[Computer Graduation Design] 154 Intelligent Unmanned Warehouse Management

 1. Screenshots of the system (if you need a demo video, you can chat privately)

    

Summary

Since the development of the Internet, both its theory and technology have matured, and it has been widely involved in all aspects of society. It allows information to be disseminated through the network, and it can serve people well with information management tools. For information management confusion, high error rate, poor information security, high labor intensity, time-consuming and labor-intensive and other problems, the use of intelligent unmanned warehouse management can be effectively managed, so that information management can be more scientific and standardized.

The intelligent unmanned warehouse management uses the Java language to code in the Eclipse environment, and uses Mysql to create a data table to save the data generated by the system.

In short, intelligent unmanned warehouse management centralized management information has many advantages such as strong confidentiality, high efficiency, large storage space, and low cost. It can reduce the cost of information management and realize the computerization of information management.

Key words : intelligent unmanned warehouse management; Java language; Mysql


directory  

directory  

Chapter 1  Introduction _

1.1 Subject background

1.2 Significance of the topic

1.3 Research content

Chapter 2 Development Environment and Technology 

2.1 MYSQL database

2.2 vue technology

2.3 Spring Boot framework

Chapter 3  System Analysis

3.1 Feasibility Analysis

3.1.1 Technical Feasibility

3.1.2 Economic feasibility

3.1.3 Operational Feasibility

3.2 System flow

3.2.1 Operation process

3.2.2 Login process

3.2.3 Delete information flow

3.2.4 Add information process

3.3 Performance requirements

Chapter 4 System Design 

4.1 Design principles

4.2 Functional structure design

4.3 Database Design

4.3.2 Database physical design

5.1 Employee Information Management

5.2 Replenishment reminder management

5.3 Item type management

5.1 Replenishment application management

Chapter 6 System Testing

6.1 Functional test

6.1.1 Login function test

6.1.2 Modify password function test

6.2 Test results

in conclusion

thank you  

references

Chapter 1  Introduction _

1.1 Subject background 

Since the development of the Internet, both its theory and technology have matured, and it has been widely involved in all aspects of society. It allows information to be disseminated through the network, and it can serve people well with information management tools. Therefore, various industries, especially large-scale enterprises and schools, have begun to use the Internet and software tools to manage information, disseminate information, share information, etc., so as to enhance their own strength and improve their competitiveness in the same industry. Opportunities for development in various fierce competitions. In view of the chaotic management of replenishment reminder information, high error rate, poor information security, high labor intensity, time-consuming and labor-intensive problems, after analysis and consideration, in the current situation, it is possible to introduce a modern management tool such as intelligent unmanned warehouse management , this tool is the best solution to solve the above problems. It can not only complete information processing in real time, but also shorten the replenishment reminder information management process, making it systematized and standardized. At the same time, it can also reduce the workload and save the manpower and funds required for replenishment reminder information management. Therefore, intelligent unmanned warehouse management is an indispensable tool in the information management link, and it is very important for managers.

1.2 Significance of the subject 

Nowadays, the types of information are becoming more and more, and the capacity of information is also becoming larger and larger, which is a sign of the information age. In recent years, computer science has developed faster and faster, and software development technology has become more and more mature. Therefore, in all fields of life, as long as there is information management, there is almost the shadow of computers. It can be said that many industries are Manage information in a computerized manner. Compared with manual operation, computerized information processing has many advantages such as strong confidentiality, high efficiency, large storage space, and low cost. For replenishment reminder information management, the use of intelligent unmanned warehouse management can be effectively managed, making information management more scientific and standardized.

In short, the significance of using intelligent unmanned warehouse management in practice is as follows:

The first point: the practical application of intelligent unmanned warehouse management can help managers complete information processing in a short time;

The second point: Through the reasonable typesetting layout of the system page, the content of the system can be displayed more intuitively, and users can read the page information at any time, and the functions provided by the operating system at any time;

The third point: computerization of information management can be realized;

The fourth point: it can reduce the cost of information management;

1.3 Research content

The design and production of intelligent unmanned warehouse management requires not only technical support, but also a lot of theoretical research. When this article introduces the intelligent unmanned warehouse management, it will proceed as follows.

The first part: Introduce the background significance of the research on intelligent unmanned warehouse management, so that users can understand the system;

The second part: introduces the environment that needs to be built to develop intelligent unmanned warehouse management, including technologies and tools;

The third part: introduce the user's functional requirements for intelligent unmanned warehouse management, as well as the performance requirements for intelligent unmanned warehouse management;

The fourth part: introduces the design scheme of the database, and the functional structure designed according to the functional requirements;

The fifth part: introduces the operation effect of the system function finally realized through coding;

Part Six: Introduces the functional test of the system, conducts a comprehensive inspection of the system, and solves the problems in the system in time until the system runs normally.


Chapter 2 Development Environment and Technology 

The coding implementation of intelligent unmanned warehouse management requires the establishment of a certain environment and the use of corresponding technologies. The following content is to introduce the technologies and tools used in intelligent unmanned warehouse management.

2.1 MYSQL database

The application program developed in this project is unpredictable in terms of data operation, and it is often changed. There is no way to directly write the data in the document, which is not only unsafe, but also cannot realize the function of the application program. If the data storage function required by the application program is to be realized, the choice of professional database storage software is unavoidable. Basically, the functions implemented by the application program are not too complicated, and any relational database software on the market can implement them. Referring to my own learning progress and operating habits, the Oracle database is suitable, but the required installation software is very large, and many unnecessary functions are turned on, which consumes a lot of computer resources, so I did not choose the Oracle database. , and the SQL Server database has been learned, but when installing, because there may be other software on the computer, problems often occur, and if the installation problem is not solved, the operating system needs to be reinstalled, so for the existing software Another waste of time. Only the MySQL database, the installation package is small, the installation speed is fast, and the operation is simple. Even if there is a problem with the installation, it is easy to solve. There is no need to reinstall the operating system, and it will not affect other software running on the computer. It consumes less resources. The most important thing is the function. Aspects fully meet the design needs, so the MySQL database is finally selected as the database required for application software development.

2. 2  vue technology  

At the beginning of the rise of dynamic websites, Java, as a high-level programming language, naturally would not give up the cake in this field. Sun launched Servlet as a technical standard for outputting dynamic websites. Although it was not very popular with programmers at the time, there were not many choices at the beginning. In the following months, the Java language came out, regardless of performance and efficiency. At least A distinction is made between dynamic code blocks and static code blocks required for writing web pages, which greatly improves writing efficiency and readability, so many Java programmers and junior programmers who have just entered the industry have chosen the Java language as their career. Development direction, in order to maintain the status of the Java language in the high-level programming language and prevent java from continuing to steal market share, Sun and the Apache Foundation have developed a new technical standard for Java dynamic web pages, which is vue technology. Vue absorbs all the advantages of the java language in page writing, but backed by the huge background of Java EE, it can realize many functions that can be realized through Java components. Those components can be directly referenced on the vue page, making vue more Strong and rich. Guarantee the sustainable development of Java technology vertically, and finally gain a firm foothold in the field of dynamic website development. Other Java developers can quickly transfer to Vue for development, regardless of the development of some special components or functions, only from the dynamic page In terms of development, the almost cost-free conversion between java programs and vue programs has been fully realized, and vue technology has developed in this way.

2.3 Spring Boot framework

Spring Boot is a new framework provided by the Pivotal team , which is designed to simplify the initial construction and development process of new Spring applications. The framework uses a specific approach to configuration, so that developers no longer need to define boilerplate configuration. In this way, Spring Boot aims to be a leader in the burgeoning field of rapid application development.

 Based on Spring 4.0 design, SpringBoot not only inherits the original excellent features of the Spring framework, but also further simplifies the entire construction and development process of Spring applications by simplifying configuration. In addition, by integrating a large number of frameworks, SpringBoot has solved the version conflicts of dependent packages and the instability of references.

There are also two very important strategies in the SpringBoot framework: out-of-the-box and convention over configuration. Out of the box, Outofbox means that during the development process, by adding relevant dependency packages to the pom file of the MAVEN project, and then using corresponding annotations to replace cumbersome XML configuration files to manage the life cycle of objects. This feature enables developers to get rid of complex configuration work and dependency management work, and focus more on business logic. Convention over configuration, Convention over configuration, is a software design paradigm in which SpringBoot itself configures the target structure and developers add information to the structure. Although this feature reduces some flexibility and increases the complexity of BUG positioning, it reduces the number of decisions that developers need to make, and at the same time reduces a large number of XML configurations, and can automate code compilation, testing, and packaging. .

The basic architecture design of the SpringBoot application system development template is explained from the front end to the background: the front end often uses template engines, mainly FreeMarker and Thymeleaf, which are written in Java language, render templates and output corresponding text, so that the design and application of the interface At the same time, front-end development will also use Bootstrap, AngularJS, JQuery, etc.; Json is used in the data transmission format of the browser, not xml, and RESTful API is provided at the same time; SpringMVC framework is used to process requests after data arrives at the server; to data access The layers mainly include Hibernate, MyBatis, JPA and other persistence layer frameworks; MySQL is commonly used for databases ; IntelliJIDEA is recommended for development tools.


Chapter 3  System Analysis

In the face of the system to be developed, it is necessary to analyze in advance. This is also a necessary part of the development process. Usually during the analysis of the system, the main contents involved include the feasibility of system development, the analysis of system functions and performance, etc.

3.1 Feasibility analysis 

Before formally investing in the project that needs to be constructed, there is a critical step that is indispensable, that is, feasibility analysis. It mainly evaluates the feasibility of the system from the perspectives of current technology and economy, and this scientific method is often used to demonstrate projects in investment decisions.

3.1.1 Technical Feasibility

At present, the technology of system development has matured, and the use of development tools and standardized codes can be obtained through the computer network. These knowledge can help developers successfully complete the coding work of this system.

3.1.2 Economic feasibility

The software environment that needs to be configured during the development of this system can be downloaded and installed from the official development website for free, and the hardware devices that need to be configured do not need to have high performance. Usually, computers in Internet cafes or computers in school computer rooms meet the requirements. Therefore, from an economic point of view, the development of intelligent unmanned warehouse management is feasible.

3.1.3 Operation Feasibility

Intelligent unmanned warehouse management is developed according to user habits, and the designed interface is unified and has excellent navigation functions. Therefore, as long as the personnel who can simply operate the computer can operate the intelligent unmanned warehouse management without pressure.

In conclusion, from the above arguments, the system can be developed.

3.2 System flow

Tools such as flowcharts can intuitively reflect the internal operating logic of the system and help users better understand the system.

3. 2.1 Operation process

Access to this system requires visitors to provide verification information. Only qualified visitors can be granted access qualifications. Its specific operation process is shown in the figure below. The visitor fills in the information items set on the login interface truthfully. After the information is verified, the visitor can enter the designated page to enjoy the services provided by the system and read the relevant information of the system.

Figure 3.1 Operation flow chart

3.2.2 Login process _ _

The login module of this system, its internal process is shown in the figure below. It mainly judges the verification information provided by the personnel accessing the system one by one, and the system will give prompts in the face of information entered incorrectly, for example, prompting that the account number is incorrect, or prompting that the password does not match and other prompting information. In short, if all the information filled in on the login page meets the requirements, the visitor will log in successfully.

Figure 3.2 Login flow chart

3. 2.3 Delete information process

After the system is used frequently, a lot of information that loses value will be generated, so it is necessary to clean up the data in time to free up space in the system. When cleaning these data, the corresponding process is shown in the figure below. First select the data to be cleaned, and repeatedly confirm the data to be cleaned to avoid accidental deletion by the operator. The deleted data will not appear in the system.

Figure 3.3 Delete information flow chart

3. 2.4 Add information process

This system is mainly used to display information and provide services. Among them, the data adding function is one of the services. The specific process is shown in the figure below. Allow the operator to enter data on the information adding page, and after the data is submitted for inspection, it will be displayed on the specified page of the system.

Figure 3.4 Add information flow chart

3.3 Performance requirements _

Carrying out requirements analysis includes formulating functions according to the actual needs of users, and also covers performance requirements analysis of the system to be designed. Therefore, when analyzing a system in general, on the one hand, it is necessary to analyze the system function, and on the other hand, it is also necessary to analyze the performance of the system. After all, designing and developing a system with good performance can ensure the quality and reliability of the system.

Next, analyze the performance of the system, but also analyze and explain it from the aspects of interface friendliness, system time characteristics, and system reliability.

(1) Time characteristic requirements: The system has time requirements for processing data, which is also the time characteristic of the system. Usually, the time of data processing is analyzed, the response time of user requests is also set, and the range of values ​​that the system can deviate from when it is running at full load needs to be analyzed and determined in advance.

(2) Interface friendliness: In addition to the functional needs of users, the design of the human-computer interaction interface also needs to consider the user's usage habits, including the layout of the interface, the selection of the tone of the interface, and color matching. Try to make sure that users can operate the system independently after receiving simple training.

(3) System reliability: For beginners, it is easy to have a problem, that is, the designed and developed system will crash due to human misoperation, and some of them will also cause the computer to crash. This phenomenon also shows that the system with low fault tolerance is unreliable. It cannot be used as a system for processing information in life at all. At present, system development must ensure reliability, and the design concept of modularization and structure should also be taken into consideration when designing. If you encounter a system with strict timeliness requirements, you also need to take other measures, such as dual-machine systems, and disk arrays. There is also a reliable system, which also has requirements for the power supply capacity of the equipment.


Chapter 4 System Design 

A successfully designed system must be rich in content, and user-friendly in system appearance or system function. Therefore, in order to enhance the value of the system, attract more visitors to the system, and allow visiting users to spend more time on the system, it shows that the system is designed professionally.

4.1 Design principles 

The design process of this system needs to be carried out according to certain design principles. The purpose is to make the developed system have high quality, complete and complete functions, and convenient and simple operation, so as to meet the requirements of users to the greatest extent. In addition to the basic easy-to-operate principles, the system design principles also include safety principles and accuracy principles.

The first design principle: the principle of easy operation. The functions designed for this system should be complete and complete. When coding, the designed interfaces should be friendly. Once users use this system, they should be able to easily get started and operate the system to process data. , it must be convenient. In addition, it is also necessary to design some necessary prompts to guide the user to operate the system.

The second design principle: the security principle. The system needs to verify the identity of each visitor in the login module. The system will judge the information entered by the visitor, use the security verification code written in advance to compare the data, and guide the matching to succeed. The visitor enters the specified operation interface. This prevents unrelated visitors from stealing data from the system.

The third design principle: the principle of accuracy. In order to ensure that the data registered by the user is correct, it is necessary to design a data error correction mechanism in advance, so that the user can carefully check the registered error information through the system's error prompt, and correct the error in time , fill in the correct information. For example, when setting a password, it is required that the length of the password cannot be less than 6 characters, and the data type cannot be all numbers, etc. can be standardized.

4.2 Functional structure design 

On the basis of the previously analyzed administrator functions, carry out the next design work, and finally display the designed administrator structure diagram (see the figure below). Administrator adds, deletes, modifies, checks and replenishes reminders

4.3 Database design

Developing a system also requires designing the database in advance. The database here is a collection of related data, and these data stored together are also organized in a certain way. At present, the database can serve a variety of applications because of its optimal storage method and low data redundancy rate. Although the database provides information storage services for the program, it can also maintain a high degree of independence from the program. All in all, the database has experienced a long period of development, from being unknown at the beginning to now being well known, its related technologies are becoming more mature, and it also has a solid theoretical foundation.

4.3.1 Database conceptual design

This part of the content needs to be completed with the help of database relationship diagrams, and tools that specialize in drawing database relationship diagrams are also required. For example, Visio tools can design ER diagrams (database relationship diagrams). The design of the database also needs to be carried out according to the design process. First, it is necessary to complete the determination of the entity according to the requirements, analyze the characteristics of the entity, and determine the relationship between the entities. Finally, the ER diagram of the system is drawn using the representation method of the ER model. Whether you use Edraw software or Visio tool, the symbols for ER models are the same. Usually, rectangles represent entities, relationships between entities are represented by diamond symbols, and the attributes of entities, that is, the characteristics of entities, are represented by symbol ellipses. Finally use straight lines to connect symbols like rectangles, rhombuses and ellipses. Then start to draw the ER diagram of this system.

(1) The figure below shows the replenishment application entity and its attributes.


Figure 4.1 Replenishment application entity attribute diagram

(2) The figure below shows the dictionary table entity and its attributes.


Figure 4.2 Dictionary table entity attribute diagram

(3) The figure below shows the employee entity and its attributes.


Figure 4.3 Employee Entity Attribute Diagram

(4) The figure below shows the pickup application entity and its attributes.


Figure 4.4 Pickup application entity attribute diagram

(5) The figure below shows the replenishment reminder entity and its attributes.


Figure 4.5 Replenishment reminder entity attribute diagram

(6) The figure below shows the user table entity and its attributes.


Figure 4.6 User table entity attribute diagram

4.3.2 Database physical design

This database is a relational database, so the structural design of the two-dimensional table is also critical. After all, the two-dimensional table model is the relational model in the relational database. The concepts in some commonly used relational models also need to be understood before the relational model can be designed. The following is a brief introduction to the meanings of common concepts such as relationships, tuples, attributes, domains, and keywords.

Relationship: A relationship is a data table in the database, and each data table has a name, that is, each relationship also has a name, which is the name of the data table;

Tuple: A tuple is a row of records in a data table;

Attribute: An attribute is a field in the data table, that is, a column in the data table;

Domain: The domain is to limit the value of the attribute in the data table;

Keyword: The keyword is the primary key in the data table;

After understanding the common concepts of table structure design, you need to use the previously drawn ER model to complete the design of the table structure, create data tables in the database, and name each data table. The results of the design are shown in tabular form below.

Table 4.1 Replenishment Application Form

serial number

column name

type of data

illustrate

allow empty

1

Id

Int

id

no

2

buhuotixing_id

Integer

Replenishment information

yes

3

yonghu_id

Integer

staff

yes

4

buhuoshneqing_yesno_types

Integer

Approval Status

yes

5

buhuoshneqing_yesno_text

String

Audit opinion

yes

6

create_time

Date

creation time

yes

Table 4.2 Replenishment reminder table

serial number

column name

type of data

illustrate

allow empty

1

Id

Int

id

no

2

buhuotixing_name

String

Item Name

yes

3

buhuotixing_types

Integer

item type

yes

4

buhuotixing_number

Integer

Replenishment Quantity

yes

5

buhuotixing_stauts_types

Integer

replenishment status

yes

6

buhuotixing_delete

Integer

fake deletion

yes

7

create_time

Date

creation time

yes

Table 4.3 Dictionary table table

serial number

column name

type of data

illustrate

allow empty

1

Id

Int

id

no

2

dic_code

String

field

yes

3

dic_name

String

field name

yes

4

code_index

Integer

coding

yes

5

index_name

String

encoding name

yes

6

super_id

Integer

parent field id

yes

7

beizhu

String

Remark

yes

8

create_time

Date

creation time

yes

Form 4.4 Pickup Application Form

serial number

column name

type of data

illustrate

allow empty

1

Id

Int

id

no

2

quhuoshenqing_name

String

Item Name

yes

3

buhuotixing_types

Integer

item type

yes

4

yonghu_id

Integer

staff

yes

5

quhuoshenqing_number

Integer

Pickup Quantity

yes

6

quhuoshenqing_yesno_types

Integer

Approval Status

yes

7

quhuoshenqing_yesno_text

String

Audit opinion

yes

8

create_time

Date

creation time

yes

Table 4.5 Employee table

serial number

column name

type of data

illustrate

allow empty

1

Id

Int

id

no

2

yonghu_name

String

employee's name

yes

3

yonghu_photo

String

avatar

yes

4

yonghu_phone

String

Employee mobile phone number

yes

5

yonghu_id_number

String

employee ID number

yes

6

yonghu_email

String

Mail

yes

7

yonghu_delete

Integer

fake deletion

yes

8

create_time

Date

creation time

yes

Table 4.6 User table table

serial number

column name

type of data

illustrate

allow empty

1

Id

Int

id

no

2

username

String

username

yes

3

password

String

password

yes

4

role

String

Role

yes

5

addtime

Date

add time

yes


5.1 Employee Information Management

Figure 5.1 shows the employee information management page. The functions provided to administrators on this page are: employee information query management, which can delete employee information, modify employee information, and add employee information.

Conditions for fuzzy queries on usernames are also made

Figure 5.1 Employee information management page

5. 2 Replenishment reminder management

Figure 5.2 shows the replenishment reminder management page. The functions provided to the administrator on this page are: view the published replenishment reminder data, modify the replenishment reminder, and delete the replenishment reminder if it is invalidated. The fuzzy query of the name of the cargo reminder, the type query of the replenishment reminder information, and some other conditions.

Figure 5.2 Replenishment Reminder Management Page

5.3 Item type management

Figure 5.3 shows the item type management page. The functions provided to administrators on this page include: conditional query based on item type, and addition, modification, and query operations on item types, etc.

Figure 5.3 Item type management page

5.1 Replenishment application management

Figure 5.4 shows the replenishment application management page. The functions provided to the administrator on this page include: adding, modifying, and querying operations based on the replenishment application.

Figure 5.4 Replenishment application management page


Chapter 6 System Testing

进入这个环节就代表着系统已经结束了编码实现功能阶段,接下来要做的事情,就是对该系统进行检测,也就是系统测试,这个环节是很有必要进行的,原因是开发本系统的人员,其自身具备的开发技术以及开发思维是有限的,在面对具有复杂性操作逻辑的系统,都会出现大大小小的错误,并且这样的错误还都是不可避免的。通过及时的测试,可以尽早排除程序中的错误,这样也可以减少实际运行中产生的问题,从而真正避免在后期使用中为修复这些问题所付出的高昂代价。及时测试,及时发现问题并解决,也是提高开发过程的效率的一种表现形式。总而言之,在软件开发生命周期的每个阶段都需要加以重视,并做好每个阶段需要做的任务,从开始到结尾都需要保证开发软件的质量。

6.1 功能测试

通过设计一些数据检验智能无人仓库管理的功能是否根据预定进行数据输出,以此检验系统功能是否合格。接下来就选取部分功能进行检测。

6.1.1 登录功能测试

智能无人仓库管理提供的服务是给规定的用户使用的,其他无关用户是无法进入的,登录功能就是检验访问者是否是符合要求的用户,及时将不符合要求的用户拒之门外。以此保证系统安全。这里以管理员身份进行检测,测试的内容见下表。

表6.1 登录功能测试表

账号

密码

身份

结果

guanliyuan

guanliyuan

管理员

提示成功,进入系统后台

user

guanliyuan

管理员

提示失败,停留在登录页面

guanliyuan

user

管理员

提示失败,停留在登录页面

智能无人仓库管理在面对正确的账号,不匹配的密码时,会有相应的反馈,其反馈结果见下图。

图6.1 登录错误反馈提示

6.1.2 修改密码功能测试

这个功能的设置也是出于对系统的保护,让操作人员的密码可以一直变化,减少泄露的几率。测试的数据见下表。通过验证旧密码,确认操作者是本人,然后开始对新密码进行登记。一般修改完密码后,需要再次登录。

表6.2 修改密码功能测试表

旧密码

新密码

密码修改结果

guanliyuan

gly

成功

user

gly

失败

guanliyuan

失败

本系统在面对登记错误的旧密码信息时,有相应的反馈提示,见下图。

图6.2 旧密码错误提示

6.2 测试结果

经过测试,从智能无人仓库管理功能的角度来看,本系统各个功能在符合用户要求的情况下,也能保持运行正常。从智能无人仓库管理性能的角度来看,本系统可以保持24小时不间断运行,而且面对用户的误操作行为,有提前设置的错误反馈机制应对,另外,本系统界面布局考虑用户阅读习惯,可以让用户短时间内获取需要的内容。总之,本系统可以投入生产,帮助用户解决实际问题,发挥其应用价值。


结  论

采用Java+Mysql的方式设计制作的智能无人仓库管理,在功能上可以满足管理人员对于信息的管理需求;在界面的设计上,尽最大努力用自身的美工知识做到界面美观简洁。在操作方面上,让系统可以方便操作,同时对用户常见的误操作行为进行分析总结,并尽力在系统中避免同样的由于用户的误操作所带来的错误现象。

作为毕业设计,分配给本系统的设计与制作时间还是不足的,所以,智能无人仓库管理还有许多需要完善的地方。

第一个就是本系统的编程代码问题,各个程序文件的代码存在冗余的地方非常多,导致代码不够简洁,同时对代码的注释也比较麻烦。编码期间,对于很多页面可以共享的函数与方法都没有单独列出来,而是在需要用到函数和方法的页面上都重新编写了代码,通过后期的技术学习,以及对编码过程的分析总结,发现可以把共用的函数或方法编写在同一个页面上,在之后的页面中,需要使用此函数的页面,则可以直接调用函数,无需再编写代码了,这样可以简化代码,也能节省时间和存储空间。

第二个就是对数据库的设计不够好,在数据处理中,影响程序运行速度。因此需要对数据库的性能进行优化。通过这方面知识的学习,在某个开发技术类的博客中,发现可以用数据库连接池技术来解决数据库的性能问题,另外还需规范数据库里面的关系模式,降低数据库的冗余率,提高运行速度。

如果说平时的作业也是检查对知识的掌握情况,那么制作毕业设计,将是对自身所有知识的一个全面检测。因为系统能够制作完成则是经历了很多阶段,正如文中所展示的那样,先有可行性分析,对功能的分析,对功能的设计,对数据库的设计,对程序功能的编码实现,对完成编码程序的测试等,这些环节缺一不可,而且还都需要认真对待,大学学到的所有知识在制作系统时,才会发现不够用。所以这个项目制作,在检测自身能力的同时,也对问题分析,资料搜集,问题解决等能力进行了培养。

我通过制作本系统,熟悉了程序开发的流程,提高了对程序的编码能力,培养了独立分析与解决问题的能力;但也让我明白自身的不足之处,所以在接下来的时间,我还是要加强对技术知识的学习,去逐渐完善本系统。


  

制作毕设项目这段时间,忙碌又充实。从最开始选题的不知所措,到现在毕设项目完成时的淡然,两种完全不同的心境,也意味着我这段时间在不断成长。项目制作是一个很耗费时间与精力的任务,如果说仅仅依靠自己的话,那肯定达不到毕设的标准。所以,这一路走来,导师给予我的帮助也是非常大的。不管我处于哪个阶段,比如选题阶段,比如分析系统功能阶段,设计系统结构阶段,系统编码阶段等,都有导师参与指导,他提出的建议和技术上的指导让我可以更快地完成这个毕设项目。此刻,我非常感谢导师,感谢他提供的帮助。

毕设项目制作期间,我身边的同学也及时指出了我系统的错误,并帮助我完善已开发的系统,还提供了很多文档撰写的技巧,所以,我也非常庆幸能和他们一起努力制作项目,也非常感谢他们一直以来的陪伴。

大学短短几年,能够得到成长,也离不开授课老师们,他们一直在校园为广大学子传授知识,用他们毕生所学,教出一批批优秀的学生,我这几年的成熟与成长也得益于他们的教导。所以我也非常感谢校园的各位老师。

即将离开校园,回想这几年的时光,还真挺不舍。安安静静在校园走了一圈,发现我的大学校园真的很美,我也感谢学校给我们提供这么美好的学习环境,以及给了我上大学的机会。感谢母校!


参考文献

[1]江涛.补货提醒网上预订系统的设计与分析[J].现代商贸工业,2020,41(22):150.

[2]徐微微.晓庄连锁补货提醒补货提醒预订系统的设计[J].企业导报,2016(08):180-181.

[3]张振超,吴杰,陈序蓬.浅谈Java中Mysql数据库的连接与操作[J].信息记录材料,2020,21(02):144-145.

[4]郑智方,魏恺乐,李彬,谢易壮.MySQL得到广泛使用的原因以及它的嵌入应用[J].科技风,2020(05):114.

[5]赵秀芹,刘杨青,李瑞祥.MySQL数据库使用技巧三例[J].网络安全和信息化,2019(08):90-91.

[6]余涛.计算机软件开发中Java编程语言的应用研究[J].信息记录材料,2020,21(01):113-115.

[7]岳青玲.Java面向对象编程的三大特性[J].电子技术与软件工程,2019(24):239-240.

[8]耿学.关于Java Web中中文乱码问题的探讨[J].现代信息科技,2020,4(01):74-75+78.

[9]张彦芳.Java Web项目开发中的中文乱码问题与对策[J].电脑知识与技术,2020,16(09):96-97.

[10]韩思凡.Web开发中的vue与H T ML的基础应用[J].科学技术创新,2020(14):71-72.

[11]赵晓丹.网页开发中的vue技术分析[J].南方农机,2019,50(20):247-248.

[12]薛茹.基于Spring Boot框架的Web系统研究与应用[J].计算机产品与流通,2018(07):30.

[13]邱丹萍.Web开发中Spring Boot框架的分析[J].电脑知识与技术,2020,16(17):81-82.

[14]仲崇文.关于计算机软件开发中常见问题的研究[J].通讯世界,2020,27(07):89-90.

[15]Raffi Khatchadourian.Automated refactoring of legacy Java software to enumerated types[J].Automated Software Engineering,2017,24(4).

[16]Ben White.Marx and Chayanov at the margins:understanding agrarian change in Java[J].The Journal of Peasant Studies,2018,45(5-6).

Guess you like

Origin blog.csdn.net/licongzhuo/article/details/131361202