Articles

  1. SENSORLESS CONTROL OF VSI FED PMSM FOR HIGH SPEED OPERATIONS USING SVPWM METHODDownload Article

    M.Sakthi,R.Prabhakaran

    Abstract

    close

    The objective of this project is to investigate the sensorless control methods for PM Synchronous machines. A sensor less method of high speed control is proposed based on the modulation of Space Vector Pulse Width Method. The conventional control scheme has some problems such as low efficiency, low switching frequency and switching losses. In order to avoid the above mentioned problems, VSI FED PMSM sensor less control is implemented. In addition SVPWM technique provides flexible control of output voltage and output frequency for Permanent Magnet Synchronous Machines. This Space Vector Modulation is implemented to prevent the distortion due to low switching frequency. A detailed study and analysis regarding the influence of low switching frequency, frequency loss and efficiency is carried out. It is found that, by using the proposed scheme and modulation scheme and by the proper control of VSI fed PMSM can be estimated for sensor less operations. Experimental results are provided to verify the proposed control method. Index Terms: Current-source converter (CSC), high frequency(HF) injection (HFI) methods, high-power drives, interior permanent magnet (IPM) synchronous machine, medium-voltage drives, zero-speed sensor less control methods.

  2. INVESTIGATION OF MACHINING ON BRASS ROD WITH ALUMINIUM NITRATE INSERTDownload Article

    M. Sengottaiyan,A.B.Prabhurajaa,S.Prakash,V.Rajkumar,M.Sathish

    Abstract

    close

    This study presents an experimental investigation on surface roughness of a hardened material (brass) machined by using aluminum nitrate coated insert. The process parameters considered for this experimental work are cutting speed (m/min), Feed (mm/rev) and Depth of cut (mm). By varying these parameters, surface roughness is calculated using surface roughness tester. The experimental results are then optimized using Taguchi analysis-L27 array method. The results revealed that surface roughness was greatly influenced by the feed rate rather than the cutting speed and depth of cut for AlN coated insert. Keywords: Turning, Brass, Surface roughness, Taguchi Analysis

  3. HARMONICS REDUCTION USING NEURO FUZZY CONTROLLER FOR GRID CONNECTED DOUBLY FED INDUCTION WIND GENERATORSDownload Article

    P.T.Supriya, M.Nandhini

    Abstract

    close

    This paper proposes a new computational control strategy. The control and analysis of Doubly Fed InductionGenerators (DFIG) based wind turbines have been proposed. The dynamic modelling of DFIG wind turbine has been carried out at first with the conventional control strategies for both rotor side and grid-side converters. However, the conventional control strategies have their own limitations such as power control at very high wind speed or turbulence, unable to control harmonics within the permissible values and instability issues at critical conditions. These limitations are overcome by Neuro Fuzzy Control Algorithm. A DFIG consists of a wound rotor induction generator with its stator windings. The principle of the DFIG is that rotor windings are connected to the grid via slip rings and back-to-back voltage sourceconverter that controls both the rotor and the grid currents. A Neuro Fuzzy Control schemewas presented where the harmonics was controlledto independently improvethe generated active and reactive power as well as the rotor speed to track the maximum wind power point. The simulation results indicate that the active and reactive powers in the system are controlled effectively to maintain the grid power constant. This is primarily due to the many advantages doubly-fed induction generators offer over other types of generators in applications where the mechanical power provided by the prime mover driving the generator varies greatly. The control strategy is developed and simulation studies are carried out in MATLAB/Simulink.

  4. SPEED CONTROL OF BLDC MOTOR BY USING UNIVERSAL BRIDGE WITH FUZZY BASED TECHNIQUEDownload Article

    S.REMOADAIKALARAJ, S.SASIKUMAR

    Abstract

    close

    The adaptive and non adaptive nonlinear back stepping control approach for a BLDC motor drive is discussed and analyzed. Then, the sensorless method advances are reviewed and recent developments in this area are introduced with their inherent advantages, including the analysis process of practical implementation issue and its applications. The study includes a depth overview of state of-the art back EMF sensing methods, which includes the Terminal Voltage Sensing (TVS), Third Harmonic Voltage Integration (THVI), Terminal Current Sensing, Back-EMF Integration and PWM strategies. The experimental results carried from prototyping platform are given to illustrate the efficiency methods and benefits of the proposed approach and the various stages of implementation of this structure in FPGA. Keywords: BLDC Motor, PMSM Motor, Fuzzy Logic, Sliding Mode Control.

  5. DIRECT TORQUE & INDIRECT FLUX CONTROL OF BLDC MOTORDownload Article

    S.Vengatesh,S.Vijayakumar

    Abstract

    close

    The reduction of torque ripples is achieved by suppressing error between command and estimated torque. The conduction and commutation controller controls the torque instantaneously. The instantaneous control achieved with torque controller and torque estimator. The PI controller and back EMF feed forward controller controls the high torque in conduction region and by controlling out going phase the torque ripples are reduced in commutation region. To regulate BUCK BOOST Converter during commutation output of commutation ripple controller used. The sensorless control applied to detect position of the rotor through optimizing current and reducing torque pulsation. This is the advanced method of Field Oriented Control (FOC) of BLDC motor for non sinusoidal back EMF rotor speed achieved by Kalman filter. Finally the proposed torque control method is verified through simulation results. The simulation results using Matlab/Simulink are shows the torque ripples are eliminated effectively. Index Terms — BLDC, FOC, Back EMF, BUCK BOOST Converter, PI controller, sensorless control, instantaneous torque control, Torque Ripple reduction

  6. DESIGN AND IMPLEMENTATION OF WIRELESS DATA AQUISITION AND CONTROLLING SYSTEM USING ARM PROCRSSORDownload Article

    D.Lakshminarayana,P.Vaishnavi Devi,B.Venkanna

    Abstract

    close

    In the process of short distance data collection, there have some problems, such as the duplication of work, the complexity of cable connection, the requirement of real time data processing and the electromagnetic interference and so on, so we design the system of data acquisition based on cortex-M3 and virtual instrument. The system uses Cortex-M3 core ARM processor to accomplish the data acquisition of the closed environment, use the serial port module to implement the data transmission, and use the virtual instrument to handle the received data in the host computer. Finally, the test shows that the system with the transmission rate less than 119200bps can ensure the stable and reliable data transmission. The system can be used widely in the wireless data collection, the wireless handheld meter reading and the industrial real time information collection. Keywords: Cortex-M3, Data Transmission, Baud Rate, ARM Processor.

  7. DESIGN AND IMPLEMENTATION OF A CONTROLLING SYSTEM FOR PHYSICAL DISABLED PEOPLEDownload Article

    D.Lakshminarayana,P.Vaishnavi Devi,B.Venkanna

    Abstract

    close

    To issues related to Accessibility, which should eliminate, or at least reduce, the distance between disabled people and technology. However, particularly for severely-impaired persons, there are still many challenges that must be overcome. In this paper we present eye tracking as a valuable support for disability in the accomplishment of hands-free tasks. Moreover, we stress the potentials of eye-based interfaces to enhance the user-machine interaction process in ―traditional‖ activities based on keyboard and mouse. Through the description of some of the projects we have recently developed a robot which can move according to the movements of the eye balls and can be triggered with some actions based on the eyeblinks Keywords: Eye based interfaces, Eye input, Eye tracking, , Eye blinks, Remote signal transfer, Accessibility, PCA (Principal Component Analysis)

  8. FIVE LEVEL FCMLI BASED STATCOM FOR SINGLE MACHINE INFINITE BUS SYSTEMDownload Article

    P.Duraisamy,R.Gandhi

    Abstract

    close

    The flying capacitor multilevel inverter (FCMLI) is a multiple voltage level inverter topology intended for high-power and high-voltage operations at low distortion. It uses capacitors, called flying capacitors, to clamp the voltage across the power semiconductor devices. A method for controlling the FCMLI is proposed which ensures that the flying capacitor voltages remain nearly constant using the preferential charging and discharging of these capacitors. A static synchronous compensator (STATCOM) and a static synchronous series compensator (SSSC) based on five-level flying capacitor inverters are proposed. Control schemes for both the FACTS controllers are developed and verified in terms of voltage control, power control, and power oscillation damping when installed in a single-machine infinite bus (SMIB) system. Simulation studies are performed using PSCAD/EMTDC to validate the efficacy of the control scheme and the FCMLI-based flexible alternating current transmission system (FACTS) controllers. Index Terms: FCMLI, multilevel inverter, power oscillation damping, SMIB, SSSC, STATCOM.

  9. A MULTI-STAGE SOLAR POWER CONVERTER FOR PV-BATTERY SYSTEMDownload Article

    S.Sasikumar, N.Lakshmi

    Abstract

    close

    This paper introduces a new converter called re-configurable solar converter (RSC) for photovoltaic (PV)- battery application, particularly utility-scale PV-battery application. The main concept of the new converter is to use a single-stage three-phase grid-tie solar PV converter to perform dc/ac and dc/dc operations. This converter solution is appealing for PV-battery application, because it minimizes the number of conversion stages, thereby improving efficiency and reducing cost, weight, and volume. In this paper, a combination of analysis and experimental tests is used to demonstrate the attractive performance characteristics of the pro-posed RSC. Index Terms — Converter, energy storage, photovoltaic (PV), solar.

