CN111625699A - Internet weak credible data verification method based on intelligent outbound - Google Patents

Internet weak credible data verification method based on intelligent outbound Download PDF

Info

Publication number
CN111625699A
CN111625699A CN202010253068.6A CN202010253068A CN111625699A CN 111625699 A CN111625699 A CN 111625699A CN 202010253068 A CN202010253068 A CN 202010253068A CN 111625699 A CN111625699 A CN 111625699A
Authority
CN
China
Prior art keywords
product
commodity
entity
information
entity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010253068.6A
Other languages
Chinese (zh)
Inventor
徐梦婷
鲍韵
熊建英
李华康
孙国梓
孔令军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Journal Of Jiangxi Public Security College
Nanjing University of Posts and Telecommunications
Original Assignee
Journal Of Jiangxi Public Security College
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Journal Of Jiangxi Public Security College, Nanjing University of Posts and Telecommunications filed Critical Journal Of Jiangxi Public Security College
Priority to CN202010253068.6A priority Critical patent/CN111625699A/en
Publication of CN111625699A publication Critical patent/CN111625699A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0631Item recommendations

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Databases & Information Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an internet weak credible data verification method based on intelligent outbound, which comprises the following steps: web crawlers, commodity/product entity analysis, dialect generation, intelligent outbound and recommendation list generation; (1) crawling product/commodity information through a web crawler tool; (2) generating commodity/product entity information according to the product/commodity information, and marking entity information attributes; (3) presetting a dialect template, generating a dialect by combining the template according to the attributes of the product/commodity entity information analyzed in the step 2, and establishing a mapping relation between the dialect and each attribute of the entity information; (4) interacting with the user based on the generated dialogs, acquiring the dialog of the user and matching the dialog with each attribute of the product/commodity entity information according to the intention of the user; (5) and storing the product/commodity entity information matched with the user intention into a recommendation table. The invention realizes true and false verification by intelligent voice outbound technology and intelligent dialogue, and reduces a great deal of labor.

