SlideShare a Scribd company logo
1 of 24
R BHARGAVAN 20W91A05J2
SRI RAM HARSHIT 20W91A05L7
SYED JAWED ALI JAFFER 20W91A05M2
VARUN KUMAR 20W91A05P2
VEMULA BHARGAVI 20W91A05P4
GROUP MEMBERS :
UNDER THE GUIDANCE OF
Mr. T SATISH
 Abstract
 Existing System
 Existing System Limitations
 Proposed System
 Advantages
 Software And Hardware Requirements
 Software Architecture[UML Diagrams]
 Modules
INDEX :
• Cryptocurrency is one of the famous financial state in all over the world which cause several type of risks that
effect on the intrinsic assessment of risk auditors.
• From the beginning the growth of cryptocurrency gives the financial business with the wide risk in term of
presentation of money laundering. In the institution of financial supports such as anti-money laundering, banks
and secrecy of banks proceed as a specialist of risk, manager of bank and officer of compliance which has a
provocation for the related transaction through cryptocurrency and the users who hide the illegal funds.
• In this study, the Hierarchical Risk Parity and unsupervised machine learning applied on the cryptocurrency
framework. The process of professional accounting in term of inherent risk connected with cryptocurrency
regarding the occurrence likelihood and statement of financial impact.
• Determining cryptocurrency risks comprehended to have a high rate of occurrence likelihood and the access of
private key which is unauthorized.
• The professional cryptocurrency experience in transaction cause the lower risk comparing the less experienced one.
• The Hierarchical Risk Parity gives the better output in term of returning the adjusted risk tail to get the better risk
management result.
• The result section shows the proposed model is robust to various intervals which are re-balanced and the co-
variance window estimation.
 The Existing System uses the strategy of Hierarchical Risk Parity (HRP) on the multi-asset multi-factor allocation
which achieves good results on tail risk. Moreover, It applies the same strategy for the individual stocks to comport
the fifty indexes of NIFTY.
 It compares different variants of Hierarchical Risk Parity (HERC and HCCA) and evaluates the performance. It uses
the mean-variance framework to analyze the portfolios of cryptocurrency based on the Markowitz optimization
with a high ratio.
 The proposed relationship between cryptocurrencies based on the highest frequency. The presented system gives
the output of useful marketing insights and gives the allowance to the agent to improve the system stability.
 It demonstrates the estimation error in terms of return estimation rather than a naively diversified
(1/N) strategy. Similarly, they used the model of Black Litterman based on the variance constraints to
support the sophisticated portfolio technique for estimation control of the simple methods to
manage the cryptocurrency.
 It Applies the wavelet-based analysis for cryptocurrency multi-scale dynamic interdependence
between the liquid cryptocurrencies to count the trader’s and investors’ heterogeneous behavior. It
Compares the different rules of trading in terms of average oscillators to break out the range of
trading strategies.
 If an unauthorized party gets any access to the private key then all the cryptocurrency is stolen.
 Misrepresentation of the private key of an entity.
 The cryptocurrency contains the delay of transactions at the end of the period. It becomes difficult to record
the conditions and events for financial purposes.
 The transactions of cryptocurrency get recorded from an entity that has no identification possibility based on
the anonymity of the transactions in the blockchain.
 Sending the incorrect address from the entity which is not possible for recovery from cryptocurrency.
 Using the Hierarchical Risk Parity for the cryptocurrency portfolio based on the usage of machine
learning Algorithms
 Decision Tree Classifier
 Naïve Bayes
 SVM (Support Vector Machine)
 Logistic Regression
 The proposed system can examine professional accounting based on the associated risk of
cryptocurrency and the impact that is expected from the financial statements.
 Finding the intrinsic risks that are correlated negatively in the cryptocurrency.
 Ranking the exchange level control risk based on the likelihood evaluation.
 Finding the highest likelihood risk of the determined cryptocurrency.
 The proposed system implements a graph-based theory and using the
machine learning Technique’s like (Decision Tree Classifier, Naïve
Bayes, SVM , Logistic Regression the proposed system is processing in
the following way.
- Clustering datasets.
- Recursive bisection on datasets.
- Quasi-diagonalization on datasets
Operating system : Windows 7 Ultimate.
Coding Language : Python.
Front-End : Python.
Back-End : Django-ORM
Designing : HTML, CSS, JavaScript.
Data Base : MySQL (WAMP Server)
• Processor : Pentium –IV
• RAM : 4 GB (min)
• Hard Disk : 20 GB
• Keyboard : Standard Windows Keyboard
• Mouse : Two or Three Button Mouse
• Monitor : SVGA
UML Diagrams:
 UML stands for Unified Modeling Language. UML is a standardized general-purpose modeling language in the field
of object-oriented software engineering.
 The standard is managed, and was created by, the Object Management Group.
 The goal is for UML to become a common language for creating models of object-oriented computer software.
 In its current form UML is comprised of two major components: a Meta-model and a notation.
