ssm+mysql online teaching evaluation system-computer graduation project source code 09259

Summary 

With the advent of the Internet trend, all walks of life are considering using the Internet to promote themselves. The best way is to establish their own Internet system and maintain and manage it. In actual application, the working rules and development steps of the application software are used to build an online teaching evaluation system using Java technology.

This design mainly implements an online teaching evaluation system that combines the advantages of humanization, high efficiency, convenience, etc., and completes the homepage, carousel chart, announcement information, resource management (news list, news classification list) system users (administrators, student users) ) module management (evaluation information, evaluation records, taught subjects) and other functional modules. The system communicates with the server through the browser to realize data interaction and changes. Just use a computer and move your fingers to operate the system and realize data communication management. The design process of the entire system fully considers issues such as data security, stability and reliability, and the operation process is simple. This system improves work efficiency and reduces errors and omissions in data storage through scientific management methods and convenient services.

The online teaching evaluation system uses Java language and is developed using SSM technology. In terms of data, Microsoft's MySQL relational database is mainly used as the data storage medium to complete the development of the system.

Keywords: online teaching evaluation system; Java language; ssm framework; mysql

SSM online teaching evaluation system

Abstract

  With the arrival of the internet trend, various industries are considering using the internet to promote themselves. The best way is to establish their own internet system, maintain and manage it. In practical applications, the working rules and development steps of the application software are constructed using Java technology to build an online teaching evaluation system.

This design mainly implements an online teaching evaluation system that combines the advantages of humanization, efficiency, and convenience. It completes functional modules such as homepage, rotation chart, announcement information, resource management (news list, news classification list), system user (administrator, student user) module management (evaluation information, evaluation records, and taught subjects), etc. The system communicates with the server through a browser to achieve data interaction and changes. You only need to use a computer and move your fingers to operate the system, achieving data communication management. The entire system design process fully considers issues such as data security, stability, and reliability, and the operation process is simple. This system improves work efficiency and reduces errors and omissions in data storage through scientific management and convenient services.

The online teaching evaluation system is developed using Java language and ssm technology. In terms of data, Microsoft's MySQL relational database is mainly used as the data storage medium to complete the system development.

Keywords: online teaching evaluation system; Java language; SSM framework; mysql

Table of contents

Chapter 1 Introduction

Chapter 2 Introduction to related technologies

Chapter 3 System Analysis

Chapter 4 System Design

Chapter 5 System Implementation

Chapter 6 System Testing

Summarize

Acknowledgments

references

Chapter 1 Introduction

1.1 Research background

With the rapid development of modern computer science and the application and promotion of information and communication technology, the teaching management models of various schools are undergoing tremendous changes. The education and practice of informatization and digitalization of school teaching management work are also receiving more and more attention. Students' teaching evaluation work is closely related to students' academic studies and teachers' teaching work, and is also an important part of information management in colleges and universities. The purpose of school-wide elective courses is to expand students' knowledge, strengthen students' quality education, and cultivate compound senior talents, which is of irreplaceable importance.

Today's society has increasingly higher requirements for education level and teaching management software and hardware, which puts forward more requirements for a school to have a complete set of teaching management software. To realize this function, school administrators are required to equip an efficient online teaching evaluation system so that they can implement a good set of complete management within the school and respond to the needs of teachers and students as quickly as possible, providing them with timely Provide services and provide them with an efficient and convenient environment. The student evaluation system of colleges and universities is an important application system in the campus network. It has greatly improved the basic environment of school teaching, scientific research and management, and reflects the modernization level of school management to a certain extent.

1.2 Development significance

From a student's perspective, due to the reform of the school teaching system, most colleges and universities now begin to implement the student's independent teaching evaluation model. The traditional teaching model (students follow the courses arranged by the school) can no longer adapt to the new teaching model. If teaching is still evaluated on paper, it will waste a lot of human and material resources on the one hand, and waste time and money on the other. Avoidable errors and other situations occur in the artificial statistical aggregation process. As the number of students in colleges and universities increases, the above disadvantages will be increasingly exposed. If the Internet is used for teaching evaluation, students can complete several times the original workload of the academic affairs department by simply entering their personal evaluation information in front of the computer. From a teacher's perspective, it is easier for teachers to apply for substitute teaching and complete the course release work, and it is faster to obtain teaching information. Therefore, the teaching evaluation system can greatly reduce teachers' workload and facilitate teaching work.

1.3 Development status

Compared with domestic teaching and research software, foreign teaching and research software was developed earlier and is relatively mature. As early as the late 1970s, the United States established NSFNET (National Science Foundation Network), and its project applications and project progress reports were all conducted online. Its online student evaluation system is also very complete. Students from all over the world can sit at home and complete the entire process of study and life through the Internet, including enrollment, evaluation, examinations, graduation thesis, and obtaining a degree. At present, there are hundreds of well-established distance education schools in the world. Online education is playing a huge role in various places, cultivating a large number of talents for countries around the world. All these show that the application of Internet-based campus network has penetrated into every aspect of the campus.     

Many colleges and universities in our country have implemented a credit system. Its core is to allow students to freely evaluate teaching, that is, to give students the autonomy of learning. Here, the restrictive factors when students evaluate teaching are relatively complex, and the workload is also large, and it often needs to be completed in a short period of time. The use of computer-assisted teaching evaluation can test and count a large amount of teaching evaluation data in real time, and output the evaluation results very conveniently, while also avoiding errors that are easy to occur during manual processing.

Chapter 2 Introduction to related technologies

2. 1 Introduction to JAVA

Java mainly uses CORBA technology and security model to protect data in Internet applications. It also provides full support for EJB (Enterprise JavaBeans), java servlet API, JSP (java server pages), and XML technology. The JAVA language is an object-oriented language that provides the most basic methods to complete specified tasks. Developers only need to know some concepts to write some applications. Java programs are relatively small and their code can run on small machines. Java is a computer programming language with three main features: encapsulation, inheritance, and polymorphism. It is widely used in enterprise web application development and mobile application development.

The difference between the Java language and general compilers and literal translation is that Java first converts the source code into bytecode and then converts it into an executable file for the JVM, which can run on a variety of different JVMs. Therefore, its cross-platform nature is achieved. While this made Java very slow in its early days, it has improved as Java has developed.

2.2 MySql database

The language of Mysql is unstructured and users can work on the data. MySQL has attracted much attention because of its speed, reliability and adaptability. Most people agree that MySQL is the best choice for managing content without transactional processing. And because Mysql's language and structure are relatively simple, but its functions and amount of stored information are very powerful, it has been widely used.

The role of Mysql database in the programming process is very extensive, bringing great convenience to users for data query. The application of Mysql database is highly flexible and powerful, so only a small piece of code is needed to implement a certain function, unlike other programs that require writing large pieces of code. Generally speaking, the language of Mysql database is relatively simpler.

Data process analysis is primarily a repository of data storage, which is performed on a computer rather than a real-life repository. Data is stored in a fixed format, not in an unordered manner. The definition is: it has a fixed format for a long time and can be stored in a shared computer memory. Database management mainly includes data storage, modification and addition, and the establishment of data tables. In order to ensure the normal operation of system data, some capable processors can manage it without requiring professional people to handle it. The establishment of the data table can adjust the data in the data table, recombine and reconstruct the data to ensure the security of the data. Due to the powerful functions of the database, the development of this system mainly uses Mysql for data management.

2.3 B/S architecture 

The B/S structure also has many features. For example, signal requests can be made in many browsers. And it can appropriately reduce the user's workload. By installing or configuring a small amount of running software on the client, the user's workload can be gradually reduced. The operation of these functions is mainly controlled by the server. As the technology of the software continues Mature, the most important feature is that it cooperates with the browser, which brings great convenience to software development. It can not only reduce development costs, but also continuously strengthen the software functions of the system. The layers are independent of each other and the presentation layer is the B/S The structure completes the main characteristics of interconnection.

2.4 Introduction to MVVM pattern:

MVVM is the abbreviation of Model-View-ViewModel. It is essentially an improved version of MVC. MVVM abstracts the state and behavior of the View, allowing us to separate the view UI and business logic. Of course, ViewModel has already done these things for us. It can take out the data of the Model and help handle the business logic involved in the View due to the need to display content. Microsoft's WPF brings new technical experiences, such as Silverlight, audio , video , 3D , animation ..., which results in the software UI layer being more detailed and customizable. At the same time, at the technical level, WPF also brings new features such as Binding, Dependency Property, Routed Events, Command, DataTemplate, ControlTemplate and so on. The origin of the MVVM (Model-View-ViewModel) framework is a new architectural framework that evolved from the application method of combining the MVP (Model-View-Presenter) pattern with WPF . It is based on the original MVP framework and incorporates the new features of WPF to cope with increasingly complex changes in customer needs.

2.5 Three major frameworks of ssm

The SSM (Spring+SpringMVC+MyBatis) framework set is integrated by the two open source frameworks Spring and MyBatis (SpringMVC is part of Spring). It is often used as a framework for web projects with relatively simple data sources.

2.5.1 Spring
Spring is like a big factory that assembles beans in the entire project. In the configuration file, you can specify the use of specific parameters to call the constructor method of the entity class to instantiate the object. It can also be called the glue in the project.
The core idea of ​​Spring is IoC (Inversion of Control), which means that programmers no longer need to explicitly `new` an object, but let the Spring framework do it all for you.
2.5.2 SpringMVC
SpringMVC intercepts user requests in the project. Its core Servlet, DispatcherServlet, assumes the responsibilities of intermediary or front desk, and matches user requests to the Controller through HandlerMapping. The Controller is the specific operation performed in response to the request. SpringMVC is equivalent to struts in the SSH framework.
2.5.3 mybatis
mybatis is an encapsulation of jdbc, which makes the underlying operations of the database transparent. The operations of mybatis are centered around a sqlSessionFactory instance. Mybatis is associated to the Mapper file of each entity class through the configuration file. The Mapper file is configured with the SQL statement mapping required for each class to the database. Every time you interact with the database, get a sqlSession through sqlSessionFactory, and then execute the sql command.

The page sends a request to the controller, the controller calls the business layer processing logic, the logic layer sends a request to the persistence layer, the persistence layer interacts with the database, and then returns the result to the business layer, the business layer sends the processing logic to the controller, and the controller then Call the view to display the data.

Chapter 3 System Analysis

3.1 Feasibility analysis

This design is based on B/S mode and uses Java technology to implement MySQL database and Myeclipse. The overall feasibility is divided into the following three aspects.

3.1.1 Technical feasibility analysis

The so-called technical feasibility refers to whether the functions planned in the early stage can be satisfied within a limited time. Will you encounter problems that cannot be solved in development and design? Whether the completed project can be used well, and if there are shortcomings, will it be very difficult to maintain in the later period? After evaluating the system, it was determined that existing technology could achieve the goals. Using Java technology to implement dynamic pages, embedding low-dependency design patterns, flexible databases, and stable servers, the operating efficiency of the entire system is greatly improved. It can be seen from this that achieving the goal at the technical level is not an unreasonable idea.

3.1.2 Economic feasibility analysis

Most of the tools used in the project are currently popular open source and free, so in the early stage of development, the funds used for the project will be greatly reduced, and the development of the software will not be affected by funds during the project startup period, so It is still economically feasible. Try to meet the needs of users with the least amount of money. Save money on labor costs and equipment costs. We will go further and further on the road of paperlessness and high efficiency.

3.1.3 Operation feasibility analysis

The operation of realizing the functions of this system is very simple. Common configurations of ordinary computers can run this software, and as long as you have basic knowledge of computer use, you can use this software smoothly. The computer has the ability to connect to the Internet and can access the system normally. The operator does not need to have any superb abilities. He only needs to understand the business process and perform correct operations according to professional knowledge, so the online evaluation system is operationally feasible.

3.1.4 Feasibility analysis of legal regulations

Does developing software violate the law? This involves the issue of whether the software or system can be released. If you break the law, you will be punished by law. A common legal issue is software plagiarism. If you copy other people's software, you will be severely punished.

3.2 Requirements analysis

Before system development and design, you should make a preliminary idea about the functions, clearly understand what sections the management system has, what functions each section has, whether the overall design meets the needs of users, and then conduct a detailed analysis and summary of the developed system functions. , thereby designing a complete system and implementing it. Communication analysis between users and developers to achieve the best level of understanding and optimize system functionality.

The student use case diagram is shown below.

Figure 3-1 Student use case diagram

The administrator use case diagram is shown below.

Figure 3-2 Administrator use case diagram

After analyzing the needs of the online teaching evaluation system, the entire system is mainly divided into administrators and students, and the branch functions under each module are different. The student module includes: home page, announcement information, news information, and teaching evaluation information; the administrator module includes: home page, carousel chart, announcement information, resource management (news list, news category list) system user (administrator, student user) module Management (evaluation information, evaluation records, taught subjects) management and other modules.

3.3 Non-functional requirements analysis

There are many non-functional requirements for the system, such as performance requirements, maximum number of users that can be hosted, stability, ease of use, etc. This system analysis takes into account the need for ease of use. Because the system is for people to use, it must be fully considered from the user's perspective and the user experience to make the system easy to understand, easy to use and easy to operate.

3.4 Business process analysis

3.4.1Login process

The login module mainly meets the permission login of administrators and users. The user login flow chart is shown in Figure 3-3.

Figure 3-3 Login flow chart

3.4.2 Registration process

Users who do not have an account can enter the registration interface to register. The user registration flow chart is shown in Figure 3-4.

Figure 3-4 Registration flow chart

3.4.3 Add information process

When the user adds information, the information number is automatically generated. The system will verify the added information. If the verification passes, it will be added to the database. If the information is added successfully, the addition will fail. The process of adding information is shown in Figure 3-5.

Figure 3-5 Add information flow chart

3.4.4Delete information process

The user can select the information to be deleted and perform the information deletion operation. When deleting the information, the system prompts whether you are sure to delete the information. If yes, the information is deleted successfully and the system database deletes the information. The flow chart of deleting information is shown in Figure 3-6.

Figure 3-6 Deletion information flow chart

3.5 Data process analysis

The zero-layer data flow chart includes modules such as login, user functions, and retrieval and maintenance. The data storage used in the login module includes user account documents. The storage required by the user function module is the data documents of each user function module. Retrieval and maintenance use the above. Data documents are retrieved by keywords.

The zero-layer data flow diagram of the system is shown in the figure below.

Figure 3-2 System data flow diagram (zero layer)

The one-level data flow chart is a refinement of the zero-level data flow chart. Login is subdivided into filling in login data and improving data, and user functions are subdivided into basic user functions and main user functions.

The one-level data flow diagram of the system is shown in the figure below.

Figure 3-3 System data flow diagram (one layer)

The second-layer data flow is a refinement of filling in login information and user functions in the first-layer data flow layer diagram. That is: filling in login information is refined into filling in information and background review, and user functions are refined into operations such as home page, announcement information, news information, and evaluation information.

The second-layer data flow diagram of the system is shown in the figure below.

Figure 3-4 System data flow diagram (layer 2)

Chapter 4 System Design

4.1 System structure design

At present, the main data access method of the B/S system is: users can enter the system through the browser page, and the system can automatically process the requests sent by the users to the server. The processing of the requests is carried out in the background of the system. By performing corresponding operations on the page, you can see the processing results delivered by the server. The online teaching evaluation system is mainly divided into a three-layer architecture design of view-model-control. In the view layer, it mainly operates the data that is fed back and displayed on the server side to the client. In the model layer, it mainly handles related business logic, data integration, etc. The final control layer is between the view and the model, mainly It is to adjust the relationship between the two layers and finally implement the transmission of data.

The system architecture diagram is shown in the figure below.

Figure 4-1 System architecture diagram

4.2 Function module design

The purpose of system design is to analyze all functional structures included in the system and prepare developers for the design, development and implementation of the system. After preliminary demand investigation, analysis and sorting, the overall demand determined mainly includes multiple modules, namely: home page, carousel chart, announcement information, resource management (news list, news classification list) system users (administrators, students) User) module management (evaluation information, evaluation records, taught subjects). The overall role of the system is divided into two parts, one is the student, and the last is the administrator. The distribution of permissions is also very obvious. In addition to browsing information, student users also have permissions to query and manage their own account information, evaluation information, etc.; administrators are the highest permission holders.

The system functional structure diagram is shown in the figure below.

Figure 4-2 System functional structure diagram

4.3 Database design

4.3.1 Concept model design

For a system to be developed, ER diagrams can allow others to understand the transactions of the system and the relationships between them faster and easier. According to the conclusions drawn in the system analysis stage, it is determined that there are multiple entities in the online teaching evaluation system, namely teachers, administrators, courses, teaching evaluation, and students.

The overall ER diagram of the system is shown in the figure below.

Figure 4-4 Overall system ER diagram

4.3.2 Data table design

The logical structure of the database is to describe the ER diagram using specific fields in the database. Use field and data type descriptions to materialize object characteristics, and finally form a database table structure with certain logical relationships. Part of the data structure required by the online teaching evaluation system is shown in the following table.

Table access_token (login access duration)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

token_id

int

10

0

N

Y

Temporary access badge ID

2

token

varchar

64

0

Y

N

temporary access badge

3

info

text

65535

0

Y

N

4

maxage

int

10

0

N

N

2

Maximum lifespan: Default 2 hours

5

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

6

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

7

user_id

int

10

0

N

N

0

user ID:

Table article (article: article for content management system)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

article_id

mediumint

8

0

N

Y

Article id: [0,8388607]

2

title

varchar

125

0

N

Y

Title: [0,125] is used in the title tag of articles and html

3

type

varchar

64

0

N

N

0

Article classification: [0,1000] is used to search for articles of the specified type

4

hits

int

10

0

N

N

0

Number of clicks: [0,1000000000] Number of people who visited this article

5

praise_len

int

10

0

N

N

0

Number of likes

6

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

7

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

8

source

varchar

255

0

Y

N

Source: [0,255] Source of article

9

url

varchar

255

0

Y

N

Source address: [0,255] used to jump to the website where the article was published

10

tag

varchar

255

0

Y

N

Tag: [0,255] is used to mark the relevant content of the article. Multiple tags are separated by spaces.

11

content

longtext

2147483647

0

Y

N

Text: the main content of the article

12

img

varchar

255

0

Y

N

cover picture

13

description

text

65535

0

Y

N

Article description

Table article_type (article classification)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

type_id

smallint

5

0

N

Y

Category ID: [0,10000]

2

display

smallint

5

0

N

N

100

Display order: [0,1000] determines the order in which categories are displayed.

3

name

varchar

16

0

N

N

Category name: [2,16]

4

father_id

smallint

5

0

N

N

0

Parent category ID: [0,32767]

5

description

varchar

255

0

Y

N

Description: [0,255] describes the role of this classification

6

icon

text

65535

0

Y

N

Category icon:

7

url

varchar

255

0

Y

N

External link address: [0,255] If this category jumps to other websites, set it on the URL

8

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

9

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

Table auth (user rights management)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

auth_id

int

10

0

N

Y

Authorization ID:

2

user_group

varchar

64

0

Y

N

user group:

3

mod_name

varchar

64

0

Y

N

Module name:

4

table_name

varchar

64

0

Y

N

Table Name:

5

page_title

varchar

255

0

Y

N

page title:

6

path

varchar

255

0

Y

N

Routing path:

7

position

varchar

32

0

Y

N

Location:

8

mode

varchar

32

0

N

N

_blank

Jump method:

9

add

tinyint

3

0

N

N

1

Is it possible to add:

10

of the

tinyint

3

0

N

N

1

Can it be deleted:

11

set

tinyint

3

0

N

N

1

Whether it can be modified:

12

get

tinyint

3

0

N

N

1

Is it possible to view:

13

field_add

text

65535

0

Y

N

Add fields:

14

field_set

text

65535

0

Y

N

Modify fields:

15

field_get

text

65535

0

Y

N

Query fields:

16

table_nav_name

varchar

500

0

Y

N

Cross-table navigation name:

17

table_nav

varchar

500

0

Y

N

Cross-table navigation:

18

option

text

65535

0

Y

N

Configuration:

19

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

20

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

table collect (collection)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

collect_id

int

10

0

N

Y

Collection ID:

2

user_id

int

10

0

N

N

0

Collector ID:

3

source_table

varchar

255

0

Y

N

Source table:

4

source_field

varchar

255

0

Y

N

Source field:

5

source_id

int

10

0

N

N

0

Source ID:

6

title

varchar

255

0

Y

N

title:

7

img

varchar

255

0

Y

N

Cover:

8

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

9

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

Table comment (comment)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

comment_id

int

10

0

N

Y

Comment ID:

2

user_id

int

10

0

N

N

0

Commenter ID:

3

reply_to_id

int

10

0

N

N

0

Reply comment ID: empty is 0

4

content

longtext

2147483647

0

Y

N

content:

5

nickname

varchar

255

0

Y

N

Nick name:

6

avatar

varchar

255

0

Y

N

Avatar address: [0,255]

7

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

8

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

9

source_table

varchar

255

0

Y

N

Source table:

10

source_field

varchar

255

0

Y

N

Source field:

11

source_id

int

10

0

N

N

0

Source ID:

Table hits (user clicks)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

hits_id

int

10

0

N

Y

Like ID:

2

user_id

int

10

0

N

N

0

Liked by:

3

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

4

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

5

source_table

varchar

255

0

Y

N

Source table:

6

source_field

varchar

255

0

Y

N

Source field:

7

source_id

int

10

0

N

N

0

Source ID:

Notice (announcement)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

notice_id

mediumint

8

0

N

Y

Announcement id:

2

title

varchar

125

0

N

N

title:

3

content

longtext

2147483647

0

Y

N

text:

4

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

5

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

Express praise (like)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

praise_id

int

10

0

N

Y

Like ID:

2

user_id

int

10

0

N

N

0

Liked by:

3

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

4

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

5

source_table

varchar

255

0

Y

N

Source table:

6

source_field

varchar

255

0

Y

N

Source field:

7

source_id

int

10

0

N

N

0

Source ID:

8

status

bit

1

0

N

N

1

Like status: 1 is like, 0 is canceled

Table slides (carousel)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

slides_id

int

10

0

N

Y

Carousel image ID:

2

title

varchar

64

0

Y

N

title:

3

content

varchar

255

0

Y

N

content:

4

url

varchar

255

0

Y

N

Link:

5

img

varchar

255

0

Y

N

Carousel image:

6

hits

int

10

0

N

N

0

Number of clicks:

7

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

8

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

Table student_users (student users)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

student_users_id

int

10

0

N

Y

Student User ID

2

student_id

varchar

64

0

Y

N

Student ID number

3

student_name

varchar

64

0

Y

N

student name

4

examine_state

varchar

16

0

N

N

passed

Approval Status

5

recommend

int

10

0

N

N

0

Intelligent Recommendation

6

user_id

int

10

0

N

N

0

User ID

7

create_time

datetime

19

0

N

N

CURRENT_TIMESTAMP

creation time

8

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time

Table teaching_evaluation_information (evaluation information)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

teaching_evaluation_information_id

int

10

0

N

Y

Evaluation information ID

2

assessment_no

varchar

64

0

N

N

Evaluation number

3

teacher_photos

varchar

255

0

Y

N

Teacher photos

4

teacher_name

varchar

64

0

Y

N

Teacher name

5

teaching_subjects

varchar

64

0

Y

N

Subjects taught

6

scoring_restrictions

varchar

64

0

Y

N

Scoring restrictions

7

total_score_of_evaluation

int

10

0

Y

N

0

Total assessment score

8

teacher_introduction

longtext

2147483647

0

Y

N

Teacher Profile

9

recommend

int

10

0

N

N

0

Intelligent Recommendation

10

timer_title

varchar

64

0

Y

N

timer title

11

timing_start_time

datetime

19

0

Y

N

Timing start time

12

timing_end_time

datetime

19

0

Y

N

Timing end time

13

limit_times

int

10

0

N

N

0

Limit the number of times

14

limit_type

tinyint

4

0

N

N

2

Limit type 1-times per day, 2-total times

15

create_time

datetime

19

0

N

N

CURRENT_TIMESTAMP

creation time

16

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time

Table teaching_evaluation_records (evaluation records)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

teaching_evaluation_records_id

int

10

0

N

Y

Evaluation record ID

2

assessment_no

varchar

64

0

Y

N

Evaluation number

3

teacher_photos

varchar

255

0

Y

N

Teacher photos

4

teaching_subjects

varchar

64

0

Y

N

Subjects taught

5

teacher_name

varchar

64

0

Y

N

Teacher name

6

student_users

int

10

0

Y

N

0

student user

7

student_name

varchar

64

0

Y

N

student name

8

teaching_evaluation_score

int

10

0

Y

N

0

Evaluation score

9

evaluation_content

text

65535

0

Y

N

comment content

10

recommend

int

10

0

N

N

0

Intelligent Recommendation

11

user_id

int

10

0

N

N

0

User ID

12

create_time

datetime

19

0

N

N

CURRENT_TIMESTAMP

creation time

13

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time

Table teaching_subjects (subjects taught)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

teaching_subjects_id

int

10

0

N

Y

Subject ID taught

2

teaching_subjects

varchar

64

0

Y

N

Subjects taught

3

recommend

int

10

0

N

N

0

Intelligent Recommendation

4

create_time

datetime

19

0

N

N

CURRENT_TIMESTAMP

creation time

5

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time

Table upload (file upload)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

upload_id

int

10

0

N

Y

Upload ID

2

name

varchar

64

0

Y

N

file name

3

path

varchar

255

0

Y

N

access path

4

file

varchar

255

0

Y

N

file path

5

display

varchar

255

0

Y

N

display order

6

father_id

int

10

0

Y

N

0

Parent ID

7

dir

varchar

255

0

Y

N

folder

8

type

varchar

32

0

Y

N

file type

Table user (user account: used to save user login information)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

user_id

mediumint

8

0

N

Y

User ID: [0,8388607] User obtains other user-related data

2

state

smallint

5

0

N

N

1

Account status: [0,10](1 available | 2 abnormal | 3 frozen | 4 logged out)

3

user_group

varchar

32

0

Y

N

User group: [0,32767] determines user identity and permissions

4

login_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Last Login Time:

5

phone

varchar

11

0

Y

N

Mobile phone number: [0,11] User’s mobile phone number, used to retrieve password or log in

6

phone_state

smallint

5

0

N

N

0

Mobile phone certification: [0,1] (0 not certified | 1 under review | 2 certified)

7

username

varchar

16

0

N

N

Username: [0,16] The account name used by the user to log in

8

nickname

varchar

16

0

Y

N

Nickname: [0,16]

9

password

varchar

64

0

N

N

Password: [0,32] The password required for user login, consisting of 6-16 digits or English

10

email

varchar

64

0

Y

N

Email: [0,64] User's email, used to retrieve password or log in

11

email_state

smallint

5

0

N

N

0

Email certification: [0,1] (0 not certified | 1 under review | 2 certified)

12

avatar

varchar

255

0

Y

N

Avatar address: [0,255]

13

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

Table user_group (user group: used for user front-end identity and authentication)

serial number

name

type of data

length

Decimal places

Allow null values

primary key

default value

illustrate

1

group_id

mediumint

8

0

N

Y

User group ID: [0,8388607]

2

display

smallint

5

0

N

N

100

Display order: [0,1000]

3

name

varchar

16

0

N

N

Name: [0,16]

4

description

varchar

255

0

Y

N

Description: [0,255] Describes the characteristics or scope of permissions of this user group

5

source_table

varchar

255

0

Y

N

Source table:

6

source_field

varchar

255

0

Y

N

Source field:

7

source_id

int

10

0

N

N

0

Source ID:

8

register

smallint

5

0

Y

N

0

Registration location:

9

create_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Creation time:

10

update_time

timestamp

19

0

N

N

CURRENT_TIMESTAMP

Update time:

Chapter 5 System Implementation

5.1 Basic tasks

This chapter introduces in detail the implementation process and implementation methods of each major functional module of the system. Each function is implemented. The fundamental goal of the detailed design is to determine the specific implementation of the required system. Each module corresponds to the corresponding interface and display. of accompanying pictures. It is mainly described from the aspects of the implementation of the main page, the implementation of the login module, the implementation of the evaluation information module, the implementation of the evaluation record management module, etc.

The system presents a simple and elegant backend: the interface is simple and well-organized, allowing users to use it with ease. Out of concern for the broad user base of the system, there should be a backend with good performance.

5.2 Implementation of login module

The system's login window is the user's entrance, and users can only access it after successfully logging in. By submitting the form at login, the background process determines whether the user is a legitimate user, jumps to the page, and enters the system.

Login legality judgment process: After the user enters the account and password, the system first determines the legality of the input data, then sends a login request on the login.jsp page and calls the dopost method of the mainctrl class under src to verify.

The IPO of the user login module is as follows:

Enter: username and password.

deal with:

1) Check whether the account number and password entered by the user are correct and exist in the database.

2) Extract records from the database and store them in the local session (default timeout = 30min).

3) Based on the user name, display it on the system homepage.

Output: Information about success.

The login flow chart is shown below.

Figure 5-1 Login flow chart

The system login interface is as follows.

Figure 5-2 System login interface

管理员功能,管理员后台功能为:首页、轮播图、公告信息、资源管理(新闻列表、新闻分类列表)系统用户(管理员、学生用户)模块管理(评教信息、评教记录、所教科目)等功能,如下图所示:

                      图 5-3 管理员后台功能界面图

学生管理,在学生管理界面图可对添加学生信息内容:学号、密码、学生姓名、性别、身份证、电话、院系、班级、照片等信息,并可在学生管理查询页面进行编辑删除详情等操作,如图5-4

图5-4学生管理界面图

新闻列表管理,在新闻列表页面中对新闻信息进行添加内容:标题、封面图、文章分类、标签、创建时间等内容,还可在新闻查询页面对已有的新闻信息进行编辑删除详情等操作,如图5-5所示:

                        图5-5 新闻信息管理界面图

评教信息管理,在评教信息管理页面图中可以添加测评编号、教师图片、所教科目、打分规则、测评总分等内容,还可在评教信息管理查询页面对已有的评教信息进行查看评论,编辑删除详情等操作 如图5-6

                             图5-6评教信息界面图

评教记录管理,在评教记录管理可查询评教记录信息:测评编号、教师图片、所教科目、教师姓名、学生用户、评教分数添加时间等内容,还可在该页面进行编辑删除详细等操作,如图5-7

图5-7 评教记录管理界面图

课程评价管理,在课程评价管理页面列表可查询评价信息:课程编号、课程名称、教师工号、教师姓名、学号、学生姓名、学生建议、添加时间等内容,还可在该页面进行编辑删除详细等操作,如5-8

图5-8课程评价管理界面图

6章 系统测试

6.1测试目的

在对该系统进行完详细设计和编码之后,就要对网上评教系统的程序进行测试,检测程序是否运行无误,反复进行测试和修改,使之最后成为完整的软件,满足用户的需求,实现预期的功能。

6.2测试概述

软件测试是软件开发完成后必须经过的一道程序,它在软件开发过程中地位十分重要,需要由专业的测试工程师来对软件进行各方面的测试,大到功能模块测试,小到代码的单元测试,这对测试工程师来说需要有足够的耐心和专业的测试方案,软件测试归根结底就是对软件的结构和功能的综合测评,需要做到结构稳定和功能正确,二者兼顾。软件测试也叫寻找系统bug的过程,世界上没有完美无缺、不存在bug的软件,只能将软件的bug降到最低最小,来追求极致。

6.3单元测试

在软件的测试过程中,通常测试人员需要针对不同的功能模块设计多种测试用例。通过测试用例能够及时发现代码业务逻辑上是否与真实的业务逻辑相对应,及时发现代码上或逻辑上的缺陷,以此来来完善系统,提高软件产品的质量,使软件具有良好的用户体验。

6.3.1登录功能测试

登录测试用例表如下所示。

表6-1登录测试用例

测试性能

用户或操作员登录系统

用例目的

测试用户或操作员登录系统时功能是否正常

前提条件

进入用户登录页面或操作员登录页面

输入条件

预期输出

实际情况

各项信息不予填写,直接点击登陆按钮

不允许登录,提示填写账号相关信息

一致

填写错误的登录名或密码后点击登录系统

提示用户名或密码错误,要求重新填写进行登录

一致

填写与验证码信息不一致的信息

系统显示出提示信息,表明验证码错误,要求重新填写

一致

6.3.2评教功能测试

评教信息测试用例表如下所示。

表6-3评教信息测试用例

测试性能

用户进行评教的操作

用例目的

测试用户进行评教操作时,系统的功能是否正常

前提条件

用户进入详情页,该能够被评教

输入条件

预期输出

实际情况

用户未登录,点击评教按钮

跳转至登录页面,提示用户先进性登录

一致

正常的登录用户,点击评教按钮

系统弹出提示框,提示用户评教成功,同时该的状态更改为已评教状态

一致

6.3.3新闻功能测试

新闻管理测试用例表如下所示。

表6-4新闻管理测试用例

测试性能

新闻相关信息管理功能

用例目的

测试系统后台操作员对新闻相关信息进行管理的功能是否正常

前提条件

登录系统后台进入相关管理页面

输入条件

预期输出

实际情况

普通操作员登录,点击进入新闻相关信息管理的页面

提示非超级用户,权限不够,无法进入相关页面

一致

超级操作员登入,删除某个已被评教的新闻

提示该新闻删除失败

一致

点击增加新闻按钮

页面正常跳转

一致

增加新闻是,填写已存在的新闻编号

提示该编号已存在

一致

6.4集成测试

经过对此系统的测试,得出该系统足以满足用户日常需求,在功能项目和操作等方面也能满足操作员对于其他用户的管理。但是,还有很多功能有待添加,这个系统仅能满足大部分的需求,还需要对此系统的功能更进一步的完善,这样使用起来才能更加的完美。

7章 总结

通过网上评教系统的开发,本人巩固了之前学过的知识,如今将平时所学到的知识融合在设计中,在设计过程中,做了很多的准备,首先,在数据库系统的设计过程中,尤其是在数据库的工作原理、工作特点,对其深刻的讨论,与此同时,对于小型站点来说,最好服务器的选择,其次,利用所学的知识点分析所做的系统,并在此基础上设计。

目前本系统已经上线,正在试运行阶段,用户反馈良好,基本完成用户所需,试运行过程中没有出现阻断性问题,有一些不足和小问题也及时予以修正,系统上线后,为了保证数据的安全性,对系统进行了备份操作,系统备份是每两个月备份一次,数据库备份为每周备份一次,系统部署在租赁的云平台服务器中。

本次系统上线成功后,得到了用户的高度认可,但是在功能上和性能上还需做进一步的研究处理,使其有更高的性能和更好的用户体验。

系统在以后的升级过程中,需要解决一系列用户所提出的问题,例如打印过程中如何避免浏览器的兼容性问题,大量用户访问时,如何保持较高的响应速度,在系统今后的升级过程中将着重解决这些安全性问题。

致谢

毕业设计结束的同时也意味着四年的大学生活就要结束了。社区人员管理系统的完成以及如何在系统运行过程中实现的更好,这其中付出了很大的努力,这段时光将会终身难忘。 

在毕业设计的这一段时间里,离不开导师的细心指导,还有同学们的热情帮助,有时候几个同学在一起讨论系统中的某个功能模块如何实现,如何实现的更好,或是问题没得到有效的解决,就会没有心思做其他的事情,让我们对学习充满了动力。

在毕业设计即将结束之时,首先要感谢我的指导老师,谢谢您在毕业设计和毕业论文中对我的指导。在您的细心指导下我才能快速的掌握系统的相关功能,在您的大力帮助下我才能将课本上的知识与自己的项目结合,真正的做到学以致用。感谢您经常牺牲自己的休息时间,利用其丰富的教学和项目经验对我进行指导。课堂上,您教会我们如何学习、教会我们新的知识,在课下,您又像朋友一样亲切,教会了我很多道理,让我意识到先做人、后做事。感谢所有教过我的老师,为我倾注了大量的心血,正是你们的谆谆教诲、严谨教学才使我能顺利的完成学业,再此向你们表示深深的感谢。感谢大学里教过我的每一位老师,真心祝福您们。

在这里还得感谢我的战友们,也就是同学们对我的大力支持及帮助。正是因为有你们的不断帮助、鼓励,熬夜通宵,不停的调试、测试程序,给我带来了极大的动力,才能最终完成网站的运行。我们在一起交流、谈论的时光,都将是我们在通往未来道路上的宝贵财富。我要深深地感谢你们!

毕业在即,在今后的工作和生活中,我会铭记师长们的教诲、同学们的帮助,继续不懈努力和追求,来报答所有支持和帮助过我的人!

Finally, I would like to express my deep gratitude to all the teachers who sacrificed their rest time to review, comment and participate in the thesis defense of this article. Here, thank you from the bottom of my heart!

references

[1] Xu Pei. Application and development trends of computer software development technology in the new era [J]. Farmer Consultant, 2019(08):167.

[2] Zhang Shuai, Cui Grace, Wei Libo. Design and implementation of Internet + health online service platform [J]. Science and Technology Innovation and Application, 2019(10):91-92.

[3] Gu Liguo, Chen Cuntian, Zhang Jiarui. Analysis and design of personnel education information management system based on B/S model [J]. Computer Knowledge and Technology, 2019, 15(10): 58-59.

[4] Xu Xinzheng, Qiang Yi. Development and design of common metal material standard retrieval platform based on JSP [J]. Manufacturing Automation, 2019, 41(03): 41-43+69.

[5] Wang Zuwei, Nan Huaiyao, Zhang Ying. Design and implementation of university student apartment management system under the perspective of "Internet +" - taking Shenyang Normal University as an example [J]. Modern Commerce and Industry, 2019, 40(08) :187-188.

[6] Liao Minghua, Qi Pan. Design and implementation of student professional ability assessment management system [J]. Journal of Guangdong Communications Vocational and Technical College, 2019, 18(01): 48-52.

[7] Li Dongdong, Liu Huaming, Bi Xuehui, Wang Xiuyou. Design and implementation of used clothes claim system [J]. Computer Knowledge and Technology, 2019, 15(08): 47-50.

[8] Li Qingnian. Design and implementation of talent recruitment management system under the perspective of “Internet +” [J]. International Public Relations, 2019(03):164-165.

[9] Liu Ting, Peng Huanfeng, Shao Shuting. College exam invigilation management system based on cloud platform [J]. Computer Knowledge and Technology, 2019, 15(07): 91-92.

[10] Zhao Bingxiu. Implementation of Web face registration and login system based on Baidu AI platform [J]. Computer Knowledge and Technology, 2019, 15(07): 114-115.

[11] Dai Zhaoying, Yin Tao. Development and application practice of cost budgeting system in the steel industry [J]. Electronic Technology and Software Engineering, 2019(04):29-30.

[12] Cao Can, Liu Zhigang. Engineering science frontier and practical system based on SSH and Layui [J]. Industrial Control Computer, 2019, 32(02):91-92+96.

[13] Xie Lu. Design and implementation of Web-based examination management system [J]. Fujian Computer, 2019, 35(01): 136-137.

[14] Zhang Jidong. MySQL database based on JSP access technology [J/OL]. Electronic Technology and Software Engineering, 2017, (15): 169 (2017-08-03).

[15] Han Sifan. Basic applications of JSP and HTML in Web development [J]. Science and Technology Innovation, 2020(14):71-72.

[16]NastitiAndini,DaehaKim,JongAhnChun.Operationalsoilmoisturemodelingusingamulti-stageapproachbasedonthegeneralizedcomplementaryprinciple[J].AgriculturalWaterManagement,2020,231.

[17] ADTitisari, D. Phillips, IWWarmada, Hartono, A. Idrus.40Ar/39ArgeochronologyofthePongkorlowsulfidationepithermalgoldmineralisation, WestJava, Indonesia[J].OreGeologyReviews,2020,119.

[18]FranciscoOrtin,OscarRodriguez-Prieto,NicolasPascual,MiguelGarcia.HeterogeneoustreestructureclassificationtolabelJavaprogrammersaccordingtotheirexpertiselevel[J].FutureGenerationComputerSystems,2020,105.

[19]SatyaKrismatama,IndahRiyantini,IwangGumilar,LantunParadhitaDewanti.SelectivityofFishingGearforScomberomorusguttatus(Bloch&Schneider,1801)CommoditiesinPangandaranFishingGround,WestJava[J].AsianJournalofFisheriesandAquaticResearch,2020.

[20]ZhongXiangfu,PlaAlbert,RaynerSimon.Jasmine:aJavapipelineforisomiRcharacterizationinmiRNA-Seqdata[J].Bioinformatics,2020

To get the project source code for free, please follow ❥ Like, collect and send a private message to the blogger, thank you~

Guess you like

Origin blog.csdn.net/vx1_Biye_Design/article/details/132904735