p-Index From 2021 - 2026
12.535
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IJCCS (Indonesian Journal of Computing and Cybernetics Systems) JURNAL SISTEM INFORMASI BISNIS Proceedings of KNASTIK Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Jurnal Informatika SPEKTRUM INDUSTRI Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Jurnal Teknik Elektro Bulletin of Electrical Engineering and Informatics Jurnal Teknologi Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) Jurnas Nasional Teknologi dan Sistem Informasi JURNAL PENGABDIAN KEPADA MASYARAKAT Jurnal Teknologi Elektro INFORMAL: Informatics Journal Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Bulletin of Electrical Engineering and Informatics JOIN (Jurnal Online Informatika) Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer JOIV : International Journal on Informatics Visualization Sinkron : Jurnal dan Penelitian Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research Jurnal Informatika Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT InComTech: Jurnal Telekomunikasi dan Komputer Insect (Informatics and Security) : Jurnal Teknik Informatika JURNAL REKAYASA TEKNOLOGI INFORMASI PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer Applied Information System and Management ILKOM Jurnal Ilmiah Compiler MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) JURTEKSI RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika Informatika : Jurnal Informatika, Manajemen dan Komputer Jurnal Ilmiah Mandala Education (JIME) Systemic: Information System and Informatics Journal EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Journal of Robotics and Control (JRC) Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Cyber Security dan Forensik Digital (CSFD) JTIULM (Jurnal Teknologi Informasi Universitas Lambung Mangkurat) International Journal of Advances in Data and Information Systems Edunesia : jurnal Ilmiah Pendidikan Journal of Innovation Information Technology and Application (JINITA) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Teknik Informatika (JUTIF) JURPIKAT (Jurnal Pengabdian Kepada Masyarakat) Humanism : Jurnal Pengabdian Masyarakat International Journal of Robotics and Control Systems J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Jurnal Pengabdian Informatika (JUPITA) Jurnal INFOTEL Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics Jurnal Karya untuk Masyarakat (JKuM) Control Systems and Optimization Letters Signal and Image Processing Letters Scientific Journal of Engineering Research SEMINAR TEKNOLOGI MAJALENGKA (STIMA) Edumaspul: Jurnal Pendidikan
Claim Missing Document
Check
Articles

KLASIFIKASI BOTOL PLASTIK MENGGUNAKAN MULTICLASS SUPPORT VECTOR MACHINE Arief Setyo Nugroho; Rusydi Umar; Abdul Fadlil
Jurnal Khatulistiwa Informatika Vol 9, No 2 (2021): Periode Desember 2021
Publisher : Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/jki.v9i2.11058

Abstract

Sampah botol plastik perlu dipilah berdasarkan mereknya untuk mengurangi polusi terutama botol plastik. Namun saat ini proses pemilahan tersebut masih dilakukan secara manual. Jika pemilahan dilakukan secara manual maka membutuhkan waktu yang lama, sehingga perlu dibuat cara agar pemilahan dapat dilakukan dengan bantuan teknologi. Teknologi pengolahan citra dapat mengklasifikasi beberapa merek botol plastik. Klasfikasi citra botol plastik dilakukan dengan menggunakan metode Multiclass Support Vector Machine (SVM) dengan kernel Radial Basis Function (RBF). Klasifikasi botol plastik lebih dari 1 kelas dapat menggunakan pendekatan One vs All. Kelas yang digunakan berjumlah 5 kelas berdasarkan merek botol plastik yang berbeda seperti Aqua, Coca-Cola, Fanta, Minute-Maid dan Sprite. Proses yang dilakukan meliputi Pre-procesing Ekstraksi Ciri, Training dan Testing model. Pre-processing dilakukan untuk menyiapkan citra sebelum proses Training dan Testing. Ekstraksi ciri untuk mengetahui ciri dari masing-masing kelas. Training dan Testing dilakukan dengan menggunakan 500 data citra yang dibagi menjadi 3 kombinasi data citra latih dan data citra uji. Data citra latih digunakan untuk Training model sedangkan data citra uji digunakan untuk Testing model. Kombinasi data citra latih dan data citra uji yang digunakan adalah 75% data citra latih dan 25% data citra uji, 50% data citra latih dan data citra uji, serta 25% data citra latih dan 75% data citra uji, sehingga menghasilkan 3 model yang berbeda. Hasil Testing klasifikasi dari 3 kombinasi data cita latih dan data citra uji menghasilkan prosentase keberhasilan berturut-turut sebesar 56%, 70%, dan 84%.
Ekstraksi Ciri Metode Gray Level Co-Occurrence Matrix Untuk Identifikasi Sel Darah Putih Anwar Siswanto; Abdul Fadlil; Anton Yudhana
JOINTECS (Journal of Information Technology and Computer Science) Vol 5, No 2 (2020)
Publisher : Universitas Widyagama Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31328/jointecs.v5i2.1334

Abstract

Dalam tubuh manusia terkandung darah, terdiri dari komponen selular dan non selular, salah satu komponen selular adalah sel darah putih. Darah didistribusikan melalui pembuluh darah dari jantung ke seluruh tubuh. Sistem ini berfungsi untuk memenuhi kebutuhan sel atau  jaringan akan nutrien dan oksigen serta mentranspor sisa metabolisme sel atau jaringan keluar dari tubuh. Sel darah putih merupakan salah satu indikator penegakan diagnosa.  Identifikasi  secara manual membutuhkan waktu yang lama dan cenderung subjektif tergantung dari pengalaman petugas. Penelitian ini bertujuan untuk membantu identifikasi sel darah putih secara otomatis sehingga didapatkan hasil yang cepat dan akurat. Eosinofil, Basofil, Neutrofil, Limfosit dan Monosit adalah sel darah yang diteliti. Penelitian ini menggunakan citra apus darah tepidengan pengecatan menggunakan My Grundwald dan mikroskop kamera okuler digital. Segmentasi citra berdasarkan ruang  warna Hue Saturation dan Value (HSV) dan ekstraksi ciri sel darah putih menggunakan metodeGray Level Co-occurrence Matrix (GLCM)  yaitu fiturAnguler Second Moment (ASM), Contrast, Inverse Different Moment (IDM), Entropy, Correlation. Pada proses pengujian di hasilkan nilai ekstraksi ciri GLCM dengan pola yang mirip. Dapat digunakan untuk indentifikasi sel darah putih.
Optimasi Keamanan Informasi Menggunakan Algoritma Advanced Encryption Standard (AES) Mode Chiper Block Chaining (CBC) Achmad Nugrahantoro; Abdul Fadlil; Imam Riadi
Jurnal Ilmiah FIFO Vol 12, No 1 (2020)
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/fifo.2020.v12i1.002

Abstract

Information comes from a collection of data obtained from various sources that have been processed. An information can help in decision making, so it is considered to have a high effectiveness value for the recipient of the information. Information exchange that utilizes public media internet services is widely used, so the validity of information must be done security from unauthorized attacks. One of them uses cryptography. AES is a method used by the National Institute of Standards and Technology (NIST) as a standard for the United States Federal encryption algorithm. Creativity in cryptographic modification can increase the strength of an attack. This study uses AES 128, 192, and 256 bit CBC mode algorithms by conducting trials at the level of encryption, decryption and the appearance of character frequencies. Encryption test results obtained an average speed of 128 bit blocks, namely 14.2 ms, 256 bits 13.2 ms and 192 bits 11.5 ms. While the decryption test results obtained an average speed of 128 bit blocks, namely 13.2 ms, 192 bits 14 ms and 256 bits 16.5 ms. The pattern of occurrence of the average frequency generated by 9%, by accepting symbols and numbers using this algorithm has little to solve by reading the characters display. The validation test produces a value of 100% where the functionality testing shows the expected results.Keyword: Security Information, AES, CBC, AES Mode CBC Abstrak Informasi berasal dari sekumpulan data yang didapatkan dari berbagai sumber yang telah diolah. Sebuah informasi bisa membantu dalam pengambilan keputusan, sehingga dianggap memiliki nilai efektivitas tinggi bagi penerima informasi. Pertukaran informasi yang memanfaatkan layanan publik media internet marak digunakan, maka keabsahan informasi harus dilakukan keamanan dari serangan pihak tidak berwenang. Salah satunya menggunakan kriptografi. AES adalah metode yang dimanfaatkan National Institute of Standards and Technology (NIST) sebagai standar algoritma enkripsi Federal Amerika Serikat. Kreativitas dalam modifikasi kriptografi bisa meningkatkan kekuatan dari serangan. Penelitian ini menggunakan algoritma AES 128, 192, dan 256 bit mode CBC dengan melakukan uji coba pengujian pada tingkat kecepatan proses enkripsi, dekripsi dan kemunculan frekuensi karakter. Hasil uji coba pengujian enkripsi didapatkan tingkat kecepatan rata-rata blok 128 bit yaitu 14,2 ms, 256 bit 13,2 ms dan 192 bit 11,5 ms. Sedangkan hasil uji coba dekripsi didapatkan tingkat kecepatan rata-rata blok 128 bit yaitu 13,2 ms, 192 bit 14 ms dan 256 bit 16,5 ms. Pola kemunculan frekuensi rata-rata dihasilkan 9%, dengan menerima simbol dan angka menunjukan algoritma ini memiliki kemungkinan kecil dapat dipecahkan melalui pembacaan kemunculan karakternya. Pengujian validasi menghasilkan nilai 100% dimana pengujian fungsionalitas menunjukkan hasil yang sesuai diharapkan. Kata Kunci: Keamanan Informasi, AES, CBC, AES Mode CBC
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics Abdul Fadlil; Imam Riadi; Sukma Aji
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (995.882 KB) | DOI: 10.11591/eei.v6i2.605

Abstract

Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and more costs mitigation to increase in this era. Attackers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
Review Proses Forensik Optical Drive Menggunakan Metode National Institute of Justice (NIJ) Imam Riadi; Abdul Fadlil; Muhammad Immawan Aulia
Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JUTISI Vol. 8, No. 3, Desember 2019
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (451.749 KB) | DOI: 10.35889/jutisi.v8i3.384

Abstract

Abstrak. Saat ini media penyimpanan telah banyak berubah, tidak hanya dalam bentuk yang lebih minimalis tetapi juga dalam jumlah kapasitas itu sendiri. Forensik digital saat ini merupakan bidang yang berkembang berdasarkan data pada penyimpanan media, dilakukan untuk berbagai keperluan seperti data yang diperoleh, kontaminasi data, kloning data, dan lainnya. Drive optik seperti CD dan DVD, termasuk media penyimpanan, digunakan untuk menyimpan data dalam bentuk file audio dan video. Dalam penelitian yang dilakukan pada drive optik khusus, CD-R / DVD dapat diperoleh melalui proses pencitraan untuk mendapatkan ruang yang tidak terisi yang berisi data yang sebelumnya diformat atau dihapus. Penelitian ini membahas proses pemulihan file yang telah diformat menggunakan alat Forensik Autopsi dalam proses pemeriksaan dan analisis. Pengambilan bukti digital pada objek penelitian dilakukan dengan metode forensik statis, sedangkan evaluasi dan analisis adaptor menggunakan metode forensik dari National Institute of Justice (NIJ) untuk mendapatkan bukti digital dari objek penelitian. Kata kunci: Bukti Digital, Forensik, National Institute of Justice, Optikal Drive Abstract. At present the storage media has changed a lot, not only in a more minimalist form but also in the amount of capacity itself. Digital forensics is currently a growing field based on data on media storage, carried out for various purposes such as data obtained, data contamination, data cloning, and others. Optical drives such as CDs and DVDs, including storage media, are used to store data in the form of audio and video files. In the research carried out on special optical drives, CDR / DVDs can be acquired through the imaging process to obtain unallocated space that contains data previously formatted or deleted. This research discusses the file recovery process that has been formatted using the Forensic tool Autopsy in the examination and analysis process. Retrieval of digital evidence on the object of research is done by static forensic methods, while the evaluation and analysis of adapters use the forensic method of the National Institute of Justice (NIJ) to obtain digital evidence from the object of research. Keywords: Digital Evidence, Forensic, National Institute of Justice, Optical Drive
Corn Flour Quality Identification System Based on Angle Image Dimas Murtia Atmojo; Abdul Fadlil
Buletin Ilmiah Sarjana Teknik Elektro Vol. 3 No. 2 (2021): Agustus
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v3i2.1490

Abstract

Corn can be processed into corn flour, this can make it easier for consumers to consume and process it into other food ingredients. Therefore we need a system that is able to identify the quality of corn flour automatically. Data retrieval is done by inserting corn flour into a container to calculate the angle of repose. The valve of the container is opened and the cornstarch flows into a mound above the cross-sectional base. The image of the corn flour mound was taken using a cellphone camera and stored in a laptop as a database. The sample of this research is corn flour with three types of particle sizes, namely 20 mesh, 10 mesh and 8 mesh. In the identification process, the corn flour image is converted into a grayscale and binary image and cropping is done, then identified based on the calculation of the angle of repose. The results of this study obtained that the average value of 20 mesh, 10 mesh and 8 mesh corn flour was 30.91 degrees; 33.96 degrees and 36.80 degrees. After testing and comparison, it can be concluded that corn flour with good quality is corn flour with an angle of less than 32 degrees.Jagung dapat diolah menjadi tepung jagung, hal ini dapat memudahkan konsumen dalam mengonsumsi dan mengolahnya menjadi bahan pangan lain. Oleh karena itu dibutuhkan sistem yang mampu mengidentifikasi kualitas tepung jagung secara otomatis. Pengambilan data dilakukan dengan memasukkan tepung jagung ke dalam wadah hitung sudut diam. Katup wadah dibuka dan tepung jagung mengalir membentuk gundukan di atas alas penampang. Citra dari gundukan tepung jagung diambil menggunakan kamera handphone dan disimpan ke dalam laptop sebagai database. Sampel penelitian ini tepung jagung dengan tiga jenis ukuran partikel, yaitu 20 mesh, 10 mesh dan 8 mesh. Dalam proses identifikasi citra terpung jagung dikonversikan menjadi citra greyscale dan biner serta dilakukan cropping, lalu diidentifikasi berdasarkan perhitungan sudut diam. Hasil penelitian yang dilakukan mendapatkan nilai rata-rata tepung jagung 20 mesh, 10 mesh dan 8 mesh berturut-turut adalah 30,91 derajat; 33,96 derajat dan 36,80derajat. Setelah dilakukan pengujian dan perbandingan, dapat disimpulkan bahwa tepung jagung dengan kualitas baik yaitu tepung jagung dengan sudut kurang dari sama dengan 32derajat.
Pepper Powder Quality Identification System Based on Silent Angle Imagery Muhaimin Gusrin; Abdul Fadlil
Buletin Ilmiah Sarjana Teknik Elektro Vol. 2 No. 1 (2020): April
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v2i1.1491

Abstract

This research identifies the quality of pepper powder using a computer automatically. The research method uses the stationary angle method. The design of this system is done by image processing techniques. The image of ground pepper that has been taken is then cropped to remove the unused portion of the image. The next step is to convert the original image into grayscale and then convert it to binary. The parameter of the stationary angle is when it has an angle of less than or equal to 38 °, the ground pepper includes fine ground pepper. If the angle ranges from 38o to 40o, including medium powdered pepper, and if the angle is greater than 41o, including the texture of coarse pepper powder. Testing 3 different types of samples obtained 40 mesh is 35.18 o; for 20 mesh is 40.46o and 10 mesh is 41.66o. Therefore, it can be seen that the smaller the texture of the size of ground pepper, the finer the quality.Penelitian ini mengidentifikasi kualitas lada bubuk menggunakan komputer secara otomatis. Metode penelitian menggunakan metode sudut diam. Perancangan sistem ini dilakukan dengan teknik pengolahan citra. Citra lada bubuk yang telah diambil selanjutnya di-cropping untuk menghilangkan bagian citra yang tidak terpakai. Langkah selanjutnya adalah citra hasil asli tersebut dikonversi dalam bentuk grayscale dan selanjutnya dikonversi dalam bentuk biner. Parameter sudut diam adalah ketika memiliki sudut kurang dari atau sama dengan 38o, lada bubuk tersebut termasuk lada bubuk yang halus. Jika sudutnya berkisar antara 38o sampai 40o maka termasuk lada bubuk sedang, dan jika sudutnya lebih besar dari 41o maka termasuk tekstur lada bubuk kasar. Pengujian 3 jenis sampel yang berbeda didapatkan 40 mesh adalah 35,18o; untuk 20 mesh adalah 40,46o dan 10 mesh adalah 41,66o. Oleh karena itu dapat diketahui bahwa semakin kecil tekstur ukuran lada bubuk, semakin halus kualitasnya.
Identification of Feasibility of Canned Based Foods Image Processing Techniques Using Thresholding Ilhamsyah Muhammad Nurdin; Abdul Fadlil
Buletin Ilmiah Sarjana Teknik Elektro Vol. 3 No. 1 (2021): April
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v3i1.1608

Abstract

Eye sight is sometimes deceptive, especially in determining the quality of a canned food, so it is necessary to use technology that resembles human visual observation, namely in the form of an application. The process to detect the quality of canned food uses image processing methods, especially thresholding, which is then designed so that the application is able to determine the quality of canned food with the help of the MATLAB GUI which detects and then sends it from making the MATLAB GUI on the Laptop to Android using FTP (File Transfer Protocol). At the end of the process, it is marked with known good and bad quality of canned food with an android application that has been specially designed with an accuracy level of 84% with a thresholding value of 70.
Humanoid Dancer Robot Movement Synchronization System with Zigbee Ponco Sukaswanto; Abdul Fadlil
Buletin Ilmiah Sarjana Teknik Elektro Vol. 2 No. 3 (2020): Desember
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v2i3.2695

Abstract

This research proposes a wireless communication between two dancer robots using zigbee to overcome the differences in movement between the robots in order to dance in harmony. The robotic music processor uses Audio Analyzer V2.0 which functions to get 7 frequency values for the music being played. The frequency will be processed by Arduino to determine the condition of the music on and off which will be sent to each robot via the XBee S2C module using the Zigbee method, namely with 1 master and 2 routers. The result is that the music processing system becomes more robust because it uses the Zigbee method. By using the Zigbee method, robot 1 and robot 2 can also communicate with each other because with this method, fellow routers can exchange data. The robot produced by this study can already distinguish the conditions when music is playing or muted, and between robot 1 and robot 2 can communicate with each other. Communication between robots functions so that when one of the robots is late in getting data, the other robots will wait until the late robot completes its movements so that robot 1 and robot 2 are back in sync.
Image Quality Analysis of PNG Images on WhatsApp Messenger Sending Fahmi Anwar; Abdul Fadlil; Imam Riadi
Telematika Vol 14, No 1: February (2021)
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/telematika.v14i1.1114

Abstract

Technology is growing rapidly, especially in communication with various types of information services such as internet-based messages. One of the most popular internet-based messages in Indonesia is WhatsApp Messenger. WhatsApp is a chat application that can be used on many platforms. Message sending on WhatsApp is carried out end-to-end encryption from the sender to the message recipient. The sending of messages in PNG images is secured using end-to-end encryption and compressed according to predefined rules. This study analyzes Image Compression and Alpha channel in PNG by comparing PNG images before being sent with PNG images that have gone through the sending process on WhatsApp using the test-driven development (TDD) method. The analysis results contain comparisons based on the RMSE, SSIM, PSNR, and MD5 hash values. Delivery with a gallery image attachment type using an image transparent background changes to a white image background. While those with a background other than transparent have good image quality because it has a PSNR value of more than 35 dB, and submissions with document attachment types do not experience changes in MD5 hash value and image quality.
Co-Authors Aang Anwarudin Abdul Azis Achmad Nugrahantoro Aditiya Dwi Candra Ahmat Taufik Aji Pamungkas Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Amiruddin, Nanda Fahmi Andrianto, Fiki Anggit Pamungkas Annisa, Putri Anton Yudhana Anwar Siswanto ANWAR, FAHMI Arief Setyo Nugroho Arief Setyo Nugroho Arif Budi Setianto Arif Budiman Arif Budiman Arif Wirawan Muhammad Aris Rakhmadi Asno Azzawagama Firdaus Atmojo, Dimas Murtia Aulia, Aulia Az-Zahra, Rifqi Rahmatika Aznar Abdillah, Muhamad Bagus Primantoro Basir, Azhar Candra, Aditiya Dwi Darajat, Muhammad Nashiruddin Davito Rasendriya Rizqullah Putra Dewi Soyusiawaty Dhimas Dwiki Sanjaya Dian Permata Sari Dianda Rifaldi Dikky Praseptian M Dimas Murtia Atmojo Doddy Teguh Yuwono Dwi Susanto Dwi Susanto Edy Fathurrozaq Egi Dio Bagus Sudewo Eko Prianto Eko Prianto Elvina, Ade Ermin Al Munawar Ermin Ermin Esthi Dyah Rikhiana Fahmi Anwar Fahmi Auliya Tsani Fahmi Auliya Tsani Fahmi Fachri Fanani, Galih Faqihuddin Al-anshori Faqihuddin Al-Anshori, Faqihuddin Fathurrahman, Haris Imam Karim Fauzi Hermawan Fiki Andrianto Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitri Muwardi Gusrin, Muhaimin Gustina, Sapriani Hafizh, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Harman, Rika Helmiyah, Siti Hendril Satrian Purnama Herdiyanto, Erik Herman Herman Herman Yuliansyah, Herman Herman, - Ibnu Rifajar Ibrahim Mohd Alsofyani Ihyak Ulumuddin Ikhsan hidayat Ilhamsyah Muhammad Nurdin Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Irjayana, Rizky Caesar Irwansyah Irwansyah Izzan Julda D.E Purwadi Putra januari audrey Jayawarsa, A.A. Ketut Jogo Samodro, Maulana Muhamammad Joko Supriyanto Joko Supriyanto Kamilah, Farhah Kartika Firdausy Khoirunnisa, Itsnaini Irvina Kusuma, Nur Makkie Perdana Laura Sari Lestari, Yuniarti Lestari, Yuniarti Lin, Yu-Hao Luh Putu Ratna Sundari M. Nasir Hafizh Maftukhah, Ainin Maulana Muhammad Jogo Samudro Mini, Ros Mohd Hatta Jopri Muammar Mudinillah, Adam Mufaddal Al Baqir Muh. Fadli Hasa Muhaimin Gusrin Muhajir Yunus Muhamad Daffa Al Fitra Muhamad Rosidin Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Johan Wahyudi Muhammad Kunta Biddinika Muhammad Nasir Hafizh Muhammad Nur Faiz Muhammad Nurdin, Ilhamsyah Muhammad Rizki Setyawan Muntiari, Novita Ranti Murinto Murinto - Murinto Murinto Murni Murni Musliman, Anwar Siswanto Mustofa Mustofa Muwardi, Fitri Nasution, Dewi Sahara Nasution, Musri Iskandar Nurwijayanti Pahlevi, Ryan Fitrian Ponco Sukaswanto Poni Wijayanti Prabowo, Basit Adhi Prayogi, Denis Priambodo, Bambang Putra, Fajar R. B Putri Annisa Putri Annisa Putri Purnamasari Putri Silmina, Esi Ramadhani, Muhammad Ramdhani, Rezki Razak, Farhan Radhiansyah Rezki Rezki Rifqi Rahmatika Az-Zahra Rizky Andhika Surya Rochmadi, Tri Roni Anggara Putra Rusydi Umar Rusydi Umar S Sunardi S, Sunardi Saad, Saleh Khalifah Safiq Rosad Saifudin Saifudin Saifullah, Shoffan Saleh khalifa saad Santi Purwaningrum Sarmini Sarmini Septa, Frandika Setyaputri, Khairina Eka Setyaputri, Khairina Eka Setyaputri, Khairina Eka Shinta Nur Desmia Sari Siti Helmiyah Subandi, Rio Sukaswanto, Ponco Sukma Aji Sulis Triyanto Sunardi Sunardi Sunardi Sunardi, Sunardi Surya Yeki Surya Yeki Syamsiar, Syamsiar Syarifudin, Arma Tole Sutikno Tresna Yudha Prawira Tresna Yudha Prawira Tri Ferga Prasetyo Tristanti, Novi Tuswanto Tuswanto Virdiana Sriviana Fatmawaty Wahju Tjahjo Saputro Wahyusari, Retno Winoto, Sakti Wintolo, Hero Wulandari, Cisi Fitri Yana Mulyana Yana Mulyana Yasidah Nur Istiqomah Yeki, Surya Yohanni Syahra Yossi Octavina Yulianto, Dinan Yulianto, Muhammad Anas Yuminah yuminah yuminah, Yuminah Yuminah, Yuminah Yuwono Fitri Widodo Zein, Wahid Alfaridsi Achmad Zulhijayanto -