks from 1 January 2017 to 1 January 2020 are selected as the raw data for empirical analysis. This paper takes one year as an investment cycle when simulating investment, which is divided into three cycles altogether. These data are from https://tr.investing.com/ accessed on 3 September 2023. The selected sample covers a number of industries with different income characteristics, which satisfies decentralization and can effectively reduce non-systemic risks in investment. Therefore, a choice more in line with investors’ wishes can increase the significance of empirical research on stock portfolio models. All experiments in this paper were carried out on MATLAB 2016a, and the computer processor was an Intel(R) Core(TM) i7-10700 CPU @ 2.90 GHz 2.90GHz, Windows 10.
In portfolio theory, the use of trapezoidal fuzzy numbers and triangular fuzzy numbers can help investors better deal with uncertainty and ambiguity, so as to carry out more effective asset allocation and risk management. Trapezoidal fuzzy numbers are suitable for more complex and diverse portfolio modeling and risk management, while triangular fuzzy numbers are suitable for relatively simple and intuitive portfolio description and analysis. In view of the complexity of the theory and research problem, this paper chooses to use ladder fuzzy numbers to quantify the return rate of the investment portfolio. The trapezoidal fuzzy number for estimating the rate of return is approximated using the method of objective fuzzy frequency statistics. Taking 600031 as an example, the specific method is as follows: Calculate the daily rate of return of the stock for the past three years and provide the frequency distribution graph of the rate of return, as shown in Figure 3. From the graph, it can be seen that the rate of return is mainly concentrated between (−0.0168, 0.0020) and (0.0020, 0.0207). First, calculate the mean of the historical rate of return between (−0.0168, 0.0020) as −0.0076 and take it as the left endpoint of the tolerance interval. Then, calculate the mean of the historical rate of return between (0.0020, 0.0207) as 0.0094 and take it as the right endpoint of the tolerance interval. Sort the historical rate of return in ascending order, select the rate of return −0.0346 on the third trading day in the interval (−0.0355, −0.0168) as the minimum possible value, and take the rate of return 0.0211 on the second trading day in the interval (0.0207, 0.0395) as the maximum possible value. Thus, the left width is 0.0563 and the right width is 0.0562. Finally, the trapezoidal fuzzy number for 600031 is (−0.0076, 0.0094, 0.0563, 0.0562). For ease of calculation, the minimum possible value, left endpoint, right endpoint, and maximum possible value of the trapezoidal fuzzy number are taken as the four parameter values of the fixed possibility distribution of the trapezoidal fuzzy variable for 600031, which is (−0.0346, −0.0076, 0.0094, 0.0211). According to this method, the fuzzy rate of return distribution for the sample stock is shown in next. It should be noted that, in this case, the trapezoidal fuzzy number for estimating the rate of return is approximated.
The other parameters associated with the proposed model are shown in Table 3. For the uncertainty distribution of the thirty securities, r i t = ( a i t , b i t , α i t , β i t ) , see Table 4. In addition, assume that the desired number of securities in the portfolio K = 15 .
The experimental part mainly includes the following five parts:
(1)
Analyze portfolio strategies under different base constraints to reflect the impact of cardinality constraints on the portfolio;
(2)
Analyze the portfolio strategy under the previous and next limits of different investment ratios in order to analyze the influence of different parameters of the upper and lower limits of investment ratios on the portfolio;
(3)
The numerical results of solving the SPFM model by different algorithms are compared to verify the effectiveness of the IGA proposed in the next paper;
(4)
Verify the influence of the adjustment for cost rate parameters on the numerical results by comparing the numerical results under different algorithms and different transaction cost rates;
(5)
The numerical results of different algorithms under different iterations were analyzed for comparative analysis to highlight the impact of iterations on numerical results, and the numerical results of other comparison algorithms were also compared.

5.1. Experimental Results

In this section, we run each test 10 times and find the average. We adopted the proposed IGA algorithm to solve the SPFM model. In order to show the influence of cardinality constraints on portfolio selection, the calculation results for different K are given in Table 5 and Table 6. Obviously, as K changes, so does the optimal portfolio. In fact, the greater the K, the greater the return and risk of the portfolio.
Table 5 and Table 6 exhibit the calculation results for various cardinalities to demonstrate the influence of cardinality constraints on portfolio selection. The SPFM model’s portfolio strategy is shown in Table 5 and Table 6 when the cardinality constraint is K = 5 , K = 10 , K = 15 , K = 20 , and K = 25 . According to the table, the M M F V C C P O model has distinct weight allocation modifications for the investment share of each asset in each phase. Obviously, the ideal portfolio changes as cardinality K changes. In fact, the broader the cardinality, the greater the portfolio’s return and risk. From the table, it can be seen that the investment frequency for assets 17, 22, 24, and 30 is relatively high under different base restrictions and time periods. The investment weight for assets 11, 3, 20, 23, 24, and 17 is also relatively high, indicating that investors have a strong positive outlook on these assets and that investing in them can bring greater returns to investors. Additionally, it can be observed that the returns and risks of the investment portfolio increase with longer investment periods. We also conducted a similar analysis of portfolio results under different upper and lower bound constraints of asset holdings, as detailed in Table 7, Table 8, Table 9 and Table 10.
If C i t = 0.003 ( t = 1 , 2 , 3 ; i = 1 , 2 , , 30 ) , then K = 15 and G m a x = 200 . Then, Table 7 and Table 9 present optimum portfolio methods for various boundary restrictions. Table 7 lower bounds are l i t , i = 0.002 , 0.005 , 0.01 , whereas Table 9 upper bounds are u i t , i = 0.4 , 0.5 , 0.6 . Table 7 and Table 9 show that the investment portfolio strategy changes when the upper and lower boundaries shift. According to the tables, the SPFM model modifies the distribution of investment weights for each asset in each period. It is obvious that the optimal investment portfolio varies when the boundary restrictions change. The tables show that there is a greater investment frequency for assets 13, 21, and 28 under varied lower bound constraints and periods. Furthermore, assets 4, 7, 13, 22, 23, 28, 29, and 30 have a larger investment weight. Similarly, for different upper bound constraints and durations, assets 7, 13, 21, and 28 have a greater investment frequency, while assets 2, 7, 11, 13, 21, and 28 have a larger investment weight. This suggests that investors are optimistic about these assets and believe that investing in them will provide higher returns. Furthermore, the investment portfolio’s rewards and hazards rise as the investment time lengthens.
Table 8 and Table 10 provide numerical findings such as mean, standard deviation, and calculation time for various boundary restrictions. The findings clearly varied depending on the upper and lower boundaries used. Notably, when the upper and lower limits are set to 0.5 and 0.005, respectively, the computation time is the shortest. Furthermore, through the comparison of standard deviation values, it can be seen that the fluctuation of numerical results in this case is relatively stable. This implies that adopting upper and lower limits of 0.5 and 0.005 is also reasonable and feasible in other computing processes, and better results will be obtained.

5.2. Performances of the Proposed IGA

To evaluate the performance of the IGA algorithm, we compared it to the standard DE, GA, I-GA, and GGA. In the following experiments, the values of the control parameters used for comparison are shown in Table 3. In addition, for the proposed SPFM model we assume that W 0 = 10,000, v t = 0.004 , K = 15 .
Different algorithms were used to analyze the mean value and standard deviation (SD) of the optimal target and other performance indicator parameters. Table 11, Table 12 and Table 13 lists the average results of 10 independent runs under different cardinal numbers, different transaction costs, and different iterations.
Table 11 shows the comparison of numerical results of different algorithms under different base restrictions. It can be seen that, in the change process from cardinals k = 5 to k = 25, the number of times IGA numerical results are better than the other algorithms are 3,5,4,5,4, respectively. I-GA is 1,1,1,2,1; GGA is 1,1,0,0,1; GA is 2,0,2,0,1; DE is 1,1,1,1,1. Table 12 shows the comparison of the numerical results of different algorithms under different transaction costs. It can be seen that in the process of the change of transaction costs, c = 0, c = 0.003, and c = 0.005, the number of times that IGA numerical results are better than the other algorithms are 6,6,2, respectively. I-GA is 0,0,1; GGA is 0,0,2; GA is 1,1,2; DE is 1,1,1. Table 13 shows the comparison of the numerical results of the different algorithms under different iterations. It can be seen that during the change of iterations 100, 200, and 300, respectively, the number of times IGA numerical results are better than the other algorithms is 5,5,4, respectively. I-GA is 0,0,0; GGA is 1,1,2; GA is 0,1,0; DE is 2,1,2. It is obvious that IGA obtains the optimal value more times than other algorithms in Table 11, Table 12 and Table 13. On the whole, the average value, standard deviation, terminal wealth, cumulative risk, and other numerical results obtained by the IGA proposed in this paper are better than those listed by the other algorithms. At the same time, the time required for IGA computation is also less than the other algorithms in most cases. In other words, the proposed IGA is more accurate than some other standard heuristic algorithms. In addition, we can also see that when the SD value of the IGA is lower, it indicates that the algorithm in this paper cannot only obtain more high-quality solutions but is also more stable and reliable in finding high-quality solutions.
Table 14 is a summary analysis of the numerical results in Table 11, Table 12 and Table 13. It can be seen from Table 14 that the probability of the numerical results of IGA proposed by us reaching the optimal value under different parameters is 52.5%, 58.33%, and 58.33%, respectively, which is much higher than the probability of obtaining the optimal value times of the other algorithms. Specifically, it can be seen that the probability of the IGA obtaining the optimal value under different performance indicators is at least 37.5% higher than the other algorithms. It can be concluded that the IGA in this paper is superior to the other algorithms in terms of computational performance.
In summary, the obtained results clearly show that the IGA method has superior performance in terms of convergence, speed, stability, and robustness compared with the other algorithms. Therefore, the IGA method can be considered as a good choice for dealing with complex portfolio optimization problems.

6. Conclusions

Aimed at the complexity of the financial market, this paper establishes a fractional programming multi-period portfolio model under the fuzzy framework, considering multiple realistic constraints, and designs an improved genetic algorithm to solve the model. The established approach examines risk and return at the same level, without prioritization, and eliminates the flaw in which the generic multi-objective model must sacrifice one aim to achieve another while solving. Moreover, the probability of the IGA obtaining the optimal value under different performance indexes is at least 37.5% higher than other algorithms. However, when addressing a limited optimization issue with three or more objective functions, the fractional technique is more difficult than the multi-objective method, which does not have to deal with contradicting relationships between the goals. Second, because investors make the majority of decisions, adding investing behavior and psychology into portfolio modeling yields a more realistic and practical model. In the next modeling, we will also explore combining these two elements into the model to create a more comprehensive portfolio model. At the same time, the fractional programming proposed in this study may be applied not only to two-objective issues but also to multi-objective optimization problems. In this regard, we shall carry out additional study. Equally important, we will focus our future research on optimizing the design of multi-objective algorithms to tackle this type of issue directly while minimizing conflict.

Author Contributions

Conceptualization, C.H.; methodology, C.H.; software, C.H.; validation, C.H.; formal analysis, C.H.; investigation, E.G.; resources, C.H.; data curation, C.H.; writing—original draft preparation, C.H.; writing—review and editing, C.H.; visualization, preparation, C.H.; writing—review and editing, C.H.; visualization, C.H.; supervision, E.G., C.H., and Y.G.; project administration, Y.G.; funding acquisition, Y.G. and C.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by the Natural Science Foundation Key Projects of Ningxia, grant number 2022AAC02043, in part by the Construction Project of First-class Subjects in Ningxia Higher Education, grant number NXYLXK2017B09, in part by the Major Special Fund of North Minzu University, grant number ZDZX201901, in part by the Nanjing Securities Support Basic Discipline Research Project, grant number NJZQJCXK202201, and in part by the Major Proprietary Funded Project of North Minzu University, grant number YCX23224.

Data Availability Statement

The data are free to download from the website https://tr.investing.com/, accessed on 3 September 2023.

Conflicts of Interest

The authors declared no conflicts of interest.

