p-Index From 2021 - 2026
18.036
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Indonesian Journal of Business Intelligence (IJUBI) Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia EDUTECH : Jurnal Inovasi Pendidikan Berbantuan Teknologi J-SAKTI (Jurnal Sains Komputer dan Informatika) Decode: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Scientific Journal of Informatics Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JOCHAC
Claim Missing Document
Check
Articles

Determining Eligible Villages for Mobile Services using K-NN Algorithm Anton Yudhana; Imam Riadi; M Rosyidi Djou
ILKOM Jurnal Ilmiah Vol 15, No 1 (2023)
Publisher : Prodi Teknik Informatika FIK Universitas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v15i1.1546.11-20

Abstract

To maximize and get population document services closer to the community, the Disdukcapil district of Alor provides mobile services by visiting people in remote villages which difficult-to-reach service centres in the city. Due to a large number of villages and limited time and costs, not all villages can be served, so the kNN algorithm is needed to determine which villages are eligible to be served. The criteria used in this determination are village distance, difficulty level, and document ownership (Birth Certificate, KIA, family card, and KTPel). The classes that will be determined are "Very eligible", "Eligible", and "Not eligible". By applying Z-Score normalization with the value of K=5, the classification gets 94.12% accuracy, while non-normalized only gets 88.24% accuracy. Thus, applying normalization to training data can improve the kNN algorithm's accuracy in determining eligible villages for "ball pick-up" or mobile services.
Analisis Keamanan Sistem Informasi Akademik Berbasis Web Menggunakan Framework ISSAF Rusydi Umar; Imam Riadi; Muhammad Ihya Aulia Elfatiha
Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Vol 12, No 1: April 2023
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35889/jutisi.v12i1.1191

Abstract

Utilization of Information Technology (IT) has now become a primary requirement in improving organizational performance in achieving goals. The Muhammadiyah Bekasi Business Institute (IBM Bekasi) in this case has utilized IT in its operational processes known as the Academic Information System which has been integrated with student and lecturer portals. The facilities provided by the system include academic modules, staffing, billing, e-filling and reporting. In this case study, the research aims to analyze system security using the Penetration Testing method using the ISSAF (Information System Security Assessment Framework) to measure system security with specific details at each stage carried out on an academic information system owned by the Muhammadiyah Bekasi Business Institute. As a result of the analysis carried out, it was found that the system is considered less secure from Brute-force Attacks, CSRF Attacks (Cross-Site Request Forgery), Session Hijacking through Cookies, and Insecure Direct Object References (IDOR).Keywords: ISSAF; Penetration Testing; Academic Information System. AbstrakPemanfaatan Teknologi Informasi (Information Technology/ IT) saat ini telah menjadi kebutuhan primer dalam meningkatkan kinerja organisasi dalam mencapai tujuan. Institut Bisnis Muhammadiyah Bekasi (IBM Bekasi) dalam hal ini telah memanfaatkan IT dalam proses-proses operasionalnya yang dikenal dengan Sistem Informasi Akademik yang telah terintegrasi dengan portal mahasiswa dan dosen. Fasilitas yang disuguhkan sistem meliputi modul akademik, kepegawaian, billing, e-filling hingga pelaporan. Dalam studi kasus ini, penelitian dituju untuk menganalisa keamanan sistem dengan metode Penetration Testing menggunakan ISSAF (Information System Security Assesment Framework) untuk mengukur keamanan sistem dengan rincian yang spesifik pada setiap tahapan yang dilakukan terhadap sistem informasi akademik yang dimiliki Institut Bisnis Muhammadiyah Bekasi menggunakan. Hasil analisa yang yang dilakukan, didapatkan temuan bahwa sistem dipandang kurang aman terhadap Brute-force Attack, CSRF Attack (Cross-Site Request Forgery), Session Hijacking menggunakan Cookies, dan Insecure Direct Object References (IDOR).
Analisis Keamanan Website Menggunakan Information System Security Asessment Framework(ISSAF) Herman Herman; Imam Riadi; Yudi Kurniawan; Irhas Ainur Rafiq
Jurnal Teknologi Informatika dan Komputer Vol 9, No 1 (2023): Jurnal Teknologi Informatika dan Komputer
Publisher : Universitas Mohammad Husni Thamrin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37012/jtik.v9i1.1439

