Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
FIG. 1 illustrates a schematic diagram of a processing system 100 for merchandise evaluation according to some embodiments of the present disclosure.
As introduced above, on a merchandise sales platform, a user can evaluate purchased merchandise, with the dimensions of evaluation including the packaging, appearance, performance, cost/performance, etc. of the merchandise. In one embodiment, the merchandise evaluation published by the user at least comprises characters, images and scores, and of course, videos, motion pictures and the like can be provided. The user may also post more than one item rating for one item he or she has purchased. This disclosure is not to be unduly limited thereby.
As shown in fig. 1, a processing system 100 for merchandise evaluation includes: a credibility determination unit 110, a user weight value determination unit 120, and a score calculation unit 130.
The credibility determination unit 110 determines a credible commodity evaluation from the historical evaluations for the commodities. Considering that there may be a situation of water force credit in the commodity evaluation, the credibility determining unit 110 assists to manually check the authenticity of the commodity evaluation content based on a computer artificial intelligence algorithm to select a credible commodity evaluation as an effective commodity evaluation.
In one embodiment, whether the merchandise evaluation is credible is judged from the following aspects:
(1) whether the content of commodity evaluation is abnormal or not;
(2) the user who submits the commodity evaluation whether the abnormal behavior exists;
according to one embodiment, when the content (such as characters and images) of the commodity evaluation has plagiarism, the content of the commodity evaluation is considered to be abnormal. When a user has multiple user accounts at the same time in a period of time, or when a user switches different user accounts on a device, the user is determined to have abnormal behaviors.
Further, if there is no abnormality in the content of the commodity evaluation and no abnormality in the user behavior, the commodity evaluation is determined to be a credible commodity evaluation. A subsequent step of calculating a score may be involved.
For a credible commodity evaluation, the user weight value of the user who issued the commodity evaluation is determined by the user weight value determination unit 120. In one embodiment, the weight value of the user is related to the duration of time the user owns the item.
The score calculating unit 130 is used to calculate the score of the goods. Specifically, the total score of the commodity is determined based on the user weight value of each user and the score in the commodity evaluation corresponding to the user weight value. Meanwhile, the commodity evaluation number is determined based on the user weight value of each user and the corresponding commodity evaluation number. Then, based on the total score and the number of evaluations of the item, the score of the item is determined.
The system 100 may be disposed on a computing device through which the processing of the merchandise's evaluations is accomplished. A detailed description will be given below regarding a specific execution flow of each unit in the system 100.
Fig. 2 is a block diagram of an exemplary computing device 200.
As shown in FIG. 2, in a basic configuration 202, a computing device 200 typically includes a system memory 206 and one or more processors 204. A memory bus 208 may be used for communication between the processor 204 and the system memory 206.
Depending on the desired configuration, the processor 204 may be any type of processing, including but not limited to: a microprocessor (μ P), a microcontroller (μ C), a Digital Signal Processor (DSP), or any combination thereof. The processor 204 may include one or more levels of cache, such as a level one cache 210 and a level two cache 212, a processor core 214, and registers 216. Example processor cores 214 may include Arithmetic Logic Units (ALUs), Floating Point Units (FPUs), digital signal processing cores (DSP cores), or any combination thereof. The example memory controller 218 may be used with the processor 204, or in some implementations the memory controller 218 may be an internal part of the processor 204.
Depending on the desired configuration, system memory 206 may be any type of memory, including but not limited to: volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.), or any combination thereof. The physical memory in the computing device is usually referred to as a volatile memory RAM, and data in the disk needs to be loaded into the physical memory to be read by the processor 204. System memory 206 may include an operating system 220, one or more applications 222, and program data 224. In some implementations, the application 222 can be arranged to execute instructions on the operating system with the program data 224 by the one or more processors 204. Operating system 220 may be, for example, Linux, Windows, or the like, which includes program instructions for handling basic system services and for performing hardware-dependent tasks. The application 222 includes program instructions for implementing various user-desired functions, and the application 222 may be, for example, but not limited to, a browser, instant messenger, a software development tool (e.g., an integrated development environment IDE, a compiler, etc.), and the like. When the application 222 is installed into the computing device 200, a driver module may be added to the operating system 220.
When the computing device 200 is started, the processor 204 reads program instructions of the operating system 220 from the memory 206 and executes them. Applications 222 run on top of operating system 220, utilizing the interface provided by operating system 220 and the underlying hardware to implement various user-desired functions. When the user starts the application 222, the application 222 is loaded into the memory 206, and the processor 204 reads the program instructions of the application 222 from the memory 206 and executes the program instructions.
Computing device 200 also includes storage 232, storage 232 including removable storage 236 and non-removable storage 238, each of removable storage 236 and non-removable storage 238 being connected to storage interface bus 234.
Computing device 200 may also include an interface bus 240 that facilitates communication from various interface devices (e.g., output devices 242, peripheral interfaces 244, and communication devices 246) to the basic configuration 202 via the bus/interface controller 230. The example output device 242 includes a graphics processing unit 248 and an audio processing unit 250. They may be configured to facilitate communication with various external devices, such as a display 253 or speakers, via one or more a/V ports 252. Example peripheral interfaces 244 can include a serial interface controller 254 and a parallel interface controller 256, which can be configured to facilitate communications with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device) or other peripherals (e.g., printer, scanner, etc.) via one or more I/O ports 258. An example communication device 246 may include a network controller 260, which may be arranged to facilitate communications with one or more other computing devices 262 over a network communication link via one or more communication ports 264.
A network communication link may be one example of a communication medium. Communication media may typically be embodied by computer readable instructions, data structures, program modules, and may include any information delivery media, such as carrier waves or other transport mechanisms, in a modulated data signal. A "modulated data signal" may be a signal that has one or more of its data set or its changes made in such a manner as to encode information in the signal. By way of non-limiting example, communication media may include wired media such as a wired network or private-wired network, and various wireless media such as acoustic, Radio Frequency (RF), microwave, Infrared (IR), or other wireless media. The term computer readable media as used herein may include both storage media and communication media.
The computing device 200 also includes a storage interface bus 234 coupled to the bus/interface controller 230. The storage interface bus 234 is coupled to the storage device 232, and the storage device 232 is adapted for data storage. The example storage device 232 may include removable storage 236 (e.g., CD, DVD, U-disk, removable hard disk, etc.) and non-removable storage 238 (e.g., hard disk drive, HDD, etc.).
In the computing device 200 according to the present disclosure, the application 222 includes instructions for executing the processing method for merchandise evaluation of the present disclosure. More specifically, instructions are included for performing the method 300 for determining an assessment credibility of a good, and/or the method 400 for assessing a good based on historical assessments. The instructions may instruct the processor 204 to perform the methods of the present disclosure.
For convenience of description, the following describes the process of the computing device 200 performing the above method in conjunction with the system 100 by taking a commercial product as an example.
As previously described, a good rating is a rating published by a user for at least one dimension of the good he or she purchases. According to the embodiment of the disclosure, a user issues commodity evaluations for 8 dimensions of an automobile, specifically: space, power, control, oil consumption, travelling comfort, outward appearance, interior trim, price/performance ratio. And the user gives the evaluation of characters, images and scores for each dimension. Of course, the user may also give a text and/or image rating for each dimension and give a total score rating. The present disclosure is not so limited.
FIG. 3 illustrates a flow diagram of a method 300 of determining the trustworthiness of an item rating in accordance with some embodiments of the present disclosure. As shown in fig. 3, the method 300 begins at step S310.
In step S310, a determination is made based on the entire text of the product evaluation. It can be performed in two steps.
First, in step S312, fingerprints of all characters in the product evaluation are calculated.
According to one embodiment, the words in the merchandise evaluation are hashed to extract the fingerprint of the merchandise evaluation.
Thereafter, in step S314, it is determined whether or not all the character contents of the product evaluation are abnormal based on the fingerprint.
According to one embodiment, the similarity calculation is performed on the extracted fingerprint and the pre-stored article fingerprint respectively to generate a similarity value of the commodity evaluation. If the similarity value is greater than the threshold value, all characters of the commodity evaluation can be determined to be abnormal (namely, the character content is plagiarism). Otherwise, determining that the whole character in the commodity evaluation is not abnormal.
In one embodiment according to the present disclosure, all textual content in the merchandise rating is extracted as one text. And performing SimHash calculation on the text to obtain a SimHash value as a fingerprint of the commodity evaluation. The SimHash value is then stored in the MySql data sheet and in the Faiss (facebook AI Similarity search). The hamming distance (in the information coding, the number of coded different bits on the corresponding bits of two legal codes is called code distance, also called hamming distance) is calculated through the SimHash value of the article stored in the Faiss (namely the pre-stored article fingerprint), and the similarity and the duplication of the text can be judged. The higher the similarity value, the greater the likelihood that the text is considered to be plagiarism.
Alternatively, the pre-stored articles may be text in the merchandise's evaluation from within or outside the sales platform, without limitation.
Considering that in the plagiarism evaluation, the whole plagiarism may not be, but different dimensionality contents are selected from different 8 or several commodity evaluations respectively for plagiarism, and one commodity evaluation is obtained through 'east spelling and western hashing'. For example, "spatial" dimensional content is copied from the commercial offer a, "kinetic" dimensional content is copied from the commercial offer B, "appearance" dimensional content is copied from the commercial offer C, and "fuel consumption" dimensional content is copied from the commercial offer D.
Therefore, if it is confirmed that the entire text of the product evaluation is not abnormal, it is necessary to perform determination based on the text of each dimension in the product evaluation in step S320. The same is performed in two steps.
In step S322, an index value is calculated for each product evaluation of each dimension. Specifically, hash index values of characters in the commodity evaluation of each dimension are calculated.
In step S324, it is determined whether or not a part of the characters evaluated for the product is abnormal based on each index value. Specifically, for the hash index value of each dimension, it is detected whether or not there is a hash index value that coincides with the calculated hash index value of the corresponding dimension from among the pre-stored hash index values. If yes, determining that part of characters evaluated by the commodity are abnormal. Otherwise, the part of characters evaluated by the commodity is determined to be not abnormal.
According to an embodiment of the disclosure, when the commodity evaluation data is stored, a plurality of fields are designed corresponding to each dimension, for example, 8 fields are set corresponding to 8 dimensions of automobile evaluation, so as to respectively store the data of the 8 dimensions. Then, adding a field for each dimension field for storing the Hash index value of the corresponding dimension content. The Hash index can be generated by using the CHECKSUM function in SQL Server, and the disclosure can be generated by using the crc64 function or the crc32 function in MySql database without limitation. And then, commodity evaluations with the same dimensionality content can be quickly found out through the Hash index values, so that the plagiarized commodity evaluation can be accurately identified.
Considering that when the crc64 and the cheksum function generate Hash index values, any character is different, and the generated Hash index results are different, if it is detected that the contents of a dimension are the same, the contents of the dimension can be determined to be plagiarism by 100%. Since it is not possible for the user to write a punctuation mark poorly if he or she writes it by himself. Thus, in some embodiments, the item rating is determined to be anomalous as long as there is a consistent hash index value for any dimension of the hash index value. Of course, for the sake of safety, in other embodiments, the setting condition is also relaxed, and if the hash index values of 2 dimensions and more have the same hash index value, it is considered to be plagiarism, and then it is determined that the commodity evaluation is abnormal.
If it is confirmed that there is no abnormality in part of the characters of the product evaluation, in the subsequent step S330, a determination is made based on the image under product evaluation. It is performed in two steps.
In step S332, a hash value of the image under evaluation of the product is calculated. In one embodiment, the unique hash value of the image may be generated by any of the 3 checking algorithms CRC (32/64), MD5, SHA 1.
In step S334, it is determined whether or not the image evaluated for the product is abnormal based on the hash value of the image.
According to one embodiment, a hash value is generated for an image in the evaluation of a good from within or outside the sales platform and stored in a data table as a pre-stored hash value. In this way, for the commodity evaluation newly issued by the user, the hash value of the image in the commodity evaluation is calculated and compared with the prestored hash value, and if the same hash value exists, the image in the commodity evaluation is determined to be abnormal.
According to the embodiment of the disclosure, more than one image may exist in one commodity evaluation, and the hash value may be calculated for each image and compared with the pre-stored hash value. If the same hash value is compared, the image in the commodity evaluation is considered to be abnormal. On the contrary, if the hash values are not the same, it is determined that there is no abnormality in the image under the commodity evaluation.
If it is confirmed that the image of the product evaluation is not abnormal, in the subsequent step S340, it is determined whether the behavior of the user is abnormal based on at least the user account when the user issued the product evaluation.
According to one embodiment, a user device identification is obtained in response to an access operation by a user. When a user issues commodity evaluation, the user needs to log in, a user account of the user is obtained, and the user equipment identification is associated with the user account. And when the user equipment identification corresponds to more than one user account, confirming that the behavior of the user is abnormal. Otherwise, if the user equipment identifier only corresponds to one user account, it is determined that the user behavior is not abnormal.
Wherein the user equipment identity comprises: at least one of a session identification, an International Mobile Equipment Identity (IMEI).
Taking the PC side and the M side as an example, when a user opens a web page of the platform for the first time, the js code of the page asynchronously requests the server interface to generate a unique sessionId (session identifier) for the web page, and the sessionId is stored in a cookie of the browser. The session identity will not change as long as the user is using the same browser of the same device. Generally, a "water force" has a plurality of user accounts, and identity switching and identity hiding are realized by switching different accounts. Then, if the user issues multiple merchandise evaluations by switching the user account, it can be found that the user corresponds to more than one user account by using the sessionId. Usually, the computer and the mobile device are private and cannot be shared by a plurality of people, so that the abnormal behavior of the user can be confirmed, and the evaluation of the commodity is further judged to be unreliable.
In some embodiments, to prevent extreme situations where the user does have a situation such as reselling a used computer, a determination of publication time is added when a different user is determined to publish an item evaluation under sessionId. That is, when the ue identifier corresponds to more than one user account, if the ue identifier corresponds to more than one user account within a predetermined time period (typically 60 days), it is determined that the behavior of the user is abnormal.
Taking APP as an example, IMEI is used to identify mobile communication devices such as each independent mobile phone in a mobile phone network, and is equivalent to an identity card of a mobile phone. The IMEI is unique to each mobile device. Mobile devices (such as cell phones) are also private and cannot be shared with multiple people. Referring to the description about the session identifier, the water force is on the same device, and the user account is switched to issue multiple commodity comments, so that the behavior abnormality of the user can be accurately identified and confirmed, and further the evaluation of the commodity is determined to be unreliable.
According to another embodiment, a first area to which an IP address belongs when a user registers a user account, a second area to which the IP address belongs when the user issues commodity evaluation, and a third area to which the user account belongs are obtained; and judging whether the first area, the second area and the third area are consistent. If the three are consistent, the user behavior is confirmed to be abnormal. Otherwise, if the three are not consistent, the user behavior is determined to be abnormal.
The third area to which the user account belongs can be determined by the attribution of the mobile phone number bound to the user account. Further, the first region, the second region, and the third region may be accurate to province.
Particularly, if the first area, the second area and the third area are not consistent, the user account is determined as a high-risk account, and the behavior of the user is further analyzed. According to one embodiment, user behavior is analyzed from the following aspects: the frequency of recent (e.g., within 30 days) access to the platform and APP, the separation between the time the item rating was published and the time the user account was registered, the length of time it took to fill in the item rating, and the number of stickings during the filling process, etc., are not limited to these. If the access frequency of the user is 0 within 30 days, and/or the number of days between the registration time and the publication time is very small (such as 1-5 days), and/or the duration for filling the commodity evaluation is very short (such as 1 minute), and/or the number of pasting times in the filling process is too large (such as 10 times), the user behavior abnormality can be confirmed.
If it is confirmed that there is no abnormality in the behavior of the user, in the subsequent step S350, it is confirmed that the product evaluation is authentic. And otherwise, if the user behavior is confirmed to be abnormal, confirming that the commodity evaluation is not credible.
It should be noted that the present disclosure does not limit the execution order of the above steps. In other words, based on the description of the present disclosure, when determining whether the product evaluation is authentic, the execution order of step S310, step S320, step S330 and step S340 may be changed arbitrarily, and is not listed here.
Of course, when determining whether the product evaluation is authentic, according to the embodiment of the present disclosure, it may be determined whether the product corresponding to the product evaluation is a product on sale. In some scenarios, the same item may have multiple models, and some of the models may have been sold off. Taking an automobile as an example, the problem of the vehicle type of the stop sale may already be solved in the newly produced vehicle type, and if the vehicle type of the stop sale participates in the calculation, the solution and the improvement of the newly produced vehicle type to the problem cannot be reflected.
According to the method 300 of the present disclosure, a trusted commodity rating is determined through analysis of the contents of the commodity rating and analysis of the user's behavior. Specifically, when the content of the product evaluation is analyzed, whether or not there is abnormal content (i.e., plagiarism content) is detected from 3 perspectives of all characters, characters of each part, images, and the like in the product evaluation. When the commodity evaluation includes the plagiarism content (whether the whole plagiarism, the partial plagiarism or the image plagiarism), the commodity evaluation is considered to be invalid, i.e., the commodity evaluation is not credible. When the user behavior is analyzed, on one hand, whether the user behavior is abnormal or not is judged by comparing a user equipment identifier generated when the user accesses and a user account generated when the user logs in; on the other hand, whether the user behavior is abnormal or not is judged by comparing the corresponding attribution areas of the user during the behaviors of registration, login, publication and the like. When the user behavior is abnormal, the commodity evaluation correspondingly published by the user is considered to be not credible.
FIG. 4 illustrates a flow diagram of a method 400 of evaluating a good based on historical ratings according to some embodiments of the present disclosure. As shown in fig. 4, the method 400 begins at step S410.
In step S410, a credible commodity evaluation is determined from the historical evaluations for commodities.
According to one embodiment, the credibility of the commodity evaluation is judged through processing characters and images in the commodity evaluation and analyzing user behaviors for issuing the commodity evaluation. This may be accomplished by performing the method 300 described previously. And will not be described in detail herein.
According to another embodiment, if the publisher of the merchandise evaluation is an authenticated user, such as an authenticated owner (the authenticated owner can determine by examining and verifying information related to vehicle data, such as vehicle purchase invoice, group photo, driving license, etc.), the merchandise evaluation is deemed to be highly authentic. The present disclosure is not so limited.
Subsequently, in step S420, for the credible commodity evaluation, a user weight value is determined, wherein the user weight value is related to the time period for which the user owns the commodity.
According to one embodiment, the length of time from the time the user purchased the item to the time the user published the item rating for the item is determined as the length of time the user owns the item. Generally, the evaluation of a commodity by a user varies with the length of time the user has the commodity. Therefore, different user weight values are set for different durations of time of owning the goods. Typically, the time at which the user purchased the item is filled in when the user published the item rating.
Taking an automobile as an example, the time for a user to own the automobile is referred to as the automobile congestion time. The applicant finds in research that users within 1 month of a car holding period are generally not familiar with and understand new cars enough, so the credibility of the user group is relatively low, and in addition, the vehicles are still in a break-in period, and parts are easy to fail in the break-in period, such as the faults of the parts, such as jamming, heating, infiltration and the like, and the oil consumption is high, so the user weight value in the period needs to be reduced. In the congestion period of 4-10 months, the user is familiar with the vehicle and the vehicle passes the break-in period, so that the weight value of the user is the highest value of 1. When the vehicle congestion period reaches 25 months or more, the quality guarantee period of a plurality of parts of the vehicle usually passes or the service life of the parts of the vehicle is close to, faults are increased, and users may emotionally score the vehicle low, so that the user credibility in the time period is relatively low, and the user weight value in the time period is reduced.
According to one embodiment of the present disclosure, the user weight values used are shown in the following table.
TABLE 1 user weight values corresponding to different congestion periods
Congestion period (moon)
|
Corresponding number of days
|
User weight value
|
Within 1 month
|
<30 days after
|
0.5
|
2-3 months
|
31-60 days
|
0.8
|
4-10 months
|
61-300 days
|
1
|
11-12 months
|
301-365 days
|
0.9
|
13-24 months
|
366-
|
0.8
|
25 months and above
|
>=731
|
0.6 |
In subsequent steps S430 to S450, a score of the item is determined based on the credible item evaluation. In one embodiment, the commodity evaluation comprises a point value given to the commodity by the user. If the user gives scores for 8 dimensions of the vehicle, the average score of the 8 dimensions can be calculated as the score of the commodity evaluation. The following steps S430 to S450 may be performed for the score of each dimension, and the score in the dimension is calculated; and taking the average value (or weighted average value) of the scores under all dimensions as the score of the commodity. The present disclosure is not so limited.
In step S430, a total score of the product is determined based on the user weight value and the corresponding score of each user.
The total score S can be represented by the following formula:
in the formula, wiRepresenting the user weight value, s, of the ith useriThe score given by the ith user is shown, and m shows the total number of users corresponding to the credible commodity evaluation aiming at the commodity.
Subsequently, in step S440, the number of product evaluations is determined based on the user weight value of each user and the number of corresponding product evaluations.
That is, according to the embodiment of the present disclosure, when counting the number of product evaluations of a certain product, all the product evaluations are not directly added
The commodity evaluation number N can be represented by the following formula:
in the formula, wiRepresents the user weight value, n, of the ith useriThe number of credible commodity evaluations issued by the ith user for the commodity is usually 1, and m represents the total number of users corresponding to the credible commodity evaluations for the commodity.
Subsequently, in step S450, a score of the item is determined based on the total score and the number of evaluations for the item.
In one embodiment, the total score, S, is divided by the number of evaluations, N, for the item to obtain a score for the item.
To further illustrate the process of calculating a score of the present disclosure, an example of the calculation is given below.
For a certain vehicle type, the scores for the appearance dimensions of 7 credible commodity evaluations are obtained after the processing of step S410. Respectively from 7 users. Table 2 shows the user's car-holding period, the number of evaluation items of the goods, and the corresponding scores.
TABLE 2
Congestion period (sky)
|
Number of evaluation items
|
Score the points
|
15
|
1
|
5
|
32
|
1
|
4
|
100
|
1
|
4
|
190
|
1
|
3
|
400
|
1
|
4
|
1500
|
1
|
3
|
2000
|
1
|
5 |
According to the method 400 of the present disclosure, the data in table 2 is processed as follows:
TABLE 3
Grading of appearance of the vehicle:
total score:
S=(5*0.50)+(4*0.80)+(4*1.00)+(3*1.00)+(4*0.80)+(3*0.60)+(5*0.60)=20.7,
evaluation number of commercial products:
N=(1*0.50)+(1*0.80)+(1*1.00)+(1*1.00)+(1*0.80)+(1*0.60)+(1*0.60))=5.3,
the score is 3.906.
If the method of directly taking the mean value is adopted, the score is as follows: (5+4+4+3+4+3+5)/7 ═ 4.0.
According to the method 400, the influence of the commodity evaluation on the time length of the commodity owned by the user is considered, and more specifically, the weight and the influence of the objective conditions of the user in the vehicle break-in period, the quality guarantee period and the like in the vehicle system score are reflected by setting different user weight values for different vehicle holding periods, so that the interference of the influences on the commodity evaluation is well solved.
In some embodiments, if the product includes at least two categories, the ratio of the number of product evaluations corresponding to the product of each category to the total number of product evaluations of the product is counted. Then, based on the commodity evaluation of each category of commodities, calculating the score of each category by executing the steps; and determining the final score of the commodity based on the scores and the proportions of the categories.
Also, taking an automobile as an example, the vehicle system is classified into a plurality of vehicle types, and the commodity evaluation is attributed to a specific vehicle type. At this time, for each vehicle type, the above-described steps S420 to S450 are performed, and the score of each vehicle type is determined. On the basis, the proportion of each vehicle type to all credible commodity evaluation quantities under the vehicle series is calculated according to the commodity evaluation quantities of each vehicle type, and finally the score of the vehicle series is obtained.
For example, there are 2 models below the maiden train, which are fashion type and lead type, respectively, and after the above steps are performed, a score of the fashion type is calculated to be 4.5, and a score of the lead type is calculated to be 5. Meanwhile, the number of credible commodities evaluated against fashion type is counted to be 99, and the number of credible commodities evaluated against lead type is counted to be 1. Then, the fashion type ratio is 99/100-0.99, and the top type ratio is 1/100-0.01.
Taking the proportion of each vehicle type as the weight, and calculating to obtain the score of the Meiteng train as follows:
4.5×0.99+5×0.01=4.505。
that is, the larger the number of commodity evaluations corresponding to a vehicle type is, the higher the contribution ratio of the commodity evaluations to the final score of the belonging vehicle series is.
According to the method 400 of the present disclosure, the influence of the product evaluation number corresponding to each category of the product on the product score is also considered, and the evaluation is taken as a weight to participate in the product score.
According to the scheme of the disclosure, a series of processes are performed on the commodity evaluation, invalid commodity evaluation (i.e., untrusted commodity evaluation) is deleted, and only authentic commodity evaluation is used to participate in the calculation of the commodity score. In addition, when the grade of the commodity is calculated, factors such as the time length of the commodity owned by the user and different commodity evaluation numbers corresponding to different types of commodities are considered, the influence on the grade of the commodity is obtained, and a more accurate and comprehensive grade of the commodity is obtained so as to help and guide the user to evaluate and select the commodity.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the disclosure may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the disclosure, various features of the disclosure are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various disclosed aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that is, the claimed disclosure requires more features than are expressly recited in each claim. Rather, as the following claims reflect, disclosed aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this disclosure.
Those skilled in the art will appreciate that the modules or units or components of the devices in the examples disclosed herein may be arranged in a device as described in this embodiment or alternatively may be located in one or more devices different from the devices in this example. The modules in the foregoing examples may be combined into one module or may be further divided into multiple sub-modules.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
The present disclosure also discloses:
a7 the method of a1, wherein the step of calculating an index value for each dimension of the product evaluation and determining whether or not a character of the product evaluation is abnormal based on the index value includes: respectively calculating hash index values of characters in commodity evaluation of each dimension; aiming at the hash index value of each dimension, detecting whether a hash index value consistent with the calculated hash index value of the corresponding dimension exists in the prestored hash index values; and if so, determining that the character of the commodity evaluation is abnormal.
B9, the method according to B8, wherein the commodity evaluation further comprises characters and images, and the step of screening out credible commodity evaluation from historical evaluation for commodities comprises: and judging whether the commodity evaluation is credible or not through processing characters and images in the commodity evaluation and analyzing the user behavior which issues the commodity evaluation.
B10, the method of B8 or 9, wherein the step of screening the historical valuations for the good for confidence comprises: by performing the method as described above, a trustworthy merchandise rating is determined.
B11, the method of any one of B8-10, further comprising the steps of: determining a length of time from a time when a user purchases the commodity to a time when a commodity evaluation for the commodity is issued as a time period for which the user owns the commodity; and setting different user weight values for different commodity owned durations.
B12, the method as set forth in B8, further comprising the steps of: if the commodity comprises at least two categories, respectively counting the proportion of the number of commodity evaluations corresponding to the commodities of each category to the total number of commodity evaluations of the commodity; calculating the grade of each category based on the commodity evaluation of the commodity of each category; and determining the grade of the commodity based on the grade and the proportion of each category.
Moreover, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the disclosure and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
Furthermore, some of the described embodiments are described herein as a method or combination of method elements that can be performed by a processor of a computer system or by other means of performing the described functions. A processor having the necessary instructions for carrying out the method or method elements thus forms a means for carrying out the method or method elements. Further, the elements of the apparatus embodiments described herein are examples of the following apparatus: the apparatus is used to implement the functions performed by the elements for the purposes of this disclosure.
As used herein, unless otherwise specified the use of the ordinal adjectives "first", "second", "third", etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
While the disclosure has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this description, will appreciate that other embodiments can be devised which do not depart from the scope of the disclosure as described herein. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the disclosed subject matter. Accordingly, many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the appended claims. The disclosure of the present disclosure is intended to be illustrative, but not limiting, of the scope of the disclosure, which is set forth in the following claims.