Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence of the functions performed by the devices, modules or units.
It is noted that references to "a" or "an" in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will appreciate that references to "one or more" are intended to be exemplary and not limiting unless the context clearly indicates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 illustrates a flow 100 of some embodiments of an information detection method according to the present disclosure. The information detection method comprises the following steps:
step 101, acquiring engineering project detection information and a first attribute information set corresponding to a target engineering service.
In some embodiments, an executing entity (e.g., a computing device) of the information detection method may obtain the engineering project detection information and the first attribute information set corresponding to the target engineering service through a wired connection manner or a wireless connection manner. The target engineering service may be an engineering service to be subjected to information detection. For example, the target project may be a concrete warehousing project or a building project, or may be an abstract auditing project. The engineering project detection information may be information to be detected in a target engineering service corresponding to the detection task. The detection task may be a task of detecting a target engineering service to find a problem. In practice, the above detection tasks may be handled as items. The engineering project detection information may include a project identifier, a sub-project information group, and a project attribute information set. The item identifier may be an identifier corresponding to the detection task. The project identification corresponds to the detection task one by one. The sub-project information in the sub-project information group may be to-be-detected information corresponding to the detection sub-task. The detection subtask may be a task obtained by disassembling the detection task according to steps. Each item attribute information in the set of item attribute information may include an item attribute name. The item attribute names correspond to the attributes one to one. The above attribute may be, but is not limited to, one of the following: department name, item number, item name, item occurrence time, and voucher number. The credential number may uniquely identify the credential. Each of the first attribute information sets may be used to characterize an attribute obtained from a preset data warehouse. The preset data warehouse may be a preset data warehouse including a part of attributes of the target engineering service. Each of the first attribute information in the first attribute information set may include a first attribute name and first source information. The first attribute name may be a name of an attribute to be detected acquired from a preset data warehouse. The first source information may be information corresponding to a data table and a column of the attribute in the data warehouse. The engineering project detection information and the first attribute information set corresponding to the target engineering service can be acquired through a preset data warehouse.
As an example, the detection task may be to detect whether there is error information in the target engineering service. The detection subtask may be to detect whether the certificate in the target engineering service is incorrect.
And 102, selecting the project attribute names different from the first attribute names included in the first attribute information set from the project attribute names included in the project attribute information set as residual attribute names, and obtaining residual attribute name groups.
In some embodiments, the execution subject may select, from the item attribute names included in the item attribute information set, an item attribute name different from each first attribute name included in the first attribute information set as a remaining attribute name, and obtain a remaining attribute name group. The difference between the item attribute name and each of the first attribute names included in the first attribute information set may be that the item attribute name is different from each of the first attribute names. The remaining attribute names in the remaining attribute name group may be names of attributes that are not obtained from the preset data warehouse.
And 103, acquiring a second attribute information set matched with the project identification and the residual attribute name group included in the project detection information from a preset data source.
In some embodiments, the execution subject may obtain, from a preset data source, a second attribute information set that matches the item identifier and the remaining attribute name group included in the engineering item detection information. The preset data source may include a database corresponding to each subsystem of the target engineering service. For example, the subsystem may be, but is not limited to, one of the following: a purchasing system and a warehouse management system. Each of the second attribute information sets may be used to characterize an attribute obtained from a predetermined data source. Each of the second attribute information in the second attribute information set includes a second attribute name and second source information. The second attribute name may be a name of an attribute to be detected (e.g., a credential type, credential detail information) acquired from a preset data source. The credential type may be a type of credential file. The above-described credential detail information may be used to characterize the credential. The second source information may be information corresponding to a data table and a column of the attribute in the preset data source. And acquiring a second attribute information set matched with the project identification and the residual attribute name group included in the project detection information from a preset data source in a database connection establishing mode.
And 104, determining each first attribute information in the first attribute information set and each second attribute information in the second attribute information set as target attribute information to obtain a target attribute information set.
In some embodiments, the execution subject may determine each first attribute information in the first attribute information set and each second attribute information in the second attribute information set as target attribute information, to obtain a target attribute information set. The target attribute information in the target attribute information set may be information of an attribute to be detected. The target attribute information in the target attribute information set includes a target attribute name and attribute source information. The target attribute name may be a name of an attribute to be detected. The attribute source information may be information of a data table and a list where the corresponding attribute is located.
And 105, extracting the target attribute information set based on the sub-project information group included in the engineering project detection information to obtain a target project information set.
In some embodiments, the execution subject may extract the target attribute information set based on a sub-item information group included in the engineering item detection information in various ways to obtain a target item information set. The target item information in the target item information set may be information of a detection type and an attribute corresponding to the detection subtask.
In some optional implementations of some embodiments, each piece of sub-item information in the sub-item information group includes a sub-item identifier, a sub-item attribute identifier group, and a detection type. The sub-item identifier may be an identifier corresponding to the detection sub-task. And the sub-item identifications correspond to the detection sub-tasks one by one. The sub-item attribute identifiers in the sub-item attribute identifier group may be identifiers of respective attributes corresponding to the detection subtask. The above detection types may be used to characterize the type of detection subtask. The detection type may be a suspicious screening type or a comprehensive analysis type. The above-mentioned type of suspect screening may be a type of detection subtask that detects credential detail information. The comprehensive analysis type may be a detection subtask for detecting each attribute according to the attribute value. The execution body may extract the target attribute information set based on a sub-project information group included in the project item detection information to obtain a target project information set by:
the first step, for each sub-item information in the sub-item information group, executing the following steps:
the first substep is to use the target attribute information matched with any sub-item attribute mark included in the sub-item information in the target attribute information set as sub-item attribute information to obtain a sub-item attribute information group. The matching with any sub-item attribute identifier included in the sub-item information may be that the attribute corresponding to the target attribute information is the same as the attribute corresponding to any sub-item attribute identifier. The sub-item attribute information in the sub-item attribute information group may be information corresponding to an attribute of the same detection sub-task.
And a second substep of determining the sub-item attribute information group and the sub-item identifier included in the sub-item information as target item information.
And 106, generating a sub-item attribute detection information set based on the target item information set.
In some embodiments, the execution subject may generate a sub-item property detection information set based on the target item information set in various ways. The sub-item attribute detection information in the sub-item attribute detection information set may be information of attribute values corresponding to respective attributes at a certain time.
In some optional implementations of some embodiments, the execution subject may generate a sub-item attribute detection information set based on the target item information set. For each item of target information in the set of item of target information, the following steps may be performed:
first, a detailed source information group is generated based on the sub-item attribute information group included in the target item information. The detail source information in the detail source information group may be used to characterize the storage location where the corresponding attribute and the attribute value are located. The storage location may be a location of a column corresponding to the attribute in the corresponding data table. For each sub-item attribute information in the sub-item attribute information group, the target attribute name and the attribute source information corresponding to the sub-item attribute information may be determined as the detail source information.
And secondly, selecting the sub-item attribute information meeting the preset attribute condition from the sub-item attribute information group included in the target item information as associated attribute information to obtain an associated attribute information set. The preset attribute condition may be that the attribute corresponding to the sub-item attribute information is a preset attribute. The preset attribute may include a department name and a matter number. The associated attribute information in the associated attribute information set may be used to characterize the attribute of the department name or the event number.
And thirdly, generating a sub-item attribute detection information set based on the associated attribute information set and the detail source information set. For each of the set of detailed source information, the following steps may be performed:
the first substep, confirm the above-mentioned associated attribute information set and above-mentioned detailed source information as the query condition information. The query condition information may be information of a query condition required for querying each attribute value.
And a second substep of generating sub-item attribute detection information based on the query condition information. The sub-item attribute detection information can be generated based on the query condition information by a database query method.
And step 107, controlling the display device to display the sub-item attribute detection information set for detecting information.
In some embodiments, the execution subject may control a display device to display the sub-item attribute detection information set for detection information. The display device may be a device with a display screen. The sub-item attribute detection information set can be displayed through the display equipment, so that detection personnel can perform query operation on the sub-item attribute detection information set to complete information detection.
Optionally, the executing body may further execute the following steps:
the method comprises the steps of responding to the fact that user login information aiming at preset detection interface information is received, and sending the preset detection interface information to a target terminal for a user to inquire. The preset detection interface information may include suspicious site screening tab information and comprehensive analysis tab information. The suspect screening tab page information may be used to characterize a tab page for detecting credential detail information. The comprehensive analysis tab information can be used for representing the tab for detecting each attribute according to the attribute value. The user login information may be information input by the user for logging in an interface corresponding to the preset detection interface information. The target terminal may be the display device.
And secondly, generating doubtful point summary information based on the doubtful point query information and the sub-item attribute detection information set in response to receiving doubtful point query information aiming at the doubtful point screening label page information, and sending the doubtful point summary information to the target terminal for viewing. The summarized suspicious node information may be information corresponding to the count of each suspicious node.
In some optional implementations of some embodiments, the above-mentioned suspicious query information may include detected department information and detection time information. The detected department information can be used for representing a department corresponding to the target engineering service. The detection time information can be used for representing the time period corresponding to the detection subtask. Each of the sub-item attribute detection information sets may include a department name, an event occurrence time, a voucher number, an item production value, an item consumption value, a voucher type, and voucher detail information. The project output value may be an added value to the target engineering business. The project consumption value may be a value of a reduction in the target engineering business. The credential type may include a picture type or a text type. The picture type can be used for representing the certificate as a file saved in a picture form. For example, the above-mentioned picture type certificate may be a JPEG (Joint Photographic Experts Group) file or a PDF (Portable Document Format) file in the form of a picture. The text types described above may be used to characterize the credential as a file that is stored in text form. For example, the text-type credential may be a PDF file in text form. The execution main body may generate the doubt summary information based on the doubt query information and the sub-item attribute detection information set:
and step one, selecting the sub-item attribute detection information matched with the suspicious point query information from the sub-item attribute detection information set as target attribute detection information to obtain a target attribute detection information set. The matching with the suspicious node query information may be: the department name included in the sub-item attribute detection information is the same as the detected department information included in the doubt query information, and the event occurrence time included in the sub-item attribute detection information is within the time period corresponding to the detection time information included in the doubt query information. The target attribute detection information in the target attribute detection information set can be used for representing inquired suspicious point information.
A second step of executing, for each target attribute detection information in the target attribute detection information set, the following steps:
and a first substep of performing image recognition on the certificate detail information corresponding to the target attribute detection information in response to determining that the certificate type corresponding to the target attribute detection information is a picture type, so as to obtain a target value and a value type. Wherein the target value may be the actual value displayed on the corresponding voucher. The value types may be used to characterize the actual value displayed on the corresponding voucher as either a project production value or a project consumption value. And image recognition can be carried out on the certificate detail information corresponding to the target attribute detection information through a preset image recognition method, so that the target value and the value type are obtained.
As an example, the preset image recognition method may include, but is not limited to, at least one of: an R-CNN (Region-based Convolutional Neural Networks) method, and an SSD (Single Shot multi box Detector) method.
And a second substep, in response to determining that the certificate type corresponding to the target attribute detection information is a text type, performing text recognition on the certificate detail information corresponding to the target attribute detection information to obtain a target value and a value type. And performing text recognition on the voucher detail information corresponding to the target attribute detection information by using a preset text recognition method to obtain a target value and a value type.
As an example, the preset text recognition method may include, but is not limited to, at least one of the following: an attention-based text recognition method and a transform-based text recognition method.
And a third substep, in response to the fact that the value type is determined to be a preset value type, matching the project output value corresponding to the target attribute detection information with the target value to obtain value matching information. The preset value type can be a value type representing that the real value displayed on the corresponding certificate is the project output value. First, it is determined whether the project output value corresponding to the target attribute detection information is the same as the target value. And then, if the project output value corresponding to the target attribute detection information is the same as the target value, determining a preset matching success identifier as value matching information. The preset matching success identifier can be used for representing the matching success. And finally, if the project output value corresponding to the target attribute detection information is different from the target value, determining a preset matching failure identifier as value matching information. The preset matching failure identifier can be used for representing matching failure.
And a fourth substep, in response to determining that the value type is not a preset value type, performing matching processing on the item consumption value and the target value corresponding to the target attribute detection information to obtain value matching information. First, it is determined whether the item consumption value corresponding to the target attribute detection information is the same as the target value. And then, if the item consumption value corresponding to the target attribute detection information is the same as the target value, determining a preset matching success identifier as value matching information. And finally, if the item consumption value corresponding to the target attribute detection information is different from the target value, determining a preset matching failure identifier as value matching information.
And a fifth substep of determining the target attribute detection information as first suspicious point information in response to the value matching information not meeting a preset matching condition. The preset matching condition may be that the value matching information is a preset matching success identifier. The first suspicious node information may be information of the screened suspicious nodes.
And thirdly, determining each piece of target attribute detection information which is different from each piece of determined first suspicious point information in the target attribute detection information set as a target attribute detection information group. The difference between the target attribute detection information and each piece of first doubt information determined may be that the target attribute detection information is different from each piece of first doubt information included in each piece of first doubt information. The target attribute detection information in the target attribute detection information group may be information of the same matter as the value information of the certificate display and the corresponding attribute information.
And fourthly, determining each certificate number included in the target attribute detection information group as a certificate number set. The credential number in the credential number set may be used to represent a credential whose value information is the same as the corresponding attribute information.
Fifthly, for each certificate number in the certificate number set, executing the following steps:
and a first substep of determining the sum of the production values of the projects included in the target attribute detection information matched with the voucher number in the target attribute detection information group as a project production summary value. The certificate number matching with the certificate number may be that the certificate number corresponding to the target attribute detection information is the same as the certificate number. The total value of the project output may be a total value added by the corresponding items of the voucher numbers.
And a second substep of determining a sum of consumption values of the items included in the target attribute detection information matched with the voucher number in the target attribute detection information group as a total consumption value of the items. The matching with the credential number may be that the credential number corresponding to the target attribute detection information is the same as the credential number. The total value of the consumption of the items may be a total value of the decrease of the items corresponding to the voucher numbers.
A third substep of determining the voucher number, the project production summary value and the project consumption summary value as target doubt information in response to determining that the project production summary value and the project consumption summary value are not the same.
And sixthly, determining the target attribute detection information matched with the certificate number included in each determined target suspicious node information in the target attribute detection information group as second suspicious node information to obtain a second suspicious node information set. Wherein, matching with the credential number included in each determined target erasure information may be that the credential number included in the target attribute detection information is the same as the credential number included in at least one piece of target erasure information. The second doubt information in the second doubt information set can be the information to be detected corresponding to the doubt event. The doubtful point items can be items with different item output summary values and item consumption summary values.
And seventhly, generating a suspicious node certificate number set and a suspicious node number based on the determined first suspicious node information and the second suspicious node information set. The suspect certificate number in the suspect certificate number set may be the number of the corresponding certificate of the matter in which the suspect exists. The number of the suspicious points may be the total number of the suspicious points corresponding to each item in which the suspicious points exist. Firstly, determining a certificate number corresponding to each first doubt information included in each first doubt information and a certificate number corresponding to each second doubt information in a second doubt information set as redundant doubt certificate numbers to obtain a redundant doubt number set. The redundant suspect certificate number in the redundant suspect certificate number set may be the number of the corresponding certificate of the suspect event. And then, determining the number of the redundant doubtful point certificate numbers in the redundant doubtful point certificate number set as the doubtful point number. And finally, performing redundancy removal processing on the redundant doubtful point certificate number set to obtain a doubtful point certificate number set. The redundancy can be removed from the redundant suspect point voucher number set, and each redundant suspect point voucher number in the redundant suspect point voucher number set after the redundancy is removed is determined as a suspect point voucher number, so that the suspect point voucher number set is obtained.
And eighthly, determining the detected department information, the detection time information, the doubtful point certificate number set and the doubtful point number as doubtful point summary information.
The doubtful point summary information generation step and the related content thereof are used as an invention point of the embodiment of the disclosure, and the technical problem mentioned in the background art is solved, namely, the existing information detection method does not detect or performs hysteresis detection on the voucher type engineering service data from each data source, so that the wrong voucher type engineering service data is easily ignored, and the accuracy of information detection is low. The problem that results in low information detection accuracy tends to be as follows: and the voucher type engineering business data from each data source is not detected or lagged to be detected. If the above problems are solved, the effect of improving the information detection accuracy can be achieved. To achieve this effect, the present disclosure may, when performing an information detection task of suspicious screening, first, determine whether a voucher is the same as a corresponding project production value or project consumption value by identifying each voucher. And if the voucher is not equal to the corresponding project output value or project consumption value, determining the item information corresponding to the voucher as the doubt point information. Therefore, problem data inconsistent with the certificate information can be screened out through the certificate information. Then, for each item information that is not determined to be suspect information, it is determined whether the item production summary value and the item consumption summary value corresponding to the item are the same. And if the project output summary value and the project consumption summary value corresponding to the item are different, determining the item information corresponding to the item as suspicious point information. Therefore, problem data with inconsistent project output summary value and project consumption summary value are further screened out. Therefore, the doubtful point summary information generation step and the related content thereof can be realized by performing pre-detection on the voucher type engineering business data from each data source and then detecting the value of each specific item, so as to avoid that the wrong voucher type engineering business data is ignored. Thus, the accuracy of information detection can be improved.
Optionally, the executing body may further perform the following steps:
the method comprises the steps of firstly, responding to received detailed view information aiming at the suspicious point summarizing information, generating a suspicious point attribute information set based on the detailed view information and the sub-item attribute detection information set, and sending the suspicious point attribute information set to the target terminal so as to select any suspicious point attribute information. The detailed viewing information may be information of each suspicious point corresponding to each suspicious point event. The execution main body can generate a suspicious point attribute information set based on the detail viewing information and the sub-item attribute detection information set in various modes, and send the suspicious point attribute information set to the target terminal so as to select any suspicious point attribute information.
In some optional implementations of some embodiments, the detail view information may include a target credential number set. The target certificate number in the target certificate number set may be a number of a certificate corresponding to a matter in which there is a suspicious point. And the target certificate numbers in the target certificate number set correspond to the suspect point certificate numbers in the suspect point certificate number set one by one. The execution main body may generate an erasure attribute information set based on the detail viewing information and the sub-item attribute detection information set by:
and step one, selecting the sub-item attribute detection information matched with any target voucher number in the target voucher number set included in the detail viewing information from the sub-item attribute detection information set as the attribute detail information to obtain an attribute detail information set. The matching with any target credential number in the target credential number set included in the detail viewing information may be that a credential number corresponding to the sub-item attribute detection information is the same as any target credential number in the target credential number set. The attribute detail information in the attribute detail information set may be information of any one of the suspicious points corresponding to the event in which the suspicious point exists.
A second step of executing, for each attribute detail information in the attribute detail information set, the following steps:
and the first substep, performing conversion processing on the project output value corresponding to the attribute detail information to obtain a project output hash value. The project yield hash value can be used for representing the project yield value. And converting the project output value corresponding to the attribute detail information through a hash algorithm to obtain a project output hash value.
And a second substep of performing conversion processing on the item consumption value corresponding to the attribute detail information to obtain an item consumption hash value. The item consumption hash value can be used for representing an item consumption value. The item consumption value corresponding to the attribute detail information may be converted by the hash algorithm to obtain an item consumption hash value.
And a third substep, determining the department name, the certificate number, the project production hash value and the project consumption hash value corresponding to the attribute detail information as the suspicious node attribute information.
And secondly, responding to the received selection information aiming at any suspicious point attribute information in the suspicious point attribute information set, generating authority verification information based on the selection information, and sending the authority verification information to the target terminal for confirming the authority. The selection information may be suspicious point information selected by the detector. The authority verification information may be information for verifying whether the detection person has authority to view unprocessed information. The above-mentioned unprocessed information may be the suspicious information before the non-conversion processing. The selection information and the preset authority verification window information can be determined as authority verification information, and the authority verification information is sent to the target terminal to confirm the authority. The preset authority verification window information can be used for representing the authority verification window. The authority verification window may include an authority password input control and a password confirmation control. The authority password input control can be a control for receiving password information input by a user. The password information may be a character string sequence consisting of numbers and letters. The password confirmation control may be a control for confirming the password information received by the authority password input control sent to the server.
And thirdly, in response to receiving the authority confirmation information aiming at the authority verification information, generating target suspicious point attribute information for the target terminal to display based on the authority confirmation information. The permission confirmation information may include the selection information and the permission password. The target suspicious node attribute information may be information of suspicious nodes including actual value attribute values corresponding to the selection information. The target suspicious node attribute information can be generated for the target terminal to display based on the authority confirmation information through the following steps:
the first substep, carry on the verification to the authority password that the above-mentioned authority confirms the information to include, get the goal verification information. The target verification information may be used to represent whether the permission password is the same as a preset viewing permission password. The preset viewing authority password may be a preset character string corresponding to the viewing authority. The authority password included in the authority confirmation information can be verified through a character string matching algorithm, and target verification information is obtained.
And a second substep of selecting, from the set of sub-item attribute detection information, sub-item attribute detection information that matches the selection information as target suspicious node attribute information in response to determining that the target verification information satisfies a preset verification condition. The preset verification condition may be that the target verification information represents that the permission password is the same as a preset viewing permission password. The matching with the selection information may be one-to-one correspondence between each attribute included in the sub-item attribute detection information and the attribute included in the selection information.
And a third substep, sending the target suspicious point attribute information to the target terminal for display.
The doubtful point attribute information generation step and the related content thereof are used as an invention point of the embodiment of the disclosure, and the technical problems mentioned in the background art are solved, namely, the existing information detection method adopts a direct display mode to display part of project service data which is inconvenient to disclose, and the risk of data leakage is easily caused. The reasons for the high risk of data leakage are often as follows: the existing information detection method directly displays part of engineering service data which is inconvenient to disclose. If the problem is solved, the effect of reducing the data leakage risk can be achieved. In order to achieve this effect, the present disclosure may perform hash conversion processing on information to be viewed without affecting an information detection result. If the detection personnel need to check the actual value information before the conversion processing, the checking authority can be obtained through the authority verification. Generally, a detector can check a plurality of pieces of suspicious point information only through one-time authority verification under the condition that the authority is not overtime. Therefore, when information is detected, irreversible conversion operation can be carried out on part of engineering service data which is inconvenient to disclose, and the converted data is displayed, so that data leakage is avoided. Thus, the risk of data leakage can be reduced.
Optionally, the executing body may further perform the following steps:
in the first step, in response to receiving sub-item comprehensive analysis query information aiming at the comprehensive analysis tab page information, a sub-item comprehensive analysis information set is generated based on the sub-item comprehensive analysis query information and the sub-item attribute detection information set. The sub-item comprehensive analysis query information may be information of a total value proportion of the project output values corresponding to the query items. The sub-item integrated query information may include a target detection department, target detection time information, a target value type, and a target item name set. The target detection department may be a department to be detected. The target detection time information may be used to characterize a time period corresponding to the detection subtask. The target value type may be a yield type or a consumption type. The output type can be used for representing that the output value of each project corresponding to the item is not null. The consumption type can be used for representing that the consumption value of each item corresponding to the item is not null. The destination item name in the destination item name set may be a name of an item corresponding to the destination value type. The total value may be a total project output value corresponding to each event. Each of the sub-item integrated analysis information sets includes item value information and item value percentage. The project value information may be information of a project output value corresponding to the event. The project value percentage may be a percentage of the total value of the project output value corresponding to the event. The sub item comprehensive analysis information set may be generated based on the sub item comprehensive analysis query information and the sub item attribute detection information set by:
the first substep, select the sub-item attribute detection information matched with the sub-item comprehensive analysis inquiry information from the sub-item attribute detection information set as the target item information, and obtain the target item information set. Wherein, the matching with the comprehensive analysis query information of the sub-items can be: the department name corresponding to the sub-item attribute detection information is the same as the target detection department included in the sub-item comprehensive analysis query information, the item name corresponding to the sub-item attribute detection information is the same as any one target item name included in the sub-item comprehensive analysis query information, the item occurrence time corresponding to the sub-item attribute detection information is within the time period represented by the target detection time information included in the sub-item comprehensive analysis query information, and the item output value corresponding to the sub-item attribute detection information is matched with the target value type included in the sub-item comprehensive analysis query information. The matching with the sub-item comprehensive analysis query information including the target value type may be: the target value type is an output type, and the project output value corresponding to the sub-project attribute detection information is not null. The item information in the item information set may be information on each attribute of the item.
A second substep, responsive to determining that said target value type is a yield type, for each target item name in said set of target item names, performing the steps of:
step one, the sum of the output values of all projects corresponding to all target item information matched with the target item names in the target item information set is determined as the target item value. The matching with the target event name may be that the event name corresponding to the target event information is the same as the target event name. The target item value may be a total item production value corresponding to the item.
And step two, determining the target item name and the target item value as item value information. The project value information may be information on a total project output value corresponding to the event and the event.
And a third substep of determining a total value as a sum of the respective objective item values included in the determined respective item value information.
A fourth substep of determining, for each item value information included in the determined item value information, a percentage of a target item value included in the item value information to the total value as an item value percentage, and determining the item value information and the item value percentage as sub-item integrated analysis information.
And secondly, sending the sub-item comprehensive analysis information set to the target terminal so that a target user can select project value information corresponding to any sub-item comprehensive analysis information.
And thirdly, in response to receiving selection confirmation information aiming at any one of the sub item comprehensive analysis information included in the sub item comprehensive analysis information set, generating sub item detail information for detecting information. The selection confirmation information may be sub-item comprehensive analysis information selected by the inspector. The sub-item detail information may be item value information corresponding to the event. The item value information corresponding to the selection confirmation information can be determined as sub-item detail information for detecting information.
Optionally, the executing body may further perform the following steps:
in a first step, in response to receiving chart request information for the integrated analysis tab page information, a project value percentage included in each integrated analysis information in the sub-item integrated analysis information set is determined as a project value percentage set. The chart request information may be information requesting to display the percentage of the item value corresponding to each event in a chart. The set of item value percentages may be a set of item value percentages corresponding to each item.
And secondly, generating project value ratio graph information based on the project value percentage set, and sending the project value ratio graph information to the target terminal for information detection. The item value proportion graph information can be used for representing and displaying a graph of item value percentages corresponding to all matters. And generating project value proportion graph information based on the project value percentage set through a SpringBoot framework and a JAVA programming language, and sending the project value proportion graph information to the target terminal for detecting information.
The above embodiments of the present disclosure have the following advantages: by the information detection method of some embodiments of the present disclosure, time consumption for information detection can be reduced. Specifically, the reason why the information detection takes a long time is that: a large amount of engineering service data from different data sources often contain a large amount of data irrelevant to detection tasks or redundant data, and detection personnel cannot conveniently perform daily detection on the same engineering service data. Based on this, in the information detection method of some embodiments of the present disclosure, first, engineering project detection information and a first attribute information set corresponding to a target engineering service are obtained. The target engineering service is an engineering service to be subjected to information detection, the engineering project detection information includes a project identifier, a sub-project information group and a project attribute information set, each project attribute information in the project attribute information set includes a project attribute name, and each first attribute information in the first attribute information set includes a first attribute name. Here, the source information of the attribute and the partial attribute corresponding to the target engineering service may be determined. Then, an item attribute name different from each first attribute name included in the first attribute information set is selected from the item attribute names included in the item attribute information set as a remaining attribute name, and a remaining attribute name group is obtained. Therefore, each attribute to be detected of the undetermined source can be obtained, and source information can be conveniently determined for each attribute to be detected subsequently. And thirdly, acquiring a second attribute information set matched with the project identification and the residual attribute name group included in the project detection information from a preset data source. Wherein each of the second attribute information sets includes a second attribute name. Therefore, the source information can be determined for each attribute to be detected of the undetermined source information. Subsequently, each first attribute information in the first attribute information set and each second attribute information in the second attribute information set are determined as target attribute information, and a target attribute information set is obtained. Therefore, the attributes to be detected corresponding to the target engineering service can be combined together, and the attributes irrelevant to the detection task or redundant attributes do not need to be considered, so that the corresponding attributes can be conveniently extracted subsequently according to the sub-project information in the sub-project information group. And then, extracting the target attribute information set based on the sub-project information group included in the engineering project detection information to obtain a target project information set. Therefore, each attribute set corresponding to each sub-item information can be obtained, and attribute values corresponding to the attributes can be determined conveniently according to the source information corresponding to the attributes in the attribute sets, and subsequent information detection is convenient. The target item information may include information of each attribute to be detected. Then, a sub-item attribute detection information set is generated based on the target item information set. Thus, the sub-item attribute detection information corresponding to each piece of sub-item information can be specified for each attribute set. And finally, controlling the display equipment to display the sub-item attribute detection information set for detecting information. Therefore, the detection personnel can complete information detection on the sub-item attribute detection information set through the display equipment. Therefore, for a large amount of engineering service data from different data sources, by determining the information of the attribute to be detected corresponding to the target engineering service, then determining the attribute set corresponding to the detection task, and determining the item information corresponding to the detection task through the attribute set, the method can enable detection personnel to not consider the attribute irrelevant to the detection task or redundant attribute during information detection, and can conveniently and quickly perform daily detection on the service data. Thus, the time consumption for information detection can be reduced.
With further reference to fig. 2, as an implementation of the methods shown in the above figures, the present disclosure provides some embodiments of an information detection apparatus, which correspond to those of the method embodiments shown in fig. 1, and which may be applied in various electronic devices in particular.
As shown in fig. 2, the information detection apparatus 200 of some embodiments includes: a first acquisition unit 201, a selection unit 202, a second acquisition unit 203, a determination unit 204, an extraction processing unit 205, a generation unit 206, and a display unit 207. The first obtaining unit 201 is configured to obtain engineering project detection information and a first attribute information set corresponding to a target engineering service, where the target engineering service is an engineering service to be subjected to information detection, the engineering project detection information includes a project identifier, a sub-project information group, and a project attribute information set, each project attribute information in the project attribute information set includes a project attribute name, and each first attribute information in the first attribute information set includes a first attribute name; a selecting unit 202, configured to select, from the item attribute names included in the item attribute information set, an item attribute name different from each first attribute name included in the first attribute information set as a remaining attribute name, and obtain a remaining attribute name group; a second obtaining unit 203, configured to obtain, from a preset data source, a second attribute information set that matches the item identifier and the remaining attribute name group included in the engineering item detection information, where each piece of second attribute information in the second attribute information set includes a second attribute name; a determining unit 204 configured to determine each first attribute information in the first attribute information set and each second attribute information in the second attribute information set as target attribute information, to obtain a target attribute information set; an extraction processing unit 205 configured to perform extraction processing on the target attribute information set based on a sub-project information group included in the engineering project detection information to obtain a target project information set; a generating unit 206 configured to generate a sub-item attribute detection information set based on the target item information set; a display unit 207 configured to control the display device to display the sub-item attribute detection information set for detection information.
It will be understood that the units described in the apparatus 200 correspond to the various steps in the method described with reference to fig. 1. Thus, the operations, features and advantages described above for the method are also applicable to the apparatus 200 and the units included therein, and are not described herein again.
With further reference to fig. 3, a schematic structural diagram of an electronic device 300 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 3, electronic device 300 may include a processing device (e.g., central processing unit, graphics processor, etc.) 301 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 302 or a program loaded from a storage device 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data necessary for the operation of the electronic apparatus 300 are also stored. The processing device 301, the ROM 302, and the RAM 303 are connected to each other via a bus 304. A production revenue/production expenditure (I/O) interface 305 is also connected to the bus 304.
Generally, the following devices may be connected to the I/O interface 305: production revenue devices 306 including, for example, touch screens, touch pads, keyboards, mice, cameras, microphones, accelerometers, gyroscopes, etc.; production expenditure devices 307 including, for example, liquid Crystal Displays (LCDs), speakers, vibrators, and the like; storage devices 308 including, for example, magnetic tape, hard disk, etc.; and a communication device 309. The communication means 309 may allow the electronic device 300 to communicate wirelessly or by wire with other devices to exchange data. While fig. 3 illustrates an electronic device 300 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 3 may represent one device or may represent multiple devices, as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network through the communication device 309, or installed from the storage device 308, or installed from the ROM 302. The computer program, when executed by the processing apparatus 301, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described above in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the apparatus described above; or may be separate and not incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring engineering project detection information and a first attribute information set corresponding to a target engineering service, wherein the target engineering service is an engineering service to be subjected to information detection, the engineering project detection information comprises a project identifier, a sub-project information group and a project attribute information set, each project attribute information in the project attribute information set comprises a project attribute name, and each first attribute information in the first attribute information set comprises a first attribute name; selecting project attribute names different from the first attribute names included in the first attribute information set from the project attribute names included in the project attribute information set as residual attribute names to obtain a residual attribute name group; acquiring a second attribute information set matched with the project identification and the residual attribute name group included in the project detection information from a preset data source, wherein each piece of second attribute information in the second attribute information set includes a second attribute name; determining each first attribute information in the first attribute information set and each second attribute information in the second attribute information set as target attribute information to obtain a target attribute information set; extracting the target attribute information set based on a sub-project information group included in the engineering project detection information to obtain a target project information set; generating a sub-item attribute detection information set based on the target item information set; and controlling the display equipment to display the sub-item attribute detection information set for detecting information.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software, and may also be implemented by hardware. The described units may also be provided in a processor, and may be described as: a processor includes a first acquisition unit, a selection unit, a second acquisition unit, a determination unit, an extraction processing unit, a generation unit, and a display unit. For example, the first obtaining unit may be further described as a unit that obtains engineering project detection information and a first attribute information set corresponding to a target engineering service, where the target engineering service is an engineering service to be subjected to information detection, the engineering project detection information includes an item identifier, a sub-item information group, and an item attribute information set, each item attribute information in the item attribute information set includes an item attribute name, and each first attribute information in the first attribute information set includes a first attribute name.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
Some embodiments of the present disclosure also provide a computer program product comprising a computer program that, when executed by a processor, implements any of the information detection methods described above.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) the features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.