PROJECT BASED LEARNING II
REPORT ON
Cyber Café Managament System
SUBMITTED BY
Group ID:
1. SHELAR PRIYA MARUTI
2. TRIBHUVAN KAJAL BALKRUSHN
3. WAGH ROSHNI SANJAY
4. WAGHMARE SHANTANU SHIVAJI
Under the Guidance of
Prof. Nangare V. L.
SAHYADRI VALLEY COLLEGE OF ENGINEERING &
TECHNOLOGY
DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND
MACHINE LEARNING ENGINEERING
SAVITRIBAI PHULE UNIVERSITY
2024-25
MAHRIA CHARITABLE TRUST’S
SAHYADRI VALLEY COLLEGE OF ENGINEERING &
TECHNOLOGY
DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND
MACHINE LEARNING ENGINEERING
CERTIFICATE
This is to certify that Students of Second Year Artificial Intelligence And Machine Learning
has successfully completed the work associated with Project Based Learning II tilted as
Cyber Café Managament System and has submitted the work book associated under my
supervision, in the partial fulfillment of Second Year Artificial Intelligence And Machine
Learning (2019 course) of Savitribai Phule Pune University.
DATE:- / / 2025
PLACE:- RAJURI
H.O.D Project Guide
Prof.K.Khemnar Prof.Nangare.V.L.
ACKNOWLEDGEMENT
I would like to place on record my deep sense of gratitude to Prof. Nangare V.L. Sir ,
Department of Artificial Intelligence And Machine Learning for his generous guidance,
help and useful suggestions.
I express my sincere gratitude to Prof.Khemnar K.C.HoD Department of Artificial
Intelligence And Machine Learning, for his stimulating guidance, continuous
encouragement and supervision throughout the course of present work.
I am extremely thankful to Prof.B. Perumalla Sir , Vice Principal-Sahyadri Valley
College of Engineering and Technology for providing me infrastructural facilities to work
in, without which this work would not have been possible.
1. SHELAR PRIYA MARUTI
2. TRIBHUVAN KAJAL BALKRUSHN
3. WAGH ROSHNI SANJAY
4. WAGHMARE SHANTANU SHIVAJI
ABSTRACT
The Cyber Cafe Management System is developed to help manage and control the
operations of a cyber café in a simple and efficient way. In traditional systems, keeping
track of customer login/logout times, computer usage, and billing is done manually, which
is time consuming and prone to errors. This project automates those tasks to improve
accuracy and save time. The system allows the admin to assign computers to customers,
track their usage time, and automatically calculate the amount to be paid. Additionally, the
system stores customer information, including ID proofs, which is important for security
purposes. It can also generate reports on daily earnings, customer usage history, and
system usage. This project is user-friendly, cost-effective, and makes the café environment
more professional and systematic. It is an ideal solution for small and medium scale cyber
cafes looking to upgrade their management system.
INDEX
CHAPTER TITLE PAGE
NO. NO.
1 Introduction
2 Literature Survey
3 Specification of the Project
4 Block Diagram & Description
5 Software System Design
(Algorithm And Flowchart)
6 Simulation Results and Performance
Evaluation
7 Application & Future modifications
8 Conclusion
9 Reference / Bibliography
CHAPTER 1
INTRODUCTION
1.1 Overview
In this project an attempt is made to design a computer system for the CYBER CAFÉ
that makes the management of recording user details, internet usage and billing much
easier. The objective of this software is to maintain the details of users, cabins and
login history. Through this system we provide facility of prepaid and post-paid
accounts respectively for Account Users and Walkthrough Users.
The Software powered by PHP assures clear and efficient services to the agency. This
easy-to-operate system helps to access and modify user details, provides efficient
billing facility. The software is designed to provide Reliable and error free information.
The database is driven by My SQL thus providing portability.
1.2 Need For System:-
Computers have become a way of life for today’s high society. Many aspects of modern
life that we have come to accept as common place would not be possible if there were
no computers. Today computers are used extensively in many areas of business,
industry, science, education etc.
The major advantage of computer is its speed that makes it able to give some useful
information very quickly. This speed also opens new approaches to problem solving
and data processing. Another feature is its accuracy. Though the computers do only
what is instructed at every instant, these instructions are taken into account and accurate
information’s are produced. Computer can hold data and instruction in an electronic
representation in internal memory and this data can be retrieved at any time
1.3 Summary:-
The project entitled “Cyber Café Management System” is a software package, which can
be used in cyber cafés for managing the clients’ computer efficiently. Now a day’s cyber
terrorism, which is mainly undergone through internet cafés, need to be tackled properly.
Thereby, it is indeed necessary to store the valid information of the user who comes for
internet access. The system being used, the time at which the user logs in and logs out
should be recorded systematically.
In this modern era, a number of people access the internet frequently by means of cyber
cafes. For such frequent users, a prepaid account shall be maintained and discounted rates
may be charged from them. While walkthrough users, who are less frequent, are charged
a fixed rate. By using the LAN connections in the cyber cafes we can automate this process
very easily. This system comprises of the following modules:
➢ The Server Module
➢ The Client Module
CHAPTER 2
LITERATURE SURVEY
2.1 Overview of existing systems:
In Cyber Café Management System we use PHP and MySQL database. This is the
project which keeps records of daily users of cyber cafe. Cyber Café
Management System has one module i.e. admin.
1. Dashboard: In this section admin can briefly view total number of
computers and total number of user come in cyber cafe.
2. Computer: In this section, admin can manage the computers(add/update).
3. Users: In this section, admin can add new users, update outime, price and
remarks, and view details of old users.
4. Search: In this section admin can search users on the basis of entry id.
5. Report: In this section admin can view number of users comes in cyber café
in particular periods.
6. Profile: In this section admin can update his/her profile.
7. Change Password: In this section admin can change his/her passwords
8. Logout: Through this button admin can logout.
CHAPTER 3
SPECIFICATION OF THE PROJECT
3.1 Software Specifications:
Component Specification
Database MySQL
Server Apache
Frontend HTML
Scripting language Java Script
IDE subline
Txechnology PHP
3.2 Hardware Specification:-
Component Minimum Requirement
RAM 8 GB
Processor 2.0 GHz quad-core
Disk Storage 256 GB SSD or 500 GB HDD
CHAPTER 4
BLOCK DIGRAM AND DESCRIPION
DESIGN DOCUMENT
• The entire system is projected with a physical diagram which specifics the
actual storage parameters that are physically necessary for any database to be
stored on to the disk. The overall systems existential idea is derived from this
diagram.
• The relation upon the system is structure through a conceptual ER- Diagram,
which not only specifics the existential entities but also the standard relations
through which the system exists and the cardinalities that are necessary for the
system state to continue.
• The content level DFD is provided to have an idea of the functional inputs and
outputs that are achieved through the system. The system depicts the input and
output standards at the high level of the systems existence.
A DFD does not show a sequence of steps. A DFD only shows what the different process in
a system is and what data flows between them.
The following are some DFD symbols used in the project
External entities
Process: A transaction of information that resides
DATAFLOWS
within the bounds of the system to be module.
DATASTORE: A repository of
data that is to be stored for use by
one or more processes, may be as
simple as buffer of queue or as a
relational database.
RULES FOR DFD:
• Fix the scope of the system by means of context diagrams.
• Organize the DFD so that the main sequence of the actions reads
left to right and top to bottom.
• Identify all inputs and outputs.
• Identify and label each process internal to the system with rounded
circles.
• A process is required for all the data transformation and transfers.
Therefore, never connect a data store to a data source or the
destinations or another data store with just a data flow arrow.
• Do not indicate hardware and ignore control information.
• Make sure the names of the processes accurately convey
everything the process is done.
• There must not be unnamed process.
• Indicate external sources and destinations of the data, with squares.
• Number each occurrence of repeated external entities.
• Identify all data flows for each process step, except simple Record
retrievals.
• Label data flow on each arrow.
• Use details flow on each arrow.
• Use the details flow arrow to indicate data movements.
• There can’t be unnamed data flow.
• A data flow can’t connect two external entities.
LEVELS OF DFD:
The complexity of the business system means that it is a responsible to represent the
operations of any system of single data flow diagram. At the top level, an Overview of the
different systems in an organization is shown by the way of context analysis diagram. When
exploded into DFD They are represented by:
• LEVEL-0 : SYSTEM INPUT/OUTPUT
• LEVEL-1:SUBSYSTEM LEVEL DATAFLOW FUNCTIONAL
• LEVEL-2: FILE LEVEL DETAIL DATA FLOW.
The input and output data shown should be consistent from one level to the next.
LEVEL-0: SYSTEM INPUT/OUTPUT LEVEL
A level-0 DFD describes the system-wide boundaries, dealing inputs to and outputs from the
system and major processes. This diagram is similar to the combined user-level context
diagram.
LEVEL-1: SUBSYSTEM LEVEL DATA FLOW
A level-1 DFD describes the next level of details within the system, detailing the data flows
between subsystems, which makeup the whole.
LEVEL-2: FILE LEVEL DETAIL DATA FLOW
All the projects are feasible given unlimited resources and infinite time. It is both necessary
and prudent to evaluate the feasibility of the project at the earliest possible time. Feasibility
and the risk analysis are pertained in many ways. If project risk is great.
FIRST LEVEL DTAFLOW DIAGRAM
0.0
Cyber Cafe Management
System
Admin
2nd Level DFDs
1.1
User
Details
DB DB
1.2
Admin
1.1.1.1
Add
User
Details
Computer
Admin
Info
2. Unified Modeling Language Diagrams(UML):
• The unified modeling language allows the software engineer to express an
analysis model using the modeling notation that is governed by a set of syntactic
semantic and pragmatic rules.
• A UML system is represented using five different views that describe the system
from distinctly different perspective. Each view is defined by a set of diagram,
which is as follows.
User Model View
i. This view represents the system from the users perspective.
ii. The analysis representation describes a usage scenario from the end-users
perspective.
Structural model view
◆ In this model the data and functionality are arrived from inside the system.
◆ This model view models the static structures.
Behavioral Model View
◆ It represents the dynamic of behavioral as parts of the system, depicting the
interactions of collection between various structural elements described in
the user model and structural model view.
Implementation Model View
◆ In this the structural and behavioral as parts of the system are represented as
they are to be built.
Environmental Model View
In this the structural and behavioral aspects of the environment in which the system is to be
implemented are represented.
UML is specifically constructed through two different domains they are
◆ UML Analysis modeling, which focuses on the user model and structural
model views of the system?
◆ UML design modeling, which focuses on the behavioral modeling,
implementation modeling and environmental model views.
ENTITY-RELATIONSHIP Diagrams
E-R (Entity-Relationship) Diagram is used to represents the relationship between
entities in the table.
The symbols used in E-R diagrams are:
SYMBOL PURPOSE
. Represents Entity sets
Represent attributes.
Represent Relationship Sets.
Line represents flow
Structured analysis is a set of tools and techniques that the analyst.
To develop a new kind of a system:
The traditional approach focuses on the cost benefit and feasibility analysis, Project
management, and hardware and software selection a personal considerations.
DATABASE DESIGN
The data in the system has to be stored and retrieved from database. Designing the database
is part of system design. Data elements and data structures to be stored have been identified
at analysis stage. They are structured and put together to design the data storage and retrieval
system.
A database is a collection of interrelated data stored with minimum redundancy to serve
many users quickly and efficiently. The general objective is to make database access easy,
quick, inexpensive and flexible for the user. Relationships are established between the data
items and unnecessary data items are removed. Normalization is done to get an internal
consistency of data and to have minimum redundancy and maximum stability. This ensures
minimizing data storage required, minimizing chances of data inconsistencies and optimizing
for updates. The MS Access database has been chosen for developing the relevant databases.
Cyber Cafe Management System Project (CCMS) contains 3 MySQL tables : tbluser table
Structure : This table store the login and personal details of user.
tblcomputers table Structure : This table store the computer and cabin details.
tblusers table Structure : This table store the user personal and computer usage details .
Class Diagram:
The class diagram shows a set of classes, interfaces, collaborations and their relationships.
CHAPTER 5
Software System Design
SYSTEM TESTING
SOFTWARE TESTING TECHNIQUES:
Software testing is a critical element of software quality assurance and represents the
ultimate review of specification, designing and coding. TESTING OBJECTIVES:
Testing is process of executing a program with the intent of finding an error.
A good test case design is one that has a probability of finding an as yet undiscovered
error.
A successful test is one that uncovers an as yet undiscovered error. These above
objectives imply a dramatic change in view port.
Testing cannot show the absence of defects, it can only show that software errors are
present.
There are three types of testing strategies
Unit test
Integration test
Performance test
Unit Testing:
Unit testing focuses verification efforts on the smallest unit of software design module.
The unit test is always white box oriented. The tests that occur as part of unit testing are
testing the module interface, examining the local data structures, testing the boundary
conditions, execution all the independent paths and testing error-handling paths.
Integration Testing:
Integration testing is a systematic technique or construction the program structure
while at the same time conducting tests to uncover errors associated with
interfacing. Scope of testing summarizes the specific functional, performance,
and internal design characteristics that are to be tested. It employs top-down
testing and bottom-up testing methods for this case.
Performance Testing:
Timing for both read and update transactions should be gathered to determine
whether system functions are being performed in an acceptable timeframe.
CHAPTER 6
Simulation Results and Performance Evaluation
Admin Login
Dashboard
Profile
Change Password
Add Computer
Manage Computer
Update Computer
Add Users
Update user
User Details
Search data
Between Reports
Forgot Password
Reset Password
CHAPTER 7
SYSTEM DEVELOPMENT ENVIRONMENT
SYSTEM DEVELOPMENT ENVIRONMENT
1. HTML
WHAT IS HTML?
To publish information for global distribution, one needs a university-understood
language, a kind of publishing mother tongue that all computers may potentially
understand. The publishing language used by the World Wide Web is HTML
(Hyper Text Markup Language)
HTML Gives Authors the Means To
1. Publish online documents with headings, text, tables, list, photos etc.
2. Retrieve online information via hypertext links, at the click of a button
3. Design forms for conducting transactions with remote services, for use in
searching information, making reservation, ordering products etc.;
4. Includes spreadsheets, video clips, sound clips, and other applications
directly in the documents.
5.
Some HTML Tags
<HTML> :Starting an HTML tag
<HEAD> : Creating a web page’s head
<TITLE> : Giving a web page ‘s body
</HEAD> </BODY> : Ending a web pages body
</HTML> :Ending a web page
<FORM> : Creating a HTML forms
<INPUT TYPE=BUTTON> : Creating a buttons
<INPUT TYPE=CHECKBOX> : Creating a checkboxes
<INPUT TYPE=SUBMIT> : Creating a submit button
<INPUT TYPE=TEXT> : Creating a text fields
: Ending HTML 4.0
HTML 4.0 extends with mechanisms for style sheets, scripting, frames embedding
objects, improved support for right to left and mixed direction texts, richer tables
and enhancements to form, offering improved accessibilities for people with
disability.
a web pages head
2. INTRODUCTION TO JAVA
SCRIPT WHAT IS JAVA SCRIPT?
JavaScript, originally supported by Netscape Navigator, is the most popular Web
scripting language today. JavaScript lets you embed programs right in your Web
pages and run these programs using the Web browser. You place these programs in
a <SCRIPT> element. If you want the script to write directly to the Web page,
place it in the <BODY> element.
EX: <HTML>
<HEAD>
<TITLE></TITLE>
</HEAD>
<BODY>
<SCRIPT LANGUAGE=”JavaScript”>
</SCRIPT>
</BODY></HTML>
JAVASCRIPTS OBJECTS
JavaScript is an object-oriented language. JavaScript comes with a number of
predefined objects.
Objects of the JavaScript
1. Document: Corresponds to the current Web page’s body. Using this object,
you have access to the HTML of the page itself, including the all links,
images and anchors in it.
2. Form: Holds information about HTML forms in the current page.
3. Frame: Refers to a frame in the browser’s window.
4. History: Holds the records of sites the Web browser has visited before
reaching the current page.
5. Location: Holds information about the location of the current web page.
6. Navigator: Refers to the browser itself, letting you determine what browser
the user has.
7. Window: Refers to the current browser window.
JAVASCRIPTS EVENTS
Some of the events of JavaScript
1. on Change: Occurs when data in a control, like a text field, changes.
2. on Click: Occurs when an element is clicked.
3. on Focus: Occurs when an element gets the focus.
4. on Mouse Down: Occurs when a mouse button goes down.
5. on Reset: Occurs when the user clicks the reset button.
JAVASCRIPTS FUNCTIONS
Declaration of function
Syntax: function function name ()
Write these functions in <SCRIPT> tag.
5. RDBMS CONCEPTS
1. DATA ABSTRACTION
A major purpose of a database system is to provide users with an abstract view
of the data. This system hides certain details of how the data is stored and
maintained. However in order for the system to be usable, data must be
retrieved efficiently. The efficiency lead to the design of complex data structure
for the representation of data in the database. Certain complexity must be
hidden from the database system users. This accomplished by defining several
levels of abstraction at which the database may be viewed.
2. CLASSIFICATION OF DATABASE
There are 3 types of database approaches given below,
a. Hierarchical Database:
In this type of model data is represented in simple tree structured. The
record at the top of three is known as root, the root may have any
number of dependents. Each of these may have any number of low
level dependents and so on up to any number of levels. The
disadvantages of the approach are that no independent record
occurrence can exist without it’s superior.
b. Network Database:
In a Network database, data is represented by Network structure. In
this approach record occurrence can have any number of superiors as
well as any number of immediate dependents thus allow many to
many correspondence directly than an hierarchical approach. The
main disadvantage of the Network model is data representation is very
complex resulting in complexity of the DML (Data Manipulation
Language).
c. Relational Database:
The Relational model represents data and relationships among data by
a collection of tables each of which has a number of columns with
unique names.
6. THE SQL LANGUAGE
SQL is a language for relational database. SQL is a non-procedural i.e., when we
use SQL we specify what we want to be done not how to do it.
Features of SQL
1. SQL is an interactive query language.
2. SQL is a database administration language.
3. SQL is a database programming language.
4. SQL is a client/server language.
5. SQL is a distributed database language.
6. SQL is a database gateway language.
Basic SQL Commands
✓ Data Definition Language commands (DDL)
✓ Data Manipulation Language commands (DML)
✓ Transaction Control Language commands (TCL)
✓ Data control Language commands (DCL)
PHP
• PHP is an acronym for "PHP: Hypertext Preprocessor"
• PHP is a widely-used, open source scripting language
• PHP scripts are executed on the server
• PHP is free to download and use
What is a PHP File?
• PHP files can contain text, HTML, CSS, JavaScript, and PHP code
• PHP code are executed on the server, and the result is returned to the
browser as plain HTML
• PHP files have extension ".php"
What Can PHP Do?
• PHP can generate dynamic page content
• PHP can create, open, read, write, delete, and close files on the server
• PHP can collect form data
• PHP can send and receive cookies
• PHP can add, delete, modify data in your database
• PHP can be used to control user-access
• PHP can encrypt data
With PHP you are not limited to output HTML. You can output images, PDF files, and even Flash movies. You can
also output any tex
CHAPTER 8
CONCLUSION
8.1 Conclusion
CCMS has many powerful features and is certainly more than a "simple"
diagramming tool. With its support of MDA (Model Driven Architecture), it is
more aimed at people using UML in an intensive way and with some code
generations objectives than for simply drawing diagrams to document
requirements. However, using CCMS just as a diagramming tool work fine,
especially on Windows as the tool is built with Delphi and might execute faster
than the Java-based tools. Modern world is computer world where the things
have to be done promptly that requires optimal resources and optimal methods.
Due to this inevitable requirement, computerisation of each and every sector in
the main stream is must, so that it can be held itself in the race. Few eye
catching features of our project are its simplicity, accuracy, and its user
friendly interface. Our software incorporates all the features and facilities
provided by the Visual Studio software. This project has been developed to
manage the entire working of the Cyber Café. Our software simplifies and
replaces all the manual effort and the paper works done by the owner of the
cyber to a completely electronically environment, be it bill generation or
customer creation and fulfilment of their needs and customer satisfaction.
Hence both the customer and the owner are at their ease. The customer is
serviced at his footsteps wherein he just types in the request and he is just a
click away. We would like to convey our sincere gratitude and thanks to all,
who stood as our backbone, in designing, formatting and helping us in
executing this project successfully
CHAPTER 9
REFERENCE/BIBLOGRAPHY
9.1 REFERENCE/BIBLOGRAPHY
For PHP
➢ https://www.w3schools.com/php/default.asp
➢ https://www.sitepoint.com/php/
➢ https://www.php.net/
For MySQL
➢ https://www.mysql.com/
➢ http://www.mysqltutorial.org
For XAMPP
➢ https://www.apachefriends.org/download.html