SMS Based Vehicle Location Finder for Parking ECE Seminar Topic

Introduction to SMS Based Vehicle Location Finder for Parking ECE Seminar Topic:

In present day life cars have become a common commodity to every family living in cities. With cars some problems such as security and parking is a common thing. Car parking has some glitches to it such as parking at right place and finding it back when we want to move out. In huge parking lots and multi storied parking lots there will be some confusion in finding the car because where we had parked the car and how to get it out. To solve this problem here is a simple system designed to give the direction where the car is. This system is based on microcontroller and GSM technology which is called as “SMS based vehicle location finder”.

We use a mobile phone to trigger a microcontroller which in turn controls an appliance such as a buzzer to ring an alarm and also the microcontroller acknowledges by sending an SMS that the buzzer is ringing or the lights of tail lam are flashing.

The main components in this system are AT command supporting GSM mobile phone, 89S52 Microcontroller, Max 232 IC, Relays, Relay driver IC ULN 2803, Voltage regulator 7805, Diode IN4007 and GSM Phone. The software used is Keil-U-Vision 3.0 in this software by using Keil tool set we can generate embedded applications virtually with supported microcontrollers. AT command is the communication protocol used between GSM phone and microcontroller.

The theory/principle used in this project can be used in different fields apart from just car parking application. We can use it to trigger a security alarm for vaults, to turn ON motors remotely using GSM handsets and many more.

Download SMS Based Vehicle Location Finder for Parking ECE Seminar Topic.

Technical Seminar Report on Wireless USB

Introduction to Technical Seminar Topic on Wireless USB:

Imagine if we can transfer data from computer to printer, camcorder, Cell phones and other customer electronic products without any wired USB connection. This can be possible if Wireless Universal Serial Bus (WUSB) becomes a reality.

USB is the one of the most successful customer electronic product in the last 10 years. It is the de facto interconnect to most of PC’s around the world. Wireless USB specifications are designed for transfer of high speed data. In 2004 WUSB promoter group is formed which includes Agere Systems, HP, Intel, Microsoft Corporation, NEC, Philips Semiconductors, and Samsung Electronics.

Wireless USB has wide usage in both home and industry applications such as Entertainment PC, Digital Camcorder, Digital Still Camera, HDTV, DVD-RW/CD-R, (Recorder/Player), External Storage, Device (HDD), Game Console, MP3 Player, Set Top box, mobile device, Personal Video, Player (PVP), Personal Video, Recorder (PVR), Printer.

Topology / Technology requirements: – WUSB device works on ‘husband-spoke’ topology. The host is responsible for transferring data among devices connected to it by allotting bandwidth and time slot to each device. We can call them as clusters. There will be point to point connection between wireless USB host and Wireless USB device. In this connection type hubs are eliminated. A host can be connected to 127 WUSB devices at a point of time. Even if there are multiple wireless USB devices connected to same host the clusters co-exist within the same environment / radio cell. In the next stage connection between two hosts and a normal USB is also possible. Wireless USB will be based on the Ultra-Wideband (UWB) radio.

Since security is the major aspect Wireless USB has to deliver the high standards of security just as wired USB. Authentication of devices before operation of device is needed for connection-level security between devices. At application level encryption needs to be implemented. The installation and operation of wireless USB should be made simple and opera table.

Download Technical Seminar Report on Wireless USB.

Seminar Topics for ECE Branch On Springs

Introduction to  Springs Seminar Topics:

A device which changes its shape when external force is applied and returns to its near original shape when force is removed is termed as spring. Here the energy used to extend the spring is stored in the spring when extended and this energy is released back when the force is removed.

If we study the history of springs it goes way back to 3rd century B.C and since then many engineers made use of spring mechanism in different fields of life such as military, agriculture, machinery etc. Since then technology had vastly evolved and springs are used widely in various fields in present day to day life.

Mainly springs can be classified into 5 types.

Cylindrical or Conical shaped springs: – These are just ordinary springs in the shape of a cylinder and well coiled.

Extension spring: – Spring on which extension force when applied the distance between coils increases are called as extension springs.

Compression spring: – When force is applied on these coiled springs the spring is pushed together and the spring is shortened are called as compression springs. These are mainly used in automobiles.

Torsion spring or coiled spring: – Springs that are used to apply tension at twists are called as torsion springs mainly found in clip boards and hair clips.

Leaf springs: – Springs which are not in coil shape but looks as a shallow arch for example springs used in automobiles such as heavy trucks in the rear are called as leaf springs. 

Download  Seminar Topics for ECE Branch On Springs.

Latest ECE Technical Seminar Topic On Witricity With Seminar Report

Introduction to  ECE Technical Seminar Topic On Witricity :

In present Day to day life electricity is an essential commodity for smooth running of life. Life without power is un-imaginable but at the same time electricity means wires/cables. If we dream of a concept where we can eliminate all wires in gadget world it will revolutionize the electric world. This concept of wireless electricity is basically termed as Witricity.

Witricity principle works by using coupled resonant objects for carrying of electricity to objects without use of wires. This system consists of an electric transmitter and a receiver.

The working principle of receiver is just as radio receiver where the device needs to be in the range of transmitter. Witricity produces electricity with the use of resonant magnetic field and simultaneously stops any wastage of power. With this system in place we can achieve transmission up to a range of 100 watt.

MIT researchers had power a bulb of 60 watt from an electric transmitter placed at a distance of 7 feet and achieved efficiency to a tune of 40%. To make this possible they used two copper coils each in twenty inches diameter. They are placed so they will resonate together in the MHz range. Here one coil is connected to a power source and other coil to a bulb. This setup transmits electricity to bulb.

Witricity principle is emerging in technological circles. With this principle we can transmit power to tubes, bulbs, cells, cameras and all gadgets which work on lower power. This is non-hazardous to many living organisms. 

Download  Latest ECE Technical Seminar Topic On Witricity With Seminar Report  .

Security System Using RFID ECE Project Report

Introduction to Security System Using RFID ECE Project:

The main objective of the project is to design a system that have a small coverage area which can be used for authentication or identification purposes. By using this security system we can provide entry by a access authorization process. This system is being developed by using RFID technology.

This system consists of finger print impression, camera and for looking after the authentication process. The RFID consists of RFID reader which comprises of the components working and RFID tag which maintains the transmission and reception process. In this paper we will look into the working of multi level security system. 

Brief into design and working :

This system mainly uses RFID technology. RFID is a wireless identification method. This RFID consists of RFID Tags for receiving and responding to radiofrequency queries from an RFID transceiver and an RFID reader for decoding the data sent from RFID tags.PIC micro controller which is used controls all the devices and makes them to function in time.

A finger print scanner IC is used for checking the authorization process through finger prints. ZigBee is a wireless mesh network standard.GSM technology for sending and receiving a message. When the user places the thumb impression on the scanner then the camera automatically takes the picture of the user for future verification.

This information is stored in the database along with time and date when the system was accessed and by GSM technology it makes sure that concerned authority is notified about the access.

Download Security System Using RFID ECE Project Report.

ECE Project Report on Remote Controlling Of Green House Agriculture System by Microcontroller and Bluetooth

Introduction to Remote Controlling Of Green House Agriculture System by Micro controller and Bluetooth:

The objective of this paper is to give an idea of green house agriculture system. Generally, production of every crop depends on several factors like humidity, temperature, quality of soil and pressure. These factors keep varying with season. Due to this reason ,green house agriculture system has been developed, by using this system we can cultivate off-season crop by controlling humidity, pressure, moisture and temperature.

As the technology is advancing, further modifications such as remote controlling of system came into existence. This system is fully automatic with remote sensing. There are many advantages such as less labor, preventing usage of excess water and controls the use of pesticides.

Circuit design and operation:

The circuit consists of micro controller, sensors, Bluetooth receiver/transmitter, stepper motor, voltage supply, and transformer. The inputs to PIC 18F 4550 microcontroller are given by temperature, humidity and pressure sensors. Microcontroller converts the input analog data to digital through A-D converter.

RF media is used to transfer data. The NOKIA BH204, Bluetooth transmitter transmits the data to the USB Dongle .USB Dongle acts as a transmission media between bluetooth transmitter and computer. The computer receives the data through receiver. It processes the data according to the program written in mat lab and control signal is sent to stepper motor which is connected to control section of microcontroller.

The stepper motor after receiving the control signal, it performs the action according to signal sent and controls the temperature, humidity and moisture. 

Download ECE Project Report on Remote Controlling Of Green House Agriculture System by Microcontroller and Bluetooth.

ECE Project Report or Final Year on Product Counter

Introduction on Product Counter Project:

The main objective of this project is to develop a circuit which enhances the counting process. Industries will be manufacturing many products and they cannot be counted easily. This circuit was developed such that it can be used for  counting  products going over a belt, and for counting persons passed at a point etc. This can display from three to ten digit numbers and can count unto thousands.

Brief into  Design and working :

This system makes use of IC’S , LED, resistors, Variable resistors, LCD, Seven segment display and power supply.LM311 IC is a voltage regulator used for comparing the voltages and generates the output. 4033 IC is a counter and an output decoder. Variable resistors are used for controlling the electrical devices in terms of power.

Resistors are used for controlling the flow of electric current and providing desired amount of voltage in electric or electric circuit. LED is a semiconductor light source which are used as indicator lamps in many devices, and are increasingly used for lighting. light dependent resistor is a resistor whose resistance decreases with increasing incident light intensity.

Seven segment display is used for visual numeric display. The output from opamp is given as the clock for seven segment counter 4033.the 4033 counter counts and displays in seven segment display.

Download ECE Project Report or Final Year on Product Counter  .

An Efficient Iris Authentication Using Chaos Theory Based Cryptography for E-Commerce Transaction

Introduction to An Efficient Iris Authentication Using Chaos Theory Based Cryptography for E-Commerce Transaction:

The main objective of this paper is to give secure transaction to the customers over internet. Generally, as the technology is advancing and globalization is rapidly growing.e-commerce came into existence ,i.e the products and services are sold over internet. Many of the frauds are being done over credit cards when the payment is being done.

To avoid this fraud, this theory has developed.IP technology is widely used by various devices. IP technology uses HTTP protocol, but this protocol uses high power. To, overcome all this disadvantages, a new protocol called constrained application protocol has been developed.

Brief into design and working

COAP is a web transfer protocol developed for resource constrained networks. It uses REST architecture. REST architecture allow applications to rely on loosely coupled services which can be shared and reused and are controlled by the server and identified by a Universal Resource Identifier (URI). It uses some methods used by HTTP.

COAP supports additional functionalities such as multicast, asynchronous communication and subscriptions. The packet overhead compression has drastically reduced the power consumption and has increased the power life time. This is being used in many web applications also. The main aim of the application is to allow the user to access data directly from a web browser.

The complexity of gateway is reduced and the system scalability is increased. Hence, by using this safe transaction can be done by the customers.

Download An Efficient Iris Authentication Using Chaos Theory Based Cryptography for E-Commerce Transaction .

Microcontroller Project Report on Aeronautical Crash Prevention System through RF Communication

Introduction Micro controller Project Report on Aeronautical Crash Prevention System through RF Communication:

The main objective of this paper is to prevent collision of aircrafts. Here communication is done through RF. RF is preferred due to its features like high Bluetooth range and can detect long distance objects and which are travelling at all sides of the main object. This system consists of microcontroller, LCD, buzzer, transmitter/ receiver, Encoder/Decoder, power supply.

Brief into design and working :

In this system the design involves two sections namely transmitter and receiver section. In the transmitter section, microcontroller generates the parallel data and is encoded, and then the parallel data becomes serial data after encoding and is transmitted through RF transmitter. In receiver section, the receiver receives the transmitted serial data and decodes the serial data into parallel data by using the decoder and is given to microcontroller.

The microcontroller takes the action and status is displayed in the lcd and the buzzer starts initially. Coming to working of this system, each and every aero plane consists of both transmitter and receiver. Every aero plane has an specific IP address. The transmitter keep on transmitting the ip address and if any aero plane is found near by then the receiver receives the ip address of aero plane nearby.

If the receiver receives the information about other aero plane that means it is within the range of hundred meters. Then the status is displayed in the LCD and the buzzer starts .So, when the buzzer starts and status is displayed we can divert the planes without colliding.

Download Micro controller Project Report on Aeronautical Crash Prevention System through RF Communication .

Adaptive Equalizer For Digital Systems

Introduction to Adaptive Equalizer For Digital Systems:

This project aims at reducing the effects caused due to multi paths in mobile communications. In non line sight communication the signal does not go in a direct path and it gets effected due to various factors as it under goes deviation. We propose adaptive equalization method for the reduction of multi path signals at the receiver. In this paper we will discuss the working model of adaptive equalizer.

Brief into working of adaptive equalizer:

Due to deviation in the signals the multiple copies are signals are received at the receiver so it becomes difficult to trace out the original signal, by which the accuracy of the signal gets reduced. By using an adaptive equalizer the received signal can be nullified so as to reduce the noise components. Channel response at the receiver is estimated by using a pilot carrier or a training sequence. Approximation inverse filter is used to isolate the distortions occurred in the signal. A matched filter is used to boost up the signal as it undergoes through various processes. Adaptive filter is always inserted in front of the channel so as to compensate the signal. To make the incoming response equal we will use a feedback supply for the channel.

Advantages:

By employing adaptive equalizer the accuracy of the system gets increased.  As the original signal can be traced easily we can increase the quality of the signal. This is an efficient technique for reducing the effects due to scattering and distortions. Thus we can conclude that adaptive equalization technique is the best method to overcome the multipath signals in mobile communication 

Download Adaptive Equalizer For Digital Systems .