Alarm transaction extracting method and system

An extraction method and transaction technology, applied in the field of network risk management and control, can solve problems such as low efficiency of alarm transaction extraction, and achieve the effect of high extraction efficiency

Active Publication Date: 2015-12-30
POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD +1
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide an alarm transaction extraction method and system for the low efficiency of alarm transaction extraction. The method and system first evaluate the quality of time segment division, determine the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm transaction extracting method and system
  • Alarm transaction extracting method and system
  • Alarm transaction extracting method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] The technical solutions of the present invention will be described in detail below with reference to the accompanying drawings and preferred embodiments.

[0032] In one embodiment, see figure 1 The schematic flowchart of the method for extracting an alarm transaction is shown, and the method specifically includes the following steps:

[0033] S100 divides the alarm time series into several time periods;

[0034] The alarm time series is the set of time points when the alarm occurs in the original alarm data in the network, that is, the alarm time series is composed of the alarm time or the alarm time point, for example, the alarm time series V={t i},i=1,2,...,K, where t i Indicates the moment when the i-th alarm occurs, and there are K alarms in the alarm time series. The so-called division of alarm time series refers to using a certain algorithm to cluster each alarm time into several times according to the distribution characteristics of the alarm time series. par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an alarm transaction extracting method and system. The method comprises the following steps that an alarm time sequence is divided into a plurality of time sections; differences between the sections of the alarm time sequence are determined according to the central time points of every two adjacent time sections, and meanwhile differences in each section of the alarm time sequence are determined according to all time points in the section; optimal division of the alarm time sequence is determined according to a ratio of the differences between the sections and the differences in each section; alarm transactions in the next time section under optimal division are extracted through a sliding time window method. According to the alarm transaction extracting method and system, the division quality of the time sections of the alarm time sequence is firstly reasonably evaluated to determine optimal division of the alarm time sequence, and then alarm transaction extraction is performed on all the time sections under optimal division, so that the alarm transaction extraction efficiency is greatly improved.

Description

technical field [0001] The invention relates to the technical field of network risk management and control, in particular to a method and system for extracting alarm transactions. Background technique [0002] The alarm information generated by each device in the network is very important for network risk analysis. Due to the complexity of alarm propagation in the communication network, the occurrence of faults is often accompanied by a large number of related alarms, which brings great difficulties to the precise location of faults. Correlation analysis of alarms is the basis of fault location. Use association rule mining to obtain effective rule knowledge to assist fault location, discover fault location knowledge hidden in a large number of original alarm information, and use valuable knowledge to guide network fault diagnosis. In this way, network faults can be managed in a higher level, all-round and more accurate manner, the efficiency and intelligent level of network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/04
Inventor 曾瑛蔡毅罗云李星南王平
Owner POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products