On a class of dependent Sparre Andersen risk models with - - PowerPoint PPT Presentation

on a class of dependent sparre andersen risk models with
SMART_READER_LITE
LIVE PREVIEW

On a class of dependent Sparre Andersen risk models with - - PowerPoint PPT Presentation

Model and Notation The fixed point equation Two applications On a class of dependent Sparre Andersen risk models with application. F.Avram, A.Badescu, M.Pistorius and L.Rabehasaina Laboratory of Mathematics, Besan con, University of


slide-1
SLIDE 1

Model and Notation The fixed point equation Two applications

On a class of dependent Sparre Andersen risk models with application.

F.Avram, A.Badescu, M.Pistorius and L.Rabehasaina

Laboratory of Mathematics, Besan¸ con, University of Franche Comt´ e, France.

MAM Conference, Budapest, 28th-30th June 2016

1 / 16

slide-2
SLIDE 2

Model and Notation The fixed point equation Two applications

Content

Model and Notation The fixed point equation Two applications

2 / 16

slide-3
SLIDE 3

Model and Notation The fixed point equation Two applications

Content

Model and Notation The fixed point equation Two applications

3 / 16

slide-4
SLIDE 4

Model and Notation The fixed point equation Two applications

Risk process {X(t), t ≥ 0}

X(t) = u + ct −

N(t)

  • i=1

Jk, t ≥ 0. N(t) = max {n ∈ N : n

k=1 Tk ≤ t} number of claims up to

time t, Tk interclaim, Jk claim size, u ≥ 0 initial capital, c > 0 premium rate, cE[T1] > E[J1], {(Tk, Jk), k ∈ N} i.i.d. with dependence structure, defined by P(Tk ∈ dt, Jk ∈ dx) = α(dt) eRx r dx t, x ∈ R+, where α(dt) ∈ R1×m, is a 1 × m distribution vector, R ∈ Rm×m sub-generator matrix, r = (−R)1.

4 / 16

slide-5
SLIDE 5

Model and Notation The fixed point equation Two applications

Ruin probability

We let τ := {t ≥ 0, X(t) < 0} the ruin time and its Laplace Transform ˆ ψ(q, u) := Eu

  • e−qτ

, q ≥ 0, u ≥ 0. − → Goal : Compute ˆ ψ(q, u) with efficient algorithm, with LT ˆ α(−q) := ∞ e−qtα(dt) ∈ R1×m, q ∈ R+, available. Notation : If Q ∈ Rm×m negative-definite, we extend definition

  • f LT :

ˆ α(Q) := ∞ α(dt)eQt ∈ R1×m. ˆ α(−qI) available for all q ∈ R+, but ˆ α(Q) not explicitly computable in practice for general Q !

5 / 16

slide-6
SLIDE 6

Model and Notation The fixed point equation Two applications

Content

Model and Notation The fixed point equation Two applications

6 / 16

slide-7
SLIDE 7

Model and Notation The fixed point equation Two applications

Fixed point equation

Theorem Laplace transform ˆ ψ(q, u) verifies ˆ ψ(q, u) = ˆ ρ(q)e[R+r ˆ

ρ(q)]u1,

u ≥ 0, q ≥ 0, (1) where ˆ ρ(q) is a 1 × m sub-probability vector satisfying the fixed point equation ˆ ρ(q) = ˆ α(cR + c r ˆ ρ(q) − qI), q > 0. (2) If q = 0 there exists a 1 × m sub-probability vector ˆ ρ(0) verifying (2) such that expression (1) holds for ˆ ψ(0, u).

7 / 16

slide-8
SLIDE 8

Model and Notation The fixed point equation Two applications

Example and issues

Main issue is solving (2), i.e. ˆ ρ(q) = ˆ α(cR + c r ˆ ρ(q) − qI), with unkwown ˆ ρ(q) ∈ R1×m subprobability vector. E.g. α(dt) ∈ R scalar, Jk exponentially distributed : Malinovskii (1998), ˆ ρ(q) scalar, α(dt) ∈ R scalar, Jk ∼ PH(r, R) : Asmussen and Albrecher (2010), ˆ ρ(q) scalar. Issues here :

1

(2) does not necessarily have a unique solution,

2

α(dt) vector,

3

need to be able to compute ˆ α(M) where M is a matrix : no explicit form.

8 / 16

slide-9
SLIDE 9

Model and Notation The fixed point equation Two applications

Algorithm for fixed point equation

Idea : Approximating ˆ ρ(q) by ˆ ρN(q), N ∈ N, solution to ˆ ρN(q) = ˆ αN(cR + c r ˆ ρN(q) − qI), where ˆ αN(Q) :=

N

  • k=0

Mk(δ)(Q + δI)k k! , δ > 0 large enough, and Mk(δ) := ∞ tke−δtα(dt) ∈ R1×m.

9 / 16

slide-10
SLIDE 10

Model and Notation The fixed point equation Two applications

Algorithm for fixed point equation

Advantages : − → ˆ αN(Q) computable if the Mk(δ)’s, k ∈ N, are computable, − → Convergence : Theorem One has ˆ ρN(q) − → ˆ ρ(q) as N → ∞ for all q ≥ 0. Besides, for q large enough :

  • ˆ

ρ(q) − ˆ ρN(q)

  • m ≤ C
  • ˆ

α(0).1 −

N

  • k=0

|Mk(δ)|m k! δk

  • with explicit C, and ˆ

α(0) explicit.

10 / 16

slide-11
SLIDE 11

Model and Notation The fixed point equation Two applications

Content

Model and Notation The fixed point equation Two applications

11 / 16

slide-12
SLIDE 12

Model and Notation The fixed point equation Two applications

Bailout problem

U1(t) t u1 U0(t) t u0 Replenishment at level 0 ζ(1)

1

ζ(1)

2

k1ζ(1)

1

(prop.cost) K(1)

1

(fixed cost) k1ζ(1)

2

K(1)

2

Ruin time τ of CB

Figure: Sample path with proportional and fixed cost.

12 / 16

slide-13
SLIDE 13

Model and Notation The fixed point equation Two applications

Bailout problem

Goal : Determine LT of ruin time τ of {U0(t), t ≥ 0} (Central Branch) starting from u0 ≥ 0, when claims and interclaims for {U1(t), t ≥ 0} (subsidiary) are PH distributed. Step 1 : Identify dependence structure α(dt) and matrix R : α(dt) ∼ ruin time distribution of τ1 jointly to phase at ruin, R ∼ same as claims of U1(t) + independent PH(k, K), − → ˆ α(−q), q ∈ R+, available. Step 2 : Compute the Mk(δ)’s, k ∈ N : Ren and Stanford (2012). Step 3 : Run the algorithm.

13 / 16

slide-14
SLIDE 14

Model and Notation The fixed point equation Two applications

Queues and flushes (in progress)

Server Flush U1(t) U0(t)

Figure: Flush from queue 1 to 0.

14 / 16

slide-15
SLIDE 15

Model and Notation The fixed point equation Two applications

Queues and flushes

Fluid queues {U0(t), t ≥ 0} and {U1(t), t ≥ 0} fluid queues, fed at constant rate c0 and c1. U1(t) served with priority over U0(t), instantaneously, according to PH services, Content of U1(t) is occasionally flushed into U0(t) at time according to a Poisson process. Goal : Determine LT of ruin time τ of U0(t) = busy period of U0(t). Steps : Identify dependence structure α(dt) and matrix R, and compute the Mk(δ)’s, k ∈ N.

15 / 16

slide-16
SLIDE 16

Model and Notation The fixed point equation Two applications

Thank you !

16 / 16