cover
Contact Name
Rio Andriyat Krisdiawan
Contact Email
rioandriyat@uniku.ac.id
Phone
+6285224064393
Journal Mail Official
nuansa.informatika@uniku.ac.id
Editorial Address
Kampus 1 UNIKU. Jl. Cut Nyak Dhien No.36A, Cijoho, Kec. Kuningan, Kabupaten Kuningan, Jawa Barat 45513 Kampus 2 UNIKU. Jl. Pramuka No.67, Purwawinangun, Kec. Kuningan, Kabupaten Kuningan, Jawa Barat 45512
Location
Kab. kuningan,
Jawa barat
INDONESIA
Nuansa Informatika
Published by Universitas Kuningan
ISSN : 18583911     EISSN : 26145405     DOI : https://doi.org/10.25134/nuansa
Core Subject : Science,
NUANSA INFORMATIKA adalah jurnal peer-review tentang Informasi dan Teknologi yang mencakup semua cabang IT dan sub-disiplin termasuk Algoritma, desain sistem, jaringan, game, IoT, rekayasa Perangkat Lunak, aplikasi Seluler, dan lainnya
Articles 101 Documents
Sentiment Analysis for Delivery Pricing Optimization : Naïve Bayes Evaluation on Gojek Reviews Nisa Hanum; Woro Isti Rahayu; Ruth Diana Purnamasari
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v20i1.520

Abstract

The development of digital technology in Indonesia has driven the growth of application-based transportation services such as Gojek. However, amid this growth, user dissatisfaction with pricing strategies often appears in social media reviews, but has not been systematically explored as a basis for optimizing delivery pricing using an automated text mining approach. Nevertheless, empirical studies that explicitly utilize sentiment analysis as a foundation for delivery pricing optimization remain limited. Existing sentiment analysis studies on online transportation services have mostly focused on overall service satisfaction, with limited attention to how sentiment patterns reflect customer price sensitivity. This study aims to analyze user sentiment as a diagnostic basis for evaluating and supporting delivery pricing optimization strategies. A comparative evaluation of four text representation methods: TF-IDF, Bag-of-Words (BoW), Word2Vec, and TF-IDF with Chi-Squared feature selection was conducted using 282 Gojek-related reviews collated from X (Twitter). The results of the experiment show that the Naïve Bayes model with BoW representation achieved the best performance, with 70% accuracy and an F1-score of 0.68, outperforming more complex approaches. Further analysis identifies that negative sentiment correlates with the keywords “expensive” and “promo,” providing a strong indication that pricing issues are a major point of concern for customers. These findings serve as a basis for management to optimize dynamic pricing strategies based on real-time user feedback.
Development of a Transparent Vehicle Administration System Using Web-Based Information Architecture: Pengembangan Sistem Administrasi Kendaraan yang Transparan Menggunakan Arsitektur Informasi Berbasis Web IDO JAYA GAINAL; Eryan Ahmad Firdaus
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v20i1.521

Abstract

The management of official vehicles has historically relied on fragmented manual processes leading to inefficiencies, data inaccuracy, lack of transparency, and weak governance oversight. To address these challenges, this study designed and implemented Sikendi (Sistem Informasi Kendaraan Dinas), a web-based vehicle information system aimed at enhancing transparency and administrative governance. Using the System Development Life Cycle (SDLC) Waterfall approach, the system was developed with PHP, MySQL, JavaScript, and AJAX, featuring role-based access (Admin/User), integrated modules for vehicle registration, borrowing workflow with approval mechanisms, maintenance scheduling, fuel logging, document management, and activity auditing. Black-box testing confirmed functional compliance across 24 test cases for Admin and 15 for User roles. Results show the system significantly improves data accuracy, operational efficiency, and accountability, enabling real-time monitoring, automated reporting, and digital audit trails. This work demonstrates that digitizing fleet management in public sector institutions strengthens governance, reduces misuse risk, and supports data-driven decision-making, offering a replicable model for other governmental units
SI-PANDA: Web-Based Personnel Data and Dossier Management System for Pusinfolahta TNI Muhammad Sulthan Nasyira; Eryan Ahmad Firdaus
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v20i1.522

Abstract

Pusinfolahta TNI currently faces critical inefficiencies in personnel administration due to reliance on manual spreadsheet calculations and decentralized local storage for dossier documents. This manual workflow poses significant risks to data security, accuracy, and retrieval speed. To address these limitations, this research developed the Personnel Data and Dossier Processing System (SI-PANDA) utilizing the Rapid Application Development (RAD) method to ensure iterative improvements based on user feedback. The system is constructed upon a three-tier architecture comprising a Native PHP backend, MySQL database, and a responsive web interface. Testing results demonstrate significant performance improvements: the system achieves a page load time of 1.2 seconds and near-instant calculation speed (0.05 seconds) for tenure and retirement estimation, ensuring 100% calculation accuracy. Furthermore, Blackbox testing confirmed the validity of all functional requirements, including the automated backup mechanism and search filters. The main contribution of this study is the delivery of a secure, integrated digital framework that successfully transitions Pusinfolahta TNI from manual processing to a reliable web-based environment, specifically adapted to meet military administrative standards.
Implementation of an e-Voting System for Electing the Student Executive Board Chair Using QR Codes: Implementasi Sistem Pemungutan Suara Elektronik (e-Voting) untuk Pemilihan Ketua Badan Eksekutif Mahasiswa Menggunakan Kode QR Sintya Devi Januari; Darsanto; Muh Pauzan
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v20i1.524

Abstract

Information technology plays a crucial role in supporting all campus activities, including student organizations, which serve as a forum for developing leadership, interests, and talents. One of the main activities of this organization is the election of the Student Executive Board (BEM) chairman. However, elections are still conducted manually using paper ballots, which is time-consuming, inefficient, and prone to fraud. This research aims to design an e-Voting system based on QR Code technology using the Dynamic System Development Method (DSDM) as a system design solution that can ensure compliance with needs and changes during the development process. In this study, the resulting e-Voting system was analyzed using the ISO 9241-11 standard. Parameters measured in the ISO 9241-11 standard include effectiveness, efficiency, and user satisfaction. The results of the analysis show that the e-Voting system achieved 95% effectiveness, 94% efficiency and user satisfaction got a score of 73 as measured based on the System Usability Scale (SUS) included in the category above the eligibility standard, namely 68, so that the score of 73 got an adjective scale as Good, with a grade B, at the Acceptable level and included in the Passive category on the NPS scale. This study shows that the QR Code-based e-Voting system can be a reliable, efficient alternative and increase transparency and a satisfying experience for voters in the BEM chairman election process
A Study on the Application of the Iterator Pattern to Enhance Software Reusability: Studi tentang Penerapan Pola Iterator untuk Meningkatkan Reusabilitas Perangkat Lunak Siti Herawati
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v20i1.525

Abstract

The iterator design pattern is an effective approach in software development to achieve greater modularity and reusability. This study analyzes the application of the iterator pattern in enhancing software reusability, particularly within the object-oriented programming paradigm. The research includes a literature review and hands-on implementation using Python and Java to evaluate the separation of iteration logic from data structures. The results indicate that the pattern supports the principle of separation of concerns, enabling the development of code that is more flexible, structured, and maintainable. Code evaluation shows improvements in readability and the ease of component reuse. Therefore, this study provides a practical contribution to the understanding of design patterns and is expected to serve as a useful reference for software developers in building efficient and sustainable systems
High Performance Yolov4 with Different Optimizers and Backbones to Determine Distance Irma Amelia Dewi; Mikael Prapaskalis G; Muhammad Ichwan
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v20i1.533

Abstract

Monitoring the distance between individuals in public spaces remains relevant for crowd management, operational safety, and risk mitigation in public service. Manual inspections are difficult to carry out consistently and in real time, thus requiring an automated machine vision-based system. This research proposes a safe distance monitoring pipeline that detects humans, calculates the proximity between individuals. Human detection is performed with YOLOv4 and the CSPResNeXt50 backbone, then the center of the bounding box is used as a position representation. The distance between centroids is calculated using Euclidean Distance and calibrated based on camera parameters, thus that it can be mapped to distance units. To obtain a stable training configuration, two optimizers (Adam and SGD) are compared at two learning rates (1E-2 and 1E-3). Test results show that Adam with a learning rate of 1E-3 provides the best performance, achieving 96% object detection accuracy. The distance calculation module achieves 90% accuracy in determining the actual and predicted distances in optimal camera installation scenarios, with an average processing speed of 60 fps. These findings demonstrate a fast and practical approach for camera-based public space safety. Additionally, the backbone comparison shows that CSPResNeXt50 is slightly superior to DarkNet50, making it suitable for lightweight implementation on edge devices in real-time.
Real-Time Bayesian Knowledge Tracing for Adaptive Vocabulary Practice in an Adventure Educational Game: Architecture, Verification, and Reproducibility: Real-Time Bayesian Knowledge Tracing untuk Praktik Kosakata Adaptif pada Game Edukasi Bergenre Petualangan: Arsitektur, Verifikasi, dan Reproducibility Ikhsan Khaeruddin; Rio Andriyat Krisdiawan; Nida Amalia Nasikin
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v20i1.535

Abstract

Vocabulary learning in primary English classes is often constrained by heterogeneous learner readiness, where fixed game progression can under-serve both struggling and advanced students. This study aims to implement and technically validate a reproducible real-time adaptivity mechanism using Bayesian Knowledge Tracing (BKT) in a Unity-based Android vocabulary game. The research adopts a design-and-verification approach using the Game Development Life Cycle (GDLC), supported by requirements elicitation (classroom observation, teacher interview, and literature review). The adaptive engine applies BKT to update mastery after each quiz response and routes learners using a mastery-threshold policy, while event-level logs are stored locally and exportable for auditability. The main results demonstrate that adaptive mode activation, mastery updates, persistence of adaptive state, and mastery-gated progression function consistently in end-to-end black-box tests. Algorithm-level credibility is strengthened through white-box basis-path verification of the UpdateProbability() routine, ensuring independent execution paths for correct and incorrect responses are covered. This work contributes a deployable Unity/Android architecture for real-time BKT-driven adaptivity, accompanied by verification artifacts and reproducibility recommendations to support technical audit, replication, and subsequent controlled effectiveness studies.
Important Strategies in Mitigating Cyber Threats Using SLR in the Student Environment: Strategi Penting dalam Mengurangi Ancaman Siber Menggunakan Tinjauan Literatur (SLR) di Lingkungan Mahasiswa Herdianto Sukmana; Fathoni; Dani
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v20i1.540

Abstract

In the ever-evolving digital era, cyber threats are increasingly diverse and demand effective mitigation strategies, especially for the educational environment and students who are easy targets for human error-based attacks. This study aims to analyze the role of cybersecurity awareness as an important strategy in mitigating cyber threats using the Systematic Literature Review (SLR) approach. A review was conducted on the literature that implements four main cybersecurity frameworks, namely NIST CSF, COBIT 5, the KAMI Index, and ISO/IEC 27001. The results of the analysis show that the technological aspect alone is not enough to guarantee security; Individual and organizational awareness—especially in the education sector, SMEs, and remote work environments—has a significant contribution to lowering the risk of cyber incidents. This study emphasizes that systematic, measurable, and framework-based awareness increase can strengthen cyber defense and support the development of a security culture among students.
Web-Based Asset Maintenance Monitoring System for CV Tartila Group : Sistem Pemantauan Pemeliharaan Aset Berbasis Web untuk Grup CV Tartila Riyan Setiawan; Yuga nata praja; Wasis Haryono
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study presents the development of a Web-Based Asset Maintenance Monitoring System for CV Tartila Group, a company engaged in photography, videography, and digital content production. Manual documentation of maintenance activities often leads to data loss, inconsistent records, and ineffective scheduling of preventive maintenance. The proposed system utilizes a structured approach based on the Waterfall Software Development Life Cycle (SDLC), covering requirements analysis, system design, implementation, and testing. The application integrates asset registration, maintenance history tracking, and automatic scheduling of preventive maintenance using a centralized MySQL database. The results of system testing show that the solution successfully replaces manual processes, increases the accuracy of service records, provides real-time monitoring, and improves decision-making regarding asset lifecycle management. This system contributes significantly to the operational efficiency of CV Tartila Group by reducing downtime and ensuring consistent asset performance
User Interface and User Experience (UI/UX) Design for the Ummu Micco Salon Website Using the Design Thinking Approach: Antarmuka Pengguna dan Pengalaman Pengguna (UI/UX) untuk Situs Web Salon Ummu Micco Menggunakan Pendekatan Design Thinking Fathan Aqsha Ghasani Aufa; Febriyansyah Ramadhan; Debi Irawan
NUANSA INFORMATIKA Vol. 20 No. 1 (2026): Nuansa Informatika 20.1 Januari 2026
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v20i1.545

Abstract

Digital transformation is a strategic solution for Micro, Small, and Medium Enterprises (MSMEs) to maintain global competitiveness, however, its implementation in the beauty service sector is often hindered by operational technology gaps. The primary issue in the Ummu Micco Salon case study is service management inefficiency, which negatively impacts business growth. The underlying cause lies in an inaccessible reservation system and a lack of price transparency, directly resulting in customer confusion and the risk of potential revenue loss. This study aims to address this gap by designing a User Interface (UI) and User Experience (UX) solution built on a website using the Design Thinking approach. The main contribution of this research is implementative, providing a validated design solution that directly resolves the service management inefficiencies faced by the beauty salon. The solution was realized as a high-fidelity prototype using Figma software and validated by 20 respondents. Evaluation results using the System Usability Scale (SUS) measurement indicated a score of 79.625, achieving a Grade B and an "Acceptable" category. This score directly demonstrates that the system design possesses a high level of usability and is feasible for implementation to support operational efficiency and business sustainability for MSMEs.

Page 10 of 11 | Total Record : 101