Search Results - paulo+shakarian

10 Results

Sort By:

  1. Background Intense competition in the stock market results in a very efficient marketplace, where finding such repeatable predictive patterns is increasingly difficult. The field of technical analysis seeks to find repeatable patterns in price movements for a given asset to gain a predictive advantage in assessing its future price in the short term. As...
    Published: 2/13/2025
    Keywords(s):  
  2. In the realm of natural language processing, large language models (LLMs) have emerged as powerful tools capable of understanding and generating human-like text. In terms of accuracy, LLMs are known to have performance issues, specifically when reasoning tasks are involved. And despite their advancements, LLMs often face challenges when tasked with...
    Published: 2/13/2025
  3. There has been a rise in security breaches over the past few years, prompting an increasing need to mine insights from external discussion and social media platforms to raise alerts of possible attacks that might cater to specific industries. The dark web is one source of information on the internet where users can share information on software vulnerabilities...
    Published: 2/13/2025
  4. ­Background Modern risk assessment may leverage various computing technologies to efficiently predict threats and associated risk. However, conventional risk assessment analysis does not consider unnatural disasters and other unforeseen events that can break down common modeling structure. For example, cyberattacks are generally perpetrated by individuals...
    Published: 2/23/2023
    Keywords(s):  
  5. ­Background The ability to traverse the internet with complete anonymity provides online platforms for illegal activities such as credit card fraud, identity theft, and leaks of sensitive information. One of the most prevalent cyber environments that has emerged over the last decade and enabled criminality are dark web forums, since they include...
    Published: 2/13/2025
    Keywords(s):  
  6. Malicious software, or malware, is a type of coded program designed to damage/hack computer systems. Often, malware disables a user’s computer control, consequently leaving a user’s sensitive information vulnerable. Even though various types of firewall, anti-virus, and network security software all serve as layers of defense, they only...
    Published: 2/13/2025
    Keywords(s):  
  7. Combat groups like the Islamic State of Iraq and al-Sham (ISIS) have taken the lives of thousands as they attempt to gain control of more cities. In order to stop ISIS’s oppression and tyranny, it is necessary to determine their method of military operation. Therefore, there is a need to create a model that accurately depicts and simulates the...
    Published: 2/23/2023
    Keywords(s): Data Mining
  8. Missing person cases have been on the rise in the United States for the past twenty years. Currently, approximately 4,000 people go missing every day. Of those 4,000 cases, over 500 missing person cases go unsolved per day. Furthermore, many of these missing person cases are associated with human trafficking. By utilizing software tools, resources can...
    Published: 2/13/2025
  9. Gang violence in the United States accounts for 20 to 50 percent of homicides in many major cities each year. Law enforcement have existing data on many of these groups, such as the underlying social network structure. This information has previously proven useful in enabling smart policing tactics and improving law enforcement's understanding of...
    Published: 2/13/2025
    Keywords(s): Law Enforcement
  10. In social media, the term “viral” refers to when a piece of information (microblog, photograph, video, link, etc.) starts to spread in a social network and increases in popularity by an order-of-magnitude. Much work is currently being done to better understand the patterns and implications of this new phenomenon. Previous studies have devised...
    Published: 2/13/2025

Search Inventions

Looking for a technology or invention to commercialize? Arizona State University has more than 300 technologies available for licensing. Start your search here or submit your own invention.