How to Create Your First React Profile Page!

Creating a profile page in React is not only essential but also super fun! It lets your users view and manage their personal info in style. In this tutorial, we’re going to build a sleek profile page using some cool npm packages, including Avatarium for awesome profile pictures, React Router for smooth navigation, Axios for … Read more

Meet Rootstock Labs: HackerNoon Company of the Week

Another week, another Company of the Week newsletter! Every week, we feature an awesome tech brand from our tech company database, making its evergreen mark on the internet. This week, we are proud to present RootstockLabs – a key contributor to Rootstock, the first, biggest, and longest-lasting Bitcoin sidechain! RootstockLabs specializes in pioneering innovative solutions within … Read more

My Plan to Make a Million Dollars Writing Online

Everyone wants to make a million bucks online, but few actually do. Why? Because they’re too busy chasing shortcuts and gimmicks instead of building something real. Here’s my no-bullshit plan to actually make it happen, and yes, you can steal it. First, some background: I first heard the term ‘Creator Economy’ when a friend sent … Read more

Towards Automatic Satellite Images Captions Generation Using LLMs: References

:::info Authors: (1) Yingxu He, Department of Computer Science National University of Singapore {e0139128@u.nus.edu}; (2) Qiqi Sun, College of Life Sciences Nankai University {sunqiqi1018@gmail.com}. ::: Table of Links Abstract and Intro Methodology References References [1] Armen Aghajanyan, Bernie Huang, Candace Ross, Vladimir Karpukhin, Hu Xu, Naman Goyal, Dmytro Okhonko, Mandar Joshi, Gargi Ghosh, Mike Lewis, … Read more

Towards Automatic Satellite Images Captions Generation Using LLMs: Methodology

:::info Authors: (1) Yingxu He, Department of Computer Science National University of Singapore {e0139128@u.nus.edu}; (2) Qiqi Sun, College of Life Sciences Nankai University {sunqiqi1018@gmail.com}. ::: Table of Links Abstract and Intro Methodology References 2. Methodology In this section, we describe our proposed approach to automatically collect captions for remote sensing images by guiding LLMs to … Read more

Towards Automatic Satellite Images Captions Generation Using LLMs: Abstract & Introduction

:::info Authors: (1) Yingxu He, Department of Computer Science National University of Singapore {e0139128@u.nus.edu}; (2) Qiqi Sun, College of Life Sciences Nankai University {sunqiqi1018@gmail.com}. ::: Table of Links Abstract and Intro Methodology References Abstract Automatic image captioning is a promising technique for conveying visual information using natural language. It can benefit various tasks in satellite … Read more

The Future of AI in Finance

:::info Authors: (1) Xiao-Yang Liu, Hongyang Yang, Columbia University (xl2427,hy2500@columbia.edu); (2) Jiechao Gao, University of Virginia (jg5ycn@virginia.edu); (3) Christina Dan Wang (Corresponding Author), New York University Shanghai (christina.wang@nyu.edu). ::: Table of Links Abstract and 1 Introduction 2 Related Works and 2.1 Deep Reinforcement Learning Algorithms 2.2 Deep Reinforcement Learning Libraries and 2.3 Deep Reinforcement Learning … Read more

FinRL’s Implementation of DRL Algorithms for Stock Trading

:::info Authors: (1) Xiao-Yang Liu, Hongyang Yang, Columbia University (xl2427,hy2500@columbia.edu); (2) Jiechao Gao, University of Virginia (jg5ycn@virginia.edu); (3) Christina Dan Wang (Corresponding Author), New York University Shanghai (christina.wang@nyu.edu). ::: Table of Links Abstract and 1 Introduction 2 Related Works and 2.1 Deep Reinforcement Learning Algorithms 2.2 Deep Reinforcement Learning Libraries and 2.3 Deep Reinforcement Learning … Read more

End-to-End Solutions for Cryptocurrency Trading

:::info Authors: (1) Xiao-Yang Liu, Hongyang Yang, Columbia University (xl2427,hy2500@columbia.edu); (2) Jiechao Gao, University of Virginia (jg5ycn@virginia.edu); (3) Christina Dan Wang (Corresponding Author), New York University Shanghai (christina.wang@nyu.edu). ::: Table of Links Abstract and 1 Introduction 2 Related Works and 2.1 Deep Reinforcement Learning Algorithms 2.2 Deep Reinforcement Learning Libraries and 2.3 Deep Reinforcement Learning … Read more

Dazed and Confused: What’s Wrong with Crypto Libraries? — Abstract and Introduction

:::info Authors: (1) Mohammadreza Hazhirpasand, University of Bern, Bern, Switzerland; (2) Oscar Nierstrasz, University of Bern, Bern, Switzerland; (3) Mohammad Ghafari, University of Auckland, Auckland, New Zealand. ::: Table of Links Abstract and I. Introduction II. Methodology III. Results and Discussion IV. Threats to Validity V. Related Work VI. Conclusions VII. Acknowledgments and References Abstract—Recent … Read more

Dazed and Confused: What’s Wrong with Crypto Libraries? — Threats to Validity

:::info Authors: (1) Mohammadreza Hazhirpasand, University of Bern, Bern, Switzerland; (2) Oscar Nierstrasz, University of Bern, Bern, Switzerland; (3) Mohammad Ghafari, University of Auckland, Auckland, New Zealand. ::: Table of Links Abstract and I. Introduction II. Methodology III. Results and Discussion IV. Threats to Validity V. Related Work VI. Conclusions VII. Acknowledgments and References IV. … Read more

Dazed and Confused: What’s Wrong with Crypto Libraries? — Results and Discussion

:::info Authors: (1) Mohammadreza Hazhirpasand, University of Bern, Bern, Switzerland; (2) Oscar Nierstrasz, University of Bern, Bern, Switzerland; (3) Mohammad Ghafari, University of Auckland, Auckland, New Zealand. ::: Table of Links Abstract and I. Introduction II. Methodology III. Results and Discussion IV. Threats to Validity V. Related Work VI. Conclusions VII. Acknowledgments and References III. … Read more

Dazed and Confused: What’s Wrong with Crypto Libraries? — Acknowledgments and References

:::info Authors: (1) Mohammadreza Hazhirpasand, University of Bern, Bern, Switzerland; (2) Oscar Nierstrasz, University of Bern, Bern, Switzerland; (3) Mohammad Ghafari, University of Auckland, Auckland, New Zealand. ::: Table of Links Abstract and I. Introduction II. Methodology III. Results and Discussion IV. Threats to Validity V. Related Work VI. Conclusions VII. Acknowledgments and References VII. … Read more

Dazed and Confused: What’s Wrong with Crypto Libraries? — Conclusions

:::info Authors: (1) Mohammadreza Hazhirpasand, University of Bern, Bern, Switzerland; (2) Oscar Nierstrasz, University of Bern, Bern, Switzerland; (3) Mohammad Ghafari, University of Auckland, Auckland, New Zealand. ::: Table of Links Abstract and I. Introduction II. Methodology III. Results and Discussion IV. Threats to Validity V. Related Work VI. Conclusions VII. Acknowledgments and References VI. … Read more

Dazed and Confused: What’s Wrong with Crypto Libraries? — Methodology

:::info Authors: (1) Mohammadreza Hazhirpasand, University of Bern, Bern, Switzerland; (2) Oscar Nierstrasz, University of Bern, Bern, Switzerland; (3) Mohammad Ghafari, University of Auckland, Auckland, New Zealand. ::: Table of Links Abstract and I. Introduction II. Methodology III. Results and Discussion IV. Threats to Validity V. Related Work VI. Conclusions VII. Acknowledgments and References II. … Read more

Dazed and Confused: What’s Wrong with Crypto Libraries? — Related Work

:::info Authors: (1) Mohammadreza Hazhirpasand, University of Bern, Bern, Switzerland; (2) Oscar Nierstrasz, University of Bern, Bern, Switzerland; (3) Mohammad Ghafari, University of Auckland, Auckland, New Zealand. ::: Table of Links Abstract and I. Introduction II. Methodology III. Results and Discussion IV. Threats to Validity V. Related Work VI. Conclusions VII. Acknowledgments and References V. … Read more

An Improved Method for Quantum Matrix Multiplication: Appendix A

:::info Authors: (1) Nhat A. Nghiem, Department of Physics and Astronomy, State University of New York (email: nhatanh.nghiemvu@stonybrook.edu); (2) Tzu-Chieh Wei, Department of Physics and Astronomy, State University of New York and C. N. Yang Institute for Theoretical Physics, State University of New York. ::: Table of Links Main Procedure Applications Discussion and Conclusion Acknowledgements, … Read more

Finding Authenticity Amidst The AI Mirage

Being authentic has always been paramount. However, today, in June 2024, when even baby toys have embedded AI, and every piece of software is crammed with AI, what the hell does “being authentic” really mean? You see it everywhere: emails, messages, posts, comments, and replies. Don’t have the time? Don’t know what to say? Afraid … Read more

Acknowledgements, Declarations, Data Availability Statement, and References

:::info Authors: (1) Nhat A. Nghiem, Department of Physics and Astronomy, State University of New York (email: nhatanh.nghiemvu@stonybrook.edu); (2) Tzu-Chieh Wei, Department of Physics and Astronomy, State University of New York and C. N. Yang Institute for Theoretical Physics, State University of New York. ::: Table of Links Main Procedure Applications Discussion and Conclusion Acknowledgements, … Read more

An Improved Method for Quantum Matrix Multiplication: Applications

:::info Authors: (1) Nhat A. Nghiem, Department of Physics and Astronomy, State University of New York (email: nhatanh.nghiemvu@stonybrook.edu); (2) Tzu-Chieh Wei, Department of Physics and Astronomy, State University of New York and C. N. Yang Institute for Theoretical Physics, State University of New York. ::: Table of Links Main Procedure Applications Discussion and Conclusion Acknowledgements, … Read more

Creating a Systematic ESG Scoring System: Conclusion and Bibliography

:::info Authors: (1) Aarav Patel, Amity Regional High School – email: aarav.dhp@gmail.com; (2) Peter Gloor, Center for Collective Intelligence, Massachusetts Institute of Technology and Corresponding author – email: pgloor@mit.edu. ::: Table of Links Abstract and Introduction Related Works Purpose Methods Results Discussion Conclusion and Bibliography 7. Conclusion The proposed ESG analysis algorithm can help standardize … Read more

Creating a Systematic ESG Scoring System: Abstract and Introduction

:::info Authors: (1) Aarav Patel, Amity Regional High School – email: aarav.dhp@gmail.com; (2) Peter Gloor, Center for Collective Intelligence, Massachusetts Institute of Technology and Corresponding author – email: pgloor@mit.edu. ::: Table of Links Abstract and Introduction Related Works Purpose Methods Results Discussion Conclusion and Bibliography Abstract Environmental Social Governance (ESG) is a widely used metric … Read more

Cryptographic Ransomware Encryption Detection: Survey: Detection of Encryption

:::info Authors: (1) Kenan Begovic, currently a Ph.D. candidate in Computer Science at Qatar University. He received his MS in Information and Computer Security from University of Liverpool; (2) Abdulaziz Al-Ali ,received the Ph.D. degree in machine learning from the University of Miami, FL, USA, in 2016 and he is currently an Assistant Professor in … Read more

Cryptographic Ransomware Encryption Detection: Survey: Abstract and Introduction

:::info Authors: (1) Kenan Begovic, currently a Ph.D. candidate in Computer Science at Qatar University. He received his MS in Information and Computer Security from University of Liverpool; (2) Abdulaziz Al-Ali ,received the Ph.D. degree in machine learning from the University of Miami, FL, USA, in 2016 and he is currently an Assistant Professor in … Read more

Cryptographic Ransomware Encryption Detection: Survey: Author’s Declaration

:::info Authors: (1) Kenan Begovic, currently a Ph.D. candidate in Computer Science at Qatar University. He received his MS in Information and Computer Security from University of Liverpool; (2) Abdulaziz Al-Ali ,received the Ph.D. degree in machine learning from the University of Miami, FL, USA, in 2016 and he is currently an Assistant Professor in … Read more