[go: up one dir, main page]

CN120106800B - Service generator integrated multi-system cooperative work platform - Google Patents

Service generator integrated multi-system cooperative work platform

Info

Publication number
CN120106800B
CN120106800B CN202510191987.8A CN202510191987A CN120106800B CN 120106800 B CN120106800 B CN 120106800B CN 202510191987 A CN202510191987 A CN 202510191987A CN 120106800 B CN120106800 B CN 120106800B
Authority
CN
China
Prior art keywords
task
resource
application
user
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202510191987.8A
Other languages
Chinese (zh)
Other versions
CN120106800A (en
Inventor
黄涛
孙宏
孟晨
吴冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Yitian Digital Service Co ltd
Original Assignee
Tianjin Yitian Digital Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Yitian Digital Service Co ltd filed Critical Tianjin Yitian Digital Service Co ltd
Priority to CN202510191987.8A priority Critical patent/CN120106800B/en
Publication of CN120106800A publication Critical patent/CN120106800A/en
Application granted granted Critical
Publication of CN120106800B publication Critical patent/CN120106800B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/101Collaborative creation, e.g. joint development of products or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/5038Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the execution order of a plurality of tasks, e.g. taking priority or time dependency constraints into consideration
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/092Reinforcement learning

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computing Systems (AREA)
  • Biophysics (AREA)
  • Mathematical Physics (AREA)
  • Biomedical Technology (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computational Linguistics (AREA)
  • Evolutionary Computation (AREA)
  • Molecular Biology (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of collaborative work, in particular to a multi-system collaborative work platform integrated by a service generator, which comprises an identity verification module, a task scheduling module, an application configuration module and a data analysis module, wherein the identity verification module performs authority verification based on receiving identity information input by a user, matches information stored in a database, compares a key provided by the user with a storage key to generate an identity verification token, and the task scheduling module screens task data which can be contacted under the authority of the user based on the identity verification token. The invention adopts the deep Q network to dynamically adjust the resource and the authority configuration, increases the adaptability of the platform, allows flexible adjustment according to the real-time service demand, thereby improving the resource utilization efficiency, predicts the workload through the gradient lifting tree algorithm, accurately manages the resource allocation, reduces the resource waste, ensures the continuity and the efficiency of service operation, and ensures the optimal configuration of the resource among different application programs.

