p-Index From 2021 - 2026
18.036
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Indonesian Journal of Business Intelligence (IJUBI) Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia EDUTECH : Jurnal Inovasi Pendidikan Berbantuan Teknologi J-SAKTI (Jurnal Sains Komputer dan Informatika) Decode: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Scientific Journal of Informatics Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JOCHAC
Claim Missing Document
Check
Articles

Analisis Forensik Digital terhadap Kasus Penipuan pada E-Commerce Menggunakan Metode ACPO Alawi, Hanna Syahida; Riadi, Imam; Sunardi, Sunardi
Jurnal Informatika: Jurnal Pengembangan IT Vol 10, No 3 (2025)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v10i3.8604

Abstract

Abstrak – Perkembangan e-commerce berbasis media sosial telah meningkatkan risiko kejahatan siber, terutama kasus penipuan yang dilakukan di luar sistem resmi platform. TikTok Shop menjadi salah satu platform yang paling banyak digunakan, tetapi maraknya transaksi di luar sistem menimbulkan tantangan dalam investigasi kejahatan digital. Penelitian ini bertujuan untuk menganalisis efektivitas metode ACPO (Association of Chief Police Officers) dalam proses investigasi forensik digital guna mengidentifikasi dan mengamankan bukti elektronik terkait kasus penipuan pada e-commerce berbasis media sosial. Penelitian dilakukan dengan pendekatan eksperimental menggunakan Belkasoft dan MOBILedit Forensic Express untuk mengekstraksi bukti digital dari perangkat seluler. Dataset awal terdiri dari 2 akun, 2 gambar, 1 video, dan 8 percakapan pesan, sehingga total terdapat 13 bukti digital. Hasil pengujian menunjukkan bahwa Belkasoft berhasil mengekstraksi gambar dan video (100%) tetapi gagal memperoleh akun serta percakapan pesan, sedangkan MOBILedit Forensic Express berhasil mengekstraksi seluruh bukti (100%) kecuali video. Dengan menerapkan prinsip ACPO, memastikan penyelidikan bahwa seluruh bukti digital dikumpulkan secara sistematis dengan tetap menjaga integritasnya agar dapat digunakan dalam proses hukum. Hasil penelitian ini menunjukkan bahwa metode ACPO dapat diimplementasikan secara efektif dalam analisis forensik digital guna mendukung investigasi kejahatan siber di platform e-commerce berbasis media sosial. Penerapan metode ini berkontribusi dalam meningkatkan efektivitas investigasi dan validitas bukti digital dalam sistem peradilan. 
Improving Credibility of Digital Evidence Investigation in E-Commerce Fraud Cases using ISO/IEC 27037 Syahida Alawi, Hanna; Riadi, Imam; Sunardi, Sunardi
International Journal of Advances in Data and Information Systems Vol. 6 No. 2 (2025): August 2025 - International Journal of Advances in Data and Information Systems
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59395/ijadis.v6i2.1408

Abstract

TikTokShop fraud is an emerging challenge in e-commerce investigations, demanding robust digital forensic approaches. This study tackles the complexities of investigating such fraud within the TikTokShop platform, focusing on the acquisition, preservation, and validation of multifaceted digital evidence, including screenshots, payment records, account data, videos, and communication logs. Adhering to ISO/IEC 27037 for evidence handling, Magnet and Oxygen forensic tools were used for systematic evidence acquisition. The analysis using Oxygen Forensic recovered 100% of relevant artifacts, which is slightly higher compared to Magnet Axiom, which recovered 38.46% of artifacts, although both tools were effective in retrieving critical artifacts such as image metadata, account information, and data transfers. Due to image compression by the TikTokShop application, discrepancies in hash values emerged, requiring supplementary validation. Optical Character Recognition (OCR) and Levenshtein distance algorithms quantified textual similarity within image-based evidence, while the Forensically platform enabled advanced image forensic analyses to detect potential tampering and authenticity. This rigorous, multi-layered forensic framework complements traditional hash verification by providing corroborative content-level authentication. Findings confirm that although hash inconsistencies arise from application-induced compression, integrating OCR, Levenshtein, and forensic image analysis enhances the reliability of digital evidence. The novelty of this research lies in its robust synergy of ISO/IEC 27037-compliant handling with advanced digital content verification, contributing to the advancement of digital forensic practices in complex social commerce fraud scenarios.
Performance Comparison of Learned Features from Autoencoder and Shape-Based Hu Moments for Batik Classification Dzulqarnain, Muhammad Faqih; Fadlil, Abdul; Riadi, Imam
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4827

Abstract

Batik classification depends critically on effective feature extraction to capture the unique geometric and visual characteristics of batik patterns. This study compares two distinct feature extraction methods for batik classification: learned features extracted via a convolutional autoencoder, and shape-based handcrafted features derived from Hu Moments. While autoencoders automatically learn complex latent representations that adapt to intricate pattern variations, Hu Moments provide invariant shape descriptors robust to rotation, scaling, and translation. The methodology involves extracting Hu Moment features and autoencoder latent features from the same batik image dataset, followed by evaluation with identical classifiers to ensure a fair comparison. Experimental results reveal key trade-offs: Hu Moments offer robustness and interpretability in capturing shape geometry, whereas autoencoder features better model complex, non-linear patterns. These findings highlight the complementary strengths of classical and learned feature extraction techniques, offering valuable insights for optimizing batik classification. This research advances feature extraction methodologies in cultural heritage image analysis, with broader applicability to pattern-rich domains like batik classification.
Validation and Evaluation of Browser Forensics Using Digital Forensic Approach Based on the National Institute of Standards and Technology (NIST) Framework Syukri, Muhammad; Riadi, Imam; Sutikno, Tole
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4977

Abstract

Browsers have become essential applications in digital life alongside the advancement of internet technology. However, users’ low awareness of privacy security during web browsing can lead to the risk of data theft by malicious parties. This study analyzes digital traces in Google Chrome and Mozilla Firefox using a digital forensic approach based on the standards of the National Institute of Standards and Technology (NIST). The method involves four testing scenarios to compare digital traces in storage media (hard drive) and RAM between normal and private/incognito browsing modes. The objective of this research is to validate and evaluate previous findings conducted on the Linux operating system, using a different approach within a Windows environment. The experiment uses the same digital forensic tools to ensure data accuracy. This study contributes to the advancement of browser forensics by presenting a validated and reproducible framework for memory-based privacy evaluation, thereby supporting more accurate and systematic analysis of digital traces.
Analisis Sistem Deteksi Citra untuk Optimalisasi Pengawasan Lalu Lintas Udara Menggunakan Algoritma YOLOv5 Ayuningtyas, Astika; Riadi, Imam; Yudhana, Anton
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 10 No. 3 (2025): September 2025
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2025.10.3.364-376

Abstract

This study aims to develop an image detection system capable of identifying manned and unmanned aircraft objects to support air traffic surveillance. The increasing flight activity, both from commercial aircraft and drones, requires a more optimal surveillance system to connect the airspace efficiently. In this study, a Convolutional Neural Network (CNN) model utilizing the You Only Look Once version 5 (YOLOv5) method is employed to detect and classify objects in real-time from aircraft images. The methodology employed includes collecting aerial image data, labeling the data, and training object detection models using YOLOv5. The dataset used consists of 2,520 images of manned aircraft (warplanes) and 5,422 images of unmanned aircraft (drones). The experimental results demonstrate that the YOLOv5 model achieves high detection accuracy for both manned and unmanned aircraft, with a relatively fast inference time, thereby supporting the development of an effective air traffic surveillance system. This system is expected to be an integral part of a more sophisticated and responsive air traffic surveillance solution.
Machine Learning-based Chatbot Model for Healthcare Service: A Bibliometric Analysis Ekawati, Nia; Riadi, Imam; Yuliansyah, Herman
Aviation Electronics, Information Technology, Telecommunications, Electricals, and Controls (AVITEC) Vol 7, No 3 (2025): November (Special Issue)
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/avitec.v7i3.3050

Abstract

While machine learning-based chatbots hold significant potential in healthcare services, a comprehensive synthesis regarding their roles, user demographics, benefits, and limitations remains unavailable, hindering in-depth understanding and future development. This study aims to conduct a bibliometric analysis to identify implementation trends and the research landscape of ML-based chatbot models in healthcare, simultaneously highlighting relevant existing gaps. Analysis of Scopus data using VOSviewer and “Publish or Perish” reveals “machine learning”, “chatbot” and “healthcare” as dominant keywords, indicating intensive research focus areas with stable publication growth. The United States emerges as a central hub for international research collaboration, particularly in AI for malnutrition; however, several outlier countries require further integration. Deep learning algorithms are identified as a crucial methodological trend for future directions. Chatbots possess the potential to revolutionize healthcare by enhancing accessibility and efficiency. Nevertheless, effective implementation necessitates careful consideration of ethical aspects, privacy, and data quality. The identified research gaps underscore the urgency for a holistic synthesis to guide responsible and effective chatbot innovation.
Post Attack Mitigation on Open Journal System Services Using Knowledge Understanding Assessment Defense (KUAD) Method Wintolo, Hero; Riadi, Imam; Yudhana, Anton
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 4, November 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i4.2279

Abstract

This research was conducted to investigate evidence of an attack and to restore data after an attacker compromised an Open Journal System (OJS) service on a computer server. The method used in this research is a new approach developed from the Network Forensic Digital Life Cycle (NFDLC) method. This new method, known as KUAD, has several stages for collecting cyber-attack evidence and restoring it after the Gacor attack has occurred. The stages in the KUAD method include initiation, acquisition, execution, mitigation, and disposition. The novelty of this method, compared to the previous one, lies in the inclusion of the mitigation stage, which aims to restore data or documents after an attack. The tool used to detect the attack and find evidence of the attack is Tripwire, whereas the tools used to restore lost data include crontab, which runs backup commands with rsync in four steps. Tripwire can optimally detect attacks by displaying the number of data entries that were added, deleted, or modified. A total of 15,135 files in .docx, .pdf, and .jpg formats, deleted by the attacker, were successfully restored using this backup technique. The success rate of using this technique for post-cyber attack mitigation reached 100%.
Peningkatan kompetensi kewirausahaan siswa SMK Kesehatan Bantul melalui pelatihan pembuatan permen jelly dan digital marketing Mulyaningsih, Sri; Wahyuningsih, Iis; Riadi, Imam
ABDIMAS DEWANTARA Vol 7 No 1 (2024)
Publisher : Universitas Sarjanawiyata Tamansiswa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30738/ad.v7i1.16363

Abstract

Kegiatan pengabdian kepada masyarakat (PkM) ini ditujukan untuk meningkatkan pengetahuan dan ketrampilan siswa SMK Kesehatan bantul dalam membuat produk komersial olahan permen jelly dari tanaman herbal baik dari sisi produksinya maupun pemasarannya untuk meningkatkan kemampuan siswa berwirausaha. Metode pelatihan dilakukan dengan: pemaparan materi dan praktek. Pelatihan kewirausahaan diselenggarakan di SMK Kesehatan Bantul pada tanggal 4 dan 25 Oktober 2023 diikuti oleh 75 siswa. Untuk mengukur peningkatan pengetahuan sebelum pelatihan dilakukan pretes dan setelah pelatihan dilakukan postes. Hasil PkM menunjukkan setelah pelatihan terjadi peningkatan pengetahuan para siswa SMK Kesehatan Bantul sekitar 10,2 % meliputi pengertian dari permen herbal, bagian tanaman yang dimanfaatkan untuk kesehatan, dan khasiat dari beberapa tanaman herbal untuk menjaga kesehatan.  Rata-rata pemahaman para siswa meningkat 5% setelah mendapat pelatihan pembuatan desain produk dengan menggunakan Canva serta meningkat 8% setelah mendapat pelatihan penggunaan media sosial untuk pemasaran produk.  Kesimpulannya, pelatihan pembuatan permen jelly herbal dan digital marketing telah meningkatkan pengetahuan dan keterampilan siswa SMK Kesehatan Bantul.   Increasing the entrepreneurial competence of Bantul Health Vocational School students through jelly candy-making and digital marketing training   Abstract: This community service activity was aimed at increasing the knowledge and skills of Bantul Health Vocational School students in making commercial products made from herbal jelly candy, both in terms of production and marketing, to increase students' entrepreneurial abilities. The training method was carried out through the presentation of material and practice. Entrepreneurship training was held at the Bantul Health Vocational School on October 4 and 25, 2023, and was attended by 75 students. To measure the increase in knowledge before training, a pretest was carried out, and after training, a posttest was carried out. The results of the community service showed that after the training, there was an increase in the knowledge of Bantul Health Vocational School students by around 10.2%, including the meaning of herbal candy, parts of plants used for health, and the properties of several herbal plants for maintaining health. On average, students' understanding increased by 5% after receiving training in making product designs using Canva and increased by 8% after receiving training in using social media for product marketing. In conclusion, training in making herbal jelly candy and digital marketing has increased the knowledge and skills of Bantul Health Vocational School students.
A Classification Data Packets Using the Threshold Method for Detection of DDoS Sukma Aji; Davito Rasendriya Rizqullah Putra; Riadi, Imam; Fadlil , Abdul; Faiz , Muhammad Nur; Arif Wirawan Muhammad; Purwaningrum, Santi; Sari, Laura
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 1 (2024): JINITA, June 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i1.2224

Abstract

Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack. This type of attack, when performed against a target by many computers, is called a distributed denial of service (DDoS) attack. Technology and the Internet are growing rapidly, so many DDoS attack applications result in these attacks still being a serious threat. This research aims to apply the Threshold method in detecting DDoS attacks. The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.
Vulnerability Detection With K-Nearest Neighbor and Naïve Bayes Method using Machine Learning Herman, Herman; Riadi, Imam; Kurniawan, Yudi
International Journal of Artificial Intelligence Research Vol 7, No 1 (2023): June 2023
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v7i1.795

Abstract

In this day and age, the use of the Internet has increased. SQL injection is a serious security threat on the Internet for various dynamic websites. As the use of the Internet for various online services increases, so make the security threats that exist on the Web. SQL injection attacks are one of the most serious security vulnerabilities on the Web. Most of these vulnerabilities are caused by a lack of input validation and the use of SQL parameters. SQLMap is an application from the Kali Linux operating system that is useful for injecting data on a website by using the features available in this application. In this paper, author conducts a security assessment to detect attacks on a website, more precisely to detect SQL Injection attacks, using the K-Nearest Neighbor method and naïve bayes. The results obtained are that the website being tested has SQL Injection vulnerabilities, and the K-Nearest Neighbor method is the best method for this case because it has an accuracy of 94.2%. In comparison, the Naïve Bayes method has an accuracy of 80%.
Co-Authors ., Andi Zulherry Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Nugrahantoro Achmad Syauqi Ade Davy Wiranata Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Apriliani, Evinda Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Asruddin, Asruddin Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bahagiya, Multika Untung Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Davito Rasendriya Rizqullah Putra Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Ediansa, Oka Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fadlil , Abdul Fahmi Anwar Fahmi Auliya Tsani Faiz , Muhammad Nur Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Faulinda Ely Nastiti Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fithriatus Shalihah Fitri, Fitriyani Tella Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Harman, Rika Haryanto, Eri Helmiyah, Siti Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhram, Ridho Ikhsan Zuhriyanto Ikhwan Anshori Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Handoyo Joko Triyanto Kariyamin, Kariyamin Kartoirono, Suprihatin Kurniawan, Endang Kurniawan, Gusti Chandra Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Muchlas Muchlas Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murinto Murinto Murni Murni Murti, Raden Hario Wahyu Musa, Shahrulniza Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Faiz, Muhammad Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Nurmi Hidayasari Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi, Rizal Prambudi Prasetyaningrum, Putri Taqwa Prasongko, Riski Yudhi Purwaningrum, Santi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Raden Mohamad Herdian Bhakti Rafiq, Irhash Ainur Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Robiin, Bambang Rochmadi, Tri Roni Anggara Putra Rudy Ansari, Rudy Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Safiq Rosad Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Sari, Laura Shiha Budin Sismadi, Wawan Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sudinugraha, Tri Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - sunardi sunardi Sunardi Sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Supriyanto Suryanto, Farid Syaefudin, Rizal Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Triyanto, Joko Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wahyusari, Retno Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro Widiandana, Panggah WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad