Because of the characteristics of large investment,high profits,complexity and many participants in government-invested projects,conspiracy between tenderee and bidders occurs frequently,which causes inestimable harm to the whole project With the rapid development of computer technology,large data storage,analysis and mining technology have become a new favorite in theory and practice sector.It is vital to provide new ideas and methods for effective monitoring paths.The purpose of present paper is to study the monitoring methods of collusion between tenderee and bidders of government-invested projects.The main work of this paper is as follows:(1)Firstly,the concepts of government-invested projects,tenderee,project collusion and user portraits were defined.The feasibility of whether user portraits are applicable to the monitoring portraits of government-invested project bidders’ collusion is demonstrated theoretically,methodologically and technically,and the monitoring framework and process were designed.(2)By consulting literature,reading court files and statistical case data,the collusion behavior of tenderee and bidders was counted and analyzed,and the preliminary collusion behavior set was obtained.Then,through the questionnaire,the characteristic collusion behavior of tenders and bidders was screened by reliability and validity analysis.(3)Five types of collusion factors,Tenderee-led,Tenderee Documents-led,Bidding Documents-led,Collusive Measurement,Bidder-led,were obtained by dimensionality reduction.Five types of collusion factors were clustered into four types,text collusion,operational collusion,potential collusion and mature collusion,by cluster analysis.(4)Through comparative analysis of matching algorithms,the CBR matching algorithm was used to analyze the matching of monitoring portraits and collusion portraits,and the monitoring directions and suggestions of different matching results were given,and the monitoring platform was designed.(5)The case of XX city was taken as an example to match its portraits and judge that it belongs to mature collusion portraits.The monitoring path basically matched the actual situation,which verified the rationality of the monitoring label and the feasibility of collusion.For the strong concealment and complex conspiracy mode,it was difficult to directly identify and monitor the collusion behavior of bidders.By constructing monitoring portraits and matching portraits,potential collusion behavior was determined,and then monitoring direction and measures were provided,which proposed a new research idea and method for collusion behavior monitoring. |