Essays about: "thesis for artificial neural network in trade"

Showing result 6 - 8 of 8 essays containing the words thesis for artificial neural network in trade.

  1. 6. IoT for fresh water quality monitoring

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Duarte Maher; [2018]
    Keywords : IoT; Machine Learning; Water Quality Monitoring; iWater; IoT; Maskininlärning; Vattenkvalitetsövervakning; iWater;

    Abstract : Water is one of the most important resources in the world. It has direct impact on the daily life ofmankind and sustainable development of society. Water quality affects biological life and has to obeystrict regulations. Traditional water quality assurance methods, used today, involve manual samplingfollowed by laboratory analysis. READ MORE

  2. 7. The Influence of Bitcoin on Ethereum Price Predictions

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : André Caldegren; [2018]
    Keywords : bitcoin; ethereum; crypto; cryptocurrency; predictions; price predictions; bitcoin predictions; thereum predictions; machine learning; neural networks; rnn; lstm;

    Abstract : Cryptocurrencies are a cryptography based technology, that has increased massively in popularity in recent years. These currencies are traded on markets that specialize in cryptocurrency trade. There, you can trade one cryptocurrency for another, or buy one with real world money. READ MORE

  3. 8. Decision Making for Finding an Adequate : Providing trade-off between Performance and Security

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : Sergey Smirnov; [2007]
    Keywords : Adaptive security; adequate security level; trade-off between performance and security;

    Abstract : The new opportunities that come with the Internet as a worldwide network bring the new threats and risks for private, institutional and corporate users. Therefore, it is important to integrate the security mechanisms into a network environment. READ MORE