华 中 科 技 大 学 硕 士 学 位 论 文
ABSTRACT
With the coming of the informationization and the advent of the knowledge-based economy era, the file management has become one of the absolutely necessaryeach management project for every company and institutions essential. How to be properly managed and used effectively to build a modern archive management system,has be a essential issues. From that standpoint,a student archives management system based on bar code is presented.And in the process of the preservation and transmission we implemented a information security strategy based on the key exchange to effectively improve the system's operating efficiency and data security and reliability.
The system is a students archives management system using the C/S structure, we choose Delphi and SQL Server 2000 as the development environment.According to the software engineering methods, at first we do a system needs analysis and then using UML modeling technology, we make the use case diagram of the system gradually, and do the overall design of the system. Then by dividing the system into five part, which are the user login module, students archives management module, students archives inquiries and management module, students archives type management and archives cabinets data management module, students borrow / return archives management module, and other five major modules for the detailed design of the system, we do the system design in detail including the interface and the database design. And then the ids of archives are matched with the bar code numbers, as we do the bar code?s encoding, reading and printing. System uses an information security strategy that is to make the digital signature of the upload data based on the RSA encoding algorithm and SHA-1 abstract algorithm, and in the transmission process use IDEA encoding algorithm to encode the data. Therefore,in the system the safety and reliability of information in the data transmission has been effectively protected,at the same time, the operation and management of the workers is facilitated because of the use of bar code technology.
Key words:Files management information system Bar code
Information security Database system
II
华 中 科 技 大 学 硕 士 学 位 论 文
目 录
摘 要 ............................................................................................................... I Abstract ........................................................................................................... II 1 绪论
1.1 研究背景与意义 .................................................................................. (1) 1.2 国内外研究概况 .................................................................................. (2) 1.3 论文的主要研究内容 .......................................................................... (3) 2 关键技术研究
2.1 Delphi集成开发环境 ........................................................................... (4) 2.2 条形码技术........................................................................................... (5) 2.3 数字签名技术 .................................................... (错误!未定义书签。) 2.4 UML建模技术 ..................................................................................... (5) 2.5 本章小结 ............................................................................................... (6) 3 档案管理系统的分析与设计
3.1 档案管理业务分析 .............................................................................. (7) 3.2 档案管理系统的需求分析 ................................ (错误!未定义书签。) 3.3 档案管理系统的总体设计 .................................................................. (9) 3.4 条形码的设计 .................................................................................... (11) 3.5 数字签名的设计 ................................................ (错误!未定义书签。) 3.6 数据库的设计 .................................................................................... (12) 3.7 本章小结 ............................................................................................. (13) 4 档案管理系统的实现
4.1 开发环境的选择 ................................................................................ (14)
III
华 中 科 技 大 学 硕 士 学 位 论 文
4.2 系统功能模块实现 ............................................................................ (14) 4.3 数据库访问的实现 ............................................................................ (19) 4.4 系统界面 ............................................................................................. (22) 4.5 本章小结 ............................................................................................. (24) 5 系统测试
5.1 测试用例 ............................................................................................. (25) 5.2 测试环境与配置 ................................................................................ (25) 5.3 测试方法和工具 ................................................................................ (26) 5.4 测试情况 ............................................................................................. (27) 5.5 测试数据与总结 ................................................................................ (28) 5.6 本章小结 ............................................................................................. (28) 6 总结与展望
6.1 全文总结 ............................................................................................. (30) 6.2 课题展望 ............................................................................................. (30) 致 谢 .......................................................................................................... (32) 参考文献...................................................................................................... (33)
专业排版,专业论文写作修改 降低论文重复率 制作答辩幻灯片
免费提供论文下载 论文指导等服务 免费咨询请联系淘宝旺旺:文交天下友 淘宝搜索 @文天下
新浪微博 文交天下友_修改论文
http://wentianxia.taobao.com/
IV
华 中 科 技 大 学 硕 士 学 位 论 文
V