Font Size: a A A

The Information Systems Of Weapon Equipment Management Based On MVC Pattern

Posted on:2007-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y Z WangFull Text:PDF
GTID:2178360182996390Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer, network and communicationtechnology, the management information systems are diffusing every domain. Theinformation management system of weapon-equipment is designed withcommunication and network technology for martial demand. The system can changemanner, improve efficiency, come true informational management of weapon and beseasoned with aggiornamento of army.This paper firstly presented and discussed some technology and concepts relatedto our subject, such as C/S, B/S andJ2EE, then put forward a solution of themanagement system of weapon, a B/S multi-tiered J2EE Web Application based onand MVC。Based on J2EE platform, having perfect transportability and independence ofplatform to support many popular OS, such as Windows, Unix, Linux etc. Besides,J2EE have many excellences, such as standard platform, distributing about easymemory or read, exploiter easy multithreading and security about database etc.Adopting B/S multi-tiered software architecture, all tasks can be finished onlythrough the browser. On the other hand, the architecture of B/S has perfecttransportability and security, easy to managing and maintaining, a little network loadand perfect expansibility compared with C/S.Adopting Struts Framework, the updating and reuse are solved preferably, andthat exploitation simple and maintenance easy. The Jakarta Struts project, anopen-source project sponsored by the Apache Software Foundation, is a server-sideJava implementation of the Model-View-Controller design pattern.To gain a solid understanding of the Struts Framework, you must have afundamental understanding of the Struts design pattern, which it is based on. TheStruts design pattern, consists of three components: a Model, a View, and aController.The ModelThe Model components of the Struts Framework represent the data objects ofthe Struts application. They often represent business objects or other backendsystems and can be implemented as simple JavaBeans, Enterprise JavaBeans, objectrepresentations of data stored in a relational database, or just about anything thatneeds to be manipulated or presented using a Web application.The ViewEach View component in the Struts Framework is mapped to a JSP that cancontain any combination of HTML, JSP, and Struts custom tags. JSP in the StrutsFramework serve two main functions. There are actionForm the View component, itanswers for the transmission of the table data.The ControllerThe Controller component of the Struts Framework is the backbone of all StrutsWeb applications. It is implemented using a servlet namedorg.apache.Struts.action.ActionServlet. This servlet receives HTTP requests anddelegates control of each request. The Controller component consists of fourcomponents: ActionServlet, RequestProssor, Actions and Struts.config-xml.ActionServlet is the center controller of the Struts Framework. RequestProcessor isthe request processor of each application module. Actions are to manage a materialoperation. Struts.config-xml is also one component of the Controller component.The Controller is the most important component of the Struts Framework.It may improve and advance JSP, Servlet, tags and Object Oriented through tomake use of Struts framework in Web application. It would reduce the developmenttime to apply MVC (Model-View-Controller) design mode, and advance efficiencyof the exploitation.The management system includes 9 modules, these are:Weapontype moduleThe Weapontype module can manage weapon scientific according to weapontypes, it consists of militancy weapon such as gun and no-militancy weapon such asrolling kitchen.Capability moduleThe capability module describes capability about each weapon;It contains use,standard and data of weapons.Weaponout moduleThe administrators may enter up something of weapons out by the Weaponoutmodule that it contains time, place and handlers etc.Weaponinto moduleThe administrators may enter up thing of weapon into by the Weaponintomodule that it is the same as Weaponout module.Admeasure moduleThe Admeasure module can enter up and backup something of admeasureweapons;It contains name, code, time and place etc.Scrap moduleThe scrap module can enter up and backup something of scrap weapons;It isthe same as the Admeasure module.Storehouse moduleThe storehouse module show storehouses of all weapons, it contains name,code and place etc.Status moduleThe status module display status and storehouses of all weapons, it containsname, code, place and status etc.Users moduleThe administrators may commission and manage users by the users module.Each operation module of the management system consists of Increase,Maintenance and Query.The management information system adopted Struts-pattern based on themodules designed.Firstly the paper designed database according as the system need adopting SQLServer 2000. SQL Server has better security and retractility, managed easily andadapted to the system.Then the paper designed public modules and operation modules bringing tobear Java and Struts, designed and explained the operation modules from Model,View and Controller.The system is encrypted in SSL agreement and database for the army securityneed after designing management system.The SSL agreement should be used server interface usually, its advantage iscurrency and the private key encrypting.Currency: many services are established on the basis of SSL (such as HTTP),which must be used if communicated with these services.SSL offers a simple interface for the private key encrypt. SSL realizes twooperations that are private key exchange and data encrypting using exchange privatekey. SSL encapsulates the private key encrypting and the details.Each DB manager must think about the security of the database systemcarefully. The methods of collocating SOL Server 2000 about security have 9 kinds.1) Install up to date service package;2) Apply the security of Microsoft's MBSA evaluation server;3) Windows Authentication Mode, which is generally used to connect to theserver of SQL Server 2000;4) Server isolation;5) Designate a reliable Sa password;6) Manage extended procedure, e.g. automatic procedure and register procedure;7) Prohibit SQL Server port at the firewall. Choosing TCP/IP protocol propertyof instance properties and hidden SQL Server instance can prevent the system fromillegal attack;8) Safe file system that it is recommended to chose the NTFS file system wheninstalling SQL Serve;9) Delete or protect the original setup file;10) Audit the SQL Server connection.The design of system adopted popular MVC pattern, it breached the status ofnowadays Weapon-Management-Information-system. The application of system canstrengthen weapon-equipment management, accelerate military informationinnovation improve battle effectiveness of arm and accord with military change.
Keywords/Search Tags:weapon management system, JSP, struts, SSL
PDF Full Text Request
Related items