p-Index From 2020 - 2025
18.568
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal Lontar Komputer: Jurnal Ilmiah Teknologi Informasi JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia J-SAKTI (Jurnal Sains Komputer dan Informatika) DECODE: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika
Claim Missing Document
Check
Articles

Optimalisasi Layanan Keamanan Captive Portal Menggunakan Klasifikasi Logistic Regression Riadi, Imam; Fadlil, Abdul; Prabowo, Basit Adhi
INFORMAL: Informatics Journal Vol 9 No 3 (2024): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v9i3.44189

Abstract

Privacy has become a major concern with the rapid adoption of various smart devices and internet connections. The randomized MAC (Media Access Control) address for each device was implemented for privacy. Problems arose when implementing randomized MAC addresses on captive portals with connection limitations per user. Random classification by VOUI of the device used to assist the device elimination decisions in the captive portal. MAC address data was obtained from devices connected to the captive portal. The data is processed to be grouped into two separate classes, whether random or not, with four device Mac address threshold and four random percentage threshold. Logistic regression was used to determine the classification with the highest level of accuracy. Of the 16 experiments, it was found that all of them had an accuracy above 92%. The maximum accuracy of 95% was obtained in an experiment using a Mac address threshold of 6 and a random percentage threshold of 50%. This indicates that a value of 6 for the Mac address threshold and a value of 50% for the random percentage threshold can be used for random Mac address classification.
Tinjauan Pustaka Sistematis: Tantangan Dan Faktor-Faktor Pengembangan Kesiapan Forensik Digital Rochmadi, Tri; Fadlil, Abdul; Riadi, Imam
Cyber Security dan Forensik Digital Vol. 7 No. 2 (2024): Edisi November 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4861

Abstract

Teknologi informasi telah mengubah hampir segala lini kehidupan dari konvensional ke digitalisasi. Digitalisasi yang begitu cepat, menimbulkan permasalahan pada serangan siber yang belum diimbangi oleh penanganan insiden siber. Kesiapan forensik digital menjadi hal penting bagi organisasi agar proses penanganan insiden lebih efektif dan efisien. Tujuan penelitian ini adalah mengidentifikasi faktor-faktor dan tantangan terkait topik kesiapan digital forensik. Metode yang digunakan dalam penelitian ini menggunakan metode tinjauan pustaka sistematis. Hasil yang didapatkan pada penelitian ini memberikan informasi jurnal yang paling banyak mempublikasikan topik kesiapan forensik digital, obyek penelitian, metode yang digunakan, standarisasi yang diintegrasikan, faktor-faktor dan tantangan dalam pengembangan kesiapan forensik digital. Penelitian ini bisa menjadi rujukan peneliti akademisi ataupun praktisi pada bidang forensik digital ataupun pengembang aplikasi. Kata kunci: tinjauan pustaka sistematis, kesiapan forensik digital, ISO/IEC 27043, COBIT.  ------------------------------------ Abstract Information technology has changed almost all lines of life from conventional to digitalization. Rapid digitalization has led to problems with cyber-attacks that the handling of cyber incidents has not matched. Digital forensic readiness is important for organizations to make the incident-handling process more effective and efficient. The purpose of this research is to identify factors and challenges related to the topic of digital forensic readiness. The method used in this research is a systematic literature review. The results obtained in this study provide information on the journals that publish the most digital forensic readiness topics, research objects, methods used, standardization integrated, factors, and challenges in developing digital forensic readiness. This research can be a reference for academic researchers or practitioners in digital forensics or application developers. Keywords: systematic literatur review, digital forensic readiness, ISO/IEC 27043, COBIT.  
Prediksi Kelulusan Tepat Waktu Berdasarkan Riwayat Akademik Menggunakan Metode Naïve Bayes Imam Riadi; Rusydi Umar; Rio Anggara
Decode: Jurnal Pendidikan Teknologi Informasi Vol. 4 No. 1: MARET 2024
Publisher : Program Studi Pendidikan Teknologi Infromasi UMK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51454/decode.v4i1.308

Abstract

Kelulusan tepat waktu mahasiswa memiliki dampak besar dalam dunia pendidikan. Namun, tidak semua mahasiswa, mampu mencapai prestasi tersebut. Oleh karena itu, diperlukan penelitian yang mendalam dalam menganalisis data kelulusan sebagai upaya mendukung mahasiswa agar berhasil menyelesaikan studi mereka tepat waktu. Penelitian data kelulusan bisa dilakukan menggunakan tehnik klasifikasi data mining. Klasifikasi merupakan salah satu pengolahan dalam data mining dilakukan dengan cara mengelompokkan dengan metode tertentu. Penelitian ini membangun aplikasi dengan implementasi metode naive bayes dengan mempertimbangkan parameter menghasilkan klasifikasi mahasiswa lulus tidak tepat waktu dan lulus tepat waktu. Tahapan pada penelitian seperti load data, cleaning data, selection data, transformation data, data training, data testing, dan hasil prediksi. Tahapan pengujian akurasi penelitian menggunakan metode confusion matrix mendapat akurasi 72% dengan total penerapan data sejumlah 291 dengan detail 273 data training dan 18 data testing. Hasil akurasi menunjukkan bahwa sistem prediksi kelulusan dapat digunakan FTI UAD sebagai salah satu acuan dan pertimbangan fakultas mengambil langkah-langkah kelulusan mahasiswa.
Enterprise Architecture Planning Sistem Informasi Akademik Dengan TOGAF ADM Basir, Azhar; Fadlil, Abdul; Riadi, Imam
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 3, No 1 (2019): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.713 KB) | DOI: 10.30645/j-sakti.v3i1.91

Abstract

The role of information technology greatly influences the improvement of a higher education governance, so that universities today should have models and standards that can be implemented as a reference in enhancing harmony between business strategies and information technology. Enterprise Architecture planning (EAP) is one of the methodologies that can be applied in planning information architecture, the stages in EAP consist of data architecture, application architecture, technology architecture and how the design that has been made can be implemented to support business activities, to achieve the organization's mission.
Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST) Syahib, Muhammad Irwan; Riadi, Imam; Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i1.196

Abstract

The rapid development of mobile technology today is directly proportional to the development of mobile applications in it. Making it easier for people to choose and use the application as they want. This has resulted in misuse of negative things, ranging from human trafficking, drug trafficking, as well as online prostitution business. Viber is an Instant Messenger application that makes it easy for users. This application can be used to send messages, call, send photos, audio and video to others. This application has been used by 260 million people worldwide. This is the basis of research to acquire digital evidence in Viber applications. Data obtained after acquiring based on the work steps of NIST are the accounts of the perpetrators, contacts targeted by the perpetrators, call history, text messages, picture messages and videos.
Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp Prasongko, Riski Yudhi; Yudhana, Anton; Riadi, Imam
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.520

Abstract

The development of smartphone technology is increasing, causing cyber crime to increase from year to year. One of the smartphone applications used by criminals is WhatsApp. The WhatsApp application is one of the most widely used insta messaging applications, especially in Indonesia. Violations such as hate speech, defamation, and fraud are common on the WhatsApp social network. This study was conducted with the aim of finding forensic evidence of cyberbullying behavior on the WhatsApp insta messaging application using the Association of Chiefs of Police (ACPO) method. This forensic phase involves planning, arresting, analyzing and presenting to search for digital evidence of cybercrimes using Belkasoft Evidence Center and HashMyFiles software. Digital evidence on smartphones can be found using case scenarios with 13 parameters that have been generated. The results of this study indicate that the Belkasoft Evidence Center digital forensic software is 81.92%, while HashMyfiles can detect the authenticity of digital evidence 79.96%.
Identifikasi Tulisan Tangan Huruf Katakana Jepang Dengan Metode Euclidean Riadi, Imam; Fadlil, Abdul; Annisa, Putri
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i1.184

Abstract

Katakana is one of the traditional Japanese letters used to absorption words from other languanges. In the inttroduction of an object a learning process is needed, which is obtained through the characteristics and experience of observing similar objects after being acquired. But manually it is quite difficult to distinguish between 5 hiragana vowels starting from the image data acquisition process, image processing, feature extraction using Gray Level Co-occurance Matrix (GLCM) while classifiers use the euclidean distance method. The results of the tests carried out showed an accuracy rate of around 78% using the euclidean method.
KLASIFIKASI CITRA SPESIES BUNGA DI INDONESIA BERBASIS CONVOLUTIONAL NEURAL NETWORK MENGGUNAKAN TEKNIK TRANSFER LEARNING Rahman, Arif; Salim, Mansyur; Riadi, Imam
Jurnal Software Engineering and Computational Intelligence Vol 2 No 02 (2024)
Publisher : Informatics Engineering, Faculty of Computer Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jseci.v2i02.4942

