• Tidak ada hasil yang ditemukan

E-BANJAR BALI, POPULATION CENSUS MANAGEMENT INFORMATION SYSTEM OF BANJAR IN BALI BY USING FAMILY TREE METHOD AND BALINESE CULTURE LAW.

N/A
N/A
Protected

Academic year: 2017

Membagikan "E-BANJAR BALI, POPULATION CENSUS MANAGEMENT INFORMATION SYSTEM OF BANJAR IN BALI BY USING FAMILY TREE METHOD AND BALINESE CULTURE LAW."

Copied!
26
0
0

Teks penuh

(1)
(2)

Home

Volumes

Submit Paper

Manuscript Status Author Guidelines Editorial Board

Technical Board

Indexing and Abstracting Subscribe to JATIT Contact Us

FeedBack |Links |Contact Us| Site Map

Welcome to Journal of Theoretical and Applied Information Technology

Editorial Board

EDITOR IN CHIEF

Prof. Niaz Ahmad

FCE, MOE, Islamabad, PAKISTAN

EDITORIAL BOARD

Dr. CHRISTEL BAIER

Faculty of Computer Science, Institute for Theoretical Computer

Science, Technical University Dresden, GERMANY.

Dr. YUSUF PISAN

Department of Software Engineering, Faculty of Information

Technology, University of Technology, Sydney, AUSTRALIA.

Dr. YUXIN MAO

School Of Computer & Information Engineering Zhejiang Gongshang

University, CHINA

Dr. MUHAMMAD SHER

Faculty of Basic and Applied Sciences, Department of Computer

Science, International Islamic University, Islamabad. PAKISTAN.

Dr. ZARINA SHUKUR

Computer Science Dept., Fakulti Teknologi dan Sains Maklumat,

University Kebangsaan Malaysia, 43600 Bangi, MALAYSIA.

Dr. NOR AZAN MAT ZIN

Department of Information Science, Faculty of Information Science &

Technology, National University of Malaysia (UKM) 43600 UKM BANGI,

MALAYSIA.

Dr. KHAIRUDDIN BIN OMAR

Faculty of Information Science and Technology, Universiti Kebangsaan

Malysia, 43600 Bangi Selangor Darul-Ehsan, MALYSIA.

Dr. TENGKU MOHD. BIN TENGKU SEMBOK

Faculty of Information Science and Technology Universiti Kebangsaan,

Malaysia, 43600 Bangi Selangor Darul-Ehsan, MALYSIA.

Dr PRABHAT K. MAHANTI

Department of Computer Science and Applied Statistics (CSAS),

Hazen Hall Room 311, University of New Brunswick, Saint John, New

Brunswick, CANADA.

Dr. R. PONALAGUSAMY

Department of Mathematics, National Institute of Technology,

Tiruchirappalli, Tamil Nadu, INDIA.

Dr. NITIN UPADHYAY

Computer Science & Information Systems Group, Birla Institute of

(3)

Technology and Science (BITS), Pilani-Goa Campus, NH-17B Bypass

Road, ZuariNagar, Goa, INDIA.

Dr. A. SERMET ANAGN

Eskisehir Osmangazi University, Industrial Engineering Department,

Bademlik Campus, 26030 Eskisehir, TURKEY.

Dr. YACINE LAFIFI

Department of Computer Science, University of Guelma, BP 401,

Guelma 24000, ALGERIA.

Dr. CHRISTOS GRECOS

School of Computing, Engineering and Physical Sciences, University of

Central Lancashire, Preston PR1 2E, UNITED

KINGDOM.

Dr. JAYANTHI RANJAN

Institute of Management Technology, Raj Nagar, Ghaziabad, Uttar

Pradesh, INDIA

Dr. ADEL M. ALIMI

National Engineering School of Sfax (ENIS), University of SFAX,

TUNISIA

Dr. SIKANDAR HAYAT KHIYAL

Department of Computer Science, Fatima Jinnah Women University,

Rawalpindi, PAKISTAN

Dr. ADEL MERABET

Department of Electrical & Computer Engineering, Dalhousie

University, Halifax, CANADA

DR. HEMRAJ SAINI

CE&IT Department, Higher Institute of Electronics, Bani Walid. LIBYA

Dr. MAUMITA BHATTACHARYA

SOBIT, Charles Sturt University, Albury - 2640, NSW, AUSTRALIA

Dr. SEIFEDINE KADRY

Lebanese International University, LEBONON

Dr. AIJUAN DONG

Department of Computer Science, Hood College Frederick, MD 21701.

USA

Dr. S.S.RIAZ AHAMED

Mohamed Sathak Engineering College, Kilakarai, & Sathak Institute of

Technology, Ramanathapuram , Tamilnadu, INDIA

Dr. ZURIATI AHMAD ZUKARNAIN

University Putra Malaysia, MALAYSIA

Dr. CHELLALI BENACHAIBA

University of Bechar, ALGERIA

Dr. MOHD NAZRI ISMAIL

University of Kuala Lumpur (UniKL) MALYSIA

Dr. VITUS SAI WA LAM

The University of Hong Kong, CHINA

Dr. WITCHA CHIMPHLEE

(4)

Dr. SIDDHIVINAYAK KULKARNI

University of Ballarat, Ballarat, AUSTRALIA

Dr. S. KARTHIKEYAN

Caledonian College of Engineering, OMAN

Dr. DRAGAN R. MILIVOJEVI

Ć

Mining and Metallurgy Institute Bor Zeleni bulevar 35, 19210 Bor,

SERBIA

Dr. ABDUL AZIZ

Professor of Computer Science, University of Central Punjab,

PAKISTAN

Dr.P.DANANJAYAN

Professor, Department of ECE, PEC, Puducherry, INDIA.

Dr. E. SREENIVASA REDDY

Principal - Vasireddy Venkatadri Institute of Technology, Guntur, A.P.,

INDIA

Dr. SANTOSH DHONDOPANT KHAMITKAR

Ramanand Teerth Marathwada University, Nanded. Maharashtra

431605, INDIA

Dr. M. IQBAL SARIPAN

(MIEEE, MInstP, Member IAENG, GradBEM)

Dept. of Computer and Communication Systems Engineering, Faculty

of Engineering, Universiti Putra MALAYSIA

Dr. E. SREENIVASA REDDY

Principal - Vasireddy Venkatadri Institute of Technology, Guntur, A.P.,

INDIA

SHAHBAZ GHAYYUR

Faculty of Basic and Applied Sciences, Department of Computer

Science and Software Engineering, International Islamic University,

Islamabad. PAKISTAN.

Dr. T.C.MANJUNATH,

Professor & Head of the Dept.,Electronicis & Communication Engg.

Dept,

New Horizon College of Engg.,Bangalore-560087, Karnataka, INDIA.

Dr. Nacer eddine ZAROUR

LIRE Laboratory, Computer Science Departement, University Mentouri

of Constantine (UMC)

Dr. RIKTESH SRIVASTAVA

Assistant Professor, Information Systems, Skyline University College

P O Box 1797, Sharjah, UAE

Dr. Mohd ZAINAL ABIDIN AB KADIR,

PhD, MIEEE

Centre of Excellence on Lightning Protection (CELP)

Dept. of Electrical and Electronics Engineering, Faculty of Engineering,

UPM, Selangor, MALAYSIA

Dr. OUSMANE THIARE

Gaston Berger University, Department of Computer Science, UFR

S.A.T

BP 234 Saint-Louis, SENEGAL

Dr. SIDDHIVINAYAK KULKARNI

Graduate School of Information Technology and Mathematics

University of Ballart AUSTRALIA

(5)

Dr. BONNY BANERJEE

Senior Scientist Audigence, FL, USA, The Ohio State University,

Columbus, OH, USA

Dr. NICKOLAS S. SAPIDIS

Department of Mechanical Engineering, University of Western

Macedonia

Kozani GR-50100, GREECE.

Dr. NAZRI BIN MOHD NAWI

Software Engineering Department, Faculty of Science Computer

Information Technology, Universiti Tun Hussein Onn

MALAYSIA

Dr. JOHN BABALOLA OLADOSU

Ladoke Akintola University of Technology, Ogbomoso, NIGERIA

Dr. ABDELLAH IDRISSI

Department of Computer Science, Faculty of Science, Mohammed V

University - Agdal, Rabat, MOROCCO

Dr. AMIT CHAUDHRY

University Institute of Engineering and Technology, Panjab University,

Sector-25, Chandigarh, INDIA

Dr. ASHRAF IMAM

Aligarh Muslim University, Aligarh-INDIA

Dr. MUHAMMAD UMER KHAN

Department of Mechatronics, Faculty of Engineering, Air University,

Islamabad. PAKISTAN

Dr. MOHAMMED ALI HUSSAIN

Dept. of Computer Science & Engineering, Sri Sai Madhavi Institute of

Science & Technology, Mallampudi,

Rajahmundry, A.P, INDIA

Dr. KHALID USMANI

Department of Computer Science, Arid Agriculture University,

Rawalpindi, PAKISTAN.

Dr. GUFRAN AHAMD ANSARI

Qassim University, College of Computer Science, Ministry of Higher

Education, Qassim University, KINGDOM OF SAUDI ARABIA

Dr. Defa Hu

School of Information, Hunan University of Commerce, Changsha

410205, Hunan, P. R. of CHINA

MANAGING EDITORS

Saleha Samar

(

managing_editor at jatit.org

)

Journal of Theoretical and Applied Information Technology

Shahzad A. Khan

(

publisher at jatit.org

)

Lecturer IMCB, FDE Islamabad.

(

Managing Editor/Linguist & In-charge Publishing

)

Journal of Theoretical and Applied Information Technology

(6)

jatit.org Publishing Policy Review Process Code of Ethics

board if you hold a PhD in computing and have at-least 10

publications in International Journals/Conferences. Please drop your

CV at

managing_editor at jatit.org

. Members lists and requests are

reviewed at the end of every year in regional advisory panel meeting.

(7)

Home Volumes Submit Paper Manuscript Status Author Guidelines Editorial Board Indexing and Abstracting Subscribe to JATIT Contact Us Frequency : MONTHLY

FeedBack | Contact Us |Links | Site Map

Welcome to Journal of Theoretical and Applied Information Technology

Submit Paper / Call for Papers

Journal receives papers in continuous flow and we will consider articles from a wide range of Information Technology disciplines

encompassing the most basic research to the most innovative technologies. Please submit your papers

electronically to our submission system at http://jatit.org /submit_paper.php in an MSWord, Pdf or compatible format so that they may be evaluated for publication in the upcoming issue. This journal uses a blinded review process; please remember to include all your personal

identifiable information in the manuscript before

Journal of Theoretical and Applied Information Technology

January 2014 | Vol. 59 No. 2

Title: A NOVEL APPROACH TO GENERATE TEST CASES FOR COMPOSITION & SELECTION OF WEB SERVICES BASED ON MUTATION TESTING

Author: ASHOK KUMAR. P.S, KAARTHICK .B, GOPAL KRISHNA. C

Abstract: Now a day’s Web Service has become a significant part of the web. The importance of Web Services is to support interoperable and Application – to – Application interaction over a network with proper URI, so that Web Services provide high value to online business transactions. Testing (Verification & Validation) is a critical activity in software product design. Rigorous software testing is not possible so different software testing techniques are invoked before releasing the product. Based on Prim’s algorithm we created all possible test cases from directed weighted graph. Mutation testing is a structural testing method; it generates software tests and evaluating the quality of software testing by fault insertion in original code. A case study has been presented here in order to create the efficacy of our test approach in mutation analysis.

Keywords: Mutants, web service, testing, URI, SRS

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: TOWARDS A NEW ALGORITHM MORE EFFICIENT FOR UPDATING FIREWALL POLICIES

Author: A. KARTIT, Z. KARTIT, M. EL MARRAKI

Abstract: Firewall is one of the most widely utilized component on any network architecture, since that a deployment is a very important step to turn the initial policy to a target policy. This policy requires automated tools in order to create a suitable environment for configuring or deploying safely a policy target. Most researchers are interested in detection of conflicts or the problem of optimization of policies firewall while few of them have proposed deployment strategies for two important types of edition policies. We have already proposed a correct algorithm for the deployment type I [0]. In this work we study one of these strategies that falls within the type II edition policies. We show that the proposed solution of type II edition [1] is not fully correct and lead to security vulnerabilities, and then we offer a few corrections and improvements for this type of editing.

Keywords: Security Policy (SP), Firewall Policy Management (FPM), Security Vulnerabilities (SV), Network Security (NS)

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: A MULTI-ASPECT RULE BASED MODEL FOR WEB SERVICES OFFLINE COMPOSABILITY

Author: HAJAR OMRANA, FATIMA ZAHRA BELOUADHA, OUNSA ROUDIES

Abstract: Composition is still one of the most challenging key design goals of Web services technology. While they are designed to be aggregated and work with each other, most of existing Web services are developed independently and uses different standards. Detecting all the incompatibilities of Web services composability before processing the composition would increase the efficiency and correctness of this latter considerably. In this direction, we propose a multi-aspect Web services composability model, aligned with WSDL 2.0, SAWSDL and WS-Policy 1.5 standards, which addresses a set of functional, non-functional, contextual, data structure and technical composability rules to check whether to or more web services operations can concretely interact with each other.

Keywords: Web Services Composability , Dynamic Composition, WSDL 2.0, SAWSDL, WS-Policy

(8)

submitting it for review, we will edit the necessary information at our side. Submissions to JATIT should be full research / review papers (properly indicated below main title).

Full Text

Title: CORRECTION POSITION OF COORDINATES FROM DATA GPS LOGGER IN GOOGLE MAPS BY USING LAGRANGE INTERPOLATION METHOD

Author: NGAKAN MADE SATRYA WIBAWA, I MADE SUKARSA, I KETUT ADI PURNAWAN

Abstract: Development of navigation technologies increase rapidly. People need a GPS to indicate a location or street. The accuracy of the GPS position is often less precise. This problem is used as a discussion of issues in the design of GIS to fix the GPS coordinates to the coordinates of the path using interpolation polinom lagrange method. This study uses PL/SQL to MySQL engine to perform the calculations haversine formula and interpolation polinom lagrange. Coordinates improvements value obtained from the results of these calculations.

Keywords: GPS, GIS, PL/SQL, Correction Coordinate, Interpolation Polinom Lagrange

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: COMPARATIVE STUDY OF DATA MINING MODEL FOR CREDIT CARD APPLICATION SCORING IN BANK

Author: EVARISTUS DIDIK MADYATMADJA, MEDIANA ARYUNI

Abstract: The growth of credit card application needs to be balanced with the anticipation of bad credit risk because it does not use security collateral as warranty. The usage of credit scoring can be used to help the credit risk analysis in determining the applicant's eligibility. Data mining has been proven as a valuable tool for credit scoring. The aim of this research is to design a data mining model for credit scoring in bank in order to support and improve the performance of the credit analyst job. The proposed model applies classification using Naïve Bayes and ID3 algorithm. The accuracy of Naïve Bayes classifier is 82% and ID3 is 76%. So we can conclude that Naïve Bayes classifier has better accuracy than ID3 classifier.

Keywords: Credit Scoring, Data Mining, Credit Card, Bank, Naïve Bayes, ID3, Classification

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: MULTI-LEVEL TRUST ARCHITECTURE FOR MOBILE ADHOC NETWORKS BASED ON CONTEXT-AWARE

Author: A.RAJESH, DR. N. MOHAN KUMAR

Abstract: Mobile ad hoc networks (MANETs) are not favorable to centralized trust architecture and literature review provides several security framework and solutions for trust management. However, there is no unified architecture for MANET to exploit deployed security models based on trust. This study presents compelling trust architecture in which a trust based security model is superimposed with three trust models such as a low-level trust model, a medium-level trust model, and a high-level trust model based on context-aware security. The low-level trust model meets the necessary security requirements using direct observations. The medium-level trust model ensures medium security level using direct observations and recommendation messages. The high-level trust model provides a highly secured system with high complexity and computational cost. The proposed work is formulated based on the application context to determine the trust-level in geographic routing protocol. The proposed trust is fully distributed and application context dependent and dynamic in nature. The proposed multi-level trust model is integrated with Position based Opportunistic Routing (POR) Protocol that selects the trusted next hop in the routing path. The correctness of the proposed scheme is analyzed using network simulator (NS-2). Proposed work increases packet deliver ratio and throughput significantly.

Keywords: Mobile Ad Hoc Networks, Geographical Routing, Trust Management, Context-aware Trust, Trust based Security

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: INVESTIGATION OF SUPPORT VECTOR MACHINE CLASSIFIER FOR OPINION MINING

Author: K.SARASWATHI, Dr. A.TAMILARASI

(9)

Abstract: Complicated text understanding technology which extracts opinion, and sentiment analysis is called opinion mining. Building systems to collect/examine opinions about a product in blog posts, comments, and reviews/tweets is sentiment analysis. Product reviews are the focus of existing work on review mining and summarization. This study focuses on movie reviews, investigating opinion classification of online movie reviews based on opinion/corpus words used regularly in reviewed documents.

Keywords: Opinion Mining, Classification Accuracy, Sentiment analysis, Movie reviews, Support Vector Machine, Bagging

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: A ROBUST METHOD FOR DIGITAL IMAGES WATERMARKING BASED ON COMBINATION OF SVD, DWT AND DCT USING OPTIMAL BLOCK

Author: MOHAMED RADOUANE, TARIK BOUJIHA, ROCHDI MESSOUSSI, RAJA TOUAHNI

Abstract: With the growth of the Internet, development of digital media technologies and computer network, the change and the protection of copyright have become very important. To protect multimedia data against illegal recording and retransmission, the integration of a signal (digital signature, watermark) has become an obligation without modifying quality of the original image, the goal of this operation is to identify the owner and protect his intellectual property. Digital watermarking has been proposed as a solution to solving the copyright problem by introducing invisible data (watermark) into original image. In this paper, we propose a robust method for digital images watermarking. This method is achieved by searching the optimal block that can be used to insert the watermark in original image by modifying the singular value decomposition (SVD) in DWT (discrete wavelet transform) combined with DCT (Discrete Cosine Transform) . The experimental results show that this imperceptible method combines the advantage of three transformations to ensure robustness against most attacks.

Keywords: Watermarking, DWT, SVD, DCT, Entropy

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: FUZZY VAULT FUSION BASED MULTIMODAL BIOMETRIC HUMAN RECOGNITION SYSTEM WITH FINGERPRINT AND EAR

Author: R.VINOTHKANNA, Dr.AMITABH WAHI

Abstract: Human Recognition is one of the admired tasks over the world for recognizing a person using biometrics by determining physical or behavioral characteristics of that person. In our existing work, we have already worked out a multimodal biometric recognition system with fingerprint, palm print and hand vein. For getting more accurate recognition of our biometric system, in this work, we use ear as one of the modalities with the fingerprint. In order to improve the clear visible of input image databases, pre-processing of images is initially done. After the pre-processing of these images only, the features from the fingerprint and ear modalities are extracted clearly for the further processes. In the fingerprint images, the minutiae features are extracted directly and from the ear, the shape features are extracted using Active Appearance Model (AAM). Then, a grouped feature vector point is gained using chaff points and these two extracted feature points. After acquiring the grouped feature vector points, the secret key points are attached with the grouped feature vector points to formulate the fuzzy vault. Finally, test person’s grouped vector is matched up to the fuzzy vault data base to the accurate recognition of the correct person. Our proposed work is effectively evaluated in Matlab with the evaluation metrics FAR, FFR, GAR and Accuracy by changing the secret key size at every time. The results of our proposed work facilitate very better values for the recognition of persons with the fingerprint and ear modalities. Moreover, our existing work is also compared with our proposed work for proving that our proposed work is good. In addition to this, other existing work papers are also taken for our comparison work, which clearly proves that our proposed work outperforms other techniques by providing very much better recognition accuracy.

Keywords: Recognition, Multimodal biometric system, Minutiae Extraction, Bifurcation, Ridges, Active Appearance Model, Chaff points, Fuzzy Vault

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

(10)

Author: G. Thippa Reddy, K. Sudheer, K Rajesh, K. Lakshmanna

Abstract: Cloud computing is rapidly gaining popularity. However, like any new system, cloud computing is facing some significant challenges. The most significant challenge faced by cloud adopters is related to legal compliance, security controls, privacy and trust. This paper proposes a novel security management framework by employing data mining to detect, contain and prevent attacks on cloud computing systems. Given that the security frameworks and related controls on cloud computing are still evolving, this research may prove to be a useful piece of contribution in enhancing the theoretical foundation established by existing studies.

Keywords: Cloud Computing, Data Mining, Security-as-a-service, OPNET, Positivism and the Interpretivism

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: A MULTI-AGENT BASED DISTRIBUTED INTRUSION PREVENTION SYSTEM AGAINST DDOS FLOODING ATTACKS

Author: A. SAIDI, A. KARTIT, M. EL MARRAKI

Abstract: Denial of service (DoS) attacks is a simple and very annoying type of intrusions. This kind of attacks attempts to make unreachable at least a service of equipment like it can stagnate the whole of a network. To launch a DoS attack, we have, nowadays, often tools to succeed. Some of these tools try to send a compromised network load to corrupt their targets by flooding it with SYN, UDP or ICMP packets [1],[2]. Our paper describes the conception of a multi-agent-based intrusion prevention system (IPS) that can apprehend these flooding attempts in a distributed way.

Keywords: DoS Attacks, Intrusion Prevention, Multi-agent System, Distributed System

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: FORECASTING EARNINGS PER SHARE FOR COMPANIES IN IT SECTOR USING MARKOV PROCESS MODEL

Author: M.P. RAJAKUMAR , V. SHANTHI

Abstract: Investors rely growth on earnings per share (EPS) which is the net income less dividends on preferred stock divided by the number of outstanding share for measuring the financial soundness of a company as it represents the profitability of a common stock. Many investors select stocks on the basis of earnings forecast, cost of capital and the particular company’s profitability compared to other companies. As this seems to be the base for any development phase, market analysts spend ample time in evaluating and refining EPS estimates. In this work Markov process model is applied for forecasting the subsequent quarter EPS for companies in information technology (IT) sector. Two models namely two state basic model and extended state interval model with time independent transition probability matrices are applied to analyze and predict the EPS for subsequent quarter of HCL infosystem, Reliance, Infosys and Wipro. The EPS data obtained from Bombay stock exchange (BSE) are used to test the proposed prediction model. The experimental results declare that two companies’ show optimistic sign of success, one company strikes a balance and the other company provides state of loss. The outcome of the prediction process is consistent in the real situation.

Keywords: Markov process model, earnings per share, forecasting, IT sectors

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: GOVERNANCE AUDIT OF APPLICATION PROCUREMENT USING COBIT FRAMEWORK

Author: GUSTI AYU THERESIA KRISANTHI, I MADE SUKARSA, I PUTU AGUNG BAYUPATI

Abstract: The audit of information system is conducted to check the level of readiness of the organization in managing Information Technology (IT) governance. Measurement of level of maturity in procurement of application in one of the universities in Indonesia using framework COBIT 4.1 toward several IT processes related with procurement applications process by mapping the identification of business goals, information technology goals and information technology process COBIT 4.1. Best practice is given using ITIL V3 standard which is obtained by mapping IT process of COBIT 4.1. Results of audit that has been conducted show the current maturity level index is in 2.85 which means in 3-defined of maturity level with the readiness level of expectation at the level of 5-optimized. This shows the readiness gap, thus, needs to be given improvement strategies that contain the steps to achieve the expected level of

(11)

maturity.

Keywords: Audit of Information System, IT Governance, COBIT, Maturity Level, ITIL

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: ENERGY EFFICIENT INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK USING NEURAL NETWORK

Author: SYEDA GAUHAR FATIMA,Dr.SYED ABDUL SATTAR, Dr.K ANITHA SHEELA

Abstract: In wireless sensor network (WSN), the existing intrusion detection techniques rarely consider energy consumption for judging the node state. Also there is need for increased detection rate. Hence in this paper, we propose an energy efficient intrusion detection system for WSN. Initially the nodes deployed in the network are analyzed for malicious activity based on their residual energy. If the energy consumption of a node is greater than a predicted threshold, it is considered as malicious and the packets emerging from these nodes are said to be abnormal. The abnormal packets are passed through the Back Propagation Network (BPN) to analyze the data misinterpretation. In case, the output of BPN is found to be abnormal, then the attack detection is confirmed and attack type is estimated. By simulation results, we show that the proposed technique is more energy efficient.

Keywords: WSN, Intrusion Detection, Wnergy Efficient, Neural Network

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: A NOVEL APPROACH FOR MITIGATION OF HARMONICS AND INTERHARMONICS IN VARIABLE FREQUENCY DRIVES

Author: PROF.VIJAYAKUMAR.A, DR.MAHENDRA BABU. T.K

Abstract: Interharmonics are non-integer multiples of the fundamental frequency that causes several undesirable effects. Variable frequency drives are main sources of interharmonics. Also interharmonics are generated when the inverter load is unbalanced or the inverter is operating in overmodulation. In this study, adjustable speed drive employing diode bridge rectifier and voltage source inverter with load unbalance is considered. Propogation of interharmonics in the supply side due to load unbalance is analysed and a novel method for mitiating interharmonics is proposed. The proposed method employs an active filter in supply side which is simulated using PSIM . With the proposed active filter the compensation effectiveness is significantly improved and allows the elimination of passive filters thereby reducing cost and space required.

Keywords: Interharmonics, Power Quality, Adjustable Speed Drive, Active Filter, Interharmonics Mitigation

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: MAPPING THE RESEARCH PRODUCTIVITY OF BANARAS HINDU UNIVERSITY: A SCIENTOMETRIC STUDY

Author: R. BALASUBRAMANI, R. PARAMESWARAN

Abstract: The study presents the growth and the contribution of research carried out by the scientists of Banaras Hindu University (BHU). The pattern of communications of authors and scattering of their research output in different journals, analysis the strong and weak areas of university research. The data for the study was taken from the Web of Science online database published by Institute for Scientific information (ISI). The study shows that there was a gradual growth of publications during 2000 - 2011. The annual average research output of BHU was 578 records and the research output of the scientists is fairly collaborative. “Current Science” is one of the most preferred journals of the authors of BHU. The Institute of Technology leads in publications productivity with 1482 (21.3%) articles. The authors of BHU have been collaborated with the foreign authors for their research work.

Keywords: Scientometrics Analysis, Scientometrics Study, Bibliometircs, Research Productivey, Banaras Hindu University, Scientfic Research-University.

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

(12)

Title: EXPLOITING IPV6 ROUTING HEADERS TYPE 0/2 IN DIFFERENT IP WIRELESS NETWORKS: ATTACK SCENARIO & ANALYSIS

Author: BASSAM NAJI AL-TAMIMI, RAHMAT BUDIARTO, MOHD. ADIB OMAR, KAMAL M. ALHENDAWI

Abstract: Mobile IP is an open standard protocol designed by IETF to allow users to move from one network to another while maintaining their own permanent IP addresses. However, the seamless connectivity in different IP networks has introduced new security vulnerabilities. One of the most critical concerns with the IPv6 is IPv6 routing header. IPv6 routing header can be used by an IPv6 source to list one or more intermediate hosts to be visited on the way to a packet’s destination. Nevertheless, the feature of IPv6 routing header which has serious vulnerability can be used by attacker to bypass security policies applied on filtering devices such as firewall. This study analyzes the IPv6 routing header feature which can be exploited by attackers to access the protected hosts/networks. Thus, the current study provides a comprehensive view regarding the scenario of attackers within the different IP wireless networks which in turn provide the researchers and practitioners with the threats of attackers. The scenario analysis also leads to developing new mechanisms for covering the security problem of routing header type 0/2 which is still under investigation.

Keywords: MIPv4; MIPv6; MN; IPv6 Routing Header, Different wireless IP networks

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: NTRU ENCRYPTION USING HUFFMAN COMPRESSION

Author: M.N.M. PRASAD , DR. MOHAMMED ALI HUSSAIN, DR. C.V. SASTRY

Abstract: NTRU Labs have proposed a scheme for secure transmission using ring of truncated polynomials in Zq(x) / (xn -1). We have proved in this paper that a pre-processing the data to be transmitted greatly decreases the time of transmission. We have used a matrix version of NTRU Cryptosystems.

Keywords: Truncated, Transmission, Polynomials, Ring, Secure, Number Theory Research Unit (NTRU)

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: HYBRID GENETIC ALGORITHM WITH GREAT DELUGE TO SOLVE CONSTRAINED OPTIMIZATION PROBLEMS

Author: NABEEL AL-MILLI

Abstract: In this paper, a new hybrid optimization algorithm based Genetic Algorithms (GAs) is proposed to solve constrained optimization engineering problems. A hybrid Genetic Algorithms (GA) and great deluge algorithm are used to solve non-linear constrained optimization problems. The algorithm works on improving the quality of the search speed of GAs by locating infeasible solutions (i.e. chromosomes) and use great deluge to return these solutions to the feasible domain of search; thus have a better guided GA search. This hybridization algorithm prevents GAs from being trapped at local minima via premature convergence. The simulation results demonstrate a good performance of the proposed approach in solving mechanical engineering systems.

Keywords: Genetic Algorithm, Great deluge, Welded Beam Design, Pressure Vessel

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: PERFORMANCE ANALYSIS OF OPTIMIZATION TECHNIQUES FOR MEDICAL IMAGE RETRIEVAL

Author: Ms. N. T. RENUKADEVI, Dr. P. THANGARAJ

Abstract: The computer-aided diagnosis systems (CAD) are widely used for clinical diagnosis and treatment. Content-based image retrieval (CBIR) of medical images, according to its domain specific image features, is a valuable tool for physicians. A method for automatic classification of computed tomography (CT) images of different types is presented in this paper. The proposed method has three major steps: 1. Feature are extracted from the CT images using Coif let wavelets; 2. The features extracted are classified using Support Vector Machine; 3. The parameters of the SVM are optimized using Particle Swarm Optimization (PSO), and modified PSO with a genetic algorithm

(13)

Keywords: Content-based image retrieval, Computed Tomography, Coif let wavelets, Particle Swarm Optimization, Genetic algorithm, Support Vector Machine

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: SOLVING MAXIMAL COVERING PROBLEM USING PARTITIONED INTELLIGENT FISH ALGORITHM

Author: AMIN JULA, ELANKOVAN SUNDARARAJAN, NARJES KHATOON NASERI, REZA ABIAT

Abstract: NP-Complete optimization problems are a well-known and widely used set of problems which surveyed and researched in the field of soft computing. Nowadays, because of the acceptable rate of achieving optimal or near-optimal solutions of the mentioned issues, using of nature-inspired algorithms are increasingly considered. One of the familiar problems in the field of NP problems is Maximal Covering Problem which has various applications of pure mathematics to determine the location of mobile network antennas or police stations. In this paper, we introduced a heuristic algorithm called Partitioned Artificial Intelligent Fish Algorithm which using artificial fish-search algorithm, logical partitioning of the search space of this algorithm to several sub-space and change in motor functions in fishes, deals with the suitable, innovative and fast solution of maximal covering problem. The results of implementing this algorithm and comparing it with the performance of some the best known algorithms for solving NP problems will be represented by a very good performance of the proposed algorithm.

Keywords: Artificial Fish Algorithm, Maximal Covering Problem, NP-hard problem

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: E-BANJAR BALI, POPULATION CENSUS MANAGEMENT INFORMATION SYSTEM OF BANJAR IN BALI BY USING FAMILY TREE METHOD AND BALINESE CULTURE LAW

Author: I GUSTI BAGUS ARI PINATIH, A.A. KOMPIANG OKA SUDANA, I KETUT ADI PURNAWAN

Abstract: This paper describes how population census in Balinese traditional village i.e. banjar are managed. This kind of information system is known as e-Banjar Bali. A case study was conducted in Banjar Padang Tegal Tengah, a banjar in Ubud, Bali regarding to the information system. This population information system uses website as its basis. The study was done to find an easier population census management. Managing family tree, calculating total population, indigenous and non-indigenous people, active and non-active population, natality and mortality are inclusive in the census. Additional feature included as a part of this information system is management upon banjar organizational data and information spreading among the society. This particular information system is expected to minimize the use of paper or manual execution of population census.

Keywords: Banjar, Population, Management, Family Tree, Balinese Culture Law

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: FACTOR INFLUENCING THE USE OF SMART PHONE BY MALAYSIAN’S ELDERLY

Author: NAIM CHE PEE, ZULISMAN MAKSOM, AZIR REZHA NORIZAN

Abstract: The smart phone has become essential part of personal and business life across all age boundaries. The smart phone usage can potentially play a significant role in assisting the elderly in many ways especially in terms of maintaining social relationship, providing a sense of safety and accessibility. However, elderly seems to be the neglected user group in the design of recent smart phone interface and the penetration of the technology to the elderly are very low. Hence this paper attempt to report issues that are related to why this particular group of user aged 40 years old and above was influenced to own the smart phones and the data gathering was done specifically in Malaysia context. This research used an interview and survey instrument to obtain the data from the intended target group of user whom are using smart phones. The result indicates three main factors that influence the respondents to own their smart phone which is family encouragement, the use of mobile internet and social networking.

Keywords: Interface Design, Elderly, Smartphone, Influencing Factors, And Technology Penetration

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

(14)

Title: BASIP A VIRTUAL MACHINE PLACEMENT TECHNIQUE TO REDUCE ENERGY CONSUMPTION IN CLOUD DATA CENTRE

Author: AJITH SINGH. N, M. HEMALATHA

Abstract: Infrastructure as a Service (IaaS) in cloud computing provides Infrastructure as a service for the demand of user from small instance to large instance in pay per use model. The services include like computer resource, networking and data storage. An API (Application Programming Interface) is used to access the infrastructure and a dashboard to control the server and to create and manage different Virtual Machines in the cloud data centre. Multiple cloud users access the service simultaneously. Due to continuous access of the services, a deadlock can happen, and it may lead to a system crash, although cloud computing is designed to overcome such problem, a proper Virtual Machine Placement Technique is needed for implementation to rule out such incidences. Deadlock can occur in cloud computing as the system is inherited from distributed computing and virtualization. A Virtual Machine Placement Technique known as BASIP is proposed to overcome the issue of deadlock by using a banker algorithm with Stochastic Integer Programming. Further, the proposed algorithm is being simulated with hundreds of servers and thousands of virtual machines. The proposed algorithm was simulated with different overload detection and VM selection algorithm. The BASIP algorithm is experimented with 800 servers with 1024 Virtual Machines. From the experimental results, BASIP algorithm reduces energy significantly.

Keywords: Virtual Machine, Cloud Computing, Live Migration, Bankers and Stochastic Integer Programming, Deadlock Avoidance, Resource Allocation, Energy, Cloud Data Centre, Minimum Utilization Rank, Polynomial Regression, BASIP

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: PERFORMANCE OF MIMO MC-CDMA SYSTEM WITH CHANNEL ESTIMATION AND MMSE EQUALIZATION

Author: N. TAMILARASAN, L. NITHYANANDAN

Abstract: The quality of a wireless link can be described by three basic parameters, namely transmission rate, transmission range and transmission reliability. With the advent of multiple-input multiple-output (MIMO) assisted Multicarrier code division multiple access (MC-CDMA) systems, the above-mentioned three parameters may be simultaneously improved. The MC-CDMA combined with the MIMO technique, has become a core technology for future mobile radio communication system. However, possible potential gain in spectral efficiency is challenged by the receiver’s ability to accurately detect the symbol due to inter symbol interference (ISI). Multipath propagation, mobility of transmitter, receiver and local scattering cause the signal to be spread in frequency, different arrival time and angle, which results in ISI in the received signal. This will affect overall system performance. The use of MC-CDMA mitigates the problem of time dispersion. However, still it is necessary to remove the amplitude and phase shift caused by channel. To solve this problem, a multiple antenna array can be used at the receiver, not only for spectral efficiency or gain enhancement, but also for interference suppression. This can be done by the, efficient channel estimation with strong equalization. This paper proposes MIMO MC-CDMA system, Minimum mean square error (MMSE) equalization with pilot based channel estimation. The simulation result shows improved Bit error rate (BER) performance when the sub carrier (SC) and antenna configuration were increased.

Keywords: MC-CDMA, ISI, MMSE Equalization And Pilot Based Channel Estimation

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: ENERGY EFFICIENT TWO STAGE CHAIN ROUTING PROTOCOL (TSCP) FOR WIRELESS SENSOR NETWORKS

Author: HUSAM KAREEM, S.J. HASHIM, SHAMALA SUBERAMANIAM, ADUWATI SALI

Abstract: Wireless sensor nodes are mostly used in extreme environments, especially at remote and hostile areas including battlefield, volcanoes and underwater. Thus, it is difficult to replenish the energy source of the sensor node once it is installed. In order to prolong the lifetime of the nodes, we propose a new routing algorithm that can achieve significant energy conservation in WSNs, known as Two Stage Chain Routing Protocol (TSCP). The main objectives of TSCP is to minimize the total energy consumption, achieve more load balancing and increase the network lifetime with more stability compared with other routing algorithms, for examples Chain-Cluster based Mixed routing (CCM) and Chain-Chain Based Routing Protocol (CCBRP). TSCP algorithm divides the sensor network into multiple chains and work within two stages. The first stage is dividing the nodes to horizontal chains that include all sensor nodes within

(15)

the same row and the second stage is forming a vertical chain that includes all chain heads. The mechanism for selecting the heads in each row is sequentially chosen with all the heads belong to the same column. In the second stage, the node with maximum residual energy amongst the chain heads will be the main head that functions as a gateway to the base station. Simulation results show that TSCP outperforms CCM and CCBRP in overall energy conservation, network lifetime and stability.

Keywords: Wireless Sensor Network, TSCP, CCM, CCBRP, Chain Protocol

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: A NEW DENSITY BASED PROBABILISTIC COUNTER SCHEME FOR SOLVING BROADCAST STORM IN MOBILE AD HOC NETWORKS

Author: A. SENTHIL KUMAR, K.S. RAMASWAMI

Abstract: Broadcasting is a fundamental data dissemination mechanism for route detection, address resolution and many other network related services in Mobile Ad hoc Networks (MANETs). Although flooding is the simplest mechanism for broadcasting, where each node retransmits every individually received message exactly once, it is usually expensive and results in rigorous redundancy, contention and collisions in the network. These problems are widely referred to as the broadcast storm problem. Hence an effective broadcasting scheme is essential in MANETs to transmit a data packet from the sender to the rest of the network nodes. This work introduces a new counter-based broadcasting scheme to achieve efficient broadcasting by adaptive threshold with a predetermined forwarding probability ‘p’ which can be fixed based on the local density information. The counter identifies nodes with duplicate data packet using threshold values and node removes the redundant message. Probabilistic schemes do not require global topological information of the network to make a rebroadcast decision. As such every node is allowed to rebroadcast a message. The proposed work also adapts the random assessment delay (RAD) value to network congestion level and uses packet origination rate as an indicator of network congestion by keeping track of the number of packets received per second at each node. The extensive simulation results show that the new scheme outperforms the existing schemes in term of saved-rebroadcast, reachability and throughput.

Keywords: Manets, Flooding, Counter-Based, Broadcast Storm Problem, Throughput, Reachability

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: DESIGN OF ADAPTIVE BACKSTEPPING WITH GRAVITATIONAL SEARCH ALGORITHM FOR NONLINEAR SYSTEM

Author: SAHAZATI MD. ROZALI, MOHD FUAA’D RAHMAT, ABDUL RASHID HUSAIN, MUHAMMAD NIZAM KAMARUDIN

Abstract: Adaptive backstepping controller is designed for tracking purpose of nonlinear system with unknown parameter is injected to it. Gravitational search algorithm (GSA) is integrated with the designed controller in order to automatically tune its control parameters and adaptation gain since the tracking performance of the controller relies on these parameters. Performance evaluation is observed based on the tracking output and the tracking error between reference input and the system’s output. The effectiveness of the adaptive backstepping controller is verified by looking at the lowest amount value of Sum of Squared Error (SSE) attained from the simulation process. The results show that the system’s output follow the reference input given with remarkably small tracking error.

Keywords: Adaptive Backstepping, Tracking Error, Gravitational Search Algorithm, Sum of Squared Error, Disturbance

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: A REVIEW ON WIRELESS SENSOR NETWORKS ROUTING PROTOCOL: CHALLENGES IN MULTIPATH TECHNIQUES

Author: ABDULALEEM ALI ALMAZROI, MA NGADI

(16)

counted a significant field of research over the past decade. Thus, we present an inclusive review and present classification on the current routing sensor protocols, which are particularly designed for wireless sensor networks. We emphasize the main motivation behind the development of each routing protocol category and clarify the operation of different protocols in detail related to energy issues, with emphasis on their advantages and disadvantages. Moreover, the current multipath routing approach is broadly used in wireless sensor networks in order to improve network performance such as load balancing, reliability, fault tolerance, bandwidth aggregation and QoS Improvement. Therefore, in this paper we highlight the notion of the multipath routing approach and its essential challenges, additionally the basic motivations for utilizing this technique in wireless sensor networks. In addition, we contrast and review the state-of-the-art multipath routing protocols that based on energy aware method, fault tolerance and QoS multipath routing. At the end of this paper, a characterized comparison has been forwarded on these methods based on the analysis outcome.

Keywords: Wireless Sensor Networks, Routing Protocols, Energy Efficiency, Fault Tolerance, Qos, Multipath Routing

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: A STUDY OF TSUNAMI MODEL FOR PROPAGATION OF OCEANIC WAVES

Author: E.SYED MOHAMED, S.RAJASEKARAN

Abstract: The enormous destruction of tsunami and the increased risk of their frequent occurrences enhance the need for the use of more sturdy and accurate models that predict the spread of catastrophic oceanic waves accurately. This paper tries to study this phenomenon that shows a considerable amount of uncertainty. To model the spread of tsunami waves, the initial wave can be considered as a continuous two dimensional closed curve. Each point in its parametric representation on the curve will act as a point source which expands as a small ellipse. The parameters of each ellipse depend on many factors such as the energy focusing effect, travel path of the waves, coastal configuration, offshore bathymetry and the time step. Using Huygens’ wavelet principle, the envelope of these ellipses describes the new perimeter. Further, overlapping and traversing of the wave front are detached and efficiently clipped out

Keywords: Huygens’ Wavelet, Tsunami Propagation, Simulation, Curvature, Convex

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

Title: FAST AND SECURE HANDOVER AUTHENTCATION SCHEME IN MOBILE WiMAX

Author: H. F. ZMEZM, S.J. HASHIM, ADUWATI SALI

Abstract: Handover is one of the essential elements that can affect the Quality of Service (QoS) and capacity of Mobile Broadband Networks. The next generation of broadband wireless networks including the IEEE802.16e standard, allow users to roam seamlessly and securely over the network. Unfortunately the current design suffers from lengthy delay between breaking of previous connection and making of next connection. This delay might not be tolerated by some of the real-time applications such as VoIP and video streaming. Therefore the need for fast and secure handover design becomes an urging necessity. This paper proposes a new handover mechanism enables fast and secure handover with minimum delay suitable for real-time applications. It should be pointed that this proposed handover protocol guarantees a forward and backward secrecy. We conducted our research using ns-2 simulation tool.

Keywords: EAP-Authentication, Hard Handover, Mobile WiMAX, NS-2

Source: Journal of Theoretical and Applied Information Technology January 2014 -- Vol. 59. No. 2 -- 2014

Full Text

(17)

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

411

E-BANJAR BALI, POPULATION CENSUS MANAGEMENT

INFORMATION SYSTEM OF BANJAR IN BALI

BY USING FAMILY TREE METHOD

AND BALINESE CULTURE LAW

1

I GUSTI BAGUS ARI PINATIH,

2

A.A. KOMPIANG OKA SUDANA,

3

I KETUT ADI PURNAWAN,

1,2,3

Department of Information Technology, Udayana University, Bali, 80119

E-mail:

1

gba.pinatih@gmail.com

2

agungokas@hotmail.com

3

dosenadi@yahoo.com

ABSTRACT

This paper describes how population census in Balinese traditional village i.e. banjar are managed. This

kind of information system is known as e-Banjar Bali. A case study was conducted in Banjar Padang

Tegal Tengah, a banjar in Ubud, Bali regarding to the information system. This population information

system uses website as its basis. The study was done to find an easier population census management.

Managing family tree, calculating total population, indigenous and indigenous people, active and

non-active population, natality and mortality are inclusive in the census. Additional feature included as a part of

this information system is management upon banjar organizational data and information spreading among

the society. This particular information system is expected to minimize the use of paper or manual

execution of population census.

Keywords: Banjar, Population, Management, Family Tree, Balinese Culture Law

1.

INTRODUCTION

Balinese culture is widely known in the world. Its

traditional customs, cultures, and arts become a

unique trait for Bali Island itself. The other unique

trait is the way how Balinese manage its population.

Balinese societies live in a special system called

banjar. Banjar is an administrative division under

the governance of sub-district or village in Bali

Province, Indonesia.[1]

Banjar is a term to refer to a unity of society

bounded by law which governs the region borders

in controlling and ruling local society needs – based

on its local customs that has been acknowledged

and respected by Indonesian government.[6]

Banjar is ruled by a traditional village. Traditional

village is governed by sub-district. Each sub-district

might consist of some traditional villages. Every

traditional village might have several banjar.

Figure 1: Scheme Of Banjar In Bali

Population management in Bali is totally different

from other area in Indonesia because of the

existence of banjar itself. The differentiation of

societies that appears in two resident statuses –

penduduk dinas

and penduduk adat – is the

(18)

Journal of Theoretical and Applied Information Technology

20th January 2014. Vol. 59 No.2

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

Penduduk adat

refers to a person who possesses

traditional or indigenous status based on the local

custom in their neighborhood.[12]

Penduduk dinas and penduduk adat were formed

because there are two types of living status in Bali

i.e. banjar dinas and banjar adat. Banjar dinas is a

compulsory social organization which should be

possessed by every people in particular banjar – as

national administrative affairs managed in banjar

dinas.[7] Banjar adat refers to banjar status living

– that i.e. owned by indigenous people – where any

traditional affairs (mortality, odalan, and marriage)

and other banjar local affairs are usually taking

place.[5]

A family in banjar area is often illustrated with a

tree and its branches that grow over time. Thus, this

system is called lineage or family tree. This family

tree will have more branches as new members

enters. Then, relationships among the members of a

family should be clearly defined so that personal

identity can be known completely. This is in line

with the purpose of calculating population.

At one banjar in the population, those cases have

certainly occurred as marriage, divorce, death, birth,

natives and immigrants, community organizations,

and dissemination of relevant information on

population.

Population data collection during years are

addressed by using the book (manual data

collection). The data entry by using this type is very

simple to use but would be inefficient for data

processing and dissemination of population

information.

Figure 1: Population And Activities Archieve Of Banjar Padang Tegal Tengah Ubud 2013

Over the development period, in the banjar

population census has been put on Ms. Office

Excel. Data processing is handled by the software.

But, not everyone can operate and use the existing

formulas on the software.

Figure 2: Population Data Of Banjar Padang Tegal Tengah Ubud 2013 Using Ms. Excel

Figure 3: Population Data Of Banjar Padang Tegal Tengah Ubud 2013 Based On Employment And

Education

(19)

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

413

Some cases that can be managed by this population

census management information system are

patriarch,

matriarch,

divorce,

non-indigenous

inhabitant, indigenous inhabitant, natality and

mortality, society organization, as well as newest

information spreading (e.g. current banjar activity,

announcement, documentation, and any other

information that can be delivered through internet).

The boundary’s problem of this case study is on a

scale of population census only on one banjar.

2.

METHODOLOGY

Methodology used in this research was family tree

method and combine with interview method

towards the head of banjar Padang Tegal Tengah

Ubud. This interview is used to collect

informations

about Balinese culture law. So, methodology used

in this research is combination between family tree

and Balinese culture law (based on interview with

head of banjar)

2.1

Family Tree Method

Family tree is a term used to describe lineage

showing the line of descent from an ancestor to a

person or a family which has a connection towards

other people being his wife or relatives.[2] The

lineage then describes the relationships among

members of a family vertically and horizontally by

mentioning the name of the family.[2]

Figure 4: An Example of a Family Tree

Famiy tree makes the drawing of lineage and

observing the descendents, head of household, and

inheritors easier.[2] An example above shows that

after Mr. Edy and Mrs.

Luna getting

married, they

have two sons and a daughter. Furthermore, in this

case, Mr. Edy is the head of the household (looking

at the husband line or patrilineal system).

Meanwhile, his wife and his children are the

members of the family. As all of his children got

married, there will be three new families. This

situation continues on and on.

Residential system in Bali is similar to the family

tree system mentioned previously but it is in a

slightly different version of the traditional one.

Seeing this case, this research was done in banjar

Adat Padang Tegal Tengah Ubud Bali. For

example, Mr. Yoga and Mrs. Yuni got married.

They have three sons. Mr. Yoga was the head of the

household.

Figure 5: An Example of Family Tree Method

These three sons then got married and have their

own wife and children. Since their parents were not

productive and active anymore – due to age factor –

then the first son had to be responsible for the

family. Therefore, the first son in Mr. Yoga’s

family took the responsibility as the head of the

household. Mr. Yoga, Mrs. Yuni, Sanjaya, and

Krisna were now under Yuda’s responsibility.[9]

Figure 6: Example Of Family Tree, The Changing Of The Head Of Household In Bali

To make it clearer, an example of family tree

system is portrayed in the following case. It can be

seen in figure 5.

A house for a big family consists of a couple of old

man and woman. They have four sons. Each of

their sons has got married. All of them already have

their own children. The situation can be described

as follows:

(20)

Journal of Theoretical and Applied Information Technology

20th January 2014. Vol. 59 No.2

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

Figure 7: Example of Family Tree (In Detail)

In detail, Mr. Lebah has:

a.

A wife

b.

Four sons

c.

Four daughters-in-law

d.

Seven grandchildren

If we see it from the child’s side (i.e. Taman), it can

be said that he has:

a.

A father and a mother

b.

A wife

c.

A child

d.

Three brothers

e.

Three sisters-in-law

f.

Four nephew and two niece

This continuity happens until a lineage of a family

appeared. A datum or a person must be related to

his/her own family. For instance, Lebah’s data

should have detailed descend data. This specific

condition is also for Lebah’s descend data – i.e. his

son’s data.

The details will be explained in the following

design and architecture part.

2.2 Interview with the Leader of the Banjar

An interview with the leader of the Banjar was

conducted in order to get necessary data for the

research. Besides, any other factor concerned in this

research was custom-based regulation in managing

the population itself. The leader of the banjar is

known as Kelihan Banjar in Balinese. He and his

partners have important roles in leading the banjar

adat affairs such as information spreading,

population management, local customs affairs

(ngaben, religious ceremony, etc.), and other

activities that can enhance the banjar identity as

well as appreciate values exist in the society.

Another interview also was conducted with the

leader of ST and PKK. The leader of ST (Sekeha

Teruna or an organization of non-marriade people

in banjar) is considered as the most mature

youngster in leading the youth in that banjar.

Activities that are done by ST such as celebrating

banjar

anniversary,

taking

parts

in

many

competitions, and creating other youth events.

On the other side, PKK (Pemberdayaan dan

Kesejahteraan Keluarga or an organization

(21)

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

415

wealthy as well as law enforcement and

environmentally literate.

Then,

those

points

were

investigated

and

implemented towards the information system by the

researchers.

3. SYSTEM OVERVIEW

This part clarifies (1) design and system feature, (2)

application of family tree, (3) marriage and divorce

in Bali, as well as (4) banjar organizer features.

3.1 Design and System Feature

e-Banjar Bali is a web-based application. Its

information takes place in online form so it can be

accessed anytime and anywhere. In addition,

information can be exchanged among the residents,

administrators, and village organizers without any

space and time boundaries. For instance, when

there is important information wanted to be

delivered by Kelihan Banjar, he can directly gives

instructions to the system. Meanwhile, the

administrators and members of the system will get

the instruction and they will do it immediately. The

user gives information in a form of personal data

such as KTP (ID card) and SIM (driving license)

scan to the system to complete their own identity.

Moreover, the admin will insert news, population

and other necessary information to the system that

the others can easily access. Obviously, all data will

run in the load and saved in and to the database.

Figure 8: Form of Interaction in e-Banjar Bali System

The design of e-Banjar Bali population census

management information system is divided into

three parts namely (1) website page, (2)

administrator page, and (3) member page. Website

page is a page consists of important information

related to banjar which will always be updated by

the administrator. [3]

Administrator page refers to a page which is used

by the administrator to manage the population and

other necessary data which is related to banjar

itself. The administrator has a right to manage this

information system – this is certainly in accordance

with the leader of banjar’s permission and

agreement.

Furthermore, member page is defined as a page for

all members of banjar. Each member has their own

username and password. They do not have the

rights to change any existed

data which inputted

from the registration process. But, all members can

see

the information and data stored in the system

alongwith

their

digital

document

uploaded

previously such as KTP, SIM, certificate of birth,

certificate of marriage, diforce, and so on.

Figure 9: Parts of e-Banjar Bali System

Each resident must register themselves to the leader

of banjar to get their username and password. The

username and password

will be used to log in to the

member page. As the registration process finished,

population data is automatically inputted by the

administrator. Figure 8 shows an example of

marital case where new resident should be

registered.

Figure 10: Member Sign Up

Most of the activities in this information system are

done in the administrator page. Some features that

could be controlled in the administration page of

this information system are mentioned as follows:

a.

In-banjar marital case

(22)

Journal of Theoretical and Applied Information Technology

20th January 2014. Vol. 59 No.2

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

g.

Mortality case

h.

Natality case

i.

Non-indigenous resident case

j.

Temporary resident case

k.

Facility of ST organizational management

l.

Facility of PKK organizational management

m.

News management facility and data master

n.

Data archive

o.

Facility of Banjar leader

p.

Banjar activities record.

q.

Report

This information system focuses more on the

population census management. The other part of

this application is ST organizational management

PKK organization, and information broadcasting to

banjar members.

3.2 Family Tree Application

Family tree can be figured in many ways such as

branches – so it will look like a tree. Giving

numbers on chapter and sub-chapter is the other

way that can be done to describe family tree.

Chapter and sub-chapter numbering is used to make

application of this system easier. One to another

data will be related.[9] See the following example

for the illustration of case in Figure 5.

1.

LEBAH’S BIG FAMILY

1.1

MR. LEBAH

1.1.I MRS. RAI

1.1.1 MR. TAMAN

1.1.1.i MRS. ARI

1.1.1.1 ARIS

1.1.2 MR. SUJANA

1.1.2.i MRS. SWITRI

1.1.2.1 MR. BAGUS

1.1.3 MR. ADNYANA

1.1.3.i MRS. RASMILI

1.1.3.1 RATIH

1.1.3.2 ARYA

1.1.3.3 SASTRA

1.1.4 MR. WIADNYANA

1.1.4.i MRS. JERO

1.1.4.1 AYU

1.1.4.2 RUPEM

According to Figure 5, chapter and sub-chapter

numbering is used in describing a family tree. Each

small family then put into some categorization.

These small families later will create bigger family

in the same house.

Figure 11: A Family Tree using Numbering System

Figure Description:

A.

Mr. Taman’s family consists of his wife

(Mrs. Ari) and his only child (Aris).

B.

Mr. Sujana’s family consists of his wife

(Mrs. Switri) and his only child (Bagus).

C.

Mr. Adnyana’s family consists of his wife

(Mrs. Rasmili) and his three children

(Ratih, Arya, dan Sastra).

D.

Mr. Wiadnyana’s family consists of his

wife (Mrs. Jero) and his two children (Ayu

dan Rupem).

E.

Mr. Lebah’s family consists of his wife

(Mrs. Rai) and his four children (Mr.

Taman, Mr. Sujana, Mr. Adnyana, dan Mr.

Wiadnyana).

A house might consist of one or more head of the

household. There will come a time when the

inactive old head of household

is replaced by the

next generation. For example, Mr. Lebah and Mrs

Rai are getting old and not very active anymore.

Gambar

Figure 2: Population Data Of Banjar Padang Tegal Tengah Ubud 2013 Using Ms. Excel
Figure 5: An Example of Family Tree Method
Figure 7: Example of Family Tree (In Detail)
Figure 10: Member Sign Up
+5

Referensi

Dokumen terkait