cover
Contact Name
Komang Oka Saputra
Contact Email
okasaputra@unud.ac.id
Phone
+628123660060
Journal Mail Official
ijeet@unud.ac.id
Editorial Address
Program Studi Doktor Ilmu Teknik, Fakultas Teknik, Universitas Udayana Gedung Pasca Sarjana Universitas Udayana Jl. PB Sudirman
Location
Kota denpasar,
Bali
INDONESIA
International Journal of Engineering and Emerging Technology
Published by Universitas Udayana
International Journal of Engineering and Emerging Technology is the biannual official publication of the Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University. The journal is open to submission from scholars and experts in the wide areas of engineering, such as civil and construction, mechanical, architecture, electrical, electronic, and computer engineering, and information technology as well. The scope of these areas may encompass: (1) theory, methodology, practice, and applications; (2) analysis, design, development and evaluation; and (3) scientific and technical support to establishment of technical standards.
Articles 197 Documents
Extreme Programming for Developing Additional Employee Income System (Case Study: Karangasem Regency Government) I Putu Noven Hartawan
International Journal of Engineering and Emerging Technology Vol 6 No 1 (2021): January - June
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2021.v06.i01.p21

Abstract

The State Civil Apparatus (ASN) is an important part of the government. ASN performance measurement needs to be done, because besides ASN being the provider in terms of community service, performance measurement is also used as a reference in providing additional employee income. Karangasem regency government developed a system to measure the performance of the existing 6,449 ASNs. The system is applied to measure performance and as a system that provides additional employee income. However, the pandemic situation resulted in the Karangasem district government having to press the budget for developing this system. The researcher proposes the Extreme Programming (XP) approach in system development. XP, which has the value of Communication, Simplicity, Feedback and Courage, is the right choice in developing a system with a small budget and time. Feedback that is quickly handled also greatly influences the speed and cost of development
Analysis Of Data Warehouse Design Using Powell Method Hisyam Rahmawan Suharno; Nyoman Gunantara; Made Sudarma
International Journal of Engineering and Emerging Technology Vol 5 No 2 (2020): July - December
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2020.v05.i02.p03

Abstract

With the evolution in this digital era, many industrial organizations and companies have begun to move towards digitization to increase the company's business opportunities. Data is something that is very useful in a company's business. If the dataprocessed correctly can provide a variety of information needed by the company to continue to grow. Now Data also becomes digital and data processing have many techniques and can provide us with a decision support for the information generated by the data. The data processing is usually called Data Warehouse. In running a business, business owners must certainly analyze a number of things so that the business continues to run and grow, including one of which is a fabric business in Bali, namely CV Phalani Bali. CV Phalani Bali still needs a centralized system that integrates sales data from online stores and offline stores, therefore a data warehouse is needed that can help manage all these data and make it a new information needed by CV Phalani Bali. With the data warehouse, it can help the owner of CV Phalani Bali in reporting and historical information of the business they run. Helps manage historical data and provides strategic information to support evaluation and take decision analysis at the executive level. So one of the data warehouse design methods is used, is the Powell method. This Powell method focuses on the ETL (Extract, Transform, Load) process to become a data warehouse that is ready to be processed by OLAP (Online Analytical Processing). This Powell method will be assisted by Microsoft SQL Server Business Intelligence as a tool that will design and process the sales data into a data warehouse that will produce the information needed by CV Phalani Bali for analyze and make decisions to bring cv phalani bali even more advanced.
IT Audit with ITIL on Business Process, Application and IT Infrastructure in Bali Rattan Bag Ni Luh Ade Mita Rahayu Dewi
International Journal of Engineering and Emerging Technology Vol 6 No 1 (2021): January - June
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2021.v06.i01.p11

Abstract

This study discusses information technology audits using the Information Technology Infrastructure Library framework. The case study used in this research is the Bali Rattan Bag, namely the Bali Rattan Bag which is a business engaged in the production and sale of rattan-based bag products. Bali Rattan Bags was founded in 2019. The research was carried out in accordance with the business processes carried out in Bali Rattan Bags. In this study, researchers used survey data collection methods, interviews, and literature study. The survey was conducted by distributing questionnaires. The questionnaire was chosen because it can represent the voices of several people about something and later the results of the questionnaire can be calculated to get the desired results. This study uses an audit with the Information Technology Infrastructure Library (ITIL) framework. The use of ITIL will improve information technology services and improve operational performance. The focus of this research is on the operational domain of services, business processes, applications, and infrastructure in IT services in the Bali Rattan Bag. The purpose of this study was to determine the performance of information technology services in Bali Rattan Bags and provide suggestions based on the analysis results according to ITIL standards for improvement and improvement of information technology services. Index Terms— Audit, Information Technology Infrastructure Library, ITIL Framework
Knowledge Sharing In Perspective Of Tri Kaya Parisudha And Its Effect On Value Engineering Construction Projects Made Novia Indriani; I Nyoman Arya Thanaya; Nyoman Yudha Astana; A.A.Gde Agung Yana
International Journal of Engineering and Emerging Technology Vol 5 No 1 (2020): January - June
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2020.v05.i01.p12

Abstract

Abstract Knowledge is the implementation of information and is convinced can be used for decision making. In this 21st century the success of an organization depends very much on the knowledge they have and how to utilize existing knowledge. The objectives of the research are to know and understand the effect of tacit knowledge and explicit knowledge in the Tri kaya Parisudha perspective on the value engineering of construction projects and to know and understand the influence of explicit knowledge mediating the relationship of tacit knowledge to the value engineering of construction projects. Quantitative analysis used is multivariate analysis using structural equation modeling or SEM with a variance-based or component-based approach called PLS (Partial Least Square). Tacit knowlege in manacika perspective significantly influences explicit knowledge in wacika and kayika perspectives, as well as tacit knowlege and explicit knowledge in manacika, wacika and kayika perspectives significantly influence construction project value engineering. Whereas explicit knowledge partially mediates between tacit knowledge to value engineering on construction project. Index Terms— Knowledge sharing, Tri Kaya Parisudha, Value engineering, Construction projects.
Preliminary Study of Green Material for Green Building in Bali Ni Wayan Meidayanti Mustika; Acwin Ngakan Ketut Dwijendra
International Journal of Engineering and Emerging Technology Vol 6 No 1 (2021): January - June
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2021.v06.i01.p03

Abstract

The definition of green materials is building materials that are environmentally friendly, do not have a negative impact on building users, and are sustainable. Green Material is one of the criteria in the green building assessment parameters that will support energy efficiency goals. Understanding green materials and their availability for their demands in Bali is important to align the growth of green buildings in Bali with the potential and problems of material supply. This paper aimed at conducting an initial preliminary study of the limitation and opportunities for the use of sustainable building materials according to the green building principle approach in Bali. The method used is descriptive method that is reinforced by literature review techniques related to the context of the discussion . Buildings in Bali, when viewed from the use of building materials, carry very distinctive design and appearance characteristics. The selection of green materials in Bali will be influenced by the demands of the requirements for implementing Balinese architecture in buildings, restrictions on material procurement due to location, material legality references and ecolabel certification documents and opportunities for using smart and advanced materials without losing the character of Balinese building architecture.
A Deep Learning Approach For COVID 19 Detection Via X-Ray Image With Image Correction Method I Gede Totok Suryawan; I Putu Agus Eka Darma Udayana
International Journal of Engineering and Emerging Technology Vol 5 No 2 (2020): July - December
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2020.v05.i02.p018

Abstract

In the mitigation effort for reducing the spread of the SARS-CoV-2 pandemic in Indonesia, finding, detecting, and containing the suspect be a very crucial step to contain the virus. One of the ways that this can be detected is by thorax x-ray examination by the expert. Transferring the doctor's knowledge to a computer makes the task more scalable and precise. This can be done by building a small artificial intelligence using a simple CNN model to detect COVID biomarkers' presence in x-ray images. As the AI relies heavily on the x-ray dataset as the system's underlying basis has a good quality dataset is very important. However, the x-ray data tend to have a noise problem that will affect their overall system quality. We did a little comparative study with the objective to improve the quality of the dataset with three techniques of image enhancement, namely color denoising, mean denoising, and contrast enhancement, with the mean denoising outperform the other image manipulation method by 4%, which yield the accuracy of the system to 95% with 100 pieces of real-world test data. Hopefully, this study would inspire future studies improving the tech-based pandemic mitigation technology In the future.
The Hardness Analysis of Epoxy Composite Reinforced with Glass Fiber Compared to Nettle Fibers I Gede Putu Agus Suryawan; NPG Suardana; IN Suprapta Winaya; IWB Suyasa
International Journal of Engineering and Emerging Technology Vol 5 No 1 (2020): January - June
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2020.v05.i01.p02

Abstract

The purpose of this study is to compare the hardness of glass fiber reinforced composite materials with the hardness of netted fiber-reinforced composite materials. Glass fiber is a commercial fiber that has been used in various industries while nettle fiber is a natural fiber that is more environmentally friendly. Composite material has several advantages, namely the form that can be adjusted, high strength, lightweight and resistant to corrosion. Nettle plants are plants that have strong fibers in the bark. In this study, nettle composites were made with variations in the weight fractions of 10%, 15%, and 20%. Hardness testing used the Shore D Durometer. The results of the hardness value of glass fiber composites with weight fractions of 10%, 15%, and 20% are 82.4 Shore D, 84.5 Shore D, and 86.5 Shore D, show an increase in stable hardness because the glass fiber factor is already commercial, the fiber strength is evenly distributed. The hardness values of nettle fiber composites with fractions of 10%, 15%, and 20% are 81.6 Shore D, 85 Shore D, and 86.6 Shore D, the hardness value of each nettle composite increases with the addition of fiber weight fraction but is unstable due to the strength factor of each nettle single fiber uneven. Furthermore, with the right treatment, nettle fiber can replace glass fiber.
Systematic Review of Text Mining Application Using Apache UIMA Purwania Ida Bagus Gede; I Nyoman Satya Kumara; Made Sudarma
International Journal of Engineering and Emerging Technology Vol 5 No 2 (2020): July - December
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2020.v05.i02.p08

Abstract

Companies are often faced with a number of data and information in the form of unstructured texts. The unstructured data set can be processed / extracted so that it can benefit the company in the decision making process or strategy that must be carried out by the company. Text Mining is one solution to overcome these problems. Text Mining can be defined as the process of retrieving information sourced from several documents. One of the most commonly used text mining tools is Apache UIMA. This study aims to systematically study literature on the implementation of text mining and Apache UIMA by using several related databases, including reviewing text mining, Apache UIMA, and reviewing journal of text mining and Apache UIMA. These journals are reduced using certain criteria. The results obtained are the 20 journals that discuss the implementation of text mining and Apache UIMA. Based on the analysis of these journals, it can be concluded that the application of Text Mining is more widely used in the field of Classification with the method often used is Naive Bayes Classifiers. The average accuracy of the method reaches more than 85%, which means the method is very effective for classification. Specifically, Apache UIMA is more widely implemented in the Information Extraction and NLP fields. The main component of Apache UIMA that is often used is the Annotator Engine and is very effectively implemented for information extraction.
Audit Configuration and Vulnerability Router on Diskominfos of Bali Province gede ardi herdiana
International Journal of Engineering and Emerging Technology Vol 6 No 1 (2021): January - June
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2021.v06.i01.p17

Abstract

Abstract-Network security system on a computer that connected to the internet must be well planned and understood in order to effectively protect the resource in the network. how to find out the vulnerability of a network, so that by knowing the weaknesses in the network, then steps to overcome this drawback can be done. One of the forms taken includes conducting periodic analysis, both logical and physical. so that later it is expected that the analysis will produce an audit report containing the detection of various existing vulnerabilities, then take appropriate protective steps, which needed as a guarantee of security for the sustainability of the system. Nipper works by benchmarking the configuration of a router. After completing the inspection, you can see the configuration information as well as the security level of the router. Nessus works by scanning predetermined targets, such as a set of hosts or a separate host. Once the scan activity is complete, you can see the result information in either a graph or a line
Model of Group Peer Assessment on E-Learning Komang Oka Saputra; Putu Arya Mertasana; Pratolo Rahardjo
International Journal of Engineering and Emerging Technology Vol 4 No 2 (2019): July - December
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2019.v04.i02.p10

Abstract

Student motivation at class takes major role on achieving courses’ learning outcomes. Multimedia based content, game-based quiz, or self-assessment can maintain student interest to follow the learning process. Apart from the individual solution, working in group is one way to improve student motivation, however without proper arrangement, putting students in groups can degrade the competitive atmosphere of class, as less-smart students hang up to the more-smart students. Another alternative is implementing collaborative learning such as peer assessment that allows students to grade their fellows. However, objectivity between students must be concerned as students tend to give high-grade for their fellows. Combining group mode and peer assessment, this work proposed group peer assessment to improve student motivation on e-learning. Proposed method started by teacher open a group assignment on e-learning. Students then work on group to create solution. After the solutions are submitted, the extra-group peer assessment begins, where each group examines another group work. To maintain the objectivity of the peer assessment, final grade of each group obtained by combining grade from another group and grade from teacher. In the meantime, cooperation atmosphere in each group is maintained by intra-group peer assessment, where each member asses all his/her teammates in terms of intra-personal and inter-personal skills.