LEADER 04773nam 2200685 a 450 001 9910831080503321 005 20220808190904.0 010 $a1-119-19687-6 010 $a1-280-82215-5 010 $a9786610822157 010 $a0-470-11221-2 035 $a(CKB)1000000000356602 035 $a(EBL)287358 035 $a(OCoLC)476040410 035 $a(SSID)ssj0000203999 035 $a(PQKBManifestationID)11199588 035 $a(PQKBTitleCode)TC0000203999 035 $a(PQKBWorkID)10175408 035 $a(PQKB)10847128 035 $a(MiAaPQ)EBC287358 035 $a(CaSebORM)9780470086230 035 $a(EXLCZ)991000000000356602 100 $a20060731d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aModeling maximum trading profits with C++$b[electronic resource] $enew trading and money management concepts /$fValerii Salov 205 $a1st edition 210 $aHoboken, N.J. $cJ. Wiley & Sons, Inc.$dc2007 215 $a1 online resource (266 p.) 225 1 $aWiley trading series 300 $aDescription based upon print version of record. 311 $a0-470-08623-8 320 $aIncludes bibliographical references (p. [225]-228) and index. 327 $aModeling Maximum Trading Profits with C++; Contents; Preface; Acknowledgments; Chapter 1: Potential Profit as a Measure of Market Performance; PROFIT AND POTENTIAL PROFIT; PRICE FLOW AND C++; PARDO'S POTENTIAL PROFIT; CONCLUSIONS; Chapter 2: Potential Profit and Transaction Costs; WHAT IS A TRADING STRATEGY?; PROPERTIES OF POTENTIAL PROFIT STRATEGY; TRANSACTION COSTS; TRANSACTION COSTS AND C++; PROFIT-AND-LOSS FUNCTION; CONCLUSIONS; Chapter 3: R- and L-Algorithms for Maximum Profit Strategy; S-FUNCTION AND S-MATRIX; INTERVAL AND ITS BOUNDARIES 327 $aTHE BEST BUYING AND SELLING POINTS ON THE S-INTERVALPOLARITY OF S-INTERVALS; R-ALGORITHM; L-ALGORITHM; C++ IMPLEMENTATION; C++ PROGRAM EVALUATING POTENTIAL PROFIT; CONCLUSIONS; Chapter 4: Money Management and Discrete Nature of Trading; DENOMINATIONS; INDUCTION AND TRADING ACCOUNT SIZE; GROWTH FUNCTION AND OPTIMAL B; DISCRETE NATURE OF TRADING; CONCLUSIONS; Chapter 5: Money Management for Potential Profit Strategy; THE BEST ALLOCATION FRACTION FOR POTENTIAL PROFIT STRATEGY; SELF-FINANCING RESTRICTION; MINIMAL A; ACTIONS AND POSITIONS TEST4.CPP; THE FIRST AND SECOND P&L RESERVES 327 $aRULES FOR OFFSETTING POSITIONSCLASSES TRADE AND TRADES; CLASS POSITION; USING POSITION AND TRADES TEST5.CPP; CONCLUSIONS; Chapter 6: Best to Better; ALGORITHM FOR THE FIRST PROFIT-AND-LOSS RESERVE STRATEGY; ALGORITHM FOR THE SECOND P&L RESERVE STRATEGY; PROGRAM APPLYING THREE ALGORITHMS; CONCLUSIONS; Chapter 7: Direct Applications; ONLY IN THE PAST; SLEEPING BEAUTY; WAR AND PEACE; CONCLUSIONS; Chapter 8: Indicators Based on Potential Profit; PERFORMANCE MEASURES AND INDICATORS; STRATEGY EVALUATION; CONCLUSIONS; Chapter 9: Statistics of Trades and Potential Profit 327 $aSTATISTICAL PROPERTIES OF TRADESPROGRAM EVALUATING STRATEGY AND TRADES; CONCLUSIONS; Chapter 10: Comparing Markets; TIME FRAME AND PRICES; SELECTED CONTRACTS; DATA FILE FORMAT; RESULTS OF APPLICATION OF MAXPROF3 AND EVALUATE; MULTIMARKET POTENTIAL PROFIT ALGORITHMS; EPILOGUE; CONCLUSIONS; Bibliography and Sources; About the CD-ROM; INTRODUCTION; SYSTEM REQUIREMENTS; USING THE CD; WHAT'S ON THE CD; Index 330 $a""Mr. Salov has taken one of my favorite creations - Perfect Profit - and provided an expanded description of his interpretation of it and put it in your hands with the included software. Like I said fifteen years ago, Perfect Profit is an important tool for the trading system developer. See for yourself.""-Robert Pardo, President, Pardo Capital Limited ""A very in-depth reference for programmers that should serve well into the future. The code herein lends itself well to other syntactically similar programming languages such as Java, PHP, and C#.""-Ralph Vince The goal of trading 410 0$aWiley trading series. 606 $aInvestment analysis$xComputer programs 606 $aInvestments$xMathematical models 606 $aC++ (Computer program language) 606 $aFinancial engineering 615 0$aInvestment analysis$xComputer programs. 615 0$aInvestments$xMathematical models. 615 0$aC++ (Computer program language) 615 0$aFinancial engineering. 676 $a332.60113 676 $a332.602855362 700 $aSalov$b Valerii$f1960-$01668848 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910831080503321 996 $aModeling maximum trading profits with C++$94029726 997 $aUNINA LEADER 12183nam 22006975 450 001 9910882898403321 005 20250807135639.0 010 $a981-9747-27-9 024 7 $a10.1007/978-981-97-4727-6 035 $a(MiAaPQ)EBC31611825 035 $a(Au-PeEL)EBL31611825 035 $a(CKB)34168615400041 035 $a(DE-He213)978-981-97-4727-6 035 $a(EXLCZ)9934168615400041 100 $a20240823d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Computational Intelligence and Informatics $eProceedings of ICACII 2023 /$fedited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (430 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v993 311 08$a981-9747-26-0 327 $aIntro -- ICACII2023 Committee -- Foreword -- Preface -- Contents -- Editors and Contributors -- Optimizing Complex Challenges: Harnessing the Power of Genetic Algorithms and the Nelder-Mead Simplex Algorithm for Effective Problem Solving -- 1 Introduction -- 2 Overview of GA and NMA -- 2.1 Genetic Algorithm -- 2.2 Nelder-Mead Algorithm -- 3 Hybrid Genetic Algorithm with Nelder-Mead Simplex Algorithm (HGANM) -- 4 Benchmark Functions -- 4.1 Experimental Configuration -- 4.2 Result and Analysis -- 5 Real-Life Problems -- 5.1 Experimental Setup -- 5.2 Analysis and Outcome -- 6 Conclusion -- References -- State-of-the-Art Techniques and Evaluation Criteria for Mobile Application Offloading in Heterogeneous Networks: A Comprehensive Survey of Computation, Data, and Energy Offloading Approaches -- 1 Introduction -- 2 Background -- 2.1 Offloading Techniques -- 2.2 Literature Survey -- 2.3 Current Gaps in Research and Opportunities for Future Work -- 3 Conclusion -- References -- IDSSA: An Intrusion Detection System with Self-adaptive Capabilities for Strengthening the IoT Network Security -- 1 Introduction -- 1.1 Objectives of the Research -- 2 Related Works -- 3 Proposed System -- 3.1 NSL-KDD Dataset -- 3.2 Preprocessing -- 3.3 DNS and EAT -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Privacy and Security Aspects of Indian Population While Using Online Social Network: An Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Analysis -- 5 Conclusion -- References -- Digital HR Strategy in the Modern Business Environment of Ukraine in Conditions of Uncertainty -- 1 Introduction -- 2 Literature Review -- 3 Methodological Approach -- 4 Conducting the Research and the Results -- 5 Conclusion and Discussion -- References. 327 $aA Model for Quality Management in Industrial Products Based on Machine Learning and Image Processing Techniques -- 1 Introduction -- 2 Related Work -- 3 Our Work -- 3.1 Proposed Algorithm -- 3.2 Working Process -- 4 Conclusion -- References -- An Extensive Study on Financial Fraud Detection Using Artificial Intelligence-Based Models -- 1 Introduction -- 1.1 Overview to Big Data -- 1.2 Digital Banking -- 2 Data -- 2.1 Data Collection -- 2.2 Data Organization -- 2.3 Data Modality -- 3 Types of Financial Fraud -- 4 Financial Crime Compliance Risk -- 4.1 Identity Theft -- 4.2 Financial Declaration Fraud and Insurance Fraud -- 4.3 Anti-Money Laundering -- 4.4 Trafficking and Sanctions -- 5 Financial Fraud Finding Challenges and Future Instructions -- 5.1 Futures of Digital Banking -- 6 Conclusion -- References -- Exploring the State of the Art in Mobile Agent Computing: A Comparative Study of Adaptive Fault Tolerance, Security, Transaction, and Multicore Support -- 1 Introduction -- 2 Recent Techniques of Mobile Agent Computing -- 2.1 Lightweight Agent Platforms -- 2.2 Agent Migration Strategies -- 2.3 Context-Awareness -- 2.4 Security and Trust Management -- 2.5 Fault Tolerance and Resilience -- 2.6 Energy Efficiency -- 2.7 Machine Learning Integration -- 3 Comparative Table for Adaptive Fault Tolerant in the State of Art of Mobile Agent Computing: Security, Fault Tolerance, Transaction, and Multicore Support -- 4 Development of Mobile Agent Computing -- 4.1 Early Research -- 4.2 Platform Development -- 4.3 Agent Migration Strategies -- 4.4 Security and Trust Management -- 4.5 Application Development -- 4.6 Standardization Efforts -- 4.7 Performance Optimization -- 4.8 Context-Awareness and Intelligence -- 4.9 Mobile Agent Middleware -- 5 Conclusion -- References. 327 $aLeveraging Bidirectional Encoder Representations from Transformers (BERT) for Enhanced Sentiment Analysis -- 1 Introduction -- 2 Problem Statement -- 2.1 Exploring BERT-Driven Models Across Various Domains -- 3 BERT Architecture -- 4 Applications of BERT Techniques -- 5 Significance of BERT for Sentiment Analysis -- 6 Methodology for BERT in Sentiment Analysis -- 7 Conclusion -- References -- Securing the Future of Connected Cars: Investigating Vulnerabilities and Preventing Cyberattacks -- 1 Introduction -- 2 Literature Review -- 3 Types of Attacks -- 3.1 Malware Attacks -- 3.2 Wireless Attacks -- 4 Methods of Detecting and Preventing Attacks -- 5 Future Directions in Connected Car Security -- 6 Conclusion -- References -- Smart Surveillance Using OpenCV -- 1 Introduction -- 1.1 Objective -- 2 Related Work -- 2.1 A Hybrid Algorithm for Tracking and Counting Many Persons in Smart Surveillance -- 2.2 Performance Evaluation of the Intelligent Traffic Surveillance System's Object Detection Algorithm -- 2.3 Crowd Counting and Detection of Normal/Abnormal Events Using Multi-Person Tracking in a Smart Surveillance System -- 2.4 Raspberry Pi-Based IoT-Based Smart Surveillance and Security System -- 2.5 Intelligent Video Security Surveillance with Mobile Remote Control -- 3 Proposed Method -- 3.1 Structural Similarity Index Metric (SSIM) -- 3.2 Detecting Faces in the Frames -- 3.3 Look for Background Noise -- 3.4 Local Binary Pattern Histogram (LBPH) -- 4 Experimental Results -- 4.1 Feature 1-Monitor -- 4.2 Feature 2-Action Detection -- 4.3 Feature 3-Rectangle -- 4.4 Feature 4-Record -- 4.5 Feature 5-Identify -- 4.6 Feature 6-In and Out -- 5 Conclusion -- References -- Hyperspectral Band Selection Considering Spectral and Spatial Information -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 5 Proposed System. 327 $a5.1 System Specifications -- 5.2 Block Diagram -- 5.3 Methodology -- 6 Experimental Setup and Results -- 6.1 Results -- 7 Summary and Future Scope -- References -- Water Pumping Requirement Prediction in Irrigation System Using Internet of Things-Assisted Machine Intelligence-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Hybrid Method for Discovering DDOS Attack -- 1 Introduction -- 2 Objectives -- 3 Scope -- 4 Methodology -- 5 System Architecture -- 5.1 Algorithms -- 5.2 Data Set -- 5.3 Data Preprocessing -- 5.4 Results -- 6 Conclusions -- References -- A Novel Chaotic Map-Based Noise-Resistant Image Encryption Scheme for Medical Images -- 1 Introduction -- 2 Proposed Method -- 2.1 Encryption -- 3 Simulation Results -- 3.1 Encryption Efficiency Analysis -- 4 Conclusion -- References -- Survey of Attacks, Detection Techniques, and Evaluation Metrics in Wireless Sensor Networks -- 1 Introduction -- 1.1 Overview of Wireless Sensor Networks -- 2 Key Characteristics and Challenges -- 3 The Importance of Security in WSN -- 4 Different Protocols Used in WSN -- 5 Literature Review of Layerwise Attacks in WSN -- 6 Detection and Evaluation Metrics -- 7 Conclusion -- References -- Big Data's Ethical Frontier: Addressing Concerns in Data Acquisition and Analysis -- 1 Introduction -- 2 Ethical Challenges in Big Data -- 3 Cambridge Analytica Scandal -- 4 Aadhaar Data Leak -- 4.1 Ethical Concerns in Data Analysis and Regulatory Framework -- 5 Conclusion -- References -- Evaluating Security Risks and Protecting Conversational AI: An in-Depth Vulnerability Assessment and Security Testing of the ChatGPT Android Application -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusion -- References -- Neural Networks and GPU-Based Weed Detection Under Varying Light Illumination -- 1 Introduction. 327 $a2 Proposed System -- 2.1 Dataset and Process Flow -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 2.4 Methodology Used -- 2.5 Faster RCNN Algorithm -- 2.6 CNN Implementation Algorithm -- 3 Conclusion -- References -- Intelligent ECG-Based COVID-19 Diagnose Device Using CNN Deep Learning Approaches -- 1 Introduction -- 2 Literature Review -- 3 Techniques -- 3.1 Document Search -- 3.2 Search Methods -- 3.3 Restrictions -- 3.4 Presence in the Review Publication -- 4 Deep Convolution Transfer Learning via Neural Networks -- 4.1 Methodology -- 4.2 Different Abnormalities in ECG Images -- 5 Implementation -- 6 Conclusion -- References -- Analyzing Twitter Data Using Apache Hive-A Big Data Technology Exploration -- 1 Introduction -- 2 Big Data and Twitter Data Analysis -- 3 Experimental Setup -- 4 Conclusion -- References -- Detection of Phishing Websites Using Link Guard Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Problem Statement -- 4 Objectives -- 5 Existing Work -- 6 Proposed Work -- 6.1 Program Code -- 7 Methodology -- 8 Result -- 9 Conclusion -- References -- Forecasting Financial Commodities Using an Evolutionary Optimized Higher-Order Artificial Neural Network -- 1 Introduction -- 2 Method and Materials -- 2.1 Firefly Algorithm -- 2.2 Nelder-Mead Simplex Algorithm -- 2.3 Improved FFA -- 2.4 Pi-Sigma Neural Network -- 2.5 IFFA-PSNN Forecasting Model Training -- 3 Experimental Setup and Datasets -- 4 Results and Discussion -- 5 Conclusions -- References -- Plant Leaf Disease Classification Using GAN -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 4.1 Generative Adversarial Networks -- 4.2 VGG16 -- 4.3 Data Augmentation -- 4.4 Deep Learning -- 4.5 Data Preprocessing -- 5 Proposed System -- 5.1 System Specifications -- 5.2 Methodology -- 6 Functional Modules -- 7 Pseudocode. 327 $a8 Experimental Setup and Results. 330 $aThe book is a collection of best selected research papers presented at 2nd International Conference on Advances in Computational Intelligence and Informatics (ICACII 2023) organized by Anurag University, Hyderabad, India, during 22?23 December 2023. It includes innovative ideas and new research findings in the field of Computational Intelligence and Informatics which is useful for researchers, scientists, technocrats, academicians, and engineers. The areas included are high performance system, data science and analytics, computational intelligence and expert systems, cloud computing, computer network, and emerging technologies. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v993 606 $aComputational intelligence 606 $aMachine learning 606 $aBig data 606 $aTelecommunication 606 $aComputational Intelligence 606 $aMachine Learning 606 $aBig Data 606 $aCommunications Engineering, Networks 615 0$aComputational intelligence. 615 0$aMachine learning. 615 0$aBig data. 615 0$aTelecommunication. 615 14$aComputational Intelligence. 615 24$aMachine Learning. 615 24$aBig Data. 615 24$aCommunications Engineering, Networks. 676 $a006.3 700 $aChillarige$b Raghavendra Rao$01766049 701 $aDistefano$b Salvatore$01766050 701 $aRawat$b Sandeep Singh$01766051 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910882898403321 996 $aAdvances in Computational Intelligence and Informatics$94209766 997 $aUNINA