Club Management System Using Laravel Framework
Club Management System Using Laravel Framework
ABSTRACT
CMS (Club Management system) is an integrated control system. This paper describes the design of
management system handling the common functions RFID based security
curity and access control system for
of enrolment, fulfillment,, member/club/promotion use in bar and hostels inside the Club management
information support, claims, billing and standard system. The system combines RFID technology and
reporting via additional sub system and this project is bio-metrics
metrics to accomplish the required task. When the
used to give support to the client. In this project we RFID reader installed at the entrance detects and read
are using a Radio Frequency Identification (RFID) a smart card,
d, the system scan the smart card and scans
and Thermal printers. Radio Frequency Identification the database for a match. If both the card and database
(RFID) provides a smooth payment and secure access. belong to a registered user, access is granted;
The CMS system contains different clubs like Bar otherwise the system turns on the alarm and makes an
Club, providing services to customers. Legal Care emergency call to the security van through GSM
application being a part of CMS does enrolment, modem. In n this way, the suspicious persons can be
fulfillment and billing for
or customers through different caught.
partners, and the application is built in the laravel
2. A Review of Previous Research
framework.
Peter Kieseberg, Manuel Leithner, Martin
Keywords: Club Management system , RFID Readers Mulazzani,[1] examines QR Codes and how they can
be used to attack both human interaction and
1. INTRODUCTION automated systems. As the encoded information
info is
intended to be machine readable only, a human
Club Management System (CMS) is designed to cannot distinguish between a valid and a maliciously
provide a club with everything that it need to manage manipulated QR code. Christoph Jechlitschek[2],
all its activities through a single application. provides a survey on radio frequency identification
Furthermore the system can be extended to provide (RFID) technology. Initially RFID tags were
any new modules that may be specific to a club. It is developed
veloped to eventually replace barcodes in supply
also robust enough to support authentication like - chains. Their advantages are that they can be read
smart cards, and is designed to be secure an
and tamper wirelessly and without line of sight, contain more
proof with respect to the dates. Our clientele and information than barcodes, and are more robust. The
product portfolio stand as testimony to this fact. paper describes the current technology, including the
Technology, vision and execution are the touchstones frequency ranges used and standards. With the
of our philosophy and what we stand by in our most increasing ubiquity of RFID tags, however, privacy
challenging endeavours. This, coupled wit with our became a concern. Roy Want[3],Many types of RFID
strong financial backing, allows us to deliver best in exist, but at the highest level, we can divide RFID
the class industry products. devices into two classes: active and passive. Active
Radio frequency identification (RFID) is a wireless tags require a power source——they’re either connected
technology that can be used to develop the access to a powered infrastructure or use energy stored in an
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2648
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
3.4 Mission 4.2 Architecture
Delivering the highest quality and most cost effective
software products and services to our clients.
Exceeding all client expectations. Creating a happy
and challenging work environment. Continuously
rewarding our stakeholders. Providing our clients
with world-class expertise on a locally available
basis. Assisting our clients in delivering lasting,
differentiated and significant improvements in their
performance whilst building a great firm that attracts,
enhances and excites exceptional talent. To be the
most innovative and dynamic organization, with the
highest technical, financial and ethical performances.
4-SYSTEM ARCHITECTURE
4.1- Modules
A module is a small part of our project. This plays a
very important role in the project and in coding
concepts. In Software Engineering concept we treat it
has a small part of a system but whereas in our
programming language it is a small part of the
program, which we also called as function in, some
cases which constitute the main program. Fig 1: system architecture
The modules are Work flow steps
Admin Module: 1. Member need to login before using any benefits in
club if he registered before or else registration process
Admin is the one who purchase the requested order will be takes-place.
from supplier and transfer of products from
warehouse to different section. Admin has got all the 2. After registration he will get a smart card using
privileges and overall control of the application. which he can login to the system.
Reception Module: 3. Using that smart card he can use the benefits of the
club after login successfully.
This module consists of member registration, luxury
tax, room’s facility, Guest fee, Death Fund. Once the 4. A RFID reader is used to detect the smart card
member registered and get a membership card, he/she which authenticates the truthfulness of customer..
can allow to access all the facilities of the club 5. Also the guest member can come with the
depending on member type. members, they will be provided separate smart card
Bar Management: which is valid for that particular time or one day.
Sales of liquor and generates invoice of the daily sale 6. Inside the club he can use the services like bar,
and overall sales. food and other beverages And also he can play in card
section only if his card have enough balance.
Card Section:
7. Every time he orders some food from the counter
This section consist details about running games, ,amount in his card will be deducted. The order can
closed games be given from his club app or he can also send it
through waiter. And this order will be displayed on
the monitor screen which is kept in the kitchen
section connected through raspberry pi.
8.The items to the bar section and kitchen section will
be provided from the warehouse which maintains
enough stocks for each section.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2649
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
9.In the bar section he can have any type of liquor and are more resistant to factors such as oils, climate, UV
need to pay using his smart card.. rays, etc. The images created by thermal printers are
also more legible because there is no ink to smudge.
10.Everyday the billing and the report will be made in
the club. And if any kind of receipt has to be provided 5. CONCLUSION
then it will be printed through thermal printer which
This project helps to keep a track of the customers,
uses less paper. every time the card is emptied the
giving them the required benefits and recognizing
member can fill the amount n use it again .
customers at clubs will allow them to create an
4.3 Some Advantages of Club Management additional value as against their competition. In this
System. project we are using a Radio Frequency Identification
(RFID) and Thermal printers. Radio Frequency
There are few advantages in this application
Identification (RFID) provides a smooth payment and
compared to older or existing club managing systems.
secure access. Every club member has a unique RFID
Since we are using RFID detectors for the members
Smart card which contains details like name of the
activities the security has to be taken care. Some
member, membership number, Flat number, contact
advantages of RFID in security are,
details and photograph.
Access Control
REFERENCES
Restrict and Permit Access using RFID based smart
1) Jerry Landt, "Shrouds of Time": outlines history
cards on a card by card basis RFID key cards only
and present of RFID: http://www.aimglobal.org
have to be placed close or within reasonable distance
/technologies/rfid/resources/shrouds_of_time.pdf
of a reader versus a swipe that may or may not
register. More secure than cards with the magnetic 2) P. F. Baude, D. A. Ender, T. W. Kelley, M. A.
strip, as they are embedded with an anti-cloning Haase, D. V. Muyres, and S. D. Theiss, "Organic
technology Semiconductor RFID Transponders", Electron
Devices Meeting, 2003.
Asset Visibility
3) S. Inoue and H. Yasuura, "RFID privacy using
Achieve full visibility of asset collections in real-time
user-controllable uniqueness", in Proc. RFID
Streamline and fast-track asset collection audits
Privacy Workshop, Nov. 2003.
Provides tight security by automatically tracking the
http://www.rfidprivacy.us/2003/papers/sozo_inou
movement of assets throughout location. If a piece
e.pdf
moves beyond a preset boundary such as a room or
doorway, security is instantly notified and the piece 4) M. Feldhofer, S. Dominikus, and J. Wolkerstofer,
can be easily located. "Strong Authentication for RFID Using the AES
Algorithm", Cryptographic Hardware and
Since the billing and reporting is done regularly in
Embedded Systems 2004.
this system, the thermal printers are used for the
http://www.springerlink.com
billing purpose. Some important advantages of these
/openurl.asp?genre=article&issn=0302-
are,
9743&volume=3156&spage=357
Increased Print Speed – Thermal printers are able to
5) K. P. Fishkin, S. Roy, and B. Jiang, "Some
print at much faster rates than other printers. Their
methods for privacy in RFID communication", in
printing heads create images in milliseconds, resulting
Proc. 1st Eur. Workshop on Security in Ad-Hoc
in much faster lines per second (lps) and images
and Sensor Networks, 2004, http://www.intel-
which dry extremely quickly.
research.net
Reduced Printing Costs – Thermal printers are /Publications/Seattle/062420041517_243.pdf
inkless, using heat to react with the paper to create
6) D. Haehnel, W. Burgard, D. Fox, K. Fishkin, and
images, forgoing ribbons or cartridges in the process.
M. Philipose, "Mapping and Localization with
The only consumable needed for thermal printing is
WID Technology", International Conference on
the paper.
Robotics & Automation, 2004. [Juels04] A. Juels,
Improved Print Quality – Thermal printers create "Minimalistic Cryptography for Low-Cost RFID
higher quality, more durable images than impact Tags", Security in Communication Networks
printers. They produce clear, long-lasting images that 2004 [Krumm04] J. K
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2650
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
7) Y.-P. Huang, Y.-T. Chang, and F. E.
Sandnes.Ubiquitous information transfer across
dierentplatforms by qr codes. J. Mobile
Multimedia,6(1):3{14, 2010.
8) ISO 16022:2006. Data Matrix bar code
symbologyspeccation. ISO, Geneva, Switzerland.
9) ISO 18004:2006. QR Code bar code
symbologyspecication. ISO, Geneva, Switzerland.
10) ISO 24778:2008. Aztec Code bar code symbology
11) specication. ISO, Geneva, Switzerland.
12) S. Lisa and G. Piersantelli. Use of 2d barcode
toaccess multimedia content and the web from a
mobilehandset. In GLOBECOM, pages
5594{5596, 2008.Member registration Issuing
smartcard RFIP reader (detect smart card) Can use
bar,foof etc Payment amount will be deducted
from card Biling and reporting
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2651