[Computer Graduation Design] 160 Community Smart Elderly Guardianship Management Platform

1. Screenshots of the system (if you need a demo video, you can chat privately)
 

Summary

Nowadays, all walks of life in society are using their own dedicated software to work. At this time of the development of the Internet, people have found that they cannot do without the Internet. The development of the Internet is inseparable from some new technologies, and new technologies are often created to solve existing problems. In view of the non-standard management of community smart elderly care information, low fault tolerance rate, and time-consuming data processing for managers, the newly developed community smart elderly care management platform can standardize the formality and legality of the entire data processing process from the root. .

The community smart elderly monitoring management platform can realize feedback information management, room occupancy management, elderly information management, message management, material application management, medical examiner management, logistics personnel management, nurse management, room management and other functions. The system uses Mysql database, Java language, Spring Boot framework and other technologies for programming.

The community smart elderly care management platform can improve the efficiency of community smart elderly care information management issues, optimize the community smart elderly care information processing process, and ensure the security of stored data. It is a very reliable and safe application.

Key words: community smart elderly guardianship management platform; Mysql database; Java language


  directory

Chapter 1 Introduction

1.1 Subject background

1.2 Significance of the topic

1.3 Research content

Chapter 2 Development Environment and Technology

2.1 Java language

2.2 MYSQL database

2.3 IDEA development tools

2.4 Spring Boot framework

Chapter 3 System Analysis

3.1 Feasibility Analysis

3.1.1 Technical Feasibility

3.1.2 Economic feasibility

3.1.3 Operational Feasibility

3.2 System flow

3.2.1 Operation process

3.2.2 Login process

3.2.3 Delete information flow

3.2.4 Add information process

3.3 Performance requirements

3.4 Functional requirements

Chapter 4 System Design

4.1 Functional structure design

4.2 Database design

4.2.1 Database conceptual design

4.2.2 Database physical design

Chapter 5 System Implementation

5.1 Administrator function realization

5.1.1 Room information management

5.1.2 Room check-in management

5.1.3 Elderly information management

5.2 Realization of logistics personnel functions

5.2.1 View feedback information

5.2.2 Material application view

5.3 Nursing function realization

5.3.1 Room check-in check

5.3.2 Check messages

5.4 Realization of medical examiner function

5.4.1 View the information of the elderly

5.4.2 Announcement viewing

5.5 User function realization

5.5.1 Message management

5.5.2 Material application management

Chapter 6 System Testing

6.1 Functional test

6.1.1 Login function test

6.1.2 Modify password function test

6.2 System test results

in conclusion

references

thanks

Chapter 1  Introduction _

1.1 Subject background 

The emergence of the Internet in the 21st century has changed people's lives for thousands of years, not only in the abundance of living materials, but also in the spiritual level. The sign of the progress of the times is to allow people to live a better life. Before the birth of the Internet, geographical location was often a gap in people's minds that could not cross domains. The speed of information dissemination was extremely slow, and the speed and requirements of information processing were still transmitted by people riding horses or carrier pigeons. It is very likely to be lost, and the level of information transmission determines the standard of people's lives. Nowadays, everyone is using the Internet to achieve their own goals, setting up computer management from the internal management, improving the level of internal information management, and obtaining relevant data from the external market with computers for processing. Nowadays, all walks of life have been heavily dependent on computers. .

This topic researches and develops the community smart elderly guardianship management platform, making the system installed on the computer a little helper for managers, improving the processing speed of community smart elderly guardianship information, standardizing the community smart elderly care information processing process, and allowing managers The output efficiency is higher.

1.2 Significance of the subject

Traditional data processing must be done on a sheet of paper, and then the statistics are collected on a sheet of paper after processing, and the processing is repeated continuously, and finally a result is given to the highest level as a reference. Before the Internet, this model was a kind of For common things, if the efficiency of information management cannot be improved, it is common sense for people to use talents. More people are more powerful. The birth of the computer is the discovery of the lack of a large number of people. For example, the training of high-end computing talents has been unable to keep up with the use, so people have developed a machine that helps people calculate, which is the predecessor of the computer. In the Internet age, people found that it is completely possible Let program suppliers provide solutions, and choose your own suitable solutions to improve your output ratio. As a result, various solutions relying on programs to process information have appeared on the market.

The community smart elderly guardianship management platform developed by this project is to provide a solution for community smart elderly guardianship information processing. It can process information in a short time, and users only need to move the mouse and keyboard to obtain the information they need, and These information all have special storage devices, and the backup and migration of data can be set to be unattended. From the perspective of manpower, information processing and information security, the community smart elderly guardianship management platform is completely superior to traditional paper-based operations. Therefore, the community smart elderly care management platform is so trustworthy.

1.3 Research content

This article describes the design and implementation of the community smart elderly guardianship management platform in six chapters.

Chapter 1: Study the background of the community smart elderly care management platform, and the significance of developing the community smart elderly care management platform.

Chapter 2: Explain the environment and technology for developing the community smart elderly guardianship management platform.

Chapter 3: Analyze the feasibility, performance, process and function of the community smart elderly guardianship management platform.

Chapter 4: Design the functional structure of the community smart elderly care management platform, design the database ER diagram and design the storage structure of the data table.

Chapter 5: Realize the functions of the community smart elderly guardianship management platform and display the functional interface.

Chapter 6: Explain the system test, and test some functions of the system.


Chapter 2 Development Environment and Technology 

This chapter describes the development environment that needs to be built to develop the community smart elderly care management platform, as well as the programming technology used in the development of the community smart elderly care management platform.

2. 1 Java language  

The Java language is one of the evergreen trees that are still alive in the programming language industry today. The most primitive birth of the Java language is not only the creators who feel that the C language is very troublesome in programming. If you only focus on the processing of business logic, you will ignore various pointers and garbage collection operations, resulting in time to solve problems. It is often greater than the time for normal programming to process business logic, which is a waste of time. The creators of the Java language perfectly solved this problem by automating pointer processing and garbage disposal. Although this will lose some performance, with the continuous development of computer hardware, these performances can be ignored. And C language is a language for hardware development. Programming on qualified hardware can maximize the use of hardware performance. However, with changes in hardware or operating systems, if C language is still used, the entire program needs to be redesigned. For programming, only a language that changes with market changes is a language that conforms to the trend and the law of survival. The creator of the Java language developed the Java language specifically for the shortcomings of the C language. Let the Java language run no matter what kind of environment it is in, because there is a shell outside the running of the Java language, that is, a virtual machine. As long as the Java virtual machine can be installed on a computer, Java programs can be run.

2. 2  MYSQL database

The MySQL database is a type of relational database, and it is also a traditional row-based data model. Some data is first obtained row by row, and then displayed row by row, which is obviously different from the columnar database that has recently emerged from big data. The row database mainly deals with the most important data logic part, and it must be valid data, so that the data association in each place is indestructible. If the data security is relatively high, you must choose the MySQL database or the column database. The invention is only because of the high reading efficiency, and it is not much better than the traditional MySQL database in terms of data writing. Although the installation package of MySQL is only tens of megabytes or even hundreds of megabytes compared to oracle or SQL SERVER, it is a bit small, but its functions are not weak, and it strictly follows the SQL standard syntax. The data storage form of MySQL is from large to small. The database is the largest, and then the table. There are certain rules for storing data in each table. The data storage is in the form of a table, that is to say, there are horizontal and vertical. A row generally represents a piece of data. Each table has fields, and fields exist in the form of columns. This ensures that each field of a piece of data corresponds to data of the same data type. Tables can also be associated and divided into tables. If there are too many attributes related to a piece of data, then the effective correlation can be made into an association, and it can be set whether it is unique or not.

2.3 IDEA development tools

IDEA is a development software created by Java programmers and developers in the Czech Republic. At the beginning, it was mainly because they were not comfortable with Eclipse software, so they developed this software directly. The reason why it is not smooth is that there is no code promotion function. The reason is that Eclipse only uses code hints as a plug-in form. If some program developers are not clear about code hints, plug-ins may cause problems, and code hints are only used as plug-ins. So there is a lack of functionality. IDEA not only does a good job of code hints, but also makes it even more powerful in code refactoring. Program developers can choose a piece of code and then IDEA will decompose and refactor the code, effectively making the code more layered and reusable. It is more flexible, more concise and convenient to use, greatly reduces the workload of code, and improves the efficiency of code development. Of course, IDEA is so good for users, and there must be a purpose. The reason is that the more plug-ins are more friendly, it will cost a lot of money to use, so the use of IDEA mainly depends on your preferences.

2.4 Spring Boot framework

Spring Boot is a framework that does not require code generation, and does not need to configure any XML files, because Spring Boot comes with a lot of interfaces, just need to configure different interfaces to automatically apply and identify needs The dependency is very convenient in terms of configuration, and it feels like a framework is not used when using it. Spring Boot has many default configuration files, and the default configuration files can be modified, can be set to be automatically loaded, and exception handling can be divided into global exception handling and default exception handling. During the use of Spring Boot, it is like registering directly with what is used. The so-called registration is to make a special statement on the corresponding class and method.


