Voiceprint recognition and cloud computing data network security based on scheduling joint optimisation algorithm

被引:0
|
作者
Ma, Yinhui [1 ]
机构
[1] Jilin Technol Coll Elect Informat, Jilin 132021, Peoples R China
关键词
scheduling joint optimisation algorithm; voiceprint recognition; cloud computing; data network security; STORAGE;
D O I
10.1504/IJGEI.2023.133803
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Cloud computing is an upcoming revolution in the information technology industry due to its performance, accessibility, low cost, and many other luxury items. This is a way to maximise capacity without investing in new infrastructure, training new personnel, or licensing new software, for it provides customers with huge data storage and faster calculation speed through the internet. With the popularity of cloud computing, users store and share confidential data in the cloud, and this approach makes data security an important and difficult issue. In order to ensure data security, cloud service providers must provide efficient and feasible mechanisms to provide reliable encryption methods and appropriate access control systems. This paper takes this as the main research content, focusing on the resource scheduling algorithm and its performance optimisation, voiceprint recognition technology and its optimisation, and the joint optimisation scheduling algorithm for the cloud data network security centre. The research proves that the performance of the voiceprint recognition and cloud computing data network system based on the genetic quantum particle optimisation joint scheduling algorithm proposed in this paper has been improved. It takes the system's network convergence speed as an index, and when the path scheme reuse rate is 30%, the network convergence speed is the fastest, and the convergence time is only 0.72 s.
引用
收藏
页码:602 / 626
页数:26
相关论文
共 50 条
  • [21] Network Security Evaluation Model Based on Cloud Computing
    Yang, Jin
    Wang, Cilin
    Yu, Le
    Liu, Caiming
    Peng, Lingxi
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 488 - 495
  • [22] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [23] Data security in cloud computing
    Meng, Du
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [24] Application of network virtual cloud computing data center based on fuzzy algorithm
    Liu, Yunpeng
    Dong, Xinling
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (04) : 3793 - 3801
  • [25] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [26] A Nephogram Recognition Algorithm Based on Cloud Computing Platform
    Li, Tao
    Wang, Lei
    Ren, Yongjun
    Li, Xiang
    2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 482 - 487
  • [27] Study on data mining method of network security situation perception based on cloud computing
    Zhang, Yan
    Kaur, Arshpreet
    Jagota, Vishal
    Neware, Rahul
    JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 1074 - 1084
  • [28] Security of Big Data Based on the Technology of Cloud Computing
    Zhou, Xiaojun
    Lin, Ping
    Li, Zhiyong
    Wang, Yunpeng
    Tan, Wei
    Huang, Meng
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 703 - 706
  • [29] Task Scheduling Algorithm in Cloud Computing Environment Based on Cloud Pricing Models
    Ibrahim, Elhossiny
    El-Bahnasawy, Nirmeen A.
    Omara, Fatma A.
    2016 WORLD SYMPOSIUM ON COMPUTER APPLICATIONS & RESEARCH (WSCAR), 2016, : 65 - 71
  • [30] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370