p-Index From 2021 - 2026
18.036
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Indonesian Journal of Business Intelligence (IJUBI) Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia EDUTECH : Jurnal Inovasi Pendidikan Berbantuan Teknologi J-SAKTI (Jurnal Sains Komputer dan Informatika) Decode: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Scientific Journal of Informatics Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JOCHAC
Claim Missing Document
Check
Articles

Investigasi File Carving pada Media Penyimpanan Menggunakan Framework Computer Forensic Investigative Process Fakhri, La Jupriadi; Riadi, Imam; Yudhana, Anton
Journal of Computer System and Informatics (JoSYC) Vol 6 No 1 (2024): November 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josyc.v6i1.6125

Abstract

One of the uses of digital storage media in the digital era that is still popular today is the use of flash drives as a means of transferring data between computer devices. Flash disks are often used as evidence in digital investigation cases. The risk of losing data is one of the main problems that society often faces. Data loss occurs for various reasons, such as user error, device failure, malware attack, or criminal acts such as hacking. The file carving technique is used to recover lost or deleted files from digital storage media with Foremost software. However, with so many file types, it is sometimes difficult to choose which file types to recover and how to ensure the authenticity of the files. This study uses the Computer Forensic Investigative Process (CFIP) Framework on a flash drive, which is used as evidence in a criminal case. Foremost software is used to perform file carving techniques on flash drives. The results showed that the data acquisition process using DC3DD succeeded in producing digital evidence with a hash value that is identical to the original file. Foremost software successfully recovered various file types, such as 9 image files with jpg file type, 5 audio files with mp3 file type, and 5 document files with pdf file type. Foremost shows a high success rate, with file carving accuracy of 90% for image files, and 62.5% for audio files and documents. The average success rate of Foremost software in returning evidence is 73.08%.
Improving the Accuracy of Batik Classification using Deep Convolutional Auto Encoder Dzulqarnain, Muhammad Faqih; Fadlil, Abdul; Riadi, Imam
Compiler Vol 13, No 2 (2024): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i2.2649

Abstract

This research investigates the development of model deep convolutional autoencoders to enhance the classification of digital batik images. The dataset used was sourced from Kaggle. The autoencoder was employed to enrich the image data prior to convolutional processing. By forcing the autoencoder to learn a lower-dimensional latent representation that captures the most salient features of the batik patterns. The performance of this enhanced model was compared against a standard convolutional neural network (CNN) without the autoencoder. Experimental results demonstrate that the incorporation of the autoencoder significantly improved the classification accuracy, achieving 99% accuracy on the testing data and loss value of 3.4%. This study highlights the potential of deep convolutional autoencoders as a powerful tool for augmenting image data and improving the performance of deep learning models in the context of batik image classification.
ScreenMy: a Lightweight Architecture of Tuberculosis-Diabetes Mellitus Screening System Integrating with EMRs Suryanto, Farid; Arini, Merita; Riadi, Imam
JUITA: Jurnal Informatika JUITA Vol. 12 No. 2, November 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i2.21541

Abstract

Background: Early detection of diseases like tuberculosis (TB) and diabetes mellitus (DM) is critical for preventive healthcare. However, integrating effective screening programs within existing workflows can be challenging. Objective: This study explores the feasibility and impact of integrating an electronic screening system (ESS) within electronic medical records (EMRs) in private primary care settings. The pilot study focuses on ScreenMy, an ESS engine designed for bi-directional TB-DM screening. Methods: A pilot study investigated the integration process of ScreenMy into an EMR system. Interviews with developers assessed factors like installation ease, flexibility, and impact on the EMR's functionality. Findings: The findings revealed a smooth integration process due to ScreenMy's external design (requiring only plugin injection) and clear documentation.  The integration maintained EMR performance and efficiency, enhanced the developer experience, and offered flexibility for customization.  Developers, unfamiliar with prior integrated screening systems, found ScreenMy user-friendly and expressed interest in further system flexibility concerning data privacy. Conclusion: This investigation highlights the potential for seamless integration of screening systems like ScreenMy within EMRs. This paves the way for improved preventive healthcare delivery in primary care settings.
Mobile Forensics in Human Trafficking Investigation Services using Mobile Laboratory Muammar, Muammar; Riadi, Imam; Umar, Rusydi
JUITA: Jurnal Informatika JUITA Vol. 13 Issue 1, March 2025
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v13i1.24060

Abstract

This research examines the application of a mobile digital forensic laboratory developed by the Digital Forensics Center (DFC) at UMP to handle digital evidence directly at crime scenes, specifically in human trafficking cases. Integrating the Association of Chief Police Officers' (ACPO) methods, this mobile lab facilitates the investigative process, from planning to evidence collection and analysis, without delaying transport to a central lab, thereby speeding response times and minimizing evidence degradation.  We employed Magnet Axiom and DF-Tools to analyze WhatsApp data. Each demonstrated varying performance in identifying key digital evidence such as text messages, media, and group chats. DF-Tools showed an advantage in identifying multimedia artifacts with a 69.48% data acquisition success rate, compared to Magnet Axiom at 68.57%. Additionally, police bolstered their efforts to uncover human trafficking networks by implementing Base Transceiver Station (BTS)-based location tracking techniques to pinpoint suspect and victim locations via phone data or identity numbers. The research findings demonstrate that mobile labs enable rapid on-site responses, offer flexibility in collecting and securing digital evidence, and enhance efficiency and effectiveness of digital forensic investigations.
Review Framework dan Best Practise Standars COBIT 2019 untuk Implementasi Tata Kelola TI Suhartono, Bambang; Riadi, Imam; Sutikno, Tole
Jurnal Sistem Informasi Vol. 12 No. 1 (2025)
Publisher : Universitas Serang Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30656/jsii.v12i1.9926

Abstract

Tata kelola teknologi informasi (TI) merupakan elemen krusial dalam memastikan keselarasan antara strategi TI dan tujuan bisnis organisasi. Implementasi tata kelola TI membutuhkan framework dan standar best practice yang teruji guna mendukung efektivitas, efisiensi, serta kepatuhan terhadap regulasi. Banyak organisasi menghadapi kesulitan dalam menentukan pendekatan yang tepat atau memilih Framework, standar yang paling sesuai dengan kebutuhan Bisnis. Artikel ini bertujuan untuk meninjau serta  mengulas mengenai COBIT 2019 dan juga mengetahui Framework dan standar best practice yang digunakan dalam COBIT 2019 serta lebih lanjut mengetahui mengenia framework dan standar mana yang paling banyak digunakan. Penelitian ini menggunakan metode literature review  pada COBIT 2019 dengan menganalisa penggunaan framework, standar pada masing-masing Domain serta Proses COBIT 2019. Hasil penelitian diharapkan dapat memberikan wawasan kepada para praktisi TI  untuk memilih pendekatan framework, standar sebagai sebuah pendekatan dalam Tata Kelola TI yang paling sesuai untuk Organisasi.
Analisis Polifarmasi Terhadap Interaksi Obat Di Rumah Sakit Umum Kota Pekalongan Permadi, Yulian Wahyu; Akrom; Imam Riadi; St Rahmatullah
Lamda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Vol. 5 No. 1 (2025): April
Publisher : Lembaga Bale Literasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58218/lambda.v5i1.1200

Abstract

The use of drugo in large quantities is called polypharmacy. The number of drug interactions depends on the number of drugs consumed, the possibility of drug interactions increases as more drugs are used in the prescription. This study aims to analyze the incidence of polypharmacy and drug interactions in outpatient prescriptions at Pekalongan City General Hospital. This study is a retrospective descriptive study conducted by analyzing outpatient prescription data for the period March–May 2023 at the hospital pharmacy depot. Prescription sheets containing two or more drugs (R/) were identified through reliable literature sources, namely www.drugs.com and www.medscape.com. Data were grouped and analyzed using SPSS spearman test. The results showed that of the total incidence of drug interactions of 877 patients, the gender of the patients was mostly female (68%), the age of the most was 26-45 years (58%), the number of drugs in the prescription was the largest two drugs with potential interactions 44%, the level of polypharmacy was moderate (48%), minor (21%), major (13%) and no interaction (18%). The largest number of diagnoses in the prescription was two diagnoses at 44%. The highest drug interaction mechanisms are pharmacodynamics (57.3%), pharmacokinetics (13%), unknown (29.7%). The most interacting drug combinations are rifampicin isoniazid 6.9%, furosemide cefixime 4.5% and sertraline gabapentin 4.5%. The correlation between the number of drug use and diagnosis according to the results of this study is a significant, strong and unidirectional correlation. Based on the results of this study, it is recommended that polypharmacy in prescriptions can be minimized and drug interaction monitoring be tightened to reduce the risk of dangerous side effects.
Analisis Forensik Mobile pada Aplikasi E-Commerce Menggunakan Metode Association of Chief Police Officers: Mobile Forensic Analysis Of E-Commerece Applications Using The Association Of Chief Police Officers Method Prambudi, Rizal Prambudi; Imam Riadi; Murinto
Cyber Security dan Forensik Digital Vol. 8 No. 1 (2025): Edisi Mei 2025
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.1.5234

Abstract

Media sosial merupakan platform daring yang memungkinkan komunikasi tanpa batas waktu dan lokasi, memfasilitasi interaksi antar pengguna. Walaupun fungsionalitasnya luas, media sosial sering disalahgunakan untuk berbagai tindakan kejahatan siber. Salah satu aplikasi yang banyak disalahgunakan untuk kegiatan ilegal adalah aplikasi e-commerce yang menyediakan berbagai transaksi jual beli. Aplikasi e-commerce menyimpan data pribadi di perangkat digital yang bisa digunakan sebagai bukti digital dalam kegiatan kriminal. Penelitian ini bertujuan mendapatkan bukti digital dari skenario kasus penipuan aplikasi e-commerce dengan menerapkan teknik forensik pada perangkat mobile serta menggunakan kerangka kerja Association of Chief Police Officers (ACPO). Bukti digital meliputi gambar, video, dan pesan teks. Keakuratan tools yang digunakan dengan mengintegrasikan metode ACPO dalam mengekstraksi bukti digital juga menjadi fokus dalam penelitian. Penelitian ini menggunakan Oxygen Forensic Detective dan MOBILedit Forensic Express sebagai tools. Bukti digital yang berhasil dipulihkan dari perangkat bukti berupa gambar dan video. Hasil penelitian menunjukkan bahwa Oxygen Forensic Detective berhasil memperoleh bukti digital sebesar 37%, sementara MOBILedit Forensic Express memperoleh bukti sebesar 26%. Hasil ini mengindikasikan bahwa metode forensik digital efektif dalam mengungkap bukti kejahatan di aplikasi e-commerce, dengan Oxygen Forensic Detective lebih unggul dibandingkan MOBILedit Forensic Express. Pemilihan alat forensik yang tepat berperan penting dalam investigasi digital.Kajian ini diharapkan dapat mendorong penerapan integrasi metode ACPO dan penggunaan tools forensik dalam mengungkapkan bukti digital kejahatan melalui e-commerce. Kata kunci: media sosial, forensik digital, kejahatan siber, ACPO, aplikasi e-commerce -------------------------- Abstract Social media is an online platform that enables communication without time and location constraints, facilitating interaction between users. However, these platforms are often misused for various cybercrimes. One type of application frequently exploited for illegal activities is e-commerce applications, which provide various buying and selling transactions. E-commerce applications store personal data on digital devices that can be used as digital evidence in criminal activities. This study aims to obtain digital evidence from a fraud case scenario involving an e-commerce application by applying forensic techniques on mobile devices and using the Association of Chief Police Officers (ACPO) framework. The digital evidence includes images, videos, and text messages. Another objective of this research is to assess the accuracy of the forensic tools used when integrating the ACPO method to extract digital evidence. This study utilizes Oxygen Forensic Detective and MOBILedit Forensic Express as the forensic tools. The digital evidence successfully retrieved from the device consists of images and videos. The results show that Oxygen Forensic Detective managed to extract 37% of digital evidence, while MOBILedit Forensic Express recovered 26%. In conclusion, digital forensic techniques are effective in uncovering evidence of crimes within e-commerce applications, with Oxygen Forensic Detective outperforming MOBILedit Forensic Express. Selecting the appropriate forensic tool plays a crucial role in digital investigations. This research is expected to encourage the integration of the ACPO method and the use of forensic tools in revealing digital evidence of crimes conducted through e-commerce. Keywords: social media, digital forensics, cybercrime, ACPO, e-commerce applications
PENINGKATAN KEAMANAN DATA TERHADAP SERANGAN REMOTE ACCESS TROJAN (RAT) PADA CYBERCRIMINAL MENGGUNAKAN METODE DYNAMIC STATIC NANNY, NANNY; PRAYUDI, YUDI; RIADI, IMAM
Jurnal INSTEK (Informatika Sains dan Teknologi) Vol 4 No 2 (2019): OCTOBER
Publisher : Department of Informatics Engineering, Faculty of Science and Technology, Universitas Islam Negeri Alauddin, Makassar, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3917.959 KB) | DOI: 10.24252/instek.v4i2.9522

Abstract

Remote Access Trojan (RAT) merupakan program malware jenis Trojan Horse yang mencakup pintu belakang (backdoor) untuk kontrol administratif atas komputer target. Penelitian ini melakukan skenario penyerangan untuk mengetahui cara kerja serangan RAT, melakukan serangan RAT dan meningkatkan keamanan data dari serangan RAT melalui simulasi dan manfaat dari MikroTik. Program malware jenis trojan njRAT sebagai media simulasi antara laptop attacker (penyerang) dan laptop victim (korban). Metode yang digunakan adalah metode Dynamic Static, dimana dalam pengaturan jaringan dengan menentukan IP Address, yaitu menghubungkan 2 (dua) MikroTik Router, Router RB951Ui Versi 6 di laptop attacker dan Router RB931-2nD di laptop korban. Beberapa tools forensik yang digunakan diantaranya Wireshark, Disk Investigator, Virus Total sebagai proses analisis. Kata kunci : firewall, njRAT, Remote Access Trojan (RAT), router
Analisis Forensik Keamanan Data Pribadi pada Mode Privasi Browser Menggunakan Metode National Institute of Standards and Technology (NIST) Syukri, Muhammad; Imam Riadi; Tole Sutikno
Jurnal PROCESSOR Vol 20 No 1 (2025): Jurnal Processor
Publisher : LPPM Universitas Dinamika Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33998/processor.2025.20.1.2012

Abstract

User privacy while browsing the internet has become a major concern, especially with the presence of the private mode feature in browsers, which is claimed to protect personal data. This study analyzes the extent to which private mode in Google Chrome and Mozilla Firefox browsers can safeguard personal data using the standard approach from the National Institute of Standards and Technology (NIST). Four simulation scenarios were conducted to evaluate the effectiveness of private mode in preventing user information from being stored. The research findings indicate that although private mode successfully prevents the storage of browsing history and user data on the hard disk, sensitive information such as accounts and passwords can still be accessed in memory (RAM) under certain conditions. These findings suggest that private mode is not entirely secure in protecting user privacy, particularly against attacks that exploit temporary data in RAM. The implications of this study highlight the need for further development in private mode security, both by browser developers and users who seek to enhance their personal data protection. This study also recommends additional strategies to be implemented more effectively in order to reduce the risk of data leakage when using private mode.
Penggunaan Teknologi Tools Powerpoint dan Canva untuk Media Informasi Riadi, Imam; Fadlil, Abdul; Andrianto, Fiki; Elvina, Ade; Fanani, Galih; Nasution, Dewi Sahara
Aksiologiya: Jurnal Pengabdian Kepada Masyarakat Vol 6 No 2 (2022): Mei
Publisher : Universitas Muhammadiyah Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30651/aks.v6i2.11781

Abstract

Program pemberdayaan masyarakat ini bertujuan untuk menggunakan media Power Point dan Canva sebagai media penyampaian informasi yang inovatif dan meningkatkan soft skill desain. Pelatihan ini diikuti 15 mahasiswa baru program studi Sistem Informasi STIMIK Muhammadiyah Jakarta. Program ini melakukan 2 sesi pertemuan online melalui Zoom Meating karena Universitas mempraktikkan home learning, ada kebijakan tersebut terkait wabah Covid19. Pertemuan pertama memberikan materi tentang perkembangan teknologi dan media informasi sebagai tambahan wawasan. Pertemuan kedua memberikan tutorial tentang cara menggunakan Power Point dan tools Canva untuk mendesain informasi, yaitu desain sertifikat, desain undangan, desain animasi PPT, dan konten digital lainnya. Hasil tes pretest dan postest menunjukkan bahwa nilai presentase mahasiswa baru meningkat sebesar 13%. Hasil ini mengindikasikan adanya sedikit peningkatan dalam pengetahuan wawasan dan soft skill tentang teknologi media informasi. 
Co-Authors ., Andi Zulherry Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Nugrahantoro Achmad Syauqi Ade Davy Wiranata Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Apriliani, Evinda Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Asruddin, Asruddin Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bahagiya, Multika Untung Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Davito Rasendriya Rizqullah Putra Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Ediansa, Oka Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fadlil , Abdul Fahmi Anwar Fahmi Auliya Tsani Faiz , Muhammad Nur Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Faulinda Ely Nastiti Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fithriatus Shalihah Fitri, Fitriyani Tella Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Harman, Rika Haryanto, Eri Helmiyah, Siti Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhram, Ridho Ikhsan Zuhriyanto Ikhwan Anshori Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Handoyo Joko Triyanto Kariyamin, Kariyamin Kartoirono, Suprihatin Kurniawan, Endang Kurniawan, Gusti Chandra Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Muchlas Muchlas Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murinto Murinto Murni Murni Murti, Raden Hario Wahyu Musa, Shahrulniza Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Faiz, Muhammad Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Nurmi Hidayasari Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi, Rizal Prambudi Prasetyaningrum, Putri Taqwa Prasongko, Riski Yudhi Purwaningrum, Santi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Raden Mohamad Herdian Bhakti Rafiq, Irhash Ainur Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Robiin, Bambang Rochmadi, Tri Roni Anggara Putra Rudy Ansari, Rudy Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Safiq Rosad Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Sari, Laura Shiha Budin Sismadi, Wawan Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sudinugraha, Tri Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - sunardi sunardi Sunardi Sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Supriyanto Suryanto, Farid Syaefudin, Rizal Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Triyanto, Joko Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wahyusari, Retno Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro Widiandana, Panggah WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad