Listing 1 - 6 of 6 |
Sort by
|
Choose an application
The recent years have been characterized by stormy social protests throughout the world. These protests have some commonalities, but at the same time, their sociopolitical, psychological, and economic contexts differ essentially. An important class of such protests is known as color revolutions. The analysis of these events in social and political literature is characterized by huge diversity of opinions. We remark that the sociopolitical perturbations under consideration are characterized by the cascade dynamics leading to the exponential amplification of coherent social actions. In quantum physics, such exponential and coherent amplification is the basic feature of laser's functioning. (Laser is acronym for light amplification by stimulated emission of radiation). In this book we explore the theory of laser to model aforementioned waves of social protests, from color revolutions to Brexit and Trump's election. We call such social processes Stimulated Amplification of Social Actions (SASA), but to keep closer to the analogy with physics we merely operate with the term social laser.
Social problems --- Quantum computing. --- Field theory (Physics) --- Mathematical models.
Choose an application
An introduction to how the mathematical tools from quantum field theory can be applied to economics and finance, providing a wide range of quantum mathematical techniques for designing financial instruments. The ideas of Lagrangians, Hamiltonians, state spaces, operators and Feynman path integrals are demonstrated to be the mathematical underpinning of quantum field theory, and which are employed to formulate a comprehensive mathematical theory of asset pricing as well as of interest rates, which are validated by empirical evidence. Numerical algorithms and simulations are applied to the study of asset pricing models as well as of nonlinear interest rates. A range of economic and financial topics are shown to have quantum mechanical formulations, including options, coupon bonds, nonlinear interest rates, risky bonds and the microeconomic action functional. This is an invaluable resource for experts in quantitative finance and in mathematics who have no specialist knowledge of quantum field theory.
Economics --- Finance --- Quantum field theory. --- Relativistic quantum field theory --- Field theory (Physics) --- Quantum theory --- Relativity (Physics) --- Economics, Mathematical --- Mathematical models.
Choose an application
This book explores the application of field theory (patterns of interaction) to Russian economic history, and how social and political fields mediate the influences of institutions, structures, discourses and ideologies in the creation and dissemination of economic thinking, theory and practice. Using focused cases on Russia's economy from the mid-nineteenth century to the present, Hass and co-authors expand the empirical basis of field studies to provide new material on Russian economic history. The cases are divided into two complementary halves: i) The role of fields of institutions, discourses, and structures in the development of Russian economic thought, especially economic theories and discourses; and ii) The role of fields in the real adoption and implementation of policies in Soviet and Russian economic history. With developed discussion of fields and field theory, this book moves beyond sociology to demonstrate to other disciplines the relation of fields and field theory to other frameworks and methodological considerations for field analysis, as well as providing new empirical insights and narratives not as well-known abroad. Jeffrey Hass is Associate Professor at the University of Richmond, USA, and St. Petersburg State University, Russia. His areas of expertise are economic sociology, political sociology, political economy, social change, sociology of power, organizational sociology, and comparative/historical sociology. He has published on post-socialism, including Rethinking the Post-Soviet Experience: Markets, Moral Economies, and Cultural Contradictions of Post-Socialist Russia with Palgrave Macmillan in 2011. He is currently continuing this line of work on post-socialist political economy, as well as investigating the politics and practices of survival in the Blockade of Leningrad.
Algebra. --- Field theory (Physics). --- Evolutionary economics. --- Economic history. --- Historical sociology. --- Economics. --- Economic History. --- Historical Sociology. --- International Political Economy. --- Field Theory and Polynomials. --- Institutional/Evolutionary Economics. --- History of Economic Thought/Methodology. --- Russia --- Economic conditions. --- Political economy. --- Economics --- Classical field theory --- Continuum physics --- Physics --- Continuum mechanics --- Economic theory --- Political economy --- Social sciences --- Economic man --- Anthropology --- History --- Sociology --- Economic conditions --- History, Economic --- Mathematics --- Mathematical analysis
Choose an application
This book includes review articles in the field of elliptic integrals, elliptic functions and modular forms intending to foster the discussion between theoretical physicists working on higher loop calculations and mathematicians working in the field of modular forms and functions and analytic solutions of higher order differential and difference equations. .
Elliptic functions. --- Algebra --- Symbolic and Algebraic Manipulation. --- Quantum Field Theories, String Theory. --- Mathematical Physics. --- Data processing. --- Computer science—Mathematics. --- Quantum field theory. --- String theory. --- Mathematical physics. --- Physical mathematics --- Physics --- Models, String --- String theory --- Nuclear reactions --- Relativistic quantum field theory --- Field theory (Physics) --- Quantum theory --- Relativity (Physics) --- Mathematics
Choose an application
This book explores how machine learning can be used to improve the efficiency of expensive fundamental science experiments. The first part introduces the Belle and Belle II experiments, providing a detailed description of the Belle to Belle II data conversion tool, currently used by many analysts. The second part covers machine learning in high-energy physics, discussing the Belle II machine learning infrastructure and selected algorithms in detail. Furthermore, it examines several machine learning techniques that can be used to control and reduce systematic uncertainties. The third part investigates the important exclusive B tagging technique, unique to physics experiments operating at the Υ resonances, and studies in-depth the novel Full Event Interpretation algorithm, which doubles the maximum tag-side efficiency of its predecessor. The fourth part presents a complete measurement of the branching fraction of the rare leptonic B decay “B→tau nu”, which is used to validate the algorithms discussed in previous parts.
Artificial intelligence. --- Particles (Nuclear physics) --- Elementary particles (Physics) --- High energy physics --- Nuclear particles --- Nucleons --- Nuclear physics --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer simulation. --- Quantum theory. --- Elementary Particles, Quantum Field Theory. --- Artificial Intelligence. --- Data-driven Science, Modeling and Theory Building. --- Measurement Science and Instrumentation. --- Quantum dynamics --- Quantum mechanics --- Quantum physics --- Physics --- Mechanics --- Thermodynamics --- Elementary particles (Physics). --- Quantum field theory. --- Sociophysics. --- Econophysics. --- Physical measurements. --- Measurement . --- Measuring --- Mensuration --- Mathematics --- Technology --- Metrology --- Physical measurements --- Measurements, Physical --- Mathematical physics --- Measurement --- Economics --- Statistical physics --- Mathematical sociology --- Relativistic quantum field theory --- Field theory (Physics) --- Quantum theory --- Relativity (Physics) --- Statistical methods
Choose an application
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
Computer science. --- Computer security. --- Data structures (Computer science). --- Number theory. --- Quantum field theory. --- String theory. --- Quantum physics. --- Applied mathematics. --- Engineering mathematics. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Appl.Mathematics/Computational Methods of Engineering. --- Number Theory. --- Quantum Field Theories, String Theory. --- Quantum Physics. --- Engineering --- Engineering analysis --- Quantum dynamics --- Quantum mechanics --- Quantum physics --- Models, String --- String theory --- Relativistic quantum field theory --- Number study --- Numbers, Theory of --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Mathematics --- Protection --- Security measures --- Mathematical analysis --- Physics --- Mechanics --- Thermodynamics --- Nuclear reactions --- Field theory (Physics) --- Quantum theory --- Relativity (Physics) --- Algebra --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data protection --- Security systems --- Hacking --- Science --- Cryptography --- Mathematical models. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Quantum theory. --- Data Structures and Information Theory. --- Mathematical and Computational Engineering.
Listing 1 - 6 of 6 |
Sort by
|