Font Size: a A A

Confidential Training System Analysis And Design

Posted on:2008-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:P HuangFull Text:PDF
GTID:2178360212493060Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Confidential work was born in the war-ridden years. In that era there was no computer and Internet, confidential work is the work mainly by hand. The transform between the express and the cryptograph depended on manual work. The way to train and examine the confidential employee is the traditional way of timing and collating manually. This way has low accuracy and low efficiency and employee has subjective factors in the operation stage inevitably. Along with the progress of the time and the development of technology, the present confidential work has been transformed from manual work to automatic encryption and decryption by computers. But the training and evaluation of the confidential employee still use the traditional way of timing and checking manually. Facing the rapid development of computer particularly the network technology, we are in dire need of a complete training system to improve the way of training and evaluation, so that the operation level and work efficiency of confidential employee can be improved.This paper adopts the traditional Waterfall model in the rational unified process as the way of software development. It describes the demand analysis, system design and system implementation of the confidential system, using the unified modeling language as the description language of analyzing and designing, and the VISUAL BASIC as the technology platform. It describes a Specific analysis, design and implementation of some function modules such as training and analyzing module, test database management, the control of input method and the system management module.This paper analyzes the background of the system development and makes a brief description of the main problems that the system must figure out. It makes a summary description of the whole system. Then it describes the demands analysis and architecture design of the system, and it also describes the particular design and implementation of some representative instances. It makes a detailed description of the analyzing and designing of continual text which is the difficult problem to the system.The key problem this article solves has the following several aspects:(1)At present we are lack of mature and normative development standard ofRUP and UML. So it is easy to have differences in the actual development which increases the communication cost and reduces the development efficiency. By combining the RUP pattern and the traditional waterfall pattern, and combining the UML and the standard of process documents in this system, we made a standardized norms of the development criterion and standard in the project team, and improve the efficiency of development.(2) The training analysis module is the difficulty in the system which includes the continual text analysis, the difficulty coefficient computation and the proof of continual text. Regarding the continual text analysis, we use the method of fuzzy comparison. Regarding the proofreading of continual text, we follow the principle of "minimizing the mistakes".(3)The system can deal with the malfunction recovery, such as the deadlock machine, network faults and so on,in a proper way.When the malfunction disappeared ,the system can recovery the task from the point before malfunction appeared.
Keywords/Search Tags:confidential work, training, system, fuzzy comparison
PDF Full Text Request
Related items