Research article

Certain inequalities in frame of the left-sided fractional integral operators having exponential kernels

  • Received: 07 September 2021 Revised: 02 December 2021 Accepted: 08 December 2021 Published: 14 December 2021
  • MSC : 26A33, 26A51, 26D15, 26D10

  • By virtue of the left-sided fractional integral operators having exponential kernels, proposed by Ahmad et al. in [J. Comput. Appl. Math. 353:120-129, 2019], we create the left-sided fractional Hermite–Hadamard type inequalities for convex mappings. Moreover, to study certain fractional trapezoid and midpoint type inequalities via the differentiable convex mappings, two fractional integral identities are proven. Also, we show the important connections of the derived outcomes with those classical integrals clearly. Finally, we provide three numerical examples to verify the correctness of the presented inequalities that occur with the variation of the parameter μ.

    Citation: Shuhong Yu, Tingsong Du. Certain inequalities in frame of the left-sided fractional integral operators having exponential kernels[J]. AIMS Mathematics, 2022, 7(3): 4094-4114. doi: 10.3934/math.2022226

    Related Papers:

    [1] Guocheng Li, Pan Zhao, Minghua Shi, Gensheng Li . A hybrid framework for mean-CVaR portfolio selection under jump-diffusion processes: Combining cross-entropy method with beluga whale optimization. AIMS Mathematics, 2024, 9(8): 19911-19942. doi: 10.3934/math.2024972
    [2] Jiuchao Ban, Yiran Wang, Bingjie Liu, Hongjun Li . Optimization of venture portfolio based on LSTM and dynamic programming. AIMS Mathematics, 2023, 8(3): 5462-5483. doi: 10.3934/math.2023275
    [3] Chengjin Tang, Jiahao Guo, Yinghui Dong . Optimal investment based on performance measure with a stochastic benchmark. AIMS Mathematics, 2025, 10(2): 2750-2770. doi: 10.3934/math.2025129
    [4] Zhimin Liu, Ripeng Huang, Songtao Shao . Data-driven two-stage fuzzy random mixed integer optimization model for facility location problems under uncertain environment. AIMS Mathematics, 2022, 7(7): 13292-13312. doi: 10.3934/math.2022734
    [5] Fei Yu . Multiperiod distributionally robust portfolio selection with regime-switching under CVaR risk measures. AIMS Mathematics, 2025, 10(4): 9974-10001. doi: 10.3934/math.2025456
    [6] Yunjae Nam, Dongsun Lee . Efficient one asset replacement scheme for an optimized portfolio. AIMS Mathematics, 2022, 7(9): 15881-15903. doi: 10.3934/math.2022869
    [7] Yinghui Dong, Chengjin Tang, Chunrong Hua . Optimal investment of DC pension plan under a joint VaR-ES constraint. AIMS Mathematics, 2024, 9(1): 2084-2104. doi: 10.3934/math.2024104
    [8] Doong Toong Lim, Khang Wen Goh, Lam Hong Lee . A new class of Shariah-compliant portfolio optimization model: diversification analysis. AIMS Mathematics, 2023, 8(9): 20933-20965. doi: 10.3934/math.20231066
    [9] Sunil Kumar Sharma . A Bhattacharyya Triangular intuitionistic fuzzy sets with a Owa operator-based decision making for optimal portfolio selection in Saudi exchange. AIMS Mathematics, 2024, 9(10): 27247-27271. doi: 10.3934/math.20241324
    [10] Ling Rao . Portfolio selection based on uncertain fractional differential equation. AIMS Mathematics, 2022, 7(3): 4304-4314. doi: 10.3934/math.2022238
  • By virtue of the left-sided fractional integral operators having exponential kernels, proposed by Ahmad et al. in [J. Comput. Appl. Math. 353:120-129, 2019], we create the left-sided fractional Hermite–Hadamard type inequalities for convex mappings. Moreover, to study certain fractional trapezoid and midpoint type inequalities via the differentiable convex mappings, two fractional integral identities are proven. Also, we show the important connections of the derived outcomes with those classical integrals clearly. Finally, we provide three numerical examples to verify the correctness of the presented inequalities that occur with the variation of the parameter μ.



    The portfolio selection problem has always been a focal point of attention in the field of financial engineering. The core of this issue is to study how to allocate assets rationally in order to diversify risks and achieve returns higher than those obtained from bank deposits and government bonds. Markowitz's [1] introduction of the mean–variance (MV) portfolio model marked the beginning of modern portfolio theory. Since then, the balance between returns and risks has been an important theme in portfolio selection, which means maximizing investor returns while minimizing losses as much as possible. In recent years, many scholars have proposed significant models that incorporate new indicators of returns and risks [2,3,4,5]. However, due to the uncertainty of asset returns, constructing a portfolio that satisfies investors has become a challenging problem.

    In the real securities market, there are many hard-to-quantify uncertainty factors that can prevent investors from obtaining accurate and effective market information. This, in turn, may lead investors to make erroneous judgments. It was not until Zaden [6] introduced fuzzy set theory that these problems were addressed. Since then, other scholars began to study the fuzzy portfolio selection problem. Wang et al. [7], among others, proposed risk measurement methods such as variance, entropy, and value at risk (VaR) in a fuzzy environment, evaluating investment risk from different perspectives. They also established a multi-objective model based on these measurement methods to assess their collective impact on portfolio selection. Solving the portfolio problem using this theory firstly requires clarifying how to handle the uncertainty of portfolio returns, which is typically approximated using fuzzy numbers with possible distributions or credibility distributions to represent the returns of risky assets. For instance, Enriqueta Vercher [8] assumed that the returns of the portfolio are lr-type fuzzy variables and generated efficient portfolios within the fuzzy mean–absolute deviation framework. Additionally, studies on portfolio problems based on fuzzy set theory have been conducted by other scholars [9,10,11,12] as well. Meanwhile, methods for measuring risk in portfolio problems have also garnered increasing attention from researchers, leading to the introduction of various risk measurement methods. Among the more common ones are variance (V), absolute deviation (SAD), value at risk (VaR), conditional value at risk (CVaR), and entropy. To date, these risk measurement methods remain widely used internationally.

    Jagdish Kumar Pahade [13] extended Markowitz's mean–variance portfolio selection model to the mean–variance–skewness portfolio selection model, and presented a polynomial objective programming method to solve it. Kaur et al.[14] constructed optimal combination of Markowitz's mean–variance model with and without radix constraints. The effectiveness and efficiency of the proposed model as an advanced method for portfolio optimization were verified by experiments. In addition, Mostafa Abdolahi Moghadam [15] used the interval semi-absolute deviation criterion to control investment risk and established a portfolio selection model considering many different factors. W. Yue [16] took semi-variance risk measures and semi-absolute deviation risk measures as risk measures to provide additional advantages and flexibility, established a portfolio selection model under the framework of low partial risk, and designed a new and efficient multi-objective evolutionary algorithm calculation model. J. K. Pahade [17] established a portfolio selection model by using the possibilistic semi-absolute deviation risk measure method. Since value at risk is not a coherent measure of risk, it is not subadditive and convex. Therefore, considering value at risk and conditional value at risk as risk measures with different confidence levels in the model is considered in the financial literature as a new way to manage and control risk. Hossein Babazadeh [18,19] used extreme value theory (EVT) to estimate VaR. A new non-dominated sorting genetic algorithm (NSGA-II) has been proposed to solve this problem. C. Jiang [20] tested the validity of the model for portfolio selection based on VaR. Other studies related to value at risk are [21,22,23]. Second, the conditional value at risk (CVaR), as the conditional expectation of loss exceeding VaR, not only focuses on the threshold of potential losses (VaR), but also considers the average level of losses exceeding this threshold. As a result, CVaR is able to more fully assess the risks posed by extreme events. Moris S. Strub[24] studied a discrete-time average risk portfolio selection problem whose risk is measured by CVaR, and the results suggest that the risk measured by CVaR may help to understand the long-standing mystery of the equity premium. Taras Bodnar [25] presented the correlation quantities required for VaR and CVaR calculations, and expressed the optimal portfolio weights using only observed data. The optimal portfolio allocation of VaR and CVaR as risk measures has been studied from a Bayesian perspective. S. Benati [26] combined expected returns, CVaR, and regret measures to propose a robust optimization model under two sources of uncertainty. K. Su [27] combined three different hedging models, namely parametric, non-parametric and semi-parametric minimum CVaR hedging models, and constructed a hybrid hedging model to reduce the uncertainty of the model.

    Due to the complexity of the financial transaction market and the impact of multiple factors such as transaction costs, management costs, and transaction complexity existing in investment, selecting too many types and numbers of assets in the portfolio will lead to investors not having too much energy to manage these assets, resulting in investment damage. In order to make the portfolio model more in line with the real investment environment, it is necessary to limit the number of assets in the portfolio during investment, that is, a base constraint. Man-Fai Leung [28] proposed a neurodynamics-based collaborative optimization method for radix-constrained portfolio selection. In the same year, he also proposed a dual time-scale dual neurodynamics method [29] and applied it to solving recombination portfolio optimization problems with cardinality constraints. J. He [30] established a fuzzy portfolio model considering the cardinality constraint and transaction cost constraint, and this was solved by a differential evolution algorithm. Loke et al. [31] proposed an adaptive step search algorithm to solve the radix-constrained portfolio optimization problem. However, most of the abovementioned studies were processed by a simple intelligent method or a multi-objective method. Multi-objective methods have priority and needs to sacrifice other goals to fulfill another goal. This process will indeed be more flexible, but many investors want to strike a balance between risk and return. Therefore, we have a new way, using the form of fractions, in which the two objectives of risk and return are divided into fractions, and strive to achieve a balance between the two objectives. This method adds another approach to the current multi-objective approach in portfolio optimization research.

    Although there have been many excellent works on portfolio optimization, there are not many studies that introduce fractional programming into portfolio optimization modeling. Under the framework of optimization theory, the fractional programming concept is introduced into the portfolio optimization model modeling, which has a theoretical basis and development prospects. Therefore, this paper integrates the concept of fractional programming into the construction of a portfolio model, and establishes four kinds of fractional programming portfolio optimization models with different risk measures by combining radix constraints and transaction costs within the fuzzy framework. These four models are mixed integer programming problems, which are difficult to solve by general methods. Therefore, an internal and external double-loop hybrid heuristic algorithm (IEDCHA) is designed in this paper. The main idea of this algorithm is to use the genetic algorithm to deal with cardinality constraints, and this part is used as an external loop. After that, the differential evolution algorithm is used to process the assets to get a set of solutions that meet the requirements of the model, and this part is regarded as an inner loop. The internal and external double-loop mechanism formed by this algorithm combines the advantages of the qualified differential evolution algorithm of the genetic algorithm, which not only improves population diversity but also ensures the acquisition of a global optimal solution. The rationality and effectiveness of the four models and the proposed algorithm (IEDCHA) are verified by the simulation experiments, which calculate the portfolio strategies of the four models under different parameters. Secondly, we also use other optimization algorithms to solve the four models and compare the numerical results.

    The significant differences between this paper and other relevant studies are as follows.

    (1) Compared with the single-objective portfolio optimization model, which only selects a certain objective that investors pay the most attention to for modeling, and the multi-objective optimization model, which uses most constraints as the target for modeling, this paper adopts a new method to process the two objectives in the form of fractions. The purpose is to ensure that the extreme values of the two targets are approximated to find the balance point of the two targets. This can avoid the limitations of single-goal processing and the defects of multi-goal processing that require sacrificing the weight of other goals to fulfill another goal. Therefore, the fractional programming method adopted in this paper is a valuable and novel contribution to the existing research.

    (2) Compared with using ni=1zi=K as cardinality constraint [32,33,34,35] method, this article will take ni=1ziK as the cardinality constraint. The method of the article [32,33,34,35] is to stipulate that the number of assets selected in each investment is equal to its given K, which will limit the allocation of proportion of assets in the portfolio selection process to a certain extent. The base constraint method adopted in this paper not only ensures that the investment base will be within a certain range but also makes portfolio selection and asset allocation more flexible. Compared with the method of a fixed maximum base, the method adopted in this paper can obtain a more sophisticated portfolio strategy to a certain extent.

    (3) Considering that there are few studies on fuzzy portfolio models based on fractional programming at present, and conditions such as cardinality constraints, threshold constraints, and transaction costs are not taken into account at the same time, there is still a large research space in this aspect. In light of this, four fuzzy portfolio optimization models based on variance, semi-absolute deviation, value at risk, and conditional value at risk (VaR) are established in this paper based on realistic constraints such as cardinality constraints and threshold constraints. These four models comprehensively include the more mainstream risk measurement methods in the world. In the experimental part, this paper makes a detailed analysis and comparison of the portfolio strategy and the numerical results of the simulated investment of these four models.

    (4) In this paper, based on the characteristics of two heuristic methods that have been thoroughly studied in the field of optimization, a new internal and external double-loop hybrid heuristic algorithm (IEDCHA) is proposed. In the numerical experiment part, the numerical results of different risk measurement models are compared and analyzed, and the results show the applicability of different risk measurement methods. It makes a valuable and novel contribution to the existing portfolio optimization model solution methods.

    Section 2 explains the related topics of fuzzy set theory in short. Section 3 establishes four alternative risk metrics of fuzzy fractional programming portfolio optimization models based on practical limitations such as cardinality limits. Section 4 proposes an internal and external double-loop cycle hybrid heuristic algorithm (IEDCHA) that combines the properties of the genetic and differential evolution algorithms. This algorithm provides the best balance of exploration and development. In Section 5, we utilize historical data to replicate an investment experiment in order to validate the model's logic and the efficacy of IEDCHA. Section 6 contains the conclusion to the full text. In addition, the graphic abstract of this paper is shown in Figure 1.

    Figure 1.  Graphic abstract of this article.

    Some scholars use fuzzy figures to represent the uncertainty of potential asset returns. In the sense of selecting the best choice in a judgment issue, they approach the portfolio selection problem mathematically [36]. Fuzzy numbers are used to describe financial market returns, and the meaning of fuzzy numbers is the main topic of this part.

    Definition 1. [6] Let ˜X be a map from X to the interval [0,1], ˜A:X[0,1],X˜A(x), where ˜X is a fuzzy set on X, the function ˜A(.) becomes the subordinate function of the fuzzy set ˜A, and ˜A(x) is called the subordination of x to the fuzzy set ˜A.

    Definition 2. [6] A fuzzy set ˜A has an affiliation function ˜A(x):X[0,1], and to be called a fuzzy number ˜A, it must satisfy the following conditions:

    (1) ˜A is regular, x0R exists such that ˜A(x0)=1;

    (2) ˜A(x) is convex, that is, x,yR when λ[0,1], with ˜A(λx+(1λ)y)min{˜A(x),˜A(y)};

    (3) ˜A(x) is upper semi-continuous and bounded, i.e, ε[0,1], and thus ˜Aε={xR|˜A(x)>ε} is a fuzzy branch of ˜A;

    (4) The branch sup˜A of sup˜A={x|xR,˜A(x)>0} is a tight set.

    Definition 3. [37] Let AF be a fuzzy number, let γ be the horizontal intercept set [˜A]γ=[a_(γ),ˉa(γ)],γ[0,1]. Then the likelihood kurtosis of the fuzzy number A is defined as

    KA=E(AE(A))4(VaR(A))2=10γ[(a_(γ)E(A))4+(ˉa(γ)E(A))4]dγ10γ[(a_(γ)E(A))2+(ˉa(γ)E(A))2]dγ. (2.1)

    In short, the fourth-order moments of the fuzzy numbers are used instead of the kurtosis of the possibilities, denoted KA=E(AE(A))4=10γ[(a_(γ)E(A))4+(ˉa(γ)E(A))4]dγ. The statistical definition of possibility kurtosis measures the kurtosis of the possibility distribution of a fuzzy variable, where high kurtosis means the increase in the variance of possibility is caused by extreme differences at low frequencies greater or less than the mean of the possibility.

    According to the aforesaid analysis, if ˜A=(a,b,α,β) is a trapezoidal fuzzy number, then its subordination function can be expressed as

    μ˜A(x)={(x(aα)α),aαxa,1,axb,(b+βxβ),bxb+β.0,else. (2.2)

    Let the γ of the trapezoidal fuzzy number ˜A be the horizontal intercept set of γ: [˜A]γ=[a_(γ),ˉa(γ)], where a_(γ)=aα(1γ), ˉa(γ)=b+β(1γ), γ[0,1]; γ is called the confidence level or confidence level; and a_(γ) and ˉa(γ) are the left and right endpoints of the γ-horizontal intercept, respectively.

    Definition 4. [38] Let the fuzzy number ˜AF(U), ˜A=(a,b,α,β) be the number of trapezoidal fuzzy numbers on the interval [a,b], let α be the left width of the fuzzy number, and let β be the right width of the fuzzy number. From this, we can deduce ˜A in the γ-horizontal intercept possibility mean of the following:

    M(˜A)=12(M(˜A)+M+(˜A))=10γ(a_(γ)+ˉa(γ))dγ=a+b2+βα6. (2.3)

    In this paper, we assume that the investment is carried out in a security market composed of n kinds of risky assets, and the returns of each asset are independent of each other. Here, ri denotes the return of the ith asset, xi represents the proportion of the investor's investment in the ith asset, X=(x1,x2,,xn) is the vector of risky assets to total assets, and the expected return of the portfolio is obtained as

    R=E(r1)x1+E(r2)x2++E(rn)xn=ni=1xiE(ri). (3.1)

    Considering transaction costs, the total transaction costs of the asset portfolio in period t are

    C=ni=1cixi,i=1,2,,n. (3.2)

    Based on this, the trapezoidal fuzzy number is introduced and the net gain in the fuzzy environment is obtained as

    M(r)=ni=1xiM(ri)ni=1cixi=ni=1xi(ai+bi2+(βiαi)6)ni=1cixi. (3.3)

    Variance is a measure of the difference between the source data and the expected value. The term "variance" was first coined by Ronald Fisher [39]. The difference in probability theory is used to measure the degree of deviation between a random variable and its mathematical expectation (i.e., the mean). The variance in statistics (sample variance) is the average of the squared values of the difference between each sample value and the mean of the total sample value. In many practical problems, it is of great significance to study variance, namely the degree of deviation. The probability variance of the returns based on the fuzzy number ri can be expressed as

    Var(ri)=10γ[ai(1γ)αiM(ri)2]+[bi+(1γ)βiM(ri)]2dγ=10γ[ai(1γ)αi(ai+bi2+(βiαi)6)]2dγ+10γ[bi+(1γ)βi(ai+bi2+(βiαi)6)]2dγ=(aibi)24(βiαi)236+β2i+α2i12=(aibi)24+(β2i+α2i+αiβi)18). (3.4)

    The probability variance (FV) of the returns of a portfolio r based on fuzzy numbers can be denoted as

    FV=Var(˜r)=Var(ni=1xi˜ri)=ni=1x2iVar(˜ri)+2ni=1ni<jxixjCov(˜ri,˜rj)=ni=1x2i[(aibi)24+(β2i+α2i+αiβi)18]+2ni=1ni<jxixj[(aibi)(ajbj)4+(βiβj+αiαj)18+(αiβj,αjβi)36]. (3.5)

    Semi-absolute deviation is a statistic used to measure the degree of dispersion between observations in a data set and their mean. The advantage is that it has less effect on outliers because it uses the median rather than the mean to measure dispersion. It is widely used in areas such as financial statistics to measure risk and volatility. The semi-absolute deviation (FSAD) of the portfolio based on the fuzzy number is

    FSAD=ω(˜r)=|min{0,ni=1xiri}|=|ni=1xiri|ni=1xiri2=12|ni=1xi(ai+bi2+(βiαi)6)|12ni=1xi(ai+bi2+(βiαi)6). (3.6)

    Let A be a fuzzy number, where μ(A) is an affiliation function, r represents a real number, and the plausibility function [40] of Ar is expressed as follows:

    Cr{Ar}=12[Pos{Ar}+Nec{Ar}], (3.7)
    Pos{Ar}=suptrμA(t), (3.8)
    Nec{Ar}=1supt>rμA(t). (3.9)

    The credibility measure is a self-pairing set function, i.e., Cr{Ar}=1Cr{A>r}, which describes the credibility of an event with respect to a fuzzy variable. Assuming that A represents the future return of a security, then Cr{A0.4}=0.95 implies that the level of confidence that the future returns are greater than or equal to 0.4 is 90%. Moreover, the Pos{} and Nec{} of the equation above are the probability and necessity measures of the credibility measure, respectively.

    For a trapezoidal fuzzy number ˜A=(a,b,α,β), the probability of a fuzzy event {Ar} is

    Cr{Ar}={0,raα,ra+α2α,aα<ra,12,a<rb,rb+β2β,b<rb+β,1,r>b+β. (3.10)

    To Make portfolio returns be independent of each other, ζ represents the fuzzy loss variable of a portfolio [41], and the risk confidence interval is ρ(0,1), then

    ζ=(x1r1+x2r2++xnrn)=ni=1xiri=(ni=1xiai,ni=1xibi,ni=1xiαi,ni=1xiβi), (3.11)

    VaR is the maximum possible loss of a financial asset (or portfolio of securities) over a specified period of time in the future at a certain level of confidence. According to the equations above, the fuzzy value-at-risk FVaR of ζ in the 1ρ confidence interval [41] is

    FVaR1ρ=sup{λ|Cr(ζλ)ρ},ρ(0,1). (3.12)

    From the upper equation, the maximum loss of investment at a confidence level of 1ρ is λ.

    In addition to Eq (3.12), for a trapezoidal fuzzy variable in a fuzzy environment, the corresponding value-at-risk FVaR [41] is

    FVaR={ni=1xi[(2ρ1)ai2ρbi],ρ0.5,ni=1xi[(2ρ2)αi(2ρ1)βi],ρ>0.5. (3.13)

    Similarly, by virtue of Eq (3.13), the fuzzy conditional value-at-risk FCVaR under ρ [42,43] is

    FCVaR1ρ=E[x|M{ζx}ρ], (3.14)

    where M{ζx} is axiomatic uncertainty estimator, which represents the probability of the occurrence of uncertain event ζx. CVaR (conditional value at risk) is an investment risk measurement method developed on the basis of VaR (value at risk). CVaR refers to the average loss of a portfolio under the condition that the portfolio loss is greater than a given VaR value. Compared with VaR, CVaR satisfies sub-additivity, positive homogeneity, monotonicity and transfer invariance, so CVaR is a consistent risk measurement method.

    For trapezoidal fuzzy variables, the corresponding FCVaR [42,43] is

    FCVaR={(12ρ)[ai+bi+2ρ(biai)]+αi+βi4(1ρ),ρ0.5,(1ρ)αi+ρβi,ρ>0.5. (3.15)

    Considering the cardinality constraint in the portfolio, the asset holdings for portfolio selection can be shown as follows:

    zi={1,holdingassetsi,0,else. (3.16)

    This equation suggests that when zi=1, asset i is held, and when zi=0, asset i is not held. Assuming a maximum limit of K on the number of assets in a portfolio, there is a cardinality constraint as follows:

    ni=1ziK. (3.17)

    From formula above, the threshold constraint for the portfolio is

    lizixiμizi. (3.18)

    In investment processes, it is generally assumed the sum of investment ratios on assets is 1, i.e.,

    ni=1xi=1. (3.19)

    Building on Eqs (3.1)–(3.19), we construct the following four fractional planning portfolio selection models, M1, M2, M3, and M4, which adopt fuzzy likelihood variance (FV), fuzzy semi-absolute deviation (FSAD), fuzzy value-at-risk (FVaR), and fuzzy conditional value-at-risk (FCVaR) as risk measures, respectively. The advantages of introducing fractional programming are twofold: (1) it simplifies the complexity of the problem by making it a single-objective problem instead of a dual-objective one; (2) it seeks to minimize the risk and maximize the benefit when optimising the risk and benefit compared with methods that introduce pessimistic coefficients, and treats both objectives in the same order, without prioritisation.

    (1) A cardinality constrained fractional planning portfolio selection model M1 with FV as the risk measure:

    M1:{minFVM(r)subjecttoni=1ziKzi{0,1},i=1,2,,n.lizixiμizi,i=1,2,,n.ni=1xi=1. (3.20)

    Equation (3.20) represents a cardinality constraint fractional planning portfolio selection model M1 with variance as the numerator and returns as the denominator of the objective function. The returns and variances are calculated according to Eqs (3.3) and (3.5), respectively. The first constraint indicates that the returns cannot be negative; the second constraint means the number of assets in portfolio must be less than or equal to a pre-determined K; the third constraint represents a portfolio's holdings of an asset as a 0-1 vector; the fourth constraint is a proportional limit on the assets i that can be invested, i.e., a boundary constraint, requiring the proportion of funds invested in asset i to be between 0liμi1; the fifth constraint means the sum of investment proportions is 1.

    (2) A cardinality constrained fractional planning portfolio selection model M2 with FSAD as the risk measure:

    M2:{minFSADM(r)subjecttoni=1ziKzi{0,1},i=1,2,,n.lizixiμizi,i=1,2,,n.ni=1xi=1. (3.21)

    Equation (3.21) represents a fractional programming portfolio selection model M2 with fuzzy semi-absolute deviation as the numerator and returns as the denominator of the objective function. The returns and variances are calculated according to Eqs (3.3) and (3.6), respectively. The constraints in the model and their meanings are same as the M1 model.

    (3) A cardinality constrained fractional planning portfolio selection model M3 with FVaR as the risk measure:

    M3:{minFVaRM(r)subjecttoni=1ziKzi{0,1},i=1,2,,n.lizixiμizi,i=1,2,,n.ni=1xi=1. (3.22)

    Equation (3.22) represents a fractional programming portfolio selection model M3 with fuzzy value-at-risk as numerator and returns as the denominator of the objective function. The returns and variances are calculated according to Eqs (3.3) and (3.13), respectively. Since the fuzzy value-at-risk of this model is calculated differently at different confidence levels ρ, it should be discussed separately when simulating investments at different confidence levels. Similarly, the constraints in this model and what they represents are also same as in M1.

    (4) A cardinality constrained fractional planning portfolio selection model M4 with FCVaR as the risk measure:

    M4:{minFCVaRM(r)subjecttoni=1ziKzi{0,1},i=1,2,,n.lizixiμizi,i=1,2,,n.ni=1xi=1. (3.23)

    Equation (3.23) represents a fractional programming portfolio selection model M4 with fuzzy conditional value-at-risk as the numerator and returns as the denominator of the objective function. The returns and variances are calculated according to Eqs (3.3) and (3.15), respectively. Since the fuzzy conditional value-at-risk of this model is calculated differently at different confidence levels ρ, it should be discussed separately when simulating investments at different confidence levels. Similarly, the constraints in this model and what they represents are same as in M1.

    In this part, we go over the Markowitz mean–variance model's solution with a cardinality constraints and fractional programming as additions. The optimization issue is transformed into a 0-1 mixed integer programming problem by the addition of the cardinality constraints. The suggested hybrid heuristic algorithm with internal and external double cycles (IEDCHA) method consists of two sections and uses two optimisation techniques to tackle the issue. The cardinality constraint is used by the genetic algorithm (GA) as an evaluation indication in the first step of the hybrid IEDCHA method to discover viable spots. In light of this, the second stage of the hybrid IEDCHA algorithm uses the differential evolutionary (DE) method to minimize the objective function.

    Natural selection and population genetic dynamics are the foundation of the genetic algorithm (GA), a computerized stochastic search and optimization tool. It operates according to natural genetics' chromosomal processing and evolutionary principles. At the start of a GA, a set of initial solutions is generated randomly. These initial solutions are then assessed using the fitness function, which produces a fitness value. Using this fitness value, certain individuals are chosen to produce the following generation. The process of selection adheres to the adage "survival of the fittest". The chosen individuals are then united again by a crossover and mutation operation, or j, to create c, a new generation, which improves on the previous generation by inheriting some of its best traits. Therefore, a genetic algorithm may be seen as initial evolutionary process of a population of feasible solutions.

    The differential evolutionary (DE) algorithm is a population-based, global optimization method that is based on the principle of "survival of the fittest", which may be approximated by the impacts of heredity, variation, and selection in nature, which drive organisms to evolve from lower to higher levels. This algorithm keeps the population-based global search method, unlike evolutionary algorithms. This method decreases the complexity of the operation by using a real number encoding, a straightforward variation operation based on difference, and a one-to-one competitive survival strategy. Significantly, the differential evolution algorithm's special memory capability enables it to constantly watch the current search environment and adjust its search strategy without using problem-specific knowledge, resulting in significant convergence and resilience.

    Through relevant research, this paper summarizes the characteristics of genetic algorithms and differential evolution algorithms as follows:

    (1) The genetic algorithm is proficient in global searches, allowing it to explore wider regions within the search space; however, it may fall into local optima due to excessive selection pressure. In contrast, the differential evolution algorithm exhibits strong local search capabilities and fast convergence, enabling it to refine solutions more effectively through optimization in the local neighborhood.

    (2) The genetic algorithm can lead to a reduction in population diversity during the selection and crossover processes, which may negatively impact its search effectiveness. Conversely, the differential evolution algorithm introduces new solutions through differential operations, effectively enhancing population diversity and mitigating the risk of premature convergence.

    (3) The parameters of the genetic algorithm have a significant influence on the optimization results, while the differential evolution algorithm has fewer parameters that are easier to adjust, facilitating a more flexible optimization process.

    According to the aforementioned characteristics, the combination of the two algorithms allows for broad exploration while achieving rapid convergence, thereby enhancing overall search efficiency. By integrating the two, the diversity provided by the genetic algorithm, along with the efficient refinement of the differential evolution algorithm, effectively maintains population diversity while improving the solution's quality. In this combined approach, the flexibility of differential evolution's parameters can be leveraged to optimize the performance of the genetic algorithm. This complementary nature of the parameters enables greater adaptability in various problem environments, leading to improved performance.

    The integration of genetic algorithms and differential evolution algorithms can create a more robust and flexible optimization framework, where both algorithms complement each other. This synergy allows for the full utilization of their respective strengths when tackling complex problems, resulting in superior solutions and enhanced overall optimization capability. Although this setup may increase time complexity, the improved results justify the additional time investment.

    The dual-loop processing mechanism designed in this algorithm combines the advantages of genetic algorithms and differential evolution algorithms, creating a more robust and flexible optimization framework where both approaches complement each other. The outer loop first addresses the cardinality constraints within the model to obtain a unit matrix Z that satisfies these constraints. The inner loop then builds upon Z by incorporating the constraint lizixiμizi to generate an initial population X that meets both the cardinality and threshold constraints. Subsequently, differential evolution operations are applied to derive the optimal solution that satisfies all constraints. Throughout this process, the outer loop serves as the preliminary constraint processing step, while the inner loop represents the primary computation phase, ultimately producing the optimal solution.

