Twitter is becoming an increasingly popular platform used by financial analysts to monitor and forecast financial markets. In this paper we investigate the impact of the sentiments expressed in Twitter on the subsequent market movement, specifically the bitcoin exchange rate. This study is divided into two phases, the first phase is sentiment analysis, and the second phase is correlation and regression. We analyzed tweets associated with the Bitcoin in order to determine if the user’s sentiment contained within those tweets reflects the exchange rate of the currency. The sentiment of users over a 2-month period is classified as having a positive or negative sentiment of the digital currency using the proposed CNN-LSTM deep learning model. By applying Pearson's correlation, we found that the sentiment of the day (d) had a positive effect on the future Bitcoin returns on the next day (d+1). The prediction accuracy of the linear regression model for the next day's revenue was 78%.
Computer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. This study employs deep learning methods in conjunction with meta-heuristic algorithms and supervised machine-learning algorithms to perform an accurate diagnosis. Pre-trained convolutional neural networks (CNNs) or auto-encoder are used for feature extraction, whereas feature selection is performed using an ant colony optimization (ACO) algorithm. Ant colony optimization helps to search for the bes
... Show MoreA hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreWith its rapid spread, the coronavirus infection shocked the world and had a huge effect on billions of peoples' lives. The problem is to find a safe method to diagnose the infections with fewer casualties. It has been shown that X-Ray images are an important method for the identification, quantification, and monitoring of diseases. Deep learning algorithms can be utilized to help analyze potentially huge numbers of X-Ray examinations. This research conducted a retrospective multi-test analysis system to detect suspicious COVID-19 performance, and use of chest X-Ray features to assess the progress of the illness in each patient, resulting in a "corona score." where the results were satisfactory compared to the benchmarked techniques. T
... Show MoreThis study aims at examining and confirming the patterns of phenetic relationships and the levels of variations within and among the species of Lotus L., 1753 in Egypt by using morphometric analysis techniques. We have evaluated 24 morphological characters from about 300 herbarium specimens representing 19 species of Lotus that are currently recognized. Based on numerical analyses of macromorphological characters (cluster analysis, principal coordinate analysis and principal component analysis), 19 species of Lotus were recognized from Egypt. These species were clustered in six species-specific groups: (I) Lotus halophilus Boiss. & Spruner, L. angustissimus L., L. glinoides Delile and L. schimperi Steud. ex Boiss., (II) Lotus glaber
... Show MoreABSTRACT This study closely investigates the elements of Sigmund Freud’s theory “The Uncanny” in one of Larson’s most famous novels. Although the novel touches upon racial issues, the study explores the mysterious relationship between Irene and Clare based on the main features of Freud’s “The Uncanny,” which are represented by hidden sexual desire, envy, supernatural power, and double characters. The aspect of the sexual desire is indicated in the novel by sexual undertones expressed by Irene towards Clare’s physical features. Envy in the novel is expressed by Irene who shows resentful longing aroused by Clare’s possessions and qualities due to her passing to the white community. The aspect of omnipotence of thoughts is in
... Show MoreFrustrated Total Internal Reflection FTIR phenomenon is manifested employing Newton‟s rings setup generated via a coherent light beam of a laser diode ( . All concentric bright and dark rings, except the central bright spot, were noticed to recede (disappear) when the incident angle exceeded the critical angle of 41o.
It was also shown that the current setup has proven its applicability for other tests and can give convenient results that conform with theory. Neither the concept nor the design is beyond what can be realized in an undergraduate laboratory. However, technical improvements in mounting the prism - lens may be advisable. As an extension of the experiments, the effect can be studied using hollow prism filled with liquids
Almost human societies are not void of poverty, as the latter accompanied the emergence of humanity, and it, thus, represents an eternal problem. To advance an individual's reality and raise the level of the poor social classes, social security networks have been established. Such networks operate in society following social systems and laws to provide food, and material support. Besides, such networks help to rehabilitate the individual academically and vocationally. They empower vulnerable groups through the establishment of courses and workshop, provide (conditional) subsidies related to the health and educational aspects in order to achieve the sustainable development goals of (2030), and apply developmental roles of social safety ne
... Show MoreWe refer in this research into linguistic binaries, try rounding of simiaei news analysis. It is known that there are branches of Linguistics called social Linguistics, divided into communicative Linguistics and media. Perhaps the best justification for the inclusion of a new curriculum in media studies is a semiotic analysis of the news. I›ve turned the speech, language and communication studies in relation to different disciplines, many research projects, and returned only old curriculum, speed shift in thought, proportional to the revolution in information and communication technology, for reality imposed on the entire world, researchers are the first affected by this enormous humanitarian Almanza. Alsimiaaeon still shy away from an
... Show MoreIn this paper, the linear system of Fredholm integral equations is solving using Open Newton-Cotes formula, which we use five different types of Open Newton-Cotes formula to solve this system. Compare the results of suggested method with the results of another method (closed Newton-Cotes formula) Finally, at the end of each method, algorithms and programs developed and written in MATLAB (version 7.0) and we give some numerical examples, illustrate suggested method
The bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show More