Next Article in Journal
A Unique Bifuzzy Manufacturing Service Composition Model Using an Extended Teaching-Learning-Based Optimization Algorithm
Previous Article in Journal
A Method to Handle the Missing Values in Multi-Criteria Sorting Problems Based on Dominance Rough Sets
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Threshold Estimator for Ruin Probability Using the Fourier-Cosine Method in the Wiener–Poisson Risk Model

School of Statistics and Data Science, Qufu Normal University, Qufu 273165, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(18), 2945; https://doi.org/10.3390/math12182945
Submission received: 5 August 2024 / Revised: 16 September 2024 / Accepted: 20 September 2024 / Published: 22 September 2024
(This article belongs to the Special Issue Statistics: Theories and Applications)

Abstract

:
In this paper, we propose a nonparametric estimator of ruin probability in the Wiener–Poisson risk model based on high-frequency data. The estimator is constructed via the Fourier-cosine method and the threshold technique, and the convergence rate is also studied for a large sample size. Finally, we verify the effectiveness of our estimator through some simulation studies.

1. Introduction

In the field of financial and actuarial mathematics, the study of ruin probability and related metrics has attracted significant attention from many researchers. In recent years, numerous notable results based on statistical inference have emerged regarding ruin probability and associated quantities. For example, see Shimizu [1], Zhang et al. [2], Zhang and Yang [3], Masiello [4], Zhang and Yang [5], and You et al. [6], among others.
Estimating ruin probability and related quantities in risk theory often involves employing various methods to develop estimators. Shimizu [1] applied the regularized Laplace inversion technique to estimate the Gerber–Shiu function in the Wiener–Poisson risk model. You and Cai [7] used the same technique to estimate ruin probability for a spectrally negative Lévy process. Zhang et al. [2] constructed an estimator of ruin probability using Fourier inversion and the kernel density estimation method in the classical risk model. Similarly, Zhang and Yang [3,5] developed estimators via Fourier inversion in a Lévy risk model. You et al. [6] established asymptotically normal distributions for the nonparametric estimator proposed by Zhang and Yang [5] in the classical risk model. Additionally, You and Gao [8] and You and Yin [9] applied threshold estimation and regularized Laplace inversion to obtain estimators for survival probability in the Wiener–Poisson risk model and the spectrally negative Lévy process, respectively. Gao and You [10] combined the threshold technique with Fourier inversion to estimate ruin probability under the tempered-stable Lévy subordinator. Zhang [11] estimated the Gerber–Shiu function using Fourier–Sinc series expansion in a compound Poisson risk model perturbed by diffusion. Zhang and Su [12] and Su et al. [13] used Laguerre series expansion to estimate the Gerber–Shiu function in the classical and perturbed compound Poisson models, respectively. Shimizu and Zhang [14] proposed an estimator for the Gerber–Shiu function by inverting a semiparametric estimator of its Fourier transform in a Lévy risk model. Yang et al. [15] applied the Fourier-cosine method to estimate the discounted density of the deficit at ruin in the classical risk model. Xie and Zhang [16] extended the Fourier-cosine method to estimate the expected present value of dividend payments before ruin and the expected discounted penalty function in the classical compound Poisson risk model under a constant barrier dividend strategy. Wang et al. [17] used the Fourier-cosine method to estimate the time value of ruin in a Lévy risk model.
More recently, the Fourier-cosine method has gained traction for estimating or approximating ruin probability and related quantities. Initially introduced by Fang and Oosterlee [18] for pricing European options, this method has since been extended to ruin theory. Chau et al. [19] approximated infinite-time ruin probability using the Fourier-cosine method under a Lévy subordinator model. In a subsequent study, Chau et al. [20] systematically examined the approximation of Gerber–Shiu functions using this method. Zhang [21] applied the Fourier-cosine method to approximate the density of time to ruin in the classical compound Poisson risk model. Lee et al. [22] incorporated the Fourier-cosine method to estimate finite-time ruin probability in a Lévy process. Li et al. [23] extended Lee et al.’s work to approximate Gerber–Shiu functions in a Lévy process. In addition to these approaches, Wang and Zhang [24] approximated the Gerber–Shiu function using frame duality projection in a Lévy risk model. In our work, we adopt the Fourier-cosine method to estimate ruin probability.
In finance, high-frequency trading generates vast amounts of data suitable for statistical analysis, offering insights into market dynamics. Ruin probability research is crucial for managing specialized funds that prioritize long-term sustainability over short-term gains. These funds aim to maintain consistent spending levels and avoid financial ruin, thereby improving their long-term survival. For related studies, see Karathanasopoulos et al. [25]. Shimizu and Zhang [14] discussed the application of high-frequency observation schemes in financial statistics and insurance.
In our work, we assume that the high-frequency data consist of n + 1 discrete-time observations of the surplus process (1) with time steps, i.e., the discrete sample X n = { X t m n , m = 0 , 1 , 2 , , n } , t m n = m h n ( m = 0 , 1 , 2 , , n ) . The asymptotic framework assumes that n h n and h n 0 while n . This high-frequency assumption is frequently employed in statistical inference for Lévy processes. See, for example, Shimizu [26], Zhang and Yang [3], and Comte and Genon-Catalot [27,28]. Under this assumption, we obtain observable data on the surplus process, though we remain uncertain about the occurrence of jumps within the small intervals ( t m 1 n , t m n ] which can significantly affect the accuracy of our ruin probability estimator. Therefore, we must devise a method to use observable data to detect whether jumps occurred within these small intervals. Mancini [29], You and Gao [8], Gao and You [10], and Shimizu [26] employed a threshold technique to identify jumps whose sizes exceed a defined threshold function. Given discrete observations, this technique helps differentiate between fluctuations due to diffusion shocks and those caused by jumps.
In this paper, we propose an estimator for ruin probability using the threshold technique and the Fourier-cosine method. By integrating the threshold technique with the Fourier-cosine method, the estimator becomes more stable and reliable, improving its accuracy in assessing ruin probability.
The remainder of this paper is organized as follows: In Section 2, we introduce the risk model, assumptions, ruin probability, and its Fourier transform. Section 3 presents several estimators based on the Fourier-cosine method and the threshold technique. Section 4 establishes the asymptotic properties of our estimators and provides technical proofs. Section 5 demonstrates the effectiveness of our estimators through simulations. Finally, we provide concluding remarks in Section 6.

2. Preliminaries

2.1. Risk Model and Some Assumptions

The Wiener–Poisson risk process is defined by
X t = x + c t + σ W t j = 1 N t U j , t 0 ,
where x 0 is the initial surplus level, c > 0 is a parameter, σ > 0 is the diffusion coefficient, { W t , t 0 } is a standard Wiener process, { N t , t 0 } is a Poisson process with intensity λ > 0 , and U 1 , U 2 , U 3 , comprise an independent and identically distributed positive sequence of random variables with the common distribution F(density f). Suppose that { N t , t 0 } , { W t , t 0 } , and { U j , j = 1 , 2 , } are independent of each other.
In this paper, we assume that the Poisson intensity λ , the distribution function F, and diffusion coefficient σ are unknown. In this case, our objective is to estimate the ruin probability of risk process (1).
Next, we make some assumptions for our theoretical results:
Let μ n = 0 x n F ( d x ) , n = 1 , 2 , 3 , .
Assumption A1. 
μ n < , n = 1 , 2 , 4 .
Assumption A2. 
The safety loading condition holds, i.e., c > λ μ 1 .

2.2. Ruin Probability and Its Fourier Transform

Let τ = inf { t 0 : X t 0 } . The infinite-time horizon ruin probability is given by
Ψ ( x ) = P τ < | X 0 = x , x 0 .
Let ϑ ( s ) be the characteristic exponent of X t x defined by ϑ ( s ) : = t 1 log E [ e i s ( X t x ) ] , which is easily calculated by the independent property of W , N , U j as follows:
ϑ ( s ) = i c s σ 2 2 s 2 + λ 0 e i s x F ( d x ) 1 .
With reference to Zhang and Yang [5] and Gao and You [10], the Fourier transform of Ψ ( x ) is given by
F Ψ ( s ) = σ 2 2 i s + λ i s 0 ( e i s x 1 ) F ( d x ) λ μ 1 i c s + σ 2 2 s 2 λ 0 ( e i s x 1 ) F ( d x )
= ϑ ( s ) + i c s [ 1 ρ ] i s ϑ ( s ) .     
where ρ = λ μ 1 c and ϑ ( s ) = i c s σ 2 2 s 2 + λ 0 e i s x F ( d x ) 1 . By (4) and
lim s 0 1 i s 0 ( e i s x 1 ) F ( d x ) = 0 lim s 0 ( e i s x 1 ) i s F ( d x ) = μ 1 , lim s 0 1 ( i s ) 2 0 ( e i s x 1 i s x ) F ( d x ) = 0 lim s 0 ( e i s x 1 i s x ) ( i s ) 2 F ( d x ) = μ 2 2 ,
and Equation (5) yields that
F Ψ ( s ) = ϑ ( s ) + i c s ( 1 ρ ) i s ϑ ( s ) , s 0 , σ 2 2 + λ μ 2 2 c λ μ 1 , s = 0 .

3. Estimation of Ruin Probability

In this section, our aim is to construct an estimator for Ψ ( x ) using the sample X n .
Let us denote by Z m the increment X t m n X t m 1 n for m = 1 , , n . h n is the sampling interval, denoted by t m n t m 1 n .
If we can estimate λ μ 1 , λ μ 2 , σ 2 , ρ , and ϑ ( s ) in (6), then F Ψ ( s ) can be estimated with the plug-in device. Inspired by Zhang and Yang [3,5] and Gao and You [10], let us denote ψ ( s ) = E [ e i s Z 1 ] , an estimator of ϑ ( s ) , which is given by
ϑ ^ ( s ) = 1 h n ψ ^ ( s ) 1 ,
where
ψ ^ ( s ) = 1 n m = 1 n e i s Z m
is an empirical-type estimator of ψ ( s ) .

