Está en la página 1de 6

ADAPTIVE FUZZY-NEURAL-NETWORK DESIGN FOR VOLTAGE TRACKING CONTROL OF A DC DC BOOST CONVERTER P.Veeraragavan,A.Naraina,R.

Prabath Ranjan Anna University Regional Center Coimbatore veeraragavan.ci@gmail.com narainagoa@gmail.com prabathranjan.ramchetty@gmail.com
ABSTRACT In this study, an adaptive fuzzy-neural-network control (AFNNC) scheme is designed for the voltage tracking control of a conventional dcdc boost converter. First, the description of the circuit framework of a conventional boost converter and system modeling is introduced. Then, a total sliding-mode control (TSMC) strategy without the reaching phase in the conventional SMC is developed for enhancing system robustness during the transient response of the voltage control. In order to alleviate the control chattering phenomena caused by the sign function in the TSMC design and relax the requirement of detailed system dynamics, an AFNNC scheme is further investigated to imitate theTSMClaw for the boost converter. In the AFNNC scheme, online learning algorithms are derived in the sense of Lyapunov stability theorem and projection algorithm to ensure the stability of the controlled system without the requirement of auxiliary compensated controllers despite the existence of uncertainties. The output of the AFNNC scheme can be easily supplied to the duty cycle of the power switch in the boost converter without strict constraints on control parameters selection in conventional control strategies. In addition, the effectiveness of the proposed AFNNC scheme is verified by realistic experimentations, and its advantages are indicated in comparison with the TSMC strategy. Key words: Boost converter, fuzzy neural network (FNN), Lyapunov stability theorem, total sliding-mode control (TSMC), voltage tracking control.

Occluded Face Recognition Via Graph Laplace


A.Sindhuja V. Anusuya , D. Mayuri Velammal College Of Engineering and Technology Abstract Our paper proposes a spectral-graph-based algorithm for repairing the image of the face , which can improve the recognition performance on occluded faces. our algorithm proposed in this paper includes three main procedures: 1) sparse representation ,it is the is able to obtain excellent performances on occluded face recognition. ; 2) imagebased data mining, it is best matched patch for guiding the missing parts on occluded face from images; and 3) graph Laplace, it is proposed for tiny image completion . The main part of the proposed framework is Graph laplace, as named from graphical models and the Laplace equation and can achieve a high-quality repairing of damaged or occluded faces. We apply our face repairing algorithm to produce completed faces, and use face recognition to evaluate the performance of the algorithm. Index Terms Occluded face completion, Face recognition, Graph Laplace.

Adaptive Filters for Acoustic Echo Cancellation by a Computational Efficient Technique


J.Jayaseelan G.Jayanthi Masters of Engineering, Dept.of ECE at Parisutham Institute of Technology & Science, Affiliated with Anna University, Tamil Nadu, India. Email: jayaseelan.j89@gmail.com,jayanthii@rediffmail.com

Abstract- Echo is the time delayed version of the original signal. Acoustic echo results from a feedback path set up between the speaker and the microphone in a mobile phone, hands-free telephone. Etc .Echo can degrade the quality of service in telecommunication. Therefore echo cancellation is an important part of communication systems. Acoustic echo cancellation (AEC) typically requires adaptive filters with thousands of coefficients. In this Paper We Proposed Hirschman Optimal Transform (HOT) based Frequency Domain Adaptive filtering method (FDAF) and DFT-LMS based FDAF for Echo cancellation. These proposed algorithms are compared with Time Domain LMS and NLMS. Simulation and analysis shows that these proposed Frequency domain algorithms find best solution for echo cancellation as it results in a significant reduction in the computational burden compared to Time Domain LMS and NLMS. Key words: AEC, HOT, FDAF, LMS, NLMS.

Authentication Techniques For Engendering Session Passwords With Colors And text
Mrs. B.Muthu Lakshmi Associate Professor- IT, N.Jeyachitra , V.Ilakkiya Devi ,V.Uma Maheswari , S.Shamila Mary Department of Information Technology, A.V.C College of Engineering Mayiladuthurai, Mannampandal -609305
1 2 3 4 5
2

Chithu.kitty@gmail.com Aarthi.jun11@gmail.com umaramanathan42@gmail.com shamilamary26@yahoo.in


3 4 5

ABSTRACT A severe harm to any computing device is the imitation of an authenticate user. The alphanumerical usernames and passwords are most frequently used authentication scheme. Current secure systems suffer from many kind of security attacks. So that, traditional authentication process is replaced by graphical passwords scheme. Although the graphical password schemes provide a user-friendly approach, on adding some security levels, they are sensitive to shoulder surfing. To overcome this issue, colors and images are used to generate the session passwords instead of text, thereby making a stronger authentication. Generally session passwords are those that can be used only once and for every new session, a new password is generated. we have suggested two schemes for generating the session passwords in this paper. This method is most approriate to the PDAs as well as for other computing devices, as it is resistant to shoulder surfing. Keywords Authentication;shoulder surfing; session passwords; pair-based authentication scheme; hybrid textual authentication scheme; draw-a- secret.

Detecting Copy-Paste Forgeries using Transform-Invariant Features


N.Ragmath Nisha,B.Meenatchi,R.Rajasundari,B.Muthulakshmi AVC college of Engineering nisharagmath@gmail.com,meenab.tech25@gmail.com,rajasundarir@gmail.com

ABSTRACT One of the most common types of image forgeries is the copy-paste forgery, wherein a region from an image is replaced with another region from the same image proposes a method for detecting copy-move forgery over images tampered by copy-move. In this project using three step such as feature extraction, feature matching and geometric Transformation estimation to identify the forgeries image. Best bin first is a search algorithm that is designed to efficiently find an approximate solution to the nearest neighbor search problem in very-highdimensional spaces. Best bin first is an approximate algorithm which returns the nearest neighbor for a large fraction of queries and a very close neighbor otherwise .The main issue in directly applying these tools to image forgery detection is that these tools were designed to find duplicate but separate, images, whereas we are trying to find identical regions in the same image. It performs modifications in the feature extraction and matching processes to efficiently detect copy-paste forgeries. The detected region as a mask and repeat the process, thus ignoring the features present within the already detected regions. Finally identify the edit image for entire image in single process.

Dominating Set Based Adaptive Scheduling For Extending Lifetime of Wireless Sensor Networks
P.Kaviya R.Ramalakshmi
1
2

Kalasalingam University, Krishnankoil, Srivilliputtur, India. rama@klu.ac.in,kaviyaap@gmail.com Abstract - An important issue in wireless sensor networks is to prolong network lifetime. Sensors are hard to recharge them since it is battery powered. Network lifetime can be increased by optimizing the energy consumption. Adaptive sensor scheduling is a mechanism used to maximize the network life time. A set of active sensors are chosen to perform sensing and data transferring and the remaining sensors go to sleep to save energy. Another set of active sensors is chosen after sometime. Thus sensors work alternatively to prolong network lifetime. This mechanism uses Connected Dominating Set (CDS). One method to conserve energy is to put sensors to sleep mode when they are not actively participating in sensing and data transferring. Keywords -- wireless sensor networks, Connected Dominating Set, Adaptive Sensor Scheduling, residual energy.

ENERGY EFFICIENT DATA TRANSMISSION IN MOBILE WIRELESS SENSOR NETWORK THROUGH COOPERATIVE COMMUNICATION
S.Saranya P.Deepalakshmi
1
1 2

Kalasalingam University, Krishnankoil, Srivilliputtur, India.


saracs89@gmail.com deepamca79@yahoo.com

Abstract--- Wireless Sensor Network is a dispersed network of sensor nodes for data communication. A new kind of networking called Cooperative Communication has been proposed that enables sensor node to exhibit transmit diversity. It is a simple effective communication for energy-constrained networks in node mobility, which represents a potential candidate to combat the effects of channel fading by exploiting diversity gain achieved via cooperation among the relays nodes. In this paper, the energy efficiency and net reduction of end-to-end delay are planned to achieve by using mobility based-energy efficient cooperative communication (m-EECC) scheme in wireless sensor network in node mobility through simulation. The performance is analyzed and the comparison of cooperative concept in static and dynamic network is done by certain metrics. Keywords-- Cooperative communication, relay selection, energy efficiency, wireless sensor networks, node mobility.

Multipoint Environment for Video File Sharing Using MBoard Technique


Guide Mr. B.N.KARTHIK , Assistant Professor- IT, M.Sangeetha , A.Ramya , S.Saranya , R.Roja Department of Information Technology, A.V.C College of Engineering Mayiladuthurai, Mannampandal -609305
1

Abstract One of the most popular medium to share the ideas and to communicate across the world is the online forums. Nowadays, multimedia contents (e.g., images and videos) are shared increasingly in forums as attachments. In 1990s the server client model was created and has been used in the forum. But this model has begun to fall due to the problem on increasing need of bandwidth and increasing number of people shares more and more multimedia content in the storage area of online Database. We design a scheme to support P2P-based multimedia sharing in forums called Multimedia Board (MBoard). Our evaluation studies utilizing real trace data show that MBoard can significantly reduce the load on the server while maintaining a high quality of service for the users. MBoard utilizes a two-tier DHT network to leverage the stable nodes for content discovery in peers. It greatly reduces the load on the server and achieves high P2P sharing efficiency and low playback waiting time. To multimedia content in a way such that the bandwidth cost will remain within a range acceptable by forum runners and the intensity of server access will not exceed a typical web servers capacity. It enables forums to share multimedia contents in an efficient, low cost and easy-to-use manner.

FINGER MOUSE FOR HUMAN COMPUTER INTERACTION USING HAAR-LIKE FEATURES Badhmapriyaa V. R.Divya, P.S.Abinaya, M.Sivasundaravinayagamoorthy
, A.V.C College of Engineering Priyaavijay13@gmail.com

Abstract: This Paper exhibits a new approach for controlling mouse movement using a real-time camera. We propose to change the hardware design of the mouse. Our method is to use a camera and computer vision technology, such as image segmentation and gesture recognition, to control mouse tasks (Movement, undo, left and right clicking and double-clicking) and it can perform all the operations of the normal mouse. Our new method combines existing techniques of skin color based Region of Interest (ROI) segmentation and Viola-Jones Haar-like feature based object detection to optimize hand gesture recognition for mouse operations. With the help of ROI, hand postures are detected by using Haar-like features and AdaBoost learning algorithm. The systems will show how to build this mouse control system.

PUBLIC VERIFIABILITY AND SECURE DATA DYNAMICS FOR STORAGE IN CLOUD COMPUTING
P.Parvathi S.Kannan
1,
1 2 1,2

Assistant Professor Dept of CSE, M.E Scholar Sudharsan Engineering college, Sathiyamangalam, Pudukkottai, Tanilnadu. Mail_ID: paru_vishva@yahoo.com - skannanbe65@gmail.com

Abstract-Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Several protocols are developed to address the above problem, but most of the protocol does not solve the above problem efficiently. To address this issue, the proposed protocol uses data Integrity checking protocol for RSA based hash function to ensure the data integrity. This proposed protocol also addresses the dynamic storage problem by using merkle hash tree algorithm. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure. Index TermsData Integrity, Data Dynamics, Public verifiability, and Data storage.

MEMBERSHIP SERVICE FOR SELF-REGULATED RECONFIGURABLE LARGE SCALE REPOSITORY SYSTEM

R.Vaishnavi MTECH(AP/IT), S.Ezhilarasi , N.Elakkiya , K.Kalaivani , R.Elavarasi FINAL IT, A.V.C College of Engineering, Mayiladuthurai, TamilNadu Ezhildhara@gmail.com
1 2 3 4

ABSTRACT
Byzantine-fault-tolerant system recovers the faulty nodes robotically and reconfigures the nodes for further process. It uses the two solution to overcome the problems in accessible system. The two solutions are membership service and automatic reconfiguration. The membership service runs mostly automatically to avoid human configurable errors and provides appliance with a sequence of consistent views of the system membership. It provides a service that tracks system membership and sporadically notifies other system nodes of membership changes. The utility of this membership service by using it in a novel distributed hash table called dBQS that provides atomic semantics even across changes in replica sets. They reconfigure the applications automatically and dynamically as system membership changes and reconfigure the Membership service may need to move to a new group of nodes. It gives a complete solution for dynamically changing system membership in a far-reaching Byzantine-fault-tolerant system and that the Membership Service is able to manage a large system and reconfigure in a reasonably short interval of time. The upshot shows membership service is able to manage a large system and the expend to change the system membership is stumpy.

DEFECT TRAJECTORY SYSTEM FOR SOFTWARE DEVELOPMENT ORGANIZATION s.Bharani, K.Ashwini, , M.Sivasundaravinayagamoorthy
, A.V.C College of Engineering Bharanisegar@gmail.com

Abstract:
Defect-tracking system is a web-based application that will help you to keep your projects organized. It can be used for projects that are in development and for projects that are fully developed. It is useful for manager, developer and user alike. Track Defect, track issues and track requests. Track anything and everything that will keep you and your development team organized. Defect-tracking system is versatile. It is a communications tool designed to work for you and your entire team. Defect-tracking system allows you to monitor issue resolution from project conception through full production mode with ease. Search results are displayed in an easy to read, informative table. For your convenience, a complete history of all changes is kept on each issue. Defect-tracking system keeps you and your team members automatically informed. Add issues to your watch list and receive an automatically generated e-mail message when changes occur that affect you. As quickly as Defect or feature requests are submitted to Defect-tracking system, assign them to team member(s), who are informed by automatic e-mail.

Fuzzy PID control control of Permanent Magnet Synchronous Machines


T.Uma Mageshwari , A.Suguna , P.Harikrishnan Anna University, Chennai, Regional Center Coimbatore tmduma@gmail.com a.sugu53@gmail.com
1 2

Abstract - This system proposes the fuzzy PID control of permanent magnet synchronous machines. The control system of Permanent

Magnet Synchronous Machines consists of a speed feedback system, an inverter, a motor, a controller and a speed setting device. Speed controller calculates the difference between the reference speed and the actual speed producing an error, which is given to the PI controller. Speed control of Permanent Magnet Synchronous Machines consist of two loops the inner loop for current and the outer loop for speed. The parameters of fuzzy PID can be adjusted on line which can be changed using fuzzy control rules. This system eliminates the explicit currents loop regulation, simplifies the control structure and no need mathematical model. Index Terms Fuzzy PID Control, Current Loop, Synchronous Machine, Speed, Inverter.

REMOTE ACCESS & DISPLAY FOR CLIENT LEVERAGING MOBILE COMPUTING


B.N.Karthik P.SUBASHINI S.SUGANYA R.RUTHRA M.SUJITHA A.V.C College of Engineering, Mayiladuthurai, Mannampandal 609305, Nagapattinam District, Tamil Nadu. Contact no:9865059097 psubashini37@gmail.com, sureshsuganya21@gmail.com
Abstract:
This project represents how one PC can be controlled from remote place with one smart-phone device with the help of Internet. It means the monitor of PC will be seen in mobile. It turns your phone into a wireless keyboard and mouse with touchpad, using your own wireless network. This application can be performed on android based mobile. It requires server application for your computer. It requires device running on the Android operating system with some sort of wireless connection between them. By getting IP address from the PC and directly browse it on mobile phone. The PC screen will be access on the mobile. It Supports web applications with database for storing the web pages. On Mobile applications retrieves the required data information in certain time interval by connecting with the web server. Able to view your phones screen on your computer monitor which is great for: putting your Android notifications right along the side other notification boxes on your monitor, using it like an on-monitor caller ID, and taking screenshots and screen casts. Remote keyboard/mouse control is great for inputting data on the tiny screen without needing to peck at the on-screen keyboard.

Fuzzy Sliding Mode Control for Uninterruptible Power Supply Inverter


A.Suguna, P.Harikrishnan, T.Uma Mageshwari
Abstract - Uninterruptible Power Supplies (UPS) are emergency power sources, with rapid growth in the use
of high efficiency power converters, more and more electrical loads are nonlinear and generate harmonics. It is a big challenge for a UPS to maintain a high-quality sinusoidal output voltage under a nonlinear load condition. This paper proposes fuzzy sliding mode control of single phase Uninterruptible power supply inverter is introduced. In this method the sliding surface function utilized a time varying slope. The sliding line with the time-varying slope rotates or shift in the phase plane in such a direction that the tracking behaviour of the output voltage is improved during load variations. The time-varying slope is obtained by a simple function which involves the error variables of the system.

Index Terms sliding mode control, Uninterruptible power supply.

También podría gustarte