cover
Contact Name
Abdul Aziz
Contact Email
abdulazizbinceceng@gmail.com
Phone
+6282180992100
Journal Mail Official
journaleastasouth@gmail.com
Editorial Address
Grand Slipi Tower, level 42 Unit G-H Jl. S Parman Kav 22-24, RT. 01 RW. 04 Kel. Palmerah Kec. Palmerah Jakarta Barat 11480
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
The Eastasouth Journal of Information System and Computer Science
Published by Eastasouth Institute
ISSN : 30266041     EISSN : 3025566X     DOI : https://doi.org/10.58812/esiscs
Core Subject : Science,
ESISCS - The Eastasouth Journal of Information System and Computer Science is a peer-reviewed journal and open access three times a year (April, August, December) published by Eastasouth Institute. ESISCS aims to publish articles in the field of Enterprise systems and applications, Database management systems, Decision support systems, Knowledge management systems, E-commerce and e-business systems, Business intelligence and analytics, Information system security and privacy, Human-computer interaction, Algorithms and data structures, Artificial intelligence and machine learning, Computer vision and image processing, Computer networks and communications, Distributed and parallel computing, Software engineering and development, Information retrieval and web mining, Cloud computing and big data. ESISCS accepts manuscripts of both quantitative and qualitative research. ESISCS publishes papers: 1) review papers, 2) basic research papers, and 3) case study papers. ESISCS has been indexed in, Crossref, and others indexing. All submissions should be formatted in accordance with ESISCS template and through Open Journal System (OJS) only.
Articles 17 Documents
Search results for , issue "Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)" : 17 Documents clear
Blockchain for Monitoring the Safe Supply Chain of Medicines: Reducing the Circulation of Illegal Drugs in Indonesia Ismail, Ismail; Felecia, Felecia; Azizah, Anisa Kurniatul; Rahmawati, Diana
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.518

Abstract

The pharmaceutical supply chain in Indonesia faces significant challenges, including counterfeit drug infiltration and insufficient traceability. This study explores the application of blockchain technology as a solution to monitor and secure the supply chain, reducing the circulation of illegal drugs. Using a qualitative approach, data were collected from five informants, including experts in blockchain technology, pharmaceutical supply chain management, and regulatory oversight. The findings reveal blockchain’s potential to enhance transparency, accountability, and regulatory compliance through features such as decentralized ledgers and smart contracts. However, challenges such as high implementation costs, technical barriers, and regulatory gaps hinder its adoption. The study concludes with recommendations, including capacity building, collaborative pilot programs, and the development of supportive policies, to facilitate blockchain integration in Indonesia’s pharmaceutical sector.
Social Media as an Early Warning System for Drug Prevention: Case Study of Surabaya's Digital Surveillance Program Ismail, Ismail; Felecia, Felecia; Azizah, Anisa Kurniatul; Rahmawati, Diana
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.519

Abstract

Social media has emerged as a powerful tool in public health initiatives, including drug prevention efforts. This study examines the role of social media as an early warning system in the Digital Surveillance Program in Surabaya. Using a quantitative approach with a sample of 100 respondents, data was collected through a Likert-scale questionnaire (1–5) and analyzed with Structural Equation Modeling - Partial Least Squares (SEM-PLS). The results reveal that public awareness significantly influences social media engagement and program effectiveness, while social media engagement plays a critical role in enhancing program outcomes. The structural model demonstrates moderate predictive power (R² = 0.53 for program effectiveness), highlighting the importance of integrating public awareness campaigns and social media engagement strategies to optimize drug prevention initiatives. The findings provide actionable insights for policymakers and stakeholders, emphasizing the need for community-centered content creation and data-driven social media strategies to combat drug misuse.
Identifying and Managing Noisy Neighbors in Multi-Tenant PostgreSQL Deployments (On-Premise) Natti, Murali
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.488

Abstract

In on-premise multi-tenant PostgreSQL deployments, multiple tenants share the same physical infrastructure to maximize resource utilization and reduce operational costs. However, this shared environment can give rise to significant resource contention, particularly when one tenant exhibits the “noisy neighbor” effect—where its workload consumes a disproportionate amount of CPU, memory, or disk I/O relative to others. This unbalanced resource consumption can lead to widespread performance degradation, manifesting as increased query latency, reduced throughput, and overall service instability. The present article investigates the challenges inherent in multi-tenant setups, focusing on the detection and management of noisy neighbors. It explores both native PostgreSQL monitoring techniques (such as system views and performance statistics) and external solutions including Linux control groups (cgroups) for isolating and limiting resource usage. Additionally, the article outlines best practices for proactive monitoring, query optimization, and resource allocation to ensure a balanced and efficient multi-tenant environment. By providing a comprehensive framework for understanding and mitigating the noisy neighbor phenomenon, this work aims to equip database administrators and system architects with effective strategies for maintaining robust performance, even under heavy and unevenly distributed workloads.
TLENVOY - A Tool for TLS Termination and Inspection Misra, Udit
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.489

Abstract

With the increasing adaption on encrypted communication over the internet, ensuring the security over network traffic has become very crucial. Transport Layer Security (TLS) is now widely used to secure data in transit, but at the same time it also poses challenges for network administrators who need to inspect traffic for malicious content or policy violations. This paper explores the use of Envoy, an open-source edge and service proxy, as a forward proxy to inspect TLS traffic. By leveraging Envoy's capabilities, organizations can maintain a secure environment for all nodes behind the proxy. We discuss the architecture, implementation, security considerations, and potential challenges of using Envoy for TLS inspection. The paper concludes with recommendations for deploying such a system in a secure and efficient manner.
Shift Left Security Malik, Gaurav; Prashasti, Prashasti
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.528

Abstract

Shift Left Security is a proactive approach to software development that aims to integrate security measures at the beginning of the software development lifecycle (SDLC) and at the design and development phases. In the past, security for software development has been reactive, looking for vulnerabilities at the test or deployment stages. However, this method has proven ineffective in the face of the complexity of these modern software systems and the frequency of cyber-attacks. Shift Left Security instead highlights embedding security practices from the beginning to capture vulnerabilities and detect and remediate them at the very beginning before they even hit the production stage. Continuous security testing, early risk assessment, and real-time feedback loops to rectify vulnerabilities immediately, given that solving them is critical during development, are a part of the proactive model. Shift Left Security integrates security into the SDLC, ensuring the security posture of the software applications is strengthened, post-release remediation is reduced, and time to market is accelerated. The significant advantage of it is that it lets organizations open up to a conversation around security as early as possible without the risk of it becoming an issue. Shift Left Security is an area of interest that this study explores in terms of its principles, benefits, challenges, and tools. This serves as a valuable offering that offers a hands-on approach to adopting this approach by organizations to achieve more secure, resilient software products through improved development efficiency and better protection against emerging cyber threats.
The Role of GitLab Runners in CI/CD Pipelines: Configuring EC2, Docker, and Kubernetes Build Environments Koneru, Naga Murali Krishna
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.529

Abstract

This research studies GitLab Runners optimization in CI/CD pipelines across the EC2, Docker, and Kubernetes environment configurations. It shows that such key strategies for enhancing build performance and resource utilization would reduce build time by 65 percent and resource costs by 40 percent. Practical recommendations for configuring runners to achieve optimal efficiency are presented in the context of analyzing 200 enterprise pipelines. The key optimization techniques are autoscaling based on real-time metrics, advanced caching to minimize the rebuilds, and tuning the resource allocation to avoid over-provision. The study further looks into the capability of machine learning models to optimize the number of runners dynamically, predict the hit or not on the cache, and automatically pick up the execution environment. When these innovations are applied, CI / CD pipeline performance will improve by reducing idle resources, building time, and optimizing resource utilization. The paper shows that experts can achieve very good availability and cost efficiency by adapting the configuration of GitLab Runners. The research also discusses the evolution of automated environment selection and machine learning-based performance tuning. This framework serves as the base for organizations to increase their CI/CD pipeline development rate and facilitates a faster, more reliable, and cheaper software delivery.
The Integration of AI and IoT in Cyber-Physical Systems for Smart Manufacturing in Indonesia Wardhani, Diky; Simarangkir, Manase Sahat H; Safarudin, Muhamad Sigid; Vandika, Arnes Yuli; Kaaffah, Faiz Muqorrir
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.530

Abstract

The integration of Artificial Intelligence (AI) and the Internet of Things (IoT) within Cyber-Physical Systems (CPS) represents a transformative opportunity for smart manufacturing in Indonesia. This study employs a qualitative approach, with insights from five informants, to explore the current state, challenges, opportunities, and strategic recommendations for CPS adoption. Findings reveal that while CPS adoption is in its early stages, it has significant potential to enhance operational efficiency, sustainability, and global competitiveness. Challenges such as limited infrastructure, skill gaps, and cybersecurity concerns are prevalent. However, opportunities exist in leveraging government initiatives, fostering local innovation, and promoting sustainability. Strategic recommendations include enhancing digital infrastructure, providing financial incentives, upskilling the workforce, and establishing clear regulatory frameworks. These insights contribute to advancing Indonesia's Industry 4.0 agenda and offer a roadmap for stakeholders to navigate CPS integration effectively.
The Impact of Explainable AI on User Trust and Ethical AI Adoption in Indonesia Judijanto, Loso; Achmady, Sayed; Fadhilah, St. Annisa Nurul; Vandika, Arnes Yuli
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.531

Abstract

Explainable Artificial Intelligence (XAI) is increasingly recognized as a critical enabler of trust and ethical AI adoption. This study explores the impact of XAI on user trust and ethical AI adoption within Indonesian academia through a qualitative analysis of five informants, including AI researchers, university administrators, and policymakers. The findings reveal that XAI enhances transparency and ethical awareness while fostering trust among academic stakeholders. However, technical complexity, resource limitations, and resistance to change pose significant barriers to implementation. The study also identifies opportunities for fostering XAI adoption, such as collaborative initiatives, government support, and tailored training programs. These insights contribute to the growing discourse on leveraging XAI for promoting ethical and trustworthy AI practices in academia.
Hyperloop Trial Run: Budgeting Under Uncertainty Goel, Ganpati; Brahmbhatt, Rahul
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.532

Abstract

The Hyperloop project is a radical new approach to high-speed transportation that could drastically reduce travel times between major cities with little environmental impact. As the project progresses, the trial runs, and promotional events must successfully convince the investor that the technology is feasible to execute the trial runs and promotional events. There are uncertain facts about the technology, the market conditions, and the regulatory difficulties in budgeting for such a complex and innovative System. The challenge for Virgin Hyperloop is to make it through this safely, with careful cost estimation, risk management, and developing a strategic plan. Public-private partnerships, cardio-logical innovations, and scenario-based budgeting are key strategies for sustaining and scaling up. Risk is managed, and the context evolves to meet that need but with long-term funding of project growth in place. Through examining a trial run of Virgin Hyperloop’s promotional scenario and how the financial strategies of Virgin Hyperloop may affect the budgeting process and will be friendly to scale this innovative transportation system, the paper unravels. The other effect of following Hyperloop technology in the world transportation industry became visible.
Bridging DFM and Sourcing Strategy Goel, Ganpati; Brahmbhatt, Rahul; Dhanagari, Mukesh Reddy
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.533

Abstract

This paper focuses on aligning Design for Manufacturing (DFM) principles with sourcing strategies to minimize one important step in rotor shaft manufacturing. The rotor shaft, an important part in high stress mechanical systems such as turbines or motors, is required to abstract and has to be designed and manufactured according to strict rules. Implementing DFM in the earlier phases of the design stream enables the production to be streamlined through geometric simplification, material selection, and process optimization. Early collaboration between design engineers and suppliers is necessary to integrate manufacturing capabilities into the required design to avoid the cost and delay of redesigns. The study aims to examine if the sourcing strategies affect DFM implementation. Technological strengths are used to select the suppliers so that materials and manufacturing processes match design specifications. Advanced machining techniques, additive manufacturing, and automation are key enablers of the DFM principle, minimizing the cost of production and lead time. The Supplier A and B case studies show how suppliers use rotor shaft production practices, advanced manufacture, and agile production for production efficiency. The study concludes that the success of DFM and sourcing strategies for rotor shaft manufacturing will need to be successful for rotor shaft manufacturing to be efficient, reduce costs, and maintain high-quality standards. Manufacturers are encouraged to work closely with suppliers, adopt flexible sourcing strategies, and invest in technology to remain competitive. The combination of the DFM principle and the latest strategies used for sourcing enables manufacturers to optimize production processes, reduce waste, improve the quality and performance of the product, and have a solid, economical supply chain.

Page 1 of 2 | Total Record : 17