CN109034717A - The method of mark string bid behavior is enclosed in a kind of identification bidding process - Google Patents
The method of mark string bid behavior is enclosed in a kind of identification bidding process Download PDFInfo
- Publication number
- CN109034717A CN109034717A CN201810570904.6A CN201810570904A CN109034717A CN 109034717 A CN109034717 A CN 109034717A CN 201810570904 A CN201810570904 A CN 201810570904A CN 109034717 A CN109034717 A CN 109034717A
- Authority
- CN
- China
- Prior art keywords
- bid
- document
- text
- tenderer
- rectangular window
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/194—Calculation of difference between files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/08—Auctions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Abstract
The invention discloses a kind of methods that mark string bid behavior is enclosed in identification bidding process, the data that each bidding unit provides is read one by one, generate the text document summarized, each text document is compared by the document of rectangular window and tenderer and completes deduplication, generate new document, new document positioning duplicate contents are compared two-by-two, determine whether to enclose mark string mark, duplicate removal and comparison are carried out by reading bid data and each bid data and document will be generated, solve the problems, such as that bid data and bid data duplicate contents are more in audit, it is accurately searched using the comparison principle of rectangular window and marks the identical characters in comparison document, it is compared two-by-two again after duplicate contents in bid data are removed, the repetition point of precise positioning bidder's drafting content.A large amount of useless, the incomplete characters of output are avoided, and enclose by the judgement of the identical characters of output that mark string mark is clear and accurate not to be omitted, operation of the present invention is simple, practical, easy to use and promote.
Description
Technical field
The present invention relates to a kind of audit technique field for enclosing mark string bid behavior, mark is enclosed in specifically a kind of identification bidding process
The method of string bid behavior.
Background technique
It encloses mark and is also referred to as colluded tender, it refers between bid person and bidder or between bidder and bidder
Using improper means, to inviting and submitting bids, item is ganged up, and to squeeze rival or damage the behavior of bid person's interests, is thrown
Between mark unit or tenderer and competitive bid unit mutually gang up that gain acceptance of the bid by cheating be exactly string mark, and string, which is marked, makes a kind of opportunistic practice,
Root is the Credit Shortage of engineering construction field or even entire society.
Bidding activity in construction project is always the emphasis supervision item of auditing authority, according to the system in the state audit Room
Meter research, 20% unlawful practice occurs in this link, and wherein goes here and there and mark and enclose the acceptance of the bid of mark Behavioral Manipulation as a result, serious
The fair and just principle of bidding has been violated, has brought risk hidden danger to bidding project quality.
String mark encloses mark behavior because it is with certain concealment, is not easy to be found and investigate and prosecute, the examination of correlation audit unit
Method is excessively outmoded, effectively cannot find trick therein, tender documents and each trick by comparing each bidding document
There are a large amount of identical contents in mark file to be difficult to remove, existing common deduplication householder method can obtain a large amount of repetition, nothing
With information, it can not audit to bidding document and bring the change of how much matter, be badly in need of a kind of knowledge effective, simple to operation
The method of mark string bid behavior is enclosed in other bidding process.
Summary of the invention
The purpose of the present invention is to provide a kind of methods that mark string bid behavior is enclosed in identification bidding process, to solve above-mentioned back
The problem of being proposed in scape technology.
To achieve the above object, the invention provides the following technical scheme:
The method of mark string bid behavior is enclosed in a kind of identification bidding process, comprising the following steps:
1) the bidding data that each bidding unit provides, is read one by one, generates the text document summarized;
2) each Bid file document is compared by rectangular window and bid document, and completes deduplication, generates new bidding document;
3) new bidding document duplicate contents, are compared two-by-two by rectangular window, it is determined whether enclose mark string mark.
As a further solution of the present invention: step 1) specifically includes the following steps:
A), all texts in the bid data that competitive bid unit provides are read, the text document 0 individually summarized is generated;
B), all texts in the bid data that tenderer 1 provides are read, the text document 1 individually summarized is generated;
C), all texts in the bid data that tenderer 2 provides are read, the text document 2 individually summarized is generated;
D), all texts in the bid data that tenderer n is provided are read, the text document n individually summarized is generated.
