{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:44:19Z","timestamp":1765039459697},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T00:00:00Z","timestamp":1540771200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s12652-018-1109-4","type":"journal-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T05:13:33Z","timestamp":1540790013000},"page":"581-587","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Web cache intelligent replacement strategy combined with GDSF and SVM network re-accessed probability prediction"],"prefix":"10.1007","volume":"11","author":[{"given":"Wang","family":"Chao","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,29]]},"reference":[{"key":"1109_CR1","doi-asserted-by":"crossref","unstructured":"Aimtongkham P, So-In C, Sanguanpong S (2016) A novel web caching scheme using hybrid least frequently used and support vector machine [C]. In: International joint conference on computer science and software engineering. IEEE, pp 1\u20136","DOI":"10.1109\/JCSSE.2016.7748932"},{"key":"1109_CR2","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-642-25453-6_46","volume-title":"Informatics Engineering and Information Science","author":"Waleed Ali","year":"2011","unstructured":"Ali W, Shamsuddin SM, Ismail AS (2011) Intelligent web proxy caching approaches based on support vector machine [C]. In: International conference on informatics engineering and information science. Springer, Berlin, pp 559\u2013572"},{"issue":"5","key":"1109_CR3","doi-asserted-by":"publisher","first-page":"25781","DOI":"10.1109\/ACCESS.2017.2768564","volume":"24","author":"F Ali","year":"2017","unstructured":"Ali F, Khan P, Riaz K et al (2017) A fuzzy ontology and SVM-based web content classification system [J]. IEEE Access 24(5):25781\u201325797","journal-title":"IEEE Access"},{"key":"1109_CR4","unstructured":"Arora H, Bhatia U, Pandita S (2015) Comparative study of different cache models on SimpleScalar architecture [C]. In: Communication and computing. IET, pp 302\u2013304"},{"key":"1109_CR5","first-page":"1","volume-title":"Advances in Grid and Pervasive Computing","author":"Thepparit Banditwattanawong","year":"2012","unstructured":"Banditwattanawong T (2012) From web cache to cloud cache [C]. In: International conference on grid and pervasive computing. Springer, Berlin, pp 1\u201315"},{"issue":"6","key":"1109_CR6","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1109\/TNNLS.2016.2542059","volume":"28","author":"E Ergul","year":"2016","unstructured":"Ergul E, Arica N, Ahuja N et al (2016) Clustering through hybrid network architecture with support vectors [J]. IEEE Trans Neural Netw Learn Syst 28(6):1373\u20131385","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"6","key":"1109_CR7","first-page":"1352","volume":"25","author":"Y Hao","year":"2018","unstructured":"Hao Y, Ma T, Shen W et al (2018) An improved web cache replacement algorithm based on weighting and cost [J]. IEEE Access 25(6):1352\u20131360","journal-title":"IEEE Access"},{"issue":"1","key":"1109_CR8","first-page":"1","volume":"8","author":"MMM Islam","year":"2017","unstructured":"Islam MMM, Kim JM (2017) Time\u2013frequency envelope analysis-based sub-band selection and probabilistic support vector machines for multi-fault diagnosis of low-speed bearings [J]. J Ambient Intell Humaniz Comput 8(1):1\u201316","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"1109_CR9","first-page":"339","volume":"3","author":"PNV Kumar","year":"2014","unstructured":"Kumar PNV (2014) Novel web proxy cache replacement algorithms using machine learning, techniques for performance enhancement [J]. Int J Eng Sci Res Technol 3(1):339\u2013346","journal-title":"Int J Eng Sci Res Technol"},{"issue":"6","key":"1109_CR10","doi-asserted-by":"publisher","first-page":"7214","DOI":"10.1109\/ACCESS.2018.2790381","volume":"25","author":"T Ma","year":"2018","unstructured":"Ma T, Qu J, Shen W et al (2018) Weighted greedy dual size frequency based caching replacement algorithm [J]. IEEE Access 25(6):7214\u20137223","journal-title":"IEEE Access"},{"issue":"36","key":"1109_CR11","first-page":"142","volume":"9","author":"RF Olanrewaju","year":"2016","unstructured":"Olanrewaju RF, Al-Qudah DMM, Azman AW et al (2016) Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging [J]. Indian J Sci Technol 9(36):142\u2013148","journal-title":"Indian J Sci Technol"},{"issue":"1","key":"1109_CR12","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s00521-010-0442-0","volume":"20","author":"S Romano","year":"2011","unstructured":"Romano S, Elaarag H (2011) A neural network proxy cache replacement strategy and its implementation in the Squid proxy server [J]. Neural Comput Appl 20(1):59\u201378","journal-title":"Neural Comput Appl"},{"key":"1109_CR13","unstructured":"Sajeev GP, Sebastian MP (2011) Comparing the performance of multinomial logistic regression and neural network models in web cache content classification [C]. In: Icmlc 2011: the, international conference on machine learning and computing, pp 53\u201358"},{"issue":"1","key":"1109_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/TNSM.2016.2530687","volume":"13","author":"JP Sheu","year":"2016","unstructured":"Sheu JP, Chuo YC (2016) Wildcard rules caching and cache replacement algorithms in software-defined networking [J]. IEEE Trans Netw Serv Manag 13(1):19\u201329","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"2","key":"1109_CR15","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/s11036-014-0498-7","volume":"19","author":"A Songwattana","year":"2014","unstructured":"Songwattana A, Theeramunkong T, Vinh PC (2014) A learning-based approach for web cache management [J]. Mobile Netw Appl 19(2):258\u2013271","journal-title":"Mobile Netw Appl"},{"issue":"1","key":"1109_CR16","first-page":"1","volume":"9","author":"W Wang","year":"2018","unstructured":"Wang W, Zhao M, Wang J (2018) Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network [J]. J Ambient Intell Humaniz Comput 9(1):1\u20139","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1109_CR17","unstructured":"Weng M, Shang Y, Tian Y (2013) The design and implementation of LRU-based web cache [C]. In: International conference on communications and networking in China. IEEE Computer Society, pp 400\u2013404"},{"key":"1109_CR18","doi-asserted-by":"crossref","unstructured":"Wu X, Xu H, Zhu X et al (2015) Web cache replacement strategy based on reference degree [C]. In: IEEE international conference on smart city\/socialcom\/sustaincom. IEEE, pp 209\u2013212","DOI":"10.1109\/SmartCity.2015.72"},{"key":"1109_CR19","doi-asserted-by":"crossref","unstructured":"Zhang J (2015) Replacement strategy of web cache based on data mining [C]. In: International conference on P2p, parallel, grid, cloud and internet computing. IEEE, pp 821\u2013823","DOI":"10.1109\/3PGCIC.2015.75"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-1109-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-1109-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-1109-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T09:10:19Z","timestamp":1580807419000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-1109-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,29]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1109"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-1109-4","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,29]]},"assertion":[{"value":"9 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}