Balaraju Sa
Balaraju Sa
Balaraju Sa
PROJECT SYNOPSIS
Course : MBA
Date of Submission :
College Seal
A
SYNOPSIS ON
SECURITY ANALYSIS
AT
1325-21-672-237
(2021-23)
TABLE OF CONTENTS
S. No Description Page No
1 INTRODUCTION 1
1.1 Definition of Expatriate -
1.2 Need for the Study -
1.3 Problem Statement -
1.4 Significance of the Study -
1.5 The Objectives of the Study -
1.6 The Hypotheses of the Study -
1.7 Scope of the study -
2 REVIEW OF LITERATURE
2.1 Theoretical Reviews -
2.2 Articles -
3 RESEARCH METHODOLOGY
3.1 Research Design -
3.2 Sampling Procedure -
3.3 Sample Size -
3.4 Methods of Data Collection -
3.5 Questionnaire Design -
3.6 Reliability test -
3.7 Statistical Tools -
CHAPTERIZATION -
BIBLIOGRAPHY -
INTRODUCTION
These can be classified into debt securities, equities, or some hybrid of the two. More
broadly, futures contracts and tradable credit derivatives are sometimes included. Security
analysis is typically divided into fundamental analysis, which relies upon the examination of
fundamental business factors such as financial statements, and technical analysis, which
focuses upon price trends and momentum. Quantitative analysis may use indicators from both
areas.
Security analysis is about valuing the assets, debt, warrants, and equity of companies from
the perspective of outside investors using publicly available information. The security analyst
must have a thorough understanding of financial statements, which are an important source of
this information. As such, the ability to value equity securities requires cross-disciplinary
While there is much overlap between the analytical tools used in security analysis and those
used in corporate finance, security analysis tends to take the perspective of potential
investors, whereas corporate finance tends to take an inside perspective such as that of a
familiar with the conclusion of second world war when thing can be in the stock market can
be liberally ruined the fortune of individual, companies ,even government ‘s it was then
discovered that the investing in various scripts instead of putting all the money in a single
securities yielded weather return with low risk percentage, it goes to the credit of
portfolio company.
Definition by SEBI:
Portfolio is a combination of securities that have returns and risk characteristics of their own;
port folio may not take on the aggregate characteristics of their individual parts.
investments.
Combination may have different features of risk and return separate from those of
the components. The portfolio is also built up of the wealth or income of the investor over a
period of time with a view to suit is return or risk preference to that of the port folio that he
holds. The portfolio analysis is thus an analysis is thus an analysis of risk –return
characteristics of individual securities in the portfolio and changes that may take place in
combination with other securities due interaction among them and impact of each on others.
Security analysis is only a tool for efficient portfolio management; both of them together and
issues like Govt. bonds and corporate debts are of various instruments like discount bonds,
debentures and blue chip equity nor scripts of emerging Blue chip companies.
portfolio evaluation and monitoring of the performance of the portfolio. All these are part of
The traditional portfolio theory aims at the selection of such securities that would fit in will
with the asset preferences, needs and choices of the investors. Thus, retired executive invests
in fixed income securities for a regular and fixed return. A business executive or a young
aggressive investor on the other hand invests in and rowing companies and in risky ventures.
The modern portfolio theory postulates that maximization of returns and minimization of risk
will yield optional returns and the choice and attitudes of investors are only a starting point
for investment decisions and that vigorous risk returns analysis is necessary for optimization
revision of portfolio evaluation and monitoring of the performance of the portfolio. All these
institutions, mutual funds and other agencies are undertaking the task of investing money of
small investors, on their behalf. Growth in the number and size of ingestible funds–a large
Increased market volatility–risk and return parameters of financial assets are continuously
Professionalization of the field and increasing use of analytical methods (e.g., quantitative
Larger direct and indirect costs of errors or short falls in meeting portfolio objectives–
their investment to achieve this goal. The rapid growth of capital markets in India has opened
The stock markets have become attractive investment options for the common man. But the
Hence this study on Security Analysis Portfolio Management” to examine the role process
This study covers the Markowitz model. The study covers the calculation of correlations
between the different securities in order to find out at what percentage funds should be invested
among the companies in the portfolio. Also the study includes the calculation of individual Standard
Deviation of securities and ends at the calculation of weights of individual securities involved in the
portfolio. These percentages help in allocating the funds available for investment based on risky
portfolios.
To construct an effective portfolio which offers the maximum return for minimum
risk
2.2 REVIEW OF LITERATURE
Security analysis is the analysis of tradable financial instruments called securities. These are
usually classified into debt securities, equities, or some hybrid of the two. Tradable credit
derivatives are also securities. Commodities or futures contracts are not securities. They are
distinguished from securities by the fact that their performance is not dependent on the
management or activities of an outside or third party. Options on these contracts are however
considered securities, since performance is now dependent on the activities of a third party.
The definition of what is and what is not a security comes directly from the language of a
United States Supreme Court decision in the case of SEC v. W. J. Howey Co.. Security
analysis is typically divided into fundamental analysis, which relies upon the examination of
fundamental business factors such as financial statements, and technical analysis, which
focuses upon price trends and momentum. Quantitative analysis may use indicators from both
areas.
Review-1: Equity Security Analysis & Portfolio Management within the MCDM frame
Publisher: Physica A: Statistical Mechanics and its Applications, Volume 375, Issue 2
Abstract
We analyze the implications for Security Analysis & Portfolio Managementof accounting for
conditional heteroskedasticity and sudden changes in volatility, based on a sample of weekly
data of the Dow Jones Country Titans, the CBT-municipal bond, spot and futures prices of
commodities for the period 2092–2005. To that end, we first proceed to utilize the ICSS
algorithm to detect long-term volatility shifts, and incorporate that information into PGARCH
models fitted to the return’s series. At the next stage, we simulate returns series and compute
a wavelet-based value at risk, which takes into consideration the investor's time horizon. We
repeat the same procedure for artificial data generated from semi-parametric estimates of the
distribution functions of returns, which account for fat tails. Our estimation results show that
neglecting GARCH effects and volatility shifts may lead to an overestimation of financial
risk at different time horizons. In addition, we conclude that investors benefit from holding
commodities as their low or even negative correlation with stock and bond indices contribute
to portfolio diversification.
Review-5: Managing Portfolio Volatility
Authors: Michael Stamos and Thomas Zimmerer
Publisher: The Journal of Security Analysis & Portfolio ManagementMulti-Asset Special
Issue 2021
Abstract
The authors revisit asset allocation strategies that aim at actively managing the volatility of
multi-asset-class portfolios in response to time-varying volatility forecasts. They use the
historical data of 29 major market indexes covering global equities, bonds, currencies, and
commodities and apply a common set of exponentially weighted volatility estimates to them.
The authors find that active volatility management is beneficial for most of these asset classes
and for mixed asset portfolios, leading to more consistent wealth accumulation over time. In
cross-validations, they find that fast-moving volatility forecasts seem beneficial because they
have better forecasting accuracy and produce economic gains in terms of risk accuracy and
performance. The authors also find significant reduction of tail risks for most assets, except
for bonds, where the reduction is minor.
RESEARCH METHODOLOGY:
The secondary collection methods includes the lectures of the superintend of the department
of market operations and so on., also the data collected from the news, magazines and
STANDARD DEVIATION:
The concept of standard deviation was first suggested by Karl Pearson in 1983.it may
be defined as the positive square root of the arithmetic mean of the squares of deviations of
the given observations from their arithmetic mean In short S.D may be defined as “Root
Primary source
Information gathered from interacting with employees in the organization. And the data
Secondary source
2. Portfolio Return
R p =R a x a + R b x b
R p= Return on portfolio
R p= Return on investment a
Rb = Return on investment b
x a=Weight of investment a
x b=Weight of investment b
3. Variance
It is a measure of dispersion of a set of data points around their mean value. Variance is a
mathematical execution of the average squared deviation from the mean.
1 2
Variance = N −1 Σ ( R−R )
4. Standard Deviation
The concept of standard deviation was first suggested by Karl Pearson in 2083. Standard
deviation is calculated as the square root of variance.
2
√ 1
N −1
Σ ( R−R )
2
1
5. Covariance of A & B = Σ ( R A−R B ) (R ¿¿ B−R)¿
N
N = number of observations
LIMITATION OF THE STUDY
Very few and randomly selected scripts / companies are analyzed from BSE listings.
Data collection was strictly confined to secondary source. No primary data is associated with
the project.
Detailed study of the topic was not possible due to limited size of the project.
There was a constraint with regard to time allocation for the research study i.e. for a period of
two months.
CHAPTER -1 - INTRODUCTION
This chapter includes the introduction of the topic, need, scope, objectives of the study,
This chapter includes the theoretical background and articles written by different authors and
This chapter includes the overall summary of the project and the conclusion based on the
Books:
3rdEdititon.
Newspapers :
Financial Express
Websites:
www.bseindia.com
www.nseindia.com
www.moneycontrol.com
www.investleaf.com