As further scheme of the invention: the number of tenderer n is no less than 3.
As further scheme of the invention: the bid money of bid data, the offer of tenderer 1 that competitive bid unit provides
The bid data that the bid data and tenderer n that material, tenderer 2 provide provide is word document, PDF document and excel
Document.
As further scheme of the invention: the bid of the bid data, the offer of tenderer 1 that provide competitive bid unit
The reading for the bid data that the bid data and tenderer n that data, tenderer 2 provide provide summarizes to be programmed by C language
It realizes.
As the present invention further scheme: step 2 specifically includes the following steps:
A), the text document 1 of tenderer 1 and the text document 0 of competitive bid unit are compared, principle is compared by rectangular window
Identical text character is found out, identical text character is deleted and generates new text document 1x;
B), the text document 2 of tenderer 2 and the text document 0 of competitive bid unit are compared, principle is compared by rectangular window
Identical text character is found out, identical text character is deleted and generates new text document 2x;
C), the text document 0 of the text document n of tenderer n and competitive bid unit are compared, principle is compared by rectangular window
Identical text character is found out, identical text character is deleted and generates new text document nx.
As further scheme of the invention: it is that a kind of effective deduplication method is former that the rectangular window, which compares principle,
Reason sets rectangular window character length when initial, set the rectangular window of character length sequence mobile browsing text character in the text,
When detecting the identical text character content of the character length, which increases a character length automatically, continues to test,
Until this section of identical text character cut-off, at the same time, marks this section of duplicate text character.
As the present invention further scheme: the rectangular window character length set when initial is 5.
As the present invention further scheme: step 3) specifically includes the following steps:
A), by newly-generated text document 1x, 2x and nx according to permutation and combination two-by-two pass through rectangular window compare principle comparison.
B), the repeated text character of rectangular window contrast marker is exported and is counted;
C), mark and string mark are enclosed as a result, judging whether there is according to statistics.
As the present invention further scheme: with reference in " People's Republic of China's the Law on Public Bidding implementing regulations " to enclosing
The identification of string bid behavior is marked, judgement encloses mark and is whether that there are the consistent and abnormal unanimous circumstances of mistakes and omissions with the standard of string target.
Compared with prior art, the beneficial effects of the present invention are:
1, it is compared, is solved in audit by reading bid data and each bid data and they being generated separate document
Bid data and the more problem of data duplicate contents that calls for bid;
2, the identical characters in comparison document are accurately searched and marked using the comparison principle of the rectangular window of adjustable character length,
It avoids deletion and exports a large amount of useless, incomplete characters, improve the accurate snatch rate of identical characters;
3, the method is programmed exploitation using computer language and replaces people's manual operation, saves the extensive work time, and pass through
Output identical characters judgement enclose mark string mark it is clear and accurate do not omit, ensure that identification enclose mark string target accuracy, significantly
Improve the working efficiency of identification.
Specific embodiment
Below in conjunction with the embodiment of the present invention, technical solution in the embodiment of the present invention is clearly and completely retouched
It states, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on the present invention
In embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Embodiment (1)
Application scenarios: certain engineering publishes bidding document by the quotient A that calls for bid and externally calls for bid, and B, C, D and E tetra- possess bid qualification
Unit respectively submit tender documents simultaneously and participate in the project bid.
Step 1):
A) the bidding content detail for the bidding document tender comprising word document and excel document that bid quotient A is published,
The tender for the word document that bid quotient A is announced and the bidding content detail of excel document are read by C programmer, are generated and are converged
Total text document 0;
B) the bid data of tenderer B includes the tender document of word document, the bid content detail of excel document and PDF
Scheme drawing reads the tender document for the word document that tenderer B is delivered, the bid content of excel document by C programmer
The scheme drawing of detail and PDF generates and individually summarizes text document 1;
C) the bid data of tenderer C includes the tender document of word document, the bid content detail of excel document and PDF
Scheme drawing reads the tender document for the word document that tenderer C is delivered, the bid content of excel document by C programmer
The scheme drawing of detail and PDF generates and individually summarizes text document 2;
D) the bid data of tenderer D includes the tender document of word document, the bid content detail of excel document and PDF
Scheme drawing reads the tender document for the word document that tenderer D is delivered, the bid content of excel document by C programmer
The scheme drawing of detail and PDF generates and individually summarizes text document 3;
E) the bid data of tenderer E includes the tender document of word document, the bid content detail of excel document and PDF
Scheme drawing reads the tender document for the word document that tenderer E is delivered, the bid content of excel document by C programmer
The scheme drawing of detail and PDF generates and individually summarizes text document 4.
Step 2:
A), text document 1 will be summarized to compare with text document 0 is summarized, will be found out by rectangular window comparison principle identical
Text character, the rectangular window character length set when initial is 5, and the rectangular window that character is 5 is in text document 1 and text document 0
In browsed backward from document beginning sequence, when discovery text document 1 and text document 0 are there are when identical 5 characters of rectangular window,
The character length of rectangular window is incremented by one automatically and reaches 6, and the rectangular window of 6 characters browses at above-mentioned identical characters, if still
Identical, then the character length of rectangular window continues to be incremented by an arrival 7, and so on, until character is no longer identical in rectangular window,
All identical characters of rectangular window browsing scanning discovery, deletion summarize text document in retrtieval document 1 and text document 0
In 1 by rectangular window compare principle find and mark it is all with summarize 0 identical characters of text document, after the completion of deletion, remaining remittance
Content in total text document 1 forms new document 1x;
B), text document 2 will be summarized to compare with text document 0 is summarized, text document 1 is summarized by processing and generates new text
The method processing of shelves 1x summarizes text document 2, forms new document 2x;
C), text document 3 will be summarized to compare with text document 0 is summarized, text document 1 is summarized by processing and generates new text
The method processing of shelves 1x summarizes text document 3, forms new document 3x;
D), text document 4 will be summarized to compare with text document 0 is summarized, text document 1 is summarized by processing and generates new text
The method processing of shelves 1x summarizes text document 3, forms new document 4x.
Step 3):
A), 1x, 2x, 3x and 4x are divided and amounts to 6 groups for 1x-2x, 1x-3x, 1x-4x, 2x-3x, 2x-4x and 3x-4x, respectively to every
Group compares principle by the rectangular window in step 2 and searches and mark identical text character;
1x | 2x | 3x | 4x | |
1x | —— | 1x-2x | 1x-3x | 1x-4x |
2x | —— | —— | 2x-3x | 2x-4x |
3x | —— | —— | —— | 3x-4x |
4x | —— | —— | —— | —— |
B) identical characters occurred in every group are exported and count, statistics output formats are as follows:
Serial number | Repeated text | 1x-2x | 1x-3x | 1x-4x | 2x-3x | 2x-4x | 3x-4x |
Total amount | |||||||
1 | |||||||
2 | |||||||
3 | |||||||
4 | |||||||
5 | |||||||
6 | |||||||
7 |
C) mark string mark is enclosed as a result, judging to whether there is between each group according to statistics, wherein 1x represents tenderer B, and 2x is represented
Tenderer C, 3x represent tenderer D, and 4x represents tenderer E.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included within the present invention.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped
Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should
It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art
The other embodiments being understood that.
Claims (10)
1. enclosing the method for mark string bid behavior in a kind of identification bidding process, which comprises the following steps:
1) the bidding data that each bidding unit provides, is read one by one, generates the text document summarized;
2) each Bid file document is compared by rectangular window and bid document, and completes deduplication, generates new bidding document;
3) new bidding document duplicate contents, are compared two-by-two by rectangular window, it is determined whether enclose mark string mark.
2. enclosing the method for mark string bid behavior in identification bidding process according to claim 1, which is characterized in that step 1) tool
Body the following steps are included:
A), all texts in the bid data that competitive bid unit provides are read, the text document 0 individually summarized is generated;
B), all texts in the bid data that tenderer 1 provides are read, the text document 1 individually summarized is generated;
C), all texts in the bid data that tenderer 2 provides are read, the text document 2 individually summarized is generated;
D), all texts in the bid data that tenderer n is provided are read, the text document n individually summarized is generated.
3. enclosing the method for mark string bid behavior in identification bidding process according to claim 2, which is characterized in that competitive bid unit
The bid data and tenderer n of bid data, the offer of tenderer 2 that the bid data of offer, tenderer 1 provide provide
Bid data include word document, PDF document and excel document.
4. enclosing the method for mark string bid behavior in identification bidding process according to claim 2, which is characterized in that invitation
The bid data of bid data, the offer of tenderer 1, the bid data of the offer of tenderer 2 and the tenderer n that position provides are mentioned
The reading of the bid data of confession, which summarizes to program by C language, to be realized.
5. enclosing the method for mark string bid behavior in identification bidding process according to claim 2, which is characterized in that the trick of reading
Bid file includes author and the creation time of each bidding text.
6. enclosing the method for mark string bid behavior in identification bidding process according to claim 1, which is characterized in that step 2 tool
Body the following steps are included:
A), the text document 1 of tenderer 1 and the text document 0 of competitive bid unit are compared, principle is compared by rectangular window
Identical text character is found out, identical text character is deleted and generates new text document 1x;
B), the text document 2 of tenderer 2 and the text document 0 of competitive bid unit are compared, principle is compared by rectangular window
Identical text character is found out, identical text character is deleted and generates new text document 2x;
C), the text document 0 of the text document n of tenderer n and competitive bid unit are compared, principle is compared by rectangular window
Identical text character is found out, identical text character is deleted and generates new text document nx.
7. enclosing the method for mark string bid behavior in identification bidding process according to claim 6, which is characterized in that the rectangle
It is a kind of effective deduplication Method And Principle that window, which compares principle, and rectangular window character length is set when initial, sets character length
Rectangular window sequence mobile browsing text character in the text should when detecting the identical text character content of the character length
Rectangular window increases a character length automatically, continues to test, until this section of identical text character cut-off, at the same time, label
This section of duplicate text character.
8. enclosing the method for mark string bid behavior in identification bidding process according to claim 1, which is characterized in that step 3) tool
Body the following steps are included:
A), by newly-generated text document 1x, 2x and nx according to permutation and combination two-by-two by rectangular window compare principle comparison,
B), the repeated text character of rectangular window contrast marker is exported and is counted;
C), mark and string mark are enclosed as a result, judging whether there is according to statistics.
9. enclosing the method for mark string bid behavior in identification bidding process according to claim 9, which is characterized in that in step 3)
The rectangular window character length set when rectangular window compares initial is 20.
10. enclosing the method for mark string bid behavior in identification bidding process according to claim 9, which is characterized in that judgement is enclosed
It marks and is whether that there are the consistent and abnormal unanimous circumstances of mistakes and omissions with the standard of string target.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810570904.6A CN109034717A (en) | 2018-06-05 | 2018-06-05 | The method of mark string bid behavior is enclosed in a kind of identification bidding process |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810570904.6A CN109034717A (en) | 2018-06-05 | 2018-06-05 | The method of mark string bid behavior is enclosed in a kind of identification bidding process |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109034717A true CN109034717A (en) | 2018-12-18 |
Family
ID=64612274
