Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 345-348.doi: 10.11896/jsjkx.200500079

• Computer Network • Previous Articles     Next Articles

Architecture Strategy of D2D Content Edge Cache Based on Particle Swarm Optimization

MENG Li-min1, WANG Kun1 , ZHENG Zeng-qian1, JIANG Wei2   

  1. 1 College of Information Engineering,Zhejiang University of Technology,Hangzhou 310000,China
    2 College of Information Science and Technology,Zhejiang Shuren University,Hangzhou 310000,China
  • Online:2020-11-15 Published:2020-11-17
  • About author:MENG Li-min,born in 1963,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.Her main research interests include wireless communication and network,streaming mediatransmission and IoT communications.
    WANG Kun,born in 1995,postgra-duate.His main research interests include D2D edge caching and real-time streaming media communication.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61871349),Natural Science Foundation of Zhejiang Pvovince,China(LQ19F010013,LY18F010024) and Science and Technology Program of Jinhua in 2019(Public Welfare)(2019-4-176).

Abstract: In the extreme case that the communication network infrastructure is paralyzed,how to ensure the interconnection and efficient centralized control of the rescue terminal equipment network,and how to solve the problem of gathering and sharing all kinds of information on the command site are the key problems.In order to continue the information transmission and reduce the probability of interruption,this paper studies the edge cache-assisted device-to-device (D2D) communication overlay network.Method,establish a D2D communication edge cache architecture,optimize the cache index,and construct a virtual logical mapping channel of the D2D overlay network by detecting the cache architecture of the terminal nodes.A single particle based on adaptive inertial weight binary particle swarm algorithm under emergency conditions Strategy of D2D content edge cache architecture for soldier terminal equipment.Experimental results show that the algorithm's edge cache preset strategy has a higher cache index and is conducive to better information transmission.

Key words: Cache index, D2D communication, Edge cache, Particle swarm algorithm, Self-adaption

CLC Number: 

  • TP301
[1] ASADI A,MANCUSO V.Energy efficient opportunistic uplink packet forwarding in hybrid wireless networks[C]//Proceedings of ACM International Conference on Future Energy Systems.Berkeley,CA,USA,2013:261-262.
[2] ASADI A,MANCUSO V.On the compound impact of opportunistic scheduling an D2D communications in cellula networks[C]//Proceedings of ACM International Conference on Mode-ling,Analysis & Simulation of Wireless and Mobile Systems.Berkeley,CA,USA,2013:279-288.
[3] ASADI A,MANCUSO V.WiFi Direct and LTE D2D in action[C]//Proceedings of the 2013 IFIP Wireless Days (WD).Valencia,2013:1-8.
[4] GOLREZAEI N,MOLISCH A F,DIMAKIS A G.Base-station assisted device-to-device communications for high-throughput wireless video networks[C]//Proceedings of the 2012 IEEE International Conference on Communications (ICC).Ottawa,ON,2012:7077-7081.
[5] GOLREZAEI N,DIMAKIS A G,MOLISCH A F.Device-to-device collaboration through distributed storage[C]//Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM).Anaheim,CA,2012:2397-2402.
[6] RAO J,FENG H,YANG C C,et al.Optimal caching placement for D2D assisted wireless caching networks[C]//Proceedings of the 2016 IEEE International Conference on Communications (ICC).Kuala Lumpur,2016:1-6.
[7] KANG H J,PARK K Y,CHO K M,et al.Mobile caching policies for device-to-device content delivery networking[C]//Proceedings of the 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).Toronto,2014:299-304.
[8] LAN R N.Edge caching technology in terminal to cell system[D].Hangzhou:Zhejiang University,2016.
[9] BRESLAU L,PEI C,LI F,et al.Web caching and Zipf-like distributions:Evidence and implications[C]//Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communication Societies.New York,USA,1999:126-134.
[10] BACCELLI F,BLASZCZYSZYN B.Stochastic geometry andwireless networks:Volume Π applications[J].Foundations and Trends in Networks,2010(4):1-132.
[11] WANG Y,QIU F Y,GUO H D.An adaptive inertial weighted binary particle swarm optimization algorithm with mutation operator [J].Journal of Computer Systems,2019,40(4):733-737.
[12] ZHAO J X,GAO Y L,CHEN Q L.A particle swarm optimization algorithm for solving nonlinear programming problems [J].Journal of ningxia university (natural science edition),2017,38(1):15-18,22.
[13] KONSTANTION S P,BALAJI P.Arandomized Web-cachereplacement scheme[C]//Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Society.Anchorage,AK,USA,2001:1407-1415.
[14] SONG X S,GENG Y T,MENG X B.Cache-enabled device to device networks with contention-based multimedia delivery[J].IEEE Access,2019,5:3228-3239.
[15] MALAK D,AL-SHALASH M.Device-to-Device content distribution:optimal caching strategies and performance bounds[C]//Proceedings of the 2015 IEEE International Conference on Communications Workshop.Piscataway,NJ,2015:664-66.
[1] XU Ru-li, HUANG Zhang-can, XIE Qin-qin, LI Hua-feng, ZHAN Hang. Multi-threshold Segmentation for Color Image Based on Pyramid Evolution Strategy [J]. Computer Science, 2022, 49(6): 231-237.
[2] PENG Hao and HE Li-fang. Multi-threshold Segmentation for Color Image Based on Improved Tree-seed Algorithm [J]. Computer Science, 2020, 47(6A): 220-225.
[3] XIANG Wei, WANG Xin-wei. Imbalance Data Classification Based on Model of Multi-class Neighbourhood Three-way Decision [J]. Computer Science, 2020, 47(5): 103-109.
[4] NI Hong-jie, PENG Chun-xiang, ZHOU Xiao-gen, YU Li. Differential Evolution Algorithm with Stage-based Strategy Adaption [J]. Computer Science, 2019, 46(6A): 106-110.
[5] ZHANG Hui-juan, ZHANG Da-min, YAN Wei, CHEN Zhong-yun, XIN Zi-yun. Throughput Optimization Based Resource Allocation Mechanism in Heterogeneous Networks [J]. Computer Science, 2019, 46(10): 109-115.
[6] CHI Kai-kai, TANG Ze-feng, ZHU Yi-nan, SHAO Qi-ke. Efficient Multicast Schemes for D2D Multicast Cluster in Wireless Cellular Network [J]. Computer Science, 2019, 46(1): 169-174.
[7] LENG Qiang, YANG Ying-jie, HU Hao. Self-adaption Adjustment Method for Experts in Risk Assessment [J]. Computer Science, 2018, 45(12): 98-103.
[8] BAO Xiao-an, BAO Chao, JIN Yu-ting, CHEN Chun-yu, QIAN Jun-yan, ZHANG Na. Combinatorial Test Case Generation Method Based on Simplified Particle Swarm Optimizationwith Dynamic Adjustment [J]. Computer Science, 2018, 45(11): 199-203.
[9] YAN Xue-wen, DONG Chao, QU Yu-ben. Survey of D2D-based Traffic Offloading [J]. Computer Science, 2018, 45(11): 45-51.
[10] ZHANG Ai-ling, LI Peng and LIU Sheng. Algorithm of Image Salt and Pepper Noise Elimination Based on Particle Swarm Algorithm [J]. Computer Science, 2017, 44(8): 301-305.
[11] JIAO Chong-yang, ZHOU Qing-lei and ZHANG Wen-ning. MPSO and Its Application in Test Data Automatic Generation [J]. Computer Science, 2017, 44(12): 249-254.
[12] ZHU Zhi-qiang, ZHAO Zhi-yuan, SUN Lei and YANG Jie. Research on Rootkit Detection System Architecture Based on Functional Separation in Virtualized Environment [J]. Computer Science, 2016, 43(Z6): 348-352.
[13] SONG Jing-qi, LIU Hui and ZHANG Cai-ming. Medical Image Super Resolution Reconstruction Based on Adaptive Patch Clustering [J]. Computer Science, 2016, 43(Z11): 210-214.
[14] LI Zhang-wei, ZHOU Xiao-gen and ZHANG Gui-jun. Dynamic Adaptive Differential Evolution Algorithm [J]. Computer Science, 2015, 42(Z6): 52-56.
[15] ZHANG Cui-ping, GUO Zhen-zhou and GONG Chang-qing. Study on Strategy of Replica Selection in Cloud Storage Environment [J]. Computer Science, 2015, 42(Z11): 408-412.
Full text



No Suggested Reading articles found!