Research and Design of the Interface in the Food Tracing System
Jiali Lin; Zhen Li; Shuguang Zhang; Bo Yin; Zhiqiang Wei
College of Information Science and Engineering
Ocean University of China
Qingdao, China
Abstract—With the improvement of living standard, people pay more and more attention on food safety. Tracing the source of food is a way to monitor food safety. This paper describes the design and implementation of the tracing system, using MySQL and JAVA. The system is divided into three layers, which are the data layer, the intermediate layer and the presentation layer. The paper will mainly introduce the research and design of the intermediate layer. It prove the flexibility and the faster response speed of the system, by using three-tier architecture and database connection pool.
Keywords-tracing system; three-tier architecture; JDBC;database connection pool
I. INTRODUCTION
In recent years, the problem of food safety has been the focus of the society, and also been the important problem of the country. Every year there will be some companies exposed by media, because of food safety issues. At present, China has basically established the management system and the regulatory system of food safety, but the current situation of food safety is still not optimistic.
Based on the above issues, we put forward the food tracing system. Using bar code, Quick Response(QR) code, Radio Frequency Identification(RFID), sensors and other technologies, we set up an information network system, which covers food production, processing, marketing and other aspects. We collect all the food information through the information network system. The food information from production to sale can be found at any time through the food tracing system. Once there is problem about food safety, we can quickly identify the related enterprises. The tracing system makes food production open and transparent, and can effectively supervise the enterprise to improve the quality of food hygiene.
The system is developed in three layers that represents in Fig. 1. The three-tier architecture pattern provides a method of structuring and decomposing applications into three layers, where each tier provides a different level of responsibility. One tier deals with the presentation part of the system, another handles the business logic, being the core of the system, and the last tier representing the data storage[1] .
Figure 1 The architecture of the system
The paper is organized as follows. First we describe the related works and how to design a good database. Then we present the structure of the intermediate layer and introduce realization of partial functions. Finally we discuss the advantage of three-tier model and database connection pool. A brief summary concludes the paper.
II. RELATED WORKS
Technologies that we used in the system are database connection pool and RFID. Java Database Connectivity (JDBC) is a Java database connectivity technology. It is an API for the Java database programming[2]. For complex database applications, JDBC will greatly increase systemrsquo;s overhead to create and close database connections frequently. Thus, we used the technology of database connection pool. A certain number of connections will be placed in the buffer pool in advance. When a connection is requested, the connection will be removed from the pool, and be returned back after use. The function of database connection pool is to manage the creation and release of database connections[3]. The other technology we used in the system is RFID.
RFID is a communication technology, we can identify specific targets and read data through radio signals. An RFID tag is an information carrying chip. It generally carries the identity of the associated object, but can also store other information relating to the object. All tags incorporate an antenna for radio frequency communication[4].
III. THE DESIGN OF THE DATABASE
The design of database is the bottom of the structure model. It is the basement for other designs. And a good design of database should fully reflect the needs of the system, ensure the accuracy and consistency of data and have a good extendibility[5].
A. Reduce Data Duplication and Improve the Efficiency
The design of basic table is different to temporary table and intermediate table, it has four features: atomic, original, deduction and stability. The relationship between the basic table and its fields should meet the third normal form (3NF) as far as possible. Using 3NF in normalizing the database design can reduce the duplication of data and ensure referential integrity[6].
The database with no duplication of data can be designed, but it is not the best. In order to improve the operating efficiency of the database, it is necessary to reduce the standard of 3NF to increase redundancy appropriately. The redundancy refers to the advanced redundancy. It is not the duplication of fields, but the derivative of fields. The repetition of primary and foreign keys in the table does not belong to the duplication of data. Only the low-level redundancy will increase the inconsistency of data, thus the database promotes advanced redundancy and opposes low- level redundancy.
Referential integrity is a database concept that ensures that relationships between tables remain consistent. When one table has a foreign key to another table, the concept of referential integrity states that you may not add a record to the table that contains the foreign key unless there is a corresponding record in the linked table. It also includes the techniques known as casca
剩余内容已隐藏,支付完成后下载完整资料
资料编号:[409641],资料为PDF文档或Word文档,PDF文档可免费转换为Word
课题毕业论文、文献综述、任务书、外文翻译、程序设计、图纸设计等资料可联系客服协助查找。