3.1. Threshold Function Technique

Inspired by Shimizu [26], Mancini [29], and You and Gao [7], we introduce the filter
D m n : = ω Ω : c h n Z m > r n ,
where r n = h n θ > 0 is a suitable threshold function dependent on n such that lim n r n = 0 and θ is a positive constant. Let C m n := ω Ω : c h n Z m r n be the complement of D m n .
The function r n , suitably chosen, plays the role of a threshold to detect the existence of a jump in each sampling interval. Given these filters and r n , we can observe that there is no jump in the interval t m 1 n , t m n if c h n Z m r n .
By Mancini [29] and You and Gao [8], the natural estimators for λ μ 1 and σ 2 are, respectively, given by
λ μ 1 ^ = m = 1 n ( c h n Z m ) I D m n n h n , σ 2 ^ = 1 n h n m = 1 n ( c h n Z m ) 2 I C m n .
By Equation (9) and ρ = λ μ 1 c , an estimator of ρ is given by
ρ ^ = λ μ 1 ^ c = 1 c m = 1 n ( c h n Z m ) I D m n n h n .
According to Remark 3 in Wang et al. [17], we construct an estimator of λ μ 2 as follows:
λ μ 2 ^ = 1 n h n m = 1 n Z m c h n 2 h n λ μ 1 ^ 2 σ 2 ^ .
Combining Equations (6), (7), (9), (10) and (11), we estimate F Ψ ( s ) by
F Ψ ^ ( s ) = ϑ ^ ( s ) + i c s ( 1 ρ ^ ) i s ϑ ^ ( s ) , s 0 , σ 2 ^ 2 + λ μ 2 ^ 2 c λ μ 1 ^ , s = 0 .

3.2. Fourier-Cosine Method

To ensure the smooth comprehension of the paper, we will provide a revised introduction to the Fourier-cosine method.
For an integrable function f ( x ) , x [ a 1 , a 2 ] , it has the following cosine series expansion,
f ( x ) = k = 0 A f , k cos ( k π x a 1 a 2 a 1 ) ,
where indicates that the first term in the summation is weighted by one-half, and the cosine coefficients are given by
A f , k = 2 a 2 a 1 a 1 a 2 f ( x ) exp ( i k π x a 1 a 2 a 1 ) d x , k = 0 , 1 , 2 , ,
where means taking the real part and i = 1 is the imaginary unit.
Let a 1 = 0 and a 2 = a , after choosing large a, we have
A f , k B f , k : = 2 a · F f ( k π / a ) = 2 a · 0 a f ( x ) exp ( i k π x a ) d x , k = 0 , 1 , 2 , ,
then we obtain the following Fourier-cosine approximation for f ( x ) ,
f ( x ) k = 0 B f , k cos ( k π x a ) f ˜ ( x ) : = k = 0 K B f , k cos ( k π x a ) , 0 x a ,
where K is a larger integer applied to truncate the infinite series.
By the Fourier-cosine approximation in (13), we can approximate Ψ ( x ) as follows:
Ψ ( x ) Ψ ˜ ( x ) : = k = 0 K B Ψ , k cos ( k π x a ) , 0 x a ,
where B Ψ , k = 2 a · F Ψ ( k π a ) , k = 0 , 1 , . .
Therefore, by (12) and (14), we can obtain the estimator of Ψ ( x ) as follows:
Ψ ^ ( x ) : = k = 0 K B ^ Ψ , k cos ( k π x a ) , 0 x a ,
where B ^ Ψ , k = 2 a · F Ψ ^ ( k π a ) , k = 0 , 1 , . .

4. Asymptotic Properties of Estimators

In this section, we investigate the asymptotic properties of F Ψ ^ ( s ) and Ψ ^ ( x ) . To begin, we need to examine the asymptotic properties of σ 2 ^ , ρ ^ , ϑ ^ ( s ) , and λ μ 2 ^ . For the ease of exposure, we firstly introduce some notation. Symbols P and D stand for the convergence in probability and in distribution, respectively. Define the set S : = k π / a : k = 0 , 1 , , K .
The following Lemma 1 gives the rate of convergence of σ 2 ^ .
Lemma 1. 
Let r n = h n θ with θ ( 0 , 1 2 ) . Suppose that n h n , n h n 2 0 , and h n 0 as n , then
σ 2 ^ P σ 2 , n , n ( σ 2 ^ σ 2 ) D N 0 , 2 σ 4 , n .
Proof. 
The proof of Lemma 1 is easily obtained by Appendix A in You and Gao [8]. □
Lemma 2. 
Under Assumptions 1 and 2, if θ ( 0 , 1 2 ) , n h n , n h n 1 + α 0 for some α 0 , 1 and h n 0 as n . Then,
ρ ^ ρ = O P ( 1 n h n ) .
Proof. 
It is easy to obtain Equation (17) by the proof of Theorem 1 in You and Yin [9]. □
Lemma 3. 
Suppose that h n 0 , n h n as n , we have
ϑ ^ ( s ) P ϑ ( s ) , n h n ( ϑ ^ ( s ) ϑ ( s ) ) D N ( 0 , ϑ ( 2 s ) 2 ϑ ( s ) ) .
Proof. 
Referring to the proof of Theorem 4.4 in You and Cai [7], we can easily obtain the result. □
Lemma 4. 
For real-valued integrable function f supported on [ 0 , ) , suppose that | f ( 0 + ) | < , | f ( a ) | < , and 0 | f ( y ) | d y < . Then for some positive constants c 1 and c 2 , we have
sup x [ 0 , a ] | f ( x ) f ˜ ( x ) | c 1 a K 1 + c 2 K a 1 a | f ( y ) | d y .
Proof. 
The proof of Lemma 4 can be referenced from Appendix A in Xie and Zhang [16]. □
Proposition 1. 
Under Assumptions 1 and 2, suppose that h n 0 , n h n as n , and we have
n h n 1 n m = 1 n Z m c h n 2 h n ( σ 2 + λ μ 2 ) D N ( 0 , λ μ 4 ) .
Proof. 
Firstly, according to the law of large numbers, we have
1 n m = 1 n Z m c h n 2 h n P σ 2 + λ μ 2 , n .
Because of the stationary and independent increments of the risk process (1), we have
lim n Var n h n ( 1 n m = 1 n Z m c h n 2 h n ) = lim n 1 h n Var Z m c h n 2 = λ μ 4 .
Through the central limit theorem, we obtain the result. □
Proposition 2. 
Assuming the same conditions as in Lemma 2, we have
λ μ 2 ^ λ μ 2 = O P 1 n h n .
Proof. 
By Equation (11), we can obtain
λ μ 2 ^ λ μ 2 = 1 n m = 1 n Z m c h n 2 h n 1 h n ( E [ Z m c h n ] ) h n ( λ μ 1 ^ + λ μ 1 ) ( λ μ 1 ^ λ μ 1 ) ( σ 2 ^ σ 2 ) .
Combining Lemmas 1 and 2 with Proposition 1, we can obtain
λ μ 2 ^ λ μ 2 = O P 1 n h n .
Theorem 1. 
Assuming the same conditions as in Lemma 2, we have
F Ψ ^ ( s ) F Ψ ( s ) = O P 1 n h n .
Proof. 
First, let us consider the case where s = 0 . By (12), we have
F Ψ ^ ( 0 ) F Ψ ( 0 ) = σ 2 ^ 2 + λ μ 2 ^ 2 c λ μ 1 ^ σ 2 2 + λ μ 2 2 c λ μ 1 = ( σ 2 ^ σ 2 ) + ( λ μ 2 ^ λ μ 2 ) 2 ( c λ μ 1 ) + σ 2 ^ + λ μ 2 ^ 2 ( c λ μ 1 ^ ) ( c λ μ 1 ) · ( λ μ 1 ^ λ μ 1 ) .
By Lemmas 1 and 2 and Equation (21), we can establish that
F Ψ ^ ( 0 ) F Ψ ( 0 ) = O P 1 n h n .
If s 0 , we have
F Ψ ^ ( s ) F Ψ ( s ) = ϑ ^ ( s ) + i c s ( 1 ρ ^ ) i s ϑ ^ ( s ) ϑ ( s ) + i c s ( 1 ρ ) i s ϑ ( s ) = ( 1 ρ ) ϑ ^ ( s ) ϑ ( s ) + ϑ ( s ) ρ ^ ρ 1 c ϑ ( s ) ϑ ^ ( s ) .
Moreover, by Lemmas 2 and 3, we have
F Ψ ^ ( s ) F Ψ ( s ) = O P 1 n h n , s 0 .
Finally, combining Equations (23) and (24), we have
F Ψ ^ ( s ) F Ψ ( s ) = O P 1 n h n .
Remark 1. 
For s 0 , by Equations (7) and (10) and Lemma 3, we have
n h n ( F Ψ ^ ( s ) F Ψ ( s ) ) = n h n 1 n m = 1 n c λ μ 1 e i s Z m 1 + ϑ ( s ) c h n Z m I D m n h n ϑ 2 ( s ) c ϑ ( s ) + o P ( 1 ) .
By the Theorem 1 in Mancini [29] and the central limit theorem, we obtain that
n h n ( F Ψ ^ ( s ) F Ψ ( s ) ) D N ( 0 , S ) ,
where
S = c λ μ 1 2 ( ϑ ( 2 s ) 2 ϑ ( s ) ) ϑ 4 ( s ) 2 λ c λ μ 1 0 x e i s x F ( d x ) μ 1 ϑ 3 ( s ) + λ μ 2 ϑ 2 ( s ) .
In Zhang and Yang [3] and You and Cai [7], they gave an estimator of ρ as follows:
ρ ^ * = 1 c n h n m = 1 n c h n Z m .
By Theorem 4.1 in You and Cai [7],
n h n ρ ^ * ρ D N 0 , σ 2 + λ μ 2 c 2 .
If we replace ρ ^ with ρ ^ * in (28), the estimator of F Ψ ( s ) is
F Ψ ^ * ( s ) = ϑ ^ ( s ) + i c s ( 1 ρ ^ * ) i s ϑ ^ ( s ) , s 0 , σ 2 ^ 2 c + λ μ 2 ^ 2 c 1 ρ ^ * , s = 0 .
By the central limit theorem,
n h n F Ψ ^ * ( s ) F Ψ ( s ) D N 0 , S *
where
S * = c λ μ 1 2 ( ϑ ( 2 s ) 2 ϑ ( s ) ) ϑ 4 ( s ) + λ μ 2 + σ 2 ϑ 2 ( s ) + 2 c λ μ 1 i s σ 2 + λ 0 x e i s x F ( d x ) λ μ 1 ϑ 3 ( s ) .
Comparing F Ψ ^ * ( s ) to F Ψ ^ ( s ) , we can easily see that S * is greater than S . Therefore, we can know that our estimator F Ψ ^ ( s ) works better.
Theorem 2. 
Assuming the same conditions as in Lemma 2, we have
sup 0 x a Ψ ^ ( x ) Ψ ˜ ( x ) = O P 1 n h n .
Proof. 
Firstly, by Equations (14) and (15), we obtain
Ψ ^ ( x ) Ψ ˜ ( x ) = k = 0 K [ B ^ Ψ , k B ˜ Ψ , k ] cos ( k π x a ) , 0 x a ,
which gives
sup 0 x a Ψ ^ ( x ) Ψ ˜ ( x ) k = 0 K B ^ Ψ , k B ˜ Ψ , k ( K + 1 ) · sup k = 0 , 1 , , K B ^ Ψ , k B ˜ Ψ , k .
Next, we derive the convergence rate of B ^ Ψ , k . For each integer k, we have
B ^ Ψ , k B ˜ Ψ , k = 2 a · F Ψ ^ ( k π a ) 2 a · F Ψ ( k π a ) 2 a · F Ψ ^ ( k π a ) F Ψ ( k π a ) .
By Theorem 1, we obtain
sup k = 0 , 1 , , K B ^ Ψ , k B ˜ Ψ , k 2 a sup s S F Ψ ^ ( s ) F Ψ ( s ) = O P 1 n h n ,
then, by Formulas (32)–(34), we can obtain the following result:
sup 0 x a Ψ ^ ( x ) Ψ ˜ ( x ) = O P 1 n h n .
Remark 2. 
Using the triangle inequality, we have
sup 0 x a Ψ ^ ( x ) Ψ ( x ) sup 0 x a Ψ ^ ( x ) Ψ ˜ ( x ) + sup 0 x a Ψ ( x ) Ψ ˜ ( x ) .
Here we can see that Ψ ( x ) satisfies the conditions of Lemma 4, | Ψ ( 0 + ) | < , | Ψ ( a ) | < , and 0 | Ψ ( y ) | d y < . Therefore, we can obtain
sup x [ 0 , a ] | Ψ ( x ) Ψ ˜ ( x ) | = O a K 1 + K a 1 a | Ψ ( x ) | d x .
Finally, following (31) and (35), we have
sup 0 x a Ψ ^ ( x ) Ψ ( x ) = O P 1 n h n + O a K 1 + K a 1 a | Ψ ( x ) | d x .
By the second term on the right side of Equation (36), large a and large K will lead to good approximation results. However, compared to K, the selection of the integration-range truncation parameter a holds significant importance. On the one hand, a small value of a can result in substantial integration-range truncation error. On the other hand, a large value of a necessitates a correspondingly large value of K to attain a certain level of accuracy. Based on Wang et al. [17] and Chau et al. [19], we take a = 200 and K = 2 10 . In this case, our estimators will perform very well with finite sample sizes by Section 6.

5. Simulation

In this section, we present some simulation studies, executed utilizing MATLAB R2024a, to meticulously illustrate the performance capabilities of our estimator when dealing with finite sample sizes. These simulations offer a robust demonstration of our estimator’s effectiveness in practical scenarios.
Example 1. 
In this example, we assume that the premium rate c = λ = 8 , μ 1 = 1 2 , and F ( x ) = 1 e 1 μ 1 x , x 0 .
In Example 1, the jump size U follows an E x p ( 1 μ 1 ) . In this case, the ruin probability is given by
Ψ ( x ) = r 1 + 1 μ 1 + 2 λ μ 1 σ 2 r 1 r 2 e r 1 x + r 2 + 1 μ 1 + 2 λ μ 1 σ 2 r 2 r 1 e r 2 x , x 0 ,
where r 2 < r 1 < 0 are negative roots of the following equation:
1 2 σ 2 s + c λ s + 1 μ 1 = 0 .
Example 2. 
In this example, we assume that the premium rate c = 8 , λ = 1.5 , the jump size U follows a G a m m a ( 4 , 1 ) with density
f ( x ) = 1 6 x 3 e x , x 0 .
Example 3. 
In this example, we assume that the premium rate c = 8 , λ = 6 , the jump size U follows a generalized Pareto distribution with density
f ( x ) = 6 5 ( 1 + x 5 ) 7 , x 0 .
Throughout this section, we assume that K = 2 10 , σ = 3.5 , h n = n 2 3 , and θ = 1 4 .
Firstly, according to Chau et al. [19] and Wang et al. [17], here we set the values of a as 200, 400, 600, 800, and 1000, respectively. In Figure 1, we plot the approximation Ψ ˜ ( x ) with a = 200, 400, 600, 800, and 1000 and the parameter settings in Example 1, and then we list absolute error between the approximation Ψ ˜ ( x ) and true value Ψ ( x ) in different cases of a in Table 1.
Next, from Table 1, by choosing the approximation value Ψ ˜ ( x ) of x = 1 , 2 , 3 , 4 , 5 , 6 points and comparing it with the real value, we can see that the average absolute error when a = 200 is smaller than in other cases, so here we choose a = 200 for subsequent simulation.
In Figure 2a, we plot the true ruin probability curve and 100 estimated curves with sample size n = 10,000 and the parameters setting in Example 1. In Figure 2b, we plot the true ruin probability curve and some mean curves with sample sizes n = 2000, 5000, 10,000, 20,000 and the parameter settings in Example 1, which are computed based on 100 simulation experiments.
In Figure 3a, we plot 100 estimated curves, both with and without a threshold function, along with the true ruin probability curve. The sample size is set to n = 10,000, following the parameter settings in Example 1. In Figure 3b, We plot the mean estimators for a sample size of n = 10,000, both with and without a threshold function, as well as the true ruin probability curve, using the parameter settings from Example 1. These results are based on 100 simulation experiments.
In Figure 4a, we present the mean curves for sample sizes n = 2000, 5000, 10,000, 20,000, along with the approximation Ψ ˜ ( x ) , using the parameter settings from Example 2. These results are based on 100 simulation experiments. Similarly, in Figure 4b, we display the mean curves for the same sample sizes, alongside the approximation Ψ ˜ ( x ) , using the parameter settings from Example 3, also derived from 100 simulation experiments.

6. Conclusions

In this article, our result only discussed the asymptotic properties between the approximate ruin probability and its estimator but did not address the asymptotic relationship between the estimator of the ruin probability and its true value. This is because when using the Fourier-cosine method, the true value of the ruin probability can be closely approximated by selecting appropriate values for a and K. In our work, the values of a and K are based on Chau et al. [19], and we validated these choices in Figure 1 under the case where the jump sizes in the model follow an exponential distribution, confirming their appropriateness. For more information on choosing a and K, see references [16,17]. Additionally, we further verified the conclusion of Theorem 4.9 in Examples 2 and 3. In Examples 2 and 3, it is difficult to determine the true value of the ruin probability directly. However, it can be estimated using the Monte Carlo method with a large sample size. In theory, this estimate should be very accurate, though it requires significant computational time. Ideally, in Examples 2 and 3, we should compare the Monte Carlo estimates with the approximations from the Fourier-cosine method to further validate the appropriateness of the a and K values.
We apply the threshold estimation technique and the Fourier-cosine method to construct an estimator for the ruin probability in the Wiener–Poisson risk model, utilizing high–frequency data. The methodology in this paper can also estimate other ruin-related quantities, such as the Gerber–Shiu function. However, for the Gerber–Shiu function, additional parameters or functions must be estimated, making the analysis more complex.

Author Contributions

Formal analysis, C.X.; methodology, H.Y.; writing, C.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China [Grant No. 12201345], Natural Science Foundation of Shandong Province [Grant No. ZR2020QA029], and the Youth Innovation Team of Shandong Universities [Grant No. 2022KJ174].

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors would like to express their sincere gratitude to the anonymous referees for their valuable comments and suggestions, which significantly improved the quality of this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Shimizu, Y. Non-parametric estimation of the Gerber-Shiu function for the Wiener-Poisson risk model. Scand. Actuar. J. 2012, 1, 56–69. [Google Scholar] [CrossRef]
  2. Zhang, Z.; Yang, H.; Yang, H. On a nonparametric estimator for ruin probability in the classical risk model. Scand. Actuar. J. 2012, 4, 309–338. [Google Scholar] [CrossRef]
  3. Zhang, Z.; Yang, H. Nonparametric estimate of the ruin probability in a pure-jump Lévy risk model. Insur. Math. Econ. 2013, 53, 24–35. [Google Scholar] [CrossRef]
  4. Masiello, E. On semiparametric estimation of ruin probabilities in the classical risk model. Scand. Actuar. J. 2014, 4, 283–308. [Google Scholar] [CrossRef]
  5. Zhang, Z.; Yang, H. Nonparametric estimate for the ruin probability in a Lévy risk model under low-frequency observation. Insur. Math. Econ. 2014, 59, 168–177. [Google Scholar] [CrossRef]
  6. You, H.; Guo, J.; Jiang, J. Interval estimation of the ruin probability in the classical compound Poisson risk model. Comput. Stat. Data Anal. 2020, 144, 106890. [Google Scholar] [CrossRef]
  7. You, H.; Cai, C. Nonparametric estimation for a spectrally negative Lévy process based on high frequency data. J. Comput. Appl. Math. 2019, 345, 196–205. [Google Scholar] [CrossRef]
  8. You, H.; Gao, Y. Non-parametric threshold estimation for the Wiener-Poisson risk Model. Mathematics 2019, 7, 506. [Google Scholar] [CrossRef]
  9. You, H.; Yin, C. Threshold estimation for a spectrally negative Lévy process. Math. Probl. Eng. 2020, 26, 3561089. [Google Scholar] [CrossRef]
  10. Gao, Y.; You, H. The speed of convergence of the threshold estimator of ruin probability under the tempered α-stable Lévy subordinator. Mathematics 2021, 9, 2654. [Google Scholar] [CrossRef]
  11. Zhang, Z. Estimating the Gerber-Shiu function by Fourier-Sinc series expansion. Scand. Actuar. J. 2017, 10, 898–919. [Google Scholar] [CrossRef]
  12. Zhang, Z.; Su, W. A new efficient method for estimating the Gerber-Shiu function in the classical risk model. Scand. Actuar. J. 2018, 5, 426–449. [Google Scholar] [CrossRef]
  13. Su, W.; Yong, Y.; Zhang, Z. Estimating the Gerber-Shiu function in the perturbed compound Poisson model by Laguerre series expansion. J. Math. Anal. Appl. 2019, 469, 705–729. [Google Scholar] [CrossRef]
  14. Shimizu, Y.; Zhang, Z. Estimating Gerber-Shiu functions from discretely observed Lévy driven surplus. Insur. Math. Econ. 2017, 74, 84–98. [Google Scholar] [CrossRef]
  15. Yang, Y.; Su, W.; Zhang, Z. Estimating the discounted density of the deficit at ruin by Fourier cosine series expansion. Stat. Probab. Lett. 2019, 146, 147–155. [Google Scholar] [CrossRef]
  16. Xie, J.; Zhang, Z. Statistical estimation for some dividend problems under the compound Poisson risk model. Insur. Math. Econ. 2020, 95, 101–115. [Google Scholar] [CrossRef]
  17. Wang, W.; Xie, J.; Zhang, Z. Estimating the time value of ruin in a Lévy risk model under low-frequency observation. Insur. Math. Econ. 2022, 104, 133–157. [Google Scholar] [CrossRef]
  18. Fang, F.; Oosterlee, C.W. A novel option pricing method based on Fourier cosine series expansions. Siam J. Sci. Comput. 2008, 31, 826–848. [Google Scholar] [CrossRef]
  19. Chau, K.W.; Yam, S.C.P.; Yang, H. Fourier-cosine method for ruin probabilities. J. Comput. Appl. Math. 2015, 281, 94–106. [Google Scholar] [CrossRef]
  20. Chau, K.W.; Yam, S.C.P.; Yang, H. Fourier-cosine method for Gerber-Shiu functions. Insur. Math. Econ. 2015, 61, 170–180. [Google Scholar] [CrossRef]
  21. Zhang, Z. Approximating the density of the time to ruin via Fourier-cosine series expansion. Astin Bull. 2017, 47, 169–198. [Google Scholar] [CrossRef]
  22. Lee, W.Y.; Li, X.; Shi, Y.; Yam, S.C.P. A Fourier-cosine method for finite-time ruin probabilities. Insur. Math. Econ. 2021, 99, 256–267. [Google Scholar] [CrossRef]
  23. Li, X.; Shi, Y.; Yam, S.C.P.; Yang, H. Fourier-cosine method for finite-time Gerber-Shiu functions. Siam J. Sci. Comput. 2021, 43, B650–B677. [Google Scholar] [CrossRef]
  24. Wang, W.; Zhang, Z. Computing the Gerber–Shiu function by frame duality projection. Scand. Actuar. J. 2019, 4, 291–307. [Google Scholar] [CrossRef]
  25. Karathanasopoulos, A.; Lo, C.C.; Ma, X.; Qin, Z. Maintaining cost and ruin probability. Rev. Quant. Financ. Account. 2021, V57, 759–793. [Google Scholar] [CrossRef]
  26. Shimizu, Y. A new aspect of a risk process and its statistical inference. Insur. Math. Econ. 2009, 44, 70–77. [Google Scholar] [CrossRef]
  27. Comte, F.; Genon-Catalot, V. Nonparametric estimation for pure jump Lévy processes based on high frequency data. Stoch. Process. Appl. 2009, 119, 4088–4123. [Google Scholar] [CrossRef]
  28. Comte, F.; Genon-Catalot, V. Estimation for Lévy processes from high frequency data within a long time interval. Ann. Stat. 2011, 39, 803–837. [Google Scholar] [CrossRef]
  29. Mancini, C. Non-parametric threshold estimation for models with stochastic diffusion coefficient and jumps. Scand. J. Stat. 2009, 36, 270–296. [Google Scholar] [CrossRef]
Figure 1. The approximation Ψ ˜ ( x ) with a = 200, 400, 600, 800, and 1000 and true value Ψ ( x ) .
Figure 1. The approximation Ψ ˜ ( x ) with a = 200, 400, 600, 800, and 1000 and true value Ψ ( x ) .
Mathematics 12 02945 g001
Figure 2. (a) True curve (bold blue line) and 100 estimated curves (green lines) with sample size n = 10,000. (b) The estimator Ψ ^ ( x ) with sample sizes n = 2000, 5000, 10,000, 20,000.
Figure 2. (a) True curve (bold blue line) and 100 estimated curves (green lines) with sample size n = 10,000. (b) The estimator Ψ ^ ( x ) with sample sizes n = 2000, 5000, 10,000, 20,000.
Mathematics 12 02945 g002
Figure 3. (a) True curve (bold black line), 100 estimated curves without threshold function (green lines), and 100 estimated curves with a threshold function (red lines) with sample size n = 10,000. (b) The estimators mean of sample sizes n = 10,000 with and without a threshold function.
Figure 3. (a) True curve (bold black line), 100 estimated curves without threshold function (green lines), and 100 estimated curves with a threshold function (red lines) with sample size n = 10,000. (b) The estimators mean of sample sizes n = 10,000 with and without a threshold function.
Mathematics 12 02945 g003
Figure 4. (a) The estimator Ψ ^ ( x ) with sample sizes n = 2000, 5000, 10,000, 20,000 and the approximation Ψ ˜ ( x ) . (b) The estimator Ψ ^ ( x ) with sample sizes n = 2000, 5000, 10,000, 20,000 and the approximation Ψ ˜ ( x ) .
Figure 4. (a) The estimator Ψ ^ ( x ) with sample sizes n = 2000, 5000, 10,000, 20,000 and the approximation Ψ ˜ ( x ) . (b) The estimator Ψ ^ ( x ) with sample sizes n = 2000, 5000, 10,000, 20,000 and the approximation Ψ ˜ ( x ) .
Mathematics 12 02945 g004
Table 1. Absolute error between the approximation Ψ ˜ ( x ) and Ψ ( x ) .
Table 1. Absolute error between the approximation Ψ ˜ ( x ) and Ψ ( x ) .
Absolute Error
x = 1 x = 2 x = 3 x = 4 x = 5 x = 6 Average Error
a = 2000.06220.07060.06660.0570.04510.0350.056083
a = 4000.06810.07260.06660.05860.04720.03540.058083
a = 6000.05470.06890.06770.05990.0490.03750.056283
a = 8000.05710.08220.06490.05740.05040.0340.057667
a = 10000.0730.0720.06860.05950.0460.03820.05955
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xie, C.; You, H. A Threshold Estimator for Ruin Probability Using the Fourier-Cosine Method in the Wiener–Poisson Risk Model. Mathematics 2024, 12, 2945. https://doi.org/10.3390/math12182945

AMA Style

Xie C, You H. A Threshold Estimator for Ruin Probability Using the Fourier-Cosine Method in the Wiener–Poisson Risk Model. Mathematics. 2024; 12(18):2945. https://doi.org/10.3390/math12182945

Chicago/Turabian Style

Xie, Chongkai, and Honglong You. 2024. "A Threshold Estimator for Ruin Probability Using the Fourier-Cosine Method in the Wiener–Poisson Risk Model" Mathematics 12, no. 18: 2945. https://doi.org/10.3390/math12182945

APA Style

Xie, C., & You, H. (2024). A Threshold Estimator for Ruin Probability Using the Fourier-Cosine Method in the Wiener–Poisson Risk Model. Mathematics, 12(18), 2945. https://doi.org/10.3390/math12182945

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop