Chain structured patrol method and system
1. A chain structured patrol method is characterized by comprising the following steps:
s1: generating a plurality of accounts according to the preset number of users and the user labels, and assigning inspection objects of the accounts;
s2: generating each account initial patrol link according to the patrol object, and initializing a characteristic identifier;
s3: allocating an account according to the user label, and starting a patrol process after the user logs in;
s4: inserting an additional patrol link into an initial patrol link of a designated account according to a patrol process;
s5: and finishing all inspection links, submitting audit, verifying the characteristic identification and finishing inspection.
2. The chain structured patrol method according to claim 1, wherein said feature identification comprises:
the validity identification is used for judging whether the user account is valid or not;
the password resetting identifier is used for judging whether the user completes password resetting;
the authority identity is used for judging whether the user has the right to patrol the current object;
the audit state identifier is used for judging whether the current audit request of the user passes;
the data integrity mark is used for judging whether the user completes all inspection links;
and the time identifier is used for judging whether the time for submitting the audit by the user exceeds the deadline.
3. The chain structured patrol method according to claim 2, wherein the verifying feature identifier in S5 specifically comprises:
if the user account is valid, setting the validity identification as pass;
if the user finishes password resetting, setting the password resetting identifier as a pass;
if the user has the authority to patrol the current object, setting the authority identity identification as a pass;
if the audit submitted by the user is passed, setting the audit state identifier as pass;
if the user finishes all the patrol recording behaviors, setting the data integrity identifier as a pass;
if the user submits the auditing time less than the inspection deadline, setting the time identifier as a pass;
when all the feature identifiers are set to pass, storing patrol data sent by the user as valid data in a database, and setting the account of the user as invalid;
when all user accounts are set to be invalid or the patrol deadline is reached, the patrol is completed.
4. The chain structured patrol method according to claim 3, wherein when any one of the feature identifiers is not set to pass, patrol data sent by the user is regarded as unfinished data, and information of the feature identifier which has not passed is returned to the user.
5. The chain structured patrol method according to claim 1, wherein said user tags comprise user groups, affiliated patrol departments, affiliated patrol groups.
6. The chain structured patrol method according to claim 1, wherein said account comprises:
the first class account can set the starting and ending time of the patrol, the content of the patrol link, the classification of the patrol group, insert an additional patrol link, check the patrol progress and process the audit application;
the second type of account can patrol the assigned patrolled department and submit an audit application.
7. The chain structured patrol method according to claim 3, wherein the patrol data stored in the database can be visualized and screened according to patrol department tags.
8. The chain structured patrol method according to claim 3, wherein the database is stored based on a hyper-fusion unified platform.
9. A chain structured patrol system, wherein the system is configured to perform the patrol method according to any one of claims 1-8, comprising:
the client is used for providing a local port for the user, acquiring patrol data of the user and sending the patrol data to the server;
the server is used for establishing communication with the client, receiving patrol data sent by the client and verifying the characteristic identifier;
and the database is used for storing the whole-process patrol data.
10. The chain structured patrol system according to claim 9, wherein said patrol system is built based on a cloud-native micro-service architecture.
Background
The traditional method strictly based on the inspection work of the set flow is increasingly shown to be stiff in process, stiff in link and lack of scientific data analysis under the background that the scale of the number of people participating in the inspection work is continuously large, organizations are increasingly complex and inspection contents are increasingly complex, namely, the method is hard to be competent for user scenes with large-scale and complex architectures and fine-tuning and customizing requirements, and brings severe challenges in various aspects such as task adjustment, approval reporting, progress feedback, filing and storage and the like to inspection links and work summary links. The traditional fixed flow patrol work especially lacks flexibility of custom adjustment of patrol contents for different patrol objects. In this context, it is necessary to customize the modular chain flow and adjust the flexible structure accordingly for exploration and wide practice in patrol applications.
The inspection work of the traditional offline mode is directly carried to an internet platform, so that the consistency of the flow can be ensured, but the inspection work is always insufficient from the aspect of working flexibility, and particularly, the system structure fixedly arranged by a conventional fixed link and a conventional fixed module in the process is difficult to meet the rapid iteration requirement brought by rapid development and change of a complex organization on the fundamental level. The unified assignment of the fixed flow to all distinctive specific inspection objects may lead to stiffness and inefficiency, which brings great hidden danger to management and macro inspection correction systems.
Different from a simple scattered task issuing system, in the current personnel architecture with increasingly complex human resources and complex structures, the patrol work always considers that various rigid requirements such as division difference of departments, difference of service scenes, diversity of organization architectures and the like are met in a continuous chain process, and a simple task distribution design cannot meet the complex requirements.
For example, in modern social groups, enterprises and institutions, with the complexity of business and the flow of staff among branches, business relationships, department affiliation and technical chains are mutually interwoven, the topological form of an organizational structure is gradually changed from a traditional tree-shaped multilayer structure into a multi-level networked complex topological structure, and various situations of inspection objects and structural difference inspection labels appear aiming at the inspection work of the staff. Therefore, there is a need to enhance customizability for a particular inspection object while ensuring chain integrity and consistency.
The complexity of flexible structuring may present more challenges in terms of job consistency and contrast, which necessitates the use of a common chain flow path in combination with flexible customization modules. In this process, in order to determine a chain structure common to each inspection object, a public inspection link needs to be determined as a basic link.
Therefore, in the prior art, on one hand, an offline paper inspection mode is mainly used, and inspection efficiency and reliability are lacked; on the other hand, even if the patrol is implemented by a computer system, there is no effective means to ensure the reliability of the system and the flexibility of adapting to the flow of the patrol itself.
Disclosure of Invention
Aiming at the problems, the structured inspection method and the system based on the chain type flow customization combine the modularization of the 'Internet +' era, the reliability of the flow mode and the flexibility of adding the customized link at any time, thereby not only ensuring the standardization of the whole inspection process, but also realizing the flexibility of self-defining adjustment of inspection contents aiming at different inspection objects, avoiding the rigidification hidden danger caused by too solidified flow, and aiming at setting various marks to ensure the stability and the reliability of the whole system.
In order to achieve the purpose, the invention adopts the technical scheme that:
according to a first aspect of the present invention, there is provided a chain structured patrol method, comprising:
s1: generating a plurality of accounts according to the preset number of users and the user labels, and assigning inspection objects of the accounts;
s2: generating each account initial patrol link according to the patrol object, and initializing a characteristic identifier;
s3: allocating an account according to the user label, and starting a patrol process after the user logs in;
s4: inserting an additional patrol link into an initial patrol link of a designated account according to a patrol process;
s5: and finishing all inspection links, submitting audit, verifying the characteristic identification and finishing inspection.
Further, the feature identification includes:
the validity identification is used for judging whether the user account is valid or not;
the password resetting identifier is used for judging whether the user completes password resetting;
the authority identity is used for judging whether the user has the right to patrol the current object;
the audit state identifier is used for judging whether the current audit request of the user passes;
the data integrity mark is used for judging whether the user completes all inspection links;
and the time identifier is used for judging whether the time for submitting the audit by the user exceeds the deadline.
Further, the verification feature identifier in S5 specifically includes:
if the user account is valid, setting the validity identification as pass;
if the user finishes password resetting, setting the password resetting identifier as a pass;
if the user has the authority to patrol the current object, setting the authority identity identification as a pass;
if the audit submitted by the user is passed, setting the audit state identifier as pass;
if the user finishes all the patrol recording behaviors, setting the data integrity identifier as a pass;
if the user submits the auditing time less than the inspection deadline, setting the time identifier as a pass;
when all the feature identifiers are set to pass, storing patrol data sent by the user as valid data in a database, and setting the account of the user as invalid;
when all user accounts are set to be invalid or the patrol deadline is reached, the patrol is completed.
Further, when any feature identifier is not set to pass, patrol data sent by the user is used as incomplete data, and information of the feature identifier which does not pass is returned to the user.
Further, the user tags comprise user groups, affiliated patrolling departments and affiliated patrolling groups.
Further, the account includes:
the first class account can set the starting and ending time of the patrol, the content of the patrol link, the classification of the patrol group, insert an additional patrol link, check the patrol progress and process the audit application;
the second type of account can patrol the assigned patrolled department and submit an audit application.
Furthermore, the patrol data stored in the database can be visualized, and the patrol data is screened according to the label of the patrol department.
Further, the database is stored on the basis of a super-fusion integrated platform.
According to a second aspect of the present invention, there is provided a chain structured patrol system for performing the patrol method according to any one of claims 1 to 8, comprising:
the client is used for providing a local port for the user, acquiring patrol data of the user and sending the patrol data to the server;
the server is used for establishing communication with the client, receiving patrol data sent by the client and verifying the characteristic identifier;
and the database is used for storing the whole-process patrol data.
Further, the patrol system is built based on a cloud native micro-service architecture.
Compared with the prior art, the chain structured patrol method and system provided by the invention have the following advantages:
the chain structured inspection method and system provided by the invention combine the modularization of the 'Internet +' era, the reliability of the flow mode and the flexibility of adding the customized link at any time, thereby not only ensuring the standardization of the whole inspection process, but also realizing the flexibility of self-defining adjustment of inspection contents aiming at different inspection objects, and avoiding the rigidness hidden danger caused by over-solidification of the flow. And electronic archiving is realized by means of final data visualization and result export, further data screening and statistical visualization are realized, and meanwhile, various identifiers are set in a targeted manner to ensure the overall stability and reliability of the system.
Drawings
The accompanying drawings are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
Fig. 1 is a schematic flow chart of a chain structured inspection method according to the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terms first, second and the like in the description and in the claims of the present invention are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of elements or units is not necessarily limited to those elements or units explicitly listed, but may include other elements or units not expressly listed or inherent to such process, method, article, or apparatus.
A plurality, including two or more.
And/or, it should be understood that, as used herein, the term "and/or" is merely one type of association that describes an associated object, meaning that three types of relationships may exist. For example, a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone.
As shown in fig. 1, a chain structured patrol method includes:
s1: the administrator logs in and sets the starting and ending time of the patrol;
s2: generating a plurality of inspector accounts and assigning inspection objects;
s3: generating a patrol module and a built-in patrol project, and assigning read-write information and file interfaces of each module;
s4: distributing account passwords, and forcibly resetting the passwords after the patrolman logs in;
s5: sequentially reading the information of each module by an inspector, reporting and filling in inspection items according to links, and submitting for auditing;
s6: the administrator inserts customized additional links at any time according to each group of inspection objects and issues the customized additional links to the appointed inspector;
s7: and after all the inspectors finish all the links, the inspection is finished.
The account characteristic identification comprises the following steps:
the validity identification is used for judging whether the user account is valid or not;
the password resetting identifier is used for judging whether the user completes password resetting;
the authority identity is used for judging the department of each user who has authority for inspection;
the audit state identifier is used for judging whether the current audit request of the user passes;
the data integrity mark is used for judging whether the user completes all inspection links;
and the time identifier is used for recording the time of the user for completing the patrol link.
S5 specifically includes:
if the user account is valid, setting the validity identification as pass;
if the user finishes password resetting, setting the password resetting identifier as a pass;
if the user has the authority to patrol a certain department, the corresponding authority identity identification is set to pass;
if the audit submitted by the user is passed, setting the audit state identifier as pass;
if the user finishes all the patrol recording behaviors, setting the data integrity identifier as a pass;
if the time of the patrol record data sent by the user is less than the patrol deadline, setting the time identifier as a pass;
when all the characteristic marks are set to pass, the patrol record data sent by the user is stored into a database as valid data, and the account of the user is set to be invalid;
when all user accounts are set to be invalid or the patrol deadline is reached, the patrol is completed.
The user tags comprise user groups, patrolling departments and affiliated patrolling groups.
The user account types comprise an administrator and a patrolman;
the system comprises a manager, a plurality of inspection groups and a plurality of inspection start and stop time setting module, wherein the manager can set inspection start and stop time, inspection link content and inspection group division, can newly add additional links at any time, check the progress of each inspector, approve or refute and remark an audit application;
each inspector can log in the system to inspect the assigned inspected department, records the inspection project information of the corresponding inspection department according to the inspection link content, submits the audit application, and if the audit is not passed, the audit application is resubmitted after the audit is modified, and if the audit is passed, the follow-up link is continued.
And when any characteristic mark is not set to pass, taking the patrol data sent by the user as incomplete, and returning the information of the failed characteristic mark to the user.
The patrol record data stored in the database can be visualized, and the data is screened according to the user tags.
The database is stored based on a super-fusion integrated platform.
A chain structured patrol system is used for the patrol method, and comprises the following steps:
the client is used for providing a local port for the user, obtaining patrol record data of the user and sending the patrol record data to the server;
the server is used for establishing communication with the client, receiving patrol record data sent by the client and verifying the characteristic identifier;
and the database is used for storing effective patrol record data.
A chain structured patrol system is constructed based on a cloud native micro-service architecture.
Example 1
The patrol method based on the anonymous strategy provided by the embodiment comprises the following steps:
1. and initializing the creation of a storage pool based on the super-integration integrated platform, and allocating a storage space for a specific inspection process.
2. An account mapping generation link, namely importing a Java-language cloud native development base Spring Boot, and generating patrol user object mapping based on a WebEntity extension of a network object:
a. establishing an organization architecture level ID _ level and an int type, wherein the default value is 2;
b. generating a unique global identification characteristic staffId and an int type of a user account, and setting as the number of inspection staff;
c. generating an accountTypeId and an int type of a patrol relation mapping user authority layer;
d. setting a user account department mechanism mapping identification code deparatmentId and an int type, and carrying out authority judgment on each int type data by using logical operation;
e. initializing a password reset state discrimination identifier (isUpdatePass), and defaulting to False;
f. the patrol work end time endDate is set.
3. Generating a patrolling object department list, setting a patrolling public link, and integrating the patrolling public link into a patrolled object database:
a. setting the deparatmentId and int type of an inspection object department according to an organization architecture;
b. setting a member list staffDictList of the patrol group, and a list consisting of the fact types;
1, the ith element staffDictList [ i ] of staffDictList is a dit type;
b.2. key of staffDictList [ i ] is staffDeparatment [ i ], int type, value is staffUUID, int type;
c. setting a type of a patrol public link scoreCommon, list;
c.1. generating a series of subordinate ScoreCommon, list types;
c.2. j specific steps of detailStep [ i ] and list types are added in a secondary link of i, subs ScoreCommon [ i ];
c.3. setting the following basic contents for each specific step detailStep [ i ] [ j ]:
c.3.1 description information detailTold [ i ] [ j ], string type and characters, and encoding by using utf-8;
c.3.2 inputting information detail activated [ i ] [ j ], string type and characters, and adopting utf-8 coding;
c.3.3 reference template templateGiven [ i ] [ j ], zip type, compressed packet, content is arbitrary;
c.3.4 uploading the file fileUploded [ i ] [ j ], zip type, compressed packet and any content;
c.3.5 feedback information backsMessege [ i ] [ j ], string type and character, and utf-8 coding is adopted;
c.3.6 audit state stepheld [ i ] [ j ], int type, default 0, 1 pass, -1 is refute;
e. summarizing the unique identification codes of the patrolled objects of each mapping group to form a patrolled object list targetList [ i ] of the ith patrolled group, and list types;
f. creating a customized patrol link scoreConstom, list type;
f.1. generating a series of secondary link subsscorecotoms, list types;
f.2. j specific steps of detailStep [ i ], list types are added in an i secondary link subscorCusteom [ i ];
f.3. setting the following basic contents for each specific step detailStep [ i ] [ j ]:
f.3.1 description information detailTold [ i ] [ j ], string type and characters, and encoding by using utf-8;
f.3.2 inputting information detail activated [ i ] [ j ], string type and characters, and encoding by using utf-8;
f.3.3 reference template templateGiven [ i ] [ j ], zip type, compressed packet, content is arbitrary;
f.3.4 uploading the file fileUploded [ i ] [ j ], zip type, compressed packet and any content;
f.3.5 feedback information backsMessege [ i ] [ j ], string type and character are coded by utf-8;
f.3.6 audit state stepheld [ i ] [ j ], int type, default 0, 1 pass, -1 is refute;
4. and (3) group assignment links, wherein the groups are assigned to inspection departments to be inspected:
a. generating a dictionary, a static Dict and a dit type key value pair of each patrol group user account and an initial random password:
key is login account, staffName, varchar type;
value is account password, staffPassWD, varchar type;
b. allocating patrol units to patrol groups, and ensuring that the allocated patrol units are not contained in a unit id list staffDictList [ i ] of any member in an ith patrol group of (staffDeparatment [ i ]);
c. generating a completed patrol object list scoreList of each group, namely a list consisting of int types;
d. generating a patrol progress list itemsList of each group, namely a list consisting of int types;
e. the initialization patrol completion progress integrity flag isfinishsore defaults to False.
5. And (3) logging in an account of the patrol group to implement patrol work, and implementing audit by an administrator:
a. prompting forced resetting and password modification after a user logs in the system, and changing the isUpdatePass variable into True;
b. the calculated time is a date type variable:
i. current time currentDate;
expiration date endDate;
the remaining time timeLeft from the patrol ending time.
c. Logging in an ith patrol group, viewing all links of a jth patrol object to be patrolled, setting a kth public link scoreCommon [ i ] [ j ] [ k ] and an r subordinate link subscereCommon [ i ] [ j ] [ k ] [ r ], setting an x customized link scoreConstom [ i ] [ j ] [ x ] and an r subordinate link subscereConstom [ i ] [ j ] [ k ] [ x ];
d. for each sub-link, reading description information of the detailStep [ i ] [ j ] [ k ] [ r ] [ s ], filling required input information detailAsked [ i ] [ j ] [ k ] [ r ] [ s ], downloading a reference template templetegiegiven [ i ] [ j ] [ k ] [ r ] [ s ], compressing the file into zip and uploading the zip to fileUploded [ i ] [ j ] [ k ] [ r ] [ s ] after filling, submitting audit, setting the stepCpacked [ i ] [ j ] [ k ] [ r ] [ s ] in the sub-link state to be 0, namely waiting to audit;
e. the administrator audits the submitted sub-link, when the stepCcked [ i ] [ j ] [ k ] [ r ] [ s ] is set to be 1, the audit is passed to continue the next sub-link, if the stepCcked [ i ] [ j ] [ k ] [ r ] [ s ] is set to be-1, the audit is not passed, and the current sub-link is redone according to the requirement of the notification information backsmessege [ i ] [ j ] [ k ] [ r ] [ s ];
f. when all sub-rings for patrol object j have been completed, adding the unique identification ID of the patrol object to scoreList [ i ];
g. when the length of the scoreList [ i ] is equal to the targetList [ i ], judging that the ith group patrol is finished, and allowing to submit;
h. and after clicking the submission button, changing the inspection completion progress integrity mark (isfinishScore) to True, and finishing the inspection work of the inspection group.
6. And tracking the patrol progress according to the authority group and the department branch deparatmentId tag:
a. the administrator checks the proportion of users (True for isFinishScore) who finish the patrol progress in each group;
b. sorting according to the proportion of the IsFinishScore to the True user in the corresponding group, and visualizing the list;
c. generating a bar chart and a pie chart to compare the inspection progress of each authority group;
d. and sending supervision information psuhMessage [ i ] and string types to the progress lag group i.
7. And (3) visualization and result summarization of inspection results in the completion stage:
a. summarizing the patrol results of corresponding entries of each tested person in the scoreList in the targetList, and visualizing the data by using a line graph, a pie graph and a radar graph;
c. taking the patrol group number staffId and the department code deparatmentId as screening labels;
d. the screened data obtain selecScoreList which can be visualized by a broken line graph, a pie chart and a radar chart;
e. collecting the visualization results and generating a patrol result report;
f. and finishing the patrol process, and synchronously writing all the data into the storage resource pool.
Example 2
By taking annual inspection and measurement evaluation of a college on a plurality of departments as an example, the inspection method provided by the invention is used for visual analysis.
1. An account generation link, namely generating an inspection user object based on the cloud native network object WebEntity expansion:
a. establishing an organization architecture level ID _ level and an int type, which specifically comprises the following steps:
i. a patrol administrator;
patrol group account.
b. Generating unique global identification characteristics staffId and int type of the user account, and setting the type as the number of patrol workers
The method specifically comprises the following steps:
i.0001-0002, patrol administrator 3;
1001-1020, 1 st patrol group member 20;
list of job numbers: [0215077,0215033,0012011,...,0213010]
iii.2001-2020, 2 nd patrol group member 20;
list of job numbers: [0214077,0214033,0011011,...,0212010]
c. Generating patrol object lists targetList and list types of each patrol group;
d. setting a deparatmentId and an int type of a user account department mechanism mapping identification code;
i. four digits in total, the first two digits are 01-22, and the four digits correspond to 22 department departments;
the last two 01-09, corresponding to subordinate basement departments.
e. Initializing a password reset state discrimination identifier (isUpdatePass), and defaulting to False;
f. the patrol work end time endDate is set.
3. Generating a patrolling object department list, setting a patrolling public link, and integrating the patrolling public link into a patrolled object database:
a. setting the deparatmentId and int type of an inspection object department according to an organization architecture;
b. setting a member list staffDictList of the patrol group, and a list consisting of the fact types;
1, the ith element staffDictList [ i ] of staffDictList is a dit type;
b.2. key of staffDictList [ i ] is staffDeparatment [ i ], int type, value is staffUUID, int type;
c. setting a type of a patrol public link scoreCommon, list;
c.1. generating a series of subordinate ScoreCommon, list types;
c.2. j specific steps of detailStep [ i ] and list types are added in a secondary link of i, subs ScoreCommon [ i ];
c.3. setting the following basic contents for each specific step detailStep [ i ] [ j ]:
c.3.1 description information detailTold [ i ] [ j ], string type and characters, and encoding by using utf-8;
c.3.2 inputting information detail activated [ i ] [ j ], string type and characters, and adopting utf-8 coding;
c.3.3 reference template templateGiven [ i ] [ j ], zip type, compressed packet, content is arbitrary;
c.3.4 uploading the file fileUploded [ i ] [ j ], zip type, compressed packet and any content;
c.3.5 feedback information backsMessege [ i ] [ j ], string type and character, and utf-8 coding is adopted;
c.3.6 audit state stepheld [ i ] [ j ], int type, default 0, 1 pass, -1 is refute;
e. summarizing the unique identification codes of the patrolled objects of each mapping group to form a patrolled object list targetList [ i ] of the ith patrolled group, and list types;
f. creating a customized patrol link scoreConstom, list type;
f.1. generating a series of secondary link subsscorecotoms, list types;
f.2. j specific steps of detailStep [ i ], list types are added in an i secondary link subscorCusteom [ i ];
f.3. setting the following basic contents for each specific step detailStep [ i ] [ j ]:
f.3.1 description information detailTold [ i ] [ j ], string type and characters, and encoding by using utf-8;
f.3.2 inputting information detail activated [ i ] [ j ], string type and characters, and encoding by using utf-8;
f.3.3 reference template templateGiven [ i ] [ j ], zip type, compressed packet, content is arbitrary;
f.3.4 uploading the file fileUploded [ i ] [ j ], zip type, compressed packet and any content;
f.3.5 feedback information backsMessege [ i ] [ j ], string type and character are coded by utf-8;
f.3.6 audit state stepheld [ i ] [ j ], int type, default 0, 1 pass, -1 is refute;
4. and (3) group assignment links, wherein the groups are assigned to inspection departments to be inspected:
a. generating a dictionary, a static Dict and a dit type key value pair of each patrol group user account and an initial random password:
key is login account, staffName, varchar type;
value is account password, staffPassWD, varchar type;
b. allocating patrol units to patrol groups, and ensuring that the allocated patrol units are not contained in a unit id list staffDictList [ i ] of any member in an ith patrol group of (staffDeparatment [ i ]);
targetList [1], patrol group patrol object 1;
department number list: [0214,0011,...,0212]
targetList [2], patrol group patrol object 2.
Department number list: [0215,0012,...,0213]
c. Generating a completed patrol object list scoreList of each group, namely a list consisting of int types;
d. generating a patrol progress list itemsList of each group, namely a list consisting of int types;
e. the initialization patrol completion progress integrity flag isfinishsore defaults to False.
5. Logging in an inspection group account to implement inspection work:
a. prompting forced resetting and password modification after a user logs in the system, and changing the isUpdatePass variable into True;
b. the calculated time is a date type variable:
i. current time currentDate;
expiration date endDate;
the remaining time timeLeft from the patrol ending time.
c. Logging in an ith patrol group account, viewing each link of a jth patrol object to be patrolled, setting a kth public link scoreCommon [ i ] [ j ] [ k ] and an r subordinate link subscereCommon [ i ] [ j ] [ k ] [ r ], setting an x customized link scoreConstom [ i ] [ j ] [ x ] and an r subordinate link subscereConstom [ i ] [ j ] [ k ] [ x ];
d. for each sub-link, reading description information of the detailStep [ i ] [ j ] [ k ] [ r ] [ s ], filling required input information detailAsked [ i ] [ j ] [ k ] [ r ] [ s ], downloading a reference template templetegiegiven [ i ] [ j ] [ k ] [ r ] [ s ], compressing the file into zip and uploading the zip to fileUploded [ i ] [ j ] [ k ] [ r ] [ s ] after filling, submitting audit, setting the stepCpacked [ i ] [ j ] [ k ] [ r ] [ s ] in the sub-link state to be 0, namely waiting to audit;
e. waiting for an administrator to audit the submitted sub-links, when the stepCcked [ i ] [ j ] [ k ] [ r ] [ s ] is set to be 1, the audit is passed to continue the next sub-link, if the stepCcked [ i ] [ j ] [ k ] [ r ] [ s ] is set to be-1, the audit is not passed, and the current sub-link is redone according to the requirement of the notification information backsMessege [ i ] [ j ] [ k ] [ r ] [ s ];
f. when all sub-rings for patrol object j have been completed, adding the unique identification ID of the patrol object to scoreList [ i ];
g. when the length of the scoreList [ i ] is equal to the targetList [ i ], judging that the ith group patrol is finished, and allowing to submit;
h. and after clicking the submission button, changing the inspection completion progress integrity mark (isfinishScore) to True, and finishing the inspection work of the inspection group.
6. And tracking the patrol progress according to the authority group and the department branch deparatmentId tag:
a. the administrator checks the proportion of the patrol groups (True for the isFinishScore) of which the patrol progress is finished in each group;
b. sorting according to the proportion of the IsFinishScore to the True user in the corresponding group, and visualizing the list;
c. generating a bar chart and a pie chart to compare the inspection progress of each authority group;
d. and sending supervision information psuhMessage [ i ] and string types to the progress lag group i.
7. And (3) visualization and result summarization of inspection results in the completion stage:
a. summarizing the patrol results of corresponding entries of each tested person in the scoreList in the targetList, and visualizing the data by using a line graph, a pie graph and a radar graph;
c. taking the patrol group number staffId and the department code deparatmentId as screening labels;
d. the screened data obtain selecScoreList which can be visualized by a broken line graph, a pie chart and a radar chart;
e. collecting the visualization results and generating a patrol result report;
f. and finishing the patrol process, and synchronously writing all the data into the storage resource pool.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.