3,848 research outputs found

    Face amplitude of spinfoam quantum gravity

    Full text link
    The structure of the boundary Hilbert-space and the condition that amplitudes behave appropriately under compositions determine the face amplitude of a spinfoam theory. In quantum gravity the face amplitude turns out to be simpler than originally thought.Comment: 5 pages, 2 figure

    A Curie-Weiss model with dissipation

    Full text link
    We consider stochastic dynamics for a spin system with mean field interaction, in which the interaction potential is subject to noisy and dissipative stochastic evolution. We show that, in the thermodynamic limit and at sufficiently low temperature, the magnetization of the system has a time periodic behavior, despite of the fact that no periodic force is applied

    Use of Cryptographic Ideas to Interpret Biological Phenomena (and Vice Versa)

    Get PDF
    The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. This algorithm, as shown below, has the peculiarity to expand the message to be encrypted hiding the ciphered message itself within a set of garbage and control information. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. In particular the RNA sequences has some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns, in the RNA-Crypto System output, as a strong method to add only apparently chaotic and non coding information with an unnecessary behavior in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non{coding information as well as in the precursor mRNA. But the term "non-coding" does not necessarily mean "junk data". In this text a new cryptographic algorithm is described starting from a mathematical point of view

    Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on Twitter

    Full text link
    Microblogs are increasingly exploited for predicting prices and traded volumes of stocks in financial markets. However, it has been demonstrated that much of the content shared in microblogging platforms is created and publicized by bots and spammers. Yet, the presence (or lack thereof) and the impact of fake stock microblogs has never systematically been investigated before. Here, we study 9M tweets related to stocks of the 5 main financial markets in the US. By comparing tweets with financial data from Google Finance, we highlight important characteristics of Twitter stock microblogs. More importantly, we uncover a malicious practice - referred to as cashtag piggybacking - perpetrated by coordinated groups of bots and likely aimed at promoting low-value stocks by exploiting the popularity of high-value ones. Among the findings of our study is that as much as 71% of the authors of suspicious financial tweets are classified as bots by a state-of-the-art spambot detection algorithm. Furthermore, 37% of them were suspended by Twitter a few months after our investigation. Our results call for the adoption of spam and bot detection techniques in all studies and applications that exploit user-generated content for predicting the stock market
    • …
    corecore