714 research outputs found

    Voice Based Biometric System Feature Extraction Using MFCC and LPC Technique

    Full text link
    Now a day, interest in using biometric technologies for person authentication in security systems has grown rapidly.Voice is one of the most promising and mature biometric modalities for secured access control this paper gives an experimental overview of techniques used for feature extraction in speaker recognition. The research in speaker recognition have been evolved starting from short time features reflecting spectral properties of speech low-level or physical traits to the high level features (behavioral traits) such as prosody, phonetic information, conversational patterns etc. first give a brief overview of Speech processing and voice biometric relation and then describe some feature extraction technique. We have performed experiment for feature extraction of MFCC, LPC techniques

    Optimizing Traversing and Retrieval Speed of Large Breached Databases

    Full text link
    Breached data refers to the unauthorized access, theft, or exposure of confidential or sensitive information. Breaches typically occur when malicious actors or unauthorized users breach secure systems or networks, resulting in compromised personally identifiable information (PII), protected or personal health information (PHI), payment card industry (PCI) information, or other sensitive data. Data breaches are often the result of malicious activities such as hacking, phishing, insider threats, malware, or physical theft. The misuse of breached data can lead to identity theft, fraud, spamming, or blackmailing. Organizations that experience data breaches may face legal and financial consequences, reputational damage, and harm to their customers or users. Breached records are commonly sold on the dark web or made available on various public forums. To counteract these malicious activities, it is possible to collect breached databases and mitigate potential harm. These databases can be quite large, reaching sizes of up to 150 GB or more. Typically, breached data is stored in the CSV (Comma Separated Value) format due to its simplicity and lightweight nature, which reduces storage requirements. Analyzing and traversing large breached databases necessitates substantial computational power. However, this research explores techniques to optimize database traversal speed without the need to rent expensive cloud machines or virtual private servers (VPS). This optimization will enable individual security researchers to analyze and process large databases on their personal computer systems while significantly reducing costs

    A Novel Method to Estimate Base Drag and Burn Time from Flight Data Using Extended Kalman Filter

    Get PDF
    Estimating highly spinning projectiles’ base drag and burn time by static trials is challenging. Drag profiles obtained using numerical methods or experimental or wind tunnel estimations should be updated using the estimates obtained from dynamic flight test data. This paper proposes a novel methodology to estimate the base drag and burn time from flight data using an extended Kalman Filter. Trajectory positional data is used to calculate base drag and indirect measurement of burn time. The simulation is carried out for two cases, artillery shell and rocket. The proposed method works well for both cases. Exhaustive simulation results indicate that the technique can be used for any configuration. Estimating both base drag and burn time is within 5 % accuracy

    Field Oriented Controlled Speed Sensorless Control of Induction Motors

    Get PDF
    In this paper, a special class of adaptive control system, model reference adaptive controller (MRAC) for the speed estimation of the field oriented controlled (FOC) induction motor drive is presented. The proposed MRAC is formed using instantaneous and steady-state values of tuning signal insynchronously rotating reference frame, which is a fictitious quantity and has no physical significance. Requirement of no additional sensors makes the drive suitable for retrofit applications. The proposed MRAC-based speed sensorless field oriented controlled induction motor drive estimation technique has been simulated in MATLAB/SIMULIN

    MRAS Based Speed Identification for Sensorless Field Oriented Controlled Induction Motor with online Identification of Stator Resistance

    Get PDF
    This paper presents a new online method of estimating the stator resistance of an induction motor simultaneously with the motor rotor speed for effective implementation of rotor field oriented control technique. Knowledge of stator resistance is required for the correct operation of speed sensorless control of the induction motor in low speed region. Since stator resistance varies with drive operating conditions, stable operation in low speed requires an appropriate on-line estimator for the stator resistance. The paper proposes the stator resistance and rotor speed estimation algorithm based on rotor flux based MRAS in a systematic manner. It enables the correct speed estimation and stable drive operation at low speed. The proposed parallel speed with stator resistance estimator is verified by MATLAB/SIMULINK simulation. A simulation result shows the robustness and accuracy of the proposed method and good speed tracking capability and fast responses have been achieved

    IN-SITU ASSESSMENT OF PHENOTYPIC DIVERSITY IN CAJANUS SCARABAEOIDES (L.)THOUARS

    Get PDF
    In-situ assessment of phenotypic diversity in 13 wild populations of Cajanus scarabaeoides (L.) Thouars were carried out in five districts of Vidharbha region of Maharashtra state, India. Significant variability in qualitative traits ranging from stem pigmentation (light green, green to purple and some accessions turned even red during maturity), flower pattern (sparse to medium streaks on yellow flower) and seed coat colour (brown, mottled to black) were observed. Plant height ranged from 80.0-190.0 cm, number of branches per plant (3.0-10.0), pod length (1.7-3.0 cm), pod width (0.7-1.0 cm), number of seeds per pod (4.0-6.0), number of pods per plant (5.7- 30.0) and 100 seed weight (1.47-3.02g). Promising lines were identified for select traits which can be utilized in pigeonpea crop improvement programme. For example, D/G-9, a collection from Gujgawan, Chandrapur district was recorded promising for plant height (190.0 cm), number of seeds per pod (6.0) and number of pods per plant (30.0). DIVA-GIS grid maps were generated to delineate the diversity rich pockets for select quantitative traits. GIS analysis indicated that Northern Vidarbha region was the rich pocket of C. scarabaeoides diversity

    Usulan Pengembangan Layanan Asuransi Marine Cargo Dengan Metode Quality Function Deployment Di PT. Berdikari Insurance Bandung

    Get PDF
    Penelitian ini bertujuan untuk menentukan atribut kebutuhan nasabah yang menggunakan layanan asuransi marine cargo, tingkat kinerja layanan asuransi marine cargo perusahaan dan kompetitor berdasarkan tingkat kepentingan dan kepuasan, atribut yang perlu diprioritaskan dalam rangka meningkatkan kualitas layanan asuransi marine cargo dan memberikan rekomendasi pengembangan layanan asuransi marine cargo sesuai dengan kebutuhan nasabah.Penelitian dilakukan dengan menggunakan metode QFD dengan cara mencari atribut kebutuhan yang akan menjadi prioritas perbaikan dengan melihat aspek tingkat kepentingan dan kepuasan nasabah akan layanan yang diberikan, di mana dilakukan analisis pada iterasi pertama dan interasi kedua QFD.Terdapat sebelas atribut yang diperoleh dari penggalian Voice of Customer, di antaranya yaitu keakuratan dalam penerbitan polis, keakuratan dalam pencairan klaim, kesigapan karyawan, kecepatan dalam penerbitan polis, kecepatan dalam pencairan klaim, kompentensi karyawan, kredibilitas layanan asuransi marine cargo, keamanan barang pertanggungan, komunikasi dengan agen, keramahan karyawan, dan pemahaman karyawan terhadap keinginan nasabah. Dari sebelas atribut tersebut terdapat enam atribut kebutuhan yang memiliki tingkat kepuasan yang lebih rendah dari pada kompetitor.Perumusan rekomendasi mengacu pada prioritas pengembangan. Adapun rekomendasi yang diberikan di antaranya yaitu pembuatan sistem informasi online asuransi marine cargo, pembuatan standar waktu penerbitan polis, rekrutasi karyawan, pemecahan bagian underwriting menjadi dua sub bagian, yaitu completion risk monitoring dan underwriting, training, pre-test, post-test, dan sertifikat training, softcopy buku panduan karyawan, softcopy buku pedoman akseptasi & kebijakan asuransi marine cargo, sertifikat Toefl dan english day. Usulan pengembangan layanan, Asuransi Marine Cargo, QFD (Quality Function Deployment

    Text Extraction System From High As Well As Low Resolution Natural Scene Images

    Get PDF
    In this paper, we propose efficient and sturdy technique for investigating texts in natural scene footage. A fast and effective pruning formula is designed to extract Maximally Stable External Regions (MSERs) as character candidate’s victimization the strategy of minimizing regularized variations. Character candidates form into text candidates by the single-link clump formula, wherever distance weights and clump threshold unit of measurement learned by a completely distinctive self-training distance metric learning formula. The probabilities of text candidates like non-text unit of measurement estimable with a temperament classifier. Text candidates with high non-text probabilities unit of density eliminated and texts unit of measurement acknowledged with a document classifier. Text find in natural scene footage is also an important for several content-based image resolve. Experiments on polyglot, street browse; multi-direction and even born-digital databases conjointly demonstrate the effectiveness of the reposed technique
    corecore