p-Index From 2021 - 2026
12.649
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IJCCS (Indonesian Journal of Computing and Cybernetics Systems) JURNAL SISTEM INFORMASI BISNIS Proceedings of KNASTIK Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Jurnal Informatika SPEKTRUM INDUSTRI Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Jurnal Teknik Elektro Bulletin of Electrical Engineering and Informatics Jurnal Teknologi Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) Jurnas Nasional Teknologi dan Sistem Informasi JURNAL PENGABDIAN KEPADA MASYARAKAT Jurnal Teknologi Elektro INFORMAL: Informatics Journal Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Bulletin of Electrical Engineering and Informatics JOIN (Jurnal Online Informatika) Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer JOIV : International Journal on Informatics Visualization Sinkron : Jurnal dan Penelitian Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research Jurnal Informatika Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT InComTech: Jurnal Telekomunikasi dan Komputer Insect (Informatics and Security) : Jurnal Teknik Informatika JURNAL REKAYASA TEKNOLOGI INFORMASI PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer Applied Information System and Management ILKOM Jurnal Ilmiah Compiler MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) JURTEKSI RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika Informatika : Jurnal Informatika, Manajemen dan Komputer Jurnal Ilmiah Mandala Education (JIME) Systemic: Information System and Informatics Journal EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Journal of Robotics and Control (JRC) Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Cyber Security dan Forensik Digital (CSFD) JTIULM (Jurnal Teknologi Informasi Universitas Lambung Mangkurat) International Journal of Advances in Data and Information Systems Edunesia : jurnal Ilmiah Pendidikan Journal of Innovation Information Technology and Application (JINITA) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Teknik Informatika (JUTIF) JURPIKAT (Jurnal Pengabdian Kepada Masyarakat) Humanism : Jurnal Pengabdian Masyarakat International Journal of Robotics and Control Systems J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Jurnal Pengabdian Informatika (JUPITA) Jurnal INFOTEL Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics Jurnal Karya untuk Masyarakat (JKuM) Control Systems and Optimization Letters Signal and Image Processing Letters Scientific Journal of Engineering Research SEMINAR TEKNOLOGI MAJALENGKA (STIMA) Edumaspul: Jurnal Pendidikan Methods in Science and Technology Studies
Claim Missing Document
Check
Articles

Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST) Imam Riadi; Abdul Fadlil; Muhammad Immawan Aulia
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 5 (2020): Oktober 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (628.662 KB) | DOI: 10.29207/resti.v4i5.2224

Abstract

DVD-R is a type of optical drive that can store data in one burning process. However, there is a feature that allows erasing data in a read-only type, namely multisession. The research was conducted to implement the data acquisition process which was deleted from a DVD-R using Autopsy forensic tools and FTK Imager. The National Institute of Standards and Technology (NIST) is a method commonly used in digital forensics in scope storage with stages, namely collection, examination, analysis, and reporting. The acquisition results from Autopsy and FTK-Imager show the same results as the original file before being deleted, validated by matching the hash value. Based on the results obtained from the analysis and presentation stages, it can be concluded from the ten files resulting from data acquisition using the FTK Imager and Autopsy tools on DVD-R. FTK Imager detects two file systems, namely ISO9660 and Joliet, while the Autopsy tool only has one file system, namely UDF. The findings on the FTK Imager tool successfully acquired ten files with matching hash values and Autopsy Tools detected seven files with did not find three files with extensions, *.MOV, *.exe, *.rar. Based on the results of the comparative analysis of the performance test carried out on the FTK Imager, it got a value of 100% because it managed to find all deleted files and Autopsy got a value of 70% because 3 files were not detected because 3 files were not detected and the hash values ​​were empty with the extensions * .exe, * .rar and *.MOV. This is because the Autopsy tool cannot detect the three file extensions.
Identification of Forensic Evidence for Virtual Router Networks Using the National Institute of Standard and Technology (NIST) Method Firmansyah Yasin; Abdul Fadlil; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.568 KB) | DOI: 10.29207/resti.v5i1.2784

Abstract

The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This study uses the Windump forensic tool as a means of recording network traffic activity. Network Miner and Wireshark as an analytical tool for identifying digital evidence. The use of the National Institute of Standard and Technology (NIST) method which collection, examination, analysis and reporting, can be repeated and maintained with the same data. Based on experiments with virtual router network traffic testing, the system built has succeeded in obtaining digital evidence, either by direct or indirectly. The system scenario that has been planned succeeded recording 220494 packages, but by the Windump, it is automatically divided into 9 (nine) parts of the package which are Buktidigital0 to Buktidigital8. The inspection stage produces evidence that has been verified by Wireshark and Network Miner. The analysis stage proves that there were attacks carried out by addresses 192.168.10.10 and 192.168.234.10. Based on the results of forensic testing, the use of the NIST method on a forensic system that has been built with a virtual router object can be used by investigators to identify evidence of cyber-attacks.
Pengambilan Keputusan Sistem Penjaminan Mutu Perguruan Tinggi menggunakan MOORA, SAW, WP, dan WSM Sunardi; Abdul Fadlil; Ryan Fitrian Pahlevi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 2 (2021): April 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (413.839 KB) | DOI: 10.29207/resti.v5i2.2977

Abstract

Higher Education Quality Assurance (QA) is regulated in Quality Standards and the number of criteria as well as its relationship with the implementation of the Quality Assurance System (QAS), namely the Internal and External Quality Assurance System (IHSG). . The research is focused on analyzing 4 decision-making methods or Decision Support Systems (DSS) for QAS in MAC. The purpose of this study is to classify standard data and MAC criteria in business processes into a database that is integrated with the QAS decision-making method. The analysis was carried out on 4 multi-criteria decision-making methods that will be used in the QAS-MAC decision-making process, namely: Moora, SAW, WP, and WSM. These methods were tested on a quality standard database and then assessed by comparison, namely relevance, features, accuracy, precision, reliability, effectiveness, efficiency, strengths, and weaknesses. Decision Making Methods as a determinant of Business Process priorities become information for PTMA Leaders in predicting strategic activities. The value of the method analysis shows that 4 decision-making methods are Moora (75%), SAW (75%), WP (94%), and WSM (94%).
Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital Alfiansyah Imanda Putra Alfian; Rusydi Umar; Abdul Fadlil
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 2 (2021): April 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (540.282 KB) | DOI: 10.29207/resti.v5i2.3015

Abstract

The development of digital video technology which is increasingly advanced makes digital video engineering crimes prone to occur. The change in digital video has changed information communication, and it is easy to use in digital crime. One way to solve this digital crime case is to use the NIST (National Institute of Standards and Technology) method for video forensics. The initial stage is carried out by collecting data and carrying out the process of extracting the collected results. A local hash and noise algorithm can then be used to analyze the resulting results, which will detect any digital video interference or manipulation at each video frame, and perform hash analysis to detect the authenticity of the video. In digital video engineering, histogram analysis can be performed by calculating the histogram value metric, which is used to compare the histogram values ​​of the original video and video noise and make graphical comparisons. The results of the difference in frame analysis show that the results of the video show that the 2nd to 7th frames experience an attack while the histogram calculation of the original video centroid value and video tampering results in different values ​​in the third frame, namely with a value of 124.318 and the 7th frame of the video experiencing a difference in the value of 105,966 videos. tampering and 107,456 in the original video. Hash analysis on video tampering results in an invalid SHA-1 hash, this can prove that the video has been manipulated.
Sistem Penentuan Penginapan dengan Metode Promethee Novita Ranti Muntiari; Sunardi Sunardi; Abdul Fadlil
Jurnal Ilmiah Mandala Education (JIME) Vol 6, No 1 (2020): Jurnal Ilmiah Mandala Education (JIME)
Publisher : Lembaga Penelitian dan Pendidikan Mandala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (486.318 KB) | DOI: 10.36312/jime.v6i1.1098

Abstract

Every person who travels to a place for a period of days requires lodging with certain criteria and different possibilities for each person. The problem lies in determining the desired lodging recommendations because there are too many choices and various criteria. This study conducted a search for lodging in Yogyakarta with criteria for distance, price, class of lodging, room facilities and supporting facilities. The Promethee method is used to get the rankings of each alternatef by calculating the weights for each criterion. Alternative values desired by visitors are processed to find the value of criteria and preference criteria to then be calculated leaving flow and entering flow to get net flow. This research produces a ranking of data that has been tested using a system with the highest net flow value is 0.5 ie alternative lodging 1 with this is prioritized according to the criteria desired by visitors.
ANALISIS EMPIRIS PERBANDINGAN KINERJA METODE HASHING PROGRESSIVE OVERFLOW DAN LINEAR QUOTIENT DALAM STUDI PEMBUATAN APLIKASI DEKSTOP ADMINISTRASI KEPEGAWAIAN Eko Prianto; Anton Yudhana; Abdul Fadlil
ILKOM Jurnal Ilmiah Vol 8, No 3 (2016)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v8i3.66.174-181

Abstract

Administrasi merupakan kegiatan sehari-hari yaitu berupa kegiatan mencatat, mengumpulkan dan menyimpan suatu kegiatan atau hasil kegiatan sehingga membutuhkan memori guna menyimpan itu semua. Untuk memudahkan proses pencarian data yang telah disimpan dengan cepat, maka diperlukan suatu metode, yaitu menggunakan metode hashing. Penerapan manajemen memory bertujuan, agar mencegah adanya perulangan data yang sama, manajemen basis data yang baik, manajemen memori dan memberikan kemudahan untuk mengakses data dengan cepat walaupun data yang ada sangat banyak, dengan memasukkan kata kunci yang telah ditentukan dapat mencari data dan menampilkan dengan akurasi waktu yang dibutuhkan sebentar. Dengan metode progressive overflow dan linear quotient akan dianalisis nilai rata-rata dari setiap metode, nilai yang paling kecil dari metode tersebut adalah nilai yang terbaik akan digunakan sebagai pedoman seberapa besar nilai proses hashing dalam sebuat database suatu instansi dan sebagai studi kasus penentuan penyediaan memori yang dibutuhkan.
Data Acquisition On Messenger Skype Using The National Institute Of Justice Method Muhammad Rizki Setyawan; Anton Yudhana; Abdul Fadlil
Systemic: Information System and Informatics Journal Vol. 5 No. 2 (2019): Desember
Publisher : Program Studi Sistem Informasi Fakultas Sains dan Teknologi, UIN Sunan Ampel Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (671.485 KB) | DOI: 10.29080/systemic.v5i2.724

Abstract

Perkembangan insant messenger khususnya aplikasi skype semakin pesat. Pengguna skype biasanya sebagai alat unuk berbagi informasi menggunakan smarphone android. Jumlah pengguna aplikasi skype yang banyak dapat disalah gunakan untuk melakukan kegiatan kejahatan seperti transaksi barang ilegal berupa vape narkoba sesama pengguna skype. Kasus ini bisa diselesaikan dengan mendapatkan bukti digital dari aplikasi skype yang tertinggal di smartphone android menggunakan metode digial forensik. Metode forensik yang digunakan dalam penelitian ini adalah National Institute of Justice (NIJ) dengan terdapat beberapa tahapan yaitu identification, collection, examination, analysis, dan reporting sedangkan software Oxygen Forensic Suite digunakan untuk akuisisi data. Hasil yang didapat berhasil mendapat semua barang bukti yang diinginkan dari kedua smartphone yang terisntall skype yaitu EVERCROSS dan SAMSUNG J2 berupa akun profil, kontak person, teks percakapan dan file gambar dengan presentase hasil akuisisi data Skype dari smartphone EVERCROSS B75 berhasil mendapat data 48% dan hasil akuisisi data Skype dari SAMSUNG J2 berhasil mendapat data 100%.
Clustering Majors for New Students at Vocational High School Muhammadiyah 3 Yogyakarta Using Fuzzy C-Means Rifqi Rahmatika Az-Zahra; Rusydi Umar; Abdul Fadlil
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.811 KB) | DOI: 10.22219/kinetik.v3i3.642

Abstract

The development of the era demands quality human resources. For that need to be equipped with the knowledge and skills to be ready to compete in the world of work. Vocational High School has many skills programs. Examples of skills programs in Vocational High School are Computer Network Engineering, Audio and Video Engineering, Mechanical Engineering, Building, Drawing Techniques, Motorcycle Engineering, Installation and Power Engineering, systems that can assist in the decision-making process of prospective students. The grouping system will be created using the Fuzzy C-Means method. Grouping majors using fuzzy c-means algorithm is expected to help prospective students choose majors from the many majors that exist. This is done so that prospective students do not experience difficulties in learning activities, can develop optimally and is expected to work in accordance with the expertise that has been owned, so that ultimately can improve the quality of output and outcome of vocational education. The results obtained in this study in the form of data grouped based on 3 clusters, so that prospective students can choose the majors in accordance with the selected cluster.
Pengenalan Pola Emosi Manusia Berdasarkan Ucapan Menggunakan Ekstraksi Fitur Mel-Frequency Cepstral Coefficients (MFCC) Siti Helmiyah; Abdul Fadlil; Anton Yudhana
CogITo Smart Journal Vol 4, No 2 (2018): CogITo Smart Journal
Publisher : Fakultas Ilmu Komputer, Universitas Klabat

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (586.366 KB) | DOI: 10.31154/cogito.v4i2.129.372-381

Abstract

Human emotion recognition subject becomes important due to it's usability in daily lifestyle which requires human and computer interraction. Human emotion recognition is a complex problem due to the difference within custom tradition and specific dialect which exists on different ethnic, region and community. This problem also exacerbated due to objectivity assessment for the emotion is difficult since emotion happens unconsciously. This research conducts an experiment to discover pattern of emotion based on feature extracted from speech. Method used for feature extraction on this experiment is Mel-Frequency Cepstral Coefficient (MFCC) which is a method that similar to the human hearing system. Dataset used on this experiment is Berlin Database of Emotional Speech (Emo-DB). Emotions that are used for this experiments are happiness, boredom, neutral, sad and anger.  For each of these emotion, 3 samples from Emo-DB are taken as experimental subject. The emotion patterns are successfully visible using specific values for MFCC parameters such as 25 for frame duration, 10 for frame shift, 0.97 for preemphasis coefficient, 20 for filterbank channel and 12 for ceptral coefficients. MFCC features are then extracted and calculated to find mean values from these parameters. These mean values are then plotted based on timeframe graph to be investigated to find the specific pattern which appears from each emotion. Keywords— Emotion, Speech, Mel-Frequency Cepstral Coefficients (MFCC).
Penerapan Metode Weight Product Pada Penentuan Penerimaan Karyawan Ermin Ermin; Sunardi Sunardi; Abdul Fadlil
CYBERNETICS Vol 4, No 01 (2020): CYBERNETICS
Publisher : Universitas Muhammadiyah Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29406/cbn.v4i01.2074

Abstract

Sering didapati karyawan di suatu perusahaan bertahan dalam jangka waktu yang singkat. Salah satu penyebab utamanya adalah kesalahan dalam rekrutmen. Hal ini terjadi karena belum semua perusahaan memiliki metode yang dijadikan sebagai standar untuk menilai kelayakan calon karyawan. Penelitian ini menggunakan metode Weight Product untuk memberi kemudahan dalam penentuan penerimaan karyawan pada Koperasi Pedagang Pasar Indonesia (KOPPI) Sorong Provinsi Papua Barat. Tahapan penelitian dilakukan dengan identifikasi masalah, studi literatur, pengumpulan data, metode WP, menentukan kriteria, menentukan bobot, mengolah data perhitungan dan kesimpulan. Perangkingan dilakukan berdasar standar nilai untuk diterimanya calon karyawan. Penelitian ini ditentukan dengan 5 kriteria, yaitu ijazah, skill, motivation letter, etos kerja dan dapat dipercaya dengan 8 sampel data pelamar. Aplikasi Sistem Pendukung Keputusan Berbasis Web yang telah dibangun telah memberikan hasil yang sama dengan perhitungan manual sehingga memberi dampak positif terhadap perusahaan KOPPI dalam penentuan penerimaan karyawan. Sistem mendapatkan penilaian 100% telah berfungsi dengan baik berdasarkan pengujian black box.
Co-Authors Aang Anwarudin Abdul Azis Achmad Nugrahantoro Aditiya Dwi Candra Ahmat Taufik Aji Pamungkas Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Amiruddin, Nanda Fahmi Andrianto, Fiki Anggit Pamungkas Annisa, Putri Anton Yudhana Anwar Siswanto ANWAR, FAHMI Arief Setyo Nugroho Arief Setyo Nugroho Arif Budi Setianto Arif Budiman Arif Budiman Arif Wirawan Muhammad Aris Rakhmadi Asno Azzawagama Firdaus Atmojo, Dimas Murtia Aulia, Aulia Az-Zahra, Rifqi Rahmatika Aznar Abdillah, Muhamad Bagus Primantoro Basir, Azhar Candra, Aditiya Dwi Darajat, Muhammad Nashiruddin Davito Rasendriya Rizqullah Putra Dewi Soyusiawaty Dhimas Dwiki Sanjaya Dian Permata Sari Dianda Rifaldi Dikky Praseptian M Dimas Murtia Atmojo Doddy Teguh Yuwono Dwi Susanto Dwi Susanto Edy Fathurrozaq Egi Dio Bagus Sudewo Eko Prianto Eko Prianto Elvina, Ade Ermin Al Munawar Ermin Ermin Esthi Dyah Rikhiana Fahmi Anwar Fahmi Auliya Tsani Fahmi Auliya Tsani Fahmi Fachri Fanani, Galih Faqihuddin Al-anshori Faqihuddin Al-Anshori, Faqihuddin Fathurrahman, Haris Imam Karim Fauzi Hermawan Fiki Andrianto Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitri Muwardi Furizal Gusrin, Muhaimin Gustina, Sapriani Hafizh, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Harman, Rika Helmiyah, Siti Hendril Satrian Purnama Herdiyanto, Erik Herman Herman Herman Yuliansyah, Herman Herman, - Ibnu Rifajar Ibrahim Mohd Alsofyani Ihyak Ulumuddin Ikhsan hidayat Ilhamsyah Muhammad Nurdin Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Irjayana, Rizky Caesar Irwansyah Irwansyah Izzan Julda D.E Purwadi Putra januari audrey Jayawarsa, A.A. Ketut Jogo Samodro, Maulana Muhamammad Joko Supriyanto Joko Supriyanto Kamilah, Farhah Kartika Firdausy Khoirunnisa, Itsnaini Irvina Kusuma, Nur Makkie Perdana Laura Sari Lestari, Yuniarti Lestari, Yuniarti Lin, Yu-Hao Luh Putu Ratna Sundari M. Nasir Hafizh Maftukhah, Ainin Maulana Muhammad Jogo Samudro Mini, Ros Mohd Hatta Jopri Muammar Mudinillah, Adam Mufaddal Al Baqir Muh. Fadli Hasa Muhaimin Gusrin Muhajir Yunus Muhamad Daffa Al Fitra Muhamad Rosidin Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Johan Wahyudi Muhammad Kunta Biddinika Muhammad Ma’ruf Muhammad Nasir Hafizh Muhammad Nur Faiz Muhammad Nurdin, Ilhamsyah Muhammad Rizki Setyawan Muntiari, Novita Ranti Murinto Murinto - Murinto Murinto Murni Murni Musliman, Anwar Siswanto Mustofa Mustofa Muwardi, Fitri Nasution, Dewi Sahara Nasution, Musri Iskandar Nurwijayanti Pahlevi, Ryan Fitrian Ponco Sukaswanto Poni Wijayanti Prabowo, Basit Adhi Prayogi, Denis Priambodo, Bambang Putra, Fajar R. B Putri Annisa Putri Annisa Putri Purnamasari Putri Silmina, Esi Ramadhani, Muhammad Ramdhani, Rezki Razak, Farhan Radhiansyah Rezki Rezki Rifqi Rahmatika Az-Zahra Rizky Andhika Surya Rochmadi, Tri Roni Anggara Putra Rusydi Umar Rusydi Umar S Sunardi S, Sunardi Saad, Saleh Khalifah Safiq Rosad Saifudin Saifudin Saifullah, Shoffan Saleh khalifa saad Santi Purwaningrum Sarmini Sarmini Septa, Frandika Setyaputri, Khairina Eka Setyaputri, Khairina Eka Setyaputri, Khairina Eka Shinta Nur Desmia Sari Siti Helmiyah Subandi, Rio Sukaswanto, Ponco Sukma Aji Sulis Triyanto Sunardi Sunardi Sunardi Sunardi, Sunardi Surya Yeki Surya Yeki Syamsiar, Syamsiar Syarifudin, Arma Tole Sutikno Tresna Yudha Prawira Tresna Yudha Prawira Tri Ferga Prasetyo Tristanti, Novi Tuswanto Tuswanto Virdiana Sriviana Fatmawaty Wahju Tjahjo Saputro Wahyusari, Retno Winoto, Sakti Wintolo, Hero Wulandari, Cisi Fitri Yana Mulyana Yana Mulyana Yasidah Nur Istiqomah Yeki, Surya Yohanni Syahra Yossi Octavina Yulianto, Dinan Yulianto, Muhammad Anas Yuminah yuminah yuminah, Yuminah Yuminah, Yuminah Yuwono Fitri Widodo Zein, Wahid Alfaridsi Achmad Zulhijayanto -