private void ViewDetail(DataVulnerableItem item) { this.NavigationService.Navigate(new VulnerableStatisticPage() { IdneDID = item.Iden }); }
/// <summary> /// 易损件数据 /// </summary> /// <param name="keyword"></param> /// <param name="TimeStart"></param> /// <param name="TimeEnd"></param> /// <param name="pageNo"></param> /// <param name="pageSize"></param> /// <returns></returns> public IPagedList <DataVulnerableItem> GetPagedDataVulnerable(string Keyword, DateTime?TimeStart, DateTime?TimeEnd, int PageNum, int PageSize, string code) { string connectionString_ATL = @"server=127.0.0.1;database=ifactory;uid=root;pwd=root;Persist Security Info=True;Charset=utf8;"; MySqlConnection connatl = new MySqlConnection(connectionString_ATL); connatl.Open(); string sql = @"select * from Vulnerable"; string w1 = " where Name like '%" + Keyword + "%'"; string w2 = TimeStart.HasValue ? " and time >= '" + TimeStart.Value.ToString() + "' " : ""; string w3 = TimeStart.HasValue ? " and time < '" + TimeEnd.Value.AddDays(1.0).ToString() + "' " : ""; MySqlDataAdapter b = new MySqlDataAdapter(sql + w1 + w2 + w3, connatl); DataTable bt = new DataTable(); b.Fill(bt); connatl.Close(); List <DataVulnerableItem> lstZ = new List <DataVulnerableItem>(); if (bt != null && bt.Rows.Count > 0) { foreach (DataRow row in bt.Rows) { DataVulnerableItem info = new DataVulnerableItem(); info.Iden = int.Parse(row[0].ToString()); info.Name = row[1].ToString(); info.Used = int.Parse(row[2].ToString()); info.Expect = int.Parse(row[3].ToString()); info.Exchange = int.Parse(row[4].ToString()); info.time = DateTime.Parse(row[5].ToString()); info.User = row[6].ToString(); info.PicNum1 = row[7].ToString(); info.PicNum2 = row[8].ToString(); lstZ.Add(info); } } connatl.Close(); IQueryable <DataVulnerableItem> superset = lstZ.AsQueryable(); return(new PagedList <DataVulnerableItem>(superset, PageNum, PageSize)); }
/// <summary> /// 易损件数据 /// </summary> /// <param name="keyword"></param> /// <param name="TimeStart"></param> /// <param name="TimeEnd"></param> /// <param name="pageNo"></param> /// <param name="pageSize"></param> /// <returns></returns> public IList <DataVulnerableItem> GetDataVulnerable() { string connectionString_ATL = @"server = 127.0.0.1;database=ifactory;uid=root;pwd=root;Persist Security Info=True;Charset=utf8;"; MySqlConnection connatl = new MySqlConnection(connectionString_ATL); connatl.Open(); string sql = @"select * from Vulnerable"; MySqlDataAdapter b = new MySqlDataAdapter(sql, connatl); DataTable bt = new DataTable(); b.Fill(bt); connatl.Close(); List <DataVulnerableItem> lstZ = new List <DataVulnerableItem>(); if (bt != null && bt.Rows.Count > 0) { foreach (DataRow row in bt.Rows) { DataVulnerableItem info = new DataVulnerableItem(); info.Iden = int.Parse(row[0].ToString()); info.Name = row[1].ToString(); info.Used = int.Parse(row[2].ToString()); info.Expect = int.Parse(row[3].ToString()); info.Exchange = int.Parse(row[4].ToString()); info.time = DateTime.Parse(row[5].ToString()); info.User = row[6].ToString(); info.PicNum1 = row[7].ToString(); info.PicNum2 = row[8].ToString(); lstZ.Add(info); } } connatl.Close(); return(lstZ); }