eWSN Intelligent Police Management and Control System-Dog Guardian 丨 Police Security Management Information System
I. Project Overview
1.1 System background
In recent years, there are more and more pet dogs in the city. While raising dogs has added a lot of fun to the life of dog owners, it has also made many residents feel very upset.
The problem of dog breeding in urban areas was listed as the top five ills in urban management. Pet dogs are drowning and crawling on the green areas and roads of the community; morning and evening barking constantly affects the sleep of neighbors; wearing fleas and bacteria makes more zoonotic diseases ... Many problems point to In the wake of the "cute dog", a good friend of mankind, the public's voice of "treating dog problems" soared and the "urban dog problem" was also put on the government's agenda. What is more serious is the frequent occurrence of "dog bites" incidents, which has led to a sudden increase in the number of deaths from rabies and caused panic among urban residents. "The National Ministry of Health has reported that from January to August last year, a total of 21 provinces across the country had reported rabies. A total of 1874 cases were reported, of which 1735 have died. The number of cases has increased by 29.2% over the previous year. First of all infectious diseases. "
1.2 System construction goals and significance
The establishment of this system is to realize the standardized management of urban dog breeding by using RFID technology, and to solve the loopholes in urban dog management in the past by using high technology. The establishment of an urban dog management information platform can not only meet the needs for pet management today and for a long time to come, but at the same time, the data of the dog management system can be centralized, secure and smooth, information sharing, monitoring in place, unified planning, Segmented implementation, partitioned implementation, safety, reliability, confidentiality, convenient use, good maintainability and expandability, can more effectively avoid dog death accidents caused by dogs' inadequacy in chip injection.
2.1 Structural Framework of Dog Security Management Information System
Adopt advanced network technology and data collection methods, while adopting system information security measures to ensure network security throughout the process, to minimize potential security risks. At the same time, the data exchange and system framework are used to synchronize the processing of the dog breeding information business, so that users can understand relevant information in a timely manner, and also enable the government and the canine office to release information and announcements in a timely manner. Based on the above technical support, the schematic diagram of the planned system structure is as follows:
2.2 System data flow
The dog security management information system divides the information collection into two sources: one is the information source of the police station; the other is the information source of the designated pet hospital. Then after the proofreading and verification, it is integrated into a complete data, which is stored in the main database by the professional staff of the dog breeding department. The system structure diagram is as follows:
2.3 System physical location design framework
The physical structure diagram is a simulation of the coverage of a real system. Its structure is similar to the above description, and its basic content description (information collection is divided into two sources: one is the information source of the police station; the other is the information source of the designated immune point. Then after proofreading and checking, it is integrated into a complete data which is stored in the main database by the professional staff of the dog breeding department. The following is the physical distribution structure:
2.4 System Business Process
Third, system software functions and hardware equipment introduction
3.1 System Design Idea
Provides an application system framework developed using Web technology, database technology, Java technology, object-oriented technology and other technologies. The system provides perfect background management technology, provides data input, output, query, report and other functions, and realizes data integration with the website platform.
◆ Security Security mainly includes information transmission, access control (ACL), server redundancy, security management and prevention, etc. Information transmission refers to when both parties send and receive information in order to avoid transmission content being transmitted during the transmission process. To steal and encrypt it, the sender encrypts the data before sending it, and the receiver decrypts it after receiving it.
◆ Scalability Because the speed of computer technology changes is almost beyond people's expectations, therefore, in the system design, we also consider that when the system is upgraded in the future, it must have scalability. One of them is elastic data. interface.
◆ Reliability System reliability mainly refers to the fault-tolerant performance and misoperation protection performance of system software. Fault-tolerant performance mainly refers to the degree to which application software should be interrupted after the system recovers when a system failure occurs. Misoperation protection is when the user or manager is about to misoperation or has misoperation. With judgment and recovery functions.
◆ Advanced Although the software has a longer life cycle than hardware, software products are also frequently updated; therefore, the focus of our design is to ensure that the most reliable and up-to-date software design techniques and methods are used. Vitality can also ensure that it plays a leading role in the same industry. At the same time, the software's simple operation and friendly interface are also a reflection of its advanced nature.
◆ Tailor-made, tailor-made Due to the inconsistencies in the user's working environment, work content, etc., we will design and develop specifically for the needs of the user according to the specific needs of the user.
3.2 System Function Introduction
The dog management information system software is roughly divided into two main bodies, three authorities and five subsystems.
The two subjects are: the main body of the management agency and the subject of the immune point.
The three permissions are: super administrator, public security officer, and medical examiner.
The five subsystems are divided according to the different subjects and permissions in practical applications: dog management information system, immune network information system, fixed-point certification collection system, mobile law enforcement platform APP, online service platform (including official website and WeChat public account )
3.3 Electronic dog tags and electronic signs
A dog tag is a very important identification tag when a dog is out. Wearing dog tags has become a symbol of civilized dog breeding, and it is also a pet fashion. It also brings a higher recovery rate to dog owners when pets are accidentally lost.
3.4 Portable Smart Reader