Font Size: a A A

The Design And Realization Of A Public Security Platform Based On Workflow

Posted on:2013-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:R H ChenFull Text:PDF
GTID:2248330392452012Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, the level of informationconstruction on public security work is increasing. How to strengthen the institutionalmanagement, concentrate resources, and make office automation really come true, is anurgent need of public security work. It is important research work in public security scienceand technology work. However, the current public security office platform has serious designfault in document flow technology, identity authentication or distributed function, whichrestricts the process of information construction on public security work.The goal of the research is to conduct in-depth research of workflow technology. Tochange the original office model, we build the humanistic and intellectual office platform. Theplatform covered identity authentication, document flow technology and application ofmanagement technology. The platform has contributed to optimize the administration ofdepartment, standardize process, and reduce bottleneck. It has improved the information andcombat capability of public security. At the same time, the decision-making mechanism andsupervision mechanism is conducive to the department cooperation office ability, to enhanceunanimous decision. The platform make office efficacy really come true.In this paper, at first we introduced the basic content of office automation, analysis themainstream workflow technology of internal and external. To the public security workpeculiarity, we design the decision-making system of the public security office and the varioussubsystems. We use four key technologies:1) The document flow definition technology.Comprehensive the existing open-source workflow management system, and introduce JBPM(Java Business Process Management) workflow management system. The system is based onJAVA technology, with strong data processing ability and stability. The goal of the operationallevel is to separate application logic and process logic, and ensure the efficiency of code.2)Web Service technology. Based on the compatibility demand of the platform, we establish the Web Service technology with Hyper Text Transfer Protocol. It uses the normal componentinterface to call network resources, and help to improve the convenience of the cross platformapplication. Depend on Web Service technology, the platform make identification and remindcome true.3) Document management technology. To solve the problems which manage thehuge number and variety of electronic documents, we establish an open, scalable andcomprehensive document management module. It allows users to create cross-border betweendepartments to edit, share and publish all kinds of document.4) The technology of approvalauthority. The approval authority management is the most important of office automation,which ensure the smooth running of the office processes. The processes involve thedocuments countersigned, fallback, upload and protect. In order to facilitate the practicalapplications, we are also design the agency approval.Then, on the basis of the key technology research such as the workflow engine, pagepresentation layer and database design, we built the public security office automation platformby B/S architecture and JBPM workflow technology. We focused on the analysis of systemmanagement, document flow, leave management, document management and schedulingmanagement, elaborate the basic principles of the sub-module. In the technology developmentprocess, pay attention to the actual needs of the public security operations. Design morehumane mode of operation by practice. Custom design, data format definition and control arebound to complete system.The system about this paper achieved good results in practical applications.
Keywords/Search Tags:Public Security, Office automation, Collaboration, JBPM, Workflow
PDF Full Text Request
Related items