cover
Contact Name
Widi Aribowo
Contact Email
widiaribowo@unesa.ac.id
Phone
+62811307761
Journal Mail Official
vubeta@unesa.ac.id
Editorial Address
Jl. Prof. Moch Yamin, Ketintang, Kec. Gayungan, Surabaya, Jawa Timur 60231
Location
Kota surabaya,
Jawa timur
INDONESIA
Vokasi UNESA Bulletin of Engineering, Technology and Applied Science
ISSN : -     EISSN : 30640768     DOI : https://doi.org/10.26740/vubeta.v1i1
Vokasi Unesa Bulletin Of Engineering, Technology and Applied Science is a peer-reviewed, Quarterly International Journal, that publishes high-quality theoretical and experimental papers of permanent interest, that have not previously been published in a journal, in the field of engineering, technology, and applied sciences that aim to promote the theory and practice of Engineering, Technology And Applied Science.
Articles 69 Documents
Revisiting Parasitic Computing: Ethical and Technical Dimensions in Resource Optimization Oise, Godfrey; Nwabuokei, Clement; IGBUNU, Richard; EJENARHOME, Prosper
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.38786

Abstract

Parasitic computing is a provocative concept enabling one system to offload computational tasks to remote hosts without explicit consent by exploiting communication protocols such as TCP/IP. While initially demonstrated as a conceptual hack, its implications for distributed computing, ethics, and resource optimization remain underexplored in modern contexts. This study revisits the original parasitic computing model, focusing on operational feasibility, technical efficiency, and ethical boundaries. We implement a Python-based simulation that encodes logical operations (AND, OR) into TCP packets by manipulating checksum fields—a core mechanism of the parasitic approach. We conducted over 6,000 packet transmissions across various network latency conditions using loopback and LAN environments to measure success rates, response times, and failure thresholds. Results show that logical operations can succeed under low-latency conditions with over 94% accuracy, but performance degrades sharply under higher round-trip times, dropping below 70%. These findings suggest parasitic computing may be technically viable within tightly controlled environments but face significant limitations in broader network applications. The researchers critically examine ethical considerations, emphasizing the risks of unauthorized computation, resource exploitation, and potential security breaches. This study contributes a reproducible methodology and empirical data, offering a renewed perspective on parasitic computing’s technical boundaries and future potential. It further calls for responsible experimentation and proposes hybrid models combining parasitic techniques with legitimate distributed computing frameworks and new safeguards to detect and mitigate unintended abuses. The paper proposes directions for improving protocol resilience and computational fairness in open networks.
A Optimal Placement of Phasor Measurement Units on Shiroro 330kv Grid Network using Binary Grey Wolf Optimization Algorithm Kabiru Abubakar Tureta; SABO, ALIYU; Abdulrazak, Yakubu
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.38936

Abstract

Phasor Measurement Units (PMUs) are essential for enhancing the control, monitoring, and observability of modern power systems. This research presents an optimal PMU placement approach for the Shiroro 330 kV grid network using the Binary Grey Wolf Optimization (BGWO) algorithm. The objective is to minimize the number of PMUs while ensuring full system observability under both normal and contingency conditions. The BGWO algorithm, inspired by the hunting behavior of grey wolves, is a powerful metaheuristic technique for solving binary optimization problems. By applying this method to the Shiroro grid, the study demonstrates how optimal PMU placement enhances grid observability and reliability. Compared to alternative optimization techniques, BGWO provides improved accuracy and reduced computational time. The simulation results validate the effectiveness of the proposed approach in achieving a cost-effective and reliable PMU deployment strategy for the 330 kV network.
Design Of an Enterprise Network Terminal Security Solution Idris Abubakar, Muhammad; Ore-Ofe, Ajayi; Umar, Abubakar; Ibrahim, Ibrahim; Olugbenga, Lawal Abdulwahab; Abdulbasit Abiola, Ajikanle
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39105

Abstract

This paper develops a secured enterprise network terminal security solution that seeks to safeguard the confidentiality, integrity, and availability of critical data and network resources, the paper presents a logical approach to designing an enterprise network security solution with a primary focus on optimizing and enhancing the performance of the network terminals (and datacenter critical end devices) security solution. The traditional network infrastructure has predominantly centered the security measured on core network components such as Firewalls, Intrusion Detection Systems/Intrusion Prevention Systems (IDS/SPS) but there are encountered security incidences, this is due to the exponential growth of the Internet of Things (IoT) devices, Bring Your Device (BYOD), and remote workforce trends, the network terminals have become the key points through which users access and utilize network resources for malicious attack and in most cases critical end devices such as servers/storage are the end target. This paper presents a comprehensive framework that places considerable emphasis on improving the terminal security performance by utilizing the existing encryption techniques (VPN) to provide double-step tunnels (VPN). However, in the event of an inevitable attack, the paper also presents a framework of how data center core end components, such as server and storage can be protected from the attack. The paper starts by studying the terminal ecosystem, the current terminal security solution, and the latest terminal security solution and designing the solution deemed fit to secure the terminal network.  
The Spatial Pattern and Distribution of Adansonia Species in the Sahel Savanna Ecosystem of Yobe State, Nigeria Yahaya Kuku, Ishaya; Jibril Abdullahi, Edicha; Eniyekenimi Daukere, Bitrus; Precious Oru-bo, Jedidiah
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39262

Abstract

The study scrutinizes the distribution, of Adansonia species in Southern part of Yobe State Nigeria. A quadrat sampling method was employed for the study and the study area was divided into twenty quadrats using the purposive sampling technique. The quadrat sizes ranges from 100 by 100 meters, 200 by 200 meters, 300 by 300 meters, 400 by 400 meters and 500 by 500 meters. Adansonia species in all 20 quadrats were counted, their species identified. A total of 791 trees were identified in the 20 quadrats out of which 775 are of the species Adansonia digitata while 16 were Adansonia kilima. Furthermore, the nearest neighbor analysis was carried-out to establish the distribution of the said plant in the study area, the result revealed that 19 out of 20 quadrats are dispersed in terms of pattern of distribution with only quadrat 17 exhibiting a random distribution. The result further reveals that out of all the species of Adansonia in the world, only Adansonia digitata and Adansonia kilima are found in the study area, the other species namely Adansonia grandidiera, Adansonia gregorii, Adansonia madagascariensis, Adansonia perrieri, Adansonia rubrostipa, Adansonia suarezensis and Adansonia za were absent in the study area.
A Novel Modified Tornado optimizer with Coriolis force Based On Levy Flight to Optimize Proportional Integral Derivative Parameters of DC Motor Oliva , Diego; Soleimanian Gharehchopogh, Farhad; Hacimahmud Abdullayev, Vugar; aribowo, Widi; Asmunin, Asmunin; Iwan Nurhidayat, Andi
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39269

Abstract

One kind of electric motor that runs on direct current (DC) is called a DC (Direct Current) motor.  This motor uses the interaction of electric current and magnetic fields to transform electrical energy into mechanical energy, or motion.  Applications requiring exact speed and torque control frequently use DC motors.  By minimizing errors (differences between setpoints and actual values), proportional-integral-derivative (PID) control is a control technique used to govern dynamic systems to reach desired conditions (setpoints).  PID creates an ideal control signal by combining three elements. The Modified Tornado optimizer-based Coriolis force (TOC) method for DC motor control is presented in this article.   The paradigm for the TOC approach is the Tornado Optimizer-Based Coriolis Force Algorithm, a metaheuristic that leverages tornado dynamics and the effect of the Coriolis force to address difficult optimization problems.   According to this study, the TOC method can be improved by implementing the Levy Flight methodology.   According to the results of tests employing optimal functions, the LTOC technique may broaden exploration and exploitation.   Meanwhile, when the LTOC technique is applied as a DC motor controller, the optimal overshoot response value is achieved. The LTOC approach outperforms the TOC method by 0.014% and 0.037%, respectively, in terms of ITSE and ITAE values.
The Reconfiguration of Kaduna Municipal Area Distribution Network For Power Loss Reduction And Voltage Profile Improvement Using Static Var Compensators (SVC) Airoboman , Abel Ehinem; Alhaji Bukar, Bukar; Araga, I.A
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39272

Abstract

Increase in demand for electricity due to the advancement of technology globally and in Nigeria has brought about numerous challenges such as voltage instability, power factor problems and high power loss in the electrical power distribution networks. This paper presents a Static Var Compensator (SVC) placement on the power distribution network of Town One Station Kaduna, Nigeria, to investigate its impact on improving the network’s voltage profile and reducing the active power loss in the system. For analysis, the bus voltage, power, and the current passing through the chosen feeders were measured and noted appropriately. The network parameters which include route length, transformer parameters and the maximum power flow were obtained from Kaduna electricity Distribution Company, Kaduna, Nigeria. The distribution network was modelled and simulated in ETAP software environment, for both with and without Static Var Compensator (SVCs). The results obtained from the simulation indicated that buses 5, 7, 8, and 47 others has voltage magnitude of 0.745 – 0.932pu which are clearly outside acceptable limit of 0.95 – 1.05Pu. Further result showed real and reactive power loss of 8527 kW and 23535 kVAr is experienced by the network. After the SVCs placement, the power loss reduced from 8527 kW to 6751 kW and minimum system voltage improved from 0.745 – 1.02 Pu.
Internet of Things (IoT) Based Electrical Power Monitoring System for Solar Power Plants Using Telegram Application Delfianti, Rezi; Tazayul, Venny Aminda; Mustaqim, Bima; Nusyura, Fauzan; Harsito, Catur
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39405

Abstract

Indonesia, with its tropical climate, possesses substantial solar energy potential. However, traditional monitoring of solar power systems in Indonesia still relies on manual observation, making the process inefficient, time-consuming, and prone to error. To address these limitations, this study proposes the design and implementation of a real-time Internet of Things (IoT)-based monitoring system for solar power plants using the Telegram application as the user interface. The system integrates the ESP32 microcontroller and the Pzem-004 T sensor to measure AC electrical parameters, including voltage, current, power, energy, frequency, and power factor. Unlike previous studies that used platforms such as Blynk or ThingSpeak, this research introduces Telegram as an innovative messaging-based monitoring platform, offering greater accessibility, simplicity, and user familiarity. The monitoring system was tested on a single-phase off-grid solar power setup, utilizing five types of household electrical loads, to validate its accuracy and reliability. The ESP32 communicates with the Telegram bot through Wi-Fi, and users can retrieve real-time data via predefined commands. Experimental results demonstrate high measurement accuracy, with average errors of 0.07% for voltage, 0.1% for current, and 0.08% for power. These results confirm that the system provides reliable data transmission and sensor readings. This work contributes a low-cost, efficient, and user-friendly alternative to conventional monitoring systems, particularly for decentralized renewable energy systems in remote or off-grid areas. The integration of Telegram as a communication medium for energy monitoring adds a novel dimension to IoT-based power system applications.
Enhancing Indoor Positioning Accuracy with Ant Colony Optimization and Dual Clustering Oise, Godfrey; Nwabuokei, Onyemaechi Clement; Ozobialu, chukwuma Emmanuel; Jenarhome, Otega Prosper; Atake, Onoriode Michael; Nkem Belinda, Unuigbokhai; Babalola Eyitemi , Akilo
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39452

Abstract

Indoor positioning systems are crucial for public safety, healthcare, and IoT, but Wi-Fi fingerprinting faces challenges such as signal interference, multipath effects, and high computational costs. These issues reduce positioning accuracy and make real-time localization difficult.This paper introduces an Ant Colony Optimization (ACO)-based dual clustering method to enhance Wi-Fi fingerprinting accuracy and efficiency. ACO performs coarse clustering by optimizing initial data groupings, while K-means refines clusters for improved precision. The Weighted K-Nearest Neighbor (WKNN) algorithm is then applied for real-time positioning by selecting the most similar signal sub-bases.Experiments show that the proposed method achieves 100% accuracy in building classification and 91% accuracy in floor classification. For latitude and longitude prediction, Random Forest and SVC outperform XGBoost, achieving MSE values of 0.0048 (latitude) and 0.0055 (longitude). The approach also reduces computational overhead by 93.51%, improving efficiency.The study presents a robust, scalable solution for indoor positioning and introduces the Dual Clustering Wi-Fi Localization Dataset (DCWiLD) for future research. Future work will focus on dataset balancing, BLE/UWB integration, and energy optimization for IoT applications.
Detecting Malaria Cells with Plasmo-D Expert System Developed on Android and Computer Vision Atojunere, Eganoosi; Onaneye, Temilola. Adewunmi
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39626

Abstract

Separation between infected and uninfected cells during diagnosing malaria parasites plasmodium is difficult, time-consuming, and expensive. However, this article presented a report on a developed expert system called Plasmodium Detector(Plasmo-D), capable of differentiating plasmodium-infected and uninfected cells from malaria-infected patients. Plasmo-D was built on an Android application, with an information menu, splash, and classification screen, including an image recognition system that worked with computer vision. 27,528 cell images were collected online from the Data Library of the United States National Library of Medicine, containing infected and uninfected cells for training. No cell images were used as control. Plasmo-D fabrication and testing were conducted at the Instrumentation Laboratory, Department of Systems Engineering, University of Lagos, Nigeria. Studied parameters included cell images, backgrounds, visual style, size, type, lighting, and camera angle. Trained models were exported into an Android application through Java programming language and user interface through Android XML (Extensible Markup Language). Trained data results indicated that 99.8% desired level of accuracy was obtained after cell images were fed into the computer vision application programming interface. The trend was that Plasmo-D efficiency was higher for infected image cells, average for uninfected image cells and the least for no cell photo.
Rethinking Intelligence: From Human Cognition to Artificial Futures Hamam, Habib
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.44232

Abstract

The rapid advancement of AI technologies raises pressing questions about the nature and future direction of intelligence. A key challenge is to understand how human and artificial intelligences differ, not just in form but in function, and how they should be evaluated in a shared context. This paper proposes a structured framework based on 15 measurable conditions of intelligence, such as memory, adaptability, specialization, and ethical alignment. Our main contribution lies in connecting these conditions to nine key directions of AI development—such as responsible AI, human–machine collaboration, and quantum AI—to outline how intelligence can be evaluated and guided across both natural and synthetic domains. Methodologically, we cross-analyze these dimensions using a 15×9 matrix, providing both a diagnostic tool and a conceptual roadmap for future AI development. This approach blends insights from cognitive science, applied AI, ethics, and philosophy. Our findings show that intelligence must be judged not just by computational capability but by interpretability, ethical grounding, and social utility. Contextual and hybrid systems—those that adapt to environments and align with human values—emerge as the most promising. We conclude by calling for an interdisciplinary approach to build intelligence systems that are not only powerful but also trustworthy and socially meaningful.