p-Index From 2021 - 2026
8.765
P-Index
This Author published in this journals
All Journal Jurnal Sains dan Teknologi Jurnal Simetris Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Journal of Telematics and Informatics Jurnal Simantec Jurnal sistem informasi, Teknologi informasi dan komputer Telematika : Jurnal Informatika dan Teknologi Informasi Jurnal Teknologi Informasi dan Ilmu Komputer Setrum : Sistem Kendali-Tenaga-elektronika-telekomunikasi-komputer Jurnal Transformatika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Jurnal Informatika dan Teknik Elektro Terapan Jurnas Nasional Teknologi dan Sistem Informasi CESS (Journal of Computer Engineering, System and Science) Journal of Animation & Games Studies JOIN (Jurnal Online Informatika) Sistemasi: Jurnal Sistem Informasi Jurnal Pengabdian UntukMu NegeRI JOIV : International Journal on Informatics Visualization Sinkron : Jurnal dan Penelitian Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) JRSI (Jurnal Rekayasa Sistem dan Industri) Jurnal Pilar Nusa Mandiri Faktor Exacta Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Indonesian Journal of Information System JURNAL ILMIAH INFORMATIKA SELAPARANG: Jurnal Pengabdian Masyarakat Berkemajuan Surya Abdimas MIND (Multimedia Artificial Intelligent Networking Database) Journal Indonesian Journal of Applied Informatics STRING (Satuan Tulisan Riset dan Inovasi Teknologi) Antivirus : Jurnal Ilmiah Teknik Informatika JUTIS : Jurnal Teknik Informatika JISKa (Jurnal Informatika Sunan Kalijaga) JATI (Jurnal Mahasiswa Teknik Informatika) Joined Journal (Journal of Informatics Education JATI EMAS (Jurnal Aplikasi Teknik dan Pengabdian Masyarakat) Journal of Innovation Information Technology and Application (JINITA) Jurnal Bakti Masyarakat Indonesia Innovation in Research of Informatics (INNOVATICS) Jurnal Dinamis Jurnal Teknik Informatika (JUTIF) Informatics and Digital Expert (INDEX) JoMMiT : Jurnal Multi Media dan IT JURNAL REKAYASA INFORMASI SWADHARMA (JRIS) JUSTIN (Jurnal Sistem dan Teknologi Informasi) Jurnal Pengabdian Masyarakat untuk Negeri (UN-PENMAS) Jurnal Nasional Teknik Elektro dan Teknologi Informasi Ilmu Komputer untuk Masyarakat Abdi Teknoyasa Jurnal: International Journal of Engineering and Computer Science Applications (IJECSA) Jurnal Informatika dan Multimedia "JAMASTIKA" Jurnal Mahasiswa Teknik Informatika Tekmulogi: Jurnal Pengabdian Masyarakat SATIN - Sains dan Teknologi Informasi Prosiding SEMNAS INOTEK (Seminar Nasional Inovasi Teknologi) Intelmatics NERO (Networking Engineering Research Operation) Jurnal Informatika: Jurnal Pengembangan IT PADIMAS: Jurnal Pengabdian Masyarakat Jurnal Pengabdian Siliwangi Abdi Karya: Jurnal Pengabdian Kepada Masyarakat Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JuTISI (Jurnal Teknik Informatika dan Sistem Informasi) International Journal of Informatics and Computing
Claim Missing Document
Check
Articles

IMPLEMENTASI STEGANOGRAFI CITRA DIGITAL LSB MENGGUNAKAN ENKRIPSI AES-256 DAN EMBEDDING PSEUDORANDOM Firdaus, Muhamad Akbar; Rahmatulloh, Alam
Jurnal Informatika dan Teknik Elektro Terapan Vol. 13 No. 1 (2025)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i1.5620

Abstract

Perkembangan teknologi digital yang pesat membuat keamanan informasi menjadi sangat penting. Steganografi citra digital merupakan salah satu teknik pengamanan data yang memungkinkan penyembunyian informasi dalam media gambar. Penelitian ini mengembangkan program steganografi yang menggabungkan metode Least Significant Bit (LSB) dengan enkripsi Advanced Encryption Standard (AES) dan embedding pseudorandom. Pendekatan ini mengenkripsi pesan menggunakan AES-256 sebelum menyisipkannya ke dalam bit-bit LSB dari citra cover dengan pola pseudorandom, menciptakan sistem keamanan berlapis. Hasil pengujian menunjukkan keberhasilan program dalam menyisipkan dan mengekstraksi pesan dari gambar. Penggunaan format PNG memungkinkan penyimpanan data yang lebih transparan tanpa kompresi lossy, sehingga kualitas gambar hasil penyisipan tetap terjaga dengan baik. Analisis menunjukkan bahwa panjang pesan yang disisipkan berpengaruh signifikan terhadap waktu proses embedding dan ekstraksi. Penggunaan AES-256 memberikan lapisan keamanan tambahan pada data yang disembunyikan.
SOSIALISASI PENERAPAN TEKNOLOGI MONITORING KEHADIRAN REAL-TIME UNTUK MENINGKATKAN DISIPLIN KINERJA KARYAWAN UMKM GEHEL SNACK Gunawan, Rohmat; Alam Rahmatulloh; Randi Rizal; Visi Tinta Manik
Jurnal Bakti Masyarakat Indonesia Vol. 7 No. 1 (2024): Jurnal Bakti Masyarakat Indonesia
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat, Universitas Tarumanagara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24912/jbmi.v7i1.26712

Abstract

The process of recording employee attendance data needs to be managed well to support the smooth running of human resource management activities in an institution or company. Fingerprint-based attendance recording systems are widely implemented in various companies because they are not easy to manipulate. However, attendance monitoring can usually only be done after the attendance data stored on the machine is downloaded to the server to be processed to produce information. This process takes time and cannot be done in real-time. The solution to overcome this problem is that in this service activity, socialization and implementation of real-time attendance monitoring technology is carried out to support increased employee discipline. The process of recording attendance is carried out using the fingerspotIO tool. Attendance recording data stored on the machine is transmitted to the server automatically for processing and the results are displayed on a PC or smartphone in real-time and can be accessed online. UMKM Gehel Snack is a business unit with superior products in the form of snacks which was chosen as a partner in this service activity. The real-time attendance monitoring system has been socialized at service partner locations, taking employee fingerprint patterns, installing the fingerspotIO application on desktop PCs, configuring working hours, and setting the start date for the system to be implemented. Real-time attendance monitoring can be carried out by administrators or company leaders via PC, laptop or smartphone as long as it is connected to the internet. ABSTRAK: Proses pencatatan data kehadiran karyawan perlu dikelola dengan baik guna menunjang kelancaran aktivitas pengelolaan sumber daya manusia di suatu institusi atau perusahaan. Sistem pencatatan kehadiran berbasis sidik jari banyak diterapkan di berbagai perusahaan karena tidak mudah dimanulasi. Namun monitoring kehadiran biasanya hanya dapat dilakukan setelah data kehadiran yang tersimpan di mesin, diunduh terlebih ke server untuk diolah sehingga dihasilkan infomasi. Proses ini membutuhkan waktu dan belum dapat dilakukan secara real-time. Solusi untuk mengatasi permasalahan tersebut, pada kegiatan pengabdian ini dilakukan sosialisasi dan penerapan teknologi monitoring kehadiran secara real-time untuk mendukung peningkatan disiplin karyawan. Proses pencatatan kehadiran dilakukan dengan menggunaan alat bantu fingerspotIO. Data hasil pencatatan kehadiran yang tersimpan di mesin ditransmisikan ke server secara otomatis untuk diolah dan hasilnya ditampilkan di PC atau smartphone secara real-time dan dapat diakses secara online. UMKM Gehel Snack merupakan unit usaha dengan produk unggulan berupa makanan ringan yang dipilih sebagai mitra pada kegiatan pengabdian ini. Sistem monitoring kehadiran secara real-time telah disosialisasikan di lokasi mitra pengabdian, pengambilan pola sidik jari karyawan, instalasi aplikasi fingerspotIO di PC desktop, konfigurasi pengaturan jam kerja, dan pengaturan tanggal mulai peberlakuan sistem telah dilakukan. Monitoring kehadiran secara real-time dapat dilakukan oleh administrator atau pimpinan perusahaan melalui PC, Laptop atau smartphone selama terhubung ke internet.
Bidirectional Encoder Representations from Transformers Fine-Tuning for Sentiment Classification of Cek Bansos Reviews Haerani, Erna; Rahmatulloh, Alam; Elmeftahi, Souhayla
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 1 (2025): March 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i1.4981

Abstract

Social assistance programs are essential government initiatives aimed at supporting underprivileged communities. One such program is facilitated through the Cek Bansos application, which enables users to check their eligibility for social aid. However, user experiences with the application vary, leading to various sentiments in their reviews. Understanding these sentiments is crucial for improving the application’s functionality and user satisfaction. This study focuses on sentiment analysis of user reviews of the Cek Bansos application by leveraging a fine-tuned Indonesian-language Bidirectional Encoder Representations from Transformers (BERT) model. This research aims to evaluate the BERT model's effectiveness in classifying sentiments in user reviews and provide insights that could improve the Cek Bansos application. This research method is the BERT model was fine-tuned using hyperparameters such as a learning rate of 3e-6, batch size of 16, and 9 epochs. The dataset consisted of 8,000 reviews, divided into training (70%), validation (20.1%), and test (9.9%) sets. Review scores were manually categorized, where ratings of 1 to 2 were classified as negative sentiment, 3 as neutral, and 4 to 5 as positive. The results of this research are as follows: the fine-tuned model achieved an accuracy of 77%, with additional evaluation metrics such as precision, recall, and F1 score, demonstrating the model's effectiveness in identifying positive, negative, and neutral sentiments separately. This study concludes that the BERT model provides a reliable method for sentiment classification of user reviews, which could support developers and policymakers in refining the Cek Bansos application to enhance user experience. Additionally, a web-based application developed using Streamlit allows government officials to visualize sentiment trends in real time, improving their understanding of user feedback. Future research could further explore alternative machine learning models and additional linguistic features to improve sentiment classification accuracy and the overall user experience.
IMPLEMENTASI JSON PARSING UNTUK PERTUKARAN DATA PADA APLIKASI VPN CLIENT BERBASIS MOBILE Guna, Nandana Surya; Rahmatulloh, Alam; Rachman, Andi Nur
NERO (Networking Engineering Research Operation) Vol 8, No 1 (2023): Nero - 2023
Publisher : Jurusan Teknik Informatika Fakultas Teknik Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/nero.v8i1.20458

Abstract

Meningkatnya permintaan akan transmisi data yang aman pada perangkat mobile, penting untuk mengembangkan metode yang efisien untuk pertukaran data sambil menjaga integritas dan kerahasiaan informasi. Penelitian ini bertujuan untuk mengatasi masalah implementasi JSON Parsing dalam pertukaran data pada aplikasi klien VPN berbasis mobile menggunakan layanan web. Salah satu tantangan yang dihadapi selama proses pengembangan adalah pembatasan alamat IP web service. Untuk mengatasi pembatasan ini, pengguna harus menghubungkan perangkat ke jaringan VPN, yang memungkinkan untuk mengubah kata sandi dan membuat catatan kehadiran dengan aman. Penelitian ini juga mencakup pengujian penerimaan untuk mengevaluasi kinerja aplikasi. Hasil pengujian menunjukkan hasil yang memuaskan, menandakan keberhasilan implementasi JSON Parsing dan fungsi layanan web. Selain itu, pengujian kinerja jaringan mengungkapkan bahwa waktu respons dipengaruhi oleh metode dan lokasi jaringan yang dipilih. Waktu respons untuk pengambilan data kehadiran pada jaringan default adalah 1187 ms, namun respons untuk pengiriman data kehadiran dan pengubahan kata sandi adalah 403 karena web service membatasi akses dengan alamat IP. Sementara itu, jaringan SgVPN untuk permintaan pengubahan password memiliki waktu respons sekitar 1088 ms, pengambilan data kehadiran sekitar 1727 ms, dan pengiriman data kehadirans sekitar 955 ms. Sedangkan pada jaringan DeVPN, permintaan pengubahan password memiliki waktu respons sekitar 1264 ms, pengambilan data kehadiran sekitar 1793 ms, dan pengiriman data kehadirans sekitar 1351 ms. Temuan ini menekankan pentingnya mempertimbangkan lokasi jaringan dalam upaya mengoptimalkan waktu respons aplikasi.Kata kunci: Aplikasi Klien VPN, Jaringan VPN, JSON Parsing, Layanan Web, Waktu Respons
Analisis Malware Aquvaprn.exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics Aditya, Hafish Naufal; Widiyasono, Nur; Rahmatulloh, Alam
Jurnal Teknik Informatika dan Sistem Informasi Vol 10 No 2 (2024): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v10i2.6562

Abstract

In today's digital age, data has become a valuable asset. Various techniques are used to steal personal data that could potentially be misused by irresponsible parties. The object used in this study is AQUVAPRN.exe, which is a type of malware known as a Remote Access Trojan (RAT). When this malware runs, the creator of the malware can access personal data from the infected operating system without the user's knowledge. AQUVAPRN.exe works in the background when an application is executed, creating several processes such as modifying the registry, creating files, reading files, and making continuous internet connections to a specific IP address without the user's knowledge. The result obtained from the AQUVAPRN.exe malware is an IP address of 109.51.76.80, with the domain located in Lisbon, Portugal, and has an MD5 hash value of 55c2c12970cda52f58bfad7b8c7d37d5. It is also known that the AQUVAPRN.exe malware uses an anti-reverse engineering technique, specifically obfuscation, which obstructs or hinders the malware from being analyzed or reverse-engineered to determine the code used to create the malware. The PID of the AQUVAPRN.EXE process is 8332 with a virtual tool (Virtual Address) of 0x8e0f57042080.
Performance Analysis and Accuracy of Machine Learning Algorithms for Heart Disease Prediction Yuliasari, Silpani; Rahmatulloh, Alam
Telematika Vol 22 No 3 (2025): Edisi Oktober 2025
Publisher : Jurusan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31315/telematika.v22i3.14022

Abstract

Purpose: This research aims to analyze the performance and accuracy of machine learning algorithms in predicting heart disease, which is a cause of death throughout the world.Design/methodology/approach: The algorithms analyzed include Logistic Regression, Naive Bayes, Support Vector Machine, K-Nearest Neighbors, Decision Tree, Random Forest, XGBoost, and Neural Network. A publicly available dataset containing patients' medical records was utilized, with the methodology encompassing data collection, Exploratory Data Analysis (EDA), model training, and performance evaluation.Findings/result: The results indicate that the Random Forest algorithm achieved the highest accuracy with an accuracy of 90.16%, followed by Logistic Regression and Naive Bayes with accuracies of 85.25%. The K-Nearest Neighbors algorithm exhibits the lowest accuracy at 67.21%.Originality/value/state of the art: This research highlights the advantages of certain machine learning algorithms in predicting heart disease and contributes knowledge to early detection technology in the health sector.
Analysis of the Effectiveness of Data Warehousing in Management Information Systems Using the Neural Networks Method Ginting, Muliani; Rahmatulloh, Alam
Telematika Vol 22 No 3 (2025): Edisi Oktober 2025
Publisher : Jurusan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31315/telematika.v22i3.14027

Abstract

Purpose: The purpose of this research is to investigate the effectiveness of data warehousing and the application of Neural Networks methods in analyzing bicycle travel app user data, with a focus on enhancing the annual membership of app users in North America.Design/methodology/approach: This study utilizes a dataset that includes membership and usage data from relevant bicycle travel apps. It involves comparing the performance of different Neural Networks architectures, such as Feedforward Neural Networks, Convolutional Neural Networks (CNN), and other suitable models, to evaluate their effectiveness in predicting user membership.Findings/result: The analysis results demonstrate that the implementation of Neural Networks can improve prediction accuracy, with the most effective model achieving 76.03% accuracy. The research also highlights the importance of preprocessing steps, such as data normalization and transformation, in contributing significantly to model performance. However, challenges such as overfitting were identified, suggesting the need for further testing with model and parameter variations.Originality/value/state of the art: This research provides valuable insights for application developers and policy makers, helping them create data-driven strategies to improve the bicycle travel management information system. It also supports efforts to sustainably grow user membership. The study contributes to the field by exploring the practical application of Neural Networks for data analysis in the context of bicycle travel management, filling a gap in current research on effective predictive models for user membership growth.
Performance Analysis of SVM Kernels in Sentiment Classification on Indonesian Local Skincare Dataset Merdiriyani, Sindy; Rahmatulloh, Alam
Telematika Vol 22 No 3 (2025): Edisi Oktober 2025
Publisher : Jurusan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31315/telematika.v22i3.14033

Abstract

Purpose: Sentiment analysis is an important aspect of understanding consumers' views on products, especially in the growing skincare industry. This study aims to compare the accuracy and effectiveness of various kernels in the Support Vector Machine (SVM) algorithm, including linear, polynomial (poly), and radial basis function (RBF) kernels, in predicting three types of sentiment: positive, neutral, and negative based on reviews of local Indonesian skincare products.Design/methodology/approach: The dataset used includes consumer reviews classified by rating, which are then processed using Term Frequency-Inverse Document Frequency (TF-IDF) technique for feature extraction.Findings/result: The evaluation results show that the RBF kernel achieves the highest accuracy of 74.78%, followed by the linear kernel with 74.51% accuracy, and the polynomial kernel with 74.10% accuracy. Although the difference between the three kernels is not significant, the RBF kernel excels in positive sentiment classification, while all three kernels struggle in predicting neutral and negative classes.Originality/value/state of the art: These findings make an important contribution to the development of effective sentiment analysis methods, especially in the context of datasets with high class imbalance. To handle class imbalance, techniques such as oversampling smaller classes or using cost-sensitive learning techniques to give more weight to negative and neutral classes can be used. 
Design Thinking Approach for User Interface Design and User Experience on Campus Academic Information Systems Darmawan, Irfan; Saiful Anwar, Muhammad; Rahmatulloh, Alam; Sulastri, Heni
JOIV : International Journal on Informatics Visualization Vol 6, No 2 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.2.997

Abstract

Abstract—Currently, an academic system with structured data is needed for all lecture institutions, especially universities in Indonesia, Siliwangi University, with its academic system, namely the Campus Academic Information System (SIMAK). Over time, complaints from the visual aspect and user experience that did not keep up with the times became a new problem for SIMAK with student access rights. Therefore, the UI/UX aspect in developing an application is vital in accessing the available features. In this study, the method applied is Design Thinking to develop SIMAK WEB and SIMAK MOBILE application designs according to the data and input obtained from users. The research stages include Empathize, Define, Ideate, Prototype, and Test. The final result is user testing from expert users with ten examiners, each producing a success rate percentage of 100% for SIMAK WEB and a percentage of 90% for SIMAK MOBILE. In addition, the User Experience Questionnaire (UEQ) assessment from the same expert user plus end-users of 39 respondents and 33 respondents for web and mobile respectively increased 6 UEQ scales, namely Attractiveness, Clarity, Efficiency, Accuracy, Stimulation and lastly especially Novelty which has an increase of 5.286 and 5.264 from the initial value of -0.880. The Novelty scale is the only scale with a negative impression initially and was successfully evaluated in this study with a good score. The implication for further research is that an in-depth study and application of unique methods regarding the conversion of designs into prototype form is necessary so that coding can run smoothly. Keywords— Design Thinking, Campus Academic System, User Experience, User Experience Questionnaire, User Interface
Identification of Mirai Botnet in IoT Environment through Denial-of-Service Attacks for Early Warning System Rahmatulloh, Alam; Muhammad Ramadhan, Galih; Darmawan, Irfan; Widiyasono, Nur; Pramesti, Dita
JOIV : International Journal on Informatics Visualization Vol 6, No 3 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.3.1262

Abstract

The development of computing technology in increasing the accessibility and agility of daily activities currently uses the Internet of Things (IoT). Over time, the increasing number of IoT device users impacts access and delivery of valuable data. This is the primary goal of cybercriminals to operate malicious software. In addition to the positive impact of using technology, it is also a negative impact that creates new problems in security attacks and cybercrimes. One of the most dangerous cyberattacks in the IoT environment is the Mirai botnet malware. The malware turns the user's device into a botnet to carry out Distributed Denial of Service (DDoS) attacks on other devices, which is undoubtedly very dangerous. Therefore, this study proposes a k-nearest neighbor algorithm to classify Mirai malware-type DDOS attacks on IoT device environments. The malware classification process was carried out using rapid miner machine learning by conducting four experiments using SYN, ACK, UDP, and UDPlain attack types. The classification results from selecting five parameters with the highest activity when the device is attacked. In order for these five parameters to be a reference in the event of a malware attack starting in the IoT environment, the results of the classification have implications for further research. In the future, it can be used as a reference in making an early warning innovative system as an early warning in the event of a Mirai botnet attack.
Co-Authors Aditya, Hafish Naufal Aemy, Nandhitta Albi Fitransyah Aldy Putra Aldya Alpan Hikmat Muharram Permana Amaludin, Luthfi Andi Nur Rachman Andi Nurachman Anggi Putri Meriani Anggi Putri Meriani Anjar Ginanjar ANWAR, FAHMI Aradea Aradea, A Asep Kurniawan Asep Rizki Maulana Asih, Dwi Ramti Aulia, Karina Awaludin, Rizkie Irfan A’izzah, Virra Retnowati Budi Permana Darmawan, Muhamad Aditya Dewi Rahmawati Dita Pramesti Dodi Muhamad Kodar Dwi Ramti Asih Eka Wahyu Hidayat Eka Wahyu Hidayat El Akbar, R Reza El-Akbar, R Reza Elmeftahi, Souhayla Ernawati, Rita Sri Faisal Al Isfahani Faisal Muhammad Dzikry Faisal, Fikri Ahmad Farras, Daffa Haidar Fatchul Arifin Ficry Cahya Ramdani Firdaus, Muhamad Akbar Firmansah, Teguh Anugrah Firmansyah MSN Firmansyah, Faldi Ramadhan Fithriyah, Salma Nur Fuji Nugraha Gagan Akhmad Fauzi Galih Permana Genta Nazwar Tarempa Ginting, Muliani Guna, Nandana Surya Gunawan, Rohmat Gunawan, Rohmat Gunawan, Rohmat Haerani, Erna Hanifah, Faridah Heni Sulastri Heni Sulastri Herlambang, Andriana Herman Dwi Surjono Hidayat, Deri Kurnia Hidayat, Eka Wahyu Hilman Septian husen husen Husen Husen Husen, - Ihsanuddin Ihsan Ikhsan Nur Rizkiana Ilham Yuslin Anugrah Indra Sontana Iqbal Muhammad Fajar Nuralam Irfan Darmawan Ivang Fahmi Fauzi Kodar, Dodi Muhamad Komara Kusumah, R Herick Fauzi Kusumah, R Herick Fauzi Komara Laely Armiyati Lapandu, Raihan Azhar Leka Destrilia Leviana, Rika Maulana, Dikri Merdiriyani, Sindy Meriani, Anggi Putri Mochamad Dzikri Daely Muhammad Ramadhan, Galih Muhammad Saiful Anwar Neng Ika Kurniati Neng Ika Kurniati Neng Ika Kurniati Neng Ika Kurniati Nida, Siti Nabilah Nugraha, Cindera Syaiful Nugraha, Geri Nugroho, Rizal Nur Widiyasono Nur Widiyasono, Nur Perkasa, Mochamad Althaf Pramasetya Popy, Popy Anisa Purwayoga, Vega Putra, Aldy R. Reza El Akbar R. Wahjoe Witjaksono Rachman, Andi Nur Rahmi Nur Shofa Rahmi Nur Shofa Rakhman, Maulana Decky Ramdani, Setiadi Randi Rizal Rianto, Rianto Ridwan Nur Qomar Rifki Mubarok Riki Ahmad Fauji Rita Sri Ernawati Rizal Nugroho Rizal, Randi Rizal, Randi Rochim, Rachma Verina Rohmat Gunawan Rohmat Gunawan Rukiman, Sheptianna Healtha Ruuhwan Ruuhwan Salman, Ade Selamat, Siti Rahayu Septian, Hilman Setiawan, Muhamad Bayu Setiawan, Perdi Shihab, Muhammad Quraish Shofa, Rahmi Nur Sholihat Ruhaedi, Hedy Sulastri, Heni Sulastri, Heni Sulastri, Heni Virra Retnowati A’izzah Visi Tinta Manik Warih Puspitasari Yuliasari, Silpani Yusup Mochamad Ramdani Yuzar, Arnefia ZK Abdurahman Baizal