Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Entire DC Network

Towards High Performance Stock Market Prediction Methods, Warren M. Landis, Sangwhan Cha Oct 2020

Towards High Performance Stock Market Prediction Methods, Warren M. Landis, Sangwhan Cha

Other Student Works

Stock markets of today, and will continue to in the future, rely on the metrics of timeliness and efficiency to reach optimal profits. A way stock investors have continued to strive for the best of these two factors of the business is through the use of predictive machine learning systems to help aid in their decision making. However, among the many systems currently in use, it could be said that the myriad of data that they are based on may not be sufficient. In an effort to devise an ensemble learning predictive system that will utilize an array of big …


Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan Oct 2020

Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan

Other Student Works

Cloud computing is the development of distributed and parallel computing that seeks to provide a new model of business computing by automating services and efficiently storing proprietary data. Cloud bursting is one of the cloud computing techniques that adopts the hybrid cloud model which seeks to expand the resources of a private cloud through the integration with a public cloud infrastructure. In this paper, the viability of cloud bursting is experimented and an attempt to integrate AWS EC2 onto an Openstack cloud environment using the Openstack OMNI driver is conducted.


Sight Helper, Misael Uzcategui Apr 2020

Sight Helper, Misael Uzcategui

Other Student Works

No abstract provided.


Uprising Digital Cyber-Attacks And Stagnant Cyber Laws Worldwide, Rahul Parekh Apr 2020

Uprising Digital Cyber-Attacks And Stagnant Cyber Laws Worldwide, Rahul Parekh

Other Student Works

Cybersecurity is vast area for research with multiple domains. Any individual can focus on minimum topics for research and it becomes cumbersome to follow various tools and technique. In this research paper, I have tried to focus on digital cybersecurity crime and terrorism efforts by hackers however there are numerous ways to minimize the hacking activities. To reduce such attacks and understand the chronology, research paper will display research and understanding.


Chat Application With Distributed System, Shuyang Zhu Apr 2020

Chat Application With Distributed System, Shuyang Zhu

Other Student Works

This project created a web application for users to instantly communicate with each other. An the most important part of building a good chat application is focus on the data flow on web. This project spends a good amount of research to find the most appropriate technology for deliver the data flow, which is REST api for account management, WebSocket for text chat and WebRTC for video and audio and find the result pleasant.


A Study Over Registration Server System Simulation, Maolin Hang Apr 2020

A Study Over Registration Server System Simulation, Maolin Hang

Other Student Works

This paper is a continuous study of the registration server system using a previous created real-time simulation application for my working product- T-Mobile Digits’ registration server system - an Enterprise-level solution ensembles Skype for Business, but with a sizable testing user pool.

As a standard system design normally includes the hardware infrastructure, computational logics and its own assigned rules/configures, and as all the complex system, a well-set server structure is the kernel for no matter testing or commercial purpose. The challenges are real and crucial for both business success besides the concerns of access capability and security. It will begin …


Effective Smart Video Survillance And Alertinng, Kranthikumar Putta Apr 2020

Effective Smart Video Survillance And Alertinng, Kranthikumar Putta

Other Student Works

Machine learning models & AI are popular term in past couple of years. Almost every aspect on our daily life we are using these machine learning models & AI knowing or unknowing. The simple statement of this research paper is to prove reduction of human effort in camera surveillance by using machine learning models such as objection detection & facial recognition.

TensorFlow is leading open source tool developed and published by Google helps to build objection detection and facial recognition library. The code we about to develop can allow user to train model with his choice of images of objects …


Context Aware Data Generation Through Domain Specific Language, Caleb Druckemiller Apr 2020

Context Aware Data Generation Through Domain Specific Language, Caleb Druckemiller

Other Student Works

No abstract provided.


A Tool For Securities Analysis And Trading Strategy Back-Testing, Qiaosheng Yu Apr 2020

A Tool For Securities Analysis And Trading Strategy Back-Testing, Qiaosheng Yu

Other Student Works

The platform created in this project will help users to analyze stock/ETF performance, define and improve their asset allocation plans and trade ideas. Using real market data, user can do a deep dive into securities performance, historical correlation, risk and return. Furthermore, user can use the platform back test their trade ideas, modify the parameters, including percentage allocation, risk limits and rebalancing frequency, and create the best strategy which suits their risk/return criteria and long-term wealth management goals.


Human Activity Recognition & Mobily Path Prediction, Priya Patel Apr 2020

Human Activity Recognition & Mobily Path Prediction, Priya Patel

Other Student Works

Individual Mobility is the study that depicts how individuals move inside a region or system. As of late a few researches have been accomplished for this reason and there has been a flood in enormous informational accessible in individual developments. Most of these information’s are gathered from cellphone or potentially GPS with variable accuracy relying upon the distance from the tower. Enormous scope information, for example, cell phone follows are significant hotspot for urban modeling. The individual travel designs breakdown into a solitary likelihood distribution however despite the assorted variety of their travel history people follow basic reproducible examples. This …


Stock Investment Helper, Mingrui Xu Apr 2020

Stock Investment Helper, Mingrui Xu

Other Student Works

No abstract provided.


Evote – The Revolution Of Vote, Tianming Zhu Apr 2020

Evote – The Revolution Of Vote, Tianming Zhu

Other Student Works

This report focuses on independently developed applications that are primarily used to support group or group solutions. The tools used to develop this application include Android development tools, and Google Firebase development tools are also involved in the development process.


Deep Learning Framework Of Vehicle Detection And Tracking System, Rui Zhang Apr 2020

Deep Learning Framework Of Vehicle Detection And Tracking System, Rui Zhang

Other Student Works

In the last semester, I designed a system to detect and track vehicle system on the highway. The system is based on the public deep learning framework and utilize pre-trained model to implement the functions of this system. In this paper, I will use my own framework to implement this system. This try will help us better understand the details of deep learning framework. I will public the code of deep learning framework and make sure everyone can modify it.

This semester will focus on the researching of Naïve Convolutional Neural Networks. Neural networks are commonlyused for the analysis of …


Parts Of Speech Tagging: Rule-Based, Bao Pham Feb 2020

Parts Of Speech Tagging: Rule-Based, Bao Pham

Other Student Works

Parts of speech (POS) tagging is the process of assigning a word in a text as corresponding to a part of speech based on its definition and its relationship with adjacent and related words in a phrase, sentence, or paragraph. POS tagging falls into two distinctive groups: rule-based and stochastic. In this paper, a rule-based POS tagger is developed for the English language using Lex and Yacc. The tagger utilizes a small set of simple rules along with a small dictionary to generate sequences of tokens.