Pseudo Securities For Technical Analysts, Part 2 by Charles E. Miller
ARTICLE SYNOPSIS ...Pseudo Securities For
Technical Analysts - Part 2
Last time, we examined the idea of using pseudo securities,
based on artificial data with known properties, to map the
characteristics of various indicators. We then applied this
concept to the time domain of security analysis. In this, the
second of a three-part series, we explore the actual technique
used to generate pseudo security data.
When working with pseudo securities,
as with anything else new
on the computer, it is generally
common sense not to experiment
within your working application.
For ProTA, BeeSoft's
technical analysis softw...