Seminar Topic and Report on Speaker Recognition System

Introduction to Speaker Recognition System  Seminar Topic:

The process of speaker recognition is to identify the voice of the speaker and this process is divided into two parts identification of speaker and recognition of speaker. After verifying the voice waves the access to the services is controlled. These are most used in the areas such as financial companies, telephone shopping, database services, computers remote access and information areas. Presently most of the customers have started using the voice recognition cards with sprints.

This technology of speaker recognition has become an important part for the creation of novel services as these make life easier and more secured. The other important place where the technology of speaker recognition used is in the Forensic department. This technology has made prominent place in the field of research from so many decades. The main feature of the speech recognition is the extraction of the categorization problem and this is to reduce the input vector dimensionally.

Later the raised cosine window was called as the Hamming window. Hamming window’s equation is discussed below, the value of the window function is zero for the chosen interval. Which means the function that is zero in other places and stable in the interval is called as the rectangular window. The main aim of the speaker recognition must be capable of eliminating the distribution probability of the vectors. This deals with the quantizing and distribution of the feature vectors.

As storing of each and every vector is not possible it is suggestible to quantize the features of the vector and this is called as the vector quantization and this is the process of considering huge vectors for the production of the small vectors for the distribution. 

Download  Seminar Topic and Report on Speaker Recognition System .

SMS through Temperature Monitoring Project Abstract

Introduction to SMS through Temperature Monitoring Project:

Now days the technology is growing at very fast rate. Scientists are developing many technical things such as sensors, which developing at very fast rate in the world. The waste development in sensors will go to bring a revolutionary impact around the world. Now a day’s technology has became a part of human life. After few all works of human being will be done by machines which will sensors in them which will sense the need of human being. Today various types of sensors are present in the world which can be classified as wired and wireless sensors. Wired sensors use wire for connection and the other i.e wireless doesn’t uses wire for connection.

            The wired sensors read the information from the system and stores there values in some storage device. The presence of internet all around the world makes the sensor possible to transfer the values fro source location to the destination but there still some places in the world which lacks internet access. In research on present eco system, it has found that the buildings are too far from each other so it takes a long hour to transfer.

If the distance is more than the sensors values which are available in it, going to be reduce the needed values. Due to the increase in the cell phone service, the use of short message service (SMS) is also increased. Users transfer the data by using this service that is SMS from a remote location very easily.

This data can be transferred to the sever which make the data easily accessible from person who have access to the internet from a computer anywhere and at anytime. It generally uses GSM modem which is connected to microcontroller which has temperature sensor and connected to LCD.

 Download  SMS through Temperature Monitoring Project Abstract .

Latest ECE Seminar Topic on Smart Card for Network Security

Introduction to Seminar Topic on Smart Card for Network Security:

Network technology means preventing the misuse of computer by providing some security. Now a days it is not very difficult to hack any website or our personal ID. To prevent such hackers we must be careful while providing security to our personal ID. We must use hard and long password with too many combinations of alphabets and small letters and capital letters. We must change it regularly and avoid setting any name as password as they are very easy to detect.

We should use the cryptography technique for providing security to our text. It is a technique that converts our text in to the unreadable text for any outsider.

Smart card looks like a simple card but it consist of embedded microprocessor under the gold pad. It also has the identification of the user. This 8 bit microprocessor has three types of memory for different purpose like: ROM, non-static RAM and EEPROM. Their cards are made of silicon chip which cannot be bend. This smart card consists of key stored with the help of cryptography technique.

Attacks:The key is stored in the EEPROM of the microprocessor so it can be erased with small voltage drop across the microcontroller of the card. Because of these reasons some security sensors are used that create alarm in such conditions. They are called logical attacks.If we cut the chip from the card with the help of knife then we dip into the nitric acid until the silicon surface is visible. Then it can also be attacked directly or exposing the EEPROM in the UV light and so on. These types of attack are physical attack.

Now the ATM magnetic cards are being replaced by smart card for greater security as they can store the information of any person also.

 Download  Latest ECE Seminar Topic on Smart Card for Network Security.

ECE Seminar Topic on Network Security Using Cryptography

Introduction to Network Security Using Cryptography  Seminar topic:

Kerberos is known for network authentication system or authorization system that can be implementing between any networks which may be even unauthenticated. Kerberos works on the principle of Key distribution model produced by theNeedhamand Schroeder. The communication over the networks needs to be proving identity by any user to avoid the replay attacks. It has been using the Cryptography systems like DES for maintaining Data stream integrity and Secrecy. Data stream integrity is to identify the modifications and Secrecy is to avoid the unauthorized accessing. 

The process involves the changing of the plain text into Cipher text which is called Encryption. Whereas the opposite is called Decryption. Cryptography is followed with four principles:

  1. Confidentiality is to maintain the information hiding to un-authorized accessing.
  2. Integrity is the key that aims to unchanged information during storage or transit between the users.
  3. Non-repudiation is to clear the intentions of the developer or sender of the information that cannot be neglected.
  4. Authentication of the sender and the receiver to prove one another identity to access information. 

The above mentioned procedures and protocols are known as Cryptography. 

Kerberos has mainly users and services as principals along with tickets which is used to prove one another and secret or private Cryptographic key for safe communication to other principal. The ticket is a chain of some hundred bytes that are embedded in other end network protocol which allows applying the protocol to make confirm the identity of the principals. 

Kerberos is an idea for mutual authentication and safe communication within the principals in the open network with the help of providing the secret keys to other principal to navigate via network. Kerberos are not involved in password validation so care has to be taken for the individual network to access.

Download  ECE Seminar Topic on Network Security Using Cryptography .

Electrical seminar topic and Report on Neural Network Applications

Introduction to Neural Network Applications Seminar Topic:

This paper discussed about the importance of chaos theory and how to use the chaos theory in system load forecasting.  Short-term load forecasting is completed by using the load data of Shaanxi province power grid of China.  Artificial Neuron Network (ANN) structure is determined by embedding dimension. ANN is established based on chaos theory and applied into the power system Train and forecast can be done with the help of improved back propagation algorithm (BP) which developed based on genetic algorithm (GA). 

Overview: 

Chaos thery is used to analyze the characters of load time series and employed in power system forecasting.  Many non-linear time series forecasting models are developed based on chaos theory and those are used for power short-term load forecasting. Few of the popular models which are applied to power system load forecasting are regression model, fuzzy logic model, expert system model, time series model and grey-theory model. 

Application and Analysis: 

Standard BP neural network method uses uncertain structure of BP neural network in order to forecast the next-hour load. The results yield by BP is not very accurate and also not so quick.  But by using the chaotic characters of the power load time series, the structure of BP network will get determined then the accuracy in BP network results will get improved. BP neural network model using chaotic characters of the power load time series is more effective in short-term power load forecasting when compared to that of classical standard BP neutral network model. 

Conclusion: 

 All the characters of chaos are exists in power load time series and these are chaotic and nonlinear.  Precision and accuracy of a power load forecasting system is increased greatly by introduced chaos theory in power load forecasting system. BP neural network, developed based on chaos theory which is used for forecasting to in order to increase the accuracy and the training rate.

Download Electrical seminar topic and Report on Neural Network Applications .

ECE Seminar Topic on Evolution of Embedded System

Introduction to Evolution of Embedded System Seminar Topic:

This paper is about the embedded system also discussed about the benefits, types and trends of embedded systems.

Innovation of Embedded:

Embedded system is a single chip which includes both hardware and software components. Microprocessor exists in embedded system as hardware and the memory part of the embedded systems consists of programs or procedures to be executed. The software exists in embedded system can alter these programs as per requirements at any time. As microprocessor is integrated with memory in this system, there is a possibility of processing data at high speed, reliability and flexibility. After developing a chip with inbuilt memory and intelligence basis, philips has released its products by including embedded technology.

Overview – Embedded Systems:

Autonomous, Real-Time, Networked and mobile are the four categories of an embedded system. Standalone mode device can be called as Autonomous. Time-based systems are Real-Time systems. Networked systems are useful to monitor other system and send corresponding data to a centralized system for clear monitoring. Mobile gadgets will be helpful to store database locally to their memory.

Embedded, Real-Time and mobile operating systems occupy less memory and satisfied more user requirements.  Application functioning dictates what processor need to be used in an Embedded system. Internal memory of an embedded system is sufficient for small applications and external memory will be helpful for the remaining requirements. Failure percentage of this system is negligible and it is around 1%. This embedded system consumes very low power. 

Conclusion:

The embedded system is a boon for a modern gadget in terms of reliability, flexibility, high speed and less failure percentage. Embedded systems are user-friendly; these will be helpful for the users who have issues of using PC-based equipments. Simply connecting or placing the sensors to peripheral devices as per requirement for giving input in order to get the required output. Embedded systems reduce the maintenance cost and other hidden costs when compared to that of conventional systems. 

Download ECE Seminar Topic on Evolution of Embedded System .

ECE Seminar Topic and Report on Military Radars

Introduction to Military Radars Seminar Topic:

This paper is discussed about “Military Radars” , its features, benefits and also its operations.  Military Radars are useful to give warning or altering Weapon control functions.

Features and Advantages:

Deployment of Military Radar will takes place within minutes. Military Radars (MR) will be useful to both air space users and air defenders by minimizing mutual interference of tasks, which will intern helpful to show effectiveness in combined combat operations. It will work in all-weather conditions. It is capable of handling multiple targets and engagements. MR has fast reaction time in between target detection and fire moment. It helps to reduce the stress under pressure due to having low manning requirements and also it is easy to operate MR’s. It will provide unlimited single air defense weapons with target data and also have a capability of flexible weapon integration. Military Radars have an excellent target discrimination and exact tracking due to its high resolution.

System configuration:

Radar group, Shelter and Motor Generator are three parts of Military Radar system.

How to operate the RADAR:

The following sequence is the work flow of a Military Radar system:

  1. Target detection by Radar.
  2. Track initiation and identification.
  3. Automatic target tracking and IFF status.
  4. Target track data and put it in the encoded message.
  5. Message transmitted to weapon systems.

At the other end the below functions will take place:

  1. Message send by Radar will be decoded and parallax correction will takes place.
  2. Threat evaluation and display of results as advice
  3. Target selection. Target tracking, fire control and weapon aiming
  4. Firing at target.

Conclusion:

During Wartime, Military radars are very useful and these can be used for exact target detection and firing. A threat evaluation program exists in Radar system helps to

Puts the target in a threat sequence automatically, and suggests the military crew about which

Target need to be engaged first.  A radar system is reliable and simple to operate and the maintenance cost of this system is also low.

 Download ECE Seminar Topic and Report on Military Radars .

Seminar Report on Wireless Charging Of Mobile Phones Using Microwaves

Introduction to Wireless Charging Of Mobile Phones Using Microwaves Seminar Topic:

The fact that mobile phones work on batteries makes them vulnerable to charging once the batteries get drained. The rate at which batteries drain depends on the manufacturers of both batteries and mobiles. Batteries get drained as we talk, how it would be if we reverse this process. Using microwaves mobile phone can be recharged.

The mobile towers transmit microwave with the message/data signal. These microwaves can be used to charge the mobiles by using a guided antenna at a frequency of 2.45 Mhz, sensor, Rectenna and a filter circuit which can be fitted to the regular handset. With this setup the phone automatically gets charged as you talk.

Microwaves are most suitable for data transmission because they can penetrate any obstacles and in all weathers. Microwaves are used in remote sensing, data transmission from space, communication industry and cooking. These radiations are sometimes considered as harmful. We use S band spectrum which is license free and reserved especially for industrial, scientific and medical purposes and also for Bluetooth and wireless LAN.

Magnetron is a device which uses both magnetic field and electric field is produced perpendicular to each other thereby magnetic field is constantly applied along the axis of the device.

A rectenna is a special type of rectifying antenna which converts microwave energy into DC current. We can achieve 90% efficiency using this antenna. This antenna can be constructed by placing a schottky diode between dipoles of antenna. A sensor simply senses when a mobile is used for talking.

The advantages are elimination of different types of chargers; one microwave transmitter serves all service providers in that area and recharging of mobiles without any wires. Few disadvantages are ill effects on human body and not much advancement in practical implementation commercially. 

 Download Seminar Report on Wireless Charging Of Mobile Phones Using Microwaves .

Seminar Report on Wearable Computers

Introduction ot Wearable Computers Seminar Topic:

Cellonics Technology Modems

All communications such as LAN, WAN, wired Internet, wireless internet, telecommunications work using modems. Modem is basically a device which modulates and demodulates carrier signal with digital information. The speed of data transfer depends on the speed of modem capacity. Hence there is a need to develop high speed modems to cater for present days technologies where millions of terra bytes of data will be transferred every second. Cellonics is the technology which will solve our problems.

Cellonics technology modems are based on biological cell communication system which is 1000 times faster than traditional modems. This technology is simple, robust and user friendly.

As this technology is based on human cell behavior it is studied that human cells generates a waveform in response to actions these wave forms are serial pulses separated by periodic silence. Cellonics technology duplicates the same process and applies to communications.

Working of Cellonics: – this element takes slow analog signal as input and in gives predictable, fast pulse as output thereby encoding digital information and transferring it over communication channels. In building Cellonics Nonlinear Dynamical Systems (NDS) employs mathematical formulations which are needed to simulate the cell responses. Being nonlinear system the performance exceeds the normal limits and simultaneously simplifies implementation process. Cellonics technology is mostly used in service industry of telecommunications.

There are many advantages in using Cellonics in communication systems. It saves chip/PCB real estate there by simplifies receiver implementation by 4 times. Savings on power by 3 times because of using few components that are passive and consumes less power. Savings on implementation time is possible because of elimination of many sub components such as amplifier, mixer, PLL, oscillator, filter, crystal quartz, etc. in order to build your product which is small, powerful, long on power and low cost employing or using Cellonics technology is ideal.

 Download Seminar Report on Wearable Computers  .

ECE Seminar Topic on Washout Control For Manual Operations and Seminar Report

Introduction to Washout Control For Manual Operations Seminar Topic:

In this world there are many systems that are to be controlled every day. We may call a mechanical, electrical, electronic and hydraulic based or for that matter anything as a system and the means to control such system can be called as control system. A control system can be manual or a device used to regulate behavior of a system using some commands.

There are mainly 2 types of controls linear and non-linear controls. Manual controls come under non-linear controls where an operator opens or closes a valve of hydraulic press. Under linear controls a feedback loop will be running for sensing the working of a machine and if any deviations the system automatically sends the correcting measures and the system is controlled.

During manual controlling of a machine due to vibrations caused by manual movements there will be undesired results. To remove these vibrations in manual manipulation we have various techniques such as giving the feedback to the system with delayed feedback and washout filters. The main feature in this technique is use of steady state blocking zeros by feedback controller at zero frequency. This process is employed will remove any difference in steady state input.

Though this system is effective but is very complex to design because of the closed-loop systems continuous change in feedback control. It can be considered that washout filter is a high-pass filter which removes steady state input. This is used in real life power systems. For the closed-loop identification we use SSARX method also known as closed-loop subspace identification method.

To demonstrate this control system we experiment by manual controlling an inverted pendulum. Here on a moving cart a pendulum is attached and the cart is manipulated by an operator so that the pendulum remains balanced and stands still. With the use of our washout control the vibrations are successfully suppressed in manual control system.

Download ECE Seminar Topic on Washout Control For Manual Operations and Seminar Report.