This paper aims at controlling a robot that is a tank like vehicle using a universal infrared remote
control. The infrared signal sent from the universal infrared remote control is received by IR receiver and
decoded by the microcontroller PIC16F873A using an algorithm embedded in the microcontroller. The output
from the microcontroller is fed to the motor driver which drives the left and right motors. The robot‟s motor
control can be speed controlled by using PWM/PDM (Pulse Width Modulation/ Pulse Duration Modulation)
technique
This project uses mobile technology and since mobile has very large range, the project also has very large range. But finally it depends on the coverage of the mobile network.
IOT based project for accident victims,where the message is directly sent to the nearby ambulance, and the traffic is maintained on the basis of the fact that whether an ambulance is present on the road or not.
Cell Phone Operated Robot for Search and Research of an ObjectNikita Kaushal
Slide presented in 2013 10th International Conference on Wireless and Optical Communications Networks, IEEE Conference.
In this robot, an IR sensor detects an object robot’s arms pick up the object and keep in the carriage box this robot move with the help of cell phone by using DTMF technology, from arm the object is tested whether object is metallic or not, the operator get alert through SMS of object and its characteristics by using GSM technology.
This PPT explains about TV Remote Operated Domestic Appliances Control.
Edgefxkits.com has a wide range of electronic projects ideas that are primarily helpful for ECE, EEE and EIE students and the ideas can be applied for real life purposes as well.
http://www.edgefxkits.com/
Visit our page to get more ideas on popular electronic projects developed by professionals.
Edgefx provides free verified electronic projects kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
project presentation on cell phone operated land roversunanda kothari
The objective of this project is to enable the users to control a robot by a mobile phone that makes a call to the mobile phone attached to the robot. The operations performed by the cell phone operated land rover includes forward, backward, stop, left and right turn.
This project uses mobile technology and since mobile has very large range, the project also has very large range. But finally it depends on the coverage of the mobile network.
IOT based project for accident victims,where the message is directly sent to the nearby ambulance, and the traffic is maintained on the basis of the fact that whether an ambulance is present on the road or not.
Cell Phone Operated Robot for Search and Research of an ObjectNikita Kaushal
Slide presented in 2013 10th International Conference on Wireless and Optical Communications Networks, IEEE Conference.
In this robot, an IR sensor detects an object robot’s arms pick up the object and keep in the carriage box this robot move with the help of cell phone by using DTMF technology, from arm the object is tested whether object is metallic or not, the operator get alert through SMS of object and its characteristics by using GSM technology.
This PPT explains about TV Remote Operated Domestic Appliances Control.
Edgefxkits.com has a wide range of electronic projects ideas that are primarily helpful for ECE, EEE and EIE students and the ideas can be applied for real life purposes as well.
http://www.edgefxkits.com/
Visit our page to get more ideas on popular electronic projects developed by professionals.
Edgefx provides free verified electronic projects kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
project presentation on cell phone operated land roversunanda kothari
The objective of this project is to enable the users to control a robot by a mobile phone that makes a call to the mobile phone attached to the robot. The operations performed by the cell phone operated land rover includes forward, backward, stop, left and right turn.
ArduinoBased Head GestureControlled Robot UsingWireless CommunicationIJERA Editor
This paper describes the robustness of ardiuno based head movement controlled robot. This robot is controlled using motion sensor which is mounted on the head. In future there is need of robots which can be used to ease the human tasks and interact with the human easily. Our objective is to control the robot using head gesture. Accelerometer is used to detect the direction of head movement. In order to full-fill our requirement a program has been written and executed using a microcontroller system. By observing the results of experimentation our gesture formula is very competent and it’s also enhance the natural way of intelligence and also assembled in a simple hardware circuit.
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)WizApsProjects
Three U.S. Department of Homeland Security (DHS) component agencies carry out the majority of border-security missions: the U.S. Coast Guard (USCG), U.S. Customs and Border Protection (CBP), and Immigration and Customs Enforcement (ICE). A universal and more open world creates a growing need for more effective ways to control borders.
The soldiers may sometimes cross their area limit without their knowledge. This causes a lot of problems. They may be caught by other people. This project is developed for the soldiers to find out the border and to check whether the person is authorized or unauthorized. The main modules in this project are the RF transducer, ARM controller unit, and LCD. The Zigbee transmitter is connected to the border area. It transmits RF signals within a particular limit. The Zigbee receiver with the ARM controller unit will be under the control of the commander. When the soldier reaches a particular area, the RF signals are received by the receiver and given to the ARM controller unit. The ARM controller analyses the signal and sends the corresponding message to the LCD and the same information is transmitted to the commander via Zigbee. The receiver which is there at the commander receives the signal which was transmitted from the transmitter via Zigbee and displays proper information on the display. The ARM controller program is written in embedded c language and the microcontroller used is ARM7LPC2148.
Methodology:
This project is developed for the soldiers to find out the border and to check whether the person is authorized or unauthorized. The main modules in this project are the RF transducer, ARM controller unit, and LCD.
The transmitter will be there in the border area and the receiver will be there at the commander. The transmitter module has two inputs. One is the PIR sensor, which is used to detect persons. And the second is the RF receiver, which is used to detect whether the person is authorized or unauthorized with the help of an RF transmitter. If PIR senses a person and the RF receiver receives a signal from the RF transmitter, then the ARM controller analyses the signal and indicates the person is authorized via LCD. And the same information is transmitted to the commander via Zigbee and that will be displayed on receiver LCD. If PIR only receives a signal and sends that to the ARM controller. Then the controller will indicate the person is unauthorized with the help of a buzzer and display on the LCD. The commander will take appropriate action based on the information received at the receiver end.
Advantages
1. Protecting borders and other strategic areas are key to preventing these illegal activities and maintaining tight national security.
2. Secure and reliable communication.
3. Leading-edge technology that meets today's and tomorrow's needs.
4. Preventing unauthorized activity with many national borders stretching for hundreds of kilometers across
Smart Remote for the Setup Box Using Gesture ControlIJERA Editor
The basic purpose of this project is to provide a means to control a set top box (capable of infrared
communication), in this case Hathway using hand gestures. Thus, this system will act like a remote control for
operating set top box, but this will be achieved through hand gestures instead of pushing buttons. To send and
receive remote control signals, this project uses an infrared LED as Transmitter. Using an infrared receiver, an
Arduino can detect the bits being sent by a remote control. And to playback a remote control signal, the
Arduino can flash an infrared LED at 38 kHz. With this project we can design a gesture controlled remote by
using a glove, it can be fixed to the hand, we can send any signal of any length, at any related frequency, and
thus we can design a universal remote
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkKumar Goud
Abstract: The foremost critical task for coal mine is of keeping track of miners spread out across a large mining areas .It becomes even difficult when mine tunnels collapse. Many mines use a radio system to track miners, but when a collapse occurs, the base stations connected by a thin wire often are rendered useless. In this project to overcome the demerits of radio system we used wireless technology for tracking the miners. For this purpose a small RF transmitter module is equipped to each person entering a mine. Each transceiver placed in the mine look after the location of miners. The transceivers communicate with base stations through Zigbee module. In addition of tracking the location of miners we also include sensors such as temperature & humidity to intimate the base station & miners when some atmosphere changes occur. Mine operators are now able to monitor the real-time locations of each miner to better pinpoint their locations in the event of an emergency. Even after a full-day of use, mine operators can locate an individual miner within ten feet.
Key Words: Wireless sensor networks (WSN), ZIGBEE, and LPC2148.
Our future battle field system will have more difficulties to maintain security, because of increasing military competitive. Ability to understand, predict and adopt the vast array of inter-networked things is very difficult. Unwanted fire, unauthorized human intervention and other object movement will play major important role for affecting military environment. This project aims to help our future military environment by introducing new technology LoRaWAN in IoT (Internet of Things). LoRaWAN (Long Range Wide Area Network) is a state -of- art commercial of the self (COTS) technology. This project consist of sensors, embedded microcontrollers equipped with LoRaWAN, embedded processors equipped with LoRaWAN and cloud technology. By introducing this new technology in our future military environment we can easily find out criminal activities and fire hazards.
it is basically a model for wheelchair.for physically handicapped persons it will be very useful.the robot uses a accelerometer sensor for the movement of the robot, so that sensor is installed on the transmitter section and the thing you should wear on your arm.on the receiver side microcontroller is present which will decode the data.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Leading Change strategies and insights for effective change management pdf 1.pdf
Analysis and Construction of a Robot controlled by a Universal Remote Control
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 11 (November 2014), PP.22-28
22
Analysis and Construction of a Robot controlled by a Universal
Remote Control
Datta Sainath Dwarampudi1
1
Electronics and Communication Engineering, Mahatma Gandhi Institute of Technology,
Hyderabad, Andhra Pradesh, India.
Abstract:- This paper aims at controlling a robot that is a tank like vehicle using a universal infrared remote
control. The infrared signal sent from the universal infrared remote control is received by IR receiver and
decoded by the microcontroller PIC16F873A using an algorithm embedded in the microcontroller. The output
from the microcontroller is fed to the motor driver which drives the left and right motors. The robot‟s motor
control can be speed controlled by using PWM/PDM (Pulse Width Modulation/ Pulse Duration Modulation)
technique.
Keywords:- Infrared, Universal Remote Control, PIC, Analysis, Construction, Speed Control, Robot.
I. INTRODUCTION
A wirelessly controlled robot is the need of the hour. For many years the consumer electronics industry
has been employing infrared remote controls for the control of televisions, VCR‟s and cable boxes. . The same
concept is used for my project. The functionality of CIR (Consumer Infrared) is as broad as the consumer
electronics that carry it. For instance, a television remote control can convey a “channel up” command to the
television, while a computer might be able to surf the internet solely via CIR. The type, speed, bandwidth and
power of the transmitted information depend on the particular CIR protocol employed.
This project can control the robot and move it at various speeds and in various directions. Its movement
can be controlled by a universal remote control from a distance of ten to fifteen feet radius. The robot made
from this project can move in forward and reverse direction with different speeds and it can turn left and right
directions.
This paper gives an overview of the project completed during the period of internship at E.C.I.L.
(Electronics Corporation of India Limited) at Hyderabad, India with technical details. The results are obtained
and analysed. This report also deals with future works which can be persuaded as an advancement of the
current. This robot has huge applications in industrial and home navigation. This robot is very useful during
biological and chemical hazards to perform a task precisely and accurately.
II. ANALYSIS AND CONSTRUCTION
This project can primarily be separated into four parts:
Sending and Receiving the infrared signal from the remote (Infrared Interface).
Decoding the infrared signals of a button of a remote control.
Establishing connection between microcontroller and motor driver.
Driving motor linked with motor driver using the algorithm embedded in the microcontroller.
A. Sending and receiving the infrared signal sent from the remote
The is the frist step of the project. The typical infrared signal used by remote controls has three layers.
The names used for these layers. The names used for these layers have not been standardized. In this
application note they are called the infrared, the modulation, and the serial data. The infrared layer is the means
of transmission. Infrared is light whose wavelength is too long to see. Although, we cannot control it with an
infrared signal. To control around corner or through opaque materials, RF, usually UHF signals are used.
Although this application note does not further mention RF, much of what is presented here can be used with an
RF transmission medium. The modulation layer refers to the fact that each burst of infrared signal is often
modulated at a frequency between 32.75 kHz and 56.8 kHz. This is done to diminish the effects of ambient
light. This layer, however, is optional. Some infrared formats do not modulate their outputs, sending pulses of
unmodulated infrared light instead. This is done to extend the remote control‟s battery life and to reduce the
cost of the remote control device. The serial data layer has the information containing a command. This is
typically coded in the lengths of infrared bursts or in the lengths of gaps between infrared bursts. A long gap or
burst is interpreted as a „1‟, a short gap or burst is interpreted as a „0‟.
2. Analysis and Construction of a Robot controlled by a Universal Remote Control
23
Fig. 1: Block diagram for IS1U60 remote control IR sensor
Fig. 2: Infrared Sensor
I have used a Sony remote control transmitter is used in this research. The Sony remote control is
based on the Pulse-Width signal coding scheme. The code exists of 12 bits sent on a 40 KHz carrier wave. The
code starts with a header of 2.4 millisecond (ms) or 4 times T, where T is 600 micro second (µs). The header is
followed by 7 command bits and 5 address bits as show in Fig. 1. The address and commands exists of logical
ones and zeros. A logical one is formed by a space of 600 µs and pulse of 600 µs. The space between 2
transmitted codes when a button is being pressed is 40 ms. The bits are transmitted least significant bits first.
The total length of a bit-stream is always 45 ms.
An IR remote control (the transmitter) sends out pulses of infrared light that represent specific binary
codes. These binary codes correspond to commands, such as Power On/Off and speed up. The IR receiver in
the robot decodes the pulses of light into the binary data (ones and zeroes) that the device can understand. The
microcontroller then carries out the corresponding command. The control codes are sent in serial format
modulated to that 40 kHz carrier frequency (usually by turning the carrier on and off). There are many different
manufacturers use different codes and different data rate for transmission. The data rate send is generally infra
range of 100-2000 bps.
Fig. 3: Infrared signal from a Sony Remote Control
IR detectors are little microchips with a photocell that are tuned to listen to infrared light. They are
almost always used for remote control detection – every TV and DVD player has one of these in the front to
listen for the IR signal from the clicker. Inside the remote control is a matching IR LED, which emits IR pulses
to tell the TV to turn on, off or change channels. IR light is not visible to the human eye, which means it takes a
3. Analysis and Construction of a Robot controlled by a Universal Remote Control
24
little more work to test a setup. IR detectors have a demodulator inside that looks for modulated IR at 38 KHz.
Just shining an IR LED won‟t be detected, it has to be PWM blinking at 38KHz. IR detectors are digital out –
either they detect 38KHz IR signal and output low (0V) or they do not detect any output high (5V). It is always
better to test an IR detector before performing the experiment. This combination is commercially available as
the Sharp GP51Ux and IS1U60x.
The preamplifier contains a band pass filter which limits the receiver‟s sensitivity to about ±2KHz,
near the centre frequency. An Automatic Gain Control (AGC) circuit adjusts the incoming level to the
demodulator, which explains the presence of a long leading pulse in many of the protocols. This allows the
receiver to stabilize its AGC circuit, prior to the reception of the bit-stream.
B. Decoding the IR signals for the buttons of a remote control
This is the next step of my project. Serial Infrared Control (SIRC) protocol is the name given to Sony‟s
IR remote control. The 12 bit protocol is the most common format used with domestic products. I tried to map
out the characteristic pulse and gap lengths that represent ones and zeros. By pressing the same button on the
remote, write down the series of number read by the PIC16F873A running the program designed by me. The
Output of the receiver is a binary bit-stream corresponding to the original modulation signal at the transmitter.
Note that this signal is active low, so the “ones” in terms of the carrier signal appear as “zeros” at the
demodulator. Each odd numbered entry is the duration of a burst of IR from the remote control. Each even
numbered entry is the duration of a gap between bursts of infrared. The lengths of these gaps and bursts define
ones and zeros. Their order will depend on which button is pressed. Once the characteristic lengths have been
discovered for a one and a zero, an algorithm can then be created with a counter to translate the lengths into
ones and zeros
Fig. 4: Sony Infrared Remote control Code format
Pressing the same button again will make us find the command length duration. This is necessary to
determine if a button is being held down or a new command of the same type is being issued. Most remote
controls repeat the command as long as the button is held down, the repetitions separated by a long dark time,
usually on an even numbered transition. If no long even numbered counts can be found, consider that some
commands can be longer than 64 transitions.
Fig. 5: Infrared signal on a Digital Cathode Ray Oscilloscope
The common word is made up of 12 bit, and consists of a 7 bit command code followed by a 5 device
code. This SIRC format uses pulse width modulation of the infrared signal to transmit the data. The SIRC
transmission is preceded by a single start bit. The decoding software waits for this start bit of 2.4 ms. The
protocol uses a unique signal as a start bit which helps us to prevent the software trying to decode an incomplete
transmission. When the infrared sensor receives a correct start pulse, its flag is set to 1 to allow the rest of the
transmission to be decoded.
4. Analysis and Construction of a Robot controlled by a Universal Remote Control
25
Fig. 6: Infrared signal on a Digital Cathode Ray Oscilloscope(Magnified)
Fig. 7: Sony Infrared Remote control timer formula
The pulse length is measured by polling the falling edge of the waveform using the build in hardware
timer, Timer 0. With 4 MHz crystal oscillator and pre scalar values of 16, the timer value is incremented every
16 µs and is read on every falling edge of the waveform. We can use the formula below to divide the expected
pulse width by the timer.
Fig. 8: SIRC timer value for all pulse widths
Fig. 9: SIRC timing details
The program uses the timer value to determine the waveform. For example, if the value is between 90
and 150 then a logic 1 is assumed and if the value is between 50 and 90 the a logic 0 is assumed
We assign different keys for different functions as shown in the table below.
Table I: Modified Functions of Sony Remote Control Buttons
Remote’s Button function
key Original Function Modified Function
1 Channel 1 Start forward with
minimum speed
2 Channel 2 Stop
3 Channel 3 Speed decrease
4 Channel 4 Speed increase
5 Channel 5 Turn right
6 Channel 6 Turn left
C. Establishing the connection between microcontroller and motor driver
Pulse Width Modulation/Pulse duration Modulation (PWM/PDM) is critical to modern digital motor
controls. By adjusting the pulse width, the speed of a motor can be efficiently controlled without larger linear
power stages. PWM modules are built into the Capture/Compare/PWM (CCP) peripheral. As previously
5. Analysis and Construction of a Robot controlled by a Universal Remote Control
26
mentioned PIC16F873A has two CCP modules. Each CCP module is software programmable to operate in one
of three modes:
1) A Capture input
2) A Compare output
3) A Pulse Width Modulation(PWM) output
For the CCP module to function, Timer resources must be used in conjunction with the CCP module. The
desired CCP mode of operation determines which timer resources are required.
Fig. 10: PWM Output
Table II: CCP Mode-Timer Resource
CCP MODE Timer Resource
Capture Timer 1
Compare Timer 1
PWM Timer 2
A Pulse Width Modulation output is a signal that has a time-base (period) and a time that the output
stays high(duty cycle). The period is the duration after which the PWM rising edge repeats itself. The
resolution of the PWM output is the granularity with which the duty cycle can be varied. The frequency of a
PWM is simply the inverse of the period (1/period). Each CCP module can support one Pulse Width
Modulation (PWM) output signal, with minimal software overhead. This PWM signal can attain a resolution of
up to 10 bits, from the 8 bit Timer 2 module. This gives 1024 steps of variance from an 8 bit overflow counter.
This gives a maximum accuracy of Tosc (50ns, when the device is operated at 20MHz). When the Timer 2
overflows (timer = period register), the value in the duty cycle registers (CCPRxL:CCPRx-CON<5:4>) is
latched into the 10 bit slave latch. A new duty cycle value can be loaded into the duty cycle register(s) at any
time, but is only latched into the slave latch. a new duty cycle value can be loaded into the duty cycle register(s)
at anytime, but is only latched into the slave latch when Timer 2 = Timer 2 Period Register (PR 2). The period
of Timer 2 (and PWM) is determined by the frequency of the device, the Timer 2 pre scaler value (1,4 or 16),
and the Timer 2 Period Register. The following two equations show the calculation of the PWM period and
duty cycle
Fig. 11: PWM Mode Block Diagram
D. Driving motor linked with motor driver using the algorithm embedded in the microcontroller
The motors must be able to run forward or backward, it is command method to set the output transistors
up in an HBridge configuration. This is the only solid state way to operate a motor in both directions. In this
configuration, each side of the motor gets two transistors attached to it: one tied to the battery positive line and
the other tied to ground. It is obvious that both transistors on side A cannot be on at the same time and the same
applies to side B, so Side A Low can be driven off of an inverted copy of Side A High and Side B High can be
6. Analysis and Construction of a Robot controlled by a Universal Remote Control
27
driven off of an inverted copy of Side B Low. This arrangement means that the high and low transistors can
never be on at the same time and it is required to generate two unique control signals per motor now. In order to
run the motor forward, it is required to turn on transistors on the Side A High and the Side B Low. For reverse,
it is required to turn on the Side B High and the Side A Low transistors. This circuit is powered by a 6 V battery
via switch S2 and diode D2. D2 serves a dual purpose-first, to prevent reverse polarity, which could do
considerable damage, and second, to drop the supply voltage to about 5.4 V, which is more suitable for the
PIC16F873A. There are two identical H-Bridge motor drives, one for the left motor and one for the right. Pin
25 (RB4) and pin 23 (RB2) of the microcontroller is designated by the manufacturers for input or output. In this
circuit, they are used for output only. Pin 25 is used for control the direction (forward or reverse) of the left hand
motor, as seen from the rear of the robot. Pin 23 is used here to control the direction (forward or reverse) of the
right hand motor. Direction control logic signals are from RB4 and RB2 of microcontroller switch two power
MOSFETs H-Bridges to control the direction of the motors (forward or reverse). The two 100 (nF) capacitors
across each motor. Pin 13 (RC2) of PIC16F873A can be used as a general purpose I/O pin or I/O pin for CCP1
module. In this circuit it is configured as CCP1 pin to produce PWM output. It is used to switch both of the
motors on or off at the same time. It is also used to produce PWM for speed control of both motors. When it is
„high‟, the motors are on: when it is “low‟ they are off. Since two logically inverted control signals are required
for each side of an H-Bridge, a BJT transistor has been added in each H-Bridge motor drives circuit (Q1 for
motor 1 and Q8 for motor 2). Actually transistors Q1 and Q8 are used as inverters so that when the “forward
motion” MOSFETs Q3 and Q4 are disabled, the “reverse motion” MOSFETs Q6 and Q7 are activated. Note that
neither pin 25 nor pin 23 will accomplish anything unless both motors are switch on first via pin 13 (RC2). Both
pins 25 and 23 cause a wheel to rolls forward when it is high and backwards when it is “low”. Pins 13, 25, and
23 together may be used not only to make the robot drive forwards or reverse but also to turn right or left. Pin 13
(RC 2) activates both motors simultaneously via MOSFETs Q2 and Q5. These two MOSFETs are wired in
parallel and these should work satisfactorily with a small heat sink for the small motors used here. Referring
back to the drawing of the H-Bridge, it can be seen that if both transistors on one side of a bridge were turned on
at the same time, it would have a direct short to ground. This problem is called shoot through current and it is a
bigger problem than might be expected. FET‟s have a lot of capacitance 2000 pico Farad (pF) for the one used
in this circuit on their gate leads, so it is difficult to switch them on or off quickly. This switching delay makes it
very easy to have both FET‟s on for a short period of time each time. There is a transition from one FET
conducting to the other. A lot of power can go through in that time and it will heat up transistors and cook them
very quickly if allowed to happen. For this reason both motors are switched off first via pin 13, whenever one of
the motor is need to change direction of rotation. After the required direction control commands are sent to the
H-Bridges via pin RB4 and RB2. The two motors are switched on again via pin 13 and the previous PWM
output is routed to the FET driver transistors Q2 and Q5.
Fig. 12: Similar H bridge circuit used in my project
III. CONCLUSIONS
I was able to successfully complete the project with desired results. The results were obtained and
analyzed thoroughly. The use of infrared for controlling a robot i.e. tank like body has huge applications. We
can do this project by using an arduino but it is easier and quick to do is using a microcontroller like
PIC16F873A . The added advantage of this design is that it can be built in several configuration due to the
modularity of the design.
7. Analysis and Construction of a Robot controlled by a Universal Remote Control
28
ACKNOWLEDGMENT
I wish to acknowledge and thank Mr. T.Hemantha Kumar for his great contribution for my internship
which made me write this paper. I express my sincere gratitude to my professors, family and friends for their
continuous support through their patience, motivation, enthusiasm and immense knowledge.
REFERENCES
[1]. Bob Harbour, “Dual Motor Bidirectional Electronic Speed Control”, April 30,1999.
http://www.circuits.Lab.com.
[2]. William G. Grimm, “Decoding Infrared Remote Controls Using a PIC 16C5X Microcontroller”, 1997.
[3]. David De Vleeschauwer, “DAVschomepage”, http://user.pandora.be/davshomepage.
[4]. Microchip. “PIC16F873A Data Sheet” Microchip Technology Inc. May,2001.
[5]. Sanda Win, Tin Shein, Khin Maung Latt, “Design and Construction of PIC-based IR Remote Control
Moving Robot”, World Academy of Science, Engineering and Technology Vol:2 2008.
[6]. Roger Thomas, “Remote Contrl IR Decoder” Everyday Practical Electronics, September, 2000. UK.
http://www.microchip.com.
[7]. Mark Palmer, “Using the CCP Modules” Microchip Technology Inc. 1997. http://www.microchip.com.
[8]. Ladyada, “IR Sensor”, adafruit learning system, http://learn.adafruit.com/ir-sensor/overview.
[9]. Consumer Infrared, Pulse-Width Modulation, Remote Control, Wikipedia.
[10]. William Cox, “Building an Infrared Remote Decoder”, May 29,2005, http://www.robotshop,com.
[11]. “PIC 16F87XA, 28/40/44-Pin Enhanced Flash Microcontrollers”, MICROCHIP.
[12]. “PIC 16F87XA, 28/40/44-Pin Enhanced Flash Microcontrollers Data Sheet”, MICROCHIP.
[13]. “PICmicro Mid-Range MCU Family Reference Manual”, MICROCHIP.
[14]. “Interfacing Interrupts with PIC16F877A”, Pantech Solutions.
[15]. “H bridge motor driver circuit”, http://www.circuitstoday.com.
Fig. 13: Complete Circuit Diagram