The aim of this Construction of wireless matchbox for digital lantern using RF technology project is to control a high voltage electrical lamp control operation with the help of RF. The status of lamp control either ON/OFF can be observed on receiver side with the indication of LED. Users can control the lamp operation with the help of control buttons.
This Construction of wireless matchbox for digital lantern using RF technology project consists of an input from control buttons it sends the appropriate signals from RF transmitter, then the receiver receives the signals and performs the operation either to ON/OFF the lamp. Then it processes the data and takes necessary action and updates the status through LED.
User can simply ON/OFF the device with the help of remote communication.
1. Aims at energy conservation.
2. Provides user friendly interface.
3. Provides fast access to using RF.
The project provides learning’s on the following advancements:
1. Interfacing RF to control buttons.
2. Lamp control circuitry.
The design scheme of this robot is based on the recognition metal based on the principle of mutual inductance. This is verified by on-board reference comparison. The metal detection circuit is mounted on a robot which is controlled by RF.
This Bomb Detection Robot project is developed on embedded platform, whose software platform use the firmware written in embedded C. The metal detection circuit contains a coil which when placed over a metal, changes the response of the system and inturn the system signals the remote node about the detection and rings a buzzer on the robot.
The whole Bomb Detection Robot project is implemented on 8051 based AT89S52 controller and the compiler used is RIDE/KEIL. the remote metal detecton values are displayed on the LCD. The controlling of the robot is enabled with zigbee network.
RIDE to write code
ISP to burn the chip
At89s52 based our own developed board
RF transmitter and receiver
Metal detector sensor
Aim: The Multi Purpose Bridge designed here can be used for crossing the road; the same bridge constructed with crane mechanism at its bottom side also can be used as crane for lifting & carrying the packages across the road without disturbing the traffic.
WORKING: The Multi Purpose Bridge is constructed with metal sheets & the crane mechanism is designed with two DC motors. The mechanical transition section is aimed to lift the luggage up to certain height & it is carried to the other side of the road.
The crane is controlled through wireless operates, & the wireless network is designed with RF modules operates at 433MHz, so that the operator can sit at one place & can handle the crane.
The control circuit is designed with 89C51, & motors are driven through ‘H’ bridge. The system is quite useful for big cities.
Multy Purpose Bridge Blockdiagram Includes
- 89C51 MicroController
- Motors Driving Circuit Designed with H-Bridge
- 1st DC Motor is used to lifting and lowering the Luggage
- 2nd DC Motor is used to Carrying the luggage across the road
- RF Receiver operates at 433MHz
- Power Supply unit for data transmitting module
Remote control Card Designed with RF Transmitter
- 9V Battery
- 5V Regulator
- Control Keys
- 89C2051 Microcontroller used as Data Transmitter
- RF Transmitter operates at 433MHz
Introduction to Radio Identification Method Third Year Project:
This method called the radio identification method is the automatic recognization method which works on saving and replying the data that is retrieved from the Databases by the device named as the RFID. This RFID is such a tag item which is joined or connected to the animal or a product or any person for the reason of identifying it by making the use of the radio waves in it. This RFID is a small tag which has presence of silicon chips and antennae in it. There are two types in the RFID tags namely the Passive Tag and the Active Tag.
The Passive tag is the tag which has no interconnected power supply. The electric currents are then connected in the antennae’s which are present in the tags. This passive tags works by giving signals by setting it back the carrier path from the user reader. Here the present antennae are compulsory need to be circuited by the incoming signals waves and also by the transmitters too.
Active tags have it own interconnection supply of current in it. This interconnection current is then made in use of getting the outgoing wave signals. The defense system of the united has properly used this system to low down the price and change the production of arm weapons too.
The latest on working applications of the radio identification method are firstly the passports here this device is to give the passports to the people applying for it. Second is the Transport payments system here payments of the online travelling tickets are made by the means of Credit Cards. Third is the product tracking in which this device is used to track the barcode number of the products which are kept on sale. Automotive and animal identifiers are couple of other applications.
Download Radio Identification Method Third Year ECE Project Report.
Introduction to Security System Using RFID ECE Project:
The main objective of the project is to design a system that have a small coverage area which can be used for authentication or identification purposes. By using this security system we can provide entry by a access authorization process. This system is being developed by using RFID technology.
This system consists of finger print impression, camera and for looking after the authentication process. The RFID consists of RFID reader which comprises of the components working and RFID tag which maintains the transmission and reception process. In this paper we will look into the working of multi level security system.
Brief into design and working :
This system mainly uses RFID technology. RFID is a wireless identification method. This RFID consists of RFID Tags for receiving and responding to radiofrequency queries from an RFID transceiver and an RFID reader for decoding the data sent from RFID tags.PIC micro controller which is used controls all the devices and makes them to function in time.
A finger print scanner IC is used for checking the authorization process through finger prints. ZigBee is a wireless mesh network standard.GSM technology for sending and receiving a message. When the user places the thumb impression on the scanner then the camera automatically takes the picture of the user for future verification.
This information is stored in the database along with time and date when the system was accessed and by GSM technology it makes sure that concerned authority is notified about the access.
Download Security System Using RFID ECE Project Report.