p-Index From 2021 - 2026
10.132
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar JURNAL PENGABDIAN KEPADA MASYARAKAT Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer Jurnal Pengabdian UntukMu NegeRI Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Jurnal Informatika dan Rekayasa Elektronik RADIAL: JuRnal PerADaban SaIns RekAyasan dan TeknoLogi Mobile and Forensics Jurnal Pengabdian Masyarakat Bumi Raflesia Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat Jurnal Teknik Informatika (JUTIF) Jumat Informatika: Jurnal Pengabdian Masyarakat Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno JOINCS (Journal of Informatics, Network, and Computer Science) Insand Comtech : Information Science and Computer Technology Journal Jurnal Pengabdian Informatika (JUPITA) Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics Innovation, Technology, and Entrepreneurship Journal BACA: Jurnal Dokumentasi dan Informasi RADIAL: Jurnal Peradaban Sains, Rekayasa dan Teknologi Edumaspul: Jurnal Pendidikan
Claim Missing Document
Check
Articles

ANALISIS SISTEM INFORMASI WEB LSP UAD MENGGUNAKAN USER EXPERIENCE QUESTIONNAIRE (UEQ) Rusydi Umar; Aulyah Zakilah Ifani; Fathia Irbati Ammatulloh; Maya Anggriani
METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi Vol. 4 No. 2 (2020): METHOMIKA: Jurnal Manajemen Informatika & Komputersisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1005.174 KB) | DOI: 10.46880/jmika.Vol4No2.pp173-178

Abstract

The progress of the world has been so fast that workers in various professions have increasingly needed recognition. University and Vocational School graduates need fields to test the ability of the profession they do. Ahmad Dahlan University (UAD) is one of the universities that has a professional testing institution called the UAD Professional Certification Institute (LSP). LSP UAD functions as an institution to test the professions required by prospective UAD graduates themselves. Until now, LSP UAD has ten schemes that can be tested on prospective study program graduates. To simplify the information related to the scheme, students can see on the LSP UAD website, information is also available for other LSPs and accessories. However, the UAD LSP web has not tested the satisfaction of web users such as student users. This paper was created to test user satisfaction or User Experience (UX) for users to improve information services on the web. Analysis on the UAD LSP web used the User Experience Questionnaire (UEQ) method to 15 students who had used the web as respondents. UEQ's assessment refers to six aspects, namely: efficiency, attractiveness, accuracy, clarity, novelty, and stimulation. The results of the analysis showed that the average respondent gave an impression with results above average in the aspects of clarity, accuracy, stimulation, and novelty. Meanwhile, attractiveness and efficiency get good scores.
Perbandingan Metode Profile Matching Dengan Metode SMART Untuk Seleksi Asisten Laboratorium Sri Rahayu Astari; Rusydi Umar; Sunardi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 2 (2020): April 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (504.176 KB) | DOI: 10.29207/resti.v4i2.1723

Abstract

Laboratory assistant in university are the main factors in determining the course of practical in the laboratory. So it needs to be selected to get an assistant with good competence. Assistant selection is done by assessing four aspects namely administration, competence, microteaching, and interview. So far the assessment is still done manually, the criteria value still has the same importance. The calculation method which is also not optimal has an impact on the results and the long time of decision making. So we need a method to overcome these problems. In this study the calculation methods used are Profile Matching and SMART (Simple Multi Attribute Rating Technique). Based on research conducted both methods work by grouping criteria according to their level of importance. There are 12 criteria divided into four aspects, and alternative data of 7 participants were taken from 2019 participant data. The results of the two methods are ranking sequences compared with ranking results in 2019 selection. The results of this study show better profile matching because it has an accuracy value 100% is exactly the same as the results of the previous selection, while SMART is only 42.8%.
Perbandingan Metode SVM, RF dan SGD untuk Penentuan Model Klasifikasi Kinerja Programmer pada Aktivitas Media Sosial Rusydi Umar; Imam Riadi; Purwono
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 2 (2020): April 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (561.928 KB) | DOI: 10.29207/resti.v4i2.1770

Abstract

The failure of most startups in Indonesia is caused by team performance that is not solid and competent. Programmers are an integral profession in a startup team. The development of social media can be used as a strategic tool for recruiting the best programmer candidates in a company. This strategic tool is in the form of an automatic classification system of social media posting from prospective programmers. The classification results are expected to be able to predict the performance patterns of each candidate with a predicate of good or bad performance. The classification method with the best accuracy needs to be chosen in order to get an effective strategic tool so that a comparison of several methods is needed. This study compares classification methods including the Support Vector Machines (SVM) algorithm, Random Forest (RF) and Stochastic Gradient Descent (SGD). The classification results show the percentage of accuracy with k = 10 cross validation for the SVM algorithm reaches 81.3%, RF at 74.4%, and SGD at 80.1% so that the SVM method is chosen as a model of programmer performance classification on social media activities.
Implementasi Algoritma Playfair Cipher dan Least Significant Bit pada Citra Digital Hermansa; Rusydi Umar; Anton Yudhana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 3 (2020): Juni 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (425.519 KB) | DOI: 10.29207/resti.v4i3.1877

Abstract

Message security is very important now. Because security is part of the privacy of someone who wants to protect messages from those who do not have the right to read or receive them. The method used for securing information messages with message encryption and decryption techniques is the Playfair Cipher algorithm combined with the Least Significant Bit (LSB) method. In this study it was found that the Playfair Cipher algorithm is quite safe in implementing cryptographic encryption or ciphertext because the playfair cipher has a level of appearance of letters that is so difficult to predict so that the ciphertext becomes a randomized collection of data. For the Least Significant Bit (LSB) steganography method in the insertion of a secret or embedded message it is difficult to guess in plain view the changes that occur between before and after the image is inserted are not too significant. Also see the value of the Peak-Signal-to-Noise ratio or PSNR can still be considered good quality due to> 30 decibels (dB). So the final result of the combination of the Playfair Cipher algorithm with the Least Significant Bit (LSB) method is quite good in securing messages.
Komparatif Analisis Keamanan Aplikasi Instant Messaging Berbasis Web Imam Riadi; Rusydi Umar; Muhammad Abdul Aziz
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 5 (2020): Oktober 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.857 KB) | DOI: 10.29207/resti.v4i5.2213

Abstract

Web-based instant messaging applications vulnerability has become one of the main concerns for its users in line with the increasing number of cybercrimes that occur on social media. This research was conducted to determine the comparability of the vulnerability value of the web-based WhatsApp, Telegram, and Skype applications using the Association of Chief Police Officers (ACPO) method. Digital artifacts in the form of text messages, picture messages, video messages, telephone numbers, and user IDs have been acquired in this research process using FTK imager and OSForensic tools. The results of the study using the FTK imager and OSForensic tools show that the web-based Skype application has a vulnerability value of 92%, while WhatsApp and Web-based Telegram have the same vulnerability value with 67% each based on all digital artifacts that successfully acquired.
Acquisition of Digital evidence Android-Based Viber Messenger App Imam Riadi; Rusydi Umar; Muhammad Irwan Syahib
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1032.475 KB) | DOI: 10.29207/resti.v5i1.2626

Abstract

Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals.
Identification of Forensic Evidence for Virtual Router Networks Using the National Institute of Standard and Technology (NIST) Method Firmansyah Yasin; Abdul Fadlil; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.568 KB) | DOI: 10.29207/resti.v5i1.2784

Abstract

The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This study uses the Windump forensic tool as a means of recording network traffic activity. Network Miner and Wireshark as an analytical tool for identifying digital evidence. The use of the National Institute of Standard and Technology (NIST) method which collection, examination, analysis and reporting, can be repeated and maintained with the same data. Based on experiments with virtual router network traffic testing, the system built has succeeded in obtaining digital evidence, either by direct or indirectly. The system scenario that has been planned succeeded recording 220494 packages, but by the Windump, it is automatically divided into 9 (nine) parts of the package which are Buktidigital0 to Buktidigital8. The inspection stage produces evidence that has been verified by Wireshark and Network Miner. The analysis stage proves that there were attacks carried out by addresses 192.168.10.10 and 192.168.234.10. Based on the results of forensic testing, the use of the NIST method on a forensic system that has been built with a virtual router object can be used by investigators to identify evidence of cyber-attacks.
Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital Alfiansyah Imanda Putra Alfian; Rusydi Umar; Abdul Fadlil
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 2 (2021): April 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (540.282 KB) | DOI: 10.29207/resti.v5i2.3015

Abstract

The development of digital video technology which is increasingly advanced makes digital video engineering crimes prone to occur. The change in digital video has changed information communication, and it is easy to use in digital crime. One way to solve this digital crime case is to use the NIST (National Institute of Standards and Technology) method for video forensics. The initial stage is carried out by collecting data and carrying out the process of extracting the collected results. A local hash and noise algorithm can then be used to analyze the resulting results, which will detect any digital video interference or manipulation at each video frame, and perform hash analysis to detect the authenticity of the video. In digital video engineering, histogram analysis can be performed by calculating the histogram value metric, which is used to compare the histogram values ​​of the original video and video noise and make graphical comparisons. The results of the difference in frame analysis show that the results of the video show that the 2nd to 7th frames experience an attack while the histogram calculation of the original video centroid value and video tampering results in different values ​​in the third frame, namely with a value of 124.318 and the 7th frame of the video experiencing a difference in the value of 105,966 videos. tampering and 107,456 in the original video. Hash analysis on video tampering results in an invalid SHA-1 hash, this can prove that the video has been manipulated.
Classification is one method in image processing. Image processing to search for similar images or with similarity ownership is called image matching or image matching. In the measurement of image matching, the original and fake logo objects are used. Ide Dewi Astria Faroek; Rusydi Umar; Imam Riadi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 2 (2022): April 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (981.272 KB) | DOI: 10.29207/resti.v6i2.3826

Abstract

The random noise signal is widely used as a test signal to identify a physical or biological system. In particular, the Gaussian distributed white noise signal (Gaussian White Noise) is popularly used to simulate environmental noise in telecommunications system testing, input noise in testing ADC (Analog to Digital Converter) devices, and testing other digital systems. Random noise signal generation can be done using resistors or diodes. The weakness of the noise generator system using physical components is the statistical distribution. An alternative solution is to use a Pseudo-Random System that can be adjusted for distribution and other statistical parameters. In this study, the implementation of the Gaussian distributed pseudo noise generation algorithm based on the Enhanced Box-Muller method is described. Prototype of noise generation system using a minimum system board based on Cortex Microcontroller or MCU-STM32F4. The test results found that the Enhanced Box-Muller (E Box-Muller) method can be applied to the MCU-STM32F4 efficiently, producing signal noise with Gaussian distribution. The resulting noise signal has an amplitude of ±1Volt, is Gaussian distributed, and has a relatively broad frequency spectrum. The noise signal can be used as a jamming device in a particular frequency band using an Analog modulator.
SISTEM MANAJEMEN DATA MONOGRAFI DI KELURAHAN SIDODADI Anton Yudhana; Rusydi Umar; Faza Alameka
ILKOM Jurnal Ilmiah Vol 8, No 3 (2016)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v8i3.67.167-173

Abstract

Kelurahan merupakan salah satu lembaga yang mempunyai peranan penting dalam pemerintahan. Salah satu instansi pemerintahan yang dituntut dalam memperbaharui data monografi wilayahnya yaitu kelurahan Sidodadi yang berada pada kecamatan Samarinda ULU. Manfaat data monografi adalah mempermudah pihak yang ingin memerlukan informasi dan data dari suatu wilayah khususnya data monografi kelurahan Sidodadi.Dalam penelitian ini dijelaskan tentang perancangan dan pengembangan data monografi. Dalam pengembangan sistem ini penulis menggunakan pendekatan Model Incremental yang setiap tahapan-tahapan tersebut dilakukan secara berurutan. Setiap bagian yang sudah selesai dilakukan testing kemudian dikirim kepada pemakai untuk langsung dapat digunakan. Pembuatan sistem ini menggunakan Sistem Informasi terintegrasi server-side berbasis website yang memungkinkan pengembangan sistem yang dinamis dengan reusability. Data disimpan dalam bentuk database, sehingga mempunyai efisiensi dan integritas yang tinggi. Pengembangan dan perubahan sistem dapat dilakukan dengan mudah dan terpusat pada sisi server. Sedangkan program aplikasi tidak perlu diinstall dan didistribusikan kepada setiap client atau web browser.
Co-Authors Aang Anwarudin Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abe, Tuska Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmad Ridwan Ahmadi, Ahwan Ahnafi, Muhammad Ghazi Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anggara, Rio Annafii, Moch. Nasheh Anton Yudhana Anton Yudhana Anwarudin, Aang Ardi Pujiyanta Ardiansyah, Ricy Arfiani Nur Khusna Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arizona Firdonsyah Asy’am, Muhammad Hasfar Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bella Okta Sari Miranda Bintang, Rauhulloh Noor Busthomi, Iqbal Bustomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dewi Soyusiawaty Dwi Susanto Dzakwan, M Sabiq E, Ermin Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlil, Abdu Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan H, Hermansa Hadi, Wisnu Setiawan Hafidz, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Helmiyah, Siti Herman Herman Herman Herman Herman Herman Yuliansyah, Herman Hermansa Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Irjayana, Rizky Caesar Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Juliansyah, Fitrah Kencana, Nagala Wangsa Kgs Muhammad Rizky Alditra Utama Kharismajati, Gema Khoirul Anam Dahlan Kusuma, Ridho Surya Lisna Zahrotun Lukman Nurhakim Maftukhah, Ainin Mardhiatul Ihsaniah Maulana, Irvan Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Moch. Nasheh Annafii Mochammad Imron Awalludin Muammar Muammar, Muammar Muhajir Yunus Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Muis, Alwas Muntiari, Novita Ranti Murinto Mustafa Mustafa Muzakkir Pangri N, Musri Iskandar Nasrulloh, Imam Mahfudl Nugroho, Ismail Adji Ockhy Jey Fhiter Wassalam Panggah Widiandana Periyanto, Ari Peryanto, Ari Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono P Purwono, Purwono Putra, Alfiansyah Imanda Putra, Fajar R. B Putra, Fijaya Dwi Bima Sakti Putri Silmina, Esi Raden Mohamad Herdian Bhakti Ramdhani, Rezki Resmi - Aini Rezki Ramdhani Rezki Rezki Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Saad, Saleh Khalifah Sabarudin Saputra Sahiruddin Sahiruddin Sakti, Fijaya Bima Dwi Saleh khalifa saad Sarjimin Sarjimin Sarmin, Sarmini Septa, Frandika Siswanto, Anwar Siti Helmiyah Sonny Abriantoro Wicaksono Sri Rahayu Astari Sri Rahayu Astari Sri Winiarti Subandi, Rio Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Suwanti Suwanti Syahib, Muhammad Irwan Tarisno Amijoyo Tella, Fitriyani Tole Sutikno Tri Lestari Tri Lestari Tri Lestari Utama, Kgs Muhammad Rizky Alditra Utama, Kiagus Muhammad Rizky Aditra Veithzal Rivai Zainal Wala, Jihan Wasito Sukarno Wicaksono, Sonny Abriantoro Widya Cholid Wahyudin Winoto, Sakti Yuminah yuminah Yuminah, Yuminah yuminah, Yuminah