Method and device for processing user behavior data
A processing method and user's technology, applied in the computer field, can solve problems such as inaccurate positioning results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] According to an embodiment of the present invention, an embodiment of a method for processing user behavior data is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0028] The method embodiment provided in Embodiment 1 of the present application may be executed in a computer terminal or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal according to a method for processing user behavior data in an embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) proce...
Embodiment 2
[0107] According to an embodiment of the present invention, there is also provided a device for processing user behavior data for implementing the above method for processing user behavior data, such as Figure 5 As shown, the device may include:
[0108] The first acquisition unit 50 is configured to acquire user behavior data, wherein the user behavior data includes access data sets generated after multiple users access the target object, and the access data sets include at least data sets in the following three dimensions: keyword set , attribute information collection and classification information collection.
[0109] The above-mentioned user can be the visiting user USER of the portal website (such as a shopping website), the above-mentioned target object can be the product ITEM in the portal website, and the above-mentioned product ITEM can be commodities, videos, music, etc. After clicking, searching, commenting, bookmarking and other actions, a large amount of access...
Embodiment 3
[0131] Embodiments of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals.
[0132] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.
[0133] In this embodiment, the above-mentioned computer terminal can execute the program code of the following steps in the vulnerability detection method of the application program: obtain user behavior data, wherein the user behavior data includes access data sets generated after multiple users access the target object, access The data set includes at least the data set in the following three dimensions: keyword set, attribute information set, and classification information set; determine the user's preference score for the search items contained in the data set in each dimension, where each dimension The data collection on contain...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