Abstract

Indonesia memiliki sekitar 20.000 spesies bunga dengan berbagai bentuk, warna, dan struktur, yang menjadikan klasifikasi manual bunga menjadi tantangan, terutama karena kemiripan warna antarspesies. Penelitian ini bertujuan mengembangkan model klasifikasi bunga menggunakan Convolutional Neural Network (CNN) berbasis MobileNetV2 dengan teknik transfer learning. Dataset diambil dari Katalog Varietas Unggul Florikultura tahun 2015 oleh Badan Penelitian dan Pengembangan Pertanian, mencakup 11 jenis bunga dengan total 2137 citra, yang dibagi menjadi data latih, validasi, dan uji. Model CNN tanpa transfer learning menghasilkan akurasi 42% pada data uji, sedangkan penerapan transfer learning meningkatkan akurasi menjadi 73%. Hasil penelitian menunjukkan bahwa teknik transfer learning, khususnya dengan MobileNetV2 menggunakan bobot ImageNet, memberikan peningkatan akurasi yang signifikan, yakni 52% lebih baik dibandingkan metode tanpa transfer learning. Penelitian ini membuktikan bahwa model berbasis transfer learning dapat diimplementasikan untuk klasifikasi citra bunga secara efisien dan optimal, serta dapat digunakan pada perangkat berbasis smartphone.
ANALISIS DETEKSI PENYUSUP PADA LAYANAN OPEN JOURNAL SYSTEM MENGGUNAKAN METODE NETWORK FORENSIC DEVELOPMENT LIFE CYCLE Wintolo, Hero; Riadi, Imam; Yudhana, Anton
SKANIKA: Sistem Komputer dan Teknik Informatika Vol 8 No 1 (2025): Jurnal SKANIKA Januari 2025
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/skanika.v8i1.3284

Abstract

This study aims to detect intruders on a server computer used for Open Journal System (OJS) services. The server is connected to the internet via a router, making it vulnerable to external attacks. In this research, the tool used is Tripwire, installed on the server computer as the main object. Tripwire functions as a change detection tool for the file system, identifying suspicious activities and recording valid file hashes, verifying file integrity against this record periodically. The system is operated by journal managers from computers connected to the server within the same network address providing OJS services. The method used in this research is the Network Forensic Development Life Cycle (NFDLC), which consists of several stages: initiation, acquisition, implementation, operation, and disposition. Each stage is applied systematically to facilitate the forensic analysis of attacks. The research results show that the NFDLC method is effective in analyzing and detecting intruders in the network. Based on forensic analysis using Tripwire, 12 data losses were found in 7 attack incidents identified on the OJS service. This study successfully demonstrates that the NFDLC method and Tripwire tool are effective in detecting and analyzing intruders attempting to access the OJS service server computer.
K-means clustering as an imputation strategy for missing values in scholarship candidate data Muhammad, Muhammad; Sutikno, Tole; Riadi, Imam
Jurnal Mantik Vol. 8 No. 4 (2025): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.v8i4.5904

Abstract

The issue of missing values in the scholarship selection process poses a challenge that can impact decision-making. This study aims to perform data imputation for scholarship candidate datasets using the K-Means method and evaluate its performance using the Mean Absolute Percentage Error (MAPE). K-Means was selected for its ability to group data based on pattern similarities, enabling it to estimate missing values in the scholarship candidate dataset. Two datasets were utilized in this study: one with 10% missing data and another with 20%. The results indicate that K-Means imputation can effectively apply to scholarship candidate data. Additionally, the findings reveal that the proportion of missing data influences the optimal number of clusters required. For the dataset with 10% missing data, the best configuration was achieved with 5 clusters, resulting in a MAPE of 13%. Conversely, for the dataset with 20% missing data, the optimal configuration required 2 clusters, yielding a MAPE of 14%.
Co-Authors Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Achmad Nugrahantoro Achmad Syauqi Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Aminuyati Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bashor Fauzan Muthohirin Basir, Azhar Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fahmi Anwar Fahmi Auliya Tsani Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Helmiyah, Siti Herman Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhsan Zuhriyanto Ikhwan Anshori Imam Mahfudl Nasrulloh Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Triyanto Kartoirono, Suprihatin Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Mubarok Nahdli, Muhammad Fahmi Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murni Murni Murti, Raden Hario Wahyu Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi Prasongko, Riski Yudhi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Rochmadi, Tri Roni Anggara Putra Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Shiha Budin Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Suryanto, Farid Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Takdir Ruslan Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Tri Sudinugraha Triyanto, Joko Tuska Abe Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad