Surrounding label stringing behavior recognition method and device, computer equipment and storage medium
An identification method and behavior technology, applied in the direction of computing, using information identifiers to retrieve Web data, instruments, etc., can solve the problem of not being able to identify the behavior of bid rigging, and achieve the effect of ensuring market order and ensuring fairness and justice.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0060] This embodiment provides a method for identifying bid-surrounding behaviors, such as figure 1 As shown, the main flow of the method is described as follows (steps S101-S104):
[0061] Step S101: Obtain the credit information of each bidder.
[0062] Specifically, the interface of the credit investigation platform is called first, and then the credit information of each bidder is obtained by crawling the webpage. Such as figure 2 As shown, the specific steps are as follows:
[0063] Step S1011: Obtain the identifier of the interface of the credit investigation platform.
[0064] An identity interface is an interface without any methods and properties. The identification interface does not impose any semantic requirements on the class that implements it, it only indicates that the class that implements it belongs to a specific type. In the Java language, interfaces such as java.io.Serializable and java.rmi.Remote are identification interfaces. When a class implemen...
Embodiment 2
[0092] In order to better implement the above method, an embodiment of the present invention provides a device for identifying behaviors of surrounding and stringent bids. The device for identifying behaviors of surrounding and stringent bids can specifically be integrated in network equipment, such as terminals or servers. This can include devices such as mobile phones, tablets, or desktop computers.
[0093] Figure 4 It is a structural block diagram of a device for identifying bid-rigging behavior provided by an embodiment of the present invention. Such as Figure 4 As shown, the bid-rigging behavior recognition device mainly includes:
[0094] An acquisition module 201, configured to acquire the credit information of each bidder;
[0095] A preprocessing module 202, configured to preprocess the credit information;
[0096] A classification extraction module 203, configured to classify and extract the preprocessed credit information based on preset dimensions, to obtain...
Embodiment 3
[0106] In order to better execute the program of the above method, an embodiment of the present invention provides a computer device, which may be a server or a terminal. Such as Figure 5 As shown, the computer device 300 includes a memory 301 and a processor 302 .
[0107] The memory 301 stores at least one instruction, at least one section of program, code set or instruction set, and at least one instruction, at least one section of program, code set or instruction set is loaded and executed by the processor 302 to realize the above-mentioned embodiment-identification of bid-surrounding and collusion behavior method.
[0108] Memory 301 may include one or more computer-readable storage media, which may be non-transitory. The memory 301 may also include high-speed random access memory and non-volatile memory, such as one or more magnetic disk storage devices and flash memory storage devices. In some embodiments, the non-transitory computer-readable storage medium in the m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


