A Study on The Usage of Deep Learning in Artificial Intelligence and Big Data
Keywords:
Machine Learning, Frameworks, SimilaritiesAbstract
Machine learning is a paradigm that may pertain to getting coming from previous competence (which within this circumstance is previous records) to improve potential capability. The main emphasis of the industry is automated finding techniques. Recognizing illustrates adjustment or perhaps renovation of procedure based upon past "journeys" automatically without outside help from the individual. Machine learning within this brand-new time is illustrating the pledge of generating constantly accurate estimates. The machine learning body properly "knows" just how to anticipate from direction set of completed tasks. The major intended along with the add-on of the client review is actually to preserve the research study on professional estimation, i.e. to relieve numerous other analysts for suitable expert assessment researches making use of machine-learning techniques.
References
- R. P. Lippmann et al., ‘‘Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation,’’ in Proc. DARPA Inf. Survivability Conf. Expo. (DISCEX), vol. 2, 2000, pp. 12–26 .
- M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, ‘‘A detailed analysis of the KDD CUP 99 data set,’’ in Proc. IEEE Int. Conf. Comput. Intell. Secur. Defense Appl., Jul. 2009, pp. 1–6.
- G. Meena and R. R. Choudhary, ‘‘A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA,’’ in Proc. Int. Conf. Comput., Commun. Electron., 2017, pp. 553–558.
- V. Bolón-Canedo, N. Sánchez-Maroño, and A. Alonso-Betanzos, ‘‘Feature selection and classification in multiple class datasets: An application to KDD CUP 99 dataset,’’ Expert Syst. Appl., vol. 38, no. 5, pp. 5947–5957, 2011.
- S. Lakhina, S. Joseph, and B. Verma, ‘‘Feature reduction using principal component analysis for effective anomaly–based intrusion detection on NSL-KDD,’’ Int. J. Eng. Sci. Technol., vol. 2, no. 6, pp. 3175–3180, 2010.
- Sugandhi Maheshwaram, “A Comprehensive Review on the Implementation of Big Data Solutions”, International Journal of Information Technology and Management Vol. XI, Issue No. XVII, November-2016,
- Sugandhi Maheshwaram, “A STUDY ON THE CONCEPT AND EVOLUTION OF MACHINE LEARNING”, INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOGY, Volume-11,Issue-5, May-19
- Sugandhi Maheshwaram, “A Novel Technique for Preventing the SQL Injection Vulnerabilities”, International Journal of Research and Applications, Volume 5, Issue 19, July-Sep 2018
- Sugandhi Maheshwaram, “A Study on Security Information and Event Management (SIEM)”, International Journal of Research and Applications, Volume 5, Issue 17, Jan-Mar 2018
- Sugandhi Maheshwaram, “Architectural Framework of Cloud Computing Environment”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 4, Issue 1, January-February 2018
- Sugandhi Maheshwaram, “An Overview of Open Research Issues in Big Data Analytics”, Journal of Advances in Science and Technology, Vol. 14, Issue No. 2, September-2017
- Sugandhi Maheshwaram, “A Study on Vulnerabilities, Applications, Advantages and Routing Protocols in MANET”, International Journal of Scientific Research in Science and Technology, Volume 4, Issue 1, January-February 2018
- Sudheer Kumar Shriramoju, "Access Control and Density Based Notion of Clusters", International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1 Issue 3, pp. 215-220, July-August 2015.
- Sudheer Kumar Shriramoju, “Review on NoSQL Databases and Key Advantages of Sharepoint”, International Journal of Innovative Research in Science, Engineering and Technology, ISSN(Online): 2319-8753, ISSN (Print): 2347-6710, Vol. 7, Issue 11, November 2018.
- Sudheer Kumar Shriramoju, “Capabilities and Impact of SharePoint On Business”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, November-December-2017.
- Sudheer Kumar Shriramoju, “Security Level Access Error Leading to Inference and Mining Sequential Patterns”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 2, Issue 4, July-August 2016
- Sudheer Kumar Shriramoju, “An Overview on Database Vulnerability and Mining Changes from Data Streams”, International Journal of Information Technology and Management, Vol. VII, Issue No. IX, August-2014
- Sudheer Kumar Shriramoju, “Integrating Information from Heterogeneous Data Sources and Row Level Security”, Journal of Advances and Scholarly Researches in Allied Education, Vol. IV, Issue No. VIII, October-2012
- Sudheer Kumar Shriramoju,, “A Review on Database Security and Advantages of Database Management System”, Journal of Advances in Science and Technology, Vol. V, Issue No. X, August-2013
- Sudheer Kumar Shriramoju, “Security Challenges of Service and Deployment Models”, International Journal of Scientific Research in Science and Technology, Volume 4, Issue 8, May-June 2018
- Sudheer Kumar Shriramoju, “Cloud security - A current scenario and characteristics of cloud computing”, International Journal of Research and Applications, Volume 5, Issue 18, Apr-Jun 2018
- Sudheer Kumar Shriramoju, “SECURITY ISSUES, THREATS AND CORE CONCEPTS OF CLOUD COMPUTING”, Airo International Research Journal, Volume IX, Feb 2017.
- Malyadri. K, “Architecture and Components of Cloud-Based ML Framework”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 8, Issue 1, January 2019
- Malyadri. K, “An Overview towards the Different Types of Security Attacks", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 8, August 2014
- Malyadri. K, “Security Threats, Security Vulnerabilities and Advance Network Security Policies”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 9, September 2013
- Malyadri. K, “Need for Key Management in Cloud and Comparison of Various Encryption Algorithm”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology , volume 1, issue 1, July-August 2016
- Malyadri. K, “Integration of Appropriate Analytic tools towards Mobile Technology Development”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 6, Issue 6, June 2018
- Malyadri. K,“A STUDY ON EXPERIENCES ANDLIMITATIONS OF MOBILE COMMUNICATION”, Alochana Chakra Journal, Volume VI, Issue VIII, August 2017
- Malyadri. K,“CHALLENGES CONCERNING MOBILEDEVELOPMENT AND MODEL-DRIVEN DEVELOPMENT OF MOBILE APPS”, Airo International Research Journal, volume XVI, Nov 2018
- Malyadri, N. Surya Teja, “Related technologies and the role of mobile app development life cycle”, International Journal of Research and Applications, Volume 5, Issue 17, Jan-Mar 2018.
- Bhagya Rekha Kalukurthi, “A Comprehensive Review on Challenges and Types of Big Data”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 7, Issue 1, January 2018.
- Rakesh Rojanala, “Generic Working of an Artificial Neuron and Its Output Mathematical Representation”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 8, Issue 1, January 2019.
- Yeshwanth Valaboju, “A Study on Cryptosystem Types and Cryptographic Principles”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, Issue 6, June 2016
- Rakesh Rojanala, “Components of Data Mining and Big Data Analytics in Intra-Data Center Networks”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, Issue 7, July 2016
- Rakesh Rojanala, “An Overview of Intrusion Detection System and the Role of Data Mining in Information”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 6, Issue 3, March 2017
- Yeshwanth Valaboju, “Capabilities and Key Benefits of Sap NetWeaver Gateway”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 7, Issue 1, January 2019
- Rakesh Rojanala, “Machine Learning: Intersection of Statistics and Computer Science”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 8, August 2017
- Malyadri. K, “A Review on Radio Transmission Technology and Principles of Wireless Networking”, International Journal of Scientific Research in Science and Technology, Volume 1, Issue 3, July-August 2015
- BhagyaRekha Kalukurthi, “Data Mining Strategy for Discovering Intriguing Patterns and Challenges with Bigdata for Global Pulse Development”, International Journal of Scientific Research in Science and Technology, Volume 3, Issue 3, March-April-2017
- Yeshwanth Valaboju, “A Review on The Database Security Requirements and Guidelines”, International Journal of Scientific Research in Science and Technology, Volume 3, Issue 6, July-August 2017
- Rakesh Rojanala, “Cloud Computing Characteristics and Deployment of Big Data Analytics in The Cloud”, International Journal of Scientific Research in Science and Technology, Volume VIII, Issue II, March-April 2014
- BhagyaRekha Kalukurthi, “Big Data Classification and Methods of Data Mining, Big Data”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 3, Issue 5, July-August 2017
- Yeshwanth Valaboju, “IOT Communication Technologies and Future of Internet of Things”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 2, Issue 6, November-December 2017
- BhagyaRekha Kalukurthi, “A Study on The Big Data Characteristics”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 1, Issue 1, July-August 2016
- Bhagya Rekha Kalukurthi, “Security Vulnerabilities, Security Threats, and Advance Network Security Policies”, Journal of Interdisciplinary Cycle Research, Volume VI, Issue I, Jan-June 2014
- Bhagya Rekha Kalukurthi, “IMPLEMENTATION OF BIG DATA ANALYTICS AND BIG DATAGOVERNANCE”, The International journal of analytical and experimental modal analysis, Volume VII, Issue I, May 2015
- Rakesh Rojanala, “CLOUD COMPUTING ARCHITECTURAL FRAMEWORK”, Journal of Interdisciplinary Cycle Research, Volume V, Issue I, Jan-June 2013
- Rakesh Rojanala, “AN OVERVIEW ON CLOUD COMPUTING MODELS AND CLOUD DELIVERY MODELS”, The International journal of analytical and experimental modal analysis, Volume IV, Issue I,JAN-JUNE 2012
- Rakesh Rojanala, “A COMPREHENSIVE STUDY ON THECHALLENGES OF STREAM DATA MINING AND BIG DATA-ORIENTED STREAM DATAMINING”, The International journal of analytical and experimental modal analysis, Volume VII, Issue II, July-December 2015
- Yeshwanth Valaboju, “A LITERATURE REVIEW ON NEURAL NETWORKARCHITECTURES”, Journal of Interdisciplinary Cycle Research, Volume VII, Issue II, December 2015
- Yeshwanth Valaboju, “AN OVERVIEW ON THE TYPES OF PASSWORD AND DOS ATTACKS”, Journal of Interdisciplinary Cycle Research, Volume IX, Issue XI, November 2018
- Yeshwanth Valaboju, “AN OVERVIEW ON SAP FIORI DESIGN PRINCIPLES AND FIORI ARCHITECTURE FOR ANALYTICAL APPLICATIONS”, The International journal of analytical and experimental modal analysis, Volume X, Issue IX, September 2018
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.