H. Huberti, W. Hayes
Hasil untuk "q-fin.CP"
Menampilkan 20 dari ~1511187 hasil · dari Semantic Scholar, CrossRef
K. Hoffer
L. Gambardella, M. Dorigo
E. Ukkonen
We study approximate string matching in connection with two string distance functions that are computable in linear time. The first function is based on the so-called $q$-grams. An algorithm is given for the associated string matching problem that finds the locally best approximate occurences of pattern $P$, $|P|=m$, in text $T$, $|T|=n$, in time $O(n\log (m-q))$. The occurences with distance $\leq k$ can be found in time $O(n\log k)$. The other distance function is based on finding maximal common substrings and allows a form of approximate string matching in time $O(n)$. Both distances give a lower bound for the edit distance (in the unit cost model), which leads to fast hybrid algorithms for the edit distance based string matching.
W. Boden, R. O'rourke, M. Crawford et al.
S. Chekanov, D. Krakauer, S. Magill et al.
J. Barry, J. Proops
A. Al-Tamimi, F. Lewis, M. Abu-Khalaf
P. DeMarzo, Michael J. Fishman, Zhiguo He et al.
M. Littman
A. Ghaffari, E. Klumperink, Michiel C. M. Soer et al.
Seyed Mehdi Nasehi, Jonathan Sillito, F. Maurer et al.
I. Aganj, C. Lenglet, G. Sapiro et al.
T. Zhu, J. Harris, B. Biondi
I. Bose, A. Leung
Identity theft has impaired e-commerce. To combat the crime, many identity theft countermeasures (ITC) have been proposed. As investments in ITC are substantial and the benefits of such investments are intangible, companies are often hesitant to adopt such measures. This was the motivation for this study of the impact of 526 ITC adoption announcements on short- and long-term market value. The event study shows that such announcements result in positive market return of about U.S. $583 million around the date of announcement. Calendar-time portfolio analysis (CPA) is used for the long-term impact analysis and shows that the adoption of ITC generates positive and significant average monthly return up to 1.5% with control of market risk factors in a year. Subsampling analysis and interaction analysis show that U.S. listing, early ITC adoption, and two- factor authentication may moderate the market value of ITC adopters differently. A number of robustness checks (e.g., Heckman model, cross-sectional regression on Tobin’s Q, firm-specific risk factor analysis, subsampling analysis by ICT development, and analysis of security statements in annual reports) are performed. The research provides quantitative evidence of financial gain resulting from adoption of ITC and aspires to raise ITC awareness among industrial practitioners.
N. Mottram, C. Newton
This paper aims to provide an introduction to a basic form of the Q-tensor approach to modelling liquid crystals, which has seen increased interest in recent years. The increase in interest in this type of modelling approach has been driven by investigations into the fundamental nature of defects and new applications of liquid crystals such as bistable displays and colloidal systems for which a description of defects and disorder is essential. The work in this paper is not new research, rather it is an introductory guide for anyone wishing to model a system using such a theory. A more complete mathematical description of this theory, including a description of flow effects, can be found in numerous sources but the books by Virga and Sonnet and Virga are recommended. More information can be obtained from the plethora of papers using such approaches, although a general introduction for the novice is lacking. The first few sections of this paper will detail the development of the Q-tensor approach for nematic liquid crystalline systems and construct the free energy and governing equations for the mesoscopic dependent variables. A number of device surface treatments are considered and theoretical boundary conditions are specified for each instance. Finally, an example of a real device is demonstrated.
Yunxiao Chen, Jingchen Liu, Gongjun Xu et al.
F. Delduc, M. Magro, B. Vicedo
A bstractA procedure is developed for constructing deformations of integrable σ-models which are themselves classically integrable. When applied to the principal chiral model on any compact Lie group F, one recovers the Yang-Baxter σ-model introduced a few years ago by C. Klimčík. In the case of the symmetric space σ-model on F/G we obtain a new one-parameter family of integrable σ-models. The actions of these models correspond to a deformation of the target space geometry and include a torsion term. An interesting feature of the construction is the q-deformation of the symmetry corresponding to left multiplication in the original models, which becomes replaced by a classical q-deformed Poisson-Hopf algebra. Another noteworthy aspect of the deformation in the coset σ-model case is that it interpolates between a compact and a non-compact symmetric space. This is exemplified in the case of the SU(2)/U(1) coset σ-model which interpolates all the way to the SU(1, 1)/U(1) coset σ-model.
S. Morier-Genoud, V. Ovsienko
We introduce a notion of $q$-deformed rational numbers and $q$-deformed continued fractions. A $q$-deformed rational is encoded by a triangulation of a polygon and can be computed recursively. The recursive formula is analogous to the $q$-deformed Pascal identity for the Gaussian binomial coefficients, but the Pascal triangle is replaced by the Farey graph. The coefficients of the polynomials defining the $q$-rational count quiver subrepresentations of the maximal indecomposable representation of the graph dual to the triangulation. Several other properties, such as total positivity properties, $q$-deformation of the Farey graph, matrix presentations and $q$-continuants are given, as well as a relation to the Jones polynomial of rational knots.
Ivan Sorokin, Alexey Seleznev, Mikhail Pavlov et al.
A deep learning approach to reinforcement learning led to a general learner able to train on visual input to play a variety of arcade games at the human and superhuman levels. Its creators at the Google DeepMind's team called the approach: Deep Q-Network (DQN). We present an extension of DQN by "soft" and "hard" attention mechanisms. Tests of the proposed Deep Attention Recurrent Q-Network (DARQN) algorithm on multiple Atari 2600 games show level of performance superior to that of DQN. Moreover, built-in attention mechanisms allow a direct online monitoring of the training process by highlighting the regions of the game screen the agent is focusing on when making decisions.
Halaman 18 dari 75560