The Future of Machine Learning: Supervised, Unsupervised and Reinforcement Learning

  • Anirban Chakraborty Agartala, India
Keywords: Machine Learning, Clustering, Association, Classification, Identification

Abstract

The Machine Learning is a data analysis technique that automates the development of analytic models. It is an important field of study based on the premise that machine data can be studied and that trends and judgments can be made with little human input. On the basis of fresh discoveries, machine learning algorithms may be constructed from provided data.

References

1. Tope Komal , et al.; " Encryption and Decryption using Artificial Neural Network" , IARJSET , Vol. 2, Issue 4, April 2015 pp. 81-83
2. Yousif Elfatih Yousif, Dr.Amin Babiker A/Nabi Mustafa, Dr.Gasm Elseed Ibrahim Mohammed" Review on
3. Comparative Study of Various Cryptography Algorithms",IJARCSSE , Volume 5, Issue 4, April- 2015, pp. 51-55
4. William Stallings, “Cryptography and Network Security: Principles and practices, Dorling Kindersley (india) pvt ltd., 4th edition(2009).
5. Ajay Pal Singh , Parvez Rahi " Performance Enhancement in Public key Cryptosystems for Security using RSA
6. Algorithm " , IJARCCE , Vol. 5, Issue 11, November 2016 , pp. 359-362
7. Oludele Awodele , Olawale Jegede" Neural Networks and Its Application in Engineering ", InSITE, 2009 [6] Andrej Krenker , Janez Bešter and Andrej Kos " Introduction to the Artificial Neural Networks" , Methodological
8. Advances and Biomedical Applications
9. Manikandan.G, Rajendiran.P, Chakarapani.K, Krishnan.G, Sundarganesh.G, “A Modified Crypto Scheme for Enhancing Data Security”, Journal of Theoretical and Advanced Information Technology, Jan 2012.
10. A.Nadeem, "A performance comparison of data encryption algorithms", IEEE information and communication technologies, pp.84-89, 2006.
11. Diaasalama, Abdul kader, MohiyHadhoud, “Studying the Effect of Most Common Encryption Algorithms”, International Arab Journal of etechnology, vol 2,no.1,January 2011.
12. Atul Kahte.Cryptography and Network Security.Tata Mcgraw Hill, 2007.
13. Shasi Mehlrotra seth, Rajan Mishra “ ComparativeAnalysis of Encryption Algorithms For Data Communication”, IJCST Vol. 2, Issue 2, June 2011.
14. Wuling Ren. A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication. Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM), 2010.
15. Natalie, R. (2015). 14 Main Advantages and Disadvantages of Computer Networking, https://greengarageblog.org/14-main-advatages-and--ofcomputer-networking.
16. Anshika, G. (2013). Types of Area Networks-LAN, MAN and WAN.https://www.geeksforgeeks.org/types-ofareanetworks-lan-man-and-wan/.
17. Atayero, A., A., Alatishe, A., S., and Iruemi, J., O. (2012). Modeling and Simulation of a University LAN in OPNET Modeler Environment, International Journal of Emerging Technology and Advanced Engineering (IJETAE), Vol. 2250–2459, pp. 1-4.
18. Singh, H., Singh, S., Malhotra, R. (2013). Modeling, Evaluation and Analysis of Ring Topology for Computer Applications Using Simulation, International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 2, No. 1, pp.1 – 10.
19. Elechi, O., O. (2014). Design and Simulation of Wireless Local Area Network for Administrative Office Using OPNET Network Simulator: A Practical Approach, Information and Knowledge Management, Vol. 4, No. 10, pp. 27
Published
2023-05-31
How to Cite
Chakraborty, A. (2023). The Future of Machine Learning: Supervised, Unsupervised and Reinforcement Learning. International Journal on Orange Technologies, 5(5), 184-188. Retrieved from https://journals.researchparks.org/index.php/IJOT/article/view/4447