[Computer Graduation Design] 074 Emergency Resource Management System

1. Screenshots of the system (if you need a demo video, you can chat privately)

          

Summary

The fast-paced development of the modern economy and the continuous improvement and upgrading of information technology have upgraded the management of traditional data information to a management method of software storage, induction, and centralized processing of data information. This emergency resource management system was born under such a big environment. It can help managers process huge data information in a short time. Using this software tool can help managers improve transaction processing efficiency and achieve twice the result with half the effort. This emergency resource management system uses the current mature and perfect SSM framework, uses the cross-platform Java language that can develop large-scale commercial websites, and the Mysql database, one of the most popular RDBMS application software, for program development. The development of the emergency resource management system is based on Operators need to design a simple and beautiful interface, which is consistent with the same type of website in terms of functional module layout. When the program realizes the basic required functions, it also provides some practical solutions for the security problems faced by data information. It can be said that the program not only helps managers handle work affairs efficiently, but also realizes the integration, standardization and automation of data information.

Key words : emergency resource management system; SSM framework; Mysql; automation


directory 

directory 

1 Introduction

1.1 Research Background

1.2 Purpose and significance

1.3 Arrangement of paper structure

2 related technologies 

2.1 Introduction to SSM framework

2.2 B/S Structure Introduction

2.3 Mysql database introduction

3 System Analysis

3.1 System Feasibility Analysis

3.1.1 Technical Feasibility Analysis

3.1.2 Economic Feasibility Analysis

3.1.3 Operation Feasibility Analysis

3.2 System performance analysis

3.2.1 Ease of use indicators

3.2.2 Scalability metrics

3.2.3 Robustness Index

3.2.4 Safety indicators

3.3 System flow analysis

3.3.1 Operation process analysis

3.3.2 Login process analysis

3.3.3 Information adding process analysis

3.3.4 Analysis of Information Deletion Process

4 system design 

4.1 System outline design

4.2 System Function Structure Design

4.3 Database Design

4.3.1 Database ER diagram design

4.3.2 Database table structure design

5 system realization 

5.1 Technology Team Management

5.2 R&D platform management

5.3 Infrastructure Management

5.1 Database Management

6 System Test 

6.1 Features of system testing

6.2 System function test

6.2.1 Login function test

6.2.2 Add category functional test

6.3 Analysis of test results

in conclusion

thank you  

references

1 Introduction

1.1  Research Background

At present, the competition pressure in various industries in the society is very high. With the informatization and scientific development of the current era, all industries in the society are scrambling to use new information technology to scientifically and standardize the management of various relevant data in the industry. . Such a big environment makes those companies that stand still and do not accept the information technology brought about by information reform face the risk of being eliminated and replaced at any time. Therefore, today, various industries, whether it is the traditional education industry, catering industry, tourism industry, medical industry and other fields, will use new information technology to carry out the information revolution, changing the traditional paper-based and manual handling of work affairs. Office environment. It is the development requirement of the times that software information technology can cover all sectors of society, and the real realization of various data and documents is an irreversible and inevitable trend of the development of the information society. This emergency resource management system is also closely following the development of science and technology, using today's first-class software technology to realize the development of the software system, so that the logistics management information can be completely scientific, standardized and procedurally managed through the management system. In this way, information managers can save transaction processing time and reduce the error rate of data processing, which can promote the management level of basic data and avoid random business management work to a certain extent. At the same time, emergency resource management The various dynamic information stored in the system database also provides a large amount of factual basis for the upper management to make major decisions. In short, the emergency resource management system is a software system that can really improve the office efficiency of managers.

1.2 Purpose and significance

The processing of information data is completely dependent on manual operations, which will consume a lot of labor costs. Especially when faced with a large amount of data information, traditional manual operations not only cannot guarantee the error rate of data, but also tend to cause low utilization of various information resources. rate and low security issues. What's more, a lot of precious time is wasted, especially for updating information, summarizing and counting is a costly and labor-intensive process. Therefore, the emergence of electronic information management can alleviate and change the situation faced by traditional manual methods. On the one hand, it can ensure that information and data are processed efficiently in a short time, and can save labor costs. On the other hand, it can ensure the security and reliability of information and data. It can achieve fast retrieval and modification of information data, these advantages are unmatched by the previous old operation mode. Therefore, the emergency resource management system provides an important window for the upgrading and reform of the management mode of data information.

1.3 Arrangement of paper structure

In order to help users better understand and understand the development process and related content of the program, this article will explain the content through six chapters.

Chapter 1: Describes the development background of the program, the purpose and significance of the program in real life, and the structure and arrangement information of the program document;

Chapter 2: Describes the development environment of the program, including the technology involved in program development, the data storage tools used in program development and other information;

Chapter 3: Describes the feasibility problems that will be faced when the program starts to be developed, and describes the program's functions and performance requirements;

Chapter 4: Describes the functional subdivision information under the large function modules of the program, and the design information of the database table file structure for storing program data, etc.;

Chapter 5: Describes the content of the program's function realization interface, and also describes some of the functions operated by the program operator;

Chapter 6: Describes the test content of the program function, and introduces the concept and method of system test.


2 related technologies 

2.1 Introduction to SSM framework

The framework technology used in the program development of this project, the English abbreviation is SSM, and the popular frameworks used in JavaWeb development include SSH, SSM, SpringMVC, etc. It is also possible to use the SSH framework, the SSM framework, and the SpringMVC as a project program . The SSH framework is a heavy-weight framework. It is cumbersome to configure and not flexible enough. To modify the program, you need to modify many files, and it also takes up a lot of memory and CPU usage is relatively high. SpringMVC is a set of MVC architecture developed by Spring. Flexible and better to use, the SSM framework takes an intermediate value, neither SSH bloated nor SpringMVC simplification, belongs to the intermediate level, and is easier to write and understand during the configuration process and use process. The MyBatis framework replaces the Hibernate framework because it is more flexible and does not need to be completely operated in the framework. It can write more flexible code in data operations, and its performance is more stable than the Hibernate framework. In general, the use of the SSM framework is based on comprehensive consideration. There are many tutorials and experience on the Internet, and SSM is so popular, it is natural to develop with the SSM framework.

2. 2 B/S structure introduction   

In the early days, some files written in HTML language and some other resource files can be combined to form the simplest web program. After understanding web programs, you also need to understand web sites. The relationship between them is that one or more web programs can Put it in a Web site (Web server) on the Internet for use. It can be said that the development of Web applications has also led to the rise of the B/S network structure model. B is the initial letter of Brower (browser), S is the initial letter of Server (server), and the combination of the two initials becomes the abbreviation B/S of the network structure mode. Since this structural model accesses the server through the browser installed on the client, the core functions of the program can be arranged in the server for processing, which saves a lot of work for the development, later use and maintenance of the program. Figure 2.1 shows how a program developed using this architecture works.

Figure 2.1 Working principle diagram of B/S architecture

2. 3 Mysql database introduction

The developed program is only the functional interface of the program for the user, allowing the user to operate various functions of the program interface, so many people will ask, where is the data information generated by the user using the program function? This requires the knowledge of databases. Generally speaking, program development usually analyzes and compares the characteristics of common data storage tools, such as the characteristics and advantages of Mysql database, the characteristics and advantages of Access database, and the characteristics of Sqlserver database. In the end, it depends on which database matches the program to be developed, and also meets the data storage requirements required for program function operation. For example, if you need to develop a commercial-level program, the stored data has higher requirements on the database. You can choose Oracle. If It's just a relatively simple program that doesn't have too many requirements for data storage. You can choose Microsoft's Access. When the development program requires the database to occupy a small space and can meet the program data storage requirements, you can consider Oracle from Sweden's MySQL AB company. A relational database was acquired a long time ago, which is the current Mysql database. It is one of the most recognized application software among database tools. The information that needs to be explained is that the development of this program is applied to this database. It saves program data by using different data tables, which improves the flexibility of the database while increasing the storage speed of program data. Figure 2.2 shows the architecture diagram of MySQL.

Figure 2.2 MySQL database architecture diagram


3 System Analysis

When the user decides to develop a program, he needs to follow the following sequence of work, which can be summarized as: system analysis --> system design --> system development --> system testing, regardless of whether the process is changed or iterated, it is Work in this order. System analysis is to analyze what the system needs to do. The main purpose is to determine the function of the system, which also makes a good start for the next work.

3.1 System Feasibility Analysis 

Developing a program software requires not only time, but also manpower and material resources. The link of feasibility analysis is to solve the user's doubts in this regard, to see whether the program can be developed under the current conditions.

3.1.1 Technical Feasibility Analysis

The development language chosen for this program is Java. This programming language has rich data types and is relatively complete in command and control statements. More importantly, it supports classes and objects. These advantages provide technical support for program developers. , especially now that the code is gradually modularized, and the source code related to system function development is publicly displayed on the Internet, so it is gradually easier for developers who have a certain computer development foundation to independently develop the system.

3.1.2 Economic Feasibility Analysis

The most critical equipment for developing this program is a computer. Whether it is the computer equipped in the computer room of the school or the notebook purchased by myself since entering school, all of them can meet the development requirements. In addition, on the network, the school has completely covered the campus network, so there is no need to consider economic issues on equipment and network.

3.1.3 Operation Feasibility Analysis

With the improvement and upgrading of computer software and supporting hardware, the current computer environment is very good, especially computers have been widely used in every household, so computer equipment can be seen everywhere now, because the resource consumption of the program developed this time is small, in It can be easily run on a general computer or notebook.

Through the above feasibility description, the question of whether the program development is feasible can be solved from the aspects of economy, technology and operation. Therefore, it can be considered that the program software can be developed.

3.2 System performance analysis 

System performance analysis is also a relatively important content. The purpose of system performance analysis is to ensure that the system's functions can reach the specified indicators when it is used in daily life. Therefore, a complete system software requires the step of system performance analysis. . The performance analysis this time is mainly analyzed from the aspects of usability index, scalability index, system robustness index, and system security index.

3.2.1 Ease of use indicators

The purpose of this program software development is to allow users to improve the management efficiency of information and data by using this software. At the same time, this program software also needs to set corresponding functions for different operating users. Therefore, the operation process of this program should be as close as possible to The user's daily behavior of operating the software is consistent. In addition, the design and development of the program software should also consider the computer operation level of non-computer professional users, so that most users can easily operate the various functions provided by the program.

3.2.2 Scalability metrics

The current program software that needs to be developed is designed and developed according to the current user needs, but as time goes by and the social environment changes, the developed programs also need to keep pace with the times and need to be developed according to the changing needs of users. For the expansion of the corresponding functional content, it should be noted that when adding functional modules to the formed program, it is still necessary to ensure that the original structure and functions of the program will not be affected, and the newly added functional modules can also run normally in the system. The compliance of this indicator can also ensure that this program can calmly respond to changes in the market environment while meeting the requirements of information management.

3.2.3 Robustness Index

The development of program software is to process all kinds of data information stably when it is put into use. Once the program software is unstable, it will also cause disturbance to users. Therefore, from the perspective of performance analysis, it is necessary for the program software to keep stable when dealing with user misoperation, or when the user fills in wrong data due to various reasons, and can normally allow the user to to use. When an abnormality occurs in a certain functional module of the program, other functional modules of the program should also be able to ensure normal use. When the robustness index of the program reaches the standard, the user can have a good user experience.

3.2.4 Safety indicators

The security of the program software is the primary issue. After all, the data information stored in the corresponding database of the program is huge, and it also includes a lot of important personal information, which requires the program to have a complete security mechanism. Therefore, the program must set up a login function to check the user's identity and match the identity and authority. By restricting the functions of different user identities, the user's unauthorized operation of the program will never be tolerated. In addition, it is also necessary to guard against computer viruses and hackers at all times. By taking targeted measures to deal with security, ensure that the program is always in a safe environment, so that users can use it with confidence.

3.3 System flow analysis 

3.3.1 Operation process analysis

When the program is handed over to the user for use, it is necessary to provide the operation flow chart of the program (as shown in Figure 3.1), so that the user can easily understand the specific working steps of the program. Nowadays, the operation process of the program has a general standard, that is, first Submit the login data through the login page, and the user can operate the corresponding function on the program function operation area page only after the program is verified to be correct.

Figure 3.1 Program operation flow chart

3.3.2 Login process analysis _ _

In this part, it is necessary to separately explain the running process of the login function module of the program (as shown in Figure 3.2). The login module is also set up by the program for the sake of safety, so that users can use it with confidence. The login module mainly allows users to submit login information, and the program performs data verification. Only users who pass the verification can successfully log in to the program.

Figure 3.2 Program login flow chart

3.3.3 Information adding process analysis _

The adding function of the program is to provide the operator with the function of inputting information. Whether it involves adding user information or adding information related to other functional modules, the information adding process of the program (as shown in Figure 3.3) is consistent. The program first judges the data entered by the operator. This judgment rule is a piece of program code written in advance. When the program judges that the data meets the requirements, the data entered by the operator will be registered in the data table, such as the added User information, the newly added user information will be written into the user information data table file.

Figure 3.3 Information adding flow chart

3.3.4 Analysis of Information Deletion Process

When deleting some invalid data from the program, follow the information deletion process of the program (as shown in Figure 3.4), first select the data that the operator needs to delete, and the program will also prompt in order to prevent the operator from accidentally deleting information. When the operator really determines to delete the selected information, the information will be permanently deleted from the database.

Figure 3.4 Information deletion flow chart


4 system design 

The design scheme of the emergency resource management system, such as the design of the functional framework, such as the design of the database, also determines whether the system is efficient at the development level, and whether it is easy to maintain and upgrade at the system maintenance level, because it is necessary in the system implementation stage. Consider all the needs of users. If there is no comprehensive consideration in the design stage, then the system implementation part will not be able to start. Therefore, the system design part is also a crucial link. Only by careful and comprehensive consideration according to user needs can we have It is hoped to develop program software with sound and stable functions.

4.1 System outline design 

In order to save development costs and facilitate later maintenance and upgrades, the system to be developed this time intends to display the system function interface through a browser, so that the main transactions of the program software are processed on the server side in the background, and the front-end Part only handles a small amount of business logic. The following uses a diagram (as shown in Figure 4.1) to illustrate the working principle of the program.

Figure 4.1 Schematic diagram of how the program works

4.2 System function structure design 

When the user's functional requirements for the program are analyzed and obtained, the program design can be carried out. Figure 4.2 shows the functional structure diagram of administrators. Administrators are mainly responsible for filling in books and their category information, and maintaining the filled data, including modification and deletion. Administrators also need to review teacher registration information and publish announcement information. Manage self-service renting information, etc.

Figure 4.2 System function structure diagram

4.3 Database design 

The data generated by the function operation of the program, whether it is adding, modifying, or deleting, is stored and updated through the database, so the quality of a database design is also the criterion for judging whether the program is good or bad, because half of the success of the program All of the credit is due to the excellent design of the database. Once the database is well designed, it can reduce the developer's development burden.

4.3.1 Database ER Diagram Design 

The design of this part requires the use of ER diagram drawing tools. The commonly used tool is Visio tool to draw ER model diagrams. This tool can not only quickly create the required ER model diagrams, but also provides a very simple operation interface, which can be Modify the graphics or text properties of the drawing interface. When drawing an ER model diagram, it is necessary to distinguish the meanings of each graph to avoid drawing mistakes. The ER model diagram is composed of three graphic symbols: a rectangle (entity), an oval (attribute), and a diamond (relationship). During drawing, it is necessary to distinguish Open, using accurate graphical symbols to represent the corresponding data elements.

The relationship between various entities is represented by the ER diagram in the figure below. The drawn system ER diagram is shown in Figure 4.8.

Figure 4.8 System ER Diagram

4.3.2 Database table structure design

Once the database system is selected, it is necessary to create a database file in the database according to the program requirements, and in the database file that has been created, create a corresponding data table for the data generated during the program operation. The data table structure design is to create data Field design, field length design, field type design, etc. are carried out in the table. Only when the data table is reasonably designed can the data information generated by the operation of the relevant program be stored normally. 

 Table 4.1 Technology team list

column name

illustrate

type of data

allow empty

id

int(20)

primary key

no

name

varchar(200)

Team Name

yes

futheren

varchar(200)

head of the team

yes

team_time

timestamp

Team Creation Time

yes

jianjie_content

varchar(200)

Team Profile

yes

Table 4.2 Infrastructure table

column name

illustrate

type of data

allow empty

id

int(20)

primary key

no

name

varchar(200)

facility name

yes

img_photo

varchar(200)

Facility pictures

yes

jianjie_content

varchar(200)

Facility Introduction

yes

Table 4.3 Database tables

column name

illustrate

type of data

allow empty

id

int(20)

primary key

no

name

varchar(200)

profile name

yes

img_photo

varchar(200)

profile picture

yes

jianjie_content

varchar(200)

Information introduction

yes

Table 4.4 R&D platform table

column name

illustrate

type of data

allow empty

id

int(20)

primary key

no

name

varchar(200)

platform name

yes

yanfaxiangm

varchar(200)

research project

yes

jianjie_content

varchar(200)

Team Profile

yes

Table 4.5 Information table of scientific and technological equipment

     

column name

illustrate

type of data

allow empty

id

int(20)

primary key

no

name

varchar(200)

equipment name

yes

img_photo

varchar(200)

equipment picture

yes

jianjie_content

varchar(200)

Equipment introduction

yes


5 system realization 

The system implementation part is to realize the function of the system analysis and system design part through coding, and display the results of system analysis and system design in the form of a practical application system. The above-mentioned system analysis and system design mainly focus on the function, the design of the system operation logic, and also include the design of the database for storing data, etc. The system implementation is the final implementation stage, and the physical transformation, and finally issue a software system that can be applied to reality.

5.1 Technology Team Management

Figure 5.1 shows the technology team management page. The functions provided to administrators on this page are: query management of technology teams, which can delete technology teams, modify technology teams, and add technology teams.

Conditions for fuzzy queries on tech team names are also made

Figure 5.1 Technology team management page

5. 2 R&D platform management

Figure 5.2 shows the R&D platform management page. The functions provided to administrators on this page include: viewing the published R&D platform data, modifying the R&D platform, invalidating the R&D platform, and deleting it.

Figure 5.2 R&D platform management page

5.3 Infrastructure Management

The infrastructure management page is shown in Figure 5.3. The functions provided to administrators on this page are: infrastructure query management, which can delete infrastructure, modify infrastructure, and add infrastructure.

Conditions for fuzzy queries on infrastructure names are also made

Figure 5.3 Infrastructure management page

5.1 Database Management

As shown in Figure 5.4 is the database management page. The functions provided to administrators on this page are: database query management, which can delete databases, modify databases, and add databases.

Conditions for fuzzy queries on database names are also made

Figure 5.4 Database management page

6 System Test 

Once the program software is developed, it must go through an important operation link of testing before it is actually used in daily life, because the development period focuses on the development of each individual functional module, although each development is completed When a single function module is tested, it will be checked by unit test, and the programmer will continue to develop the next sub-function module after passing the test, and so on. When the programmer completes the development of all system sub-function modules, this time needs to Introduce system testing, system testing is to integrate all sub-function modules together to build the whole system and run it in a specified operating environment, mainly to test whether all functional modules of the system work well together. The link of system testing means that it can carry out the final acceptance test. The operating users of this test step are the customers or end users that the program is oriented to.

6.1 Features of system testing

System testing is also to ensure that the system can run stably and normally after it is officially launched, bringing convenience to users. System testing also has its corresponding characteristics:

(1) System testing which includes a complete end-to-end test;

(2) The system test also tests the architecture of the program software and the business requirements of the program software;

(3) Once the system test is carried out in the correct way, it will reduce various errors after the program is officially launched;

System testing is generally run in an environment similar to the production environment. Program functions such as adding functions, deleting functions, and modifying functions will use the same data to compare the new system with the existing system. Functions such as adding, modifying, and deleting in the system can be better understood, and user satisfaction with the new system can also be improved.

6.2 System function test

6.2.1 Login function test

To ensure the security of the program, we must first start from the entry threshold, so the login module of the program is also a very important entry threshold of the program. It is necessary to ensure that this function can be used safely. This time, the administrator role is selected for the program login module test (as shown in Table 6.1).

Table 6.1 Login function test data table

login account

login password

Operator

Final Results

abc

abc

administrator

login into program

123

abc

administrator

Pop-up error login prompt

abc

123

administrator

Pop-up error login prompt

6 . 2 . 2 Adding category functional tests

The emergency resource management system requires the administrator to add category information. The category name is mandatory data set by the program, and the added category name cannot be the existing data in the database. When testing the function of adding categories, the test data is shown in the table below.

Table 6.2 Add category function test data table

classification name

Feedback result

Category 1

fail

Category 2

fail

Category 3

success

6.3 Analysis of test results

After the program has passed the above test links, the test conclusions that can be drawn are:

First, it can be determined that the developed emergency resource management system meets the requirements of the same type of system;

The second point is that users require that the functions required by the emergency resource management system have been developed and can be used normally;

The third point is that the interface of the emergency resource management system is simple and beautiful, and the operation process is clear;

Fourth, the safety and operational performance of the emergency resource management system meet the development requirements.

至此,应急资源管理系统可以确保所有功能能够按照预期目标进行运行,可以正式投入生活中运行使用!


结  论

通过对应急资源管理系统的开发,让我深刻明白开发一个程序软件需要经历的流程,当确定要开发一个应急资源管理系统的程序时,我在开发期间,对其功能进行合理的需求分析,然后才是程序软件的功能的框架设计,数据库的实体与数据表设计,程序软件的功能详细界面实现,以及程序的功能测试等进行全方位的细致考虑,虽然在此过程中,各个环节都遇到了大大小小的困难,但是通过对这些问题进行反复的分析,深入的思考,借助各种相关文献资料提供的方法与解决思路成功解决面临的各个问题,最后成功的让我开发的应急资源管理系统得以正常运行。

应急资源管理系统在功能上面是基本可以满足用户对系统的操作,但是这个程序软件也有许多方面是不足的,因此,在下一个时间阶段,有几点需要改进的地方需要提出来,它们分别是:

(1)操作页面可以满足用户简易操作的要求,但是在页面多样化设计层面上需要把一些比较丰富的设计结构考虑进来。

(2)程序软件的总体安全性能需要优化,例如程序的退出安全性,以及程序的并发性等问题都需要进行安全性升级,让开发的应急资源管理系统与现实中的相关网站更贴合。

(3)需要对程序的数据结构方面,程序的代码方面等进行优化,让运行起来的程序可以保持稳定运行,也让程序能够保证短时间内处理相关事务,节省处理事务的时间,提高事务处理的效率,同时对服务器上资源占用的比例进行降低。

应急资源管理系统的开发一方面是对自身专业知识技能进行最终考核,另一方面也是让自己学会独立解决程序开发过程中所遇到的问题,掌握将理论知识运用于程序开发实践的方法。应急资源管理系统的开发最终目标就是让系统更具人性化,同时在逻辑设计上,让系统能够更加的严谨。


  

大学期间的学习时光对于我来说是美好而短暂的,在这期间我也接触了许多可爱的大学同学们,以及兢兢业业教学的老师们,在我的毕业论文即将完成之际,我想对那些曾经给予我支持,帮助,还有鼓励的同学和老师以及家人们表达我内心的无比感激之情。

首先,感谢给予我论文指导的指导老师,从开题报告,任务书,论文大纲的编写与系统的功能框架设计,到最终的毕业论文,都是指导老师全程参与的悉心指导和帮忙,才能够让我的毕业论文可以符合学院要求编写完成。我的指导老师一丝不苟的教学精神以及在学术上的严谨作风,这些优点是值得我不断去努力学习的。

其次,感谢大学同学的陪伴与帮助,在我独立编写毕业论文期间,大学同学的鼓励与耐心的帮助使得我少走很多弯路,节省毕业论文的编写时间,也让我有更多精力去完善我开发的系统。

最后,感谢我最亲密的家人带给我的包容和关爱,我能够安心学习也是来源于家人们对我的无微不至的照顾,这样我才可以顺顺利利完成我的大学学业。

毕业倒计时之际,希望在今后的工作中,在今后的生活中,我会一直谨记老师们带给我的孜孜不倦的教诲,并通过不懈的努力和追求来改变自己,以此报答那些曾支持过以及帮助过我的人!


参考文献

[1]宁昭铱,陈静,张立斌.一个应急资源管理系统平台的设计[J].科技经济导刊,2017(01):32+25.

[2]李鑫.浅谈信息化应急资源管理系统的设计与实现[J].民营科技,2016(11):74.

[3]宋丽娜.基于JSP的Web开发中文乱码问题的研究与解决[J].电子技术,2015,42(11):5-7.

[4]汪君宇.基于JSP的Web应用软件开发技术分析[J].科技创新与应用,2018(16):158-160.

[5]赵钢.JSP Servlet+EJB的Web模式应用研究[J].电子设计工程,2016,21(13):47-49.

[6]肖英.解决JSP/Servlet开发中的中文乱码问题[J].科技传播,2017,(1)11-25.

[7]朱钧.基于角色的jsp通用权限系统设计与实现[D].山东大学,2014.

[8]康牧.JSP动态网站开发实用教程[M].清华大学出版社,2014.

[9]王建国.数据库设计在网站开发中的应用[J].山东农业工程学院学报,2017,34(04):158-159+164.

[10]张知青.基于关系数据库的查询方法及优化技术分析[J].煤炭技术,2015,31(05):218-220.

[11]陈志誉.Java工具及其调度方法研究[D].华南理工大学,2018.

[12]张孝祥,徐明华.JAVA基础与案例开发详解[M].清华大学出版社,2014.

[13]刘亚宾.精通Eclipse--JAVA技术大系[M].电子工业出版社,2015.

[14]曾志明.网站开发技术的比较研究[J].电脑知识与技术,2015,6(05):1075-1078.

[15]卫红春.信息系统分析与设计[M].北京:清华大学出版社,2014.

[16]于万波.网站开发与应用案例教程[M].清华大学出版社,2013.

[17]黎连业,王华,李淑春.软件测试与测试技术[M].清华大学出版社,2014.

[18]Xin-hua YOU. Brief Discuss the Application of Object-oriented in Java Language Programming Course[A]. Advanced Science and Industry Research Center.Proceedings of 2018 3rd International Conference on Automation, Mechanical and Electrical Engineering (AMEE 2018)[C].Advanced Science and Industry Research Center:Science and Engineering Research Center,2018:5.

[19]Menglin Liu. Design and Research of Batch Query System Based on Java[A]. Research Institute of Management Science and Industrial Engineering.Proceedings of 2018 4th World Conference on Control, Electronics and Computer Engineering (WCCECE 2018)[C].Research Institute of Management Science and Industrial Engineering:计算机科学与电子技术国际学会(Computer Science and Electronic Technology International Society),2018:5.

Guess you like

Origin blog.csdn.net/licongzhuo/article/details/130693962