CN108255486A - For view conversion method, device and the electronic equipment of form design - Google Patents
For view conversion method, device and the electronic equipment of form design Download PDFInfo
- Publication number
- CN108255486A CN108255486A CN201711378618.1A CN201711378618A CN108255486A CN 108255486 A CN108255486 A CN 108255486A CN 201711378618 A CN201711378618 A CN 201711378618A CN 108255486 A CN108255486 A CN 108255486A
- Authority
- CN
- China
- Prior art keywords
- cryptographic hash
- source code
- view
- node
- design
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/38—Creation or generation of source code for implementing user interfaces
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/41—Compilation
- G06F8/44—Encoding
- G06F8/443—Optimisation
- G06F8/4432—Reducing the energy consumption
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This disclosure relates to a kind of view conversion method, device and electronic equipment for form design, is related to information technology field, this method includes:When switching from the source code view of the first list to Design view, obtain the first cryptographic Hash of current source code in source code view, second cryptographic Hash of the first cryptographic Hash and history source code is compared, history source code is the source code in source code view when switching from source code view to Design view the last time, when the first cryptographic Hash is identical with the second cryptographic Hash, the last Design view rendered is shown.The consumption frequently rendered in view transfer process to hardware resource can be reduced, improves the speed of view conversion.
Description
Technical field
This disclosure relates to information technology field, and in particular, to a kind of view conversion method for form design, device
And electronic equipment.
Background technology
With the fast development of the information technologies such as internet, the forms traffic applied to fields such as industry, government affairs, management is all
Begin to use electronic spreadsheet.Electronic spreadsheet can collect a large amount of data information and the number that can be stored in local or high in the clouds
According in library, convenient for being analyzed data, being retrieved and counted.Existing form design device is generally divided into two kinds of views:If
View and source code view are counted, wherein what Design view showed is the list after rendering, can pass through the modes such as dragging, typing
To list directly into edlin, what source code view showed is the corresponding source code of list, is provided for form design more various
Editor's approach.
In existing form design device, each time transfer process from source code view to Design view, no matter source code regards
Whether the source code in figure changes, and is required for re-starting source code compiling, and rendering generation design is re-started to list and is regarded
Figure, consumes hardware resource and time.
Invention content
The purpose of the disclosure is to provide a kind of view conversion method, device and electronic equipment for form design, to
Solve the problems, such as the consumption of source code view time and hardware resource into the transfer process of Design view.
To achieve these goals, according to the embodiment of the present disclosure in a first aspect, providing a kind of regarding for form design
Figure conversion method, the method includes:
When switching from the source code view of the first list to Design view, of current source code in the source code view is obtained
One cryptographic Hash;
Second cryptographic Hash of first cryptographic Hash and history source code is compared, the history source code be it is last from
The source code view to the Design view switch when the source code view in source code;
When first cryptographic Hash is identical with second cryptographic Hash, the last Design view rendered is shown.
Optionally, first cryptographic Hash for obtaining current source code in the source code view, including:
By carrying out format analysis processing to the current source code, the space in the current source code and null are removed;
To form, treated that the current source code carries out Hash calculation obtains first cryptographic Hash.
Optionally, the method further includes:
When first cryptographic Hash and second cryptographic Hash differ, the Design view is rendered again.
Optionally, it is described when first cryptographic Hash and second cryptographic Hash differ, the design is rendered again
View, including:
When first cryptographic Hash and second cryptographic Hash differ, obtained according to the current source code and worked as with described
The corresponding first form controls tree of preceding source code, each node of the first form controls tree correspond to one in first list
A control;
According to the attribute of control corresponding to each node of the first form controls tree, first form controls is obtained
The cryptographic Hash of each node of tree;
According to node each in the cryptographic Hash of node each in the first form controls tree and the second form controls tree
Cryptographic Hash determines to need the control rendered again, and the second form controls tree is the list obtained according to the history source code
Control tree.
Optionally, in the cryptographic Hash and the second form controls tree according to node each in the first form controls tree
The cryptographic Hash of each node, determines to need the control rendered again, including:
By by pair in the cryptographic Hash and the second form controls tree of node each in the first form controls tree
The cryptographic Hash of node is answered to be compared, determines whether the cryptographic Hash of each node in the first form controls tree changes;
Cryptographic Hash changes in the first form controls tree node is obtained as destination node;
It is the control for needing to render again to determine the destination node.
Optionally, in the cryptographic Hash and the second form controls tree according to node each in the first form controls tree
The cryptographic Hash of each node, determines to need the control rendered again, further include:
When all child nodes of first node belong to the destination node, using the first node as the target section
Point, the first node are any node in the first form controls tree.
According to the second aspect of the embodiment of the present disclosure, a kind of view conversion equipment for form design, the dress are provided
Put including:
Acquisition module, for when switching from the source code view of the first list to Design view, obtaining the source code view
In current source code the first cryptographic Hash;
Contrast module, for the second cryptographic Hash of first cryptographic Hash and history source code to be compared, the history
Source code is the source code in source code view when switching from the source code view to the Design view last time;
Judgment module, for when first cryptographic Hash is identical with second cryptographic Hash, showing last rendering
The Design view.
Optionally, the acquisition module includes:
Submodule is handled, for by carrying out format analysis processing to the current source code, removing the sky in the current source code
Lattice and null;
Computational submodule, for treated that the current source code carries out Hash calculation obtains first Hash to form
Value.
Optionally, the judgment module is additionally operable to:
When first cryptographic Hash and second cryptographic Hash differ, the Design view is rendered again.
Optionally, the judgment module includes:
Control tree acquisition submodule, for when first cryptographic Hash and second cryptographic Hash differ, according to institute
It states current source code and obtains the first form controls tree corresponding with the current source code, each node of the first form controls tree
A control in corresponding first list;
Cryptographic Hash acquisition submodule, for the category of control corresponding to each node according to the first form controls tree
Property, the cryptographic Hash of each node of acquisition the first form controls tree;
Judging submodule, for the cryptographic Hash and the second form controls according to node each in the first form controls tree
The cryptographic Hash of each node in tree, determines to need the control rendered again, and the second form controls tree is according to the history
The form controls tree that source code obtains.
Optionally, the judging submodule is used for:
By by pair in the cryptographic Hash and the second form controls tree of node each in the first form controls tree
The cryptographic Hash of node is answered to be compared, determines whether the cryptographic Hash of each node in the first form controls tree changes;
Cryptographic Hash changes in the first form controls tree node is obtained as destination node;
It is the control for needing to render again to determine the destination node.
Optionally, the judging submodule is additionally operable to:
When all child nodes of first node belong to the destination node, using the first node as the target section
Point, the first node are any node in the first form controls tree.
According to the third aspect of the embodiment of the present disclosure, a kind of computer readable storage medium is provided, is stored thereon with calculating
Machine program realizes the view conversion method for form design that first aspect provides when the computer program is executed by processor
The step of.
According to the fourth aspect of the embodiment of the present disclosure, a kind of electronic equipment is provided, including:The computer that the third aspect provides
Readable storage medium storing program for executing;And one or more processors, for performing the computer journey in the computer readable storage medium
Sequence.
Through the above technical solutions, during switching from source code view to Design view, the disclosure is by obtaining source
The corresponding cryptographic Hash of current source code in code view, and the cryptographic Hash of acquisition is switched with the last time from source code view to Design view
The cryptographic Hash obtained in the process is compared, and when comparing result is consistent, determines that the source code in source code view does not change,
It does not need to render list again, the Design view before switching to source code view can be retained.View can be reduced to turn
The consumption to hardware resource is frequently rendered during changing, improves the speed of view conversion.
Other feature and advantage of the disclosure will be described in detail in subsequent specific embodiment part.
Description of the drawings
Attached drawing is for providing further understanding of the disclosure, and a part for constitution instruction, with following tool
Body embodiment is used to explain the disclosure, but do not form the limitation to the disclosure together.In the accompanying drawings:
Fig. 1 is the flow chart according to a kind of view conversion method for form design shown in an exemplary embodiment;
Fig. 2 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment
Figure;
Fig. 3 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment
Figure;
Fig. 4 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment
Figure;
Fig. 5 is the block diagram according to a kind of view conversion equipment for form design shown in an exemplary embodiment;
Fig. 6 is the block diagram for the view conversion equipment of form design according to the another kind shown in an exemplary embodiment;
Fig. 7 is the block diagram for the view conversion equipment of form design according to the another kind shown in an exemplary embodiment;
Fig. 8 is the block diagram according to a kind of electronic equipment shown in an exemplary embodiment.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, example is illustrated in the accompanying drawings.Following description is related to
During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Introduce the disclosure offer for the view conversion method of form design, device and electronic equipment before, first
To the disclosure, application scenarios involved by each embodiment are introduced.The application scenarios are form design device, including design
Two kinds of views of view and source code view.User can by source code view the modes such as dragging, typing carry out form design, also
Source code view can be switched to, the different controls in list are operated by writing source code, after the completion of operation, by source code
View is switched to Design view, and the corresponding list of source code can be checked in Design view.
Fig. 1 be according to a kind of flow chart of view conversion method for form design shown in an exemplary embodiment,
As shown in Figure 1, this method includes:
Step 101, when switching from the source code view of the first list to Design view, current source code in source code view is obtained
The first cryptographic Hash.
For example, user designs the first list by form design device, can be divided into two kinds of scenes:User is first led to
Design view is crossed, the different controls in the first list are designed, later, the first list is switched to source code from Design view
View further edits the corresponding source code of the first list, such as can edit the category of some control in the first list
Property (background color, calculation formula, sequence or data format etc.).Another scene can be user directly in source code view into
Row source code is write, and sets the attribute of different controls in the first list.When user completes after writing of source code in source code view, need
To switch from the source code view of the first list to Design view, show state i.e. with check the first list in Design view.
During switching from source code view to Design view, Hash calculation is carried out to source code current in source code view, first is obtained and breathes out
Uncommon value.
Step 102, the second cryptographic Hash of the first cryptographic Hash and history source code is compared, history source code be it is last from
Source code view to Design view switch when source code view in source code.
It is exemplary, upper once from source code view into Design view handoff procedure, obtain and store in source code view
The primary corresponding cryptographic Hash of history source code, as second cryptographic Hash.Since the cryptographic Hash of one piece of data is unique, if
The change of a byte or multiple bytes has occurred in this segment data, and the corresponding cryptographic Hash of data after changing can all be caused also to occur
Variation, therefore can be by comparing the first cryptographic Hash and the second cryptographic Hash, judging that the current source code in source code view is opposite
Whether changed in last history source code.
Step 103, when the first cryptographic Hash is identical with the second cryptographic Hash, the last Design view rendered is shown.
It is exemplary, when the first cryptographic Hash is identical with the second cryptographic Hash, it can determine current source code in source code view and go through
History source code is completely the same, does not generate any change, then corresponding Design view will not generate change, therefore not need to pair
List is rendered again, can show the Design view of last rendering, that is, is retained and switched to current source code view
The corresponding display state of Design view before, wherein the last Design view rendered is the source changed according to the last time
Code (can be understood as before current time, the source code apart from the modification of the last time at current time) renders what is obtained.Therefore, should
Last time modification source code may be above-mentioned history source code or the history source code before source code.It can understand
No matter between source code view and Design view to switch how many times, as long as first cryptographic Hash when being converted to Design view
It is identical with the second cryptographic Hash, just illustrate that source code does not change, without rendering Design view again, until first cryptographic Hash and the
During two cryptographic Hash differences, then Design view is rendered again.
In conclusion during switching from source code view to Design view, the disclosure is by obtaining in source code view
The current corresponding cryptographic Hash of source code, and the cryptographic Hash of acquisition is obtained from source code view into Design view handoff procedure with last
Cryptographic Hash compared, when comparing result is consistent, determine that the source code in source code view does not change, do not need to pair
List is rendered again, can retain the Design view before switching to source code view.It can reduce in view transfer process
The consumption to hardware resource is frequently rendered, improves the speed of view conversion.
Fig. 2 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment
Figure, as shown in Fig. 2, step 101 includes:
Step 1011, by carrying out format analysis processing to current source code, the space in current source code and null are removed.
Step 1012, to form, treated that current source code carries out Hash calculation obtains the first cryptographic Hash.
For example, after the first list is switched to source code view by user from Design view, to the source in source code view
Code has only made the modification of form, does not carry out the substantial modifications in relation to the first form attributes, such as:Space, null are deleted,
Space, null are either added to again or under the premise of original sentence meaning is not changed, long sentence enter a new line etc.
Reason all only has modified the form of source code, and to the first list, there is no actual influences, are designed accordingly also without rendering again
View, thus to avoid re-starting the first list because of source code form modifying render caused by hardware resource and time
Waste before Hash calculation is carried out to current source code, first can carry out format analysis processing to current source code, remove in current source code
Space and null and then carry out Hash calculation obtain the first cryptographic Hash.
Fig. 3 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment
Figure, as shown in figure 3, this method further includes:
Step 104, when the first cryptographic Hash and the second cryptographic Hash differ, Design view is rendered again.
It is exemplary, when the first cryptographic Hash and the second cryptographic Hash differ, it can determine current source code and history source code not
Unanimously, i.e., current source code is changed compared with history source code, it is therefore desirable to which list is rendered again.
Fig. 4 is the flow for the view conversion method of form design according to the another kind shown in an exemplary embodiment
Figure, as shown in figure 4, step 104 includes:
Step 1041, it when the first cryptographic Hash and the second cryptographic Hash differ, is obtained and current source code according to current source code
Corresponding first form controls tree, each node of the first form controls tree correspond to a control in the first list.
For example, corresponding first form controls tree is obtained according to current source code, wherein in the first form controls tree
Each node represents that a control of the first list, such as root node can be expressed as the first list and (can be regarded as in itself
The control of top in first list), the corresponding control of any child node in the first form controls tree belongs to the node
The corresponding control of father node.
Step 1042, according to corresponding to each node of the first form controls tree control attribute, obtain the first list control
The cryptographic Hash of each node of part tree.
Exemplary, each control of the first list has corresponding attribute, according to each section in the first form controls tree
The corresponding property value of each control of first list in control corresponding to point and current source code obtains the cryptographic Hash of each node.
For example, first node is any node in the first form controls tree, it is first determined first node corresponds to the first of the first list
Control, then Hash calculation is carried out to the corresponding property value of the first control in current source code, the cryptographic Hash of acquisition is as first node
Cryptographic Hash.
Step 1043, it is each saved according in the cryptographic Hash of node each in the first form controls tree and the second form controls tree
The cryptographic Hash of point, determines to need the control rendered again, the second form controls tree is the form controls obtained according to history source code
Tree.
It is exemplary, upper once from source code view into Design view handoff procedure, second is obtained according to history source code
It the cryptographic Hash of each node and is preserved in form controls tree and the second form controls tree, in the first form controls tree is obtained
After the cryptographic Hash of each node, compare in the first form controls tree in the cryptographic Hash of each node and the second form controls tree each
The cryptographic Hash of node determines the control corresponding to cryptographic Hash changes in the first form controls tree node to need to render again
Control.
Exemplary, step 1043 can be realized by following steps:
First, by the way that corresponding in the cryptographic Hash and the second form controls tree of node each in the first form controls tree is saved
The cryptographic Hash of point is compared, and determines whether the cryptographic Hash of each node in the first form controls tree changes.Secondly, the is obtained
The node that cryptographic Hash changes in one form controls tree is as destination node.Finally, determine destination node to need to render again
Control.
For example, this (can be understood as with first node of the first form controls tree in the second form controls tree
The current source code of secondary editor with all there are the corresponding controls of the first node in the history source code that last time edits) for, by first
The cryptographic Hash of first node in form controls tree and the cryptographic Hash of the first node of the second form controls tree compare, when first
When cryptographic Hash of the node in the first form controls tree and the cryptographic Hash of first node in the second form controls tree differ, determine
The cryptographic Hash of the first node changes, and using the first node as destination node, can similarly determine the first list control
Whether the cryptographic Hash of each node changes in part tree.Further, corresponding control is determined according to destination node, and will be corresponding
Control as the control for needing to render again.It should be noted that destination node can be a set, including one
Or multiple nodes, and have recorded position or serial number of the destination node in the first form controls tree or can also be by mesh
It makes marks on mark node come the position or serial number that destination node is identified in the first form controls tree.
It can be interpreted as completing source code editor every time, before Design view switching, be given birth to according to the source code of this editor
Into and preserve a form controls tree, to record the cryptographic Hash of each node of the form controls tree, so as to next time to setting
When counting view switching, which node Hash judged using the form controls tree of last time preservation and the cryptographic Hash of each of which node
Value changes, so as to which the control when being switched to Design view to cryptographic Hash corresponding to changed node carries out wash with watercolours again
Dye.
In addition, in another implementation, form controls tree can not also be preserved when switching every time to Design view, only
The cryptographic Hash of each node is calculated and preserves, so as to when switching to Design view next time, be preserved using the last time each
The cryptographic Hash of node judges which node cryptographic Hash changes.It, can be upper once to setting by taking above-mentioned first node as an example
When counting view switching, the cryptographic Hash of node each in the second form controls tree of last time generation is recorded in a cryptographic Hash
In table.Thus when this switches to Design view, it can be by the current cryptographic Hash of the first node and the cryptographic Hash table
The cryptographic Hash of the first node recorded in lattice is compared, when the current cryptographic Hash and in cryptographic Hash table first of first node
When the cryptographic Hash of node differs, determine that the cryptographic Hash of the first node changes, and using the first node as target section
Point, can similarly determine whether the cryptographic Hash of each node changes.
Further, step 1043 further includes:
When all child nodes of first node belong to destination node, using first node as destination node, first node
For any node in the first form controls tree.
It is exemplary, if a control includes multiple controls, corresponding in the first form controls tree, an as node
Multiple child nodes are contained, by taking first node as an example, when all child nodes of first node belong to destination node, representing should
The corresponding control of all child nodes under first node is required to render again, is also equivalent to need that first node is corresponding
Control renders again, therefore can be directly using first node as destination node.Further, using first node as target section
All child nodes of first node can be deleted from destination node after point.For example, when destination node is set, by this
All child nodes of first node are deleted in set, when destination node is identified by way of label, then by first
The label removal of all child nodes of node.
In conclusion during switching from source code view to Design view, the disclosure is by obtaining in source code view
The current corresponding cryptographic Hash of source code, and the cryptographic Hash of acquisition is obtained from source code view into Design view handoff procedure with last
Cryptographic Hash compared, when comparing result is consistent, determine that the source code in source code view does not change, do not need to pair
List is rendered again, can retain the Design view before switching to source code view.It can reduce in view transfer process
The consumption to hardware resource is frequently rendered, improves the speed of view conversion.
Fig. 5 is according to a kind of block diagram of view conversion equipment for form design shown in an exemplary embodiment, such as
Shown in Fig. 5, which includes:
Acquisition module 201, for when switching from the source code view of the first list to Design view, obtaining in source code view
First cryptographic Hash of current source code.
Contrast module 202, for the second cryptographic Hash of the first cryptographic Hash and history source code to be compared, history source code is
The source code in source code view when last time switches from from source code view to Design view.
Judgment module 203, for when the first cryptographic Hash is identical with the second cryptographic Hash, showing that the last design rendered regards
Figure.
Fig. 6 is the block diagram for the view conversion equipment of form design according to the another kind shown in an exemplary embodiment,
As shown in fig. 6, acquisition module 201 includes:
Handle submodule 2011, for by carrying out format analysis processing to current source code, remove space in current source code and
Null.
Computational submodule 2012, for treated that current source code carries out Hash calculation obtains the first cryptographic Hash to form.
Optionally, judgment module 203 is additionally operable to:
When the first cryptographic Hash and the second cryptographic Hash differ, Design view is rendered again.
Fig. 7 is the block diagram for the view conversion equipment of form design according to the another kind shown in an exemplary embodiment,
As shown in fig. 7, judgment module 203 includes:
Control tree acquisition submodule 2031, for when the first cryptographic Hash and the second cryptographic Hash differ, according to current source
Code obtains the first form controls tree corresponding with current source code, and each node of the first form controls tree is corresponded in the first list
One control.
Cryptographic Hash acquisition submodule 2032, for the category of control corresponding to each node according to the first form controls tree
Property, the cryptographic Hash of each node of the first form controls tree of acquisition.
Judging submodule 2033, for the cryptographic Hash and the second form controls according to node each in the first form controls tree
The cryptographic Hash of each node in tree, determines to need the control rendered again, and the second form controls tree is to be obtained according to history source code
Form controls tree.
Optionally, judging submodule 2033 is used for:
By by the corresponding node in the cryptographic Hash and the second form controls tree of node each in the first form controls tree
Cryptographic Hash is compared, and determines whether the cryptographic Hash of each node in the first form controls tree changes.
Cryptographic Hash changes in the first form controls tree node is obtained as destination node.
It is the control for needing to render again to determine destination node.
Further, judging submodule 2033 is additionally operable to:
When all child nodes of first node belong to destination node, using first node as destination node, first node
For any node in the first form controls tree.
About the device in above-described embodiment, wherein modules perform the concrete mode of operation in related this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
In conclusion during switching from source code view to Design view, the disclosure is by obtaining in source code view
The current corresponding cryptographic Hash of source code, and the cryptographic Hash of acquisition is obtained from source code view into Design view handoff procedure with last
Cryptographic Hash compared, when comparing result is consistent, determine that the source code in source code view does not change, do not need to pair
List is rendered again, can retain the Design view before switching to source code view.It can reduce in view transfer process
The consumption to hardware resource is frequently rendered, improves the speed of view conversion.
Fig. 8 is the block diagram according to a kind of electronic equipment 800 shown in an exemplary embodiment.As shown in figure 8, the electronics is set
Standby 800 can include:Processor 801, memory 802, multimedia component 803, input/output (I/O) interface 804, Yi Jitong
Believe component 805.
Wherein, processor 801 is used to control the integrated operation of the electronic equipment 800, to complete above-mentioned to set for list
All or part of step in the view conversion method of meter.Memory 802 is used to store various types of data to support at this
The operation of electronic equipment 800, these data can for example include any application program for being operated on the electronic equipment 800
Or the instruction of method and the relevant data of application program, such as contact data, the message of transmitting-receiving, picture, audio, video
Etc..The memory 802 can be by any kind of volatibility or non-volatile memory device or combination thereof realization, example
Such as static RAM (Static Random Access Memory, abbreviation SRAM), electrically erasable is read-only
Memory (Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), it is erasable
Programmable read only memory (Erasable Programmable Read-Only Memory, abbreviation EPROM) may be programmed read-only
Memory (Programmable Read-Only Memory, abbreviation PROM), read-only memory (Read-Only Memory, letter
Claim ROM), magnetic memory, flash memory, disk or CD.Multimedia component 803 can include screen and audio component.Its
Middle screen for example can be touch screen, and audio component is for output and/or input audio signal.For example, audio component can wrap
A microphone is included, microphone is used to receive external audio signal.The received audio signal can be further stored in and deposit
Reservoir 802 is sent by communication component 805.Audio component further includes at least one loud speaker, for exports audio signal.I/
O Interface 804 provides interface between processor 801 and other interface modules, other above-mentioned interface modules can be keyboard, mouse
Mark, button etc..These buttons can be virtual push button or entity button.Communication component 805 is for the electronic equipment 800 and its
Wired or wireless communication is carried out between his equipment.Wireless communication, such as Wi-Fi, bluetooth, near-field communication (Near Field
Communication, abbreviation NFC), 2G, 3G or 4G or they one or more of combination, therefore corresponding communication
Component 805 can include:Wi-Fi module, bluetooth module, NFC module.
In one exemplary embodiment, electronic equipment 800 can be by one or more application application-specific integrated circuit
(Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (Digital
Signal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device,
Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array
(Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics member
Part is realized, for performing the above-mentioned view conversion method for form design.
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction, example are additionally provided
Such as include the memory 802 of program instruction, above procedure instruction can be performed by the processor 801 of electronic equipment 800 in completion
The view conversion method for form design stated.
In conclusion during switching from source code view to Design view, the disclosure is by obtaining in source code view
The current corresponding cryptographic Hash of source code, and the cryptographic Hash of acquisition is obtained from source code view into Design view handoff procedure with last
Cryptographic Hash compared, when comparing result is consistent, determine that the source code in source code view does not change, do not need to pair
List is rendered again, can retain the Design view before switching to source code view.It can reduce in view transfer process
The consumption to hardware resource is frequently rendered, improves the speed of view conversion.
The preferred embodiment of the disclosure is described in detail above in association with attached drawing, still, the disclosure is not limited to above-mentioned reality
The detail in mode is applied, in the range of the technology design of the disclosure, those skilled in the art are considering specification and practice
After the disclosure, it is readily apparent that other embodiments of the disclosure, belongs to the protection domain of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance
In the case of shield, it can be combined by any suitable means.Simultaneously between a variety of different embodiments of the disclosure
Arbitrary combination can also be carried out, as long as its thought without prejudice to the disclosure, should equally be considered as disclosure disclosure of that.
The disclosure is not limited to the precision architecture being described above out, and the scope of the present disclosure is only limited by appended claim
System.
Claims (10)
1. a kind of view conversion method for form design, which is characterized in that the method includes:
When switching from the source code view of the first list to Design view, the first Kazakhstan of current source code in the source code view is obtained
Uncommon value;
Second cryptographic Hash of first cryptographic Hash and history source code is compared, the history source code is last from described
Source code view to the Design view switch when the source code view in source code;
When first cryptographic Hash is identical with second cryptographic Hash, the last Design view rendered is shown.
2. according to the method described in claim 1, it is characterized in that, described obtain first of current source code in the source code view
Cryptographic Hash, including:
By carrying out format analysis processing to the current source code, the space in the current source code and null are removed;
To form, treated that the current source code carries out Hash calculation obtains first cryptographic Hash.
3. method according to claim 1 or 2, which is characterized in that the method further includes:
When first cryptographic Hash and second cryptographic Hash differ, the Design view is rendered again.
4. according to the method described in claim 3, it is characterized in that, described work as first cryptographic Hash and second cryptographic Hash
When differing, the Design view is rendered again, including:
When first cryptographic Hash and second cryptographic Hash differ, obtained and the current source according to the current source code
The corresponding first form controls tree of code, each node of the first form controls tree correspond to a control in first list
Part;
According to the attribute of control corresponding to each node of the first form controls tree, the first form controls tree is obtained
The cryptographic Hash of each node;
According to the Hash of node each in the cryptographic Hash of node each in the first form controls tree and the second form controls tree
Value, determines to need the control rendered again, the second form controls tree is the form controls obtained according to the history source code
Tree.
It is 5. according to the method described in claim 4, it is characterized in that, described according to each node in the first form controls tree
Cryptographic Hash and the second form controls tree in each node cryptographic Hash, determine to need the control rendered again, including:
By the way that corresponding in the cryptographic Hash and the second form controls tree of node each in the first form controls tree is saved
The cryptographic Hash of point is compared, and determines whether the cryptographic Hash of each node in the first form controls tree changes;
Cryptographic Hash changes in the first form controls tree node is obtained as destination node;
It is the control for needing to render again to determine the destination node.
It is 6. according to the method described in claim 5, it is characterized in that, described according to each node in the first form controls tree
Cryptographic Hash and the second form controls tree in each node cryptographic Hash, determine to need the control rendered again, further include:
When all child nodes of first node belong to the destination node, using the first node as the destination node,
The first node is any node in the first form controls tree.
7. a kind of view conversion equipment for form design, which is characterized in that described device includes:
Acquisition module, for when switching from the source code view of the first list to Design view, obtain in the source code view when
First cryptographic Hash of preceding source code;
Contrast module, for the second cryptographic Hash of first cryptographic Hash and history source code to be compared, the history source code
It is the source code in source code view when switching from the source code view to the Design view last time;
Judgment module, for when first cryptographic Hash is identical with second cryptographic Hash, showing the described of last rendering
Design view.
8. device according to claim 7, which is characterized in that the judgment module is additionally operable to:
When first cryptographic Hash and second cryptographic Hash differ, the Design view is rendered again.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The step of any one of claim 1-6 the methods are realized during row.
10. a kind of electronic equipment, which is characterized in that including:
Computer readable storage medium described in claim 9;And
One or more processor, for performing the program in the computer readable storage medium.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711378618.1A CN108255486B (en) | 2017-12-19 | 2017-12-19 | View conversion method and device for form design and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711378618.1A CN108255486B (en) | 2017-12-19 | 2017-12-19 | View conversion method and device for form design and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108255486A true CN108255486A (en) | 2018-07-06 |
CN108255486B CN108255486B (en) | 2021-12-10 |
Family
ID=62722483
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711378618.1A Active CN108255486B (en) | 2017-12-19 | 2017-12-19 | View conversion method and device for form design and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108255486B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110333860A (en) * | 2019-05-08 | 2019-10-15 | 武汉瓯越网视有限公司 | A kind of method and relevant apparatus removing view object |
CN113448832A (en) * | 2020-06-18 | 2021-09-28 | 北京新氧科技有限公司 | Control exposure detection method and application program operation monitoring system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160062954A1 (en) * | 2012-09-15 | 2016-03-03 | Numbergun Llc | Flexible high-speed generation and formatting of application-specified strings |
CN105511962A (en) * | 2015-11-27 | 2016-04-20 | 华为技术有限公司 | Rendering method and device |
CN106598574A (en) * | 2016-11-25 | 2017-04-26 | 腾讯科技(深圳)有限公司 | Method and device for page rendering |
CN107256151A (en) * | 2017-05-27 | 2017-10-17 | 北京小米移动软件有限公司 | Processing method, device and the terminal of page rendering |
-
2017
- 2017-12-19 CN CN201711378618.1A patent/CN108255486B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160062954A1 (en) * | 2012-09-15 | 2016-03-03 | Numbergun Llc | Flexible high-speed generation and formatting of application-specified strings |
CN105511962A (en) * | 2015-11-27 | 2016-04-20 | 华为技术有限公司 | Rendering method and device |
CN106598574A (en) * | 2016-11-25 | 2017-04-26 | 腾讯科技(深圳)有限公司 | Method and device for page rendering |
CN107256151A (en) * | 2017-05-27 | 2017-10-17 | 北京小米移动软件有限公司 | Processing method, device and the terminal of page rendering |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110333860A (en) * | 2019-05-08 | 2019-10-15 | 武汉瓯越网视有限公司 | A kind of method and relevant apparatus removing view object |
CN110333860B (en) * | 2019-05-08 | 2022-12-09 | 武汉瓯越网视有限公司 | Method and related device for moving out view object |
CN113448832A (en) * | 2020-06-18 | 2021-09-28 | 北京新氧科技有限公司 | Control exposure detection method and application program operation monitoring system |
CN113448832B (en) * | 2020-06-18 | 2024-03-12 | 北京新氧科技有限公司 | Control exposure detection method and application program operation monitoring system |
Also Published As
Publication number | Publication date |
---|---|
CN108255486B (en) | 2021-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109558479B (en) | Rule matching method, device, equipment and storage medium | |
CN100349124C (en) | Mechanism to control hardware interrupt acknowledgement in a virtual machine system | |
CN110912825A (en) | Message forwarding method, device, equipment and system | |
CN111831815B (en) | Control method and device for questionnaire display, storage medium and electronic equipment | |
CN112417569B (en) | Revit primitive labeling method, device, equipment and storage medium | |
CN109271587A (en) | A kind of page generation method and device | |
CN106293669A (en) | A kind of generation method and apparatus of web pages component | |
CN110516233A (en) | Method, apparatus, terminal device and the storage medium of data processing | |
CN108255486A (en) | For view conversion method, device and the electronic equipment of form design | |
CN109032600A (en) | Application interface update method, device, storage medium and electronic equipment | |
CN109740125A (en) | Update lookup method, device, storage medium and equipment for Documents Comparison | |
CN108344244B (en) | Intelligent refrigerator message information processing method and device and intelligent refrigerator | |
CN107220283B (en) | Data processing method, device, storage medium and electronic equipment | |
WO2022033130A1 (en) | Method for editing and saving json configuration file | |
CN108920241A (en) | A kind of display state adjustment method, device and equipment | |
CN112416444B (en) | Board switching control method, device, equipment and medium | |
CN114265846A (en) | Data operation method and device, electronic equipment and storage medium | |
CN114449063A (en) | Message processing method, device and equipment | |
CN110874444B (en) | URL conversion model building method and device and electronic equipment | |
CN113268965A (en) | Method, device, storage medium and electronic equipment for automatically generating routing table | |
CN110781194B (en) | Application program table data processing method and device, electronic equipment and storage medium | |
CN112463412B (en) | Method and related equipment for copying thread variable in thread switching process | |
CN104572097A (en) | Photograph data callback method and photograph data callback device | |
CN109635175A (en) | Page data joining method, device, readable storage medium storing program for executing and electronic equipment | |
CN109284097A (en) | Realize method, equipment, system and the storage medium of complex data analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |