Hidden Equations of Threshold Risk
Abstract
We consider the problem of sensitivity of threshold risk, defined as the probability of a function of a random variable falling below a specified threshold level We demonstrate that for polynomial and rational functions of that random variable there exist at most finitely many risk critical points. The latter are those special values of the threshold parameter for which rate of change of risk is unbounded as approaches these threshold values. We characterize candidates for risk critical points as zeroes of either the resultant of a relevant perturbed polynomial, or of its leading coefficient, or both. Thus the equations that need to be solved are themselves polynomial equations in that exploit the algebraic properties of the underlying polynomial or rational functions. We name these important equations as ”hidden equations of threshold risk”.
1 Introduction and Motivation
This paper is motivated by the dual notions of “tipping points” and “risk sensitivity” frequently arising in society’s interactions with the natural environment. On some level the problem is at least as old as the history of agriculture with farmers being concerned about rainfall falling below some acceptable level, or onset of frost; a prototypical tipping point for successful cultivation of certain crops.
More recently, concerns about adverse climate change induced global warming have focused on the level of such warming exceeding thresholds such as 1.5 or 2.0 degrees C, by the year 2030 or 2050. Similarly, in the area of sustainable management of fisheries, regulators often consider a fishery secure if the biomass of the harvested species does not fall below a certain percentage (e.g., ) of the virgin biomass. From the perspective of mathematical modelling of these concerns we first recognise two essential features:
-
1.
often the variable that we are most interested in (e.g. harvest yield, or fish stock) depends essentially on at least one random variable;
-
2.
the tipping point is, perhaps, most naturally represented as a “special value” of some parameter. In particular, a value such that if the variable of interest falls below (or above) that value, this is considered to be a “high risk” situation.
The use of quotation marks in that last point suggests that there is a need to make these phrases precise so as to be able to analyse them rigorously. In particular, there are already several alternative mathematical formulations of risk often stemming from actuarial science, finance or engineering. However, in this paper, we take the position that the simple threshold risk is both appropriate and already challenging in the context of the management of natural resources such as fisheries. Conceptually, this risk is modelled as a tail probability
where is the threshold parameter, and is a given function.
At first sight, this formulation of risk may appear to correspond to a problem fully solved by mathematical statisticians and probabilists. In particular, it is a problem extensively studied in the context of extreme value theory (e.g., see [3]), financial mathematics (e.g., see [6], [7]) and large deviation theory (e.g., see [8]). These approaches focus primarily on asymptotic properties of tail probabilities of certain classes of distributions. However, our approach is essentially different in the sense that we explore the parametric sensitivity of the threshold risk induced by the algebraic form of the function of the random variable that is of interest.
Indeed, recent applied studies such as [2] and [4], indicate that the threshold risk may exhibit high sensitivity to the choice of model parameters, including the threshold parameter. The latter arose in two quite disparate contexts of hospital management and fishery population models. This leads us to a more formal definition and analysis of threshold risk and critical values of the threshold which are natural candidates for tipping points. This is taken up in the next section.
2 Risk sensitivity of threshold probability with polynomials of random variables
The most general one dimensional problem we will consider here is one where the random variable that is of main interest to us is actually a known rational function of another random variable whose cumulative distribution function(cdf) is also assumed to be known. In this paper we assume that is an absolutely continuous random variable, hence the density function is well-defined (see also Remark 2 in Section 3). We begin the analysis with a simpler case where a known polynomial in
Definition 1 (Risk with one polynomial function).
Let be a random variable and and consider a polynomial The threshold risk probability is
(1) |
where is a real valued parameter denoting the threshold.
Of course, in some applications the inequality in (1) would be reversed. More generally, the threshold could be a multiple of another polynomial function . In such a case, the threshold risk definition is extended as follows.
Definition 2 (Risk with two polynomial functions).
With the same quantities as in Definition 1 and
(2) |
Note that in both (1) and (2), we could have defined a -perturbed polynomial and expressed the threshold risk as
Naturally, in the case of (1), is identically equal to 1.
A change in risk as changes to will be measured by the ratio
(3) |
if the derivative exists and is close to
Definition 3.
Threshold risk sensitivity is now defined as follows.
-
1.
The risk sensitivity at is defined as the absolute value of the derivative , if it exists.
-
2.
If is infinite or undefined, then is a candidate risk critical point.
-
3.
We say is a risk critical point if there does not exist a neighbourhood of such that is uniformly bounded for all
This is related to (but not the same) as the hazard function used in demography and actuarial science. The latter considers the ratio of the probability density function at to the probability of exceeding that threshold.
To analyze the polynomial threshold risk in more detail it will be necessary to consider the real roots of the underlying polynomial. Let be the real roots of for . We can partition into union of following intervals
where we observe that the sign of the polynomial cannot change inside any of the intervals . Let . The threshold risk can now be expressed as
(4) |
where Hence its derivative with respect to is given by
(5) |
whenever the derivatives of these roots at exist.
Let denote the discriminant of the polynomial
Remark 1: It will be seen that the discriminant is a polynomial in . This is what we refer to as ”the hidden polynomial”. Consider the equation
() |
In the following proposition, we show that the hidden equation ( ‣ 2) is that of finding the roots of a polynomial in with finite order.
Proposition 1.
For the case where , the hidden polynomial is a polynomial in of order not greater than .
Proof.
Using Lemma 6 in the Appendix, we have
(6) |
Note that there are only columns containing . Therefore, is a polynomial in of order not greater than . ∎
The next theorem shows that zeroes of the discriminant play an important role in our analysis. In particular, the theorem will show these zeroes contain the candidates of risk critical points.
Theorem 1.
Let . It follows that
-
(i)
If the set of critical risk points is non-empty, then it is a subset of ,
-
(ii)
There exist at most critical risk points, where is the degree of .
Proof.
Proof of (i). We apply Theorem 3 in the Appendix. If , then for some , it has a root expansion with branching order , the root has a Puiseux series representation
and
If , if , therefore . However, not all are risk critical points. For instance, could be a repeated root but not in the support of the distribution of .
Similarly, if , then the root has an expansion with a power series
and
and we have Hence is not a risk critical point. Therefore, is a subset of .
Proof of (ii) follows immediately from Proposition 1. ∎
Example 1: Let and . Here , hence If , is a root with even multiplicity. By Theorem 1, it is a candidate risk critical point. If we perturb to , has roots and . Recalling the density function of standard normal distribution we see that equation (5) implies that the rate of change of the threshold risk is now given by . Clearly, the latter diverges as . It is now easy to see that is a risk critical point.
3 Repeating and non-repeating root decomposition of constant perturbation
In the previous section, we derived a theorem which identifies candidates for risk critical points. However, since the sensitivity of the risk also depends on the coefficients of the root expansion as well as the value of the density function, we need to further decompose the intervals in (4). In particular, we shall separate the contribution to the threshold risk from repeating and non-repeating roots.
Definition 4.
Let , where and are defined by
-
1.
if and only if and , and at least one of and is a repeated root of
-
2.
if and only if and , and both and are non-repeating roots of
Using the above definition, (4) can be partitioned as follows
(7) |
By Theorem 1, critical points must be among the zeroes of the discriminant of . However, the discriminant is zero only if the resultant is zero since the leading coefficient . Now the resultant is zero only if has repeated roots. If has no repeated roots, then the hidden equation ( ‣ 2) cannot be satisfied. Therefore is empty and is not a risk critical point.
Lemma 1.
For the non-repeated root component , we have
for some finite scalar .
Proof.
We have from (7)
(8) |
Since non-repeating roots have multiplicity 1, they have a root expansion in a small neighbourhood of as Understanding that , implies . If we only consider one interval , then
for some between and . Hence, we have
which is bounded. Since this holds for every interval in , the result follows from (8). ∎
The above lemma shows that in the case of a threshold such that the roots of polynomial are all non-repeating, cannot be a risk critical point. However the case where the polynomial has repeated roots is more complicated. Below, we first demonstrate the distinction between the case with the multiplicity of the repeated root being odd and even. Then we analyse the case where the interval in contains a repeated and a non-repeated root.
Lemma 2.
Consider the perturbation of the form , for and sufficiently close to , where is a repeated root of . Then the order of the branching point of a repeated root is exactly 2 if the multiplicity of the root is even, and exactly 1 if the multiplicity of the root is odd.
Proof.
The graph of the polynomial is simply the graph of shifted down by . If the multiplicity of the root is odd, the polynomial crosses the x-axis at the corresponding root . Hence there is only one branch of that root. If on the other hand, the multiplicity of the root is even, the polynomial touches x-axis at , but will have two distinct roots: one to the left of and one to its right. Hence there are two branches of the root. ∎
Proposition 2.
Consider the perturbation of the form , for and sufficiently close to . Suppose is the only repeated root of and . We have the following cases,
-
(i)
If has odd multiplicity, then it is not a risk critical point,
-
(ii)
If has even multiplicity and in a deleted neighbourhood of , then is risk critical point.
-
(iii)
If has even multiplicity and in a deleted neighbourhood of , then is not a risk critical point.
Proof.
(i) If has odd multiplicity, by Lemma 2, the order of the branching point of is . Therefore, by Theorem 3(b) of the Appendix, it has the root expansion in a small neighbourhood of as Understanding that , it follows that , and without loss of generality, we have that is a non-repeated root of . It now follows that
for some between and . The right hand side of the above is bounded. Similarly for contributions to for all other intervals where . Hence is not a risk critical point.
(ii) Similarly, by Lemma 2, if has even multiplicity and in a deleted neighbourhood of , the order of branching point is . Therefore, by Theorem 3(b) of the Appendix, there are two root expansions in a small neighbourhood of namely and . It follows that . Next
for some between and . If we consider , we have
(9) |
Since has even multiplicity, for and sufficiently close to , one of the roots, say is bigger than , and the other one is smaller. Hence if , then and . Therefore , and the above limit diverges as .
Note that contributions to for all other intervals where are constant as in (i). Hence is a risk critical point.
(iii) If has even multiplicity and in a deleted neighbourhood of , then is a local maximum of . Hence, the interval is of measure and contributes nothing to . When the graph of the polynomial is shifted down by there is no longer a root in a sufficiently small neighbourhood of . Hence, again, there is no contribution to from . Thus is not a risk critical point. ∎
Corollary 1.
Assume conditions of Proposition 2 (ii) apply to two or more distinct repeated roots , with even multiplicity. If the density function for at least one of these roots, then is a risk critical point.
Proof.
This is a generalization of Proposition 2. Since these even multiplicity roots are local minima, they contribute to the threshold risk sensitivity, in the limit as , as in the proof of part (ii) of Proposition 2. Furthermore, there is no such contribution from any other roots.
∎
Remark 2: Note that the assumption that was an absolutely continuous random variable could be easily relaxed, but at the cost of more complicated notation and some additional technicalities. For instance, if is a discontinuity of the cdf and is a threshold such that the root then is a candidate for a risk critical point.
4 Rational Function
Next we analyze the situation when the underlying function of the random variable is a rational function, namely, a ratio of two polynomials. Indeed, this was the case in the motivating study [4].
Definition 5 (Risk with rational function).
Let be a random variable and . Let and be two co-prime polynomials. Let and consider the threshold risk
(10) |
The risk sensitivity is defined as before in Definition 2. In this rational function case the roots of the denominator will impact (10). To compute the threshold risk, let be the real roots of polynomial where . We can factor as
Now we can partition by these roots as
(11) |
Some of the intervals can have zero length if there are repeated roots for . Next, we define the event of interest as
(12) |
where . Then we partition the index set as
The threshold risk probability can be computed as
(13) |
For the polynomial function , we can express the events in (13) more explicitly conditioned on the sign of
(14) |
Let , where , be the real roots of this polynomial . We can factor this polynomial as
and similarly, we can partition by these roots as
(15) |
Using (14) and (15), we can sub-divide each into parts intersecting with the intervals , by defining
(16) |
There are two cases to consider
(17) |
where and It is important to note that the sign of remains constant on each interval and hence also on . If
(18) |
If
(19) |
Hence, we can refine (13) and compute the threshold risk probability for the rational function as
(20) |
Let
Substituting (18) and (19) into (20) and rearranging, we obtain the risk probability
(21) |
and its derivative, whenever it exists.
(22) |
Equations (21)-(22) are analogous to (4)-(5) in the one polynomial case. Naturally, they reflect an additional degree of complexity arising from the possibility of overlaps between intervals and . While this complexity is unavoidable, one case where there are no difficulties is described in the next lemma.
Lemma 3.
Proof.
Under the interval inclusion hypotheses it can be easily verified that for every and . Hence equation (22) is well-defined and reduces to
since none of the terms depend on . Thus the derivative of the risk is and hence cannot be a risk critical point. ∎
5 Hidden equation of polynomially perturbed case
In this section, we are going to discuss the hidden equations of the perturbed polynomial in the form . As before, assume and are polynomials. This is a more complicated case compared to the constant perturbation discussed in Section 3.
Lemma 4.
Let where . The maximum order of the hidden polynomial has the following cases:
-
1.
if and ,
-
2.
if and ,
-
3.
if and
Proof.
Suppose . Using Lemma 6 in the Appendix, we can compute the discriminant in as follows,
(23) |
Note that every row depends linearly on . We use the multi-linearity of determinant of the Sylvester’s matrix. We observe that it is a polynomial in of degree . Multiplying it by , it becomes a polynomial in with maximum degree of . The proofs of the other cases are very similar. ∎
Let . The set is the set of zeroes of the leading coefficient of , and be the set of which are zeroes of the discriminant but not of the leading coefficient. Using (31) in Definition 8 of the Appendix, we note that can be a zero of the discriminant of either by being a zero of the resultant or a zero of the leading coefficient. The latter occurs when .
With the help of Lemma 4, we can find the candidates for the risk critical points by solving the hidden equations in . However, as we have seen in the previous sections, not all roots of the hidden equations are guaranteed to be risk critical points. For instance, if , we have the following corollary.
Corollary 2.
If , then is a candidate for risk critical point irrespective of the branching order of the root .
Proof.
Using Theorem 3(c) in the Appendix, if , then is zero of the leading coefficient of with multiplicity 1 because the leading coefficient of is linear in . The root has a Laurent-Puiseux series representation
(24) |
where is the order of the branching point. If we take the derivative of the first term of , we have , this will diverge for any as . ∎
Remark 3: In this section the perturbed polynomial was of the form In this case there are two hidden equations associated with characterization of risk critical points. The first, as before, is ( ‣ 2) and the second where the leading coefficient is 0, namely
() |
6 Illustration via Simulations
In this section, we present examples demonstrating some of the key results derived earlier. In particular, we show the importance of the connection between the distribution of the underlying random variable and the location of the roots of the perturbed polynomials. We are going to show three numerical examples of risk critical points. The probabilities of the interval events were calculated using Monte Carlo method and roots of the perturbed polynomials were derived manually.
Example 2: Let . Here the hidden equation is , and we have two candidates for the risk critical points, and When , is a root with even multiplicity and when , is a root with even multiplicity. Hence we simulated the threshold risk using random variables and respectively.


Figure 1 demonstrates high sensitivity of in the neighbourhoods of and
Example 3: Let . Here the hidden equation is , we have one candidate for a risk critical point, When , is a root of . Hence we simulated the risk using random variable .

Figure 2 once again shows the sensitivity of threshold risk in the neighbourhood of . However, note that when increases from , by the symmetry of normal distribution, the threshold risk increases rapidly from towards . Similarly, for decreasing from .
Example 4: Let . Here the , hence the hidden equation ( ‣ 2) has no roots. In accordance with Corollary 2, the remaining hidden equation ( ‣ 5) corresponds to the leading coefficient becoming 0. In this case, we have only one candidate for the risk critical point, . However, note that as approaches from above, the non-zero root of approaches . Hence, the sensitivity of the threshold risk only manifests itself for distributions with sufficiently heavy tails. Hence we simulate the risk using random variable .

Figure 3 exhibits the sensitivity of threshold risk in the neighbourhood of the risk critical point .
Appendix A
For the sake of completeness, we recall a number of important relationships involving polynomials, resultants and the discriminant. While proofs of some of these results can be found in many sources we cite mainly the widely used reference [5]. We also cite [1] because the latter contains the proof of Theorem 3 that is not easily found elsewhere.
Definition 6.
For real polynomials and , with , their resultant is the determinant of the Sylvester matrix, given by
(25) |
Theorem 2.
For real polynomials and , suppose that has roots and has roots (not necessarily distinct). Then the resultant can be computed as
(26) |
Proof.
See reference [5] page 408. ∎
Lemma 5.
For real polynomials and , where , suppose that has roots and has roots (not necessarily distinct). Then the resultant can be computed as
(27) |
where , and .
Proof.
Follows immediately from Theorem 2. ∎
Definition 7.
Let be a real polynomial, the discriminant of is
(28) |
where are the roots of (not necessarily distinct).
Lemma 6.
Let , the discriminant of is given by
(29) |
Proof.
Follows from equation (1.23) on Page 404 of [5]. ∎
Definition 8.
Let
(30) |
is a bivariate polynomial with the perturbation variable . Using (28), the discriminant of has the following form
(31) |
where are the roots of .
Let be the zero set of . More specifically, and . The following theorem provides the algebraic analytic form of the root function in various situations with respect to the nature of the point . We note that, in some cases, the latter is an analytic multi-valued function defined in a punctured neighborhood of satisfying for all in the complement of . In those cases, the type of series expansion that results depends on the limiting properties of when z approaches , as stated more precisely in the theorem.
Theorem 3.
(Classification of root expansions [1])
-
(a)
If and is not a zero of , then in a neighborhood of every one of the branches of the solution is holomorphic, and so it has the analytic representation
(32) -
(b)
If , then is a branching point of some order for every branch of the solution and also . In this case the solution has a Puiseux series representation
(33) -
(c)
If and is a zero of multiplicity of , then for any branch of the point is a branching point of some order and for all . In this situation the solution has a Laurent-Puiseux series representation
(34) -
(d)
If and is the zero of multiplicity of , then is a pole or order for every branch of the solution , and in this situation the solution has a Laurent series representation
(35)
Proof.
See Theorem 4.8 on Page 93 [1]. ∎
References
- Avrachenkov et al. [2013] Avrachenkov, K., J. A. Filar, and P. G. Howlett (2013). Analytic perturbation theory and its applications. Philadelphia: Society for Industrial and Applied Mathematics.
- Ben-Tovim et al. [2018] Ben-Tovim, D., T. Bogomolov, J. Filar, P. Hakendorf, S. Qin, and C. Thompson (2018, September). Hospital’s instability wedges. Health Systems 9(3), 202–211.
- Embrechts et al. [1997] Embrechts, P., C. Klüppelberg, and T. Mikosch (1997). Modelling Extremal Events. Berlin, Heidelberg: Springer Berlin Heidelberg.
- Filar et al. [2020] Filar, J. A., Z. Qiao, and S. Streipert (2020). Risk sensitivity in beverton–holt fishery with multiplicative harvest. Natural Resource Modeling 33(3), e12257.
- Gelfand et al. [1994] Gelfand, I. M., M. M. Kapranov, and A. V. Zelevinsky (1994). Discriminants, resultants, and multidimensional determinants. Mathematics : Theory & Applications. Boston: Birkhäuser.
- Gourieroux et al. [2000] Gourieroux, C., J. Laurent, and O. Scaillet (2000). Sensitivity analysis of values at risk. Journal of Empirical Finance 7(3), 225 – 245. Special issue on Risk Management.
- Klüppelberg and Stadtmüller [1998] Klüppelberg, C. and U. Stadtmüller (1998). Ruin probabilities in the presence of heavy-tails and interest rates. Scandinavian Actuarial Journal 1998(1), 49–58.
- Varadhan [1984] Varadhan, S. R. S. (1984). Large deviations and applications. Number 46 in CBMS-NSF regional conference series in applied mathematics. Philadelphia, Pa: Society for Industrial and Applied Mathematics.