非對稱性信息 的英文怎麼說

中文拼音 [fēiduìchènxìngxìn]
非對稱性信息 英文
asymetric information
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : 稱動詞(適合; 相當) fit; match; suit
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  1. Making use of the time series exhibitions of the fluctuation - rate datum, we make our study for the following two purposes : one is to observe whether the preannouncing companies " temporal - condition variance of the series of the return rate conforms to the demand of sta bility ; the other is to decide whether the preannouncing companies " stocks have asymmetrical - information adjustment, this is to say, to decide how the companies response to good or bad news

    為了進一步檢驗盈餘預告新規則實施效果,我們考慮從波動入手股票市場的穩定進行系統分析。我們嘗試利用波動率數值的時間序列表現進行研究,力圖了解:預告公司股票日收益率序列的時變條件方差是否滿足穩定要求。預告公司股票是否存在調整現象,即利好利空消分別做出何種反應。
  2. We find some evidence suggesting the importance of asymmetric information theory and agency cost theory in explaining the financing choice of our listed corporations

    理論和破產成本理論我國上市公司具有較好的解釋
  3. Fortunately, we can solve this problem by using ap ( alternating projection ) algorithm, by this way ; the computational load can reduce dramatically. doa estimation is mostly research base on linear array, because of the limitation of linear, it can estimate the azimuth only ; solid array can estimate the azimuth and elevation, in this paper, the solid array is used for doa estimation ; when the signal sources are uncorrelated, the music algorithm is chosen, using mdl / aic algorithm, we attain the signal number of sources

    本文採用立體六元陣進行測向,在相干號源條件下,採用music演算法進行doa估計,採用基於論原理mdl準則或者aic準則判斷號源數目,通過陣列流形的研究,指出基於圓陣的陣列流形具有的某種,利用該來降低運算量,並且通過演算法的研究,提出用維數較小的號子空間或噪聲子空間來計算空間譜,進一步減小music演算法運算量。
  4. The theoretic frame of the right to know in the business of security trading is expected to be built on the basis of confirming the right to know in security trading, listing the reason of why the small and medium - sized share holders, creditors or foundation holders have the such right to know, making clear the positive meaning that the independent director cherished for the public disclosure, getting into the in - sight specialities of public business information products and non - symmetry and enforcing the main body of the business, the task of public disclosure of the listed companies in particular

    通過中小股東、債權人以及基金持有人知情權權利主體的保護,獨立董事享有知情權披露的積極意義;透視營業以及之特徵,並強化義務主體,尤其是上市公司的披露義務;以期構建起證券交易知情權的理論框架。此外,為投資者恢復在證券交易過程中被剝奪的權利和損失的利益,建立和完善證券交易知情權民事責任制度及其實現機制,從而建立起證券交易知情權的保護體系。
  5. The length or the capacities of the tactical data are always different, and so the conventional data scheduling algorithm which consisted " first in first service " and " shore message first service " are not appropriate in the tactical communication applications. to meet the requirement of the information service priority, we presented a dynamic priority scheduling algorithms, which working on the order programming mode, can improve the efficiency of the asymmetric broadcast channel

    戰場數據分發的長短消數據容量相差懸殊,分析了常規「先入先服務」及「短消優先」等調度演算法存在的不公平特,根據戰術通服務優先權的特殊要求,提出了一種「動態優先權」調度演算法,在點播模式下,可提高廣播通道數據的傳輸效率。
  6. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層安全協議( tls )和安全套接字層協議( ssl )基於密碼技術、密碼技術、消認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證網路通數據的機密、完整各方進行認證的機制。
  7. The third part proves that : if the stuff ' s level of effort a is observable, then ( 1 ), and explains how to establish the optimum contract under the condition of symmetry information and the characters which optimum contract should have. the fourth part proves : if the stuff ' s level of effort a is n ' t observable, then explains how to establish the optimum contract under the condition of non - symmetry information and the characters which optimum contract should have, gives the reward and punishment measures that the enterprise should take on the employees. the fifth part analyses the influence on the motivation contract form other observable variables such as y, which is irrelevant to the stuff ' s level of effort a by establishing linear contracts s ( m, y ) = a + ( 3 ( m + yy ), proves if cov ( m, y ) ^ 0, then we can decrease the agent costs and enhance the accuracy of motivation by putting y into the contract

    第一節通過經典的馬爾可夫轉移矩陣的分析,指出了其不具有應用的完備,並模型進行了改進;第二節建立了企業基於人力資本理論的人才競爭策略的分析框架;第三節證明了若員工的努力水平a可觀測,則有( 1 ) , ( 2 ) ,從而說明了條件下最優合同應如何制定以及最優合同應具備的特徵;第四節證明了若員工的努力水平a不可觀測,則有( 1 ) , ( 2 )從而說明了條件下最優激勵合同應如何制定以及最優激勵合同應具備的特徵,給出了企業獎懲員工的措施;第五節通過建立線合同s ( m , y ) = + ( m + y ) ,分析了與員工努力水平a無關的其他可觀測變量y激勵合同的影響,證明了當cov ( m , y ) 0時,將y寫入激勵合同可減少代理成本,也更能提高激勵的準確;第六節討論人力資本股份化方法,並給出了一種基於人力資本股權化思想企業利潤的分配模型。
  8. Substantial empirical studies show that the reaction of the stock market to the information of outside world is asymmetric, this stylized fact is of great significance, if the variance of market returns can measure market risk, the market asymmetric response may result asymmetric risk premium in the stock market, asymmetric risk premiums on the stock market would be have impact on asset pricing, portfolio construction and risk position, so asymmetric reaction of the stock market has been the focus of attention of academics and investors, learning from the latest researching approach in domestic and foreign, on the basis of the actual situation in china ' s securities market, a more detailed study of china ' s shanghai and shenzhen stock a, b four markets have been done

    股票市場反應具有不,長期以來股票市場反應特徵成為大量經濟學家和投資者關注和研究的焦點。本文在吸收和借鑒國內外最新研究成果的基礎上,以我國股票市場的實際情況為背景,較為系統地研究了我國滬深兩市a 、 b股四個市場的市場波動反應特徵。我們得到的實證結果表明,我國股票市場外界的反應模式不僅存在,而且這種反應特徵還具有階段
  9. 4. both the client and the agent are confronted with risks brought about by market uncertainty, and the information the have should be unparallel

    第四,委託一代理雙方都面臨市場的不確定的風險,而且他們之間掌握的的。
  10. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字簽名技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠和密鑰交換的安全;利用openssl標準庫函數實現系統的數據加密模塊,實現加密、加密以及摘要的常用演算法。
  11. Inside corporate governance includes the ownership framework, control power framework, inside supervision framework and inspirit system. outside corporate governance system includes the outside market system, government system and social system which affects and restricts the company actions. to understand corporate governance more profoundly and completely, from the origin of it, the text tries to draw clearly the outline of corporate governance theory from its coming into being, developing and finally the whole theory system. from the following aspects, enterprises theory of their characters in new classical economics and exchange cost econ

    為了公司治理有一個更全面和深刻的認識,本文從公司治理的起源入手,力爭較為清晰地勾勒出公司治理理論產生、發展和整個理論體系最終形成的大致輪廓,並從新古典經濟學和交易成本經濟學關于企業質的企業理論,制度經濟學關于企業控制權的企業理論,產權經濟學的企業產權理論,經濟學的理論等幾個方面,論述了這些公司治理理論有著重要影響並構成其主要內容的理論基礎,進而就公司治理的基本理論,即,古典管家理論與現代管家理論,產權論與競爭論,委託代理理論以及利益相關者理論,做了一個簡單的介紹與評價。
  12. We designed a wireless asymmetric physical layer link model with a direct sequence spread spectrum system as a transmitted reference. uplink and downlink are both one - way links connected by an ip tunneling. uplink is consisted with the narrowband radio data link of the warfighter information networks ( win )

    研究了無線鏈路,提出了一種用參考法直接序列擴頻( dsss )實現的無線數據傳輸的物理層鏈路模型:利用現有戰斗員網電臺的窄帶數據鏈作為上行通道,通過ip隧道技術保證單向鏈路的連通
  13. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通數據加密系統,該系統將加密演算法3des與加密演算法rsa相結合數據加密,用公鑰演算法rsa和單向散列函數md5實現文件的數字簽名,有效地實現了網路通系統中的加密、數字簽名、身份認證等功能,保證了發送方所發送的秘密、鑒別、完整及不可否認
  14. In the paper the monetary policy ineffectiveness proposition ca n ' t repudiate the effectiveness of the china ' s monetary policy under deflation because of the imperfect markets and the information asymmetry

    本文認為,由於市場的完全的不,貨幣政策無效命題否定不了通貨緊縮下我國貨幣政策的效力。
  15. Due to information asymmetry and different kinds of irrational and opportunistic behaviors in the process of information transmission, it happens frequently that securities information cannot be reflected efficiently on securities prices. this leads to securities market inefficiency

    由於傳遞總過程中的各種和機會主義行為,證券往往不能在證券價格上得到有效反映,證券市場有效降低。
  16. But because of uncertainties, asymmetric information, moral hazard and supervision costs and other factors, the principal shareholder is often difficult to master accurately and really professional manager ’ s work effort

    但由於不確定、道德風險和監督成本等原因,作為委託人的股東往往難以準確、真實掌握職業經理人工作的努力程度。
  17. 2. the limited ration of investors and the dealing expenses made the informative asymmetry necessary, while the informative asymmetry led to the problems of financial transparency

    2 、投資者有限理與交易費用的存在使得成為一種必然,而又直接導致公司財務透明度問題。
  18. The teaching administration role contradiction mainly comprises the dual nature of role duties, role behavior objectives, role behavior means, role relationship, and role power and a series of contradictions due to role knowledge and information distribution imbalance

    教學管理的角色矛盾,主要包括由角色職責的二重、角色行為目標的二重、角色行為方式的二重、角色關系的二重、角色權力的二重與角色知識分佈等所引發的一系列矛盾。
  19. Due to the imperfect information in the performance of political entrust - agency relation and the influence from governmental interests, the publicity of public administrative service is often distorted in governmental process, leading in turn to governmental credit crisis

    摘要由於受政治委託代理關系中的和政府私利的影響,公共行政的「公共」服務精神常常在政府過程中被歪曲,進而引發政府用問題。
  20. The model is applied in ca / ra, it creates and manage storage and issues of pki key data. pki system is a common, safe and foundational institute. unsymmetrical code arithmetic principle and technology is applied into pki system and provided safety service

    Pki系統是一個用密碼演算法原理和技術來實現並提供安全服務的具有通用的安全基礎設施,它通過使用公開密鑰技術和數字證書來確保系統安全並負責驗證數字證書持有者身份的一種體系。
分享友人