SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 8, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1548
Study of the Barrier Probability in a Classical Risk Model for
two different claim amount distributions with same Mean
Palash Ranjan Das1
1
Research Scholar
1
Dept. of Applied Mathematics
1
University of Calcutta
Abstract— In this paper, we have considered a classical risk
model with dividend barrier, in which claim inter-
occurrence times are exponentially distributed. Our aim is to
obtain explicit expression for the barrier probability B (u, b),
the upper barrier being assumed to be ‘b’, before ruin occurs
when the claim amount distribution is either exponential or
erlangian. It is to be noted that the premium loading factor is
taken to be 20% in both the cases. In order to ensure fair
comparison we have chosen the exponential and erlangian
parameters in such a way that their mean and hence the
expected total claims is same for both the distributions over
a given time interval. Ultimately through numerical
evaluation of the barrier probability for both the claim
amount distributions, we will investigate whether there is
any significant difference between the two.
Key words: Exponential Distribution, Erlangian
Distribution, Ruin Probability, Upper Barrier,
Barrier Probability.
I. INTRODUCTION AND OVERVIEW
It is always very difficult task to quantify the financial risk
of an insurance company. In relation to the above, the
particular question of interest to a pricing actuary is “How
much money should be charged as premium rates so that we
have enough reserves to cover future claims”? So it becomes
necessary for the actuary to estimate the following two
characteristics of the expected claims. Firstly he has to find
out how large are such claims and secondly how often are
they arriving to draw relevant conclusions.
Ruin Theory or Collective Risk Theory is an area
of actuarial science dealing with questions like the aforesaid
ones. The classical collective risk model was introduced by
Filip Lundberg in 1907 and was further developed by Herald
Cramer(1930).It is a Compound Poisson Process and is
considered as one of the building blocks of the theory of
stochastic processes. In the actuarial context, this model
describes the development and evolution of the capital of an
insurance company with respect to time. It assumes that an
insurance company starts with an initial capital (termed as
“surplus” or “reserve”) and then receives premiums
continuously at a constant rate. It assumes further that
claims of random independent size are paid at random
independent times. In this model, the time in between claims
has no memory (memory less property) and the claim size is
independent. A crucial assumption, referred to as the net
profit condition is that the average outflow of money
(claims) is smaller than the average inflow of money
(premiums). This implies that there is a positive probability
that the company will not get ruined. So if ‘m’ is the mean
of the claim amount distribution and ‘c’ is the constant
continuous premium inflow per unit time, we assume that
c>λm (where ‘λ’ is the Poisson parameter).It is often
convenient to write c= (1+θ) λm where ‘θ’ is the premium
loading factor.
One of the important probabilities associated with
ruin is the probability that the surplus process attains the
level ‘b’ from initial surplus ‘u’ (b>u) without first falling
below zero. The barrier probability is denoted by B (u, b).
The upper barrier is such that dividends can be paid
continuously whenever the level is not below ‘b’ and the
surplus with respect to the level ‘b’ is paid as dividends. In
classical risk model, this barrier probability B (u, b) has
been discussed by Dickson and Gray (1984). Gerber.et.al
(1987) considered the probability and severity of ruin in
classical risk model and obtained explicit expressions for the
severity of ruin in different individual claim amount
distributions. The relationship between ruin and reinsurance
was explored by Dickson and Waters (1996). Picard (1994)
presented a paper on some measures of the severity of ruin
in the Classical Poisson model.
The paper is organized as follows:
In Section 2, we introduce the mathematical
preliminaries and some of the basic terms used. In Section 3,
we obtain an expression for Φ (u) when the inter-occurrence
time of claims follows an exponential distribution. Section 4
contains explicit expression of B (u, b) for two specific
claim amount distributions. Section 5 contains numerical
evaluation of B (u, b) for different values of ‘u’ and ‘b’
separately for both the claim amount distributions.
II. MATHEMATICAL PRELIMINARIES
Consider a risk process in which claims occur as a Poisson
Process with Poisson parameter λ.
Let T1, T2… be a sequence of iid random variables where Ti is
the time between the (i-1) Th
and ith claims and T1 is the time
until the first claim.
Thus Ti has an exponential distribution with distribution
function:
P(t)= 1-e-λt
, t≥0, λ>0. (2.1)
With corresponding pdf :
p(t)= λ.e-λt
, t≥0, λ>0. (2.2)
The risk reserve process U(t), t≥0 with initial reserve
U(0)=u is given by the expression
U(t)= u +ct - ΣiUi, (2.3)
where ‘i’ ranges from 1 to N(t)
with the claim surplus process {S(t), t≥0} is :
S(t)= ΣiUi – ct (2.4)
Study of the Barrier Probability in a Classical Risk Model for two different claim amount distributions with same Mean
(IJSRD/Vol. 1/Issue 8/2013/0006)
All rights reserved by www.ijsrd.com 1549
Here, ‘c’ is the constant rate at which premium is received
per unit time, {N(t), t≥0} is the number of claims up to time
‘t’.
Define Ψ(u)=P{Ụt≥0{U(t)<0}/U(0)=u}
= P{Tu < ∞/U(0)=u}be the probability of ruin with surplus u
where
Tu= inf{t; U(t)<0} is the first epoch when the risk
reserve process becomes negative. That is, when the claim
surplus process crosses the initial level ‘u’.
Let Φ(u)=1- Ψ(u) be the survival probability. (2.5)
The amount of the nth
claim is denoted by Xn and let {Xn}n
be a sequence of iid random variables with distribution
function F(x) and corresponding pdf f(x). Let the mean of
{Ti} and {Xi} be denoted by ‘μ’ and ‘m’ respectively which
we assume to be existing and finite.
We further assume that cμ>m to ensure that {U(t)} has a
positive drift. (2.6)
Let pˆ
(s) be the Laplace Transform of the probability density
function p(t).We assume that the moment generating
function of Xi denoted by mˆ
(s) exists, then the Lundberg’s
inequality holds with Ψ(u)≤e-Ru
, where ‘R’ is the unique
positive value such that
mˆ
(s).pˆ
(cs)=1 (2.7)
‘R’ is called the “adjustment coefficient”
III. EXPLICIT EXPRESSION OF B(U,B) WHEN THE
INTER-OCCURRENCE TIME OF CLAIMS IS AN
EXPONENTIAL DISTRIBUTION
It should be noted that if survival occurs from initial surplus
‘u’, then the surplus process must pass through the level b>u
at some point in time as cμ>m, that is, c>λm implies that
U(t)→ ∞ as t → ∞.
Again, as the distribution of the time to the next
claim from the time the surplus attains the level ‘b’ is
exponential, the probabilistic behavior of the surplus
process once it attains level ‘b’ is independent of its
behavior prior to attaining ‘b’. This is a direct consequence
of the “memory less property’ of the exponential
distribution.
Hence,
Thus, B(u,b)=Φ(u)/Φ(b) (3.1)
This implies from (2.5),
B(u,b)= [1- Ψ(u)]/ [1- Ψ(b)] (3.2)
IV. CLAIM AMOUNT DISTRIBUTION
Exponential DistributionA.
We consider that the individual claim amount has
exponential (β) distribution with pdf
f(x)= βe-βx
, x≥0, β>0, where ‘β’ is the exponential
parameter. We assume that Φ(u) =1- Ψ(u).
By considering the time and amount of the first claim, we
have:
∫ ∫ (4.1)
Substituting , we get:
∫
( )
∫ (4.2)
Differentiating (4.2) with respect to ‘u’, we get:
d/du[Φ(u)]=( λ./c)* Φ(u) - ( λ./c)* ∫0
u
f(x)Φ(u-x)dx (4.3)
This is the integro-differential equation satisfied by the
survival probability Φ(u).
Since, f(x)= βe-βx
, x≥0, β>0, we have:
d/du[Φ(u)]=( λ./c)* Φ(u)- (β.λ./c )*e- βu
∫0
u
eβx
.Φ(x) dx (4.4)
Differentiating (4.4) with respect to ‘u’ again, we get:
d2
/du2
[Φ(u)]=( λ./c)* d/du[Φ(u)]+ (β2
.λ./c )*e- βu
∫0
u
eβx
.Φ(x)
dx - (β.λ./c )* Φ(u) (4.5)
Multiplying (4.4) by ‘β’, adding to (4.5) and rearranging, we
get:
d2
/du2
[Φ(u)]+( β- λ./c)* d/du[Φ(u)]=0.
This is a second order differential equation, whose general
solution is:
Φ(u)=α0+ α1.e-(β- λ./c)u
, where ‘α0‘ and ‘α1‘ are constants.
Since, lim u → ∞ Φ(u)=1, we have:
α0 = 1.
So Φ(u)=1 + α1.e-(β- λ./c)u
Again Φ(0)= 1+ α1.
This implies α1 = Φ(0) – 1, that is, α1 = - Ψ(0). (4.6)
We can derive from Lundberg’s inequality that:
Ψ(0) = ( λ./c) ∫ 0
∞
Ψ(u).du - ( λ./c)* ∫0
∞
∫0
u
f(x).Ψ(u-x).dx.du
- ( λ./c) ∫ 0
∞
[1-F(x)]du (4.7)
Now, we see that,
∫0
∞
∫0
u
f(x).Ψ(u-x).dx.du
= ∫0
∞
∫x
u
Ψ(u-x).du. f(x)dx
= ∫0
∞
∫o
∞
Ψ(y).dy. f(x)dx. [Substituting y = (u-x)].
= ∫0
∞
Ψ(y).dy (4.8)
So using (4.8) in (4.7), we have:
Ψ(0) = ( λ./c)* ∫ 0
∞
[1-F(u)].du
= ( λ./c)* m
= λ/ (β*c) [since m=1/ β].
Thus, Φ(u) = 1 – [λ/ (β*c)]* e-(β- λ./c)u
(4.9)
From (3.1) we get:
B(u,b) = Φ(u)/Φ(b)
Therefore,
B(u,b) = [1 – {λ/ (β*c)}* e-(β- λ./c)u
] /[1 – {λ/ (β*c)}* e-(β- λ./c)b
]
(4.10)
In Table1 of Section 5, B(u,b) is calculated for different
values of ‘u’ and ‘b’, taking the premium loading factor to
be 20%, that is, c = (1.2* λ* 1/ β) and the exponential
parameter ‘β’ is taken to be 3/2.
Erlangian DistributionB.
Let us assume that the individual claim amount distribution
has a Erlang(2,γ) distribution.
So f(x) = γ2
xe-γx
, x≥0, γ >0 is the pdf of the
individual claim amount distribution.
From previous discussion, we have:
Study of the Barrier Probability in a Classical Risk Model for two different claim amount distributions with same Mean
(IJSRD/Vol. 1/Issue 8/2013/0006)
All rights reserved by www.ijsrd.com 1550
Ψ(0) = (λ.m)/c, that is,
Ψ(0)= (2. λ )/(c. γ) [since m=2/ γ] (4.11)
As Φ(0) = 1 - Ψ(0), we have:
Φ(0) = 1 - (2. λ )/(c. γ) (4.12)
Again from (4.3) we get:
d/du[Φ(u)]=( λ./c)* Φ(u) - ( λ./c)* ∫0
u
f(x)Φ(u-x)dx
Taking Laplace Transform on both sides of the above
integro-differential equation, we get;
s* Φ^
(s) - Φ(0) = ( λ./c)* Φ^
(s) - ( λ./c)* f^
(s)*Φ^
(s)
Rearranging, we have:
Φ^
(s) = [c* Φ(0)]/[c*s – λ* { 1 – f^
(s)}] (4.13)
Now, f^
(s) = ∫0
∞
γ2
xe-γx
. e-sx
dx.
= ∫0
∞
γ2
xe-(γ+s)x
dx.
Hence, f^
(s) = γ2
/ (γ+s)2
Substituting in (4.13) we get:
Φ^
(s) = c*[1 - (2. λ) / (c. γ)]/[c*s - λ.* {1 - γ2
/ (γ+s)2
}] (4.14)
Let the premium loading factor be 20% and ‘γ’ = 3.
So c = 1.2* λ*2/ γ.
= 1.2* λ*2/ 3.
= 0.8*λ.
Hence, we get:
Φ^
(s) = 0.8* λ *[1 - (2. λ) / (0.8*λ*3)]/ [0.8*λ*s - λ.* {1 - 9/
(3+s)2
}].
= 1/6* (3+s)2
/ [s3
+4.75*s2
+1.5*s].
Therefore,
Φ^
(s) = 1/6* (3+s)2
/s.(s+ α1).(s+ α2), (4.15)
where α1=0.34015 , α2 = 4.40985.
Using partial fractions, we have:
Φ^
(s) = x0/s + x1/ (s+ α1) + x2/ (s+ α2), (4.16)
where x0, x1 and x2 are constants
Solving for x0, x1 and x2, we get:
x0 =1, x1 = -0.85179 , x2 = 0.01846.
so that,
Φ^
(s) = 1/s - 0.85179/ (s + 0.34015) + 0.01846/ (s + 4.40985)
(4.17)
We invert this Laplace Transform to get:
Φ(u) = 1- 0.85179*e-0.34015u
+ 0.01846*e-4.40985u
(4.18)
So using (3.1) we get:
B(u,b) = Φ(u) / Φ(b)
= [1- 0.85179*e-0.34015u
+ 0.01846*e-4.40985u
] /
[1- 0.85179*e-0.34015b
+ 0.01846*e-4.40985b
] (4.19)
In Table 2, of Section 5, B(u,b) is calculated for different
values of ‘u’ and ‘b’ when individual claims distribution
follows Erlang(2,3) distribution.
V. NUMERICAL EVALUATION
bu 0 1 2 3 4 5
1 0.47484 1 - - - -
2 0.33701 0.70972 1 - - -
3 0.27487 0.57886 0.76615 1 - -
4 0.24036 0.50618 0.71321 0.87444 1 -
5 0.21894 0.46108 0.64967 0.79653 0.91091 1
Table. 1: β = 3/2, c = 0.8* λ
bu 0 1 2 3 4 5
1 0.423 1 - - - -
2 0.3377 0.7984 1 - - -
3 0.2405 0.5686 0.7122 1 - -
4 0.2133 0.4995 0.6315 0.8867 1 -
5 0.1974 0.4666 0.5844 0.8206 0.925 1
Table. 2: γ = 3, c = 0.8* λ
VI. INTERPRETATION
1) From the above tables, we infer that as the value of the
initial surplus ‘u’ gets larger, probability of reaching
‘b’ without falling below zero increases, that is, B(u,b)
increases as ‘u’ increases.
2) B (u, b) reaches its peak, when the difference between
‘b’ and ‘u’ is minimal.
3) Since the barrier probabilities corresponding to different
values of ‘u’ and ‘b’ are quite close in Tables 1 and 2, it
can be shown by hypothesis testing that there is no
significant difference in the values of B(u,b) for the
two specified claim amount distributions.
VII. CONCLUSION
For a pre-estimated expected total claims, the barrier
probability is quite stable with respect to different claim
amount distributions having the same mean.
REFERENCES
[1] Cramer H (1930), ‘On the Mathematical Theory of
Risk’ Skandia Jubilee Volume, Stockholm.
[2] Dickson, D.C.M (2005), ‘Insurance Risk and Ruin’
Cambridge University Press, 2005.
[3] Asmussen. S (2000), ‘ Ruin Probabilities’, World
Scientific, Singapore,2000.
[4] Gerber, H. U, Shiu, E. SW (2005), ‘On time value of
ruin in a Sparre Andersen Model’, North American
Actuarial Journal,2005, Vol 9, No 2, pp. 49-67.
[5] Dickson, D.C.M, Gray, J.R (1984), ‘Exact solutions for
ruin probabilities in the presence of an absorbing upper
barrier, Scandinavian Actuarial Journal,1984, pp.174-
186.
[6] Gerber, H. U, Goovaerts, M. J, Kaas. R (1987), ‘On the
probability and severity of ruin’, Astin Bulletin,1987
Vol 17, No 2, pp. 151-163.
[7] Dickson, D. C. M, Waters, H. R (1996), ‘Reinsurance
and Ruin’, Insurance: Mathematics and
Economics,1996, Vol 19, pp. 61-80.
[8] Thampi K.K, Jacob M.J, Raju N (2007), ‘Barrier
Probabilities and Maximum Severity of Ruin for a
Renewal Risk Model’, International Journal of
Theoretical and Applied Finance, 2007, Vol 10, No. 5,
pp. 837-846.
[9] Dickson, D. C. M (1998), ‘On a class of renewal risk
processes’, North American Actuarial Journal,1998,
Vol 2, No.3, pp. 60-73.

More Related Content

What's hot

Black scholes pricing consept
Black scholes pricing conseptBlack scholes pricing consept
Black scholes pricing conseptIlya Gikhman
 
Pricing Exotics using Change of Numeraire
Pricing Exotics using Change of NumerairePricing Exotics using Change of Numeraire
Pricing Exotics using Change of NumeraireSwati Mital
 
Pricing interest rate derivatives (ext)
Pricing interest rate derivatives (ext)Pricing interest rate derivatives (ext)
Pricing interest rate derivatives (ext)Swati Mital
 
Uncertain Volatility Models
Uncertain Volatility ModelsUncertain Volatility Models
Uncertain Volatility ModelsSwati Mital
 
Quantitative Methods for Counterparty Risk
Quantitative Methods for Counterparty RiskQuantitative Methods for Counterparty Risk
Quantitative Methods for Counterparty RiskVolatility
 
Risk-Aversion, Risk-Premium and Utility Theory
Risk-Aversion, Risk-Premium and Utility TheoryRisk-Aversion, Risk-Premium and Utility Theory
Risk-Aversion, Risk-Premium and Utility TheoryAshwin Rao
 
Black scholes pricing concept
Black scholes pricing conceptBlack scholes pricing concept
Black scholes pricing conceptIlya Gikhman
 
Black scholes pricing concept
Black scholes pricing conceptBlack scholes pricing concept
Black scholes pricing conceptIlya Gikhman
 
Black scholes pricing concept
Black scholes pricing conceptBlack scholes pricing concept
Black scholes pricing conceptIlya Gikhman
 

What's hot (14)

Black scholes pricing consept
Black scholes pricing conseptBlack scholes pricing consept
Black scholes pricing consept
 
Pricing Exotics using Change of Numeraire
Pricing Exotics using Change of NumerairePricing Exotics using Change of Numeraire
Pricing Exotics using Change of Numeraire
 
Pricing interest rate derivatives (ext)
Pricing interest rate derivatives (ext)Pricing interest rate derivatives (ext)
Pricing interest rate derivatives (ext)
 
Uncertain Volatility Models
Uncertain Volatility ModelsUncertain Volatility Models
Uncertain Volatility Models
 
Quantitative Methods for Counterparty Risk
Quantitative Methods for Counterparty RiskQuantitative Methods for Counterparty Risk
Quantitative Methods for Counterparty Risk
 
Unit 7
Unit 7Unit 7
Unit 7
 
Still works
Still worksStill works
Still works
 
Risk-Aversion, Risk-Premium and Utility Theory
Risk-Aversion, Risk-Premium and Utility TheoryRisk-Aversion, Risk-Premium and Utility Theory
Risk-Aversion, Risk-Premium and Utility Theory
 
Black scholes pricing concept
Black scholes pricing conceptBlack scholes pricing concept
Black scholes pricing concept
 
Pragmathematics 2014 lecture 4 (2)
Pragmathematics 2014 lecture 4 (2)Pragmathematics 2014 lecture 4 (2)
Pragmathematics 2014 lecture 4 (2)
 
Simulation methods finance_1
Simulation methods finance_1Simulation methods finance_1
Simulation methods finance_1
 
Black scholes pricing concept
Black scholes pricing conceptBlack scholes pricing concept
Black scholes pricing concept
 
Black scholes pricing concept
Black scholes pricing conceptBlack scholes pricing concept
Black scholes pricing concept
 
Simulation methods finance_2
Simulation methods finance_2Simulation methods finance_2
Simulation methods finance_2
 

Viewers also liked

Capacity Determination of an Arterial Road - A Case study of Modasa Town (Bus...
Capacity Determination of an Arterial Road - A Case study of Modasa Town (Bus...Capacity Determination of an Arterial Road - A Case study of Modasa Town (Bus...
Capacity Determination of an Arterial Road - A Case study of Modasa Town (Bus...ijsrd.com
 
Non-Destructive Quality Analysis of Gujarat 17 Oryza Sativa SSP Indica (India...
Non-Destructive Quality Analysis of Gujarat 17 Oryza Sativa SSP Indica (India...Non-Destructive Quality Analysis of Gujarat 17 Oryza Sativa SSP Indica (India...
Non-Destructive Quality Analysis of Gujarat 17 Oryza Sativa SSP Indica (India...ijsrd.com
 
The Effects of Coconut Milk on the Rooting Of Two Types of Cutting of Termina...
The Effects of Coconut Milk on the Rooting Of Two Types of Cutting of Termina...The Effects of Coconut Milk on the Rooting Of Two Types of Cutting of Termina...
The Effects of Coconut Milk on the Rooting Of Two Types of Cutting of Termina...ijsrd.com
 
A Review Paper on Network Layer attacks in MANETs
A Review Paper on Network Layer attacks in MANETsA Review Paper on Network Layer attacks in MANETs
A Review Paper on Network Layer attacks in MANETsijsrd.com
 
Direct Torque Control of A 5-Phase Induction Motor
Direct Torque Control of A 5-Phase Induction MotorDirect Torque Control of A 5-Phase Induction Motor
Direct Torque Control of A 5-Phase Induction Motorijsrd.com
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 
Pre-Cast Technology: An Initial Step to Sustainable Development
Pre-Cast Technology: An Initial Step to Sustainable DevelopmentPre-Cast Technology: An Initial Step to Sustainable Development
Pre-Cast Technology: An Initial Step to Sustainable Developmentijsrd.com
 
A Compatibility Study on Different Types of Cement and Plasticizer
A Compatibility Study on Different Types of Cement and PlasticizerA Compatibility Study on Different Types of Cement and Plasticizer
A Compatibility Study on Different Types of Cement and Plasticizerijsrd.com
 
Eye Gesture Analysis for Prevention of Road Accidents
Eye Gesture Analysis for Prevention of Road AccidentsEye Gesture Analysis for Prevention of Road Accidents
Eye Gesture Analysis for Prevention of Road Accidentsijsrd.com
 
Nitrosamine Generating Accelerators in Curing of Rubber
Nitrosamine Generating Accelerators in Curing of RubberNitrosamine Generating Accelerators in Curing of Rubber
Nitrosamine Generating Accelerators in Curing of Rubberijsrd.com
 
Implementation and design Low power VCO
Implementation and design Low power VCOImplementation and design Low power VCO
Implementation and design Low power VCOijsrd.com
 
Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...ijsrd.com
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniquesijsrd.com
 
Information Security using Cryptography and Image Processing
Information Security using Cryptography and Image ProcessingInformation Security using Cryptography and Image Processing
Information Security using Cryptography and Image Processingijsrd.com
 
Fifth Law of Thermodynamics - A Review
Fifth Law of Thermodynamics - A ReviewFifth Law of Thermodynamics - A Review
Fifth Law of Thermodynamics - A Reviewijsrd.com
 
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5ijsrd.com
 

Viewers also liked (16)

Capacity Determination of an Arterial Road - A Case study of Modasa Town (Bus...
Capacity Determination of an Arterial Road - A Case study of Modasa Town (Bus...Capacity Determination of an Arterial Road - A Case study of Modasa Town (Bus...
Capacity Determination of an Arterial Road - A Case study of Modasa Town (Bus...
 
Non-Destructive Quality Analysis of Gujarat 17 Oryza Sativa SSP Indica (India...
Non-Destructive Quality Analysis of Gujarat 17 Oryza Sativa SSP Indica (India...Non-Destructive Quality Analysis of Gujarat 17 Oryza Sativa SSP Indica (India...
Non-Destructive Quality Analysis of Gujarat 17 Oryza Sativa SSP Indica (India...
 
The Effects of Coconut Milk on the Rooting Of Two Types of Cutting of Termina...
The Effects of Coconut Milk on the Rooting Of Two Types of Cutting of Termina...The Effects of Coconut Milk on the Rooting Of Two Types of Cutting of Termina...
The Effects of Coconut Milk on the Rooting Of Two Types of Cutting of Termina...
 
A Review Paper on Network Layer attacks in MANETs
A Review Paper on Network Layer attacks in MANETsA Review Paper on Network Layer attacks in MANETs
A Review Paper on Network Layer attacks in MANETs
 
Direct Torque Control of A 5-Phase Induction Motor
Direct Torque Control of A 5-Phase Induction MotorDirect Torque Control of A 5-Phase Induction Motor
Direct Torque Control of A 5-Phase Induction Motor
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
Pre-Cast Technology: An Initial Step to Sustainable Development
Pre-Cast Technology: An Initial Step to Sustainable DevelopmentPre-Cast Technology: An Initial Step to Sustainable Development
Pre-Cast Technology: An Initial Step to Sustainable Development
 
A Compatibility Study on Different Types of Cement and Plasticizer
A Compatibility Study on Different Types of Cement and PlasticizerA Compatibility Study on Different Types of Cement and Plasticizer
A Compatibility Study on Different Types of Cement and Plasticizer
 
Eye Gesture Analysis for Prevention of Road Accidents
Eye Gesture Analysis for Prevention of Road AccidentsEye Gesture Analysis for Prevention of Road Accidents
Eye Gesture Analysis for Prevention of Road Accidents
 
Nitrosamine Generating Accelerators in Curing of Rubber
Nitrosamine Generating Accelerators in Curing of RubberNitrosamine Generating Accelerators in Curing of Rubber
Nitrosamine Generating Accelerators in Curing of Rubber
 
Implementation and design Low power VCO
Implementation and design Low power VCOImplementation and design Low power VCO
Implementation and design Low power VCO
 
Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
Information Security using Cryptography and Image Processing
Information Security using Cryptography and Image ProcessingInformation Security using Cryptography and Image Processing
Information Security using Cryptography and Image Processing
 
Fifth Law of Thermodynamics - A Review
Fifth Law of Thermodynamics - A ReviewFifth Law of Thermodynamics - A Review
Fifth Law of Thermodynamics - A Review
 
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
 

Similar to Study of the Barrier Probability in a Classical Risk Model for two different claim amount distributions with same Mean

A Maximum Entropy Approach to the Loss Data Aggregation Problem
A Maximum Entropy Approach to the Loss Data Aggregation ProblemA Maximum Entropy Approach to the Loss Data Aggregation Problem
A Maximum Entropy Approach to the Loss Data Aggregation ProblemErika G. G.
 
4 Let (Xn)n≥1 a sample of size n by the normal density N(µ; σ2) .docx
4 Let (Xn)n≥1 a sample of size n by the normal density N(µ; σ2) .docx4 Let (Xn)n≥1 a sample of size n by the normal density N(µ; σ2) .docx
4 Let (Xn)n≥1 a sample of size n by the normal density N(µ; σ2) .docxtamicawaysmith
 
Chapter 3. Arbitrage (asset) pricing theoryNeil Wallace.docx
Chapter 3. Arbitrage (asset) pricing theoryNeil Wallace.docxChapter 3. Arbitrage (asset) pricing theoryNeil Wallace.docx
Chapter 3. Arbitrage (asset) pricing theoryNeil Wallace.docxchristinemaritza
 
3.5 3.6 exp-log models 13-14
3.5 3.6  exp-log models 13-143.5 3.6  exp-log models 13-14
3.5 3.6 exp-log models 13-14Sharon Henry
 
A Study on stochastic Models for HIV infection and Aids
A Study on stochastic Models for HIV infection and AidsA Study on stochastic Models for HIV infection and Aids
A Study on stochastic Models for HIV infection and AidsMangaiK4
 
V. pacáková, d. brebera
V. pacáková, d. breberaV. pacáková, d. brebera
V. pacáková, d. breberalogyalaa
 
Mathematical Model for Infection and Removal
Mathematical Model for Infection and RemovalMathematical Model for Infection and Removal
Mathematical Model for Infection and Removalijtsrd
 
3.5 EXP-LOG MODELS
3.5 EXP-LOG MODELS3.5 EXP-LOG MODELS
3.5 EXP-LOG MODELSSharon Henry
 
chain leader
chain leaderchain leader
chain leadermarhadi .
 
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...Waqas Tariq
 
Maxentropic and quantitative methods in operational risk modeling
Maxentropic and quantitative methods in operational risk modelingMaxentropic and quantitative methods in operational risk modeling
Maxentropic and quantitative methods in operational risk modelingErika G. G.
 
Theory of probability and probability distribution
Theory of probability and probability distributionTheory of probability and probability distribution
Theory of probability and probability distributionpolscjp
 

Similar to Study of the Barrier Probability in a Classical Risk Model for two different claim amount distributions with same Mean (20)

A Maximum Entropy Approach to the Loss Data Aggregation Problem
A Maximum Entropy Approach to the Loss Data Aggregation ProblemA Maximum Entropy Approach to the Loss Data Aggregation Problem
A Maximum Entropy Approach to the Loss Data Aggregation Problem
 
4 Let (Xn)n≥1 a sample of size n by the normal density N(µ; σ2) .docx
4 Let (Xn)n≥1 a sample of size n by the normal density N(µ; σ2) .docx4 Let (Xn)n≥1 a sample of size n by the normal density N(µ; σ2) .docx
4 Let (Xn)n≥1 a sample of size n by the normal density N(µ; σ2) .docx
 
Chapter 3. Arbitrage (asset) pricing theoryNeil Wallace.docx
Chapter 3. Arbitrage (asset) pricing theoryNeil Wallace.docxChapter 3. Arbitrage (asset) pricing theoryNeil Wallace.docx
Chapter 3. Arbitrage (asset) pricing theoryNeil Wallace.docx
 
Calisto 2016a 251116
Calisto 2016a 251116Calisto 2016a 251116
Calisto 2016a 251116
 
Ruin Theory
Ruin TheoryRuin Theory
Ruin Theory
 
3.5 3.6 exp-log models 13-14
3.5 3.6  exp-log models 13-143.5 3.6  exp-log models 13-14
3.5 3.6 exp-log models 13-14
 
A Study on stochastic Models for HIV infection and Aids
A Study on stochastic Models for HIV infection and AidsA Study on stochastic Models for HIV infection and Aids
A Study on stochastic Models for HIV infection and Aids
 
V. pacáková, d. brebera
V. pacáková, d. breberaV. pacáková, d. brebera
V. pacáková, d. brebera
 
Mathematical Model for Infection and Removal
Mathematical Model for Infection and RemovalMathematical Model for Infection and Removal
Mathematical Model for Infection and Removal
 
3.5 EXP-LOG MODELS
3.5 EXP-LOG MODELS3.5 EXP-LOG MODELS
3.5 EXP-LOG MODELS
 
Microeconomics-Homework-Help.pptx
Microeconomics-Homework-Help.pptxMicroeconomics-Homework-Help.pptx
Microeconomics-Homework-Help.pptx
 
Team 1 post-challenge final report
Team 1 post-challenge final reportTeam 1 post-challenge final report
Team 1 post-challenge final report
 
chain leader
chain leaderchain leader
chain leader
 
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
 
Zain 333343
Zain 333343Zain 333343
Zain 333343
 
Maxentropic and quantitative methods in operational risk modeling
Maxentropic and quantitative methods in operational risk modelingMaxentropic and quantitative methods in operational risk modeling
Maxentropic and quantitative methods in operational risk modeling
 
Theory of probability and probability distribution
Theory of probability and probability distributionTheory of probability and probability distribution
Theory of probability and probability distribution
 
7주차
7주차7주차
7주차
 
Prospect Theory.pptx
Prospect Theory.pptxProspect Theory.pptx
Prospect Theory.pptx
 
Safety-first model with investor’s view under distribution ambiguity
Safety-first model with investor’s view under distribution ambiguitySafety-first model with investor’s view under distribution ambiguity
Safety-first model with investor’s view under distribution ambiguity
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

Study of the Barrier Probability in a Classical Risk Model for two different claim amount distributions with same Mean

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 8, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1548 Study of the Barrier Probability in a Classical Risk Model for two different claim amount distributions with same Mean Palash Ranjan Das1 1 Research Scholar 1 Dept. of Applied Mathematics 1 University of Calcutta Abstract— In this paper, we have considered a classical risk model with dividend barrier, in which claim inter- occurrence times are exponentially distributed. Our aim is to obtain explicit expression for the barrier probability B (u, b), the upper barrier being assumed to be ‘b’, before ruin occurs when the claim amount distribution is either exponential or erlangian. It is to be noted that the premium loading factor is taken to be 20% in both the cases. In order to ensure fair comparison we have chosen the exponential and erlangian parameters in such a way that their mean and hence the expected total claims is same for both the distributions over a given time interval. Ultimately through numerical evaluation of the barrier probability for both the claim amount distributions, we will investigate whether there is any significant difference between the two. Key words: Exponential Distribution, Erlangian Distribution, Ruin Probability, Upper Barrier, Barrier Probability. I. INTRODUCTION AND OVERVIEW It is always very difficult task to quantify the financial risk of an insurance company. In relation to the above, the particular question of interest to a pricing actuary is “How much money should be charged as premium rates so that we have enough reserves to cover future claims”? So it becomes necessary for the actuary to estimate the following two characteristics of the expected claims. Firstly he has to find out how large are such claims and secondly how often are they arriving to draw relevant conclusions. Ruin Theory or Collective Risk Theory is an area of actuarial science dealing with questions like the aforesaid ones. The classical collective risk model was introduced by Filip Lundberg in 1907 and was further developed by Herald Cramer(1930).It is a Compound Poisson Process and is considered as one of the building blocks of the theory of stochastic processes. In the actuarial context, this model describes the development and evolution of the capital of an insurance company with respect to time. It assumes that an insurance company starts with an initial capital (termed as “surplus” or “reserve”) and then receives premiums continuously at a constant rate. It assumes further that claims of random independent size are paid at random independent times. In this model, the time in between claims has no memory (memory less property) and the claim size is independent. A crucial assumption, referred to as the net profit condition is that the average outflow of money (claims) is smaller than the average inflow of money (premiums). This implies that there is a positive probability that the company will not get ruined. So if ‘m’ is the mean of the claim amount distribution and ‘c’ is the constant continuous premium inflow per unit time, we assume that c>λm (where ‘λ’ is the Poisson parameter).It is often convenient to write c= (1+θ) λm where ‘θ’ is the premium loading factor. One of the important probabilities associated with ruin is the probability that the surplus process attains the level ‘b’ from initial surplus ‘u’ (b>u) without first falling below zero. The barrier probability is denoted by B (u, b). The upper barrier is such that dividends can be paid continuously whenever the level is not below ‘b’ and the surplus with respect to the level ‘b’ is paid as dividends. In classical risk model, this barrier probability B (u, b) has been discussed by Dickson and Gray (1984). Gerber.et.al (1987) considered the probability and severity of ruin in classical risk model and obtained explicit expressions for the severity of ruin in different individual claim amount distributions. The relationship between ruin and reinsurance was explored by Dickson and Waters (1996). Picard (1994) presented a paper on some measures of the severity of ruin in the Classical Poisson model. The paper is organized as follows: In Section 2, we introduce the mathematical preliminaries and some of the basic terms used. In Section 3, we obtain an expression for Φ (u) when the inter-occurrence time of claims follows an exponential distribution. Section 4 contains explicit expression of B (u, b) for two specific claim amount distributions. Section 5 contains numerical evaluation of B (u, b) for different values of ‘u’ and ‘b’ separately for both the claim amount distributions. II. MATHEMATICAL PRELIMINARIES Consider a risk process in which claims occur as a Poisson Process with Poisson parameter λ. Let T1, T2… be a sequence of iid random variables where Ti is the time between the (i-1) Th and ith claims and T1 is the time until the first claim. Thus Ti has an exponential distribution with distribution function: P(t)= 1-e-λt , t≥0, λ>0. (2.1) With corresponding pdf : p(t)= λ.e-λt , t≥0, λ>0. (2.2) The risk reserve process U(t), t≥0 with initial reserve U(0)=u is given by the expression U(t)= u +ct - ΣiUi, (2.3) where ‘i’ ranges from 1 to N(t) with the claim surplus process {S(t), t≥0} is : S(t)= ΣiUi – ct (2.4)
  • 2. Study of the Barrier Probability in a Classical Risk Model for two different claim amount distributions with same Mean (IJSRD/Vol. 1/Issue 8/2013/0006) All rights reserved by www.ijsrd.com 1549 Here, ‘c’ is the constant rate at which premium is received per unit time, {N(t), t≥0} is the number of claims up to time ‘t’. Define Ψ(u)=P{Ụt≥0{U(t)<0}/U(0)=u} = P{Tu < ∞/U(0)=u}be the probability of ruin with surplus u where Tu= inf{t; U(t)<0} is the first epoch when the risk reserve process becomes negative. That is, when the claim surplus process crosses the initial level ‘u’. Let Φ(u)=1- Ψ(u) be the survival probability. (2.5) The amount of the nth claim is denoted by Xn and let {Xn}n be a sequence of iid random variables with distribution function F(x) and corresponding pdf f(x). Let the mean of {Ti} and {Xi} be denoted by ‘μ’ and ‘m’ respectively which we assume to be existing and finite. We further assume that cμ>m to ensure that {U(t)} has a positive drift. (2.6) Let pˆ (s) be the Laplace Transform of the probability density function p(t).We assume that the moment generating function of Xi denoted by mˆ (s) exists, then the Lundberg’s inequality holds with Ψ(u)≤e-Ru , where ‘R’ is the unique positive value such that mˆ (s).pˆ (cs)=1 (2.7) ‘R’ is called the “adjustment coefficient” III. EXPLICIT EXPRESSION OF B(U,B) WHEN THE INTER-OCCURRENCE TIME OF CLAIMS IS AN EXPONENTIAL DISTRIBUTION It should be noted that if survival occurs from initial surplus ‘u’, then the surplus process must pass through the level b>u at some point in time as cμ>m, that is, c>λm implies that U(t)→ ∞ as t → ∞. Again, as the distribution of the time to the next claim from the time the surplus attains the level ‘b’ is exponential, the probabilistic behavior of the surplus process once it attains level ‘b’ is independent of its behavior prior to attaining ‘b’. This is a direct consequence of the “memory less property’ of the exponential distribution. Hence, Thus, B(u,b)=Φ(u)/Φ(b) (3.1) This implies from (2.5), B(u,b)= [1- Ψ(u)]/ [1- Ψ(b)] (3.2) IV. CLAIM AMOUNT DISTRIBUTION Exponential DistributionA. We consider that the individual claim amount has exponential (β) distribution with pdf f(x)= βe-βx , x≥0, β>0, where ‘β’ is the exponential parameter. We assume that Φ(u) =1- Ψ(u). By considering the time and amount of the first claim, we have: ∫ ∫ (4.1) Substituting , we get: ∫ ( ) ∫ (4.2) Differentiating (4.2) with respect to ‘u’, we get: d/du[Φ(u)]=( λ./c)* Φ(u) - ( λ./c)* ∫0 u f(x)Φ(u-x)dx (4.3) This is the integro-differential equation satisfied by the survival probability Φ(u). Since, f(x)= βe-βx , x≥0, β>0, we have: d/du[Φ(u)]=( λ./c)* Φ(u)- (β.λ./c )*e- βu ∫0 u eβx .Φ(x) dx (4.4) Differentiating (4.4) with respect to ‘u’ again, we get: d2 /du2 [Φ(u)]=( λ./c)* d/du[Φ(u)]+ (β2 .λ./c )*e- βu ∫0 u eβx .Φ(x) dx - (β.λ./c )* Φ(u) (4.5) Multiplying (4.4) by ‘β’, adding to (4.5) and rearranging, we get: d2 /du2 [Φ(u)]+( β- λ./c)* d/du[Φ(u)]=0. This is a second order differential equation, whose general solution is: Φ(u)=α0+ α1.e-(β- λ./c)u , where ‘α0‘ and ‘α1‘ are constants. Since, lim u → ∞ Φ(u)=1, we have: α0 = 1. So Φ(u)=1 + α1.e-(β- λ./c)u Again Φ(0)= 1+ α1. This implies α1 = Φ(0) – 1, that is, α1 = - Ψ(0). (4.6) We can derive from Lundberg’s inequality that: Ψ(0) = ( λ./c) ∫ 0 ∞ Ψ(u).du - ( λ./c)* ∫0 ∞ ∫0 u f(x).Ψ(u-x).dx.du - ( λ./c) ∫ 0 ∞ [1-F(x)]du (4.7) Now, we see that, ∫0 ∞ ∫0 u f(x).Ψ(u-x).dx.du = ∫0 ∞ ∫x u Ψ(u-x).du. f(x)dx = ∫0 ∞ ∫o ∞ Ψ(y).dy. f(x)dx. [Substituting y = (u-x)]. = ∫0 ∞ Ψ(y).dy (4.8) So using (4.8) in (4.7), we have: Ψ(0) = ( λ./c)* ∫ 0 ∞ [1-F(u)].du = ( λ./c)* m = λ/ (β*c) [since m=1/ β]. Thus, Φ(u) = 1 – [λ/ (β*c)]* e-(β- λ./c)u (4.9) From (3.1) we get: B(u,b) = Φ(u)/Φ(b) Therefore, B(u,b) = [1 – {λ/ (β*c)}* e-(β- λ./c)u ] /[1 – {λ/ (β*c)}* e-(β- λ./c)b ] (4.10) In Table1 of Section 5, B(u,b) is calculated for different values of ‘u’ and ‘b’, taking the premium loading factor to be 20%, that is, c = (1.2* λ* 1/ β) and the exponential parameter ‘β’ is taken to be 3/2. Erlangian DistributionB. Let us assume that the individual claim amount distribution has a Erlang(2,γ) distribution. So f(x) = γ2 xe-γx , x≥0, γ >0 is the pdf of the individual claim amount distribution. From previous discussion, we have:
  • 3. Study of the Barrier Probability in a Classical Risk Model for two different claim amount distributions with same Mean (IJSRD/Vol. 1/Issue 8/2013/0006) All rights reserved by www.ijsrd.com 1550 Ψ(0) = (λ.m)/c, that is, Ψ(0)= (2. λ )/(c. γ) [since m=2/ γ] (4.11) As Φ(0) = 1 - Ψ(0), we have: Φ(0) = 1 - (2. λ )/(c. γ) (4.12) Again from (4.3) we get: d/du[Φ(u)]=( λ./c)* Φ(u) - ( λ./c)* ∫0 u f(x)Φ(u-x)dx Taking Laplace Transform on both sides of the above integro-differential equation, we get; s* Φ^ (s) - Φ(0) = ( λ./c)* Φ^ (s) - ( λ./c)* f^ (s)*Φ^ (s) Rearranging, we have: Φ^ (s) = [c* Φ(0)]/[c*s – λ* { 1 – f^ (s)}] (4.13) Now, f^ (s) = ∫0 ∞ γ2 xe-γx . e-sx dx. = ∫0 ∞ γ2 xe-(γ+s)x dx. Hence, f^ (s) = γ2 / (γ+s)2 Substituting in (4.13) we get: Φ^ (s) = c*[1 - (2. λ) / (c. γ)]/[c*s - λ.* {1 - γ2 / (γ+s)2 }] (4.14) Let the premium loading factor be 20% and ‘γ’ = 3. So c = 1.2* λ*2/ γ. = 1.2* λ*2/ 3. = 0.8*λ. Hence, we get: Φ^ (s) = 0.8* λ *[1 - (2. λ) / (0.8*λ*3)]/ [0.8*λ*s - λ.* {1 - 9/ (3+s)2 }]. = 1/6* (3+s)2 / [s3 +4.75*s2 +1.5*s]. Therefore, Φ^ (s) = 1/6* (3+s)2 /s.(s+ α1).(s+ α2), (4.15) where α1=0.34015 , α2 = 4.40985. Using partial fractions, we have: Φ^ (s) = x0/s + x1/ (s+ α1) + x2/ (s+ α2), (4.16) where x0, x1 and x2 are constants Solving for x0, x1 and x2, we get: x0 =1, x1 = -0.85179 , x2 = 0.01846. so that, Φ^ (s) = 1/s - 0.85179/ (s + 0.34015) + 0.01846/ (s + 4.40985) (4.17) We invert this Laplace Transform to get: Φ(u) = 1- 0.85179*e-0.34015u + 0.01846*e-4.40985u (4.18) So using (3.1) we get: B(u,b) = Φ(u) / Φ(b) = [1- 0.85179*e-0.34015u + 0.01846*e-4.40985u ] / [1- 0.85179*e-0.34015b + 0.01846*e-4.40985b ] (4.19) In Table 2, of Section 5, B(u,b) is calculated for different values of ‘u’ and ‘b’ when individual claims distribution follows Erlang(2,3) distribution. V. NUMERICAL EVALUATION bu 0 1 2 3 4 5 1 0.47484 1 - - - - 2 0.33701 0.70972 1 - - - 3 0.27487 0.57886 0.76615 1 - - 4 0.24036 0.50618 0.71321 0.87444 1 - 5 0.21894 0.46108 0.64967 0.79653 0.91091 1 Table. 1: β = 3/2, c = 0.8* λ bu 0 1 2 3 4 5 1 0.423 1 - - - - 2 0.3377 0.7984 1 - - - 3 0.2405 0.5686 0.7122 1 - - 4 0.2133 0.4995 0.6315 0.8867 1 - 5 0.1974 0.4666 0.5844 0.8206 0.925 1 Table. 2: γ = 3, c = 0.8* λ VI. INTERPRETATION 1) From the above tables, we infer that as the value of the initial surplus ‘u’ gets larger, probability of reaching ‘b’ without falling below zero increases, that is, B(u,b) increases as ‘u’ increases. 2) B (u, b) reaches its peak, when the difference between ‘b’ and ‘u’ is minimal. 3) Since the barrier probabilities corresponding to different values of ‘u’ and ‘b’ are quite close in Tables 1 and 2, it can be shown by hypothesis testing that there is no significant difference in the values of B(u,b) for the two specified claim amount distributions. VII. CONCLUSION For a pre-estimated expected total claims, the barrier probability is quite stable with respect to different claim amount distributions having the same mean. REFERENCES [1] Cramer H (1930), ‘On the Mathematical Theory of Risk’ Skandia Jubilee Volume, Stockholm. [2] Dickson, D.C.M (2005), ‘Insurance Risk and Ruin’ Cambridge University Press, 2005. [3] Asmussen. S (2000), ‘ Ruin Probabilities’, World Scientific, Singapore,2000. [4] Gerber, H. U, Shiu, E. SW (2005), ‘On time value of ruin in a Sparre Andersen Model’, North American Actuarial Journal,2005, Vol 9, No 2, pp. 49-67. [5] Dickson, D.C.M, Gray, J.R (1984), ‘Exact solutions for ruin probabilities in the presence of an absorbing upper barrier, Scandinavian Actuarial Journal,1984, pp.174- 186. [6] Gerber, H. U, Goovaerts, M. J, Kaas. R (1987), ‘On the probability and severity of ruin’, Astin Bulletin,1987 Vol 17, No 2, pp. 151-163. [7] Dickson, D. C. M, Waters, H. R (1996), ‘Reinsurance and Ruin’, Insurance: Mathematics and Economics,1996, Vol 19, pp. 61-80. [8] Thampi K.K, Jacob M.J, Raju N (2007), ‘Barrier Probabilities and Maximum Severity of Ruin for a Renewal Risk Model’, International Journal of Theoretical and Applied Finance, 2007, Vol 10, No. 5, pp. 837-846. [9] Dickson, D. C. M (1998), ‘On a class of renewal risk processes’, North American Actuarial Journal,1998, Vol 2, No.3, pp. 60-73.