0% found this document useful (0 votes)
4 views78 pages

Final Thesis Format

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views78 pages

Final Thesis Format

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 78

Department of Computer Science Engineering Guru Nanak Institute of Technology

A
Project Report
On

“Hotel billing system”

Submitted in partial fulfillment of the requirements for Degree of


Bachelor of Engineering
In
COMPUTER SCIENCE AND ENGINEERING
Rashtrasant Tukdoji Maharaj Nagpur University, Nagpur

Submitted by
Mahesh kurzekar Pallavi Nagrale
Hemant prasad Lukesh Oghare

Guided By
Miss.vaishnavi mam

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


GURU NANAK INSTITUTE OF TECHNOLOGY
(NAAC Accredited)
Dahegaon, Kalmeshwar Road, Nagpur 441501
2023– 2024
GURU NANAK INSTITUTE OF TECHNOLOGY
NAAC ACCREDITED
Department of Computer Science Engineering Guru Nanak Institute of Technology

Dahegaon, Kalmeshwar Road, Nagpur 441501


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Session 2023-24(EVEN)

CERTIFICATE

Forwarded here with the thesis titled with “Hotel billing system” by
Mahesh kurzekar, Hemant Prasad, Pallavi Nagrale, Lukesh Oghare,
students of GNIT done work for the fulfillment of the requirement for the
award of Graduation Degree of B.E. (Computer Science And
Engineering) in the faculty of Engineering & Technology, Rashtrasant
Tukadoji Maharaj Nagpur University, Nagpur, Maharashtra, India.

Miss. Vaishnavi mam


Guide Examiner

Prof. Raut sir Dr. Sudhir N. Shelke


HoD Principal
Department of Computer Science Engineering Guru Nanak Institute of Technology

GURU NANAK INSTITUTE OF TECHNOLOGY


NAAC ACCREDITED
Dahegaon, Kalmeshwar Road, Nagpur 441501
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Session 2021-22 (EVEN)

CERTIFICATE

This is to certify that Mahesh kurzekar, Hemant prasad, Pallavi


Nagrale, Lukesh Oghare, student of final year B.E. Computer Science
And Engineering has satisfactorily completed his project work on “Hotel
billing system” under my guidance and supervision in Computer Science
And Engineering, Guru Nanak Institute of Technology, Nagpur.
This is for partial fulfillment of the requirement for the award of
Graduation Degree of B.E. (Computer Science And Engineering) of
Rashtrasant Tukdoji Maharaj Nagpur University, Nagpur.
The Project work submitted above is a bonafide work of students
of Computer Science And Engineering Department GNIT during the
academic session of 2021-22.
This work in the same or in any other form is not submitted to any
other University for the award of any degree or diploma. I find this work
comprehensive, complete and fit for evaluation.

Place : Nagpur Miss.vaishnavi mam


Date : (Project Guide)
Department of Computer Science Engineering Guru Nanak Institute of Technology

DECLARATION

This thesis entitled with “Hotel billing system ” is our own work carried
out under the Supervision and guidance of Miss. Vaishnavi mam,
Assistant Professor, GNIT, Nagpur for the award of Bachelor of Degree
in Computer Science And Engineering Department. This work in the
same or in any other form is not submitted to any other University for the
award of any degree or diploma.

University
Roll No. Roll No. Student Name Sign

Mahesh kurzekar

Hemant Prasad

Pallavi Nagrale

Lukesh Oghare
Department of Computer Science Engineering Guru Nanak Institute of Technology

ACKNOWLEDGEMENT

We take this opportunity to express our deep sense of gratitude


towards Project Guide, Miss Vaishnavi mam, Assistant Professor,
Guru Nanak Institute of Technology, Nagpur.

We express our sincere thanks to Prof. Raut sir, Head,


Department of Computer Science And Engineering, GNIT., Nagpur who
contribute through their useful suggestion & courage us for doing work.

Our sincere thanks to Dr. Sudhir N. Shelke, Principal, GNIT, who


provide all the facilities to work and always motivate us.

We would like to acknowledge the academy & technical staff of


GNIT, Nagpur. We also thank the Department of Computer Science And
Engineering for their support & assistance since the starting of our
project work 2023-23
Department of Computer Science Engineering Guru Nanak Institute of Technology

INDEX

Sr. No. Title Page No.


Abstract I
List of Figure Ii
List of Table Iii
Abbreviation Iv
Symbols V

Chapter 1 INTRODUCTION 6-7


1.1 General Introduction 6
1.2 Objectives 7

Chapter 2 LITERATURE REVIEW 8-10

Chapter 3 METHODOLOGY 11-30


3.1 Types of Method

Chapter 4 RESULT & DISCUSSION 31-48


4.1

Chapter 5 CONCLUSION & FUTURE SCOPE 49-56

REFERENCES 57-57

PHOTOGRAPHS 58-58

CERTIFICATES 59-59
Department of Computer Science Engineering Guru Nanak Institute of Technology

ABSTRACT

The "Hotel and Restaurant Billing System" project is a soft-


ware application developed in the C programming language that aims to
streamline and automate the billing processes of a hotel and restaurant. This
project offers a user-friendly interface to manage customer orders, generate
bills, and maintain records of transactions within the establishment. The
primary objectives of the project include the system allows the staff to input
customer orders for food, beverages, and other services offered by the
restaurant. Once the order is placed, the system calculates the total cost
based on the selected items and their corresponding prices. It generates a de-
tailed bill for the customer, including the ordered items, quantities, prices,
and the total amount to be paid. The system offers an interactive and user-
friendly interface for both the staff and customers. The system incorporates
appropriate security measures to protect customer data, ensuring the confid-
entiality of payment information. The "Hotel and Restaurant Billing Sys-
tem" project is designed to enhance the customer experience by provid-
ing a seamless and accurate billing process. It caters to the needs of
both customers and staff, contributing to improved service quality and
operational efficiency within the hotel and restaurant industry. The pro-
ject covers almost all the fundamental aspects of C-programming language.
We will be utilising almost every concept and technique that we have ac-
quired knowledge about in the first semester classes and also introducing
some new concepts, assisted by the internet.

1
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

LIST OF FIGURES

Figure No. Title Page No.


1 Speed Analysis 1-2
2 Acceleration Analysis 3-4
3 Poles 4-4
4 5-5
5 6-7

2
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

LIST OF TABLES

Table No. Title Page No.


1 Speed Analysis 1-2
2 Acceleration Analysis 3-4
3 Poles 4-4
4 5-5
5 6-7

3
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

ABBREVATION

Keywords Title
IRC Indian Road Congress
CRRI Central Road Research Institute

4
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

SYMBOLS

Symbol Title
β Bita
α Alfa

5
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 1
INTRODUCTION

6
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 1
INTRODUCTION

1.1 General Introduction:


This is project named Hotel billing system.In today’s fast-paced world, efficient and accurate
billing systems are crucial for businesses to thrive. This is especially true in the hospitality
industry, where hotels and resorts cater to a diverse range of guests with varying needs. The
Hotel Billing System is a comprehensive software solution designed to streamline the billing
and invoicing process for hotels, ensuring seamless transactions and enhanced customer
satisfaction
The "Hotel and Restaurant Billing System" project presents a
comprehensive and efficient software solution tailored to meet the
billing and transaction management needs of the hospitality industry. This
project, developed using the C programming language, addresses this
critical aspect by providing a sophisticated system that streamlines order
placement, computes accurate bills, and maintains meticulous records of
transactions. This project is all about making life easier for hotels and
restaurants. By automating billing and focusing on accuracy and
speed, we're helping these businesses provide excellent service to their
customers. Billing is a financial accounting concept for business
organizations such as hotel industry to bill their customers for services
rendered and the billing report is utilized by management to know the
income generated. Hotel billing record system is used to capture the
bill record of customers to come up with a total amount to be paid by
the customer. The information is saved to a database to enable
management or users to retrieve saved billing records. The service
rendered by hotel industry are associated with charges. It is therefore
pertinent that accurate billing of the service rendered is properly
documented. The application of the computer system to aid business
transaction is very significant. This is because the computer system
provides features such as storage, computation, easy retrieval of
information etc. in addition; the computer system is very fast and accurate
as against manual systems of recording and retrieving information.
Virtually all organizations are now shifting from their manual systems
to computerized systems as a result of the benefits it presents.

1.2 Objectives:
1) It creates a tool that manages the handling of travel that includes passport,
license and crime using the unique identification associated with each individual.
2) It Integrates Citizen, Aadhaar Dept, Crime, Passport & RTA to address
travel issues and disputes.

7
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 2
LITERATURE REVIEW

8
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 2
LITERATURE REVIEW

A literature review for a hotel billing system project typically


involves examining
existing research, publications, and related work in the field of hotel
management
systems, billing systems, and technology integration in the
hospitality industry. Here's
an example of how you might structure your literature review for a
hotel billing system project.
Discuss common challenges faced by hotels in implementing billing
systems, such as compatibility issues, training staff, and data
security concerns.Analyze existing research
on the limitations of current billing technologies in
addressing the evolving needs of the industry.
Introduce the importance of efficient billing systems in the hotel
industry.
Discuss the significance of integrating technology for billing
processes.
JKState the purpose of the literature review: to explore existing
knowledge related to hotel billing systems and identify gaps for the
proposed project.
.

9
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

10
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 3
METHODOLOGY

11
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 3
METHODOLOGY
3.1Methodology: -

Algorithm:

Algorithm is a step-by-step procedure, which defines a set of


instructions to be executed in a certain order to get the desired
output. Algorithms are generally created independent of underlying
languages, i.e. an algorithm can be implemented in more than one
programming language. An algorithm should have the following
characteristics:  Unambiguous: Algorithms should be clear and
unambiguous. Each of its steps (or phases), and their inputs/outputs
should be clear and must lead to only one meaning.  Input: An
algorithm should have 0 or more well-defined inputs.  Output: An
algorithm should have 1 or more well-defined outputs, and should
match the desired output.  Finiteness: Algorithms must terminate
after a finite number of steps.  Feasibility: Should be feasible with
the available resources.  Independent: An algorithm should have
step-by-step directions, which should be independent of any
programming code.

DATA DICTIONARY

3.2 Analysis:

Existing system :
In the existing manual sustem a lot of time is spent in a communicating t the
information across different branches. There is aneed for integrated and outomated

12
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

system, which has some centralized control over the Entire process . Convetioal sys.
tem is make used of huge amount of paper For regarding transaction the existing
system is a manialy maintains system all the recorder have to be maintained
Advantage of Proposed System for the detail of each . Feeding detail
allocation attendance all these details of enter
And retrieve manually
Disavdvanages:
Time consuming
update process .
Inacrruracy of data.

proposed system
Proposed system is a computerized version of the existing system .
Provide easy and quick acces over the data. Keeping
Recorde of admition of resident propety
customer so that facility provide by hotels are fully utilize and offensive
and efficient manner. Keeping the record salary structure of the workers
of hotel by billing approche's.
Advantages :
Storing details record correctly.
Maintain acurracy.

3.3 Software Requirement:

Operating system :windows 10

Platform :python

Scripting. :vs code

web server :Aws

Front end :HTML and CSS

Backend : PYTHON flask

13
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

3.4. Hardware Requirement:


 Processor : dual core processor2.6.0Ghz
 Ram : 1gb
 Hard Disk : 160GB
 Compact disk :650MB
 keyboard :standard keyboard
 monitor :15 inch colour monitor

3.6 Advantages:
 The citizen does not have to approach agents for applications. Aadhaar
seva centers would facilitate the application processing. The citizen has
his application auto-filled when he visits the seva centers. No commis-
sion is involved.
 For transaction related to government departments the ID and pin num-
ber should be quoted.
 The UID doesn’t allow duplicate application for any type of card.
 The citizen can apply the next time only when he fails a verification or
test.
 Address changes easily updated.

Technology Trends

Back End (PYTHON)

INTRODUCTION:

Python is a high-level, interpreted, interactive and object-

oriented scripting language. Python is designed to be highly

14
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

readable. It uses English keywords frequently where as other

languages use punctuation, and it has fewer syntactical

constructions than other languages.

OVERVIEW OF PYTHON:

 Python is Interpreted − Python is processed at runtime by

the interpreter. You do not need to compile your program before

executing it. This is similar to PERL and PHP.

 Python is Interactive − You can actually sit at a Python

prompt and interact with the interpreter directly to write your

programs.

 Python is Object-Oriented − Python supports Object-

Oriented style or technique of programming that encapsulates

code within objects.

15
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

 Python is a Beginner's Language − Python is a great

language for the beginner-level programmers and supports the

development of a wide range of applications from simple text

processing to WWW browsers to games.

History of Python :

Python was developed by Guido van Rossum in the late eighties

and early nineties at the National Research Institute for

Mathematics and Computer Science in the Netherlands.

Python is derived from many other languages, including ABC,

Modula-3, C, C++, Algol-68, SmallTalk, and Unix shell and

other scripting languages.

Python is copyrighted. Like Perl, Python source code is now

available under the GNU General Public License (GPL).

Python is now maintained by a core development team at the

institute, although Guido van Rossum still holds a vital role in


16
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

directing its progress

FEATURES OF PYTHON:

Python provides many useful features which make it popular

and valuable from the other programming languages. It supports

object-oriented programming, procedural programming

approaches and provides dynamic memory allocation. We have

listed below a few essential features.

1) Easy to Learn and Use :

Python is easy to learn as compared to other programming

languages. Its syntax is straightforward and much the same as

the English language. There is no use of the semicolon or curly-

bracket, the indentation defines the code block. It is the

recommended programming language for beginners.

17
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

2) Expressive Language :

Python can perform complex tasks using a few lines of code. A

simple example, the hello world program you simply

type print("Hello World"). It will take only one line to execute,

while Java or C takes multiple lines.

3) Interpreted Language :

Python is an interpreted language; it means the Python program

is executed one line at a time. The advantage of being

interpreted language, it makes debugging easy and portable.

4) Cross-platform Language :

Python can run equally on different platforms such as Windows,

Linux, UNIX, and Macintosh, etc. So, we can say that Python is

a portable language. It enables programmers to develop the

software for several competing platforms by writing a program

18
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

only once.

5) Free and Open Source :

Python is freely available for everyone. It is freely available on

its official website www.python.org

. It has a large community across the world that is dedicatedly

working towards make new python modules and functions.

Anyone can contribute to the Python community. The open-

source means, "Anyone can download its source code without

paying any penny."

6) Object-Oriented Language :

Python supports object-oriented language and concepts of

classes and objects come into existence. It supports inheritance,

polymorphism, and encapsulation, etc. The object-oriented

procedure helps to programmer to write reusable code and

19
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

develop applications in less code.

7) Extensible :

It implies that other languages such as C/C++ can be used to

compile the code and thus it can be used further in our Python

code. It converts the program into byte code, and any platform

can use that byte code.

8) Large Standard Library :

It provides a vast range of libraries for the various fields such as

machine learning, web developer, and also for the scripting.

There are various machine learning libraries, such as Tensor

flow, Pandas, Numpy, Keras, and Pytorch, etc. Django, flask,

pyramids are the popular framework for Python web

development.

9) GUI Programming Support :

20
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

Graphical User Interface is used for the developing Desktop

application. PyQT5, Tkinter, Kivy are the libraries which are

used for developing the web application.

10) Integrated :

It can be easily integrated with languages like C, C++, and

JAVA, etc. Python runs code line by line like C,C++ Java. It

makes easy to debug the code.

11) Embeddable :

The code of the other programming language can use in the

Python source code. We can use Python source code in another

programming language as well. It can embed other language

into our code.

12) Dynamic Memory Allocation :

21
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

In Python, we don't need to specify the data-type of the variable.

When we assign some value to the variable, it automatically

allocates the memory to the variable at run time. Suppose we are

assigned integer value 15 to x, then we don't need to write int x

= 15. Just write x = 15.

PYTHON DATA BASE CONNECTIVITY:

22
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

INTRODUCTION:

The database is a well-organized collection of structured

information or data stored in a computer system. In database, the

data is arranged in the tabular form, and we can access that

information or data by querying.

Python can be used to connect the Database. MySQL

is one of the most popular Databases. In this tutorial, we will

learn to establish a connection to MySQL via Python

. Let's understand the following steps to work with the MySQL

using Python.

1. Install MySQL Driver

2. Create a connection Object

23
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

3. Create a cursor Object

4. Execute the Query

1. Install MySQL Driver :

First, we need a MySQL driver in our system. Install the

MySQL

software and configure the settings. We will use the MySQL

connector driver, which is installed using the pip command.

Open a command prompt and type the following command.

python -m pip install mysql-connector-python

Press the enter button. It will download the MySQL driver.

python -m pip install mysql-connector-python

24
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

o Verify the Driver

Let's check whether we have installed it properly or not. It can

be done by importing the mysql.connector.

import mysql.connector

If this line is executed without error, it means MySQL connector

has installed properly. We are ready to use it.

2.Create a Connection Object :

The mysql.connector provides the connect() method used to

create a connection between the MySQL database and the

Python application. The syntax is given below.

Syntax:

25
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

Conn_obj= mysql.connector.connect(host = <hostname>, user =

<username>, passwd = <password>)

The connect() function accepts the following arguments.

o Hostname - It represents the server name or IP address on

which MySQL is running.

o Username - It represents the name of the user that we use

to work with the MySQL server. By default, the username for

the MySQL database is root.

o Password - The password is provided at the time of

installing the MySQL database. We don't need to pass a

password if we are using the root.

o Database - It specifies the database name which we want

to connect. This argument is used when we have multiple

databases.

26
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

Consider the following example.

Example -Example -

import mysql.connector

# Creating a the connection object


conn_obj = mysql.connector.connect(host="localhost", user="root", passwd="
admin123")

# printing the connection object


print(conn_obj

3. Create a Cursor Object :


The connection object is necessary to create because it provides the multiple working
environments the same connection to the database. The cursor() function is used to
create the cursor object. It is import for executing the SQL queries. The syntax is
given below.
Syntax:

Con_obj = conn.cursor()
Let's understand the following example.
Example -

import mysql.connector

# Creating the connection object


conn_obj = mysql.connector.connect(host="localhost", user="root", passwd="
admin123", database="mydatabase")

# printing the connection object


print(conn_obj)

# creating the cursor object


cur_obj = conn_obj.cursor()

27
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

print(cur_obj)

4. Executes the Query:


In the following example, we will create a database by executing the query. Let's un-
derstand the following example.
Example -

import mysql.connector

# Creating the connection object


conn_obj = mysql.connector.connect(host="localhost", user="root", passwd="adm
in123")

# creating the cursor object


cur_obj = conn_obj.cursor()

try:
# creating a new database using query
cur_obj.execute("create database New_PythonDB")

# getting the list of all the databases which will now include the new data-
base New_PythonDB
dbms = cur_obj.execute("show databases")

except:
conn_obj.rollback() # it is used if the operation is failed then it will not re-
flect in your database

for x in cur_obj:
print(x)

conn_obj.close()
Output:
'information_schema',)
('javatpoint',)
('javatpoint1',)
(New_Pythondb)
('mydb',)
('mydb1',)

28
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

('mysql',)
('performance_schema',)
('testDB',)

Java Try Catch

PHP

INTRODUCTION:
The Hyper Text Markup Language (HTML) is a simple markup language used to
create hypertext documents that are portable from one platform to another. HTML
documents are SGML documents with generic semantic that are appropriate for
representing information from a wide range of applications. This specification defines
HTML version 3.2. HTML 3.2 aims to capture recommended practice as of early ‘96
and as such to be used as a replacement for HTML 2.0(RF1866).
A set of instructions embedded in a document is called Markup Language.
These instructions describe what the document text means and how it should look like
in a display. Hyper Text Markup Language (HTML) is the language used to encode
World Wide Web documents. It is a document layout and hyperlink specification
language that defines the syntax and placement of special embedded directions that
are not displayed by a web browser, but tells it how to display the contents of the
documents including text, images and other supported media.

USE OF HTML:

Web site is a collection of pages, publications, and documents that reside on web
sever. While these page publications, and a document as a formatted in any single
format. You should use HTML for home page and all primary pages and the site. This
will enable the millions of web users it easily access and to take advantage of your
website. HTML is considered first for formatting any new material you plan to
publish on the web. HTML documents are platform independent, meaning that they
don’t confirm to any standard. If they are created properly you can move home to any
server platform or you can access them with any complaint www browser.

BLOCK OF HTML:

HTML elements perform a defined task. HTML uses two types of elements
 Empty tags(open tags)

29
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

 Container tags

These tags differ because of what they represent. Empty tags represent formatting
constructs such as line breaks and Horizontal rules. Container tags define a section of
text and specify the formatting the container dot all of the selected text. A container
tag has both a beginning and an ending.
HTML LAYOUT:
An HTML document consists of text, which comprises the content of the document
and tags which, defines the structure and appearance of the document. The structure
of an HTML document is simple.
<HTML>

<HEAD>

<TITLE> the title of the HTML document </TITLE>

</HEAD>

<BODY>

This is where the actual HTML documents

Text lies which is displayed in the browser

</BODY>

</HTML>

5.3.4.1 PROGRAM DESCRIPTION:


The first line i.e., <HTML> tag, HTML tag is beginning tag and second line is

starting tag for head section is <HEAD> The third line i.e., <TITLE> form example

program </TITLE> is the title of the program. It defines a text string that is

interpreted as the HTML title of the document. The tag </HEAD> will end the HEAD

section of the program. Next tag is <BODY> the beginning of the body section where

30
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

HTML document text lies, which is displayed in the browser. Next tags </BODY>

</HTML> are the ending tags for the body section and html program respectively.

Each document has a head and body delimited by the <HEAD> and <BODY> tag.

The head is where you give your HTML document a title and where you indicate

other parameters the browser may use when displaying the document. The body is

where you put the actual contents of the HTML documents. This includes the text

for displaying the text. Tag also references special and hot spots that link your

document to other documents.

BACK END

MYSQL

INTRODUCTION:

MySQL is a world most used open source relational database management system as

of 2008 run as a server providing multi-year access to a number the database

the mysql development project has made is source code available under the term of

gnu general public license as well as under the property of verity property agreement

of mysql was owned or sponsored by single for profit for the Swedish company

Mysql ab owned by oracle corporation .

MySQL is popular choice of database for use in a web application, and is a central

component of the widely used lamp open source web application software stack lamp

use is an acronym for Linux appech,mysql,php/python/perl free software open source

project that required full featured database management often use MySQL.

31
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

For commercial used, several paid edition or available and offer function additionally

applications which use MySQL database include TYPO3, hoopla, word press, phBB,

MYBB, Frugal and other software build on the LAMP software stack . Mysql is also

used in an high profile ,large scale, world wide web products including

Wikipedia ,google(though not for searches)Imagbook twitter flicker ,Nokia. Com and

YouTube.

Database Description

Objects

Table The primary units of a database that stores field names, field

description, field controls and field data. Tables display multiple

records in a row/column format similar to a spreadsheet layout.

Query A structured guideline used to search database tables and retrieve

records that meet specific conditions.

Form An aesthetically pleasing layout of table data designed to display

one record on-screen at a time.

Report An organized format of database data designed to generate

printouts that provide meaningful information.

Pages A data access page is a special type of Web page designed for

viewing and working with data from an Internet or Intranet data

that is stored in a Microsoft Access database or a Microsoft SQL

Server database. The data access page may also include data from

32
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

other sources, such as Microsoft Excel.

Macros A mini program that stores a set of instructions designed to

perform a particular task.

Module A collection of Visual Basic programming procedures stored

together to customize the Access environment.

DESIGNING A DATABASE:

Good design is a key factor of successful database building. A well designed

database can lead to more efficient use of queries, forms, and reports, and can

increase the reliability of the extracted information. In addition, an effectively

designed database will be easier to expand as you organization’s information

requirements grow and change.Although there are guidelines to assist you in

designing your database, there is no such thing as a perfect database design.

Designing information systems always involves a degree of compromise. The purpose

of this appendix is to provide a general overview of good database design principles.

These guidelines should not be viewed as hard and fast rules, but rather suggestions

for making your database design decision.

DATABASE DESIGN PROCESS:

Although there is no one correct way to create a database, there are some general

steps that some professional systems developers follow. These steps generally reflect

what is known as the Systems Development Life Cycle (SDLC). The SDLC breaks

the task of creating a system into stages.

33
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

A variety of techniques can be employed to answer these questions. One of the best

ways is to involve the future end-users of the database. A database, however, may

have hundreds or even thousands of users. However, if the database is very large, you

might have to consult representatives of various user groups, such as a database

design committee.

WORKING WITH TABLES IN DATASHEET VIEW:

Tables are used to store data in a database. Tables can be created in two views, Table

Design view or Datasheet view. In addition, you can use the Table Wizard or import a

table from an external file. Records are automatically saved as you move from record

to record but changes to the layout of a table (or a form) must be saved.

TABLE DESIGN VIEW:

In table design View, you must specify the fields, specify the data type for each field,

assign the size for text and number fields, assign the primary key (see glossary for

definition) and save the table yourself.

DATASHEET VIEW:

In data sheet view data types are very important to creating a database. There are 10

different types to choose from. The data type determines what kind of information

may be entered in a field. You can always change the data type of a field after you

have entered data into it. However, it may be a difficult process if the data field

conflicts with the current data type (for example, changing a text field to a number

field). The table below shows the specifics on each data type.

34
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

Setting Type of Data

Text(default Text or combination of text and numbers, as well as numbers

setting for all that don’t require calculations, such as phone numbers. Up to

field) 255 characters or the length set by the FieldSize property,

whichever is less.

Memo Lengthy text or combinations of text and numbers. Up to

65,536 characters.

Number Numeric data used in mathematical calculations.

Date / Time Date and time values for years 100 through 9999.

Currency Currency values and numeric data used in mathematical

calculations involving data with one to four decimal places.

Accurate to 15 digits on the left side of the decimal separator

and to 4 digits on the right side.

AutoNumber A unique sequential (incremented by 1) number or random

number assigned by Microsoft Access whenever a new record

is added to a table. AutoNumber fields cannot be updated.

Yes / No Yes and No values and fields that contain only one of two

values (Yes/No, True/False, or On/Off).

OLE Object An object (such as a Microsoft Excel spreadsheet, a Microsoft

Word document, graphics, sound, or other binary data) linked

35
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

to or embedded in a Microsoft Access table.

Hyperlink Text or combination of text and numbers stored as text and

used as hyperlink address.

5.4.3 WIZARDS:

Access provides several wizards that you can use to create databases for business or

personal use. This is a wonderful time saver. There are 25 sample tables for business

and personal use. Once you select a template, you can modify the fields to better suit

your needs. In addition, you can rename fields to more accurately define them. Access

can also provide samples in the database. Samples may help you learn to use the

database faster.

36
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 4
RESULT & DISCUSSION

37
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 4
RESULT & DISCUSSION

4.1 Snapshots:

38
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

39
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

40
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

Code:

Coding Standards:
1. Introduction
2. Synchronization
3. Comments
4. Transactions
6. DB Connection Pooling
1. Introduction
This document describes a set of standards for developing programs based
on J2EE architecture It is meant to be used not only by programmers specifically
writing Java code, but also by programmers creating programs which
automatically generate Java code.
2. Synchronization
 Use the code or method synchronized whenever sees the method/code cannot
be used asynchronously, when a particular value computed in a method/codes
input to the next object call
 Usage of synchronous will affect the performance at the same time we must
use in certain cases otherwise system will malfunction. Choose carefully and
do not miss to use the synchronous key word wherever required.
 You can find the need (If you missed in design) if application is giving wrong
output under load

41
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

 This happens because unsynchronized changes to shared data


 Use synchronize access to shared data
 But first try to avoid use of access to shared data if not possible then use syn-
chronous keyword for synchronization.

3. Comments
 Must use comments in the class, make sure you have used right com-
ments, comments should not be confusing, must explain the under-
neath code implementation; please refer to i2labs Coding standards.

4. Transactions
Use Container Managed Transactions

 Associate each method with a single transaction
 Avoid Nested and Multiple Transactions
 In descriptor specify the methods associated with transactions
 Divide the transactions exception into Application level and System Level ex-
ceptions
 Catch Application-level exceptions from the business logic.
 System-level exceptions, such as runtime errors by exception handler/bean
container. (Need to come with an approach) Usually role back
 Need to identify the methods which are marked for roll back in container, and
Roll back the transaction for checked exec
 Once exception is thrown make the decision about continuing the transaction
or not.
 Retry and continue the transaction. This might entail retrying portions of the
transaction.
5. DB Connection Pooling
 Use Application server connection pooling
 In case you are using your own connection pool, configure it to XA
 Explicit commit should not be used.
 Must to close every connection borrowed, use finally block at the end of try/
catch block and close the connection

Source Code :

from tkinter import *

from tkinter import ttk

import tkinter.messagebox as tmsg

import os

42
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

import time

menu_category = ["Tea & Coffee","Beverages","Fast Food","Starters","Main


Course","Dessert"]

menu_category_dict = {"Tea & Coffee":"1 Tea & Coffee.txt","Beverages":"2


Beverages.txt",

"Fast Food":"3 Fast Food.txt",

"Starters":"4 Starters.txt","Main Course":"5 Main Course.txt",

"Dessert":"6 Dessert.txt"}

order_dict = {}

for i in menu_category:

order_dict[i] = {}

os.chdir(os.path.dirname(os.path.abspath(__file__)))

def load_menu():

menuCategory.set("")

menu_tabel.delete(*menu_tabel.get_children())

menu_file_list = os.listdir("Menu")

for file in menu_file_list:

f = open("Menu\\" + file , "r")

category=""

while True:

line = f.readline()

if(line==""):

43
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

menu_tabel.insert('',END,values=["","",""])

break

elif (line=="\n"):

continue

elif(line[0]=='#'):

category = line[1:-1]

name = "\t\t"+line[:-1]

price = ""

elif(line[0]=='*'):

name = line[:-1]

price = ""

else:

name = line[:line.rfind(" ")]

price = line[line.rfind(" ")+1:-3]

menu_tabel.insert('',END,values=[name,price,category])

def load_order():

order_tabel.delete(*order_tabel.get_children())

for category in order_dict.keys():

if order_dict[category]:

for lis in order_dict[category].values():

order_tabel.insert('',END,values=lis)

update_total_price()

def add_button_operation():

44
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

name = itemName.get()

rate = itemRate.get()

category = itemCategory.get()

quantity = itemQuantity.get()

if name in order_dict[category].keys():

tmsg.showinfo("Error", "Item already exist in your order")

return

if not quantity.isdigit():

tmsg.showinfo("Error", "Please Enter Valid Quantity")

return

lis = [name,rate,quantity,str(int(rate)*int(quantity)),category]

order_dict[category][name] = lis

load_order()

def load_item_from_menu(event):

cursor_row = menu_tabel.focus()

contents = menu_tabel.item(cursor_row)

row = contents["values"]

itemName.set(row[0])

itemRate.set(row[1])

itemCategory.set(row[2])

itemQuantity.set("1")

def load_item_from_order(event):

cursor_row = order_tabel.focus()

45
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

contents = order_tabel.item(cursor_row)

row = contents["values"]

itemName.set(row[0])

itemRate.set(row[1])

itemQuantity.set(row[2])

itemCategory.set(row[4])

def show_button_operation():

category = menuCategory.get()

if category not in menu_category:

tmsg.showinfo("Error", "Please select valid Choice")

else:

menu_tabel.delete(*menu_tabel.get_children())

f = open("Menu\\" + menu_category_dict[category] , "r")

while True:

line = f.readline()

if(line==""):

break

if (line[0]=='#' or line=="\n"):

continue

if(line[0]=='*'):

name = "\t"+line[:-1]

menu_tabel.insert('',END,values=[name,"",""])

else:

name = line[:line.rfind(" ")]

price = line[line.rfind(" ")+1:-3]

46
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

menu_tabel.insert('',END,values=[name,price,category])

def clear_button_operation():

itemName.set("")

itemRate.set("")

itemQuantity.set("")

itemCategory.set("")

def cancel_button_operation():

names = []

for i in menu_category:

names.extend(list(order_dict[i].keys()))

if len(names)==0:

tmsg.showinfo("Error", "Your order list is Empty")

return

ans = tmsg.askquestion("Cancel Order", "Are You Sure to Cancel Order?")

if ans=="no":

return

order_tabel.delete(*order_tabel.get_children())

for i in menu_category:

order_dict[i] = {}

clear_button_operation()

update_total_price()

def update_button_operation():

name = itemName.get()

rate = itemRate.get()

47
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

category = itemCategory.get()

quantity = itemQuantity.get()

if category=="":

return

if name not in order_dict[category].keys():

tmsg.showinfo("Error", "Item is not in your order list")

return

if order_dict[category][name][2]==quantity:

tmsg.showinfo("Error", "No changes in Quantity")

return

order_dict[category][name][2] = quantity

order_dict[category][name][3] = str(int(rate)*int(quantity))

load_order()

def remove_button_operation():

name = itemName.get()

category = itemCategory.get()

if category=="":

return

if name not in order_dict[category].keys():

tmsg.showinfo("Error", "Item is not in your order list")

return

del order_dict[category][name]

load_order()

48
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

def update_total_price():

price = 0

for i in menu_category:

for j in order_dict[i].keys():

price += int(order_dict[i][j][3])

if price == 0:

totalPrice.set("")

else:

totalPrice.set("RS "+str(price)+" /-")

def bill_button_operation():

customer_name = customerName.get()

customer_contact = customerContact.get()

names = []

for i in menu_category:

names.extend(list(order_dict[i].keys()))

if len(names)==0:

tmsg.showinfo("Error", "Your order list is Empty")

return

if customer_name=="" or customer_contact=="":

tmsg.showinfo("Error", "Customer Details Required")

return

if not customerContact.get().isdigit():

tmsg.showinfo("Error", "Invalid Customer Contact")

return

ans = tmsg.askquestion("Generate Bill", "Are You Sure to Generate Bill?")

ans = "yes"

49
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

if ans=="yes":

bill = Toplevel()

bill.title("Bill")

bill.geometry("670x500+300+100")

bill_text_area = Text(bill, font=("arial", 12))

st = "\t\t\t\tHotel Billing System\n\t\t\tDLQ1231\n"

st += "\t\t\tCODE.NO:- 34BASFF3315HTAAA\n"

st += "-"*61 + "BILL" + "-"*61 + "\nDate:- "

t = time.localtime(time.time())

week_day_dict =
{0:"Monday",1:"Tuesday",2:"Wednesday",3:"Thursday",4:"Friday",5:"Saturday",

6:"Sunday"}

st += f"{t.tm_mday} / {t.tm_mon} / {t.tm_year}


({week_day_dict[t.tm_wday]})"

st += " "*10 + f"\t\t\t\t\t\tTime:- {t.tm_hour} : {t.tm_min} : {t.tm_sec}"

st += f"\nCustomer Name:- {customer_name}\nCustomer Contact:-


{customer_contact}\n"

st += "-"*130 + "\n" + " "*4 + "DESCRIPTION\t\t\t\t\tRATE\tQUANTITY\t\


tAMOUNT\n"

st += "-"*130 + "\n"

for i in menu_category:

for j in order_dict[i].keys():

lis = order_dict[i][j]

50
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

name = lis[0]

rate = lis[1]

quantity = lis[2]

price = lis[3]

st += name + "\t\t\t\t\t" + rate + "\t " + quantity + "\t\t " + price + "\n\n"

st += "-"*130

st += f"\n\t\t\tTotal price : {totalPrice.get()}\n"

st += "-"*130

bill_text_area.insert(1.0, st)

folder = f"{t.tm_mday},{t.tm_mon},{t.tm_year}"

if not os.path.exists(f"Bills\\{folder}"):

os.makedirs(f"Bills\\{folder}")

file = open(f"Bill\\{folder}\\{customer_name+customer_contact}.txt", "w")

file.write(st)

file.close()

order_tabel.delete(*order_tabel.get_children())

for i in menu_category:

order_dict[i] = {}

clear_button_operation()

51
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

update_total_price()

customerName.set("")

customerContact.set("")

bill_text_area.pack(expand=True, fill=BOTH)

bill.focus_set()

bill.protocol("WM_DELETE_WINDOW", close_window)

def close_window():

tmsg.showinfo("Thanks", "Thanks for using our service")

root.destroy()

root = Tk()

w, h = root.winfo_screenwidth(), root.winfo_screenheight()

root.geometry("%dx%d+0+0" % (w, h))

root.title("Hotel Billing System")

style_button = ttk.Style()

style_button.configure("TButton",font = ("arial",10,"bold"),

background="lightgreen")

title_frame = Frame(root, bd=8, bg="blue", relief=GROOVE)

title_frame.pack(side=TOP, fill="x")

title_label = Label(title_frame, text="Hotel & Cafe Billing System",

font=("times new roman", 20, "bold"),bg = "blue", fg="white", pady=5)

52
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

title_label.pack()

customer_frame = LabelFrame(root,text="Customer Details",font=("times new


roman", 15, "bold"),

bd=8, bg="green", relief=GROOVE)

customer_frame.pack(side=TOP, fill="x")

customer_name_label = Label(customer_frame, text="Name",

font=("arial", 15, "bold"),bg = "green", fg="white")

customer_name_label.grid(row = 0, column = 0)

customerName = StringVar()

customerName.set("")

customer_name_entry = Entry(customer_frame,width=20,font="arial 15",bd=5,

textvariable=customerName)

customer_name_entry.grid(row = 0, column=1,padx=50)

customer_contact_label = Label(customer_frame, text="Contact",

font=("arial", 15, "bold"),bg = "green", fg="white")

customer_contact_label.grid(row = 0, column = 2)

customerContact = StringVar()

customerContact.set("")

customer_contact_entry = Entry(customer_frame,width=20,font="arial 15",bd=5,

textvariable=customerContact)

customer_contact_entry.grid(row = 0, column=3,padx=50)

53
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

menu_frame = Frame(root,bd=8, bg="green", relief=GROOVE)

menu_frame.place(x=0,y=125,height=585,width=680)

menu_label = Label(menu_frame, text="Menu",

font=("times new roman", 20, "bold"),bg = "green", fg="White", pady=0)

menu_label.pack(side=TOP,fill="x")

menu_category_frame = Frame(menu_frame,bg="green",pady=10)

menu_category_frame.pack(fill="x")

combo_lable = Label(menu_category_frame,text="Select Type",

font=("arial", 12, "bold"),bg = "green", fg="white")

combo_lable.grid(row=0,column=0,padx=10)

menuCategory = StringVar()

combo_menu = ttk.Combobox(menu_category_frame,values=menu_category,

textvariable=menuCategory)

combo_menu.grid(row=0,column=1,padx=30)

show_button = ttk.Button(menu_category_frame, text="Show",width=10,

command=show_button_operation)

show_button.grid(row=0,column=2,padx=60)

show_all_button = ttk.Button(menu_category_frame, text="Show All",

width=10,command=load_menu)

54
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

show_all_button.grid(row=0,column=3)

############################# Menu Tabel


##########################################

menu_tabel_frame = Frame(menu_frame)

menu_tabel_frame.pack(fill=BOTH,expand=1)

scrollbar_menu_x = Scrollbar(menu_tabel_frame,orient=HORIZONTAL)

scrollbar_menu_y = Scrollbar(menu_tabel_frame,orient=VERTICAL)

style = ttk.Style()

style.configure("Treeview.Heading",font=("arial",13, "bold"))

style.configure("Treeview",font=("arial",12),rowheight=25)

menu_tabel = ttk.Treeview(menu_tabel_frame,style = "Treeview",

columns
=("name","price","category"),xscrollcommand=scrollbar_menu_x.set,

yscrollcommand=scrollbar_menu_y.set)

menu_tabel.heading("name",text="Name")

menu_tabel.heading("price",text="Price")

menu_tabel["displaycolumns"]=("name", "price")

menu_tabel["show"] = "headings"

menu_tabel.column("price",width=50,anchor='center')

scrollbar_menu_x.pack(side=BOTTOM,fill=X)

scrollbar_menu_y.pack(side=RIGHT,fill=Y)

55
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

scrollbar_menu_x.configure(command=menu_tabel.xview)

scrollbar_menu_y.configure(command=menu_tabel.yview)

menu_tabel.pack(fill=BOTH,expand=1)

load_menu()

menu_tabel.bind("<ButtonRelease-1>",load_item_from_menu)

item_frame = Frame(root,bd=8, bg="green", relief=GROOVE)

item_frame.place(x=680,y=125,height=230,width=680)

item_title_label = Label(item_frame, text="Item",

font=("times new roman", 20, "bold"),bg = "green", fg="white")

item_title_label.pack(side=TOP,fill="x")

item_frame2 = Frame(item_frame, bg="green")

item_frame2.pack(fill=X)

item_name_label = Label(item_frame2, text="Name",

font=("arial", 12, "bold"),bg = "green", fg="white")

item_name_label.grid(row=0,column=0)

itemCategory = StringVar()

itemCategory.set("")

56
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

itemName = StringVar()

itemName.set("")

item_name = Entry(item_frame2, font="arial


12",textvariable=itemName,state=DISABLED, width=25)

item_name.grid(row=0,column=1,padx=10)

item_rate_label = Label(item_frame2, text="Price",

font=("arial", 12, "bold"),bg = "green", fg="white")

item_rate_label.grid(row=0,column=2,padx=40)

itemRate = StringVar()

itemRate.set("")

item_rate = Entry(item_frame2, font="arial


12",textvariable=itemRate,state=DISABLED, width=10)

item_rate.grid(row=0,column=3,padx=10)

item_quantity_label = Label(item_frame2, text="Quantity",

font=("arial", 12, "bold"),bg = "green", fg="white")

item_quantity_label.grid(row=1,column=0,padx=30,pady=15)

itemQuantity = StringVar()

itemQuantity.set("")

item_quantity = Entry(item_frame2, font="arial 12",textvariable=itemQuantity,


width=10)

item_quantity.grid(row=1,column=1)

item_frame3 = Frame(item_frame, bg="green")

57
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

item_frame3.pack(fill=X)

add_button = ttk.Button(item_frame3, text="Add Item"

,command=add_button_operation)

add_button.grid(row=0,column=0,padx=40,pady=30)

remove_button = ttk.Button(item_frame3, text="Remove Item"

,command=remove_button_operation)

remove_button.grid(row=0,column=1,padx=40,pady=30)

update_button = ttk.Button(item_frame3, text="Update Quantity"

,command=update_button_operation)

update_button.grid(row=0,column=2,padx=40,pady=30)

clear_button = ttk.Button(item_frame3, text="Clear",

width=8,command=clear_button_operation)

clear_button.grid(row=0,column=3,padx=40,pady=30)

order_frame = Frame(root,bd=8, bg="green", relief=GROOVE)

order_frame.place(x=680,y=335,height=370,width=680)

order_title_label = Label(order_frame, text="Your Order",

font=("times new roman", 20, "bold"),bg = "green", fg="white")

order_title_label.pack(side=TOP,fill="x")

order_tabel_frame = Frame(order_frame)

58
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

order_tabel_frame.place(x=0,y=40,height=260,width=680)

scrollbar_order_x = Scrollbar(order_tabel_frame,orient=HORIZONTAL)

scrollbar_order_y = Scrollbar(order_tabel_frame,orient=VERTICAL)

order_tabel = ttk.Treeview(order_tabel_frame,

columns
=("name","rate","quantity","price","category"),xscrollcommand=scrollbar_order_x.se
t,

yscrollcommand=scrollbar_order_y.set)

order_tabel.heading("name",text="Name")

order_tabel.heading("rate",text="Rate")

order_tabel.heading("quantity",text="Quantity")

order_tabel.heading("price",text="Price")

order_tabel["displaycolumns"]=("name", "rate","quantity","price")

order_tabel["show"] = "headings"

order_tabel.column("rate",width=100,anchor='center', stretch=NO)

order_tabel.column("quantity",width=100,anchor='center', stretch=NO)

order_tabel.column("price",width=100,anchor='center', stretch=NO)

order_tabel.bind("<ButtonRelease-1>",load_item_from_order)

scrollbar_order_x.pack(side=BOTTOM,fill=X)

scrollbar_order_y.pack(side=RIGHT,fill=Y)

scrollbar_order_x.configure(command=order_tabel.xview)

scrollbar_order_y.configure(command=order_tabel.yview)

59
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

order_tabel.pack(fill=BOTH,expand=1)

total_price_label = Label(order_frame, text="Total Price",

font=("arial", 12, "bold"),bg = "green", fg="blue")

total_price_label.pack(side=LEFT,anchor=SW,padx=20,pady=10)

totalPrice = StringVar()

totalPrice.set("")

total_price_entry = Entry(order_frame, font="arial


12",textvariable=totalPrice,state=DISABLED,

width=10)

total_price_entry.pack(side=LEFT,anchor=SW,padx=0,pady=10)

bill_button = ttk.Button(order_frame, text="Bill",width=8,

command=bill_button_operation)

bill_button.pack(side=LEFT,anchor=SW,padx=80,pady=10)

cancel_button = ttk.Button(order_frame, text="Cancel


Order",command=cancel_button_operation)

cancel_button.pack(side=LEFT,anchor=SW,padx=20,pady=10)

root.mainloop()

60
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 5
CONCLUSION

61
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

CHAPTER 5
5.1 Feature:
1. Login & Security

The module allows only authorized users to use the application. The

application comes with a default administrator account. This account has a user id

“Admin” and password “Admin” by default. This user can change his password as

and when necessary. The administrator maintains Aadhaar seva staffs that are

authorized to handle the application and process transactions for the citizen.

2. Citizen Registration

The module allows the citizen to register for unique identity. The citizen

provides his personal information, photo to the registration module. The module

acknowledges by providing an application number. The citizen uses the

application number to then check the status of the unique identity. The

administrator is responsible to set the allocation status.

3. Process & Issue Unique Identity

The applications registered by the citizens are viewed by the

administrator. When the administrator gets the physical verification report only

then he confirms the issue of the unique identity. The module generates unique

identification number for each application (citizen). The uid is also associated

with a passpord which can be changed by the citizen.

4. Apply Passport
The module allows the citizen to register application for passport. The
module auto fills the application with the information already available in the uid
regn database. Only when there is a change of information the citizen should
update the uid regn database and then apply for passport. For citizens already

62
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

having passport and wanted change of information updating the uid regn database
automatically updates the passport database.

5. Passport Processing
The module allows the administrator to verify the details of the application,
set the status of the passport. If the application is accepted then the administrator
provides the passport number and the system automatically updates the date of
issue and expiry. This information is now available to the citizen as well as to the
airport authority. The passport is a digital passport. The verification of the citizen
is done by the crime/police dept.

6. Crime Control
The module allows the crime department to view citizen information
either using the uid or the passport number. They can also provide the name of a
person and have photos viewed for the citizens having identical names, highly
useful when only the name of the person is known. The crime user can also set the
status for a passport such as fly or no fly there by intimating the airport authority
of flying restrictions for a citizen.

7. License Monitor

The module allows the citizen to apply for passport and have the details and

the status of the test. The citizen will not have to submit any physical form nor have

agents in between. The aadhaar scheme provides digital form and takes up citizen

information from the registration database and dynamically fills the form. The test

centers, their location are picked up based upon the pin code the citizen resides at.

The RTA provides inputs on test schedules and test results to Aadhaar.

8. Reports

 Passport & License Applications

 Application & Processing Status

 Fly & No Fly List.

AMAZON WEB SERVER(AWS)

63
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

INTRODUCTION:

Python Server Pages (JSP's) permit server side Python logic to reside

within the requested document. Upon request of a AWS document the server activates

the specified AWS. The AWS then becomes responsible for providing an HTML

response.

The server-side logic within a JSP is written in Java. The Java code

segments, referred to as script lets, are generally responsible for providing dynamic

HTML content to the JSP's response HTML. The JSP itself is compiled by the server,

and is executed as an object that extends the Java Servlets API. As such, the HTTP

Servlet request and response objects are available by the script lets defined within the

JSP.

This document reviews client-server design considerations in respect to

the use of JSP’s. Implementation options, particularly the use of JSP language

extensions and use of Enterprise Java Beans (EJB's) will also be discussed. Focus will

be placed on the presentation layer and how the JSP is used to provide a user interface

and communicate business logic requests to the supporting system.

If we consider a 3-tier architectural WEB application, the browser

becomes the client side application. The user communicates requests to the WEB/app

server via the browser. The presentation layer receives the client requests and

prepares the response and server side business functionality is executed. In the context

of this example, the JSP engine represents the presentation layer. It is responsible for

processing requests and responses. Additional messages may be passed between this

layer and that which handles business processes represented below as EJB’s.

64
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

FIGURE1

THE TECHNOLOGY:

JSP technology uses XML - like tags and scriptlets. They are used to encapsulate

presentation logic within the JSP. They can also initiate messages to distributed or

server-side applications. The logical separation of presentation and business logic lies

in the implementation of the JSP.

Enterprise Java Beans provide a distinct relationship between the implementation of

business logic and the remote interfaces provided to the EJB client. The use of an EJB

typically follows the pattern:

 The client application identifies itself to the server.

 The client application uses the Java Naming Directory service to locate the

desired EJB.

 The client application retrieves a handle to the EJB Home and subse-

quently Remote interfaces.

The remote interface contains methods that the client is permitted to

use. They represent a summary of the business logic that is implemented by the bean.

The implementation logic is defined within the primary bean class. All IPC, database

and resource details are restricted to the bean class.

65
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

In constructing a JSP document, the creation of the HTML base is a

prudent step. It becomes the visual template that JSP scriptlets are merged into. The

post execution HTML produced from the completed JSP should be that of the original

HTML document. With the exception of comment, dynamically generated HTML

sections and JSP content substitutions. The scripting logic, except for where desired,

is completely non visual in regard to the response HTML text.

The construction of the HTML layout conceivably begins with a Web

developer. The creation of the JSP pages would be similar if not identical to the

methods used to construct industry HTML pages. The next step would be the addition

of JSP specific logic to identify the sections of the HTML that might be generated

dynamically. This conversion step from pure HTML to JSP is where server side logic

is added to the page.

A completed JSP logically embodies presentation layer services and

business functionality. Physically they are blended within the JSP in an as needed

swapping of HTML and JSP code. Continued maintenance of the application and

changes in the business logic need not affect the presentation layout. Likewise,

changes in the presentation layout need not affect the scriptlet logic, it will however

require that the WEB developer, not necessarily a JAVA programmer, show care in

the handling of this file which is no longer pure HTML should any HTML

maintenance become necessary.

MODULES:

 Admin

 Customer

 Billing and payment

Admin:

66
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

Admin is the first and main module of application .admin is the responsible person

for adding and updating the dish menu and dish pieces. Admin can add the data and

also he can viewe the details.

custmer:

Customer will be provide with separate login session so that they have to login with

theirusername and password to order the food and view the price detail.

Billing and payment:

food , food prices pending bill and related all kind of report and features: hotel billing

website application

There Exists Seven Modules

The Restaurant Billing Management System project is divided into different modules

for better understanding of the project. The modules help us to handle with errors

easily and access each and every class properly. Menu management is done by using

following features: 

Add Menu items: In this, we Add Items in a menu by assigning a unique

number to each item. When we add any item we give description as category, full

name and price for each item. The access of the item is given to the Owner of the

restaurant.

67
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

 View Full Menu: As the name indicates in this, we display the full

information f all the items in a menu. Only outlook of all the items is

displayed, no editing is performed.

 Changing rate/price of items: In this, we can change rate/price of our menu items

according to situations or circumstances.  Choosing items: In this, we can select

multiple items from different categories according to the choice and respectively

having a look on the price of it. 

Billing: In this we can see the resultant bill of the items selected by the user and

accordingly the user can verify the items and the price and can be sure of no mistake.

5.2 Conclusion:

In conclusion, the Hotel and Cafe Billing System project has been successfully
completed, marking a significant milestone in the efficient management of our hotel
and
cafe operations. Through the course of this project, we achieved several important

objectives:

Automation of Billing Processes: The system now automates billing processes for

both the hotel and cafe, reducing manual errors and saving time for our staff.
Customers
can receive accurate bills promptly, enhancing their overall experience.
Improved Efficiency: By integrating various modules such as inventory

68
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

management, customer database, and payment processing, the system has streamlined

our operations. This has resulted in improved efficiency in serving our guests and

customers.

Enhanced Customer Experience: With the implementation of this system, we


can provide a more personalized experience to our customers. We can now track
their preferences, offer tailored promotions, and ensure prompt and accurate billing,
leading to higher customer satisfaction.
Data Analysis and Reporting: The system's robust reporting capabilities allow
us to analyze sales trends, customer preferences, and inventory turnover. This data-
driven approach will help us make informed decisions to optimize our offerings and

improve profitability.

Challenges Overcome: During the development process, we faced challenges


related to data integration, system security, and user experience design. However,
through collaboration and innovative problem-solving, our team successfully
overcame
these challenges, ensuring the project's timely completion.

Future Enhancements: Looking ahead, there is room for future enhancements. We


could explore integrating mobile payment options, expanding the system to
accommodate online reservations, and implementing machine learning algorithms
for predictive analysis of customer behavior In conclusion, the Hotel and Cafe Billing
System project not only meets our current operational needs but also lays the
foundation
for future technological advancements. I would like to express my gratitude to the
project team for their dedication and hard work throughout this endeavor. I also
extend my thanks to all stakeholders and users who provided valuable feedback and
support.
P<9

69
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

REFERENCES
1. https://www.techjockey.com/blog/free-restaurant-billing-software

2. https://www.raspberrypi.org/education/

3. https://www.bing.com/ck/a?!&&p=d4890a555a9f5e05JmltdHM9MTY5ODI3O

4. DQwMCZpZ3VpZD0yYzhiNjhhNC1mZjRiLTZkZTMtMDc3Yi03YjM2ZmVk

70
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

MDZjNTkmaW5zaWQ9NTI0OQ&ptn=3&hsh=3&fclid=2c8b68a4-ff4b-6de3-

077b-7b36fed06c59&psq=hotel+and+cafe+billing+system+&u=a1aHR0cHM6

Ly93d3cudGVjaGpvY2tleS5jb20vYmxvZy9mcmVlLWhvdGVsLWJpbGxpbmc

tc29mdHdhcmU&ntb=1

71
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology

RESEARCH PAPER & CERTIFICATES

72
B.E. Project: Aadhar Security Travel Identity.

You might also like