Description

Service generator integrated multi-system cooperative work platform
Technical Field
The invention relates to the technical field of cooperative work, in particular to a multi-system cooperative work platform integrated by a service generator.
Background
The technical field of collaborative work is focused on improving interaction and working efficiency among teams by utilizing information technology, and covers the integration and use from data sharing, task coordination to communication tools so as to support team members in different geographic positions to effectively cooperate, so that organizations can better manage complex projects, and information and resources are distributed and used in teams efficiently.
The service generator integrated multi-system cooperative work platform refers to a platform integrating a plurality of general software and professional applications, aims to provide standardized and efficient service operation support, embeds standard applications such as office OA, HR systems, elevator maintenance systems, contract management systems, project management systems and order management systems, supports a report large screen and a data statistics analysis function, can realize resource sharing, and is unified to manage, so that cooperation among different departments in an organization is smoother, and project execution speed and quality are greatly improved.
The traditional platform lacks the quick response capability to sudden events and real-time changes, so that outdated information is relied on in the decision making process, resources cannot be adjusted in time, the effectiveness of decision making and the timely delivery of projects are affected, in the aspect of resource management, the conventional system cannot flexibly adjust resource allocation, and for the insufficient processing capability of sudden events, delay or failure of key tasks is caused when the resources are in high demand, resource waste and low allocation efficiency are caused, and especially in a changeable environment, the cooperation efficiency of a team and the flexibility of project management are affected.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a multi-system cooperative work platform integrated by a service generator.
In order to achieve the above purpose, the invention adopts the following technical scheme that the service generator integrated multi-system cooperative work platform comprises:
The identity verification module performs authority verification based on the received identity information input by the user, matches the information stored in the database, compares a key provided by the user with a stored key, and generates an identity verification token;
The task scheduling module screens the task data which can be contacted under the user permission based on the identity verification token, and prioritizes the tasks by evaluating the task attribute and the criticality classification to generate a priority task list;
The application configuration module analyzes the matching degree of the current application state and the required permission according to the priority task list, adjusts the operation permission and the accessible level of a plurality of application programs, dynamically adjusts the application permission configuration by the application depth Q network according to the service requirement, and generates a configuration dynamic adjustment table;
And the data analysis module collects and aggregates the service data by utilizing the parameters in the configuration dynamic adjustment table, analyzes the resource classification efficiency of the service data, adopts a gradient lifting tree algorithm to predict the workload of the service data, and adjusts the resource load among multiple application programs to obtain resource optimal allocation measures.
The invention improves that the acquisition steps of the authentication token are as follows:
based on the received identity information input by the user, performing preliminary matching with the stored information, and verifying the identity of the user to obtain a preliminary verification result;
based on the preliminary verification result, comparing with the key provided by the user, executing the key verification, and adopting the formula:
Calculating key consistency DV k to generate a key verification result, wherein k ui represents an ith key element provided by a user, k si represents the ith key element in stored data, and n d is the number of elements in a key;
and generating an identity authentication token according to the key verification result if the authentication is passed.
The invention improves, the evaluation step of the criticality grading specifically comprises:
collecting basic information of a task, including an expiration date, required resources and departments, converting the collected task information into quantifiable numerical values, converting the expiration date into days from the current date, calculating the resource requirements of the task according to the task scale and the expected completion time;
the criticality of each task is ranked according to the resource requirements of the task, using the formula:
Task criticality scores SV are calculated, where wv D and wv R are weight factors for the expiration date and the resource demand, respectively, D V represents the number of days from the task expiration date, and R V represents the resource demand of the task.
The invention improves that the acquisition steps of the priority task list are as follows:
According to the identity verification token provided by the user, determining the identity and the corresponding authority level, and screening the task data accessible under the authority of the target user;
Performing attribute evaluation on the screened task data, wherein the evaluation comprises the evaluation of the emergency degree, the expiration date and the resource requirement;
the tasks are prioritized by a sequencing algorithm, and the formula is adopted:
A prioritized task list is obtained, where n q represents the number of task attributes, xq i represents the score of the ith task attribute, and wq i is the weight coefficient of the corresponding attribute.
The invention improves that the operation authority and the accessible level of the application program are specifically:
analyzing the attribute of each task in the priority task list, and comparing the task attribute with the service requirement, wherein the task attribute comprises the required completion time and the security level;
Calculating the operation authority score of each application program by adopting a formula:
Where PS (a) is the operation authority score of application a, vs i is the weight of the ith task-associated attribute, ts i is the value of the ith task attribute associated with application a, us j is the weight of the jth business requirement-associated attribute, bs j is the value of the jth attribute of the business requirement, and n S and m s are the total number of task attributes and business requirement attributes, respectively.
The invention improves that the acquisition steps of the configuration dynamic adjustment table specifically comprise:
The obtained priority task list is analyzed, the priority and the associated attribute of each task are included, the operation authority and the accessible level of a plurality of application programs are determined according to the priority and the service requirement, and the task priority is matched with the application requirement;
The application depth Q network dynamically adjusts the application authority configuration by adopting the formula:
The optimal application configuration is obtained, where su i is the i-th element in the state vector, au i is the i-th element in the action vector, wu i and bu i are the corresponding weight coefficients, s u represents the state vector, a u represents the action vector, and n u is the number of elements.
The invention improves, the analysis step of the resource classification efficiency specifically comprises:
Collecting service data, and aggregating corresponding resource use information, including CPU use rate, memory use amount and network bandwidth use condition;
Calculating the utilization rate of each type of resource in the peak period and the valley period, defining the utilization rate as the ratio of the utilization amount of the resource to the total available amount, recording the utilization rate in the peak period as U peak and the utilization rate in the valley period as U valley, and dynamically adjusting parameters according to service requirements;
By comparing the difference between U peak and U valley, an efficiency assessment is made, using the formula:
Where n m represents the number of kinds of resources, EM is the efficiency of resource classification, and U peak,i and U valley,i represent the usage of the i-th kind of resources in peak and valley periods, respectively.
The invention improves that the acquisition steps of the resource optimal allocation measure are as follows:
Predicting the resource demand of each application program in a future time period according to historical data by utilizing a gradient lifting tree algorithm, and collecting and evaluating the current used resource quantity of each application program;
and optimizing and calculating the resource quantity of each application program by adopting a formula:
An amount of resources HC that should be received by each application is determined, where n c represents the number of applications, wc i represents the weight of the ith application, dc i represents the predicted amount of demand by the ith application, and Tc i represents the amount of resources currently allocated by the ith application.
Compared with the prior art, the invention has the advantages and positive effects that:
according to the invention, through user identity verification and authority matching, the security of sensitive data and the accuracy of access control are ensured, resource optimization allocation is dynamically analyzed and predicted, reasonable allocation of resources in the periods of high and low demands is ensured, waste is reduced, operation efficiency is improved, deep integration of data analysis provides real-time data support for decision making, data driving performance of decision making is enhanced, project adjustment can reflect the change of an operation environment in time, and an organization can optimize the whole resource configuration and project management flow while ensuring success of key projects.
Drawings
FIG. 1 is a flow chart of a multi-system collaborative work platform for business generator integration in accordance with the present invention;
FIG. 2 is a flow chart of the acquisition of an authentication token according to the present invention;
FIG. 3 is a flow chart of the evaluation of criticality ratings in the present invention;
FIG. 4 is a flow chart of the acquisition of a priority task list in the present invention;
FIG. 5 is a flowchart illustrating the adjustment of the operation authority and the accessibility level of an application program according to the present invention;
FIG. 6 is a flow chart of the acquisition of a configuration dynamic adjustment table in the present invention;
FIG. 7 is a flow chart of an analysis of the efficiency of resource classification in the present invention;
Fig. 8 is a flowchart of the resource optimization measure acquisition in the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the description of the present invention, it should be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," etc. indicate or are based on the orientation or positional relationship shown in the drawings, merely to facilitate description of the invention and simplify description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the invention. Furthermore, in the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Examples
Referring to fig. 1, the present invention provides a technical solution, in which a service generator integrated multi-system cooperative work platform includes:
The identity verification module performs authority verification based on the received identity information input by the user, matches the information stored in the database, compares a key provided by the user with a stored key, and generates an identity verification token;
The task scheduling module screens the task data which can be contacted under the user permission based on the identity verification token, and prioritizes the tasks by evaluating the task attribute and the criticality classification to generate a priority task list;
the application configuration module analyzes the matching degree of the current application state and the required permission according to the priority task list, adjusts the operation permission and the accessible level of a plurality of application programs, dynamically adjusts the application permission configuration according to the service requirement, and generates a configuration dynamic adjustment table;
The data analysis module collects and aggregates the service data by utilizing the parameters in the configuration dynamic adjustment table, analyzes the resource classification efficiency of the service data, pays attention to the data of the peak period and the valley period of the resource use, predicts the workload of the service data by adopting a gradient lifting tree algorithm, adjusts the resource load among multiple application programs and obtains the resource optimal allocation measure.
The authentication token comprises an encryption key, a user identity and a valid period, the priority task list comprises a task number, an emergency level and expected completion time, and the configuration dynamic adjustment table comprises a permission level, a configuration state and last update time.
Referring to fig. 2, the steps for obtaining the authentication token specifically include:
based on the received identity information input by the user, performing preliminary matching with the stored information, and verifying the identity of the user to obtain a preliminary verification result;
In authentication, user identity information, such as a user name and a password, needs to be collected, and this information is used to match user data stored in advance in a database to verify whether submitted information matches known user data, and the received user information needs to be subjected to security check before being processed to prevent data from being tampered or leaked.
Based on the preliminary verification result, comparing with the key provided by the user, executing the key verification, and adopting the formula:
Calculating key consistency DV k to generate a key verification result, wherein k ui represents an ith key element provided by a user, k si represents the ith key element in stored data, and n d is the number of elements in a key;
according to the key verification result, if verification is passed, an identity verification token is generated, and the token is used for session management and service access of the user;
If there is a key element [ k ui ] provided by a user and a corresponding key element [ k si ] in the database, the following data is collected, n d=3,kui=[110,115,105],ksi = [100,120,100], substituted into the formula:
The result shows that the consistency of the keys is 0.0142, and the keys have higher consistency and are used for verifying the legitimacy of the identity of the user.
After the key verification process is finished, whether to grant the user identity verification token is determined based on the evaluation result of the key consistency, the token is used for confirming the identity legitimacy of the user, the token contains the identity information and the authority level of the user, the encrypted token can be used for subsequent operation of the user, the legitimacy and the safety of the operation of the user are ensured, the key for connecting the authentication of the user and the access of the service is provided, and the unauthorized access attempt can be effectively prevented.
Referring to fig. 3, the key classification evaluation steps specifically include:
collecting basic information of a task, including an expiration date, required resources and departments, converting the collected task information into quantifiable numerical values, converting the expiration date into days from the current date, calculating the resource requirements of the task according to the task scale and the expected completion time;
Basic information of tasks such as expiration dates, required resources and departments are systematically collected and recorded, the information is the basis for conversion into quantifiable values, the expiration dates are converted into days from the current date, the days are calculated through date difference, the resource requirements are evaluated according to the scale and expected completion time of each task, the resource requirements are vital to follow-up task plans and resource allocation so as to accurately evaluate and predict the upcoming requirements, reasonable allocation and efficient use of the resources are ensured, and therefore the overall flow and efficiency of task execution are optimized.
The criticality of each task is ranked according to the resource requirements of the task, using the formula:
Calculating a task criticality score SV, wherein wv D and wv R are weight factors of the expiration date and the resource requirement, respectively, D V +1 ensures that even if D V is 0 (i.e. is blocked today), no calculation abnormality is caused, D V represents the number of days from the expiration date of the task, and R V represents the resource requirement of the task;
Let a project team manage three different tasks, the weighting factors be wv D =0.7 (deadline weight) and wv R =0.3 (resource demand weight), let the deadline of the three tasks be 5, 2 and 10 days from today, the resource demand scores be 50, 75 and 20, respectively, calculate the criticality score of each task:
Based on the calculation, the second task has the highest criticality score, indicating the most urgent and most resource demanding task, should be preferentially processed. The calculation mode enables the task priority to be set more scientifically and practically, and is beneficial to efficient management of resources.
Referring to fig. 4, the step of acquiring the priority task list specifically includes:
According to an identity verification token provided by a user, determining an identity and a corresponding authority level, and screening task data accessible under the authority of a target user;
According to an identity verification token provided by a user, acquiring identity information of the user by analyzing an OAuth token or a JWT (joint verification wt) and other identity verification mechanisms, carrying out identity verification on user data in a database of a server side after analysis, further matching authority levels of the user after successful identity verification, automatically invoking authority management according to authority settings of the user in a system, determining whether the user is an administrator, an advanced user or a common user, after determining the authority, starting screening task data which the user has authority to access, screening tasks which the user can access, for example, the administrator can access all task data, and the common user can only access tasks related to the administrator, invoking SQL query sentences according to the authority levels by the system, filtering data, and applying condition screening in related fields (such as task attribution, priority and the like) of each task to ensure that finally returned task data accords with the authority range of the user.
Performing attribute evaluation on the screened task data, wherein the evaluation comprises the evaluation of the emergency degree, the expiration date and the resource requirement;
after task data is filtered, attribute evaluation is performed on the tasks. The main attributes of evaluation comprise urgency, expiration date and resource requirement, firstly, the expiration date field of a task is extracted, the urgency of the task is calculated in combination with the current date, the urgency is higher when the time difference is smaller, the conventional division standard can be that the urgency is low in more than 7 days and the urgency is high in less than 2 days, then, the resource requirement is queried from a task data association resource table, how many resources such as manpower and material resources are needed by each task are checked, the data are quantized into numerical values so as to be used in the subsequent sorting process, after the task evaluation is finished, the attribute data are transmitted into a sorting algorithm, and a priority task list is generated according to the urgency, the expiration date and the resource requirement of each task.
The tasks are prioritized by a sequencing algorithm, and the formula is adopted:
Obtaining a priority task list, wherein n q represents the number of task attributes, xq i represents the score of the ith task attribute, and wq i is the weight coefficient of the corresponding attribute;
For example, the attributes considered include urgency, expiration date and resource requirement, total 3 attributes, n q =3, setting the urgency weight to w q1 =0.5, expiration date and resource requirement weight to w q2 =0.3 and w q3 =0.2, respectively, the urgency score may be scored in the interval of 1 to 10, for example, urgency of a task is 8, remaining days of expiration date are scored in the opposite proportion as 6, score of resource requirement is 7, and the numerical value is substituted into the formula:
sort(xq)=(0.5·8)+(0.3·6)+(0.2·7)=4+1.8+1.4=7.2;
The result shows that the task has a priority of 7.2 points and can be compared with other tasks to discharge the priority list.
Referring to fig. 5, the steps of adjusting the operation authority and the accessible level of the application program specifically include:
Analyzing the attribute of each task in the priority task list, and comparing the task attribute with the service requirement, wherein the task attribute comprises the required completion time and the security level;
Before scoring the operation authority of the application program, each task attribute in the priority task list is analyzed first and compared with the service requirement, the detailed comparison of the time and the security level required to be completed by the tasks is related, the comparison can help to determine which tasks are critical tasks and which are executed later, by the method, the resource allocation can be optimized, the priority treatment of the important tasks is ensured, and meanwhile, the security is ensured, so that the running efficiency and the security management level of the application program are obviously improved.
Calculating the operation authority score of each application program by adopting a formula:
Wherein PS (a) is the operation authority score of the application program a, vs i is the weight of the ith task-related attribute, ts i is the value of the ith task attribute associated with the application program a, us j is the weight of the jth business requirement-related attribute, bs j is the value of the jth attribute of the business requirement, and n S and m s are the total number of task attributes and business requirement attributes, respectively;
Let the application a be associated with 3 task attributes (n S =3), each task attribute having a weight vs i and an attribute value ts i, the weight being vs 1=0.5,vs2=0.3,vs3 =0.2, the attribute value ts 1=100,ts2=80,ts3 =60, and likewise, 2 business requirement attributes (m s =2), a weight us j and an attribute value bs j, a weight us 1=0.6,us2 =0.4, the attribute value bs 1=50,bs2 =70, and the formula is substituted for the calculation:
PS(a)=(0.5×100)+(0.3×80)+(0.2×60)+(0.6×50)+(0.4×70);
PS(a)=50+24+12+30+28=144;
The result shows that the operation authority score of the application program a is 144, which indicates that the application program has higher operation authority, and relates to high risk or high security level operation, and further security measures need to be adjusted according to the business strategy.
Referring to fig. 6, the steps for obtaining the configuration dynamic adjustment table specifically include:
Analyzing the obtained priority task list, including the priority and the associated attribute of each task, determining the operation authorities and the accessible level of a plurality of application programs according to the priority and the service requirements, and matching the task priority with the application requirements;
In the analysis of the priority task list, the priority of each task and the associated attribute thereof are firstly considered, the careful comparison of the time and the security level of the task to be completed is related, the relative importance among the tasks can be determined by comparing the attributes, the priority analysis provides a basis for the operation authority setting of the application program, and the priority processing of the tasks with high security risk or urgency is ensured, so that the effective allocation of resources and the satisfaction of service requirements are realized, and the importance is important for the overall security and efficiency of a maintenance system.
The application depth Q network dynamically adjusts the application authority configuration by adopting the formula:
Obtaining an optimal application configuration, wherein su i is the ith element in the state vector, representing the current state (task type and user requirement), au i is the ith element in the action vector, representing the actions taken (rights expansion and restriction), wu i and bu i are corresponding weight coefficients for adjusting the sensitivity of the model to the state and actions, s u represents the state vector, a u represents the action vector, and n u is the number of elements;
let the state vector s u and the action vector a u contain 3 elements each, where n u =3, and let the weights wu= [0.5,0.3,0.2], bu= [0.4,0.4,0.2], the state vector su= [1,0,1] represent the urgency and security requirement of the task, and the action vector au= [1,0] represents the operation of authorizing expansion and restriction, and the substitution formula is used for calculation:
QR(au,su)=(0.5×1+0.4×1)+(0.3×0+0.4×1)+(0.2×1+0.2×0);
=0.9+0.4+0.2=1.5;
the result shows that the configuration score of the application program is 1.5, the permission setting of the application program is proper based on the current task urgency and security requirements and the authorized operation, and the application program meets the business requirements and the security requirements.
Referring to fig. 7, the steps of analyzing the resource classification efficiency specifically include:
Collecting service data, and aggregating corresponding resource use information, including CPU use rate, memory use amount and network bandwidth use condition;
The method and the system pay attention to collecting related data of each service, particularly resource utilization information, including CPU utilization rate, memory utilization amount and network bandwidth utilization condition, wherein the data is critical to understanding and optimizing system performance, aggregate data provides a comprehensive view of system operation conditions, allows an administrator to see consumption conditions of each resource, provides basis for subsequent resource allocation and performance adjustment, ensures effective utilization of the resource, reduces resource waste, enhances response capability of the system to changing service requirements, and enables resource management to be more efficient and accurate.
Calculating the utilization rate of each type of resource in the peak period and the valley period, defining the utilization rate as the ratio of the utilization amount of the resource to the total available amount, recording the utilization rate in the peak period as U peak and the utilization rate in the valley period as U valley, and dynamically adjusting parameters according to service requirements;
For each resource, the peak period and valley period utilization rate of the resource in daily operation is calculated, the indexes reflect the utilization condition and load change of the resource at different times, the calculation of the utilization rates involves monitoring the ratio between the consumption amount and the total available amount of the resource, the peak and valley of the resource utilization are identified, the data support is provided for resource scheduling, the service demand and the resource supply can be matched better through dynamic adjustment of related parameters, the resource redundancy and the shortage condition are reduced, and the overall operation efficiency is improved.
By comparing the difference between U peak and U valley, an efficiency assessment is made, using the formula:
Wherein n m represents the kinds and numbers of resources, EM is the resource classification efficiency, and U peak,i and U valley,i respectively represent the utilization rate of the ith resource in the peak period and the valley period;
There are 3 resource types, namely, n m =3, the collected data are that the peak period utilization rate U peak = [0.90,0.85,0.80] and the valley period utilization rate U valley = [0.50,0.45,0.40], and the data are calculated by substituting the formula:
The result shows that the calculation result of the resource allocation efficiency is 0.16, which shows that the resource use difference of the system between peaks and valleys is smaller, which means that the resource allocation is more reasonable, and the parameter should be continuously adjusted to further optimize the resource use efficiency.
Referring to fig. 8, the steps for obtaining the resource optimal allocation measure specifically include:
Predicting the resource demand of each application program in a future time period according to historical data by utilizing a gradient lifting tree algorithm, and collecting and evaluating the current used resource quantity of each application program;
The gradient lifting tree algorithm is used for predicting the resource demand of each application program in the future time period, the process comprises the steps of collecting current resource usage data, the data cover the conditions of CPU usage rate, memory usage amount and network bandwidth, and through deep analysis of historical data, the possible resource demand of each application program in the future can be effectively predicted so as to understand and predict the resource allocation demand, so that the overall utilization efficiency of resources is optimized, and the key for ensuring that the resources cannot be excessively or inadequately configured is provided.
And optimizing and calculating the resource quantity of each application program by adopting a formula:
Determining the amount of resources HC that each application should receive, wherein n c represents the number of applications, wc i represents the weight of the ith application, dc i represents the predicted required amount of the ith application, and Tc i represents the current allocated amount of resources of the ith application;
There are 3 applications, i.e., n c =3, weight wc= [0.5,0.3,0.2], predicted demand dc= [100,150,120], current resource tc= [50,100,90], and the calculation process is as follows:
The result shows that the calculated score for the optimal amount of resources is 0.15, which means that the first application should receive the largest share of resources given the weight and the use of resources, ensuring that its performance and response time are optimized.
In the foregoing, the present invention is not limited to the preferred embodiments, and any equivalent embodiments which can be changed or modified by the technical disclosure described above can be applied to other fields, but any simple modification, equivalent change and modification made to the above embodiments according to the technical matter of the present invention will still fall within the scope of the technical disclosure of the present invention.

Claims (4)

1.业务生成器集成的多系统协同工作平台,其特征在于,所述平台包括:1. A multi-system collaborative work platform integrated with a service generator, characterized in that the platform includes: 身份验证模块基于接收用户输入的身份信息,进行权限验证,与数据库中存储的信息进行匹配,对比用户提供的密钥与存储密钥,生成身份验证令牌;The authentication module performs permission verification based on the identity information received from the user, matches it with the information stored in the database, compares the key provided by the user with the stored key, and generates an authentication token; 任务调度模块基于所述身份验证令牌,筛选用户权限下可接触的任务数据,并通过评估任务属性和关键性分级,对任务进行优先级排序,生成优先级任务列表;The task scheduling module filters the task data accessible under the user's authority based on the authentication token, and prioritizes the tasks by evaluating the task attributes and criticality ratings to generate a priority task list; 所述关键性分级的评估步骤具体为:The evaluation steps for the criticality classification are as follows: 收集任务的基本信息,包括截止日期、所需资源和部门,将收集到的任务信息转换为可量化的数值,截止日期转换为距离当前日期的天数,资源需求根据任务规模和预期完成时间,计算任务的资源需求;Collect basic task information, including deadlines, required resources, and departments. Convert the collected task information into quantifiable values. Convert the deadline into the number of days from the current date. Calculate the resource requirements of the task based on the task size and expected completion time. 根据任务的资源需求,对每个任务的关键性进行分级,使用公式:Grade the criticality of each task based on its resource requirements using the formula: ; 计算任务关键性得分,其中,分别是截止日期和资源需求的权重因子,代表任务截止日期距今的天数,表示任务的资源需求;Calculating mission criticality score ,in, and are the weighting factors for deadline and resource requirements, respectively, Represents the number of days from the task deadline. Indicates the resource requirements of the task; 所述优先级任务列表的获取步骤具体为:The steps for obtaining the priority task list are specifically as follows: 根据用户提供的所述身份验证令牌,确定身份与对应权限级别,并筛选目标用户权限下可访问的任务数据;Determine the identity and corresponding permission level based on the authentication token provided by the user, and filter the task data accessible under the target user's permission; 对筛选的任务数据进行属性评估,包括评估紧急程度、截止日期和资源需求;Perform attribute assessment on the screened task data, including assessment of urgency, deadlines, and resource requirements; 通过排序算法对任务进行优先级排序,采用公式:Prioritize tasks using a sorting algorithm, using the formula: ; 得到优先级任务列表,其中,表示任务的优先级,表示任务属性数量,表示第个任务属性的评分,为对应属性的权重系数;Get a priority task list, where Indicates the priority of the task, Indicates the number of task attributes, Indicates the The rating of each task attribute, is the weight coefficient of the corresponding attribute; 应用配置模块依据所述优先级任务列表,分析当前应用状态与所需权限的匹配程度,调整多个应用程序的操作权限与可访问级别,并根据业务需求,应用深度Q网络动态调整应用权限配置,生成配置动态调整表;The application configuration module analyzes the degree of match between the current application status and the required permissions based on the priority task list, adjusts the operating permissions and access levels of multiple applications, and dynamically adjusts the application permission configuration based on business needs using the Deep Q network to generate a configuration dynamic adjustment table; 数据分析模块利用所述配置动态调整表中的参数,收集和聚合业务数据,对业务数据进行资源分类效率分析,并采用梯度提升树算法,对业务数据进行工作负载预测,调整多应用程序间的资源负载,得到资源最优调配措施;The data analysis module uses the parameters in the configuration dynamic adjustment table to collect and aggregate business data, conducts resource classification efficiency analysis on the business data, and uses the gradient boosting tree algorithm to predict the workload of the business data, adjust the resource load between multiple applications, and obtain the optimal resource allocation measures; 所述资源分类效率的分析步骤具体为:The analysis steps of the resource classification efficiency are specifically as follows: 收集业务数据,聚合对应的资源使用信息,包括CPU使用率、内存使用量和网络带宽使用情况;Collect business data and aggregate corresponding resource usage information, including CPU usage, memory usage, and network bandwidth usage; 计算每类资源在峰期与谷期的使用率,使用率定义为资源使用量与总可用量的比值,记峰期使用率为,谷期使用率为,并根据业务需求动态调整参数;Calculate the utilization rate of each type of resource during peak and valley periods. The utilization rate is defined as the ratio of resource usage to total available capacity. The peak utilization rate is , the valley utilization rate is , and dynamically adjust parameters according to business needs; 通过比较的差值,进行效率评估,采用公式:By comparison and The difference between the two values is used to evaluate the efficiency, using the formula: ; 其中,代表资源的种类数量,为资源分类效率,分别代表第类资源在峰期和谷期的使用率;in, Represents the number of resource types. For resource classification efficiency, and Representing the The utilization rate of class resources during peak and valley periods; 所述资源最优调配措施的获取步骤具体为:The steps for obtaining the optimal resource allocation measures are specifically as follows: 利用梯度提升树算法,根据历史数据预测未来时间段内每个应用程序的资源需求,收集并评估每个应用程序当前使用的资源量;Using the gradient boosting tree algorithm, we predict the resource requirements of each application in the future time period based on historical data, and collect and evaluate the amount of resources currently used by each application; 采用公式,对每个应用程序的资源量进行优化计算:Use the formula to optimize the amount of resources for each application: ; 确定每个应用程序应接收的资源量,其中,表示应用程序的数量,表示第个应用程序的权重,表示第个应用程序预测的需求量,表示第个应用程序当前分配的资源量。Determine the amount of resources each application should receive ,in, Indicates the number of applications, Indicates the The weight of the application, Indicates the The demand forecast for each application, Indicates the The amount of resources currently allocated to an application. 2.根据权利要求1所述的业务生成器集成的多系统协同工作平台,其特征在于,所述身份验证令牌的获取步骤具体为:2. The multi-system collaborative work platform integrated with a business generator according to claim 1, wherein the step of obtaining the identity authentication token is specifically: 基于接收用户输入的身份信息,与存储信息进行初步匹配,验证用户身份,得到初步验证结果;Based on the identity information received from the user, a preliminary match is performed with the stored information to verify the user's identity and obtain a preliminary verification result; 基于初步验证结果,与用户提供的密钥进行对比,执行密钥校验,采用公式:Based on the preliminary verification results, the key is compared with the key provided by the user and key verification is performed using the formula: ; 计算密钥一致性,生成密钥校验结果,其中,代表用户提供的第个密钥元素,代表存储数据中的第个密钥元素,是密钥中元素数量;Calculating key consistency , generate the key verification result, where, The first key elements, Represents the first key elements, is the number of elements in the key; 根据密钥校验结果,若验证通过,生成身份验证令牌。Based on the key verification result, if the verification passes, an authentication token is generated. 3.根据权利要求1所述的业务生成器集成的多系统协同工作平台,其特征在于,所述应用程序的操作权限与可访问级别的调整步骤具体为:3. The multi-system collaborative work platform integrated with a business generator according to claim 1, wherein the step of adjusting the operating authority and access level of the application program is specifically as follows: 分析所述优先级任务列表中每个任务的属性,将任务属性与业务需求进行对比,包括所需完成时间和安全级别;Analyze the attributes of each task in the priority task list and compare the task attributes with business requirements, including required completion time and safety level; 采用公式,计算每个应用程序的操作权限评分:Use the formula to calculate the operation permission score of each application: ; 其中,是应用程序的操作权限评分,是第个任务关联属性的权重,是应用程序关联的第个任务属性的数值,是第个业务需求关联属性的权重,是业务需求的第个属性的数值,分别是任务属性和业务需求属性的总数。in, It's an application Operation authority score, It is The weight of the attribute associated with each task, It's an application The associated The value of a task attribute, It is The weight of the attributes associated with each business requirement, Is the first business requirement The value of an attribute, and are the total number of task attributes and business requirement attributes respectively. 4.根据权利要求1所述的业务生成器集成的多系统协同工作平台,其特征在于,所述配置动态调整表的获取步骤具体为:4. The multi-system collaborative work platform integrated with a service generator according to claim 1, wherein the step of obtaining the dynamic configuration adjustment table is specifically: 分析获得的所述优先级任务列表,包括每项任务的优先级和关联属性,根据优先级和业务需求,确定多个应用程序的操作权限和可访问级别,并将任务优先级与应用需求进行匹配;Analyze the obtained priority task list, including the priority and associated attributes of each task, determine the operation permissions and access levels of multiple applications based on the priority and business needs, and match the task priorities with the application needs; 应用深度Q网络动态调整应用权限配置,采用公式:Apply the Deep Q network to dynamically adjust application permission configuration using the formula: ; 得到最优的应用程序配置,其中,是状态向量中的第个元素,是行动向量中的第个元素,是对应的权重系数,表示状态向量,表示行动向量,是元素数量。Get the optimal application configuration, where is the first elements, is the first elements, and is the corresponding weight coefficient, represents the state vector, represents the action vector, is the number of elements.
CN202510191987.8A 2025-02-21 2025-02-21 Service generator integrated multi-system cooperative work platform Active CN120106800B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510191987.8A CN120106800B (en) 2025-02-21 2025-02-21 Service generator integrated multi-system cooperative work platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510191987.8A CN120106800B (en) 2025-02-21 2025-02-21 Service generator integrated multi-system cooperative work platform

Publications (2)

Publication Number Publication Date
CN120106800A CN120106800A (en) 2025-06-06
CN120106800B true CN120106800B (en) 2025-09-26

Family

ID=95889296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510191987.8A Active CN120106800B (en) 2025-02-21 2025-02-21 Service generator integrated multi-system cooperative work platform

Country Status (1)

Country Link
CN (1) CN120106800B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118608103A (en) * 2024-07-15 2024-09-06 汉林汇融(深圳)科技服务有限公司 Collaboration method, device and computer equipment based on project cooperation platform
CN119090239A (en) * 2024-10-11 2024-12-06 天津易天数字化服务有限公司 Smart Government Service Platform

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2329497B (en) * 1997-09-19 2001-01-31 Ibm Method for controlling access to electronically provided services and system for implementing such method
WO2015191647A2 (en) * 2014-06-11 2015-12-17 Live Nation Entertainment, Inc. Dynamic filtering and precision alteration of query responses responsive to request load
DE202024101468U1 (en) * 2024-03-24 2024-04-23 Shweta Chauhan Dynamic workflow optimization system for improved task management efficiency
CN117955749A (en) * 2024-03-27 2024-04-30 上海飞斯信息科技有限公司 Distributed data encryption transmission system
CN118446501A (en) * 2024-07-08 2024-08-06 国家海洋信息中心 A marine emergency dispatch method and system based on interaction

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118608103A (en) * 2024-07-15 2024-09-06 汉林汇融(深圳)科技服务有限公司 Collaboration method, device and computer equipment based on project cooperation platform
CN119090239A (en) * 2024-10-11 2024-12-06 天津易天数字化服务有限公司 Smart Government Service Platform

Also Published As

Publication number Publication date
CN120106800A (en) 2025-06-06

Similar Documents

Publication Publication Date Title
CN100444121C (en) Batch task scheduling engine and dispatching method
US7110913B2 (en) Apparatus and method for managing the performance of an electronic device
CN100570569C (en) Job Cross-Domain Control Method in Grid Computing Environment
WO2005107114A2 (en) Control service capacity
CN118364361A (en) A dynamic data management method and system
CN119088761B (en) An electronic management method and system for international standardization organization system documents
CN120235427B (en) A resource allocation method and system in a human-machine collaborative decision-making scenario
CN111539555A (en) Mixed cloud platform-based field management system
CN120258397A (en) A method for optimizing resource scheduling of construction projects based on BIM
Rolia et al. Resource access management for a utility hosting enterprise applications
CN119003138A (en) Heterogeneous multi-core collaborative management and automatic operation and maintenance system
CN120106800B (en) Service generator integrated multi-system cooperative work platform
CN119577699B (en) Centralized monitoring management method and system for special software permissions
Khaddaj Cloud computing: service provisioning and user requirements
Li et al. A QoS-based scheduling algorithm for instance-intensive workflows in cloud environment
CN120448091A (en) A hybrid cloud automated resource planning method, system, device and medium
CN114792230A (en) Intelligent community comprehensive command center scheduling system and method
CN112988824A (en) Data generation method and device, computer equipment and storage medium
Rodero et al. The grid backfilling: a multi-site scheduling architecture with data mining prediction techniques
CN119211294A (en) Internet information service system and method based on cloud computing
Kloh et al. A bi‐criteria scheduling process with CoS support on grids and clouds
CN113934533B (en) Service deployment method and device, storage medium and electronic device
CN119443745B (en) River basin service resource allocation method, device, computer equipment and medium
CN120430879B (en) A comprehensive financial audit system based on big data
CN120634407B (en) A cross-organization material sharing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant