[Computer Graduation Project] 174 Comprehensive Disease Prevention and Control System

1. Screenshots of the system (if you need a demo video, you can chat privately)

     

  summary

In today's society, regarding the processing of information, no enterprise or individual will ignore how to quickly transmit information, and archive, store and query. The previous paper recording mode is no longer in line with the current use requirements. Therefore, in order to improve the management of disease prevention and control information, and in order to better maintain the information of disease prevention and control, the emergence of an integrated disease prevention and control system has become a matter of course and indispensable. Through the development of the comprehensive system of disease prevention and control, not only can you apply what you have learned, so that the learned knowledge can be turned into results, but also strengthen the knowledge memory and expand the knowledge reserve, which is a good way to improve yourself. Through specific development, I have a good grasp of the entire software development process, whether it is the early design or the subsequent coding test, I have a deep understanding.

The comprehensive disease prevention and control system is developed through the MySQL database and the Spring Boot framework. The comprehensive disease prevention and control system can realize access record management, punch card management, vaccination record management, nucleic acid detection management, community epidemic management, material application management, material management and other functions.

Through the processing of relevant information by the comprehensive disease prevention and control system, information processing becomes more systematic and more standardized. This is an inevitable result. The processed information, whether it is used for search or analysis, will double the efficiency, making the computer more suitable for production needs, becoming an indispensable information processing tool for people, and realizing green office. Save social resources and contribute to environmental protection as much as possible.

Keywords : comprehensive disease prevention and control system, vaccination records, nucleic acid testing, material application


  directory

Chapter One Introduction

1.1 Background of topic selection

1.2 Significance of topic selection

1.3 Research content

Chapter 2 Development Environment

2.1 Java language

2.2 MYSQL database

2.3 Eclipse development tools

2.4 Spring Boot framework

Chapter 3 System Analysis

3.1 Feasibility analysis

3.1.1 Technical Feasibility

3.1.2 Operation Feasibility

3.1.3 Economic feasibility

3.2 System flow analysis

3.3 System performance analysis

3.3.1 System Security

3.3.2 Data Integrity

3.3.3 System scalability

3.4 System function analysis

Chapter 4 System Design

4.1 System Design Objectives

4.2 Functional structure design

4.3 Database design

4.3.1 Database conceptual design

4.3.2 Database physical design

Chapter 5 System Implementation

5.1 Administrator function realization

5.1.1 Nucleic acid testing management

5.1.2 Vaccination record management

5.1.3 Materials Management

5.1.4 Material application management

5.1.5 Access record management

5.2 User function realization

5.2.1 Punch management

5.2.2 View vaccination records

5.2.3 Check the announcement information

5.2.4 Community Epidemic Situation

Chapter 6 System Test

6.1 Features of system testing

6.2 System function test

6.2.1 User login test

6.2.2 Access record query test

6.3 System Test Results

in conclusion

thanks

references

Chapter 1  Introduction

1.1  Background of topic selection

At present, the speed of the development of the whole society is heavily dependent on the Internet. Without the existence of the Internet, the market may collapse, seriously affecting the level of economic development and affecting people's quality of life. The development of computers, whether it is hardware or software, has a lot of technical reserves, and many technologies and software are produced every year. Looking at various fields, all of them use Internet software. Most of them are used for office work, but everyone has a smart phone. Equipment has become a part of people's daily life, and even ordinary people have become the place to know astronomy and geography, all of which rely on Internet technology. Internet technology is huge in the dissemination of information, and the processing of information has become a heavy responsibility for various industry managers and maintainers. People have become accustomed to the existence of the Internet, so frequent operation of some Internet products has become a daily routine, so it is not a problem to develop a comprehensive disease prevention and control system for people to use, and in the process, it can not only standardize the management of disease prevention and control information The use process and information processing process can also make the entire information dissemination and processing within a controllable range. Most importantly, computers can provide managers with better assistance in disease prevention and control information management.

1.2 Significance of topic selection

When developing software has become a trend, you will find that no matter what industry you are in, you can develop software that suits you. Whether it is internal employee management, financial management, or even business management, it can be digitized, and these data can be processed centrally, and then According to the results of data processing, the management level is naturally improved. The most important thing is to develop a software and put it into use. The development process is actually a process of sorting out the pain points of the industry. It is to let the software make up for the management loopholes of the industry and continuously optimize the processing flow of things. . The comprehensive disease prevention and control system is a specially developed software. Through Web technology, users can operate and use any smart device through a browser. The processing of data is not limited to geographical distance. As long as the software is developed in place, It is easy to use and achieve the expected purpose. You will find that there is a big difference between software and no software. After you have this software, you will find that the data storage security is more advantageous than the previous search for records. huge.

1.3 Research content

This paper will describe the system from the perspectives of analysis, design, implementation and testing.

Introduction: Introduce the background and significance of the development of this system;

Development environment: introduce the configuration environment and development technology of this system;

System analysis: introduce the function, performance and feasibility of the system;

System Design: Introduce the design of the database and functional structure of the system;

System realization: Introduce the realization interface and functions of this system;

System test: introduce the functional test and test results of the system;


Chapter 2 Development Environment

The development of this system needs to configure the development environment. In addition to requiring the developer to install the corresponding software, it is also necessary to understand and master the technologies used in the development.

2.1 Java language

The Java language is one of the most popular languages ​​at present. It can not only be used as a program in the form of a desktop window, but also as a program accessed by a browser. At present, the most popular one is to use the Java language as the basis for background processing of various programs. The Java language is a language for manipulating variables, and variables are Java's definition of the existence of data. Variables are used to operate memory, and memory involves computer security issues. In this way, the Java language is immune to directly targeting the data developed in the Java language. The virus of the program effectively improves the survivability of the program developed by the Java language. Java is a language with dynamic running capabilities. Java classes can not only use the basic classes provided by the Java core, but also can be rewritten. This will make Java's functions more abundant, and even write some functional modules for encapsulation. , and then if other projects need to use these reusable functions, they can directly reference them, and then call the method where they are used. Java is an open source language, which can trace various classes and reference methods in Java, and even decompile the compiled language, which not only improves the efficiency of learning, but also can learn from other practitioners. Elegant programming. The Java language has developed to the present and has taken root in various industries. There are many industries that learning Java can engage in, and there are many ways to learn. There are many free tutorials on the Internet, and even some advanced knowledge can be learned only by paying, not like At the beginning of the Java language, every programmer needed to use Notepad for manual coding. Now there are many integrated development environments to help Java practitioners. Choosing the Java language for programming is a good way to solve problems.

2.2 MYSQL database

Generally, if a person who studies program development studies databases, he must learn MySQL databases. After so many years of continuous development, the community version of MySQL databases is free. Developers can learn without changing to a more advanced computer. Learning is just one aspect. The most important thing is that MySQL has the largest market share in the world. Basically, seven or eight out of ten companies use MySQL databases. The advantages of MySQL are not just so superficial. MySQL is first of all open source, as long as it is not commercial, it does not cost money, and large data is also supported. As long as it is an operating system that exists on the market, MySQL can have a corresponding version for use. Because MySQL is open source, if you have special needs for MySQL, you can even modify the source code yourself to meet your own use. The MySQL database has many benefits, the most important point is that it meets the development requirements of this design. It can be said that this design only uses some basic functions of MySQL, and this basic function is completely sufficient. There are many online tutorials for MySQL learning. Many tutorials about getting started can completely reach the development level of ordinary programmers. You only need to learn the basic knowledge, and you only need to write different statements according to different business logics in the company.

2.3 Eclipse development tools

Eclipse is open source and free. Just understanding it in this way may give people a feeling that there are no good products for free, but it is not the case. Eclipse is a development tool for developing source code, which is very safe because it is open source. If it is harmful to the user's computer, the reason can be found, so there is no need to worry about this aspect of security. Eclipse does not need to be installed, so there is no need to increase the pressure on the system disk. It can be placed on any disk, opened when in use, and closed when not in use. It will not run secretly in the background and does not need to increase the burden on the registry. It can only be started by relying on the Java JDK, which effectively avoids some virus intrusions. If the virus intrusion changes the source code, it cannot run. You can only delete the folder and decompress a new Eclipse. It is very safe to use. . Eclipse has developed to the present and can support other development languages. The family is becoming more and more powerful, with more and more functions. The most important thing is that there is no charge. This allows novice developers to save a lot of money to cultivate their own Learning, instead of spending money to buy development software only to find that you are not suitable for development, the forever free strategy can always give people the opportunity to want to use it. The most important thing is that Eclipse is not free because its functions are not enough. On the contrary, it is not only powerful, but also fully meets the development requirements of this design, so Eclipse is selected as the development tool.

2.4 Spring Boot framework

Spring Boot is suitable for beginners, and it is also suitable for learning from previous Spring framework developers. It is very convenient to learn. Whether it is a pure English tutorial or a Chinese tutorial, there are many learning materials at home and abroad. Spring Boot can run all Spring projects for seamless switching. The built-in Servlet container can run without packaging the code into a WAR. With its own application monitoring, it can monitor the running project in real time when it is running, and can find the problem at any time and locate the problem, allowing the programmer to modify the problem in time.


Chapter 3 System Analysis

At this stage, it is necessary to rely on a large amount of data as the basic data for researching the system. In addition to analyzing the feasible problems of system development, it is also necessary to determine the function of the system by investigating the needs of the target population targeted by the system, and to determine the performance of the system. for further analysis.

3.1 Feasibility analysis

Before the development of the project, there must be a feasibility analysis report, which is analyzed from the perspective of technology, economy, and operation. Feasibility analysis is a necessary step to realize scientific development.

3.1.1 Technical Feasibility

From a technical point of view, the currently developed technology can fully meet the needs of system development. There are ready-made software development tools and development techniques on the market at present, which can ensure the smooth progress of system development.

3.1.2 Operation Feasibility

The comprehensive disease prevention and control system is designed according to the page operation process that users often use, and the page is guaranteed to be unified, and it can meet the use requirements from the perspective of vision and operation.

3.1.3 Economic feasibility

In this development process, because the development environment needs to be configured through a computer, through technical analysis, it is found that the computer currently in use can meet the development needs, and it does not need too much money to replace the computer. Therefore, from an economic point of view, it can meet the development requirements.

The analysis and demonstration from the above three angles proves that the comprehensive system for disease prevention and control can be developed and used normally.

3.2 System flow analysis

From the analysis of the role of the system, each user role represents a different account identity, and different identities represent similarities and differences in functions, so it is first necessary to distinguish the role identity of the user. To set user login, you need to enter the account number and password. The entered information must be compared with the account password information that already exists in the database. Only the correct account number and password can perform the next page display operation. If the account password is incorrect, then Denying a user to log in also means that the user has no permission to continue accessing, and the system cannot continue to provide services.

Figure 3-1 Operation flow chart

Any system has an operation process. In this design, there are certain legal requirements for the storage of any data. Only data that meets the set requirements can be stored. Refer to the figure below for specific steps.

Figure 3-2 Flowchart of adding information

The storage of data is not static. When it is necessary to change the existing data, it also follows the operation process. If you want to change the data, you must first determine what the data before the change is, and then enter whether the new data is legal. In line with the process, only legal data can be updated and stored in the database. Refer to the figure below for specific steps.

Figure 3-3 Modify information flow chart

Deletion operation is a more cautious event in terms of data storage, and it is very likely that misoperations will occur. Therefore, it is generally necessary to prompt whether to delete during the delete operation. Only after confirming the deletion will the database content be updated to achieve the purpose of deletion. Refer to the figure below for specific steps.

Figure 3-4 Flow chart of deleting information

3.3 System performance analysis

During the use of the system, users will enjoy the convenience brought by the system. So how to keep using the system for a long time without messy problems, and make using the system a kind of operational enjoyment and convenience in use, this is the problem that needs to be considered. The following is mainly described from the performance analysis of the system, from the aspects of data integrity and data security, including the scalability of the system.

3.3.1 System Security

The difference between a registered user and a tourist user is whether there is an account or not. If there is an account, then there is a relevant registered user authority. If there is an account, there is a password. The password is the premise to ensure the security of the account. Tourists can only browse some public information. If you need to log in to view the information, you also need to log in with your account. For system security, the main consideration is the password encryption of the role, which can prevent the cracking work after the effective password data is intercepted. Generally, if there are security requirements for passwords, encrypted storage can be considered. There are roughly two design methods for encrypted storage of passwords. One is to use Java Script to encrypt MD5 after the password is submitted at the front desk, and then submit the ciphertext directly. The advantage of this is the security of ciphertext transmission. The other is to submit the password Finally, the password is encrypted or decrypted during background processing, which will increase the background processing burden. Generally, it is considered in the middle. If you log in, the password will be encrypted in the background and compared with the database password. The currently commonly used encryption method is MD5 encryption method.

3.3.2 Data Integrity

The most important purpose of system development is data processing. Computers are good at data storage and processing, so the integrity of data must be guaranteed, otherwise the existence of the system is unnecessary. Whether the data is designed or stored, it must be complete. From the input of the data, the legality of the data is guaranteed from all aspects. The illegal data cannot be submitted directly. The data processing logic will also ensure that the data is processed normally, and then the data is stored, and it will also ensure that the data design is reasonable, all of which have data setting requirements. At present, the relational database is used for data storage. The relational database has a history of many years and is powerful. Migration backup and unattended backup can be automatically backed up.

3.3.3 System scalability

It is necessary for the system to be scalable. At the beginning of the design, it is necessary to consider the possible business, so the design of the system must be modularized. When expansion is required, it is only necessary to add the corresponding modules and debug the corresponding logic. The improvement of system scalability will increase the unnecessary workload of the system and make the program design more in line with the specification.

3.4 System function analysis

In terms of functional analysis, the system is mainly analyzed from the perspective of the target user group. In order to facilitate the display of the analysis results, the use case diagram is used here for functional display.

The drawing result of the administrator use case diagram is shown in Figure 3-5. The administrator can log in and enter the system to operate functions including management of check-in information, management of nucleic acid testing, management of vaccination records, management of materials, review of material applications, management of access records, management of community epidemics, etc.

Figure 3-5 Administrator use case diagram

The drawing results of the user use case diagram are shown in Figure 3-6. The functions for users to log in and enter the system include viewing access records, nucleic acid testing, vaccination records, managing punch cards, and applying for supplies, etc.

Figure 3-6 User use case diagram


Chapter 4 System Design

So far, there are various software systems on the market. Starting from the classification of the systems, the main application areas tend to be office systems, entertainment systems, and social systems, and then there are many smaller branch systems below. Many systems have passed the test of the market, and various design methods such as business modularization and programmer reduction of code have begun to appear for different business scenarios. So far, when designing a system, first of all, you can basically find similar templates on the Internet according to the business model, and then analyze it according to the specific business, and then realize the specific functions. The public one is the best, after all, it conforms to the mainstream of the market. It means that it must meet the normal operating procedures.

4.1 System Design Objectives

When the system is designed, it is necessary to formulate the goals that need to be achieved. In terms of function, it must strictly meet the design requirements, not only to reduce operation steps, but also to meet expectations. Therefore, to design a system that meets the requirements of the project in today's standardized world, the goals set below must be achieved.

The first goal is friendliness: friendliness is mainly reflected in the process of user use, which will not cause dissatisfaction with the operation of the system and reduce the anger of the operator, which is a very important manifestation. In the past few years, a lot of software lost the market in terms of friendliness because they did not do a good job in terms of friendliness. In the early days of domestic Internet development, the purpose of software design is to be able to use it. As for the comparison of friendliness, it does not exist, because the hardware efficiency is relatively low, and the computer is an emerging industry, so the elder brother is unfriendly regardless of the second brother. With the improvement of computer hardware, many developers have begun to notice the need to sacrifice certain computer performance to improve friendliness, because the computer has developed to the present, and the first impression is very important. A software design that is not good-looking will make most people think about it. It creates doubts, so a lot of effort has to be made to refine the friendliness.

The second goal is security: security actually runs through the development history of the entire software industry. Computers were born to solve human repetitive calculations and data storage. Many industries need computers to perform calculations to reduce the chance of errors. And the data is retained and can be queried in real time, so data security is also very important.

As long as the premise of data security is guaranteed and a friendly interface operation that meets the functional requirements is developed, then the purpose of system design is achieved.

4.2 Functional structure design

This system is mainly based on data addition, modification, deletion and other operations. Users can enter the designated operation area through the login function set in advance. Here, the user-designed functions are displayed in structure.

The drawing result of the administrator function structure diagram is shown in Figure 4-1. The administrator can log in and enter the system to operate functions including management of check-in information, management of nucleic acid testing, management of vaccination records, management of materials, review of material applications, management of access records, management of community epidemics, etc.

Figure 4-1 Administrator function structure diagram

The result of drawing the user function structure diagram is shown in Figure 4-2. The functions for users to log in and enter the system include viewing access records, nucleic acid testing, vaccination records, managing punch cards, and applying for supplies, etc.

Figure 4-2 User function structure diagram

4.3 Database design

If it is important to design the function of the system, then designing the database of the system will be even more important. After all, the system serves the user, the database serves the system, the user accesses the system, and all data of the operating system depends on the database, and the data of the system is almost All are stored in the database, so a high-quality program must have a safe, fast response, stable and reliable database. The MySQL database of this system can realize the management of system data through SQL language, including inserting data in the specified table, changing data in the specified table, and deleting part of the data in the specified table. Generally speaking, relational databases like MySQL can support the structured query language SQL very well. In programming, it is very convenient and quick to operate various data in the database by using the SQL language reasonably!

4.3.1 Database conceptual design

The content of this section mainly uses graphics to describe the entities in the database, the corresponding attributes of each entity, and the interrelationships between entities. The commonly used Visio tools can meet the needs of drawing ER diagrams. The ER diagram is composed of graphic elements such as rectangles, ellipses, and rhombuses. The name of the entity is mainly written in the rectangle box, the attributes of the entity are registered in the oval box, and the contact names between entities are registered in the diamond box. Finally, use The solid line segments connect these graphic elements to complete the drawing of the ER diagram. When an ER diagram is preliminarily obtained, it needs to be inspected, modified by analysis, and reconstructed to achieve the purpose of eliminating data redundancy or eliminating redundant links between entities. Thereby maintaining the integrity of the database and reducing the difficulty of database maintenance.

(1) Use a commonly used entity attribute diagram drawing tool such as Visio to draw a check-in entity attribute diagram, and the drawing result is shown in Figure 4-3.

Figure 4-3 Punch card entity attribute diagram

(2) Use commonly used entity attribute map drawing tools such as Visio to draw the entity attribute map of vaccination records, and the drawing results are shown in Figure 4-4.

Figure 4-4 Inoculation record entity attribute diagram

(3) Use commonly used entity attribute diagram drawing tools such as Visio to draw material entity attribute diagrams, and the drawing results are shown in Figure 4-5.

Figure 4-5 Material entity attribute map

(4) Use commonly used entity attribute diagram drawing tools such as Visio to draw user entity attribute diagrams, and the drawing results are shown in Figure 4-6.

Figure 4-6 User entity attribute diagram

(5) The connections between the drawn entities above are shown in Figure 4-7.

Figure 4-7 ER diagram of the relationship between entities

4.3.2 Database physical design

The data of this system are recorded and saved through various two-dimensional tables in the database. It is also important to design such two-dimensional tables in the database, because it affects the storage efficiency of data. Before designing a two-dimensional table, that is, a relational model, some common concepts about two-dimensional tables need to be fully understood.

Relationship: A specific data table represents the relationship, and the name of the relationship is consistent with the name of the data table;

Tuple: In the data table, the data displayed in each row represents a tuple;

Attribute: In the data table, the data represented by each column represents the attribute;

Keyword: In the data table, in order to distinguish it from other data tables, it is necessary to set the primary key in each table;

Through the content of the previous section, you can know each entity in the database, and convert the content represented by these entities into a data table in a certain way. Generally speaking, each entity will correspond to a specific data table, which is specified in the system. Create a named database in the database, and then you can create and design the data table. The data table design results of the comprehensive system for disease prevention and control are shown as follows:

Table 4-1 Entry and exit record form

field

note

type

null

id (primary key)

primary key

int(11)

no

yonghu_id

user

int(11)

yes

churujilu_types

type

int(11)

yes

churujilu_photo

health code

varchar(200)

yes

churujilu_content

Remark

text

yes

churu_time

Access time

timestamp

yes

insert_time

add time

timestamp

yes

create_time

creation time

timestamp

yes

Table 4-2 Check-in table

field

note

type

null

id (primary key)

primary key

int(11)

no

yonghu_id

user

int(11)

yes

daka_photo

Punch photo

varchar(200)

yes

daka_content

Punch Remarks

text

yes

insert_time

Punch date

date

yes

create_time

creation time

timestamp

yes

Table 4-3 Announcement Information Form

field

note

type

null

id (primary key)

primary key

int(11)

no

gonggao_name

Bulletin name

varchar(200)

yes

gonggao_photo

Announcement image

varchar(200)

yes

gonggao_types

announcement type

int(11)

no

insert_time

Announcement release time

timestamp

yes

gonggao_content

Announcement details

text

yes

create_time

creation time

timestamp

yes

Table 4-4 Nucleic acid detection table

field

note

type

null

id (primary key)

primary key

int(11)

no

yonghu_id

user

int(11)

yes

jiance_time

detection time

timestamp

yes

jiance_types

Test results

int(11)

no

hesuanjiance_content

Remark

text

yes

insert_time

add time

timestamp

yes

create_time

creation time

timestamp

yes

Table 4-5 Vaccination Record Form

field

note

type

null

id (primary key)

primary key

int(11)

no

yonghu_id

user

int(11)

yes

jiezhongjilu_uuid_number

Vaccination number

varchar(200)

yes

jiezhong_time

Inoculation time

timestamp

yes

jiezhong_types

vaccination type

int(11)

no

jiezhongjilu_content

Remark

text

yes

insert_time

add time

timestamp

yes

create_time

creation time

timestamp

yes

Table 4-6 Community Epidemic Situation

field

note

type

null

id (primary key)

primary key

int(11)

no

yonghu_id

user

int(11)

yes

shequyiqing_name

title

varchar(200)

yes

gonggao_photo

photo

varchar(200)

yes

shequyiqing_content

content

text

yes

insert_time

release time

timestamp

yes

create_time

creation time

timestamp

yes

Table 4-7 Administrator table

field

note

type

null

id (primary key)

primary key

bigint(20)

username

用户名

varchar(100)

password

密码

varchar(100)

role

角色

varchar(100)

addtime

新增时间

timestamp

表4-8 物资表

字段

注释

类型

id (主键)

主键

int(11)

wuzi_name

物资名称

varchar(200)

wuzi_danwei

单位

varchar(200)

wuzi_photo

物资照片

varchar(200)

wuzi_types

物资类型

int(11)

wuzi_kucun_number

物资库存

int(11)

wuzi_delete

逻辑删除

int(11)

wuzi_content

物资介绍

text

create_time

创建时间

timestamp

表4-9 物资申请

字段

注释

类型

id (主键)

主键

int(11)

wuzi_id

物资

int(11)

yonghu_id

用户

int(11)

wuzishenqing_number

申请数量

int(11)

wuzishenqing_content

申请理由

text

wuzishenqing_paifa_types

派发地点

int(11)

insert_time

申请时间

timestamp

wuzishenqing_yesno_types

审核状态

int(11)

wuzishenqing_yesno_text

回复意见

text

update_time

审核时间

timestamp

create_time

创建时间

timestamp

表4-10 用户表

字段

注释

类型

id (主键)

主键

int(11)

username

账户

varchar(200)

password

密码

varchar(200)

yonghu_name

用户姓名

varchar(200)

yonghu_phone

用户手机号

varchar(200)

yonghu_id_number

用户身份证号

varchar(200)

yonghu_photo

用户头像

varchar(200)

sex_types

性别

int(11)

yonghu_email

电子邮箱

varchar(200)

create_time

创建时间

timestamp


第五章 系统实现

这里主要是对系统设计实现进行描述,通过系统的设计和数据库的设计,通过编码后变成了可以进行操作的界面,让一切想法变成了结果,通过文字和具体程序操作界面的截图之间的配合,可以把功能更直观的描述起来。

5.1管理员功能实现

5.1.1 核酸检测管理

管理员进入如图5-1所示的核酸检测管理界面之后,管理员点击信息显示栏中最右侧的修改,删除按钮可依次完成核酸检测信息的修改,删除等操作,管理员也能在当前界面查询核酸检测信息,添加核酸检测信息等。

图5-1 核酸检测管理界面

5.1.2 接种记录管理

管理员进入如图5-2所示的接种记录管理界面之后,管理员点击信息显示栏中最右侧的修改,删除按钮可依次完成接种记录信息的修改,删除等操作,管理员在当前界面也能添加接种记录,查询接种记录。

图5-2 接种记录管理界面

5.1.3 物资管理

管理员进入如图5-3所示的物资管理界面之后,管理员点击信息显示栏中最右侧的修改,删除,增加库存,减少库存按钮可依次完成物资信息的修改,删除,增加库存,减少库存等操作。

图5-3 物资管理界面

5.1.4 物资申请管理

管理员进入如图5-4所示的物资申请管理界面之后,管理员点击信息显示栏中最右侧的修改,删除按钮可依次完成物资申请信息的修改,删除操作,管理员在本界面也能审核用户提交的物资申请信息。

图5-4 物资申请管理界面

5.1.5 出入记录管理

管理员进入如图5-5所示的出入记录管理界面之后,管理员点击信息显示栏中最右侧的修改,删除按钮可依次完成用户出入记录信息的修改,删除操作,管理员在本界面也能添加出入记录信息,查询出入记录信息等。

图5-5 出入记录管理界面

5.2 用户功能实现

5.2.1 打卡管理

用户进入如图5-6所示的打卡管理界面之后,用户点击信息显示栏右侧的删除按钮可以删除打卡信息,用户在本界面可以新增打卡信息,查询打卡信息等。

图5-6 打卡管理界面

5.2.2 接种记录查看

用户进入如图5-7所示的接种记录查看界面之后,用户可以查看接种记录信息,可以查询接种记录信息等。

图5-7 接种记录查看界面

5.2.3 公告信息查看

用户进入如图5-8所示的公告信息查看界面之后,用户可以查询公告,鼠标点击公告标题可以查看公告的具体内容。

图5-8 公告信息查看界面

5.2.4 社区疫情情况

用户进入如图5-9所示的社区疫情情况界面之后,用户可以查询社区疫情情况信息,可以点击社区疫情情况的标题查看社区疫情情况的具体内容。

图5-9 社区疫情情况界面


第六章 系统测试

在整个系统完成之后,就需要进入系统测试环节。在系统测试环节的主要任务就是用不同的测试方法,使用不同的测试用例,来引出系统出现的问题,只要测试出问题,才可以让程序员有目的性的对问题进行解决,最终让问题越来越少,才能让用户验收程序。

6.1系统测试的特点

系统测试,是有一定的特点,并且根据这些特定也有相关的描述信息,下面就是对这些测试的特点来进行阐述:

第一点:完整的测试,就是在用户的角度上,通过不同的权限,来测试不同的模块,最终判断程序的优劣性。

第二点:测试主要从程序的设计架构方面来进行测试,也需要从业务操作流程方面测试。

第三点:测试不是想一出是一出,要有严谨的测试步骤,测试目的,只有科学的测试方法才能产生科学的测试结果,能很好的对出错几率进行降低。

总的来说,系统测试不仅仅是让功能符合,还要在突发情况下有相应的配套表现,只要考虑的多,做的多,系统运行过程中才能更加平稳。

6.2 系统功能测试

本章节主要是测试部分,选用一些常规操作进行测试,看测试效果是否达到程序设计预期。

6.2.1 用户登录测试

一般都要进行登录测试,登录测试是所有功能里面最基础也是重要的部分,只有合法的登录才可以进行对应权限的操作,不合法的登录肯定是不让用户进行下一步操作的。具体步骤参考下图。

表6-1 用户登录测试表

测试功能

操作流程

测试的数据

结果

是否符合要求

用户登录

用户填写账号,填写密码,数据填写完成之后点击登录按钮

账号和密码保证一个出错一个正确

不能登录

账号和密码都正确

登录成功

6.2.2 出入记录查询测试

查询功能是一个常用的功能,通过条件查询可以获得自己所需的内容,条件输入也需要输入正确的已经存在的条件才可以有获取结果,对不同的获取条件返回不同的结果集。

表6-2 出入记录查询功能测试表

测试功能

操作流程

测试的数据

结果

是否符合要求

出入记录查询功能

在查询界面的数据输入框中登记关键词然后搜索

用户姓名有误或为空

不能查询

用户姓名信息正确

查询成功

6.3 系统测试结果

经过整体性测试,疾病防控综合系统测试无误,符合设计预期,同时也符合操作性设定以及易维护性设定,并且在数据的安全性保障上也有很好的体现。疾病防控综合系统已经可以使用。


结  论

开发与实现疾病防控综合系统已经花费了半年时间,在这期间,作为学生的我收获了很多知识。因为独自开发疾病防控综合系统,仅仅依靠在校期间学到的软件开发方面的知识显然是不行的,还需要通过其他的学习渠道进行程序开发类知识的拓展,比如去图书馆借阅书籍,比如数据库设计的书籍,Java编程语言方面的书籍,软件工程方面的书籍等,还可以通过上网查看编程方面的博客,这些博客呈现的知识是各个软件开发者在工作生涯中总结的编程知识,都是编程知识中的精华,可以帮助学习开发的人员在编程中避免很多开发误区,还可以节省开发的时间。另外,也可以通过数字图书馆下载相似系统方面的参考文献进行程序开发类的知识学习。总而言之,当一个人完成疾病防控综合系统的设计与开发后,不仅自身的专业知识水平得到了提升,还提高了自己将理论转为实际操作的能力,以及面对问题通过知识学习进而解决问题的能力。

疾病防控综合系统的设计实现,让我有以下几点体会:

(1)在确定要研究的系统之后,对于系统的研究内容也就是系统的功能的分析与设计是比较重要的部分,这方面主要是站在使用者的角度进行考虑,可以参考相似系统的功能进行设计,也能通过对目标用户群进行问卷调查等方式进行功能需求的确定,只有确定了系统需要的功能之后,才可以开展系统的配套数据库的设计,系统的编码等后续工作。

(2)对于系统的代码编写是一项比较复杂的工作,这也是系统的后端部分,用户操作系统看到的只是代码运行之后呈现出来的操作界面前端部分,编写的代码与运行实现的界面是相对应的,所以编写代码时,需要一边编写,一边查看代码的运行效果,这里就需要编写代码的人员注意一些编写细节,比如规范命名程序变量,注释关键代码等,这些编码习惯会帮助开发者在该系统中进行功能拓展或功能维护中提高效率。

(3)系统的功能模块在编码实现之后,也需要单独进行测试,发现问题之后能够及时进行解决,当系统的所有的功能都实现之后,再次对该系统整体进行测试,方便开发者在检验系统功能的基础上,进行系统问题的修复与完善。

由于时间比较短暂,加上开发期间我都是一边学习理论,一边进行实操,对于开发的疾病防控综合系统除了具备能够正常运行,能够提供信息管理功能,以及能够保证系统运行期间产生的数据的安全性等特点外,本系统也具备一些缺点,首先表现的就是当使用者使用系统时,在对数据进行查询或者更新时,系统响应时间比较长,增加了用户的等待时间,让用户的使用体验不够理想,其次,疾病防控综合系统的功能操作的流程设计上也存在一些不合理之处,最后,疾病防控综合系统对于权限划分,功能模块细分上也存在一些漏洞。

总的说来,在今后的时间里面,自己除了要加强理论知识的学习外,还要继续投入时间和精力去对疾病防控综合系统进行修复,让本软件拥有更强的性能,比如安全性以及可靠性。


致  谢

自从来到了这个校园之后,我认识了很多同学,还有很多老师,也结交了很多朋友,这些人们为我的大学生活增添了许多色彩。虽然毕业已经进入倒计时,但是我们互相之间还是向往常一样相处,也许是大家都很珍惜这最后的时光吧。

在大学校园经过了几年的知识学习后,目前的我不仅具备一些专业理论知识,还拥有本专业方面的实操技能,这些成长都是学校老师带给我的,所以,毕业了,看到自己的知识变得丰富起来,自己的能力也得到了成长,我是非常感谢本专业的所有老师的。

指导老师是学院分配的老师,主要是帮助我们更好的完成选择的毕业课题,并在课题撰写期间提供给学生系统制作以及文档撰写方面的指导。因此,我在制作本系统时,我的导师提供的指导包括了功能的确定,系统结构的设计,系统功能的编码,以及测试系统等方面的指导,可以说从选题到本系统制作完成,导师在每个阶段性任务期间都进行了指导,主要是针对我遇到的主要困难,提供相应的解决方案,这样才让我能够如期完成本课题。所以,能够上交设计成果,我是非常感谢导师的。

感谢本院同学还有我身边的朋友,在校期间,我们总是时不时进行交流,包括平时作业以及本次的毕业课题方面的互相探讨,还有就是每当我陷入困境时,在你们的帮助下我总能很快走出困境。所以,这些年,你们的陪伴,让我很暖心!

离开校园之后,我们将不在这个场所进行学习与生活了,尽管很不舍,但还是祝愿我的校园前景广阔!


参考文献

[1]赵东旭,赵健雅.威海市一体化疫情防控系统设计[J].大数据:1-9.

[2]张宇,师庆科,王觅也,郑涛,白丁.医院常态化疫情防控平台的构建与应用[J].中国医疗设备,2022,37(02):103-106+135.

[3]彭影.优化Java数据库访问效率的策略研究[J].计算机产品与流通,2020(02):21.

[4]尹维伟.探析计算机软件Java编程特点及技术[J].电脑编程技巧与维护,2020(03):38-39+52.

[5]张金波.Java编程中常见的异常及其解决方案[J].计算机产品与流通,2019(12):29.

[6]秦超,潘猛,张鹏.处理MySQL的典型问题[J].网络安全和信息化,2018(04):70-72.

[7]王晓燕.MySQL数据库中误操作删除数据的恢复问题[J].办公自动化,2018,23(11):45+61.

[8]李瑞祥,刘伟.MYSQL数据查询技巧[J].网络安全和信息化,2019(05):70-71.

[9]王宝莹.基于eclipse的毕业设计流程系统的设计与开发[J].智库时代,2020(13):261-262.

[10]李承涛,金亚玲.基于Eclipse软件的车载应用APP的设计[J].内蒙古科技与经济,2019(15):90+96.

[11]王丹,孙晓宇,杨路斌,高胜严.基于SpringBoot的软件统计分析系统设计与实现[J].软件工程,2019,22(03):40-42.

[12]张峰.应用SpringBoot改变web应用开发模式[J].科技创新与应用,2017(23):193-194.

[13]谭少华. Java Web管理信息系统快速开发平台的设计与实现[D].电子科技大学,2018.

[14]孔璐.软件开发中数据库设计理论与实践分析[J].南方农机,2019,50(04):135.

[15]Konstantins Gusarovs. An Analysis on Java Programming Language Decompiler Capabilities[J]. Applied Computer Systems,2018,23(2).

[16]Tan Yiyu. A Hardware-oriented Object Model for Java in an Embedded Processor[J]. Microprocessors and Microsystems,2018.

Guess you like

Origin blog.csdn.net/licongzhuo/article/details/131386070