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810570904.6A Pending CN109034717A (en) | 2018-06-05 | 2018-06-05 | The method of mark string bid behavior is enclosed in a kind of identification bidding process |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109034717A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110046973A (en) * | 2019-04-17 | 2019-07-23 | 成都市审计局 | It is a kind of that mark string mark detection method is enclosed based on incidence relation big data analysis |
CN111091259A (en) * | 2019-09-20 | 2020-05-01 | 上海同在互联网科技有限公司 | Electronic bidding purchasing abnormal behavior identification method, system, equipment and storage medium |
CN111160445A (en) * | 2019-12-25 | 2020-05-15 | 中国建设银行股份有限公司 | Bid document similarity calculation method and device |
CN111191903A (en) * | 2019-12-24 | 2020-05-22 | 中科金审(北京)科技有限公司 | Early warning method and device for monitoring bid document, server and storage medium |
CN111583000A (en) * | 2020-06-03 | 2020-08-25 | 南京鑫智链科技信息有限公司 | Method and device for identifying surrounding mark and string mark behaviors, computer equipment and storage medium |
CN112258303A (en) * | 2020-11-16 | 2021-01-22 | 北京筑龙信息技术有限责任公司 | Surrounding string mark early warning analysis method and device, electronic equipment and storage medium |
CN112819565A (en) * | 2021-01-20 | 2021-05-18 | 南方电网深圳数字电网研究院有限公司 | Method and system for detecting surrounding mark string mark and storage medium |
CN113362122A (en) * | 2020-03-02 | 2021-09-07 | 贵州百年四面通科技有限公司 | Bidding transaction quotation processing method, device and system and storage medium |
CN117172220A (en) * | 2023-11-02 | 2023-12-05 | 北京国电通网络技术有限公司 | Text similarity information generation method, device, equipment and computer readable medium |
CN112258303B (en) * | 2020-11-16 | 2024-04-30 | 北京筑龙信息技术有限责任公司 | Surrounding string mark early warning analysis method and device, electronic equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070042684A (en) * | 2005-10-19 | 2007-04-24 | 유영상 | Generation method of pdf document by editing and merging documents from mutiple application |
CN101782852A (en) * | 2010-01-19 | 2010-07-21 | 西安华海医疗信息技术股份有限公司 | Method for extracting computer screen information for medical administration |
US20140082006A1 (en) * | 2012-09-14 | 2014-03-20 | FTI Consulting Inc. | Computer-Implemented System And Method For Identifying Near Duplicate Documents |
CN104699785A (en) * | 2015-03-10 | 2015-06-10 | 中国石油大学(华东) | Paper similarity detection method |
CN105701086A (en) * | 2016-01-13 | 2016-06-22 | 夏峰 | Method and system for detecting literature through sliding window |
CN106326197A (en) * | 2016-08-23 | 2017-01-11 | 达而观信息科技(上海)有限公司 | Method for fast detecting repeated copying texts |
CN106503929A (en) * | 2016-11-14 | 2017-03-15 | 西安交通大学 | A kind of method that intellectual analysis enclose mark and string bid behavior |
CN107239891A (en) * | 2017-05-26 | 2017-10-10 | 山东省科学院情报研究所 | A kind of bid checking method based on big data |
-
2018
- 2018-06-05 CN CN201810570904.6A patent/CN109034717A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070042684A (en) * | 2005-10-19 | 2007-04-24 | 유영상 | Generation method of pdf document by editing and merging documents from mutiple application |
CN101782852A (en) * | 2010-01-19 | 2010-07-21 | 西安华海医疗信息技术股份有限公司 | Method for extracting computer screen information for medical administration |
US20140082006A1 (en) * | 2012-09-14 | 2014-03-20 | FTI Consulting Inc. | Computer-Implemented System And Method For Identifying Near Duplicate Documents |
CN104699785A (en) * | 2015-03-10 | 2015-06-10 | 中国石油大学(华东) | Paper similarity detection method |
CN105701086A (en) * | 2016-01-13 | 2016-06-22 | 夏峰 | Method and system for detecting literature through sliding window |
CN106326197A (en) * | 2016-08-23 | 2017-01-11 | 达而观信息科技(上海)有限公司 | Method for fast detecting repeated copying texts |
CN106503929A (en) * | 2016-11-14 | 2017-03-15 | 西安交通大学 | A kind of method that intellectual analysis enclose mark and string bid behavior |
CN107239891A (en) * | 2017-05-26 | 2017-10-10 | 山东省科学院情报研究所 | A kind of bid checking method based on big data |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110046973A (en) * | 2019-04-17 | 2019-07-23 | 成都市审计局 | It is a kind of that mark string mark detection method is enclosed based on incidence relation big data analysis |
CN111091259A (en) * | 2019-09-20 | 2020-05-01 | 上海同在互联网科技有限公司 | Electronic bidding purchasing abnormal behavior identification method, system, equipment and storage medium |
CN111191903A (en) * | 2019-12-24 | 2020-05-22 | 中科金审(北京)科技有限公司 | Early warning method and device for monitoring bid document, server and storage medium |
CN111160445B (en) * | 2019-12-25 | 2023-06-16 | 中国建设银行股份有限公司 | Bid file similarity calculation method and device |
CN111160445A (en) * | 2019-12-25 | 2020-05-15 | 中国建设银行股份有限公司 | Bid document similarity calculation method and device |
CN113362122A (en) * | 2020-03-02 | 2021-09-07 | 贵州百年四面通科技有限公司 | Bidding transaction quotation processing method, device and system and storage medium |
CN111583000A (en) * | 2020-06-03 | 2020-08-25 | 南京鑫智链科技信息有限公司 | Method and device for identifying surrounding mark and string mark behaviors, computer equipment and storage medium |
CN111583000B (en) * | 2020-06-03 | 2022-07-19 | 南京鑫智链科技信息有限公司 | Method and device for identifying behavior of surrounding mark and string mark, computer equipment and storage medium |
CN112258303A (en) * | 2020-11-16 | 2021-01-22 | 北京筑龙信息技术有限责任公司 | Surrounding string mark early warning analysis method and device, electronic equipment and storage medium |
CN112258303B (en) * | 2020-11-16 | 2024-04-30 | 北京筑龙信息技术有限责任公司 | Surrounding string mark early warning analysis method and device, electronic equipment and storage medium |
CN112819565A (en) * | 2021-01-20 | 2021-05-18 | 南方电网深圳数字电网研究院有限公司 | Method and system for detecting surrounding mark string mark and storage medium |
CN112819565B (en) * | 2021-01-20 | 2023-08-08 | 南方电网数字平台科技(广东)有限公司 | Method, system and storage medium for detecting buoy string |
CN117172220A (en) * | 2023-11-02 | 2023-12-05 | 北京国电通网络技术有限公司 | Text similarity information generation method, device, equipment and computer readable medium |
CN117172220B (en) * | 2023-11-02 | 2024-02-02 | 北京国电通网络技术有限公司 | Text similarity information generation method, device, equipment and computer readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109034717A (en) | The method of mark string bid behavior is enclosed in a kind of identification bidding process | |
US6122635A (en) | Mapping compliance information into useable format | |
WO2020233374A1 (en) | Business platform cache strategy test method and apparatus | |
CN109191233B (en) | Second order-killing request processing method and device and storage medium | |
CN104036187B (en) | Method and system for determining computer virus types | |
CN111783818B (en) | Xgboost and DBSCAN-based accurate marketing method | |
CN105205618A (en) | Patent evaluation system | |
CN106250319A (en) | Static code scanning result treating method and apparatus | |
CN110795524A (en) | Main data mapping processing method and device, computer equipment and storage medium | |
CN106951743A (en) | A kind of software code infringement detection method | |
CN102521713B (en) | Data processing equipment and data processing method | |
CN110048899B (en) | Log detection method and device, terminal and server | |
CN104408544B (en) | Formula Parsing device and method | |
US20030204461A1 (en) | System for mapping financial disclosure data into compliance information | |
CN104572810A (en) | Method for carrying out operation processing on massive files by using bitmap | |
CN110688823B (en) | XML file verification method and device | |
CN116629988A (en) | Bid data processing method and device based on blockchain | |
CN106815290B (en) | Method and device for determining attribution of bank card based on graph mining | |
CN114595795B (en) | NFC tag source tracing data processing method | |
CN113703753B (en) | Method and device for product development and product development system | |
CN113240259B (en) | Rule policy group generation method and system and electronic equipment | |
CN114066331A (en) | Shareholder investment information acquisition method and device, electronic equipment and storage medium | |
CN109472457B (en) | Loan application online reviewing method and terminal equipment | |
CN114490929A (en) | Bidding information acquisition method and device, storage medium and terminal equipment | |
CN112416361A (en) | Structured query language script examination method and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |