CN113344744B - Personalized business function calculation method and device for power system - Google Patents

Personalized business function calculation method and device for power system Download PDF

Info

Publication number
CN113344744B
CN113344744B CN202110878257.7A CN202110878257A CN113344744B CN 113344744 B CN113344744 B CN 113344744B CN 202110878257 A CN202110878257 A CN 202110878257A CN 113344744 B CN113344744 B CN 113344744B
Authority
CN
China
Prior art keywords
function
user
functions
employee
user system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110878257.7A
Other languages
Chinese (zh)
Other versions
CN113344744A (en
Inventor
杜礼锋
陈珊珊
胡长华
伍明
许兴雀
卢灿金
张喜平
丁锋
姜佳宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd
Original Assignee
Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd filed Critical Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority to CN202110878257.7A priority Critical patent/CN113344744B/en
Publication of CN113344744A publication Critical patent/CN113344744A/en
Application granted granted Critical
Publication of CN113344744B publication Critical patent/CN113344744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Abstract

The invention belongs to the technical field of power systems. The invention provides a method and a device for calculating personalized service functions of an electric power system, wherein the method comprises the following steps: inputting a user system use log, a user organization architecture and user system authorization; cleaning the user system use logs, and performing functional arrangement on the cleaned user system use logs according to the user organization architecture; generating a dynamic personalized function list of system users by using association rules for the user system use logs subjected to function arrangement; based on the dynamic personalized function list, combining with the authorization of the user system to calculate the function authority of the user; and outputting the use function of the user system according to the user function authority. The invention solves the problem that the existing system can not be well adapted to the use requirements of personnel at each post, which causes complex operation.