    (1) Chromosome coding. An N-dimensional vector is randomly generated using binary coding. Each chromosome is adopted as a 0-1 vector to represent the investor's strategy of investing or not investing in risky assets.

    (2) Fitness function. The fitness function is a measure of the degree of dominance of an individual in the survival of a population. It is mainly used to determine the fitness of an individual through individual characteristics, and is used to differentiate between "good" and "bad" individuals. The outer loop's fitness function is

    F1=ni=1ziK. (4.1)

    The four intra-model circularity fitness functions are

    minF2=FVM(r),minF3=FSADM(r),minF4=FVaRM(r),minF5=FCVaRM(r). (4.2)

    (3) GA selection operator. The probability that an individual i is selected is pi(x)=Fi(x)Fi(x), where Fi is the fitness value of individual i and Fi(x) is the sum of the fitness values of all individuals in the population.

    (4) GA crossover operator. Two individuals are chosen at random, to swap combinations, to pass the parent's superior genes to next generation, and produce a new superior individual. The kth chromosome ak crosses with the lth chromosome al at position j as follows.

    akj=balj+(1b)akj,alj=bakj+(1b)alj. (4.3)

    where b is a random number in the interval [0, 1].

    (5) GA mutation operator. The number of variant genes is generated with a certain probability, and individuals from the population are selected for mutation to produce better individuals by a random method. The mutation operation for the j th gene aij of the ith individual is

    aij={aij+(aijamax)f(g),r0.5aij+(aminaij)f(g),r0.5. (4.4)

    where amax is upper limit of aij, amin is lower limit of aij, f(g)=r2(1gGmax)2, r2 is a random number, g is the current number of iterations, Gmax is the maximum number of iterations, and r is a random number of [0,1].

    (6) DE algorithm mutation operator. The DE/rand/1 tactics is used to perform mutation as follows. For the current individual vector X, this operator first selects three randomly different individual vectors from the parent as Xr1, Xr2, Xr3, and then performs a difference operation on Xr2 and Xr3 to obtain the difference vector; finally, the difference vector is scaled by the scaling factor F and summed with the base vector Xr1 to obtain a new vector, denoted as the variational individual. Finally, the difference vector is scaled by the scaling factor F and summed with the base vector Xr1 to obtain a new vector, denoted the variational individual vector Vi. The equation is as follows:

    Vi,G=Xr1,G+F(Xr2,GXr3,G), (4.5)

    where the initial scaling factor F0=0.5, and the scaling factor F is calculated by

    F=F02exp(1Gmax/(Gmax+1G)). (4.6)

    (7) Non-feasible solution treatment. If X=(X1,X2,,Xn) is a non-feasible solution, there are infeasible elements in X. If Xi is not in the feasible domain [lizi,μizi], we will correct Xi by the following formula:

    Xi={lizi,Xiliziμizi,Xiμizi. (4.7)

    (8) DE algorithm crossover operator. First, the crossover operator generates a random dimension identifier jrand to ensure that at least one dimension of the final test individual is from the variant, thus avoiding identity with current individual and ensuring population diversity. Otherwise, the dimension of the test individual is from the current individual. The formula is given below.

    μji,G={Vji,G,ifrandj(0,1)CRorj=jrandxji,G,else. (4.8)

    (9) DE algorithm selection operator. The selection operator serves to guide the evolution of the population, mainly through the evaluation of fitness values. For each current individual vector xi,G, a corresponding test individual vector U is obtained by the previous variation and crossover operations. Then the selection operator uses one-to-one selection to compare xi,G with U and select the one with the best fitness value as the next-generation population. The exact formula is illustrated below.

    Xi={Ui,iff(Ui)f(Xi)Xi,else. (4.9)

    Based on a several basic operations as described above, we design an algorithm as follows. The pseudo-code for the inner loop algorithm is shown in Algorithm 1, the pseudo-code for the outer loop algorithm is shown in Algorithm 2, and the overall pseudo-code for the proposed algorithm is shown in Algorithm 3. In addition, please refer to Figure 2 for the flowchart of the proposed algorithm.

    Algorithm 1 Pseudo-code of the outer loop genetic algorithm
    Input: Mutation probability pm=0.01, crossover probability pc=0.7, population size NP=100, individual dimensions NGA=30;
    Output: Feasible solution Z
    1: Generate the initial population Z by (1) in Section 4.2;
    2: for i=110000 do
    3:   while F1>0 do
    4:     Update individuals in line with (3), (4), and (5) from Section 4.2;
    5:   end while
    6: end for
    7: return Feasible solution Z

    Algorithm 2 Pseudo-code of the inner loop differential evolutionary algorithm
    Input: Mutation probability pm=0.01, crossover probability pc=0.7, population size NP=30, individual dimensions NGA=30;
    Output: X,F
    1: Generate the initial population X by
              X(i)=xmin(i)+(xmax(i)xmin(i)).rand,
    where xmin=lizi,xmax=μizi;
    2: Normalize of the initial population X by
                X(i)=xix1+x2+x3++xn
    3: for i=1300 do
    4:   Update individuals in line with (6), (7), (8), and (9) from Section 4.2;
    5: end for
    6: return X,F
    Annotation 1 X correspond to the portfolio strategies.
    Annotation 2 F represents the models F1, F2, F3, F4; these four models were calculated separately.

    Algorithm 3 Pseudo-code of the main program IEDCHA
    1: Initialize the optimal solution.
    2: for i=130 do
    3:   Execute Algorithm 1
    4:   for i=110 do
    5:     Execute Algorithm 2
    6:   end for
    7: end for
    8: return Optimal solution.

    Figure 2.  The flow chart of the proposed IEDCHA.

    In this study, we combine genetic algorithms with differential evolutionary algorithms to solve the models M1, M2, M3, and M4. In this paper, all stocks in the SSE-50 index are selected for the study. However, since the 50 stocks in the SSE-50 index are adjusted every six months, the fund will also adjust its position, so it is somewhat bearish for the stocks that are moved out and somewhat positive for the stocks that are moved in. According to the above, since the 50 stocks in the SSE-50 index are dynamically adjusted, we have taken into account the concept of stability of the sample, and in order to ensure that the results are more informative, we have screened the 50 stocks in the SSE-50 index by removing the stocks with obvious problems, few selections, missing data and inconsistent data, and those stocks that were relatively stable (no obvious problems, consistently selected, and with complete and consistent data) in the SSE-50 index's dynamically adjusted list were retained, resulting in a set of 30 alternative stocks with stable performance. The data of all trading days of these stocks from January 2017 to January 2020 were selected as raw data for numerical experiments. The data were obtained from https://tr.investing.com/. The selected sample covers a wide range of sectors with different income characteristics, satisfying decentralization, which can effectively reduce the unsystematic risk in investments and better match the choice of investors' wishes, as well as adding meaning to the empirical study of the portfolio model.

    The experiment consists of five main parts. (1) To analyze the portfolio strategies of each of four models in the framework of designed algorithm; (2)to analyze the portfolio strategy under upstream and downstream constraints at different investment ratios, with the aim of examining the impact of various parameters of the upper and lower bounds of investment ratios on the portfolio; (3) to compare the numerical results under different transaction cost rates to illustrate the impact of adjusting the transaction cost parameters on the numerical outcomes; (4) to analyze the investment returns and risks of different models with different cardinality constraints by adjusting the number of investable assets, and to compare the performance of four models in terms of returns and risks, in order to reflect the impact of base constraints on investment; and (5) to compare the numerical results of different algorithms for solving the fours models to verify the effectiveness of the IEDCHA proposed in this paper. All experiments were performed in MATLAB2016a with [Intel(R) Core(TM) i7-10700 CPU @ 2.90 GHz 2.90 GHz] in Windows 10.

    The returns of the stocks are trapezoidal fuzzy numbers, and a method of objective fuzzy frequency statistics was adopted to approximate the trapezoidal fuzzy number of returns. The fuzzy return distributions of the 30 sample stocks obtained according to this method are shown in Table 1.

    Table 1.  Fuzzy yield distribution of 30 sample stocks.
    Code Distribution Code Distribution
    600031 (0.0076, 0.0094, 0.0211, 0.0346) 601288 (0.0048, 0.0063, 0.0163, 0.0293)
    600036 (0.0052, 0.0099, 0.0196, 0.0286) 601318 (0.0007, 0.0138, 0.0103, 0.0366)
    600048 (0.0013, 0.0193, 0.0146, 0.0459) 601328 (0.0003, 0.0096, 0.0069, 0.0248)
    600104 (0.0001, 0.0140, 0.0232, 0.0240) 601336 (0.0072, 0.0119, 0.0265, 0.0430)
    600196 (0.0037, 0.0152, 0.0282, 0.0351) 601398 (0.0015, 0.0111, 0.0249, 0.0264)
    600276 (0.0027, 0.0184, 0.0233, 0.0295) 601601 (0.0022, 0.0144, 0.0272, 0.0324)
    600519 (0.0042, 0.0124, 0.0227, 0.0313) 601628 (0.0018, 0.0155, 0.0282, 0.0300)
    600690 (0.0069, 0.0099, 0.0223, 0.0355) 601668 (0.0031, 0.0115, 0.0235, 0.0289)
    600703 (0.0095, 0.0127, 0.0289, 0.0474) 601688 (0.0054, 0.0104, 0.0173, 0.0406)
    600837 (0.0058, 0.0106, 0.0265, 0.0403) 601766 (0.0006, 0.0156, 0.0142, 0.0400)
    601111 (0.0018, 0.0198, 0.0375, 0.0410) 601800 (0.0056, 0.0114, 0.0209, 0.0450)
    601166 (0.0015, 0.0115, 0.0223, 0.0237) 601818 (0.0023, 0.0094, 0.0125, 0.0325)
    601186 (0.0047, 0.0120, 0.0285, 0.0382) 601857 (0.0010, 0.0124, 0.0252, 0.0257)
    601211 (0.0019, 0.0136, 0.0130, 0.0401) 601888 (0.0097, 0.0108, 0.0264, 0.0466)
    601229 (0.0055, 0.0069, 0.0166, 0.0277) 601939 (0.0074, 0.0119, 0.0219, 0.0466)

     | Show Table
    DownLoad: CSV

    The previous and subsequent limit parameters of investment ratios were adjusted to simulate investments in order to analyze the impact of different upper and lower bounds on the four model portfolios. Subsequently, the numerical results were analyzed. By comparing the simulated investments' numerical results of the four models under varying transaction cost rates, this demonstrates how adjustments in cost rate parameters influence the outcomes.

    Tables 24 shows the investment results of different models under different parameters. The numerical results of IEDCHA using four different risk measurement models to simulate investment under various transaction cost rates are presented in Table 2. These models consider constraints such as base constraints, threshold constraints, and transaction costs. It is evident from the results that the optimal performance of all four models is observed at a cost rate of 0.005. Table 3 illustrates the comparison of the numerical results obtained by IEDCHA for the four models with different lower limits, while keeping the upper limit fixed at 0.5. It can be observed from the results that the optimal performance of all four models is achieved when the lower limit is set to 0.005. Table 4 presents a comparison of the numerical results obtained by IEDCHA for the four models with different upper limits, while maintaining a lower limit of 0.005. It can be seen from these results that the optimal performance of all four models is observed when the upper limit is set to 0.5. Note that there are negative values in the results, which are due to both the formulas used for the different risk measures and the historical data used, so it is normal here.

    Table 2.  The numerical results of various models compared under varying transaction cost rates.
    Cost Model Risk Return Fitness
    0 M1 0.0001325 0.0131 0.0121
    M2 0.0038000 1.0136 0.0036
    M3 0.0000000 0.0102 0.0342
    M4 0.0004106 0.0206 0.0190
    0.003 M1 0.0013250 0.0234 0.0065
    M2 0.0038000 1.0240 0.0037
    M3 0.0008091 0.0206 0.0172
    M4 0.0008192 0.0236 0.0180
    0.005 M1 0.0012150 0.0303 0.0049
    M2 0.0038000 1.0309 0.0035
    M3 0.0000000 0.0275 0.0137
    M4 0.0008091 0.0205 0.0168

     | Show Table
    DownLoad: CSV
    Table 3.  Comparison of numerical results of different models with different lower limits (u = 0.5).
    Lower limits Model Risk Return Fitness
    0.002 M1 0.0001325 0.0234 0.0065
    M2 0.0039000 1.0241 0.0038
    M3 0.0000000 0.0275 0.0137
    M4 0.0008091 0.0206 0.0180
    0.005 M1 0.0000752 0.0186 0.0039
    M2 0.0037000 1.0239 0.0032
    M3 0.0000000 0.0189 0.0342
    M4 0.0004106 0.0106 0.0180
    0.01 M1 0.00008850 0.0186 0.0050
    M2 0.0038000 1.0240 0.0036
    M3 0.0004226 0.0211 0.0107
    M4 0.0008193 0.0224 0.0193

     | Show Table
    DownLoad: CSV
    Table 4.  Comparison of numerical results of different models with different upper limits (l = 0.005).
    Upper limits Model Risk Return Fitness
    0.2 M1 0.0000857 0.0197 0.0048
    M2 0.0038100 1.0238 0.0031
    M3 0.0009930 0.0213 0.0235
    M4 0.0009310 0.0226 0.0243
    0.4 M1 0.0001025 0.0189 0.0049
    M2 0.0038000 1.0240 0.0035
    M3 0.0004778 0.0205 0.0041
    M4 0.0004638 0.0215 0.0037
    0.5 M1 0.0000780 0.0186 0.0039
    M2 0.0038000 1.0243 0.0036
    M3 0.0004107 0.0206 0.0180
    M4 0.0004216 0.0238 0.0186

     | Show Table
    DownLoad: CSV

    In a follow-up experiment, we labeled these 30 stocks as Stock 1, Stock 2, ..., Stock 30 in order. To verify the effect of different cardinality constraints on the portfolio results, this four models were solved by IEDCHA, and the portfolio strategies for different models with different cardinality constraints are shown in Tables 59.

    Table 5.  Portfolio strategies of different models with the cardinality constraint K = 10.
    Model Stock 1 Stock 2 Stock 3 Stock 4 Stock 5
    M1 0.0000 0.1857 0.1832 0.0000 0.0000
    M2 0.1893 0.0688 0.1248 0.0764 0.0000
    M3 0.0000 0.0909 0.0000 0.0000 0.0909
    M4 0.1087 0.0000 0.0000 0.0000 0.0566
    Model Stock 6 Stock 7 Stock 8 Stock 9 Stock 10
    M1 0.2295 0.0574 0.0000 0.0000 0.0000
    M2 0.0000 0.0000 0.0000 0.0403 0.1749
    M3 0.0000 0.0000 0.0000 0.0000 0.0000
    M4 0.0000 0.0000 0.0000 0.0000 0.0566
    Model Stock 11 Stock 12 Stock 13 Stock 14 Stock 15
    M1 0.0000 0.0000 0.0000 0.0574 0.0574
    M2 0.0000 0.0000 0.0000 0.0000 0.0000
    M3 0.0000 0.0000 0.0909 0.0000 0.0000
    M4 0.1285 0.0000 0.0000 0.0000 0.0566
    Model Stock 16 Stock 17 Stock 18 Stock 19 Stock 20
    M1 0.0000 0.0574 0.0000 0.0000 0.0000
    M2 0.0000 0.0449 0.0000 0.0000 0.0000
    M3 0.0000 0.0000 0.0000 0.0000 0.0000
    M4 0.0000 0.0000 0.0000 0.0000 0.0000
    Model Stock 21 Stock 22 Stock 23 Stock 24 Stock 25
    M1 0.0000 0.0574 0.0000 0.0000 0.0574
    M2 0.0000 0.0000 0.0000 0.0000 0.0000
    M3 0.0000 0.0909 0.0000 0.0000 0.0909
    M4 0.1651 0.0000 0.1356 0.1650 0.0000
    Model Stock 26 Stock 27 Stock 28 Stock 29 Stock 30
    M1 0.0000 0.0000 0.0574 0.0000 0.0000
    M2 0.0000 0.0000 0.1188 0.1240 0.0380
    M3 0.0000 0.0909 0.0909 0.0000 0.3636
    M4 0.1271 0.0000 0.0000 0.0000 0.0000

     | Show Table
    DownLoad: CSV
    Table 6.  Portfolio strategies of different models with the cardinality constraint K = 15.
    Model Stock 1 Stock 2 Stock 3 Stock 4 Stock 5
    M1 0.0000 0.1373 0.1725 0.1725 0.0000
    M2 0.1626 0.0000 0.0642 0.0000 0.0000
    M3 0.0000 0.0000 0.0000 0.0000 0.0909
    M4 0.0635 0.0000 0.1688 0.0000 0.0000
    Model Stock 6 Stock 7 Stock 8 Stock 9 Stock 10
    M1 0.0431 0.0000 0.0000 0.0431 0.0431
    M2 0.0288 0.0000 0.0674 0.0000 0.0000
    M3 0.0909 0.0000 0.0000 0.0000 0.0909
    M4 0.0000 0.0635 0.0635 0.1103 0.0000
    Model Stock 11 Stock 12 Stock 13 Stock 14 Stock 15
    M1 0.0000 0.0431 0.0431 0.0431 0.0000
    M2 0.1486 0.0000 0.0000 0.0802 0.0000
    M3 0.0000 0.0000 0.0000 0.0000 0.0909
    M4 0.0000 0.0000 0.0000 0.0635 0.1494
    Model Stock 16 Stock 17 Stock 18 Stock 19 Stock 20
    M1 0.0000 0.0000 0.0431 0.0000 0.0431
    M2 0.0524 0.0000 0.0000 0.0406 0.0000
    M3 0.0000 0.0000 0.0000 0.0000 0.0909
    M4 0.0635 0.0000 0.0000 0.0635 0.0000
    Model Stock 21 Stock 22 Stock 23 Stock 24 Stock 25
    M1 0.0000 0.0431 0.0000 0.0000 0.0431
    M2 0.0000 0.0000 0.1065 0.0000 0.0000
    M3 0.0909 0.0000 0.0000 0.0000 0.0000
    M4 0.0635 0.0000 0.0635 0.0635 0.0000
    Model Stock 26 Stock 27 Stock 28 Stock 29 Stock 30
    M1 0.0000 0.0431 0.0000 0.0000 0.0431
    M2 0.0620 0.1005 0.0862 0.0000 0.0000
    M3 0.0000 0.0000 0.0909 0.0000 0.3636
    M4 0.0000 0.0000 0.0000 0.0000 0.0000

     | Show Table
    DownLoad: CSV
    Table 7.  Portfolio strategies of different models when the cardinality constraint is K = 20.
    Model Stock 1 Stock 2 Stock 3 Stock 4 Stock 5
    M1 0.0000 0.0000 0.0362 0.1449 0.1216
    M2 0.1519 0.0507 0.0000 0.1443 0.0815
    M3 0.0000 0.0000 0.0000 0.1304 0.0000
    M4 0.0458 0.0761 0.0458 0.0458 0.0458
    Model Stock 6 Stock 7 Stock 8 Stock 9 Stock 10
    M1 0.0362 0.0362 0.1175 0.0362 0.0362
    M2 0.0000 0.0754 0.0000 0.0692 0.1178
    M3 0.0000 0.0000 0.0870 0.0000 0.0000
    M4 0.0000 0.0458 0.0458 0.0458 0.1122
    Model Stock 11 Stock 12 Stock 13 Stock 14 Stock 15
    M1 0.0362 0.0362 0.0362 0.0000 0.0362
    M2 0.0000 0.0000 0.0000 0.0000 0.0000
    M3 0.0000 0.0000 0.0000 0.0870 0.0000
    M4 0.0458 0.0575 0.0000 0.0458 0.0000
    Model Stock 16 Stock 17 Stock 18 Stock 19 Stock 20
    M1 0.0000 0.0362 0.0000 0.0000 0.0362
    M2 0.0322 0.0000 0.0000 0.0000 0.0321
    M3 0.0000 0.0000 0.0000 0.0000 0.0870
    M4 0.0000 0.0000 0.0000 0.0000 0.0458
    Model Stock 21 Stock 22 Stock 23 Stock 24 Stock 25
    M1 0.0362 0.0000 0.0000 0.0362 0.0000
    M2 0.0000 0.0000 0.0343 0.0000 0.0000
    M3 0.0000 0.0870 0.0870 0.0000 0.0000
    M4 0.0000 0.0817 0.0000 0.0458 0.0458
    Model Stock 26 Stock 27 Stock 28 Stock 29 Stock 30
    M1 0.0362 0.0000 0.0362 0.0362 0.0362
    M2 0.0406 0.0000 0.0699 0.0999 0.0000
    M3 0.0000 0.0000 0.0870 0.0000 0.3478
    M4 0.0000 0.0774 0.0458 0.0000 0.0000

     | Show Table
    DownLoad: CSV
    Table 8.  Portfolio strategies of different models when the cardinality constraint is K = 25.
    Model Stock 1 Stock 2 Stock 3 Stock 4 Stock 5
    M1 0.0326 0.1199 0.0300 0.0300 0.1199
    M2 0.1477 0.1028 0.0000 0.1347 0.1308
    M3 0.0000 0.0867 0.0000 0.0000 0.0867
    M4 0.0455 0.0000 0.0455 0.0455 0.0455
    Model Stock 6 Stock 7 Stock 8 Stock 9 Stock 10
    M1 0.0300 0.0300 0.0803 0.0300 0.0300
    M2 0.0000 0.0636 0.0000 0.0312 0.0303
    M3 0.0000 0.0000 0.0000 0.1496 0.0867
    M4 0.0455 0.0000 0.0455 0.0952 0.0455
    Model Stock 11 Stock 12 Stock 13 Stock 14 Stock 15
    M1 0.0300 0.0300 0.0000 0.0000 0.0300
    M2 0.0000 0.0000 0.0000 0.0000 0.0000
    M3 0.0000 0.0000 0.0867 0.0000 0.0867
    M4 0.0000 0.0730 0.0000 0.1304 0.0000
    Model Stock 16 Stock 17 Stock 18 Stock 19 Stock 20
    M1 0.0300 0.0544 0.0300 0.0000 0.0533
    M2 0.0640 0.0000 0.0000 0.0000 0.0557
    M3 0.0000 0.0000 0.0000 0.0000 0.0867
    M4 0.0000 0.0000 0.0000 0.0000 0.0000
    Model Stock 21 Stock 22 Stock 23 Stock 24 Stock 25
    M1 0.0000 0.0300 0.0000 0.0300 0.0300
    M2 0.0000 0.0000 0.0224 0.0000 0.0000
    M3 0.0000 0.0000 0.0000 0.0000 0.0000
    M4 0.0000 0.0000 0.0455 0.0642 0.0455
    Model Stock 26 Stock 27 Stock 28 Stock 29 Stock 30
    M1 0.0300 0.0300 0.0300 0.0000 0.0300
    M2 0.0480 0.0000 0.0954 0.0735 0.0000
    M3 0.0000 0.0000 0.0000 0.0000 0.3302
    M4 0.0455 0.0455 0.0455 0.0455 0.0455

     | Show Table
    DownLoad: CSV
    Table 9.  Portfolio strategies of different models when the cardinality constraint is K = 30.
    Model Stock 1 Stock 2 Stock 3 Stock 4 Stock 5
    M1 0.0326 0.1199 0.0300 0.0300 0.1199
    M2 0.1477 0.1028 0.0000 0.1347 0.1308
    M3 0.0000 0.0867 0.0000 0.0000 0.0867
    M4 0.0455 0.0000 0.0455 0.0455 0.0455
    Model Stock 6 Stock 7 Stock 8 Stock 9 Stock 10
    M1 0.0300 0.0300 0.0803 0.0300 0.0300
    M2 0.0000 0.0636 0.0000 0.0312 0.0303
    M3 0.0000 0.0000 0.0000 0.1496 0.0867
    M4 0.0455 0.0000 0.0455 0.0952 0.0455
    Model Stock 11 Stock 12 Stock 13 Stock 14 Stock 15
    M1 0.0300 0.0300 0.0000 0.0000 0.0300
    M2 0.0000 0.0000 0.0000 0.0000 0.0000
    M3 0.0000 0.0000 0.0867 0.0000 0.0867
    M4 0.0000 0.0730 0.0000 0.1304 0.0000
    Model Stock 16 Stock 17 Stock 18 Stock 19 Stock 20
    M1 0.0300 0.0544 0.0300 0.0000 0.0533
    M2 0.0640 0.0000 0.0000 0.0000 0.0557
    M3 0.0000 0.0000 0.0000 0.0000 0.0867
    M4 0.0000 0.0000 0.0000 0.0000 0.0000
    Model Stock 21 Stock 22 Stock 23 Stock 24 Stock 25
    M1 0.0000 0.0300 0.0000 0.0300 0.0300
    M2 0.0000 0.0000 0.0224 0.0000 0.0000
    M3 0.0000 0.0000 0.0000 0.0000 0.0000
    M4 0.0000 0.0000 0.0455 0.0642 0.0455
    Model Stock 26 Stock 27 Stock 28 Stock 29 Stock 30
    M1 0.0300 0.0300 0.0300 0.0000 0.0300
    M2 0.0480 0.0000 0.0954 0.0735 0.0000
    M3 0.0000 0.0000 0.0000 0.0000 0.3302
    M4 0.0455 0.0455 0.0455 0.0455 0.0455

     | Show Table
    DownLoad: CSV

    The portfolio strategies of these four models with a cardinality restriction of K=10 are shown in Table 5. The number of stocks in the M1 model portfolio is 10, and the proportional weighting of investment is focused on Stocks 2, 3, and 6, which are assigned higher proportional weights, indicating that these three stocks are more likely to generate higher returns than other stocks among the 30 assets. The number of stocks in the M2 model is 10, and the proportional weighting is concentrated on Stocks 1, 2, 3, 4, 9, 10, 17, 28, 29, and 30, with a higher proportional weighting on stocks 1, 3, 10, 28, and 29, indicating that among these 30 assets, the proportional weighting is higher than 1, 3, 10, 28, and 29. The higher weighting of Stocks 1, 3, 10, 28, and 29 indicates that, among the 30 assets, investing in these five stocks is more likely to yield high returns than other stocks. The number of stocks in the M3 portfolio is six, and the proportional weighting is mainly on Stocks 2, 5, 13, 22, 25, 27, 28, and 30. The higher weighting of Stock 30 indicates that, among the 30 assets, investing in this stock is more likely to yield high returns than other stocks. The number of stocks included in the M4 model is nine, and the proportional weighting is concentrated on Stocks 1, 5, 10, 11, 15, 21, 23, 24, and 26, with a higher weighting on Stocks 1, 11, 21, 23, 24, and 26. This indicates that investing in these six stocks is more likely to yield high returns than other stocks across the 30 assets. These four models allocate the highest number of investments to Stocks 2 and 28, followed by Stocks 1, 3, 5, 10, 15, 17, 22, 25, and 30 among the 30 stocks, and less to the rest.

    Table 6 depicts the portfolio strategies of these four models under the cardinality constraint K=15. From Table 3, we can know that the number of stocks in the portfolio of M1 is fifteen, and the proportional weighting is mainly on Stocks 2, 3, 4, 6, 9, 10, 12, 13, 14, 18 and 20, 22, 25, 27, and 30, with a higher proportional weighting for Stocks 2, 3 and 4, indicating that these three stocks are more likely to generate higher returns than other stocks across the 30 assets. The number of stocks in the M2 model is 12, and the proportional weights are concentrated in Stocks 1, 3, 6, 8, 11, 14, 16, 19, 23, 26, 27, and 28, with higher weights in Stocks 1, 11, 23, and 27. The higher weighting of Stocks 1, 11, 23, and 27 indicates that among these 30 assets, investing in these four stocks is more likely to yield high returns than other stocks. The number of stocks in the M3 model is seven, and the proportional weighting is concentrated on Stocks 6, 10, 15, 20, 28, and 30, with a higher weighting on Stock 30, indicating that this stock is more likely to generate higher returns than other stocks across the 30 assets. The number of stocks in the M4 model is 12, and the proportional weighting is mainly on Stocks 1, 3, 7, 8, 9, 14, 15, 16, 19, 21, 23, and 24, with higher weights on Stocks 3, 9, and 15, indicating that among the 30 assets, the proportional weighting is higher than the proportional weighting of Stock 30. These three stocks are more likely to generate higher returns than other stocks in these 30 asset classes. The four models allocate the highest number of investments to Stocks 3, 6, and 14, followed by Stocks 1, 8, 9, 10, 15, 16, 19, 20, 21, 23, 27, 28, and 30, and less to the rest of the 30 stocks.

    Table 7 displays the portfolio strategies of these four models under the cardinality constraint K=20. From above Table 4, we can find that the number of stocks included in the portfolio of M1 is twenty, and the proportional weighting is concentrated on Stocks 3 to 13 and 15, 17, 20, 21, 24, 26, and 28 to 30. The higher proportional weights for Stocks 4, 5, and 8 indicate that these three stocks are more likely to yield higher returns than other stocks across the 30 assets. The number of stocks in the M2 portfolio is thirteen and the proportional weights are concentrated in Stocks 1, 2, 4, 5, 7, 9, 10, 16, 20, 23, 26, 28, and 29, with higher weights in Stocks 1, 4, and 10. The higher weighting of Stock 1, Stock 4, and Stock 10 indicates that these three stocks have a higher probability of generating high returns compared with other stocks across the 30 assets. The number of stocks in the M3 portfolio is eight, and the proportional weighting is mainly on Stocks 4, 8, 14, 20, 22, 23, 28, and 30, with a higher proportional weighting on Stocks 4 and 30, suggesting that investing in these two stocks is more likely to yield higher returns than other stocks across the 30 assets. The higher weighting of Stock 4 and Stock 30 indicates that, among the 30 assets, investing in these two stocks is more likely to yield higher returns than the other stocks. The number of stocks in the M4 portfolio is eighteen, with the proportional weighting on Stocks 1 to 5, 7 to 12, 14, 20, 22, 24, 25, 27, and 28, with a higher proportional weighting on Stocks 2, 10, 22, and 27. All this indicates that investing in these four stocks is more likely to yield higher returns than the other stocks across the 30 assets. The four models allocate the highest number of investments to Stocks 4, 20, and 28, followed by Stocks 5, 7, 8, 9, and 10, and even fewer to the rest of the 30 stocks.

