Home
Volumes
Submit Paper
Manuscript Status Author Guidelines Editorial Board
Technical Board
Indexing and Abstracting Subscribe to JATIT Contact Us
FeedBack |Links |Contact Us| Site Map
Welcome to Journal of Theoretical and Applied Information Technology
Editorial Board
EDITOR IN CHIEF
Prof. Niaz Ahmad
FCE, MOE, Islamabad, PAKISTAN
EDITORIAL BOARD
Dr. CHRISTEL BAIER
Faculty of Computer Science, Institute for Theoretical Computer
Science, Technical University Dresden, GERMANY.
Dr. YUSUF PISAN
Department of Software Engineering, Faculty of Information
Technology, University of Technology, Sydney, AUSTRALIA.
Dr. YUXIN MAO
School Of Computer & Information Engineering Zhejiang Gongshang
University, CHINA
Dr. MUHAMMAD SHER
Faculty of Basic and Applied Sciences, Department of Computer
Science, International Islamic University, Islamabad. PAKISTAN.
Dr. ZARINA SHUKUR
Computer Science Dept., Fakulti Teknologi dan Sains Maklumat,
University Kebangsaan Malaysia, 43600 Bangi, MALAYSIA.
Dr. NOR AZAN MAT ZIN
Department of Information Science, Faculty of Information Science &
Technology, National University of Malaysia (UKM) 43600 UKM BANGI,
MALAYSIA.
Dr. KHAIRUDDIN BIN OMAR
Faculty of Information Science and Technology, Universiti Kebangsaan
Malysia, 43600 Bangi Selangor Darul-Ehsan, MALYSIA.
Dr. TENGKU MOHD. BIN TENGKU SEMBOK
Faculty of Information Science and Technology Universiti Kebangsaan,
Malaysia, 43600 Bangi Selangor Darul-Ehsan, MALYSIA.
Dr PRABHAT K. MAHANTI
Department of Computer Science and Applied Statistics (CSAS),
Hazen Hall Room 311, University of New Brunswick, Saint John, New
Brunswick, CANADA.
Dr. R. PONALAGUSAMY
Department of Mathematics, National Institute of Technology,
Tiruchirappalli, Tamil Nadu, INDIA.
Dr. NITIN UPADHYAY
Computer Science & Information Systems Group, Birla Institute of
Technology and Science (BITS), Pilani-Goa Campus, NH-17B Bypass
Road, ZuariNagar, Goa, INDIA.
Dr. A. SERMET ANAGN
Eskisehir Osmangazi University, Industrial Engineering Department,
Bademlik Campus, 26030 Eskisehir, TURKEY.
Dr. YACINE LAFIFI
Department of Computer Science, University of Guelma, BP 401,
Guelma 24000, ALGERIA.
Dr. CHRISTOS GRECOS
School of Computing, Engineering and Physical Sciences, University of
Central Lancashire, Preston PR1 2E, UNITED
KINGDOM.Dr. JAYANTHI RANJAN
Institute of Management Technology, Raj Nagar, Ghaziabad, Uttar
Pradesh, INDIA
Dr. ADEL M. ALIMI
National Engineering School of Sfax (ENIS), University of SFAX,
TUNISIA
Dr. SIKANDAR HAYAT KHIYAL
Department of Computer Science, Fatima Jinnah Women University,
Rawalpindi, PAKISTAN
Dr. ADEL MERABET
Department of Electrical & Computer Engineering, Dalhousie
University, Halifax, CANADA
DR. HEMRAJ SAINI
CE&IT Department, Higher Institute of Electronics, Bani Walid. LIBYA
Dr. MAUMITA BHATTACHARYA
SOBIT, Charles Sturt University, Albury - 2640, NSW, AUSTRALIA
Dr. SEIFEDINE KADRY
Lebanese International University, LEBONON
Dr. AIJUAN DONG
Department of Computer Science, Hood College Frederick, MD 21701.
USA
Dr. S.S.RIAZ AHAMED
Mohamed Sathak Engineering College, Kilakarai, & Sathak Institute of
Technology, Ramanathapuram , Tamilnadu, INDIA
Dr. ZURIATI AHMAD ZUKARNAIN
University Putra Malaysia, MALAYSIA
Dr. CHELLALI BENACHAIBA
University of Bechar, ALGERIA
Dr. MOHD NAZRI ISMAIL
University of Kuala Lumpur (UniKL) MALYSIA
Dr. VITUS SAI WA LAM
The University of Hong Kong, CHINA
Dr. WITCHA CHIMPHLEE
Dr. SIDDHIVINAYAK KULKARNI
University of Ballarat, Ballarat, AUSTRALIA
Dr. S. KARTHIKEYAN
Caledonian College of Engineering, OMAN
Dr. DRAGAN R. MILIVOJEVI
Ć
Mining and Metallurgy Institute Bor Zeleni bulevar 35, 19210 Bor,
SERBIA
Dr. ABDUL AZIZ
Professor of Computer Science, University of Central Punjab,
PAKISTAN
Dr.P.DANANJAYAN
Professor, Department of ECE, PEC, Puducherry, INDIA.
Dr. E. SREENIVASA REDDY
Principal - Vasireddy Venkatadri Institute of Technology, Guntur, A.P.,
INDIA
Dr. SANTOSH DHONDOPANT KHAMITKAR
Ramanand Teerth Marathwada University, Nanded. Maharashtra
431605, INDIA
Dr. M. IQBAL SARIPAN
(MIEEE, MInstP, Member IAENG, GradBEM)
Dept. of Computer and Communication Systems Engineering, Faculty
of Engineering, Universiti Putra MALAYSIA
Dr. E. SREENIVASA REDDY
Principal - Vasireddy Venkatadri Institute of Technology, Guntur, A.P.,
INDIA
SHAHBAZ GHAYYUR
Faculty of Basic and Applied Sciences, Department of Computer
Science and Software Engineering, International Islamic University,
Islamabad. PAKISTAN.
Dr. T.C.MANJUNATH,
Professor & Head of the Dept.,Electronicis & Communication Engg.
Dept,
New Horizon College of Engg.,Bangalore-560087, Karnataka, INDIA.
Dr. Nacer eddine ZAROUR
LIRE Laboratory, Computer Science Departement, University Mentouri
of Constantine (UMC)
Dr. RIKTESH SRIVASTAVA
Assistant Professor, Information Systems, Skyline University College
P O Box 1797, Sharjah, UAE
Dr. Mohd ZAINAL ABIDIN AB KADIR,
PhD, MIEEE
Centre of Excellence on Lightning Protection (CELP)
Dept. of Electrical and Electronics Engineering, Faculty of Engineering,
UPM, Selangor, MALAYSIA
Dr. OUSMANE THIARE
Gaston Berger University, Department of Computer Science, UFR
S.A.T
BP 234 Saint-Louis, SENEGAL
Dr. SIDDHIVINAYAK KULKARNI
Graduate School of Information Technology and Mathematics
University of Ballart AUSTRALIA
Dr. BONNY BANERJEE
Senior Scientist Audigence, FL, USA, The Ohio State University,
Columbus, OH, USA
Dr. NICKOLAS S. SAPIDIS
Department of Mechanical Engineering, University of Western
Macedonia
Kozani GR-50100, GREECE.
Dr. NAZRI BIN MOHD NAWI
Software Engineering Department, Faculty of Science Computer
Information Technology, Universiti Tun Hussein Onn
MALAYSIA
Dr. JOHN BABALOLA OLADOSU
Ladoke Akintola University of Technology, Ogbomoso, NIGERIA
Dr. ABDELLAH IDRISSI
Department of Computer Science, Faculty of Science, Mohammed V
University - Agdal, Rabat, MOROCCO
Dr. AMIT CHAUDHRY
University Institute of Engineering and Technology, Panjab University,
Sector-25, Chandigarh, INDIA
Dr. ASHRAF IMAM
Aligarh Muslim University, Aligarh-INDIA
Dr. MUHAMMAD UMER KHAN
Department of Mechatronics, Faculty of Engineering, Air University,
Islamabad. PAKISTAN
Dr. MOHAMMED ALI HUSSAIN
Dept. of Computer Science & Engineering, Sri Sai Madhavi Institute of
Science & Technology, Mallampudi,
Rajahmundry, A.P, INDIA
Dr. KHALID USMANI
Department of Computer Science, Arid Agriculture University,
Rawalpindi, PAKISTAN.
Dr. GUFRAN AHAMD ANSARI
Qassim University, College of Computer Science, Ministry of Higher
Education, Qassim University, KINGDOM OF SAUDI ARABIA
Dr. Defa Hu
School of Information, Hunan University of Commerce, Changsha
410205, Hunan, P. R. of CHINA
MANAGING EDITORS
Saleha Samar
(
managing_editor at jatit.org
)
Journal of Theoretical and Applied Information Technology
Shahzad A. Khan
(
publisher at jatit.org
)
Lecturer IMCB, FDE Islamabad.
(
Managing Editor/Linguist & In-charge Publishing
)
Journal of Theoretical and Applied Information Technology
jatit.org Publishing Policy Review Process Code of Ethics
board if you hold a PhD in computing and have at-least 10
publications in International Journals/Conferences. Please drop your
CV at
managing_editor at jatit.org
. Members lists and requests are
reviewed at the end of every year in regional advisory panel meeting.
Home Volumes Submit Paper Manuscript Status Author Guidelines Editorial Board Indexing and Abstracting Subscribe to JATIT Contact Us Frequency : MONTHLY
FeedBack | Contact Us |Links | Site Map
Welcome to Journal of Theoretical and Applied Information Technology
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles from a wide range of Information Technology disciplines
encompassing the most basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org /submit_paper.php in an MSWord, Pdf or compatible format so that they may be evaluated for publication in the upcoming issue. This journal uses a blinded review process; please remember to include all your personal
identifiable information in the manuscript before
Journal of Theoretical and Applied Information Technology
January 2014 | Vol. 59 No. 2
Title: A NOVEL APPROACH TO GENERATE TEST CASES FOR COMPOSITION & SELECTION OF WEB SERVICES BASED ON MUTATION TESTING
Author: ASHOK KUMAR. P.S, KAARTHICK .B, GOPAL KRISHNA. C
Abstract: Now a day’s Web Service has become a significant part of the web. The importance of Web Services is to support interoperable and Application – to – Application interaction over a network with proper URI, so that Web Services provide high value to online business transactions. Testing (Verification & Validation) is a critical activity in software product design. Rigorous software testing is not possible so different software testing techniques are invoked before releasing the product. Based on Prim’s algorithm we created all possible test cases from directed weighted graph. Mutation testing is a structural testing method; it generates software tests and evaluating the quality of software testing by fault insertion in original code. A case study has been presented here in order to create the efficacy of our test approach in mutation analysis.
Keywords: Mutants, web service, testing, URI, SRS
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: TOWARDS A NEW ALGORITHM MORE EFFICIENT FOR UPDATING FIREWALL POLICIES
Author: A. KARTIT, Z. KARTIT, M. EL MARRAKI
Abstract: Firewall is one of the most widely utilized component on any network architecture, since that a deployment is a very important step to turn the initial policy to a target policy. This policy requires automated tools in order to create a suitable environment for configuring or deploying safely a policy target. Most researchers are interested in detection of conflicts or the problem of optimization of policies firewall while few of them have proposed deployment strategies for two important types of edition policies. We have already proposed a correct algorithm for the deployment type I [0]. In this work we study one of these strategies that falls within the type II edition policies. We show that the proposed solution of type II edition [1] is not fully correct and lead to security vulnerabilities, and then we offer a few corrections and improvements for this type of editing.
Keywords: Security Policy (SP), Firewall Policy Management (FPM), Security Vulnerabilities (SV), Network Security (NS)
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: A MULTI-ASPECT RULE BASED MODEL FOR WEB SERVICES OFFLINE COMPOSABILITY
Author: HAJAR OMRANA, FATIMA ZAHRA BELOUADHA, OUNSA ROUDIES
Abstract: Composition is still one of the most challenging key design goals of Web services technology. While they are designed to be aggregated and work with each other, most of existing Web services are developed independently and uses different standards. Detecting all the incompatibilities of Web services composability before processing the composition would increase the efficiency and correctness of this latter considerably. In this direction, we propose a multi-aspect Web services composability model, aligned with WSDL 2.0, SAWSDL and WS-Policy 1.5 standards, which addresses a set of functional, non-functional, contextual, data structure and technical composability rules to check whether to or more web services operations can concretely interact with each other.
Keywords: Web Services Composability , Dynamic Composition, WSDL 2.0, SAWSDL, WS-Policy
submitting it for review, we will edit the necessary information at our side. Submissions to JATIT should be full research / review papers (properly indicated below main title).
Full Text
Title: CORRECTION POSITION OF COORDINATES FROM DATA GPS LOGGER IN GOOGLE MAPS BY USING LAGRANGE INTERPOLATION METHOD
Author: NGAKAN MADE SATRYA WIBAWA, I MADE SUKARSA, I KETUT ADI PURNAWAN
Abstract: Development of navigation technologies increase rapidly. People need a GPS to indicate a location or street. The accuracy of the GPS position is often less precise. This problem is used as a discussion of issues in the design of GIS to fix the GPS coordinates to the coordinates of the path using interpolation polinom lagrange method. This study uses PL/SQL to MySQL engine to perform the calculations haversine formula and interpolation polinom lagrange. Coordinates improvements value obtained from the results of these calculations.
Keywords: GPS, GIS, PL/SQL, Correction Coordinate, Interpolation Polinom Lagrange
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: COMPARATIVE STUDY OF DATA MINING MODEL FOR CREDIT CARD APPLICATION SCORING IN BANK
Author: EVARISTUS DIDIK MADYATMADJA, MEDIANA ARYUNI
Abstract: The growth of credit card application needs to be balanced with the anticipation of bad credit risk because it does not use security collateral as warranty. The usage of credit scoring can be used to help the credit risk analysis in determining the applicant's eligibility. Data mining has been proven as a valuable tool for credit scoring. The aim of this research is to design a data mining model for credit scoring in bank in order to support and improve the performance of the credit analyst job. The proposed model applies classification using Naïve Bayes and ID3 algorithm. The accuracy of Naïve Bayes classifier is 82% and ID3 is 76%. So we can conclude that Naïve Bayes classifier has better accuracy than ID3 classifier.
Keywords: Credit Scoring, Data Mining, Credit Card, Bank, Naïve Bayes, ID3, Classification
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: MULTI-LEVEL TRUST ARCHITECTURE FOR MOBILE ADHOC NETWORKS BASED ON CONTEXT-AWARE
Author: A.RAJESH, DR. N. MOHAN KUMAR
Abstract: Mobile ad hoc networks (MANETs) are not favorable to centralized trust architecture and literature review provides several security framework and solutions for trust management. However, there is no unified architecture for MANET to exploit deployed security models based on trust. This study presents compelling trust architecture in which a trust based security model is superimposed with three trust models such as a low-level trust model, a medium-level trust model, and a high-level trust model based on context-aware security. The low-level trust model meets the necessary security requirements using direct observations. The medium-level trust model ensures medium security level using direct observations and recommendation messages. The high-level trust model provides a highly secured system with high complexity and computational cost. The proposed work is formulated based on the application context to determine the trust-level in geographic routing protocol. The proposed trust is fully distributed and application context dependent and dynamic in nature. The proposed multi-level trust model is integrated with Position based Opportunistic Routing (POR) Protocol that selects the trusted next hop in the routing path. The correctness of the proposed scheme is analyzed using network simulator (NS-2). Proposed work increases packet deliver ratio and throughput significantly.
Keywords: Mobile Ad Hoc Networks, Geographical Routing, Trust Management, Context-aware Trust, Trust based Security
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: INVESTIGATION OF SUPPORT VECTOR MACHINE CLASSIFIER FOR OPINION MINING
Author: K.SARASWATHI, Dr. A.TAMILARASI
Abstract: Complicated text understanding technology which extracts opinion, and sentiment analysis is called opinion mining. Building systems to collect/examine opinions about a product in blog posts, comments, and reviews/tweets is sentiment analysis. Product reviews are the focus of existing work on review mining and summarization. This study focuses on movie reviews, investigating opinion classification of online movie reviews based on opinion/corpus words used regularly in reviewed documents.
Keywords: Opinion Mining, Classification Accuracy, Sentiment analysis, Movie reviews, Support Vector Machine, Bagging
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: A ROBUST METHOD FOR DIGITAL IMAGES WATERMARKING BASED ON COMBINATION OF SVD, DWT AND DCT USING OPTIMAL BLOCK
Author: MOHAMED RADOUANE, TARIK BOUJIHA, ROCHDI MESSOUSSI, RAJA TOUAHNI
Abstract: With the growth of the Internet, development of digital media technologies and computer network, the change and the protection of copyright have become very important. To protect multimedia data against illegal recording and retransmission, the integration of a signal (digital signature, watermark) has become an obligation without modifying quality of the original image, the goal of this operation is to identify the owner and protect his intellectual property. Digital watermarking has been proposed as a solution to solving the copyright problem by introducing invisible data (watermark) into original image. In this paper, we propose a robust method for digital images watermarking. This method is achieved by searching the optimal block that can be used to insert the watermark in original image by modifying the singular value decomposition (SVD) in DWT (discrete wavelet transform) combined with DCT (Discrete Cosine Transform) . The experimental results show that this imperceptible method combines the advantage of three transformations to ensure robustness against most attacks.
Keywords: Watermarking, DWT, SVD, DCT, Entropy
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: FUZZY VAULT FUSION BASED MULTIMODAL BIOMETRIC HUMAN RECOGNITION SYSTEM WITH FINGERPRINT AND EAR
Author: R.VINOTHKANNA, Dr.AMITABH WAHI
Abstract: Human Recognition is one of the admired tasks over the world for recognizing a person using biometrics by determining physical or behavioral characteristics of that person. In our existing work, we have already worked out a multimodal biometric recognition system with fingerprint, palm print and hand vein. For getting more accurate recognition of our biometric system, in this work, we use ear as one of the modalities with the fingerprint. In order to improve the clear visible of input image databases, pre-processing of images is initially done. After the pre-processing of these images only, the features from the fingerprint and ear modalities are extracted clearly for the further processes. In the fingerprint images, the minutiae features are extracted directly and from the ear, the shape features are extracted using Active Appearance Model (AAM). Then, a grouped feature vector point is gained using chaff points and these two extracted feature points. After acquiring the grouped feature vector points, the secret key points are attached with the grouped feature vector points to formulate the fuzzy vault. Finally, test person’s grouped vector is matched up to the fuzzy vault data base to the accurate recognition of the correct person. Our proposed work is effectively evaluated in Matlab with the evaluation metrics FAR, FFR, GAR and Accuracy by changing the secret key size at every time. The results of our proposed work facilitate very better values for the recognition of persons with the fingerprint and ear modalities. Moreover, our existing work is also compared with our proposed work for proving that our proposed work is good. In addition to this, other existing work papers are also taken for our comparison work, which clearly proves that our proposed work outperforms other techniques by providing very much better recognition accuracy.
Keywords: Recognition, Multimodal biometric system, Minutiae Extraction, Bifurcation, Ridges, Active Appearance Model, Chaff points, Fuzzy Vault
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Author: G. Thippa Reddy, K. Sudheer, K Rajesh, K. Lakshmanna
Abstract: Cloud computing is rapidly gaining popularity. However, like any new system, cloud computing is facing some significant challenges. The most significant challenge faced by cloud adopters is related to legal compliance, security controls, privacy and trust. This paper proposes a novel security management framework by employing data mining to detect, contain and prevent attacks on cloud computing systems. Given that the security frameworks and related controls on cloud computing are still evolving, this research may prove to be a useful piece of contribution in enhancing the theoretical foundation established by existing studies.
Keywords: Cloud Computing, Data Mining, Security-as-a-service, OPNET, Positivism and the Interpretivism
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: A MULTI-AGENT BASED DISTRIBUTED INTRUSION PREVENTION SYSTEM AGAINST DDOS FLOODING ATTACKS
Author: A. SAIDI, A. KARTIT, M. EL MARRAKI
Abstract: Denial of service (DoS) attacks is a simple and very annoying type of intrusions. This kind of attacks attempts to make unreachable at least a service of equipment like it can stagnate the whole of a network. To launch a DoS attack, we have, nowadays, often tools to succeed. Some of these tools try to send a compromised network load to corrupt their targets by flooding it with SYN, UDP or ICMP packets [1],[2]. Our paper describes the conception of a multi-agent-based intrusion prevention system (IPS) that can apprehend these flooding attempts in a distributed way.
Keywords: DoS Attacks, Intrusion Prevention, Multi-agent System, Distributed System
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: FORECASTING EARNINGS PER SHARE FOR COMPANIES IN IT SECTOR USING MARKOV PROCESS MODEL
Author: M.P. RAJAKUMAR , V. SHANTHI
Abstract: Investors rely growth on earnings per share (EPS) which is the net income less dividends on preferred stock divided by the number of outstanding share for measuring the financial soundness of a company as it represents the profitability of a common stock. Many investors select stocks on the basis of earnings forecast, cost of capital and the particular company’s profitability compared to other companies. As this seems to be the base for any development phase, market analysts spend ample time in evaluating and refining EPS estimates. In this work Markov process model is applied for forecasting the subsequent quarter EPS for companies in information technology (IT) sector. Two models namely two state basic model and extended state interval model with time independent transition probability matrices are applied to analyze and predict the EPS for subsequent quarter of HCL infosystem, Reliance, Infosys and Wipro. The EPS data obtained from Bombay stock exchange (BSE) are used to test the proposed prediction model. The experimental results declare that two companies’ show optimistic sign of success, one company strikes a balance and the other company provides state of loss. The outcome of the prediction process is consistent in the real situation.
Keywords: Markov process model, earnings per share, forecasting, IT sectors
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: GOVERNANCE AUDIT OF APPLICATION PROCUREMENT USING COBIT FRAMEWORK
Author: GUSTI AYU THERESIA KRISANTHI, I MADE SUKARSA, I PUTU AGUNG BAYUPATI
Abstract: The audit of information system is conducted to check the level of readiness of the organization in managing Information Technology (IT) governance. Measurement of level of maturity in procurement of application in one of the universities in Indonesia using framework COBIT 4.1 toward several IT processes related with procurement applications process by mapping the identification of business goals, information technology goals and information technology process COBIT 4.1. Best practice is given using ITIL V3 standard which is obtained by mapping IT process of COBIT 4.1. Results of audit that has been conducted show the current maturity level index is in 2.85 which means in 3-defined of maturity level with the readiness level of expectation at the level of 5-optimized. This shows the readiness gap, thus, needs to be given improvement strategies that contain the steps to achieve the expected level of
maturity.
Keywords: Audit of Information System, IT Governance, COBIT, Maturity Level, ITIL
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: ENERGY EFFICIENT INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK USING NEURAL NETWORK
Author: SYEDA GAUHAR FATIMA,Dr.SYED ABDUL SATTAR, Dr.K ANITHA SHEELA
Abstract: In wireless sensor network (WSN), the existing intrusion detection techniques rarely consider energy consumption for judging the node state. Also there is need for increased detection rate. Hence in this paper, we propose an energy efficient intrusion detection system for WSN. Initially the nodes deployed in the network are analyzed for malicious activity based on their residual energy. If the energy consumption of a node is greater than a predicted threshold, it is considered as malicious and the packets emerging from these nodes are said to be abnormal. The abnormal packets are passed through the Back Propagation Network (BPN) to analyze the data misinterpretation. In case, the output of BPN is found to be abnormal, then the attack detection is confirmed and attack type is estimated. By simulation results, we show that the proposed technique is more energy efficient.
Keywords: WSN, Intrusion Detection, Wnergy Efficient, Neural Network
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: A NOVEL APPROACH FOR MITIGATION OF HARMONICS AND INTERHARMONICS IN VARIABLE FREQUENCY DRIVES
Author: PROF.VIJAYAKUMAR.A, DR.MAHENDRA BABU. T.K
Abstract: Interharmonics are non-integer multiples of the fundamental frequency that causes several undesirable effects. Variable frequency drives are main sources of interharmonics. Also interharmonics are generated when the inverter load is unbalanced or the inverter is operating in overmodulation. In this study, adjustable speed drive employing diode bridge rectifier and voltage source inverter with load unbalance is considered. Propogation of interharmonics in the supply side due to load unbalance is analysed and a novel method for mitiating interharmonics is proposed. The proposed method employs an active filter in supply side which is simulated using PSIM . With the proposed active filter the compensation effectiveness is significantly improved and allows the elimination of passive filters thereby reducing cost and space required.
Keywords: Interharmonics, Power Quality, Adjustable Speed Drive, Active Filter, Interharmonics Mitigation
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: MAPPING THE RESEARCH PRODUCTIVITY OF BANARAS HINDU UNIVERSITY: A SCIENTOMETRIC STUDY
Author: R. BALASUBRAMANI, R. PARAMESWARAN
Abstract: The study presents the growth and the contribution of research carried out by the scientists of Banaras Hindu University (BHU). The pattern of communications of authors and scattering of their research output in different journals, analysis the strong and weak areas of university research. The data for the study was taken from the Web of Science online database published by Institute for Scientific information (ISI). The study shows that there was a gradual growth of publications during 2000 - 2011. The annual average research output of BHU was 578 records and the research output of the scientists is fairly collaborative. “Current Science” is one of the most preferred journals of the authors of BHU. The Institute of Technology leads in publications productivity with 1482 (21.3%) articles. The authors of BHU have been collaborated with the foreign authors for their research work.
Keywords: Scientometrics Analysis, Scientometrics Study, Bibliometircs, Research Productivey, Banaras Hindu University, Scientfic Research-University.
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Title: EXPLOITING IPV6 ROUTING HEADERS TYPE 0/2 IN DIFFERENT IP WIRELESS NETWORKS: ATTACK SCENARIO & ANALYSIS
Author: BASSAM NAJI AL-TAMIMI, RAHMAT BUDIARTO, MOHD. ADIB OMAR, KAMAL M. ALHENDAWI
Abstract: Mobile IP is an open standard protocol designed by IETF to allow users to move from one network to another while maintaining their own permanent IP addresses. However, the seamless connectivity in different IP networks has introduced new security vulnerabilities. One of the most critical concerns with the IPv6 is IPv6 routing header. IPv6 routing header can be used by an IPv6 source to list one or more intermediate hosts to be visited on the way to a packet’s destination. Nevertheless, the feature of IPv6 routing header which has serious vulnerability can be used by attacker to bypass security policies applied on filtering devices such as firewall. This study analyzes the IPv6 routing header feature which can be exploited by attackers to access the protected hosts/networks. Thus, the current study provides a comprehensive view regarding the scenario of attackers within the different IP wireless networks which in turn provide the researchers and practitioners with the threats of attackers. The scenario analysis also leads to developing new mechanisms for covering the security problem of routing header type 0/2 which is still under investigation.
Keywords: MIPv4; MIPv6; MN; IPv6 Routing Header, Different wireless IP networks
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: NTRU ENCRYPTION USING HUFFMAN COMPRESSION
Author: M.N.M. PRASAD , DR. MOHAMMED ALI HUSSAIN, DR. C.V. SASTRY
Abstract: NTRU Labs have proposed a scheme for secure transmission using ring of truncated polynomials in Zq(x) / (xn -1). We have proved in this paper that a pre-processing the data to be transmitted greatly decreases the time of transmission. We have used a matrix version of NTRU Cryptosystems.
Keywords: Truncated, Transmission, Polynomials, Ring, Secure, Number Theory Research Unit (NTRU)
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: HYBRID GENETIC ALGORITHM WITH GREAT DELUGE TO SOLVE CONSTRAINED OPTIMIZATION PROBLEMS
Author: NABEEL AL-MILLI
Abstract: In this paper, a new hybrid optimization algorithm based Genetic Algorithms (GAs) is proposed to solve constrained optimization engineering problems. A hybrid Genetic Algorithms (GA) and great deluge algorithm are used to solve non-linear constrained optimization problems. The algorithm works on improving the quality of the search speed of GAs by locating infeasible solutions (i.e. chromosomes) and use great deluge to return these solutions to the feasible domain of search; thus have a better guided GA search. This hybridization algorithm prevents GAs from being trapped at local minima via premature convergence. The simulation results demonstrate a good performance of the proposed approach in solving mechanical engineering systems.
Keywords: Genetic Algorithm, Great deluge, Welded Beam Design, Pressure Vessel
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: PERFORMANCE ANALYSIS OF OPTIMIZATION TECHNIQUES FOR MEDICAL IMAGE RETRIEVAL
Author: Ms. N. T. RENUKADEVI, Dr. P. THANGARAJ
Abstract: The computer-aided diagnosis systems (CAD) are widely used for clinical diagnosis and treatment. Content-based image retrieval (CBIR) of medical images, according to its domain specific image features, is a valuable tool for physicians. A method for automatic classification of computed tomography (CT) images of different types is presented in this paper. The proposed method has three major steps: 1. Feature are extracted from the CT images using Coif let wavelets; 2. The features extracted are classified using Support Vector Machine; 3. The parameters of the SVM are optimized using Particle Swarm Optimization (PSO), and modified PSO with a genetic algorithm
Keywords: Content-based image retrieval, Computed Tomography, Coif let wavelets, Particle Swarm Optimization, Genetic algorithm, Support Vector Machine
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: SOLVING MAXIMAL COVERING PROBLEM USING PARTITIONED INTELLIGENT FISH ALGORITHM
Author: AMIN JULA, ELANKOVAN SUNDARARAJAN, NARJES KHATOON NASERI, REZA ABIAT
Abstract: NP-Complete optimization problems are a well-known and widely used set of problems which surveyed and researched in the field of soft computing. Nowadays, because of the acceptable rate of achieving optimal or near-optimal solutions of the mentioned issues, using of nature-inspired algorithms are increasingly considered. One of the familiar problems in the field of NP problems is Maximal Covering Problem which has various applications of pure mathematics to determine the location of mobile network antennas or police stations. In this paper, we introduced a heuristic algorithm called Partitioned Artificial Intelligent Fish Algorithm which using artificial fish-search algorithm, logical partitioning of the search space of this algorithm to several sub-space and change in motor functions in fishes, deals with the suitable, innovative and fast solution of maximal covering problem. The results of implementing this algorithm and comparing it with the performance of some the best known algorithms for solving NP problems will be represented by a very good performance of the proposed algorithm.
Keywords: Artificial Fish Algorithm, Maximal Covering Problem, NP-hard problem
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: E-BANJAR BALI, POPULATION CENSUS MANAGEMENT INFORMATION SYSTEM OF BANJAR IN BALI BY USING FAMILY TREE METHOD AND BALINESE CULTURE LAW
Author: I GUSTI BAGUS ARI PINATIH, A.A. KOMPIANG OKA SUDANA, I KETUT ADI PURNAWAN
Abstract: This paper describes how population census in Balinese traditional village i.e. banjar are managed. This kind of information system is known as e-Banjar Bali. A case study was conducted in Banjar Padang Tegal Tengah, a banjar in Ubud, Bali regarding to the information system. This population information system uses website as its basis. The study was done to find an easier population census management. Managing family tree, calculating total population, indigenous and non-indigenous people, active and non-active population, natality and mortality are inclusive in the census. Additional feature included as a part of this information system is management upon banjar organizational data and information spreading among the society. This particular information system is expected to minimize the use of paper or manual execution of population census.
Keywords: Banjar, Population, Management, Family Tree, Balinese Culture Law
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: FACTOR INFLUENCING THE USE OF SMART PHONE BY MALAYSIAN’S ELDERLY
Author: NAIM CHE PEE, ZULISMAN MAKSOM, AZIR REZHA NORIZAN
Abstract: The smart phone has become essential part of personal and business life across all age boundaries. The smart phone usage can potentially play a significant role in assisting the elderly in many ways especially in terms of maintaining social relationship, providing a sense of safety and accessibility. However, elderly seems to be the neglected user group in the design of recent smart phone interface and the penetration of the technology to the elderly are very low. Hence this paper attempt to report issues that are related to why this particular group of user aged 40 years old and above was influenced to own the smart phones and the data gathering was done specifically in Malaysia context. This research used an interview and survey instrument to obtain the data from the intended target group of user whom are using smart phones. The result indicates three main factors that influence the respondents to own their smart phone which is family encouragement, the use of mobile internet and social networking.
Keywords: Interface Design, Elderly, Smartphone, Influencing Factors, And Technology Penetration
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Title: BASIP A VIRTUAL MACHINE PLACEMENT TECHNIQUE TO REDUCE ENERGY CONSUMPTION IN CLOUD DATA CENTRE
Author: AJITH SINGH. N, M. HEMALATHA
Abstract: Infrastructure as a Service (IaaS) in cloud computing provides Infrastructure as a service for the demand of user from small instance to large instance in pay per use model. The services include like computer resource, networking and data storage. An API (Application Programming Interface) is used to access the infrastructure and a dashboard to control the server and to create and manage different Virtual Machines in the cloud data centre. Multiple cloud users access the service simultaneously. Due to continuous access of the services, a deadlock can happen, and it may lead to a system crash, although cloud computing is designed to overcome such problem, a proper Virtual Machine Placement Technique is needed for implementation to rule out such incidences. Deadlock can occur in cloud computing as the system is inherited from distributed computing and virtualization. A Virtual Machine Placement Technique known as BASIP is proposed to overcome the issue of deadlock by using a banker algorithm with Stochastic Integer Programming. Further, the proposed algorithm is being simulated with hundreds of servers and thousands of virtual machines. The proposed algorithm was simulated with different overload detection and VM selection algorithm. The BASIP algorithm is experimented with 800 servers with 1024 Virtual Machines. From the experimental results, BASIP algorithm reduces energy significantly.
Keywords: Virtual Machine, Cloud Computing, Live Migration, Bankers and Stochastic Integer Programming, Deadlock Avoidance, Resource Allocation, Energy, Cloud Data Centre, Minimum Utilization Rank, Polynomial Regression, BASIP
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: PERFORMANCE OF MIMO MC-CDMA SYSTEM WITH CHANNEL ESTIMATION AND MMSE EQUALIZATION
Author: N. TAMILARASAN, L. NITHYANANDAN
Abstract: The quality of a wireless link can be described by three basic parameters, namely transmission rate, transmission range and transmission reliability. With the advent of multiple-input multiple-output (MIMO) assisted Multicarrier code division multiple access (MC-CDMA) systems, the above-mentioned three parameters may be simultaneously improved. The MC-CDMA combined with the MIMO technique, has become a core technology for future mobile radio communication system. However, possible potential gain in spectral efficiency is challenged by the receiver’s ability to accurately detect the symbol due to inter symbol interference (ISI). Multipath propagation, mobility of transmitter, receiver and local scattering cause the signal to be spread in frequency, different arrival time and angle, which results in ISI in the received signal. This will affect overall system performance. The use of MC-CDMA mitigates the problem of time dispersion. However, still it is necessary to remove the amplitude and phase shift caused by channel. To solve this problem, a multiple antenna array can be used at the receiver, not only for spectral efficiency or gain enhancement, but also for interference suppression. This can be done by the, efficient channel estimation with strong equalization. This paper proposes MIMO MC-CDMA system, Minimum mean square error (MMSE) equalization with pilot based channel estimation. The simulation result shows improved Bit error rate (BER) performance when the sub carrier (SC) and antenna configuration were increased.
Keywords: MC-CDMA, ISI, MMSE Equalization And Pilot Based Channel Estimation
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: ENERGY EFFICIENT TWO STAGE CHAIN ROUTING PROTOCOL (TSCP) FOR WIRELESS SENSOR NETWORKS
Author: HUSAM KAREEM, S.J. HASHIM, SHAMALA SUBERAMANIAM, ADUWATI SALI
Abstract: Wireless sensor nodes are mostly used in extreme environments, especially at remote and hostile areas including battlefield, volcanoes and underwater. Thus, it is difficult to replenish the energy source of the sensor node once it is installed. In order to prolong the lifetime of the nodes, we propose a new routing algorithm that can achieve significant energy conservation in WSNs, known as Two Stage Chain Routing Protocol (TSCP). The main objectives of TSCP is to minimize the total energy consumption, achieve more load balancing and increase the network lifetime with more stability compared with other routing algorithms, for examples Chain-Cluster based Mixed routing (CCM) and Chain-Chain Based Routing Protocol (CCBRP). TSCP algorithm divides the sensor network into multiple chains and work within two stages. The first stage is dividing the nodes to horizontal chains that include all sensor nodes within
the same row and the second stage is forming a vertical chain that includes all chain heads. The mechanism for selecting the heads in each row is sequentially chosen with all the heads belong to the same column. In the second stage, the node with maximum residual energy amongst the chain heads will be the main head that functions as a gateway to the base station. Simulation results show that TSCP outperforms CCM and CCBRP in overall energy conservation, network lifetime and stability.
Keywords: Wireless Sensor Network, TSCP, CCM, CCBRP, Chain Protocol
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: A NEW DENSITY BASED PROBABILISTIC COUNTER SCHEME FOR SOLVING BROADCAST STORM IN MOBILE AD HOC NETWORKS
Author: A. SENTHIL KUMAR, K.S. RAMASWAMI
Abstract: Broadcasting is a fundamental data dissemination mechanism for route detection, address resolution and many other network related services in Mobile Ad hoc Networks (MANETs). Although flooding is the simplest mechanism for broadcasting, where each node retransmits every individually received message exactly once, it is usually expensive and results in rigorous redundancy, contention and collisions in the network. These problems are widely referred to as the broadcast storm problem. Hence an effective broadcasting scheme is essential in MANETs to transmit a data packet from the sender to the rest of the network nodes. This work introduces a new counter-based broadcasting scheme to achieve efficient broadcasting by adaptive threshold with a predetermined forwarding probability ‘p’ which can be fixed based on the local density information. The counter identifies nodes with duplicate data packet using threshold values and node removes the redundant message. Probabilistic schemes do not require global topological information of the network to make a rebroadcast decision. As such every node is allowed to rebroadcast a message. The proposed work also adapts the random assessment delay (RAD) value to network congestion level and uses packet origination rate as an indicator of network congestion by keeping track of the number of packets received per second at each node. The extensive simulation results show that the new scheme outperforms the existing schemes in term of saved-rebroadcast, reachability and throughput.
Keywords: Manets, Flooding, Counter-Based, Broadcast Storm Problem, Throughput, Reachability
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: DESIGN OF ADAPTIVE BACKSTEPPING WITH GRAVITATIONAL SEARCH ALGORITHM FOR NONLINEAR SYSTEM
Author: SAHAZATI MD. ROZALI, MOHD FUAA’D RAHMAT, ABDUL RASHID HUSAIN, MUHAMMAD NIZAM KAMARUDIN
Abstract: Adaptive backstepping controller is designed for tracking purpose of nonlinear system with unknown parameter is injected to it. Gravitational search algorithm (GSA) is integrated with the designed controller in order to automatically tune its control parameters and adaptation gain since the tracking performance of the controller relies on these parameters. Performance evaluation is observed based on the tracking output and the tracking error between reference input and the system’s output. The effectiveness of the adaptive backstepping controller is verified by looking at the lowest amount value of Sum of Squared Error (SSE) attained from the simulation process. The results show that the system’s output follow the reference input given with remarkably small tracking error.
Keywords: Adaptive Backstepping, Tracking Error, Gravitational Search Algorithm, Sum of Squared Error, Disturbance
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: A REVIEW ON WIRELESS SENSOR NETWORKS ROUTING PROTOCOL: CHALLENGES IN MULTIPATH TECHNIQUES
Author: ABDULALEEM ALI ALMAZROI, MA NGADI
counted a significant field of research over the past decade. Thus, we present an inclusive review and present classification on the current routing sensor protocols, which are particularly designed for wireless sensor networks. We emphasize the main motivation behind the development of each routing protocol category and clarify the operation of different protocols in detail related to energy issues, with emphasis on their advantages and disadvantages. Moreover, the current multipath routing approach is broadly used in wireless sensor networks in order to improve network performance such as load balancing, reliability, fault tolerance, bandwidth aggregation and QoS Improvement. Therefore, in this paper we highlight the notion of the multipath routing approach and its essential challenges, additionally the basic motivations for utilizing this technique in wireless sensor networks. In addition, we contrast and review the state-of-the-art multipath routing protocols that based on energy aware method, fault tolerance and QoS multipath routing. At the end of this paper, a characterized comparison has been forwarded on these methods based on the analysis outcome.
Keywords: Wireless Sensor Networks, Routing Protocols, Energy Efficiency, Fault Tolerance, Qos, Multipath Routing
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: A STUDY OF TSUNAMI MODEL FOR PROPAGATION OF OCEANIC WAVES
Author: E.SYED MOHAMED, S.RAJASEKARAN
Abstract: The enormous destruction of tsunami and the increased risk of their frequent occurrences enhance the need for the use of more sturdy and accurate models that predict the spread of catastrophic oceanic waves accurately. This paper tries to study this phenomenon that shows a considerable amount of uncertainty. To model the spread of tsunami waves, the initial wave can be considered as a continuous two dimensional closed curve. Each point in its parametric representation on the curve will act as a point source which expands as a small ellipse. The parameters of each ellipse depend on many factors such as the energy focusing effect, travel path of the waves, coastal configuration, offshore bathymetry and the time step. Using Huygens’ wavelet principle, the envelope of these ellipses describes the new perimeter. Further, overlapping and traversing of the wave front are detached and efficiently clipped out
Keywords: Huygens’ Wavelet, Tsunami Propagation, Simulation, Curvature, Convex
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
Title: FAST AND SECURE HANDOVER AUTHENTCATION SCHEME IN MOBILE WiMAX
Author: H. F. ZMEZM, S.J. HASHIM, ADUWATI SALI
Abstract: Handover is one of the essential elements that can affect the Quality of Service (QoS) and capacity of Mobile Broadband Networks. The next generation of broadband wireless networks including the IEEE802.16e standard, allow users to roam seamlessly and securely over the network. Unfortunately the current design suffers from lengthy delay between breaking of previous connection and making of next connection. This delay might not be tolerated by some of the real-time applications such as VoIP and video streaming. Therefore the need for fast and secure handover design becomes an urging necessity. This paper proposes a new handover mechanism enables fast and secure handover with minimum delay suitable for real-time applications. It should be pointed that this proposed handover protocol guarantees a forward and backward secrecy. We conducted our research using ns-2 simulation tool.
Keywords: EAP-Authentication, Hard Handover, Mobile WiMAX, NS-2
Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014
Full Text
© 2005 - 2014 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
411
E-BANJAR BALI, POPULATION CENSUS MANAGEMENT
INFORMATION SYSTEM OF BANJAR IN BALI
BY USING FAMILY TREE METHOD
AND BALINESE CULTURE LAW
1
I GUSTI BAGUS ARI PINATIH,
2A.A. KOMPIANG OKA SUDANA,
3
I KETUT ADI PURNAWAN,
1,2,3
Department of Information Technology, Udayana University, Bali, 80119
E-mail:
1gba.pinatih@gmail.com
2
agungokas@hotmail.com
3dosenadi@yahoo.com
ABSTRACT
This paper describes how population census in Balinese traditional village i.e. banjar are managed. This
kind of information system is known as e-Banjar Bali. A case study was conducted in Banjar Padang
Tegal Tengah, a banjar in Ubud, Bali regarding to the information system. This population information
system uses website as its basis. The study was done to find an easier population census management.
Managing family tree, calculating total population, indigenous and indigenous people, active and
non-active population, natality and mortality are inclusive in the census. Additional feature included as a part of
this information system is management upon banjar organizational data and information spreading among
the society. This particular information system is expected to minimize the use of paper or manual
execution of population census.
Keywords: Banjar, Population, Management, Family Tree, Balinese Culture Law
1.
INTRODUCTION
Balinese culture is widely known in the world. Its
traditional customs, cultures, and arts become a
unique trait for Bali Island itself. The other unique
trait is the way how Balinese manage its population.
Balinese societies live in a special system called
banjar. Banjar is an administrative division under
the governance of sub-district or village in Bali
Province, Indonesia.[1]
Banjar is a term to refer to a unity of society
bounded by law which governs the region borders
in controlling and ruling local society needs – based
on its local customs that has been acknowledged
and respected by Indonesian government.[6]
Banjar is ruled by a traditional village. Traditional
village is governed by sub-district. Each sub-district
might consist of some traditional villages. Every
traditional village might have several banjar.
Figure 1: Scheme Of Banjar In Bali
Population management in Bali is totally different
from other area in Indonesia because of the
existence of banjar itself. The differentiation of
societies that appears in two resident statuses –
penduduk dinas
and penduduk adat – is the
Journal of Theoretical and Applied Information Technology
20th January 2014. Vol. 59 No.2© 2005 - 2014 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
Penduduk adat
refers to a person who possesses
traditional or indigenous status based on the local
custom in their neighborhood.[12]
Penduduk dinas and penduduk adat were formed
because there are two types of living status in Bali
i.e. banjar dinas and banjar adat. Banjar dinas is a
compulsory social organization which should be
possessed by every people in particular banjar – as
national administrative affairs managed in banjar
dinas.[7] Banjar adat refers to banjar status living
– that i.e. owned by indigenous people – where any
traditional affairs (mortality, odalan, and marriage)
and other banjar local affairs are usually taking
place.[5]
A family in banjar area is often illustrated with a
tree and its branches that grow over time. Thus, this
system is called lineage or family tree. This family
tree will have more branches as new members
enters. Then, relationships among the members of a
family should be clearly defined so that personal
identity can be known completely. This is in line
with the purpose of calculating population.
At one banjar in the population, those cases have
certainly occurred as marriage, divorce, death, birth,
natives and immigrants, community organizations,
and dissemination of relevant information on
population.
Population data collection during years are
addressed by using the book (manual data
collection). The data entry by using this type is very
simple to use but would be inefficient for data
processing and dissemination of population
information.
Figure 1: Population And Activities Archieve Of Banjar Padang Tegal Tengah Ubud 2013
Over the development period, in the banjar
population census has been put on Ms. Office
Excel. Data processing is handled by the software.
But, not everyone can operate and use the existing
formulas on the software.
Figure 2: Population Data Of Banjar Padang Tegal Tengah Ubud 2013 Using Ms. Excel
Figure 3: Population Data Of Banjar Padang Tegal Tengah Ubud 2013 Based On Employment And
Education
© 2005 - 2014 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
413
Some cases that can be managed by this population
census management information system are
patriarch,
matriarch,
divorce,
non-indigenous
inhabitant, indigenous inhabitant, natality and
mortality, society organization, as well as newest
information spreading (e.g. current banjar activity,
announcement, documentation, and any other
information that can be delivered through internet).
The boundary’s problem of this case study is on a
scale of population census only on one banjar.
2.
METHODOLOGY
Methodology used in this research was family tree
method and combine with interview method
towards the head of banjar Padang Tegal Tengah
Ubud. This interview is used to collect
informations
about Balinese culture law. So, methodology used
in this research is combination between family tree
and Balinese culture law (based on interview with
head of banjar)
2.1
Family Tree Method
Family tree is a term used to describe lineage
showing the line of descent from an ancestor to a
person or a family which has a connection towards
other people being his wife or relatives.[2] The
lineage then describes the relationships among
members of a family vertically and horizontally by
mentioning the name of the family.[2]
Figure 4: An Example of a Family Tree
Famiy tree makes the drawing of lineage and
observing the descendents, head of household, and
inheritors easier.[2] An example above shows that
after Mr. Edy and Mrs.
Luna getting
married, they
have two sons and a daughter. Furthermore, in this
case, Mr. Edy is the head of the household (looking
at the husband line or patrilineal system).
Meanwhile, his wife and his children are the
members of the family. As all of his children got
married, there will be three new families. This
situation continues on and on.
Residential system in Bali is similar to the family
tree system mentioned previously but it is in a
slightly different version of the traditional one.
Seeing this case, this research was done in banjar
Adat Padang Tegal Tengah Ubud Bali. For
example, Mr. Yoga and Mrs. Yuni got married.
They have three sons. Mr. Yoga was the head of the
household.
Figure 5: An Example of Family Tree Method
These three sons then got married and have their
own wife and children. Since their parents were not
productive and active anymore – due to age factor –
then the first son had to be responsible for the
family. Therefore, the first son in Mr. Yoga’s
family took the responsibility as the head of the
household. Mr. Yoga, Mrs. Yuni, Sanjaya, and
Krisna were now under Yuda’s responsibility.[9]
Figure 6: Example Of Family Tree, The Changing Of The Head Of Household In Bali
To make it clearer, an example of family tree
system is portrayed in the following case. It can be
seen in figure 5.
A house for a big family consists of a couple of old
man and woman. They have four sons. Each of
their sons has got married. All of them already have
their own children. The situation can be described
as follows:
Journal of Theoretical and Applied Information Technology
20th January 2014. Vol. 59 No.2© 2005 - 2014 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
Figure 7: Example of Family Tree (In Detail)
In detail, Mr. Lebah has:
a.
A wife
b.
Four sons
c.
Four daughters-in-law
d.
Seven grandchildren
If we see it from the child’s side (i.e. Taman), it can
be said that he has:
a.
A father and a mother
b.
A wife
c.
A child
d.
Three brothers
e.
Three sisters-in-law
f.
Four nephew and two niece
This continuity happens until a lineage of a family
appeared. A datum or a person must be related to
his/her own family. For instance, Lebah’s data
should have detailed descend data. This specific
condition is also for Lebah’s descend data – i.e. his
son’s data.
The details will be explained in the following
design and architecture part.
2.2 Interview with the Leader of the Banjar
An interview with the leader of the Banjar was
conducted in order to get necessary data for the
research. Besides, any other factor concerned in this
research was custom-based regulation in managing
the population itself. The leader of the banjar is
known as Kelihan Banjar in Balinese. He and his
partners have important roles in leading the banjar
adat affairs such as information spreading,
population management, local customs affairs
(ngaben, religious ceremony, etc.), and other
activities that can enhance the banjar identity as
well as appreciate values exist in the society.
Another interview also was conducted with the
leader of ST and PKK. The leader of ST (Sekeha
Teruna or an organization of non-marriade people
in banjar) is considered as the most mature
youngster in leading the youth in that banjar.
Activities that are done by ST such as celebrating
banjar
anniversary,
taking
parts
in
many
competitions, and creating other youth events.
On the other side, PKK (Pemberdayaan dan
Kesejahteraan Keluarga or an organization
© 2005 - 2014 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
415
wealthy as well as law enforcement and
environmentally literate.
Then,
those
points
were
investigated
and
implemented towards the information system by the
researchers.
3. SYSTEM OVERVIEW
This part clarifies (1) design and system feature, (2)
application of family tree, (3) marriage and divorce
in Bali, as well as (4) banjar organizer features.
3.1 Design and System Feature
e-Banjar Bali is a web-based application. Its
information takes place in online form so it can be
accessed anytime and anywhere. In addition,
information can be exchanged among the residents,
administrators, and village organizers without any
space and time boundaries. For instance, when
there is important information wanted to be
delivered by Kelihan Banjar, he can directly gives
instructions to the system. Meanwhile, the
administrators and members of the system will get
the instruction and they will do it immediately. The
user gives information in a form of personal data
such as KTP (ID card) and SIM (driving license)
scan to the system to complete their own identity.
Moreover, the admin will insert news, population
and other necessary information to the system that
the others can easily access. Obviously, all data will
run in the load and saved in and to the database.
Figure 8: Form of Interaction in e-Banjar Bali System
The design of e-Banjar Bali population census
management information system is divided into
three parts namely (1) website page, (2)
administrator page, and (3) member page. Website
page is a page consists of important information
related to banjar which will always be updated by
the administrator. [3]
Administrator page refers to a page which is used
by the administrator to manage the population and
other necessary data which is related to banjar
itself. The administrator has a right to manage this
information system – this is certainly in accordance
with the leader of banjar’s permission and
agreement.
Furthermore, member page is defined as a page for
all members of banjar. Each member has their own
username and password. They do not have the
rights to change any existed
data which inputted
from the registration process. But, all members can
see
the information and data stored in the system
alongwith
their
digital
document
uploaded
previously such as KTP, SIM, certificate of birth,
certificate of marriage, diforce, and so on.
Figure 9: Parts of e-Banjar Bali System
Each resident must register themselves to the leader
of banjar to get their username and password. The
username and password
will be used to log in to the
member page. As the registration process finished,
population data is automatically inputted by the
administrator. Figure 8 shows an example of
marital case where new resident should be
registered.
Figure 10: Member Sign Up
Most of the activities in this information system are
done in the administrator page. Some features that
could be controlled in the administration page of
this information system are mentioned as follows:
a.
In-banjar marital case
Journal of Theoretical and Applied Information Technology
20th January 2014. Vol. 59 No.2© 2005 - 2014 JATIT & LLS. All rights reserved.
ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195
g.
Mortality case
h.
Natality case
i.
Non-indigenous resident case
j.
Temporary resident case
k.
Facility of ST organizational management
l.
Facility of PKK organizational management
m.
News management facility and data master
n.
Data archive
o.
Facility of Banjar leader
p.
Banjar activities record.
q.
Report
This information system focuses more on the
population census management. The other part of
this application is ST organizational management
PKK organization, and information broadcasting to
banjar members.
3.2 Family Tree Application
Family tree can be figured in many ways such as
branches – so it will look like a tree. Giving
numbers on chapter and sub-chapter is the other
way that can be done to describe family tree.
Chapter and sub-chapter numbering is used to make
application of this system easier. One to another
data will be related.[9] See the following example
for the illustration of case in Figure 5.
1.
LEBAH’S BIG FAMILY
1.1
MR. LEBAH
1.1.I MRS. RAI
1.1.1 MR. TAMAN
1.1.1.i MRS. ARI
1.1.1.1 ARIS
1.1.2 MR. SUJANA
1.1.2.i MRS. SWITRI
1.1.2.1 MR. BAGUS
1.1.3 MR. ADNYANA
1.1.3.i MRS. RASMILI
1.1.3.1 RATIH
1.1.3.2 ARYA
1.1.3.3 SASTRA
1.1.4 MR. WIADNYANA
1.1.4.i MRS. JERO
1.1.4.1 AYU
1.1.4.2 RUPEM
According to Figure 5, chapter and sub-chapter
numbering is used in describing a family tree. Each
small family then put into some categorization.
These small families later will create bigger family
in the same house.
Figure 11: A Family Tree using Numbering System
Figure Description:
A.
Mr. Taman’s family consists of his wife
(Mrs. Ari) and his only child (Aris).
B.
Mr. Sujana’s family consists of his wife
(Mrs. Switri) and his only child (Bagus).
C.
Mr. Adnyana’s family consists of his wife
(Mrs. Rasmili) and his three children
(Ratih, Arya, dan Sastra).
D.
Mr. Wiadnyana’s family consists of his
wife (Mrs. Jero) and his two children (Ayu
dan Rupem).
E.
Mr. Lebah’s family consists of his wife
(Mrs. Rai) and his four children (Mr.
Taman, Mr. Sujana, Mr. Adnyana, dan Mr.
Wiadnyana).
A house might consist of one or more head of the
household. There will come a time when the
inactive old head of household
is replaced by the
next generation. For example, Mr. Lebah and Mrs
Rai are getting old and not very active anymore.