JdgHttCrackDetectionEt.xml 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247
  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <queryMap desc="">
  3. <query id="JdgHttCrackDetectionEt.getInfo" desc="获取探伤信息">
  4. <![CDATA[
  5. SELECT A.TESTING_TYPE,
  6. A.TESTING_GRADE,
  7. B.TESTING_METHOD,
  8. A.PLINE_CODE,
  9. '合格' JUDGE_RESULT,
  10. (SELECT WM_CONCAT(C.STANDARD_NAME)
  11. FROM HTT_CRACK_DETECTION_STANDARD C
  12. WHERE C.STANDARD_ID = B.STANDARD_ID) STANDARD_NAME,
  13. B.LONGITUDINAL_EXTERNAL,
  14. B.LONGITUDINAL_INTERNAL,
  15. B.TRANSVERSE_EXTERNAL,
  16. B.TRANSVERSE_INTERNAL,
  17. B.WALL_THICKNESS,
  18. B.LAMINATION,
  19. A2.PROCESS_CODE,
  20. A2.PROCESS_DESC,
  21. A.TESTING_POSITION,
  22. B.REPORT_PATH,
  23. A.NOTCH_LENGTH,
  24. A.NOTCH_WIDTH,
  25. A.NOTCH_DEPTH,
  26. NVL(A.TESTING_NUM,0) TESTING_NUM,
  27. NVL(A.EWASTE_NUM,0)+NVL(A.EWASTE_NUM_ET,0)+NVL(A.DISQUALIFIED_NUM,0) EWASTE_NUM,
  28. NVL(A.EPASS_NUM,0)+NVL(A.EPASS_NUM_ET,0)+ NVL(A.FINAL_NUM,0) PASS_NUM,
  29. A.EWASTE_REASON,
  30. A.PENDING_NUM
  31. FROM HTT_CRACK_DETECTION_ET A
  32. LEFT JOIN COM_BASE_PROCESS A2
  33. ON A2.PROCESS_CODE = A.PROCESS_CODE, HTT_CRACK_DETECTION_PARA B
  34. WHERE A.JUDGE_STOVE_NO = {0}
  35. AND A.BATCH_NO = {1}
  36. AND A.PROCESS_CODE = {2}
  37. AND A.RESULT_NO = B.RESULT_NO
  38. ]]>
  39. </query>
  40. <query id="JdgHttCrackDetectionEt.getInfoByPline" desc="获取探伤信息">
  41. <![CDATA[
  42. SELECT A.TESTING_TYPE,
  43. A.TESTING_GRADE,
  44. B.TESTING_METHOD,
  45. '合格' JUDGE_RESULT,
  46. (SELECT WM_CONCAT(C.STANDARD_NAME)
  47. FROM HTT_CRACK_DETECTION_STANDARD C
  48. WHERE C.STANDARD_ID = B.STANDARD_ID) STANDARD_NAME,
  49. B.LONGITUDINAL_EXTERNAL,
  50. B.LONGITUDINAL_INTERNAL,
  51. B.TRANSVERSE_EXTERNAL,
  52. B.TRANSVERSE_INTERNAL,
  53. B.WALL_THICKNESS,
  54. B.LAMINATION,
  55. A2.PROCESS_CODE,
  56. A2.PROCESS_DESC,
  57. A.TESTING_POSITION,
  58. B.REPORT_PATH,
  59. A.NOTCH_LENGTH,
  60. A.NOTCH_WIDTH,
  61. A.NOTCH_DEPTH,
  62. NVL(A.TESTING_NUM,0) TESTING_NUM,
  63. NVL(A.EWASTE_NUM,0)+NVL(A.EWASTE_NUM_ET,0)+NVL(A.DISQUALIFIED_NUM,0) EWASTE_NUM,
  64. NVL(A.EPASS_NUM,0)+NVL(A.EPASS_NUM_ET,0)+ NVL(A.FINAL_NUM,0) PASS_NUM,
  65. A.EWASTE_REASON,
  66. A.PENDING_NUM
  67. FROM HTT_CRACK_DETECTION_ET A
  68. LEFT JOIN COM_BASE_PROCESS A2
  69. ON A2.PROCESS_CODE = A.PROCESS_CODE, HTT_CRACK_DETECTION_PARA B
  70. WHERE A.JUDGE_STOVE_NO = {0}
  71. AND A.BATCH_NO = {1}
  72. AND A.PROCESS_CODE = {2}
  73. AND A.PLINE_CODE = {3}
  74. AND A.RESULT_NO = B.RESULT_NO
  75. ]]>
  76. </query>
  77. <query id="JdgHttCrackDetectionEt.getZgInfo" desc="获取轧管探伤信息">
  78. <![CDATA[
  79. SELECT 'EMI' TESTING_TYPE,
  80. '合格' JUDGE_RESULT,
  81. A.INSPECTION_STANDARD STANDARD_NAME,
  82. A.NOTCH_LENGTH,
  83. A.NOTCH_WIDTH,
  84. A.NOTCH_DEPTH,
  85. A.LO_SURFACE TESTING_GRADE,
  86. DECODE(T.DETECT_RESULT_PATH,
  87. NULL,
  88. NULL,
  89. T.DETECT_RESULT_PATH || T.REPORT_NO || '.pdf') REPORT_PATH,
  90. A.LO_SURFACE LONGITUDINAL_EXTERNAL,
  91. A.LI_SURFACE LONGITUDINAL_INTERNAL,
  92. A.TO_SURFACE TRANSVERSE_EXTERNAL,
  93. A.TI_SURFACE TRANSVERSE_INTERNAL,
  94. DETECTION_NUM TESTING_NUM,
  95. SCRAP_NUM EWASTE_NUM,
  96. QUALIFIED_NUM PASS_NUM,
  97. SCRAP_REASON EWASTE_REASON,
  98. NULL PENDING_NUM,
  99. A.TESTING_POSITION
  100. FROM MIL_MT_RESULT A
  101. LEFT JOIN QCM_INSPECTION_REPORT T
  102. ON REGEXP_REPLACE(A.JUDGE_STOVE_NO, '-.*', '') = T.JUDGE_STOVE_NO
  103. WHERE REGEXP_REPLACE(A.JUDGE_STOVE_NO, '-.*', '') = {0}
  104. UNION ALL
  105. SELECT 'ET' TESTING_TYPE,
  106. '合格' JUDGE_RESULT,
  107. A.INSPECTION_STANDARD,
  108. A.NOTCH_LENGTH,
  109. A.NOTCH_WIDTH,
  110. A.NOTCH_DEPTH,
  111. A.ACCEPTANCE_GRADE TESTING_GRADE,
  112. T.DETECT_RESULT_PATH REPORT_PATH,
  113. NULL LONGITUDINAL_EXTERNAL,
  114. NULL LONGITUDINAL_INTERNAL,
  115. NULL TRANSVERSE_EXTERNAL,
  116. NULL TRANSVERSE_INTERNAL,
  117. DETECTION_NUM TESTING_NUM,
  118. SCRAP_NUM EWASTE_NUM,
  119. QUALIFIED_NUM PASS_NUM,
  120. SCRAP_REASON EWASTE_REASON,
  121. NULL PENDING_NUM,
  122. A.TESTING_POSITION
  123. FROM MIL_ET_RESULT A
  124. LEFT JOIN QCM_INSPECTION_REPORT T
  125. ON REGEXP_REPLACE(A.JUDGE_STOVE_NO, '-.*', '') = T.JUDGE_STOVE_NO
  126. WHERE REGEXP_REPLACE(A.JUDGE_STOVE_NO, '-.*', '') = {0}
  127. UNION ALL
  128. SELECT A.TESTING_TYPE,
  129. '合格' JUDGE_RESULT,
  130. NULL INSPECTION_STANDARD,
  131. NULL NOTCH_LENGTH,
  132. NULL NOTCH_WIDTH,
  133. NULL NOTCH_DEPTH,
  134. A.TESTING_GRADE,
  135. T.DETECT_RESULT_PATH REPORT_PATH,
  136. NULL LONGITUDINAL_EXTERNAL,
  137. NULL LONGITUDINAL_INTERNAL,
  138. NULL TRANSVERSE_EXTERNAL,
  139. NULL TRANSVERSE_INTERNAL,
  140. NULL TESTING_NUM,
  141. NULL EWASTE_NUM,
  142. NULL PASS_NUM,
  143. NULL EWASTE_REASON,
  144. NULL PENDING_NUM,
  145. null TESTING_POSITION
  146. FROM MIL_ENTRUSTED_BILL A
  147. LEFT JOIN QCM_INSPECTION_REPORT T
  148. ON REGEXP_REPLACE(A.JUDGE_STOVE_NO, '-.*', '') = T.JUDGE_STOVE_NO
  149. WHERE REGEXP_REPLACE(A.JUDGE_STOVE_NO, '-.*', '') = {0}
  150. UNION ALL
  151. SELECT T2.TESTING_TYPE,
  152. '合格' JUDGE_RESULT,
  153. NULL INSPECTION_STANDARD,
  154. T2.NOTCH_LENGTH,
  155. T2.NOTCH_WIDTH,
  156. T2.NOTCH_DEPTH,
  157. T2.TESTING_GRADE,
  158. T2.DETECT_RESULT_PATH REPORT_PATH,
  159. NULL LONGITUDINAL_EXTERNAL,
  160. NULL LONGITUDINAL_INTERNAL,
  161. NULL TRANSVERSE_EXTERNAL,
  162. NULL TRANSVERSE_INTERNAL,
  163. NULL TESTING_NUM,
  164. NULL EWASTE_NUM,
  165. NULL PASS_NUM,
  166. NULL EWASTE_REASON,
  167. NULL PENDING_NUM,
  168. null TESTING_POSITION
  169. FROM QCM_ZG_JUGDE_APPLY T2
  170. WHERE T2.JUDGE_STOVE_NO = {0}
  171. AND T2.PROCESS_CODE = 'D'
  172. AND T2.PLINE_CODE IN ('C065','C066','C098','C099')
  173. UNION ALL
  174. SELECT A.TESTING_TYPE,
  175. '合格' JUDGE_RESULT,
  176. TO_CHAR((SELECT WM_CONCAT(C.STANDARD_NAME)
  177. FROM HTT_CRACK_DETECTION_STANDARD C
  178. WHERE C.STANDARD_ID = B.STANDARD_ID)) STANDARD_NAME,
  179. A.NOTCH_LENGTH,
  180. A.NOTCH_WIDTH,
  181. A.NOTCH_DEPTH,
  182. A.TESTING_GRADE,
  183. B.REPORT_PATH,
  184. B.LONGITUDINAL_EXTERNAL,
  185. B.LONGITUDINAL_INTERNAL,
  186. B.TRANSVERSE_EXTERNAL,
  187. B.TRANSVERSE_INTERNAL,
  188. NVL(A.TESTING_NUM,0) TESTING_NUM,
  189. NVL(A.EWASTE_NUM,0)+NVL(A.EWASTE_NUM_ET,0)+NVL(A.DISQUALIFIED_NUM,0) EWASTE_NUM,
  190. NVL(A.EPASS_NUM,0)+NVL(A.EPASS_NUM_ET,0)+ NVL(A.FINAL_NUM,0) PASS_NUM,
  191. A.EWASTE_REASON,
  192. A.PENDING_NUM,
  193. A.TESTING_POSITION
  194. FROM HTT_CRACK_DETECTION_ET A
  195. LEFT JOIN COM_BASE_PROCESS A2
  196. ON A2.PROCESS_CODE = A.PROCESS_CODE, HTT_CRACK_DETECTION_PARA B
  197. WHERE A.JUDGE_STOVE_NO = {0}
  198. AND A.BATCH_NO = {1}
  199. AND A.PROCESS_CODE = 'D'
  200. AND A.RESULT_NO = B.RESULT_NO
  201. ]]>
  202. </query>
  203. <query id="JdgHttCrackDetectionEt.getDbkInfo" desc="获取镦拔扩探伤信息">
  204. <![CDATA[
  205. SELECT DISTINCT
  206. T.TESTING_TYPE,
  207. T.TESTING_GRADE,
  208. NULL METHOD,
  209. '合格' JUDGE_RESULT,
  210. NULL STANDARD_NAME,
  211. NULL LONGITUDINAL_EXTERNAL,
  212. NULL LONGITUDINAL_INTERNAL,
  213. NULL TRANSVERSE_EXTERNAL,
  214. NULL TRANSVERSE_INTERNAL,
  215. NULL WALL_THICKNESS,
  216. NULL LAMINATION,
  217. NULL PROCESS_CODE,
  218. NULL PROCESS_DESC,
  219. NULL TESTING_POSITION,
  220. NULL REPORT_PATH,
  221. T.NOTCH_LENGTH,
  222. T.NOTCH_WIDTH,
  223. T.NOTCH_DEPTH
  224. FROM QCM_ZG_JUGDE_APPLY T
  225. WHERE T.JUDGE_STOVE_NO = {0}
  226. AND T.BATCH_NO = {1}
  227. AND T.PROCESS_CODE = {2}
  228. AND T.IS_FLAG = '0'
  229. AND T.IS_ALL_SCRAP = '0'
  230. ]]>
  231. </query>
  232. <query id="JdgHttCrackDetectionEt.getZbsDetect" desc="获取质保书探伤信息">
  233. <![CDATA[
  234. SELECT LISTAGG(TESTING_GRADE, ',') WITHIN GROUP(ORDER BY TESTING_GRADE) OVER(PARTITION BY '') TESTING_GRADE,
  235. LISTAGG(TESTING_TYPE, ',') WITHIN GROUP(ORDER BY TESTING_GRADE) OVER(PARTITION BY '') TESTING_TYPE
  236. FROM (SELECT DISTINCT T.TESTING_GRADE, T.TESTING_TYPE
  237. FROM HTT_CRACK_DETECTION_ET T
  238. WHERE T.JUDGE_STOVE_NO = {0}
  239. AND T.BATCH_NO = {1}
  240. AND T.PROCESS_CODE = {2})
  241. ]]>
  242. </query>
  243. </queryMap>