Content push method and AI management and control system based on big data visualization mining processing

A management and control system and big data technology, applied in the field of big data, can solve problems such as limited accuracy of business operation vulnerability mining and the impact of abnormal node traceability.

Active Publication Date: 2022-07-22
江苏鼎跃腾信息技术有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the current artificial intelligence learning algorithm, usually only learn the vulnerability characteristic variables of independent dimensions, resulting in limited accuracy of business operation vulnerability mining, and also have a certain impact on the traceability of abnormal nodes in the later stage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content push method and AI management and control system based on big data visualization mining processing
  • Content push method and AI management and control system based on big data visualization mining processing
  • Content push method and AI management and control system based on big data visualization mining processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 This is a schematic diagram of the application environment of the content push system 10 based on big data visualization mining processing provided by an embodiment of the present application. The content push system 10 based on big data visualization mining processing may include an AI management and control system 100 and a business operation service system 200 that is communicatively connected to the AI ​​management and control system 100 . figure 1 The shown content push system 10 based on big data visualization mining processing is only a feasible example, and in other feasible embodiments, the content push system 10 based on big data visualization mining processing may also only include: figure 1 At least some of the components shown may or may also include other components.

[0021] In some implementations that can be based on independent ideas, the AI ​​management and control system 100 and the business operation service system 200 in the content push ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the present application provide a content push method and an AI management and control system based on big data visualization mining processing, deep mining and learning from the example abnormal big data with the attribute carried by the first business operation vulnerability to the second method used to reflect the joint vulnerability variable business operation loopholes, so that vulnerability mining training can be carried out based on the second business operation loopholes and the first business operation loopholes at the same time, which is equivalent to learning the vulnerability feature variables of the first business operation loopholes and the vulnerability feature variables of the joint vulnerability variables at the same time. The mining model is configured based on the combination of the first vulnerability mining model and the second vulnerability mining model, so that the third vulnerability mining model obtained by the configuration can simultaneously learn the linkage vulnerability of the first service operation vulnerability and the second service operation vulnerability combined with the vulnerability variables. Feature variables can improve the accuracy of vulnerability mining and improve the reliability of targeted abnormal node traceability.

Description

technical field [0001] The present application relates to the field of big data technology, and in particular, to a content push method and an AI management and control system based on big data visualization mining processing. Background technique [0002] At present, with the rapid development of artificial intelligence technology, artificial intelligence technology has shown its application potential in some fields. For example, the application of artificial intelligence technology in vulnerability mining can greatly improve the current method of relying on rule matching and manual search for vulnerabilities. The problem of low mining efficiency. [0003] The abnormal log data generated in the process of business operation can usually reflect the characteristics of vulnerability expression to a certain extent. Therefore, the learning of vulnerability mining through abnormal log data has obvious value for vulnerability mining and later traceability of abnormal nodes. In th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/9535G06K9/62G06F11/34G06F16/36G06F16/904
CPCG06F16/367G06F16/904G06F11/3476G06F16/9535G06F18/214
Inventor 张名宙贾娜娜林子新
Owner 江苏鼎跃腾信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products