{"title":"数据计算网络的CNN技术安全检测","authors":"Doaa Mohsin Abd Ali","doi":"10.31185/wjps.122","DOIUrl":null,"url":null,"abstract":"The hypothetical as well as system derivation have been shaped by data computing into the analysis of tomorrow. The global computing framework is rapidly influencing cloud development. The security aspects in a cloud-based computing environment remain at the middle of attention, despite the fact that it is important to take further period for could investigation by motivating it to separate fields. The development of cloud subordinate divisions and expert centers has resulted in the provision of optional mission design that is subject to cloud advancement. In order to guard against the potential consequences of being exposed to undesirable communal contests in cases such that, the cloud servers it is adjusted to store such data, weak info of various parameters is typically stored in servers using wireless locations with the presence of various cloud-based systems using geographically consumed info networks producers. The flexibility and benefits of cloud computing will be difficult to accept if the security is inadequate. This study examines cloud analyzing and cloud structure while also addressing security concerns and information computing standards. In addition, a new adversaries administration security strategy based on CNN will be proposed and compared to other readily available security regions. The obtained results for the CNN algorithm show a success rate of 100% with only 0.18 losses at batch number of 2*104. Also the confusion matrix show a very high classification measure for the trained samples among the target with resulting classes.","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"CNN Technique Security Inspection for Data Computing Networks\",\"authors\":\"Doaa Mohsin Abd Ali\",\"doi\":\"10.31185/wjps.122\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The hypothetical as well as system derivation have been shaped by data computing into the analysis of tomorrow. The global computing framework is rapidly influencing cloud development. The security aspects in a cloud-based computing environment remain at the middle of attention, despite the fact that it is important to take further period for could investigation by motivating it to separate fields. The development of cloud subordinate divisions and expert centers has resulted in the provision of optional mission design that is subject to cloud advancement. In order to guard against the potential consequences of being exposed to undesirable communal contests in cases such that, the cloud servers it is adjusted to store such data, weak info of various parameters is typically stored in servers using wireless locations with the presence of various cloud-based systems using geographically consumed info networks producers. The flexibility and benefits of cloud computing will be difficult to accept if the security is inadequate. This study examines cloud analyzing and cloud structure while also addressing security concerns and information computing standards. In addition, a new adversaries administration security strategy based on CNN will be proposed and compared to other readily available security regions. The obtained results for the CNN algorithm show a success rate of 100% with only 0.18 losses at batch number of 2*104. Also the confusion matrix show a very high classification measure for the trained samples among the target with resulting classes.\",\"PeriodicalId\":167115,\"journal\":{\"name\":\"Wasit Journal of Pure sciences\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wasit Journal of Pure sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31185/wjps.122\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wasit Journal of Pure sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31185/wjps.122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
CNN Technique Security Inspection for Data Computing Networks
The hypothetical as well as system derivation have been shaped by data computing into the analysis of tomorrow. The global computing framework is rapidly influencing cloud development. The security aspects in a cloud-based computing environment remain at the middle of attention, despite the fact that it is important to take further period for could investigation by motivating it to separate fields. The development of cloud subordinate divisions and expert centers has resulted in the provision of optional mission design that is subject to cloud advancement. In order to guard against the potential consequences of being exposed to undesirable communal contests in cases such that, the cloud servers it is adjusted to store such data, weak info of various parameters is typically stored in servers using wireless locations with the presence of various cloud-based systems using geographically consumed info networks producers. The flexibility and benefits of cloud computing will be difficult to accept if the security is inadequate. This study examines cloud analyzing and cloud structure while also addressing security concerns and information computing standards. In addition, a new adversaries administration security strategy based on CNN will be proposed and compared to other readily available security regions. The obtained results for the CNN algorithm show a success rate of 100% with only 0.18 losses at batch number of 2*104. Also the confusion matrix show a very high classification measure for the trained samples among the target with resulting classes.