SlideShare a Scribd company logo
1 of 10
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
Dynamic Autoselection and Autotuning ofMachine Learning Models
forCloud Network Analytics
Cloud networks will be monitored via signals to allocate proper resources and
this resource allocating decision will be taken using machine learning
algorithms such as KNN, Naïve Bayes, Random Forest, Decision Tree,
Boosting, StochasticGradient, Gradient Boosting, and Multilayer Perceptron,
but this algorithms accuracy may change due to changes in availability and
unavailability of signal, sometime training model generated on some signal data
may give high prediction accuracy and sometime it may give less accuracy if
data changes. If less accuracy model chosen for prediction of cloud allocation
resources then it may not give correctly predicted value.
To overcome from above issue author is introducing Autoselection and
Autotuning model choosing concept where application generated training model
on various algorithms and generated accuracy will be voted between this
algorithms to choose high accuracy model and whatever algorithms gives high
accuracy then this application will automatically choose that model and tune the
application to use that model for further prediction of cloud resources.
By using voting concept with accuracy application can tune itself with best
working model.
To have best accuracy for each algorithm clustering technique will be applied
on dataset to put all closer or similar data into one clusters and only that cluster
will be chosen for training (all algorithms) who gave best accuracy.
This application consists of following phases
1) Matching a single optimized model to a given contextin a dynamic
environment. To have single training model with best accuracy in this dynamic
and distributed (network) environment where data changes frequently.
2) Creating and building multiple models and selecting the best for a given
context. Building multiple models with multiple algorithms to choose best one
3) Closed loop, auto-selection mechanism in the cloud DevOps environment.
The concept name DevOps where selection and tuning of model will be done
automatically.
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
4) Using unsupervised clustering to segment the dataset ahead of supervised
classification. Using clustering technique to put all similar data into one cluster
and choose best performing cluster for training model
5) End-to-end comparison with Ensemble Machine Learning. Can compare with
other algorithms to choose best one
6) Deep learning implementation and some of its hyper parametersTuning. This
algorithms can be compare with Deep Learning also but Deep Learning will
take too much long time for model generation and may not suitable in this cloud
services where response required quickly.
To implement above concept this paper proposes 3 algorithms
Model Auto Selection Algorithm: In this algorithm we will choose model from
algorithm who is correctly predicting class label of given test data or providing
better accuracy
Model Selection with UnsupervisedLearning + Supervised Learning Algorithm:
In this algorithm we will cluster data and choose only that cluster to generate
training model who is giving better accuracy.
Parameter Tuning with Autoselection Algorithm: Accuracy of one algorithm
will be compare with other algorithm to auto select that algorithm who has best
accuracy.
Dataset Information
To implement this paper author has used ‘UNSW-NB15’ dataset which contains
information about http request attack and non-attack signatures and this dataset
will be passed to application as streams (streams will consider as data coming
from distributed network environment in place of signal data) and application
will monitor such stream and generate training model and to predict new request
contains attack signature or non-attack signatures. This dataset available inside
dataset folder. This folder contains ‘DatasetURL.txt’ file which contains dataset
URL from where it’s downloaded. This folder also contains
‘Dataset_Information.txt’ file which contains information about dataset such as
description of dataset column.
Implementation Details and Screen Shots
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
To implement this project I design two applications called ‘StreamSender’ and
‘StreamReceiver’. StreamSender will send streams of size 500 records to
StreamReceiver and this receiver contains implementation of 5 algorithms such
as Random Forest, Decision Tree, KNN, StochasticGradient and Naïve Bayes.
First receiver will cluster data and then each algorithm will generate model on
entire stream and then generate one more model on cluster1 and cluster2.
Whoever gives better accuracy will be autoselected and tune for future request
data prediction.
First double click on ‘run.bat’ file from StreamReceiver folder to get below
screen and let it run
Two screen will display in above screen where first screen display stream
details and second screen will display accuracy of each and every algorithm
generated from stream.
Now double click on ‘run.bat’ file from StreamSender folder to get below
screen
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above screen click on ‘Upload UNSW-NB15 Cloud Monitoring Dataset’
button to upload dataset, see below screen
In above screen I am uploading ‘UNSW-NB15’ dataset which contains normal
and attack signature. After uploading dataset will get below screen
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above screen we can see dataset uploaded and now click on ‘Start Streaming’
button to send stream by stream dataset to StreamReceiver application
In above screen while sending stream then each stream data will be displayed in
above screen table. In above screen table by reading column names u can
understand what values dataset contains. In before last column we will have
attack names and in last column will have 0 and 1 values where 0 is normal
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
signature and 1 means attack signature. See last columns of above table in
below screen
In above screen in last column when value 1 is there then its displaying name of
attack beside that column. After sending streams wait till u get below screen
dialog box, this dialog box indicates all streams processed at receiver side
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
Now we can see each stream process details at StreamReceiver application
screen
In above screen at receiver side we can see 3 stream are received and for each
stream 5 algorithms will generate training model and show its accuracy also.
See below screen
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above screen for each stream all 5 algorithms accuracy we can see and in
selected line which algorithm is auto selected with best accuracy also
displaying. Just scroll down above screen to see accuracy of all 3 streams with
all 5 algorithms. In our implementation we can see Stochastic Gradient
algorithm is giving better accuracy and same algorithm is performing better in
paper also. See below screen with scroll down
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above screen we can see accuracy for all 3 streams. Now click on ‘Accuracy
Graph’ button to see accuracy in graph
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above graph x-axis represents full features, cluster1 and 2 features and y-axis
represents accuracy for full, cluster1 and 2. Each algorithm line represents with
different colour and we can see all stochastic algorithm performing well
compare to other algorithms. Now click on ‘Features Graph’ to see which
cluster features are giving better accuracy
In above graph we can see we generate 2 clusters and cluster2 features are
giving better accuracy compare to cluster 1 and we can choose cluster2 as auto
selected model. In above graph x-axis represents cluster1 and cluster2 features
and y-axis represents accuracy

More Related Content

Similar to Machine Learning Model Autoselection for Cloud Analytics

Comparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosisComparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosisVenkat Projects
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Venkat Projects
 
Qrsvm (fast and communication efficient algorithm for distributed support vec...
Qrsvm (fast and communication efficient algorithm for distributed support vec...Qrsvm (fast and communication efficient algorithm for distributed support vec...
Qrsvm (fast and communication efficient algorithm for distributed support vec...Venkat Projects
 
Qrsvm (fast and communication efficient algorithm for distributed support vec...
Qrsvm (fast and communication efficient algorithm for distributed support vec...Qrsvm (fast and communication efficient algorithm for distributed support vec...
Qrsvm (fast and communication efficient algorithm for distributed support vec...Venkat Projects
 
Software defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithmsSoftware defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithmsVenkat Projects
 
Software defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithmsSoftware defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithmsVenkat Projects
 
Cognitive agent system to retrieve relevant code components from a repository
Cognitive agent system to retrieve relevant code components from a repositoryCognitive agent system to retrieve relevant code components from a repository
Cognitive agent system to retrieve relevant code components from a repositoryVenkat Projects
 
Hybrid feature selection using correlation coefficient and particle swarm opt...
Hybrid feature selection using correlation coefficient and particle swarm opt...Hybrid feature selection using correlation coefficient and particle swarm opt...
Hybrid feature selection using correlation coefficient and particle swarm opt...Venkat Projects
 
Use of artificial neural networks to identify fake profiles
Use of artificial neural networks to identify fake profilesUse of artificial neural networks to identify fake profiles
Use of artificial neural networks to identify fake profilesVenkat Projects
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learniVenkat Projects
 
Feature extraction for classifying students based on theirac ademic performance
Feature extraction for classifying students based on theirac ademic performanceFeature extraction for classifying students based on theirac ademic performance
Feature extraction for classifying students based on theirac ademic performanceVenkat Projects
 
Recommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance systemRecommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance systemVenkat Projects
 
Recommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance systemRecommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance systemVenkat Projects
 
Ground water prediction screenshots
Ground water prediction screenshotsGround water prediction screenshots
Ground water prediction screenshotsVenkat Projects
 
Automating e government using ai
Automating e government using aiAutomating e government using ai
Automating e government using aiVenkat Projects
 
Prediction of quality for different type of winebased on different feature se...
Prediction of quality for different type of winebased on different feature se...Prediction of quality for different type of winebased on different feature se...
Prediction of quality for different type of winebased on different feature se...Venkat Projects
 
Prediction of quality for different type of winebased on different feature se...
Prediction of quality for different type of winebased on different feature se...Prediction of quality for different type of winebased on different feature se...
Prediction of quality for different type of winebased on different feature se...Venkat Projects
 
Traffic sign detection and recognition
Traffic sign detection and recognitionTraffic sign detection and recognition
Traffic sign detection and recognitionVenkat Projects
 
Internship_presentation
Internship_presentationInternship_presentation
Internship_presentationAditya Gautam
 
Exploring trajectory prediction through machine learning methods
Exploring trajectory prediction through machine learning methodsExploring trajectory prediction through machine learning methods
Exploring trajectory prediction through machine learning methodsVenkat Projects
 

Similar to Machine Learning Model Autoselection for Cloud Analytics (20)

Comparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosisComparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosis
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Qrsvm (fast and communication efficient algorithm for distributed support vec...
Qrsvm (fast and communication efficient algorithm for distributed support vec...Qrsvm (fast and communication efficient algorithm for distributed support vec...
Qrsvm (fast and communication efficient algorithm for distributed support vec...
 
Qrsvm (fast and communication efficient algorithm for distributed support vec...
Qrsvm (fast and communication efficient algorithm for distributed support vec...Qrsvm (fast and communication efficient algorithm for distributed support vec...
Qrsvm (fast and communication efficient algorithm for distributed support vec...
 
Software defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithmsSoftware defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithms
 
Software defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithmsSoftware defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithms
 
Cognitive agent system to retrieve relevant code components from a repository
Cognitive agent system to retrieve relevant code components from a repositoryCognitive agent system to retrieve relevant code components from a repository
Cognitive agent system to retrieve relevant code components from a repository
 
Hybrid feature selection using correlation coefficient and particle swarm opt...
Hybrid feature selection using correlation coefficient and particle swarm opt...Hybrid feature selection using correlation coefficient and particle swarm opt...
Hybrid feature selection using correlation coefficient and particle swarm opt...
 
Use of artificial neural networks to identify fake profiles
Use of artificial neural networks to identify fake profilesUse of artificial neural networks to identify fake profiles
Use of artificial neural networks to identify fake profiles
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
Feature extraction for classifying students based on theirac ademic performance
Feature extraction for classifying students based on theirac ademic performanceFeature extraction for classifying students based on theirac ademic performance
Feature extraction for classifying students based on theirac ademic performance
 
Recommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance systemRecommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance system
 
Recommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance systemRecommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance system
 
Ground water prediction screenshots
Ground water prediction screenshotsGround water prediction screenshots
Ground water prediction screenshots
 
Automating e government using ai
Automating e government using aiAutomating e government using ai
Automating e government using ai
 
Prediction of quality for different type of winebased on different feature se...
Prediction of quality for different type of winebased on different feature se...Prediction of quality for different type of winebased on different feature se...
Prediction of quality for different type of winebased on different feature se...
 
Prediction of quality for different type of winebased on different feature se...
Prediction of quality for different type of winebased on different feature se...Prediction of quality for different type of winebased on different feature se...
Prediction of quality for different type of winebased on different feature se...
 
Traffic sign detection and recognition
Traffic sign detection and recognitionTraffic sign detection and recognition
Traffic sign detection and recognition
 
Internship_presentation
Internship_presentationInternship_presentation
Internship_presentation
 
Exploring trajectory prediction through machine learning methods
Exploring trajectory prediction through machine learning methodsExploring trajectory prediction through machine learning methods
Exploring trajectory prediction through machine learning methods
 

More from Venkat Projects

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docxVenkat Projects
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...Venkat Projects
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docxVenkat Projects
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docxVenkat Projects
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...Venkat Projects
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxVenkat Projects
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...Venkat Projects
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...Venkat Projects
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Venkat Projects
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...Venkat Projects
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docxVenkat Projects
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docxVenkat Projects
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docxVenkat Projects
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docxVenkat Projects
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects listVenkat Projects
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...Venkat Projects
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning techniqueVenkat Projects
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal clusterVenkat Projects
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 

More from Venkat Projects (20)

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
 
WATERMARKING IMAGES
WATERMARKING IMAGESWATERMARKING IMAGES
WATERMARKING IMAGES
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 

Machine Learning Model Autoselection for Cloud Analytics

  • 1. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Dynamic Autoselection and Autotuning ofMachine Learning Models forCloud Network Analytics Cloud networks will be monitored via signals to allocate proper resources and this resource allocating decision will be taken using machine learning algorithms such as KNN, Naïve Bayes, Random Forest, Decision Tree, Boosting, StochasticGradient, Gradient Boosting, and Multilayer Perceptron, but this algorithms accuracy may change due to changes in availability and unavailability of signal, sometime training model generated on some signal data may give high prediction accuracy and sometime it may give less accuracy if data changes. If less accuracy model chosen for prediction of cloud allocation resources then it may not give correctly predicted value. To overcome from above issue author is introducing Autoselection and Autotuning model choosing concept where application generated training model on various algorithms and generated accuracy will be voted between this algorithms to choose high accuracy model and whatever algorithms gives high accuracy then this application will automatically choose that model and tune the application to use that model for further prediction of cloud resources. By using voting concept with accuracy application can tune itself with best working model. To have best accuracy for each algorithm clustering technique will be applied on dataset to put all closer or similar data into one clusters and only that cluster will be chosen for training (all algorithms) who gave best accuracy. This application consists of following phases 1) Matching a single optimized model to a given contextin a dynamic environment. To have single training model with best accuracy in this dynamic and distributed (network) environment where data changes frequently. 2) Creating and building multiple models and selecting the best for a given context. Building multiple models with multiple algorithms to choose best one 3) Closed loop, auto-selection mechanism in the cloud DevOps environment. The concept name DevOps where selection and tuning of model will be done automatically.
  • 2. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com 4) Using unsupervised clustering to segment the dataset ahead of supervised classification. Using clustering technique to put all similar data into one cluster and choose best performing cluster for training model 5) End-to-end comparison with Ensemble Machine Learning. Can compare with other algorithms to choose best one 6) Deep learning implementation and some of its hyper parametersTuning. This algorithms can be compare with Deep Learning also but Deep Learning will take too much long time for model generation and may not suitable in this cloud services where response required quickly. To implement above concept this paper proposes 3 algorithms Model Auto Selection Algorithm: In this algorithm we will choose model from algorithm who is correctly predicting class label of given test data or providing better accuracy Model Selection with UnsupervisedLearning + Supervised Learning Algorithm: In this algorithm we will cluster data and choose only that cluster to generate training model who is giving better accuracy. Parameter Tuning with Autoselection Algorithm: Accuracy of one algorithm will be compare with other algorithm to auto select that algorithm who has best accuracy. Dataset Information To implement this paper author has used ‘UNSW-NB15’ dataset which contains information about http request attack and non-attack signatures and this dataset will be passed to application as streams (streams will consider as data coming from distributed network environment in place of signal data) and application will monitor such stream and generate training model and to predict new request contains attack signature or non-attack signatures. This dataset available inside dataset folder. This folder contains ‘DatasetURL.txt’ file which contains dataset URL from where it’s downloaded. This folder also contains ‘Dataset_Information.txt’ file which contains information about dataset such as description of dataset column. Implementation Details and Screen Shots
  • 3. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com To implement this project I design two applications called ‘StreamSender’ and ‘StreamReceiver’. StreamSender will send streams of size 500 records to StreamReceiver and this receiver contains implementation of 5 algorithms such as Random Forest, Decision Tree, KNN, StochasticGradient and Naïve Bayes. First receiver will cluster data and then each algorithm will generate model on entire stream and then generate one more model on cluster1 and cluster2. Whoever gives better accuracy will be autoselected and tune for future request data prediction. First double click on ‘run.bat’ file from StreamReceiver folder to get below screen and let it run Two screen will display in above screen where first screen display stream details and second screen will display accuracy of each and every algorithm generated from stream. Now double click on ‘run.bat’ file from StreamSender folder to get below screen
  • 4. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above screen click on ‘Upload UNSW-NB15 Cloud Monitoring Dataset’ button to upload dataset, see below screen In above screen I am uploading ‘UNSW-NB15’ dataset which contains normal and attack signature. After uploading dataset will get below screen
  • 5. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above screen we can see dataset uploaded and now click on ‘Start Streaming’ button to send stream by stream dataset to StreamReceiver application In above screen while sending stream then each stream data will be displayed in above screen table. In above screen table by reading column names u can understand what values dataset contains. In before last column we will have attack names and in last column will have 0 and 1 values where 0 is normal
  • 6. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com signature and 1 means attack signature. See last columns of above table in below screen In above screen in last column when value 1 is there then its displaying name of attack beside that column. After sending streams wait till u get below screen dialog box, this dialog box indicates all streams processed at receiver side
  • 7. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Now we can see each stream process details at StreamReceiver application screen In above screen at receiver side we can see 3 stream are received and for each stream 5 algorithms will generate training model and show its accuracy also. See below screen
  • 8. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above screen for each stream all 5 algorithms accuracy we can see and in selected line which algorithm is auto selected with best accuracy also displaying. Just scroll down above screen to see accuracy of all 3 streams with all 5 algorithms. In our implementation we can see Stochastic Gradient algorithm is giving better accuracy and same algorithm is performing better in paper also. See below screen with scroll down
  • 9. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above screen we can see accuracy for all 3 streams. Now click on ‘Accuracy Graph’ button to see accuracy in graph
  • 10. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above graph x-axis represents full features, cluster1 and 2 features and y-axis represents accuracy for full, cluster1 and 2. Each algorithm line represents with different colour and we can see all stochastic algorithm performing well compare to other algorithms. Now click on ‘Features Graph’ to see which cluster features are giving better accuracy In above graph we can see we generate 2 clusters and cluster2 features are giving better accuracy compare to cluster 1 and we can choose cluster2 as auto selected model. In above graph x-axis represents cluster1 and cluster2 features and y-axis represents accuracy