An Integrated Mobile Web Solution for Gaya Hidup Sehat Tabloid: The Implementation of Mobile Application - Binus e-Thesis

  

BINUS INTERNATIONAL

UNIVERSITAS BINA NUSANTARA

  Major Computer Science Sarjana Komputer Thesis

  Semester [Even] year 2007

  

AN INTEGRATED MOBILE WEB SOLUTION FOR GAYA HIDUP SEHAT

(GHS) TABLOID

  

Probosetyo Krishnadammananda Thioleu (0700713940)

Abstract

  The thesis is about creating the mobile application for Gaya Hidup Sehat (Senior) tabloid as the complimentary application in order to get up to date with the current technology. Internet has become popular nowadays and it can be used as the media to popularize the tabloid among the Internet user. However, the current application can only be accessed by users who have computer and Internet connection, which means that it is lack of efficiency.

  With the mobile application that we proposed, we seek to have GHS to be more widely accessed by the users as it can be accessed through the mobile devices. It will add more efficiency and effectiveness as people can use the application anytime and anywhere without any burden of time and place. In constructing the whole application, we implement the RAD methodology (Rapid Application Development) as our software development methodology. The reason we choose this methodology is because of the condition of our thesis that is limited of time but potential to have some changing of scope or requirements during the development of the application.

  In conclusion, an integrated mobile web solution is a better approach for the current system in GHS and it is also expected that the GHS system will be more widely used in the future.

  Key words

  

PREFACE

We would like to gratitude all parties who helped us in finishing this thesis punctually.

  This thesis creates an integrated mobile web solution for the Gaya Hidup Sehat (GHS) tabloid. This thesis is created as a compulsory in order to graduate from Bina Nusantara University and to gain Sarjana Komputer degree majoring in Computer Science.

  The objective of the thesis is to apply what we have learned during our study in university. We also would like to thank to several persons who have, directly or indirectly, help us to finish this thesis:

  1. Mr Tri Asih Budiono, MIT, our supervisor, who gives us with the idea about how to finish this thesis in a good way and give feedback and opinion regarding our thesis.

  2. Mr Raymondus Kosala, Phd, our co-supervisor, who also helps us in solving the problems we face within development period and giving useful ideas.

  3. Mr. Puri, the IT manager of GHS, who allows us to create this thesis within GHS and always gives opinion and requirements within development phase.

  4. Friends, who helped us directly or indirectly throughout this thesis In conclusion, we hope that our thesis could be an example of development in information technology as the implementation of what we have studied in this campus.

  Jakarta, July 2007

  

Table of Contents

COVER PAGE ................................................................................................................. I

  ABSTRACT...................................................................................................................... V

  

PREFACE.......................................................................................................................VI

TABLE OF CONTENTS ............................................................................................. VII

LIST OF FIGURES ....................................................................................................XIII

LIST OF TABLES ...................................................................................................XVIII

  

CHAPTER 1 .....................................................................................................................2

INTRODUCTION ............................................................................................................2 ACKGROUND

  1.1 B ...........................................................................................................2

  1.2 P ERCEIVED P ROBLEM ................................................................................................2

  1.3 P ROPOSED S OLUTION ................................................................................................3

  1.4 S COPE ........................................................................................................................4

  1.5 A

  IM AND B ENEFITS ....................................................................................................5 TRUCTURE

  1.6 S ...............................................................................................................6

  

CHAPTER 2 .....................................................................................................................8

THEORETICAL FOUNDATION ..................................................................................8

  2.1 J AVA ..........................................................................................................................8

  2.1.1 Java Language ..................................................................................................8

  2.1.2 Java Virtual Machine (JVM) .............................................................................9

  

2.1.4 Java Application Program Interface (Java API) ............................................10

  

2.1.5 Java Development Kit (JDK) ..........................................................................11

  

2.1.6 NetBeans IDE ..................................................................................................12

BJECT RIENTED

  2.2 O -O ..................................................................................................12

  

2.2.1 Inheritance ......................................................................................................13

  

2.2.2 Encapsulation..................................................................................................13

  

2.2.3 Polymorphism..................................................................................................13

  

2.2.4 Interface ..........................................................................................................14

  

2.2.5 Thread .............................................................................................................14

  2.3 D ATABASE ...............................................................................................................14

  

2.3.1 Entity Relationship (ER) Model ......................................................................15

  

2.3.2 Entity, Attribute and Relationship ...................................................................15

  

2.3.3 MySQL .............................................................................................................16

ENERAL ACKET ADIO ERVICE

  2.4 G P R S (GPRS) ............................................................16

  2.5 J2ME.......................................................................................................................17

  

2.5.1 Profiles ............................................................................................................18

  2.5.1.1 Mobile Information Device Profile (MIDP) ............................................18

  

2.5.2 Configuration ..................................................................................................19

  

2.5.3 CLDC and Java Virtual Machine....................................................................19

  

2.5.4 Virtual Machine and Language Features .......................................................20

  2.5.4.1 Class Loading...........................................................................................20

  2.5.4.2 Security Features......................................................................................21

  2.5.4.2.2 Access to Native Code ..........................................................................22

  2.5.4.2.3 Class Verification..................................................................................22

  2.5.5 The CLDC Class Libraries..............................................................................23

  2.6 M OBILE

  I NFORMATION D EVICE P ROFILE (MIDP) ...................................................27

  2.6.1 MIDP Specification .........................................................................................28

  2.6.2 MIDP Hardware Requirements ......................................................................29

  

B. DISPLAY....................................................................................................................29

  2.6.3 MIDP Software Requirements.........................................................................29

  2.6.4 MIDlet States and Lifecycle ............................................................................30

  2.6.5 MIDlet User Interface .....................................................................................32

  2.6.5.1 Display and Displayable Classes..............................................................33

  2.6.5.2 High – Level User Interface API..............................................................34

  2.6.5.3 The Low-Level User Interface API..........................................................39

  2.6.5.4 Multithreading and the User Interface .....................................................42

  2.6.5.4.1 Serialization of User Interface Events...................................................42

  ECORD ANAGEMENT YSTEM

  2.7 R M S (RMS).................................................................43

  2.8 M OBILE A PPLICATION .............................................................................................43

  2.9 R APID A PPLICATION D EVELOPMENT (RAD) ...........................................................43

  2.10 D ATA F LOW D

  IAGRAM (DFD) ..............................................................................45

  2.10.1 Context Diagram...........................................................................................45

  2.10.2 System Flowchart ..........................................................................................45

  2.10.3 Use Case........................................................................................................46

  2.11 M ODEL

  3.5 E

  4.2.3 Detailed Data Flow Diagram Level 2.............................................................61

  4.2.2 Detailed Data Flow Diagram Level 1.............................................................59

  4.2.1 Context Diagram.............................................................................................58

  IAGRAM ............................................................................................58

  4.2 D ATA F LOW D

  4.1.2 Procedure ........................................................................................................57

  4.1.1 Policy...............................................................................................................56

  4.1 T HE P ROPOSED P OLICY AND P ROCEDURES ..............................................................56

  

CHAPTER 4 ...................................................................................................................56

SOLUTION DESIGN ....................................................................................................56

  3.6 A LTERNATIVE S OLUTIONS .......................................................................................54

  ...............................................................................................53

  ROBLEMS

  P

  XISTING

  3.4.2 System Flowchart ............................................................................................53

  V IEW C ONTROLLER (MVC) A RCHITECTURE ............................................46

  3.4.1 Data Flow Diagram ........................................................................................52

  IAGRAM ................................................................................................51

  3.4 C ONTEXT D

  3.3 P OLICY AND P ROCEDURE ........................................................................................50

  ..............................................................49

  TRUCTURE

  S

  RGANIZATIONAL

  O

  OMPANY

  3.2 C

  ISTORY .................................................................................................48

  3.1 C OMPANY H

  

CHAPTER 3 ...................................................................................................................48

PROBLEM ANALYSIS ................................................................................................48

  4.2.4 System Flowchart ............................................................................................62

  4.4 User Interface Design ........................................................................................65

  ESULT

  SER

  A

  CCEPTANCE

  T

  ESTING

  R

  ...................................................................119

  6.5 C OMPARISON BETWEEN O NLINE M ENU AND O FFLINE M ENU ................................118

  6.6 H

  ALLWAY

  T

  ESTING

  R

  ESULT

  6.6 U

  6.3 C OMPARISON BETWEEN U SING RMS AND . N OT U SING RMS................................115

  4.4.1 U SE C ASE D

  5.2 Operational Procedures ...............................................................................82

  IAGRAM .............................................................................................67

  4.4.2 Activity Diagram .............................................................................................68

  4.4.3 Class Diagram.................................................................................................72

  4.4.4 Sequence Diagram ..........................................................................................76

  

CHAPTER 5 ...................................................................................................................81

SYSTEM IMPLEMENTATION ..................................................................................81

  5.1 S YSTEM S PECIFICATION ..........................................................................................81

  5.3 Implementation Strategy ..............................................................................83

  6.2 C OMPARISON BETWEEN J AVA AND .NET ..............................................................114

  5.4 Details ................................................................................................................84

  5.4 Test Plan.....................................................................................................109

  5.6 Integration Testing .....................................................................................112

  

CHAPTER 6 .................................................................................................................114

DISCUSSION ...............................................................................................................114

  6.1 E

  VALUATION

  .........................................................................................................114

  ..................................................................................122

  

CHAPTER 7 .................................................................................................................124

CONCLUSION AND RECOMMENDATION .........................................................124

  7.1 C ONCLUSION .........................................................................................................124

  7.2 R ECOMMENDATION ...............................................................................................125

  

REFERENCES .............................................................................................................126

CURRICULUM VITAE..............................................................................................129

APPENDIX A ...............................................................................................................131

APPENDIX B................................................................................................................144

  

List of Figures

  MAGE

  IELD O BJECT , K.T OPLEY , 2002......................................................38

  13 A T EXT F

  IGURE 2.

  F

  , 2002..........................................................................................................................37

  OPLEY

  I TEMS AS SHOWN BY DEFAULT COLOR PHONE EMULATOR , K.T

  12 I

  IGURE 2.

  IGURE 2.

  F

  11 A N EASY - TO - USE INTERFACE FOR UPDATING THE DATE AND TIME , J.W.M UCHOW , 2002 .................................................................................................37

  IGURE 2.

  F

  IST , J.W.M UCHOW , 2002 ...............................36

  XCLUSIVE L

  10 M ULTIPLE AND E

  F

  14 A G AUGE , K.T OPLEY , 2002 .........................................................................38 F

  F

  OPLEY

  IGURE 2.

  , 2005............................................................44 F

  RESSMAN

  , R.S.P

  ODEL

  17 RAD M

  IGURE 2.

  , 2002 ........................................................40 F

  , K.T

  IGURE 2.

  LASS

  C

  ANVAS

  C

  HE

  16 T

  IGURE 2.

  15 A C HOICE G ROUP , K.T OPLEY , 2002 .............................................................39 F

  IGURE 2.

  IGHT ), J.W.M UCHOW , 2002...........35

  F

  P

  IGURE 2.

  4 MID P ROFILE A RCHITECTURE , J.W.M UCHOW , 2002.....................................28 F

  IGURE 2.

  , 2002 ...........................18 F

  OPLEY

  , K. T

  ROFILES

  ONFIGURATIONS AND

  IAGRAM OF MID LET L

  3 J2ME C

  IGURE 2.

  F

  IERARCHY , 2006 .........................................................................11

  2 J AVA API H

  IGURE 2.

  1 J AVA P LATFORM , JDK D OCUMENTATION , 2006............................................10 F

  IGURE 2.

  5 T HE T RANSITION D

  IFECYLE , M.D.J ODE , 2004 ...........32

  I MAGE (L EFT ) AND T EXT (R

  C

  9 A LERT WITH

  IGURE 2.

  , 2002 ...........................35 F

  OPLEY

  , K.T

  HONE

  P

  ELL

  YPICAL

  F

  T

  OMMANDS ON A

  8 C

  IGURE 2.

  7 A T EXT B OX , J.W.M UCHOW , 2002.................................................................34 F

  IGURE 2.

  6 LCDUI A RCHITECTURE , M.D.J ODE , 2004 .....................................................33 F

  IGURE 2.

  18 MVC A RCHITECTURE , R.S.P RESSMAN , 2005……………………………..47

  F

  C

  IGURE 4.

  F

  IAGRAM ........................................................................77

  17 L OGIN S EQUENCE D

  IGURE 4.

  16 S EQUENCE DIAGRAM MOBILE USER REGISTER ..............................................76 F

  IGURE 4.

  ..........................................................................76 F

  IAGRAM

  D

  LASS

  ECURITY

  IAGRAM .......................................................78

  4.15 S

  IGURE

  ................................................................................75 F

  IAGRAM

  D

  LASS

  C

  AIN

  4.14 M

  IGURE

  F

  18 S EARCH A RTICLE S EQUENCE D

  F

  4.13 C ONTROLLER C LASS D

  T

  IGURE 5.

  F

  IAGRAM ................................................80

  21 A RTICLE S UBMISSION S EQUENCE D

  IGURE 4.

  .....................................................79 F

  IAGRAM

  D

  EQUENCE

  S

  RAINING

  EARCH

  IGURE 4.

  20 S

  IGURE 4.

  ..................................................78 F

  IAGRAM

  D

  EQUENCE

  S

  ASSWORD

  P

  HANGE

  19 C

  IAGRAM ....................................................................75

  IGURE

  IGURE 4.

  4 S

  7 U SE CASE DIAGRAMS .....................................................................................68 F

  IGURE 4.

  6 M ENU S TRUCTURE FOR M OBILE A PPLICATION ..............................................67 F

  IGURE 4.

  I NTERFACE D ESIGN ..............................................................................65 F

  5 U SER

  IGURE 4.

  .....................................................................................62 F

  LOWCHART

  F

  YSTEM

  IGURE 4.

  8 M OBILE U SER R EGISTER A CTIVITY D

  F

  IAGRAM L EVEL 2 ...................................................61

  3 D ETAILED D ATA F LOW D

  IGURE 4.

  F

  IAGRAM L EVEL 1 ...................................................59

  2 D ETAILED D ATA F LOW D

  IGURE 4.

  F

  IAGRAM .......................................................................................58

  1 C ONTEXT D

  IGURE 4.

  IAGRAM ...............................................69

  F

  IGURE

  IAGRAM .................................................................................74

  IEW C LASS D

  4.12 V

  IGURE

  F

  IAGRAM (2) ........................................................................73

  4.11 M ODEL C LASS D

  IGURE

  F

  IAGRAM ..............................................................................72

  4.10 M ODEL C LASS D

  ....................................................71 F

  F

  IAGRAM

  D

  CTIVITY

  A

  OGIN

  L

  SER

  U

  OBILE

  9 M

  IGURE 4.

  1 M AIN P AGE S CREENSHOT ..............................................................................84

  F

  A

  19 T HE R ESULT D ETAILS OF O NLINE A RTICLE S EARCH BY C ATEGORY S CREENSHOT .............................................................................................................94 F

  IGURE 5.

  .....93 F

  CREENSHOT

  S

  ATEGORY

  C

  EARCH BY

  S

  RTICLE

  NLINE

  20 O NLINE S UBMIT A RTICLE S CREENSHOT .......................................................94 F

  O

  ESULT OF

  R

  HE

  18 T

  IGURE 5.

  ..............................93 F

  CREENSHOT

  S

  ATEGORY

  C

  IGURE 5.

  IGURE 5.

  S

  NLINE

  IGURE 5.

  23 O NLINE S UBMIT A RTICLE C ONFIRMATION ...................................................96 F

  IGURE 5.

  ....................................................95 F

  CREENSHOT

  S

  RTICLE

  A

  REVIEW

  P

  22 O

  21 I

  IGURE 5.

  .................................95 F

  CREENSHOT

  S

  RTICLE

  A

  UBMIT

  S

  NLINE

  O

  NCOMPLETE

  EARCH BY

  RTICLE

  IGURE 5.

  S

  10 O NLINE A RTICLE

  IGURE 5.

  F

  IST A LL M ENU S CREENSHOT ...........................................89

  9 O NLINE A RTICLE L

  IGURE 5.

  8 A RTICLE M ENU S CREENSHOT ........................................................................88 F

  IGURE 5.

  ..........................................................................87 F

  CREENSHOT

  ENU

  IGURE 5.

  M

  NLINE

  7 O

  IGURE 5.

  6 O NLINE L OGIN E RROR S CREENSHOT ..............................................................87 F

  IGURE 5.

  5 L OGIN O NLINE S CREENSHOT .........................................................................86 F

  IGURE 5.

  4 L OGIN M ENU S CREENSHOT ...........................................................................86 F

  IGURE 5.

  3 M AIN M ENU S CREENSHOT .............................................................................85 F

  V IEW S CREENSHOT ..........................................................89 F

  11 O NLINE A RTICLE P AGING S CREENSHOT .......................................................90 F

  A

  13 O NLINE A RTICLE S EARCH BY S TRING S CREENSHOT ....................................91 F

  NLINE

  17 O

  IGURE 5.

  16 O NLINE A RTICLE S EARCH BY S TRING NO D ATA S CREENSHOT .....................92 F

  IGURE 5.

  V IEW S CREENSHOT .............92 F

  15 O NLINE A RTICLE S EARCH BY S TRING R ESULT

  IGURE 5.

  14 O NLINE A RTICLE S EARCH BY S TRING R ESULT S CREENSHOT .......................91 F

  IGURE 5.

  IGURE 5.

  IGURE 5.

  ...........................................90 F

  CREENSHOT

  S

  

ENU

  M

  EARCH

  S

  RTICLE

  A

  NLINE

  12 O

  24 O NLINE T RAINING M ENU S CREENSHOT .......................................................96

  F

  FFLINE

  42 R EGISTRATION S CREENSHOT .....................................................................106 F

  IGURE 5.

  .........................................................105 F

  CREENSHOT

  S

  IST

  L

  RTICLE

  A

  41 O

  43 R EGISTER E RROR S CREENSHOT .................................................................106 F

  IGURE 5.

  ........................................................105 F

  

CREENSHOT

  S

  RROR

  E

  OGIN

  L

  FFLINE

  40 O

  IGURE 5.

  IGURE 5.

  39 O FFLINE L OGIN S CREENSHOT ....................................................................104 F

  T

  IGURE 6.

  47 A BOUT U S M ENU S CREENSHOT .................................................................108 F

  IGURE 5.

  ..................................108 F

  CREENSHOT

  S

  ONFIRMATION

  C

  ABLOID

  UBSCRIBE

  44 R EGISTER C ONFIRMATION S CREENSHOT ....................................................107 F

  46 S

  IGURE 5.

  ............................................................107 F

  CREENSHOT

  S

  ABLOID

  T

  UBSCRIBE

  45 S

  IGURE 5.

  IGURE 5.

  IGURE 5.

  IGURE 5.

  NLINE

  5.31 O NLINE P ROFILE M ENU S CEENSHOT ..........................................................100 F

  IGURE

  ........................................100 F

  CREENSHOT

  V IEW S

  EARCH

  S

  RAINING

  T

  30 O

  32 O NLINE P ROFILE C HANGE P ASSWORD S CREENSHOT .................................101 F

  IGURE 5.

  29 O NLINE T RAINING S EARCH R ESULT S CREENSHOT .......................................99 F

  IGURE 5.

  28 O NLINE T RAINING S EARCH S CREENSHOT ....................................................99 F

  IGURE 5.

  27 O NLINE T RAINING P AGING S CREENSHOT .....................................................98 F

  IGURE 5.

  F

  IST S CREENSHOT ........................................98

  26 R ESULT OF O NLINE T RAINING L

  IGURE 5.

  IGURE 5.

  38 O NLINE S ETTING C ONFIRMATION S CREENSHOT ........................................104 F

  C

  IGURE 5.

  37 O NLINE S ETTING S CREENSHOT ..................................................................103 F

  IGURE 5.

  36 O NLINE P ROFILE C LEAR D ATA S CREENSHOT ............................................103 F

  IGURE 5.

  ...................102 F

  CREENSHOT

  S

  ONFIRMATION

  ATA

  33 C HANGE P ASSWORD E RROR S CREENSHOT .................................................101 F

  D

  LEAR

  C

  ROFILE

  P

  NLINE

  35 O

  IGURE 5.

  34 C HANGE P ASSWORD C ONFIRMATION S CREENSHOT ...................................102 F

  IGURE 5.

  1 C HAIN OF R ESPONSIBILITIES D ESIGN P ATTERN ...........................................116

  F

  IGURE 6.

  3 T HE E ASE OF USE OF APPLICATION SURVEY .................................................119 F

  IGURE 6.

  4 T HE NAVIGATION OF THE SYSTEM SURVEY ...................................................120 F

  IGURE 6.

  5 T HE APPLICATION RESULT ACCORDINGLY SURVEY ......................................120 F

  IGURE 6.

  6 T HE FUNCTIONALITY SURVEY RESULT .........................................................121 F

  IGURE 6.

  7 T

  HE SATISFACTION WITH THE CURRENT FUNCTIONALITY

  .............................121

  

List Of Tables

  A

  3 H ALLWAY T ESTING R ESULT .........................................................................122 T ABLE

  2 O FFLINE L OGIN P ERFORMANCE T ESTING ......................................................117 T ABLE 6.

  T ABLE 6.

  IN TERMS OF COST .................115

  1 C OMPARISON BETWEEN RMS AND NON -RMS

  ........................................................................112 T ABLE 6.

  ASE

  C

  EST

  T

  RTICLE

  UBMIT

  T

  6 S

  ABLE 5.

  5 S EARCH T RAINING T EST C ASE ......................................................................111 T

  4 S EARCH A RTICLE T EST C ASE .......................................................................111 T ABLE 5.

  3 V ERIFY U SER (L OGIN ) T EST C ASE ................................................................110 T ABLE 5.

  2 R EGISTRATION T EST C ASE ............................................................................109 T ABLE 5.

  ................................................................................................81 T ABLE 5.

  OOLS

  T

  IST OF

  1 L

  ABLE 5.

  6.4 E NCRYPTION C OMPARISON ............................................................................123