Back to Search Start Over

Efficient scheduling technology for a bioidentification simulation model based on a lightweight container.

Authors :
Yu, Chunyang
Xu, Jun
Source :
Neural Computing & Applications. Jun2024, Vol. 36 Issue 17, p9767-9777. 11p.
Publication Year :
2024

Abstract

With the rapid development of biometric technology, an increasing number of application scenarios require biometric identification systems for identity authentication, such as cell phones, gate control, and banks. The performance and operational efficiency of bioidentification systems directly impact their effectiveness in application scenarios. Traditional bioidentification technology requires a large number of devices and sites to build bioidentification systems. Bioidentification simulation model technology based on lightweight containers can simulate bioidentification systems in different scenarios through virtualization technology, which can save hardware costs while enabling efficient testing and debugging. In this context, improving the operational efficiency of bioidentification simulation models has become an important research direction. In this paper, efficient scheduling technology for a bioidentification simulation model based on lightweight containers is investigated to explore how to use container technology to improve the operational efficiency and security of the bioidentification simulation model to better serve modern bioidentification applications. For a 4-core 4G light load, the results show that the response time based on the resource scheduling strategy was 30 ms and the throughput was 30 requests per second; in contrast, the response time based on the load scheduling strategy was 45 ms, and the throughput was 27 requests per second. The system performance with the resource scheduling strategy under the same load with identical containers was significantly better than that under the load scheduling strategy. By using lightweight container technology, the operational efficiency of the bioidentification simulation model can be effectively improved while also improving the security of the system. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
09410643
Volume :
36
Issue :
17
Database :
Academic Search Index
Journal :
Neural Computing & Applications
Publication Type :
Academic Journal
Accession number :
177481496
Full Text :
https://doi.org/10.1007/s00521-023-09229-x