p-Index From 2021 - 2026
18.036
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Indonesian Journal of Business Intelligence (IJUBI) Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia EDUTECH : Jurnal Inovasi Pendidikan Berbantuan Teknologi J-SAKTI (Jurnal Sains Komputer dan Informatika) Decode: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Scientific Journal of Informatics Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JOCHAC
Claim Missing Document
Check
Articles

PROGRAM PENINGKATAN PENGETAHUAN DAN KEAHLIAN GURU DAN SISWA SEKOLAH MENENGAH PERTAMA TERHADAP SEARCH ENGINE OPTIMIZATION Herman; Riadi, Imam; Chandra Kurniawan, Gusti; Adhi Prabowo, Basit
Jurnal Pengabdian Masyarakat Bumi Rafflesia Vol. 7 No. 2 (2024): Agustus : Jurnal Pengabdian Kepada Masyarakat Bumi Raflesia
Publisher : Universitas Muhammadiyah Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mahasiswa Magister Informatika Universitas Ahmad Dahlan melakukan Program Pemberdayaan Umat (PRODAMAT) dengan tema Search Engine Optimization (SEO) di Sekolah Menengah Pertama (SMP) Muhammadiyah 1 Berbah Sleman. Salah satu problem di dalam melakukan dakwah melalui dunia maya adalah konten tidak muncul di halaman pertama mesin pencari meskipun konten dibuat lebih dulu. PRODAMAT ini bertujuan untuk meningkatkan keahlian menulis judul dan konten menerapkan SEO sehingga memperbesar peluang konten muncul di halaman pertama mesin pencari. Pelatihan ini diikuti 17 guru, 10 siswa dan satu karyawan SMP Muhammadiyah 1 Berbah Sleman secara luring di laboratorium komputer sekolah. Pretest dilakukan sebelum melakukan pelatihan. Sesi pertama memberikan materi tentang faktor-faktor yang mempengaruhi indexing mesin pencari agar konten muncul di halaman pertama yang ditampilkan oleh mesin pencari berdasarkan kata kunci. Sesi pertama juga memberikan materi tentang cara menulis konten dengan template yang menerapkan SEO. Sesi kedua mempraktikkan pembuatan template yang menerapkan SEO dan menulis konten menggunakan template yang sudah dibuat. Posttest dilakukan setelah pelatihan usai. Hasil tes pretest dan post test menunjukkan bahwa nilai persentase guru meningkat 26%, persentase siswa meningkat 31% dan persentase karyawan meningkat 45%. Secara keseluruhan, nilai persentase meningkat 28%. Hasil ini mengindikasikan adanya peningkatan yang signifikan dalam pengetahuan wawasan dan soft skill tentang penerapan SEO tanpa menggunakan tools SEO.Kata Kunci: SEO, Template, Konten
Improved Breadth First Search For Public Transit Line Search Optimization Kartoirono, Suprihatin; Riadi, Imam; Furizal, Furizal; Azhari, Ahmad
Mobile and Forensics Vol. 5 No. 1 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i1.7906

Abstract

People in general find it difficult to determine the transportation route, because to get to one destination there are many alternative paths that must be passed. This study aims to model the search for alternative bus route routes that are faster to produce routes that must be passed. The method used in this study is Improved Breadth first search by modifying BFS so that its performance is improved in producing route search completion. The improved BFS method is basically the same as BFS doing a level-by-level search stop if a false finish point is found. As the experiment above with a starting point of 175 and an end point of 54 the BFS algorithm takes 27 seconds 564 milliseconds, while the Improve BFS algorithm takes 171 milliseconds. The results showed that improved BFS can improve the performance of the BFS method. Research can be a model to be applied to other optimal route finding cases.
Prediksi Kelulusan Tepat Waktu Berdasarkan Riwayat Akademik Menggunakan Metode K-Nearest Neighbor Riadi, Imam; Umar, Rusydi; Anggara, Rio
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 11 No 2: April 2024
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.20241127330

Abstract

Lulus tepat waktu adalah pencapaian paripurna ingin dicapai oleh semua mahasiswa atau calon mahasiswa. Kelulusan memiliki 2 klasifikasi seperti lulus tidak tepat waktu dan lulus tepat waktu. Kelulusan menjadi suatu penilaian akreditasi universitas dan penilaian oleh masyarakat secara luas. Perguruan tinggi meluluskan mahasiswa-mahasiwa dengan beberapa kriteria standar yang harus dimiliki. Diharapkan mahasiswa lulus memenuhi syarat standar kelulusan dalam waktu maksimal 4 tahun masa studi. Evaluasi dan pemantauan kelulusan sangat penting dilakukan, salah satunya dengan mempelajari data history mahasiswa yang telah lulus sebagai upaya mahasiswa lulus tidak melebihi waktu standar yang telah ditetapkan. Prediksi kelulusan yang dilakukan pada riset menggunakan kaidah klasifikasi K-Nearest Neighbor dengan objek penelitian yaitu mahasiswa. Atribut yang dipakai dalam penelitian metode klasifikasi yaitu nama, asal SMA/SMK, wilayah asal SMA/SMK, nilai rata-rata matematika dan lama studi. Tahapan penelitian diawali dengan pengumpulan data, pemilihan atribut, pembersihan data, transformasi data, pemilihan data testing dan data training. Pengujian akurasi yang didapatkan pada penelitian metode klasifikasi dengan klaster data k=1, k=2, k=3, k=4, k=5, k=6 dan k=7 menghasilkan klaster dengan nilai k=3 paling tinggi. Hasil pengujian akurasi prediksi penelitian menggunakan confusion matrix menghasilkan akurasi paling besar sesuai target yaitu mencapai 78% menggunakan objek penelitian sebanyak 93 data mahasiswa terdiri dari 78 training dan 12 data testing. Hasil pengujian point k=1 sampai point k=7, k=3 merupakan nilai akurasi prediksi yang paling tinggi sehingga hasil penelitian menjadi sumber pengetahuan untuk fakultas dalam prediksi kelulusan mahasiswa.AbstractGraduating on time is a plenary achievement to be achieved by all students or prospective students. Graduation has 2 classifications such as graduating not on time and graduating on time. Graduation becomes an assessment of university accreditation and an assessment by the wider community. Universities graduate students with several standard criteria that must be possessed. It is expected that graduating students meet the graduation standard requirements within a maximum of 4 years of study period. Evaluation and monitoring of graduation is very important to do, one of which is by studying the history data of students who have graduated as an effort for students to graduate not to exceed the standard time that has been set. The graduation predictions carried out in research use the K-Nearest Neighbor classification rules with the research object being students. The attributes used in the research classification method are name, high school/vocational high school origin, high school/vocational high school origin, average grade in mathematics and length of study. The research phase begins with data collection, attribute selection, data cleaning, data transformation, selection of testing data and training data. The accuracy test obtained in the classification method research with data clusters k = 1, k = 2, k = 3, k = 4, k = 5, k = 6 and k = 7 produces a cluster with the highest k = 3 value. The results of testing the accuracy of research predictions using the confusion matrix produced the greatest accuracy according to the target, reaching 78% using a research object of 93 student data consisting of 78 training and 12 testing data. The test results point k=1 to point k=7, k=3 is the highest prediction accuracy value so that the research results become a source of knowledge for the faculty in predicting student graduation.
A Classification Data Packets Using the Threshold Method for Detection of DDoS Sukma Aji; Davito Rasendriya Rizqullah Putra; Imam Riadi; Abdul Fadlil; Muhammad Nur Faiz; Arif Wirawan Muhammad; Santi Purwaningrum; Laura Sari
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 1 (2024): JINITA, June 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i1.2224

Abstract

Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack. This type of attack, when performed against a target by many computers, is called a distributed denial of service (DDoS) attack. Technology and the Internet are growing rapidly, so many DDoS attack applications result in these attacks still being a serious threat. This research aims to apply the Threshold method in detecting DDoS attacks. The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.
Comparative Analysis of Keypoint Detection Performance in SIFT Implementations on Small-Scale Image Datasets Arif Rahman; Suprihatin; Imam Riadi; Tawar; Furizal
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 2 (2024): JINITA, December 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i2.2399

Abstract

Scale-invariant feature transform (SIFT) is widely used as an image local feature extraction method because of its invariance to rotation, scale, and illumination change. SIFT has been implemented in different program libraries. However, studies that analyze the performance of SIFT implementations have not been conducted. This study examines the keypoint extraction of three well-known SIFT libraries, i.e., David Lowe's implementation, OpenSIFT, and vlSIFT in vlfeat. Performance analysis was conducted on multiclass small-scale image datasets to capture the sensitivity of keypoint detection. Although libraries are based on the same algorithm, their performance differs slightly. Regarding execution time and the average number of keypoints detected in each image, vlSIFT outperforms David Lowe’s library and OpenSIFT.
Pemanfaatan Teknologi Cloud Storage Pada Layanan Penyimpanan Pembelajaran Online Zein, Wahid Alfaridsi Achmad; Maulana, Irvan; Riadi, Imam; Biddinika, Muhammad Kunta
Jurnal Pengabdian Masyarakat Indonesia Vol 4 No 5 (2024): JPMI - Oktober 2024
Publisher : CV Infinite Corporation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jpmi.2698

Abstract

Program pengabdian masyarakat di SMK Al Hikmah 1 Benda Sirampog ini bertujuan untuk meningkatkan pemahaman dan keterampilan siswa serta guru dalam memanfaatkan teknologi cloud storage, seperti Google Drive dan OneDrive, guna mendukung kegiatan belajar mengajar di jurusan Desain Komunikasi Visual (DKV). Dengan metode survey awal, identifikasi masalah, pelatihan dan workshop, serta evaluasi, program ini berhasil mengatasi keterbatasan dalam manajemen file dan penyimpanan data yang sebelumnya dihadapi. Hasil pelatihan menunjukkan bahwa lebih dari 85% peserta merasa lebih nyaman dan terbantu dengan penggunaan cloud storage, yang membuat pekerjaan mereka lebih terorganisir dan mudah diakses. Penggunaan cloud storage juga berhasil diintegrasikan dalam kegiatan belajar mengajar, meningkatkan efisiensi dan efektivitas pembelajaran, serta mempersiapkan siswa untuk menghadapi dunia kerja yang semakin digital. Program ini diharapkan dapat menjadi contoh bagi sekolah-sekolah lain dalam mengadopsi teknologi digital untuk mendukung proses pendidikan.
Forensic Analysis of the WhatsApp Application Using the National Institute of Justice Framework Mubarok Nahdli, Muhammad Fahmi; Riadi, Imam; Biddinika, Muhammad Kunta
International Journal of Advances in Data and Information Systems Vol. 5 No. 2 (2024): October 2024 - International Journal of Advances in Data and Information System
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59395/ijadis.v5i2.1328

Abstract

The advancement of communication media has rapidly evolved with the emergence of various communication applications on smartphones, which have now surpassed mere communication functions to become complex social media platforms. This change has transformed the way we interact, not only through messages and voice but also through the exchange of videos and images. However, along with these developments, there has been a surge in digital crimes such as defamation, fraud, and drug trafficking. This investigation aims to compare the performance of forensic tools in obtaining digital evidence by utilizing applications like Mobiledit, Belkasoft, Mobile Forensic SPF, and Magnet Axiom, and by applying the National Institute of Justice framework, which consists of five stages: identification, collection, examination, analysis, and reporting. The output of the investigation is presented through reports and evidence, resulting in text chat files, contacts, images, audio, and view-once images. Forensic tools have a 100% success rate in finding pieces of evidence. The comparison of the four tools showed different percentages: Mobiledit Forensic 40%, Magnet Axiom 80%, Belkasoft 60%, and Mobile Forensic SPF 60% in obtaining evidence. Digital evidence can be used as strong support in court proceedings.
Peningkatan Cyber Security Awareness Melalui Pelatihan Edukatif Kepada Siswa Sekolah Menengah Kejuruan Habie, Khairul Fathan; Putro, Aldibangun Pidekso; Yuliansyah, Herman; Riadi, Imam
Mohuyula : Jurnal Pengabdian Kepada Masyarakat Vol 3, No 2 (2024): Desember
Publisher : Universitas Muhammadiyah Gorontalo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31314/mohuyula.3.2.46-53.2024

Abstract

Perkembangan teknologi informasi dan komunikasi telah mengalami pertumbuhan yang sangat pesat. Era digital membawa banyak kemudahan dan keuntungan, mulai dari akses informasi yang cepat, komunikasi yang efisien, hingga kemudahan layanan online yang mempermudah kehidupan sehari-hari. Sejalan dengan hal tersebut era digital juga menghadirkan tantangan baru dalam hal keamanan informasi atau cyber security. Keamanan informasi menjadi semakin krusial dengan meningkatnya penggunaan teknologi digital, membuat individu, organisasi, dan institusi rentan terhadap ancaman siber seperti peretasan, pencurian data, malware, dan serangan phishing.  Oleh karena itu, diperlukan pelatihan dengan tujuan untuk meningkatkan kesadaran dan pemahaman siswa SMK 1 Sedayu, tentang pentingnya kesadaran dan pemahaman cyber security.  Kegiatan program pemberdayaan umat (PRODAMAT) meliputi tahap persiapan, pelaksanaan, dan evaluasi. Kegiatan PRODAMAT dilakukan dengan metode ceramah dan diskusi tanya jawab. Peningkatan pemahaman siswa diukur dengan rangkaian pre-test dan post-test. Hasil yang diperoleh dari program pemberdayaan umat menunjukkan bahwa adanya peningkatan pemahaman pada indikator kesadaran “Sangat Paham” meningkat dari 31% menjadi 52%.
Mobile Device Security Evaluation using Reverse TCP Method Riadi, Imam; Sunardi; Aprilliansyah, Deco
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 7, No. 3, August 2022
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v7i3.1433

Abstract

Security evaluation on Android devices is critical so that users of the operating system are protected from malware attacks such as remote access trojans that can steal users' credential data. Remote access trojan (RAT) attacks can be anticipated by detecting vulnerabilities in applications and systems. This study simulates a remote access trojan attack by exploiting it until the Attacker gains full access to the victim's device. The episode is carried out with several steps: creating a payload, installing applications to the victim's device, connecting listeners, and performing exploits to retrieve important information on the victim's device. Test material using Android 12, problems occurred when trying to install the application because a harmful warning will appear from Play Protect due to not using the latest version of privacy protection which causes the application to be indicated as malware and the like. On Android 11, the application injected with the backdoor was successfully installed on the device and successfully accessed by the attacker. Attackers also get vital information, including system information, contacts, call logs, messages, and full access to the victim's device system directory. Based on this research, it is expected that Android device users constantly update the Android version on the device they are using.
Integration of Fuzzy C-Means and SAW Methods on Education Fee Assistance Recipients Fadlil, Abdul; Riadi, Imam; Mulyana, Yana
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 2, May 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i2.1636

Abstract

Every year, UMTAS gets a quota for KIP tuition fee assistance provided by KEMDIKBUD. This program is intended for high school / vocational/equivalent graduates from poor and vulnerable families. The evaluation results of its implementation have problems, including the number of applicants exceeding the quota given by KEMDIKBUD and some applicants coming from well-off families. This research uses the fuzzy c-means method for data clustering and the SAW method for ranking. The results of data grouping using the fuzzy c-means method obtained the first cluster (C1) of 72 data and the second cluster (C2) of 119 data. Group C1 is closer to the provisions of aid recipients (eligible) compared to data group C2 (ineligible) because Data C1 consists of 100% DTKS recipients, 50% KIP and KKS card owners, 100% parental income <750,000, 40.28% parental dependents >=2 people and 29.17% applicants with achievements. 72 registrant data included in Data C1 are then ranked using the SAW technique to get weights, and 30 data with the highest weight will be used as a decision on recipients of KIP-Kuliah Education fee assistance according to the quota provided. The optimization of Fuzzy C-Means with SAW methods in selecting recipients of education fee assistance is objective and right on target.
Co-Authors ., Andi Zulherry Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Nugrahantoro Achmad Syauqi Ade Davy Wiranata Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Apriliani, Evinda Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Asruddin, Asruddin Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bahagiya, Multika Untung Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Davito Rasendriya Rizqullah Putra Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Ediansa, Oka Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fadlil , Abdul Fahmi Anwar Fahmi Auliya Tsani Faiz , Muhammad Nur Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Faulinda Ely Nastiti Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fithriatus Shalihah Fitri, Fitriyani Tella Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Harman, Rika Haryanto, Eri Helmiyah, Siti Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhram, Ridho Ikhsan Zuhriyanto Ikhwan Anshori Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Handoyo Joko Triyanto Kariyamin, Kariyamin Kartoirono, Suprihatin Kurniawan, Endang Kurniawan, Gusti Chandra Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Muchlas Muchlas Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murinto Murinto Murni Murni Murti, Raden Hario Wahyu Musa, Shahrulniza Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Faiz, Muhammad Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Nurmi Hidayasari Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi, Rizal Prambudi Prasetyaningrum, Putri Taqwa Prasongko, Riski Yudhi Purwaningrum, Santi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Raden Mohamad Herdian Bhakti Rafiq, Irhash Ainur Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Robiin, Bambang Rochmadi, Tri Roni Anggara Putra Rudy Ansari, Rudy Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Safiq Rosad Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Sari, Laura Shiha Budin Sismadi, Wawan Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sudinugraha, Tri Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - sunardi sunardi Sunardi Sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Supriyanto Suryanto, Farid Syaefudin, Rizal Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Triyanto, Joko Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wahyusari, Retno Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro Widiandana, Panggah WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad