• Title/Summary/Keyword: Rule-based Triggers

Search Result 5, Processing Time 0.021 seconds

Is Bail-in Debt Bail-inable?

  • HWANG, SUNJOO
    • KDI Journal of Economic Policy
    • /
    • v.41 no.4
    • /
    • pp.1-44
    • /
    • 2019
  • The contingent convertible bond (or CoCo) is designed as a bail-in tool, which is written down or converted to equity if the issuing bank is seriously troubled and thus its trigger is activated. The trigger could either be rule-based or discretion-based. I show theoretically that the bail-in is less implementable and that the associated bail-in risk is lower if the trigger is discretion-based, as governments face greater political pressure from the act of letting creditors take losses. The political pressure is greater because governments have the sole authority to activate the trigger and hence can be accused of having 'blood on their hands'. Furthermore, the pressures could be augmented by investors' self-fulfilling expectations with regard to government bailouts. I support this theoretic prediction with empirical evidence showing that the bail-in risk premiums on CoCos with discretion-based triggers are on average 1.13 to 2.91%p lower than CoCos with rule-based triggers.

Real-time Intrusion-Detection Parallel System for the Prevention of Anomalous Computer Behaviours (비정상적인 컴퓨터 행위 방지를 위한 실시간 침입 탐지 병렬 시스템에 관한 연구)

  • 유은진;전문석
    • Review of KIISC
    • /
    • v.5 no.2
    • /
    • pp.32-48
    • /
    • 1995
  • Our paper describes an Intrusion Detection Parallel System(IDPS) which detects an anomaly activity corresponding to the actions that interaction between near detection events. IDES uses parallel inductive approaches regarding the problem of real-time anomaly behavior detection on rule-based system. This approach uses sequential rule that describes user's behavior and characteristics dependent on time. and that audits user's activities by using rule base as data base to store user's behavior pattern. When user's activity deviates significantly from expected behavior described in rule base. anomaly behaviors are recorded. Observed behavior is flagged as a potential intrusion if it deviates significantly from the expected behavior or if it triggers a rule in the parallel inductive system.

  • PDF

A Semantics of Sequence of Tense without a Sequence-of-tense Rule

  • Song, Mean-Young
    • Language and Information
    • /
    • v.4 no.2
    • /
    • pp.93-105
    • /
    • 2000
  • I argue in this paper that the sequence of tense (SOT) phenomenon can be accounted for without positing a SOT rule, focusing on the contrast between the past under-past sentences which lead to ambiguity and those sentences which do not. The different interpreta- tion of past under past sentences depends on whether the stative or then non-stative predicates occur in the complement clauses in the propositional attitude verbs. Based on this, I also argue that the embedded past tense does not contribute to the seman- tics past tense in the complement clause. Instead, it is due to the occurrence of the stative or non-stative predicates in the complement clauses. The stative predicates are associated with the temporal precedence or the overlap relation, whereas the non-stative predicates the precedence relation only. This fact triggers the contrast in past- under- past sentences.(Korea University)

  • PDF

Active Network Management System with Automatic Generation of Network Management Program using Triggers (트리거를 이용한 네트워크관리프로그램 자동생성 기능을 가진 능동적인 네트워크 관리 시스템)

  • Shin, Moon-Sun;Lee, Myong-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.19-31
    • /
    • 2009
  • Network management involves configuring and operating various network elements in a suitable manner. Generally, a network management system can perform basic functionalities such as configuration management, performance management, and fault management. Due to the open structure of the Internet, the volume of network traffic and the network equipment used have increased in size and complexity. Therefore, it is expensive and time consuming to develop a network management program for heterogeneous network equipment in an SNMP.based network. In order to facilitate the management of network environments and the control of heterogeneous devices in an efficient manner, we propose an Active Network Management System (ANMS) comprising an automatic generator that uses triggers to generate a network management program. The concept of triggers can be represented through event condition action rules performed in response to a change in the status of a network environment. The proposed ANMS comprises basic components for real time network management and also includes an automatic generator (AG). When the ANMS is monitoring network elements that are newly added or changed, a trigger rule is activated and these components are then able to collaborate and automatically generate a new network management program by using the information provided along with the SNMP libraries. Our method is useful for expanding the network structure and replacing network equipment. Through experiments, we have proved that our ANMS is useful when new network objects are added or changed in the network environment to expand the network structure. Further, we have verified that our ANMS system reduces the time and cost required to develop a network management program as compared to the manual method used in existing network management systems.

  • PDF

Determination of operating offline detention reservoir considering system resilience (시스템 탄력성을 고려한 빗물저류조 운영수위 결정)

  • Lee, Eui Hoon;Lee, Yong Sik;Jung, Donghwi;Joo, Jin Gul;Kim, Joong Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.403-411
    • /
    • 2016
  • Recently, the number of occurrences of inundation and the severity of flood damage has increased rapidly as the frequency of localized heavy rainfall and the ratio of impervious area increased in urban areas. Most local governments focus on employing structural measures (e.g., the construction of detention reservoirs/pump stations, rehabilitation of drainage and sewer pipes) to prevent urban inundation. On the other hand, the effectiveness of implementing such structural measures is being dimished because there are already many inundation prevention facilities. The limitation of structural measures can be overcoming by employing non-structure measures, such as flood alerts and the operation of drainage facilities. This study suggests the pump operation rule (i.e., suggesting pump stop level) for a new detention reservoir operating method, which triggers the operation of a pump based on the water level at the monitoring node in urban drainage system. In the new reservoir operation, a total of 48 rainfall events are generated by the Huff distribution for determining the proper pump stop level. First, the generated rainfall events are distributed as frequencies, quartiles, and durations. The averaged system resilience value was determined to range from 1.2 m to 1.5 m is based on the rainfall-runoff simulation with rainfall generated by the Huff distribution. In this range, 1.2 m was identified considering the safety factor of 1.25 by the Standard on sewer facilities in 2011.