CN116560938A - Method, equipment and storage medium for rapidly analyzing logs - Google Patents

Method, equipment and storage medium for rapidly analyzing logs Download PDF

Info

Publication number
CN116560938A
CN116560938A CN202310311478.5A CN202310311478A CN116560938A CN 116560938 A CN116560938 A CN 116560938A CN 202310311478 A CN202310311478 A CN 202310311478A CN 116560938 A CN116560938 A CN 116560938A
Authority
CN
China
Prior art keywords
log
logs
running
operation log
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310311478.5A
Other languages
Chinese (zh)
Inventor
赵大兵
何志丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Supersonic Artificial Intelligence Technology Co ltd
Original Assignee
Supersonic Artificial Intelligence Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Supersonic Artificial Intelligence Technology Co ltd filed Critical Supersonic Artificial Intelligence Technology Co ltd
Priority to CN202310311478.5A priority Critical patent/CN116560938A/en
Publication of CN116560938A publication Critical patent/CN116560938A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/205Parsing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application provides a method, equipment and storage medium for rapidly analyzing logs, wherein the method is applied to an industrial personal computer and comprises the following steps of: s1, acquiring an operation log generated in an operation process, and preprocessing the operation log; s2, judging the type of the operation log, and analyzing the operation log according to a preset rule corresponding to the type of the operation log; and step S3, displaying an analysis result of the operation log after analysis. The method and the system can quickly find out the problems in the operation log through the analysis result, are convenient for workers to verify the correctness of the data of the industrial personal computer, and find out the problems and daily operation and maintenance of the operation process of the industrial personal computer in advance.

