Next Article in Journal
Globalization–Income Inequality Nexus in the Post-Soviet Countries: Analysis of Heterogeneous Dataset Using the Quantiles via Moments Approach
Next Article in Special Issue
A Comparison between Explainable Machine Learning Methods for Classification and Regression Problems in the Actuarial Context
Previous Article in Journal
A Self-Evolving Neural Network-Based Finite-Time Control Technique for Tracking and Vibration Suppression of a Carbon Nanotube
Previous Article in Special Issue
Facing a Risk: To Insure or Not to Insure—An Analysis with the Constant Relative Risk Aversion Utility Function
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Numerical Method for a Risk Model with Two-Sided Jumps and Proportional Investment

School of Mathematics and Statistics, Henan University of Science and Technology, Luoyang 471023, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2023, 11(7), 1584; https://doi.org/10.3390/math11071584
Submission received: 19 December 2022 / Revised: 9 March 2023 / Accepted: 22 March 2023 / Published: 24 March 2023
(This article belongs to the Special Issue Mathematical Economics and Insurance)

Abstract

:
In this paper, we consider a risk model with two-sided jumps and proportional investment. The upward jumps and downward jumps represent gains and claims, respectively. Suppose the company invests all of its surplus in a certain proportion in two types of investments, one is risk-free (such as bank accounts) and the other is risky (such as stocks). Our aim is to find the optimal admissible strategy (including the optimal dividend rate and the optimal ratio of investment in risky assets), to maximize the dividend value function, and discuss the effects of a number of parameters on dividend payments. Firstly, the HJB equation of the dividend value function is obtained by the stochastic analysis theory and the dynamic programming method, and the optimal admissible strategy is obtained. Since the integro-differential equation satisfied by the dividend value function is difficult to solve, we turn to the sinc numerical method to approximate solve it. Then, the error between the exact solution (ES) and the sinc approximate solution (SA) is analyzed. Finally, the relative error of a special numerical solution and an ES is given, and some examples of sensitivity analysis are discussed. This study provides a theoretical basis for insurance companies to prevent risks better.

1. Introduction

Risk is the basis of insurance. It should be said that from the moment of the birth of insurance, relevant scholars began to consciously analyze, study and control risk. People are accustomed to using the word “risk” to describe possible adverse events and disasters. If we accept that the natural and social environment we live in is a world full of risks, then risk has more or less become an unavoidable part of modern life, and people even use the word “risk” more and more frequently. In actuarial mathematics, risk theory has always been a hot topic. Many scholars have studied it from various aspects. It can be said that “a hundred flowers bloom and a hundred schools of thought contend”. Some scholars used econometric models and existing databases for research [1,2,3]. Of course, there are also those who set and conduct numerical simulation according to the meaningful parameters determined by scholars in the past. Our research was carried out according to the latter. The classical risk model under risk theory is its main research branch, which has been extensively studied and improved by many scholars, such as [4,5,6,7,8]. In classical risk model, the premium rate is often assumed to be a constant. This assumption makes it convenient to study and simplify the benefits of many risk quantities of interest. However, it ignores random changes in income. In the dual model, there are many explanations for random income, and we think this explanation also applies to the upward jumps in the two-sided jumps model. For example, on the one hand, for companies such as pharmaceuticals or oil, the upward jumps can be understood as the net present value of revenues from future inventions or discoveries. This explanation was also mentioned in Ng [9]. On the other hand, for companies engaged in research and development, we consider the upward jumps as incidental profits generated, such as the acquisition of patents or a sudden increase in sales. Bayraktar and Egami [10] used a similar model to simulate the capital of venture capital. We believe that these explanations also apply to the two-sided jumps model. Therefore, it is natural to introduce random upward jumps into risk models.
Moreover, the introduction of random returns can be traced back to [11]. Since then, articles on the risk measurement of various upward jumps risk models have emerged. Cheung et al. [12] considered a renewal risk model with two-sided jumps. Explicit solutions were obtained for certain special cases and different cost functions. Martín-González et al. [13] analyzed a Markov-modulated risk processes through limit theory. For more recent publications on two-sided jumps, the readers can refer to [14,15,16]. Unlike them, we consider reinvesting the company’s surplus.
As is known to all, insurance companies tend to reinvest their funds to obtain more significant benefits. This phenomenon has attracted the attention of researchers, and many scholars have conducted studies on this topic. See the examples [17,18,19]. In addition, the study of the dynamic optimal investment problem in risk model is also very rich. For example, Chen et al. [20] studied the investment-reinsurance model. Zhang and Chen [21] considered the reinsurance and investment problem in a risk model with default risks and jumps. Inspired by existing research, we also invest the surplus. In addition, unlike them, we considered two-sided jumps and solved them numerically by using the sinc method.
Since De Finetti [22] proposed the dividend strategy in the insurance risk model in 1957, many scholars studied the dividend issue in a great variety of risk models, such as [23,24,25,26,27,28]. Chen and Ou [25] applied the sinc numerical method to obtain the approximate solution of the two important actuarial quantities in the stochastic return risk model. Albrecher et al. [26] obtained the approximate solution of the value function by ratcheting strategies, but investment was not considered in their model. Unlike them, we consider an extended model with the upward jumps representing the random gains. Specifically, in Table 1, we summarize relevant studies mentioned above (whether two-sided jumps, investment and dividend strategies are considered) and whether solving the IDEs by the sinc numerical method.
Through the above literature, it is found that most relevant studies only consider a few factors in two-sided jumps, investments, dividends, numerical methods and error analysis. According to the authors, no one has considered the problem of the two-sided jumps risk with proportional investment. This provides a theoretical basis for insurance companies to prevent risk better. The main questions answered in this paper are as follows:
(1)
How do the upward jumps and the proportional investment affect dividend payments?
(2)
How does the volatility rate of risky assets affect dividend payments?
(3)
If the explicit solution for the related actuarial quantity is difficult to obtain, does the numerical solution exist?
(4)
Can we find the admissible optimal strategy through numerical simulation?
Next, we describe our work according to the following sections. In Section 2, we present the two-sided jumps model with proportional investment and define all its elements. In Section 3, we obtain the HJB equation satisfied by the optimal return function through stochastic control method. In Section 4, we derive the IDEs and the boundary conditions satisfied by the expected discounted dividend payments through stochastic analysis theory. In Section 5, we introduce the sinc function and use it to find the approximate solutions of IDEs. In Section 6, we provide some examples to describe the errors between the explicit solution and the numerical solution in a particular case. We also discuss some examples of sensitivity analysis.

2. Problem Formulation

We discuss the following two-sided jumps risk model
C ( t ) = u + c t S 1 ( t ) + S 2 ( t ) , t 0 ,
where C ( t ) is the surplus at time t, u = C ( 0 ) 0 is the initial surplus, c > 0 represents the premium received per unit time. The total claim S 1 ( t ) = i = 1 N 1 ( t ) X i and aggregate random return S 2 ( t ) = i = 1 N 2 ( t ) Y i (premium income or investment) are compound Poisson processes up to time t, including homogeneous Poisson processes N 1 ( t ) = sup { i : T 1 + T 2 + + T i t } with intensity λ 1 > 0 and N 2 ( t ) = sup { i : K 1 + K 2 + + K i t } with parameter λ 2 > 0 , and { T i } i = 1 are the i.i.d. inter-claim times and { K i } i = 1 are the i.i.d. inter-gain times. The claim sizes { X i } i = 1 are a positive i.i.d. random variable sequence, the common cumulative distribution function (c.d.f.) is F X and the common probability density function (p.d.f.) is f X ( · ) . The random return amount is given by the sequence of i.i.d. positive r.v.’s { Y i } i = 1 with c.d.f. F Y and p.d.f. f Y ( · ) .
Let us assume that the insurance company invests part of its surplus in the risk-free assets (such as bank accounts) and the rest in the risky assets (such as stocks). In particular, the risk-free investment { R t } t 0 satisfies
d R t = r R t d t ,
where r ( r > 0 ) represents the constant interest rate. The risky assets { Q t } t 0 following a geometric Brownian motion are defined as
Q t = e Z ( t ) ,
Z ( t ) = a t + σ W t ,
where a ( a > 0 ) represents the instant rate of the expected return of the risky assets and σ ( σ > 0 ) denotes the volatility rate of the risky assets. The standard Brownian motion { W t , t 0 } represents the uncertainty related to the return on investment. In addition, it is assumed that { X i } i = 1 , { Y i } i = 1 , { N 1 ( t ) } t 0 , { N 2 ( t ) } t 0 and { W t , t 0 } are all mutually independent. The risky asset process { Q t } t 0 satisfies
d Q t Q t = ( a + 1 2 σ 2 ) d t + σ d W t .
Let p denote the proportion of investment in risk assets capital, where 0 < p 1 . Obviously, 1 p means the proportion of investment in risk-free assets capital. For the sake of description (similar to [25]), the surplus process with investment at time t is still denoted by C ( t ) . Thus, the surplus process under the two kinds of investments satisfies
d C ( t ) = p C ( t ) d Q t Q t + ( 1 p ) C ( t ) d R t R t + c d t d S 1 ( t ) + d S 2 ( t ) ,
where C ( t ) indicates the left limit when the surplus approaches t from the left.
The admissible control strategy π is denoted by a two-dimensional adaptive process ( p t π , α t π ) , where p t π ( 0 , 1 ] represents proportion of investment in risk assets capital at time t and α t π is the dividend rate. It is only allowed if there is a ceiling on the dividend yield, which we are assuming is α > 0 . Meanwhile, to ensure the regular operation of the company, we presume α c . That is, 0 α t π α . Let C π ( t ) represent the controlled surplus process, we have
d C π ( t ) = p t π C π ( t ) d Q t Q t + ( 1 p t π ) C π ( t ) d R t R t + ( c α t π ) d t d S 1 ( t ) + d S 2 ( t ) .
Let D = 0 T π e δ t d D ( t ) represent the present value of total discounted dividend until the time of ruin T π = i n f { t : C π ( t ) 0 } , where δ > 0 is the discount factor. For u 0 , the expectation of D is expressed as
V π ( u ) = E [ D | C ( 0 ) = u ] .
Let Π represent the set of all admissible strategies (explained separately below), and the optimal return function (value function) is
V ( u ) = sup π Π V π ( u ) ,
and the optimal admissible strategy π * satisfies V ( u ) = V π * ( u ) .

3. Dynamic Programming

The common methods for solving value function and optimal strategies include dynamic programming principle, maximum principle and convex dual martingale method developed in recent years. The principle of dynamic programming relates the optimal control problem to a partial differential equation (which is the HJB equation). The stochastic maximum principle is developed from Pontryagin’s maximum principle in non-stochastic cases and is usually described under the framework of backward stochastic differential equations (BSDE). The convex dual martingale method is a combination of convex analysis and stochastic analysis. Because the dynamic programming approach is relatively simple and easy to use, we use it in this chapter.

3.1. HJB Equation

Theorem 1. 
The value function V ( u ) of Formula (9) is a continuous differentiable function of second order on ( 0 , ) , satisfies the following HJB equation
m a x π Π 1 2 ( p 0 π ) 2 u 2 σ 2 V ( u ) + ( 1 2 σ 2 + a r ) p 0 π u V ( u ) + ( 1 V ( u ) ) α 0 π + ( r u + c ) V ( u ) ( δ + λ 1 + λ 2 ) V ( u ) + λ 1 0 u V ( u x ) d F X ( x ) + λ 2 0 V ( u + y ) d F Y ( y ) = 0 .
where the boundary condition is V ( 0 ) = 0 .
Proof. 
Using the Bellman dynamic programming principle to prove Equation (10). In a small time interval (0, d t ], according to whether the first jump (including claims and random returns in risk models) occurs and the amount of the jump, V ( u ) is obtained as
α t π d t + e δ d t P 0 E [ V ( h t ) ] + P 1 E [ V ( h t X 1 ) ] + P 2 E [ V ( h t + Y 1 ) ] .
By I t o ^ formula, we obtain
E [ V ( h t ) ] = E [ V ( u ) + V ( u ) h t + 1 2 V ( u ) ( h t ) 2 ] + o ( d t ) ,
where
h t = u + p t π u σ d W t + ( 1 2 σ 2 p t π u + a p t π u + r u p t π r u + c α t π ) d t ,
P 0 = P ( T 1 > d t , K 1 > d t ) = 1 ( λ 1 + λ 2 ) d t + o ( d t ) ,
P 1 = P ( T 1 d t , K 1 > d t ) = λ 1 d t + o ( d t ) ,
P 2 = P ( T 1 > d t , K 1 d t ) = λ 2 d t + o ( d t ) .
Applying Taylor’s expansion and careful arrangement, Equation (11) is equal to
V ( u ) + { 1 2 ( p t π ) 2 u 2 σ 2 V ( u ) + ( 1 2 σ 2 p t π u + a p t π u + r u p t π r u + c α t π ) V ( u ) ( δ + λ 1 + λ 2 ) V ( u ) + α t π + λ 1 0 u V ( u x ) d F X ( x ) + λ 2 0 V ( u + y ) d F Y ( y ) } d t + o ( d t ) .
The above expression can be rearranged as
V ( u ) + { 1 2 ( p t π ) 2 u 2 σ 2 V ( u ) + ( 1 2 σ 2 + a r ) p t π u V ( u ) + ( 1 V ( u ) ) α t π + ( r u + c ) V ( u ) ( δ + λ 1 + λ 2 ) V ( u ) + λ 1 0 u V ( u x ) d F X ( x ) + λ 2 0 V ( u + y ) d F Y ( y ) } d t + o ( d t ) .
According to the methods in Gerber and Shiu [32], because V ( u ) is the optimal value, it must equal the maximum value of (16). So, we have proved Theorem 1. □
In the following, we give the properties of V ( u ) . Since the proof of Lemma 1 below is similar to Lemma 2 in [33], we only give the conclusion here.
Lemma 1. 
Suppose V (u) is a second-order continuous differentiable function and solve (10), we have
( i )
V ( u ) is strictly increasing.
( i i )
V ( u ) is strictly concave.
To maximize formula (10), for parameter α t π , the maximized expression is
( 1 V ( u ) ) α 0 π ,
for α t π [ 0 , α ] . So, at time zero, the optimal dividend rate is
α 0 π = 0 , V ( u ) > 1 , α , V ( u ) < 1 .
At time t [ 0 , T π ] , the optimal dividend rate can be expressed as
α t π * = 0 , V ( C π ( t ) ) > 1 , α , V ( C π ( t ) ) < 1 .
Let C t * π = inf t [ 0 , T π ] { C π ( t ) : V ( C π ( t ) ) = 1 } , C π ( t ) reaches the minimum value at t * . According to Lemma 1, the optimal dividend rate can be expressed as
α t π * = 0 , C π ( t ) < C t * π , α , C π ( t ) > C t * π .
So, this dividend strategy has the characteristics of a bang-bang strategy.
Inspired by Højgaard and Taksar [34], the following analysis can be carried out. The HJB Equation (10) can be rearranged as
max p 0 π ( 0 , 1 ] 1 2 ( p 0 π ) 2 u 2 σ 2 V ( u ) + ( 1 2 σ 2 + a r ) p t π u V ( u ) ( δ + λ 1 + λ 2 ) V ( u ) + ( r u + c α I ( V ( u ) < 1 ) ) V ( u ) + λ 1 0 u V ( u x ) d F X ( x ) + λ 2 0 V ( u + y ) d F Y ( y ) + α I ( V ( u ) < 1 ) = 0 .
According to Lemma 1, it is not difficult to know that V ( u ) < 0 and V ( u ) > 0 . In real life, the instant rate of the expected return of risky assets should be greater than the interest rate of the risk-free assets. So we can know ( 1 2 σ 2 + a r ) > 0 , then the maximum value of the above equation at time 0 with respect to p 0 π is
P 0 π = ( 1 2 σ 2 + a r ) V ( u ) u σ 2 V ( u ) .
We obtain
p 0 π = min { P 0 π , 1 } .
At time t [ 0 , T π ] , the ratio to invest in risk assets capital is
p t π * = min ( 1 2 σ 2 + a r ) V ( C π ( t ) ) C π ( t ) σ 2 V ( C π ( t ) ) , 1 .

3.2. Verification of Optimality

We give the optimal verification in the following. If the corresponding cost function of a strategy satisfies Equation (10), then the strategy is optimal.
Theorem 2. 
For all u 0 and π Π , let v ( u ) be a second-order continuous differentiable function satisfying (10), then v ( u ) V π ( u ) is obtained. Therefore, if π * Π exists, such that v ( u ) = V π * ( u ) , then there is
v ( u ) = sup π Π E [ D | C ( 0 ) = u ] = V ( u ) .
Proof. 
At time t, for any α t π and C ( t ) , we claim that
E 0 T e δ t α t π d t | C ( 0 ) = u v ( u ) .
To prove the above inequality (23), we consider the compensated process
e δ t v ( C ( t ) ) 0 T e δ τ β τ π d τ , 0 t T ,
where
β τ π = lim d t 0 1 d t E e δ d t v ( C ( τ + d t ) ) v ( C ( τ ) ) | C ( τ ) .
Note that in the theory of life contingencies, β τ π plays the role of risk premium rate. Since (24) is a martingale. We obtain
E e δ ( t T ) v ( C ( t T ) ) 0 t T e δ τ β τ π d τ | C ( 0 ) = u = v ( u ) ,
which means that
E 0 t T e δ τ β τ π d τ | C ( 0 ) = u v ( u ) .
By a method similar to the calculation of Equation (16), the right-hand side of (25) can be transformed into
1 2 ( p t π ) 2 u 2 σ 2 V ( u ) + ( 1 2 σ 2 p t π u + a p t π u + r u p t π r u + c α t π ) V ( u ) ( δ + λ 1 + λ 2 ) V ( u ) + λ 1 0 u V ( u x ) d F X ( x ) + λ 2 0 V ( u + y ) d F Y ( y ) .
Because v ( u ) satisfies (10), the sum of α τ π and (28) must be nonpositive. That is,
α τ π + β τ π 0 .
Together with (27), we have
E 0 t T e δ τ α τ π d t | C ( 0 ) = u v ( u ) .
Finally, (23) is obtained when t . □
Remark 1. 
Similar to Proposition 2.3. and 2.4. in Albrecher and Thonhauser [35], the existence and uniqueness of the solution to Theorem 1 can also be proved.

4. Integro-Differential Equations

Based on the analysis of Formula (18) in the previous chapter, we might assume that C t * π = b , where b > 0 is a constant barrier. Therefore, we consider that dividend payments will be distributed to shareholders at a constant rate α ( 0 < α c ) when C b ( t ) b . However, no dividend when C b ( t ) < b . At the same time, it is assumed that the proportion of surplus invested in risk assets is p ( 0 < p < 1 ) . We use { C b ( t ) } t 0 to represent the surplus process with dividend payments, then
d C b ( t ) = p C b ( t ) d Q t Q t + ( 1 p ) C b ( t ) d R t R t + c d t d S 1 ( t ) + d S 2 ( t ) , C b ( t ) < b p C b ( t ) d Q t Q t + ( 1 p ) C b ( t ) d R t R t + ( c α ) d t d S 1 ( t ) + d S 2 ( t ) , C b ( t ) b = p σ C b ( t ) d W t + ( β C b ( t ) + c ) d t d i = 1 N 1 ( t ) X i + d i = 1 N 2 ( t ) Y i , C b ( t ) < b p σ C b ( t ) d W t + ( β C b ( t ) + c α ) d t d i = 1 N 1 ( t ) X i + d i = 1 N 2 ( t ) Y i , C b ( t ) b
where β = ( a + 1 2 σ 2 ) p + ( 1 p ) r , and the net profit condition is c α + λ 2 E [ Y 1 ] > λ 1 E [ X 1 ] .
Under the threshold dividend strategy controlled by boundary b > 0 , the present value of total discounted dividend before the time of ruin T b = inf { t : C b ( t ) 0 } is
D u , b = α 0 T b e δ t I ( C b ( t ) > b ) d t
where δ > 0 is the discount factor. It is easy to obtain D u , b [ 0 , α / δ ) . For u 0 , the expectation of D u , b can be expressed as
V ( u ; b ) = E [ D u , b | C ( 0 ) = u ] .
Clearly, V ( u ; b ) behaves differently when the value range of u is different. For convenience, we denote V 1 ( u ; b ) for 0 u b and V 2 ( u ; b ) for b < u < . Then the following theorem is obtained.
Theorem 3. 
For 0 u b , we obtain IDE
1 2 p 2 u 2 σ 2 V 1 ( u ; b ) + ( β u + c ) V 1 ( u ; b ) ( δ + λ 1 + λ 2 ) V 1 ( u ; b ) + λ 2 0 b u V 1 ( u + y ; b ) d F Y ( y ) + b u V 2 ( u + y ; b ) d F Y ( y ) + λ 1 0 u V 1 ( u x ; b ) d F X ( x ) = 0 ,
and for b < u < , we obtain IDE
1 2 p 2 u 2 σ 2 V 2 ( u ; b ) + ( β u + c α ) V 2 ( u ; b ) ( δ + λ 1 + λ 2 ) V 2 ( u ; b ) + λ 1 0 u b V 2 ( u x ; b ) d F X ( x ) + u b u V 1 ( u x ; b ) d F X ( x ) + α + λ 2 0 V 2 ( u + y ; b ) d F Y ( y ) = 0 ,
the boundary conditions are satisfied
V 1 ( 0 ; b ) = 0 ;
lim u V 2 ( u ; b ) = α δ .
Proof. 
Considering a small interval (0, d t ], according to whether the first jump (including claims and random returns in risk models) occurs and the amount of the jump. For 0 u b , we obtain
V 1 ( u ; b ) = e δ d t { P 0 E [ V 1 ( h 1 t ; b ) ] + P 1 E [ V 1 ( h 1 t X 1 ; b ) ] + P 2 E [ E [ V 1 ( h 1 t + Y 1 ; b ) | Y 1 b h 1 t ] + E [ V 2 ( h 1 t + Y 1 ; b ) | Y 1 > b h 1 t ] ] } .
By I t o ^ formula, we have
E [ V 1 ( h 1 t ; b ) ] = E [ V 1 ( u ; b ) + V 1 ( u ; b ) ( h 1 t ) + 1 2 V 1 ( u ; b ) ( h 1 t ) 2 ] + o ( t ) .
If b < u < ,
V 2 ( u ; b ) = e δ d t { P 0 E [ V 2 ( h 2 t ; b ) ] + P 1 E [ E [ V 2 ( h 2 t X 1 ; b ) | X 1 ( 0 , h 2 t b ) ] + E [ V 1 ( h 2 t X 1 ; b ) | X 1 ( h 2 t b , ) ] ] + P 2 E [ V 2 ( h 2 t + Y 1 ; b ) ] + α d t } .
By I t o ^ formula, we have
E [ V 2 ( h 2 t ; b ) ] = V 2 ( u ; b ) + E [ V 2 ( u ; b ) ( h 2 t ) + 1 2 V 2 ( u ; b ) ( h 2 t ) 2 ] + o ( t ) .
where
h 1 t = u + p u σ d W t + ( β u + c ) d t , h 2 t = u + p u σ d W t + ( β u + c α ) d t ,
P 0 , P 1 and P 2 are defined by Formulas (13)–(15).
Subtracting V 1 ( u ; b ) and V 2 ( u ; b ) on both sides of (34) and (35), respectively, dividing d t and letting d t 0 . So we obtain (30) and (31).
Moreover, when u = 0 , it goes to ruin immediately. When u , ruin will never happen, and it always pays dividends at a rate of α per unit time. So we obtain (32) and (33). □
Remark 2. 
Because of the smoothness of the V ( u ; b ) , we obtain V 1 ( b ; b ) = V 2 ( b + ; b ) and V 1 ( b ; b ) = V 2 ( b + ; b ) . A detailed discussion can be seen in [36].

5. Sinc Asymptotic Numerical Analysis

It is not easy to obtain the ES of the IDEs (30) and (31) in theory, which requires us to set up a reasonable algorithm from the perspective of numerical analysis to obtain an effective approximate solution. At present, many numerical methods can be used to solve the IDEs, such as the sinc, finite element, finite difference and boundary element method. The error of the sinc method can reach exponential convergence after introducing exponential transformation. In addition, the sinc function has a good approximation effect for boundary value problem and oscillation problem [37]. So, here, we use the sinc method for numerical solution.

5.1. Sinc Function Preliminaries

The sinc numerical method was first proposed by Frank Stenger [38], and it has been widely used in the field of numerical analysis; see [39,40,41]. Because the explicit solutions of Equations (30) and (31) are challenging to obtain, we discuss the numerical solution.
We use the Cardinal function C ( g , h ) to characterize the sinc methods, which is the sinc expansion of function g, defined as
C ( g , h ) ( x ) = k N g ( k h ) sinc x h k , < x < .
where h > 0 represents the step size. The sinc function defined on the real number field R is
sinc ( z ) = sin ( π z ) ( π z ) , z 0 , 1 , z = 0 .
When it has equally spaced nodes, it is expressed as
S ( j , h ) ( z ) = sinc z j h h , j Z .
Let z = k h , where k h are the interpolating points, then
S ( j , h ) ( k h ) = δ j k ( 0 ) = 0 , k j , 1 , k = j .
Definition 1. 
([39], p.73, Definition 1.5.2) Let ν represent a smooth one-to-one mapping from Γ to the real number field R , with end-point s 1 and s 2 onto R , such that ν ( s 1 ) = , ν ( s 2 ) = . Let κ = ( ν ) 1 represent the inverse map, hence
Γ = { z C : z = κ ( u ) , u R } .
Based on ν, κ and h > 0 , the sinc points z k are defined as
z k = z k ( h ) = κ ( k h ) , k Z ,
and a function ζ is defined as ζ ( z ) = e ν ( z ) . Let α ^ , β ^ and d ^ all be greater than zero. On Γ, we define L α ^ , β ^ , d ^ ν as the set of all functions g, here
g ( z ) = O ( | ζ ( z ) | α ^ ) , z t 1 , O ( | ζ ( z ) | β ^ ) , z t 2 ,
such that the Fourier transform { g ν 1 } satisfies
{ g ν 1 } ( ξ ) = o ( e d ^ ξ ) ,
for all ξ R , where α ^ , β ^ ( 0 , 1 ] , d ^ ( 0 , π ) . In addition, we define the family of functions on Γ as M α ^ , β ^ , d ^ ( ν ) , such that ϑ = g L g L α ^ , β ^ , d ^ ( ν ) and where L g is defined by
L g ( u ) = g ( t 1 ) + ζ ( u ) g ( t 2 ) 1 + ζ ( u ) .
Writing N ( N > 0 ) as a integer, and integers M, m, and a diagonal matrix D m ( g ) and a computation operator V m are defined as
m = β ^ N α ^ , m = M + N + 1 , D m ( g ) = d i a g [ g ( u M ) , , g ( u N ) ] , V m ( g ) = ( g ( u M ) , , g ( u N ) ) T ,
where [ · ] represents the greatest integer function, g > 0 is an arbitrary function, and T means transpose. Set
h = π d ^ β ^ N 1 2 , δ k j ( 1 ) = 1 2 + 0 k j sin ( π t ) π t d t , γ j = S ( j , h ) ν , j = M , , N , ω j = γ j , j = M + 1 , , N 1 , ω M = 1 1 + ζ j = M + 1 N γ j 1 + e j h , ω N = ζ 1 + ζ j = M N 1 e j h γ j 1 + e j h , ω M * = ( 1 + e M h ) 1 1 + ζ j = M + 1 N γ j 1 + e j h ,
ω N * = ( 1 + e N h ) ζ 1 + ζ j = M N 1 e j h γ j 1 + e j h , Ω m = ( ω M , , ω N ) , Ω M * = ( ω M * , ω M + 1 , , ω N 1 , ω N * ) .
Theorem 4 
([42], p.106). Let ν ( z ) be a one-to-one conformal transformation defined on Γ. So
δ j k ( 0 ) = [ S ( j , h ) ν ( z ) ] | z = z k = 0 , k j , 1 , k = j . δ j k ( 1 ) = h d d ν [ S ( j , h ) ν ( z ) ] | z = z k = ( 1 ) k j k j , k j , 0 , k = j .
and
δ j k ( 2 ) = h 2 d 2 d ν 2 [ S ( j , h ) ν ( z ) ] | z = z k = 2 ( 1 ) k j ( k j ) 2 , k j , π 2 3 , k = j .

5.2. Numerical Approximate Solution

Let ν ( z ) = log z , for z > 0 , then the one-to-one mapping of R + R is defined, so ζ ( z ) = e ν ( z ) = z . For h > 0 , the sinc grid points z k ( k Z ) take the form
z k = ν 1 ( k h ) = e k h .
According to Formula (37), the sinc function after composite transform
S j ( z ) = S ( j , h ) ν ( z ) = sinc ν ( z ) j h h
on the interval ( 0 , ) for z Γ .
According to the sinc method steps, the IDEs (30)–(31) can be rewritten as
1 2 p 2 u 2 σ 2 V ( u ; b ) + ( β u + c α I ( x > b ) ) V ( u ; b ) ( δ + λ 1 + λ 2 ) V ( u ; b ) + λ 1 0 u V ( u x ; b ) d F X ( x ) + λ 2 0 V ( u + y ; b ) d F Y ( y ) + α I ( x > b ) = 0 .
Applying the convolution formula to (39), we have
1 2 p 2 u 2 σ 2 V ( u ; b ) + ( β u + c α I ( x > b ) ) V ( u ; b ) ( δ + λ 1 + λ 2 ) V ( u ; b ) + λ 1 0 u V ( x ; b ) f X ( u x ) d x + λ 2 u V ( y ; b ) f Y ( y u ) d y + α I ( x > b ) = 0 ,
furthermore,
V ( 0 ; b ) = 0 , lim u V ( u ; b ) = α δ .
From the Definition 1 we can obtain
L V ( u ; b ) = V ( x 1 ; b ) + ζ ( u ) V ( x 2 ; b ) 1 + ζ ( u ) .
When x 1 = 0 , x 2 , set
U ( u ) = V ( u ; b ) L V ( u ; b ) = V ( u ; b ) u 1 + u α δ ,
then U ( u ) L α ^ , β ^ , d ^ ( ν ) , so
V ( u ; b ) = U ( u ) + u 1 + u α δ ,
V ( u ; b ) = U ( u ) + 1 ( 1 + u ) 2 α δ ,
V ( u ; b ) = U ( u ) 2 ( 1 + u ) 3 α δ .
Substituting (42)–(44) into (40), and each side of the above equation is divided by 1 2 p 2 u 2 σ 2 , the following equation is obtained
U ( u ) + η 1 ( u ) U ( u ) + η 2 ( u ) U ( u ) + λ 1 η 3 ( u ) 0 u f X ( u x ) U ( x ) d x + λ 2 η 3 ( u ) u f Y ( y u ) U ( y ) d y + R ( u ) = 0 ,
where
η 1 ( u ) = 2 ( β u + c α I ( x > b ) ) p 2 u 2 σ 2 , η 2 ( u ) = 2 ( δ + λ 1 + λ 2 ) p 2 u 2 σ 2 , η 3 ( u ) = 2 p 2 u 2 σ 2 , R ( u ) = 2 α I ( x > b ) p 2 u 2 σ 2 2 α δ 1 ( 1 + u ) 3 + α δ 1 ( 1 + u ) 2 η 1 ( u ) + α δ u 1 + u η 2 ( u ) + λ 1 0 u α δ x 1 + x η 3 ( u ) f X ( u x ) d x + λ 2 u α δ y 1 + y η 3 ( u ) f Y ( y u ) d y .
When u equals 0 or u goes to , we obtain
U ( 0 ) = 0 , lim u U ( u ) = 0 .
Then according to Theorems 1.5.13, 1.5.14 and 1.5.20 in reference [39], we obtain
0 u f X ( u x ) U ( x ) d x j = M N i = M N ω i A i j W j ,
u f Y ( y u ) U ( y ) d y j = M N i = M N ω i B i j W j ,
U ( u ) U ˜ ( u ) = j = M N W j S ( j , h ) ν ( u ) ,
where
A = X F ( S ) X 1 , B = Y F ( S ) Y 1 ,
with S a diagonal matrix. A = [ A i j ] and B = [ B i j ] are the ( i , j ) elements of matrices A and B, respectively. W j denotes approximate estimate of U ( W j ) , and ν ( u ) = ln u .
Substituting (46) and (47) into (45), and using sinc grid points u k ( k = M , , N ) to approach u, and substituting (48) into (45), we obtain
U ˜ ( u k ) + η 1 ( u k ) U ˜ ( u k ) + η 2 ( u k ) U ˜ ( u k ) + λ 1 η 3 ( u k ) j = M N i = M N ω i ( u k ) A i j W j + λ 2 η 3 ( u k ) j = M N i = M N ω i ( u k ) B i j W j + R ( u k ) = 0 ,
where
U ˜ ( u k ) = j = M N W j [ S ( j , h ) ν ( u k ) ] = W j = M N W j δ j k ( 0 ) ,
U ˜ ( u k ) = j = M N W j [ S ( j , h ) ν ( u k ) ] = j = M N W j ν ( u k ) h 1 δ j k ( 1 ) ,
U ˜ ( u k ) = j = M N W j [ S ( j , h ) ν ( u k ) ] = j = M N W j ν ( u k ) δ j k ( 1 ) h + ( ν ( u k ) ) 2 δ j k ( 2 ) h 2 .
By replacing (50)–(52) in (49), the following equation is obtained
j = M N { ν ( u k ) δ j k ( 1 ) h + ( ν ( u k ) ) 2 δ j k ( 2 ) h 2 + η 1 ( u k ) ν ( u k ) δ j k ( 1 ) h + η 2 ( u k ) δ j k ( 0 ) + λ 1 η 3 ( u k ) i = M N ω i ( u k ) A i j + λ 2 η 3 ( u k ) i = M N ω i ( u k ) B i j } W j = R ( u k ) .
Multiplying both ends of the above equation by h 2 ( ν ( u k ) ) 2 , we have
j = M N { δ j k ( 2 ) + h ν ( u k ) ( ν ( u k ) ) 2 + η 1 ( u k ) ν ( u k ) δ j k ( 1 ) + h 2 η 2 ( u k ) ( ν ( u k ) ) 2 δ j k ( 0 ) + h 2 λ 1 η 3 ( u k ) ( ν ( u k ) ) 2 i = M N ω i ( u k ) A i j + h 2 λ 2 η 3 ( u k ) ( ν ( u k ) ) 2 i = M N ω i ( u k ) B i j } W j = h 2 R ( u k ) ( ν ( u k ) ) 2 .
Since
δ j k ( 0 ) = δ k j ( 0 ) , δ j k ( 1 ) = δ k j ( 1 ) , δ j k ( 2 ) = δ k j ( 2 ) , ν ( u k ) ( ν ( u k ) ) 2 = 1 ν ( x k ) ,
thus (54) can be rewritten as
j = M N { δ k j ( 2 ) + h 1 ν ( x k ) η 1 ( u k ) ν ( u k ) δ k j ( 1 ) + h 2 η 2 ( u k ) ( ν ( u k ) ) 2 δ k j ( 0 ) + h 2 λ 1 η 3 ( u k ) ( ν ( u k ) ) 2 i = M N ω i ( u k ) A i j + h 2 λ 2 η 3 ( u k ) ( ν ( u k ) ) 2 i = M N ω i ( u k ) B i j } W j = h 2 R ( u k ) ( ν ( u k ) ) 2 , k = M , , N .
Set I ( m ) = [ δ k j ( m ) ] , m = 1 , 0 , 1 , 2 , where δ k j ( m ) is the element in row k and column j. Then, (55) can be re-expressed as
Q W = R ,
where W = [ W j ] T , j = M , , N ,
R = h 2 R ( x M ) ( ν ( x M ) ) 2 , , h 2 R ( x N ) ( ν ( x N ) ) 2 , Q = I ( 2 ) + h D m 1 ν η 1 ν I ( 1 ) + h 2 D m η 2 ( ν ) 2 I ( 0 ) + h 2 λ 1 D m η 3 ( ν ) 2 Ω m * A + h 2 λ 2 D m η 3 ( ν ) 2 Ω m * B .
Equation (56) is M + N + 1 -dimensional, where W j are unknown parameters, j = M , , N . By solving Equation (56), W j can be obtained. Then, combining Equations (41) and (48), the numerical solution of V ( u ; b ) is
V ( u ; b ) V ˜ ( u ; b ) = U ˜ ( u ) + u 1 + u α δ = j = M N W j S ( j , h ) ν ( x ) + u 1 + u α δ .
Remark 3. 
Since the model involves two stochastic components (upward jumps and downward jumps), the analytical solution of the optimal control problem is difficult to obtain. The numerical solution V ( u ) j = M N W j S ( j , h ) ν ( x ) + u 1 + u α t π * δ of HJB Equation (10) can be obtained by using the sinc method, and substitute (43) and (44) into (22). By summarizing Equations (18) and (21), we find the approximately optimal admissible policy π * = ( p t π * , α t π * ) , where
p t π * = min ( 1 2 σ 2 + a r ) U ( C π ( t ) ) + 1 ( 1 + C π ( t ) ) 2 α t π * δ C ( t ) σ 2 U ( C ( t ) ) 2 ( 1 + C ( t ) ) 3 α t π * δ , 1 , α t π * = 0 , C π ( t ) < C t * π , α , C π ( t ) > C t * π .

5.3. Error Analysis

Since the solution we obtained is approximate, it is necessary to study and analyze the influence of the sinc approximation method on the actual calculation results and to obtain the error between the SA and the ES. Next, we carry out research on this part.
We set
G ( u ) = λ 1 η 3 ( u ) 0 u f X ( u x ) U ( x ) d x λ 2 η 3 ( u ) u f Y ( y u ) U ( y ) d y R ( u ) ,
then Equation (45) becomes
U ( u ) + η 1 ( u ) U ( u ) + η 2 ( u ) U ( u ) G ( u ) = 0 ,
then (58) corresponds to Equation ( 4.12 ) in reference [38].
Assumption A1. 
Similar to Assumption 4.3. in Chapter 4 of the literature [43], suppose η 1 / ν , 1 / ( ( ν ) ) and η 2 / ( ν ) 2 belong to H ( D ) , that G / ( ν ) 2 L α ^ ( D ) , and the Equation (58) has a unique solution U L α ^ ( D ) .
Theorem 5. 
Under the condition of Assumption A1, let U denote the ES of (58), let U ˜ represent the approximate solution and satisfy (57). The ES of Equation (56) is represented by the vector W = ( W M , , W N ) ) T . Then, there is a constant c ˜ that is independent of N and greater than zero, we have
s u p u Γ | U ( u ) U ˜ ( u ) | c ˜ N 5 / 2 e ( π d α ^ N ) 1 / 2 .
Proof. 
Let ϑ N be
ϑ N ( u ) = k = M N U ( u k ) S ( k , h ) ν ( u ) ,
then, by the triangle inequality, we have
| U ( u ) U ˜ ( u ) | | U ( u ) ϑ N ( u ) | + | ϑ N ( u ) U ˜ ( u ) | .
By Assumption A1, U L α ^ ( D ) , and by Theorem 4.2.5 of [38], we get
s u p u Γ | U ( u ) ϑ N ( u ) | c * N 1 / 2 e ( π d α ^ N ) 1 / 2 ,
where c * ( c * > 0 ) is a constant independent of N. In Inequality (61), | ϑ N ( u ) U ˜ ( u ) | satisfies the following relation
| ϑ N ( u ) U ˜ ( u ) | = | j = M N [ U ( u j ) W j ] S ( j , h ) ν ( u ) u 1 + u α δ | j = M N | U ( u j ) W j | | S ( j , h ) ν ( u ) | j = M N | U ( u j ) W j | 2 1 / 2 j = M N | S ( j , h ) ν ( u ) | 2 1 / 2 j = M N | U ( u j ) W j | 2 1 / 2 = U W .
If u Γ then k Z | S ( k , h ) ν ( u ) | 2 = 1 , similar to Theorem 7.2.6 in the literature [38], we obtain
U W = Q 1 Q ( U W ) = Q 1 [ Q U R ] Q 1 Q U R c * N 5 / 2 e ( π d α ^ N ) 1 / 2 ,
with c * being a constant independent of N. In addition, we continue to use the formula (7.2.18) in the literature [38] to define C. Therefore, Formula (59) can be obtained by combining Formulas (60)–(64). □
Through Formulas (42), (57) and (59), we have
s u p u Γ | V ( u ; b ) V ˜ ( u ; b ) | c ˜ N 5 / 2 e ( π d α ^ N ) 1 / 2 .

6. Numerical Illustrations

In the following, we give numerical examples of error analysis and sensitivity analysis of V ( u ; b ) . In all examples, we assume that f X ( x ) and f Y ( y ) follow exponential distributions, the p.d.f. as f X ( x ) = μ 1 e μ 1 x 1 x > 0 and f Y ( y ) = μ 2 e μ 2 y 1 y > 0 , respectively.

6.1. Error Analysis Example

In this part, we give an example where the ES can be found out. By calculating the relative error between the SA and the ES, the superiority of the sinc method is verified.
When p = 0 , r = 0 , λ 1 = λ 2 = λ and μ 1 = μ 2 = μ , rearrange Equations (30) and (31), we have, for b < u < , we obtain
( c α ) V 2 ( u ; b ) ( δ + 2 λ ) V 2 ( u ; b ) + λ u V 2 ( y ; b ) f Y ( y u ) d y + λ b u V 2 ( x ; b ) f X ( u x ) d x + 0 b V 1 ( x ; b ) f X ( u x ) d x + α = 0 .
Applying the operator d 2 d u 2 μ 2 , we have
( c α ) V 2 ( u ; b ) ( δ + 2 λ ) V 2 ( u ; b ) μ 2 ( c α ) V 2 ( u ; b ) + μ 2 δ V 2 ( u ; b ) μ 2 α = 0 .
The above differential equation has a special solution α δ . Characteristic equation of the differential equation
( c α ) ϱ 3 ( δ + 2 λ ) ϱ 2 μ 2 ( c α ) ϱ + μ 2 δ = 0 ,
which has three roots ϱ 1 , ϱ 2 and ϱ 3 ( ϱ 1 < 0 < ϱ 2 < μ < ϱ 3 ). For 0 u b ,
c V 1 ( u ; b ) ( δ + 2 λ ) V 1 ( u ; b ) + λ 0 u V 1 ( x ; b ) f X ( u x ) d x + λ b u V 1 ( y ; b ) f Y ( y u ) d y + b V 2 ( y ; b ) f Y ( y u ) d y = 0 .
In the same way, we can obtain the characteristic equation of the differential equation
c s 3 ( δ + 2 λ ) s 2 μ 2 c s + μ 2 δ = 0 ,
which has three roots s 1 , s 2 and s 3 ( s 1 < 0 < s 2 < μ < s 3 ). Similar to the method in Zhi [44] Section 4.1 (pp. 784–785), we obtain
V 2 ( u ) = D 1 e ϱ 1 u + α δ , V 1 ( u ) = E 1 e s 1 u + E 2 e s 2 u + E 3 e s 3 u ,
where D 1 , E 1 , E 2 and E 3 are undetermined coefficient. In order to solve the unknown coefficients mentioned above, using an analysis similar to [44], we have
E 1 + E 2 + E 3 = 0 ,
E 1 e s 1 b + E 2 e s 2 b + E 3 e s 3 b = D 1 e ϱ 1 b + α δ ,
c ( E 1 s 1 e s 1 b + E 2 s 2 e s 2 b + E 3 s 3 e s 3 b ) ( c α ) D 1 ϱ 1 e ϱ 1 b = α , ( c α ) D 1 ϱ 1 e ϱ 1 b ( δ + 2 λ ) ( D 1 e ϱ 1 b + α δ ) + α
= c ( E 1 s 1 e s 1 b + E 2 s 2 e s 2 b + E 3 s 3 e s 3 b ) ( δ + 2 λ ) ( E 1 e s 1 b + E 2 e s 2 b + E 3 e s 3 b ) .
So we obtain
V ( u ; b ) = E 1 e s 1 u + E 2 e s 2 u + E 3 e s 3 u , 0 u b , D 1 e ϱ 1 u + α δ , u > b .
Here, the corresponding relative error (RE) is obtained by comparing the ES with the SA. To obtain better differentiation under different initial earnings, here, we consider a constant barrier b, let b = 50 ; thus, the specific situation of V ( u ; 50 ) can be directly listed in Table 2.
The results show that the SA and the ES are very close, and the difference between the results of the two ways is in a controllable range.

6.2. Sensitivity Analysis

Here, we give the value of each parameter and discuss the influence of some parameters on V ( u ; b ) . To study its sensitivity, we consider a constant barrier b, let b = 0.5 . Under the situation of no special instructions, the basic parameters in the following examples are set as follows: λ 1 = 5 , α = 0.1 , δ = 0.06 , r = 0.02 , a = 0.5 , c = 0.4 , μ 1 = 5 , μ 2 = 1 .
Example 1. 
From Figure 1, we can see the impact of the parameter λ 2 on the results of V ( u ; 0.5 ) for u [ 0 , 3 ] under λ 2 = 1 and λ 2 = 3 . It can be seen that when the parameter λ 2 = 1 , the curve V ( u ; 0.5 ) fluctuates greatly with the different investment proportion p. In addition, with a fixed value of p, as u increases, V ( u ; 0.5 ) under the influence of λ 2 firstly increases and then gradually decreases until it has almost no influence.
Example 2. 
From Figure 2, we can see the impact of the parameter σ on the results of V ( u ; 0.5 ) for u [ 0 , 3 ] under σ = 1 and σ = 6 . It can be seen that the change of parameter σ has a great impact on V ( u ; 0.5 ) , significantly when the surplus is invested in risky assets in large quantities. This is also in line with reality. Because the volatility rate of risky assets σ increases, it means that investment in risky assets may gain more profits, but it may also have more losses.
Example 3. 
From Figure 3 and Figure 4, we can see the impact of the parameter λ 2 on the results of V ( u ; b ) for u [ 0 , 1 ] under λ 2 = 1 and λ 2 = 0 . Suppose that the optimal strategy is π * = ( p t π * , α t π * ) Π , of which α t π * = α = 0.1 , and find the optimal investment proportion p t π * within u [ 0 , 1 ] . The image obtained by data fitting (we give some data, see Table 3 and Table 4). When there is the upward jumps, V ( u ; b ) will be higher, and when the initial surplus of the insurance company is large enough, the optimal investment proportion will be larger (i.e., more of the surplus will be invested in the risky assets).
As can be seen from the above examples, the upward jumps have a big impact on dividend payments. When the parameter λ 2 of the upward jumps are large, the dividend payments are also large. Insurance companies with large initial surplus are more inclined to invest most of their surplus in risky assets to gain more profits. In contrast, insurance companies with small initial surpluses will invest most of their surplus in risk-free assets. In addition, we can see that the volatility rate of risky assets σ increases, it means that investment in risky assets may gain more profits, but it may also have more losses. This is also realistic. Finally, we obtain an optimal strategy through data fitting to maximize the dividend payments.

7. Conclusions

In this paper, we consider the proportional investment in the two-sided jumps model. In existing literature, most of the models considered are classical or dual risk models. We found that the two-sided jumps risk model is also of great practical significance through consulting the literature (see [12,13,14,15,16,30,45,46,47,48]). However, due to the complexity and processing difficulty of the two-sided jumps risk model, few scholars consider investing the surplus of the insurance companies. To solve this problem, we found a good method: sinc numerical method; however, there are some limitations to this approach. For example, in the analysis error, we give an upper limit for the error between the SA and the ES. Because the ES of the equation is difficult to obtain, we can only give the exact result of the error in special cases. Perhaps with the further research in the future, we may find a way to solve the ES of this model. In addition to the limitations of the method itself, on the application side, detailed premium income and claim data of insurance companies involve trade secrets and are difficult to obtain. Therefore, we cannot conduct further research and analysis under the econometric model. On this point, we will try to cooperate with insurance companies in the future.
In addition, our model can be extended as follows: (i) We can consider the Gerber–Shiu function and the ruin probability problems. (ii) On the basis of this risk model, we can consider maximizing the expected utility of terminal wealth. (iii) Since it is impossible for insurance companies to observe earnings at any time, we can consider the model under random observation to better conform to the actual situation. (iv) We will cooperate with insurance companies to establish an econometric model based on real premium income, claims and investment data to study relevant optimal strategy issues. However, these new directions and goals may lead to new technical difficulties. We also leave these challenges for future research.

Author Contributions

Conceptualization, C.W.; Methodology, J.X., N.D. and S.W.; Software, J.X., N.D. and S.W.; Validation, J.X.; Formal analysis, J.X. and C.W.; Investigation, C.W.; Data curation, J.X. and N.D.; Writing—review & editing, J.X. and C.W.; Supervision, C.W.; Project administration, C.W.; Funding acquisition, C.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (grant numbers: 71801085).

Data Availability Statement

Not applicable.

Acknowledgments

We thank the referees for their valuable comments and suggestions. We thank Chen Xu for her help with the numerical simulation.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Terziolu, M.K. Advances in Econometrics, Operational Research, Data Science and Actuarial Studies: Techniques and Theories; Springer: New York, NY, USA, 2021. [Google Scholar]
  2. Wüthrich, M.V.; Merz, M. Statistical Foundations of Actuarial Learning and its Applications; Springer: New York, NY, USA, 2023. [Google Scholar]
  3. Wüthrich, M.V.; Merz, M. Financial Modeling, Actuarial Valuation and Solvency in Insurance; Springer: New York, NY, USA, 2013. [Google Scholar]
  4. Gerber, H.U.; Shiu, E.S. On the time value of ruin. North Am. Actuar. J. 1998, 2, 48–72. [Google Scholar] [CrossRef]
  5. Albrecher, H.; Cheung, E.C.; Thonhauser, S. Randomized observation periods for the compound Poisson risk model: The discounted penalty function. Scand. Actuar. J. 2013, 2013, 424–452. [Google Scholar] [CrossRef]
  6. Cheung, E.C.; Liu, H. Joint moments of discounted claims and discounted perturbation until ruin in the compound Poisson risk model with diffusion. Probab. Eng. Inf. Sci. 2022, 1–31. [Google Scholar] [CrossRef]
  7. Zhu, J.; Li, S. Time-consistent investment and reinsurance strategies for mean-variance insurers under stochastic interest rate and stochastic volatility. Mathematics 2020, 8, 2183. [Google Scholar] [CrossRef]
  8. Pirozzi, E. On a fractional stochastic risk model with a random initial surplus and a multi-layer strategy. Mathematics 2022, 10, 570. [Google Scholar] [CrossRef]
  9. Ng, A.C. On a dual model with a dividend threshold. Insur. Math. Econ. 2009, 44, 315–324. [Google Scholar] [CrossRef]
  10. Bayraktar, E.; Egami, M. Optimizing venture capital investments in a jump diffusion model. Math. Methods Oper. Res. 2008, 67, 21–42. [Google Scholar] [CrossRef] [Green Version]
  11. Boucherie, R.J.; Boxma, O.J.; Sigman, K. A note on negative customers, GI/G/1 workload, and risk processes. Probab. Eng. Informational Sci. 1997, 11, 305–311. [Google Scholar] [CrossRef] [Green Version]
  12. Cheung, E.C.; Liu, H.; Willmot, G.E. Joint moments of the total discounted gains and losses in the renewal risk model with two-sided jumps. Appl. Math. Comput. 2018, 331, 358–377. [Google Scholar] [CrossRef]
  13. Martín-González, E.M.; Murillo-Salas, A.; Pantí, H. Gerber-Shiu function for a class of Markov-modulated Lévy risk processes with two-sided jumps. Methodol. Comput. Appl. Probab. 2022, 24, 2779–2800. [Google Scholar] [CrossRef]
  14. Rebello, J.J.; Thampi, K. Some ruin theory components of two sided jump problems under renewal risk process. Int. Math. Forum 2017, 12, 311–325. [Google Scholar] [CrossRef]
  15. Ivanovs, J. On scale functions for Lévy processes with negative phase-type jumps. Queueing Syst. 2021, 98, 3–19. [Google Scholar] [CrossRef]
  16. Zhang, L. The Erlang (n) risk model with two-sided jumps and a constant dividend barrier. Commun. Stat. Theory Methods 2021, 50, 5899–5917. [Google Scholar] [CrossRef]
  17. Zhuo, W.; Yang, H.; Chen, X. Expected discounted penalty function for a phase-type risk model with stochastic return on investment and random observation periods. Kybernetes 2018, 47, 1420–1434. [Google Scholar] [CrossRef]
  18. Oseni, B.M.; Jolayemi, E.T. Ruin probabilities in perturbed risk process with stochastic investment and force of interest. Kybernetes 2018, 13, 1593–1608. [Google Scholar] [CrossRef]
  19. Elghribi, M. Stochastic calculus in a risk model with stochastic return on investments. Stochastics Int. J. Probab. Stoch. Processes 2020, 93, 110–129. [Google Scholar] [CrossRef]
  20. Chen, S.; Li, Z.; Li, K. Optimal investment–reinsurance policy for an insurance company with VaR constraint. Insur. Math. Econ. 2010, 47, 144–153. [Google Scholar] [CrossRef]
  21. Zhang, Q.; Chen, P. Robust optimal proportional reinsurance and investment strategy for an insurer with defaultable risks and jumps. J. Comput. Appl. Math. 2019, 356, 46–66. [Google Scholar] [CrossRef]
  22. De Finetti, B. Su un’impostazione alternativa della teoria collettiva del rischio. In Transactions of the XVth International Congress of Actuaries; Actuarial Society of America: New York, NY, USA, 1957; Volume 2, pp. 433–443. [Google Scholar]
  23. Vierkötter, M.; Schmidli, H. On optimal dividends with exponential and linear penalty payments. Insur. Math. Econ. 2017, 72, 265–270. [Google Scholar] [CrossRef]
  24. Albrecher, H.; Azcue, P.; Muler, N. Optimal dividend strategies for two collaborating insurance companies. Adv. Appl. Probab. 2017, 49, 515–548. [Google Scholar] [CrossRef] [Green Version]
  25. Chen, X.; Ou, H. A compound Poisson risk model with proportional investment. J. Comput. Appl. Math. 2013, 242, 248–260. [Google Scholar] [CrossRef]
  26. Albrecher, H.; Azcue, P.; Muler, N. Optimal ratcheting of dividends in insurance. SIAM J. Control Optim. 2020, 58, 1822–1845. [Google Scholar] [CrossRef]
  27. Dong, H.; Yin, C.; Dai, H. Spectrally negative Lévy risk model under Erlangized barrier strategy. J. Comput. Appl. Math. 2019, 351, 101–116. [Google Scholar] [CrossRef]
  28. Chen, Y.; Bian, B. Optimal investment and dividend policy in an insurance company: A varied bound for dividend rates. Discret. Contin. Dyn. Syst. 2019, 24, 5083–5105. [Google Scholar] [CrossRef]
  29. Bo, L.; Song, R.; Tang, D.; Wang, Y.; Yang, X. Lévy risk model with two-sided jumps and a barrier dividend strategy. Insur. Math. Econ. 2012, 50, 280–291. [Google Scholar] [CrossRef]
  30. Palmowski, Z.; Vatamidou, E. Phase-type approximations perturbed by a heavy-tailed component for the Gerber-Shiu function of risk processes with two-sided jumps. Stoch. Model. 2020, 36, 337–363. [Google Scholar] [CrossRef]
  31. Chen, X.; Xiao, T.; Yang, X.q. A Markov-modulated jump-diffusion risk model with randomized observation periods and threshold dividend strategy. Insur. Math. Econ. 2014, 54, 76–83. [Google Scholar] [CrossRef]
  32. Gerber, H.U.; Shiu, E.S. On optimal dividend strategies in the compound Poisson model. North Am. Actuar. J. 2006, 10, 76–93. [Google Scholar] [CrossRef]
  33. Schmidli, H. On minimizing the ruin probability by investment and reinsurance. Ann. Appl. Probab. 2002, 12, 890–907. [Google Scholar] [CrossRef]
  34. Jgaard, B.H.; Taksar, M. Controlling risk exposure and dividends payout schemes: Insurance company example. Math. Financ. 1999, 9, 153–182. [Google Scholar] [CrossRef]
  35. Albrecher, H.; Thonhauser, S. Optimal dividend strategies for a risk process under force of interest. Insur. Math. Econ. 2008, 43, 134–149. [Google Scholar] [CrossRef] [Green Version]
  36. Wan, N. Dividend payments with a threshold strategy in the compound Poisson risk model perturbed by diffusion. Insur. Math. Econ. 2007, 40, 509–523. [Google Scholar] [CrossRef]
  37. Wu, Y.; Wu, X. Linearized and rational approximation method for solving non-linear Burgers’ equation. Int. J. Numer. Methods Fluids 2004, 45, 509–525. [Google Scholar] [CrossRef]
  38. Stenger, F. Numerical Methods Based on Sinc and Analytic Functions; Springer: New York, NY, USA, 1993. [Google Scholar]
  39. Stenger, F. Handbook of Sinc Numerical Methods; CRC Press: Boca Raton, FL, USA, 2011. [Google Scholar]
  40. Liu, Y.; Chen, X.; Zhuo, W. Dividends under threshold dividend strategy with randomized observation periods and capital-exchange agreement. J. Comput. Appl. Math. 2020, 366, 112426. [Google Scholar] [CrossRef]
  41. Wang, C.; Deng, N.; Shen, S. Numerical method for a perturbed risk model with proportional investment. Mathematics 2023, 11, 43. [Google Scholar] [CrossRef]
  42. Lund, J.; Bowers, K.L. Sinc Methods for Quadrature and Differential Equations; SIAM: Philadelphia, PA, USA, 1992. [Google Scholar]
  43. Stenger, F. Summary of Sinc numerical methods. J. Comput. Appl. Math. 2000, 13, 379–420. [Google Scholar] [CrossRef]
  44. Zhi, H.; Pu, J. On a dual risk model perturbed by diffusion with dividend threshold. Chin. Ann. Math. Ser. B 2016, 37, 777–792. [Google Scholar] [CrossRef]
  45. Zhang, Z.; Yang, H.; Li, S. The perturbed compound Poisson risk model with two-sided jumps. J. Comput. Appl. Math. 2010, 233, 1773–1784. [Google Scholar] [CrossRef] [Green Version]
  46. Cheung, E.C. On a class of stochastic models with two-sided jumps. Queueing Syst. 2011, 69, 1–28. [Google Scholar] [CrossRef] [Green Version]
  47. Labbé, C.; Sendov, H.S.; Sendova, K.P. The Gerber–Shiu function and the generalized Cramér–Lundberg model. Appl. Math. Comput. 2011, 218, 3035–3056. [Google Scholar] [CrossRef]
  48. Dong, H.; Liu, Z. The ruin problem in a renewal risk model with two-sided jumps. Math. Comput. Model. 2013, 57, 800–811. [Google Scholar] [CrossRef]
Figure 1. Images of V ( u ; 0.5 ) when N = 10 , α ^ = 1 4 , β ^ = 1 2 , d ^ = π 2 , σ = 6 and p = 0.1 , p = 0.9 .
Figure 1. Images of V ( u ; 0.5 ) when N = 10 , α ^ = 1 4 , β ^ = 1 2 , d ^ = π 2 , σ = 6 and p = 0.1 , p = 0.9 .
Mathematics 11 01584 g001
Figure 2. Images of V ( u ; 0.5 ) when N = 10 , α ^ = 1 4 , β ^ = 1 2 , d ^ = π 2 , λ 2 = 1 and p = 0.1 , p = 0.9 .
Figure 2. Images of V ( u ; 0.5 ) when N = 10 , α ^ = 1 4 , β ^ = 1 2 , d ^ = π 2 , λ 2 = 1 and p = 0.1 , p = 0.9 .
Mathematics 11 01584 g002
Figure 3. Images of V ( u ; 0.5 ) when N = 10 , α ^ = 1 4 , β ^ = 1 2 , d ^ = π 2 , σ = 6 and λ 2 = 1 .
Figure 3. Images of V ( u ; 0.5 ) when N = 10 , α ^ = 1 4 , β ^ = 1 2 , d ^ = π 2 , σ = 6 and λ 2 = 1 .
Mathematics 11 01584 g003
Figure 4. Images of V ( u ; 0.5 ) when N = 10 , α ^ = 1 4 , β ^ = 1 2 , d ^ = π 2 , σ = 6 and λ 2 = 0 .
Figure 4. Images of V ( u ; 0.5 ) when N = 10 , α ^ = 1 4 , β ^ = 1 2 , d ^ = π 2 , σ = 6 and λ 2 = 0 .
Mathematics 11 01584 g004
Table 1. The comparison of the relevant literature.
Table 1. The comparison of the relevant literature.
LiteratureRisk ModelSincError Analysis
Two-Sided JumpsInvestmentDividend
Dong et al. [27]
Cheung et al. [12]
Martín-González et al. [13]
Bo et al. [29]
Zhuo et al. [17]
Chen and Ou [25]
Elghribi [19]
Palmowski and Vatamidou [30]
Zhang [16]
Chen et al. [20]
Zhang and Chen [21]
Chen and Bian [28]
Chen et al. [31]
Vierkötter and Schmidli [23]
Albrecher et al. [26]
Our work
Table 2. The values of V ( u ; 50 ) when λ = 1 , μ = 1 , δ = 0.06 , c = 0.4 , α = 0.1 .
Table 2. The values of V ( u ; 50 ) when λ = 1 , μ = 1 , δ = 0.06 , c = 0.4 , α = 0.1 .
u = 17.0 u = 17.5 u = 18.0 u = 18.5 u = 19.0 u = 19.5 u = 20.0
SA1.57811.57991.58151.58301.58441.58561.5869
ES1.58421.57991.57551.57081.56591.56071.5553
RE (%)−0.380.000.380.781.121.602.03
Table 3. The values of V ( u ; 0.5 ) when λ 2 = 1 , μ = 1 , δ = 0.06 , c = 0.4 , α = 0.1 .
Table 3. The values of V ( u ; 0.5 ) when λ 2 = 1 , μ = 1 , δ = 0.06 , c = 0.4 , α = 0.1 .
u p = 0.06 p = 0.21 p = 0.36 p = 0.51 p = 0.54 p = 0.69 p = 0.84 p = 0.99
0.15 1.93612.09042.10492.04732.02751.87741.63031.3118
0.35 1.09181.60531.79601.83001.82251.71521.49641.2038
0.55 0.86571.41111.66601.74081.73911.65501.45761.1877
0.75 0.86211.35161.61771.70421.70451.63141.44931.1968
0.95 0.91731.34201.60151.68991.69081.62341.45161.2115
Table 4. The values of V ( u ; 0.5 ) when λ 2 = 0 , μ = 1 , δ = 0.06 , c = 0.4 , α = 0.1 .
Table 4. The values of V ( u ; 0.5 ) when λ 2 = 0 , μ = 1 , δ = 0.06 , c = 0.4 , α = 0.1 .
u p = 0.06 p = 0.21 p = 0.36 p = 0.51 p = 0.54 p = 0.69 p = 0.84 p = 0.99
0.15 1.13811.41671.52621.52191.50881.37681.13100.9422
0.35 0.75241.23711.45021.50011.49401.38591.15650.9781
0.55 0.69531.18791.43711.51021.50731.41141.19481.0256
0.75 0.75581.20431.45621.53301.53061.43871.23131.0693
0.95 0.84071.23951.48291.55721.55461.46411.26311.1065
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, J.; Wang, C.; Deng, N.; Wang, S. Numerical Method for a Risk Model with Two-Sided Jumps and Proportional Investment. Mathematics 2023, 11, 1584. https://doi.org/10.3390/math11071584

AMA Style

Xu J, Wang C, Deng N, Wang S. Numerical Method for a Risk Model with Two-Sided Jumps and Proportional Investment. Mathematics. 2023; 11(7):1584. https://doi.org/10.3390/math11071584

Chicago/Turabian Style

Xu, Jiaen, Chunwei Wang, Naidan Deng, and Shujing Wang. 2023. "Numerical Method for a Risk Model with Two-Sided Jumps and Proportional Investment" Mathematics 11, no. 7: 1584. https://doi.org/10.3390/math11071584

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop