Schematic diagram designed network label checking method, device, storage medium and equipment

文档序号:1922098 发布日期:2021-12-03 浏览:20次 中文

阅读说明:本技术 原理图设计的网络标签检查方法、装置、存储介质及设备 (Schematic diagram designed network label checking method, device, storage medium and equipment ) 是由 郑凯 张立辉 陈欢洋 于 2020-05-28 设计创作,主要内容包括:本申请实施例公开了一种原理图设计的网络标签检查方法、装置、存储介质及设备。该方法包括:响应于网络标签检查触发事件,提取当前网络标签;网络标签是用于对引线在当前设计页标注的,用于与当前设计页或者其他设计页的具有相同网络标签标注的引线进行连接的标签;确定当前网络标签连接的引脚标签;其中,引脚标签为原理图中电子器件的封装标签;从约束表中的引脚标签库中,查找与引脚标签匹配的目标引脚标签;获取目标引脚标签关联的历史连接网络标签;若当前网络标签与历史连接网络标签匹配成功,则确定网络标签检查成功。通过执行本方案,可以达到原理图的设计过程中实时检查,能够提升原理图设计的检查效率,以及提高检查准确率的效果。(The embodiment of the application discloses a method and a device for checking a network tag designed by a schematic diagram, a storage medium and equipment. The method comprises the following steps: responding to a network tag check triggering event, and extracting a current network tag; the network tag is used for marking the lead on the current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages; determining a pin label connected with a current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram; searching a target pin label matched with the pin label from a pin label library in the constraint table; acquiring a historical connection network tag associated with a target pin tag; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked. By executing the scheme, real-time inspection in the design process of the schematic diagram can be achieved, the inspection efficiency of the schematic diagram design can be improved, and the inspection accuracy is improved.)

1. A method for checking a network label designed by a schematic diagram is characterized by comprising the following steps:

responding to a network tag check triggering event, and extracting a current network tag; the network tag is used for marking a lead on a current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages;

determining a pin label connected with the current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram;

searching a target pin label matched with the pin label from a pin label library in a constraint table;

acquiring a historical connection network tag associated with the target pin tag in the constraint table; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked.

2. The method of claim 1, wherein searching for a target pin tag matching the pin tag from a pin tag library in a constraint table comprises:

determining a tag type of the pin tag; the tag types comprise a signed pin tag and an unsigned pin tag;

and determining a target pin label according to the label type and a matching rule associated with the label type.

3. The method of claim 2, wherein determining a target pin tag according to the tag type and a matching rule associated with the tag type comprises:

if the tag type of the pin tag is a signed pin tag, splitting the signed pin tag into at least two pin tag fields according to the sign;

and respectively grouping each pin label field according to the number of the contained characters, and matching the grouping results from a plurality of times in sequence according to the number of the contained characters until the matching is successful to determine the target pin label, or completing the matching of all groups to determine the matching failure.

4. The method of claim 2, wherein determining a target pin tag according to the tag type and a matching rule associated with the tag type comprises:

and if the tag type of the pin tag is an unsigned pin tag, grouping the pin tag fields according to the number of contained characters, and matching the grouping results from multiple to multiple in sequence according to the number of contained characters until the matching is successful to determine the target pin tag, or completing the matching of all groups to determine the matching failure.

5. The method according to claim 3 or 4, wherein if the numbers of the characters included in the grouping result are the same and the matching is successful, the matching result including the first letter of the pin label field is used as the target pin label.

6. The method of claim 1, wherein determining that the network tag check is successful if the current network tag matches the historical connection network tag successfully comprises:

acquiring a current network tag character string of a current network tag and a historical network tag character string of the historical connection network tag; wherein the historical connection network label is at least one;

and determining whether the matching is successful according to the character matching quantity of the current network label character string and the historical network label character string.

7. The method of claim 6, wherein after obtaining the current network tag string of the current network tag and the historical network tag string of the historical connection network tag, the method further comprises:

determining whether a standard character exists in the current network label character string;

if yes, carrying out specific matching on the standard character in the matching process;

and if the specific matching fails, determining that the matching of the current network tag fails.

8. A schematic diagram designed network tag inspection device, characterized in that the device comprises:

the current network tag extraction module is used for responding to a network tag check triggering event and extracting a current network tag; the network tag is used for marking a lead on a current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages;

the pin label determining module is used for determining a pin label connected with the current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram;

the target pin tag matching module is used for searching a target pin tag matched with the pin tag from a pin tag library in a constraint table;

the current network tag checking module is used for acquiring a historical connection network tag related to the target pin tag in the constraint table; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked.

9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements a network tag checking method designed according to the schematic diagram of any one of claims 1 to 7.

10. An apparatus comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the schematic design network tag checking method according to any one of claims 1 to 7 when executing the computer program.

Technical Field

The embodiment of the application relates to the technical field of electronic circuits, in particular to a method, a device, a storage medium and equipment for checking a network tag designed by a schematic diagram.

Background

With the continuous development of scientific technology, Electronic Design Automation (EDA) circuits are more and more widely used. EDA circuit design software can be classified as schematic design and PCB design. The design of the schematic diagram is an important link of hardware design, and whether the electronic equipment can work normally or not is directly determined. Therefore, the checking work is particularly important for the design of the schematic diagram. The conventional checking work of the schematic diagram design is usually performed manually, which not only consumes a lot of manpower, but also causes the risk of errors in the schematic diagram design due to human errors.

Disclosure of Invention

The embodiment of the application provides a method, a device, a storage medium and equipment for checking a network tag designed by a schematic diagram, which can achieve the effects of checking the schematic diagram in real time in the design process, improving the checking efficiency of the schematic diagram design and improving the checking accuracy.

In a first aspect, an embodiment of the present application provides a method for checking a network tag designed by a schematic diagram, where the method includes:

responding to a network tag check triggering event, and extracting a current network tag; the network tag is used for marking a lead on a current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages;

determining a pin label connected with the current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram;

searching a target pin label matched with the pin label from a pin label library in a constraint table;

acquiring a historical connection network tag associated with the target pin tag in the constraint table; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked.

Optionally, searching a target pin tag matched with the pin tag from a pin tag library in a constraint table, including:

determining a tag type of the pin tag; the tag types comprise a signed pin tag and an unsigned pin tag;

and determining a target pin label according to the label type and a matching rule associated with the label type.

Optionally, determining a target pin tag according to the tag type and a matching rule associated with the tag type includes:

if the tag type of the pin tag is a signed pin tag, splitting the signed pin tag into at least two pin tag fields according to the sign;

and respectively grouping each pin label field according to the number of the contained characters, and matching the grouping results from a plurality of times in sequence according to the number of the contained characters until the matching is successful to determine the target pin label, or completing the matching of all groups to determine the matching failure.

Optionally, determining a target pin tag according to the tag type and a matching rule associated with the tag type includes:

and if the tag type of the pin tag is an unsigned pin tag, grouping the pin tag fields according to the number of contained characters, and matching the grouping results from multiple to multiple in sequence according to the number of contained characters until the matching is successful to determine the target pin tag, or completing the matching of all groups to determine the matching failure.

Optionally, if the numbers of the characters included in the grouping result are the same and the matching is successful, the matching result including the first letter of the pin label field is used as the target pin label.

Optionally, if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked, including:

acquiring a current network tag character string of a current network tag and a historical network tag character string of the historical connection network tag; wherein the historical connection network label is at least one;

and determining whether the matching is successful according to the character matching quantity of the current network label character string and the historical network label character string.

Optionally, after obtaining the current network tag character string of the current network tag and the historical network tag character string of the historical connection network tag, the method further includes:

determining whether a standard character exists in the current network label character string;

if yes, carrying out specific matching on the standard character in the matching process;

and if the specific matching fails, determining that the matching of the current network tag fails.

In a second aspect, an embodiment of the present application provides a schematic diagram designed network tag checking apparatus, including:

the current network tag extraction module is used for responding to a network tag check triggering event and extracting a current network tag; the network tag is used for marking a lead on a current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages;

the pin label determining module is used for determining a pin label connected with the current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram;

the target pin tag matching module is used for searching a target pin tag matched with the pin tag from a pin tag library in a constraint table;

the current network tag checking module is used for acquiring a historical connection network tag related to the target pin tag in the constraint table; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked.

In a third aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a network tag checking method designed according to a schematic diagram according to an embodiment of the present application.

In a fourth aspect, an embodiment of the present application provides an apparatus, which includes a memory, a processor, and a computer program stored in the memory and executable by the processor, where the processor executes the computer program to implement the schematic diagram designed network tag checking method according to the embodiment of the present application.

According to the technical scheme provided by the embodiment of the application, the current network tag is extracted in response to the network tag checking trigger event; the network tag is used for marking a lead on a current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages; determining a pin label connected with the current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram; searching a target pin label matched with the pin label from a pin label library in a constraint table; acquiring a historical connection network tag associated with the target pin tag in the constraint table; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked. Through adopting the technical scheme that this application provided, can reach the real-time inspection in the design process of schematic diagram, can promote the inspection efficiency of schematic diagram design to and improve the effect of checking the rate of accuracy.

Drawings

FIG. 1 is a flow chart of a network tag checking method designed according to a schematic diagram provided in an embodiment of the present application;

FIG. 2 is a schematic diagram of a constraint table provided in an embodiment of the present application;

FIG. 3 is a flow chart of a network tag checking method designed according to a schematic diagram provided in an embodiment of the present application;

FIG. 4 is a schematic diagram of a network tag inspection apparatus according to an embodiment of the present disclosure;

fig. 5 is a schematic structural diagram of an apparatus provided in an embodiment of the present application.

Detailed Description

The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures.

Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.

Fig. 1 is a flowchart of a network tag checking method designed by a schematic diagram provided in an embodiment of the present application, where the present embodiment is applicable to a circuit design situation, and the method may be executed by a network tag checking apparatus designed by a schematic diagram provided in an embodiment of the present application, where the apparatus may be implemented by software and/or hardware, and may be integrated in a device such as an intelligent terminal for circuit design.

As shown in fig. 1, the method for checking a network tag designed by the schematic diagram includes:

s110, responding to a network tag checking trigger event, and extracting a current network tag; the network tag is used for marking the lead on the current design page and is used for connecting the lead with the same network tag mark of the current design page or other design pages.

The network tag check triggering event may be an event that a network tag is detected to be added, or may be an event that a network tag check operation is triggered every predetermined time. Specifically, for example, if it is detected that a worker adds one or several network tags in the circuit design process, the network tag check operation may be triggered after the user adds the network tags. If the network tag is checked every 5 minutes under the setting of the staff, the network tag checking operation is triggered when the time point set by the staff is detected. Besides, the operation may be triggered in response to the web tag check of the staff, for example, clicking a "check web tag" button, and so on.

The number of the extracted current network tags may be one or multiple, and after the previous check is completed, the network tags that pass the check may be marked, and only the network tags that do not pass the check are checked this time.

The network tag is used for marking the lead on the current design page and is used for connecting with the lead with the same network tag mark on the current design page or other design pages. Due to the limitation of design pages or the situation that the routing layout needs to pass through, the calibration can be performed through the network tags, and then the network tags with the same can be represented as being connected with each other or connected to the same device.

S120, determining a pin label connected with the current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram.

The pin label can be determined according to the connection condition of the other end of the wire where the current network label is located. The pin label is an encapsulation label of an electronic device in a schematic diagram. E.g., the EN pin, represents the enable pin of the chip, the IN pin represents the data input pin of the chip, etc. Since the network tag usually marks the end of the trace that is not actually connected, the pin tag can be determined according to the other end of the trace connection.

S130, searching a target pin label matched with the pin label from a pin label library in the constraint table.

Many companies have their own constraint tables, which are used to design a schematic diagram of a circuit according to a certain design specification. The staff can determine whether the current network tag is standard or not through the network tag history record used by the pin tag recorded in the constraint table.

Fig. 2 is a schematic diagram of a constraint table provided in an embodiment of the present application. As shown in fig. 2, according to the extracted pin label, the pin label library in the constraint table is searched for the best matching entry. And then acquiring a network tag library corresponding to the pin tag, comparing the network tag added in the design with the network tag library in the constraint table, and judging whether the network tag meets the requirements or not.

Since pin labels are not completely identical, there may be places where there are similarities but some differences, such as the presence of separators, case differences, and differences between shorthand and full spelling. Therefore, the precondition for determining whether the network tag is normal is to find a target pin tag of the pin tag in the pin tag library.

In the scheme, a target pin label matched with the pin label can be searched through a character string spelling rule of the pin label.

In this technical solution, optionally, searching a target pin tag matched with the pin tag from a pin tag library in a constraint table includes:

determining a tag type of the pin tag; the tag types comprise a signed pin tag and an unsigned pin tag;

and determining a target pin label according to the label type and a matching rule associated with the label type.

The scheme provides a pin label with a symbol and a pin label without a symbol, wherein the type of the label can be a character spelling type of the pin label; for example, ABC-DEF is a signed tag type with the "-" sign, and ABCDEF is an unsigned tag type. The symbols therein may also be "\\", "_", "[ ]", etc.

In the scheme, the signed pin label and the unsigned pin label can be matched with the target pin label by adopting a preset matching rule. For example, the signed pin label adopts a rule for matching characters before and after the symbol, and adopts a rule for directly matching the unsigned pin label. Through the arrangement, the accuracy of the pin label matching result can be improved.

On the basis of the foregoing technical solution, optionally, determining a target pin tag according to the tag type and a matching rule associated with the tag type includes:

if the tag type of the pin tag is a signed pin tag, splitting the signed pin tag into at least two pin tag fields according to the sign;

and respectively grouping each pin label field according to the number of the contained characters, and matching the grouping results from a plurality of times in sequence according to the number of the contained characters until the matching is successful to determine the target pin label, or completing the matching of all groups to determine the matching failure.

Specifically, the pin tag can be split into at least two pin tag fields according to the position of the symbol for the pin tag with the symbol. If there is one symbol, the two pin tag fields can be split, and if there are two symbols, the three pin tag fields can be split, and so on. Having obtained the pin label fields, each pin label field may be grouped, for example by number of characters. As with the signed pin label: ABC DEF, which can be split into ABC pin tag field and DEF pin tag field. For example, ABC may be divided into four groups, KP (0) ═ a, KP (10) ═ AB, KP (11) ═ BC, and KP (2) ═ ABC. After grouping, the grouping results can be matched according to the number of the included characters from a plurality of orders until matching succeeds to determine the target pin label, or all the groupings are matched to complete and determine that matching fails. With reference to the above example, the KP (2) packet may be preferentially matched, and if the matching is successful, it indicates that the pin tag library includes the pin tag such as ABC, and the matching is completed and ended. And if the KP (2) fails to be matched in a grouping way, matching the KP (10) and the KP (11), and continuing matching after the matching fails until all grouping results are matched and terminated. The same is true for the matching process for the second pin label field DEF. After the matching result of each pin label field is obtained, the intersection of the data sets corresponding to the matching result can be taken, and the best matching item can be obtained.

In this embodiment, optionally, if the numbers of the characters included in the grouping result are the same and the matching is successful, the matching result including the first letter of the pin label field is used as the target pin label. In connection with the above example, for example, if both KP (10) and KP (11) are successfully matched, the AB character of the KP (10) group is prioritized as the character successfully matched. I.e. the matching result containing the first letter is prioritized. The scheme has the advantage that the weight of the first letter can be improved, so that the matched result is more accurate.

On the basis of the foregoing technical solution, optionally, determining a target pin tag according to the tag type and a matching rule associated with the tag type includes:

and if the tag type of the pin tag is an unsigned pin tag, grouping the pin tag fields according to the number of contained characters, and matching the grouping results from multiple to multiple in sequence according to the number of contained characters until the matching is successful to determine the target pin tag, or completing the matching of all groups to determine the matching failure.

For example, if the pin label is ABCDEF, the following groups can be divided: KP (0) ═ a, KP (1) ═ AB (BC, CD, … …), KP (2) ═ ABC (BCD, … …), KP (30) ═ ABCD, KP (31) ═ BCDE, KP (32) ═ CDEF, KP (40) ═ ABCDE, KP (41) ═ BCDEF, KP (5) ═ ABCDEF. And (3) according to a pin label library in the KP (i) matching constraint table, starting matching from KP (5) from more to less, screening all matching items, if the KP (5) is successfully matched, finishing, and if not, continuing until the matching is successful.

Similarly, the present solution is also applicable to that if the numbers of the characters included in the grouping result are the same and the matching is successful, the matching result of the first letter including the pin label field is used as the target pin label.

For example, if the KP (5) match is successful, it is the unique value that is matched, and if the KP (5) match is not successful, it is not necessarily the unique value, and the initial match is taken (e.g., ABCD/ABC is better than BCDE/BCD). The scheme provides a matching rule of unsigned pin labels, and through the arrangement, the matching rule of various types of pin labels can be compatible, so that the scheme has better robustness.

S140, acquiring a historical connection network tag associated with the target pin tag in the constraint table; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked.

After the target pin tag is determined, the network tag is connected according to the history associated with the target pin tag, and the current network tag can be matched. And if the matching is successful, determining that the network tag is successfully checked.

Specifically, N network tags corresponding to the pin tags of the constraint table may be provided, and these are history use items, and the current network tag matches the history use network tags, and if matching is successful, the network tag is used correctly, otherwise, the network tag is wrong.

In this scheme, for the network pin tag, the matching can also be divided into two types, namely a standard network tag and a special network tag, and the matching process is as follows:

first, standard network label.

If the bit number of the network label character string is greater than 4, the requirement is greater than KP (2), namely, 3-bit characters are matched at least;

if 1< network tag string bit number < ═ 4, then it is required to be greater than KP (1), i.e. 2-bit characters are matched at least;

the network tag character string bit number is basically no 1, and no matching is performed.

And II, special network tags.

The special network refers to some key signals, for which the key characters must be matched, otherwise, the matching is failed, and the specific signal names are determined according to different standards and can be added by self-definition.

In the above scheme, after obtaining the current network tag character string of the current network tag and the historical network tag character string of the historical connection network tag, the method further includes:

determining whether a standard character exists in the current network label character string;

if yes, carrying out specific matching on the standard character in the matching process;

and if the specific matching fails, determining that the matching of the current network tag fails.

Wherein the standard characters may be RX, TX, P, N, etc. If the standard characters exist, specific matching is needed, and only if the specific matching result of the standard characters is successful, the result obtained by matching according to the character digit is considered to be effective. The method has the advantages that the importance of the standard characters in the network tags is fully considered, and the accuracy of the network tag matching result is improved.

According to the technical scheme provided by the embodiment of the application, the current network tag is extracted in response to the network tag checking trigger event; the network tag is used for marking a lead on a current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages; determining a pin label connected with the current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram; searching a target pin label matched with the pin label from a pin label library in a constraint table; acquiring a historical connection network tag associated with the target pin tag in the constraint table; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked. By executing the technical scheme, real-time inspection in the design process of the schematic diagram can be achieved, the inspection efficiency of the schematic diagram design can be improved, and the inspection accuracy is improved.

The invention provides a thought for checking the network connection correctness while designing, which can realize real-time checking, namely, checking if the network connection correctness is wrong, and improves the checking efficiency and the design efficiency. Fig. 3 is a flowchart of a network tag checking method designed by a schematic diagram according to an embodiment of the present application, and as shown in fig. 3, the specific flow is as follows:

designing a schematic diagram, and adding components;

connecting a component network, and adding a network tag;

automatically checking the network tag, and extracting the network tag and the pin tag;

searching for a network tag used in corresponding history in a constraint table through a chip pin tag;

comparing the network tags, if the network tags are correct, not prompting, and continuing to design; if the error occurs, prompting modification;

and automatically checking again after modification.

In the scheme, in order to improve the efficiency, only the IC chip is checked, and other pin devices without specific functions such as resistance-capacitance are not checked. It is equally effective for replicating pasted network connections.

Fig. 4 is a schematic structural diagram of a network tag inspection apparatus designed according to a schematic diagram provided in an embodiment of the present application. As shown in fig. 4, the schematic diagram of the network tag checking device includes:

a current network tag extracting module 410, configured to extract a current network tag in response to a network tag check triggering event; the network tag is used for marking a lead on a current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages;

a pin tag determination module 420, configured to determine a pin tag to which the current network tag is connected; the pin label is an encapsulation label of an electronic device in a schematic diagram;

the target pin tag matching module 430 is configured to search a pin tag library in a constraint table for a target pin tag matching the pin tag;

a current network tag checking module 440, configured to obtain, in the constraint table, a historical connection network tag associated with the target pin tag; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked.

The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method.

Embodiments of the present application also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a schematic diagram designed network tag checking method, the method including:

responding to a network tag check triggering event, and extracting a current network tag; the network tag is used for marking a lead on a current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages;

determining a pin label connected with the current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram;

searching a target pin label matched with the pin label from a pin label library in a constraint table;

acquiring a historical connection network tag associated with the target pin tag in the constraint table; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked.

Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in the computer system in which the program is executed, or may be located in a different second computer system connected to the computer system through a network (such as the internet). The second computer system may provide the program instructions to the computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.

Of course, the storage medium containing the computer-executable instructions provided in the embodiments of the present application is not limited to the above-described network tag checking operation of schematic diagram design, and may also perform related operations in the network tag checking method of schematic diagram design provided in any embodiments of the present application.

The embodiment of the application provides equipment, and a network label checking device designed by the schematic diagram provided by the embodiment of the application can be integrated in the equipment. Fig. 5 is a schematic structural diagram of an apparatus provided in an embodiment of the present application. As shown in fig. 5, the present embodiment provides an apparatus 500 comprising: one or more processors 520; the storage 510 is configured to store one or more programs, and when the one or more programs are executed by the one or more processors 520, the one or more processors 520 implement the method for checking a network tag according to the schematic diagram design provided in the embodiment of the present application, the method includes:

responding to a network tag check triggering event, and extracting a current network tag; the network tag is used for marking a lead on a current design page and is used for connecting the lead with the same network tag mark on the current design page or other design pages;

determining a pin label connected with the current network label; the pin label is an encapsulation label of an electronic device in a schematic diagram;

searching a target pin label matched with the pin label from a pin label library in a constraint table;

acquiring a historical connection network tag associated with the target pin tag in the constraint table; and if the current network tag is successfully matched with the historical connection network tag, determining that the network tag is successfully checked.

Of course, it can be understood by those skilled in the art that the processor 520 also implements the technical solution of the network tag checking method of the schematic diagram design provided in any embodiment of the present application.

The apparatus 500 shown in fig. 5 is only an example and should not bring any limitations to the functionality or scope of use of the embodiments of the present application.

As shown in fig. 5, the apparatus 500 includes a processor 520, a storage device 510, an input device 530, and an output device 540; the number of the processors 520 in the device may be one or more, and one processor 520 is taken as an example in fig. 5; the processor 520, the memory device 510, the input device 530 and the output device 540 of the apparatus may be connected by a bus or other means, such as by a bus 550 in fig. 5.

The storage device 510 is a computer-readable storage medium, and can be used to store software programs, computer-executable programs, and module units, such as program instructions corresponding to the network tag checking method designed by the schematic diagram in the embodiment of the present application.

The storage device 510 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the storage 510 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, storage 510 may further include memory located remotely from processor 520, which may be connected via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.

The input means 530 may be used to receive input numbers, character information, or voice information, and to generate key signal inputs related to user settings and function control of the apparatus. The output device 540 may include a display screen, speakers, etc.

The equipment provided by the embodiment of the application can achieve real-time inspection in the design process of the schematic diagram, can improve the inspection efficiency of the schematic diagram design, and can improve the inspection accuracy.

The network tag checking device, the storage medium and the equipment designed by the schematic diagram provided in the embodiments can execute the network tag checking method designed by the schematic diagram provided in any embodiment of the present application, and have corresponding functional modules and beneficial effects for executing the method. Technical details that are not described in detail in the above embodiments may be referred to a schematic diagram designed network tag checking method provided in any embodiment of the present application.

It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present application and the technical principles employed. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.

16页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:测试方法、装置、电子设备以及可读存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类