HomePage >> Journals >> Transactions on Computer Science and Technology

Transactions on Computer Science and Technology

Transactions on Computer Science and Technology is an international comprehensive professional academic journal of Ivy Publisher, concerning the development of computer science theory and technology application on the combination of computer science and modern industrial technology. The main focus of the journal is the academic papers and comments of latest power electronics theoretical and technical research improvement in the fields of nature s... [More] Transactions on Computer Science and Technology is an international comprehensive professional academic journal of Ivy Publisher, concerning the development of computer science theory and technology application on the combination of computer science and modern industrial technology. The main focus of the journal is the academic papers and comments of latest power electronics theoretical and technical research improvement in the fields of nature science, engineering technology, economy and science, report of latest research result, aiming at providing a good communication platform to transfer, share and discuss the theoretical and technical development of computer science theory and technology development for professionals, scholars and researchers in this field, reflecting the academic front level, promote academic change and foster the rapid expansion of computer science theory and application technology.

The journal receives manuscripts written in Chinese or English. As for Chinese papers, the following items in English are indispensible parts of the paper: paper title, author(s), author(s)'affiliation(s), abstract and keywords. If this is the first time you contribute an article to the journal, please format your manuscript as per the sample paper and then submit it into the online submission system. Accepted papers will immediately appear online followed by printed hard copies by Ivy Publisher globally. Therefore, the contributions should not be related to secret. The author takes sole responsibility for his views.

ISSN Print:2327-090X

ISSN Online:2327-0918

Email:cst@ivypub.org

Website: http://www.ivypub.org/cst/

  0
  0

Paper Infomation

Implementation of a Comprehensive Information Management Platform for Public Security Based on Java Technology

Full Text(PDF, 145KB)

Author: Jin Xue, Yali Yuan

Abstract: Due to the rapid development of electronic information technology, the development of Internet technology and system software development technology has become more and more common. Especially, along with the development of public security, there are more and more provisions for standard administrative department management system, improving office efficiency and enhancing decision encouragement. Therefore, it is of great practical value to design and complete a comprehensive public security business information system. Based on java technology, this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business, and also gets good feedback during the actual test, which confirms the feasibility of the system.

Keywords: Public Security, Comprehensive Business Information System, Java, Workflow, Web Information Security

References:

[1] Indonesian Police Nab Key Terror Suspect[J]. Asian defence journal,2010(Jul./Aug.):1.

[2] At least 3 drown, 157 rescued off Java[J]. IHS safety at sea,2013,47(Sep. TN.535):7.

[3] SUPRATMAN AGUS. Prediction of Actual Fatality in Big Cities of West Java Province based on ANN3-1HL Model Developed from the Multivariable ANN Model for Fatality Prediction in Indonesia[J]. Journal of Engineering & Applied Sciences,2018,13(10):3463-3471.

[4] SRI KUSSUJANIYATUN, ASALIA NOOR HANJANI. The Role of Public Relation in Adopting Stakeholder Engagement Model in Creating Corporate Social Responsibility (Study: Pertamina, Ltd., RU IV Cilacap Central Java Indonesia)[J]. Journal of Engineering & Applied Sciences,2017,12(22):5905-5909.

[5] ZHANG, YUE, BROWN, DONALD E.. Police patrol district design using agent-based simulation and GIS[C]. //2012 IEEE International Conference on Intelligence and Security Informatics : Cyberspace, Border, and Immigration Securities: 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012), 11-14 June 2012, Washington, DC, USA.:Institute of Electrical and Electronics Engineers, 2012:54-59.

[6] ANONYMOUS. Accident characteristics on rural road in northern corridor of west java, indonesia[C]. //2nd Asia Pacific Conference & Exhibition on Transportation and Environment v.2. 2000:1053-1063.

[7] SUN, CHUANQUN, SHEN, QING, YANG, YANG. Research on security solution based on java web application[J]. Basic & clinical pharmacology & toxicology.,2019,124(S1):37-38.

[8] JOE WINCHESTER. How Much Is that Buggie in the Program?[J]. Java developer's journal: JDJ,2005,10(7):52-0.

[9] SRI ANDARINI, DEWI RACHMAWATI, DEWI K NINGSIH, et al. 3rd International Conference in Nursing (ICON), 20-21 May 2017, Indonesia.[J]. British journal of nursing: BJN,2018,27(16):961-962.

Privacy Policy | Copyright © 2011-2024 Ivy Publisher. All Rights Reserved.

Contact: customer@ivypub.org