Jump to content

Welcome to the new Traders Laboratory! Please bear with us as we finish the migration over the next few days. If you find any issues, want to leave feedback, get in touch with us, or offer suggestions please post to the Support forum here.

  • Welcome Guests

    Welcome. You are currently viewing the forum as a guest which does not give you access to all the great features at Traders Laboratory such as interacting with members, access to all forums, downloading attachments, and eligibility to win free giveaways. Registration is fast, simple and absolutely free. Create a FREE Traders Laboratory account here.

Do Or Die

Trading Regime Analysis Using Chart Patterns- Part 1

Recommended Posts

Hi,

 

Most of the trading techniques overlap in some form; none of them exist in isolation. For example, a Bollinger bands breakout strategy may overlap with chart pattern breakout strategy.

 

Similarly, trading regime analysis can be carried out discretionary through chart patterns. I am writing few articles which will hopefully be helpful to Price Action traders (those who do not use indicators). Related articles are Trading Regime Analysis Using RWI, Trend Following Vs Mean Reversion: Trading Regimes, Introduction to Understanding Volatility, Trading Regime Analysis Using RSI and Relative Strength - Internal.

 

For the purpose of Trading Regime Analysis, we can categorize patterns into

  • Trading Range Contraction (coiling)
  • Trading Range Expansion
  • Price Shocks

 

There are few things I will like to highlight regarding trading regime analysis using chart patterns:

  1. When we see a coiling in price action it usually means that the current trading regime is a range and the next trading regime will be a trend.
  2. Mark these patterns on one time frame higher than the time frame you trade. So the practical implication is to trade using a trend following strategy on one time frame lower.
  3. For the sake of Trading Regimes, a lenient definition of the patterns will do; i.e. you do not need to go strictly by the books in marking them.
  4. The price target for a breakout (magnitude of a following move) is usually the broadest part of the range of the chart pattern.

For Time Frames (TF) I’m referring to the popular ones in the order- monthly, weekly, daily (eod), hourly, 30 minute, 10 minute and 5 minute. Suppose you are trading on 60 minute TF, in that case you will need to look for patterns on EOD TF. These are generalizations only and you may like to pick one depending upon your trading style.

 

Range Compression Chart Patterns:

 

Ascending triangles generally occur when the market has been in an uptrend (or experienced at least a partial up move before the pattern). They are indentified by flat topside resistance and rising uptrend support.

attachment.php?attachmentid=25563&stc=1&d=1312433444

Descending Triangles generally occur when the market has been in a downtrend (or experienced at least a partial down move before the pattern). They are identified by flat support trend line and falling downtrend resistance line.

attachment.php?attachmentid=25564&stc=1&d=1312433444

Symmetrical Triangles generally occur after the market has been in trending period either up or down (or the market has experienced at least a partial up or down move prior to the pattern developing). They are defined by converging levels of support and resistance, leading to a classic coiling of the price.

attachment.php?attachmentid=25565&stc=1&d=1312433444

attachment.php?attachmentid=25566&stc=1&d=1312433444Wedges are similar to triangles, except that they are not so remarkably bounded by trend lines. Corrective wedges tend to follow the double or triple zig-zag structure.

attachment.php?attachmentid=25567&stc=1&d=1312433444

Rectangles can occur anywhere as in an uptrend, downtrend or during reversal. The price action during a rectangle is identified by prolonged period of sideways action where the upper and lower bounds are horizontal or very slow sloping.

attachment.php?attachmentid=25568&stc=1&d=1312433444

Flag is another range-trading regime that comes after a strong trending move, and it usually leads to a continuation of the trend. It is basically a rectangle marked on one time frame higher. One of the important elements in identifying a flag consolidation pattern is that the preceding move is a strong, almost vertical move.

Pennant is similar to a flag in that it is occurs after a strong move and will therefore generally occur in the shorter time fractals. It can be regarded as a scaled down symmetrical triangle although, as with the flag, it can have a slight slope.

 

Posting a comment will only take you 2 minutes, but it will be the strongest motivation for me to share something better.

