Solitary population prediction method and system based on network data
A technology of network data and prediction method, applied in the field of big data processing, to achieve the effect of high data validity, simple implementation and large amount of data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] Such as figure 1 As shown, a method for predicting lonely people based on network data, including:
[0044] Step 1) receiving the device information of all users connected to the Internet uploaded by the wireless access point AP, including: device MAC address and IP address assigned to the user;
[0045] Step 2) determine the user ID information of the corresponding equipment through the user authentication login system;
[0046] Step 3) Obtain all user ID information of the same AP in a certain time period at the same time, and form a network data information set;
[0047] Step 4) according to above network data information set, obtain the quantity that a plurality of user ID information appears under one AP simultaneously, and form the intimacy network between all user ID information accordingly;
[0048] Step 5) Traversing the intimacy network between user ID information, if a certain user ID has no other users with higher intimacy, it is determined that the user i...
Embodiment 2
[0051] Describe for embodiment one, wherein, preferably, in step 1), include:
[0052] The wireless access point AP collects the MAC address of the device connected to the current AP, and assigns IP address information to it at the same time;
[0053] Every once in a while, the above AP collects the MAC address information and IP address information of all devices currently connected, and synchronizes these information to the central server.
[0054] Preferably, in step 2),
[0055] Based on the IP address of the temporary communication in the user's online authentication system, combined with the above user's device information; map according to the user authentication information to obtain the user's user ID, and use the user ID in the information collected at the same time under the same AP as a piece of information. The data is saved to the server.
[0056] Preferably, step 4) includes:
[0057] Obtain a collection of network data information;
[0058] Modeling is carr...
Embodiment 3
[0062] In a specific embodiment, such as figure 2 As shown, the method specifically includes:
[0063] Step 1. The wireless AP (Wireless Access Point, Wireless Access Point, hereinafter referred to as AP) collects information about the device currently connected to it.
[0064] The AP can collect related information such as the MAC (network interface physical address) address of the device connected to the current AP, the assigned IP, etc., and collect the currently connected device information (including MAC information and IP information) every once in a while and synchronize the information to the in the central server.
[0065] Step 2: The real-time information collected by the AP is synchronized to the server, and the server maps to the determined user ID information by using user authentication to log in to the system.
[0066] Because the user's Internet access needs to be authenticated, the temporary communication IP address will be generated after the authenticatio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


