Title: Street Vending / Special Sidewalk Vending District ...
A Study on Developing Certificate Vending Machine by using...
Transcript of A Study on Developing Certificate Vending Machine by using...
THESIS REPORT
A Study on Developing Certificate Vending Machine by
using Student Smart Card
(Case Study: UIN Syarif Hidayatullah Jakarta)
By:
Hossein Hosseini Farid
107091103916
INFORMATICS ENGINEERING STUDY PROGRAM
FACULTY OF SCIENCE AND TECHNOLOGY
STATE OF ISLAMIC UNIVERSITY SYARIF HIDAYATULLAH
JAKARTA
2011 M / 1432 H
THESIS REPORT
A Study on Developing Certificate Vending Machine by
using Student Smart Card
(Case Study: UIN Syarif Hidayatullah Jakarta)
By:
Hossein Hosseini Farid
107091103916
INFORMATICS ENGINEERING STUDY PROGRAM
FACULTY OF SCIENCE AND TECHNOLOGY
STATE OF ISLAMIC UNIVERSITY SYARIF HIDAYATULLAH
JAKARTA
2011 M / 1432 H
iii
PREFACE
Alhamdulillah, all of praise and grateful given to Allah SWT who poured
mercy, guidance, and helpful till arranging the Thesis Report with the title “A
Study on Developing Certificate Vending Machine by using Student Smart Card
(Case Study: UIN Syarif Hidayatullah Jakarta)” can be finished without any
obstacle.
This thesis almost talk about certificate vending machine and the process
to print a paper without preview and taking the student data from AIS database
directly, this main purpose for this project is to save the time of both students and
UIN employee and encourage the students to believe on themselves and develop
their own universities system by themselves.
After two month of developing a certificate vending machine application
in smartcard contactless using jasper report method, the writer filling the increase
of his knowledge, learning a lot of java coding strategy and techniques make me
enjoy the software engineering field and for better future we need better basic
knowledge.
In this moment, the writer would to thanks to all of structural person that
covering this program
1. Mr. Dr. Syopiansyah Jaya Putra, M.Sis, Dean of Science Technology Faculty.
2. Mr. Yusuf Durrachman, M.Sc, MIT, the head of Informatics Engineering
3. Mrs. Ria Hari Gusmita, M.Kom, Technical Coordinator of International Class.
iv
4. Mr. Husni Teja Sukmana, Ph.D as a first guidance lecturer that always spare
time with patience giving a guidance, a motivation, a suggestion, and a
purpose to the writer in arranging the report.
5. Mr. Feri Fahrianto, M.Sc as a second guidance lecturer that always spare time
with patience giving a guidance, a motivation, a suggestion, and a purpose to
the writer in arranging the report.
6. Mrs. Finna as my partner to finish this project and developing an application
in smartcard contactless using jasper report method for UIN.
7. Mr.Fauzi and Mrs. Ayu to help me where I got problems and ask helping for
fix some java error.
8. The PUSOKM Team, and all of those guys that I cannot mentioned them one
by one here, by the way thanks for everything.
9. My parent, my brothers, my sisters who always give support and never let me
down.
10. Everyone who always help me, give me support and contribute to this
research.
Jakarta, June 2011
Hossein Hosseini Farid
i
STATEMENT
I HEREBY DECLARE THAT THIS THESIS IS REALLY WORKS OF MINE
THAT HAVENOT YET MADE AS THESIS SCIENTIFIC WORKS IN ANY
UNIVERSITY OR INSTITUTION.
Jakarta, 1 June 2011
Hossein Hosseini Farid
107091103916
ii
ABSTRACT
Hossein Hosseini Farid, Study at Developing Certificate Vending Machine by
using Student Card (Smart Card) (Case Study UIN Syarif Hidayatullah),
Supervisor by Husni Teja Sukmana, Ph.D and Feri Fahrianto, M.Sc.
In this system students can get the UIN Surat by just clicking some buttons,
Nevertheless that this data will save in database and UIN Staff will know who,
when, and what kind of surat prints out. This system will help both students and
UIN Staff for increasing their access to the UIN Surat. student’s time and the lack
of good coordination between faculties and academic with long time of process
make the students tired the reason to start study at developing certificate vending
machine (CVM) was how to save the students times and make them focus on their
studies, in other side helping UIN for developing new technology which for first
time has been developed in Indonesian universities, in addition to that, help UIN
by getting payment of each Surat that prints out.
In this research the writer has focusing about the actual and real students data by
integrate the system with Academic System Information (AIS) and make the legal
Surat by using barcode and Background art paper which has been explained
details in chapter iv, are the important parts of the system.
Integrate netbeans with iReport and calling the data from pgadmin and save them
back, having unity Surat for each student, read the data form student card (Smart
Card) store the data inside chip and saving the process and more, are all activities
that the writer has been done.
In this research the writer is using Extreme Programming (XP) for developing the
CVM because of its fast move steps and team working which are the behavior of
XP methodology.
Keywords: Developing, Integration, Certificate Vending Machine, Extreme
Programming (XP), Smart Card, Barcode, Unified Modeling Language (UML),
PostgresSQL, iReport, Radio Frequency Identification (RFID), Legalization.
Number of Pages: 149 Pages
Total References: 22 sources
Total Pictures: 21 pictures
Total table: 57 Tables
v
List of Content
Statement.............................................................................................................................. i
Abstract............................................................................................................................. .. ii
Preface................................................................................................................................. iii
List of Content...................................................................................................................... v
List of Picture........................................................................................................................ x
List of Table.......................................................................................................................... xii
Glossary............................................................................................................................... xv
CHAPTER I INTRODUCTION
1.1 Background of the Developing System........................................................................... 1
1.2 Problems Identification................................................................................................... 3
1.3 Scope of the Developing System.................................................................................... 4
1.4 The Research Purpose and Advantages.......................................................................... 5
1.4.1 for the writer..................................................................................................... 5
1.4.2 for the UIN JAKARTA.................................................................................... 7
1.5 The Research Methodology............................................................................................ 7
1.5.1 The Method of Gathering Data..................................................................... 8
1.6 Structure of Report.......................................................................................................... 9
vi
CHAPTER II LITERATURE STUDY
2.1 Basic Concept of System................................................................................................. 11
2.1.1 System Characteristic....................................................................................... 11
2.2 Basic Concept of Information........................................................................................ 12
2.3 Basic Concept of Application....................................................................................... .. 15
2.4 Basic Concept of System Analysis................................................................................. 16
2.5 Basic Concept of System Design.................................................................................. . 16
2.6 Basic Concept of Information Technology.................................................................... 17
2.7 Basic Concept of Software Engineering........................................................................ 17
2.8 System Engineering ............................................................................................ …... 18
2.9 System Modeling ............................................................................................... …... 18
2.10 JAVA............................................................................................................................ 19
2.10.1. What is Java? ............................................................................................... 19
2.11 Jasper Report Concept.................................................................................................. 20
2.12 Legalization of Paper (Secure Document) ................................................................... 22
2.13 Contactless smart card.................................................................................................. 30
2.13.1. Benefits of Contactless Smart Cards............................................................ 30
2.14 Radio frequency identification (RFID) ........................................................................ 32
2.14.1. RFID Benefit................................................................................................ 34
2.14.2. Common Problems with RFID..................................................................... 37
2.15 About Certificate Vending Machine............................................................................. 37
2.15.1. Variety Kind of Vending Machine................................................................ 39
2.15.2. Snack and Automated Vending Machine...................................................... 43
vii
2.16 Digitized Signature....................................................................................................... 43
2.17. Touch Screen Concept................................................................................................. 44
2.17.1. The touch screen benefit............................................................................... 45
2.18 Barcode Concept........................................................................................................... 46
2.19 PostgreSQL................................................................................................................... 49
2.20 Unit Testing................................................................................................................... 50
2.21 White Box…….............................................................................................................. 51
2.22 Related Works............................................................................................................... 51
CHAPTER III RESEARCH METHOD
3.1 Research Method ................................................................................................ …… 54
3.1.1. Data Collection Techniques............................................................................ 54
3.1.2. Requirements Gathering Techniques.............................................................. 55
3.2 Systems Development Method....................................................................................... 56
3.2.1. Planning........................................................................................................... 59
3.2.2. Design.............................................................................................................. 59
3.2.2.1. Applications Design......................................................................... 60
3.2.2.2. Database Design............................................................................... 61
3.2.2.3. Interface Design............................................................................... 61
3.2.3. Coding............................................................................................................. 61
3.2.4. Testing............................................................................................................. 62
3.2.4.1. Unit Testing...................................................................................... 62
3.2.4.2. White Box......................................................................................... 62
viii
3.3 Research Workflow........................................................................................................ 63
CHAPTER IV ANALYSIS AND DESIGN SYSTEM
4.1 UIN Profile...................................................................................................................... 65
4.1.1 VISION AND MISSION OF UIN................................................................. 67
4.1.2 Target Achievement PUSKOM....................................................................... 67
4.1.3 Computer Science Faculty Profile................................................................... 68
4.1.3.1 International Undergraduate Program............................................... 68
4.2 Current System Workflow.............................................................................................. 69
4.2.1. Problem Identification.................................................................................. 74
4.2.2. Description of Purpose System..................................................................... 75
4.2.3. Feasibility Study........................................................................................... 79
4.3 Requirement Gathering................................................................................................... 82
4.3.1 User Stories................................................................................................... 82
4.4 Proposed System Design................................................................................................ 118
4.4.1. Application Design......................................................................................... 119
4.4.2. Database Design.............................................................................................. 133
4.4.3 User Interface Design....................................................................................... 136
4.5. Coding............................................................................................................................ 139
4.5.1. Programming Languages and Components.................................................. 139
4.5.2. Coding Implementation................................................................................ 139
4.5.3. Components.................................................................................................. 140
4.6 Testing Certificate Vending Machine............................................................................. 141
4.6.1. White Box Test................................................................................................ 141
ix
4.6.2. Unit Testing (Independent test) ..................................................................... 143
4.7 Paper Legalization (Secure Document) ......................................................................... 143
4.7.1. Pantograph 4000............................................................................................. 143
4.7.2. Custom Borders & Background Art............................................................... 144
CHAPTER V CONCLUSION
5.1 System Advantage.......................................................................................................... 146
5.2 Last view................................................................................................................. ........ 146
5.3 Suggestion..................................................................................................................... .. 148
5.4 Recommended................................................................................................................ 148
References..................................................................................................................... ....... 149
xii
List of Table
Table 2.1 Related Works Table………………………....................................................... 51
Table 4.1 index card CVM Development (General Students)............................................ 84
Table 4.2 index card CVM Development (Information System)........................................ 85
Table 4.3 index card CVM Development (kesejahteraan social)........................................ 86
Table 4.4 index card CVM Development (English Language Field).................................. 87
Table 4.5 index card CVM Development (Aqidah Filsafat)……........................................ 88
Table 4.6 index card CVM Development (Aqidah Filsafat)……........................................ 89
Table 4.7 index card CVM Development (Staff of UIN)………........................................ 90
Table 4.8 index card CVM Development (Official staff of UIN)....................................... 91
Table 4.9 index card CVM Development (Religious Difference)…................................... 92
Table 4.10 index card CVM Development (International Communication)........................ 93
Table 4.11 index card CVM Development (Journalistic)..................................................... 94
Table 4.12 index card CVM Development (Staff of PUSKOM.) ....................................... 94
Table 4.13 index card CVM Development (Economy and Business).................................. 95
Table 4.14 index card CVM Development (Muamelat)....................................................... 96
Table 4.15 index card CVM Development (Information System)....................................... 97
Table 4.16 index card CVM Development (Computer Science).......................................... 97
Table 4.17 index card CVM Development (Tafsir Hadith)................................................. 98
Table 4.18 index card CVM Development (Mazhab Fiqih Differences)............................. 99
Table 4.19 index card CVM Development (Dirasah Islamiah)............................................ 100
Table 4.20 index card CVM Development (Dr. Jaenal Aripini, MAg)............................... 101
xiii
Table 4.21 index card CVM Development (Dr. R. Yani'ah Wardani, M.Ag)..................... 102
Table 4.22 index card CVM Development (Prof. Dr. Moh. Matsna HS)............................ 103
Table 4.23 index card CVM Development (Dr. Parlindungan Siregar, M.Ag)................... 104
Table 4.24 index card CVM Development (Dr. Ir. Syopiansyah Jaya Putra, M.Sis)........... 105
Table 4.25 index card CVM Development (Herni Ali HT, SE, MM)................................. 106
Table 4.26 index card CVM Development (Mrs. Fitroh).................................................... 107
Table 4.27 index card CVM Development (Dr. Agus Salim, M.Si).................................... 108
Table 4.28 index card CVM Development (Drs. Wahidin Saputra, M.Ag)........................ 109
Table 4.29 index card CVM Development (Mrs Mega Ratna Sari).................................... 110
Table 4.30 index card CVM Development (Drs. H. Mahmud Jalal, MA).......................... 111
Table 4.31 index card CVM Development (Mr.Guruh)...................................................... 112
Table 4.32 index card CVM Development (Prof. Dr. Ahmad Thib Raya)......................... 113
Table 4.33 index card CVM Development (Dr. Wahid Hasyim, M0A)............................. 113
Table 4.34 index card CVM Development (Prof. Dr. Abdul Shomad.)............................. 114
Table 4.35 index card CVM Development (Prof. Dr. Abdul Hamid, MS)......................... 115
Table 4.36 index card CVM Development (Drs Marzuki Mahmud MPd)......................... 116
Table 4.37 index card CVM Development (Mr. Joko Adianto)......................................... 117
Table 4.38 CRC card class introduction............................................................................. 119
Table 4.39 CRC card class (Students Login)...................................................................... 119
Table 4.40 CRC card class bahasa (language).................................................................... 119
Table 4.41 CRC card class (Menu Selection)..................................................................... 120
Table 4.42 CRC card class JumHalamanKeterangan......................................................... 120
Table 4.43 CRC card class JumHalIPK............................................................................. 120
xiv
Table 4.44 CRC card class JumHalIPS.............................................................................. 121
Table 4.45 CRC card class Transcripts............................................................................... 121
Table 4.46 CRC card class Alumni Login.......................................................................... 121
Table 4.47 CRC card class language.................................................................................. 122
Table 4.48 CRC card class alumni (Menu Selection)........................................................ 122
Table 4.49 CRC card class alumni JumHalamanKeterangan (alumni).............................. 122
Table 4.50 CRC card class alumni JumHaltranscripts (alumni)........................................ 123
Table 4.51 CRC card class alumni JumHalLulus (alumni)................................................ 123
Table 4.52 requirement and use case Printing Surat.......................................................... 124
Table 4.53 Use case scenario printing Surat Keterangan................................................... 126
Table 4.54 Use case scenario printing Surat IPK and IPS................................................. 127
Table 4.55 Use case scenario printing Transcripts............................................................. 127
Table 4.56 Use case scenario printing Surat lulus.............................................................. 128
Table 4.57 CVM black box test.......................................................................................... 141
1
CHAPTER I
INTRODUCTION
1.1 Background of the Developing System
Developing a software engineering system nowadays is very important for
companies, factories, marketing, malls and all of the shopping center and business
job, you can imagine the fast of accounting, the comfortable absent for lecturers,
students and employees, the easier counting for markets etc.
"To waste time is one's greatest loss."(Imam Ali as 650 M)
“Men talk of killing time, while time quietly kills them.” (~Dion Boucicault
1998)
The absence of good managements for printing College Certificate and
other documentation in Islamic University of UIN JAKARTA make the writer to
start to developing title, why the writer start to do this title, is for improving the
ability and increasing the talent of student for using new technology and
encouragement them for developing new technology for making life easier.
The writer himself is one of Islamic University of UIN JAKARTA
students, thus the writer has faced with these problems directly, and at the time he
decided to develop a system that can help first himself and second the others
students and encourage all students for helping their own university to get better
and success.
2
The main problem in manual system was Students needs to go to the
academic faculty or academic center for printing the letter, Students taking a long
time around one till one week for getting a letter, the lack of integration between
the existing academic system, cause printing transcript value and GPA, take a
long time than usual, the absence of digital signatures, cause if the Program study,
faculty, or academic, are not in place then the processing of student letter will not
postponed.
Smart card itself is any pocket-sized card with embedded integrated
circuits that can process and store data, and communicate with a terminal via radio
waves. Smart Cards are capable of not just storing data but also have processing
power, in this system the writer use smart card for making the process easier and
faster, storage data and process it directly is one of benefit of smart card which
can done by smart card, Certificate Vending Machines (CVM) can be interpreted
as a tool or machine for printing letters automatically, the students may go to the
tool and by using a student card that belongs to them or their friends to print a
letter that they needs Certificate Vending Machine will print letters in a real-time
time, by using this tool students can save their times.
Base on previous explanation and manual system problems, the writer start
to develop Certificate Vending Machine (CVM) using Smart Card, integrating
both certificate vending machine and smart card makes the process of printing
letters easier and faster.
3
1.2 Problems Identification
According to the background in which the writer has already explained
above, the areas of problem in which will explain in this thesis report are:
a. How can the writer develop a system that is easier to access by all of
students, because as we know Islamic University of UIN JAKARTA is
an International University which means include two languages which
are Bahasa Indonesia and English.
b. Numbers of activities associated with making such as GPA letter,
College certificate, transcripts value, graduation certificates, etc.
c. The flow for making a letters and certificates are quite long and
consuming a lot time
d. Could delay the process of making the letters if the party concerned is
not in place.
e. How to develop the title, in PUSKOM UIN JAKARTA.
f. Developing Certificate Vending Machine, using GUI, JAVA, Postgres,
Smart Card Reader etc.
g. Setting the deposit for each of students thus they can print directly with
the amount of deposit that they save in their ID card.
h. BufferedReader method for input and output the file with the specified
directory.
4
i. Adding the use of Student Identity Card (KTM) by means of
integration between existing student card (smart card) With Certificate
Vending Machine
j. Analysis and recommendations for printing the letters and legalized in
terms of validating the authenticity (originality letter)
1.3 Scope of the Developing System
In this thesis, the writer gives the limitation in developing the system.
The area includes:
1. The content of the system is the data from user (Alumni and student)
at PUSKOM UIN JAKARTA in AIS database.
2. This system covers setting amount deposit which takes it from AIS
database in addition to that taking the human resources from AIS
database.
3. The testing process has been done by smart card reader ISO
specifications 14443.
4. CVM system was limited to the design and analysis, and
implementation of programs.
5. It’s specially developed for students and alumni of UIN Syarif
Hidayatullah JAKARTA.
6. This system just should be implements using Certificate Vending
Machine (CVM).
5
1.4 The Research Purpose and Advantages
1.4.1 for the writer
1. Learning Smart Card as a new technology. Understand the
concept of Smart Card.
2. Learning about Certificate Vending Machine (CVM) as new
technology and understand the way that it integrate and
interact with the costumers.
3. Study about Jasper Report and its concept, beside print the
report with/without the preview.
4. More understand about JAVA concept and create the system
with it.
5. The writer can implement his knowledge that he got from
UIN Syarif Hidayatullah JAKARTA, especially in
programming language, and software engineering field.
6. Understanding about how the Extreme Programming
methodology steps and how it works and how the writer
should manage the research.
7. Understanding about both netbeans and eclipse as IDE
(Integrated development environment) for developing the
system and their integrated with Postgres database server.
8. Understanding about CVM and how it works with using
touchpad screen only and without using mouse pointer.
6
9. Learning about object and parameter which involved in the
system.
10. How to set some amount of deposit and how to save the array
in txt and call it again using “buffer reader” method.
11. How to manage the barcode and give an authenticity to the
official stuff of UIN.
12. Increasing knowledge and ability in PUSKOM under the
teaching of smart lecturers.
13. Know how to interact with team and work together for
developing a system and make it work.
14. Setting the connection of jasper report with postgres.
15. Learning the way of interacting with JFrame and calling the
label method, in addition to how change the String to the
Integer.
16. Using toString() method, because the parameter in class
JumlahHalamanketerangan.java extends JFrame should to be
string thus the writer use toString() method, that can change
the object to the string.
17. How running the RFID (Radio Frequency Identification) in
addition to read and write the smart card using the chip.
7
1.4.2 for the University of UIN Syarif Hidayatullah JAKARTA
1. Making the Certificate Vending machine title in increasing the
performances of the University.
2. Display the students and alumni data for easy access to CVM
and printing their needs as College Certificate .
3. Allows the students and alumni to see their grades transcript
and print the requires letter using their money.
4. Give a high technology to UIN, can encourage them to be
better.
5. Saving the time for the both students and employee of UIN.
6. Saving the money of UIN, because this project has been done
using its own students for free as research.
1.5 The Research Methodology
The writer should collect the data for research projects. The data may be
collected for either theoretical or practical research.
Some important factors in research methodology that the writer focus on it
include validity of research data, Ethics and the reliability of measures most of our
works are finished by the time we finish the analysis of our data. Before making
this thesis report, the writer must use some research to gather needed
informations. The methodology research that I use:
8
1.5.1 The Methodology of Gathering Data
A. Observation
The collection of data with direct observation is a way to
collect data by using the eye without the help of other standard
tools for this purpose. [1]
B. Interview Method
Interview is a technique of collecting data by asking a
direct question by the interviewer to the respondent, and
respondent's answers are noted or recorded. [1]
C. Literature Study
Literature study is studying the books of reference and the
results of previous similar research ever undertaken by others. The
goal is to get the basic theories concerning the matter to be
investigated. Theory is the foundation for researchers to
understand the issues investigated properly and in accordance
with the framework of scientific thinking. [1]
9
1.6 Structure of Report
In this theis report the writer use five chapters with some explanation in
each chapter. The schemes are:
CHAPTER I INTRODUCTION
In chapter one, the writer talks about the scope of the
system, what are the problems, background of developing
system, identified them try to bring well sorted solution, the
purpose to start developing system.
CHAPTER II LITERATURE REVIEW
In chapter two, the writer talks about definition of the
systems and how to have a well known understanding about
system developing method, it will help the readers for
better understanding with the new words and system for
software engineering. In addition the writer brings brief
description about the each chapter that has been used in the
title.
CHAPTER III RESEARCH METHODOLOGY
In chapter three which is research methodology or system
developing methodology, the writer mentioned some
important points, for example how the development process
done and what was Extreme Programming model and
features that been used in the thesis.
10
CHAPTER IV SYSTEM IMPLEMENTATION
In chapter four which is system implementation, the writer
mentioned some important points, for example how the
development process. The simulation of the system and
Strategy of developing system also includes in this section
thus the most important part of the thesis is the developing
system implementation by giving all details in place.
CHAPTER V CONCLUSION
In chapter five, there are some conclusions which lead and
give us brief description of the system and what were the
advantages and disadvantages of the title.
11
CHAPTER II
LITERATURE STUDY
2.1 Basic Concept of System
System is a collection of components that implement modeling
requirements, functions, and interfaces. [2]
The word sometimes describes the
organization or plans itself and is similar in meaning to method.
A system is a group of interrelated components that function together to
achieve a desired result. For instance, you may own a home theater system made
up of a DVD player, receiver, speakers, and display monitor [3]
2.1.1 System Characteristic
A system has some characteristic and certain properties. It has
components, system boundary, outside the system environment, link,
input, output, processing and targets or goals. [4]
1. System Component
Systems consist of interrelated components (a relationship exists
between parts and the whole).
2. System Boundary
System boundaries are artificial: systems are components of
another larger system. Systems can be opened (influenced by their
environment) or closed (not influenced by their environment).
3. Outside the system environment
Outside the system environment is whatever outside from the system
boundaries which has some affect to the system operation.
12
4. System input, output, link and process
Systems must have inputs, processes, outputs, and feedback loops.
5. System’s target or goal
A system has a goals or objectives, if the system doesn't has goal,
then the system will be useless. The Input to the system and the output
from the system is very determined by the goal or objective. A system is
said to be successful when it has achieved the goals or objectives.
2.2 Basic Concept of Information
What Is Information? Well, in human terms and in the broadest sense,
information is anything that you are capable of perceiving. This can include
written communications, spoken communications, photographs, art, and music,
nearly anything that is perceivable. This really includes an enormous assortment
of stimuli, but, realistically, everything you come in contact with is capable of
providing and does provide you with some sort of information. So you are
essentially a minute organism floated in a sea of information. For this course, and
for the academic climate in which you are now situated, you'll focus on
information as materials that have been stored in one manner or another that can
educate you to a better understanding of your world. Information, then, is
anything that can be documented in any form that can then be referred to later as
means to understanding and to building new information. This course, for
example, provides you with information that will help you to find, sort through,
13
and interpret other information. In short, you have quite an undertaking ahead of
you, since there is so much information to be had. [5]
How Is Information Organized? If you consider information in the sense
of anything that stimulates the senses, then you won't necessarily find any
organization. Your experience of the world may have some organization to it in
that you plan trips and relationships and other daily activities, but you still have
little control over what information you will receive even with the best planning
and even in the most controlled environments. Even people living under
restrictive political systems receive information that they are not supposed to
receive. That's just the way things work. Information is one thing that no one has
ever figured out how to kill. If you examine information in terms of this course
and academia, then you can limit your focus and find patterns of organization for
most of the information that you will need to find and use. Traditionally, in
libraries, information was contained in books, periodicals, newspapers, and other
types of recorded media. It was accessible through a library's catalog and with the
assistance of indexes, in the case of periodical and newspaper articles. Much of
this is still true, but the means by which you discover organization have changed.
You are no longer consulted a card catalog for information about a library's
collection of information. You have not to consult a printed "Reader's Guide" for
information on where to find articles about a certain subject. Most of these
previously time-consuming tasks have been sped up by computerized
"information systems." You still can find information stored in libraries, and it is
very well organized. You still can find information stored in periodicals,
14
newspapers, and other media, and these sources of information have their own
systems of organization. The problem for most researchers is not that the
information doesn't exist in a library or in a journal or in a magazine or in a
motion picture, but that they have yet to discover the organizing principles that are
designed to help them find the information they need. For library materials, the
organizing principle is a detailed subject classification system available for
searching in an online "catalog." For journal articles, the organizing mechanism is
typically an online indexing and/or abstracting system that allows researchers to
access information by subject or by some other scheme. For newspaper articles,
the organizing mechanism is typically an online indexing and/or abstracting
system that allows researchers access in a variety of means. The one thing
common to all of these access systems is organization. People, experts in their
fields, have taken the time and trouble to organize access to all the stored
information that they can get their hands on in order to make it searchable and
accessible to other people. In short, accessing good information is not just as
simple as pointing your browser to Google or Yahoo. Computers can help you to
organize information and can even automate indexing and cataloging, but in most
library and research database systems accesses to information are ultimately
created by other people. In short, finding information deliberately rather than
serendipitously relies on many people describing myriad bits of information in a
systematic manner that can be addressed consistently in an organized system.
Fortunately for researchers, this organizing drive has been characteristic of people
throughout history. History, itself, is something people have created and kept,
15
hopefully as a means for teaching future people what to do and what not to do. So,
when you click your mouse on a resource on the Internet and think that it is so
wonderful, keep in mind that it is even more wonderful than you can imagine, but
that there are also even better ways to find reliable information than just following
any link that anyone happens to stick on the Internet.
Yes, you can find myriad sources of information online for free, but many
of the materials that you can really count on are not freely available, so you need
to rely on organization and cataloging and indexing to take advantage of those
"heavy duty" sources. And you can rely on libraries to continue to provide you
with materials that you may never be able to access freely on the Internet.
Information and organizing information is what libraries are about.
2.3 Basic Concept of Application
Application sometimes called a program that is a series of instructions that
the hardware executes one after another [6]
. In information technology, an
application is the use of a technology, system, or product.
The term application is a shorter form of application program. An
application program is a program designed to perform a specific function directly
for the user or, in some cases, for another application program. Examples of
applications include word processors, database programs, Web browsers,
development tools, drawing, paint, image editing programs, and communication
16
programs. Applications use the services of the computer's operating system and
other supporting applications.
2.4 Basic Concept of System Analysis
Analysis is the process of breaking a complex topic into smaller parts from
among various alternatives to achieve a better understanding of it. In system
development process, there is system analysis that provides the project team with
a more thorough understanding of the problems and needs that triggered the
project. The system analysis requires working with system users to clearly define
business requirements and expectations for any new system that is to be purchased
or developed [3]
2.5 Basic Concept of System Design
Information system design is defined as those tasks that focus on the
specification of a detailed computer-based solution. It is also called physical
design. Thus, whereas systems analysis emphasized the business problem, system
design focuses on the technical or implementation concerns of the system.
System design is driven by the technical concerns of system designers.
Hence, it address the IS building blocks from the system designer’s perspective.
The system analyst serve as facilitators of system designs [3]
17
2.6 Basic Concept of Information Technology
Information technology is a contemporary that describes the combination
of computer technology with telecommunications technology (data, image, and
voice networks) [3]
Information system an arrangement of people, data, process,
and information technology (IT) that interact to collect, process, store, and
provide as output the information needed to support an organization.
2.7 Basic Concept of Software Engineering
Software Engineering is an approach to developing software that attempts
to treat it as a formal process more like traditional engineering than the craft that
many programmers believe it is. We talk of crafting an application, refining and
polishing it, as if it were a wooden sculpture, not a series of logic instructions. The
problem here is that you cannot engineer art. Programming falls somewhere
between an art and a science [7]
The computer science discipline concerned with developing large
applications. Software engineering covers not only the technical aspects of
building software systems, but also management issues, such as directing
programming teams, scheduling, and budgeting.
18
2.8 System Engineering
Systems engineering is an interdisciplinary approach and means to enable
the realization of successful systems. It focuses on defining customer needs and
required functionality early in the development cycle, documenting requirements,
and then proceeding with design synthesis and system validation while
considering the complete problem.
Systems engineering integrates all the disciplines and specialty groups into
a team effort forming a structured development process that proceeds from
concept to production to operation. Systems engineering considers both the
business and the technical needs of all customers with the goal of providing a
quality product that meets the user needs, Definition Based on International
Council on Systems Engineering [9]
.
2.9 System Modeling
System modeling shows how the system should be working. Use this
technique to examine how various components work together to produce a
particular outcome. These components make up a system, which is comprised of
resources processed in various ways (counseling, diagnosis, treatment) to generate
direct outputs (products or services), which in turn can produce both direct
effects.[10]
19
2.10 JAVA
2.10.1 What Is Java?
Java is a computer programming language. It enables
programmers to write computer instructions using English based
commands, instead of having to write in numeric codes. It’s known as a
“high-level” language because it can be read and written easily by humans.
Like English, Java has a set of rules that determine how the instructions
are written. These rules are known as its “syntax”. Once a program has
been written, the high-level instructions are translated into numeric codes
that computers can understand and execute. In the early nineties, Java was
created by a team led by James Gosling for Sun Microsystems. It was
originally designed for use on digital mobile devices, such as cell phones.
However, when Java 1.0 was released to the public in 1996, its main focus
had shifted to use on the Internet. It provided more interactivity with users
by giving developers a way to produce animated WebPages. Over the
years it has evolved as a successful language for use both on and off the
Internet. A decade later, it’s still an extremely popular language with over
6.5million developers worldwide.[11]
Why Choose Java?
Java was designed with a few key principles in mind:
Easy to Use: The fundamentals of Java came from a programming
language called C++. Although a powerful language, it was felt to be
20
too complex in its syntax, and inadequate for all of Java's
requirements. Java built on, and improved the ideas of C++, to provide
a programming language that was powerful and simple to use.
Reliability: Java needed to reduce the likelihood of fatal errors from
programmer mistakes. With this in mind, object-oriented programming
was introduced. Once data and its manipulation were packaged
together in one place, it increased Java’s robustness.
Secure: As Java was originally targeting mobile devices that would be
exchanging data over networks, it was built to include a high level of
security. Java is probably the most secure programming language to
date.
Platform Independent: Programs needed to work regardless of the
machine they were being executed on. Java was written to be a
portable language that doesn't care about the operating system or the
hardware of the computer.
2.11 Jasper Report Concept
Jasper Reports provides the necessary features to generate dynamic
reports, including data retrieval using JDBC (Java Database Connectivity), as well
as support for parameters, expressions, variables, and groups. Jasper Reports also
includes advanced features, such as custom data sources, script lets, and sub
reports. All in all, Jasper Reports combines good features, maturity, community
21
participation, and, best of all, it's free. This article kicks off Java World's new
Open Source Profile column dedicated to Java-based open source tools and
components. Look for upcoming articles spotlighting the Echo Web application
framework and ObJectRelationalBridge, an object/relational mapping tool. Feel
free to send me your suggestions for future articles.
Jasper Reports Server is a powerful, yet flexible and lightweight reporting server.
Generate, organize, secure, and deliver interactive reports and dashboards to
users. Allow non-technical users to build their own reports and dashboards.
Flexible server architecture
o Semantic layer for relational and non-relational data sources - BI
Editions only.
o On-premises, virtualized, or Cloud (SaaS & PaaS) deployment
options.
o Open standards, web service-driven architecture simplifies
application integration.
Centralized repository
o Connectivity to existing identity management systems to centralize
and secure reports and analysis views.
o Report access and usage auditing for compliance.
o Granular security access down to the cell and column level.
Ad hoc reports - BI Editions only
o Web-based, drag-and-drop report designer.
22
o Metadata layer masks complex data descriptions with simplified
business user-friendly names.
o Web-based reports provide rich, interactive reports with drill down,
filtering, animated charting, and more.
Dashboards - BI Editions only
o Web-based, drag-and-drop dashboard designer.
o Single report and dashboard-level parameters drive user
interaction.
o Free-form layout designer for customized dashboard design.[12]
2.12 Legalization of Paper (Secure Document)
CVM paper products are protected by a variety of overt (obvious) and
covert (unknown) security features. Depending upon the intended application,
Protected Paper's layered approach to printing includes a combination of the base
paper stock, custom artwork, patented Authentic Guard technologies, use of
security inks, as well as a variety of finishing techniques. The writer combines
these anti-copy and alter-resistant techniques to provide a product that is both
effective and affordable.
Protected Paper's team of research and development experts continually
evaluate and upgrade our technologies to ensure that they remain among the
strongest in the industry. Below is a listing of these security features,
accompanied with a brief description of each.[13]
23
Base Paper Stock
Our initial defense against counterfeiting and document alteration
starts at the paper mill. Most any of our paper products are printed on a
laser compatible base security paper that is UV dull, with invisible
fluorescent fibers (detectable under an ultraviolet light source) and
chemical sensitivity to solvents (stains or multi-language "VOID"
messages appear if the document is altered). If and when required, we can
also offer fully customized and Fourdrinier watermark papers.[13]
Pantograph 4000
(Original) (Attempted B&W Copy /Fax) (Attempted Color Copy / Scan)
Picture 2.1 Pantograph 4000 Legal paper
All of company paper products are protected by AuthentiGuard
Pantograph 4000. This patented technology involves the printing of
hidden text messages ("VOID", "COPY", "UNAUTHORIZED COPY",
24
etc.) into the background of a document. Text information or other
artwork is placed onto this paper. Then, when this "original" is copied of
scanned, the hidden word pattern becomes visible on the duplicate. The
end result a clearly distinguishable copy that cannot pass off as the
original.[13]
Block out
(Original) (Attempted Color Copy / Scan)
Picture 2.2 Block out Legal paper
25
This anti-copy technology is meant to provide protection against high-end
color copiers and scanning devices. Patented Block out designs are
embedded into original artwork, photographs and other important
information that requires protection against unauthorized duplication.
Block out technology can be placed on most any type of printable
substrate, making it ideal for a multitude of applications including ID
cards, product warranties, discount coupons, commercial photo proofing
and ticketing. .[13]
Prism
Picture 2.3 Prism Legal paper
AuthentiGuard Prism is a cost effective and convenient method of
determining the authenticity types of printed of various material. vital
records, dollar-off coupons, identification documents, tickets and most any
other application that might require immediate on-site authentication. Our
patented Prism technique embeds hidden words, images, or logos into the
original artwork, using a two or 4-color printing process. These images
26
only become visible using our Authenticator device a proprietary lens that
reveals the hidden Prism messages. Customizable and low cost,
AuthentiGuard's Prism technology cannot be reproduced or duplicated
with even the most sophisticated digital copiers or scanners. .[13]
Custom Borders and Background Art
Picture 2.4 Custom Borders and Background Art
Our design team has access to a full range of Guilloche (bank note
quality) border and background designs that not only adds a touch of
elegance to your document, but also provides an additional layer of
security against illegal copying, as this computer-generated fine-line
artwork is extremely difficult to capture and reproduce - plus all of these
designs are fully customizable. .[13]
27
Heat-Sensitive Security Ink
Picture 2.5 Heat-Sensitive Security Ink
Used in combination with an overt warning band, we make use of Thermo
chromic security ink. These heat-reactive formulations are made to either
disappear or change colors at a trigger temperature of 88F (32C).
Authentication is quick and easy. Simply rub the document in the
protected area and if this reaction does not occur, you know there's a
problem. .[13]
28
Erasable Ink
Picture 2.6 Erasable Ink
This specialty ink is used in the background designs on most every
document that we manufacture. When applied properly, this ink will
disappear when an eraser is used in an attempt to change the variable
information that is printed or handwritten onto the document. To prevent
illicit alternations on any document, this is likely your best protection
available. .[13]
29
Coin Activated Ink
Picture 2.7 Coin Activated Ink
True watermark (also known as Fourdrinier watermark) paper is
very expensive, especially if requiring full customization. Our artificial
watermark serves the same purpose of authentication, but is significantly
less expensive. Also is easily customizable. Usually placed on the
backside of the document, this step-and-repeat image is invisible to the
eye, until scratched with a coin, at which time the artwork turns black. .[13]
30
2.13 Contactless smart card
A contactless smart card is any pocket-sized card with embedded
integrated circuits that can process and store data, and communicate with a
terminal via radio waves. There are two broad categories of contactless smart
cards. Memory cards contain non-volatile memory storage components, and
perhaps some specific security logic. Contactless smart cards do not contain an
ordinary read-only RFID, but they do contain a re-writable smart card microchip
that can be transcribed via radio waves. The first contactless smart card was the
Octopus card introduced in Hong Kong in 1997 for the territory's mass transit
system.[14]
2.13.1 Benefits of Contactless Smart Cards
Contactless smart cards can be used for identification,
authentication, and data storage. Contactless smart cards provide a means
of effecting business transactions in a flexible, secure, standard way with
minimal human intervention.
Contactless smart card readers use radio waves to
communicate with, and both read and write data on a smart card. When
used for electronic payment, they are commonly located near PIN pads,
cash registers and other places of payment. When the readers are used for
public transit they are commonly located on fare boxes, ticket machines,
31
turnstiles, and station platforms as a standalone unit. When used for
security, readers are usually located to the side of an entry door. [14]
Supported Applications
o The CardMan® 5321 allows users to experience Convenience,
speed, and security of contactless.
o Technology for applications including log-on to Windows®,
networks, websites, or the secure Storage of user names,
passwords, and personal Information.
o The use of contactless smart card.
o Technology for PC-linked applications is limited only to your
imagination.[15]
Contactless Smart Cards Supported
o The CardMan® 5321 is based on a 13.56 MHz
o Contactless smart card interface that is compliant ISO
specifications 14443 A and B and 15693.
o The reader works with a variety of 13.56 MHz Contactless smart
cards including, but not limited to:
o Philips: MIFARE®, DESFire®, MIFARE ProX®, SMART MX,
and i.code[15]
32
2.14 Radio frequency identification (RFID)
Radio frequency identification (RFID) is a method of remotely storing and
retrieving data using devices called RFID tags. An RFID tag is a small object such
as an adhesive sticker, that can be attached to or incorporated into a product.
RFID tags contain antennae to enable them to receive and respond to radio
frequency queries from an RFID transceiver. [14]
History of RFID tags
Although some people think that the first known device may have been
invented by Leon Theremin as an espionage tool for the Russian Government in
1945, the first real usage of RFID devices predates that. During World War II the
United Kingdom used RFID devices to distinguish returning English airplanes
from inbound German ones. RADAR was only able to signal the presence of a
plane, not the kind of plane it was. [14]
The RFID System
An RFID system may consist of several components: tags, tag readers, tag
programming stations, circulation readers, sorting equipment, and tag inventory
wands. Security can be handled in two ways. Security gates can query the ILS to
determine its security status or the tag may contain a security bit which would be
turned on and off by circulation or self-check reader stations.
33
The purpose of an RFID system is to enable data to be transmitted by a
portable device, called a tag, which is read by an RFID reader and processed
according to the needs of a particular application. The data transmitted by the tag
may provide identification or location information, or specifics about the product
tagged, such as price, color, date of purchase, etc. The use of RFID in tracking
and access applications first appeared during the 1980s. RFID quickly gained
attention because of its ability to track moving objects. As the technology is
refined, more pervasive - and invasive - uses for RFID tags are in the works. [14]
In a typical RFID system, individual objects are equipped with a small,
inexpensive tag which contains a transponder with a digital memory chip that is
given a unique electronic product code. The interrogator, an antenna packaged
with a transceiver and decoder, emits a signal activating the RFID tag so it can
read and write data to it. When an RFID tag passes through the electromagnetic
zone, it detects the reader's activation signal. The reader decodes the data encoded
in the tag's integrated circuit (silicon chip) and the data is passed to the host
computer for processing. Security gates can then detect whether or not the item
has been properly checked out of the library. When users return items, the security
bit is re-set and the item record in the ILS is automatically updated. In some RFID
solutions a return receipt can be generated. At this point, materials can be roughly
sorted into bins by the return equipment. Inventory wands provide a finer detail of
sorting. This tool can be used to put books into shelf-ready order. [14]
34
Low -frequency RFID tags are commonly used for animal identification,
beer keg tracking, and automobile key-and-lock, anti-theft systems. Pets are often
embedded with small chips so that they may be returned to their owners if lost. In
the United States, two RFID frequencies are used: 125kHz (the original standard)
and 134.5kHz, the international standard.
High-frequency RFID tags are used in library book or bookstore tracking,
pallet tracking, building access control, airline baggage tracking, and apparel item
tracking. High-frequency tags are widely used in identification badges, replacing
earlier magnetic stripe cards. These badges need only be held within a certain
distance of the reader to authenticate the holder. [14]
2.14.1 RFID Benefit
Here is a quick checklist of several benefits that can be achieved with
RFID solutions:
1. Reduce warehouse and distribution labor costs
Replace the point and read labor-intensive operation of tracking
pallets, cases, cartons and individual products with sensors that can track
these items anywhere in the facility with pin-point accuracy. This can
reduce the high labor costs and service fees of regular stock management
and store shelf inventory.
35
2. Reduce point-of-sale labor costs
With RFID-enabled products, checkout can be completed with a
quick scan of all items in cart helping to reduce point-of-sale labor costs.
The current scan-it-yourself component of self-service checkout can be
improved, helping to improve adoption, reduce self-service checkout times
and reduce fraud.
3. Reduce inventory
Inventory accuracy is important to helping eliminate
excess/missing inventory, losses and write downs. With RFID, inventory
errors can be reduced so that the company can be assured that the
inventory indicated is the actual inventory available.
4. Improve forecasting and planning
Visibility improvements throughout the supply-chain can help to
improve the forecasting capabilities to help better track where inventory is
and what is happening to it throughout the supply chain.
5. Reduce theft
Losses due to theft are estimated to cost retailers over $30 billion
per year and are estimated conservatively at 1.5% of overall sales. With
RFID, products can be tracked through the supply chain to pinpoint where
a product is and eliminate inventory errors that can cause shipments to go
missing, or to better find where and when in the process the product was
36
lost. Within the retail store, RFID can and has been successfully deployed,
particularly on higher margin items, to help prevent theft.
6. Reduce out-of stock conditions
When an item is out of stock the customer is often left
disappointed, either avoiding the purchase altogether common in grocery
stores where as much as 4% of their revenue is lost each year due to out-
of-stock conditions or worse, the customer moves on to a competitor in
order to source the product. Eliminating out-of-stock conditions via better
RFID product tracking and inventory visibility and forecasting, such as
alerting the store staff immediately when the last item leaves the shelf, can
have an immediate top-line revenue impact and have residual effects by
improving customer service and satisfaction.
7. Improve customer experience
With RFID, items in a cart can be tracked and if a high-tech cart or
kiosks are part of the shopping experience, offers can be made
automatically related to the items such as dynamic up-sell/cross-sell of
useful or necessary accessories. [14][15]
37
2.14.2 Common Problems with RFID
Some common problems with RFID are reader collision and tag
collision. Reader collision occurs when the signals from two or more readers
overlap. The tag is unable to respond to simultaneous queries. Systems must be
carefully set up to avoid this problem. Tag collision occurs when many tags are
present in a small area; but since the read time is very fast, it is easier for vendors
to develop systems that ensure that tags respond one at a time. See Problems with
RFID for more details.[14]
2.15 About Certificate Vending Machine
Vending machines are coin-operated machines that can dispense snacks,
drinks, sandwiches, coffee, tea and other products. Vending machines are an
extremely convenient outlet for the industry known as automatic retailing. You
might find vending machines in public buildings, transportation hubs and
subways, at gas stations, courthouses, hospitals, and the local automotive repair
shop. Any place that people gather, pass by, or must wait, is a good location for
vending machines.
Vendors that install vending machines take care of keeping them supplied
and operating properly. In return for revenue collected, the vendor pays a monthly
fee to the owner of the property at the installation site. This arrangement benefits
everyone vendor, property owner, and consumer alike.
38
Though vending machines provide service to the public, not everyone is
pleased in all cases with their offerings. Many school districts came under fire in
the United States for providing vending machines on school grounds that offered
high-sugar, low nutrient snacks and drinks. The vending machines’ contents were
cited as a possible aggravating factor to potential teenage medical concerns
regarding obesity and diabetes. As a result, several schools districts switched to
vending machines that offered healthier alternatives.
Most modern vending machines are tested and designed to inhibit theft,
with security measures resulting in designs similar in strength to safes. As a result,
the machines can be very heavy. One issue with vending machines, particularly
mechanical vending machines, involves the use of coins of foreign currency, or, in
more extreme cases, worthless tokens or washers, which have the same size and
shape as the coin accepted by the machine. This is done to pay less for
merchandise, and sometimes in order to get change that has more value than the
originally inserted object. Vending has gone through significant changes. Many
machines are still evolving to become able take credit cards and companies are
beginning to obtain the capability of monitoring a machine's state from afar.
39
2.15.1 Variety Kind of Vending Machine
Coin Vending Machines:
Invention of the first vending machine is credited to Hero of
Alexandria circa 215BC. His vending machine accepted a coin and
dispensed holy water in return.
A coffee vending machine is a coin operated, automatic dispenser
of paper cups filled with one or more different types of coffees.
The machines are usually quite large and rectangular in shape like
most vending machines. [16]
Food Vending Machines:
Depending on where someone is placing the machine, it may be
possible to sell a number of more unusual items to turn the vending
machine into a destination rather than just a convenience. Vending
machines are not limited to foods and beverages and can also be
used to sell toys, home supplies, and other small items.
A coffee vending machine may be placed in a row with other types
of food and beverage machines. Some vending machines dispense
water and soda, while others offer snacks such as potato chips and
candy bars. [16]
40
Beverage Vending Machines:
Depending on where someone is placing the machine, it may be
possible to sell a number of more unusual items to turn the vending
machine into a destination rather than just a convenience. Vending
machines are not limited to foods and beverages and can also be
used to sell toys, home supplies, and other small items.
A coffee vending machine may be placed in a row with other types
of food and beverage machines. Some vending machines dispense
water and soda, while others offer snacks such as potato chips and
candy bars. [16]
Drinks Vending Machines:
Many school districts came under fire in the United States for
providing vending machines on school grounds that offered high-
sugar, low nutrient snacks and drinks. The vending machines’
contents were cited as a possible aggravating factor to potential
teenage medical concerns regarding obesity and diabetes.
Food vendors and customers alike can benefit from the use of
automated machines; whenever a person gets a snack from a
vending machine, uses the whipped coffee machine at the local
convenience store, or fills his own drink at a soda fountain in a fast
food restaurant, he is using an automated machine. [16]
41
Coffee Vending Machines:
In 1960, a bean grinder became a part of many coffee vending
machines, while 1991 saw the addition of different coffees being
available by machine. These coffees include espresso, cappuccino
and flavored varieties. A coffee vending machine may be placed in
a row with other types of food and beverage machines.
Vending machines are coin-operated machines that can dispense
snacks, drinks, sandwiches, coffee, tea and other products.
Vending machines are an extremely convenient outlet for the
industry known as automatic retailing. [16]
Snack Vending Machines:
No kidding, you are twice as likely to die being crushed by a
falling vending machine than being eaten by a shark. The odds of
being a shark snack are about 1 in 252 million, but the odds of
being crushed while purchasing a frosty soda are about 1 in 112
million.
Each of these approaches has different rules and costs, so being
familiar with these options is very important. Starting a vending
machine business also involves figuring out where a person will
put the machines. [16]
42
Candy Vending Machines:
Here you can find a wide variety of items for sale through vending
machines, from underwear to compact discs and jewelry. Some
major manufacturers of vending machines include Automatic
Products, Crane National, Dixie-Narco Inc., Glasco Polyvend
Lektrovend (GPL), Royal Vendors, and U Select It.
In 1888, the United States began dispensing gum and small toys in
vending machines before later using them mainly for candy, potato
chips, soda and coffee. [16]
Cigarette Vending Machines:
A cigarette machine is a vending machine that takes cash in
payment for packets of cigarettes. Vending machines often
dispense packs containing 16 or 18 cigarettes, although the
dimensions of the packaging are the same as the equivalent pack
containing 20. [16]
43
2.15.2 The Difference between Snack Machine and Automated
Vending Machine
A snack machine dispenses items like candy, gum, peanuts,
cookies, sandwiches and other supplements to lunch or dinner. A vending
machine will mix coffee, tea, soup, hot chocolate and other liquid
supplements. Other vending machines sell cigarettes, sundry items
(tissues, combs, nail clippers, etc.) and flowers. Still others will make
change while the ultimate (the ATM) allows you the borrow money from
your bank 24 hours per day which our certificate vending machine talk
about it and it’s similar to the ATM. [16]
2.16 Digitized Signature
A digitized signature (not to be confused with a digital certificate) is an
electronic signature that can be used to authenticate the identity of the sender of a
message or the signer of a document, and possibly to ensure that the original
content of the message or document that has been sent is unchanged. Digital
signatures are easily transportable, cannot be imitated by someone else, and can
be automatically time-stamped. The ability to ensure that the original signed
message arrived means that the sender cannot easily repudiate it later.
A digitized signature can be used with any kind of message, whether it is
encrypted or not, simply so that the receiver can be sure of the sender's identity
and that the message arrived intact.[17]
44
2.17. Touch Screen Concept
A touch screen is a computer display screen that is also an input device.
The screens are sensitive to pressure; a user interacts with the computer by
touching pictures or words on the screen.
There are three types of touch screen technology:
Resistive: A resistive touch screen panel is coated with a thin metallic
electrically conductive and resistive layer that causes a change in the
electrical current which is registered as a touch event and sent to the
controller for processing. Resistive touch screen panels are generally more
affordable but offer only 75% clarity and the layer can be damaged
by sharp objects. Resistive touch screen panels are not affected by outside
elements such as dust or water.
Surface wave: Surface wave technology uses ultrasonic waves that pass
over the touch screen panel. When the panel is touched, a portion of the
wave is absorbed. This change in the ultrasonic waves registers the
position of the touch event and sends this information to the controller for
processing. Surface wave touch screen panels are the most advanced of the
three types, but they can be damaged by outside elements.[18]
Capacitive: A capacitive touch screen panel is coated with a material that
stores electrical charges. When the panel is touched, a small amount of
charge is drawn to the point of contact. Circuits located at each corner of
the panel measure the charge and send the information to the controller for
45
processing. Capacitive touch screen panels must be touched with a finger
unlike resistive and surface wave panels that can use fingers and stylus.
Capacitive touch screens are not affected by outside elements and have
high clarity.
Touch screen monitors are no longer confined to bar video games
as novelty items. Today, they can be found in many stores as part of cash
registers, in car dashboards and on many portable computers. With the
growing popularity of touch screen enabled Palm Pilots and other PDAs,
many people even have one in his or her pocket at all times.
2.17.1 The touch screen benefit
The benefits of such technology are obvious. Rather than
lugging along extra input devices such as a mouse or a keyboard, the user
need only his finger to manipulate the chosen device. But it's not just
mobile devices that benefit from this type of input. All kinds of devices
can be equipped, including TV and computer monitors, LCD screens, and
the older CRT computer monitors. As a result, a bartender can press on
a screen to ring up drinks on a busy night rather than type in a price,
a nurse can input patient information with one hand. Truly, the
possibilities with touch screen monitors are endless.[18]
46
2.18 Barcode Concept
What is a Barcode?
A bar code (often seen as a single word, barcode) is the small image of
lines (bars) and spaces that is affixed to retail store items, identification cards, and
postal mail to identify a particular product number, person, or location. The code
uses a sequence of vertical bars and spaces to represent numbers and other
symbols. A bar code symbol typically consists of five parts: a quiet zone, a start
character, data characters (including an optional check character), a stop
character, and another quiet zone.[19]
A barcode reader is used to read the code. The reader uses a laser beam
that is sensitive to the reflections from the line and space thickness and variation.
The reader translates the reflected light into digital data that is transferred to a
computer for immediate action or storage. Bar codes and readers are most often
seen in supermarkets and retail stores, but a large number of different uses have
been found for them. They are also used to take inventory in retail stores; to check
out books from a library; to track manufacturing and shipping movement; to sign
in on a job; to identify hospital patients; and to tabulate the results of direct mail
marketing returns. Very small bar codes have been used to tag honey bees used in
research. Readers may be attached to a computer (as they often are in retail store
settings) or separate and portable, in which case they store the data they read until
it can be fed into a computer.
47
When you purchase an item from any store, you will notice a label with
thin, black lines across it, along with a variation of different numbers. This label is
then scanned by the cashier, and the item's description and price automatically
come up. The word for this is called a barcode, and it is used to read data and
information based upon the widths of those small black lines. The barcode has
many uses, although most of us think of them as simply a way to price items in
the grocery or department store. Barcodes are becoming more and more common
in just about every facet of consumer life. For example, car rental companies now
identify their rental vehicles by using a barcode. Your luggage gets assigned a
barcode when you check it into the airport in order to assure more accuracy when
it comes to keeping track of it. Even driver's licenses today have barcodes on them
in most states. Medicine prescriptions, library books, and tracking different
shipments are also other ways that a barcode can be used. [19]
So what exactly is a barcode? The technical definition for a barcode is a
machine readable form of information on a scan able, visual surface. They are
also often known as UPC codes. The barcode is read by using a special scanner
that reads the information directly off of it. The information is then transmitted
into a database where it can be logged and tracked. Merchandisers and other
companies must pay an annual fee to an organization called The UCC, or Uniform
Code Council, who then generates special barcodes specific to that particular
company. Each number on a barcode has a special meaning, and often these
numbers are added, multiplied, and divided in some formula that gives them each
48
their own special individuality. Barcodes are very useful for maintaining accurate
information about inventory, pricing, and other important business-related data.
Different companies' barcodes use a different amount of number and bar
combinations. Some of the larger manufacturers will have a longer number, but
this goes much deeper than how many numbers are listed. Every single number on
a barcode has a meaning. For example, if the barcode number starts with a 0, then
it is what's known as a standard UPC number. If the number begins with a 1, then
it is what's called a "random-weight item", meaning the price of the item will
depend on its weight. This is typically applied to such things as meats, fruits, or
vegetables. If an item starts with the number 3, it is a pharmaceutical. There are
several other variations of these numbers, and each one represents something
different. If a coupon is used that has a barcode, information goes through a
system that links that coupon and its value to the item previously scanned, and
then the amount is automatically deducted. A complex computerized system reads
every single barcode that is scanned, but these barcodes are system-specific
depending on what company they belong to. There are ways the average
consumer can "decode" a barcode if they know what to look for and are familiar
with the variations of numbers. Barcodes make our lives much more efficient, and
shopping much faster. [19]
49
2.19 PostgreSQL
According to Neil Mathew and Richard Stones(2005:11), PostgreSQL
actually is a DBMS that incorporates the relational model for its databases and
supports the SQL standard query language. PostgreSQL also happens to be very
capable and very reliable, and it has good performance characteristics. It runs on
just about any UNIX platform, including UNIX-like systems, such as FreeBSD,
Linux, and Mac OS X. It can also run on Microsoft Windows NT/2000/2003
servers, or even on Windows XP for development. PostgreSQL can be compared
favorably to other DBMSs. It contains just about all the features that you would
find in other commercial or open-source databases, and a few extras that you
might not find elsewhere.
PostgreSQL features (as listed in the PostgreSQL FAQ) include the following:
• Transactions
• Subselects
• Views
• Foreign key referential integrity
• Sophisticated locking
• User-defined types
• Inheritance
• Rules
• Multiple-version concurrency control.[20][21]
50
2.20 Unit Testing
Unit testing is a software development process in which the smallest
testable parts of an application, called units, are individually and independently
scrutinized for proper operation. Unit testing is often automated but it can also be
done manually. This testing mode is a component of Extreme Programming (XP),
a pragmatic method of software development that takes a meticulous approach to
building a product by means of continual testing and revision.
Unit testing involves only those characteristics that are vital to the
performance of the unit under test. This encourages developers to modify the
source code without immediate concerns about how such changes might affect the
functioning of other units or the program as a whole. Once all of the units in a
program have been found to be working in the most efficient and error-free
manner possible, larger components of the program can be evaluated by means of
integration testing. Unit testing can be time-consuming and tedious. It demands
patience and thoroughness on the part of the development team. Rigorous
documentation must be maintained. Unit testing must be done with an awareness
that it may not be possible to test a unit for every input scenario that will occur
when the program is run in a real-world environment.[22]
51
2.21 White Box
In software development, White-box testing (a.k.a. clear box testing, glass
box testing, transparent box testing, or structural testing) is a method of testing
software that tests internal structures or workings of an application, as opposed to
its functionality. In white-box testing an internal perspective of the system, as well
as programming skills, are required and used to design test cases
Picture 2.8 White Box
2.22 Related Works
A numbers of previuos studis has been conducted on developing certificate
vending machine, by using this references and related works the research will be
more strong and acceptable. below the writer has mentioned them,
2.1 Related Work Table
Title Author summary Methodology
Automation
Coffee
machines,
(vending
machines),
microwaves.[29]
Robin Bloor
2005
System technology in the
coffee vending business,
is a provider of a unique
entrepreneurial
opportunity and a master
distributor of Necta,
Progema and Avalon.
The writer use XP
methodology because User
involve in application
development and System
processing time is short
52
Digital
Vending
Machine
a web vending
machine
which delivers
digital
products[30]
John G.
Derrickson
2003
This protected work
describes a vending
machine which delivers
digital products (and
physical products too),
uses the XP specification,
is open-source, and
handles the entire
process, from product
details, billing and
shipping information to
payment validation and
product delivery.
Vending Machine (VM)
required extreme
programming (XP) to
emphasize pragmatism over
computer science. Every
possible shortcut was
employed and features not
immediately needed were
postponed. XP equals KISS.
Incidentally, the extreme
programmer and the
extreme manager were in
complete agreement
throughout the project.
Development
of Vending
Machine
Heating and
Cooling of
Beverage[31]
Arne
Jakobsen
and Torgeir
Skiple 2006
A system for heating and
cooling of beverage in a
three compartment
Japanese type vending
machine has been
designed, installed and
tested in a calorimetric
test chamber.
Experimental tests have
been performed in three
different operational
Pull-down (Cooling of
beverage), pull up
(heating of beverage) and
power consumption test
In this system the teams
emphasize simply-written,
object-oriented code that
meets requirements.
XP teams put small code
releases into production
early
Programmers work side by
side in pairs, continually
seeing and discussing
each other’s code.
Development
of vending
machine with
prepaid
payment
method[32]
Amar
Safuan Bin
Alyusi 2008
The objectives in this
project are developing a
vending
machine and then insert a
new payment method
proposed into it. The
system builds
using plunger as a new
design that insert into
each funnel in vending
machine. The
plunger control by circuit
that been built using
parallel port and attached
to the computer.
This system use Extreme
Programming because All
programmers have
collective ownership of the
code and the ability to
change it
It useful for this system as
long as the integration exist
between systems
The XP Cycle is faster than
Spiral Cycle thus the
developer can more
consider about coding and
times.
53
Development
of Vending
Machine with
Ice Shaving
and Flavor
Topping
Functions.[33]
Hamamoto
Ken'ichi and
Wada
Masayuki
2003
A cup-type vending
machine, equipped with a
mechanism for supplying
frozen beverages into
which ice shavings have
been mixed and a
mechanism for sprinkling
toppings such as
powdered cinnamon, has
been developed for the
first time. New beverages
will invigorate the
vending machine market
and the ability to create
new beverages from
existing ingredients will
lead to greater sales and
higher profits
Programmers must follow a
common coding standard so
all the code in the system
looks as if it was written by
a single individual. XP will
allows the developer to
follow the flowchart easier
than spiral, its move fast
and can change the
requirement
System for
Environmental
Impact
Evaluation of
Vending
Machines and
Approach to
Development
Kimura
Yukio, 2004
As the results, we have
found several factors to
work on them. With the
aid of these evaluation
systems, we hope to
create vending machines
that are even more
ecologically friendly to
the environmentally
conscious designs and,
ecological and economy
development of vending
machine.
In this system vending
machine was developed by
extreme programming, the
fast result was conducted
inside this project, extreme
programming by focusing
on coding make better flow
process.
Quality
Keeping
Mechanism for
Drinks in
Vending
Machines.
Tamura
Yoshitada,
2002
The vending machine
result are "sold-bottle
heating system" that heats
a sold bottle from a cold
or normal state, "keeping
system in two stages" that
limits the number of
bottles kept heated, and
"the number-of-bottles
control system" that in
advance controls the
number of bottles to be
heated according to
selling conditions.
Quality mechanism for
drinks vending machine
uses the extreme
programming.
Using pair programming
technology and work side
by side in pairs, continually
seeing and discussing the
codes.
54
CHAPTER III
RESEARCH METHODOLOGY
3.1 Research Methodology
In essence, the research is a way of so many ways which is pursued to get
the truth. To get the truth it is done through scientific methods. So, it’s not
excessive if the method is called as strategies in scientific research [23]
3.1.1 Data Collection Techniques
Data collection techniques taken are as follows:
Good requirements start with good sources. Finding those quality
sources is an important task and, fortunately, one that takes few resources.
Examples of sources of requirements include: [24]
Customers
Users
Administrators and maintenance staff
Partners
Domain Experts
Industry Analysts
Information about competitors
55
3.1.2 Requirements Gathering Techniques
After you have identified these sources, there are a number of
techniques that may be used to gather requirements. The following will
describe the various techniques, followed by a brief discussion of when to
use each technique.
To get the requirements down on paper, you can to do one or more
of the following:
Conduct a brainstorming session
Interview users
Send questionnaires
Work in the target environment
Study analogous systems
Examine suggestions and problem reports
Talk to support teams
Study improvements made by users
The best idea is to get the requirements down quickly and then to
encourage the users to correct and improve them. Put in those corrections,
and repeat the cycle. Does it now, keep it small, and correct it at once.
Start off with the best structure you can devise, but expect to keep on
correcting it throughout the process. Success tips: Do it now, keep it
small, and correct it immediately. [24]
56
3.2 Systems Development Method
The first Extreme Programming project was started March 6, 1996.
Extreme Programming is one of several popular Agile Processes. It has already
been proven to be very successful at many companies of all different sizes and
industries worldwide.
Extreme Programming is successful because it stresses customer
satisfaction. Instead of delivering everything you could possibly want on some
date far in the future this process delivers the software you need as you need it.
Extreme Programming empowers your developers to confidently respond to
changing customer requirements, even late in the life cycle.
Extreme Programming emphasizes teamwork. Managers, customers, and
developers are all equal partners in a collaborative team. Extreme Programming
implements a simple, yet effective environment enabling teams to become highly
productive. The team self-organizes around the problem to solve it as efficiently
as possible.
Extreme Programming improves a software project in five essential ways;
communication, simplicity, feedback, respect, and courage. Extreme Programmers
constantly communicate with their customers and fellow programmers. They keep
their design simple and clean. They get feedback by testing their software starting
on day one. They deliver the system to the customers as early as possible and
implement changes as suggested. Every small success deepens their respect for
the unique contributions of each and every team member. With this foundation
57
Extreme Programmers are able to courageously respond to changing requirements
and technology.[15][16]
Picture 3.1 Steps of Extreme Programming
The most surprising aspect of Extreme Programming is its simple
rules. Extreme Programming is a lot like a jig saw puzzle. There are many
small pieces. Individually the pieces make no sense, but when combined
together a complete picture can be seen. The rules may seem awkward and
perhaps even naive at first, but are based on sound values and principles.
Our rules set expectations between team members but are not the
end goal themselves. You will come to realize these rules define an
environment that promotes team collaboration and empowerment that is
your goal. Once achieved productive teamwork will continue even as rules
are changed to fit your company's specific needs.
This flow chart shows how Extreme Programming's rules work
together. Customers enjoy being partners in the software process,
developers actively contribute regardless of experience level, and
managers concentrate on communication and relationships. Unproductive
58
activities have been trimmed to reduce costs and frustration of everyone
involved.[25]
The Core of Extreme Programming following twelve steps as follow:
1. Customers define application features with user stories.
2. XP teams put small code releases into production early.
3. XP teams use a common system of names and descriptions.
4. Teams emphasize simply-written, object-oriented code that
meets requirements.
5. Designers write automated unit tests upfront and run them
throughout the project.
6. XP teams frequently revise and edit the overall code design, a
process called refactoring.
7. Programmers work side by side in pairs, continually seeing and
discussing each other’s code.
8. All programmers have collective ownership of the code and the
ability to change it.
9. XP teams integrate code and release it to a repository every few
hours and in no case hold on to it longer than a day.
10. Programmers work only 40 hours per week; there’s no
overtime.
11. A customer representative remains on-site throughout the
development project.
59
12. Programmers must follow a common coding standard so all the
code in the system looks as if it was written by a single individual.
3.2.1. Planning
This step is the stage of planning the system to be developed. At this
stage the writer focus on:
a. The collection of user requests (user stories), so that the output of
the system will accordance with the wishes of the users.
b. Observation of the current system at UIN Syarif Hidayatullah
Jakarta.
c. Identify the problem that occurs in the current system.
d. Determining the flow work of business and applications as well as
the data issues that will be supported by the system to be developed
and determine the limits scope of the system. [27]
3.2.2. Design
After learning the definition of the application to be developed then
the next stage is to design (design). The design here is meant to make the
modeling of new applications that can represent the currently running
system at UIN Syarif Hidayatullah Jakarta. Design may include
application design. The writer has do designing Graphical User Interface
(GUI) of this application. [27]
60
3.2.2.1. Applications Design
To design an application, the writer uses the tool that is CRC
(Class - Responsibility - Collaborator); in this section the writer defines
the classes that will be used on the system. In addition, the application is
also designed using the Unified Modeling Language (UML). This is done
to facilitate to provide a preliminary sketch of applications, in addition to
the use of UML is more suitable for use in designing an application that is
object oriented. Designing applications that the writer did using UML
tools include: [27]
1. Determination Actor
2. Design Use Case Diagram
3. Design Use Case Scenario
4. Design Activity Diagram
5. Design Sequence Diagram
6. Design Class Diagram
In designing with UML, the writer uses the Visio 2007 software.
61
3.2.2.2. Database Design
As has been explained on the basis of the theory, the concept of
Object Relational Mapping, the data used in an application will be stored
into the database. Next the writer explains about the steps which will
include in database design, [27]
a. Table Structure
b. Display database structure (relational database)
3.2.2.3. Interface Design
At this stage, the writer conducted the design of the user
interface of this application. The design was conducted on the pages that
exist in the system. [27]
3.2.3. Coding
At the coding stage, prior to developing applications based on the previous
stages, unit tests for each user stories prepared. The writer conducted a
deployment of applications that have been developed to target a specific server.
After the test unit was prepared, then a new application development is
based on the previous design has been done. In the implementation of
applications, the authors do application development with reference to design
applications that have been done. In the coding system worked because the team
then applied the concept of pair programming is the concept where the
programmers sit together to help each other. Also at this stage, do refactoring to
62
improve the quality of the program structure. At this stage also build program as
often as possible so that errors in the program can be detected as soon as
possible.[27]
3.2.4. Testing
3.2.4.1. Unit Testing
At this step writer use unit test which is individually and
independently scrutinized test for Certificate Vending Machine
Application, in this research the writer did the unit testing manually.
Unit testing is a software development process in which the
smallest testable parts of an application, called units, are individually and
independently scrutinized for proper operation. Unit testing is often
automated but it can also be done manually. This testing mode is a
component of Extreme Programming (XP).[28]
3.2.4.2. White Box
For this white box the writer invite two students and two
alumni as the system actors for use the system the result shown in chapter
four.
In software development, a white box is a testing method in which
the tester has no knowledge of the inner workings of the program being
tested. The tester might know what input is and what the expected
63
outcome is, but not how the results are achieved. A white box component
is a compiled program that is protected from alteration by ensuring that a
programmer can only access it through an exposed interface.[28]
3.3 Research Workflow
In conducting this research, the writer dose the stages of activities by
following the action plan set out in the framework of this research.[27]
64
Picture 3.2 Research Workflow
65
CHAPTER IV
ANALYSIS AND DESIGN SYSTEM
4.1 UIN Profile
SYARIF HIDAYATULLAH WAS ONE OF the Nine Wali [Islamic
Saints] in Java. He was born on the Arabian Peninsula in 1448 and died in
Cirebon in 1568. He was the son of Nyai Rara Santang (the daughter of Prabu
Siliwangi from the Pajajaran Kingdom! and Syarif Abdullah (a high ranking
officer in the Egyptian army). He had many nicknames, including Muhammad
Nuruddin, Syaikh Nurullah, Sayyid Kamil, Maulana Syekh Makhdum
Rahmatullah and Makhdum Jati. After his death he was given the name Sunan
Gunung Jati. During his adulthood, Syarif Hidayatullah returned to Pajajaran
and became the ruler of Cirebon, a district in West Java. During that period, he
played an important role in the propagation of Islam (da'wa) in Java,
especially in the western part of the island. Syarif Hidayatullah also performed
a significant role in the establishment of Islamic power in Sunda Kelapa,
which was called Jayakarta and later changed to Batavia by the Dutch. Syarif
Hidayatullah conducted da'wa directly to the local leaders and noblemen. He
propagated Islamic teachings in a kind and wise way, as he talked to the
people heart to heart and showed tolerance towards their beliefs and traditions.
When these methods did not achieve the intended results, he began to apply
stronger methods, including debates, particularly when he met people who
were hostile to Islam. Using this method of da'wa, he succeeded in gaining
66
sympathy from the society, He also often helped people who were poor and
suffering.
Syarif Hidayatullah tried not to contradict the beliefs and traditions of the
local people. Rather, he showed the beauty and modesty of Islam, and also
proved that Islam brings advantages and equality to all the people. In order to
set a good example of tolerance and equality, he married the sister of the
Mayor of the Banten regency, Princess Kaunganten (14751. a Chinese
princess, Ong Tien (1481), an Arab princess, Sharifah Bagdad, and Nyi
Tepasari from Majapahit.
During his lifetime he saw his son, Maulana Hasanuddin, became a religious
propagator and the ruler of Banten. In 1527, with the support of Falatehan
(Fatahillah). he succeeded in occupying Sunda Kelapa and expelled the
Portuguese soldiers, led by Fransisco de Sa, from the island.
UIN Strategy
1. To foster the development of faculties, departments and study programs.
2. To be accredited nationally and internationally.
3. To adopt curricula based on competency and learning based on research.
4. To maximize the availability of facilities.
5. To enhance the quality of the human resources.
6. To encourage entrepreneurship.
7. To spread a sense of belonging and togetherness.
67
4.1.1 VISION AND MISSION OF UIN SYARIF HIDAYATULLAH
VISION
Build self-reliance in the ICT field in order to support the vision UIN as a
world class research University
MISSION
- Create a system ICT innovative and creative for supporting the UIN as
word class University in 2020
- Establish a centralized data centers as a waiter in a work unit UIN
- Facilitating the culture of learning and researching the new field of ICT
utilization innovation.
- Utilization of internal resources in the field of ICT as part of shared
knowledge and continuities of ICT in UIN
- Utilization of ICT in support of bureaucratic reform
4.1.2 Target Achievement 2010-2014 PUSKOM
• Development SIMPERTI UIN: Academic, Financial, Library, Logistics,
Personnel, e-learning, websites, etc.
• Provide internet access in accordance with the needs of the stakeholders
at UIN
• Creating an ICT products (software and hardware) made in UIN (Muin)
• One stop data center for all existing applications and data
68
• Establishment of Help desk 24 / 7 for the solution to the problem of ICT
at UIN
• Increase ranking webometrik UIN
• Sign in the field of ICT in the award INAICA UIN and the like
4.1.3 Computer Science Faculty Profile
THE FACULTY OF SCIENCE AND TECHNOLOGY is a faculty with
an Islamic orientation, with the goal of developing natural science and technology
characterized by Islamic values. Graduates of this Faculty are expected to be able
to combine natural science, and information technology with Islamic Science,
which in turn will enable them to respond to the challenges of the twenty-first
century. They will have a competitive edge in the globalization era as a result of
their understanding of information technology.
Before The faculty a of since and Technology was founded since year
2000/2001 IAIN has established The Conversion Programs Study of Agribusiness,
Informatics engineering In the beginning of academic year 2002/2003, the
conversion programs of UIN era changed and became the faculty of Science and
Technology.
4.1.3.1 International Undergraduate Program
THIS cooperation between Faculty of Science and Technology
with department of Information and Communication Technology
International Islamic University of Malaysia (IIUM) . The cooperation
69
between two universities grounds on the same vision of developing
Muslim intellectual with International level competence. This program
offer both single and double degrees option, where lectures are conducted
in two different Universities, three years at The State Islamic University
and one year at the KICT International Islamic University of Malaysia.
This program conduct in English.
4.2 Current System Workflow
Beside understanding about the user story and ideas of UIN
students and official staff, time to see how the process of printing letters
works in UIN, as mentioned earlier the writer is one of student of UIN
Syarif Hidayatulla, observe directly and understand about how the process
work, in the other side, from the index card that mentioned in earlier part
we saw that around eighty percent of students disagree with the manual
system and they as end user require the new system that can handle their
printing process faster, and almost all of the official staff of UIN that their
name has mentioned in index card, were agree that developing certificate
vending machine application in smart card, will help UIN to increase its
knowledge and encourage students to develop new technology by
themselves, beside saving the time, which is the most important idea of
developing the certificate vending machine.
70
Next we will see how the process of the current system is, and the
suggestion for the new system base on the fact documents that has been
gathered by the writer from both students and employee of UIN
University.
1. The current system for printing active lecturer letter (College
Certificate) in program study in faculties of UIN Syarif Hidayatulla
Jakarta. In this process the student will ask the office secretary for
active lecturer letter, after writing the details of his biography in his
field, the secretary will bring the letters to program study for approval
note by the head of faculty after that this letter goes to the Tata Usaha
for getting the number and save in the manual book beside getting the
second approval, after achieving the both approval note, the letter will
brought to the dean of faculty for signature, ( if he is not in place will
signed by his secretary). The flow chart diagram of the work flow
shown in below,
71
Picture 4.1 The current system for printing College Certificate.
2. The current system for printing surat Transkip Nilai
For this purpose the students should print their grades from Academic
Information System or Simperti (depends on their year of study) then
bring their grades to the Office, then it will approved by the head
program study office, and making a note that this sheet is correct and
this grades belong to the named student, this letters will brought to the
Academic Center (akademik Pusat) then after waiting around one weak
the letter his Transkip Nilai Will comeout. The flowchart of Transkip
Nilai shown below,
72
Picture 4.2 The current system for printing Transkip Nilai.
3. The current system for printing surat IPK and IPS
For printing this kind of Surat (letters) the students should goes to the
Office Program Study first and asked for the mentioned Surat, after the
Surat print out, it should be approved by both head of office program
study and academic department of the each faculty. The flowchart has
shown below,
73
Picture 4.3 The current system for printing Surat IPK & IPS.
74
4.2.1 Problem Identification
Base on the flowcharts that have shown and the requirement
gathering data that the writer has done, can separate the current system to twp
part for identify the problems, which are
a. The long period of doing process for making each letters in UIN waste
the students time and did not let them to focus on their study, the process
of UIN should be easier an in time.
b. Lack of coordination between faculties and department make the process
time more than usual.
c. As students answer in gathering data requirement, almost eighty percent
of them have been tired for waiting the process, and asking for new
technology for better and easier access.
d. Manual letters approval and giving Surat numbers disturbed the staff and
employee of UIN.
e. The current system gave a lot of mistakes data; it may appear in typing
false or giving Surat Numbers in wrong way.
75
4.2.2 Description of Purpose System
Giving best reason why the writer start his research for developing
a Certificate Vending Machine application in Smart Card can refer to the
user story of gathering data and problem Identification, almost eighty
percent of UIN official Employee and students were agree with developing
Certificate Vending Machine in UIN, but their idea for developing and
method of the process was different.
In following the writer show the flowchart of purpose system which can
help to printing Surat easier and faster.
1. The Purpose System for Printing College Certificate
Developing CVM helps UIN and students a lot for easier printing
of UIN letters (Surat) and can handle many kind of them; specially internal
letters. College Certificate itself has some information about student that
show which semester is; is he/she active lecturer (aktif Kuliah) or not?
Which year of study is, and what is his/her major, in addition to where
he/she comes from. In this case the students for printing the mentioned
letter goes to the CVM and by clicking just a few buttons they can get their
letters, but in behind side the process is complete by saving data into
database’ which give information about who print the letter, and how
many pages he print. The data of each student takes from AIS Database.
The Purpose System is as shown in below,
76
Picture 4.4 The purpose system for printing College Certificate.
77
2. The Purpose System for Transkip Nilai
Transkip Nilai (Grades Transcripts) gives the student the correct value
of his/her taken study that he/she has taken, as we saw in current
system flowchart; the system was complex, students got tired for just
achieving a Transkip Nilai Letter, next we will see the flow chart of
purpose system for the Grades Transcripts.
78
Picture 4.5 The purpose system for printing Transkip Nilai.
79
4.2.3 Feasibility Study
Feasibility studies are preliminary investigations into the potential
benefits associated with undertaking a specific activity or project. The main
purpose of the feasibility study is to consider all factors associated with the
project, and determine if the investment of time and other resources will yield
a desirable result. While considered a preliminary study, it is not unusual for a
feasibility study to be highly detailed.
When a business is considering a new operation or the launch of a
new product, the feasibility study is a logical tool to employ before any
resources are invested in the new project. One of the most important aspects of
the study is to make sure that the total investment needed to successfully bring
the project to completion is considered. Often, this will include addressing
components such as cash reserves, labor, construction, production facilities,
outsourcing, and the cost of raw materials. Only when the feasibility study has
addressed the total cost of completing the project can the study progress to the
next level. Gathering data in Certificate Vending Machine Requires
Observation, interview, etc, which had includes in this system.
a. Economic feasibility
If we review the purpose system with the current system, can
analyze the deficiency and lack of the current system, form front side there
is not any money come out for this process, but in behind when students
should waste their time for a weak or days, it’s the major deficiency of the
system, which has been cover in purpose system; by minimizing the period
80
for printing. From economic side, this project can save UIN process in
financial.
b. Technical feasibility
From Technical view, the new system gives students and UIN
more flexibility to cover their process for printing a letters (Surat), in this
system; the writer change the manual writing system to the java systematic
using smart card, thus students just by clicking a few buttons can get their
requested letters. For official staff also they do not need to write down
number of Surat that comes out, just by checking the saved database; they
will know who and when has print the letters.
c. Legal feasibility
For developing this system; the writer has gather data that carried
by PUSKOM UIN JAKARTA which decide to developing certificate
vending machine application in smart card, that’s why the legalization of
the system has been agreed by the UIN University.
d. Performance feasibility
The System Performance by giving easy interface for students as
end user and more flexibility for using this system; make the good
performance for the purpose system. In this system; data will save back
into AIS thus employee can knows who and when has print the letters. In
addition to speed up the process of UIN Jakarta.
81
e. Data Storage feasibility
In terms of data storage, these systems perform data storage which
contains information about academic activities related to assessment,
attendance, graduation. Prevent the occurrence of a redundant data storage.
The system integrates the center and faculty, making it easier to get the
most current data. The format of the presentation of the report is made so
much easier to understand. Minimize the occurrence of error inputing data
and information.
f. Control System
On the side of the control system, the application is to increase the
security of the implementation process of data storage. Restrict access to
the use of the system by applying the privilege. The existence of data entry
operators is responsible to conduct data entry and aministrator
responsible for all running activities on the application. Prevent full access
of users who are not authorized.
g. Efficiency System
In terms of system efficiency, this application uses an integrated
data storage system to facilitate the process of cross-checking between the
academic center, faculty and jurusan.Mengefisienkan time for the
execution of the validation process input data. Minimize cost and
resources needed for implementation of the reporting process.
82
h. System Services
In terms of system services, these applications generate accurate
information for consideration and evaluation, giving ease of use of the
system operational.
i. Alternative
Development alternatives that can be done include the
development by utilizing a different framework.
4.3 Requirement Gathering
4.3.1 User Stories
In this step the writer will introduce you with the students of UIN
Syarif Hidayatullah Jakarta whose are the main user of the certificate
vending machine, interview with them, make a question sheet and
checklist for the students to answer the following question whether they
need the certificate vending machine as their facility for printing letters
and documents for their bureaucratic. Instead of taking students thoughts
revenue the writer also focus to the dean of the faculties in UIN Syarif
Hidayatulla, from them the writer has interviewed with Kepala BIRO
Administration UMUM Prof Dr Abdul Shomad, Pembantu Rektor
BID. Academic Prof Dr Moh. Matsna HS Pembantu Rektor Bidang
Kemahasiswaan Prof Dr. Ahmad Thib Raya, Dekan: Dr. Wahid
83
Hasyim, M0A and Pembantu Dekan Bidang Admimistrasi Umum: Dr.
Parlindungan Siregar, M.Ag from Adab and Humaniora faculty,
Pembantu Dekan Bidang Admimistrasi Umum: Dr. Jaenal Aripini,
MAg from Syari'ah and Hukum faculty, Pembantu Dekan Bidang
Akademik: Drs. Wahidin Saputra, M.Ag and Pembantu Dekan
Bidang Admimistrasi Umum: Drs. H. Mahmud Jalal, MA from Ilmu
Dakwah and Ilmu Communication faculty, Dekan: Prof. Dr. Abdul
Hamid, MS and Pembantu Dekan Bidang Kemahasiswaan: Herni Ali
HT, SE, MM. from Economy and Business faculty, Dekan: Dr. Ir.
Syopiansyah Jaya Putra, M.Sis and Pembantu Dekan Bidang
Akademik: Dr. Agus Salim, M.Si, from Science and Technology.
Students as End users have more powerful ideas, because UIN
University Jakarta and every organization almost depend on its End users,
for UIN also students are the end users and their ideas are important.
From one hundred fifty students that the writer has interview with
them in here we just bring forty of their ides. In this process the writer will
match the students from their field in UIN University state Jakarta, and
from each field bring some ideas.
Official stuff of the UIN where some of them was agree with
developing of this system and others were not. The writer in this step will
explain about the thoughts revenue of each Authority in UIN Syarif
Hidayatullah Jakarta.
84
1. Printing letters of UIN (Surat-surat UIN)
Printing letters of UIN Students
Table 4.1 index card CVM Development (General Students)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN.(General)
Summary : ” Me as Student of UIN agree with establishing
CVM “
No. Description
1. Making a letter at UIN never require long time.
2.
I need the fast access and print for the College Certificate,
Surat legalisir ijaza and transkip Nilai
3.
If there is payment for printing letters, I would like to pay
for printing them
4.
I am disagree with printing manual, because it’s take long
time
85
Table 4.2 index card CVM Development (Information System)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (Information System).
Summary : ”CVM should establish and cover all the letters
of UIN for print “
No. Description
1. Making a letter at UIN require relatively a long time.
2. I need better access for achieving the letters.
3. If there is payment for printing letters, I would like to pay
for printing them
4. Better access to College Certificate, Kartu Hasil Studi,
transkip Nilai, surat riset, surat pkl, surat sk pembimbing,
surat kkn.
5. I am disagree with printing manual, because it’s take long
time
86
Table 4.3 index card CVM Development (kesejahteraan social)
Project : CVM Development in Smart Card
Date of interview: 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (kesejahteraan social).
Summary :”as students of UIN I am agree with establishing
the CVM as soon as possible “
No. Description
1. Making a letter at UIN never requires long time.
2. I need better access for achieving the letters.
3. If there is payment for printing letters, I would like to pay
for printing them
4. Can print College Certificate, Kartu Hasil Studi, transkip
Nilai, surat riset, surat pkl, surat sk pembimbing, surat
kkn.
5. I am disagree with printing manual, because it’s take long
time
87
Table 4.4 index card CVM Development (English Language Field)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (English Language Field).
Summary : ” as students of English study program I am
agree with establishing the CVM as soon as possible “
No. Description
1. Making a letter at UIN requires relatively a long time.
2. I need better access for achieving the letters.
3. If there is payment for printing letters, I would like to pay
for printing them
4. I am disagree with printing manual, because it’s take long
time
88
Table 4.5 index card CVM Development (Aqidah Filsafat)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (Aqidah Filsafat).
Summary : ”can give us opportunities for knowing all kind
of letter and access to them “
No. Description
1. Making a letter at UIN requires relatively a long time.
2. I need better access for achieving the letters.
3. If there is payment for printing letters, I would like to pay
for printing them
4. I am disagree with printing manual, because it’s take long
time
5. Can print College Certificate, Kartu Hasil Studi, transkip
Nilai.
89
Table 4.6 index card CVM Development (Aqidah Filsafat)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (Aqidah Filsafat).
Summary : ”Agree with developing the CVM in UIN “
No. Description
1. Making a letter at UIN requires relatively a long time.
2. I need better access for achieving the letters.
3. If there is payment for printing letters, I would like to pay
for printing them
4. I am disagree with printing manual, because it’s take long
time
5. Can print College Certificate, Kartu Hasil Studi, transkip
Nilai, Surat pengajuan beasiswa
90
Table 4.7 index card CVM Development (Staff of UIN)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Staff of UIN.
Summary : ”The CVM System helps to save the time for
both students and staff of UIN “
No. Description
1. Making a letter at UIN requires relatively a long time.
2. I need better access for achieving the letters.
3. If there is payment for printing letters, I would like to pay
for printing them
4. I am disagree with printing manual, because it’s take long
time
5. Can print College Certificate, Kartu Hasil Studi, transkip
Nilai.
91
Table 4.8 index card CVM Development (Official staff of UIN)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Official staff of UIN
Summary :”How about developing CVM that give the result
soon and free, students do not need to pay for anything. “
No. Description
1. Making a letter at UIN requires relatively a long time.
2. I need better access for achieving the letters.
3. Disagree with both printing manual and takes long time
for procedure and soon but need payment.
4. Can print College Certificate, Kartu Hasil Studi, transkip
Nilai, surat permohonan Cuti, surat permohonan kuliah,
Surat pengajuan beasiswa.
92
Table 4.9 index card CVM Development (Religious Difference)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN(Religious Difference)
Summary :” I need a machine that print the letter
immediately without any payment“
No. Description
1. Making a letter at UIN requires relatively a long time.
2. Disagree with any payment, because we as student has pay
a lot for registration in UIN.
3. I am disagree with printing manual, because it’s take long
time
4. The CVM can print College Certificate, Kartu Hasil Studi,
transkip Nilai, pengajuan biasiswa.
93
Table 4.10 index card CVM Development (International Communication)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN(International Communication).
Summary :”Agree with establishing the CVM. “
No. Description
1. The process of printing letter in UIN for me never was
delay.
2. I am disagree with printing manual, because it’s take long
time
3. Can print College Certificate, Kartu Hasil Studi, transkip
Nilai.
4. I ready to pay for printing fast.
94
Table 4.11 index card CVM Development (Journalistic)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN(Journalistic).
Summary : ”Disagree with both manual and CVM process,
it should be fast and free “
No. Description
1. The process of printing letter in UIN never was delay.
2. I am disagree with both printing manual and CVM,
because for manual its take a long time and for CVM its
cost a lot.
3. Can print College Certificate, Kartu Hasil Studi, transkip
Nilai.
Table 4.12 index card CVM Development (Staff of PUSKOM.)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
95
Interviewer : Hossein, Student of UIN
Interviewee : Staff of PUSKOM.
Summary : ” UIN Need this CVM“
No. Description
1. Making a letter at UIN requires relatively a long time.
2. If there is payment for printing letters, I would like to pay
for printing them
3. I am disagree with printing manual, because it’s take long
time
4. Can print College Certificate, Kartu Hasil Studi, transkip
Nilai.
Table 4.13 index card CVM Development (Economy and Business)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : student of UIN (Economy and Business).
Summary :” Its better if the printing will be free, otherwise
96
just keeps it manual but free”.
No. Description
1. Always a letter at UIN requires much times to finish.
2. Its better if the printing will be free, otherwise just keep it
manual
3. Can print College Certificate, Kartu Hasil Studi, transkip
Nilai.
Table 4.14 index card CVM Development (Muamelat)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (Muamelat).
Summary :”The CVM will useful for UIN and students.”
No. Description
1. The letters always in time and never late for print.
2. I agree with both printing manual and CVM.
97
Table 4.15 index card CVM Development (Information System)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (Information System).
Summary :”The CVM should cover all kind of letters for
print, otherwise it useless. “
No. Description
1. The letters always print in time.
2. I agree with both printing through CVM and disagree with
manual and postponements things.
3. CVM can print Surat Riset, Surat PKL, Surat SK
Pembimbing, Surat kkn, College Certificate aktif kuliah,
Transkip Nilai, Kartu Hasil Study.
Table 4.16 index card CVM Development (Computer Science)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
98
Interviewee : Student of UIN (Computer Science,
Information Technology).
Summary :”Printing process of CVM should be free. “
No. Description
1. Always getting late, Please build up a new system.
2. I disagree with both printing manual and CVM, because
the manual process postponed and the CVM one will cost
a lot.
3. CVM can print College Certificate aktif kuliah, Transkip
Nilai, Kartu Hasil Study, TOEFL, Cisco, Oracle, Sun
JAVA Certificates, surat terlambat pembayaran,
Table 4.17 index card CVM Development (Tafsir Hadith)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (Tafsir Hadith).
Summary :”The CVM should be free and Immediately. “
99
No. Description
1. Sometimes getting late, but just keep it like this than pay
for printing.
2. I agree with printing manual, but free.
3. We need a machine that give us immediately result with
free.
Table 4.18 index card CVM Development (Mazhab Fiqih Differences)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (Mazhab Fiqih Differences).
Summary :”UIN and Students needing a machine that give
them immediately result with free. “
No. Description
1. The letters always delayed and never print in time
2. I disagree with printing manual. neither by payment
3. We need a machine that give us immediately result with
free.
100
Table 4.19 index card CVM Development (Dirasah Islamiah)
Project : CVM Development in Smart Card
Date of interview : 25 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Student of UIN (Dirasah Islamiah).
Summary :” UIN and Students needing a machine that give
them immediately result with free. “
No. Description
1. Almost the letter print in time.
2. The machine can print College Certificate, pengajuan
biasiswa, surat legalisir ijaza, transkip nilai, kartu hasil
study
3. We need a machine that give us immediately result with
free.
101
2. Letters of UIN (Surat-surat UIN)
Printing letters of UIN Lecturers
Table 4.20 index card CVM Development (Dr. Jaenal Aripini, MAg)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Pembantu Dean Bidang Administration
Umum faculty of Syari'ah and Hukum: Dr. Jaenal Aripini, MAg
Summary :” Requires more Details in developing CVM“
No. Description
1. More details and letter required in developing this
Certificate Vending Machine
2. UIN Needs the CVM immediately
3. All kind of UIN letters should suitable for print
4. This Certificate Vending Machine help UIN to finishing
its process faster.
5. College Certificate Mahsiswa Aktif Kuliah can be print it
without any signature, but the rest should to sing by Dean.
102
Table 4.21 index card CVM Development (Dr. R. Yani'ah Wardani, M.Ag)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Pembantu Dean Bidang Kemahasiswaan
faculty of Adab and Humaniora: Dr. R. Yani'ah Wardani, M.Ag
Summary :” Increasing the security of Certificate
Vending Machine by putting CCTV for controlling the process“
No. Description
1. The security of Certificate Vending Machine should be
stronger, for example put CCTV and Officer for
controlling all process.
2. CVM should able to print Surat undangan, surat
penyelesain proposal, keterangan diri, surat tugas, surat
permohonan terlambat bayar (cuti)
3. Developing Certificate Vending Machine help UIN for
faster process in printing letters but not all of letters can be
print it in machine.
4. The special letters needs directly signature from dean of
faculty.
103
Table 4.22 index card CVM Development (Prof. Dr. Moh. Matsna HS)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Pembantu Rector BID. Academic: Prof. Dr.
Moh. Matsna HS
Summary :” It’s ok to print it without dean understanding
and knowing, but should to save in database “
No. Description
1. UIN needs Certificate Vending Machine and it will help
UIN for faster process in future.
2. Not all kind of Surat(letters) can be print it in CVM but for
those letters that allowed to print, no problem to print it
without dean understanding, but should to save in database
3. For getting better Idea I suggest to visit other university
that already use the certificate vending machine and
compare UIN CVM with their CVM.
4. The both College Certificate and surat cuti should be able
to print.
104
Table 4.23 index card CVM Development (Dr. Parlindungan Siregar, M.Ag)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Pembantu Dean Bidang Administration
Umum Faculty of Adab and Humaniora: Dr. Parlindungan
Siregar, M.Ag
Summary :” CVM data should be factual and accurate,
thus nobody can change and make illegal certificate “
No. Description
1. CVM should be formed to access by all students and staff.
2. CVM data should be factual and accurate, thus nobody can
change and make illegal certificate
3. High security for CVM required,
4. Letters that are internal can be access by student and for
those official letters that goes out of UIN should be
signature by the Dean of faculty directly.
5. UIN should have CVM but not all of surat (letters) can be
print in CVM.
105
6. It will help UIN for immediately process, but not all of the
surat (letters) can be signed directly.
Table 4.24 index card CVM Development (Dr. Ir. Syopiansyah Jaya Putra, M.Sis)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Dean of Science Technology: Dr. Ir.
Syopiansyah Jaya Putra, M.Sis
Summary :” System needs to be developed with a work
flow document "automatically approval”. By sending an e-mail or
through the internet, or mobile application. “
No. Description
1. The letters have no legal aspects that needed by other
party and organization, can be print it in CVM UIN
2. System needs to be developed with a work flow document
"automatically approval”. By sending an e-mail or through
the internet, or mobile application.
3. Student may also be able to regular document headed
106
through internet / mobile application
4. UIN should have CVM but not all of surat (letters) can be
print in CVM.
5. It will help UIN for immediately process, but not all of the
surat (letters) can be signed directly.
Table 4.25 index card CVM Development (Herni Ali HT, SE, MM)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Pembantu Dean Bidang Kemahasiswaan
Faculty of Economy and Business: Herni Ali HT, SE, MM.
Summary :” UIN CVM in necessary and those letters that
do not required signature can be print it directly “
No. Description
1. Those letters that do not required signature can be print it
directly.
2. Preferably associated with rules that apply
3. CVM will help UIN in better process and all of the letters
107
can be print it in UIN, absolutely UIN needs CVM.
4. Not all of the letters can be print it without signature.
Table 4.26 index card CVM Development (Mrs. Fitroh)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Academic Staff And Lecturer, Mrs. Fitroh
Summary :” The CVM will help UIN to growing its
knowledge and nowadays technology, but CVM cannot print all surat
(letters) , it should consider some note or approval thing.“
No. Description
1. In principle, it’s ok to build CVM, but the process of
signature person must to take care "crucial" to get on
top of those accountable who will be in print (forged
the signatures)
2. All of the letters can be print it, just by adding some
validation like giving note or approval thing.
3. The CVM will help UIN to growing its knowledge and
108
nowadays technology, but CVM cannot print all surat
(letters)
4. The sign from dean of academic is obligatory and
compulsory.
Table 4.27 index card CVM Development (Dr. Agus Salim, M.Si)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Pembantu Dean Bidang Academic faculty
of Science Technology: Dr. Agus Salim, M.Si.
Summary :” The CVM will help students for easier
access to print their surat(letters), and by giving good mechanism
all surat can be print it, but some surat(letters) need approval
signature “
No. Description
1. CVM technology is very good and important to help the
process of administration and mailing. We recommend to
integrate this CVM with the AIS (Pus kom posat)
2. Should have some coordinate with other faculty and
109
department like Tata Usaha FST, and UMUM Department
in UIN.
3. 2. For finishing needs some signature as institutional
mechanism, the mechanism can be consulted prior to the
respective faculty and department.
4. The CVM will help students for easier access to print their
surat(letters), and by giving good mechanism all surat can
be print it, but some surat(letters) need approval signature
5. CVM should print College Certificate sebagai lulus aktif,
permohonan PKL, permohonan penelitian,permohonan
pembimbing,perpanjang masa studi,cuti kuliah,penundaan
pembayaran SPP,pindah program studi,cetak nilai,dan
lain-lain (can be coordinated in Tata Usaha Department of
FST / UIN)
Table 4.28 index card CVM Development (Drs. Wahidin Saputra, M.Ag)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Pembantu Dean Bidang Academic Faculty
of Ilmu Dakwah and Ilmu Komunikasi: Drs. Wahidin Saputra,
M.Ag
110
Summary :” Absolutely that CVM will help UIN to
increase its ability to print letters, but not all letters can be print. “
No. Description
1. Need to set up equipment / facilities that support and
superior human resources
2. Ability to print Surat pengantar,College Certificate dan
surat-surat yang lain yang bersifat bukan rahasia Negara
seperti Ijazah, atau syenit
3. Absolutely that CVM will help UIN to increase its ability
to print letters, but not all letters can be print.
4. The signature or approval or note, or something that show
the letters official is needed.
Table 4.29 index card CVM Development (Mrs Mega Ratna Sari)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Kepala Sub Bagian Academic and
kemahasiswaan faculty of facukty of Adab and Humaniora,
Mrs Mega Ratna Sari
111
Summary :” The letters can be print without any
signature and the CVM process will help both UIN and Students,
but not all of the letters can be print. “
No. Description
1. The letters that can be print it and write by students can be
print in CVM, Apart from Students cannot print the letters
because it may give error (avoid mistakes).
2. CVM ability should cover printing Surat yang
berhubungan dengan administrasi mahasiswa , surat aktif
kuliah, surat wawancara, surat bimbing skripsi atas Acc
kajur / sekjur, surat minta beasiswa .
3. The letters can be print without any signature and the
CVM process will help both UIN and Students, but not all
of the letters can be print.
Table 4.30 index card CVM Development (Drs. H. Mahmud Jalal, MA)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Pembantu Dean Bidang Administration
Umum faculty of Ilmu Dakwah and Ilmu Communication: Drs. H.
Mahmud Jalal, MA
112
Summary :” There will be secret letters that cannot be
print by CVM, that’s why require official signature “
No. Description
1. All letters required academic community (students,
lecturers, managers, and other institutions)
2. Absolutely there will be secret letters that cannot be print
by CVM, that’s why require official signature.
3. Absolutely that CVM will help UIN to increase its ability
to print letters, but not all letters can be print.
Table 4.31 index card CVM Development (Mr.Guruh)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Kepala Tata Usaha faculty of faculty Ilmu
Dakwah dan Ilmu Communication, Mr.Guruh
Summary :” The worse of the system is students will use
it in wrong way, its compulsory need official signature of Dean “
No. Description
113
1. The worse of the system is students will use it in wrong
way, its compulsory need official signature of Dean.
2. CVM itself will help UIN, and process of letters printing
will be easier.
Table 4.32 index card CVM Development (Prof. Dr. Ahmad Thib Raya)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Pembantu Rector Bidang Kemahasiswaan,
Prof. Dr. Ahmad Thib Raya.
Summary :”UIN need CVM “
No. Description
1. CVM will help UIN to increase its ability and knowledge.
Letters should cover by signature.
Table 4.33 index card CVM Development (Dr. Wahid Hasyim, M0A)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
114
Interviewer : Hossein, Student of UIN
Interviewee : Dean of Adab and Humaniora faculty: Dr.
Wahid Hasyim, M0A
Summary :” Just special internal letters that required by
students and the content is about students “
No. Description
1. Just special internal letters that required by students and
the content is about students.
2. CVM will help the UIN to finishing the process in easier
and better access, beside save the time, but the letters
should be signed by the dean of faculty otherwise it will
use in mistake.
Table 4.34 index card CVM Development (Prof. Dr. Abdul Shomad.)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Kepala BRIO Administration UMUM,
Prof. Dr. Abdul Shomad.
Summary :” CVM should cover: Personnel meeting,
Socialization, Evaluation CVM, It should be supporteds
stakeholders “
115
No. Description
1. CVM should cover:
Personnel meeting
Socialization
Evaluation CVM
It should be supported stakeholders
2. CVM ability to print Surat-surat, bersifat umum, sruat
academic, keterangan, untuk bidang keterangan
dankeuangan perlu prestejuan atau cek data dahulu
3. All letters can be print, but need official signature.
Table 4.35 index card CVM Development (Prof. Dr. Abdul Hamid, MS)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Dean of Economy and Business faculty:
Prof. Dr. Abdul Hamid, MS
Summary :” CVM requires Question/Answer, for
validation”
No. Description
1. CVM requires Question/Answer, for validation.
116
2. Just print the letters that has students contents.
3. Agree with having CVM in UIN but disagree with print all
of the letters without official signature from Dean.
Table 4.36 index card CVM Development (Drs Marzuki Mahmud MPd)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : Kepala Bagian Akademik, Drs Marzuki
Mahmud MPd
Summary :” The CVM Idea is good, but the time is not
now “
No. Description
1. The CVM Idea is good, but there is other process that
more important than the CVM, like (kegiataan pelayanan
academic)
2. CVM should print: College Certificate perpanjangan,
masa studi, cuti, mutasi, pindah prodi, antara lain),
3. CVM is good for UIN and will help to increase the
117
technology of UIN University but the letters could not
come out without any signature from dean of the faculty.
Table 4.37 index card CVM Development (Mr. Joko Adianto)
Project : CVM Development in Smart Card
Date of interview : 26 April 2011
Interviewer : Hossein, Student of UIN
Interviewee : The Science Technology Lecturer, Mr. Joko
Adianto.
Summary :” Use third party digital signature. The
example is CAcert “
No. Description
1. Certificate / completion certificate of certain courses but
requires digital signature not only digitized signature
example digital signature from CAcert.org
2. Use third party digital signature
3. Not all letters can be printed but for those letters that can
be print, can come out without any signature from dean of
faculty, for illegal things we can cover it by using CAcert
method
118
4.4. Proposed System Design
Systems design is simply the design of systems. It implies a
systematic and rigorous approach to design an approach demanded by the
scale and complexity of many systems problems. Today, ideas from design
methods and systems design may be more relevant to designers than ever
before as more and more designers collaborate on designing software and
complex information spaces. Frameworks suggested by systems design are
especially useful in modeling interaction and conversation. They are also
useful in modeling the design process itself. Therefore in developing CVM
UIN the writer use CRC card in research designing part.
119
4.4.1. Application Design
a. CRC
Table 4.38 CRC card class introduction
Class : introduction
Description : introduce the system for student and alumni as users
Responsibilities: Collaborate:
- give brief description about the
systems
- select whether students or alumni
Table 4.39 CRC card class (Students Login)
Class : ClackJFrame(Students Login)
Description : insert username and password of students for login into the system
Responsibilities: Collaborate:
- inserting username and password
- verifying the username and password
- introduction
Table 4.40 CRC card class bahasa (language)
Class : bahasa (language)
Description : introduce the system for student and alumni as users
Responsibilities: Collaborate:
- select English Language
- select Bahasa Indonesia
- ClackJFrame (Students login)
120
Table 4.41 CRC card class (Menu Selection)
Class : mahasiswa2 (Menu Selection)
Description: select the menu for printing the selected surat.
Responsibilities: Collaborate:
- Print College Certificate
- Print IPK
- Print IPS
- Print Transcripts
- bahasa (Language)
- ClackJFrame (Students login)
Table 4.42 CRC card class JumHalamanKeterangan
Class : JumHalamanKeterangan
Description : select the total amount of printing page for College Certificate.
Responsibilities: Collaborate:
- select total print page - Mahasiswa2(Menu Selection)
Table 4.43 CRC card class JumHalIPK
Class : JumHalIPK
Description : select the total amount of printing page for surat IPK.
Responsibilities: Collaborate:
- select total print page - Mahasiswa2(Menu Selection)
121
Table 4.44 CRC card class JumHalIPS
Class : JumHalIPS
Description : select the total amount of printing page for surat IPS.
Responsibilities: Collaborate:
- select total print page - Mahasiswa2(Menu Selection)
Table 4.45 CRC card class Transcripts
Class : Transcripts
Description : select the total amount of printing page for transcripts.
Responsibilities: Collaborate:
- select total print page - Mahasiswa2(Menu Selection)
Table 4.46 CRC card class Alumni Login
Class : Loginalumni(Alumni Login)
Description : insert username and password of alumni for login into the system
Responsibilities: Collaborate:
- insert username
- insert password
- verifying the username and password
- introduction
122
Table 4.47 CRC card class language
Class : bahasaalumni (language)
Description : introduce the system for student and alumni as users
Responsibilities: Collaborate:
- select English Language
- select Bahasa Indonesia
- Loginalumni(Alumni Login)
Table 4.48 CRC card class alumni (Menu Selection)
Class : alumni (Menu Selection)
Description : select the menu for printing the selected surat.
Responsibilities: Collaborate:
- Print College Certificate
- Print Transcript
- Print surat lulus
- bahasaalumni (language)
- Loginalumni(Alumni Login)
Table 4.49 CRC card class alumni JumHalamanKeterangan (alumni)
Class : JumHalamanKeterangan (alumni)
Description : select the total amount of printing page for College Certificate.
Responsibilities: Collaborate:
- select total print page - alumni (Menu Selection)
123
Table 4.50 CRC card class alumni JumHaltranscripts (alumni)
Class : JumHaltranscripts (alumni)
Description : select the total amount of printing page for Transcripts.
Responsibilities: Collaborate:
- select total print page - alumni (Menu Selection)
Table 4.51 CRC card class alumni JumHalLulus (alumni)
Class : JumHalLulus (alumni)
Description : select the total amount of printing page for Transcripts.
Responsibilities: Collaborate:
- select total print page - alumni (Menu Selection)
124
b. Actor and Use case Diagram
Identifying the activity each of actor in the purpose system, their
function in use case diagram, and telling about those requirements that
needed to handle by actor; next the writer has shown how the use case
provides the value of the actor.
1. Printing Surat
In this table has shown what the requirements are and who the
actor and use case are.
Table 4.52 requirement and use case Printing Surat
Requirement Actor Use Case
1. Printing College
Certificate
Students and Alumni Printing Letters
2. Printing surat IPK & IPS Students Printing Letters
3. Printing Surat Transcripts Students and Alumni Printing Letters
4. Printing Surat Lulus Alumni Printing Letters
c. Design Use Case Diagram
A use case diagram in the Unified Modeling Language (UML) is a
type of behavioral diagram defined by and created from a Use-case
analysis. The main purpose of a use case diagram is to show what system
functions are performed for which actor. Roles of the actors in the system
125
can be depicted. In below the writer shows some use case diagram in the
Certificate Vending Machine.
1. Use Case Diagram for Certificate Vending Machine
Picture 4.6 Use Case Diagram for CVM
d. Use case scenario
Use case scenario is a more detailed explanation about each use case that
occurred in the system. Use case scenario consists of:
1. Use case name is the name that will be described.
126
2. Actors involved.
3. Trigger.
4. Precondition is important for the use case to start.
5. Action.
6. Post condition describing the state of the system after the use case ends.
After explaining the use case on previous discussion, the following will
explain the use case specifications that have been determined.
a. printing College Certificate
Table 4.53 Use case scenario printing College Certificate
Use case Name Printing College Certificate
Actors Involved Students, alumni
Trigger Actor can print his/her College
Certificate that be understood by his/her
faculty.
Pre condition His/her data and surat order already
exist in database.
Action Ask CVM for print the required letter
Post condition Surat with his/her data printed out.
b. Printing Surat IPK and IPS
Table 4.54 Use case scenario printing Surat IPK and IPS
Use case Name Printing Surat IPK and IPS
127
Actors Involved Students
Trigger Actor can print his/her surat IPK and
IPS that be understood by his/her
faculty.
Pre condition His/her data and surat order already
exist in database.
Action Ask CVM for print the required letter
Post condition Surat with his/her data printed out.
c. Printing Transcripts
Table 4.55 Use case scenario printing Transcripts
Use case Name Printing Transcripts
Actors Involved Students, alumni
Trigger Actor can print his/her Transcripts that
be understood by his/her faculty.
Pre condition His/her data and surat order already
exist in database.
Action Ask CVM for print the required letter
Post condition Surat with his/her data printed out.
d. Printing Surat lulus
Table 4.56 Use case scenario printing Surat lulus
Use case Name Printing Surat lulus
Actors Involved Alumni
Trigger Actor can print his/her surat lulus that
be understood by his/her faculty.
Pre condition His/her data and surat order already
exist in database.
Action Ask CVM for print the required letter
Post condition Surat with his/her data printed out.
128
e. Activity Diagram Design
Activity diagrams describe the workflow behavior of a system. Activity
diagrams are similar to state diagrams because activities are the state of doing
something. The diagrams describe the state of activities by showing the
sequence of activities performed. Activity diagrams can show activities that are
conditional or parallel. Following the writer showing activity diagram for use
case model
129
Picture 4.7 Activity diagram for printing Surat in Certificate Vending Machine
130
User will insert their username and password to the certificate vending
machine, thus the form login appear at first and the input data will check for
process login; if the username and password was correct the status of students or
alumni will send back to the language selection, which the actor can choose
between English language and Indonesia language, then choosing the required
letters for print, according to user data; process of print appear, RFID for taken
the payment of the surat will appear and the process will done, and the required
letters will print and come out.
f. Sequence Diagram Design
Sequence diagrams describe interactions between objects within and
around the system (including user, displays, and so on) in the form of message
that is described with respect to time. Below is a sequence diagram for each
module.
1. Printing Surat (letters) in Certificate Vending Machine
131
Pictu
re 4.8
Seq
uen
ce dia
gra
m fo
r prin
ting S
urat in
Certificate V
endin
g
Mach
ine
132
Students and alumni will insert their username and password to the
certificate vending machine, thus the form login appear at first and the
input data will check for process login, in login process the database
connection will ready to verify the exact and correct username and
password that’s why username and password will check their validity in
user data which is the database that system use; if the username and
password was correct the status of students or alumni will send back to the
process login, login status will give information to form login that what
kind of user status already login, after this interaction system will show the
main page by showing the selection language, which the actor can choose
between English language and bahasa Indonesia, then choosing the
required letters for print, according to user data; process of print appear,
RFID for taken the payment of the surat will appear and the process will
done, and the required letters will print and come out.
g. Class Diagram Design
Class diagram describe the relation between classes, the relations include
association, aggregation and composition, the writer has show the class diagram
with each class attributes in below,
133
-Name
-Id
-Graduate Year
Alumni Login-Name : String
-Id : Long
-faculty : String
-academic year : Integer
-semester : Integer
-birth : Date
Students Login
-Name : String
-Nim : Long
-Alamat : String
-Birth date : Date
-Faculty : String
-Semester : Integer
-Program : String
-Academic Year : String
-Barcode : Long
Surat Lulus
*
*
*
*
-English : Boolean
-Indonesia : Boolean
Language Selection
*
1
-Name : String
-Nim : Long
-Alamat : String
-Birth date : Date
-Faculty : String
-Semester : Integer
-Program : String
-Academic Year : String
-Barcode : Long
Surat Keterangan
-Name : String
-Nim : Long
-Alamat : String
-Birth date : Date
-Faculty : String
-Semester : Integer
-Program : String
-Academic Year : String
-Barcode : Long
Srurat Transcripts
-Name : String
-Nim : Long
-Alamat : String
-Birth date : Date
-Faculty : String
-Semester : Integer
-Program : String
-Academic Year : String
-Barcode : Long
Surat KHS
*** *
*
*
1
*
Picture 4.9 CVM Class Diagram
4.4.2 Database Design
a. Table Structure
In this stage the writer will show the tables that include in this
system, following writer shows the tables with their primary key include
their filed name and real data.
134
1. History CVM Table
File Name : history_cvm
Primary key : id
Picture 4.10 history-cvm table
2. Transaction CVM Table
File Name : transaksi_cvm
Primary key : id
Picture 4.11 transaction cvm table
3. Setting surat CVM Table
File Name : settingsuratcvm
Primary key : id
135
Picture 4.12 setting surat cvm table
4. Saving barcode CVM Table
File Name : simpan_barcode
Primary key : id
Picture 4.13 simpan-barcode table
b. Database Structure
Based on the specifications of the above databases, physical
database from a database specifications above are as follows:
136
settingsuratcvm
PK,FK1 id
biaya
isenglish
keterangan
namasurat
history_cvm
PK id
jumlahsurat
namasurat
tgl
uangmasuk
transaksi_cvm
PK,FK1 id
nim
nominal
penrima
tglmasuk
Picture 4.14 Relational Database
4.4.3 User Interface Design
a. Introduction Page
Picture 4.15 Introduction page
137
b. Login Page
Picture 4.16 Login page
c. Language Selection
Picture 4.17 Language Selection
138
d. Menu Surat Selection
Picture 4.18 Menu Surat Selection
e. Total Print Page
Picture 4.19 Total Print Page
139
4.5. Coding
In this step will explain about the language of programming that used in
system and implementation coding with all kind of components that involves in
developing system.
4.5.1 Programming Languages and Components
Programming language that used in the development of this application is
java 1.6, which consists of java development kit and the java runtime
environment. For developing reports the writer used iReport tool and
JasperReports.
PostgreSQL 8.3 is used as a database to store data by using the pgAdmin III
tool, for editors and unit tests used eclipse editor and netbeans 6.8 IDE. Using
Contactless Smart Cards which support the CardMan® 5321 is based on a 13.56
MHz; the contactless smart card interface that is compliant with ISO
specifications 14443 A and B and 15693 and the reader works with a variety of
13.56 MHz.
4.5.2 Coding Implementation
In implementation coding the writer develop one package which is
Package Action, in this package the writer start to code and implement the system,
calling and controlling all of certificate vending machine application use to done
140
in this package, Integration CVM with Smart Card(RFID); Integration CVM with
AIS and integration netbeans with IReport (JasperReport) version 3.0.0 has been
done by the writer.
4.5.3. Components
In this System the writer uses some hardware and software which is
suitable for this system, thus the writer suggests users to use the same hardware
and software for developing a system like this.
Hardware Tools
Intel® Core™ i5 CPU M 430 @ 2.27GHz Processor
2,00 GB(1,86 GB usable) RAM
32-bit Operating System
Lenovo ThinkPad T410i
Internet Modem Connection Using First Media Cable
CardMan® 5321 is based on a 13.56 MHz
Reader works with a variety of 13.56 MHz
Contactless smart card interface that is compliant with ISO
specifications 14443 A and B and 15693
141
4.6 Testing Certificate Vending Machine
After completing the development, then this application should be tested in
order to determine the extent to which this application can work properly and
whether the application can meet the goal to be obtained prior to submission to the
end user.
4.6.1. White Box Test
Using system with blank knowledge background of system can
make the developer believe their system and make high confidence. For
this purpose the writer invite two students and two alumni as the system
actors for use the system the result shown in below.
Table 4.57 CVM White box test
No Module Precondition Expected results
The test
result
1. Running the
application Developer
The netbeans can run
well OK
2. Integration with RFID Developer
Connecting RFID
with CVM
application
OK
3. Integration with AIS Developer
Connecting CVM
Application with AIS
database
OK
4. Interface screen Designer Interface screen
displayed well OK
142
5. Introduction Page Students/Alumni See the Introduction
Page OK
6. Select status Students/Alumni Actor can select it’s
status OK
7. Show the confirm
message Students/Alumni
Actor can see the
confirmation of
selecting status
OK
8. Login form Students/Alumni Actor can login
without any problems OK
9. Language Selection Students/Alumni Actor can select the
required language OK
10. Menu selection Students/Alumni
Students and Alumni
can see their menu
selection for letters
OK
11. College Certificate Students/Alumni Actors can print
College Certificate OK
12. Transcripts Students/Alumni Actors can print
Transcripts OK
13. Surat Lulus Alumni Actors can print surat
lulus OK
14. Surat IPK & IPS Students Actors can print surat
IPK & IPS OK
15. Select Total page
Print Students/Alumni
Actors can select the
total amount of pages
that they need to print
OK
16. Payment Transfer Students/Alumni Can see their
payment done OK
17. Payment Result Students/Alumni Residual Payment of
each actors OK
18. Cancel Students/Alumni Actors cancel process OK
143
19. Logout Students/Alumni Actor can logout in
middle of process OK
20. Print with other card Students/Alumni Actors pay using
their friends ID Card OK
21. Netbeans with Jasper
Report Developer
Netbeans can connect
can call JasperReport OK
4.6.2. Unit Testing (Independent test)
The developer of the system has test the application in each part, each part
had run well and without any problems, the result for this process can be shown
by the writer directly.
4.7 Paper Legalization (Secure Document)
In the term of legalization paper the writer focus on three variety kind of
papers which are pantograph 4000 and erasable ink. These papers can avoid of
any counterfeiting and document alteration. Following the writer has explained
about each of them in details.
4.7.1 Pantograph 4000
The writer decides to use this kind of paper because it will defense
the system against counterfeiting and document alteration by avoid any
copy and scan; if the forger wants to copy or scan or fax this kind of paper
it will show the wrong result, for example for copy the original sheet it
will give the black sheet result, and for scan the original sheet it will give a
VOID message in all of that result paper, and so on. That’s why nowadays
144
for a good cost and prevent any tricks usually companies and official
organization use this kind of paper, the writer suggest this kind of paper
for UIN JAKARTA also.
(Original) (Attempted B&W Copy/Fax) (Attempted Color Copy/Scan)
Picture 4.20 Pantograph 4000 Paper
4.7.2 Custom Borders & Background Art
Picture 4.21 Custom Borders & Background Art
Our design team has access to a full range of Guilloche (bank note
quality) border and background designs that not only adds a touch of
elegance to your document, but also provides an additional layer of
145
security against illegal copying, as this computer-generated fine-line
artwork is extremely difficult to capture and reproduce - plus all of these
designs are fully customizable.
146
CHAPTER V
CONCLUSION
5.1 System Advantage
This system can handle a lot of UIN JAKARTA problems, when the writer
interviewed with both students and official employee almost eighty percent was tired
from the current system; cause it’s gives a lot of mistakes in process of surat and
wasting the time for many days, by this purpose system students as end users can
handle their process just in a minutes and have their required surat.
5.2 Last view
In this system the writer focus on their requirement and problem identification
which almost was talk about how to handle the print process in UIN Syarif
Hidayatullah Jakarta, wasting time and give mistake result of surat make the students
unsatisfied, thus the writer start to build up the new system which can handle all of
this problems the conclusion are shown in below;
1. Start to figure out the problems by doing direct interview with both students as end
users and official employee of UIN, for understanding more about the current system
situation.
2. Purpose the new system with new ideas to handle the process of printing surat in
UIN, here the writer focus on how to have a new system that will suitable with both
students and employee condition without any wasting time.
3. Gathering data using user stories method and index card, which as all of us know
the best result of any project basically cause from best requirement gathering data.
147
4. Study about literature and browsing and understanding about variety kind of
vending machine, jasper report method for print, RFID (Radio Frequency
Identification) and smart card contactless for read and write the interaction between
vending machine and Students ID card for payment of each Surat (letter) cost.
Comparing the current system with others systems.
5. XP Methodology for developing this system, the writer choose the XP
methodology because it’s suitable with the big project and can use the UML (Unified
Modeling Language) for any flowchart and more details about object-oriented case
study.
6. Implement the system using JAVA code and integration it with AIS for database,
with Jasper Report for documentation result, with RFID for reading and writing the
transaction.
7. Test the code using Black Box and Unit test for understanding about each part
result, and make sure about any missed part, for Black box also the writer bring some
students as end users for working with this system which gave normal result.
8. Built up the system and finishing all of the research and project.
148
5.3 Suggestion
a. For Students
As one of UIN Students the writer encourage all of the students to
believe on themselves and handle all kind of process in UIN by themselves,
they can increase their knowledge by increasing the technology of their
campus; instead of that can understand about real world problems and fix them
as the required needed.
b. For UIN
Giving more opportunities to students and believe on their ability to
build up system and handle their own university problems is one of the
strategy that the writer thinks should be carried out by official employee of
UIN, preparing budget and encourage students to increasing technology of
UIN will help both students and university.
5.4 Recommended
For Using paper authenticity and having secure documents the writer suggest
and recommend UIN to use Coin Activated Ink, Heat-Sensitive Security Ink and
Custom Borders and Background Art for printing the Surat, despite the cost of each
kind of mentioned paper but the; this kind of paper will more secure the system and
UIN from any kind of counterfeiting and document alteration. Hope it will help UIN
for better future and nowadays technology.
EXAM VALIDATION
Thesis with title “A Study on Developing Certificate Vending Machine by
using Student Smart Card (Case Study: UIN Syarif Hidayatullah Jakarta)” has
been tested and has passed in Thesis Defence (Munaqosah) session of Faculty of
Science and Technology, State Islamic University Syarif Hidayatullah Jakarta, on
Monday, June 9, 2011. This thesis has been accepted as one of the requirements to
obtain a Bachelor degree of Informatics Engineering.
Jakarta, 9 June 2011
Examiner Team,
Supervisor Team,
Knowing,
Examiner I
Yusuf Durachman M.Sc, MIT
NIP. 19710522 200604 1 002
Supervisor II
Feri Fahrianto, MT
NIP. 19800829 201101 1 002
Supervisor I
Husni Teja Sukmana, Ph.D
NIP. 19771030 200112 1 003
Examiner II
Ria Hari Gusmita, M.Kom
NIP. 19820817 200912 2 002
Dean of
Faculty of Science and Technology
DR. Syopiansyah Jaya Putra, M.Sis
NIP. 19680117 200112 1 001
Head of
Informatics Engineering
Yusuf Durachman M.Sc, MIT
NIP. 19710522 200604 1 002
xv
GLOSSARY
KHS : Kartu Hasil Studi (Card Study Results)
AIS : Academic Information System
Test : Stages that will check the system using some special test.
UML : Unified Modelling Language
User : End Users (Students and alumni)
XP : Extreme Programming
Black box : A new type of software testing based on the inputs, outputs user.
Surat : Official Letters of UIN
Barcode : Assembly code which used for fake letter checking
Smart Card : Students card with using chip to store the data and make the process
iReport : A tool for making dynamic documentation.
PostgreSQL : Database for storing data
RFID : Radio Frequency Identification
CVM : Certificate Vending Machine
149
References
[1] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter 7]
2005
[2] Lars Mathiassen, Object-oriented Analysis & Design [Paperback] 2000
[3] Jeffrey Whitten, Lonnie Bentley, Systems Analysis and Design Methods [Hardcover] 2008
[4] Ladjamudin B, Al-Bahra. Konsep Sistem Informasi. Jakarta 2008
[5] John Lancaster Basic Concepts of Information Technology: ECDL - the European PC
standard (European Computer Driving Licence) [Paperback]
[6] John Lewis, Peter DePasquale, Programming with Alice and Java 2008
[7] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter 2]
2005
[8] Online source from official website of UIN JAKARTA (http://www.uinjkt.ac.id) 2011
[9] Online source from official website of The International Council on Systems Engineering
(INCOSE) (http://www.incose.org) 2011
[10] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition
[chapter10] 2005
[11] Online source from official website of JAVA, (http://www.java.com/) 2011
[12] Online source from official website of Jasper, (http://jasperforge.org/) 2011
[13] Refer to, Copyright © 2007 Protected Paper A Division of Document Security Systems, Inc..
All Rights Reserved.| (http://www.protectedpaper.com/category_s/17.htm)
[14] John Wiley, RFID and Contactless Smart Card Application 2005
[15] Philips semiconductors, Mifare Standard Card IC 2001
[16] Online Source from wikipedia website (http://en.wikipedia.org/wiki/Vending_machine)
2011
[17] Online Source from official website of digitized signature, (http://www.digitize.com/) 2011
150
[18] Online source from official website of TouchScreen (http://www.touchscreens.com/) 2011
[19] Took from official websites, http://www.barcode.com/ | http://indobarcode.com/ |
http://en.wikipedia.org/wiki/Barcode
[20] Gregory Smith, PostgreSQL 9.0 High Performance 2010
[21] Richard Stone Beginning Databases with PostgreSQL, 2001
[22] Took from (http://en.wikipedia.org/wiki/Unit_testing) |
(http://en.wikipedia.org/wiki/Black_box) | (http://www.blackbox.com) and other websites 2011
[23] Subana, moersetyp Rahadi, dan Sudrajat, statistik pendidikan. bandung CV Pustaka setia,
2005
[24] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter7]
2005
[25] Online Source from official website of Extreme Programming,
(http://www.extremeprogramming.org) | (http://www.agile-process.org/)
[26] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter4]
2005
[27] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition 2005
[28] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter13,
14, 29] 2005
[29] Online source from http://www.havemacwillblog.com/2005/09/office-automation-extreme-
programming-linux/ and http://www.cudacoffeevending.com/
[30] Online source from http://www.freeveda.org/DigitalVendingMachine/dvm_1_004.htm
[31] Arne Jakobsen and Torgeir Skiple, Development of Vending Machine Heating and Cooling
of Beverage 2006
[32] http://umpir.ump.edu.my/193/ Amar Safuan Bin Alyusi, Development of vending machine
with prepaid payment method, 2008
[33] Online source from http://sciencelinks.jp/jeast/article/200422/000020042204A0711984.php
VALIDATION PAGE
A Study at Developing Certificate Vending Machine by using Student Card (Smart Card)
(Case Study: UIN Syarif Hidayatullah Jakarta)
Thesis As one of requirement to obtain a Bachelor Degree of Informatics Engineering
Faculty of Science and Technology
UIN Syarif Hidayatullah Jakarta
By:
HOSSEIN HOSSEINI FARID
107091103916
Approved by,
Supervisor I Supervisor II
Huni Teja Sukmana, Ph.D
NIP. 19771030 200112 1 003
Feri Fahrianto, M.Sc
NIP. 19800829 201101 1 002
Knowing,
Head of Informatics Engineering
Yusuf Durachman, M.Sc, MIT
NIP. 19710522 200604 1002
x
List of Picture
Picture 2.1 Pantograph 4000 Legal paper........................................................................... 23
Picture 2.2 Block out Legal paper...................................................................................... 24
Picture 2.3 Prism Legal paper............................................................................................ 25
Picture 2.4 Custom Borders and Background Art.............................................................. 26
Picture 2.5 Heat-Sensitive Security Ink.............................................................................. 27
Picture 2.6 Erasable Ink...................................................................................................... 28
Picture 2.7 Coin Activated Ink .......................................................................................... 29
Picture 2.8 White Box......................................................................................................... 51
Picture 3.1 Steps of Extreme Programming........................................................................ 57
Picture 3.2 Research Workflow.......................................................................................... 64
Picture 4.1 The current system for printing Surat Keterangan........................................... 71
Picture 4.2 The current system for printing Transkip Nilai................................................ 72
Picture 4.3 The current system for printing Surat IPK & IPS............................................ 73
Picture 4.4 The purpose system for printing Surat Keterangan.......................................... 76
Picture 4.5 The purpose system for printing Transkip Nilai............................................... 78
Picture 4.6 Use Case Diagram for CVM............................................................................. 125
Picture 4.7 Activity diagram for printing Surat in Certificate Vending Machine................ 129
Picture 4.8 Sequence diagram for printing Surat in Certificate Vending........................... 131
Picture 4.9 CVM Class Diagram......................................................................................... 133
Picture 4.10 History-cvm table........................................................................................... 134
Picture 4.11 Transaction cvm table..................................................................................... 134
xi
Picture 4.12 Setting surat cvm table................................................................................... 135
Picture 4.13 Simpan-barcode table..................................................................................... 135
Picture 4.14 Relational Database....................................................................................... 136
Picture 4.15 Introduction page........................................................................................... 136
Picture 4.16 Login page...................................................................................................... 137
Picture 4.17 Language Selection......................................................................................... 137
Picture 4.18 Menu Surat Selection...................................................................................... 138
Picture 4.19 Total Print Page.............................................................................................. 138
Picture 4.20 Pantograph 4000 Paper................................................................................... 145
Picture 4.21 Custom Borders & Background Art............................................................... 145