Universal Serial Bus Presentation

Introduction to Universal Serial Bus Presentation:

They are buses or ports use to connect the device with the computers. This USB is very fast and have the capability to send 500Mbyte per second. USB ports are common in all the devices means every device related to computer comprises of USB port and they are directly connected to the computer. HUB is responsible for connecting device and computer. It checks the function of the USB. It is also responsible for power distribution and checks whether the USB is working correctly or not.

USB are connected through cables that have 8 inputs and outputs. It has three pairs of cables that are twisted. They are used data transmission and for power.

There USB are very high speed. They can send the data with the speed of 625 MB/sec. they use power of 150mA and they require minimum voltage between 4.4 and 4V. Its speed does not depend on cable length like USB 2.0.

Difference between USB 3.0 and USB 2.0:in USB 3.0 we can send full duplex data while in USB 2.0 only half duplex data. USB 3.0 has 9 pins whereas 2.0 have 5 pins. USB 3.0 has speed ten times faster than 2.0. USB 3.0 is even faster than fire wire. Fire wire has the speed of 3.2 GB/s while USB 3.0 has the speed of 4.8 GB/s.

Applications: they are used by mass storage device like pen drives. They are used by external hard disks and flash drives. They are used to connect ATA, SATA or ATAPI. They are also used to connect mobiles to connect with computer and IPODS, MP4 players etc. in laptops we also connect mouse and keyboard with USB and other applications like connecting LAN, ETHERNET ADAPTER, WI-FI adapter, joystick, gamepads etc.

Download  Universal Serial Bus Presentation  .

ECE Seminar Topic Image Processing Facial Recognition Using the Theory of Biometrics

Introduction to Seminar Topic Image Processing Facial Recognition Using the Theory of Biometrics:

The human’s capability to remember the faces of the fellow humans which is acquired since the birth.  The Computer now doing this job perfectly to recognize the faces of humans for the security cause.  This topic covers about the memorizing the faces of thousands of humans by computer system into its own language. This technique is very well using in various fields like different types of elections, forensic investigations and analysis, also for the protection of the personal computer. 

The facial recognition system is a very developed technological innovation that comes under the field called Biometrics. The Biometrics analyses the recognition by using some biological features of the humans with its programmed technique to match the face. The concept of the recognition is the unique and specific characteristics of the human face. The facial recognition may contain some basic stages from taking snap of the human face to analyze and matching up to its stored database of images. 

This amazing technology has been already applied by a company known as Visionics, which has developed a software for the image processing called Faceit. The principle feature of the facial recognition is Local Feature Analysis or LFA algorithm, a mathematical technique of the system. The system works by mapping of the face and produces a face print which is a specific code for the face and then compare this face print to its database stored image. 

The facial recognition technology has great application in the field of banking ATM, Cash bearing security, Law enforcement, Security surveillance, elections etc. The technology can be used to secure your computer system and files by the use of web cam. The application is very useful it can simultaneously secure the computer system along with the password.

Download  ECE Seminar Topic Image Processing Facial Recognition Using the Theory of Biometrics .

Term Paper Topics for ECE on Evolution of the Mobile Market

Introduction to Term Paper Topics on Evolution of the Mobile Market:

The first version of the deployment and evolution of the mobile markets was in the United States in the early 1940’s.  These became enable to the users to let mobile phones in their cars. In the later layer 1960’s Bell System had launched an IMTS called as the Improved Mobile Telephone Service like large bandwidth.  This system were called as cellular because this areas where divided into various small chunks which is by the low power receiver.

The first generation called the IG is the first of the mobile communication which has developed it in two parts in the early 1970. The two parts are establishment of the micro processors and the digitization of the link of the mobile and the sites.  The Second Generation called the 2G which developed the unique systems to the communications of the mobile cell phones.

This generation surveys the voice signals as well as the control link. The third Generation and the latest generation called as the 3G guarantees the quick communications and also fast internet access services. Development for the 4G has been already been under development by the developer’s team.

The access technologies of the mobile markets are the FDMA, CDMA, TDMA each one starts for the Frequency division multiple access as FDMA, Time Code Multiple Access as the TDMA and Code Division Multiple Access for the CDMA. The FDMA is a common system which is divided into the parts of the frequencies and is then assigned to the end users. TDMA permits the users to access the radio files and documents. CDMA is related on the spectrum control called as the “Spread”.

This tells a brief note about the 3G radio transmissions and many other facilities of the 3G device.  A normally wireless technology has increased largely in the up growing development stages. 

Download  Term Paper Topics for ECE on Evolution of the Mobile Market .

Technical Seminar Topics for CSE 2012 on 3G Radio Transmission Technologies

Introduction to Technical Seminar Topic on 3G Radio Transmission Technologies:

This article gives a small introduction briefly about the 3G radio transmission technologies and many other 3G communications devices. This article distinguishes the wireless mobile phone technologies that can be used as the permanent or temporary free paths for the development of the wireless internet broadband access.

The goal of this device is to show that the wireless access of internet broadband is on the stages of development now a day’s.  Successful accepting the wireless 3G networks which dependently follows the capability of the functions of latest mobile phone devices to distinguish between the 2G and the other networks currently working all over the world.

3G is the latest service from all other older services which enables the user to communicate with each other by the consumer devices. 3G in upcoming future will be all over the world providing a global roaming service to all.

Download  Technical Seminar Topics for CSE 2012 on 3G Radio Transmission Technologies .

ECE Project Report on Security System Using RFID

Introduction to Security System Using RFID:

   In general for each and every organization, industry, home and a person need security. It is most important common need. Security is mainly used in organizations. For this purpose, in olden days security guard was used next token numbers and next passwords. Now a day tags with RFID (Radio Frequency Identification) technology has been using. But it is not more secure because one of the person tags is used by other one without his/her permission. It is more danger. To avoid these types of danger situations we should provide a new technology, which is “BIOMETRIC SYSTEM” with existed RFID system.

                                    The main objective of our project is providing a security to individuals having only one identification. For this purpose biometric system is used. We have to use hardware equipments are RFID Reader, RFID Tag, Camera, GSM, Zig bee, Microcontroller, power supply, RS-232, antenna, PC and mobile.

RFID tag system has taken more time to identification, not secure, cost effective and need a person. But our proposed system is not require a person and don’t have these disadvantages. It has multiple advantages so it is also called as multi-level security system. It is used for each and every room, which are in the organization.

                                    Fingerprint (thumb) biometric system is used in this proposed system because each person has different fingerprints so individual identification is provided. All these equipments are under the control of microcontroller. For every entry and exit SMS will send to the management. Zigbee is a wireless mesh communication within the organization. It has a range of 10m and operated at 2.4GHZ. Transmitter module keeps at rooms and receiver module keeps at management room. So security is more no chance to done mistakes. Finally conclude that it is the best technology for security purpose. It is easy to maintain user has a bright future and low cost more reliable. It is also used for vehicle security.  

Download  ECE Project Report on Security System Using RFID .

Power Generation from Speed Breakers Using Air Compression Method Project Report

Introduction to Power Generation from Speed Breakers Using Air Compression Method Project:

 In our world every organization, industry, scientific labs, etc have been depending on electricity. Not only these sectors but also humans need electricity, which is equal to our minimum needs. Can we live without electricity now a day? Can we imagine our world without electricity? It is the most important need to us. So we have to increase the electricity. But it is generating very less quantity because population is more, so required more electricity. So we should generate more electricity. For power generation, there are so many methods, which are by using water, coal, sunrises, iron, etc. one of the source is by using speed breakers using air compression method we can generate the power. This is the aim of our project.  

                These speed breakers are made by helical springs of vibrating type at the base position. This spring height should be 0.3m only. When a vehicle loads and cross the speed breaker, immediately both are in depressed state and come back to their original position. These are having a specific dimensions compared to national high-ways. Length, width and height are 4m, 0.4, 0.2m respectively. These are rigid type with made of steel or tar.

When a vehicle loads the speed breaker then compresses the air in it. This air is used to impeller, so it is resource for the alternator. For e.g. Base is trapezoidal shape, so it has max and mini loads on the speed breaker. If it may be uniformly distribution load then it depends on product of factor of safety and whole weight.

                In impeller existing energies are, in inlet is kinetic energy and in outlet is atmospheric. This alternator is a electric generator machine which converts mechanical energy into electrical energy is based on principle of dynamically induced e.m.f. it has both stator and rotor and not having brushes, commutator and slip rings. Finally mechanical energy is generated from the speed breakers, which is resource to the alternator and generates the 10kw electricity from speed breakers.

Download  Power Generation from Speed Breakers Using Air Compression Method Project Report.

ECE Project Report on Agriculture Aid Seed Sprinkling and Crop Care Taking Mechanism

Introduction to Agriculture Aid Seed Sprinkling and Crop Care Taking Mechanism:

In previous years, farmers were depended on plants and crops for staple food. They were depending only on rain and atmospheric quotients for field crops. For these crops they have 5-steps. They are Ploughing, Seed sowing, Seed sprinkling, Harvesting, and pesticide sprinkler.

                              Ploughing is the first step in farming. In this process we will till the land and make get ready to seed sowing. Plough is nothing but it has a teeth’s structure and will be able to turn top layer of soil down. In this process land will be making as a field. Second step is seed sowing, in this process we will put the seeds in ground. Seeds flow will control automatically. Third step is seed sprinkling, this is another way to put the seeds in ground i.e., we have to thrown the seeds into tilled field.

For this we have a high-speed fan. It moves automatically and controls the directions. Fourth one is harvesting. It is a mechanism, has horizontal blades used to cutting the standing crop. Last one is pesticides, which are used for not to get diseases, insects, damages the plants, and growing the crops and production.

                              In this process labor and time is required and put more effort. And also it is a slow process. All these slow steps are avoided by the new mechanism is known as “CHAIN DRIVE MECHANISM”. It has a conventional wheeled ploughs for balancing and proper weight distribution.

It has pipes for sowing of seeds connected to the seed tank and has controlling the speed of fan capability and restrict the flow of seeds and pouring the seeds in tilled field which is sprinkling. For this work no. of motors, pipes, and chains and also controlling mechanism required. Atmel 89C 51 micro controllers, RF transmitter/receiver, and dc motor are used. Advantage of this mechanism is no need of labor, time and effort. It is fast and more reliable process.

Download  ECE Project Report on Agriculture Aid Seed Sprinkling and Crop Care Taking Mechanism .

Aeronautical Crash Prevention System through RF Communication Project Report

Introduction to Aeronautical Crash Prevention System through RF Communication Project:

Generally if any two vehicles collide on the road, that situation is there then we can avoid that collision because it is in our hand. Then what about flights collision in an air. They don’t what happens in the atmosphere, so chances to flights collision. To avoid this problem in aeronautical sectors we can prevent aeronautical crashes by using RF communication with embedded systems.

Embedded system is used for a specific task with low power supply. It is a combination of both software and hardware. It is mainly used for industrial, aeronautical, automobile, home applications. Now a day wireless communication plays important role in technology, by using this communication we can switch off the lights and entertainment systems to industrial controls through remote monitoring (wireless).

                                    The main aim this project is preventing the aeronautical crashes. Hardware requirements are RF Transmitter (STT-433MHz)/Receiver (STR-433MHz), Microcontroller (AT89C52), Encoder-318, Decoder-318, LCD (16×2 and 20×2), Electromagnetic relays, ULN2803, Buzzer and power supply. Transmitter contains encoder, which takes parallel data from microcontroller as input and gives serial output. Whereas receiver takes serial input and gives parallel output to the microcontroller. Compare to microprocessor microcontroller has three level programmable clocks and low power consumption. This data is processed in receiver and drives the motors in opposite direction. All the status will be displayed in LCD. This unit is placed in flight.

                                   Every aero plane contains both transmitter and receiver; this mechanism will depend on ip address. Transmitter sends the ip address of aero plane to receiver of other. Receiver receives ip address of other aero plane. If any information is there transmitter sends, then the receiver buzzer will glow and produce sound. So there is a chance to crashing aero planes. Then we have to divert the both aero planes to its initial position. So no chance to crash. 

 Download  Aeronautical Crash Prevention System through RF Communication Project Report .

Electronic Temperature Control Relay Project Report

Introduction to Electronic Temperature Control Relay Project:

In our daily life we have been wasting so much of power by using electronic devices like heaters, fans, TVs, iron boxes, etc and other resources. Electricity is the most important for our world so we should be save it. By using temperature control device we can save the power. 0-100°C electronic temperature controlled relay is a circuit, which temperature is controlled with the help of LM35 temperature sensor.

LM35 series are precision integrated –circuit temperature sensors. Its output is directly proportional to the Celsius temperature. These sensors has an advantage compared to linear sensors is which are calculated in ˚ Kelvin also. If any user does not required to subtract constant voltage from its output to get centigrade scaling, these LM35 series sensors do not require external calibration.

The main aim of this project is control the temperature. Hardware requirements are LM35, Comparator, Relay, Reference voltage, and buzzer or alarm. LM35 temperature sensor is calibrated in Celsius and Kelvin. Comparator is used for to construct complete thermal-controlled switch. Reverential voltage is used for set the temperature. If the temperature is low for the preset level then it will energize if high then de-energize is done by the Relay. Buzzer or alarm will generate the sound when temperature is sufficient.

This project is applicable for both heaters and iron boxes. When a bucket of water is heated with heater then LM35 circuit is keep in touch with heater and set a temperature value. After completion of that presented level buzzer will give sound. same for iron boxes.

Future enhancement is applicable for industries. This circuit is keep in touch with mission and set a temperature value. After completion of the temperature level alarm will give the sound then inform to control room immediately mission will be stop. So we can save the power as well as money.  

 Download  Electronic Temperature Control Relay Project Report .

Adaptive Camouflage Project Report

Introduction to Adaptive Camouflage Project:

The project is “Adaptive Camouflage”. It is a group of camouflage technologies. It allows the object to blend into surroundings by the use of their appearance, color, altering, prevents shadows, luminance, and reflective properties. In these technologies one of the best is active camouflage, which is taken from animals because of their capacity to provide exact concealment from visual detection.

The detection produced by the human eye and optical sensor is avoided by this technology. Active camouflage provides perfect concealment in two different ways. First one is, it makes the camouflaged objects not similar to its surroundings but by the mimicry makes effectively invisible. Second one is when the changes occur in the background then active camouflage changes the appearance of the object.

Adaptive camouflage shows the perfect object and its surroundings for this purpose, it should follow three methods. 1st method is Light Surface Reflectivity, in which a retro-reflective material is used for getting brightness reflection with the help of perfect smooth surface like mirror because incident rays and reflected rays came from same angle with mirror surface. 2nd method is TV & Camera method (it has two technologies. They are CCD& CMOS), in which for capturing the image active-pixel sensor is required. The advantages of both CCD and CMOS involved in a single active-pixel sensor.

And third one is Meta materials method, in which Metamaterial will collect rays from all directions and emits in a single direction. Radio antennas will do same and include wavelengths. Applications of the adaptive camouflage are military, security of valuables, precious jewelry, documents, Doctors performing surgery to see through their hands and get a clear view of biological tissues, aircraft landing, to see outside world for windowless buildings and automobiles, it will provide view section. By using this we can know the surroundings of the target.