References

  1. Markowitz, H.M. Portfolio selection. J. Financ. 1952, 7, 77. [Google Scholar]
  2. Plachel, L. A unified model for regularized and robust portfolio optimization. Econ. Dyn. Control 2019, 109, 103779. [Google Scholar] [CrossRef]
  3. Wang, W.; Li, W.; Zhang, N.; Liu, K. Portfolio formation with preselection using deep learning from long-term financial data. Expert Syst. Appl. 2020, 143, 113042. [Google Scholar] [CrossRef]
  4. Chen, W.; Zhang, H.; Mehlawat, M.K.; Jia, L. Mean–variance portfolio optimization using machine learning-based stock price prediction. Appl. Soft Comput. 2021, 100, 106943. [Google Scholar] [CrossRef]
  5. Ma, Y.; Han, R.; Wang, W. Portfolio optimization with return prediction using deep learning and machine learning. Expert Syst. Appl. 2021, 165, 113973. [Google Scholar] [CrossRef]
  6. Zadel, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar]
  7. Katagiri, I. Chance constrained bottleneck spanning tree problem with fuzzy random edge costs. J. Oper. Res. Soc. Jpn. 2000, 43, 128–137. [Google Scholar] [CrossRef]
  8. Pahade, J.K.; Jha, M. A Hybrid Fuzzy-SCOOT Algorithm to Optimize Possibilistic Mean Semi-absolute Deviation Model for Optimal Portfolio Selection. Int. J. Fuzzy Syst. 2022, 24, 1958–1973. [Google Scholar] [CrossRef]
  9. Pahade, J.K.; Jha, M. Credibilistic variance and skewness of trapezoidal fuzzy variable and mean–variance–skewness model for portfolio selection. Results Appl. Math. 2021, 11, 100159. [Google Scholar] [CrossRef]
  10. Gupta, P.; Mehlawat, M.K.; Khan, A.Z. Multi-period portfolio optimization using coherent fuzzy numbers in a credibilistic environment. Expert Syst. Appl. 2021, 167, 114135. [Google Scholar] [CrossRef]
  11. Mehlawat, M.K.; Gupta, P.; Khan, A.Z. Multiobjective portfolio optimization using coherent fuzzy numbers in a credibilistic environment. Int. J. Intell. Syst. 2021, 36, 1560–1594. [Google Scholar] [CrossRef]
  12. Gao, W.; Sheng, H.; Wang, J.; Wang, S. Artificial bee colony algorithm based on novel mechanism for fuzzy portfolio selection. IEEE Trans. Fuzzy Syst. 2018, 27, 966–978. [Google Scholar] [CrossRef]
  13. Vercher, E.; Bermúdez, J.D. Portfolio optimization using a credibility mean-absolute semi-deviation model. Expert Syst. Appl. 2015, 42, 7121–7131. [Google Scholar] [CrossRef]
  14. Leung, M.-F.; Wang, J.; Che, H. Cardinality-constrained portfolio selection via two-timescale duplex neurodynamic optimization. Neural Netw. 2022, 153, 399–410. [Google Scholar] [CrossRef] [PubMed]
  15. Leung, M.-F.; Wang, J. Cardinality-constrained portfolio selection based on collaborative neurodynamic optimization. Neural Netw. 2022, 145, 68–79. [Google Scholar] [CrossRef] [PubMed]
  16. Meng, X.; Zhou, X. Multi-period Fuzzy Portfolio Selection Model with Cardinality constraints. In Proceedings of the 2019 16th International Conference on Service Systems and Service Management (ICSSSM), Shenzhen, China, 13–15 July 2019. [Google Scholar]
  17. Zhao, H.; Chen, Z.G.; Zhan, Z.H.; Kwong, S.; Zhang, J. Multiple populations co-evolutionary particle swarm optimization for multi-objective cardinality constrained portfolio optimization problem. Neurocomputing 2021, 430, 58–70. [Google Scholar] [CrossRef]
  18. Yang, M.; Qian, W.; Yang, L.; Hou, X.; Yuan, X.; Dong, Z. A Synergistic Multi-Objective Evolutionary Algorithm with Diffusion Population Generation for Portfolio Problems. Mathematics 2024, 12, 1368. [Google Scholar] [CrossRef]
  19. Delikta, D.; Ustun, O. Multi-objective genetic algorithm based on the fuzzy MULTIMOORA method for solving the cardinality constrained portfolio optimization. Appl. Intell. 2022, 53, 14717–14743. [Google Scholar] [CrossRef]
  20. Alshraideh, M.A.; Mahafzah, B.A.; Salman, H.S.E.; Salah, I. Using genetic algorithm as test data generator for stored PL/SQL program units. J. Softw. Eng. Appl. 2013, 6, 65–73. [Google Scholar] [CrossRef]
  21. Chen, W.; Li, D.; Liu, Y.J. A novel hybrid ICA-FA algorithm for multiperiod uncertain portfolio optimization model based on multiple criteria. IEEE Trans. Fuzzy Syst. 2018, 27, 1023–1036. [Google Scholar] [CrossRef]
  22. Liu, Y.J.; Zhang, W.G.; Gupta, P. Multiperiod portfolio performance evaluation model based on possibility theory. IEEE Trans. Fuzzy Syst. 2019, 28, 3391–3405. [Google Scholar] [CrossRef]
  23. Yang, X.Y.; Chen, S.D.; Liu, W.L.; Zhang, Y. A Multi-period fuzzy portfolio optimization model with short selling constraints. Int. J. Fuzzy Syst. 2022, 24, 2798–2812. [Google Scholar] [CrossRef]
  24. Li, X.; Qin, Z. Interval portfolio selection models within the framework of uncertainty theory. Econ. Model. 2014, 41, 338–344. [Google Scholar] [CrossRef]
  25. Zhang, B.; Peng, J.; Li, S. Uncertain programming models for portfolio selection with uncertain returns. Int. J. Syst. Sci. 2015, 46, 2510–2519. [Google Scholar] [CrossRef]
  26. Qin, Z.; Kar, S.; Zheng, H. Uncertain portfolio adjusting model using semiabsolute deviation. Soft Comput. 2016, 20, 717–725. [Google Scholar] [CrossRef]
  27. Chen, W.; Wang, Y.; Gupta, P.; Mehlawat, M.K. A novel hybrid heuristic algorithm for a new uncertain mean-variance-skewness portfolio selection model with real constraints. Appl. Intell. 2018, 48, 2996–3018. [Google Scholar] [CrossRef]
  28. Zhang, W.G.; Wang, Y.L. Notes on possibilistic variances of fuzzy numbers. Appl. Math. Lett. 2007, 20, 1167–1173. [Google Scholar] [CrossRef]
  29. Deb, K. An efficient constraint handling method for genetic algorithms. Comput. Methods Appl. Mech. Eng. 2000, 186, 311–338. [Google Scholar] [CrossRef]
  30. Holl, J.H. Genetic algorithms. Sci. Am. 1992, 267, 66–73. [Google Scholar]
  31. Michalewicz, Z. Genetic Algorithms + Data Structures = Evolution Programs; Springer: Berlin/Heidelberg, Germany, 1999. [Google Scholar]
  32. Katoch, S.; Chauhan, S.S.; Kumar, V. A review on genetic algorithm: Past, present, and future. Multimed. Tools Appl. 2021, 80, 8091–8126. [Google Scholar] [CrossRef]
  33. Lambora, A.; Gupta, K.; Chopra, K. Genetic algorithm-A literature review. In Proceedings of the 2019 IEEE International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), Faridabad, India, 14–16 February 2019; pp. 380–384. [Google Scholar]
  34. Liu, Y.-J.; Zhang, W.-G. A multi-period fuzzy portfolio optimization model with minimum transaction lots. Eur. J. Oper. Res. 2015, 242, 933–941. [Google Scholar] [CrossRef]
Figure 1. Full text frame diagram.
Figure 1. Full text frame diagram.
Mathematics 12 01694 g001
Figure 2. Flow chart of the improved IGA algorithm.
Figure 2. Flow chart of the improved IGA algorithm.
Mathematics 12 01694 g002
Figure 3. Frequency distribution histogram.
Figure 3. Frequency distribution histogram.
Mathematics 12 01694 g003
Table 1. Comparison of the attributes.
Table 1. Comparison of the attributes.
AttributeLi [24]Zhang [25]Qin [26]Chen [27]Our Paper
Return
RiskSemiabsoluteVarianceSemiabsoluteVarianceVariance
deviation deviation
Skewness
Transaction cost
Bounds on holding
Cardinality
mulit-period
Solution methodSolverHybrid intelligent algorithmSolverFA-GAIGA
✓ denotes the variable or indicator is selected.
Table 2. The symbols used in the modeling.
Table 2. The symbols used in the modeling.
SymbolsMeanings
r i t Return rate on asset i in period t
x i t Investment proportion of the i asset in period t
α t Lower bound of the expected return in period t
β t Upper limit of acceptable risk in period t
l i t Lower bound of the x i t
μ i t Upper bound of the x i t
C i t Transaction costs of security i at period t
C t Total investment cost for phase t
z i t Binary variable, z i t { 0 , 1 }
KMaximum number of investable assets per
R N t Net return on the t-period portfolio after transaction costs
M t The expected probability of wealth at the end of period t
M T The expected end wealth gained over the investment period
M T T W Terminal wealth
M T A W Cumulative wealth
V t The variance of probabilities for period t
V T The cumulative risk of the portfolio over the life of the investment
V a r T T Final risk
V a r T a Cumulative risk
Table 3. The parameter settings for comparison of the algorithm.
Table 3. The parameter settings for comparison of the algorithm.
ParametersIGAI−GA/GGA/GA/DE
Maximum generation200200
Crossover rate0.70.7
Population size5050
Mutation rateFormula (26)0.01
Transaction cost rate0.0030.003
The initial wealth10,00010,000
Expected return value1,000,0001,000,000
Expected value at risk0.0040.004
Lower bound of investment ratio0.0050.005
Upper bound of investment ratio0.050.05
Table 4. Fuzzy yield distribution of 30 sample stocks.
Table 4. Fuzzy yield distribution of 30 sample stocks.
Codet = 1t = 2t = 3
600031−0.0031, 0.0132, 0.0282, 0.0767−0.0043, 0.0091, 0.0342, 0.0532−0.0063, 0.0090, 0.0339, 0.0769
600036−0.0070, 0.0043, 0.0207, 0.0697−0.0056, 0.0103, 0.0352, 0.0687−0.0090, 0.0006, 0.0222, 0.0490
600048−0.0007, 0.0128, 0.0257, 0.0890−0.0046, 0.0172, 0.0407, 0.0748−0.0012, 0.0106, 0.0262, 0.0580
600104 0.0005 , 0.0111 , 0.0272 , 0.0375 0.0005 , 0.0139 , 0.0325 , 0.0543 0.0031 , 0.0095 , 0.0274 , 0.0540
600196 0.0018 , 0.0177 , 0.0322 , 0.0633 0.0063 , 0.0111 , 0.0573 , 0.0814 0.0020 , 0.0136 , 0.0368 , 0.0487
600276 0.0028 , 0.0085 , 0.0222 , 0.0516 0.0020 , 0.0131 , 0.0482 , 0.0694 0.0125 , 0.0018 , 0.0346 , 0.0805
600519 0.0020 , 0.0121 , 0.0246 , 0.0789 0.0117 , 0.0015 , 0.0344 , 0.0579 0.0027 , 0.0095 , 0.0237 , 0.0456
600690 0.0025 , 0.0114 , 0.0262 , 0.0686 0.0087 , 0.0088 , 0.0383 , 0.0788 0.0074 , 0.0061 , 0.0315 , 0.0756
600703 0.0119 , 0.0049 , 0.0351 , 0.0689 0.0043 , 0.0164 , 0.0531 , 0.0666 0.0246 , 0.0012 , 0.0598 , 0.0998
600837 0.0011 , 0.0069 , 0.0177 , 0.0482 0.0059 , 0.0117 , 0.0369 , 0.0716 0.0030 , 0.0139 , 0.0369 , 0.1090
601111 0.0054 , 0.0112 , 0.0259 , 0.1060 0.0113 , 0.0095 , 0.0398 , 0.0966 0.0034 , 0.0100 , 0.0368 , 0.0679
601166 0.0035 , 0.0033 , 0.0149 , 0.0356 0.0075 , 0.0019 , 0.0217 , 0.0582 0.0031 , 0.0085 , 0.0210 , 0.0752
601186 0.0048 , 0.0054 , 0.0256 , 0.0503 0.0072 , 0.0074 , 0.0331 , 0.1069 0.0028 , 0.0097 , 0.0304 , 0.0597
601211 0.0027 , 0.0070 , 0.0172 , 0.0588 0.0025 , 0.0141 , 0.0270 , 0.0788 0.0067 , 0.0069 , 0.0307 , 0.0833
601229 0.0009 , 0.0101 , 0.0164 , 0.075 2 0.0054 , 0.0045 , 0.0224 , 0.0357 0.0033 , 0.0077 , 0.0170 , 0.0681
601288 0.0023 , 0.0050 , 0.0128 , 0.0344 0.0126 , 0.0004 , 0.0251 , 0.0679 0.0022 , 0.0060 , 0.0139 , 0.0487
601318 0.0088 , 0.0023 , 0.0239 , 0.0612 0.0051 , 0.0099 , 0.0366 , 0.0586 0.0076 , 0.0021 , 0.0205 , 0.0701
601328 0.0025 , 0.0049 , 0.0126 , 0.0542 0.0077 , 0.0014 , 0.0186 , 0.0606 0.0035 , 0.0041 , 0.0173 , 0.0515
601336 0.0133 , 0.0029 , 0.0287 , 0.0971 0.0114 , 0.0067 , 0.0432 , 0.0965 0.0001 , 0.0173 , 0.0349 , 0.0860
601398 0.0046 , 0.0038 , 0.0175 , 0.0441 0.0046 , 0.0072 , 0.0264 , 0.0601 0.0046 , 0.0030 , 0.0137 , 0.0593
601601 0.0077 , 0.0037 , 0.0315 , 0.0613 0.0045 , 0.0129 , 0.0366 , 0.0859 0.0155 , 0.0015 , 0.0266 , 0.0806
601628 0.0051 , 0.0056 , 0.0263 , 0.0597 0.0087 , 0.0037 , 0.0294 , 0.0722 0.0043 , 0.0118 , 0.0273 , 0.1013
601668 0.0012 , 0.0106 , 0.0221 , 0.0723 0.0060 , 0.0066 , 0.0314 , 0.0796 0.0097 , 0.0004 , 0.0207 , 0.0446
601688 0.0037 , 0.0088 , 0.0276 , 0.0852 0.0025 , 0.0138 , 0.0328 , 0.0718 0.0046 , 0.0093 , 0.0389 , 0.0890
601766 0.0079 , 0.0032 , 0.0189 , 0.0974 0.0094 , 0.0049 , 0.0297 , 0.0738 0.0084 , 0.0011 , 0.0222 , 0.0718
601800 0.0012 , 0.0133 , 0.0253 , 0.0488 0.0100 , 0.0067 , 0.0331 , 0.1012 0.0035 , 0.0095 , 0.0313 , 0.0668
601818 0.0037 , 0.0024 , 0.0120 , 0.0344 0.0012 , 0.0116 , 0.0201 , 0.0801 0.0022 , 0.0088 , 0.0199 , 0.0624
601857 0.0020 , 0.0032 , 0.0119 , 0.0317 0.0025 , 0.0110 , 0.0257 , 0.0720 0.0067 , 0.0001 , 0.0146 , 0.0356
601888 0.0100 , 0.0089 , 0.0482 , 0.1140 0.0071 , 0.0107 , 0.0560 , 0.0687 0.0075 , 0.0081 , 0.0285 , 0.0963
601939 0.0067 , 0.0135 , 0.0482 , 0.1140 0.0074 , 0.0095 , 0.0560 , 0.0689 0.0079 , 0.0081 , 0.0285 , 0.0963
Table 5. Optimal investment strategies under different values of K.
Table 5. Optimal investment strategies under different values of K.
Security iK = 5K = 10K = 15
t = 1t = 2t = 3t = 1t = 2t = 3t = 1t = 2t = 3
10.0000000.0000000.0000000.0000000.0000000.0000000.0000000.0017540.037900
20.0000000.2608690.0000000.0000000.0000000.0000000.0000000.0000000.095089
30.0000000.0000000.3206450.0000000.0000000.0000000.0000000.1308740.000000
40.0000000.0000000.0000000.0000000.0000000.0000000.0683750.0238310.153749
50.0000000.0000000.0000000.0000000.0000000.0852180.0114560.0000000.000000
60.0000000.0000000.0000000.0000000.0000000.0000000.0307150.0000000.017278
70.0000000.0000000.0000000.1004550.0000000.0232660.0592780.0722550.000000
80.0000000.0000000.0000000.0000000.1505480.0000000.1029790.0961010.000000
90.0000000.0000000.0000000.0000000.1994650.0000000.1037650.1006370.000000
100.0000000.1462640.0000000.1000750.2127760.0000000.0000000.0000000.000000
110.0000000.0000000.0000000.0000000.0975690.0000000.1043720.0076080.055814
120.0000000.0000000.0000000.1000710.0000000.0259090.0000000.0026320.000000
130.0000000.0000000.0000000.1005690.0000000.0000000.0527320.0000000.000000
140.0000000.0000000.0000000.0000000.0000000.0000000.0862460.0000000.054818
150.0000000.0000000.0000000.0000000.0000000.0000000.0161760.0649580.043020
160.1417210.0000000.0000000.0000000.0000000.0000000.0000000.0000000.000000
170.1874370.0000000.0000000.1003800.0289160.0000000.0985340.0610850.071520
180.0000000.0000000.0157060.0000000.0000000.0000000.0000000.0000000.000000
190.0000000.0000000.0000000.0000000.0000000.0000000.1031910.0000000.012031
200.0000000.2256380.0000000.0975190.0000000.0000000.0000000.0000000.000000
210.0000000.0000000.0000000.0000000.0724640.1181950.0048760.0000000.083993
220.0000000.1942060.0000000.1000680.0000000.0299360.0914450.1425460.095191
230.0000000.0000000.0000000.0000000.0000000.0567510.0000000.0000000.058997
240.0000000.1730230.2769080.0000000.0353960.2589690.0658620.0554530.000000
250.2418310.0000000.2531580.0000000.0000000.0503490.0000000.0000000.000000
260.0000000.0000000.0000000.1002710.0638900.0000000.0000000.0790670.031997
270.2490270.0000000.0000000.1001940.0000000.0000000.0000000.0000000.100381
280.0000000.0000000.0000000.0000000.0534450.2493570.0000000.0000000.000000
290.0000000.0000000.0000000.0000000.0855300.0000000.0000000.0848170.088223
300.1799840.0000000.1335830.1003990.0000000.1020500.0000000.0763820.000000
risk0.0003710.0005330.0006710.0003100.0006910.0005460.0004280.0005800.000524
return0.0042070.0091090.0150640.0040190.0094810.0125090.0053900.0088670.013460
Table 6. Optimal investment strategies under different values of K.
Table 6. Optimal investment strategies under different values of K.
Security iK = 20K = 25
t = 1t = 2t = 3t = 1t = 2t = 3
10.0000000.0033520.0579860.0417970.0635620.054045
20.0498850.0866300.0000000.0386380.0000000.058458
30.0502770.0727890.0514900.0339490.0340320.014626
40.0514520.0504460.0711250.0000000.0508830.058843
50.0498660.0410120.0072400.0426930.0138180.046176
60.0498290.0000000.0094030.0426470.0000000.063794
70.0000000.0000000.0000000.0299140.0503830.053468
80.0000000.0915430.0000000.0421890.0572380.021875
90.0481010.0319880.0000000.0424810.0000000.000000
100.0000000.0000000.0689830.0415100.0000000.030155
110.0517970.0000000.1130170.0000000.0586530.048256
120.0000000.0000000.0967450.0400230.0478820.020202
130.0498570.0549440.0000000.0419800.0150220.061777
140.0495860.0652610.0000000.0299600.0571920.000000
150.0000000.0000000.0348320.0408220.0028380.019790
160.0000000.0431530.0404500.0426900.0333760.054462
170.0497090.0000000.0000000.0426890.0122830.017952
180.0000000.0632810.0563300.0419590.0249370.000000
190.0496260.0778640.0119210.0422320.0601600.032515
200.0534920.0250120.0490930.0389090.0099510.061689
210.0000000.0827260.0513170.0000000.0475630.024170
220.0497750.0230120.0000000.0000000.0626150.011303
230.0496000.0944770.1093760.0389300.0106100.031247
240.0497110.0000000.0411610.0421790.0621560.000000
250.0487250.0647400.0584070.0359750.0597850.046954
260.0000000.0169930.0125100.0000000.0000000.000000
270.0501480.0000000.0088490.0410530.0262070.041300
280.0491510.0000000.0497650.0422510.0585460.054184
290.0498630.0025720.0000000.0398340.0610810.011208
300.0495500.0082060.0000000.0495500.0082060.000000
risk0.0004400.0006200.0004530.0004250.0005650.000492
return0.0056550.0109770.0154190.0058180.0096330.013472
Table 7. Optimal investment strategies under different upper bounds ( μ i t = 0.5 ) .
Table 7. Optimal investment strategies under different upper bounds ( μ i t = 0.5 ) .
Security i l i t = 0.002 l i t = 0.005 l i t = 0.01
t = 1t = 2t = 3t = 1t = 2t = 3t = 1t = 2t = 3
10.0000000.0467730.1116590.0683610.0000000.0000000.0000000.0333500.000000
20.0000000.0000000.0209500.0692550.0000000.0000000.0830860.1056000.016413
30.0000000.0000000.0000000.0000000.0576330.0000000.0000000.0415180.090919
40.0000000.0954270.0000000.0696370.0055650.0000000.0000000.0000000.000000
50.0000000.0000000.0000000.0000000.0000000.0765530.0574220.0949490.084346
60.0458500.0000000.0000000.0679150.0838020.0000000.0000000.0000000.000000
70.1245990.0000000.0000000.0696350.0000000.0389700.0000000.0000000.000000
80.0842860.0173590.0000000.0000000.0609730.0225040.0000000.0000000.000000
90.0000000.0000000.0000000.0000000.0000000.1229430.0000000.1020520.000000
100.0000000.0176450.0000000.0688300.0000000.0173240.0000000.0000000.056520
110.1037470.0000000.0837740.0693020.0000000.0000000.0618000.0000000.000000
120.0383480.0000000.0000000.0000000.0604230.0891160.0382260.0815050.031321
130.0615000.0000000.1248550.0630630.0896430.1573920.0399010.0119920.115158
140.0000000.0349080.0111250.0000000.0000000.0000000.0414890.0536760.000000
150.0000000.0608080.0000000.0000000.0809010.0301710.1072980.0000000.021464
160.0882360.0000000.1282720.0591760.0000000.0311230.0000000.0421250.000000
170.0406370.0000000.0053540.0000000.0874990.0000000.0205440.0000000.000000
180.0347350.0953700.0481850.0000000.0000000.0934080.0000000.0000000.098859
190.0000000.0000000.0594990.0695320.0648960.0000000.0732000.0000000.070524
200.0000000.0332240.0000000.0693450.0000000.0634520.0000000.0849270.000000
210.0472270.0693960.1023510.0689790.0000000.0194590.0391040.0582190.000000
220.1198120.0965990.0000000.0658040.0000000.0228970.0703760.0245880.000000
230.0000000.0000000.0778290.0000000.0955860.1552520.0000000.0480880.031246
240.0413520.0920400.0449850.0000000.0773280.0000000.0000000.1130950.009509
250.0000000.0000000.0347450.0000000.0285830.0000000.0000000.0000000.000000
260.0000000.0670360.0000000.0000000.0461370.0594340.1533480.0000000.054151
270.0500400.0000000.0000000.0000000.0000000.0000000.0000000.0000000.000000
280.0849580.0873770.1038040.0696080.1001000.0000000.1005190.0000000.055604
290.0000000.0823710.0426140.0000000.0609300.0000000.0320110.1043170.165089
300.0346740.1036680.0000000.0515610.0000000.0000000.0816750.0000000.098878
risk0.0003270.0005160.0004390.0003600.0005760.0004690.0004130.0005820.000549
return0.0053320.0098830.0133240.0049590.0100590.0125100.0061220.0109410.017473
Table 8. Optimal investment strategies under different upper bounds ( μ i t = 0.005 ) .
Table 8. Optimal investment strategies under different upper bounds ( μ i t = 0.005 ) .
Lower BoundMeanSD M T T W V a r T T M T A W V a r T A Objective ValueTime
l_it = 0.002 3.840164 × 10 2 8.096943 × 10 2 0.007021 7.391047 × 10 11 0.0285390.001281 2.845757 × 10 2 12.538912
l_it = 0.005 3.472412 × 10 2 7.457281 × 10 2 0.006241 9.720854 × 10 11 0.0275290.001405 2.461646 × 10 2 12.207077
l_it = 0.01 3.076905 × 10 2 6.101189 × 10 2 0.011703 1.320329 × 10 10 0.0345360.001544 3.751349 × 10 2 12.149167
Table 9. Optimal investment strategies under different lower bounds ( l i t = 0.005 ) .
Table 9. Optimal investment strategies under different lower bounds ( l i t = 0.005 ) .
Security i μ i t = 0.4 μ i t = 0.5 μ i t = 0.6
t = 1t = 2t = 3t = 1t = 2t = 3t = 1t = 2t = 3
10.0802310.0000000.0391020.0683610.0000000.0000000.0687940.1082390.000000
20.0000000.0997570.0648920.0692550.0000000.0000000.0697600.1308890.058319
30.0524850.0996370.0000000.0000000.0576330.0000000.0660710.0000000.000000
40.0000000.0000000.0295320.0696370.0055650.0000000.0000000.0000000.060695
50.0825380.0000000.0000000.0000000.0000000.0765530.0000000.0366710.000000
60.0000000.0397570.0000000.0679150.0838020.0000000.0686310.0000000.000000
70.0942330.0537090.0708480.0696350.0000000.0389700.0545590.0000000.050357
80.0945270.0968450.0000000.0000000.0609730.0225040.0573360.0000000.017014
90.0000000.0923140.0946600.0000000.0000000.1229430.0682930.0000000.109344
100.0000000.0000000.0000000.0688300.0000000.0173240.0701050.0000000.000000
110.0838070.0881900.0000000.0693020.0000000.0000000.0000000.1306830.130980
120.0945680.0000000.0000000.0000000.0604230.0891160.0000000.0734000.000000
130.0282210.0205000.0087670.0630630.0896430.1573920.0000000.0000000.114202
140.0000000.0000000.0694300.0000000.0000000.0000000.0000000.0616770.128340
150.0000000.0000000.0000000.0000000.0809010.0301710.0000000.0357770.031686
160.0000000.0000000.0758690.0591760.0000000.0311230.0000000.0000000.000000
170.0000000.0728270.0583360.0000000.0874990.0000000.0685530.0000000.053088
180.0924170.0000000.0668180.0000000.0000000.0934080.0702170.0460660.000000
190.0147610.0000000.0964270.0695320.0648960.0000000.0000000.0000000.011680
200.0000000.0000000.0000000.0693450.0000000.0634520.0667180.0476700.000000
210.0336490.0885590.0963620.0689790.0000000.0194590.0000000.0868890.054412
220.0000000.0000000.0359810.0658040.0000000.0228970.0000000.0000000.000000
230.0900490.0000000.0000000.0000000.0955860.1552520.0000000.0857570.000000
240.0000000.0000000.0000000.0000000.0773280.0000000.0000000.0000000.000000
250.0040800.0117800.0000000.0000000.0285830.0000000.0694330.0036120.000000
260.0000000.0000000.0985520.0000000.0461370.0594340.0628170.0150080.000000
270.0693080.0689580.0000000.0000000.0000000.0000000.0000000.0216640.071641
280.0851280.0714070.0944240.0696080.1001000.0000000.0700010.0000000.039248
290.0000000.0291900.0000000.0000000.0609300.0000000.0000000.0000000.000000
300.0000000.0665730.0000000.0515610.0000000.0000000.0687110.1159980.068995
risk0.0003300.0006300.0005040.0003600.0005760.0004690.0003840.0005670.000571
return0.0071240.0126730.0155870.0049590.0100590.0125100.0058640.0102190.013297
Table 10. Optimal investment strategies under different lower bounds ( l i t = 0.005 ) .
Table 10. Optimal investment strategies under different lower bounds ( l i t = 0.005 ) .
Upper BoundMeanSD M TTW Var TT M TAW Var TA Objective ValueTime
u_it = 0.4 3.987435 × 10 2 8.653601 × 10 2 0.014072 1.046828 × 10 10 0.0353840.001464 5.080223 × 10 2 12.31108
u_it = 0.5 3.472412 × 10 2 7.457281 × 10 2 0.006241 9.720854 × 10 11 0.0275290.001405 2.461646 × 10 2 12.207077
u_it = 0.6 3.339470 × 10 2 7.599243 × 10 2 0.007968 1.244388 × 10 10 0.0293800.001522 3.442049 × 10 2 12.331869
Table 11. Performance comparisons under different values of K.
Table 11. Performance comparisons under different values of K.
CardinalAlgorithmMeanSD M TTW Var TT M TAW Var TA Objective ValueTime
k = 5IGA 3.875192 × 10 11 1.630522 × 10 12 0.018378 9.911902 × 10 11 0.0349590.001293 4.346073 × 10 11 12.305498
I-GA 3.814660 × 10 11 1.702227 × 10 12 0.013202 1.191570 × 10 10 0.0325890.001530 4.820372 × 10 11 12.366694
GGA 4.438259 × 10 11 1.824456 × 10 12 0.012557 1.878862 × 10 10 0.0331540.001715 3.755556 × 10 11 12.307717
GA 4.908621 × 10 11 2.074714 × 10 12 0.012938 1.151762 × 10 10 0.0365210.001479 5.130825 × 10 11 12.254093
DE 1.282304 × 10 12 1.169800 × 10 11 0.011473 1.338657 × 10 10 0.0318700.001585 4.378298 × 10 11 12.314597
k = 10IGA 3.706408 × 10 11 1.011507 × 10 12 0.014305 1.136588 × 10 10 0.0349800.001385 3.163595 × 10 11 12.179674
I-GA 3.534580 × 10 11 9.668387 × 10 11 0.009163 1.281438 × 10 10 0.0277430.001537 3.619074 × 10 11 12.390631
GGA 4.274284 × 10 11 1.158032 × 10 12 0.009837 1.053864 × 10 10 0.0329210.001431 4.553116 × 10 11 12.398594
GA 4.469353 × 10 11 1.230731 × 10 12 0.011915 1.332715 × 10 10 0.0315100.001481 5.230226 × 10 11 12.339224
DE 1.008672 × 10 12 2.041402 × 10 11 0.010652 1.349989 × 10 10 0.0322350.001550 4.012823 × 10 11 12.266834
k = 15IGA 3.627593 × 10 11 6.919996 × 10 11 0.012379 1.139723 × 10 10 0.0336060.001466 3.581958 × 10 11 12.248432
I-GA 3.596287 × 10 11 7.245352 × 10 11 0.009752 1.133524 × 10 10 0.0314800.001471 3.697782 × 10 11 12.335145
GGA 4.685017 × 10 11 9.000073 × 10 11 0.012197 1.431757 × 10 10 0.0320140.001577 4.466436 × 10 11 12.306202
GA 4.689475 × 10 11 9.210266 × 10 11 0.010192 1.129161 × 10 10 0.0334710.001459 4.793283 × 10 11 12.375541
DE 7.440733 × 10 11 6.053110 × 10 10 0.010411 1.300038 × 10 10 0.0322320.001537 3.897339 × 10 11 12.275137
k = 20IGA 3.732805 × 10 11 5.237918 × 10 11 0.013350 1.108751 × 10 10 0.0348790.001462 3.749330 × 10 11 12.231906
I-GA 3.519258 × 10 11 4.918015 × 10 11 0.008593 1.155191 × 10 10 0.0308720.001474 3.093777 × 10 11 12.276594
GGA 4.654801 × 10 11 6.497635 × 10 11 0.011404 1.190508 × 10 10 0.0331550.001487 4.235547 × 10 11 12.293927
GA 4.653491 × 10 11 6.313951 × 10 11 0.010079 1.292673 × 10 10 0.0320580.001527 4.732951 × 10 11 12.249116
DE 6.369610 × 10 11 5.689965 × 10 10 0.010331 1.122927 × 10 10 0.0321800.001468 4.060707 × 10 11 12.199623
k = 25IGA 3.723978 × 10 11 3.132679 × 10 11 0.012503 1.212174 × 10 10 0.0339810.001466 3.601452 × 10 11 12.420597
I-GA 3.508942 × 10 11 3.347394 × 10 11 0.011209 1.178071 × 10 10 0.0330810.001490 3.947803 × 10 11 12.574274
GGA 4.494447 × 10 11 4.073357 × 10 11 0.011450 1.170062 × 10 10 0.0333850.001479 4.246513 × 10 11 12.358661
GA 4.803160 × 10 11 3.894708 × 10 11 0.008981 1.140048 × 10 10 0.0307730.001493 4.829034 × 10 11 12.415204
DE 5.685509 × 10 11 2.101360 × 10 10 0.010795 1.230209 × 10 10 0.0327540.001509 3.989867 × 10 11 12.542644
Table 12. Performance comparisons under different rates of transaction costs rate.
Table 12. Performance comparisons under different rates of transaction costs rate.
Cost RateAlgorithmMeanSD M TTW Var TT M TAW Var TA Objective ValueTime
0IGA 7.779590 × 10 2 1.085621 × 10 3 0.042592 1.167223 × 10 10 0.0014860.001493 7.636937 × 10 2 12.148158
I-GA 8.070280 × 10 2 4.660346 × 10 2 0.034252 1.198585 × 10 10 0.0475090.050048 7.763909 × 10 2 12.334505
GGA 9.453021 × 10 2 1.337409 × 10 3 0.041453 1.224480 × 10 10 0.0516170.001502 9.332495 × 10 2 12.285395
GA 9.439065 × 10 2 1.396028 × 10 3 0.036532 1.216560 × 10 10 0.0516310.001507 9.476544 × 10 2 12.289878
DE 1.211436 × 10 3 1.371010 × 10 2 0.038800 1.255558 × 10 10 0.0505350.001517 8.696309 × 10 2 12.409885
0.003IGA 3.466164 × 10 2 7.270020 × 10 2 0.012632 1.120481 × 10 10 0.0306010.001460 3.162454 × 10 2 12.302401
I-GA 3.574795 × 10 2 3.137535 × 10 2 0.009295 1.181667 × 10 10 0.0313760.001492 3.418001 × 10 2 12.613548
GGA 4.614849 × 10 2 8.635173 × 10 2 0.011425 1.159467 × 10 10 0.0330670.001472 4.369677 × 10 2 12.307118
GA 4.769586 × 10 2 8.799040 × 10 2 0.008632 1.321115 × 10 10 0.0341250.001545 4.371468 × 10 2 12.200709
DE 7.718151 × 10 2 8.129578 × 10 1 0.010084 1.134560 × 10 10 0.0311890.001468 4.360624 × 10 2 12.205157
0.005IGA 1.580000 × 10 2 4.740000 × 10 2 0.002530 1.160000 × 10 10 0.0197000.001480 1.800000 × 10 2 12.174379
I-GA 1.608327 × 10 2 2.190831 × 10 2 0.002667 1.211925 × 10 10 0.0203720.001501 1.645848 × 10 2 12.405563
GGA 2.368643 × 10 2 6.252157 × 10 2 0.005054 1.318728 × 10 10 0.0245560.001540 2.997583 × 10 2 12.334962
GA 2.298590 × 10 2 6.237496 × 10 2 0.003183 1.074305 × 10 10 0.0211840.001448 2.252778 × 10 2 12.338755
DE 4.521157 × 10 2 7.298525 × 10 1 0.003022 1.133138 × 10 10 0.0205210.001472 1.959690 × 10 2 12.300000
Table 13. Performance comparisons under different iterations.
Table 13. Performance comparisons under different iterations.
IterationAlgorithmMeanSD M TTW Var TT M TAW Var TA Objective ValueTime
100IGA 3.689534 × 10 11 6.803071 × 10 11 0.011050 1.156281 × 10 10 0.0342750.001475 3.238171 × 10 11 6.195688
I-GA 3.767787 × 10 11 7.071884 × 10 11 0.009307 1.155139 × 10 10 0.0311970.001478 3.534555 × 10 11 6.160365
GGA 4.628012 × 10 11 9.031909 × 10 11 0.012766 1.273718 × 10 10 0.0302250.001534 4.619552 × 10 11 6.192599
GA 4.449081 × 10 11 8.925419 × 10 11 0.008556 1.213132 × 10 10 0.0328420.001512 4.047153 × 10 11 6.185103
DE 7.335067 × 10 11 5.304879 × 10 11 0.009402 1.153873 × 10 10 0.0311010.001486 3.662947 × 10 11 6.147192
200IGA 3.423612 × 10 11 6.497260 × 10 11 0.011181 1.091235 × 10 10 0.0343200.001453 3.341455 × 10 11 12.249210
I-GA 3.529340 × 10 11 6.690840 × 10 11 0.009343 1.166460 × 10 10 0.0334100.001478 3.800790 × 10 11 12.337585
GGA 4.527227 × 10 11 8.810635 × 10 11 0.010524 1.276831 × 10 10 0.0322030.001517 3.988394 × 10 11 12.199484
GA 4.439165 × 10 11 9.080561 × 10 11 0.013297 1.253560 × 10 10 0.0316080.001516 5.265392 × 10 11 12.305086
DE 7.715867 × 10 11 2.020574 × 10 10 0.009937 1.236716 × 10 10 0.0321830.001523 3.483297 × 10 11 12.209633
300IGA 3.478190 × 10 11 6.412912 × 10 11 0.009124 1.061960 × 10 10 0.0310990.001319 3.476037 × 10 11 18.292692
I-GA 3.679422 × 10 11 6.518509 × 10 11 0.010575 1.255815 × 10 10 0.0322530.001514 4.021268 × 10 11 18.481712
GGA 4.721656 × 10 11 9.190954 × 10 11 0.012394 1.278506 × 10 10 0.0339470.001518 4.862457 × 10 11 18.281167
GA 4.597291 × 10 11 8.588828 × 10 11 0.010786 1.155225 × 10 10 0.0324890.001475 4.316307 × 10 11 18.459560
DE 7.816835 × 10 11 2.828758 × 10 10 0.007975 1.136774 × 10 10 0.0289060.001437 3.542488 × 10 11 18.202808
Table 14. The comparison of the optimal probabilities of different algorithms under different parameters.
Table 14. The comparison of the optimal probabilities of different algorithms under different parameters.
ParameterIGAI-GAGGAGADE
Cardinal52.5%15%7.5%12.5%12.5%
Cost rate58.33%4.16%8.33 %16.67%12.5%
Iteration58.33%016.67 %4.16%20.83%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, C.; Gao, Y.; Guo, E. A Novel Improved Genetic Algorithm for Multi-Period Fractional Programming Portfolio Optimization Model in Fuzzy Environment. Mathematics 2024, 12, 1694. https://doi.org/10.3390/math12111694

AMA Style

Hu C, Gao Y, Guo E. A Novel Improved Genetic Algorithm for Multi-Period Fractional Programming Portfolio Optimization Model in Fuzzy Environment. Mathematics. 2024; 12(11):1694. https://doi.org/10.3390/math12111694

Chicago/Turabian Style

Hu, Chenyang, Yuelin Gao, and Eryang Guo. 2024. "A Novel Improved Genetic Algorithm for Multi-Period Fractional Programming Portfolio Optimization Model in Fuzzy Environment" Mathematics 12, no. 11: 1694. https://doi.org/10.3390/math12111694

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop