3,848 research outputs found
Face amplitude of spinfoam quantum gravity
The structure of the boundary Hilbert-space and the condition that amplitudes
behave appropriately under compositions determine the face amplitude of a
spinfoam theory. In quantum gravity the face amplitude turns out to be simpler
than originally thought.Comment: 5 pages, 2 figure
A Curie-Weiss model with dissipation
We consider stochastic dynamics for a spin system with mean field
interaction, in which the interaction potential is subject to noisy and
dissipative stochastic evolution. We show that, in the thermodynamic limit and
at sufficiently low temperature, the magnetization of the system has a time
periodic behavior, despite of the fact that no periodic force is applied
Use of Cryptographic Ideas to Interpret Biological Phenomena (and Vice Versa)
The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. This algorithm, as
shown below, has the peculiarity to expand the message to be encrypted hiding the ciphered message itself
within a set of garbage and control information.
The idea for this new algorithm starts from the observation of nature. In particular from the observation
of RNA behavior and some of its properties.
In particular the RNA sequences has some sections called Introns. Introns, derived from the term
"intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are
removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out
of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding
parts of a gene are known as introns as well.
The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches
by Biologists but, in our case, we will use the presence of Introns, in the RNA-Crypto System output, as a
strong method to add only apparently chaotic and non coding information with an unnecessary behavior in
the access to the secret key to code the messages.
In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non{coding
information as well as in the precursor mRNA. But the term "non-coding" does not necessarily mean "junk
data".
In this text a new cryptographic algorithm is described starting from a mathematical point of view
Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on Twitter
Microblogs are increasingly exploited for predicting prices and traded
volumes of stocks in financial markets. However, it has been demonstrated that
much of the content shared in microblogging platforms is created and publicized
by bots and spammers. Yet, the presence (or lack thereof) and the impact of
fake stock microblogs has never systematically been investigated before. Here,
we study 9M tweets related to stocks of the 5 main financial markets in the US.
By comparing tweets with financial data from Google Finance, we highlight
important characteristics of Twitter stock microblogs. More importantly, we
uncover a malicious practice - referred to as cashtag piggybacking -
perpetrated by coordinated groups of bots and likely aimed at promoting
low-value stocks by exploiting the popularity of high-value ones. Among the
findings of our study is that as much as 71% of the authors of suspicious
financial tweets are classified as bots by a state-of-the-art spambot detection
algorithm. Furthermore, 37% of them were suspended by Twitter a few months
after our investigation. Our results call for the adoption of spam and bot
detection techniques in all studies and applications that exploit
user-generated content for predicting the stock market
- …