Articles
Optimal SVC allocation via symbiotic organisms search for voltage security improvement
Mohamad Khairuzzaman Mohamad Zamani;
Ismail Musirin;
Sharifah Azma Syed Mustaffa;
Saiful Izwan Suliman
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i3.9905
It is desirable that a power system operation is in a normal operating condition. However, the increase of load demand in a power system has forced the system to operate near to its stability limit whereby an increase in load poses a threat to the power system security. In solving this issue, optimal reactive power support via SVC allocation in a power system has been proposed. In this paper, Symbiotic Organisms Search (SOS) algorithm is implemented to solve for optimal allocation of SVC in the power system. IEEE 26 Bus Reliability Test System is used as the test system. Comparative studies are also conducted concerning Particle Swarm Optimization (PSO) and Evolutionary Programming (EP) techniques based on several case studies. Based on the result, SOS has proven its superiority by producing higher quality solutions compared to PSO and EP. The results of this study can benefit the power system operators in planning for optimal power system operations.
Digitizing food experience: Food taste perception on digital image and true form using hashtags
Afdallyna Fathiyah Harun;
Norhafiza Ruslan;
Wan Adilah Wan Adnan;
Saiful Izwan Suliman;
Juhaida Ismail;
Hanif Baharin
Bulletin of Electrical Engineering and Informatics Vol 9, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (550.133 KB)
|
DOI: 10.11591/eei.v9i5.2252
Food experience is now omnipresent with the increased use of social media such as Instagram. Users often share food images or video which is often accompanied with #hashtags. Readers of the post are required to tap into their visual cognition and perception of what it represents. Little exploration has been done to understand if image can simulate food taste and how similar is the perception after user tasted the food. We were motivated to understand the difference of food taste perception on digital image and its true form by studying user hashtags. We applied the case study approach where we focused on a Malaysian dessert to compare user perception of the cakes’ dimension which are appearance, flavour, texture and hedonic. Using Instagram, users were requested to create hashtags that depict their taste perception of the cakes before and after tasting the cake. The hashtags were then analysed using content analysis where we found that the perception on digital image and true form had a degree of difference where many of the initial perception were inaccurate. This implies that visual images may not be able to facilitate accurate food taste perception and would need further technology interactivity to achieve the objective.
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote monitoring
Amirun Murtaza Abd Jalil;
Roslina Mohamad;
Nuzli Mohamad Anas;
Murizah Kassim;
Saiful Izwan Suliman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2669
In this paper, an implementation of vehicle ventilation system using microcontroller NodeMCU is described, as an internet of things (IoT) platform. A low-cost wireless fidelity (Wi-Fi) microchip ESP8266 integrated with NodeMCU provides full-stack transmission control protocol/internet protocol (TCP/IP) to communicate between mobile applications. This chip is capable to monitor and control sensor devices connected to the IoT platform. In this reserach, data was collected from a temperature sensor integrated to the platform, which then monitored using Blynk application. The vehicle ventilation system was activated/deactivated through mobile application and controlled using ON/OFF commands sent to the connected devices. From the results, the vehicle ventilation system built using NodeMCU microcontroller is capable to provide near real-time data monitoring for temperature in the car before and after the ventilation system was applied.
Multi cases optimal reactive power dispatch using evolutionary programming
Rahmatul Hidayah Salimin;
Ismail Musirin;
Zulkiffli Abdul Hamid;
Afdallyna Fathiyah Harun;
Saiful Izwan Suliman;
Hadi Suyono;
Rini Hasanah
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i2.pp662-670
Evolutionary Programming (EP) is one of many types in Evolutionary Computation (EC) that used for optimization process. EP technique is used to find the optimal reactive power dispatch (ORPD) since it is one of the accessible options schemes that can be used on the system as a reactive power support. Sometimes, it is not necessary to operate all generators in order to perform ORPD to in achieve the objectives. Also, increment of reactive power load to the system will cause voltage decomposes with the increase in transmission loss in the system. Therefore, the proposed method decides the best grouping of generators that should be operated in system by bearing in mind the transmission loss reduction. ORPD will be used to minimize the transmission loss as well the increasing reactive power loading. This method conducted on IEEE 30-bus Test System with multi cases scenario. The best combination of operating generators determined and the transmission loss after optimization is smaller compared to the transmission loss before optimization resulted.
Genetic algorithm for intrusion detection system in computer network
Hamizan Suhaimi;
Saiful Izwan Suliman;
Afdallyna Fathiyah Harun;
Roslina Mohamad;
Yuslinda Wati Mohamad Yusof;
Murizah Kassim c
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i3.pp1670-1676
Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands. In network intrusion detection system (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of genetic algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems.
Chaos Embedded Symbiotic Organisms Search Technique for Optimal FACTS Device Allocation for Voltage Profile and Security Improvement
Mohamad Khairuzzaman Mohamad Zamani;
Ismail Musirin;
Saiful Izwan Suliman;
Tarek Bouktir
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 1: October 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v8.i1.pp146-153
Due to the ever-increasing energy demand, power system operators have attempted to cope with these demands while keeping the power system remain operable. Economic constraints have forced the power system operator to abandon their effort in expanding the power system. The increased load demand can cause the power system to suffer from voltage instability and voltage collapse, especially during contingency condition. Hence, a strategy is required to maintain the steady state operation of a power system. Various research has been conducted to tackle this problem. Therefore, this paper presents the implementation of Chaos Embedded Symbiotic Organisms Search technique to solve optimal FACTS device allocation problem in power transmission system. Various practical constraints are also considered in the optimisation process to emulate the real-life constraints in power system. The optimisation process is conducted on a 26-bus IEEE RTS has validated that the results obtained has not violated the power system stability. The results provided by the proposed optimisation technique has successfully improved the voltage profile and voltage security in the system. Comparative studies are also conducted involving Particle Swarm Optimization and Evolutionary Programming technique resulting good results agreement and superiority of the proposed technique. Results obtained from this study would be beneficial to the power system operators regarding optimisation in power system operation for the implementation in real power transmission network.
Network intrusion detection system by using genetic algorithm
Hamizan Suhaimi;
Saiful Izwan Suliman;
Ismail Musirin;
Afdallyna Fathiyah Harun;
Roslina Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i3.pp1593-1599
Developing a better intrusion detection systems (IDS) has attracted many researchers in the area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is proposed as a tool that capable to identify harmful type of connections in a computer network. Different features of connection data such as duration and types of connection in network were analyzed to generate a set of classification rule. For this project, standard benchmark dataset known as KDD Cup 99 was investigated and utilized to study the effectiveness of the proposed method on this problem domain. The rules comprise of eight variables that were simulated during the training process to detect any malicious connection that can lead to a network intrusion. With good performance in detecting bad connections, this method can be applied in intrusion detection system to identify attack thus improving the security features of a computer network.
Fault disturbances classification analysis using adaptive neuro-fuzzy inferences system
Shahrani Shahbudin;
Murizah Kassim;
Roslina Mohamad;
Saiful Izwan Suliman;
Yuslinda Wati Mohamad Yusof
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i3.pp1196-1202
This paper affords the use of neuro-fuzzy technique called the Adaptive Network–based Fuzzy Inference System (ANFIS) to highlight its ability to perform fault disturbances classification tasks using extracted features based on S-transforms methods. The ANFIS model with a five-layered architecture was trained using extracted features to classify signal data comprising various faults disturbances, namely, voltage sag, swell, impulsive, interruption, notch, and pure signal. Results obtained showed that the ANFIS model is very suitable and can generate excellent classification results provided that the right type and number of Membership Functions (MFs) are used in the classification task.
Requirements engineering for User-Centered school food ordering system
Diyana Binti Halim Khoo;
Afdallyna Fathiyah Harun;
Saiful Izwan Suliman
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 1: January 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i1.pp357-364
Understanding user requirement for a technology design is central to user experience. A user-centered technology design should consider user needs and constraints as well as abide to the principles of HCI design heuristics. This paper describes the requirements gathering for Kantin Online System, a school food ordering system where we considered the needs and constraints of different stakeholders involved and elicit a compromise where the needs of all parties can be met. We then applied usability heuristics into the system design to facilitate perceived ease of use and perceived usefulness. We conclude this paper with experts’ evaluations towards the heuristic elements of the system design concept and possible future work.
Active and Reactive Power Scheduling Optimization using Firefly Algorithm to Improve Voltage Stability under Load Demand Variation
Mohamad Khairuzzaman Mohamad Zamani;
Ismail Musirin;
Halim Hassan;
Sharifah Azwa Shaaya;
Shahril Irwan Sulaiman;
Nor Azura Md. Ghani;
Saiful Izwan Suliman
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i2.pp365-372
This paper presents active and reactive power scheduling using firefly algorithm (FA) to improve voltage stability under load demand variation. The study involves the development of firefly optimization engine for power scheduling process involving the active and reactive power for wind generator. The scheduling optimization of wind generator is tested by using IEEE 30-Bus Reliability Test System (RTS). Voltage stability of the system is assessed based in a pre-developed voltage stability indicator termed as fast voltage stability index (FVSI). This study also considers the effects on the loss and voltage profile of the system resulted from the optimization, where the FVSI value at the observed line, minimum voltage of the system and loss were monitored during the load increment. Results obtained from the study are convincing in addressing the scheduling of power in wind generator. Implementation of FA approach to solve power scheduling revealed its flexibility and feasible for solving larger system within different objective functions.This paper presents active and reactive power scheduling using firefly algorithm (FA) to improve voltage stability under load demand variation. The study involves the development of firefly optimization engine for power scheduling process involving the active and reactive power for wind generator. The scheduling optimization of wind generator is tested by using IEEE 30-Bus Reliability Test System (RTS). Voltage stability of the system is assessed based in a pre-developed voltage stability indicator termed as fast voltage stability index (FVSI). This study also considers the effects on the loss and voltage profile of the system resulted from the optimization, where the FVSI value at the observed line, minimum voltage of the system and loss were monitored during the load increment. Results obtained from the study are convincing in addressing the scheduling of power in wind generator. Implementation of FA approach to solve power scheduling revealed its flexibility and feasible for solving larger system within different objective functions.