p-Index From 2021 - 2026
24.907
P-Index
This Author published in this journals
All Journal Teknika Jupiter Explore: Jurnal Sistem Informasi dan Telematika (Telekomunikasi, Multimedia dan Informatika) JUITA : Jurnal Informatika Sinkron : Jurnal dan Penelitian Teknik Informatika SemanTIK : Teknik Informasi QALAMUNA: Jurnal Pendidikan, Sosial, dan Agama SISFOTENIKA Swabumi (Suara Wawasan Sukabumi) : Ilmu Komputer, Manajemen, dan Sosial JURNAL MEDIA INFORMATIKA BUDIDARMA Informatics for Educators and Professional : Journal of Informatics SELAPARANG: Jurnal Pengabdian Masyarakat Berkemajuan Jurnal Persada Husada Indonesia INTECOMS: Journal of Information Technology and Computer Science JSiI (Jurnal Sistem Informasi) JURNAL PENDIDIKAN TAMBUSAI Journal on Education Informasi Interaktif Progresif: Jurnal Ilmiah Komputer Jusikom: Jurnal Sistem Informasi Ilmu Komputer TEKNOKOM : Jurnal Teknologi dan Rekayasa Sistem Komputer Jurnal Pendidikan dan Konseling Jurnal Ilmiah Betrik : Besemah Teknologi Informasi dan Komputer Jurnal Sistem informasi dan informatika (SIMIKA) Journal of Applied Engineering and Technological Science (JAETS) Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Jurnal Teknik Elektro dan Komputasi (ELKOM) JATI (Jurnal Mahasiswa Teknik Informatika) INFORMASI (Jurnal Informatika dan Sistem Informasi) JTIK (Jurnal Teknik Informatika Kaputama) Jurnal Sistem Komputer & Kecerdasan Buatan Jurnal Sistem Komputer dan Informatika (JSON) Jurnal Pengabdian Masyarakat Khatulistiwa Just TI (Jurnal Sains Terapan Teknologi Informasi) TIN: TERAPAN INFORMATIKA NUSANTARA Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal Teknologi Informasi dan Komunikasi Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Pengabdian Nasional (JPN) Indonesia SENADA : Semangat Nasional Dalam MengabdI Jurnal Cahaya Mandalika Jurnal Informatika dan Teknologi Komputer ( J-ICOM) Jurnal Indonesia : Manajemen Informatika dan Komunikasi Jurnal Sosial dan Teknologi Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD Jurnal Tika Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) JUTECH : Journal Education and Technology Jurnal Widya AJAD : Jurnal Pengabdian kepada Masyarakat Jurnal Pendidikan Sains dan Komputer International Journal Software Engineering and Computer Science (IJSECS) Jurnal Informatika Teknologi dan Sains (Jinteks) Malcom: Indonesian Journal of Machine Learning and Computer Science DEVOTE: Jurnal Pengabdian Masyarakat Global Cross-border CKI On Spot SmartComp SENADA : Semangat Nasional Dalam Mengabdi Jurnal Indonesia : Manajemen Informatika dan Komunikasi Jurnal Pengabdian Nasional (JPN) Indonesia Journal Innovations Computer Science Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi Informasi interaktif : jurnal informatika dan teknologi informasi
Claim Missing Document
Check
Articles

Support Vector Machine and Histogram of Oriented Gradients-Based Classification System for Waste Type Identification Notonegoro, Danendra Satriyohadi; Mulyana, Dadang Iskandar
Journal Innovations Computer Science Vol. 4 No. 2 (2025): November
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jics.v4i2.315

Abstract

This study examines the effectiveness of classical computer vision methods for modern waste classification by combining Histogram of Oriented Gradients (HOG) for feature extraction with Support Vector Machine (SVM) for classification. The TrashNet dataset, consisting of five categories—cardboard, glass, metal, paper, and plastic—was used as the primary benchmark. To address data limitations and improve generalization, augmentation techniques such as random rotations, horizontal flipping, and brightness adjustments were applied. Hyperparameter optimization was further conducted using GridSearchCV with the RBF kernel to determine the most effective configuration. The optimized model achieved an accuracy of 84.36%, representing a substantial improvement from the 60% baseline. These findings confirm that non-deep learning approaches remain relevant and can serve as computationally efficient alternatives to CNNs, which typically require GPUs and extensive training time. Challenges persist in classifying reflective materials such as glass and metal, where HOG descriptors are less effective. Future work should integrate complementary descriptors, including color and texture-based features, to enhance robustness and scalability. Overall, the study demonstrates that an optimized HOG-SVM pipeline offers a practical, resource-efficient solution for automated waste classification, with strong potential to support sustainable waste management in real-world applications.
Optimisasi Penjadwalan Kegiatan Guru pada SMK IDN Boarding School Jonggol dengan Penerapan Algoritma Genetika Nuradi, Fahmi; Tundo, Tundo; Mulyana, Dadang Iskandar; Lestari, Sri
TEKNOKOM Vol. 7 No. 2 (2024): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/teknokom.v7i2.223

Abstract

This document describes guidelines for Authors in writing an article in JIMIK. This abstract section should Activity scheduling is a crucial aspect of educational management, especially in school environments with many activities and limited resources. At IDN Boarding School Vocational School, the challenges in scheduling teacher activities become increasingly complex as the number of subjects, extracurricular activities and limited resources such as space and time increase. Manual scheduling methods using spreadsheets such as Microsoft Excel take a long time and are prone to human error. This research proposes the application of a Genetic Algorithm to optimize the scheduling of teacher activities at the IDN Boarding School Vocational School. The Genetic Algorithm was chosen because of its ability to find optimal solutions through selection, crossover and mutation processes. This algorithm is able to handle various constraints in scheduling, both hard constraints (constraints that must be obeyed) and soft constraints (constraints that are desired but not mandatory). The aim of this research is to develop an automatic scheduling system that can reduce delays and the risk of errors in preparing schedules, adjust schedules quickly when sudden changes occur, and distribute teacher workload more evenly. The research results show that the application of a Genetic Algorithm can produce a more efficient and effective schedule compared to manual methods, by minimizing schedule conflicts, optimizing space use, and ensuring a more balanced distribution of teacher workload. This research not only provides a solution to scheduling problems at the IDN Boarding School Vocational School, but can also be adapted and applied to other educational institutions. Thus, this research makes a real contribution to improving the quality of educational management and teaching and learning processes in Indonesia.
Optimization of Data Security Protection with Full SSL Inspection on AWS Using FortiGate Virtual Appliance Akbar, Yuma; Abdillah, Gipari Pradina; Mulyana, Dadang Iskandar; Sutisna, Sutisna
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 2 (2025): AUGUST 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i2.5153

Abstract

The expanding adoption of cloud services, particularly Amazon Web Services (AWS), has intensified challenges in protecting encrypted data traffic within network security frameworks. SSL/TLS protocols, widely utilized for data encryption, have become exploitation vectors for cyber adversaries as conventional security solutions lack the capability to scrutinize encrypted traffic effectively. The research addresses such security gaps by implementing Full SSL Inspection through Fortigate Virtual Appliance deployment within AWS cloud environments. The study examines cloud-based network architecture integrated with Fortigate systems, employing methodologies that encompass virtual appliance installation, SSL/TLS inspection feature configuration, and assessment of system effectiveness alongside performance impact evaluation. Research instruments include simulated cyber-attack scenarios targeting encrypted traffic patterns. Findings demonstrate that Full SSL Inspection significantly enhances threat detection capabilities within network traffic, albeit with measurable increases in system latency and computational overhead. The implementation of Fortigate Virtual Appliance proves effective in strengthening AWS data security postures. Research outcomes emphasize the necessity for configuration optimization to maintain security-performance equilibrium, positioning the solution as viable for organizations prioritizing data protection strategies
Support Vector Machine and Histogram of Oriented Gradients-Based Classification System for Waste Type Identification Notonegoro, Danendra Satriyohadi; Mulyana, Dadang Iskandar
Journal Innovations Computer Science Vol. 4 No. 2 (2025): November
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jics.v4i2.315

Abstract

This study examines the effectiveness of classical computer vision methods for modern waste classification by combining Histogram of Oriented Gradients (HOG) for feature extraction with Support Vector Machine (SVM) for classification. The TrashNet dataset, consisting of five categories—cardboard, glass, metal, paper, and plastic—was used as the primary benchmark. To address data limitations and improve generalization, augmentation techniques such as random rotations, horizontal flipping, and brightness adjustments were applied. Hyperparameter optimization was further conducted using GridSearchCV with the RBF kernel to determine the most effective configuration. The optimized model achieved an accuracy of 84.36%, representing a substantial improvement from the 60% baseline. These findings confirm that non-deep learning approaches remain relevant and can serve as computationally efficient alternatives to CNNs, which typically require GPUs and extensive training time. Challenges persist in classifying reflective materials such as glass and metal, where HOG descriptors are less effective. Future work should integrate complementary descriptors, including color and texture-based features, to enhance robustness and scalability. Overall, the study demonstrates that an optimized HOG-SVM pipeline offers a practical, resource-efficient solution for automated waste classification, with strong potential to support sustainable waste management in real-world applications.
Real-Time Face Recognition System with Enhanced Security Using Cryptographic Hash-Based Encrypted Embedding Matching Zaidan, Rodhi Shafia; Kastum; Mulyana, Dadang Iskandar
Journal Innovations Computer Science Vol. 4 No. 2 (2025): November
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jics.v4i2.322

Abstract

This study presents the development and evaluation of a secure and efficient real-time face recognition system for school attendance, integrating cancelable biometrics with cryptographic hashing. A total of 115 face samples were collected from students and teachers under diverse lighting, pose, and expression conditions. Images were pre-processed using Contrast Limited Adaptive Histogram Equalization (CLAHE) and Gamma Correction, followed by feature extraction with ResNet-128D, key-based random projection, binarization into 128-bit templates, and SHA-256 hashing. Evaluation results demonstrated an accuracy of 86.09%, precision of 100%, recall of 86.09%, and F1-score of 92.52%, with an average latency of 281.71 ms, remaining well below the operational threshold of 500 ms. Offline pre-processing improved the F1-Score by 7.50% on large datasets and 7.28% on smaller datasets without sacrificing processing speed. From a security perspective, the system achieved zero false acceptances (FAR = 0%) and allowed template regeneration when compromised, reinforcing privacy preservation. These findings validate the feasibility of combining cancelable biometrics with cryptographic hashing to balance accuracy, speed, and security in practical attendance systems. The research underscores its broader applicability to access control and public security, while future work should emphasize adaptive pre-processing, diverse hardware validation, and hardware acceleration for robust real-time deployment.
Optimization of Text Mining Detection of Tajweed Reading Laws Using the Yolov8 Method on the Qur'an Mulyana, Dadang Iskandar; Rowis, Muhammad Arfan Irsyad
QALAMUNA: Jurnal Pendidikan, Sosial, dan Agama Vol. 14 No. 2 (2022): Qalamuna - Jurnal Pendidikan, Sosial, dan Agama
Publisher : Lembaga Penerbitan dan Publikasi Ilmiah Program Pascasarjana IAI Sunan Giri Ponorogo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37680/qalamuna.v14i2.3866

Abstract

The science of tajweed is a science that studies how to read the letters or readings in the Qur'an beautifully or well by the legal rules regulated therein. However, many people still do not pay attention to the legal rules of tajweed when reading the Qur'an, so it is not uncommon for them to make mistakes in pronunciation. From the legal rules of Tajweed reading, the slightest difference will change the meaning and intended meaning of the reading. So, paying attention to every rule of the law of reading Tajweed is very important. Therefore, considering the current technological advances, we plan a tajweed detection design using the YOLO algorithm optimized for the Qur'an. This study aims to determine and analyze the detection of text mining on tajweed reading. The method used in this study is the YOLO Algorithm method. This research uses 210 images of the Mushaf Al-Qur'an dataset, tested twice using Augmentation and Non-Augmentation to get optimal research results. The dataset underwent a training process of 138 images, or about 66%, and a validation process of 48 images, about 28%, and 24 images, or 11% of the total sample. Of the two tests using augmentation with no augmentation, augmentation testing produces the highest precision value with a value of 0.985 or 98.5% and the highest mAP50 with a value of 0995 or 99.5% for the Lafdzul Jalalah class group, with a total accuracy value of 92.94%. For testing without augmentation, the results show that the highest mAP50 value is the Lafdzul Jalalah class, with a value of 0.974 or 97.40% and an accuracy value of 91.37%. Based on optimization and comparison carried out for the accuracy value of research with augmentation of 92.94% and research conducted without augmentation is 91.37%. So, the study's results obtained an increased value of 1.57% by performing greyscale augmentation.
PENERAPAN FACE RECOGNITION DENGAN ALGORITMA HAAR CASCADE UNTUK SISTEM ABSENSI PADA YAYASAN PUSAT PENGEMBANGAN ANAK JAKARTA Iskandar Mulyana, Dadang; Ayu Saputry, Yulia Yanti; Ramadan, Anggi; Saragih, Silvanus
Jurnal Cahaya Mandalika ISSN 2721-4796 (online) Vol. 3 No. 3 (2022)
Publisher : Institut Penelitian Dan Pengambangan Mandalika Indonesia (IP2MI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36312/jcm.v3i3.1284

Abstract

Penelitian ini dilakukan bertujuan untuk memudahkan melakukan absensi dengan cara mendeteksi wajah dari para karyawan. Permasalahan yang dihadapi yaitu pada yayasan pusat pengembangan anak jakarta yaitu terlalu sering kehilangan data absensi yang diakibatkan oleh terselipnya kertas maupun data absensi secara manual, banyaknya kekeliruan data-data absensi yang manual dengan tulis tangan. Metode yang dipilih yaitu deteksi wajah menggunakan algoritma haar cascade, memilih untuk menggunakan algoritma ini. Karena penulis berharap dengan adanya sistem pendeteksian wajah yang digunakan dalam absensi akan dapat membuat inovasi baru ataupun dapat memberikan informasi dan wawasan yang baru tentang menggunakan deteksi wajah untuk data kehadiran dan penulis berharap bisa lebih mudah untuk menggunakan absensi deteksi wajah menggunakan metode algoritma haar cascade dari pada menggunakan metode yang lain. Untuk hasil absensi menggunakan metode haar cascade ini menghasilkan tingkat keakurasiannya 80%-89% dalam mendeteksi wajah untuk absensi.
OPTIMALISASI KEAMANAN FIREWALL PADA INFRASTRUKTUR JARINGAN SMK IDN BOGOR Yel, Mesra Betty; Mulyana, Dadang Iskandar; F, Joe Renaldy; Nurfaishal, Muhammad Dzaky; B, Muhamad Hasbi Toharudin
Jurnal Cahaya Mandalika ISSN 2721-4796 (online) Vol. 4 No. 1 (2023)
Publisher : Institut Penelitian Dan Pengambangan Mandalika Indonesia (IP2MI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36312/jcm.v4i1.1393

Abstract

IDN Bogor Vocational High School, which was established in 2016, is known as one of the many schools that are involved in the academic, religious and IT-focused world, as its vision is "Wonder of IT Smart of Praying". Given the large number of IT activities both in terms of learning and administratively office data collection (Administration), of course the application of a Firewall on the network is one of the crucial things needed to facilitate the security and authenticity of data from teachers and students. The purpose of preparing this KKP report is none other than to help optimize Firewall configurations, both on Firewall devices and PCs/Laptops along with counseling strategies as preventive measures to avoid physical/social engineering hacking at SMK IDN Bogor. As we all know, cybersecurity issues cannot be taken lightly. Therefore, for the sake of the continuity and smooth running of school education activities, Optimization/Standardization of all segments or parts that use the network within SMK IDN Bogor is required.
Implementasi Monitoring Suhu dan Kelembapan Kumbung jamur pada Budidaya Jamur Tiram dengan NodeMCU - ESP8266 di Desa Wirasana Purbalingga: Implementation of Temperature and Humidity Monitoring in Mushroom House for Oyster Mushroom Cultivation Using NodeMCU – ESP8266 in Wirasana Village Purbalingga Hudhoifah, Maula Abi; Mulyana, Dadang Iskandar
MALCOM: Indonesian Journal of Machine Learning and Computer Science Vol. 4 No. 2 (2024): MALCOM April 2024
Publisher : Institut Riset dan Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57152/malcom.v4i2.1222

Abstract

Budidaya jamur tiram di Desa Wirasana, Purbalingga, dihadapkan pada tantangan kritis terkait pemantauan suhu dan kelembapan yang sangat berpengaruh pada pertumbuhan optimal. Penelitian ini menjelajahi penerapan Internet of Things (IoT) dengan NodeMCU ESP8266 untuk memonitor budidaya jamur tiram. Solusi ini melibatkan serangkaian perangkat, termasuk sensor DHT22, sensor ultrasonik, relay 2 channel untuk mengatur humidifier dan kipas, serta tambahan sensor HCSR yang bertujuan memantau air penyimpanan. Data suhu dan kelembapan dikirimkan ke database, memungkinkan pemantauan real-time melalui aplikasi Smartphone. Metode prototyping diterapkan untuk memastikan desain sistem yang responsif. Hasil pengujian menunjukkan akurasi tinggi sensor DHT22 dengan suhu 96.5% dan kelembapan 86.7%, meskipun pengiriman data NodeMCU mengalami 4 kegagalan dari 100 percobaan ini masih tergolong cukup baik. Otomatisasi humidifier dan kipas berjalan lancar, sementara aplikasi Android mencapai keberhasilan 100% dalam memonitor kondisi kumbung jamur. Kesimpulan penelitian ini menyoroti keakuratan sensor DHT22 dan menekankan perlunya evaluasi lebih lanjut terhadap keandalan pengiriman data NodeMCU. Fungsi otomatisasi dan interaksi dengan aplikasi Android membuktikan kehandalan system dalam mengelola kondisi budidaya jamur tiram secara optimal.
Optimasi Keamanan Jaringan Wifi dari Situs Judi Online dan Pornografi dengan DNS Filtering dan Orangepi: Network Security Optimization Against Online Gambling and Pornography Sites Using DNS Filtering and Orangepi Mulyana, Dadang Iskandar; Ardiyansyah, Ferry; Hidayat, Nurhikmah; Zulfikar, Ahmad
MALCOM: Indonesian Journal of Machine Learning and Computer Science Vol. 4 No. 2 (2024): MALCOM April 2024
Publisher : Institut Riset dan Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57152/malcom.v4i2.1274

Abstract

Di era digital ini, penggunaan internet telah menjadi kebutuhan pokok. Meskipun internet memberikan manfaat yang besar, penggunaannya seringkali disalahgunakan, terutama terkait dengan akses ke situs dewasa dan judi online. Selain itu, keamanan jaringan juga menjadi perhatian penting mengingat adanya potensi kejahatan digital, seperti pencurian data dan penyebaran malware yang dapat merugikan pengguna. Oleh karena itu, penulis melakukan penelitian dengan menerapkan metode DNS filtering sebagai solusi. Penelitian ini bertujuan untuk membatasi akses situs-situs yang memiliki konten negatif dan yang tidak diperbolehkan oleh agama maupun secara hukum negara. Dalam mewujudkan internet positif ini peneliti melakukan penelitian sistem DNS filtering yang diterapkan pada jaringan WIFI Balaiwarga RW 32 Bekasi Utara. Kinerja dari dari metode DNS filtering adalah dengan melakukan filtering pada lalu lintas jaringan dan jika ditemukan akses ke website yang tidak diperbolehkan maka sistem melakukan pembatasan website tersebut. Hasil penilitian berjalan dengan baik dapat melakukan pembatasan akses internet, dalam rentan waktu tanggal 24-31 Desember ditemukan log yang ter-blokir yaitu sebanyak 10.102 Log Ads, 65 Log situs judi online, dan 16 Log situs dewasa. Maka disimpulkan bahwa optimasi keamanan jaringan ini efektif melakukan pembatasan aktivitas masyarakat dalam mengakses internet dengan memblokir konten negatif termasuk pornografi, dan situs perjudian online.
Co-Authors Abdillah, Gipari Pradina Abdul Hafidz Abdul Shomad Abyan, Muhammad Abdul Aziz Adawiyah, Rizky Adi Riswan Agung Pratama Agung Pratama Agung Rizki Zamzami Agung Saputra Agus Sigit Sumarsono Ahmad Bustomi Zuhari Ahmad Bustomi Zuhari Ahmad Bustomi Zuhri Ahmad Saepudin Ahmad Saepudin Ahmad Zulfikar Aidil Rizki Hidayat Aimar, Muqorrobin Aji Aji Dwi Prasetyo Aji Suswantoro Akbar, Yuma Akbarulloh, Feri Akhsani, Ziyat Akmal, Roid Adip Akmaludin Akmaludin Al Ammar, Muhammad Farros Al Faruq, Abdullah Alannuari, Fiky Albahy, Abdurrahman A. Aldi Sitohang Alfiani Damaiyanti AlfianiDamaiyanti Ali Akbar Ali Akbar Ali Muhammad Faadhil Ali Yafi Zulkarnain Alifah, Rifdah Aloisius Awang Hariman Amat Solihin Andi Anto Diarjo Andriyana Fajar Andy Manuel Prima Angga Tristhanaya Anggit Purnama Anggraeni, Eka Anisah Wulandari Apian Candra Aditya Ardana, Tegar Rizky Ardiyansyah, Ferry Ari Ramadhan Ari Surya Jaya Ari Surya Jaya Aribatullah Arief, Yoga Sofyan Arinal, Veri Aris Sufriman Arisenja, Ni Luh Bumi Arpinda Arpinda Asep Maulana Asep Ovid Afidin Asep Ovid Afidin Aswad, Hazrul Asyrofie, Maulana Azhar Atik Budi Paryanti Awaludin Awaludin Ayu Saputry, Yulia Yanti Aziz Septian Amrullah Aziz Septian Amrullah Aziz, Naufal Azzahra, Salma Latifa B, Muhamad Hasbi Toharudin Banase, Samuel Figo Bashir, Ade Abdul Bela Dina Betty Yel, Mesra Bintoro, Bayu C.Afif Firas Cahyana, Adella Fitriany Calvin Bill Roring Candra Milad Ridha Eislam Choirul Huda Debby Ramadhina Salsabilla Dedi Gunawan Dedi Iskandar Dedi Iskandar Deny Saputra Dewi Riyanti Wibowo Dewi Riyanti Wibowo Dheo Hanif Pristian Dhiva Andini Putri Alinur Diana Barsasella Dita Yuliana Donaldo, Evan Dwi Lestari Edi Edi Eka Anggraeni Eka Maheswara Eka Okta Putri Sulaiman Eka Okta Putri Sulaiman Eka Putri Aprillia Eka Satria Maheswara Eka Satria Maheswara Ependi, Soleh Erno Sumantri F, Joe Renaldy Fadhil Khanifan Achmad Fadhil, Ali Muhammad Fadillah, Fauzan Fadlan, Muhammad Fahmi Nurul Huda Faisal Akbar Faisal Akbar Faizal Joko Perwitosari Farida Indah Riantini Fatchur Rochman Fatonah FauzI Ramdhani Feni Citra Dewi Fernanda Adhipramana Ferry Fajar Pratama FikriYadi FikriYadi Fiktor Kurnia Tofano Firhan Ali Fransiscus Rolanda Malau Fransiscus Rolanda Malau Genisa, Lenggo Ghofurur Nawangsah Gilang Ramadhan Gusniar Alfian Noor Gusniar Alfian Noor Handrianus Saldu Herdiyansyah Hartanto Herdiyansyah herdi Hartanto Hermawan Susanto Hidayat, Aditya Zakaria Hidayat, Nurhikmah Hudhoifah, Maula Abi Hudzaifah, Salim Maula Ikha Novie Tri Lestari Ikha Novie Tri Lestari Ikhsan Ikhsan Ikhwanul Kurnia Rahman Ilham Wahyudi Imam Khoeri Imantara, Alaqsha Gilang Indah Rosmalina Irbah Baihaqi Irbah Baihaqi Irfan Maulana Irfan Maulana, Irfan Istianah Istianah Istianah Jaya, Rudi Tri Jodi Juliansah Joharuddin Zakaria, M Ohan Julinar Sari Hutagalung Kastum Kastum, Kastum Kemal Adnan Khanif, Abror Kolbia, Ummi Kurniawan Irfan Nauval Lerry Salasi Saptan Lintang Purnama Lintang Purnama Lorinda, Destiar Lubis, Yunita T Lutfianti, Nesti M Ainur Rofik M Ainur Rofik M Ilham Setya Aji M Ohan Joharuddin Zakaria M. Ohan Zakaria Mafazi, Luthfillah Maharanisa Maharanisa Maharanisa, Maharanisa Mainia Mayasari Marjuki Marjuki Marjuki Maulana Putra Hertaryawan, Ryfan Melani Afsari Miftahul Huda Miftahul Ulum Milli Ruswandi Mirsandi Muhamad Fikri Nugraha Muhamad Ikbal Muhamad Zaeni Nadip Muhammad Adri Ramadhan Muhammad Arfan Irsyad Rowis Muhammad Arfan Irsyad Rowis Muhammad Azhari Muhammad Dzaky Rahmanto Muhammad Dzaky Rahmanto Muhammad Faizal Lazuardi Muhammad Faizal Lazuardi Muhammad Fakhri Pratama Muhammad Furqan Muhammad Jauhar Ruliansyah Muhammad Khalid Muhammad Rizki Muhammad Syahrul Fattah Ramadhan Muhammad Zaenuddin Muhammad Zikri Muhammad Zikri Muklas Adik Putra Muklas Adik Putra Mutia Ramadhan Naini Saadah Naini Sa’adah Nana NANA NANA Nandy Dinilhaq Nesti Lutfianti Nimas Galuh Pramuditasari Notonegoro, Danendra Satriyohadi Noviyanti, Irma Nugroho, Kurniawan Setyo Nunung Parawati Nuradi, Fahmi Nurfaishal, Muhammad Dzaky Nurrohman, Awaludin Taufiq Oka Prasetiyo Okta Saputra Oky Tria Saputra Paramida, Feti Paryanti, Atik Budi Pramansah, Vika Vitaloka Pramuditasari, Nimas Galuh Pratama, Ferry Fajar Pratiwi, Tiyas Aria Pristian, Dheo Hanif Putra, Guruh Taruno Putra, Mohammad Royger Febriansyah Putra, Reyga Ferdiansyah Putri Amira Sumitro Putri Nugraheni Utami Putri, Atsilah Daini Putro, Faris Widianto Radikto, Radikto Raga Permana Rahmani, Husain Rahmanto, Muhammad Dzaky Raihan Putra M Rosidi Ramadan, Anggi Ramadhan, Muhammad Adri Rasiban Reyga Ferdiansyah Putra Reza Gustrianda Reza Wanandi Richard Franido Richardviki Beay Richardviki Beay Rifky Aldiansyah Riki Maulana Fauzi Riko Afriandika Riswan, Adi Rival, Muhammad Riza Hidayat, Riza Rizky Adawiyah Rofik, M Ainur Roring, Calvin Bill Rowis, Muhammad Arfan Irsyad Runi Amanda Amalia Sadid, Muhammad Arib Umar Sadid, Muhammad Umar Arib sahroni Sahroni Sahrul Hidayat Saifullah Ahmad Yasin Santi Ferawati Saputra, Mochammed Erryandra Saputri, Rosalina Saragih, Silvanus Sarimole, Frencis Matheos Sartika Mala Seli Amelia Senika, Anis Sentosa, Edwin Septiani, Novi Setiawan, Itca Bagus Setya Putra Adenugraha Shakila Shila Wati Silfia, Titi Siregar, Ikhsan Abror Siregar, Mora Hakim Siregar, Muhammad Hafiz Siti Nurhaliza Siti Raysyah Slamet Riyadi Sodik Sofia, Agiah Soleh Ependi Sony Agustian Syah SOPAN ADRIANTO Sri Lestari Sri Lestari SRI LESTARI Stefany Tarunajaya Stepanus, Stepanus Sugeng Sugeng Sugeng Sugeng Sugiyono Sugiyono Sumantri, Dyan Bagus Sumantri, Erno Sumarsono, Agus Sigit Sutisna Sutisna Sutisna Sutisna Sutisna Suwandi Syatria, Muhammad Rifqi Tarunajaya, Stefany Titi Silfia Tofano, Fiktor Kurnia Tri Wahyuni Tundo, Tundo Untung Wahyudi Vara Maulidyah Hidayah Vika Vitaloka Pramansah Wahyu Hidayat Wahyu Saputro Wahyu Saputro Wahyudi, Ahmad Arif Wicaksono, Bima Wieko Wieko Wulandari, Anisah Yacob, Galih Satria Yansen Yansen YkhSanur YkhSanur Yoni Maulana Yuliana Bachtiar Yunita T Lubis Yusril Nurhadi AS Zaidan, Rodhi Shafia Zaky Rahman Hakim Zamzami, Agung Rizki Zidane, Ahmad Syahran Zoharuddin Zakaria, M Ohan