Alarm method and device

文档序号:190219 发布日期:2021-11-02 浏览:8次 中文

阅读说明:本技术 一种告警方法及装置 (Alarm method and device ) 是由 张为欢 王培君 管虹翔 梁广会 于 2021-07-30 设计创作,主要内容包括:本发明提供一种告警方法及装置,可用于金融领域或其他技术领域。所述方法包括:获取至少两条告警信息;若各所述告警信息不完全相同,则判断各所述告警信息是否相似;将相似的各所述告警信息进行收敛处理,得到第一目标告警信息;根据所述第一目标告警信息进行告警。所述装置用于执行上述方法,本发明提供的告警方法及装置,能够对相似的告警信息进行收敛处理,可大大降低告警数量,突出关键告警,提高告警效率。(The invention provides an alarm method and an alarm device, which can be used in the financial field or other technical fields. The method comprises the following steps: acquiring at least two pieces of alarm information; if the alarm information is not completely the same, judging whether the alarm information is similar; carrying out convergence processing on the similar alarm information to obtain first target alarm information; and alarming according to the first target alarming information. The device is used for executing the method, and the alarm method and the device provided by the invention can be used for carrying out convergence processing on similar alarm information, greatly reducing the alarm quantity, highlighting key alarms and improving the alarm efficiency.)

1. An alert method, comprising:

acquiring at least two pieces of alarm information;

if the alarm information is not completely the same, judging whether the alarm information is similar;

carrying out convergence processing on the similar alarm information to obtain first target alarm information;

and alarming according to the first target alarming information.

2. The method of claim 1, wherein the determining whether the alarm messages are similar comprises:

acquiring a text fingerprint of each piece of alarm information;

calculating the similarity between the text fingerprints of the alarm information;

and determining that the alarm information is similar to the alarm information of which the similarity between the text fingerprints meets the similarity requirement.

3. The method of claim 2, further comprising:

for the alarm information with the similarity between the text fingerprints not meeting the similarity requirement, generating a text vector of each alarm information according to each alarm information;

calculating the similarity between text vectors of the alarm information;

and if the similarity between the text vectors of the alarm information is greater than a preset similarity threshold, determining that the alarm information is similar.

4. The method of claim 1, wherein the obtaining at least two pieces of alarm information comprises:

and acquiring alarm information in a target time period according to the alarm convergence time threshold, wherein at least two pieces of alarm information are arranged in the target time period.

5. The method of claim 1, wherein after obtaining at least two pieces of alarm information, the method further comprises:

if the alarm information is the same, carrying out convergence processing on the same alarm information to obtain second target alarm information;

and alarming according to the second target alarming information.

6. An alert device, the device comprising:

the acquisition module is used for acquiring at least two pieces of alarm information;

the judging module is used for judging whether the alarm information is similar or not if the alarm information is not completely the same;

the processing module is used for carrying out convergence processing on the similar alarm information to obtain first target alarm information;

and the alarm module is used for giving an alarm according to the first target alarm information.

7. The apparatus of claim 6, wherein the determining module is specifically configured to:

acquiring a text fingerprint of each piece of alarm information;

calculating the similarity between the text fingerprints of the alarm information;

and determining that the alarm information is similar to the alarm information of which the similarity between the text fingerprints meets the similarity requirement.

8. The apparatus of claim 7, wherein the determining module is further configured to:

for the alarm information with the similarity between the text fingerprints not meeting the similarity requirement, generating a text vector of each alarm information according to each alarm information;

calculating the similarity between text vectors of the alarm information;

and if the similarity between the text vectors of the alarm information is greater than a preset similarity threshold, determining that the alarm information is similar.

9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 5 are implemented when the computer program is executed by the processor.

10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.

Technical Field

The invention relates to the financial field or other technical fields, in particular to an alarm method and device.

Background

The traditional banking alarm is roughly divided into two types, one is that the alarm is sent out based on manual customized configuration, and if a certain transaction fails, the cpu of a certain machine is high, and a certain database is down, the alarm is sent out at a specific time frequency (for example, 5 minutes); one is based on artificial intelligence algorithm model calculations, with alarms issued at a fixed frequency when a certain threshold is exceeded.

In recent years, due to the rapid increase of banking business, the operation and maintenance pressure is increased, the alarm of the prior technical scheme is increased explosively, on one hand, the pressure of an alarm system (e-mail, short message and telephone) is increased newly, on the other hand, a lot of useless alarms exist, operation and maintenance personnel are easy to numb, and some key alarms are often ignored, so that the instability of the system is caused.

Disclosure of Invention

For solving the problems in the prior art, embodiments of the present invention provide an alarm method and apparatus, which can at least partially solve the problems in the prior art.

In one aspect, the present invention provides an alarm method, including: acquiring at least two pieces of alarm information; if the alarm information is not completely the same, judging whether the alarm information is similar; carrying out convergence processing on the similar alarm information to obtain first target alarm information; and alarming according to the first target alarming information.

Optionally, the determining whether the alarm information is similar includes: acquiring a text fingerprint of each piece of alarm information; calculating the similarity between the text fingerprints of the alarm information; and determining that the alarm information is similar to the alarm information of which the similarity between the text fingerprints meets the similarity requirement.

Optionally, the method further includes: for the alarm information with the similarity between the text fingerprints not meeting the similarity requirement, generating a text vector of each alarm information according to each alarm information; calculating the similarity between text vectors of the alarm information; and if the similarity between the text vectors of the alarm information is greater than a preset similarity threshold, determining that the alarm information is similar.

Optionally, the obtaining at least two pieces of alarm information includes: and acquiring alarm information in a target time period according to the alarm convergence time threshold, wherein at least two pieces of alarm information are arranged in the target time period.

Optionally, after obtaining at least two pieces of alarm information, the method further includes: if the alarm information is the same, carrying out convergence processing on the same alarm information to obtain second target alarm information; and alarming according to the second target alarming information.

In another aspect, the present invention provides an alarm device, including: the acquisition module is used for acquiring at least two pieces of alarm information; the judging module is used for judging whether the alarm information is similar or not if the alarm information is not completely the same; the processing module is used for carrying out convergence processing on the similar alarm information to obtain first target alarm information; and the alarm module is used for giving an alarm according to the first target alarm information.

Optionally, the determining module is specifically configured to: acquiring a text fingerprint of each piece of alarm information; calculating the similarity between the text fingerprints of the alarm information; and determining that the alarm information is similar to the alarm information of which the similarity between the text fingerprints meets the similarity requirement.

Optionally, the determining module is further configured to: for the alarm information with the similarity between the text fingerprints not meeting the similarity requirement, generating a text vector of each alarm information according to each alarm information; calculating the similarity between text vectors of the alarm information; and if the similarity between the text vectors of the alarm information is greater than a preset similarity threshold, determining that the alarm information is similar.

In another aspect, the present invention provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program to implement the steps of the alert method according to any of the above embodiments.

In a further aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the alerting method according to any of the above-mentioned embodiments.

According to the alarm method, the alarm device and the electronic equipment provided by the embodiment of the invention, at least two pieces of alarm information are obtained; judging whether the alarm information is the same; if the alarm information is not completely the same, judging whether the alarm information is similar; carrying out convergence processing on the similar alarm information to obtain first target alarm information; and alarming according to the first target alarming information. Therefore, the similar alarm information can be subjected to convergence processing, the alarm quantity can be greatly reduced, key alarms are highlighted, and the alarm efficiency is improved.

Drawings

In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:

fig. 1 is a flowchart illustrating an alarm method according to a first embodiment of the present invention.

Fig. 2 is a flowchart illustrating an alarm method according to a second embodiment of the present invention.

Fig. 3 is a partial flowchart of an alarm method according to a third embodiment of the present invention.

Fig. 4 is a partial flowchart of an alarm method according to a fourth embodiment of the present invention.

Fig. 5 is a partial flow chart of an alarm method according to a fifth embodiment of the present invention.

Fig. 6 is a schematic structural diagram of an alarm device according to a sixth embodiment of the present invention.

Fig. 7 is a schematic physical structure diagram of an electronic device according to a seventh embodiment of the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.

The execution subject of the alarm method provided by the embodiment of the invention includes but is not limited to a computer.

Fig. 1 is a schematic flow diagram of an alarm method according to an embodiment of the present invention, and as shown in fig. 1, the alarm method according to the embodiment of the present invention includes:

s101, acquiring at least two pieces of alarm information;

in this step, the alarm information may be alarm information generated based on an original alarm scheme, for example, alarm information sent based on manual customized configuration, and if a certain transaction fails, cpu of a certain machine is high, and a certain database is down, an alarm is sent at a specific time frequency (for example, 5 minutes); and alarm information calculated based on an artificial intelligence algorithm model, for example, alarms are given at a fixed frequency when a certain threshold value is exceeded.

Before the at least two pieces of alarm information are obtained, the types of the alarm information may be predefined, for example, the alarm information of a certain type of transaction is used as one type of the alarm information, the alarm information of an ip with a certain machine is used as another type of the alarm information, and the alarm information of a certain partner is used as another type of the alarm information; the cross-type transaction and the alarm information of a certain machine cannot be subjected to alarm convergence (alarm convergence refers to analyzing, combining and discarding the alarm information so as to reduce the scale of the alarm). At this time, the acquiring at least two pieces of alarm information may include: and acquiring at least two pieces of alarm information under the same alarm type.

S102, if the alarm information is not completely the same, judging whether the alarm information is similar;

before determining whether the alarm information is the same, the method may first pre-process the alarm text of each alarm information, for example, remove a special symbol in the alarm text that is not related to the alarm information, set the text content in the alarm text to a wildcard mode, for example, set the ip address in the alarm text to the pattern, and set the identifier of a certain type of transaction as the unique identifier of the transaction.

After the warning information is preprocessed, whether the warning texts of the preprocessed warning information are the same or not is judged.

The alarm messages are not completely the same and comprise: the alarm information is different from each other, or one part of the alarm information is different from the other part of the alarm information. The similarity between the alarm information can be calculated by adopting at least one text similarity algorithm, and whether the alarm information is similar or not is determined according to the similarity between the alarm information.

S103, carrying out convergence processing on the similar alarm information to obtain first target alarm information;

in this step, the converging processing of each similar alarm information to obtain the first target alarm information may specifically include: and integrating the similar alarm texts of the alarm information to obtain first target alarm information. If the three alarms sent by a certain server are A, B, C respectively and are similar to each other, A, B, C is integrated into one alarm.

And S104, alarming according to the first target alarming information.

In the step, the alarm is performed according to the first target alarm information obtained after the convergence processing is performed on the plurality of pieces of alarm information, and compared with the alarm performed for a plurality of times according to the plurality of pieces of alarm information, the invalid alarm can be reduced, and the alarm efficiency is improved.

In the alarm method provided by the embodiment of the invention, at least two pieces of alarm information are acquired; judging whether the alarm information is the same; if the alarm information is not completely the same, judging whether the alarm information is similar; carrying out convergence processing on the similar alarm information to obtain first target alarm information; and alarming according to the first target alarming information. Therefore, the similar alarm information can be subjected to convergence processing, the alarm quantity can be greatly reduced, key alarms are highlighted, and the alarm efficiency is improved.

As shown in fig. 2, optionally, after determining whether each of the alarm messages is the same, the method may further include:

s105, if the alarm information is the same, performing convergence processing on the same alarm information to obtain second target alarm information;

in this step, it is equivalent to perform basic convergence on each alarm information acquired in step S101, and if each alarm information is completely the same, the basic convergence is performed, otherwise, the step S102 is performed.

The converging processing of each identical alarm message to obtain the second target alarm message may include: and selecting one piece of alarm information from the same alarm information as second target alarm information.

And S106, alarming according to the second target alarming information.

In the step, the second target alarm information obtained after the convergence processing is performed according to the multiple same alarm information is used for alarming, and compared with the method for performing multiple same alarms according to the multiple same alarm information, invalid alarms can be reduced, and the alarm efficiency is improved.

Optionally, the obtaining at least two pieces of alarm information may include: and acquiring alarm information in a target time period according to the alarm convergence time threshold, wherein at least two pieces of alarm information are arranged in the target time period.

In this embodiment, the alarm convergence time threshold is used to limit the time length of the target time period, where too long results in alarm delay, and too short results in insignificant convergence effect, where we may set the alarm convergence time threshold to 5 minutes; the obtaining of the alarm information in the target time period according to the alarm convergence time threshold may include: and acquiring the alarm information within the last 5 minutes every 5 minutes.

As shown in fig. 3, optionally, the determining whether each of the alarm messages is similar includes:

s1021, acquiring a text fingerprint of each piece of alarm information;

in the step, the text fingerprints of the alarm information can be calculated by adopting fingerprint algorithms such as simhash, Minhash and the like; as shown in fig. 4, the following description is made by using a simhash algorithm to calculate a text fingerprint of each alarm message:

step 1, performing word segmentation operation on the alarm text of each piece of alarm information to obtain the weight configured for each word group obtained by word segmentation in the text content, wherein if the alarm text content is 'CPU attack height', the word segmentation is 'CPU (4), attack height (6)' and the weight is in parentheses.

Step 2, calculating a hash value: and performing hash operation on each obtained phrase, representing the words as bit bits represented by 0 and 1, and ensuring that the bit number of the hash result of each phrase is the same.

And 3, step 3: weighting, and performing weighting calculation on the hash value according to the corresponding weight of each phrase (bit is 1 and is taken as 1 to be multiplied, and bit is 0 and is taken as-1 to be multiplied), as shown in fig. 4, 10010101 and 4 are weighted as [4-4-44-44-44], and 01010011 and 6 are weighted as [ -66-66-6-666 ].

And 4, step 4: and (4) longitudinal weighting, namely longitudinally adding the weighting results of each phrase of the same alarm text in the third step to obtain the longitudinal weighting result of each alarm message, and further realizing the longitudinal weighting to realize the dimension reduction, as shown in figure 4, to obtain [ -22-1010-10-2210 ].

And 5, step 5: and (4) normalizing, reducing the dimension of the final weighted value, and taking 1 for each bit of the final weighted value which is larger than 0, otherwise, taking 0, thus obtaining the final simhash fingerprint tag [010110011], namely the text fingerprint of the alarm information.

S1022, calculating the similarity between the text fingerprints of the alarm information;

in the step, the Hamming distance between the text fingerprints can be calculated, and the Hamming distance is used for judging the similarity between the text fingerprints. Hamming distance: in the information theory, the hamming distance between two character strings with equal length is the number of different characters at the corresponding positions of two characters. In other words, it is the number of characters that need to be replaced to change one string into another. For example, 10101 and 01101 have a hamming distance of 3.

S1023, for the alarm information with the similarity between the text fingerprints meeting the similarity requirement, determining that the alarm information is similar.

In this step, when the hamming distance is used to determine the similarity between the text fingerprints, the similarity requirement may be: the hamming distance between the text fingerprints is smaller than a preset value, for example, when the hamming distance between the text fingerprints is smaller than or equal to 3, the text fingerprints can be considered similar.

As shown in fig. 5, optionally, in the above embodiment, the method may further include:

s1024, generating a text vector of each alarm message according to each alarm message when the similarity between the text fingerprints does not meet the similarity requirement;

in this step, the generating a text vector of each piece of alarm information according to each piece of alarm information may include:

firstly, performing word segmentation processing on an alarm text of each piece of alarm information;

secondly, listing a word bank, namely all words appearing in the alarm text;

thirdly, calculating the word frequency IF (namely the frequency of the occurrence of a certain word in the alarm text) of each word in the word bank in the alarm text of each alarm message, wherein the calculation formula is as follows:

fourthly, calculating the inverse document frequency IDF of each word in the word stock, wherein the calculation formula is as follows:

and fifthly, calculating the IF multiplied by IDF of each word to finally obtain the text vector of the alarm information.

For example, for the alarm information a and the alarm information B whose similarity between text fingerprints does not meet the similarity requirement, the alarm text of the alarm information a is: the interface A reports errors because the service does not respond, and the alarm text of the alarm information B is as follows: service errors result in B interface errors.

1. The word group obtained after the word segmentation processing is carried out on the alarm text of the alarm information A is as follows: A. interface, cause, service, no response, error; the word group obtained after the word segmentation processing is carried out on the alarm text of the alarm information B is as follows: service, error reporting, cause, B, interface, error reporting.

2. List thesaurus (all words present in the alert text): A. interface, cause, service, not respond, error, cause, B.

3. Calculating the word frequency of each word in the word bank in the alarm text of the alarm information A and the alarm information B:

according to the word frequency calculation formula, the word frequencies of 8 words (A, interface, cause, service, non-response, error report, cause, B) in the word stock in the alarm text of the alarm information A are calculated to be 1/6, 1/6, 1/6, 1/6, 1/6, 1/6, 0 and 0 in sequence;

according to the word frequency calculation formula, the word frequency of 8 words (A, interface, cause, service, non-response, error report, cause, B) in the word stock in the alarm text of the alarm information B is calculated to be 0, 1/6, 0, 1/6, 0, 2/6, 1/6 and 1/6 in sequence.

4. Calculating the inverse document frequency of each word in the word stock:

according to the above inverse document frequency calculation formula, the inverse document frequencies of 8 words (a, interface, cause, service, no response, error report, cause, B) in the word stock are calculated to be: ln (2/2), ln (2/3), ln (2/2), ln (2/3), ln (2/2), ln (2/4), ln (2/2), ln (2/2).

5. And calculating the IF multiplied by IDF of each word to finally obtain the text vectors of the alarm information A and the alarm information B.

Multiplying the word frequency IF of each word in the word bank in the alarm text of the alarm information A by the inverse document frequency of the word to obtain a text vector of the alarm information A: [0, 1/6 xln (2/3), 0, 1/6 xln (2/3), 0, 1/6 xln (2/4), 0 ];

multiplying the word frequency IF of each word in the word bank in the alarm text of the alarm information B by the inverse document frequency of the word to obtain a text vector of the alarm information B: [0, 1/6 × ln (2/3), 0, 1/6 × ln (2/3), 0, 2/6 × ln (2/4), 0 ].

S1025, calculating the similarity between the text vectors of the alarm information;

in this step, the similarity calculation formula between every two text vectors is:

wherein A represents a text vector of one of the alarm information, AiRepresents the ith element in vector a;

b represents a text vector of another one of the alarm information, BiRepresents the ith element in vector B;

n represents the number of elements in the vector A and the vector B;

similarity represents the similarity between vector a and vector B.

And S1026, if the similarity between the text vectors of the alarm information is greater than a preset similarity threshold, determining that the alarm information is similar.

In this step, the preset similarity threshold may be set according to practical experience, and generally, similarity is considered to be similar if the similarity exceeds 0.75.

According to the embodiment, three-layer alarm convergence can be performed on the explosive alarm in the current production, the alarm quantity can be greatly reduced, the key alarm is highlighted, and the alarm efficiency is improved. The alarm convergence method provided by the embodiment can be universal and has better expandability.

Fig. 6 is a schematic structural diagram of an alarm device according to an embodiment of the present invention, and as shown in fig. 6, the alarm device according to the embodiment of the present invention includes: an obtaining module 21, configured to obtain at least two pieces of alarm information; a judging module 22, configured to judge whether the alarm information is similar if the alarm information is not identical; the processing module 23 is configured to perform convergence processing on each similar alarm information to obtain first target alarm information; and the alarm module 24 is configured to perform an alarm according to the first target alarm information.

The alarm device provided by the embodiment of the invention obtains at least two pieces of alarm information; judging whether the alarm information is the same; if the alarm information is not completely the same, judging whether the alarm information is similar; carrying out convergence processing on the similar alarm information to obtain first target alarm information; and alarming according to the first target alarming information. Therefore, the similar alarm information can be subjected to convergence processing, the alarm quantity can be greatly reduced, key alarms are highlighted, and the alarm efficiency is improved.

Optionally, the determining module is specifically configured to: acquiring a text fingerprint of each piece of alarm information; calculating the similarity between the text fingerprints of the alarm information; and determining that the alarm information is similar to the alarm information of which the similarity between the text fingerprints meets the similarity requirement.

Optionally, the determining module is further configured to: for the alarm information with the similarity between the text fingerprints not meeting the similarity requirement, generating a text vector of each alarm information according to each alarm information; calculating the similarity between text vectors of the alarm information; and if the similarity between the text vectors of the alarm information is greater than a preset similarity threshold, determining that the alarm information is similar.

The embodiment of the apparatus provided in the present invention may be specifically configured to execute the processing flows of the above method embodiments, and the functions of the apparatus are not described herein again, and refer to the detailed description of the above method embodiments.

It should be noted that the alarm method and apparatus provided by the embodiment of the present invention may be used in the financial field, and may also be used in any technical field other than the financial field.

Fig. 7 is a schematic physical structure diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 7, the electronic device may include: a processor (processor)301, a communication Interface (communication Interface)302, a memory (memory)303 and a communication bus 304, wherein the processor 301, the communication Interface 302 and the memory 303 complete communication with each other through the communication bus 304. The processor 301 may call logic instructions in the memory 303 to perform a method according to any of the above embodiments, including, for example: acquiring at least two pieces of alarm information; if the alarm information is not completely the same, judging whether the alarm information is similar; carrying out convergence processing on the similar alarm information to obtain first target alarm information; and alarming according to the first target alarming information.

In addition, the logic instructions in the memory 303 may be implemented in the form of software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

The present embodiment discloses a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform the method provided by the above-mentioned method embodiments, for example, comprising: acquiring at least two pieces of alarm information; if the alarm information is not completely the same, judging whether the alarm information is similar; carrying out convergence processing on the similar alarm information to obtain first target alarm information; and alarming according to the first target alarming information.

The present embodiment provides a computer-readable storage medium, which stores a computer program, where the computer program causes the computer to execute the method provided by the above method embodiments, for example, the method includes: acquiring at least two pieces of alarm information; if the alarm information is not completely the same, judging whether the alarm information is similar; carrying out convergence processing on the similar alarm information to obtain first target alarm information; and alarming according to the first target alarming information.

As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.

The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

In the description herein, reference to the description of the terms "one embodiment," "a particular embodiment," "some embodiments," "for example," "an example," "a particular example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

15页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种告警信息处理方法、装置、设备和介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!