CN102567792A - Penetration method and penetration system - Google Patents

Penetration method and penetration system Download PDF

Info

Publication number
CN102567792A
CN102567792A CN2010105937277A CN201010593727A CN102567792A CN 102567792 A CN102567792 A CN 102567792A CN 2010105937277 A CN2010105937277 A CN 2010105937277A CN 201010593727 A CN201010593727 A CN 201010593727A CN 102567792 A CN102567792 A CN 102567792A
Authority
CN
China
Prior art keywords
penetrates
agreement
dimension
penetrating
dimension member
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105937277A
Other languages
Chinese (zh)
Other versions
CN102567792B (en
Inventor
刘岳嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Software China Co Ltd
Original Assignee
Kingdee Software China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Software China Co Ltd filed Critical Kingdee Software China Co Ltd
Priority to CN201010593727.7A priority Critical patent/CN102567792B/en
Publication of CN102567792A publication Critical patent/CN102567792A/en
Application granted granted Critical
Publication of CN102567792B publication Critical patent/CN102567792B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a penetration method and a penetration system to solve the problem that the conventional penetration operation theme is simplex. The penetration method comprises the steps as follows: a pre-arranged penetration protocol, which corresponds to the metric value selected by a source report and defines the maping relation between the dimension member corresponding to the metric value and the dimension member of a target party, is confirmed after a user's command of starting penetration is received; obtaining the dimensional value required by the penetration protocol from the source report; combining the dimensional value and the penetration protocol to generate a penetration condition; and performing penetration towards the target party according to the penetration condition, and showing the penetration result. According to the invention, through setting the target party, cross-report penetration can be completed, so as to solve the problem that the conventional penetration operation theme is complex.

Description

Penetrating method and system
Technical field
The present invention relates to technical field of data processing, more particularly, relate to penetrating method and system.
Background technology
OLAP (on-line analytical processing) forms (as depicted in figs. 1 and 2) such as liability account, detail list, voucher, cash flow statement are to be presented in the preceding width of cloth width of cloth multidimensional view of user plane, also can be described as data cube.Least unit in the OLAP form is a metric; With " Global group 2004 in the Pekinese sales volume is 100,000,000 " is example; The corresponding tissue of 100,000,000 these metrics, time, three dimensions in sales region; Can also there be different each dimension member of level of detail in a certain or some dimension, and for example, time dimension can comprise the dimension member that levels such as date, month, season, year improve gradually; And each dimension member can have concrete dimension values, is exactly " year " this dimension member's dimension values such as 2004.
Generally the penetrating to be operating as of OLAP form drills through downwards and upwards drills through, and wherein upwards drills through the detail data that is meant on certain one dimension low level and is summarized into high-level combined data, perhaps reduces dimension; Upwards drilling through then on the contrary, is to be deep into detail data from combined data to observe or increase new dimension.
Above-mentioned penetrating all is penetrating on same theme; Such as; By year assets liability account summary table penetrate into moon season balance sheet etc., and between the balance sheet, cash flow statement, profit and loss statement, inventory account, the detailed account of stock etc. direct or indirect relation is arranged all.The drilling through of single theme (penetrating) can't be accomplished OLAP form the penetrating to another OLAP form from a certain theme.
Summary of the invention
In view of this, the object of the invention is to provide penetrating method and system, to solve the existing single problem of operating theme that penetrates.
For realizing above-mentioned purpose, the present invention provides following technical scheme:
A kind of penetrating method comprises:
After the penetration promoter instruction that receives the user; Confirm the corresponding preset agreement that penetrates of the metric of being chosen with the source form, the mapping relations between each dimension member of corresponding preset corresponding each dimension member of said metric that penetrated protocol definition of said and source form and target side;
Form obtains the said dimension values that agreement needs that penetrates from said source;
Said dimension values is combined to generate the condition that penetrates with the said agreement that penetrates;
Carry out to the penetrating of said target side according to the said condition of penetrating, and show and penetrate the result.
A kind of penetrating system comprises:
Receiving interface is used to receive user instruction;
Confirm the unit; Be used for after said receiving interface receives user's penetration promoter instruction; Confirm the corresponding preset agreement that penetrates of the metric of being chosen with the source form, the mapping relations between each dimension member of corresponding preset corresponding each dimension member of said metric that penetrated protocol definition of said and source form and target side;
Acquiring unit is used for from said source that form obtains the said dimension values that penetrates the agreement needs;
Penetrate regulation engine, be used for said dimension values is combined to generate the condition that penetrates with the said agreement that penetrates;
Penetrate engine, be used for carrying out obtaining penetrating the result to the penetrating of said target side according to the said condition of penetrating;
First display unit is used to show the said result of penetrating.
Can find out from above-mentioned technical scheme; In the present invention; Mapping relations between each dimension member of determined corresponding each dimension member of user-selected moderate value that penetrated protocol definition and target side; Above-mentioned agreement combines to generate the condition of penetrating with dimension values in the form of source, utilizes the above-mentioned condition of penetrating can accomplish penetrating to target side.And through to the setting of target side, can accomplish and stride form and penetrate, be balance sheet, when target side is cash flow statement, can accomplish penetrating such as the source form by balance sheet to cash flow statement.Thereby solved the existing single problem of operating theme that penetrates.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the OLAP form;
Fig. 2 is another kind of OLAP form;
Fig. 3 is the penetrating system structural representation that the embodiment of the invention provided;
Fig. 4 is the penetrating method process flow diagram that the embodiment of the invention provided;
Fig. 5 singly selects the dialog box structural representation for the embodiment of the invention provided;
Fig. 6 is the mapping relations synoptic diagram that the embodiment of the invention provided;
Fig. 7 penetrates the agreement gui interface for the embodiment of the invention provided;
Fig. 8 is the preparation gui interface that penetrates adapter that the embodiment of the invention provided;
Fig. 9 is the browser window that the embodiment of the invention provided.
Embodiment
For quote and know for the purpose of, the technical term that hereinafter uses, write a Chinese character in simplified form or abridge and sum up as follows:
GUI, Graphical User Interface, graphic user interface;
String, character string;
OLAP: on-line analytical processing;
Dialog box: a kind of less important window, comprise button and variety of option, can accomplish particular command or task through them.The user is provided with dialog box, and computing machine will be carried out corresponding order.Radio box, check box etc. are arranged in the dialog box.Dialog box and window are had any different, and it does not have maximize button, do not minimize button, mostly can not change the shape size;
Message box: message box is the window that is used for to some promptings of user or warning.For example, message box can be carried out in application program and notify the user when going wrong in a certain task process.
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
OLAP (on-line analytical processing) forms (as depicted in figs. 1 and 2) such as liability account, detail list, voucher, cash flow statement are to be presented in the preceding width of cloth width of cloth multidimensional view of user plane, also can be described as data cube.Least unit in the OLAP form is a metric; With " Global group 2004 in the Pekinese sales volume is 100,000,000 " is example; The corresponding tissue of 100,000,000 these metrics, time, three dimensions in sales region; Can also there be different each dimension member of level of detail in a certain or some dimension, and for example, time dimension can comprise the dimension member that levels such as date, month, season, year improve gradually; And each dimension member can have concrete dimension values, is exactly " year " this dimension member's dimension values such as 2004.
Generally the penetrating to be operating as of OLAP form drills through downwards and upwards drills through, and wherein upwards drills through the detail data that is meant on certain one dimension low level and is summarized into high-level combined data, perhaps reduces dimension; Upwards drilling through then on the contrary, is to be deep into detail data from combined data to observe or increase new dimension.
Above-mentioned penetrating all is penetrating on same theme; Such as; By year assets liability account summary table penetrate into moon season balance sheet etc., and between the balance sheet, cash flow statement, profit and loss statement, inventory account, the detailed account of stock etc. direct or indirect relation is arranged all.The drilling through of single theme (penetrating) can't be accomplished OLAP form the penetrating to another OLAP form from a certain theme.
In view of this, the embodiment of the invention provides a kind of penetrating system, and Fig. 3 shows its a kind of structure, comprising:
Receiving interface 1 is used to receive user instruction;
Confirm unit 2; Be used for after receiving interface 1 receives user's penetration promoter instruction; Confirm the corresponding preset agreement (penetrating agreement can be stored in the protocol library 3) that penetrates of the metric of being chosen with the source form; In the present embodiment, the mapping relations between each dimension member of corresponding corresponding each dimension member of selected moderate value that penetrated protocol definition of above-mentioned and source form and target side;
Acquiring unit 4 is used for from the source that form obtains the said dimension values that penetrates the agreement needs;
Acquiring unit 4 can at first obtain whole dimension values that the source form is comprised, and then filters, and filters out to penetrate the dimension values that agreement needs.In addition, above-mentioned obtaining both can be that initiatively form obtains from the source, also can be the dimension values that passive reception sources form sends.
Penetrate regulation engine 5, be used for said dimension values is combined to generate the condition that penetrates with the said agreement that penetrates;
Penetrate engine 6, be used for carrying out obtaining penetrating the result to the penetrating of said target side according to the said condition of penetrating;
First display unit 7 is used to show the said result of penetrating.
Corresponding with said system, the embodiment of the invention also provides a kind of penetrating method, referring to Fig. 4, comprising:
S1, after the penetration promoter instruction that receives the user, confirm the corresponding preset agreement that penetrates of the metric of being chosen with the source form;
Penetration promoter instruction assigned multiple mode, be that the user clicks metric and just assigned the penetration promoter instruction such as a kind of mode; Also can on the form of source, button be set separately, behind the selected metric of user, click or double-click this button again and assign the penetration promoter instruction.
S2, form obtains the said dimension values that agreement needs that penetrates from said source;
S3, said dimension values is combined to generate the condition that penetrates with the said agreement that penetrates;
S4, carry out to the penetrating of said target side, and show and penetrate the result according to the said condition of penetrating.The above-mentioned result of penetrating both can be and had penetrated the failure prompting, also can be the target side that penetrates into.
It is thus clear that; Mapping relations between each dimension member of determined corresponding each dimension member of user-selected moderate value that penetrated protocol definition and target side; Above-mentioned agreement combines to generate the condition of penetrating with dimension values in the form of source, utilizes the above-mentioned condition of penetrating can accomplish penetrating to target side.And through to the setting of target side, can accomplish and stride form and penetrate, be balance sheet, when target side is cash flow statement, can accomplish penetrating such as the source form by balance sheet to cash flow statement.Thereby solved the existing single problem of operating theme that penetrates.
Above-mentioned target side can be form, even also can be the third party of non-form, and the embodiment of the invention is follow-up will give unnecessary details in detail.
To be that form is an example with the target side earlier below, technical scheme of the present invention will be described.
In the present embodiment, the concrete implementation that penetrates " carry out to the penetrating of said target side according to the said condition of penetrating, and show penetrate the result " mentioned among engine 6 and the step S4 is:
Search the target form that meets the condition of penetrating,, then show the target form find if having, otherwise, search and meet the said record that penetrates condition, use the record that finds out to generate the target form and show.Certainly, when not only searching less than existing target form but also searching less than record, but the Pop-up message frame, prompting penetrates failure.
In addition; Also can be designed to; When searching, adopt the agreement that penetrates of acquiescence to generate the condition of penetrating and penetrate, or employing regenerate the condition of penetrating with the determined agreement agreement that penetrates the most approaching or that be associated that penetrates less than the target form or the record that meet the condition of penetrating.
No matter be form or record, generally all be stored in the database that in fact the above-mentioned condition that penetrates is querying condition; The form that in database, has had some discrete types; And this form just in time is to meet above-mentionedly when penetrating condition (querying condition), can directly show the form that finds, and when not having when meeting the above-mentioned form that penetrates condition; Then in database, search and meet the above-mentioned record that penetrates condition, and use the record establishing target form that finds out to show.
The identical degree value maybe be only corresponding one penetrate agreement, also maybe be corresponding a plurality of simultaneously, when correspondence is a plurality of, only need directly to carry out getting final product, and the while is corresponding when a plurality of, just need select.In other embodiment of the present invention, more than the concrete implementation " confirmed and the corresponding preset agreement that penetrates of source form " among all embodiment can be:
Show and corresponding all the preset signs that penetrate agreement of said metric;
Sign according to the user selects confirms to penetrate agreement.
More at large say; Referring to Fig. 5, (among Fig. 5, directly point is got the metric with underscore after the user assigns the penetration promoter instruction; Just assigned the penetration promoter instruction); Current interface can eject and singly select dialog box 501, has the sign of " checking each month " and " penetrating by expense category " on this dialog box, corresponding respectively two the different agreements that penetrate of these two signs.Thereby the user can select one to above-mentioned two signs as required and select to confirm preset protocol.
Except that dialog box, can also penetrate the above-mentioned sign of presented of menu.
Certainly, in other embodiment of the present invention, can set the sign that part metric correspondence in the form of source penetrates agreement or penetrates agreement, also can't assign the penetration promoter instruction even other metrics are chosen.
Perhaps, also can set and need not to choose separately metric, need only click special button and promptly can be considered all metrics in the form of selection source.Those skilled in the art can be provided with as required flexibly, repeat no more at this.
It will be appreciated by persons skilled in the art that the target form also can be used as the source form and carries out penetrating of next round,, do not give unnecessary details at this because it penetrates similar that operation and principle and the above embodiment of the present invention are provided.Like this, can realize that balance sheet penetrates into detailed account, penetrate into voucher by detailed account again, perhaps cash flow statement of balance sheet joint investigation current accounting period or the like.
In other embodiment of the present invention, the method that above embodiment addresses also can comprise the steps:
Mapping relations between each dimension member that the definition metric is corresponding and each dimension member of target side.
Accordingly, said system also can also comprise:
Definition unit is used to define the mapping relations between each dimension member of each corresponding dimension member of metric and target side.
With a business scenario instance explanation is carried out in above-mentioned definition at present:
Suppose, show in the macromarketing summary sheet: sales volume is 100,000,000 in the Pekinese in June, 2004 in Global group.Based on above-mentioned business scenario, existing user need from the macromarketing form check the account for sales current during, sell goods detail current sales region under.
Can obtain the dimension that the macromarketing summary sheet comprises has: organization dimensionality (Global group), and time dimension (in June, 2004), sales region dimension (Beijing), metric is 100,000,000.
The dimension that comprises in the account for sales is dimension (Global group) in a organized way, time dimension (in June, 2004), and sales region dimension (Beijing), metric is 100,000,000.
Wherein, the macromarketing summary sheet still is that organization dimensionality in the account for sales all has its dimension member, and the dimension member has level; Be divided into one-level tissue and secondary tissue; That the two dimension member on time dimension also can be divided into is multistage (represent with N multistage, can comprise year, month, day, perhaps year, season, the moon, day or the like); In addition, the dimension member on the dimension of sales region also can be divided into multistage.
Fig. 6 shows a kind of definition mode one same level definition: shine upon between definition macromarketing summary sheet and account for sales identical dimensional member (also being level), with penetrating of final realization same level.
Its code segment is following:
<ODP?CACHE=’FALSE’>
<sOURCE>Sell summary sheet</SOURCE>
<dESTINATION>Account for sales</DESTINATION>
DIMENSION-MAPPING SRC_DIMENSION=' tissue ' DEST_DIMENSION=' tissue ' >
LEVEL_MAPPING SRC_LEVEL=' one-level tissue ' DEST_LEVEL=' one-level tissue '
LEVEL_MAPPING SRC_LEVEL=' secondary tissue ' DEST_LEVEL=' secondary tissue '
</DIMENSION-MAPPING>
..........
………..
………
</ODP>
In addition, also can design mapping between each dimension member of source form and target form as required.Need to prove that when the source form is multidimensional (such as a three-dimensional), and the target form is when being one dimension or two dimension; Can realize too penetrating, have time, three dimensions of tissue and sales region such as the source form, and the target form have two dimensions of tissue and sales region; Then when shining upon; Can time dimension not shone upon, form like this and penetrate agreement, and the condition that penetrates that generates thus in time will be unrestricted.
The above-mentioned agreement that penetrates is equivalent to template, when not getting access to required dimension values, also can't really carry out.Such as, suppose that the source form is a balance sheet and target side is a cash flow statement, penetrates agreement and can be: penetrate into cash flow statement by the time dimension.When the time dimension value that gets access to when the form from the source is (" 2004 " are the corresponding dimension values of " year " this dimension member) June (" 6 " be the dimension values of " month " this dimension member correspondence) in 2004, with generation penetrate in June, 2004 cash flow statement this penetrate condition.
The user can work out penetrating agreement through the agreement gui interface that penetrates as shown in Figure 7.
More than the agreement that penetrates among all embodiment generate in advance and store.In other embodiment of the present invention, also can realize penetrating the heat compiling of agreement.
Below introduction is penetrated the heat compiling of agreement.
In the present embodiment, the concrete implementation that penetrates " carry out to the penetrating of said target side according to the said condition of penetrating, and show penetrate the result " mentioned among engine 6 and the step S4 is:
Show each dimension member that metric is corresponding;
Receive the dimension member that the user selects;
Define the mapping relations between each dimension member of user-selected dimension member and target side, and generate according to said mapping relations and to penetrate agreement.
It is elaborated at present:
Behind the selected metric of user (assigning the penetration promoter instruction); Show the target report name that supply to penetrate or show it to the user and can import the operating area of target report name to the user; Receive user's the target report name of target report name selection instruction or user input at receiving interface 1 after; Dimension that the above-mentioned metric of Automatic Extraction is corresponding and the included dimension member of each dimension; The dimension and each the included dimension member of dimension that are comprised together with said target form represent to the user; The user can set the mapping relations between the dimension member and target form dimension member in the form of source, after definition is accomplished, generates according to said mapping relations and to penetrate agreement.Simultaneously, utilize form to obtain the said preset dimension values that penetrates agreement and need and combine generation to penetrate condition, penetrate with the on-the-spot agreement that penetrates that generates from the source.
Certainly, if user's select target report name or the target report name is not set voluntarily yet not is defaulted as identical with the report name of the current operation of user so.Such as user's browsing profit and loss statement, customer requirements penetrates, and the default objects form still is a profit and loss statement.
In addition, if the user does not define the mapping relations between a certain of source form and target form or some the dimension member, be defaulted as the mapping of sane level or grade so.Such as, the time dimension of source form is in April, 2010, if the user does not select the dimension member of time dimension, the default objects form also is in April, 2010.
When showing the target form to the user, cluster analysis in the data mining capable of using and correlation rule analysis displaying and source form have the target report name of dominance or recessive relation, penetrate flexibly realizing.
Corresponding with it, more than cell really among all embodiment, comprising:
Second display unit is used to show each dimension member of said metric correspondence, and obtains the dimension member that the user selects;
The agreement generation unit is used to define the mapping relations between each dimension member of user-selected dimension member and target side, and generates according to said mapping relations and to penetrate agreement.
It should be noted that; In the middle of daily service application; Preset penetrate agreement and not exclusively can satisfy demand that the user penetrates (like 2009 the 4th accounting periods of balance sheet; Penetrate into this demand of all data of the 4th accounting period of 2,008 first accounting periods to 2009), at this moment, can use to penetrate adapter and accomplish.
Penetrate adapter and have concurrently at least in the said system and to confirm unit, acquiring unit, the function that penetrates regulation engine and penetrate engine, and self store in advance and penetrate agreement.One penetrates the function that penetrates that protocol translation goes out that penetrates that adapter generally only can be accomplished self to store in advance, has specificity.And above all embodiment mention really cell, acquiring unit, penetrate regulation engine and penetrate engine and have universal.
The above-mentioned target side of having introduced is a form, will be object to penetrate into the third party below, and the present invention is introduced.
The third party penetrated generally penetrate adapter and realize that the preparation gui interface that penetrates adapter can be referring to Fig. 8 with URL.
Penetrating at URL has two kinds to fill out method in the adapter:
One, the URL address of writing direct:
Suppose that the user needs to do an explanation for non-financial staff on " capital assets " degree of correlation value, a URL of definable penetrates, and target side is " Baidu ".Can directly penetrate in the adapter at URL and insert " http://zhidao.baidu.com/q? word=getDimensionValue (' item ')>&ct=17&pn=0&tn=ikaslist&rn=10&1m=0&fr=search "; Wherein the meaning of the expression formula between <>is to obtain the dimension values of current metric, like capital assets.
When the user clicks " capital assets ", can eject and penetrate menu, in penetrating menu, can show " explanation " printed words, when the user clicks " explanation " printed words, can open browser window as shown in Figure 9.
Two, fill in the class.path that penetrates plug-in unit, so that introduce plug-in unit jar bag.
For example, insert the class.path of plug-in unit:
com.kingdee.drillthrough.plugin.TranslationDrillThroughPlugi。In the second way, penetrate plug-in unit and need inherit superclass AbstractDrillThroughAdapter (this type of penetrates the highest abstract class of adapter for all).
Each embodiment adopts the mode of going forward one by one to describe in this instructions, and what each embodiment stressed all is and the difference of other embodiment that identical similar part is mutually referring to getting final product between each embodiment.For disclosed system of embodiment and device, because it is corresponding with the embodiment disclosed method, so description is fairly simple, relevant part is partly explained referring to method and is got final product.
One of ordinary skill in the art will appreciate that and realize all or part of flow process in the disclosed method among above-mentioned all embodiment; Be to instruct relevant hardware to accomplish through computer program; Described program can be stored in the computer read/write memory medium; Said program can comprise the flow process like the embodiment of above-mentioned each side method when carrying out.Wherein, described storage medium can be magnetic disc, CD, read-only storage memory body (Read-Only Memory, ROM) or at random store memory body (Random AccessMemory, RAM) etc.
In addition, the mode that said procedure can running background is carried out snapshot operation to data.Certainly; Form that also can control embeds a certain type or some system, operation interface (similar Kingsoft Powerword can embed among the Word), perhaps occurs with the form of software independently; At this moment; When the user need carry out snapshot operation to data, can or double-click start said procedure through click, and and then accomplish functions such as snapshot operation, data query, data recovery.
To the above-mentioned explanation of the disclosed embodiments, make this area professional and technical personnel can realize or use the present invention.Multiple modification to these embodiment will be conspicuous concerning those skilled in the art, and defined General Principle can realize under the situation that does not break away from the spirit or scope of the present invention in other embodiments among this paper.Therefore, the present invention will can not be restricted to these embodiment shown in this paper, but will meet and principle disclosed herein and features of novelty the wideest corresponding to scope.

Claims (8)

1. a penetrating method is characterized in that, said method comprises:
After the penetration promoter instruction that receives the user; Confirm the corresponding preset agreement that penetrates of the metric of being chosen with the source form, the mapping relations between each dimension member of corresponding preset corresponding each dimension member of said metric that penetrated protocol definition of said and source form and target side;
Form obtains the said dimension values that agreement needs that penetrates from said source;
Said dimension values is combined to generate the condition that penetrates with the said agreement that penetrates;
Carry out to the penetrating of said target side according to the said condition of penetrating, and show and penetrate the result.
2. the method for claim 1 is characterized in that, said target side is specially the target form;
Saidly carry out to the penetrating of said target side, and show that the concrete implementation that penetrates the result is according to the said condition of penetrating:
Search and meet the said target form that penetrates condition,, then show the target form that finds if having, otherwise, search and meet the said record that penetrates condition, use the record that finds out to generate the target form and show.
3. the method for claim 1 is characterized in that:
Said confirm with the corresponding preset concrete implementation that penetrates agreement of source form be:
Show and corresponding all the preset signs that penetrate agreement of said metric;
Sign according to the user selects confirms to penetrate agreement.
4. method as claimed in claim 3 is characterized in that, also comprises:
Define the mapping relations between each dimension member of each corresponding dimension member of said metric and target side.
5. method as claimed in claim 2 is characterized in that:
Said confirm with the corresponding preset concrete implementation that penetrates agreement of source form be:
Show each dimension member that said metric is corresponding;
Receive the dimension member that the user selects;
Define the mapping relations between each dimension member of user-selected dimension member and target side, and generate according to said mapping relations and to penetrate agreement.
6. a penetrating system is characterized in that, comprising:
Receiving interface is used to receive user instruction;
Confirm the unit; Be used for after said receiving interface receives user's penetration promoter instruction; Confirm the corresponding preset agreement that penetrates of the metric of being chosen with the source form, the mapping relations between each dimension member of corresponding preset corresponding each dimension member of said metric that penetrated protocol definition of said and source form and target side;
Acquiring unit is used for from said source that form obtains the said dimension values that penetrates the agreement needs;
Penetrate regulation engine, be used for said dimension values is combined to generate the condition that penetrates with the said agreement that penetrates;
Penetrate engine, be used for carrying out obtaining penetrating the result to the penetrating of said target side according to the said condition of penetrating;
First display unit is used to show the said result of penetrating.
7. system as claimed in claim 6 is characterized in that, also comprises:
Definition unit is used to define the mapping relations between each dimension member of each corresponding dimension member of said metric and target side.
8. method as claimed in claim 6 is characterized in that:
Said definite unit comprises:
Second display unit is used to show each dimension member of said metric correspondence, and obtains the dimension member that the user selects;
The agreement generation unit is used to define the mapping relations between each dimension member of user-selected dimension member and target side, and generates the preset agreement that penetrates according to said mapping relations.
CN201010593727.7A 2010-12-17 2010-12-17 Penetration method and penetration system Active CN102567792B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010593727.7A CN102567792B (en) 2010-12-17 2010-12-17 Penetration method and penetration system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010593727.7A CN102567792B (en) 2010-12-17 2010-12-17 Penetration method and penetration system

Publications (2)

Publication Number Publication Date
CN102567792A true CN102567792A (en) 2012-07-11
CN102567792B CN102567792B (en) 2014-07-09

Family

ID=46413163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010593727.7A Active CN102567792B (en) 2010-12-17 2010-12-17 Penetration method and penetration system

Country Status (1)

Country Link
CN (1) CN102567792B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102867068A (en) * 2012-09-28 2013-01-09 用友软件股份有限公司 Report penetration device and report penetration method for online analytical processing system
CN103942633A (en) * 2013-12-26 2014-07-23 远光软件股份有限公司 Audit result data presentation and data penetrating system and method
CN104050181A (en) * 2013-03-13 2014-09-17 金蝶软件(中国)有限公司 Electronic form penetrating inquiring method and device
CN107818098A (en) * 2016-09-12 2018-03-20 阿里巴巴集团控股有限公司 A kind of processing method of report data, device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1573754A (en) * 2003-06-24 2005-02-02 微软公司 System and method for online analytical processing using dimension attributes and multiple hierarchies per dimension
CN101271447A (en) * 2007-11-23 2008-09-24 金蝶软件(中国)有限公司 Method and system for completing report forms analysis
CN101556605A (en) * 2009-05-13 2009-10-14 用友软件股份有限公司 Free penetrating method of report data based on two-dimensional query model and system thereof
CN101673293A (en) * 2009-10-15 2010-03-17 金蝶软件(中国)有限公司 Method and system of joint check of report forms

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1573754A (en) * 2003-06-24 2005-02-02 微软公司 System and method for online analytical processing using dimension attributes and multiple hierarchies per dimension
CN101271447A (en) * 2007-11-23 2008-09-24 金蝶软件(中国)有限公司 Method and system for completing report forms analysis
CN101556605A (en) * 2009-05-13 2009-10-14 用友软件股份有限公司 Free penetrating method of report data based on two-dimensional query model and system thereof
CN101673293A (en) * 2009-10-15 2010-03-17 金蝶软件(中国)有限公司 Method and system of joint check of report forms

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102867068A (en) * 2012-09-28 2013-01-09 用友软件股份有限公司 Report penetration device and report penetration method for online analytical processing system
CN104050181A (en) * 2013-03-13 2014-09-17 金蝶软件(中国)有限公司 Electronic form penetrating inquiring method and device
CN104050181B (en) * 2013-03-13 2018-03-20 深圳金蝶账无忧网络科技有限公司 A kind of electronic spreadsheet penetrates querying method and device
CN103942633A (en) * 2013-12-26 2014-07-23 远光软件股份有限公司 Audit result data presentation and data penetrating system and method
CN107818098A (en) * 2016-09-12 2018-03-20 阿里巴巴集团控股有限公司 A kind of processing method of report data, device and electronic equipment

Also Published As

Publication number Publication date
CN102567792B (en) 2014-07-09

Similar Documents

Publication Publication Date Title
US9336267B2 (en) Method and system for navigation and visualization of data in relational and/or multidimensional databases
CN102549563B (en) Semantic trading floor
US8887044B1 (en) Visually distinguishing portions of content
CN101755282B (en) Method and system for providing inter-area communication of map
US9734257B2 (en) Exported overlays
CN101622619B (en) Method and system for navigation and visualization of data in relational and/or multidimensional databases
JP2009512070A (en) System, method, and computer program product for concept-based search and analysis
CN102982084A (en) Multi-dimentional data report
CN103098051A (en) Search engine optmization assistant
US8001154B2 (en) Library description of the user interface for federated search results
CN103019693A (en) System and method for generating user interface
CN102428426A (en) User interface to display tabular source data in a small screen display area
CN102521414B (en) Data mining device and data mining method
US20080319782A1 (en) Methods of collecting and visualizing group information
US20150178259A1 (en) Annotation hint display
CN103605502A (en) Form page display method and server
CN102567792B (en) Penetration method and penetration system
CN105122199A (en) System for selectively displaying content
CN113076731A (en) Report file generation method and device, computer equipment and storage medium
CN102024182A (en) System for managing asset information
CN106462933A (en) Using content structure to socially connect users
CN1670715B (en) Address support for resources in common-language runtime languages
US11321746B2 (en) Ad simulator browser extension
Gil-Leiva et al. The abandonment of the assignment of subject headings and classification codes in University Libraries due to the massive emergence of electronic books
CN113656724B (en) Method and system for dynamically configuring webpage function based on web page

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant