Font Size: a A A

Research And Analysis Of Troops' Military Security Card System

Posted on:2016-06-27Degree:MasterType:Thesis
Country:ChinaCandidate:T DengFull Text:PDF
GTID:2278330482966310Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Logistics information management is an important area the army building, and traditional hand reports today on the logistical supply troops adoption process, which will make the logistics work is very heavy, the efficiency is relatively low, although a small number of troops using computer information input, But the use of all stand-alone form. Because of logistics management in the armed forces, as were loaded payment, medical care, welfare and material management and so belong to different sectors in the armed forces are managed, and forces each department has its own set of management systems and standards, which led to standard logistics management is difficult to unity. So the military forces eager to have a handle salaried, medical equipment and other services and lead the all-around security card, can use digital information technology and network technology, the protection of resources, the object security, technical services, and management of life services information integration and the use of force, full of running and optimization Force Logistics digital information resources. Soldiers of security card system of this paper is able to do this these.In this paper, the first business of the system were analyzed, the first business of the system are described, including business problem definition, analysis and business functions of the organization analyzed, then elaborated the existing business processes of the system, including new personnel flow, security card issuance processes, security cards make change processes, people processes and personnel transferred to tune out the process. Then, based on existing business operations of the system are optimized, including additional personnel processes, security card issuing process, security cards make change processes, staff redeployment processes, people tune out the process, basic data management processes and systems management Process. On the basis of business on the paper describes the functional analysis, the role of the first users of the system are analyzed, followed by the top-level data flow diagrams, data flow and layer 2 data flow describes the data flow analysis system, followed by the overall function and a sub-structure of a functional block diagram describes the functional structure of the system. Finally, the system is described by the data analysis and database tables Entity Relationship Analysis.Soldiers of security card systems described herein can shift troops from the traditional form of protection in the form of computer information, lay the foundation for the development of security forces, whose research work has practical significance.
Keywords/Search Tags:Forces, military, security card, Information Systems
PDF Full Text Request
Related items