Bubblebot Guide
  • šŸ’­Introducing Bubble Bot (CHEX)
  • šŸŽžļøBubble Bot Tutorials
  • ā“Contemporary Challenges in On-Chain Trading
  • āœ…Remediation
  • šŸ’¦Exclusive Features
    • 🤟What Bubblebot do well
      • āš”ļøComparison b/w CEX/DEX & CHEX
      • šŸ’ÆComparison with Competitors
  • 1ļøāƒ£Spot Trading
    • šŸ›‘Set Stop Loss
  • 2ļøāƒ£Futures Trading Bot
    • āš”ļøShort Trade
    • šŸ’°Lending Earn
    • šŸ˜‘Liquidation
  • 3ļøāƒ£1st Multi-Staking TG Bot
  • 4ļøāƒ£Hedge/Risk
    • šŸ›ļøBubble Vaults
    • šŸ—£ļøBreaking down Bubble Vaults
    • šŸ“ˆAnalyzing Bubble Levels (Price)
    • šŸ™…Hedge Risk Mitigation
    • šŸŖ™Bubble Vault Tokens
    • šŸ”°Bubble Vault Token Flow
    • šŸ’°Claim Earned Reward
    • šŸ’øLong-Lasting Gains from Bubble Farms
    • šŸ’»System Architecture
  • 5ļøāƒ£Hold 2 Earn (BNB)
  • 6ļøāƒ£BNB Miner Pool
  • šŸ¤–Bubble Sniper Bot
    • ✨An ultimate sniper to dominate them all.
    • āš™ļøError Shield
  • šŸ”” Get Notifications
  • šŸ’øReferral Program
  • šŸŖ™Bubble TOKENOMICS
  • šŸŽÆRoadmap
  • šŸ”Bubblebot Security Measures
    • ā—Protecting Ambitions and Aspirations
    • āœ”ļøRegulatory Standards
  • šŸ‘„Stakeholders
    • šŸ‘ļøThe Buzz:
    • šŸ’„Community Engagement
  • šŸ’øWhy Investing in $Bubble
  • šŸ™ŒMission and Vision
  • šŸ¤‘Minds Behind Bubblebot
  • ā‰ļøBubblebot FAQ's
  • āš ļøDISCLAIMER & RIGHTS
  • Twitter
  • Telegram
  • Medium
  • Reddit
  • YouTube
  • Dashboard
  • Website
Powered by GitBook
On this page
  • Methodology
  • Strike Price Formula:
  1. Hedge/Risk

Analyzing Bubble Levels (Price)

Speculate on pegged assets, multifold your earnings

Methodology

We analyzed multiple charts (datasets) from recent years to establish the appropriate price levels for stable coins, which are pegged at $1. Utilizing data from diverse sources pertaining to stable coins, we computed optimal strike prices and expiration dates for low, medium, and high-risk scenarios, incorporating a range of variables.

We conducted the following steps in our analysis:

  1. Calculated standard deviations for USDC, DAI, USDT, and FEI.

  2. Identified daily deviations from the mean ($1), excluding outliers.

  3. Analyzed the frequency of breaches in variance thresholds at different indicators (e.g., 10bp, 20bp, 30bp, etc.).

  4. Determined optimal strike prices that strike a balance among the interests of all stakeholders.

In the current system, each stable coin is associated with three strike levels:

  1. Faty Risk Strike: Anticipating a breach every three months.

  2. Smart Risk Strike: Expecting a breach every 18 months.

  3. Low Risk Strike: Representing rare, black swan events.

These strikes provide a balance between yield and security against unforeseen events during the stable coin's lifespan. To calculate these striking prices, we assume that price variations from $1 follow an independent and identically distributed (i.i.d) random variable pattern. You can find more details on the assumptions and statistical aspects in our technical whitepaper.

Strike Price Formula:

Xi=X(si)=∣s1āˆ’1āˆ£āˆ—104X_i=X(s_i)=|s_1-1|*10^4Xi​=X(si​)=∣s1ā€‹āˆ’1āˆ£āˆ—104

where sis_isi​ is the stable coin price at a given time tit_iti​

It is well known that in times of mass de collateralization spirals, these variables become correlated, and the i.i.d assumption does not hold. To alleviate this restriction and ensure our data is accurately distributed, we assume that the discrete-time series of stable coin prices are sampled from a "continuous" (block-by-block) series S^\hat{S}S^.

si={sj^∈S^∣max⁔sj^∈S^Xi}s_i = \{\hat{s_j} \in \hat{S}|\smash{\displaystyle\max_{\hat{s_j}\in \hat{S}}} X_i \}si​={sj​^ā€‹āˆˆS^∣sj​^ā€‹āˆˆS^max​Xi​}

where we assume that any correlation spirals happen within each interval, Ī”t=tiāˆ’tiāˆ’1\Delta t=t_i-t_{i-1}Ī”t=tiā€‹āˆ’tiāˆ’1​

Each strike Kk∈{1,2,3}K_{k \in \{1,2,3\}}Kk∈{1,2,3}​ has an associated rate rkr_krk​, defined as the probability that the strike is breached within a given Ī”t\Delta tĪ”t. The rate is calculated using an indicator function from the discrete-time series S=∪siS=\cup s_i S=∪si​, as

rk=āˆ‘i=1n1Xi>Kknr_k =\sum_{i=1}^{n}\frac{\mathbb{1}_{X_i>K_k}}{n}rk​=i=1āˆ‘n​n1Xi​>Kk​​​

and can be used in a binomial distribution to find the probability PkP_kPk​ of a particular strike being breached within a given month:

Pk=(1āˆ’rk)dƗfP_k= (1-r_k)^{d\times f}Pk​=(1āˆ’rk​)dƗf

where fff is the sampling frequency and ddd is the number of days in a given epoch.

The equation above is solved for each rkr_krk​ on the interval (0,1)∈R(0,1) \in \mathbb{R}(0,1)∈R given the desired values of PkP_kPk​. This is done by using a variety of root-finding algorithms. Once rkr_krk​ is determined, the set of all XiX_iXi​ can be iterated through for varying strikes until an appropriate KKK is found. For the cases, K1K_1K1​and K2K_2K2​, each PkP_kPk​, is 13\frac{1}{3}31​ and 118\frac{1}{18}181​, respectively.

PreviousBreaking down Bubble VaultsNextHedge Risk Mitigation

Last updated 1 year ago

4ļøāƒ£
šŸ“ˆ