CN110598645A - Method for rapidly repairing fault and risk of information system - Google Patents

Method for rapidly repairing fault and risk of information system Download PDF

Info

Publication number
CN110598645A
CN110598645A CN201910874195.5A CN201910874195A CN110598645A CN 110598645 A CN110598645 A CN 110598645A CN 201910874195 A CN201910874195 A CN 201910874195A CN 110598645 A CN110598645 A CN 110598645A
Authority
CN
China
Prior art keywords
alarm
information
character
image information
records
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910874195.5A
Other languages
Chinese (zh)
Other versions
CN110598645B (en
Inventor
曹徐平
何泽松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xijun Data Technology Co Ltd
Original Assignee
Beijing Xijun Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xijun Data Technology Co Ltd filed Critical Beijing Xijun Data Technology Co Ltd
Priority to CN201910874195.5A priority Critical patent/CN110598645B/en
Priority to CN202310832678.5A priority patent/CN116862474A/en
Publication of CN110598645A publication Critical patent/CN110598645A/en
Application granted granted Critical
Publication of CN110598645B publication Critical patent/CN110598645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • G06F16/3332Query translation
    • G06F16/3334Selection or weighting of terms from queries, including natural language queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/205Parsing
    • G06F40/216Parsing using statistical methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/284Lexical analysis, e.g. tokenisation or collocates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/26Techniques for post-processing, e.g. correcting the recognition result
    • G06V30/262Techniques for post-processing, e.g. correcting the recognition result using context analysis, e.g. lexical, syntactic or semantic context
    • G06V30/274Syntactic or semantic context, e.g. balancing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/40Document-oriented image-based pattern recognition
    • G06V30/42Document-oriented image-based pattern recognition based on the type of document

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • General Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • General Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Multimedia (AREA)
  • Strategic Management (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Probability & Statistics with Applications (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a method for rapidly repairing the alarm of the fault and risk of an information system, which comprises the following steps: step 1, acquiring character image information containing alarm information; step 2, identifying alarm information in the character image information, generating character alarm information and displaying the character alarm information; step 3, retrieving the alarm information, generating and sending similar alarm records, historical alarm records and repair schemes thereof; step 4, displaying similar alarm records, historical alarm records and repair schemes thereof to a user; step 5, repairing the equipment alarm according to the repairing scheme of the similar alarm and/or the historical alarm; and 6, recording the alarm information and the repair scheme.

Description

Method for rapidly repairing fault and risk of information system
Technical Field
The invention relates to the technical field of computers, in particular to a method for rapidly repairing faults and risks of an information system.
Background
At present, people are in the information age, and businesses of various industries depend on information systems. Information system (Information system) refers to a man-machine integrated system composed of computer hardware, network and communication devices, computer software, Information resources, Information users, and regulatory systems for the purpose of processing Information streams. In order to ensure the normal operation of the information system, operation and maintenance personnel and an operation and maintenance system are needed. When the operation and maintenance system detects the failure and risk of the information system, an alarm is generated, and operation and maintenance personnel are notified in the modes of sound and light, web pages, short messages, mails, instant messaging tools, print form worksheets and the like, wherein the alarm content generally comprises: time of occurrence of the fault and risk, address of the device where the fault and risk occurred, cause of the fault and risk, etc. Operation and maintenance personnel usually need to search for solutions of alarms in a mode of inquiring technical manuals, internet web pages, consulting others and the like by depending on work experience, and then implement alarm repair. The repairing mode has the following problems that the efficiency is low due to the fact that operation and maintenance personnel experience is seriously relied on, technical manuals are inquired, alarm information is manually input, webpage results searched by the internet need to be selected, the repairing is often incorrect and untimely, the normal operation of an enterprise information system is influenced, and huge economic loss and negative influence are brought to an enterprise in serious cases.
In order to solve the above problems, the present invention provides a method for rapidly repairing the failure and risk of the information system.
Disclosure of Invention
In order to realize the purpose of the invention, the following technical scheme is adopted for realizing the purpose:
a method for rapidly repairing the alarm of the fault and risk of the information system comprises the following steps:
step 1, acquiring character image information of alarm information of faults and risks of an information system;
step 2, identifying alarm information in the character image information, generating character alarm information and displaying the character alarm information;
step 3, retrieving alarm description information, generating and sending similar alarm records, historical alarm records and repair schemes thereof;
step 4, displaying similar alarm records, historical alarm records and repair schemes thereof to a user;
step 5, repairing the equipment alarm according to the repairing scheme of the similar alarm and/or the historical alarm;
and 6, recording the alarm information and the repair scheme of the information system.
In the method, the character image information containing the warning information is obtained in the step 1 in the following way: scanning or photographing the alarm character information on the alarm equipment through the electronic equipment to obtain image information; or the electronic equipment performs screen capture processing on the character information displayed on the electronic equipment to obtain image information; or by the electronic device obtaining image information from another device to which it is communicatively connected.
The method, wherein the step 2 of identifying the alarm information in the image information to generate alarm description information and displaying comprises the following steps: and (3) the electronic equipment analyzes the image information acquired in the step (1), determines the character information in the image information and identifies the character information to generate display data, wherein the display data comprises the identification result of the character information.
The method described, wherein: the electronic equipment identifies the character information by using an optical character identification method to generate a primary identification result; and then extracting alarm occurrence time in the primary identification result through semantic analysis, and generating an identification result of the character information by the equipment address where the alarm occurs and the alarm reason to generate display data.
The method, wherein the step 3 of retrieving the alarm description information and generating the similar alarm record and the historical alarm record comprises the following steps: the electronic equipment sends the alarm information generated in the step 2 to a server through a network; the server obtains similar alarm records, the historical alarm records of the alarm equipment and the alarm restoration scheme thereof by inquiring the knowledge base, and then the server sends the similar alarm records, the historical alarm records of the alarm equipment and the alarm restoration scheme thereof to the electronic equipment through the network.
The method described, wherein: the similar alarm records are inquired, and the method comprises the following steps: firstly, performing word segmentation and invalid word filtering on an alarm reason, then inquiring an error code dictionary in a knowledge base to check whether the alarm reason contains an error code of an information system, and processing according to two conditions: 1) if the error code of the information system is contained, searching the knowledge base according to the error code; 2) otherwise, inquiring an equipment type dictionary in the knowledge base to check whether the alarm reason contains the equipment type; aiming at the error code condition of the information system contained in the alarm reason, the method comprises two conditions: 1) if the search result exists, the search result is fed back to the user in a descending order according to the result satisfaction, and the result satisfaction is obtained by performing fitting calculation according to the number of times of clicking and viewing the search result and the number of times of applying the repair scheme in the search result; 2) otherwise, inquiring the equipment type dictionary in the knowledge base to check whether the alarm reason contains the equipment type.
The method described, wherein: aiming at the condition that whether the alarm reason contains the equipment type or not is checked by inquiring an equipment type dictionary in a knowledge base, the alarm is processed in two conditions: 1) if the equipment type is contained, traversing the knowledge base according to the equipment type, and calculating the similarity of the alarm reason; 2) otherwise, traversing the full knowledge base, and calculating the similarity with the alarm reason information; for the case containing the device type, the processing is divided into two cases: 1) if the search result exists, feeding back the result to the user in a descending order according to the similarity of the alarm reasons; 2) otherwise, traversing the full knowledge base and calculating the similarity of the alarm reasons; then, inquiring the reason of the alarm and the repaired alarm containing one or more word segmentation results in the alarm repairing scheme in a knowledge base, then calculating the similarity value of the alarm according to a text similarity algorithm, setting a similarity threshold value, and sending the alarm record and the alarm repairing scheme which are higher than the threshold value to the electronic equipment; wherein, the alarm reason similarity adopts a semantic cosine similarity algorithm.
The method, wherein in step 4: the electronic equipment responds to the detected operation instruction of the user on the currently presented similar alarm record and judges whether click operation exists on the similar alarm record or not; and when the judgment result is yes, presenting the details of the similar alarm, wherein the details of the similar alarm comprise: the alarm generation time, the equipment address where the alarm occurs, the alarm reason, the name and contact of the alarm repairer, the alarm repair time and the alarm repair scheme.
The method, wherein in step 4: the electronic equipment responds to the detected operation instruction of the user on the currently presented historical alarm record and judges whether click operation exists on the historical alarm record or not; and in response to the judgment result being yes, presenting the details of the historical alarm, wherein the details of the historical alarm comprise: the alarm generation time, the equipment address where the alarm occurs, the alarm reason, the name and contact of the alarm repairer, the alarm repair time and the alarm repair scheme.
In the method, in the step 5, the user carries out alarm repair according to the similar alarm repair scheme with high similarity and/or the historical alarm repair scheme, and after repairing the alarm, the user inputs a solution and repair time and sends the solution and repair time to the server.
In step 6, the server records the current equipment alarm information in a database, and the method comprises the following steps: the current alarm character image information, the identified alarm occurrence time, the alarm equipment address, the alarm reason, the solution and the repair time recorded by the user after repairing the alarm.
In the method, the alarm reason similarity is calculated by adopting a cosine similarity algorithm based on semantics, and the specific calculation process is as follows:
1) the method comprises the steps of (1) segmenting an alarm reason text, namely segmenting an alarm reason to be inquired and a plurality of alarm reasons in a knowledge base;
2) constructing a word segmentation result set, and respectively taking a union set of the alarm reason to be inquired and the alarm reason word segmentation result of the knowledge base;
3) counting word frequency vectors, respectively traversing an alarm reason word segmentation set to be inquired and an alarm reason word segmentation set in a knowledge base, setting the word segmentation set to be 1 if the word segmentation is in the union of the alarm reason word segmentation set and the word segmentation set, and otherwise, setting the word segmentation set to be 0 to obtain word segmentation vectors of the alarm reason to be inquired and the alarm reason word segmentation result of the knowledge base;
4) and calculating a cosine angle value of the vector, and evaluating the similarity of the alarm reason to be inquired and the cosine value of the included angle of two vectors of each alarm reason in the knowledge base by calculating the cosine value of the included angle between the two vectors of the alarm reason to be inquired and the alarm reason to be inquired. 13. The method of claim 12, wherein computing using a semantic-based cosine similarity algorithm further comprises:
5) calculating semantic similarity: let the semantic similarity symbol be R, defined as: antisense, uncertain, near meaning, the values are: r ═ -1, antisense; r ═ 1, indeterminate; r is 2, close meaning. The calculation process is as follows: extracting verbs and adjectives in the alarm reason word segmentation result, then inquiring a near-meaning word dictionary and an anti-sense dictionary, and if the verbs and the anti-sense dictionary appear in the near-meaning word dictionary at the same time, determining that the synonyms are near-meaning semantics; if the simultaneous occurrence in the anti-sense dictionary is yes, then the anti-sense semantics are obtained; otherwise, it is an uncertain semantic;
and calculating the alarm similarity by the following calculation formula: sim ═ R × Cos (θ), where R is defined as the semantic similarity, and Cos (θ) is defined as the vector cosine clip angle value.
The method described, wherein:
wherein X and Y represent vectors, | X | | | and | | Y | | | represent the moduli of vectors X and Y, and XiAnd yiRepresenting the components of vectors X and Y.
Drawings
FIG. 1 is a block diagram of the system of the present invention;
FIG. 2 is a flow chart of alarm repair according to the present invention;
FIG. 3 is an alarm information image of the present invention;
FIG. 4 is a warning message recognition result of the present invention;
FIG. 5 is a similar alarm detail of the present invention;
FIG. 6 is a historical warning message of the present invention;
FIG. 7 is a schematic diagram of an alarm similarity calculation process according to the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 shows a system architecture 100 to which the method of the present application for rapidly remedying alarms of failure and risk of an information system may be applied.
As shown in fig. 1, the system architecture 100 may include terminals 101, 102, 103, a network 104, and a server 105. The network 104 is a medium used to provide communication links between the terminals 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminals 101, 102, 103 to interact with the server 105 over a network to receive and send messages. The terminals 101, 102, 103 may be installed with various client applications such as a web browser, an instant messenger, a text image recognition type application, a shopping type application, and the like. Further, the terminals 101, 102, and 103 may perform recognition analysis on character information included in character image information acquired by the user, and feed back the analysis result (e.g., generated presentation data) to the user.
The terminals 101, 102, 103 may be various electronic devices, such as an electronic device having one or more of an image capture device (e.g., a camera), an electronic screen. Electronic devices may include, but are not limited to, smart phones, tablets, laptop portable computers, desktop computers, and the like.
The background server may analyze the request instruction sent by the application on the terminal 101, 102, 103, and may send the processing result (e.g., response information related to the request instruction) to the terminal 101, 102, 103.
The server 105 may be a server that provides various services, such as providing text image recognition services to applications on the terminals 101, 102, 103.
It should be noted that the alarm information repairing method provided in the embodiment of the present application is generally executed by the terminals 101, 102, and 103 and the server 105, and accordingly, the alarm information repairing apparatus is generally disposed in the terminals 101, 102, and 103 and the server 105.
It should be understood that the number of terminals, networks, and servers in fig. 1 are merely illustrative. There may be any number of terminals, networks, and servers, as desired for an implementation.
With continued reference to FIG. 2, a flow 200 of one embodiment of an alert information remediation method according to the present application is shown. The method may comprise the steps of:
step 201 obtains the text image information of the failure and risk of the information system.
In this embodiment, the electronic device on which the warning information repairing method operates (for example, the terminals 101, 102, 103 shown in fig. 1) may acquire the image information including the text information by various methods. For example, the electronic device may scan or photograph text information (e.g., alarm information generated by a monitoring platform of an information system) through an image acquisition device (e.g., a camera) installed thereon to acquire image information; for another example, the electronic device may obtain image information from other devices communicatively coupled thereto, such as image information sent by other devices via a chat tool, or image information obtained from a remote database. This facilitates the user to obtain image information containing text information in various scenes (e.g., online or offline).
The text arranged on the layout of the text is commonly referred to as "typographical". The size and shape of each printed word are different, and they are generally represented by word level (or word size, point number) and font, such as the word information on paper media, advertising board, etc. The non-printed characters are usually characters other than the above-mentioned printed characters, such as character information displayed on an electronic screen or handwritten character information. Therefore, the limitation of image information can be reduced, and the application range is favorably improved. In addition, the content of the text information may contain one or more characters of numbers, letters, symbols, chinese characters, and the like.
In the present embodiment, the image information 300 acquired in step 201 is shown in fig. 3, and the image includes and is not limited to include only the content shown in 301, and includes: the time at which the alarm occurred, the address of the device at which the alarm occurred, and the reason for the alarm.
Step 202, identifying the alarm information in the image information, generating alarm description information and displaying the alarm description information.
In this embodiment, first, the electronic device may analyze the image information acquired in step 201 to determine the text information therein. Then, the character information can be identified by using a common character identification method to generate the display data. The display data may include a recognition result of the text information.
In some optional implementation manners of this embodiment, first, the electronic device may recognize the text information by using an Optical Character Recognition (OCR) method to generate a primary Recognition result; then, the alarm occurrence time in the primary recognition result can be extracted through semantic analysis (such as a regular expression, a vocabulary dictionary, an error code dictionary and the like), and the equipment address where the alarm occurs and the reason of the alarm generate the recognition result of the character information to generate the presentation data.
Step 203, retrieving the alarm description information, generating similar alarm records and historical alarm records, and displaying the similar alarm records and the historical alarm records.
In the present embodiment, the electronic device transmits the alert information generated in step 202 to the server 105 through the network. The server 105 then obtains similar alarm records and historical alarm records for the alarm device by querying a knowledge base. Then, the server sends similar alarm records and the historical alarm records of the alarm device and the alarm solutions thereof to the electronic device through the network.
In some optional implementation manners of this embodiment, the querying of the similar alarm records may be performed by first performing word segmentation on the alarm cause and filtering invalid words, for example, a word segmentation result [ Oracle, buffer, hit rate, and exceed limit ] of "Oracle buffer hit rate exceeds limit", then querying the database for the alarm cause and the alarm repair scheme for the repaired alarms containing one or more word segmentation results, and then calculating the similarity value of the alarms according to an alarm similarity algorithm. And finally, descending the order according to the similarity. To reduce the number of similar alarm records presented, a similarity threshold may be set, and alarm records less than the threshold may be discarded from being sent to the electronic device. Here, Word Segmentation generally refers to segmenting a character sequence into a single Word. The word segmentation is the foundation of text mining, and the effect of automatically identifying the meaning of the sentence by a computer can be achieved by successfully segmenting an input word.
In this embodiment, as shown in fig. 7, the process of querying similar alarm records is to perform word segmentation and filtering of invalid words on the alarm reason, then query an error code dictionary in a knowledge base to check whether the alarm reason contains an error code of an information system, and process the alarm reason in two cases: 1) if the error code of the information system is contained, searching the knowledge base according to the error code; 2) otherwise, inquiring the equipment type dictionary in the knowledge base to check whether the alarm reason contains the equipment type. Aiming at the error code condition of the information system contained in the alarm reason, the method comprises two conditions: 1) if the retrieval result is available, namely the knowledge records containing the same error code alarm reason are found in the knowledge base, the results are fed back to the user in a descending order according to the result satisfaction degree, and the result satisfaction degree is obtained by performing fitting calculation according to the number of times that the search result is clicked and viewed and the number of times that the repair scheme in the search result is applied; 2) otherwise, inquiring the equipment type dictionary in the knowledge base to check whether the alarm reason contains the equipment type. Aiming at the condition that whether the alarm reason contains the equipment type or not is checked by inquiring an equipment type dictionary in a knowledge base, the alarm is processed in two conditions: 1) if the equipment type is contained, traversing the knowledge base according to the equipment type, and calculating the similarity of the alarm reason; 2) otherwise, traversing the knowledge base and calculating the similarity with the alarm reason information; for the case of traversing the knowledge base according to the device type, two cases are handled: 1) if the retrieval result is available, namely the knowledge records comprising the alarm reasons of the same equipment type are found in the knowledge base, the information is fed back to the user in a descending order according to the similarity of the alarm reasons; 2) otherwise, traversing the knowledge base and calculating the similarity of the alarm reasons. Then, the method queries the reason of the alarm and the alarm which is repaired and contains one or more word segmentation results in the alarm repairing scheme in the knowledge base, then calculates the similarity value of the alarm according to a text similarity algorithm, sets a similarity threshold value, and sends the alarm record and the alarm repairing scheme which are higher than the threshold value to the electronic equipment.
In this embodiment, the alarm cause similarity adopts a cosine similarity algorithm based on semantics, and the specific algorithm is as follows:
1) the alarm reason text is segmented, for example, the alarm reason A is the alarm to be queried, the alarm reasons B and C are the data of the knowledge base, and the segmentation results are as follows:
the alarm reason A is that the word segmentation result of the 'Oracle buffer hit rate exceeding' is 'Oracle', 'buffer', 'hit rate' and 'exceeding'.
Alarm reason B, the word segmentation result that the hit rate of the Oracle buffer exceeds the threshold value by 80 percent is as follows: "Oracle", "buffer", "hit", "exceed", "threshold", "80%".
Alarm reason C, the word segmentation result of the Oracle buffer hit rate lower than 50% of the threshold value is as follows: "Oracle", "buffer", "hit", "below", "threshold", "50%".
2) Constructing a word segmentation result set, and respectively taking a union set of the alarm reason to be inquired and the alarm reason word segmentation result of the knowledge base, wherein the word segmentation result sets of the alarm reason A and the alarm reason B are as follows: [ "Oracle", "buffer", "hit ratio", "exceed", "threshold", "80%" ],
the word segmentation result set of the alarm reasons A and C is as follows: [ "Oracle", "buffer", "hit ratio", "exceed", "lower", "threshold", "50%" ]
3) And (4) counting word frequency vectors, respectively traversing the alarm reason participle set to be inquired and the alarm reason participle set in the knowledge base, setting the participle to be 1 if the participle is in the union of the two, and otherwise, setting the participle to be 0. For example, the word segmentation vector when the alarm reasons a and B are compared is:
alarm reason A word segmentation vector: [1,1,1,1,0,0,0]
Alarm reason B word segmentation vector: [1,1,1,0,1,1,1]
The word frequency vector when the alarm reasons A and C are compared is as follows:
alarm reason A word segmentation vector: [1,1,1,1,0,0,0]
Alarm reason C word segmentation vector: [1,1,1,0,1,1,1]
4) And calculating the cosine angle value of the vector, and evaluating the similarity of the two vectors by calculating the cosine value of the included angle of the two vectors. A cosine value closer to 1 indicates that the two vectors are more similar. Conversely, the closer the cosine value is to 0, the more dissimilar the two vectors are.
The formula:
(where X and Y represent vectors, | X | | | and | | Y | | | represent the moduli of vectors X and Y, and XiAnd yiRepresenting components of vectors X and Y).
For example, the cosine angle between alarm reasons A and B is 0.6124, and the cosine angle between alarm reasons A and C is 0.6124.
5) And calculating semantic similarity. Because the vector cosine clip angle value only judges the similarity according to the character string characteristics, the judgment of semantic characteristics is lacked, and the alarm with opposite semantics is easy to have high similarity. For example: the cosine clip angle value of the alarm reasons A and B is the same as that of the alarm reasons A and C, but the alarm reasons A and C have an antisense semantic relationship. Therefore, the similarity needs to be judged according to the semantic features. The semantic similarity symbol is R, and is defined as: antisense, uncertain, near meaning, the values are: r ═ -1, antisense; r ═ 1, indeterminate; r is 2, close meaning. The calculation process is as follows: extracting verbs and adjectives in the alarm reason word segmentation result, then inquiring a near-meaning word dictionary and an anti-sense dictionary, and if the verbs and the anti-sense dictionary appear in the near-meaning word dictionary at the same time, determining that the synonyms are near-meaning semantics; if the simultaneous occurrence in the anti-sense dictionary is yes, then the anti-sense semantics are obtained; otherwise, it is uncertain semantics. For example: and the semantic similarity R of the alarm reason A and the alarm B is 2, and the semantic similarity R of the alarm reason A and the alarm C is-1.
And calculating the alarm similarity by the following calculation formula: sim ═ R × Cos (θ), where R is defined as the semantic similarity. Wherein Cos (θ) is defined as the vector cosine clip angle value. For example: the similarity of the alarm reasons A and B is equal to Sim 2 × 0.6124 — 1.2248, and the similarity of the alarm reasons A and C is equal to Sim-1 × 0.6124 — 0.6124. Alarm reason B is more similar to alarm reason a than alarm reason C.
In some optional implementations of this embodiment, querying the historical alarm records of the alarm device may be querying the alarm records from the database, where the device address where the alarm occurs is the same as the current alarm device address, and has been repaired and is in descending order of time. To reduce the historical alarm records presented, a time threshold may be set (e.g., a point in time near the time of failure may be set as the time threshold) below which alarm records are discarded from being sent to the electronic device. .
And step 204, feeding back the display data to the user.
In this embodiment, the electronic device feeds back 202 and 203 the generated presentation data to the user in an on-screen display.
In this embodiment, the presentation data 400 for the user is shown in fig. 4, and includes: 401. 402 and 403. Wherein 401 represents a current alarm information area, including: the address of the device where the alarm occurred and the reason for the alarm. 402 represents a similar alerts list. 403 represents a historical alert list of the current alerting device.
In the embodiment, the electronic equipment judges whether click operation exists on the similar alarm records or not in response to detecting the operation instruction of the user on the similar alarm records currently presented; in response to a yes determination, details 500 of similar alarms will be presented, as shown in fig. 5, where the details of similar alarms include: the alarm generation time, the alarm generation equipment address, the alarm reason, the name and the contact way of the alarm repairer, the alarm repair time and the alarm repair scheme, wherein the alarm reason comprises the following steps: the text image information of the alarm and the text description of the alarm, and the contact way of the alarm repairer comprises: mobile phone, fixed phone and E-mail, the alarm repair scheme includes: the method comprises a text alarm repairing scheme, a picture alarm repairing scheme and a code alarm repairing scheme.
In this embodiment, the method further includes: the electronic equipment responds to the detected operation instruction of the user on the currently presented historical alarm record and judges whether click operation exists on the historical alarm record or not; in response to a yes determination, details 600 of the historical alarms will be presented, as shown in fig. 6, where the details of the historical alarms include: the alarm generation time, the alarm generation equipment address, the alarm reason, the name and the contact way of the alarm repairer, the alarm repair time and the alarm repair scheme, wherein the alarm reason comprises the following steps: the text image information of the alarm and the text description of the alarm, and the contact way of the alarm repairer comprises: mobile phone, fixed phone and E-mail, the alarm repair scheme includes: the method comprises a text alarm repairing scheme, a picture alarm repairing scheme and a code alarm repairing scheme.
In step 205, the user repairs the equipment alarm by referring to the repair scheme of the similar alarm and the historical alarm. In this embodiment, the user performs alarm repair by using a similar alarm repair scheme with high similarity and a historical alarm repair scheme, thereby improving the accuracy of alarm repair and reducing the time of alarm repair. And the solution and the repair time entered by the user after the repair alarm are sent to the server.
And step 206, recording the alarm information and the solution.
In this embodiment, the server 105 will record the information of the current device alarm in the database, including: the method comprises the steps of obtaining the current alarm character image information, the identified alarm occurrence time, the alarm equipment address and the alarm reason, and the solution and the repair time which are input by a user after repairing the alarm, thereby expanding the record of an alarm database and providing parameter data for the subsequent alarm repair.
By the method, operation and maintenance personnel can conveniently know which kind of fault and risk occur to the system, can quickly obtain a solution of the same or similar problems, and provides a good solution for quickly solving the system fault and risk.

Claims (3)

1. A method for rapidly repairing the alarm of the fault and risk of the information system is characterized by comprising the following steps:
step 1, acquiring character image information of alarm information of faults and risks of an information system;
step 2, identifying alarm information in the character image information, generating character alarm information and displaying the character alarm information;
step 3, retrieving alarm description information, generating and sending similar alarm records, historical alarm records and repair schemes thereof;
step 4, displaying similar alarm records, historical alarm records and repair schemes thereof to a user;
step 5, repairing the equipment alarm according to the repairing scheme of the similar alarm and/or the historical alarm;
and 6, recording the alarm information and the repair scheme of the information system.
2. The method according to claim 1, wherein the text image information containing the warning information is obtained in step 1 by: scanning or photographing the alarm character information on the alarm equipment through the electronic equipment to obtain image information; or the electronic equipment performs screen capture processing on the character information displayed on the electronic equipment to obtain image information; or by the electronic device obtaining image information from another device to which it is communicatively connected.
3. The method of claim 1, wherein the step 2 of identifying and displaying the alarm information in the image information to generate the alarm description information comprises: and (3) the electronic equipment analyzes the image information acquired in the step (1), determines the character information in the image information and identifies the character information to generate display data, wherein the display data comprises the identification result of the character information.
CN201910874195.5A 2019-09-17 2019-09-17 Method for rapidly repairing faults and risks of information system Active CN110598645B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910874195.5A CN110598645B (en) 2019-09-17 2019-09-17 Method for rapidly repairing faults and risks of information system
CN202310832678.5A CN116862474A (en) 2019-09-17 2019-09-17 Alarm system for rapidly repairing faults and risks of information system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910874195.5A CN110598645B (en) 2019-09-17 2019-09-17 Method for rapidly repairing faults and risks of information system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202310832678.5A Division CN116862474A (en) 2019-09-17 2019-09-17 Alarm system for rapidly repairing faults and risks of information system

Publications (2)

Publication Number Publication Date
CN110598645A true CN110598645A (en) 2019-12-20
CN110598645B CN110598645B (en) 2023-05-23

Family

ID=68860287

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202310832678.5A Pending CN116862474A (en) 2019-09-17 2019-09-17 Alarm system for rapidly repairing faults and risks of information system
CN201910874195.5A Active CN110598645B (en) 2019-09-17 2019-09-17 Method for rapidly repairing faults and risks of information system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202310832678.5A Pending CN116862474A (en) 2019-09-17 2019-09-17 Alarm system for rapidly repairing faults and risks of information system

Country Status (1)

Country Link
CN (2) CN116862474A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111953541A (en) * 2020-08-10 2020-11-17 腾讯科技(深圳)有限公司 Alarm information processing method and device, computer equipment and storage medium
CN113497716A (en) * 2020-03-18 2021-10-12 华为技术有限公司 Similar fault recommendation method and related equipment
CN115827398A (en) * 2023-02-24 2023-03-21 天翼云科技有限公司 Method and device for calculating alarm information component value, electronic equipment and storage medium
CN115952796A (en) * 2023-03-14 2023-04-11 华北电力科学研究院有限责任公司 Power equipment fault analysis method and device
CN118012725A (en) * 2024-04-09 2024-05-10 西安热工研究院有限公司 Trusted management platform alarm management method, system, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012036345A1 (en) * 2010-09-17 2012-03-22 주식회사 엔웨이브 Optical character recognition and dictionary search system and method in a server-linked integrated page
CN105894747A (en) * 2016-03-25 2016-08-24 国家电网公司 Monitoring-expert-knowledge-base-based warning signal processing decision-making suggesting method
CN106713007A (en) * 2016-11-15 2017-05-24 郑州云海信息技术有限公司 Alarm monitoring system and alarm monitoring method and device for server
CN107196804A (en) * 2017-06-01 2017-09-22 国网山东省电力公司信息通信公司 Power system terminal communication access network Centralized Alarm Monitoring system and method
CN109241282A (en) * 2018-08-08 2019-01-18 麒麟合盛网络技术股份有限公司 A kind of warning message assemblage method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012036345A1 (en) * 2010-09-17 2012-03-22 주식회사 엔웨이브 Optical character recognition and dictionary search system and method in a server-linked integrated page
CN105894747A (en) * 2016-03-25 2016-08-24 国家电网公司 Monitoring-expert-knowledge-base-based warning signal processing decision-making suggesting method
CN106713007A (en) * 2016-11-15 2017-05-24 郑州云海信息技术有限公司 Alarm monitoring system and alarm monitoring method and device for server
CN107196804A (en) * 2017-06-01 2017-09-22 国网山东省电力公司信息通信公司 Power system terminal communication access network Centralized Alarm Monitoring system and method
CN109241282A (en) * 2018-08-08 2019-01-18 麒麟合盛网络技术股份有限公司 A kind of warning message assemblage method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
方俊青;: "论网络舆情监测分析***", 法制与社会 *
许劭庆;马彪;安海英;: "基于数据挖掘的网管告警处理方法研究", 软件工程 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113497716A (en) * 2020-03-18 2021-10-12 华为技术有限公司 Similar fault recommendation method and related equipment
CN113497716B (en) * 2020-03-18 2023-03-10 华为技术有限公司 Similar fault recommendation method and related equipment
US11757701B2 (en) 2020-03-18 2023-09-12 Huawei Technologies Co., Ltd. Method for recommending similar incident, and related device
CN111953541A (en) * 2020-08-10 2020-11-17 腾讯科技(深圳)有限公司 Alarm information processing method and device, computer equipment and storage medium
CN111953541B (en) * 2020-08-10 2023-12-05 腾讯科技(深圳)有限公司 Alarm information processing method, device, computer equipment and storage medium
CN115827398A (en) * 2023-02-24 2023-03-21 天翼云科技有限公司 Method and device for calculating alarm information component value, electronic equipment and storage medium
CN115952796A (en) * 2023-03-14 2023-04-11 华北电力科学研究院有限责任公司 Power equipment fault analysis method and device
CN118012725A (en) * 2024-04-09 2024-05-10 西安热工研究院有限公司 Trusted management platform alarm management method, system, equipment and storage medium

Also Published As

Publication number Publication date
CN116862474A (en) 2023-10-10
CN110598645B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
CN110598645B (en) Method for rapidly repairing faults and risks of information system
WO2020207167A1 (en) Text classification method, apparatus and device, and computer-readable storage medium
CN107797982B (en) Method, device and equipment for recognizing text type
EP2488962A1 (en) System and method for text cleaning
US10031924B2 (en) System and method for feature recognition and document searching based on feature recognition
CN112966081B (en) Method, device, equipment and storage medium for processing question and answer information
CN111191614B (en) Document classification method and device
CN113590802B (en) Session content abnormity detection method and device, electronic equipment and storage medium
US20150278248A1 (en) Personal Information Management Service System
CN113986864A (en) Log data processing method and device, electronic equipment and storage medium
CN112541359A (en) Document content identification method and device, electronic equipment and medium
CN113254815A (en) Document processing method, page processing method and equipment
CN113657088A (en) Interface document analysis method and device, electronic equipment and storage medium
CN113568934B (en) Data query method and device, electronic equipment and storage medium
CN106611148B (en) Image-based offline formula identification method and device
CN113971205A (en) Threat report attack behavior extraction method, device, equipment and storage medium
CN108616413B (en) Information calibration method and device
EP3564833A1 (en) Method and device for identifying main picture in web page
CN115935958A (en) Resume processing method and device, storage medium and electronic equipment
CN113971810A (en) Document generation method, device, platform, electronic equipment and storage medium
CN113849622A (en) Visual cognition question-answering method and system for civil aviation documents
CN114020384A (en) Message display method and device and electronic equipment
CN113569552A (en) Log template extraction method and device, electronic equipment and computer storage medium
CN113486148A (en) PDF file conversion method and device, electronic equipment and computer readable medium
CN112487164A (en) Artificial intelligence interaction method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant