CN115629978A - Automatic embedded point testing method and device, electronic equipment and storage medium - Google Patents

Automatic embedded point testing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115629978A
CN115629978A CN202211320705.2A CN202211320705A CN115629978A CN 115629978 A CN115629978 A CN 115629978A CN 202211320705 A CN202211320705 A CN 202211320705A CN 115629978 A CN115629978 A CN 115629978A
Authority
CN
China
Prior art keywords
buried point
point information
buried
information
configuration platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211320705.2A
Other languages
Chinese (zh)
Inventor
凌玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN202211320705.2A priority Critical patent/CN115629978A/en
Publication of CN115629978A publication Critical patent/CN115629978A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/284Lexical analysis, e.g. tokenisation or collocates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/289Phrasal analysis, e.g. finite state techniques or chunking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Geophysics And Detection Of Objects (AREA)

Abstract

The invention relates to an artificial intelligence technology, and discloses an automatic buried point testing method, which comprises the following steps: adding a buried point event corresponding to the buried point information in the configuration platform; testing the buried point information by using a buried point testing tool constructed in the configuration platform in advance to obtain a testing result of the buried point information; operating the configuration platform, and triggering all embedded points in the configuration platform to obtain the real embedded point information of the configuration platform; and according to the real embedded point information, carrying out expected value verification on the test result of the embedded point information to obtain a verification result, and generating a test report according to the verification result. In addition, the invention also relates to a block chain technology, and the data list can be stored in the node of the block chain. The invention also provides a buried point automatic testing device, electronic equipment and a storage medium. The invention can improve the efficiency of the buried point test.

Description

Automatic embedded point testing method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a buried point automatic testing method and device, electronic equipment and a computer readable storage medium.
Background
The data burying point enables related personnel such as products or operation and the like to perform customized statistics on more complex user data according to specific requirements. For example, when a user wants to track the behavior of the user, observe click data related to a page, or analyze the effect of an event activity, data embedding needs to be performed in advance, and then corresponding data is collected through the preset data embedding points when the user uses an application program to perform analysis and research.
In actual work, the client is buried with points in a manual point burying mode, a product manager puts forward requirements, parameters required by the buried points are informed to the front end for development, and the development carries out the buried points according to the requirements. However, due to the fact that the number of buried points is large, a tester needs to frequently grab buried point reporting requests, and check and analyze whether buried point data is normally reported field by field, and such operations are time-consuming and labor-consuming, and a large number of repetitive operations are tedious and prone to errors, so that testing efficiency is low. Therefore, how to bury the point for testing efficiency becomes a problem to be solved urgently.
Disclosure of Invention
The invention provides a buried point automatic testing method and device and a computer readable storage medium, and mainly aims to solve the problem of low efficiency in buried point testing.
In order to achieve the above object, the present invention provides an automatic testing method for embedded points, comprising:
adding a buried point event corresponding to the buried point information in the configuration platform;
testing the buried point information by using a buried point testing tool constructed in the configuration platform in advance to obtain a testing result of the buried point information;
operating the configuration platform, and triggering all embedded points in the configuration platform to obtain real embedded point information of the configuration platform;
and according to the real buried point information, carrying out expected value verification on the test result of the buried point information to obtain a verification result, and generating a test report according to the verification result.
Optionally, the adding a buried point event corresponding to the buried point information in the configuration platform includes:
carrying out feature extraction on the buried point information to obtain buried point features of the buried point information;
clustering the buried point characteristics to obtain sub-characteristics of the buried point characteristics, and determining buried point events corresponding to the buried point information according to the sub-characteristics;
and carrying out code conversion on the embedded point event to obtain an abstract source code of the hierarchical characteristics, and adding the abstract source code into a configuration platform to finish embedding the point.
Optionally, the performing feature extraction on the buried point information to obtain the buried point feature of the buried point information includes:
carrying out information correction on the buried point information to obtain standard information of the buried point information;
performing word segmentation processing on the standard information to obtain buried point word segmentation of the buried point information;
vectorizing and converting the buried point participles to obtain participle vectors of the buried point participles;
and carrying out vector splicing on the vector participles to obtain a splicing matrix of the vector participles, and determining the splicing matrix as the buried point characteristics of the buried point information.
Optionally, the adding a buried point event corresponding to the buried point information in the configuration platform includes:
selecting a buried point event type in a database of a buried point test platform according to the buried point information, wherein the buried point event type comprises at least one of an operating system type, occurrence time, identification information, function description, identification information, an application version and data generation time;
and embedding the embedded point information in a configuration platform according to the embedded point event type.
Optionally, the testing the buried point information by using a buried point testing tool constructed in the configuration platform in advance to obtain a testing result of the buried point information includes:
generating a buried point log of the buried point information according to the built buried point test tool, and screening the buried point log by using a preset primary data table index to obtain a plurality of primary buried point logs;
screening each primary buried point log according to a preset secondary data table index to obtain a plurality of secondary buried point logs;
and constructing a log table of the buried point information by using the primary buried point log and the secondary buried point log, and determining the log table as a test result of the buried point information.
Optionally, the triggering all the buried points in the configuration platform to obtain the real buried point information of the configuration platform includes:
performing suspension window configuration on a buried point front-end interface to be configured in the configuration platform to obtain a primary front-end interface of the buried point front-end interface to be configured;
configuring a retrieval frame for the primary front-end interface to obtain a secondary front-end interface of the primary front-end interface;
configuring the test button on the secondary front-end interface to obtain a configured buried point front-end interface;
and acquiring a buried point version number, and generating real buried point information of the configuration platform according to the buried point version number and the configuration elements of the configured buried point front-end interface.
Optionally, the performing, according to the real buried point information, an expected value check on a test result of the buried point information to obtain a check result includes:
and carrying out expected value verification on the real buried point information by using the following similarity algorithm:
Figure BDA0003910262330000031
wherein x is the real buried point information, y is the test result, T (x, y) represents the information similarity between the real buried point information and the test result, and x k K-th data, y representing the real buried point information x k A kth datum representing the test result.
In order to solve the above problems, the present invention further provides an automatic testing apparatus for embedded points, the apparatus comprising:
the embedded point event module is used for adding embedded point events corresponding to the embedded point information in the configuration platform;
the test result module is used for testing the embedded point information by using an embedded point test tool which is constructed in the configuration platform in advance to obtain a test result of the embedded point information;
the real embedded point information module is used for operating the configuration platform and triggering all embedded points in the configuration platform to obtain real embedded point information of the configuration platform;
and the test report module is used for carrying out expected value verification on the test result of the buried point information according to the real buried point information to obtain a verification result and generating a test report according to the verification result.
In order to solve the above problem, the present invention also provides an electronic device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform the method for buried point automated testing as described above.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, in which at least one computer program is stored, and the at least one computer program is executed by a processor in an electronic device to implement the above-mentioned buried point automatic testing method.
According to the embodiment of the invention, the embedded point event corresponding to the embedded point information is added in the configuration platform, the embedded point event is managed and maintained by using the embedded point configuration platform, the embedded point test tool is constructed in the configuration platform according to the embedded point event, the embedded point information is tested by using the embedded point test tool to obtain the test result of the embedded point information, a correct template is provided for the subsequent test of a client, all embedded points in the configuration platform are triggered to obtain the real embedded point information of the configuration platform, the generation efficiency of the embedded point information is improved, the generation of a data hysteresis phenomenon is avoided, the correctness of the embedded point is determined according to the similarity between the test result and the real embedded point information, the accuracy of each embedded point data is not required to be manually cored, the labor cost is reduced, and the overall test efficiency is improved.
Drawings
Fig. 1 is a schematic flow chart illustrating an automated testing method for buried points according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating an adding a buried point event according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of generating real buried point information according to an embodiment of the present invention;
FIG. 4 is a functional block diagram of an automatic testing apparatus for embedded points according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device for implementing the automatic buried point testing method according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the application provides an automatic buried point testing method. The execution subject of the buried point automatic testing method includes, but is not limited to, at least one of electronic devices such as a server and a terminal, which can be configured to execute the method provided by the embodiment of the present application. In other words, the buried point automated testing method may be performed by software or hardware installed in a terminal device or a server device, and the software may be a block chain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a web service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform.
Fig. 1 is a schematic flow chart of an automatic testing method for a buried point according to an embodiment of the present invention. In this embodiment, the automatic testing method for embedded points includes:
s1, adding a buried point event corresponding to buried point information in a configuration platform.
In the embodiment of the invention, the embedded point is that certain information is collected in a specific process in the application, is used for tracking the using condition of the application, and is subsequently used for further optimizing products or providing data support of operation, wherein the data support comprises access numbers, visitor numbers, stay time, page browsing numbers, skip rate and the like; the buried point is a related technology and implementation process thereof for capturing, processing and transmitting specific user behaviors or events.
In detail, the roles of the configuration platform include, but are not limited to: and managing and maintaining the buried point information, and providing the buried point information for the client.
In detail, the buried point information includes, but is not limited to: the version number of the buried point, the English name of the buried point event, the Chinese name of the buried point time, the buried point attribute, the buried point modifier and the buried point modification time.
In detail, the buried point event can be divided into two categories, namely a client buried point and a server buried point, wherein the event refers to recording user behaviors by using a category of messages called as "event" in order to count and analyze the user behaviors; the composition of the event comprises: user information, time information, behavior information and behavior object information, wherein the user information is used for accessing or logging in a user ID, the time information refers to the time when the event occurs, the behavior information refers to what behavior the user does, and the behavior object information refers to objects on which the behavior of the user acts, such as: the button A is clicked; page B is browsed; the text box C is modified, and then A, B and C are the user behavior action objects respectively.
In the embodiment of the present invention, referring to fig. 2, the adding of the buried point event corresponding to the buried point information in the configuration platform includes:
s21, extracting the characteristics of the buried point information to obtain buried point characteristics of the buried point information;
s22, clustering the buried point characteristics to obtain sub-characteristics of the buried point characteristics, and determining buried point events corresponding to the buried point information according to the sub-characteristics;
and S23, performing code conversion on the embedded point event to obtain an abstract source code of the level feature, and adding the abstract source code into a configuration platform to finish embedded points.
In detail, the buried point event may be one or any more of a page event, an access event, an activation event, a wake-up event, a click event, an exposure event, an input event, and the like.
In detail, the purpose of extracting the features of the buried point information is to establish the relevance between the buried point information, and meanwhile, the salient features of the buried point information are obtained, so that the buried point information can be conveniently classified and normalized.
In this embodiment of the present invention, the extracting the feature of the buried point information to obtain the buried point feature of the buried point information includes:
carrying out information correction on the buried point information to obtain standard information of the buried point information;
performing word segmentation processing on the standard information to obtain buried point words of the buried point information;
vectorizing and converting the buried point participles to obtain participle vectors of the buried point participles;
and carrying out vector splicing on the vector participles to obtain a splicing matrix of the vector participles, and determining the splicing matrix as the buried point characteristics of the buried point information.
In detail, the information correction is to correct missing information and abnormal information in the buried point information, because the quality of the preprocessing result of the buried point information greatly affects the subsequent data processing result.
In detail, the word segmentation tool for performing word segmentation processing on the standard information comprises: the Chinese word segmentation is a process of segmenting a Chinese character sequence into a single word and recombining continuous word sequences into word sequences according to a certain specification; common word segmentation methods fall into three categories: a word segmentation method based on character string matching, a word segmentation method based on understanding and a word segmentation method based on statistics.
For example: the standard information is 'I likes the subject of mathematics', can be participled and processed into 'I' like 'mathematics', the subject of 'the subject' of 'the mathematics'.
In detail, the pre-trained artificial intelligence Model with a word segmentation function may be used to perform word segmentation on the standard information to obtain the buried point word segmentation, where the artificial intelligence Model includes, but is not limited to, an NLP (Natural Language Processing) Model, and an HMM (Hidden Markov Model).
In detail, the vector concatenation is performed on the vector participles, for example: the vector participle comprises a vector A: (1,4,6), vector B: (2,3), vector C: (3,7,8,9), it can be found through statistics that if the vector dimension of the vector a is 3, the vector dimension of the vector B is 2, and the vector dimension of the vector C is 4, it is determined that 4 is the target dimension, and the vector dimension of the vector a is extended to 4 by using a preset parameter (e.g., x), so as to obtain an extended vector a: (1, 4,6, x), extending the vector dimension of vector B to 4, obtaining an extended vector B: (2, 3, x).
Further, each extended vector word can be used as a row vector, and the row vector words are spliced into a vector matrix as follows:
Figure BDA0003910262330000071
in this embodiment of the present invention, the adding of the buried point event corresponding to the buried point information in the configuration platform includes:
selecting a buried point event type in a database of a buried point test platform according to the buried point information, wherein the buried point event type comprises at least one of an operating system type, occurrence time, identification information, function description, identification information, an application version and data generation time;
and embedding the embedded point information in a configuration platform according to the embedded point event type.
In detail, the operating system is the basic mechanism behind the workings of computer systems and mobile devices, and the types of operating systems include, but are not limited to: batch operating systems, network operating systems, distributed operating systems, real-time operating systems, and the like.
And S2, testing the buried point information by using a buried point testing tool constructed in the configuration platform in advance to obtain a testing result of the buried point information.
In the embodiment of the present invention, the test result refers to the data of the buried point at the back end when the buried point is performed.
In detail, the roles of the buried site testing tool include, but are not limited to: checking the buried points, providing buried point logs, testing report functions and the like.
In this embodiment of the present invention, the testing the embedded point information by using the embedded point testing tool built in the configuration platform in advance to obtain the testing result of the embedded point information includes:
generating buried point logs of the buried point information according to the built buried point test tool, and screening the buried point logs by using a preset primary data table index to obtain a plurality of primary buried point logs;
screening each primary buried point log according to a preset secondary data table index to obtain a plurality of secondary buried point logs;
and constructing a log table of the buried point information by using the primary buried point log and the secondary buried point log, and determining the log table as a test result of the buried point information.
In detail, the table index is an ordered data structure in the database management system to assist fast query and update the data in the table in the database, and the preset first-level table index is usually implemented by using a B tree and a B + tree of varieties (the index commonly used in MySQL is the B + tree). In addition to data, database systems maintain data structures that reference data in some way to satisfy a particular lookup algorithm, which is an index. In short, the index is analogous to a book, a directory of dictionaries.
In detail, the uniqueness of each row of data in the database table can be ensured through the preset primary data table index and the preset secondary data table index, and the retrieval speed of the data is greatly accelerated, which is also the main reason for creating the index. Meanwhile, the data table index can accelerate the connection between the tables and the tables, and when grouping and sorting clauses are used for data retrieval, the grouping and sorting time in query can be obviously reduced. For example, the preset primary data table index may be a user behavior, and the user behavior may be clicking, browsing, or the like; the preset secondary data table index can be browsing time and selection of browsing pages under a browsing event.
And S3, operating the configuration platform, and triggering all embedded points in the configuration platform to obtain the real embedded point information of the configuration platform.
In the embodiment of the present invention, referring to fig. 3, the triggering all the buried points in the configuration platform to obtain the real buried point information of the configuration platform includes:
s31, performing suspension window configuration on a buried point front end interface to be configured in the configuration platform to obtain a primary front end interface of the buried point front end interface to be configured;
s32, configuring a retrieval frame for the primary front-end interface to obtain a secondary front-end interface of the primary front-end interface;
s33, configuring the test button on the secondary front-end interface to obtain a configured buried point front-end interface;
and S34, acquiring a buried point version number, and generating real buried point information of the configuration platform according to the buried point version number and the configuration elements of the configured buried point front-end interface.
In detail, clicking a 'buried point test' button, inputting the buried point version number in the retrieval box, and inquiring the buried point event of the version; when a real-time test button is clicked, the triggered buried points and the full buried points under the version corresponding to the buried point version number can be seen.
S4, according to the real buried point information, carrying out expected value verification on a test result of the buried point information to obtain a verification result, and generating a test report according to the verification result.
In detail, the expected value verification is to compare the real embedded point information with the test result of the embedded point, the test result is the embedded point on the client, and the real embedded point information is all the embedded point information in the queried target version.
In detail, the test report generated according to the verification result can solve the problem of data lag and timely check the correctness of the buried point.
In this embodiment of the present invention, the performing an expected value verification on the test result of the embedded point information according to the real embedded point information to obtain a verification result includes:
and carrying out expected value verification on the real buried point information by using the following similarity algorithm:
Figure BDA0003910262330000091
wherein x is the real buried point information, y is the test result, T (x, y) represents the information similarity between the real buried point information and the test result, and x k K-th data, y representing the real buried point information x k Representing the test resultsThe kth data of (1).
Further, when the information similarity is larger, the real buried point information is similar to the test result, namely the expected value verification determines that the real buried point information is a correct buried point.
In detail, according to the verification result, a correct buried point, an incorrect buried point and an un-triggered buried point under a target version can be displayed on the test report.
According to the embodiment of the invention, the buried point event corresponding to the buried point information is added into the configuration platform, the buried point event is managed and maintained by using the buried point configuration platform, the buried point test tool is constructed in the configuration platform according to the buried point event, the buried point information is tested by using the buried point test tool to obtain the test result of the buried point information, a correct template is provided for subsequent tests of a client, all buried points in the configuration platform are triggered to obtain the real buried point information of the configuration platform, the buried point information generation efficiency is improved, the generation of a data hysteresis phenomenon is avoided, the correctness of the buried point is determined according to the similarity between the test result and the real buried point information, the accuracy of each buried point data does not need manual coring, the labor cost is reduced, and the overall test efficiency is improved.
Fig. 4 is a functional block diagram of an automatic testing apparatus for embedded points according to an embodiment of the present invention.
The automatic buried point testing device 100 of the present invention can be installed in an electronic device. According to the implemented functions, the automatic embedded point testing device 100 may include an embedded point event module 101, a testing result module 102, a real embedded point information module 103, and a testing report module 104. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the buried point event module 101 is configured to add a buried point event corresponding to the buried point information in the configuration platform;
the test result module 102 is configured to test the embedded point information by using an embedded point test tool that is constructed in the configuration platform in advance, so as to obtain a test result of the embedded point information;
the real embedded point information module 103 is configured to run the configuration platform, trigger all embedded points in the configuration platform, and obtain real embedded point information of the configuration platform;
and the test report module 104 is configured to perform expected value verification on a test result of the buried point information according to the real buried point information to obtain a verification result, and generate a test report according to the verification result.
Fig. 5 is a schematic structural diagram of an electronic device implementing a buried point automatic testing method according to an embodiment of the present invention.
The electronic device may include a processor 10, a memory 11, a communication bus 12, and a communication interface 13, and may further include a computer program, such as a buried automated test program, stored in the memory 11 and executable on the processor 10.
In some embodiments, the processor 10 may be composed of an integrated circuit, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same function or different functions, and includes one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device by running or executing programs or modules (for example, executing a buried automation test program, etc.) stored in the memory 11 and calling data stored in the memory 11.
The memory 11 includes at least one type of readable storage medium including flash memory, removable hard disks, multimedia cards, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disks, optical disks, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device, for example a removable hard disk of the electronic device. The memory 11 may also be an external storage device of the electronic device in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device. The memory 11 may be used to store not only application software installed in the electronic device and various data, such as codes of a buried automation test program, but also temporarily data that has been output or will be output.
The communication bus 12 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
The communication interface 13 is used for communication between the electronic device and other devices, and includes a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), which are typically used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable, among other things, for displaying information processed in the electronic device and for displaying a visualized user interface.
Only electronic devices having components are shown, it will be understood by those skilled in the art that the structures shown in the figures do not constitute limitations on the electronic devices, and may include fewer or more components than shown, or some components may be combined, or a different arrangement of components.
For example, although not shown, the electronic device may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so that functions of charge management, discharge management, power consumption management and the like are realized through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The buried point automation test program stored in the memory 11 of the electronic device is a combination of a plurality of instructions, and when running in the processor 10, can realize:
adding a buried point event corresponding to the buried point information in the configuration platform;
testing the buried point information by using a buried point testing tool constructed in the configuration platform in advance to obtain a testing result of the buried point information;
operating the configuration platform, and triggering all embedded points in the configuration platform to obtain the real embedded point information of the configuration platform;
and according to the real embedded point information, carrying out expected value verification on the test result of the embedded point information to obtain a verification result, and generating a test report according to the verification result.
Specifically, the specific implementation method of the instruction by the processor 10 may refer to the description of the relevant steps in the embodiment corresponding to the drawings, which is not described herein again.
Further, the electronic device integrated module/unit, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer readable storage medium. The computer readable storage medium may be volatile or non-volatile. For example, the computer-readable medium may include: any entity or device capable of carrying said computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, read-Only Memory (ROM).
The present invention also provides a computer-readable storage medium, storing a computer program which, when executed by a processor of an electronic device, may implement:
adding a buried point event corresponding to the buried point information in the configuration platform;
testing the buried point information by using a buried point testing tool constructed in the configuration platform in advance to obtain a testing result of the buried point information;
operating the configuration platform, and triggering all embedded points in the configuration platform to obtain the real embedded point information of the configuration platform;
and according to the real embedded point information, carrying out expected value verification on the test result of the embedded point information to obtain a verification result, and generating a test report according to the verification result.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. An automatic buried point testing method is characterized by comprising the following steps:
adding a buried point event corresponding to the buried point information in the configuration platform;
testing the buried point information by using a buried point testing tool constructed in the configuration platform in advance to obtain a testing result of the buried point information;
operating the configuration platform, and triggering all embedded points in the configuration platform to obtain the real embedded point information of the configuration platform;
and according to the real embedded point information, carrying out expected value verification on the test result of the embedded point information to obtain a verification result, and generating a test report according to the verification result.
2. The method according to claim 1, wherein the adding of the buried event corresponding to the buried information in the configuration platform comprises:
carrying out feature extraction on the buried point information to obtain buried point features of the buried point information;
clustering the buried point characteristics to obtain sub-characteristics of the buried point characteristics, and determining buried point events corresponding to the buried point information according to the sub-characteristics;
and carrying out code conversion on the embedded point event to obtain an abstract source code of the hierarchical characteristics, and adding the abstract source code into a configuration platform to finish embedded points.
3. The automatic buried point testing method of claim 2, wherein the extracting the features of the buried point information to obtain the buried point features of the buried point information comprises:
carrying out information correction on the buried point information to obtain standard information of the buried point information;
performing word segmentation processing on the standard information to obtain buried point word segmentation of the buried point information;
vectorization conversion is carried out on the buried point word segmentation to obtain word segmentation vectors of the buried point word segmentation;
and carrying out vector splicing on the vector participles to obtain a splicing matrix of the vector participles, and determining the splicing matrix as the buried point characteristics of the buried point information.
4. The automated buried point testing method of claim 1, wherein the adding of the buried point event corresponding to the buried point information in the configuration platform comprises:
selecting a buried point event type in a database of a buried point test platform according to the buried point information, wherein the buried point event type comprises at least one of an operating system type, occurrence time, identification information, function description, identification information, an application version and data generation time;
and embedding the embedded point information in a configuration platform according to the embedded point event type.
5. The method according to claim 1, wherein the testing the buried point information by using a buried point testing tool pre-built in the configuration platform to obtain a testing result of the buried point information comprises:
generating a buried point log of the buried point information according to the built buried point test tool, and screening the buried point log by using a preset primary data table index to obtain a plurality of primary buried point logs;
screening each primary buried point log according to a preset secondary data table index to obtain a plurality of secondary buried point logs;
and constructing a log table of the buried point information by using the primary buried point log and the secondary buried point log, and determining the log table as a test result of the buried point information.
6. The method according to claim 1, wherein the triggering all the burial points in the configuration platform to obtain the real burial point information of the configuration platform comprises:
performing suspension window configuration on a buried point front end interface to be configured in the configuration platform to obtain a primary front end interface of the buried point front end interface to be configured;
configuring a retrieval frame for the primary front-end interface to obtain a secondary front-end interface of the primary front-end interface;
configuring the test button on the secondary front-end interface to obtain a configured buried point front-end interface;
and acquiring a buried point version number, and generating real buried point information of the configuration platform according to the buried point version number and the configuration elements of the configured buried point front-end interface.
7. The automatic buried point testing method according to any one of claims 1 to 6, wherein the performing an expected value check on the testing result of the buried point information according to the real buried point information to obtain a check result comprises:
and carrying out expected value verification on the real buried point information by using the following similarity algorithm:
Figure FDA0003910262320000021
wherein x isThe real buried point information, y is the test result, T (x, y) represents the information similarity of the real buried point information and the test result, x k K-th data, y representing the real buried point information x k A kth datum representing the test result.
8. An automated buried point testing device, the device comprising:
the embedded point event module is used for adding embedded point events corresponding to the embedded point information in the configuration platform;
the test result module is used for testing the buried point information by using a buried point test tool which is constructed in the configuration platform in advance to obtain a test result of the buried point information;
the real embedded point information module is used for operating the configuration platform and triggering all embedded points in the configuration platform to obtain real embedded point information of the configuration platform;
and the test report module is used for carrying out expected value verification on the test result of the buried point information according to the real buried point information to obtain a verification result and generating a test report according to the verification result.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and (c) a second step of,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform a method of automated testing of a buried site as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the buried point automated testing method according to any one of claims 1 to 7.
CN202211320705.2A 2022-10-26 2022-10-26 Automatic embedded point testing method and device, electronic equipment and storage medium Pending CN115629978A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211320705.2A CN115629978A (en) 2022-10-26 2022-10-26 Automatic embedded point testing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211320705.2A CN115629978A (en) 2022-10-26 2022-10-26 Automatic embedded point testing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115629978A true CN115629978A (en) 2023-01-20

Family

ID=84907562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211320705.2A Pending CN115629978A (en) 2022-10-26 2022-10-26 Automatic embedded point testing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115629978A (en)

Similar Documents

Publication Publication Date Title
EP3916584A1 (en) Information processing method and apparatus, electronic device and storage medium
CN111813661A (en) Global service data drive automatic test method, device, equipment and medium
CN113961584A (en) Method and device for analyzing field blood relationship, electronic equipment and storage medium
CN103886092A (en) Method and device for providing terminal failure problem solutions
CN114780370A (en) Data correction method and device based on log, electronic equipment and storage medium
CN112559355A (en) Test case generation method and device, electronic equipment and storage medium
CN113434542B (en) Data relationship identification method and device, electronic equipment and storage medium
CN114419631A (en) Network management virtual system based on RPA
CN113886204A (en) User behavior data collection method and device, electronic equipment and readable storage medium
CN115310011A (en) Page display method and system and readable storage medium
CN113434397B (en) Task system testing method and device, electronic equipment and storage medium
CN114385155A (en) vue project visualization tool generation method, device, equipment and storage medium
CN115629978A (en) Automatic embedded point testing method and device, electronic equipment and storage medium
CN114968816A (en) Data simulation-based strategy testing method, device, equipment and storage medium
CN114862140A (en) Behavior analysis-based potential evaluation method, device, equipment and storage medium
CN114518993A (en) System performance monitoring method, device, equipment and medium based on business characteristics
CN113419951A (en) Artificial intelligence model optimization method and device, electronic equipment and storage medium
CN112527655A (en) Software version quality abnormity detection method and device, electronic equipment and storage medium
CN111859985A (en) AI customer service model testing method, device, electronic equipment and storage medium
CN113505117A (en) Data quality evaluation method, device, equipment and medium based on data indexes
CN115017024A (en) Interface positioning method and device, electronic equipment and computer readable storage medium
CN115795135A (en) Method, device, equipment and storage medium for detecting repetition of newly added object
CN115048501A (en) Knowledge base optimization method and device, electronic equipment and storage medium
CN115454864A (en) Automatic test method, device, equipment and storage medium for commission calculation system
CN116467166A (en) Defect information processing method, device, equipment and storage medium thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination