Font Size: a A A

Excavation Monitoring And Implementation Of Management Model

Posted on:2012-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:X JinFull Text:PDF
GTID:2212330338956209Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Monitoring is the foundation in the construction and use of the term, on the implementation of building foundation and the surrounding environment, the inspection and monitoring work. Excavation monitoring including: support structure, related to the natural environment, the construction conditions, groundwater conditions, soil around the pit bottom and around the building (structure) building materials, underground pipelines and underground facilities around the surrounding major roads, other The object should be monitored. Excavation monitoring the correctness of both an important means of testing the design, but also guide the construction time, the necessary measures to avoid the accident. In the information management subsystem for monitoring is an important tool for measuring information. Thus, in deep foundation construction process, only the structure of the foundation pit, the soil around the foundation and the adjacent structures comprehensive, systematic monitoring, the project can have a better understanding of the situation, ensure that the project proceed smoothly.Base according to the software engineering methods, the first conducted a feasibility analysis of the system and demand analysis, demand analysis based on the results of three-tier architecture is proposed, namely: data layer, business logic and data presentation layer, and the need to implement the system The core function of the location of the architecture are described, and detailed description of the system design goals. Architecture based on the guidance, the general design of the system, including the system function modules and database design. The main function of the system implementation, including monitoring of project management, project management, system management and access control and other basic business processes. The development process in the system the main role-based access to the application of technology to achieve the user's access control features that make the system more flexible distribution of competences, convenient, but also make the system more secure; In order to ensure that the system has a good effect of visual experience and reduce page refreshes, the application of the current more popular AJAX technology, but also greatly improves the efficiency of data transmission, effectively reduce the network load pressure, improves the system speed ; In order to further strengthen the security of the system, the system uses MD5 encryption system to encrypt the user's password, effectively guarantee the security of user accounts.
Keywords/Search Tags:Excavation Monitoring, DataBase, AJAX, Right Control
PDF Full Text Request
Related items