Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Android SDK (1)
- Android Studio (1)
- Back-testing (1)
- Big Data (1)
- Blindness (1)
-
- Chat application (1)
- Cloud burst (1)
- Container (1)
- Context (1)
- Context aware applications (1)
- Context aware data (1)
- Context aware services (1)
- Cyber terrorism (1)
- Data (1)
- Data Mining (1)
- Data driven applications (1)
- Data generation (1)
- Data science (1)
- Dataset (1)
- Deep Learning (1)
- Definition (1)
- Domain specific language (1)
- ETF (1)
- Facial recognition. (1)
- GPS (1)
- Google Firebase (1)
- Google Firebase: Android Studio (1)
- Governance (1)
- Infrastructure (1)
- Java (1)
Articles 1 - 14 of 14
Full-Text Articles in Entire DC Network
Towards High Performance Stock Market Prediction Methods, Warren M. Landis, Sangwhan Cha
Towards High Performance Stock Market Prediction Methods, Warren M. Landis, Sangwhan Cha
Other Student Works
Stock markets of today, and will continue to in the future, rely on the metrics of timeliness and efficiency to reach optimal profits. A way stock investors have continued to strive for the best of these two factors of the business is through the use of predictive machine learning systems to help aid in their decision making. However, among the many systems currently in use, it could be said that the myriad of data that they are based on may not be sufficient. In an effort to devise an ensemble learning predictive system that will utilize an array of big …
Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan
Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan
Other Student Works
Cloud computing is the development of distributed and parallel computing that seeks to provide a new model of business computing by automating services and efficiently storing proprietary data. Cloud bursting is one of the cloud computing techniques that adopts the hybrid cloud model which seeks to expand the resources of a private cloud through the integration with a public cloud infrastructure. In this paper, the viability of cloud bursting is experimented and an attempt to integrate AWS EC2 onto an Openstack cloud environment using the Openstack OMNI driver is conducted.
Sight Helper, Misael Uzcategui
Uprising Digital Cyber-Attacks And Stagnant Cyber Laws Worldwide, Rahul Parekh
Uprising Digital Cyber-Attacks And Stagnant Cyber Laws Worldwide, Rahul Parekh
Other Student Works
Cybersecurity is vast area for research with multiple domains. Any individual can focus on minimum topics for research and it becomes cumbersome to follow various tools and technique. In this research paper, I have tried to focus on digital cybersecurity crime and terrorism efforts by hackers however there are numerous ways to minimize the hacking activities. To reduce such attacks and understand the chronology, research paper will display research and understanding.
Chat Application With Distributed System, Shuyang Zhu
Chat Application With Distributed System, Shuyang Zhu
Other Student Works
This project created a web application for users to instantly communicate with each other. An the most important part of building a good chat application is focus on the data flow on web. This project spends a good amount of research to find the most appropriate technology for deliver the data flow, which is REST api for account management, WebSocket for text chat and WebRTC for video and audio and find the result pleasant.
A Study Over Registration Server System Simulation, Maolin Hang
A Study Over Registration Server System Simulation, Maolin Hang
Other Student Works
This paper is a continuous study of the registration server system using a previous created real-time simulation application for my working product- T-Mobile Digits’ registration server system - an Enterprise-level solution ensembles Skype for Business, but with a sizable testing user pool.
As a standard system design normally includes the hardware infrastructure, computational logics and its own assigned rules/configures, and as all the complex system, a well-set server structure is the kernel for no matter testing or commercial purpose. The challenges are real and crucial for both business success besides the concerns of access capability and security. It will begin …
Effective Smart Video Survillance And Alertinng, Kranthikumar Putta
Effective Smart Video Survillance And Alertinng, Kranthikumar Putta
Other Student Works
Machine learning models & AI are popular term in past couple of years. Almost every aspect on our daily life we are using these machine learning models & AI knowing or unknowing. The simple statement of this research paper is to prove reduction of human effort in camera surveillance by using machine learning models such as objection detection & facial recognition.
TensorFlow is leading open source tool developed and published by Google helps to build objection detection and facial recognition library. The code we about to develop can allow user to train model with his choice of images of objects …
Context Aware Data Generation Through Domain Specific Language, Caleb Druckemiller
Context Aware Data Generation Through Domain Specific Language, Caleb Druckemiller
Other Student Works
No abstract provided.
A Tool For Securities Analysis And Trading Strategy Back-Testing, Qiaosheng Yu
A Tool For Securities Analysis And Trading Strategy Back-Testing, Qiaosheng Yu
Other Student Works
The platform created in this project will help users to analyze stock/ETF performance, define and improve their asset allocation plans and trade ideas. Using real market data, user can do a deep dive into securities performance, historical correlation, risk and return. Furthermore, user can use the platform back test their trade ideas, modify the parameters, including percentage allocation, risk limits and rebalancing frequency, and create the best strategy which suits their risk/return criteria and long-term wealth management goals.
Human Activity Recognition & Mobily Path Prediction, Priya Patel
Human Activity Recognition & Mobily Path Prediction, Priya Patel
Other Student Works
Individual Mobility is the study that depicts how individuals move inside a region or system. As of late a few researches have been accomplished for this reason and there has been a flood in enormous informational accessible in individual developments. Most of these information’s are gathered from cellphone or potentially GPS with variable accuracy relying upon the distance from the tower. Enormous scope information, for example, cell phone follows are significant hotspot for urban modeling. The individual travel designs breakdown into a solitary likelihood distribution however despite the assorted variety of their travel history people follow basic reproducible examples. This …
Stock Investment Helper, Mingrui Xu
Evote – The Revolution Of Vote, Tianming Zhu
Evote – The Revolution Of Vote, Tianming Zhu
Other Student Works
This report focuses on independently developed applications that are primarily used to support group or group solutions. The tools used to develop this application include Android development tools, and Google Firebase development tools are also involved in the development process.
Deep Learning Framework Of Vehicle Detection And Tracking System, Rui Zhang
Deep Learning Framework Of Vehicle Detection And Tracking System, Rui Zhang
Other Student Works
In the last semester, I designed a system to detect and track vehicle system on the highway. The system is based on the public deep learning framework and utilize pre-trained model to implement the functions of this system. In this paper, I will use my own framework to implement this system. This try will help us better understand the details of deep learning framework. I will public the code of deep learning framework and make sure everyone can modify it.
This semester will focus on the researching of Naïve Convolutional Neural Networks. Neural networks are commonlyused for the analysis of …
Parts Of Speech Tagging: Rule-Based, Bao Pham
Parts Of Speech Tagging: Rule-Based, Bao Pham
Other Student Works
Parts of speech (POS) tagging is the process of assigning a word in a text as corresponding to a part of speech based on its definition and its relationship with adjacent and related words in a phrase, sentence, or paragraph. POS tagging falls into two distinctive groups: rule-based and stochastic. In this paper, a rule-based POS tagger is developed for the English language using Lex and Yacc. The tagger utilizes a small set of simple rules along with a small dictionary to generate sequences of tokens.