Professional Documents
Culture Documents
Jess Fernndez-Villaverde
University of Pennsylvania
Perturbation Methods
1 / 92
Introduction
Remember that we want to solve a functional equations of the form:
H (d ) = 0
for an unknown decision rule d.
Perturbation solves the problem by specifying:
d n (x, ) =
i (x
x0 )i
i =0
Perturbation Methods
2 / 92
Motivation
Many complicated mathematical problems have:
1
or a related problem.
Perturbation Methods
3 / 92
Applications to Economics
Judd and Guu (1993) showed how to apply it to economic problems.
Perturbation Methods
4 / 92
Perturbation Methods
5 / 92
References
General:
1
Economics:
1
Perturbation Methods
6 / 92
t log ct
t =0
s.t. ct + kt +1 = e zt kt + (1
zt = zt
+ t , t
) kt , 8 t > 0
N (0, 1)
Equilibrium conditions:
1
1
= Et
1 + e zt +1 kt+11
ct
ct + 1
ct + kt +1 = e zt kt + (1 ) kt
zt = zt
+ t
Perturbation Methods
7 / 92
Labor is constant.
Perturbation Methods
8 / 92
Solution
Equilibrium conditions with = 1.
e zt +1 kt+11
1
= Et
ct
ct + 1
ct + kt +1 = e zt kt
zt = zt
+ t
) e zt kt
kt +1 = e zt kt
How can you check? Plug the solution in the equilibrium conditions.
Perturbation Methods
9 / 92
ct = c (kt , zt )
and another one for capital:
kt +1 = k (kt , zt )
Note that our d is just the stack of c (kt , zt ) and k (kt , zt ).
Jess Fernndez-Villaverde (PENN)
Perturbation Methods
10 / 92
Equilibrium Conditions
We substitute in the equilibrium conditions the budget constraint and
the law of motion for technology.
Then, we have:
e zt +t +1 k (kt , zt ) 1
1
= Et
c (kt , zt )
c (k (kt , zt ) , zt + t +1 )
c (kt , zt ) + k (kt , zt ) = e zt kt
This is a system of functional equations.
Perturbation Methods
11 / 92
Main Idea
Perturbation Methods
12 / 92
A Perturbation Approach
Hence, we want to transform the problem.
Perturbation Methods
13 / 92
Perturbation Methods
14 / 92
Taylors Theorem
Equilibrium conditions:
Et
1
c (kt , zt ; )
e zt +t +1 k (kt , zt ; ) 1
c (k (kt , zt ; ) , zt + t +1 ; )
c (kt , zt ; ) + k (kt , zt ; )
=0
e zt kt = 0
Perturbation Methods
15 / 92
Asymptotic Expansion I
ct
Perturbation Methods
16 / 92
Asymptotic Expansion II
kt +1 =
Perturbation Methods
17 / 92
Comment on Notation
From now on, to save on notation, I will write
#
"
e zt +t +1 k (k t ,zt ;) 1
1
c (k (kt ,zt ;),zt +t +1 ;)
c (k t ,zt ; )
=
F (kt , zt ; ) = Et
c (kt , zt ; ) + k (kt , zt ; ) e zt kt
0
0
Note that:
F (kt , zt ; ) = H (ct , ct +1 , kt , kt +1 , zt ; )
Perturbation Methods
18 / 92
Zero-Order Approximation
First, we evaluate = 0:
F (kt , 0; 0) = 0
Steady state:
1
k
=
c
c
1 = k
or,
Then:
c = c (k, 0; 0) = () 1
() 1
k = k (k, 0; 0) = () 1
Perturbation Methods
19 / 92
First-Order Approximation
We take derivatives of F (kt , zt ; ) around k, 0, and 0.
With respect to kt :
Fk (k, 0; 0) = 0
With respect to zt :
Fz (k, 0; 0) = 0
With respect to :
F (k, 0; 0) = 0
Perturbation Methods
20 / 92
Fz (k, 0; 0) = H1 cz + H2 (ck kz + ck ) + H4 kz + H5 = 0
F (k, 0; 0) = H1 c + H2 (ck k + c ) + H4 k + H6 = 0
Perturbation Methods
21 / 92
Fz (k, 0; 0) = H1 cz + H2 (ck kz + ck ) + H4 kz + H5 = 0
Uhlig (1999).
Sims (2000).
Klein (2000).
Perturbation Methods
22 / 92
Perturbation Methods
23 / 92
Theorems.
Perturbation Methods
24 / 92
Perturbation Methods
25 / 92
Second-Order Approximation
We take second-order derivatives of F (kt , zt ; ) around k, 0, and 0:
Fkk (k, 0; 0) = 0
Fkz (k, 0; 0) = 0
Fk (k, 0; 0) = 0
Fzz (k, 0; 0) = 0
Fz (k, 0; 0) = 0
F (k, 0; 0) = 0
Remember Youngs theorem!
We substitute the coe cients that we already know.
A linear system of 12 equations on 12 unknowns. Why linear?
Cross-terms k and z are zero.
Conjecture on all the terms with odd powers of .
Jess Fernndez-Villaverde (PENN)
Perturbation Methods
26 / 92
We have a term in 2 .
Captures precautionary behavior.
We do not have certainty equivalence any more!
Important advantage of second order approximation.
Changes ergodic distribution of states.
Perturbation Methods
27 / 92
Perturbation Methods
28 / 92
A Numerical Example
Parameter
Value
0.99
0.33
0.95
0.01
Steady State:
c = 0.388069
k = 0.1883
First-order components:
ck (k, 0; 0) = 0.680101
cz (k, 0; 0) = 0.388069
kk (k, 0; 0) = 0.33
kz (k, 0; 0) = 0.1883
Second-order components:
ckk (k, 0; 0) = 2.41990
ckz (k, 0; 0) = 0.680099
czz (k, 0; 0) = 0.388064
c2 (k, 0; 0) ' 0
Perturbation Methods
29 / 92
Comparison
ct = 0.6733e zt kt0.33
ct ' 0.388069 + 0.680101 (kt k ) + 0.388069zt
2.41990
0.388064 2
zt
(kt k )2 + 0.680099 (kt k ) zt +
2
2
and:
kt +1 = 0.3267e zt kt0.33
kt +1 ' 0.1883 + 0.33 (kt
1.1742
(kt k )2 + 0.33 (kt
2
Perturbation Methods
k ) + 0.1883zt
0.1883 2
k ) zt +
zt
2
30 / 92
Perturbation Methods
31 / 92
A Computer
In practice you do all this approximations with a computer:
1
Perturbation Methods
32 / 92
Perturbation Methods
33 / 92
Perturbation Methods
34 / 92
Remarks
Perturbation Methods
35 / 92
e zt +1 k i (kt , zt ) 1
c i (k i (kt , zt ), zt +1 )
we can dene:
EE i (kt , zt )
c i (kt , zt ) Et
e zt +1 k i (kt , zt ) 1
c i (k i (kt , zt ), zt +1 )
Units of reporting.
Interpretation.
Jess Fernndez-Villaverde (PENN)
Perturbation Methods
36 / 92
Perturbation Methods
37 / 92
1 vector of
Dene n = nx + ny .
Then H maps R ny
Jess Fernndez-Villaverde (PENN)
R ny
R nx
R nx into R n .
Perturbation Methods
38 / 92
ne )
Perturbation Methods
39 / 92
e is a known ne ne matrix.
e is a ne 1 i.i.d innovation with bounded support, zero mean, and
variance/covariance matrix I .
Perturbation Methods
40 / 92
The scalar
Why bounded support? Samuelson (1970) and Jin and Judd (2002).
Perturbation Methods
41 / 92
x = h (x; ) + e0
where g maps R nx
R + into R nx .
Perturbation Methods
42 / 92
Perturbation
H(y , y , x,
x ) = 0.
Perturbation Methods
43 / 92
F (x; )
8x, , j, k,
Perturbation Methods
44 / 92
First-Order Approximation
We are looking for approximations to g and h around (x, ) = (x,
0)
of the form:
g (x; ) = g (x;
0) + gx (x;
0)(x
x ) + g (x;
0)
h (x; ) = h (x;
0) + hx (x;
0)(x
x ) + h (x;
0)
As explained earlier,
g (x;
0) = y
and
h (x;
0) = x.
Perturbation Methods
45 / 92
Tensors
General trick from physics.
An nth -rank tensor in a m-dimensional space is an operator that has n
indices and mn components and obeys certain transformation rules.
ny matrix.
n x H i g h
Thus, [Hy ]i [gx ] [hx ]j = =
1 =1 y x x j .
[Hy 0 y 0 ]i :
1
Perturbation Methods
46 / 92
[Fx (x;
0)]ij = [Hy 0 ]i [gx ] [hx ]j + [Hy ]i [gx ]j + [Hx 0 ]i [hx ]j + [Hx ]ij =
i = 1, . . . , n; j, = 1, . . . , nx ; = 1, . . . , ny
nx
Perturbation Methods
47 / 92
[F (x;
0)]i =
Et f[Hy 0 ]i [gx ] [h ] + [Hy 0 ]i [gx ] [ ] [e0 ] + [Hy 0 ]i [g ]
i = 1, . . . , n;
= 1, . . . , ny ;
= 1, . . . , nx ;
= 1, . . . , ne .
Then:
[F (x;
0)]i
= [Hy 0 ]i [gx ] [h ] + [Hy 0 ]i [g ] + [Hy ]i [g ] + [fx 0 ]i [h ] = 0;
i = 1, . . . , n;
= 1, . . . , ny ;
= 1, . . . , nx ;
= 1, . . . , ne .
Perturbation Methods
48 / 92
Second-Order Approximation I
The second-order approximations to g around (x; ) = (x;
0) is
[g (x; )]i
= [g (x;
0)]i + [gx (x;
0)]ia [(x x )]a + [g (x;
0)]i []
1
+ [gxx (x;
0)]iab [(x x )]a [(x x )]b
2
1
+ [gx (x;
0)]ia [(x x )]a [ ]
2
1
+ [gx (x;
0)]ia [(x x )]a []
2
1
0)]i [][]
+ [g (x;
2
where i = 1, . . . , ny , a, b = 1, . . . , nx , and j = 1, . . . , nx .
Perturbation Methods
49 / 92
Second-Order Approximation II
The second-order approximations to h around (x; ) = (x;
0) is
[h(x; )]j
= [h(x;
0)]j + [hx (x;
0)]ja [(x x )]a + [h (x;
0)]j []
1
+ [hxx (x;
0)]jab [(x x )]a [(x x )]b
2
1
+ [hx (x;
0)]ja [(x x )]a []
2
1
+ [hx (x;
0)]ja [(x x )]a []
2
1
0)]j [][],
+ [h (x;
2
where i = 1, . . . , ny , a, b = 1, . . . , nx , and j = 1, . . . , nx .
Perturbation Methods
50 / 92
The unknowns of these expansions are [gxx ]iab , [gx ]ia , [gx ]ia , [g ]i ,
[hxx ]jab , [hx ]ja , [hx ]ja , [h ]j .
These coe cients can be identied by taking the derivative of F (x; )
with respect to x and twice and evaluating them at (x; ) = (x;
0).
By the arguments provided earlier, these derivatives must be zero.
Perturbation Methods
51 / 92
[Fxx (x;
0)]ijk =
[Hy 0 y 0 ]i [gx ] [hx ]k + [Hy 0 y ]i [gx ]k + [Hy 0 x 0 ]i [hx ]k + [Hy 0 x ]ik [gx ] [hx ]j
+ [Hyy 0 ]i [gx ] [hx ]k + [Hyy ]i [gx ]k + [Hyx 0 ]i [hx ]k + [Hyx ]ik [gx ]j
+ [Hx 0 y 0 ]i [gx ] [hx ]k + [Hx 0 y ]i [gx ]k + [Hx 0 x 0 ]i [hx ]k + [Hx 0 x ]ik [hx ]j
+[Hxy 0 ]ij [gx ] [hx ]k + [Hxy ]ij [gx ]k + [Hxx 0 ]ij [hx ]k + [Hxx ]ijk = 0;
i = 1, . . . n,
j, k, , = 1, . . . nx ;
Perturbation Methods
, = 1, . . . ny .
June 13, 2010
52 / 92
Perturbation Methods
53 / 92
[F (x;
0)]i
= [Hy 0 ]i [gx ] [h ]
+[Hy 0 y 0 ]i [gx ] [ ] [gx ] [ ] [I ]
+[Hy 0 x 0 ]i [ ] [gx ] [ ] [I ]
+[Hy ]i [g ] + [Hx 0 ]i [h ]
+[Hx 0 y 0 ]i [gx ] [ ] [ ] [I ]
+[Hx 0 x 0 ]i [ ] [ ] [I ] = 0;
i = 1, . . . , n; , = 1, . . . , ny ; , = 1, . . . , nx ; , = 1, . . . , ne
Perturbation Methods
54 / 92
Cross Derivatives
The cross derivatives gx and hx are zero when evaluated at (x,
0).
Why? Write the system Fx (x;
0) = 0 taking into account that all
terms containing either g or h are zero at (x,
0).
Then:
[Fx (x;
0)]ij = [Hy 0 ]i [gx ] [hx ]j + [Hy 0 ]i [gx ] [hx ]j +
i = 1, . . . n;
= 1, . . . , ny ;
, , j = 1, . . . , nx .
nx unknowns given by
= 0
= 0
Perturbation Methods
55 / 92
Perturbation Methods
56 / 92
Higher-Order Approximations
We can iterate this procedure as many times as we want.
We can obtain n-th order approximations.
Problems:
1
Numerical instabilities.
Computational costs.
Perturbation Methods
57 / 92
Erik Eady
It is not the process of linearization that limits insight.
It is the nature of the state that we choose to linearize about.
Perturbation Methods
58 / 92
Change of Variables
We approximated our solution in levels.
We could have done it in logs.
Why stop there? Why not in powers of the state variables?
Judd (2002) has provided methods for changes of variables.
We apply and extend ideas to the stochastic neoclassical growth
model.
Perturbation Methods
59 / 92
A General Transformation
We look at solutions of the form:
c0
= a k
k0 + bz
k 0
k0
= c k
k0 + dz
Note that:
1
Perturbation Methods
60 / 92
Theory
The rst order solution can be written as
f (x ) ' f (a ) + (x
a ) f 0 (a )
b )
Perturbation Methods
61 / 92
= a1 ( k
l0 ) = c1 ( k
k0
(l
k0 ) + b1 z
k0 ) + d1 z
a3 = k0
c3 =
a1
1 1
k0 c1
l0
b3 = k0
d3 =
Perturbation Methods
b1
1
l0 d1
62 / 92
1
0.986534
SEE
1
1
0.0856279
0.991673 2.47856 0.0279944
Perturbation Methods
63 / 92
Sensitivity Analysis
Dierent parameter values.
Most interesting nding is when we change :
Optimal Parameters for dierent s
Perturbation Methods
64 / 92
Perturbation Methods
65 / 92
A Quasi-Optimal Approximation
Sensitivity analysis reveals that for dierent parametrizations
'
This suggests the quasi-optimal approximation:
k 0
k0
= a3 k
k0 + b3 z
l0
= c3 k
k0 + d3 z
Linear system:
1
2
k0 and bl = l
l0 we get:
kb0 = a3 kb + b3 z
bl = c3 kb + d3 z
Perturbation Methods
66 / 92
Gain insight.
Evaluate welfare.
Perturbation
Methods
June 13,
2010 we 67 / 92
More general point: we can
perturb
any operator problem
that
Basic Problem
Imagine that we have:
"
c
) t
+ Et V (kt +1 , zt +1 )
1
V (kt , zt ) = max (1
ct
s.t. ct + kt +1 = e zt kt + (1
zt = zt
+ t , t
) kt
N (0, 1)
Write it as:
"
V (kt , zt ; ) = max (1
ct
c
+ Et V (kt +1 , zt +1 ; )
) t
1
s.t. ct + kt +1 = e zt kt + (1
zt = zt
+ t , t
Perturbation Methods
) kt
N (0, 1)
June 13, 2010
68 / 92
Alternative
Another way to write the value function is:
max
ct
"
V (kt , zt ; ) =
1
(1 ) c1t +
Et V e zt kt + (1 ) kt ct , zt + t +1 ;
This form makes the dependences in the next period states explicit.
Perturbation Methods
69 / 92
kss )
where
Vss
Vi ,ss
Vij ,ss
Jess Fernndez-Villaverde (PENN)
= V (kss , 0; 0)
= Vi (kss , 0; 0) for i = f1, 2, 3g
= Vij (kss , 0; 0) for i, j = f1, 2, 3g
Perturbation Methods
70 / 92
Perturbation Methods
71 / 92
where:
c1,ss
c2,ss
c3,ss
= c1 (kss , 0; 0)
= c2 (kss , 0; 0)
= c3 (kss , 0; 0)
Perturbation Methods
72 / 92
Perturbation Methods
73 / 92
Derivatives
Derivative with respect to ct :
(1
) ct
Et V1,t +1 = 0
+1
Perturbation Methods
74 / 92
System of Equations I
Now, we have the system:
ct + kt +1 = e zt kt + (1
V (kt , zt ; ) = (1
(1
) ct
1
ct
) kt
+ Et V (kt +1 , zt +1 ; )
Et V1,t +1 = 0
V1,t = Et V1,t +1 e zt kt 1 + 1
h
i
V2,t = Et V1,t +1 e zt kt + V2,t +1
V3,t = Et [V2,t +1 t +1 + V3,t +1 ]
zt = zt
+ t
Perturbation Methods
75 / 92
System of Equations II
If we set = 0 and compute the steady state, we get a system of six
equations on six unknowns, css , kss , Vss , V1,ss , V2,ss , and V3,ss :
css + kss = kss
1
Vss = (1
(1
) css
css
+ Vss
1
V1,ss = 0
css
1 .
1
css .
Perturbation Methods
76 / 92
Then:
1 = kss 1 + 1
h
i
V2,ss = V1,ss kss + V2,ss
1
kss =
1
1
1+
css = kss
kss
1
k c
V2,ss =
1 ss ss
V1,ss > 0 and V2,ss > 0, as predicted by theory.
Jess Fernndez-Villaverde (PENN)
Perturbation Methods
77 / 92
(1
) c (kt , zt ; )
Et V1,t +1 = 0
V1,t = Et V1,t +1 e zt kt 1 + 1
h
i
zt
V2,t = Et V1,t +1 e kt + V2,t +1
V3,t = Et [V2,t +1 t +1 + V3,t +1 ]
where:
kt +1 = e zt kt + (1
zt
= zt
) kt
+ t , t
c (kt , zt ; )
N (0, 1)
Perturbation Methods
78 / 92
First Equation I
We have:
(1
) c (kt , zt ; )
Et V1,t +1 = 0
(1
) c (kt , zt ; )
Et V11,t +1 e zt kt
In steady state:
V11,ss
(1
) css
or
c1,t
c1,t
h
c1,ss = V11,ss kss
=0
+1
V11,ss
c1,ss =
V11,ss
(1
+1
Perturbation Methods
) css
+1
.
June 13, 2010
79 / 92
First Equation II
Derivative with respect to zt :
(1
) c (kt , zt ; )
Et V11,t +1 e zt kt
c2,t
c2,t + V12,t +1 = 0
In steady state:
(1
V11,ss
) css
or
c2,ss =
V11,ss
(1
) css
Perturbation Methods
80 / 92
(1
) c (kt , zt ; )
c3,t
(1
) css
c3,ss = V13,ss
or
c3,ss =
V11,ss
(1
) css
Perturbation Methods
V13,ss
81 / 92
Second Equation I
We have:
V1,t = Et V1,t +1 e zt kt
+1
e zt kt
c1,t
+1
1) e zt kt
In steady state:
V11,ss = V11,ss
c1,ss
+ V1,ss (
1) kss
or
V11,ss =
V1,ss (
+ c1,ss
Perturbation Methods
1) kss
82 / 92
Second Equation II
Derivative with respect to zt :
2
V11,t +1 e zt kt c2,t e zt kt 1 + 1
V12,t = Et 4
+V12,t +1 e zt kt 1 + 1 + V1,t +1 e zt kt
In steady state:
1
1
V11,ss kss
Perturbation Methods
3
5
83 / 92
V11,ss c3,ss
=
1
c3,ss =
V11,ss
(1
) css
V13,ss
Perturbation Methods
84 / 92
Third Equation I
We have
h
i
V2,t = Et V1,t +1 e zt kt + V2,t +1
V22,t = Et
In steady state:
V22,t
V22,ss
=
=
1 2
Perturbation Methods
85 / 92
Third Equation II
In steady state:
V23,ss = 0
Perturbation Methods
86 / 92
Fourth Equation
We have
V3,t = Et [V2,t +1 t +1 + V3,t +1 ] .
Derivative with respect to :
V33,t = Et
In steady state:
V33,ss =
V22,ss
Perturbation Methods
87 / 92
System I
V11,ss
c1,ss =
V11,ss
(1
) css
V11,ss =
V1,ss ( 1) kss 2
1
1 + c1,ss
i
1 h
V12,ss =
c2,ss + V1,ss kss 1
V11,ss kss
1
2 V22,ss
V33,ss =
1
c2,ss =
V11,ss
(1
Perturbation Methods
88 / 92
System II
This is a system of nonlinear equations.
However, it has a recursive structure.
By substituting variables that we already know, we can nd V11,ss .
Then, using this results and by plugging c2,ss , we have a system of
two equations, on two unknowns, V12,ss and V22,ss .
Once the system is solved, we can nd c1,ss , c2,ss , and V33,ss directly.
Perturbation Methods
89 / 92
1
V (kss , 0; ) ' Vss + V33,ss
2
Hence 12 V33,ss is a measure of the welfare cost of the business cycle.
Note that this quantity is not necessarily negative. Indeed, it may well
be positive in many models, like in a RBC with leisure choice. See
Cho and Cooley (2000).
Jess Fernndez-Villaverde (PENN)
Perturbation Methods
90 / 92
Our Example
We know that Vss =
css
1 .
(1
(css (1
1
css
1
+ V33,ss
1 2
)1
= (1
1 css1
=1
1+
css
1
V
2 33,ss
Perturbation Methods
1
) V33,ss
2
or
1
))1
1
1
91 / 92
A Numerical Example
We pick standard parameter values by setting
= 0.99, = 2, = 0.0294, = 0.3, and = 0.95.
Then, we get:
V (kt , zt ; 1) '
kss )
kss ) + 0.11684zt
0.00985zt2
0.00225 (kt
kss ) zt
kss ) + 0.74318zt
Perturbation Methods
92 / 92