    Table 8 shows the portfolio strategies of the four models with the cardinality constraint K=25, from which we can see that the number of stocks included in portfolio of the M1 is twenty-four, with the proportional weighting concentrated on Stocks 1 to 12, 16 to 18, 20, 22, 24, 25, 26 to 28, and 30, with a higher proportional weighting for Stock 2 and Stock 5, indicating that these two stocks are more likely to generate higher returns than other stocks across the 30 assets. The number of stocks in the M2 is thirteen, and the proportional weighting is mainly on Stocks 1, 2, 4, 5, 7, 9, 10, 16, 20, 23, 26, 28, and 29, with a higher weighting on Stocks 1, 2, 4, and 5. The higher weighting of Stocks 1, 2, 4, and 5 indicates that among the 30 assets, investing in these four stocks is more likely to yield high returns than the other stocks. The number of stocks included in the M3 model is eight, and the proportional weighting is mainly on Stocks 2, 5, 9, 10, 13, 15, 20, and 30. The higher weighting of Stock 9 and Stock 30 indicates that, among the 30 assets, investing in these two stocks is more likely to yield higher returns than the other stocks. The number of stocks in the M4 is eighteen, and the proportional weighting is mainly on Stocks 1, 3 to 6, 8 to 10, 12, 14, and 23 to 30, with a higher weighting on Stocks 9 and 14, indicating a higher probability of high returns compared with the other stocks across this thirty assets, These two stocks are more likely to generate higher returns than the other stocks in the 30 assets. The four models allocate the highest number of investments to Stocks 5, 9, and 10, followed by Stocks 1, 2, 4, 20, 26, 28, and 30, and even less to the rest of the 30 stocks.

    It can be seen from Table 9 that with the cardinality constraint K=30, the investment results of the four models are the same as those when the cardinality constraint is K=25. This indicates that the investment strategy does not change after the number of investable stocks exceeds 25. That is, after the number of investments exceeds 25, adding new investments does not have a positive impact on the returns.

    From Tables 59, the M1 model invests the same amount of risky assets at different cardinality constraints and reaches the maximum limit; the M2 model invests all at K=10 and more at K=15, while the number of investments at K=20, K=25, and K=30 is the same and does not increase much compared with K=15. The number of investments for the M3 model increases incrementally for K=10, K=15, and K=20, and for K=25 and K=30, the number of investments is the same as for K=20, indicating that the optimal investment strategy for the M2 model has 13 assets after the cardinality constraint exceeds 20. The number of investments at K=25 and K=30 is the same as that at K=20, indicating that after cardinality constraint exceeds 20, the change in K has little effect on the behavior of investors using the M3 model for simulated investments, i.e, the optimal number of assets for values of K above 20 is 8; the M4 model has an increasing number of investments in risky assets at K=10, K=15, and K=20, with K=15 and K=20. The number of investments at K=25 and K=30 is the same as the number of investments at K=20, suggesting that the optimal number of assets is 18 after the cardinality constraint exceeds 20, and that increasing the number of investments in risky assets has little positive effect on investors and may lead to capital losses due to poor management.

    Table 10 and Figure 3 all displays the values of risk, return, and fitness function for four models with varying cardinality constraints. For cardinality K=10 to K=30, the M3 model has the lowest risk, followed by M1, M2, and M4. Otherwise, M2 has the highest return, followed by M4 in second place, M3 in third, and M1 in fourth place. For K=10 and K=20, the M3 model has the lowest adaption index, followed by M1 in second place, M2 in third place, and M4 in fourth place. For K=15, K=25, and K=30, the M3 model has the smallest fitness, M2 has the second largest, M1 has larger fitness, and M4 has the largest fitness. The M1 model is less risky and yields the least returns, the M2 model is less risky and yields the most returns, the M3 model is the least risky but yields less returns, and the M4 model is the most risky but yields more returns. The M3 model is suitable for risk-conservative investors in the portfolio strategy analysis, the M4 model is suitable for risk-seeking investors in the portfolio analysis, and the M1 and M2 models are suitable for risk-neutral investors in the portfolio analysis. Notice that the different line segments in Figure 3 are too close together, which is caused by the small gap between the data, but this does not affect understanding.

    Table 10.  Comparison of numerical results under different cardinality constraints.
    Cardinality Model Risk Return Fitness
    K=10 M1 0.0000011 0.0068 0.0002
    M2 0.0004013 1.0082 0.0004
    M3 0.0132000 0.0158 0.8354
    M4 0.0380000 0.0196 1.9388
    K=15 M1 0.0000370 0.0075 0.0049
    M2 0.0004892 1.0077 0.0005
    M3 0.0030000 0.0142 0.2113
    M4 0.0017000 0.0227 0.0749
    K=20 M1 0.0000035 0.0072 0.0005
    M2 0.0005928 1.0071 0.0068
    M3 0.0040000 0.0137 0.2920
    M4 0.0431000 0.0190 2.2684
    K=25 M1 0.0000053 0.0071 0.0008
    M2 0.0006335 1.0066 0.0006
    M3 0.0034000 0.0161 0.2112
    M4 0.0382000 0.0222 1.7171
    K=30 M1 0.0000053 0.0071 0.0008
    M2 0.0006335 1.0066 0.0006
    M3 0.0034000 0.0161 0.2112
    M4 0.0382000 0.0222 1.7171

     | Show Table
    DownLoad: CSV
    Figure 3.  Comparison of the numerical results of four models under different cardinality constraints.

    Finally, the effectiveness of the IEDCHA method is validated by comparing the numerical results obtained from four different risk measurement models solved using various algorithms. The parameters of the comparison algorithm are set in Table 11. The '' in Table 11 indicates that the parameter is not used by the algorithm.

    Table 11.  The parameter settings of the compared algorithm.
    Parameters IEDCHA GA[46] DE [47] PSO[45] SSA[44]
    Maximum generation 300 300 300 300 300
    Population size 50 50 50 50 50
    Dimension 30 30 30 30 30
    Inertia weight 0.5
    Self-perception factor 1.5
    Social cognitive factor 1.5
    Crossover rate 0.9 0.7 0.5
    Mutation rate 0.5 0.01 0.5
    Transaction cost rate 0.003 0.003 0.003 0.003 0.003
    Initial wealth 1 1 1 1 1
    Lower bound of the investment ratio 0.005 0.005 0.005 0.005 0.005
    Upper bound of the investment ratio 0.05 0.05 0.05 0.05 0.05

     | Show Table
    DownLoad: CSV

    The numerical results of IEDCHA and the four comparison algorithms solving the four models are compared, as presented in Table 12. When applying the comparison algorithm to solve the model, the constraints within the model are addressed using the classical penalty function method. Additionally, Table 12 displays a selection of four algorithms for comparing their results with those obtained by IEDCHA for each problem. All computations were performed on MATLAB2016a, utilizing an Intel(R) Core(TM) i7-10700 CPU @ 2.90GHz processor running a Windows 10 operating system. From Table 12, it is evident that IEDCHA achieves superior outcomes when compared with several other comparison algorithms. However, due to its double-loop mechanism design, each cycle requires a certain amount of time, which leads to longer computation times for IEDCHA in contrast to other algorithms.

    Table 12.  The numerical results obtained from various models using different algorithms.
    Algorithm Model Risk Return Fitness Time (s)
    IEDCHA M1 0.000088 0.1860 0.0039 378.395385
    M2 0.003800 1.0240 0.0036 33.341554
    M3 0.002800 0.0753 0.0180 5.754626
    M4 0.000411 0.0876 0.0186 5.186521
    SSA[44] M1 0.000137 0.0200 0.0268 0.166178
    M2 0.003800 0.000227 0.0211 0.036562
    M3 0.001200 0.000713 0.0203 0.043035
    M4 0.001000 0.0015 0.0208 0.042173
    PSO[45] M1 0.000144 0.0204 0.0738 0.020365
    M2 0.001900 0.0305 0.0753 0.105642
    M3 0.002400 0.0160 0.0655 0.219880
    M4 0.030100 0.0438 0.0714 0.237791
    GA[46] M1 0.185665 0.1832 27.4638 0.135846
    M2 0.001700 0.0706 27.1496 0.107189
    M3 0.002000 0.0743 27.6298 0.233415
    M4 0.041500 0.0727 27.3986 0.247608
    DE[47] M1 0.006500 0.0625 27.6325 9.399351
    M2 0.001700 0.0821 28.9617 0.071984
    M3 0.004110 0.0673 26.8023 0.250760
    M4 0.042100 0.0206 30.5950 0.029710

     | Show Table
    DownLoad: CSV

    This paper explores the notion of fractional programming in a fuzzy portfolio framework and builds four fractional programming portfolio selection models with distinct risk metrics in an attempt to address the complexity and fundamental structure of current portfolio models. The suggested models analyze risk and return at the same level without prioritization, minimizing the drawbacks of standard techniques that entail compromising one goal to accomplish another. The suggested model is solved using a hybrid IEDCHA strategy that avoids the drawbacks of the penalty function method. The four models' performance is further tested by comparing portfolio strategies under various risk measures and base limitations via simulated investments.The numerical results of the four models are also compared to analyze the various conditions for which they are appropriate. However, since the IEDCHA algorithm designed in this paper is specifically designed for the specific form of the four models we established, and the constraints in the model are gradually processed in the algorithm calculation process, the algorithm designed in this paper has certain limitations, which is also a common problem faced by this type of research. Therefore, on the basis of model innovation, the design of a wider range of optimization algorithms will be the focus of our subsequent research. Second, the incorporation of investing behavior and investment psychology into portfolio modeling provides for a more realistic model, as investors are the major decision-makers. At the same time, the fractional programming described in this study is only applicable to bi-objective issues; more research is required for optimisation problems with more than two goals, or the model might be solved directly using a multi-objective intelligent algorithm. These two notions are also the subject of our subsequent examination.

    All authors contributed to the conception and design of the study. C. Y. Hu: Methodology, Writing-original draft, Writing-review and editing; Y. L.Gao: Data curation, Conceptualization, Funding acquisition, Writing-review and editing; E. Y. Gao: Data curation, Writing-original draft.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This work was supported in part by the Natural Science Foundation Key Projects of Ningxia 2022AAC02043, in part by the Construction Project of First-class Subjects in Ningxia Higher Education NXYLXK2017B09, in part by the Major Special Fund of North Minzu University ZDZX201901, and in part by the Nanjing Securities Support Basic Discipline Research Project NJZQJCXK202201.

    The authors declare no conflict of interest.



    [1] S. Abramovich, L. E. Persson, Fejér and Hermite-Hadamard type inequalities for N-quasiconvex functions, Math. Notes, 102 (2017), 599–609. http://dx.doi.org/10.1016/B978-0-12-775850-3.50017-0 doi: 10.1016/B978-0-12-775850-3.50017-0
    [2] P. Agarwal, Some inequalities involving Hadamard-type k-fractional integral operators, Math. Meth. Appl. Sci., 40 (2017), 3882–3891. https://doi.org/10.1002/mma.4270 doi: 10.1002/mma.4270
    [3] B. Ahmad, A. Alsaedi, M. Kirane, B. T. Torebek, Hermite–Hadamard, Hermite–Hadamard–Fejér, Dragomir–Agarwal and Pachpatte type inequalities for convex functions via new fractional integrals, J. Comput. Appl. Math., 353 (2019), 120–129. https://doi.org/10.1016/j.cam.2018.12.030 doi: 10.1016/j.cam.2018.12.030
    [4] D. Baleanu, P. O. Mohammed, S. D. Zeng, Inequalities of trapezoidal type involving generalized fractional integrals, Alex. Eng. J., 59 (2020), 2975–2984. https://doi.org/10.1016/j.aej.2020.03.039 doi: 10.1016/j.aej.2020.03.039
    [5] S. I. Butt, E. Set, S. Yousaf, T. Abdeljawad, W. Shatanawi, Generalized integral inequalities for ABK-fractional integral operators, AIMS Math., 6 (2021), 10164–10191. https://doi.org/10.3934/math.2021589 doi: 10.3934/math.2021589
    [6] H. Chen, U. N. Katugampola, Hermite–Hadamard and Hermite–Hadamard–Fejér type inequalities for generalized fractional integrals, J. Math. Anal. Appl., 446 (2017), 1274–1291.
    [7] F. X. Chen, On the generalization of some Hermite–Hadamard inequalities for functions with convex absolute values of the second derivatives via fractional integrals, Ukrainian Math. J., 70 (2019), 1953–1965. https://doi.org/10.1007/s11253-019-01618-7 doi: 10.1007/s11253-019-01618-7
    [8] M. R. Delavar, M. D. L. Sen, A mapping associated to h-convex version of the Hermite–Hadamard inequality with applications, J. Math. Inequal., 14 (2020), 329–335. https://doi.org/10.2298/PAC2004329S doi: 10.2298/PAC2004329S
    [9] S. S. Dragomir, Two inequalities for differentiable mappings and applications to special means of real numbers and to trapezoidal formula, Appl. Math. Lett., 11 (1998), 91–95.
    [10] T. S. Du, M. U. Awan, A. Kashuri, S. S. Zhao, Some k-fractional extensions of the trapezium inequalities through generalized relative semi-(m,h)-preinvexity, Appl. Anal., 100 (2021), 642–662.
    [11] T. S. Du, C. Y. Luo, B. Yu, Certain quantum estimates on the parameterized integral inequalities and their applications, J. Math. Inequal., 15 (2021), 201–228.
    [12] T. S. Du, H. Wang, M. A. Khan, Y. Zhang, Certain integral inequalities considering generalized m-convexity on fractal sets and their applications, Fractals, 27 (2019), 1–17.
    [13] D. Y. Hwang, S. S. Dragomir, Extensions of the Hermite–Hadamard inequality for r-preinvex functions on an invex set, Bull. Aust. Math. Soc., 95 (2017), 412–423. https://doi.org/10.1017/S0004972716001374 doi: 10.1017/S0004972716001374
    [14] M. Iqbal, M. I. Bhatti, K. Nazeer, Generalization of inequalities analogous to Hermite-Hadamard inequality via fractional integrals, Bull. Korean Math. Soc., 52 (2015), 707–716. https://doi.org/10.4134/BKMS.2015.52.3.707 doi: 10.4134/BKMS.2015.52.3.707
    [15] İ. İșcan, Weighted Hermite-Hadamard-Mercer type inequalities for convex functions, Numer. Meth. Part. D. E., 37 (2021), 118–130. https://doi.org/10.1002/num.22521 doi: 10.1002/num.22521
    [16] M. Jleli, D. O'Regan, B. Samet, On Hermite-Hadamard type inequalities via generalized fractional integrals, Turkish J. Math., 40 (2016), 1221–1230. https://doi.org/10.3906/mat-1507-79 doi: 10.3906/mat-1507-79
    [17] M. Kadakal, İ. İșcan, P. Agarwal, M. Jleli, Exponential trigonometric convex functions and Hermite–Hadamard type inequalities, Math. Slovaca, 71 (2021), 43–56. https://doi.org/10.1515/ms-2017-0410 doi: 10.1515/ms-2017-0410
    [18] M. A. Khan, T. Ali, S. S. Dragomir, M. Z. Sarikaya, Hermite–Hadamard type inequalities for conformable fractional integrals, Rev. R. Acad. Cienc. Exactas Fís. Nat. Ser. A Math. RACSAM, 112 (2018), 1033–1048. https://doi.org/10.1007/s13398-017-0408-5 doi: 10.1007/s13398-017-0408-5
    [19] M. A. Khan, Y. M. Chu, A. Kashuri, R. Liko, G. Ali, Conformable fractional integrals versions of Hermite–Hadamard inequalities and their generalizations, J. Funct. Spaces, 2018 (2018), Article ID 6928130.
    [20] U. S. Kirmaci, Inequalities for differentiable mappings and applications to special means of real numbers and to midpoint formula, Appl. Math. Comput., 147 (2004), 137–146. https://doi.org/10.1016/S0096-3003(02)00657-4 doi: 10.1016/S0096-3003(02)00657-4
    [21] M. Kunt, İ. İșcan, S. Turhan, D. Karapinar, Improvement of fractional Hermite–Hadamard type inequality for convex functions, Miskolc Math. Notes, 19 (2018), 1007–1017. https://doi.org/10.18514/MMN.2018.2441 doi: 10.18514/MMN.2018.2441
    [22] M. Kunt, D. Karapinar, S. Turhan, İ. İșcan, The right Riemann–Liouville fractional Hermite–Hadamard type inequalities for convex functions, J. Inequal. Spec. Funct., 9 (2018), 45–57.
    [23] M. Kunt, D. Karapinar, S. Turhan, İ. İșcan, The left Riemann–Liouville fractional Hermite–Hadamard type inequalities for convex functions, Math. Slovaca, 69 (2019), 773–784. https://doi.org/10.1515/ms-2017-0261 doi: 10.1515/ms-2017-0261
    [24] M. A. Latif, On some new inequalities of Hermite–Hadamard type for functions whose derivatives are s-convex in the second sense in the absolute value, Ukrainian Math. J., 67 (2016), 1552–1571. https://doi.org/10.1007/s11253-016-1172-y doi: 10.1007/s11253-016-1172-y
    [25] J. G. Liao, S. H. Wu, T. S. Du, The Sugeno integral with respect to α-preinvex functions, Fuzzy Set. Syst., 379 (2020), 102–114. https://doi.org/10.1016/j.fss.2018.11.008 doi: 10.1016/j.fss.2018.11.008
    [26] D. Ș. Marinescu, M. Monea, A very short proof of the Hermite–Hadamard inequalities, Amer. Math. Monthly, 127 (2020), 850–851. https://doi.org/10.1080/00029890.2020.1803648 doi: 10.1080/00029890.2020.1803648
    [27] M. Matłoka, Inequalities for h-preinvex functions, Appl. Math. Comput., 234 (2014), 52–57. https://doi.org/10.1016/j.amc.2014.02.030 doi: 10.1016/j.amc.2014.02.030
    [28] K. Mehrez, P. Agarwal, New Hermite-Hadamard type integral inequalities for convex functions and their applications, J. Comput. Appl. Math., 350 (2019), 274–285.
    [29] P. O. Mohammed, Hermite–Hadamard inequalities for Riemann–Liouville fractional integrals of a convex function with respect to a monotone function, Math. Meth. Appl. Sci., 44 (2021), 2314–2324.
    [30] C. E. M. Pearce, J. Pečarić, Inequalities for differentiable mappings with application to special means and quadrature formulæ, Appl. Math. Lett., 13 (2000), 51–55.
    [31] S. Qaisar, J. Nasir, S. I. Butt, A. Asma, F. Ahmad, M. Iqbal, S. Hussain, Some fractional integral inequalities of type Hermite–Hadamard through convexity, J. Inequal. Appl., 2019 (2019), Article Number 111.
    [32] S. Rashid, D. Baleanu, M. C. Yu, Some new extensions for fractional integral operator having exponential in the kernel and their applications in physical systems, Open Physics, 18 (2020), 478–491. https://doi.org/10.1515/phys-2020-0114 doi: 10.1515/phys-2020-0114
    [33] M. Shafiya, G. Nagamani, D. Dafik, Global synchronization of uncertain fractional-order BAM neural networks with time delay via improved fractional-order integral inequality, Math. Comput. Simulation, 191 (2021), 168–186. https://doi.org/10.1016/j.matcom.2021.08.001 doi: 10.1016/j.matcom.2021.08.001
    [34] M. Z. Sarikaya, E. Set, H. Yaldiz, N. Bașak, Hermite–Hadamard's inequalities for fractional integrals and related fractional inequalities, Math. Comput. Model., 57 (2013), 2403–2407. https://doi.org/10.1016/j.mcm.2011.12.048 doi: 10.1016/j.mcm.2011.12.048
    [35] E. Set, A. O. Akdemir, M. E. Özdemir, Simpson type integral inequalities for convex functions via Riemann–Liouville integrals, Filomat, 31 (2017), 4415–4420. https://doi.org/10.2298/FIL1714415S doi: 10.2298/FIL1714415S
    [36] E. Set, J. Choi, B. Çelİk, Certain Hermite-Hadamard type inequalities involving generalized fractional integral operators, Rev. R. Acad. Cienc. Exactas Fís. Nat. Ser. A Mat., 112 (2018), 1539–1547.
    [37] W. B. Sun, Q. Liu, New Hermite-Hadamard type inequalities for (α,m)-convex functions and applications to special means, J. Math. Inequal., 11 (2017), 383–397.
    [38] J. R. Wang, J. H. Deng, M. Fečkan, Exploring s-e-condition and applications to some Ostrowski type inequalities via Hadamard fractional integrals, Math. Slovaca, 64 (2014), 1381–1396. https://doi.org/10.2478/s12175-014-0281-z doi: 10.2478/s12175-014-0281-z
    [39] S. S. Zeid, Approximation methods for solving fractional equations, Chaos, Solitons Fractals, 125 (2019), 171–193. https://doi.org/10.1016/j.chaos.2019.05.008 doi: 10.1016/j.chaos.2019.05.008
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2014) PDF downloads(76) Cited by(2)

Figures and Tables

Figures(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog