高校图书馆电子阅览室管理系统的设计
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机技术、网络技术、通讯技术和信息处理技术的飞速发展,光盘多媒体出版物的大量发行,以及Internet和其他信息网络上信息资源的极大丰富,给传统图书馆带来新的生机与挑战,图书馆正在向电子化、网络化、数字化转变。而电子阅览室的建立正是传统图书馆迈向数字图书馆的第一步,因此电子阅览室的管理就成为人们关注的焦点。
     本文通过对国内近几年来出现的电子阅览室管理软件的分析,结合工作实践,按软件工程的方法对高校图书馆电子阅览室管理系统进行了系统分析、总体设计、详细设计等。采用了目前流行的客户机/服务器计算模式,选择性能优异的大型数据库SQL Server,利用高效的开发工具VC++,完成了电子阅览室管理系统软件的设计与开发。并根据实际工作的要求,对系统的各具体功能模块进行了详细地说明,解决了以往软件功能单一,不切实际的问题。在服务器的server程序中内置了HTTP、SOCKET 5代理服务器(包含TCP/UDP协议),实现控制读者上网,按流量计费等;在客户端的“黑客”程序client,全程实时监控读者的状态,解决了工作人员和读者的矛盾。系统采用帐户口令加密、代理服务器和数据库备份等来实现系统的安全,切实有效地解决了系统的安全性问题。
With the rapid development of the computer technology, network technology, communication technology and processing information technology, the large quantity multimedia publication which had been issued, and the great abundance of information resource in Internet and other network, which bring new opportunity and challenge to traditional library. Library is developing in the direction of electronization, network and digtalization, while the establishing of electronic reading room is exactly the first step while tradition library changed to digital library, for this reason the management of electronic reading room become the focus that people pay attention to.
    The paper studied the management software of electronic reading room emerging in last few years at home, and on the basis of author's practical experiences, according to the method of software engineering methods, the Management System of Electronic reading room in the College and University Library was carried through the system analysis, the overall design, detailed design, and so on. The system adopted Client/Server computing model, selected the large database SQL Server which possessed steady capability, utilized the VC++ that is one of the efficient exploitation tools. The paper completed the design and exploitation of management system of electronic reading room. According to the request of practical work, explain each concrete function model in detail, and solve former software function's single and impractical problem. The HTTP proxy server and SOCKET 5 proxy server (include the TCP/UDP) are placed in the server's procedure, and realized the whole timing supervising the reader's state, and accounting
     method based on I/O flows controlled ect. and solve the contradictory between the manager and the reader. System adopts a secure method for password being transmitted over public networks, proxy server and the database backup and so on. which realized the system's safety actually and efficiently.
引文
[1]孙炳旭,陈飞,梁茂盛.SQL Server 7.0使用管理指南.机械工业出版社,2000
    [2]Lance Mortensen,Rick Sawtell.MCSE:SQL Server 7 Administration 学习指南.电子工业出版社,1999
    [3]Matthew Shepker.SQL Server 7 24学时教程.机械工业出版社,2000
    [4]陈元琰,邓宗明,张睿哲,张晓竞.Visual C++ 6.0编程实用技术与案例.清华大学出版社,2001
    [5]戴锋.Visual C++程序设计基础.清华大学出版社,2001
    [6]王柏,王红熳,邹华.分布计算环境.北京邮电大学出版社,2000
    [7]宾锋,陈旭毅,顾耀芳.信息系统.上海科学技术文献出版社,2001
    [8]杜军平,黄杰.SQL Server 2000数据库开发.机械工业出版社,2001
    [9]东箭工作室.怎样使用Windows NT Workstation 4.0.电子工业出版社,1997
    [10]Tom Sheldon.Windows NT深入浅出.海洋出版社,1995
    [11]明寰资讯工作室.Windows NT Workstation 4.0中文版易学易用专辑.人民邮电出版社,1998
    [12]Anthony Northrup.Windows NT网络实现—路由器、代理和Web服务.机械工业出版社,1999
    [13]Bijoy Bordoloi.Min-hwa Lee. An object-oriented view.information System Managerment.Winter 1994
    [14]Diffie W, Hellman M E. New Directions in Cryptology, IEEE. Trans. on Information Theory. 1976,IT-22:644~656
    [15]Goldwasser S. The Search for Provably Secure Cryptosystem,Proc. Symposia in Applied Mathematics. 1990,42:89~113
    [16]Pohlig S and Hellman M. An Improved Algorithm for Computing Logarithms over GF(p)and Its Cryptographic Significance, IEEE. Transactions on Information Theory. 1978,24:106~11
    
    
    [17]Gwoboa, Horng,Yang C S. Key Authentication Scheme for Cryptosystems Base on Discrete L ogarithms. Computer Communication. 1996,19:848~850
    [18]Federal Information Processing Standards Publication 180-1,SECURE HASH STANDARD. 1995
    [19]Jablon D P. Strong Password Only Authenticated Key Exchange.Computer Communication Review. 1996,26(5):5~26
    [20]Schneier B.Applied Cryptograpny.2nd Edition.John Wiley&Sons Inc.1996,20~40
    [21]Botting J. Security on the Internet:Authenticating the User.Telecommunications. 1997,31(12):77~80
    [22]张焕国.计算机安全保密技术.机械工业出版社,1994
    [23]卢开澄.计算机密码学—计算机网络中的数据保密与安全.清华大学出版社,2000
    [24]冯华.Visual C++ 6.0数据库开发技巧与实例.机械工业出版社,2000
    [25]孙德文,郇海滨.代理服务型防火墙的技术与实现.微型电脑应用.1998,(3):23~25
    [26]陆伟锋,胡文,韩贞宇.校园网计费系统的设计原理.计算机与现代化.2000,(6):53~56
    [27]禹龙,刘胜全.校园网代理服务器和计费系统.软件时空.2000,16(2):49~50
    [28]孙敏,郝洪海,郭小艺.网络计费系统的主要技术及ASP实现—LAN用户基于IP流量上网计费.计算机工程与设计.2001,22(3):64~68
    [29]毕保祥,肖德宝.SOCKS 5的身份认证机构.计算机应用.2000,20(7):38~40
    [30]陈涛.VC++中的ADO编程.微型电脑应用.2001,17(7)63~64
    [31]王书达,康成顺.计算机网络键盘监控软件的设计.哈尔滨商业大学学报(自然科学版).2002,18(4):407~411
    [32]白以恩,谢治荣,王文铸.校园网计费系统的实现.哈尔滨商业大学学报(自然科学版).2001,17(3):55~59
    [33]杨凡,陈松乔.在VC++中应用DAO实现数据库管理.电脑与信息技术.1999,(6):11~12
    
    
    [34]李铎.在VC++5.0下编写SQL Server数据库访问类.计算机应用.1999,(8)16~18
    [35]王洪军.电子阅览室网络系统的设计与管理.图书馆建设.2002,(2):72~74
    [36]胡春妹.王少鑫.黄晴珊.电子阅览室在图书馆中的作用及实现.计算机时代.2002,(7):24
    [37]冯长龙.图书馆电子阅览室建设.图书馆学研究.2002,(2):63~64
    [38]王汝江.电子阅览室的建设与维护.现代图书情报技术.2001,(4):77~78
    [39]张谦.电子阅览室在图书馆数字化进程中的作用及其技术处理.图书馆论坛.2001,21(3):36~38
    [40]杨晓萍,王镔铸,郭轶通.东北农业大学图书馆电子阅览室的设计与实现.现代图书情报技术.2001,(4):79~81
    [41]杨志峰,沈祥兴,陈远.采用代理访问技术建设电子阅览室.图书情报知识.2000,(4):41~42
    [42]罗益群.高校图书馆电子阅览室的建设与服务.高校图书馆工作.2000,20(80):47~50

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700