• Tidak ada hasil yang ditemukan

Online Cineplex Rent & Ticket Management system

N/A
N/A
Protected

Academic year: 2023

Membagikan "Online Cineplex Rent & Ticket Management system"

Copied!
73
0
0

Teks penuh

Sonargaon University in partial fulfillment of the requirement for the degree of Bachelor of. Online Cineplex Rent and Ticket Management System" is the sale of cinema tickets and complex rental services through, among other things, an electronic network, mainly via the Internet. So the Online Cineplex Rent and Ticket Management System can be one of the best models for this.

It was a great pleasure for us to develop a web application for the 'Online Cineplex Rent and Ticket Management System'. First of all, we would like to thank our project supervisor Bakk Hossain, Lecturer, Deearhent of Computer Science and Engineering, Sonargaon University, who guided us towards proper analysis of the system and helped in developing an elegant and efficient system. Online Cineplex Rent aad Ticket Management System is the service that allows users to purchase movie tickets directly and confirm the rental service for various purposes through the Internet.

Additionally, standing in line is time-consuming and physically demanding while waiting to purchase movie tickets at the edge of the Cineplex. The main purpose of the system will be to efficiently buy, sell and maintain a secure transaction transaction between traders and customers.

Figure  28:  Successfuily  saved  the  post.....  ................33 Figure  29:  View  movie  list  with  edit  option  ............33
Figure 28: Successfuily saved the post..... ................33 Figure 29: View movie list with edit option ............33

Chapter 2

Obseration on Existing Online Systeus

Chapter 3

  • Data Requirement
  • PhysielDe$igp
  • Software Requirements
  • Softwals ImFlementation
    • IITMLs
    • PIIP in Laravel Framework
    • Editor (Sublime Text)

Admin can also enter new category E€Iru in category lisL Admin can also insert movies with price and details. Users can select or buy the expected cinema tickets in the system and can confirm the order by selecting the payment method. A virtual ticket cart is available in the system until the purchase is complete.

After linking the purchase*, users can choose the payment method: via credit card, bkash, Duth-Bangla Mobile Banking. This is captured in terms of how data is entered into a system, how it is verified or authenticated, how it is processed and how it is represented as Ia Physical design; The following requirements regarding the system are decided. IITMLS is a short form of Hyper Text Markup Language and it is a language used to create electronic documents, especially pages on &e World S/ide Web that contain connections called hyperlinks to other pages.

Wi& PHP, ao Laravel Frarnework, we can do things like create rffiefiulme and password logra pages, check details of a form, create. Apache is developed and maintained by an open community of developers under the auspices of the Apache Softrnrare Foundation.

Chapter 4

The boundary which defines the system of interest in relation to the world around it. The use cases in which the specific roles are played by the actors in and around the system. 4l Lise Case Model for Admin: A use ea,se diagr*m is a glaphie depietioa ofthe iateractions amcng the elements of a system. Figure 4 shows the Use case diagram for admin, where admin cm logil, ad#delete customer, add products, delete/update product, add/update category, iogout.

3 Use Case }Iodel for customer: Figure 5 sho.vs the Customer Use Case diagram where the customer can login.

Figure  4:  Use  Case Model  for  Admin
Figure 4: Use Case Model for Admin

Chapter 5 Database Design

  • Requiremerts of Data
  • l Entities
  • J Relationships
  • Attributes
  • Entity Relationship Diagram (ERD)
  • One-to-One
  • One-to-Many
  • Many-to-Many
    • Entity Relationship Diry1lm of Online Cineplex Rent & Ticket Management System

In defining the basic flow of entities through the system, a flowchart can be useful as a means of documenting and visualizing the physical flow of entities from location to location. One-throne: Both tables can have only one record on either side of the relationship. Each pdmaqr key value relates to only one (or no) record in the related table.

One-to-many: The primary key table contains only one record related to gene, ore, or rumy records in the related table. This relationship is similar to the one between you and a parent. You only have one mother, but your mother can have several children. In computing, an attribute is a specification that defines a property of an object element or file.

It can also refer to or set the specific value for a given instance of one. An attribute of an object usually consists of a name and a value; of an element atyry or class name; of a file, a name and an extension. Single Valued Attributes: An attribute that has a single value for a single entity is known as single valued attributes.

Multi-valued Attributes: Attributes that can have multiple values ​​for the same entity are known as multi-valued attributes. An entity relationship model, also called an entity relationship (ER) diagram, is a graphical representation of entities and their interrelationships commonly used in computer science. For example, Figrrre 8 shows in an employee database, each employee's column (A) is associated with only one social security number.

One instance of an entity (A) is linked to zero, one, or more instances of another entity. @), but for one instance of entity B, there is only one instance of entity A. One instance of an entity (A) is associated with ooe, zero, or many instances of another entity (B), and one instance of entity B is associated with one, ze,ro or many instances of entity A For. Here are the entity relationship diagrams qnnbols used to draw an entity relationship diagram.

Figure  8:  One-to-Ane  relationship
Figure 8: One-to-Ane relationship

Chapter 6

User Account Login

CustomerDetails

Running Movies: this feat';re shou,s the running movies at front page of the system in

The main function of the admin panel is . to give an overview of how Cineplex works. A i.,.with a haunted past and an ice not on the brink,;ld of ner finai vo,:s are sent by th* Yaiican to investigate the death of a foreign nun in Romania and face a maleyolenl strength in fort of a denronic ry;n. Stone and iuitlen by Stone and Kieran Fitzgerald cased cn the br:oks The Snci.'den Files ly L.,.rke Harding and]lme oi ihe ')ctopus by .Analoi'y.

Kuiherena Filnr slars an enss'qble cist ftat inCudes Jcsaph Gordan-Levit akka t.t. Piest pa* jabaa fi nodc tlresfiold oJ firql vo\rs ttre \Etican irratti qabu Ee du'a yotng rrn Rotmnia keessatti ittisuu fi humna hamaa* bifa dernorie rrn wajjin wal'aansoo qabuuf tajaajila.

Figure  23:  Admin  Ponel log in box.
Figure 23: Admin Ponel log in box.

Chapter 7

Session cookies allow users to be recognized within a website so that any page or item changes or data selections we make are remembered from page to page. The most obvious example of this functionality is the shopping cart feature of any e-commerce site. When we visit a kaalog page and select some items, the session cookie remembers our selection, so the items in our shopping cart will be selected when we're ready to check out.

If we click on CFffiCKOUT without session cookies, the new page will not recognize our previous activities on previous pages and our shopping cart will always be empty. Websites typically use session cookies to ensure that we are recognized until we move pages within the ooe site and that any information we have entered is remembered. For example, if an e-commerce site did not use session cookies, items placed in a shopping cart would be placed by the time we arrive at the checkout.

Database security is generally planned and implemented and maintained by a database administrator or other information security expert. Load/stress testing and capacity testing of a database to ensure it does not crash in a distributed denial of service (DoS) attack or user overload.

Chapter 8

  • Process
  • Life Cycle Activities
  • Dynamic Testing
  • Planning
    • Dynamic Testing
    • Planning
    • Preparation
    • Evaluationr

In 2015, the F-35 fighter jet fell victim to a software bug that prevented it from correctly detecting targets. The software development process, also known as the software development life cycle, is the structure imposed on the development of a software product. The software process is represented as a series of uro* phases used to design and build a software product.

Ia qr sysfiem, re has followed a sequential process by which it has been possible to develop tte systern gaAualty. The ability to design tests early in the lifecycle can help prevent defects from being introduced into the code. In dynamic testing, the software code is executed to demonstrate the result of nmning tests.

We coordinate the testing activities, we report on test progress and the staff on &e software being tested. During the evaluation, we must check the results and evaluate the software being tested and the completion criterion, which helps us determine whether we have completed the test and whether the software product has passed the tests. Along with &e testing of code, testing of requirements and design specifications and also the related documents like operation, user and holding material is equally important.

Chapter 9

We collect customer feedback and will develop and upgrade the system to make it better. We will develop several gateways for payment systems that will be available outside the province in the near future due to the increasing economy. We will and will integrate Point of Sale, in short, the cash register system with this website.

We will try to make it a multi-purpose business website which indicates that if a customer wants to maintain several things using just one website, he will be.

LINEJ;

Gambar

Figure  28:  Successfuily  saved  the  post.....  ................33 Figure  29:  View  movie  list  with  edit  option  ............33
Figure  L:  Star Cineplex  Ticket  Pricing
Figure  2:  Movie  detoils  from  www.cineplexbd.com
Figure  3: Specific  ticketing  and  other options
+7

Referensi

Garis besar

Dokumen terkait

Pada Gambar 2 use case diagram sistem rekomendasi dibuat dengan 2 aktor yaitu admin dan wisatawan. Admin dapat memasukkan username dan password untuk login ke sistem dan mengatur