IDEAS home Printed from https://ideas.repec.org/a/ids/ijgeni/v45y2023i6p602-626.html
   My bibliography  Save this article

Voiceprint recognition and cloud computing data network security based on scheduling joint optimisation algorithm

Author

Listed:
  • Yinhui Ma

Abstract

Cloud computing is an upcoming revolution in the information technology industry due to its performance, accessibility, low cost, and many other luxury items. This is a way to maximise capacity without investing in new infrastructure, training new personnel, or licensing new software, for it provides customers with huge data storage and faster calculation speed through the internet. With the popularity of cloud computing, users store and share confidential data in the cloud, and this approach makes data security an important and difficult issue. In order to ensure data security, cloud service providers must provide efficient and feasible mechanisms to provide reliable encryption methods and appropriate access control systems. This paper takes this as the main research content, focusing on the resource scheduling algorithm and its performance optimisation, voiceprint recognition technology and its optimisation, and the joint optimisation scheduling algorithm for the cloud data network security centre. The research proves that the performance of the voiceprint recognition and cloud computing data network system based on the genetic quantum particle optimisation joint scheduling algorithm proposed in this paper has been improved. It takes the system's network convergence speed as an index, and when the path scheme reuse rate is 30%, the network convergence speed is the fastest, and the convergence time is only 0.72 s.

Suggested Citation

  • Yinhui Ma, 2023. "Voiceprint recognition and cloud computing data network security based on scheduling joint optimisation algorithm," International Journal of Global Energy Issues, Inderscience Enterprises Ltd, vol. 45(6), pages 602-626.
  • Handle: RePEc:ids:ijgeni:v:45:y:2023:i:6:p:602-626
    as

    Download full text from publisher

    File URL: http://www.inderscience.com/link.php?id=133803
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ids:ijgeni:v:45:y:2023:i:6:p:602-626. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sarah Parker (email available below). General contact details of provider: http://www.inderscience.com/browse/index.php?journalID=13 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.