cover
Contact Name
Abdul Aziz
Contact Email
abdulazizbinceceng@gmail.com
Phone
+6282180992100
Journal Mail Official
journaleastasouth@gmail.com
Editorial Address
Grand Slipi Tower, level 42 Unit G-H Jl. S Parman Kav 22-24, RT. 01 RW. 04 Kel. Palmerah Kec. Palmerah Jakarta Barat 11480
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
The Eastasouth Journal of Information System and Computer Science
Published by Eastasouth Institute
ISSN : 30266041     EISSN : 3025566X     DOI : https://doi.org/10.58812/esiscs
Core Subject : Science,
ESISCS - The Eastasouth Journal of Information System and Computer Science is a peer-reviewed journal and open access three times a year (April, August, December) published by Eastasouth Institute. ESISCS aims to publish articles in the field of Enterprise systems and applications, Database management systems, Decision support systems, Knowledge management systems, E-commerce and e-business systems, Business intelligence and analytics, Information system security and privacy, Human-computer interaction, Algorithms and data structures, Artificial intelligence and machine learning, Computer vision and image processing, Computer networks and communications, Distributed and parallel computing, Software engineering and development, Information retrieval and web mining, Cloud computing and big data. ESISCS accepts manuscripts of both quantitative and qualitative research. ESISCS publishes papers: 1) review papers, 2) basic research papers, and 3) case study papers. ESISCS has been indexed in, Crossref, and others indexing. All submissions should be formatted in accordance with ESISCS template and through Open Journal System (OJS) only.
Articles 80 Documents
Analyzing Energy Consumption Data to Optimize Efficiency in High-Performance Computing Centers Dahule, Pratik
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 03 (2024): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i03.514

Abstract

High-performance computing (HPC) centers are at the forefront of technological innovation, enabling breakthroughs in fields ranging from scientific research to artificial intelligence. However, the immense computational power they deliver comes at a cost: these facilities consume vast amounts of energy, leading to soaring operational expenses and significant environmental footprints. As the demand for HPC capabilities continues to grow, optimizing energy efficiency has become a critical priority not only to cut costs but also to align with global sustainability goals. This article delves into how energy consumption data analysis can serve as a game-changer for HPC centers striving to balance performance with efficiency. By harnessing advanced tools such as real-time energy monitoring, machine learning algorithms, and predictive analytics, these facilities can unlock new opportunities for optimization. Data-driven strategies enable smarter workload distribution, more efficient cooling systems, and better utilization of hardware resources, all while maintaining the high-performance standards required for complex computations. To illustrate the real-world impact of these approaches, the article presents a case study of an HPC center that successfully implemented energy optimization strategies. Through a combination of cutting-edge analytics and strategic adjustments, the center achieved a notable reduction in power consumption without compromising computational performance. This example underscores the transformative potential of data-driven energy management in HPC environments, offering valuable insights for other facilities looking to enhance their sustainability and operational efficiency. By embracing these innovative techniques, HPC centers can not only reduce their energy costs but also contribute to a greener, more sustainable future, proving that high performance and environmental responsibility can go hand in hand.
The Role of Cloud-Based Analytics in Transforming Logistics Data Management and Reporting Yerra, Srikanth
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 02 (2024): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i02.515

Abstract

Cloud-based analytics has transformed logistics data management by enabling real-time data processing, improving visibility, and supporting fact-based decision-making. Traditional logistics systems struggle with data silos, delayed reporting, and poor resource planning. Cloud-based solutions dynamically process vast logistics data, allowing real-time monitoring of transportation, inventory, and supplier performance. This improves efficiency by identifying bottlenecks, streamlining routes, and predicting disruptions. AI-powered analytics also enables demand forecasting, warehouse optimization, and automated strategic decisions. Moreover, cloud-based platforms integrate data from suppliers, distributors, and logistics providers, enhancing collaboration, reducing communication gaps, and improving regulatory compliance. Security and scalability further drive adoption, with cloud providers offering encryption, access controls, and real-time threat detection. Flexible cloud infrastructure allows businesses to scale analytics based on demand, cutting infrastructure costs while maintaining high performance. In summary, cloud-based analytics offers real-time insights, predictive capabilities, collaboration, and secure scalability, helping firms improve efficiency, reduce risks, and stay competitive in global supply chains.
Blockchain for Monitoring the Safe Supply Chain of Medicines: Reducing the Circulation of Illegal Drugs in Indonesia Ismail, Ismail; Felecia, Felecia; Azizah, Anisa Kurniatul; Rahmawati, Diana
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.518

Abstract

The pharmaceutical supply chain in Indonesia faces significant challenges, including counterfeit drug infiltration and insufficient traceability. This study explores the application of blockchain technology as a solution to monitor and secure the supply chain, reducing the circulation of illegal drugs. Using a qualitative approach, data were collected from five informants, including experts in blockchain technology, pharmaceutical supply chain management, and regulatory oversight. The findings reveal blockchain’s potential to enhance transparency, accountability, and regulatory compliance through features such as decentralized ledgers and smart contracts. However, challenges such as high implementation costs, technical barriers, and regulatory gaps hinder its adoption. The study concludes with recommendations, including capacity building, collaborative pilot programs, and the development of supportive policies, to facilitate blockchain integration in Indonesia’s pharmaceutical sector.
Social Media as an Early Warning System for Drug Prevention: Case Study of Surabaya's Digital Surveillance Program Ismail, Ismail; Felecia, Felecia; Azizah, Anisa Kurniatul; Rahmawati, Diana
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.519

Abstract

Social media has emerged as a powerful tool in public health initiatives, including drug prevention efforts. This study examines the role of social media as an early warning system in the Digital Surveillance Program in Surabaya. Using a quantitative approach with a sample of 100 respondents, data was collected through a Likert-scale questionnaire (1–5) and analyzed with Structural Equation Modeling - Partial Least Squares (SEM-PLS). The results reveal that public awareness significantly influences social media engagement and program effectiveness, while social media engagement plays a critical role in enhancing program outcomes. The structural model demonstrates moderate predictive power (R² = 0.53 for program effectiveness), highlighting the importance of integrating public awareness campaigns and social media engagement strategies to optimize drug prevention initiatives. The findings provide actionable insights for policymakers and stakeholders, emphasizing the need for community-centered content creation and data-driven social media strategies to combat drug misuse.
Automated ETL Pipelines for Modern Data Warehousing: Architectures, Challenges, and Emerging Solutions Chanda, Deepak
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 03 (2024): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i03.523

Abstract

The paper addresses the evolution of automated Extract, Transform, Load (ETL) pipelines in contemporary data warehousing environments, highlighting their essential role in enabling timely analytics and business intelligence. Recent architectural approaches like cloud-native ETL, stream processing architectures, and metadata-driven automation are addressed in the context of increasing data volume and variety. The article addresses typical challenges like schema evolution management, data quality assurance, and cross-platform integration in the context of discussing novel solutions based on leveraging artificial intelligence for pipeline optimization. Through a survey of current implementations and future perspectives, this research provides an in-depth view of how automated ETL workflows are transforming data warehouse environments and enabling more agile, scalable business intelligence solutions.
Identifying and Managing Noisy Neighbors in Multi-Tenant PostgreSQL Deployments (On-Premise) Natti, Murali
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.488

Abstract

In on-premise multi-tenant PostgreSQL deployments, multiple tenants share the same physical infrastructure to maximize resource utilization and reduce operational costs. However, this shared environment can give rise to significant resource contention, particularly when one tenant exhibits the “noisy neighbor” effect—where its workload consumes a disproportionate amount of CPU, memory, or disk I/O relative to others. This unbalanced resource consumption can lead to widespread performance degradation, manifesting as increased query latency, reduced throughput, and overall service instability. The present article investigates the challenges inherent in multi-tenant setups, focusing on the detection and management of noisy neighbors. It explores both native PostgreSQL monitoring techniques (such as system views and performance statistics) and external solutions including Linux control groups (cgroups) for isolating and limiting resource usage. Additionally, the article outlines best practices for proactive monitoring, query optimization, and resource allocation to ensure a balanced and efficient multi-tenant environment. By providing a comprehensive framework for understanding and mitigating the noisy neighbor phenomenon, this work aims to equip database administrators and system architects with effective strategies for maintaining robust performance, even under heavy and unevenly distributed workloads.
TLENVOY - A Tool for TLS Termination and Inspection Misra, Udit
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.489

Abstract

With the increasing adaption on encrypted communication over the internet, ensuring the security over network traffic has become very crucial. Transport Layer Security (TLS) is now widely used to secure data in transit, but at the same time it also poses challenges for network administrators who need to inspect traffic for malicious content or policy violations. This paper explores the use of Envoy, an open-source edge and service proxy, as a forward proxy to inspect TLS traffic. By leveraging Envoy's capabilities, organizations can maintain a secure environment for all nodes behind the proxy. We discuss the architecture, implementation, security considerations, and potential challenges of using Envoy for TLS inspection. The paper concludes with recommendations for deploying such a system in a secure and efficient manner.
Shift Left Security Malik, Gaurav; Prashasti, Prashasti
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.528

Abstract

Shift Left Security is a proactive approach to software development that aims to integrate security measures at the beginning of the software development lifecycle (SDLC) and at the design and development phases. In the past, security for software development has been reactive, looking for vulnerabilities at the test or deployment stages. However, this method has proven ineffective in the face of the complexity of these modern software systems and the frequency of cyber-attacks. Shift Left Security instead highlights embedding security practices from the beginning to capture vulnerabilities and detect and remediate them at the very beginning before they even hit the production stage. Continuous security testing, early risk assessment, and real-time feedback loops to rectify vulnerabilities immediately, given that solving them is critical during development, are a part of the proactive model. Shift Left Security integrates security into the SDLC, ensuring the security posture of the software applications is strengthened, post-release remediation is reduced, and time to market is accelerated. The significant advantage of it is that it lets organizations open up to a conversation around security as early as possible without the risk of it becoming an issue. Shift Left Security is an area of interest that this study explores in terms of its principles, benefits, challenges, and tools. This serves as a valuable offering that offers a hands-on approach to adopting this approach by organizations to achieve more secure, resilient software products through improved development efficiency and better protection against emerging cyber threats.
The Role of GitLab Runners in CI/CD Pipelines: Configuring EC2, Docker, and Kubernetes Build Environments Koneru, Naga Murali Krishna
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.529

Abstract

This research studies GitLab Runners optimization in CI/CD pipelines across the EC2, Docker, and Kubernetes environment configurations. It shows that such key strategies for enhancing build performance and resource utilization would reduce build time by 65 percent and resource costs by 40 percent. Practical recommendations for configuring runners to achieve optimal efficiency are presented in the context of analyzing 200 enterprise pipelines. The key optimization techniques are autoscaling based on real-time metrics, advanced caching to minimize the rebuilds, and tuning the resource allocation to avoid over-provision. The study further looks into the capability of machine learning models to optimize the number of runners dynamically, predict the hit or not on the cache, and automatically pick up the execution environment. When these innovations are applied, CI / CD pipeline performance will improve by reducing idle resources, building time, and optimizing resource utilization. The paper shows that experts can achieve very good availability and cost efficiency by adapting the configuration of GitLab Runners. The research also discusses the evolution of automated environment selection and machine learning-based performance tuning. This framework serves as the base for organizations to increase their CI/CD pipeline development rate and facilitates a faster, more reliable, and cheaper software delivery.
The Integration of AI and IoT in Cyber-Physical Systems for Smart Manufacturing in Indonesia Wardhani, Diky; Simarangkir, Manase Sahat H; Safarudin, Muhamad Sigid; Vandika, Arnes Yuli; Kaaffah, Faiz Muqorrir
The Eastasouth Journal of Information System and Computer Science Vol. 2 No. 03 (2025): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v2i03.530

Abstract

The integration of Artificial Intelligence (AI) and the Internet of Things (IoT) within Cyber-Physical Systems (CPS) represents a transformative opportunity for smart manufacturing in Indonesia. This study employs a qualitative approach, with insights from five informants, to explore the current state, challenges, opportunities, and strategic recommendations for CPS adoption. Findings reveal that while CPS adoption is in its early stages, it has significant potential to enhance operational efficiency, sustainability, and global competitiveness. Challenges such as limited infrastructure, skill gaps, and cybersecurity concerns are prevalent. However, opportunities exist in leveraging government initiatives, fostering local innovation, and promoting sustainability. Strategic recommendations include enhancing digital infrastructure, providing financial incentives, upskilling the workforce, and establishing clear regulatory frameworks. These insights contribute to advancing Indonesia's Industry 4.0 agenda and offer a roadmap for stakeholders to navigate CPS integration effectively.