8085 Microprocessor Seminar Report for ECE Students

Introduction to 8085 Microprocessor Seminar Topic:

They are the microprocessor developed by Intel Corporation. 8085 is the 8 bit microprocessor that used +5V DC supply for its working. They are very old processor used around 1975s. it comprises of three parts. Every part has beeb assigned its work. First is arithmetic and logic unit, it performs all the calculations like addition, subtraction, AND operation, OR operations etc. Second is control unit, it sets the instruction timing, it control the timing of input and output operations, means it controls the entire operations of the microprocessor. Third is registers, they are used to store the information for temporary time. 

8085 have various registers sets that have their own functions. There is special register called accumulator. All results are first stored in the accumulator then it can be moved to other registers like B, D, H, E, and L. They are the general purpose registers.

There is flag register that is used to set the sign according to the operation like Zero, carry, auxiliary, Sign and parity. Another register is program counter that maintains the sequence of operations. Last register is stack pointer that is used to store the instruction in the memory.

8085 have 40 pins and all have their own working. 8085 have different buses that are used to carry information and data. Address bus is used to carry the respective address of the data.

They are unidirectional. Address/data bus is used to carry address and data both. They are bidirectional in nature. If the signal is high then it will act as data bus otherwise act as an address bus. Control bus is used for controlling the operation of the microprocessors. They are not completely unidirectional and not completely bi-directional. They work on 10 control lines.

Download  8085 Microprocessor Seminar Report for ECE Students .

Virtual Keyboard Using IR Technique ECE Project Report

Introduction to Virtual Keyboard Using IR Technique Project:

Now days the technology is growing very much the actual processor are becoming old one. This can be seen in keyboard earlier keyboard uses hard keys but now a day’s soft keys keyboard are there, they are dust proof. Here we will see about virtual keyboard.

Virtual keyboard is a frame that is filled with air the user simply had to press akey in the air and the related word is automatically pressed.Virtual keyboard uses infrared technology which has higher wavelength than visible light.This type of rays is used in military and civilian purpose. In military they are used to acquire the target in night vision and in civilian for wireless communication, in weather forecasting and for temperature sensing. This is also used in space to detect the objects in space.

Projection keyboard: – They are the virtual key board not the real one. In this the keyboard keeps the track of the finger and process the information according to the keystroke.

Canseta keyboard: – It is type of keyboard that projects the Image of the keyboard on the plane surface and keeps the track of finger to take the input by using sensors.

Roll up keyboard: -This type of keyboard is useful at time of traveling because they can be roll into a small piece. They are dust free and moisture proof.

Wireless infrared keyboard: -This is wireless keyboard that are built in track ball and use scrolling button for browsing.

Components: – It uses IR LED which is very cheapest to control any device. It can control al videos and audio devices.This is solid light rays. infrared rays is in-visible to human eyes because of its shorter wavelength than visible light but a videos camera can see this rays. This type of rays is easy to manufacture.

Download  Virtual Keyboard Using IR Technique ECE Project Report.

Seminar Report on Optical Computing Technology

Introduction to Seminar Topic on Optical Computing Technology:

It is the advanced technology that uses light in place of current. It means that light is used to perform the operation on the computer instead of current. This technology will work better then electric current because light can travel faster than electric current this is turn will produce the result faster and better. For light transmission it might use infrared or photon to perform the operations. This technology was introduced in 1980s but it is not implemented till yet. It is under construction and various researches are going on this work. To implement this technology we need various input and output devices like processors, optical memory, electronics gates and switched and transistors.

Optical computer uses photons for operations, photons are nothing just the electromagnetic energy or we can say that unit of electricity. The transistor used in the computer can be of various types like Laser, Plasmon. Laser transistors are those which uses electrode that control the current in the devices. Plasmon transistorsare light based.

Memories used in the optical computers are holographic memory. It also said that it is 3-D memory. It removes the limitations of magnetic and optical memories have. It has better capacity than them. It has the capability to read millions of bits and read at the same time.

Advantages;they don’t have the problem of interference. Problems like electric short circuit is no more. Rate of transmission loss is very less. It provides large bandwidth so speed will be better than normal computer. They will very easy to use than normal computer.

Disadvantages: still such types of computers are not developed. They are not easy to fabricate such computers. The devices used in these computers are not affordable. New and advanced software are needed to be developed for them.

Download  Seminar Report on Optical Computing Technology .

Seminar Topic on Zigbee

Introduction to Seminar Topic on Zigbee:

It is also the form of wireless network developed to overcome the limitation of the Wi-Fi and the Bluetooth. It is a digital connection used to connect computers and the other related devices. They are very low cost and they have better power management means reliability and efficiency of the network increases. They are specially designed for sensors and for controlling wireless networks. They can be constructed anywhere at home or office. They even have capability to interact with wires to control lights, fans and doors etc.

They generally focus on the network of IEEE 802.15.4. They have only nodes for that TX/Rx or sleep. They work 2.4GHz with dual modes of 868MHz. they have sixteen channels from 11-26. They use very less power so their battery works for months or sometimes a year.  They have maximum speed of 250 kbps.

In general we have three types of devices like Zigbee PAN is used to store the information;full function is used to handle the topologies used and reduced function is used for contacting network administrator for any problem or request. They work network topologies like mesh network, cluster network and star network. They are assembled in the form of layers like Physical layers, Media access layer.

Security: as they work on IEEE 802.15.4 MAC which is specially designed for security. They maintain the records of secure devices or trusted devices which will log in the network. They also use the technique of data encryption so that it cannot be changed by someone during transmission.

Zigbee are mostly used in the embedded application that has low rates of data and less power consumer. They are used in the applications like transportation systems, home automation, militaries, climate control etc.

Download  Seminar Topic on Zigbee .

Universal Serial Bus Presentation

Introduction to Universal Serial Bus Presentation:

They are buses or ports use to connect the device with the computers. This USB is very fast and have the capability to send 500Mbyte per second. USB ports are common in all the devices means every device related to computer comprises of USB port and they are directly connected to the computer. HUB is responsible for connecting device and computer. It checks the function of the USB. It is also responsible for power distribution and checks whether the USB is working correctly or not.

USB are connected through cables that have 8 inputs and outputs. It has three pairs of cables that are twisted. They are used data transmission and for power.

There USB are very high speed. They can send the data with the speed of 625 MB/sec. they use power of 150mA and they require minimum voltage between 4.4 and 4V. Its speed does not depend on cable length like USB 2.0.

Difference between USB 3.0 and USB 2.0:in USB 3.0 we can send full duplex data while in USB 2.0 only half duplex data. USB 3.0 has 9 pins whereas 2.0 have 5 pins. USB 3.0 has speed ten times faster than 2.0. USB 3.0 is even faster than fire wire. Fire wire has the speed of 3.2 GB/s while USB 3.0 has the speed of 4.8 GB/s.

Applications: they are used by mass storage device like pen drives. They are used by external hard disks and flash drives. They are used to connect ATA, SATA or ATAPI. They are also used to connect mobiles to connect with computer and IPODS, MP4 players etc. in laptops we also connect mouse and keyboard with USB and other applications like connecting LAN, ETHERNET ADAPTER, WI-FI adapter, joystick, gamepads etc.

Download  Universal Serial Bus Presentation  .

ECE Seminar Topic Image Processing Facial Recognition Using the Theory of Biometrics

Introduction to Seminar Topic Image Processing Facial Recognition Using the Theory of Biometrics:

The human’s capability to remember the faces of the fellow humans which is acquired since the birth.  The Computer now doing this job perfectly to recognize the faces of humans for the security cause.  This topic covers about the memorizing the faces of thousands of humans by computer system into its own language. This technique is very well using in various fields like different types of elections, forensic investigations and analysis, also for the protection of the personal computer. 

The facial recognition system is a very developed technological innovation that comes under the field called Biometrics. The Biometrics analyses the recognition by using some biological features of the humans with its programmed technique to match the face. The concept of the recognition is the unique and specific characteristics of the human face. The facial recognition may contain some basic stages from taking snap of the human face to analyze and matching up to its stored database of images. 

This amazing technology has been already applied by a company known as Visionics, which has developed a software for the image processing called Faceit. The principle feature of the facial recognition is Local Feature Analysis or LFA algorithm, a mathematical technique of the system. The system works by mapping of the face and produces a face print which is a specific code for the face and then compare this face print to its database stored image. 

The facial recognition technology has great application in the field of banking ATM, Cash bearing security, Law enforcement, Security surveillance, elections etc. The technology can be used to secure your computer system and files by the use of web cam. The application is very useful it can simultaneously secure the computer system along with the password.

Download  ECE Seminar Topic Image Processing Facial Recognition Using the Theory of Biometrics .

Term Paper Topics for ECE on Evolution of the Mobile Market

Introduction to Term Paper Topics on Evolution of the Mobile Market:

The first version of the deployment and evolution of the mobile markets was in the United States in the early 1940’s.  These became enable to the users to let mobile phones in their cars. In the later layer 1960’s Bell System had launched an IMTS called as the Improved Mobile Telephone Service like large bandwidth.  This system were called as cellular because this areas where divided into various small chunks which is by the low power receiver.

The first generation called the IG is the first of the mobile communication which has developed it in two parts in the early 1970. The two parts are establishment of the micro processors and the digitization of the link of the mobile and the sites.  The Second Generation called the 2G which developed the unique systems to the communications of the mobile cell phones.

This generation surveys the voice signals as well as the control link. The third Generation and the latest generation called as the 3G guarantees the quick communications and also fast internet access services. Development for the 4G has been already been under development by the developer’s team.

The access technologies of the mobile markets are the FDMA, CDMA, TDMA each one starts for the Frequency division multiple access as FDMA, Time Code Multiple Access as the TDMA and Code Division Multiple Access for the CDMA. The FDMA is a common system which is divided into the parts of the frequencies and is then assigned to the end users. TDMA permits the users to access the radio files and documents. CDMA is related on the spectrum control called as the “Spread”.

This tells a brief note about the 3G radio transmissions and many other facilities of the 3G device.  A normally wireless technology has increased largely in the up growing development stages. 

Download  Term Paper Topics for ECE on Evolution of the Mobile Market .

Technical Seminar Topics for CSE 2012 on 3G Radio Transmission Technologies

Introduction to Technical Seminar Topic on 3G Radio Transmission Technologies:

This article gives a small introduction briefly about the 3G radio transmission technologies and many other 3G communications devices. This article distinguishes the wireless mobile phone technologies that can be used as the permanent or temporary free paths for the development of the wireless internet broadband access.

The goal of this device is to show that the wireless access of internet broadband is on the stages of development now a day’s.  Successful accepting the wireless 3G networks which dependently follows the capability of the functions of latest mobile phone devices to distinguish between the 2G and the other networks currently working all over the world.

3G is the latest service from all other older services which enables the user to communicate with each other by the consumer devices. 3G in upcoming future will be all over the world providing a global roaming service to all.

Download  Technical Seminar Topics for CSE 2012 on 3G Radio Transmission Technologies .

ECE Project Report on Security System Using RFID

Introduction to Security System Using RFID:

   In general for each and every organization, industry, home and a person need security. It is most important common need. Security is mainly used in organizations. For this purpose, in olden days security guard was used next token numbers and next passwords. Now a day tags with RFID (Radio Frequency Identification) technology has been using. But it is not more secure because one of the person tags is used by other one without his/her permission. It is more danger. To avoid these types of danger situations we should provide a new technology, which is “BIOMETRIC SYSTEM” with existed RFID system.

                                    The main objective of our project is providing a security to individuals having only one identification. For this purpose biometric system is used. We have to use hardware equipments are RFID Reader, RFID Tag, Camera, GSM, Zig bee, Microcontroller, power supply, RS-232, antenna, PC and mobile.

RFID tag system has taken more time to identification, not secure, cost effective and need a person. But our proposed system is not require a person and don’t have these disadvantages. It has multiple advantages so it is also called as multi-level security system. It is used for each and every room, which are in the organization.

                                    Fingerprint (thumb) biometric system is used in this proposed system because each person has different fingerprints so individual identification is provided. All these equipments are under the control of microcontroller. For every entry and exit SMS will send to the management. Zigbee is a wireless mesh communication within the organization. It has a range of 10m and operated at 2.4GHZ. Transmitter module keeps at rooms and receiver module keeps at management room. So security is more no chance to done mistakes. Finally conclude that it is the best technology for security purpose. It is easy to maintain user has a bright future and low cost more reliable. It is also used for vehicle security.  

Download  ECE Project Report on Security System Using RFID .

Power Generation from Speed Breakers Using Air Compression Method Project Report

Introduction to Power Generation from Speed Breakers Using Air Compression Method Project:

 In our world every organization, industry, scientific labs, etc have been depending on electricity. Not only these sectors but also humans need electricity, which is equal to our minimum needs. Can we live without electricity now a day? Can we imagine our world without electricity? It is the most important need to us. So we have to increase the electricity. But it is generating very less quantity because population is more, so required more electricity. So we should generate more electricity. For power generation, there are so many methods, which are by using water, coal, sunrises, iron, etc. one of the source is by using speed breakers using air compression method we can generate the power. This is the aim of our project.  

                These speed breakers are made by helical springs of vibrating type at the base position. This spring height should be 0.3m only. When a vehicle loads and cross the speed breaker, immediately both are in depressed state and come back to their original position. These are having a specific dimensions compared to national high-ways. Length, width and height are 4m, 0.4, 0.2m respectively. These are rigid type with made of steel or tar.

When a vehicle loads the speed breaker then compresses the air in it. This air is used to impeller, so it is resource for the alternator. For e.g. Base is trapezoidal shape, so it has max and mini loads on the speed breaker. If it may be uniformly distribution load then it depends on product of factor of safety and whole weight.

                In impeller existing energies are, in inlet is kinetic energy and in outlet is atmospheric. This alternator is a electric generator machine which converts mechanical energy into electrical energy is based on principle of dynamically induced e.m.f. it has both stator and rotor and not having brushes, commutator and slip rings. Finally mechanical energy is generated from the speed breakers, which is resource to the alternator and generates the 10kw electricity from speed breakers.

Download  Power Generation from Speed Breakers Using Air Compression Method Project Report.