WO2023116399A1 - 策略风险定位方法、装置、电子设备及存储介质 - Google Patents

策略风险定位方法、装置、电子设备及存储介质 Download PDF

Info

Publication number
WO2023116399A1
WO2023116399A1 PCT/CN2022/136438 CN2022136438W WO2023116399A1 WO 2023116399 A1 WO2023116399 A1 WO 2023116399A1 CN 2022136438 W CN2022136438 W CN 2022136438W WO 2023116399 A1 WO2023116399 A1 WO 2023116399A1
Authority
WO
WIPO (PCT)
Prior art keywords
control
detection
strategy
controls
detection result
Prior art date
Application number
PCT/CN2022/136438
Other languages
English (en)
French (fr)
Inventor
徐子鸿
Original Assignee
富途网络科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富途网络科技(深圳)有限公司 filed Critical 富途网络科技(深圳)有限公司
Priority to CA3241827A priority Critical patent/CA3241827A1/en
Priority to AU2022417432A priority patent/AU2022417432A1/en
Publication of WO2023116399A1 publication Critical patent/WO2023116399A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Definitions

  • the present application relates to quantification components in the financial field, and in particular to a strategic risk positioning method, device, electronic equipment and storage medium.
  • An object of the present application is to provide a policy risk location method, device, electronic device and storage medium, which can improve the security of the constructed policy.
  • a strategic risk positioning method includes:
  • the risk existing in the strategy is located.
  • a strategy risk positioning device includes:
  • a strategy building module configured to respond to a drag operation on a control in the canvas area, and build a strategy to be executed
  • the global detection module is configured to detect the global composition of all controls in the canvas area in response to the triggering of the first strategy detection condition, and obtain the global detection result;
  • the detection module within the control is configured to detect the internal parameters of each control in the canvas area in response to the triggering of the second strategy detection condition, and obtain the detection result within the control;
  • the inter-control detection module is configured to detect the connection relationship between adjacent controls in the canvas area in response to the triggering of the third policy detection condition, and obtain the inter-control detection result;
  • the risk positioning module is configured to locate the risks existing in the strategy based on the global detection result, the detection result within the control and the detection result between controls.
  • the device is configured as:
  • the device is configured as:
  • the device is configured as:
  • the device is configured as:
  • vertex node control is not a start frame control
  • the controls traversed along the path where the leaf node control is located are used as the island controls.
  • the device is configured as:
  • the leaf node controls belonging to the non-event box are located, and it is determined that the strategy has risks at the leaf node controls belonging to the non-event box.
  • the device is configured as:
  • the device is configured as:
  • the logically illegal combination conditions in the policy are located, and it is determined that risks exist in the policy at the logically illegal combination conditions.
  • the device is configured as:
  • the wrong connection of the condition box is located, and it is determined that the strategy has a risk at the wrong connection.
  • an electronic device including: one or more processors; a storage device for storing one or more programs, when the one or more programs are executed by the one or more When executed by multiple processors, the electronic device implements any one of the above embodiments.
  • a computer program medium on which computer-readable instructions are stored, and when the computer-readable instructions are executed by the processor of the computer, the computer is made to execute any one of the above embodiments .
  • a computer program product or computer program includes computer instructions, and the computer instructions are stored in a computer-readable storage medium.
  • the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the methods provided in the various optional implementation manners above.
  • the policy risk positioning method provided in this application can provide users with a visualized control operation approach, so that users can build a strategy to be run by dragging and dropping controls. And for the constructed strategy, this application locates its risks through global inspection, intra-control inspection and inter-control inspection, which improves the degree of perfection of risk positioning, thereby improving the security of the constructed strategy.
  • Fig. 1 shows a flow chart of a method for strategic risk positioning according to an embodiment of the present application.
  • Fig. 2 shows a schematic diagram of an island control according to an embodiment of the present application.
  • Fig. 3 shows a schematic diagram of interaction between a user and a quantification component according to an embodiment of the present application.
  • Fig. 4 shows a block diagram of an apparatus for strategic risk positioning according to an embodiment of the present application.
  • Fig. 5 shows a hardware diagram of an electronic device according to an embodiment of the present application.
  • This application provides a strategic risk positioning method, which is mainly applied to quantitative components in the financial field.
  • the quantitative component in this application allows the user to drag and drop controls in the canvas area, and combine the connection between the controls to construct the corresponding strategy.
  • Controls typically include start boxes, condition boxes, and event boxes.
  • the completed strategy can be used for real trading or historical backtesting.
  • Firm offer operation refers to the application of strategies to real trading scenarios and real-time trading.
  • Historical backtesting refers to the use of historical data to test the effectiveness of strategies.
  • Fig. 1 shows a flow chart of a strategic risk positioning method according to an embodiment of the present application.
  • An exemplary executive body of the method is a quantification component, and the method includes:
  • Step S110 building a strategy to be executed in response to the drag operation on the control in the canvas area
  • Step S120 in response to the triggering of the first policy detection condition, detect the global composition of all controls in the canvas area, and obtain the global detection result;
  • Step S130 in response to the triggering of the second strategy detection condition, detect the internal parameters of each control in the canvas area, and obtain the detection result in the control;
  • Step S140 in response to the triggering of the third strategy detection condition, detect the connection relationship between adjacent controls in the canvas area, and obtain the detection result between controls;
  • Step S150 based on the global detection results, the detection results within controls and the detection results between controls, locate the risks existing in the strategy.
  • the quantitative component provides its canvas area to the user, so that the user can construct a strategy in it.
  • the quantitative component constructs a corresponding strategy to be executed.
  • the strategy is used to automatically perform transaction processing on the target.
  • the quantization component detects the global composition of all controls in the canvas area, and obtains the global detection result. That is, take all controls in the canvas area as a detection object, detect the global composition of the detection object, and obtain the global detection result.
  • the quantization component detects the internal parameters of each control in the canvas area, and obtains the detection result within the control. That is, each control in the canvas area is regarded as a detection object, and the internal parameters of each detection object are respectively detected to obtain the detection result in the control.
  • the quantization component detects the connection relationship between adjacent controls in the canvas area, and obtains the detection results between controls. That is, a group of controls that are adjacent to each other in the canvas area are regarded as a pair of detection objects, respectively, and the connection relationship of each pair of detection objects is detected to obtain detection results between controls.
  • the strategy risk positioning method provided by the present application can provide users with a visualized control operation approach, so that users can build a strategy to be run by dragging and dropping controls. And for the constructed strategy, this application locates its risks through global inspection, intra-control inspection and inter-control inspection, which improves the degree of perfection of risk positioning, thereby improving the security of the constructed strategy.
  • the quantity of all controls in the canvas area is detected, and a global detection result describing the quantity of all controls is obtained. If the number of all controls described by the global detection result is greater than the preset control number threshold, it is determined that the strategy is at risk at all the number of controls.
  • global detection is performed from the dimension of the number of controls. Specifically, after the first strategy detection condition is triggered, the quantity of all controls used to build strategies in the canvas area is detected. If the number of all controls is greater than the preset threshold of the number of controls, it means that too many controls are used to build the strategy, which exceeds the load of the quantitative component, so there is a risk. Further, after it is determined that the strategy has risks at the number of all controls, an error reminder can be triggered to remind the user that the strategy that needs to be built in the canvas area cannot run normally because the number of all controls exceeds the limit.
  • the internal functions of each conditional control are traversed; based on the function name and parameter name of the internal function, the number of market targets used by all conditional controls in the canvas area is obtained to obtain A global detection result describing the number of available tickers. If the number of market targets described by the global detection result is greater than the preset target number threshold, it is determined that the strategy has risks in the number of market targets.
  • global detection is performed from the dimension of the number of market indicators. Specifically, since the essence of the conditional control is to call the market data in the quantitative component, and the quantitative component needs to limit the frequency of the market data to protect the background, it is necessary to limit the number of market indicators used.
  • the first strategy detection condition is triggered, detect all conditional controls in the canvas area, and then determine the number of market targets used by all conditional controls. If the number of market targets is greater than the preset target number threshold, it means that too many market targets are used to build the strategy, which will pose a threat to the background, so there is a risk. Further, after it is determined that the strategy has risks in the number of market symbols, an error reminder can be triggered to remind the user that the strategy built in the canvas area will not work normally because the number of all market symbols exceeds the limit.
  • the island control isolated from the start frame of the policy is detected, and a global detection result describing the island control is obtained. Based on the island controls described by the global detection results, locate the island controls, and determine that the policy is at risk at the island controls.
  • the global detection is performed from the dimension of the global topology. Specifically, after the first policy detection condition is triggered, the island control in the canvas area is detected. Referring to the island control circled by the dotted line box in FIG. 2 , the island control refers to a control that is isolated from the start box and has no direct or indirect connection relationship. The presence of siled controls is risky because they cannot function as part of the strategy you are building. Further, after it is determined that the strategy has risk at the island control, a warning reminder may be triggered to remind the user that the strategy constructed in the canvas area may be wrong due to the existence of the island control.
  • the controls are traversed down step by step along the path where the start box is located, to obtain the traversed control set. Eliminate all controls in the traversed control collection from the canvas area, and use the remaining controls as island controls.
  • the start box locate the start box as the root node control in the canvas area, and then traverse the controls step by step along the path where the start box is located.
  • the traversed controls are directly or indirectly connected to the start box, and do not belong to island controls.
  • the traversed control collection After traversing all the paths of the start box, the traversed control collection includes all controls that do not belong to the island control, and the controls that are not in the traversed control collection belong to the island control. Therefore, the traversed control collection is removed from all controls in the canvas area, and then the remaining controls are used as island controls.
  • control is traversed step by step along the path where the leaf node control is located, until the vertex node control located at the vertex of the path where the leaf node control is located is traversed. If the vertex node control is not the start box, the controls traversed along the path where the leaf node control is located are regarded as island controls.
  • the bottommost leaf node controls in the canvas area are located, and then move upward along the path where each leaf node control is located until the corresponding vertex node control is traversed.
  • the vertex node control refers to the control that does not have a parent node and is located at the vertex of the path.
  • there is an island control there are multiple vertex node controls in the canvas area, and only one vertex node control is the start box of the root node control.
  • vertex node control of a certain leaf node control is not the start frame, it means that all controls from the leaf node control to its corresponding vertex node control are isolated from the start frame, so all traversed along the path where the leaf node control is located Controls are island controls.
  • the node type of each leaf node control is detected, and a global detection result describing the leaf node controls belonging to the non-event box is obtained. Based on the leaf node controls belonging to the non-event box described by the global detection results, the leaf node controls belonging to the non-event box are located, and the strategy is determined to have risks at the leaf node controls belonging to the non-event box.
  • the global detection is performed from the dimension of the leaf node control type.
  • the end point of the path must be an event box. That is, the leaf node control must be an event box.
  • the node type of each leaf node control in the canvas area is detected to determine which leaf node controls belong to the event box and which leaf node controls belong to the non-event box. Among them, the leaf node controls that belong to the non-event box will affect the normal operation of the strategy, and there are risks.
  • an error reminder can be triggered to remind the user that the strategy built in the canvas area cannot work normally because the leaf node control does not belong to the event box.
  • the first strategy detection condition includes: detection of a backtest operation on the strategy, detection of a real disk operation on the strategy, and detection of a logic verification operation on the strategy.
  • any first policy detection condition can trigger global detection.
  • the backtesting operation of the strategy by the user will trigger the global detection; the real operation of the strategy by the user will also trigger the global detection; the logic verification operation of the strategy by the user will also trigger the global detection.
  • the in-control detection is performed from the dimension of strategy type and function type.
  • the strategy type describes the account type corresponding to the user account, and the account type includes futures account and securities account.
  • the functions used by each control have corresponding function types. Some function types are only applicable to futures accounts, some function types are only applicable to securities accounts, and some function types are applicable to both.
  • the strategy type and function type are detected.
  • the policy type is extracted from the start box to determine the account type; the functions used in the control are traversed to check the function type, and then compared with the account type to determine whether the two match. If they do not match, the normal operation of the policy will be affected, and there are risks. Further, after it is determined that there is a risk in the matching between the strategy type and the function type of the strategy, an error reminder can be triggered to remind the user that the strategy constructed in the canvas area may fail because the strategy type does not match the account type or because the function type does not match the account type. The account type does not match and cannot function properly.
  • the internal parameters of each control are traversed; based on the global variables used by the internal parameters, the global variables missed by the control are determined, and the global variables that describe the global variables missed by the control are obtained. In-control detection results. Based on the global variables missed by the controls described by the within-control detection results, it is determined that the policy is at risk at the global variables missed by the controls.
  • the detection within the control is performed from the dimension of the global variable. Specifically, after the second policy detection condition is triggered, internal parameters of each control are traversed. When traversing to controls belonging to the start box, build a global variable set according to the global variables defined in the start box; when traversing to other controls, remove the global variables used by other controls from the global variable set. After traversing all the controls, the remaining global variables in the global variable set belong to unused global variables, that is, the global variables omitted by the controls. There may be an operational risk if there are global variables that are missed by the controls. Further, after it is determined that the strategy has a risk in the global variable that the control omits, a warning reminder may be triggered to remind the user that the strategy constructed in the canvas area may be wrong due to the omission of the global variable.
  • in-control detection is performed from the dimension of required parameters.
  • the parameters that must be filled in are required parameters. If the required parameters are omitted, the normal operation of the strategy will be affected.
  • a mapping table of required parameters is pre-configured. After the second strategy detection condition is triggered, traverse the internal parameters of each control to check whether the parameter is manually input and the value is empty. If it is in the mapping table, it means that the parameter is a required parameter that is missing, and there is a risk. Further, after it is determined that there is a risk in the missing required parameters of the strategy, an error reminder can be triggered to remind the user that the strategy built in the canvas area will not work normally due to the missing required parameters.
  • the logical validity of the combination condition in the policy in response to the triggering of the second policy detection condition, based on the detected internal parameters of each control, determine the logical validity of the combination condition in the policy, and obtain the internal detection describing the logical validity of the combination condition result. Based on the logical validity of the combined conditions, the logically illegal combined conditions in the policy are located, and risks exist in the policy at the logically illegal combined conditions.
  • the detection within the control is performed from the logical dimension of the combination condition. Specifically, after the second policy detection condition is triggered, the internal parameters of each control are detected, and then the sub-conditions used by the control are extracted therefrom. Furthermore, based on the logical relationship between the sub-conditions, it is detected whether the combined condition formed by combining multiple sub-conditions is logically legal. If the combined conditional logic is incomplete, it will cause errors in the operation of the strategy. Further, after it is determined that the strategy has a risk at the logically illegal combination condition, an error reminder can be triggered to remind the user that the strategy built in the canvas area cannot run normally due to the logically illegal combination condition.
  • each sub-condition, logical symbol and parentheses are wrapped in a data structure named QCGAN (Quant Condition Group AST Node) in the combined condition, and enumerated values are used in QCAGN to identify its type. Types include: conditional, logical symbol, opening parenthesis, and closing parenthesis.
  • QCGAN Quant Condition Group AST Node
  • Types include: conditional, logical symbol, opening parenthesis, and closing parenthesis.
  • the input order of QCAGN is fixed, so it is stored in an array, and a table is used to maintain the position of QCAGN in the following table and its corresponding error information. Every time an illegal QCAGN is judged, its subscript in the array and the corresponding error information are recorded in the table.
  • the stack is used to judge the closure of left and right brackets: every time a left bracket is encountered, its array subscript is Push on the stack; each time a closing parenthesis is encountered, one is popped.
  • the type of QCAGN processed this time and the previous QCAGN will be judged each time to determine whether the combination condition is logically legal. The judgment is as follows:
  • the in-control detection is performed from the sub-condition dimension of the combination condition.
  • Sub-conditions are an important part of combined conditions. If users create sub-conditions but do not use them, there is a risk of operating errors.
  • a table for recording usage records of sub-conditions is maintained in the combined condition data structure. This table counts the number of subconditions used. After the second policy detection condition is triggered, refer to the table to locate sub-conditions with a count of 0, and determine that the strategy has risks at the sub-conditions with a count of 0. Further, after it is determined that the strategy has a risk at the sub-condition with a count of 0, a warning reminder can be triggered to remind the user that the strategy constructed in the canvas area may be wrong due to unused sub-conditions in the combined conditions.
  • in-control detection is performed from the target dimension to which the signal condition applies.
  • the essence of the signal condition is to call the market data through the quantitative component, but these market data are for specific targets. For example, there is no greek data for the stock underlying, and the greek data is only for the option underlying. An underlying that does not apply to the signal conditions will affect the proper functioning of the strategy.
  • the signal condition corresponding to the function is encapsulated to obtain a function table for maintaining function information.
  • the function information maintained in the function table includes the account type applicable to the function and the target type applicable to the function.
  • the second policy detection condition After the second policy detection condition is triggered, query the target information of the signal condition, and compare the query target information with the function information maintained in the function table, so as to determine whether the target applicable to the signal condition is at risk. Further, after it is determined that the strategy is risky in the target to which the signal condition is applied, an error reminder can be triggered to remind the user that the strategy constructed in the canvas area cannot work normally due to the error in the target used in the signal condition.
  • the in-control detection is performed from the underlying dimension to which the account condition applies.
  • the essence of account conditions is to call account-related data through quantitative components, but accounts are also for specific targets. For example, stock accounts cannot call out the data of futures targets. Indices that do not apply to the account conditions will affect the normal operation of the strategy.
  • the strategy type is extracted from the start box; the traversal control collects targets in the strategy, and compares them with the strategy type, so as to determine whether the targets applicable to the account conditions are risky. Further, after it is determined that the strategy is risky in the target where the account condition is applicable, an error reminder can be triggered to remind the user that the strategy built in the canvas area will not work normally due to the error in the target used by the account condition.
  • the second policy detection condition includes: detection of an editing operation on the control.
  • the editing operation includes editing the attribute bar and editing the combination condition window.
  • the controls belonging to the condition box are detected, the definition of the exit link of the condition box is determined, and the detection result between controls describing the definition of the exit link is obtained. Based on the definition of the outlet connection described by the detection results between controls, the wrong connection of the condition box is located, and the risk of the strategy is determined at the wrong connection.
  • connection lines generally at most two connection lines can be drawn from the exit of the condition box, and the user can edit the definitions of these two connection lines ("yes", "no"). If the two lines have the same definition, it will affect the normal operation of the policy. Specifically, after the second policy detection condition is triggered, the controls are traversed, and when the condition box is traversed, it is judged whether the definition of the connection at the exit is the same, so as to determine whether there is a wrong connection. Further, after it is determined that there is a risk in the wrong connection of the strategy, an error reminder can be triggered to remind the user that the strategy built in the canvas area will not work normally due to the wrong connection.
  • the third policy detection condition includes: detection of a removal operation on the control, and detection of a connection operation on the control.
  • Fig. 3 shows a schematic diagram of interaction between a user and a quantification component according to an embodiment of the present application.
  • detecting the canvas area in the quantitative component is a necessary process leading to strategy backtesting and real-disk operation. If the user does not click the "Logic Check” button, but directly clicks the "Strategy Backtest” button or the “Real Offer” button, the system of the quantification component will also first test the strategy built in the canvas area, and then execute the strategy return after the test is passed. Test or actual operation.
  • the user edits the canvas area to build a strategy. After editing, clicking the "logic test” button or the “strategy backtest” button or the “real run” button will trigger the strategy to be tested.
  • the policy passes the test, the front-end reminder of the system passes, and the system enters the next stage; at the same time, since the policy logic passes the test, it means that there is no error affecting the normal operation of the policy. If the policy is detected to have the risk of error, optional, There will also be a warning reminder on the front end of the system.
  • the front end of the system will give an error reminder (for example, by setting the color to display the control, or displaying an error mark " ⁇ " on the connection between two controls), and the user edits the canvas area again to remove the error.
  • the system can simultaneously detect whether the policy is passed, and make a corresponding reminder according to the detection result.
  • the abnormal parameters of this quantitative trading strategy can be measured according to the global detection results, internal detection results, and inter-control detection results, and when the abnormal parameters are greater than or equal to the preset abnormal threshold, the Rebuild the quantitative trading strategy this time, or remind the user whether to rebuild the quantitative strategy if there are many abnormalities in this time; when the abnormal parameters are less than the abnormal threshold, modify and improve the abnormalities and errors in the quantitative trading strategy this time.
  • the abnormal parameter Para_ab is calculated by the following formula:
  • ⁇ , ⁇ , and ⁇ represent the abnormal factors corresponding to each detection method.
  • the user is directly suggested to rebuild the strategy when the abnormality is serious, avoiding the time cost of modifying a large number of abnormal problems, and improving the efficiency of quantitative trading strategy writing and operation.
  • Fig. 4 shows a policy risk positioning device according to an embodiment of the present application, and the device includes:
  • the strategy construction module 210 is configured to construct a strategy to be executed in response to a drag operation on the control in the canvas area;
  • the global detection module 220 is configured to detect the global composition of all controls in the canvas area in response to the triggering of the first policy detection condition, and obtain a global detection result;
  • the control internal detection module 230 is configured to detect the internal parameters of each control in the canvas area in response to the triggering of the second policy detection condition, and obtain the control internal detection result;
  • the inter-control detection module 240 is configured to detect the connection relationship between adjacent controls in the canvas area in response to the triggering of the third policy detection condition, and obtain the inter-control detection result;
  • the risk positioning module 250 is configured to locate the risks existing in the strategy based on the global detection results, the detection results within the control and the detection results between controls.
  • the device is configured as:
  • the device is configured as:
  • the device is configured as:
  • the device is configured as:
  • vertex node control is not a start frame control
  • the controls traversed along the path where the leaf node control is located are used as the island controls.
  • the device is configured as:
  • the leaf node controls belonging to the non-event box are located, and it is determined that the strategy has risks at the leaf node controls belonging to the non-event box.
  • the device is configured as:
  • the device is configured as:
  • the logically illegal combination conditions in the policy are located, and it is determined that risks exist in the policy at the logically illegal combination conditions.
  • the device is configured as:
  • the wrong connection of the condition box is located, and it is determined that the strategy has a risk at the wrong connection.
  • the electronic device 30 according to the embodiment of the present application will be described below with reference to FIG. 5 .
  • the electronic device 30 shown in FIG. 5 is only an example, and should not limit the functions and scope of use of this embodiment of the present application.
  • electronic device 30 takes the form of a general-purpose computing device.
  • Components of the electronic device 30 may include but not limited to: at least one processing unit 310 , at least one storage unit 320 , and a bus 330 connecting different system components (including the storage unit 320 and the processing unit 310 ).
  • the storage unit stores program codes, and the program codes can be executed by the processing unit 310, so that the processing unit 310 executes various exemplary methods according to the present application described in the description part of the above exemplary methods in this specification. Implementation steps. For example, the processing unit 310 may execute various steps as shown in FIG. 1 .
  • the storage unit 320 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 3201 and/or a cache storage unit 3202 , and may further include a read-only storage unit (ROM) 3203 .
  • RAM random access storage unit
  • ROM read-only storage unit
  • the storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including but not limited to: an operating system, one or more application programs, other program modules, and program data, Implementations of networked environments may be included in each or some combination of these examples.
  • Bus 330 may represent one or more of several types of bus structures, including a memory cell bus or memory cell controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local area using any of a variety of bus structures. bus.
  • the electronic device 30 can also communicate with one or more external devices 400 (such as keyboards, pointing devices, Bluetooth devices, etc.), and can also communicate with one or more devices that enable the user to interact with the electronic device 30, and/or communicate with Any device (eg, router, modem, etc.) that enables the electronic device 30 to communicate with one or more other computing devices. Such communication may occur through input/output (I/O) interface 350 .
  • An input/output (I/O) interface 350 is connected to the display unit 340 .
  • the electronic device 30 can also communicate with one or more networks (such as a local area network (LAN), a wide area network (WAN) and/or a public network such as the Internet) through the network adapter 360 .
  • networks such as a local area network (LAN), a wide area network (WAN) and/or a public network such as the Internet
  • network adapter 360 communicates with other modules of electronic device 30 via bus 330 .
  • other hardware and/or software modules may be used in conjunction with electronic device 30, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives And data backup storage system, etc.
  • the technical solutions according to the embodiments of the present application can be embodied in the form of software products, which can be stored in a non-volatile storage medium (which can be CD-ROM, U disk, mobile hard disk, etc.) or on the network , including several instructions to make a computing device (which may be a personal computer, server, terminal device, or network device, etc.) execute the method according to the embodiment of the present application.
  • a non-volatile storage medium which can be CD-ROM, U disk, mobile hard disk, etc.
  • a computing device which may be a personal computer, server, terminal device, or network device, etc.
  • a computer-readable storage medium on which computer-readable instructions are stored, and when the computer-readable instructions are executed by a processor of a computer, the computer is made to perform the above method Methods described in the Examples section.
  • a program product for implementing the method in the above method embodiment which may adopt a portable compact disc read-only memory (CD-ROM) and include program codes, and may be used in a terminal devices, such as personal computers.
  • CD-ROM portable compact disc read-only memory
  • the program product of this application is not limited thereto.
  • a readable storage medium may be any tangible medium that contains or stores a program, and the program can be used by or in combination with an instruction execution system, device, or device.
  • the program product may reside on any combination of one or more readable media.
  • the readable medium may be a readable signal medium or a readable storage medium.
  • the readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any combination thereof. More specific examples (non-exhaustive list) of readable storage media include: electrical connection with one or more conductors, portable disk, hard disk, random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage devices, magnetic storage devices, or any suitable combination of the foregoing.
  • a computer readable signal medium may include a data signal carrying readable program code in baseband or as part of a carrier wave. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a readable signal medium may also be any readable medium other than a readable storage medium that can transmit, propagate, or transport a program for use by or in conjunction with an instruction execution system, apparatus, or device.
  • Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • Program codes for performing the operations of the present application can be written in any combination of one or more programming languages, including object-oriented programming languages—such as JAVA, C++, etc., as well as conventional procedural programming languages. Programming language - such as "C" or a similar programming language.
  • the program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server to execute.
  • the remote computing device may be connected to the user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device (for example, using an Internet service provider). business to connect via the Internet).
  • LAN local area network
  • WAN wide area network
  • Internet service provider for example, using an Internet service provider
  • the example implementations described here can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solutions according to the embodiments of the present application can be embodied in the form of software products, which can be stored in a non-volatile storage medium (which can be CD-ROM, U disk, mobile hard disk, etc.) or on the network , including several instructions to make a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) execute the method according to the embodiment of the present application.
  • a non-volatile storage medium which can be CD-ROM, U disk, mobile hard disk, etc.
  • a computing device which may be a personal computer, a server, a mobile terminal, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

提供了一种策略风险定位方法、装置、电子设备及存储介质,方法包括:响应于在画布区域对于控件的拖拽操作,构建待运行的策略;响应于第一策略检测条件的触发,对画布区域中所有控件的全局组成进行检测,得到全局检测结果;响应于第二策略检测条件的触发,对画布区域中各控件的内部参数进行检测,得到控件内检测结果;响应于第三策略检测条件的触发,对画布区域中相邻控件的连接关系进行检测,得到控件间检测结果;基于全局检测结果、控件内检测结果以及控件间检测结果,定位策略中存在的风险。

Description

策略风险定位方法、装置、电子设备及存储介质
相关申请的交叉引用
本申请要求于2021年12月21日提交的,申请名称为“策略风险定位方法、装置、电子设备及存储介质”的、中国专利申请号为“202111575104.1”的优先权,该中国专利申请的全部内容通过引用结合在本申请中。
技术领域
本申请涉及金融领域中的量化组件,具体涉及一种策略风险定位方法、装置、电子设备及存储介质。
背景技术
在金融领域中,量化的学习以及操作均具有一定门槛,从而导致普通用户在量化过程中所构建的策略容易出现风险,致使策略常常无法正常运行,从而使得量化操作失败。因此亟需提出一种方案以克服上述缺陷。
技术解决方案
本申请的一个目的在于提出一种策略风险定位方法、装置、电子设备及存储介质,能够提高所构建策略的安全性。
根据本申请实施例的一方面,公开了一种策略风险定位方法,所述方法包括:
响应于在画布区域对于控件的拖拽操作,构建待运行的策略;
响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果;
响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果;
响应于第三策略检测条件的触发,对所述画布区域中相邻控件的连接关系进行检测,得到控件间检测结果;
基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险。
根据本申请实施例的一方面,公开了一种策略风险定位装置,所述装置包括:
策略构建模块,配置为响应于在画布区域对于控件的拖拽操作,构建待运行的策略;
全局检测模块,配置为响应于第一策略检测条件的触发,对所述画布 区域中所有控件的全局组成进行检测,得到全局检测结果;
控件内检测模块,配置为响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果;
控件间检测模块,配置为响应于第三策略检测条件的触发,对所述画布区域中相邻控件的连接关系进行检测,得到控件间检测结果;
风险定位模块,配置为基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第一策略检测条件的触发,遍历各条件控件的内部函数;
基于所述内部函数的函数名称以及参数名称,获取所述画布区域中所有条件控件所使用的行情标的的数量,得到描述有行情标的数量的全局检测结果;
若所述全局检测结果所描述的行情标的数量大于预设的标的数量阈值,则确定所述策略在行情标的数量处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第一策略检测条件的触发,对与所述策略的开始框相隔离的孤岛控件进行检测,得到描述有孤岛控件的全局检测结果;
基于所述全局检测结果所描述的孤岛控件,定位所述孤岛控件,并确定所述策略在所述孤岛控件处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
沿开始框所在路径向下逐级遍历控件,得到遍历到的控件集合;
将所述遍历到的控件集合从所述画布区域中所有控件剔除,将剩余的控件作为所述孤岛控件。
在本申请的一示例性实施例中,所述装置配置为:
沿叶子节点控件所在路径向上逐级遍历控件,直到遍历到位于所述叶子节点控件所在路径的顶点的顶点节点控件;
若所述顶点节点控件不是开始框控件,则将沿所述叶子节点控件所在路径遍历到的各控件作为所述孤岛控件。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第一策略检测条件的触发,对各叶子节点控件所属节点类型进行检测,得到描述有属于非事件框的叶子节点控件的全局检测结果;
基于所述全局检测结果所描述的属于非事件框的叶子节点控件,定位属于非事件框的叶子节点控件,并确定所述策略在属于非事件框的叶子节点控件处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第二策略检测条件的触发,遍历各控件的内部参数;基于所述内部参数使用到的全局变量,确定控件所遗漏的全局变量,得到描述有控件所遗漏的全局变量的控件内检测结果;
基于所述控件内检测结果所描述的控件所遗漏的全局变量,确定所述 策略在所述控件所遗漏的全局变量处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第二策略检测条件的触发,基于检测到的各控件的内部参数,确定所述策略中的组合条件的逻辑合法性,得到描述有所述组合条件的逻辑合法性的控件内检测结果;
基于所述组合条件的逻辑合法性,定位所述策略中的逻辑非法的组合条件,并确定所述策略在所述逻辑非法的组合条件处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第三策略检测条件的触发,对属于条件框的控件进行检测,确定条件框的出口连线的定义,得到描述有出口连线的定义的控件间检测结果;
基于所述控件间检测结果所描述的出口连线的定义,定位条件框的错误连线,并确定所述策略在所述错误连线处存在风险。
根据本申请实施例的一方面,公开了一种电子设备,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述电子设备实现以上任一项实施例。
根据本申请实施例的一方面,公开了一种计算机程序介质,其上存储有计算机可读指令,当所述计算机可读指令被计算机的处理器执行时,使计算机执行以上任一项实施例。
根据本申请实施例的一个方面,提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述各种可选实现方式中提供的方法。
本申请所提供的策略风险定位方法,能够为用户提供可视化的控件操作途径,使得用户能够通过拖拽控件构建待运行的策略。并且针对所构建的策略,本申请通过对其进行全局检测、控件内检测以及控件间检测定位其风险所在,提高了风险定位的完善程度,从而提高了所构建策略的安全性。
本申请的其他特性和优点将通过下面的详细描述变得显然,或部分地通过本申请的实践而习得。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性的,并不能限制本申请。
附图说明
通过参考附图详细描述其示例实施例,本申请的上述和其它目标、特征及优点将变得更加显而易见。
图1示出了根据本申请一个实施例的策略风险定位方法的流程图。
图2示出了根据本申请一个实施例的孤岛控件的示意图。
图3示出了根据本申请一个实施例的用户与量化组件的交互示意图。
图4示出了根据本申请一个实施例的策略风险定位装置的框图。
图5示出了根据本申请一个实施例的电子设备硬件图。
具体实施方式
现在将参考附图更全面地描述示例实施方式。然而,示例实施方式能够以多种形式实施,且不应被理解为限于在此阐述的范例;相反,提供这些示例实施方式使得本申请的描述将更加全面和完整,并将示例实施方式的构思全面地传达给本领域的技术人员。附图仅为本申请的示意性图解,并非一定是按比例绘制。图中相同的附图标记表示相同或类似的部分,因而将省略对它们的重复描述。
此外,所描述的特征、结构或特性可以以任何合适的方式结合在一个或更多示例实施方式中。在下面的描述中,提供许多具体细节从而给出对本申请的示例实施方式的充分理解。然而,本领域技术人员将意识到,可以实践本申请的技术方案而省略所述特定细节中的一个或更多,或者可以采用其它的方法、组元、步骤等。在其它情况下,不详细示出或描述公知结构、方法、实现或者操作以避免喧宾夺主而使得本申请的各方面变得模糊。
附图中所示的一些方框图是功能实体,不一定必须与物理或逻辑上独立的实体相对应。可以采用软件形式来实现这些功能实体,或在一个或多个硬件模块或集成电路中实现这些功能实体,或在不同网络和/或处理器装置和/或微控制器装置中实现这些功能实体。
本申请提供了一种策略风险定位方法,主要应用于金融领域中的量化组件。具体的,本申请中的量化组件供用户在其画布区域中对控件进行拖拽操作,结合控件之间的连线构建得到对应的策略。控件通常包括开始框、条件框以及事件框。构建完成的策略可用于进行实盘运行或者历史回测。实盘运行指的是将策略运用于真实交易场景,实时进行交易。历史回测指的是利用历史数据检测策略的有效性。
图1示出了本申请一实施例的策略风险定位方法的流程图,该方法的示例性执行主体为量化组件,该方法包括:
步骤S110、响应于在画布区域对于控件的拖拽操作,构建待运行的策略;
步骤S120、响应于第一策略检测条件的触发,对画布区域中所有控件的全局组成进行检测,得到全局检测结果;
步骤S130、响应于第二策略检测条件的触发,对画布区域中各控件的内部参数进行检测,得到控件内检测结果;
步骤S140、响应于第三策略检测条件的触发,对画布区域中相邻控件 的连接关系进行检测,得到控件间检测结果;
步骤S150、基于全局检测结果、控件内检测结果以及控件间检测结果,定位策略中存在的风险。
本申请实施例中,量化组件将其画布区域提供给用户,使得用户可在其中进行策略的构建。响应于在画布区域中对于控件的拖拽操作,量化组件构建对应的策略以待运行。本实施例中策略用于自动对标的进行交易处理。
在策略构建过程中,响应于第一策略检测条件的触发,量化组件对画布区域中所有控件的全局组成进行检测,得到全局检测结果。即,将画布区域中所有控件作为一个检测对象,检测该检测对象的全局组成,得到全局检测结果。
在策略构建过程中,响应于第二策略检测条件的触发,量化组件对画布区域中各控件的内部参数进行检测,得到控件内检测结果。即,将画布区域中各控件分别作为一个检测对象,分别检测各检测对象的内部参数,得到控件内检测结果。
在策略构建过程中,响应于第三策略检测条件的触发,量化组件对画布区域中相邻控件的连接关系进行检测,得到控件间检测结果。即,将画布区域中两两相邻的一组组控件分别作为一对检测对象,分别检测各对检测对象的连接关系,得到控件间检测结果。
进而基于全局检测结果、控件内检测结果以及控件间检测结果,定位策略中存在的风险。
由此可见,本申请所提供的策略风险定位方法,能够为用户提供可视化的控件操作途径,使得用户能够通过拖拽控件构建待运行的策略。并且针对所构建的策略,本申请通过对其进行全局检测、控件内检测以及控件间检测定位其风险所在,提高了风险定位的完善程度,从而提高了所构建策略的安全性。
在一实施例中,响应于第一策略检测条件的触发,对画布区域中所有控件的数量进行检测,得到描述有所有控件数量的全局检测结果。若全局检测结果所描述的所有控件数量大于预设的控件数量阈值,则确定策略在所有控件数量处存在风险。
该实施例中,从控件数量的维度进行全局检测。具体的,第一策略检测条件触发后,检测画布区域中用于构建策略的所有控件的数量。若所有控件数量大于预设的控件数量阈值,则说明用于构建策略所使用的控件过多,超出量化组件的承载负荷,因此存在风险。进一步的,在确定策略在所有控件数量处存在风险后,可以触发错误提醒,以提醒用户需要其在画布区域中构建的策略会由于所有控件数量超出限制而无法正常运行。
在一实施例中,响应于第一策略检测条件的触发,遍历各条件控件的内部函数;基于内部函数的函数名称以及参数名称,获取画布区域中所有 条件控件所使用的行情标的的数量,得到描述有行情标的数量的全局检测结果。若全局检测结果所描述的行情标的数量大于预设的标的数量阈值,则确定策略在行情标的数量处存在风险。
该实施例中,从行情标的数量的维度进行全局检测。具体的,由于条件控件的本质是在量化组件中调用行情数据,而量化组件需要对行情数据限频以保护后台,故需要对使用到的行情标的数量进行限制。第一策略检测条件触发后,检测画布区域中的所有条件控件,进而确定所有条件控件所使用的行情标的的数量。若行情标的数量大于预设的标的数量阈值,则说明用于构建策略所使用的行情标的过多,会对后台造成威胁,因此存在风险。进一步的,在确定策略在行情标的数量处存在风险后,可以触发错误提醒,以提醒用户其在画布区域中构建的策略会由于所有行情标的数量超出限制而无法正常运行。
在一实施例中,响应于第一策略检测条件的触发,对与策略的开始框相隔离的孤岛控件进行检测,得到描述有孤岛控件的全局检测结果。基于全局检测结果所描述的孤岛控件,定位孤岛控件,并确定策略在孤岛控件处存在风险。
该实施例中,从全局拓扑的维度进行全局检测。具体的,第一策略检测条件触发后,检测画布区域中的孤岛控件。参考图2中虚线框所圈选的孤岛控件,孤岛控件指的是与开始框相隔离,不存在直接或间接连接关系的控件。若存在孤岛控件,则说明这些孤岛控件无法作为所构建策略的一部分而发挥作用,因此存在风险。进一步的,在确定策略在孤岛控件处存在风险后,可以触发警告提醒,以提醒用户其在画布区域中构建的策略会由于存在孤岛控件而可能出错。
在一实施例中,沿开始框所在路径向下逐级遍历控件,得到遍历到的控件集合。将遍历到的控件集合从画布区域中所有控件剔除,将剩余的控件作为孤岛控件。
该实施例中,定位画布区域中作为根节点控件的开始框,进而沿开始框所在路径向下逐级遍历控件,遍历到的控件均与开始框存在直接或间接连接关系,不属于孤岛控件。当遍历了开始框的所有路径后,遍历到的控件集合即包含了所有不属于孤岛控件的控件,并且,不在该遍历到的控件集合中的控件均属于孤岛控件。因此,将该遍历到的控件集合从画布区域中所有控件剔除,进而将剩余的控件作为孤岛控件。
在一实施例中,沿叶子节点控件所在路径向上逐级遍历控件,直到遍历到位于叶子节点控件所在路径的顶点的顶点节点控件。若顶点节点控件不是开始框,则将沿叶子节点控件所在路径遍历到的各控件作为孤岛控件。
该实施例中,定位画布区域中最底层的各叶子节点控件,进而沿各叶子节点控件所在路径向上逐级控件,直到遍历到对应的顶点节点控件。顶点节点控件指的是不存在父节点,位于所在路径顶点的控件。当存在孤岛控件时,画布区域中的顶点节点控件有多个,其中只有一个顶点节点控件 是作为根节点控件的开始框。
若某个叶子节点控件的顶点节点控件不是开始框,则说明从该叶子节点控件到其对应的顶点节点控件的所有控件均与开始框相隔离,因此沿该叶子节点控件所在路径遍历到的所有控件均属于孤岛控件。
在一实施例中,响应于第一策略检测条件的触发,对各叶子节点控件所属节点类型进行检测,得到描述有属于非事件框的叶子节点控件的全局检测结果。基于全局检测结果所描述的属于非事件框的叶子节点控件,定位属于非事件框的叶子节点控件,并确定策略在属于非事件框的叶子节点控件处存在风险。
该实施例中,从叶子节点控件类型的维度进行全局检测。具体的,为保证策略正常运行,路径的终点必须为事件框。即,叶子节点控件必须为事件框。第一策略检测条件触发后,检测画布区域中的各叶子节点控件所属节点类型,确定哪些叶子节点控件属于事件框,哪些叶子节点控件属于非事件框。其中,属于非事件框的叶子节点控件会影响策略的正常运行,存在风险。进一步的,在确定策略在属于非事件框的叶子节点控件处存在风险后,可以触发错误提醒,以提醒用户其在画布区域中构建的策略会由于叶子节点控件不属于事件框而无法正常运行。
在一实施例中,第一策略检测条件包括:检测到对策略所作的回测操作,检测到对策略所作的实盘运行操作,检测到对策略所作的逻辑检验操作。
该实施例中,任一第一策略检测条件均能够触发全局检测。用户对策略进行回测操作会触发全局检测;用户对策略进行实盘运行操作也会触发全局检测;用户对策略进行逻辑检验操作也会触发全局检测。
在一实施例中,从策略类型以及函数类型的维度进行控件内检测。策略类型描述的是用户账户对应的账户类型,账户类型包含期货账户以及证券账户。每个控件所使用的函数都有对应的函数类型,有的函数类型仅适用于期货账户,有的函数类型仅适用于证券账户,有的函数类型两者均可适用。为了保证账户类型与函数类型的一致,对策略类型以及函数类型进行检测。
具体的,第二策略检测条件触发后,从开始框提取出策略类型,从而确定账户类型;遍历控件中使用到的函数,查看函数类型,进而与账户类型进行比较,确定二者是否相符。若不相符,则会影响策略的正常运行,存在风险。进一步的,在确定策略在策略类型以及函数类型之间的匹配上存在风险后,可以触发错误提醒,以提醒用户其在画布区域中构建的策略会由于策略类型与账户类型不符或者由于函数类型与账户类型不符而无法正常运行。
在一实施例中,响应于第二策略检测条件的触发,遍历各控件的内部参数;基于内部参数使用到的全局变量,确定控件所遗漏的全局变量,得 到描述有控件所遗漏的全局变量的控件内检测结果。基于控件内检测结果所描述的控件所遗漏的全局变量,确定策略在控件所遗漏的全局变量处存在风险。
该实施例中,从全局变量的维度进行控件内检测。具体的,第二策略检测条件触发后,遍历各控件的内部参数。遍历到属于开始框的控件时,根据开始框中定义的全局变量,建立全局变量集合;在遍历到其他控件时,将其他控件所用到的全局变量从全局变量集合中剔除。所有控件遍历完毕后,全局变量集合中剩余的全局变量属于没有使用到的全局变量,即,控件所遗漏的全局变量。若存在控件所遗漏的全局变量,可能会存在操作风险。进一步的,在确定策略在控件所遗漏的全局变量处存在风险后,可以触发警告提醒,以提醒用户其在画布区域中构建的策略会由于遗漏有全局变量而可能出错。
在一实施例中,从必填参数的维度进行控件内检测。必须填写的参数为必填参数,若漏填必填参数,会影响策略的正常运行。具体的,预先配置一张必填参数的映射表。第二策略检测条件触发后,遍历各控件的内部参数,检测参数是否为手动输入且值为空,若是且位于映射表中,则说明参数为漏填的必填参数,存在风险。进一步的,在确定策略在漏填的必填参数处存在风险后,可以触发错误提醒,以提醒用户其在画布区域中构建的策略会由于漏填有必填参数而无法正常运行。
在一实施例中,响应于第二策略检测条件的触发,基于检测到的各控件的内部参数,确定策略中的组合条件的逻辑合法性,得到描述有组合条件的逻辑合法性的控件内检测结果。基于组合条件的逻辑合法性,定位策略中的逻辑非法的组合条件,并确定策略在逻辑非法的组合条件处存在风险。
该实施例中,从组合条件的逻辑合法维度进行控件内检测。具体的,第二策略检测条件触发后,检测各控件的内部参数,进而从中提取出控件所使用到的子条件。进而基于子条件之间的逻辑关系,检测由多个子条件组合而成的组合条件是否逻辑合法。若组合条件逻辑不完整,则会导致策略运行出错。进一步的,在确定策略在逻辑非法的组合条件处存在风险后,可以触发错误提醒,以提醒用户其在画布区域中构建的策略会由于组合条件逻辑非法而无法正常运行。
其中,每一个子条件,逻辑符号以及括号都在组合条件中使用名为QCGAN(Quant Condition Group AST Node)的数据结构包裹,QCAGN里面使用枚举值来标识其所属类型。类型包括:条件,逻辑符号,左括号,以及右括号。QCAGN的输入顺序是固定的,故采用数组进行存储,另外使用一张表来维护QCAGN的下表位置和其对应的错误信息。每次判断到非法的QCAGN,便将其在数组的下标和对应的错误信息记录到表里面,另外使用栈来做左右括号闭合的判断:每次遇到左括号,便将其数组下标压栈;每次遇到右括号便弹出一个。针对QCAGN所作处理,每次会将本次处理 的QCAGN和前一个QCAGN的类型进行判断,以确定组合条件是否逻辑合法。判断如下:
1、针对条件类型的QCAGN,若其不是出现在开始位置,并且其前一个QCAGN的类型不是左括号或者逻辑符号,则其逻辑非法;其他情况下逻辑合法。
2、针对逻辑符号类型的QCAGN,若其前一个QCAGN的类型不是右括号或者条件,则其逻辑非法;其他情况下逻辑合法。
3、针对左括号类型的QCAGN,若其不是出现在开始位置,并且其前一个QCAGN的类型不是逻辑符号或者左括号,则其逻辑非法;其他情况下逻辑合法。
4、针对右括号类型的QCAGN,先判断栈是否空的,若栈是空的代表没有对应的左括号,进而再判断其前一个QCAGN的类型。若其前一个QCAGN的类型不是右括号或者条件,则其逻辑非法;其他情况下逻辑合法。
在一实施例中,从组合条件的子条件维度进行控件内检测。子条件是构成组合条件的重要部分,用户如果创建子条件却不使用,会存在操作失误的风险。具体的,在组合条件的数据结构中维护一个用于记录子条件使用记录的表。该表对使用到的子条件进行计数。第二策略检测条件触发后,查阅该表定位计数为0的子条件,并确定策略在计数为0的子条件处存在风险。进一步的,在确定策略在计数为0的子条件处存在风险后,可以触发警告提醒,以提醒用户其在画布区域中构建的策略会由于组合条件中存在未使用到的子条件而可能出错。
在一实施例中,从信号条件所适用的标的维度进行控件内检测。信号条件本质是通过量化组件调用行情数据,但这些行情数据是针对特定标的的。例如对于股票标的不存在希腊值数据,希腊值数据只针对期权标的。不适用于信号条件的标的会影响策略的正常运行。具体的,对函数对应的信号条件进行封装,得到用于维护函数信息的函数表。该函数表中维护的函数信息包括函数适用的账户类型以及函数适用的标的类型。第二策略检测条件触发后,查询信号条件的标的信息,将查询到的标的信息于函数表中维护的函数信息进行对比,从而确定信号条件所适用的标的是否存在风险。进一步的,在确定策略在信号条件所适用的标的处存在风险后,可以触发错误提醒,以提醒用户其在画布区域中构建的策略会由于信号条件所使用的标的存在错误而无法正常运行。
在一实施例中,从账户条件所适用的标的维度进行控件内检测。账户条件的本质是通过量化组件调用账户相关数据,但是账户也是针对特定标的的。例如股票账户无法调出期货标的的数据。不适用于账户条件的标的会影响策略的正常运行。具体的,第二策略检测条件触发后,从开始框提取出策略类型;遍历控件收集策略中的标的,与策略类型进行对比,从而确定账户条件所适用的标的是否存在风险。进一步的,在确定策略在账户条件所适用的标的处存在风险后,可以触发错误提醒,以提醒用户其在画 布区域中构建的策略会由于账户条件所使用的标的存在错误而无法正常运行。
在一实施例中,第二策略检测条件包括:检测到对控件所作的编辑操作。该编辑操作包括编辑属性栏,编辑组合条件窗口。
在一实施例中,响应于第三策略检测条件的触发,对属于条件框的控件进行检测,确定条件框的出口连线的定义,得到描述有出口连线的定义的控件间检测结果。基于控件间检测结果所描述的出口连线的定义,定位条件框的错误连线,并确定策略在错误连线处存在风险。
该实施例中,从条件框的出口一般最多可以拉出两条连线,用户可以编辑这两条连线的定义(“是”,“否”)。如果这两条连线定义相同,则会影响策略的正常运行。具体的,第二策略检测条件触发后,遍历控件,当遍历到条件框时,判断出口的连线的定义是否相同,从而确定是否存在错误连线。进一步的,在确定策略在错误连线处存在风险后,可以触发错误提醒,以提醒用户其在画布区域中构建的策略会由于错误连线而无法正常运行。
在一实施例中,第三策略检测条件包括:检测到对控件所作的移除操作,检测到对控件所作的连线操作。
图3示出了本申请一实施例的用户与量化组件的交互示意图。
该实施例中,对量化组件中的画布区域进行检测是通向策略回测以及实盘运行的必经过程。若用户没有点击“逻辑检验”按钮,直接点击“策略回测”按钮或者“实盘运行”按钮,量化组件的系统也会先对画布区域中构建的策略进行检测,检测通过后再执行策略回测或者实盘运行。
具体的,用户编辑画布区域以构建策略,完成编辑后,点击“逻辑检验”按钮或是点击策略回测”按钮或是点击“实盘运行”按钮均会触发对策略进行检测。
若策略通过检测,系统前端提醒通过,进而系统进入下一阶段;同时,由于策略逻辑通过检测意味着不存在影响策略正常运行的错误,若检测出策略存在可能导致出错的风险,可选的,系统前端还会进行警告提醒。
若策略未通过检测,系统前端进行错误提醒(例如通过设定颜色显示控件、或者在两个控件之间的连线上显示错误标记“×”),用户再次编辑画布区域以去除错误。在用户编辑画布区域的过程中,可选的,系统可以同步检测策略是否通过,并根据检测结果作出相应的提醒。
进一步的,本实施例中可以根据全局检测结果、控件内检测结果、控件间检测结果的情况来衡量本次量化交易策略的异常参数,并在异常参数大于或者等于预设的异常阈值时,对本次量化交易策略进行重建,或者提醒用户本次量化策略异常较多是否重建;在异常参数小于异常阈值时,对本次量化交易策略中的异常和错误进行修改和完善。
具体的,在计算异常参数时,获取全局检测结果、控件内检测结果、控件间检测结果中发生异常的异常数量,分别对应为第一异常数量Ece_1、第二异常数量Ece_2、第三异常数量Ece_3,同时获取全局检测结果、控件内检测结果、控件间检测中包括的策略运行的路径总数,分别对应为第一路径数量Path_1、第二路径数量Path_2以及第三路径数量Path_3。通过如下公式计算异常参数Para_ab:
Figure PCTCN2022136438-appb-000001
其中,α、β、γ表示各检测方式对应的异常因子。
通过上述方式,在异常较为严重的情况下直接建议用户重建策略,避免了修改大量的异常问题加大的时间成本,提高了量化交易策略编写和运行的效率。
图4示出了根据本申请一实施例的策略风险定位装置,所述装置包括:
策略构建模块210,配置为响应于在画布区域对于控件的拖拽操作,构建待运行的策略;
全局检测模块220,配置为响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果;
控件内检测模块230,配置为响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果;
控件间检测模块240,配置为响应于第三策略检测条件的触发,对所述画布区域中相邻控件的连接关系进行检测,得到控件间检测结果;
风险定位模块250,配置为基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第一策略检测条件的触发,遍历各条件控件的内部函数;
基于所述内部函数的函数名称以及参数名称,获取所述画布区域中所有条件控件所使用的行情标的的数量,得到描述有行情标的数量的全局检测结果;
若所述全局检测结果所描述的行情标的数量大于预设的标的数量阈值,则确定所述策略在行情标的数量处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第一策略检测条件的触发,对与所述策略的开始框相隔离的孤岛控件进行检测,得到描述有孤岛控件的全局检测结果;
基于所述全局检测结果所描述的孤岛控件,定位所述孤岛控件,并确定所述策略在所述孤岛控件处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
沿开始框所在路径向下逐级遍历控件,得到遍历到的控件集合;
将所述遍历到的控件集合从所述画布区域中所有控件剔除,将剩余的 控件作为所述孤岛控件。
在本申请的一示例性实施例中,所述装置配置为:
沿叶子节点控件所在路径向上逐级遍历控件,直到遍历到位于所述叶子节点控件所在路径的顶点的顶点节点控件;
若所述顶点节点控件不是开始框控件,则将沿所述叶子节点控件所在路径遍历到的各控件作为所述孤岛控件。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第一策略检测条件的触发,对各叶子节点控件所属节点类型进行检测,得到描述有属于非事件框的叶子节点控件的全局检测结果;
基于所述全局检测结果所描述的属于非事件框的叶子节点控件,定位属于非事件框的叶子节点控件,并确定所述策略在属于非事件框的叶子节点控件处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第二策略检测条件的触发,遍历各控件的内部参数;基于所述内部参数使用到的全局变量,确定控件所遗漏的全局变量,得到描述有控件所遗漏的全局变量的控件内检测结果;
基于所述控件内检测结果所描述的控件所遗漏的全局变量,确定所述策略在所述控件所遗漏的全局变量处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第二策略检测条件的触发,基于检测到的各控件的内部参数,确定所述策略中的组合条件的逻辑合法性,得到描述有所述组合条件的逻辑合法性的控件内检测结果;
基于所述组合条件的逻辑合法性,定位所述策略中的逻辑非法的组合条件,并确定所述策略在所述逻辑非法的组合条件处存在风险。
在本申请的一示例性实施例中,所述装置配置为:
响应于所述第三策略检测条件的触发,对属于条件框的控件进行检测,确定条件框的出口连线的定义,得到描述有出口连线的定义的控件间检测结果;
基于所述控件间检测结果所描述的出口连线的定义,定位条件框的错误连线,并确定所述策略在所述错误连线处存在风险。
下面参考图5来描述根据本申请实施例的电子设备30。图5显示的电子设备30仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。
如图5所示,电子设备30以通用计算设备的形式表现。电子设备30的组件可以包括但不限于:上述至少一个处理单元310、上述至少一个存储单元320、连接不同系统组件(包括存储单元320和处理单元310)的总线330。
其中,所述存储单元存储有程序代码,所述程序代码可以被所述处理 单元310执行,使得所述处理单元310执行本说明书上述示例性方法的描述部分中描述的根据本申请各种示例性实施方式的步骤。例如,所述处理单元310可以执行如图1中所示的各个步骤。
存储单元320可以包括易失性存储单元形式的可读介质,例如随机存取存储单元(RAM)3201和/或高速缓存存储单元3202,还可以进一步包括只读存储单元(ROM)3203。
存储单元320还可以包括具有一组(至少一个)程序模块3205的程序/实用工具3204,这样的程序模块3205包括但不限于:操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。
总线330可以为表示几类总线结构中的一种或多种,包括存储单元总线或者存储单元控制器、外围总线、图形加速端口、处理单元或者使用多种总线结构中的任意总线结构的局域总线。
电子设备30也可以与一个或多个外部设备400(例如键盘、指向设备、蓝牙设备等)通信,还可与一个或者多个使得用户能与该电子设备30交互的设备通信,和/或与使得该电子设备30能与一个或多个其它计算设备进行通信的任何设备(例如路由器、调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口350进行。输入/输出(I/O)接口350与显示单元340相连。并且,电子设备30还可以通过网络适配器360与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图所示,网络适配器360通过总线330与电子设备30的其它模块通信。应当明白,尽管图中未示出,可以结合电子设备30使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。
通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本申请实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、终端装置、或者网络设备等)执行根据本申请实施方式的方法。
在本申请的示例性实施例中,还提供了一种计算机可读存储介质,其上存储有计算机可读指令,当所述计算机可读指令被计算机的处理器执行时,使计算机执行上述方法实施例部分描述的方法。
根据本申请的一个实施例,还提供了一种用于实现上述方法实施例中的方法的程序产品,其可以采用便携式紧凑盘只读存储器(CD-ROM)并包括程序代码,并可以在终端设备,例如个人电脑上运行。然而,本申请的程序产品不限于此,在本文件中,可读存储介质可以是任何包含或存储程序 的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
所述程序产品可以采用一个或多个可读介质的任意组合。可读介质可以是可读信号介质或者可读存储介质。可读存储介质例如可以为但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。
计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了可读程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。可读信号介质还可以是可读存储介质以外的任何可读介质,该可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。
可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于无线、有线、光缆、RF等等,或者上述的任意合适的组合。
可以以一种或多种程序设计语言的任意组合来编写用于执行本申请操作的程序代码,所述程序设计语言包括面向对象的程序设计语言—诸如JAVA、C++等,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在用户设备上执行、作为一个独立的软件包执行、部分在用户计算设备上部分在远程计算设备上执行、或者完全在远程计算设备或服务器上执行。在涉及远程计算设备的情形中,远程计算设备可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算设备,或者,可以连接到外部计算设备(例如利用因特网服务提供商来通过因特网连接)。
应当注意,尽管在上文详细描述中提及了用于动作执行的设备的若干模块或者单元,但是这种划分并非强制性的。实际上,根据本申请的实施方式,上文描述的两个或更多模块或者单元的特征和功能可以在一个模块或者单元中具体化。反之,上文描述的一个模块或者单元的特征和功能可以进一步划分为由多个模块或者单元来具体化。
此外,尽管在附图中以特定顺序描述了本申请中方法的各个步骤,但是,这并非要求或者暗示必须按照该特定顺序来执行这些步骤,或是必须执行全部所示的步骤才能实现期望的结果。附加的或备选的,可以省略某些步骤,将多个步骤合并为一个步骤执行,以及/或者将一个步骤分解为多个步骤执行等。
通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方 式来实现。因此,根据本申请实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、移动终端、或者网络设备等)执行根据本申请实施方式的方法。
本领域技术人员在考虑说明书及实践这里公开的申请后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由所附的权利要求指出。

Claims (15)

  1. 一种策略风险定位方法,所述方法包括:
    响应于在画布区域对于控件的拖拽操作,构建待运行的策略,所述策略用于自动对标的进行交易处理;
    响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果;
    响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果;
    响应于第三策略检测条件的触发,对所述画布区域中相邻控件的连接关系进行检测,得到控件间检测结果;
    基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险。
  2. 根据权利要求1所述的方法,其中,响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果,包括:响应于所述第一策略检测条件的触发,遍历各条件控件的内部函数;基于所述内部函数的函数名称以及参数名称,获取所述画布区域中所有条件控件所使用的行情标的的数量,得到描述有行情标的数量的全局检测结果;
    基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:若所述全局检测结果所描述的行情标的数量大于预设的标的数量阈值,则确定所述策略在行情标的数量处存在风险。
  3. 根据权利要求1所述的方法,其中,响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果,包括:响应于所述第一策略检测条件的触发,对与所述策略的开始框相隔离的孤岛控件进行检测,得到描述有孤岛控件的全局检测结果;
    基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述全局检测结果所描述的孤岛控件,定位所述孤岛控件,并确定所述策略在所述孤岛控件处存在风险。
  4. 根据权利要求3所述的方法,其中,对与所述策略的开始框相隔离的孤岛控件进行检测,包括:
    沿开始框所在路径向下逐级遍历控件,得到遍历到的控件集合;
    将所述遍历到的控件集合从所述画布区域中所有控件剔除,将剩余的控件作为所述孤岛控件。
  5. 根据权利要求3所述的方法,其中,对与所述策略的开始框相隔离的孤岛控件进行检测,包括:
    沿叶子节点控件所在路径向上逐级遍历控件,直到遍历到位于所述叶子节点控件所在路径的顶点的顶点节点控件;
    若所述顶点节点控件不是开始框控件,则将沿所述叶子节点控件所在路径遍历到的各控件作为所述孤岛控件。
  6. 根据权利要求1所述的方法,其中,响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果,包括:响应于所述第一策略检测条件的触发,对各叶子节点控件所属节点类型进行检测,得到描述有属于非事件框的叶子节点控件的全局检测结果;
    基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述全局检测结果所描述的属于非事件框的叶子节点控件,定位属于非事件框的叶子节点控件,并确定所述策略在属于非事件框的叶子节点控件处存在风险。
  7. 根据权利要求1所述的方法,其中,所述第一策略检测条件包括:检测到对所述策略所作的回测操作,检测到对所述策略所作的实盘运行操作,检测到对所述策略所作的逻辑检验操作。
  8. 根据权利要求1所述的方法,其中,响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果,包括:响应于所述第二策略检测条件的触发,遍历各控件的内部参数;基于所述内部参数使用到的全局变量,确定控件所遗漏的全局变量,得到描述有控件所遗漏的全局变量的控件内检测结果;
    基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述控件内检测结果所描述的控件所遗漏的全局变量,确定所述策略在所述控件所遗漏的全局变量处存在风险。
  9. 根据权利要求1所述的方法,其中,响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果,包括:响应于所述第二策略检测条件的触发,基于检测到的各控件的内部参数,确定所述策略中的组合条件的逻辑合法性,得到描述有所述组合条件的逻辑合法性的控件内检测结果;
    基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述组合条件的逻辑合法性,定位所述策略中的逻辑非法的组合条件,并确定所述策略在所述逻辑非法的组合条件处存在风险。
  10. 根据权利要求1所述的方法,其中,所述第二策略检测条件包括:检测到对控件所作的编辑操作。
  11. 根据权利要求1所述的方法,其中,响应于第三策略检测条件的触发,对所述画布区域中相邻控件的连接关系进行检测,得到控件间检测结果,包括:响应于所述第三策略检测条件的触发,对属于条件框的控件进行检测,确定条件框的出口连线的定义,得到描述有出口连线的定义的 控件间检测结果;
    基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险,包括:基于所述控件间检测结果所描述的出口连线的定义,定位条件框的错误连线,并确定所述策略在所述错误连线处存在风险。
  12. 根据权利要求1所述的方法,其中,所述第三策略检测条件包括:检测到对控件所作的移除操作,检测到对控件所作的连线操作。
  13. 一种策略风险定位装置,所述装置包括:
    策略构建模块,配置为响应于在画布区域对于控件的拖拽操作,构建待运行的策略;
    全局检测模块,配置为响应于第一策略检测条件的触发,对所述画布区域中所有控件的全局组成进行检测,得到全局检测结果;
    控件内检测模块,配置为响应于第二策略检测条件的触发,对所述画布区域中各控件的内部参数进行检测,得到控件内检测结果;
    控件间检测模块,配置为响应于第三策略检测条件的触发,对所述画布区域中相邻控件的连接关系进行检测,得到控件间检测结果;
    风险定位模块,配置为基于所述全局检测结果、所述控件内检测结果以及所述控件间检测结果,定位所述策略中存在的风险。
  14. 一种电子设备,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述电子设备实现如权利要求1至12中任一项所述的方法。
  15. 一种计算机可读存储介质,其上存储有计算机可读指令,当所述计算机可读指令被计算机的处理器执行时,使计算机执行权利要求1至12中任一项所述的方法。
PCT/CN2022/136438 2021-12-21 2022-12-05 策略风险定位方法、装置、电子设备及存储介质 WO2023116399A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CA3241827A CA3241827A1 (en) 2021-12-21 2022-12-05 Policy risk positioning method and apparatus, electronic device, and storage medium
AU2022417432A AU2022417432A1 (en) 2021-12-21 2022-12-05 Policy risk positioning method and apparatus, electronic device, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111575104.1 2021-12-21
CN202111575104.1A CN114237477B (zh) 2021-12-21 2021-12-21 策略风险定位方法、装置、电子设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023116399A1 true WO2023116399A1 (zh) 2023-06-29

Family

ID=80760758

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/136438 WO2023116399A1 (zh) 2021-12-21 2022-12-05 策略风险定位方法、装置、电子设备及存储介质

Country Status (4)

Country Link
CN (1) CN114237477B (zh)
AU (1) AU2022417432A1 (zh)
CA (1) CA3241827A1 (zh)
WO (1) WO2023116399A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117453534A (zh) * 2023-10-10 2024-01-26 上海卡方信息科技有限公司 一种数据处理方法、装置、设备及可读存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114237477B (zh) * 2021-12-21 2024-05-14 富途网络科技(深圳)有限公司 策略风险定位方法、装置、电子设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8682773B1 (en) * 2010-05-03 2014-03-25 KnowVera, LLC Methods and system for visually designing trading strategies and execution thereof
US20150235318A1 (en) * 2014-02-19 2015-08-20 William Huan Trading systems and methods
CN110503556A (zh) * 2019-08-28 2019-11-26 中国银行股份有限公司 交易策略模型的可视化配置方法及装置
CN113254003A (zh) * 2021-07-19 2021-08-13 北京星火量化科技有限公司 量化交易策略的编辑方法及系统
CN114237477A (zh) * 2021-12-21 2022-03-25 富途网络科技(深圳)有限公司 策略风险定位方法、装置、电子设备及存储介质
CN115053245A (zh) * 2021-09-24 2022-09-13 富途网络科技(深圳)有限公司 创建量化交易策略的方法和装置

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8336085B2 (en) * 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
US7844530B2 (en) * 2006-07-31 2010-11-30 Insight Catastrophe Solutions Apparatuses, methods, and systems for providing a risk scoring engine user interface
US8650623B2 (en) * 2007-01-17 2014-02-11 International Business Machines Corporation Risk adaptive information flow based access control
US20160125535A1 (en) * 2014-10-31 2016-05-05 Trading Technologies International Inc. Location-aware risk mitigation systems and methods
CN110688107B (zh) * 2019-09-26 2023-09-26 中国银行股份有限公司 量化交易策略的代码生成方法及装置
CN111176635A (zh) * 2019-12-09 2020-05-19 深圳市博思恒业信息技术有限公司 模块化量化系统及其执行方法、电子设备
CN111583017A (zh) * 2020-04-09 2020-08-25 上海淇毓信息科技有限公司 基于客群定位的风险策略生成方法、装置及电子设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8682773B1 (en) * 2010-05-03 2014-03-25 KnowVera, LLC Methods and system for visually designing trading strategies and execution thereof
US20150235318A1 (en) * 2014-02-19 2015-08-20 William Huan Trading systems and methods
CN110503556A (zh) * 2019-08-28 2019-11-26 中国银行股份有限公司 交易策略模型的可视化配置方法及装置
CN113254003A (zh) * 2021-07-19 2021-08-13 北京星火量化科技有限公司 量化交易策略的编辑方法及系统
CN115053245A (zh) * 2021-09-24 2022-09-13 富途网络科技(深圳)有限公司 创建量化交易策略的方法和装置
CN114237477A (zh) * 2021-12-21 2022-03-25 富途网络科技(深圳)有限公司 策略风险定位方法、装置、电子设备及存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117453534A (zh) * 2023-10-10 2024-01-26 上海卡方信息科技有限公司 一种数据处理方法、装置、设备及可读存储介质
CN117453534B (zh) * 2023-10-10 2024-05-07 上海卡方信息科技有限公司 一种数据处理方法、装置、设备及可读存储介质

Also Published As

Publication number Publication date
CA3241827A1 (en) 2023-06-29
AU2022417432A1 (en) 2024-07-25
CN114237477B (zh) 2024-05-14
CN114237477A (zh) 2022-03-25

Similar Documents

Publication Publication Date Title
WO2023116399A1 (zh) 策略风险定位方法、装置、电子设备及存储介质
AU2015201161B2 (en) Event correlation
US7680645B2 (en) Software feature modeling and recognition
US20170244733A1 (en) Intrusion detection using efficient system dependency analysis
US11929985B2 (en) Network-based authentication rule cleaning and optimization
US11119843B2 (en) Verifying application behavior based on distributed tracing
CN112368994B (zh) 日志型式分析设备及日志型式分析方法
US20210397499A1 (en) Method to efficiently evaluate a log pattern
US11809585B2 (en) Systems and methods for computing database interactions and evaluating interaction parameters
CN111027984A (zh) 业务订单的处理方法、系统、电子设备及计算机存储介质
US20190154707A1 (en) Smart Advisor for Blood Test Evaluation
US8090994B2 (en) System, method, and computer readable media for identifying a log file record in a log file
US8225298B2 (en) Tool for analyzing Siebel escripts
WO2024119806A1 (zh) 策略编排方法、报文处理方法、装置、设备及系统
CN111324516A (zh) 自动记录异常事件的方法及装置、存储介质、电子设备
CN104794040A (zh) 业务监控方法、装置及系统
WO2021172776A1 (en) Bm return verification method and apparatus
KR100791307B1 (ko) 요금 청구 가능한 자원을 결정하는 장치, 네트워킹된 컴퓨터 시스템, 컴퓨터 구현형 방법 및 컴퓨터 판독가능한 기록 매체
CN112581282A (zh) 估值结果损益变动监控方法、装置、电子设备及介质
BRPI0621694A2 (pt) arquivamento de adequação de capital e sistema e método de tributação
CN114580889A (zh) 操作风险管控方法、装置、设备、介质和程序产品
TWI397016B (zh) 金融程式交易整體機制監控並自動異常排除之方法
Gao et al. On modeling contagion in the formation of operational risk loss
CN112214495B (zh) 数据执行跟踪方法、装置和设备
US12124599B2 (en) Systems and methods for computing database interactions and evaluating interaction parameters

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22909714

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 3241827

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: AU2022417432

Country of ref document: AU

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2022417432

Country of ref document: AU

Date of ref document: 20221205

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 11202404260P

Country of ref document: SG