Reference no: EM131046385
First, Please look at the excel sheets. You will see the diminishing Musharakah sukuk with maturity of 5 years (60 months). The investor's income come from two ways:
1- Redeemed part R (column F). It is $1000 because the issuer redeem his assets at par value. (the face value of sukuk is $1000)
2- Periodic rental amount. (Column E). So, I want to you to do the following:
1- We want to the issuer redeem his assets based on the market (not at par value). So, we want to use the CRR model (binomial tree) to find the expectation value. (Remember that in Islamic finance or Islamic sukuk, we will replace the interest rate by rental rate).
In binomial tree, how we find the volatility σ ?
• At time 0, find thevolatility σ from historic data. ( Download the Sukuk data from any website).
• At time 1, 2,3,4,5, find thevolatility σ by using volatility forecasting Garch model from the same data.
2- For the periodic rental amount, we want to use the valuation of binary option (cash or nothing).
For this part, please try to make at least three scenarios for (cash or nothing) by binomial tree when you are using the binary option.
3- Please do these steps by excel sheets. (andmatlab if you can).
4- In the end, please write a report for all the above steps( CCR model, Garch model and binary option) and explain clearly by academic writing all these methods and how you used it. (At least 20 pages). (Add all the figures for tree and tables in this report)
5- Please do not forget to send me the data and give me its source?
What other properties might be useful for network addresses
: One property of addresses is that they are unique; if two nodes had the same address it would be impossible to distinguish between them.
|
Problem during communication
: A common problem during communication occurs when you encounter two stakeholders who have conflicting ideas about what the software should be. That is, you have mutually conflicting requirements. How can you address this problem?
|
Public key encryption and symetric key encryption
: Compare and contrast Public Key encryption and Symetric Key encryption. Your answer should include the relative time needed to encrypt/decrypt, the security of the encryption, and how they are used in the HTTPS protocal.
|
Calculate the total time required to transmit 10,000 bits
: Hosts A and B are each connected to a switch S via 10-Mbps links as in Figure 1.25. The propagation delay on each link is 20 μs. S is a store-and forward device; it begins retransmitting a received packet 35 μs after it has finished receiving it. ..
|
Diminishing musharakah sukuk with maturity
: First, Please look at the excel sheets. You will see the diminishing Musharakah sukuk with maturity of 5 years (60 months). The investor's income come from two ways:
|
Six types of information you would gather
: If a company hired you as a consultant to provide them a general assessment of their IT challenges across the enterprise, what would be six types of information you would gather.
|
Definition of a class counter containing
: Write the definition of a class Counter containing: An instance variable named counter of type int. A constructor that takes one int argument and assigns its value to counter A method named increment that adds one to counter.
|
Calculate the latency for the following
: Same as (a) but assume the switch implements "cut-through" switching: It is able to begin retransmitting the packet after the first 200 bits have been received.
|
What did you learn about the choreographer
: Was the work in one dance style or tradition? (modern, African, tap, flamenco, jazz, ballet, folklore, Native American, etc.). If not, how did it combine movements and qualities found in several kinds of dance?
|