Results 71 to 80 of about 922,831 (255)
Asset Prices and Risk Aversion [PDF]
The standard asset pricing models (the CCAPM and the Epstein-Zin non-expected utility model) counterintuitively predict that equilibrium asset prices can rise if the representative agent's risk aversion increases. If the income effect, which implies enhanced saving as a result of an increase in risk aversion, dominates the substitution effect, which ...
arxiv
Miniaturized Devices for On‐the‐Spot Generation of Small‐Diameter Vascular Grafts
An intracorporeal extrusion device is developed for on‐the‐spot generation of vascular grafts with tunable diameters spanning from 1 to 6 mm. The device uses biomimetic polymers and light, to promptly obtaining biocompatible and high‐burst pressure‐resistant grafts.
Deyanira Hernandez‐Sanchez+11 more
wiley +1 more source
Corporate Security Prices in Structural Credit Risk Models with Incomplete Information: Extended Version [PDF]
The paper studies derivative asset analysis in structural credit risk models where the asset value of the firm is not fully observable. It is shown that in order to compute the price dynamics of traded securities one needs to solve a stochastic filtering problem for the asset value.
arxiv
Spatially Controlled Optical Vortex Generation Using Low‐Loss Antimony Telluride Metasurfaces
The spatially varying vortex beams with the customizable propagation trajectory and the controllable topological charge evolution are demonstrated using the Sb2Te3‐based plasmonic metasurfaces. Benefiting from the dispersion‐free property of the Pancharatnam–Berry phase and the broadband response of polarization conversion efficiency of the nanobrick ...
Chengsen Yang+11 more
wiley +1 more source
Auditoría de gestión de seguridad informática, en entidades públicas y privadas en Loja
RESUMEN Este documento exhibe información sobre normas, estándares y metodologías, utilizados para la gestión de seguridad de un Data Center y Red LAN.
Carlos Jaramillo+5 more
doaj
Information Security Fundamentals [PDF]
Information Security Fundamentals allows security professionals to gain a solid understandings of the foundations of the field and the entire range of issues that practitioners must address.
Thomas R. Peltier, Justin Peltier, John Blackley
core
Stimulated Raman Scattering with Optical Vortex Beams
This study presents exact analytical expressions for stimulated Raman scattering with Laguerre‐Gaussian beams, revealing signal dependence on topological and hyperbolic momentum. The results provide a theoretical foundation for coherent Raman imaging and detecting orbital angular momentum of light via structured light in nonlinear optics.
Minhaeng Cho
wiley +1 more source
Desarrollo de software esteganográfico con criptográfia asociada
RESUMEN Proteger la información es un requisito fundamental para preservar su confidencialidad e integridad. El uso de criptografía y esteganografía, más que un simple compendio de técnicas y algoritmos, se ha convertido en una necesidad urgente en ...
Jorge Rivadeneira, Basel Halak
doaj
Pricing European Options in Realistic Markets [PDF]
We investigate the relation between the fair price for European-style vanilla options and the distribution of short-term returns on the underlying asset ignoring transaction and other costs. We compute the risk-neutral probability density conditional on the total variance of the asset's returns when the option expires.
arxiv
Mimicking Symmetry‐Breaking Einstein Ring by Optical Lens
This article uses an optical lens to emulate the gravitational lensing effect and observe the Einstein ring (ER) patterns. The symmetry‐breaking ER, i.e., Einstein cross, is observed utilizing a rotation‐symmetry‐breaking hemi‐ellipsoid lens. Deformed Einstein cross patterns induced by noncollinearly alignment of the light source–lens–observer are ...
Jun‐Liang Duan+5 more
wiley +1 more source