• Title/Summary/Keyword: invariant metric

Search Result 107, Processing Time 0.023 seconds

PSEUDO-RIEMANNIAN SASAKI SOLVMANIFOLDS

  • Diego Conti;Federico A. Rossi;Romeo Segnan Dalmasso
    • Journal of the Korean Mathematical Society
    • /
    • v.60 no.1
    • /
    • pp.115-141
    • /
    • 2023
  • We study a class of left-invariant pseudo-Riemannian Sasaki metrics on solvable Lie groups, which can be characterized by the property that the zero level set of the moment map relative to the action of some one-parameter subgroup {exp tX} is a normal nilpotent subgroup commuting with {exp tX}, and X is not lightlike. We characterize this geometry in terms of the Sasaki reduction and its pseudo-Kähler quotient under the action generated by the Reeb vector field. We classify pseudo-Riemannian Sasaki solvmanifolds of this type in dimension 5 and those of dimension 7 whose Kähler reduction in the above sense is abelian.

VARIOUS SHADOWING PROPERTIES FOR TIME VARYING MAPS

  • Sarkooh, Javad Nazarian
    • Bulletin of the Korean Mathematical Society
    • /
    • v.59 no.2
    • /
    • pp.481-506
    • /
    • 2022
  • This paper is concerned with the study of various notions of shadowing of dynamical systems induced by a sequence of maps, so-called time varying maps, on a metric space. We define and study the shadowing, h-shadowing, limit shadowing, s-limit shadowing and exponential limit shadowing properties of these dynamical systems. We show that h-shadowing, limit shadowing and s-limit shadowing properties are conjugacy invariant. Also, we investigate the relationships between these notions of shadowing for time varying maps and examine the role that expansivity plays in shadowing properties of such dynamical systems. Specially, we prove some results linking s-limit shadowing property to limit shadowing property, and h-shadowing property to s-limit shadowing and limit shadowing properties. Moreover, under the assumption of expansivity, we show that the shadowing property implies the h-shadowing, s-limit shadowing and limit shadowing properties. Finally, it is proved that the uniformly contracting and uniformly expanding time varying maps exhibit the shadowing, limit shadowing, s-limit shadowing and exponential limit shadowing properties.

WEAKLY DENSE IDEALS IN PRIVALOV SPACES OF HOLOMORPHIC FUNCTIONS

  • Mestrovic, Romeo;Pavicevic, Zarko
    • Journal of the Korean Mathematical Society
    • /
    • v.48 no.2
    • /
    • pp.397-420
    • /
    • 2011
  • In this paper we study the structure of closed weakly dense ideals in Privalov spaces $N^p$ (1 < p < $\infty$) of holomorphic functions on the disk $\mathbb{D}$ : |z| < 1. The space $N^p$ with the topology given by Stoll's metric [21] becomes an F-algebra. N. Mochizuki [16] proved that a closed ideal in $N^p$ is a principal ideal generated by an inner function. Consequently, a closed subspace E of $N^p$ is invariant under multiplication by z if and only if it has the form $IN^p$ for some inner function I. We prove that if $\cal{M}$ is a closed ideal in $N^p$ that is dense in the weak topology of $N^p$, then $\cal{M}$ is generated by a singular inner function. On the other hand, if $S_{\mu}$ is a singular inner function whose associated singular measure $\mu$ has the modulus of continuity $O(t^{(p-1)/p})$, then we prove that the ideal $S_{\mu}N^p$ is weakly dense in $N^p$. Consequently, for such singular inner function $S_{\mu}$, the quotient space $N^p/S_{\mu}N^p$ is an F-space with trivial dual, and hence $N^p$ does not have the separation property.

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

SOME RESULTS RELATED WITH POISSON-SZEGÖKERNEL AND BEREZIN TRANSFORM

  • Yang, Gye Tak;Choi, Ki Seong
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.24 no.3
    • /
    • pp.417-426
    • /
    • 2011
  • Let ${\mu}$ be a finite positive Borel measure on the unit ball $B{\subset}{\mathbb{C}}^n$ and ${\nu}$ be the Euclidean volume measure such that ${\nu}(B)=1$. For the unit sphere $S=\{z:{\mid}z{\mid}=1\}$, ${\sigma}$ is the rotation-invariant measure on S such that ${\sigma}(S) =1$. Let ${\mathcal{P}}[f]$ be the Poisson-$Szeg{\ddot{o}}$ integral of f and $\tilde{\mu}$ be the Berezin transform of ${\mu}$. In this paper, we show that if there is a constant M > 0 such that ${\int_B}{\mid}{\mathcal{P}}[f](z){\mid}^pd{\mu}(z){\leq}M{\int_B}{\mid}{\mathcal{P}}[f](z){\mid}^pd{\nu}(z)$ for all $f{\in}L^p(\sigma)$, then ${\parallel}{\tilde{\mu}}{\parallel}_{\infty}{\equiv}{\sup}_{z{\in}B}{\mid}{\tilde{\mu}}(z){\mid}<{\infty}$, and we show that if ${\parallel}{\tilde{\mu}{\parallel}_{\infty}<{\infty}$, then ${\int_B}{\mid}{\mathcal{P}}[f](z){\mid}^pd{\mu}(z){\leq}C{\mid}{\mid}{\tilde{\mu}}{\mid}{\mid}_{\infty}{\int_S}{\mid}f(\zeta){\mid}^pd{\sigma}(\zeta)$ for some constant C.

Mutual Information-based Circular Template Matching for Image Registration (영상등록을 위한 Mutual Information 기반의 원형 템플릿 정합)

  • Ye, Chul-Soo
    • Korean Journal of Remote Sensing
    • /
    • v.30 no.5
    • /
    • pp.547-557
    • /
    • 2014
  • This paper presents a method for designing circular template used in similarity measurement for image registration. Circular template has translation and rotation invariant property, which results in correct matching of control points for image registration under the condition of translation and rotation between reference and sensed images. Circular template consisting of the pixels located on the multiple circumferences of the circles whose radii vary from zero to a certain distance, is converted to two-dimensional Discrete Polar Coordinate Matrix (DPCM), whose elements are the pixels of the circular template. For sensed image, the same type of circular template and DPCM are created by rotating the circular template repeatedly by a certain degree in the range between 0 and 360 degrees and then similarity is calculated using mutual information of the two DPCMs. The best match is determined when the mutual information for each rotation angle at each pixel in search area is maximum. The proposed algorithm was tested using KOMPSAT-2 images acquired at two different times and the results indicate high accurate matching performance under image rotation.

Estimation of GARCH Models and Performance Analysis of Volatility Trading System using Support Vector Regression (Support Vector Regression을 이용한 GARCH 모형의 추정과 투자전략의 성과분석)

  • Kim, Sun Woong;Choi, Heung Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.107-122
    • /
    • 2017
  • Volatility in the stock market returns is a measure of investment risk. It plays a central role in portfolio optimization, asset pricing and risk management as well as most theoretical financial models. Engle(1982) presented a pioneering paper on the stock market volatility that explains the time-variant characteristics embedded in the stock market return volatility. His model, Autoregressive Conditional Heteroscedasticity (ARCH), was generalized by Bollerslev(1986) as GARCH models. Empirical studies have shown that GARCH models describes well the fat-tailed return distributions and volatility clustering phenomenon appearing in stock prices. The parameters of the GARCH models are generally estimated by the maximum likelihood estimation (MLE) based on the standard normal density. But, since 1987 Black Monday, the stock market prices have become very complex and shown a lot of noisy terms. Recent studies start to apply artificial intelligent approach in estimating the GARCH parameters as a substitute for the MLE. The paper presents SVR-based GARCH process and compares with MLE-based GARCH process to estimate the parameters of GARCH models which are known to well forecast stock market volatility. Kernel functions used in SVR estimation process are linear, polynomial and radial. We analyzed the suggested models with KOSPI 200 Index. This index is constituted by 200 blue chip stocks listed in the Korea Exchange. We sampled KOSPI 200 daily closing values from 2010 to 2015. Sample observations are 1487 days. We used 1187 days to train the suggested GARCH models and the remaining 300 days were used as testing data. First, symmetric and asymmetric GARCH models are estimated by MLE. We forecasted KOSPI 200 Index return volatility and the statistical metric MSE shows better results for the asymmetric GARCH models such as E-GARCH or GJR-GARCH. This is consistent with the documented non-normal return distribution characteristics with fat-tail and leptokurtosis. Compared with MLE estimation process, SVR-based GARCH models outperform the MLE methodology in KOSPI 200 Index return volatility forecasting. Polynomial kernel function shows exceptionally lower forecasting accuracy. We suggested Intelligent Volatility Trading System (IVTS) that utilizes the forecasted volatility results. IVTS entry rules are as follows. If forecasted tomorrow volatility will increase then buy volatility today. If forecasted tomorrow volatility will decrease then sell volatility today. If forecasted volatility direction does not change we hold the existing buy or sell positions. IVTS is assumed to buy and sell historical volatility values. This is somewhat unreal because we cannot trade historical volatility values themselves. But our simulation results are meaningful since the Korea Exchange introduced volatility futures contract that traders can trade since November 2014. The trading systems with SVR-based GARCH models show higher returns than MLE-based GARCH in the testing period. And trading profitable percentages of MLE-based GARCH IVTS models range from 47.5% to 50.0%, trading profitable percentages of SVR-based GARCH IVTS models range from 51.8% to 59.7%. MLE-based symmetric S-GARCH shows +150.2% return and SVR-based symmetric S-GARCH shows +526.4% return. MLE-based asymmetric E-GARCH shows -72% return and SVR-based asymmetric E-GARCH shows +245.6% return. MLE-based asymmetric GJR-GARCH shows -98.7% return and SVR-based asymmetric GJR-GARCH shows +126.3% return. Linear kernel function shows higher trading returns than radial kernel function. Best performance of SVR-based IVTS is +526.4% and that of MLE-based IVTS is +150.2%. SVR-based GARCH IVTS shows higher trading frequency. This study has some limitations. Our models are solely based on SVR. Other artificial intelligence models are needed to search for better performance. We do not consider costs incurred in the trading process including brokerage commissions and slippage costs. IVTS trading performance is unreal since we use historical volatility values as trading objects. The exact forecasting of stock market volatility is essential in the real trading as well as asset pricing models. Further studies on other machine learning-based GARCH models can give better information for the stock market investors.