Description

Method, equipment and storage medium for rapidly analyzing logs
Technical Field
The application relates to the technical field of computers, in particular to a method, equipment and a storage medium for rapidly analyzing logs.
Background
An industrial personal computer operates to generate near hundred M plain text logs, and a few days are required for manual reading. Except for holidays, the industrial personal computer inside the factory basically operates for 24 hours. All customers add up, thousands of computers, and daily data are generated.
And different software presents logs in different formats, including, but not limited to: time for communicating with the PLC, time for using the whole process, received message and the like. But most of the log data becomes electronic waste to enter the recycling station. The processing of the industrial personal computer log has the following problems:
the log data is manually collected and summarized, and whether the data is lost or damaged cannot be confirmed; in the collecting process, log data is not subjected to preliminary processing, and the effective data is not more than 1K, so that the collecting and transmitting efficiency is affected; because the reading quantity of the log data is too large, only the problems can be generated, and related logs can not be found from a plurality of logs, the early warning and the prevention can not be carried out, and the inconvenience is caused to the processing and the daily operation maintenance of the problems of the industrial personal computer.
Disclosure of Invention
In order to solve the problems, the embodiments of the present application provide a method, an apparatus, and a storage medium for quickly analyzing a log, so as to quickly discover problems existing in an operation log, and facilitate the processing and daily operation and maintenance of the industrial personal computer problem.
The application provides a method for rapidly analyzing logs, which comprises the following steps:
a method for rapidly analyzing logs is applied to an industrial personal computer, and comprises the following steps:
s1, acquiring an operation log generated in an operation process, and preprocessing the operation log;
s2, judging the type of the operation log, and analyzing the operation log according to a preset rule corresponding to the type of the operation log;
and step S3, displaying an analysis result of the operation log after analysis.
Optionally, in combination with any one of the above aspects, in another implementation manner of this aspect, the method further includes:
and S4, obtaining characteristic information of the required operation log, and matching the operation log conforming to the characteristic information in the analysis result.
Optionally, in combination with any one of the foregoing aspects, in another implementation manner of the present aspect, the running log is preprocessed in step S1, specifically,
step S11, uniformly processing all running logs, and judging whether the running logs are legal logs or not; if the running log is legal, executing a step S2; and if the running log is an illegal log, recording as 0.
Optionally, with reference to any one of the foregoing aspects, in another implementation manner of this aspect, in step S2, the type of the running log is determined, and the running log is parsed according to a preset rule, specifically,
obtaining the type of the operation log according to the content in the operation log; the types of the running logs comprise complex types and simple types, and the running logs of the complex types are analyzed through regular expressions; the simple type of travel log is parsed by the program code.
Optionally, with reference to any one of the foregoing aspects, in another implementation manner of this aspect, the parsing the running log according to a preset rule further includes: acquiring a data line of the running log, judging whether the data line is a first record, if so, judging whether the first record comprises an ending characteristic string, and if so, adding an illegal log list; when the data line is not the first record, judging whether the data line comprises a start characteristic string, and if the data line comprises the start characteristic string, adding the statistics time into a time list.
Optionally, in combination with any one of the foregoing aspects, in another implementation manner of the present aspect, the time-of-use list includes average time-of-use, median time-of-use, and continuous maximum exceeding a threshold time-of-use, where the time-of-use list is accurate to milliseconds or microseconds.
Optionally, in combination with any one of the above aspects, in another implementation manner of the present aspect, the method further includes the following steps:
and S5, uploading the analysis result to a log server, and analyzing the analysis result through the log server.
Optionally, with reference to any one of the foregoing aspects, in another implementation manner of this aspect, in step S11, whether the running log is a legal log is determined according to a thread id and a running time in the running log.
In another aspect of the present application, an electronic device is provided, which includes a processor, a memory, and a computer program stored on the memory and executable on the processor, wherein the processor implements a log rapid analysis method as described in any one of the above when executing the computer program.
In another aspect of the present application, there is provided a storage medium having stored thereon a computer program which, when executed, implements a log rapid analysis method as described in any of the above.
As described above, the present application provides a method, an apparatus, and a storage medium for rapidly analyzing a log, to obtain a running log generated in a running process, to preprocess the running log, to determine a type of the running log, to analyze the running log according to a preset rule corresponding to the type of the running log, to display an analysis result of the analyzed running log, and to rapidly discover problems existing in the running log through the analysis result, to facilitate a worker to verify the correctness of data of an industrial personal computer, and to discover problems in the running process and daily operation and maintenance of the industrial personal computer in advance.
The above summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. The above summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Fig. 1 is a schematic flow chart of a method for rapidly analyzing logs provided in the present application;
fig. 2 is a schematic diagram of an analysis matching interface in a log rapid analysis method provided in the present application;
FIG. 3 is a schematic diagram of a flow chart of analyzing an operation log in the method for rapidly analyzing logs provided in the present application;
fig. 4 is a schematic diagram of a display interface in a method for rapidly analyzing logs provided in the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the element defined by the phrase "comprising one … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element, and furthermore, elements having the same name in different embodiments of the present application may have the same meaning or may have different meanings, a particular meaning of which is to be determined by its interpretation in this particular embodiment or by further combining the context of this particular embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context. Furthermore, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, steps, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, steps, operations, elements, components, items, categories, and/or groups. The terms "or," "and/or," "including at least one of," and the like, as used herein, may be construed as inclusive, or meaning any one or any combination. An exception to this definition will occur only when a combination of elements, functions, steps or operations are in some way inherently mutually exclusive.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily occurring in sequence, but may be performed alternately or alternately with other steps or at least a portion of the other steps or stages.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
Referring to fig. 1, the present application provides a method, an apparatus, and a storage medium for quickly analyzing a log, so as to quickly find problems in an operation log, and facilitate the processing and daily operation and maintenance of problems of an industrial personal computer.
Specifically, the method comprises the following steps:
s1, acquiring an operation log generated in the operation process, and preprocessing the operation log. After the logs are obtained, all logs are first preprocessed, specifically,
step S11, uniformly processing all running logs, and judging whether the running logs are legal logs or not; if the running log is legal, executing a step S2; and if the running log is an illegal log, recording as 0. In the application, whether the running log is legal or not is judged according to the thread id and the running time in the running log. When the thread id and the running time exist in the running log, the running log is considered to be a legal log, and when the thread id does not exist, the running log is considered to be an illegal log, and the illegal log is recorded as 0.
And S2, judging the type of the operation log, and analyzing the operation log according to a preset rule corresponding to the type of the operation log. And reading the content of the running log according to the row, and judging the type of the running log according to the content so as to analyze according to different running logs and improve the analysis efficiency.
After the running log is obtained, the corresponding preset rule is matched through an IMatch matching structure, the factory interface is matched through an IMatchFactoy, and a matching object is created by a matching factory according to the requirement. And matching the processing threads in the matching entry class through the CMathAltThread to process multiple threads simultaneously, and distributing the preprocessed running logs to different matching objects according to the thread ids in the running logs. All classes are invoked indirectly through matching entry classes.
In the step S2, the type of the running log is determined, and the running log is parsed according to a preset rule corresponding to the type of the running log, specifically,
obtaining the type of the operation log according to the content in the operation log; the types of the running logs comprise complex types and simple types, and the running logs of the complex types are analyzed through regular expression matching; regular expression (regular expression) describes a pattern of string matches that can be used to check whether a string contains a certain sub-string, to replace a matching sub-string or to fetch a sub-string from a certain string that meets a certain condition, etc. The simple type of travel log is parsed by program code matching. The method mainly determines the type of the operation log through the characteristics in the operation log, and is simple when single characteristics exist, and is complex when starting characteristics, ending characteristics and the like exist. More, complex types of travel logs can be matched and parsed through mathematical classes. The mathematical class encapsulates mathematical operations not provided by some systems, such as: and the maximum substring sum is used for meeting the analysis requirement of the operation log.
In the running log, cmatchpreendnotname: matching objects having different start characteristics and end characteristics. For example, a certain match is performed, the start characteristic is CHiKCamera:DataCallBack:begin, and the end characteristic is CHiKCamera:DataCallBack:end.
Cmatchpreendname: single feature matching. Characterized by "ZF11108", a second log comprising ZF11108 and a first log comprising ZF11108 are time-of-use, a third log comprising ZF11108 and a second log comprising ZF11108 are time-of-use.
The parsing process is shown in fig. 2 and 3, and the parsing the running log according to a preset rule further includes: acquiring a data line of the running log, judging whether the data line is a first record, if so, judging whether the first record comprises an ending characteristic string, and if so, adding an illegal log list; when the data line is not the first record, judging whether the data line comprises a start characteristic string, and if the data line comprises the start characteristic string, adding the statistics time into a time list. The time-of-use list includes average time-of-use, median time-of-use, continuous maximum over threshold time-of-use, the time-of-use list being accurate to milliseconds or microseconds.
And step S3, displaying an analysis result of the operation log after analysis. As shown in fig. 4, after analysis, the content of the running log can be directly displayed, so that a worker can quickly look up the effective content of the running log, and the format file in the running log is not required to be read, so that the running and maintenance efficiency is improved.
And S4, obtaining characteristic information of the required operation log, and matching the operation log conforming to the characteristic information in the analysis result. When a worker needs to query the operation log of a certain time period or a certain industrial personal computer, the worker can input characteristic information required by querying the operation log, such as a specific certain time period, the serial number of the industrial personal computer, a start characteristic or an end characteristic and the like. After the characteristic information is obtained, the operation log which accords with the characteristic information is directly matched in the analysis result. Matching in the analysis result, namely matching the operation log meeting the conditions from the operation log after the rapid analysis, does not need to analyze all logs, can accurately and rapidly determine the required log, and is convenient for the staff to search.
And S5, uploading the analysis result to a log server, and analyzing the analysis result through the log server. And when the industrial personal computer or the network meets the transmission requirement, uploading the analysis result of the running log to a log server. And a worker can upload analysis results of a plurality of operation logs through the log server to perform operation analysis of the industrial personal computers or big data joint analysis of the industrial personal computers, so that the operation condition of the industrial personal computers can be timely and quickly known, and early warning and prevention can be performed.
The application provides a method, equipment and a storage medium for rapidly analyzing logs, which are used for acquiring the running logs generated in the running process, preprocessing the running logs, judging the types of the running logs, analyzing the running logs according to preset rules corresponding to the types of the running logs, displaying analysis results of the analyzed running logs, rapidly finding out problems in the running logs through the analysis results, and facilitating staff to verify the data correctness of an industrial personal computer, and finding out problems and daily operation and maintenance of the industrial personal computer in the running process in advance.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
In this application, the same or similar term concept, technical solution, and/or application scenario description will generally be described in detail only when first appearing, and when repeated later, for brevity, will not generally be repeated, and when understanding the content of the technical solution of the present application, etc., reference may be made to the previous related detailed description thereof for the same or similar term concept, technical solution, and/or application scenario description, etc., which are not described in detail later.
In this application, the descriptions of the embodiments are focused on, and the details or descriptions of one embodiment may be found in the related descriptions of other embodiments.
The technical features of the technical solutions of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the above embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the present application.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as above, comprising several instructions for causing a terminal device (which may be a consumer or a network device, etc.) to perform the method of each embodiment of the present application.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (10)

1. The method is characterized by being applied to an industrial personal computer and comprising the following steps of:
s1, acquiring an operation log generated in an operation process, and preprocessing the operation log;
s2, judging the type of the operation log, and analyzing the operation log according to a preset rule corresponding to the type of the operation log;
and step S3, displaying an analysis result of the operation log after analysis.
2. A method of rapid analysis of logs as defined in claim 1, wherein: further comprises:
and S4, obtaining characteristic information of the required operation log, and matching the operation log conforming to the characteristic information in the analysis result.
3. A method of rapid analysis of logs as defined in claim 2, wherein: in the step S1, the running log is preprocessed, specifically,
step S11, uniformly processing all running logs, and judging whether the running logs are legal logs or not; if the running log is legal, executing a step S2; and if the running log is an illegal log, recording as 0.
4. A method of rapid analysis of logs as defined in claim 3 wherein: in the step S2, the type of the running log is determined, and the running log is parsed according to a preset rule, specifically,
obtaining the type of the operation log according to the content in the operation log; the types of the running logs comprise complex types and simple types, and the running logs of the complex types are analyzed through regular expressions; the simple type of travel log is parsed by the program code.
5. The method for rapidly analyzing logs according to claim 4, wherein: the analyzing the operation log according to the preset rule further comprises: acquiring a data line of the running log, judging whether the data line is a first record, if so, judging whether the first record comprises an ending characteristic string, and if so, adding an illegal log list; when the data line is not the first record, judging whether the data line comprises a start characteristic string, and if the data line comprises the start characteristic string, adding the statistics time into a time list.
6. The method for rapidly analyzing logs according to claim 5, wherein: the time-of-use list includes average time-of-use, median time-of-use, continuous maximum over threshold time-of-use, the time-of-use list being accurate to milliseconds or microseconds.
7. A method of rapid analysis of logs as defined in claim 2, wherein: the method also comprises the following steps:
and S5, uploading the analysis result to a log server, and analyzing the analysis result through the log server.
8. A method of rapid analysis of logs as defined in claim 3 wherein: in the step S11, whether the running log is legal is determined according to the thread id and the running time in the running log.
9. An electronic device, comprising a processor, a memory and a computer program stored in the memory and operable on the processor, wherein the processor implements a method for rapidly analyzing logs according to any one of claims 1 to 8 when executing the computer program.
10. A storage medium having stored thereon a computer program which, when executed, implements a method for rapid analysis of logs according to any of claims 1 to 8.
CN202310311478.5A 2023-03-28 2023-03-28 Method, equipment and storage medium for rapidly analyzing logs Pending CN116560938A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310311478.5A CN116560938A (en) 2023-03-28 2023-03-28 Method, equipment and storage medium for rapidly analyzing logs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310311478.5A CN116560938A (en) 2023-03-28 2023-03-28 Method, equipment and storage medium for rapidly analyzing logs

Publications (1)

Publication Number Publication Date
CN116560938A true CN116560938A (en) 2023-08-08

Family

ID=87495511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310311478.5A Pending CN116560938A (en) 2023-03-28 2023-03-28 Method, equipment and storage medium for rapidly analyzing logs

Country Status (1)

Country Link
CN (1) CN116560938A (en)

Similar Documents

Publication Publication Date Title
US7561742B2 (en) Apparatus and methods for converting raster illustrated parts images into intelligent vector-layered files
CN111553137B (en) Report generation method and device, storage medium and computer equipment
CN112116168B (en) User behavior prediction method and device and electronic equipment
CN113159246B (en) Steel mill cargo identification method and device based on two-dimensional code label and computer equipment
CN115034286A (en) Abnormal user identification method and device based on adaptive loss function
CN114417405A (en) Privacy service data analysis method based on artificial intelligence and server
CN113723555A (en) Abnormal data detection method and device, storage medium and terminal
CN116383742B (en) Rule chain setting processing method, system and medium based on feature classification
CN115221893B (en) Quality inspection rule automatic configuration method and device based on rule and semantic analysis
CN116560938A (en) Method, equipment and storage medium for rapidly analyzing logs
CN112711577A (en) Abnormal transaction enterprise identification method and device
CN111931186A (en) Software risk identification method and device
CN109918638B (en) Network data monitoring method
CN111460268B (en) Method and device for determining database query request and computer equipment
CN112163217B (en) Malware variant identification method, device, equipment and computer storage medium
CN111027296A (en) Report generation method and system based on knowledge base
CN111831683A (en) Automatic auditing method and system based on dynamic extended scene matching
CN115129927B (en) Monitoring video stream backtracking method, electronic equipment and storage medium
CN109582534B (en) Method and device for determining operation entry of system and server
KR20230150496A (en) Data pre-processing method and pre-processing device for automating classification of security check items using machine learning model
CN108153817B (en) Intelligent web page data acquisition method
CN117893335A (en) Tax risk identification method and system based on text information extraction
Sipayung et al. Modelling Data Mining Dynamic Code Attributes With Scheme Definition Technique
CN116644428A (en) Webpage risk assessment method, webpage risk assessment device, electronic equipment and storage medium
CN115907465A (en) Reputation risk positioning analysis method and system based on risk positioning model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication