p-Index From 2020 - 2025
10.928
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering International Journal of Reconfigurable and Embedded Systems (IJRES) Lontar Komputer: Jurnal Ilmiah Teknologi Informasi Transmisi: Jurnal Ilmiah Teknik Elektro JURNAL SISTEM INFORMASI BISNIS Jurnal Sistem Komputer TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Jurnal Informatika Disease Prevention and Public Health Journal Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik CommIT (Communication & Information Technology) Bulletin of Electrical Engineering and Informatics Jurnal Teknologi Jurnal sistem informasi, Teknologi informasi dan komputer Sinergi Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika International Journal of Advances in Intelligent Informatics Seminar Nasional Informatika (SEMNASIF) Jurnas Nasional Teknologi dan Sistem Informasi Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika JURNAL NASIONAL TEKNIK ELEKTRO KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Proceeding of the Electrical Engineering Computer Science and Informatics Fountain of Informatics Journal Jurnal Teknologi dan Sistem Komputer Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Jurnal Ilmiah FIFO Emerging Science Journal JIKO (Jurnal Informatika dan Komputer) Jurnal CoreIT Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA MUST: Journal of Mathematics Education, Science and Technology IT JOURNAL RESEARCH AND DEVELOPMENT Al-MARSHAD: Jurnal Astronomi Islam dan Ilmu-Ilmu Berkaitan JRST (Jurnal Riset Sains dan Teknologi) JURNAL REKAYASA TEKNOLOGI INFORMASI Jurnal Informatika Universitas Pamulang ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS JURIKOM (Jurnal Riset Komputer) JUMANJI (Jurnal Masyarakat Informatika Unjani) Informatika : Jurnal Informatika, Manajemen dan Komputer Jurnal Ilmiah Mandala Education (JIME) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat Jurnal Mantik JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Genta Mulia : Jurnal Ilmiah Pendidikan Journal of Robotics and Control (JRC) Journal of Applied Engineering and Technological Science (JAETS) Indonesian Journal of Electrical Engineering and Computer Science Bubungan Tinggi: Jurnal Pengabdian Masyarakat Journal of Innovation Information Technology and Application (JINITA) Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Pengabdian Masyarakat Indonesia Jurnal Nasional Pengabdian Masyarakat Techno Jurnal Informatika: Jurnal Pengembangan IT Advance Sustainable Science, Engineering and Technology (ASSET)
Claim Missing Document
Check
Articles

Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ) Imam Riadi; Sunardi Sunardi; Sahiruddin Sahiruddin
Jurnal Rekayasa Teknologi Informasi (JURTI) Vol 3, No 1 (2019): Jurnal Rekayasa Teknologi Informasi (JURTI)
Publisher : Universitas Mulawarman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30872/jurti.v3i1.2292

Abstract

keberadaan smartphone saat ini dianggap sangat membantu aktifitas manusia dalam melakukan pekerjaan sehari- hari. Berkembangnya fitur-fitur yang ada pada smartphone memudahkan para penggunanya beraktifitas seperti melakukan pekerjaan kantor, bisnis, e-banking, dan untuk berinteraksi dengan pengguna lain di media sosial. Perkembangan smartphone tidak hanya memberikan dampak positif tetapi bisa berdampak negatif  ketika perkembangan tersebut dimanfaatkan untuk melakukan tindakan kejahatan. Saat ini terdapat banyak kasus penghapusan barang bukti kejahatan yang dilakukan oleh tersangka untuk mengilangkan  bukti kejahatan yang  dilakukan  oleh seorang  pelaku. Hal ini menjadi tantangan bagi  forensika teknologi informasi dan  penegak  hukum melakukan  penyelidikan  secara forensik terhadap smartphone dari  tersangka dalam sebuah  kasus  kejahatan  untuk mendapatkan kembali bukti digital yang akan dijadikan sebagai barang bukti dalam sebuah persidangan. Penelitian ini menggunakan tools  MOBILedit Forensic, Wondershare dr. Fone for Android, dan Belkasoft Evidence Center untuk memperoleh bukti digital serta menggunakan metode National Institute of Justice (NIJ) yaitu dengan mengidentifikasi, mengusulkan solusi, melakukan uji solusi yang ditawarkan, mengevaluasi dan melaporkan hasil. Dari hasil pengujian tool forensik yang peneliti gunakan, tool MOBILedit Forensic tidak bisa mengembalikan data yang sudah dihapus, tool Wondershare dr. Fone For Android berhasil mengembalikan data kontak, log panggilan,dan pesan yang sudah dihapus, sementara tool Belkasoft Evidence Center hanya bisa mengembalikan data kontak, dan log panggilan yang sudah dihapus.
Sistem Deteksi Plagiarisme Dokumen Karya Ilmiah Dengan Algoritma Pencocokan Pola Anton Yudhana; Abdul Djalil Djayali; Sunardi Sunardi
Jurnal Rekayasa Teknologi Informasi (JURTI) Vol 1, No 2 (2017): Jurnal Rekayasa Teknologi Informasi (JURTI)
Publisher : Universitas Mulawarman

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2055.691 KB) | DOI: 10.30872/jurti.v1i2.917

Abstract

Plagiarisme secara konvensional dipandang sebagai pelanggaran ilmiah yang serius, pencurian terhadap ide-ide di pasar intelektual kompetitif. Kasus plagiarisme memiliki jumlah yang sangat besar di dalam sebuah lembaga, termasuk penulis yang tidak diketahui dan atribusi kepenulisan untuk para elit birokrasi. Ada banyak usaha yang dilakukan didalam sebuah lembaga untuk mengurangi stigma plagiarisme yang semakin kompetitif. Perkembangan internet yang intensif sekarang ini pun menyakibatkan ketersediaan akan jumlah informasi yang dapat diperoleh. Hal ini memungkinkan seseorang melakukan plagiarisme dari sebuah karya. Jadi menurut kamus besar Bahasa Indonesia (KBBI) plagiarisme berarti memetik atau menulis sebagian besar atau teks yang dimiliki oleh orang lain, menjiplak atau meniru tulisan dari karya orang lain, mencuri skripsi orang lain dan mengakui sebagai milik sendiri, mengutip karangan orang lain tanpa izin dari penulis. Penelitian ini bertujuan untuk merancang aplikasi untuk mendeteksi plagiarisme menggunakan algoritma Rabin-Karp. Metode penelitian yang digunakan adalah studi pustaka dan dalam pengembangan sistem menggunakan metode prototipe. Aplikasi deteksi plagiarisme dihasilkan untuk sistem pelaporan berbasis web. Aplikasi yang dibangun berhasil mendeteksi kalimat yang sama pada judul, abtraksi dan kata kuci serta antara file terbanding dengan file yang ada di dalam repositori.
Security Of Dynamic Domain Name System Servers Against DDOS Attacks Using IPTABLE And FAIL2BA: Security Of Dynamic Domain Name System Servers Against DDOS Attacks Using IPTABLE And FAIL2BA Ibnu Muakhori; Sunardi Sunardi; Abdul Fadlil
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (933.248 KB)

Abstract

Availability, integrity and confidentiality are the main objectives of information security and server security. These three elements are links that are interconnected in the concept of information protection.Distributed Denial of Service (DDoS) is an attack to make online services, networks and applications not available by flooding data traffic so that services is unvailable or availability aspects disrupted. This attack resulted in huge losses for institutions and companies engaged in online services and web-based applications being one of the main targets of attackers to carry out DDoS attacks. Countermeasures that take a long time and large recovery costs are a loss for the institution or company that owns the service due to loss of integrity. NDLC (Network Development Life Cycle) is a method that has stages namely analysis, design, simulation, prototyping, implementation, monitoring and management. The NDLC method used aim for the results obtained focused and detailed. Snort IDS applied on the DDNS server functions to record when there is a DDoS attack. Implemention fail2ban as realtime preventation tool on the server by configuring based on the rules applied to fail2ban. The results showed Snort IDS managed to detect DDoS attacks based on the rules applied to Snort IDS. Realtime prevention using Fail2ban successfully functions as a DDoS attack by blocking the attacker's IP Address.
Analysis of Mobile Based Activity Reporting Systems Using Usability Testing Methods and Use Questioners: Analysis of Mobile Based Activity Reporting Systems Using Usability Testing Methods and Use Questioners Wawan Darmawan; Sunardi Sunardi; Anton Yudhana
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.578 KB)

Abstract

Reporting is a part that must be prepared, monitored and evaluated by the leader in this case the director, organizational activities often overlap with each other and reporting activities are not well documented. The purpose of this study is to analyze the usability of the Activity Reporting System application. In this study the authors used the Usability Testing and USE Questioner methods. The level of usability can determine the extent to which an application or product can be used by users to achieve their goals and how easy it is to use the application interface. Applications with a high level of usability will usually be liked by many users. Vice versa, if the usability level of an application is low it will eventually be left by the user. This study also uses a USE Questioner that includes four parameters namely usefulness, ease of use, ease of learning and satisfaction. Each parameter has several statements that will be given to the user to assess the usability level of the spkditpdpontren application. The results of this study note that the usability value before the recommendation for improvement is 47.58% with sufficient predicate and the usability value after the display improvement recommendation is 78.27% with a good predicate. The general conclusion is that the activity reporting system can make it easy for users to find information related to activities and evaluation and financial management of reporting transparency and accountability.
Web Server Security Analysis Using The OWASP Mantra Method: Web Server Security Analysis Using The OWASP Mantra Method Bambang Subana; Abdul Fadlil; Sunardi Sunardi
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (434.86 KB)

Abstract

Higher Education has been using web-based academic information system, for all academic administration process in this academic system such as study plan, academic transcipt, lecturers and Curriculum and student data. So that required maintenance in database and system management whith well-maintained and scheduled. It is necessary to apply the system to determine the level of vulnerability in order to avoid attacks from irresponsible parties. OWASP (Open Web Application Security Project) is one of the methods for testing the web-based applications released by owasp.org. Using OWASP may indicate that authentication management, authorization and session management.The STMIK Jakarta website often has problems on the web and the loss of some important data that interferes with lectures. At the end of 2016, around September when preparing for the first semester of the Study Plan, the website experienced programmed data loss, consequently the academic system was disrupted. The STMIK Jakarta has used a web-based academic information system, for all academic administrative processes such as study plans, academic transcripts, lecturers, curriculum and student data.This system requires data base and system management. It is important to implement a security system to determine the level of vulnerability to avoid attacks from irresponsible parties. OWASP (Open Web Application Security Project) is one method for testing web-based applications released by owasp.org. The results of the research have been carried out with the results reaching around 90% management authentication, authorization, and session management not being implemented properly.
Bitcoin Price Prediction Using Long Short Term Memory (LSTM): Bitcoin Price Prediction Using Long Short Term Memory (LSTM) Ihyak Ulumuddin; Sunardi Sunardi; Abdul Fadlil
Jurnal Mantik Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.889.pp1090-1095

Abstract

Price fluctuation is a necessity in every business, including the price of Bitcoin. Therefore humans need a device or application that can assist in making predictions quickly and accurately. Deep Learning can be used to make predictions which include setting the parameters used during training, choosing the best parameters for prediction, and choosing the prediction results with the smallest error level in the actual situation. This study performs a Bitcoin price prediction using Long Short Term Memory (LSTM). This study uses quantitative calculations on the prediction results. Measurement of accuracy is done by testing the previous price (back testing) and calculating the average error using RMSE and MAPE. The method for generating predictions is LSTM as a type of Recurrent Neural Network (RNN) which has the advantage of using long-term memory in handling time series data. LSTM implementation using Python is used for price forecasting with stages starting from data collection and normalization, input and output modeling. The result of this research is a prediction of Bitcoin price with an accuracy rate of 97.48% based on the best model with input layer 2, the number of epochs 100, the number of hidden layers 100, and activation using Softmax. These price predictions can be used as a reference and consideration for traders to create trading strategies and run them automatically on the digital currency market.
A laboratory scale IoT-based measuring of the solar photovoltaic parameters Arsyad Cahya Subrata; Tole Sutikno; Sunardi Sunardi; Anggit Pamungkas; Watra Arsadiando; Ahmad Raditya Cahya Baswara
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 11, No 2: July 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v11.i2.pp135-145

Abstract

Harvesting solar energy as a renewable energy source has received significant attention through serious studies that could be applied massively. However, the nonlinear nature of photovoltaic (PV) concerning the surrounding environment, especially irradiation and temperature, affects the resulting output. Therefore, the correlation between environmental parameters and PV's energy needs to be studied. This paper presents a design for measuring solar PV parameters monitored on a laboratory scale. The monitoring is based on internet of things (IoT) technology analyzed in realtime. The system was tested in various weather conditions for 18 hours. The results obtained indicate that the output voltage was influenced by the lighting factor of the PV and the surrounding temperature.
Mobile Forensics for Cyberbullying Detection using Term Frequency - Inverse Document Frequency (TF-IDF) Imam Riadi; Sunardi Sunardi; Panggah Widiandana
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 5, No 2 (2019): December
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (554.761 KB) | DOI: 10.26555/jiteki.v5i2.14510

Abstract

The case of cyberbullying in Indonesia was ranked third in the world in 2015 and as much as 91% was experienced by children [1]. RSA Anti Fraud Command Center (AFCC) report reports that in 2015 45% of transactions were carried out through mobile channels, while 61% of fraud occurred through mobile devices [2]. WhatsApp in July 2019, 1.6 billion users access the WhatsApp messenger on a monthly basis [10]. The data opens a reference for investigators to better anticipate cybercrime actions that can occur in the whatsapp application because more users are using the application. In this study using the TF-IDF method in detecting cyberbullying that occurs in order to be able to add a reference for investigators. The conclusions that have been obtained from the simulation of conversations between four people in a whatsapp group get the results of the cyberbullying rate that the user "a" has a cyberbullying rate of 66.80%, the user "b" has a cyberbullying rate of 50%, the user "c" has a level cyberbullying is 33.19%, user "c" has a cyberbullying rate of 0% from the data proving that the TF-IDF method can help investigators detect someone who will commit cyberbullying actions but in its development a better way is needed when preprocessing so that the abbreviation or changing words can still be detected perfectly.
Penerapan Algoritma Winnowing dan Word-Level Trigrams Untuk Mengidentifikasi Kesamaan Kata Rezki Ramdhani; Abdul Fadlil; Sunardi Sunardi
JURIKOM (Jurnal Riset Komputer) Vol 9, No 2 (2022): April 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v9i2.4060

Abstract

Identifying the same words in two or more texts is the first step in the process of detecting plagiarism. Plagiarism detection software are commercially available but relatively expensive. Although some software is offered for free, the features provided are very limited. Therefore, a word similarity detection system is needed to be used as an alternative for users that can be freely accessed. The application of the pattern matching method is one of the solutions that can be used to find the similarity of words between documents. There are several algorithms that can be used as a method to find the similarity of words in the text, including the Winnowing algorithm which is known to have good performance in detecting similarity of words. Winnowing is a hashing-approach based algorithm that applies hash-function and window formation to obtain fingerprints during pattern matching. Based on these fingerprints, the word similarity level can be calculated. Previous studies have only calculated the level of similarity of words based on the character (character-level), while the calculation of the level of similarity based on words (word-level) is still limited. This research was carried out with the aim of measuring the level of similarity of words using the Winnowing algorithm and word-level trigrams. The results showed that the Winnowing algorithm which was applied using word-level trigrams could detect similarities in the text of 76.84%, 52.29%, 37.40%, and 19.29%, respectively. From the results of the study, it can be concluded that the pattern matching method with the Winnowing algorithm and word-level trigrams can be used to measure the level of similarity of the text
Analisis Penilaian Kinerja Karyawan Menggunakan Metode WASPAS Sunardi Sunardi; Rusydi Umar; Dewi Sahara Nasution
JURIKOM (Jurnal Riset Komputer) Vol 9, No 3 (2022): Juni 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v9i3.4168

Abstract

An employee is an asset to the company. The success of the company in achieving its goals depends largely on the ability of human (employee) resources to perform the task assigned to him. The Indonesian government is optimistic the rupiah will continue to strengthen to rp9,100 per dollar, he said. Employee performance assessment analysis is using a systemated aggregated sum product assessment (waspas). The waspas method is used because it can reduce errors or optimize for the highest and lowest valuation with the excellence of looking for the best option option using a unique combination of two Wells known as MCD mexcellence, the WMM and the heavy-product model (WPM). The research stages conducted are problem identification, literature studies, data collection, value-weight determination, results analysis, employee determination, and finally drawing a conclusion. The study is conducted using a descriptive qualitative approach, one that employs qualitative and descriptive data. The type of qualitative descriptive research is often used to analyze events, phenomena, or circumstances socially. The study was conducted compulsively, a sample retrieval technique relying on its own judgment when selecting population members to participate in the study so that the study obtained five samples from the quality control division (qc) from a population of 150. Data collection through interviews and observations obtained data related to employees such as employee names, performance performance, divisions existing in kerry express, and criteria used in the assessment of lateness, error system, daily report, outstanding revenue, volume. Data analysis results in a reduction of data that gets meaningful information and facilitates the withdrawal of conclusions, presents data in the form of happy calculations, and concludes that the waspas method can be applied to the employee performance assessment system and can be used as the determining of the best workers. Weight of each criteria: lateness (25%), system improve (25%), daily report (25%), outstanding revenue (15%), and volume (10%). Results obtained from the 5 samples used that had a top yield value of 1.8208 for alternatives 1 (a1) and could be used for best employee decision-making.
Co-Authors Abd. Rasyid Syamsuri Abdul Djalil Djayali Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Achmad Dito Ahmad Azhar Kadim Ahmad Ikrom Ahmad Raditya Cahya Baswara Ahmad Syahril Mohd Nawi Aldi Bastiatul Fawait Fawait Alfian Ma’arif Alwas Muis Aminuyati Anggit Pamungkas Anton Yudhana Anton Yudhana Anton Yudhana Anton Yudhana Apik Rusdiarna Indra Praja Ardiansyah Ardiningtias, Syifa Riski Ardiningtias Arief Setyo Nugroho Arif Wirawan Muhammad Ariful Aziz Arizona Firdonsyah Asep Setyaji Azrul Mahfurdz Azrul Mahfurdz Azrul Mahfurdz Bambang Subana Budi Santosa Denis Prayogi Denis Prayogi Dewi Sahara Dewi Sahara Nasution Doddy Teguh Yuwono Dwi Aryanto Dwi Aryanto Eko Aribowo Eko Handoyo Ermin Al Munawar Ermin Ermin Evrynda Widyasari Puspa Dewi Faqihuddin Al-anshori Fatma Nuraisyah, Fatma Fiftin Noviyanto Fijaya Dwi Bima Sakti Putra Fijaya Dwi Bima Sakti Putra Fijaya Dwi Bimasakti Firdonsyah, Arizona Fitriyani Tella Fitriyanto, Rachmad Furizal Furizal Furizal Furizal Furizal Furizal Gema Kharismajati Guguh Makbul Rahmadani Fitra H. Ahmad Hartanta, Agus Jaka Sri Hartini, Sri Haryani Alamsyah Herman Herman Herman Herman Hernawan Aji Nugroho Heru Hermawan Hikmatyar Insani Himawan I Azmi Ibnu Muakhori Ihyak Ulumuddin Iif Alfiatul Mukaromah Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Irhash Ainur Rafiq Jafri Din Janu Prasetyo januari audrey January Audrey Joko Supriyanto Joko Triyanto Kemal Thoriq Al-Azis Khoir, Syaiful Amrial Lina Handayani Luh Putu Ratna Sundari Lukman Reza Lukman Reza M Murinto M. Ihya A. Elfatih Mardhiatul Ihsaniah Miftahuddin Fahmi Mitra Adhimukti Muchamad Kurniawan Muchlas, Muchlas Muchrisal Muchrisal Muchrisal Muflih, Ghufron Zaida Muh. Hajar Akbar Muhammad Amirul Mu'min Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Kunta Biddinika Muhammad Kunta Biddinika Muhammad Nashiruddin Darajat Muhammad Nur Ardhiansyah Muhammad Sabiq Dzakwan Muhammad Sabiq Dzakwan Muntiari, Novita Ranti Murinto Murinto Musri Iskandar Nasution Muzakkir Pangri Nasirudin Nasirudin Nazuki Nazuki Nugroho, Hernawan Aji Nur Makkie Perdana Kusuma Nur Ratnawati Nuril Mustofa Pahlevi, Ryan Fitrian Panggah Widiandana Pradana Ananda Raharja Priyatno Priyatno Puji Ristianto Puriyanto, Riky Dwi Rachmad Fitriyanto Rachmad Very Ananda Saputra Raja Bidin Raja Hassan Rani Rotul Muhima Restu Prima Yudha Restu Prima Yudha Rezki Ramdhani Rezki Ramdhani Ricky Irawan Putra Rifkan Firdaus Rio Dwi Listianto Rio Ikhsan Alfian Rosmini Rosmini Rusydi Umar Rusydi Umar Rusydi Umar Rusydi Umar Saberi Mawi Sahiruddin Sahiruddin Saifullah, Shoffan Saputro, Mochammad Yulianto Andi Septiyawan Rosetya Wardhana Sharipah Salwa Mohamed Son Ali Akbar Sri Rahayu Astari Sri Rahayu Astari Sri Winiarti Subrata, Arsyad Cahya Sukma Aji Supriyanto Syaiful Khoir Syed Abdullah Syed Abdullah Syifa Riski Ardiningtias Syifa'ah Setya Mawarni Syifa’ah Setya Mawarni Tole Sutikno Tomy Chandra Mahendra Tresna Yudha Prawira Tresna Yudha Prawira Tri Antoro Tristanti, Novi Ummi Syafiqoh Ummi Syafiqoh Virasanty Muslimah Wahyu S Aji Watra Arsadiando Wawan Darmawan Wijaya, Setiawan Ardi Yana Mulyana Yuniarti Lestari Yuwono Fitri Widodo