CN114153734A - Buried point data management method and related equipment - Google Patents

Buried point data management method and related equipment Download PDF

Info

Publication number
CN114153734A
CN114153734A CN202111473281.9A CN202111473281A CN114153734A CN 114153734 A CN114153734 A CN 114153734A CN 202111473281 A CN202111473281 A CN 202111473281A CN 114153734 A CN114153734 A CN 114153734A
Authority
CN
China
Prior art keywords
buried point
point data
terminal
configuration information
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111473281.9A
Other languages
Chinese (zh)
Inventor
李洁辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Rox Intelligent Technology Co Ltd
Original Assignee
Shanghai Rox Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Rox Intelligent Technology Co Ltd filed Critical Shanghai Rox Intelligent Technology Co Ltd
Priority to CN202111473281.9A priority Critical patent/CN114153734A/en
Publication of CN114153734A publication Critical patent/CN114153734A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/368Test management for test version control, e.g. updating test cases to a new software version
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Processing Or Creating Images (AREA)

Abstract

The application discloses a buried point data management method and related equipment. The method comprises the following steps: acquiring an interactive page image of a terminal; identifying the interactive page image according to a control map cutting library, and determining at least one target buried point object in the interactive page corresponding to the interactive page image, wherein the control map cutting library comprises at least one first control map cutting, and a second control map cutting of each target buried point object in the interactive page image corresponds to one first control map cutting; generating configuration information based on the at least one target buried object; and sending the configuration information to a terminal so that the terminal sends the buried point data to the cloud platform based on the configuration information. By the method, the terminal can send the buried point data according to the user requirement through the synchronous configuration information, so that the frequent release of the terminal version is avoided, the modification period is shortened, and the change operation of the terminal data is simplified.

Description

Buried point data management method and related equipment
Technical Field
The application belongs to the technical field of big data, and particularly relates to a buried point data management method and related equipment.
Background
At present, after the terminal is released for use, the buried point is relatively fixed. Once the problems of product definition missing, development omission, incomplete test and the like occur, the acquired terminal data may be incomplete, so that the data product of the terminal is invalid. Therefore, developers need to modify the embedded point code and reissue a new terminal version, so as to obtain complete terminal data. However, the method for obtaining the complete terminal data has the problems of frequent release of terminal versions, long modification period, complex operation and the like.
Disclosure of Invention
In view of this, the method, the apparatus, the computer device, and the computer storage medium for managing buried point data provided in the embodiments of the present application can enable a terminal to send buried point data according to a user requirement through synchronization configuration information, thereby avoiding frequent release of a terminal version, shortening a modification period, and simplifying a change operation of terminal data.
In a first aspect, an embodiment of the present application provides a buried point data management method, where the method is applied to a cloud platform, and the buried point data management method includes:
acquiring an interactive page image of a terminal;
identifying an interactive page image according to a control map cutting library, and determining at least one target buried point object in an interactive page corresponding to the interactive page image, wherein the control map cutting library comprises at least one first control map cutting, and a second control map cutting of each target buried point object in the interactive page image corresponds to one first control map cutting;
generating configuration information based on the at least one target buried object;
and sending the configuration information to a terminal so that the terminal sends the buried point data to the cloud platform based on the configuration information.
In a second aspect, an embodiment of the present application provides a buried point data management method, where the method is applied to a terminal, and the buried point data management method includes:
acquiring configuration information sent by a cloud platform; the configuration information is generated based on at least one target buried point object in the terminal, the at least one target buried point object is determined according to an interactive page image of a control cutting library identification terminal, and the target buried point object is a target buried point object in an interactive page corresponding to the interactive page image;
the buried point data is transmitted based on the configuration information.
In a third aspect, an embodiment of the present application provides a buried point data management apparatus, where the buried point data management apparatus is applied to a cloud platform, and the buried point data management apparatus includes:
the image acquisition module is used for acquiring an interactive page image of the terminal;
the target determination module is used for identifying the interactive page image according to a control map cutting library and determining at least one target buried point object in the interactive page corresponding to the interactive page image, wherein the control map cutting library comprises at least one first control map cutting, and a second control map cutting of each target buried point object in the interactive page image corresponds to one first control map cutting;
an information generation module for generating configuration information based on at least one target buried object;
and the information sending module is used for sending the configuration information to the terminal so that the terminal sends the buried point data to the cloud platform based on the configuration information.
In a fourth aspect, an embodiment of the present application provides a buried point data management apparatus, which is applied to a terminal, and includes:
the information acquisition module is used for acquiring configuration information sent by the cloud platform; the configuration information is generated based on at least one target buried point object in the terminal, the at least one target buried point object is determined by identifying an interactive page image of the terminal according to a control cutting library, and the target buried point object is a target buried point object in an interactive page corresponding to the interactive page image;
and the data sending module is used for sending the buried point data based on the configuration information.
In a fifth aspect, an embodiment of the present application provides a computer device, where the computer device includes: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the buried point data management method of the first or second aspect.
In a sixth aspect, the present application provides a computer storage medium having computer program instructions stored thereon, where the computer program instructions, when executed by a processor, implement the buried point data management method according to the first aspect or the second aspect.
According to the method and device for managing the data of the buried points, the computer equipment and the computer storage medium, the interactive page image is identified on the cloud platform based on the control graph cutting library, the target buried point object in the interactive page is determined, and therefore the configuration information is generated based on the target buried point object, and the configuration information can meet the user requirements. And synchronizes the configuration information to the terminal. The terminal sends the buried point data to the cloud platform based on the configuration information, so that the terminal can send the buried point data according to the user requirements, the defect of the terminal data can be overcome, the terminal version is prevented from being frequently released, the modification period is shortened, and the change operation of the terminal data is simplified. In addition, the terminal can send the buried point data according to the user requirement through the configuration information, so that the acquisition of a large amount of useless buried point data is avoided, network resources are saved, and the computing burden of the cloud platform is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating an architecture of a buried point data management system according to an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating a buried point data management method according to an embodiment of the present disclosure;
fig. 3 illustrates an exemplary flowchart of S22 provided by the embodiment of the present application;
fig. 4 is a schematic flow chart illustrating another buried point data management method according to an embodiment of the present disclosure;
fig. 5 is a schematic flowchart illustrating a process of sending buried point data based on a first identifier according to an embodiment of the present application;
fig. 6 is a schematic structural diagram illustrating a buried point data management apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram illustrating another buried point data management apparatus according to an embodiment of the present application;
fig. 8 shows a hardware structure diagram of a computer device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative only and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
Since the terminal relates to applications for a plurality of functions, the applications are provided by a plurality of application providers. Therefore, the development frameworks and development specifications of applications with different functions are different. When the embedded point requirement in the development specification of a certain supplier is defective, the embedded point is set in a hard coding mode, which may cause the embedded point data of the terminal to be defective.
Moreover, since the terminal includes a large number of applications, each application includes hundreds or even thousands of interactive pages, each interactive page has a buried point. In the primary terminal delivery test, a developer firstly tests the terminal, then a background receives a test data packet, and finally the developer screens buried point data from the test data packet and calculates the buried point data to obtain a test result. In the test process, the data volume is huge, and developers need to process test data in the background, so that the developers do not have an intuitive means to detect the buried data. In the case of a defect in the buried point data, the terminal test result may be deviated from the actual design.
In view of this, an embodiment of the present application provides a buried point data management method, which identifies an interactive page image on a cloud platform based on a control graph cutting library, and determines a target buried point object in the interactive page, so as to generate configuration information based on the target buried point object, so that the configuration information can meet user requirements. And synchronizes the configuration information to the terminal. The terminal sends the buried point data to the cloud platform based on the configuration information, so that the terminal can send the buried point data according to the user requirements, the defect of the data in the terminal can be overcome, the terminal version is prevented from being frequently released, the modification period is shortened, and the change operation of the terminal data is simplified.
In addition, the cloud platform receives the data of the buried point sent by the terminal, so that a user can conveniently and visually observe the data of the buried point, manual screening from a large amount of test data is not needed, and the terminal test flow is simplified. And the cloud platform directly processes the buried point data, so that the terminal testing efficiency and accuracy can be improved.
Before describing the method for managing buried point data provided by the embodiment of the present application in detail, the architecture of the buried point data management system according to the present application will be described first.
Fig. 1 is a schematic diagram illustrating an architecture of a buried point data management system according to an embodiment of the present application. As shown in fig. 1, the buried point data management system 10 may include a cloud platform 11 and a terminal 12. The terminal 12 may be various electronic product terminals, such as a vehicle-mounted terminal.
The terminal 12 may include a terminal site agent module 121. The terminal site agent module 121 may include an agent center sub-module 1211 and an agent sub-module 1212. The agent center submodule 1211 can be configured to report the embedded point data, update the embedded point configuration rule base, and manage the version of the embedded point configuration rule base. Proxy submodule 1212 may be used for buried point data collection.
In some embodiments, the agent submodule 1212 includes an agent Software Development Kit (SDK) installed in each application of the terminal. The proxy sub-module 1212 collects the buried point data of each application through the proxy SDK.
Here, the cloud platform 11 includes a buried point data management platform 111 and a big data platform 112, where the big data platform 112 is used to classify buried point data collected by the terminal.
The buried point data management platform 111 may include: the system comprises a basic management module 1111, an extension rule management module 1112, a buried point configuration page generation module 1113, a version management module 1114, a buried point information configuration module 1115, a release management module 1116, an abnormal data identification module 1117 and an application topology module 1118.
Here, the basic management module 1111 is configured to configure basic events (i.e., a dead-end event) of various types of controls, such as a single-click event of a button event and a double-click time of a button. And is also used for automatically associating the control with a configured underlying event when the control type is determined.
An extended rule management module 1112 is used to define special type events, such as control dragging, zooming in and out of a control, etc.
And a buried point configuration page generating module 1113, configured to generate a buried point configuration page through image recognition.
The version management module 1114 is configured to uniformly customize version identifiers for the generated configuration information bases, and record configuration information of each version of the configuration information bases. The configuration information may be the configuration information of the buried point, i.e. the buried point rule.
A buried point information configuration module 1115 configured to configure buried point configuration information in the generated buried point configuration page; and the method is also used for modifying the embedded point and modifying the incidence relation between the control and the control event.
And a release management rule module 1116, configured to release the configuration information base to the terminal after customizing the version of the configuration information base.
An abnormal data identification module 1117, configured to count abnormal data in the buried point data, such as a button not in the design, a button position not matching the design, and the like, and periodically generate an abnormal report to send to a user, and the like.
The application topology module 1118 is configured to calculate an application interaction topology map through the buried point data, and provide the application interaction map to the user so that the user can check whether the design and the implementation are matched.
In the embodiment, the interactive page image of the terminal is identified through the cloud platform, the configuration information base is generated, and the configuration information base is synchronized with the terminal, so that the terminal reports the buried point data according to the configuration information base, the terminal can report the buried point data according to the user requirement, the modification period is shortened, the change operation of the buried point data of the terminal is simplified, and the terminal version does not need to be frequently released.
Fig. 2 is a schematic flowchart illustrating a method for managing buried point data according to an embodiment of the present application, and as shown in fig. 2, the method for managing buried point data may be applied to a cloud platform, and may include the following steps S21 to S224.
And S21, acquiring the interactive page image of the terminal.
And S22, identifying the interactive page image according to the control cutting library, and determining at least one target buried point object in the interactive page corresponding to the interactive page image.
Here, the second control segment of each target buried point object in the interactive page image corresponds to one first control segment.
S23, generating configuration information based on the at least one target buried object.
And S24, sending the configuration information to the terminal, so that the terminal sends the buried point data to the cloud platform based on the configuration information.
Specific implementations of the above steps are described in detail below.
In the embodiment, the interactive page image is identified on the basis of the control graph cutting library on the cloud platform, the target buried point object in the interactive page is determined, and therefore the configuration information is generated on the basis of the target buried point object, and the configuration information can meet the user requirements. And synchronizes the configuration information to the terminal. The terminal sends the buried point data to the cloud platform based on the configuration information, so that the terminal can send the buried point data according to the user requirements, the defect of the terminal data can be overcome, the terminal version is prevented from being frequently released, the modification period is shortened, and the change operation of the terminal data is simplified. In addition, the terminal can send the buried point data according to the user requirement through the configuration information, so that the acquisition of a large amount of useless buried point data is avoided, network resources are saved, and the computing burden of the cloud platform is reduced.
The following describes the steps and specific implementation of the above steps.
In S21, the interactive page image may be a general layout of a static page for the terminal application. The interactive page image may include a static image of all page elements in the interactive page. The page elements may include, but are not limited to, text, controls, and the like. The terminal application may be an application in the terminal.
In an embodiment of the application, the interactive page image may be a static page design summary of at least one interactive page of at least one application. For example, the interactive page image may be a static page design overview of an interactive page of a music application on the in-vehicle terminal.
Here, the interactive page image may be designed according to Human Machine Interface (HMI) specifications, for example, the interactive page image may satisfy design specifications of an in-vehicle HMI.
At S22, the control cut library includes at least a first control cut. And the first control cutting graph is a cutting graph corresponding to the control in the interactive page. The interactive page is an interactive page of the terminal application. The interactive page corresponds to the interactive page image.
In S22, the second control cut is an image in the interactive page image corresponding to the first control cut. The second control cut may be a static control image.
In S22, the target buried object may include a control to set the buried point in the interaction page. That is, the target buried object may include a control that corresponds one-to-one to the second control cut in the interactive page image.
S22 may be executed by the cloud platform identifying, from a first control cut in the control cut library, a second control cut in the interactive page image that matches the first control cut, and determining a target buried object in the interactive page based on the second control cut.
Here, there are many methods for identifying the second control segment, for example, identification is performed based on an image identification model, identification is performed based on an image identification algorithm, and the like.
In S23, the configuration information may be the buried point data configuration information of the interactive page, and may be used to indicate a terminal buried point data transmission policy. Alternatively, the buried point data transmission policy may include transmitting buried point data, transmitting the number of times of occurrence of buried point data, and transmitting abnormal buried point data. The abnormal buried point data refers to buried point data which does not belong to the target buried point object.
In some embodiments, there are many applications in a terminal, and an application includes at least hundreds or even thousands of interactive pages. Therefore, the data amount of the configuration information of one terminal is huge. For convenience of searching, the configuration information can be stored in the cloud platform in the form of a database and published to the terminal. The database may become a configuration information base.
In addition, in order to distinguish different versions of the configuration information base, a version identification can be added to the configuration information base.
In S24, the cloud platform sends the configuration information to the terminal. And the terminal receives the configuration information and sends the buried point data to the cloud platform based on the configuration information.
The terminal collects all embedded point data of the application, and transmits the embedded point data matched with the target embedded point object in the configuration information in the whole embedded point data according to the embedded point data transmission strategy in the configuration information.
For the specific implementation of S22, in some embodiments, fig. 3 illustrates an exemplary flowchart of S22 provided in the embodiments of the present application, and as shown in fig. 3, S22 may be implemented as the following steps S31 to S33.
S31, determining at least one second control cutting chart, the control type of the at least one second control cutting chart and the layout parameters of the at least one second control cutting chart in the interactive image according to each first control cutting chart in the control cutting chart library.
Here, for each first control cut in the control cut library, an image region matching the shape parameter and the pixel value of the first control cut is searched in the interactive page image, the image region is determined as a second control cut corresponding to the first control cut, and the position parameter and the size parameter of the image region are determined as the layout parameters of the second control cut in the interactive page image.
And the cloud platform determines the control type of the first control cut graph as the control type of the second control cut graph corresponding to the first control cut graph.
And S32, acquiring a target buried point event corresponding to at least one second control cutting chart, wherein the target buried point event is a preset buried point event associated with the control type of the second control cutting chart.
Here, the cloud platform stores the association relationship between the control type and the preset buried point event. The preset flush point event may include, but is not limited to, a single-click event, a double-click event, and the like. And the cloud platform acquires a preset buried point event corresponding to the second control cutting chart according to the control type of the second control cutting chart.
In one example, the button type is associated with a click event and a double click event, and when the control type associated with the second control cut graph is the button type, the target buried point events corresponding to the second control cut graph are the click event and the double click event.
And S33, determining at least one target buried point object in the interactive page corresponding to the interactive page image based on the layout parameters of the at least one second control cut and the target buried point event.
Here, the target buried point object corresponds to the second control tangent map one to one. The target buried point object comprises a control corresponding to the second control cutting diagram and a target buried point event. The cloud platform can determine the relative position and the relative size of the control in the target buried point object in the interactive page according to the layout parameters of the second control tangent diagram, and can determine the target buried point event in the target buried point object according to the target buried point event corresponding to the second control graph.
In the embodiment, the control which needs to be embedded with the point can be determined through the control map cutting library, the second control map cutting in the interactive page image is rapidly determined by matching the first control map cutting in the control map cutting library with the interactive page image, the target embedded point object in the interactive page matched with the interactive page image is rapidly determined according to the embedded point event associated with the second control map cutting, and therefore the configuration information generated subsequently based on the target embedded point object is matched with the embedded point requirement of the user.
In some embodiments, in order to prompt the user of a problem in generating the configuration information, at S22, the interactive page image is identified according to the control graph cut library, and after determining at least one target buried object in the interactive page corresponding to the interactive page image, the buried point data management method further includes:
and generating abnormal information under the condition that the number of the target buried point objects is different from that of the first control cutting pictures.
Here, the number of target buried point objects is different from the number of first control cut maps, and it can be understood that the target buried point objects equal to the number of first control cut maps are not determined in the interactive page, that is, the target buried point objects in the interactive page do not match with the user buried point requirement.
In this embodiment of the application, the condition that the number of the generated target buried point objects is different from the number of the first control tangent diagrams is at least one of the following conditions: not all of the first control cut maps are fully identified, and the second control cut map is not associated with a preset buried point event.
The anomaly information may be used to indicate an anomaly condition that identifies the target buried point object. The exception information may include a first control cut that is not recognized and a second control cut that is not associated with a buried point event. The unrecognized first control cut graph can refer to a first control cut graph which is not matched with the interactive page image. The second control cut not associated with a buried point event may refer to a second control cut not associated with a preset buried point event.
In the above embodiment, by generating the exception information, the user may be prompted to determine that an exception condition exists in the embedded point object in the interactive page, and the user may be facilitated to modify the configuration information according to the exception information, so that the configuration information meets the user's expectations.
In some embodiments, in order to determine whether the target buried point object matches the user' S buried point requirement, at S22, the interactive page image is identified according to the control graph cut library, and after determining at least one target buried point object in the interactive page corresponding to the interactive page image, the buried point data management method further includes:
and generating a buried point configuration management page corresponding to the interactive page image based on at least one target buried point object.
Here, the buried point configuration management page is an interactive page that visualizes the target buried point object, that is, the user can directly observe the target buried point object on the interactive page. Therefore, the user can detect whether the embedded point object of the interactive page is matched with the user requirement through the embedded point configuration management page.
In some embodiments, in order to modify the configuration information quickly, after generating the configuration information based on the at least one target buried object at S23, the buried point data management method further includes:
updating the configuration information based on the modification information of the buried point configuration management page.
Here, the modification information may include at least one of the following information: modification information of the page area, and modification information of the buried point event. The modification information of the page area may refer to information for modifying a certain area in the interactive page. For example, information that modifies a control in an interaction page.
Optionally, the modification information of the buried point event may refer to adding the buried point event, so that each first control graph cut associated control type has the corresponding buried point event.
In the embodiment of the application, the modification information of the buried point configuration management page can be determined according to the user modification operation.
In the embodiment of the present application, updating the configuration information may refer to updating a target buried object of the configuration information.
In the above embodiment, the configuration information can be updated by modifying the buried point configuration management page, so that the buried point configuration in the interactive page is more complete, and the configuration information can be conveniently changed by the user.
In some embodiments, in order to improve the accuracy and efficiency of modifying the buried point configuration management page, the modification information of the configuration management page may be determined according to a modification operation performed by a user based on the exception information.
In some embodiments, in order to quickly determine the sending policy of each type of buried point data, S23, generating configuration information based on at least one target buried point object, may be specifically implemented as:
acquiring a first identifier of each target buried point object;
configuration information is generated based on the first identification of each target buried point object.
Here, the first flag is used to indicate whether to transmit the buried point data corresponding to the target buried point object. For example, the first flag may be "Y" indicating that buried point data is transmitted or "N" indicating that buried point data is not transmitted but the number of times the buried point data is transmitted.
In the embodiment of the present application, the first identifier may be obtained by a user input, or by identifying a target buried object, or by other methods. The first identification is obtained, for example, by identifying the importance of the target buried object or the control type. Here, the manner of acquiring the first identifier is not limited.
Here, the cloud platform adds a first identification to each target-buried object, thereby generating configuration information. The configuration information includes a buried point data transmission policy for each target buried point object.
In the above embodiment, the configuration information is generated based on the first identifier of the target buried point object, so that the buried point data sending mode corresponding to the target buried point object can be quickly determined by identifying the first identifier in the configuration information.
In some embodiments, each target buried point object may include the same number of first identifiers as the number of buried point events in the target buried point event due to the different importance of the buried point event. Each buried point event corresponds to a first identifier.
In some embodiments, the configuration information may further include a second identification. The second identifier may be used to indicate identity information of the target buried point object. The second identification may include a control name identification, a control type identification, and a layout parameter identification. Therefore, each target buried point object can be distinguished quickly through the second identifier, and the terminal can conveniently and quickly screen out buried point data corresponding to each target buried point object from all the buried point data.
In one example, the second identifier may be camera _ button _00002, left ═ 40, top ═ 30, height ═ 20, and width ═ 60, where the second identifier indicates that the target buried point object is a second control in the camera application, and the control type is a button, the relative position and relative size of the target buried point object are 40 units from the left boundary of the interactive page, 20 units from the upper boundary of the interactive page, the height of the control is 20 units, and the width of the control is 60 units. The units may be centimeters or pixels.
In some embodiments, in order to determine whether the terminal implementation is consistent with the design, after sending the configuration information to the terminal at S24, the buried point data management method further includes:
determining the application interactive topological relation of the terminal based on the buried point data sent by the terminal,
here, the buried point data includes interaction data between application services. The application interaction topological relation comprises an interaction relation among application services in the terminal, namely a calling relation among the application services in the terminal.
In the embodiment of the application, the cloud platform receives the data of the embedded point sent by the terminal, and can generate the application interaction topological relation of the terminal according to the received data of the embedded point so as to quickly judge whether the implementation and the design of the terminal are consistent.
Optionally, in order to facilitate the user to review the application interaction topological relation, the application interaction topological relation may be represented by an application topological relation graph.
In the embodiment, the cloud platform can determine the calling relationship of the application service in the terminal by receiving the buried point data sent by the terminal, so as to determine whether the implementation and the design of the terminal are matched.
In addition, the cloud platform also generates a buried point data report according to the buried point data, and the buried point data report can comprise related information of each buried point. Therefore, whether the actual buried point of the interactive page is consistent with the designed buried point of the interactive page can be judged through the buried point data report, so that a buried point detection result can be directly obtained, and the buried point data is prevented from being manually screened from test data for detection.
Based on the same technical concept as the buried point data management method, the embodiment of the application also provides another point data management method. Fig. 4 is a schematic flow chart of another method for managing buried point data provided in this embodiment of the present application, and as shown in fig. 4, the method for managing buried point data may be applied to a terminal, and may include the following steps S41 to S42.
And S41, acquiring the configuration information sent by the cloud platform.
Here, the configuration information is generated based on at least one target buried object in the terminal. And at least one target buried point object is determined according to the interactive page image of the control image cutting library recognition terminal. The target buried object is a target buried object in the interactive page corresponding to the interactive page image.
It should be noted that the configuration information in S41 is the same as that in the foregoing embodiment. And are not described in detail herein for the sake of brevity.
S42, sending the buried point data based on the configuration information.
Here, the buried point data may refer to buried point data of the terminal. The buried point data may include buried point data of each target buried point object in the interactive page of the terminal. And the terminal sends the buried point data according to the buried point data sending strategy in the configuration information.
In the embodiment, the terminal acquires the configuration information sent by the cloud platform and sends the buried point data of the terminal based on the configuration information, so that the buried point data sent by the terminal can meet the requirement of a user, a large amount of useless buried point data is prevented from being sent to the user, and network resources are saved.
In some embodiments, the terminal itself stores local configuration information, and after S41, the buried point data management method includes:
comparing whether the local configuration information is consistent with the configuration information acquired from the cloud platform;
under the condition of inconsistency, updating the local configuration information into configuration information;
in case of consistency, no update is made to the local configuration information.
Here, the local configuration information may be configuration information acquired from the cloud platform in a historical time. The historical time may be a time before the configuration information is acquired this time. The local configuration information may be used for the terminal to send buried point data.
In the embodiment of the present application, comparing whether the local configuration information is consistent with the configuration information may be performed to compare whether the version identifiers of the local configuration information and the configuration information are consistent. Under the condition that the version identifications are consistent, the local configuration information can be considered to be consistent with the configuration information acquired from the cloud platform. Under the condition that the version identifications are not consistent, the local configuration information and the configuration information acquired from the cloud platform at this time can be considered to be inconsistent.
In the embodiment, by comparing the local configuration information with the configuration information acquired from the cloud platform this time, whether to update the local configuration information is determined, so that unnecessary update is reduced.
In addition, when the configuration information acquired by the terminal at this time has defects, the terminal can send buried point data according to the local configuration information, so that the buried point data is prevented from being sent according to wrong configuration information.
In some embodiments, sending the buried point data based on the configuration information includes:
in the case where the configuration information includes a first identification for each target buried point object, the buried point data is transmitted based on the first identification.
Here, the first flag is used to indicate whether to transmit the buried point data corresponding to the target buried point object. And the terminal classifies the collected application buried point data based on the first identifier in the configuration information and sends the classified application buried point data.
In the embodiment, the data of the buried point collected by the terminal can be quickly processed through the first identifier, so that the data of the buried point meeting the user's desire can be sent to the cloud platform.
For the specific implementation of sending buried point data based on the first identifier, in some embodiments, fig. 5 illustrates a flowchart of sending buried point data based on the first identifier according to an embodiment of the present application. As shown in fig. 5, transmitting buried point data based on the first identification may include S51 through S54. Wherein, S53 and S54 are not in sequence and can be executed in parallel.
S51, obtaining the first buried point data of the interactive page.
Here, the first buried point data is all the buried point data of the interactive page. The terminal can acquire all data of the embedded points of the interactive page through the agent SDK installed in the application, so that the first data of the embedded points is acquired.
And S52, screening second buried point data from the first buried point data.
Here, the second buried point data is buried point data with which the target buried point object matches. The terminal may filter buried point data matching the target buried point object from the first buried point data according to the target buried point object in the configuration information. That is to say, the data of the embedded point of the control corresponding to the target embedded point object is screened from the first data of the embedded point.
Optionally, the terminal may perform filtering according to the second identifier of the control, that is, according to the number or layout parameter of the control.
S53, in the case where the first identification of the target buried object indicates to transmit buried point data, transmitting second buried point data.
Here, the terminal determines whether to transmit the second buried point data according to the first identifier of the target buried point object. When the first identifier can be used for indicating to transmit the buried point data of the target buried point object, the terminal transmits the buried point data corresponding to the target buried point object in the first buried point data.
S54, in the event that the first identification of the target buried point object indicates that buried point data is not to be transmitted, transmitting the number of times that second buried point data occurs within a preset time period.
Here, the preset time period may be any time period. And under the condition that the first identification indicates that the buried point data of the target buried point object is not sent, the terminal counts the occurrence times of the buried point data of the target buried point object in a preset time period and sends the buried point data to the cloud platform.
In the above embodiment, the sending manner of the buried point data generated by the target buried point object in the terminal is determined through the first identifier of the target buried point object, so that the buried point data sent by the terminal can meet the user requirement, and a large amount of useless buried point data is prevented from being sent to the user.
In some embodiments, in a case that an interactive page of the terminal has a defect, for example, a control is newly added in a terminal page, the buried point data collected by the terminal may have an abnormality, and in order to remind the user that the terminal page is abnormal, after the second buried point data is screened from the first buried point data at S52, the buried point data management method further includes:
determining third buried point data as abnormal buried point data;
and sending the abnormal buried point data to the cloud platform.
Here, the third buried point data is buried point data other than the second buried point data in the first buried point data, that is, buried point data that does not match the configuration information.
As a buried point or a buried point event which is not within the user design range occurs at the terminal, buried point data which does not match with the configuration information occurs. Therefore, the data is sent to the cloud platform as abnormal buried point data so that a user can modify the terminal.
In the above embodiment, the data of the buried point which does not match with the configuration information is sent to the cloud platform as the abnormal data of the buried point, so that the user can know the abnormal condition of the terminal.
Based on the same technical concept as the buried point data management method, the embodiment of the application provides a buried point data management device which is applied to a cloud platform. Fig. 6 is a schematic structural diagram of a buried point data management device according to an embodiment of the present application, and as shown in fig. 6, the buried point data management device 60 includes:
the image acquisition module 61 is used for acquiring an interactive page image of the terminal;
the target determining module 62 is configured to identify the interactive page image according to a control map cutting library, and determine at least one target buried point object in the interactive page corresponding to the interactive page image, where the control map cutting library includes at least one first control map cutting, and a second control map cutting of each target buried point object in the interactive page image corresponds to one first control map cutting;
an information generating module 63 for generating configuration information based on at least one target buried object;
and the information sending module 64 is used for sending the configuration information to the terminal so that the terminal sends the buried point data to the cloud platform based on the configuration information.
In the embodiment, the interactive page image is identified on the basis of the control graph cutting library on the cloud platform, the target buried point object in the interactive page is determined, and therefore the configuration information is generated on the basis of the target buried point object, and the configuration information can meet the user requirements. And synchronizes the configuration information to the terminal. The terminal sends the buried point data to the cloud platform based on the configuration information, so that the terminal can send the buried point data according to the user requirements, the defect of the terminal data can be overcome, the terminal version is prevented from being frequently released, the modification period is shortened, and the change operation of the terminal data is simplified. In addition, the terminal can send the buried point data according to the user requirement through the configuration information, so that the acquisition of a large amount of useless buried point data is avoided, network resources are saved, and the computing burden of the cloud platform is reduced.
In some embodiments, the information generation module 63 includes:
the identification obtaining submodule is used for obtaining a first identification of each target buried point object, and the first identification is used for indicating whether buried point data corresponding to the target buried point object is sent or not;
and the information generation submodule is used for generating configuration information based on the first identification of each target buried point object.
In some embodiments, the buried point data management apparatus 60 further includes:
and the relationship determining module is used for determining an application interaction topological relationship of the terminal based on the buried point data sent by the terminal after the configuration information is sent to the terminal, wherein the buried point data comprises interaction data among application services, and the application interaction topological relationship comprises an interaction relationship among the application services in the terminal.
In some embodiments, the targeting module 62 may include:
the cutting determining sub-module is used for determining at least one second control cutting in the interactive image, the control type of the at least one second control cutting and the layout parameters of the at least one second control cutting according to each first control cutting in the control cutting library;
the event acquisition sub-module is used for acquiring a target buried point event corresponding to at least one second control cutting chart, and the target buried point event is a preset buried point event related to the control type of the second control cutting chart;
and the object determining submodule is used for determining at least one target embedded point object in the interactive page corresponding to the interactive page image based on the layout parameters of the at least one second control cut graph and the target embedded point event, and the target embedded point object is in one-to-one correspondence with the second control cut graph.
Based on the same technical concept as the buried point data management method, the embodiment of the application provides a buried point data management device which is applied to a terminal. Fig. 7 is a schematic structural diagram of a buried point data management device according to an embodiment of the present application, and as shown in fig. 7, the buried point data management device 70 includes:
an information obtaining module 71, configured to obtain configuration information sent by a cloud platform; the configuration information is generated based on at least one target buried point object in the terminal, the at least one target buried point object is determined by identifying an interactive page image of the terminal according to a control graph cut library, and the target buried point object is a target buried point object in an interactive page corresponding to the interactive page image;
and a data sending module 72, configured to send the buried point data based on the configuration information.
In the embodiment, the terminal acquires the configuration information sent by the cloud platform and sends the buried point data of the terminal based on the configuration information, so that the buried point data sent by the terminal can meet the requirement of a user, a large amount of useless buried point data is prevented from being sent to the user, and network resources are saved.
In some embodiments, the data transmission module 72 includes:
and the data sending submodule is used for sending the buried point data based on the first identification under the condition that the configuration information comprises the first identification of each target buried point object.
In some embodiments, the data transmission sub-module comprises:
the data acquisition unit is used for acquiring first buried point data of the interactive page;
the screening unit is used for screening second buried point data from the first buried point data, wherein the second buried point data is buried point data matched with the target buried point object;
a first sending unit, for sending the second buried point data under the condition that the first identification of the target buried point object indicates to send the buried point data;
and a second transmitting unit for transmitting the number of occurrences of the second buried point data within a preset time period, in a case where the first identification of the target buried point object indicates that the buried point data is not transmitted.
In some embodiments, the buried point data management apparatus 70 further includes:
the abnormality determining module is used for determining third buried point data as abnormal buried point data, and the third buried point data is buried point data in the first buried point data except the second buried point data;
and the exception sending module is used for sending the exception buried point data to the cloud platform.
Based on the same technical concept as the buried point data management method, the embodiment of the application provides computer equipment. Fig. 8 shows a hardware structure diagram of a computer device according to an embodiment of the present application. As shown in fig. 8, a computer device may include a processor 81 and a memory 82 storing computer program instructions.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 82 may include mass storage for data or instructions. By way of example, and not limitation, memory 82 may include a Hard Disk Drive (HDD), a floppy Disk Drive, flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 82 may include removable or non-removable (or fixed) media, where appropriate. The memory 82 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 82 is a non-volatile solid-state memory.
The memory 82 may include Read Only Memory (ROM), Random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory includes one or more tangible (non-transitory) computer-readable storage media (e.g., memory devices) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors), it is operable to perform operations described with reference to the methods according to an aspect of the application.
The processor 81 realizes any one of the buried point data management methods in the above embodiments by reading and executing computer program instructions stored in the memory 82.
In one example, the computer device may also include a communication interface 83 and a bus 84. As shown in fig. 8, the processor 81, the memory 82, and the communication interface 83 are connected via a bus 84 to complete communication therebetween.
The communication interface 83 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiments of the present application.
The bus 84 comprises hardware, software, or both to couple the components of the computer device to each other. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hypertransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 84 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The computer device may implement the buried point data management method and apparatus described in conjunction with fig. 1 to 7 based on executing the buried point data management method in the embodiment of the present application.
In addition, in combination with the buried point data management method in the above embodiment, the embodiment of the present application may provide a computer storage medium to implement. The computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement any of the above-described embodiments of the buried point data management method.
In addition, in combination with the buried point data management method in the foregoing embodiments, an embodiment of the present application provides a computer program product, which includes a computer program or instructions, and when the computer program or instructions are executed by a processor, the computer program or instructions implement any one of the buried point data management methods in the foregoing embodiments.
It is to be understood that the present application is not limited to the particular arrangements and instrumentality described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions or change the order between the steps after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus, computer devices, computer storage media, and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware for performing the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (12)

1. A buried point data management method is applied to a cloud platform, and comprises the following steps:
acquiring an interactive page image of a terminal;
identifying the interactive page image according to a control map cutting library, and determining at least one target buried point object in the interactive page corresponding to the interactive page image, wherein the control map cutting library comprises at least one first control map cutting, and a second control map cutting of each target buried point object in the interactive page image corresponds to one first control map cutting;
generating configuration information based on the at least one target buried object;
and sending the configuration information to a terminal so that the terminal sends the buried point data to the cloud platform based on the configuration information.
2. The method of claim 1, wherein generating configuration information based on the at least one target buried object comprises:
acquiring a first identifier of each target buried point object, wherein the first identifier is used for indicating whether buried point data corresponding to the target buried point object is sent or not;
and generating configuration information based on the first identification of each target buried point object.
3. The method of claim 1, wherein after the sending the configuration information to the terminal, the method further comprises:
and determining an application interaction topological relation of the terminal based on the buried point data sent by the terminal, wherein the buried point data comprises interaction data among application services, and the application interaction topological relation comprises interaction relations among all the application services in the terminal.
4. The method of claim 1, wherein the identifying the interactive page image according to a control cut library, and determining at least one target buried object in an interactive page corresponding to the interactive page image comprises:
determining at least one second control cutting chart in the interactive image, a control type of the at least one second control cutting chart and layout parameters of the at least one second control cutting chart according to each first control cutting chart in a control cutting chart library;
acquiring a target buried point event corresponding to the at least one second control cutting chart, wherein the target buried point event is a preset buried point event related to the control type of the second control cutting chart;
and determining at least one target buried point object in the interactive page corresponding to the interactive page image based on the layout parameters of the at least one second control cut graph and the target buried point event, wherein the target buried point object is in one-to-one correspondence with the second control cut graph.
5. A buried point data management method is applied to a terminal, and comprises the following steps:
acquiring configuration information sent by a cloud platform; the configuration information is generated based on at least one target buried point object in the terminal, the at least one target buried point object is determined by identifying an interactive page image of the terminal according to a control graph cut library, and the target buried point object is a target buried point object in an interactive page corresponding to the interactive page image;
and transmitting the buried point data based on the configuration information.
6. The method of claim 5, wherein said sending the buried point data based on the configuration information comprises:
and sending the buried point data based on the first identification under the condition that the configuration information comprises the first identification of each target buried point object.
7. The method of claim 6, wherein said sending buried point data based on said first identification comprises:
acquiring first buried point data of the interactive page;
screening second buried point data from the first buried point data, wherein the second buried point data is buried point data matched with the target buried point object;
under the condition that the first identification of the target buried point object indicates to send buried point data, sending the second buried point data;
and under the condition that the first identification of the target buried point object indicates that the buried point data is not transmitted, transmitting the occurrence times of the second buried point data in a preset time period.
8. The method of claim 7, wherein after said screening second buried point data from said first buried point data, said method further comprises:
determining third buried point data as abnormal buried point data, wherein the third buried point data is buried point data except the second buried point data in the first buried point data;
and sending the abnormal buried point data to the cloud platform.
9. The utility model provides a buried point data management device which characterized in that is applied to the cloud platform, and the device includes:
the image acquisition module is used for acquiring an interactive page image of the terminal;
the target determination module is used for identifying the interactive page image according to a control map cutting library and determining at least one target buried point object in the interactive page corresponding to the interactive page image, wherein the control map cutting library comprises at least one first control map cutting, and a second control map cutting of each target buried point object in the interactive page image corresponds to one first control map cutting;
an information generation module for generating configuration information based on the at least one target buried object;
and the information sending module is used for sending the configuration information to a terminal so that the terminal sends the buried point data to the cloud platform based on the configuration information.
10. A buried point data management apparatus, applied to a terminal, includes:
the information acquisition module is used for acquiring configuration information sent by the cloud platform; the configuration information is generated based on at least one target buried point object in the terminal, the at least one target buried point object is determined by identifying an interactive page image of the terminal according to a control graph cut library, and the target buried point object is a target buried point object in an interactive page corresponding to the interactive page image;
and the data sending module is used for sending the buried point data based on the configuration information.
11. A computer device, the device comprising: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the buried point data management method of any of claims 1 to 8.
12. A computer storage medium having computer program instructions stored thereon which, when executed by a processor, implement the buried data management method of any one of claims 1 to 8.
CN202111473281.9A 2021-12-02 2021-12-02 Buried point data management method and related equipment Pending CN114153734A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111473281.9A CN114153734A (en) 2021-12-02 2021-12-02 Buried point data management method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111473281.9A CN114153734A (en) 2021-12-02 2021-12-02 Buried point data management method and related equipment

Publications (1)

Publication Number Publication Date
CN114153734A true CN114153734A (en) 2022-03-08

Family

ID=80452372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111473281.9A Pending CN114153734A (en) 2021-12-02 2021-12-02 Buried point data management method and related equipment

Country Status (1)

Country Link
CN (1) CN114153734A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117591381A (en) * 2024-01-18 2024-02-23 南京研利科技有限公司 Data reporting method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117591381A (en) * 2024-01-18 2024-02-23 南京研利科技有限公司 Data reporting method and device
CN117591381B (en) * 2024-01-18 2024-04-09 南京研利科技有限公司 Data reporting method and device

Similar Documents

Publication Publication Date Title
CN109408309B (en) Multi-terminal testing method and device
CN114020581A (en) Alarm correlation method based on topological optimization FP-Growth algorithm
CN112286825A (en) Screen testing method and device for intelligent cabin and electronic equipment
CN114095332A (en) Information processing method, device, equipment and computer storage medium
CN107749778A (en) A kind of communications optical cable fault early warning method and device
CN112835808A (en) Interface testing method and device, computer equipment and storage medium
CN111371581A (en) Method, device, equipment and medium for detecting business abnormity of Internet of things card
CN114153734A (en) Buried point data management method and related equipment
CN117613908B (en) Intelligent operation and maintenance method and system based on power distribution network
CN114546998A (en) Data processing method, device and equipment for data center station and readable storage medium
CN111338869A (en) Configuration parameter management method, device, equipment and storage medium
CN112637888B (en) Coverage hole area identification method, device, equipment and readable storage medium
CN116821777B (en) Novel basic mapping data integration method and system
CN116401113B (en) Environment verification method, device and medium for heterogeneous many-core architecture acceleration card
US10310840B2 (en) Computer system, method of managing transmission of software with computer system, program therefor, and recording medium
CN111176985A (en) Software interface performance testing method and device, computer equipment and storage medium
CN112380340B (en) Error data diagnosis method and system between main station, power plant and transformer substation
CN114153730A (en) Method for generating buried point configuration page and related equipment
CN113300912B (en) Equipment testing method and device and electronic equipment
CN115658478A (en) Test case screening method and device, electronic equipment and storage medium
CN115080417A (en) Test case automatic generation method, electronic equipment and storage medium
CN115186741A (en) Method, device and equipment for verifying POI fusion data
CN111538666B (en) Method, device, computer equipment and storage medium for collecting test results in batches
CN110752950A (en) Update detection method and device for cloud resource pool and terminal equipment
CN112258023A (en) Flight plan management method, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination