CN106250232A - A kind of client based on user behavior analysis optimizes system and method - Google Patents
A kind of client based on user behavior analysis optimizes system and method Download PDFInfo
- Publication number
- CN106250232A CN106250232A CN201610584043.8A CN201610584043A CN106250232A CN 106250232 A CN106250232 A CN 106250232A CN 201610584043 A CN201610584043 A CN 201610584043A CN 106250232 A CN106250232 A CN 106250232A
- Authority
- CN
- China
- Prior art keywords
- client
- server background
- alarm threshold
- daily record
- behavior analysis
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5011—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
- G06F9/5016—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals the resource being the memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/41—Compilation
- G06F8/44—Encoding
- G06F8/443—Optimisation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses a kind of client based on user behavior analysis and optimize system and method, method includes: 1) log system is collected user that client provides operation behavior information when watching video and generates daily record, and server background identifies demarcation client by analyzing daily record and generates demarcation client side list;2) server background judges to demarcate whether client reaches alarm threshold, and the client reaching alarm threshold is done code optimization by server background.Beneficial effects of the present invention: present invention reduces and apply CPU and the consumption of internal memory, reach more preferable Consumer's Experience effect.
Description
Technical field
The present invention relates to television internet video polymerization field, it particularly relates to one is based on user behavior analysis
Client optimize system and method.
Background technology
Progressed into TV domain along with Internet technology, substantial amounts of family is assembled with TV set-top box or purchase
Intelligent television, for receiving the content on the Internet.But the technical conditions of Ge Jia equipment vendors are different, the access produced
Operating system and the related hardware spread in performance of equipment (refering in particular to TV box and intelligent television) are uneven.Particularly extensively
On the Android platform used, often occur that same apk performance on the equipment of different manufacturers there will be very big difference.For
For the television internet video polymeric type application that interactive requirements is higher, if interaction occupies too much device resource meeting
Cause the problems such as card even deadlock, have a strong impact on Consumer's Experience.
The operation shape of equipment can be substantially understood by the internal memory of monitoring television box/intelligent television and cpu usage
State, thus anticipation goes out hidden danger, but on the one hand this and be not equal to directly detect card release and pause or crash, in other words in monitoring device
Deposit the necessary and sufficient condition not pinpointed the problems with CPU;On the other hand, once pinpoint the problems, optimize client the most in time and improve use
Family is experienced and is also short of strategy.
For the problem in correlation technique, effective solution is the most not yet proposed.
Summary of the invention
For the above-mentioned technical problem in correlation technique, it is excellent that the present invention proposes a kind of client based on user behavior analysis
Change system and method, it is possible to reduce and apply CPU and the consumption of internal memory, reach more preferable Consumer's Experience effect.
For realizing above-mentioned technical purpose, the technical scheme is that and be achieved in that:
A kind of client based on user behavior analysis optimizes system, including:
Client, for providing operation behavior information when user watches video;
Log system, for collecting the operation behavior information of client offer and generating daily record, after daily record is sent to server
Platform;
Server background, for analyzing the daily record that log system sends, recognizes the need for the client of optimization and makees to optimize, its
In, described server background judges to demarcate whether client reaches alarm threshold, the server background visitor to reaching alarm threshold
Family end does code optimization.
Further, the CPU of described server background probability demarcation client and EMS memory occupation situation, it is judged that demarcate client
Whether the CPU of end and internal memory reach alarm threshold by situation, and the client reaching alarm threshold is done code optimization.
Further, described alarm threshold refers to that CPU/memory usage ratio reaches 50 percent.
Further, described code optimization specifically includes described server background the video aggregation of client is represented engine
Java is switched to from cocos2d.
A kind of client optimization method based on user behavior analysis, comprises the following steps:
S1 log system is collected user that client provides operation behavior information when watching video and generates daily record, after server
Platform identifies demarcation client by analyzing daily record and generates demarcation client side list;
S2 server background judges to demarcate whether client reaches alarm threshold, the server background client to reaching alarm threshold
End does code optimization.
Further, step S1 includes:
S11 client offer user watches operation behavior information during video;
The operation behavior information that S12 log system is collected client and provided generates daily record, and daily record is sent to service by log system
Device backstage;
S13 server background extracts typical user operation behavioural information from daily record, and server background identifies has these
The client of operation behavior information is designated as demarcating client;
S14 server background generates demarcates client side list.
Further, in step s 13, there is Caton phenomenon for characterizing video in typical user operation behavioural information
User operation behavioural information.
Further, step S2 includes:
The CPU of S21 server background probability demarcation client and EMS memory occupation situation;
S22 server background judges whether the CPU demarcating client reaches alarm threshold by situation in internal memory;
The client reaching alarm threshold is done code optimization by S23 server background.
Further, in step S22 and S23, described alarm threshold refers to that CPU/memory usage ratio reaches 5 percent
Ten.
Further, in step S23, described code optimization specifically includes described server background by the video of client
Polymerization represents engine and switches to java from cocos2d.
Beneficial effects of the present invention: present invention reduces and apply CPU and the consumption of internal memory, reach more preferable Consumer's Experience
Effect.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment
The accompanying drawing used is needed to be briefly described, it should be apparent that, the accompanying drawing in describing below is only some enforcements of the present invention
Example, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtains according to these accompanying drawings
Obtain other accompanying drawing.
Fig. 1 is the structural frames that client based on user behavior analysis described according to embodiments of the present invention optimizes system
Figure;
Fig. 2 is the flow chart identifying demarcation client according to embodiments of the present invention;
Fig. 3 is the flow chart that demarcation client is done code optimization according to embodiments of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, the every other embodiment that those of ordinary skill in the art are obtained, broadly fall into present invention protection
Scope.
As Figure 1-3, described a kind of based on user behavior analysis client optimization system according to embodiments of the present invention
System, including:
Client, for providing operation behavior information when user watches video;
Log system, for collecting the operation behavior information of client offer and generating daily record, after daily record is sent to server
Platform;
Server background, for analyzing the daily record that log system sends, recognizes the need for the client of optimization and makees to optimize, its
In, described server background judges to demarcate whether client reaches alarm threshold, the server background visitor to reaching alarm threshold
Family end does code optimization.
Wherein, the CPU of described server background probability demarcation client and EMS memory occupation situation, it is judged that demarcate client
Whether CPU and internal memory reach alarm threshold by situation, and the client reaching alarm threshold is done code optimization.
Wherein, described alarm threshold refers to that CPU/memory usage ratio reaches 50 percent.
Wherein, described code optimization specifically include described server background the video aggregation of client is represented engine from
Cocos2d switches to java.
A kind of client optimization method based on user behavior analysis, comprises the following steps:
S1 log system is collected user that client provides operation behavior information when watching video and generates daily record, after server
Platform identifies demarcation client by analyzing daily record and generates demarcation client side list;
S2 server background judges to demarcate whether client reaches alarm threshold, the server background client to reaching alarm threshold
End does code optimization.
Wherein, step S1 farther includes:
S11 client offer user watches operation behavior information during video;
The operation behavior information that S12 log system is collected client and provided generates daily record, and daily record is sent to service by log system
Device backstage;
S13 server background extracts typical user operation behavioural information from daily record, and server background identifies has these
The client of operation behavior information is designated as demarcating client;
S14 server background generates demarcates client side list.
Wherein, in step s 13, typical user operation behavioural information is can to characterize video the use of Caton phenomenon occur
Family operation behavior information.
Wherein, step S2 farther includes:
The CPU of S21 server background probability demarcation client and EMS memory occupation situation;
S22 server background judges whether the CPU demarcating client reaches alarm threshold by situation in internal memory;
The client reaching alarm threshold is done code optimization by S23 server background.
Wherein, in step S22 and S23, described alarm threshold refers to that CPU/memory usage ratio reaches 50 percent.
Wherein, in step S23, described code optimization specifically includes described server background by the video aggregation of client
Represent engine and switch to java from cocos2d.
Understand the technique scheme of the present invention for convenience, below by way of above-mentioned to the present invention in specifically used mode
Technical scheme is described in detail.
When specifically used, this programme first passes through log system and collects the user's operation information of magnanimity client, passes through
The big data analysis of server background extracts the user operation behavior that can characterize the faults such as video appearance card, and in rear reforwarding
Monitor the client occurring in that these typical behaviour in magnanimity client during battalion, thus identify a class client and be referred to as mark
Determine client.
It is optimized for demarcation client obtained in the previous step.This optimization method is first to add up this client to regard in operation
Frequently CPU during aggregated application and EMS memory occupation situation, get rid of the client of not up to alarm threshold;To the visitor reaching alarm threshold
Family end does code optimization.
In sum, by means of the technique scheme of the present invention, present invention reduces application and CPU and internal memory are disappeared
Consumption, reaches more preferable Consumer's Experience effect.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention
Within god and principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (10)
1. a client based on user behavior analysis optimizes system, it is characterised in that including:
Client, for providing operation behavior information when user watches video;
Log system, for collecting the operation behavior information of client offer and generating daily record, after daily record is sent to server
Platform;
Server background, for analyzing the daily record that log system sends, recognizes the need for the client of optimization and makees to optimize, its
In, described server background judges to demarcate whether client reaches alarm threshold, the server background visitor to reaching alarm threshold
Family end does code optimization.
Client based on user behavior analysis the most according to claim 1 optimizes system, it is characterised in that described service
The CPU of device backstage probability demarcation client and EMS memory occupation situation, it is judged that by situation whether to demarcate in the CPU of client and internal memory
Reach alarm threshold, and the client reaching alarm threshold is done code optimization.
Client based on user behavior analysis the most according to claim 2 optimizes system, it is characterised in that described warning
Threshold value refers to that CPU/memory usage ratio reaches 50 percent.
4. optimize system according to the client based on user behavior analysis described in Claims 2 or 3, it is characterised in that described
Code optimization specifically includes described server background and the video aggregation of client is represented engine switches to java from cocos2d.
5. a client optimization method based on user behavior analysis, it is characterised in that comprise the following steps:
S1 log system is collected user that client provides operation behavior information when watching video and generates daily record, after server
Platform identifies demarcation client by analyzing daily record and generates demarcation client side list;
S2 server background judges to demarcate whether client reaches alarm threshold, the server background client to reaching alarm threshold
End does code optimization.
Client optimization method based on user behavior analysis the most according to claim 5, it is characterised in that step S1 is entered
One step includes:
S11 client offer user watches operation behavior information during video;
The operation behavior information that S12 log system is collected client and provided generates daily record, and daily record is sent to service by log system
Device backstage;
S13 server background extracts typical user operation behavioural information from daily record, and server background identifies has these
The client of operation behavior information is designated as demarcating client;
S14 server background generates demarcates client side list.
Client optimization method based on user behavior analysis the most according to claim 6, it is characterised in that in step
In S13, typical user operation behavioural information is can to characterize video the user operation behavioural information of Caton phenomenon occur.
Client optimization method based on user behavior analysis the most according to claim 6, it is characterised in that step S2 is entered
One step includes:
The CPU of S21 server background probability demarcation client and EMS memory occupation situation;
S22 server background judges whether the CPU demarcating client reaches alarm threshold by situation in internal memory;
The client reaching alarm threshold is done code optimization by S23 server background.
Client optimization method based on user behavior analysis the most according to claim 8, it is characterised in that in step
In S22 and S23, described alarm threshold refers to that CPU/memory usage ratio reaches 50 percent.
Client optimization method based on user behavior analysis the most according to claim 8 or claim 9, it is characterised in that in step
In rapid S23, described code optimization specifically includes described server background and the video aggregation of client is represented engine from cocos2d
Switch to java.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610584043.8A CN106250232A (en) | 2016-07-22 | 2016-07-22 | A kind of client based on user behavior analysis optimizes system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610584043.8A CN106250232A (en) | 2016-07-22 | 2016-07-22 | A kind of client based on user behavior analysis optimizes system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106250232A true CN106250232A (en) | 2016-12-21 |
Family
ID=57604401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610584043.8A Pending CN106250232A (en) | 2016-07-22 | 2016-07-22 | A kind of client based on user behavior analysis optimizes system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106250232A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108052280A (en) * | 2017-11-29 | 2018-05-18 | 努比亚技术有限公司 | A kind of data cached delet method, terminal and computer readable storage medium |
CN108712479A (en) * | 2018-04-28 | 2018-10-26 | 东莞市华睿电子科技有限公司 | A kind of network interdynamic method based on cloud platform |
CN108734437A (en) * | 2017-04-13 | 2018-11-02 | 普天信息技术有限公司 | A kind of operation system optimization method and device |
CN109102292A (en) * | 2018-08-21 | 2018-12-28 | 联动优势电子商务有限公司 | A kind of method and device of monitor client operating status |
CN109144715A (en) * | 2017-06-27 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of method, server and the equipment of resource optimization and update |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103201723A (en) * | 2012-08-03 | 2013-07-10 | 华为技术有限公司 | Memory configuration method and memory configuration management server |
CN103577192A (en) * | 2013-11-07 | 2014-02-12 | 安一恒通(北京)科技有限公司 | Method and device for optimizing system performance |
CN104951382A (en) * | 2014-03-25 | 2015-09-30 | 北京神州泰岳软件股份有限公司 | Method and system for analyzing intelligent terminal user behavior based on APP mapping database |
US20150312102A1 (en) * | 2014-02-18 | 2015-10-29 | Seven Networks, Inc. | Policy management for signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols |
CN105025318A (en) * | 2015-06-30 | 2015-11-04 | 北京奇艺世纪科技有限公司 | Feedback method and device for abnormal log information of application program |
-
2016
- 2016-07-22 CN CN201610584043.8A patent/CN106250232A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103201723A (en) * | 2012-08-03 | 2013-07-10 | 华为技术有限公司 | Memory configuration method and memory configuration management server |
CN103577192A (en) * | 2013-11-07 | 2014-02-12 | 安一恒通(北京)科技有限公司 | Method and device for optimizing system performance |
US20150312102A1 (en) * | 2014-02-18 | 2015-10-29 | Seven Networks, Inc. | Policy management for signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols |
CN104951382A (en) * | 2014-03-25 | 2015-09-30 | 北京神州泰岳软件股份有限公司 | Method and system for analyzing intelligent terminal user behavior based on APP mapping database |
CN105025318A (en) * | 2015-06-30 | 2015-11-04 | 北京奇艺世纪科技有限公司 | Feedback method and device for abnormal log information of application program |
Non-Patent Citations (1)
Title |
---|
国家工商总局网络商品交易监管司: "5.4 Web服务器日志分析", 《电子数据取证分析技术》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108734437A (en) * | 2017-04-13 | 2018-11-02 | 普天信息技术有限公司 | A kind of operation system optimization method and device |
CN109144715A (en) * | 2017-06-27 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of method, server and the equipment of resource optimization and update |
CN109144715B (en) * | 2017-06-27 | 2022-04-19 | 阿里巴巴集团控股有限公司 | Resource optimization and update method, server and equipment |
US11436188B2 (en) | 2017-06-27 | 2022-09-06 | Alibaba Group Holding Limited | Resource optimization and update method, server, and device |
CN108052280A (en) * | 2017-11-29 | 2018-05-18 | 努比亚技术有限公司 | A kind of data cached delet method, terminal and computer readable storage medium |
CN108052280B (en) * | 2017-11-29 | 2021-07-23 | 努比亚技术有限公司 | Method for deleting cache data, terminal and computer readable storage medium |
CN108712479A (en) * | 2018-04-28 | 2018-10-26 | 东莞市华睿电子科技有限公司 | A kind of network interdynamic method based on cloud platform |
CN108712479B (en) * | 2018-04-28 | 2020-12-18 | 国网上海市电力公司 | Network interaction method based on cloud platform |
CN109102292A (en) * | 2018-08-21 | 2018-12-28 | 联动优势电子商务有限公司 | A kind of method and device of monitor client operating status |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106250232A (en) | A kind of client based on user behavior analysis optimizes system and method | |
US11057286B2 (en) | Methods and apparatus to credit background applications | |
Reed et al. | Identifying https-protected netflix videos in real-time | |
US20170070539A1 (en) | Method of and system for privacy awarness | |
US20110289116A1 (en) | Method and Apparatus for Protecting Online Content by Detecting Noncompliant Access Patterns | |
US20120311562A1 (en) | Extendable event processing | |
CN106961632B (en) | Video quality analysis method and device | |
US10652255B2 (en) | Forensic analysis | |
KR101496632B1 (en) | System for safe contents service for youths and method therefor | |
CN103327016B (en) | A kind of computing network Streaming Media exception playback volume the method and system to its correction | |
CN113596519B (en) | Method for regulating and controlling live broadcast plug flow of monitoring equipment and electronic equipment | |
US10798425B1 (en) | Personalized key object identification in a live video stream | |
KR20090006397A (en) | System and method for multi-stage filtering of malicious videos in video distribution environment | |
US20170242856A1 (en) | System and method for assigning multimedia content elements to users | |
CN106547683A (en) | A kind of redundant code detection method and device | |
US10498660B2 (en) | Systems and methods for bandwidth estimation in oscillating networks | |
CN112040090A (en) | Video stream processing method and device, electronic equipment and storage medium | |
CN109040038B (en) | Method, device and equipment for determining stuck factors and storage medium | |
CN109429296B (en) | Method, device and storage medium for associating terminal with internet surfing information | |
CN114461485A (en) | Resource loading monitoring method, device, equipment and storage medium | |
CN106790754B (en) | Media information playing method and server | |
US20150181112A1 (en) | Preprocessing apparatus for recognizing user | |
CN112543353A (en) | Video playing request processing method and related device | |
CN108667863B (en) | WEB service adaptation system and method based on local agent | |
CN112104470A (en) | Network equipment fault positioning method and digital home service analysis platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170811 Address after: 100039, Yongding Road, Beijing, No. 3, floor 51, 303, Haidian District Applicant after: The space cloud network technology development limited liability company Address before: 100098 Beijing city Haidian District Dazhongsi Road No. 9 Beijing Science and technology building block D Applicant before: Xu Shan |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161221 |