Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Algorithm model deployment and risk monitoring method and device, and computer device

An algorithm model and algorithm technology, applied in the Internet field, can solve problems such as reducing system maintainability and robustness, increasing the frequency of system version iterations, and increasing the risk of system maintenance, so as to reduce risk monitoring problems and reduce iteration frequency , the effect of rapid and efficient deployment

Pending Publication Date: 2019-10-08
上海星图金融服务集团有限公司
View PDF9 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the currently adopted solution, the algorithm model file used for deployment is coupled with various execution components. In this way, the update of each small component will trigger the update of the entire algorithm system, which increases the version iteration frequency of the system. Each system update will cause the algorithm service to be stopped and restarted. During this period, the load capacity of the server will drop sharply, which will affect the specific business.
At the same time, due to the coupling of components, the modification of local code must be completed by modifying the entire system code, which may lead to system crash due to modification errors, which increases the risk of system maintenance and reduces the maintainability and robustness of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Algorithm model deployment and risk monitoring method and device, and computer device
  • Algorithm model deployment and risk monitoring method and device, and computer device
  • Algorithm model deployment and risk monitoring method and device, and computer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0070] The algorithm model deployment method provided by the present invention can be applied to such as figure 1 shown in the application environment. Wherein, the server 104 communicates with the terminal 102 and the object management system 106 through the network. The object management system 106 communicates with the algorithm computing cluster 108 through a network. Among them, the terminal 102 can be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, and the server 104 can be realized by an independent server o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an algorithm model deployment and risk monitoring method and device, and computer equipment. The algorithm model deployment method comprises the steps: receiving an algorithmmodel file of a current algorithm model uploaded by a terminal; executing a related component library according to the algorithm model file and preset algorithms, and determining related components ofthe current algorithm model; and generating an algorithm package of the current algorithm model according to the algorithm model file and related components. The risk monitoring method comprises thesteps: sending an algorithm downloading request to an object management system, wherein the algorithm downloading request comprises identification information of a target risk analysis algorithm model, and deploying the risk analysis algorithm model stored in the object management system through the algorithm model deployment method; receiving an algorithm packet of the target risk analysis algorithm model returned by the object management system; and carrying out risk monitoring by loading and executing the algorithm packet. By adopting the algorithm model deployment and risk monitoring method, the service availability and the system robustness can be improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a method, device, computer equipment and storage medium for algorithm model deployment and risk monitoring. Background technique [0002] With the application and development of artificial intelligence in the Internet field, a large number of algorithm models for different scenarios have been established, and how to flexibly deploy algorithm models has become an urgent research problem. [0003] In the currently adopted solution, the algorithm model file used for deployment is coupled with various execution components. In this way, the update of each small component will trigger the update of the entire algorithm system, which increases the version iteration frequency of the system. Each system update will cause the algorithm service to be stopped and restarted. During this period, the load capacity of the server will drop sharply, which will affect the specific busi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F8/60G06F8/71
CPCG06F8/60G06F8/71
Inventor 孙鑫焱周斌孟天涯
Owner 上海星图金融服务集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products