CN110471971A - Data bank access method, equipment and storage medium - Google Patents
Data bank access method, equipment and storage medium Download PDFInfo
- Publication number
- CN110471971A CN110471971A CN201910741534.2A CN201910741534A CN110471971A CN 110471971 A CN110471971 A CN 110471971A CN 201910741534 A CN201910741534 A CN 201910741534A CN 110471971 A CN110471971 A CN 110471971A
- Authority
- CN
- China
- Prior art keywords
- database
- function
- access
- data
- name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
Abstract
The embodiment of the present application provides a kind of data bank access method, equipment and storage medium, wherein method includes: to obtain database access encapsulation function instruction;Function instruction is encapsulated according to the database access and obtains the database access bottom function being encapsulated in database access encapsulation function, and obtains preset configuration file;Database-name is prestored in the configuration file;Access operation is executed according to the database bottom function pair database corresponding with the database-name.Data bank access method, equipment and storage medium provided by the embodiments of the present application are able to solve the complex problem of existing OTL data access technology sentence content.
Description
Technical field
This application involves database access technology more particularly to a kind of data bank access methods, equipment and storage medium.
Background technique
Currently, the method for Accessing Oracle Database mainly has open CNC under Visual C++ environment
(Open Database Connectivity, referred to as: ODBC), ActiveX Data Objects (ActiveX Data Objects,
Referred to as: ADO) and ORACLE calling interface (Oracle Call Interface, abbreviation OCI).Wherein ODBC is answered for database
The unified interface provided when with routine access relevant database, application program will access a database, first must
Must register a data source with ODBC manager, database location that manager is provided according to data source, type of database and
The information such as ODBC driver, it is established that ODBC and concrete database contact, and process is relatively complicated.Using ADO access then
The library for having to import it, accesses relatively simple relative to ODBC, can save network flow to the greatest extent, but flexibility
Not enough, inquiry velocity is slower.And OCI is an application development tool of Oracle company exploitation, by third generation language
It calls the turn calling and achievees the purpose that Accessing Oracle Database, it is more more flexible than access interfaces such as ODBC, ADO, access and execution
Speed also faster, manipulates template library (the Odbc and DB2-CLI of relational database in the C++ compiling derived by OCI
Template Library, referred to as: OTL), it is an OTL database access technology, it is flexible, fireballing has had both OCI access
Advantage is called simply, and is Open Source Code, is even more widely used.
But the data flow operations thought of OTL database access technology causes the output of its query result dependent on database table
Structure and query statement content, encapsulation is difficult, and cannot be modular use, and needs to define a large amount of variables to save inquiry knot
Fruit increases code redundancy.
Summary of the invention
A kind of data bank access method, equipment and storage medium are provided in the embodiment of the present application, are able to solve existing
The complex problem of OTL data access technology sentence content.
The application first aspect embodiment provides a kind of data bank access method, comprising:
It obtains database access and encapsulates function instruction;
Function instruction, which is encapsulated, according to the database access obtains the database being encapsulated in database access encapsulation function
Bottom function is accessed, and obtains preset configuration file;Database-name is prestored in the configuration file;
Access operation is executed according to the database bottom function pair database corresponding with the database-name.
The application second aspect embodiment provides a kind of database accessing device, comprising:
Memory;
Processor;And
Computer program;
Wherein, the computer program stores in the memory, and is configured as being executed by the processor with reality
Now method as described above.
The application third aspect embodiment provides a kind of computer readable storage medium, is stored thereon with computer program;
The computer program is executed by processor to realize method as described above.
Technical solution provided by the embodiment of the present application, by the way that database access bottom function is encapsulated in database access
It encapsulates in function instruction, programming personnel only needs to write during writing program an instruction, and processor is got
The instruction encapsulates in function automatically according to the corresponding database access of the instruction and obtains the database access bottom letter encapsulated
Number, and corresponding database access operation is executed according to the bottom function, programming operation can be simplified.And by database access
Bottom function is encapsulated in database access encapsulation function instruction, is equivalent to and is hidden to database access bottom function, makees
For class, privately owned member does not expose externally, can be realized the modularization of DBAR database access routine, has also achieved the effect that secrecy.Separately
Outside, preset configuration file is called also according to database access encapsulation function instruction, and reads the number prestored from the configuration file
According to library name, to enable a processor to execute visit according to database access bottom function pair database corresponding with database-name
It asks operation, writes the sentence about database-name without programming personnel, simplify programming operation, equally also reached the effect of secrecy
Fruit.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the flow chart for the data bank access method that the embodiment of the present application one provides;
The process of connection data bottom storehouse layer functions is executed in the data bank access method that Fig. 2 provides for the embodiment of the present application two
Figure;
The process of turn-off data bottom storehouse layer functions is executed in the data bank access method that Fig. 3 provides for the embodiment of the present application two
Figure;
The process without return value access function is executed in the data bank access method that Fig. 4 provides for the embodiment of the present application two
Figure;
The process for having return value access function is executed in the data bank access method that Fig. 5 provides for the embodiment of the present application two
Figure;
Fig. 6 is the structural schematic diagram for the database accessing device that the embodiment of the present application three provides.
Specific embodiment
In order to which technical solution in the embodiment of the present application and advantage is more clearly understood, below in conjunction with attached drawing to the application
Exemplary embodiment be described in more detail, it is clear that described embodiment be only the application a part implement
Example, rather than the exhaustion of all embodiments.It should be noted that in the absence of conflict, embodiment and reality in the application
The feature applied in example can be combined with each other.
Embodiment one
In practical application, which can be realized by computer program, for example, application software etc.;Or
Person, which also can be implemented as the medium for being stored with related computer program, for example, USB flash disk, cloud disk etc.;Again
Alternatively, the data bank access method can also be realized by integrating or being equipped with the entity apparatus of related computer program, for example,
Chip, removable smart machine etc..
Fig. 1 is the flow chart for the data bank access method that the embodiment of the present application one provides.As shown in Figure 1, the present embodiment mentions
The data bank access method of confession, comprising:
Step 101 obtains database access encapsulation function instruction.
The instruction can be used as a function call instruction, carry out writing program use for programming personnel.Database access envelope
Function enclosed inside database access bottom function is filled, which is OCI bottom function.
Programming personnel writes direct database access encapsulation function instruction during writing program.Then processor exists
During executing computer program, database access encapsulation function instruction is obtained, it will be able to obtain the OCI of its enclosed inside
Bottom function.
Step 102 encapsulates the number that function instruction acquisition is encapsulated in database access encapsulation function according to database access
Bottom function is accessed according to library, and obtains preset configuration file.
Configuration file is the file being prestored into specified folder, and the database name to be accessed is previously written in configuration file
Claim.The specific path of the present embodiment not format of limitation arrangement file and specified folder, configuration file can be processor energy
The path of the file for any format for enough reading and identifying, specified folder can execute computer program for processor
During the fixed file read, or pass through the file that computer program sets path.
Step 103 executes access according to the database bottom function pair database corresponding with the database-name
Operation.
In a step 102, processor encapsulates the OCI letter that function instruction has got enclosed inside according to database access
Database-name in several and configuration file.In step 103, processor is according to OCI bottom function for database-name
Corresponding database executes access operation.Access operation can for from database read data, into database be written data,
Operation is configured etc. to the format of database.
Technical solution provided by the present embodiment, by the way that database access bottom function is encapsulated in database access encapsulation
In function instruction, programming personnel only needs to write during writing program an instruction, and processor gets this and refers to
It enables, is encapsulated in function automatically according to the corresponding database access of the instruction and obtain the database access bottom function encapsulated, and
Corresponding database access operation is executed according to the bottom function, programming operation can be simplified.And by database access bottom
Function is encapsulated in database access encapsulation function instruction, is equivalent to and is hidden to database access bottom function, as class
Privately owned member does not expose externally, can be realized the modularization of DBAR database access routine, has also achieved the effect that secrecy.In addition, also
Function instruction is encapsulated according to database access and calls preset configuration file, and the database name prestored is read from the configuration file
Claim, to enable a processor to execute access behaviour according to database access bottom function pair database corresponding with database-name
Make, writes the sentence about database-name without programming personnel, simplify programming operation, equally also achieved the effect that secrecy.
Such as to change the database to be accessed, it is only necessary to the database-name in configuration file is modified, it is not necessary to modify
Computer program, operating process are relatively simple, quick.
Embodiment two
The present embodiment is on the basis of the above embodiments, to optimize to above-mentioned data bank access method.
The first embodiment: above-mentioned database access encapsulation function instruction can be with are as follows: connection database functions instruction, example
Such as: int ConnectDB ().Then above-mentioned database bottom function is the connection data bottom storehouse being encapsulated in connection data function
Layer functions.Above-mentioned steps 103 are specifically as follows: being built according to connection data bottom storehouse layer functions database corresponding with database-name
Vertical connection.
Specifically, connection data bottom storehouse layer functions are OCI bottom function, comprising: OCI initialization function, context initialization
Function, application OCI handles function and OCI log in function.Such as: OCI initialization function is OCIInitialize (), at the beginning of environment
Beginningization function is OCIEnvInit (), and application OCI handles function is OCIHandleAlloc (), and OCI logs in function and is
OCILogon()。
The process of connection data bottom storehouse layer functions is executed in the data bank access method that Fig. 2 provides for the embodiment of the present application two
Figure.As shown in Fig. 2, for connect database mode, programming personnel only need to write " int ConnectDB () " this
Sentence, at the beginning of processor can automatically sequentially carry out the above OCI initialization function, environment after getting this sentence instruction
Beginningization function, application OCI handles function and OCI log in function, to connect with Database.
Username and password is also prestored in the configuration file got by step 102.Function is logged in executing OCI
In the process, the username and password in configuration file is verified, logs in database with the user name when being verified.Tool
Body, logging in function Database connection corresponding with database-name according to OCI includes following two steps: according to user
Whether name and the password authentification user name are legal, when verifying legal, Database connection corresponding with database-name.
It such as to change and want username and password, it is only necessary to which the content for modifying configuration file, it is not necessary to modify computer journeys
Sequence, operating process are relatively simple, quick.
Second of embodiment: above-mentioned database access encapsulation function instruction can be with are as follows: the instruction of turn-off data library function, example
Such as: void DisConnectDB ().Then above-mentioned database bottom function is the turn-off data being encapsulated in turn-off data function
Bottom storehouse layer functions.Above-mentioned steps 103 are specifically as follows: being disconnected according to turn-off data bottom storehouse layer functions with database.
Specifically, turn-off data bottom storehouse layer functions are OCI bottom function, comprising: release OCI handles function and database are disconnected
Open function.Such as: release OCI handles function is OCIHandleFree, and it is OCILogoff that database, which disconnects function,.
The process of turn-off data bottom storehouse layer functions is executed in the data bank access method that Fig. 3 provides for the embodiment of the present application two
Figure.As shown in figure 3, for the mode in turn-off data library, programming personnel only need to write " void DisConnectDB () " this
One sentence, processor can automatically sequentially carry out the above release OCI handles function after getting this sentence instruction
Function is disconnected with database, discharges all handles, deletes remaining pointer, to disconnect the connection with database.
The third embodiment: above-mentioned database access encapsulation function instruction can be with are as follows: access database functions instruction, then
Above-mentioned database bottom function is the access data bottom storehouse layer functions being encapsulated in access database functions, it may be assumed that OCI accesses data
Bottom function.Above-mentioned steps 103, which are specifically as follows, executes access operation to database according to access data bottom storehouse layer functions.
Specifically, there are two types of OCI access data bottom functions, one is without return value access function, the second is there is return
It is worth access function, both access functions is described in detail separately below:
For no return value access function, corresponding database access encapsulation function instruction can be int
ExcuteNonSelectSql(string sqlstatement).No return value access function includes: readiness database sentence letter
Number executes database statement function and submits database statement function.Such as: readiness database statement fuction is
OCIStmtPrepare (), executing database statement function is OCIStmtExecute (), and submission database statement function is
OCITransCommit()。
The process without return value access function is executed in the data bank access method that Fig. 4 provides for the embodiment of the present application two
Figure.As shown in figure 4, for the mode of no return value access database, programming personnel only needs to write " int
This sentence of ExcuteNonSelectSql (string sqlstatement) ", processor are getting this sentence instruction
After can automatically sequentially carry out the above readiness database statement fuction, execute database statement function and submit database language
Sentence function.The return value of no return value access function instruction can represent whether execution succeeds, such as: return value is that 0 expression executes
Success, return value are that 1 expression executes failure.
For there is return value access function, corresponding database access encapsulation function instruction can be
GetRowColValues(string sqlstatement).Have return value access function include: readiness database statement fuction,
Database statement function is executed, train value function is obtained, opening space function, obtains row value function and circulation searching assignment function.
Such as: readiness database statement fuction is OCIStmtPrepare (), and execution database statement function is OCIStmtExecute
(), obtaining train value function is OCIAttrGet (), and opening space function is OCIParamGet (), obtains row value function and is
OCIAttrGet (), circulation searching assignment function are OCIDefineByPos ().
The process for having return value access function is executed in the data bank access method that Fig. 5 provides for the embodiment of the present application two
Figure.As shown in figure 5, for there is the mode of return value access database, programming personnel only needs to write " GetRowColValues
This sentence of (string sqlstatement) ", processor can automatically sequentially after getting this sentence instruction
The above readiness database statement fuction is executed, database statement function is executed, obtains train value function, opening space function, obtains
Row value function and circulation searching assignment function.
In addition, before execution has return value access function, available Vector data form definition instruction will be held
During row has return value access function, implementing result is stored in vector data form.The definition of Vector data form
Instructing corresponding directive statement is Vector<vector<string>>.Later, application program need to only parse Vector tables of data
Lattice can obtain detailed data.
After having executed database access operation, the operation in above-mentioned turn-off data library can be executed.
In addition, if there is access errors, error reason can be stored in during data bottom storehouse layer data being accessed
Txt file, so as to subsequently through check this document just it can be found that detailed error reason.
Table one lists the corresponding relationship of above data access encapsulation function instruction and corresponding OCI bottom function:
One data access of table encapsulates the corresponding relationship of function instruction and corresponding OCI bottom function
Programming personnel need to only write each directive statement, processor in table one and obtain automatically after getting directive statement
The OCI bottom function of encapsulation simultaneously executes, so that programming code is relatively simple, improves programming efficiency.
The present embodiment enumerates one piece of data library access programmed statements to be illustrated to above method:
When application call, whole process need to only execute three steps, connect database, execute database statement, disconnect number
According to library.
In above scheme, nesting uses vector, utilizes Vector<vector<string>>as data base querying
Result set output, should be readily appreciated that.Internal layer vector<string>indicates the field of column, and outer layer indicates the quantity of row, constitutes one
Table.
Can Vector<vector<string>be used for any query statement result of any data library structure>it returns
It returns, independent of database table structure and inquiry content, has saved variable-definition.
OCI access technique is that the current access highest method of database efficiency is easy to be packaged into conjunction with the use of vector
General module increases a kind of new efficient access method for the oracle database access technique of C++.
And connection database is not necessarily to any parameter, reads from configuration file.By in modification configuration file
Database-name can reach the purpose for accessing the database of any different names.
Embodiment three
Fig. 6 is the structural schematic diagram for the database accessing device that the embodiment of the present application three provides.As shown in fig. 6, this implementation
Example provides a kind of database accessing device, comprising: memory 601, processor 602 and computer program.Wherein, computer journey
Sequence stores in the memory 601, and is configured as being executed as processor 602 to realize method provided by any content as above.
The present embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer journey
Sequence is executed by processor to realize method provided by as above any content.
Equipment and storage medium provided by the present embodiment have technical effect same as mentioned above.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application
Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
Claims (13)
1. a kind of data bank access method characterized by comprising
It obtains database access and encapsulates function instruction;
Function instruction, which is encapsulated, according to the database access obtains the database access being encapsulated in database access encapsulation function
Bottom function, and obtain preset configuration file;Database-name is prestored in the configuration file;
Access operation is executed according to the database bottom function pair database corresponding with the database-name.
2. the method according to claim 1, wherein shown database access encapsulates function instruction are as follows: connection number
It is instructed according to library function;The database bottom function includes: the connection data bottom storehouse layer letter being encapsulated in connection database functions
Number;
Access operation is executed according to the database bottom function pair database corresponding with the database-name, comprising:
According to the Database connection corresponding with the database-name of connection data bottom storehouse layer functions.
3. according to the method described in claim 2, it is characterized in that, the connection data bottom storehouse layer functions include: ORACLE tune
Function is logged in interface OCI initialization function, context initialization function, application OCI handles function and OCI.
4. the method according to claim 1, wherein the database access encapsulates function instruction are as follows: disconnect number
It is instructed according to library function;The database bottom function further include: the turn-off data bottom storehouse layer being encapsulated in turn-off data library function
Function;
Access operation is executed according to the database bottom function pair database corresponding with the database-name, comprising:
The connection of database corresponding with the database-name is disconnected according to the turn-off data bottom storehouse layer functions.
5. according to the method described in claim 4, it is characterized in that, the turn-off data bottom storehouse layer functions include: release OCI
Handle function and database disconnect function.
6. the method according to claim 1, wherein the database bottom function further include: access database
Bottom function;
Access operation is executed according to the database bottom function pair database corresponding with the database-name, comprising:
It is accessed according to the access data bottom storehouse layer functions to the corresponding database of the database-name.
7. according to the method described in claim 6, it is characterized in that, the access data bottom storehouse layer functions access for no return value
Function, comprising: readiness database statement fuction executes database statement function and submits database statement function.
8. according to the method described in claim 6, it is characterized in that, the access data bottom storehouse layer functions are to have access value access
Function, comprising: readiness database statement fuction executes database statement function, obtains train value function, opening space function, obtains
Take row value function and circulation searching assignment function.
9. method according to claim 7 or 8, which is characterized in that the implementing result of the access data bottom storehouse layer functions
It is stored in vector data form.
10. method according to claim 7 or 8, which is characterized in that in the access data bottom storehouse layer functions implementation procedure
Error reason be stored in txt file.
11. according to the method described in claim 3, it is characterized in that, prestoring username and password in the configuration file;
Function Database connection corresponding with the database-name is logged according to OCI, comprising:
It is whether legal that the user name is verified according to the username and password;
When verifying legal, Database connection corresponding with database-name.
12. a kind of database accessing device characterized by comprising
Memory;
Processor;And
Computer program;
Wherein, the computer program stores in the memory, and is configured as being executed by the processor to realize such as
The described in any item methods of claim 1-11.
13. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program;The computer program
It is executed by processor to realize such as the described in any item methods of claim 1-11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910741534.2A CN110471971A (en) | 2019-08-12 | 2019-08-12 | Data bank access method, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910741534.2A CN110471971A (en) | 2019-08-12 | 2019-08-12 | Data bank access method, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110471971A true CN110471971A (en) | 2019-11-19 |
Family
ID=68510568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910741534.2A Pending CN110471971A (en) | 2019-08-12 | 2019-08-12 | Data bank access method, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110471971A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111090454A (en) * | 2019-11-25 | 2020-05-01 | 广州极点三维信息科技有限公司 | Automatic processing method, device and equipment based on ODB |
CN111899886A (en) * | 2020-06-28 | 2020-11-06 | 万达信息股份有限公司 | Medical record retrieval method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002093430A1 (en) * | 2001-05-14 | 2002-11-21 | Infomove, Inc. | Method and apparatus for implementing a data management system using a metadata specification |
CN1448867A (en) * | 2002-03-30 | 2003-10-15 | 深圳市中兴通讯股份有限公司 | Method for accessing database system uniformly |
CN105956481A (en) * | 2015-09-17 | 2016-09-21 | 中国银联股份有限公司 | Data processing method and device |
-
2019
- 2019-08-12 CN CN201910741534.2A patent/CN110471971A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002093430A1 (en) * | 2001-05-14 | 2002-11-21 | Infomove, Inc. | Method and apparatus for implementing a data management system using a metadata specification |
CN1448867A (en) * | 2002-03-30 | 2003-10-15 | 深圳市中兴通讯股份有限公司 | Method for accessing database system uniformly |
CN105956481A (en) * | 2015-09-17 | 2016-09-21 | 中国银联股份有限公司 | Data processing method and device |
Non-Patent Citations (1)
Title |
---|
李培军 等: "利用 OCI 封装类实现 Oracle 与国产数据库间的应用程序移植", 《技术与方法》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111090454A (en) * | 2019-11-25 | 2020-05-01 | 广州极点三维信息科技有限公司 | Automatic processing method, device and equipment based on ODB |
CN111090454B (en) * | 2019-11-25 | 2021-03-23 | 广州极点三维信息科技有限公司 | Automatic processing method, device and equipment based on ODB |
CN111899886A (en) * | 2020-06-28 | 2020-11-06 | 万达信息股份有限公司 | Medical record retrieval method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101334728B (en) | Interface creating method and platform based on XML document description | |
US9038032B2 (en) | Symbolic execution and automatic test case generation for JavaScript programs | |
US10127023B2 (en) | Computer-aided development of native mobile application code | |
CN106559438A (en) | A kind of program method for uploading and device based on objective network platform | |
CN108133007A (en) | A kind of method of data synchronization and system | |
CN105335412A (en) | Method and device for data conversion and data migration | |
CN112232000B (en) | Authentication system, authentication method and authentication device spanning multiple authentication domains | |
CN104156313A (en) | Method for automatically generating Web service testing case | |
CN109508178A (en) | A kind of program developing method and device | |
CN110187916B (en) | Method for generating Word document based on data configuration | |
EP3443460B1 (en) | Method, apparatus, and computer-readable medium for performing functional testing of software | |
CN109564540A (en) | Debugging tool for JIT compiler | |
CN110471971A (en) | Data bank access method, equipment and storage medium | |
CN109445845A (en) | Interface call method, device, computer equipment and storage medium | |
CN106776779B (en) | Method for generating entity file by JSON data based on Mac platform | |
US20150121337A1 (en) | Regular expression support in instrumentation languages using kernel-mode executable code | |
CN105867886B (en) | Method and device for writing table | |
CN109933331A (en) | Data transfer device and associated component between a kind of client-server | |
CN116521181B (en) | Script data processing method, device, equipment and medium based on game system | |
CN111176926B (en) | IP core simulation system and simulation method based on dual-port SRAM | |
CN116048481A (en) | Service information processing system and method | |
CN108334313A (en) | Continuous integrating method, apparatus and code management system for large-scale SOC research and development | |
CN109858169B (en) | Modelica-based model flattening method | |
KR20160004101A (en) | Big data storage adapter system | |
CN117667195A (en) | Agile development method for database table and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191119 |