Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s...Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.展开更多
In recent years,the rapid advancement of emerging technologies such as big data,blockchain,and artificial intelligence has accelerated the transformation of currencies,shifting from materialization towards digitizatio...In recent years,the rapid advancement of emerging technologies such as big data,blockchain,and artificial intelligence has accelerated the transformation of currencies,shifting from materialization towards digitization and electronization.The e-CNY stands out as a prime example of China’s pioneering digital financial innovation globally.Governed by the central bank,it embodies the national agenda.As the e-CNY’s application field and reach expand,its relationship with the financial market grows increasingly intimate.As a significant participant in China’s financial landscape and a proactive responder to national policies,the securities industry is profoundly influenced by the e-CNY across various domains.Therefore,this paper undertakes a theoretical analysis of the e-CNY’s implementation within securities institutions,concluding that it will usher in a new paradigm for the entire financial system.展开更多
With the rapid development of information technology and the increasing complexity of the financial market,the teaching methods and means of the Securities Investment course in universities are facing new challenges a...With the rapid development of information technology and the increasing complexity of the financial market,the teaching methods and means of the Securities Investment course in universities are facing new challenges and opportunities.The purpose of this paper is to discuss the application and construction path of virtual simulation experimental teaching in the Securities Investment course.Firstly,it analyses the problems existing in the teaching of traditional securities investment courses,such as the disconnection between theory and practice and the single teaching mode.In order to solve these problems,this paper puts forward the necessity of introducing virtual simulation experimental teaching and details the specific application path of virtual simulation experimental teaching in the Securities Investment course.展开更多
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations.The BGP protocol exhibits s...Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations.The BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security threats.Meanwhile,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of trust.The decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing mechanisms.In this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their causes.Additionally,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security threats.Finally,we discuss the challenges posed by BGP security problems and outline prospects for future research.展开更多
A new general optimal principle of designing explicit finite difference method was obtained. Several applied cases were put forward to explain the uses of the principle. The validity of the principal was tested by a n...A new general optimal principle of designing explicit finite difference method was obtained. Several applied cases were put forward to explain the uses of the principle. The validity of the principal was tested by a numeric example.展开更多
The aim of this paper is to use the General Autoregressive Conditional Heteroscedastic (GARCH) type models for the estimation of volatility of the daily returns of the Kenyan stock market: that is Nairobi Securities E...The aim of this paper is to use the General Autoregressive Conditional Heteroscedastic (GARCH) type models for the estimation of volatility of the daily returns of the Kenyan stock market: that is Nairobi Securities Exchange (NSE). The conditional variance is estimated using the data from March 2013 to February 2016. We use both symmetric and asymmetric models to capture the most common features of the stock markets like leverage effect and volatility clustering. The results show that the volatility process is highly persistent, thus, giving evidence of the existence of risk premium for the NSE index return series. This in turn supports the positive correlation hypothesis: that is between volatility and expected stock returns. Another fact revealed by the results is that the asymmetric GARCH models provide better fit for NSE than the symmetric models. This proves the presence of leverage effect in the NSE return series.展开更多
Ⅰ.EXPANSIONThe establishment of securities market in China has been considered one of its important and controversial economic reform policies.Billions of dollars of treasury bills,corporate bonds and shares have bee...Ⅰ.EXPANSIONThe establishment of securities market in China has been considered one of its important and controversial economic reform policies.Billions of dollars of treasury bills,corporate bonds and shares have been issued and traded all over the nation.Securities exchanges were set up in Shanghai and Shenzhen by the end of 1990 and in early 1991.Since then,securities market in China has undergone rapid expansion.展开更多
In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose...In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average.展开更多
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ...China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.展开更多
At a time when the Chinese economy has experienced a rapid development in the past 14 years, China’s securities market came into being and grew with the deepening economic reform. Recently, Prof. Liu Hongru,Chairman ...At a time when the Chinese economy has experienced a rapid development in the past 14 years, China’s securities market came into being and grew with the deepening economic reform. Recently, Prof. Liu Hongru,Chairman of the China Securities Supervision Commission, gave a detailed account of the existing situation展开更多
Securities fraud is a common worldwide problem, resulting in serious negative consequences to securities market each year. Securities Regulatory Commission from various countries has also attached great importance to ...Securities fraud is a common worldwide problem, resulting in serious negative consequences to securities market each year. Securities Regulatory Commission from various countries has also attached great importance to the detection and prevention of securities fraud activities. Securities fraud is also increasing due to the rapid expansion of securities market in China. In accomplishing the task of securities fraud detection, China Securities Regulatory Commission (CSRC) could be facilitated in their work by using a number of data mining techniques. In this paper, we investigate the usefulness of Logistic regression model, Neural Networks (NNs), Sequential minimal optimization (SMO), Radial Basis Function (RBF) networks, Bayesian networks and Grammar Based Genet- ic Programming (GBGP) in the classification of the real, large and latest China Corporate Securities Fraud (CCSF) database. The six data mining techniques are compared in terms of their performances. As a result, we found GBGP outperforms others. This paper describes the GBGP in detail in solving the CCSF problem. In addition, the Synthetic Minority Over-sampling Technique (SMOTE) is applied to generate synthetic minority class examples for the imbalanced CCSF dataset.展开更多
As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform tra...As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform transaction through internet, mobile phone, ATM, and send e-mails, handle word processing or spreadsheets for different purposes. In another word, the network and information have been related to our daily life completely. Then, by IT advancing, the awareness of software security becomes a hot and serious topic. This paper will give some comments in various aspects, such as, in the beginning of the SDLC (System Development Life Cycle), how do designers analyze the functional and non-functional requirements and choose the proper development model? And then the testing professors take which kinds of methods to test the software with white-box testing or black-box testing to discover the vulnerabilities and flaws. At the same time, the paper gives some examples to demonstrate why the security of software is pretty important and what we should do to secure that. In addition, the paper will talk something about the enterprises’ actions to build a more secure network environment.展开更多
This paper has used the Arbitrage Theorem (Gordan Theorem) to show that first, all securities are derivatives for each other, and they are priced by the same risk neutral probability measure. Second, after the firm ch...This paper has used the Arbitrage Theorem (Gordan Theorem) to show that first, all securities are derivatives for each other, and they are priced by the same risk neutral probability measure. Second, after the firm changes its debt-equity ratio, the equityholders can always combine the new equity with other existing securities to create a home-made equity which will give exactly the same time-1 payoff of the old equity. That is, we have a capital structure irrelevancy proposition: changes in firms’ debt-equity ratios will not affect equityholders’ wealth (welfare), and equityholders’ preferences toward variance are irrelevant. Third, when the firm moves from a more certain project to a more uncertain one, the time-0 price of equity will increase, but (because the time-1 payoff of common bond has an upper bound) the time-0 price of common bond will decrease. Fourth, different labor contractual arrangements will not affect the time-0 price of labor input. When the firm moves from a more certain project to a more uncertain one, the time-0 price of labor input will increase if it is under the share or the mixed contract.展开更多
The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself. ...The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself. In addition, the primary factor of mature securities market is perfect and integrated function of the securities market. Afterwards, the article analyses the static and dynamic function of the securities market. At last, it probes into the government role in the securities market briefly and proposes that China needs to carry out the essential change on government role, market function location, development goal and the mode of securities market if the function of China's securities market is to be exerted properly.展开更多
In May 1993, the State Council promulgated ProvisionalRegulations Regarding the Issuing of Stocks and theAdministration of Stock Dealings. However, the Stock Act isstill in the process of drafting. This paper intends ...In May 1993, the State Council promulgated ProvisionalRegulations Regarding the Issuing of Stocks and theAdministration of Stock Dealings. However, the Stock Act isstill in the process of drafting. This paper intends to discuss thefollowing three problems concerning the securities legislation.展开更多
To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event....To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event. Extreme events are defined as values of the event below or above a certain value called threshold. A well chosen threshold helps to identify the extreme levels. Several methods have been used to determine threshold so as to analyze and model extreme events. One of the most successful methods is the maximum product of spacing (MPS). However, there is a problem encountered while modeling data through this method in that the method breaks down when there is a tie in the exceedances. This study offers a solution to model data even when it contains ties. In the study, a method that improved MPS method for determining an optimal threshold for extreme values in a data set containing ties was derived. The Generalized Pareto Distribution (GPD) parameters for the optimal threshold were derived and compared to GPD parameters determined through the standard MPS model. The study improved the standard MPS methodology by introducing the concept of frequency and used Generalized Pareto Distribution (GPD) and Peak over threshold (POT) methods as the basis of identifying extreme values. The improved MPS models and the standard models were applied to Nairobi Securities Exchange (NSE) trading volume data to determine the GPD parameters for different sectors registered in NSE market and their performance compared. It was realized that the improved MPS model performed better than the standard models. This study will help the Statisticians in different sectors of our economy to model extreme events involving ties.展开更多
The Chinese securities market has been developing gradually since the introduction of the economic reform and opening to the outside world. In 1981, our government issued national bonds in a bid to relieve the financi...The Chinese securities market has been developing gradually since the introduction of the economic reform and opening to the outside world. In 1981, our government issued national bonds in a bid to relieve the financial pressure. During the five years of 1981-1985, our country accumulated negotiable securities of RMB24.2 billion, mainly national bonds, accOunting for 97.9 percent of the total. Since 1986, the securities market has been developing towards diversification, along with increasing varieties. From 1986 to 1990,展开更多
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r...Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques.展开更多
Investor education is not only one of the most important and fundamental institutional constructions at capital market, but also an important part of the cultural construction of capital market. At the present stage, ...Investor education is not only one of the most important and fundamental institutional constructions at capital market, but also an important part of the cultural construction of capital market. At the present stage, the long-effect mechanism for investor education is not only a demand of China's securities market on its healthy development, but also an objective reality that China's investor education is necessary to confront with. For these reasons, it is necessary for China to deepen investor education, expand investor education platform, strengthen risk prevention, and take initiative to build up a multi-level investor education system, and ultimately establish and improve a long-effect mechanism for investor education, so as to ensure the stable, harmonious and order development of China's Securities market in futures.展开更多
文摘Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.
文摘In recent years,the rapid advancement of emerging technologies such as big data,blockchain,and artificial intelligence has accelerated the transformation of currencies,shifting from materialization towards digitization and electronization.The e-CNY stands out as a prime example of China’s pioneering digital financial innovation globally.Governed by the central bank,it embodies the national agenda.As the e-CNY’s application field and reach expand,its relationship with the financial market grows increasingly intimate.As a significant participant in China’s financial landscape and a proactive responder to national policies,the securities industry is profoundly influenced by the e-CNY across various domains.Therefore,this paper undertakes a theoretical analysis of the e-CNY’s implementation within securities institutions,concluding that it will usher in a new paradigm for the entire financial system.
基金The 2024 Hankou University School-Level Teaching Reform Research Project“Research on the Application of Virtual Simulation Experimental Teaching in the Course of Securities Investment”(Project number:2024JY43)。
文摘With the rapid development of information technology and the increasing complexity of the financial market,the teaching methods and means of the Securities Investment course in universities are facing new challenges and opportunities.The purpose of this paper is to discuss the application and construction path of virtual simulation experimental teaching in the Securities Investment course.Firstly,it analyses the problems existing in the teaching of traditional securities investment courses,such as the disconnection between theory and practice and the single teaching mode.In order to solve these problems,this paper puts forward the necessity of introducing virtual simulation experimental teaching and details the specific application path of virtual simulation experimental teaching in the Securities Investment course.
基金the National Natural Science Foundation of China,GrantNumbers(62272007,62001007)the Natural Science Foundation of Beijing,GrantNumbers(4234083,4212018)The authors also acknowledge the support from King Khalid University for funding this research through the Large Group Project under Grant Number RGP.2/373/45.
文摘Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations.The BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security threats.Meanwhile,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of trust.The decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing mechanisms.In this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their causes.Additionally,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security threats.Finally,we discuss the challenges posed by BGP security problems and outline prospects for future research.
文摘A new general optimal principle of designing explicit finite difference method was obtained. Several applied cases were put forward to explain the uses of the principle. The validity of the principal was tested by a numeric example.
文摘The aim of this paper is to use the General Autoregressive Conditional Heteroscedastic (GARCH) type models for the estimation of volatility of the daily returns of the Kenyan stock market: that is Nairobi Securities Exchange (NSE). The conditional variance is estimated using the data from March 2013 to February 2016. We use both symmetric and asymmetric models to capture the most common features of the stock markets like leverage effect and volatility clustering. The results show that the volatility process is highly persistent, thus, giving evidence of the existence of risk premium for the NSE index return series. This in turn supports the positive correlation hypothesis: that is between volatility and expected stock returns. Another fact revealed by the results is that the asymmetric GARCH models provide better fit for NSE than the symmetric models. This proves the presence of leverage effect in the NSE return series.
文摘Ⅰ.EXPANSIONThe establishment of securities market in China has been considered one of its important and controversial economic reform policies.Billions of dollars of treasury bills,corporate bonds and shares have been issued and traded all over the nation.Securities exchanges were set up in Shanghai and Shenzhen by the end of 1990 and in early 1991.Since then,securities market in China has undergone rapid expansion.
文摘In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average.
基金The authors acknowledge the financial support received from the National Natural Science Foundation of China(72061147002).
文摘China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.
文摘At a time when the Chinese economy has experienced a rapid development in the past 14 years, China’s securities market came into being and grew with the deepening economic reform. Recently, Prof. Liu Hongru,Chairman of the China Securities Supervision Commission, gave a detailed account of the existing situation
文摘Securities fraud is a common worldwide problem, resulting in serious negative consequences to securities market each year. Securities Regulatory Commission from various countries has also attached great importance to the detection and prevention of securities fraud activities. Securities fraud is also increasing due to the rapid expansion of securities market in China. In accomplishing the task of securities fraud detection, China Securities Regulatory Commission (CSRC) could be facilitated in their work by using a number of data mining techniques. In this paper, we investigate the usefulness of Logistic regression model, Neural Networks (NNs), Sequential minimal optimization (SMO), Radial Basis Function (RBF) networks, Bayesian networks and Grammar Based Genet- ic Programming (GBGP) in the classification of the real, large and latest China Corporate Securities Fraud (CCSF) database. The six data mining techniques are compared in terms of their performances. As a result, we found GBGP outperforms others. This paper describes the GBGP in detail in solving the CCSF problem. In addition, the Synthetic Minority Over-sampling Technique (SMOTE) is applied to generate synthetic minority class examples for the imbalanced CCSF dataset.
文摘As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform transaction through internet, mobile phone, ATM, and send e-mails, handle word processing or spreadsheets for different purposes. In another word, the network and information have been related to our daily life completely. Then, by IT advancing, the awareness of software security becomes a hot and serious topic. This paper will give some comments in various aspects, such as, in the beginning of the SDLC (System Development Life Cycle), how do designers analyze the functional and non-functional requirements and choose the proper development model? And then the testing professors take which kinds of methods to test the software with white-box testing or black-box testing to discover the vulnerabilities and flaws. At the same time, the paper gives some examples to demonstrate why the security of software is pretty important and what we should do to secure that. In addition, the paper will talk something about the enterprises’ actions to build a more secure network environment.
文摘This paper has used the Arbitrage Theorem (Gordan Theorem) to show that first, all securities are derivatives for each other, and they are priced by the same risk neutral probability measure. Second, after the firm changes its debt-equity ratio, the equityholders can always combine the new equity with other existing securities to create a home-made equity which will give exactly the same time-1 payoff of the old equity. That is, we have a capital structure irrelevancy proposition: changes in firms’ debt-equity ratios will not affect equityholders’ wealth (welfare), and equityholders’ preferences toward variance are irrelevant. Third, when the firm moves from a more certain project to a more uncertain one, the time-0 price of equity will increase, but (because the time-1 payoff of common bond has an upper bound) the time-0 price of common bond will decrease. Fourth, different labor contractual arrangements will not affect the time-0 price of labor input. When the firm moves from a more certain project to a more uncertain one, the time-0 price of labor input will increase if it is under the share or the mixed contract.
文摘The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself. In addition, the primary factor of mature securities market is perfect and integrated function of the securities market. Afterwards, the article analyses the static and dynamic function of the securities market. At last, it probes into the government role in the securities market briefly and proposes that China needs to carry out the essential change on government role, market function location, development goal and the mode of securities market if the function of China's securities market is to be exerted properly.
文摘In May 1993, the State Council promulgated ProvisionalRegulations Regarding the Issuing of Stocks and theAdministration of Stock Dealings. However, the Stock Act isstill in the process of drafting. This paper intends to discuss thefollowing three problems concerning the securities legislation.
文摘To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event. Extreme events are defined as values of the event below or above a certain value called threshold. A well chosen threshold helps to identify the extreme levels. Several methods have been used to determine threshold so as to analyze and model extreme events. One of the most successful methods is the maximum product of spacing (MPS). However, there is a problem encountered while modeling data through this method in that the method breaks down when there is a tie in the exceedances. This study offers a solution to model data even when it contains ties. In the study, a method that improved MPS method for determining an optimal threshold for extreme values in a data set containing ties was derived. The Generalized Pareto Distribution (GPD) parameters for the optimal threshold were derived and compared to GPD parameters determined through the standard MPS model. The study improved the standard MPS methodology by introducing the concept of frequency and used Generalized Pareto Distribution (GPD) and Peak over threshold (POT) methods as the basis of identifying extreme values. The improved MPS models and the standard models were applied to Nairobi Securities Exchange (NSE) trading volume data to determine the GPD parameters for different sectors registered in NSE market and their performance compared. It was realized that the improved MPS model performed better than the standard models. This study will help the Statisticians in different sectors of our economy to model extreme events involving ties.
文摘The Chinese securities market has been developing gradually since the introduction of the economic reform and opening to the outside world. In 1981, our government issued national bonds in a bid to relieve the financial pressure. During the five years of 1981-1985, our country accumulated negotiable securities of RMB24.2 billion, mainly national bonds, accOunting for 97.9 percent of the total. Since 1986, the securities market has been developing towards diversification, along with increasing varieties. From 1986 to 1990,
文摘Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques.
文摘Investor education is not only one of the most important and fundamental institutional constructions at capital market, but also an important part of the cultural construction of capital market. At the present stage, the long-effect mechanism for investor education is not only a demand of China's securities market on its healthy development, but also an objective reality that China's investor education is necessary to confront with. For these reasons, it is necessary for China to deepen investor education, expand investor education platform, strengthen risk prevention, and take initiative to build up a multi-level investor education system, and ultimately establish and improve a long-effect mechanism for investor education, so as to ensure the stable, harmonious and order development of China's Securities market in futures.