Big data particle algorithm system

A big data and computing system technology, applied in data mining, electrical digital data processing, special data processing applications, etc., can solve the problems of missing effective data information, resource loss, etc., to avoid resource loss, facilitate observation and analysis, and improve effective The effect of information acquisition rate

Pending Publication Date: 2021-06-25
上海四卜格网络科技有限公司
0 Cites 2 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0003] The big data data particle algorithm system proposed by the present invention solves the problem of missing effective inform...
View more

Abstract

The invention discloses a big data particle algorithm system, relates to the technical field of data deep mining, and provides the following scheme aiming at the problems of resource loss and the like caused by missing of effective information in data due to huge data volume in an existing data extraction algorithm: the big data particle algorithm system comprises a first-layer calculation system, a second-layer calculation system and a third-layer calculation system, The first-layer calculation system comprises a data extraction module, the output end of the data extraction module is connected with a filtering removal module, the output end of the filtering removal module is connected with a data collection module, and the output end of the data collection module is connected with a retrieval calculation module; The output end of the retrieval calculation module is connected with a backup transmission module. The calculation method is deep, data is deeply mined, recombined and calculated, hidden information in the big data is obtained, the effective information collection rate of the big data is increased, resource loss is avoided, and the method is suitable for application and popularization.

Application Domain

Data miningSpecial data processing applications

Technology Topic

Data ingestionComputing systems +9

Image

  • Big data particle algorithm system
  • Big data particle algorithm system

Examples

  • Experimental program(1)

Example Embodiment

[0016] Next, the technical solutions in the embodiments of the present invention will be apparent from the embodiment of the present invention, and it is clearly described, and it is understood that the described embodiments are merely embodiments of the present invention, not all of the embodiments.
[0017] Refer Figure 1-2 , A large data particle algorithm system, including a layer of computing system, a two-layer computing system, and a three-layer computing system, and a layer computing system includes a data extraction module. The output of the data extraction module is connected to the filter removal module, the filtration removal module The output is connected to the data acquisition module. The output of the data acquisition module is connected to the search calculation module. The output of the calculation module is connected to the backup transmission module. The output terminal of the backup transmission module is connected to the check-repetition module, check the check module The output connection has a result display module, and the Layer 2 computing system includes a screening obtaining module, a depth mining module, and a directional transmission module, a three-layer computing system includes a data strip module, a cracking retrieval module, and a screening backup module.
[0018] In this embodiment, the result display module includes a display unit, a list unit, a chart unit, and an analysis unit, and the display unit includes a display panel, which is used to display all the large data calculations obtained by the multilayer algorithm. The chart unit is used to place large The data calculation results are displayed by chart, and the analysis unit is used to control the results of the large data calculation results, and the results are directly different.
[0019] In this embodiment, a data transmission module is connected between a layer computing system and a two-layer computing system, and the data transmission module uploads the data deleted in the filter removal module to the Layer 2 computing system for depth calculation.
[0020] In this embodiment, the output end of the Layer 2 computing system and the three-layer computing system is connected to the input end of the check-in module, and the inspection of the detection module is used to obtain a layer of computing system, the Layer 2 computing system and the three-layer computing system. The data results are combined after the merger, and the repetition result is deleted to keep a set of values.
[0021] In this embodiment, the data extraction module is used to perform a calculated array for efficient information extraction, a valid information user custom setting keyword query, the filter removal module removes the invalid data set after extracting the valid data, and upload invalid data to data In the transmission module, the data acquisition module identifies that the valid data synchronization will upload the information to the retrieval calculation module, retrieve the calculation module to search the valid data and upload the lookup result to the backup transfer module, and the backup transmission module will retrieve the results back up the search results to the inspection Heavy module.
[0022] In this embodiment, the verification module has the function of suspending transmission data. The data strip module in the three-layer computing system is used to re-decompose the effective data, obtain data particles, and disrupt the data, and crack the retrieval module. Researry the reorganization data again, filter the backup module filtering the valid data, and upload the restructuring of the valid data backup to the verification check module.
[0023] In this embodiment, the screening obtaining module in the Layer 2 computing system is used to retrieve data again to the deleted data and upload the data obtained by the retrieved data is a depth mining module, and the depth mining module sends data division particles in retrieval data. Data, and the obtained valid data is uploaded to the verification check module after the valid data is packaged through the orientation transmission module.
[0024] In this embodiment, the effective information in large data is initially extracted by a layer computing system, and the invalid data is uploaded to the Layer 2 computing system, and the Layer 2 computing system has a deep excavation of the delete data again, and re-use the data. Decompose up to a deeper layer, after obtaining particle data, extracting mining, making the data obtained more deeply, three-layer computing system to re-peeled down the effective data, obtain data particles, and disrupt data For data reorganizations, different data groups are obtained, and the data groups are again found in the data group, one-layer computing system, the Layer 2 computing system, and the three-layer computing system upload all the valid data calculated to the verification module. The summary is summarized and the repeated data is deleted to a group, and the result display module displays a variety of ways of valid data.
[0025] As described above, only the preferred embodiments of the present invention are preferred, but the scope of the invention is not limited thereto, and any techniques, those skilled in the art, according to the present invention, in accordance with the present invention. And its inventive concept is equivalent to alternative or change, which should be covered within the scope of the invention.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Hematoxylin-eosin one-step dyeing method

ActiveCN106644656AEasy to observe and analyzeGood dyeing effect
Owner:杨海玉

Board level circuit testing model automatic generation method

InactiveCN103399979ASave manpower and timeEasy to observe and analyze
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Wind field data processing method, device and equipment and storage medium

PendingCN112579980AEasy to observe and analyze
Owner:深圳航天宏图信息技术有限公司

Gridding information monitoring system

InactiveCN1791028AEasy to observe and analyzeeasy to expand
Owner:BEIHANG UNIV

Electric locomotive power factor compensation control method and device

ActiveCN101396970AImprove computing powerEasy to observe and analyze
Owner:ZHUZHOU ELECTRIC LOCOMOTIVE CO +1

Classification and recommendation of technical efficacy words

  • Easy to observe and analyze

Hematoxylin-eosin one-step dyeing method

ActiveCN106644656AEasy to observe and analyzeGood dyeing effect
Owner:杨海玉

Board level circuit testing model automatic generation method

InactiveCN103399979ASave manpower and timeEasy to observe and analyze
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Gridding information monitoring system

InactiveCN1791028AEasy to observe and analyzeeasy to expand
Owner:BEIHANG UNIV

Electric locomotive power factor compensation control method and device

ActiveCN101396970AImprove computing powerEasy to observe and analyze
Owner:ZHUZHOU ELECTRIC LOCOMOTIVE CO +1

Wind field data processing method, device and equipment and storage medium

PendingCN112579980AEasy to observe and analyze
Owner:深圳航天宏图信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products