An Evaluation of Machine Learning and Big Data Analytics Performance in Cloud Computing and Computer Vision
Main Article Content
Abstract
Although cloud computing is receiving a lot of attention, security remains a significant barrier to its general adoption. Cloud service users frequently worry about data loss, security risks, and availability issues. Because of the accessibility and openness of the huge volume of data amassed by sensors and the web throughout recent years, computer applications have seen a remarkable change from straightforward data processing to machine learning. Two widely used technologies, Big Data and Cloud computing, are the focus of worry in the IT industry. Enormous data sets are put away, handled, and broke down under the possibility of "Big Data." Then again, cloud computing centres around giving the framework to make such systems conceivable in a period and cash saving way. The objective of the review is to survey the Big Data Analytics and Machine learning ideal models for use in cloud computing and computer vision. The programmed data examination of enormous data sets and the production of models for the wide connections between data are the centre highlights of machine learning (ML). The usefulness of machine learning-based strategies for identifying threats in a cloud computing environment is surveyed and compared in this research.
Article Details
References
Abdul Majeed, "Attribute-centric anonymization scheme for improving user privacy and utility of publishing e-health data", Journal of King Saud University - Computer and Information Sciences, Vol.31, Issue 4, pp.426-435, October 2019.
Dash, Tirtharaj and Tanistha Nayak, English Character Recognition using Artificial Neural Network. arXiv preprint arXiv:1306.4621, 2013.
HASHEM, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Ullah Khan, S. (2015). The rise of “big data” on cloud computing: Review and open research issues. In Information Systems. https://doi. org/10.1016/j.is.2014.07.006.
Karn RR, Kudva P, Elfadel IA, "Dynamic auto selection and autotuning of machine learning models for cloud network analytics", IEEE Transaction on Parallel and Distributed Systems, Vol.30(5), pp.1s052–1064, 2019.
KOBIELUS, J., (2018).Deploying Big Data Analytics Applications to the Cloud: Roadmap for Success. Cloud Standards Customer Council.
Pandey, E. ., & Kumar, S. . (2023). Exploring the Generalization Capacity of Over-Parameterized Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(1s), 97–112. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2482.
L. Cao, Data science: a comprehensive overview, ACM Computing Surveys (CSUR) 50 (3) (2017) 1–42.
M. I. Jordan, T. M. Mitchell, Machine learning: Trends, perspectives, and prospects, Science 349 (6245) (2015) 255–260.
MENZES, F.S.D., Liska, G.R., Cirillo, M.A. and Vivanco, M.J.F. (2016) Data Classification with Binary Response through the Boosting Algorithm and Logistic Regression. Expert Systems with Applications, 69, 62-73. https://doi.org/10.1016/ j.eswa.2016.08.014
Kevin Harris, Lee Green, Juan Garcia, Juan Castro, Juan González. Intelligent Personal Assistants in Education: Applications and Challenges. Kuwait Journal of Machine Learning, 2(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/185.
Mobilio M, Orrù M, Riganelli O, Tundo A, Mariani L., “Anomaly detection as-a-service”, In: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE; 2019. p. 193–9.
Moustafa N, Creech G, Sitnikova E, Keshk M., “Collaborative anomaly detection framework for handling big data of cloud computing”, In: 2017 military communications and information systems conference (MilCIS). IEEE; 2017. p. 1– 6.
Juan Lopez, Machine Learning-based Recommender Systems for E-commerce , Machine Learning Applications Conference Proceedings, Vol 2 2022.
S. Abd Razak, N. H. Mohd Nazari and A. Al-Dhaqm, "Data Anonymization Using Pseudonym System to Preserve Data Privacy", IEEE Access, Vol. 8, pp.43256-43264, 2020.
S. Sagiroglu and D. Sinanc, "Big data: A review", International Conference on Collaboration Technologies and Systems (CTS), San Diego, CA, pp.42-47, 2013.
SITI Nurul Mahfuzah, M., Sazilah, S., & Norasiken, B. (2017). An Analysis of Gamification Elements in Online Learning to Enhance Learning Engagement. 6th International Conference on Computing & Informatics.
Steger, Carsten, Markus Ulrich, and Christian Wiedemann, Machine vision algorithms and applications. 2018: John Wiley & Sons.
Stephen Kaisler, Frank Armour, J. Alberto Espinosa, William Money, “Big Data: Issues and Challenges Moving Forward", 46th Hawaii International Conference on System Sciences, 2013.
Tsai C, Hsu Y, Lin C, LinW, "Intrusion detection by machine learning: a review", Expert Systems with Applications, Vol.36(10), pp.11994– 12000, 2009.
Sherje, D. N. . (2021). Content Based Image Retrieval Based on Feature Extraction and Classification Using Deep Learning Techniques. Research Journal of Computer Systems and Engineering, 2(1), 16:22. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/14.
V. Dhar, Data science and prediction, Communications of the ACM 56 (12) (2013) 64–73.
White, David, James D Dunn, Alexandra C Schmid, and Richard I Kemp, Error rates in users of automatic face recognition software. PloS one, 2015. 10(10): p. e0139827.
Wilson, B. M. R., Khazaei, B., & Hirsch, L. (2015, November). Enablers and barriers of cloud adoption among Small and Medium Enterprises in Tamil Nadu. In: 2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) (pp. 140-145). IEEE.
Zhang J, “Anomaly detecting and ranking of the cloud computing platform by multi-view learning”, Multimedia Tools Appl. 2019;78:30923–42.