| Thanks to the fast-growing information and computer technologies, the broad-band networks in institutions of higher education keeps perfecting. The low-value consumables play a vital role in teaching and research of colleges and universities. Thus the expanding institutions of higher education and their advancing research demand low-value consumables in larger quantities than ever. The management information system, already applied to management of modern enterprises, is now being drawn on and adapted by increasing institutions of higher education for an information system to facilitate the management of their low-value consumables.Attempting a networked management of low-value consumables, the writer of this paper, based on the management process of low-value consumables of Shandong Wanjie Medical College, designs the functional structure, network operation structure and the security strategy of the information system, ensuring the secure and smooth operation of the system..NET technique and the three-tier architecture model of the B/S, key to the development of the desired system, are introduced in this paper. The system is designed and developed on the basis of .NET platform, the data-access techniques of ADO.Net and the access control strategy built on the RBAC model. The system is to achieve mainly: the networked management of the warehousing, delivery and declaration of medical low-value consumables, in addition to its management and inquiry functions. The research consists of agile development and test-driven development, synchronizing development and operation, i.e. delivering a module upon completion to customers for utilization and improving the system according to the customers' feedback until a perfectly-functioning and customer-satisfying system is achieved.The paper conducts a detailed demand analysis of thethe networked management information system of low-value consumables based on ASP.NET and accounts for the design and the achievement of the same. In the fist phase, the function, the performance, the security and then the feasibility of the system are analysed. The structure and the specific functions of the system and the data-base are exquisitely designed in the second phase. In the last one, the major function modules of the system are achieved, followed by a summary of the system and a speculation of its future application. |