Zobrazeno 1 - 10
of 2 884
pro vyhledávání: '"CAO, Zheng"'
Autor:
Cao, Zheng, Lin, Xinhao
This study focuses on the application of the Heston model to option pricing, employing both theoretical derivations and empirical validations. The Heston model, known for its ability to incorporate stochastic volatility, is derived and analyzed to ev
Externí odkaz:
http://arxiv.org/abs/2409.12453
Autor:
Cao, Zheng
This thesis explores the historical progression and theoretical constructs of financial mathematics, with an in-depth exploration of Stochastic Calculus as showcased in the Binomial Asset Pricing Model and the Continuous-Time Models. A comprehensive
Externí odkaz:
http://arxiv.org/abs/2408.05672
Tracking in gigapixel scenarios holds numerous potential applications in video surveillance and pedestrian analysis. Existing algorithms attempt to perform tracking in crowded scenes by utilizing multiple cameras or group relationships. However, thei
Externí odkaz:
http://arxiv.org/abs/2407.18637
URLs play a crucial role in understanding and categorizing web content, particularly in tasks related to security control and online recommendations. While pre-trained models are currently dominating various fields, the domain of URL analysis still l
Externí odkaz:
http://arxiv.org/abs/2402.11495
Astigmatic unitary transformations allow for the adiabatic connections of all feasible states of paraxial Gaussian beams on the same modal sphere, i.e., Hermite-Laguerre-Gaussian (HLG) modes. Here, we present a comprehensive investigation into the un
Externí odkaz:
http://arxiv.org/abs/2402.02153
Autor:
Qian, Peng, Wu, Hanjie, Du, Zeren, Vural, Turan, Rong, Dazhong, Cao, Zheng, Zhang, Lun, Wang, Yanbin, Chen, Jianhai, He, Qinming
As blockchain smart contracts become more widespread and carry more valuable digital assets, they become an increasingly attractive target for attackers. Over the past few years, smart contracts have been subject to a plethora of devastating attacks,
Externí odkaz:
http://arxiv.org/abs/2312.04512
The widespread use of the Internet has revolutionized information retrieval methods. However, this transformation has also given rise to a significant cybersecurity challenge: the rapid proliferation of malicious URLs, which serve as entry points for
Externí odkaz:
http://arxiv.org/abs/2311.12372
Autor:
Cao, Zheng, Chen, Lie-Wen
Neutron stars (NSs) which could contain exotic degrees of freedom in the core and the self-bound quark stars (QSs) made purely of absolutely stable deconfined quark matter are still two main candidates for the compact objects observed in pulsars and
Externí odkaz:
http://arxiv.org/abs/2308.16783
Autor:
Chen, Chuan1,2 (AUTHOR), Cao, Zheng1,2 (AUTHOR), Lei, Hehua1,2 (AUTHOR), Zhang, Cui1,2 (AUTHOR), Wu, Mengjing1,2 (AUTHOR), Huang, Shaohua3 (AUTHOR), Li, Xinzhi4 (AUTHOR), Xie, Denghui5 (AUTHOR) xiedenghui221122@smu.edu.cn, Liu, Maili1,2 (AUTHOR), Zhang, Limin1,2 (AUTHOR) zhanglm@wipm.ac.cn, Chen, Gang6 (AUTHOR) chengang12@hbucm.edu.cn
Publikováno v:
Advanced Science. 9/25/2024, Vol. 11 Issue 36, p1-16. 16p.
This paper introduced key aspects of applying Machine Learning (ML) models, improved trading strategies, and the Quasi-Reversibility Method (QRM) to optimize stock option forecasting and trading results. It presented the findings of the follow-up pro
Externí odkaz:
http://arxiv.org/abs/2211.15912