Hotel Managemnet System
Hotel Managemnet System
INTRODUCTION
The Hotel management information system is a system that aids the management of the
Customers’ data, Hotel staff data, customers’ registration, Customer accommodation or
allocation into specific rooms, room reservation and Personnel staff management.
Hotels use manual method for Customer registration and allocation and record keeping by filling
up the forms provided by the Hotel Staff and then the filled forms are kept in file-folders. For the
hotel staff to know which rooms are free and available they would have to check through their
various files or keys and this system is a bit cumbersome and even more so for a business that is
trying to expand . The registration is based on manual work and all the processes are done
manually. The same manual process is involved in staff record, roster keeping and payroll.
The phase of system analysis process deals with problems that are affecting the current
manual system. The problems are those, which are affecting the hotel in its daily routine work.
As the growing trend in most business in InfoTech World of Computers, need of accuracy,
perfectness, speed and high memory data storage is a must. Each and every problem must be
solved with least amount of time and energy.
The problems faced by the existing system and hope to be solved by the Hotel Management
System are described below:
1
No security of data
Mistakes occurring in Calculation of funds
Lack of efficiency
Data redundancy
Data inconsistency
Incidence of Fraud
Difficulty in maintenance of records: It is very difficult to maintain data record in the system
as all the records are entered in the register or the perspective record books. There are
chances of the record books or files in which all the Data are stored may be torn or wearied
out or some other damages result or files may even be misplaced.
Time Consuming: It is very time consuming and difficult to write each and every entry and
exit of customers into the hotel in the register. Also it takes a lot of time if all the entries are
to be repeated say to keep in another record for safe keeping. It is also time consuming to
check for data quickly. In the current system processes such as making different types of
reports, preparing merit lists, and tedious calculations are examples of time consuming
processes.
Editing of data: Manually written data cannot be changed or edited once written. If there is a
mistake and the administrator tried to cancel it out and write it again this would make the
entire register very dirty and disorganized. If data is entered incorrectly the entire system gets
incorrect while editing wrongly entered data cannot easily solve errors.
Incidence of Fraud: Fraudulent acts can be perpetuated by the staff arising from record
insecurity. The continuous incidence of fraud in the hotel organization may lead to non-
profitability of the business and the hotel involved may eventually fold up.
Data Insecurity; As the data is stored in files or registers, it is not a secure place, As the
storage media here are files and books or registers, there are chances of getting this storage
media lost, torn, or it may go in the hand of the wrong person which can destroy the database
2
or it can also be destroyed accidentally. Also in the system, data should be shown to the
person according to his position on the establishment; everybody should not be allowed to
use all the data.
If the Data goes into the hand of the wrong person he or she may take advantage of the data.
So security is the major aspect of the Hotel Management System.
High Data Redundancy: As mentioned in the current system. Due to maintenance of so
many registers there is a high redundancy of data i.e. same data is recorded repeatedly.
Data Inconsistency: Here as mentioned in the above step the same information is written in
more than one place that creates the problem, where there is a change or deletion in the
recorded data.
Provide Data Security: The study will install security measures by providing different access
levels to various staff.
Effective Resource Management: The Human Resource module (HR) and Finance & Account
(F&A) module will enable effective utilisation of financial and human resources by
comparing the accounts receivable with the account payable and complete record of personnel
through the nominal roll module will enhance staff deployment and productivity.
3
Increased Profit Line for The Organisation: when there is reduced incidence of fraud this and
proper management of resources this will enable increased profit line for the organisation
Reduced Time Consumption: A good search algorithm will be implemented on the web
application to enhance the search facility whereby users of the system can search for all kinds
of data using various criteria.
The system can be handy to the user in the following ways:
To automatize the work such as gathering information, gathering Hotel Staff information,
Workers’ roster, food ordering and Hotel administration in general.
To atomize different types of reports.
Removal of Data Redundancy.
To create a centralized system where all necessary data and information can be accessed
easily.
Data Consistency.
The Hotel Management system is developed to overcome the most of the problems occurring
in the manual system by computerizing the existing system. The features of the newly proposed
computerized system are described in brief below:
After computerizing the system, the Hotel Administrator can finish their work in the least
amount of time possible and with very little effort. The computerized system has many gains and
efforts which the manual system cannot give in any type of situation.
In any manual system if we take the main problem arising is to maintain the number of records
and finding a particular record, computerized systems are most helpful in dealing with areas
where database comes into existence.
A computer can hold large amount of data in storage devices and it can operate at a very high
speed. The user can input all types of information into the computer and can be able to perform
any type of task which when done manually is tedious and time consuming.
4
1.5 METHODOLOGY
This section involves data gathering. Area of study, the data quality controls
provided for the study. It also illustrates how the data was analysed and presented.
PHP (Hypertext Preprocessor)
Server-side Scripting:
- PHP is employed to manage server-side logic, ensuring secure and efficient
handling of user inputs.
- Key functionalities such as boking reservations, checking room availability,
processing payments and managing sessions are handled by PHP scripys.
Dynamic Content Generation
- PHP generates dynamic HTML content based on user interactions and
database queries, ensuring a responsive user experience.
MySQL
Database Management
- MySQL serve as the relational database management system to store and
manage all necessary data for the hotel management system.
- The database schema includes tables for user details, room inventory,
reservation and other records.
- PHP scripts interact with the MySQL database using SQL queries to retrieve,
update and manage data efficiently.
5
HTML (Hypertext Markup Language)
Structure and Content
- HTML provides the foundational structure for the web pages.
- Its used to define essential elements such as forms, buttons, tables and
other components necessary for user interactions within the hotel
management system.
JavaScript
Client-side Scripting
- JavaScript enhances the user experience on the client side by enabling
dynamic content updates and interactive features.
- Functions such as form validation and real-time updates are implemented
to improve usability.
AJAX (Asynchronous JavaScript and XML)
- JavaScript is utilized with AJAX to fetch data from the server
asynchronously, ensuring real-time updates and smoother interactions
without the need to reload the page.
To do this, a proper search algorithm must be incorporated; the method involves using specific
search criterion to select information from sources. The overall methods which are used while
gathering information are:
1. Interviewing
2. Record Inspection
6
3. Observation
1. Interviewing: interview allows the analyst to collect or gather the information from the
individual or group who are generally the current user of the existing system or potential user of
the proposed system. This is a basic source of qualitative and helpful information. It also allows
the analyst or developer to discover areas of misunderstanding and problems. User interviews are
conducted to determine the qualitative information. These interviews which were instructed
interviews, provided opportunity to gather information from the respondents who are involved in
the process for a long time.
These interviews provided information such as:
Activities involved in process allocating room to customers
Activities involved in the process of verification of rooms
Preparing all the various reports
Limitation of the existing system
Problems faced by the user in the existing system.
2. Record review: It is said to better to believe in records than in people. Thus a good analyst
always gets facts from documents. An existing system can be better understood by examining
existing documents, forums and files. Records may include:
Written policy manuals
Rules and regulations
Standard operating procedures used in Hotel Management System
Forms and Documents
To gather details about Hotel management System, many kinds of records and reports will be
reviewed including: Standard operating procedure, Reports generated by the existing system,
Document flow (input/output) of Hotel Management, Process of allocating of rooms to
customers.
7
3. Observation: Observation can bring in missed facts, new ways to improve the existing
procedures, duplicate work done inadvertently. It can also bring in what other fact finding
methods cannot. But his task is delicate because some people do not like to be observed when
they work. Observation gives analysts the opportunity to go behind the scenes in a Hotel to learn
how things work. Observation should look for:
Operational inefficiencies
Alternative routes and procedures
Interruptions in normal flow of work
Usages of files and documents
Informal communication channels.
The goals are achieved based on ability of the computer to store large amounts of data which is
very useful to store information regarding the transactions of Sacoba Hotel. The study is limited
to the following:
RECEPTION MODULE: The Reception module covers all the customer allocation and booking
with the sub-fields (Customer Details, Room Allocation, and Cashier Posting).
8
ACCOMODATION MODULE: The Accommodation covers all Room Maintenance,
Housekeeping Schedules and room inventory.
ADMINISTRATION & GENERAL SERVICES: Covers Personnel staff record keeping and the
stores with inventory.
Hotel management Information system: An integrated set of components for collecting, storing,
and processing data and for delivering information, knowledge, and digital products for a hotel.
Record: A record is a value that contains other values, typically in fixed number and sequence
and typically indexed by names.
Database: A database is an organized collection of data. The data are typically organized to
model relevant aspects of reality in a way that supports processes requiring this information.
Chapter One: This part of the work reveals the background of the study and gives a brief
account each of statement of the problem, aims and objectives, importance of the study,
methodology of the study, scope of the study, layout of the project and the definition of the terms
that will be used in this project.
Chapter Two: This chapter has to do with the literature review aspect of this project. It explains
different articles on Hotel Management. It also gives a review of an existing online system in
relation to the proposed system.
9
Chapter Three: This chapter explains the system analysis, methodology, and system design of
both the existing manual system and the proposed system.
Chapter Four: This chapter deals system implementation and documentation of the new system,
which includes the tools, software and hardware requirement of the new system, system testing
and maintenance of the new system are also disused here.
Chapter Five: This chapter summarizes the entire project as well as drawing conclusion and
recommendations from the project.
10
CHAPTER TWO
LITERATURE REVIEW
In the literature review we consider and examine the work done by other scholars and
researchers who have broached on this particular topic (Hotel Management Information System).
2.1 INTRODUCTION
Technology has made a considerable impact on the Hospitality industry in recent years and will
continue to do so with the increasing use of computer, controlled equipment and the growth of
information technology in general” (Jones and Lockwood, 1989, p.6) Really in the last two
decades, technology has become far more advanced and far more widely used throughout all
types of industry. The tourism and hospitality industry is no exception. Indeed, many tourism
and leisure establishments rely on technological systems for the vast majority of their
operations.
Part of the reason why hotels utilize technological systems in their operations is because
it keeps them up to date in terms of where they are placed in the market. It makes work easier
for staff members, allowing them to work more efficiently and taking away time consuming
activities which can be carried out by the technology. In some hotels, the utilization of
technological systems mean that fewer staff members are needed and this saves considerable
costs. For others, especially luxury hotels, this is not the case but it means that the staff can be
11
free to attend to customers on a more personal basis, thus upholding high standards. Therefore, it
is understandable that 5 star hotels must ensure that they employ the most advanced technology
available. This is because their priority is maintaining their position and status as a luxury brand,
rather than cutting costs, which would be more of a priority for budget hotels which cater to a
lower end market. Therefore luxury tourist establishments rely on top quality technological
systems. Jones and Lockwood (1989) noted “Companies have also been able to produce higher
quality products because technology has developed that assists them to do so”. For example,
many 5 star hotels employ revenue managements systems which aim to ensure the maximising of
profits for perishable products. It entails that they must take into consideration the timing of the
sale, to whom they are selling the product and what sort of product they are selling. Pizam
illustrates its use by claiming that revenue management in hotel management is the “business
practice of selling the right inventory to the right customer at the right price at the right time so
as to maximise revenue, profit and market share” (Pizam, 2005, p. 551). With this in mind,
hotels and hotel managers implement revenue management systems which are able to monitor
how many rooms are being reserved and react to this information. If, for example, there is a
short amount of time before the date approaches in which a number of rooms are not sold,
managers can decide to offer discounts to entice people to fill these rooms (Phillips, 2005). A
room which is unsold is more financially damaging to a business than a room which is sold for a
reduced price, due to the perishable nature of the product. The predominant negative factor of
RM systems is that they are extremely expensive and can therefore be costly for hotels to
maintain. Indeed, Phillips explains that companies with “expensive and sophisticated revenue
management systems are going bankrupt”. This is why five star hotels are often able to employ
them while hotels which are lower down the market are not.(Phillips, 2005, p. 142).
12
many have advanced communications systems installed in the rooms which means that those on
business trips can continues with their work while they are guests at the hotel. Once again, in 5
star hotels, it is all the more important to provide these facilities; customers pay a lot of money
and so expect to have a certain amount of facilities and quality additions provided for them
(Peacock, 1995, p.21).
2.2 INFORMATION
Furthermore, the information content of a message comprises the effect it has on the image of the
person who can understand the message. Therefore, information is the effect to which the
meaning of an object is attached.
In information management, information is used in a more general sense to encompass all the
different ways of representing facts and events within an information system. Information is a
meaningful set of data that tells one something about the relationships between data. In order to
produce information, an ‘information system’ is required to input such data, to process and store
that data and to create information. Information system consists of entities, which are connected
through relationships. An entity in this sense is something of interest to the user concerning
which data to collect or store. (E.g. student information).so data constitute a representation of the
perceived attributes of ‘information system’. To identity process, store, retrieve, disseminate and
information about such entity in a ‘system’ requires a management information system.
According to Cassidy (2005), Information is a critical resource in the operation and management
of tertiary institutions. Timely availability of relevant information is vital for effective
performance of managerial functions such as planning, organizing, leading and control. He
further discuss that, an information system in tertiary institution is like the nervous system in the
human body; it is the link that connects all the tertiary institution components e.g personnel,
admission, exams and record, bursary, library, sickbay, student’s affaire unit, security and
management unit.
13
2.3 INFORMATION SYSTEM
Information system is an integrated set of components for collecting, storing, and
processing data and for delivering information, knowledge, and digital products. Business firms
and other organizations rely on information systems to carry out and manage their operations,
interact with their customers and suppliers, and compete in the marketplace. For instance,
corporations use information systems to reach their potential customers with targeted messages
over the Web, to process financial accounts, and to manage their human resources. Governments
deploy information systems to provide services cost-effectively to citizens. Digital goods, such
as electronic books and software, and online services, such as auctions and social networking,
are delivered with information systems. Individuals rely on information systems,
generally Internet-based, for conducting much of their personal lives: for socializing, study,
shopping, banking, and entertainment (Encyclopaedia Britannica).
Any specific information system aims to support operations, management and decision
making(SEI report) In a broad sense, the term is used to refer not only to the information and
communication technology (ICT) that an organization uses, but also to the way in which people
interact with this technology in support of business processes Kroenke, D M.( 2008).
There are various types of information systems, for example: transaction processing
systems, decision support systems, knowledge management systems, learning management
systems, database management systems, and office information systems. Critical to most
information systems are information technologies, which are typically designed to enable
humans to perform tasks for which the human brain is not well suited, such as: handling large
amounts of information, performing complex calculations, and controlling many simultaneous
processes.
Silver et al. (1995) provided two views on IS that includes software, hardware, data,
people, and procedures. A second managerial view includes people, business processes and
Information Systems. The Association for Computing Machinery defines "Information systems
specialists as focusing on integrating information technology solutions and business processes to
meet the information needs of businesses and other enterprises."
In an information system, input data consist of facts and figures, which form the System’s raw
material. Information is data that has been usefully processed. However, an information system
14
does not only contain data and information. There are also other elements inside the system,
which are related and are in support of one another. The presence of these related elements
makes information more useful ă whereby, it can be made available, can be processed,
distributed, manipulated, saved, and so on. This combination gives rise to a
system, which is orderly and as such it is called an "Information System". The activity of
converting data into information is called a process. An information system contains FIVE main
components; the hardware, software, data, process and human.
Hardware: Information system's hardware refers to all types of hardware and the media
used for input, processing, managing, distributing and saving information that are being
used in an organisation. Examples of the hardware are the physical computers, networks,
communication equipment, scanners, digital drives, and so on.
Software: Software consists of two categories; the system software and the application
software.
- System Software controls the computer and contains the operating system and device drivers,
which can communicate with the hardware. It can also modify data into a new form, prevent
viruses and make copies.
- Application Software contains programs which can help users and enable companies to perform
business functions. Users can increase productivity with the presence of application software
such as spread sheets, word processing, ordering systems, and accounts receivable.
Data: Data refers to the raw facts on anything or entities like student names, courses and
marks. The raw data that has not yet been provided can be processed to become more
useful information.
15
Process: Process or procedure explains the activities carried out by users, managers and
staff. Process is important for supporting a certain business model available as written
documents or as reference materials on-line.
Human: The main objective of an information system is to provide invaluable
information to managers and users, whether inside or outside the company. Users can be
broken up into three categories, which are:
- End-Users, consisting of the staff, customers, suppliers and others who communicate
with the information system.
- Internal Users, including the managers, technicians, sales representatives and corporate
officers.
- External Users, consisting of the customers who use the company’s system for
performing transactions, suppliers who use the system for planning sales, and the staff
who use the system outside office hours. The success or failure of an information system
depends on whether the system that has been developed can fulfil the user's requirements,
and the users feel satisfied with the results and the system's operation. A successful
system requires integrated efforts from information technology experts such as the system
analysts, programmers and the information technology managers so as to fulfil business
needs and to support company's objectives.
According to Couger John, (1973), the information systems development process is
viewed as consisting of analysis, design and implementation phases, prior to the operation
phase. These phases do not ordinarily take place strictly in the order given but rather
existing together on a continuing pattern of interaction. The development of information
systems then consists of an iterated process of information analysis, system design and
implementation. This system life cycle, “being pointed out, applies to other kinds of
development effort as well.
16
2.3.1 INFORMATION SYSTEM ANALYSIS
The development of information systems is not only a technical process but also a political one.
Achieving a major success with large, integrated systems that are combined with the traditional
systems requires the organization to analyse the existing system.
Explaining a system analysis approach, researchers assert that a good information system
depends slightly on equipment, great deals on human technical backup, and most of all, on how
the system is organized (structure, design and its integration) that determines its success. This
requires the establishment of information requirements in an effort to organize such systems.
The major challenges of organizations (especially in higher education) are to plan, manage, and
control the development and operation of such information systems. This requires an information
analysis process as an institutional research activity to establish not only what information is
required but also why to what purpose it is to be put.
Various models of information analysis have been developed. The most common approach to
analysing systems is the ‘systems life cycle’. The systems life cycle model has been widely
applied in the analysis of systems. This has been the backbone of research and practice since
1960. The model works on the assumption of steady uni-directional progress through the various
stages, without going back or repeating them. The cycle involves conceptualization of the idea
initiation, design, assembly and testing of system rules and specifications, installations, operation
and maintenance.
Summarizing the model in four stages, we have problem identification, analysis, design and
operation. Analysis of the requirements requires studying the technical, legal, organizational, and
socio-economic feasibility aspects.
This determines what the system will do distinctively. Describing two features of system design
when referring to higher education;
17
students and the institution and critical constituents, termed as the remote
environment.
The appropriate descriptors for each of the entities they are able to identify what
needs to be known about the reference entities.
18
Addressing problems and troubleshooting
Ensuring events and conferences run smoothly
Supervising maintenance, supplies, renovations and furnishings
Dealing with contractors and suppliers
Ensuring security is effective
Carrying out inspections of property and services
Ensuring compliance with licensing laws, health and safety and other statutory regulations.
2.4.1 SYSTEM
A system is a set of interacting or interdependent components forming an integral whole.
Or a set of elements (often called components) and relationships which are different from the
relationships or the set or its elements to other elements or sets. (Merriam Webster online
dictionary)
Every system I delineated by its spatial and temporal boundaries, surrounded and influenced
by its environment, described by its structure and purpose and expressed in its functioning.
Some systems share common characteristics, including:
A system has structure, it contains parts that are directly or indirectly related to
each other ;
A system has behaviour, it exhibits processes that fulfills its functions or purpose;
A system has interconnectivity; the parts are connected by structural and/or
behavioural relationships.
A system structure and behaviour may be decomposed via sub systems and sub
processes to elementary parts and process steps.
The term system may also refer to a set of rules that govern structure and or behaviour.
19
system in order to understand it and to predict or impact its future behaviour. These models may
define the structure and/or behaviour of the system.
20
2.4.3 ELEMENTS OF A SYSTEM
Following are considered as the elements of a system in terms of Information systems:-
1. Input
2. Output
3. Processor
4. Control
5. Feedback
6. Boundary and interference
7. Environment
INPUT: Input involves capturing and assembling elements that enter the systems to be
processed. The input are said to be fed to the systems in other to get the output. For
example input of a computer system is input unit consisting of various input devices like
keyboard, mouse, joystick e.t.c
OUTPUT: Those elements that exist in the system due to the processing of the input are
known as output. A major objective of a system is to provide output that has value to the
user.
PROCESSOR: The processor is the element of a system that involves the actual
transformation of input to output. It is the operational component of a system.
CONTROL: the control element guides the system. It is the decision-making sub-system
that controls the pattern of activities governing input, processing and output. It also keeps
the system within the boundary set.
BOUNDARY AND INTERFACE: A system is defined by its boundaries- the limits that
identify its components, processes and interrelationships when it interfaces with another
21
system. For example in a computer is there is a boundary for number of bits, the memory
size e.t.c.
ENVIRONMENT: the environment is the super system within which the organisation
operates. It includes input, processes and outputs. It is the source of external elements
that impinge on the system.
22
services technology. Today e-commerce is not merely using the internet to transfer business data
or supporting people to interact with dynamic web page, but are fundamentally changed by web
services. The World Wide Web Consortium’s eXtensibleMarkup Language (XML) (W3C, 2003)
and the eXtensibleStylesheet Languages (XSL) (W3C, 2003) are standards defined in the interest
of multi-purpose publishing and content reuse and are increasingly being employed in the
construction of web services. Since XML is seen as the canonical message format, it could tie
together thousands of systems programmed by hundreds of programming languages. Any
program can be mapped into web service, while an web service can also be mapped into program
(Eric, 2002). And we found that this system greatly improves both the hotel customer and hotel
officer’s experience in the hotel business work flow. Because current technologies are quite
mature, it seems not to be difficult to integrate the existing system and the new coming systems
(for example, web –based applications or mobile applications). However currently in hotel
industry there re few truly integrated systems used because there are so many heterogeneous
systems already in existence. Scalability, maintenance, price, security issues then become huge
to overcome.
This system is developed to integrate the business flow of hotel management by using web
services and software integration technologies. These involve a scenario of hotel reservation and
discuss the interaction between the system and the users including the design and
implementation of this system (Yang et al, 2003).
2.7 CHALLENGES
Web services technology is developed rapidly as a practical means to integrate
heterogeneous systems and develop new applications. Our project successfully integrates
systems in hotel business chains together. Although research has greatly advanced in this area,
developing and maintaining integration system in hotel industry remains a lot of challenges
(David et al, 2002).
First of all, our experience implicated that in order to deploy a global, or to less scale,
national wide hotel reservation system, there is a long road ahead for hotel industry to get IT
standardization. Nowadays there are several hotel alliances existing, but these organizations do
not touch data exchange standard between enterprises.
23
Secondly, security is one of the most important and complicated challenges related to
our work. There are lots of research papers on providing security solution of integration of
heterogeneous computers and resources spread across multiple domains with the intent to
provide user services. We intend to obtain three basic targets. One is to keep the contents
confidentiality and integrity – that is to ensure nobody ever tampers with or steals the data
transferred through public networks. The other is to control access to web services. Before using
web services must pass the authorization procedures (Davi et al. 2002)
Control: The complete control of the electronic system is under the hands of authorized
persons only who have the password to access the system and illegal access is not
permitted. Control is entirely in the hands of the administrator and the other members
have the rights to see the records not to change any transaction entry.
Security: Security is the main criteria for electronic hotel management system. Since
illegal access may corrupt the database and ensure protection of the sored data.
24
2.9 REVIEW OF PREVIOUS LITERATURE
One project relating to the proposed system was titled “Development Of Management System”.
The project was done by students of Ajayi Crowther University named Matti Olarenwaju M. and
Jenfa Abayomi J. in partial fulfilment to their bachelor degrees in Computer Science. The system
is a web based system for management of a hotel and its day to day activities. The technologies
used to design and implement this system were: Microsoft Visual Studio, Visual Basic.net
and .NET framework Platform Architecture.
As rightly observed by Matti Olarenwaju M. and Jenfa Abayomi J. (Ajayi Crowther University,
2011), Hotel Information Management System is a technique that is used in the hospitality
industry to provide satisfactory services to Customers, improve company performance and make
Hotel management easier. They also noted that the ability to manage a hotel through electronic
means by multitude of choices such as web and mobile technologies is instantly attractive. Such
facilities should also overcome constraints associated with the existing manual method of
managing a hotel. There is no doubt that electronic hotel management offers a convenience that
would be appreciated by many people but it also has many challenges such as security issues
within the system itself, large scale deployment of the software and also protecting the server
from malicious attacks especially when the service is opened to the internet.
This project study underwent few challenges such as the lack of e-payment system on the
customer booking portal, lack of centralized management services (Asset Register, Staff
Records, and Payroll System).
Another project related to the topic was carried out by Wong PohKian (School of Arts and
Science Tunku Abdul Rahman College Kuala Lumpur,2010)in partial fulfilment of his bachelor
degrees also noted that Hotel information Management Systems are becoming increasingly
popular due to a rise in the need for more hospitality service providers hence any newly
developed software must be able to meet all the services that the Manager would require to
25
provide for the ever increasing needs of the customers and these presents a lot of challenges for
the Application developers in order to meet these needs.
The system was designed using PHP, HTML, CSS, JavaScript, Bootstrap and MySQL.
26
CHAPTER THREE
3.1 INTRODUCTION
In this chapter we are taking a look at the management system, the processes,
methodology and the steps taken to create the system, we will evaluate the research methodology
and elaborate on the basic functionalities of our management system. This approach will be used
in order to overcome the challenges highlighted in the previous chapter.
The Project work will ensure reservation of hotel rooms, staff management, and resource
management. A “Use Case” scenario is the room search for room reservation. Users may face
difficulties searching between available and booked rooms, but the automated system would
search more efficiently with the proficient search algorithm. All details of the rooms are stored in
the database servers and can be retrieved or modified with very little stress. Another “Use Case”
is the accounts receivable and payable field of the F&A module. The accounts receivable simply
captures all funds coming-in with their sources and dates while the accounts payable displays the
money going-out of the organization with their destination. The business flow is quite simple;
however, to accomplish all these tasks is burdensome for both the customer side and the hotel
side without an efficient and integrated hotel management system.
With the HMIS (Hotel Management Information System), Restrictions and access levels
can be stipulated to prevent unauthorized or unwanted personnel from any point of operation i.e.
workers cannot have access to areas not pertaining to their roles as set by the administrator. The
administrator can also decide what operations can be carried out where on the application. For
example a staff with the role “Housekeeping” should not be able to modify the schedule set for
him/her for the month by the House keeping Manager, and the catering staff should not have
access to the “cashier posting” of customer accommodation.
27
Staff Payroll can be generated and added to records with details from the staff record
(HR) and accounting computation.ie specific details from the staff record will be brought up
during the preparation of staff salaries and the gross and net pay will be calculated. The Assets
Register will enable record keeping of both the fixed asset and floating asset in the organization.
The project simply serves as an ERP (Enterprise resource planner/ Management System)
for the hotel organization and should function effectively if utilized properly.
In Order for the goals of the automated system to be achieved the design of the HMIS takes the
following into consideration:
The system must make the hotel services fully known to the customer such as the room
details and pricing.
The system must be able to search databases or records to provide quick result based on
users query.
The system should ensure data consistency and no duplication of data no matter how
small.
The system must be accessed only by authorized persons and should indicate the user at
any point in time (User Authentication).
The design (Graphical) must be comprehendible and not clumsy to the user; easy to use,
and easy to understand.
The system should be able to generate reports and print out information on users demand.
The system must have access levels based on user roles such as Manager-Administrator-
Accountant-Other staff.
The system should generate primary keys in most cases unless specified by user, and the
unique keys should be visible.
The system must carry out only actions specified by the user (browse, modify, delete,
add).
28
3.3 SYSTEM DESIGN
This is the process and art of defining the Architecture, components, modules, interface, and data
for a system to satisfy specified requirements by the stakeholder or customer.
The Project is designed in phases to ensure that all necessary fields are covered in the
management of the Hotel system. The design entails room reservation which is a crucial aspect
of the system, administrator operations which control the entire system, and user activities (Other
Staff) and data retrieval.
29
3.3.1 DATA FLOW DIAGRAMS
Manager Admin
Other
Staff
Front
Desk/Reception
Accommodation
Staff
Security
Records
Catering/ Food
Ordering
Finance &
Account
Admin &Gen.
Services
30
3.3.2 PROJECT ARCHITECTURE
HIMS
Front Desk / Reception Accommodation Catering Finance & Accounts Admin & General Services
Customer Information
Add Hotel Room Food Ordering Schedule Staff Payroll System Personnel Staff Record
Maintenance
Housekeeping Schedule
Cashier Posting Accounts Payable
Assignment
31
3.3.3 PROGRAM ACTIVITY
Start
Authentication
For Admin
Password Invalid
Username &
Password
Is Password &
Username Valid
Yes
Choose Module
No No
Check In Customer Manage Rooms No No Admin & General
Catering/Food Delivery Finance & Account Mgt
(Reception) (Accommodation) Services
Yes
Customer Personnel Staff
Add Hotel Generate Staff
Information Catering Record
Room Payroll
Maintenance Maintenance
Cashier House-keeping
Restaurant & Accounts
Posting schedule
Bar posting Receivable
Assignment Maintenance
Room Inventory
Maintenace Assets
Register
Addition Addition
Successful Successful
Stop
32
Figure 3.3 Program activity for Hotel Management Information System Modules
START
DISPLAY
HOTEL
SERVICES
PROMPT SYSTEM TO IS
PERFORM OPERATION
OPERATION
DISPLAY
RESERVATIO
N PAGE
ACCEPT ROOM
CHECK-IN AND
CHECK-OUT
DATE
SYSTEM CHECKS IF
SELECTED ROOM IS
AVAILABLE WITHIN
DATES
IS ROOM
NO WITHIN YES
ROOM DATE ACCEPT
SELECTED CUSTOMER’SDEPOSIT
NOT BASED ON
AVAILABLE CAPACITY
SAVE RESERVATION
INFORMATION FOR
THE CUSTOMER
SAVED SUCCESFULLY
STOP
33
Figure 3.4: Program activity for reservation of rooms
Director
Security/Maintenance
User
34
3.3.5 Hotel Room Maintenance
Brief description: This case enables the director (Accommodation) to add a hotel room and
update the room information. It also aids frequent room status update whether room is vacant,
occupied, housekeeping, repairs etc.
Actor: Director
35
Display sub-Menu: Add Room Number
Display sub-Menu: Room Type Maintenance
Display sub-Menu: Room Rates Maintenance
Display sub-Menu: Room Status Maintenance
If the sub-menu selected is “Add Hotel Room”, The S-1 Add Hotel Room sub-flow is
performed.
If the submenu selected is “Edit Hotel Room”, The S-2 Edit Hotel Room sub-flow is
performed.
Sub-Flows
S-1
The System will check on all data that user keys in the required field on data type, maximum
length, correct format, and a unique ID which does not allow any duplicate data. If all validation
is valid, then the operation will be successful otherwise an error message will be displayed.
S-2
The system will display all hotel room information in this module. When the director clicks on
the “edit” button of the selected field, all data will be post into the text or dropdown-list for the
director to update the record. The System will check on all data that user keys in the required
field on data type, maximum length, correct format, and unique ID which does not allow any
duplicate data. If no error occurs, the director is allowed to update the record and all information
will be updated.
36
Figure 3.7 Use Case diagram for Employee Payroll Maintenance
BRIEF DESCRIPTION: This use case allows Accounting manager and staff to add and print
the entire company employee payroll records.
If the Sub-menu selected is “Add Payroll Record”, The S-1: Add payroll record sub-flow
is performed.
If the Sub-menu selected is “Print Employee Pay slip”, The S-2: Print Employee Pay slip
sub- flow is performed.
Sub-Flows
37
S-1
The Accounting Manager and staff are able to add all employee pay roll records by calculating
their monthly salary and allowance. They can add the employee records monthly or yearly.
Modification is needed when necessary fields need to be updated.
S-2
The accounting Manager and staff are able to print the employee pay slip by entering the desired
month and year and generate the report for printing.
When the accounting manager or staff is adding the employee payroll record, few fields are
required to be entered instead of calling from the database, such as month and year for the
employee salary. The data type must be entered correctly; else an error message will be
displayed to alert the user. An example is the basic allowance. The basic salary is stored on the
database based on the designation of the staff
When there is an empty textbox such as selected year in this module, the system will block the
update process and will display “The year field cannot be blank’ message to the user. Once the
format is valid it will be successfully updated.
38
Figure 3.8 Use case diagram for food ordering and delivery
Brief Description: This use case allows Housekeeping Manager and Staff to view customer food
order and allows them to search for undelivered food, update the food delivery status and print
the customer’s order receipt.
39
If the sub-menu selected is “view food ordering record’, The S-1: view food ordering
record sub-flow is performed.
If the sub-menu selected is “Update food delivery status”, The S-2: Update food delivery
status sub-flow is performed.
If the sub-menu selected is “Print Food Order receipt”, The S-3: Print Food Order receipt
sub-flow is performed.
Sub-Flows
S-1
Food ordering Manager and staff are able to view all customer food order. They can search or
filter customer order by delivery status. For undelivered order, they willprepare the cujstomer
order and deliver it as soon as possible.
S-2
When the food delivery staff has successfully delivered the customer order, he/she should update
the delivery status manually from undelivered to delivered.
S-3
Before the food delivery staff should deliver the customer order, he/she should print out the
customer order receipt and collect the money from the customer on delivery.
40
When the food delivery staff wishes to print the customer order receipt, the delivery staff should
enter the customer room ID, if the ID doesn’t exist or is entered in the wrong format, an error
message will be displayed to notify the user. If the delivery staff doesn’t enter any room ID a
message box with “Please fill in the Room ID” will be displayed.
41
Brief Description: This use case allows the house keeping manager to assign the duty schedule
of housekeeping staff by month. Besides, it also allows the housekeeping manager to update the
records and delete the records. The housekeeping staff is only allowed to view their schedule.
If the sub-menu selected is “Add House Keeping Record”, The S-1: Add House Keeping
Record sub-flow is performed.
If the sub-menu selected is” Edit House Keeping Record”, The S-2: Edit House Keeping
Record sub-flow is performed.
If the sub-menu selected is “Delete House Keeping Record”, The S-3: Delete House
Keeping Record sub-flow is performed.
If the sub-menu selected is “View House Keeping Record” The S-4: Add House Keeping
Record sub-flow is performed.
Sub-Flows
S-1
House Keeping Manager is able to add housekeeping record. Every month, two
housekeeping staff is assigned to a floor e.g. ground floor. Once the save button is clicked the
process is validated, and the record is added successfully else an error message is displayed.
42
S-2
The housekeeping Manager is able to update the records, but only two staff are assigned in the
update also. Once the save button is clicked the process is validated, and the record is added
successfully else an error message is displayed.
S-3
The housekeeping Manager is able to delete the records, and one the record is deleted the
“deleted successfully message is displayed”.
S-4
Housekeeping staff is able to check on their duty schedule by entering their ID’s. The System
will Display information about their schedule which includes floor number, month of duty, and
partner.
The data in the system has to be stored and retrieved from the database. Designing the
database is part of the system design. Data elements and data structures to be stored have been
identified at the analysis phase. They are structured and put together to design the data storage
and retrieval system. A database is a collection of interrelated data stored with minimum
redundancy to serve many users quickly and efficiently.
The general objective of the Hotel Management Information System is to make record
access quick, easy, inexpensive and flexible to the user. Relationships are established between
the data items, and unnecessary data items are removed. Normalization is done to get an internal
consistency of data and to have minimum redundancy and maximum stability. This ensures
43
minimizing data storage required, minimizing chances of data inconsistencies and optimizing for
updates, The MS Access database has been chosen for developing the relevant databases.
Access database program and Microsoft SQL-server comes at no extra cost and it is
available on every computer running a Microsoft operating system which is the most
popular operating system as at the time of the writing of this project report. Designing the
prototype database for our expert system which is a desktop based program, Access and
its Microsoft SQL-server is cost effective, easy to understand and it is a readily available
option.
SQL which stands for Structured Query Language is a defining standard in database
management. With Access having this standard through its Microsoft SQL-server and the
provision.
The following are the tables that are involved in the proposed system:
44
TransistingTo Text
NoOfNights Int
Occupation Char 250
telephone Char 20
Sign Char 50
45
Table 3.6: Passwords
46
LastUserFK Int
47
FFullName Text
MaritalStatus Text
ID_Number Varchar 50
Gender Char 1
Address Text
Telephone Bigint
RegistrationDate Date
Roles Text
Email Varchar 50
AccountNo Bigint
Department Varchar 50
Salary Decimal (18, 0)
48
Dateofacc Date
Value Money
49
FIELD DATATYPE WIDTH CONSTARINT/COMMENT
UserID Varchar 50 Primary Key
UserName Varchar 50
Password Varchar 50
RoleID Char 10
CHAPTER FOUR
50
SYSTEM IMPLEMENTATION
The following are the necessary hardware requirements necessary for the proper implementation
of the Hotel Management Information System:
4.2 IMPLEMENTATION
Implementation is the stage in the project where the theoretical design is turned into a working
system. It involves careful planning, investigation of the current system and its constraints on
implementation, design of methods to achieve the changeover, an evaluation of change over
methods. Apart from planning major task of preparing the implementation are education and
training of users. The implementation process begins with preparing a plan for the
implementation of the system. According to this plan, the activities are to be carried out,
discussions made regarding the equipment and resources and the additional equipment has to be
acquired to implement the new system. In a network backup system no additional resources are
require. The most critical stage in a achieving a successful new system is giving the users the
confidence that the new system will work and be effective. The system can be implemented only
after thorough testing is done and is found to be working according to specification. This method
also offers the greatest security since the old system can take over if the errors are found or there
is an inability to carry out a certain transaction while using the new system.
51
4.3 SYSTEM DOCUMENTATION
The Home page of the Hotel management Information system basically consists of five modules
which include; the front desk/reception module, Accommodation /Room Allocation module,
catering (Restaurant and Bar) Module, Finance and account module and Administration and
General Services. It also includes the “Log out” option and an i-frame which posts back all
clicked options.
The login page for the HMIS comprises of a dialog box which allows the user to input their User
name and password. It also includes a log in button and a retrieve password for users who forget
their password. It was developed using session (user id) to save the user name and password in
order to save the user name and password for future references or uses. The input will be
validated when user keys in a value for either of the two required values and when both are
deemed correct or validated it advances to the menu page of the application else a message
52
stating that the username and/or password will be displayed. This also goes also for the
registration for those who don’t have an account.
In the front desk module, customer details will be captured, allocation of customers to a specific
room and cashier posting of transactions will take place.
When a customer arrives at the front desk, the first procedure will be to take down the required
details which include His/her full name, number of nights, address, phone number, arriving from
and destination, and occupation. This page has also been designed to throw back error messages
when certain fields are left blank or unfilled. Added items can be updated (edited), deleted and
viewed by authorized staff. A search field has been included to locate specific entries in this
record or register.
53
Figure 4.3 Customer Form
Once personal details of customers have been registered the next procedure will be to allocate
the customer to the room of his or her choice (Deluxe, Standard, VIP and Chalet). The page
requires most importantly the name of the customer which is selected from the dropdown menu
and the room is selected from the list of available rooms in the drop down menu. Entries can also
be viewed, edited and deleted. The dropdown list only shows vacant rooms and as each room is
allocated to a particular client the room status table is updated to occupy hence excluding the
room from the list of available rooms until it is then manually updated to a vacant status.
54
Figure 4.4 Room Allocation
55
4.3.4 ACCOMMODATION MODULE
This module is to be used by the accommodation Director. It is used to carry out room
maintenance on the Hotel Management System. This includes room number, room type, room
rates and room status.
56
Figure 4.7 Room Status and Rates
57
4.4 APPLICATION AND SYSTEM TESTING
System testing is the stage of implementation which is aimed at ensuring that the system works
accurately and efficiently before live operation commences. Testing is the process executing the
program with the intent of finding errors and missing operations and also a complete verification
to determine whether the objectives are met and the user requirements are satisfied. The ultimate
aim is quality assurance. Tests are carried out and the results are compared with the expected
document. In case of erroneous results, debugging is done. Using detailed testing strategies a test
plan is carried out on each module. The various tests performed are unit testing, integration
testing and user acceptance testing.
The software units in a system are modules and routines that are assembled and integrated to
perform a specific function. Unit testing focuses first on modules, independently of one another,
to locate errors. This enables us to detect errors in coding and logic that are contained within
each module. This testing includes entering data and ascertaining if the value matches to the type
and size supported by ASP.net. the various controls are tested to ensure that each performs its
actions as required.
Data can be lost across any interface, one module can have an adverse effect on another, sub
functions when combined, may not produce the desired major functions. Integration testing is a
systematic testing to discover errors associated within the interface. The objective is to take unit
tested modules and build a program structure. All the modules are combined and tested as a
whole. Here the Server module and Client Module options are integrated and tested. This testing
provides the assurance that the application is well integrated functional unit with smooth
transition of data.
58
4.4.3 USER ACCEPTANCE TESTING
User acceptance of a system is the key factor for the success of any system. The system under
consideration is tested for user acceptance by constantly keeping in touch with the system users
at time of developing and making changes whenever required.
Maintenance involves the software industry captive, typing up system resources. It means
restoring something to its original condition. Maintenance follows conversion to the extent that
changes are necessary to maintain satisfactory operations relative to changes in the user’s
environment. Maintenance often includes minor enhancements or corrections to problems that
surface in the system’s operation. Maintenance is also done based on fixing the problems
reported, changing the interface with the other software or hardware enhancing the software.
Any system developed should be secured and protected against possible hazards. Security
measures are provided to prevent unauthorized access to the database at various levels. An
uninterrupted power supply should be so that the power failure or voltage fluctuations will not
erase the data in the files. Password protections and simple procedures to prevent the
unauthorized access are provided to the users. The system allows the user to enter the system
only through proper user name and password. After designing and coding the application it only
runs in the visual studio environment in order to make the application stand alone and
employable to other computer systems it needs to be compiled into an executable format (.exe).
Visual studios have an inbuilt program that allows for a one-click solution for this.
The work was designed based on the methodology stated in the previous chapters and the
implementation is based on the requirement for a hotel management system. The project work
has four major aspects which include the Reservation of rooms, retrieval of records, user’s
activities and administrator’s activities. The result from the implementation of the work is
explained in various sections below.
59
4.6.1 Reservation of Rooms
As a tradition in hospitality management sector, anyone who wished to lodge in a hotel must go
for reservation of room within the time such person wishes. This is necessary so that such room
is not given to another within the reserved date.
Therefore, in this phase, we are able to reserve a room each customer based on the day he/she
wished to check in and out. This is done by collecting some information from the customer such
as arrival date, departure date, customer name, country, state, town, phone number, including
number of adult and children. With the acceptance of these data the system display available
rooms and compute the changes after which the system accepts the prepaid amount and the store
in the database. The above process is depicted in figure 4.7 showing the reservation form. After
the first reservation the system is able to identify the customer when next he comes for
reservation by entering his/her number. The system ensures data room reserved with the
specified data is not made available during reservation for another customer
The administrator controls all the activities of the hotel. The administrator access the system by
authentication. After login the administrator can perform some function such as to reserve room
for customer, view information that are stored in the database as well as granting privilege to
access the system to various users and retrieving it from users. The system is flexible as more
rooms can be added to it.
The administrator supplies room details such as room name, room type, room description,
room number, rate amount, adult charge and child charge after which it saved in the database.
The administrator can also perform some other function such as data retrieval.
Some people apart from the administrator can access the system to perform some function.
The function performed is based on privilege granted to them by the administrator. Here, the user
login to the system as shown in figure 4.2. The user after login tom the system can also reserve
rooms for customers. Also, the user takes control of checking in and out of customers through
60
accepting the balance of the customer when checking in as shown in figure 4.4. Similarly, the
user can also display data stored in the database.
Another tradition in hospitality sector is to find stored data of the hotel information in the
database. In this phase, we are able to get the list of customers, list of rooms available in the
hotel, list of reservation, check-in details as well as check-out details. Figure 4.8, shows all the
list of reservation with respect to customer’s data displaying information about them at a glance.
Also the record of rooms available in the hotel can also be displayed. The record of check-in and
nut details of customer can also be displayed in the same manner.
From various result obtained from the implementation of the work; we have been able to
avoid collision in the allocation of rooms and also ensure proper management of data through
authentication thereby disallow unauthorized person from gaining access to the system. Also,
duplication of records is avoided. The customer’s data and other information about the hotel are
retrieved almost immediately. In a nutshell, we have been able to achieve the aim of the work
stated in the beginning of the work. The project can be implemented on real time basis and had
numerous benefits some of which are highlighted below.
Performance: The manual handling of the hotel record is time consuming and highly
prone to error. This work will improve the performance of the Hotel management system,
due to fast retrieval of data and coordination of data in a centralized manner.
Efficiency: The project work enhances efficiency in the activities of the Hotel since there
is division of labour through the privilege granted other users.
Control: The complete control of the electronic system is under the hands of authorized
person who has the password to access this project and illegal access is not supposed to
deal with. All the control is under the administrator and the other members have the
rights to just see the records not to change any transaction entry.
Security: Security is the main criteria for electronic hotel management system. Since
illegal access may corrupt the database and ensure protection of stored data. Therefore
this project work ensures security of data.
61
In summary, the result obtained from the implementation of the work and various benefit
incurred from the system is enough to entice all hotels and these will go a long way to improve
the quality of service provided to the customer. It is therefore suitable for all hotels where high
performance of service is of prime importance.
62
CHAPTER FIVE
5.1 SUMMARY
Traditionally hotel management is done using pen and papers. Hotel Management
Information System is required to assist in the management of data and records in the hospitality
sector. The system automates the entire process of managing staff information, financial
transactions within the hotel (Cashier Posting, Accounts receivable, Accounts payable)
monitoring resources (Asset & Personnel). This new system also helps with easy reservation of
rooms to the customer thereby minimizing efforts in the process.
The study revealed that several software systems exist for Hotel Management, some of
which includes “GuestPoint”, “FrontdeskAnywhere”, “SKYWARE Hospitality Solution” and
much more. A scalable HMIS can be developed and implemented to suit the environment in
which it is to be used.
Furthermore it can be concluded from the above discussion that a reliable, secure, fast,
and efficient system has been developed replacing the manual and less reliable system the HMIS
system can be implemented in hotels for better results regarding the management of customer’s
data.
5.2 CONCLUSION
In conclusion we believe this project if properly utilized will save time, reduce the
amount of work the administration has to do, and will replace the stationery material with
electronic apparatus. The system should also serve as a major tool to improving the efficiency in
Hotel management. Hence a system with expected results has been developed but there is still
room for improvement.
In terms of experience gained through the duration of this project study, the students have
been able to have broader knowledge about the management of Hotel organization using manual
63
and automated procedures. The students have also been able to improve their knowledge in
developing enterprise applications. We believe this project will serve the university efficiently in
their efforts to automate the Hotel management process of the “SACOBE LODGE”.
5.3 LIMITATION
As earlier mentioned the project study covers Reception, accommodation, finance and
account, catering, food ordering, administrative, security, and general services transactions in the
Hotel management.
However the project has limitations based on these facts
The “finance and account” aspect of the HMIS will not capture the budget
function; it only captures the accounts receivables and accounts payable.
Another limitation of the system is that customer’s signature will not be captured.
This process might make procedures cumbersome, which is what the study hopes
to eliminate; however it captures full details of the customer.
The system does not have an online payment option on the online room
reservation menu.
The system is not designed to run off-line.
Due to time constraints certain fields were not included; the software was
therefore reduced to covering critical aspect of hotel management.
These limitations were encountered in the course of the study, and appropriate techniques have
been applied to ensure the system functions properly thereby eliminates the “stale mate”
5.4 RECOMMENDATIONS
Various benefits associated with this work and the results of the implemented system make it
suitable for any hotel. Therefore it is recommended for any hotel especially those with a large
turnout of customers and where loss of customer’s information is common. This will protect the
interest of the Hotel owners and enhance good performance of the services provided.
64
Due to the fact that there will always be an increase in the expectations and demand of customers
and Hotel owners and administrators will always demand greater effectiveness and efficiency of
any system and prevention of unauthorized access into the system it is recommended that
constant research be carried out and regular updates made to increase the reliability of the
present system.
The growth of a hotel organization also depends on how well their resources (Human, Assets)
are managed, how well they treat their customers (Hospitality) leading to large turn-up, quality
of service rendered to customers and efficiency of the system in use. It is therefore recommended
to always put these factors into consideration when implementing any policies within the
organization.
Biometric measures such as fingerprint, retinal scan etc. should be included in the system
to ensure good security of the system thereby avoiding impersonation and unauthorized
access to stored data thereby preventing loss of vital information.
Implementation of a multi modal hotel management control system in delivery of service
to customers.
Implementation of more modern online facilities that might help prospective customers
interact (limitedly) more with the system and the Hotel in general such as PayPal for
making online transactions.
Adequate provision should be made for customers to interact with authorized users of the
hotel for reservation using their mobile phones.
65
REFERENCE
Bardi J.A (2011). Wiley: Hotel Office Management 5th Edition. [online]. Available :
http://eu.wiley.com/WileyCDA/WileyTitle/productCd-
Ben Ghalia M. and Wang P.P., “Intelligent system to support judgmental business forecasting:
the case of estimating hotel room demand,” Fuzzy Systems, IEEE Transactions on,
vol. 8, pp. 380-397, 2000.
http;//www.cognizantcommunication.com/[Accessed 15 June,2011]
David Trastour, Claudio Bartolini, Chris Preist, Semantic web support for the Business-to-
business e-commerce lifecycle, Proceedings of the eleventh international conference
on World Wide Web, May 2002.
Eric Newcomer, understanding Web Services: XML, WSDl, SOAP and UDDI, Addison-Wesley,
2002.
Fallon M.J.O’ and Rutherford D.G. (2011). Hotel Management and Operations | CA
College of Ayurveda [online]. Available at:
Guo J., et al., “CONFENIS Special session on the International Symposium on Electronic
Marketplace Integration & Interoperability (EM21’07), in Research and Practical
Issues of Enterprise Information Systems II. Vol. 255, L. Xu , et al., Eds., ed: Springer
Boston, 200, pp. 823.
66
Koolmanojwong S, “Analysis and Design of b to CE Marketplace for Tourism with UML”
M.S. Thesis, Faculty of Science and Technology, Assumption University, Bangkok,
Thailand 2000
Liebowitz J.and Beckman T. knowledge Organizations. Saint Lucie Press, Washington, DC,
1998.
Microsoft Developer Network (MSDN) Library for Visual studio 2005: SQL Server 2005,
Visual C#.
Ngai E. W.T and Wat F.K.T., “Design and development of a fuzzy expert system for hotel
selection,” Omega, vol. 31, pp. 275-286, 2003.
Riemer K. and Lehrke C., “Biased Listing in Electronic Marketplaces: Exploring Its Implications
in On-Line Hotel Distribution,” Int. J. Electron. Commerce, vol. 14, pp. 55-78, 2009.
Special Issue on e-services (SIOE); The problems and potentials of electronic systems,
Communications of the ACM, Vol. 47, Iss. 10, October 2004.
Weiser M, The Computer of the 21st century, Scientific American, vol. 265, no. 3, 66-75, 1991.
Wong Poh Kian: The One Hotel Management System. School of Arts and Sciences Tunku Abdul
Rahman University, Kuala Lumpur, 2011.
67
APPENDIX
<!DOCTYPE html>
<div class="wrapper">
<div class="content-header">
<div class="container-fluid">
<div class="col-sm-6">
</div>
68
<li class="breadcrumb-item"><a href="./admin?<?php echo $page ?>"><?php echo
ucwords(str_replace("_", " ",$page)) ?></a></li>
</ol>
</div> -->
</div>
</div>
</div>
<div class="container-fluid">
<?php
include '404.html';
}else{
if(is_dir($page))
include $page.'/index.php';
else
include $page.'.php';
69
?>
</div>
</section>
<div class="modal-content">
<div class="modal-header">
<h5 class="modal-title">Confirmation</h5>
</div>
<div class="modal-body">
<div id="delete_content"></div>
</div>
<div class="modal-footer">
</div>
</div>
</div>
</div>
<div class="modal-content">
<div class="modal-header">
<h5 class="modal-title"></h5>
70
</div>
<div class="modal-body">
</div>
<div class="modal-footer">
</div>
</div>
</div>
</div>
<div class="modal-content">
<div class="modal-header">
<h5 class="modal-title"></h5>
</button>
</div>
<div class="modal-body">
</div>
</div>
</div>
</div>
71
<div class="modal fade text-dark" id="viewer_modal" role='dialog'>
<div class="modal-content">
</div>
</div>
</div>
</div>
</body>
</html>
-- version 5.1.1
-- https://www.phpmyadmin.net/
--
-- Host: 127.0.0.1
72
START TRANSACTION;
--
-- Database: `lodge_db`
--
-- --------------------------------------------------------
--
--
73
`date_created` datetime NOT NULL DEFAULT current_timestamp(),
--
--
-- --------------------------------------------------------
--
--
74
`date_in` date NOT NULL,
--
--
(1, 6, 1, '2021-07-27', '2021-07-28', '1,2', 2500, 700, 3200, 2, '2021-07-24 13:30:22', '2021-07-24
14:04:54');
-- --------------------------------------------------------
--
--
75
CREATE TABLE `inquiry` (
--
--
INSERT INTO `inquiry` (`id`, `name`, `email`, `subject`, `message`, `status`, `date_created`)
VALUES
-- --------------------------------------------------------
--
--
76
CREATE TABLE `room_list` (
--
--
(1, 'Room 101', '<p style="margin-right: 0px; margin-bottom: 15px; margin-left: 0px;
padding: 0px; text-align: justify; color: rgb(0, 0, 0); font-family: &quot;Open
Sans&quot;, Arial, sans-serif;"> elit.</p><p style="margin-right:
0px; margin-bottom: 15px; margin-left: 0px; padding: 0px; text-align: justify; color: rgb(0, 0, 0);
font-family: &quot;Open Sans&quot;, Arial, sans-serif;">id, congue
tellus.</p>', 25000, 1, 'uploads/room_1', '2021-07-24 10:22:15', '2021-07-24 10:22:15'),
-- --------------------------------------------------------
77
--
--
--
--
-- --------------------------------------------------------
--
78
-- Table structure for table `users`
--
--
--
INSERT INTO `users` (`id`, `firstname`, `lastname`, `email`, `contact`, `username`, `password`,
`avatar`, `last_login`, `type`, `date_added`, `date_updated`) VALUES
79
(6, 'Ose', 'Ose', '[email protected]', '09123456789', 'ose', '1254737c076cf867dc53d60a0364f38e',
NULL, NULL, 0, '2021-07-24 10:41:04', '2021-07-24 10:57:40');
--
--
--
--
--
--
--
--
80
--
--
--
--
--
--
--
--
--
--
81
ALTER TABLE `accommodations`
--
--
--
--
--
--
--
--
82
MODIFY `id` int(30) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=15;
--
--
COMMIT;
<script>
</script>
<?php endif;?>
<div class="card-header">
</div> -->
</div>
83
<div class="card-body">
<div class="container-fluid">
<colgroup>
<col width="5%">
<col width="10">
<col width="15">
<col width="25">
<col width="20">
<col width="5">
<col width="5">
</colgroup>
<thead>
<tr>
<th>#</th>
<th>DateTime</th>
<th>User</th>
<th>Room</th>
<th>Schedule</th>
<th>Status</th>
<th>Action</th>
</tr>
</thead>
<tbody>
<?php
84
$i=1;
while($row= $qry->fetch_assoc()):
?>
<tr>
<td class="text-center">
</td>
<td align="center">
85
Action
</button>
<div class="dropdown-divider"></div>
</div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
<script>
$(document).ready(function(){
$('.delete_data').click(function(){
})
$('.view_data').click(function(){
uni_modal("Booking Information","bookings/view.php?id="+$(this).attr('data-id'))
86
})
$('.table').dataTable();
})
function delete_booking($id){
start_loader();
$.ajax({
url:_base_url_+"classes/Master.php?f=delete_booking",
method:"POST",
data:{id: $id},
dataType:"json",
error:err=>{
console.log(err)
end_loader();
},
success:function(resp){
location.reload();
}else{
end_loader();
})
87
</script>
88