Remote control driving method, device and computer-readable storage medium
A driving method and computer technology, which is applied in the electronic field, can solve problems such as heavy development workload and key-value matching errors and omissions, and achieve the effects of reducing workload, avoiding errors and omissions, and speeding up
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0103] Based on the first embodiment, the second embodiment of the remote control driving method of the present invention is proposed, referring to image 3 , in this embodiment, step S30 includes:
[0104] Step S31, find the physical key value consistent with the target physical key value in the mapping table based on the dichotomy;
[0105] In this embodiment, the mapping table includes a preferred table and an alternative table. When mapping a physical key value into a corresponding function key value, first search the physical key value consistent with the target physical key value in the preferred table according to the dichotomy method, If there is no physical key value consistent with the target physical key value in the preferred table, then search for a physical key value equal to the target physical key value in the candidate table.
[0106] Step S32, acquiring a function key corresponding to the physical key.
[0107] In this embodiment, the function key values ...
no. 2 example
[0109] Based on the second embodiment, the third embodiment of the remote control driving method of the present invention is proposed, referring to Figure 4 , in this embodiment, step S31 includes:
[0110] Step S311, based on the dichotomy, determine whether there is a physical key consistent with the target physical key in the preference table;
[0111] In this embodiment, the mapping table includes a preferred table and an alternative table. When the infrared signal is converted into the target physical key value, firstly, the binary method is used to search whether there is a physical key value consistent with the target physical key value in the preferred table. The preferred table stores the physical key values corresponding to commonly used keys and the function key values corresponding to the physical key values. For example, within a certain range (such as a company), the function key values of all keys are unified, and the boot All keys are defined as key_A, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


