314 resultados para Replica Trick


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider an exchange economy under incomplete financiaI markets with purely financiaI securities and finitely many agents. When portfolios are not constrained, Cass [4], Duffie [7] and Florenzano-Gourdel [12] proved that arbitrage-free security prices fully characterize equilibrium security prices. This result is based on a trick initiated by Cass [4] in which one unconstrained agent behaves as if he were in complete markets. This approach is unsatisfactory since it is asymmetric and no more valid when every agent is subject to frictions. We propose a new and symmetric approach to prove that arbitrage-free security prices still fully characterize equilibrium security prices in the more realistic situation where the financiaI market is constrained by convex restrictions, provided that financiaI markets are collectively frictionless.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We analyze the average performance of a general class of learning algorithms for the nondeterministic polynomial time complete problem of rule extraction by a binary perceptron. The examples are generated by a rule implemented by a teacher network of similar architecture. A variational approach is used in trying to identify the potential energy that leads to the largest generalization in the thermodynamic limit. We restrict our search to algorithms that always satisfy the binary constraints. A replica symmetric ansatz leads to a learning algorithm which presents a phase transition in violation of an information theoretical bound. Stability analysis shows that this is due to a failure of the replica symmetric ansatz and the first step of replica symmetry breaking (RSB) is studied. The variational method does not determine a unique potential but it allows construction of a class with a unique minimum within each first order valley. Members of this class improve on the performance of Gibbs algorithm but fail to reach the Bayesian limit in the low generalization phase. They even fail to reach the performance of the best binary, an optimal clipping of the barycenter of version space. We find a trade-off between a good low performance and early onset of perfect generalization. Although the RSB may be locally stable we discuss the possibility that it fails to be the correct saddle point globally. ©2000 The American Physical Society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Twelve participants ran (9 km . h(-1)) to test two types of running shoes: replica and original shoes. Ground reaction force, plantar pressure and electromyographic activity were recorded. The shoes were tested randomly and on different days. Comparisons between the two experimental conditions were made by analysis of variance (ANOVA) test (P <= 0.05). The time to first peak, loading rate of the first peak and impulse of the first 75 ms of stance were significantly different between the shoes (P <= 0.05), revealing an increase of impact forces for the replica shoes. The peak plantar pressure values were significantly higher (P <= 0.05) when wearing replica shoes. During running, the contact area was significantly smaller (P <= 0.05) for the replica shoe. The electromyographic activity of the analysed muscles did not show changes between the two shoes in running. These findings suggest that the use of replica running shoes can increase the external load applied to the human body, but may not change the muscle activity pattern during locomotion. This new mechanical situation may increase the risk of injuries in these movements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Il lavoro presentato ha avuto l’obiettivo, attraverso lo studio dei più comuni servomotori stepper, di replicare profili di accelerazione registrati o definiti con l’utilizzo di una piattaforma hardware Arduino in grado di salvare ed elaborare dati. Per raggiungere tale risultato è stato realizzato un braccio meccanico in grado di replicare l’accelerazione su un singolo asse di interesse. L’intento del progetto è fungere da base per l’elaborazione di un dispositivo a tre assi utilizzabile in maniera estesa nei diversi campi in cui i fenomeni vibrazionali possono essere di rilievo.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Il Cryptolocker è un malware diffuso su scala globale appartenente alla categoria ransomware. La mia analisi consiste nel ripercorrere le origini dei software maligni alla ricerca di rappresentanti del genere con caratteristiche simili al virus che senza tregua persevera a partire dal 2013: il Cryptolocker. Per imparare di più sul comportamento di questa minaccia vengono esposte delle analisi del malware, quella statica e quella dinamica, eseguite sul Cryptolocker (2013), CryptoWall (2014) e TeslaCrypt (2015). In breve viene descritta la parte operativa per la concezione e la configurazione di un laboratorio virtuale per la successiva raccolta di tracce lasciate dal malware sul sistema e in rete. In seguito all’analisi pratica e alla concentrazione sui punti deboli di queste minacce, oltre che sugli aspetti tecnici alla base del funzionamento dei crypto, vengono presi in considerazione gli aspetti sociali e psicologici che caratterizzano un complesso background da cui il virus prolifica. Vengono confrontate fonti autorevoli e testimonianze per chiarire i dubbi rimasti dopo i test. Saranno questi ultimi a confermare la veridicità dei dati emersi dai miei esperimenti, ma anche a formare un quadro più completo sottolineando quanto la morfologia del malware sia in simbiosi con la tipologia di utente che va a colpire. Capito il funzionamento generale del crypto sono proprio le sue funzionalità e le sue particolarità a permettermi di stilare, anche con l’aiuto di fonti esterne al mio operato, una lista esauriente di mezzi e comportamenti difensivi per contrastarlo ed attenuare il rischio d’infezione. Vengono citati anche le possibili procedure di recupero per i dati compromessi, per i casi “fortunati”, in quanto il recupero non è sempre materialmente possibile. La mia relazione si conclude con una considerazione da parte mia inaspettata: il potenziale dei crypto, in tutte le loro forme, risiede per la maggior parte nel social engineering, senza il quale (se non per certe categorie del ransomware) l’infezione avrebbe percentuali di fallimento decisamente più elevate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Clinical efficacy of aerosol therapy in premature newborns depends on the efficiency of delivery of aerosolized drug to the bronchial tree. To study the influence of various anatomical, physical, and physiological factors on aerosol delivery in preterm newborns, it is crucial to have appropriate in vitro models, which are currently not available. We therefore constructed the premature infant nose throat-model (PrINT-Model), an upper airway model corresponding to a premature infant of 32-wk gestational age by three-dimensional (3D) reconstruction of a three-planar magnetic resonance imaging scan and subsequent 3D-printing. Validation was realized by visual comparison and comparison of total airway volume. To study the feasibility of measuring aerosol deposition, budesonide was aerosolized through the cast and lung dose was expressed as percentage of nominal dose. The airway volumes of the initial magnetic resonance imaging and validation computed tomography scan showed a relative deviation of 0.94%. Lung dose at low flow (1 L/min) was 61.84% and 9.00% at high flow (10 L/min), p < 0.0001. 3D-reconstruction provided an anatomically accurate surrogate of the upper airways of a 32-wk-old premature infant, making the model suitable for future in vitro testing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The T2K long-baseline neutrino oscillation experiment in Japan needs precise predictions of the initial neutrino flux. The highest precision can be reached based on detailed measurements of hadron emission from the same target as used by T2K exposed to a proton beam of the same kinetic energy of 30 GeV. The corresponding data were recorded in 2007-2010 by the NA61/SHINE experiment at the CERN SPS using a replica of the T2K graphite target. In this paper details of the experiment, data taking, data analysis method and results from the 2007 pilot run are presented. Furthermore, the application of the NA61/SHINE measurements to the predictions of the T2K initial neutrino flux is described and discussed.