p-Index From 2021 - 2026
18.036
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Indonesian Journal of Business Intelligence (IJUBI) Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia EDUTECH : Jurnal Inovasi Pendidikan Berbantuan Teknologi J-SAKTI (Jurnal Sains Komputer dan Informatika) Decode: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Scientific Journal of Informatics Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JOCHAC
Claim Missing Document
Check
Articles

Monitoring and Control Food Temperature and Humidity using Internet of Things Based-on Microcontroller Riadi, Imam; Syaefudin, Rizal
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol. 7 No. 1 (2021): April
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v7i1.20213

Abstract

Tempe is a traditional Indonesian food that uses tempeh mushrooms (Rhizopuz Oryzae) to make it. Tempeh fungus on soybeans requires a certain temperature and humidity in order to grow properly. In this study, a tool was built to monitor and control temperature and humidity with an online system using the ESP8266 WiFi Module with the ESP8266-01 series, which then the data will be sent to Thingspeak and Thingsview. The method used in this study through several stages, including Hardware Design, Internet of Things (IoT) Design or Network Architecture, Testing, and Measuring temperature and humidity values. The hardware design includes Microcontroller-based system hardware to help control temperature and humidity. IoT design or network architecture steps to make connections between hardware and software, while the last stage is testing and measuring the temperature and humidity values to determine the accuracy of the system being made. The Temperature and Humidity settings are carried out automatically using the Arduino Board to control Heater and Fan. The average temperature and humidity values generated in the measurement were 33.11 C and 87.74%. This tool has a measurement accuracy compared to other measuring instruments with a standard deviation of temperature error of 0.8708 and humidity 1.1254 for 180 data samples for 3 days. In this study, the system functions properly with the control system functioning properly, and the reading of the value produces a good standard deviation.
Prediction of Presidential Election Results using Sentiment Analysis with Pre and Post Candidate Registration Data Firdaus, Asno Azzawagama; Yudhana, Anton; Riadi, Imam
Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika Vol. 10 No. 1 (2024): April 2024
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v10i1.4836

Abstract

Social-media is a solution for politicians as a campaign tool because it can save costs compared to conventional campaigns. The 2024 Indonesian presidential election has attracted public attention, especially among social media users. Twitter, as one of the most widely used social media platforms in Indonesia, has become an effective campaign platform. Sentiment analysis is one approach that can be used to measure public opinion on Indonesian presidential candidates based on Twitter data. The data was collected before the declaration of candidates in March 2023 and shortly after the registration of presidential and vice-presidential candidates in November 2023. The data obtained amounted to 15,000 in March 2023 collection and 11,569 in November 2023 collection and used manual labeling by linguists. After removing duplicated tweets, the data changed to 10,569 data with each candidate having 3,523 data for March 2023 and 4,893 data, with each candidate pair having 1,631 data for November 2023. The sentiment analysis classification model is determined using the Naïve Bayes and Support Vector Machine (SVM) methods with Term Frequency-Inverse Document Frequency (TF-IDF) feature extraction. Based on the data, the highest percentage of positive sentiment for the data obtained in March 2023 is for Ganjar Pranowo data by 77.94% and the highest percentage of negative sentiment is for Anies Baswedan data by 31.39%. Meanwhile, for the data obtained in November 2023, the highest positive sentiment was obtained for the candidate pair Ganjar Pranowo - Mahfud MD by 69.16%, and the highest negative sentiment was found in the data Prabowo Subianto - Gibran Rakabuming Raka by 52.12%. Words that frequently appeared in the positive sentiment for Ganjar Pranowo - Mahfud MD included "strong", "corruption", "support", "appreciation", and others. This research achieved the highest accuracy for SVM method which is 86% and Naive Bayes method which is 79%.
PERFORMANCE ANALYSIS OF REAL TIME STREAMING PROTOCOL (RTSP) AND REAL TIME TRANSPORT PROTOCOL (RTP) USING VLC APPLICATION ON LIVE VIDEO STREAMING Kariyamin, Kariyamin; Riadi, Imam; Herman, Herman
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.4.698

Abstract

Video is a means of delivering very complete information and can be implemented using streaming technology. Networking services for local media exchange are helpful in teaching and learning activities, such as simultaneous video playback. Submission of information in the form of this video can be done by unicast, multicast or Broadcast packet delivery Live video streaming using RTP and RTSP protocol. The test was done through three experiments ie unicast, multicast and broadcast for five times. The output occurring at (RTP) is 4.73 MBit / sec for 5 client, higher than from (RTSP) of 13.799 MBit / sec for 5 client. This test occurs a very high Delay on RTP while RTSP has a low Delay in RTP. Meanwhile, the packet loss that occurs in (RTP) is 124.50% lower than (RTSP) which is 6.06% from 5 clients each. Because RTSP is an applicationlevel protocol for data delivery control that has real time characteristics such as streaming media. While RTP is designed not for streaming but to handle the actual data transmission of data in the form of sound or image or both, especially those based on real time such as streaming media.
COMPARING THE PERFORMANCE OF OSPF AND OSPF-MPLS ROUTING PROTOCOL IN FORWARDING TCP AND UDP PACKET Miswar, Nur; Herman, Herman; Riadi, Imam
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.1456

Abstract

Routing is an important process in computer networks, which involves selecting a path for packet data. The routing mechanism is governed by protocols at layer three of the OSI model or layer two of the TCP/IP model. Routing can be static or dynamic, with dynamic routing algorithms automatically determining the best path in the network. One commonly used dynamic routing protocol is Open Shortest Path First (OSPF), which automatically selects the optimal route for data packets based on received network topology information. The need for more advanced and scalable routing solutions led to the development of Multi-Protocol Label Switching (MPLS), introducing the concept of label switching for faster and more efficient data forwarding. This research aims to analyze the performance of OSPF and OSPF MPLS routing scenarios regarding TCP and UDP services. Through evaluation of Quality of Service (QoS) parameters, including throughput, packet loss, delay, and jitter. This study simulates the network using GNS3 software, with TCP and UDP services transmitted for durations of 15, 30, and 60 seconds. The results showed performance for both scenarios with an average index value of 3.75, indicating "good" network performance according to TIPHON standards across all measurement sessions. Although MPLS OSPF showed slightly lower throughput compared to non-MPLS OSPF, both scenarios showed very low packet loss, low delay, and stable jitter. The evaluation also highlights that the use of OSPF MPLS for UDP services reduces the time delay. Both non-MPLS OSPF and MPLS OSPF effectively support TCP and UDP services, with MPLS OSPF showing advantages in certain QoS parameters, especially for UDP services.
Evaluating Synthetic Minority Oversampling Technique Strategies for Diabetes Mellitus Classification using K-Nearest Neighbors Algorithm Riadi, Imam; Yudhana, Anton; Kurniawan, Gusti Chandra
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.5.5189

Abstract

Data-driven classification of Diabetes Mellitus is a crucial strategy in developing medical decision support systems that are both accurate and efficient. A major challenge in this classification task is the imbalanced class distribution, which tends to reduce the model’s sensitivity to positive cases. This research utilizes a dataset of 1,000 patient medical records obtained from the Mendeley Data repository, containing clinical attributes relevant to diabetes diagnosis. This research examines the impact of various K values on the K-Nearest Neighbors (KNN) algorithm when it is combined with the SMOTE oversampling technique to enhance classification performance. The experiment employs a 10-Fold Cross-Validation methodology with five principal assessment metrics: accuracy, precision, recall, F1-score, and Area Under Curve (AUC). Compared to prior studies, this work advances the methodology by applying SMOTE within each fold of the cross-validation process, effectively preventing data leakage and improving model generalizability. Results indicate that the K=3 configuration yields the highest F1-score of 95.13% and recall of 91.83%, while the highest AUC of 96.40% is achieved at K=9 with lower sensitivity. Applying SMOTE within each fold of the cross-validation process preserves evaluation integrity and prevents potential data leakage. The model demonstrates the ability to detect positive cases more effectively while maintaining high precision. These findings highlight that combining KNN with SMOTE and proper validation strategy is a promising approach for developing a reliable early detection system for Diabetes Mellitus that is adaptive to imbalanced clinical data.
Comparison of Digital Forensic Tools for Drug Trafficking Cases on Instagram Messenger using NIST Method Nahdli, Muhammad Fahmi Mubarok; Riadi, Imam; Biddinika, Muhammad Kunta
Scientific Journal of Informatics Vol. 11 No. 4: November 2024
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v11i4.13463

Abstract

Purpose: Cybercrime is an unlawful act that utilizes computer technology and the development of the internet. Cybercrime can occur on all electronic devices, including Android smartphones. Forensic handling, particularly mobile forensics, has become crucial in addressing drug trafficking cases conducted through Instagram. As the primary device for accessing Instagram, smartphones store digital data that can serve as evidence in investigations. This research aims to produce a more accurate comparison of results in analyzing Instagram Messenger data containing content related to drug trafficking. Methods: The digital evidence data used in this research included five types of data: text chat, account, image, audio, and image view once. The forensic tools for obtaining digital evidence were MOBILedit, Belkasoft, Mobile Forensic SPF, and Magnet Axiom. The method proposed in this research followed the NIST framework, which consists of four stages: collection, examination, analysis, and reporting. This research followed the NIST framework because it is widely recognized in the field of digital forensics and provides a comprehensive guideline for handling digital evidence. Result: Research results showed that Magnet Axiom had the best performance in digital forensic analysis, with a success rate of 74.1%. MOBILedit Forensic had a success rate of 62.5%, indicating lower performance. Mobile Forensic SPF had a success rate of 44.6%. In comparison, Belkasoft had the lowest success rate of 23.2%, showing that this software could be more effective in detecting and analyzing digital data than the others. Novelty: In this study, the analysis process was conducted using four digital forensic tools, each showing variations in terms of efficiency and effectiveness. Each tool has advantages and disadvantages regarding speed, accuracy, and ability to extract and manage data.
Analisis Forensik Digital Pada Whatsapp Dan Facebook Menggunakan Metode NIST Ruslan, Takdir; Riadi, Imam; Sunardi, Sunardi
JURNAL FASILKOM Vol. 13 No. 02 (2023): Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer)
Publisher : Unversitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/jf.v13i02.5540

Abstract

Technological developments can make it easier for Smartphone users to share various kinds of information using instant messaging applications such as Facebook Messenger and WhatsApp, the features contained in these instant messaging applications can send messages in the form of text, audio, images, videos and documents. The increase in the number of users of instant messaging applications also has a negative impact, namely the emergence of individuals who abuse instant messaging applications for digital crimes such as fraud, pornography, and drug sales. Disclosure of crimes requires valid digital evidence. In conducting investigations of digital crime cases, digital evidence is needed to solve them. Retrieval of digital evidence requires a forensic process of the physical evidence that has been obtained. This research focuses on the forensic process to obtain digital evidence from an Android Smartphone in the form of audio and video in the Facebook Messenger and WhatsApp applications. The forensic tools used in this research are Oxygen Forensic Pc Suite 2014, MOBILedit Forensic, Belkasoft evidence, and Magnet Axiom. The research uses a framework from the National Institute of Standards and Technology (NIST). The results of the research using the NIST method on an Android Smartphone were that Belkasoft succeeded in recovering deleted data with a percentage of 50% audio and 41% video on the WhatsApp application while on Facebook Messenger only 8.33% audio and 41% video, Magnet Axiom with a data percentage of 100%. audio and 100% video while Facebook Messenger has 8.33% audio and 5% video, on MOBILedit with a percentage of 0% on both applications, and Oxygen manages to return 16.67% audio and 23.5% video from the WhatsApp application and 0% for Facebook Messenger
Analysis Impact of Rapid Application Development Method on Development Cycle and User Satisfaction: A Case Study on Web-Based Registration Service Riadi, Imam; Yudhana, Anton; Elvina, Ade
Scientific Journal of Informatics Vol 11, No 1 (2024): February 2024
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v11i1.49590

Abstract

Purpose: This research was conducted to respond to obstacles and inefficiencies in the new student registration system at RA Plus Rabbani. Currently, the conventional method of using physical documents for registration is vulnerable to damage and data loss. Therefore, the proposed solution is implementing a website-based online registration system using the Rapid Application Development (RAD) method. This aims to simplify the process, increase accessibility for prospective students, and reduce the costs and time required.Methods: This research commenced by identifying constraints within the conventional student registration system at RA Plus Rabbani through observations and interviews. The development, following the RAD methodology, involved testing with PHPUnit and Blackbox Testing to ensure the functionality of the system aligned with specifications. In addition, usability evaluation was conducted based on the ISO 9126 standard.Result: The research results show that testing on MVC indicated a 100% success rate for each architectural feature. Referring to expectations with a “valid” conclusion on functionality using Blackbox testing, based on ISO 9126 percentage displayed, it is known that the criterion with the most significant value is the understandability characteristic with a value of 83%. Novelty: This research makes a significant contribution by improving student registration services at RA Plus Rabbani through the implementation of various testing techniques, following the research flow offered by RAD. The study also provides substantial references for further research in web-based system development.
TINJAUAN SISTEMATIS QUALITY OF SERVICE PADA LAYANAN JARINGAN SOFTWARE DEFINED NETWORKING Wiranata, Ade Davy; Sunardi, Sunardi; Riadi, Imam
Infotech: Journal of Technology Information Vol 11, No 2 (2025): NOVEMBER
Publisher : ISTEK WIDURI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37365/jti.v11i2.422

Abstract

Software-Defined Networking (SDN) offers revolutionary flexibility and centralized management, yet ensuring reliable Quality of Service (QoS) for various applications remains a primary challenge. Although extensive research on QoS in SDN has been published, the proposed architectures, methods, and evaluation metrics are often disparate and complex. Consequently, A discernible gap exists in the current literature regarding a comprehensive survey of the research landscape for QoS in SDN. This literature review aims to identify and analyze the research trends, architectures, methods, and metrics related to QoS in SDN published between 2020 and 2025. Based on inclusion and exclusion criteria, 80 studies on QoS in SDN were identified. The analysis reveals four main research topics: Resource Management (45%), QoS-aware Routing (30%), Traffic Classification (20%), and QoS Security (5%). The majority of studies (70%) utilize simulation environments such as Mininet, while 30% employ physical testbeds In terms of methodology, it was found that mathematical optimization approaches such as Mixed-Integer Linear Programming (MILP) are still the most frequently implemented. However, there is a very clear trend of increasing proposals for Machine Learning (ML)-based methods, particularly Reinforcement Learning, as a solution for dynamic QoS management. This review provides a holistic view for researchers and practitioners to understand the current state and future direction of QoS research in SDN environments.
Integrasi Blockchain dan Algoritma Kriptografi Untuk Perlindungan Data Pribadi: Tinjauan Literatur Sistematis 2021- 2025 Mubarak, Roy; Riadi, Imam; Sutikno, Tole
Jurnal Informatika Vol 25 No 2 (2025): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/jurnalinformatika.v25i110

Abstract

 Personal data has become a highly valuable asset in the rapidly evolving digital era. However, the increasing reliance on digital technology also poses serious cybersecurity threats, including data breaches, hacking, and misuse of personal information. Increasingly frequent data leaks in social media applications, e-wallets, and ecommerce platforms highlight the urgency of protecting user privacy. Despite the implementation of stricter regulations such as the GDPR in Europe and the Personal Data Protection Act (PDPA) in Indonesia, personal data security remains a significant challenge. This study aims to identify and analyse variables that contribute to improving personal data security amidst cyber threats in the digital era. The variables examined include: objects, frameworks, methods, and tools used. The approach used in this study was a systematic literature review using the PRISMA method, which examined 85 papers from three major databases (Google Scholar, IEEE, and Springer) between 2021 and 2025. The results show a trend of integrating blockchain technology with cryptography, smart contracts, and artificial intelligence to strengthen personal data protection and ensure compliance with global privacy regulations. This research concludes that blockchain has significant potential to address cyber threats and could become an innovative solution for future personal data protection. This article also outlines current research contributions and the development direction needed in the field of blockchain-based data security and cryptographic techniques.
Co-Authors ., Andi Zulherry Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Nugrahantoro Achmad Syauqi Ade Davy Wiranata Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Apriliani, Evinda Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Asruddin, Asruddin Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bahagiya, Multika Untung Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Davito Rasendriya Rizqullah Putra Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Ediansa, Oka Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fadlil , Abdul Fahmi Anwar Fahmi Auliya Tsani Faiz , Muhammad Nur Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Faulinda Ely Nastiti Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fithriatus Shalihah Fitri, Fitriyani Tella Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Harman, Rika Haryanto, Eri Helmiyah, Siti Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhram, Ridho Ikhsan Zuhriyanto Ikhwan Anshori Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Handoyo Joko Triyanto Kariyamin, Kariyamin Kartoirono, Suprihatin Kurniawan, Endang Kurniawan, Gusti Chandra Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Muchlas Muchlas Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murinto Murinto Murni Murni Murti, Raden Hario Wahyu Musa, Shahrulniza Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Faiz, Muhammad Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Nurmi Hidayasari Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi, Rizal Prambudi Prasetyaningrum, Putri Taqwa Prasongko, Riski Yudhi Purwaningrum, Santi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Raden Mohamad Herdian Bhakti Rafiq, Irhash Ainur Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Robiin, Bambang Rochmadi, Tri Roni Anggara Putra Rudy Ansari, Rudy Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Safiq Rosad Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Sari, Laura Shiha Budin Sismadi, Wawan Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sudinugraha, Tri Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - sunardi sunardi Sunardi Sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Supriyanto Suryanto, Farid Syaefudin, Rizal Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Triyanto, Joko Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wahyusari, Retno Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro Widiandana, Panggah WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad