p-Index From 2020 - 2025
10.265
P-Index
This Author published in this journals
All Journal Sosiohumaniora JBIO: jurnal biosains (the journal of biosciences) Jurnal Konstruksi Jurnal Online Mahasiswa (JOM) Bidang Ilmu Sosial dan Ilmu Politik Jurnal Online Mahasiswa (JOM) Bidang Pertanian Intelektualita Jurnal Informatika dan Teknik Elektro Terapan Medula Biocelebes Jurnal Sains Dan Teknologi (SAINTEKBU) al-Afkar, Journal For Islamic Studies Mimbar Hukum - Fakultas Hukum Universitas Gadjah Mada Pendas : Jurnah Ilmiah Pendidikan Dasar J-MAS (Jurnal Manajemen dan Sains) Prosiding Seminar Nasional Pakar Jurnal Serambi Engineering Jurnal Pengabdian Magister Pendidikan IPA Aptisi Transactions on Management Jurnal Jatiswara Jurnal TAMBORA Jurnal Equity Perada: Jurnal Studi Islam Kawasan Melayu JOURNAL OF INFORMATICS AND COMPUTER SCIENCE ICIT (Innovative Creative and Information Technology) Journal JuTEkS (Jurnal Teknik Elektro dan Sains) Jurnal Ilmu Manajemen Universitas Tadulako (JIMUT) Budapest International Research and Critics Institute-Journal (BIRCI-Journal): Humanities and Social Sciences JURNAL TEKNOLOGI TECHNOSCIENTIA Jurnal Ilmiah Teunuleh: The International Journal of Social Sciences Ekosiana : Jurnal Ekonomi Syariah Abrahamic Religions: Jurnal Studi Agama-Agama Multidiciplinary Output Research for Actual and International Issue (Morfai Journal) Jurnal Esensi Infokom: Jurnal Esensi Sistem Informasi dan Sistem Komputer EKONOMIKA45 International Journal of Humanities Education and Social Sciences At Tawasul: Jurnal Komunikasi dan Penyiaran Islam Jurnal Konstruksi Academic Journal Perspective : Education, Language, and Literature Jurnal Administrasi Publik International Journal of Health Science (IJHS) International Journal of Education and Literature (IJEL) SARGA Jurnal Pengabdian dan Pengembangan Masyarakat Indonesia Jurnal Manajemen Bisnis Kewirausahaan Darussalam English journal International Review of Practical Innovation, Technology and Green Energy (IRPITAGE) Jurnal Riset Rumpun Ilmu Kesehatan (JURRIKES) Universal Raharja Community (URNITY Journal) Journal of Scientific Research, Education, and Technology International Conference on Health Science, Green Economics, Educational Review and Technology (IHERT) Jurnal Pengabdian Kolaborasi dan Inovasi IPTEKS Jurnal Sains dan Ilmu Terapan Jurnal Bima: Pusat Publikasi Ilmu Pendidikan Bahasa dan Sastra Triwikrama: Jurnal Ilmu Sosial Kohesi: Jurnal Sains dan Teknologi Argopuro: Jurnal Multidisiplin Ilmu Bahasa Buletin Ilmiah Ilmu Komputer dan Multimedia (BIIKMA) APPA : Jurnal Pengabdian Kepada Masyarakat Journal of Islamic Education Students Contemplate: Jurnal Ilmiah Studi Keislaman At Tahfidz Jurnal Ilmu Al-Qur'an dan Tafsir Jurnal Pallangga Praja Jurnal Informatika Polinema (JIP) Jurnal Ilmu Komunikasi dan Sosial Politik INDOPEDIA (Inovasi Pembelajaran dan Pendidikan) Jurnal Pengabdian Masyarakat dan Riset Pendidikan LATAR, Jurnal Arsitektur Jurnal Pengabdian Masyarakat Cendikia Jenius International Journal of Technology and Education Research International Journal of Educational Evaluation and Policy Analysis Akhlak: Jurnal Pendidikan Agama Islam Dan Filsafat International Journal of Computer Technology and Science International Journal of Electrical Engineering, Mathematics and Computer Science Journal of Informatics and Science Media (JISMEDIA) Fundamental : Jurnal Ilmiah Hukum Advance Sustainable Science, Engineering and Technology (ASSET)
Claim Missing Document
Check
Articles

PEMAHAMAN WEB PHISHING: STRATEGI KESADARAN DAN PENGAMANAN DATA YANG EFISIEN Alfino Nicolas Prasetya; Muhammad Aji Faturahman; Muhammad Faisal; Raihan Hasbi Hilal; Rico Fadillah; Rico Jawi; Teuku Alif Rican Aldian; Wanda Alpiyandi
APPA : Jurnal Pengabdian Kepada Masyarakat Vol 2 No 4 (2024): APPA : Jurnal Pengabdian kepada Masyarakat
Publisher : Shofanah Media Berkah

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Web phishing adalah taktik penipuan daring yang mengancam keamanan data pengguna dengan menyamar sebagai entitas tepercaya. Kegiatan pengabdian masyarakat ini bertujuan meningkatkan pemahaman siswa/i Sekolah Menengah Kejuruan (SMK) Al Amanah terhadap ancaman web phishing serta strategi pengamanan data yang efisien. Metode yang digunakan meliputi seminar, workshop, dan simulasi serangan phishing. Hasil evaluasi menunjukkan peningkatan pemahaman siswa/i terhadap strategi pengamanan data hingga 85%. Kegiatan ini mendapatkan tanggapan positif dari siswa/i sebagai langkah edukasi penting untuk menghadapi ancaman digital.
SOSIALISASI MOMMY BRAIN: RAHASIA DI BALIK PERUBAHAN KOGNITIF SAAT HAMIL DAN SETELAH MELAHIRKAN Aprizal, Fardhan; Nurhasanah, Nurhasanah; Siti Nurjannah; Muhammad faisal; ⁠Sri Utamini; Zufri, Zufri
Jurnal Pengabdian Kolaborasi dan Inovasi IPTEKS Vol. 2 No. 6 (2024): Desember
Publisher : CV. Alina

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59407/jpki2.v2i6.1515

Abstract

Mommy Brain atau Momnesia adalah istilah yang digunakan untuk menggambarkan perubahan kognitif yang dialami oleh seorang ibu setelah melahirkan, yang ditandai dengan peningkatan lupa, kebingungan, dan kesulitan dalam berkonsentrasi. Pengabdian ini bertujuan untuk memberikan psikoedukasi tentang Mommy Brain di daerah Alue Buket, Kec. Lhoksukon, Kab. Aceh Utara, untuk meningkatkan pemahaman masyarakat, khususnya ibu-ibu, mengenai kondisi ini. Metode yang digunakan dalam kegiatan ini adalah ceramah dan sesi berbagi (sharing session) dengan tema "Mengenal Mommy Brain/Momnesia: Rahasia di Balik Perubahan Kognitif Saat Hamil dan Setelah Melahirkan". Evaluasi dilakukan dengan pretest dan posttest untuk mengukur peningkatan pengetahuan peserta setelah mengikuti kegiatan psikoedukasi. Hasil analisis menunjukkan bahwa masyarakat, khususnya ibu-ibu di daerah Alue Buket, tidak mengetahui istilah Mommy Brain sebelumnya. Namun, setelah dilakukan sosialisasi, pengetahuan mereka meningkat sesuai dengan hasil pretest dan posttest. Kata Kunci: Mommy Brain, Ibu, Psikoedukasi
Pengaruh Product Quality dan Promotion Terhadap Trust dan Purchase Decision pada Produk Valizastuff di Shopee Muhammad Faisal; Parlagutan Silitonga
EKONOMIKA45 :  Jurnal Ilmiah Manajemen, Ekonomi Bisnis, Kewirausahaan Vol. 12 No. 1 (2024): Desember : Jurnal Ilmiah Manajemen, Ekonomi Bisnis, Kewirausahaan
Publisher : Fakultas Ekonomi Universitas 45 Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30640/ekonomika45.v12i1.3679

Abstract

This study aims to determine the relationship between product quality and promotion on trust and purchasing decisions at the Valizastuff online store in e-commerce. The population in this study were all Valizastuff customers. This study involved 240 respondents who were collected using questionnaire distribution with Accidental Sampling technique. The data analysis method was carried out using Structural Equation Modeling (SEM) with the help of Smart-PLS software (v.3.2.9). The results of this study indicate a significant influence between product quality and promotion on trust and purchasing decisions. The results show a positive and significant direct influence between product quality on trust and purchasing decisions and the results of this study indicate that promotion has a positive and significant influence on trust and purchasing decisions. Trust also has a positive and significant influence on purchasing decisions. Therefore, it is important to maintain consumer trust in an effort to increase purchasing decisions.
RANCANG BANGUN ALAT PRESS BRIKET ARANG TEMPURUNG KELAPA BERBASIS ELEKTRO PNEUMATIK Muhammad Faisal; Hasbi Assiddiq S.; Mochamad Bastomi
JURNAL TEKNOLOGI TECHNOSCIENTIA Technoscientia Vol 17 No 1 September 2024
Publisher : Lembaga Penelitian & Pengabdian Kepada Masyarakat (LPPM), Universitas AKPRIND Indonesia Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34151/technoscientia.v17i1.4873

Abstract

Penelitian ini bertujuan melakukan rancang bangun alat press briket arang tempurung kelapa menggunakan sistem pneumatik. Metode eksperimental digunakan dalam memperoleh hasil pengujian alat press briket dan diperoleh temperatur pembakaran hasil cetakan. Hasil penelitian didapatkan prinsip kerja alat press briket yaitu kontrol pengepressan menggunakan sistem pneumatik yang memanfaatkan udara bertekanan dalam melakukan pencetakan briket dengan jumlah sekali cetak 16 briket. Hasil pengujian pada tekanan pencetakan 80 psi diperoleh ukuran briket dengan tinggi 54,73 mm dan diameter 35,31 mm. Sedangkan pada tekanan 85 psi diperoleh ukuran rata-rata briket yaitu tinggi 53,59 mm dan diameter 35,37 mm dan pada tekanan 90 psi dihasilkan ukuran tinggi briket 52,66 mm dan diameter 35,37 mm, waktu press masing-masing 70 detik dengan jumlah 16 briket. Alat press briket arang tempurung kelapa menghasilkan 822 briket/jam. Hasil pengujian pembakaran pada briket yang telah dicetak didapatkan temperatur tertinggi pada waku pembakaran setelah mencapai 25 menit, briket dengan tekanan 80 psi diperoleh temperatur sebesar 578oC, pada briket dengan tekanan 85 psi diperoleh temperatur sebesar 630oC, dan briket dengan tekanan udara 90 psi diperoleh temperatur sebesar 852oC. Berdasarkan hasil pengujian semakin besar tekanan udara dalam pengepressan briket maka didapatkan temperatur maksimal pembakaran pada briket arang tempurung yaitu pada tekan udara 90 psi.
ANALISIS PENGGUNAAN BAHASA INDONESIA DAN KESALAHAN SISTEMATIS DALAM PENULISAN TEKS ARTIKEL ILMIAH MAHASISWA M. Andrey Harun; Alan Fariz Maulana; Muhammad Rizky Fauzi; Muhammad Faisal
Argopuro: Jurnal Multidisiplin Ilmu Bahasa Vol. 4 No. 3 (2024): Argopuro: Jurnal Multidisiplin Ilmu Bahasa
Publisher : Cahaya Ilmu Bangsa Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.6734/argopuro.v4i3.7218

Abstract

Penelitian ini bertujuan untuk menganalisis penggunaan bahasa Indonesia dalam penulisan artikel ilmiah, dengan fokus pada aspek kebahasaan serta sistematika penulisan. Pendekatan yang digunakan dalam penelitian ini adalah kualitatif dengan metode deskriptif. Data dikumpulkan melalui teknik studi dokumenter dan dianalisis dengan menggunakan model analisis interaktif. Hasil penelitian mengungkapkan adanya kesalahan dalam ejaan, termasuk penulisan kata, penggunaan huruf, tanda baca, serta penerapan unsur serapan. Selain itu, analisis terhadap sistematika penulisan juga menemukan beberapa kekeliruan, seperti judul artikel yang terlalu singkat dan tidak cukup informatif, latar belakang dalam pendahuluan yang tidak relevan dengan permasalahan, kesimpulan yang tidak menjawab pertanyaan penelitian, serta inkonsistensi dalam penulisan daftar pustaka, termasuk referensi yang tidak tersusun secara alfabetis.
Blockchain-Enhanced Multi-Factor Authentication for Securing IIoT Allyson Eddy; Bram Zoe anak Guillan; Einstein Kent Elias; Eldren Aniell; Shircrayson bin Simon; Muhammad Faisal
International Journal of Electrical Engineering, Mathematics and Computer Science Vol. 1 No. 3 (2024): September : International Journal of Electrical Engineering, Mathematics and Co
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijeemcs.v1i3.16

Abstract

This paper proposes Blockchain-Enhanced Multi-Factor Authentication (BEMFA) to address the limitations of existing authentication mechanisms in the Industrial Internet of Things (IIoT). BEMFA combines multi-factor authentication (MFA) with blockchain technology to ensure robust, scalable, and tamper-resistant security tailored to IIoT environments. This method dynamically manages roles and permissions, detects malicious devices, and ensures data integrity and authenticity. Our results demonstrate that BEMFA significantly enhances security, addressing critical access control challenges and mitigating risks posed by malicious devices while maintaining data integrity.
Enhancing Aspects of IIoT Networks with Federated Learning Blockchain Integrated Authentication Solution Ling, Fang Ting; Ng Hui Wen; Tsi Shi Ping; Vivian Bong Chiaw Cin; Yew Wei Yi; Muhammad Faisal
International Journal of Electrical Engineering, Mathematics and Computer Science Vol. 1 No. 3 (2024): September : International Journal of Electrical Engineering, Mathematics and Co
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijeemcs.v1i3.17

Abstract

The Industrial Internet of Things (IIoT) faces various challenges in ensuring secure communication, authentication, and data integrity due to its distributed nature and evolving threat landscape. To address these issues, this paper proposes the integration of blockchain authentication as a robust solution to enhance security and reliability in IIoT networks. By leveraging Federated Learning with blockchain technology, the proposed solution aims to improve authentication mechanisms by training models across multiple edge devices, increasing fault tolerance, and adaptability while reducing the risk of single points of failure. The use of blockchain technology ensures a tamper-proof and transparent ledger for securely storing authentication data and model updates, enhancing security and integrity in IIoT networks. The results and analysis demonstrate that the integration of Federated Learning and blockchain technology effectively addresses interoperability issues, performance optimization concerns, and security vulnerabilities within IIoT networks, offering a more efficient, secure, and scalable authentication alternative.
Enhancing Security in Industrial IoT Through Blockchain-based Authentication Mechanisms Phiang, Jun Kong; Vivian Yong Siew Yee; bin Hilmi, Hafizuddin; Dedree Leonna Lai; Ng Ee Zoe; Muhammad Faisal
International Journal of Electrical Engineering, Mathematics and Computer Science Vol. 1 No. 3 (2024): September : International Journal of Electrical Engineering, Mathematics and Co
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijeemcs.v1i3.20

Abstract

The Industrial Internet of Things (IIoT) has revolutionized industrial processes, offering automation and data-driven decision-making. However, this interconnectedness brings new security challenges, especially in crucial infrastructure sectors. Traditional security measures are inadequate, leading to the exploration of innovative solutions. Blockchain technology has emerged as a promising solution due to its decentralized and immutable nature. This paper proposes a Hybrid Blockchain-Based Authentication Mechanism for IIoT, combining Delegated Proof of Stake (DPoS) and Elliptic Curve Cryptography (ECC). The hybrid architecture utilizes public and private blockchains to ensure scalability, efficiency, and security. Lightweight consensus algorithms, DPoS, are incorporated to optimize performance, while ECC provides efficient cryptographic techniques suitable for IIoT environments. An interoperable framework facilitates seamless integration with existing infrastructure, ensuring regulatory compliance and compatibility. Decentralized identity management further enhances security and privacy. Results and analysis demonstrate the effectiveness of the proposed solution, positioning hybrid blockchain architecture as the most suitable approach for enhancing security in IIoT environments.
Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme Azreen Shafieqah Asri; Faizatul Fitri Boestamam; Harith Zakwan Bin Zakaria; Mohammad Amir Alam Rahim Omar; Mohammad Hamka Izzuddin Bin Mohamad Yahya; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.19

Abstract

With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and threat detection into the blockchain authentication scheme; second, implementing Ethereum smart contracts for enhanced authentication with a two-factor authentication (2FA) system and GFE algorithms. By combining AI for anomaly detection with decentralized smart contracts and blockchain-based 2FA, and leveraging GFE algorithms to enhance blockchain capabilities, the proposed scheme aims to significantly fortify security measures. This integration offers a resilient defense against evolving threats, ensuring transparency, adaptability, and heightened security in IIoT applications.
Enhancing Authentication Security: Analyzing Time-Based One-Time Password Systems Asyura Binti Sofian; Ayu Fitri Alafiah Binti Peradus; Fidel Yong; Irvine Shearer; Nurrul Nazwa Binti Ismail; Yugendran A/L Mahendran; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.25

Abstract

This paper explores the Time-Based One-Time Password (TOTP) authentication mechanism enhanced with lightweight cryptographic algorithms, presenting it as an advanced solution to the limitations of traditional OTP systems. There are a lot of applications and systems where this mechanism is applied. For example, bank applications, e-commerce websites, access control system, healthcare system, etc. TOTP generates dynamic, time-sensitive passwords using the current time and a secret key processed through a cryptographic hash function, significantly improving security by reducing vulnerabilities to code reused and interception. The adoption of lightweight algorithms ensures that TOTP can be efficiently implemented on resource-constrained devices, such as those on the Internet of Things (IoT) ecosystem. Despite its benefits, TOTP faces challenges including synchronization issues between client devices and servers, and a trade-off between computational efficiency and security strength. This paper discusses the implications of these challenges and evaluates how TOTP, with appropriate design considerations, can provide a robust, secure, and efficient authentication method suitable for various applications, from digital banking to IoT environments.
Co-Authors , Elfitra Desy Surya Abdul Saman Abiyyu Akbar Aristy Ade Rizky Amalia Aditya Candra Afdal Syahreza Agussalim Agussalim Al Juhaeda, Zul Iflah Alan Fariz Maulana Alfandy Pratama Alfino Nicolas Prasetya Ali, Rana Mohsin Allyson Eddy Almeida, Maria Amalia Nur Azizah Aminuyati Amir Husin Andi M. Rifiyan Arief Andri Nirwana AN Anjelita Sinaga Aprizal, Fardhan Arditya Ferbiyanto Areeba Shahid Ari Asmawati Ariati Rusli Arief, Maryam Jamila Arifudin ' Aris Bahasruddin Arnetty, Arnetty Asy'ari Asy'ari Asyura Binti Sofian Ayu Fitri Alafiah Binti Peradus Azreen Shafieqah Asri Bayu Al Badjie Hasan Benyamin Parubak bin Hilmi, Hafizuddin Bram Zoe anak Guillan Brendan Chan Kah Le Burhanudin Yusuf Clarissa Tarigan Dahyar Daraba Dalmi Iskandar Sultani Daniel Happy Putra Darmansjah Tjahja Prakasa Deden Rustiana Dedree Leonna Lai Defa Agripratama Ali Dewi Rosmalia, Dewi Dewi Susanti dewi susanti Dwi Khairani Edwien Setiwan Saputra Einstein Kent Elias Eka Sukanti Elda Yusefni Eldren Aniell Eliya Mursyida Erfendi Regar Erma Suryani Sahabuddin Erwani Estella Blessings Evita Andriani Sahbani Faizatul Fitri Boestamam Farhan, Rivki Lutfiya Farris Althaf Pratama Fauzi Sediyawan Fidel Yong Fifi Candita Firman Fisa, Triansyah Ghaitsa Zahira Ardelia Putri Ghulam Asrofi Buntoro Gihon Nugrahadi Grasila Huney Wan Hairunnas, Hairunnas Hamza Khaliq Harith Zakwan Bin Zakaria Hasbi Assiddiq S Hasmia M Arifin Helmi Helmi Hotlina Sihombing I Putu Eka Juliantara Ida Parida Ikbal Maulana Indah Puji Astuti Indawan Syahri Indra Dharma Wijaya Indriani Adha IRA NURIYA SANTI Irenna Wanisha Irvine Shearer Iswahyudi ISWAHYUDI ISWAHYUDI James, Jaymaxcklien Bravyain Jumalia Mannayong Juminten Saimin Khairunnisa Kumalasari, Reni Kusumawati, Yulia Tri Laila Rohani Lee Kai Yue Lina Iamayanti Ling, Fang Ting M Komarudin M. Andrey Harun Marwan, Deinike Wanita Maryam Jamila Arief Masruchin, Febby Rahmatullah Maya Jannah Meiske Wenno Mesra B Mgs. Sulaiman Mico Ferdian Minarni Minarni Mirza Adia Nova Misdi Misdi Mochamad Bastomi Mochamad Imamudin Mohammad Amir Alam Rahim Omar Mohammad Bakery, Luqmanul Hakim Mohammad Hamka Izzuddin Bin Mohamad Yahya Mona Arif Muda Mualifah Muh. Rizal S, Herling Muhammad Aji Faturahman Muhammad Aksan Muhammad Ernanda Taufiq Muhammad Hariansyah Muhammad Jailani Muhammad Razak Alfianto Muhammad Rizky Fauzi Muhammad Thoriq Al Rosyid Muhartini Muhartini Mukhairir Fikri Ihsan mulyati mulyati Muthmainnah Muthmainnah Mutiawati Mutiawati Muzakir Nazar Fadli Nazwa Ramadhona Ng Ee Zoe Ng Hui Wen Nida Husna Abdul Malik Novian Tri Wahyudi Nur Syahrina Binti Juni Nur Zakiyah Darajat Nurhasanah Nurhasanah Nurhikmah Nuri Nazirah Binti Ismail Nurlina Nurlina Nurrul Nazwa Binti Ismail Nyaknong Karti Alifah Padeli Padeli Parlagutan Silitonga Periskila Dina Kali Kulla Phiang, Jun Kong Pradipta Bagas Daniswara Praja Hadi Saputra Priyanto Priyono Priyono Rachmat Suryadithia Rafli Almubarok Rafy Muhammad Toha Rahma Ashari Hamzah Rahmat Mubaraq Raihan Hasbi Hilal Rebecca Ling Ze Siew Restia Christistianty Rico Fadillah Rico Jawi Rimsa Desela putri br Panjaitan Roestaman Roestaman RR. Roosita Cindrakasih Rudi Salam Rully Soeriaatmadja Samuel, Melvianna Sari Wulandari Satriyono, Adiska Putra Bagas Sawaluddin Siregar Semuel Souhoka Shircrayson bin Simon Siregar, Risdalina Siska Debora Siti Aisyah Siti Aisyah Nabilah Binti Banchi Siti Malika Azizatul Siti Nurjannah Sri Anggarini Sri Handayani Ashary Sri Rahmi Sriwahyuni Pasaribu Sudirman Suhanda Saputra Suhartono Sultan Himawan Syaiful Hadi Tahara Dilla Santi TB, Desita Ria Yusian Teuku Alif Rican Aldian Thomafi, Muhamad Arvan Tohar, Ibrahim Trisno Utomo Naibaho Trisya Septiana Tsi Shi Ping Venetha A/P Loganathan Vina Maulidya Vivian Bong Chiaw Cin Vivian Yong Siew Yee Wahyudi Umar Wanda Alpiyandi Widya Karmila Sari Achmad Wiranti Sri Utami Witeno, Jeremy Silas Xavier Liong Zhi Hao Yew Wei Yi Yugendran A/L Mahendran Yuni Hafita Zubair Zubair Zufri, Zufri Zulfikri Zulfikri ⁠Sri Utamini