Voiceprint recognition and cloud computing data network security based on scheduling joint optimisation algorithm

被引:0
|
作者
Ma, Yinhui [1 ]
机构
[1] Jilin Technol Coll Elect Informat, Jilin 132021, Peoples R China
关键词
scheduling joint optimisation algorithm; voiceprint recognition; cloud computing; data network security; STORAGE;
D O I
10.1504/IJGEI.2023.133803
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Cloud computing is an upcoming revolution in the information technology industry due to its performance, accessibility, low cost, and many other luxury items. This is a way to maximise capacity without investing in new infrastructure, training new personnel, or licensing new software, for it provides customers with huge data storage and faster calculation speed through the internet. With the popularity of cloud computing, users store and share confidential data in the cloud, and this approach makes data security an important and difficult issue. In order to ensure data security, cloud service providers must provide efficient and feasible mechanisms to provide reliable encryption methods and appropriate access control systems. This paper takes this as the main research content, focusing on the resource scheduling algorithm and its performance optimisation, voiceprint recognition technology and its optimisation, and the joint optimisation scheduling algorithm for the cloud data network security centre. The research proves that the performance of the voiceprint recognition and cloud computing data network system based on the genetic quantum particle optimisation joint scheduling algorithm proposed in this paper has been improved. It takes the system's network convergence speed as an index, and when the path scheme reuse rate is 30%, the network convergence speed is the fastest, and the convergence time is only 0.72 s.
引用
收藏
页码:602 / 626
页数:26
相关论文
共 50 条
  • [31] Application of network virtual cloud computing data center based on fuzzy algorithm
    Liu, Yunpeng
    Dong, Xinling
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (04) : 3793 - 3801
  • [32] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [33] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [34] Data security in cloud computing
    Meng, Du
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [35] A Nephogram Recognition Algorithm Based on Cloud Computing Platform
    Li, Tao
    Wang, Lei
    Ren, Yongjun
    Li, Xiang
    2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 482 - 487
  • [36] Research on data mining method of network security situation awareness based on cloud computing
    Zhou, Ying
    Zhao, Guodong
    Alroobaea, Roobaea
    Baqasah, Abdullah M.
    Miglani, Rajan
    JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 520 - 531
  • [37] DATA MINING ALGORITHM BASED ON CLOUD COMPUTING
    Hao, Y. J.
    LATIN AMERICAN APPLIED RESEARCH, 2018, 48 (04) : 281 - 285
  • [38] E-Commerce Network Security Based on Big Data in Cloud Computing Environment
    Zeng, Yifu
    Ouyang, Shuosi
    Zhu, Tuanfei
    Li, Chuang
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [39] Study on data mining method of network security situation perception based on cloud computing
    Zhang, Yan
    Kaur, Arshpreet
    Jagota, Vishal
    Neware, Rahul
    JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 1074 - 1084
  • [40] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331