Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
C
om
put
er
En
gin
eeri
ng
(IJ
E
C
E)
Vo
l.
10
,
No.
4
,
A
ugus
t
2020
,
pp.
3978
~
39
87
IS
S
N:
20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v
10
i
4
.
pp
3978
-
39
87
3978
Journ
al h
om
e
page
:
http:
//
ij
ece.i
aesc
or
e.c
om/i
nd
ex
.ph
p/IJ
ECE
Advanced
energy
manag
em
ent sys
tem with
the inco
rporatio
n
of
n
ovel se
curity
featur
es
Raheel
Muz
z
a
mmel
,
R
ab
i
a Arsh
ad
,
S
aba
Mehm
ood
,
D
ani
sta Kh
an
Depa
rtment
o
f
E
le
c
tri
c
al E
ngin
eering,
Univ
ersity
of
La
hor
e, Paki
s
ta
n
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
N
ov
14
, 201
9
Re
vised
Ma
r 5
,
2020
Accepte
d
Ma
r
16
, 202
0
Now
aday
s,
energ
y
m
ana
geme
nt
is
a
subjec
t
of
gre
at
importance
an
d
complexi
t
y
.
Pak
ista
n,
bei
ng
in
a
stat
e
of
deve
lopi
ng
count
r
y,
gene
ra
tes
el
e
ct
ri
ca
l
powe
r
m
ai
nl
y
b
y
using
non
-
ren
e
wable
source
s
of
ene
rg
y
.
Non
-
ren
ewa
ble
ent
ities
are
foss
i
l
fue
ls
such
as
furn
ac
e
oi
l,
n
at
ur
al
gas,
co
al,
and
nuclea
r
pow
er.
Pakist
an
has
bee
n
fa
ci
ng
a
se
ver
e
shortag
e
of
produc
ti
on
in
en
erg
y
se
ct
or
for
la
st
two
d
ec
a
des.
Th
is
shortfa
ll
is
aff
e
cting
th
e
industr
i
a
l
deve
lopment
as
well
as
ec
ono
m
ic
growth.
W
i
th
the
growing
popula
t
ion,
the
loa
d
d
emand
is
rap
idly
inc
r
ea
sing
and
th
ere
m
ust
be
a
nee
d
to
expa
n
d
the
exi
st
ing
on
es
or
to
buil
d
new
power
sy
stems
.
In
thi
s
pape
r,
an
aut
onom
ous
m
a
nage
m
ent
s
y
ste
m
has
bee
n
proposed
to
enha
nce
quali
t
y
,
rel
i
abi
l
ity
and
c
onfide
nc
e
of
u
tilizati
on
of
en
e
r
g
y
b
et
we
en
end
consum
ers
and
supplie
rs
.
Such
objecti
v
es
c
an
onl
y
b
e
fulf
i
ll
ed
b
y
m
ak
ing
the
power
suppl
y
sec
ur
e
fo
r
end
consum
ers.
Distributed
and
ce
ntr
al
i
ze
d
c
ont
rol
s
y
stems
are
invo
lve
d
for
m
ai
nta
in
ing
a
b
al
an
ce
b
et
wee
n
ren
ewa
bl
e
en
erg
y
r
esourc
es
and
ba
se
powe
r,
so
th
at
end
consum
ers
demand
c
an
b
e
fu
l
fil
le
d
when
req
uire
d
.
A
rel
i
a
ble
Two
-
wa
y
co
m
m
unic
at
ion
s
y
stem
bet
wee
n
supplie
rs
and
end
consum
ers
has
bee
n
propose
d
b
y
using
Mess
age
Digest
a
lgor
it
hm
which
ensure
s
tha
t
the
r
e
would
be
no
e
ner
g
y
the
f
t.
Sim
ula
ti
ons
h
ave
b
e
en
done
in
MA
TL
AB/
Sim
u
li
nk
envi
ronm
en
t
and
result
s
ha
ve
bee
n
pre
sen
t
ed
to
show
the
eff
e
ct
iv
ene
ss
of
proposed
m
odel
.
Ke
yw
or
d
s
:
Energy m
anage
m
ent syst
e
m
Energy the
ft
de
te
ct
ion
Me
ssage digest
-
5 al
gorithm
Re
du
ct
io
n of C
O
2
em
issi
on
Re
new
a
ble e
ne
rg
y s
ources
Copyright
©
202
0
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Ra
heel Muzza
m
m
e
l,
Dep
a
rtm
ent o
f El
ect
rical
En
gi
neer
i
ng,
Un
i
ver
sit
y o
f La
hore,
Pa
kistan
.
Em
a
il
: rah
eel
.m
uzza
m
m
el
@
ee.u
ol.edu.
pk
1.
INTROD
U
CTION
Role
of
el
ect
rical
power
is
a
n
esse
ntial
part
towards
e
nha
nced
i
ndus
t
rial
gro
wth
a
nd
t
o
raise
li
ving
sta
nd
a
rd
of
ge
ner
al
public.
A
ccordin
g
t
o
wa
te
r
an
d
powe
r
dev
el
op
m
ent
a
uthority
(
WAP
DA),
go
vernm
ent
has
to
sp
e
nd
a
bout
bill
ion
s
of
U
S
doll
ars
p
er
ye
ar
to
im
po
rt
oil
to
m
eet
req
ui
rem
ents
of
an
el
ect
rici
ty
su
pply
com
pan
ie
s
in
Pakistan
.
E
nergy
crises
need
a
prom
pt
act
ion
an
d
it
s
hould
be
a
ddresse
d
within
ne
xt
de
cades.
T
o
d
o
t
h
i
s
,
o
n
e
m
u
s
t
s
w
i
t
c
h
t
o
w
a
r
d
s
r
e
n
e
w
a
b
l
e
e
n
e
r
g
y
s
o
u
r
c
e
s
a
n
d
t
o
m
i
n
i
m
i
z
e
u
s
a
g
e
o
f
n
o
n
-
r
e
n
e
w
a
b
l
e
s
o
u
r
c
e
s
.
A
lot
of
resea
rch
has
bee
n
cond
ucted
t
o
i
ncr
ease
pract
ic
al
i
m
pact
of
ren
e
wa
ble
ene
rg
y
s
ource
s
.
W
i
nd
ene
rg
y
conve
rsion
sys
tem
(W
ECS
)
i
s
dev
el
op
e
d
in
op
ti
m
al
po
we
r
flo
w
(
OP
F
)
m
od
el
[1
]
.
W
e
ibu
ll
distrib
ution
is
util
iz
ed
to
determ
in
e
op
ti
m
al
wind
sp
e
ed
f
or
ge
ne
ra
ti
on
an
d
distr
ibu
ti
on
of
p
ower
i
n
a
stochastic
wa
y
[2
-
4].
For
stori
ng
e
xcess
e
nergy,
a
batte
r
y
is
add
ed
w
hi
ch
can
be
retri
eved
at
night
or
when
su
nli
gh
t i
s
obst
ru
ct
e
d.
For
batte
ry pro
te
ct
io
n from
o
ver
c
hargin
g,
a
ch
a
r
ge c
on
t
ro
ll
er is
u
s
ed [5].
W
it
h
intr
oduct
ion
of
re
new
a
bl
e
energy
te
ch
no
l
og
y
at
c
ons
um
er
end
,
ge
ogra
phy
of
po
w
er
syst
em
i
s
total
ly
change
d.
C
onsu
m
ers
hav
e
abili
ty
to p
r
oduce
ene
rgy
for
util
iz
at
ion
.
C
oncept o
f
two
-
way flo
w
of
po
wer
is
m
at
ur
ed.
T
h
e
r
e
f
o
r
e
,
t
h
e
r
e
i
s
a
n
i
m
m
e
d
i
a
t
e
n
e
e
d
t
o
d
e
v
i
s
e
i
m
p
r
o
v
e
m
e
n
t
s
i
n
e
n
e
r
g
y
m
a
n
a
g
e
m
e
n
t
s
y
s
t
e
m
(
E
M
S
)
.
A
highly
secure
d
an
d
ena
bled
com
m
un
ic
ation
betwee
n
en
d
consum
er
and
su
ppli
er
is
est
ablishe
d.
Enc
ry
ption
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Adv
an
ce
d
e
ner
gy man
ag
e
me
nt
syste
m
wi
th t
he
inc
orp
or
ati
on
of
novel
sec
ur
it
y featur
es
(
Ra
heel Mu
zzammel
)
3979
a
n
d
d
e
c
r
y
p
t
i
o
n
o
f
i
n
f
o
r
m
a
t
i
o
n
i
s
d
o
n
e
f
o
r
e
n
h
a
n
c
i
n
g
t
h
e
s
e
c
u
r
i
t
y
[
6
,
7
]
.
