Font Size: a A A

The Design And Implementation Of The Real-Time Counter Operation Warning System In Rural Small And Medium Financial Institutions

Posted on:2017-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:X L SunFull Text:PDF
GTID:2349330503992599Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years, as the rural small and medium financial institutions introduce computer science and operate new business system, it brings their business great promotion as well as the challenge in operation risk management. In the operation risk management aspect, the traditional field manual compliance checking method cannot deal with the rapid business mode. Using computer science in compliance checking work is meaningful and great complementary part in the field compliance checking work, which is the emphases of PBOC and CBRC, especially facing the enormous business in different lines as well as limited human resources and cost. This article presents the design and implementation of the real-time counter operation warning system in the non-spot audit, which is aimed at the current situation of present supervision technique.The current situation of present supervision system, using the Inner Mongolia rural credit as example, is aimed at the counter operation risk in rural small and medium financial institutions. This system monitors, warns and analyses the activities in counter integrated business system without altering the system's running and other network or system environment. It also monitors customers' capital flows and account dynamics, real-time waring the illegal and suspicious transactions.Using J2 EE, Flex and C++, this article design and implement this system, which monitor and manage the TS over IP flow in entire network. The first step is analyzing the requirements of the counter operation warning system, including real-time monitor, query statistics, analysis and report printing, dispose after warning and system maintenance. Second, formulated the design concept, system logic structure and data base design based on the requirement analysis; detailed descripted the sheets and fields in system data base as well as the field meanings; detailed designed, including process and related design, the implement in network data collection mode, packet recombination mode, date analysis mode, warning rules mode; the algorithm design and code implementation of some core modules are given and the related call procedures are textually descripted in the system implement section. Third, the deployment environment of entire system and final operation result are elaborated as well as the final UI are exhibited in the following sections. Finally, summed this article and author's work result during the project, then put forward the improvement direction.
Keywords/Search Tags:operation, risk, monitor, rules, warning
PDF Full Text Request
Related items