p-Index From 2021 - 2026
18.036
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Indonesian Journal of Business Intelligence (IJUBI) Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia EDUTECH : Jurnal Inovasi Pendidikan Berbantuan Teknologi J-SAKTI (Jurnal Sains Komputer dan Informatika) Decode: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Scientific Journal of Informatics Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JOCHAC
Claim Missing Document
Check
Articles

Public Opinion Analysis of Presidential Candidate Using Naïve Bayes Method Firdaus, Asno Azzawagama; Yudhana, Anton; Riadi, Imam
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 2, May 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i2.1686

Abstract

Elections for president and vice president will take place in 2024. Heading into the election, promoted candidates were vying for public sympathy. People often discussed as presidential candidates are Anies Baswedan, Ganjar Pranowo, and Prabowo Subianto. Therefore, we need a way to predict potential candidates and voter demographics from public opinion on Twitter using sentiment analysis. One of his methods commonly used to classify sentiment analysis is Naive Bayes. This study used the naive Bayes classifier and the TF-IDF extraction function to add weights to the text. Use the scikit-learn Python library to help determine the polarity of negative and positive sentiment classes in your dataset. The datasets used were Twitter datasets acquired from October to December 2022, for a total of 15,000 datasets. The best test scenario obtained by splitting the test and training data is 70% test data and 30% training data, with the highest accuracy generated from the 95% Ganjar dataset. Using the Anies, Ganjar, and Prabowo test data, the positive mood scores for each candidate were 833, 77, and 524, respectively, while the negative mood scores were 637, 1423, and 976, respectively. The test was performed using a confusion matrix and k-fold cross-validation, and the best results were obtained on the Ganjar data set. That is a confusion matrix of 94.93% and a k-fold cross-validation of 94.46%. The lowest f1-score for the positive class is 67% for the Anies dataset and 27% for the negative class for the Ganjar dataset.
BGP Dynamic Routing Protocol: A QoS Analysis for TCP and UDP Miswar, Nur; Herman; Riadi, Imam
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 1, February 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i1.1852

Abstract

The Border Gateway Protocol (BGP) is commonly used for TCP and UDP services, but it poses challenges in terms of Quality of Service (QoS) analysis. Parameters like throughput, packet loss, delay, and jitter are crucial for assessing network service quality. This study aims to analyze the performance and influence of the BGP routing protocol on TCP and UDP services using QoS parameters. The research used a GNS3 network simulation to conduct multiple packet transmission tests for TCP and UDP protocols, lasting 15, 30, and 60 seconds; and monitored using Wireshark. For TCP services, the average QoS index value is 3.75, categorizing the quality as "Good". The tested network topology and routing configuration exhibit reliable performance, providing good throughput, low packet loss rates, minimal delays, and stable jitter. Similarly, UDP services demonstrate “Good” performance with an average QoS index of 3.75. The BGP routing protocol in the tested network topology ensures high-quality service with good delivery speed, low packet loss rate, minimal delay, and stable jitter. Overall, the study concludes that the BGP routing protocol effectively provides satisfactory QoS for TCP and UDP services. This research contributes to understanding network performance and optimizing routing protocols for improved telecommunications services. The findings highlight the significance of routing protocols in facilitating efficient data transmission on the Internet, reinforcing the importance of QoS analysis for enhancing service quality.
Security Analysis of Web-based Academic Information System using OWASP Framework Rusydi Umar; Imam Riadi; Elfatiha, Muhammad Ihya Aulia
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2015

Abstract

The Academic Information System plays a crucial role in efficiently managing student, faculty, and campus administration data. However, system security needs to be a primary concern as it is vulnerable to cyber attacks. This research aims to analyze the security of the Academic Information System at the Muhammadiyah Business Institute Bekasi. The research method used is a comprehensive security analysis based on the OWASP framework. The study includes identifying potential vulnerabilities, penetration testing, and system improvement recommendations. Testing is conducted through simulated attacks based on the OWASP-released security risk list (OWASP Top Ten Most Critical Web Application Security Risks). The analysis results indicate that the system is vulnerable to Broken Authentication due to weak passwords, Sensitive Data Exposure due to URLs pointing to direct directories, and Security Misconfiguration due to open protocols. Furthermore, in CVSS scoring, Broken Authentication scored 4.8 (Medium), Sensitive Data Exposure and Security Misconfiguration scored 5.3 (Medium), Cross-Site Scripting scored 2.0 (Low) and Using Component with Known Vulnerabilities scored 2.0 (Low), while SQL Injection, XXE, Broken Access Control, Insecure Deserialization, and Insufficient Logging and Monitoring scored 0.0 (No Vulnerability). Recommendations for future system improvements include regularly updating the system to prevent new security vulnerabilities, better server configurations, and routine system monitoring to promptly anticipate suspicious activities.
Enterprise Architecture Planning Sistem Informasi Akademik Dengan TOGAF ADM Basir, Azhar; Fadlil, Abdul; Riadi, Imam
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 3, No 1 (2019): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.713 KB) | DOI: 10.30645/j-sakti.v3i1.91

Abstract

The role of information technology greatly influences the improvement of a higher education governance, so that universities today should have models and standards that can be implemented as a reference in enhancing harmony between business strategies and information technology. Enterprise Architecture planning (EAP) is one of the methodologies that can be applied in planning information architecture, the stages in EAP consist of data architecture, application architecture, technology architecture and how the design that has been made can be implemented to support business activities, to achieve the organization's mission.
Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST) Syahib, Muhammad Irwan; Riadi, Imam; Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1078.548 KB) | DOI: 10.30645/j-sakti.v4i1.196

Abstract

The rapid development of mobile technology today is directly proportional to the development of mobile applications in it. Making it easier for people to choose and use the application as they want. This has resulted in misuse of negative things, ranging from human trafficking, drug trafficking, as well as online prostitution business. Viber is an Instant Messenger application that makes it easy for users. This application can be used to send messages, call, send photos, audio and video to others. This application has been used by 260 million people worldwide. This is the basis of research to acquire digital evidence in Viber applications. Data obtained after acquiring based on the work steps of NIST are the accounts of the perpetrators, contacts targeted by the perpetrators, call history, text messages, picture messages and videos.
Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp Prasongko, Riski Yudhi; Yudhana, Anton; Riadi, Imam
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.520

Abstract

The development of smartphone technology is increasing, causing cyber crime to increase from year to year. One of the smartphone applications used by criminals is WhatsApp. The WhatsApp application is one of the most widely used insta messaging applications, especially in Indonesia. Violations such as hate speech, defamation, and fraud are common on the WhatsApp social network. This study was conducted with the aim of finding forensic evidence of cyberbullying behavior on the WhatsApp insta messaging application using the Association of Chiefs of Police (ACPO) method. This forensic phase involves planning, arresting, analyzing and presenting to search for digital evidence of cybercrimes using Belkasoft Evidence Center and HashMyFiles software. Digital evidence on smartphones can be found using case scenarios with 13 parameters that have been generated. The results of this study indicate that the Belkasoft Evidence Center digital forensic software is 81.92%, while HashMyfiles can detect the authenticity of digital evidence 79.96%.
Identifikasi Tulisan Tangan Huruf Katakana Jepang Dengan Metode Euclidean Riadi, Imam; Fadlil, Abdul; Annisa, Putri
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (633.749 KB) | DOI: 10.30645/j-sakti.v4i1.184

Abstract

Katakana is one of the traditional Japanese letters used to absorption words from other languanges. In the inttroduction of an object a learning process is needed, which is obtained through the characteristics and experience of observing similar objects after being acquired. But manually it is quite difficult to distinguish between 5 hiragana vowels starting from the image data acquisition process, image processing, feature extraction using Gray Level Co-occurance Matrix (GLCM) while classifiers use the euclidean distance method. The results of the tests carried out showed an accuracy rate of around 78% using the euclidean method.
Forensik Jaringan Terhadap Serangan DDOS Menggunakan Metode Network Forensic Development Life Cycle Murti, Raden Hario Wahyu; Riadi, Imam; Anwar, Nuril; Ismail, Taufiq
Jurnal Sarjana Teknik Informatika Vol. 11 No. 3 (2023): Oktober
Publisher : Program Studi Informatika, Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jstie.v11i3.26544

Abstract

Teknologi informasi dan komunikasi merupakan elemen penting dalam kehidupan masa kini yang telah menjadi bagian bagi berbagai sektor kehidupan dan memberi andil besar terhadap perubahan yang mendasar. Sekelompok orang atau organisasi yang tidak bertanggung jawab dapat menggunakan internet untuk mengganggu atau merusak suatu website sehingga menyebabkan overload pada router dan membuat website tidak dapat diakses. Metode penyerangan ini disebut dengan DDoS (Distributed Denial of Service). Tujuan penelitian ini adalah mengidentifikasi keamanan jaringan pada router dan mendapatkan karakteristik barang bukti digital pada router untuk keperluan forensik. Penelitian ini menggunakan metode Network Forensic Development Life Cycle (NFDLC) yang memiliki pada lima tahapan utama yaitu Initiation, Acquisition, Implemetation, Operations, dan Disposation. Tools yang digunakan pada penelitian adalah menggunakan Wireshark yang bertugas monitoring serangan DDoS terhadap serangan router dan melakukan investigasi untuk mendapatkan barang bukti digital berupa hasil serangan yang masuk ke servertrak. Hasil temuan barang bukti digital yang didapat pada monitoring ubuntu server tercatat menerima 84.407 paket pada serangan pertama dengan IP Address 10.10.1.2 dan menerima 359.510 paket pada serangan kedua dengan Ip Address 10.10.1.4 dan hasil monitoring windows server tercatat menerima 2.305.835 paket pada serangan pertama dengan IP Address 10.10.1.2 dan menerima 94.120 paket pada serangan kedua dengan Ip Address 10.10.1.4. 
Optimalisasi Layanan Keamanan Captive Portal Menggunakan Klasifikasi Logistic Regression Riadi, Imam; Fadlil, Abdul; Prabowo, Basit Adhi
INFORMAL: Informatics Journal Vol 9 No 3 (2024): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v9i3.44189

Abstract

Privacy has become a major concern with the rapid adoption of various smart devices and internet connections. The randomized MAC (Media Access Control) address for each device was implemented for privacy. Problems arose when implementing randomized MAC addresses on captive portals with connection limitations per user. Random classification by VOUI of the device used to assist the device elimination decisions in the captive portal. MAC address data was obtained from devices connected to the captive portal. The data is processed to be grouped into two separate classes, whether random or not, with four device Mac address threshold and four random percentage threshold. Logistic regression was used to determine the classification with the highest level of accuracy. Of the 16 experiments, it was found that all of them had an accuracy above 92%. The maximum accuracy of 95% was obtained in an experiment using a Mac address threshold of 6 and a random percentage threshold of 50%. This indicates that a value of 6 for the Mac address threshold and a value of 50% for the random percentage threshold can be used for random Mac address classification.
Tinjauan Pustaka Sistematis: Tantangan Dan Faktor-Faktor Pengembangan Kesiapan Forensik Digital Rochmadi, Tri; Fadlil, Abdul; Riadi, Imam
Cyber Security dan Forensik Digital Vol. 7 No. 2 (2024): Edisi November 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4861

Abstract

Teknologi informasi telah mengubah hampir segala lini kehidupan dari konvensional ke digitalisasi. Digitalisasi yang begitu cepat, menimbulkan permasalahan pada serangan siber yang belum diimbangi oleh penanganan insiden siber. Kesiapan forensik digital menjadi hal penting bagi organisasi agar proses penanganan insiden lebih efektif dan efisien. Tujuan penelitian ini adalah mengidentifikasi faktor-faktor dan tantangan terkait topik kesiapan digital forensik. Metode yang digunakan dalam penelitian ini menggunakan metode tinjauan pustaka sistematis. Hasil yang didapatkan pada penelitian ini memberikan informasi jurnal yang paling banyak mempublikasikan topik kesiapan forensik digital, obyek penelitian, metode yang digunakan, standarisasi yang diintegrasikan, faktor-faktor dan tantangan dalam pengembangan kesiapan forensik digital. Penelitian ini bisa menjadi rujukan peneliti akademisi ataupun praktisi pada bidang forensik digital ataupun pengembang aplikasi. Kata kunci: tinjauan pustaka sistematis, kesiapan forensik digital, ISO/IEC 27043, COBIT.  ------------------------------------ Abstract Information technology has changed almost all lines of life from conventional to digitalization. Rapid digitalization has led to problems with cyber-attacks that the handling of cyber incidents has not matched. Digital forensic readiness is important for organizations to make the incident-handling process more effective and efficient. The purpose of this research is to identify factors and challenges related to the topic of digital forensic readiness. The method used in this research is a systematic literature review. The results obtained in this study provide information on the journals that publish the most digital forensic readiness topics, research objects, methods used, standardization integrated, factors, and challenges in developing digital forensic readiness. This research can be a reference for academic researchers or practitioners in digital forensics or application developers. Keywords: systematic literatur review, digital forensic readiness, ISO/IEC 27043, COBIT.  
Co-Authors ., Andi Zulherry Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Nugrahantoro Achmad Syauqi Ade Davy Wiranata Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Apriliani, Evinda Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Asruddin, Asruddin Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bahagiya, Multika Untung Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Davito Rasendriya Rizqullah Putra Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Ediansa, Oka Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fadlil , Abdul Fahmi Anwar Fahmi Auliya Tsani Faiz , Muhammad Nur Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Faulinda Ely Nastiti Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fithriatus Shalihah Fitri, Fitriyani Tella Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Harman, Rika Haryanto, Eri Helmiyah, Siti Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhram, Ridho Ikhsan Zuhriyanto Ikhwan Anshori Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Handoyo Joko Triyanto Kariyamin, Kariyamin Kartoirono, Suprihatin Kurniawan, Endang Kurniawan, Gusti Chandra Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Muchlas Muchlas Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murinto Murinto Murni Murni Murti, Raden Hario Wahyu Musa, Shahrulniza Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Faiz, Muhammad Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Nurmi Hidayasari Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi, Rizal Prambudi Prasetyaningrum, Putri Taqwa Prasongko, Riski Yudhi Purwaningrum, Santi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Raden Mohamad Herdian Bhakti Rafiq, Irhash Ainur Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Robiin, Bambang Rochmadi, Tri Roni Anggara Putra Rudy Ansari, Rudy Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Safiq Rosad Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Sari, Laura Shiha Budin Sismadi, Wawan Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sudinugraha, Tri Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Supriyanto Suryanto, Farid Syaefudin, Rizal Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Triyanto, Joko Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wahyusari, Retno Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro Widiandana, Panggah WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad