Implementation of System Development Life Cycle SD
Implementation of System Development Life Cycle SD
Decree of the Director General of Higher Education, Research and Technology, No. 158/E/KPT/2021
Validity period from Volume 5 Number 2 of 2021 to Volume 10 Number 1 of 2026
JURNAL RESTI
(Rekayasa Sistem dan Teknologi Informasi)
Vol. 7 No. 4 (2023) 982 - 987 ISSN Media Electronic: 2580-0760
Abstract
Libraries are social institutions that provide information services that can be accessed publicly to meet the information needs
of librarians. Based on the results of a survey conducted on 58 students who have visited the library of the Electrical and
Computer Engineering Department of Universitas Syiah Kuala, an information system was needed that provided research book
information related to the author's name, year of writing, field concentration, and abstract of the research book and there was
a division of categories based on field concentration, and there was an online borrowing feature. Based on these problems,
this study aims to implement an Android application system with IoT-based lending lockers using the SDLC (system
development life cycle) Prototyping method. This study produces an application with a locker-based online lending feature,
several other features as the user desires, and 1 prototype lending locker. The locker-based online lending system integrated
with ESP32-WROOM-32 can connect with Firebase storage and send locker key codes to Firebase so the application can
access them. Through experiments and tests conducted on the application, it is obtained that the application can access the
locker key code and display it to the user. The application has also been validated using black-box and white-box testing and
can be accepted by users based on System Usability Scale (SUS) average score with a very feasible interpretation category.
Keywords: libraries; SDLC; locker-based; IoT-based
DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
983
Melinda, Shaquille Rizki Ramadhan Na, Yudha Nurdin, Yunidar Yunidar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol. 7 No. 4 (2023)
Function Function
Description
Code Name
Research book seekers can view
View loan
T-F-007 detailed loan information on the
details
loan details page.
Research book seekers can see the
See locker
T-F-008 storage locker code on the loan
Figure 3. Workflow of the IoT Loan Locker Algorithm code
details page.
The system will generate a new random 4-digit key. The Research book seekers can delete
Delete loan
T-F009 the book borrowing history on the
generated key will be stored in the Firestore database so history
research book loan list page
the application can access it. Then after the key is
Research book seekers can add
successfully generated and stored, the system will make Adding
T-F-010 bookmark on research book
another request to the database so that the key obtained bookmarks
details page.
by the application user has similarities with the key in Research book seekers can see a
the locker. When the user enters the key given by the View a list of list of research books that have
T-F-011
bookmarks been added from the previous
electronic thesis application on the locker, the system research book details page.
will check the key similarity. When the given key is not Research book seekers can
Removing
the same, the system will give an error message on the T-F-012 remove bookmark on research
bookmarks
LCD and ask the user to re-enter the key. When the key book detail page
Research book seekers can search
is the same, the system will open the locker door then Search for
for research books in the system
the system will create a new key. T-F-013 research
by using the title of the research
books
book as a search keyword.
2.3 Mobile Application Change Research book seekers can change
T-F-014
username username
Application requirements contain features or services Change Research book seekers can change
T-F-015
that must be provided by the application, including the password password
system's reaction to certain inputs and the application's Research book seekers may exit
T-F-016 Logout
behavior in certain situations. Application requirements system.
depend on the application's user and where the
application will be used [17], [23]. In this study, In addition, a use case diagram is shown in Figure 4 that
application requirements have been obtained based on describes and illustrates the interaction of actors or
the analysis of the survey results that have been carried users with the software system. In addition, use case
out. The application needs in this study are divided into diagrams are also used as verification requirements,
2 based on user identity, namely guests and research provide an overview of the interface of a system, and
book seekers. The application requirements in this provide certainty about system requirements [14]. The
study are shown in Table 1 and Table 2. use case diagram is created by linking each functional
requirement to each actor.
Table 1. Guest Requirements Information
Function
Function Name Description
Code
T-F-001 Registration Guest can register on the
system as a research book
seeker.
T-F-002 Login Guest can log into the system
as a research book seeker.
Function Function
Description
Code Name
Research book seekers can see a
View the list
list of books according to the field
T-F-003 of research
concentration category according
books
to the system
Research book seekers can view
View research detailed research book
T-F-004 Figure 4. Diagram Use Case
book details information on the research book
detail page. 2.4 Lockers System
Research book seekers can borrow
Borrow a
T-F-005 research books on the research The locker system consists of several components,
research book
book details page.
View
namely ESP32-WROOM-32 as a microcontroller and
Research book seekers can see a interactor in the database [20], PCF8574 as a helper
T-F-006 borrowed
list of borrowed research books.
books module that connects the LCD and Keypad with ESP32,
16x2 LCD as an interface to the locker [24], 4x4
DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
984
Melinda, Shaquille Rizki Ramadhan Na, Yudha Nurdin, Yunidar Yunidar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol. 7 No. 4 (2023)
Keypad as input to the locker, Relay as a current breaker After the locker successfully sends the locker key code
on the solenoid lock door, Selenoid Lock Door as a to Firebase, the application can access the key code that
locker door lock. The architecture and circuitry of the stored in the Cloud and to be displayed to the user. The
locker system are shown in Figure 5, and locker application provides a borrowing form that the user
specification are shown in Table 3. must fill in to fulfill the requirements for borrowing
Table 3. Locker Specification
research books. After the form is filled in, the
application will provide detailed borrowing information
Components Total Specifications to the user where there is a locker key code. The locker
Wood Plank 3 meters 2 cm key code provided will match the locker key code sent
Door Handle 1 unit As required
Door Hinges 1 unit As required by the locker system on Firebase. By implementing this
IoT system, it produces a locker system that is different
from [25], which also implements a locker-based digital
Table 4 Locker System Specification library, where the locker system in this study is not used
Components Total Specifications as a secret storage place but only a place to store books
Selenoid mini small 1 unit Voltage 6V/12V/24V, Ampere that have been borrowed by librarians and can be
lock door 350mA/600A accessed by anyone who has a locker key code. The
PCF8574 1 unit I2C Interface
Arduino keypad 4x4 1 unit 24Vdc, 30mA
following is the borrowing details page and locker key
ESP32 WROOM-32 1 unit Power 3,3 VDC code page in the application shown in Figure 7.
(a)
(a) (b)
(b)
Figure 5. (a) Lockers Design, (b) Lockers System Circuit
DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
985
Melinda, Shaquille Rizki Ramadhan Na, Yudha Nurdin, Yunidar Yunidar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol. 7 No. 4 (2023)
(a) (b) carried out using the System Usability Scale (SUS)
Figure 7. (a) Loan Details Page, (b) Locker Key Code Page [29], where 10 users who have used the application are
given several questions related to the satisfaction of
To find out if the application made has been running as using the application that has been made, as shown in
planned and in accordance with the wishes of the user, Figure 8.
3 stages of testing of the application are carried out,
namely white-box [26], black-box [27], and usability Based on the Likert scale [30], the respondents' scores
[28]. White-box testing tests the suitability of the input obtained from filling out 10 System Usability Scale
flow that enters the ViewModel module before being questions will be processed to determine the calculated
displayed on the application screen by analyzing the value of each respondent. The total score of the
code structure in the ViewModel. Then, black-box respondents obtained is 940, and the average score on
testing is continued by observing the suitability of input SUS is 94. Based on the interpretation of SUS values,
and output on each application feature without knowing the average score on SUS shows that the software that
the code structure. The results of white-box and black- has been made is included in the very feasible
box testing are listed in Table 4 and Table 5. interpretation category.
Table 4. White-box Testing Results
Total Test
Name of Controller Status
Case
RegisterViewModel 1 Test Passed
LoginViewModel 2 Test Passed
CupBoardViewModel 1 Test Passed
DetailViewModel 7 Test Passed
FavoriteViewModel 1 Test Passed
LoanFormViewModel 2 Test Passed
HomeViewModel 2 Test Passed
SearchViewModel 1 Test Passed
SettingsViewModel 2 Test Passed
DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
986
Melinda, Shaquille Rizki Ramadhan Na, Yudha Nurdin, Yunidar Yunidar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol. 7 No. 4 (2023)
university library in Bangladesh,” DLP, vol. 38, no. 3, pp. 332– Engineering, M. A. Serrano, R. Pérez-Castillo, and M. Piattini,
345, Jun. 2022, doi: 10.1108/DLP-03-2021-0025. Eds., Cham: Springer International Publishing, 2022, pp. 61–
[2] S. Hussaini, M. Haruna, and A. Muhammad, “Application and 83. doi: 10.1007/978-3-031-05324-5_4.
Use of ICT in University Library Services: A Panacea for [16] J. Sa-ngiampak et al., “LockerSwarm: An IoT-based Smart
Conventional Library Services,” JOITS, vol. 7, no. 1, pp. 1–8, Locker System with Access Sharing,” in 2019 IEEE
Dec. 2020, doi: 10.46610/JOITS.2021.v07i01.001. International Smart Cities Conference (ISC2), Casablanca,
[3] “The next step in librarianship: Is the traditional library dead? Morocco: IEEE, Oct. 2019, pp. 587–592. doi:
The next step in librarianship: Is the traditional library dead?” 10.1109/ISC246665.2019.9071664.
https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1 [17] Y. Bassil, “A Simulation Model for the Waterfall Software
638&context=libphilprac (accessed Nov. 22, 2022). Development Life Cycle,” International Journal of
[4] A. Rahimi, M. R. Soleymani, A. Hashemian, M. R. Hashemian, Engineering, vol. 2, no. 5, 2012.
and A. Daei, “Evaluating digital libraries: a systematised [18] J. Dąbrowski, E. Letier, A. Perini, and A. Susi, “Analysing app
review,” Health Info Libr J, vol. 35, no. 3, pp. 180–191, Sep. reviews for software engineering: a systematic literature
2018, doi: 10.1111/hir.12231. review,” Empir Software Eng, vol. 27, no. 2, p. 43, Mar. 2022,
[5] M. M. Aristov, J. W. Moore, and J. F. Berry, “Library of 3D doi: 10.1007/s10664-021-10065-7.
Visual Teaching Tools for the Chemistry Classroom [19] P. Ragunath, S. Velmourougan, P. Davachelvan, S.
Accessible via Sketchfab and Viewable in Augmented Kayalvizhi, and R. Ravimohan, “Evolving A New Model
Reality,” J. Chem. Educ., vol. 98, no. 9, pp. 3032–3037, Sep. (SDLC Model-2010) For Software Development Life Cycle
2021, doi: 10.1021/acs.jchemed.1c00460. (SDLC),” 2010.
[6] T. Iqbal and M. Wali, “IDOL: Retrofit-Kotlin Service-Based [20] A. Garg, R. Kumar Kaliyar, and A. Goswami, “PDRSD-A
Online Digital Library Application and College Open Data systematic review on plan-driven SDLC models for software
Repository,” ijsecs, vol. 2, no. 1, pp. 1–8, May 2022, doi: development,” in 2022 8th International Conference on
10.35870/ijsecs.v2i1.760. Advanced Computing and Communication Systems (ICACCS),
[7] A. R. Dinazzah and R. Rahmi, “Mobile Library Application in Coimbatore, India: IEEE, Mar. 2022, pp. 739–744. doi:
Indonesia’s Digital Libraries,” j.of education technology, vol. 10.1109/ICACCS54159.2022.9785261.
6, no. 1, p. 149, Mar. 2022, doi: 10.23887/jet.v6i1.43575. [21] “ESP32-WROOM-32 Datasheet.”
[8] K. Rivo and M. Žumer, “Academic Libraries and Use of https://www.alldatasheet.com/datasheet-
Mobile Devices: Case Study of Slovenia,” The Journal of pdf/pdf/1148026/ESPRESSIF/ESP32-WROOM-32.html
Academic Librarianship, vol. 48, no. 3, p. 102507, May 2022, [22] A. C. Gheorghe, E. Stan, and I. Udroiu, “Electricity
doi: 10.1016/j.acalib.2022.102507. Consumption Measurement System Using ESP32,” The
[9] L. Suryani et al., “Implementation of Maggot Cage Scientific Bulletin of Electrical Engineering Faculty, vol. 21,
Temperature and Humidity Control Using ESP8266 Based On no. 2, pp. 23–26, Dec. 2021, doi: 10.2478/sbeef-2021-0017.
the Internet of Things,” J. RESTI (Rekayasa Sist. Teknol. Inf.), [23] S. S. R. Emmadi and S. Potluri, “Android Based Instant
vol. 6, no. 5, pp. 877–882, Nov. 2022, doi: Messaging Application Using Firebase,” vol. 7, no. 5, 2019.
10.29207/resti.v6i5.4502. [24] D. Zhu et al., “Building a Three-Level User Experience (UX)
[10] Izhangghani, I. Hikmah, and Slamet Indriyanto, “Prototype of Measurement Framework for Mobile Banking Applications in
Body Temperature and Oxygen Saturation Monitoring System a Chinese Context: An Analytic Hierarchy Process (AHP)
Using DS18B20 and MAX30100 Sensors based on IOT,” J. Analysis,” MTI, vol. 6, no. 9, p. 83, Sep. 2022, doi:
RESTI (Rekayasa Sist. Teknol. Inf.), vol. 6, no. 5, pp. 810–817, 10.3390/mti6090083.
Oct. 2022, doi: 10.29207/resti.v6i5.4385. [25] “PCF8574 Datasheet.”
[11] M. M and Finki Dona Marleny, “Platform Digital and Content [26] “Library Rooms And Study Spaces.”
Innovation to Increase Youth Interest in the Agricultural [27] J. Singh, S. Bilgaiyan, B. S. P. Mishra, and S. Dehuri, Eds., A
Sector,” J. RESTI (Rekayasa Sist. Teknol. Inf.), vol. 6, no. 2, Journey Towards Bio-inspired Techniques in Software
pp. 281–288, Apr. 2022, doi: 10.29207/resti.v6i2.3924. Engineering, vol. 185. in Intelligent Systems Reference
[12] M. Abdurohman, A. Herutomo, V. Suryani, A. Elmangoush, Library, vol. 185. Cham: Springer International Publishing,
and T. Magedanz, “Mobile tracking system using OpenMTC 2020. doi: 10.1007/978-3-030-40928-9.
platform based on event driven method,” in 38th Annual IEEE [28] B. H. Rambe, R. Pane, D. Irmayani, M. Nasution, and I. R.
Conference on Local Computer Networks - Workshops, Munthe, “UML Modeling and Black Box Testing Methods in
Sydney, Australia: IEEE, Oct. 2013, pp. 856–860. doi: the School Payment Information System,” vol. 4, no. 36, 2020.
10.1109/LCNW.2013.6758523. [29] D. Kamińska, G. Zwoliński, and A. Laska-Leśniewicz,
[13] M. I. S. B. Khairat, Y. Priyadi, and M. Adrian, “Usability “Usability Testing of Virtual Reality Applications—The Pilot
Measurement in User Interface Design Using Heuristic Study,” Sensors, vol. 22, no. 4, p. 1342, Feb. 2022, doi:
Evaluation & Severity Rating (Case Study: Mobile TA 10.3390/s22041342.
Application based on MVVM),” in 2022 IEEE 12th Annual [30] D. Demirkol, “Sistem Kullanılabilirlik Ölçeğinin Türkçeye
Computing and Communication Workshop and Conference Çevirisi: SUS-TR,” uujss, vol. 11, no. Eylül-2018, pp. 238–
(CCWC), Las Vegas, NV, USA: IEEE, Jan. 2022, pp. 0974– 253, Jan. 2018, doi: 10.29217/uujss.495.
0979. doi: 10.1109/CCWC54503.2022.9720876. [31] L. South, D. Saffo, O. Vitek, C. Dunne, and M. A. Borkin,
[14] Dony Novaliendry and S. Andriani, “English Edugame “Effective Use of Likert Scales in Visualization Evaluations:
Application for Childhood base on Android,” RESTI, vol. 4, A Systematic Review,” Computer Graphics Forum, vol. 41,
no. 1, pp. 187–192, Feb. 2020, doi: 10.29207/resti.v4i1.1622. no. 3, pp. 43–55, Jun. 2022, doi: 10.1111/cgf.14521.
[15] B. Weder, J. Barzen, F. Leymann, and D. Vietz, “Quantum
Software Development Lifecycle,” in Quantum Software
DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
987