046 Turbulence algorithm
That's right, when Ning Wei looked at Huo Zhiheng's subtitles in the video and listened to his loud voice, a practical Internet technology derived from solving the N-S equation suddenly appeared in his mind - the turbulence algorithm.
This feeling is strange.
It was as if the words of the video owner kept inspiring him, and then a complete algorithm structure was combined with the knowledge he had learned before and was displayed in his mind.
Then there was another feeling of inspiration.
If you don't record this inspiration, you'd rather feel like you'd go crazy right away.
So he jumped out of the bed.
"What's wrong, Ning Dowawa, wasn't you scared by my literary talent?"
"Bah, you guys talk to you, don't pay attention to me, I have an idea to record it!" Ning Wei responded casually to Xu Ruixuan, then sat in front of his computer, quickly turned on the computer, and then clicked on the browser.
First of all, he wanted to be sure that the turbulence algorithm derived from the N-S equation that suddenly appeared in his mind had not been invented yet.
Soon, Ning Wei confirmed that there was no!
Because if this turbulence algorithm has been released, people will not be able to do anything to those malicious web crawlers and can only do anything to make up for them.
That's right, the turbulence algorithm that popped up in Ning Wei's mind at this time is an intelligent algorithm specifically designed to deal with malicious network crawlers.
The Internet era is full of various web crawlers.
The so-called network crawler is actually a program and script that automatically batch crawls network information according to certain rules. The most extensive application is probably search engines. Through network crawler technology, these search engines will enter the collected information into the database at a certain frequency through these network crawlers to ensure that users can find more and more accurately what they want from the complex information on the Internet when searching from the engine entrance.
This type of web crawler is generally called a general web crawler.
The other type is focusing on crawlers.
This is a technology that continuously crawls specific websites or specific information.
Generally speaking, it is OK to be able to comply with the robots protocol to use this technology.
But in fact, many web crawlers on the Internet do not do personnel.
A case of online crawlers closely related to everyone is scalpers grab tickets.
For example, the most visited by various online crawlers around the world is 12306.
Every holiday, especially during the May Day, the National Day, and the Spring Festival travel peak, train tickets in popular areas will always be very difficult to get, or even be in vain. And at this time, the 12306 software is difficult to open, and it is basically thanks to this kind of network crawler.
According to statistics, the peak of clicks in Huaxia 12306 reached 5.9 billion times per hour, with an average of more than 1.6 million clicks per second. Obviously, it is not a number that normal users can flash.
The official program also uses various upgraded verification codes to prevent scalpers from grabbing tickets. For a period of time, those verification codes that are perverted are even difficult to make an ordinary person at a loss.
Even though the function of integrating people and tickets is now launched, countless ticket grabbing software still use the method of buying ticket grabbing packages to provide this kind of service.
In addition, major airlines are also the hardest hit areas for illegal online crawlers, especially those airlines that often release special air tickets. Almost every time a special air ticket is released, they will be sniffed by such crawlers as soon as they are released, and then book directly but do not pay.
For airlines, this kind of special ticket will generally be paid for half an hour after booking, and if you don’t pay within half an hour, you will enter the ticket pool again. However, crawler technology can grab these special tickets within 0.01 seconds after entering the ticket pool, until the scalper finds a buyer who is willing to increase the price, purchases the tickets and pays with the buyer’s identity information.
It can be imagined that no matter it is 12306 or major airlines, they all hate this kind of reptile.
After all, they can’t make a penny in scalpers’ price increase, and they also increase the network load.
Especially major airlines, they originally wanted to give benefits to customers to increase customer stickiness, but customers did not enjoy low-priced tickets, and they might be annoyed by paying high prices and not enjoying the corresponding services.
In addition to this kind of network crawler, there are some more malicious network crawlers, who silently lurk in the network and constantly crawl various private user identity information, major chain hotels, user systems of various APPs, etc., which are the targets of these network crawlers.
Unfortunately, there are currently no defensive technical means to target these malicious network crawlers, and they generally rely on various hardware and software firewall technologies to isolate them.
What makes countless developers even more difficult is that safety and convenience are often impossible to have both.
This is like the collapsed verification codes issued by 12306 briefly stopped the rampant crawlers and made countless ordinary people dizzy.
At this time, Ning Wei's turbulence algorithm in his mind can solve the problem of malicious crawlers while taking into account convenience.
The function of expressing this algorithm in understandable language is probably that the stable state data flow will flow slowly and normally on the server data interface like flowing water. Each connection request will directly affect the steady state data flow. It is like a calmly flowing river surface forming turbulent flows due to small fish rising upstream.
After the server has configured the turbulence algorithm, by upgrading the verification system, the stationary data flow can intelligently determine whether various connection requests are normal or other illegal requests through countless accesses, and use this to determine whether the network crawler is doing data crawling or normal access by normal customers.
After making the distinction, the algorithm can automatically point these crawlers to the target and directly lead to a data turbulence. Here, these crawlers can only crawl various chaotic and complex invalid data and then feed it back to the crawler author.
If carefully arranged, this process may directly affect the security of the equipment that receives information, leaving these malicious crawlers without any hiding.
It may sound simple, but this turbulence algorithm is not simple. It contains many contents of underlying neural networks and deep learning algorithms. For example, it uses recurrent neural networks almost at the same time, generative adversarial networks, deep contraction networks, various regressions, etc.
There are also algorithms deduced through N-S equations.
Soon, Ning Wei recorded several parts of the algorithm on the computer.
Then the C locale environment is called up.
It’s not that I don’t want to use python. After all, python is extremely simple compared to C. There are many packages that can be called directly, just like a person who has never learned to cook. If you use a cooking bag, you can make extremely delicious meals with only a microwave.
But python cannot meet Ning Wei's needs, not to mention that many parts of turbulence algorithm are not included in python at all.
Moreover, I have taught C language classes in the first year of school, and Ning Wei's grades are also pretty good.
Of course, this result is not what Ning Wei shows now.
For example, when I was learning C language, the pointers and link lists that made him feel particularly troubled, but now they are like learning without a teacher, and they are free to use them.
Chapter completed!