p-Index From 2021 - 2026
13.508
P-Index
This Author published in this journals
All Journal Techno.Com: Jurnal Teknologi Informasi JURNAL PENGABDIAN KEPADA MASYARAKAT Sistemasi: Jurnal Sistem Informasi Sinkron : Jurnal dan Penelitian Teknik Informatika MODELING: Jurnal Program Studi PGMI IT JOURNAL RESEARCH AND DEVELOPMENT PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer Jurnal Teknik Informatika UNIKA Santo Thomas INTECOMS: Journal of Information Technology and Computer Science Zero : Jurnal Sains, Matematika, dan Terapan ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA JISTech (Journal of Islamic Science and Technology) AXIOM : Jurnal Pendidikan dan Matematika Jurnal Teknologi Sistem Informasi dan Aplikasi J-SAKTI (Jurnal Sains Komputer dan Informatika) IJISTECH (International Journal Of Information System & Technology) KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) The IJICS (International Journal of Informatics and Computer Science) JURIKOM (Jurnal Riset Komputer) JOURNAL OF SCIENCE AND SOCIAL RESEARCH Kurawal - Jurnal Teknologi, Informasi dan Industri Jurnal Riset Informatika AL-ULUM: JURNAL SAINS DAN TEKNOLOGI Jurnal Ilmiah Binary STMIK Bina Nusantara Jaya Jurnal Review Pendidikan dan Pengajaran (JRPP) Progresif: Jurnal Ilmiah Komputer Jurnal Informatika dan Rekayasa Elektronik JSR : Jaringan Sistem Informasi Robotik Jatilima : Jurnal Multimedia Dan Teknologi Informasi Jurnal Teknik Informatika C.I.T. Medicom G-Tech : Jurnal Teknologi Terapan Science Midwifery JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) JIKA (Jurnal Informatika) INFOKUM Community Development Journal: Jurnal Pengabdian Masyarakat U-NET Jurnal Teknik Informatika Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) MEANS (Media Informasi Analisa dan Sistem) Journal of Computer Networks, Architecture and High Performance Computing JiTEKH (Jurnal Ilmiah Teknologi Harapan) IJISTECH Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Pendidikan dan Teknologi Indonesia Journal La Multiapp Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD Bulletin of Computer Science Research KLIK: Kajian Ilmiah Informatika dan Komputer Instal : Jurnal Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Info Sains : Informatika dan Sains Jurnal Mandiri IT Jurnal Teknik Informatika Unika Santo Thomas (JTIUST) Jurnal Armada Informatika Journal of Information Systems and Technology Research Jurnal Sains dan Teknologi JOMLAI: Journal of Machine Learning and Artificial Intelligence Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer Innovative: Journal Of Social Science Research Jurnal Komputer Antartika Scientica: Jurnal Ilmiah Sains dan Teknologi Jurnal Pengabdian Masyarakat Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Jurnal Ilmiah Nusantara Modem : Jurnal Informatika dan Sains Teknologi Polygon: Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi Teknologi : Jurnal Ilmiah Sistem Informasi
Claim Missing Document
Check
Articles

Proteksi Database dengan Algoritma Vernam Cipher Murdani; Eferoni Ndururu; Muhammad Sayuthi; Abdul Halim Hasugian
Jurnal Armada Informatika Vol 6 No 2 (2022): Jurnal Armada Informatika : Edisi Desember
Publisher : STMIK Methodist Binjai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36520/jai.v6i2.61

Abstract

Secara umum, sebagian besar pelanggaran keamanan terjadi karena administrasi keamanan yang buruk karena ekspektasi yang tidak realistis terhadap kemampuan alat keamanan membuat pengguna lengah. Satu-satunya cara untuk mencegah insiden tersebut adalah dengan meningkatkan kesadaran keamanan di seluruh kelompok pengguna. Sampai orang mendapatkan pemahaman yang memadai tentang keamanan dan menerima pelatihan dalam tata kelola keamanan, administrasi keamanan yang tepat dapat dilakukan. Banyak perusahaan atau organisasi ragu-ragu untuk mengimplementasikan enkripsi karena keyakinan bahwa memanfaatkan teknologi enkripsi akan memperlambat kinerja sistem. Bahkan untuk perusahaan yang menerapkan enkripsi, mereka percaya bahwa penurunan kinerja hanyalah pertukaran yang diperlukan – harga yang harus dibayar agar data mereka aman. Enkripsi harus diterapkan dengan tepat di ketiga lapisan sistem TI, yaitu lapisan aplikasi, sistem, dan jaringan. Dengan manajemen kunci yang aman, manajemen hak istimewa, dan kontrol akses, enkripsi yang solid dapat dicapai. Penelitian ini mencoba salah satu penanganan database dengan algoritma vernam cipher.
KOMBINASI ALGORITMA BEAUFORT CIPHER DAN LSB2BIT UNTUK KEAMANAN FILE TEKS Abdul Halim Hasugian; Yusuf Ramadhan Nasution; Nadyah Almirah Simanjuntak
Jurnal Informatika dan Rekayasa Elektronik Vol. 6 No. 1 (2023): JIRE April 2023
Publisher : LPPM STMIK Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/jire.v6i1.730

Abstract

Pesatnya perkembangan ilmu pengetahuan dan teknologi telah memunculkan teknik-teknik baru yang dapat disalahgunakan untuk mengancam keamanan suatu sistem informasi. Dengan perkembangan zaman, teknologi yang mengancam keamanan data selalu satu tingkat lebih maju dari teknologi yang melindungi data. Oleh karena itu, muncul ide dalam menanggapi permasalahan tersebut, bahwa dirasa penting untuk membuat sistem yang aman yang dapat melindungi data dengan cara mengkodekannya sehingga sulit untuk dideteksi oleh pihak yang tidak berwenang. Kriptografi dan steganografi adalah dua ilmu keamanan data yang terkenal. Dalam penelitian ini, peneliti menggunakan algoritma kriptografi dan steganografi Beaufort dan LSB2bit. Algoritma Beaufort adalah metode cipher yang didasarkan pada cipher Vigenere. Di Beaufort, kunci K adalah string karakter K = k1 ... kd di mana ki diperoleh dari transformasi alfabet I sebanyak dalam cipher vegenere.Algoritma LSB adalah cara memasukkan bit pesan ke bit gambar terendah sehingga gambar tidak berubah secara berarti. Penelitian ini menghasilkan sebuah aplikasi yang dapat melindungi pesan dan menyisipkannya ke dalam gambar menggunakan teknik kriptografi dan steganografi. Sehingga orang yang tidak berhak tidak menyadari akan keberadaan suatu pesan rahasia pada citra yang dijadikan cover.
Application of color extraction methods and k-nearest neighbor to determine maturity avocado butter Wina Fadia Ardianti; Sriani Sriani; Abdul Halim Hasugian
Jurnal Teknik Informatika C.I.T Medicom Vol 15 No 1 (2023): March: Intelligent Decision Support System (IDSS)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/cit.Vol15.2023.375.pp09-20

Abstract

Computerization requires system testing and further system development, namely color feature extraction with KNN. Avocado is one that has a high protein content in it. This research uses the KNN algorithm method and feature extraction in order to get more effective results, the purpose of this research is to make it easier for people to choose the ripeness level of butter avocados because people still don't know about the maturity level of butter avocados. In this study, testing was carried out by bringing the avocado fruit closer to the cellphone camera connected to the researcher's internet, after which the application will automatically match the color of the avocado. to the system, the system will produce output based on that color with output in the form of the ripeness level of the avocado, whether it is ripe, ripe, half ripe, rotten and also generates information on how much longer the avocado will ripen. All stages of system development are carried out by analyzing data first, then taking sample data, training and testing datasets, then the results of the system will become benchmarks. The test data in this study used several types of avocado objects, namely: Raw, Half Ripe, Ripe, Ripe, Rotten. It consisted of 55 data samples consisting of 11 raw avocado samples, 11 half-ripe avocado samples, 11 ripe avocado samples, 11 ripe avocado samples and 11 rotten avocado samples. Obtained euclidean distance values ​​for each type of avocado butter. After that, the sum is done to get the overall level of accuracy by adding up the total euclidean distance with the total euclidean distance for each type of avocado. After getting the added value multiply it by 100%. Then the overall accuracy results obtained are 98.38%.
DESIGN AND CONSTRUCTION OF CAR RENTAL MONITORING SYSTEM BASED ON MICROCONTROLLER INTEGRATED THROUGH SMARTPHONE USING FUZZY MAMDANI METHOD Rakhmat Kurniawan R; Abdul Halim Hasugian; Alwy Azyari Harahap
INFOKUM Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (683.626 KB)

Abstract

The increasing human needs to follow human needs as well as the lack of employment opportunities make some people do the theft mode. Some of them are by borrowing a car rental, but in certain cases the borrower does not return the car or it can be called as running away or stealing with borrowed mode. Therefore, the author wants to make a tool that can monitor the car remotely using a microcontroller, where the MPU-6050 sensor will be used to determine the status of the car when it is on, off, and running. The Ublox Neo6M GPS module will also be used to track the car's location. The output to be received will be sent through the intermediary of the 800L SIM module. In this study using the Mamdani fuzzy method because this method is suitable for use in most real-time problems such as making decisions to look for engine vibrations in cars that change and are less certain. In this study, the average percentage difference between the MPU-6050 sensors is 6.722%. With this fuzzy logic method, a mathematical framework is obtained that is used to represent uncertainty, ambiguity, imprecision, lack of information and partial truth. Keywords: Monitoring System, Car Rental, Microcontroller, Fuzzy Mamdani.
Peran Mahasiswa KKN dalam Bidang Pendidikan di Desa Bahjoga Utara Utara Abdul Halim Hasugian; Ajeng Dwi Pratiwi; Adam Damiri Manurung; Hanny Puput Eliyarista Saragih; Rahmawati Rahmawati
MODELING: Jurnal Program Studi PGMI Vol 10 No 2 (2023): Juni
Publisher : Program Studi PGMI Sekolah Tinggi Ilmu Tarbiyah Nahdlatul Ulama Al Hikmah Mojokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36835/modeling.v10i2.1736

Abstract

KKN (Real Work Lectures) activities are activities that must be followed by every student in lectures at least Strata One (S.1) at Higher Education Institutions, such as at the State Islamic University of North Sumatra, every 6th semester student and above must take part in KKN (Real Work Lectures) activities. ). Several students of the State Islamic University of North Sumatra carried out KKN (Real Work Lectures) in Bahjoga Utara village, Simalungun in July 2022. Students who carried out KKN (Real Work Lectures) in Bahjoga Utara village were 20 students and 6 students of which, all students/ I come from Simalungun. The students came from 4 faculties and 7 study programs. The method of carrying out the activities is carried out by surveying locations by KKN participants in several visits with the aim of seeing the condition of the village that will be inhabited for one month. Then the KKN participants socialized with the surrounding community to introduce themselves and provide information about the whereabouts of the participants with the aim of helping the surrounding community and helping find solutions to existing problems. Several educational institutions in Bahjoga Utara Village are the targets of the KKN student work program which is carried out routinely every day. All KKN students play a role in assisting the implementation of education in the village. Not only at school, KKN students also hold free lessons and teach the Koran for children in the village in order to maximize educational activities in the village. We hope that the Community Service Program that we carry out in the village can be a factor that helps the implementation of better education.
Sistem Pakar Diagnosis Awal Tingkat Stres pada Korban Bullying dengan Metode Forward Chaining Berbasis Web Sheila Safira; Abdul Halim Hasugian; Heri Santoso
JITEKH Vol 11 No 2 (2023): September 2023
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jitekh.v11i2.799

Abstract

Abstrak−Tindakan melecehkan orang lain melalui penggunaan teknologi informasi dan komunikasi seperti media sosial, ponsel, dan video dikenal sebagai bullying. Bullying adalah perilaku agresif. Bullying dapat berdampak kepada gangguan psikologis seperti stres. Dalam ilmu psikologi, mengukur tingkat stres seseorang merupakan salah satu cara penerapan sistem pakar. Penelitian ini menggunakan metode forward chaining. Forward chaining adalah metode yang menarik kesimpulan dari data atau fakta. Forward chaining dimulai dengan informasi yang sudah ada dan menggunakan aturan untuk membuat kesimpulan untuk mendapatkan lebih banyak informasi sampai tujuan tercapai.data dikumpulkan dengan teknik kuesioner yang menghasilkan 40 poin aspek penilaian. Hasil penelitian menunjukkan perilaku bullying memiliki hubungan signifikan pada tingkst stres seseorang yang dapat mempengaruhi psikologis. Semakin berat gejala yg didapat semakin tinggi tingkat stress yang dialami. Kata Kunci: Perilaku bullying, Stress, Psikologis, Forward chaining Abstract− The act of harassing other people through the use of information and communication technologies such as social media, cell phones and videos is known as bullying. Bullying is aggressive behavior. Bullying can have an impact on psychological disorders such as stress. In psychology, measuring a person's stress level is one way of implementing an expert system. This research uses the forward chaining method. Forward chaining is a method that draws conclusions from data or facts. Forward chaining starts with existing information and uses rules to make conclusions to get more information until the goal is achieved. Data is collected using a questionnaire technique which produces 40 points of assessment aspects. The results showed that bullying behavior has a significant relationship to a person's stress level which can affect psychologically. The more severe the symptoms are, the higher the level of stress experienced. Keywords: Bullying behavior, Stress, Psychological, Forward chaining
Image Similarity Detection Application Using The Ratcliff/Obershelp Method And Levenshtein Distance Abdul Halim Hasugian; Suandi Padang
Bahasa Indonesia Vol 15 No 01 (2023): Instal : Jurnal Komputer
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Searching images with a similarity level of two images in a set of files with the Ratcliff/Obershel and Levenshtein Distance algorithms is expected to help human work. This algorithm is one of the algorithms that can be used to find the similarity of two images by taking the rgb value of each rgb of the pixels of each image. The search process to get the image with the highest similarity. The image format that can be input into the system is a bitmap image. Bitmap mapping of computer graphic images consisting of points that form rows and columns, images consisting of dots and pixels. In the bitmap format, the image is stored as a matrix where each element is used to store color information to store color information for each pixel. This study uses the Ratcliff/Obershelp algorithm and Levenshtein Distance is an image search algorithm that is carried out by searching for matches of the same rgb value in the image. The Ratcliff/Obershelp and Levenshtein Distance algorithms are carried out in detail by displaying the query value of the image similarity level and the part that it executes and displaying images in PNG, BMP, JPEG, ICO and JPG against image similarity search.
Decision Support System For New Employee Acceptance Using AHP and SAW Method Rahadian Fatta Batubara; Abdul Halim Hasugian
INTECOMS: Journal of Information Technology and Computer Science Vol 6 No 2 (2023): INTECOMS: Journal of Information Technology and Computer Science
Publisher : Institut Penelitian Matematika, Komputer, Keperawatan, Pendidikan dan Ekonomi (IPM2KPE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31539/intecoms.v6i2.7371

Abstract

The acceptance of employees in every company is an activity that always takes place in a certain period or incidentally. This recruitment process requires decision-making as well as other decision-making processes in different contexts. The selection of these future collaborators sometimes becomes difficult when there are many candidates from diverse backgrounds and when the acceptance criteria set are sometimes complex and sometimes contradictory. By solving these problems, this research provides a solution by developing a system using the application of AHP and SAW methods. The system development method is the waterfall model. Research results show that The decision support system for hiring employees at PT Naufal Indo Raya using Analytic Hierarchy Process (AHP) and Simple Additive Weighting (SAW) methods was developed using the web. And the results of applying Analytical Hierarchy Process (AHP) and Simple Additive Weighting (SAW) methods as employee hiring methods in the developed system have the same results in the evaluation process or of classification. Based on this system, Wahyu is known to have received the top rank with an overall score (AHP) of 917.1373 and a Vi(%) (SAW) value of 96.39%. In second place was obtained by Budi with an aggregate value (AHP) of 874.7115 and a Vi(%) value (SAW) of 93.29%. And in third place was obtained by Rudi with an aggregate value (AHP) of 870.6369 and a Vi(%) (SAW) value of 92.65%
Sistem keamanan folder dengan menggunakan algoritma rivest code 4: Sistem keamanan folder dengan menggunakan algoritma rivest code 4 Shania Oktawijaya; Ilka Zufria; Abdul Halim Hasugian
Jurnal Multimedia dan Teknologi Informasi (Jatilima) Vol. 5 No. 02 (2023): Jurnal Multimedia dan Teknologi Informasi (Jatilima)
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jatilima.v5i02.396

Abstract

Article history: The use of technology is an important need for society, so that data security is also increasingly stretched by crimes in the form of destruction or theft of data by irresponsible people. Securing the contents of data in a folder, for example, will keep the data safe and confidential so that it cannot be seen by anyone other than the intended recipient. Therefore, one way of storing data in folders must be treated in a special way, namely by using cryptography. Cryptography is the science and art of protecting the confidentiality of communications involving data and information. The Rivest Code 4 algorithm, a cryptographic technique, uses binary operations (XOR) to combine plaintext with stream ciphers that use the same key for bitwise or byte-by-byte encryption, so that security is maintained.
Penerapan Metode Elgamal Untuk Mengamankan Teks Pada File Dokumen Word Abdul Halim Hasugian; Raissa Amanda Putri; Annisa Shafira Zuhri
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 4 No. 2 (2023): Oktober 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v4i2.1277

Abstract

Text that contains a lot of characters always causes problems with storage media and time speed during data transmission. Text files are files that contain information in text form. data originating from word processing documents, numbers used in calculations, names and addresses in databases are examples of input text data consisting of characters, numbers and punctuation marks. The problem is that if the text file contains important information and is stolen, the thief can exploit the stolen data into profitable information and if the data is damaged then the data owner suffers a loss. therefore it is necessary to apply security to text files. This research uses the Elgamal method for security of important text files. with security using the elgamal method, important text files have good security. This algorithm is based on the discrete logarithm problem on the group ?P*. The ElGamal algorithm consists of three processes, namely the key formation process, the encryption process and the decryption process. This algorithm is a block cipher, which carries out an encryption process on plaintext blocks and produces ciphertext blocks which are then decrypted, and the results are combined back into a complete and comprehensible message. As a result of the research, it can be concluded that implementing a secret message application can secure Microsoft Word files. The result is that this application is very useful for securing documents so that their contents are not known by unauthorized people. This program produces applications using steps and formulas from the Elgamal algorithm, then changes the text content in the Microsoft Word file as input, then the Elgamal algorithm can be applied and turned into unknown codes (ciphertext). By using Visual Basic 2012 programming and then applying the algorithm or stages of Elgamal, it can result in the application of the Elgamal Method for Securing Microsoft Word Files
Co-Authors Abdillah, Ibnu Faiz Adam Damiri Manurung Adi Hartono Aditya Maulana Azanzi Girsang Afandi Sahputra Afiksih, Mufliha Afriani, Dina Aidil Halim Lubis Aidil Halim Lubis Ajeng Dwi Pratiwi Alfarizi, Muhammad Alhabib, Muhammad Farhan Ali Darta Ali Ikhwan Alwy Azyari Harahap Amalia Daulay, Rizki Amelia Anggraini, Arizka Anggraini, Sindi Annisa Shafira Zuhri Apriani, Puja Arif, Mhd. Fakhrozi Armansyah Armansyah Armansyah Aruan, Nur Jamilah Asrul Suwondo AULIA, RIZKA Auliani, Wirna Rizka Azhar, Joehari Azhari, Wahyu Bandaharo, Bandaharo Bermiko Kasah Padang Bunga Nurul Manisa Dea Amallia Deni Fahrizal Dewi Afrianti Dharma, Fahri Dinda Zukhoiriyah Eferoni Ndururu Elsa Azila Rahman Fakhriza, M. Farah Zaida Gema Ramadhan Gilang Armawan Saka Ginting, Masitha Putri Ardhana Girsang, Aditya Maulana Azanzi Gunawan, Gunawan Gunawan, Helmi Hanny Puput Eliyarista Saragih Harahap, Muhammad Fitrah Affandi Harahap, Nasywa Al Afif Hasibuan, Ardina Khoirunnisa Heni Pujiastuti Heri Santoso Heri Santoso Heri Santoso HERI SUSANTO Hidayati, Risma Hsb, Munawir Siddik Ibnu Rusydi Ikhsan, Muhammad Ilham Ilham Ilka Zufria Imam Zaki Husein Nst Irawan, Muhammad Arief Irene Sri Morina Januar, Bagus K Khairunnisa Khaidir Hanafi Khairuna Khairuna Khairunnisa, K Lubis, Akbar Maulana Lubis, Desy Ramadhani Lubis, Indah Alfitri M Mahyudi M. Fakhriza M. Khalil Gibran M. RIZKY RAMADHAN M.Alif Fahrezy Maimunah Rahmadani Marpaung, Rizq Alwi Marwah, Khoirul Wijak Alfaizh Maulida, Dzikra Maya Khairani Mhd Furqan Mhd Ikhsan Rifki Miftahul Jannah Muhammad Ezar Raditya Muhammad Ikhsan Muhammad Ikhsan Muhammad Ridzki Hasibuan Muhammad Sayuthi Muhammad Siddik Hasibuan Muhammad Suhery Mulya Alfan Simatupang Murdani Nadyah Almirah Simanjuntak Nasution, Yazid Hulaini Habbani Nasution, Yurika Nurmaiyah Nurmaiyah Ong, Russell Pahlevi, Mhd Rafly Syah Pazri Prasetio, Muhammad Aditya Prayoga, M. Irsan Pristiwanto, Pristiwanto Putra, Donny Dwi Putri Hanifah Putri, Cindy Ananda Putri, Pebriani Rahadian Fatta Batubara Rahmad Prayogi Harahap Rahmawati Rahmawati Raissa Amanda Putri Rajani, Attila Rakhmat Kurniawan R Ramadhani, Muthia Ramadhani, Silvia Rano, Rano Irawan Reza Muhammad Rijal, Mhd. Nanda Khairul Rina Widyasari Rizki Amalia Rizky Pratama Putra Rizky Ramadhan Rizqi Hidayat Tanjung RR. Ella Evrita Hestiandari Ryo Vikri Alif S, Amri Yuda Sabuki, Robi Saefuddin, Anan Saka, Gilang Armawan Sela, Dhea Shania Oktawijaya Sheila Safira Siahaan, Ahmad Taufik Al Afkari Simanjuntak, Salmah Simatupang, Aidil Akbar Siregar, Muhammad Faisal Siregar, Nora Arianti Siti Hayatul Fauziah Ritonga Siti Juhroini Ritonga Siti Nurhaliza Sofyan Siti Sumita Harahap Sitorus, Ridha Saryani Situmorang, Rantouli Solifiah Batubara, Febi Sriani Sriani Sriani Sriani, S Suandi Padang Suendri Suendri, Suendri Suhardi Suhardi Suhardi, Suhardi Sulindawaty T. Raihan Yudisthira TONNI LIMBONG Tria Elisa Ulfah, Auliana Wahyudi, Zul Attoriq Farhan Wina Fadia Ardianti Windary, Wanda Yani, Sri Suci Yusuf Karim Rambe Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution, Yusuf Ramadhan Zaidan, Muhammad Zidanul Akbar Ziqra Addilah