World-sheet reparameterization

Assignment Help Basic Computer Science
Reference no: EM13968006

Reparameteri zations generated by Virasoro operators.

(a) Consider the string at r = 0. Which of the combinations in ( 12.151) reparameterizes the a coordinate of the string while keeping r = O? When r = 0 is preserved, the world-sheet reparameterization is actually a string reparameterization. Show that the generators of these reparameterizations form a subalgebra of the Virasoro algebra.

(b) Describe the general world-sheet reparameterization that leaves the midpoi nt a = lf / 2 of the r = 0 open string fixed. Express this reparameterization usi ng an infinite set of constrai ned parameters.

Reference no: EM13968006

Questions Cloud

What are your first steps in acquisition planning : What are your first steps in acquisition planning? What type of specification do you think you have? Do you feel that the specification for the requirement is proper
Determine the rate loss due to the initialization phase : Consider a block length N D-BLAST architecture on a MIMO channel with nt transmit antennas. Determine the rate loss due to the initialization phase as a function of N and nt.
Example of direct labor cost for an airplane manufacturer : The cost of a manufactured product generally consists of which of the following costs?
What is the rate of change of temperature : What is the temperature at the point (1,2) and if we move from the point (1,2) in direction parallel to the positive y axis what is the rate of change of temperature?
World-sheet reparameterization : Consider the string at r = 0. Which of the combinations in ( 12.151) reparameterizes the a coordinate of the string while keeping r = O? When r = 0 is preserved, the world-sheet reparameterization is actually a string reparameterization. Show that..
What is the absolute max and min of function : Find the points on the boundary where f attains its absolute max and min. What is the absolute max and min of f?
Equation of motion for heisenberg operators : Assume that the Schrodinger Hamiltonian H = H ( p, q ) is time independent. In this case the time-i ndependent Schrodinger operator yields a Heisenberg operator ( t ) = ei H t e-i H t .
Total cost to manufacture a quantity : Suppose the total cost C(x) (in dollars) to manufacture a quantity x of weed killer (in hundredss of liters) is given by C(x) = x3 -2x2 + 8x + 50
There was also a credit to dividends payable of $100. : The closing entries show a debit to retained earnings of $350 and a credit to retained earnings of $750. There was also a credit to dividends payable of $100.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Business intelligence and data warehouses

Business Intelligence and Data Warehouses

  Consumerization of information technology

Analyze how the consumerization of Information Technology (IT) is creating challenges for both forensics departments and IT security in general.

  Discuss how determining milestones might add additional

Remember that milestones normally have no duration, so you must have tasks that will lead to completing the milestone.

  Human resources business processes

Currently several of their support departments are using manual processes and they wish to automate their accounting and human resources business processes.

  Initial value problem and plot its graph

Find the solution for the given initial value problem and plot its graph y"'-y"+y'-y=0; y(0)=2, y'(0)=-1, y"(0)=-2

  Command that will create matrix

1. Write the command that will create matrix A shown in the format below using colon operator for the first row,

  How can force diagrams be useful

Discuss the security issues of nonfunctional goals in relationship to the force diagram and tensions in the business enterprise. Describe and explain what a nonfunctional goal is. How can force diagrams be useful?

  Atmega128 is being used to monitor humidity inside test cham

Atmega128 is being used to monitor humidity inside test chamber 03. The device uses two sensors to have some fault tolerance. They are connected to ADC channels 0 and 1. The program uses the average and maximum error of the two values.

  Why is it that security mechanisms are still needed

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?

  Two argument integers and returns the operation

The over all program should ask user for two integer numbers (a, b) and target arithmetic operation (+,-,*./) and will print the result of the operation with a comment if the result produced is correct or not.

  Explain diagnosing and troubleshooting excel-based problems

How does versatility of Excel affect application support? Because of its versatility, write assumptions should be made when diagnosing and troubleshooting Excel-based problems?

  Engineering and engineering technology

Explain the differences between engineering and engineering technology? What aspects of engineering technology inspired you to choose this field? (write at least 2 paragraphs)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd