Professional Documents
Culture Documents
ABSTRACT
The proposed Voice Biometric Security for Industrial control verifies a persons claimed identity on the basis of his/her speech phrases. It is worddependent, which requires the speaker to say key words or sentences having the same words for both enrolling and verifying trials. This system uses template-matching approach to authenticate user. The system processes voice signal of the user, which is given as input and prepares a template by using Mel Frequency Cepstrum Coefficients (MFCC) technique and verifies it with the already existing template by using Vector Quantization (VQ) technique. Then it declares the person as valid person or an imposter depending on the template matching. Once Verification is achieved it allows the user get into a control panel and control LCD device from PC.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
Introduction
1.1 General introduction
The Voice Biometric Security for Industrial control is an application of Biometrics. Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. Much research has been done in the area of speaker verification using cepstral analysis, end point detection algorithms, pattern recognition, neural networks, stochastic models and many-distance measuring algorithms. However as per media reports, the satisfactory performance of the existing systems is still a matter of great concern because of the considerable number of false acceptances and false rejections. Speaker verification is a difficult task and it is still an active research area. A speech technology research center at Sydney University, Australia is actively involved in speech recognition, human speech perception, and natural language processing. Microsoft is also an active participant of speech technology research whose aim is to produce a complete speech enabled computer. To reach this stage, Microsoft is also contributed its research and development in
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
generates a template, which is called a codebook, an array of acoustic vectors. In the enrollment phase the user codebook is saved in the system. In the verification phase the user codebook is compared against the claimed users actual codebook, which is stored in the system during the enrollment phase. If the difference is below the threshold value the user is authenticated else the user is not authenticated.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
1.2
technology, it is necessary to restrict unauthorized access to the systems or to sensitive/personal data. The traditional methods of authentication involving passwords, PIN numbers and tokens have some drawbacks. Because PINs and passwords may be forgotten, and token-based methods of verification like passports and driver's licenses may be forged, stolen, or lost. Therefore, there is a need for a better method of authentication like voice verification which can eliminate these drawbacks, so that, the person to be verified is required to be physically present at the point-of-verification. The other authentication mechanisms (such as face recognition, iris recognition etc.) need a lot of equipment and conditions to work properly. So, there is a need for the cheaper authentication system like speaker verification, which works with less equipment.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
1.3
Industrial control for the following reasons: Given a sample of somebody saying a particular piece of text/pass phrase (for example, the person's name), the system should be able to verify whether the speaker is who he/she claims to be. Furthermore, the system should be able to catch ``imposters'' who try to say somebody else's pass phrase. Once the person is authenticated the system allows him to control any device such as LCD, STEPPER MOTOR etc.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
1.4
As with all new security solutions, the application of voice biometrics technology within a given corporate environment will be based on set policies and known sensitivities. To aid its acceptance, voice verification can be combined with more traditional security features to provide an additional layer of authentication. The commercialization of voice technology offers network administrators, the new opportunities to enhance advanced user authentication methods, password control and innumerable user identification and network security applications. In a society where telecommunications and electronic commerce are the norm, the need to protect sensitive information will undoubtedly act as a catalyst to greater use of biometrics and in turn, result in improved technology. The present system can be extended to become an integral part of speech interfaces with voice identification. This is a complex task in which an unknown
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
1.5
Review of literature
As per the needs and requirement for the study and implementation of Voice
Biometric Security for Industrial control, information is gathered from various possible sources. In fact, there is no single literature that could serve as a complete idea of speaker recognition. Before actually implementing the Voice Biometric Security for Industrial control, I needed to study about the recent progress, current applications and future trends in the area of speaker recognition. I have gone through [4], to know what is currently needed in the industry market. Since Voice Biometric Security for Industrial control is an application of a kind of Biometric method of identification which is used to authenticate a person on the basis of his/her behavioral characteristic like voice, I needed [9] and [10] to get a range of information about biometrics and speech technology.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
Fig.1.6.1(a): Schematic flow of Enrollment Phase In the second phase, verification phase as shown in the Fig.1.6.1 (b), features are extracted from the speech signal of a speaker and these current features are compared with the claimed features stored in the database by a process called Feature matching. Based on this comparison the final decision is made about the speaker identity.
Decision
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
10
Fig.1.6.1 (b): Schematic flow of Verification Phase Both these phases include Feature extraction, which is used to extract speaker dependent characteristics from speech. The main purpose of this process is to reduce the amount of test data while retaining speaker discriminative information.
perhaps the best known and most popular, and this will be used in this project. MFCCs are based on the known variation of the human ears critical bandwidths with frequency; filters spaced linearly at low frequencies and
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
11
scale, which is linear frequency spacing below 1000 Hz and a logarithmic spacing above 1000 Hz. The process of computing MFCCs is described in more detail next.
continuous speech
Frame Blocking
frame
Windowing
FFT
spectrum
mel spectrum
Mel-frequency Wrapping
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
12
consists of the first N samples. The second frame begins M samples after the first frame, and overlaps it by N - M samples. Similarly, the third frame begins 2M samples after the first frame (or M samples after the second frame) and overlaps it by N - 2M samples. This process continues until all the speech is accounted for within one or more frames.
(2) Windowing:
The next step in the processing is to window each individual frame so as to minimize the signal discontinuities at the beginning and end of each frame. The concept here is to minimize the spectral distortion by using the window to taper the signal to zero at the beginning and end of each frame. If we define the window as w( n), 0 n N 1 , where N =16 is the number of samples in each frame, then the result of windowing is the signal:
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
13
(1.1) I have used a Hamming window here, which has the form:
2n w(n) = 0.54 0.46 cos , N 1 0 n N 1
(1.2)
X n = xk e 2jkn / N , (1.3)
n = 0,1,2,..., N 1
j = 1 .
In
general Xns are complex numbers. The resulting sequence {X n} is interpreted as follow: the zero frequency corresponds to n = 0, positive frequencies 0 < f < Fs / 2 correspond to values 1 n N / 2 1 , while negative frequencies Fs / 2 < f < 0 correspond to N / 2 + 1 n N 1 . Here, Fs denote the sampling frequency which is 16KHz.The result after this step is often referred to as spectrum or periodogram.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
14
2. Find the spectrum of each of the N point signals. Nothing is required to do this step because the frequency spectrum of a 1 point signal is equal to itself. Although there is no work involved, it is to be remembered that each of the 1 point signals is now a frequency spectrum, and not a time domain signal.
3. Synthesize the N frequency spectra into a single frequency spectrum. Here, the N frequency spectra are combined in the exact reverse order that the time domain decomposition took place. In other words, this synthesis must undo the interlaced decomposition done in the time domain.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
15
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
16
classes here refer to individual speakers. Since the classification procedure in our case is applied on extracted features, it can be also referred to as feature matching. The state-of-the-art in feature matching techniques used in speaker recognition includes Dynamic Time Warping (DTW), Hidden Markov Modeling (HMM), and Vector Quantization (VQ). In this project, the VQ approach will be used, due to ease of implementation and high accuracy. VQ is a process of mapping vectors from a large vector space to a finite number of regions in that space. Each region is called a cluster and can be represented by its center called a codeword. The collection of all code words is called a codebook.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
17
yi = 1/m xij
(1.6)
j=1
where i is the component of each vector and m is the number of vectors in the cluster. 5. Repeat steps 3 and 4 until either the codewords dont change or the change in the codewords are small.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
18
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
19
person/imposter. A small number of false acceptances can be noticed when the system accepts an imposter as a right person to be authenticated. Our system performs poorly if the voice phrase is very small or if there is a considerable difference in the enrollment stage and verification stage. The factors responsible for this difference may be variance in loudness, environmental conditions or the distance between the speaker and microphone.
CHAPTER - 2 Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
20
SYSTEM ANALYSIS
This chapter gives an analysis of Voice Biometric Security for Industrial control. This includes project overview, functional requirements, system requirements, technical specifications, developers responsibility overview and Use-Case Driven analysis of the system using use-case diagrams.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
21
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
22
: Windows 95/98/Me/Xp/2000 , NT : Visual C++, Sound Card Interface, MSDN Online Help .
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
23
communication with the client. The product has to be made as user friendly as possible. There is always the possibility of a major design fault; so extensive testing must be done during the design phase. The product must meet the specified storage requirements and response times.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
24
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
25
User Registration
: : : :
User Registration User The User name is registered. The user submits his name, clicks on User Registration and records his voice (some kind of pass phrase).
: :
The users name is registered. The use-case is to register the user name when it is not present in the database file.
2.
Use Case
User Verification
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
26
(recorded) pass phrase (after converting into template) with the already existing template in the database.
3.
: : :
User Management User User will be deleted or his / her pass phrase will be changed according to the requirements.
Entered When
The user submits his name, clicks on User Management and if required submits his voice.
: :
The user Request is processed. This is an option to the administrator to Manage the users.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
27
uses
Enroll uses
Generate template
Fig.2.2 (b): Use-case Diagram for User Registration Description of the diagram: Use Case Actor Desired Outcome Entered when : : : : Enroll Registration module Write the template to the database file. The user selects the registration and supplies name, pass phrase as voice and voice signal is sampled. Finished When : The characteristics of the voice (template) and username are written to the database file.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
28
Compare templates
uses
Verify
uses
Generate template
uses
Sample voice signal
Fig.2.2(c): Use-case Diagram for User Verification Description of the diagram: Use Case Actor Desired Outcome Entered when : : : : Verify Verification module Verifies whether valid user or not. The user selects the verification and supplies name, pass phrase as voice and voice signal is sampled. Finished When Description : : The final result-accepted or rejected is displayed. This use case verifies the identity of a user.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
29
Delete User
uses
Write to file
uses
Fig.2.2 (d): Use-case diagram for User Management Description of the diagram:
1.
: : : :
Delete User Management module The user template is deleted from the file. The user selects the Management module and submits his name.
: :
The user template is deleted from the database This use case deletes the user template from
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
30
: This use case modifies the user pass phrase and stores it back into the database. It inturn uses the use case Write to file.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
31
SYSTEM DESIGN
3.1 Introduction
The Design is the first step into the solution domain. The Voice Biometric Security for Industrial control is designed into 5 main class modules: CVoiceBiometricDlg, CSound, CParam CMath, and CVectorQuantization. The following diagram Fig.3.1 shows these classes used in the system:
CMath
CSound
CParam
CVectorQuantization
CVoiceBiometricDlg : Enroll
CVoiceBiometricDlg : Verify
CVoiceBiometricApp
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
32
CVoiceBiometricDlg class mainly presents the user interface features and is a coordination point for calling various functions. When its OnEnroll( ) function is called, a CSound object is created and pass phrase is recorded in a temp.wav file. This wave file thus generated by the CSound class is used by the CParam class for generating MFCCs in a temp.mfc file. Then it is used by CVectorQuantization class to produce a codebook file. In enrollment phase this codebook file is saved as username.cb (for example, if the username is Kanchan, then the codebook file is saved as kanchan.cb). In Verification phase same steps are repeated and the codebook is saved as temp.cb which is used by compcbmain() to compare the claimed user codebook with the current codebook. If the matching score is appropriate user is authenticated else user is not authenticated.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
33
Voice Biometric Secured Control Unit 3.2 UML Representation Of The System Design
3.2.1. Introduction to UML
The Voice Biometric Security for Industrial control is designed using Object oriented design methodology (Unified Modeling Language). Over the past decade, Grady booch, James Rumbaugh and Jacobson have collaborated to combine the features of their individual object oriented analysis and design method into a Unified method, the result called the Unified Modeling Language (UML), has become widely used throughout the industry. The Unified Modeling Language (UML) is a modeling language for specifying, visualizing, constructing, and documenting the artifacts of systemintensive process. UML allows us to express an analysis model using a modeling notation that is governed by a set of syntactic, semantic and pragmatic rules. This language unifies the industrys best engineering practices for modeling the systems. Some worth referring points about UML are: The UML is not simply a notation for drawing diagrams, but a complete language for capturing knowledge about a subject and expressing knowledge regarding the subject for the purpose of communication. UML applies to modeling and systems. Modeling involves a focus on understanding a subject and capturing and being able to communicate this knowledge.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
34
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
35
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
36
CVoiceBiometricDlg
Enrollment
CSound
CParam
CVectorQuantization
OnEnroll()
RecordStart()
username.cb
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
37
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
38
CVoiceBiometricDlg
Verification
CSound
CParam
CVectorQuantization
OnVerify( )
RecordStart( )
temp.wav
temp.wav
temp.mfc temp.mfc
temp.cb
Result
compcbmain( )
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
39
Description :
1. When the user tries to verify his registered voice, an OnVerify( ) function of the CVoiceBiometricDlg object is called which inturn calls the RecordStart( ) function of the object CSound, to record the user voice. 2. The steps 2 and 3 of Fig.3.2.2(a) are followed similarly. 3. The generated temp.cb codebook is then compared with the claimed username.cb codebook by the function compcbmain( ) of
CVectorQuantization object. 4. Depending on the matching score, the CVoiceBiometricDlg object declares the Result to the user as he is authenticated or he is not authenticated.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
40
OnModify( )
RecordStart( )
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
41
Description :
1. When the user tries to modify his registered voice, an OnModify( ) function of the CVoiceBiometricDlg object is called which inturn calls the RecordStart( ) function of the object CSound, to record the user voice. 2. The steps 2 and 3 of Fig. 3.2.2(a) are followed similarly. 3. The old username.cb is then replaced with the new username.cb codebook. (2) Statechart Diagrams: These diagrams render the states and responses of a class participating in behavior, and the life cycle of an object. These diagrams describe the behavior of a class in response to external stimuli. In the following statechart diagrams Fig.3.2.2(d), 3.2.2(e) and 3.2.2(f) for the different classes of the system, the state is represented as a rounded box that describes the class at a specific point in time. The states shown in all these 3 diagrams are self-explanatory. The initial state is shown as a solid circle, and the final state is shown as a circle surrounding a small solid circle, a bulls-eye. The transition is represented as a solid line arrow, which shows the relationship
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
42
(a)The following diagram Fig.3.2.2(d) shows the Statechart diagram for CSound class in the system:
Start
Loads the default recording format Gets the given recording format
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
43
(b) The following diagram Fig.3.2.2 (e) shows the Statechart diagram for CParam class in the system:
Start
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
44
Stop
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
45
Startt t
Compare this codebook with the trained codebook to calculate total VQ distortion for Verification phase
Stop
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
46
(3) Activity Diagram: Activity diagrams render the activities or actions of a class participating in behavior. These diagrams describe the behavior of a class in response to internal processing rather than external events. Activity diagrams describe the processing activities within a class. An activity diagram is similar to a statechart diagram, where states are activities (rounded boxes) representing the performance of operations and the transitions (solid line arrows) are triggered by the completion of the operations. The following activity diagram Fig.3.2.2 (g) shows the activities of 4 main phases of the system: Enroll, Modify, Verify & Delete (shown from left to right). All the activities shown in this diagram are self-explanatory.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
stop
47
By applying vector quantization algm., clusterize the vectors Voice features are stored in a file
Voice features are stored in a file which is then replaced with the old file
Department Of Electronics & Communication Stop Appa Institute of Engineering and Technology, Gulbarga
48
IMPLEMENTATION
4.1 Coding Details
During the course of my involvement with speaker verification, I have come across several papers with information about speaker verification technologies but unfortunately most of them were not concerned with the topic. Many of them represent the theoretical aspects but very few present the implementation methodologies. I have implemented a Voice Biometric Security for Industrial control that uses Mel Frequency Cepstrum Coefficients ( MFCC ) which are used for feature extraction and Vector Quantization ( VQ ) for feature matching. For sound recording, the duration of recording has been set to three seconds. The exact timing of an utterance will generally not be the same as that of the template. If a person speaks just a small word (e.g. Hello, or any small word), he may not be authenticated although he is a genuine user and other may easily login to his account. For this purpose if the utterance length is less than one second the system will ask to speak a longer phrase.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
49
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
50
CLASS CvoiceBiometricDlg
FUNCTION OnEnroll( ), OnVerify( ) , OnModify( ), OnDelete( ), registeruser( ), SetTimer( ), OnTimer( ), SaveFile( ), RemoveSilence( ) rkmain( ), WaveLoad( ), vq( ),
Csound Cparam
Cmath CvectorQuantization
UnInitMFCC( ), UnInitFBank( ) fft( ), fftsort( ), dct( ) initcb( ), clusterize( ), eucldist( ), writecb( ), compcbmain( )
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
51
CVoiceBiometricDlg class provides four important functions to manipulate the users voice signal. These are: 1. OnEnroll( ) : It registers the users voice features in the database. 2. OnVerify( ) : It verifies the current users voice features with the claimed users voice features. 3. OnModify( ) : It replaces the old users voice features with the new users voice features. 4. OnDelete( ) : It just deletes the users voice features from the database. The above first three functions inturn use various functions of the other four classes- CSound, CParam, CMath, and CVectorQuantization, to accomplish their tasks. Let us see how these functions proceed during the development of code: (1) OnEnroll( ) function: The steps followed by this function are as follows: 1. The users voice is recorded with the help of registeruser( ) function which inturn takes the help of following functions: a) RecordStart( ) : To begin the recording of users voice.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
52
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
53
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
54
(3) OnModify( ) function: The steps 1 to 8 used by the OnEnroll( ) function are followed similarly,but in the step 8, the old username.cb is replaced with the new temp.cb of the user.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
55
CHAPTER - 5
Output
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
56
CHAPTER - 6
Hardware Specifications
Parallel port modes
The IEEE 1284 Standard which has been published in 1994 defines five modes of data transfer for parallel port. They are: 1. Compatibility Mode 2. Nibble Mode 3. Byte Mode 4. EPP 5. ECP
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
57
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
58
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
59
Pin 1 2 3
Possibility -
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
60
R/W
0/1
6 7 8 9 10 11 12 13 14
15 16
E2
HY1602B (Hyper 1602B) with KS0065 controller (compatible with HD44780) and backlight. Click for a bigger picture
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
61
1602-04 with KS0066U controller (compatible with HD44780) and backlight Click for a bigger picture
These are 2 different 2x16 LCDs as in the pictures the 15th and 16th pins are for backlight as I mentioned above.
Pinout Descriptions
Pin 1, 2, 3 : According to the table, I call Pin 1(Vss),2(Vdd/Vcc),3(Vee/Vo) power pins because they are the gates to power. Pin 1 is for ground so you have to connect to ground/earth and Pin 2 is for the +5V power supply. 6V or 4,5V is mostly acceptable in few amperes and also 3V is acceptable on some of the LCD modules (You can also power these modules with a battery in a very economical way). In my application I get the voltage from the molex cable of the pc which is
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
62
Circuit
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
63
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
64
If your soldering goes well you get a typical test screen of a character based LCD as its shown below:
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
65
Power Supply
Regulated power supply:
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
66
The +5V supply voltages are obtained from the 12volts transformer the output of these secondary is then applied to the bridge rectifier which converts the sinusoidal input into full wave rectifier output. The filter capacitor at the output of the bridge rectifier are charged to the peak value of rectifier output voltage whenever the diode are forward biased. Since diodes are not forward biased during entire positive and negative half cycle of the output waveform. The voltage across the filter capacitor is a pulsation dc i.e. combination of DC and ripple voltage. From the pulsating DC voltage, a regulated DC voltage is obtained by a regulated IC 7805.
Specification:
IC No. Vout (V) I max(A) Load Regulatio n (mV) Line regulation (mV) Drop O/P (V)
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
67
Hardware:
Everybody knows what is parallel port, where it can be found, and for what it is being used. The primary use of parallel port is to connect printers to the computer and is specifically designed for this purpose. Thus it is often called as printer Port or Centronics port (this name came from a popular printer manufacturing company
'Centronics' which devised some standards for parallel port). You can see the parallel port connector in the rear panel of your PC. It is a 25 pin female (DB25) connector (to which printer is connected). On almost all the PCs only one parallel port is present, but you can add more by buying and inserting ISA/PCI parallel port cards. The power supply is 9 volt regulated power supply. We have used a step down transformer of 9 volt. The result is rectified using a bridge rectifier circuit. The result is passed through regulator IC and the Out put is coupled through a 1 microfarad capacitor for better impedence matching.
STEPPING MOTORS:
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
68
The Indexer (or Controller) is a microprocessor capable of generating step pulses and direction signals for the driver. In addition, the indexer is typically required to perform many other sophisticated command functions. The Driver (or Amplifier) converts the indexer command signals into the power necessary to energize the motor windings. There are numerous types of drivers, with different current/amperage ratings and construction technology. Not all drivers are suitable to run all motors, so when designing a Motion Control System the driver selection process is critical. The Step Motor is an electromagnetic device that converts digital pulses into mechanical shaft rotation.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
69
VARIABLE RELUCTANCE:
The variable reluctance motor does not use a permanent magnet. As a result, the motor rotor can move without constraint or "detent" torque. This type of construction is good in non industrial applications that do not require a high degree of motor torque, such as the positioning of a micro slide. The variable reluctance motor in the below illustration has four "stator pole sets" (A, B, C,), set 15 degrees apart. Current applied to pole A through the motor winding
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
70
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
71
Fig: Permanent Magnet Motor Unlike the other stepping motors, the PM motor rotor has no teeth and is designed to be magnetized at a right angle to it's axis. The above illustration shows a simple, 90 degree PM motor with four phases (A-D). Applying current to each phase in sequence will cause the rotor to rotate by adjusting to the changing magnetic fields. Although it operates at fairly low speed the PM motor has a relatively high torque characteristic.
HYBRID:
Hybrid motors combine the best characteristics of the variable reluctance and permanent magnet motors. They are constructed with multi-toothed stator poles and a permanent magnet rotor. Standard hybrid motors have 200 rotor teeth and rotate at 1.80 step angles. Other hybrid motors are available in 0.9and 3.6 step angle configurations. Because they exhibit high static and dynamic torque
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
72
Bifilar wound motors means that there are two identical sets of windings on each stator pole. This type of winding configuration simplifies operation in that transferring current from one coil to another one, wound in the opposite direction, will reverse the rotation of the motor shaft. Whereas, in a unifilar application, to change direction requires reversing the current in the same winding.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
73
Fig: Lead Biflar Motor The most common wiring configuration for bifilar wound stepping motors is 8 leads because they offer the flexibility of either a Series or parallel connection. There are however, many 6 lead stepping motors available for Series connection applications.
STEP MODES:
Stepper motor "step modes" include Full, Half and Microstep. The type of step mode output of any motor is dependent on the design of the driver.
FULL STEP:
Standard (hybrid) stepping motors have 200 rotor teeth, or 200 full steps per revolution of the motor shaft. Dividing the 200 steps into the 360's rotation equals a 1.8 full step angle. Normally, full step mode is achieved by energizing both windings while reversing the
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
74
HALF STEP:
Half step simply means that the motor is rotating at 400 steps per revolution. In this mode, one winding is energized and then two windings are energized alternately, causing the rotor to rotate at half the distance, or 0.9's. (The same effect can be achieved by operating in full step mode with a 400 step per revolution motor). Half stepping is a more practical solution however, in industrial applications. Although it provides slightly less torque, half step mode reduces the amount "jumpiness" inherent in running in a full step mode.
MICROSTEP:
Microstepping is a relatively new stepper motor technology that controls the current in the motor winding to a degree that further subdivides the number of positions between poles. AMS microsteppers are capable of rotating at 1/256 of a step (per step), or over 50,000 steps per revolution.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
75
DESIGN CONSIDERATIONS:
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
76
INDUCTANCE:
Stepper motors are rated with a varying degree of inductance. A high inductance motor will provide a greater amount of torque at low speeds and similarly the reverse is true.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
77
DRIVER VOLTAGE:
The higher the output voltage from the driver, the higher the level of torque vs. speed. Generally, the driver output voltage should be rated higher than the motor voltage rating.
MOTOR STIFFNESS:
By design, stepping motors tend to run stiff. Reducing the current flow to the motor by a small percentage will smooth the rotation. Likewise, increasing the motor current will increase the stiffness but will also provide more torque. Trade-offs between speed, torque and resolution are a main consideration in designing a step motor system.
MOTOR HEAT:
Step motors are designed to run hot (50-90 C). However, too much current may cause excessive heating and damage to the motor
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
78
C#.NET:
.NET (dot-net) is the name Microsoft gives to its general vision of the future of computing, the view being of a world in which many applications run in a distributed manner across the Internet. We can identify a number of different motivations driving this vision. Firstly, distributed computing is rather like object oriented progamming, in that it encourages specialized code to be collected in one place, rather than copied redundantly in lots of places. There are thus potential efficiency gains to be made in moving to the distributed model. Secondly, by collecting specialized code in one place and opening up a generally accessible interface to it, different types of machines (phones, handheld, desktops, etc) can all be supported with the same code. Hence Microsofts runanywhere aspiration.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
79
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
80
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
81
CONCLUSION
The aim of this research was to develop a Voice Biometric Security for Industrial control, which can verify a persons claimed identity. Overall, the project was a success with the basic requirements being satisfied. The finished product could enroll users, verify their voiceprint, and provided a GUI interface for users to do so. The current Voice Biometric Security for Industrial control verifies the voice templates in a one-to-one manner and offers a reliable and accurate way of verifying the user voice. Simple algorithms for Mel Frequency Cepstrum Coefficients and Vector Quantization were used for the development of the system. The performance of the system was found to depend on the recording time and length of the sentence, sampling frequency, surrounding environment, speakers behavioral conditions and the threshold value. To increase the length of the time, the recording time has to be increased. So, for a maximum of 2 seconds, a user was able to record only a short phrase like VTU University. It was initially hard for the system to authenticate the users with this kind of voice phrases. So tests have been performed on increasing the recording time. As the
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
82
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
83
APPENDIX
Wave File Format
Wave files are a part of a file interchange format, called RIFFs, created by Microsoft. The format basically is composed of a collection of data chunks. Each chunk has 32-bit ID field followed by 32-bit chunk length, followed by chunk data. This format is shown the following table: OFFSET DESCRIPTION
0x00 0x04 0x08 0x0C 0x10 0x14 0x16 0x18 0x1C 0x20 Chunk id RIFF Chunk size (32-bit) Wave chunk id WAVE Format chunk id fmt Format chunk size (32-bits) Format tag Number of channels 1=mono, 2=stereo Sample rate in Hz Average bytes per second Number of bytes per sample 0x22 0x24 0x28 0x2C 1 = 8-bit mono 2= 8-bit stereo or 16-bit mono
4 = 16-bit stereo Number of bits in a sample Data chunk id data Length of data chunk (32-bits) Sample data
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
84
BIBLIOGRAPHY
Text Books
[1] James F.Peters & Witold Pedrycz, Software Engineering-An Engineering Approach , John Wily & Sons, Inc. [2] Ali Bahrami, Object Oriented Systems Development, Tata McGraw-Hill Company. [3] David J.Kruglinski, Scot Wingo, and George Shepherd, Programming with Visual C++, Microsoft Press.
Papers
[4] Douglas A.Reynolds, PhD and Larry P.Heck, PhD, Automatic Speaker Recognition Recent progress, Current Applications, and Future Trends , AAAS 2000 Meeting, Humans, Computers and Speech Symposium, 19 February 2000.
[5] Minh N.Do, An Automatic speaker Recognition System , Audio Visual Communications Laboratory, Swiss Federal Institute of Technology, Lausanne, Switzarland. [6] J.W. Cooley and J.W. Tukey, An algorithm for the machine calculation of complex Fourier Series, Mathematics Computation, Vol.19, 1965, pp 297-301.
[7] Dr.Simon Lucey, Speaker Verification Tutorial, Advanced Multimedia processing (AMP) Labs, Carnegie Mellon University, 9/5/2002-9/6/2002.
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
85
Websites
[9] www.rpmfreelancer.no-ip.com:8080/duncan21/biometrics/index.html (BIOMETRICSIdentification and Verification). [10] www.svr-www.eng.cam.ac.uk/comp.speech (comp. speech Frequently Asked Questions WWW site).
Department Of Electronics & Communication Appa Institute of Engineering and Technology, Gulbarga
86