CN110782276A - Access shunting policy interference judgment method and device and electronic equipment - Google Patents

Access shunting policy interference judgment method and device and electronic equipment Download PDF

Info

Publication number
CN110782276A
CN110782276A CN201910957977.5A CN201910957977A CN110782276A CN 110782276 A CN110782276 A CN 110782276A CN 201910957977 A CN201910957977 A CN 201910957977A CN 110782276 A CN110782276 A CN 110782276A
Authority
CN
China
Prior art keywords
shunting
strategy
layer
flow
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910957977.5A
Other languages
Chinese (zh)
Other versions
CN110782276B (en
Inventor
赵明雲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weimeng Chuangke Network Technology China Co Ltd
Original Assignee
Weimeng Chuangke Network Technology China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weimeng Chuangke Network Technology China Co Ltd filed Critical Weimeng Chuangke Network Technology China Co Ltd
Priority to CN201910957977.5A priority Critical patent/CN110782276B/en
Publication of CN110782276A publication Critical patent/CN110782276A/en
Application granted granted Critical
Publication of CN110782276B publication Critical patent/CN110782276B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0242Determining effectiveness of advertisements
    • G06Q30/0245Surveys
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an access distribution strategy interference judgment method, an access distribution strategy interference judgment device and electronic equipment, wherein the method comprises the following steps: dividing the access traffic into a first traffic and a second traffic; respectively enabling the first flow and the second flow to pass through a first-layer shunting strategy, and obtaining a first shunting result corresponding to the first flow; enabling the second flow which passes through the first-layer shunting strategy to pass through a second-layer shunting strategy, and obtaining a second shunting result corresponding to the second flow; and judging the interference degree of the second-layer shunting strategy to the first-layer shunting strategy according to the first shunting result and the second shunting result. In the embodiment of the invention, the cross interference between the first-layer shunting strategy and the second-layer shunting strategy can be analyzed, and the interference degree between the shunting strategies can be accurately determined.

Description

Access shunting policy interference judgment method and device and electronic equipment
Technical Field
The invention relates to the technical field of internet, in particular to an access distribution strategy interference judgment method and device and electronic equipment.
Background
In the advertisement recommendation system, accurate evaluation of the experimental effect of the push strategy is the basis for verifying whether the push strategy is effective. A powerful strategy experimental platform needs to provide comprehensive metrics, faster confidence verification, and cross-interference analysis of experimental strategies. The comprehensive data measurement indexes comprise a selling rate, a click rate, a flow guide rate, a conversion rate, an interaction rate and the like, the faster confidence verification means that enough sample data are collected in less time, and the cross interference analysis of the experiment strategy is to correctly analyze whether the experiment effect of the experiment strategy is interfered by other experiment strategies and the interference degree.
The existing strategy experiment platform cannot provide the function of analyzing the cross interference of the experiment strategies, so that the interference among all the pushing strategies cannot be accurately determined.
Disclosure of Invention
The embodiment of the invention provides an access distribution strategy interference judgment method, an access distribution strategy interference judgment device and electronic equipment, which can accurately determine the interference degree among different access distribution strategies.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, a method for determining access offload policy interference is provided, including: dividing the access traffic into a first traffic and a second traffic; respectively enabling the first flow and the second flow to pass through a first-layer shunting strategy, and obtaining a first shunting result corresponding to the first flow; enabling the second flow which passes through the first-layer shunting strategy to pass through a second-layer shunting strategy, and obtaining a second shunting result corresponding to the second flow; and judging the interference degree of the second-layer shunting strategy to the first-layer shunting strategy according to the first shunting result and the second shunting result.
In a second aspect, an access offloading policy interference determination apparatus is provided, including: the flow dividing module is used for dividing the access flow into a first flow and a second flow; the first shunting module is used for enabling the first flow and the second flow to respectively pass through a first-layer shunting strategy and obtaining a first shunting result corresponding to the first flow; the second shunting module is used for enabling the second traffic which passes through the first-layer shunting strategy to pass through a second-layer shunting strategy and acquiring a second shunting result corresponding to the second traffic; and the interference judging module is used for judging the interference degree of the second-layer shunting strategy on the first-layer shunting strategy according to the first shunting result and the second shunting result.
In a third aspect, an electronic device is provided, comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method according to the first aspect.
In the embodiment of the invention, the first flow and the second flow can respectively pass through a first layer shunting strategy, the second flow passing through the first layer shunting strategy passes through a second layer shunting strategy, the interference degree of the second layer shunting strategy on the first layer shunting strategy is judged according to the first shunting result and the second shunting result, and the cross interference between the first layer shunting strategy and the second layer shunting strategy can be analyzed by comparing the difference of the shunting results when the two strategies share the same action with the single action, so that the interference degree between the shunting strategies can be accurately determined.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram of a single layer experiment and a multi-layer experiment of one embodiment of the present invention;
FIG. 2 is a schematic diagram of a strategic cross-interference analysis of a multi-tier experiment in accordance with an embodiment of the invention;
fig. 3 is a flowchart illustrating an access offloading policy interference determination method according to an embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating a flow of determining interference caused by an experimental strategy according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an access splitting policy interference determination apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical solutions provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
In order to verify the interference situation between multiple push strategies or access offloading strategies, i.e. cross interference analysis between strategies, the evaluation of the effect of the strategies is significantly affected. The existing strategy experiment platform cannot provide the strategy cross interference analysis function, so that the disturbance among all the pushing strategies and the pushing strategy effect cannot be accurately determined.
Before describing the implementation of the embodiments of the present application, the cross-interference principle of the single-layer and multi-layer shunting strategies is introduced. A schematic of the single-layer and multi-layer experiments shown in fig. 1 shows the base (base) strategy and strategies a, B and C. In the single-layer experiment on the left side, 100% of user flow firstly passes through the basic strategy layer and then passes through the strategy layer which is composed of the basic strategy, the strategy A, the strategy B and the strategy C, and the basic strategy, the strategy A, the strategy B and the strategy C are in the same layer, so that the single-layer experiment is called.
In a single-layer experiment, the experiment strategies A, B, C only occupy part of the traffic, however, there are potential interference factors in the experiment, for example, the strategy contents of the strategy a and the strategy B are similar, and the strategy a and the strategy B may interfere with each other. Since the respective traffic of policy a and policy B is exclusive, the effect of policy B is not affected even if the traffic of policy a increases, and thus the problem of interference between potential policy a and policy B cannot be discovered as early as possible. After the experiment strategy A is added into the basic strategy in a full amount, the flow rates of the strategy A and the strategy B are orthogonal, the flow rates passing through the basic strategy layer (including the strategy A) are uniformly distributed and then enter the strategy layer including the strategy B, the effect of the strategy B is suddenly reduced due to the interference of the strategy A, however, the respective flow rates of the strategy A and the strategy B in a single-layer experiment are exclusive, and the effect interference of each experiment strategy cannot be analyzed during the experiment.
As in the multi-layer experiment on the right side of fig. 1, all the traffic will pass through three policy levels respectively including policy a, policy B and policy C, the traffic of the three policies is orthogonal, and all the traffic is available in each policy level. Since traffic sequentially passes through three policy levels including policy a, policy B, and policy C, interference between the respective policies can be analyzed. New experimental layers can be created for independent experimental strategies to perform multi-layer experiments.
Referring to a schematic diagram of policy cross interference analysis of a multi-layer experiment shown in fig. 2, for example, a left-side flow distribution schematic diagram shows that flows of experiment layers Level1, Level2 and Level3 are orthogonal, Level1 includes a base policy and an experiment policy a, Level2 includes a base policy and an experiment policy B, and Level3 includes a base policy and an experiment policy C. The experimental strategy A, B, C is compared with the base strategy of the same layer to respectively obtain the experimental effect of the strategy A, B, C. With the release of the experiment strategies of other experiment layers, the base strategy and the experiment strategy of the current experiment layer may have different ranges of experiment index changes. In order to verify whether or not there is interference between experimental layers and the degree of interference, it is necessary to subdivide the flow, such as the right flow distribution diagram in fig. 2.
And exposing the sample after the flow passes through the last layer of strategy, wherein strategy components in the exposed sample comprise base, A, B, AB, C, AC, BC and ABC.
For the experiment strategy a, it is necessary to analyze the interference of the experiment strategies B and C, respectively, and the flow passing through the experiment strategy a may be divided into two parts, where one part is the flow a + AC that does not pass through the experiment strategy B, and the other part is the flow (a + AC) B after the experiment strategy B is added to the new experiment layer, AB + ABC, and the two parts of flow are randomly generated by the experiment platform. The interference of the experiment strategy B on the experiment strategy A needs to compare the flow rate of the experiment strategy A + AC with the experiment effect index of the flow rate of the experiment strategy AB + ABC, and if the difference of the experiment effect indexes is within a certain range, the interference is not considered. Similarly, the flow of the experiment strategy A + AB is compared with the experiment effect index of the flow of the experiment strategy AC + ABC, and whether the experiment strategy C interferes with the experiment strategy A or not can be judged.
The embodiment 1 of the application provides an access offloading policy interference judgment method. And determining the interference degree among the shunting strategies according to the shunting results of the access flow passing through different shunting strategies.
As shown in fig. 3, the method comprises the steps of:
step 31, the access traffic is divided into a first traffic and a second traffic.
The access flow is the flow of a plurality of users accessing the preset resource. In order to verify the disturbance between the shunting strategies of each layer, the access traffic may be divided into two target traffic according to a preset proportion, and a first traffic label and a second traffic label are added to the two target traffic respectively. During verification, the flow passing through the second layer of offloading policy may be gradually increased to verify the influence thereof on the first layer of offloading policy.
And step 32, respectively passing the first flow and the second flow through a first-layer shunting strategy, and acquiring a first shunting result corresponding to the first flow.
The first flow and the second flow respectively pass through a first layer of shunting strategy, and then the second flow passing through the first layer of shunting strategy passes through a second layer of shunting strategy, wherein a shunting result corresponding to the first flow represents a shunting effect of the first layer of shunting strategy, and a shunting result corresponding to the second flow represents a shunting effect common to the first layer of shunting strategy and the second layer of shunting strategy, so that the interference of the second shunting strategy on the first layer of shunting strategy can be verified. Specifically, the first flow rate and the second flow rate may be subjected to flow rate splitting according to a first-layer splitting strategy, and then a first splitting result corresponding to the first flow rate is obtained according to flow rate distribution of the first flow rate after passing through the first-layer splitting strategy.
The flow passes through the shunting strategy, the user corresponding to the flow receives the content displayed according to the shunting strategy, and the operation result of the user on the displayed content is used as the shunting result of the shunting strategy.
And step 33, passing the second traffic passing the first-layer splitting strategy through a second-layer splitting strategy, and obtaining a second splitting result corresponding to the second traffic.
It can be understood that, a second traffic passing through the first layer of offloading policy passes through the second layer of offloading policy, an offloading result of the second traffic is a combined action of the first layer of offloading policy and the second layer of offloading policy, a user corresponding to the second traffic receives display content determined jointly according to the first layer of offloading policy and the second layer of offloading policy, and an operation result performed by the user on the display content is taken as an offloading result of the offloading policy. The first split result and the second split result respectively include at least one of the following: a sales rate, a click-through rate, a flow rate, a conversion rate, an interaction rate, or a feedback rate.
And step 34, judging the interference degree of the second-layer shunting strategy to the first-layer shunting strategy according to the first shunting result and the second shunting result.
Taking the flow distribution schematic diagram after flow subdivision shown in fig. 2 as an example, if it is necessary to determine the interference of the policy B on the policy a, the interference degree of the policy B on the policy a may be determined by comparing the experimental effect index of the flow of the policy a passing through the Level1 with the experimental effect index corresponding to the flow of the policy B passing through the Level1 and the Level 2.
In an embodiment, the determining process of the interference degree of the second-layer offloading policy to the first-layer offloading policy may include the following steps:
calculating the difference value of the corresponding numerical values of the first shunting result and the second shunting result; and comparing the difference with a set first interference threshold to determine the interference of the second-layer shunting strategy to the first-layer shunting strategy. Taking the click rate as an example, the difference between the click rate corresponding to the first split result and the click rate corresponding to the second split result may be calculated, and then compared with the preset click rate interference threshold. If the difference is larger than the threshold of the interference degree of the click rate, the second-layer shunting strategy interferes with the first-layer shunting strategy, and if the difference is smaller than or equal to the threshold of the interference degree, the second-layer shunting strategy does not interfere with the first-layer shunting strategy. For example, if the preset threshold value of the click rate interference degree is 0.02%, the click rate corresponding to the obtained first shunting result is 2.12%, and the click rate corresponding to the obtained second shunting result is 2.08%, the difference between the two values is 0.04% and is greater than the threshold value of the click rate interference degree, it is determined that the second-layer shunting strategy interferes with the first-layer shunting strategy; for example, if the preset threshold value of the interference degree of the click rate is 0.02%, the click rate corresponding to the obtained first shunting result is 2.12%, and the click rate corresponding to the obtained second shunting result is 2.13%, the difference between the two values is 0.01% and is less than the threshold value of the interference degree of the click rate, and it is determined that the second-layer shunting strategy does not interfere with the first-layer shunting strategy.
In another embodiment, the process of determining the interference degree of the second-layer offloading policy on the first-layer offloading policy may include the following steps:
calculating the difference value of the corresponding numerical values of the first shunting result and the second shunting result, and calculating the ratio of the difference value to the corresponding numerical value of the first shunting result; and comparing the ratio with a set second interference threshold value to determine the interference degree of the second-layer shunting strategy to the first-layer shunting strategy. The second interference degree threshold is a preset ratio threshold, and is determined according to the ratio of a numerical value change value caused by interference of the first-layer shunting strategy to a numerical value corresponding to a shunting result of the first-layer shunting strategy. Taking the click rate as an example, if the preset ratio threshold is 1%, the click rate corresponding to the obtained first shunting result is 2.12%, and the click rate corresponding to the obtained second shunting result is 2.08%, the difference between the two is 0.04%, and the ratio of the difference to the click rate corresponding to the first shunting result, which is 2.12%, is 1.82%, and is greater than the ratio threshold, it is determined that the second-layer shunting strategy interferes with the first-layer shunting strategy.
It can be understood that the interference of the second-layer splitting strategy on the first-layer splitting strategy can be at least divided into positive interference and negative interference, and if the corresponding numerical value of the first splitting result is greater than the corresponding numerical value of the second splitting result, it is determined that the second-layer splitting strategy has negative interference on the first-layer splitting strategy; and if the corresponding numerical value of the first shunting result is less than or equal to the corresponding numerical value of the second shunting result, determining that the second-layer shunting strategy has forward interference on the first-layer shunting strategy. During verification, the ratio of the second traffic to the access traffic may be gradually increased, and as the ratio of the second traffic increases, the value corresponding to the second split result also changes, but the magnitude relationship between the value corresponding to the second split result and the value corresponding to the first split result is not changed. For example, if the value corresponding to the second split result is always smaller than the value corresponding to the first split result although the value corresponding to the second split result changes, the second-layer split policy has negative interference to the first-layer split policy.
Referring to the schematic diagram of the experimental policy interference judgment flow shown in fig. 4, the interference verification and recommendation process of the advertisement recommendation policy is illustrated. In the flow chart shown in fig. 4, an experiment strategy N is a current experiment strategy, an experiment strategy M is an experiment strategy for judging interference of the current experiment strategy N, and an experiment strategy X indicates other experiment strategies except for the N, M strategy.
The strategy interference experiment process is carried out in a shunting experiment platform, the flow passes through an experiment strategy N, an experiment strategy M and an experiment strategy X, and the shunting experiment platform marks the flow passing through different experiment strategies and is used for indicating which strategies the flow passes through. For example, the experimental verification strategy N is verified by 10% of traffic, 90% of traffic is compared by using base, then the label of the experimental strategy N is marked on the 10% of traffic, the advertisement is recommended to the user by the advertisement recommendation system according to the experimental strategy N, and the effect index is obtained from the operation of the user through the log collection service. And classifying the flow through Hadoop, and dividing the access flow into an NMX sample and an NX sample, wherein the NMX sample is a sample passing through an experiment strategy N and an experiment strategy M, and the NX sample is a sample passing through the experiment strategy N and not passing through the experiment strategy M. By comparing the experimental indexes of the NMX sample and the NX sample, whether the experimental strategy M interferes with the experimental strategy N or not and the interference degree can be judged, and the effect indexes are compared and displayed.
When the effect of the current experiment strategy is queried, the effect index influence of all other experiment strategies on the experiment strategy N can be traversed. The interference experiment strategy M is 1, 2 and 3 … N-1. The sample effect indexes of NMX and NX are respectively V NMX、V NXThe base strategy effect index of the experimental layer where the experimental strategy N is located is V base. For all M strategies, if the effect index impact threshold is 1%, when the interference rate (V) NX-V NMX)/V NX<And when the concentration is 1%, the experiment strategy N is considered to be not interfered, otherwise, the experiment strategy N is considered to be interfered. When effect index V of experiment strategy N NX>V baseAnd V is NMX<V baseAnd then, the experiment strategy M obviously interferes with the experiment strategy N in the negative direction.
In the embodiment of the invention, the first flow and the second flow can respectively pass through a first layer shunting strategy, the second flow passing through the first layer shunting strategy passes through a second layer shunting strategy, the interference degree of the second layer shunting strategy on the first layer shunting strategy is judged according to the first shunting result and the second shunting result, and the cross interference between the first layer shunting strategy and the second layer shunting strategy can be analyzed by comparing the difference of the shunting results when the two strategies share the same action with the single action, so that the interference degree between the shunting strategies can be accurately determined.
Corresponding to the foregoing method for determining access offloading policy interference, an embodiment of the present invention further provides an apparatus for determining access offloading policy interference, fig. 5 is a schematic structural diagram of the apparatus for determining access offloading policy interference according to the embodiment of the present invention, and as shown in fig. 5, the apparatus for determining access offloading policy interference includes:
a traffic dividing module 51, configured to divide the access traffic into a first traffic and a second traffic;
a first shunting module 52, configured to pass the first traffic and the second traffic through a first layer of shunting policy, respectively, and obtain a first shunting result corresponding to the first traffic;
a second shunting module 53, configured to pass the second traffic that passes through the first-layer shunting policy through a second-layer shunting policy, and obtain a second shunting result corresponding to the second traffic;
and an interference determining module 54, configured to determine, according to the first splitting result and the second splitting result, an interference degree of the second-layer splitting policy on the first-layer splitting policy.
In one embodiment, the traffic division module is specifically configured to: dividing the access flow into two target flows according to a preset proportion, and respectively adding a first flow label and a second flow label to the two target flows.
In one embodiment, the first shunting module is specifically configured to: respectively carrying out flow shunting on the first flow and the second flow according to a first layer of shunting strategy; and acquiring a first shunting result corresponding to the first flow according to the flow distribution of the first flow after the first flow passes through the first-layer shunting strategy.
In one embodiment, the interference determination module is specifically configured to: calculating the difference value of the corresponding numerical values of the first shunting result and the second shunting result; and comparing the difference value with a first interference threshold value to determine the interference degree of the second-layer shunting strategy on the first-layer shunting strategy.
In another embodiment, the interference determination module is specifically configured to: calculating a difference value of the corresponding numerical values of the first shunting result and the second shunting result, and calculating a ratio of the difference value to the corresponding numerical value of the first shunting result; and comparing the ratio with a second interference threshold value to determine the interference degree of the second-layer shunting strategy to the first-layer shunting strategy.
In one embodiment, the apparatus further comprises a positive-negative interference determination module configured to: if the value corresponding to the first shunting result is larger than the value corresponding to the second shunting result, determining that the second-layer shunting strategy has negative interference on the first-layer shunting strategy; and if the value corresponding to the first shunting result is smaller than or equal to the value corresponding to the second shunting result, determining that the second-layer shunting strategy has forward interference on the first-layer shunting strategy.
In one embodiment, the first split result and the second split result each include at least one of: a sales rate, a click-through rate, a flow rate, a conversion rate, an interaction rate, or a feedback rate.
The access diversion strategy interference judgment device in the embodiment of the invention can make the first flow and the second flow respectively pass through the first layer diversion strategy, make the second flow passing through the first layer diversion strategy pass through the second layer diversion strategy, judge the interference degree of the second layer diversion strategy on the first layer diversion strategy according to the first diversion result and the second diversion result, and analyze the cross interference between the first layer diversion strategy and the second layer diversion strategy by comparing the difference of the diversion results when the two share the same action with the single action, thereby accurately determining the interference degree between the diversion strategies.
It should be noted that the above-described device embodiments are merely illustrative, where the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
An embodiment of the present application further provides an electronic device, including: the access offloading policy interference determination method in the foregoing embodiments is implemented by a memory, a processor, and a computer program stored on the memory and executable on the processor, where the computer program is implemented by the processor, and is specifically configured to perform:
dividing the access traffic into a first traffic and a second traffic;
respectively enabling the first flow and the second flow to pass through a first-layer shunting strategy, and obtaining a first shunting result corresponding to the first flow;
enabling the second flow which passes through the first-layer shunting strategy to pass through a second-layer shunting strategy, and obtaining a second shunting result corresponding to the second flow;
and judging the interference degree of the second-layer shunting strategy to the first-layer shunting strategy according to the first shunting result and the second shunting result.
In addition, an embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium stores one or more programs, where the one or more programs include instructions, and when the instructions are executed by an electronic device that includes a plurality of application programs, the instructions enable the electronic device to perform the access diversion policy interference determination method in the foregoing embodiment, and are specifically configured to perform:
dividing the access traffic into a first traffic and a second traffic;
respectively enabling the first flow and the second flow to pass through a first-layer shunting strategy, and obtaining a first shunting result corresponding to the first flow;
enabling the second flow which passes through the first-layer shunting strategy to pass through a second-layer shunting strategy, and obtaining a second shunting result corresponding to the second flow;
and judging the interference degree of the second-layer shunting strategy to the first-layer shunting strategy according to the first shunting result and the second shunting result.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transmyedia) such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. An access offload policy interference judgment method is characterized by comprising the following steps:
dividing the access traffic into a first traffic and a second traffic;
respectively enabling the first flow and the second flow to pass through a first-layer shunting strategy, and obtaining a first shunting result corresponding to the first flow;
enabling the second flow which passes through the first-layer shunting strategy to pass through a second-layer shunting strategy, and obtaining a second shunting result corresponding to the second flow;
and judging the interference degree of the second-layer shunting strategy to the first-layer shunting strategy according to the first shunting result and the second shunting result.
2. The method of claim 1, wherein the dividing access traffic into first traffic and second traffic comprises:
dividing the access flow into two target flows according to a preset proportion, and respectively adding a first flow label and a second flow label to the two target flows.
3. The method according to claim 1, wherein the passing the first traffic and the second traffic through a first layer splitting policy, respectively, and obtaining a first splitting result corresponding to the first traffic comprises:
respectively carrying out flow shunting on the first flow and the second flow according to a first layer of shunting strategy;
and acquiring a first shunting result corresponding to the first flow according to the flow distribution of the first flow after the first flow passes through the first-layer shunting strategy.
4. The method according to claim 1, wherein the determining, according to the first split result and the second split result, an interference degree of the second-layer splitting policy with respect to the first-layer splitting policy includes:
calculating the difference value of the corresponding numerical values of the first shunting result and the second shunting result;
and comparing the difference with a set first interference threshold to determine the interference of the second-layer shunting strategy on the first-layer shunting strategy.
5. The method according to claim 1, wherein the determining, according to the first split result and the second split result, an interference degree of the second-layer splitting policy with respect to the first-layer splitting policy includes:
calculating a difference value of the corresponding numerical values of the first shunting result and the second shunting result, and calculating a ratio of the difference value to the corresponding numerical value of the first shunting result;
and comparing the ratio with a set second interference threshold value to determine the interference degree of the second-layer shunting strategy on the first-layer shunting strategy.
6. The method according to any one of claims 1 to 5, wherein after determining, according to the first offloading result and the second offloading result, an interference degree of the second layer offloading policy on the first layer offloading policy, the method further includes:
if the value corresponding to the first shunting result is larger than the value corresponding to the second shunting result, determining that the second-layer shunting strategy has negative interference on the first-layer shunting strategy;
and if the value corresponding to the first shunting result is smaller than or equal to the value corresponding to the second shunting result, determining that the second-layer shunting strategy has forward interference on the first-layer shunting strategy.
7. The method of any of claims 1-5, wherein the first split result and the second split result each include at least one of: a sales rate, a click-through rate, a flow rate, a conversion rate, an interaction rate, or a feedback rate.
8. An access offload policy interference determination apparatus, comprising:
the flow dividing module is used for dividing the access flow into a first flow and a second flow;
the first shunting module is used for enabling the first flow and the second flow to respectively pass through a first-layer shunting strategy and obtaining a first shunting result corresponding to the first flow;
the second shunting module is used for enabling the second traffic which passes through the first-layer shunting strategy to pass through a second-layer shunting strategy and acquiring a second shunting result corresponding to the second traffic;
and the interference judging module is used for judging the interference degree of the second-layer shunting strategy on the first-layer shunting strategy according to the first shunting result and the second shunting result.
9. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN201910957977.5A 2019-10-10 2019-10-10 Access shunting policy interference judgment method and device and electronic equipment Active CN110782276B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910957977.5A CN110782276B (en) 2019-10-10 2019-10-10 Access shunting policy interference judgment method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910957977.5A CN110782276B (en) 2019-10-10 2019-10-10 Access shunting policy interference judgment method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN110782276A true CN110782276A (en) 2020-02-11
CN110782276B CN110782276B (en) 2022-04-26

Family

ID=69384946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910957977.5A Active CN110782276B (en) 2019-10-10 2019-10-10 Access shunting policy interference judgment method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN110782276B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202492A (en) * 2020-09-01 2021-01-08 ***通信集团广东有限公司 Optical cable fault positioning method and device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385729A (en) * 2011-10-25 2012-03-21 北京亿赞普网络技术有限公司 Method and device for evaluating advertisement serving policy
US20140330653A1 (en) * 2012-06-27 2014-11-06 Huawei Technologies Co., Ltd. Information Recommendation Method and Apparatus
CN104281611A (en) * 2013-07-08 2015-01-14 阿里巴巴集团控股有限公司 User flow distribution method and device in website testing system
CN104503842A (en) * 2014-12-22 2015-04-08 广州唯品会信息科技有限公司 Strategy execution method and device based on multilayer diversion experiment frame
CN105610654A (en) * 2016-03-02 2016-05-25 合一网络技术(北京)有限公司 Server, and policy online test method and system
US20190057353A1 (en) * 2017-08-15 2019-02-21 Yahoo Holdings, Inc. Method and system for detecting gaps in data buckets for a/b experimentation
CN110290024A (en) * 2019-06-26 2019-09-27 北京百度网讯科技有限公司 The online preceding test method of strategy, device and equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385729A (en) * 2011-10-25 2012-03-21 北京亿赞普网络技术有限公司 Method and device for evaluating advertisement serving policy
US20140330653A1 (en) * 2012-06-27 2014-11-06 Huawei Technologies Co., Ltd. Information Recommendation Method and Apparatus
CN104281611A (en) * 2013-07-08 2015-01-14 阿里巴巴集团控股有限公司 User flow distribution method and device in website testing system
CN104503842A (en) * 2014-12-22 2015-04-08 广州唯品会信息科技有限公司 Strategy execution method and device based on multilayer diversion experiment frame
CN105610654A (en) * 2016-03-02 2016-05-25 合一网络技术(北京)有限公司 Server, and policy online test method and system
US20190057353A1 (en) * 2017-08-15 2019-02-21 Yahoo Holdings, Inc. Method and system for detecting gaps in data buckets for a/b experimentation
CN110290024A (en) * 2019-06-26 2019-09-27 北京百度网讯科技有限公司 The online preceding test method of strategy, device and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
林文辉: "基于Hadoop的海量网络数据处理平台的关键技术研究", 《中国优秀博士学位论文全文数据库 信息科技辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202492A (en) * 2020-09-01 2021-01-08 ***通信集团广东有限公司 Optical cable fault positioning method and device and electronic equipment

Also Published As

Publication number Publication date
CN110782276B (en) 2022-04-26

Similar Documents

Publication Publication Date Title
CN111092757B (en) Abnormal data detection method, system and equipment
US10178042B2 (en) System, method, and apparatus for computer system resource allocation
CN109542789B (en) Code coverage rate statistical method and device
CN109561052B (en) Method and device for detecting abnormal flow of website
CN108255886B (en) Evaluation method and device of recommendation system
CN110189165B (en) Channel abnormal user and abnormal channel identification method and device
CN107220121B (en) Sandbox environment testing method and system under NUMA architecture
CN104899228A (en) Method and device for publishing webpage resources
CN112100400B (en) Node recommendation method and device based on knowledge graph
US11449776B2 (en) Topology-based migration assessment
CN110782276B (en) Access shunting policy interference judgment method and device and electronic equipment
CN110955846A (en) Propagation path diagram generation method and device
CN113468384B (en) Processing method, device, storage medium and processor for network information source information
Gamrath et al. Measuring the impact of branching rules for mixed-integer programming
CN110532773A (en) Malicious access Activity recognition method, data processing method, device and equipment
CN111611512B (en) Quality evaluation method and device for network agent, storage medium and processor
CN116245378A (en) Method and device for determining carbon emission strategy, storage medium and electronic equipment
US10733080B2 (en) Automatically establishing significance of static analysis results
CN114430381A (en) Dynamic distribution method and device for service provider
US11178025B1 (en) Automated incident prioritization in network monitoring systems
CN114997621A (en) Scheme screening method and system based on trust and opinion similarity comprehensive relationship
CN114172705A (en) Network big data analysis method and system based on pattern recognition
CN112905449A (en) Target test method, device, equipment and storage medium
US10397312B2 (en) Automated server deployment platform
CN112540979A (en) Expression storage method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant