云计算的各种机器学习算法综述

S. Amanuel, Ibrahim M. Ahmed
{"title":"云计算的各种机器学习算法综述","authors":"S. Amanuel, Ibrahim M. Ahmed","doi":"10.1109/ICOASE56293.2022.10075592","DOIUrl":null,"url":null,"abstract":"Cloud computing (CC) provides network services on request, especially data storage and processing capacity, without users' specific and direct management. CC recently became a collection of public and private data centers that provide the customer with a shared Internet network. Edge Computing is an emerging computing and knowledge storage model that puts end-users closer together to increase reaction times and save communication power. However, CC and edge computing face protection issues, including customer risk and corporate recognition, that hinder the swift implementation of computing modelling. One solution to this problem, because of its complexity and severity, is Machine Learning (ML) which consists of researching computational algorithms and naturally advancing knowledge. The problem and solution issues are raised by the overview article that analyses CC safety risks, problems, and solutions that use one or more ML algorithms. Study various ML algorithms, such as controlled, unmonitored, semi-supervised, and enforced training, to solve cloud protection problems. The paper assesses each technique's efficiency based on its characteristics, advantages, and drawbacks. In addition, it will have potential study guidance on safeguarding CC usage and applications.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review of the Various Machine Learning Algorithms for Cloud Computing\",\"authors\":\"S. Amanuel, Ibrahim M. Ahmed\",\"doi\":\"10.1109/ICOASE56293.2022.10075592\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing (CC) provides network services on request, especially data storage and processing capacity, without users' specific and direct management. CC recently became a collection of public and private data centers that provide the customer with a shared Internet network. Edge Computing is an emerging computing and knowledge storage model that puts end-users closer together to increase reaction times and save communication power. However, CC and edge computing face protection issues, including customer risk and corporate recognition, that hinder the swift implementation of computing modelling. One solution to this problem, because of its complexity and severity, is Machine Learning (ML) which consists of researching computational algorithms and naturally advancing knowledge. The problem and solution issues are raised by the overview article that analyses CC safety risks, problems, and solutions that use one or more ML algorithms. Study various ML algorithms, such as controlled, unmonitored, semi-supervised, and enforced training, to solve cloud protection problems. The paper assesses each technique's efficiency based on its characteristics, advantages, and drawbacks. In addition, it will have potential study guidance on safeguarding CC usage and applications.\",\"PeriodicalId\":297211,\"journal\":{\"name\":\"2022 4th International Conference on Advanced Science and Engineering (ICOASE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 4th International Conference on Advanced Science and Engineering (ICOASE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOASE56293.2022.10075592\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOASE56293.2022.10075592","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

云计算(Cloud computing, CC)是一种按需提供网络服务,尤其是数据存储和处理能力的技术,无需用户具体和直接的管理。CC最近成为公共和私有数据中心的集合,为客户提供共享的Internet网络。边缘计算是一种新兴的计算和知识存储模型,它使最终用户更紧密地联系在一起,以增加反应时间并节省通信功率。然而,CC和边缘计算面临保护问题,包括客户风险和企业识别,这些问题阻碍了计算建模的快速实施。由于这个问题的复杂性和严重性,解决这个问题的一个方法是机器学习(ML),它由研究计算算法和自然地推进知识组成。问题和解决方案问题由概述文章提出,该文章分析了使用一种或多种ML算法的CC安全风险、问题和解决方案。研究各种ML算法,如受控、无监控、半监督和强制训练,以解决云保护问题。本文根据每种技术的特点、优点和缺点来评估每种技术的效率。此外,对保护CC的使用和应用具有潜在的研究指导意义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Review of the Various Machine Learning Algorithms for Cloud Computing
Cloud computing (CC) provides network services on request, especially data storage and processing capacity, without users' specific and direct management. CC recently became a collection of public and private data centers that provide the customer with a shared Internet network. Edge Computing is an emerging computing and knowledge storage model that puts end-users closer together to increase reaction times and save communication power. However, CC and edge computing face protection issues, including customer risk and corporate recognition, that hinder the swift implementation of computing modelling. One solution to this problem, because of its complexity and severity, is Machine Learning (ML) which consists of researching computational algorithms and naturally advancing knowledge. The problem and solution issues are raised by the overview article that analyses CC safety risks, problems, and solutions that use one or more ML algorithms. Study various ML algorithms, such as controlled, unmonitored, semi-supervised, and enforced training, to solve cloud protection problems. The paper assesses each technique's efficiency based on its characteristics, advantages, and drawbacks. In addition, it will have potential study guidance on safeguarding CC usage and applications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Circular Dipole Nanoantenna with Improved Performance The Use of Toulmin's Argumentation Model in Solving The Drug Conflict Problems Comparison and Assessment of PV Module Power Prediction Based on ANN for Iraq Weather Generating Masked Facial Datasets Using Dlib-Machine Learning Library Combination of Stream and Block Image Encryption Algorithms in Pixel Scrambling Using Henon Map
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1