A Study on The Usage of Deep Learning in Artificial Intelligence and Big Data

Authors

  • Anitha Eemani  Sr. Java Full Stack Developer, National Association of Insurance Commissioners (NAIC), USA

Keywords:

Machine Learning, Frameworks, Similarities

Abstract

Machine learning is a paradigm that may pertain to getting coming from previous competence (which within this circumstance is previous records) to improve potential capability. The main emphasis of the industry is automated finding techniques. Recognizing illustrates adjustment or perhaps renovation of procedure based upon past "journeys" automatically without outside help from the individual. Machine learning within this brand-new time is illustrating the pledge of generating constantly accurate estimates. The machine learning body properly "knows" just how to anticipate from direction set of completed tasks. The major intended along with the add-on of the client review is actually to preserve the research study on professional estimation, i.e. to relieve numerous other analysts for suitable expert assessment researches making use of machine-learning techniques.

References

  1. R. P. Lippmann et al., ‘‘Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation,’’ in Proc. DARPA Inf. Survivability Conf. Expo. (DISCEX), vol. 2, 2000, pp. 12–26 .
  2. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, ‘‘A detailed analysis of the KDD CUP 99 data set,’’ in Proc. IEEE Int. Conf. Comput. Intell. Secur. Defense Appl., Jul. 2009, pp. 1–6.
  3. G. Meena and R. R. Choudhary, ‘‘A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA,’’ in Proc. Int. Conf. Comput., Commun. Electron., 2017, pp. 553–558.
  4. V. Bolón-Canedo, N. Sánchez-Maroño, and A. Alonso-Betanzos, ‘‘Feature selection and classification in multiple class datasets: An application to KDD CUP 99 dataset,’’ Expert Syst. Appl., vol. 38, no. 5, pp. 5947–5957, 2011.
  5. S. Lakhina, S. Joseph, and B. Verma, ‘‘Feature reduction using principal component analysis for effective anomaly–based intrusion detection on NSL-KDD,’’ Int. J. Eng. Sci. Technol., vol. 2, no. 6, pp. 3175–3180, 2010.
  6. Sugandhi Maheshwaram, “A Comprehensive Review on the Implementation of Big Data Solutions”, International Journal of Information Technology and Management Vol. XI, Issue No. XVII, November-2016,
  7. Sugandhi Maheshwaram, “A STUDY ON THE CONCEPT AND EVOLUTION OF MACHINE LEARNING”, INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOGY, Volume-11,Issue-5, May-19
  8. Sugandhi Maheshwaram, “A Novel Technique for Preventing the SQL Injection Vulnerabilities”, International Journal of Research and Applications, Volume 5, Issue 19, July-Sep 2018
  9. Sugandhi Maheshwaram, “A Study on Security Information and Event Management (SIEM)”, International Journal of Research and Applications, Volume 5, Issue 17, Jan-Mar 2018
  10. Sugandhi Maheshwaram, “Architectural Framework of Cloud Computing Environment”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 4, Issue 1, January-February 2018
  11. Sugandhi Maheshwaram, “An Overview of Open Research Issues in Big Data Analytics”, Journal of Advances in Science and Technology, Vol. 14, Issue No. 2, September-2017
  12. Sugandhi Maheshwaram, “A Study on Vulnerabilities, Applications, Advantages and Routing Protocols in MANET”, International Journal of Scientific Research in Science and Technology, Volume 4, Issue 1, January-February 2018
  13. Sudheer Kumar Shriramoju, "Access Control and Density Based Notion of Clusters", International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1 Issue 3, pp. 215-220, July-August 2015.
  14. Sudheer Kumar Shriramoju, “Review on NoSQL Databases and Key Advantages of Sharepoint”, International Journal of Innovative Research in Science, Engineering and Technology, ISSN(Online): 2319-8753, ISSN (Print): 2347-6710, Vol. 7, Issue 11, November 2018.
  15. Sudheer Kumar Shriramoju, “Capabilities and Impact of SharePoint On Business”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, November-December-2017.
  16. Sudheer Kumar Shriramoju, “Security Level Access Error Leading to Inference and Mining Sequential Patterns”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 2, Issue 4, July-August 2016
  17. Sudheer Kumar Shriramoju, “An Overview on Database Vulnerability and Mining Changes from Data Streams”, International Journal of Information Technology and Management, Vol. VII, Issue No. IX, August-2014
  18. Sudheer Kumar Shriramoju, “Integrating Information from Heterogeneous Data Sources and Row Level Security”, Journal of Advances and Scholarly Researches in Allied Education, Vol. IV, Issue No. VIII, October-2012
  19. Sudheer Kumar Shriramoju,, “A Review on Database Security and Advantages of Database Management System”, Journal of Advances in Science and Technology, Vol. V, Issue No. X, August-2013
  20. Sudheer Kumar Shriramoju, “Security Challenges of Service and Deployment Models”, International Journal of Scientific Research in Science and Technology, Volume 4, Issue 8, May-June 2018
  21. Sudheer Kumar Shriramoju, “Cloud security - A current scenario and characteristics of cloud computing”, International Journal of Research and Applications, Volume 5, Issue 18, Apr-Jun 2018
  22. Sudheer Kumar Shriramoju, “SECURITY ISSUES, THREATS AND CORE CONCEPTS OF CLOUD COMPUTING”, Airo International Research Journal, Volume IX, Feb 2017.
  23. Malyadri. K, “Architecture and Components of Cloud-Based ML Framework”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 8, Issue 1, January 2019
  24. Malyadri. K, “An Overview towards the Different Types of Security Attacks", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 8, August 2014
  25. Malyadri. K, “Security Threats, Security Vulnerabilities and Advance Network Security Policies”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 9, September 2013
  26. Malyadri. K, “Need for Key Management in Cloud and Comparison of Various Encryption Algorithm”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology , volume 1, issue 1, July-August 2016
  27. Malyadri. K, “Integration of Appropriate Analytic tools towards Mobile Technology Development”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 6, Issue 6, June 2018
  28. Malyadri. K,“A STUDY ON EXPERIENCES ANDLIMITATIONS OF MOBILE COMMUNICATION”, Alochana Chakra Journal, Volume VI, Issue VIII, August 2017
  29. Malyadri. K,“CHALLENGES CONCERNING MOBILEDEVELOPMENT AND MODEL-DRIVEN DEVELOPMENT OF MOBILE APPS”, Airo International Research Journal, volume XVI, Nov 2018
  30. Malyadri, N. Surya Teja, “Related technologies and the role of mobile app development life cycle”, International Journal of Research and Applications, Volume 5, Issue 17, Jan-Mar 2018.
  31. Bhagya Rekha Kalukurthi, “A Comprehensive Review on Challenges and Types of Big Data”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 7, Issue 1, January 2018.
  32. Rakesh Rojanala, “Generic Working of an Artificial Neuron and Its Output Mathematical Representation”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 8, Issue 1, January 2019.
  33. Yeshwanth Valaboju, “A Study on Cryptosystem Types and Cryptographic Principles”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, Issue 6, June 2016
  34. Rakesh Rojanala, “Components of Data Mining and Big Data Analytics in Intra-Data Center Networks”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, Issue 7, July 2016
  35. Rakesh Rojanala, “An Overview of Intrusion Detection System and the Role of Data Mining in Information”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 6, Issue 3, March 2017
  36. Yeshwanth Valaboju, “Capabilities and Key Benefits of Sap NetWeaver Gateway”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 7, Issue 1, January 2019
  37. Rakesh Rojanala, “Machine Learning: Intersection of Statistics and Computer Science”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 8, August 2017
  38. Malyadri. K, “A Review on Radio Transmission Technology and Principles of Wireless Networking”, International Journal of Scientific Research in Science and Technology, Volume 1, Issue 3, July-August 2015
  39. BhagyaRekha Kalukurthi, “Data Mining Strategy for Discovering Intriguing Patterns and Challenges with Bigdata for Global Pulse Development”, International Journal of Scientific Research in Science and Technology, Volume 3, Issue 3, March-April-2017
  40. Yeshwanth Valaboju, “A Review on The Database Security Requirements and Guidelines”, International Journal of Scientific Research in Science and Technology, Volume 3, Issue 6, July-August 2017
  41. Rakesh Rojanala, “Cloud Computing Characteristics and Deployment of Big Data Analytics in The Cloud”, International Journal of Scientific Research in Science and Technology, Volume VIII, Issue II, March-April 2014
  42. BhagyaRekha Kalukurthi, “Big Data Classification and Methods of Data Mining, Big Data”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 3, Issue 5, July-August 2017
  43. Yeshwanth Valaboju, “IOT Communication Technologies and Future of Internet of Things”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 2, Issue 6, November-December 2017
  44. BhagyaRekha Kalukurthi, “A Study on The Big Data Characteristics”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 1, Issue 1, July-August 2016
  45. Bhagya Rekha Kalukurthi, “Security Vulnerabilities, Security Threats, and Advance Network Security Policies”, Journal of Interdisciplinary Cycle Research, Volume VI, Issue I, Jan-June 2014
  46. Bhagya Rekha Kalukurthi, “IMPLEMENTATION OF BIG DATA ANALYTICS AND BIG DATAGOVERNANCE”, The International journal of analytical and experimental modal analysis, Volume VII, Issue I, May 2015
  47. Rakesh Rojanala, “CLOUD COMPUTING ARCHITECTURAL FRAMEWORK”, Journal of Interdisciplinary Cycle Research, Volume V, Issue I, Jan-June 2013
  48. Rakesh Rojanala, “AN OVERVIEW ON CLOUD COMPUTING MODELS AND CLOUD DELIVERY MODELS”, The International journal of analytical and experimental modal analysis, Volume IV, Issue I,JAN-JUNE 2012
  49. Rakesh Rojanala, “A COMPREHENSIVE STUDY ON THECHALLENGES OF STREAM DATA MINING AND BIG DATA-ORIENTED STREAM DATAMINING”, The International journal of analytical and experimental modal analysis, Volume VII, Issue II, July-December 2015
  50. Yeshwanth Valaboju, “A LITERATURE REVIEW ON NEURAL NETWORKARCHITECTURES”, Journal of Interdisciplinary Cycle Research, Volume VII, Issue II, December 2015
  51. Yeshwanth Valaboju, “AN OVERVIEW ON THE TYPES OF PASSWORD AND DOS ATTACKS”, Journal of Interdisciplinary Cycle Research, Volume IX, Issue XI, November 2018
  52. Yeshwanth Valaboju, “AN OVERVIEW ON SAP FIORI DESIGN PRINCIPLES AND FIORI ARCHITECTURE FOR ANALYTICAL APPLICATIONS”, The International journal of analytical and experimental modal analysis, Volume X, Issue IX, September 2018

Downloads

Published

2019-12-30

Issue

Section

Research Articles

How to Cite

[1]
Anitha Eemani, " A Study on The Usage of Deep Learning in Artificial Intelligence and Big Data, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 6, pp.390-399, November-December-2019.