Unlock instant, AI-driven research and patent intelligence for your innovation.

An event prediction method, device and system

A prediction method and event technology, applied in the computer field, can solve problems such as unpredictable events, and achieve the effect of accurately predicting suspicious events

Active Publication Date: 2020-08-18
北京百分点科技集团股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an event prediction method, device and system to solve the problem that the prior art cannot predict the occurrence of events

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An event prediction method, device and system
  • An event prediction method, device and system
  • An event prediction method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] figure 1 For a schematic flow chart of an event prediction method provided in Example 1 of the present application, see figure 1 , the method may specifically include the following steps:

[0076] Step 120, obtaining text data in social network data;

[0077] It should be noted that one implementation of step 120 may be:

[0078] First, capture social network data from social platforms, and then perform preprocessing such as conversion, cleaning, parsing, and classification on the captured social network data to distinguish between structured data and unstructured data, as well as unstructured data. Text data in data. When performing event prediction, the corresponding text data is obtained from it.

[0079] Another implementation of step 120 may be:

[0080] First, capture social network data from social platforms, and then perform preprocessing such as conversion, cleaning, parsing, and classification on the captured data to distinguish between structured data an...

Embodiment 2

[0093] figure 2 For a schematic flow chart of an event prediction method provided in Example 2 of the present application, see figure 2 , the method may specifically include the following steps:

[0094] Step 220, obtain the text data in the social network data and the user behavior data associated with the text data;

[0095] It should be noted that social network data includes structured data and unstructured data. Wherein, the user behavior data belongs to structured data, including: entity data and / or tag data, the entity data is used to represent a collection of data related to text data, and the tag data is used to represent text data or words in text data The corresponding label and the data corresponding to the label. Taking a conversation as text data, the corresponding entity data are, for example, the participating entities of the conversation, the location and time of the conversation, etc., and the behavior data such as web browsing, searching, and clicking p...

Embodiment 3

[0114] image 3 For a schematic flow chart of an event prediction method provided in Example 3 of the present application, see image 3 , the following describes the application in detail from the perspective of examples:

[0115] Step 320, fetching social network data from social platforms

[0116] Preprocess the social network data to obtain training data, which includes: message text (text data), entity data and label data. Wherein, the process of pretreatment has been described in embodiment 1 and 2, so, repeat it here no longer.

[0117] Step 340, vectorized representation of message text

[0118] The most important task throughout natural language processing is the representation of word vectors. In order to better complete most natural language processing tasks, it is necessary to define the similarity and difference between words. The present embodiment adopts word2vec training word vector, and word2vec has two basic models, is respectively CBOW word vector model a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an event prediction method, a device and a system. The method comprises the following steps of acquiring text data in social network data; performing vectorization treatment onthe text data to obtain a feature vector corresponding to the text data; inputting the feature vector into a pre-established classification model, wherein the classification model is used for determining the probability of the text data corresponding to a suspicious event by taking the feature vector of the text data as a feature. According to the method, a large amount of social network data arecaptured and text data in the social network data are treated by adopting the natural language. After that, a feature vector is found from the text data to serve as a key influence factor. Based on the influence factor, the text data are predicted. As a result, the suspicious event can be accurately predicted.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to an event prediction method, device and system. Background technique [0002] With the development of Internet technology, the means of crime and terrorist attacks are becoming more and more intelligent. Many terrorist organizations are active on the Internet to organize and plan terrorist attacks. [0003] The prior art generally carries out follow-up appeasement work based on the analysis of netizens' emotions after events such as crimes and terrorist attacks take place. For example: after a certain event happened, relevant departments studied the public opinion data on the theme of the event, and analyzed the national sentiment based on the public opinion data. However, this “schedule after the event” approach cannot prevent events from happening. [0004] Therefore, there is a need to provide solutions that can prevent related events from happening. Conten...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/04G06Q50/26G06Q50/00G06F16/35
Inventor 苏萌刘天旸高体伟刘译璟边蓓蕾杜晓梦
Owner 北京百分点科技集团股份有限公司