Professional Documents
Culture Documents
PROJECT REPORT
By
Prof. SmitaDalvi
INTRODUCTION
Background:
"Online Restaurant Management System" is a web application. This system
is developed to automate day to day activity of a restaurant. Restaurant is a
kind of business that serves people all over world with ready made food.
This system is developed to provide service facility to restaurant and also
to the customer. This restaurant management system can be used by
employees in a restaurant to handle the clients, their orders and can help
them easily find free tables or place orders.
The services that are provided is food ordering and reservation table
management by the customer through the system online, customer
information management and waiter information management, menu
information management and report. The restaurant menu is organized by
categories (appetizers, soups, salads, entrees, sides and drinks) of menu
items. Main objective build the system this is to provide ordering and
reservation service by online to the customer.
Each menu item has a name, price and associated recipe. A recipe for a
menu item has a chef, preparation instruction sand associated ingredients.
With this system online, ordering and reservation management will become
easier and systematic to replace traditional system where are still using
paper. To resister a meal online, the customer has to become a member
first then he can access the later part of the site.
This project to facilitate customer for make online ordering and reservation.
The option of becoming member was only an attempt to avoid (to some
extent) placing the fake bookings.
The customer is also given with the facility to view the status of the order
and if the order is ready then he can go and get it.
So, online restaurant management system will develop to help the
restaurant administrator to manage restaurant management and for
customer make their online ordering and reservation table.
At Management side, initially the staff member has to login, and according
to his designation the privileges are set. Other than that, this project is to
upgrade the manual system and make the business easily to access and
systematic. If the staff member is a cook, then he is allowed to edit only the
order items status, indicating which menu items he has prepared.
Objective:
The machine will offer an enjoy of convenience to the restaurant
employees at the same time as they are on duty in addition to the client
who dine-in at the eating place.
This system allow the workforce to serve customers with the minimum
postpone compare to the paper primarily based order gadget, due to the
fact what the workforce need to do is just document down the food that the
purchaser wish to reserve then the staff location an order through the
computer, the food order might be send to the kitchen laptop concurrently.
After the order were effectively placed one replica of the meals order with it
information can be printed out for customer overview.
It significantly shorten the time needed to take an order, assume that
kitchen place is on ground however presently the staff is taking order at
second ground. If the restaurant is the usage of paper based totally system,
the team of workers has to deliver the food order to ground and stroll all of
the way lower back to second ground, it take plenty of time and time
consuming.
Therefore, via the use of this machine it is able to take away this minor
section of the order taking procedure. except, it can allow consumers to
enjoy their meals within a quick period of time and for this reason it is able
to growth the satisfaction and turnover rate of the consumers.
Purpose,Scope,Applicability:
Besides, the restaurant waiter information also by manual system kept use
paper and this is difficult for restaurant administrator to find waiter
information, probability missing the paper and difficult to arrange the
schedule. Initial problem is that the customer has to get connected over the
phone, it would be harder if the restaurant is very popular and busy.
Sometimes, waiter information and customer information is important to
restaurant administrator for reference in the future. The chances of
committing mistakes at the restaurant side in providing a menu list for a
specific time would be more.
•This could limit the wide variety of employees at the back of the counter.
•The system might be less in all likelihood to make mistake, because it’s a
system.
•This can keep away from long queues on the counter because of the
velocity of execution and quantity of most reliable screens to house the
most Throughput
Scope , Cause:
The task aimed is to developing an Order gadget that may be used within
the small medium agency food & drinks (F&B) industries that could help the
restaurants to simplified their complete each day operational undertaking
as well as enhance the dining enjoy of customers.
For the cellular primarily based platform will advanced to permit consumer
to view the menu card statistics of the eating place and able to allow
consumer region an order through the gadget.
Scope:
Customer, administrator
Customer
This user will register to be a member to use the online system of this
online restaurant management system. This online ordering divided into
two type of customer; it is customer dine-in ordering and takeaway
ordering. For dine in ordering, customer will view menu, make online
ordering and make a reservation table. This system allows customer to
place an order or allow him to cancel the book order. But takeaway
ordering, customer can view menu and online ordering without reservation
table. During login, the costumer has to enter the time of delivery, and the
menu items will appear accordingly. As availability of items differ from time
to time. After customer make online ordering, customer can take ordering
the date that customer was choose during make online ordering.
Customers can search menu according to price range and the category as
well, Event though, customer must confirm online ordering with restaurant
three days before customer take the ordering for dine-in customer and for
take-away customer will be confirm one hour before it whether by email or
phone.
Customer can create his new account or he can edit his personal
information from the existing account.
Administrator
Administrator or manager is the person who will manage the entire system.
He is allowed to reassign the cook according to his Priority, he can edit the
menu information such as its price, items available currently, etc. This type
of user will also do maintenance and control the application of this system.
A manager can reassign the cook for a specific order or an item.
Administrator takes a responsibility to register new customer, register new
waiter, register new menu into database. A manager can edit/create some
or whole part of the menu record on daily basis. That is by changing the
menu items, prices, description, etc.
Table booking
Order Confirmation
Payment facilities
Payment details like credit card/ debit card/ e-wallet details will be taken
From e-wallet user can add money and pay money and its history will be
viewed to the user.
Transaction history
Like orders placed previously payment history will be shown to the user
Modify profile
In the module user is allowed to make changes to his or her profile given at
the time of registration.
Waiter Module
Feedback Module
Based on food or everything about the restaurant, customer can send any
suggestion or comment to the restaurant with feedback form. From this
form, side of restaurant will know their weaknesses and strengths.
Menu Module
Menu module is food that restaurant prepared for customer. This module,
customer can view the menu and make decision for order.
Applicability
The task can be used in the small medium corporation food & drinks (F&B)
industries that may help the eating places to simplified their whole daily
operational task in addition to improve the dining experience of customers.
Achievements
The subsequent effects were performed after completing the system and
relate lower back to the gadget’s goal.
• Must allow users to shop gadgets to the cart and consider special records
approximately the order: The users can add any range of gadgets to the
cart from any of The to be had food categories by using actually clicking the
add to Cart button for each item. As soon as object is delivered to the cart,
user is offered with exact order to review or continue buying.
Organization 0f Report
•Graphs And time limits Are Plotted in order to finish our work in a
particular given time.
All editors, designers, project types and other tools are implemented
as VSPackages. Visual Studio uses COM to access the VSPackages.
The Visual Studio SDK also includes the Managed Package
Visual Studio does not include any source control support built in
but it defines two alternative ways for source control systems to
integrate with the IDE.[ A Source Control VSPackage can provide its
own customised user interface.
Features
ASP.NET
ASP.NET, the next version of ASP, is a programming framework used to create
enterprise-class Web Applications. These applications are accessible on a global
basis leading to efficient information management. The advantage ASP.NET offers
is more than just the next version of ASP.
ASP.NET pages are easy to write and maintain because the source
code and HTML are together.
The source code is executed on the server. The pages have lots of
power and flexibility by this approach.
The source code is compiled the first time the page is requested.
Execution is fast as the Web Server compiles the page the first time
it is requested. The server saves the compiled version of the page
for use next time the page is requested.
MY SQL SERVER
MySQL provides a implementation of a SQL database very well suited for small to
medium web pages. The database is free and open source with a commercial
license available (MySQL is now owned by Oracle after they bought Sun).
Common applications for MySQL include php and java based web applications
that require a DB storage backend, e.g. Dokuwiki, Joomla, xwiki etc. Very many
applications that use MySQL are geared towards the LAMP stack (Linux, Apache,
MySQL, php).
MySQL is usually used with 2 different storage engines, one is called MyISAM
doesn't support transactions and stores each table in a set of 3 files. The second is
called InnoDB which supports transactions, this storage engine stores all data in a
single set of bytes or uses one set of bytes per database directory.
MySQL has one major advantage, since it is free, it is usually available on shared
hosting packages and can be easily set up in a Linux, Unix or Windows
environment. If a web application requires more than database, requires load
balancing or shading, it is easy to set up maybe instances of the database requiring
only the hardware costs, as opposed to commercial databases that would require a
single license for each instance.
MySQL has some issues with stability and clustering, it is very difficult to install a
consistent database cluster with MySQL with the regular version.
Depending on the database storage, MySQL will support transactions or not, so the
requirements of the application have to be taken into account when creating the
database tables.
For large, heavy loaded databases, it is a major operations problem that changing
the database structure is only possible when locking the complete tables. This will
mean that the database cannot be accessed during that operation so that this can
only be done during low traffic times.
In our online world, competition is always a mouse click (or screen touch) away,
and rapid responses to customer inquiries and activities are therefore paramount.
The database serving web-based applications needs to provide extreme
performance for both read (simple and complex queries) and write operations.
there factor of performance is that this same type of extreme performance must be
exhibited no matter the workload (e.g. thousands of current connections) or data
volume (GB to multi-TB).
Connectivity, speed and security make MySQL very suited for accessing
database on a network.
A privilege and password system that is very flexible and secure and
allows host-based verification.
Replication features.
Very actively developed.
In today’s world most of the people don’t have time to go to restaurant and
wait for their food .
Personal management
profitability
3.2Requirement specification
Existing system:
The following are the stakeholders in the application. They have a vested
interest of some sort in the way that the application works. It is important to
them that the application is easy to use.
• Programmers
The first Gantt chart was devised in the mid 1890s by Karol Adamiecki, a
Polish engineer who ran a steelworks in southern Poland and had become
interested in management ideas and techniques.
Today, Gantt charts are most commonly used for tracking project
schedules. For this it is useful to be able to show additional information
about the various tasks or phases of the project, for example how the tasks
relate to each other, how far each task has progressed, what resources are
being used for each task and so on.
ECONOMIC FEASIBILITY:
With the manual gadget the running value of the system is about 60 Lakhs
p.a. This fee incorporates profits of 25 human beings, stationary,
building hire, electricity, water, smartphone and many others. but with
the brand new system this reoccurring fee comes out to be about 20 Lakhs
p.a. hence the brand new device is economically possible.
The economic feasibility of the machine is especially concerned with
economic aspects.
It determines whether the funding that is going into the implementation of
the mission is recoverable or not. The cast gain analysis is normally used
technique in comparing the effectiveness of the system.
The price of growing this system currently includes the minimal software
fee to broaden and run system.
The maximum of the software program used in machine development is freely
to be had at the web.
TECHNICAL FEASIBILITY:
OPERATIONAL FEASIBILITY:
The modern system is manual thus processing big amount of data turn out to
be a bulky hobby. Reports which can be generated are hard to prepare
manually and are also errors susceptible. Because the person find issue
running a manual gadget, they have got personally come forward and given
their ideas regarding what form of pc machine are anticipated. employer
has evaluated organizational and cultural problems to become aware of
capability chance for the new system. And has come to end that the new
automated gadget offers no risk they may save you powerful use of the new
device.
The system is designed in one of these manner that it is easy to operate.
The device does no longer involve any complex operations. It handles
handiest easy facts orientated functions.
It is aimed toward giving an clean manner to meals ordering.
Schedule Feasibility:
Legal Feasibility:
Determine whether the proposed system conflicts with legal
requirements.
3.5 Software and Hardware Requirement
Monitor
Internet Connection
3.5 Conceptual Module
Use cases are not only texts, but also diagrams, if needed. In the Unified
Modeling Language, the relationships between use cases and actors are
represented in use case diagrams originally based upon Ivar
Jacobson's Objectory notation. SysML uses the same notation at a system
block level.
In addition, other behavioral UML diagrams such as activity
diagrams, sequence diagrams, communication diagrams and state
machine diagrams can also be used to visualize use cases accordingly.
Specifically, a System Sequence Diagram (SSD) is a sequence diagram
often used to show the interactions between the external actors and the
system under design (SuD), usually for visualizing a particular scenario of a
use case.
CREATE ACOOUNT
Order
Entity-Relationship Diagram:
System Context Diagrams... represent all external entities that may interact
with a system... Such a diagram pictures the system at the center, with no
details of its interior structure, surrounded by all its interacting systems,
environments and activities. The objective of the system context diagram is
to focus attention on external factors and events that should be considered
in developing a complete set of systems requirements and constraints.
DFD Diagram:
Chapter 4 : SYSTEM DESIGN
Class Diagram:
Data integrity is the maintenance of, and the assurance of the accuracy
and consistency of, data over its entire life-cycle,[1] and is a critical aspect
to the design, implementation and usage of any system which stores,
processes, or retrieves data. The term is broad in scope and may have
widely different meanings depending on the specific context – even under
the same general umbrella of computing. It is at times used as a proxy term
for data quality,[2] while data validation is a pre-requisite for data
integrity.[3] Data integrity is the opposite of data corruption.[4] The overall
intent of any data integrity technique is the same: ensure data is recorded
exactly as intended (such as a database correctly rejecting mutually
exclusive possibilities,) and upon later retrieval, ensure the data is the
same as it was when it was originally recorded. In short, data integrity aims
to prevent unintentional changes to information. Data integrity is not to be
confused with data security, the discipline of protecting data from
unauthorized parties.
Algorithms Design :
Sequence Diagram:
A sequence diagram shows object interactions arranged in time
sequence. It depicts the objects and classes involved in the scenario
and the sequence of messages exchanged between the objects
needed to carry out the functionality of the scenario. Sequence
diagrams are typically associated with use case realizations in the
Logical View of the system under development. Sequence diagrams
are sometimes called event diagra
ms or event scenarios.
Component diagram:
A component in the Unified Modeling Language "represents a modular part
of a system, that encapsulates its content and whose manifestation is
replaceable within its environment. A component defines its behavior in
terms of provided and required interfaces".
A component may be replaced by another if and only if their provided and
required interfaces are identical. This idea is the underpinning for the plug-
and-play capability of component-based systems and promotes software
reuse.
Deployment diagram:
A deployment diagram in the Unified Modeling Language models
the physical deployment of artifacts on nodes.[1] To describe a web site, for
example, a deployment diagram would show what hardware components
("nodes") exist (e.g., a web server, an application server, and a database
server), what software components ("artifacts") run on each node
(e.g., web application, database), and how the different pieces are
connected (e.g. JDBC, REST, RMI).
All the users will see the same page when they enter in this website. This
Commonly understood by intended users of the system. The system will have
simple interface, consistence with standard interface, to eliminate need for user
training of infrequent users.
Hardware Interfaces:
The system will use the standard hardware and data communication
resources. This includes, but not limited to, general network connection at
Application Interfaces:
modern web browser such as Mozilla Firebox, Internet Explorer, Opera, and
Chrome. The computer must have an Internet connection in order to be able to
access the system.
Communications Interfaces:
This system use communication resources which includes but not limited
to, HTTP protocol for communication with the web browser and web server and
This application will communicate with the database that holds all the
Booking information.
means of a function that is called HTTP Service. This function allows the
application to use the data retrieved by server to fulfill the request fired by
the user.
Security Issue
SQL Injection:
Today the important and easy way of hacking the database is SQL Injection
which everybody knows and even they perform it on every website . This Leads To
the Database Leak . Therefore in order to prevent it I have used prepared
statement instead of other statement because it comes precompiled so it will not
execute the logic of SQL injection. Also I have Provided Only 3 Login Attempts.
There are various reasons to use push notifications in your app and they have
numerous benefits in terms of engaging with customers and driving traffic,
however it is essential to use them in a way that keeps customers connected,
rather than annoyed. We investigate five benefits of push notifications, how best
to use them and what they can do for your app.
Idea well describes the different forms Push Notifications can take; a banner,
alert, badge and sounds. In mobile settings, users are able to control if and how
they receive push notifications. Banners appear on the screen for a few seconds
and then disappear; alerts appear on the screen and require the user to accept or
dismiss it; and badges are the small red circles with numbers that appear on the
upper-right hand corner of an app’s icon, displaying the number of pending
notifications. Sounds include custom or system-provided sounds that accompany
the notification styles.
Test case:
Reference:
https://www.scribd.com
www.100projects.com
www.tizag.com/htmlT/links.php
https://en.wikipedia.org.
https://www.google.com