Applied machine learning techniques for clusterisation of financial time series

On relevance of technical analysis. Pattern recognition. Technical indicators. Data processing. Feature extraction. Kolmogorov-Smirnov test. Algorithm and software. Model configuration. Clustering performance on simulated data, brutе force algorithm.

Подобные документы

  • Higher-level programming language (commonly C, C++, or java) and familiarity with the fundamentals of data structures and algorithms. The study of the theory of computation. A hierarchy of formal language and automata. Limits of algorithmic computation.

    книга, добавлен 08.03.2014

  • The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

    статья, добавлен 08.02.2013

  • Kompyutinhove storage as one of the paradigms of periodic training neural networks through the use of rekurrentnoyi other indicators. The new approach, which focuses on learning fuzzy systems thatand its parameters are adapting their structure online.

    статья, добавлен 20.01.2017

  • Значение понятия "скрытые знания". Определение сути методов Data mining. Язык запросов к базам данных. Выявление возможностей для создания, изменения и извлечения хранимых данных. Data mining и искусственный интеллект. Задачи кластеризации и ассоциации.

    контрольная работа, добавлен 14.04.2014

  • Огляд досвіду впровадження технології Big Data в електронній дистрибуції та бізнес-аналітиці. Означення перспективних проєктів в книжковій індустрії, що базуються на цій технології. Спрощення процесів управління галуззю при упровадженні Big Data.

    статья, добавлен 15.04.2024

  • Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.

    статья, добавлен 27.01.2019

  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие, добавлен 08.03.2014

  • Electroencephalography and Magnetoencephalography provide insight into neuronal processes in the brain in a real-time scale. This renders these modalities particularly interesting for online analysis methods to visualize brain activity in real-time.

    статья, добавлен 23.06.2016

  • Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.

    статья, добавлен 19.03.2024

  • Linguistic and numerical auxiliary quantities and the definition of auxiliary functions and a system of rules through them. The implementation of the proposed decision algorithm as a result of modeling processes that are performed by the operator.

    статья, добавлен 25.10.2016

  • Development of an algorithm for obtaining a video depth map using the method of image division. Using web cameras to determine the object and calculate the distance to it. Development of software code for streaming video of the experimental setup.

    статья, добавлен 13.07.2022

  • Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.

    дипломная работа, добавлен 23.09.2018

  • Поняття інтелектуального аналізу даних (Data Mining), їх розвідка. Виникнення і розвиток Data Mining. Сутність та мета технології. Етапи розв'язування задачі класифікації та регресії. Пошук асоціативних правил. Особливості кластеризації об'єктів.

    реферат, добавлен 09.07.2017

  • Identify and select fragments of developed software products and applied technologies that contribute to the formation and development of professional competencies of professionals. Reviews software applications and fragments of their software code.

    статья, добавлен 16.08.2023

  • Технологии извлечения знаний Data Mining. Сравнение формулировок задач при использовании методов OLAP и Data Mining. Выявление мошенничества с кредитными карточками. Подходы к определению понятия "информационная система", многообразие элементов системы.

    контрольная работа, добавлен 19.08.2011

  • The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.

    дипломная работа, добавлен 31.10.2016

  • Password authentication is one of essential services in our life for protecting data. In other words, we may loose a lot of money, sensitive data, if passwords leak out. We have to understand clearly what is important for creating or changing passwords.

    статья, добавлен 23.06.2016

  • Методи аналізу даних за допомогою інформаційних систем. Консолідація та візуалізація даних в задачах інформаційного бізнесу. Задача асоціації в Data Mining. Кластеризація алгоритмів типу k-means та g-means. Прогнозуючі та класифікаційні моделі.

    курсовая работа, добавлен 06.02.2012

  • Определение термина Big Data, разработка соответствующих технологий и исследования в этой области, позиционирование в прошлом и настоящем. Социализация информационных технологий. Анализ использования Big Data в социальных сетях, проблемы и перспективы.

    курсовая работа, добавлен 26.06.2022

  • Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.

    статья, добавлен 12.05.2024

  • The problem of the development of mathematical support to automate the process of diagnostic and recognizing model construction by precedents. The software realizing proposed transformations and indicators characterizing their properties was developed.

    статья, добавлен 29.07.2016

  • Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.

    диссертация, добавлен 27.01.2015

  • Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.

    статья, добавлен 22.12.2016

  • A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.

    статья, добавлен 20.01.2017

  • Consideration of the state of US policy in the area of private and public encryption of data. An analysis of the legality of the use by the state of private information about their citizens fininsah. The study of features the standard encryption.

    книга, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.