+234 813 0686 500
+234 809 3423 853
info@grossarchive.com

Ultrasonic Object Detection

  • Type:Project
  • Pages:3
  • Format:Microsoft Word
(Electrical Engineering Project Topics & Materials)
Ultrasonic Object Detection Project


The main aim of this system is to detect object that will be ahead of ultrasonic transducer. This application is very useful in areas like monitoring and also very useful in wild life photography. There are two main parts of the ultrasonic detector. First one is emitter that produces a 40kHz sound wave. Second one is detector that helps to detect 40kHz sound wave. 

This signal is then sent back to microcontroller. In this system the ultrasonic module is interfaced to the microcontroller of 8051 family. Signal is transmitted whenever an object approaches near the ultrasonic module, which then transmits a signal which is reflected by the object and thus is received by the module itself. The ultrasonic receiver sends back the signal to the microcontroller which is actuates the output to take the necessary action. Here an LCD screen is used to display the status as of whether the object is detected or not.

Future enhancement can be done to this project by interfacing a GSM modem, so that SMS is sent to the user by the controller whenever an object is detected.


Block Diagram:

 







Hardware Specifications
Inductor
Shunt capacitors
8051 series Microcontroller
Op-amps
Current Transformer
LCD
SCR
opto-isolator
Slide Switches
Crystal
Transformer
Voltage Regulator
Diodes
Lamp



Software Specifications
Keil µVision IDE
MC Programming Language: Embedded C


Ultrasonic Object Detection

Share This

Details

Type Project
Department Electrical Engineering
Project ID ELE0266
Price ₦3,000 ($9)
No of Pages 3 Pages
Format Microsoft Word

500
Leave a comment...

    Details

    Type Project
    Department Electrical Engineering
    Project ID ELE0266
    Price ₦3,000 ($9)
    No of Pages 3 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT We present Quiver, a system that coordinates service proxies placed at the edge of the Internet to serve distributed clients accessing a service involving mutable objects. Quiver enables these proxies to perform consistent accesses to shared objects by migrating the objects to proxies performing operations on those objects. These... Continue Reading
    ABSTRACT Assistive technologies to aid the visually impaired have evolved over time from screenreading software, magnification programs and daisy book readers, there are a plethora of devices to aid the visually impaired in their daily activities. Despite the established utility of such devices they face certain limitations that have hindered... Continue Reading
    ABSTRACT Dating back to the oil boom period, one recalls on the sudden and amazing expansion of our domestic markets with high demands for various products. Particularly immediately after the civil war, Nigeria economy has provided an investment climate in the country.The need to... Continue Reading
    CHAPTER ONE INTRODUCTION Introduction An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such blocking the user or source IP address from accessing the network. IDS... Continue Reading
    ABSTRACT Gas is supplied in pressurized steel cylinders. As this gas is heavier than air, when it leaks from the cylinder it flows along floor and tends to settle in low spots such as a basement to cause fire or suffocation if not dealt with. To handle gas leak situations, this project presents the... Continue Reading
    Outliers are every day problems encountered in all spheres of life. This work addresses the different methods of labelling outliers and as well highlights the applications of outliers in real life processes... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    This paper covers a few algorithms used in an attempt to detect plagiarism among students’ computer program source codes electronically, that is, using a computer software program. One algorithm proved to meet most of the requirements with acceptable results and was implemented using VB .Net programming language.... Continue Reading
    ABSTRACT   In The development of ways to reduce malpractices in examination centers in all educational institutions is an important area of research. One of the major problems discovered aiding malpractices has been the creation of mobile phones, which however is a good communication device but needs to be curtailed during examinations. In order... Continue Reading