International Journal of Integrative Sciences
International Journal of Integrative Sciences (IJIS) is an international peer-review, and double-blind review journal published by Formosa Publisher. The IJIS is aimed to provide a forum for review, reflection, and discussion informed by the results of recent and ongoing research from a multidisciplinary perspective. IJIS encourages new ideas and works in all fields and it publishes high-quality original papers, theory-based empirical papers, review papers, case reports, conference reports/papers, technology reports, book reviews, commentaries, events, and news. We welcome papers from both academicians and practitioners on theories, business models, conceptual paradigms, academic research, and consultancy projects. The Journal invites original papers, review articles, technical reports, and short communications that are not published or are not being considered for publication.
Articles
13 Documents
Search results for
, issue
"Vol. 2 No. 6 (2023): June 2023"
:
13 Documents
clear
Paraphrase Practices in Academic Writing of Nursing Science Study Program, STIK Bina Husada Palembang
Agus Wahyudi;
Arief Pamuji
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4390
Paraphrasing has two main purposes, namely to avoid plagiarism and to make ideas easier to understand. The purpose of this research is to answer the following questions: 1. How are the paraphrasing results of the students of the Nursing Study Program STIK Bina Husada Palembang?, and 2. What are their perceptions of paraphrasing?. This research was conducted on May 27th, 2023, out of 38 students registered, only 34 students from the Nursing Science Study Program STIK Bina Husada Palembang participated in this research The students were asked to paraphrase a text containing 119 words entitled "Why is the millennial generation vulnerable to smartphone addiction?" the pparticipants were first shown the text and asked to read to gain understanding, then they were asked to paraphrase the paragraph. The results of this study indicated that the students of the Nursing Study Program at STIK Bina Husada Palembang are divided into 2 groups, namely: those who successfully paraphrase and those who fail, however, the limitations of the study should be noticed for further research. The results of this study have implications for teaching, bearing in mind that there are still students who avoid changing words and sentence structures when paraphrasing, this is due to limited vocabulary in making effective paraphrasing
Evolutionary Biology and Drug Development
Rehan Haider
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4392
Evolution is the unifying framework in biology and scales to all dwelling systems. It is the central organizing questioning to grant clarification for reputedly disparate herbal phenomena; from the very small (individual molecules) to the very large (ecosystems), from the upward push and unfold of molecular editions to the habits and physique shapes of elephants. In modern times, our maintain shut for evolution in medicinal pills has acquired momentum. Individuals have championed the cause, dedicated journals have emerged, and new books on the trouble are often posted (“The Evolution and Medicine Review” is an terrific web-based advisable useful resource presenting up to date information on the subject, http://evmedreview.com). This union between evolution and cure has already most fulfilled our hold close of pathological techniques (Maccallum, 2007, Nesse & Stearns, 2008). Drug enchancment and therapeutic strategies are areas in which evolutionary standards would perchance moreover be specially helpful. The avalanche of bioinformatic methods, genomic data, and the subsequent emergence of evolutionary genomics in the ultimate few many years propose that integrating these fields into drug graphs is now a possibility. Incorporating evolutionary documents is now not completely really useful a posteriori when we might also moreover in addition hope to apprehend why resistance to a special compound emerged. It is in addition treasured a priori, to structure increased efficacious drugs, suggest possible resistance profiles and conceptualize novel therapeutic strategies
Implementation of Zoning System in Acceptance of New Students at SMAN 12 in Pekanbaru City
Neni Triana
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4427
One of the objectives of the zoning system regulation is the equalization of education for all students. In the effort to implement this zoning system, there are still many obstacles felt by the school, such as the limited number of school quotas in accepting students. From the parents and students there are problems with this zoning system because students cannot enter the desired school and limited quotas or the distance of the house and as if outside the zoning boundaries, causing confusion in sending children to school because they do not enter the school zoning that students want. The purpose of this research is how the implementation of the zoning system in the acceptance of students at SMAN 12 in Pekanbaru City. The research is qualitative research. Descriptive method with research informants consisting of Principal, students and parents of students. Data collection techniques used are interviews and documentation studies. The type of data and data sources used primary data and secondary data
Influence of Marketing-Mix on Purchase Decision at JNE
Pristanto Ria Irawan;
Pupung Purnamasari;
Darka;
Dadang Heri Kusumah;
Ismasari Nawangsih;
Noorevna Ayaty
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4465
The purpose of this study was to determine the extent to which the marketing mix, purchasing decisions, and the influence of the marketing mix on purchasing decisions at PT. Jalur Nugraha Ekakurir in Kemayoran Area.This study uses a quantitative descriptive method with data collection techniques through the distribution of questionnaires and library data. In this study, the sample used was 60 customers. The data analysis technique used is simple linear regression analysis using the SPSS application.The variable marketing mix is quite good, amounting to 65.25 lies in the interval 63.2 - 67.2 variable purchasing decision is quite good at 30.42 located in the class interval 29.8 - 31.6 and (3) There is an influence between the marketing mix variable the purchasing decision because the value of t count (9.211) is greater than the value of t table (1.623) so that H1 is accepted and the t-count value lies in the rejection area of H0 or H1 is accepted. Then the marketing mix positive influence on strong the r value of 0.771 (located in the correlation coefficient interval 0.60-0.799) and has an influence contribution of 59.4% on the purchasing decision variable, while the remaining 40.6% is influenced by other factors. . Furthermore, it can be seen that the regression equation that can be used to predict is Y' = 4.577 + 0.396 X
Keylogger Threats in Computer Security Aspects
Samsoni;
Ditonius Zebua;
Basir;
Bayu Aji Pamungkas;
Hafidsyah Eka Prayogi;
Rifaldie Muhammad;
Supri Wahyudi;
Wira Samudra
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4520
Along with the development of increasingly advanced technology, the level of need for information security is very important. With the development of information, new problems arise regarding computer security, an example of computer security that often occurs is data theft. Data security in accessing a computer is a form that must be considered both physically and non-physically. One form of data theft crime is recording traces of a computer keyboard with the help of hardware or software. Keylogger is a data theft technique by recording typing on a computer keyboard, by recording when the computer is entered, intruders can enter and steal it. The purpose of this paper is to understand how keyloggers work so that prevention can be carried out by carrying out various kinds of solutions and also to maintain data security systems and know supporting and anti-keylogger software
The Effectiveness of the Port Knocking Method in Computer Security
Muhammad Nur;
Teguh;
Wasis Waskito;
Azhar Fathoni;
Bagas;
Yuda;
Ramadan Galih;
Alif Ainnun Qoyum;
Samsoni
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4526
Computer network is a group of autonomous computers that are interconnected with each other using communication protocols through communication media so that they can share information, programs, share hardware devices such as printers, hard disks, and so on. One of the most important network components is network security, computer security involves various aspects, including protection against unauthorized access, data theft, system tampering, and operational disruptions. This research method uses descriptive method. At this stage specifications are determined regarding the system that will be designed to meet the objectives of this study, the Port Knocking method to secure the Router can be applied to Mikrotik routers by utilizing a firewall which functions to guard against illegal access and overcome problems caused by Attackers
Sniffing and Spoofing in Computer Security
Saddam RA;
Angga Pranata;
Sugiono;
Rizki Zulanggara;
Nur Halimah;
Sri Nur H;
Rosdiana SM;
Nurhalim;
Aprina Handayani
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4528
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. Examples of network security threats that often occur are sniffing of activities on the network (sniffing) and also impersonation by other people (spoofing). This resume article aims to identify criminal acts that threaten computer security, namely Sniffing and Spoofing
Strategy for Winning Science Elections After the Covid-19 Pandemic
Kelik Endro Suryono;
Aida Dewi;
Vicki Dwi Purnomo
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4590
Strategies for the Dikulon Progo Post-Pandemic Election in 2024. This research uses a qualitative method approach. Sources of research data include primary and secondary data sources. Data collection tools and techniques use interviews and documentation. Test the validity of the data in this study using the source triangulation technique. The research data that has been collected is then analyzed including data collection; presentation of data; and conclusion or verification. The results showed that the strategy for winning elections was by formulating work programs, mass mapping, branding and positioning , political marketing strategies , political communications, political campaigns using SWOT analysis (Strengths, Weaknesses, Opportunities, Threats), as well as approaches to farmers, community leaders and religious leaders. Having a solid team and receiving support from community organizations in Kulon Progo Regency in the form of materials and mass
Bulungan-Lebak Road Service Period, Jepara Regency Post Repair
Yayan Adi Saputro
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4626
Traffic volume is one of the causes of road damage. With the increasing number of vehicles, it is possible that the road will be damaged in a relatively short time. The purpose of this study was to determine the service life of the road and the relationship between vehicle volume and the level of road damage on the Bulungan-Lebak road section. In this study, researchers used visual methods to see the type of damage and then measured the damaged road sections and counted the number of vehicles during peak hours and obtained road age data. In this way, 3 (three) data are obtained, namely road inventory data, damage value data and time data after the last road was repaired
Analysis of Competency and Commitment to Employee Performance in University (Systematic Literature Review)
Jumawan;
Zahara Tussoleha Rony
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55927/ijis.v2i6.4661
This scientific article presents the application of competence, commitment, and performance of employees in universities, and also the importance of these three variables in higher education. The research method used is that the technique in reflection is graphic, the analyst gathers the specified information from additional sources and analyzes and refines it if necessary. Research information is collected through additional data. Supporting information is collected through google scholar, Elsevier books, and research. The scored PICO framework (population/problem, intervention, comparison) was used to determine the scope of the study. Research results from the three variables in this article provide a result of scientific articles that have been studied with objects in universities so that these three variables are jointly used in the treasures of science, especially in human resources. The three variables in this article can be a reference for other researchers to use together in a future study with the same research object or different methods, so as to produce research that can contribute to the general public