 In the future, some form of method or process may also be added to; or associated with, UML.
 The Unified Modeling Language is a standard language for specifying, Visualization, Constructing and documenting
the artifacts of software system, as well as for business modeling and other non-software systems.
 The UML is a very important part of developing objects-oriented software and the software development process. The
UML uses mostly graphical notations to express the design of software projects.
GOALS:
The Primary goal in the design of the UML are as follows:
 Provide users a ready-to-use, expressive visual modeling Language so that they can develop and exchange meaningful
models.
 Provide extendibility and specialization mechanisms to extend the core concepts.
 Be independent of particular programming languages and development process.
 Provide a formal basis for understanding the modeling language.
 Encourage the growth of OO tools market.
 Support higher level development concepts such as collaborations, frameworks, patterns and components.
 Integrate best practices.
 A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram defined by and created
from a Use-case analysis.
 Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors, their goals
(represented as use cases), and any dependencies between those use cases.
 The main purpose of a use case diagram is to show what system functions are performed for which actor. Roles of the
actors in the system can be depicted.
opload osh face dataset
precross dataset
bulid VGG _19 model
upload test data&predict osh
user
accuracy comparison graph
 In software engineering, a class diagram in the Unified Modeling Language (UML) is a type of static structure
diagram that describes the structure of a system by showing the system's classes, their attributes, operations (or
methods), and the relationships among the classes. It explains which class contains information.
 A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that shows how processes
operate with one another and in what order. It is a construct of a Message Sequence Chart.
 Sequence diagrams are sometimes called event diagrams, event scenarios, and timing diagrams.
user dataset
upload osh face dataset
preprocess dataset
bulid VGG 19 model
upload test data & predict osh
accuracy comparsion graph
 Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for
choice, iteration and concurrency.
 In the Unified Modeling Language, activity diagrams can be used to describe the business and operational step-by-
step workflows of components in a system.
 An activity diagram shows the overall flow of control.
user dataset
1: upload osh face dataset
2: preprocess dataset
3: bulid VGG 19 model
4: upload test data & predict osh
5: accuracy comparsion graph
:
 Scikit-learn provides a range of supervised and unsupervised learning algorithms via a
consistent interface in Python.
 It is licensed under a permissive simplified BSD license and is distributed under many
Linux distributions, encouraging academic and commercial use.
 It provides a wide range of machine learning algorithms, Such as :
•Logistic Regression
•Support Vector Machines (SVM)
•Decision Trees Classifier
•K-Nearest Neighbors
TensorFlow:
 TensorFlow is a free and open-source software library for dataflow and differentiable
programming across a range of tasks.
 It is a symbolic math library and is also used for machine learning applications such
as neural networks .
 TensorFlow uses a computation graph paradigm, where operations are
represented as nodes in a graph. This allows for efficient computation.
 It is known for its flexibility, scalability, and support for a wide range of machine
learning and deep learning tasks.
 NumPy is a general-purpose array-processing package. It provides a high-performance multidimensional array
object, and tools for working with these arrays.
 NumPy provides a large number of functions and operators that can be used to perform computations on
arrays. These operations are highly optimized and much faster than using loops over Python lists.
 NumPy arrays use less memory compared to Python lists, especially when dealing with large datasets
 NumPy has a powerful linear algebra library that allows you to perform various linear algebra operations like
matrix multiplication, decomposition, solving linear systems, etc..
 Besides its obvious scientific uses, NumPy can also be used as an efficient multi-dimensional container of
generic data.
 Arbitrary data-types can be defined using NumPy which allows NumPy to seamlessly and speedily integrate
with a wide variety of databases.
 Pandas is an open-source Python Library providing high-performance data manipulation and analysis tool
using its powerful data structures.
 Pandas provides a wide range of functions to clean and preprocess data. This includes handling missing
values, dealing with duplicates, transforming data, and more.
 Pandas is designed for memory-efficient data storage and operations. It's optimized for performance, making
it suitable for handling large datasets
 Using Pandas, we can accomplish five typical steps in the processing and analysis of data, regardless of the
origin of data load, prepare, manipulate, model, and analyze.
 Python with Pandas is used in a wide range of fields including academic and commercial domains including
finance, economics, Statistics, analytics, etc.
ml mini project (1).pptx

More Related Content

Similar to ml mini project (1).pptx

CORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSIS
CORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSISCORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSIS
CORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSISijseajournal
 
Proceedings of the 2015 Industrial and Systems Engineering Res.docx
Proceedings of the 2015 Industrial and Systems Engineering Res.docxProceedings of the 2015 Industrial and Systems Engineering Res.docx
Proceedings of the 2015 Industrial and Systems Engineering Res.docxwkyra78
 
ekshitha rev 2 (1).pptx
ekshitha rev 2 (1).pptxekshitha rev 2 (1).pptx
ekshitha rev 2 (1).pptxAbdulsyed37
 
Imtiaz khan data_science_analytics
Imtiaz khan data_science_analyticsImtiaz khan data_science_analytics
Imtiaz khan data_science_analyticsimtiaz khan
 
RESUME SCREENING USING LSTM
RESUME SCREENING USING LSTMRESUME SCREENING USING LSTM
RESUME SCREENING USING LSTMIRJET Journal
 
MultiObjective(11) - Copy
MultiObjective(11) - CopyMultiObjective(11) - Copy
MultiObjective(11) - CopyAMIT KUMAR
 
The Systems Development Life Cycle
The Systems Development Life CycleThe Systems Development Life Cycle
The Systems Development Life CycleCrystal Torres
 
System Structure for Dependable Software Systems
System Structure for Dependable Software SystemsSystem Structure for Dependable Software Systems
System Structure for Dependable Software SystemsVincenzo De Florio
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
Overview Of System Development Life Cycle (SDLC)
Overview Of System Development Life Cycle (SDLC)Overview Of System Development Life Cycle (SDLC)
Overview Of System Development Life Cycle (SDLC)Nicole Savoie
 
A Review of Agent-Oriented Development Methodologies and Programming Language...
A Review of Agent-Oriented Development Methodologies and Programming Language...A Review of Agent-Oriented Development Methodologies and Programming Language...
A Review of Agent-Oriented Development Methodologies and Programming Language...Waqas Tariq
 
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...AIRCC Publishing Corporation
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionIRJET Journal
 

Similar to ml mini project (1).pptx (20)

DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMSDEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
 
CORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSIS
CORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSISCORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSIS
CORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSIS
 
Proceedings of the 2015 Industrial and Systems Engineering Res.docx
Proceedings of the 2015 Industrial and Systems Engineering Res.docxProceedings of the 2015 Industrial and Systems Engineering Res.docx
Proceedings of the 2015 Industrial and Systems Engineering Res.docx
 
ekshitha rev 2 (1).pptx
ekshitha rev 2 (1).pptxekshitha rev 2 (1).pptx
ekshitha rev 2 (1).pptx
 
Imtiaz khan data_science_analytics
Imtiaz khan data_science_analyticsImtiaz khan data_science_analytics
Imtiaz khan data_science_analytics
 
RESUME SCREENING USING LSTM
RESUME SCREENING USING LSTMRESUME SCREENING USING LSTM
RESUME SCREENING USING LSTM
 
MultiObjective(11) - Copy
MultiObjective(11) - CopyMultiObjective(11) - Copy
MultiObjective(11) - Copy
 
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATIONONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
 
PRELIM-Lesson-2.pdf
PRELIM-Lesson-2.pdfPRELIM-Lesson-2.pdf
PRELIM-Lesson-2.pdf
 
The Systems Development Life Cycle
The Systems Development Life CycleThe Systems Development Life Cycle
The Systems Development Life Cycle
 
System Structure for Dependable Software Systems
System Structure for Dependable Software SystemsSystem Structure for Dependable Software Systems
System Structure for Dependable Software Systems
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Overview Of System Development Life Cycle (SDLC)
Overview Of System Development Life Cycle (SDLC)Overview Of System Development Life Cycle (SDLC)
Overview Of System Development Life Cycle (SDLC)
 
Poster Vensim Repast
Poster Vensim RepastPoster Vensim Repast
Poster Vensim Repast
 
Atva05
Atva05Atva05
Atva05
 
Final
FinalFinal
Final
 
Ooad quest and ans
Ooad quest and ansOoad quest and ans
Ooad quest and ans
 
A Review of Agent-Oriented Development Methodologies and Programming Language...
A Review of Agent-Oriented Development Methodologies and Programming Language...A Review of Agent-Oriented Development Methodologies and Programming Language...
A Review of Agent-Oriented Development Methodologies and Programming Language...
 
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing Detection
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

ml mini project (1).pptx

  • 1. R BHARGAVAN 20W91A05J2 SRI RAM HARSHIT 20W91A05L7 SYED JAWED ALI JAFFER 20W91A05M2 VARUN KUMAR 20W91A05P2 VEMULA BHARGAVI 20W91A05P4 GROUP MEMBERS : UNDER THE GUIDANCE OF Mr. T SATISH
  • 2.  Abstract  Existing System  Existing System Limitations  Proposed System  Advantages  Software And Hardware Requirements  Software Architecture[UML Diagrams]  Modules INDEX :
  • 3. • Cryptocurrency is one of the famous financial state in all over the world which cause several type of risks that effect on the intrinsic assessment of risk auditors. • From the beginning the growth of cryptocurrency gives the financial business with the wide risk in term of presentation of money laundering. In the institution of financial supports such as anti-money laundering, banks and secrecy of banks proceed as a specialist of risk, manager of bank and officer of compliance which has a provocation for the related transaction through cryptocurrency and the users who hide the illegal funds. • In this study, the Hierarchical Risk Parity and unsupervised machine learning applied on the cryptocurrency framework. The process of professional accounting in term of inherent risk connected with cryptocurrency regarding the occurrence likelihood and statement of financial impact. • Determining cryptocurrency risks comprehended to have a high rate of occurrence likelihood and the access of private key which is unauthorized.
  • 4. • The professional cryptocurrency experience in transaction cause the lower risk comparing the less experienced one. • The Hierarchical Risk Parity gives the better output in term of returning the adjusted risk tail to get the better risk management result. • The result section shows the proposed model is robust to various intervals which are re-balanced and the co- variance window estimation.
  • 5.  The Existing System uses the strategy of Hierarchical Risk Parity (HRP) on the multi-asset multi-factor allocation which achieves good results on tail risk. Moreover, It applies the same strategy for the individual stocks to comport the fifty indexes of NIFTY.  It compares different variants of Hierarchical Risk Parity (HERC and HCCA) and evaluates the performance. It uses the mean-variance framework to analyze the portfolios of cryptocurrency based on the Markowitz optimization with a high ratio.  The proposed relationship between cryptocurrencies based on the highest frequency. The presented system gives the output of useful marketing insights and gives the allowance to the agent to improve the system stability.
  • 6.  It demonstrates the estimation error in terms of return estimation rather than a naively diversified (1/N) strategy. Similarly, they used the model of Black Litterman based on the variance constraints to support the sophisticated portfolio technique for estimation control of the simple methods to manage the cryptocurrency.  It Applies the wavelet-based analysis for cryptocurrency multi-scale dynamic interdependence between the liquid cryptocurrencies to count the trader’s and investors’ heterogeneous behavior. It Compares the different rules of trading in terms of average oscillators to break out the range of trading strategies.
  • 7.  If an unauthorized party gets any access to the private key then all the cryptocurrency is stolen.  Misrepresentation of the private key of an entity.  The cryptocurrency contains the delay of transactions at the end of the period. It becomes difficult to record the conditions and events for financial purposes.  The transactions of cryptocurrency get recorded from an entity that has no identification possibility based on the anonymity of the transactions in the blockchain.  Sending the incorrect address from the entity which is not possible for recovery from cryptocurrency.
  • 8.  Using the Hierarchical Risk Parity for the cryptocurrency portfolio based on the usage of machine learning Algorithms  Decision Tree Classifier  Naïve Bayes  SVM (Support Vector Machine)  Logistic Regression  The proposed system can examine professional accounting based on the associated risk of cryptocurrency and the impact that is expected from the financial statements.  Finding the intrinsic risks that are correlated negatively in the cryptocurrency.  Ranking the exchange level control risk based on the likelihood evaluation.  Finding the highest likelihood risk of the determined cryptocurrency.
  • 9.  The proposed system implements a graph-based theory and using the machine learning Technique’s like (Decision Tree Classifier, Naïve Bayes, SVM , Logistic Regression the proposed system is processing in the following way. - Clustering datasets. - Recursive bisection on datasets. - Quasi-diagonalization on datasets
  • 10. Operating system : Windows 7 Ultimate. Coding Language : Python. Front-End : Python. Back-End : Django-ORM Designing : HTML, CSS, JavaScript. Data Base : MySQL (WAMP Server)
  • 11. • Processor : Pentium –IV • RAM : 4 GB (min) • Hard Disk : 20 GB • Keyboard : Standard Windows Keyboard • Mouse : Two or Three Button Mouse • Monitor : SVGA
  • 12.
  • 13. UML Diagrams:  UML stands for Unified Modeling Language. UML is a standardized general-purpose modeling language in the field of object-oriented software engineering.  The standard is managed, and was created by, the Object Management Group.  The goal is for UML to become a common language for creating models of object-oriented computer software.  In its current form UML is comprised of two major components: a Meta-model and a notation.  In the future, some form of method or process may also be added to; or associated with, UML.  The Unified Modeling Language is a standard language for specifying, Visualization, Constructing and documenting the artifacts of software system, as well as for business modeling and other non-software systems.  The UML is a very important part of developing objects-oriented software and the software development process. The UML uses mostly graphical notations to express the design of software projects.
  • 14. GOALS: The Primary goal in the design of the UML are as follows:  Provide users a ready-to-use, expressive visual modeling Language so that they can develop and exchange meaningful models.  Provide extendibility and specialization mechanisms to extend the core concepts.  Be independent of particular programming languages and development process.  Provide a formal basis for understanding the modeling language.  Encourage the growth of OO tools market.  Support higher level development concepts such as collaborations, frameworks, patterns and components.  Integrate best practices.
  • 15.  A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram defined by and created from a Use-case analysis.  Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors, their goals (represented as use cases), and any dependencies between those use cases.  The main purpose of a use case diagram is to show what system functions are performed for which actor. Roles of the actors in the system can be depicted.
  • 16. opload osh face dataset precross dataset bulid VGG _19 model upload test data&predict osh user accuracy comparison graph
  • 17.  In software engineering, a class diagram in the Unified Modeling Language (UML) is a type of static structure diagram that describes the structure of a system by showing the system's classes, their attributes, operations (or methods), and the relationships among the classes. It explains which class contains information.
  • 18.  A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that shows how processes operate with one another and in what order. It is a construct of a Message Sequence Chart.  Sequence diagrams are sometimes called event diagrams, event scenarios, and timing diagrams. user dataset upload osh face dataset preprocess dataset bulid VGG 19 model upload test data & predict osh accuracy comparsion graph
  • 19.  Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency.  In the Unified Modeling Language, activity diagrams can be used to describe the business and operational step-by- step workflows of components in a system.  An activity diagram shows the overall flow of control. user dataset 1: upload osh face dataset 2: preprocess dataset 3: bulid VGG 19 model 4: upload test data & predict osh 5: accuracy comparsion graph
  • 20. :  Scikit-learn provides a range of supervised and unsupervised learning algorithms via a consistent interface in Python.  It is licensed under a permissive simplified BSD license and is distributed under many Linux distributions, encouraging academic and commercial use.  It provides a wide range of machine learning algorithms, Such as : •Logistic Regression •Support Vector Machines (SVM) •Decision Trees Classifier •K-Nearest Neighbors
  • 21. TensorFlow:  TensorFlow is a free and open-source software library for dataflow and differentiable programming across a range of tasks.  It is a symbolic math library and is also used for machine learning applications such as neural networks .  TensorFlow uses a computation graph paradigm, where operations are represented as nodes in a graph. This allows for efficient computation.  It is known for its flexibility, scalability, and support for a wide range of machine learning and deep learning tasks.
  • 22.  NumPy is a general-purpose array-processing package. It provides a high-performance multidimensional array object, and tools for working with these arrays.  NumPy provides a large number of functions and operators that can be used to perform computations on arrays. These operations are highly optimized and much faster than using loops over Python lists.  NumPy arrays use less memory compared to Python lists, especially when dealing with large datasets  NumPy has a powerful linear algebra library that allows you to perform various linear algebra operations like matrix multiplication, decomposition, solving linear systems, etc..  Besides its obvious scientific uses, NumPy can also be used as an efficient multi-dimensional container of generic data.  Arbitrary data-types can be defined using NumPy which allows NumPy to seamlessly and speedily integrate with a wide variety of databases.
  • 23.  Pandas is an open-source Python Library providing high-performance data manipulation and analysis tool using its powerful data structures.  Pandas provides a wide range of functions to clean and preprocess data. This includes handling missing values, dealing with duplicates, transforming data, and more.  Pandas is designed for memory-efficient data storage and operations. It's optimized for performance, making it suitable for handling large datasets  Using Pandas, we can accomplish five typical steps in the processing and analysis of data, regardless of the origin of data load, prepare, manipulate, model, and analyze.  Python with Pandas is used in a wide range of fields including academic and commercial domains including finance, economics, Statistics, analytics, etc.