Applied machine learning techniques for clusterisation of financial time series

On relevance of technical analysis. Pattern recognition. Technical indicators. Data processing. Feature extraction. Kolmogorov-Smirnov test. Algorithm and software. Model configuration. Clustering performance on simulated data, brutе force algorithm.

Подобные документы

  • The weather forecast from a scientific point of view as one of the most complex problems of atmospheric physics. General characteristics of the big data forecasting system using the similarity method. Features of using big data for digitization.

    дипломная работа, добавлен 13.07.2020

  • The method and algorithm for realization of arithmetic operations in the system of remainder classes. The principal advantage of the suggested method. The algorithms for realization of arithmetic operations of summation, deduction and multiplication.

    статья, добавлен 14.07.2016

  • Development of the block diagram of the expert system in the context of automated control system for preparation of the Executive plan of agricultural works for the fields on which cultivated culture. The algorithm of the fuzzy inference Mamdani.

    статья, добавлен 25.12.2016

  • Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.

    книга, добавлен 09.04.2013

  • A new algorithm for parallel fault simulation of VLSI on multicore workstations with common memory was proposed. The results of computational experiments on ISCAS-89 benchmarks circuits, which are obtained on the 12-core workstation, were reported.

    статья, добавлен 28.02.2016

  • Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.

    книга, добавлен 08.03.2014

  • A Bayesian algorithm for determining the statistical accuracy factor, which can be used to estimate the accuracy characteristics of on-board automatic landing system on the stage of operational control. Solution of the statistical accuracy problem.

    статья, добавлен 26.06.2016

  • Применение методов классификации, моделирования и прогнозирования, основанных на применении деревьев решений, искусственных нейронных сетей, генетических алгоритмов, эволюционного программирования. Задачи и возможности Data Miner в Statistica 8.

    реферат, добавлен 19.12.2014

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    статья, добавлен 23.02.2016

  • Analysis of trends in search of directions and priorities for processing electronic documents on the Internet. Technical principles of building an information retrieval system and use of the linguistic processor and neural networks for solving problems.

    статья, добавлен 20.01.2017

  • The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.

    статья, добавлен 06.05.2018

  • Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.

    практическая работа, добавлен 13.02.2016

  • Linear Programming is concerned with maximizing or minimizing an equation over certain criteria. Mixed Integer Linear Programming: Techniques for Solving, Contribution of the Project, Solving Using Branch. Schematic for Branch and Cut algorithm.

    научная работа, добавлен 09.10.2012

  • Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.

    статья, добавлен 08.03.2014

  • Methods of traversal of high-level multi-threaded models formalized in the Use Case Map computer language. Advantages and disadvantages of this approach compared to existing ones. Generation character lines that are used to test software systems.

    статья, добавлен 28.02.2016

  • Higher-level programming language (commonly C, C++, or java) and familiarity with the fundamentals of data structures and algorithms. The study of the theory of computation. A hierarchy of formal language and automata. Limits of algorithmic computation.

    книга, добавлен 08.03.2014

  • The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

    статья, добавлен 08.02.2013

  • Kompyutinhove storage as one of the paradigms of periodic training neural networks through the use of rekurrentnoyi other indicators. The new approach, which focuses on learning fuzzy systems thatand its parameters are adapting their structure online.

    статья, добавлен 20.01.2017

  • Значение понятия "скрытые знания". Определение сути методов Data mining. Язык запросов к базам данных. Выявление возможностей для создания, изменения и извлечения хранимых данных. Data mining и искусственный интеллект. Задачи кластеризации и ассоциации.

    контрольная работа, добавлен 14.04.2014

  • Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.

    статья, добавлен 27.01.2019

  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие, добавлен 08.03.2014

  • Electroencephalography and Magnetoencephalography provide insight into neuronal processes in the brain in a real-time scale. This renders these modalities particularly interesting for online analysis methods to visualize brain activity in real-time.

    статья, добавлен 23.06.2016

  • Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.

    статья, добавлен 19.03.2024

  • Linguistic and numerical auxiliary quantities and the definition of auxiliary functions and a system of rules through them. The implementation of the proposed decision algorithm as a result of modeling processes that are performed by the operator.

    статья, добавлен 25.10.2016

  • Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.

    дипломная работа, добавлен 23.09.2018

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.