ssm campus lost and found system graduation design - with source code 080008

Design and Implementation of SSM Campus Lost and Found System

Summary

In the information society, there is a need for targeted information acquisition channels, but the expansion of channels is basically the direction that people are striving for. Due to the deviation in their perspective, people can often obtain different types of information, which is also the most difficult technology to overcome. topic. Aiming at problems such as campus lost and found, conduct research and analysis on campus lost and found, and then develop and design a campus lost and found system to solve the problem.

The main functional modules of the campus lost and found system include user registration management, lost and found management, lost and found notice management, item type, thank you letter management, etc., adopting an object-oriented development model for software development and hardware erection, which can be very good Meet the needs of actual use, improve the corresponding software setup and program coding work, take MySQL as the main storage unit of background data, use SSM framework, JSP technology, Ajax technology to code and develop the business system, and realize the system full functionality. This report first analyzes the background, function and significance of the research, laying the foundation for the rationality of the research work. Analyze the various requirements and technical problems of the campus lost and found system, prove the necessity and technical feasibility of the system, then give a basic introduction to the technical software and design ideas that need to be used in the design system, and finally realize the campus lost and found System and deployment runs use it.

Key words: campus lost and found; SSM framework; MySQL database

Design and implementation of SSM campus lost and found system

Abstract

In the information society, there is a need for targeted information access, but the expansion of access is basically the direction of people's efforts. Due to the deviation of the perspective, people can often obtain different types of information, which is also the most difficult subject for technology to overcome. Aiming at the problems of campus lost and found, this paper studies and analyzes the campus lost and found, and then develops and designs the campus lost and found system to solve the problems.

The main functional modules of the campus lost and found system include user registration management, lost and found management, lost and found notice management, item type, thank-you letter management, etc. the object-oriented development mode is adopted for software development and hardware erection, which can well meet the needs of practical use, improve the corresponding software erection and program coding, take MySQL as the main storage unit of background data, adopt SSM framework JSP technology and Ajax technology encode and develop the business system, and realize all the functions of the system. This report first analyzes the background, function and significance of the research, which lays a foundation for the rationality of the research work. This paper analyzes the various requirements and technical problems of the campus lost and found system, proves the necessity and technical feasibility of the system, then makes a basic introduction to the technical software and design ideas needed to design the system, and finally realizes the campus lost and found system and the deployment and operation of it.

Key words:Campus lost and found; SSM framework; Mysql database

Table of contents

Chapter 1 Introduction

1.1  Research Background

1.2  Development Status

1.3  Research Methods

Chapter 2 Introduction to Related Technologies

2.1 HTTP protocol

2.2 Java language and JDK development environment

2.3 HTML Web Technology

2.4 JSP scripting language

2.5 MySQL database

2.6  Enterprise-level architecture

Chapter 3 System Analysis

3.1  Feasibility analysis

3.2  Analysis of Functional Requirements

3.2.1  Foreground user functions

3.2.2  Background administrator function

3.3  Analysis of non-functional requirements

3.4  Security Requirements Analysis

3.4.1  System Security

3.4.2  Data Security

3.5  Data flow analysis

Chapter 4 System Design

4.1  System architecture design

4.2  Overall system design

4.3  System function design

4.4  Database design

4.4.1  Data Requirements Analysis

4.4.2  Database conceptual design

4.4.3  Database table design

Chapter 5 System Implementation

5.1  Implementation of the database access layer

5.2  Implementation of registration module

5.3  Implementation of login module

5.4  Realization of User Profile Modification Module

5.5 Realization of  announcement information management module

5.6 Realization of management module of missing  objects notice

5.7 Realization of lost and found management module 

Chapter 6 System Testing

6.1  Test purpose

6.2  Functional test

6.3  Performance Test

Chapter 7 Summary and Outlook

references

thank you

  1. introduction
    1. Research Background

With the continuous development of society and economy, people's pace of life is also accelerating. In addition, more and more items in our lives are miniaturized, and we occasionally overlook and forget about these items. In bulk, large umbrellas, school bags, suitcases, books, small bank cards, keys, ID cards, glasses, wallets, etc. Umbrellas can be bought, bank cards can be lost and rearranged, and keys can be re-matched; books can be bought if they are lost, but old notes cannot be bought, and ID cards cannot be replenished for half a day, especially when people are out of town.

In our life, we will accidentally pick up lost items, pick up work cards, student ID cards, and unit information can be easily contacted; but the information on the ID card is too expensive to contact; if it is an umbrella, A book, or even a linked person, the key doesn't know should be returned. Who or who is given, but the owner is still anxious to worry about the house; the bank card can only be handed over to the issuing bank, but in fact, when the bank card is lost, it is difficult for the person who lost the bank card to find the opportunity to lose the bank card. There is no one online channel where everyone knows how to post or claim lost property. When the owner loses his things, he will be hard to find.

    1. development status

Compared with foreign informatization process, my country's informatization process develops slowly. my country's campus lost and found is in its infancy, the campus lost and found system is immature, and the legislative process of the campus lost and found system is also very slow. Not perfect in every way. Many campus lost and found systems have appeared in foreign countries as early as decades ago. Looking at these systems, they mainly have the following characteristics:

1. Advancement: realize network management.

2. Versatility: All major campus lost and found management can be used.

3. Convenience: The management work can be completed through the network.

4. Timeliness: The information is updated in a timely manner.

In our country, this kind of campus lost and found system has only appeared in the past few years. Most areas do not have a dedicated campus lost and found system, but only through manual management, which is extremely inefficient. Therefore, the establishment of a campus lost and found system can better serve people, make it more standardized, scientific and informatized, and meet the needs of users. my country's Internet development is showing a trend of rapid growth, and the number of Internet users continues to increase. With the implementation and price reduction of broadband, nearly hundreds of millions of people enter the online world every day. With the popularity of the Internet, the birth and development of the Internet has subverted the traditional way of information dissemination, broken through the barriers of time and space in the traditional way of communication, and greatly changed human beings from material to spiritual, from form to content, Various activities from production to life have brought new opportunities and challenges to human beings. The campus lost and found system can help us more quickly, which is of great significance.

    1. Research methods

First of all, through engine search or reference to relevant literature, understand the background of the system development and the significance of the design system, and collect user demand information. Secondly, in terms of development tools, it is finally determined that the Java system is used to design and develop this system, and MySQL is used as a tool for designing the database. That is to use the Java language to realize the user interface, and connect with the database to realize the complete communication function. After that, the general functional modules of the system are designed. Mainly analyze from the point of view of the convenience of system users and system administrators, and clarify the functions that the system should have. Ultimately, it is the test system, through use case testing to discover existing problems and find solutions. Utilize the existing development system, combine the knowledge I have learned, and complete the design with the help of the teacher's guidance to ensure the usability and practicability of the system.

  1. Related technology introduction
    1. HTTP protocol

The Hypertext Transfer Protocol (HTTP) is a collaborative and distributed communication protocol that presupposes the exchange of information on the World Wide Web. HTTP is an international standard indicator of IEIF. In the formulation and implementation of relevant standards, W3C actively participates in it and plays an irreplaceable role. It can transfer documents between the server and the browser with the help of hypertext markup language. HTML is the markup language for structuring documents, and these documents will include links to relevant information. Users only need to click one of the links to access multimedia objects and images, and at the same time obtain the additional information of the linked item [1][2].

    1. Java language and JDK development environment 

Java is a programming language launched by the American sun company. It can be applied in multiple systems and has good compatibility. Furthermore, it is widely used in systems such as data centers, personal PCs, and technological supercomputers by virtue of its own advantages. Currently the largest developer professional community [3].

JDK is a brand new product launched by American sun company for java developers. If there is no JDK, the installed java program will not be able to run [4].

    1. HTML web technology

HTML is a commonly used language for making web pages, and it is generally used to make static pages. Its commands can reflect text information, link information, graphic information and table information, etc. It is now widely accepted and widely used on the Internet [5].

    1. JSP scripting language

JSP can be used in html, or it can be used alone. It also has many advantages. It can be said that the pioneer of Web scripting technology is JSP. Some of the best features of modern programming languages ​​(like C, Java, and Perl, etc.) are integrated in JSP, and some configuration standards in Web servers are combined by JSP, Tomcat, and databases [6].

    1. MySQL database

MySQL has been updated many times, and the functional level has been very rich and perfect. From MySQL4 to version5, a relatively large update has been made, and it has achieved good practical application results in actual commercial use. The latest version of MySQL supports compression of information, and at the same time, encryption can better meet the needs of information security. At the same time, after multiple updates of the system, the mirroring function of the database itself has also been greatly enhanced, the smoothness of operation and ease of use have been greatly improved, and the use and creation of drivers are also more efficient and faster. The biggest change is the optimization of the display of spatial information, which makes it easier to label and calculate coordinates on the application map. The powerful backup function also ensures that users will feel more at ease during the use process, and the supported Office features also support users' self-installation and use. The display form of information has also been greatly updated, and two very useful display areas have been added, one is the information area, which has classified tables and text, and the display of the interface is more refreshing and specific. The second is the information control of the instrument, which can display information in the instrument information area and compare multiple information at the same time, which brings great convenience to the actual use of users [7][8].

In the actual implementation process of the campus lost and found system designed in this paper, the main reason for choosing the MySQL database is that there will be a large number of databases that are frequently operated during the application and development of enterprise application systems, and data security The requirements are also very high. Combining these factors, MySQL with a relatively high safety factor was finally selected to store the background data of the campus lost and found system [9][10].

    1. Enterprise Architecture

Struts belongs to the MVC architecture, it takes SSM as the premise, and achieves it with the help of JSP and Servlet technology. And its gradually good performance has won the favor and attention of developers. Its use is quite simple, and its response is quick and sensitive. Because it organically combines JSP, message resource, Servlet and self-defined tags, programmers can achieve the MVC form without compiling code, which improves the effectiveness of programming [11].

Spring belongs to a very powerful framework in the SSM framework. It not only standardizes and integrates the main measures of the supervision project, but also uses its own design to guide programmers to focus on editing the interface process instead of programming the class. The core of its application is the Inversion of Control container in JavaBean. It provides the overall plan of the component framework layer, and it achieves the unique abstraction of information access, and provides a reasonable JDBC architecture, which effectively reduces the probability of errors and improves the effectiveness. In addition, it also integrates many information access frameworks such as Mybatis [12].

Mybatis belongs to an open-source subject-relationship mapping architecture, which achieves the purpose of ultra-lightweight encapsulation based on JDBC, so that programmers can operate the database according to their own ideas with the help of subject-oriented measures. It can be integrated with any JDBC, and it can also be used on the client side or on the Web side, and it can realize the persistence of information [13].

  1. system analysis
    1. Feasibility Analysis

In terms of technology, the current mainstream SSM framework is used to build the main framework of the system. The front desk uses jquery and ajax to realize the design and aesthetic adjustment of the front page. The above technologies are all learned systematically by myself and practiced in course design. It can make development more convenient and systematic. From a technical point of view, this system is completely achievable.

In terms of practicality, the main task of this design is to realize the management of personal data, item types, and notices of lost objects in the campus lost and found system, which is in line with the current development trend. From the perspective of users, while also considering system operating costs and human resources, it adopts a convenient way on the Internet to realize online business, making the business process more systematic and more convenient for user experience, which is more practical.

In terms of economy, the main purpose of the campus lost and found system designed in this project is to conduct information query management and retrieval services more conveniently and quickly, that is, information software that can be directly put into use. The main cost of the system is mainly concentrated on the operation of continuous maintenance and management update of the used data in the later period. However, once the system is put into actual operation and use, it can improve the efficiency of information query and retrieval. At the same time, it is also necessary to effectively ensure the security of the information of the inquirer. At the same time, the practical application brought by the campus lost and found system The value of this aspect far exceeds the cost of developing and maintaining the actual system. Therefore, it is economically feasible to develop this software.

    1. Functional Requirements Analysis

The functions of the campus lost and found system are mainly divided into front-end users who register and log in according to their own needs, and browse lost and found information. The background system administrator mainly processes the lost and found information, and manages registered users, notices of missing objects, item types, and lost and found.

The system use case diagram is shown below.

 

 

Figure 3-1 System use case diagram

      1. front-end user function

The functions of registered users in the foreground are as follows:

Account registration: The user fills in personal information and verifies the mobile phone number.

Login: Log in according to the account password.

Browsing bulletin data: Users can browse the bulletin data on the main page to know the latest bulletin data of the system.

Browsing notices of lost objects: Users can browse the information of found objects according to the type of found objects, and select a found object to view details, such as: item name, lost time, lost location, pictures, etc.

Browse recruitment: Users can browse recruitment information according to recruitment type, and select a recruitment to view details, such as: item name, item type, pickup location, pickup time, pickup user, name and contact number, etc.

Thank you message: The user selects a thank you message to view according to his needs.

News information: Users can browse news information.

      1. Background administrator function

The administrator functions are as follows:

Change password: Administrators can change their own login passwords to the system at any time to ensure system security.

Management of missing objects notices: maintain the information of missing objects, add, delete, and modify information.

Lost and found management: maintain the lost and found information, add, delete and modify information.

Announcement information management: release and delete relevant announcement data information.

User management: You can view the information of registered users and manage them.

    1. Non-Functional Requirements Analysis

The first thing to consider is the system function software. In terms of specific design, whether it can better meet the basic functional requirements of various users. If it cannot better meet the needs of users, then the existence of this system is worthless. The non-functional analysis of the software system is carried out from 7 aspects, one is performance analysis, which is aimed at the system; one is security analysis, which is aimed at the system; the other is integrity analysis, which is aimed at the system; It is scalability analysis, for the system, and the other is performance analysis to adapt to the business. In the face of the comprehensive comparison and analysis of the performance, security, expansion, and integrity of the campus lost and found system, it is found that the corresponding non-functional requirements analysis is needed.

    1. Security Requirements Analysis
      1. system security

Security is very important to every system. A system with good security can protect enterprise information and user information from being stolen. Improving the security of the system is not only the responsibility of the user, but also the responsibility of the enterprise. Especially for the campus lost and found system, there must be good security to protect the entire system.

The system has authority control for users, and limits the authority of users according to the role barriers, so as to ensure the security of the system.

      1. data security

The data in the database is input from the outside world. When the data is input, due to various reasons, the input data will be invalid or dirty. Therefore, how to ensure that the input data conforms to the regulations has become the primary concern of database systems, especially multi-user relational database systems.

Therefore, when writing to the database, data integrity, correctness, and consistency must be guaranteed.

    1. Data Flow Analysis

Analyze the data flow of the system, and the users of the system are divided into two categories, general users and administrators. The system mainly processes interface information transmission, login information verification, registration information reception, and user response to various operations.

The top-level data flow diagram of the system is shown in the figure below.

 

Figure 3-2 Top-level data flow diagram

To judge the identity of the user, it is judged according to the login data, and then jumps to the corresponding function interface. The internal users of the system can operate the data, and the database center can receive the effective data stream transmitted by the system to perform corresponding operations on the data SQL statements.

The underlying data flow diagram of the system is shown in the figure below.

 

 Figure 3-3 The underlying data flow diagram

The system can be divided into two parts, the foreground and the background. After each operation, the system returns the operation result. The data connection between the foreground and the background is mainly through the database, which means that different operations are performed on the database respectively.

  1. system design
    1. System architecture design

The architecture design of the campus lost and found system is mainly divided into three layers, mainly including the Web layer, the business layer, and the Model layer. The web layer also includes the View layer and the Controller layer, and the Model layer includes the metadata extension layer and the data access layer.

The system architecture is shown in the figure below.

 

Figure 4-1 System architecture

    1. Overall System Design

The campus lost and found system is generally divided into a front-end user module and a back-end administrator module.

The two modules appear to exist independently, but the accessed database is the same. The function of each module is made according to the previously completed demand analysis, and after consulting relevant materials.

To sum up, the functional structure diagram of the system is shown in the figure below.

 

Figure 4-2 System function structure diagram

    1. System function design

Login module: The login module is the entrance to the system, and all users must log in to access the system. To log in, you need to enter your username and password, and if you try to log in multiple times, you need to enter a verification code. When logging in, you need to choose the role of the user, whether it is a general user or an administrator to log in. After a successful login, the user's permissions will be obtained through the database and redirected to the user's home page.

Announcement data module: It can be divided into three modules: announcement data browsing, announcement data retrieval, and announcement data maintenance. The administrator has the authority to maintain announcement data, publish new announcement data, update existing announcement data, etc.

Missing object notification management module: The missing object notification management is divided into adding and modifying the missing object notification and querying the missing object notification. The missing item notice information is modified, added, and deleted by the lost person; the search for the found item notice is performed by ordinary users.

Lost and found management module: Lost and found management is divided into lost and found addition, modification and lost and found query. Lost and found information is modified, added, and deleted by the finder; lost and found inquiries are performed by ordinary users.

    1. Database Design
      1. Data Requirements Analysis

It can be analyzed from the front that the most important things in the database are notices of missing objects, lost and found, and announcement information. The analysis can get the following data description:

System user: used to record various information of the user, including user name, password, name, gender, address, email, contact information and other data items.

Administrator: Record the login information of the administrator. Including user name, password, permissions and other data items.

Found notice: the content stored in the found notice, including data items such as item name, item type, and lost location.

Lost and Found: Store various lost and found information. Including item name, item type, item picture, pick up location, pick up time and other data items.

Bulletin data: store the content of bulletin data in the system. Including title, announcement data content, time and other data items.

      1. Database conceptual design

According to the previous data flow chart, combined with the functional module design of the system, design each information entity that conforms to the system.

The ER diagram of the system is shown in the figure below.

 

Figure 4-3 System ER diagram

      1. database table design

The campus lost and found system has the following data forms: user information form, lost and found notice form, lost and found form, thank you letter form.

Due to the large number of data tables, only the main data tables of the system are displayed, as shown in the following table.

name

type

length

not null

primary key

note

ordinary_users_id

int

11

yes

yes

common user ID

user_name

varchar

64

no

no

username

user_gender

varchar

64

no

no

user gender

examine_state

varchar

16

yes

no

Approval Status

recommend

int

11

yes

no

Intelligent Recommendation

user_id

int

11

yes

no

User ID

create_time

datetime

0

yes

no

creation time

update_time

timestamp

0

yes

no

update time

name

type

length

not null

primary key

note

thank_you_letter_id

int

11

yes

yes

Thank you ID

thank_you_letter_title

varchar

64

no

no

thank you letter title

name_of_addressee_

varchar

64

no

no

recipient name

thank_you_for_the_cover

varchar

255

no

no

Thanks for the cover

letter_user

int

11

no

no

write user

user_name

varchar

64

no

no

username

content_of_thank_you_letter

longtext

0

no

no

Thank you letter content

hits

int

11

yes

no

hits

recommend

int

11

yes

no

Intelligent Recommendation

create_time

datetime

0

yes

no

creation time

update_time

timestamp

0

yes

no

update time

name

type

length

not null

primary key

note

search_notice_id

int

11

yes

yes

Found ID

item_name

varchar

64

no

no

Item Name

item_type

varchar

64

no

no

item type

lost_location

varchar

64

no

no

lost location

lost_time

datetime

0

no

no

lost time

item_picture

varchar

255

no

no

Item picture

lost_user

int

11

no

no

lost user

user_name

varchar

64

no

no

username

contact_number

varchar

64

no

no

contact number

item_details

longtext

0

no

no

item details

hits

int

11

yes

no

hits

recommend

int

11

yes

no

Intelligent Recommendation

create_time

datetime

0

yes

no

creation time

update_time

timestamp

0

yes

no

update time

name

type

length

not null

primary key

note

lost_and_found_id

int

11

yes

yes

Lost and Found ID

item_name

varchar

64

no

no

Item Name

item_type

varchar

64

no

no

item type

pick_up_location

varchar

64

no

no

pick up location

pickup_time

datetime

0

no

no

pickup time

item_picture

varchar

255

no

no

Item picture

pick_user

int

11

no

no

pick up user

user_name

varchar

64

no

no

username

contact_number

varchar

64

no

no

contact number

item_details

longtext

0

no

no

item details

hits

int

11

yes

no

hits

recommend

int

11

yes

no

Intelligent Recommendation

create_time

datetime

0

yes

no

creation time

update_time

timestamp

0

yes

no

update time

name

type

length

not null

primary key

note

item_type_id

int

11

yes

yes

Item Type ID

item_type

varchar

64

no

no

item type

recommend

int

11

yes

no

Intelligent Recommendation

create_time

datetime

0

yes

no

creation time

update_time

timestamp

0

yes

no

update time

name

type

length

not null

primary key

note

notice_id

mediumint

8

yes

yes

Announcement id:

title

varchar

125

yes

no

title:

content

longtext

0

no

no

text:

create_time

timestamp

0

yes

no

Creation time:

update_time

timestamp

0

yes

no

Update time:

  1. System implementation
    1. Implementation of the database access layer

The system is connected through jdbc and MySQL, and a new jdbc.properties file is created to fill in the drivers and parameters required to connect to the database.

jdbc.driverClass=com.MySQL.jdbc.Driver

jdbc.url=jdbc:MySQL://localhost:3306/tsi

jdbc.username=root

jdbc.password=123

第一个参数代表MySQL数据库的驱动,第二个参数代表要连接的数据库,第三个和第四个参数代表数据库连接名和密码。

后台与数据库访问主要是通过HQL语句来进行查询的,查询语句中的表名是表格的实体类名,在这种查询语句中*是不允许使用的,除非适合聚合函数一起使用才可以。

    1. 注册模块的实现

用户在填写数据的时候必须与注册页面上的验证相匹配否则会注册失败,注册页面的表单验证是通过JavaScript进行验证的,用户名的长度必须在6到18之间,邮箱必须带有@符号,密码和密码确认必须相同,你输入的密码,系统会根据你输入密码的强度给出指定的值,电话号码和身份证号码必须要求输入格式与生活相符合,当你前台验证通过的时候你点击注册,表单会将你输入的值通过name值传递给后台并保存到数据库中。

用户注册流程图如下图所示。

 

图5-1用户注册流程图

用户注册界面如下图所示。

 

图5-2用户注册界面        

用户注册的关键代码如下。

<%

HashMap ext = new HashMap();

ext.put("issh","否");

new CommDAO().insert(request,response,"yonghuzhuce",ext,true,false,"index.jsp");

%>

    1. 登录模块的实现

主要由两部分组成,登录前的登录界面以及登录后的用户功能界面。登录界面,要求用户输入用户名和密码,当用户名和密码其中一个输入为空时,给出提示“用户名,密码不能为空”。获取用户名和密码后到数据库中查找,如果用户名存在,以及对应的密码正确,则登录成功,否则登录失败。登录失败后给出提示,并把焦点停在文本框中。登录成功后将该次会话的全局变量username设置为用户名。登录成功后进入会员的功能模块,主要有会员基本信息修改,已经发布寻物信息管理,发布信息,和退出功能。退出功能是清除全局变量username的值,并跳回到首页。

登录流程图如下图所示。

 

图5-3登录流程图

用户登录界面如下图所示。

 

图5-4用户登录界面

用户登录的关键代码如下。

if(ac.equals("adminlogin"))

{

String username = request.getParameter("username");

String password = request.getParameter("pwd");

String utype = request.getParameter("cx");

String pagerandom = request.getParameter("pagerandom")==null?"":request.getParameter("pagerandom");

String random = (String)request.getSession().getAttribute("random");

if(!pagerandom.equals(random)&&request.getParameter("a")!=null)

{

request.setAttribute("random", "");

go("/login.jsp", request, response);

}

else{

String sql1 = "select * from allusers where username='"+username+"' and pwd='"+password+"'  ";

List<HashMap> userlist1 = dao.select(sql1);

if(userlist1.size()==1)

{

request.getSession(). setAttribute("username", userlist1.get(0).get("username"));

request.getSession(). setAttribute("cx",  userlist1.get(0).get("cx"));

gor("main.jsp", request, response);

}else{

request.setAttribute("error", "");

go("/login.jsp", request, response);

}

}

}

    1. 用户资料修改模块的实现

用户登录/注册成功之后可以修改自己的基本信息。修改页面的表单中每一个input的name值都要与实体类中的参数相匹配,在用户点击修改页面的时候,如果改后用户名与数据库里面重复了,页面会提示该用户名已经存在了,否则通过Id来查询用户,并将用户的信息修改为表单提交的数据。

    1. 公告信息管理模块的实现

如果公告信息需要修改,管理员可以通过查询公告数据的基本信息来查询,查询公告是通过ajax技术来进行查询的,需要传递公告标题、编号等参数然后在返回到该页面中,可以选中要修改或删除的那条信息,如果选中了超过一条数据,页面会挑一个窗口提醒只能选择一条数,如果没有选中数据会挑一个窗口题型必须选择一条数据。当选择确认修改的时候,后台会根据传过来的id到数据库查询,并将结果返回到修改页面中,可以在修改页面中修改刚刚选中的信息当点击确认的时候from表单会将修改的数据提交到后台并保存到数据库中,就是说如果提交的数据数据库中存在就修改,否则就保存。

公告信息展示界面如下图所示。

 

图5-5公告信息展示界面

公告信息管理界面如下图所示。

 

图5-6公告信息管理界面

公告信息发布的关键代码如下。

<%

String lb=request.getParameter("lb");

HashMap ext = new HashMap();  

new CommDAO().insert(request,response,"xinwentongzhi",ext,true,false,"xinwentongzhi_add.jsp?lb="+lb);

%>

    1. 寻物启事管理模块的实现

此页面的关键是编写寻物信息,包括寻物编号,类型,拾取地点详情等。单击提交按钮以完成信息的添加。如果未写入完整的寻物信息,例如,如果未写入物品编号,系统将给出相应的错误提示,并且无法成功输入。数据以概念的形式以onsubmit =“return checkForm()”的形式写入以进行检查,checkForm()函数是一种用于写入数据的不同类型的校对方法,是不是为空也是经过form表单中的οnsubmit=”return checkForm()来检查。

管理员点击左侧菜单“寻物启事管理”,页面跳转到寻物启事管理外观,调用后台寻物查询所有寻物信息。并将信息密封到数据集合List,绑定到请求对象,然后页面跳转到相应的jsp,显示出寻物信息,单击删除按钮完成寻物信息的删除。

寻物启事管理流程图如下图所示。

 

图5-7寻物启事管理流程图

寻物启事管理界面如下图所示。

 

图5-8寻物启事管理界面

寻物启事列表界面如下图所示。

 

图5-9寻物启事列表界面

寻物启事列表的关键代码如下。

<%

String lb=request.getParameter("lb");

HashMap ext = new HashMap();  

new CommDAO().insert(request,response,"xinwentongzhi",ext,true,false,"xinwentongzhi_add.jsp?lb="+lb);

%>

    1. 失物招领管理模块的实现

根据需求,需要对失物招领进行添加、删除或修改详情信息。删除或修改失物招领时,系统根据失物招领的状态判定为可删除状态下,才会给出删除和修改链接,点击删除链接按钮时,请求到达后台,还会先查询失物招领状态再次做出判定能否删除。点击修改链接按钮时,会跳转到修改信息的页面,重新填写好数据后,数据提交到后台会对数据库中相应的记录做出修改。

添加失物招领时,会给出数据填写的页面,该页面根据填写好的失物招领编号同样会事先发送Ajax请求查询编号是否已存在,数据填写好之后提交到后台,会调用相关服务在数据库中插入记录。

失物招领管理流程图如下图所示。

 

图5-10失物招领管理流程图

失物招领管理页面效果如下图所示。

 

图5-11失物招领管理界面

失物招领管理的关键代码如下。

<%

String lb=request.getParameter("lb");

HashMap ext = new HashMap();  

new CommDAO().insert(request,response,"xinwentongzhi",ext,true,false,"xinwentongzhi_add.jsp?lb="+lb);

%>

  1. 系统测试
    1. 测试目的

对任何系统而言,测试都是必不可少的环节,测试可以发现系统存在的很多问题,所有的软件上线之前,都应该进行充足的测试之后才能保证上线后不会Bug频发,或者是功能不满足需求等问题的发生。下面分别从单元测试,功能测试和用例测试来对系统进行测试以保证系统的稳定性和可靠性。

    1. 功能测试

下表是系统登录功能测试用例,检测了用户名和密码的不同的输入情况,观察系统的响应情况。得出该功能达到了设计目标。

表6-1 系统登录功能测试用例

功能描述

用于系统登录

测试目的

检测登录时的合法性检查

测试数据以及操作

预期结果

实际结果

输入的用户名和密码带有非法字符

提示用户名或者密码错误

与预期结果一致

输入的用户名或者密码为空

提示用户名或者密码错误

与预期结果一致

输入的用户名和密码不存在

提示用户名或者密码错误

与预期结果一致

输入正确的用户名和密码

登录成功

与预期结果一致

下表是注册功能测试用例,检测了各种数据的输入情况,观察系统的响应情况。得出该功能达到了设计目标。

表6-2 注册功能测试用例

功能描述

用于用户注册

测试目的

检测用户注册时的合法性检查

测试数据以及操作

预期结果

实际结果

输入的手机号不合法

提示请输入正确的手机号码

与预期结果一致

输入的字段为空

提示必填项不能为空

与预期结果一致

输入的密码少于6位

提示密码必须为6-12位

与预期结果一致

输入的密码大于12位

提示密码必须为6-12位

与预期结果一致

下表是寻物启事管理功能的测试用例,检测了寻物启事管理中对寻物启事信息的增加,删除,修改,查询操作是否成功运行。观察系统的响应情况,得出该功能也达到了设计目标,系统运行正确。

前置条件;用户登录系统。

表6-3 寻物启事管理的测试用例

功能描述

用于寻物启事管理

测试目的

检测寻物启事管理时的各种操作的运行情况

测试数据以及操作

预期结果

实际结果

点击添加寻物启事,必填项合法输入,点击保存

提示添加成功

与预期结果一致

点击添加寻物启事,必填项输入不合法,点击保存

提示必填项不能为空

与预期结果一致

点击修改寻物启事,必填项修改为空,点击保存

提示必填项不能为空

与预期结果一致

点击修改寻物启事,必填项输入不合法,点击保存

提示必填项不能为空

与预期结果一致

点击删除寻物启事,选择寻物启事删除

提示删除成功

与预期结果一致

点击搜索寻物启事,输入存在的寻物启事名

查找出寻物启事

与预期结果一致

点击搜索寻物启事,输入不存在的寻物启事名

不显示寻物启事

与预期结果一致

下表是失物招领管理功能的测试用例,检测了失物招领管理中对失物招领信息的增加,删除,修改,查询操作是否成功运行。观察系统的响应情况,得出该功能也达到了设计目标,系统运行正确。

前置条件;用户登录系统。

表6-4 失物招领管理的测试用例

功能描述

用于失物招领管理

测试目的

检测失物招领管理时的各种操作的运行情况

测试数据以及操作

预期结果

实际结果

点击添加失物招领,必填项合法输入,点击保存

提示添加成功

与预期结果一致

点击添加失物招领,必填项输入不合法,点击保存

提示必填项不能为空

与预期结果一致

点击修改失物招领,必填项修改为空,点击保存

提示必填项不能为空

与预期结果一致

点击修改失物招领,必填项输入不合法,点击保存

提示必填项不能为空

与预期结果一致

点击删除失物招领,选择失物招领删除

提示删除成功

与预期结果一致

点击搜索失物招领,输入存在的失物招领名

查找出失物招领

与预期结果一致

点击搜索失物招领,输入不存在的失物招领名

不显示失物招领

与预期结果一致

    1. 性能测试

使用阿里云PTS(Performance Testing Service)性能测试服务对线上系统进行压力测试。线上服务器环境为:1核心CPU,1G内存,1Mbps公网带宽,Centos7.0操作系统。

压测过程中使用了2台并发机器,每台机器20个用户并发,对系统主页,登录,数据查询和数据维护等模块进行并发访问,测试结果是有40个用户并发时,数据管理相关页面的响应时间甚至达到了7s,通过查看服务器出网流量发现已经达到1381kb/s,可以看出服务器的带宽已经达到峰值,如果系统使用5Mbps的带宽,系统的响应时间和TPS将会大大增加。在整个测试的过程中,CPU的使用率占用仅8%,也提现出带宽瓶颈对系统的影响非常严重。

  1. 总结与展望

随着计算机互联网技术的迅猛发展,各行各业都已经实现采用计算机相关技术对日益放大的数据进行管理。该课题是校园失物招领系统为核心展开的,主要是为了实现校园失物招领信息化管理和用户在线寻找失物的需求。

校园失物招领系统的开发是以Java编程语言作为基础,在Myeclipse系统上完成编码工作,系统整体为B/S架构,数据库系统使用MySQL。文中详细分析了校园失物招领系统的研究背景、研究目的和意义、开发工具和相关技术以及系统需求、系统详细设计和系统测试等等一系列内容。系统实现了校园失物招领系统所需的一些基本功能,并通过测试对这些实现的功能进行了完善,进而提高了系统整体的实用性。整个系统的开发过程中大量使用了Java相关的知识以及前端开发使用的html和javascript等,同时涉及到了很多开源框架和组件,例如后台系统中运用的MVC架构、Freemarker模板引擎等,前端运用的UI框架等。

系统投入运行时,各功能均运行正常。系统的每个界面的操作符合常规逻辑,对使用者来说操作简单,界面友好。整个系统的各个功能设计合理,体现了人性化。

但是由于自己在系统开发过程中对一些用到的相关知识和技术掌握不够牢固,再加上自身开发经验欠缺,因此系统在有些方面的功能还不够完善,考虑的不够全面,因此整个系统还有待日后逐步完善。

参考文献

[1]赵慧,陈蛟. 失物招领方法、系统、计算机设备及可读存储介质[P]. 北京市:CN111866257B,2022-03-25.

[2]王曼维,杨荻,李岩,及松洁.基于SSM框架的失物招领平台设计与实现[J].,2022,19(03):133-136.

[3]弋改珍.校园失物招领微信小程序的设计与开发[J].福建电脑,2021,37(11):104-106.DOI:10.16707/j.cnki.fjpc.2021.11.025.

[4]单树倩,任佳勋.基于SSMt和Vue框架的数据库原理网站设计与实现[J].电脑知识与技术,2021,17(30):40-41+50.DOI:10.14004/j.cnki.ckt.2021.2868.

[5]党娜,李昊,刘洋. 一种基于手机银行进行失物寻找及失物招领的方法及系统[P]. 北京市:CN113159442A,2021-07-23.

[6]Fuyuan Cheng. Talent Recruitment Management System for Small and Micro Enterprises Based on Springboot Framework[J]. Advances in Educational Technology and Psychology,2021,5(2).

[7]李孝华,段平,李佳,王云川.基于WebGIS的失物招领系统设计与实现[J].地理空间信息,2020,18(10):64-66+5.

[8]王庆月,吴宇,张天宝.基于微信小程序的失物招领系统开发[J].电子质量,2020(10):66-70.

[9]Jian Chen,Chen Jian,Pan Hailan. Design of Man Hour Management Information System on SpringBoot Framework[J]. Journal of Physics: Conference Series,2020,1646(1).

[10]侯泽民,王斌.高校失物招领平台的设计与实现[J].现代信息科技,2020,4(15):1-4.DOI:10.19850/j.cnki.2096-4706.2020.15.001.

[11]谢廷俊.基于Web的校园失物招领系统[J].信息与电脑(理论版),2019(10):109-111+119.

[12]钱若芸,任雨杰.基于微信公众平台的失物招领系统设计[J].电脑知识与技术,2019,15(15):85-87+91.DOI:10.14004/j.cnki.ckt.2019.1599.

[13]黄振兴. 高校后勤管理移动应用系统的设计与实现[D].湖北工业大学,2018.

[14]翟阳阳,潘清,刘文艳,夏翃,王珂,田新.基于医学院校计算机实验室管理平台的失物招领系统研发[J].中国医学装备,2018,15(06):133-136.

[15]高越. 高校失物招领系统的设计与实现[D].吉林大学,2017.

[16]. Chargerback, Inc.; Patent Issued for Centralized Lost and Found System (USPTO 9367527)[J]. Journal of Engineering,2016.

[17]MartinM,LamMS.AutomaticGenerationofXSSandSQLInjectionAttackswithGoal-directedModelCheckingUsenixSecuritySymposium,July28-August1,2008,SanJose,Ca,Usa.2018:31-44.

[18]闫新.基于WEB的校园失物招领系统设计与实现.电子科技大学,2014.

[19]BeckK,GammaE.Test-infected:programmerslovewritingtestsMoreJavagems.CambridgeUniversityPress,2015:357-376.

[20]GuptaP,GovilMC.SpringWebMVCFrameworkforrapidopensourceJ2EEapplicationdevelopment:acasestudy.InternationalJournalofEngineeringScience&Technology,2015,2(6).

致谢

本次设计历时3个月。在这个毕业设计中,它离不开指导教师的指导,使事情基本顺利。指导老师无论是在毕业设计历经中,还是在论文做完中都给了了我特别大的助益。另1个方面,教师认真负责的工作姿态,谨慎的教学精神厚重的理论水准都使我获益匪浅。他勤恳谨慎的教学育人学习姿态也给我留下了特别特别深的感觉。我从老师那里学到了很多东西。在理论和实践中,我的技能得到了特别大的提高。在此,特向教师表示由衷的感激。

经过对该毕业设计的全部研究和开发,我的系统研发经历了从需求分析到实现详细功能,再到最终测试和维护的特殊进展。让我对系统研发有了更深层次的认识。如今我的动手本领单独处理疑惑的本领也获取到了特别大的演练学习增多,这是这次毕业设计最好的收获。

最后,在整个系统开发过程中,我周围的同学和朋友给了我很多意见,所以我很快就确认了系统的商业思想。在次,我由衷的向他们表示感激。

点赞+收藏+关注 → 私信领取本源代码、数据库

Guess you like

Origin blog.csdn.net/weixin_61498557/article/details/131619596