{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T21:55:42Z","timestamp":1771019742447,"version":"3.50.1"},"reference-count":24,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2021,8,24]]},"abstract":"<jats:p>Traditionally, the recognition of sound mainly focuses on the source of sound, such as level and quality. Now, the sound, the environment, and the listeners have begun to study the landscape structure, composition, and characteristics of the acoustic environment. The purpose of this paper is to study the simulation design of virtual reality voice landscape quantification based on cloud computing. Firstly, the definition and characteristics of cloud computing are described, and the key technologies of cloud computing are analyzed. Combined with the basic principles of technology selection, the virtualization technology is emphatically analyzed. By selecting 7 acoustic elements, such as traffic sound, water flow sound, fountain sound, birdsong, wind sound, rippling sound, beach sound, and seabird sound, the possible acoustic elements in a given park environment are simulated for subjective evaluation. The experimental results show that when the traffic sound is 60\u2009dB, the evaluation result of the superimposed sound type is the same as that when the traffic sound is 50\u2009dB. For the superimposed sound level, 30\u2009dB and 40\u2009dB are significantly different from 60\u2009dB and 70\u2009dB, respectively, 50\u2009dB is only significantly different from 70\u2009dB, while 60\u2009dB is only not significantly different from 50\u2009dB, and 70\u2009dB evaluation is significantly different from each sound level. However, 60\u2009dB can be regarded as the turning point of the evaluation result. When the sound level of the added sound is greater than 60\u2009dB, the evaluation result is obviously worse.<\/jats:p>","DOI":"10.1155\/2021\/9155214","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T17:58:10Z","timestamp":1629827890000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["Simulation Design and Implementation of Voice Landscape Quantification in Virtual Reality Based on Cloud Computing"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2937-1510","authenticated-orcid":true,"given":"Jialin","family":"Gang","sequence":"first","affiliation":[{"name":"School of Digital Arts and Design, Dalian Neusoft University of Information, Dalian 116023, Liaoning, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8598-0981","authenticated-orcid":true,"given":"Yi","family":"Li","sequence":"additional","affiliation":[{"name":"School of Digital Arts and Design, Dalian Neusoft University of Information, Dalian 116023, Liaoning, China"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"311","reference":[{"issue":"2","key":"1","first-page":"1","article-title":"Quantification of intensity of landscape changes using remote sensing and GIS with special reference to the Bhuj earthquake (26th January, 2001, M\u2009\u2009=\u2009\u20097.9)","volume":"83","author":"J. Ketaki","year":"2016","journal-title":"Natural Hazards"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0174364"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1093\/beheco\/aru158"},{"issue":"1","key":"4","first-page":"22","article-title":"Estimating the recreational value of taal Volcano protected landscape, Philippines using benefit transfer","volume":"18","author":"A. B. Vista","year":"2015","journal-title":"Journal of Environmental Science & Management"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s13364-015-0252-y"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1353\/psg.2015.0044"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1121\/1.5014845"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2014.2321378"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1199-3"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-014-0404-x"},{"issue":"C","key":"11","first-page":"684","article-title":"Cloud things construction-the integration of internet of things and cloud computing","volume":"56","author":"S. R. Chandra","year":"2016","journal-title":"Future Generation Computer Systems"},{"issue":"11","key":"12","first-page":"1063","article-title":"Ad hoc cloud computing: from concept to realization","volume":"265","author":"G. A. Mcgilvary","year":"2015","journal-title":"Computer Science"},{"issue":"2","key":"13","first-page":"95","article-title":"A review on data security in cloud computing","volume":"96","author":"A. A. Soofi","year":"2017","journal-title":"International Journal of Computer Applications"},{"issue":"5","key":"14","first-page":"1","article-title":"Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing","volume":"65","author":"W. Zhang","year":"2015","journal-title":"IEEE Transactions on Computers"},{"issue":"C","key":"15","first-page":"173","article-title":"Resource scheduling for infrastructure as a service (IaaS) in cloud computing: challenges and opportunities","volume":"68","author":"M. Hamid","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"16","first-page":"1943","article-title":"Optimal cloud computing resource allocation for demand side management in smart grid","volume":"8","author":"Z. Cao","year":"2017","journal-title":"IEEE Transactions on Smart Grid"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2015.2397863"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2774439"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2016.2619369"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.08.053"},{"issue":"3","key":"21","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1016\/j.im.2015.10.004","article-title":"Understanding behavioral intention to use a cloud computing classroom: a multiple model-comparison approach","volume":"53","author":"W.-L. Shiau","year":"2015","journal-title":"Information & Management"},{"issue":"2","key":"22","first-page":"1","article-title":"Malware detection in cloud computing infrastructures","volume":"13","author":"M. R. Watson","year":"2015","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0490-4"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.015"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/9155214.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/9155214.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/9155214.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T17:58:27Z","timestamp":1629827907000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2021\/9155214\/"}},"subtitle":[],"editor":[{"given":"Sang-Bing","family":"Tsai","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocab":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2021,8,24]]},"references-count":24,"alternative-id":["9155214","9155214"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9155214","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"value":"1875-905X","type":"electronic"},{"value":"1574-017X","type":"print"}],"subject":[],"published":{"date-parts":[[2021,8,24]]}}}