Chapter 3  System Analysis

After confirming the subject of research, the author of this paper downloads documents from major digital libraries to read, and understands the general functions of the same type of websites, and then combines with the actual needs of users of this system to analyze, and concludes that this system should be studied specific functions and performance. Although the stage work of analyzing the system is mainly to determine the function, it affects the progress of the subsequent system development link, and it is also a relatively important link in the system development process.

3.1 Feasibility analysis 

The following part is to conduct feasibility analysis from three angles. The premise to ensure the success of development is feasibility analysis. Only by conducting analysis in advance and conforming to the program development process will the development process not be interrupted.

3.1.1 Technical Feasibility

At the level of technical implementation, several technical implementation methods have been analyzed, and there are corresponding successful cases. There are also many open source modules for reference. Therefore, from the perspective of technical feasibility analysis, there is no problem in realizing the community smart elderly care management platform. .

3.1.2 Economic feasibility

For developers who are students, there are very few economic resources available. In order to develop a community smart elderly care management platform, through technical analysis, it is found that they can use their own computers for development, and the configuration of the school computer room can also achieve Require. The most important thing is that technical resources are generally open source and free to use, so it is concluded that it is economically feasible.

3.1.3 Operation Feasibility

The specific implementation of the community smart elderly care management platform refers to the normal operation logic of human beings, and takes common operating habits as the main navigation implementation, which allows users to understand and operate more quickly, and realize logical operation procedures. concrete manifestation of sex.

The above is an analysis from different angles to ensure the normal development of the community smart elderly guardianship management platform.

3.2 System flow

After the community smart elderly care management platform is put into use, the internal operation logic of each function needs to be understood by the user through the flow chart.

3. 2.1 Operation process

When operating the community smart elderly care management platform, users should operate according to the operation process provided by this system (Figure 3.1 is the operation flow chart of this system), which can reduce the errors in user operation, thereby saving access to the community The time of the smart elderly guardianship management platform.

Figure 3.1 System operation flow

3.2.2 Login process _ _

The community smart elderly guardianship management platform guides users to enter the designated functional operation area through the login function (Figure 3.2 is the login process), and also prevents users who are not from the system from enjoying the services provided by the system and viewing the information provided by the system. In order to ensure the safe use of the system users.

Figure 3.2 Login process

3. 2.3 Delete information process

After long-term use, the community smart elderly care management platform will generate a lot of data information. In order to free up storage space to store more data, the data stored in the database of this system, some data without reference value need to be deleted (Figure 3.3 is the process of deleting information), in the process of deleting data, in order to avoid accidental deletion, use The user should decide whether to delete the data according to the prompt of the system.

Figure 3.3 Delete information flow

3. 2.4 Add information process

The community smart elderly guardianship management platform provides a visual functional operation area, which is very convenient for users to operate data. When users enter data into the system (Figure 3.4 is the process of adding information), the system will also perform data legality verification. Judgment, the data that meets the requirements can be registered in the designated table of the database.

Figure 3.4 Add information process

3.3 Performance requirements _

In the requirements analysis, the performance of the server required by the project should be analyzed, so as to conform to the normal analysis process. It is a very serious matter to only talk about functional requirements and not performance requirements, which may lead to a series of unpredictable problems in the use process, so performance requirements are also important items to be considered.

The following is to analyze the performance of the system from several aspects, and analyze the system performance from each angle.

(1) Capacity of system data: From the perspective of data analysis, each table and each database has reached a certain amount of data, whether it needs to be divided into tables or databases, if it exceeds the set limit of data, it may be As a result, the data is sluggish and the fault tolerance is increased.

(2) Requirements for data accuracy: It is necessary to consider the corresponding data accuracy issues in the data setting link in the demand analysis. It is necessary to find out whether the data is commonly used or not, and then set different values. Data accuracy problems will directly lead to design performance problems.

(3) Response time requirements: From the operation submitted by the user to the page reflection, there is a problem of data processing in the middle. If the amount of data is large, then consider the problem of indexing and sub-database. No matter how large the amount of data is, it is necessary to consider adding a columnar database. The problem, these must be judged according to the increase in the amount of data and the rigor of the logic in order to meet the user's requirements. After all, the response time is too long to operate and it is uncomfortable.

The performance requirements of the system can roughly understand the concepts related to the performance requirements from the beginning of the business requirements, and then realize them one by one from the system performance requirements, which can make the designed system valuable.

3.4 Functional requirements 

The community smart elderly guardianship management platform conducts functional analysis from the perspective of usage permissions, and uses use case diagrams to show the functions that each permission needs to operate.

Figure 3.5 is the use case diagram of administrators. The functions of administrator authority operations include the management of logistics personnel, medical examiners, nurses, elderly people, room information, room occupancy information, feedback information, and message management.

Figure 3.5 Administrator use case diagram

Figure 3.6 is the use case diagram of the logistics personnel. The functions of the logistics personnel’s authority operation include checking the room, checking the elderly staying in the room, checking the feedback information, checking the material application information, etc.

Figure 3.6 Logistician use case diagram

Figure 3.7 is the use case diagram of the nurse. The functions of the nurse’s permission operation include viewing the information of the elderly, viewing the feedback information, viewing the message information, viewing the announcement, etc.

Figure 3.7 Nursing use case diagram

Figure 3.8 is a use case diagram of a medical examiner. The functions of the medical examiner’s permission operation include viewing material application information, viewing information about the elderly, and checking room occupancy information.

Figure 3.8 Medical examiner use case diagram

Figure 3.9 is a user use case diagram. The functions of user authority operations include managing messages, managing feedback information, managing material application information, and viewing elderly information, etc.

Figure 3.9 User use case diagram


Chapter 4 System Design 

The design of the system is all for the user's use. Although the user may only perform various operations on the browser during use, it does not mean that the system does not process the user's operations on the browser. Therefore, designing a The system needs to take all aspects into account.

4.1 Functional structure design

Figure 4.1 is the designed administrator function structure. The functions operated by the administrator authority include the management of logistics personnel, medical examiners, nurses, elderly people, room information, room occupancy information, feedback information, and message management.

Figure 4.1 Administrator function structure

Figure 4.2 is the designed functional structure of the logistics personnel. The functions of the logistics personnel’s permission operation include checking the room, checking the elderly staying in the room, checking the feedback information, checking the material application information, etc.

Figure 4.2 Functional structure of logistics personnel

Figure 4.3 is the designed functional structure of the nursing staff. The functions of the nursing staff’s permission operation include viewing the information of the elderly, viewing feedback information, viewing message information, viewing announcements, etc.

Figure 4.3 Nursing staff functional structure

Figure 4.4 is the designed functional structure of the medical examiner. The functions of the medical examiner's authority operation include viewing material application information, viewing information about the elderly, and checking room occupancy information.

Figure 4.4 Functional Structure of Medical Examiner

Figure 4.5 is the designed user function structure. The functions of user authority operation include managing messages, managing feedback information, managing material application information, and viewing elderly information.

Figure 4.5 User function structure

4.2 Database design

The data generated during the operation of the community smart elderly guardianship management platform needs to be stored according to the storage rules set in advance, and this storage rule is set in the design of the database. Usually, in order to better cooperate with the operation of the system and bring a good user experience to users, it is necessary to design a good database, because it can reduce the waiting time of users, and can also request the system in the shortest time. respond within time. Therefore, when designing the database, it takes a certain amount of time to analyze the system's requirements for data storage and the specific data stored, and then design specific storage rules to ensure that the database can respond to various data requests of the system in a timely manner and shorten data processing. time, and to a certain extent reduce data redundancy and save storage space.

4.2.1 Database concept design 

The entity-relationship diagram also has a name, the ER diagram, which is the abbreviation of the initials of the English words of the Entity Relationship Diagram. Its conceptual model is usually used to describe the real world. At the same time, it is also an effective means of visually expressing entities, relationships, and attributes in data. There are many tools that can be selected for drawing ER diagrams, but Office Visio is generally the preferred tool for drawing ER diagrams, because it is based on visual processing, and it is very simple to use it to create ER diagrams. Use basic ER diagram elements, such as ovals, rhombuses, rectangles, and solid line segments to express corresponding information. Ovals represent attributes, that is, characteristics of entities, rectangles represent entities, that is, a specific data table in the database, and diamonds represent entities. In the relationship between the two, the solid line segment is mainly to complete the connection of ellipse, rectangle, and rhombus. Based on this method, the complete drawing of the ER diagram of this system can be completed.

(1) Figure 4.4 shows the attribute values ​​owned by the administrator entity.

Figure 4.4 Administrator entity property diagram

(2) Figure 4.5 is the attribute value owned by the entity of feedback information.

Figure 4.5 Feedback information entity attribute diagram

(3) Figure 4.6 shows the attribute values ​​owned by the user entity.

Figure 4.6 User entity attribute graph

  1. Figure 4.7 shows the attribute values ​​of the message entity.

Figure 4.7 Message entity attribute diagram

  1. Figure 4.8 is the relationship existing in the entities introduced above.

Figure 4.8 ER diagram of relationship between entities

4. 2 .2 Database physical design

The main task of this section is to design the data storage structure based on the above content, that is, to design the data table that stores the data of the system in the database. When designing the data table, it is necessary to determine each field. Generally speaking, an entity and Corresponding to a data table, the attribute of the entity is used to represent the field name. The data type and value represented by different fields are different. Here, it needs to be set according to the actual data of the system, and it also needs to be determined in the specific table. Explain the primary key of the table and whether each field of the table can be kept empty. After designing the structure of a data table, it is also necessary to name it when saving it. Try to choose an English name to name and save it, so that it is convenient for the system to edit the data table in the future. When accessing data storage, while improving data storage efficiency, it is not easy to cause system errors. Next, the designed data table will be displayed.

Table 4.1 Room information table

field

note

type

null

id (primary key)

primary key

int(11)

no

fangjian_name

room number

varchar(200)

yes

fangjian_types

Room type

int(11)

yes

fangjian_number

remaining number of beds

int(11)

yes

create_time

creation time

timestamp

yes

Table 4.2 Room occupancy information form

field

note

type

null

id (primary key)

primary key

int(11)

no

fangjian_id

Room

int(11)

yes

laoren_id

elder

int(11)

yes

create_time

creation time

timestamp

yes

Table 4.3 Feedback Information Form

field

note

type

null

id (primary key)

primary key

int(11)

no

fankui_name

Feedback

varchar(200)

yes

fankui_types

feedback type

int(11)

yes

laoren_text

Feedback Details

text

yes

create_time

creation time

timestamp

yes

Table 4.4 Logistic staff list

field

note

type

null

id (primary key)

primary key

int(11)

no

username

account

varchar(200)

yes

password

password

varchar(200)

yes

houqinrenyuan_name

Support staff name

varchar(200)

yes

houqinrenyuan_photo

avatar

varchar(255)

yes

houqinrenyuan_phone

Support staff phone number

varchar(200)

yes

houqinrenyuan_id_number

Support staff ID number

varchar(200)

yes

houqinrenyuan_email

Mail

varchar(200)

yes

sex_types

gender

int(11)

yes

houqinrenyuan_delete

fake deletion

int(11)

yes

create_time

creation time

timestamp

yes

Table 4.5 Nursing Worker Form

field

note

type

null

id (primary key)

primary key

int(11)

no

username

account

varchar(200)

yes

password

password

varchar(200)

yes

buzz_name

nurse name

varchar(200)

yes

humong_photo

avatar

varchar(255)

yes

ringing_phone

Nursing mobile phone number

varchar(200)

yes

buzz_id_number

Nursing ID number

varchar(200)

yes

buzz_email

Mail

varchar(200)

yes

sex_types

gender

int(11)

yes

buzz_delete

fake deletion

int(11)

yes

create_time

creation time

timestamp

yes

Table 4.6 Information Form for the Elderly

field

note

type

null

id (primary key)

primary key

int(11)

no

laoren_name

old man name

varchar(200)

yes

sex_types

gender

int(11)

yes

laoren_age

old age

int(11)

yes

laoren_types

old man's physical condition

int(11)

yes

jibing_types

whether there is a disease

int(11)

yes

laoren_content

Elderly information details

text

yes

create_time

creation time

timestamp

yes

Table 4.7 Message form

field

note

type

null

id (primary key)

primary key

int(11)

no

yonghu_id

user

int(11)

yes

liuyan_name

Message title

varchar(200)

yes

liuyan_text

Message content

text

yes

reply_text

reply content

text

yes

insert_time

Message Time

timestamp

yes

update_time

Response Time

timestamp

yes

create_time

creation time

timestamp

yes

Table 4.8 Announcement table

field

note

type

null

id (primary key)

primary key

int(11)

no

news_name

bulletin title

varchar(200)

yes

news_types

announcement type

int(11)

yes

news_photo

Announcement image

varchar(200)

yes

insert_time

Announcement time

timestamp

yes

news_content

Announcement details

text

yes

create_time

creation time

timestamp

yes

Table 4.9 Physical Examiner Form

field

note

type

null

id (primary key)

primary key

int(11)

no

username

account

varchar(200)

yes

password

password

varchar(200)

yes

tijianyuan_name

Examiner's name

varchar(200)

yes

tijianyuan_photo

avatar

varchar(255)

yes

tijianyuan_phone

Medical examiner's mobile phone number

varchar(200)

yes

tijianyuan_id_number

Medical examiner's ID number

varchar(200)

yes

tijianyuan_email

邮箱

varchar(200)

sex_types

性别

int(11)

tijianyuan_delete

假删

int(11)

create_time

创建时间

timestamp

表4.10 管理员表

字段

注释

类型

id (主键)

主键

bigint(20)

username

用户名

varchar(100)

password

密码

varchar(100)

role

角色

varchar(100)

addtime

新增时间

timestamp

表4.11 物资申请表

字段

注释

类型

id (主键)

主键

int(11)

yonghu_id

用户

int(11)

laoren_id

老人

int(11)

wuzi_name

物资名称

varchar(200)

wuzi_types

物资类型

int(11)

wuzi_number

数量

int(11)

wuzi_danwei

单位

varchar(200)

wuzi_photo

发票上传

varchar(200)

create_time

创建时间

timestamp

表4.12 用户表

字段

注释

类型

id (主键)

主键

int(11)

username

账户

varchar(200)

password

密码

varchar(200)

yonghu_name

用户姓名

varchar(200)

yonghu_photo

头像

varchar(255)

yonghu_phone

用户手机号

varchar(200)

yonghu_id_number

用户身份证号

varchar(200)

yonghu_email

邮箱

varchar(200)

sex_types

性别

int(11)

yonghu_delete

假删

int(11)

create_time

创建时间

timestamp


5 系统实现

编程人员在搭建的开发环境中,运用编程技术实现本系统设计的各个操作权限的功能。在本节中,就展示部分操作权限的功能与界面。

5.1 管理员功能实现

5.1.1 房间信息管理

图5.1 即为编码实现的房间信息管理界面,管理员在该界面中具备新增,删除,查询,编辑房间信息的权限。

图5.1 房间信息管理界面

5.1.2 房间入住管理

图5.2 即为编码实现的房间入住管理界面,管理员在该界面中为老人入住房间的信息进行新增,查询,编辑,删除等。

图5.2 房间入住管理界面

5.1.3 老人信息管理

图5.3 即为编码实现的老人信息管理界面,管理员在该界面中对老人的信息进行新增,包括老人身体状态,老人年纪等信息,可以修改老人信息,查询老人信息等。

图5.3 老人信息管理界面

5.2 后勤人员功能实现

5.2.1 反馈信息查看

图5.4 即为编码实现的反馈信息查看界面,后勤人员在该界面中查询用户的反馈信息,查看反馈信息等。

图5.4 反馈信息查看界面

5.2.2 物资申请查看

图5.5 即为编码实现的物资申请查看界面,后勤人员在该界面中对物资申请信息进行查询,查看。物资申请信息是用户提交的信息。

图5.5 物资申请查看界面

5.3 护工功能实现

5.3.1 房间入住查看

图5.6 即为编码实现的房间入住查看界面,护工在该界面中负责查询和查看入住房间的老人信息。

图5.6 房间入住查看界面

5.3.2 留言查看

图5.7 即为编码实现的留言查看界面,护工在该界面中查看用户的留言内容。查询用户的留言。

图5.7 留言查看界面

5.4 体检员功能实现

5.4.1 老人信息查看

图5.8 即为编码实现的老人信息查看界面,体检员在该界面中查询老人信息,对老人信息进行查看,包括老人身体状态,是否有疾病等。

图5.8 老人信息查看界面

5.4.2 公告查看

图5.9 即为编码实现的公告查看界面,体检员在该界面中查询公告,查看公告,公告是管理员发布的信息。

图5.9 公告查看界面

5.5 用户功能实现

5.5.1 留言管理

图5.10 即为编码实现的留言管理界面,用户在该界面中新增留言,对发布的留言信息的相关管理员回复信息进行查看。

图5.10 留言管理界面

5.5.2 物资申请管理

图5.11 即为编码实现的物资申请管理界面,用户在该界面中新增物资申请信息,对发布的物资申请信息进行查询,更改,删除等。

图5.11 物资申请管理界面


6章 系统测试

当系统测试环节开始的时候,也就说明对于系统的编码已经弄得大致通顺了,剩下来需要对一些模块和功能进行测试,这个环节就叫系统测试。在程序开发过程中,系统测试是整个开发过程必不可少的一个环节。原因很简单,系统开发人员在面对各种需求需要对各个模块进行编码,开发人员编写过程中,对于程序的理解全部都在编码里面,一人计短,当一个人去做一些事情的时候,把自己的理解变成成果,很有可能会出现理解偏差,甚至是理解错误,这个在程序开发过程中很常见。程序开发人员在面对复杂的逻辑,没有想象中的多么清晰,开发过程就是面对着一堆代码,不断的变换数据类型,并且对各种操作用计算机编程语言进行实现,这些很容易实现程序开发人员的想法,但是如果是比较复杂的逻辑,很可能会出现各种问题,这是无法避免的。所以说,需要额外的人员进行系统测试编写,不要站在程序开发人员的角度去思考问题,要站在用户使用的角度去发现问题,这样开发与测试的分离,有助于系统开发的强壮,让程序表达的更完美一些。之所以把系统测试安排到程序开发过程中的原因在于,当测试发现问题,就可以直接反馈到程序开发人员手里,可以以最快的时间解决问题,这样能大大的提高开发效率。总的来说,在整个软件开发过程中,系统测试这个环节也必须要重视的,所以必须在系统测试环节做好应该做好的事情,让程序开发从开始到结束都有一个完美的流程。

6.1 功能测试

本节主要选择一些功能进行具体测试描述,在相应的功能里面,根据不同的合法与不合法条件输入看程序是否设定的有相关的判断,能否达到使用效果。以下会描述部分功能的测试过程和结果。

6.1.1 登录功能测试

登录是一个常规功能,虽然是常规功能,但是用处很大,可以拒绝非法用户访问,只有合法用户才可以访问对应的功能,这样能保证程序设定的功能符合安全性要求。

表6.1 管理员登录功能测试表

管理员账号

管理员密码

结果

uuu

uuu

成功登录系统

yyy

uuu

登录失败

uuu

yyy

登录失败

只有正确的账号密码才会进行跳转到对应的功能区,如果输入的账号密码不对的话,肯定会有相关提示,用来提示操作人员注意输入正确的账号密码,这样有助于提高用户体验。这里以使用者提交错误的账号为“yyy”,正确的密码为“uuu”为例进行测试,具体反馈结果看下面。

图6.1 登录失败提示

6.1.2 修改密码功能测试

任何用户角色都有安全性要求,那么对应的密码最好是经常更改,只有经常更改才会降低坏人的有机可乘几率,达到密码保护的最低要求,当然,如果用户登录人离开了,为了防止其他人乘机篡改密码,那么也会设定旧密码要求,只有输入正确的旧密码才可以进行密码的修改。下面就是测试过程。

表6.2 修改密码功能测试表

之前的旧密码

设置的新密码

结果

uuu

yyy

成功修改密码

hhh

yyy

修改密码失败

uuu

修改密码失败

不管是旧密码错误还是新密码不合规,都会提示相应的要求,下面就是关于旧密码输入错误的提示。

图6.2 错误的旧密码反馈提示

6.2 系统测试结果

对社区智慧养老监护管理平台进行了各种检测,包含功能检测和性能检测,甚至是系统的操作性方面也进行了检测,以及兼容性检测,通过各方面检测结果来判定系统是符合设计目标,达到开发预期。系统是可以实现所开发的功能,并且在扩展性或者是稳定性上面,也有很好的表现,能完全的满足用户需求。


结  论

由于本人学习的是计算机方面的专业,对于计算机软件方面的相关知识也进行过课堂上的学习以及课后的实际操作练习,因此,对于开发一款已经确定了课题的社区智慧养老监护管理平台,从功能需求,功能模块划分,数据库的选择,数据库的设计,编程语言的确定,系统界面的布局和设计等知识,我都有个大致的思路。所以,在参照软件设计思想以及设计流程的基础上,我运用已经具备的理论知识,加上后期从网络渠道获取的相关技术知识,我能够根据制定的系统开发时间安排完成各个阶段性的开发任务。并能够在系统完成开发后期,编写相应的系统文档。

社区智慧养老监护管理平台制作期间,我也遇到过一些难题,在最开始的时候,我并不知道该系统具体要设计几个功能模块,以及数据表需要设计几张表,还有对于开发技术的深度理论学习还不充分等,值得庆幸的是,我在面临这些困难时,我能够通过网络或者通过学院提供的图书馆寻求解决办法。比如在不知道具体功能的情况下,我从网上下载了很多的与社区智慧养老监护管理平台相关的程序,分析了它们的功能之后,我再结合即将开发的社区智慧养老监护管理平台进行综合分析,选取了适合社区智慧养老监护管理平台的功能部分,再结合实际情况以及使用者的需求确定本系统功能。对于数据表的设计,我先是在图书馆借阅了一本数据库方面的书籍进行查看,然后查看相似系统对于数据表的结构设计等知识,然后在本系统功能确定的情况下,结合本系统设计了配套的数据表,对于难度最大的开发技术部分,我花费了很多的时间研究网络上的相似系统的功能模块上的代码,一般都是对基础数据的增加,更新,查询或修改方面的代码,然后把本系统能够运用的代码部分在简单更改后进行使用,在完成了一个功能模块以及又一个功能模块之后,又经过了简单的测试工作,最终呈现出一个完整的能够解决用户实际问题的社区智慧养老监护管理平台。该系统唯一不足的就是代码方面还有很多重复的部分,不够精简,还有用户操作本系统,对于用户的误操作行为,本系统还不能及时反馈,这也是一大缺点。

社区智慧养老监护管理平台完成了,其相应的配套文档也需要进行编写,该文档主要描述社区智慧养老监护管理平台是如何进行分析,设计以及实现的,让其他阅读本文档的人增加对该系统的了解,编写文档过程中,由于自己平时对于办公软件的操作不是很频繁,根据学院要求的文档排版格式进行编辑也花了很多时间,在不断学习排版技巧以及对本系统配套文档的反复修改之后,最终在学院规定的时间内进行了文档定稿。

毕业项目各个工作进行到此,我也是收获颇丰,正因为自己努力学习知识,积极寻求解决办法,才让我能够提交一个完整的作品。制作毕业项目让我又得到了成长,不仅是专业知识的增加,也包括解决问题的能力得到了提高,很感谢学院给的制作毕业项目的机会。


参考文献

[1]马莹莹.“互联网+”社区养老管理系统设计[J].物联网技术,2018,8(03):99-100.

[2]赵瑾,李颖.社区智能养老系统研究[J].中国商论,2017,(13):131+140.

[3]余涛.计算机软件开发中Java编程语言的应用研究[J].信息记录材料,2020,21(01):113-115.

[4]王子虎,胡丽珍.基于计算机软件安全开发的JAVA编程语言研究[J].数字技术与应用,2019,37(12):133-134.

[5]刘星淇.Java编程语言的特点与应用分析[J].通讯世界,2019,26(09):149-150.

[6]张云健.计算机软件Java编程特点及其技术应用[J].信息与电脑(理论版),2019(13):97-98.

[7]张振超,吴杰,陈序蓬.浅谈Java中Mysql数据库的连接与操作[J].信息记录材料,2020,21(02):144-145.

[8]范开勇,陈宇收.MySQL数据库性能优化研究[J].中国新通信,2019,21(01):57.

[9]丁佳.基于JSP+MySQL的用户登录系统SQL注入实例及防范[J].网络安全技术与应用,2020(09):49-51.

[10]王丹,孙晓宇,杨路斌,高胜严.基于SpringBoot的软件统计分析系统设计与实现[J].软件工程,2019,22(03):40-42.

[11]张峰.应用SpringBoot改变web应用开发模式[J].科技创新与应用,2017(23):193-194.

[12]谢志坚.计算机应用软件开发技术支撑思考[J].电子世界,2020(15):53-54.

[13]姬晓鹏.计算机软件开发技术与设计探究[J].电子测试,2020(16):133-134.

[14]Raffi Khatchadourian.Automated refactoring of legacy Java software to enumerated types[J].Automated Software Engineering,2017,24(4).

[15]Ben White.Marx and Chayanov at the margins:understanding agrarian change in Java[J].The Journal of Peasant Studies,2018,45(5-6).


  

也许是大学校园在管理上比较开放,学习知识时不像高中时期那样一整天都在学习,而是一天当中抽出部分时间安排学习,其余的时间就可以自由安排,可以去社会上参加实践,可以在学校的图书馆阅读书籍,丰富自己的知识,也可以加入学校的社团进行个人能力的锻炼等等,加上学院的学生都来自全国各地,大家的风俗习惯都有些不一样,这样同学之间也有更多的话题进行畅聊。基于这些原因,我觉得我的性格也逐渐变得开朗起来,正因为如此,我很快乐的度过了大学四年时光。然而,我们都要面临毕业,同学间,师生间也将面临分离,我们都会离开学校,进入社会这样的大环境学习并生活。虽然很不舍,但这也是人生成长中必经的阶段!

临走之际,对这几年的大学生活简单的进行了回想,发现自己学到的专业知识也增加了很多,在本专业上,自己也得到了一定的实操能力锻炼。这些成长都是我们的专业老师带来的,他们这几年辛苦教学,我们也从中获取了许多的专业知识,提高了个人的专业方面的能力,非常感谢他们。

还有一位老师也需要在此特别感谢,即论文指导老师。可以说最后这一年,跟指导老师接触比较多,指导老师在本专业上,非常全能,在我进行本课题的任务期间,导师给予我全面的指导,也能根据我的不足之处推荐合适的书籍让我查看,让我的能力得以提升,继而可以从容面对开发期间遇到的困难。

另外,我也要感谢我的寝室室友,还有我们班上的同学,从接到毕业项目任务之后,我们常常谈论各自课题进展的情况以及面临的问题,也经常互相鼓励对方要积极认真面对毕业项目,这种陪伴,让我在制作毕业项目期间并没有产生过多的焦虑,非常感谢他们。

最后时刻,我也要对我的大学校园表达谢意,我的大学校园是一个非常美丽的地方,而我这几年,在这么优美的环境下学习知识,我已经感到非常幸福。希望在今后能看到我的校园在众多师生共同努力下变得强大,校园的环境也将变得更加美丽。

Guess you like

Origin blog.csdn.net/licongzhuo/article/details/131361558