p-Index From 2021 - 2026
18.036
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Indonesian Journal of Business Intelligence (IJUBI) Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia EDUTECH : Jurnal Inovasi Pendidikan Berbantuan Teknologi J-SAKTI (Jurnal Sains Komputer dan Informatika) Decode: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Scientific Journal of Informatics Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JOCHAC
Claim Missing Document
Check
Articles

Comparative Analysis of Keypoint Detection Performance in SIFT Implementations on Small-Scale Image Datasets Arif Rahman; Suprihatin; Imam Riadi; Tawar; Furizal
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 2 (2024): JINITA, December 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i2.2399

Abstract

Scale-invariant feature transform (SIFT) is widely used as an image local feature extraction method because of its invariance to rotation, scale, and illumination change. SIFT has been implemented in different program libraries. However, studies that analyze the performance of SIFT implementations have not been conducted. This study examines the keypoint extraction of three well-known SIFT libraries, i.e., David Lowe's implementation, OpenSIFT, and vlSIFT in vlfeat. Performance analysis was conducted on multiclass small-scale image datasets to capture the sensitivity of keypoint detection. Although libraries are based on the same algorithm, their performance differs slightly. Regarding execution time and the average number of keypoints detected in each image, vlSIFT outperforms David Lowe’s library and OpenSIFT.
The Effect of Light Intensity, Camera Pixel Quality, Camera Distance, and Object Altitude on Detection Accuracy in a Real-Time Drone Surveillance System Using YOLOv5 Astika Ayuningtyas; Imam Riadi; Anton Yudhana
Journal of Innovation Information Technology and Application (JINITA) Vol 7 No 2 (2025): JINITA, December 2025
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v7i2.2843

Abstract

This research evaluates the performance of the drone detection system based on YOLOv5 in a variety of environmental conditions. The four main variables under test were drone height, camera type, light intensity, and camera-to-object distance. Thirty-six different scenarios were used with three different camera types (1080p, 2K, and Canon 600D). The height of the drones varied from 1 to 14 meters, and the variations in illumination ranged from 0 to 46 lux. Results showed consistent YOLOv5 performance with an average accuracy of 60%, precision of 62%, recall of 58%, F1-score of 60%, and IoU of 75%. ANOVA revealed that light intensity, camera distance, and drone height all had a significant impact on detection accuracy (p < 0.05), but camera type was not statistically significant. The best results were obtained under the following conditions: high light levels (>40 lux), camera distances <10 m, and drone altitudes between 6 and 9 m. These findings demonstrate the importance of environmental setup in improving the performance of object detection systems based on deep learning. This research helps design a more reliable and adaptable drone detection system for real-world applications. This work provides practical guidelines for implementing deep learning-based aerial surveillance and highlights optimal operational parameters for YOLOv5 systems.
Penetration Testing with OWASP Mobile for Android Security Optimization Deco Aprilliansyah; Imam Riadi; Sunardi
Journal of Cyber Health and Computer Vol 1 No 1 (2023): Journal of Cyber Health and Computer (JOCHAC)
Publisher : SIBER PRESS Universitas SIBERMU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.64163/jochac.v1i1.3

Abstract

Security and privacy are very important on android devices to prevent crimes such as the theft of data and confidential information for users. There are many attack methods that can be carried out by irresponsible parties, one of which is penetration testing. The need to improve the security of android devices from cyber crimes that can occur at any time so that the security and information belonging to users are more secure. Based on this, this study offers how attackers perform penetration testing on targets using android devices using the OWASP Mobile framework based on the steps in the Security Testing Guide (OWASP MSTG) manual. The penetration testing activity is carried out in five steps. Namely, injection of backdoors on the application, finding vulnerabilities, scanning, exploiting and making reports. The results of this study obtained some information on application IOCs and other information in the form of contact data, SMS data, and audio records belonging to the attacked device. Based on this, this research can be used by security parties to patch loopholes in their applications and systems.
TINJAUAN SISTEMATIS TREN, METODE, DAN DATA PADA PREDIKSI KELULUSAN MAHASISWA Ansari, Rudy; Sunardi, Sunardi; Riadi, Imam
Indonesian Journal of Business Intelligence (IJUBI) Vol 8 No 2 (2025): Indonesian Journal of Business Intelligence (IJUBI)
Publisher : Universitas Alma Ata

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21927/ijubi.v8i2.6551

Abstract

Penelitian tentang prediksi kelulusan mahasiswa banyak dipublikasikan akan tetapi biasanya metode beserta data yang dihasilkan dikemas secara terpisah dan kompleks sehingga gambaran tentang topik prediksi kelulusan mahasiswa saat ini kurang komprehensif. Tinjauan literatur ini bertujuan untuk mengidentifikasi dan menganalisis tren penelitian, dataset, dan metode tentang prediksi kelulusan mahasiswa yang dipublikasikan antara tahun 2020-2025. Berdasarkan kriteria inklusi dan ekslusi, tercatat sebanyak 75 artikel dari 199 artikel yang bersumber pada jurnal kuartil 1-4. Tinjauan literatur sistematis dapat didefinisikan sebagai proses mengidentifikasi, menilai, dan menginterpretasikan semua bukti penelitian yang tersedia untuk memberikan jawaban atas pertanyaan penelitian yang spesifik. Hasil analisis dalam lima tahun terakhir mengungkapkan bahwa penelitian prediksi kelulusan mahasiswa terdapat empat topik yaitu prediksi/klasifikasi, analisis dataset, pengelompokan (clustering), dan estimasi. Selain itu,  terdapat juga dua tren yang dibahas yaitu pemilihan fitur (feature selection) dan data tidak seimbang (imbalance data). Kategori data yang digunakan pada lima tahun terakhir lebih banyak menggunakan data private atau data real sebanyak 91% daripada data public. Metode yang paling sering digunakan pada topik-topik tersebut adalah Random Forest (RF), dan paling jarang yaitu metode Artificial Neural Network (ANN). Terdapat juga penggabungan metode untuk optimasi parameter di beberapa klasifikasi.
Eksplorasi Teknik Pre-Processing Berbasis eXtreme Gradient Boosting (XGBoost) pada Serangan DDoS Nur Faiz, Muhammad; Sari, Laura; Imam Riadi; Arif Wirawan Muhammad; Sukma Aji
JURNAL RISET KOMPUTER (JURIKOM) Vol. 12 No. 6 (2025): Desember 2025
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v12i6.9380

Abstract

Distributed Denial of Service (DDoS) attacks represent a critical threat to modern network security, particularly within Internet of Things (IoT) environments characterized by large-scale and heterogeneous traffic patterns. The primary challenges in detecting such attacks involve class imbalance, irrelevant features, and noise within the data, all of which can degrade the performance of machine learning-based detection models. This study evaluates the impact of a pre-processing pipeline—comprising the Synthetic Minority Over-sampling Technique (SMOTE), correlation-based feature selection, and advanced feature selection methods—on the performance of the XGBoost algorithm in detecting DDoS attacks using the CIC-IoT2023 dataset. Experimental results indicate that the XGBoost model trained on RAW data achieves exceptionally high performance, with an accuracy of 0.999983, precision of 0.985531, recall of 0.961390, and an F1-score of 0.999983. However, after applying the pre-processing techniques, all metrics experienced a decline, with accuracy decreasing to 0.958899, precision to 0.865729, recall to 0.748332, and the F1-score to 0.959158. The reduction in recall suggests a higher number of undetected attacks, whereas the drop in precision indicates an increase in false alarms. Nevertheless, the F1-score remaining above 0.95 demonstrates that the model continues to perform effectively overall. These findings reveal that pre-processing does not always lead to performance improvements, especially when the raw dataset is already relatively clean and balanced. This study provides deeper insights into how SMOTE, feature selection, and noise injection influence the generalization of XGBoost on IoT traffic, and emphasizes that the effectiveness of pre-processing is highly dependent on dataset characteristics and the intended application context of intrusion detection systems.
Klasifikasi Tingkat Serangan pada Log Jaringan Siber dengan Komparasi Naive Bayes dan K-Nearest Neighbor Apriliani, Evinda; Winiarti, Sri; Riadi, Imam; Yuliansyah, Herman
Building of Informatics, Technology and Science (BITS) Vol 7 No 3 (2025): December 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v7i3.8765

Abstract

The increasing threat of cybersecurity poses a significant impact on both organizations and individuals, necessitating a system capable of accurately detecting and classifying attack levels to support prioritization of responses. This study aims to analyze and compare the performance of two machine learning algorithms, Naive Bayes and K-Nearest Neighbor (KNN), in classifying cyberattack levels, and to evaluate the effect of hyperparameter tuning on improving model accuracy. The research methods included utilizing the cybersecurity_attacks dataset, data preprocessing, model training at three data split ratios (70:30, 80:20, and 90:10), and parameter optimization using Randomized Search and Grid Search. Performance evaluation was based on accuracy, precision, recall, and F1-score values. The results showed that KNN performed best, with a peak accuracy of 0.96 at the 80:20 ratio after tuning, increased from an accuracy of 0.947 before tuning, with precision, recall, and F1-score values ​​ranging from 0.95 to 0.96. Meanwhile, Naive Bayes only achieved a peak accuracy of 0.8485 at the same ratio. Although the improvement after hyperparameter tuning was not significant, this process still resulted in a more stable and consistent model. Future research is recommended to explore ensemble methods and test them on other datasets to produce more adaptive cyberattack classification models.
Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework Imam Riadi; Herman Herman; Nur Hamida Siregar
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 21 No. 3 (2022)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v21i3.1620

Abstract

The COVID-19 pandemic is one of the factors that has increased the use of social media. One of the negative impacts of using social media is the occurrence of cybercrime. The possibility of cybercrime can also happen on one of the social media platforms, such as the Signal Messenger application. In the investigation process, law enforcement needs mobile forensic methods and appropriate forensic tools so that the digital evidence found on the perpetrator's smartphone can be accepted by the court. This research aims to get digital evidence from cases of spreading the COVID-19 vaccine hoaxes. The method used in this research is a mobile forensics method based on the Digital Forensic Research Workshop (DFRWS) framework. The DFRWS framework consists of identification, preservation, collection, examination, analysis, and preservation. The results showed that the MOBILedit tool could reveal digital evidence in the form of application information and contact information with a performance value of 22.22%. Meanwhile, Magnet AXIOM cannot reveal digital evidence at all. The research results were obtained following the expected research objectives.
Anomaly Detection in Cloud Device-Based Information Technology Infrastructure Using Isolation Forest Algorithm ., Andi Zulherry; Imam Riadi; Rusydi Umar
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol. 9 No. 2 (2026): Issues January 2026
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cloud device-based information technology infrastructure generates large volumes of operational data that are dynamic and heterogeneous, increasing the complexity of monitoring and anomaly detection processes. Conventional rule-based approaches and supervised learning methods are often less effective due to limited labeled data and their inability to detect newly emerging anomaly patterns. Therefore, this study aims to apply and evaluate the Isolation Forest algorithm as an anomaly detection method for cloud device-based information technology infrastructure. The research data consist of system and network performance metrics, including CPU usage, memory utilization, disk activity, and network traffic collected from a cloud environment. The research stages include data preprocessing, normalization, and feature selection to improve data quality and model performance. The Isolation Forest algorithm is implemented using an unsupervised learning approach, where anomalies are identified based on the algorithm’s ability to isolate data points that exhibit characteristics deviating from the majority of normal data. Model performance is evaluated using a confusion matrix with accuracy, precision, recall, and F1-score metrics, while parameter optimization is conducted using the grid search method to obtain the best configuration. The results indicate that the Isolation Forest algorithm is able to detect anomalies effectively, achieving high accuracy and a good balance between precision and recall. The model with optimal parameters demonstrates improved performance by reducing detection errors compared to the baseline configuration. Thus, the Isolation Forest algorithm can serve as a reliable and scalable solution to support monitoring activities and enhance the reliability of cloud infrastructure.
Workshop Literasi Digital dan Keamanan Informasi Bagi Guru dan Siswa SMA Negeri 1 Sedayu Riadi, Imam; Shalihah, Fithriatus; Prasetyaningrum, Putri Taqwa; Robiin, Bambang
Mohuyula : Jurnal Pengabdian Kepada Masyarakat Vol 4, No 2 (2025): Desember
Publisher : Universitas Muhammadiyah Gorontalo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31314/mohuyula.4.2.42-50.2025

Abstract

Perkembangan teknologi digital yang pesat menuntut peningkatan literasi digital dan kesadaran akan keamanan informasi di kalangan generasi muda, khususnya di tingkat SMA. Tujuan dari kegiatan pengabdian ini adalah untuk memberikan pelatihan mengenai literasi digital dan keamanan informasi kepada guru dan siswa SMA Negeri 1 Sedayu. Metode yang digunakan dalam pelatihan ini adalah pendekatan workshop interaktif yang meliputi ceramah, diskusi, dan simulasi praktis. Materi yang disampaikan mencakup pengenalan terhadap literasi digital, ancaman siber seperti phishing dan malware, serta cara melindungi data pribadi di dunia maya. Hasil dari kegiatan ini menunjukkan peningkatan signifikan dalam pemahaman peserta mengenai cara melindungi informasi pribadi dan mengenali ancaman siber. Berdasarkan evaluasi menggunakan pre-test dan post-test, peserta mengalami peningkatan pengetahuan mengenai literasi digital dan keamanan informasi, dengan 100% peserta mampu mengidentifikasi ancaman siber setelah pelatihan. Pelatihan ini juga berhasil meningkatkan kesadaran peserta tentang bahaya kejahatan siber, seperti cyberbullying, serta langkah-langkah pencegahan yang dapat dilakukan. Kesimpulannya, pelatihan ini berhasil mencapai tujuannya dalam meningkatkan pemahaman dan keterampilan peserta dalam menghadapi tantangan dunia digital. Diharapkan pelatihan ini dapat menjadi model untuk kegiatan serupa di sekolah lain, guna menciptakan lingkungan digital yang lebih aman dan bijak di kalangan generasi muda.
DECADE OF IT STRATEGIC PLANNING: SYSTEMATIC REVIEW OF FRAMEWORKS AND CRITICAL SUCCESS FACTORS Suhartono, Bambang; Sutikno, Tole; Riadi, Imam
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol. 11 No. 3 (2026): JITK Issue February 2026
Publisher : LPPM Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/jitk.v11i3.7068

Abstract

Strategic planning for information technology (PSTI) is a crucial element in ensuring alignment between an organisation's business objectives and the use of information technology. In the last decade, challenges have arisen in adopting appropriate frameworks, methods and principles, especially amidst the complexities of digital disruption. This study aims to conduct a systematic literature review (SLR) of PSTI-related research during the period 2015-2024 using the PRISMA 2020 approach, with literature searches from leading academic databases such as Scopus, IEEE Xplore, SpringerLink, and Google Scholar during the period 2015-2024. A total of 62 scientific articles were analysed to evaluate the frameworks used, business sectors based on KBLI, implementation methods, principles applied, and critical success factors and research gaps. The results showed that Ward & Peppard, TOGAF, and Tozer frameworks were the most dominant approach. Key success factors include top management support, business and IT strategy alignment, effective IT governance, and organisational capability. This study makes a significant contribution to the development of theoretical foundations and practical guidelines for adaptive PSTI implementation, the KBLI-PSTI mapping, the systensis of framework/ methods/ princiles, alignment factors & organizational capabilities,  and opens space for further research in less explored sectors
Co-Authors ., Andi Zulherry Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Nugrahantoro Achmad Syauqi Ade Davy Wiranata Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Apriliani, Evinda Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Asruddin, Asruddin Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bahagiya, Multika Untung Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Davito Rasendriya Rizqullah Putra Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Ediansa, Oka Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fadlil , Abdul Fahmi Anwar Fahmi Auliya Tsani Faiz , Muhammad Nur Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Faulinda Ely Nastiti Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fithriatus Shalihah Fitri, Fitriyani Tella Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Harman, Rika Haryanto, Eri Helmiyah, Siti Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhram, Ridho Ikhsan Zuhriyanto Ikhwan Anshori Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Handoyo Joko Triyanto Kariyamin, Kariyamin Kartoirono, Suprihatin Kurniawan, Endang Kurniawan, Gusti Chandra Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Muchlas Muchlas Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murinto Murinto Murni Murni Murti, Raden Hario Wahyu Musa, Shahrulniza Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Faiz, Muhammad Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Nurmi Hidayasari Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi, Rizal Prambudi Prasetyaningrum, Putri Taqwa Prasongko, Riski Yudhi Purwaningrum, Santi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Raden Mohamad Herdian Bhakti Rafiq, Irhash Ainur Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Robiin, Bambang Rochmadi, Tri Roni Anggara Putra Rudy Ansari, Rudy Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Safiq Rosad Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Sari, Laura Shiha Budin Sismadi, Wawan Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sudinugraha, Tri Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Supriyanto Suryanto, Farid Syaefudin, Rizal Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Triyanto, Joko Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wahyusari, Retno Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro Widiandana, Panggah WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad