{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:38:58Z","timestamp":1740123538805,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Industrial field of general projects of science and Technology Department of Shaanxi Province","award":["2020GY-012"],"award-info":[{"award-number":["2020GY-012"]}]},{"name":"Industrialization Project of Shaanxi Provincial Department of Education","award":["21JC017"],"award-info":[{"award-number":["21JC017"]}]},{"name":"Natural Science Foundation of Shannxi Province, China","award":["2014JM2-6127"],"award-info":[{"award-number":["2014JM2-6127"]}]},{"name":"scientific research Foundation for the returned overseas Chinese scholars","award":["SEM No.[2014] 1685"],"award-info":[{"award-number":["SEM No.[2014] 1685"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872284"],"award-info":[{"award-number":["61872284"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key R&D Program Project","award":["2019YFD1100901"],"award-info":[{"award-number":["2019YFD1100901"]}]},{"name":"Yulin science and technology project","award":["2019-175"],"award-info":[{"award-number":["2019-175"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11227-022-05029-7","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T22:03:33Z","timestamp":1674079413000},"page":"9584-9603","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic decision-making strategy of replica number based on data hot"],"prefix":"10.1007","volume":"79","author":[{"given":"Qinlu","family":"He","sequence":"first","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Genqing","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Weiqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,18]]},"reference":[{"issue":"3","key":"5029_CR1","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1109\/JSAC.2019.2894555","volume":"37","author":"W Chang","year":"2019","unstructured":"Chang W, Wang P (2019) Write-aware replica placement for cloud computing. IEEE J Sel Areas Commun 37(3):656\u2013667","journal-title":"IEEE J Sel Areas Commun"},{"key":"5029_CR2","doi-asserted-by":"crossref","unstructured":"Fu X, Li J, Liu W, Deng S and Wang J, (2019) Data replica placement policy based on load balance in cloud storage system. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, pp 682\u2013685","DOI":"10.1109\/ITNEC.2019.8728995"},{"key":"5029_CR3","doi-asserted-by":"crossref","unstructured":"Ibrahim IA and Bassiouni M (2019) Improvement of data throughput in data-intensive cloud computing applications. In: 2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (Big Data Service), Newark, CA, USA, pp 49\u201353","DOI":"10.1109\/BigDataService.2019.00013"},{"issue":"2","key":"5029_CR4","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TNSM.2017.2788945","volume":"15","author":"A Aral","year":"2018","unstructured":"Aral A, Ovatman T (2018) A decentralized replica placement algorithm for edge computing. IEEE Trans Netw Serv Manage 15(2):516\u2013529","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"4","key":"5029_CR5","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1109\/TSC.2015.2481421","volume":"11","author":"L Cui","year":"2018","unstructured":"Cui L, Zhang J, Yue L, Shi Y, Li H, Yuan D (2018) A genetic algorithm based data replica placement strategy for scientific applications in clouds. IEEE Trans Serv Comput 11(4):727\u2013739","journal-title":"IEEE Trans Serv Comput"},{"issue":"11","key":"5029_CR6","doi-asserted-by":"publisher","first-page":"2568","DOI":"10.1109\/TPDS.2018.2837743","volume":"29","author":"C Guerrero","year":"2018","unstructured":"Guerrero C, Lera I, Bermejo B, Juiz C (2018) Multi-objective optimization for virtual machine allocation and replica placement in virtualized hadoop. IEEE Trans Parallel Distrib Syst 29(11):2568\u20132581","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"5029_CR7","doi-asserted-by":"crossref","unstructured":"L. Zhang et al., 2018 Cost-effective and traffic-optimal data placement strategy for cloud-based online social networks. In: 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD), Nanjing, pp 110\u2013115","DOI":"10.1109\/CSCWD.2018.8465343"},{"issue":"7","key":"5029_CR8","first-page":"68","volume":"28","author":"Z Ping","year":"2018","unstructured":"Ping Z, Shengxi L (2018) Research on optimization of HDFS dynamic copy factor. Comput Technol Develop 28(7):68\u201372","journal-title":"Comput Technol Develop"},{"issue":"4","key":"5029_CR9","first-page":"138","volume":"43","author":"LI Gongli","year":"2015","unstructured":"Gongli LI, Xiaoyan Z, Hui L (2015) A cloud computing data copy dynamic management strategy. J Henan Norm Univ Nat Sci Edit 43(4):138\u2013143","journal-title":"J Henan Norm Univ Nat Sci Edit"},{"key":"5029_CR10","first-page":"62","volume":"2","author":"Z Song","year":"2015","unstructured":"Song Z, Qingwei D, Jing S et al (2015) Cloud-based hot data copy factor decision algorithm based on prediction. Comput Mod 2:62\u201366","journal-title":"Comput Mod"},{"issue":"S1","key":"5029_CR11","first-page":"431","volume":"46","author":"X Lili","year":"2019","unstructured":"Lili X, Hong L, Jin L (2019) Research on population prediction based on grey prediction and radial basis network. Comput Sci 46(S1):431\u2013435","journal-title":"Comput Sci"},{"issue":"20","key":"5029_CR12","first-page":"45","volume":"46","author":"W Bingzhou","year":"2016","unstructured":"Bingzhou W, Ruixia S (2016) Forecast of my country\u2019s energy demand based on combined model. Math Pract Theory 46(20):45\u201353","journal-title":"Math Pract Theory"},{"issue":"6","key":"5029_CR13","first-page":"39","volume":"56","author":"L Jiayue","year":"2020","unstructured":"Jiayue L, Bo Z, Xiang LI et al (2020) Anomaly prediction method of network traffic based on deep learning. Comput Eng Appl 56(6):39\u201350","journal-title":"Comput Eng Appl"},{"issue":"3","key":"5029_CR14","first-page":"235","volume":"36","author":"L Fuzhong","year":"2019","unstructured":"Fuzhong L (2019) Prediction and simulation of damage rate of high energy consumption equipment in physics laboratory. Comput Simul 36(3):235\u2013238","journal-title":"Comput Simul"},{"key":"5029_CR15","doi-asserted-by":"crossref","unstructured":"Liu Y Wu CQ Wang M Hou A and Wang Y (2018) On a Dynamic data placement strategy for heterogeneous hadoop clusters. In: 2018 International Symposium on Networks, Computers and Communications (ISNCC), Rome pp 1-7","DOI":"10.1109\/ISNCC.2018.8530970"},{"key":"5029_CR16","doi-asserted-by":"crossref","unstructured":"Zhao Y, Li C, Li L and Zhang P, (2017) Dynamic replica creation strategy based on file hot and node load in hybrid cloud. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, pp 213\u2013220","DOI":"10.23919\/ICACT.2017.7890086"},{"key":"5029_CR17","doi-asserted-by":"crossref","unstructured":"Qu K Meng L Yang Y (2016) A dynamic replica strategy based on Markov model for hadoop distributed file system (HDFS). In: 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS), Beijing, pp 337\u2013342","DOI":"10.1109\/CCIS.2016.7790280"},{"issue":"9","key":"5029_CR18","first-page":"1205","volume":"41","author":"X Liu","year":"2016","unstructured":"Liu X, Hu Z, Pan S (2016) Control strategy for the number of replica in smart city cloud stroage system. Geomat Inform Sci Wuhan Univ 41(9):1205\u20131210","journal-title":"Geomat Inform Sci Wuhan Univ"},{"key":"5029_CR19","doi-asserted-by":"crossref","unstructured":"Huo L, Yi R. (2015) Research on replica strategy in cloud storage System[C]. In: 2015 International Conference on Computer Science and Applications (CSA). IEEE","DOI":"10.1109\/CSA.2015.24"},{"key":"5029_CR20","doi-asserted-by":"crossref","unstructured":"Cai CX, ABAD CL, (2013) Campbell RH. Storage-efficient data replica number computation for multi-level priority data in distributed storage systems[C]. In: Dependable Systems and Networks Workshop (DSN-W). 2013 43rd Annual IEEE\/IFIP Conference on IEEE","DOI":"10.1109\/DSNW.2013.6615512"},{"key":"5029_CR21","doi-asserted-by":"crossref","unstructured":"Guo L, Yang S, Wang S (2012) Replica deletion strategy based on gray prediction theory and cost in P2P network[C]. In: Computer Science Service System (CSSS). 2012 International Conference on IEEE","DOI":"10.1109\/CSSS.2012.557"},{"key":"5029_CR22","doi-asserted-by":"crossref","unstructured":"Deng M and Dong Y (2019) Application of improved grey GM (1, 1) model in power prediction of wind farm. In: 2019 Chinese Control and Decision Conference (CCDC), Nanchang, China, pp 3764\u20133769","DOI":"10.1109\/CCDC.2019.8832659"},{"key":"5029_CR23","doi-asserted-by":"crossref","unstructured":"Liu S, Lin C and Yang Y, (2017) Several problems need to be studied in grey system theory. In: 2017 International Conference on Grey Systems and Intelligent Services (GSIS), Stockholm, pp 1\u20133","DOI":"10.1109\/GSIS.2017.8077658"},{"key":"5029_CR24","doi-asserted-by":"crossref","unstructured":"Xu H Wang G Luo L Lei M (2018)The design of reliability simulation of cloud system in the cloudsim. In: 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, pp 215\u2013219","DOI":"10.1109\/ICCWAMTIP.2018.8632572"},{"key":"5029_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03731-y","author":"Q He","year":"2022","unstructured":"He Q, Zhang F, Bian G et al (2022) Real-time network virtualization based on SDN and docker container. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-022-03731-y","journal-title":"Cluster Comput"},{"key":"5029_CR26","doi-asserted-by":"publisher","first-page":"18959","DOI":"10.1007\/s11227-022-04602-4","volume":"78","author":"Q He","year":"2022","unstructured":"He Q, Bian G, Zhang W et al (2022) RTFTL: design and implementation of real-time FTL algorithm for flash memory. J Super Comput 78:18959\u201318993","journal-title":"J Super Comput"},{"key":"5029_CR27","unstructured":"Scheid EJ, Rodrigues BB, Granville LZ and Stiller B (2019) Enabling dynamic SLA compensation using blockchain-based smart contracts, 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), Arlington, VA, USA, pp 53-61"},{"issue":"1","key":"5029_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0169-4","volume":"6","author":"K Dahdouh","year":"2019","unstructured":"Dahdouh K, Dakkak A, Oughdir L et al (2019) Large-scale e-learning recommender system based on Spark and Hadoop. J Big Data 6(1):1\u201323","journal-title":"J Big Data"},{"issue":"1","key":"5029_CR29","first-page":"31","volume":"37","author":"XU Tao","year":"2020","unstructured":"Tao XU, Yuanyuan SUN (2020) LU Min Airline passenger flow forecast based on grey neural network. Comput Appl Softw 37(1):31\u201336","journal-title":"Comput Appl Softw"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-05029-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-05029-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-05029-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T22:04:59Z","timestamp":1682373899000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-05029-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,18]]},"references-count":29,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["5029"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-05029-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2023,1,18]]},"assertion":[{"value":"29 December 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"I declare that the authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that they have no conflicts of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"I have read and understood the publishing policy, and submit this manuscript in accordance with this policy. The results\/data\/figures in this manuscript have not been published elsewhere, nor are they under consideration (from you or one of your Contributing Authors) by another publisher.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}