| Our helicopter fault research is in the initial stage, and equipment safeguard informatization isthe inevitable demand of the equipment support. This article in view of the current in the helicoptermaintenance support in the construction of digital and information demand, based on the actualsituation, analysis of maintenance work there are many shortage, based on available data, analysis toestablish the helicopter fault and maintenance information database software system, the method andthe way of the mature development of technology, try to prepare a set of helicopter maintenance andfault information database software, and carry out the trial work, get a lot of useful conclusions.This paper first on our helicopter maintain the status quo, especially fault statistics of actualsituation at home and abroad are analyzed, through the domestic construction of information security,and find out the contrast in the maintenance of security management problems and the insufficiency,and puts forward the helicopter fault information database system of the importance and necessity.Secondly, introduces the application of object-oriented thoughts and UML unified modeling languagefor system analysis and modeling process, through the analysis of the actual situation and needs ofusers, in strict accordance with the database design steps to design the actual needs of the database,and in accordance with the relevant requirements and system model and flow structure, choose theC/S structure, MySQL database and QT4.7as a development tool, complete the whole softwaredesign and development. Again, with software trial process as an example, shows the use of thesoftware process, and with the recent database for demonstrations, in view of the present database offault information to carry out a preliminary statistics and analysis. And then, the software systemdevelopment related technologies and problems are summarized, and at the same time, this paperprobes into the database related safety technology and mechanism, the identification andauthentication, data backup and recovery, operation log are briefly introduced. Finally, theconstruction of this system is summarized and prospected. |