p-Index From 2021 - 2026
10.627
P-Index
This Author published in this journals
All Journal ITEj (Information Technology Engineering Journals) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat J-Dinamika: Jurnal Pengabdian Kepada Masyarakat Jurnal Mantik Abdimas Toddopuli: Jurnal Pengabdian Pada Masyarakat Community Development Journal: Jurnal Pengabdian Masyarakat Jurnal Kajian Ilmiah Jurnal Informatika Dan Tekonologi Komputer (JITEK) Jurnal Teknologi dan Manajemen Industri Terapan Biner : Jurnal Ilmiah Informatika dan Komputer Madani: Multidisciplinary Scientific Journal JURNAL ILMIAH SAINS TEKNOLOGI DAN INFORMASI Jurnal Penelitian Sistem Informasi Jurnal Sistem Informasi dan Ilmu Komputer Jurnal Kendali Teknik dan Sains International Journal of Smart Systems Kohesi: Jurnal Sains dan Teknologi Educational Insights Jurnal Sains dan Teknologi JI-Tech Jurnal Penelitian Teknologi Informasi dan Sains Saber: Jurnal Teknik Informatika, Sains dan Ilmu Komunikasi DIGIBE: Digital Business and Entrepreneurship Journal Jurnal Riset Teknik Komputer Jurnal Riset Sistem Informasi Venus: Jurnal Publikasi Rumpun Ilmu Teknik Router : Jurnal Teknik Informatika dan Terapan Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi Uranus: Jurnal Ilmiah Teknik Elektro, Sains dan Informatika Saturnus: Jurnal Teknologi dan Sistem Informasi Technology Sciences Insights Journal Jejak digital: Jurnal Ilmiah Multidisiplin Journal of System and Technology Router : Jurnal Teknik Informatika dan Terapan Jurnal Informatika Dan Tekonologi Komputer Jurnal Sistem Informasi dan Ilmu Komputer
Claim Missing Document
Check
Articles

TANTANGAN DAN SOLUSI IMPLEMENTASI ANONIMISASI DAN PSEUDONIMISASI DATA DALAM SISTEM OPERASI WINDOWS Rahman S.T,M.Kom, Rakhmadi; Ome, Paulus Jemianus; Adwah , Farah Diyanah
JI-Tech Vol 20 No 1 (2024): Jurnal JI-Tech
Publisher : Sekolah Tinggi Teknologi Informasi NIIT

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55864/jitech.v20i1.284

Abstract

Pesatnya perkembangan teknologi informasi saat ini tidak dapat dibendungi seiring dengan perkembangan zaman dan merupakan bagian dari perkembangan dalam industri 4.0 menuai banyaknya data bermunculan per tahun nya, baik itu data perusahan, organisasi, maupun data pribadi, tentunya merupakan hal yang krusial dan perlu perlindungan yang lebih untuk menjaga data tersebut dari oknum yang ingin menyalah gunakan data pribadi sesorang dengan motif yang tidak etis bahkan memeras korban dengan meminta tebusan yang tidak sedikit. Dalam kajian ini membahas mengenai tantangan dan solusi penerapan anonimisasi data dan pseudonimisasi pada sistem operasi Windows, yang bertujuan untuk menjadi langkah awal bagaimana kita dapat melindungi data kita dengan menggunakan kedua konsep tersebut untuk melindungi data pribadi atau data sekelompok orang dari individu yang menyalah gunakan data informasi pribadi seseorang. Penelitian ini menggunakan metode penelitian skunder yang melibatkan dengan pengumpulan dan analisis data yang suda ada,seperti artikel, jurnal, dan sumber-sumber lainnya yang relevan, serta pengembang sistem menggunakan bahasa pemrograman python untuk mengimplementasikan konsep anonimisasi dan pseudonimisasi pada sistem operasi windows, sehinga dalam hasil penelitian ini menunjukan bahwa penerapan anonimisasi dan pseudonimisasi dapat meningkatkan perlindungan data pribadi atau menyamarkan data sebagai wujud perlindungan data.
Integrasi Artificial Intelegent Berbasis Sistem Operasi Android pada Smart Home Rakhmadi Rahman; Achmad Haikal Fikri; Kelsia Nelsia
Jurnal Penelitian Teknologi Informasi dan Sains Vol. 2 No. 2 (2024): JUNI : JURNAL PENELITIAN TEKNOLOGI INFORMASI DAN SAINS
Publisher : Institut Teknologi dan Bisnis (ITB) Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54066/jptis.v2i2.2198

Abstract

This study explores the integration of Artificial Intelligence (AI) into smart home systems using the Android operating system to enhance security, privacy, efficiency, and user comfort. Key security measures include data encryption, robust authentication methods, sandboxing, and AI integration, specifically leveraging Google Assistant for improved privacy controls. Maintenance strategies for smart homes emphasize energy management, device condition monitoring, and enhanced safety features. AI adaptation to user habits enhances productivity and situational awareness, while Android's role in connecting various IoT devices facilitates remote control and energy-efficient recommendations. Methods such as Eco Android, Greensource, byte-code transformations, and automated energy diagnosis tools aid in optimizing energy use. The comparison between smart and non-smart homes highlights the efficiency and convenience of smart homes despite higher installation costs and potential network issues. The development and deployment of an Android-based application, SafeHause, exemplifies practical implementation, emphasizing end-to-end testing, security updates, and user education. The findings affirm that AI integration with Android significantly improves the smart home experience by enhancing energy optimization, data security, and personalized user interaction. Furthermore, the study discusses future trends in smart home technology, such as the potential for more advanced AI algorithms and machine learning techniques to provide even greater personalization and automation. The importance of regular software updates and the role of user feedback in refining smart home systems are also highlighted, ensuring that these technologies continue to evolve and meet user needs effectively.
Rekacipta Antarmuka Pengguna Intuitif dan Ramah Pengguna untuk Sistem Operasi Windows: Pendekatan Berbasis Pengalaman Pengguna (Ux) Rakhmadi Rahman; Abdul Khalik Hartono; Natasya taslim
Jurnal Penelitian Teknologi Informasi dan Sains Vol. 2 No. 3 (2024): SEPTEMBER : JURNAL PENELITIAN TEKNOLOGI INFORMASI DAN SAINS
Publisher : Institut Teknologi dan Bisnis (ITB) Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54066/jptis.v2i3.2200

Abstract

The rapid development of digital technology has led to the importance of intuitive and user-friendly operating systems. Windows, as one of the most widely used operating systems in the world, therefore we continue to strive to present a user interface (UI) that is not only functional but also easy to use. This journal discusses the project "Recreating Intuitive and User-Friendly User Interface for Windows Operating System: A User Experience (UX) Driven Approach" which aims to improve the Windows user experience through better UI design. The main objective of this project is to explore and implement design principles that can improve the overall user experience. With a user experience (UX) based approach, this project identifies weaknesses in the current Windows interface, seeks innovative solutions, and tests their effectiveness through comprehensive user research. In this research, we produced several new features that were introduced including grouping, app drawer, and widgets, all of which are intended to ease navigation and improve efficiency of use.
DESAIN PEMBUATAN MEDIA PEMBELAJARAN INTERAKTIF DENGAN CLASS POINT AI DI UPTD SD 62 PAREPARE Rahman, Rakhmadi; Mar’atuttahirah, Mar’atuttahirah; Tunnisa, Khaera; Putra, Alvian Tri; Abdullah, Abdullah; Al-Amin, Muh.; Suryabuana, Andi Sahra; Ramadhan, Syam Syahru; Fathuresqi, Fathuresqi
Community Development Journal : Jurnal Pengabdian Masyarakat Vol. 4 No. 6 (2023): Volume 4 Nomor 6 Tahun 2023
Publisher : Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/cdj.v4i6.21982

Abstract

Kegiatan pengabdian yang akan dilaksanakan di UPTD SD 62 Parepare merupakan kegiatan pengabdian yang akan dilaksanakan berdasar dari masalah yang ada di UPTD SD 62 Parepare yaitu dalam Dalam proses pembelajaran, guru menggunakan aplikasi power point sebagai media untuk menyampaikan materi, belum ada pengembangan sumber daya dalam pembelajaran dengan memberikan pelatihan desain pembuatan media pembelajaran interaktif. Ternyata dengan hal tersebut dapat menurunkan semangat belajar siswa sehingga tujuan pembelajaran tidak tercapai dengan baik. Tujuan kegiatan pengabdian ini adalah untuk memberikan pelatihan desain pembuatan media pembelajaran interaktif di UPTD SD 62 Parepare dengan Class Point AI sehingga nantinya guru dapat membuat media pembelajaran  dengan pemanfaatan teknologi AI sebagai solusi yang komprehensif untuk guru mampu berkembang secara professional, mampu meningkatkan efektifitas siswa, bekerja secara efisien, mengajar secara interaktif dengan pemanfaatan Class Point AI  sehingga mendorong integritas akademik untuk mendukung pembelajaran yang aktif, kreatif dan inovatif. Luaran Kegiatan PKM akan di publikasikan pada Jurnal Pengabdian Kepada Masyarakat.
Detektor Anomali Jaringan dengan Analisis Perilaku untuk Mengidentifikasi Ancaman Persisten Rakhmadi Rahman; Andi Maharani; Nur Azisah Basir
SABER : Jurnal Teknik Informatika, Sains dan Ilmu Komunikasi Vol. 2 No. 4 (2024): Oktober : Jurnal Teknik Informatika, Sains dan Ilmu Komunikasi
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/saber.v1i3.1596

Abstract

Technological developments in the digital world have now begun to increase the use of operating systems such as Android which are often used on electronic devices such as smartphones and tablets, penetrating various fields of human life. The use of these devices is essential in facilitating various tasks, especially digital ordering and transactions. This integration provides better transaction protection, more effective usage, and benefits and convenience. Cloud computing makes it easy and efficient to integrate digital ordering applications into payment systems. Observations show that these integrations provide user convenience and purchase trends, assist marketing strategies, and generate more accurate business decisions. If carefully developed and implemented, this integration has great potential to change the way business is done in the digital age.
IMPLEMENTASI NETWORK TRAFFIC ANALISIS UNTUK MENDETEKSI ANOMALI JARINGAN PADA TWITTER/X DAN INSTAGRAM Rahman, Rakhmadi; Egi Fahrezi Iswan
Digital Business and Entrepreneurship Journal Vol. 2 No. 2 (2024): Digital Business and Entrepreneurship Journal
Publisher : FAKULTAS EKONOMI DAN BISNIS UNIVERSITAS KUNINGAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/digibe.v2i2.31

Abstract

Abstrak Penelitian ini berfokus pada implementasi analisis lalu lintas jaringan menggunakan Wireshark untuk mendeteksi anomali pada aplikasi Twitter/X dan Instagram. Tujuan utamanya adalah mengidentifikasi tingkat lalu lintas pada port-port yang ditandai dengan warna hitam dan merah, yang dapat mengindikasikan potensi masalah atau aktivitas jaringan mencurigakan. Penelitian ini menggunakan pendekatan kuantitatif dengan mengumpulkan data lalu lintas jaringan, melakukan analisis statistik, dan menerapkan teknik deteksi anomali. Hasil penelitian diharapkan dapat membantu mengidentifikasi dan mengatasi tingkat lalu lintas tinggi, serta memberikan wawasan berharga tentang keamanan jaringan dan strategi yang lebih efektif untuk mendeteksi dan mengatasi ancaman keamanan. Dalam analisis jaringan menggunakan Wireshark, terdapat beberapa fitur dan indikator warna yang membantu dalam memeriksa dan menganalisis lalu lintas paket data. Port berwarna biru muda menunjukkan "Sample inactive selected item," yang memungkinkan pengguna untuk melihat contoh isi paket yang tidak aktif, berguna untuk penelusuran paket tidak aktif, analisis payload data, dan pemecahan masalah jaringan. Port berwarna abu-abu menunjukkan "Sample active selected item," yang menampilkan contoh isi paket yang sedang aktif, membantu dalam pemeriksaan konten paket aktif, analisis payload data, dan pemahaman konteks komunikasi. Port berwarna hitam dan merah menunjukkan tingkat lalu lintas yang tinggi, dengan port hitam mungkin mencurigakan dan port merah menunjukkan potensi masalah seperti serangan DDoS atau kemacetan jaringan. Port merah ditandai dengan status flag "Reset = Set" dalam header TCP, mengindikasikan kemungkinan gangguan konektivitas, kesalahan konfigurasi perangkat, aktivitas mencurigakan, atau masalah pada endpoint komunikasi. Kata kunci: Anomali Jaringan; Wireshark; Twitter/X; Instagram   Abstract This research focuses on implementing network traffic analysis using Wireshark to detect anomalies in the Twitter/X and Instagram applications. The main goal is to identify traffic levels on ports marked in black and red, which can indicate potential problems or suspicious network activity. This research uses a quantitative approach by collecting network traffic data, conducting statistical analysis, and applying anomaly detection techniques. The research results are expected to help identify and address high traffic levels, as well as provide valuable insights into network security and more effective strategies for detecting and addressing security threats. In network analysis using Wireshark, there are several features and color indicators that help in examining and analyzing data packet traffic. The light blue port indicates “Sample inactive selected item,” which allows users to view a sample of inactive packet contents, useful for inactive packet tracing, data payload analysis, and network troubleshooting. The grayed port indicates “Sample active selected item,” which displays a sample of currently active packet contents, assisting in active packet content inspection, data payload analysis, and understanding the communication context. Black and red ports indicate high levels of traffic, with black ports possibly suspicious and red ports indicating potential problems such as DDoS attacks or network congestion. Red ports are indicated by the status flag "Reset=Set" in the TCP header, indicating possible connectivity disruption, device misconfiguration, suspicious activity, or problems with the communications endpoint. Keyword: Network Anomalies; Wireshark; Twitter/X; Instagram
IMPLEMENTASI ENKRIPSI DAN KEAMANAN KRIPTOGRAPI Ramadhan, Syam Syahru; Rahman, Rakhmadi
Digital Business and Entrepreneurship Journal Vol. 2 No. 2 (2024): Digital Business and Entrepreneurship Journal
Publisher : FAKULTAS EKONOMI DAN BISNIS UNIVERSITAS KUNINGAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/digibe.v2i2.46

Abstract

Abstrak Penelitian ini membahas implementasi enkripsi password menggunakan metode Caesar Cipher dengan bantuan alat Crytools 2 di Institut Teknologi Bacharuddin Jusuf Habibie (ITH). Tujuan utama dari penelitian ini adalah untuk meningkatkan keamanan data pengguna di lingkungan kampus melalui teknik enkripsi sederhana. Pengujian keamanan dilakukan untuk mengevaluasi efektivitas dan ketahanan metode ini terhadap serangan. Hasil penelitian menunjukkan bahwa Caesar Cipher mampu memberikan perlindungan dasar yang memadai bagi data pengguna. Namun, beberapa kelemahan teridentifikasi, terutama terkait serangan brute force dan analisis frekuensi. Untuk mengatasi kelemahan tersebut, penelitian ini menyarankan penggunaan tambahan metode enkripsi yang lebih kuat, seperti Advanced Encryption Standard (AES) atau RSA, untuk meningkatkan perlindungan data. Selain itu, pelatihan dan sosialisasi kepada pengguna mengenai pentingnya keamanan password juga dianggap penting untuk meningkatkan kesadaran akan praktik keamanan siber. Dengan demikian, penelitian ini menekankan perlunya pendekatan keamanan berlapis untuk memastikan perlindungan data pengguna yang optimal di lingkungan kampus. Implementasi ini diharapkan dapat memberikan contoh yang dapat diikuti oleh institusi lain dalam meningkatkan keamanan data pengguna.   Kata kunci: caesar cipher; crytools 2; enkripsi; dekripsi; keamanan data   Abstract This study discusses the implementation of password encryption using the Caesar Cipher method with the assistance of Crytools 2 at the Institut Teknologi Bacharuddin Jusuf Habibie (ITH). The main objective of this research is to enhance user data security within the campus environment through simple encryption techniques. Security testing was conducted to evaluate the effectiveness and resilience of this method against attacks. The research findings indicate that Caesar Cipher provides adequate basic protection for user data. However, several weaknesses were identified, particularly related to brute force attacks and frequency analysis. To address these weaknesses, this study recommends incorporating stronger encryption methods, such as Advanced Encryption Standard (AES) or RSA, to enhance data protection. Additionally, training and awareness programs for users about the importance of password security are considered crucial to improve cybersecurity practices. Therefore, this study emphasizes the need for a multi-layered security approach to ensure optimal protection of user data within the campus environment. This implementation is expected to serve as an example for other institutions in improving user data security. Keyword: caesar cipher; crytools 2; encrypt; decrypt; data security
IMPLEMENTASI SSL ( SECURE SOCKET LAYER ) UNTUK MELINDUNGI TRANSAKSI ONLINE Rakhmadi Rahman; Nurislamiyah Nurislamiyah
Jurnal Riset Teknik Komputer Vol. 1 No. 3 (2024): September : Jurnal Riset Teknik Komputer (JURTIKOM)
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/563m6d13

Abstract

The security of online transactions is crucial in today's digital era. This study aims to examine the impact of the implementation of Secure Socket Layer (SSL) on the security of online transaction websites. Prior to the implementation of SSL, websites were often vulnerable to attacks such as data theft and man-in-the-middle attacks due to the use of the insecure HTTP protocol. By implementing SSL, data is encrypted between the server and the user, and digital certificates are used to authenticate the identity of the website, increasing protection against sensitive data such as credit card information and personal data. The research method used is action research, with a recurring cycle of planning, action, observation, and reflection. The results of the study show that after the implementation of SSL, there is a significant increase in the security of online transactions. The transmitted data is effectively encrypted, reducing the risk of man-in-the-middle attacks and phishing. Strong server authentication also builds user trust, which is reflected in the increase in online transaction activity. The conclusion of this study is that SSL is an essential step to improve security and trust in online transactions, and provides recommendations for further development in the application of this technology.
PERANCANGAN DAN IMPLEMENTASI SISTEM KEAMANAN JARINGAN SMART GRID Rakhmadi Rahman; Putri Dyananda Luqman
Jurnal Riset Teknik Komputer Vol. 1 No. 3 (2024): September : Jurnal Riset Teknik Komputer (JURTIKOM)
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/dkzx7f70

Abstract

In the era of digitalization, smart grids have become vital for efficient and sustainable energy distribution but are vulnerable to various cyber threats. This research aims to design and implement a robust network security system for smart grids to protect critical infrastructure from cyber-attacks. The methodology involves risk analysis, threat model development, and the application of advanced encryption and authentication technologies. The proposed security system incorporates multiple layers of protection, including firewalls, intrusion detection systems (IDS), and incident response mechanisms, supplemented by blockchain-based security protocols to ensure data integrity. Implementation results demonstrate that the system can effectively identify and counteract cyber threats, enhancing network resilience. Performance testing indicates that despite the additional security layers, the system operates within acceptable limits for latency and throughput. This research significantly contributes to the development of security standards for smart grids and provides practical recommendations for the industry in designing reliable and efficient security systems.
IMPLEMENTASI SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) DALAM MENINGKATKAN KEAMANAN JARINGAN Muh. Al Amin; Rakhmadi Rahman
Jurnal Riset Teknik Komputer Vol. 1 No. 3 (2024): September : Jurnal Riset Teknik Komputer (JURTIKOM)
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/ee1r1q05

Abstract

In the rapidly evolving digital era, threats to information security have become increasingly complex and diverse. Security Information and Event Management (SIEM) offers a comprehensive solution through the collection, correlation, and analysis of log data from various sources to detect and respond to threats in real-time. This research analyzes the implementation of SIEM in a large organization, highlighting its functionalities, benefits, and challenges, and conducts simulations to test its effectiveness. The results indicate that SIEM can enhance threat detection and response, ensure regulatory compliance, and improve operational efficiency. However, SIEM implementation requires careful planning, competent human resources, and strong management support.
Co-Authors A.Nurul Sairah Abdul Khalik Hartono Abdullah Abdullah Abdullah B Abdullah B Abriel Yosua Nathanael Leksona Achmad Haikal Fikri Adinda Aulia Rahmi Adwah , Farah Diyanah Afiqah Ahmad, Muhammad Adhi Fahriansyah Aisyah Aisyah Akmal Baharuddin Syam Al-Amin, Muh. Alif Imran Alif, Muh. Alvian Tri Putra Darti Akhsa Alya Putri Rahmadani Alya Wulan Apriliyani Amanda Putri Heryanti Amin, Widyah Putri Auliya Ananda Nabila Putri ANANTA, ASTI Andi Aulia Safirah Andi Maharani Andi Mahrani Anita Septiani Mustamin Antoni, Wahyudi Anugra, Ayu Anugrah Dwi Ansarna Apriliyani, Alya Wulan Arfika Amalia Suryadi Arthanty, Annisa Aspiani Putri Ashilah Aulia Rahmi, Adinda Awal Ramadhan Nasrun Azzahra, Maryam Baharuddin, Siti Hajar Barik Alfito, Ramadan Chintami Darti Akhsa, Amaliah Danang Fatkhur Razak Darti Akhsa, Alvian Tri Putra Dermawan, Rufaida Desvi Dwicki, Dwicki Herlambang Egi Fahrezi Iswan Eka Tanduklangi Fadhil Aditya Fanilda Damayanti Fathin Alwan Tahir Fathuresqi, Fathuresqi Fatkhur Razak, Danang Fatwa, Syafira Fikri, Achmad Haikal Furqan, M Furqan Ramadhanu Ghazali, M. Chaerul Ghina R.S Odja Gina Latifa Akmal Haikal Fikri, Achmad Hakim, Nur Fadillah Hamuddin, Humaera Haslinda Haslinda Hikma, Nurul I, Ikbal Ibrahim, Siti Nur Azizah Imamulkhair, Muhammad Januar Fahrisal Jesica Septiani Manurung Julistio Fadjar Anugrah Sao Kelsia Nelsia Khaera Tunnisa, Khaera Khalifah, Nur Ayu Khumaedi Khumaedi Kuncahya, Figra Dwi Kustanto , Prio Lia Kamila Kulsum Lukman Hakim Lukman Hakim M Furqan Ramadhanu M Yahtadi M. Faiz Ilyas Mar'atuttahirah, Mar'atuttahirah Maratuttahirah Maratuttahirah, Maratuttahirah Marwa Dinda Muchtar Mar’atuttahirah Mar’atuttahirah, Mar’atuttahirah Meiana Sahabuddin Meyrani R Moh. Farel Muh. Al Amin Muh.Daffa Nashwan Rasya Muhammad Akbar Fahrezi Muhammad Alfarizky Yusuf Muhammad Alfian Muhammad Arham Arsyad Muhammad Aril Muhammad Dirga Sopan Muhammad Hasyim Rusmin Muhammad Syawal Muhammad Yusuf Dzaky .J Mulyadi Mulyadi Murtafia Murtafia Nabilah Ramadhani Wowong Najwa, Hafizhah Natasya taslim Noel Ivander Pusung Nugrah Surya Pratama Nur Afiat Nur Azisah Basir Nur Fadillah Hakim Nurfaida Nurfaida Nurfauzi, Muhammad Aqmal Nurhalisah Ramli Nurhalizah, Siti Nurislamiyah Nurislamiyah Nurul Salsabillah Ome, Paulus Jemianus Pusung, Noel Ivander Putri Balqis Putri Dyananda Luqman Putri, Ananda Nabila Rahman, Aldi Fatur Rahmat Eka Putra R Palaloi Ramadhan, Syam Syahru Ramadhani, Alya Rasya, Muh. Daffa Nashwan Razak, Danang Fatkhur Redo Triansyah Reski Septiawan Retno Helviani Revan, Muh Rina Rina Rosmiati Rosmiati Rosmiati Rosmiati Safikah, Nur Saylandra Aulia Ramadhani Septian Rheno Widianto Sesa, Velita Rante Shalza Naya Dwi Fortuna Siti Nurhalizah Stepani Surianti, Besse Suryabuana, Andi Sahra Suryadi, Arfika Amalia Syaddad, Muhammad Shadiq Dzakwan Syafira Fatwa Syafira Fatwa Syam, Akmal Baharuddin Syifa Tri Agusriani taslim, natasya Tri Aditya, Muh Tri Putra Aditya Umi kalsum, Umi kalsum V, Viandra Wahyu Anwar Wildana, Andi Putri Wildana wulan, alya Yonatan Rannu Zahirah, Andi Riah Zulfattah, Abdul Khaliq