90 likes | 100 Views
The enormous amount of information generated in a day to day life due to the technological innovations and developments in wide areas like education, government, social media, business, healthcare, finance, etc. Thus the huge amount of generated data creates potential toward discerning useful knowledge from it. The cloud computing (CC) plays a major role to address both usages of data storage and computational of huge data, especially for mining and knowledge discovery applications (Talia, 2015). But, also it requires dealing with the process of data in an efficient and cost-effective manner (as low). <br><br>Contact: t<br>Website: www.tutorsindia.com <br>Email: info@tutorsindia.com <br>United Kingdom: 44-1143520021 <br>India: 91-4448137070 <br>Whatsapp Number: 91-8754446690<br>Reference: http://bit.ly/38G4aVi<br><br>
E N D
SIGNIFICANT AND NEED OF MACHINE LEARNING IN CLOUDCOMPUTING An Academic presentationby Dr. Nancy Agens, Head, Technical Operations,TutorsIndia Group: www.tutorsindia.com Email:info@tutorsindia.com
Today'sDiscussion OUTLINE In Brief Background Five Stages of ML Recommendation
InBrief There is a need for an effective model to secure the data in both the trusted and untrusted cloud environment. The encryption is the process for enhancing the secure level of data while before upload to the trusted or untrusted cloudsystem.
Cloud computing plays a major role in most of theorganizations to outsource their information as well as for system computational needs. Such administrations are relied upon to consistently give security standards. Background For example, data availability, confidentiality and integrity; in this way, an exceptionally secure stage is one of the most significant parts ofCloud-environment. In order to tackle the issues of malware detection and classification, machine learning (ML) plays a significantrole.
Five Stages ofML ML technique comprises five stages of workflownamely, data gathering, preprocessing (cleaning and preparing ofinformation), unique model buildingprocess, deploying and validating model intoproduction. The information arrangement procedure of conventional ML approaches includes preprocessing the executable to separate a lot of features that gives a conceptual perspective on theproduct. Contd..
Fig 1. Machine LearningWorkflow Contd..
In order to solve the task scheduling, the extracted features are imported into train amodel. An ML technique has been widely applied to various applications but due to the rapid growth of data over the cloud environment; there is a possibility to occur risk during quality measurement and distribution of data over the untrustedcloud.
Recommendations Quality Risks and Disruption: The traditional method has been a failure to consider some primary risk, inefficiencies and operational impacts at the time of user adoption and training denotes secondaryrisk. The combination of both primary and secondary risk factors help to support smart technology which will enhance the system performance. Emerging Technologies andMethods: The deep learning will be an effective model for both classification and detection which also effectively extracts the features via in-depth analysis ofdata.
CONTACTUS UNITEDKINGDOM +44-1143520021 INDIA +91-4448137070 EMAIL info@tutorsindia.com