User portrait formation method based on user access data
A technology for accessing data and users, applied in the computer field, can solve problems such as low processing efficiency and achieve a high degree of automation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] The method provided by the present invention mainly has the following steps:
[0036] The first step is to filter unnecessary links and summarize them on a user basis. In this step, some unnecessary links such as open source js library resource access requests and external image resource access requests are filtered out, and the links that users actually want to access are obtained. Then save each user's link and access time in chronological order.
[0037] The second step is to write a web crawler tool to grab the title and content of all linked pages of the user. Since there are many pages visited by users, in order to avoid crawling a certain page repeatedly, it is necessary to establish a hash table to store the links of the pages that have been crawled, so as to avoid repeated crawling.
[0038] In the crawling process, in order to avoid the anti-crawler mechanism of some websites, several strategies need to be used, namely: disguising UserAgent, using agents and avoidi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


