Unlock instant, AI-driven research and patent intelligence for your innovation.

Surrounding label stringing behavior recognition method and device, computer equipment and storage medium

An identification method and behavior technology, applied in the direction of computing, using information identifiers to retrieve Web data, instruments, etc., can solve the problem of not being able to identify the behavior of bid rigging, and achieve the effect of ensuring market order and ensuring fairness and justice.

Active Publication Date: 2020-08-25
NANJING XINYUAN INVITE PUBLIC BIDDING CONSULTATION
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing bidding system cannot efficiently and accurately identify bid-rigging behaviors in the bidding process. Therefore, there is an urgent need for an efficient, accurate and accurate identification method for bid-rigging behaviors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Surrounding label stringing behavior recognition method and device, computer equipment and storage medium
  • Surrounding label stringing behavior recognition method and device, computer equipment and storage medium
  • Surrounding label stringing behavior recognition method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] This embodiment provides a method for identifying bid-surrounding behaviors, such as figure 1 As shown, the main flow of the method is described as follows (steps S101-S104):

[0061] Step S101: Obtain the credit information of each bidder.

[0062] Specifically, the interface of the credit investigation platform is called first, and then the credit information of each bidder is obtained by crawling the webpage. Such as figure 2 As shown, the specific steps are as follows:

[0063] Step S1011: Obtain the identifier of the interface of the credit investigation platform.

[0064] An identity interface is an interface without any methods and properties. The identification interface does not impose any semantic requirements on the class that implements it, it only indicates that the class that implements it belongs to a specific type. In the Java language, interfaces such as java.io.Serializable and java.rmi.Remote are identification interfaces. When a class implemen...

Embodiment 2

[0092] In order to better implement the above method, an embodiment of the present invention provides a device for identifying behaviors of surrounding and stringent bids. The device for identifying behaviors of surrounding and stringent bids can specifically be integrated in network equipment, such as terminals or servers. This can include devices such as mobile phones, tablets, or desktop computers.

[0093] Figure 4 It is a structural block diagram of a device for identifying bid-rigging behavior provided by an embodiment of the present invention. Such as Figure 4 As shown, the bid-rigging behavior recognition device mainly includes:

[0094] An acquisition module 201, configured to acquire the credit information of each bidder;

[0095] A preprocessing module 202, configured to preprocess the credit information;

[0096] A classification extraction module 203, configured to classify and extract the preprocessed credit information based on preset dimensions, to obtain...

Embodiment 3

[0106] In order to better execute the program of the above method, an embodiment of the present invention provides a computer device, which may be a server or a terminal. Such as Figure 5 As shown, the computer device 300 includes a memory 301 and a processor 302 .

[0107] The memory 301 stores at least one instruction, at least one section of program, code set or instruction set, and at least one instruction, at least one section of program, code set or instruction set is loaded and executed by the processor 302 to realize the above-mentioned embodiment-identification of bid-surrounding and collusion behavior method.

[0108] Memory 301 may include one or more computer-readable storage media, which may be non-transitory. The memory 301 may also include high-speed random access memory and non-volatile memory, such as one or more magnetic disk storage devices and flash memory storage devices. In some embodiments, the non-transitory computer-readable storage medium in the m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a surrounding bid stringing behavior identification method and device, computer equipment and a storage medium, and belongs to the technical field of electronic bid inviting,the method comprises the following steps: obtaining credit investigation information of each bidder; preprocessing the credit investigation information; performing classification extraction on the preprocessed credit investigation information based on preset dimensions to obtain multiple pieces of dimension information of each bidder; and if the same dimension information of the different biddershas the same keyword, judging that a surrounding bid stringing behavior exists. According to the invention, the problem that the existing bidding and tendering system cannot efficiently and accuratelyidentify the bid surrounding and stringing behaviors is solved. Efficient and accurate identification can be carried out on the surrounding label stringing behavior.

Description

technical field [0001] The present invention relates to the technical field of bidding, in particular to a method, device, computer equipment and storage medium for identifying bid rigging and collusion. Background technique [0002] Bidding is an international practice, and it is a method of selecting the best deal in an organized way by applying technology, economic methods and the competition mechanism of the market economy. When the tenderee organizes the qualification examination of bidders, the general process is to issue prequalification announcements or bidding documents to clarify the qualification requirements for bidders, and bidders prepare corresponding qualification materials according to the requirements, such as business licenses, qualification certificates, etc., and invite bids The person will then conduct a compliance review of the materials submitted by the bidder. [0003] At present, there are still some problems when the tenderee organizes the qualifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/06G06F16/951G06F16/955G06F16/958
CPCG06Q30/0611G06F16/951G06F16/9566G06F16/958
Inventor 陶立春尹桂军阮建勇陈磊宦叶青
Owner NANJING XINYUAN INVITE PUBLIC BIDDING CONSULTATION