Description

Personalized business function calculation method and device for power system
Technical Field
The invention relates to the technical field of power systems, in particular to a method and equipment for calculating personalized service functions of a power system.
Background
Large-scale electric power enterprises are asset-intensive and data-intensive enterprises, along with the increasing level of informatization in recent years, unified information systems not only have traditional asset management systems, marketing management systems, financial management systems, human resources, office automation and the like, but also have various subsystems for supporting operation, analysis, decision and the like, part of the systems are respectively deployed at different terminals (such as a PC (personal computer) terminal, a mobile phone APP (application), a WeChat small program and the like), the service functions of the systems are dozens of systems and hundreds of systems, and how to efficiently know and use the functions by system users becomes a problem which is urgently needed to be solved.
Data has become a strategic fundamental resource of enterprises and is an important production element. The system user is not only a producer of system data, but also a consumer of the data, finds a proper entrance in a plurality of systems, and can also find unauthorized service functions, thereby effectively improving the efficiency of personnel for analyzing and making decisions according to the data.
When using the system, system users enter the system through a login window, the same system presents a function interface of one side of thousands of people, and then corresponding functions are searched in a grading mode through different classification menus. The operation is complex and partial functions cannot be found due to multiple systems, non-uniform menu classification standards and deep hidden function layers; meanwhile, the personnel authorization of large-scale power enterprises does not have uniform requirements, so that the authorization functions of the users at all posts are different, and the data acquisition from the enterprise information system is hindered.
Disclosure of Invention
In view of this, the invention aims to utilize the function use log of the system personnel to perform correlation analysis on the use functions of the personnel at the same post, find the potential or unauthorized functions at the post, improve the working efficiency and solve the problem that the existing system cannot well adapt to the use requirements of the personnel at each post, which results in complex operation.
In order to solve the above technical problem, a first aspect of the present invention provides a method for calculating a personalized service function of an electric power system, including:
inputting a user system use log, a user organization architecture and user system authorization;
cleaning the user system use logs, and performing function arrangement on the cleaned user system use logs according to a user organization framework;
generating a dynamic personalized function list of system users by using association rules for the user system use logs subjected to function arrangement;
based on the dynamic personalized function list, combining with the authorization of the user system to calculate the function authority of the user;
and outputting the use function of the user system according to the user function authority.
Further, the specific steps of cleaning the user system use log are as follows:
and eliminating unwanted data in the user system usage log, wherein the unwanted data comprises repeated system usage functions, system usage functions with dwell time less than a time threshold, system usage functions that have been deactivated and unauthorized system usage functions.
Further, the functional arrangement of the cleaned user system usage log according to the user organization architecture specifically comprises:
merging the cleaned user system use logs to obtain a first matrix;
and adding two columns in the first matrix, wherein one column in the two columns is used for representing the number corresponding to the employee position obtained from the user organization architecture, and the other column in the two columns is used for representing the number corresponding to the system function.
Further, generating a dynamic personalized function list of system users by using association rules for the user system use logs after function arrangement comprises:
extracting a data matrix of the employee service using function from the user system use log after function arrangement, wherein the data matrix can be described as follows:
Figure 59510DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 456994DEST_PATH_IMAGE002
numbering the employees, i the posts, j the sequence numbers,
Figure 248232DEST_PATH_IMAGE003
for staff
Figure 389364DEST_PATH_IMAGE002
The corresponding mth service function.
Further, the step of generating a dynamic personalized function list of system users by using the association rule for the user system use logs subjected to function arrangement specifically includes:
the post i is mined by a frequent item set
Figure 887341DEST_PATH_IMAGE004
Find all frequent item sets satisfying the minimum support threshold
Figure 721305DEST_PATH_IMAGE005
From a frequent item set according to the following rules
Figure 734260DEST_PATH_IMAGE005
Generating the association rule:
confidence(A=>B)=P(A|B)=support_count(A∪B)/support_count(A)
wherein A ∈
Figure 616765DEST_PATH_IMAGE006
,B∈
Figure 31566DEST_PATH_IMAGE006
And a andgateb = ∅, confidence (a =)>B) Is a measure of confidence that the B function is used as well as the a function; support _ count (A $ B) is
Figure 974115DEST_PATH_IMAGE004
The number of the post i containing the item set A U B; support _ count (A) is
Figure 474366DEST_PATH_IMAGE004
The number of people in post i that contains item set A;
setting a minimum confidence threshold min _ conf, and if the confidence (A = > B) ≥ min _ conf, generating an association rule A = > B;
and (3) using the association rule for the employee j in the post i, expanding the service function of the system, and forming a new service function set:
Figure 957300DEST_PATH_IMAGE007
wherein the content of the first and second substances,
Figure 429870DEST_PATH_IMAGE008
is a system business function used by employee j within a preset time period,
Figure 605636DEST_PATH_IMAGE009
the system service function of the employee j is expanded according to the association rule within the preset time period.
Further, based on the dynamic personalized function list, calculating the user function authority by combining with the authorization of the user system specifically includes:
classifying the new business function set of the employee j according to different authorization management requirements to obtain a classification result, wherein the classification result comprises a function set of functions which are authorized but not used and a function set of functions which are not authorized but used by other people on the same post;
and respectively calculating the user function authority of the employee j according to the classification result.
Further, the step of respectively calculating the user function authority of the employee j according to the classification result specifically includes:
for the function set C of authorized but unused functions, the following formula is used for calculation:
C=A-A∩B
wherein
Figure 593184DEST_PATH_IMAGE010
And B is a function authority set of the employee j in each system;
The function set D of the functions which are not authorized but used by other persons in the same position is calculated by adopting the following formula:
D=A-B
wherein
Figure 817492DEST_PATH_IMAGE010
And B is a function authority set of the employee j in each system.
Further, the user system usage function specifically includes:
system functions used by the user within a preset time period, system functions used by other users on the same post, and system functions that have not been authorized.
The invention provides a device for calculating personalized business functions of a power system, which comprises a processor and a memory, wherein the processor is used for:
the memory is used for storing the computer program and sending the instructions of the computer program to the processor;
the processor executes the personalized business function calculation method of the power system according to the instructions of the computer program.
A third aspect of the present invention provides a computer-readable storage medium having stored thereon a computer program, which when executed by a processor, implements a personalized service function calculation method of an electric power system as in the first aspect.
In summary, the present invention provides a method and a device for calculating a personalized service function of an electrical power system, wherein a user organization architecture is used to perform function arrangement on a user system use log to obtain a relationship between each post and a corresponding function thereof, association rules are used to further mine an association relationship between system functions used by different employees at the same post, so as to expand the system use functions of the employees at the post, thereby generating a dynamic personalized function list, and then the functions in the dynamic personalized function list are classified according to the authorization of the user system, and finally the system service functions used by the employees and other associated system service functions are output. According to the invention, because the use log of the system is mined, the correlation function of the use system of the personnel on the same post is mined, meanwhile, the unauthorized service function can be found, the operation step of searching the system function by the operator is simplified, and convenience is provided for rapidly and conveniently acquiring the required data in the enterprise. The problem of current system can not adapt to different post personnel's user demand well, lead to the operation complicacy is solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a method for calculating a personalized service function of an electrical power system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a method for calculating a personalized service function of an electric power system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1 and fig. 2, the present embodiment provides a method for calculating a personalized service function of an electric power system, including:
s101: inputting a user system use log, a user organization architecture and user system authorization;
s102: cleaning the user system use logs, and performing function arrangement on the cleaned user system use logs according to a user organization framework;
s103: generating a dynamic personalized function list of system users by using association rules for the user system use logs subjected to function arrangement;
s104: based on the dynamic personalized function list, combining with the authorization of the user system to calculate the function authority of the user;
s105: and outputting the use function of the user system according to the user function authority.
In the method for calculating the personalized service function of the power system provided by this embodiment, a user organization architecture is used to perform function arrangement on a user system use log to obtain the relation between each post and the corresponding function thereof, association rules are used to further mine the association relationship between the system functions used by different employees at the same post, so as to expand the system use function of each employee at the post, thereby generating a dynamic personalized function list, then the functions in the dynamic personalized function list are classified according to the authorization of the user system, and finally the system service function used by the employee and the associated other system service functions are output. According to the invention, because the use log of the system is mined, the correlation function of the use system of the personnel on the same post is mined, meanwhile, the unauthorized service function can be found, the operation step of searching the system function by the operator is simplified, and convenience is provided for rapidly and conveniently acquiring the required data in the enterprise. The problem of current system can not adapt to different post personnel's user demand well, lead to the operation complicacy is solved.
The foregoing is a detailed description of an embodiment of the method for calculating the personalized service function of the power system, and another embodiment of the method for calculating the personalized service function of the power system will be described in detail below.
The embodiment provides a personalized business function calculation method of an electric power system, which comprises the following steps:
s201: inputting a user system usage log, a user organization architecture and user system authorization.
It should be noted that, the input required data includes a user system use log (service system name, unit, employee code, function name, use duration), a user organization architecture (unit, employee code, post name), a user system authorization (service system name, unit, employee code, function name), and an available identifier of each system function.
S202: and cleaning the user system use logs, and performing functional arrangement on the cleaned user system use logs according to a user organization architecture.
It should be noted that the cleaning of the system log specifically refers to the removal of unsatisfactory data and the arrangement of the unified format of each system. There are four cases that need to be culled in the system log: first, redundant system functions are rejected. A large number of repeated records exist in the same person, the same system and the same function in the system log, one record with the longest retention time needs to be reserved, and other repeated records are deleted. Second, the function of too short a dwell time is rejected. While the user is using the system, the user typically stays on the function for a certain period of time, and if the stay time is too short (i.e., less than a time threshold, such as less than 10 seconds), the user may consider that there is no use value of the function and should be rejected. Third, functions that have been disabled are culled. And eliminating the functions in the user system log list according to the stop marks through the usable marks of the functions of each user system. Fourthly, unauthorized functions are eliminated. In the process of continuously updating and upgrading the system, part of functions can be deactivated or adjusted, so that for the functions in the system log, the functions which are not in the authority range of corresponding personnel are removed by contrasting the content items of the user system authorization table. If the user a in the system log used the function S of the application system S once, but the user a cancelled the function S in the authorization table of the application system S, the function S of the application system S of the user a is removed from the system log.
The function arrangement of the system log refers to merging each system, and the system function is uniquely numbered. Combining different system logs into a uniform matrix, and adding two columns: one column is that the positions of the employees are obtained from the user organization framework, and the same positions are given the same number; in the other column, the functions of the system are numbered, and the same functions of the same system are given the same numbers.
S203: and generating a dynamic personalized function list of system users by utilizing the association rule.
It should be noted that, inside an organization, a recommended service function has a greater reference value between the same posts within a period, and data of the service function used by processing staff is extracted from a function use log within a certain period of internal staff (1 year, 1 month, etc.) according to the above steps to form a data matrix, where the data matrix can be described as: by employee number of each employee
Figure 941305DEST_PATH_IMAGE011
(where i is the station and j is the sequential number) as an identifier, which uses the service function
Figure 287973DEST_PATH_IMAGE003
(m is the mth service), construct the ith x j artificial system function use set
Figure 700500DEST_PATH_IMAGE012
. For post i, a frequent item set mining algorithm is utilized
Figure 790816DEST_PATH_IMAGE004
Find all frequent item sets satisfying the minimum support threshold
Figure 34715DEST_PATH_IMAGE005
From a frequent item set according to the following rules
Figure 224388DEST_PATH_IMAGE005
Generating the association rule:
confidence(A=>B)=P(A|B)=support_count(A∪B)/support_count(A)
wherein A ∈
Figure 186528DEST_PATH_IMAGE013
,B∈
Figure 814955DEST_PATH_IMAGE013
And a andgateb = ∅, confidence (a =)>B) Is a measure of confidence that the B function is used as well as the a function; support _ count (A $ B) is
Figure 116624DEST_PATH_IMAGE004
The number of the post i containing the item set A U B; support _ count (A) is
Figure 539515DEST_PATH_IMAGE004
The number of people in post i that contains item set a.
Setting min _ conf, namely a minimum confidence threshold value, and forming an association rule A = > B if the confidence (A = > B) ≧ min _ conf is met, thereby forming a group of association rules.
And (3) aiming at each employee j in the post i, expanding the service functions of the system by utilizing the association rule to form a new service function set:
Figure 988951DEST_PATH_IMAGE014
wherein
Figure 358752DEST_PATH_IMAGE008
Is a function used by employee j during this time,
Figure 311665DEST_PATH_IMAGE009
is a function that employee j has not used for the time but has been extended using the association rules described above.
For each employee at different positions i (i =1, 2.,. the.) the method is adopted to expand the service function, and a personalized function list is realized.
S204: and the authorization of the user system is combined to calculate the functional authority of the user.
It should be noted that different units may have different authorization management for the same work post, and need a new set of business functions for employee j
Figure 171036DEST_PATH_IMAGE015
Distinguishing and respectively calculating:
functional set C of functions that have been authorized, but not used:
C=A-A∩B
wherein
Figure 779872DEST_PATH_IMAGE010
And B is a function authority set of the employee j in each system.
Function set D of functions used by other people on the same post without authorization:
D=A-B
wherein
Figure 15681DEST_PATH_IMAGE010
And B is a function authority set of the employee j in each system.
S205: and outputting the user system using function.
It should be noted that, according to the result of the above calculation, the list of commonly used functions of each system user is output in a classified manner, and includes: functions used by the system for a preset period of time (preferably the time of the last year) by the user; functions frequently used by other people on the same post (corresponding to function set C, that is, a certain system service function has been authorized for the user, but the user is not used, but is used by other users on the same post); the system may not have authorized functions (corresponding to function set D, i.e. a certain system service function has not authorized the user, but has been used by other users on the same post). For the latter two system service functions, whether authorized or not, because other people on the same post have used the functions, it can be considered that the user is likely to use the functions in the future, and the output is needed. The method has the advantages that the method is inspired from functions which are authorized but not used, the process of business processing can be accelerated, authorization is obtained from the functions which are not authorized, more data resources can be mastered, work is more convenient, and decision making is more reasonable. And from the authorized functions, a method of quickly entering the corresponding system is provided.
The embodiment provides a method for calculating the personalized service function of an electric power system, which comprises the steps of collecting service function logs of system users from each service system, removing useless data such as off-shelf functions and invalid login, and carrying out unified and standardized processing such as post number distinguishing and different system function numbers; the same post is taken as a processing set, a frequent item set mining algorithm is utilized to obtain the correlation function of the post, the service function which is not used by each system user is supplemented, and three system functions are output by combining system authorization.
The foregoing is a detailed description of an embodiment of the method for calculating a personalized service function of an electric power system, and the following is a detailed description of an embodiment of the apparatus for calculating a personalized service function of an electric power system.
The embodiment provides a personalized service function computing device of an electric power system, which comprises a processor and a memory, wherein the processor is used for:
the memory is used for storing the computer program and sending the instructions of the computer program to the processor;
the processor executes the personalized business function calculation method of the power system according to the instructions of the computer program.
The above is a detailed description of an embodiment of the apparatus for calculating personalized business functions of an electric power system of the present invention, and the following is a detailed description of an embodiment of a computer-readable storage medium of the present invention.
A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements a personalized service function calculation method of an electric power system according to the foregoing embodiments.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (5)

1. A personalized business function calculation method of an electric power system is characterized by comprising the following steps:
inputting a user system use log, a user organization architecture and user system authorization;
cleaning the user system use logs, and performing functional arrangement on the cleaned user system use logs according to the user organization architecture;
extracting a data matrix of the employee service using function from the user system use log after function arrangement, wherein the data matrix is described as follows:
Figure 48504DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 779700DEST_PATH_IMAGE002
numbering the employees, i the posts, j the serial numbers of the employees,
Figure 146965DEST_PATH_IMAGE003
for staff
Figure 901295DEST_PATH_IMAGE002
The corresponding mth system use function;
the method for generating the dynamic personalized function list of the system user by using the association rule for the user system use log after the function arrangement specifically comprises the following steps:
the post i is mined by a frequent item set
Figure 451356DEST_PATH_IMAGE004
Find all frequent item sets satisfying the minimum support threshold
Figure 37058DEST_PATH_IMAGE005
From a frequent item set according to the following rules
Figure 778487DEST_PATH_IMAGE005
Generating the association rule:
confidence(A=>B)=P(A|B)=support_count(A∪B)/support_count(A)
wherein A ∈
Figure 82429DEST_PATH_IMAGE005
,B∈
Figure 232919DEST_PATH_IMAGE005
And a andgateb = ∅, confidence (a =)>B) Is a measure of confidence that the B function is used as well as the a function; support _ count (A $ B) is
Figure 187974DEST_PATH_IMAGE004
The number of the post i containing the item set A U B; support _ count (A) is
Figure 585457DEST_PATH_IMAGE004
The number of people in post i that contains item set A;
setting a minimum confidence threshold min _ conf, and if the confidence (A = > B) ≥ min _ conf, generating an association rule A = > B;
using the association rule for the employee j in the post i, expanding the system service function, and forming a new service function set:
Figure DEST_PATH_IMAGE006
wherein the content of the first and second substances,
Figure 189745DEST_PATH_IMAGE007
is a system business function used by employee j within a preset time period,
Figure 580144DEST_PATH_IMAGE008
the system service function of the employee j is expanded according to the association rule within a preset time period;
based on the dynamic personalized function list, combining with the authorization of the user system to calculate the function authority of the user, specifically comprising:
classifying the new business function set of the employee j according to different authorization management requirements to obtain a classification result, wherein the classification result comprises a function set of functions which are authorized but not used and a function set of functions which are not authorized but used by other people on the same post;
respectively calculating the user function authority of the employee j according to the classification result, which specifically comprises the following steps:
for the function set C of the authorized but unused functions, the following formula is used to calculate:
C=A-A∩B
wherein A =
Figure 140438DEST_PATH_IMAGE009
B is a function authority set of the employee j in each system;
the function set D of the functions which are not authorized but used by other people at the same position is calculated by adopting the following formula:
D=A-B
wherein A =
Figure 725135DEST_PATH_IMAGE009
B is a function authority set of the employee j in each system;
outputting a user system use function according to the user function authority, wherein the user system use function specifically comprises:
system functions used by the user within a preset time period, system functions used by other users on the same post, and system functions that have not been authorized.
2. The method according to claim 1, wherein the step of cleaning the user system usage log specifically comprises:
culling unwanted data in the user system usage log, the unwanted data including duplicate system usage functions, system usage functions having a dwell time less than a time threshold, system usage functions that have been deactivated, and unauthorized system usage functions.
3. The method according to claim 1, wherein the performing functional arrangement on the cleaned user system usage log according to the user organization structure specifically comprises:
merging the cleaned user system use logs to obtain a first matrix;
and adding two columns in the first matrix, wherein one column in the two columns is used for representing the number corresponding to the employee position obtained from the user organization structure, and the other column in the two columns is used for representing the number corresponding to the system use function.
4. A personalized business function computing device for an electrical power system, the device comprising a processor and a memory:
the memory is used for storing a computer program and sending instructions of the computer program to the processor;
the processor executes the personalized service function calculation method of the power system according to any one of claims 1 to 3 according to the instructions of the computer program.
5. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, implements a personalized service functionality calculation method of an electric power system according to any of claims 1-3.
CN202110878257.7A 2021-08-02 2021-08-02 Personalized business function calculation method and device for power system Active CN113344744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110878257.7A CN113344744B (en) 2021-08-02 2021-08-02 Personalized business function calculation method and device for power system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110878257.7A CN113344744B (en) 2021-08-02 2021-08-02 Personalized business function calculation method and device for power system

Publications (2)

Publication Number Publication Date
CN113344744A CN113344744A (en) 2021-09-03
CN113344744B true CN113344744B (en) 2022-01-21

Family

ID=77480488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110878257.7A Active CN113344744B (en) 2021-08-02 2021-08-02 Personalized business function calculation method and device for power system

Country Status (1)

Country Link
CN (1) CN113344744B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159053A (en) * 2007-11-23 2008-04-09 金蝶软件(中国)有限公司 Resources distribution method and system
CN109388921A (en) * 2017-08-10 2019-02-26 顺丰科技有限公司 A kind of unification user rights management platform and operation method
CN111026372A (en) * 2019-12-12 2020-04-17 北京中电普华信息技术有限公司 Web version cell-phone desktop system and user's workstation based on little service application framework
US10942991B1 (en) * 2018-06-22 2021-03-09 Kiddofy, LLC Access controls using trust relationships and simplified content curation

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7133846B1 (en) * 1995-02-13 2006-11-07 Intertrust Technologies Corp. Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
US10084792B2 (en) * 2009-05-06 2018-09-25 Grigory Levit Control and verification of permissions
CN109886646A (en) * 2019-01-29 2019-06-14 广东华伦招标有限公司 The work organization management method that calls for bid and system
CN110147657A (en) * 2019-04-17 2019-08-20 深圳壹账通智能科技有限公司 A kind of user right configuration method and device
CN111737576B (en) * 2020-06-22 2023-09-19 中国银行股份有限公司 Application function personalized recommendation method and device
CN112732891A (en) * 2020-12-28 2021-04-30 平安科技(深圳)有限公司 Office course recommendation method and device, electronic equipment and medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159053A (en) * 2007-11-23 2008-04-09 金蝶软件(中国)有限公司 Resources distribution method and system
CN109388921A (en) * 2017-08-10 2019-02-26 顺丰科技有限公司 A kind of unification user rights management platform and operation method
US10942991B1 (en) * 2018-06-22 2021-03-09 Kiddofy, LLC Access controls using trust relationships and simplified content curation
CN111026372A (en) * 2019-12-12 2020-04-17 北京中电普华信息技术有限公司 Web version cell-phone desktop system and user's workstation based on little service application framework

Also Published As

Publication number Publication date
CN113344744A (en) 2021-09-03

Similar Documents

Publication Publication Date Title
CN106980573B (en) Method, device and system for constructing test case request object
CN111343161B (en) Abnormal information processing node analysis method, abnormal information processing node analysis device, abnormal information processing node analysis medium and electronic equipment
CN109242246B (en) Scene construction method, emergency drilling method and scene construction system
CN111914468A (en) Intelligent monitoring and analyzing method and device for air pollution
CN110111110A (en) The method and apparatus of knowledge based map detection fraud, storage medium
CN107832196A (en) A kind of monitoring device and monitoring method for real-time logs anomalous content
US11907659B2 (en) Item recall method and system, electronic device and readable storage medium
US20190349393A1 (en) Systems and methods for third party risk assessment
KR20220064016A (en) Method for extracting construction safety accident based data mining using big data
CN103942739A (en) Method for construction of construction project risk knowledge base
CN115587739A (en) Client list distribution method and device, computer equipment and storage medium
CN111882034A (en) Neural network processing and face recognition method, device, equipment and storage medium
CN111046087A (en) Data processing method, device, equipment and storage medium
CN103336800A (en) Fingerprint storage and comparison method based on behavior analysis
CN113344744B (en) Personalized business function calculation method and device for power system
CN111460139B (en) Intelligent management based engineering supervision knowledge service system and method
CN117313058A (en) Information identification method, apparatus, computer device and storage medium
CN106156046B (en) Information management method, device and system and analysis equipment
CN115048352B (en) Log field extraction method, device, equipment and storage medium
CN114422341B (en) Industrial control asset identification method and system based on fingerprint characteristics
CN115423361A (en) Data processing method and device for risk view, storage medium and equipment
CN105786929A (en) Information monitoring method and device
Pohl et al. Online processing of social media data for emergency management
CN115640606A (en) Data visualization method and system based on safety
CN112751976A (en) Agent association method, system, equipment and storage medium based on authentication log

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant