Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohd Noor Abdullah is active.

Publication


Featured researches published by Mohd Noor Abdullah.


international conference on intelligent systems, modelling and simulation | 2012

Comparative Study on Distributed Generator Sizing Using Three Types of Particle Swarm Optimization

Jasrul Jamani Jamian; Mohd Wazir Mustafa; Hazlie Mokhlis; Mohd Noor Abdullah

Total power losses in a distribution network can be minimized by installing Distributed Generator (DG) with correct size. In line with this objective, most of the researchers have used multiple types of optimization technique to regulate the DGs output to compute its optimal size. In this paper, a comparative studies of a new proposed Rank Evolutionary Particle Swarm Optimization (REPSO) method with Evolutionary Particle Swarm Optimization (EPSO) and Traditional Particle Swarm Optimization (PSO) is conducted. Both REPSO and EPSO are using the concept of Evolutionary Programming (EP) in Particle Swarm Optimization (PSO) process. The implementation of EP in PSO allows the entire particles to move toward the optimal value faster. A test on determining optimum size of DGs in 69 bus radial distribution system reveals the superiority of REPSO over PSO and EPSO.


Journal of Applied Mathematics | 2014

Global Particle Swarm Optimization for High Dimension Numerical Functions Analysis

Jasrul Jamani Jamian; Mohd Noor Abdullah; Hazlie Mokhlis; Mohd Wazir Mustafa; Abd Halim Abu Bakar

The Particle Swarm Optimization (PSO) Algorithm is a popular optimization method that is widely used in various applications, due to its simplicity and capability in obtaining optimal results. However, ordinary PSOs may be trapped in the local optimal point, especially in high dimensional problems. To overcome this problem, an efficient Global Particle Swarm Optimization (GPSO) algorithm is proposed in this paper, based on a new updated strategy of the particle position. This is done through sharing information of particle position between the dimensions (variables) at any iteration. The strategy can enhance the exploration capability of the GPSO algorithm to determine the optimum global solution and avoid traps at the local optimum. The proposed GPSO algorithm is validated on a 12-benchmark mathematical function and compared with three different types of PSO techniques. The performance of this algorithm is measured based on the solutions’ quality, convergence characteristics, and their robustness after 50 trials. The simulation results showed that the new updated strategy in GPSO assists in realizing a better optimum solution with the smallest standard deviation value compared to other techniques. It can be concluded that the proposed GPSO method is a superior technique for solving high dimensional numerical function optimization problems.


international universities power engineering conference | 2012

Economic dispatch with valve point effect using iteration particle swarm optimization

Mohd Noor Abdullah; Ab Halim Abu Bakar; N.A. Rahim; Jasrul Jamani Jamian; M.M. Aman

Economic dispatch (ED) is one of the optimization problems in power system operation and planning. The practical ED problems have non-smooth cost functions with equality and inequality constraints. It becomes more complicated problem when valve point effects of generator are considered and results multiple local minima. This makes the ED problems are difficult to find global optimum solution when using any mathematical approach due to non-convex cost function. The Classical particle swarm optimization (PSO) has ability to reach near global optimum solution by tuning some parameters but always stuck at local minima. In this paper, an iteration particle swarm optimization (IPSO) is proposed to solve ED problems with valve point effects. The proposed algorithm is introduced a new parameter in the original velocity equation of PSO in order to enrich searching behaviour, solution quality and avoid being trapped at local minima. The proposed IPSO algorithm has been implemented on two test power systems (consisting 3 and 13 generating units) to validate its effectiveness. The simulation results confirmed that IPSO algorithm has better convergence characteristic and more robust compared to PSO and some published results.


international universities power engineering conference | 2012

Optimum multi DG units placement and sizing based on voltage stability index and PSO

Jasrul Jamani Jamian; M.M. Aman; Mohd Wazir Mustafa; G.B. Jasmon; Hazlie Mokhlis; Ab Halim Abu Bakar; Mohd Noor Abdullah

Optimum DG placement and sizing is one of the current topics in restructured power system. Most of the authors have worked out on their optimum placement base on the power losses reduction concept. However, the improvement on power losses value in the network will not guarantee to the planner to have lower voltage stability index (VSI) for the system. This paper proposes a new approached for multi DG placement and sizing for distribution systems which is based on a voltage stability index. The most optimum DG size will be found out using several types of PSO optimization algorithm. The output results will also compared with EPSO, REPSO, and IPSO. The proposed algorithm is tested on 12-bus, modified 12-bus and 69-bus radial distribution networks.


Journal of Electrical Engineering & Technology | 2014

Power Losses Reduction via Simultaneous Optimal Distributed Generation Output and Reconfiguration using ABC Optimization

Jasrul Jamani Jamian; Wardiah Mohd Dahalan; Hazlie Mokhlis; Mohd Wazir Mustafa; Zi Jie Lim; Mohd Noor Abdullah

Optimal Distributed Generation (DG) output and reconfiguration are among the well accepted approach to reduce power loss in a distribution network. In the past, most of the researchers employed optimal DG output and reconfiguration separately. In this work, a simultaneous DG output and reconfiguration analysis is proposed to maximize power loss reduction. The impact of the separated analysis and simultaneous analysis are investigated. The test result on the 33 bus distribution network with 3 units of DG operated in PV mode showed the simultaneous analysis gave the lowest power loss (global optimal) and faster results compared to other combined methods. All the analyses for optimizing the DG as well as reconfiguration are used the Artificial Bee Colony Optimization technique.


ieee international power engineering and optimization conference | 2012

Modeling and simulation of digital negative sequence relay for unbalanced protection of generator

M.M. Aman; G.B. Jasmon; Qadeer Ahmed Khan; Ab Halim Abu Bakar; Mohd Noor Abdullah

Modeling tools are useful for educational and industrial use. Such tools help the new engineers to simulate the power system under normal and faulty conditions. This paper presents the design and various data conversion steps of a digital negative sequence relay. The digital relay has a superiority over electromechanical relay in terms of accuracy and speed. The detection of negative sequence current and appropriate action is useful for protection of power system components. The operation of relay should be fast and reliable for minimum outage of power system in case of abnormality or electrical fault. In this paper, the relay performance under different system dynamics is also visualized on MATLAB / SIMULINK® considering a 400V power system.


Applied Mechanics and Materials | 2015

An efficient constraint handling approach for economic load dispatch problem with non-smooth cost function

Mohd Noor Abdullah; A.H.A. Bakar; Hazlie Mokhlis; Jasrul Jamani Jamian

Increasing of the power demand and fuel cost in power generation required an advanced algorithm for scheduling the output of generating unit in economical manner. The economic load dispatch problem (ELD) problem consists several operational and system constraints such as prohibited operating zones (POZs) and ramp-rate limit that need to handle wisely by optimization algorithm. Previously, the penalty function is widely used to satisfy the power balance and other constraints by augmenting the objective function with the penalized function. However, it required a proper penalty factor tuning and depends on the size of problem. This paper proposes an efficient constraint handling based on the repairing or adjusting infeasible solution into feasible solution in every iterative process. The simulation results show that the proposed constraints handling approach is better than penalty function approach in term of convergence characteristic and robustness.


Indonesian Journal of Electrical Engineering and Computer Science | 2018

Gbest Artificial Bee Colony for Non-convex Optimal Economic Dispatch in Power Generation

Mohd Noor Abdullah; A. F. A. Manan; Jasrul Jamani Jamian; Siti Amely Jumaat; Nur Hanis Radzi

Received Dec 04, 2017 Revised Jan 11, 2018 Accepted Apr 15, 2018 Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.A Weblogs contains the history of User Navigation Pattern while user accessing the websites. The user navigation pattern can be analyzed based on the previous user navigation that is stored in weblog. The weblog comprises of various entries like IP address, status code and number of bytes transferred, categories and time stamp. The user interest can be classified based on categories and attributes and it is helpful in identifying user behavior. The aim of the research is to identifying the interested user behavior and not interested user behavior based on classification. The process of identifying user interest, it consists of Modified Span Algorithm and Personalization Algorithm based on the classification algorithm user prediction can be analyzed. The research work explores to analyze user prediction behavior based on user personalization that is captured from weblogs.Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.


Indonesian Journal of Electrical Engineering and Computer Science | 2018

Feasibility Study of Grid-Connected Solar Photovoltaic (PV) System for Primary School in Johor

Siti Amely Jumaat; Adhwa Amsyar Syazwan Ab Majid; Chin Kim Gan; Mohd Noor Abdullah; Nur Hanis Radzi; Rohaiza Hamdan; Suriana Salimin

Received Dec 04, 2017 Revised Jan 11, 2018 Accepted Apr 15, 2018 Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.A Weblogs contains the history of User Navigation Pattern while user accessing the websites. The user navigation pattern can be analyzed based on the previous user navigation that is stored in weblog. The weblog comprises of various entries like IP address, status code and number of bytes transferred, categories and time stamp. The user interest can be classified based on categories and attributes and it is helpful in identifying user behavior. The aim of the research is to identifying the interested user behavior and not interested user behavior based on classification. The process of identifying user interest, it consists of Modified Span Algorithm and Personalization Algorithm based on the classification algorithm user prediction can be analyzed. The research work explores to analyze user prediction behavior based on user personalization that is captured from weblogs.Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.


Indonesian Journal of Electrical Engineering and Computer Science | 2018

Intelligent Lighting Control System for Energy Savings in Office Building

Khairul Rijal Wagiman; Mohd Noor Abdullah

Received Dec 04, 2017 Revised Jan 11, 2018 Accepted Apr 15, 2018 Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.A Weblogs contains the history of User Navigation Pattern while user accessing the websites. The user navigation pattern can be analyzed based on the previous user navigation that is stored in weblog. The weblog comprises of various entries like IP address, status code and number of bytes transferred, categories and time stamp. The user interest can be classified based on categories and attributes and it is helpful in identifying user behavior. The aim of the research is to identifying the interested user behavior and not interested user behavior based on classification. The process of identifying user interest, it consists of Modified Span Algorithm and Personalization Algorithm based on the classification algorithm user prediction can be analyzed. The research work explores to analyze user prediction behavior based on user personalization that is captured from weblogs.Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.

Collaboration


Dive into the Mohd Noor Abdullah's collaboration.

Top Co-Authors

Avatar

Jasrul Jamani Jamian

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nur Hanis Radzi

Universiti Tun Hussein Onn Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohd Wazir Mustafa

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Siti Amely Jumaat

Universiti Tun Hussein Onn Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rohaiza Hamdan

Universiti Tun Hussein Onn Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge