SlideShare a Scribd company logo
Algorithmic Trading
through Social Media
Analytics
By: Carson Aft, Andrew Angoyar,
Tom McBrearty, Danny Sanchez
Purpose
John Maynard Keynes believed predicting the
stock market was impossible without tapping
into the collective psyche.
As technology has become a more intimate
part of the everyday experience, it has become
feasible to quantify and qualify the minds of
men.
The Idea
As the volume of data grows, it can be
harnessed to understand both the sentiment
and the content of our society at large.
Through statistical and mathematical tools, the
exponential growth of information can be
realized into informed and nuanced decisions.
Hadoop
Simply put, the current framework to distribute
process this BIG DATA. Is made up of various
individual components
Distributed System
A distributed system is a collection of
independent computers that appears to its
users as a single coherent system.
Characteristics of Distributed
Systems
● Hides heterogeneity and internal workings
● Easy to expand or scale
● Continuous availability
● Layered design
Example from the Project
The Utilization
Multivariate regressions and statistical certainty
means that we can automate informed
decisions, even without human eyes ever
laying eyes on them (Automated Trading).
Future Research
Bibliography
1. Tanenbaum, A., & Steen, M. (n.d.).
Distributed systems: Principles and
paradigms (2nd ed.).

More Related Content

Similar to Algorithmic Trading Research

Beyond AI The Rise of Cognitive Computing as Future of Computing ChatGPT Anal...
Beyond AI The Rise of Cognitive Computing as Future of Computing ChatGPT Anal...Beyond AI The Rise of Cognitive Computing as Future of Computing ChatGPT Anal...
Beyond AI The Rise of Cognitive Computing as Future of Computing ChatGPT Anal...
ijtsrd
 
Cognitive Business: Where digital business meets digital intelligence
Cognitive Business: Where digital business meets digital intelligenceCognitive Business: Where digital business meets digital intelligence
Cognitive Business: Where digital business meets digital intelligence
IBM Watson
 
Principles of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine LearningPrinciples of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine Learning
Jerry Lu
 
Big Data- A creative approach
Big Data- A creative approachBig Data- A creative approach
Big Data- A creative approach
SayantiniBiswas
 
[REPORT PREVIEW] AI in the Enterprise
[REPORT PREVIEW] AI in the Enterprise[REPORT PREVIEW] AI in the Enterprise
[REPORT PREVIEW] AI in the Enterprise
Altimeter, a Prophet Company
 
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Amit Sheth
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van Tol
TalentEvent
 
PatternLanguageOfData
PatternLanguageOfDataPatternLanguageOfData
PatternLanguageOfDatakimErwin
 
Final Report.pdf
Final Report.pdfFinal Report.pdf
Final Report.pdf
NicholasThomsen2
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
Christine Astovasadourian
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
Vincent Bellamy
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
Christine Astovasadourian
 
Cognitive analytics: What's coming in 2016?
Cognitive analytics: What's coming in 2016?Cognitive analytics: What's coming in 2016?
Cognitive analytics: What's coming in 2016?
Francisco González Jiménez
 
Cognitive analytics what s coming in 2016
Cognitive analytics what s coming in 2016Cognitive analytics what s coming in 2016
Cognitive analytics what s coming in 2016
Ana Alves Sequeira
 
Cognitive analytics in 2016
Cognitive analytics in 2016 Cognitive analytics in 2016
Cognitive analytics in 2016
Alejandra Etxeberria
 
Cognitive analytics in 2016
Cognitive analytics in 2016Cognitive analytics in 2016
Cognitive analytics in 2016
Carlos Martin Hernandez
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
Eric Roselier
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
Mathieu Boucher
 
Cognitive analytics: what is coming in 2016?
Cognitive analytics: what is coming in 2016?Cognitive analytics: what is coming in 2016?
Cognitive analytics: what is coming in 2016?
Virginia Fernandez
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
Jeremy Dormand
 

Similar to Algorithmic Trading Research (20)

Beyond AI The Rise of Cognitive Computing as Future of Computing ChatGPT Anal...
Beyond AI The Rise of Cognitive Computing as Future of Computing ChatGPT Anal...Beyond AI The Rise of Cognitive Computing as Future of Computing ChatGPT Anal...
Beyond AI The Rise of Cognitive Computing as Future of Computing ChatGPT Anal...
 
Cognitive Business: Where digital business meets digital intelligence
Cognitive Business: Where digital business meets digital intelligenceCognitive Business: Where digital business meets digital intelligence
Cognitive Business: Where digital business meets digital intelligence
 
Principles of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine LearningPrinciples of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine Learning
 
Big Data- A creative approach
Big Data- A creative approachBig Data- A creative approach
Big Data- A creative approach
 
[REPORT PREVIEW] AI in the Enterprise
[REPORT PREVIEW] AI in the Enterprise[REPORT PREVIEW] AI in the Enterprise
[REPORT PREVIEW] AI in the Enterprise
 
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van Tol
 
PatternLanguageOfData
PatternLanguageOfDataPatternLanguageOfData
PatternLanguageOfData
 
Final Report.pdf
Final Report.pdfFinal Report.pdf
Final Report.pdf
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
 
Cognitive analytics: What's coming in 2016?
Cognitive analytics: What's coming in 2016?Cognitive analytics: What's coming in 2016?
Cognitive analytics: What's coming in 2016?
 
Cognitive analytics what s coming in 2016
Cognitive analytics what s coming in 2016Cognitive analytics what s coming in 2016
Cognitive analytics what s coming in 2016
 
Cognitive analytics in 2016
Cognitive analytics in 2016 Cognitive analytics in 2016
Cognitive analytics in 2016
 
Cognitive analytics in 2016
Cognitive analytics in 2016Cognitive analytics in 2016
Cognitive analytics in 2016
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
 
Cognitive analytics: what is coming in 2016?
Cognitive analytics: what is coming in 2016?Cognitive analytics: what is coming in 2016?
Cognitive analytics: what is coming in 2016?
 
Cognitive analytics 2016
Cognitive analytics 2016Cognitive analytics 2016
Cognitive analytics 2016
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Algorithmic Trading Research

  • 1. Algorithmic Trading through Social Media Analytics By: Carson Aft, Andrew Angoyar, Tom McBrearty, Danny Sanchez
  • 2. Purpose John Maynard Keynes believed predicting the stock market was impossible without tapping into the collective psyche. As technology has become a more intimate part of the everyday experience, it has become feasible to quantify and qualify the minds of men.
  • 3. The Idea As the volume of data grows, it can be harnessed to understand both the sentiment and the content of our society at large. Through statistical and mathematical tools, the exponential growth of information can be realized into informed and nuanced decisions.
  • 4.
  • 5. Hadoop Simply put, the current framework to distribute process this BIG DATA. Is made up of various individual components
  • 6.
  • 7. Distributed System A distributed system is a collection of independent computers that appears to its users as a single coherent system.
  • 8. Characteristics of Distributed Systems ● Hides heterogeneity and internal workings ● Easy to expand or scale ● Continuous availability ● Layered design
  • 10. The Utilization Multivariate regressions and statistical certainty means that we can automate informed decisions, even without human eyes ever laying eyes on them (Automated Trading).
  • 11.
  • 13. Bibliography 1. Tanenbaum, A., & Steen, M. (n.d.). Distributed systems: Principles and paradigms (2nd ed.).