Search results
-
-
Title
-
APPLICATION OF COMPLEX ADAPTIVE SYSTEMS IN PORTFOLIO MANAGEMENT
-
Author
-
SU, ZHEYUAN
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology
-
Description
-
Simulation-based methods are becoming a promising research tool in financial markets. A general Complex Adaptive System can be tailored to different application scenarios. Based on the current research, we built two models that would benefit portf...
-
-
Title
-
Anatomy of a protest: Activism, people, social media and urban space
-
Author
-
Karduni, Alireza
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology, Social sciences--Research, Architecture
-
Description
-
The black lives matter movement has risen in response to social injustices in the African-American community in the United States, specifically concerned with police shootings and brutality. Similar to many modern movements in the age of informati...
-
-
Title
-
HYBRID COMPARATIVE PREDICTIVE MODELING
-
Author
-
Nawaz, Mohammad
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology
-
Description
-
In this research, a hybrid predictive model was proposed for the decision-making process. Predictive models can be built through the use of Machine Learning using different classifiers/algorithms to predict results as well as provide recommendatio...
-
-
Title
-
INTERACTION SUPPORT FOR INFORMATION FINDING AND COMPARATIVE ANALYSIS IN ONLINE VIDEO
-
Author
-
Xia, Jinyue
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology
-
Description
-
Current online video interaction is typically designed with a focus on straightforward distribution and passive consumption of individual videos. This "click play, sit back and watch" context is typical of videos for entertainment. However, there ...
-
-
Title
-
Software-Defined Cyber Agility for Active Cyber Defense
-
Author
-
Gillani, Syed Fida
-
Date Created
-
2017
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
The scale and sophistication of stealthy and persistent cyber-attacks like distributed denial-of-service (DDoS) and man-in-the-middle (MitM) have been rapidly increasing in recent years. There are fundamental Internet properties, attributed to the...