Computer Science ›› 2022, Vol. 49 ›› Issue (9): 260-267.doi: 10.11896/jsjkx.210800019

• Computer Network • Previous Articles     Next Articles

Collaborative Multicast Proactive Caching Scheme Based on AAE

LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao   

  1. School of Communication and Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
  • Received:2021-08-02 Revised:2021-12-10 Online:2022-09-15 Published:2022-09-09
  • About author:LIU Xin,born in 1996,postgraduate.His main research interests include mobile edge caching and edge computing.
    WANG Jun,born in 1975,Ph.D,asso-ciate professor.Her main research in-terests include network architecture of IoT and wireless sensor networks.

Abstract: With the increasing number of user terminals and the development of 5G technology,a network has been formed where macro base stations and small base stations co-exist.Meanwhile,applications such as ultra-high resolution video and cloud VR/AR have higher requirements for latency.In order to reduce the latency in 5G networks,a cooperative multicast proactive caching scheme based on adversarial automatic coding is proposed in this paper.In this scheme,firstly,users are divided into different groups based on their characteristics.And then the content that the group may request will be predicated by using AAE.To reduce the redundancy of cached contents,the ant colony algorithm is used to pre-deploy the predicted contents to each small base station.Finally,in the content distribution phase,if a user requests a content with high popularity,the content will be proactively cached in a multicast manner to other users in this group who don't send the request,otherwise it is distributed in a normal manner.Simulation results show that the CMPCAAE scheme outperforms the classical caching scheme in terms of average delay and missing ratio of the system.

Key words: Edge caching, Collaborative caching, Proactive caching, Adversarial autoencoders, Multicast, Ant colony algorithm

CLC Number: 

  • TP393
[1]GOIAN H S,AL-JARRAH O Y,MUHAIDAT S,et al.Popularity-based video caching techniques for cache-enabled networks:a survey[J/OL].IEEE Access,2019,7:27699-27719.
[2]YAHG P,ZHANG N,ZHANG S,et al.Content Popularity Prediction Towards Location-Aware Mobile Edge Caching[J].IEEE Transactions on Multimedia,2019,21(4):915-929.
[3]MAO Y,YOU C,ZHANG J,et al.A survey on mobile edge computing:The communication perspective[J].IEEE Communications Surveys & Tutorials,2017,19(4):2322-2358.
[4]ZHU X D,YANG Y,LIU Z J,et al.C-Aware:A cache management algorithm considering cache media access characteristic in cloud computing[J].Mathematical Problems in Engineering,2013,2013(9):1-13.
[5]ZHANG S,SUN W,LIU J.Spatially cooperative caching andoptimization for heterogeneous network[J].IEEE Transactions on Vehicular Technology,2019,68(11):11260-11270.
[6]JIAO L,YIN H,WU Y.Dynamic resource allocation for scalable video streaming in OFDMA wireless networks[J/OL].IEEE Access,2020,8:33489-33499.
[7]SHAFIQ M Z,JI L,LIU A X,et al.A first look at cellular network performance during crowded events[J].ACM SIGMETRICS Performance Evaluation Review,2013,41(1):17-28.
[8]ZHOU B,CUI Y,TAO M.Optimal dynamic multicast scheduling for cache-enabled content-centric wireless networks[J].IEEE Transactions on Communications,2017,65(7):2956-2970.
[9]YAO J,HAN T,ANSARI N.On mobile edge caching[J].IEEE Communications Surveys & Tutorials,2019,21(3):2525-2553.
[10]ROY S D,MEI T,ZENG W,et al.Towards cross-domain lear-ning for social video popularity prediction[J].IEEE Transactions on Multimedia,2013,15(6):1255-1267.
[11]TAN J,LIU W,WANG T,et al.A high-accurate content popularity prediction computational modeling for mobile edge computing using matrix completion technology[J/OL].Transactions on Emerging Telecommunications Technologies,2021,32(6).
[12]JAIN A K.Data clustering:50 years beyond K-means[J].Pattern Recognition Letters,2010,31(8):651-666.
[13]CUI Z,XU X,FEI X U E,et al.Personalized recommendation system based on collaborative filtering for IoT scenarios[J].IEEE Transactions on Services Computing,2020,13(4):685-695.
[14]BENGIO Y,LAUFER E,ALAIN G,et al.Deep generative stochastic networks trainable by backprop[C]//International Conference on Machine Learning.PMLR,2014:226-234.
[15]YU Z,HU J,MIN G,et al.Mobility-aware proactive edge ca-ching for connected vehicles using federated learning[J].IEEE Transactions on Intelligent Transportation Systems,2020,22(8):5341-5351.
[16]WU E,CUI H,WELSCH R E.Dual Autoencoders Generative Adversarial Network for Imbalanced Classification Problem[J/OL].IEEE Access,2020,8:91265-91275.
[17]MICHALOPOULOS D S,VIERING I,DU L.User-plane multi-connectivity aspects in 5G[C]//International Conference on Telecommunications(ICT).IEEE,2016:1-5.
[18]DORIGO M,BIRATTARI M,STUTZLE T.Ant colony optimization[J].IEEE Computational Intelligence Magazine,2006,1(4):28-39.
[19]DENG W,XU J,SONG Y,et al.An effective improved co-evolution ant colony optimisation algorithm with multi-strategies and its application[J].International Journal of Bio-Inspired Computation,2020,16(3):158-170.
[20]SONMEZ C,OZGOVDE A,ERSOY C.Edgecloudsim:An environment for performance evaluation of edge computing systems[J/OL].Transactions on Emerging Telecommunications Technologies,2018,29(11).
[21]KWAK J,KIM Y,LE L B,et al.Hybrid content caching in 5G wireless networks:Cloud versus edge caching[J].IEEE Transa-ctions on Wireless Communications,2018,17(5):3030-3045.
[22]HARPER F M,KONSTAN J A.The movielens datasets:History and context[J].ACM Transactions on Interactive Intelligent Systems(TIIS),2015,5(4):1-19.
[1] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
[2] CHENG Zhao-wei, SHEN Hang, WANG Yue, WANG Min, BAI Guang-wei. Deep Reinforcement Learning Based UAV Assisted SVC Video Multicast [J]. Computer Science, 2021, 48(9): 271-277.
[3] SUN Zhen-qiang, LUO Yong-long, ZHENG Xiao-yao, ZHANG Hai-yan. Intelligent Travel Route Recommendation Method Integrating User Emotion and Similarity [J]. Computer Science, 2021, 48(6A): 226-230.
[4] JI Xiao-xiang, SHEN Hang, BAI Guang-wei. Non-orthogonal Multiple Access Enabled Scalable Video Multicast in HetNets [J]. Computer Science, 2021, 48(11): 356-362.
[5] GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen. WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm [J]. Computer Science, 2020, 47(7): 307-313.
[6] TIAN Xian-zhen, SUN Li-qiang, TIAN Zhen-zhong. Image Reconstruction Based on Ant Colony Algorithm [J]. Computer Science, 2020, 47(11A): 231-235.
[7] CAO Yi-qin, WU Dan, HUANG Xiao-sheng. Track Defect Image Classification Based on Improved Ant Colony Algorithm [J]. Computer Science, 2019, 46(8): 292-297.
[8] ZHENG Ben-li, LI Yue-hui. Study on SDN Network Load Balancing Based on IACO [J]. Computer Science, 2019, 46(6A): 291-294.
[9] ZHANG Na, XU Hai-xia, BAO Xiao-an, XU Lu, WU Biao. Multi-objective Test Case Prioritization Method Combined with Dynamic Reduction [J]. Computer Science, 2019, 46(12): 208-212.
[10] LI Shan-shan, LIU Fu-jiang, LIN Wei-hua. Path Planning Method of Large-scale Fire Based on Multiple Starting Points and Multiple Rescue Points [J]. Computer Science, 2019, 46(11A): 134-137.
[11] CHENG Zhen, ZHAO Hui-ting, ZHANG Yi-ming, LIN Fei. Bit Error Rate Analysis of Diffusion-based Multicast Molecular Communication Networks [J]. Computer Science, 2019, 46(11): 80-87.
[12] CHI Kai-kai, TANG Ze-feng, ZHU Yi-nan, SHAO Qi-ke. Efficient Multicast Schemes for D2D Multicast Cluster in Wireless Cellular Network [J]. Computer Science, 2019, 46(1): 169-174.
[13] DENG Xia, CHANG Le, LIANG Jun-bin, JIANG Chan. Survey on Multicast Routing in Mobile Opportunistic Networks [J]. Computer Science, 2018, 45(6): 19-26.
[14] LI Hang, ZANG Lie, GAN Lu. Search of Speculative Symbolic Execution Path Based on Ant Colony Algorithm [J]. Computer Science, 2018, 45(6): 145-150.
[15] LIU Jun, XU Ping-ping, WU Gui-lu, PENG Jie. PSO-ACO Fusion Algorithm Based on Optimal Path Planning in Indoor Environment [J]. Computer Science, 2018, 45(11A): 97-100.
Full text



No Suggested Reading articles found!