182 research outputs found
Anomaly on Superspace of Time Series Data
We apply the G-Theory and anomaly of ghost and anti-ghost fields in the
theory of supersymmetry to study a superspace over time series data for the
detection of hidden general supply and demand equilibrium in the financial
market. We provide a proof of the existence of the general equilibrium point
over 14-extradimensions of the new G-theory compared to M-theory of 11
dimensions model of Edward Witten. We found that the process of coupling
between nonequilibrium and equilibrium spinor fields of expectation ghost
fields in the superspace of time series data induces an infinitely long exact
sequence of cohomology from a short exact sequence of moduli state space model.
If we assume that the financial market is separated into topological spaces
of supply and demand as the D-brane and anti-D-brane model, then we can use a
cohomology group to compute the stability of the market as a stable point of
the general equilibrium of the interaction between D-branes of the market. We
obtain the result that the general equilibrium will exist if and only if the
14-th-Batalin-Vilkovisky cohomology group with the negative dimensions
underlying major 14 hidden factors influencing the market is zero.Comment: 18 pages, 9 figures, 1 tabl
Recommended from our members
Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice
The Montgomery kP algorithm i.e. the Montgomery ladder is reported in literature as resistant against simple SCA due to the fact that the processing of each key bit value of the scalar k is done using the same sequence of operations. We implemented the Montgomery kP algorithm using Lopez-Dahab projective coordinates for the NIST elliptic curve B-233. We instantiated the same VHDL code for a wide range of clock frequencies for the same target FPGA and using the same compiler options. We measured electromagnetic traces of the kP executions using the same input data, i.e. scalar k and elliptic curve point P, and measurement setup. Additionally, we synthesized the same VHDL code for two IHP CMOS technologies, for a broad spectrum of frequencies. We simulated the power consumption of each synthesized design during an execution of the kP operation, always using the same scalar k and elliptic curve point P as inputs. Our experiments clearly show that the success of simple electromagnetic analysis attacks against FPGA implementations as well as the one of simple power analysis attacks against synthesized ASIC designs depends on the target frequency for which the design was implemented and at which it is executed significantly. In our experiments the scalar k was successfully revealed via simple visual inspection of the electromagnetic traces of the FPGA for frequencies from 40 to 100 MHz when standard compile options were used as well as from 50 MHz up to 240 MHz when performance optimizing compile options were used. We obtained similar results attacking the power traces simulated for the ASIC. Despite the significant differences of the here investigated technologies the designsâ resistance against the attacks performed is similar: only a few points in the traces represent strong leakage sources allowing to reveal the key at very low and very high frequencies. For the âmiddleâ frequencies the number of points which allow to successfully reveal the key increases when increasing the frequency
Plasma Sail Concept Fundamentals
The mini-magnetospheric plasma propulsion (M2P2) device, originally proposed by Winglee et al., predicts that a 15-km standoff distance (or 20-km cross-sectional dimension) of the magnetic bubble will provide for sufficient momentum transfer from the solar wind to accelerate a spacecraft to unprecedented speeds of 50 C80 km/s after an acceleration period of 3 mo. Such velocities will enable travel out of the solar system in period of 7 yr almost an order of magnitude improvement over present chemical-based propulsion systems. However, for the parameters of the simulation of Winglee et al., a fluid model for the interaction of M2P2 with the solar wind is not valid. It is assumed in the magnetohydrodynamic (MHD) fluid model, normally applied to planetary magnetospheres, that the characteristic scale size is much greater than the Larmor radius and ion skin depth of the solar wind. In the case of M2P2, the size of the magnetic bubble is actually less than or comparable to the scale of these characteristic parameters. Therefore, a kinetic approach, which addresses the small-scale physical mechanisms, must be used. A two-component approach to determining a preliminary estimate of the momentum transfer to the plasma sail has been adopted. The first component is a self-consistent MHD simulation of the small-scale expansion phase of the magnetic bubble. The fluid treatment is valid to roughly 5 km from the source and the steady-state MHD solution at the 5 km boundary was then used as initial conditions for the hybrid simulation. The hybrid simulations showed that the forces delivered to the innermost regions of the plasma sail are considerably ( 10 times) smaller than the MHD counterpart, are dominated by the magnetic field pressure gradient, and are directed primarily in the transverse direction
Recommended from our members
On wireless channel parameters for key generation in industrial environments
The advent of industry 4.0 with its idea of individualized mass production will significantly increase the demand for more flexibility on the production floor. Wireless communication provides this type of flexibility but puts the automation system at risk as potential attackers now can eavesdrop or even manipulate the messages exchanged even without getting access to the premises of the victim. Cryptographic means can prevent such attacks if applied properly. One of their core components is the distribution of keys. The generation of keys from channel parameters seems to be a promising approach in comparison to classical approaches based on public key cryptography as it avoids computing intense operations for exchanging keys. In this paper we investigated key generation approaches using channel parameters recorded in a real industrial environment. Our key results are that the key generation may take unpredictable long and that the resulting keys are of low quality with respect to the test for randomness we applied
Twoâspecies, 3D, MHD simulation of Europa's interaction with Jupiter's magnetosphere
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/95391/1/grl12120.pd
Toward a General Theory of Local Preconditioning
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/77390/1/AIAA-2002-2956-678.pd
3âD global MHD model prediction for the first close flyby of Titan by Cassini
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/95615/1/grl18965.pd
Plasma Flow Past Cometary and Planetary Satellite Atmospheres. In
The tenuous atmospheres and ionospheres of comets and outer planet satellites share many common properties and features. Such similarities include a strong interaction with their outer radiation, fields and particles environs. For comets the interaction is with the magnetized solar wind plasma, whereas for satellites the interaction is with the strongly magnetized and corotating planetary magnetospheric plasma. For this reason there are many common or analogous physical regimes, and many of the same modeling techniques are used to interpret remote sensing and in situ measurements in order to study the important underlying physical phenomena responsible for their appearances. We present here a review of various modeling approaches which are used to elucidate the basic properties and processes shaping the energetics and dynamics of these systems which are similar in may respects
- âŠ