An Integrated Mobile Web Solution for Gaya Hidup Sehat Tabloid: The Implementation of Mobile Application - Binus e-Thesis
BINUS INTERNATIONAL
UNIVERSITAS BINA NUSANTARA
Major Computer Science Sarjana Komputer Thesis
Semester [Even] year 2007
AN INTEGRATED MOBILE WEB SOLUTION FOR GAYA HIDUP SEHAT
(GHS) TABLOID
Probosetyo Krishnadammananda Thioleu (0700713940)
Abstract
The thesis is about creating the mobile application for Gaya Hidup Sehat (Senior) tabloid as the complimentary application in order to get up to date with the current technology. Internet has become popular nowadays and it can be used as the media to popularize the tabloid among the Internet user. However, the current application can only be accessed by users who have computer and Internet connection, which means that it is lack of efficiency.
With the mobile application that we proposed, we seek to have GHS to be more widely accessed by the users as it can be accessed through the mobile devices. It will add more efficiency and effectiveness as people can use the application anytime and anywhere without any burden of time and place. In constructing the whole application, we implement the RAD methodology (Rapid Application Development) as our software development methodology. The reason we choose this methodology is because of the condition of our thesis that is limited of time but potential to have some changing of scope or requirements during the development of the application.
In conclusion, an integrated mobile web solution is a better approach for the current system in GHS and it is also expected that the GHS system will be more widely used in the future.
Key words
PREFACE
We would like to gratitude all parties who helped us in finishing this thesis punctually.This thesis creates an integrated mobile web solution for the Gaya Hidup Sehat (GHS) tabloid. This thesis is created as a compulsory in order to graduate from Bina Nusantara University and to gain Sarjana Komputer degree majoring in Computer Science.
The objective of the thesis is to apply what we have learned during our study in university. We also would like to thank to several persons who have, directly or indirectly, help us to finish this thesis:
1. Mr Tri Asih Budiono, MIT, our supervisor, who gives us with the idea about how to finish this thesis in a good way and give feedback and opinion regarding our thesis.
2. Mr Raymondus Kosala, Phd, our co-supervisor, who also helps us in solving the problems we face within development period and giving useful ideas.
3. Mr. Puri, the IT manager of GHS, who allows us to create this thesis within GHS and always gives opinion and requirements within development phase.
4. Friends, who helped us directly or indirectly throughout this thesis In conclusion, we hope that our thesis could be an example of development in information technology as the implementation of what we have studied in this campus.
Jakarta, July 2007
Table of Contents
COVER PAGE ................................................................................................................. I
ABSTRACT...................................................................................................................... V
PREFACE.......................................................................................................................VI
TABLE OF CONTENTS ............................................................................................. VII
LIST OF FIGURES ....................................................................................................XIII
LIST OF TABLES ...................................................................................................XVIII
CHAPTER 1 .....................................................................................................................2
INTRODUCTION ............................................................................................................2 ACKGROUND1.1 B ...........................................................................................................2
1.2 P ERCEIVED P ROBLEM ................................................................................................2
1.3 P ROPOSED S OLUTION ................................................................................................3
1.4 S COPE ........................................................................................................................4
1.5 A
IM AND B ENEFITS ....................................................................................................5 TRUCTURE
1.6 S ...............................................................................................................6
CHAPTER 2 .....................................................................................................................8
THEORETICAL FOUNDATION ..................................................................................82.1 J AVA ..........................................................................................................................8
2.1.1 Java Language ..................................................................................................8
2.1.2 Java Virtual Machine (JVM) .............................................................................9
2.1.4 Java Application Program Interface (Java API) ............................................10
2.1.5 Java Development Kit (JDK) ..........................................................................11
2.1.6 NetBeans IDE ..................................................................................................12
BJECT RIENTED2.2 O -O ..................................................................................................12
2.2.1 Inheritance ......................................................................................................13
2.2.2 Encapsulation..................................................................................................13
2.2.3 Polymorphism..................................................................................................13
2.2.4 Interface ..........................................................................................................14
2.2.5 Thread .............................................................................................................14
2.3 D ATABASE ...............................................................................................................14
2.3.1 Entity Relationship (ER) Model ......................................................................15
2.3.2 Entity, Attribute and Relationship ...................................................................15
2.3.3 MySQL .............................................................................................................16
ENERAL ACKET ADIO ERVICE2.4 G P R S (GPRS) ............................................................16
2.5 J2ME.......................................................................................................................17
2.5.1 Profiles ............................................................................................................18
2.5.1.1 Mobile Information Device Profile (MIDP) ............................................18
2.5.2 Configuration ..................................................................................................19
2.5.3 CLDC and Java Virtual Machine....................................................................19
2.5.4 Virtual Machine and Language Features .......................................................20
2.5.4.1 Class Loading...........................................................................................20
2.5.4.2 Security Features......................................................................................21
2.5.4.2.2 Access to Native Code ..........................................................................22
2.5.4.2.3 Class Verification..................................................................................22
2.5.5 The CLDC Class Libraries..............................................................................23
2.6 M OBILE
I NFORMATION D EVICE P ROFILE (MIDP) ...................................................27
2.6.1 MIDP Specification .........................................................................................28
2.6.2 MIDP Hardware Requirements ......................................................................29
B. DISPLAY....................................................................................................................29
2.6.3 MIDP Software Requirements.........................................................................29
2.6.4 MIDlet States and Lifecycle ............................................................................30
2.6.5 MIDlet User Interface .....................................................................................32
2.6.5.1 Display and Displayable Classes..............................................................33
2.6.5.2 High – Level User Interface API..............................................................34
2.6.5.3 The Low-Level User Interface API..........................................................39
2.6.5.4 Multithreading and the User Interface .....................................................42
2.6.5.4.1 Serialization of User Interface Events...................................................42
ECORD ANAGEMENT YSTEM
2.7 R M S (RMS).................................................................43
2.8 M OBILE A PPLICATION .............................................................................................43
2.9 R APID A PPLICATION D EVELOPMENT (RAD) ...........................................................43
2.10 D ATA F LOW D
IAGRAM (DFD) ..............................................................................45
2.10.1 Context Diagram...........................................................................................45
2.10.2 System Flowchart ..........................................................................................45
2.10.3 Use Case........................................................................................................46
2.11 M ODEL
3.5 E
4.2.3 Detailed Data Flow Diagram Level 2.............................................................61
4.2.2 Detailed Data Flow Diagram Level 1.............................................................59
4.2.1 Context Diagram.............................................................................................58
IAGRAM ............................................................................................58
4.2 D ATA F LOW D
4.1.2 Procedure ........................................................................................................57
4.1.1 Policy...............................................................................................................56
4.1 T HE P ROPOSED P OLICY AND P ROCEDURES ..............................................................56
CHAPTER 4 ...................................................................................................................56
SOLUTION DESIGN ....................................................................................................563.6 A LTERNATIVE S OLUTIONS .......................................................................................54
...............................................................................................53
ROBLEMS
P
XISTING
3.4.2 System Flowchart ............................................................................................53
V IEW C ONTROLLER (MVC) A RCHITECTURE ............................................46
3.4.1 Data Flow Diagram ........................................................................................52
IAGRAM ................................................................................................51
3.4 C ONTEXT D
3.3 P OLICY AND P ROCEDURE ........................................................................................50
..............................................................49
TRUCTURE
S
RGANIZATIONAL
O
OMPANY
3.2 C
ISTORY .................................................................................................48
3.1 C OMPANY H
CHAPTER 3 ...................................................................................................................48
PROBLEM ANALYSIS ................................................................................................484.2.4 System Flowchart ............................................................................................62
4.4 User Interface Design ........................................................................................65
ESULT
SER
A
CCEPTANCE
T
ESTING
R
...................................................................119
6.5 C OMPARISON BETWEEN O NLINE M ENU AND O FFLINE M ENU ................................118
6.6 H
ALLWAY
T
ESTING
R
ESULT
6.6 U
6.3 C OMPARISON BETWEEN U SING RMS AND . N OT U SING RMS................................115
4.4.1 U SE C ASE D
5.2 Operational Procedures ...............................................................................82
IAGRAM .............................................................................................67
4.4.2 Activity Diagram .............................................................................................68
4.4.3 Class Diagram.................................................................................................72
4.4.4 Sequence Diagram ..........................................................................................76
CHAPTER 5 ...................................................................................................................81
SYSTEM IMPLEMENTATION ..................................................................................815.1 S YSTEM S PECIFICATION ..........................................................................................81
5.3 Implementation Strategy ..............................................................................83
6.2 C OMPARISON BETWEEN J AVA AND .NET ..............................................................114
5.4 Details ................................................................................................................84
5.4 Test Plan.....................................................................................................109
5.6 Integration Testing .....................................................................................112
CHAPTER 6 .................................................................................................................114
DISCUSSION ...............................................................................................................1146.1 E
VALUATION
.........................................................................................................114
..................................................................................122
CHAPTER 7 .................................................................................................................124
CONCLUSION AND RECOMMENDATION .........................................................1247.1 C ONCLUSION .........................................................................................................124
7.2 R ECOMMENDATION ...............................................................................................125
REFERENCES .............................................................................................................126
CURRICULUM VITAE..............................................................................................129
APPENDIX A ...............................................................................................................131
APPENDIX B................................................................................................................144
List of Figures
MAGE
IELD O BJECT , K.T OPLEY , 2002......................................................38
13 A T EXT F
IGURE 2.
F
, 2002..........................................................................................................................37
OPLEY
I TEMS AS SHOWN BY DEFAULT COLOR PHONE EMULATOR , K.T
12 I
IGURE 2.
IGURE 2.
F
11 A N EASY - TO - USE INTERFACE FOR UPDATING THE DATE AND TIME , J.W.M UCHOW , 2002 .................................................................................................37
IGURE 2.
F
IST , J.W.M UCHOW , 2002 ...............................36
XCLUSIVE L
10 M ULTIPLE AND E
F
14 A G AUGE , K.T OPLEY , 2002 .........................................................................38 F
F
OPLEY
IGURE 2.
, 2005............................................................44 F
RESSMAN
, R.S.P
ODEL
17 RAD M
IGURE 2.
, 2002 ........................................................40 F
, K.T
IGURE 2.
LASS
C
ANVAS
C
HE
16 T
IGURE 2.
15 A C HOICE G ROUP , K.T OPLEY , 2002 .............................................................39 F
IGURE 2.
IGHT ), J.W.M UCHOW , 2002...........35
F
P
IGURE 2.
4 MID P ROFILE A RCHITECTURE , J.W.M UCHOW , 2002.....................................28 F
IGURE 2.
, 2002 ...........................18 F
OPLEY
, K. T
ROFILES
ONFIGURATIONS AND
IAGRAM OF MID LET L
3 J2ME C
IGURE 2.
F
IERARCHY , 2006 .........................................................................11
2 J AVA API H
IGURE 2.
1 J AVA P LATFORM , JDK D OCUMENTATION , 2006............................................10 F
IGURE 2.
5 T HE T RANSITION D
IFECYLE , M.D.J ODE , 2004 ...........32
I MAGE (L EFT ) AND T EXT (R
C
9 A LERT WITH
IGURE 2.
, 2002 ...........................35 F
OPLEY
, K.T
HONE
P
ELL
YPICAL
F
T
OMMANDS ON A
8 C
IGURE 2.
7 A T EXT B OX , J.W.M UCHOW , 2002.................................................................34 F
IGURE 2.
6 LCDUI A RCHITECTURE , M.D.J ODE , 2004 .....................................................33 F
IGURE 2.
18 MVC A RCHITECTURE , R.S.P RESSMAN , 2005……………………………..47
F
C
IGURE 4.
F
IAGRAM ........................................................................77
17 L OGIN S EQUENCE D
IGURE 4.
16 S EQUENCE DIAGRAM MOBILE USER REGISTER ..............................................76 F
IGURE 4.
..........................................................................76 F
IAGRAM
D
LASS
ECURITY
IAGRAM .......................................................78
4.15 S
IGURE
................................................................................75 F
IAGRAM
D
LASS
C
AIN
4.14 M
IGURE
F
18 S EARCH A RTICLE S EQUENCE D
F
4.13 C ONTROLLER C LASS D
T
IGURE 5.
F
IAGRAM ................................................80
21 A RTICLE S UBMISSION S EQUENCE D
IGURE 4.
.....................................................79 F
IAGRAM
D
EQUENCE
S
RAINING
EARCH
IGURE 4.
20 S
IGURE 4.
..................................................78 F
IAGRAM
D
EQUENCE
S
ASSWORD
P
HANGE
19 C
IAGRAM ....................................................................75
IGURE
IGURE 4.
4 S
7 U SE CASE DIAGRAMS .....................................................................................68 F
IGURE 4.
6 M ENU S TRUCTURE FOR M OBILE A PPLICATION ..............................................67 F
IGURE 4.
I NTERFACE D ESIGN ..............................................................................65 F
5 U SER
IGURE 4.
.....................................................................................62 F
LOWCHART
F
YSTEM
IGURE 4.
8 M OBILE U SER R EGISTER A CTIVITY D
F
IAGRAM L EVEL 2 ...................................................61
3 D ETAILED D ATA F LOW D
IGURE 4.
F
IAGRAM L EVEL 1 ...................................................59
2 D ETAILED D ATA F LOW D
IGURE 4.
F
IAGRAM .......................................................................................58
1 C ONTEXT D
IGURE 4.
IAGRAM ...............................................69
F
IGURE
IAGRAM .................................................................................74
IEW C LASS D
4.12 V
IGURE
F
IAGRAM (2) ........................................................................73
4.11 M ODEL C LASS D
IGURE
F
IAGRAM ..............................................................................72
4.10 M ODEL C LASS D
....................................................71 F
F
IAGRAM
D
CTIVITY
A
OGIN
L
SER
U
OBILE
9 M
IGURE 4.
1 M AIN P AGE S CREENSHOT ..............................................................................84
F
A
19 T HE R ESULT D ETAILS OF O NLINE A RTICLE S EARCH BY C ATEGORY S CREENSHOT .............................................................................................................94 F
IGURE 5.
.....93 F
CREENSHOT
S
ATEGORY
C
EARCH BY
S
RTICLE
NLINE
20 O NLINE S UBMIT A RTICLE S CREENSHOT .......................................................94 F
O
ESULT OF
R
HE
18 T
IGURE 5.
..............................93 F
CREENSHOT
S
ATEGORY
C
IGURE 5.
IGURE 5.
S
NLINE
IGURE 5.
23 O NLINE S UBMIT A RTICLE C ONFIRMATION ...................................................96 F
IGURE 5.
....................................................95 F
CREENSHOT
S
RTICLE
A
REVIEW
P
22 O
21 I
IGURE 5.
.................................95 F
CREENSHOT
S
RTICLE
A
UBMIT
S
NLINE
O
NCOMPLETE
EARCH BY
RTICLE
IGURE 5.
S
10 O NLINE A RTICLE
IGURE 5.
F
IST A LL M ENU S CREENSHOT ...........................................89
9 O NLINE A RTICLE L
IGURE 5.
8 A RTICLE M ENU S CREENSHOT ........................................................................88 F
IGURE 5.
..........................................................................87 F
CREENSHOT
ENU
IGURE 5.
M
NLINE
7 O
IGURE 5.
6 O NLINE L OGIN E RROR S CREENSHOT ..............................................................87 F
IGURE 5.
5 L OGIN O NLINE S CREENSHOT .........................................................................86 F
IGURE 5.
4 L OGIN M ENU S CREENSHOT ...........................................................................86 F
IGURE 5.
3 M AIN M ENU S CREENSHOT .............................................................................85 F
V IEW S CREENSHOT ..........................................................89 F
11 O NLINE A RTICLE P AGING S CREENSHOT .......................................................90 F
A
13 O NLINE A RTICLE S EARCH BY S TRING S CREENSHOT ....................................91 F
NLINE
17 O
IGURE 5.
16 O NLINE A RTICLE S EARCH BY S TRING NO D ATA S CREENSHOT .....................92 F
IGURE 5.
V IEW S CREENSHOT .............92 F
15 O NLINE A RTICLE S EARCH BY S TRING R ESULT
IGURE 5.
14 O NLINE A RTICLE S EARCH BY S TRING R ESULT S CREENSHOT .......................91 F
IGURE 5.
IGURE 5.
IGURE 5.
...........................................90 F
CREENSHOT
S
ENU
M
EARCH
S
RTICLE
A
NLINE
12 O
24 O NLINE T RAINING M ENU S CREENSHOT .......................................................96
F
FFLINE
42 R EGISTRATION S CREENSHOT .....................................................................106 F
IGURE 5.
.........................................................105 F
CREENSHOT
S
IST
L
RTICLE
A
41 O
43 R EGISTER E RROR S CREENSHOT .................................................................106 F
IGURE 5.
........................................................105 F
CREENSHOT
S
RROR
E
OGIN
L
FFLINE
40 O
IGURE 5.
IGURE 5.
39 O FFLINE L OGIN S CREENSHOT ....................................................................104 F
T
IGURE 6.
47 A BOUT U S M ENU S CREENSHOT .................................................................108 F
IGURE 5.
..................................108 F
CREENSHOT
S
ONFIRMATION
C
ABLOID
UBSCRIBE
44 R EGISTER C ONFIRMATION S CREENSHOT ....................................................107 F
46 S
IGURE 5.
............................................................107 F
CREENSHOT
S
ABLOID
T
UBSCRIBE
45 S
IGURE 5.
IGURE 5.
IGURE 5.
IGURE 5.
NLINE
5.31 O NLINE P ROFILE M ENU S CEENSHOT ..........................................................100 F
IGURE
........................................100 F
CREENSHOT
V IEW S
EARCH
S
RAINING
T
30 O
32 O NLINE P ROFILE C HANGE P ASSWORD S CREENSHOT .................................101 F
IGURE 5.
29 O NLINE T RAINING S EARCH R ESULT S CREENSHOT .......................................99 F
IGURE 5.
28 O NLINE T RAINING S EARCH S CREENSHOT ....................................................99 F
IGURE 5.
27 O NLINE T RAINING P AGING S CREENSHOT .....................................................98 F
IGURE 5.
F
IST S CREENSHOT ........................................98
26 R ESULT OF O NLINE T RAINING L
IGURE 5.
IGURE 5.
38 O NLINE S ETTING C ONFIRMATION S CREENSHOT ........................................104 F
C
IGURE 5.
37 O NLINE S ETTING S CREENSHOT ..................................................................103 F
IGURE 5.
36 O NLINE P ROFILE C LEAR D ATA S CREENSHOT ............................................103 F
IGURE 5.
...................102 F
CREENSHOT
S
ONFIRMATION
ATA
33 C HANGE P ASSWORD E RROR S CREENSHOT .................................................101 F
D
LEAR
C
ROFILE
P
NLINE
35 O
IGURE 5.
34 C HANGE P ASSWORD C ONFIRMATION S CREENSHOT ...................................102 F
IGURE 5.
1 C HAIN OF R ESPONSIBILITIES D ESIGN P ATTERN ...........................................116
F
IGURE 6.
3 T HE E ASE OF USE OF APPLICATION SURVEY .................................................119 F
IGURE 6.
4 T HE NAVIGATION OF THE SYSTEM SURVEY ...................................................120 F
IGURE 6.
5 T HE APPLICATION RESULT ACCORDINGLY SURVEY ......................................120 F
IGURE 6.
6 T HE FUNCTIONALITY SURVEY RESULT .........................................................121 F
IGURE 6.
7 T
HE SATISFACTION WITH THE CURRENT FUNCTIONALITY
.............................121
List Of Tables
A
3 H ALLWAY T ESTING R ESULT .........................................................................122 T ABLE
2 O FFLINE L OGIN P ERFORMANCE T ESTING ......................................................117 T ABLE 6.
T ABLE 6.
IN TERMS OF COST .................115
1 C OMPARISON BETWEEN RMS AND NON -RMS
........................................................................112 T ABLE 6.
ASE
C
EST
T
RTICLE
UBMIT
T
6 S
ABLE 5.
5 S EARCH T RAINING T EST C ASE ......................................................................111 T
4 S EARCH A RTICLE T EST C ASE .......................................................................111 T ABLE 5.
3 V ERIFY U SER (L OGIN ) T EST C ASE ................................................................110 T ABLE 5.
2 R EGISTRATION T EST C ASE ............................................................................109 T ABLE 5.
................................................................................................81 T ABLE 5.
OOLS
T
IST OF
1 L
ABLE 5.
6.4 E NCRYPTION C OMPARISON ............................................................................123