Description

Internet weak credible data verification method based on intelligent outbound
Technical Field
The invention relates to an internet weak credible data verification method based on intelligent outbound.
Background
The rapid development of the internet brings massive data to people, people can obtain a large amount of information of commodities/products issued by merchants on the internet, however, the information issued on the internet is true and false, people can not recognize the information, and the selection is also an extremely difficult thing in the presence of a large amount of information. In addition, quality control and supervision on the internet also presents a significant challenge due to the large amount of information on the internet.
Aiming at the problems, the invention provides an internet weak credible data verification method based on intelligent outbound. The method can reduce the labor cost, and screen out the required result according to the result by calling, thereby reducing the working magnitude of quality inspection and quality monitoring. And the credible result can be recommended to the user, so that the user can select more conveniently.
Disclosure of Invention
The purpose of the invention is as follows: in order to overcome the defects of the prior art, the invention provides the internet weak credible data verification method based on the intelligent outbound, which can effectively verify the commodity/product information.
The technical scheme is as follows: the invention provides an internet weak credible data verification method based on intelligent outbound, which sequentially comprises the following steps: web crawlers, commodity/product entity analysis, dialect generation, intelligent outbound and recommendation list generation;
(1) the method comprises the steps that product/commodity information issued by a merchant on the network is crawled through a web crawler tool;
(2) analyzing the commodity/product information according to the product/commodity information obtained in the step 1 to generate commodity/product entity information and mark the attribute of the entity information;
(3) presetting a dialect template, generating a dialect according to the attribute of the product/commodity entity information analyzed in the step 2 and the template, and establishing a mapping relation between the dialect and each attribute of the entity information;
(4) interacting with the user based on the generated dialogs, acquiring the dialog of the user and matching the dialog with each attribute of the product/commodity entity information according to the intention of the user;
(5) and storing the product/commodity entity information matched with the user intention into a recommendation table.
The step (2) of obtaining the product/commodity entity information specifically includes performing entity identification on the obtained data information by using an entity identification algorithm to obtain the product/commodity entity information.
And (3) the template in the step (2) is a dialect framework based on a product/commodity application scene to form a dialect of multiple rounds of dialogues.
And interacting with the user based on the generated dialogs, acquiring the dialogs of the user, identifying intentions, entering the corresponding dialogs according to a dialogs framework, and recording the dialog path of the user.
And matching the obtained conversation path with each attribute of the product/commodity entity information, and arranging the credibility of the commodities according to the matching degree.
Has the advantages that: the invention discloses a flow of an internet weak credible data verification method based on intelligent outbound, which has the following advantages:
1. the invention uses intelligent dialogue to realize true and false check through intelligent voice call-out technology, and reduces a large amount of labor;
2. the method comprises the steps of acquiring commodity/product information, analyzing the product/commodity information to obtain entity information, establishing dialogues according to different attributes of the entity information, interacting with users based on the generated dialogues, and recording user conversation paths to enable the user conversation paths to be matched with the attributes of the product/commodity entity information, wherein the matching degree is high, and the credibility is higher; the accuracy of recommending products is improved.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The technical scheme of the invention is further explained in detail by combining the attached drawings:
fig. 1 shows an internet credible data verification method based on intelligent outbound, which includes the following contents
100) And (5) web crawlers. Crawling of internet data is performed through a web crawler by taking crawling of the information of residents and residents as an example;
200) product/commodity entity. Carrying out entity identification on the data crawled through 100), carrying out entity identification on the obtained data through a white list, regular matching or an entity identification algorithm, generating commodity/product entity information, marking the attribute of the entity information, and obtaining main attribute information such as a resident name, a resident address, a contact phone and the like;
300) generating dialogs. Forming a dialect of a plurality of rounds of conversations according to a pre-edited people knowledge frame, thereby obtaining more entity information of the people, including entity information attributes such as styles, rental conditions, prices and the like, establishing a mapping relation between the dialect and each attribute of the entity information, and synthesizing the entity information obtained from 200) into a complete dialect.
400) And (4) intelligently calling out. Using 300), interacting with the user, acquiring the conversation of the user and identifying the intention, thereby entering the corresponding conversation, and recording the conversation path of the user, namely which one is in each round of entering branches.
500) A list of recommendations. Matching the conversation path obtained in 400) with each attribute of the product/commodity entity information, and ranking the credibility of the commodities according to the matching degree.
600) Weak trust/trust. According to the requirements, the commodity with the smallest top 5 or top 10 is given as weak credible recommendation; the top 5 or top 10 largest item is given as a trusted recommendation.
The above description is only an embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can understand that the modifications or substitutions within the technical scope of the present invention are included in the scope of the present invention, and therefore, the scope of the present invention should be subject to the protection scope of the claims.

Claims (6)

1. An internet weak credible data verification method based on intelligent outbound is characterized in that: the method comprises the following steps of: web crawlers, commodity/product entity analysis, dialect generation, intelligent outbound and recommendation list generation;
(1) the method comprises the steps that product/commodity information issued by a merchant on the network is crawled through a web crawler tool;
(2) analyzing the commodity/product information according to the product/commodity information obtained in the step 1 to generate commodity/product entity information and mark the attribute of the entity information;
(3) presetting a dialect template, generating a dialect by combining the template according to the attributes of the product/commodity entity information analyzed in the step 2, and establishing a mapping relation between the dialect and each attribute of the entity information;
(4) interacting with the user based on the generated dialogs, acquiring the dialog of the user and matching the dialog with each attribute of the product/commodity entity information according to the intention of the user;
(5) and storing the product/commodity entity information matched with the user intention into a recommendation table.
2. The internet weak credible data verification method based on intelligent outbound as claimed in claim 1, characterized in that: the step (2) of obtaining the product/commodity entity information specifically includes performing entity identification on the obtained data information by using an entity identification algorithm to obtain the product/commodity entity information.
3. The internet weak credible data verification method based on intelligent outbound as claimed in claim 2, characterized in that: the using entity recognition algorithm uses an entity recognition algorithm in natural language processing.
4. The internet weak credible data verification method based on intelligent outbound as claimed in claim 1, characterized in that: and (3) the template in the step (2) is a dialect framework based on a product/commodity application scene to form a dialect of multiple rounds of dialogues.
5. The method for verifying internet weak credible data based on intelligent outbound as claimed in claim 1 or 4, wherein: and interacting with the user based on the generated dialogs, acquiring the dialogs of the user, identifying intentions, entering the corresponding dialogs according to a dialogs framework, and recording the dialog path of the user.
6. The method for verifying internet weak credible data based on intelligent outbound as claimed in claim 1 or 5, wherein: and matching the obtained conversation path with each attribute of the product/commodity entity information, and arranging the credibility of the commodities according to the matching degree.
CN202010253068.6A 2020-04-02 2020-04-02 Internet weak credible data verification method based on intelligent outbound Pending CN111625699A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010253068.6A CN111625699A (en) 2020-04-02 2020-04-02 Internet weak credible data verification method based on intelligent outbound

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010253068.6A CN111625699A (en) 2020-04-02 2020-04-02 Internet weak credible data verification method based on intelligent outbound

Publications (1)

Publication Number Publication Date
CN111625699A true CN111625699A (en) 2020-09-04

Family

ID=72272586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010253068.6A Pending CN111625699A (en) 2020-04-02 2020-04-02 Internet weak credible data verification method based on intelligent outbound

Country Status (1)

Country Link
CN (1) CN111625699A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110298770A (en) * 2019-06-25 2019-10-01 四川长虹电器股份有限公司 A kind of recipe recommendation system
CN110555100A (en) * 2019-09-06 2019-12-10 北京讯鸟软件有限公司 Multi-product demand matching method and system based on graph generation free dialogue
CN110688454A (en) * 2019-09-09 2020-01-14 深圳壹账通智能科技有限公司 Method, device, equipment and storage medium for processing consultation conversation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110298770A (en) * 2019-06-25 2019-10-01 四川长虹电器股份有限公司 A kind of recipe recommendation system
CN110555100A (en) * 2019-09-06 2019-12-10 北京讯鸟软件有限公司 Multi-product demand matching method and system based on graph generation free dialogue
CN110688454A (en) * 2019-09-09 2020-01-14 深圳壹账通智能科技有限公司 Method, device, equipment and storage medium for processing consultation conversation

Similar Documents

Publication Publication Date Title
WO2020253358A1 (en) Service data risk control analysis processing method, apparatus and computer device
KR102169868B1 (en) Chatting robot system and service method thereof
CN112804400A (en) Customer service call voice quality inspection method and device, electronic equipment and storage medium
CN107590224B (en) Big data based user preference analysis method and device
CN107705807A (en) Voice quality detecting method, device, equipment and storage medium based on Emotion identification
CN106874467A (en) Method and apparatus for providing Search Results
CN110110038B (en) Telephone traffic prediction method, device, server and storage medium
CN110688454A (en) Method, device, equipment and storage medium for processing consultation conversation
CN107357787A (en) Semantic interaction method, apparatus and electronic equipment
CN109087205A (en) Prediction technique and device, the computer equipment and readable storage medium storing program for executing of public opinion index
KR20200092499A (en) Method and apparatus for counseling support using interactive artificial intelligence technology
CN107093164A (en) Method and apparatus for generating image
CN107832720A (en) information processing method and device based on artificial intelligence
US11790012B2 (en) System and method for tagging data
CN114841128B (en) Business interaction method, device, equipment, medium and product based on artificial intelligence
CN107291774A (en) Error sample recognition methods and device
US20210049303A1 (en) Information processing apparatus and information processing method, and program
Kousik et al. An E-Commerce Product Feedback Review Using Sentimental Analysis
CN109710890B (en) Method and system for identifying false material in real time based on constructed behavior portrait model
US10446138B2 (en) System and method for assessing audio files for transcription services
US20200356725A1 (en) System and method for automatically tagging customer messages using artificial intelligence models
Kumar et al. Sentimental analysis (opinion mining) in social network by using SVM algorithm
KR20160142949A (en) Emotion analysis apparatus for the contact center and method thereof
CN117131179A (en) Dialogue processing method and device, storage medium and electronic equipment
CN111625699A (en) Internet weak credible data verification method based on intelligent outbound

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 210003 Gulou District, Jiangsu, Nanjing new model road, No. 66

Applicant after: NANJING University OF POSTS AND TELECOMMUNICATIONS

Applicant after: JOURNAL OF JIANGXI PUBLIC SECURITY College

Address before: Yuen Road Qixia District of Nanjing City, Jiangsu Province, No. 9 210000

Applicant before: NANJING University OF POSTS AND TELECOMMUNICATIONS

Applicant before: JOURNAL OF JIANGXI PUBLIC SECURITY College

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200904