Final Thesis Format
Final Thesis Format
A
Project Report
On
Submitted by
Mahesh kurzekar Pallavi Nagrale
Hemant prasad Lukesh Oghare
Guided By
Miss.vaishnavi mam
CERTIFICATE
Forwarded here with the thesis titled with “Hotel billing system” by
Mahesh kurzekar, Hemant Prasad, Pallavi Nagrale, Lukesh Oghare,
students of GNIT done work for the fulfillment of the requirement for the
award of Graduation Degree of B.E. (Computer Science And
Engineering) in the faculty of Engineering & Technology, Rashtrasant
Tukadoji Maharaj Nagpur University, Nagpur, Maharashtra, India.
CERTIFICATE
DECLARATION
This thesis entitled with “Hotel billing system ” is our own work carried
out under the Supervision and guidance of Miss. Vaishnavi mam,
Assistant Professor, GNIT, Nagpur for the award of Bachelor of Degree
in Computer Science And Engineering Department. This work in the
same or in any other form is not submitted to any other University for the
award of any degree or diploma.
University
Roll No. Roll No. Student Name Sign
Mahesh kurzekar
Hemant Prasad
Pallavi Nagrale
Lukesh Oghare
Department of Computer Science Engineering Guru Nanak Institute of Technology
ACKNOWLEDGEMENT
INDEX
REFERENCES 57-57
PHOTOGRAPHS 58-58
CERTIFICATES 59-59
Department of Computer Science Engineering Guru Nanak Institute of Technology
ABSTRACT
1
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
LIST OF FIGURES
2
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
LIST OF TABLES
3
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
ABBREVATION
Keywords Title
IRC Indian Road Congress
CRRI Central Road Research Institute
4
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
SYMBOLS
Symbol Title
β Bita
α Alfa
5
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 1
INTRODUCTION
6
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 1
INTRODUCTION
1.2 Objectives:
1) It creates a tool that manages the handling of travel that includes passport,
license and crime using the unique identification associated with each individual.
2) It Integrates Citizen, Aadhaar Dept, Crime, Passport & RTA to address
travel issues and disputes.
7
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 2
LITERATURE REVIEW
8
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 2
LITERATURE REVIEW
9
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
10
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 3
METHODOLOGY
11
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 3
METHODOLOGY
3.1Methodology: -
Algorithm:
DATA DICTIONARY
3.2 Analysis:
Existing system :
In the existing manual sustem a lot of time is spent in a communicating t the
information across different branches. There is aneed for integrated and outomated
12
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
system, which has some centralized control over the Entire process . Convetioal sys.
tem is make used of huge amount of paper For regarding transaction the existing
system is a manialy maintains system all the recorder have to be maintained
Advantage of Proposed System for the detail of each . Feeding detail
allocation attendance all these details of enter
And retrieve manually
Disavdvanages:
Time consuming
update process .
Inacrruracy of data.
proposed system
Proposed system is a computerized version of the existing system .
Provide easy and quick acces over the data. Keeping
Recorde of admition of resident propety
customer so that facility provide by hotels are fully utilize and offensive
and efficient manner. Keeping the record salary structure of the workers
of hotel by billing approche's.
Advantages :
Storing details record correctly.
Maintain acurracy.
Platform :python
13
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
3.6 Advantages:
The citizen does not have to approach agents for applications. Aadhaar
seva centers would facilitate the application processing. The citizen has
his application auto-filled when he visits the seva centers. No commis-
sion is involved.
For transaction related to government departments the ID and pin num-
ber should be quoted.
The UID doesn’t allow duplicate application for any type of card.
The citizen can apply the next time only when he fails a verification or
test.
Address changes easily updated.
Technology Trends
INTRODUCTION:
14
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
OVERVIEW OF PYTHON:
programs.
15
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
History of Python :
FEATURES OF PYTHON:
17
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
2) Expressive Language :
3) Interpreted Language :
4) Cross-platform Language :
Linux, UNIX, and Macintosh, etc. So, we can say that Python is
18
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
only once.
6) Object-Oriented Language :
19
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
7) Extensible :
compile the code and thus it can be used further in our Python
code. It converts the program into byte code, and any platform
development.
20
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
10) Integrated :
JAVA, etc. Python runs code line by line like C,C++ Java. It
11) Embeddable :
21
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
22
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
INTRODUCTION:
using Python.
23
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
MySQL
24
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
import mysql.connector
Syntax:
25
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
databases.
26
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
Example -Example -
import mysql.connector
Con_obj = conn.cursor()
Let's understand the following example.
Example -
import mysql.connector
27
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
print(cur_obj)
import mysql.connector
try:
# creating a new database using query
cur_obj.execute("create database New_PythonDB")
# getting the list of all the databases which will now include the new data-
base New_PythonDB
dbms = cur_obj.execute("show databases")
except:
conn_obj.rollback() # it is used if the operation is failed then it will not re-
flect in your database
for x in cur_obj:
print(x)
conn_obj.close()
Output:
'information_schema',)
('javatpoint',)
('javatpoint1',)
(New_Pythondb)
('mydb',)
('mydb1',)
28
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
('mysql',)
('performance_schema',)
('testDB',)
PHP
INTRODUCTION:
The Hyper Text Markup Language (HTML) is a simple markup language used to
create hypertext documents that are portable from one platform to another. HTML
documents are SGML documents with generic semantic that are appropriate for
representing information from a wide range of applications. This specification defines
HTML version 3.2. HTML 3.2 aims to capture recommended practice as of early ‘96
and as such to be used as a replacement for HTML 2.0(RF1866).
A set of instructions embedded in a document is called Markup Language.
These instructions describe what the document text means and how it should look like
in a display. Hyper Text Markup Language (HTML) is the language used to encode
World Wide Web documents. It is a document layout and hyperlink specification
language that defines the syntax and placement of special embedded directions that
are not displayed by a web browser, but tells it how to display the contents of the
documents including text, images and other supported media.
USE OF HTML:
Web site is a collection of pages, publications, and documents that reside on web
sever. While these page publications, and a document as a formatted in any single
format. You should use HTML for home page and all primary pages and the site. This
will enable the millions of web users it easily access and to take advantage of your
website. HTML is considered first for formatting any new material you plan to
publish on the web. HTML documents are platform independent, meaning that they
don’t confirm to any standard. If they are created properly you can move home to any
server platform or you can access them with any complaint www browser.
BLOCK OF HTML:
HTML elements perform a defined task. HTML uses two types of elements
Empty tags(open tags)
29
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
Container tags
These tags differ because of what they represent. Empty tags represent formatting
constructs such as line breaks and Horizontal rules. Container tags define a section of
text and specify the formatting the container dot all of the selected text. A container
tag has both a beginning and an ending.
HTML LAYOUT:
An HTML document consists of text, which comprises the content of the document
and tags which, defines the structure and appearance of the document. The structure
of an HTML document is simple.
<HTML>
<HEAD>
</HEAD>
<BODY>
</BODY>
</HTML>
starting tag for head section is <HEAD> The third line i.e., <TITLE> form example
program </TITLE> is the title of the program. It defines a text string that is
interpreted as the HTML title of the document. The tag </HEAD> will end the HEAD
section of the program. Next tag is <BODY> the beginning of the body section where
30
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
HTML document text lies, which is displayed in the browser. Next tags </BODY>
</HTML> are the ending tags for the body section and html program respectively.
Each document has a head and body delimited by the <HEAD> and <BODY> tag.
The head is where you give your HTML document a title and where you indicate
other parameters the browser may use when displaying the document. The body is
where you put the actual contents of the HTML documents. This includes the text
for displaying the text. Tag also references special and hot spots that link your
BACK END
MYSQL
INTRODUCTION:
MySQL is a world most used open source relational database management system as
the mysql development project has made is source code available under the term of
gnu general public license as well as under the property of verity property agreement
of mysql was owned or sponsored by single for profit for the Swedish company
MySQL is popular choice of database for use in a web application, and is a central
component of the widely used lamp open source web application software stack lamp
project that required full featured database management often use MySQL.
31
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
For commercial used, several paid edition or available and offer function additionally
applications which use MySQL database include TYPO3, hoopla, word press, phBB,
MYBB, Frugal and other software build on the LAMP software stack . Mysql is also
used in an high profile ,large scale, world wide web products including
Wikipedia ,google(though not for searches)Imagbook twitter flicker ,Nokia. Com and
YouTube.
Database Description
Objects
Table The primary units of a database that stores field names, field
Pages A data access page is a special type of Web page designed for
Server database. The data access page may also include data from
32
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
DESIGNING A DATABASE:
database can lead to more efficient use of queries, forms, and reports, and can
These guidelines should not be viewed as hard and fast rules, but rather suggestions
Although there is no one correct way to create a database, there are some general
steps that some professional systems developers follow. These steps generally reflect
what is known as the Systems Development Life Cycle (SDLC). The SDLC breaks
33
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
A variety of techniques can be employed to answer these questions. One of the best
ways is to involve the future end-users of the database. A database, however, may
have hundreds or even thousands of users. However, if the database is very large, you
design committee.
Tables are used to store data in a database. Tables can be created in two views, Table
Design view or Datasheet view. In addition, you can use the Table Wizard or import a
table from an external file. Records are automatically saved as you move from record
to record but changes to the layout of a table (or a form) must be saved.
In table design View, you must specify the fields, specify the data type for each field,
assign the size for text and number fields, assign the primary key (see glossary for
DATASHEET VIEW:
In data sheet view data types are very important to creating a database. There are 10
different types to choose from. The data type determines what kind of information
may be entered in a field. You can always change the data type of a field after you
have entered data into it. However, it may be a difficult process if the data field
conflicts with the current data type (for example, changing a text field to a number
field). The table below shows the specifics on each data type.
34
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
setting for all that don’t require calculations, such as phone numbers. Up to
whichever is less.
65,536 characters.
Date / Time Date and time values for years 100 through 9999.
Yes / No Yes and No values and fields that contain only one of two
35
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
5.4.3 WIZARDS:
Access provides several wizards that you can use to create databases for business or
personal use. This is a wonderful time saver. There are 25 sample tables for business
and personal use. Once you select a template, you can modify the fields to better suit
your needs. In addition, you can rename fields to more accurately define them. Access
can also provide samples in the database. Samples may help you learn to use the
database faster.
36
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 4
RESULT & DISCUSSION
37
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 4
RESULT & DISCUSSION
4.1 Snapshots:
38
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
39
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
40
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
Code:
Coding Standards:
1. Introduction
2. Synchronization
3. Comments
4. Transactions
6. DB Connection Pooling
1. Introduction
This document describes a set of standards for developing programs based
on J2EE architecture It is meant to be used not only by programmers specifically
writing Java code, but also by programmers creating programs which
automatically generate Java code.
2. Synchronization
Use the code or method synchronized whenever sees the method/code cannot
be used asynchronously, when a particular value computed in a method/codes
input to the next object call
Usage of synchronous will affect the performance at the same time we must
use in certain cases otherwise system will malfunction. Choose carefully and
do not miss to use the synchronous key word wherever required.
You can find the need (If you missed in design) if application is giving wrong
output under load
41
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
3. Comments
Must use comments in the class, make sure you have used right com-
ments, comments should not be confusing, must explain the under-
neath code implementation; please refer to i2labs Coding standards.
4. Transactions
Use Container Managed Transactions
Associate each method with a single transaction
Avoid Nested and Multiple Transactions
In descriptor specify the methods associated with transactions
Divide the transactions exception into Application level and System Level ex-
ceptions
Catch Application-level exceptions from the business logic.
System-level exceptions, such as runtime errors by exception handler/bean
container. (Need to come with an approach) Usually role back
Need to identify the methods which are marked for roll back in container, and
Roll back the transaction for checked exec
Once exception is thrown make the decision about continuing the transaction
or not.
Retry and continue the transaction. This might entail retrying portions of the
transaction.
5. DB Connection Pooling
Use Application server connection pooling
In case you are using your own connection pool, configure it to XA
Explicit commit should not be used.
Must to close every connection borrowed, use finally block at the end of try/
catch block and close the connection
Source Code :
import os
42
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
import time
"Dessert":"6 Dessert.txt"}
order_dict = {}
for i in menu_category:
order_dict[i] = {}
os.chdir(os.path.dirname(os.path.abspath(__file__)))
def load_menu():
menuCategory.set("")
menu_tabel.delete(*menu_tabel.get_children())
menu_file_list = os.listdir("Menu")
category=""
while True:
line = f.readline()
if(line==""):
43
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
menu_tabel.insert('',END,values=["","",""])
break
elif (line=="\n"):
continue
elif(line[0]=='#'):
category = line[1:-1]
name = "\t\t"+line[:-1]
price = ""
elif(line[0]=='*'):
name = line[:-1]
price = ""
else:
menu_tabel.insert('',END,values=[name,price,category])
def load_order():
order_tabel.delete(*order_tabel.get_children())
if order_dict[category]:
order_tabel.insert('',END,values=lis)
update_total_price()
def add_button_operation():
44
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
name = itemName.get()
rate = itemRate.get()
category = itemCategory.get()
quantity = itemQuantity.get()
if name in order_dict[category].keys():
return
if not quantity.isdigit():
return
lis = [name,rate,quantity,str(int(rate)*int(quantity)),category]
order_dict[category][name] = lis
load_order()
def load_item_from_menu(event):
cursor_row = menu_tabel.focus()
contents = menu_tabel.item(cursor_row)
row = contents["values"]
itemName.set(row[0])
itemRate.set(row[1])
itemCategory.set(row[2])
itemQuantity.set("1")
def load_item_from_order(event):
cursor_row = order_tabel.focus()
45
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
contents = order_tabel.item(cursor_row)
row = contents["values"]
itemName.set(row[0])
itemRate.set(row[1])
itemQuantity.set(row[2])
itemCategory.set(row[4])
def show_button_operation():
category = menuCategory.get()
else:
menu_tabel.delete(*menu_tabel.get_children())
while True:
line = f.readline()
if(line==""):
break
if (line[0]=='#' or line=="\n"):
continue
if(line[0]=='*'):
name = "\t"+line[:-1]
menu_tabel.insert('',END,values=[name,"",""])
else:
46
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
menu_tabel.insert('',END,values=[name,price,category])
def clear_button_operation():
itemName.set("")
itemRate.set("")
itemQuantity.set("")
itemCategory.set("")
def cancel_button_operation():
names = []
for i in menu_category:
names.extend(list(order_dict[i].keys()))
if len(names)==0:
return
if ans=="no":
return
order_tabel.delete(*order_tabel.get_children())
for i in menu_category:
order_dict[i] = {}
clear_button_operation()
update_total_price()
def update_button_operation():
name = itemName.get()
rate = itemRate.get()
47
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
category = itemCategory.get()
quantity = itemQuantity.get()
if category=="":
return
return
if order_dict[category][name][2]==quantity:
return
order_dict[category][name][2] = quantity
order_dict[category][name][3] = str(int(rate)*int(quantity))
load_order()
def remove_button_operation():
name = itemName.get()
category = itemCategory.get()
if category=="":
return
return
del order_dict[category][name]
load_order()
48
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
def update_total_price():
price = 0
for i in menu_category:
for j in order_dict[i].keys():
price += int(order_dict[i][j][3])
if price == 0:
totalPrice.set("")
else:
def bill_button_operation():
customer_name = customerName.get()
customer_contact = customerContact.get()
names = []
for i in menu_category:
names.extend(list(order_dict[i].keys()))
if len(names)==0:
return
if customer_name=="" or customer_contact=="":
return
if not customerContact.get().isdigit():
return
ans = "yes"
49
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
if ans=="yes":
bill = Toplevel()
bill.title("Bill")
bill.geometry("670x500+300+100")
st += "\t\t\tCODE.NO:- 34BASFF3315HTAAA\n"
t = time.localtime(time.time())
week_day_dict =
{0:"Monday",1:"Tuesday",2:"Wednesday",3:"Thursday",4:"Friday",5:"Saturday",
6:"Sunday"}
st += "-"*130 + "\n"
for i in menu_category:
for j in order_dict[i].keys():
lis = order_dict[i][j]
50
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
name = lis[0]
rate = lis[1]
quantity = lis[2]
price = lis[3]
st += name + "\t\t\t\t\t" + rate + "\t " + quantity + "\t\t " + price + "\n\n"
st += "-"*130
st += "-"*130
bill_text_area.insert(1.0, st)
folder = f"{t.tm_mday},{t.tm_mon},{t.tm_year}"
if not os.path.exists(f"Bills\\{folder}"):
os.makedirs(f"Bills\\{folder}")
file.write(st)
file.close()
order_tabel.delete(*order_tabel.get_children())
for i in menu_category:
order_dict[i] = {}
clear_button_operation()
51
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
update_total_price()
customerName.set("")
customerContact.set("")
bill_text_area.pack(expand=True, fill=BOTH)
bill.focus_set()
bill.protocol("WM_DELETE_WINDOW", close_window)
def close_window():
root.destroy()
root = Tk()
w, h = root.winfo_screenwidth(), root.winfo_screenheight()
style_button = ttk.Style()
style_button.configure("TButton",font = ("arial",10,"bold"),
background="lightgreen")
title_frame.pack(side=TOP, fill="x")
52
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
title_label.pack()
customer_frame.pack(side=TOP, fill="x")
customer_name_label.grid(row = 0, column = 0)
customerName = StringVar()
customerName.set("")
textvariable=customerName)
customer_name_entry.grid(row = 0, column=1,padx=50)
customer_contact_label.grid(row = 0, column = 2)
customerContact = StringVar()
customerContact.set("")
textvariable=customerContact)
customer_contact_entry.grid(row = 0, column=3,padx=50)
53
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
menu_frame.place(x=0,y=125,height=585,width=680)
menu_label.pack(side=TOP,fill="x")
menu_category_frame = Frame(menu_frame,bg="green",pady=10)
menu_category_frame.pack(fill="x")
combo_lable.grid(row=0,column=0,padx=10)
menuCategory = StringVar()
combo_menu = ttk.Combobox(menu_category_frame,values=menu_category,
textvariable=menuCategory)
combo_menu.grid(row=0,column=1,padx=30)
command=show_button_operation)
show_button.grid(row=0,column=2,padx=60)
width=10,command=load_menu)
54
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
show_all_button.grid(row=0,column=3)
menu_tabel_frame = Frame(menu_frame)
menu_tabel_frame.pack(fill=BOTH,expand=1)
scrollbar_menu_x = Scrollbar(menu_tabel_frame,orient=HORIZONTAL)
scrollbar_menu_y = Scrollbar(menu_tabel_frame,orient=VERTICAL)
style = ttk.Style()
style.configure("Treeview.Heading",font=("arial",13, "bold"))
style.configure("Treeview",font=("arial",12),rowheight=25)
columns
=("name","price","category"),xscrollcommand=scrollbar_menu_x.set,
yscrollcommand=scrollbar_menu_y.set)
menu_tabel.heading("name",text="Name")
menu_tabel.heading("price",text="Price")
menu_tabel["displaycolumns"]=("name", "price")
menu_tabel["show"] = "headings"
menu_tabel.column("price",width=50,anchor='center')
scrollbar_menu_x.pack(side=BOTTOM,fill=X)
scrollbar_menu_y.pack(side=RIGHT,fill=Y)
55
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
scrollbar_menu_x.configure(command=menu_tabel.xview)
scrollbar_menu_y.configure(command=menu_tabel.yview)
menu_tabel.pack(fill=BOTH,expand=1)
load_menu()
menu_tabel.bind("<ButtonRelease-1>",load_item_from_menu)
item_frame.place(x=680,y=125,height=230,width=680)
item_title_label.pack(side=TOP,fill="x")
item_frame2.pack(fill=X)
item_name_label.grid(row=0,column=0)
itemCategory = StringVar()
itemCategory.set("")
56
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
itemName = StringVar()
itemName.set("")
item_name.grid(row=0,column=1,padx=10)
item_rate_label.grid(row=0,column=2,padx=40)
itemRate = StringVar()
itemRate.set("")
item_rate.grid(row=0,column=3,padx=10)
item_quantity_label.grid(row=1,column=0,padx=30,pady=15)
itemQuantity = StringVar()
itemQuantity.set("")
item_quantity.grid(row=1,column=1)
57
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
item_frame3.pack(fill=X)
,command=add_button_operation)
add_button.grid(row=0,column=0,padx=40,pady=30)
,command=remove_button_operation)
remove_button.grid(row=0,column=1,padx=40,pady=30)
,command=update_button_operation)
update_button.grid(row=0,column=2,padx=40,pady=30)
width=8,command=clear_button_operation)
clear_button.grid(row=0,column=3,padx=40,pady=30)
order_frame.place(x=680,y=335,height=370,width=680)
order_title_label.pack(side=TOP,fill="x")
order_tabel_frame = Frame(order_frame)
58
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
order_tabel_frame.place(x=0,y=40,height=260,width=680)
scrollbar_order_x = Scrollbar(order_tabel_frame,orient=HORIZONTAL)
scrollbar_order_y = Scrollbar(order_tabel_frame,orient=VERTICAL)
order_tabel = ttk.Treeview(order_tabel_frame,
columns
=("name","rate","quantity","price","category"),xscrollcommand=scrollbar_order_x.se
t,
yscrollcommand=scrollbar_order_y.set)
order_tabel.heading("name",text="Name")
order_tabel.heading("rate",text="Rate")
order_tabel.heading("quantity",text="Quantity")
order_tabel.heading("price",text="Price")
order_tabel["displaycolumns"]=("name", "rate","quantity","price")
order_tabel["show"] = "headings"
order_tabel.column("rate",width=100,anchor='center', stretch=NO)
order_tabel.column("quantity",width=100,anchor='center', stretch=NO)
order_tabel.column("price",width=100,anchor='center', stretch=NO)
order_tabel.bind("<ButtonRelease-1>",load_item_from_order)
scrollbar_order_x.pack(side=BOTTOM,fill=X)
scrollbar_order_y.pack(side=RIGHT,fill=Y)
scrollbar_order_x.configure(command=order_tabel.xview)
scrollbar_order_y.configure(command=order_tabel.yview)
59
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
order_tabel.pack(fill=BOTH,expand=1)
total_price_label.pack(side=LEFT,anchor=SW,padx=20,pady=10)
totalPrice = StringVar()
totalPrice.set("")
width=10)
total_price_entry.pack(side=LEFT,anchor=SW,padx=0,pady=10)
command=bill_button_operation)
bill_button.pack(side=LEFT,anchor=SW,padx=80,pady=10)
cancel_button.pack(side=LEFT,anchor=SW,padx=20,pady=10)
root.mainloop()
60
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 5
CONCLUSION
61
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
CHAPTER 5
5.1 Feature:
1. Login & Security
The module allows only authorized users to use the application. The
application comes with a default administrator account. This account has a user id
“Admin” and password “Admin” by default. This user can change his password as
and when necessary. The administrator maintains Aadhaar seva staffs that are
authorized to handle the application and process transactions for the citizen.
2. Citizen Registration
The module allows the citizen to register for unique identity. The citizen
provides his personal information, photo to the registration module. The module
application number to then check the status of the unique identity. The
administrator. When the administrator gets the physical verification report only
then he confirms the issue of the unique identity. The module generates unique
identification number for each application (citizen). The uid is also associated
4. Apply Passport
The module allows the citizen to register application for passport. The
module auto fills the application with the information already available in the uid
regn database. Only when there is a change of information the citizen should
update the uid regn database and then apply for passport. For citizens already
62
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
having passport and wanted change of information updating the uid regn database
automatically updates the passport database.
5. Passport Processing
The module allows the administrator to verify the details of the application,
set the status of the passport. If the application is accepted then the administrator
provides the passport number and the system automatically updates the date of
issue and expiry. This information is now available to the citizen as well as to the
airport authority. The passport is a digital passport. The verification of the citizen
is done by the crime/police dept.
6. Crime Control
The module allows the crime department to view citizen information
either using the uid or the passport number. They can also provide the name of a
person and have photos viewed for the citizens having identical names, highly
useful when only the name of the person is known. The crime user can also set the
status for a passport such as fly or no fly there by intimating the airport authority
of flying restrictions for a citizen.
7. License Monitor
The module allows the citizen to apply for passport and have the details and
the status of the test. The citizen will not have to submit any physical form nor have
agents in between. The aadhaar scheme provides digital form and takes up citizen
information from the registration database and dynamically fills the form. The test
centers, their location are picked up based upon the pin code the citizen resides at.
The RTA provides inputs on test schedules and test results to Aadhaar.
8. Reports
63
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
INTRODUCTION:
Python Server Pages (JSP's) permit server side Python logic to reside
within the requested document. Upon request of a AWS document the server activates
the specified AWS. The AWS then becomes responsible for providing an HTML
response.
The server-side logic within a JSP is written in Java. The Java code
segments, referred to as script lets, are generally responsible for providing dynamic
HTML content to the JSP's response HTML. The JSP itself is compiled by the server,
and is executed as an object that extends the Java Servlets API. As such, the HTTP
Servlet request and response objects are available by the script lets defined within the
JSP.
the use of JSP’s. Implementation options, particularly the use of JSP language
extensions and use of Enterprise Java Beans (EJB's) will also be discussed. Focus will
be placed on the presentation layer and how the JSP is used to provide a user interface
becomes the client side application. The user communicates requests to the WEB/app
server via the browser. The presentation layer receives the client requests and
prepares the response and server side business functionality is executed. In the context
of this example, the JSP engine represents the presentation layer. It is responsible for
processing requests and responses. Additional messages may be passed between this
layer and that which handles business processes represented below as EJB’s.
64
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
FIGURE1
THE TECHNOLOGY:
JSP technology uses XML - like tags and scriptlets. They are used to encapsulate
presentation logic within the JSP. They can also initiate messages to distributed or
server-side applications. The logical separation of presentation and business logic lies
business logic and the remote interfaces provided to the EJB client. The use of an EJB
The client application uses the Java Naming Directory service to locate the
desired EJB.
The client application retrieves a handle to the EJB Home and subse-
use. They represent a summary of the business logic that is implemented by the bean.
The implementation logic is defined within the primary bean class. All IPC, database
65
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
prudent step. It becomes the visual template that JSP scriptlets are merged into. The
post execution HTML produced from the completed JSP should be that of the original
sections and JSP content substitutions. The scripting logic, except for where desired,
developer. The creation of the JSP pages would be similar if not identical to the
methods used to construct industry HTML pages. The next step would be the addition
of JSP specific logic to identify the sections of the HTML that might be generated
dynamically. This conversion step from pure HTML to JSP is where server side logic
business functionality. Physically they are blended within the JSP in an as needed
swapping of HTML and JSP code. Continued maintenance of the application and
changes in the business logic need not affect the presentation layout. Likewise,
changes in the presentation layout need not affect the scriptlet logic, it will however
require that the WEB developer, not necessarily a JAVA programmer, show care in
the handling of this file which is no longer pure HTML should any HTML
MODULES:
Admin
Customer
Admin:
66
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
Admin is the first and main module of application .admin is the responsible person
for adding and updating the dish menu and dish pieces. Admin can add the data and
custmer:
Customer will be provide with separate login session so that they have to login with
theirusername and password to order the food and view the price detail.
food , food prices pending bill and related all kind of report and features: hotel billing
website application
The Restaurant Billing Management System project is divided into different modules
for better understanding of the project. The modules help us to handle with errors
easily and access each and every class properly. Menu management is done by using
following features:
number to each item. When we add any item we give description as category, full
name and price for each item. The access of the item is given to the Owner of the
restaurant.
67
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
View Full Menu: As the name indicates in this, we display the full
information f all the items in a menu. Only outlook of all the items is
Changing rate/price of items: In this, we can change rate/price of our menu items
multiple items from different categories according to the choice and respectively
Billing: In this we can see the resultant bill of the items selected by the user and
accordingly the user can verify the items and the price and can be sure of no mistake.
5.2 Conclusion:
In conclusion, the Hotel and Cafe Billing System project has been successfully
completed, marking a significant milestone in the efficient management of our hotel
and
cafe operations. Through the course of this project, we achieved several important
objectives:
Automation of Billing Processes: The system now automates billing processes for
both the hotel and cafe, reducing manual errors and saving time for our staff.
Customers
can receive accurate bills promptly, enhancing their overall experience.
Improved Efficiency: By integrating various modules such as inventory
68
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
management, customer database, and payment processing, the system has streamlined
our operations. This has resulted in improved efficiency in serving our guests and
customers.
improve profitability.
69
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
REFERENCES
1. https://www.techjockey.com/blog/free-restaurant-billing-software
2. https://www.raspberrypi.org/education/
3. https://www.bing.com/ck/a?!&&p=d4890a555a9f5e05JmltdHM9MTY5ODI3O
4. DQwMCZpZ3VpZD0yYzhiNjhhNC1mZjRiLTZkZTMtMDc3Yi03YjM2ZmVk
70
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
MDZjNTkmaW5zaWQ9NTI0OQ&ptn=3&hsh=3&fclid=2c8b68a4-ff4b-6de3-
077b-7b36fed06c59&psq=hotel+and+cafe+billing+system+&u=a1aHR0cHM6
Ly93d3cudGVjaGpvY2tleS5jb20vYmxvZy9mcmVlLWhvdGVsLWJpbGxpbmc
tc29mdHdhcmU&ntb=1
71
B.E. Project: Aadhar Security Travel Identity.
Department of Computer Science Engineering Guru Nanak Institute of Technology
72
B.E. Project: Aadhar Security Travel Identity.