Allowing for weak identication when testing GARCH-X type models Philipp Ketz

2025-04-30 0 0 604.52KB 29 页 10玖币
侵权投诉
Allowing for weak identification when testing
GARCH-X type models
Philipp Ketz
October 21, 2022
Abstract
In this paper, we use the results in Andrews and Cheng (2012), extended to allow
for parameters to be near or at the boundary of the parameter space, to derive the
asymptotic distributions of the two test statistics that are used in the two-step (testing)
procedure proposed by Pedersen and Rahbek (2019). The latter aims at testing the
null hypothesis that a GARCH-X type model, with exogenous covariates (X), reduces
to a standard GARCH type model, while allowing the “GARCH parameter” to be
unidentified. We then provide a characterization result for the asymptotic size of
any test for testing this null hypothesis before numerically establishing a lower bound
on the asymptotic size of the two-step procedure at the 5% nominal level. This lower
bound exceeds the nominal level, revealing that the two-step procedure does not control
asymptotic size. In a simulation study, we show that this finding is relevant for finite
samples, in that the two-step procedure can suffer from overrejection in finite samples.
We also propose a new test that, by construction, controls asymptotic size and is found
to be more powerful than the two-step procedure when the “ARCH parameter” is “very
small” (in which case the two-step procedure underrejects).
Keywords: Boundary, weak identification, testing.
Paris School of Economics - CNRS. E-mail: philipp.ketz@psemail.eu.
arXiv:2210.11398v1 [econ.EM] 20 Oct 2022
1 Introduction
In a GARCH-X type model, the variance of a generalized autoregressive conditional het-
eroskedasticity (GARCH) type model is augmented by a set of exogenous regressors (X).
Naturally, the question arises if the more general GARCH-X type model can be reduced
to the simpler GARCH type model. Statistically speaking, the problem reduces to testing
whether the coefficients on the exogenous regressors are equal to zero. As noted in Pedersen
and Rahbek (2019) (PR hereinafter), the testing problem is non-standard due to the pres-
ence of two nuisance parameters that could possibly be at the boundary of the parameter
space. In addition, under the null hypothesis, one of the nuisance parameters, the “GARCH
parameter”, is not identified when the other, the “ARCH parameter”, is at the boundary.
In order to address this possible lack of identification, PR suggest a two-step (testing) pro-
cedure, where rejection in the first step is taken as “evidence” that the model is identified.
In the second step, the authors then impose an “additional assumption”, which implies that
a specific entry of the inverse information equals zero, to obtain an asymptotic null dis-
tribution of their second-step test statistic that is nuisance parameter free. There are two
potential problems with this two-step procedure. First, it may not control (asymptotic) size,
i.e., its (asymptotic) size may exceed the nominal level, for reasons similar to those that
invalidate “naive” post-model-selection inference (see e.g., Leeb and P¨otscher, 2005, 2008).
In addition, the aforementioned “additional assumption” may not be satisfied, which may
possibly aggravate the problem. Second, the two-step procedure may, due to its two-step
nature and despite the possible lack of (asymptotic) size control, have poor power in certain
parts of the parameter space, as suggested by simulations in PR.1
In this paper, we use the results in Andrews and Cheng (2012) (AC hereinafter), extended
to allow for parameters to be near or at the boundary of the parameter space,2to derive the
asymptotic distributions of the two test statistics used in PR under weak, semi-strong, and
strong identification (using the terminology in AC). These asymptotic distribution results,
in turn, allow us characterize the asymptotic size of any test for testing the null hypothesis
that the coefficients on the exogenous regressors are equal to zero. We numerically establish
lower bounds on the asymptotic sizes of the two-step procedure proposed by PR as well as a
second testing procedure proposed by PR that assumes that the ARCH parameter is known
to be in the interior of the parameter space. These bounds are given by 6.65% and 9.48%,
respectively, for a 5% nominal level, which implies that the two testing procedures do not
1The simulation results in Appendix D of PR show that the two-step procedure has a null rejection
frequency below the nominal level for “very small” values of the ARCH parameter; see also Section 5.
2Here, the parameter space is equal to a product space; see Cox (2022) for related results in the context
of more general shapes of the parameter space.
1
control asymptotic size (at the 5% nominal level).3Furthermore, we propose a new test
based on the second-step test statistic of PR that uses plug-in least favorable configuration
critical values and, thus by construction, controls asymptotic size.
In a small simulation study, we find that our asymptotic theory provides good approxi-
mations to the finite-sample behaviors of the tests, or testing procedures, that we consider.
In particular, we find that the testing procedures proposed by PR can suffer from overrejec-
tion in finite samples. Furthermore, we find that our new test has greater power than the
two-step procedure for “very small” values of the ARCH parameter, a presumably empiri-
cally important region of the parameter space. This finding is line with the intuition that
the two-step procedure, in some sense, “sacrifices” power for such parameter constellations
due to its two-step nature.
The remainder of this paper is organized as follows. In Section 2, we introduce the
testing problem as well as the two testing procedures proposed by PR. In Section 3, we
present the asymptotic distribution results. Section 4 presents the characterization result
for asymptotic size and obtains the lower bounds on the asymptotic sizes of the two testing
procedures proposed by PR. It also introduces our new test. The result of our simulation
study are presented in Section 5. Additional material, including proofs, is relegated to the
Appendix.
Throughout this paper, we use the following conventions. All limits are taken “as n
”. eidenotes a vector of zeros (of suitable dimension) with a one in the ith position. For
any matrix A,Aij denotes the entry with row index iand column index j. Furthermore,
Xn(π) = o(1) means that supπΠkXn(π)k=op(1), where k · k denotes the Euclidean
norm. Lastly, “for all δn0” abbreviates “for all sequences of positive scalar constants
{δn:n1}for which δn0”.
2 Testing problem
For ease of exposition, we consider a simple version of the GARCH-X(1,1) model with a
single exogenous variable (as in PR). In particular, the model is given by
yt=ht(θ)1/2zt,(1)
3These lower bounds (also) apply if the “additional assumption” and, in case of the second testing
procedure, the assumption that the ARCH parameter is in the interior of the parameter space are satisfied;
see Remark 1 for details.
2
where θ= (ψ0, π)0= (β0, ζ, π)0and
ht(θ) = ht(ψ, π) = ht(β, ζ, π) = ζ(1 π) + β1y2
t1+πht1(ψ, π) + β2x2
t1(2)
with h0(θ) = ζ.4Here, {yt, xt}n
t=0 is observed and {zt}n
t=0 is unobserved. The true parameter
space for θ, i.e., the space of all possible true values of θ, is given by Θ= Ψ×Π, where
Ψ={ψ: 0 β1β
1,0β2β
2, ζζζ}and Π={π: 0 ππ}
for some 0 < β
1<, 0 < β
2<, 0 < ζ< ζ<, and 0 < π<1.
The model is estimated by quasi-maximum likelihood. In particular, the objective func-
tion is given by (- 1
ntimes) the Gaussian-based conditional quasi log-likelihood function, i.e.,
Qn(θ) = 1
nPn
t=1 lt(θ), where
lt(θ) = 1
2log(2˜π) + 1
2log(ht(θ)) + y2
t
2ht(θ)
and where ˜π= 3.14.... The quasi-maximum likelihood estimator is given by
ˆ
θn= arg min
θΘ
Qn(θ),
where Θ = Ψ ×Π denotes the optimization parameter space with
Ψ = {ψ: 0 β1β1,0β2β2, ζ ζζ}and Π = {π: 0 ππ}
for some β
1< β1<,β
2< β2<, 0 < ζ < ζ,ζ< ζ < , and π< π < 1. Note that,
given the definitions of Θand Θ, (the true values of) β1,β2, and πare allowed to be at the
boundary of the optimization parameter space.
While our asymptotic distribution results are useful for analyzing a wide range of testing
problems, we are mainly interested in testing
H0:β2= 0 vs. H1:β2>0.(3)
As pointed out in PR, this testing problem is non-standard in that, under H0, there are two
nuisance parameters that may be at the boundary of the (optimization) parameter space,
β1and π. Furthermore, when β1is at the boundary (β1= 0) then πis not identified under
4For ease of reference, we adopt the notation in AC, where βgoverns the identification strength of π(see
(4) below) and ψis always identified.
3
H0. To see this, note that, given h0(θ) = ζ, we have
ht(θ) = ζ+β1
t1
X
i=0
πiy2
ti1+β2
t1
X
i=0
πix2
ti1(4)
and, thus, ht(0, ζ, π) = ζθ= (β, ζ, π) = (0, ζ, π)Θ,n1. In words, under H0,β1= 0
implies that the distribution of the data does not depend on π, i.e., π1and π2(with π16=π2)
are observationally equivalent.
Let Tndenote a generic test statistic for testing (3) and let cvn,1αdenote the correspond-
ing nominal level αcritical value, which may depend on n. The size of the test that rejects
H0when Tn>cvn,1αis given by SzT= supγΓ:β2=0 Pγ(Tn>cvn,1α), where Γ denotes the
true parameter space for γ= (θ, φ) and where φdenotes the distribution of {xt, zt}. We say
that a test controls size if SzTα. We note that “uniformity” (over Γ) is built into the
definition of SzTand that whether a test controls size crucially depends on Γ. Typically, it is
infeasible to compute SzT. Therefore, we rely on asymptotic approximations. In particular,
we approximate the (“finite-sample”) size of a test by its asymptotic size, which is given by
AsySzT= lim sup
n→∞
sup
γΓ:β2=0
Pγ(Tv>cvn,1α).
While AsySzT“still” depends on Γ, it generally only does so through a finite-dimensional
parameter, making its evaluation “easier”. We say that a test controls asymptotic size if
AsySzTα. In large samples, AsySzTprovides a good approximation of SzTso that a test
that controls asymptotic size can be expected to “approximately” control size. Therefore,
in what follows we focus on whether or not a given test, or testing procedure, controls
asymptotic size.
2.1 Testing procedures proposed by PR
Given the non-standard nature of the testing problem in (3), PR propose a two-step pro-
cedure to deal with the presence of nuisance parameters on the boundary of the parameter
space as well as the lack of identification of πwhen β1= 0. In the first step, PR propose to
test H
0:β1=β2= 0 using the corresponding (rescaled) quasi-likelihood ratio statistic
LR
n= 2n(Qn(ˆ
θ
n,0)Qn(ˆ
θn))/ˆc
n,
4
摘要:

Allowingforweakidenti cationwhentestingGARCH-XtypemodelsPhilippKetz*October21,2022AbstractInthispaper,weusetheresultsinAndrewsandCheng(2012),extendedtoallowforparameterstobenearorattheboundaryoftheparameterspace,toderivetheasymptoticdistributionsofthetwoteststatisticsthatareusedinthetwo-step(testing...

展开>> 收起<<
Allowing for weak identication when testing GARCH-X type models Philipp Ketz.pdf

共29页,预览5页

还剩页未读, 继续阅读

声明:本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。玖贝云文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知玖贝云文库,我们立即给予删除!
分类:图书资源 价格:10玖币 属性:29 页 大小:604.52KB 格式:PDF 时间:2025-04-30

开通VIP享超值会员特权

  • 多端同步记录
  • 高速下载文档
  • 免费文档工具
  • 分享文档赚钱
  • 每日登录抽奖
  • 优质衍生服务
/ 29
客服
关注