5aa710940ef26_AscendingTriangle.png.e2eeeacea724e7bee62442c093b84632.png

5aa710946d36b_DescendingTriangle.png.eed77d1f5047124828a4d2acf5ff73a0.png

5aa7109471171_SymmetricTriangle.png.12a13669b1f9b138e58331c0a807fad9.png

Wedges.png.fc675f07196a2780df62bb550c5671bb.png

rectangle.png.b7e13f14cb1515bbf9627b90fb450a8b.png

weekly.png.3e26e9383612a6cd8c0d27f04d9390e0.png

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


  • Topics

  • Posts

    • Back in the early 2000s, Netflix mailed DVDs to subscribers.   It wasn’t sexy—but it was smart. No late fees. No driving to Blockbuster.   People subscribed because they were lazy. Investors bought the stock because they realized everyone else is lazy too.   Those who saw the future in that red envelope? They could’ve caught a 10,000%+ move.   Another story…   Back in the mid-2000s, Amazon launched Prime.   It wasn’t flashy—but it was fast.   Free two-day shipping. No minimums. No hassle.   People subscribed because they were impatient. Investors bought the stock because they realized everyone hates waiting.   Those who saw the future in that speedy little yellow button? They could’ve caught another 10,000%+ move.   Finally…   Back in 2011, Bitcoin was trading under $10.   It wasn’t regulated—but it worked.   No bank. No middleman. Just wallet to wallet.   People used it to send money. Investors bought it because they saw the potential.   Those who saw something glimmering in that strange orange coin? They could’ve caught a 100,000%+ move.   The people who made those calls weren’t fortune tellers. They just noticed something simple before others did.   A better way. A quiet shift. A small edge. An asymmetric bet.   The red envelope fixed late fees. The yellow button fixed waiting. The orange coin gave billions a choice.   Of course, these types of gains are rare. And they happen only once in a blue moon. That’s exactly why it’s important to notice when the conditions start to look familiar.   Not after the move. Not once it's on CNBC. But in the quiet build-up— before the surface breaks.   Enter the Blue Button Please read more here: https://altucherconfidential.com/posts/netflix-amazon-bitcoin-blue  Profits from free accurate cryptos signals: https://www.predictmag.com/ 
    • What These Attacks Look Like There are several ways you could get hacked. And the threats compound by the day.   Here’s a quick rundown:   Phishing: Fake emails from your “bank.” Click the link, give your password—game over.   Ransomware: Malware that locks your files and demands crypto. Pay up, or it’s gone.   DDoS: Overwhelm a website with traffic until it crashes. Like 10,000 bots blocking the door. Often used by nations.   Man-in-the-Middle: Hackers intercept your messages on public WiFi and read or change them.   Social Engineering: Hackers pose as IT or drop infected USB drives labeled “Payroll.”   You don’t need to be “important” to be a target.   You just need to be online.   What You Can Do (Without Buying a Bunker) You don’t have to be tech-savvy.   You just need to stop being low-hanging fruit.   Here’s how:   Use a YubiKey (physical passkey device) or Authenticator app – Ditch text message 2FA. SIM swaps are real. Hackers often have people on the inside at telecom companies.   Use a password manager (with Yubikey) – One unique password per account. Stop using your dog’s name.   Update your devices – Those annoying updates patch real security holes. Use them.   Back up your files – If ransomware hits, you don’t want your important documents held hostage.   Avoid public WiFi for sensitive stuff – Or use a VPN.   Think before you click – Emails that feel “urgent” are often fake. Go to the websites manually for confirmation.   Consider Starlink in case the internet goes down – I think it’s time for me to make the leap. Don’t Panic. Prepare. (Then Invest.)   I spent an hour in that basement bar reading about cyberattacks—and watching real-world systems fall apart like dominos.   The internet going down used to be an inconvenience. Now, it’s a warning.   Cyberwar isn’t coming. It’s here.   And the next time your internet goes out, it might not just be your router.   Don’t panic. Prepare.   And maybe keep a backup plan in your back pocket. Like a local basement bar with good bourbon—and working WiFi.   As usual, we’re on the lookout for more opportunities in cybersecurity. Stay tuned.   Author: Chris Campbell (AltucherConfidential) Profits from free accurate cryptos signals: https://www.predictmag.com/   
    • DUMBSHELL:  re the automation of corruption ---  200,000 "Science Papers" in academic journal database PubMed may have been AI-generated with errors, hallucinations and false sourcing 
    • Does any crypto exchanges get banned in your country? How's about other as Bybit, Kraken, MEXC, OKX?
    • Does any crypto exchanges get banned in your country? How's about other as Bybit, Kraken, MEXC, OKX?
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.