Font Size: a A A

Research And Analysis Of The Public Security Case Management System Of Xianju County Public Security Bureau

Posted on:2017-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:L H ChenFull Text:PDF
GTID:2358330512964551Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The 21st century is the era of information explosion, with the continuous development of computer technology, the business is dealt with from all walks of life is becoming more and more dependent on the computer. The continuous development of society and progress has brought people's lives and the big change, but also brings the negative influence, for example, my county public security cases ratings are also rising. Xianju county public security case handling work also must follow the development of The Times, in order to adapt to this situation, I must change the old traditional way of manual handling public security cases business, therefore, this article introduced the computer technology to realize xianju county public security case management system, to assist in xianju county public security bureau to complete the case of public security processing. Xianju county public security bureau of public security case management, in this paper, based on the specific circumstances, to the business process of the bureau of public security case management made the division of science, the core business covers:summoned registration management, evidence management, management, process management, execution and so on five big core business module. First of all, the similar system for research and development has carried on the thorough investigation and analysis, and then, combined with the actual situation of xianju county public security bureau is given in this paper the function of the system analysis, through UML technology, using the use case diagram and package diagram of system function module successfully modeling scientifically, successful by database technology in the data analysis, and designed the corresponding database table. Using entity class diagram, scientifically completes the database modeling. Finally, the deficiency of this article are given, and the future will continue to do the work.
Keywords/Search Tags:public security cases, Management system, Modeling, UML
PDF Full Text Request
Related items