A
n
a
u
t
o
n
o
m
o
u
s
m
a
n
a
g
e
m
e
n
t
s
y
s
t
e
m
i
s
m
a
d
e
i
n
t
h
e
r
e
s
e
a
r
c
h
e
s
t
o
e
n
h
a
n
c
e
t
h
e
q
u
a
l
i
t
y
o
f
u
t
i
l
i
z
a
t
i
o
n
o
f
e
n
e
r
g
y
b
e
t
w
e
e
n
c
o
n
s
u
m
e
r
s
a
n
d
s
u
p
p
l
i
e
r
s
[
8
-
1
2
]
.
Thef
t
detect
ion
is
done
by
m
easur
in
g
po
wer
on
both
sides;
load
a
nd
distri
bu
ti
on
trans
form
er.
Im
po
ste
rs
use
differe
nt
te
ch
niques
to
ste
al
.
The
refor
e
,
diff
e
re
nt
te
chni
qu
es
for
the
ft
detect
ion
m
us
t
be
dev
el
op
e
d
t
o
overc
om
e
su
c
h
even
ts
of
e
nergy
the
ft.
[
7,
13
]
.
Bl
ow
fis
h,
ad
van
ce
d
e
nc
rypt
ion
sta
ndar
d
(
AES),
data
encr
y
ptio
n
sta
ndar
d
(
D
ES)
an
d
Tri
pl
e
Data
Encr
y
ption
Sta
ndar
d
(3DES
)
are
com
m
on
sy
m
m
et
ri
c
al
gorithm
s.
I
t
i
s
f
o
u
n
d
f
r
o
m
l
i
t
e
r
a
t
u
r
e
t
h
a
t
B
l
o
w
f
i
s
h
i
s
t
h
e
b
e
s
t
i
n
t
e
r
m
s
o
f
e
n
c
r
y
p
t
i
o
n
t
i
m
e
,
d
e
c
r
y
p
t
i
o
n
t
i
m
e
,
m
e
m
o
r
y
u
s
a
g
e
,
p
o
w
e
r
c
o
n
s
u
m
p
t
i
o
n
,
l
a
t
e
n
c
y
,
a
n
d
j
i
t
t
e
r
a
n
d
s
e
c
u
r
i
t
y
l
e
v
e
l
.
O
n
t
h
e
o
t
h
e
r
h
a
n
d
,
r
i
v
e
s
t
s
h
a
m
i
r
a
d
l
e
m
a
n
(
R
S
A
)
,
e
l
l
i
p
t
i
c
c
u
r
v
e
c
r
y
p
t
o
g
r
a
p
h
y
(
E
C
C
)
a
n
d
E
l
l
a
m
a
e
a
r
e
t
h
e
c
o
m
m
o
n
a
s
y
m
m
e
t
r
i
c
a
l
g
o
r
i
t
h
m
s
.
I
t
i
s
f
o
u
n
d
f
r
o
m
l
i
t
e
r
a
t
u
r
e
t
h
a
t
E
C
C
i
s
b
e
s
t
i
n
a
l
m
o
s
t
a
l
l
p
a
r
a
m
e
t
e
r
s
e
x
c
e
p
t
i
n
s
i
g
n
a
t
u
r
e
v
e
r
i
f
i
c
a
t
i
o
n
t
i
m
e
.
S
e
c
u
r
e
h
a
s
h
i
n
g
a
l
g
o
r
i
t
h
m
(
S
H
A
1
)
a
n
d
(
S
H
A
2
5
6
)
a
r
e
a
l
s
o
f
o
u
n
d
i
n
r
e
s
e
a
r
c
h
b
u
t
b
e
c
a
u
s
e
o
f
i
t
s
i
n
c
r
e
a
s
e
e
n
c
r
y
p
t
i
o
n
t
i
m
e
o
n
la
r
ge
in
put si
ze and
m
or
e p
owe
r
consum
ption
,
i
t
is
i
m
pr
act
ic
a
l
to
i
m
ple
m
ent
[1
4,
15]
.
In
t
his
researc
h,
m
essage
dig
es
t
(MD5
)
al
go
rithm
is
i
m
ple
m
ented
f
or
secu
rin
g
c
om
m
un
ic
at
ion
be
tween
sup
pli
er
a
nd
co
nsum
e
r
be
cause
of
it
s
le
ss
enc
ryptio
n
ti
m
e
and
po
wer co
nsum
ption
[1
2,
14
-
18
]
.
It
is
po
ssible
to
m
a
intai
n
power
pr
oductio
n
syst
e
m
with
carbo
n
dioxide
e
m
issi
on
reaching
to
ze
r
o
with
help
of
in
corp
or
at
io
n
of
ren
e
wa
ble
ene
r
gy
res
ources
.
Re
du
ct
io
n
i
n
C
O
2
em
issi
on
is
bein
g
co
ns
ide
red
i
n
al
l
oth
er
de
velop
e
d
c
ountries
li
ke
India,
R
om
ania,
Ger
m
any,
U
K
a
nd
Den
m
ark
;
Ge
r
m
any
and
De
nm
ark
.
T
h
a
t
’
s
w
h
y
i
t
s
h
o
u
l
d
b
e
c
o
n
s
i
d
e
r
e
d
b
y
d
e
v
e
l
o
p
i
n
g
c
o
u
n
t
r
i
e
s
l
i
k
e
P
a
k
i
s
t
a
n
a
s
w
e
l
l
.
W
i
n
d
p
o
w
e
r
g
e
n
e
r
a
t
i
o
n
i
s
f
o
u
n
d
t
o
b
e
t
h
e
b
e
s
t
r
e
n
e
w
a
b
l
e
e
n
e
r
g
y
s
o
u
r
c
e
f
o
r
e
n
e
r
g
y
g
e
n
e
r
a
t
i
o
n
i
n
I
n
d
i
a
s
o
t
h
a
t
I
n
d
i
a
i
s
f
o
c
u
s
i
n
g
o
n
w
i
n
d
p
o
w
e
r
g
e
n
e
r
a
t
i
o
n
a
n
d
i
s
s
u
c
c
e
s
s
f
u
l
i
n
e
a
s
i
l
y
e
l
i
m
i
n
a
t
i
o
n
o
f
e
f
f
e
c
t
s
o
f
g
l
o
b
a
l
w
a
r
m
i
n
g
[
1
9
,
2
0
]
.
R
e
n
e
w
a
b
l
e
e
n
e
r
g
y
s
o
u
r
c
e
s
c
a
n
b
e
i
n
t
e
g
r
a
t
e
d
w
i
t
h
t
h
e
c
o
n
v
e
n
t
i
o
n
a
l
g
r
i
d
s
t
h
r
o
u
g
h
h
i
g
h
v
o
l
t
a
g
e
d
i
r
e
c
t
c
u
r
r
e
n
t
t
r
a
n
s
m
i
s
s
i
o
n
(
H
V
D
C
)
v
i
a
m
a
x
i
m
u
m
e
f
f
i
c
i
e
n
c
y
a
n
d
t
r
a
n
s
f
e
r
a
b
i
l
i
t
y
[21
-
2
5
].
In
t
his
resea
rc
h,
r
ene
wa
ble
energy
sour
ces
-
base
d
EMS
is
dev
el
op
e
d
a
nd
furthe
r,
sec
ur
i
ty
featur
es
are
inco
rpo
rated
to
cease
cy
ber
-
at
ta
c
ks
and
e
ne
r
gy
the
ft.
Hard
war
e
prototype
is
de
velo
ped
for
EMS
.
Si
m
ulat
ion
s
ar
e
carried
ou
t
in
MATL
A
B/
Si
m
ulink
.
Re
st
of
pa
pe
r
is
desig
ned
i
n
f
ollow
i
ng
s
ect
ion
s
.
Com
pr
ehensi
ve
d
et
ai
ls abo
ut
m
essage d
igest
algo
ri
thm
f
or
secur
it
y i
s co
ve
red
in
s
ect
io
n
2
. S
ect
io
n
3
co
ntai
ns
the
detai
ls
ab
ou
t
pro
posed
m
et
ho
dol
ogy
of
t
his
resea
rc
h.
S
ect
ion
4
c
ov
e
rs
hard
ware
m
od
el
.
Re
sul
ts
an
d
si
m
ulati
on
s
ha
s
bee
n
prese
nted
in
sect
io
n
5
.
Sc
ope
of
c
om
m
ercializa
ti
on
of
the
pro
posed
idea
is
give
n
in
s
ect
ion
6.
Sect
ion
s
7
an
d
8
c
on
sist
of
possi
bl
e
fu
t
ur
e
dire
ct
ion
s
that
can
be
inco
rpo
rated
in
this
resea
r
ch
an
d
con
cl
us
io
n of t
his r
e
searc
h w
ork res
pecti
vely
.
2.
SECURIT
Y A
LGORIT
HM
FOR
ENE
RGY
MAN
AGE
MENT
SYST
EM (
E
MS)
2.1.
Mess
ag
e
dige
s
t alg
orithm
Me
ssage
d
iges
t
(MD)
,
al
so
know
n
as
Ha
sh
al
gorithm
,
gen
erates
a
s
ole
dig
est
e
d
m
ess
age
f
or
a
ny
m
essage.
Has
h
functi
on
is
a
kernel
of
MD
al
gorithm
wh
ic
h
ab
rid
ges
a
string
of
a
ny
le
ng
t
h
to
strin
g
fo
r
a
fixe
d
le
ngth
.
Hash
pass
wor
d
e
ncr
y
ption
(
HP
E
)
is
a
n
ap
proac
h
of
enc
r
ypti
on
us
e
d
f
or
MD
5.
MD
5
al
gorithm
h
a
s
i
r
r
e
v
e
r
s
i
b
l
e
a
n
d
n
o
n
-
c
o
u
n
t
e
r
f
e
i
t
f
e
a
t
u
r
e
.
T
h
e
r
e
f
o
r
e
,
M
D
5
a
l
g
o
r
i
t
h
m
i
s
m
o
r
e
s
u
p
e
r
i
o
r
i
n
i
t
s
a
n
t
i
-
t
a
m
p
e
r
c
a
p
a
b
i
l
i
t
y
.
T
h
i
s
r
e
s
e
a
r
c
h
i
m
p
l
e
m
e
n
t
s
a
d
a
t
a
i
n
t
e
g
r
i
t
y
c
h
e
c
k
i
n
g
s
y
s
t
e
m
b
a
s
e
d
o
n
M
D
5
a
l
g
o
r
i
t
h
m
a
s
s
h
o
w
n
i
n
F
i
g
u
r
e
1
.
2
.
1.1.
St
e
ps to
im
plem
e
nt
M
D
5
al
go
ri
th
m
Me
ssage
-
d
ige
s
t al
gorithm
(
MD5
) flo
wch
a
rt
is desc
ribe
d
in
the foll
owin
g
s
te
ps
:
a.
First chec
k
t
he l
eng
th
of
num
ber
of
bits
of
t
he
original m
essage.
b.
To
br
in
g
a
bout
the
input
m
ess
age
m
ulti
ple
of
512
-
64
(t
he
a
dd
bits:
1
0
0
........
0),
ad
d
the
nu
m
ber
of
bits
to in
pu
t m
essage.
c.
Now,
a
dd
the
64
-
bits
that
indi
cat
es
the
le
ng
th
of
input
m
es
sage
to
res
ult
of
the
2
nd
point,
final
res
ult
will
be den
oted
b
y
“M
” (Mu
lt
iple
of 51
2
-
bits).
d.
“M
” is div
i
ded to the
b
l
oc
ks
(B
),
in
which
ea
ch o
f
them
is o
f 512
bits.
e.
“B
” is f
ur
the
r divide
d
i
nto 1
6 bloc
ks (
X), in
wh
ic
h
eac
h one i
nclu
des 3
2
-
bi
ts.
f.
This alg
ori
thm
consist
s
of
4 r
ounds, e
ach
ro
und
c
onta
ins
16 ste
ps
. So
, by
this there
are
total
64 s
te
ps
.
g.
Ther
e
a
re
f
our
32
-
bit
sh
ift
r
egiste
rs,
al
l
shi
ft
reg
ist
ers
ha
ve
so
m
e
init
ial
values
(H
e
x.)
as
giv
e
n
in
the foll
owin
g:
Regi
ster A
=
[
6
7
4
5
2
3
0
1
]
32
−
bit
s
;
[
A
]
=
[
D
]
′
Regis
ter
B
=
[
e
f
c
d
a
b
8
9
]
32
−
bit
s
;
[
B
]
=
[
C
]
′
Regis
ter
C
=
[
9
8
b
a
d
c
f
e
]
32
−
bit
s
;
[
C
]
=
[
B
]
′
Regis
ter
D
=
[
1
0
3
2
5
4
7
6
]
32
−
bit
s
;
[
D
]
=
[
A
]
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
3978
-
3987
3980
h.
The val
ues
of
A,
B,
C a
nd D
are tem
po
rar
il
y st
or
e
d
i
n AA,
BB
, CC, and
D
D
r
especti
vely
.
i.
This
is
c
or
e
of
al
gorithm
wh
ic
h
has
4
r
ound
s
of
pr
ocessin
g.
E
ve
ry
r
ound
in
volves
16
ste
ps
a
nd
e
ve
r
y
sing
le
ste
p
is
usi
n
g
a
“t
able”
T
of
64
el
em
e
nts
[
0....6
3],
f
or
T[i]
,
wh
e
re
“
i”
is
the
in
dex.
Th
us
,
t
he
four
rou
nd
s
h
a
ve
t
he
corres
ponde
nt
stru
ct
ure,
but
each
us
es m
ism
at
ched
fu
nctions n
am
e as F,
G
,
H an
d I.
I
n
p
u
t
m
e
s
s
a
g
e
No
.
o
f
b
i
t
s
(
1
0
0
0
.
.
0
)
R
e
g
i
s
t
e
r
A
A
=
A
=
6
7
4
5
2
3
0
1
R
e
g
i
s
t
e
r
B
B
=
B
=
E
F
C
D
A
B
89
R
e
g
i
s
t
e
r
C
C
=
C
=
98
B
A
D
C
F
E
R
e
g
i
s
t
e
r
D
D
=
D
=
1
0
3
2
5
4
7
6
L
e
n
g
t
h
o
n
i
n
p
u
t
m
e
s
s
a
g
e
I
n
p
u
t
m
e
s
s
a
g
e
4
-
b
i
t
A
d
d
i
n
g
N
o
.
o
f
b
i
t
s
t
o
c
o
m
p
l
e
t
e
m
u
l
t
i
p
l
e
o
f
5
1
2
(
w
i
t
h
i
n
p
u
t
m
e
s
s
a
g
e
a
n
d
l
e
n
g
t
h
o
f
i
n
p
u
t
m
e
s
s
a
g
e
)
b
i
t
.
6
4
–
b
i
t
l
e
n
g
t
h
o
f
i
n
p
u
t
m
e
s
s
a
g
e
M
M
u
l
t
i
p
l
e
o
f
5
1
2
b
i
t
s
5
1
2
b
i
t
s
.
.
5
1
2
b
i
t
s
5
1
2
b
i
t
s
1
-
32
b
i
t
s
16
-
32
b
i
t
s
1
-
32
b
i
t
s
16
-
32
b
i
t
s
T
a
b
l
e
(
)
F
(
B
,
C
,
D
)
=
[(
B
C
)
(
B
D
)
F
(
B
,
C
,
D
)
=
[(
B
D
)
(
B
D
)
F
(
B
,
C
,
D
)
=
[
B
Å
C
Å
D
]
F
(
B
,
C
,
D
)
=
[
C
Å
(
B
D
)]
I
=
0
t
o
15
I
=
1
6
t
o
31
I
=
3
2
t
o
47
I
=
4
8
t
o
63
A
=
B
+
(
(
A
+
F
(
B
,
C
,
D
)
Xj
[
k
]+
T
[
i
]
<
<
<
s
)
D
=
C
;
C
=
B
;
B
=
A
;
A
=
D
A
=
A
+
AA
;
B
=
B
+
BB
;
C
=
C
+
CC
;
D
=
D
+
DD
(
m
o
s
t
)
D
C
B
A
(
l
e
a
s
t
)
Figure
1. Me
ss
age
dig
est
-
5
al
gorithm
flow
c
har
t
F
(
B
,
C
,
D
)
=
[
(
B
ᴧ
C
)
ᴠ
(
¬
B
ᴧ
D
)
]
,
T
[
0
−
15
]
, in
cl
udes
16 s
t
eps
G
(
B
,
C
,
D
)
=
[
(
B
ᴧ
D
)
ᴠ
(
B
ᴧ
¬
D
)
]
,
T
[
16
−
31
]
, in
cl
udes
16 st
eps
H
(
B
,
C
,
D
)
=
[
B
⨁
C
⊕
D
]
,
T
[
32
−
47
]
, in
cl
ud
e
s
16 s
te
ps
I
(
B
,
C
,
D
)
=
[
C
⨁
(
B
ᴠ
¬
D
)
]
,
T
[
48
−
63
]
, in
cl
udes
16 s
t
eps
wh
e
re
the
sym
bo
ls
re
prese
nts
log
ic
al
OR
,
represe
nts
log
ic
al
AND,
rep
r
esents
log
ic
al
N
OT
and
represe
nts lo
gical
X
OR
.
T
he op
e
rati
on in
si
ng
le
ste
p
i
nvol
ves
t
he
f
unct
io
ns
:
=
+
(
(
+
(
,
,
)
+
[
]
+
[
]
)
<
<
<
)
=
;
=
;
=
;
=
w
h
e
r
e
[
]
−
ℎ
(
d
i
v
i
d
e
d
o
f
B
)
a
n
d
J
th
n
u
m
b
e
r
o
f
b
l
o
c
k
s
(
B
-
5
1
2
b
i
t
s
)
a
n
d
<
<
<
s
-
c
i
r
c
u
l
a
r
s
h
i
f
t
l
e
f
t
b
y
s
-
b
i
t
s
.
A
f
t
e
r
f
o
u
r
r
o
u
n
d
s
,
t
h
e
o
u
t
p
u
t
i
s
a
d
d
e
d
t
o
i
n
p
u
t
o
f
t
h
e
f
i
r
s
t
r
o
u
n
d
.
=
+
;
=
+
;
=
+
;
=
+
j.
The
n,
t
he ou
t
put i
s
of
128
-
bits an
d wil
l be
orde
red as
fo
ll
ows:
(
)
−
−
>
−
−
>
−
−
>
(
)
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Adv
an
ce
d
e
ner
gy man
ag
e
me
nt
syste
m
wi
th t
he
inc
orp
or
ati
on
of
novel
sec
ur
it
y featur
es
(
Ra
heel Mu
zzammel
)
3981
3.
METHO
DOL
OGY
In
this
pro
j
ec
t,
a
cl
ear
ener
gy
ge
ner
at
io
n
is
pr
om
oted
by
incorpora
ti
on
of
re
ne
w
able
energy
te
chnolo
gies.
Pr
op
os
e
d
bloc
k
dia
gr
am
of
this
researc
h
pro
j
ect
is
show
n
in
Fig
ure
2
(
a
)
.
Data
tra
ns
f
erab
l
e
secur
it
y
featu
r
es
are
al
so
int
rod
uced
in
t
his
pro
j
ect
by
conve
rting
data
in
has
h
f
or
m
with
help
of
MD
5
al
gorithm
as shown
i
n
Fi
gure
2
(
b
)
.
W
i
n
d
Fa
r
m
A
C
G
en
er
a
to
r
AC
–
D
C
C
o
n
v
er
ter
P
V
Fa
r
m
D
C
–
D
C
C
o
n
v
er
ter
D
C
B
a
tt
er
y
L
o
a
d
1
M
e
t
e
r
C
o
n
tr
o
l
l
er
L
o
a
d
2
M
e
t
e
r
C
o
n
tr
o
l
l
er
L
o
a
d
3
M
e
t
e
r
C
o
n
tr
o
l
l
er
In
v
er
ter
M
e
t
e
r
C
en
tr
a
l
i
z
ed
C
o
n
tr
o
l
l
er
A
C
G
en
er
a
to
r
A
C
Su
p
p
l
y
M
a
i
n
E
n
er
g
y
T
h
e
f
t
D
etec
ti
o
n
D
a
ta
T
r
a
n
s
f
er
Sec
u
r
i
ty
(a)
F
i
gure
s
how
s
how
t
he
a
uxi
l
i
a
ry func
t
i
on F
i
s
a
ppl
i
e
d t
o t
he
fou
r bu
ffe
rs
(
A
,
B
,
C a
nd D
)
A
B
C
D
A
B
C
D
F
<
<
<
s
Mᵢ
Kᵢ
(b)
Figure
1
.
(
a
)
P
r
opos
e
d
m
od
el
of ene
rg
y m
anag
em
ent syst
em
,
and
(b) p
r
opose
d enc
ryption t
ech
nique
f
or d
at
a
trans
fer
secu
rity
b
et
wee
n
c
onsu
m
er an
d s
upplier
4.
HARD
WA
RE
D
EVEL
OPM
ENT OF
PRO
TOT
YPE
MO
DEL
Hardwa
re
prot
otype
m
od
el
is
de
velo
ped
a
s
show
n
i
n
Fi
gure
3
to
i
ncrea
se
the
pr
act
ic
al
it
y
and
reali
zat
ion
of prop
os
ed
r
esea
r
ch.
Figure
3. Ha
r
dware
d
e
velo
pme
nt of
prototyp
e/
te
st
m
od
el
fo
r vali
dation o
f a
dv
a
nce
d
e
nergy m
anag
em
ent
syst
e
m
an
d
sec
ur
it
y feat
u
res
5.
SIMULATI
O
N
RESU
LT
S
A
N
D A
NA
L
Y
SIS
Pr
op
os
e
d
m
od
el
is
si
m
u
la
ted
on
Ma
tl
ab/
Si
m
ulink
and
a
pp
a
re
nt
power
is
analy
zed
as
sh
ow
n
in
Figure
4.
T
his
analy
sis
helps
in
determ
ining
the
operati
on
of
e
nergy
m
anag
em
ent
syst
e
m
within
pr
e
scrib
e
d
lim
it
s
fo
r
ge
nrrati
on
a
nd
dem
and.
Loa
d
dem
ands
with
res
pe
ct
to
gen
erati
on
f
r
om
diff
eren
t
so
urces
are
li
ste
d
in Ta
ble 1.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
3978
-
3987
3982
(a)
(b)
(c)
(d)
(e)
Figure
2
.
Cha
r
act
erist
ic
s o
f
a
pp
a
re
nt po
wer
for
a
naly
zi
ng
operati
on
of
,
(a) t
her
m
al
g
ene
r
at
ion
,
(b) win
d powe
r gene
rati
on
,
(c
)
P
V base
d gene
rati
on
,
(
d) in
dustria
l l
oa
d
,
an
d (e) resi
de
ntia
l l
oad
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Adv
an
ce
d
e
ner
gy man
ag
e
me
nt
syste
m
wi
th t
he
inc
orp
or
ati
on
of
novel
sec
ur
it
y featur
es
(
Ra
heel Mu
zzammel
)
3983
Table
1
. Dat
a
of g
e
ner
at
io
n a
nd d
em
and
Para
m
eters
Gen
eration
De
m
an
d
Diesel Eng
in
e
PV Far
m
W
in
d
Far
m
Ind
u
strial L
o
ad
Res
id
en
tial
Load
V (
V
)
8353
1
8
8
.4
8349
8348
8349
I
(A
)
4
8
0
.3
4848
3
.78
4
0
.00
8
3
5
1
5
6
1
.7
S(kVA)
6
.01
8
e6
1
.37
e6
4
.73
9
e4
1
0
4
.6
7
.03
5
e6
P (
k
W
)
6
.01
7
e6
1
.23
e6
2
.52
7
e4
-
1
0
4
.6
-
6
.94
1
e6
Q (
k
VAR
)
8
.69
2
e4
-
7
.84
6
e6
-
4
.00
9
e4
-
0
.00
7
6
8
2
1
.14
6
e6
5
.
1.
Mess
ag
e
dige
s
t algrith
m
res
ults
Me
ssage
dig
es
t
al
go
rithm
is
i
m
ple
m
ented
to
sec
ur
e
the
e
nergy
m
anag
em
e
nt
syst
e
m
.
Inform
at
ion
about
co
nsum
e
r
pa
ram
et
ers
ca
n
be
e
ncr
y
pted
an
d
t
hen
tra
nsfer
red
t
o su
pply
co
m
pan
y t
o
com
par
e
sen
din
g a
nd
receivin
g
in
f
orm
at
ion
.
This
will
help
agai
nst
any
c
yber
-
at
ta
cks
on
the
powe
r
ne
tw
orks
and
will
al
so
help
in
theft
detect
ion.
For
pro
posed
m
od
el
,
curre
nts
bo
t
h
on
t
he
load
as
well
as
on
t
he
s
upply
side
are
sho
w
n
al
ong
with
the
ir
has
he
d
valu
e.
Wh
e
n
the
re
is
no
the
ft,
the
has
hes
a
re
sa
m
e
on
both
si
des
a
nd
duri
ng
theft,
the h
a
sh
es
are
seen t
o be
diff
e
ren
t
on
bo
t
h
th
e sides a
s s
how
n
in
Ta
ble 2 an
d
T
a
ble
3
a
nd
in Fi
gure
s
5
a
nd
6
.
Table
2.
Has
he
d
te
xts
on l
oad
and s
upply si
de
durin
g n
o
the
ft
Para
m
eters
Cu
rr
en
ts
Hash
ed
T
ex
ts
Su
p
p
ly
0
.65
A
1
3
6
b
a
8
1
d
3
8
1
3
5
9
1
cd
cc15
f
cb
9
2
4
b
9
4
3
7
Load
0
.65
A
1
3
6
b
a
8
1
d
3
8
1
3
5
9
1
cd
cc15
f
cb
9
2
4
b
9
4
3
7
Table
3.
Has
he
d
te
xts
on l
oad
and s
upply
sid
e duri
ng
theft
Para
m
eters
Cu
rr
en
ts
Hash
ed
T
ex
ts
Su
p
p
ly
0
.65
A
1
3
6
b
a
8
1
d
3
8
1
3
5
9
1
cd
cc15
f
cb
9
2
4
b
9
4
3
7
Load
0
.73
A
1
3
4
2
1
2
9
d
0
4
c
d
2
9
2
4
d
d
0
6
cead4
cf0a3
c
a
(a)
(b)
Figure
5. LCD
screen
du
rin
g
,
(a)
no the
ft
,
(b)
thef
t
(a)
(b)
Figure
6. (a
)
Si
m
il
arity
,
and (
b) d
if
fer
e
nce
of
hash
e
s
of
sup
ply an
d
c
onsum
er end
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
3978
-
3987
3984
6.
BUSI
NESS P
LAN FO
R C
OM
MER
CI
A
LIZ
ATION
6.1.
Scop
e
of c
om
merc
iali
z
at
ion
T
h
e
p
r
o
p
o
s
e
d
m
o
d
e
l
h
i
g
h
l
i
g
ht
s
t
h
e
i
m
p
o
r
t
a
n
c
e
o
f
s
e
c
u
r
e
d
e
n
e
r
g
y
m
a
n
a
g
e
m
e
nt
w
i
t
h
t
h
e
i
n
c
o
r
p
o
r
a
t
i
o
n
o
f
r
e
n
e
w
a
b
l
e
e
n
e
r
g
y
t
e
c
h
n
o
l
o
g
y
.
World
is
m
ov
ing
an
d
disco
ver
in
g
ways
of
ge
ner
at
io
n
of
cl
ean
el
e
ct
rici
ty
.
Supp
ly
com
pan
ie
s
are
m
aking
co
nsum
ers
a
utono
m
ou
s
by
al
lowing
them
to
gen
e
rate
el
ect
rici
ty
by
their
own
and
sal
e
as
and
wh
e
n
exce
ss
energy
pro
du
ct
io
n
is
ava
il
able.
In
this
pr
oject
,
a
prot
otype
is
pr
e
pa
red
to
dem
on
strat
e
the
i
m
po
rta
nce
of
us
i
ng
re
new
a
ble
ene
r
gy
so
urces
a
nd
sec
ur
e
c
om
m
un
ic
at
ion
betwee
n
consum
ers
an
d su
pp
li
er
s to
avoid e
ne
rg
y t
heft
.
T
h
i
s
p
r
o
j
e
c
t
h
i
t
s
t
h
e
s
m
a
l
l
a
n
d
m
e
d
i
u
m
s
i
z
e
d
p
r
o
d
u
c
t
i
o
n
a
n
d
m
a
n
u
f
a
c
t
u
r
i
n
g
i
n
d
u
s
t
r
i
e
s
.
H
o
m
e
b
a
s
e
d
i
n
d
u
s
t
r
i
e
s
a
r
e
a
l
s
o
c
o
n
s
i
d
e
r
e
d
.
F
u
r
t
h
e
r
,
s
u
p
p
l
y
c
o
m
p
a
n
i
e
s
l
i
k
e
f
a
i
s
a
l
a
b
a
d
e
l
e
c
t
r
i
c
s
u
p
p
l
y
c
o
m
p
a
n
y
(
F
E
S
C
O
)
,
la
hor
e
el
ect
ric
supp
ly
com
pan
y
(
LE
SCO)
et
c.,
an
d
c
on
su
m
ers
involve
d
i
n
t
he
ge
ner
at
io
n
by
re
new
a
ble
e
ne
rg
y
so
urces
will
be
the
m
os
t
convincin
g
c
us
to
m
ers
of
this
id
ea.
The
c
om
pan
ie
s
w
hich
are
serious
ab
ou
t
healt
h
safety
an
d
e
nviro
nm
ent
and
are
intere
ste
d
t
o
ob
ta
in
ISO
c
erti
ficat
ion
s,
c
an
ta
ke
interes
t
in
this
protot
ype
of
idea. T
his
pro
je
ct
is su
ccess
f
ul pr
ov
i
ding a
door to
r
e
du
ce
CO
2
em
issi
on
s.
Re
search
a
nd
dev
el
op
m
ent
involve
d
in
IOT
can
ta
ke
i
nterest
to
pr
ov
i
de
funds
to
c
om
m
ercialize
the
pr
oto
ty
pe
with
the
facil
it
ie
s
that
are
be
yond
li
m
it
at
io
ns
i
nvolv
e
d
b
e
cause
of
dista
nc
e
betwee
n
co
ns
um
er
and
a
ppli
ances
without
any
f
ear
of
cy
ber
i
nt
ruder
.
This
proj
ect
sec
ur
e
s
the
wir
el
ess
co
m
m
un
ic
at
ion
be
twee
n
consum
er
an
d
su
ppli
er
by
c
onside
rin
g
the
e
ncr
y
ption
t
hro
ugh
m
essage
di
gest
al
gorithm
s
an
d
decr
y
ption
via
brute
f
o
rce
at
ta
ck.
T
her
e
for
e,
this
pro
j
ect
is
basical
ly
hitt
ing
the
m
a
rk
et
s
a
nd
i
nvest
or
s
i
nvolv
e
d
a
nd
interest
ed
i
n
i
nt
erd
isc
ipli
na
ry
researc
h
a
nd f
i
el
ds
of
ICT a
nd P
ower
sect
or
.
6.2.
Financi
al v
i
abi
li
ty
Finan
ci
al
via
bi
li
t
y
of
this
idea
f
or
sm
al
l
and
m
edium
sca
le
ind
ust
ries
and
c
onsum
er
sides
at
reside
ntial
an
d
com
m
ercial
a
reas
is
ve
ry
hi
gh.
A
li
tt
le
inve
st
m
ent
resu
lt
s
in
m
aking
sys
tem
s
intel
li
gen
t
an
d
auto
no
m
ou
s by
secur
in
g
com
m
un
ic
at
ion
w
it
h
this idea. Fur
ther,
r
e
duct
ion
in CO
2
e
m
issi
on
involves HS
E an
d
IS
O
ce
rtific
at
ion
s
. T
her
e
fore,
w
it
h
the idea
of
m
ov
in
g
to
w
ard
s
ge
ner
at
io
n via ren
e
wa
ble r
eso
urces,
we
cannot
den
y
the
e
nerg
y
m
anag
em
ent
i
m
po
rtance
with
the
inco
r
por
at
ion
of
re
newable
energy
sources
.
Im
po
rta
nce
of
energy
m
anag
e
m
ent
is
al
so
increase
d
beca
us
e
of
i
n
flat
io
n
a
nd
re
du
ct
io
n
in
t
he
ca
pacit
y
of
ac
qu
iri
ng
capit
a
l
because
of
dec
rease
in
the
w
ort
h
of
r
up
e
e
in
Pakistan
.
Furth
er,
cost/
ben
e
fit
rati
o
is
within
acce
ptable
lim
i
t
for
this idea.
Rat
es of e
nergy are
ver
y m
uch
i
ndepende
nt of su
pp
ly
c
om
p
anies’ tarif
fs w
it
h
t
his idea
.
6.
3.
Ease
of de
velo
pment
Since
a
prot
otype
is
pr
e
par
e
d
in
this
pro
je
ct
to
analy
ze
the
perform
a
nce
of
inno
va
ti
on
,
direct
dep
l
oym
ent
is
no
t
possi
ble.
Chan
ges
are
r
equ
i
red
wit
h
r
espect
to
the
con
s
um
er’
s
sp
e
ci
ficat
ion
s.
H
oweve
r
,
m
od
ule
re
qu
i
r
ed
for
e
nc
rypt
ing
an
d
dec
rypting
in
form
ation
tran
sfe
rr
e
d
via
wireless
l
ink
can
be
de
plo
ye
d
easi
ly
w
it
h
a sl
igh
t m
od
ific
at
ion. F
ur
t
her, e
ne
rg
y t
hef
t
dete
ct
ion
ca
n be im
ple
m
ented
without a
ny alt
era
ti
on
.
6.4.
Scalabi
li
ty
As
prot
otype
is
pr
e
par
e
d,
thi
s
proj
ect
re
quires
a
scal
abili
t
y
with
resp
ect
to
custom
er’
s
prop
e
rtie
s
.
Fu
rt
her,
qu
a
ntit
at
ive v
s
qual
it
at
ive ev
al
uatio
n
is
require
d
t
o en
han
ce
the
outcom
es o
f
t
his
r
esea
rch p
roje
ct
.
7.
POSSIBLE
F
UTU
RE
DIRECTION
S
So
m
e o
f
t
he
id
eas f
or futu
re
de
velo
pm
ent is m
entioned
b
el
ow
:
a.
Lat
est
ways
of
encr
ypti
on
a
nd
dec
ryptio
n
li
ke
A
dvance
d
Encr
y
ption
Stand
a
r
d,
Tri
ple
Data
Enc
ryptio
n
Stand
a
r
d,
Tw
ofi
sh
et
c.,
will
secur
e
the
com
m
un
ic
at
ion
between
c
on
s
um
er
and
pro
du
ce
r
s.
This
will
help
the
co
nsum
er
to
act
as
pr
osum
er.
Prosu
m
er
is
a
cat
eg
ory
in
w
hic
h
c
on
s
um
er
has
t
he
a
bili
ty
to
sale
el
ect
rici
ty
to
su
pply
com
pani
es
w
hen
exce
ss
ge
ne
rati
on
is
avail
able
at
it
s
side.
Lat
e
st
te
chn
i
qu
e
s
of
encr
y
ption an
d dec
ryptio
n wil
l
m
ake cons
ume
r
m
or
e aut
onom
ou
s w
it
hout
any fea
r of cy
be
r
-
at
ta
ck
.
b.
Feat
ur
es
o
f
sm
art
m
et
ers
can
be
a
dded
to
int
rod
uce
the
c
oncept
of
pea
k
hours
a
nd
off
pe
ak
hours
pr
ic
i
ng.
This
will
g
ive
birth t
o
t
he
c
oncept of sm
art bi
ll
ing
syst
em
f
or powe
r faci
li
ti
es.
c.
Ca
lc
ulati
on
of
therm
al
aging
of
c
om
po
ne
nt
s
of
powe
r
sy
stem
will
enab
le
the
s
upp
li
er
to
intel
li
ge
ntly
handle
the
po
wer
tra
ns
fe
rr
i
ng
in
the
tim
e
of
pea
k
hours
to
avo
id
l
ong
te
r
m
sh
ut
dow
n
in
case
of
a
ny
cable
or
com
ponen
t
s
fail
ur
e.
Te
m
per
at
ur
e
sen
sing
an
d
x
-
ra
ys
i
m
aging
w
il
l
add
fu
el
to
this
pro
j
ect
for
prolo
ngin
g
li
fe
.
d.
Con
ce
pt
of
two
-
way
flo
w
of
powe
r
can
be
intr
oduce
d
an
d
the
ft
de
te
ct
ion
syst
em
can
be
up
grad
e
d
accor
ding
to
t
hi
s
idea.
N
ot
on
ly
m
agn
it
ud
e
of
cu
rr
e
nt
but
al
so
directi
on
of
flo
w
of
cu
rr
e
nt
can
be
us
e
d
for
theft
detect
ion
.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Adv
an
ce
d
e
ner
gy man
ag
e
me
nt
syste
m
wi
th t
he
inc
orp
or
ati
on
of
novel
sec
ur
it
y featur
es
(
Ra
heel Mu
zzammel
)
3985
e.
Io
T
base
d
co
nfi
gurati
on
s
ca
n
be
intr
oduce
d
in
this
pro
j
ect
.
Data
of
t
he
cu
r
ren
t
co
nfi
gurat
ion
of
the
syst
em
will
be
th
r
own
over
t
he
cl
oud
a
nd
can
be
a
ccesse
d
t
hro
ughout
the
w
or
l
d
with
t
he
pr
iv
a
te
key.
T
his
w
ill
m
ake th
e
distance
fr
ee a
pp
for
a
uto
m
at
ing
en
er
gy m
anag
e
m
ent.
In
te
ll
igent
r
obots
can
be
int
egr
at
e
d
with
this
syst
e
m
to
acce
ss
to
the
po
i
nts
wh
e
re
a
uto
m
at
ion
is
fail
ed.
The
se
r
obots
can
be
e
qu
i
pp
e
d
with
dro
nes
for
la
ndin
g
to
the
faul
ty
po
ints
or
can
be
m
ade
tr
avell
ed
ov
e
r
the
powe
r
li
nes
li
ke
an
e
le
ct
ric
cable
car
to
the
points
of
fail
ur
es
.
T
his
woul
d
hel
p
in
act
ivati
ng
ti
m
el
y
rem
edial
acti
o
ns
for
m
anu
al
op
e
rati
on
of
t
ripp
i
ng f
a
ulty
secti
on
s
from
the system
.
8.
CONCL
US
I
O
N
Energy
crises
can
be
res
olv
e
d
in
ne
xt
deca
des
usi
ng
this
adv
a
nce
d
ene
rg
y
m
anag
em
e
nt
syst
e
m
.
This
syst
em
pr
ovokes
th
e
m
a
xim
u
m
util
iz
a
t
ion
of
re
ne
wa
ble
ene
r
gy
sou
rces
al
on
g
with
a
li
tt
le
reli
an
ce
on
conve
ntion
al
s
ources.
The
refor
e
,
prom
otion
of
gr
ee
n
e
nergy
an
d
en
er
gy
m
ix
m
od
el
is
the
m
ai
n
m
oti
vati
on
existi
ng
be
hind
this
a
ppr
oa
ch.
E
ne
rg
y
m
anag
em
ent
syst
e
m
is
si
m
ul
at
ed.
F
urt
her,
pr
oto
ty
pe
of
ene
rg
y
m
anag
em
ent
syst
e
m
is
dev
e
lop
e
d
to
va
li
da
te
the
idea
of
ene
rg
y
m
anag
em
ent
with
the
inco
rpo
rati
on
of
ren
e
wa
ble
ene
rg
y
s
ources
a
nd
a
dv
a
nce
d
s
ecur
it
y
feat
ur
e
s.
It
is
no
ti
ce
d
from
the
re
cent
tre
nds
of
pow
e
r
gen
e
rati
on
that
w
or
ld
is
m
ov
ing
t
ow
a
rds
re
new
a
ble
e
nerg
y
so
urces
f
or
powe
r
pr
oduct
ion
.
It
is
beca
us
e
of
m
any
reasons.
So
m
e
of
the
rem
ark
able
r
easo
ns
are
de
crease
in
the
fo
ssil
f
uel
ene
rg
y
rese
r
vo
i
rs,
global
war
m
ing
a
nd
e
xcess
C
O
2
em
i
ssion
s
.
T
he
refor
e
,
world
is
l
ooking
f
or
ot
he
r
s
ources
of
ge
ner
at
io
n.
It
is
f
ound
from
the
recen
t
arti
cl
es
of
e
ne
rg
y
that
de
ve
lop
e
d
c
ountrie
s
li
ke
En
glan
d,
Ge
rm
any
will
m
ov
e
their
e
ntire
syst
e
m
o
f pow
er
gen
e
rati
on t
o rene
wa
ble ene
rg
y s
ources
by
the end o
f 2030.
Ther
e
f
or
e,
this
resea
rch
pr
ov
i
des
a
bri
ef
i
ntr
oductio
n
of
en
erg
y
m
anag
em
ent
syst
em
wit
h
the
a
bili
ty
of
a
ddit
ion
of
ren
e
wa
ble
ene
rg
y
s
ources
for
po
wer
ge
nerat
ion
.
Furthe
r,
intel
li
gen
t
way
of
t
hef
t
detect
ion
i
s
introd
uced
s
o
that
there
co
uld
be
no
com
pro
m
ise
ov
er
any
energy
theft.
Ba
sed
on
the
co
m
par
ison
of
c
u
rr
e
nt
values
of s
uppl
ie
r
an
d
c
onsu
m
er, p
ow
e
r
syst
e
m
is
m
ade secure.
In
a
ddit
ion
to
t
his,
e
nh
a
nce
d
secur
it
y
featu
r
es
for
com
m
unic
at
ion
bet
wee
n
sup
pliers
a
nd
co
nsum
er
s
in
intr
oduce
d
for
first
ti
m
e
i
n
powe
r
syst
e
m
.
This
will
not
only
inc
rea
se
reli
abili
ty
of
se
rv
ic
e
t
o
es
sentia
l
loads
but
al
so
increase
d
ov
e
r
al
l
eff
ic
ie
ncy
of
us
a
ge
of
en
erg
y
a
nd
capit
al
s.
Me
ssage
di
gest
al
gorithm
base
d
secur
it
y
for
wireless
com
m
un
ic
at
ion
betwee
n
sup
plier
an
d
consum
er
m
ake
bo
t
h
sup
plier
and
c
onsu
m
er
m
or
e
auto
no
m
ou
s
a
nd
intel
li
ge
nt.
Power
syst
em
inf
or
m
at
ion
ca
nnot
be
al
te
re
d
by
cy
be
r
int
ruder
bec
ause
of
this
ty
pe
of sec
ur
it
y.
REFERE
NCE
S
[1]
R.
Muzz
amm
el
,
M.
Ahs
an
and
W
.
Ahm
ad,
"N
on
-
li
ne
ar
an
aly
t
ic
appr
oac
h
es
of
power
flow
anal
y
sis
and
vo
lt
ag
e
profil
e
improvem
ent
,
"
2015
Pow
er
Gene
ra
t
io
n
S
y
stem
and
Rene
wabl
e
E
ner
g
y
Technol
o
gie
s
(PG
SR
ET
)
,
Islamaba
d,
pp.
1
-
7,
2015
.
[2]
H.
Kanc
hev
,
D.
Lu,
F.
Col
as,
V.
Laza
rov
and
B.
Franc
o
is,
"E
ner
g
y
Mana
g
ement
a
nd
Opera
tional
Plann
ing
o
f
a
Microgr
id
wi
th
a
PV
-
Based
Act
ive
Gen
era
to
r
fo
r
Sm
art
Grid
A
ppli
c
at
ion
s,"
i
n
IEE
E
Tr
ansacti
ons
on
Industrial
El
e
ct
ronics
,
vol
.
58,
no.
10,
pp.
4
583
-
4592,
Oc
t. 2
011.
[3]
F.
Abbas,
S.
Yin
g
y
un
and
U.
Re
hm
an,
"H
y
brid
Ene
rg
y
Man
agem
ent
S
y
stem
wit
h
Rene
wabl
e
En
erg
y
Inte
gr
ation,
"
2015
Sev
ent
h
I
nte
rnational
Co
nfe
renc
e
on
Computati
onal
I
nt
el
li
g
ence,
Mode
ll
ing
and
Simulat
ion
(
CIMSim
)
,
Kuanta
n,
pp.
12
1
-
126,
2015
.
[4]
A.Mera
bet,
K.
Ta
wfique
Ahm
ed,
H.
Ibr
ahi
m
,
R.
Begu
ena
ne
a
nd
A.
M.
Y.
M
.
Ghias,
"En
erg
y
Mana
gement
a
nd
Control
S
y
stem
for
La
bora
tor
y
Scal
e
Microgr
id
Based
W
ind
-
PV
-
Bat
te
r
y
,
"
in
IEE
E
T
rans
act
io
ns
on
Sustainab
l
e
Ene
rgy
,
vol
.
8
,
n
o.
1
,
pp
.
145
-
15
4,
Jan
.
2017
.
[5]
D.
Shen,
A.
Iz
adi
an
and
P.
L
ia
o,
"A
h
y
b
rid
wind
-
solar
-
stora
ge
ene
rg
y
g
enerat
ion
s
y
s
te
m
c
onfigura
t
ion
an
d
cont
rol
,
"
2014
I
EE
E
Ene
rgy
Co
nve
rs
ion
Congre
ss
and
Ex
posit
io
n
(
ECCE
)
,
Pitt
sbu
rgh,
PA
,
pp
.
43
6
-
442,
2014
.
[6]
N.
Java
id
et
al
.
,
"A
n
Inte
ll
ig
ent
Loa
d
Mana
g
eme
nt
S
y
stem
with
Rene
wabl
e
En
er
g
y
In
te
gra
ti
on
fo
r
Sm
art
Hom
es,
"
in
IE
EE A
c
ce
ss
,
vol.
5
,
pp
.
13587
-
13600,
2017
.
[7]
S.
Sahoo,
D.
Ni
kovski,
T
.
Mus
o
and
K.
Tsuru,
"Elect
ri
ci
t
y
th
e
ft
detec
ti
on
usin
g
sm
art
m
et
er
d
at
a
,
"
2015
I
EEE
Powe
r
&
Ene
rgy
Society Innov
a
tive
Smar
t
Gr
id
Technol
og
ie
s Con
fe
renc
e
(
ISGT
)
,
W
ashingt
on,
DC
,
pp
.
1
-
5
,
2015
.
[8]
Gupta
and
A
.
Ja
in,
"Int
el
l
ige
nt
c
ontrol
of
h
y
br
id
power
s
y
stems
f
or
loa
d
b
alanc
in
g
and
l
evelise
d
cost,
"
2016
I
EEE
1st
Inte
rnational
Confe
renc
e
on
Powe
r
El
e
ct
roni
cs,
Intelli
g
ent
C
ontrol
and
Ene
rgy
Syste
ms
(
ICPE
ICES)
,
Delhi
,
pp.
1
-
5
,
2016
.
[9]
G.
W
ang,
M.
Ciobot
aru
and
V.
G.
Ageli
dis,
"P
V
power
pla
nt
using
hy
b
rid
ene
r
g
y
storage
s
y
s
tem
with
i
m
prove
d
eff
iciency
,
"
201
2
3rd
IEE
E
Inter
nati
onal
Sympo
sium
on
Powe
r
El
e
ct
ronics
for
Distribute
d
Gen
erati
on
Syste
ms
(
PE
DG)
,
Aalbor
g,
pp
.
808
-
813
,
2012
.
[10]
M.
Braga
rd
,
N.
Solta
u,
S.
Thomas
and
R.
W
.
De
Doncke
r,
"The
Bal
an
ce
of
R
enew
abl
e
Sourc
es
a
nd
Us
er
Dem
ands
in
Grids:
Pow
er
El
ec
tron
ic
s
for
Modular
Bat
ter
y
Ene
rg
y
Stora
ge
S
y
stems
,
"
in
IEE
E
Tr
ansacti
ons
on
Powe
r
El
e
ct
ronics
,
vol
.
25,
no.
12,
pp.
3
049
-
3056,
De
c.
2010.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
4
,
A
ugus
t
2020
:
3978
-
3987
3986
[11]
S.
Mishra,
Y.
Mishra
and
S.
Vign
esh,
"S
ec
urity
co
nstrai
ned
e
cono
m
ic
dispat
ch
con
sideri
ng
wind
ene
rg
y
conve
rsion
s
y
stems
,
"
2011
I
EE
E
Powe
r
and
Ene
rgy
So
ciety
Gene
ral M
e
eting
,
Detr
o
it,
MI,
U
SA
,
pp.
1
-
8
,
201
1
.
[12]
A.
A.
Putri
Rat
n
a,
P.
Dewi
Purna
m
asa
ri,
A.
Shau
gi
and
M.
Salman,
"A
naly
sis
and
compari
son
of
MD
5
and
SHA
-
1
al
gorit
hm
imple
m
ent
at
ion
in
Si
m
ple
-
O
aut
hent
i
ca
t
ion
base
d
sec
urity
s
y
st
em,"
2013
Inte
rnation
al
Confe
renc
e
o
n
QiR
,
Yog
y
a
kar
t
a
,
pp
.
99
-
104
,
20
13
.
[13]
A.
S.
Mete
ring,
S.
Visala
tc
h
i
an
d
K.
K.
Sande
ep,
"S
m
art
ene
rg
y
m
et
eri
ng
and
po
wer
the
ft
cont
ro
l
using
ard
uino
&
GS
M,"
2017
2nd
Inte
rnat
ional
Confe
renc
e
for
Conve
rgenc
e in T
ec
hnology (
I2CT)
,
Mum
bai
,
pp.
858
-
961
,
2017
.
[14]
S.
Ojha
and
V.
Raj
put,
"A
ES
and
MD
5
base
d
sec
ure
aut
h
enti
ca
t
ion
in
cl
oud
computing,
"
20
17
Inte
rnational
Confe
renc
e
on
I
-
SMAC
(
IoT i
n
S
oci
al
,
Mobi
le, A
naly
tics and
C
lo
ud)
(
I
-
SMAC
)
,
Palladam,
pp
.
856
-
860
,
2017
.
[15]
P.
Ora
and
P.
R.
Pal,
"D
at
a
se
cur
i
t
y
and
integr
i
t
y
i
n
cl
oud
computi
ng
base
d
on
RS
A
par
ti
a
l
hom
om
orphic
and
MD
5
cr
y
p
togra
ph
y
,
"
2015
Inte
rnatio
nal
Confe
ren
ce
on
Computer,
Comm
unic
ati
o
n
and
Control
(
IC4
)
,
Indore
,
pp.
1
-
6
,
2015
.
[16]
V.
Mota,
S.
Aza
m
,
B.
Shanm
uga
m
,
K.
C.
Yeo
an
d
K.
Kannoorpat
ti
,
"Com
par
a
ti
ve
a
naly
sis
of
different
t
ec
hn
ique
s
of
enc
r
y
pti
on
fo
r
sec
ure
d
data
tr
ansm
ission,"
20
17
IEE
E
Int
ernati
onal
Conf
ere
nc
e
on
Powe
r,
Co
ntrol,
Signal
s
an
d
Instrum
ent
ati
on
Engi
ne
ering
(
ICPCSI)
,
Chennai,
pp.
231
-
237
,
20
17
.
[17]
M.
D.
A.
Chawdhur
y
and
A.
H
.
M.
A.
Habib,
"S
ec
urity
enh
an
ce
m
ent
of
MD
5
hashe
d
passw
ords
b
y
using
the
unused
bit
s
of
TCP
hea
der
,
"
2008
11th
Inte
rn
ati
onal
Conf
ere
nce
on
Comput
er
and
Information
Technol
ogy
,
Khulna,
pp
.
714
-
717
,
2008
.
[18]
D.
Cao
and
B.
Y
ang,
"D
esign
an
d
implementa
t
io
n
for
MD
5
-
base
d
dat
a
in
te
g
r
ity
che
ck
ing
s
y
st
em,"
2010
2nd
IEEE
Inte
rnational
Co
nfe
renc
e
on
Info
rm
ati
on
Manage
ment
and
Engi
n
e
ering
,
Ch
engdu,
pp.
608
-
611
,
20
10
.
[19]
D
.
C
i
u
p
ă
g
e
a
n
u
,
G
.
L
ă
z
ă
r
o
i
u
a
n
d
M
.
T
î
r
ş
u
,
"
C
a
r
b
o
n
d
i
o
x
i
d
e
e
m
i
s
s
i
o
n
s
r
e
d
u
c
t
i
o
n
b
y
r
e
n
e
w
a
b
l
e
e
n
e
r
g
y
e
m
p
l
o
y
m
e
n
t
i
n
R
o
m
a
n
i
a
,
"
20
1
7
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
E
l
e
c
t
r
o
m
e
c
h
a
n
i
c
a
l
a
n
d
P
o
w
e
r
S
y
s
t
e
m
s
(
S
I
E
L
M
E
N
)
,
I
a
s
i
,
p
p
.
2
8
1
-
285
,
2017
.
[20]
B.
S.
Chouhan
,
K.
V.
S.
R
ao
an
d
B.
Kum
ar
Sax
ena
,
"Reduc
ti
on
in
c
arb
on
diox
i
de
emiss
ions
due
to
wind
power
gene
ra
ti
on
in
In
dia
,
"
2017
In
te
r
nati
onal
Conf
er
enc
e
On
Smar
t
Technol
ogi
es
Fo
r
Smar
t
Nati
on
(
Sma
rtT
ec
hCon)
,
Banga
lor
e, pp. 2
57
-
264
,
2017
.
[21]
R.
Muzz
amm
el
,
“
Tra
vel
ing
W
av
es
-
Based
Metho
d
for
Fault
Est
i
m
at
ion
in
HV
DC
Tra
nsm
ission
S
y
stem,”
Ene
rgi
es
,
vol.
12
,
p
p
.
3614
-
36
45
,
2019
.
[22]
R.
Muzz
amm
el
,
“
Mac
hine
Le
a
rning
Based
Fa
ult
Diagnosis
i
n
HV
DC
Tra
ns
m
ission
Li
nes,
”
INTAP
2018:
Inte
lligen
t
Techn
ologi
es
and
Applicat
ions
,
vol
.
93
2,
pp
.
496
-
510
,
Marc
h
2019
.
[23]
R.
Muzz
amm
el
,
“
Restri
ct
ed
Bolt
zmann
Mac
hin
es
Based
Faul
t
Est
imati
on
in
Multi
Te
rm
ina
l
HV
DC
Tra
nsm
ission,”
pr
ese
nte
d
a
t
th
e Inte
lligen
t
T
ec
h
nologi
es
and
Ap
pli
c
at
ions,
Bah
a
walpur
,
pp
.
1
–
20
,
2019
.
[24]
R.
Muzz
amm
el
,
H.
M.
Fate
h
and
Z.
Ali,
"A
naly
tical
beh
avi
our
of
th
y
rist
er
base
d
HV
DC
tra
ns
m
is
sion
li
nes
unde
r
norm
al
and
fau
lty
condi
t
ions,"
2018
Inte
rnational
Confe
renc
e
on
Engi
nee
ri
ng
and
Eme
rgi
ng
Technol
ogies
(
ICEE
T
)
,
La
hor
e
,
pp
.
1
-
5
,
2018
.
[25]
R.
Muzz
amm
el
and
U.
Ta
hir
,
"
Anal
y
tical
behaviour
of
l
ine
asy
m
m
et
r
ie
s
in
th
ree
ph
ase
powe
r
s
y
stems
,
"
201
7
Inte
rnational
Sy
mpos
ium
on
Rec
ent
Adv
anc
es
in
El
e
ct
rica
l
Eng
in
ee
ri
ng
(
RA
E
E)
,
I
slamabad, pp. 1
-
5
,
2017
.
BIOGR
AP
H
I
ES
OF
A
UTH
ORS
Rah
ee
l
Muz
z
a
mme
l
re
ceive
d
his
B.
Sc.
E
lectr
ic
a
l
Engi
n
ee
ring
Degre
e
from
Depa
rtment
o
f
El
e
ct
ri
ca
l
Engi
n
ee
ring
at
Unive
rsit
y
of
Engi
ne
e
ring
and
Techn
olog
y
,
L
ahor
e
,
Pakista
n
and
M.S
El
ec
tr
ical
E
ngine
er
ing
Degre
e
from
Depa
rt
m
ent
of
El
ec
tr
ical
Engi
n
ee
ring
a
t
Univer
sit
y
of
La
hor
e
,
La
hor
e,
Pakista
n.
Curr
en
tly
he
is
workin
g
as
an
As
sistant
Profess
or
in
the
Depa
rtment
of
El
ectrical
En
gine
er
ing
in
the
Univer
sit
y
of
L
a
hore
,
La
hor
e,
Pa
kista
n.
His
rese
a
rch
int
er
ests
inc
lud
e
power
sy
stems
,
powe
r
s
y
stem pro
te
c
ti
on
and
pow
er el
e
ctronics
.
Rab
ia
Arsh
ad
rec
e
ive
d
the
Ma
sters
degr
e
e
in
el
e
ct
ri
ca
l
engi
n
e
eri
ng
from
the
Univer
sit
y
of
La
hore
,
L
ahor
e
in
2016
foll
owi
ng
her
BS
c.
in
Com
pute
r
Engi
n
ee
ring
from
the
Univer
sit
y
of
Engi
ne
eri
ng
and
Te
chno
log
y
,
L
ahor
e.
Curr
entl
y
he
is
working
as
an
As
sist
ant
Profess
or
in
the
Depa
rtment
of
El
ec
trica
l
Engi
ne
eri
ng
in
the
Univer
sit
y
of
La
hore
,
L
ah
ore
,
Pakista
n
.
She
has
an
expe
rie
n
ce
of
m
ore
tha
n
7
y
e
ars
in
ac
ade
m
ia.
He
r
rese
arc
h
inter
ests
inc
lude
wire
le
ss
sensor
net
work i
n
com
m
unic
at
ion
s
y
st
e
m
s.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Adv
an
ce
d
e
ner
gy man
ag
e
me
nt
syste
m
wi
th t
he
inc
orp
or
ati
on
of
novel
sec
ur
it
y featur
es
(
Ra
heel Mu
zzammel
)
3987
En
gr,
Sab
a
Meh
mood
rec
ei
ved
her
MS
c
degr
e
e
in
E
lectr
i
cal
E
ngine
er
ing
from
Governm
ent
Coll
ege
Univer
sit
y
in
2016
.
S
he
comple
te
d
h
er
gra
du
at
ion
i
n
EE
in
2013
from
FA
ST
LAHO
RE.
She
i
s
cur
ren
t
l
y
servi
ng
as
a
Lectu
rer
in
th
e
Depa
r
tment
of
El
e
ct
r
ic
a
l
Engi
ne
eri
ng
,
The
Univer
sit
y
of
La
hore
,
L
ah
ore
.
She
has
got
four
y
ea
rs
ex
per
ie
n
ce
of
te
a
c
hing
var
ious
El
e
ct
roni
cs
and
Program
m
ing
cour
ses
at
und
e
rgra
duate
l
eve
l
as
well
as
supe
rvising
m
an
y
sem
este
r
proje
c
t
s.
She
has
al
so
Participated
in
Fa
cul
t
y
Dev
el
opm
ent
W
orkshops
and
Se
m
ina
rs
on
Com
m
unic
at
i
on
Scie
n
ce a
nd
S
y
stem.
Dan
ista
Khan
is
pursuing
her
PhD
degr
ee
fro
m
The
Ho
ng
K
ong
Pol
y
technic
Univer
sit
y
.
She
rec
e
ive
d
h
e
r
MS
c
degr
ee
in
El
e
ct
ri
cal
Enginee
ring
from
U
nive
rsit
y
of
Eng
ine
er
ing
and
Te
chno
log
y
in
2
017.
She
comple
te
d
h
er
BS
c
in
E
le
c
tri
c
al
Engi
n
eering
from
the
Univer
sit
y
of
La
hore
in
2013
.
She
has
got
five
y
e
ars
experie
nc
e
of
t
ea
ch
i
ng
var
ious
Elec
troni
cs
and
Te
l
ec
om
m
unic
ation
cour
ses
at un
der
gra
dua
te l
ev
e
l.
Evaluation Warning : The document was created with Spire.PDF for Python.