{"title":"A Web and SMS Gateway-Based Quality Monitoring Model of Upright Piano Painting","authors":"Kasino Kasino, Ahmad Juniar, Ridzky Kramanandita","doi":"10.12928/JTI.V1I1.48-58","DOIUrl":"https://doi.org/10.12928/JTI.V1I1.48-58","url":null,"abstract":"This model of quality monitoring is a web and SMS gateway-based an application which is specifically designed for quality control of upright piano painting in PT XYZ. Previously, the data processing for preparing a daily report consume long time. The painting production always is evaluated every month due to wait collection daily reports for one month. This situation is very to be late and can damage the large number of painting. To overcome this problem, a web and SMS gateway-based quality monitoring model of Upright Piano Painting is designed. This model use evolutionary development algorithm, and based on Unified Modeling Language (UML). The result has indicated that the designed model can speed up the processing of daily data and send a SMS of daily monitoring report of quality upright piano painting to painting manager every day. So the evaluation of the production process can be conducted in daily period instead of monthly.","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129004443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Phone and Pakistani Youth: A Gender perspective","authors":"Z. Ali","doi":"10.12928/jti.v1i2.59-68","DOIUrl":"https://doi.org/10.12928/jti.v1i2.59-68","url":null,"abstract":"This research was designed to open a window on youngsters’ use of mobile phone. The present study examined the purposes and patterns of usage of mobile phone use– in both male and female students of undergraduate and graduate level at seven public sector universities of the Province of Punjab (Pakistan). The study examined and reviewed the literature to understand the patterns and purposes of mobile phone use from a global perspective in both developed and developing societies. This provided in a context for the study of mobile phone use in the local Pakistani situation. The findings of the study conclude that gender differences exist in purposes and patterns of usage of mobile phone use, though they are not very significant. There is a change in the trend among females as the usage of the mobile phone is increasing. Contrary to the general perception about gender conscious Pakistani society, females are almost on par with males in using mobile phone. However, existing gender stereotypes maintain the status quo in terms of purposes of using mobile phone.","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115377026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the License Mode of Value-Added Exploitation of Public Sector information","authors":"Haiying Hua, Shuren Zhu","doi":"10.12928/jti.v1i2.97-100","DOIUrl":"https://doi.org/10.12928/jti.v1i2.97-100","url":null,"abstract":"How to license PSI (public sector information) to those commercial reusers has become so urgent and important issue. The paper discussed the different license mode of value-added exploitation of Public Sector Information in UK and United States. Based on the investigation and comparison, the paper proposed some valuable suggestions on the construction of license mode of value-added exploitation of PSI in China: A clear attribution of property of public sector information and a clear range of Public sector information that can be accessed and be commercial reused and exploited; A diversification license based on clear classification of Public Sector Information; To establish unified management institute and supervisory body and so on.","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115776131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Android Application Development","authors":"R. A. Soni","doi":"10.12928/jti.v1i2.89-96","DOIUrl":"https://doi.org/10.12928/jti.v1i2.89-96","url":null,"abstract":"As and when the world moves towards the hand-held devices, there should be an innovation as well as awareness of such kind of application development used for the hand-held device. As time elapses the world started moves on the fingers using such kind of developed applications. In this paper we discuss the most fundamental attributes and crucial steps followed to create a robust application using Android OS. This kind of contribution will help a lot to the initiators who want to switch-over from other technologies to the mobile application development.","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127970602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model of Electronic Document Management System for Limited Partnership","authors":"Faiqunisa Faiqunisa, Eko Nugroho, P. Santosa","doi":"10.12928/jti.v1i2.78-88","DOIUrl":"https://doi.org/10.12928/jti.v1i2.78-88","url":null,"abstract":"Both types of documents, electronic and non-electronic are a major component supporting activities. In addition to the documents, communications capabilities to employees and managers effectively with other stakeholders are one of the important key achievements of organizational goals. LP. XYZ is one of the Consultants in the field of Information Technology, but the storage and management of electronic documents and archives themselves carried on a server without a management information system, so that records and electronic documents have not been properly managed. This study makes modeling system includes document management of process models, data models and interface models to suit the needs of the LP. XYZ administration in organizing activities, such as enterprise document management, web content management, project management and communication management of work, so the management information system may be supporting the business activities and operations of LP. XYZ.","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Green Computing","authors":"K. N. Prasanthi, K. Shalini","doi":"10.12928/jti.v1i1.1-13","DOIUrl":"https://doi.org/10.12928/jti.v1i1.1-13","url":null,"abstract":": Green computing, Green ICT as per IFG International Federation of Green ICT and IFG Standard, green IT, or ICT sustainability, is the study and practice of environmentally sustainable computing or IT. San Murugesan notes that this can include \"designing, manufacturing, using, and disposing of computers, servers, and associated subsystems—such as monitors, printers, storage devices, and networking and communications systems — efficiently and effectively with minimal or no impact on the environment.\" [1] The goals of green computing are similar to green chemistry: reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, and promote the recyclability or biodegradability of defunct products and factory waste. Green computing is important for all classes of systems, ranging from handheld systems [2] to large-scale data centers. [3] Many corporate IT departments have green computing initiatives to reduce the environmental impact of their IT operations In 1992, the U.S. Environmental Protection Agency launched Energy Star, a voluntary labeling program that is designed to promote and recognize energy-efficiency in monitors, climate control equipment, and other technologies. This resulted in the widespread adoption of sleep mode among consumer electronics. Concurrently, the Swedish organization TCO Development launched the TCO Certificationprogram to promote low magnetic and electrical emissions from CRT-based computer displays; this program was later expanded to include criteria on energy consumption, ergonomics, and the use of hazardous materials in construction .","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116359212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vibrant Energy Aware Spray and Wait Routing in Delay Tolerant Network","authors":"Viren G. Patel, Tushar K. Oza, D. Gohil","doi":"10.12928/jti.v1i1.43-47","DOIUrl":"https://doi.org/10.12928/jti.v1i1.43-47","url":null,"abstract":"Delay tolerant networks (DTN) are wireless networks where disconnections arise often due to the mobility of nodes, failures of energy, the low density of nodes, or when the network extends over long distances. In these situations, traditional routing protocols that have been developed for mobile ad hoc networks prove to be unsuccessful to the scope of transmitting messages between nodes. The Spray and Wait routing may achieve low routing and energy efficiency due to the blindness in the spray phase. To deal with this situation, we propose an opportunistic routing with enclosed message copies, called the Vibrant Energy aware Spray and Wait (VESW), which utilizes the information about vibrancy of node and remaining energy to allocate the number of copies between the corresponding pair nodes in the spray phase.","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Modified HRRN Scheduling Algorithm for priority systems Using Hybrid Priority scheme","authors":"P. Varma","doi":"10.12928/jti.v1i1.14-19","DOIUrl":"https://doi.org/10.12928/jti.v1i1.14-19","url":null,"abstract":"The basic aim of this paper is to design a scheduling algorithm which is suitable for priority systems and it should not suffer with starvation or indefinite postponement. Highest Response Ratio Next (HRRN) scheduling is a non-preemptive discipline, in which the priority of each job is dependent on its estimated run time, and also the amount of time it has spent waiting. Jobs gain higher priority the longer they wait, which prevents indefinite postponement (process starvation). In fact, the jobs that have spent a long time waiting compete against those estimated to have short run times. HRRN prevents indefinite postponements but does not suitable for priority systems. So, modifying HRRN in such a way that it will be suitable for priority based systems.","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Domestic Case Studies Probability to Overcome Software Failures","authors":"C. S. Kumar, D. Raghu, P. R. Kumar","doi":"10.12928/jti.v1i1.20-25","DOIUrl":"https://doi.org/10.12928/jti.v1i1.20-25","url":null,"abstract":"Computers are the pervasive technology of our time. As computer become critically tied to human life, it also becomes more important that interactions with them are under control. They are no longer a novelty, but are integrated into the fabric of our world, performing both high and low-level tasks. That is, computers may be used to eliminate heavy, redundant work and more. Sophisticated machines have been deployed to perform remote surgery or detect subterranean landmines in repopulated civilian areas. The increasing importance of computers in our lives means that it is essential that the design of computer systems incorporates techniques that can ensure reliability, safety and security. This paper will examine technological mishaps involving the use of computers. This review will include notorious software bugs that have affected finance, communication, transit, defense, health and medicine and others systems or industries. The sequence and etiology of these accidents will be discusses as well as how catastrophes may be avoided in the future through lessons and practices based on research.","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"46 37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Body Area Networks","authors":"G. P. Reddy, P. B. Reddy, V. K. Reddy","doi":"10.12928/jti.v1i1.36-42","DOIUrl":"https://doi.org/10.12928/jti.v1i1.36-42","url":null,"abstract":"Recent technological advances in integrated circuits, wireless networks, and physiological sensing have enabled miniature, lightweight, low power, intelligent monitoring devices to be integrated into a Body Area Network (BAN). This new type of technology hold much promise for future patient health monitoring. BANs promise inexpensive, unobtrusive, and unsupervised ambulatory monitoring during normal daily activities for long periods of time. However, in order for BANs to become ubiquitous and affordable, a number of challenging issues must be resolved, such as integration, standardisation, system design, customisation, security and privacy, and social issues. This paper presents an overview of many of these issues and indeed the background and rationale of body area networks.","PeriodicalId":364935,"journal":{"name":"Journal of Telematics and Informatics","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}