Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
Smart devices are equipped with multiple authentication techniques and still remain prone to
attacks since all of these techniques require explicit user intervention. The purpose of this paper
is to capture the user behavior in order to use it as an implicit authentication technique.
In this paper, we introduce a novel authentication model to be used complementary to the
existing models; Particularly, the context of the user, the duration of usage of each application
and the occurrence time were examined and modeled using the cubic spline function as an
authentication technique. A software system composed of two software components has been
implemented on Android platform. Preliminary results show a 76% accuracy rate in determining
the rightful owner of the device.
In wireless communications sensitive data is frequently changed, requiring remote authentication. Remote authentication involves the submission of encrypted data, along with visual and audio cues (facial images/videos, human voice etc.). Nonetheless, malicious program and different attacks will cause serious issues, particularly in cases of remote examinations or interviewing. This paper proposes a sturdy authentication mechanism supported semantic segmentation, chaotic cryptography and knowledge concealment. Assuming that user X needs to be remotely documented, initially X’s video object (VO) is mechanically segmental, employing a head and-body detector. Next, one amongst X’s biometric signals is encrypted by a chaotic cipher. Subsequently the encrypted signal is inserted to the most vital riffle coefficients of the VO, victimization its Qualified Significant riffle Trees (QSWTs). QSWTs give invisibility and vital resistance against loss transmission and compression, conditions that area unit typical in wireless networks. Finally, the Inverse distinct riffle rework (IDWT) is applied to supply the stegno-object (SO). Experimental results, regarding: (a) security deserves of the planned cryptography theme, (b) strength to stegno-analytic attacks, to numerous transmission losses and JPEG compression ratios and (c) information measure potency measures, indicate the promising performance of the planned biometrics-based authentication theme.
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
Smart devices are equipped with multiple authentication techniques and still remain prone to
attacks since all of these techniques require explicit user intervention. The purpose of this paper
is to capture the user behavior in order to use it as an implicit authentication technique.
In this paper, we introduce a novel authentication model to be used complementary to the
existing models; Particularly, the context of the user, the duration of usage of each application
and the occurrence time were examined and modeled using the cubic spline function as an
authentication technique. A software system composed of two software components has been
implemented on Android platform. Preliminary results show a 76% accuracy rate in determining
the rightful owner of the device.
In wireless communications sensitive data is frequently changed, requiring remote authentication. Remote authentication involves the submission of encrypted data, along with visual and audio cues (facial images/videos, human voice etc.). Nonetheless, malicious program and different attacks will cause serious issues, particularly in cases of remote examinations or interviewing. This paper proposes a sturdy authentication mechanism supported semantic segmentation, chaotic cryptography and knowledge concealment. Assuming that user X needs to be remotely documented, initially X’s video object (VO) is mechanically segmental, employing a head and-body detector. Next, one amongst X’s biometric signals is encrypted by a chaotic cipher. Subsequently the encrypted signal is inserted to the most vital riffle coefficients of the VO, victimization its Qualified Significant riffle Trees (QSWTs). QSWTs give invisibility and vital resistance against loss transmission and compression, conditions that area unit typical in wireless networks. Finally, the Inverse distinct riffle rework (IDWT) is applied to supply the stegno-object (SO). Experimental results, regarding: (a) security deserves of the planned cryptography theme, (b) strength to stegno-analytic attacks, to numerous transmission losses and JPEG compression ratios and (c) information measure potency measures, indicate the promising performance of the planned biometrics-based authentication theme.
Artificial Intelligence, Machine Learning, Deep Learning and Robot Process Au...Constantinos Galanakis
With the occasion of ACI's Conference DIGITALISATION IN SHIPPING that took place in Hamburg (9th & 10th October 2019) Elvictor presented its IT infrastructure, by illustrating Elvictor's successful story of Digitalisation in Crew Management and Recruitment. The presentation of Constantinos S Galanakis : "Artificial Intelligence, Machine Learning, Deep Learning and Robot Process Automation applied to Crew Recruitment" may be a road map to a successful digital transformation of a crew manager.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Efficient and secure authentication on remote server using stegno video objec...pradip patel
Due to the present increase in world population, people in this world tend to occupy available locations present in any zone which also include zones falling in the high seismic zone categories. The buildings constructed in such zones must be analysed and designed to withstand these earthquakes, along with the cost economy. Bracing systems is very efficient and unyielding lateral load resisting system. Bracing systems serves as one of the component in buildings for increasing stiffness and strength to guard buildings from incidence caused by natural forces like earthquake. Braced frames widen their resistance to lateral forces by the bracing action of inclined members. The braces stimulate forces in the associated beams and columns so that all works like a truss which results in smaller sizes of beam and column sections that turns out to be economical. In this study, G+14 storey building model has been analysed considering “Inverted V” and “V” type RCC bracing system and steel bracing system under seismic loadings using STADD PRO for analysis. Results are concluded by comparison of storey displacement, storey drift and base shear for fixed base building
Contextual Authentication: A Multi-factor ApproachPortalGuard
Increases in roaming user populations and remote access to organizations’ confidential data is becoming a larger security concern, leaving organizations with choices to make about how to secure these resources. A conflict of interest between business groups and IT security can create a struggle to maintain usability while increasing security. Although instituting better password policies is a preliminary option, organizations are often over steering towards rigid two-factor authentication solutions.
http://www.portalguard.com
Automated Detection of Session Fixation VulnerabilitiesYuji Kosuga
Session fixation is a technique for obtaining the visitor's session identifier (SID) by forcing the visitor to use the SID supplied by the attacker. The attacker who obtains the victim's SID can masquerade as the visitor. In this paper, we propose a technique to automatically detect session fixation vulnerabilities in web applications. Our technique uses attack simulator that executes a real session fixation attack and check whether it is successful or not. In the experiment, our system successfully detected vulnerabilities in our original test cases and in a real world web application.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Confident Technologies provide out-of-band, multifactor authentication using a highly secure and easy-to-use, image-based approach. Learn more at www.confidenttechnologies.com
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
Final Year Project Ideas for Computer Science Students, These Projects helps students to enhance their Expertise in the area of Information Security + they would be able to understand the concept of Information Security
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Artificial Intelligence, Machine Learning, Deep Learning and Robot Process Au...Constantinos Galanakis
With the occasion of ACI's Conference DIGITALISATION IN SHIPPING that took place in Hamburg (9th & 10th October 2019) Elvictor presented its IT infrastructure, by illustrating Elvictor's successful story of Digitalisation in Crew Management and Recruitment. The presentation of Constantinos S Galanakis : "Artificial Intelligence, Machine Learning, Deep Learning and Robot Process Automation applied to Crew Recruitment" may be a road map to a successful digital transformation of a crew manager.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Efficient and secure authentication on remote server using stegno video objec...pradip patel
Due to the present increase in world population, people in this world tend to occupy available locations present in any zone which also include zones falling in the high seismic zone categories. The buildings constructed in such zones must be analysed and designed to withstand these earthquakes, along with the cost economy. Bracing systems is very efficient and unyielding lateral load resisting system. Bracing systems serves as one of the component in buildings for increasing stiffness and strength to guard buildings from incidence caused by natural forces like earthquake. Braced frames widen their resistance to lateral forces by the bracing action of inclined members. The braces stimulate forces in the associated beams and columns so that all works like a truss which results in smaller sizes of beam and column sections that turns out to be economical. In this study, G+14 storey building model has been analysed considering “Inverted V” and “V” type RCC bracing system and steel bracing system under seismic loadings using STADD PRO for analysis. Results are concluded by comparison of storey displacement, storey drift and base shear for fixed base building
Contextual Authentication: A Multi-factor ApproachPortalGuard
Increases in roaming user populations and remote access to organizations’ confidential data is becoming a larger security concern, leaving organizations with choices to make about how to secure these resources. A conflict of interest between business groups and IT security can create a struggle to maintain usability while increasing security. Although instituting better password policies is a preliminary option, organizations are often over steering towards rigid two-factor authentication solutions.
http://www.portalguard.com
Automated Detection of Session Fixation VulnerabilitiesYuji Kosuga
Session fixation is a technique for obtaining the visitor's session identifier (SID) by forcing the visitor to use the SID supplied by the attacker. The attacker who obtains the victim's SID can masquerade as the visitor. In this paper, we propose a technique to automatically detect session fixation vulnerabilities in web applications. Our technique uses attack simulator that executes a real session fixation attack and check whether it is successful or not. In the experiment, our system successfully detected vulnerabilities in our original test cases and in a real world web application.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Confident Technologies provide out-of-band, multifactor authentication using a highly secure and easy-to-use, image-based approach. Learn more at www.confidenttechnologies.com
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
Final Year Project Ideas for Computer Science Students, These Projects helps students to enhance their Expertise in the area of Information Security + they would be able to understand the concept of Information Security
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
CLUSTERING DATA STREAMS BASED ON SHARED DENSITY BETWEEN MICRO-CLUSTERSNexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Emr a scalable graph based ranking model for content-based image retrieval .LeMeniz Infotech
Emr a scalable graph based ranking model for content-based image retrieval .
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Presentazione mostra immigrazione madiba - per le scuole bambini di 8-10anniEros Campofiloni
Presentazione su immigrazione, multiculturalità, pace. preparata per bambini della 3-4-5 classe della scuola primaria.
Traccia da utilizzare per coinvolgere i bambini favorendone la partecipazione e gli interventi.
Wave 3 - When Did We Start Trusting Strangers | UM | Social Media TrackerUM Wave
Wave 3 - When did we Start Trusting Strangers charted the democratisation of influence, how social media was driving greater means and opportunity for consumers to influence their peers.
Find the latest Wave, "Wave 7 - Cracking the Social Code" here http://www.slideshare.net/Wave7
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
Cost effective authentic and anonymous data sharing with forward security
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Anonymous two factor authentication in distributed systems certain goals are ...LeMeniz Infotech
Anonymous two factor authentication in distributed systems certain goals are beyond attainment
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Cost effective authentic and anonymousnexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A fast acquisition all-digital delay-locked loop using a starting-bit predict...LeMeniz Infotech
A Fast-Acquisition All-Digital Delay-Locked Loop Using a Starting-Bit Prediction Algorithm for the Successive-Approximation Register
This brief presents a fast-acquisition 11-bit all-digital delay-locked loop (ADDLL) using a novel starting-bit prediction algorithm for the successive-approximation register (SBP-SAR). It can effectively eliminate the harmonic lock and the false lock. The achievable acquisition time is within 17.5-23.5 or 17.5-32.5 clock cycles when the ADDLL works at the low or high clock rate, respectively. The digital-controlled delay line and the SBP-SAR of the ADDLL chip are synthesized using Taiwan Semiconductor Manufacturing Company's (TSMC's) 0.18-μm CMOS cell library. The proposed ADDLL can operate at a clock frequency from 60 MHz to 1.1 GHz.
Web : http://www.lemenizinfotech.com
web : http://www.lemenizinfotech.com/vlsi-ieee-projects-2016-2017/
Web : http://ieeemaster.com
Web : http://ieeemaster.com/vlsi-ieee-projects-2016-2017/
Address: 36, 100 Feet Road Near Indira Gandhi Statue, Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 0413 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
A fast fault tolerant architecture for sauvola local image thresholding algor...LeMeniz Infotech
A Fast Fault-Tolerant Architecture for Sauvola Local Image Thresholding Algorithm Using Stochastic Computing
Binarization plays an important role in document image processing, particularly in degraded document images. Among all local image thresholding algorithms, Sauvola has excellent binarization performance for degraded document images. However, this algorithm is computationally intensive and sensitive to the noises from the internal computational circuits. In this paper, we present a stochastic implementation of Sauvola algorithm. Our experimental results show that the stochastic implementation of Sauvola needs much less time and area and can tolerate more faults, while consuming less power in comparison with its conventional implementation.
Web : http://www.lemenizinfotech.com
web : http://www.lemenizinfotech.com/vlsi-ieee-projects-2016-2017/
Web : http://ieeemaster.com
Web : http://ieeemaster.com/vlsi-ieee-projects-2016-2017/
Address: 36, 100 Feet Road Near Indira Gandhi Statue, Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 0413 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
A dynamically reconfigurable multi asip architecture for multistandard and mu...LeMeniz Infotech
A Dynamically Reconfigurable Multi-ASIP Architecture for Multistandard and Multimode Turbo Decoding
The multiplication of wireless communication standards is introducing the need of flexible and reconfigurable multistandard baseband receivers. In this context, multiprocessor turbo decoders have been recently developed in order to support the increasing flexibility and throughput requirements of emerging applications. However, these solutions do not sufficiently address reconfiguration performance issues, which can be a limiting factor in the future. This brief presents the design of a reconfigurable multiprocessor architecture for turbo decoding achieving very fast reconfiguration without compromising the decoding performances.
Web : http://www.lemenizinfotech.com
web : http://www.lemenizinfotech.com/vlsi-ieee-projects-2016-2017/
Web : http://ieeemaster.com
Web : http://ieeemaster.com/vlsi-ieee-projects-2016-2017/
Address: 36, 100 Feet Road Near Indira Gandhi Statue, Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 0413 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Interleaved digital power factor correction based on the sliding mode approachLeMeniz Infotech
Interleaved Digital Power Factor Correction Based on the Sliding-Mode Approach
This study describes a digitally controlled power factor correction (PFC) system based on two interleaved boost converters operating with pulsewidth modulation (PWM). Both converters are independently controlled by an inner control loop based on a discrete-time sliding-mode (SM) approach that imposes loss-free resistor (LFR) behavior on each cell. The switching surface implements an average current-mode controller so that the power factor (PF) is high. The SM-based digital controller is designed to operate at a constant switching frequency so that the interleaving technique, which is recommended for ac-dc power conversion systems higher than 1 kW, can be readily applied. An outer loop regulates the output voltage by means of a discrete-time proportional-integral (PI) compensator directly obtained from a discrete-time small-signal model of the ideal sliding dynamics. The control law proposed has been validated using numerical simulations and experimental results in a 2-kW prototype.
Web : http://www.lemenizinfotech.com
web : http://www.lemenizinfotech.com/tag/ieee-projects-in-pondicherry/
Web : http://ieeemaster.com
Web : http://ieeemaster.com/power-electronics-ieee-projects-2016-2017/
Web : http://ieeemaster.com/power-system-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Bumpless control for reduced thd in power factor correction circuitsLeMeniz Infotech
Bumpless Control for Reduced THD in Power Factor Correction Circuits
It is well known that power factor correction (PFC) circuits suffer from two fundamentally different operating modes over a given AC input cycle. These two modes, continuous conduction mode (CCM) and discontinuous conduction mode (DCM), have very different frequency-response characteristics that can make control design for PFC circuits challenging. The problem is exacerbated by attempts to improve efficiency by dynamically adjusting the PWM switching frequency based on the load. Adjusting the PWM frequency based on the load limits controller bandwidth and restricts dynamic performance. Prior work has made use of multiple controllers, however, they have not addressed the discontinuity (bump) that exists when switching between controllers. In this paper, bumpless controllers will be synthesized for a 750 watt, semi-bridgeless PFC for the CCM-DCM operating modes.
Web : http://www.lemenizinfotech.com
web : http://www.lemenizinfotech.com/tag/ieee-projects-in-pondicherry/
Web : http://ieeemaster.com
Web : http://ieeemaster.com/power-electronics-ieee-projects-2016-2017/
Web : http://ieeemaster.com/power-system-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
A bidirectional single stage three phase rectifier with high-frequency isolat...LeMeniz Infotech
A bidirectional single-stage three-phase Rectifier with high-frequency Isolation and power factor Correction
This paper proposes a single-stage three-phase rectifier with high-frequency isolation, power factor correction, and bidirectional power flow. The presented topology is adequate for dc grids (or smart-grids), telecommunications (telecom) power supplies, and more recent applications such as electric vehicles. The converter is based on the three-phase version of the dual active bridge (DAB) associated with the three-state-switching cell (3SSC), whose power flow between the primary and secondary sides is controlled by the phase-shift angle. A theoretical analysis is presented and validated through simulation and experimental.
Web : http://www.lemenizinfotech.com
web : http://www.lemenizinfotech.com/tag/ieee-projects-in-pondicherry/
Web : http://ieeemaster.com
Web : http://ieeemaster.com/power-electronics-ieee-projects-2016-2017/
Web : http://ieeemaster.com/power-system-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
A bidirectional three level llc resonant converter with pwam controlLeMeniz Infotech
A Bidirectional Three-Level LLC Resonant Converter With PWAM Control
This paper proposes a bidirectional three-level LLC resonant converter with a new pulse width and amplitude modulation control method. With different control signals, it has three different operation modes with different voltage gains. Therefore, it can achieve wide voltage gain range by switching among these three modes, which is attractive for energy storage system applications needing wide voltage variation. The proposed topology operates with constant switching frequency, which is easy to implement with digital control, and it can achieve soft switching for all the switches and diodes in the circuit as a conventional LLC resonant converter. The performance of the proposed converter is validated by the experimental results from a 1-kW prototype with 20 A maximum output current.
Web : http://www.lemenizinfotech.com
web : http://www.lemenizinfotech.com/tag/ieee-projects-in-pondicherry/
Web : http://ieeemaster.com
Web : http://ieeemaster.com/power-electronics-ieee-projects-2016-2017/
Web : http://ieeemaster.com/power-system-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Efficient single phase transformerless inverter for grid tied pvg system with...LeMeniz Infotech
Efficient Single Phase Transformerless Inverter for Grid-Tied PVG System With Reactive Power Control
There has been an increasing interest in transformerless inverter for grid-tied photovoltaic (PV) system due to low cost, high efficiency, light weight, etc. Therefore, many transformerless topologies have been proposed and verified with real power injection only. Recently, almost every international regulation has imposed that a definite amount of reactive power should be handled by the grid-tied PV inverter. According to the standard VDE-AR-N 4105, grid-tied PV inverter of power rating below 3.68KVA, should attain power factor (PF) from 0.95 leading to 0.95 lagging. In this paper, a new high efficiency transformerless topology is proposed for grid-tied PV system with reactive power control. The new topology structure and detail operation principle with reactive power flow is described. The high frequency common-mode (CM) model and the control of the proposed topology are analyzed. The inherent circuit structure of the proposed topology does not lead itself to the reverse recovery issues even when inject reactive power which allow utilizing MOSFET switches to boost the overall efficiency. The CM voltage is kept constant at mid-point of dc input voltage, results low leakage current. Finally, to validate the proposed topology, a 1 kW laboratory prototype is built and tested. The experimental results show that the proposed topology can inject reactive power into the utility grid without any additional current distortion and leakage current. The maximum efficiency and European efficiency of the proposed topology are measured and found to be 98.54% and 98.29%, respectively.
Web : http://www.lemenizinfotech.com
Web : http://ieeemaster.com
Web : http://www.lemenizinfotech.com/power-system-ieee-projects-2016-2017/
Web : http://ieeemaster.com/power-system-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Highly reliable transformerless photovoltaic inverters with leakage current a...LeMeniz Infotech
Highly Reliable Transformerless Photovoltaic Inverters With Leakage Current and Pulsating Power Elimination
This paper presents a transformerless inverter topology, which is capable of simultaneously solving leakage current and pulsating power issues in grid-connected photovoltaic (PV) systems. Without adding any additional components to the system, the leakage current caused by the PV-to-ground parasitic capacitance can be bypassed by introducing a common-mode (CM) conducting path to the inverter. The resulting ground leakage current is therefore well controlled to be below the regulation limit. Furthermore, the proposed inverter can also eliminate the well-known double-line-frequency pulsating power that is inherent in single-phase PV systems. By properly injecting CM voltages to the output filter capacitors, the pulsating power can be decoupled from the dc-link. Therefore, it is possible to use long-lifetime film capacitors instead of electrolytic capacitors to improve the reliability of the PV system. The mechanism of leakage current suppression and the closed-loop control of pulsating power decoupling are discussed in this paper in detail. A 500-W prototype was also built and tested in the laboratory, and both simulation and experimental results are finally presented to show the excellent performance of the proposed PV inverter.
Web : http://www.lemenizinfotech.com
Web : http://ieeemaster.com
Web : http://www.lemenizinfotech.com/power-system-ieee-projects-2016-2017/
Web : http://ieeemaster.com/power-system-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Grid current-feedback active damping for lcl resonance in grid-connected volt...LeMeniz Infotech
Grid-Current-Feedback Active Damping for LCL Resonance in Grid-Connected Voltage-Source Converters
This paper investigates active damping of LCL-filter resonance in a grid-connected voltage-source converter with only grid-current feedback control. Basic analysis in the s-domain shows that the proposed damping technique with a negative high-pass filter along its damping path is equivalent to adding a virtual impedance across the grid-side inductance. This added impedance is more precisely represented by a series RL branch in parallel with a negative inductance. The negative inductance helps to mitigate phase lag caused by time delays found in a digitally controlled system. The mitigation of phase-lag, in turn, helps to shrink the region of nonminimum-phase behavior caused by negative virtual resistance inserted unintentionally by most digitally implemented active damping techniques. The presented high-pass-filtered active damping technique with a single grid-current feedback loop is thus a more effective technique, whose systematic design in the z-domain has been developed in this paper. For verification, experimental testing has been performed with results obtained matching the theoretical expectations closely.
Web : http://www.lemenizinfotech.com
Web : http://ieeemaster.com
Web : http://www.lemenizinfotech.com/power-system-ieee-projects-2016-2017/
Web : http://ieeemaster.com/power-system-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Delay dependent stability of single-loop controlled grid-connected inverters ...LeMeniz Infotech
Delay-Dependent Stability of Single-Loop Controlled Grid-Connected Inverters with LCL Filters
LCL filters have been widely used for grid-connected inverters. However, the problem that how time delay affects the stability of digitally controlled grid-connected inverters with LCL filters has not been fully studied. In this paper, a systematic study is carried out on the relationship between the time delay and stability of single-loop controlled grid-connected inverters that employ inverter current feedback (ICF) or grid current feedback (GCF). The ranges of time delay for system stability are analyzed and deduced in the continuous s-domain and discrete z-domain. It is shown that in the optimal range, the existence of time delay weakens the stability of the ICF loop, whereas a proper time delay is required for the GCF loop. The present work explains, for the first time, why different conclusions on the stability of ICF loop and GCF loop have been drawn in previous studies. To improve system stability, a linear predictor-based time delay reduction method is proposed for ICF, while a time delay addition method is used for GCF. A controller design method is then presented that guarantees adequate stability margins. The delay-dependent stability study is verified by simulation and experiment.
Web : http://www.lemenizinfotech.com
Web : http://ieeemaster.com
Web : http://www.lemenizinfotech.com/power-system-ieee-projects-2016-2017/
Web : http://ieeemaster.com/power-system-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Connection of converters to a low and medium power dc network using an induct...LeMeniz Infotech
Connection of Converters to a Low and Medium Power DC Network Using an Inductor Circut
This paper describes an alternative to connect power converters to a direct-current network with an inductor circuit. The circuit allows the connection of converters through a coil and avoids short-circuit currents with different instantaneous values of voltage output. A description of the calculation and the choice of components together with a real implemented example in a dc network within Smart City project (Endesa Utility) is presented
Web : http://www.lemenizinfotech.com
Web : http://ieeemaster.com
Web : http://www.lemenizinfotech.com/power-system-ieee-projects-2016-2017/
Web : http://ieeemaster.com/power-system-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Read2 me a cloud based reading aid for the visually impairedLeMeniz Infotech
Read2Me A Cloud based Reading Aid for the Visually Impaired
Web : http://www.lemenizinfotech.com
Web : http://ieeemaster.com
Web : http://www.lemenizinfotech.com/android-ieee-projects-2016-2017-2/
Web : http://ieeemaster.com/android-ieee-projects-2016-2017/
Address: 36, 100 Feet Road(Near Indira Gandhi Statue), Natesan Nagar, Pondicherry-605 005
Contact numbers: +91 95663 55386, 99625 88976 (0413) 420 5444
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Context based access control systems for mobile devicesLeMeniz Infotech
Context based access control systems for mobile devices
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
Android security a survey of issues, malware penetration, and defensesLeMeniz Infotech
Android security a survey of issues, malware penetration, and defenses
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
A location and diversity-aware news feed system for mobile usersLeMeniz Infotech
A location and diversity-aware news feed system for mobile users
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.