Font Size: a A A

Design And Implementation Of Enterprise Cost Analysis System

Posted on:2014-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:W ZhouFull Text:PDF
GTID:2248330398972018Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology and the business community, the environment of enterprises is becoming more and more intense. As the protection of efficient operations, right decisions and rapid reaction from enterprises, Enterprise Cost Analysis System (ECAS) has gained more attention. But at the same time, the business intelligence system often provides poor security, poor transplantation, and poor integration. With the increasing demands of system quality of service and system performance of ECAS, the security, intelligence, stability and flexibility of ECAS are becoming increasingly urgent.The main contents of this thesis are as follows. How to improve security, portability, and flexibility of traditional ECAS, in order to enhance the security control of the application of ECAS. And, how to make ECAS and traditional information of Web seamless integration, and take full advantage of a large number of historical data, to provide safe and reliable support for the business decisions of the enterprise. Last, I have completed the design and implementation of a prototype of ECAS based on improved business intelligence, complete basic functional testing.The main work of paper is to summarize and analyze the major security problems and key security technology, the current development status of business intelligence, research progress, fields of applications. On this basis, I raised a secure ECAS based on Web technology and business intelligence. The work to propose the system design, to make the analysis and design, and make system details design and partial implementation and to take the basic test have been finished.(1) Key technologies and main problems of traditional Enterprise Cost Analysis System were reviewed. Security technology related to access to the system, the safety of equipment, data security, network transmission security, disaster recovery, etc.. Business intelligence is more like a solution for enterprise data than a new technology. Often, the basis of business intelligence includes data warehouse technology (DW), online analytical processing technology (OLAP) and the data mining (DM).(2) Analysis of the demands for improving traditional ECAS. The demands of that are the following: First, the traditional business intelligence system fails to meet demands. As existing ECAS often suffers from poor portability, and the lack of scalability and flexibility, enterprise IT budget restrictions, the new system is required to be more convenience, reliability, flexibility, low price etc.; traditional ERP software system has accumulated a large amount of historical data, and how to take advantage of these historical data, and provide support for the decisions of the corporate leadership, to ECAS, enterprises put forward higher requirements.(3)Complete the analysis and design of secure cost analysis system based on BI and Web technology. First, complete the necessary analysis. Second, complete the system architecture design and the overall functional design, and complete the design of various important function modules, for example, system security module, according to the system function (4) Complete the implementation and testing of the secure ECAS on BI and Web technology. Due to time constraints, the whole system does not be implemented perfectly and so some important modules are selected to implement and testing, including basic functional module of analysis and calculation, functional module of ETL data extraction, intelligent reporting functional module. System security management functions are focused on, for example, system security control function module, system log function modules.The last chapter is a summary and outlook for this article, summarizing that this main work and innovations, and at the same time pointing out the deficiencies of the system and future development direction...
Keywords/Search Tags:BI, Security, Cost, Access control, Analysis report, ETL
PDF Full Text Request
Related items