p-Index From 2021 - 2026
7.298
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering International Journal of Reconfigurable and Embedded Systems (IJRES) Transmisi: Jurnal Ilmiah Teknik Elektro JURNAL SISTEM INFORMASI BISNIS Jurnal Sistem Komputer TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Jurnal Informatika Disease Prevention and Public Health Journal Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik CommIT (Communication & Information Technology) Bulletin of Electrical Engineering and Informatics Jurnal Teknologi Jurnal sistem informasi, Teknologi informasi dan komputer Sinergi Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika International Journal of Advances in Intelligent Informatics Seminar Nasional Informatika (SEMNASIF) Jurnas Nasional Teknologi dan Sistem Informasi Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika JURNAL NASIONAL TEKNIK ELEKTRO KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Proceeding of the Electrical Engineering Computer Science and Informatics Fountain of Informatics Journal Jurnal Teknologi dan Sistem Komputer Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Jurnal Ilmiah FIFO Emerging Science Journal JIKO (Jurnal Informatika dan Komputer) Jurnal CoreIT Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) MUST: Journal of Mathematics Education, Science and Technology IT JOURNAL RESEARCH AND DEVELOPMENT Al-MARSHAD: Jurnal Astronomi Islam dan Ilmu-Ilmu Berkaitan JRST (Jurnal Riset Sains dan Teknologi) JURNAL REKAYASA TEKNOLOGI INFORMASI Jurnal Informatika Universitas Pamulang ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS JURIKOM (Jurnal Riset Komputer) JUMANJI (Jurnal Masyarakat Informatika Unjani) Informatika : Jurnal Informatika, Manajemen dan Komputer Jurnal Ilmiah Mandala Education (JIME) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat Jurnal Mantik JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Genta Mulia : Jurnal Ilmiah Pendidikan Journal of Robotics and Control (JRC) Journal of Applied Engineering and Technological Science (JAETS) Indonesian Journal of Electrical Engineering and Computer Science Bubungan Tinggi: Jurnal Pengabdian Masyarakat Journal of Innovation Information Technology and Application (JINITA) Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Pengabdian Masyarakat Indonesia Jurnal Nasional Pengabdian Masyarakat Techno Jurnal Informatika: Jurnal Pengembangan IT Advance Sustainable Science, Engineering and Technology (ASSET) JOCHAC
Claim Missing Document
Check
Articles

Pelatihan Penggunaan Google Apps untuk Pengajaran bagi Para Guru SMPN 43 Bandar Lampung Irhash Ainur Rafiq; Novi Tristanti; Nur Makkie Perdana Kusuma; Asep Setyaji; Muhammad Kunta Biddinika; Sunardi Sunardi
Jurnal Pengabdian Masyarakat Indonesia Vol 2 No 3 (2022): JPMI - Juni 2022
Publisher : CV Infinite Corporation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jpmi.607

Abstract

SMPN 43 Kota Bandar Lampung tidak luput dari penyelenggaraan pembelajaran secara daring akibat adanya pandemi Covid-19. Program pelatihan optimalisasi Google Apps ini diharapkan dapat mendukung proses belajar mengajar agar bisa berjalan efektif dan optimal. Tujuan pengabdian ini adalah untuk mengenalkan Google Apps (Forms, Docs, Sheets, Slides), Google Meet dan Google Classroom kepada para guru SMPN 43 Kota Bandar Lampung sehingga bisa proses belajar mengajar menjadi lebih optimal. Peserta pelatihan adalah 19 guru SMP Negeri 43 Bandar Lampung dengan berbagai background pendidikan. Pelatihan dilaksanakan secara daring melalui Google Meet. Survei dilakukan kepada peserta untuk mendapatkan kondisi sebelum dan setelah pelatihan. Evaluasi terhadap peserta dilakukan berdasarkan respon peserta terhadap pertanyaan dalam angket sebelum dan sesudah pelatihan. Hasil menunjukkan bahwa 100% guru merasa terbantu dengan adanya pelatihan ini. Tingkat keberhasilan sebesar 100% terlihat pada pengetahuan guru tentang Google Apps yang meliputi Google Form, Google Meet, Google Classroom, Google Docs, Google Sheet, dan Google Slide bertambah setelah mengikuti pelatihan.
Identifikasi Suara Pada Sistem Presensi Karyawan Dengan Metode Ekstraksi Ciri MFCC Yuwono Fitri Widodo; Sunardi Sunardi; Abdul Fadlil
JUMANJI (Jurnal Masyarakat Informatika Unjani) Vol 3 No 01 (2019): Jurnal Masyarakat Informatika Unjani
Publisher : Jurusan Informatika Universitas Jenderal Achmad Yani

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (572.097 KB) | DOI: 10.26874/jumanji.v3i01.49

Abstract

Biometrik adalah ilmu yang mempelajari pola ciri-ciri untuk mengenali atau mengidentifikasi manusia berdasarkan satu atau lebih dari bagian tubuh manusia, baik ciri-ciri kimia, fisik, maupun tingkah laku, seperti wajah, sidik jari, suara, geometri tangan, ataupun iris mata. Saat ini sudah berkembang teknologi menggunakan suara untuk dijadikan sebuah aplikasi yang memudahkan manusia. Proses identifikasi suara sangat diperlukan untuk mengetahui keakuratan suara berdasarkan ciri yang dimiliki, karena beberapa manusia memiliki kemiripan dalam berucap. Pada penelitian ini bertujuan untuk mengetahui pola suara berdasarkan ucapan. Metode yang digunakan untuk identifikasi suara menggunakan metode ekstraksi firur Mel-Frequency Cepstral Coefficients (MFCC), merupakan metode ekstraksi fitur yang mendekati sistem pendengaran manusia dan mampu untuk mengenali pola ucapan.
Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM Muh Hajar Akbar; Sunardi Sunardi; Imam Riadi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 2 (2020): September 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (969.618 KB) | DOI: 10.14421/jiska.2020.52-04

Abstract

Steganography is an anti-forensic technique that allows a criminal to hide information in other messages, so that during an examination it will be difficult to obtain evidence of the crime information. Therefore we need a technique to detect hidden messages in the data. This technique is known as steganalysis. Steganalysis is an anti-steganography science whose main purpose is to study the hiding characteristics of data on digital media and detect the existence of secret messages that are hidden using steganography techniques. The purpose of this study is to apply steganalysis techniques to detect the presence of messages that are hidden in other messages by using the forensic method, namely Generic Computer Forensic Investigation Model (GCFIM). In this study, the process of inserting steganographic messages using the Hiderman application, while the steganalysis process uses the StegSpy application. The results obtained in this study were the process of steganalysis using the help of the StegSpy application proved to be successful in detecting the presence of hidden messages in the five files that were scanned by steganographic messages.
Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology Imam Riadi; Sunardi; Fitriyani Tella Nani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (832.523 KB) | DOI: 10.14421/jiska.2022.7.2.83-90

Abstract

Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.
Sistem Pendukung Keputusan Penerimaan Peserta Didik Baru dan Pemilihan Jurusan dengan Metode AHP dan SAW Yuniarti Lestari; Sunardi Sunardi; Abdul Fadlil
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4227

Abstract

The activity of admitting new students (PPDB) is an administrative process that is repeated every year. This activity is the starting point for the process of finding quality resources according to the criteria of each school. Selection is done manually, such as using spreadsheets or number processing, causing problems, including the length of the selection process. This study develops a PPDB selection system that facilitates the process of accepting new students. The development of this research uses Javascript Node JS, React JS framework, MySQL database from Xampp, and visual studio code editor. The system was built using two methods, namely Analytical Hierarchy Process (AHP) and Simple Additive Weighting (SAW). AHP is used to select prospective students, while SAW is used as a way to map the majors of each prospective student. The input criteria are National Achievement Test (NUN), School Achievement Test (NUS), Academic Potential Test (TPA), entry path, and major interest. Research has succeeded in building an application that produces rankings and majors that are 100% the same as the calculation simulations carried out manually. The test was carried out with a black box test with 100% valid results. The results of the selection were then tested using the alpha test and beta test. Respondents gave responses strongly agree 83% and agree 17%, while the responses do not know/undecided, disagree, and strongly disagree each 0%.
Perbandingan Metode AHP dan TOPSIS untuk Pemilihan Karyawan Berprestasi Musri Iskandar Nasution; Abdul Fadlil; Sunardi Sunardi
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4194

Abstract

This study designed a system to determine outstanding employee selection using a Decision Support System (DSS) with the Analytical Hierarchy Process (AHP) method and the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The purpose of this study is to analyze the accuracy in making decisions. The stages of this research are collecting employee data and criteria data, then weighting the criteria and assessment, after that the calculation uses the AHP and TOPSIS methods, and the last step is the analysis of the calculation results and the calculation of accuracy. The criteria used are attendance, years of service, permission, and discipline. Implementation for building applications using the PHP programming language and MySQL database. The results of the calculation of the accuracy obtained by the AHP method are 100%, as well as the TOPSIS method at 100%. The results of the AHP calculation show that the first rank results are obtained with a value of 0.02525, namely employees with code K8, while the results of the TOPSIS calculation show that the first rank results are obtained with a value of 0.955236913, namely employees with code K8. This shows that the two methods have the same results in determining the first rank of employees, however the TOPSIS method is better than AHP because the TOPSIS calculation process is carried out twice normalization so that it does not produce the same value.
Implementasi Data Mining dengan Algoritma Naïve Bayes untuk Profiling Korban Penipuan Online di Indonesia Sunardi Sunardi; Abdul Fadlil; Nur Makkie Perdana Kusuma
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.3999

Abstract

Profiling of victims of crime is intended to facilitate the targeting of information dissemination and carry out prevention efforts. Profiling is helpful to increase the awareness of internet users against cybercrime. This study aims to create a sociodemographic profile based on online fraud victims using Instant Messengers in Indonesia based on the sociodemography of online fraud victims, namely age, gender, education level, domicile, occupation, duration of using the internet in a day, and Instant Messenger media used. The method used in this research is the descriptive statistical method, namely Data Mining using the snowball sampling method by sharing a link via WhatsApp. Participants were given a link to fill out several survey questions about the sociodemographic of the victim, such as age, gender, occupation, domicile, and online fraud that had been experienced through the IM application. The survey was created using GoogleForms and sent online via WhatsApp to participants who had been victims of online fraud. The Data Mining technique was used to analyze the responses of 1910 participants and then classified using the Naïve Bayes Algorithm. The results showed that the Naïve Bayes Algorithm has an accuracy percentage of 75.28%. The prediction model for the vulnerability of online fraud victims is a female respondent, aged 27.3 years, using Instagram and WhatsApp, currently living in Central Java Province, education background is high school, and the duration of using the internet more than eight hours a day, and status as a Student/College Student.
Comparison of Machine Learning Approach for Waste Bottle Classification Abdul Fadlil; Rusydi Umar; . Sunardi; Arief Setyo Nugroho
Emerging Science Journal Vol 6, No 5 (2022): October
Publisher : Ital Publication

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28991/ESJ-2022-06-05-011

Abstract

The use of machine learning for the image classification process is growing all the time. Many methods can be used to classify an image with good accuracy. Convolutional Neural Network (CNN) and Support Vector Machine (SVM) are popular methods for this case. The two approaches have differences in the data training process to achieve classification objectives. Although there are some differences between these approaches, there are some advantages to both of them. This research explores the comparison of the two CNN and SVM methods by comparing the training process carried out and the accuracy results of the classification. The process stages are divided into pre-processing, training, and testing. The objects used are ten waste plastic bottles with different brands of medium size with a total data of 1100 images. Based on the observations, both methods have advantages and disadvantages in the data training and classification process. However, from the results, CNN's accuracy is better than SVM. The accuracy of both networks is 99% for CNN and 74% for SVM, respectively. So, from the results of experiments that have been carried out in the study, it was found that CNN was still better than SVM. Doi: 10.28991/ESJ-2022-06-05-011 Full Text: PDF
Analisis Application Programming Interface Pada Mobile E-Voting Menggunakan Metode Test-Driven Development Sunardi Sunardi; Imam Riadi; Pradana Ananda Raharja
Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto) Vol 20, No 2 (2019): Techno Volume 20 No.2 Oktober 2019
Publisher : Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/techno.v20i2.4266

Abstract

Pengujian pada perangkat lunak dibutuhkan sebagai jaminan mutu terhadap kemampuan perangkat lunak. Perangkat lunak diterapkan pada pekerjaan yang nyata tanpa memiliki kendala terhadap kinerja dalam memberikan perintah, memproses perintah hingga memperoleh hasil dari pemrosesan sesuai dengan tujuan pengembangan. Pengujian unit Application Programming Interface (API) pada web service fokus sebagai upaya untuk menguji kemampuan pada tiap unit. Unit yang diuji secara spesifik akan digabungkan dengan unit lain hingga menjadi suatu sistem terintegrasi. Aplikasi mobile membutuhkan dukungan API sebagai penghubung dengan basis data, dimana aplikasi mobile dengan basis data tersebut tidak saling berhubungan secara langsung. Tampilan antarmuka pada aplikasi mobile hanya difokuskan sebagai interaksi visual antara pengguna dengan sistem. Sistem yang diberi perintah akan merespon dengan umpan balik yang dihubungkan melalui perantara dan merespon kembali melalui perantara dan dikembalikan dalam bentuk visual melalui antaramuka. Pengujian pada tiap unit sistem menggunakan proses Test-Driven Development (TDD) untuk menguji tiap fungsi. Perancangan dan pembangunan web service pada aplikasi e-voting memerlukan pengujian sehingga dalam penerapanya dapat digunakan sesuai dengan spesifikasi yang telah dirancanakan tanpa menimbulkan bug atau error yang dapat menganggu kinerja sistem. API yang telah diuji dan berinteraksi dengan antarmuka dapat melakukan proses data pemilih, validasi data pemilih dan pemilihan. Sistem ini juga telah diuji dengan metode System Usability Scale dengan skor total 69,02. Testing on the software is needed to guarantee its capabilities. So software in real condition wouldn’t have any deflect with the performance to providing wich in line with the goal of development. Testing the Application Programming Interface (API) unit on the web service is an effort to testing the performance of each unit. Specifically tested unit will be combined with other units to become an integrated system. A Mobile application requires API support as the connector to a database, which not directly related to mobile application. The user-interface in mobile application only act as a visual interaction between the user and the system. The commanded system will respond through feedback which connected into a connector and gives the response back through the connector and returns in visual form through an interface. Test-Driven Development (TTD) was used in testing each system unit. Designing and building web service on e-voting application requires testing so that application can be used properly without causing bugs or errors that can interface system performance. Approved APIs are able to process voter data, validate voter data and election. The system also tested with “System Usability Scale” method which gains 69,02 total score.
Analisis Investigasi Cyber Espionage Pada Facebook Menggunakan Digital Forensics Research Workshop (DFRWS) Joko Triyanto; Sunardi Sunardi; Imam Riadi
Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto) Vol 23, No 1 (2022): Techno Volume 23 NO.1 April 2022
Publisher : Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/techno.v23i1.9064

Abstract

Media sosial sangat bermanfaat untuk mendapatkan informasi atau data dengan mudah dan cepat seiring dengan peningkatan jumlah pengguna smartphone terutama pada Android. Di sisi lain, mobile instant messangging aplications  dan sosial media membuat prospek  adanya tindak kejahatan dunia maya atau Cybercrime khususnya cyber espionage yaitu tindakan mata-mata terhadap data elektronik atau memanfaatkan jaringan internet. Penelitian ini diharapkan dapat  membuka barang bukti digital pelaku cyber espionage yang ada di aplikasi Facebook  berupa gambar dan teks untuk  mendukung identifikasi  aktivitas  yang menuju  pada cyber espionage. Kerangka kerja untuk menjalankan  digital forensics  pada pengkajian ini menggunakan metode Digital Forensics Research Workshop (DFRWS) dengan tahapan identification (identifikasi), Preservation (Pemeliharaan) Collection (Pengumpulan), Examination (Pemeriksaan), Analysis (Analisis), Presentation (Presentasi) . Tools yang digunakan adalah MobilEdit dengan cara kerja ektraksi dan analisis. Skenario yang dilakukan adalah kasus cyber espionage pada facebook. Harapan dari  penelitian ini adalah menghasilkan  Forensis Investigative analysis  pada Facebook memakai metode DFRWS mampu mengungkap cyber espionage pada aplikasi Facebook
Co-Authors Abd. Rasyid Syamsuri Abdul Djalil Djayali Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Achmad Dito Ahmad Azhar Kadim Ahmad Ikrom Ahmad Raditya Cahya Baswara Ahmad Syahril Mohd Nawi Aldi Bastiatul Fawait Fawait Alfian Ma’arif Alwas Muis Anggit Pamungkas Anton Yudhana Anton Yudhana Anton Yudhana Anton Yudhana Apik Rusdiarna Indra Praja Ardiansyah Ardiningtias, Syifa Riski Ardiningtias Arief Setyo Nugroho Arif Wirawan Muhammad Ariful Aziz Arizona Firdonsyah Asep Setyaji Azrul Mahfurdz Azrul Mahfurdz Azrul Mahfurdz Bambang Subana Budi Santosa Deco Aprilliansyah Denis Prayogi Denis Prayogi Dewi Sahara Dewi Sahara Nasution Dewi Soyusiawaty Doddy Teguh Yuwono Dwi Aryanto Dwi Aryanto Eko Aribowo Eko Handoyo Ermin Al Munawar Ermin Ermin Evrynda Widyasari Puspa Dewi Faqihuddin Al-anshori Fatma Nuraisyah, Fatma Fiftin Noviyanto Fijaya Dwi Bima Sakti Putra Fijaya Dwi Bima Sakti Putra Fijaya Dwi Bimasakti Firdonsyah, Arizona Fitriyani Tella Fitriyanto, Rachmad Furizal Furizal Furizal Furizal Gema Kharismajati Guguh Makbul Rahmadani Fitra H. Ahmad Hartanta, Agus Jaka Sri Hartini, Sri Haryani Alamsyah Herman Herman Herman Herman Hernawan Aji Nugroho Heru Hermawan Hikmatyar Insani Himawan I Azmi Ibnu Muakhori Ihyak Ulumuddin Iif Alfiatul Mukaromah Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Irhash Ainur Rafiq Jafri Din Janu Prasetyo januari audrey January Audrey Joko Supriyanto Joko Triyanto Kemal Thoriq Al-Azis Khoir, Syaiful Amrial Lina Handayani Luh Putu Ratna Sundari Lukman Reza Lukman Reza M Murinto M. Ihya A. Elfatih Mardhiatul Ihsaniah Miftahuddin Fahmi Mitra Adhimukti Muchamad Kurniawan Muchlas, Muchlas Muchrisal Muchrisal Muchrisal Muflih, Ghufron Zaida Muh. Hajar Akbar Muhammad Amirul Mu'min Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Kunta Biddinika Muhammad Kunta Biddinika Muhammad Nashiruddin Darajat Muhammad Nur Ardhiansyah Muhammad Sabiq Dzakwan Muhammad Sabiq Dzakwan Muntiari, Novita Ranti Murinto Murinto Musri Iskandar Nasution Muzakkir Pangri Nasirudin Nasirudin Nazuki Nazuki Nugroho, Hernawan Aji Nur Makkie Perdana Kusuma Nur Ratnawati Nuril Mustofa Pahlevi, Ryan Fitrian Panggah Widiandana Pradana Ananda Raharja Priyatno Priyatno Puji Ristianto Puriyanto, Riky Dwi Rachmad Fitriyanto Rachmad Very Ananda Saputra Raja Bidin Raja Hassan Rani Rotul Muhima Restu Prima Yudha Restu Prima Yudha Rezki Ramdhani Ricky Irawan Putra Rifkan Firdaus Rio Dwi Listianto Rio Ikhsan Alfian Rosmini Rosmini Rusydi Umar Rusydi Umar Rusydi Umar Rusydi Umar Saberi Mawi Sahiruddin Sahiruddin Saifullah, Shoffan Salsabilla Azahra Putri Saputro, Mochammad Yulianto Andi Septiyawan Rosetya Wardhana Sharipah Salwa Mohamed Son Ali Akbar Sri Rahayu Astari Sri Rahayu Astari Sri Winiarti Subrata, Arsyad Cahya Sukma Aji Supriyanto Syaiful Khoir Syed Abdullah Syed Abdullah Syifa Riski Ardiningtias Syifa'ah Setya Mawarni Syifa’ah Setya Mawarni Tole Sutikno Tomy Chandra Mahendra Tresna Yudha Prawira Tri Antoro Tristanti, Novi Ummi Syafiqoh Ummi Syafiqoh Virasanty Muslimah Wahyu S Aji Watra Arsadiando Wawan Darmawan Wijaya, Setiawan Ardi Yana Mulyana Yuniarti Lestari Yuwono Fitri Widodo