  10. A MODIFIED CONVERTER DESIGN FOR BLDC MOTOR WITH CURRENT FEEDBACK STRATEGYDownload Article

    A.Venkatesh,D.Ranjithpriya

    Abstract

    close

    The paper deals with the director que control (DTC)of brushless DC(BLDC)motor drives fed by four-switch inverters(also known as B4-inverters)rather than six-switch inverters(also known as B6-inverters) in conventional drives. The B4-inverter could be regarded as are configured topology of theB6-inverter in case of as witch / leg failure which represent sacrucialre liability benefit for many applications especially in electric and hybrid propulsion systems. The principle of operation of the BLDC motor is firstly recalled considering both cases of B6- and B4- inverters in the armature, with emphasis on the two-and three-phase conduction modes. Then, the DTC of B4- inverter –fed BLDC motor drives is treated considering three strategies, such as:1)DTC-1:a strategy inspired from the one intended toB6-inverter-fed BLDC motor drives; 2)DTC-2: a strategy that considers a dedicated vectors election sub table in order to independently control the torques developed by the phases connected to the B4-inverter legs during the iris mutinous conduction; and 3) DTC-3: a proposed strategy that elm in a test he torque dip penalizing DTC-2during sector-to-sector commutations. Following the design of the corresponding vector selection tables and sub tables (if any), an experimentally based comparative study of the three DTC strategies is carried out considering, in the first step, the BLDC motor steady-state operation under DTC-1and DTC-3.Then, the comparison is extended to the BLDC motor features during sector-to-sector commutations, under DTC-2 and DTC-3.The experimental results clearly validate the predicted performance of the proposed DTC strategy. Index Terms — B6 and B4 inverters, brushless DC (BLDC) motor, direct torque control (DTC), sector-tosector commutations, two-and three-phase conduction modes.

  11. ADAPTIVE CONTROL OF THREE-PHASE INVERTER FOR AC MOTOR DRIVE FED BY SINGLE-PHASE AC SOURCEDownload Article

    S.Santhakumar,S.Sasikumar

    Abstract

    close

    If a small dc-link capacitor is used in the dc link fed by a single-phase ac source, then the dc-link voltage severely fluctuates at twice of the source frequency. To handle this fluctuation, the concept of ―average voltage constraint‖ is proposed in this study. On the basis of this concept, a flux-weakening scheme, generating the d-axis current reference (irds∗) for the interior permanent-magnet synchronous machine, is devised. The q-axis current reference (irqs∗) is modified for the unity power factor operation in the viewpoint of an ac source without an additional sensor. The proposed scheme has been applied to the inverter-driven 1-kW compressor of an air conditioner. From the experimental results, it has been verified that the compressor operates well at the required operating condition, regardless of the severe fluctuation of dc-link voltage, because of the reduced dc-link capacitance. The frequency spectrum of the ac source current reveals that the harmonics of the source current meet the regulation of IEC 61000-3-2 Class A and that the overall power factor is above 96% without any additional circuit, such as an input filter and a power factor correction circuit. Index Terms: Capacitors, electrolytic capacitor less inverter, flux-weakening operation, harmonics regulation, home appliance, interior permanent-magnet synchronous motor (IPMSM), inverter, power factor, variable-speed drives, voltage constraint.

  12. A SUPPRESSION OF COMMON MODE LEAKAGE CURRENT USING TRANSFORMERLESS INVERTER UNDER ALL ECOLOGICAL CONDITIONSDownload Article

    S.Udhayakumari,S.Vijayakumar

    Abstract

    close

    In order to eliminate the common-mode (CM) leakage current in the transformer less photovoltaic (PV) systems, the concept of the virtual dc bus is proposed in this paper. By connecting the grid neutral line directly to the negative pole of the dc bus, the stray capacitance between the PV panels and the ground is bypassed. As a result, the CM ground leakage current can be suppressed completely. Meanwhile, the virtual dc bus is created to provide the negative voltage level for the negative ac grid current generation. Consequently, the required dc bus voltage is still the same as that of the full-bridge inverter. Based on this concept, a novel transformer less inverter topology is derived, in which the virtual dc bus is realized with the switched capacitor technology. It consists of only five power switches, two capacitors, and a single filter inductor. Therefore, the power electronics cost can be curtailed. This advanced topology can be modulated with the unipolar sinusoidal pulse width modulation (SPWM) and the double frequency SPWM to reduce the output current ripple. As a result, a smaller filter inductor can be used to reduce the size and magnetic losses. The advantageous circuit performances of the proposed transformer less topology are analyzed in detail, with the results verified by a 500-W prototype. Index Terms: Common mode (CM) current, photovoltaic (PV) system, switched capacitor, transformer less inverter, unipolar sinusoidal pulse width modulation (SPWM), virtual dc bus.

  13. A NEW HYBRID TOPOLOGY FOR MULTILEVEL CASCADED INVERTER DESIGN WITH POD MODULATION TECHNIQUEDownload Article

    P.Vidhya,Dr.A.Sabanayagam

    Abstract

    close

    This paper proposes a Phase Opposition Disposition (POD) strategy to achieve balanced line-to-line output voltages and to maximize the modulation index in the linear modulation range where the output voltage can be linearly adjusted in the multilevel cascaded inverter (MLCI) operating under unbalanced dc-link conditions. In these conditions, the linear modulation range is reduced, and a significant output voltage imbalance may occur as voltage references increase. In order to analyze these effects, the voltage vector space for MLCI is evaluated in detail. From this analysis, the theory behind the output voltage imbalance is explained, and the maximum linear modulation range considering an unbalanced dc-link condition is evaluated. After that, a Phase Opposition Disposition strategy is proposed to achieve output voltage balancing as well as to extend the linear modulation range up to the maximum reachable point in theory. In the proposed method, too large of a dc-link imbalance precludes the balancing of the output voltages. This limitation is also discussed. Both the simulations and the experiments for a seven-level phaseshifted modulated MLCI for electric vehicle traction motor drive show that the proposed method is able to balance line-to-line output voltages as well as to maximize the linear modulation range under the unbalanced dc-link conditions. Index Terms: Harmonic injection, multilevel cascaded inverters (MLCIs), neutral voltage modulation (NVM), phase-shifted (PS) modulation, space vector pulse width modulation (PWM) (SVPWM).

  14. ADVANCED METERING INFRASTRUCTURE BASE HOME AREA NETWORK FOR METERING IN SMART GRIDSDownload Article

    A.Vadivel, M.Sundharaperumal

    Abstract

    close

    Compared to the conventional grid, the smart grid requires active participation of consumers to improve the quality and reliability of power delivery. The increase in consumer participation is expected from the advanced metering infrastructure (AMI), commonly known as the smart meter, which has the capability of supporting various functions beyond that of recording energy usage. One of the primary objectives of the AMI is to allow load and cost management for the utility. This is envisioned partly through a communication system implemented between the smart meter and consumer equipment, currently deployed using wireless networking solutions such as ZigBee. Due to the shared nature of the wireless medium, however, these deployments face security challenges and interference issues, which must be addressed, taking into account the interests of both the utility company and the consumer. This work takes a comprehensive look at wireless security in the smart-meter-based home area network scenario and identifies possible vulnerabilities. Subsequently, some countermeasures are developed that can be used by both the utility company and the customer and are integrated into a common framework called Secure HAN that can be agreed to by both. In addition, the experiences from implementing the Secure HAN framework using commercial off-the-shelf hardware are described, including possible challenges. Index Terms—Advanced metering infrastructure (AMI), communications, home area network (HAN), security, smart grids, smart meters (SM).

  15. PERFORMANCE AND ANALYSIS OF SINGLE CYLINDER DIESEL ENGINE USING WATER IN DIESEL EMULSIFIED FUEL WITH REDUCTION OF NOxDownload Article

    S.Mohanraj,C.Thirunavukkarasu,K.Arutselvan

    Abstract

    close

    The emission of pollutants especially particulate matter and nitrogen oxides, generated by the operation of a diesel engine, poses a threat to the ecology of our planet and is detrimental to human health. The application of an emulsification technique to prepare the fuel has been considered to be one of the possible approaches to mwell as the rate of fuel consumption. Water-in-diesel oil emulsified formulations are reported to reduce the emissions of nitrogen oxides (NOX), sulfur oxides (SOX), carbon monoxides (CO), black smokes and particulate matter (PM) without compensating the engine's performance. This paper presents an experimental result carried out to evaluate performance and exhaust gas emissions of a small diesel engine when operated on neat diesel oil and its emulsions with water. Emulsified diesel fuels of 0, 5, 10, 15 and 20 water/diesel ratios by volume, were used in a single cylinder, direct injection diesel engine, operating at 1500rpm. A comparative study involving speed, brake specific fuel consumption (BSFC), brake thermal efficiency, exhausts gas temperature, hydrocarbon (HC), nitrogen oxides (NOX), carbon monoxides (CO), carbon dioxides (CO2) emissions and black smoke opacity can be used without engine modification. Keywords -- Emulsion; Diesel; NOX; Engine; Co

  16. AN EFFICIENT AND SECURE MALICIOUS MODE DETECTION IN MILITARY NETWORKS USING REVOCATION SCHEMEDownload Article

    S. Anubama

    Abstract

    close

    Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Cipher text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. An efficient and secure data retrieval method using CP-ABE has been proposed for decentralized DTNs where multiple key authorities manage their attributes independently. The inherent key escrow problem is resolved such that the confidentiality of the stored data is guaranteed even under the hostile environment where key authorities might be compromised or not fully trusted. In addition, the fine-grained key revocation can be done for each attribute group. Index terms: Disruption-tolerant network (DTN), Cipher text-policy attribute-based encryption (CP-ABE)

  17. DETERMINING PERFORMANCE BY VARYING COMPRESSION RATIO OF DIESEL ENGINE FUELED WITH METHYL ESTER OF RUBBER SEED OILDownload Article

    S.MyilVaganan, C.Thirunavukkarasu,M.E.,

    Abstract

    close

    Now a day’s usage of vehicles are going on increasing as fast as environmental impact and Scarcity of fossil fuel, Dependency of imported fossil fuel which increases GDP of country, we know that India stays 12years behind emission standard compare to Euro Emission norms, to overcome the drawback my focus has gone toward an alternative fuel research and development for biodiesel were going on for past (10-15) years much faster, concept arisen by Rudolph Diesel. He used to practice with Edible Vegetable oil (peanut) ,to reduce the scarcity of food products and to produce biodiesel at cheaper price inedible vegetable oil are chosen to improve performance and better emission compare to diesel, Inedible vegetable oil poses some problem when subjected to prolonged usage in compression ignition engine because of their high viscosity and low volatility. The problem are rectified by converting high viscosity oil into its blend (or) ester, Rubber seed oil contains high acid content to reduce acid content two Esterification process are carried out (Acid and Alkaline Esterification) ,It has been Experimentally proved that biodiesel at lower blends B5,B10,B15 increase the Brake Thermal efficiency, By Varying compression ratio(VCR) fuel consumption are reduced ,By Exhaust Gas Recirculation (EGR) NOx emissions are reduced which is most common problem occurs by using biodiesel and other Exhaust gas Emissions are also reduced, The experimental results proved that the use of biodiesel (produced from unrefined rubber seed oil) in compression ignition engines is a viable alternative to diesel without engine modification. Keywords: Rubber seed oil; Biodiesel; Esterification; Variable compression ratio (VCR); Exhaust Gas Recirculation (EGR)

  18. CREDENCE BASED RELIABLE ROUTING FOR MULTIHOP WIRELESS NETWORKSDownload Article

    S.Ramnivash M.E, V.M. Arul M.E

    Abstract

    close

    In a multihop wireless network (MWN), the packets from a source node are relayed through a large number of intermediate nodes before they are delivered to the destination. But such relaying of other’s packets will consume valuable resources of these intermediate nodes such as their energy and computing power. That being so, some nodes usually referred to as selfish nodes may not cooperate in relaying other’s packets and at the same time they make use of other cooperative nodes to relay their own packets. In such a situation some incentive mechanisms are used to stimulate these selfish nodes to cooperate. For that a protocol is proposed here which not only stimulates the node cooperation and also establishing stable routes. Simulating node cooperation is achieved using incentive credit approach followed by processing the payment receipts to evaluate the node’s packet relay probabilities in terms of trust values and thus stable routes are established through the highly trusted nodes. KEYWORDS – Cooperation incentive scheme, Network-level security, Payment Schemes, and Selfishness attacks.

  19. SIMULATION OF SOFT-SWITCHED POWER FACTOR CORRECTION WITH ZVS TWO-SWITCH FORWARD CONVERTER USING MATLAB Download Article

    S.Vijayakumar

    Abstract

    close

    A soft-switched continuous-conduction-mode boost power factor correction front-end converter with an integrated zero-voltage-switched two-switch forward second-stage converter is introduced. In the proposed approach, a single transformer is commonly used by the two stages to provide isolation of the power supply and soft switching of all semiconductor switches including a controlled di/dt turn-off rate of the boost rectifier. The performance of the proposed approach was evaluated on a 150-kHz, 430-W/12-V, and universal-line range prototype converter with Mat Lab Software. Index Terms—Boost converter, magnetic integration, power factor correction (PFC), two-switch forward converter, zero voltage switching (ZVS), Mat Lab Software.

  20. REPLICA ALLOCATION OVER A MOBILE AD HOC NETWORK BY HANDLING SELFISHNESSDownload Article

    S.Mohan Prasad

    Abstract

    close

    In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partition or performance degradation. Several data replication techniques have been proposed to minimize presentation degradation. Most of them assume that all mobile nodes work together fully in terms of sharing their memory space. In reality, however, some nodes may uncaringly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. In this paper, we examine the collision of selfish nodes in a mobile ad hoc network from the perspective of replica allotment. We term this selfish replica allocation. In particular, we develop a selfish node finding algorithm that considers partial selfishness and novel replica allocation technique to properly cope with selfish replica allocation. The conducted simulations demonstrate the proposed approach outperforms conventional cooperative replica allocation techniques in terms of data accessibility, statement cost, and average query delay. Index Terms— Mobile ad hoc networks, degree of selfishness, selfish replica portion.

  21. SEMANTIC ENHANCED WEB-PAGE RECOMMENDATION BASED ON ONTOLOGY USING WEB USAGE MININGDownload Article

    1M.N.Shrigowtham, 2S.Kavitha

    Abstract

    close

    Web-page recommendation plays an important role in smart Web systems. It not only reduces the Web traffic, but also gives effective personalized Web-page recommendation for every user. Effective knowledge discovery from Web usage data and attaining exact knowledge representation are typical task. This paper proposes a novel method to provide better Web-page recommendation through semantic enhancement based on knowledge representation model using domain and Web usage knowledge. An ontology based model was proposed to represent the domain knowledge, which is a powerful way of knowledge representation using today in many Websites. Finally, Web usage data founded from Web log file was integrated with the domain knowledge representation model to provide effective Web-page recommendation. Keywords- Knowledge representation, Ontology, Web usage mining, Web-page recommendation

  22. A FRAMEWORK TO CREDIT CARD ENDORSEMENT USING FINGERPRINT FOR AUTHENTICATION COMBINED WITH SSO PROTOCOL IN CLOUDDownload Article

    1Ms. V.Karunya, 2Dr. S. Prabhadevi

    Abstract

    close

    Cloud computing is one of the emerging technologies, that takes network users to the next level. Cloud is a technology where resources are paid per usage rather than owned. One of the biggest challenges in this technology is Security. Though users use service provider’s resources, there is a great level of reluctance from users’ end because of significant security threats packed with this technology. Research in this core has provided a number of solutions to overcome these security barriers; each of these has its own pros and cons. This paper brings about a new model of a security system where in users are to provide multiple biometric finger prints during enrolment for a service. These templates are stored at the cloud provider’s end. The users are authenticated based on these finger print templates which have to be provided in the order of random numbers that are generated every time. Both finger prints templates and images provided every time are encrypted for enhanced security. When working with credit card transaction SSO solutions allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. We build on proxy signature schemes to introduce the public key cryptographic approach to single sign-on frameworks, which represents an important milestone towards the construction of provably secure single sign-on application for online transaction. Key Words: cloud computing- biometrics- security- Finger prints – templates- encryption- SSO

  23. IDENTIFYING SPECIALITY IN SENTIMENT ANALYSIS VIA INHERENT AND EXTERNAL DOMAIN RELEVANCEDownload Article

    1S.Veeramani, 2S.Karuppusamy

    Abstract

    close

    Opinion mining (also known as sentiment analysis) aims to analyze people’s opinions, sentiments, and attitudes facing entities such as products, services, and their attributes. Information retrieval is the process of extracting the information’s based on the occurrences of the terms in the document. We discuss about the method to identify features from online reviews by extracting the difference opinion feature statistics across two different large numbers of documents namely domain specific corpus and domain independent corpus. Defining a set of syntactic dependence rules, we extract the list of candidate opinion features from the domain review corpus. For each extracted candidate feature, we estimate a Intrinsic domain relevance, which represents the statistical association of the candidate to the given domain corpus. The Extrinsic domain relevance, which reflects the statistical relevance of the candidate to the domain independent corpus. The candidates with IDR scores exceeding a predefined intrinsic relevance threshold and EDR scores less than another extrinsic relevance threshold are confirmed as valid opinion features. Keywords: Opinion mining, sentiment analysis, corpus selection, feature extraction, sentiment classification.

  24. DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FOR CLOUD COMPUTING ENVIRONMENTDownload Article

    1B.Uvaraja, 2Dr.N.Shanthi

    Abstract

    close

    This work proposes a Dynamic resource allocation method for Cloud computing. Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Users can set up and boot the required resources and they have to pay only for the required resources. Thus, in the future providing a mechanism for efficient resource management and assignment will be an important objective of Cloud computing. In this project we propose a method, dynamic scheduling and consolidation mechanism that allocate resources based on the load of Virtual Machines (VMs) on Infrastructure as a service (IaaS). This method enables users to dynamically add and/or delete one or more instances on the basis of the load and the conditions specified by the user. Our objective is to develop an effective load balancing algorithm using Virtual Machine Monitoring to maximize or minimize different performance parameters(throughput for example) for the Clouds of dSSifferent sizes (virtual topology de-pending on the application requirement). We develop a set of heuristics that prevent overload in the system effectively while saving energy used. It trace driven simulation and experiment results demonstrate that our algorithm achieves good performance.

  25. PRIVACY PRESERVATION IN BIG DATA USING ENHANCED TOP-DOWN SPECIALIZATION APPROACHDownload Article

    1S.Sivasankar, 2T.Prabhakaran

    Abstract

    close

    Data size has grown a large in present years by the development of internet in large manner so that big data era arrives, with the cloud computing users able to store large amount of data in ease manner. Users now use both thestructured data and as well as unstructured data.In big data due to its large size all the tasks are consuming more amount of time. The internet users also share their private data like health records and financial transaction records for mining or data analysis purpose during that time data anonymization is used for hiding identity or sensitive intelligence so that data owners do not suffer with economical loss. Anonymizing large scale data within a short span of time is a challenging task to overcome that Enhanced Top – Down Specialization approach (ETDS) can be developed which is an enhancement of Two – Phase Top Down Specialization approach (TPTDS). Key words: BigData, Cloud Computing, Data anonymization, ETDS, TPTDS.

  26. DOUBLE KEY SEEDS BASED PRIVACY PRESERVING DATA MINING APPROACH FOR ENHANCED REVERSIBLE DATA HIDINGDownload Article

    1R.Kavitha, 2D.Vanathi, 3Dr.P.Sengottuvelan

    Abstract

    close

    The ultimate goal of Privacy Preserving Data Mining is to develop efficient algorithms that allow one to extract relevant knowledge from large amount of data, while preventing sensitive information from disclosure or inference. Several data mining algorithms, incorporating privacy preserving mechanisms, have been developed over the last years. There is an emerging need of synthesizing literature to understand the nature of problem and evaluate the relative performance of different approaches. In the proposed privacy optimal aggregation (POA) method, the original data is perturbed and embedded with a fragile watermark to accomplish privacy preserving and data integrity of mined data and to recover the original data. This technique is a high quality reversible method with crypto analysis for data embedding. A Special case of information hiding is digital watermarking poses double key distribution for data recovery process. The proposed method is for protecting privacy data as well as preventing illegal users from searching correlation of the distributed data security. KEYWORDS: privacy, watermarking, cryptography, heuristic approach, Privacy Optimal Aggregation

  27. DIFFERENT SECURITY POLICIES IN ANDROID BASED SMARTPHONESDownload Article

    1K.Rajamurugan, 2Prof.K.Gunasekar ME.,(PhD)

    Abstract

    close

    Nowadays Smartphone is an effective tool for increasing the productivity of business user. With their increasing computational power, storage and capacity of smartphones allow end users to perform several tasks and always be updated while they on the move. Companies are eager to footing employee-owned smartphones because of the growing productivity of their employees. Still, security responsibilities about data distribution, leakage and loss have blocked the adoption of smartphones for corporate use. In MOSES, a policy-based framework for implementing software isolation of operations and data on the Android platform and it’s possible to specify specific Security Profiles within a single smartphone. Each security profile is identified with a set of policies that control the access to operations and data. Profiles are not predefined or hard coded and they can be named and tested at any time. One of the main aspects of MOSES is the dynamic switching from one security profile to another. We run a accurate set of analysis using our full performance of MOSES. The results of the analysis certify the feasibility of our proposal. Intex Terms-- Android security, context policy, smartphone security.

  28. SECURITY ENHANCEMENT FOR EFFICIENT ROUTING IN MANETDownload Article

    1R.Arthi, 2E.Padma, 3Dr.N.Shanthi

    Abstract

    close

    Mobile ad hoc networks (MANETs) are a dynamic network in which the mobile node does not have any infrastructure. Link breakages exist due to its high mobility of nodes which leads to frequent path failures and route discoveries. The neighbor coverage and probabilistic mechanism significantly decreases the number of retransmissions so as to reduce the routing overhead. Since security is also a challenging factor in adhoc networks a concept of secured efficient routing is included with NCPR which enables a new trust approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate and prevent flooding attacks in an ad hoc environment. All the nodes in an ad hoc network are categorized as friends, acquaintances or strangers based on their relationships with their neighboring nodes. During network initiation all nodes will be strangers to each other. A trust estimator is used in each node to evaluate the trust level of its neighboring nodes. This approach combines the advantages of the neighbor coverage knowledge and the probabilistic mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and improve the security. Specifically, throughput and packet delivery ratio can be improved significantly. Keywords - Bandwidth-constrained, security, Unicasting, Multicasting.

  29. AN EFFICIENT DISCOVERY OF HIGH UTILITY ITEMSETS FROM TRANSACTIONAL DATABASEDownload Article

    1B.Sangameshwari, 2P. Uma

    Abstract

    close

    There are gathering of methods, methodologies and novel zones of the examination which are important and stamped as the crucial field of data mining Advancements. Different MNC's and unfathomable affiliations are worked in better places of the interesting nations. Each one spot of operation may make far reaching volumes of data. Corporate manager oblige access from every such source and take pivotal choices .The data movement center is utilized inside the essential business respect by enhancing the sufficiency of administrative choice making. In a faulty and to a great degree intense nature's turf, the estimation of essential data structures, for case, these are easily seen however in today the earth, sufficiency or rate is by all record by all record by all account not the only key for forcefulness. This sort of colossal measure of data's are accessible as tera- to peta-bytes which has without a doubt changed in the extents of science and building. To take a gander at, manage and settle on a choice of such sort of huge measure of data that oblige structures called the information mining which will changing in different fields. This paper presents degree of the information mining which will obliging in the business enclosure. Index Terms— Data mining, Business Intelligence, Data mining Methods, Data mining applications, Data Mining Tools, Educational Data Mining, Knowledge Discovery.

  30. AN IMPROVED RESOURCE SCHEDULING FOR VIRTUAL MACHINES IN CLOUD DATA CENTERS USING QUALITY OF SERVICEDownload Article

    1V.Manimaran, 2S.Prabhu, 3Dr.N.Sengottaiyan

    Abstract

    close

    Cloud computing grants business clients to scale up and down their resource usage based on their needs. Many of the touted benefits in the cloud model come from resource multiplexing through virtualization concepts. Dynamic consolidation of virtual machines (VMs) is an effective approach to improve the utilization of resources and energy efficiency in cloud data centers. Finding out when it is best to reallocate VMs from an overfull host is an aspect of dynamic VM consolidation that directly influences the reserve exploitation and quality of service (QoS) delivered by the system In this paper, we introduces VM Migration and optimal precedence, a technique that obviously migrates only the working set of an idle VM and support green computing by optimizing the number of servers in use. We use the maximum precedence algorithm to reduce the trouble in virtual machine. We develop a set of heuristics that put off trouble in the system efficiently while saving energy used. KEYWORDS: Cloud Computing, Resource Management, Virtualization, Green Computing.

  31. IMPLEMENTATION OF SOLAR BASED BIDIRECTIONAL DC-DC CONVERTER WITH ZVS USING PMDC MOTORDownload Article

    1R. Parimala, 2A. Venkatesh

    Abstract

    close

    In this project presents a new non conventional energy source based bidirectional dc/dc converter for transfer the power in both directions. The nonconventional source of solar energy with Maximum Power Point Tracking is used to avoid the demand of electric power, which is inexhaustible and non pollution .The maximum power point traction is the combination of switch mode converter and Controller, which is used for extract the maximum power from the solar panel i.e., combination of boost converter and incremental conductance algorithm. Incremental conductance is one of the important techniques in this system and because of its higher steady-state accuracy .The output voltage of boost converter is stored in battery. A low cost, soft switched, isolated bidirectional dc/dc converter using only four switches was proposed for interconnect between two dc buses. That battery is connected to source side of bidirectional dc/dc converter and load side of bidirectional dc/dc converter is connected to the PMDC motor. Main concept in this project is transfer the power from source side to the load side and vice versa through the same bidirectional dc-dc converter and reverse power is stored in battery when PMDC motor acts as a generator. In the proposed system reduced the number of switch and used zero voltage switch are introduced, which is also used to improve the efficiency of bidirectional dc/dc converter and reduced switching loss, switching stress, easier thermal management. The results of proposed system are validated using MATLAB/Simulink. Keywords - Bidirectional DC/DC converter; boost converter; Maximum Power Point Tracker (MPPT); incremental algorithm; zero voltage switching (ZVS); permanent magnet dc motor(PMDC).

  32. EFFICIENT ENERGY AWARE CLUSTER AND LOADBALANCING IN MOBILE ADHOC NETWORKSDownload Article

    1T.Pavithra, 2Dr.S.Karthik M.E, PhD

    Abstract

    close

    Routing is the process of selecting the best path in the network. Here it is focused on routing layer in order to increase the performance of the system. An Energy Aware Clustered algorithm based Routing is introduced which forms several clusters, finds energy aware node-disjoint multiple routes from a source to destination and increases the network life time by using optimal routes. Clustering is an important research area in mobile networks because it improves the performance of flexibility and scalability when network size is huge with high mobility. All mobile nodes operate on battery power hence the power consumption becomes an important issue in Mobile Network. Through the simulation with an enhanced version of NS-2 simulator Energy Aware Clustered algorithm shows the improvement in throughput, Energy Consumption and delay when compared to other algorithms. Keywords— Mobile adhoc networks, load balancing, cluster,nodes, Energy.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"