90 likes | 95 Views
The enormous amount of information generated in a day to day life due to the technological innovations and developments in wide areas like education, government, social media, business, healthcare, finance, etc. Thus the huge amount of generated data creates potential toward discerning useful knowledge from it. The cloud computing (CC) plays a major role to address both usages of data storage and computational of huge data, especially for mining and knowledge discovery applications (Talia, 2015). But, also it requires dealing with the process of data in an efficient and cost-effective manner (as low). <br><br>Contact: t<br>Website: www.tutorsindia.com <br>Email: info@tutorsindia.com <br>United Kingdom: 44-1143520021 <br>India: 91-4448137070 <br>Whatsapp Number: 91-8754446690<br>Reference: http://bit.ly/38G4aVi<br>
E N D
SIGNIFICANT AND NEED OF MACHINE LEARNING IN CLOUD COMPUTING An Academic presentation by Dr. Nancy Agens, Head, Technical Operations, Tutors India Group: www.tutorsindia.com Email: info@tutorsindia.com
Today's Discussion OUTLINE In Brief Background Five Stages of ML Recommendation
In Brief There is a need for an effective model to secure the data in both the trusted and untrusted cloud environment. The encryption is the process for enhancing the secure level of data while before upload to the trusted or untrusted cloud system.
Cloud computing plays a major role in most of the organizations to outsource their information as well as for system computational needs. Such administrations are relied upon to consistently give security standards. Background For example, data availability, confidentiality and integrity; in this way, an exceptionally secure stage is one of the most significant parts of Cloud-environment. In order to tackle the issues of malware detection and classification, machine learning (ML) plays a significant role.
Five Stages of ML ML technique comprises five stages of workflow namely, 1.data gathering, 2.preprocessing (cleaning and preparing of information), 3.unique model building process, 4.deploying and validating model into production. The information arrangement procedure of conventional ML approaches includes preprocessing the executable to separate a lot of features that gives a conceptual perspective on the product. Contd..
Fig 1. Machine Learning Workflow Contd..
In order to solve the task scheduling, the extracted features are imported into train a model. An ML technique has been widely applied to various applications but due to the rapid growth of data over the cloud environment; there is a possibility to occur risk during quality measurement and distribution of data over the untrusted cloud.
Recommendations Quality Risks and Disruption: The traditional method has been a failure to consider some primary risk, inefficiencies and operational impacts at the time of user adoption and training denotes secondary risk. The combination of both primary and secondary risk factors help to support smart technology which will enhance the system performance. Emerging Technologies and Methods: The deep learning will be an effective model for both classification and detection which also effectively extracts the features via in-depth analysis of data.
CONTACT US UNITED KINGDOM +44-1143520021 INDIA +91-4448137070 EMAIL info@tutorsindia.com