Sie sind auf Seite 1von 4

International Journal of Scientific Research and Engineering Studies (IJSRES)

Volume 1 Issue 4, October 2014


ISSN: 2349-8862

Online Travel Agency Using Robust Module Based Data


Management

Neha Agrawal

Neha Mare

RMD Sinhgad School Of Engineering, Pune

RMD Sinhgad School Of Engineering, Pune

Ekta Sinha

Prof. Shafali Gupta

RMD Sinhgad School Of Engineering, Pune

(Guide)

Abstract: The combination of current trend of ontology


based database and evolving online markets in Tourism is
the world's largest civilian industry whose growth, economic
significance and potential are phenomenal across the globe.
We have also added the Feature of Responsiveness, so that
one can easily use this site on mobile browser as well. We
used AJAX for creating fast and dynamic web pages. This
site will automatically adjust itself according to browser so
that user can use it efficiently and easily. Online tourism is
rapidly becoming a growing topic of research and its
importance as future mode of acquiring information and
purchase of tourism products and services is growing day by
day. The present paper has been written with the extensive
research on contemporaneous data, websites and Conference
proceedings on tourism related aspects. Web survey, focused
interviews have been used to elicit Specific information for
such qualitative analysis. Ontology based database
management system (DMS), can be Implemented using a
pre-existing database management and then manage our
own dataset. Here, we extract a piece of schema from
reference DMS according to need. Various ontology
languages are: RFDS OWL & OWL2 (dl-lite).We are using
DES algorithm to provide security our project, so that user
get a secured environment.
Keywords:
Ontology,
Responsiveness,
management, DES algorithm, ERM algorithm.

I.

A. DESCRIPTION LANGUAGE
Description language provides different solution to achieve
such a reuse of a reference ontology based DMS[1]. To
capture the relation of interest for the application under
construction in a module. DL-lite comes with efficient
inference algorithms for querying data through (DL-lite)
ontologies and for checking data consistency w.r.t. integrity
constraints expressed in DL-lite.[2] Existing definitions of
modulesin the literature basically resort to the notion
of(deductive) conservative extension of a schema or of
uniform interplant of a schema, a.k.a. forgetting about
noninteresting relations of a schema. [3] formalizes those two
notions for schemas written in DLs and discusses their
connection. We carry out our investigations in the setting of
DL-lite, which is the foundation of the QL profile of OWL2
for efficiently managing large datasets. In addition, DL-lite
comes with efficient inference algorithms [4] for querying
data through (DL-lite) ontologies and for checking data
consistency w.r.t. integrity constraints expressed in DL-lite.
To attain a consistence database, novel properties of
robustness for modules that provide means for checking easily
that a robust module-based DMS evolves safely w.r.t. both the
schema and the data of the reference DMS. We can use robust
modules in:

Database
a.

INTRODUCTION

This our project is based on Online travel agency based


on Robust Module-based Data Management, is used to build
Ontology based database management system (DMS), using
a pre-existing database management and then manage our own
dataset. Here, we extract a piece of schema from reference
DMS according to need. Various ontology languages are:
RFDS OWL & OWL2(dl-lite). Our website provides
responsiveness. For responsiveness we use AJAX. It optimizes
the process that delivers output by eliminating wasteful,
unproductive output. Therefore it is also support mobile
phones. Customers book there trips on mobiles also.
www.ijsres.com

IN CONSISTENCY CHECKING

From a module robust to consistency checking, for any


data update in a corresponding module-based DMS, we show
how to query the reference DMS for checking whether the
local update does not bring any inconsistency with the data
and the constraints of the reference DMS. From a module
robust to query answering, for any query asked to a modulebased DMS, we show how to query the reference DMS for
obtaining additional answers by also exploiting the data stored
in the reference DMS.
b.

IN QUERY ANSWERING

From a module robust to query answering, for any query


asked to a module-based DMS, we show how to query the
Page 35

International Journal of Scientific Research and Engineering Studies (IJSRES)


Volume 1 Issue 4, October 2014
ISSN: 2349-8862
reference DMS for obtaining additional answers by also
exploiting the data stored in the reference DMS.
B. RESPONSIVENESS
For responsiveness we used AJAX (Asynchronous
JavaScript And XML).AJAX is about updating parts of web
page without reloading whole page. It helps creating fast and
dynamic web pages.
C. CUSTOMER FEEDBACK
The customer can give their views and complaint on the
facility provided. The customer can share their experience and
can also upload their photos and share them.

II.

exploiting the data stored in the reference DMS. In Robust


module based data management: Firstly, Database preprocessing is done in which cleaning, normalization,
transformation, feature abstraction and selection is done. Then
particular database is updated where the changes are made.
After that user can login, here a valid user id and password is
checked. When user gets validate, the data gets extracted in
form of natural language .After that globalization of data is
done. After that Robust Query answering is done, in this
feature user enter a query to search and find the result. In
robust based system we have to reduce the time to retrieve the
data.

MOTIVATION AND AIM

In this project we aim to achieve a system which can


handy database efficiently. This feature can be added by
managing data robustly. We can be able to handle large
amount of data using this algorithm in the proposed system of
Online Travel and Tour management. As per the current
demand of the technology public prefer a handy site which
they can access wherever they require, or on their mobile. So,
we are providing a unique feature of responsiveness, which
means it support mobile browsers as well. The site will adjust
itself according to the browser.

III.

METHODS

A travel agency where you can get all the facilities on one
click. Its an online travel agency which is user friendly as
well as Responsive, which mean a user is cable of using a
mobile site for travel agency. This travel agency is also
capable of managing data efficiently, which will be done using
Robust module based data management and is secured as well.
The security feature is added using DES algorithm.
A. ROBUST MODULE BASE DATA MANAGEMENT
We revisit the reuse of a reference ontology-based DMS
in order to build a new DMS with specific needs. We go one
step further by not only considering the design of a
modulebased DMS (i.e., how to extract a module from a
ontological schema): we also study how a module-based DMS
can benefit from the reference DMS to enhance its own data
management skills. We Introduced properties of robustness for
modules that provide means for checking easily that a robust
module-based DMS evolves safely w.r.t. both the schema and
the data of the reference DMS. From a module robust to
consistency checking, for any data update in a corresponding
module based DMS, we show how to query the reference
DMS for checking whether the local update does not bring any
inconsistency with the data and the constraints of the reference
DMS. From a module robust to query answering, for any
query asked to a module-based DMS, we show how to query
the reference DMS for obtaining additional answers by also
www.ijsres.com

Figure 1: Robust module based algorithm Flowchart


ALGORITHM 1
The ERM algorithm ( Extracting robust modules) ERM
(T, , RQA, RCC)
INPUT: A DL-lite Tbox T, a signature sig(T ), two
Booleans RQA and RCC
OUTPUT: A module T of T w.r.t. , which is semantically
minimal, robust to query answering if RQA = true, and robust
to consistency checking if RCC = true.
(1) T
(2) foreach cl(T )
(3) if is built upon only
(4) T T {}
(5) else if RCC = true and is a NI X v Y s.t. X or Y is built
upon
(6) T T {}
Page 36

International Journal of Scientific Research and Engineering Studies (IJSRES)


Volume 1 Issue 4, October 2014
ISSN: 2349-8862
(7) if RQA = true
(8) sig ; T0
(9) while T6= T0
(10) T0 T; sig0 sig
(11) foreach PI X v Y T s.t. Y is built upon sig0
(12) T T {X v Y }
(13) sig sig sigX(for X built upon the signature sigX)
(14) return T

Now the RPT again given to the next round and


performed the 15 more rounds.
After the completion of 16 rounds the Final Permutation
is performed.

ALGORITHM 2
The SPC algorithm (Safe Personalization Checking) SPC
(T0,T,T ,RQA,RCC)
INPUT: a Tbox T0that is a personalization of the module T
of a Tbox T w.r.t. sig(T ), and two booleans RQA and
RCC denoting respectively whether T is robust to query
answering and/or consistency checking
OUTPUT: true if T0is safe, false otherwise
(1) if sig(T ) (sig(T0)\sig(T)) 6=
(2) return false
(3) if cl(T ) 6= ERM(T T0,sig(T ), false, false)
(4) return false
(5) if cl(ERM(T T0,sig(T0)\sig+(T),RQA,RCC) 6=cl(T0)
(6) return false
(7) return true.
B. DES ALGORITHM
DES is based on two fundamental attributes of
cryptography: Substitution (confusion) and transposition
(Diffusion). DES consists of 16 steps, each of which called as
a Round. Fig. 2 Shows Encryption and Decryption
Techniques.
ALGORITHM

In the first step, the initial 64-bit plain text block is


handed over to in Initial Permutation (IP) function.
The Initial permutation is performed on plain text.
The initial permutation produce two halves of permuted
block: Left Plain text (LPT) and Right Plain Text (RPT).
Now, each of LPT and RPT goes through 16 rounds of
encryption process, each with its own key:
From the 56-bit key, a different 48-bit Sub-key is
generated using Key Transformation.
Using the Expansion Permutation, the RPT is expended
from 32 bits to 48 bits.
Now, the 48-bit key is XORed with 48-bit RPT and
resulting output is given to the next step.
Using the S-box substitution produced the 32-bit from
48 bit.
These 32 bits are permuted using P-Box Permutation.
The P-Box output 32 bits are XORed with the LPT 32
bits.
The result of the XORed 32 bits are become the RPT
and old RPT become the LPT.This process is called as
Swapping.

www.ijsres.com

Figure 2: Encryption and Decryption Technique

IV.

SYSTEM FEATURES

The system has been identified to be presented with the


following modules: Tours, Hotel Reservation, Packages,
Vehicle Reservation , Customer Feedback, Administration.
A. TOURS
Organizing a tour involves many things, which includes
accommodation reservation and Vehicle booking. As a
package of all these things, a Tour package will be offered to
the customers. This module deals with managing everything as
a package.
B. HOTEL RESERVATION
This module deals with accommodation reservation. It is
specific to the users who would want to avail hotel reservation
separately.
C. VEHICLE RESERVATION
This module deals with bus and car reservation. It is
specific to the users who would want to avail local
transportation reservation separately.
D. ADMINISTRATION
The administration module centralizes all activities to be
done in this application. It automatically allocates the hotel,
and does the local transportation reservations if the customers
opt for a package Administrator also can add, delete and edit
information related to packages, tours and accommodations.
E. CUSTOMER FEEDBACK

Page 37

International Journal of Scientific Research and Engineering Studies (IJSRES)


Volume 1 Issue 4, October 2014
ISSN: 2349-8862
The customer can give their views and complaint on the
facility provided.The customer can share their experience and
can also upload their photos and share them.

V.

CONCLUSION

The interactions of tourists with tourism service providers


over the past have gradually led the tourism industry to
become tour-operator centric where advance planning of
itinerary becomes dependent on them as an absolute necessity.
It was primarily because of the information concentrated
mainly on their hands. This lead to emergence of tour operator
and travel agents networks all across the globe and also one of
the reasons for organizing the industry online and more direct,
using advanced technology. In Tourism, where travel agents
still play an important role in many parts of the world, theirs
takes are going to be revised in the online regime. How far and
how deep their stakes will be affected in the future; depends
upon how flexible and innovative they turn into adoption of
the new technology and also on how fast the Web affects
businesses and everyday life (Liu and Jones 1995). The travel
agencies all over the world will have to reorient to suit to the
new Internet era by acting as, travel information and product
managers instead of mere travel ticket sellers. The modules
introduced in this paper generalize both the modules obtained
by extracting a subset of a Tbox w.r.t. selected relations.In
addition, in contrast with existing work, we have considered
the problem of safe personalization of modules built from an
existing reference DMS. This raises new issues to check easily
that a modulebased DMS evolves independently but
coherently w.r.t. the reference DMS from which it has been
built. We have introduced two notions of module robustness
that make possible tobuild locally the relevant queries to ask
to the reference database in order to check global consistency
(possiblyupon each update), and to obtain global answers for
local queries. We have provided polynomial time algorithms
that extract minimal and robust modules from a reference
ontological schema expressed as a DL-lite Tbox. Extracts
modules from DL-lite schemas following a forgetting
approach. It proposes an alternative to our result about global
query answering, which applies under the severe constraints
that the dataset of the reference DMS has to be modified
(write access is required).

www.ijsres.com

VI.

ACKNOWLEDGEMENTS

We are extremely happy to present this project on JOY


INN-a online travel agency based on robust module based data
management. This project has been divided into different
module so that the project can be understood properly The
modules have been arranged in a proper sequence with eyecatchy GUI, to ensure smooth flow of the project. The
satisfaction and euphoria that accompany the successful
completion of any task would be incomplete without
mentioning the names of the people who made it possible,
whose constant guidance and encouragement crowns all
efforts with our success.
We extend our gratitude to our Principal Dr. P. M. Patil
(RMDSSOE), Prof. D. N. Rewadkar (Head of Dept.),
Computer Engineering for the encouragement and support that
they have extended. We have made every possible effort to
properly present the project on the proposed topic. Finally, we
also wish to thank all the guest faculties and nonteaching staff
for supporting me during this work.
Neha Agarwal (B81024202)
Ekta Sinha (B81024214)
Neha Mare (B81024236)

REFERENCES
[1] F. Baader, D. Calvanese, D. McGuinness, D. Nardi, and P.
F. Patel-Schneider, Eds, The Description Logic
Handbook: Theory, Implementation, and Applications.
Cambridge University Press, 2003.
[2] H. Stuckenschmidt, C. Parent, and S. Spaccapietra, Eds.,
Modular Ontologies: Concepts, Theories and Techniques
for Knowledge Modularization,ser. Lecture Notes in
Computer Science. Springer, 2009,vol. 5445.
[3] S. Ghilardi, C. Lutz, and F. Wolter, Did i damage my
ontology?a case for conservative extensions in description
logics, in KR,2006.
[4] D. Calvanese, G. D. Giacomo, D. Lembo, M. Lenzerini,
and R. Rosati, Tractable reasoning and efficient query
answering in description logics: The dl-lite family, JAR,
vol.
39,
no.
3,
pp.
385429,
2007.

Page 38

Das könnte Ihnen auch gefallen