CN108255486A - For view conversion method, device and the electronic equipment of form design - Google Patents

For view conversion method, device and the electronic equipment of form design Download PDF

Info

Publication number
CN108255486A
CN108255486A CN201711378618.1A CN201711378618A CN108255486A CN 108255486 A CN108255486 A CN 108255486A CN 201711378618 A CN201711378618 A CN 201711378618A CN 108255486 A CN108255486 A CN 108255486A
Authority
CN
China
Prior art keywords
cryptographic hash
source code
view
node
design
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711378618.1A
Other languages
Chinese (zh)
Other versions
CN108255486B (en
Inventor
赵振国
吕英祖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft Corp filed Critical Neusoft Corp
Priority to CN201711378618.1A priority Critical patent/CN108255486B/en
Publication of CN108255486A publication Critical patent/CN108255486A/en
Application granted granted Critical
Publication of CN108255486B publication Critical patent/CN108255486B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/38Creation or generation of source code for implementing user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/44Encoding
    • G06F8/443Optimisation
    • G06F8/4432Reducing the energy consumption

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This disclosure relates to a kind of view conversion method, device and electronic equipment for form design, is related to information technology field, this method includes:When switching from the source code view of the first list to Design view, obtain the first cryptographic Hash of current source code in source code view, second cryptographic Hash of the first cryptographic Hash and history source code is compared, history source code is the source code in source code view when switching from source code view to Design view the last time, when the first cryptographic Hash is identical with the second cryptographic Hash, the last Design view rendered is shown.The consumption frequently rendered in view transfer process to hardware resource can be reduced, improves the speed of view conversion.

Description

For view conversion method, device and the electronic equipment of form design
Technical field
This disclosure relates to information technology field, and in particular, to a kind of view conversion method for form design, device And electronic equipment.
Background technology
With the fast development of the information technologies such as internet, the forms traffic applied to fields such as industry, government affairs, management is all Begin to use electronic spreadsheet.Electronic spreadsheet can collect a large amount of data information and the number that can be stored in local or high in the clouds According in library, convenient for being analyzed data, being retrieved and counted.Existing form design device is generally divided into two kinds of views:If View and source code view are counted, wherein what Design view showed is the list after rendering, can pass through the modes such as dragging, typing To list directly into edlin, what source code view showed is the corresponding source code of list, is provided for form design more various Editor's approach.
In existing form design device, each time transfer process from source code view to Design view, no matter source code regards Whether the source code in figure changes, and is required for re-starting source code compiling, and rendering generation design is re-started to list and is regarded Figure, consumes hardware resource and time.
Invention content
The purpose of the disclosure is to provide a kind of view conversion method, device and electronic equipment for form design, to Solve the problems, such as the consumption of source code view time and hardware resource into the transfer process of Design view.
To achieve these goals, according to the embodiment of the present disclosure in a first aspect, providing a kind of regarding for form design Figure conversion method, the method includes:
When switching from the source code view of the first list to Design view, of current source code in the source code view is obtained One cryptographic Hash;
Second cryptographic Hash of first cryptographic Hash and history source code is compared, the history source code be it is last from The source code view to the Design view switch when the source code view in source code;
When first cryptographic Hash is identical with second cryptographic Hash, the last Design view rendered is shown.
Optionally, first cryptographic Hash for obtaining current source code in the source code view, including:
By carrying out format analysis processing to the current source code, the space in the current source code and null are removed;
To form, treated that the current source code carries out Hash calculation obtains first cryptographic Hash.
Optionally, the method further includes:
When first cryptographic Hash and second cryptographic Hash differ, the Design view is rendered again.
Optionally, it is described when first cryptographic Hash and second cryptographic Hash differ, the design is rendered again View, including:
When first cryptographic Hash and second cryptographic Hash differ, obtained according to the current source code and worked as with described The corresponding first form controls tree of preceding source code, each node of the first form controls tree correspond to one in first list A control;
According to the attribute of control corresponding to each node of the first form controls tree, first form controls is obtained The cryptographic Hash of each node of tree;
According to node each in the cryptographic Hash of node each in the first form controls tree and the second form controls tree Cryptographic Hash determines to need the control rendered again, and the second form controls tree is the list obtained according to the history source code Control tree.
Optionally, in the cryptographic Hash and the second form controls tree according to node each in the first form controls tree The cryptographic Hash of each node, determines to need the control rendered again, including:
By by pair in the cryptographic Hash and the second form controls tree of node each in the first form controls tree The cryptographic Hash of node is answered to be compared, determines whether the cryptographic Hash of each node in the first form controls tree changes;
Cryptographic Hash changes in the first form controls tree node is obtained as destination node;
It is the control for needing to render again to determine the destination node.
Optionally, in the cryptographic Hash and the second form controls tree according to node each in the first form controls tree The cryptographic Hash of each node, determines to need the control rendered again, further include:
When all child nodes of first node belong to the destination node, using the first node as the target section Point, the first node are any node in the first form controls tree.
According to the second aspect of the embodiment of the present disclosure, a kind of view conversion equipment for form design, the dress are provided Put including:
Acquisition module, for when switching from the source code view of the first list to Design view, obtaining the source code view In current source code the first cryptographic Hash;
Contrast module, for the second cryptographic Hash of first cryptographic Hash and history source code to be compared, the history Source code is the source code in source code view when switching from the source code view to the Design view last time;
Judgment module, for when first cryptographic Hash is identical with second cryptographic Hash, showing last rendering The Design view.
Optionally, the acquisition module includes:
Submodule is handled, for by carrying out format analysis processing to the current source code, removing the sky in the current source code Lattice and null;
Computational submodule, for treated that the current source code carries out Hash calculation obtains first Hash to form Value.
Optionally, the judgment module is additionally operable to:
When first cryptographic Hash and second cryptographic Hash differ, the Design view is rendered again.
Optionally, the judgment module includes:
Control tree acquisition submodule, for when first cryptographic Hash and second cryptographic Hash differ, according to institute It states current source code and obtains the first form controls tree corresponding with the current source code, each node of the first form controls tree A control in corresponding first list;
Cryptographic Hash acquisition submodule, for the category of control corresponding to each node according to the first form controls tree Property, the cryptographic Hash of each node of acquisition the first form controls tree;
Judging submodule, for the cryptographic Hash and the second form controls according to node each in the first form controls tree The cryptographic Hash of each node in tree, determines to need the control rendered again, and the second form controls tree is according to the history The form controls tree that source code obtains.
Optionally, the judging submodule is used for:
By by pair in the cryptographic Hash and the second form controls tree of node each in the first form controls tree The cryptographic Hash of node is answered to be compared, determines whether the cryptographic Hash of each node in the first form controls tree changes;
Cryptographic Hash changes in the first form controls tree node is obtained as destination node;
It is the control for needing to render again to determine the destination node.
Optionally, the judging submodule is additionally operable to:
When all child nodes of first node belong to the destination node, using the first node as the target section Point, the first node are any node in the first form controls tree.
According to the third aspect of the embodiment of the present disclosure, a kind of computer readable storage medium is provided, is stored thereon with calculating Machine program realizes the view conversion method for form design that first aspect provides when the computer program is executed by processor The step of.
According to the fourth aspect of the embodiment of the present disclosure, a kind of electronic equipment is provided, including:The computer that the third aspect provides Readable storage medium storing program for executing;And one or more processors, for performing the computer journey in the computer readable storage medium Sequence.
Through the above technical solutions, during switching from source code view to Design view, the disclosure is by obtaining source The corresponding cryptographic Hash of current source code in code view, and the cryptographic Hash of acquisition is switched with the last time from source code view to Design view The cryptographic Hash obtained in the process is compared, and when comparing result is consistent, determines that the source code in source code view does not change, It does not need to render list again, the Design view before switching to source code view can be retained.View can be reduced to turn The consumption to hardware resource is frequently rendered during changing, improves the speed of view conversion.
Other feature and advantage of the disclosure will be described in detail in subsequent specific embodiment part.
Description of the drawings
Attached drawing is for providing further understanding of the disclosure, and a part for constitution instruction, with following tool Body embodiment is used to explain the disclosure, but do not form the limitation to the disclosure together.In the accompanying drawings:
Fig. 1 is the flow chart according to a kind of view conversion method for form design shown in an exemplary embodiment;
Fig. 2 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment Figure;
Fig. 3 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment Figure;
Fig. 4 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment Figure;
Fig. 5 is the block diagram according to a kind of view conversion equipment for form design shown in an exemplary embodiment;
Fig. 6 is the block diagram for the view conversion equipment of form design according to the another kind shown in an exemplary embodiment;
Fig. 7 is the block diagram for the view conversion equipment of form design according to the another kind shown in an exemplary embodiment;
Fig. 8 is the block diagram according to a kind of electronic equipment shown in an exemplary embodiment.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, example is illustrated in the accompanying drawings.Following description is related to During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Introduce the disclosure offer for the view conversion method of form design, device and electronic equipment before, first To the disclosure, application scenarios involved by each embodiment are introduced.The application scenarios are form design device, including design Two kinds of views of view and source code view.User can by source code view the modes such as dragging, typing carry out form design, also Source code view can be switched to, the different controls in list are operated by writing source code, after the completion of operation, by source code View is switched to Design view, and the corresponding list of source code can be checked in Design view.
Fig. 1 be according to a kind of flow chart of view conversion method for form design shown in an exemplary embodiment, As shown in Figure 1, this method includes:
Step 101, when switching from the source code view of the first list to Design view, current source code in source code view is obtained The first cryptographic Hash.
For example, user designs the first list by form design device, can be divided into two kinds of scenes:User is first led to Design view is crossed, the different controls in the first list are designed, later, the first list is switched to source code from Design view View further edits the corresponding source code of the first list, such as can edit the category of some control in the first list Property (background color, calculation formula, sequence or data format etc.).Another scene can be user directly in source code view into Row source code is write, and sets the attribute of different controls in the first list.When user completes after writing of source code in source code view, need To switch from the source code view of the first list to Design view, show state i.e. with check the first list in Design view. During switching from source code view to Design view, Hash calculation is carried out to source code current in source code view, first is obtained and breathes out Uncommon value.
Step 102, the second cryptographic Hash of the first cryptographic Hash and history source code is compared, history source code be it is last from Source code view to Design view switch when source code view in source code.
It is exemplary, upper once from source code view into Design view handoff procedure, obtain and store in source code view The primary corresponding cryptographic Hash of history source code, as second cryptographic Hash.Since the cryptographic Hash of one piece of data is unique, if The change of a byte or multiple bytes has occurred in this segment data, and the corresponding cryptographic Hash of data after changing can all be caused also to occur Variation, therefore can be by comparing the first cryptographic Hash and the second cryptographic Hash, judging that the current source code in source code view is opposite Whether changed in last history source code.
Step 103, when the first cryptographic Hash is identical with the second cryptographic Hash, the last Design view rendered is shown.
It is exemplary, when the first cryptographic Hash is identical with the second cryptographic Hash, it can determine current source code in source code view and go through History source code is completely the same, does not generate any change, then corresponding Design view will not generate change, therefore not need to pair List is rendered again, can show the Design view of last rendering, that is, is retained and switched to current source code view The corresponding display state of Design view before, wherein the last Design view rendered is the source changed according to the last time Code (can be understood as before current time, the source code apart from the modification of the last time at current time) renders what is obtained.Therefore, should Last time modification source code may be above-mentioned history source code or the history source code before source code.It can understand No matter between source code view and Design view to switch how many times, as long as first cryptographic Hash when being converted to Design view It is identical with the second cryptographic Hash, just illustrate that source code does not change, without rendering Design view again, until first cryptographic Hash and the During two cryptographic Hash differences, then Design view is rendered again.
In conclusion during switching from source code view to Design view, the disclosure is by obtaining in source code view The current corresponding cryptographic Hash of source code, and the cryptographic Hash of acquisition is obtained from source code view into Design view handoff procedure with last Cryptographic Hash compared, when comparing result is consistent, determine that the source code in source code view does not change, do not need to pair List is rendered again, can retain the Design view before switching to source code view.It can reduce in view transfer process The consumption to hardware resource is frequently rendered, improves the speed of view conversion.
Fig. 2 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment Figure, as shown in Fig. 2, step 101 includes:
Step 1011, by carrying out format analysis processing to current source code, the space in current source code and null are removed.
Step 1012, to form, treated that current source code carries out Hash calculation obtains the first cryptographic Hash.
For example, after the first list is switched to source code view by user from Design view, to the source in source code view Code has only made the modification of form, does not carry out the substantial modifications in relation to the first form attributes, such as:Space, null are deleted, Space, null are either added to again or under the premise of original sentence meaning is not changed, long sentence enter a new line etc. Reason all only has modified the form of source code, and to the first list, there is no actual influences, are designed accordingly also without rendering again View, thus to avoid re-starting the first list because of source code form modifying render caused by hardware resource and time Waste before Hash calculation is carried out to current source code, first can carry out format analysis processing to current source code, remove in current source code Space and null and then carry out Hash calculation obtain the first cryptographic Hash.
Fig. 3 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment Figure, as shown in figure 3, this method further includes:
Step 104, when the first cryptographic Hash and the second cryptographic Hash differ, Design view is rendered again.
It is exemplary, when the first cryptographic Hash and the second cryptographic Hash differ, it can determine current source code and history source code not Unanimously, i.e., current source code is changed compared with history source code, it is therefore desirable to which list is rendered again.
Fig. 4 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment Figure, as shown in figure 4, step 104 includes:
Step 1041, it when the first cryptographic Hash and the second cryptographic Hash differ, is obtained and current source code according to current source code Corresponding first form controls tree, each node of the first form controls tree correspond to a control in the first list.
For example, corresponding first form controls tree is obtained according to current source code, wherein in the first form controls tree Each node represents that a control of the first list, such as root node can be expressed as the first list and (can be regarded as in itself The control of top in first list), the corresponding control of any child node in the first form controls tree belongs to the node The corresponding control of father node.
Step 1042, according to corresponding to each node of the first form controls tree control attribute, obtain the first list control The cryptographic Hash of each node of part tree.
Exemplary, each control of the first list has corresponding attribute, according to each section in the first form controls tree The corresponding property value of each control of first list in control corresponding to point and current source code obtains the cryptographic Hash of each node. For example, first node is any node in the first form controls tree, it is first determined first node corresponds to the first of the first list Control, then Hash calculation is carried out to the corresponding property value of the first control in current source code, the cryptographic Hash of acquisition is as first node Cryptographic Hash.
Step 1043, it is each saved according in the cryptographic Hash of node each in the first form controls tree and the second form controls tree The cryptographic Hash of point, determines to need the control rendered again, the second form controls tree is the form controls obtained according to history source code Tree.
It is exemplary, upper once from source code view into Design view handoff procedure, second is obtained according to history source code It the cryptographic Hash of each node and is preserved in form controls tree and the second form controls tree, in the first form controls tree is obtained After the cryptographic Hash of each node, compare in the first form controls tree in the cryptographic Hash of each node and the second form controls tree each The cryptographic Hash of node determines the control corresponding to cryptographic Hash changes in the first form controls tree node to need to render again Control.
Exemplary, step 1043 can be realized by following steps:
First, by the way that corresponding in the cryptographic Hash and the second form controls tree of node each in the first form controls tree is saved The cryptographic Hash of point is compared, and determines whether the cryptographic Hash of each node in the first form controls tree changes.Secondly, the is obtained The node that cryptographic Hash changes in one form controls tree is as destination node.Finally, determine destination node to need to render again Control.
For example, this (can be understood as with first node of the first form controls tree in the second form controls tree The current source code of secondary editor with all there are the corresponding controls of the first node in the history source code that last time edits) for, by first The cryptographic Hash of first node in form controls tree and the cryptographic Hash of the first node of the second form controls tree compare, when first When cryptographic Hash of the node in the first form controls tree and the cryptographic Hash of first node in the second form controls tree differ, determine The cryptographic Hash of the first node changes, and using the first node as destination node, can similarly determine the first list control Whether the cryptographic Hash of each node changes in part tree.Further, corresponding control is determined according to destination node, and will be corresponding Control as the control for needing to render again.It should be noted that destination node can be a set, including one Or multiple nodes, and have recorded position or serial number of the destination node in the first form controls tree or can also be by mesh It makes marks on mark node come the position or serial number that destination node is identified in the first form controls tree.
It can be interpreted as completing source code editor every time, before Design view switching, be given birth to according to the source code of this editor Into and preserve a form controls tree, to record the cryptographic Hash of each node of the form controls tree, so as to next time to setting When counting view switching, which node Hash judged using the form controls tree of last time preservation and the cryptographic Hash of each of which node Value changes, so as to which the control when being switched to Design view to cryptographic Hash corresponding to changed node carries out wash with watercolours again Dye.
In addition, in another implementation, form controls tree can not also be preserved when switching every time to Design view, only The cryptographic Hash of each node is calculated and preserves, so as to when switching to Design view next time, be preserved using the last time each The cryptographic Hash of node judges which node cryptographic Hash changes.It, can be upper once to setting by taking above-mentioned first node as an example When counting view switching, the cryptographic Hash of node each in the second form controls tree of last time generation is recorded in a cryptographic Hash In table.Thus when this switches to Design view, it can be by the current cryptographic Hash of the first node and the cryptographic Hash table The cryptographic Hash of the first node recorded in lattice is compared, when the current cryptographic Hash and in cryptographic Hash table first of first node When the cryptographic Hash of node differs, determine that the cryptographic Hash of the first node changes, and using the first node as target section Point, can similarly determine whether the cryptographic Hash of each node changes.
Further, step 1043 further includes:
When all child nodes of first node belong to destination node, using first node as destination node, first node For any node in the first form controls tree.
It is exemplary, if a control includes multiple controls, corresponding in the first form controls tree, an as node Multiple child nodes are contained, by taking first node as an example, when all child nodes of first node belong to destination node, representing should The corresponding control of all child nodes under first node is required to render again, is also equivalent to need that first node is corresponding Control renders again, therefore can be directly using first node as destination node.Further, using first node as target section All child nodes of first node can be deleted from destination node after point.For example, when destination node is set, by this All child nodes of first node are deleted in set, when destination node is identified by way of label, then by first The label removal of all child nodes of node.
In conclusion during switching from source code view to Design view, the disclosure is by obtaining in source code view The current corresponding cryptographic Hash of source code, and the cryptographic Hash of acquisition is obtained from source code view into Design view handoff procedure with last Cryptographic Hash compared, when comparing result is consistent, determine that the source code in source code view does not change, do not need to pair List is rendered again, can retain the Design view before switching to source code view.It can reduce in view transfer process The consumption to hardware resource is frequently rendered, improves the speed of view conversion.
Fig. 5 is according to a kind of block diagram of view conversion equipment for form design shown in an exemplary embodiment, such as Shown in Fig. 5, which includes:
Acquisition module 201, for when switching from the source code view of the first list to Design view, obtaining in source code view First cryptographic Hash of current source code.
Contrast module 202, for the second cryptographic Hash of the first cryptographic Hash and history source code to be compared, history source code is The source code in source code view when last time switches from from source code view to Design view.
Judgment module 203, for when the first cryptographic Hash is identical with the second cryptographic Hash, showing that the last design rendered regards Figure.
Fig. 6 is the block diagram for the view conversion equipment of form design according to the another kind shown in an exemplary embodiment, As shown in fig. 6, acquisition module 201 includes:
Handle submodule 2011, for by carrying out format analysis processing to current source code, remove space in current source code and Null.
Computational submodule 2012, for treated that current source code carries out Hash calculation obtains the first cryptographic Hash to form.
Optionally, judgment module 203 is additionally operable to:
When the first cryptographic Hash and the second cryptographic Hash differ, Design view is rendered again.
Fig. 7 is the block diagram for the view conversion equipment of form design according to the another kind shown in an exemplary embodiment, As shown in fig. 7, judgment module 203 includes:
Control tree acquisition submodule 2031, for when the first cryptographic Hash and the second cryptographic Hash differ, according to current source Code obtains the first form controls tree corresponding with current source code, and each node of the first form controls tree is corresponded in the first list One control.
Cryptographic Hash acquisition submodule 2032, for the category of control corresponding to each node according to the first form controls tree Property, the cryptographic Hash of each node of the first form controls tree of acquisition.
Judging submodule 2033, for the cryptographic Hash and the second form controls according to node each in the first form controls tree The cryptographic Hash of each node in tree, determines to need the control rendered again, and the second form controls tree is to be obtained according to history source code Form controls tree.
Optionally, judging submodule 2033 is used for:
By by the corresponding node in the cryptographic Hash and the second form controls tree of node each in the first form controls tree Cryptographic Hash is compared, and determines whether the cryptographic Hash of each node in the first form controls tree changes.
Cryptographic Hash changes in the first form controls tree node is obtained as destination node.
It is the control for needing to render again to determine destination node.
Further, judging submodule 2033 is additionally operable to:
When all child nodes of first node belong to destination node, using first node as destination node, first node For any node in the first form controls tree.
About the device in above-described embodiment, wherein modules perform the concrete mode of operation in related this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
In conclusion during switching from source code view to Design view, the disclosure is by obtaining in source code view The current corresponding cryptographic Hash of source code, and the cryptographic Hash of acquisition is obtained from source code view into Design view handoff procedure with last Cryptographic Hash compared, when comparing result is consistent, determine that the source code in source code view does not change, do not need to pair List is rendered again, can retain the Design view before switching to source code view.It can reduce in view transfer process The consumption to hardware resource is frequently rendered, improves the speed of view conversion.
Fig. 8 is the block diagram according to a kind of electronic equipment 800 shown in an exemplary embodiment.As shown in figure 8, the electronics is set Standby 800 can include:Processor 801, memory 802, multimedia component 803, input/output (I/O) interface 804, Yi Jitong Believe component 805.
Wherein, processor 801 is used to control the integrated operation of the electronic equipment 800, to complete above-mentioned to set for list All or part of step in the view conversion method of meter.Memory 802 is used to store various types of data to support at this The operation of electronic equipment 800, these data can for example include any application program for being operated on the electronic equipment 800 Or the instruction of method and the relevant data of application program, such as contact data, the message of transmitting-receiving, picture, audio, video Etc..The memory 802 can be by any kind of volatibility or non-volatile memory device or combination thereof realization, example Such as static RAM (Static Random Access Memory, abbreviation SRAM), electrically erasable is read-only Memory (Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), it is erasable Programmable read only memory (Erasable Programmable Read-Only Memory, abbreviation EPROM) may be programmed read-only Memory (Programmable Read-Only Memory, abbreviation PROM), read-only memory (Read-Only Memory, letter Claim ROM), magnetic memory, flash memory, disk or CD.Multimedia component 803 can include screen and audio component.Its Middle screen for example can be touch screen, and audio component is for output and/or input audio signal.For example, audio component can wrap A microphone is included, microphone is used to receive external audio signal.The received audio signal can be further stored in and deposit Reservoir 802 is sent by communication component 805.Audio component further includes at least one loud speaker, for exports audio signal.I/ O Interface 804 provides interface between processor 801 and other interface modules, other above-mentioned interface modules can be keyboard, mouse Mark, button etc..These buttons can be virtual push button or entity button.Communication component 805 is for the electronic equipment 800 and its Wired or wireless communication is carried out between his equipment.Wireless communication, such as Wi-Fi, bluetooth, near-field communication (Near Field Communication, abbreviation NFC), 2G, 3G or 4G or they one or more of combination, therefore corresponding communication Component 805 can include:Wi-Fi module, bluetooth module, NFC module.
In one exemplary embodiment, electronic equipment 800 can be by one or more application application-specific integrated circuit (Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (Digital Signal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device, Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array (Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics member Part is realized, for performing the above-mentioned view conversion method for form design.
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction, example are additionally provided Such as include the memory 802 of program instruction, above procedure instruction can be performed by the processor 801 of electronic equipment 800 in completion The view conversion method for form design stated.
In conclusion during switching from source code view to Design view, the disclosure is by obtaining in source code view The current corresponding cryptographic Hash of source code, and the cryptographic Hash of acquisition is obtained from source code view into Design view handoff procedure with last Cryptographic Hash compared, when comparing result is consistent, determine that the source code in source code view does not change, do not need to pair List is rendered again, can retain the Design view before switching to source code view.It can reduce in view transfer process The consumption to hardware resource is frequently rendered, improves the speed of view conversion.
The preferred embodiment of the disclosure is described in detail above in association with attached drawing, still, the disclosure is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the disclosure, those skilled in the art are considering specification and practice After the disclosure, it is readily apparent that other embodiments of the disclosure, belongs to the protection domain of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case of shield, it can be combined by any suitable means.Simultaneously between a variety of different embodiments of the disclosure Arbitrary combination can also be carried out, as long as its thought without prejudice to the disclosure, should equally be considered as disclosure disclosure of that. The disclosure is not limited to the precision architecture being described above out, and the scope of the present disclosure is only limited by appended claim System.

Claims (10)

1. a kind of view conversion method for form design, which is characterized in that the method includes:
When switching from the source code view of the first list to Design view, the first Kazakhstan of current source code in the source code view is obtained Uncommon value;
Second cryptographic Hash of first cryptographic Hash and history source code is compared, the history source code is last from described Source code view to the Design view switch when the source code view in source code;
When first cryptographic Hash is identical with second cryptographic Hash, the last Design view rendered is shown.
2. according to the method described in claim 1, it is characterized in that, described obtain first of current source code in the source code view Cryptographic Hash, including:
By carrying out format analysis processing to the current source code, the space in the current source code and null are removed;
To form, treated that the current source code carries out Hash calculation obtains first cryptographic Hash.
3. method according to claim 1 or 2, which is characterized in that the method further includes:
When first cryptographic Hash and second cryptographic Hash differ, the Design view is rendered again.
4. according to the method described in claim 3, it is characterized in that, described work as first cryptographic Hash and second cryptographic Hash When differing, the Design view is rendered again, including:
When first cryptographic Hash and second cryptographic Hash differ, obtained and the current source according to the current source code The corresponding first form controls tree of code, each node of the first form controls tree correspond to a control in first list Part;
According to the attribute of control corresponding to each node of the first form controls tree, the first form controls tree is obtained The cryptographic Hash of each node;
According to the Hash of node each in the cryptographic Hash of node each in the first form controls tree and the second form controls tree Value, determines to need the control rendered again, the second form controls tree is the form controls obtained according to the history source code Tree.
It is 5. according to the method described in claim 4, it is characterized in that, described according to each node in the first form controls tree Cryptographic Hash and the second form controls tree in each node cryptographic Hash, determine to need the control rendered again, including:
By the way that corresponding in the cryptographic Hash and the second form controls tree of node each in the first form controls tree is saved The cryptographic Hash of point is compared, and determines whether the cryptographic Hash of each node in the first form controls tree changes;
Cryptographic Hash changes in the first form controls tree node is obtained as destination node;
It is the control for needing to render again to determine the destination node.
It is 6. according to the method described in claim 5, it is characterized in that, described according to each node in the first form controls tree Cryptographic Hash and the second form controls tree in each node cryptographic Hash, determine to need the control rendered again, further include:
When all child nodes of first node belong to the destination node, using the first node as the destination node, The first node is any node in the first form controls tree.
7. a kind of view conversion equipment for form design, which is characterized in that described device includes:
Acquisition module, for when switching from the source code view of the first list to Design view, obtain in the source code view when First cryptographic Hash of preceding source code;
Contrast module, for the second cryptographic Hash of first cryptographic Hash and history source code to be compared, the history source code It is the source code in source code view when switching from the source code view to the Design view last time;
Judgment module, for when first cryptographic Hash is identical with second cryptographic Hash, showing the described of last rendering Design view.
8. device according to claim 7, which is characterized in that the judgment module is additionally operable to:
When first cryptographic Hash and second cryptographic Hash differ, the Design view is rendered again.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The step of any one of claim 1-6 the methods are realized during row.
10. a kind of electronic equipment, which is characterized in that including:
Computer readable storage medium described in claim 9;And
One or more processor, for performing the program in the computer readable storage medium.
CN201711378618.1A 2017-12-19 2017-12-19 View conversion method and device for form design and electronic equipment Active CN108255486B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711378618.1A CN108255486B (en) 2017-12-19 2017-12-19 View conversion method and device for form design and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711378618.1A CN108255486B (en) 2017-12-19 2017-12-19 View conversion method and device for form design and electronic equipment

Publications (2)

Publication Number Publication Date
CN108255486A true CN108255486A (en) 2018-07-06
CN108255486B CN108255486B (en) 2021-12-10

Family

ID=62722483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711378618.1A Active CN108255486B (en) 2017-12-19 2017-12-19 View conversion method and device for form design and electronic equipment

Country Status (1)

Country Link
CN (1) CN108255486B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110333860A (en) * 2019-05-08 2019-10-15 武汉瓯越网视有限公司 A kind of method and relevant apparatus removing view object
CN113448832A (en) * 2020-06-18 2021-09-28 北京新氧科技有限公司 Control exposure detection method and application program operation monitoring system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160062954A1 (en) * 2012-09-15 2016-03-03 Numbergun Llc Flexible high-speed generation and formatting of application-specified strings
CN105511962A (en) * 2015-11-27 2016-04-20 华为技术有限公司 Rendering method and device
CN106598574A (en) * 2016-11-25 2017-04-26 腾讯科技(深圳)有限公司 Method and device for page rendering
CN107256151A (en) * 2017-05-27 2017-10-17 北京小米移动软件有限公司 Processing method, device and the terminal of page rendering

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160062954A1 (en) * 2012-09-15 2016-03-03 Numbergun Llc Flexible high-speed generation and formatting of application-specified strings
CN105511962A (en) * 2015-11-27 2016-04-20 华为技术有限公司 Rendering method and device
CN106598574A (en) * 2016-11-25 2017-04-26 腾讯科技(深圳)有限公司 Method and device for page rendering
CN107256151A (en) * 2017-05-27 2017-10-17 北京小米移动软件有限公司 Processing method, device and the terminal of page rendering

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110333860A (en) * 2019-05-08 2019-10-15 武汉瓯越网视有限公司 A kind of method and relevant apparatus removing view object
CN110333860B (en) * 2019-05-08 2022-12-09 武汉瓯越网视有限公司 Method and related device for moving out view object
CN113448832A (en) * 2020-06-18 2021-09-28 北京新氧科技有限公司 Control exposure detection method and application program operation monitoring system
CN113448832B (en) * 2020-06-18 2024-03-12 北京新氧科技有限公司 Control exposure detection method and application program operation monitoring system

Also Published As

Publication number Publication date
CN108255486B (en) 2021-12-10

Similar Documents

Publication Publication Date Title
CN109558479B (en) Rule matching method, device, equipment and storage medium
CN100349124C (en) Mechanism to control hardware interrupt acknowledgement in a virtual machine system
CN110912825A (en) Message forwarding method, device, equipment and system
CN111831815B (en) Control method and device for questionnaire display, storage medium and electronic equipment
CN112417569B (en) Revit primitive labeling method, device, equipment and storage medium
CN109271587A (en) A kind of page generation method and device
CN106293669A (en) A kind of generation method and apparatus of web pages component
CN110516233A (en) Method, apparatus, terminal device and the storage medium of data processing
CN108255486A (en) For view conversion method, device and the electronic equipment of form design
CN109032600A (en) Application interface update method, device, storage medium and electronic equipment
CN109740125A (en) Update lookup method, device, storage medium and equipment for Documents Comparison
CN108344244B (en) Intelligent refrigerator message information processing method and device and intelligent refrigerator
CN107220283B (en) Data processing method, device, storage medium and electronic equipment
WO2022033130A1 (en) Method for editing and saving json configuration file
CN108920241A (en) A kind of display state adjustment method, device and equipment
CN112416444B (en) Board switching control method, device, equipment and medium
CN114265846A (en) Data operation method and device, electronic equipment and storage medium
CN114449063A (en) Message processing method, device and equipment
CN110874444B (en) URL conversion model building method and device and electronic equipment
CN113268965A (en) Method, device, storage medium and electronic equipment for automatically generating routing table
CN110781194B (en) Application program table data processing method and device, electronic equipment and storage medium
CN112463412B (en) Method and related equipment for copying thread variable in thread switching process
CN104572097A (en) Photograph data callback method and photograph data callback device
CN109635175A (en) Page data joining method, device, readable storage medium storing program for executing and electronic equipment
CN109284097A (en) Realize method, equipment, system and the storage medium of complex data analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant