p-Index From 2021 - 2026
10.132
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar JURNAL PENGABDIAN KEPADA MASYARAKAT Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer Jurnal Pengabdian UntukMu NegeRI Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Jurnal Informatika dan Rekayasa Elektronik RADIAL: JuRnal PerADaban SaIns RekAyasan dan TeknoLogi Mobile and Forensics Jurnal Pengabdian Masyarakat Bumi Raflesia Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat Jurnal Teknik Informatika (JUTIF) Jumat Informatika: Jurnal Pengabdian Masyarakat Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno JOINCS (Journal of Informatics, Network, and Computer Science) Insand Comtech : Information Science and Computer Technology Journal Jurnal Pengabdian Informatika (JUPITA) Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics Innovation, Technology, and Entrepreneurship Journal BACA: Jurnal Dokumentasi dan Informasi RADIAL: Jurnal Peradaban Sains, Rekayasa dan Teknologi Edumaspul: Jurnal Pendidikan
Claim Missing Document
Check
Articles

Rancang Bangun Sistem Informasi Keuangan Berbasis Web Multi User Dengan UML Rusydi Umar; Sarjimin Sarjimin; Arief Setyo Nugroho; Achmad Dito; Indra Gunawan
CYBERNETICS Vol 3, No 02 (2019): CYBERNETICS
Publisher : Universitas Muhammadiyah Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29406/cbn.v3i02.2198

Abstract

STIE XYZ in managing financial transactions still uses Microsoft Excel which is divided by year and type of payment. The purpose of this research is to build a systemized alternative application for managing financial transactions in accordance with financial management at STIE XYZ. Rapid Application Development (RAD) system development method was chosen because in this method a system can be developed within 180 days and the users are directly involved when developing the system so that the system is developed according to user needs. The RAD design process uses the Unified Modeling Language (UML) method. Dimension of Quality for Goods (Operations, Reliability and Durability, Conformance, Service Ability, Appearance and Perceived, and Quality) test scores> 75.50, 76.50 so that it can be concluded that the product is declared successful, the results of the benefit testing are based on the variables Usability, Learnability, Efficiency and Acceptability (ULEA) produces a value> 70 that is 90.65% so that it can be declared useful.
Pengembangan Input Generator untuk Simulasi Penjadwalan MPI Job dengan metode First Come First Serve-Ejecting Based Dynamic Scheduling (FCFS-EDS) dalam Sistem Grid Rusydi Umar
CYBERNETICS Vol 3, No 01 (2019): CYBERNETICS
Publisher : Universitas Muhammadiyah Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (225.938 KB) | DOI: 10.29406/cbn.v3i01.1813

Abstract

Menjadwalkan MPI job dalam sistem grid berdasarkan reservasi yaitu First Come First Serve – Ejecting Based Dynamic Ejecting (FCFS-EDS) masuk ke dalam kategori flexible advance reservation, bersifat dinamis dalam sudut pandang logika. Karena sifat penjadwalannya yang dinamis dan sudut pandangnya adalah lojik maka sulit dipahami bagaimana proses penjadwalannya. Simulasi Penjadwalan MPI job berdasarkan reservasi dengan metode FCFS-EDS telah dibuat, dan input dari simulasi tersebut adalah file teks. File teks tersebut berisi spesifikasi input dari program simulasi dan rangkaian spesifikasi dari job yang datang untuk dijadwalkan. Selama ini file input dibuat secara manual, oleh karena itu sangat rentan terjadi kesalahan. Di makalah ini akan menjelaskan bagaimana caranya membuat program aplikasi input generator yang sudah ditentutakan spesifikasi inputnya diawal, sehingga file teks tersebut dapat dibuat dengan dengan berbagai macam variasi sepesifikasi input dan akan terhindar dari kesalahan. Dari pengujian, perangkat lunak ini layak untuk diimplementasikan
Klasifikasi Kinerja Programmer pada Aktivitas Media Sosial dengan Metode Support Vector Machines Rusydi Umar; Imam Riadi; Purwono Purwono
CYBERNETICS Vol 4, No 01 (2020): CYBERNETICS
Publisher : Universitas Muhammadiyah Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29406/cbn.v4i01.2042

Abstract

Peningkatan kebutuhan software di berbagai perusahaan terus meningkat. Kualitas software yang dibutuhkan harus memiliki nilai manfaat yang tinggi bagi perusahaan. Kesalahan dalam perekrutan programmer berakibat fatal terhadap kualitas software yang dihasilkan. Perekrutan profesi ini harus dilakukan dengan prosedur yang benar. Meningkatnya penggunaan media sosial dapat dijadikan sebagai salah satu metode perekrutan kandidat profesional karena sebelumnya belum banyak menyentuh aspek ini. Media sosial telah merekam aktivitas digital yang dilakukan oleh kandidat programmer dalam bentuk data posting sebagai pola kinerja mereka. Tujuan dari penelitian ini adalah menemukan pola kinerja baik atau buruknya programmer dengan cara melakukan klasifikasi berdasarkan postingan media sosial. Penelitian ini berupa implementasi dari metode SVM yang digunakan sebagai sistem klasifikasi otomatis. Hasil penelitian menunjukan persentase akurasi dengan k=10 cross-validation untuk algoritma SVM mencapai angka tertinggi 85,1%, sehingga metode ini dianggap cukup baik dalam melakukan klasifikasi.
Virus Detection In Windows 10 Using Nist Method And Smadav Application 13.4: Virus Detection In Windows 10 Using Nist Method And Smadav Application 13.4 Ahmad Fajar Sidiq; Anton Yudhana; Rusydi Umar
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (760.335 KB)

Abstract

This research has a background in virus detection on a computer, because a virus is something that can damage and damage data on a computer, because the impact is very bad for the computer so that many anti-virus viruses develop and continue to be developed each year, the development of the virus first against anti-virus causes the impact of damage that is getting worse, the most severe is data loss, data is very important for a computer, in this study the authors use a method created by the National Institute of Standards and Technology (NIST), with this method will facilitate research carried out, the results of the study will be in the form of detection carried out by the Smadav software version 13.4.
Bruteforce In The Hydra Process And Telnet Service Using The Naïve Bayes Method: Bruteforce In The Hydra Process And Telnet Service Using The Naïve Bayes Method Tarisno Amijoyo; Rusydi Umar; Anton Yudhana
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (759.536 KB)

Abstract

Internet technology is increasingly developing, in accordance with the needs of an increasingly millennial society. The growth of internet technology has been accompanied by an increasing variety of attack techniques aimed at the media. BruteForce is one of the techniques of attack (hacking) against the internet network by hacking passwords from users who are active or inactive at that time. Through a process with a small application such as Hydra accompanied by telnet service, then hacking techniques with BruteForce can be run, to attack an internet network. The Hydra process and the telnet service referred to in the study are those that included a "wordlist" file containing user information and password data. The count to detect, whether entering the network is a BruteForce attack or just normal / normal network traffic, can be done with the Naïve Bayes theorem or the Naïve Bayes method. The purpose of the Naïve Bayes method, is to be able to distinguish and classify, which is attack traffic, which is normal / normal network traffic. The reason for using the Naïve Bayes method is that the formulation in this method is easier to calculate when classifying the type of network traffic. From the results of the classification, it can be used as a reference for a network administrator to be more careful and better understand how to protect and prevent attacks from hackers, especially those who use BruteForce hacking techniques. The hope of this research, can be understood and understood so that it can be very easy for a network administrator to distinguish between the two traffic on the network, whether it is attack traffic and / or normal / normal traffic that is through the display on the Wireshark tool.
Database Forensics in Software as A Service Service using Stored Procedure Rusydi Umar; Imam Riadi; Purwanto Purwanto
Jurnal Mantik Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Recently, the use of web-based applications has increased significantly, especially online services, most of which are used for digital transaction activities that use the internet. However, the increasing use of online services often ignores the privacy and security aspects of an application, web developers making it an attractive target for security concerns. In this article, the proposed countermeasures include two mechanisms, namely: the use of stored procedure parameters, and the use of stored procedure encryption in SQL server. The goal is to prevent the dangers of internet crime attacks using structured query language injection attacks (SQLIA). In addition, an analytical evaluation of prevention and protection should also be carried out. The solution offered is prevention and protection using stored procedures because it can prevent SQLI attacks effectively and efficiently.
ANALISIS FORENSIK APLIKASI DOMPET DIGITAL PADA SMARTPHONE ANDROID MENGGUNAKAN METODE DFRWS Rusydi Umar; Anton Yudhana; Muhammad Noor Fadillah
KLIK- KUMPULAN JURNAL ILMU KOMPUTER Vol 9, No 2 (2022)
Publisher : Lambung Mangkurat University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/klik.v9i2.327

Abstract

Along with the emergence of app digital wallet in Indonesia, the use of smartphone devices has the function not only as a communication tool, but also began to be used as a tool to perform payment transactions. There are some companies financial technology in Indonesia, which offers a digital wallet service. Behind the ease of that is given of the use of the app a digital wallet, the utilization of the negative-tipped in the case of cybercrime. This research will make the process of forensic on one of the wallet app digital popular in Indonesia, using the tools of forensic Belkasoft Evidence Center and MOBILedit Forensic Express, the process of forensic follow the guidelines on the method of Digital Forensic Research Workshop (DFRWS), which consists of several stages of forensic covers the identification, preservation, collection, examination, analysis and presentation.This study was conducted to provide an overview of the process of forensic on the application of a digital wallet to search for information, particularly related to transactions conducted on the application of digital wallets, so that the digital evidence obtained from the forensics process can be used as evidence pursuant to the UU ITE about the power of the law of evidence in the digital. From the research that has been done on the application of a digital wallet, managed to get the information in the form of user's data and history transaction activity, with a percentage of data found in the wallet app digital by 100%. Keywords: Forensic Mobile, Digital Evidence, Digital Wallet Apps, DFRWS Seiring dengan munculnya aplikasi dompet digital di Indonesia, penggunaan perangkat smartphone memiliki fungsi tidak hanya sebagai alat komunikasi, akan tetapi juga mulai digunakan sebagai alat untuk melakukan transaksi pembayaran. Terdapat beberapa perusahaan financial technology di Indonesia yang menawarkan layanan dompet digital. Dibalik kemudahan yang diberikan dari penggunaan aplikasi dompet digital, bisa saja terdapat pemanfaatan negatif yang berujung pada kasus cybercrime. Penelitian ini akan melakukan proses forensik pada salah satu aplikasi dompet digital yang popular digunakan di Indonesia, menggunakan tools forensik Belkasoft Evidence Center dan MOBILedit Forensic Express, proses forensik mengikuti pedoman metode Digital Forensik Research Workshop (DFRWS) yang terdiri dari beberapa tahapan forensik meliputi  identification, preservation, collection, examination, analysis dan presentation, dilakukan untuk memberikan gambaran proses forensik pada aplikasi dompet digital untuk mencari informasi, khususnya terkait aktivitas transaksi yang dilakukan pada aplikasi dompet digital, sehingga bukti digital yang didapatkan dari proses forensik dapat dijadikan sebagai barang bukti berdasarkan UU ITE tentang kekuatan hukum alat bukti digital. Dari penelitian yang telah dilakukan pada aplikasi dompet digital, berhasil mendapatkan informasi berupa data pengguna dan history aktivitas transaksi, dengan presentase data yang ditemukan pada aplikasi dompet digital sebesar 100%.Kata kunci: Forensik Mobile, Bukti Digital, Aplikasi Dompet Digital, DFRWS
Implementation of Naïve Bayes for Fish Freshness Identification Based on Image Processing Sabarudin Saputra; Anton Yudhana; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (746.63 KB) | DOI: 10.29207/resti.v6i3.4062

Abstract

Consumption of fish as a food requirement for the fulfillment of community nutrition is increasing. This was followed by an increase in the amount of fish caught that were sold at fish markets. Market managers must be concerned about the dispersion of huge amounts of fish in the market in order to determine the freshness of the fish before it reaches the hands of consumers. So far, market managers have relied on traditional ways to determine the freshness of fish in circulation. The issue is that traditional solutions, such as the use expert assessment, demand a human physique that quickly experiences fatigue. Technological developments can be a solution to these problems, such as utilizing image processing techniques classification method. Image processing with the use of color features is an effective method to determine the freshness of fish. The classification method used in this research is the Naive Bayes method. This study aims to identify the freshness of fish based on digital images and determine the performance level of the method. The identification process uses the RGB color value feature of fisheye images. The stages of fish freshness identification include cropping, segmentation, RGB value extraction, training, and testing. The classification data are 210 RGB value of extraction images which are divided into 147 data for training and 63 data for testing. The research data were divided into fresh class, started to rot class, and rotted class. The research shows that the Naive Bayes algorithm can be used in the process of identifying the freshness level of fish based on fisheye images with a test accuracy rate of 79.37%.
Klasifikasi Loyalitas Pengguna Data Alumni Pada Forlap Dikti Menggunakan Metode Net Promotore Score Abdul Fadlil; Rusydi Umar; Fitrah Juliansyah
JURIKOM (Jurnal Riset Komputer) Vol 9, No 3 (2022): Juni 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v9i3.4363

Abstract

As one of the private universities, STMIK Muhammadiyah Jakarta provides electronic-based services to students and alumni using website with the domain address https://pddikti.kemdikbud.go.id. website aims as a means to convey graduation data validation information to alumni in particular by utilizing information technology. The low level of use of the website by alumni in knowing the status of graduation is the background of the need for usability to determine the level of truth of the data and user satisfaction with the website. This study aims to measure the extent to which the website is used by users to achieve its goals. In this study, the test must be carried out using the Net Promoter Score method. So that the results of the NPS calculation will be converted into a percentage that provides information on the extent of loyalty to students in using the Forlap Dikti page to validate alumni data in the STMIK Muhammadiyah Jakarta campus. Then the results obtained from calculations using NPS are: %Promotore - % Dectractor = 53% - 13% = 40. In determining the NPS value is not calculated based on percentages, because NPS calculations are not percentage calculations but integer numbers (consisting of whole numbers) and not contains a fraction or a decimal value
Analisis Penilaian Kinerja Karyawan Menggunakan Metode WASPAS Sunardi Sunardi; Rusydi Umar; Dewi Sahara Nasution
JURIKOM (Jurnal Riset Komputer) Vol 9, No 3 (2022): Juni 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v9i3.4168

Abstract

An employee is an asset to the company. The success of the company in achieving its goals depends largely on the ability of human (employee) resources to perform the task assigned to him. The Indonesian government is optimistic the rupiah will continue to strengthen to rp9,100 per dollar, he said. Employee performance assessment analysis is using a systemated aggregated sum product assessment (waspas). The waspas method is used because it can reduce errors or optimize for the highest and lowest valuation with the excellence of looking for the best option option using a unique combination of two Wells known as MCD mexcellence, the WMM and the heavy-product model (WPM). The research stages conducted are problem identification, literature studies, data collection, value-weight determination, results analysis, employee determination, and finally drawing a conclusion. The study is conducted using a descriptive qualitative approach, one that employs qualitative and descriptive data. The type of qualitative descriptive research is often used to analyze events, phenomena, or circumstances socially. The study was conducted compulsively, a sample retrieval technique relying on its own judgment when selecting population members to participate in the study so that the study obtained five samples from the quality control division (qc) from a population of 150. Data collection through interviews and observations obtained data related to employees such as employee names, performance performance, divisions existing in kerry express, and criteria used in the assessment of lateness, error system, daily report, outstanding revenue, volume. Data analysis results in a reduction of data that gets meaningful information and facilitates the withdrawal of conclusions, presents data in the form of happy calculations, and concludes that the waspas method can be applied to the employee performance assessment system and can be used as the determining of the best workers. Weight of each criteria: lateness (25%), system improve (25%), daily report (25%), outstanding revenue (15%), and volume (10%). Results obtained from the 5 samples used that had a top yield value of 1.8208 for alternatives 1 (a1) and could be used for best employee decision-making.
Co-Authors Aang Anwarudin Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abe, Tuska Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmad Ridwan Ahmadi, Ahwan Ahnafi, Muhammad Ghazi Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anggara, Rio Annafii, Moch. Nasheh Anton Yudhana Anton Yudhana Anwarudin, Aang Ardi Pujiyanta Ardiansyah, Ricy Arfiani Nur Khusna Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arizona Firdonsyah Asy’am, Muhammad Hasfar Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bella Okta Sari Miranda Bintang, Rauhulloh Noor Busthomi, Iqbal Bustomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dewi Soyusiawaty Dwi Susanto Dzakwan, M Sabiq E, Ermin Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlil, Abdu Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan H, Hermansa Hadi, Wisnu Setiawan Hafidz, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Helmiyah, Siti Herman Herman Herman Herman Herman Herman Yuliansyah, Herman Hermansa Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Irjayana, Rizky Caesar Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Juliansyah, Fitrah Kencana, Nagala Wangsa Kgs Muhammad Rizky Alditra Utama Kharismajati, Gema Khoirul Anam Dahlan Kusuma, Ridho Surya Lisna Zahrotun Lukman Nurhakim Maftukhah, Ainin Mardhiatul Ihsaniah Maulana, Irvan Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Moch. Nasheh Annafii Mochammad Imron Awalludin Muammar Muammar, Muammar Muhajir Yunus Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Muis, Alwas Muntiari, Novita Ranti Murinto Mustafa Mustafa Muzakkir Pangri N, Musri Iskandar Nasrulloh, Imam Mahfudl Nugroho, Ismail Adji Ockhy Jey Fhiter Wassalam Panggah Widiandana Periyanto, Ari Peryanto, Ari Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono P Purwono, Purwono Putra, Alfiansyah Imanda Putra, Fajar R. B Putra, Fijaya Dwi Bima Sakti Putri Silmina, Esi Raden Mohamad Herdian Bhakti Ramdhani, Rezki Resmi - Aini Rezki Ramdhani Rezki Rezki Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Saad, Saleh Khalifah Sabarudin Saputra Sahiruddin Sahiruddin Sakti, Fijaya Bima Dwi Saleh khalifa saad Sarjimin Sarjimin Sarmin, Sarmini Septa, Frandika Siswanto, Anwar Siti Helmiyah Sonny Abriantoro Wicaksono Sri Rahayu Astari Sri Rahayu Astari Sri Winiarti Subandi, Rio Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Suwanti Suwanti Syahib, Muhammad Irwan Tarisno Amijoyo Tella, Fitriyani Tole Sutikno Tri Lestari Tri Lestari Tri Lestari Utama, Kgs Muhammad Rizky Alditra Utama, Kiagus Muhammad Rizky Aditra Veithzal Rivai Zainal Wala, Jihan Wasito Sukarno Wicaksono, Sonny Abriantoro Widya Cholid Wahyudin Winoto, Sakti Yuminah yuminah Yuminah, Yuminah yuminah, Yuminah