期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
银行信用风险管理机制:“硬”信息对“软”信息 被引量:2
1
作者 苏静 杜子平 《安徽农业科学》 CAS 北大核心 2007年第29期9370-9372,9382,共4页
在存在隐藏信息道德风险的委托-代理框架下分析了不同类型信息对信用风险管理的影响。结果显示,获得"软"信息可减少VaR资本需求,但也促使信贷员利用"软"信息进行信号操纵。提出了利用工资激励合同防止操纵的产生。... 在存在隐藏信息道德风险的委托-代理框架下分析了不同类型信息对信用风险管理的影响。结果显示,获得"软"信息可减少VaR资本需求,但也促使信贷员利用"软"信息进行信号操纵。提出了利用工资激励合同防止操纵的产生。通过应用模拟方法对2种框架("软"信息和2类信息结合)的结果进行对比,证实"软"信息对银行家有利但需要对银行内部组织结构进行改进。 展开更多
关键词 “硬”信息 “软”信息 风险管理 VAR 道德风险
下载PDF
谁为中小企业融资?——基于信息处理能力跨期演化视角 被引量:14
2
作者 李华民 吴非 陈哲诗 《金融经济学研究》 CSSCI 北大核心 2014年第5期119-128,共10页
主流观点认为,银行机构与其融资对象之间,天然存在规模对应格局,其理论支撑是"小银行优势"假说。然而,对于广东省辖内大银行(分支)机构的田野式调研发现,大银行机构正积极布局小企业市场。本文的解释是,其一,凭借其范围经济优... 主流观点认为,银行机构与其融资对象之间,天然存在规模对应格局,其理论支撑是"小银行优势"假说。然而,对于广东省辖内大银行(分支)机构的田野式调研发现,大银行机构正积极布局小企业市场。本文的解释是,其一,凭借其范围经济优势,大银行机构具备以低利率水平向小企业融资的充分条件;其二,中国的大银行机构惯性地拥有"软"信息贷款技能;其三,将不同规模的银行机构置于跨期模型,动态综合分析其信息处理能力,不同规模的银行机构的"软""硬"信息处理能力,存在消长演化,即在阶段Ⅱ的竞争格局中,大银行机构越来越凸显出其综合信息处理的成本优势。该项研究结论的政策含义在于,缓解中小企业融资困境的思维方式,不能拘泥于增设中小银行机构,而应更多关注大银行机构的规模经济和范围经济拓展效应。 展开更多
关键词 银行机构格局 “软”“硬”信息 融资技术 竞争优势
下载PDF
银行规模与经理人激励——基于中国信息和不确定性环境的理论研究
3
作者 邓可斌 黄励岗 《当代经济科学》 CSSCI 北大核心 2007年第2期37-45,共9页
本文基于委托代理激励理论,探讨不同规模银行中信息类别、不确定性信息与合同期限、政府行为等因素对经理人激励的影响。发现在中国这样的转型经济国家中,不确定性、非契约关系与政府行为使得银行规模与其竞争力和生存性的关系变得更加... 本文基于委托代理激励理论,探讨不同规模银行中信息类别、不确定性信息与合同期限、政府行为等因素对经理人激励的影响。发现在中国这样的转型经济国家中,不确定性、非契约关系与政府行为使得银行规模与其竞争力和生存性的关系变得更加微妙。(1)相对大银行而言,小银行的发展面临更多的机会和风险;(2)长期合同下股权激励对于小银行经理人有着更为重要的意义;(3)客户经理的素质高低与一致性对于小银行激励效率的发挥至关重要;(4)我国小银行与地方政府天然密切的关系对其"软"信息获取作用很大,但同时也可能对其激励机制的长期有效性造成负面影响。 展开更多
关键词 银行规模 不确定性 经理人激励 “软”信息 “硬”信息
下载PDF
企业社会信息披露与环境信息披露对市场质量影响的实证分析
4
作者 徐珊 黄健柏 《商业经济与管理》 CSSCI 北大核心 2014年第10期55-63,共9页
文章以2009-2011年中国上市公司披露的社会责任报告为研究样本,将企业披露的社会责任信息区分为环境信息与社会信息、定量的和经济相关的"硬"信息与定性的和经济无关的"软"信息,运用事件分析法,通过比较社会责任信... 文章以2009-2011年中国上市公司披露的社会责任报告为研究样本,将企业披露的社会责任信息区分为环境信息与社会信息、定量的和经济相关的"硬"信息与定性的和经济无关的"软"信息,运用事件分析法,通过比较社会责任信息披露前后股票市场波动性与流动性的变化来检验不同类型的社会责任信息在我国资本市场中发挥的作用。研究表明:社会责任信息披露评级越高,股票的波动性下降越多,而流动性上升越大;环境信息与社会信息都是企业社会责任披露必须同时涵盖的内容,在降低信息不对称中的作用是相互补充的;相较于"软"社会责任信息,"硬"社会责任信息更有助于提升市场的透明度。 展开更多
关键词 社会信息披露 环境信息披露 “硬”信息 “软”信息 市场质量
下载PDF
美国社区银行发展历史对我国中小银行的启示 被引量:2
5
作者 潘慧 《现代商业》 2013年第12期58-59,共2页
美国社区银行凭借基于"软"信息的关系贷款技术向中小企业提供融资,形成了专门的小银行优势。上个世纪80年代以来,关系贷款重要性下降,社区银行发展面临挑战。但是近来研究发现,社区银行依然活跃在美国中小企业信贷市场,维持... 美国社区银行凭借基于"软"信息的关系贷款技术向中小企业提供融资,形成了专门的小银行优势。上个世纪80年代以来,关系贷款重要性下降,社区银行发展面临挑战。但是近来研究发现,社区银行依然活跃在美国中小企业信贷市场,维持其在关系贷款方面的优势。美国社区银行的发展历史对国内中小银行的发展提供了有意的经验借鉴,包括:明确市场定位;提供全面的金融服务;综合利用多种信贷技术;充分发挥关系的价值,等等。 展开更多
关键词 社区银行 “软”信息 “硬”信息 关系贷款 信息生产成本
下载PDF
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
6
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 data encryption mobile phone cloud storage pseudo-random number
下载PDF
A five-fingered underactuated prosthetic hand:hardware and its control scheme 被引量:1
7
作者 赵京东 姜力 +1 位作者 蔡鹤皋 刘宏 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第2期228-234,共7页
A five-fingered underactuated prosthetic hand controlled by surface EMG (electromyographic) signals is presented in this paper. The prosthetic hand was designed with simplicity, lightweight and dexterity on the requir... A five-fingered underactuated prosthetic hand controlled by surface EMG (electromyographic) signals is presented in this paper. The prosthetic hand was designed with simplicity, lightweight and dexterity on the requirement of anthropomorphic hands. Underactuated self-adaptive theory was adopted to decrease the number of motors and weight. The control part of the prosthetic hand was based on a surface EMG motion pattern classifier which combines LM-based (Levenberg-Marquardt) neural network with the parametric AR (autoregressive) model. This motion pattern classifier can successfully identify the flexions of the thumb, the index finger and the middle finger by measuring the surface EMG signals through two electrodes mounted on the flexor digitorum profundus and flexor pollicis longus. Furthermore, via continuously controlling a single finger's motion, the five-fingered underactuated prosthetic hand can achieve more prehensile postures such as power grasp, centralized grip, fingertip grasp, cylindrical grasp, etc. The experimental results show that the classifier has a great potential application to the control of bionic man-machine systems because of its fast learning speed, high recognition capability and strong robustness. 展开更多
关键词 EMG prosthetic hand UNDERACTUATED neural network LEVENBERG-MARQUARDT
下载PDF
Fair Value Disclosure, External Appraisers, and the Reliability of Fair Value Measurements
8
作者 Nicola Moscariello 《Journal of Modern Accounting and Auditing》 2012年第5期641-656,共16页
