Computer Science ›› 2019, Vol. 46 ›› Issue (6): 201-205.doi: 10.11896/j.issn.1002-137X.2019.06.030

Previous Articles     Next Articles

Database-level Web Cache Replacement Strategy Based on SVM Access Prediction Mechanism

YANG Rui-jun1, ZHU Ke1, CHENG Yan2   

  1. (School of Computer Science and Information Engineering,Shanghai Institute of Technology,Shanghai 201418,China)1
    (School of Criminal Justice,East China University of Political Science and Law,Shanghai 201620,China)2
  • Received:2018-05-28 Published:2019-06-24

Abstract: Web cache is used to solve the problems of network access delay and network congestion,and cache replacement strategy directly affects the hit rate of cache.For this reason,this paper proposed a database-level Web cache replacement strategy based on SVM access prediction mechanism.Firstly,according to previous access logs of users,a feature data set is constructed on the basis of extracting multiple features through a pre-processing operation.Then,a Support Vector Machine (SVM) classifier is trained to predict whether a cached object is likely to be accessed again in the future,and the cached objects that are classified as not being accessed are deleted to free memory.Simulation results show that,compared with the traditional LRU,LFU and GDSF schemes,this strategy has higher request hit rate and byte hit rate.

Key words: Web cache, Replacement strategy, Access prediction mechanism, Support vector machine

CLC Number: 

  • TP393
[1]WANG G Q,HUANG T,LIU J,et al.A New Cache Policy Based on Sojourn Time in Content-Centric Networking[J].Chinese Journal of Computers,2015,38(3):472-482.(in Chinese)
[2]ZHAO Z Q,LIU D.Web Proxy Server Cache Optimization Based on Tree Extended Naive Bayes Classifier[J].Computer Engineering,2017,43(1):115-119.(in Chinese)
[3]HAO Y,MA T,SHEN W,et al.An Improved Web Cache Replacement Algorithm Based on Weighting and Cost[J].IEEE Access,2018,25(6):1352-1360.
[4]WANG Y G,LI Z Y,WU Q H,et al.Performance Analysis and Optimization of Cache Replacement Algorithm in Information Center Network[J].Journal of Computer Research and Development,2015,52(9):2046-2055.(in Chinese)
[5]SHEU J P,CHUO Y C.Wildcard Rules Caching and Cache Re-placement Algorithms in Software-Defined Networking[J].IEEE Transactions on Network & Service Management,2016,13(1):19-29.
[6]ZHANG J.Replacement Strategy of Web Cache Based on Data Mining[C]∥International Conference on P2p,Parallel,Grid,Cloud and Internet Computing.IEEE,2015:821-823.
[7]MA T,QU J,SHEN W,et al.Weighted Greedy Dual Size Frequency based Caching Replacement Algorithm[J].IEEE Access,2018,25(6):7214-7223.
[8]SAJEEV G P,SEBASTIAN M P.Comparing the Performance of Multinomial Logistic Regression and Neural Network Models in Web Cache Content Classification[C]∥International Confe-rence on Machine Learning and Computing.2011:53-58.
[9]WANG Z,HE Y L.Cloud storage cache replacement scheme based on hybrid value calculation[J].Computer Engineering and Design,2017,38(6):1651-1656.(in Chinese)
[10]CHENG G,CHEN Y X.Identification method of encrypted traffic based on support vector machine[J].Journal of Southeast University(Natural Science Edition),2017,47(4):655-659.(in Chinese)
[11]ALI F,KHAN P,RIAZ K,et al.A Fuzzy Ontology and SVM-based Web Content Classification System[J].IEEE Access,2017,24(5):25781-25797.
[12]ERGUL E,ARICA N,AHUJA N,et al.Clustering Through Hybrid Network Architecture With Support Vectors[J].IEEE Transactions on Neural Networks & Learning Systems,2016,28(6):1373-1385.
[13]AIMTONGKHAM P,SO-IN C,SANGUANPONG S.A novel web caching scheme using hybrid least frequently used and support vector machine[C]∥International Joint Conference on Computer Science and Software Engineering.IEEE,2016:1-6.
[14]WU X,XU H,ZHU X,et al.Web Cache Replacement Strategy Based on Reference Degree[C]∥IEEE International Conference on Smart City/socialcom/sustaincom.IEEE,2015:209-212.
[15]EVERT S,BARONI M.zipfR:word frequency distributions in R[C]∥Meeting of the ACL on Interactive Poster and Demonstration Sessions.Association for Computational Linguistics,2007:29-32.
[1] CAO Su-e, YANG Ze-min. Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine [J]. Computer Science, 2020, 47(8): 319-322.
[2] SONG Yan, HU Rong-hua, GUO Fu-min, YUAN Xin-liang and XIONG Rui-yang. Improved SVM+BP Algorithm for Muscle Force Prediction Based on sEMG [J]. Computer Science, 2020, 47(6A): 75-78.
[3] FANG Meng-lin, TANG Wen-bing, HUANG Hong-yun and DING Zuo-hua. Wall-following Navigation of Mobile Robot Based on Fuzzy-based Information Decomposition and Control Rules [J]. Computer Science, 2020, 47(6A): 79-83.
[4] XU Xiang-yan and HOU Rui-huan. Medium and Long-term Population Prediction Based on GM(1,1)-SVM Combination Model [J]. Computer Science, 2020, 47(6A): 485-487.
[5] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[6] YANG Li, LI Xin-yu, SHI Huai-feng, PAN Cheng-sheng. Task Intelligent Identification Method for Spatial Information Network [J]. Computer Science, 2020, 47(4): 262-269.
[7] GAO Nan,LI Li-juan,Wei-william LEE,ZHU Jian-ming. Keywords Extraction Method Based on Semantic Feature Fusion [J]. Computer Science, 2020, 47(3): 110-115.
[8] WU Yu-kun,XIAO Jie,Wei William LEE,LOU Ji-lin. Support Vector Machine Model Based on Grey Wolf Optimization Fused Asymptotic [J]. Computer Science, 2020, 47(2): 37-43.
[9] ZHU Xiao-ling, LI Kun, ZHANG Chang-sheng, DU Fu-xin. Elevator Boot Fault Diagnosis Method Based on Gabor Wavelet Transform and Multi-coreSupport Vector Machine [J]. Computer Science, 2020, 47(12): 258-261.
[10] ZHAO Rui-jie, SHI Yong, ZHANG Han, LONG Jun, XUE Zhi. Webshell File Detection Method Based on TF-IDF [J]. Computer Science, 2020, 47(11A): 363-367.
[11] ZHOU Yu, REN Qin-chai, NIU Hui-bin. Research on Training Sample Data Selection Methods [J]. Computer Science, 2020, 47(11A): 402-408.
[12] LI Bao-sheng, QIN Chuan-dong. Study on Electric Vehicle Price Prediction Based on PSO-SVM Multi-classification Method [J]. Computer Science, 2020, 47(11A): 421-424.
[13] YAO Mu-yan, TAO Dan. Implicit Authentication Mechanism of Pattern Unlock Based on Over-sampling and One-class Classification for Smartphones [J]. Computer Science, 2020, 47(11): 19-24.
[14] TIAN Chun-yuan, YU Jiang, CHANG Jun, WANG Yan-shun. NWI:CSI Based Non-line-of-sight Signal Recognition Method [J]. Computer Science, 2020, 47(11): 327-332.
[15] JIN Yao,XU Li-ya,LV Hui-lin,GU Su-hang. Stacked Support Vector Machine Based on Attacks on Labels of Data Samples [J]. Computer Science, 2020, 47(1): 110-116.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .