p-Index From 2020 - 2025
13.542
P-Index
This Author published in this journals
All Journal Techno.Com: Jurnal Teknologi Informasi JURNAL PENGABDIAN KEPADA MASYARAKAT Sistemasi: Jurnal Sistem Informasi Sinkron : Jurnal dan Penelitian Teknik Informatika MODELING: Jurnal Program Studi PGMI IT JOURNAL RESEARCH AND DEVELOPMENT PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer Jurnal Teknik Informatika UNIKA Santo Thomas INTECOMS: Journal of Information Technology and Computer Science Zero : Jurnal Sains, Matematika, dan Terapan ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA JISTech (Journal of Islamic Science and Technology) AXIOM : Jurnal Pendidikan dan Matematika Jurnal Teknologi Sistem Informasi dan Aplikasi J-SAKTI (Jurnal Sains Komputer dan Informatika) IJISTECH (International Journal Of Information System & Technology) KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) The IJICS (International Journal of Informatics and Computer Science) JURIKOM (Jurnal Riset Komputer) JOURNAL OF SCIENCE AND SOCIAL RESEARCH Kurawal - Jurnal Teknologi, Informasi dan Industri Jurnal Riset Informatika AL-ULUM: JURNAL SAINS DAN TEKNOLOGI Jurnal Ilmiah Binary STMIK Bina Nusantara Jaya Jurnal Review Pendidikan dan Pengajaran (JRPP) Progresif: Jurnal Ilmiah Komputer Jurnal Informatika dan Rekayasa Elektronik Jatilima : Jurnal Multimedia Dan Teknologi Informasi Jurnal Teknik Informatika C.I.T. Medicom G-Tech : Jurnal Teknologi Terapan Science Midwifery JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) JIKA (Jurnal Informatika) INFOKUM Community Development Journal: Jurnal Pengabdian Masyarakat U-NET Jurnal Teknik Informatika Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) MEANS (Media Informasi Analisa dan Sistem) Journal of Computer Networks, Architecture and High Performance Computing JiTEKH (Jurnal Ilmiah Teknologi Harapan) IJISTECH Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Pendidikan dan Teknologi Indonesia Journal La Multiapp Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD Bulletin of Computer Science Research KLIK: Kajian Ilmiah Informatika dan Komputer Instal : Jurnal Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Info Sains : Informatika dan Sains Jurnal Mandiri IT Jurnal Teknik Informatika Unika Santo Thomas (JTIUST) Jurnal Armada Informatika Journal of Information Systems and Technology Research Jurnal Sains dan Teknologi JOMLAI: Journal of Machine Learning and Artificial Intelligence Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer Jurnal Komputer Antartika Scientica: Jurnal Ilmiah Sains dan Teknologi Jurnal Pengabdian Masyarakat Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Jurnal Ilmiah Nusantara Modem : Jurnal Informatika dan Sains Teknologi Polygon: Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi
Claim Missing Document
Check
Articles

Aplikasi Deteksi Perubahan Wilayah dengan Menggunakan Metode Post-Classification Heri Susanto; Abdul Halim Hasugian; Yusuf Ramadhan Nasution
Jurnal Armada Informatika Vol 5 No 2 (2021): Jurnal Armada Informatika : Edisi Desember
Publisher : STMIK Methodist Binjai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36520/jai.v5i2.54

Abstract

Perubahan yang terjadi pada wilayah merupakan salah satu masalah yang dianggap signifikan dan strategis yang terjadi disetiap wilayah khusus nya    wilayah kabupaten penyabungan. salah satu masalah penting bagi perencana dan pembuat keputusan dalam kebijakan perkotaan dan regional. Data,    informasi, dan alat terkadang berubah menjadi beban dalam proses deteksi perubahan penggunaan lahan.Seiring dengan kemajuan teknologi yang ada untuk    mendeteksi perubahan suatu wilayah yang biasanya dilakukan secara manual (kasat mata, foto biasa), saat ini sudah mulai beralih ke penggunaan    teknologi citra (satelit), dimana hal ini disebabkan oleh teknologi satelit memungkinkan deteksi perubahan wilayah dapat dilakukan dalam skala luas,    waktu yang dibutuhkan lebih efisien efektif dibanding dengan teknik deteksi perubahan wilayah secara konvensional. Deteksi perubahan (change    detection) merupakan suatu proses identifikasi perubahan pada bentuk permukaan dalam suatu objek vegetasi penutup atau sebagai suatu    spectral/spasial gerakan badan vegetasi dari waktu ke waktu. Diantara beberapa metode deteksi perubahan yaitu dengan menggunakan Post-Classification    dengan pertimbangan kemudahn dalam implementasi, dimana metode ini bekerja dengan membandingkan 2 buah atau lebih citra temporal.
Proteksi Database dengan Algoritma Vernam Cipher Murdani; Eferoni Ndururu; Muhammad Sayuthi; Abdul Halim Hasugian
Jurnal Armada Informatika Vol 6 No 2 (2022): Jurnal Armada Informatika : Edisi Desember
Publisher : STMIK Methodist Binjai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36520/jai.v6i2.61

Abstract

Secara umum, sebagian besar pelanggaran keamanan terjadi karena administrasi keamanan yang buruk karena ekspektasi yang tidak realistis terhadap kemampuan alat keamanan membuat pengguna lengah. Satu-satunya cara untuk mencegah insiden tersebut adalah dengan meningkatkan kesadaran keamanan di seluruh kelompok pengguna. Sampai orang mendapatkan pemahaman yang memadai tentang keamanan dan menerima pelatihan dalam tata kelola keamanan, administrasi keamanan yang tepat dapat dilakukan. Banyak perusahaan atau organisasi ragu-ragu untuk mengimplementasikan enkripsi karena keyakinan bahwa memanfaatkan teknologi enkripsi akan memperlambat kinerja sistem. Bahkan untuk perusahaan yang menerapkan enkripsi, mereka percaya bahwa penurunan kinerja hanyalah pertukaran yang diperlukan – harga yang harus dibayar agar data mereka aman. Enkripsi harus diterapkan dengan tepat di ketiga lapisan sistem TI, yaitu lapisan aplikasi, sistem, dan jaringan. Dengan manajemen kunci yang aman, manajemen hak istimewa, dan kontrol akses, enkripsi yang solid dapat dicapai. Penelitian ini mencoba salah satu penanganan database dengan algoritma vernam cipher.
KOMBINASI ALGORITMA BEAUFORT CIPHER DAN LSB2BIT UNTUK KEAMANAN FILE TEKS Abdul Halim Hasugian; Yusuf Ramadhan Nasution; Nadyah Almirah Simanjuntak
Jurnal Informatika dan Rekayasa Elektronik Vol. 6 No. 1 (2023): JIRE April 2023
Publisher : LPPM STMIK Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/jire.v6i1.730

Abstract

Pesatnya perkembangan ilmu pengetahuan dan teknologi telah memunculkan teknik-teknik baru yang dapat disalahgunakan untuk mengancam keamanan suatu sistem informasi. Dengan perkembangan zaman, teknologi yang mengancam keamanan data selalu satu tingkat lebih maju dari teknologi yang melindungi data. Oleh karena itu, muncul ide dalam menanggapi permasalahan tersebut, bahwa dirasa penting untuk membuat sistem yang aman yang dapat melindungi data dengan cara mengkodekannya sehingga sulit untuk dideteksi oleh pihak yang tidak berwenang. Kriptografi dan steganografi adalah dua ilmu keamanan data yang terkenal. Dalam penelitian ini, peneliti menggunakan algoritma kriptografi dan steganografi Beaufort dan LSB2bit. Algoritma Beaufort adalah metode cipher yang didasarkan pada cipher Vigenere. Di Beaufort, kunci K adalah string karakter K = k1 ... kd di mana ki diperoleh dari transformasi alfabet I sebanyak dalam cipher vegenere.Algoritma LSB adalah cara memasukkan bit pesan ke bit gambar terendah sehingga gambar tidak berubah secara berarti. Penelitian ini menghasilkan sebuah aplikasi yang dapat melindungi pesan dan menyisipkannya ke dalam gambar menggunakan teknik kriptografi dan steganografi. Sehingga orang yang tidak berhak tidak menyadari akan keberadaan suatu pesan rahasia pada citra yang dijadikan cover.
Application of color extraction methods and k-nearest neighbor to determine maturity avocado butter Wina Fadia Ardianti; Sriani Sriani; Abdul Halim Hasugian
Jurnal Teknik Informatika C.I.T Medicom Vol 15 No 1 (2023): March: Intelligent Decision Support System (IDSS)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/cit.Vol15.2023.375.pp09-20

Abstract

Computerization requires system testing and further system development, namely color feature extraction with KNN. Avocado is one that has a high protein content in it. This research uses the KNN algorithm method and feature extraction in order to get more effective results, the purpose of this research is to make it easier for people to choose the ripeness level of butter avocados because people still don't know about the maturity level of butter avocados. In this study, testing was carried out by bringing the avocado fruit closer to the cellphone camera connected to the researcher's internet, after which the application will automatically match the color of the avocado. to the system, the system will produce output based on that color with output in the form of the ripeness level of the avocado, whether it is ripe, ripe, half ripe, rotten and also generates information on how much longer the avocado will ripen. All stages of system development are carried out by analyzing data first, then taking sample data, training and testing datasets, then the results of the system will become benchmarks. The test data in this study used several types of avocado objects, namely: Raw, Half Ripe, Ripe, Ripe, Rotten. It consisted of 55 data samples consisting of 11 raw avocado samples, 11 half-ripe avocado samples, 11 ripe avocado samples, 11 ripe avocado samples and 11 rotten avocado samples. Obtained euclidean distance values ​​for each type of avocado butter. After that, the sum is done to get the overall level of accuracy by adding up the total euclidean distance with the total euclidean distance for each type of avocado. After getting the added value multiply it by 100%. Then the overall accuracy results obtained are 98.38%.
DESIGN AND CONSTRUCTION OF CAR RENTAL MONITORING SYSTEM BASED ON MICROCONTROLLER INTEGRATED THROUGH SMARTPHONE USING FUZZY MAMDANI METHOD Rakhmat Kurniawan R; Abdul Halim Hasugian; Alwy Azyari Harahap
INFOKUM Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (683.626 KB)

Abstract

The increasing human needs to follow human needs as well as the lack of employment opportunities make some people do the theft mode. Some of them are by borrowing a car rental, but in certain cases the borrower does not return the car or it can be called as running away or stealing with borrowed mode. Therefore, the author wants to make a tool that can monitor the car remotely using a microcontroller, where the MPU-6050 sensor will be used to determine the status of the car when it is on, off, and running. The Ublox Neo6M GPS module will also be used to track the car's location. The output to be received will be sent through the intermediary of the 800L SIM module. In this study using the Mamdani fuzzy method because this method is suitable for use in most real-time problems such as making decisions to look for engine vibrations in cars that change and are less certain. In this study, the average percentage difference between the MPU-6050 sensors is 6.722%. With this fuzzy logic method, a mathematical framework is obtained that is used to represent uncertainty, ambiguity, imprecision, lack of information and partial truth. Keywords: Monitoring System, Car Rental, Microcontroller, Fuzzy Mamdani.
IMPLEMENTATION OF SUGENO FUZZY LOGIC ON A RICE-EATING BIRD REPELLENT IN RICE FIELDS TO HELP FARMERS BASED ON MICROCONTROLLERS Muhammad Ikhsan; Abdul Halim Hasugian; Gunawan Gunawan
ZERO: Jurnal Sains, Matematika dan Terapan Vol 6, No 2 (2022): Zero: Jurnal Sains Matematika dan Terapan
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30829/zero.v6i2.15031

Abstract

The rapid development of technology in the current era, especially in the field of sensors, has made many technologies that use sensors appear. In the agricultural sector itself, the use of sensor technology is not spared. In the agricultural sector, rice fields also require a tool that can detect pests which are usually done by the manual method. The purpose of this research is to help farmers repel bird pests with automation tools to make it easier to monitor the fields from pests. This study conducted experiments carried out by manipulating the research object. The tools used are Arduino Uno microcontrollers as tool controllers, PIR sensors as detection sensors and servo motors as tool drivers. When a pest is detected by the sensor it is then sent to the device controller in the form of Arduino after which the servo motor moves. From the results of testing all the components of the tool, it can be concluded that the results of the entire system work and function in accordance with the system design, the results of the PIR sensor test can detect objects that pass through the sensor with an average of 120 cm
Peran Mahasiswa KKN dalam Bidang Pendidikan di Desa Bahjoga Utara Utara Abdul Halim Hasugian; Ajeng Dwi Pratiwi; Adam Damiri Manurung; Hanny Puput Eliyarista Saragih; Rahmawati Rahmawati
MODELING: Jurnal Program Studi PGMI Vol 10 No 2 (2023): Juni
Publisher : Program Studi PGMI Sekolah Tinggi Ilmu Tarbiyah Nahdlatul Ulama Al Hikmah Mojokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36835/modeling.v10i2.1736

Abstract

KKN (Real Work Lectures) activities are activities that must be followed by every student in lectures at least Strata One (S.1) at Higher Education Institutions, such as at the State Islamic University of North Sumatra, every 6th semester student and above must take part in KKN (Real Work Lectures) activities. ). Several students of the State Islamic University of North Sumatra carried out KKN (Real Work Lectures) in Bahjoga Utara village, Simalungun in July 2022. Students who carried out KKN (Real Work Lectures) in Bahjoga Utara village were 20 students and 6 students of which, all students/ I come from Simalungun. The students came from 4 faculties and 7 study programs. The method of carrying out the activities is carried out by surveying locations by KKN participants in several visits with the aim of seeing the condition of the village that will be inhabited for one month. Then the KKN participants socialized with the surrounding community to introduce themselves and provide information about the whereabouts of the participants with the aim of helping the surrounding community and helping find solutions to existing problems. Several educational institutions in Bahjoga Utara Village are the targets of the KKN student work program which is carried out routinely every day. All KKN students play a role in assisting the implementation of education in the village. Not only at school, KKN students also hold free lessons and teach the Koran for children in the village in order to maximize educational activities in the village. We hope that the Community Service Program that we carry out in the village can be a factor that helps the implementation of better education.
Penerapan Algoritma Naive Bayes Classifier Untuk Mengukur Tingkat Kepuasan Pasien Abdul Halim Hasugian; Ibnu Rusydi; Muthia Ramadhani
Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD Vol. 6 No. 2 (2023): J-SISKO TECH EDISI JULI
Publisher : STMIK Triguna Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53513/jsk.v6i2.7813

Abstract

Ketika seseorang merasa nyaman dan menerima apa yang mereka harapkan, mereka dikatakan puas. ketika suatu jasa yang ditawarkan oleh perusahaan penyedia jasa dapat digunakan untuk mencapai kepuasan. Pelayanan adalah suatu tindakan atau perlakuan yang dilakukan untuk membantu, menyambut, berterima kasih, memenuhi, dan membantu dalam memenuhi kebutuhan orang lain.. Menurut keterangan sebelumnya, salah satu layanan yang akan sangat penting untuk menjaga kesejahteraan dan keberlangsungan sumber daya manusia di masa depan adalah pelayanan kesehatan.Dimana dalam penelitian ini menerapkan perhitungan Naive Bayes Classifier untuk mengukur tingkat kepuasan pasien. Dalam perhitungan ini menggunakan 5 parameter dan 2 label atau kelas untuk mengukur kepuasan. Berdasarkan dari data set yang dijadikan 80 data latih dengan 20 data uji. Perhitungan pengujian akhir memanfaatkan pendekatan Naive Bayes di dapatkan tingkat akurasinya adalah 100% diikuti oleh 100% untuk presisi terakhir adalah 100% untuk recall. Kesimpulan salah satu rekomendasi untuk memprediksi tingkat kepuasan pasien adalah dengan menggunakan model pengujian seperti Algoritma Naive Bayes. 
Sistem Pakar Diagnosis Awal Tingkat Stres pada Korban Bullying dengan Metode Forward Chaining Berbasis Web Sheila Safira; Abdul Halim Hasugian; Heri Santoso
JITEKH Vol 11 No 2 (2023): September 2023
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jitekh.v11i2.799

Abstract

Abstrak−Tindakan melecehkan orang lain melalui penggunaan teknologi informasi dan komunikasi seperti media sosial, ponsel, dan video dikenal sebagai bullying. Bullying adalah perilaku agresif. Bullying dapat berdampak kepada gangguan psikologis seperti stres. Dalam ilmu psikologi, mengukur tingkat stres seseorang merupakan salah satu cara penerapan sistem pakar. Penelitian ini menggunakan metode forward chaining. Forward chaining adalah metode yang menarik kesimpulan dari data atau fakta. Forward chaining dimulai dengan informasi yang sudah ada dan menggunakan aturan untuk membuat kesimpulan untuk mendapatkan lebih banyak informasi sampai tujuan tercapai.data dikumpulkan dengan teknik kuesioner yang menghasilkan 40 poin aspek penilaian. Hasil penelitian menunjukkan perilaku bullying memiliki hubungan signifikan pada tingkst stres seseorang yang dapat mempengaruhi psikologis. Semakin berat gejala yg didapat semakin tinggi tingkat stress yang dialami. Kata Kunci: Perilaku bullying, Stress, Psikologis, Forward chaining Abstract− The act of harassing other people through the use of information and communication technologies such as social media, cell phones and videos is known as bullying. Bullying is aggressive behavior. Bullying can have an impact on psychological disorders such as stress. In psychology, measuring a person's stress level is one way of implementing an expert system. This research uses the forward chaining method. Forward chaining is a method that draws conclusions from data or facts. Forward chaining starts with existing information and uses rules to make conclusions to get more information until the goal is achieved. Data is collected using a questionnaire technique which produces 40 points of assessment aspects. The results showed that bullying behavior has a significant relationship to a person's stress level which can affect psychologically. The more severe the symptoms are, the higher the level of stress experienced. Keywords: Bullying behavior, Stress, Psychological, Forward chaining
Implementasi Fuzzy Mamdani Menentukan Tingkat Kepuasan Penumpang Trans Metro Deli Kota Medan Nur Jamilah Aruan; Abdul Halim Hasugian
Jurnal Teknologi Sistem Informasi dan Aplikasi Vol. 6 No. 3 (2023): Jurnal Teknologi Sistem Informasi dan Aplikasi
Publisher : Program Studi Teknik Informatika Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Medan City is one of the major cities in Indonesia with a dense population. To meet the transportation needs of the population, the Medan City government launched Trans Metro Deli, a convenient and efficient public transportation service. However, in recent times, the Trans Metro Deli bus has experienced a significant decline in passenger numbers. Therefore, the bus transport management needs to do the right strategy to retain their customers. To overcome this problem, this study aims to evaluate and analyze the level of satisfaction of Trans Metro Deli passengers using fuzzy methods. The Mamdani fuzzy method was chosen because it has a flexible tolerance and the results are more in line with human perception. Through the use of questionnaires, passengers' opinions and expectations are evaluated and calculated using the fuzzy method. Previous research using similar methods has provided effective results in determining passenger satisfaction levels in other sectors. The variables used in this study are facilities, price, service quality, and location. The data was collected from a one-month field study. The Mamdani fuzzy process involves four stages, namely fuzzyfication, inference, rule composition, and defuzzyfication. These stages are used to convert input values into fuzzy outputs that represent the membership level of each variable. The result obtained is 74.4. The results of this study are expected to provide recommendations for improving service quality on Trans Metro Deli buses. Thus, transportation managers can meet passenger expectations and retain their consumers. Through the implementation of Mamdani fuzzy, it is expected to achieve an increase in the satisfaction of Trans Metro Deli passengers in Medan City.
Co-Authors Abdillah, Ibnu Faiz Adam Damiri Manurung Adi Hartono Aditya Maulana Azanzi Girsang Afandi Sahputra Aidil Halim Lubis Aidil Halim Lubis Ajeng Dwi Pratiwi Ali Darta Ali Ikhwan Alwy Azyari Harahap Amalia Daulay, Rizki Amelia Amri Yuda S Anggraini, Sindi Annisa Shafira Zuhri Armansyah Armansyah Armansyah Asrul Suwondo Azhar, Joehari Bandaharo, Bandaharo Bermiko Kasah Padang Bunga Nurul Manisa Cindy Ananda Putri Dea Amallia Deni Fahrizal Dewi Afrianti Dina Afriani Dinda Zukhoiriyah Eferoni Ndururu Elsa Azila Rahman Fakhriza, M. Farah Zaida Gema Ramadhan Gilang Armawan Saka Ginting, Masitha Putri Ardhana Gunawan Gunawan Gunawan, Helmi Hanny Puput Eliyarista Saragih Harahap, Muhammad Fitrah Affandi Harahap, Nasywa Al Afif Heni Pujiastuti Heri Santoso Heri Santoso Heri Santoso HERI SUSANTO Hsb, Munawir Siddik Ibnu Rusydi Ilham Ilham Ilka Zufria Imam Zaki Husein Nst Indah Alfitri Lubis Irene Sri Morina Januar, Bagus K Khairunnisa Khaidir Hanafi Khairuna Khairuna Khairunnisa, K Lubis, Akbar Maulana Lubis, Desy Ramadhani M Mahyudi M. Fakhriza M. Khalil Gibran M.Alif Fahrezy Maimunah Rahmadani Maulida, Dzikra Maya Khairani Mhd Furqan Mhd Ikhsan Rifki Mhd. Fakhrozi Arif Mhd. Furqan Mufliha Afiksih Muhammad Aditya Prasetio Muhammad Alfarizi Muhammad Arief Irawan Muhammad Ezar Raditya Muhammad Farhan Alhabib Muhammad Ikhsan Muhammad Ikhsan Muhammad Ridzki Hasibuan Muhammad Sayuthi Muhammad Siddik Hasibuan Muhammad Suhery Mulya Alfan Simatupang Murdani Muthia Ramadhani Nadyah Almirah Simanjuntak Nasution, Yazid Hulaini Habbani Nasution, Yurika Nur Jamilah Aruan Nurmaiyah Nurmaiyah Ong, Russell Pahlevi, Mhd Rafly Syah Pazri Pebriani Putri Prayoga, M. Irsan Pristiwanto Putra, Donny Dwi Putri Hanifah Rahadian Fatta Batubara Rahmad Prayogi Harahap Rahmawati Rahmawati Raissa Amanda Putri Rajani, Attila Rakhmat Kurniawan R Ramadhani, Silvia Rano, Rano Irawan Reza Muhammad Rijal, Mhd. Nanda Khairul Rina Widyasari Rizki Amalia Rizky Pratama Putra Rizky Ramadhan Rizqi Hidayat Tanjung RR. Ella Evrita Hestiandari Ryo Vikri Alif Saefuddin, Anan Sela, Dhea Shania Oktawijaya Sheila Safira Siahaan, Ahmad Taufik Al Afkari Simanjuntak, Salmah Simatupang, Aidil Akbar Siregar, Muhammad Faisal Siregar, Nora Arianti Siti Hayatul Fauziah Ritonga Siti Juhroini Ritonga Siti Nurhaliza Sofyan Siti Sumita Harahap Sitorus, Ridha Saryani Situmorang, Rantouli Solifiah Batubara, Febi Sri Suci Yani Sriani Sriani Sriani Sriani, S Suandi Padang Suendri Suendri, Suendri Suhardi Suhardi Suhardi Suhardi Sulindawaty T. Raihan Yudisthira TONNI LIMBONG Tria Elisa Ulfah, Auliana Wina Fadia Ardianti Windary, Wanda Wirna Rizka Auliani Yusuf Karim Rambe Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution Zaidan, Muhammad Zidanul Akbar Ziqra Addilah Zul Attoriq Farhan Wahyudi