By developing an analytical model, this paper examines the role of the "external appraiser" as a tool to face the informational asymmetry issue related to fair value measurements. A comparison between such a signali... By developing an analytical model, this paper examines the role of the "external appraiser" as a tool to face the informational asymmetry issue related to fair value measurements. A comparison between such a signaling mechanism and a "full fair value disclosure" is firstly carried out, highlighting variables affecting the efficiency and the effectiveness of both information strategies. Then, recovering the traditional distinction between "protective disclosure" (hard information) and "informative disclosure" (soft information), this paper demonstrates how the former could significantly increase the positive effects associated to an employment of an independent valuer, reaching some conclusions useful to the standard setting process. 展开更多
关键词 fair value accounting (FVA) information asymmetry external appraiser informative disclosure protective disclosure
下载PDF
Discussion on the Application of Complex Power Network to Software Engineering
9
作者 Jiayan SONG 《International Journal of Technology Management》 2015年第1期92-93,共2页
Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are si... Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are simply solved. Because of the needs for the development, software starts to mutually integrate with complex power network, making the scale of software increase greatly. Such a growing trend of software promotes soft-ware development to go beyond a general understanding and control and thus a complex system is formed. It is necessary to strengthen the research of complex network theory, and this is a new way to help people study the complexity of software systems. In this paper, the development course of complex dynamic network is introduced simply and the use of complex power network in the software engineering is summarized. Hopefully, this paper can help the crossover study of complex power network and software engineering in the future. 展开更多
关键词 Complex Power Network Software Engineering Computer Application Network Model
下载PDF
Efficient hardware-based private information retrieval using partial reshuffle
10
作者 Lan Tian Qin Zhiguang 《High Technology Letters》 EI CAS 2010年第3期263-267,共5页
The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the s... The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed. 展开更多
关键词 private information retrieval (PIR) trusted hardware reshuffle security PRACTICALITY
下载PDF
Fault Detection and Isolation for Low Hardware Redundancy Flight Control System 被引量:2
11
作者 Yongliang Du Yakui Gao 《Journal of Energy and Power Engineering》 2014年第3期543-550,共8页
The problems of current highly redundant flight control system are analyzed in this paper. Our study gives methods of utilizing other information to reduce physical components on the condition of meeting the reliabili... The problems of current highly redundant flight control system are analyzed in this paper. Our study gives methods of utilizing other information to reduce physical components on the condition of meeting the reliability requirements for flight control system. The strategies presented in this paper mainly include information redundancy, multi-thread, time redundancy, geometry space redundancy, etc.. Analysis and simulation show these non-hardware based methods can reduce the requirement of system hardware level and thus reduce the system complexity, weight, space, costs and R&D (research and development) time. 展开更多
关键词 Low hardware redundancy MULTI-THREAD wavelet analysis.
下载PDF
Design and Implementation of Computer Network Remote Control System
12
作者 Xiaohui ZHANG 《International Journal of Technology Management》 2015年第2期101-104,共4页
The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information... The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction; control information transmission layer implementation using TCPflP protocol to control information including control of resources and control commands etc.. This paper adopts centralized network control system model, the structure of the network system realize unified observation, control, coordination, and control of high efficiency. The use of key technologies, such as Socket and COM to realize the goal of computer hardware resource control, software resource management and other functions. 展开更多
关键词 Remote Control System Control SOCKET Communication protocol
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部