CN109491897A - A kind of system resource leak testing method based on trend analysis - Google Patents
A kind of system resource leak testing method based on trend analysis Download PDFInfo
- Publication number
- CN109491897A CN109491897A CN201811259823.0A CN201811259823A CN109491897A CN 109491897 A CN109491897 A CN 109491897A CN 201811259823 A CN201811259823 A CN 201811259823A CN 109491897 A CN109491897 A CN 109491897A
- Authority
- CN
- China
- Prior art keywords
- data
- script
- resource
- system resource
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/366—Software debugging using diagnostics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3636—Software debugging by tracing the execution of the program
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a kind of the system resource leak testing method based on trend analysis, dependence linux system tool sar sampling collection data;According to the memory file under time interval periodic scan system/proc catalogue of setting, data needed for sampling obtains simultaneously save as .json file;Operation data shows that script load json file reads data, and carries out visualization processing to obtained data to realize graphical representation resource consumption trend;If the stock number that the program of detection occupies is continuously in propradation and never has a declining tendency, judge that this program causes system resource leakage.The present invention, which can be detected by trend analysis at leakage initial stage, to go wrong, while currently invention addresses all processes run in whole system;The present invention realize the leakage of timely diagnostic resource and can the position that is occurred of memory leak positioning, facilitate later maintenance, there is preferable practicability.
Description
Technical field
The invention belongs to the technical fields of system resource leak detection, and in particular to a kind of system money based on trend analysis
Source leak testing method.
Background technique
System resource means what any entity that its operational capability is limited in a computer system either virtually formed
Element.When process is run, need for its distributing system resource.System resource leakage also occurs often.It is with memory overflow below
Example is described in detail.
Memory overflow is frequently problem in software development, as shown in Figure 1, being dynamically allocated in program process
Memory space for some reason after program finishes execution without release or can not discharge, cause this section of memory that cannot be grasped
Make system recycling and reusing, this has resulted in memory overflow.Memory overflow defect has the feature of concealment, accumulation property, than it
He is more difficult to detect memory unauthorized access mistake.Because the producing cause of memory overflow is that memory block is not released, belong to omission type
Defect rather than cross shift defect.
In addition, memory overflow usually will not directly generate the wrong symptom of observable, but gradually accumulate, it is whole to reduce system
Body performance, short time a small amount of memory overflow are easy ignored, and over time, the memory of leakage is more and more, can
Memory is fewer and fewer, when memory overflow accumulation to a certain extent after, light then performance impairment, heavy then system crash.Do not limit to
It occupies in memory overflow, including cpu, open other system resources such as number of files, disk space occupancy also similarly.
Summary of the invention
The purpose of the present invention is to provide a kind of system resource leak testing method based on trend analysis, the present invention can
Can be detected and be gone wrong at leakage initial stage by trend analysis, at the same currently invention addresses run in whole system it is all into
Journey;If the stock number that the program of detection occupies is continuously in propradation and never has a declining tendency, this program is judged
Cause system resource leakage, the present invention realizes the leakage of timely diagnostic resource and being capable of the position that is occurred of memory leak positioning
It sets, facilitates later maintenance, there is preferable practicability.
It is conceived to all processes run in whole system, has its resource of the process of resource leakage problem must after a period of time
Surely continuous upward trend can be showed or occupy the far super normal range (NR) of resource, it can be to generation resource leakage according to this characteristic
Process carries out screening investigation.
The present invention is achieved through the following technical solutions: a kind of system resource leak-testing side based on trend analysis
Method relies on linux system tool sar sampling and collects data;According to time interval periodic scan system/proc catalogue of setting
Under memory file, sampling obtain needed for data simultaneously save as .json file;Operation data shows that script load json file is read
Access evidence, and visualization processing is carried out to realize graphical representation resource consumption trend to obtained data;If the program of detection
The stock number of occupancy is continuously in propradation and never has a declining tendency, then judges that this program causes system resource and lets out
Leakage.
In order to preferably realize the present invention, further, the data of collection include the data of process consumption CPU/MEM, beat
The file/folder opened occupies the data of disk space and network interface card reception each second/transmission data packet/byte number, per second
Clock reception/the compressed data packets of transmission, received multicast packets each second data.
In order to preferably realize the present invention, further, sar data collection by one two in/usr/lib/sa into
Executable file processed and two scripts are completed, and wherein sa1, sa2 are script, sadc is binary executable;The sa1
It is to call sadc by performance data collection to a Shell script in binary log file;The sa2 be by the same day two into
The storage of all data is to another Shell script of text file in file processed, and then it will be removed all within seven days
Journal file.
In order to preferably realize the present invention, further, between the time of the customized collection system resource situation data of user
Every with occupy the highest target individual number of resource ratio;It is checked in the period by operation show-info.py script and is collected in total
Data information.
In order to preferably realize the present invention, further, matplotlib the and tkinter module pair dependent on python
Obtained data carry out visualization processing, realize graphical representation resource consumption trend.
It, further, can be by increasing physical machine quantity or identical in order to preferably verify function of the invention
The problem of physical machine is divided into more virtual machines to run this means to reappear system resource leakage, to play acceleration problem
The effect of reproduction reduces the time loss for reappearing resource leakage problem under normal circumstances.
The display systems resource consumption trend in the form of line illustration may be implemented in the present invention, including process consumes CPU or interior
It deposits trend, open file/folder occupancy disk trend and network interface card traffic trends.Specifically by taking Memory leakage detection as an example, this
Invention script separates data collection and figure displaying, and user's operational data collection script is simultaneously arranged between data collection time
Every parameter, script will be collected data automatically according to set time interval and is stored in file, when user needs to look into
When seeing resource consumption trend, show that script collected data will be shown before by operation figure.User passes through sight
Examining process committed memory amount shown in tendency chart, whether sustainable growth is to determine whether occur memory overflow, and can position
The position that memory overflow is occurred.
For the probability resource leakage problem occurred, the maximum difficult point solved the problems, such as is that problem does not reappear, so needing
Increase the probability of problem repetition, can by increase physical machine quantity or identical physical machine be divided into more virtual machines come
Logic of the invention is run, to play the role of acceleration problem reproduction, reduces the time loss of test reproduction problem.
Main method of the present invention is to rely on linux system tool sar to be sampled collection data to current system conditions.
Sar data collection is completed by a binary executable in/usr/lib/sa and two scripts.Sar data are received
Storage is one and is located at/the binary executable of usr/lib/sa/sadc.Sa1, sa2 are script, and sadc is that binary system can
Execute file.First script sa1 is to call sadc by performance data collection a to Shell in binary log file
Script.Sa1 order also ensures all uses different files daily.Second script sa2 is by institute in same day binary file
Some data storages are to another Shell script of text file, and then it will remove all journal files within seven days.This
Different script files collects different data in invention, the corresponding data such as the following table 1 collected of specific script:
Table 1
For the data for specifically needing to obtain, can be obtained in Run Script by the way that corresponding parameter is arranged, parameter is situated between
It continues such as the following table 2:
Table 2
For the data being collected into, it will it is automatically saved in the file in the file directory where script, it is subsequent to lead to
It crosses operation data and shows script, and matplotlib the and tkinter module dependent on python carries out obtained data
Visualization processing realizes graphical representation resource consumption trend.According to the displaying of figure, when the resource for finding that some program occupies
Amount is continuously in propradation and never has a declining tendency, then illustrates that this program may not discharge after being finished every time
Fall the resource of its occupancy, therefore may determine that this program may cause system resource leakage.
The method of system resource leak-testing based on trend analysis includes at least following steps:
1. the parameter of the data obtained needed for setting and the time interval parameter for collecting data.
2. being adopted according to the memory file under parameter and time interval timed periodic scanning system/proc catalogue of setting
Data needed for sample obtains simultaneously save as .json file.
3. operation data shows that script load json file reads data, and is depicted as Line Chart.
4. the system resource situation shown according to Line Chart, analyses whether to produce resource leakage.
It is an advantage of the current invention that data collection is separated with visualization, after setting time interval parameter, data collection
Script can be in system background continuous service, and I/O load is small.User only needs according to their own needs every a period of time operation data
Show script i.e. it can be seen that Expenditure Levels and trend of the system resource within the period of script collection data.For passing through analysis
Tendency chart is done sth. in advance to expose the program for having system resource to leak, and can take corresponding measure in time, can effectively prevent because of system resource
Caused by leakage performance impairment even system crash the problem of.
Beneficial effects of the present invention:
(1) it relies on linux system tool sar sampling and collects data;According to the time interval periodic scan system of setting/
Memory file under proc catalogue, data needed for sampling obtains simultaneously save as .json file;Operation data shows script load
Json file reads data, and carries out visualization processing to obtained data to realize graphical representation resource consumption trend;If
The stock number that the program of detection occupies is continuously in propradation and never has a declining tendency, then judges that this program causes
System resource leakage.The present invention, which can be detected by trend analysis at leakage initial stage, to go wrong, while currently invention addresses
All processes run in whole system;If the stock number that the program of detection occupies is continuously in propradation and never has decline
Trend, then judge that this program causes system resource leakage, the present invention realizes the leakage of timely diagnostic resource and can
The position that memory leak positioning is occurred, facilitates later maintenance, has preferable practicability.
(2) sar data collection is by a binary executable in/usr/lib/sa and two scripts come complete
At wherein sa1, sa2 are script, and sadc is binary executable;The sa1 is that sadc is called to arrive performance data collection
A Shell script in binary log file;The sa2 is by data storage all in same day binary file to text
Another Shell script of this document, then it will remove all journal files within seven days.Data collection foot of the invention
Originally can be in system background continuous service, and I/O load is small, has preferable practicability.
(3) visualization processing is carried out to obtained data dependent on matplotlib the and tkinter module of python, it is real
Existing graphical representation resource consumption trend.The present invention separates data collection with visualization, after setting time interval parameter, number
It can not need artificially constantly to stare at system resource situation data, facilitate user in system background continuous service according to script is collected
It uses, and I/O load is small.
Detailed description of the invention
Fig. 1 is Memory leakage detection work flow diagram;
Fig. 2 is workflow block diagram of the invention;
Fig. 3 is the principle of the present invention block diagram.
Specific embodiment
Embodiment 1:
A kind of system resource leak testing method based on trend analysis, as shown in figure 3, relying on linux system tool sar
Data are collected in sampling;According to the memory file under time interval periodic scan system/proc catalogue of setting, sampling obtains institute
It needs data and saves as .json file;Operation data show script load json file read data, and to obtained data into
Row visualization processing is to realize graphical representation resource consumption trend;If the stock number that the program of detection occupies is continuously in rising
It state and never has a declining tendency, then judges that this program causes system resource leakage.
As shown in Figure 1, process 2 and process 3 after abnormal free system resources, cause these resources still occupied
With therefore can not be by operating system recycling and reusing, therefore resource leakage problem be produced.When process 2 and process 3 are held again
When row, still can application system resource, will show as representing at this time in resource consumption tendency chart of the invention process 2 and into
The curve of journey 3, which is in, continues propradation.
The present invention, which can be detected by trend analysis at leakage initial stage, to go wrong, while currently invention addresses entire systems
All processes run in system;If the stock number that the program of detection occupies is continuously in propradation and never has becoming for decline
Gesture then judges that this program causes system resource leakage, and the present invention realizes timely diagnostic resource and reveals and can position
The position that memory overflow is occurred, facilitates later maintenance, has preferable practicability.
Embodiment 2:
The present embodiment is to optimize on the basis of embodiment 1, as shown in Fig. 2, being not limited to process consumption CPU/MEM
Data, the data of collection further include open file/folder occupy the data of disk space and receive network interface card each second/
Data packet/byte number of transmission, the reception each second/compressed data packets of transmission, received multicast packets each second data.
Sar data collection is completed by a binary executable in/usr/lib/sa and two scripts,
Middle sa1, sa2 are script, and sadc is binary executable;The sa1 be call sadc by performance data collection to two into
A Shell script in journal file processed;The sa2 is by data storage all in same day binary file to text text
Another Shell script of part, then it will remove all journal files within seven days.Script can be set every 600 seconds
The data of an occupied situation of memory are collected, and records and occupies most preceding 10 processes of resource;By running show-
Info.py script checks the data information collected in total in the period.
When whether the memory for needing to monitor system leaks, the present invention is run in system background first
TendencyChart-cpuOrMem.py script;Such as
10-t 600 of python tendencyChart-cpuOrMem.py-c mem-n indicates that script was received every 600 seconds
Collect the occupied situation data of a memory, and records and occupy most preceding 10 processes of resource.
Then after a period of time, such as two days.It can remove to check over collected data information in two days at this time.Fortune
Row show-info.py script.Realize that figure is shown.
It is an advantage of the current invention that data collection is separated with visualization, after setting time interval parameter, data collection
Script can be in system background continuous service, and I/O load is small.User only needs according to their own needs every a period of time operation data
Show script i.e. it can be seen that Expenditure Levels and trend of the system resource within the period of script collection data.For passing through analysis
Tendency chart is done sth. in advance to expose the program for having system resource to leak, and can take corresponding measure in time, can effectively prevent because of system resource
Caused by leakage performance impairment even system crash the problem of.
The other parts of the present embodiment are same as Example 1, and so it will not be repeated.
Embodiment 3:
The present embodiment is optimized on the basis of embodiment 1 or 2, and the network interface card traffic trends situation of system is monitored.With
Family first runs tendencyChart-netflow.py script in system background;Such as
Python tendencyChart-netflow.py-n ens33-n eth1--rp--tp-t 3600 indicates script
The data packet situation that an ens33 network interface cards and eth1 network interface card send and receive each second was collected every 3600 seconds.After a period of time,
It runs show-info.py script and realizes that figure is shown.When the data packet for representing some network interface card each second of transmission in discovery tendency chart
When showing abnormal state of affairs with received data packet curve, it can determine whether that this network interface card there is a problem.
It is an advantage of the current invention that data collection is separated with visualization, after setting time interval parameter, data collection
Script can be in system background continuous service, and I/O load is small.User only needs according to their own needs every a period of time operation data
Show script i.e. it can be seen that Expenditure Levels and trend of the system resource within the period of script collection data.For passing through analysis
Tendency chart is done sth. in advance to expose the program for having system resource to leak and go wrong, and can take corresponding measure in time, can effectively prevent
Because system resource leakage caused by performance impairment even system crash the problem of.
The other parts of the present embodiment are identical as above-described embodiment 1 or 2, and so it will not be repeated.
The above is only presently preferred embodiments of the present invention, not does limitation in any form to the present invention, it is all according to
According to technical spirit any simple modification to the above embodiments of the invention, equivalent variations, protection of the invention is each fallen within
Within the scope of.
Claims (5)
1. a kind of system resource leak testing method based on trend analysis, which is characterized in that rely on linux system tool sar
Data are collected in sampling;According to the memory file under time interval periodic scan system/proc catalogue of setting, sampling obtains institute
It needs data and saves as .json file;Operation data show script load json file read data, and to obtained data into
Row visualization processing is to realize graphical representation resource consumption trend;If the stock number that the program of detection occupies is continuously in rising
It state and never has a declining tendency, then judges that this program causes system resource leakage.
2. a kind of system resource leak testing method based on trend analysis according to claim 1, which is characterized in that receive
The data of collection include the data and network interface card of the file/folder occupancy disk space of the data of process consumption CPU/MEM, opening
Reception each second/transmission data packet/byte number, the reception each second/compressed data packets of transmission, received multicast number each second
According to the data of packet.
3. a kind of system resource leak testing method based on trend analysis according to claim 2, which is characterized in that
Sar data collection is completed by a binary executable in/usr/lib/sa and two scripts, wherein sa1,
Sa2 is script, and sadc is binary executable;The sa1 is to call sadc by performance data collection to binary log
A Shell script in file;The sa2 is by data storage all in same day binary file to the another of text file
One Shell script, then it will remove all journal files within seven days.
4. a kind of system resource leak testing method based on trend analysis according to claim 2, which is characterized in that use
The time interval and the occupancy highest target individual number of resource ratio of the customized collection system resource situation data in family;Pass through operation
Show-info.py script checks the data information collected in total in the period.
5. a kind of system resource leak testing method based on trend analysis according to claim 1-4, special
Sign is that matplotlib the and tkinter module dependent on python carries out visualization processing to obtained data, realizes figure
Shape showing resource consumes trend.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811259823.0A CN109491897A (en) | 2018-10-26 | 2018-10-26 | A kind of system resource leak testing method based on trend analysis |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811259823.0A CN109491897A (en) | 2018-10-26 | 2018-10-26 | A kind of system resource leak testing method based on trend analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109491897A true CN109491897A (en) | 2019-03-19 |
Family
ID=65693162
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811259823.0A Pending CN109491897A (en) | 2018-10-26 | 2018-10-26 | A kind of system resource leak testing method based on trend analysis |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109491897A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111124820A (en) * | 2019-12-13 | 2020-05-08 | 郑州威科姆科技股份有限公司 | Method for realizing off-line monitoring and analysis of operating system and process resources |
CN111984541A (en) * | 2020-08-31 | 2020-11-24 | 北京达佳互联信息技术有限公司 | Memory leak detection method and device and terminal |
CN112631941A (en) * | 2020-12-31 | 2021-04-09 | 广州鲁邦通物联网科技有限公司 | Method and system for locating linux kernel slub memory leakage |
CN113076247A (en) * | 2021-04-06 | 2021-07-06 | 成都安恒信息技术有限公司 | Method and system for managing and running test script |
WO2022105685A1 (en) * | 2020-11-17 | 2022-05-27 | 中兴通讯股份有限公司 | Memory management method and device for optical transmission device, and storage medium |
CN115794476A (en) * | 2023-02-01 | 2023-03-14 | 荣耀终端有限公司 | Processing method of kernel graphic system layer memory and terminal equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110276949A1 (en) * | 2010-05-04 | 2011-11-10 | Oracle International Corporation | Memory leak detection |
CN103327278A (en) * | 2013-07-10 | 2013-09-25 | 亿览在线网络技术(北京)有限公司 | Real time sharing method and device of images |
CN104866409A (en) * | 2015-05-29 | 2015-08-26 | 小米科技有限责任公司 | Method and apparatus for monitoring memory leakage |
CN105204996A (en) * | 2015-09-24 | 2015-12-30 | 努比亚技术有限公司 | Memory leak detection device and method and terminal |
CN105208098A (en) * | 2015-08-24 | 2015-12-30 | 用友网络科技股份有限公司 | Cloud monitoring system realization device and method |
CN105224433A (en) * | 2014-06-23 | 2016-01-06 | 阿里巴巴集团控股有限公司 | A kind of internal memory monitoring method and server |
CN107346285A (en) * | 2017-05-26 | 2017-11-14 | 郑州云海信息技术有限公司 | A kind of method for detecting memory leakage and device |
-
2018
- 2018-10-26 CN CN201811259823.0A patent/CN109491897A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110276949A1 (en) * | 2010-05-04 | 2011-11-10 | Oracle International Corporation | Memory leak detection |
CN103327278A (en) * | 2013-07-10 | 2013-09-25 | 亿览在线网络技术(北京)有限公司 | Real time sharing method and device of images |
CN105224433A (en) * | 2014-06-23 | 2016-01-06 | 阿里巴巴集团控股有限公司 | A kind of internal memory monitoring method and server |
CN104866409A (en) * | 2015-05-29 | 2015-08-26 | 小米科技有限责任公司 | Method and apparatus for monitoring memory leakage |
CN105208098A (en) * | 2015-08-24 | 2015-12-30 | 用友网络科技股份有限公司 | Cloud monitoring system realization device and method |
CN105204996A (en) * | 2015-09-24 | 2015-12-30 | 努比亚技术有限公司 | Memory leak detection device and method and terminal |
CN107346285A (en) * | 2017-05-26 | 2017-11-14 | 郑州云海信息技术有限公司 | A kind of method for detecting memory leakage and device |
Non-Patent Citations (1)
Title |
---|
蒋建春 等: "《计算机网络管理理论与实践教程》", 30 September 2008, 北京邮电学院出版社 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111124820A (en) * | 2019-12-13 | 2020-05-08 | 郑州威科姆科技股份有限公司 | Method for realizing off-line monitoring and analysis of operating system and process resources |
CN111124820B (en) * | 2019-12-13 | 2023-12-22 | 郑州威科姆科技股份有限公司 | Method for realizing off-line monitoring and analysis of operating system and process resources |
CN111984541A (en) * | 2020-08-31 | 2020-11-24 | 北京达佳互联信息技术有限公司 | Memory leak detection method and device and terminal |
WO2022105685A1 (en) * | 2020-11-17 | 2022-05-27 | 中兴通讯股份有限公司 | Memory management method and device for optical transmission device, and storage medium |
CN112631941A (en) * | 2020-12-31 | 2021-04-09 | 广州鲁邦通物联网科技有限公司 | Method and system for locating linux kernel slub memory leakage |
CN113076247A (en) * | 2021-04-06 | 2021-07-06 | 成都安恒信息技术有限公司 | Method and system for managing and running test script |
CN115794476A (en) * | 2023-02-01 | 2023-03-14 | 荣耀终端有限公司 | Processing method of kernel graphic system layer memory and terminal equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109491897A (en) | A kind of system resource leak testing method based on trend analysis | |
US20200151330A1 (en) | Counter-fraud operation management | |
CN109491990A (en) | A kind of method of detection data quality and the device of detection data quality | |
CN105740707A (en) | Malicious file identification method and device | |
CN107729210A (en) | The abnormality diagnostic method and device of Distributed Services cluster | |
CN110390198B (en) | Risk inspection method and device for small program and electronic equipment | |
CN107220121B (en) | Sandbox environment testing method and system under NUMA architecture | |
CN104503910A (en) | Product test method by monitoring users' using behavior | |
CN109495291B (en) | Calling abnormity positioning method and device and server | |
CN102959519A (en) | System test apparatus | |
CN109068132B (en) | VBO display interface test method, device, equipment and storage medium | |
CN111782490A (en) | Data acquisition method and device | |
CN103995807A (en) | Massive data query and secondary processing method based on Web architecture | |
CN105022694A (en) | Test case generation method and system for mobile terminal test | |
CN110662024A (en) | Video quality diagnosis method and device based on multiple frames and electronic equipment | |
CN104063326A (en) | Software testing data analysis oscilloscope and method | |
CN111209213A (en) | Method, system, device and storage medium for detecting abnormity of application program during operation | |
CN107451038B (en) | Hardware event acquisition method, processor and computing system | |
CN113704129A (en) | Regression testing method, device, storage medium and equipment | |
Zheng et al. | Anomaly localization in large-scale clusters | |
CN110992299B (en) | Method and device for detecting browser compatibility | |
CN109767546B (en) | Quality checking and scheduling device and quality checking and scheduling method for valuable bills | |
CN116645082A (en) | System inspection method, device, equipment and storage medium | |
CN116642696A (en) | Railway bearing health monitoring method, device, system, terminal and storage medium | |
Amankwah et al. | Fast bug detection algorithm for identifying potential vulnerabilities in juliet test cases |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190319 |
|
RJ01 | Rejection of invention patent application after publication |