ULTRASONIC OBJECT DETECTION

  • Type: Project
  • Department: Electrical Engineering
  • Project ID: ELE0425
  • Access Fee: ₦5,000 ($14)
  • Pages: 3 Pages
  • Format: Microsoft Word
  • Views: 383
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
Ultrasonic Object Detection Project


The main aim of this system is to detect object that will be ahead of ultrasonic transducer. This application is very useful in areas like monitoring and also very useful in wild life photography. There are two main parts of the ultrasonic detector. First one is emitter that produces a 40kHz sound wave. Second one is detector that helps to detect 40kHz sound wave. 

This signal is then sent back to microcontroller. In this system the ultrasonic module is interfaced to the microcontroller of 8051 family. Signal is transmitted whenever an object approaches near the ultrasonic module, which then transmits a signal which is reflected by the object and thus is received by the module itself. The ultrasonic receiver sends back the signal to the microcontroller which is actuates the output to take the necessary action. Here an LCD screen is used to display the status as of whether the object is detected or not.

Future enhancement can be done to this project by interfacing a GSM modem, so that SMS is sent to the user by the controller whenever an object is detected.


Block Diagram:

 







Hardware Specifications
•Inductor
•Shunt capacitors
•8051 series Microcontroller
•Op-amps
•Current Transformer
•LCD
•SCR
•opto-isolator
•Slide Switches
•Crystal
•Transformer
•Voltage Regulator
•Diodes
•Lamp



Software Specifications
•Keil µVision IDE
•MC Programming Language: Embedded C


ULTRASONIC OBJECT DETECTION
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Electrical Engineering
  • Project ID: ELE0425
  • Access Fee: ₦5,000 ($14)
  • Pages: 3 Pages
  • Format: Microsoft Word
  • Views: 383
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Electrical Engineering
    Project ID ELE0425
    Fee ₦5,000 ($14)
    No of Pages 3 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT We present Quiver, a system that coordinates service proxies placed at the edge of the Internet to serve distributed clients accessing a service involving mutable objects. Quiver enables these proxies to perform consistent accesses to shared objects by migrating the objects to proxies performing operations on those objects. These... Continue Reading
    ABSTRACT We present Quiver, a system that coordinates service proxies placed at the edge of the Internet to serve distributed clients accessing a service involving mutable objects. Quiver enables these proxies to perform consistent accesses to shared objects by migrating the objects to proxies performing operations on those objects. These... Continue Reading
    ABSTRACT Assistive technologies to aid the visually impaired have evolved over time from screenreading software, magnification programs and daisy book readers, there are a plethora of devices to aid the visually impaired in their daily activities. Despite the established utility of such devices they face certain limitations that have hindered... Continue Reading
    ABSTRACT Assistive technologies to aid the visually impaired have evolved over time from screenreading software, magnification programs and daisy book readers, there are a plethora of devices to aid the visually impaired in their daily activities. Despite the established utility of such devices they face certain limitations that have hindered... Continue Reading
    ABSTRACT Dating back to the oil boom period, one recalls on the sudden and amazing expansion of our domestic markets with high demands for various products. Particularly immediately after the civil war, Nigeria economy has provided an investment climate in the country.The need to... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    Outliers are every day problems encountered in all spheres of life. This work addresses the different methods of labelling outliers and as well highlights the applications of outliers in real life processes... Continue Reading
    ABSTRACT Gas is supplied in pressurized steel cylinders. As this gas is heavier than air, when it leaks from the cylinder it flows along floor and tends to settle in low spots such as a basement to cause fire or suffocation if not dealt with. To handle gas leak situations, this project presents the... Continue Reading
    CHAPTER ONE INTRODUCTION Introduction An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such blocking the user or source IP address from accessing the network. IDS... Continue Reading
    Call Us
    whatsappWhatsApp Us