0% found this document useful (0 votes)
63 views

Implementation of System Development Life Cycle SD

The document summarizes a research paper that implemented a system development life cycle (SDLC) approach using prototyping to develop an IoT-based lending locker application for a university library in Indonesia. A survey found students wanted a system with book information, categories by field, and online borrowing. The application was created using Android and integrated with lockers and Firebase storage. The lockers used ESP32 modules to communicate with the app. The prototyping SDLC process involved collecting requirements, creating a prototype, getting user feedback, coding, testing, and deployment. The goal was to meet user needs and solve problems identified in the survey.

Uploaded by

Wildan Mumtaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Implementation of System Development Life Cycle SD

The document summarizes a research paper that implemented a system development life cycle (SDLC) approach using prototyping to develop an IoT-based lending locker application for a university library in Indonesia. A survey found students wanted a system with book information, categories by field, and online borrowing. The application was created using Android and integrated with lockers and Firebase storage. The lockers used ESP32 modules to communicate with the app. The prototyping SDLC process involved collecting requirements, creating a prototype, getting user feedback, coding, testing, and deployment. The goal was to meet user needs and solve problems identified in the survey.

Uploaded by

Wildan Mumtaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Accredited Ranking SINTA 2

Decree of the Director General of Higher Education, Research and Technology, No. 158/E/KPT/2021
Validity period from Volume 5 Number 2 of 2021 to Volume 10 Number 1 of 2026

Published online on: http://jurnal.iaii.or.id

JURNAL RESTI
(Rekayasa Sistem dan Teknologi Informasi)
Vol. 7 No. 4 (2023) 982 - 987 ISSN Media Electronic: 2580-0760

Implementation of System Development Life Cycle (SDLC) on IoT-Based


Lending Locker Application
Melinda Melinda1, Shaquille Rizki Ramadhan Na2, Yudha Nurdin3, Yunidar Yunidar4
1,2,3,4Departmentof Electrical and Computer Engineering, Faculty of Engineering, Universitas Syiah Kuala, Banda Aceh,
Indonesia
[email protected], [email protected], [email protected], [email protected]

Abstract
Libraries are social institutions that provide information services that can be accessed publicly to meet the information needs
of librarians. Based on the results of a survey conducted on 58 students who have visited the library of the Electrical and
Computer Engineering Department of Universitas Syiah Kuala, an information system was needed that provided research book
information related to the author's name, year of writing, field concentration, and abstract of the research book and there was
a division of categories based on field concentration, and there was an online borrowing feature. Based on these problems,
this study aims to implement an Android application system with IoT-based lending lockers using the SDLC (system
development life cycle) Prototyping method. This study produces an application with a locker-based online lending feature,
several other features as the user desires, and 1 prototype lending locker. The locker-based online lending system integrated
with ESP32-WROOM-32 can connect with Firebase storage and send locker key codes to Firebase so the application can
access them. Through experiments and tests conducted on the application, it is obtained that the application can access the
locker key code and display it to the user. The application has also been validated using black-box and white-box testing and
can be accepted by users based on System Usability Scale (SUS) average score with a very feasible interpretation category.
Keywords: libraries; SDLC; locker-based; IoT-based

1. Introduction is a division of categories based on field concentration


and an online lending feature.
Libraries are social institutions that provide information
services that can be accessed publicly to meet the This study was conducted to solve the problem by
information needs of librarians [1], [2]. The old creating an Android-based library application.
paradigm describes the library as a collection of books Although there have been studies that create library
and information sources in printed form with manual applications such as in research [5]-[8]. However, this
access. However, the digital era has changed the study differs from previous studies by adding a lending
paradigm of the library as a medium of information in system with IoT-based lockers. The Internet of Things
digital form that can be accessed online [3], [4]. (IoT) is a technology that allows information about
objects around the environment to be sent and
A survey conducted by the author on 58 students
controlled through the Internet network [9]. This
majoring in Electrical and Computer Engineering
technology will connect everything through the internet
(JTEK) Syiah Kuala University who visited the JTEK
[10]. IoT has been implemented in smart homes,
library in May 2022 obtained the results that 77.6
buildings, farms, smart electronic health, and military
percent of respondents have experienced difficulties
IoT [11], [12]. In the same way, IoT can be a solution
when looking for research books in the library, 74.1
to transmit data from lockers to servers via the internet
percent of respondents have experienced incidents
[11] so that lockers and applications can connect and
where the book they are looking for is not found, 98.3
communicate online.
percent of respondents feel that an information system
is needed that provides research book information The application does not only aim to communicate with
related to the author's name, year of writing, field lockers online in book lending services. However, the
concentration, and abstract of the research book. There application must be able to meet the criteria approved
by the user and be able to solve the problems in the

Accepted: 27-04-2023 | Received in revised: 16-07-2023 | Published: 22-08-2023


982
Melinda, Shaquille Rizki Ramadhan Na, Yudha Nurdin, Yunidar Yunidar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol. 7 No. 4 (2023)

previously conducted survey. Therefore, applications


must go through a structured procedure to get results
that satisfy users [13]. In addition to the addition of IoT
systems, this study uses the Software Development
Lifecycle (SDLC) method to create applications that
meet user requirements. This study is expected to build
an application that meets user needs functionally and
non-functionally and produce an application tested for
feasibility [14], [15].
Related research such as Locker Swarm [16] focuses Figure 1. Prototyping Model Development Stages
on the use of Internet of Things (IoT) and full stack
software development to offer an alternative smart Figure 1 shows the prototyping model SDLC method
locker solution. Instead of a physical key, each locker procedure, starting with collecting information on the
can be unlocked by scanning a Quick Response code needs required by the software. A prototype is made
(QR code), and its access can be shared among selected based on the collected information. Furthermore, the
individuals. Users can search for the closest lockers, see prototype will be evaluated by prospective users to get
the locations of all lockers, and check locker feedback. The feedback will be used as a reference to
availability. improve and update the prototype. When the user has
validated the prototype, then the prototype will enter the
coding process into a system. The next process after
2. Research Methods
finishing coding the prototype is testing the system.
2.1 Software Development Life Cycle (SDLC) Model Systems that successfully pass the testing process will
Prototyping be published for use by users.
The software lifecycle is a descriptive and prescriptive 2.2 IoT Systems
characteristic of software development. It deals with
The lockers implemented in the book lending system
various phases and parts, from planning to testing and
use the ESP32-WROOM-32 module. This module
deploying the application. All activities are performed
allows applications and lockers to communicate and
in different ways according to the requirements. These
share data through the Firebase data storage service
activities are called the Software Development
[20]. The IoT concept is applied to the lending locker
Lifecycle (SDLC). SDLC is a general methodology
utilizing the ESP32-WROOM-32 module to
used in developing systems or software. The phases in
communicate and share data with the application
the SDLC start from planning, analysis, design, and
through the Firebase storage service intermediary.
implementation to system maintenance [16].
Concerning mobile applications, information is needed
about all application needs from users. Information
about the needs of mobile applications needs to be
collected first so that the application can fulfill the user's
wishes [17]. Therefore, information is collected using
the prototyping model SDLC method [18]. With this
method, information can be collected quickly according Figure 2. Workflow of IoT Systems
to user needs. Errors can be detected quickly, and user
feedback is more quickly available to produce the best The ESP32-WROOM-32 has various specifications,
solution [19]. ranging from individually controllable CPU cores to
clock frequencies that can be adjusted from 80 to 240
Prototyping techniques focus on presenting aspects of MHz. In addition, ESP32-WROOM-32 also integrates
the software that users will see. Users will evaluate a rich set of peripherals ranging from capacitive touch
prototypes to filter the needs of the software until they sensors, SD card interface, and ethernet to I2C [21].
find the software specifications according to the user's From Figure 2, it is shown that the app and lockers
wishes [19]. The stages of this development model are require the Internet to connect with Firebase [22]. That
shown in Figure 1. way, the app, and lockers can communicate and share
necessary data. The user will receive a locker key code
that the locker sends to Firebase. Thus, the user can
access the locker and retrieve the book that has been
borrowed from the locker. The IoT concept for the
lending locker implements a simple algorithm shown in
Figure 3.

DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
983
Melinda, Shaquille Rizki Ramadhan Na, Yudha Nurdin, Yunidar Yunidar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol. 7 No. 4 (2023)

Function Function
Description
Code Name
Research book seekers can view
View loan
T-F-007 detailed loan information on the
details
loan details page.
Research book seekers can see the
See locker
T-F-008 storage locker code on the loan
Figure 3. Workflow of the IoT Loan Locker Algorithm code
details page.
The system will generate a new random 4-digit key. The Research book seekers can delete
Delete loan
T-F009 the book borrowing history on the
generated key will be stored in the Firestore database so history
research book loan list page
the application can access it. Then after the key is
Research book seekers can add
successfully generated and stored, the system will make Adding
T-F-010 bookmark on research book
another request to the database so that the key obtained bookmarks
details page.
by the application user has similarities with the key in Research book seekers can see a
the locker. When the user enters the key given by the View a list of list of research books that have
T-F-011
bookmarks been added from the previous
electronic thesis application on the locker, the system research book details page.
will check the key similarity. When the given key is not Research book seekers can
Removing
the same, the system will give an error message on the T-F-012 remove bookmark on research
bookmarks
LCD and ask the user to re-enter the key. When the key book detail page
Research book seekers can search
is the same, the system will open the locker door then Search for
for research books in the system
the system will create a new key. T-F-013 research
by using the title of the research
books
book as a search keyword.
2.3 Mobile Application Change Research book seekers can change
T-F-014
username username
Application requirements contain features or services Change Research book seekers can change
T-F-015
that must be provided by the application, including the password password
system's reaction to certain inputs and the application's Research book seekers may exit
T-F-016 Logout
behavior in certain situations. Application requirements system.
depend on the application's user and where the
application will be used [17], [23]. In this study, In addition, a use case diagram is shown in Figure 4 that
application requirements have been obtained based on describes and illustrates the interaction of actors or
the analysis of the survey results that have been carried users with the software system. In addition, use case
out. The application needs in this study are divided into diagrams are also used as verification requirements,
2 based on user identity, namely guests and research provide an overview of the interface of a system, and
book seekers. The application requirements in this provide certainty about system requirements [14]. The
study are shown in Table 1 and Table 2. use case diagram is created by linking each functional
requirement to each actor.
Table 1. Guest Requirements Information

Function
Function Name Description
Code
T-F-001 Registration Guest can register on the
system as a research book
seeker.
T-F-002 Login Guest can log into the system
as a research book seeker.

Table 2. Research Book Seekers Requirements Information

Function Function
Description
Code Name
Research book seekers can see a
View the list
list of books according to the field
T-F-003 of research
concentration category according
books
to the system
Research book seekers can view
View research detailed research book
T-F-004 Figure 4. Diagram Use Case
book details information on the research book
detail page. 2.4 Lockers System
Research book seekers can borrow
Borrow a
T-F-005 research books on the research The locker system consists of several components,
research book
book details page.
View
namely ESP32-WROOM-32 as a microcontroller and
Research book seekers can see a interactor in the database [20], PCF8574 as a helper
T-F-006 borrowed
list of borrowed research books.
books module that connects the LCD and Keypad with ESP32,
16x2 LCD as an interface to the locker [24], 4x4

DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
984
Melinda, Shaquille Rizki Ramadhan Na, Yudha Nurdin, Yunidar Yunidar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol. 7 No. 4 (2023)

Keypad as input to the locker, Relay as a current breaker After the locker successfully sends the locker key code
on the solenoid lock door, Selenoid Lock Door as a to Firebase, the application can access the key code that
locker door lock. The architecture and circuitry of the stored in the Cloud and to be displayed to the user. The
locker system are shown in Figure 5, and locker application provides a borrowing form that the user
specification are shown in Table 3. must fill in to fulfill the requirements for borrowing
Table 3. Locker Specification
research books. After the form is filled in, the
application will provide detailed borrowing information
Components Total Specifications to the user where there is a locker key code. The locker
Wood Plank 3 meters 2 cm key code provided will match the locker key code sent
Door Handle 1 unit As required
Door Hinges 1 unit As required by the locker system on Firebase. By implementing this
IoT system, it produces a locker system that is different
from [25], which also implements a locker-based digital
Table 4 Locker System Specification library, where the locker system in this study is not used
Components Total Specifications as a secret storage place but only a place to store books
Selenoid mini small 1 unit Voltage 6V/12V/24V, Ampere that have been borrowed by librarians and can be
lock door 350mA/600A accessed by anyone who has a locker key code. The
PCF8574 1 unit I2C Interface
Arduino keypad 4x4 1 unit 24Vdc, 30mA
following is the borrowing details page and locker key
ESP32 WROOM-32 1 unit Power 3,3 VDC code page in the application shown in Figure 7.

(a)

(a) (b)

(b)
Figure 5. (a) Lockers Design, (b) Lockers System Circuit

The lockers are made using wooden blocks with a


(c)
height of 40cm, width of 20cm, and length of 23cm.
LCD and Keypad are placed on the front door. PCF8574 Figure 6. Result of Locker Implementation. (a) Entire Locker
Section, (b) Side of the Locker, (c) Inside Locker
and ESP32 are placed on the outer right side. And
selenoid door lock is placed on the inside door of the
locker.

3. Results and Discussions


One of the features contained in the application is the
locker-based online research book lending feature
which needs to be applied in previous studies [5]-[8].
When run, the locker which has accessed to internet,
then will send a key code to Firebase (Database in the
cloud that will store key code) so the application can
access it. The locker key code is sent according to the
algorithm in Figure 3. The results of the circuit design
implementation are shown in Figure 6.

DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
985
Melinda, Shaquille Rizki Ramadhan Na, Yudha Nurdin, Yunidar Yunidar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol. 7 No. 4 (2023)

(a) (b) carried out using the System Usability Scale (SUS)
Figure 7. (a) Loan Details Page, (b) Locker Key Code Page [29], where 10 users who have used the application are
given several questions related to the satisfaction of
To find out if the application made has been running as using the application that has been made, as shown in
planned and in accordance with the wishes of the user, Figure 8.
3 stages of testing of the application are carried out,
namely white-box [26], black-box [27], and usability Based on the Likert scale [30], the respondents' scores
[28]. White-box testing tests the suitability of the input obtained from filling out 10 System Usability Scale
flow that enters the ViewModel module before being questions will be processed to determine the calculated
displayed on the application screen by analyzing the value of each respondent. The total score of the
code structure in the ViewModel. Then, black-box respondents obtained is 940, and the average score on
testing is continued by observing the suitability of input SUS is 94. Based on the interpretation of SUS values,
and output on each application feature without knowing the average score on SUS shows that the software that
the code structure. The results of white-box and black- has been made is included in the very feasible
box testing are listed in Table 4 and Table 5. interpretation category.
Table 4. White-box Testing Results

Total Test
Name of Controller Status
Case
RegisterViewModel 1 Test Passed
LoginViewModel 2 Test Passed
CupBoardViewModel 1 Test Passed
DetailViewModel 7 Test Passed
FavoriteViewModel 1 Test Passed
LoanFormViewModel 2 Test Passed
HomeViewModel 2 Test Passed
SearchViewModel 1 Test Passed
SettingsViewModel 2 Test Passed

Table 5. Black-box Testing Results


Figure 8. Result of Application Interface Display
Total
No Function Code Test Status
Case 4. Conclusion
1 Registration/T-F-001 3 Test Passed This study is based on creating a mobile application
2 Login/T-F-002 3 Test Passed with a locker-based online lending feature in the library.
3 View the list of research 1 Test Passed As a result, the application has a locker-based online
books /T-F-003
4 View research book details 1
lending feature and several other features as the user
Test Passed
/T-F-004 desires. The locker-based online lending system
5 Borrow a research book / 2 Test Passed integrated with ESP32-WROOM-32 can connect with
T-F-005 Firebase storage and send locker key codes to Firebase
6 View borrowed books /T- 1 Test Passed
F-006
so the application can access them. Through
7 View loan details /T-F-007 1 experiments and tests conducted on the application, it is
Test Passed
8 See locker code/T-F-008 1 seen that the application can access the locker key code
Test Passed
9 Delete loan history /T-F- 2 and display it to the user. The application has also been
Test Passed
009 validated and can be accepted by users with a feasible
10 Adding bookmark/T-F-010 1 Test Passed interpretation category. One prototype locker was used
11 View a list of bookmarks 1 Test Passed in this study, and the application was only created for
/T-F-011 research book search users. In reality, the application
12 Removing bookmarks /T- 1 Test Passed
F-012
also needs to be created for library staff to update the
13 Search for research 2 latest research book data and provide information on the
Test Passed
books/T-F-013 location of the borrowed research book in the locker if
14 Change usename/T-F-014 1 Test Passed there is more than one locker in use. Therefore, the
15 Change password/T-F-015 1 Test Passed whole system became more complex, resulting in a
16 Logout/T-F-016 2 Test Passed better system.
The white-box and black-box testing results show that References
the application has been validated and can run as
planned in this study. Furthermore, usability testing is [1] D. Begum and Md. H. Elahi, “Digital library services to
support online learning amid COVID-19: a study of a private

DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
986
Melinda, Shaquille Rizki Ramadhan Na, Yudha Nurdin, Yunidar Yunidar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol. 7 No. 4 (2023)

university library in Bangladesh,” DLP, vol. 38, no. 3, pp. 332– Engineering, M. A. Serrano, R. Pérez-Castillo, and M. Piattini,
345, Jun. 2022, doi: 10.1108/DLP-03-2021-0025. Eds., Cham: Springer International Publishing, 2022, pp. 61–
[2] S. Hussaini, M. Haruna, and A. Muhammad, “Application and 83. doi: 10.1007/978-3-031-05324-5_4.
Use of ICT in University Library Services: A Panacea for [16] J. Sa-ngiampak et al., “LockerSwarm: An IoT-based Smart
Conventional Library Services,” JOITS, vol. 7, no. 1, pp. 1–8, Locker System with Access Sharing,” in 2019 IEEE
Dec. 2020, doi: 10.46610/JOITS.2021.v07i01.001. International Smart Cities Conference (ISC2), Casablanca,
[3] “The next step in librarianship: Is the traditional library dead? Morocco: IEEE, Oct. 2019, pp. 587–592. doi:
The next step in librarianship: Is the traditional library dead?” 10.1109/ISC246665.2019.9071664.
https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1 [17] Y. Bassil, “A Simulation Model for the Waterfall Software
638&context=libphilprac (accessed Nov. 22, 2022). Development Life Cycle,” International Journal of
[4] A. Rahimi, M. R. Soleymani, A. Hashemian, M. R. Hashemian, Engineering, vol. 2, no. 5, 2012.
and A. Daei, “Evaluating digital libraries: a systematised [18] J. Dąbrowski, E. Letier, A. Perini, and A. Susi, “Analysing app
review,” Health Info Libr J, vol. 35, no. 3, pp. 180–191, Sep. reviews for software engineering: a systematic literature
2018, doi: 10.1111/hir.12231. review,” Empir Software Eng, vol. 27, no. 2, p. 43, Mar. 2022,
[5] M. M. Aristov, J. W. Moore, and J. F. Berry, “Library of 3D doi: 10.1007/s10664-021-10065-7.
Visual Teaching Tools for the Chemistry Classroom [19] P. Ragunath, S. Velmourougan, P. Davachelvan, S.
Accessible via Sketchfab and Viewable in Augmented Kayalvizhi, and R. Ravimohan, “Evolving A New Model
Reality,” J. Chem. Educ., vol. 98, no. 9, pp. 3032–3037, Sep. (SDLC Model-2010) For Software Development Life Cycle
2021, doi: 10.1021/acs.jchemed.1c00460. (SDLC),” 2010.
[6] T. Iqbal and M. Wali, “IDOL: Retrofit-Kotlin Service-Based [20] A. Garg, R. Kumar Kaliyar, and A. Goswami, “PDRSD-A
Online Digital Library Application and College Open Data systematic review on plan-driven SDLC models for software
Repository,” ijsecs, vol. 2, no. 1, pp. 1–8, May 2022, doi: development,” in 2022 8th International Conference on
10.35870/ijsecs.v2i1.760. Advanced Computing and Communication Systems (ICACCS),
[7] A. R. Dinazzah and R. Rahmi, “Mobile Library Application in Coimbatore, India: IEEE, Mar. 2022, pp. 739–744. doi:
Indonesia’s Digital Libraries,” j.of education technology, vol. 10.1109/ICACCS54159.2022.9785261.
6, no. 1, p. 149, Mar. 2022, doi: 10.23887/jet.v6i1.43575. [21] “ESP32-WROOM-32 Datasheet.”
[8] K. Rivo and M. Žumer, “Academic Libraries and Use of https://www.alldatasheet.com/datasheet-
Mobile Devices: Case Study of Slovenia,” The Journal of pdf/pdf/1148026/ESPRESSIF/ESP32-WROOM-32.html
Academic Librarianship, vol. 48, no. 3, p. 102507, May 2022, [22] A. C. Gheorghe, E. Stan, and I. Udroiu, “Electricity
doi: 10.1016/j.acalib.2022.102507. Consumption Measurement System Using ESP32,” The
[9] L. Suryani et al., “Implementation of Maggot Cage Scientific Bulletin of Electrical Engineering Faculty, vol. 21,
Temperature and Humidity Control Using ESP8266 Based On no. 2, pp. 23–26, Dec. 2021, doi: 10.2478/sbeef-2021-0017.
the Internet of Things,” J. RESTI (Rekayasa Sist. Teknol. Inf.), [23] S. S. R. Emmadi and S. Potluri, “Android Based Instant
vol. 6, no. 5, pp. 877–882, Nov. 2022, doi: Messaging Application Using Firebase,” vol. 7, no. 5, 2019.
10.29207/resti.v6i5.4502. [24] D. Zhu et al., “Building a Three-Level User Experience (UX)
[10] Izhangghani, I. Hikmah, and Slamet Indriyanto, “Prototype of Measurement Framework for Mobile Banking Applications in
Body Temperature and Oxygen Saturation Monitoring System a Chinese Context: An Analytic Hierarchy Process (AHP)
Using DS18B20 and MAX30100 Sensors based on IOT,” J. Analysis,” MTI, vol. 6, no. 9, p. 83, Sep. 2022, doi:
RESTI (Rekayasa Sist. Teknol. Inf.), vol. 6, no. 5, pp. 810–817, 10.3390/mti6090083.
Oct. 2022, doi: 10.29207/resti.v6i5.4385. [25] “PCF8574 Datasheet.”
[11] M. M and Finki Dona Marleny, “Platform Digital and Content [26] “Library Rooms And Study Spaces.”
Innovation to Increase Youth Interest in the Agricultural [27] J. Singh, S. Bilgaiyan, B. S. P. Mishra, and S. Dehuri, Eds., A
Sector,” J. RESTI (Rekayasa Sist. Teknol. Inf.), vol. 6, no. 2, Journey Towards Bio-inspired Techniques in Software
pp. 281–288, Apr. 2022, doi: 10.29207/resti.v6i2.3924. Engineering, vol. 185. in Intelligent Systems Reference
[12] M. Abdurohman, A. Herutomo, V. Suryani, A. Elmangoush, Library, vol. 185. Cham: Springer International Publishing,
and T. Magedanz, “Mobile tracking system using OpenMTC 2020. doi: 10.1007/978-3-030-40928-9.
platform based on event driven method,” in 38th Annual IEEE [28] B. H. Rambe, R. Pane, D. Irmayani, M. Nasution, and I. R.
Conference on Local Computer Networks - Workshops, Munthe, “UML Modeling and Black Box Testing Methods in
Sydney, Australia: IEEE, Oct. 2013, pp. 856–860. doi: the School Payment Information System,” vol. 4, no. 36, 2020.
10.1109/LCNW.2013.6758523. [29] D. Kamińska, G. Zwoliński, and A. Laska-Leśniewicz,
[13] M. I. S. B. Khairat, Y. Priyadi, and M. Adrian, “Usability “Usability Testing of Virtual Reality Applications—The Pilot
Measurement in User Interface Design Using Heuristic Study,” Sensors, vol. 22, no. 4, p. 1342, Feb. 2022, doi:
Evaluation & Severity Rating (Case Study: Mobile TA 10.3390/s22041342.
Application based on MVVM),” in 2022 IEEE 12th Annual [30] D. Demirkol, “Sistem Kullanılabilirlik Ölçeğinin Türkçeye
Computing and Communication Workshop and Conference Çevirisi: SUS-TR,” uujss, vol. 11, no. Eylül-2018, pp. 238–
(CCWC), Las Vegas, NV, USA: IEEE, Jan. 2022, pp. 0974– 253, Jan. 2018, doi: 10.29217/uujss.495.
0979. doi: 10.1109/CCWC54503.2022.9720876. [31] L. South, D. Saffo, O. Vitek, C. Dunne, and M. A. Borkin,
[14] Dony Novaliendry and S. Andriani, “English Edugame “Effective Use of Likert Scales in Visualization Evaluations:
Application for Childhood base on Android,” RESTI, vol. 4, A Systematic Review,” Computer Graphics Forum, vol. 41,
no. 1, pp. 187–192, Feb. 2020, doi: 10.29207/resti.v4i1.1622. no. 3, pp. 43–55, Jun. 2022, doi: 10.1111/cgf.14521.
[15] B. Weder, J. Barzen, F. Leymann, and D. Vietz, “Quantum
Software Development Lifecycle,” in Quantum Software

DOI: https://doi.org/10.29207/resti.v7i4.5047
Creative Commons Attribution 4.0 International License (CC BY 4.0)
987

You might also like