p-Index From 2020 - 2025
14.807
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar JURNAL PENGABDIAN KEPADA MASYARAKAT Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer Jurnal Pengabdian UntukMu NegeRI Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Insect (Informatics and Security): Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Edumaspul: Jurnal Pendidikan Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Jurnal Informatika dan Rekayasa Elektronik RADIAL: JuRnal PerADaban SaIns RekAyasan dan TeknoLogi Mobile and Forensics Jurnal Pengabdian Masyarakat Bumi Raflesia Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat Jurnal Teknik Informatika (JUTIF) Jumat Informatika: Jurnal Pengabdian Masyarakat Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno JOINCS (Journal of Informatics, Network, and Computer Science) Insand Comtech : Information Science and Computer Technology Journal Jurnal Pengabdian Informatika (JUPITA) Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Innovation, Technology, and Entrepreneurship Journal BACA: Jurnal Dokumentasi dan Informasi RADIAL: Jurnal Peradaban Sains, Rekayasa dan Teknologi
Claim Missing Document
Check
Articles

The Admission Decision Support System for Muhammadiyah Student Association Cadres Using the Profile Matching Method Rusydi Umar; Anton Yudhana; Jaka Dernata
JUITA : Jurnal Informatika JUITA Vol. 10 No. 1, May 2022
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (762.082 KB) | DOI: 10.30595/juita.v10i1.12430

Abstract

Technological advances are beneficial for humans in doing work, one of which is that technology can help humans make decisions. Muhammadiyah Student Association is a large organization. The establishment of this organization continues to have progress to make many students join the organization.  With many students who want to join, the organization has difficulty determining the eligibility of each prospective member who wants to join because the organization must pay attention to factors that can support the assessment in the acceptance of its members. This research aims to conduct the selection process of organizational members using profile matching methods to help the organization solve the problems faced by making the right decision. Then the result obtained is a decision that follows the organization's expectations in the selection of new prospective members. The assessment used in this method consists of four aspects, two of which are core factors and two other aspects are secondary factors. The data processing results will become a ranking format so that this method can also determine the best candidate members based on ranking.
PELATIHAN PEMBUATAN MEDIA PEMBELAJARAN UNTUK PERWAKILAN GURU SD/MI PADA BADAN KERJASAMA SEKOLAH (BKS) SD/MI MUHAMMADIYAH/ AISYIYAH KABUPATEN BANTULPELATIHAN PEMBUATAN MEDIA PEMBELAJARAN UNTUK PERWAKILAN GURU SD/MI PADA BADAN KERJASAMA SEKOLAH (BKS) SD/MI MUHAMMADIYAH/ AISYIYAH KABUPATEN BANTUL Lisna Zahrotun; Arfiani Nur Khusna; Rusydi Umar
Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat Vol. 2 No. 3 (2018)
Publisher : Universitas Ahmad Dahlan, Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jp.v2i3.402

Abstract

Pada era persaingan global saat ini, ilmu pengetahuan dan teknologi  berkembang begitu pesat melalui berbagai inovasi-inovasi yang semakin maju seiring dengan perkembangan zaman. Badan Kerjasama Sekolah (BKS) SD/ MI Muhammadiyah/ Aisyiyah Kabupaten Bantul merupakan sebuah wadah dari seluruh SD/ MI Muhammadiyah/ Aisyiyah se Kabupaten Bantul mempunyai program kerja salah satunya mengembangkan dan meningkatkan serta menciptakan daya saing civitas terutama guru SD/ MI Muhammadiyah/ Aisyiyah sehingga tercipta pengajar yang unggul disertai pemanfaatan teknologi untuk peningkatan kualitas belajar dan menunjang pembelajaran. Agar program kerja dari (BKS) SD/ MI Muhammadiyah/ Aisyiyah Kabupaten Bantul dapat berjalan dengan lancar maka dilakukanlah pelatihan pembuatan media pembelajaran untuk BKS SD/ MI Muhammadiyah/ Aisyiyah Kabupaten Bantul. Metode yang digunakan dalam pelatihan ini adalah dengan memberikan modul pelatihan, bimbingan dengan cara tutorial, pemberian contoh dan studi kasus dan yang terakhir adalah evaluasi.Dari evaluasi yang dilakukan menggunakan kuesioner dalam pelatihan ini dihasilkan bahwa kemampuan meningkat dengan presentase 80% dan sudah mencapai standar kompetensi yang telah dibuat  sehingga pelatihan ini dapat dikatakan berhasil karena dapat meningkatkan kemampuan dari peserta dalam membuat media pembelajaran
ANALISIS KEPUASAN PENGGUNA SISTEM INFORMASI E-GOVERNMENT MENGGUNAKAN METODE WEBQUAL 4.0: Studi Kasus: Website Simsarpras Kementerian Agama Frandika Septa; Rusydi Umar
METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi Vol. 3 No. 2 (2019): METHOMIKA: Jurnal Manajemen Informatika & Komputersisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (721.121 KB) | DOI: 10.46880/jmika.Vol3No2.pp127-135

Abstract

The service of a government institution to the community through an electronic or E-Government based information system needs to be analyzed to the satisfaction of its users, to determine the quality of the information system services, especially if the service is a necessity and is considered important for community development. This study analyzes the quality of a site belonging to the Ministry of Religion, namely the website for information systems and infrastructure (SIMSARPRAS). The study was conducted to determine the quality of the SIMSARPRAS website based on user perceptions. The method used in this research is WebQual 4.0 with data analysis using multiple linear regression. The results of this study provide conclusions that partially and simultaneously all dimensions of the WebQual 4.0 method have a positive and significant effect on user satisfaction from the SIMSARPRAS website. The regression coefficient shows that the dimensions of service interaction quality give the greatest value to user satisfaction with a value of 0.451. The coefficient of determination shows that all WebQual 4.0 dimensions are able to influence user satisfaction by 64.8%, and it is concluded that the quality of SIMSARPRAS websites is in good quality.
ANALISIS SISTEM INFORMASI WEB LSP UAD MENGGUNAKAN USER EXPERIENCE QUESTIONNAIRE (UEQ) Rusydi Umar; Aulyah Zakilah Ifani; Fathia Irbati Ammatulloh; Maya Anggriani
METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi Vol. 4 No. 2 (2020): METHOMIKA: Jurnal Manajemen Informatika & Komputersisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1005.174 KB) | DOI: 10.46880/jmika.Vol4No2.pp173-178

Abstract

The progress of the world has been so fast that workers in various professions have increasingly needed recognition. University and Vocational School graduates need fields to test the ability of the profession they do. Ahmad Dahlan University (UAD) is one of the universities that has a professional testing institution called the UAD Professional Certification Institute (LSP). LSP UAD functions as an institution to test the professions required by prospective UAD graduates themselves. Until now, LSP UAD has ten schemes that can be tested on prospective study program graduates. To simplify the information related to the scheme, students can see on the LSP UAD website, information is also available for other LSPs and accessories. However, the UAD LSP web has not tested the satisfaction of web users such as student users. This paper was created to test user satisfaction or User Experience (UX) for users to improve information services on the web. Analysis on the UAD LSP web used the User Experience Questionnaire (UEQ) method to 15 students who had used the web as respondents. UEQ's assessment refers to six aspects, namely: efficiency, attractiveness, accuracy, clarity, novelty, and stimulation. The results of the analysis showed that the average respondent gave an impression with results above average in the aspects of clarity, accuracy, stimulation, and novelty. Meanwhile, attractiveness and efficiency get good scores.
Perbandingan Metode Profile Matching Dengan Metode SMART Untuk Seleksi Asisten Laboratorium Sri Rahayu Astari; Rusydi Umar; Sunardi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 2 (2020): April 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (504.176 KB) | DOI: 10.29207/resti.v4i2.1723

Abstract

Laboratory assistant in university are the main factors in determining the course of practical in the laboratory. So it needs to be selected to get an assistant with good competence. Assistant selection is done by assessing four aspects namely administration, competence, microteaching, and interview. So far the assessment is still done manually, the criteria value still has the same importance. The calculation method which is also not optimal has an impact on the results and the long time of decision making. So we need a method to overcome these problems. In this study the calculation methods used are Profile Matching and SMART (Simple Multi Attribute Rating Technique). Based on research conducted both methods work by grouping criteria according to their level of importance. There are 12 criteria divided into four aspects, and alternative data of 7 participants were taken from 2019 participant data. The results of the two methods are ranking sequences compared with ranking results in 2019 selection. The results of this study show better profile matching because it has an accuracy value 100% is exactly the same as the results of the previous selection, while SMART is only 42.8%.
Perbandingan Metode SVM, RF dan SGD untuk Penentuan Model Klasifikasi Kinerja Programmer pada Aktivitas Media Sosial Rusydi Umar; Imam Riadi; Purwono
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 2 (2020): April 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (561.928 KB) | DOI: 10.29207/resti.v4i2.1770

Abstract

The failure of most startups in Indonesia is caused by team performance that is not solid and competent. Programmers are an integral profession in a startup team. The development of social media can be used as a strategic tool for recruiting the best programmer candidates in a company. This strategic tool is in the form of an automatic classification system of social media posting from prospective programmers. The classification results are expected to be able to predict the performance patterns of each candidate with a predicate of good or bad performance. The classification method with the best accuracy needs to be chosen in order to get an effective strategic tool so that a comparison of several methods is needed. This study compares classification methods including the Support Vector Machines (SVM) algorithm, Random Forest (RF) and Stochastic Gradient Descent (SGD). The classification results show the percentage of accuracy with k = 10 cross validation for the SVM algorithm reaches 81.3%, RF at 74.4%, and SGD at 80.1% so that the SVM method is chosen as a model of programmer performance classification on social media activities.
Implementasi Algoritma Playfair Cipher dan Least Significant Bit pada Citra Digital Hermansa; Rusydi Umar; Anton Yudhana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 3 (2020): Juni 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (425.519 KB) | DOI: 10.29207/resti.v4i3.1877

Abstract

Message security is very important now. Because security is part of the privacy of someone who wants to protect messages from those who do not have the right to read or receive them. The method used for securing information messages with message encryption and decryption techniques is the Playfair Cipher algorithm combined with the Least Significant Bit (LSB) method. In this study it was found that the Playfair Cipher algorithm is quite safe in implementing cryptographic encryption or ciphertext because the playfair cipher has a level of appearance of letters that is so difficult to predict so that the ciphertext becomes a randomized collection of data. For the Least Significant Bit (LSB) steganography method in the insertion of a secret or embedded message it is difficult to guess in plain view the changes that occur between before and after the image is inserted are not too significant. Also see the value of the Peak-Signal-to-Noise ratio or PSNR can still be considered good quality due to> 30 decibels (dB). So the final result of the combination of the Playfair Cipher algorithm with the Least Significant Bit (LSB) method is quite good in securing messages.
Komparatif Analisis Keamanan Aplikasi Instant Messaging Berbasis Web Imam Riadi; Rusydi Umar; Muhammad Abdul Aziz
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 5 (2020): Oktober 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.857 KB) | DOI: 10.29207/resti.v4i5.2213

Abstract

Web-based instant messaging applications vulnerability has become one of the main concerns for its users in line with the increasing number of cybercrimes that occur on social media. This research was conducted to determine the comparability of the vulnerability value of the web-based WhatsApp, Telegram, and Skype applications using the Association of Chief Police Officers (ACPO) method. Digital artifacts in the form of text messages, picture messages, video messages, telephone numbers, and user IDs have been acquired in this research process using FTK imager and OSForensic tools. The results of the study using the FTK imager and OSForensic tools show that the web-based Skype application has a vulnerability value of 92%, while WhatsApp and Web-based Telegram have the same vulnerability value with 67% each based on all digital artifacts that successfully acquired.
Acquisition of Digital evidence Android-Based Viber Messenger App Imam Riadi; Rusydi Umar; Muhammad Irwan Syahib
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1032.475 KB) | DOI: 10.29207/resti.v5i1.2626

Abstract

Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals.
Identification of Forensic Evidence for Virtual Router Networks Using the National Institute of Standard and Technology (NIST) Method Firmansyah Yasin; Abdul Fadlil; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.568 KB) | DOI: 10.29207/resti.v5i1.2784

Abstract

The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This study uses the Windump forensic tool as a means of recording network traffic activity. Network Miner and Wireshark as an analytical tool for identifying digital evidence. The use of the National Institute of Standard and Technology (NIST) method which collection, examination, analysis and reporting, can be repeated and maintained with the same data. Based on experiments with virtual router network traffic testing, the system built has succeeded in obtaining digital evidence, either by direct or indirectly. The system scenario that has been planned succeeded recording 220494 packages, but by the Windump, it is automatically divided into 9 (nine) parts of the package which are Buktidigital0 to Buktidigital8. The inspection stage produces evidence that has been verified by Wireshark and Network Miner. The analysis stage proves that there were attacks carried out by addresses 192.168.10.10 and 192.168.234.10. Based on the results of forensic testing, the use of the NIST method on a forensic system that has been built with a virtual router object can be used by investigators to identify evidence of cyber-attacks.
Co-Authors Aang Anwarudin Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmad Ridwan Ahmadi, Ahwan Ahnafi, Muhammad Ghazi Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anggara, Rio Anton Yudhana Anton Yudhana Ardi Pujiyanta Ardiansyah, Ricy Arfiani Nur Khusna Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arif Wirawan Muhammad Arizona Firdonsyah Asy’am, Muhammad Hasfar Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bella Okta Sari Miranda Bintang, Rauhulloh Noor Busthomi, Iqbal Bustomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dwi Susanto Dzakwan, M Sabiq E, Ermin Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlil, Abdu Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Fitrah Juliansyah Fitrah Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan H, Hermansa Hadi, Wisnu Setiawan Hafidz, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Helmiyah, Siti Herman Herman Herman Herman Herman Herman Yuliansyah, Herman Hermansa Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Irjayana, Rizky Caesar Ismail Adji Nugroho Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Kencana, Nagala Wangsa Kgs Muhammad Rizky Alditra Utama Kharismajati, Gema Khoirul Anam Dahlan Kiagus Muhammad Rizky Aditra Utama Kusuma, Ridho Surya Lisna Zahrotun Lukman Nurhakim Maftukhah, Ainin Mardhiatul Ihsaniah Maulana, Irvan Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Moch. Nasheh Annafii Mochammad Imron Awalludin Muammar Muammar, Muammar Muhajir Yunus Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Aziz Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Muis, Alwas Muntiari, Novita Ranti Murinto Mustafa Mustafa Muzakkir Pangri N, Musri Iskandar Nahdli, Muhammad Fahmi Mubarok Nasrulloh, Imam Mahfudl Ockhy Jey Fhiter Wassalam Panggah Widiandana Periyanto, Ari Peryanto, Ari Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono P Purwono, Purwono Putra, Alfiansyah Imanda Putra, Fajar R. B Putra, Fijaya Dwi Bima Sakti Putri Silmina, Esi Resmi - Aini Rezki Ramdhani Rezki Rezki Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Saad, Saleh Khalifah Sabarudin Saputra Sahiruddin Sahiruddin Sakti, Fijaya Bima Dwi Saleh khalifa saad Sarjimin Sarjimin Sarmin, Sarmini Septa, Frandika Siswanto, Anwar Siti Helmiyah Siti Helmiyah Sonny Abriantoro Wicaksono Sri Rahayu Astari Sri Rahayu Astari Subandi, Rio Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Syahib, Muhammad Irwan Tarisno Amijoyo Tella, Fitriyani Tole Sutikno Tri Lestari Tri Lestari Tri Lestari Utama, Kgs Muhammad Rizky Alditra Utama, Kiagus Muhammad Rizky Aditra Veithzal Rivai Zainal Wahyudin, Widya Cholid Wala, Jihan Wasito Sukarno Wicaksono, Sonny Abriantoro Winoto, Sakti Yuminah yuminah Yuminah, Yuminah