Data exposure method, device, electronic equipment and computer readable medium
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to a data exposure method and apparatus, an electronic device, and a computer-readable medium.
Background
In the current era of mobile internet, traffic is king. And what the user sees is one of the key data of the statistical flow. The data collection process for a view is referred to as "data exposure for a visible view", or simply "data exposure".
In the related art, a data exposure framework constructed based on the classification of the sliding events needs to be classified according to the types of the sliding events. In the process of implementing the invention, the inventor finds that the current sliding event types have various categories, and the development complexity and the access threshold of business research and development are increased. Meanwhile, the architecture design has a large coupling degree with the business controls corresponding to different sliding event types, which is not beneficial to architecture upgrading and business control multiplexing.
Therefore, a new data exposure method, apparatus, electronic device, and computer readable medium are needed.
The above information disclosed in this background section is only for enhancement of understanding of the background of the disclosure and therefore it may contain information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In view of the above, embodiments of the present disclosure provide a data exposure method, an apparatus, an electronic device, and a computer-readable medium, so as to overcome at least some of the defects of a data exposure architecture, such as a high access threshold and a high coupling with a service control.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to a first aspect of the embodiments of the present disclosure, a data exposure method is provided, which includes: monitoring first exposure time of a first view and a second view, and determining first exposure data of the first view and the second view when the first exposure time is received; monitoring a second exposure time of the second view, and determining second exposure data of the second view when the second exposure time is received; and determining target exposure data according to the first exposure data and the second exposure data.
In an exemplary embodiment of the present disclosure, determining the first exposure data of the first view and the second view includes: traversing the first view, the sub-view of the first view, the second view and the sub-view of the second view through a view container, so that the view container determines to generate the first exposure data according to the first view if a view object of a method under a first protocol can be implemented in the first view, the sub-view of the first view, the second view and the sub-view of the second view.
In an exemplary embodiment of the present disclosure, determining the second exposure data of the second view includes: and traversing the second view and the sub-view of the second view through a business control so as to generate the second exposure data according to the second view and a view object which can realize a method under a second protocol in the sub-view of the second view.
In an exemplary embodiment of the present disclosure, determining target exposure data from the first exposure data and the second exposure data includes: reporting the second exposure data to the view container through the service control; integrating the first exposure data with the second exposure data through the view container; and filtering repeated data in the integrated first exposure data and second exposure data through the view container to obtain the target exposure data.
In an exemplary embodiment of the present disclosure, the second protocol inherits the first protocol.
In an exemplary embodiment of the present disclosure, the method further comprises: determining an uploading channel of the target exposure data according to an exposure data uploading protocol; and uploading the target exposure data to a server corresponding to the uploading channel.
In an exemplary embodiment of the disclosure, the first exposure occasion includes one or several of the following features: page skipping, page sliding and background switching foreground.
According to a second aspect of the embodiments of the present disclosure, there is provided a data exposure apparatus including: the first monitoring module is configured to monitor first exposure opportunities of a first view and a second view, and determine first exposure data of the first view and the second view when the first exposure opportunities are received; the second monitoring module is configured to monitor a second exposure opportunity of a second view, and determine second exposure data of the second view when the second exposure opportunity is received; and the data collection module is configured to determine target exposure data according to the first exposure data and the second exposure data.
According to a third aspect of the embodiments of the present disclosure, an electronic device is provided, which includes: one or more processors; storage means for storing one or more programs; when executed by the one or more processors, cause the one or more processors to implement the data exposure method of any one of the above.
According to a fourth aspect of embodiments of the present disclosure, a computer-readable medium is proposed, on which a computer program is stored, which program, when executed by a processor, implements a data exposure method as defined in any one of the above.
According to the data exposure method, the data exposure device, the electronic device and the computer readable medium provided by some embodiments of the present disclosure, monitoring is performed on a first exposure time of a first view and a second exposure time of a second view to obtain first exposure data of the first view and the second view and second exposure data of the second view, and then target exposure data is obtained according to the first exposure data and the second exposure data. The two-layer monitoring architecture based on the two view controls (the first view and the second view) can be realized, monitoring and collection of exposure data are realized, target exposure data are obtained, the architecture of data exposure is simplified, and the coupling degree with the view controls is reduced while the access threshold is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. The drawings described below are merely some embodiments of the present disclosure, and other drawings may be derived from those drawings by those of ordinary skill in the art without inventive effort.
FIG. 1 is a system block diagram illustrating a data exposure method and apparatus according to an exemplary embodiment;
FIG. 2 is a flow chart illustrating a method of data exposure in accordance with an exemplary embodiment;
FIG. 3 is a flow chart illustrating a method of data exposure in accordance with another exemplary embodiment;
FIG. 4 is a flow chart illustrating a method of data exposure in accordance with yet another exemplary embodiment;
FIG. 5 is a flow chart illustrating a method of data exposure in accordance with yet another exemplary embodiment;
FIG. 6 is a schematic diagram of a data exposure architecture shown in accordance with an exemplary embodiment;
FIG. 7 is an implementation class diagram of a data exposure architecture shown in accordance with an exemplary embodiment;
FIG. 8 is a block diagram illustrating a data exposure apparatus according to an exemplary embodiment;
FIG. 9 is a block diagram illustrating an electronic device in accordance with an exemplary embodiment;
FIG. 10 is a schematic diagram illustrating a computer-readable storage medium according to an example embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations or operations have not been shown or described in detail to avoid obscuring aspects of the invention.
The drawings are merely schematic illustrations of the present invention, in which the same reference numerals denote the same or similar parts, and thus, a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and steps, nor do they necessarily have to be performed in the order described. For example, some steps may be decomposed, and some steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
In the related art, the existing data exposure architecture is designed according to the type of the sliding event. The slide event types include: non-slidable, manual lateral sliding, manual vertical sliding, automatic lateral sliding, automatic vertical sliding, and combination types that include multiple sliding events. Different basic controls and exposure logic are designed for different sliding types. In business research and development, one of the basic controls needs to be selected and researched and developed on the basis of the basic control through inheritance and the like.
In a data exposure framework of the related technology, various types of basic controls are distinguished according to sliding events, and the development complexity and the access threshold of business research and development are increased. Meanwhile, the architecture design and the service control have great coupling degree, which is not beneficial to architecture upgrading and service control multiplexing. In addition, the exposure service is relatively complex, and there are multiple exposure occasions, namely, triggering exposure during sliding, triggering exposure after sliding, exposure during page display, and the like. Therefore, when accessing the exposure framework, business research personnel need to peruse the exposure product document, which also has a large access threshold.
Therefore, a new data exposure method, apparatus, electronic device, and computer readable medium are needed.
The following detailed description of exemplary embodiments of the invention refers to the accompanying drawings.
Fig. 1 is a system block diagram illustrating a data exposure method and apparatus according to an exemplary embodiment.
The server 105 may be a server that provides various services, such as a background management server (for example only) that provides support for a data exposure system operated by a user with the terminal devices 101, 102, 103. The terminal device may analyze and otherwise process the received data, such as the data exposure request, and feed back the processing result (e.g., the target exposure data, for example only) to the server.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
The terminal device 101 (may also be 102 or 103) may, for example, listen to first exposure occasions of the first view and the second view, and upon receiving the first exposure occasions, determine first exposure data of the first view and the second view; the terminal device 101 may, for example, monitor a second exposure timing of the second view, and determine second exposure data of the second view when receiving the second exposure timing; the terminal device 101 may determine target exposure data, for example, from the first exposure data and the second exposure data.
FIG. 2 is a flow chart illustrating a method of data exposure in accordance with an exemplary embodiment. The data exposure method provided by the embodiments of the present disclosure may be executed by any electronic device with computing processing capability, such as the terminal devices 101, 102, and 103 and/or the server 105, and in the following embodiments, the server executes the method as an example for illustration, but the present disclosure is not limited thereto. The data exposure method 20 provided by the embodiment of the present disclosure may include the following steps.
As shown in fig. 2, in step S202, first exposure timings of the first view and the second view are monitored, and when the first exposure timing is received, first exposure data of the first view and the second view is determined.
In the embodiment of the present disclosure, the first view may be a view corresponding to the first view control. For example, the first view control may be, for example, a non-slidable view control, and the first view may be a view corresponding to the non-slidable view control. The second view may be a view corresponding to the second view control. For example, the second view control may be, for example, a slidable view control, and the second view may be a view corresponding to the slidable view control. The slidable view control may include a manual horizontal sliding control, a manual vertical sliding control, an automatic horizontal sliding control, an automatic vertical sliding control, and the like, which is not particularly limited by the present disclosure.
Where there is a nested relationship between the first view and the second view, for example, the first view may or may not include one or more of the second views. The second view may or may not include one or more of the first views, and the present disclosure is not limited thereto.
In an exemplary embodiment, the first exposure occasion includes one or several of the following features: page skipping, page sliding and background switching foreground.
The monitoring of the first exposure time can be triggered by calling a method under an exposure time protocol. The exposure time may include a plurality of: sliding type triggering exposure, sliding ending triggering exposure and page display time exposure. The method under the exposure time protocol can be named with the corresponding specific exposure time, so that the exposure time can be clarified, and the threshold of service access is reduced.
In an exemplary embodiment, the first view, the sub-view of the first view, the second view, and the sub-view of the second view may be traversed through the view container to generate the first exposure data according to a view object of the first view, the sub-view of the first view, the second view, and the sub-view of the second view that is capable of implementing a method under the first protocol.
When the view container calls the method under the exposure opportunity protocol, when the first exposure opportunity is monitored, the first view, the sub-view of the first view, the second view and the sub-view of the second view in the view container are traversed. The method under the first protocol may be an exposure method.
In step S204, a second exposure timing of the second view is monitored, and when the second exposure timing is received, second exposure data of the second view is determined.
In an embodiment of the disclosure, the second exposure opportunity may include triggering exposure while sliding inside the view. E.g., left slide, right slide, up slide, down slide, etc., inside the view. And triggering and monitoring the second exposure time by calling a method under the exposure time protocol.
In an exemplary embodiment, the second view and the sub-view of the second view may be traversed through the business control to generate second exposure data according to the second view and a view object in the sub-view of the second view that is capable of implementing a method under the second protocol. The second view implements a second protocol, invoked at an internal slide opportunity, and triggers a second exposure opportunity. And traversing the second view and the sub-views of the second view to generate exposure data according to the view object capable of implementing the first protocol method, wherein the data is second exposure data.
And traversing the second view and the sub-view of the second view when monitoring the second exposure time when the service control calls the method under the exposure time protocol. The method under the second protocol may be an exposure method. When the second view is a view corresponding to the slidable view control, the method under the second protocol may be an exposure method inside the view corresponding to the slidable view.
In an exemplary embodiment, the second protocol inherits the first protocol. The embodiment of the disclosure can realize the decoupling between the data exposure architecture and the service by replacing the traditional inheritance relationship in the related technology in a protocol-following manner.
In step S206, target exposure data is determined according to the first exposure data and the second exposure data.
According to the data exposure method provided by the embodiment of the disclosure, the first exposure time of the first view and the second exposure time of the second view are monitored respectively to obtain the first exposure data of the first view and the second exposure data of the second view, and then the target exposure data is obtained according to the first exposure data and the second exposure data. The two-layer monitoring architecture based on the two view controls (the first view and the second view) can be realized, monitoring and collection of exposure data are realized, target exposure data are obtained, the architecture of data exposure is simplified, and the coupling degree with the view controls is reduced while the access threshold is reduced.
Fig. 3 is a flowchart illustrating a data exposure method according to another exemplary embodiment. The data exposure method 30 provided by the embodiment of the present disclosure may include steps S231 to S233.
As shown in fig. 3, in step S231, the second exposure data is reported to the view container through the service control.
In the embodiment of the present disclosure, the service control may be a second view control corresponding to a second view. And each business control can report the second exposure data obtained after monitoring to the view container so as to facilitate the view container to perform subsequent processing on the second exposure data.
In step S232, the first exposure data and the second exposure data are integrated by the view container.
In the embodiment of the present disclosure, after receiving the second exposure data reported by each service control, the view container integrates each second exposure data with the first exposure data, so as to perform subsequent processing.
In step S233, the repeated data in the integrated first exposure data and second exposure data is filtered by the view container, so as to obtain the target exposure data.
Steps S231 to S233 of the embodiment of the present disclosure may be used as an alternative to step S206 in the embodiment of fig. 2.
According to the data exposure method provided by the embodiment of the disclosure, the second exposure data is reported to the view container through each business control, the first exposure data and the second exposure data are integrated according to the view container, the exposure data can be accurately obtained on the basis of a two-layer monitoring architecture, repeated data in the integrated first exposure data and second exposure data are filtered through the business container, the target exposure data is obtained, and the simplified target exposure data can be obtained.
Fig. 4 is a flowchart illustrating a data exposure method according to yet another exemplary embodiment. Based on the data exposure method of the above embodiment, the data exposure method 40 of the embodiment of the present disclosure includes at least steps S402 to S404.
As shown in fig. 4, in step S402, an upload channel of exposure data is determined according to an exposure data upload protocol.
In the embodiment of the present disclosure, the exposure data upload protocol may specify an upload channel of data. The specific uploading pass can be set according to actual needs.
In step S404, the filtered exposure data is uploaded to a server corresponding to the upload channel.
Steps S402 to S404 of the embodiment of the present disclosure may be taken as subsequent steps to step S206 in the embodiment of fig. 2.
According to the data exposure method provided by the embodiment of the disclosure, the uploading channel of the exposure data can be determined according to the exposure data uploading protocol, and the function of uploading the exposure data to the server through the corresponding uploading channel can be realized, so that the data exposure architecture is further improved.
Fig. 5 is a flowchart illustrating a data exposure method according to still another exemplary embodiment. The data exposure method 50 includes at least steps S510 to S590.
The data exposure method according to the embodiment of the present disclosure may be implemented in the data exposure architecture in fig. 6, for example, the view container appearing in the embodiment of the present disclosure may be the view container 610 in fig. 6, and the business control appearing in the embodiment of the present disclosure may be the business control 620 in fig. 6.
As shown in fig. 5, in step S510, the first exposure timings of the first view and the second view are monitored.
In the embodiment of the present disclosure, the first view may be a view corresponding to the non-slidable view control. The monitoring of the first exposure time can be triggered by calling a method under an exposure time protocol. The method under the exposure time protocol can be named with the corresponding specific exposure time, so that the exposure time can be clarified, and the threshold of service access is reduced.
In step S520, when the first exposure opportunity is received, the first view, the sub-view of the first view, the second view, and the sub-view of the second view are traversed through the view container, so as to generate first exposure data according to a view object, which can implement a method under the first protocol, in the first view, the sub-view of the first view, the second view, and the sub-view of the second view.
This step may be performed by container view 610 in fig. 6.
In step S530, a second exposure timing of the second view is monitored.
In the disclosed embodiment, the second view may be a view corresponding to the slidable view control (e.g., the second view 630 in fig. 6). And triggering and monitoring the second exposure time by calling a method under the exposure time protocol. The method under the exposure time protocol can be named with the corresponding specific exposure time, so that the exposure time can be clarified, and the threshold of service access is reduced.
In step S540, when the second exposure opportunity is received, the second view and the sub-view of the second view are traversed through the service control, so as to generate second exposure data according to the second view and the view object in the sub-view of the second view, which can implement the method under the second protocol.
This step may be performed by the business control 620 in fig. 6. As shown in fig. 6, the sub-views of the second view 630 may be a sub-view 631 sliding laterally, a sub-view 632 sliding vertically, and so on.
In step S550, the second exposure data is reported to the view container through the service control.
This step may adopt a step similar to step S231 in fig. 3, and is not described herein again.
In step S560, the first exposure data and the second exposure data are integrated by the view container.
This step may adopt a step similar to step S232 in fig. 3, and is not described here again.
In step S570, the view container filters the repeated data in the integrated first exposure data and second exposure data to obtain the target exposure data.
This step may adopt a step similar to step S233 in fig. 3, and is not described here again.
In step S580, an upload channel of the exposure data is determined according to the exposure data upload protocol.
This step may adopt a similar step to step S402 in fig. 4, and is not described here again.
In step S590, the filtered exposure data is uploaded to a server corresponding to the upload channel.
This step may adopt a step similar to step S404 in fig. 4, and is not described here again.
The embodiment of the disclosure monitors the first exposure time of the first view and the second exposure time of the second view to respectively determine the first exposure data of the first view and the second exposure data of the second view, so that the view types can be reduced to two, the control types can be reduced to two, and the dependence of the service on the exposure event types can be further reduced. The traditional inheritance relationship in the related technology is replaced by a protocol-following mode, so that the decoupling between the data exposure architecture and the service can be realized.
In the data exposure method of other embodiments of the present disclosure, the method name under the exposure time protocol has the corresponding specific exposure time, so that the exposure time can be made clear, and the threshold of service access is reduced.
FIG. 7 is an implementation class diagram of a data exposure architecture shown in accordance with an exemplary embodiment. As shown in FIG. 7, the view container serves as an upper manager of the data exposure architecture, holding exposure management classes in the architecture. The exposure management class serves as a core class and is externally responsible for: monitoring page level exposure opportunity and data report; and the inner part is responsible for searching a visible view, collecting exposure data, filtering repeated data and the like. In addition, the exposure opportunity agreement provides for a triggering method with exposure opportunity naming in the exposure management class. The triggering method with the exposure opportunity naming includes a starting exposure method after sliding, a restarting exposure method after reloading data, a restarting exposure method after page jumping, a restarting exposure method after background is switched into a foreground, and a designated data method of sliding exposure in the second view. The exposure management class is used as a specific collection and submission class of exposure data; the exposure data uploading protocol agrees with the protocol of the reporting channel. The proxy of the exposure management class is a proxy protocol of the exposure management class, and needs to be implemented by a view container.
For the sliding event in the business control, the data exposure architecture provides that a plurality of sliding types are divided into: the non-slidable type and the slidable type are two types. And more than 6 control types can be reduced into two types. As shown in fig. 7: the first protocol corresponding to the non-slidable type is the exposure protocol of the non-slidable view in fig. 7; the second protocol corresponding to the slidable type is the exposure protocol of the slidable view in fig. 7. Wherein the second protocol inherits the first protocol. The method is aimed at various sliding events, but is essentially a sliding event. The second protocol is followed by the widget and a sliding method in the protocol is implemented. These methods correspond to proxy methods for sliding events in the client framework. The business control triggers the exposure by invoking methods in these proxy methods.
Implementation platforms of the data exposure architecture of the embodiments of the present disclosure may include, but are not limited to, systems developed by android system or apple inc. The data exposure architecture of the embodiment of the disclosure realizes that the view control is divided into a slidable type and an unslidable type, and can reduce the dependence of business research and development on sliding time. The traditional inheritance relationship in the related technology is replaced by a protocol-following mode, so that the decoupling between the data exposure architecture and the service can be realized. By making the naming of the method under the exposure time protocol have the corresponding specific exposure time, the exposure time can be made clear, and the threshold of service access is reduced.
It should be clearly understood that this disclosure describes how to make and use particular examples, but the principles of this disclosure are not limited to any details of these examples. Rather, these principles can be applied to many other embodiments based on the teachings of the present disclosure.
Those skilled in the art will appreciate that all or part of the steps for implementing the above embodiments are implemented as a computer program executed by a Central Processing Unit (CPU). When executed by a central processing unit CPU, performs the above-described functions defined by the above-described methods provided by the present disclosure. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic or optical disk, or the like.
Furthermore, it should be noted that the above-mentioned figures are only schematic illustrations of the processes involved in the methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 8 is a block diagram illustrating a data exposure apparatus according to an exemplary embodiment. Referring to fig. 8, a data exposure apparatus 80 provided by an embodiment of the present disclosure may include: a first listening module 810, a second listening module 820, and a data collection module 830.
In the data exposure apparatus 80, the first monitoring module 810 may be configured to monitor a first exposure timing of the first view and the second view, and determine first exposure data of the first view and the second view when the first exposure timing is received.
In an exemplary embodiment, the first listening module 810 may include a first traversal unit. Wherein the first traversal unit may be configured to traverse the first view, the sub-view of the first view, the second view, and the sub-view of the second view through the view container to generate the first exposure data according to a view object of the sub-view of the first view, the second view, and the sub-view of the second view, in which a method under the first protocol can be implemented.
In an exemplary embodiment, the first exposure occasion includes one or several of the following features: page skipping, page sliding and background switching foreground.
The second listening module 820 may be configured to listen for a second exposure occasion of the second view and determine second exposure data of the second view upon receiving the second exposure occasion.
In an exemplary embodiment, the second listening module 820 may include a second traversal unit. The second traversal unit may be configured to traverse the second view and the sub-view of the second view through the business control, so as to generate second exposure data according to the second view and a view object in the sub-view of the second view, which is capable of implementing a method under the second protocol.
In an exemplary embodiment, the second protocol inherits the first protocol.
The data collection module 830 may be configured to determine target exposure data from the first exposure data and the second exposure data.
In an exemplary embodiment, the data collection module 830 may include a data reporting unit, a data integration unit, and a data filtering unit. The data reporting unit may be configured to report the second exposure data to the view container through the service control. The data integration unit may be configured to integrate the first exposure data and the second exposure data through the view container. The data filtering unit may be configured to filter the repeated data in the integrated first exposure data and second exposure data through the view container to obtain the target exposure data.
In an exemplary embodiment, the data exposure apparatus 80 may further include a channel determination module and a data upload module. The channel determination module may be configured to determine an upload channel of the target exposure data according to the exposure data upload protocol. The data uploading module can be configured to upload the target exposure data to a server corresponding to the uploading channel.
According to the data exposure device provided by the embodiment of the disclosure, monitoring is respectively performed on the first exposure time of the first view and the second exposure time of the second view to obtain the first exposure data of the first view and the second exposure data of the second view, and then the target exposure data is obtained according to the first exposure data and the second exposure data. The two-layer monitoring architecture based on the two view controls (the first view and the second view) can be realized, monitoring and collection of exposure data are realized, target exposure data are obtained, the architecture of data exposure is simplified, and the coupling degree with the view controls is reduced while the access threshold is reduced.
FIG. 9 is a block diagram illustrating an electronic device in accordance with an example embodiment.
An electronic device 200 according to this embodiment of the present disclosure is described below with reference to fig. 9. The electronic device 200 shown in fig. 9 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 9, the electronic device 200 is embodied in the form of a general purpose computing device. The components of the electronic device 200 may include, but are not limited to: at least one processing unit 210, at least one memory unit 220, a bus 230 connecting different system components (including the memory unit 220 and the processing unit 210), a display unit 240, and the like.
Wherein the storage unit stores program code executable by the processing unit 210 to cause the processing unit 210 to perform the steps according to various exemplary embodiments of the present disclosure described in the above-mentioned electronic prescription flow processing method section of the present specification. For example, the processing unit 210 may perform the steps as shown in fig. 2, 3, 4, 5.
The memory unit 220 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)2201 and/or a cache memory unit 2202, and may further include a read only memory unit (ROM) 2203.
The storage unit 220 may also include a program/utility 2204 having a set (at least one) of program modules 2205, such program modules 2205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 230 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 200 may also communicate with one or more external devices 300 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 200, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 200 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 250. Also, the electronic device 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 260. The network adapter 260 may communicate with other modules of the electronic device 200 via the bus 230. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 200, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above method according to the embodiments of the present disclosure.
FIG. 10 schematically illustrates a computer-readable storage medium in an exemplary embodiment of the disclosure.
Referring to fig. 10, a program product 400 for implementing the above method according to an embodiment of the present disclosure is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present disclosure is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The computer readable medium carries one or more programs which, when executed by a device, cause the computer readable medium to perform the functions of: monitoring first exposure time of a first view and a second view, and determining first exposure data of the first view and the second view when the first exposure time is received; monitoring a second exposure time of a second view, and determining second exposure data of the second view when the second exposure time is received; and filtering repeated data in the first exposure data and the second exposure data to obtain target exposure data.
Those skilled in the art will appreciate that the modules described above may be distributed in the apparatus according to the description of the embodiments, or may be modified accordingly in one or more apparatuses unique from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that the present disclosure is not limited to the precise arrangements, instrumentalities, or instrumentalities described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.