Mohd Noor Abdullah
Universiti Tun Hussein Onn Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mohd Noor Abdullah.
international conference on intelligent systems, modelling and simulation | 2012
Jasrul Jamani Jamian; Mohd Wazir Mustafa; Hazlie Mokhlis; Mohd Noor Abdullah
Total power losses in a distribution network can be minimized by installing Distributed Generator (DG) with correct size. In line with this objective, most of the researchers have used multiple types of optimization technique to regulate the DGs output to compute its optimal size. In this paper, a comparative studies of a new proposed Rank Evolutionary Particle Swarm Optimization (REPSO) method with Evolutionary Particle Swarm Optimization (EPSO) and Traditional Particle Swarm Optimization (PSO) is conducted. Both REPSO and EPSO are using the concept of Evolutionary Programming (EP) in Particle Swarm Optimization (PSO) process. The implementation of EP in PSO allows the entire particles to move toward the optimal value faster. A test on determining optimum size of DGs in 69 bus radial distribution system reveals the superiority of REPSO over PSO and EPSO.
Journal of Applied Mathematics | 2014
Jasrul Jamani Jamian; Mohd Noor Abdullah; Hazlie Mokhlis; Mohd Wazir Mustafa; Abd Halim Abu Bakar
The Particle Swarm Optimization (PSO) Algorithm is a popular optimization method that is widely used in various applications, due to its simplicity and capability in obtaining optimal results. However, ordinary PSOs may be trapped in the local optimal point, especially in high dimensional problems. To overcome this problem, an efficient Global Particle Swarm Optimization (GPSO) algorithm is proposed in this paper, based on a new updated strategy of the particle position. This is done through sharing information of particle position between the dimensions (variables) at any iteration. The strategy can enhance the exploration capability of the GPSO algorithm to determine the optimum global solution and avoid traps at the local optimum. The proposed GPSO algorithm is validated on a 12-benchmark mathematical function and compared with three different types of PSO techniques. The performance of this algorithm is measured based on the solutions’ quality, convergence characteristics, and their robustness after 50 trials. The simulation results showed that the new updated strategy in GPSO assists in realizing a better optimum solution with the smallest standard deviation value compared to other techniques. It can be concluded that the proposed GPSO method is a superior technique for solving high dimensional numerical function optimization problems.
international universities power engineering conference | 2012
Mohd Noor Abdullah; Ab Halim Abu Bakar; N.A. Rahim; Jasrul Jamani Jamian; M.M. Aman
Economic dispatch (ED) is one of the optimization problems in power system operation and planning. The practical ED problems have non-smooth cost functions with equality and inequality constraints. It becomes more complicated problem when valve point effects of generator are considered and results multiple local minima. This makes the ED problems are difficult to find global optimum solution when using any mathematical approach due to non-convex cost function. The Classical particle swarm optimization (PSO) has ability to reach near global optimum solution by tuning some parameters but always stuck at local minima. In this paper, an iteration particle swarm optimization (IPSO) is proposed to solve ED problems with valve point effects. The proposed algorithm is introduced a new parameter in the original velocity equation of PSO in order to enrich searching behaviour, solution quality and avoid being trapped at local minima. The proposed IPSO algorithm has been implemented on two test power systems (consisting 3 and 13 generating units) to validate its effectiveness. The simulation results confirmed that IPSO algorithm has better convergence characteristic and more robust compared to PSO and some published results.
international universities power engineering conference | 2012
Jasrul Jamani Jamian; M.M. Aman; Mohd Wazir Mustafa; G.B. Jasmon; Hazlie Mokhlis; Ab Halim Abu Bakar; Mohd Noor Abdullah
Optimum DG placement and sizing is one of the current topics in restructured power system. Most of the authors have worked out on their optimum placement base on the power losses reduction concept. However, the improvement on power losses value in the network will not guarantee to the planner to have lower voltage stability index (VSI) for the system. This paper proposes a new approached for multi DG placement and sizing for distribution systems which is based on a voltage stability index. The most optimum DG size will be found out using several types of PSO optimization algorithm. The output results will also compared with EPSO, REPSO, and IPSO. The proposed algorithm is tested on 12-bus, modified 12-bus and 69-bus radial distribution networks.
Journal of Electrical Engineering & Technology | 2014
Jasrul Jamani Jamian; Wardiah Mohd Dahalan; Hazlie Mokhlis; Mohd Wazir Mustafa; Zi Jie Lim; Mohd Noor Abdullah
Optimal Distributed Generation (DG) output and reconfiguration are among the well accepted approach to reduce power loss in a distribution network. In the past, most of the researchers employed optimal DG output and reconfiguration separately. In this work, a simultaneous DG output and reconfiguration analysis is proposed to maximize power loss reduction. The impact of the separated analysis and simultaneous analysis are investigated. The test result on the 33 bus distribution network with 3 units of DG operated in PV mode showed the simultaneous analysis gave the lowest power loss (global optimal) and faster results compared to other combined methods. All the analyses for optimizing the DG as well as reconfiguration are used the Artificial Bee Colony Optimization technique.
ieee international power engineering and optimization conference | 2012
M.M. Aman; G.B. Jasmon; Qadeer Ahmed Khan; Ab Halim Abu Bakar; Mohd Noor Abdullah
Modeling tools are useful for educational and industrial use. Such tools help the new engineers to simulate the power system under normal and faulty conditions. This paper presents the design and various data conversion steps of a digital negative sequence relay. The digital relay has a superiority over electromechanical relay in terms of accuracy and speed. The detection of negative sequence current and appropriate action is useful for protection of power system components. The operation of relay should be fast and reliable for minimum outage of power system in case of abnormality or electrical fault. In this paper, the relay performance under different system dynamics is also visualized on MATLAB / SIMULINK® considering a 400V power system.
Applied Mechanics and Materials | 2015
Mohd Noor Abdullah; A.H.A. Bakar; Hazlie Mokhlis; Jasrul Jamani Jamian
Increasing of the power demand and fuel cost in power generation required an advanced algorithm for scheduling the output of generating unit in economical manner. The economic load dispatch problem (ELD) problem consists several operational and system constraints such as prohibited operating zones (POZs) and ramp-rate limit that need to handle wisely by optimization algorithm. Previously, the penalty function is widely used to satisfy the power balance and other constraints by augmenting the objective function with the penalized function. However, it required a proper penalty factor tuning and depends on the size of problem. This paper proposes an efficient constraint handling based on the repairing or adjusting infeasible solution into feasible solution in every iterative process. The simulation results show that the proposed constraints handling approach is better than penalty function approach in term of convergence characteristic and robustness.
Indonesian Journal of Electrical Engineering and Computer Science | 2018
Mohd Noor Abdullah; A. F. A. Manan; Jasrul Jamani Jamian; Siti Amely Jumaat; Nur Hanis Radzi
Received Dec 04, 2017 Revised Jan 11, 2018 Accepted Apr 15, 2018 Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.A Weblogs contains the history of User Navigation Pattern while user accessing the websites. The user navigation pattern can be analyzed based on the previous user navigation that is stored in weblog. The weblog comprises of various entries like IP address, status code and number of bytes transferred, categories and time stamp. The user interest can be classified based on categories and attributes and it is helpful in identifying user behavior. The aim of the research is to identifying the interested user behavior and not interested user behavior based on classification. The process of identifying user interest, it consists of Modified Span Algorithm and Personalization Algorithm based on the classification algorithm user prediction can be analyzed. The research work explores to analyze user prediction behavior based on user personalization that is captured from weblogs.Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.
Indonesian Journal of Electrical Engineering and Computer Science | 2018
Siti Amely Jumaat; Adhwa Amsyar Syazwan Ab Majid; Chin Kim Gan; Mohd Noor Abdullah; Nur Hanis Radzi; Rohaiza Hamdan; Suriana Salimin
Received Dec 04, 2017 Revised Jan 11, 2018 Accepted Apr 15, 2018 Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.A Weblogs contains the history of User Navigation Pattern while user accessing the websites. The user navigation pattern can be analyzed based on the previous user navigation that is stored in weblog. The weblog comprises of various entries like IP address, status code and number of bytes transferred, categories and time stamp. The user interest can be classified based on categories and attributes and it is helpful in identifying user behavior. The aim of the research is to identifying the interested user behavior and not interested user behavior based on classification. The process of identifying user interest, it consists of Modified Span Algorithm and Personalization Algorithm based on the classification algorithm user prediction can be analyzed. The research work explores to analyze user prediction behavior based on user personalization that is captured from weblogs.Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.
Indonesian Journal of Electrical Engineering and Computer Science | 2018
Khairul Rijal Wagiman; Mohd Noor Abdullah
Received Dec 04, 2017 Revised Jan 11, 2018 Accepted Apr 15, 2018 Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.A Weblogs contains the history of User Navigation Pattern while user accessing the websites. The user navigation pattern can be analyzed based on the previous user navigation that is stored in weblog. The weblog comprises of various entries like IP address, status code and number of bytes transferred, categories and time stamp. The user interest can be classified based on categories and attributes and it is helpful in identifying user behavior. The aim of the research is to identifying the interested user behavior and not interested user behavior based on classification. The process of identifying user interest, it consists of Modified Span Algorithm and Personalization Algorithm based on the classification algorithm user prediction can be analyzed. The research work explores to analyze user prediction behavior based on user personalization that is captured from weblogs.Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.