Font Size: a A A

The Design And Implementation Of Armored Equipment Maintenance Mangement System

Posted on:2007-11-06Degree:MasterType:Thesis
Country:ChinaCandidate:J J WangFull Text:PDF
GTID:2178360185477558Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along the development of Internet technology, the human society strides forward one brand-new information age. The information technology isn't only used in the business management, also obtained widespread application in the army construction. With the development of Internet and Web technology, many kinds of fresh technical means are supplied for modern management system. Therefor, the thesis based on the need of army, developed the armored equipment maintenance management system which based on Web technology. The application of this system proved that it adapt to the trend such as information and standardization. Broke away from the traditional management model and made some bases for information war in the future.In the first, this paper pointed out necessary to emplore this problem. It analysed the current problems faced in developing this system, applying current software development technology and focusing on system function, analysed and designed the system framework and architecture.Second, analysed the system requirement with the UML method, identified the system use case model and thus set the system class and object. The paper proposed B/S as the focus and C/S architecture, based on which the armored equipment maintenance management system is presented.At last, the paper used the Java language and its development standard J2EE developted the platform on the system. It realized the division of presentation logic, business logic and data logic. It brought the scalability, reliability, extensibility and security necessary to support the armored equipment maintenance management System. In addition, in the database construction used the seal technology of Java database connection (JDBC). In safety mechanism, J2EE security mechnisms and role-based Access Control model with dynamic constraints are applied to maintain the security of Web applications.
Keywords/Search Tags:J2EE, UML, B/S structure, database connection, access control
PDF Full Text Request
Related items