/ / Article
Special Issue

## Computational Intelligence and Metaheuristic Algorithms with Applications

View this Special Issue

Research Article | Open Access

Volume 2014 |Article ID 578182 | https://doi.org/10.1155/2014/578182

Wei Chen, "An Artificial Bee Colony Algorithm for Uncertain Portfolio Selection", The Scientific World Journal, vol. 2014, Article ID 578182, 12 pages, 2014. https://doi.org/10.1155/2014/578182

# An Artificial Bee Colony Algorithm for Uncertain Portfolio Selection

Revised10 Jun 2014
Accepted10 Jun 2014
Published26 Jun 2014

#### Abstract

Portfolio selection is an important issue for researchers and practitioners. In this paper, under the assumption that security returns are given by experts’ evaluations rather than historical data, we discuss the portfolio adjusting problem which takes transaction costs and diversification degree of portfolio into consideration. Uncertain variables are employed to describe the security returns. In the proposed mean-variance-entropy model, the uncertain mean value of the return is used to measure investment return, the uncertain variance of the return is used to measure investment risk, and the entropy is used to measure diversification degree of portfolio. In order to solve the proposed model, a modified artificial bee colony (ABC) algorithm is designed. Finally, a numerical example is given to illustrate the modelling idea and the effectiveness of the proposed algorithm.

#### 1. Introduction

Portfolio selection deals with the problem of how to allocate investor’s wealth among different assets such that the investment goal can be achieved. Markowitz [1] originally proposed the mean-variance (M-V) model for portfolio selection in 1952, which has played an important role in the development of modern portfolio selection theory. The key principle of the M-V model is to use the expected return of a portfolio as the investment return and to use the variance (or standard deviation) of the expected returns of the portfolio as the investment risk. Markowitz’s M-V model for portfolio selection problems can be formulated mathematically in two ways: minimizing risk under prescribing a minimum acceptable expected return level and maximizing expected return under prescribing a maximum acceptable risk level. Since then, a number of scholars, including Sharp [2], Merton [3], Pang [4], Perold [5], Best and Grauer [6], Konno and Yamazaki [7], and Best and Hlouskova [8], proposed different mathematical methods for the development of portfolio models. All the above-mentioned researches assume that the security returns are random variables with probability distributions. In probability theory, probability density and probability distribution functions of a random variable are usually derived from historical data. However, in the real securities market, market imperfections make the security returns present vagueness and ambiguity so that sometimes security returns cannot be well reflected by historical data. Therefore, the prediction of security returns is determined largely by experts’ estimation and contains much subjective imprecision rather than randomness. With the extensive application of fuzzy set theory [9], many researchers, such as Tanaka and Guo [10], Carlsson et al. [11], Vercher et al. [12], Zhang et al. [13], Chen et al. [14], Tsaur [15], and Gupta et al. [16], have investigated the portfolio selection problem in fuzzy environment.

An important assumption for the above fuzzy portfolio problems is that security returns are fuzzy variables. However, as we research the problem deeper, we find that paradoxes will appear if fuzzy set is employed. For example, if a security return is regarded as a fuzzy variable, then we may assign it a membership function, suppose it is a triangular fuzzy variable . Based on the membership function, the possibility theory will immediately conclude the following three propositions: (a) the return is exactly 0.03 with possibility measure 1; (b) the return is not 0.03 with possibility measure 1; and (c) “return is exactly 0.03” and “return is not exactly 0.03” are equally likely. However, it is doubtless that the belief degree of “return is exactly 0.03” is almost zero. On the other hand, “return is exactly 0.03” and “return is not exactly 0.03” have the same belief degree in possibility measure, which implies that the two events will happen equally likely. It seems that no human being can accept this conclusion. This paradox shows that those imprecise quantities like security returns cannot be quantified by possibility measure and then they are not fuzzy concepts. To avoid paradox, Liu [17] founded the uncertainty theory based on an axiomatic system of normality, self-duality, countable subadditivity, and product uncertain measure. Based on the uncertainty theory, much work has been done on the development of theoretical and practical work. Peng and Iwamura [18] proved a sufficient and necessary condition of uncertainty distribution. Chen and Liu [19] proved the existence and uniqueness theorem for uncertain differential equations. Gao [20] investigated the -shortest path and the shortest path problem in uncertain networks. Ding and Gao [21] assumed that demand is uncertain variable and formulated an optimal policy for uncertain multiproduct newsboy problem. In the area of uncertain portfolio selection problems, Zhu [22] solved an uncertain optimal control problem and applied it to a portfolio selection model. Taking semiabsolute deviation as a risk measure, Liu and Qin [23] presented three mean semiabsolute deviation models under the assumption that security returns are uncertain variables. Huang [24] proposed two new mean-variance and mean-semivariance models in which security returns are given subject to experts’ estimations. Later, Huang [25] defined a new risk measurement, that is, a risk index, and further proposed a new mean-risk index selection method for portfolio selection based on the new risk measurement. Other portfolio selection methods based on uncertainty theory can be found in [26].

Artificial bee colony (ABC) algorithm is a fairly new metaheuristic proposed by Karaboga [27], which is based on simulating the foraging behavior of honey bee swarms. Based on some classic benchmark functions, the performance of the ABC algorithm was compared with that of some other population-based algorithms such as genetic algorithm (GA), differential evolution (DE), and particle swarm optimization (PSO) in [2831]. Their research results demonstrated that the ABC algorithm is competitive to other population-based algorithms with an advantage of employing fewer control parameters. Recently, ABC algorithm has captured much attention and has been applied to many practical optimization problems including resource constrained project scheduling problem [32], reliability redundancy allocation problem [33], job shop scheduling problem [34], mechanical design problem [35], and traveling salesman problem [36]. A survey about applications of ABC algorithm is provided by Karaboga et al. in [37].

The purposes of this paper are to propose an uncertain portfolio adjusting model under the assumption that security returns are given mainly by experts’ estimations, in which four criteria, namely, return, risk, transaction cost, and diversification degree of portfolio, are considered, and to develop a modified ABC algorithm for solving the proposed portfolio problem. The rest of the paper is organized as follows. For better understanding of the paper, some necessary knowledge about uncertain variable will be introduced in Section 2. In Section 3, we will propose an uncertain mean-variance-entropy model for portfolio selection. In Section 4, we develop a modified ABC algorithm to solve the proposed model. After that, an example is given to illustrate the proposed model and the effectiveness of the proposed algorithm in Section 5. Finally, some concluding remarks are given in Section 6.

#### 2. Preliminary

Next, we will introduce some fundamental concepts and properties of uncertainty theory, which will be used throughout this paper.

Definition 1 (Liu [17]). Let be a nonempty set and let be a -algebra over . Each element is called an event. A set function is called an uncertain measure if it satisfies the following three axioms.Axiom 1(normality axiom): .Axiom 2(duality axiom): .Axiom 3(subadditivity axiom): for every countable sequence of events , we have The triplet is called an uncertainty space. In order to obtain an uncertain measure of compound event, a product uncertain measure was defined by Liu [38], thus producing the fourth axiom of uncertainty theory as follows.Axiom 4(product axiom): let be uncertainty spaces for . Then the product uncertain measure is an uncertain measure satisfying

Definition 2 (Liu [17]). An uncertain variable is a measurable function from an uncertainty space to the set of real numbers; that is, for any Borel set of real numbers, the set is an event.

In order to describe an uncertain variable, a concept of uncertainty distribution is defined as follows.

Definition 3 (Liu [17]). The uncertainty distribution of an uncertain variable is defined by for any real number .

Let be an uncertain variable with continuous uncertainty distribution . Then the inverse function is called the inverse uncertainty distribution of .

Theorem 4 (Liu [39]). Let be independent uncertain variables with uncertainty distributions , respectively. If is strictly increasing with respect to and strictly decreasing with respect to , then is an uncertain variable with an inverse uncertainty distribution:

Based on the uncertain measure, the definitions of the expected value and variance of an uncertain variable can be given as follows.

Definition 5 (Liu [17]). Let be an uncertain variable. Then the expected value of is defined by provided that at least one of the two integrals is finite.

As a useful representation of expected value, it has been proved by Liu [17] that where is the inverse uncertainty distribution of uncertain variable .

Definition 6 (Liu [17]). Let be an uncertain variable with finite expected value . Then the variance of is defined by

Let be an uncertain variable with expected value . If we only know its uncertainty distribution , then the variance is In this case, it is always assumed that the variance is

The expected value and variance of an uncertain variable satisfy the following properties.

Theorem 7 (Liu [38]). Let and be independent uncertain variables with finite expected values. Then for any real numbers and , one has

#### 3. Uncertain Portfolio Selection Model

Suppose that an investor starts with an existing portfolio and considers to reallocate his/her wealth among securities. In order to describe the problem conveniently, we use the following notations.: the proportion invested in security ,: the return rate of security ,: the lower bound constraint on security ,: the upper bound constraint on security ,: the constant rate of transaction cost for the security ,.

Transaction cost is an important factor considered by investors in financial markets. Arnott and Wanger [40] suggested that ignoring transaction costs would lead to an inefficient portfolio, whereas Sadjadi et al. [41] showed that adding transaction costs would assist decision makers to better understand the behavior of an efficient frontier. Similar to the researches in [42] and others, we assume that the transaction cost is a V-shaped function of differences between a new portfolio and the existing portfolio . That is to say, the transaction cost of th security can be expressed as Hence, the total transaction cost of the shift from to is .

Furthermore, the net return on the portfolio after paying transaction costs is given by For a new investor, it can be taken that , .

Barak et al. [43] pointed out that very small weighting of an asset will have no distinct influence on the portfolio’s return, but the administrative and monitoring costs will be increased. Similarly, very high weighting in any asset will cause investors to suffer from a larger risk. Thus, quantity constraints have to be included in the portfolio model. Specifically, a minimum and a maximum for each asset are given, and we impose that either or . In addition, one of the shortcomings of Markowitz’s model is that the portfolios are often extremely concentrated on a few assets, which is a contradiction to the notion of diversification [44]. As a result, some researchers, such as Jana et al. [44], Fang et al. [45], Kapur [46], and Zhang et al. [47], have applied the entropy measure proposed by Shannon [48] to infer how much the portfolio is diversified. In this paper, we also employ entropy to measure the diversification degree of portfolio. That is to say, we maximize the entropy function:

Assume that the objective of the investor wants to minimize the portfolio risk, and to maximize both the portfolio return after paying the transaction costs and the diversification degree of portfolio. Thus, the portfolio selection problem can be formulated as the following three-objective programming problem: where denotes the variance operators and denotes the expected value operator.

There are many methods to solve the above multiobjective optimization problem (15). One basic method is to transfer the multiobjective optimization problem into a single-objective optimization problem. We can divide these methods into two different types. The first alternative is to construct only one evaluation function for optimization by weighting the multiple objective functions. Initial work on the weighted-sum method can be found in [49] with many subsequent applications and citations. Rao and Roy proposed a method for determining weights based on fuzzy set theory [50]. Marler and Arora provided insight into how the weighted-sum method works and have explored the significance of the weights with respect to preferences, the Pareto optimal set, and the objective-function values [51]. The second alternative is to select one important objective function as the objective function to optimize, while the rest of objective functions are defined as constrained conditions. For example, Marglin developed the -constraint method, where one individual objective function is minimized with an upper level constraint imposed on the other objective functions [52]. Ehrgott and Ruzika presented two modifications by first including slack variables in the formulation and second elasticizing the constraints and including surplus variables [53]. More researches for the multiobjective optimization methods can be found in [5457]. In this paper, based on the second method, the problem (15) can be transformed into the following optimization problem: where is a required rate of return of portfolio and is the minimum entropy level the investors can tolerate.

In order to apply model (16) in a practical investment problem, we need to estimate security returns. The favored method is to regard security returns as random variables and then according to the historical observation take the arithmetic mean as the expected returns. However, since the security returns, especially short term security returns, are sensitive to various economic and noneconomic factors, it is found in reality that sometimes the historical data can hardly reflect the future security returns. In this situation, security returns have to be given mainly by experts’ judgements and estimations rather than historical data. As is mentioned before, uncertainty theory provides a new tool to deal with subjective or empirical data. In this paper, we employ uncertain variables to describe the security returns. For the sake of simplicity, throughout this paper, the uncertain return is a zigzag uncertain variable , . can be described with the following uncertainty distribution: where .

According to Definitions 5 and 6, the expected value and the variance of the zigzag uncertain variable are given as where and .

Theorem 8 (Liu [38]). Assume that and are independent zigzag uncertain variables and , respectively. Then the sum is also a zigzag uncertain variable ; that is, The product of a zigzag uncertain variable and a scalar number is also a zigzag uncertain variable ; that is,
Therefore, for any real numbers , the total uncertain return is still a zigzag uncertain variable in the form of

Furthermore, according to Theorem 7, the net uncertain expected return of the portfolio after paying transaction costs is given as and the uncertain variance of the portfolio after paying transaction costs is where

To simplify the portfolio selection model, it seems reasonable to choose the securities in such a way that ,  . Therefore, model (16) can be converted into the following crisp form:

It should be noted that the proposed uncertain portfolio model (25) is different from the Markowitz M-V model because it is based on the different theories. That is to say, if the security returns are characterized as random variables with probability distributions, we can study portfolio selection problems by probability theory, while if security returns are regarded as uncertain variables with uncertainty distributions, we can apply uncertainty theory to do researches on the relevant problems.

#### 4. Modified ABC Algorithm

##### 4.1. Standard ABC Algorithm

Artificial bee colony (ABC) algorithm is a new swarm intelligence method which simulates intelligent foraging behavior of honey bees and it is initially proposed by Karaboga [27]. In the ABC algorithm, there are three types of bees: the employed bee, the onlooker bee, and the scout bee. Each of them plays different roles in the process: the employed bees stay on a food source and provide the neighborhood of the source in its memory; the onlooker bee gets the information of food sources from the employed bees in the hive and selects one of the food sources to gather the nectar; and the scout bee is responsible for finding a new food source.

In each successful algorithm, a robust search process, including exploitation and exploration process, must be implemented effectively. In the ABC algorithm, the employed bees and onlookers execute the exploitation process in the search space, while the scout bees execute the exploration process. There is only one employed bee around each food source. In other words, the number of employed bees is equal to the number of food sources around the hive. The positions of food sources represent possible solutions to the optimization problem and the nectar amount of a food source corresponds to the quality or fitness of the associated solution. The number of the employed bees or the onlooker bees is equal to the number of solutions in the population.

At the first step, the ABC generates a randomly distributed initial population of solutions (food source positions), where denotes the size of population. Each solution is a -dimensional vector. Here, is the number of optimization parameters. After initialization, the population is subjected to repeated cycles of four major steps: updating feasible solutions by employed bees, selection of feasible solutions by onlooker bees, updating feasible solutions by onlooker bees, and avoidance of suboptimal solutions by scout bees.

Updating Feasible Solutions by Employed Bees. In order to produce a new feasible food source from the old one in memory, the ABC uses the following expression: where and are randomly chosen indexes. Although is determined randomly, it has to be different from . is a random number in .

If a new food source is better than an old food source , the old food source is replaced by the new food source. Otherwise, the old one is retained.

Selection of Feasible Solutions by Onlooker Bees. After all employed bees complete the search process, they share the information about their food sources with onlooker bees. An onlooker bee evaluates the nectar information obtained from all employed bees and chooses a food source depending on the probability value associated with that food source: where is the fitness value of the solution which is proportional to nectar amount of the food source in the position .

Updating Feasible Solutions by Onlooker Bees. Based on the information obtained from the employed bees, the onlooker bees select their feasible food sources. The selected food sources are then updated using (26); that is, an old food source is replaced by a new food source if the new food source is of a better quality.

Avoidance of Suboptimal Solutions by Scout Bees. If a position cannot be improved further through a predetermined number of cycles called limit, then employed bees will abandon the food source positions and become scout bees. This helps avoid suboptimal solutions. Assume that the abandoned source is and ; then the scout discovers a new food source by using the equation below: where is determined randomly; it should be noticed that it has to be different from .

The main steps of the standard ABC algorithm are given in Algorithm 1.

 (1) Initialize the population (2) set cycle = 1 (3) while cycle MCN do (4)      Update feasible solutions by employed bees (5)      Select feasible solutions by onlooker bees (6)      Update feasible solutions by onlooker bees (7)      Avoid suboptimal solutions by scout bees (8)      set cycle = cycle + 1 (9)   while

##### 4.2. Modified Artificial Bee Colony Algorithm
###### 4.2.1. Chaotic Initialization

Generally speaking, diversity in initial population helps escape from local optima and good-quality initial solutions accelerate convergence speed in an evolutionary algorithm. If no information about the solution is available, then random initialization is the most commonly used method to initialize the population. However, this method may affect the algorithm performance on the convergence speed and the quality of the final solution. Recently, chaotic maps with ergodicity, irregularity, and the stochastic property have been adopted to initialize the population, and some good results have been shown in many applications [58, 59]. In this paper, chaos-based initialization method is employed to increase the population diversity and improve the global convergence.

A simplest chaotic map is logistic map, whose equation is the following: where is a control parameter and is the th chaotic number, where denotes the iteration number. Obviously, under the conditions that the initial . In particular, behaves as chaotic dynamics when and .

The pseudocode of the proposed chaotic initialization is given in Algorithm 2.

 (1) set population size SN and dimension of solution // Randomly generate the initial value of chaotic variable (2) for   to   do (3) (4) while     do (5) (6) end while (7) end for // The iterative process of chaotic initialization (8) for   to SN  do (9) for   to   do (10) (11) (12)  end for (13) end for

###### 4.2.2. New Search Mechanism

The employed bee and onlooker bee produce a new feasible food source according to (26). However, the convergence performance of the algorithm is not good in some cases. Therefore, we proposed a modified search method to produce new solutions, in which forgetting factor and neighborhood factor are considered. This operation can be defined as follows: where is the forgetting factor, which expresses the memory strength for current food source, and it is decreased gradually. In addition, the quality of the neighborhood food source also affects the convergence speed and quality of the final solution. Thus, the neighborhood factor is introduced to accelerate the convergence speed by adjusting the radius of the search for new candidates. The and are defined as follows: where the values of and represent the maximum and minimum percentage of the position adjustment for the employed bees or onlooker bees. With these selected values, the value of will linearly decrease and the value of will linearly increase.

Moreover, in the scout bee phase, if the food source is abandoned, then the scouts produce a new food source by (28). However, to some extent, it has the defects of prematurity and stagnation. Therefore, the chaotic search technique is used to get out of the local optima and is specifically illustrated in Algorithm 3.

 (1) Set the maximum number of chaotic iteration and iterative variable // The variable denotes the th chaotic variable in the th iteration (2) for   to   do (3) (4) end for (5) while     do (6)  for   to   do (7) // represents a candidate solution (8) (9)  end for // Greedy selection is applied between (10) if (11)   Replace solution with candidate solution (12)   Set (13)   Break (14) else (15)   Set (16) end if (17) Set (18) end while

###### 4.2.3. The Proposed Method

Based on the above discussions, the modified ABC algorithm can be well balanced between the exploration and exploitation. The pseudocode of the proposed algorithm is given in Algorithm 4.

 (1) Set population size SN, the number of maximum cycles MCN and the control parameter limit (2) Perform Algorithm 2 to fulfill the chaotic initialization (3) while  iteration ≤ MCN  do // The employed bees phase (4)   for   to SN  do (5)  Produce a new candidate food source corresponding to food source using (29) (6)   if  ( )  Then (7)   else (8)   end if (9)   end for (10) Calculate the fitness values of all food source and the probability values by using (27) // The onlooker bees phase (11) Set (12)  while     do (13)   if     then (14)   Set (15)   Produce a new candidate food source for the onlooker bee (16)    if     then (17)    else (18)    end if (19)  Set (20)   if   > SN  then  Set (21)   end if (22)  end while // The scout bees phase (23)  for   to SN  do (24)   if   ≥ SN  then (25)   Perform Algorithm 3 to implement chaotic search (26)   end if (27)  end for (28) Set (29) end while

#### 5. Numerical Example

In this section, we give a numerical example to illustrate the application of the uncertain mean-variance-entropy model with transaction costs and the effectiveness of the proposed algorithm. In the example, security returns cannot be well reflected by the historical data and are given by experts’ evaluations. The investor wants to select portfolios from 8 individual securities. Thus, we assume that the return of security is a zigzag uncertain variable , . The uncertainty distributions of security returns are given in Table 1. And other related portfolio parameters are also listed in Table 1.

 Security 1 2 3 4 5 6 7 8 0.006 −0.017 0.085 0.050 0.163 −0.035 0.095 0.116 0.011 −0.035 0.103 0.062 0.172 −0.082 0.161 0.235 0.028 0.013 0.128 0.095 0.193 0.022 0.232 0.527 0.05 0.07 0.15 0.06 0.15 0.22 0.13 0.17 0.002 0.005 0.003 0.001 0.004 0.002 0.005 0.003 0.1 0.05 0.09 0.06 0.07 0.05 0.06 0.06 0.35 0.35 0.35 0.35 0.35 0.35 0.35 0.35

To solve the proposed model (25) by the modified ABC algorithm, we let the number of food sources , the dimension of the problem , maximum cycle number , and the control parameter . Moreover, in this section, a total of 10 runs for each experimental setting are conducted and the average results are given. The values of and are fixed to 1 and 0.2, respectively.

Suppose that the minimum entropy level and the efficient portfolios under different expected returns are shown in Table 2. If the investor is not satisfied with any of the portfolios obtained, more portfolios can be obtained by varying the value of . From Table 2, we can see that the larger the return of portfolio is, the larger the risk of portfolio is. There is a tradeoff between the return and the risk. Moreover, for the different expected return , the optimal portfolios are also different.

 Security Risk 0.349 0.050 0.137 0.072 0.222 0.050 0.060 0.060 0.0002236 0.309 0.050 0.090 0.098 0.283 0.050 0.060 0.060 0.0002255 0.136 0.063 0.212 0.068 0.350 0.050 0.060 0.060 0.0002406

Next, to demonstrate that the transaction costs have effect on the optimal portfolio selection, given and , the efficient portfolios under different transaction costs are given in Table 3. It should be noted that, for simplicity, we only vary the transaction cost of security 5. We can see that although the proportions of securities 2, 4, and 6–8 are the same, the holdings of other securities are different. Simultaneously, we also see that the total transaction cost also increases.

 Security TC 0.341 0.050 0.090 0.060 0.289 0.050 0.060 0.060 0.00188 0.350 0.050 0.102 0.060 0.268 0.050 0.060 0.060 0.00234 0.332 0.050 0.096 0.060 0.292 0.050 0.060 0.060 0.00298 0.322 0.050 0.105 0.060 0.293 0.050 0.060 0.060 0.00394

Figure 1 gives comparison results of the optimal portfolio strategies under different diversification degrees; that is, , , , and . The result indicates that, as the diversification degree of the portfolio changes, the investors adopt different investment strategies.

Figure 2 presents the performance of the ABC algorithm with respect to the choice of the lower and upper bounds. Moreover, to show the robustness of the proposed algorithm, we use relative error as the index; that is, , where the maximum is the maximal value of all the objective values calculated. The detailed results are shown in Table 4. Obviously, the relative errors do not exceed . That is, the proposed algorithm is robust to set parameters.

 SN MCN Limit Objective value Relative error ( ) 10 1500 50 0 20 2000 100 0.13 20 1500 150 0.22 30 2500 150 0.02 30 2000 100 0.47 40 3000 200 0.4 40 1500 100 0.3 50 1500 100 0.45 60 2000 150 0.46 70 2000 50 0.52

Table 5 presents a comparison of the modified ABC, ABC, and GA. From Table 5, it can be observed that, for the and , the investment strategy obtained by modified ABC algorithm outperforms those produced by standard ABC algorithm and GA, because the global optimal value obtained by modified ABC algorithm is minimal. In addition, Figure 3 shows the convergence characteristic of modified ABC, ABC, and GA. Generally speaking, the modified ABC algorithm converges within 200 iterations, while ABC and GA algorithms converge within 400 and 430 iterations, respectively. All these results show that the modified ABC algorithm has a better performance and is efficient in finding optimal portfolios.

 Modified ABC ABC GA 0.327 0.319 0.311 0.050 0.050 0.061 0.090 0.132 0.158 0.060 0.060 0.060 0.303 0.269 0.240 0.050 0.050 0.050 0.060 0.060 0.060 0.060 0.060 0.060 Risk

#### 6. Conclusion

Since the security market is so complex, sometimes security returns have to be predicted mainly by experts’ evaluations rather than historical data. This paper discusses a portfolio selection problem with returns given by experts’ evaluations. By taking the security returns as uncertain variables, this paper makes use of the uncertain expected value and uncertain variance to measure the return and risk of securities. Furthermore, we propose an uncertain mean-variance-entropy model for portfolio selection with transaction costs. After that, a modified ABC algorithm is developed to solve the proposed problem. Finally, a numerical example is presented to illustrate this modeling concept and to demonstrate the effectiveness of the proposed algorithm. The results show that the proposed method is applicable and effective for solving the portfolio selection problem.

#### Conflict of Interests

The author declares that there is no conflict of interests regarding the publication of this paper.

#### Acknowledgments

The author thanks Professor Zhijun Wu for his valuable comments and suggestions. This research was supported by the Humanity and Social Science Youth Foundation of Ministry of Education of China (no. 13YJC630012), the National Natural Science Foundation of China (nos. 71240002 and 71102150), the Beijing Natural Science Foundation of China (no. 9142003), and the Beijing Philosophical Social Science Project of China (no. 13SHB015).

#### References

1. H. Markowitz, “Portfolio selection,” The Journal of Finance, vol. 7, no. 1, pp. 77–91, 1952. View at: Publisher Site | Google Scholar
2. W. Sharp, “A simplified model for portfolio analysis,” Management Science, vol. 9, pp. 277–293, 1963. View at: Google Scholar
3. R. C. Merton, “An analytic derivation of the efficient frontier,” Journal of Finance and Quantitative Analysis, vol. 10, pp. 1851–1872, 1972. View at: Google Scholar
4. J. S. Pang, “A new and efficient algorithm for a class of portfolio selection problems,” Operations Research, vol. 28, no. 3, part 2, pp. 754–767, 1980. View at: Publisher Site | Google Scholar | MathSciNet
5. A. F. Perold, “Large-scale portfolio optimization,” Management Science, vol. 30, no. 10, pp. 1143–1160, 1984. View at: Publisher Site | Google Scholar | MathSciNet
6. M. J. Best and R. R. Grauer, “The efficient set mathematics when mean-variance problems are subject to general linear constraints,” Journal of Economics and Business, vol. 42, no. 2, pp. 105–120, 1990. View at: Publisher Site | Google Scholar
7. H. Konno and H. Yamazaki, “Mean absolute deviation portfolio optimization model and its application to Tokyo stock exchange,” Management Science, vol. 37, pp. 519–531, 1991. View at: Publisher Site | Google Scholar
8. M. J. Best and J. Hlouskova, “The efficient frontier for bounded assets,” Mathematical Methods of Operations Research, vol. 52, no. 2, pp. 195–212, 2000.
9. L. A. Zadeh, “Fuzzy sets,” Information and Computation, vol. 8, pp. 338–353, 1965. View at: Google Scholar | MathSciNet
10. H. Tanaka and P. Guo, “Portfolio selection based on upper and lower exponential possibility distributions,” European Journal of Operational Research, vol. 114, no. 1, pp. 115–126, 1999.
11. C. Carlsson, R. Fullér, and P. Majlender, “A possibilistic approach to selecting portfolios with highest utility score,” Fuzzy Sets and Systems, vol. 131, no. 1, pp. 13–21, 2002. View at: Publisher Site | Google Scholar | MathSciNet
12. E. Vercher, J. D. Bermúdez, and J. V. Segura, “Fuzzy portfolio optimization under downside risk measures,” Fuzzy Sets and Systems, vol. 1, pp. 361–377, 2007. View at: Google Scholar
13. W. G. Zhang, Y. L. Wang, Z. P. Chen, and Z. K. Nie, “Possibilistic mean-variance models and efficient frontiers for portfolio selection problem,” Information Sciences, vol. 177, no. 13, pp. 2787–2801, 2007. View at: Publisher Site | Google Scholar | MathSciNet
14. W. Chen, Y. Yang, and H. Ma, “Fuzzy portfolio selection problem with different borrowing and lending rates,” Mathematical Problems in Engineering, vol. 2011, Article ID 263240, 15 pages, 2011. View at: Publisher Site | Google Scholar | MathSciNet
15. R. Tsaur, “Fuzzy portfolio model with different investor risk attitudes,” European Journal of Operational Research, vol. 227, no. 2, pp. 385–390, 2013. View at: Publisher Site | Google Scholar
16. P. Gupta, G. Mittal, and M. K. Mehlawat, “Multiobjective expected value model for portfolio selection in fuzzy environment,” Optimization Letters, vol. 7, no. 8, pp. 1765–1791, 2013.
17. B. Liu, Uncertainty Theory, vol. 154 of Studies in Fuzziness and Soft Computing, Springer, Berlin, Germany, 2nd edition, 2007. View at: MathSciNet
18. Z. X. Peng and K. Iwamura, “A sufficient and necessary condition of uncertainty distribution,” Journal of Interdisciplinary Mathematics, vol. 13, no. 3, pp. 277–285, 2010. View at: Publisher Site | Google Scholar | MathSciNet
19. X. W. Chen and B. Liu, “Existence and uniqueness theorem for uncertain differential equations,” Fuzzy Optimization and Decision Making, vol. 9, no. 1, pp. 69–81, 2010. View at: Publisher Site | Google Scholar | MathSciNet
20. Y. Gao, “Shortest path problem with uncertain arc lengths,” Computers & Mathematics with Applications, vol. 62, no. 6, pp. 2591–2600, 2011. View at: Publisher Site | Google Scholar | MathSciNet
21. S. Ding and Y. Gao, “The ($\sigma$, S) policy for uncertain multi-product newsboy problem,” Expert Systems with Applications, vol. 41, pp. 3769–3776, 2014. View at: Google Scholar
22. Y. Zhu, “Uncertain optimal control with application to a portfolio selection model,” Cybernetics and Systems, vol. 41, no. 7, pp. 535–547, 2010.
23. Y. Liu and Z. Qin, “Mean semi-absolute deviation model for uncertain portfolio optimization problem,” Journal of Uncertain Systems, vol. 6, no. 4, pp. 299–307, 2012. View at: Google Scholar
24. X. Huang, “Mean-variance models for portfolio selection subject to experts' estimations,” Expert Systems with Applications, vol. 39, no. 5, pp. 5887–5893, 2012. View at: Publisher Site | Google Scholar
25. X. Huang, “A risk index model for portfolio selection with returns subject to experts' estimations,” Fuzzy Optimization and Decision Making, vol. 11, no. 4, pp. 451–463, 2012. View at: Publisher Site | Google Scholar | MathSciNet
26. X. Huang, Portfolio Analysis: From Probabilistic to Credibilistic and Uncertain Approaches, Springer, Berlin, Germany, 2010.
27. D. Karaboga, “An idea based on honeybee swarm for numerical optimization,” Tech. Rep. TR06, Erciyes University, Engineering Faculty, Computer Engineering Department, 2005. View at: Google Scholar
28. D. Karaboga and B. Basturk, “A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm,” Journal of Global Optimization, vol. 39, no. 3, pp. 459–471, 2007. View at: Publisher Site | Google Scholar | MathSciNet
29. D. Karaboga and B. Basturk, “On the performance of artificial bee colony (ABC) algorithm,” Applied Soft Computing Journal, vol. 8, no. 1, pp. 687–697, 2008. View at: Publisher Site | Google Scholar
30. D. Karaboga and B. Akay, “A comparative study of artificial Bee colony algorithm,” Applied Mathematics and Computation, vol. 214, no. 1, pp. 108–132, 2009.
31. D. Karaboga and B. Akay, “A modified Artificial Bee Colony (ABC) algorithm for constrained optimization problems,” Applied Soft Computing Journal, vol. 11, no. 3, pp. 3021–3031, 2011. View at: Publisher Site | Google Scholar
32. K. Ziarati, R. Akbari, and V. Zeighami, “On the performance of bee algorithms for resource-constrained project scheduling problem,” Applied Soft Computing Journal, vol. 11, no. 4, pp. 3720–3733, 2011. View at: Publisher Site | Google Scholar
33. W. Yeh and T. Hsieh, “Solving reliability redundancy allocation problems using an artificial bee colony algorithm,” Computers & Operations Research, vol. 38, no. 11, pp. 1465–1473, 2011. View at: Publisher Site | Google Scholar
34. A. Banharnsakun, B. Sirinaovakul, and T. Achalakul, “Job shop scheduling with the Best-so-far ABC,” Engineering Applications of Artificial Intelligence, vol. 25, no. 3, pp. 583–593, 2012. View at: Publisher Site | Google Scholar
35. B. Akay and D. Karaboga, “Artificial bee colony algorithm for large-scale problems and engineering design optimization,” Journal of Intelligent Manufacturing, vol. 23, no. 4, pp. 1001–1014, 2012. View at: Publisher Site | Google Scholar
36. D. Karaboga and B. Gorkemli, “A combinatorial Artificial Bee Colony algorithm for traveling salesman problem,” in Proceedings of the International Symposium on Innovations in Intelligent Systems and Applications (INISTA '11), pp. 50–53, Istanbul, Turky, June 2011. View at: Publisher Site | Google Scholar
37. D. Karaboga, B. Gorkemli, C. Ozturk, and N. Karaboga, “A comprehensive survey: artificial bee colony (ABC) algorithm and applications,” Artificial Intelligence Review, vol. 42, pp. 21–57, 2014. View at: Publisher Site | Google Scholar
38. B. Liu, “Why is there a need for uncertainty theory?” Journal of Uncertain Systems, vol. 6, no. 1, pp. 3–10, 2012. View at: Google Scholar
39. B. Liu, Uncertainty Theory: A Branch of Mathematics for Modeling Human Uncertainty, Springer, Berlin, Germany, 2010.
40. R. D. Arnott and W. H. Wanger, “The measurement and control of trading costs,” Financial Analysts Journal, vol. 46, no. 6, pp. 73–80, 1990. View at: Google Scholar
41. S. J. Sadjadi, M. B. Aryanezhad, and B. F. Moghaddam, “A dynamic programming approach to solve efficient frontier,” Mathematical Methods of Operations Research, vol. 60, no. 2, pp. 203–214, 2004.
42. W. Chen and W. G. Zhang, “The admissible portfolio selection problem with transaction costs and an improved PSO algorithm,” Physica A: Statistical Mechanics and its Applications, vol. 389, no. 10, pp. 2070–2076, 2010. View at: Publisher Site | Google Scholar
43. S. Barak, M. Abessi, and M. Modarres, “Fuzzy turnover rate chance constraints portfolio model,” European Journal of Operational Research, vol. 228, no. 1, pp. 141–147, 2013. View at: Publisher Site | Google Scholar | MathSciNet
44. P. Jana, T. K. Roy, and S. K. Mazumder, “Multi-objective possibilistic model for portfolio selection with transaction cost,” Journal of Computational and Applied Mathematics, vol. 228, no. 1, pp. 188–196, 2009.
45. S. Fang, J. R. Rajasekera, and H. J. Tsao, Entropy Optimization and Mathematical Programming, Kluwer Academic, 1997. View at: Publisher Site | MathSciNet
46. J. N. Kapur, Maximum Entropy Models in Science and Engineering, Wiley Eastern Limited, New Delhi, India, 1990. View at: MathSciNet
47. W. Zhang, Y. Liu, and W. Xu, “A possibilistic mean-semivariance-entropy model for multi-period portfolio selection with transaction costs,” European Journal of Operational Research, vol. 222, no. 2, pp. 341–349, 2012.
48. C. E. Shannon, The Mathematical Theory of Communication, The University of Illinois Press, Urbana, Ill, USA, 1949. View at: MathSciNet
49. L. A. Zadeh, “Optimality and non-scalar-valued performance criteria,” IEEE Transaction on Automation Control, vol. 8, no. 1, pp. 59–60, 1963. View at: Publisher Site | Google Scholar
50. J. R. Rao and N. Roy, “Fuzzy set-theoretic approach of assigning weights to objectives in multicriteria decision making,” International Journal of Systems Science. Principles and Applications of Systems and Integration, vol. 20, no. 8, pp. 1381–1386, 1989.
51. R. T. Marler and J. S. Arora, “The weighted sum method for multi-objective optimization: new insights,” Structural and Multidisciplinary Optimization, vol. 41, no. 6, pp. 853–862, 2010.
52. S. Marglin, Public Investment Criteria, MIT Press, Cambridge, Mass, USA, 1967.
53. M. Ehrgott and S. Ruzika, “Improved $\epsilon$-constraint method for multiobjective programming,” Journal of Optimization Theory and Applications, vol. 138, no. 3, pp. 375–396, 2008. View at: Publisher Site | Google Scholar | MathSciNet
54. J. L. Cohon, Multiobjective Programming and Planning, vol. 140, Academic Press, New York, NY, USA, 1978. View at: MathSciNet
55. V. Chankong and Y. Y. Haimes, Multiobjective Decision Making Theory and Methodology, Elsevier, New York, NY, USA, 1983. View at: MathSciNet
56. H. K. Singh, T. Ray, and W. Smith, “C-PSA: constrained Pareto simulated annealing for constrained multi-objective optimization,” Information Sciences, vol. 180, no. 13, pp. 2499–2513, 2010. View at: Publisher Site | Google Scholar
57. M. K. Luhandjula and M. J. Rangoaga, “An approach to solving a fuzzy multiobjective programming problem,” European Journal of Operational Research, vol. 232, no. 2, pp. 249–255, 2014. View at: Publisher Site | Google Scholar | MathSciNet
58. B. Alatas, “Chaotic bee colony algorithms for global numerical optimization,” Expert Systems with Applications, vol. 37, no. 8, pp. 5682–5687, 2010. View at: Publisher Site | Google Scholar
59. C. H. Yang, S. W. Tsai, and L. Y. Chuang, “An improved particle swarm optimization with double-bottom chaotic maps for numerical optimization,” Applied Mathematics and Computation, vol. 219, no. 1, pp. 260–279, 2012. View at: Publisher Site | Google Scholar | MathSciNet

Copyright © 2014 Wei Chen. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.