ECE Seminar Topic and Report on Military Radars

Introduction to Military Radars Seminar Topic:

This paper is discussed about “Military Radars” , its features, benefits and also its operations.  Military Radars are useful to give warning or altering Weapon control functions.

Features and Advantages:

Deployment of Military Radar will takes place within minutes. Military Radars (MR) will be useful to both air space users and air defenders by minimizing mutual interference of tasks, which will intern helpful to show effectiveness in combined combat operations. It will work in all-weather conditions. It is capable of handling multiple targets and engagements. MR has fast reaction time in between target detection and fire moment. It helps to reduce the stress under pressure due to having low manning requirements and also it is easy to operate MR’s. It will provide unlimited single air defense weapons with target data and also have a capability of flexible weapon integration. Military Radars have an excellent target discrimination and exact tracking due to its high resolution.

System configuration:

Radar group, Shelter and Motor Generator are three parts of Military Radar system.

How to operate the RADAR:

The following sequence is the work flow of a Military Radar system:

  1. Target detection by Radar.
  2. Track initiation and identification.
  3. Automatic target tracking and IFF status.
  4. Target track data and put it in the encoded message.
  5. Message transmitted to weapon systems.

At the other end the below functions will take place:

  1. Message send by Radar will be decoded and parallax correction will takes place.
  2. Threat evaluation and display of results as advice
  3. Target selection. Target tracking, fire control and weapon aiming
  4. Firing at target.

Conclusion:

During Wartime, Military radars are very useful and these can be used for exact target detection and firing. A threat evaluation program exists in Radar system helps to

Puts the target in a threat sequence automatically, and suggests the military crew about which

Target need to be engaged first.  A radar system is reliable and simple to operate and the maintenance cost of this system is also low.

 Download ECE Seminar Topic and Report on Military Radars .

Seminar Report on Wireless Charging Of Mobile Phones Using Microwaves

Introduction to Wireless Charging Of Mobile Phones Using Microwaves Seminar Topic:

The fact that mobile phones work on batteries makes them vulnerable to charging once the batteries get drained. The rate at which batteries drain depends on the manufacturers of both batteries and mobiles. Batteries get drained as we talk, how it would be if we reverse this process. Using microwaves mobile phone can be recharged.

The mobile towers transmit microwave with the message/data signal. These microwaves can be used to charge the mobiles by using a guided antenna at a frequency of 2.45 Mhz, sensor, Rectenna and a filter circuit which can be fitted to the regular handset. With this setup the phone automatically gets charged as you talk.

Microwaves are most suitable for data transmission because they can penetrate any obstacles and in all weathers. Microwaves are used in remote sensing, data transmission from space, communication industry and cooking. These radiations are sometimes considered as harmful. We use S band spectrum which is license free and reserved especially for industrial, scientific and medical purposes and also for Bluetooth and wireless LAN.

Magnetron is a device which uses both magnetic field and electric field is produced perpendicular to each other thereby magnetic field is constantly applied along the axis of the device.

A rectenna is a special type of rectifying antenna which converts microwave energy into DC current. We can achieve 90% efficiency using this antenna. This antenna can be constructed by placing a schottky diode between dipoles of antenna. A sensor simply senses when a mobile is used for talking.

The advantages are elimination of different types of chargers; one microwave transmitter serves all service providers in that area and recharging of mobiles without any wires. Few disadvantages are ill effects on human body and not much advancement in practical implementation commercially. 

 Download Seminar Report on Wireless Charging Of Mobile Phones Using Microwaves .

Seminar Report on Wearable Computers

Introduction ot Wearable Computers Seminar Topic:

Cellonics Technology Modems

All communications such as LAN, WAN, wired Internet, wireless internet, telecommunications work using modems. Modem is basically a device which modulates and demodulates carrier signal with digital information. The speed of data transfer depends on the speed of modem capacity. Hence there is a need to develop high speed modems to cater for present days technologies where millions of terra bytes of data will be transferred every second. Cellonics is the technology which will solve our problems.

Cellonics technology modems are based on biological cell communication system which is 1000 times faster than traditional modems. This technology is simple, robust and user friendly.

As this technology is based on human cell behavior it is studied that human cells generates a waveform in response to actions these wave forms are serial pulses separated by periodic silence. Cellonics technology duplicates the same process and applies to communications.

Working of Cellonics: – this element takes slow analog signal as input and in gives predictable, fast pulse as output thereby encoding digital information and transferring it over communication channels. In building Cellonics Nonlinear Dynamical Systems (NDS) employs mathematical formulations which are needed to simulate the cell responses. Being nonlinear system the performance exceeds the normal limits and simultaneously simplifies implementation process. Cellonics technology is mostly used in service industry of telecommunications.

There are many advantages in using Cellonics in communication systems. It saves chip/PCB real estate there by simplifies receiver implementation by 4 times. Savings on power by 3 times because of using few components that are passive and consumes less power. Savings on implementation time is possible because of elimination of many sub components such as amplifier, mixer, PLL, oscillator, filter, crystal quartz, etc. in order to build your product which is small, powerful, long on power and low cost employing or using Cellonics technology is ideal.

 Download Seminar Report on Wearable Computers  .

ECE Seminar Topic on Washout Control For Manual Operations and Seminar Report

Introduction to Washout Control For Manual Operations Seminar Topic:

In this world there are many systems that are to be controlled every day. We may call a mechanical, electrical, electronic and hydraulic based or for that matter anything as a system and the means to control such system can be called as control system. A control system can be manual or a device used to regulate behavior of a system using some commands.

There are mainly 2 types of controls linear and non-linear controls. Manual controls come under non-linear controls where an operator opens or closes a valve of hydraulic press. Under linear controls a feedback loop will be running for sensing the working of a machine and if any deviations the system automatically sends the correcting measures and the system is controlled.

During manual controlling of a machine due to vibrations caused by manual movements there will be undesired results. To remove these vibrations in manual manipulation we have various techniques such as giving the feedback to the system with delayed feedback and washout filters. The main feature in this technique is use of steady state blocking zeros by feedback controller at zero frequency. This process is employed will remove any difference in steady state input.

Though this system is effective but is very complex to design because of the closed-loop systems continuous change in feedback control. It can be considered that washout filter is a high-pass filter which removes steady state input. This is used in real life power systems. For the closed-loop identification we use SSARX method also known as closed-loop subspace identification method.

To demonstrate this control system we experiment by manual controlling an inverted pendulum. Here on a moving cart a pendulum is attached and the cart is manipulated by an operator so that the pendulum remains balanced and stands still. With the use of our washout control the vibrations are successfully suppressed in manual control system.

Download ECE Seminar Topic on Washout Control For Manual Operations and Seminar Report.  

Technical CSE Seminar Topic on Bio Metric Systems

Collecting a data to identifying a person in manual way is time taking process, involves more risk for implementation and maintaining the data. In the present world data was easily misused by frauds. To secure a data from those people’s data should be maintained very confidential and access of data should be highly secure. For maintain the data in such manner we need highly protected system to maintained above things. For that Biometric system is very useful.

The Biometrics system is a device, by using this maintaining and implementation of the data in high secured manner. Using this data was not misused by any other persons.

Biometrics is an automatic mechanism used for the capture the real time persons finger prints and pictures. Biometric is containing the three type of identification, the mechanism is automated, storage process and interact with different applications.

Biometric system is contains two stages

Stage one: Enrolment stage

Stage two: identification stage

Enrolment stage contains scanning the data and the obtained data was stored

Identification stage contains cross checking the data with stored data, if it is matched system gives the permission for the proceedings

A sensor is scan for the physical density and creating digital presentation, there are two type of the topology to identifying the Biometrics physical and behaviour. The physical is depends on the identifying faces, finger prints, Hand and eye. Behaviour is taking the signature of the person and voice.

The limitation of the using the Biometrics only the user allow to perform an identity otherwise it should paly alarm alters.

Cost also increasing to scan for different human identifications. Voice is the least cost one.

Hand and IRIS are the highest cost one and give the good performance.

The Iris is a technology is used for to identify for the retina and eye colour.

The IRIS data is identifying the using the Rainbow. The Eye black one most powerful identities, this is the Technology used to identifying the person in ATM Canter and cash machines. While using the ATM canter pictures should be captures very easily when any illegal thing should be happened. The IRIS data should be unique.

 Download Technical CSE Seminar Topic on Bio Metric Systems .

Vehicle Monitoring and Control System Using Micro controller Project

Introduction to Vehicle Monitoring and Control System Using Micro controller Project:

We know that most of the accidents involve heavy vehicles such as trucks and busses. The main reason is because of them using huge engines and complex running structure compared to smaller cars there is greater risk of any of the system being failed while the vehicle is moving at a high speed or even because of driver error an accident may be caused.

Hence there is a need to monitor the vehicles parameters such as speed of the vehicle, temperature of engine, fuel availability, battery monitoring, proximity detection and coolant level is essential for the safety of vehicle. This information should not only be visible to driver but also to the base stations/owners.

In this system we make use of PSOC – programmable system on chip instead of microcontroller which reads all the parameters of the vehicle and transmits the same data to base stations using RF frequency.

PSOC’s has powerful processor architecture, advanced peripherals, Flexible on-chip memory, precision programmable clocking, programmable pin configuration, additional system resources and complete development tools.

Operation: – The important parameters of the vehicle are measured using appropriate sensors and this information is transferred to PSOC. Then the PSOC samples the data at regular intervals and the corresponding actions to be taken are stored in its memory for later or immediate action.

The speed of the engine is monitored every second and is converted into RPM which is displayed to driver continuously and when speed exceeds a certain value, the PSOC automatically activates a motor which apply the brakes. In this way the speed is limited to a predefined value.

Similarly all other parameters can be sensed and controlled immediately or at later stage at a base station. Hence this system of Vehicle-monitoring and control system using microcontroller helps in better management of heavy vehicles and reduces the accidents to highways to greater extent.

Download Vehicle Monitoring and Control System Using Micro controller Project report .

Vehicle Density Based Traffic Light Signaling System

Introduction to Vehicle Density Based Traffic Light Signaling System Project:

Traffic management is one subject on which every year millions of dollars are spent across the world to provide better traffic management. Especially in the developed countries such as India there is huge scope for a better traffic management.

Presently traffic is managed manually at smaller junctions and by using the signals lights (Red – Green – Yellow) at major junctions. This system will not serve for effective using of road space in major cities. The latest technology that can be employed is by using signal lights which function based on density of vehicles on the roads.

In this system all the timings of signal lights are fed to a computer basically termed as base station and through this station all the signals are sent to microcontrollers (89C51) placed on signal lights to operate accordingly. Sensors are connected to microcontrollers on every signal location which senses/reads the density of traffic in that particular road and sends the information to base station. Hence a bi-directional information flow system should be in place between signal lights and base station. Based on this information on density of traffic the signal light timings are automatically changed and also if needed traffic will be diverted to roads where traffic is less.

For sensing the traffic we can either use laser sensors or inductive type metal sensors. For transiting data we can use 433 Mhz carrier frequency. And use RS232 protocol for microcontroller (895C1) communication.

By deploying this model in real time we can save time being wasted in standing at signal, petro / fuel consumption can be reduced and make traffic management accurate.

Download Vehicle Density Based Traffic Light Signaling System .

SMS Based Vehicle Location Finder for Parking ECE Seminar Topic

Introduction to SMS Based Vehicle Location Finder for Parking ECE Seminar Topic:

In present day life cars have become a common commodity to every family living in cities. With cars some problems such as security and parking is a common thing. Car parking has some glitches to it such as parking at right place and finding it back when we want to move out. In huge parking lots and multi storied parking lots there will be some confusion in finding the car because where we had parked the car and how to get it out. To solve this problem here is a simple system designed to give the direction where the car is. This system is based on microcontroller and GSM technology which is called as “SMS based vehicle location finder”.

We use a mobile phone to trigger a microcontroller which in turn controls an appliance such as a buzzer to ring an alarm and also the microcontroller acknowledges by sending an SMS that the buzzer is ringing or the lights of tail lam are flashing.

The main components in this system are AT command supporting GSM mobile phone, 89S52 Microcontroller, Max 232 IC, Relays, Relay driver IC ULN 2803, Voltage regulator 7805, Diode IN4007 and GSM Phone. The software used is Keil-U-Vision 3.0 in this software by using Keil tool set we can generate embedded applications virtually with supported microcontrollers. AT command is the communication protocol used between GSM phone and microcontroller.

The theory/principle used in this project can be used in different fields apart from just car parking application. We can use it to trigger a security alarm for vaults, to turn ON motors remotely using GSM handsets and many more.

Download SMS Based Vehicle Location Finder for Parking ECE Seminar Topic.

Technical Seminar Report on Wireless USB

Introduction to Technical Seminar Topic on Wireless USB:

Imagine if we can transfer data from computer to printer, camcorder, Cell phones and other customer electronic products without any wired USB connection. This can be possible if Wireless Universal Serial Bus (WUSB) becomes a reality.

USB is the one of the most successful customer electronic product in the last 10 years. It is the de facto interconnect to most of PC’s around the world. Wireless USB specifications are designed for transfer of high speed data. In 2004 WUSB promoter group is formed which includes Agere Systems, HP, Intel, Microsoft Corporation, NEC, Philips Semiconductors, and Samsung Electronics.

Wireless USB has wide usage in both home and industry applications such as Entertainment PC, Digital Camcorder, Digital Still Camera, HDTV, DVD-RW/CD-R, (Recorder/Player), External Storage, Device (HDD), Game Console, MP3 Player, Set Top box, mobile device, Personal Video, Player (PVP), Personal Video, Recorder (PVR), Printer.

Topology / Technology requirements: – WUSB device works on ‘husband-spoke’ topology. The host is responsible for transferring data among devices connected to it by allotting bandwidth and time slot to each device. We can call them as clusters. There will be point to point connection between wireless USB host and Wireless USB device. In this connection type hubs are eliminated. A host can be connected to 127 WUSB devices at a point of time. Even if there are multiple wireless USB devices connected to same host the clusters co-exist within the same environment / radio cell. In the next stage connection between two hosts and a normal USB is also possible. Wireless USB will be based on the Ultra-Wideband (UWB) radio.

Since security is the major aspect Wireless USB has to deliver the high standards of security just as wired USB. Authentication of devices before operation of device is needed for connection-level security between devices. At application level encryption needs to be implemented. The installation and operation of wireless USB should be made simple and opera table.

Download Technical Seminar Report on Wireless USB.

Seminar Topics for ECE Branch On Springs

Introduction to  Springs Seminar Topics:

A device which changes its shape when external force is applied and returns to its near original shape when force is removed is termed as spring. Here the energy used to extend the spring is stored in the spring when extended and this energy is released back when the force is removed.

If we study the history of springs it goes way back to 3rd century B.C and since then many engineers made use of spring mechanism in different fields of life such as military, agriculture, machinery etc. Since then technology had vastly evolved and springs are used widely in various fields in present day to day life.

Mainly springs can be classified into 5 types.

Cylindrical or Conical shaped springs: – These are just ordinary springs in the shape of a cylinder and well coiled.

Extension spring: – Spring on which extension force when applied the distance between coils increases are called as extension springs.

Compression spring: – When force is applied on these coiled springs the spring is pushed together and the spring is shortened are called as compression springs. These are mainly used in automobiles.

Torsion spring or coiled spring: – Springs that are used to apply tension at twists are called as torsion springs mainly found in clip boards and hair clips.

Leaf springs: – Springs which are not in coil shape but looks as a shallow arch for example springs used in automobiles such as heavy trucks in the rear are called as leaf springs. 

Download  Seminar Topics for ECE Branch On Springs.