cover
Contact Name
Abdul Aziz
Contact Email
abdulazizbinceceng@gmail.com
Phone
+6282180992100
Journal Mail Official
journaleastasouth@gmail.com
Editorial Address
Grand Slipi Tower, level 42 Unit G-H Jl. S Parman Kav 22-24, RT. 01 RW. 04 Kel. Palmerah Kec. Palmerah Jakarta Barat 11480
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
The Eastasouth Journal of Information System and Computer Science
Published by Eastasouth Institute
ISSN : 30266041     EISSN : 3025566X     DOI : https://doi.org/10.58812/esiscs
Core Subject : Science,
ESISCS - The Eastasouth Journal of Information System and Computer Science is a peer-reviewed journal and open access three times a year (April, August, December) published by Eastasouth Institute. ESISCS aims to publish articles in the field of Enterprise systems and applications, Database management systems, Decision support systems, Knowledge management systems, E-commerce and e-business systems, Business intelligence and analytics, Information system security and privacy, Human-computer interaction, Algorithms and data structures, Artificial intelligence and machine learning, Computer vision and image processing, Computer networks and communications, Distributed and parallel computing, Software engineering and development, Information retrieval and web mining, Cloud computing and big data. ESISCS accepts manuscripts of both quantitative and qualitative research. ESISCS publishes papers: 1) review papers, 2) basic research papers, and 3) case study papers. ESISCS has been indexed in, Crossref, and others indexing. All submissions should be formatted in accordance with ESISCS template and through Open Journal System (OJS) only.
Articles 80 Documents
Reducing Oracle RAC Wait Events by Using Instance-Specific Block Allocation for Production Applications Natti, Murali
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 01 (2023): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i01.447

Abstract

Oracle Real Application Clusters (RAC) is a robust and high-availability solution designed to enable multiple database instances to share the same physical database, offering benefits such as scalability and fault tolerance. However, while Oracle RAC can support critical production environments, it introduces significant complexities, particularly with regard to wait events. One of the primary performance bottlenecks in Oracle RAC is inter-instance communication, commonly referred to as cache fusion, where instances must exchange and synchronize shared data blocks across the cluster. This overhead becomes particularly problematic for production applications that access commonly used tables or objects, leading to increased wait times, slower response rates, and reduced throughput. This paper outlines a novel approach that aims to alleviate Oracle RAC wait events by binding specific application instances to individual Oracle RAC nodes. By allocating frequently accessed tables or objects to specific nodes, this method reduces contention, optimizes database access, and enhances overall application performance.
Building Trust and Transparency: Leveraging Quarterly Business Reviews to Drive 4-Nines Availability and Proactive Customer Support Natti, Murali
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 01 (2024): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i01.448

Abstract

In the digital age, customers have heightened expectations for both service availability and support, making it crucial for businesses to provide consistent uptime and quality service. Building long-term partnerships depends on fostering trust, transparency, and accountability with clients. Quarterly Business Reviews (QBRs) are one of the most effective strategies to meet these expectations. These structured meetings allow service providers to share performance insights, discuss improvements, and outline future initiatives, ensuring customers feel confident in the reliability of the service they receive. This approach helps reinforce relationships, demonstrating a business’s commitment to service excellence. This white paper explores how QBRs can be leveraged to achieve 4-nines availability (99.99%), proactive support, and enhanced customer satisfaction. By using QBRs, companies can deepen customer engagement, showcase accountability through Root Cause Analysis (RCA) of service incidents, and highlight ongoing service improvements. The paper details the key components of a successful QBR strategy, emphasizing the importance of high availability, proactive customer support, and continuous improvement in fostering stronger customer relationships and achieving mutual business success.
The Optimal Sales Funnel for a SaaS Product in Real Estate Goel, Krupa
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 01 (2023): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i01.449

Abstract

The real estate industry has seen more dependence on SaaS solutions as tools for efficiencies, data, and CRM. However, the best SaaS products are the services they provide and the sales funnel that results in customer acquisition and profitability. This paper aims to review the major steps of the SaaS sales funnel and its application in the real estate industry of Reonomy Company, where these stages involve: awareness, consideration, decision, onboarding, and retention. They all have a significant function of transferring potential buyers from when they get their attention to when they become loyal customers. Many struggles often come with SaaS having high churn rates, which are dangerous for revenues. It also shows how ML can be used in this case to help predict and even prevent churn by defining high-risk customers. Promotional emails, offers, discounts, and dynamic pricing models are discussed as important techniques that address customer churn and retention. Contacting all the users based on real-time data, SaaS companies provide value to both nominally logged-in and highly active customers. Analyzing Reonomy’s application of customer retention with ML reveals the potential of a highly designed funnel for preserving customer bases and maximizing CLV. The observation supports the need to synchronize the data collected by machine learning algorithms with the company’s marketing and customer service strategies as critical for sustainable growth in the highly competitive real estate SaaS industry. Based on the analysis in this paper, it becomes clear that data analytic approaches help to cultivate sustainable consumer relationships and business profitability.
Lead Prioritization: A guide to maximizing sales using analytics and AI in Real Estate Goel, Krupa
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 03 (2024): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i03.450

Abstract

In this highly competitive market, selecting the right lead that would bring significant sales conversion is one of the keys to an effective real estate business. In the following paper, we discuss the function of analytics and artificial intelligence in transforming lead management in the real estate industry. Conventional methods of lead prioritizing involve the rote use of the gut feeling of a salesperson, which, although inefficient, leaves much room for potential errors. Incorporating AI and analytics lead management thrust real estate agents into data analysis, where agents can make predictive and behavioral decisions based on stated data. Through lead scoring tools and other intelligent platforms such as AI, an agent can determine high probable lead conversion, directing efforts to more converting leads. Furthermore, this paper examines the use of big data analytics in predicting market trends and buying behavior to improve the position of agents competing in a highly technological marketplace. The paper also discusses changes in buyers' needs, including the interest in customization and environmental sustainability, which are gaining importance in lead selection processes. For this, adopting these technologies not only makes operations more efficient but also assists agents in building better client relations by initiating marketing that would capture the clients' interest and subsequently follow up on them. The lead management of the real estate industry will only improve due to enhanced artificial intelligence and analytics in the future. This paper acts as a reference for real estate agents trying to incorporate current tools in managing their leads to improve their chances of closing deals.
Cloud-Based Data Governance: Ensuring Security, Compliance, and Privacy Naik, Shivali
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 01 (2023): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i01.452

Abstract

Cloud computing has been taken up very rapidly and has over time changed the way an organization stores, processes, and shares data towards much higher levels of efficiency, scalability, and innovation. This paradigm shift, however, bears its unique and very complex challenges towards security of data and network security. Since sensitive in- formation finds its storage and transmission increasingly on shared multi- tenant cloud environments, the potential for data breaches, unauthorized access, and other cyber threats becomes much more viable. Moreover, the shared responsibility model in real. A further layer of complexity is added to cloud computing by necessitating providers and consumers to implement robust security measures. In this chapter, the most current strategies, technologies, and frameworks that can be used to secure data and networks within cloud environments will be discussed. Challenges will be considered that will provide a rational basis for achieving the appropriate level of assurance in the security of information systems and, as a consequence, the data they process, against confidentiality, integrity, and availability threats to evolve cyber threats. This will allow the organization to take full advantage of cloud computing, keeping compliance and information confidential and resilient against ever-changing cyber threats.
Mastering System Resilience: Building Robust Software with Break-Point Testing Ramdoss, Vasudevan Senathi
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 01 (2024): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i01.461

Abstract

Modern digital environments require software systems to efficiently manage high traffic loads and stress conditions. Through break-point testing which is dedicated performance testing you can find out the highest load your system can manage before experiencing failure or performance decline. This tutorial focuses on break-point testing with Apache JMeter which stands as an open-source performance testing application that is extensively adopted. The guide explains how to establish tests, adjust JMeter settings for precision and construct practical testing models. The guide will teach you how to identify system bottlenecks and analyze test results while optimizing performance. You will possess a definitive plan to maintain your software's reliability and scalability when exposed to stress.
Building Robust Fintech Reporting Systems Using JPA with Embedded SQL for Real-Time Data Accuracy and Consistency Bayya, Anil Kumar
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 01 (2023): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i01.480

Abstract

In the rapidly evolving fintech domain, the need for high-throughput, low-latency, real-time reporting systems has increased due to rising transaction volumes. This paper examines the architectural design and technical implementation of fintech reporting systems integrating Java Persistence API (JPA) with embedded SQL, ensuring data accuracy, efficient query execution, and transaction consistency. JPA, an Object-Relational Mapping (ORM) framework, abstracts interactions between Java objects and relational databases, simplifying development through entity mapping and reducing boilerplate code. Annotations like @Entity, @Table, and @Column define entity relationships and constraints, enabling automated schema synchronization. Embedded SQL complements JPA by allowing direct SQL query injection, optimizing complex, performance-critical queries while maintaining JPA’s portability. A multi-tier design ensures separation of concerns and scalability. The persistence layer, managed by JPA, facilitates database interaction, while connection pooling (e.g., HikariCP) and caching strategies (first-level and second-level) enhance transaction throughput. Transactional integrity is enforced via isolation levels, locking strategies, and batch processing, preventing issues like dirty reads and lost updates. Using native SQL queries via JPA’s create Native Query method, the system leverages advanced database optimization features. Profiling tools ensure minimal query latency, supporting real-time financial reporting with strict performance standards. By combining JPA’s abstraction with embedded SQL’s efficiency, this architecture provides a resilient, scalable reporting system, ensuring data integrity and optimized query execution for fintech operations.
The impact of blockchain on data integrity and security in distributed systems Annapureddy, Govardhan Reddy
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 02 (2024): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i02.486

Abstract

Blockchain has toured the technological world as a revolutionary platform powering safe and secured storing of information across many sectors including digital currency and supply systems. This paper discusses the potential of this technology and the essential role it plays in the management of data integrity and security in distributed systems. It starts with a brief discussion of the key concepts of blockchain namely decentralization, the ledger is not controlled by the parties to the transaction or by any third party, immutability of records on the blockchain, the records on a blockchain cannot be tampered with once they have been put on the blockchain, and transparency, everybody can see the record but cannot influence it. The paper then looks at how these principles improve data security and data integrity as compared to centralized approach. Besides, it also looks at some of the drawbacks and possible limitations of blockchain about data consistency and protection again also giving scenarios that support its efficiency.
The Strategic Impact of Project Management and Kanban in Enhancing Data Analysis Efficiency Dahule, Pratik
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 02 (2023): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i02.494

Abstract

In data analysis projects, effective project management is critical to ensuring timely execution, resource optimization, and quality deliverables. This paper explores the integration of project management principles with the Kanban methodology to enhance workflow efficiency, task prioritization, and cross-functional collaboration. By providing a structured yet flexible approach, Kanban enables teams to visualize processes, limit work in progress, and mitigate bottlenecks. A case study from a utility company illustrates the practical application of Kanban, highlighting its impact on improving operational efficiency, reducing resolution times, and increasing customer satisfaction. Through data-driven techniques such as cohort analysis and sentiment analysis, the study evaluates internal performance improvements and shifts in customer perception. The findings demonstrate that Kanban, when coupled with data-driven decision-making, can significantly enhance project execution and service quality in data-intensive environments. This paper contributes to the growing body of research on agile project management strategies for data analysis initiatives.
Secure Remote Access in CloudStack: Implementation and Performance Evaluation of an L2TP-over-IPsec VPN Domakonda, Dileep
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 02 (2023): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i02.513

Abstract

This paper presents the design and deployment of a remote access VPN function in CloudStack, an open-source platform for virtualized cloud management. The Remote Access VPN offers secure connectivity for remote users to communicate with virtual machines (VMs) within guest networks. Users can safely connect to cloud-based systems from external networks by using a VPN that uses L2TP-over-IPsec as the underlying protocol. With certain routing mechanisms that guarantee that only guest network traffic is routed through the VPN, the feature supports both "Road Warrior" (dynamic IP clients) and "Site-to-Site" (pre-configured IP clients) VPN connections. In addition to discussing upcoming scalability and usability improvements, this paper covers the technical design, implementation, and testing strategies for the Remote Access VPN feature.