Abstract

Di zaman ini internet sudah menjadi kebutuhan ini, begitu banyak hal yang dapat dilakukan dengan Internet. Mulai dari mendapatkan informasi, belajar, berbelanja, dan yang lainnya Melalui website, website adalah web yang berada di dalam web server. Tetapi banyak pengguna atau pemilik website kurang mengetahui tentang pentingnya keamanan dari sebuah website. Misalnya yang berkatian dengan kerentanan terhadap malware maupun terhadap SQL Injection. Kerentanan bisa disebabkan oleh berbagai macam, salah satu yang penting adalah di bagian coding website tersebut, sehingga menyebabkan backdoor yang dapat di eksploitasi oleh penyerang. Analisis kerentanan keamanan sebuah website sangat diperlukan. Pada paper ini penulis memaparkan sebuah proses analisis kerentatan website menggunakan metode ISSAF Information Systems Security Assessment Framework. Dalam melakukan assessment digunakan beberapa tools untuk mencari hingga menganalisis kerentanan sebuah website seperti WhoIsDomain, Subgraph Vega, dan Nmap Sehingga pengguna atau pemilik website mengetahui bagaimana kerentanan terhadap website tersebut. Hasil analisis ini menyimpulkan bahwa website yang di uji masih memiliki beberapa kerentanan seperti XSS, SQL Injection, CSRF Token not set, dan yang lainnya. Hasil akurasi  yang  di dapatkan menggunakan subgraph vega adalah sebesar 100% untuk kerentanan  Cross  Site Scrpting, dan 77% untuk SQL Injection.
Comparison of Forensic Tools on Social Media Services Using the Digital Forensic Research Workshop Method (DFRWS) Ghufron Zaida Muflih; Sunardi Sunardi; Imam Riadi; Anton Yudhana; Himawan I Azmi
JIKO (Jurnal Informatika dan Komputer) Vol 6, No 1 (2023)
Publisher : JIKO (Jurnal Informatika dan Komputer)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v6i1.5872

Abstract

Social media applications currently play a role and become part of various human activities, on the other hand social media is also very vulnerable to various crimes. Some crimes on social media can be in the form of hate speech, defamation, fraud, gambling, pornography, and other harmful actions. This research applies the Digital Forensic Research Workshop (DFRWS) method to search for all data on twitter social media services running on the Android operating system using MOBILedit Forensic Express and Belkasoft Evidence Center tools. Twitter social media services in this research are used for activities by utilizing all the features in it. Activities carried out by twitter users become evidence that will be acquired using MOBILedit Forensic Express and Belkasoft Evidence Center tools. From the two tools used, a comparison was obtained that MOBILedit Forensic Express found more data on twitter social media than Belkasoft Evidence Center, the findings in these two tools made several contributions to social media investigations that run on the android operating system
Analisis Forensik Cyberbullying pada Aplikasi IMO Messenger Menggunakan Metode Association of Chief Police Officers Imam Riadi; Sunardi Sunardi; Yana Safitri
Jurnal Bumigora Information Technology (BITe) Vol 5 No 1 (2023)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v5i1.2977

Abstract

The development of computer technology is increasing very rapidly. This has both positive and negative impacts. One of the negative impact is committing acts of cyberbullying. This study uses the ACPO method to investigate the cyberbullying crimes through evidence that will be found. The ACPO method in the Imo Messenger investigation has four stages, namely Plan, Capture, Analysis, and Present. Digital data in the form of 16 conversation text, 29 user ID, 6 deleted data, and a group used as parameters in the research process. The test was performed using the tool of MOBILEdit Forensic Express. The results based on the digital data obtained 100% of conversation text, user ID, and group, while 0% for deleted data.
Deteksi Serangan DDoS Menggunakan Neural Network dengan Fungsi Fixed Moving Average Window Arif Wirawan Muhammad; Imam Riadi; Sunardi Sunardi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 1 No. 3 (2017): Januari 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (275.298 KB) | DOI: 10.14421/jiska.2017.13-03

Abstract

Distributed denial-of-service (DDoS) merupakan jenis serangan dengan volume, intensitas, dan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi. Penelitian ini memiliki tujuan untuk mengembangkan sebuah pendekatan baru untuk mendeteksi serangan DDoS, berdasarkan pada karakteristik aktivitas jaringan menggunakan neural network dengan fungsi fixed moving average window (FMAW) sebagai metode deteksi. Data pelatihan dan pengujian diambil dari CAIDA DDoS Attack 2007 dan simulasi mandiri. Pengujian terhadap metode neural network dengan fungsi fixed moving average window (FMAW) menghasilkan prosentase rata-rata pengenalan terhadap tiga kondisi jaringan (normal, slow DDoS, Dan DDoS) sebesar 90,52%. Adanya pendekatan baru dalam mendeteksi serangan DDoS, diharapkan bisa menjadi sebuah komplemen terhadap sistem IDS dalam meramalkan terjadinya serangan DDoS.
PERANCANGAN KLASIFIKASI PASIEN STROKE DENGAN METODE K-NEAREST NEIGHBOR Rahmat Ardila Dwi Yulianto; Imam Riadi; Rusydi Umar
Rabit : Jurnal Teknologi dan Sistem Informasi Univrab Vol 8 No 2 (2023): Juli
Publisher : LPPM Universitas Abdurrab

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36341/rabit.v8i2.3454

Abstract

Stroke is a disease characterized by impaired brain function caused by a lack of oxygen supply and blood flow to the brain, affecting several brain functions that make sufferers experience difficulty in carrying out activities. the classification of stroke patients found is still in the form of medical records that have not been integrated so it takes longer time to detect. The K-NN algorithm is part of a machine learning algorithm that can be used to classify one of the cases, namely the classification of stroke patients. K-NN is used as a class determining algorithm to enter new data that is input according to the format. Based on the results obtained, this study leads to system design using the Unified Model Language (UML) and system user interface design.
Identifying Hate Speech in Tweets with Sentiment Analysis on Indonesian Twitter Utilizing Support Vector Machine Algorithm Imam Riadi; Abdul Fadlil; Murni Murni
Khazanah Informatika Vol. 9 No. 2 October 2023
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v9i2.22470

Abstract

Twitter had 24 million users in Indonesia at the beginning of 2023. Despite having fewer users than other platforms, its fast and instant nature makes Twitter a significant source of information dissemination. Tweets shared on Twitter offer various advantages. However, it also has negative consequences, including the dissemination of fake news, instances of cyberbullying, and the expression of hate speech. Specifically, hate speech employs offensive language to discriminate against an individual or group based on race, ethnicity, nationality, religion, gender, sexual orientation, or other personal attributes, leading to discord. Such behavior comes under the jurisdiction of various legal statutes, including the Constitution, the Criminal Code, and the ITE Law. The primary objective of this research is to categorize tweets shared on Twitter into hate speech and non-hate speech sentiments, utilizing a Support Vector Machine (SVM) algorithm based on a dataset of 5,000 tweets. This research involved data preprocessing, labeling, feature extraction using TF-IDF, model training (80%), and testing (20%). The final stage includes enhancing SVM parameters through GridSearch and cross-validation methods (GridSearchCV), followed by analysis using a Confusion Matrix with the Matplotlib Library. Radial Basis Function (RBF) kernels, defined by parameters C=10 and gamma=0.1, exhibited the highest performance among SVM models, boasting an 84% accuracy. The RBF kernel also attained 85% precision, 97% recall, and a 91% F1-score for hate speech identification. In conclusion, the evaluation of SVM kernel performance highlights the superiority of RBF kernels in achieving the highest accuracy, complemented by nuanced insights into hate speech precision, recall, and F1-score values across various kernel types.
Review Article : Investigasi Forensik Email dengan Berbagai Pendekatan dan Tools Imam Riadi; Rusydi Umar; Mustafa Mustafa
Jurnal Informatika: Jurnal Pengembangan IT Vol 4, No 2 (2019): JPIT, Mei 2019
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v4i2.1134

Abstract

Computer forensic science is a relatively new science and not even widely known among the public. Unlike the real world, crime in the world of computers and the internet has so many variations, one of which is forgery or spam email, where spam e-mail can be a means of transporting malicious content on a network. The problem that arises at this time is that very little research is conducted in the case of forensic investigations in the face of crime in the cyber world, especially in the spam e-mail. The method used is observation of literature, in this case in the form of original articles that analyze about crimes that use email, including the flow and tools used. The results obtained in this article review are that each investigation and tools approach has advantages and disadvantages of each, so that users can adjust to their needs.
Forensik Jaringan Terhadap Serangan DDOS Menggunakan Metode Network Forensic Development Life Cycle Raden Hario Wahyu Murti; Imam Riadi; Nuril Anwar; Taufiq Ismail
Jurnal Sarjana Teknik Informatika Vol 11, No 3 (2023): Oktober
Publisher : Program Studi Informatika, Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jstie.v11i3.26544

Abstract

Teknologi informasi dan komunikasi merupakan elemen penting dalam kehidupan masa kini yang telah menjadi bagian bagi berbagai sektor kehidupan dan memberi andil besar terhadap perubahan yang mendasar. Sekelompok orang atau organisasi yang tidak bertanggung jawab dapat menggunakan internet untuk mengganggu atau merusak suatu website sehingga menyebabkan overload pada router dan membuat website tidak dapat diakses. Metode penyerangan ini disebut dengan DDoS (Distributed Denial of Service). Tujuan penelitian ini adalah mengidentifikasi keamanan jaringan pada router dan mendapatkan karakteristik barang bukti digital pada router untuk keperluan forensik. Penelitian ini menggunakan metode Network Forensic Development Life Cycle (NFDLC) yang memiliki pada lima tahapan utama yaitu Initiation, Acquisition, Implemetation, Operations, dan Disposation. Tools yang digunakan pada penelitian adalah menggunakan Wireshark yang bertugas monitoring serangan DDoS terhadap serangan router dan melakukan investigasi untuk mendapatkan barang bukti digital berupa hasil serangan yang masuk ke servertrak. Hasil temuan barang bukti digital yang didapat pada monitoring ubuntu server tercatat menerima 84.407 paket pada serangan pertama dengan IP Address 10.10.1.2 dan menerima 359.510 paket pada serangan kedua dengan Ip Address 10.10.1.4 dan hasil monitoring windows server tercatat menerima 2.305.835 paket pada serangan pertama dengan IP Address 10.10.1.2 dan menerima 94.120 paket pada serangan kedua dengan Ip Address 10.10.1.4. 
Co-Authors ., Andi Zulherry Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Nugrahantoro Achmad Syauqi Ade Davy Wiranata Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Apriliani, Evinda Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Asruddin, Asruddin Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bahagiya, Multika Untung Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Davito Rasendriya Rizqullah Putra Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Ediansa, Oka Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fadlil , Abdul Fahmi Anwar Fahmi Auliya Tsani Faiz , Muhammad Nur Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Faulinda Ely Nastiti Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fithriatus Shalihah Fitri, Fitriyani Tella Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Harman, Rika Haryanto, Eri Helmiyah, Siti Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhram, Ridho Ikhsan Zuhriyanto Ikhwan Anshori Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Handoyo Joko Triyanto Kariyamin, Kariyamin Kartoirono, Suprihatin Kurniawan, Endang Kurniawan, Gusti Chandra Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Muchlas Muchlas Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murinto Murinto Murni Murni Murti, Raden Hario Wahyu Musa, Shahrulniza Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Faiz, Muhammad Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Nurmi Hidayasari Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi, Rizal Prambudi Prasetyaningrum, Putri Taqwa Prasongko, Riski Yudhi Purwaningrum, Santi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Raden Mohamad Herdian Bhakti Rafiq, Irhash Ainur Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Robiin, Bambang Rochmadi, Tri Roni Anggara Putra Rudy Ansari, Rudy Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Safiq Rosad Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Sari, Laura Shiha Budin Sismadi, Wawan Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sudinugraha, Tri Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Supriyanto Suryanto, Farid Syaefudin, Rizal Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Triyanto, Joko Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wahyusari, Retno Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro Widiandana, Panggah WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad