A study on developing certificate vending machine by using student smart card (case study: UIN Syarif Hidayatullah Jakarta)

(1)

using Student Smart Card

(Case Study: UIN Syarif Hidayatullah Jakarta)

By:

Hossein Hosseini Farid

107091103916

INFORMATICS ENGINEERING STUDY PROGRAM

FACULTY OF SCIENCE AND TECHNOLOGY

STATE OF ISLAMIC UNIVERSITY SYARIF HIDAYATULLAH

JAKARTA


(2)

using Student Smart Card

(Case Study: UIN Syarif Hidayatullah Jakarta)

By:

Hossein Hosseini Farid 107091103916

INFORMATICS ENGINEERING STUDY PROGRAM FACULTY OF SCIENCE AND TECHNOLOGY

STATE OF ISLAMIC UNIVERSITY SYARIF HIDAYATULLAH JAKARTA


(3)

iii

Study on Developing Certificate Vending Machine by using Student Smart Card (Case Study: UIN Syarif Hidayatullah Jakarta) can be finished without any obstacle.

This thesis almost talk about certificate vending machine and the process to print a paper without preview and taking the student data from AIS database directly, this main purpose for this project is to save the time of both students and UIN employee and encourage the students to believe on themselves and develop their own universities system by themselves.

After two month of developing a certificate vending machine application in smartcard contactless using jasper report method, the writer filling the increase of his knowledge, learning a lot of java coding strategy and techniques make me enjoy the software engineering field and for better future we need better basic knowledge.

In this moment, the writer would to thanks to all of structural person that covering this program

1. Mr. Dr. Syopiansyah Jaya Putra, M.Sis, Dean of Science Technology Faculty. 2. Mr. Yusuf Durrachman, M.Sc, MIT, the head of Informatics Engineering 3. Mrs. Ria Hari Gusmita, M.Kom, Technical Coordinator of International Class.


(4)

iv

5. Mr. Feri Fahrianto, M.Sc as a second guidance lecturer that always spare time with patience giving a guidance, a motivation, a suggestion, and a purpose to the writer in arranging the report.

6. Mrs. Finna as my partner to finish this project and developing an application in smartcard contactless using jasper report method for UIN.

7. Mr.Fauzi and Mrs. Ayu to help me where I got problems and ask helping for fix some java error.

8. The PUSOKM Team, and all of those guys that I cannot mentioned them one by one here, by the way thanks for everything.

9. My parent, my brothers, my sisters who always give support and never let me down.

10. Everyone who always help me, give me support and contribute to this research.

Jakarta, June 2011 Hossein Hosseini Farid


(5)

i UNIVERSITY OR INSTITUTION.

Jakarta, 1 June 2011

Hossein Hosseini Farid 107091103916


(6)

ii

Supervisor by Husni Teja Sukmana, Ph.D and Feri Fahrianto, M.Sc.

In this system students can get the UIN Surat by just clicking some buttons, Nevertheless that this data will save in database and UIN Staff will know who, when, and what kind of surat prints out. This system will help both students and UIN Staff for increasing their access to the UIN Surat. student’s time and the lack of good coordination between faculties and academic with long time of process make the students tired the reason to start study at developing certificate vending machine (CVM) was how to save the students times and make them focus on their studies, in other side helping UIN for developing new technology which for first time has been developed in Indonesian universities, in addition to that, help UIN by getting payment of each Surat that prints out.

In this research the writer has focusing about the actual and real students data by integrate the system with Academic System Information (AIS) and make the legal Surat by using barcode and Background art paper which has been explained details in chapter iv, are the important parts of the system.

Integrate netbeans with iReport and calling the data from pgadmin and save them back, having unity Surat for each student, read the data form student card (Smart Card) store the data inside chip and saving the process and more, are all activities that the writer has been done.

In this research the writer is using Extreme Programming (XP) for developing the CVM because of its fast move steps and team working which are the behavior of XP methodology.

Keywords: Developing, Integration, Certificate Vending Machine, Extreme Programming (XP), Smart Card, Barcode, Unified Modeling Language (UML), PostgresSQL, iReport, Radio Frequency Identification (RFID), Legalization.

Number of Pages: 149 Pages

Total References: 22 sources

Total Pictures: 21 pictures


(7)

v

Statement... i

Abstract... ii

Preface... iii

List of Content... v

List of Picture... x

List of Table... xii

Glossary... xv

CHAPTER I INTRODUCTION 1.1 Background of the Developing System... 1

1.2 Problems Identification... 3

1.3 Scope of the Developing System... 4

1.4 The Research Purpose and Advantages... 5

1.4.1 for the writer... 5

1.4.2 for the UIN JAKARTA... 7

1.5 The Research Methodology... 7

1.5.1 The Method of Gathering Data... 8


(8)

vi

2.2 Basic Concept of Information... 12

2.3 Basic Concept of Application... 15

2.4 Basic Concept of System Analysis... 16

2.5 Basic Concept of System Design... 16

2.6 Basic Concept of Information Technology... 17

2.7 Basic Concept of Software Engineering... 17

2.8 System Engineering ... …... 18

2.9 System Modeling ... …... 18

2.10 JAVA... 19

2.10.1. What is Java? ... 19

2.11 Jasper Report Concept... 20

2.12 Legalization of Paper (Secure Document) ... 22

2.13 Contactless smart card... 30

2.13.1. Benefits of Contactless Smart Cards... 30

2.14 Radio frequency identification (RFID) ... 32

2.14.1. RFID Benefit... 34

2.14.2. Common Problems with RFID... 37

2.15 About Certificate Vending Machine... 37

2.15.1. Variety Kind of Vending Machine... 39


(9)

vii

2.18 Barcode Concept... 46

2.19 PostgreSQL... 49

2.20 Unit Testing... 50

2.21 White Box……... 51

2.22 Related Works... 51

CHAPTER III RESEARCH METHOD 3.1 Research Method ... …… 54

3.1.1. Data Collection Techniques... 54

3.1.2. Requirements Gathering Techniques... 55

3.2 Systems Development Method... 56

3.2.1. Planning... 59

3.2.2. Design... 59

3.2.2.1. Applications Design... 60

3.2.2.2. Database Design... 61

3.2.2.3. Interface Design... 61

3.2.3. Coding... 61

3.2.4. Testing... 62

3.2.4.1. Unit Testing... 62


(10)

viii

4.1.1 VISION AND MISSION OF UIN... 67

4.1.2 Target Achievement PUSKOM... 67

4.1.3 Computer Science Faculty Profile... 68

4.1.3.1 International Undergraduate Program... 68

4.2 Current System Workflow... 69

4.2.1. Problem Identification... 74

4.2.2. Description of Purpose System... 75

4.2.3. Feasibility Study... 79

4.3 Requirement Gathering... 82

4.3.1 User Stories... 82

4.4 Proposed System Design... 118

4.4.1. Application Design... 119

4.4.2. Database Design... 133

4.4.3 User Interface Design... 136

4.5. Coding... 139

4.5.1. Programming Languages and Components... 139

4.5.2. Coding Implementation... 139

4.5.3. Components... 140

4.6 Testing Certificate Vending Machine... 141


(11)

ix

4.7.2. Custom Borders & Background Art... 144

CHAPTER V CONCLUSION 5.1 System Advantage... 146

5.2 Last view... 146

5.3 Suggestion... 148

5.4 Recommended... 148


(12)

xii

Table 4.1 index card CVM Development (General Students)... 84

Table 4.2 index card CVM Development (Information System)... 85

Table 4.3 index card CVM Development (kesejahteraan social)... 86

Table 4.4 index card CVM Development (English Language Field)... 87

Table 4.5 index card CVM Development (Aqidah Filsafat)……... 88

Table 4.6 index card CVM Development (Aqidah Filsafat)……... 89

Table 4.7 index card CVM Development (Staff of UIN)………... 90

Table 4.8 index card CVM Development (Official staff of UIN)... 91

Table 4.9 index card CVM Development (Religious Difference)…... 92

Table 4.10 index card CVM Development (International Communication)... 93

Table 4.11 index card CVM Development (Journalistic)... 94

Table 4.12 index card CVM Development (Staff of PUSKOM.) ... 94

Table 4.13 index card CVM Development (Economy and Business)... 95

Table 4.14 index card CVM Development (Muamelat)... 96

Table 4.15 index card CVM Development (Information System)... 97

Table 4.16 index card CVM Development (Computer Science)... 97

Table 4.17 index card CVM Development (Tafsir Hadith)... 98

Table 4.18 index card CVM Development (Mazhab Fiqih Differences)... 99

Table 4.19 index card CVM Development (Dirasah Islamiah)... 100


(13)

xiii

Table 4.24 index card CVM Development (Dr. Ir. Syopiansyah Jaya Putra, M.Sis)... 105

Table 4.25 index card CVM Development (Herni Ali HT, SE, MM)... 106

Table 4.26 index card CVM Development (Mrs. Fitroh)... 107

Table 4.27 index card CVM Development (Dr. Agus Salim, M.Si)... 108

Table 4.28 index card CVM Development (Drs. Wahidin Saputra, M.Ag)... 109

Table 4.29 index card CVM Development (Mrs Mega Ratna Sari)... 110

Table 4.30 index card CVM Development (Drs. H. Mahmud Jalal, MA)... 111

Table 4.31 index card CVM Development (Mr.Guruh)... 112

Table 4.32 index card CVM Development (Prof. Dr. Ahmad Thib Raya)... 113

Table 4.33 index card CVM Development (Dr. Wahid Hasyim, M0A)... 113

Table 4.34 index card CVM Development (Prof. Dr. Abdul Shomad.)... 114

Table 4.35 index card CVM Development (Prof. Dr. Abdul Hamid, MS)... 115

Table 4.36 index card CVM Development (Drs Marzuki Mahmud MPd)... 116

Table 4.37 index card CVM Development (Mr. Joko Adianto)... 117

Table 4.38 CRC card class introduction... 119

Table 4.39 CRC card class (Students Login)... 119

Table 4.40 CRC card class bahasa (language)... 119

Table 4.41 CRC card class (Menu Selection)... 120

Table 4.42 CRC card class JumHalamanKeterangan... 120


(14)

xiv

Table 4.47 CRC card class language... 122

Table 4.48 CRC card class alumni (Menu Selection)... 122

Table 4.49 CRC card class alumni JumHalamanKeterangan (alumni)... 122

Table 4.50 CRC card class alumni JumHaltranscripts (alumni)... 123

Table 4.51 CRC card class alumni JumHalLulus (alumni)... 123

Table 4.52 requirement and use case Printing Surat... 124

Table 4.53 Use case scenario printing Surat Keterangan... 126

Table 4.54 Use case scenario printing Surat IPK and IPS... 127

Table 4.55 Use case scenario printing Transcripts... 127

Table 4.56 Use case scenario printing Surat lulus... 128


(15)

CHAPTER I INTRODUCTION

1.1 Background of the Developing System

Developing a software engineering system nowadays is very important for companies, factories, marketing, malls and all of the shopping center and business job, you can imagine the fast of accounting, the comfortable absent for lecturers, students and employees, the easier counting for markets etc.

"To waste time is one's greatest loss."(Imam Ali as 650 M)

“Men talk of killing time, while time quietly kills them.” (~Dion Boucicault 1998)

The absence of good managements for printing College Certificate and other documentation in Islamic University of UIN JAKARTA make the writer to start to developing title, why the writer start to do this title, is for improving the ability and increasing the talent of student for using new technology and encouragement them for developing new technology for making life easier.

The writer himself is one of Islamic University of UIN JAKARTA students, thus the writer has faced with these problems directly, and at the time he decided to develop a system that can help first himself and second the others students and encourage all students for helping their own university to get better and success.


(16)

The main problem in manual system was Students needs to go to the academic faculty or academic center for printing the letter, Students taking a long time around one till one week for getting a letter, the lack of integration between the existing academic system, cause printing transcript value and GPA, take a long time than usual, the absence of digital signatures, cause if the Program study, faculty, or academic, are not in place then the processing of student letter will not postponed.

Smart card itself is any pocket-sized card with embedded integrated circuits that can process and store data, and communicate with a terminal via radio waves. Smart Cards are capable of not just storing data but also have processing power, in this system the writer use smart card for making the process easier and faster, storage data and process it directly is one of benefit of smart card which can done by smart card, Certificate Vending Machines (CVM) can be interpreted as a tool or machine for printing letters automatically, the students may go to the tool and by using a student card that belongs to them or their friends to print a letter that they needs Certificate Vending Machine will print letters in a real-time time, by using this tool students can save their times.

Base on previous explanation and manual system problems, the writer start to develop Certificate Vending Machine (CVM) using Smart Card, integrating both certificate vending machine and smart card makes the process of printing letters easier and faster.


(17)

1.2 Problems Identification

According to the background in which the writer has already explained above, the areas of problem in which will explain in this thesis report are:

a. How can the writer develop a system that is easier to access by all of students, because as we know Islamic University of UIN JAKARTA is an International University which means include two languages which are Bahasa Indonesia and English.

b. Numbers of activities associated with making such as GPA letter, College certificate, transcripts value, graduation certificates, etc. c. The flow for making a letters and certificates are quite long and

consuming a lot time

d. Could delay the process of making the letters if the party concerned is not in place.

e. How to develop the title, in PUSKOM UIN JAKARTA.

f. Developing Certificate Vending Machine, using GUI, JAVA, Postgres, Smart Card Reader etc.

g. Setting the deposit for each of students thus they can print directly with the amount of deposit that they save in their ID card.

h. BufferedReader method for input and output the file with the specified directory.


(18)

i. Adding the use of Student Identity Card (KTM) by means of integration between existing student card (smart card) With Certificate Vending Machine

j. Analysis and recommendations for printing the letters and legalized in terms of validating the authenticity (originality letter)

1.3 Scope of the Developing System

In this thesis, the writer gives the limitation in developing the system. The area includes:

1. The content of the system is the data from user (Alumni and student) at PUSKOM UIN JAKARTA in AIS database.

2. This system covers setting amount deposit which takes it from AIS database in addition to that taking the human resources from AIS database.

3. The testing process has been done by smart card reader ISO specifications 14443.

4. CVM system was limited to the design and analysis, and implementation of programs.

5. It’s specially developed for students and alumni of UIN Syarif Hidayatullah JAKARTA.

6. This system just should be implements using Certificate Vending Machine (CVM).


(19)

1.4 The Research Purpose and Advantages 1.4.1 for the writer

1. Learning Smart Card as a new technology. Understand the concept of Smart Card.

2. Learning about Certificate Vending Machine (CVM) as new technology and understand the way that it integrate and interact with the costumers.

3. Study about Jasper Report and its concept, beside print the report with/without the preview.

4. More understand about JAVA concept and create the system with it.

5. The writer can implement his knowledge that he got from UIN Syarif Hidayatullah JAKARTA, especially in programming language, and software engineering field. 6. Understanding about how the Extreme Programming

methodology steps and how it works and how the writer should manage the research.

7. Understanding about both netbeans and eclipse as IDE (Integrated development environment) for developing the system and their integrated with Postgres database server. 8. Understanding about CVM and how it works with using


(20)

9. Learning about object and parameter which involved in the system.

10. How to set some amount of deposit and how to save the array

in txt and call it again using “buffer reader” method.

11. How to manage the barcode and give an authenticity to the official stuff of UIN.

12. Increasing knowledge and ability in PUSKOM under the teaching of smart lecturers.

13. Know how to interact with team and work together for developing a system and make it work.

14. Setting the connection of jasper report with postgres.

15. Learning the way of interacting with JFrame and calling the label method, in addition to how change the String to the Integer.

16. Using toString() method, because the parameter in class JumlahHalamanketerangan.java extends JFrame should to be string thus the writer use toString() method, that can change the object to the string.

17. How running the RFID (Radio Frequency Identification) in addition to read and write the smart card using the chip.


(21)

1.4.2 for the University of UIN Syarif Hidayatullah JAKARTA 1. Making the Certificate Vending machine title in increasing the

performances of the University.

2. Display the students and alumni data for easy access to CVM and printing their needs as College Certificate .

3. Allows the students and alumni to see their grades transcript and print the requires letter using their money.

4. Give a high technology to UIN, can encourage them to be better.

5. Saving the time for the both students and employee of UIN. 6. Saving the money of UIN, because this project has been done

using its own students for free as research.

1.5 The Research Methodology

The writer should collect the data for research projects. The data may be collected for either theoretical or practical research.

Some important factors in research methodology that the writer focus on it include validity of research data, Ethics and the reliability of measures most of our works are finished by the time we finish the analysis of our data. Before making this thesis report, the writer must use some research to gather needed informations. The methodology research that I use:


(22)

1.5.1 The Methodology of Gathering Data A. Observation

The collection of data with direct observation is a way to collect data by using the eye without the help of other standard tools for this purpose. [1]

B. Interview Method

Interview is a technique of collecting data by asking a direct question by the interviewer to the respondent, and respondent's answers are noted or recorded. [1]

C. Literature Study

Literature study is studying the books of reference and the results of previous similar research ever undertaken by others. The goal is to get the basic theories concerning the matter to be investigated. Theory is the foundation for researchers to understand the issues investigated properly and in accordance with the framework of scientific thinking. [1]


(23)

1.6 Structure of Report

In this theis report the writer use five chapters with some explanation in each chapter. The schemes are:

CHAPTER I INTRODUCTION

In chapter one, the writer talks about the scope of the system, what are the problems, background of developing system, identified them try to bring well sorted solution, the purpose to start developing system.

CHAPTER II LITERATURE REVIEW

In chapter two, the writer talks about definition of the systems and how to have a well known understanding about system developing method, it will help the readers for better understanding with the new words and system for software engineering. In addition the writer brings brief description about the each chapter that has been used in the title.

CHAPTER III RESEARCH METHODOLOGY

In chapter three which is research methodology or system developing methodology, the writer mentioned some important points, for example how the development process done and what was Extreme Programming model and features that been used in the thesis.


(24)

CHAPTER IV SYSTEM IMPLEMENTATION

In chapter four which is system implementation, the writer mentioned some important points, for example how the development process. The simulation of the system and Strategy of developing system also includes in this section thus the most important part of the thesis is the developing system implementation by giving all details in place.

CHAPTER V CONCLUSION

In chapter five, there are some conclusions which lead and give us brief description of the system and what were the advantages and disadvantages of the title.


(25)

CHAPTER II LITERATURE STUDY 2.1 Basic Concept of System

System is a collection of components that implement modeling requirements, functions, and interfaces. [2] The word sometimes describes the organization or plans itself and is similar in meaning to method.

A system is a group of interrelated components that function together to achieve a desired result. For instance, you may own a home theater system made up of a DVD player, receiver, speakers, and display monitor [3]

2.1.1 System Characteristic

A system has some characteristic and certain properties. It has components, system boundary, outside the system environment, link, input, output, processing and targets or goals. [4]

1. System Component

Systems consist of interrelated components (a relationship exists between parts and the whole).

2. System Boundary

System boundaries are artificial: systems are components of another larger system. Systems can be opened (influenced by their environment) or closed (not influenced by their environment).

3. Outside the system environment

Outside the system environment is whatever outside from the system boundaries which has some affect to the system operation.


(26)

4. System input, output, link and process

Systems must have inputs, processes, outputs, and feedback loops. 5. System’s target or goal

A system has a goals or objectives, if the system doesn't has goal, then the system will be useless. The Input to the system and the output from the system is very determined by the goal or objective. A system is said to be successful when it has achieved the goals or objectives.

2.2 Basic Concept of Information

What Is Information? Well, in human terms and in the broadest sense, information is anything that you are capable of perceiving. This can include written communications, spoken communications, photographs, art, and music, nearly anything that is perceivable. This really includes an enormous assortment of stimuli, but, realistically, everything you come in contact with is capable of providing and does provide you with some sort of information. So you are essentially a minute organism floated in a sea of information. For this course, and for the academic climate in which you are now situated, you'll focus on information as materials that have been stored in one manner or another that can educate you to a better understanding of your world. Information, then, is anything that can be documented in any form that can then be referred to later as means to understanding and to building new information. This course, for example, provides you with information that will help you to find, sort through,


(27)

and interpret other information. In short, you have quite an undertaking ahead of you, since there is so much information to be had. [5]

How Is Information Organized? If you consider information in the sense of anything that stimulates the senses, then you won't necessarily find any organization. Your experience of the world may have some organization to it in that you plan trips and relationships and other daily activities, but you still have little control over what information you will receive even with the best planning and even in the most controlled environments. Even people living under restrictive political systems receive information that they are not supposed to receive. That's just the way things work. Information is one thing that no one has ever figured out how to kill. If you examine information in terms of this course and academia, then you can limit your focus and find patterns of organization for most of the information that you will need to find and use. Traditionally, in libraries, information was contained in books, periodicals, newspapers, and other types of recorded media. It was accessible through a library's catalog and with the assistance of indexes, in the case of periodical and newspaper articles. Much of this is still true, but the means by which you discover organization have changed. You are no longer consulted a card catalog for information about a library's collection of information. You have not to consult a printed "Reader's Guide" for information on where to find articles about a certain subject. Most of these previously time-consuming tasks have been sped up by computerized "information systems." You still can find information stored in libraries, and it is very well organized. You still can find information stored in periodicals,


(28)

newspapers, and other media, and these sources of information have their own systems of organization. The problem for most researchers is not that the information doesn't exist in a library or in a journal or in a magazine or in a motion picture, but that they have yet to discover the organizing principles that are designed to help them find the information they need. For library materials, the organizing principle is a detailed subject classification system available for searching in an online "catalog." For journal articles, the organizing mechanism is typically an online indexing and/or abstracting system that allows researchers to access information by subject or by some other scheme. For newspaper articles, the organizing mechanism is typically an online indexing and/or abstracting system that allows researchers access in a variety of means. The one thing common to all of these access systems is organization. People, experts in their fields, have taken the time and trouble to organize access to all the stored information that they can get their hands on in order to make it searchable and accessible to other people. In short, accessing good information is not just as simple as pointing your browser to Google or Yahoo. Computers can help you to organize information and can even automate indexing and cataloging, but in most library and research database systems accesses to information are ultimately created by other people. In short, finding information deliberately rather than serendipitously relies on many people describing myriad bits of information in a systematic manner that can be addressed consistently in an organized system. Fortunately for researchers, this organizing drive has been characteristic of people throughout history. History, itself, is something people have created and kept,


(29)

hopefully as a means for teaching future people what to do and what not to do. So, when you click your mouse on a resource on the Internet and think that it is so wonderful, keep in mind that it is even more wonderful than you can imagine, but that there are also even better ways to find reliable information than just following any link that anyone happens to stick on the Internet.

Yes, you can find myriad sources of information online for free, but many of the materials that you can really count on are not freely available, so you need to rely on organization and cataloging and indexing to take advantage of those "heavy duty" sources. And you can rely on libraries to continue to provide you with materials that you may never be able to access freely on the Internet. Information and organizing information is what libraries are about.

2.3 Basic Concept of Application

Application sometimes called a program that is a series of instructions that the hardware executes one after another [6]. In information technology, an application is the use of a technology, system, or product.

The term application is a shorter form of application program. An application program is a program designed to perform a specific function directly for the user or, in some cases, for another application program. Examples of applications include word processors, database programs, Web browsers, development tools, drawing, paint, image editing programs, and communication


(30)

programs. Applications use the services of the computer's operating system and other supporting applications.

2.4 Basic Concept of System Analysis

Analysis is the process of breaking a complex topic into smaller parts from among various alternatives to achieve a better understanding of it. In system development process, there is system analysis that provides the project team with a more thorough understanding of the problems and needs that triggered the project. The system analysis requires working with system users to clearly define business requirements and expectations for any new system that is to be purchased or developed [3]

2.5 Basic Concept of System Design

Information system design is defined as those tasks that focus on the specification of a detailed computer-based solution. It is also called physical design. Thus, whereas systems analysis emphasized the business problem, system design focuses on the technical or implementation concerns of the system.

System design is driven by the technical concerns of system designers.

Hence, it address the IS building blocks from the system designer’s perspective.


(31)

2.6 Basic Concept of Information Technology

Information technology is a contemporary that describes the combination of computer technology with telecommunications technology (data, image, and voice networks) [3] Information system an arrangement of people, data, process, and information technology (IT) that interact to collect, process, store, and provide as output the information needed to support an organization.

2.7 Basic Concept of Software Engineering

Software Engineering is an approach to developing software that attempts to treat it as a formal process more like traditional engineering than the craft that many programmers believe it is. We talk of crafting an application, refining and polishing it, as if it were a wooden sculpture, not a series of logic instructions. The problem here is that you cannot engineer art. Programming falls somewhere between an art and a science [7]

The computer science discipline concerned with developing large applications. Software engineering covers not only the technical aspects of building software systems, but also management issues, such as directing programming teams, scheduling, and budgeting.


(32)

2.8 System Engineering

Systems engineering is an interdisciplinary approach and means to enable the realization of successful systems. It focuses on defining customer needs and required functionality early in the development cycle, documenting requirements, and then proceeding with design synthesis and system validation while considering the complete problem.

Systems engineering integrates all the disciplines and specialty groups into a team effort forming a structured development process that proceeds from concept to production to operation. Systems engineering considers both the business and the technical needs of all customers with the goal of providing a quality product that meets the user needs, Definition Based on International Council on Systems Engineering [9].

2.9 System Modeling

System modeling shows how the system should be working. Use this technique to examine how various components work together to produce a particular outcome. These components make up a system, which is comprised of resources processed in various ways (counseling, diagnosis, treatment) to generate direct outputs (products or services), which in turn can produce both direct effects.[10]


(33)

2.10 JAVA

2.10.1 What Is Java?

Java is a computer programming language. It enables programmers to write computer instructions using English based

commands, instead of having to write in numeric codes. It’s known as a “high-level” language because it can be read and written easily by humans. Like English, Java has a set of rules that determine how the instructions

are written. These rules are known as its “syntax”. Once a program has

been written, the high-level instructions are translated into numeric codes that computers can understand and execute. In the early nineties, Java was created by a team led by James Gosling for Sun Microsystems. It was originally designed for use on digital mobile devices, such as cell phones. However, when Java 1.0 was released to the public in 1996, its main focus had shifted to use on the Internet. It provided more interactivity with users by giving developers a way to produce animated WebPages. Over the years it has evolved as a successful language for use both on and off the

Internet. A decade later, it’s still an extremely popular language with over

6.5million developers worldwide.[11]

Why Choose Java?

Java was designed with a few key principles in mind:

Easy to Use: The fundamentals of Java came from a programming language called C++. Although a powerful language, it was felt to be


(34)

too complex in its syntax, and inadequate for all of Java's requirements. Java built on, and improved the ideas of C++, to provide a programming language that was powerful and simple to use.

Reliability: Java needed to reduce the likelihood of fatal errors from programmer mistakes. With this in mind, object-oriented programming was introduced. Once data and its manipulation were packaged

together in one place, it increased Java’s robustness.

Secure: As Java was originally targeting mobile devices that would be exchanging data over networks, it was built to include a high level of security. Java is probably the most secure programming language to date.

Platform Independent: Programs needed to work regardless of the machine they were being executed on. Java was written to be a portable language that doesn't care about the operating system or the hardware of the computer.

2.11 Jasper Report Concept

Jasper Reports provides the necessary features to generate dynamic reports, including data retrieval using JDBC (Java Database Connectivity), as well as support for parameters, expressions, variables, and groups. Jasper Reports also includes advanced features, such as custom data sources, script lets, and sub reports. All in all, Jasper Reports combines good features, maturity, community


(35)

participation, and, best of all, it's free. This article kicks off Java World's new Open Source Profile column dedicated to Java-based open source tools and components. Look for upcoming articles spotlighting the Echo Web application framework and ObJectRelationalBridge, an object/relational mapping tool. Feel free to send me your suggestions for future articles.

Jasper Reports Server is a powerful, yet flexible and lightweight reporting server. Generate, organize, secure, and deliver interactive reports and dashboards to users. Allow non-technical users to build their own reports and dashboards.

 Flexible server architecture

o Semantic layer for relational and non-relational data sources - BI Editions only.

o On-premises, virtualized, or Cloud (SaaS & PaaS) deployment options.

o Open standards, web service-driven architecture simplifies application integration.

 Centralized repository

o Connectivity to existing identity management systems to centralize and secure reports and analysis views.

o Report access and usage auditing for compliance.

o Granular security access down to the cell and column level.  Ad hoc reports - BI Editions only


(36)

o Metadata layer masks complex data descriptions with simplified business user-friendly names.

o Web-based reports provide rich, interactive reports with drill down, filtering, animated charting, and more.

 Dashboards - BI Editions only

o Web-based, drag-and-drop dashboard designer.

o Single report and dashboard-level parameters drive user interaction.

o Free-form layout designer for customized dashboard design.[12]

2.12 Legalization of Paper (Secure Document)

CVM paper products are protected by a variety of overt (obvious) and covert (unknown) security features. Depending upon the intended application, Protected Paper's layered approach to printing includes a combination of the base paper stock, custom artwork, patented Authentic Guard technologies, use of security inks, as well as a variety of finishing techniques. The writer combines these anti-copy and alter-resistant techniques to provide a product that is both effective and affordable.

Protected Paper's team of research and development experts continually evaluate and upgrade our technologies to ensure that they remain among the strongest in the industry. Below is a listing of these security features, accompanied with a brief description of each.[13]


(37)

Base Paper Stock

Our initial defense against counterfeiting and document alteration starts at the paper mill. Most any of our paper products are printed on a laser compatible base security paper that is UV dull, with invisible fluorescent fibers (detectable under an ultraviolet light source) and chemical sensitivity to solvents (stains or multi-language "VOID" messages appear if the document is altered). If and when required, we can also offer fully customized and Fourdrinier watermark papers.[13]

Pantograph 4000

(Original) (Attempted B&W Copy /Fax) (Attempted Color Copy / Scan)

Picture 2.1 Pantograph 4000 Legal paper

All of company paper products are protected by AuthentiGuard Pantograph 4000. This patented technology involves the printing of hidden text messages ("VOID", "COPY", "UNAUTHORIZED COPY",


(38)

etc.) into the background of a document. Text information or other artwork is placed onto this paper. Then, when this "original" is copied of scanned, the hidden word pattern becomes visible on the duplicate. The end result a clearly distinguishable copy that cannot pass off as the original.[13]

Block out

(Original) (Attempted Color Copy / Scan) Picture 2.2 Block out Legal paper


(39)

This anti-copy technology is meant to provide protection against high-end color copiers and scanning devices. Patented Block out designs are embedded into original artwork, photographs and other important information that requires protection against unauthorized duplication. Block out technology can be placed on most any type of printable substrate, making it ideal for a multitude of applications including ID cards, product warranties, discount coupons, commercial photo proofing and ticketing..[13]

Prism

Picture 2.3 Prism Legal paper

AuthentiGuard Prismis a cost effective and convenient method of determining the authenticity types of printed of various material. vital records, dollar-off coupons, identification documents, tickets and most any other application that might require immediate on-site authentication. Our patented Prism technique embeds hidden words, images, or logos into the original artwork, using a two or 4-color printing process. These images


(40)

only become visible using our Authenticator device a proprietary lens that reveals the hidden Prism messages. Customizable and low cost, AuthentiGuard's Prism technology cannot be reproduced or duplicated with even the most sophisticated digital copiers or scanners. .[13]

Custom Borders and Background Art

Picture 2.4 Custom Borders and Background Art

Our design team has access to a full range of Guilloche (bank note quality) border and background designs that not only adds a touch of elegance to your document, but also provides an additional layer of security against illegal copying, as this computer-generated fine-line artwork is extremely difficult to capture and reproduce - plus all of these designs are fully customizable. .[13]


(41)

Heat-Sensitive Security Ink

Picture 2.5Heat-Sensitive Security Ink

Used in combination with an overt warning band, we make use of Thermo chromic security ink. These heat-reactive formulations are made to either disappear or change colors at a trigger temperature of 88F (32C). Authentication is quick and easy. Simply rub the document in the protected area and if this reaction does not occur, you know there's a problem. .[13]


(42)

Erasable Ink

Picture 2.6Erasable Ink

This specialty ink is used in the background designs on most every document that we manufacture. When applied properly, this ink will disappear when an eraser is used in an attempt to change the variable information that is printed or handwritten onto the document. To prevent illicit alternations on any document, this is likely your best protection available. .[13]


(43)

Coin Activated Ink

Picture 2.7Coin Activated Ink

True watermark (also known as Fourdrinier watermark) paper is very expensive, especially if requiring full customization. Our artificial watermark serves the same purpose of authentication, but is significantly less expensive. Also is easily customizable. Usually placed on the backside of the document, this step-and-repeat image is invisible to the eye, until scratched with a coin, at which time the artwork turns black. .[13]


(44)

2.13 Contactless smart card

A contactless smart card is any pocket-sized card with embedded integrated circuits that can process and store data, and communicate with a terminal via radio waves. There are two broad categories of contactless smart cards. Memory cards contain non-volatile memory storage components, and perhaps some specific security logic. Contactless smart cards do not contain an ordinary read-only RFID, but they do contain a re-writable smart card microchip that can be transcribed via radio waves. The first contactless smart card was the Octopus card introduced in Hong Kong in 1997 for the territory's mass transit system.[14]

2.13.1 Benefits of Contactless Smart Cards

Contactless smart cards can be used for identification, authentication, and data storage. Contactless smart cards provide a means of effecting business transactions in a flexible, secure, standard way with minimal human intervention.

Contactless smart card readers use radio waves to communicate with, and both read and write data on a smart card. When used for electronic payment, they are commonly located near PIN pads, cash registers and other places of payment. When the readers are used for public transit they are commonly located on fare boxes, ticket machines,


(45)

turnstiles, and station platforms as a standalone unit. When used for security, readers are usually located to the side of an entry door. [14]

Supported Applications

o The CardMan® 5321 allows users to experience Convenience, speed, and security of contactless.

o Technology for applications including log-on to Windows®, networks, websites, or the secure Storage of user names, passwords, and personal Information.

o The use of contactless smart card.

o Technology for PC-linked applications is limited only to your imagination.[15]

Contactless Smart Cards Supported

o The CardMan® 5321 is based on a 13.56 MHz

o Contactless smart card interface that is compliant ISO specifications 14443 A and B and 15693.

o The reader works with a variety of 13.56 MHz Contactless smart cards including, but not limited to:

o Philips: MIFARE®, DESFire®, MIFARE ProX®, SMART MX, and i.code[15]


(46)

2.14 Radio frequency identification (RFID)

Radio frequency identification (RFID) is a method of remotely storing and retrieving data using devices called RFID tags. An RFID tag is a small object such as an adhesive sticker, that can be attached to or incorporated into a product. RFID tags contain antennae to enable them to receive and respond to radio frequency queries from an RFID transceiver. [14]

History of RFID tags

Although some people think that the first known device may have been invented by Leon Theremin as an espionage tool for the Russian Government in 1945, the first real usage of RFID devices predates that. During World War II the United Kingdom used RFID devices to distinguish returning English airplanes from inbound German ones. RADAR was only able to signal the presence of a plane, not the kind of plane it was. [14]

The RFID System

An RFID system may consist of several components: tags, tag readers, tag programming stations, circulation readers, sorting equipment, and tag inventory wands. Security can be handled in two ways. Security gates can query the ILS to determine its security status or the tag may contain a security bit which would be turned on and off by circulation or self-check reader stations.


(47)

The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. The use of RFID in tracking and access applications first appeared during the 1980s. RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive - and invasive - uses for RFID tags are in the works. [14]

In a typical RFID system, individual objects are equipped with a small, inexpensive tag which contains a transponder with a digital memory chip that is given a unique electronic product code. The interrogator, an antenna packaged with a transceiver and decoder, emits a signal activating the RFID tag so it can read and write data to it. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing. Security gates can then detect whether or not the item has been properly checked out of the library. When users return items, the security bit is re-set and the item record in the ILS is automatically updated. In some RFID solutions a return receipt can be generated. At this point, materials can be roughly sorted into bins by the return equipment. Inventory wands provide a finer detail of sorting. This tool can be used to put books into shelf-ready order. [14]


(48)

Low -frequency RFID tags are commonly used for animal identification, beer keg tracking, and automobile key-and-lock, anti-theft systems. Pets are often embedded with small chips so that they may be returned to their owners if lost. In the United States, two RFID frequencies are used: 125kHz (the original standard) and 134.5kHz, the international standard.

High-frequency RFID tags are used in library book or bookstore tracking, pallet tracking, building access control, airline baggage tracking, and apparel item tracking. High-frequency tags are widely used in identification badges, replacing earlier magnetic stripe cards. These badges need only be held within a certain distance of the reader to authenticate the holder. [14]

2.14.1 RFID Benefit

Here is a quick checklist of several benefits that can be achieved with RFID solutions:

1. Reduce warehouse and distribution labor costs

Replace the point and read labor-intensive operation of tracking pallets, cases, cartons and individual products with sensors that can track these items anywhere in the facility with pin-point accuracy. This can reduce the high labor costs and service fees of regular stock management and store shelf inventory.


(49)

2. Reduce point-of-sale labor costs

With RFID-enabled products, checkout can be completed with a quick scan of all items in cart helping to reduce point-of-sale labor costs. The current scan-it-yourself component of self-service checkout can be improved, helping to improve adoption, reduce self-service checkout times and reduce fraud.

3. Reduce inventory

Inventory accuracy is important to helping eliminate excess/missing inventory, losses and write downs. With RFID, inventory errors can be reduced so that the company can be assured that the inventory indicated is the actual inventory available.

4. Improve forecasting and planning

Visibility improvements throughout the supply-chain can help to improve the forecasting capabilities to help better track where inventory is and what is happening to it throughout the supply chain.

5. Reduce theft

Losses due to theft are estimated to cost retailers over $30 billion per year and are estimated conservatively at 1.5% of overall sales. With RFID, products can be tracked through the supply chain to pinpoint where a product is and eliminate inventory errors that can cause shipments to go missing, or to better find where and when in the process the product was


(50)

lost. Within the retail store, RFID can and has been successfully deployed, particularly on higher margin items, to help prevent theft.

6. Reduce out-of stock conditions

When an item is out of stock the customer is often left disappointed, either avoiding the purchase altogether common in grocery stores where as much as 4% of their revenue is lost each year due to out-of-stock conditions or worse, the customer moves on to a competitor in order to source the product. Eliminating out-of-stock conditions via better RFID product tracking and inventory visibility and forecasting, such as alerting the store staff immediately when the last item leaves the shelf, can have an immediate top-line revenue impact and have residual effects by improving customer service and satisfaction.

7. Improve customer experience

With RFID, items in a cart can be tracked and if a high-tech cart or kiosks are part of the shopping experience, offers can be made automatically related to the items such as dynamic up-sell/cross-sell of useful or necessary accessories. [14][15]


(51)

2.14.2 Common Problems with RFID

Some common problems with RFID are reader collision and tag collision. Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem. Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time. See Problems with RFID for more details.[14]

2.15 About Certificate Vending Machine

Vending machines are coin-operated machines that can dispense snacks, drinks, sandwiches, coffee, tea and other products. Vending machines are an extremely convenient outlet for the industry known as automatic retailing. You might find vending machines in public buildings, transportation hubs and subways, at gas stations, courthouses, hospitals, and the local automotive repair shop. Any place that people gather, pass by, or must wait, is a good location for vending machines.

Vendors that install vending machines take care of keeping them supplied and operating properly. In return for revenue collected, the vendor pays a monthly fee to the owner of the property at the installation site. This arrangement benefits everyone vendor, property owner, and consumer alike.


(52)

Though vending machines provide service to the public, not everyone is pleased in all cases with their offerings. Many school districts came under fire in the United States for providing vending machines on school grounds that offered high-sugar, low nutrient snacks and drinks. The vending machines’ contents were cited as a possible aggravating factor to potential teenage medical concerns regarding obesity and diabetes. As a result, several schools districts switched to vending machines that offered healthier alternatives.

Most modern vending machines are tested and designed to inhibit theft, with security measures resulting in designs similar in strength to safes. As a result, the machines can be very heavy. One issue with vending machines, particularly mechanical vending machines, involves the use of coins of foreign currency, or, in more extreme cases, worthless tokens or washers, which have the same size and shape as the coin accepted by the machine. This is done to pay less for merchandise, and sometimes in order to get change that has more value than the originally inserted object. Vending has gone through significant changes. Many machines are still evolving to become able take credit cards and companies are beginning to obtain the capability of monitoring a machine's state from afar.


(53)

2.15.1 Variety Kind of Vending Machine

Coin Vending Machines:

 Invention of the first vending machine is credited to Hero of Alexandria circa 215BC. His vending machine accepted a coin and dispensed holy water in return.

 A coffee vending machine is a coin operated, automatic dispenser of paper cups filled with one or more different types of coffees. The machines are usually quite large and rectangular in shape like most vending machines. [16]

Food Vending Machines:

 Depending on where someone is placing the machine, it may be possible to sell a number of more unusual items to turn the vending machine into a destination rather than just a convenience. Vending machines are not limited to foods and beverages and can also be used to sell toys, home supplies, and other small items.

 A coffee vending machine may be placed in a row with other types of food and beverage machines. Some vending machines dispense water and soda, while others offer snacks such as potato chips and candy bars. [16]


(54)

Beverage Vending Machines:

 Depending on where someone is placing the machine, it may be possible to sell a number of more unusual items to turn the vending machine into a destination rather than just a convenience. Vending machines are not limited to foods and beverages and can also be used to sell toys, home supplies, and other small items.

 A coffee vending machine may be placed in a row with other types of food and beverage machines. Some vending machines dispense water and soda, while others offer snacks such as potato chips and candy bars. [16]

Drinks Vending Machines:

 Many school districts came under fire in the United States for providing vending machines on school grounds that offered

high-sugar, low nutrient snacks and drinks. The vending machines’

contents were cited as a possible aggravating factor to potential teenage medical concerns regarding obesity and diabetes.

 Food vendors and customers alike can benefit from the use of automated machines; whenever a person gets a snack from a vending machine, uses the whipped coffee machine at the local convenience store, or fills his own drink at a soda fountain in a fast food restaurant, he is using an automated machine. [16]


(55)

Coffee Vending Machines:

 In 1960, a bean grinder became a part of many coffee vending machines, while 1991 saw the addition of different coffees being available by machine. These coffees include espresso, cappuccino and flavored varieties. A coffee vending machine may be placed in a row with other types of food and beverage machines.

 Vending machines are coin-operated machines that can dispense snacks, drinks, sandwiches, coffee, tea and other products. Vending machines are an extremely convenient outlet for the industry known as automatic retailing. [16]

Snack Vending Machines:

 No kidding, you are twice as likely to die being crushed by a falling vending machine than being eaten by a shark. The odds of being a shark snack are about 1 in 252 million, but the odds of being crushed while purchasing a frosty soda are about 1 in 112 million.

 Each of these approaches has different rules and costs, so being familiar with these options is very important. Starting a vending machine business also involves figuring out where a person will put the machines. [16]


(56)

Candy Vending Machines:

 Here you can find a wide variety of items for sale through vending machines, from underwear to compact discs and jewelry. Some major manufacturers of vending machines include Automatic Products, Crane National, Dixie-Narco Inc., Glasco Polyvend Lektrovend (GPL), Royal Vendors, and U Select It.

 In 1888, the United States began dispensing gum and small toys in vending machines before later using them mainly for candy, potato chips, soda and coffee. [16]

Cigarette Vending Machines:

A cigarette machine is a vending machine that takes cash in payment for packets of cigarettes. Vending machines often dispense packs containing 16 or 18 cigarettes, although the dimensions of the packaging are the same as the equivalent pack containing 20. [16]


(57)

2.15.2 The Difference between Snack Machine and Automated Vending Machine

A snack machine dispenses items like candy, gum, peanuts, cookies, sandwiches and other supplements to lunch or dinner. A vending machine will mix coffee, tea, soup, hot chocolate and other liquid supplements. Other vending machines sell cigarettes, sundry items (tissues, combs, nail clippers, etc.) and flowers. Still others will make change while the ultimate (the ATM) allows you the borrow money from your bank 24 hours per day which our certificate vending machine talk

about it and it’s similar to the ATM. [16]

2.16 Digitized Signature

A digitized signature (not to be confused with a digital certificate) is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later.

A digitized signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact.[17]


(58)

2.17. Touch Screen Concept

A touch screen is a computer display screen that is also an input device. The screens are sensitive to pressure; a user interacts with the computer by touching pictures or words on the screen.

There are three types of touch screen technology:

Resistive: A resistive touch screen panel is coated with a thin metallic electrically conductive and resistive layer that causes a change in the electrical current which is registered as a touch event and sent to the controller for processing. Resistive touch screen panels are generally more affordable but offer only 75% clarity and the layer can be damaged

 by sharp objects. Resistive touch screen panels are not affected by outside elements such as dust or water.

Surface wave: Surface wave technology uses ultrasonic waves that pass over the touch screen panel. When the panel is touched, a portion of the wave is absorbed. This change in the ultrasonic waves registers the position of the touch event and sends this information to the controller for processing. Surface wave touch screen panels are the most advanced of the three types, but they can be damaged by outside elements.[18]

Capacitive: A capacitive touch screen panel is coated with a material that stores electrical charges. When the panel is touched, a small amount of charge is drawn to the point of contact. Circuits located at each corner of the panel measure the charge and send the information to the controller for


(59)

processing. Capacitive touch screen panels must be touched with a finger unlike resistive and surface wave panels that can use fingers and stylus. Capacitive touch screens are not affected by outside elements and have high clarity.

Touch screen monitors are no longer confined to bar video games as novelty items. Today, they can be found in many stores as part of cash registers, in car dashboards and on many portable computers. With the growing popularity of touch screen enabled Palm Pilots and other PDAs, many people even have one in his or her pocket at all times.

2.17.1 The touch screen benefit

The benefits of such technology are obvious. Rather than lugging along extra input devices such as a mouse or a keyboard, the user need only his finger to manipulate the chosen device. But it's not just mobile devices that benefit from this type of input. All kinds of devices can be equipped, including TV and computer monitors, LCD screens, and the older CRT computer monitors. As a result, a bartender can press on a screen to ring up drinks on a busy night rather than type in a price, a nurse can input patient information with one hand. Truly, the possibilities with touch screen monitors are endless.[18]


(60)

2.18 Barcode Concept What is a Barcode?

A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location. The code uses a sequence of vertical bars and spaces to represent numbers and other symbols. A bar code symbol typically consists of five parts: a quiet zone, a start character, data characters (including an optional check character), a stop character, and another quiet zone.[19]

A barcode reader is used to read the code. The reader uses a laser beam that is sensitive to the reflections from the line and space thickness and variation. The reader translates the reflected light into digital data that is transferred to a computer for immediate action or storage. Bar codes and readers are most often seen in supermarkets and retail stores, but a large number of different uses have been found for them. They are also used to take inventory in retail stores; to check out books from a library; to track manufacturing and shipping movement; to sign in on a job; to identify hospital patients; and to tabulate the results of direct mail marketing returns. Very small bar codes have been used to tag honey bees used in research. Readers may be attached to a computer (as they often are in retail store settings) or separate and portable, in which case they store the data they read until it can be fed into a computer.


(61)

When you purchase an item from any store, you will notice a label with thin, black lines across it, along with a variation of different numbers. This label is then scanned by the cashier, and the item's description and price automatically come up. The word for this is called a barcode, and it is used to read data and information based upon the widths of those small black lines. The barcode has many uses, although most of us think of them as simply a way to price items in the grocery or department store. Barcodes are becoming more and more common in just about every facet of consumer life. For example, car rental companies now identify their rental vehicles by using a barcode. Your luggage gets assigned a barcode when you check it into the airport in order to assure more accuracy when it comes to keeping track of it. Even driver's licenses today have barcodes on them in most states. Medicine prescriptions, library books, and tracking different shipments are also other ways that a barcode can be used. [19]

So what exactly is a barcode? The technical definition for a barcode is a machine readable form of information on a scan able, visual surface. They are also often known as UPC codes. The barcode is read by using a special scanner that reads the information directly off of it. The information is then transmitted into a database where it can be logged and tracked. Merchandisers and other companies must pay an annual fee to an organization called The UCC, or Uniform Code Council, who then generates special barcodes specific to that particular company. Each number on a barcode has a special meaning, and often these numbers are added, multiplied, and divided in some formula that gives them each


(62)

their own special individuality. Barcodes are very useful for maintaining accurate information about inventory, pricing, and other important business-related data.

Different companies' barcodes use a different amount of number and bar combinations. Some of the larger manufacturers will have a longer number, but this goes much deeper than how many numbers are listed. Every single number on a barcode has a meaning. For example, if the barcode number starts with a 0, then it is what's known as a standard UPC number. If the number begins with a 1, then it is what's called a "random-weight item", meaning the price of the item will depend on its weight. This is typically applied to such things as meats, fruits, or vegetables. If an item starts with the number 3, it is a pharmaceutical. There are several other variations of these numbers, and each one represents something different. If a coupon is used that has a barcode, information goes through a system that links that coupon and its value to the item previously scanned, and then the amount is automatically deducted. A complex computerized system reads every single barcode that is scanned, but these barcodes are system-specific depending on what company they belong to. There are ways the average consumer can "decode" a barcode if they know what to look for and are familiar with the variations of numbers. Barcodes make our lives much more efficient, and shopping much faster. [19]


(63)

2.19 PostgreSQL

According to Neil Mathew and Richard Stones(2005:11), PostgreSQL actually is a DBMS that incorporates the relational model for its databases and supports the SQL standard query language. PostgreSQL also happens to be very capable and very reliable, and it has good performance characteristics. It runs on just about any UNIX platform, including UNIX-like systems, such as FreeBSD, Linux, and Mac OS X. It can also run on Microsoft Windows NT/2000/2003 servers, or even on Windows XP for development. PostgreSQL can be compared favorably to other DBMSs. It contains just about all the features that you would find in other commercial or open-source databases, and a few extras that you might not find elsewhere.

PostgreSQL features (as listed in the PostgreSQL FAQ) include the following:

• Transactions • Subselects • Views

• Foreign key referential integrity • Sophisticated locking

• User-defined types

• Inheritance • Rules


(64)

2.20 Unit Testing

Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation. Unit testing is often automated but it can also be done manually. This testing mode is a component of Extreme Programming (XP), a pragmatic method of software development that takes a meticulous approach to building a product by means of continual testing and revision.

Unit testing involves only those characteristics that are vital to the performance of the unit under test. This encourages developers to modify the source code without immediate concerns about how such changes might affect the functioning of other units or the program as a whole. Once all of the units in a program have been found to be working in the most efficient and error-free manner possible, larger components of the program can be evaluated by means of integration testing. Unit testing can be time-consuming and tedious. It demands patience and thoroughness on the part of the development team. Rigorous documentation must be maintained. Unit testing must be done with an awareness that it may not be possible to test a unit for every input scenario that will occur when the program is run in a real-world environment.[22]


(65)

2.21 White Box

In software development, White-box testing (a.k.a. clear box testing, glass box testing, transparent box testing, or structural testing) is a method of testing software that tests internal structures or workings of an application, as opposed to its functionality. In white-box testing an internal perspective of the system, as well as programming skills, are required and used to design test cases

Picture 2.8White Box

2.22 Related Works

A numbers of previuos studis has been conducted on developing certificate vending machine, by using this references and related works the research will be more strong and acceptable. below the writer has mentioned them,

2.1 Related Work Table

Title Author summary Methodology

Automation Coffee machines, (vending machines), microwaves.[29] Robin Bloor 2005

System technology in the coffee vending business, is a provider of a unique entrepreneurial

opportunity and a master distributor of Necta, Progema and Avalon.

The writer use XP

methodology because User involve in application development and System processing time is short


(66)

Digital Vending Machine a web vending machine which delivers digital products[30] John G. Derrickson 2003

This protected work describes a vending machine which delivers digital products (and physical products too), uses the XP specification, is open-source, and handles the entire process, from product details, billing and shipping information to payment validation and product delivery.

Vending Machine (VM) required extreme

programming (XP) to emphasize pragmatism over computer science. Every possible shortcut was employed and features not immediately needed were postponed. XP equals KISS. Incidentally, the extreme programmer and the extreme manager were in complete agreement throughout the project. Development of Vending Machine Heating and Cooling of Beverage[31] Arne Jakobsen and Torgeir Skiple 2006

A system for heating and cooling of beverage in a three compartment Japanese type vending machine has been designed, installed and tested in a calorimetric test chamber.

Experimental tests have been performed in three different operational Pull-down (Cooling of beverage), pull up

(heating of beverage) and power consumption test

In this system the teams emphasize simply-written, object-oriented code that meets requirements. XP teams put small code releases into production early

Programmers work side by side in pairs, continually seeing and discussing

each other’s code.

Development of vending machine with prepaid payment method[32] Amar Safuan Bin Alyusi 2008

The objectives in this project are developing a vending

machine and then insert a new payment method proposed into it. The system builds

using plunger as a new design that insert into each funnel in vending machine. The

plunger control by circuit that been built using parallel port and attached to the computer.

This system use Extreme Programming because All programmers have

collective ownership of the code and the ability to change it

It useful for this system as long as the integration exist between systems

The XP Cycle is faster than Spiral Cycle thus the developer can more consider about coding and times.


(67)

Development of Vending Machine with Ice Shaving and Flavor Topping Functions.[33] Hamamoto Ken'ichi and Wada Masayuki 2003

A cup-type vending machine, equipped with a mechanism for supplying frozen beverages into which ice shavings have been mixed and a

mechanism for sprinkling toppings such as

powdered cinnamon, has been developed for the first time. New beverages will invigorate the

vending machine market and the ability to create new beverages from existing ingredients will lead to greater sales and higher profits

Programmers must follow a common coding standard so all the code in the system looks as if it was written by a single individual. XP will allows the developer to follow the flowchart easier than spiral, its move fast and can change the requirement System for Environmental Impact Evaluation of Vending Machines and Approach to Development Kimura Yukio, 2004

As the results, we have found several factors to work on them. With the aid of these evaluation systems, we hope to create vending machines that are even more ecologically friendly to the environmentally conscious designs and, ecological and economy development of vending machine.

In this system vending machine was developed by extreme programming, the fast result was conducted inside this project, extreme programming by focusing on coding make better flow process. Quality Keeping Mechanism for Drinks in Vending Machines. Tamura Yoshitada, 2002

The vending machine result are "sold-bottle heating system" that heats a sold bottle from a cold or normal state, "keeping system in two stages" that limits the number of bottles kept heated, and "the number-of-bottles control system" that in advance controls the number of bottles to be heated according to selling conditions.

Quality mechanism for drinks vending machine uses the extreme

programming.

Using pair programming technology and work side by side in pairs, continually seeing and discussing the codes.


(68)

CHAPTER III

RESEARCH METHODOLOGY

3.1 Research Methodology

In essence, the research is a way of so many ways which is pursued to get the truth. To get the truth it is done through scientific methods. So, it’s not excessive if the method is called as strategies in scientific research [23]

3.1.1 Data Collection Techniques

Data collection techniques taken are as follows:

Good requirements start with good sources. Finding those quality sources is an important task and, fortunately, one that takes few resources. Examples of sources of requirements include: [24]

 Customers  Users

 Administrators and maintenance staff  Partners

 Domain Experts  Industry Analysts


(69)

3.1.2 Requirements Gathering Techniques

After you have identified these sources, there are a number of techniques that may be used to gather requirements. The following will describe the various techniques, followed by a brief discussion of when to use each technique.

To get the requirements down on paper, you can to do one or more of the following:

 Conduct a brainstorming session  Interview users

 Send questionnaires

 Work in the target environment  Study analogous systems

 Examine suggestions and problem reports  Talk to support teams

 Study improvements made by users

The best idea is to get the requirements down quickly and then to encourage the users to correct and improve them. Put in those corrections, and repeat the cycle. Does it now, keep it small, and correct it at once. Start off with the best structure you can devise, but expect to keep on correcting it throughout the process. Success tips: Do it now, keep it small, and correct it immediately. [24]


(1)

149

References

[1] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter 7] 2005

[2] Lars Mathiassen, Object-oriented Analysis & Design [Paperback] 2000

[3] Jeffrey Whitten, Lonnie Bentley, Systems Analysis and Design Methods [Hardcover] 2008 [4] Ladjamudin B, Al-Bahra. Konsep Sistem Informasi. Jakarta 2008

[5] John Lancaster Basic Concepts of Information Technology: ECDL - the European PC standard (European Computer Driving Licence) [Paperback]

[6]John Lewis, Peter DePasquale, Programming with Alice and Java 2008

[7] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter 2] 2005

[8] Online source from official website of UIN JAKARTA (http://www.uinjkt.ac.id) 2011 [9] Online source from official website of The International Council on Systems Engineering (INCOSE) (http://www.incose.org) 2011

[10] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter10] 2005

[11] Online source from official website of JAVA, (http://www.java.com/) 2011 [12] Online source from official website of Jasper, (http://jasperforge.org/) 2011

[13] Refer to, Copyright © 2007 Protected Paper A Division of Document Security Systems, Inc.. All Rights Reserved.| (http://www.protectedpaper.com/category_s/17.htm)

[14] John Wiley, RFID and Contactless Smart Card Application 2005 [15] Philips semiconductors, Mifare Standard Card IC 2001

[16] Online Source from wikipedia website (http://en.wikipedia.org/wiki/Vending_machine) 2011


(2)

150

[18] Online source from official website of TouchScreen (http://www.touchscreens.com/) 2011 [19] Took from official websites, http://www.barcode.com/ | http://indobarcode.com/ |

http://en.wikipedia.org/wiki/Barcode

[20] Gregory Smith, PostgreSQL 9.0 High Performance 2010 [21] Richard Stone Beginning Databases with PostgreSQL, 2001 [22] Took from (http://en.wikipedia.org/wiki/Unit_testing) |

(http://en.wikipedia.org/wiki/Black_box) | (http://www.blackbox.com) and other websites 2011 [23] Subana, moersetyp Rahadi, dan Sudrajat, statistik pendidikan. bandung CV Pustaka setia, 2005

[24] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter7] 2005

[25] Online Source from official website of Extreme Programming, (http://www.extremeprogramming.org) | (http://www.agile-process.org/)

[26] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter4] 2005

[27] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition 2005 [28] Roger S.Pressman, Software Engineering: A Practitioner's Approach 6th edition [chapter13, 14, 29] 2005

[29] Online source from http://www.havemacwillblog.com/2005/09/office-automation-extreme-programming-linux/ and http://www.cudacoffeevending.com/

[30] Online source from http://www.freeveda.org/DigitalVendingMachine/dvm_1_004.htm [31] Arne Jakobsen and Torgeir Skiple, Development of Vending Machine Heating and Cooling of Beverage 2006

[32] http://umpir.ump.edu.my/193/ Amar Safuan Bin Alyusi, Development of vending machine with prepaid payment method, 2008


(3)

VALIDATION PAGE

A Study at Developing Certificate Vending Machine by using

Student Card (Smart Card)

(Case Study: UIN Syarif Hidayatullah Jakarta)

Thesis

As one of requirement to obtain a Bachelor Degree of Informatics Engineering Faculty of Science and Technology

UIN Syarif Hidayatullah Jakarta

By:

HOSSEIN HOSSEINI FARID 107091103916

Approved by,

Supervisor I Supervisor II

Huni Teja Sukmana, Ph.D NIP. 19771030 200112 1 003

Feri Fahrianto, M.Sc NIP.19800829 201101 1 002

Knowing,

Head of Informatics Engineering

Yusuf Durachman, M.Sc, MIT NIP. 19710522 200604 1002


(4)

(5)

x

List of Picture

Picture 2.1 Pantograph 4000 Legal paper... 23

Picture 2.2 Block out Legal paper... 24

Picture 2.3 Prism Legal paper... 25

Picture 2.4 Custom Borders and Background Art... 26

Picture 2.5 Heat-Sensitive Security Ink... 27

Picture 2.6 Erasable Ink... 28

Picture 2.7 Coin ActivatedInk ... 29

Picture 2.8 White Box... 51

Picture 3.1 Steps of Extreme Programming... 57

Picture 3.2 Research Workflow... 64

Picture 4.1 The current system for printing Surat Keterangan... 71

Picture 4.2 The current system for printing Transkip Nilai... 72

Picture 4.3 The current system for printing Surat IPK & IPS... 73

Picture 4.4 The purpose system for printing Surat Keterangan... 76

Picture 4.5 The purpose system for printing Transkip Nilai... 78

Picture 4.6 Use Case Diagram for CVM... 125

Picture 4.7 Activity diagram for printing Surat in Certificate Vending Machine... 129

Picture 4.8 Sequence diagram for printing Surat in Certificate Vending... 131

Picture 4.9 CVM Class Diagram... 133

Picture 4.10 History-cvm table... 134


(6)

xi

Picture 4.12 Setting surat cvm table... 135

Picture 4.13 Simpan-barcode table... 135

Picture 4.14 Relational Database... 136

Picture 4.15 Introduction page... 136

Picture 4.16 Login page... 137

Picture 4.17 Language Selection... 137

Picture 4.18 Menu Surat Selection... 138

Picture 4.19 Total Print Page... 138

Picture 4.20 Pantograph 4000 Paper... 145