Monday, August 24, 2020

Madness of Lear Edgar Free Essays

Frenzy is viewed as the base all things considered. What's more, the general mental and physical condition of frenzy is viewed as dishonorable to numerous individuals, just as impolite to oneself as well as other people. All things considered, the theme of franticness one thing that no man needs to understanding. We will compose a custom exposition test on Frenzy of Lear Edgar or then again any comparative theme just for you Request Now Be that as it may, in Shakespeare’s King Lear, frenzy shows up in different structures and capacities as the focal topic, and leads a significant number of the characters, including Lear himself, to their destruction. In the start of the play, Lear is portrayed as a prideful person, who is fixated on force and self esteem. Be that as it may, as the plot of the play advances, various circumstances emerge and Lear bears a rollercoaster of feelings, which at last shape him into an alternate individual. Lear’s generally speaking changes all through the play all share something for all intents and purpose: a diminishing in power and an expansion in despondency and compassion. Every hindrance that Lear experiences pushes his pride increasingly more towards self centeredness and bitterness, which are feelings that a King of his height isn't accustomed to managing. Through his viewpoint now, he fears that he is going frantic, and Lear is so fixated on control that the idea of losing everything causes him to accept that he is losing his rational soundness also. Be that as it may, after he continually gets pushed to encounter self-assessment with every circumstance. Lear experiences a resurrection, despite the fact that it is past the point of no return for the King at this phase of the play. Another character in King Lear, Edgar, likewise perseveres through the play’s focal subject of franticness, however in an alternate way. Edgar fakes his madness to remain alive, by masking himself as the homeless person â€Å"Poor Tom†, all together for his dad, Gloucester, to acknowledge him after Edmund, Gloucester’s ill-conceived child, fools their dad into imagining that Edgar is a psycho and needs to kill his dad. Edgar popularities franticness all through the play and masks himself as the lunatic that Edmund has double-crossed him to be, since at the time the crazy were for all intents and purposes imperceptible to society. Unexpectedly, Edgar’s time as an apparently crazy hobo sets him up to overcome Edmund at the end of the play. Shakespeare utilizes both of these characters to mirror and differentiation one another’s states to franticness and to show the play’s more profound implications. While Edgar claims to be frantic, Lear is really distraught. Edgar invigorates craziness and anticipates Lear’s frenzy, as it becomes more grounded all through the play. The two wind up joining, and it at last gives Lear significant astuteness by decreasing him to his uncovered humankind, deprived of all illustrious pretentions. Be that as it may, the genuine franticness of Lear and the expected franticness of Edgar both play against each other to make out of the disorder an agreement in the realm through self-disclosure, insight, and modesty. Inevitably, the frenzy reaches a conclusion. Edgar divulges his mask of frenzy and topples Edmund, while Lear’s franticness prompts his death. By and large, Shakespeare dives into the issues old enough, power, desire, selling out, and the majority of all, unadulterated frenzy. The play sparkles a light on different blames in humankind, including guilty pleasure and the wants to just consider oneself. At long last, voracity and narcissism can extremely just bring about frenzy. Instructions to refer to Madness of Lear Edgar, Papers

Saturday, August 22, 2020

Things Everyone Should Know-Chemical and Biological Weapons essays

Things Everyone Should Know-Chemical and Biological Weapons articles In each life time one will encounter the impact of a weapon, regardless of whether it is that of a vehicle, blade, firearm or even the detestations of a bomb or the conceivable danger of substance or potentially organic operators. Regardless of what the wellspring of demolition, it causes the defeat of some kind. Some accept that an auto crash or a weapon is increasingly hazardous and ruinous to life, anyway that basic individual doesn't comprehend the new dangers and irreversible impacts that these infections and bacterium can cause. As of now the United States has been battling with the idea of Bacillus anthracis and different weapons of natural danger tainting their friends and family and our countries world status. Substance and natural weapons created by the United States researchers have not just secured the United States against a monstrous compound as well as organic assault, yet have additionally cost the United States a great many dollars and a huge number of lives in the c reation and the examination of concoction and natural weapons. The utilization of compound and natural weapons date far back in the history books, even before composing was near. At any rate 3,000 years back, synthetic compounds were added to flames to make vapor that would gag and sicken the foe. Greek discharge was a concoction weapon, maybe imagined in A.D. 660 by a Greek architect named Callinicus (Pringle, pg 14). The Greek fire made the Arab and Russian adversaries debilitate on the port city Constantinople creating a Greek triumph. The term natural fighting is a later advancement in the weapons of mass annihilation period. Just until the nineteenth century did researcher demonstrate that germs cause irresistible illness. (The term germs incorporates microorganisms, infections, and rickettsia.) In the nineteenth century, residents just realized that ailment spread through a wiped out individual, a human cadaver or a creature corpse. A simple method to harm an enemys populace was to just p... <!

Tuesday, July 21, 2020

THC or Delta-9-tetrahydrocannabinol

THC or Delta-9-tetrahydrocannabinol Addiction Drug Use Marijuana Print Psychoactive THC in Cannabis Delta-9-THC Is Not as Harmless as You May Think By Elizabeth Hartney, BSc., MSc., MA, PhD Elizabeth Hartney, BSc, MSc, MA, PhD is a psychologist, professor, and Director of the Centre for Health Leadership and Research at Royal Roads University, Canada. Learn about our editorial policy Elizabeth Hartney, BSc., MSc., MA, PhD Medically reviewed by Medically reviewed by Daniel B. Block, MD on January 29, 2020 twitter linkedin Daniel B. Block, MD, is an award-winning, board-certified psychiatrist who operates a private practice in Pennsylvania. Learn about our Medical Review Board Daniel B. Block, MD Updated on February 18, 2020 GARO/PHANIE Getty Images More in Addiction Drug Use Marijuana Cocaine Heroin Meth Ecstasy/MDMA Hallucinogens Opioids Prescription Medications Alcohol Use Addictive Behaviors Nicotine Use Coping and Recovery In This Article Table of Contents Expand How THC Works Amount of THC in Marijuana Is Delta-9 THC Addictive? Risks of THC THC in CBD Oil View All Back To Top THC, which stands for delta-9-tetrahydrocannabinol or ?-9-tetrahydrocannabinol (?-9-THC), is a cannabinoid molecule in marijuana (cannabis) thats long been recognized as the main psychoactive ingredientâ€"that is, the substance that causes users to experience the marijuana high. THC is just one of more than 400 different active substancesâ€"and 60 different cannabinoid moleculesâ€"contained in marijuana, although THC is the most recognized. Another important cannabinoid molecule that has received major recognition is cannabidiol (CBD).?? How THC Works THC works by attaching to cannabinoid receptors, which have been mapped throughout the brain and nervous system. THC can be detected in the body much longer than most other drug compounds (up to 20 hours after ingestion), although the psychoactive effects only last for a few hours. Its also stored in body fat and organs for three to four weeks. Hair follicle testing may identify THC after even longer periods of time, around 90 days. Urine testing is often used but has been found to be an unreliable method of detection.?? Amount of THC in Marijuana Were definitely not dealing with the same pot as we were in the past. This is because todays marijuana is much more potent, with THC levels averaging 9.6%, according to the National Institute on Drug Abuse (NIDA). By comparison, in the early 1990s, marijuana generally had a THC level of about 4%.?? The strength of modern high-potency strains of marijuana, such as sinsemilla (skunk) was reportedly at least four times as strong, containing about 15% THC.?? The amount of THC contained in marijuana varies by the preparation or the way that cannabis is prepared for use, such as leaf/bud, hashish, or hashish oil. THC levels can exceed 50% in products made from marijuana extracts.?? Is Delta-9 THC Addictive? Cannabis is the most common substance abused in the United States after alcohol and tobacco. Despite the belief by many chronic cannabis users that the drug is not addictive, THC tolerance and dependence have been widely documented in various studies. According to the NIDA, about 30% of people who use marijuana will become addictedâ€"and using the drug prior to age 18, when your brain is still developing, increases the likelihood of a marijuana use disorder by four- to seven-fold.?? Similar to other types of addiction, marijuana use disorder involves a preoccupation with the drug, bingeing, and symptoms of withdrawal when you cant use the drug. Risks of THC There is considerable research evidence that THC is associated with increased risk of developing psychosis, particularly among adolescents, as well as increased anxiety, learning impairment, and decreased memory formation.?? CBD, on the other hand, has been found to counter those effects, reducing anxiety, improving learning ability, and working as an antipsychotic, although much of the research is on animals according to a 2018 review of previous studies.?? When taken together, as is the case with marijuana use, CBD seems to reduce the negative effects of THC. A 2013 meta-analysis, which is a type of study that combines the results of many previous studies, found some evidence that THC may be neurotoxic, as there are differences in the brain structure of chronic marijuana users who do not have psychosis.?? One interesting point underscoring the brain changesâ€"while there is a reduction in gray matter volume in the prefrontal cortex in chronic users, there is an apparent compensatory response in that there is a subsequent increase in the density of fibrous connections among remaining neurons, which may cancel out some or all of the neurotoxicity.   Research into the effects of THC (or delta-9-THC) is complicated by many factors, but there is sufficient evidence that THC can be harmful, particularly to younger people whose brains are still developing, and they should, therefore, avoid frequent use of marijuana. THC in CBD Oil With CBD popularity, there has been a major market shift toward CBD products, some of which may contain traces of THC (around 0.3% to 0.9%), depending on how theyre formulated.?? This small concentration is highly unlikely to result in a feeling of high, and some experts argue that the effectiveness of CBD is potentiated by small amounts of THC. However, if youre looking for a CBD product without any THC, be sure to seek out a source that uses third-party testing to certify the purity of the product.

Thursday, May 21, 2020

Science Has a Growing Importance in Today’s World Essay

Introduction Science as a field of information has extraordinarily helped our presence, society and human advancement. It has influenced each part of life and has reformed the world as the experimental learning is advancing. Generally, the principle of science and engineering remains the most imperative variable in the socio-monetary improvement of a Society. It has been widely recognized that survival of a country in the 21st century depends entirely upon the investigative improvement and in addition upon experimentally proficient society. It is gaining importance among psychologists and researchers to understand, how learning of science concepts is obtained and held in memory and particularly in recognizing which factors causes†¦show more content†¦For many students numerous science concepts are hard to study, and are studied gradually as additional illustrations and standards are joined and data is sorted into additional direct units. All learners study notions at diverse rates, and a learner who exhibits dominance of one idea quite rapidly might find an alternate especially testing. So students who face problems in getting conceptual understanding they go for memorization to pass the test. Hussain and Reid (2006) contended that the science students of secondary grades grumbled that they can not see any relationship between what they study in school and what they experience in their ordinary life. This represented a significant rate of science people dropping science subjects in the later life because conceptual understanding has not been obtained. Teachers might be amazed to find that, notwithstanding their sincere endeavors pupils could not get the basic concepts secured in class, despite the fact that a few students perform better however just by utilizing rightly retained words. At the point when conceptual queries are asked, students disclose their disappointment to comprehend the principle ideas completely. According to National Science Teachers Association (NSTA, 1982), the focal concern of science education is to guarantee the dynamic interest of students in the exploratory exercises, issues, inquiries and experimental venture. Science education points atShow MoreRelatedThe Role Of Parents Are Becoming A Common Picture1732 Words   |  7 PagesWhen a child is born into this world, the traditional thing to have straight out the womb, is a mom. This mom would then have a spouse which would help parent that child through adolescence and beyond. Parents’ are given the job of raising their son or daughter so that they can live on their own and make choices by themselves. Parents in today’s society aren’t the typical household piece you tend to see in movies and read in books. Before, it was always a mom and dad who were female and male. TodayRead MoreWhat Are Piracy And Intellectual Property?1012 Words   |  5 Pagesthe invention of gold coins, trade and commerce sy stem. Today’s world is dominated by western cultures. The different political, economic, and societal systems in the world are strongly influenced by the western civilization values. Laws for copyright, piracy, intellectual property somehow find the origins in the socio-economical system of our world. In the following essay, we will try to explore the different characteristics of the worlds which may engender the need for copyright. We will nextRead MoreGadamer’s On the Natural Inclination of Human Beings Toward Philosophy follows an idea that a1100 Words   |  5 PagesGadamer’s On the Natural Inclination of Human Beings Toward Philosophy follows an idea that a desire for knowledge, in researching philosophy and sciences, can be related to Platos thaumazein, the idea of wonder. The specifically human function of thinking starts, not routinely or in merriment, but at †¦a point where something strikes us as alien because it runs counter to habitual expectation. (Gadamer 143) The fascination and wonderment towards ideas Gadamer claims, †¦comes to me above all inRead MoreControversial Issues in Archaelogy1011 Words   |  4 PagesIndiana Jones is a renowned character in today’s media. He is portrayed as a fearless fedora-wearing archaeologist, and his goal is to collect artifacts and preserve them in museums. While the field of archaeology is exciting, and the idea of partaking in perilous adventures may seem alluring, the archaeologist was depicted in an incorrect manner. An archaeologist is someone who studies human history through the excavation of sites and the examination of artifacts. Archaeologists study the past toRead MoreJacques Elluls Article on Techniques Integrates Machines with Society638 Words   |  3 Pagesmachines and its relationship with technique which has been described nicely. Technique is a way of doing something that fulfills a goal or an aim, in an organized manner. It is an art to do the work in a very meaningful and efficient way to reach the best results. Early civilizations have seen the man growing up in many aspects, this approach and ability to invent new things is called ‘technique’. The term Techniques is greatly confused with either science or machines. Both rely on the term TechniqueRead MoreWhat Are The 3 And Their Meanings?1402 Words   |  6 Pagesidentities and understandings of the world by participating in everyday life experiences (DEEWR, 2009). What are the 3 Bs and their meanings? †¢ Belonging is defined as â€Å" knowing where and with whom you belong† by acknowledging children’s interdependence and belonging to family, cultural group, a neighborhood, and wider community (DEEWR, 2009). Children form relationships with others and begin to shape who they are and who they can become within their world. †¢ Being recognises the significanceRead MoreGeography as a Science Essay examples1235 Words   |  5 PagesGeography as a Science Science, by definition, is: ‘†¦the systematic study of the structure and behaviour of the physical and natural world through observation and experiment†¦Ã¢â‚¬â„¢ 1 Geography is divided into physical and human dimensions; in the past, physical geography had taken pre-eminence over the latter due to the need of geographers to establish their discipline as an actual educational subject in colleges and universities. They therefore needed to impressRead MoreComputer Technology : A Educational Study1391 Words   |  6 PagesIn this educational study, an analysis of the †futuristic student† will define the increasing importance of computerized education as a way to dictate the needs of the student in the increasing role of information technology (IT) in the 21st contrary. In modern schools, the necessity of computerized education will provide stude4nts of the future with the necessary skills to participate in jobs related to this field of technology. Computers will become a more central part of educational curriculumsRead MoreAgriscience Educator Essay1581 Words   |  7 Pageswith new technology all while traveling across the state and country with the FFA. When making a career choice it is wise for one to consider the laws of supply and demand. The current shortage of agriscience educators in Alabama and across the nation has made this a high demand career choice. TeachAg.com compiles data about and promotes agriscience education. Their findings note that â€Å"During the 2014-2015 academic school year, there was a deficit of more than 400 agriculture teachers. These positionsRead MoreAgricultural Education And Agriculture Education1134 Words   |  5 PagesWhile growing up on a farm, I always thought that if someone wanted to be educated in agriculture that meant they would end up working with livestock or crops. As I continued on with my education in agriculture, I came to find out that there is so much more when it comes to agricultural education. It is really two parts that came together as one. The first part is agriculture which is the more science based and the second part is education which deals more with involved learning. Both are separate

Wednesday, May 6, 2020

Getting It On ( Line ) Sociological Perspectives On E...

Introduction The article titled â€Å"Getting it on(line): Sociological perspectives on e-dating† written by Jo Barraket and Millsom S. Henry-Waring focused on various views of online dating in a sociological aspect. The authors argue that â€Å"further sociological consideration of the online dating phenomenon is required to: illuminate the social conditions informing these activities; enhance knowledge of if, and how, online technologies mediate intimate connections; and advance a critically informed understanding of the nature of intimacy in a global era†(Barraket and Henry-Waring 2008). The main point of the article is to discuss the emergence of online dating in society and how it affects intimacy. Intimacy is described as an â€Å"emotional/romantic and/or sexual relations between adults, ranging from one-off interactions to sustained offline relationships†(Barraket and Henry-Waring 2008). In comparison, online dating is a â€Å"purposeful form of meeting new people th rough specifically designed internet sites† (Barraket and Henry-Waring 2008). However, this paper compares the concept of online dating and traditional face-to-face dating in aspects of gender roles, attractiveness and intimacy. It further discusses the influence of technology on individuals and how this affects the concept of families. Through the analysis of empirical data, the factors that influence relationship building through online dating will be explored. The prevalence of technology in the modern era is debated toShow MoreRelatedAn Argument Of A Woman Surviving Abuse Over The Course Of 15 Years1586 Words   |  7 Pagesor low self-esteem. True bullies consume high self-esteem. In focusing on the book authors Dennis Lines article, What is Bullying? Defining the nature of bullying, â€Å"bullying involves a desire to hurt + hurtful action + a power imbalance + (typically) repetition + an unjust use of power + evident enjoyment by the aggressor and generally a sense of being oppressed on the part of the victim.† (Lines 2008). â€Å"domestic violence and bullying partners† examining through keyhole to understand what occursRead MoreThe Effects Of Domestic Violence On The Lives Of Caucasian, African American, And Latina Women1852 Words   |  8 Pagesself-esteem. True bullies consume high self-esteem. In additionally, Dennis Lines article, What is Bullying? A person’s behavior defines as physically intimidating and aggressive, for most â€Å"bullying it involves a desire to hurt + hurtful action + a power imbalance + (typically) repetition + an unjust use of power + evident enjoyment by the aggressor and generally a sense of being oppressed on the part of the victim.† (Lines 2008). Domestic violence and bullying partners examining through mystics’ behaviorRead MoreSocial Class and Inequality3198 Words   |  13 Pagescare, and welfare programs.    Much of society’s inequality can be attributed to the class status of a particular group, which has usually been largely determined by the group’s ethnicity or race (Macionis amp; Gerber, 2006).    The conflict perspective is an attempt to understand the group conflict that occurs by the protection of one’s status at the expense of the other.    One group will resort to various means to preserve a ideal social status through socioeconomic prestige, consolidationRead MoreExample Research: Critical Discourse Analysis9514 Words   |  39 Pageslinguistics that emerged (mostly in the UK and Australia) at the end of the 1970s (Fowler et al. 1979; see also Mey 1985). CDA has also counterparts in critical developments in sociolinguistics, psychology, and the social sciences, some already dating back to the early 1970s (Birnbaum 1971; Calhoun 1995; Fay 1987; Fox and Prilleltensky 1997; Hymes 1972; Ibanez and Iniguez 1997; Singh 1996; Thomas 1993; Turkel 1996; Wodak 1996). As is the case in these neighboring disciplines, CDA may be seen asRead MoreHistory of Management Thought Revision17812 Words   |  72 Pageshis â€Å"shop management† point of view. b. Took a home study course to get his college degree in mechanical engineering. c. As a worker, then a first line supervisor, he observed numerous industrial practices that led him to his life s work. d. Restriction of output which Taylor classified into natural soldiering and systematic soldiering. e. Taylor thought maybe a supervisor could inspire or force workers to stop natural soldiering. f. Systematic soldiering resulted from group pressuresRead MoreMarriage12231 Words   |  49 Pages and what the individuals think and how they communicate based on the society they live in. â€Å"What do people think marriage means?† this question fits this theory of symbolic interaction. This theory views the setting from a micro or close-up perspective. In relation to college students in this study, this theory can be used to understand how a college student interprets relationships, how they ascribe meaning and value to their own life since people’s relationship around them don’t work. Do theyRead MoreStrategic Management Process12814 Words   |  52 Pagesmanagement: †¢ The Industrial Organizational Approach o based on economic theory — deals with issues like competitive rivalry, resource allocation, economies of scale o assumptions — rationality, self discipline behaviour, profit maximization †¢ The Sociological Approach o deals primarily with human interactions o assumptions — bounded rationality, satisfying behaviour, profit sub-optimality. An example of a company that currently operates this way is Google Strategic management techniques can beRead MoreHumanities11870 Words   |  48 Pagesis that different people react differently to the same object or events. The artist will have his/her own interpretations of things. In order to present this interpretation, the artist needs to decide on many things, e.g. the medium, the perspective, the composition, color, etc. After going through a process of decision making and execution, an artwork is produced. Over time, the artist develops a set of unique solutions that he/she is familiar with. This becomes the artists style. In otherRead MoreMarriage Guidance: Summary Notes19959 Words   |  80 Pagessubordinate position to the mother in law who has much say over their lives. Formation of values → Cultural beliefs, expectations and practices shape the individual’s values and guide personal behaviour. Culture and family life cycle transitions → Dating, courtship, marriage, child rearing and retirement may be strongly influenced by the early cultural messages each partner received from their family of origin. → Hindu/Muslim – early age proposal → African – young adult encouraged to stay at homeRead MoreStrategy Safari by Mintzberg71628 Words   |  287 PagesSTRATEGY SAFARI A GUIDED TOURTHROUGH THE WILDS OF STRATEGIC MANAGEMENT HENRY MINTZBERG BRUCE AHLSTRAND JOSEPH LAMPEL T H E FREE PRESS NEW YORK aJaiz. u.frmiu/i  «...* „.;i†¢Ã¢â‚¬ ¢/ . †¢ . . †¢. »Ã¢â‚¬ ¢.. . .. †¢..†¢Ã¢â‚¬ ¢Ã¢â‚¬ ¢.-.†¢Ã¢â‚¬ ¢a/itiktSii^i THE FREE PRESS A Division of Simon Schuster Inc. 1230 Avenue of the Americas New York, NY 10020 Copyright  © 1998 by Henry Mintzberg, Ltd., Bruce Ahlstrand, and Joseph Lampel All rights reserved, including the right of reproduction in whole or in part in any form. THE

Ultrasonic Speed Measurement Free Essays

string(76) " directly dependent on the performance of the transmitter and the receiver\." â€Å"ULTRA SONIC SPEED MEASUREMENT DEVICE† A PROJECT REPORT Submitted in partial fulfillment Of requirements for award of the degree Of BACHELOR OF TECHNOLOGY In ELECTRONICS COMMUNICATION ENGINEERING By: Nimisha Sharma Nishant Tyagi Gaurav Sharma [pic] Department of Electronics communication engineering Radha Govind Engineering College Meerut, U. P 2009-2010 ULTRA SONIC SPEED MEASUREMENT DEVICE By: Nimisha sharma Nishant tyagi Gaurav sharma [pic] Department of Electronics communication engineering Radha govind Engineering College Meerut, U. P 2009-2010 ACKNOWLEDGEMENT Before we get in to thick of things we would like to add a few heartfelt words for the people who were the part of the project in numerous ways. We will write a custom essay sample on Ultrasonic Speed Measurement or any similar topic only for you Order Now People who gave unending support right from the stage the idea were conceived. In particular, we wish to thank Mr. P. K Singh Head of the Department, Electronics Communication and Mr. Abhishek Singh lecturer, Electronics Communication Department for providing this opportunity to us. After doing this project we can confidently say that this experience would not only enriched us with technical knowledge but also has unparsed the maturity of thought and vision . he attributes required being a successful professional. Gaurav Sharma Nimisha Sharma Nishant Tyagi CANDIDATE’S DECLARATION We, here by certify that the work which is being presented in the project report entitled Ultra sonic speed measurement device in partial fulfillment of the requirement for the award of degree of BACHELOR OF TECHNOLOGY in Electronics Communication Engineering submitted in the department of Electronics Communication Engineering of the Institute, is an authentic record of our own work carried out d uring final year of B. tech degree under the supervision of Mr. P. K Singh Head of the Department, Electronics Communication and Mr. Abhishek Singh lecturer, Department Electronics Communication Project group:- Gaurav Sharma (0606931023) Nimisha Sharma (0606931045) Nishant Tyagi (0606931047) This is to certify that the above statement made by the above candidates is correct to the best of my knowledge. Mr. P. K Singh Mr. Abhishek Singh (H. O. D) (Lecturer) Dept. of Electronics Comm. Dept. of Electronics Comm. R. G. E. C R. G. E. C Meerut, U. P Meerut, U. P Date†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Date†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Place†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Place†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ TABLE OF CONTENTS 1. INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ a. MEANING OF THE WORD PROJECT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ . ABSTRACT †¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ c. PARTS OF SPEED MEASUREMENT DEVICE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 2. GENERAL DISCRIPTION AND FEATURES OF MICRO CONTROLLER †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3. HARDWARE DISCRIPTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ a. VOLTAGE REGULATOR LM 7805†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. b. COMPONENTS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4. PCB LAYOUT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ a. STEPS FOR MAKING PCB †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦ b. CIRCUIT LAY OUT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5. SOFTWARE PROGRAM †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6. TESTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 7. TROUBLESHOOTING †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. CONCLUSION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. REFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10. APPENDIX†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. INTRODUCTION MEANING OF PROJECT The project gives the significance of the following field of engineering – P-signifies the phenomenon of planning which deals with symbolic nation and proper arrangement of sense and suggestion receptivity accordingly to the needs R-it is associate with the word resources wh ich guides to promote planning . OJ-this letter signifies the overhead expenses in unestimated expenses that may occur in the manufacture design or layout of the project. E- signifies the word engineering. C- signifies the convey about phenomenon of construction low cost. T-the word T stands for technique. unless there is a technique; it is impossible to complete the project . The conclusion thus arrived is that project is a systematic consideration discussed and proposal in a particular subject . we can say that project includes complete requirement of mechanism , tools , application and needs. It considers the circuit diagram and various operational performances in sequence and data about the instrument and in the last we can say about the project profit loss. CERTIFICATE This is to certify that Mr. GAURAV SHARMA, student of B. Tech (Electronics communication Engineering) Final year from Radha Govind Engineering College has successfully completed his project â€Å"ULTRA SPEED MEASUREMENT DEVICE†. During the project period he was working under the guidance of Mr. Abhishek Singh (lecturer, Electronics Communication Engineering Department). His performance during the project has been Excellent. We wish him all the best for his future. Mr. P. K Singh Mr. Abhishek Singh (H. O. D) (Lecturer) Electronics Comm. Dept. Electronics Comm. Dept. R. G. E. C R. G. E. C Meerut, (U. P) Meerut, (U. P) CERTIFICATE This is to certify that Ms. NIMISHA SHARMA, student of B. Tech (Electronics communication Engineering) Final year from Radha Govind Engineering College has successfully completed her project â€Å"ULTRA SPEED MEASUREMENT DEVICE†. During the project period she was working under the guidance of Mr. Abhishek Singh (lecturer, Electronics Communication Engineering Department). Her performance during the project has been Excellent. We wish her all the best for her future. Mr. P. K Singh Mr. Abhishek Singh (H. O. D) (Lecturer) Electronics Comm. Dept. Electronics Comm. Dept. R. G. E. C R. G. E. C Meerut, (U. P) Meerut, (U. P) CERTIFICATE This is to certify that Mr. NISHANT TYAGI, student of B. Tech (Electronics communication Engineering) Final year from Radha Govind Engineering College has successfully completed his project â€Å"ULTRA SPEED MEASUREMENT DEVICE†. During the project period he was working under the guidance of Mr. Abhishek Singh (lecturer, Electronics Communication Engineering Department). His performance during the project has been Excellent. We wish him all the best for his future. Mr. P. K Singh Mr. Abhishek Singh (H. O. D) (Lecturer) Electronics Comm. Dept. Electronics Comm. Dept. R. G. E. C R. G. E. C Meerut, (U. P) Meerut, (U. P) CHAPTER 1 ABOUT OUR PROJECT Our project the ultrasonic speed measurement device is used to measure speed of a vehicle moving in front of it using ultrasonic waves. The concept of using ultrasonic waves instead of any other communicating tools as infrared and RF is its high preciseness and very less interference by the surrounding. There can various methods that can be opted to design this instrument such as Doppler Effect etc. but we have used the concept of distance measurement at a regular interval. The pulse is being transmitted at a regular interval and the corresponding distance is measured of the two pulses. The difference in the distances is observed and is then divided by the time duration between the two pulses. As result the corresponding speed is obtained. The range of this device is directly dependent on the performance of the transmitter and the receiver. You read "Ultrasonic Speed Measurement" in category "Papers" Higher the transmitting and receiving frequency better will be its range. Mathematical analysis(hypothetical) The duration of pulse is 5 milliseconds. The distance for the signal1 be say 3 cm. The distance for the signal2 be say 2. 95 cm. Difference of distances is (3-2. 95) = . 05 cm. Speed = distance/ time Speed = . 05/5 = 10 meters/sec ADVANTAGE AND DISADVANTAGE The major advantages of our project are One of the major advantages our project is its multi utility. It can be used as 1 Speed measurement 2 Distance measurement 3 Car parking controller The other advantage of this project is its cost. Its cost is less than 1000 INR. The precise result is one more advantage of our project. Limitation of our project. The major disadvantage of our project is its range. Due to the use of low frequency transmitter and receiver. High frequency transmitter and receiver give higher range of upto 10 to 15 mtrs Block diagram [pic] Circuit diagram Working In our project Ultrasonic Speed Measurement Device we are going to measure the speed of a moving vehicle. For this we are using the Ultrasonic Sensors. We first generate a 40 KHz signal by taking the time period of 25 microseconds. Then we actually generate the pulse burst with a delay of 5 milliseconds. For this we programmed the microcontroller. We send the pulse by pressing the switch that is connected to the pin no. 1 of the microcontroller. At this moment the distance of the object from the device is measured and is stored in the microcontroller. Then after the delay of 5 milliseconds the second pulse hits the moving object. Again the distance of the object is measured and is stored in the microcontroller. Then we can easily find out the difference in the distance by simply subtracting these two distances. Now we have the distance and also the time. Therefore by the formula speed = distance / time we can find out the speed of the moving object. In the transmitter part we have LM311which is a voltage comparator and is used here as the precision squarer whose pin no. 2 is connected to the pin no. 2 of the microcontroller. Then at pin no. 7 and pin no. 8 the ultrasonic transmitter is placed. In the receiver part we have LM833 for amplification and 74HC14N as the Hex inverting Schmitt trigger. The pin no. 1 of 74HC14N is connected to the pin no. of LM833. The ultrasonic receiver is connected between pin no. 6 of LM833 and ground. These ultrasonic transmitter and receiver are placed close to each other so that there will be minimum noise. Why ultrasonic signal ? ‘ULTRA’-sonic is a sound wave with a frequency above the normal range of human hearing. Most humans can hear up to 16 ,000 Hertz. Young people can hear almost to 20,000 Hertz. Bats and mice and other small critters can hear much higher and use those sounds to ‘see’ the world around them. An ultrasonic imaging device sends a signal into a medium and then listens for the reflected waves. The more receiving transducers you use to pick up the sound the better you can tell what you are ‘looking’ at. Reflected waves will reach one receiver before the next based on where the reflecting object is located. Electronics are fast enough to determine the direction and distance to the reflected objects. Also the higher the frequency you broadcast the better resolution you will see. A computer is interfaced with an array of receiving tranceducers and it calculates the direction and distance that the many echos must represent and then it plots the picture of the results. The Image can be displayed or printed. In ultrasonic non destructive testing, high-frequency sound vibrations are transmitted into material by an ultrasonic transducer. The test instrument then analyzes the ultrasonic signals which are received using either a pulse-echo or through-transmission method. In the pulse-echo mode, the transmitting transducer also serves as the ultrasonic receiver and analyzes the reflected signal with respect to amplitude and time. In the through-transmission mode, the ultrasonic signal is received by a separate transducer which analyzes the amplitude loss of signal. These ultrasonic NDT methods will indicate material defects such as longitudinal and transverse cracks, inclusions and others as well as ID/OD dimensions and dimensional changes such as thickness and ovality. Components Component required 1. Ultrasonic Transmitter and Receiver 2. Resistor 3. Capacitor 4. Crystal 5. Preset 6. Switch 7. LCD 8. Power Supply 9. IC’s †¢ LM833 †¢ LM311 †¢ 74HC14N †¢ 7805 10. Micro controller †¢ AT89S52 11. Wires 12. Burst Strip 13. IC Base Specification ULTRASONIC SENSORS [pic] Selection and use of ultrasonic ceramic transducers : The purpose of this application note is to aid the user in the selection and application of the Ultrasonic ceramic transducers. The general transducer design features a piezo ceramic disc bender that is resonant at a nominal frequency of 20 – 60 KHz and radiates or receives ultrasonic energy. They are distinguished from the piezo ceramic audio transducer in that they produce sound waves above 20 KHz that are inaudible to humans and the ultrasonic energy is radiated or received in a relatively narrow beam. The â€Å"open† type ultrasonic transducer design exposes the piezo bender bonded with a metal conical cone behind a protective screen. The â€Å"enclosed† type transducer design has the piezo bender mounted directly on the underside of the top of the case which is then machined to resonant at the desired frequency. The â€Å"PT and EP† type transducer has more internal damper for minimizing â€Å"ringing†, which usually operates as a transceiver – oscillating in a short period and then switching to receiving mode. Comparative characteristics : When compared to the enclosed transducer, the open type receiver will develop more electrical output at a given sound pressure level (high sensitivity) and exhibit less reduction in output as the operating frequency deviates from normal resonant frequency (greater bandwidth). The open type transmitter will produce more output for a specific drive level (more efficient). The enclosed type transducer is designed for very dusty or outdoor applications. The face of the transducer must be kept clean and free of damage to prevent losses. The transmitter is designed to have low impedance at the resonant frequency to obtain high mechanical efficiency. The receiver is constructed to maximize the impedance at the specified anti-resonant frequency to provide high electrical efficiency. Sound propagation : In order to properly select a transducer for a given application, it is important to be aware of the principles of sound propagation. Since sound is a wave phenomenon, its propagation and directivity are related to its wavelength (? ). A typical radiation power pattern for either a generator or receiver of waves is shown in Figure 1. Due to the reciprocity of transmission and reception, the graph portrays both power radiated along a given direction (in case of wave production), and the sensitivity along a given direction (in case of wave reception). As an example of a typical situation, a transducer of 400ET250 has an effective diameter of 23 mm (1mm wall thickness) will produce a main beam (-6dB) with full width of 30 ° at a frequency of 40 KHz. For open type transducers, the beam is decided by the angular and diameter of conical cone attached on the bender inside of housing and the opening diameter so it can not be simply calculated by the diameter of the housing. The intensity of sound waves decrease with the distance from the sound source, as might be expected for any wave phenomenon. This decrease is principal a combination of two effects. The first is the inverse square law or spherical divergence in which the intensity drop 6dB per distance doubled. This rate is common to all wave phenomena regardless of frequency. The second effect causing the intensity to decrease is the absorption of the wave by the air (see figure 2). Absorption effects vary with humidity and dust content of the air and most importantly, they vary with frequency of the wave. Absorption at 20 KHz is about 0. 02dB/30 cm. It is clear that lower frequencies are better suited for long range propagation. Of course, the selection of a lower frequency will result in less directivity (for a given diameter of source of receiver). [pic] How far the transducer could reach? One of the most frequently asked questions is â€Å"How far the transducer could reach? †. This question can be answered by a simple calculation that is based on the published specifications in the Ultrasonic Ceramic Transducer Data Sheets. The basic procedure is to first determine the minimum sound pressure level developed at the front end of the receiver for a specific transmitter driving voltage and distance between the transmitter and receiver (transceiver has double distance between reflect target). This SPL must then be converted â€Å"Pa† (Pascal) or â€Å"? bar† (microbar) units. The sensitivity of the receiver must then be converted from a dB reference to an absolute mV/Pa or ? bar level resent to obtain the final output. Assume a 400ST160 transmitter is driven at a level of 20Vrms and a 400SR160 receiver is located 5 meters from the ransmitter and loaded with a 3. K Ohm resistor (loaded resistor value varies receiver sensitivity, please see â€Å"Acoustic Performance† of transducer data sheet). The analysis is necessary to the fundamental understanding of the principals of sound wave propagation and detection but it is tedious. The figure 10 below is a graphical representation of previous analysis which may be used once in the SPL at the receiver is determined. Enter the graph from the SPL axis and proceed upward to an intersection with –dB sensitivity level of the receiver using the 1V/? bar referenced data. Follow a horizontal line to the â€Å"Y† axis to obtain the receiver output in V. At Receiver Ultrasonic echo ranging : Ultrasonic ranging systems are used to determine the distance to an object by measuring the time required for an ultrasonic wave to travel to the object and return to the source. This technique is frequently referred to as â€Å"echo ranging†. The distance to the object may be related to the time it will take for an ultrasonic pulse to propagate the distance to the object and return to the source by dividing the total distance by the speed of sound which is 344 meters/second or 13. 54 inches/millisecond. IC’s [pic] BASIC OF LM833 Low noise dual operational amplifier It is a monolithic dual operational amplifier particularly well suited for audio applications. It Offers low voltage noise (4. 5nV/vHz) and high frequency performances (15MHz Gain Bandwidth Product, 7V/? s slew rate). In addition the LM833 has also a very low distortion (0. 002%) and excellent phase/gain margins. [pic] TOP VIEW AND PIN SET [pic] Features of LM833 †¢ LOW VOLTAGE NOISE: 4. 5nV/vHz †¢ HIGH GAIN BANDWIDTH PRODUCT: †¢ 15MHz †¢ HIGH SLEW RATE: 7V/? s †¢ LOW DISTORTION: 0. 002% †¢ EXCELLENT FREQUENCY STABILITY †¢ ESD PROTECTION 2kV Basic of LM311 The LM111 series are voltage comparators that have input currents approximately a hundred times lower than devices like the mA710. They are designed to operate over a wider range of supply voltages; from standard  ±15 V op amp supplies down to a single 3 V supply. Their output is compatible with RTL, DTL, and TTL as well as MOS circuits. Further, they can drive lamps or relays, switching voltages up to 50 V at currents as high as 50mA. Both the inputs and the outputs of the LM111 series can be isolated from system ground, and the output can drive loads referred to ground, the positive supply, or the negative supply. Offset balancing and strobe capability are provided and outputs can be wire-ORed. Although slower than the mA710 (200 ns response time versus 40 ns), the devices are also much less prone to spurious oscillations. [pic] TOP VIEW AND PIN SET [pic] features FEATURES †¢ Operates from single 3 V supply (LM311B) †¢ Maximum input bias current: 150 nA (LM311: 250 nA) †¢ Maximum offset current: 20 nA (LM311: 50 nA) †¢ Differential input voltage range:  ±30 V †¢ Power consumption: 135 mW at  ±15 V †¢ High sensitivity: 200 V/mV †¢ Zero crossing detector 7805 The 7805 series of three-terminal positive regulator are available in the TO-220/D-PAK package and with several fixed output voltages, making them useful in a wide range of applications. Each type employs internal current limiting, thermal shut down and safe operating area protection, making it essentially indestructible. If adequate heat sinking is provided, they can deliver over 1A output current. Although designed primarily as fixed voltage regulators, these devices can be used with external components to obtain adjustable voltages and currents. [pic] 1 2 3 [pic] Internal diagram [pic] Features †¢ Output Current up to 1A Output Voltages of 5, 6, 8, 9, 10, 12, 15, 18, 24V †¢ Thermal Overload Protection †¢ Short Circuit Protection †¢ Output Transistor Safe Operating Area Protection 74HC14N HEX SCHMITT TRIGGER INVERTER Basic of 7414 Each circuit functions as an inverter, but because of the Schmitt action, it has different input threshold levels for positive (VT+) and for negative going(Vt-) signals. These circuit are temperature compensated and can be triggered from the slowest Micro controller AT89S52 Basic of AT89S52 The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry- standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications. The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset. [pic] Features of AT89S52 †¢ Compatible with MCS-51 ® Products †¢ 8K Bytes of In-System Programmable (ISP) Flash Memory – Endurance: 1000 Write/Erase Cycles †¢ 4. 0V to 5. 5V Operating Range †¢ Fully Static Operation: 0 Hz to 33 MHz †¢ Three-level Program Memory Lock †¢ 256 x 8-bit Internal RAM †¢ 32 Programmable I/O Lines †¢ Three 16-bit Timer/Counters †¢ Eight Interrupt Sources †¢ Full Duplex UART Serial Channel †¢ Low-power Idle and Power-down Modes †¢ Interrupt Recovery from Power-down Mode Watchdog Timer †¢ Dual Data Pointer †¢ Power-off Flag †¢ Fast Programming Time †¢ Flexible ISP Programming (Byte and Page Mode) Coding ; line 1 ; #include CLINE0 ; end of line 0 ; line 1 ; /* CLINE1 ; end of line 1 ; line 2 ; SFR31. H CLINE2 ; end of line 2 ; line 3 ; Copyright 1995 SPJ Systems, Pune CLINE3 ; end of line 3 ; line 4 ; CLINE4 ; end of line 4 ; line 5 ; This header file contains SFR declarations for the CPU 8031 CLINE5 ; end of line 5 ; line 6 ; Please note that you will have to include SFR31. H in your program, if you CLINE6 ; end of line 6 ; line 7 ; wish to access the SFRs from your C program. CLINE7 ; end of line 7 line 8 ; */ CLINE8 ; end of line 8 ; line 9 ; CLINE9 ; end of line 9 ; line 10 ; SFRACC0xe0 CLINE10 ACCequ0e0h ; end of line 10 ; line 11 ; SFRREG_B0xf0 CLINE11 REG_Bequ0f0h ; end of line 11 ; line 12 ; SFRPSW0xd0 CLINE12 PSWequ0d0h ; end of line 12 ; line 13 ; SFRSP0x81 CLINE13 SPequ081h ; end of line 13 ; line 14 ; SFRDPL0x82 CLINE14 DPLequ082h ; end of line 14 ; line 15 ; SFRDPH0x83 CLINE15 DPHequ083h ; end of line 15 ; line 16 ; SFRP00x80 CLINE16 P0equ080h ; end of line 16 ; line 17 ; SFRP10x90 CLINE17 P1equ090h ; end of line 17 ; line 18 ; SFRP20xa0 CLINE18 P2equ0a0h ; end of line 18 ; line 19 ; SFRP30x b0 CLINE19 P3equ0b0h end of line 19 ; line 20 ; SFRIP0xb8 CLINE20 IPequ0b8h ; end of line 20 ; line 21 ; SFRIE0xa8 CLINE21 IEequ0a8h ; end of line 21 ; line 22 ; SFRTMOD0x89 CLINE22 TMODequ089h ; end of line 22 ; line 23 ; SFRTCON0x88 CLINE23 TCONequ088h ; end of line 23 ; line 24 ; SFRTH00x8c CLINE24 TH0equ08ch ; end of line 24 ; line 25 ; SFRTL00x8a CLINE25 TL0equ08ah ; end of line 25 ; line 26 ; SFRTH10x8d CLINE26 TH1equ08dh ; end of line 26 ; line 27 ; SFRTL10x8b CLINE27 TL1equ08bh ; end of line 27 ; line 28 ; SFRSCON0x98 CLINE28 SCONequ098h ; end of line 28 ; line 29 ; SFRSBUF0x99 CLINE29 SBUFequ099h ; end of line 29 ; line 30 ; SFRPCON0x87 CLINE30 PCONequ087h ; end of line 30 ; line 31 ; CLINE31 ; end of line 31 ; line 2 CLINE0 ; end of line 0 ; line 1 ; /*float. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 ; end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; #define FLT_RADIX2 CLINE7 ; end of line 7 ; line 8 ; #define FLT_DIG6 CLINE8 ; end of line 8 ; line 9 ; CLINE9 ; end of line 9 ; line 10 ; #define FLT_MANT_DIG24 CLINE10 ; end of line 10 ; line 11 ; #define FLT_MAX_EXP+128 CLINE11 ; end of line 11 ; line 12 #define FLT_MIN_EXP-125 CLINE12 ; end of line 12 ; line 13 ; CLINE13 ; end of line 13 ; line 3 CLINE0 ; end of line 0 ; line 1 ; #definestart_timer0()asmsetbtcon. 4 CLINE1 ; end of line 1 ; line 2 ; #definestop_timer0()asmclrtcon. 4 CLINE2 ; end of line 2 ; line 3 ; #definestart_timer1()asmsetbtcon. 6 CLINE3 ; end of line 3 ; line 4 ; #definestop_timer1()asmc lrtcon. 6 CLINE4 ; end of line 4 ; line 5 ; #defineex0_edge()asmsetbtcon. 0 CLINE5 ; end of line 5 ; line 6 ; #defineex0_level()asmclrtcon. 0 CLINE6 ; end of line 6 ; line 7 ; #defineex1_edge()asmsetbtcon. 2 CLINE7 ; end of line 7 ; line 8 ; #defineex1_level()asmclrtcon. 2 CLINE8 ; end of line 8 ; line 9 ; #defineenable_rx()asmsetbscon. 4 CLINE9 ; end of line 9 ; line 10 ; #definedisable_rx()asmclrscon. 4 CLINE10 ; end of line 10 ; line 11 ; #defineclr_ti()asmclrscon. 1 CLINE11 ; end of line 11 ; line 12 ; #defineclr_ri()asmclrscon. 0 CLINE12 ; end of line 12 ; line 13 ; #defineenable_ex0()asmorlie,#81h CLINE13 ; end of line 13 ; line 14 ; #defineenable_t0()asmorlie,#82h CLINE14 ; end of line 14 ; line 15 ; #defineenable_ex1()asmorlie,#84h CLINE15 ; end of line 15 ; line 16 ; #defineenable_t1()asmorlie,#88h CLINE16 ; end of line 16 ; line 17 ; #defineenable_ser()asmorlie,#90h CLINE17 ; end of line 17 line 18 ; #defineenable_t2()asmorlie,#0a0h CLINE18 ; end of line 18 ; line 19 ; #defineenable_all()asmmovie,#0bfh CLINE19 ; end of line 19 ; line 20 ; #defineenable()asmsetbie. 7 ; sets only the MSB CLINE20 ; end of line 20 ; line 21 ; #definedisable_ex0()asmanlie,#0feh CLINE21 ; end of line 21 ; line 22 ; #definedisable_t0()asmanlie,#0fdh CLINE22 ; end of line 22 ; line 23 ; #definedisable_ex1()asmanlie,#0fbh CLINE23 ; end of line 23 ; line 24 ; #definedisable_t1()asmanlie,#0f7h CLINE24 ; end of line 24 ; line 25 ; #definedisable_ser()asmanlie,#0efh CLINE25 ; end of line 25 ; line 26 ; #definedisable_t2()asmanlie,#0dfh CLINE26 end of line 26 ; line 27 ; #definedisable_all()asmmovie,#0 CLINE27 ; end of line 27 ; line 28 ; #definedisable()asmclrie. 7 ; clears only the MSB CLINE28 ; end of line 28 ; line 29 ; #defineset_hi_ex0()asmorlip,#1h CLINE29 ; end of line 29 ; line 30 ; #defineset_hi_t0()asmorlip,#2h CLINE30 ; end of line 30 ; line 31 ; #defineset_hi_ex1()asmorlip,#4h CLINE31 ; end of line 31 ; line 32 ; #defineset_hi_t1()asmorlip,#8h CLINE32 ; end of line 32 ; line 33 ; #defineset_hi_ser()asmorlip,#10h CLINE33 ; end of line 33 ; line 34 ; #defineset_hi_t2()asmorlip,#20h CLINE34 ; end of line 34 ; line 35 ; #defineset_lo_ex0()asmanlip,#0feh CLINE35 ; end of line 35 ; line 36 ; #defineset_lo_t0()asmanlip,#0fdh CLINE36 ; end of line 36 ; line 37 ; #defineset_lo_ex1()asmanlip,#0fbh CLINE37 ; end of line 37 ; line 38 ; #defineset_lo_t1()asmanlip,#0f7h CLINE38 ; end of line 38 ; line 39 ; #defineset_lo_ser()asmanlip,#0efh CLINE39 ; end of line 39 ; line 40 ; #defineset_lo_t2()asmanlip,#0dfh CLINE40 ; end of line 40 ; line 41 ; #defineset_double_baud()asmorlpcon,#80h CLINE41 ; end of line 41 ; line 42 ; #defineclr_double_baud()asmanlpcon,#7fh CLINE42 ; end of line 42 ; line 43 ; #definepowerdown()asmorlpcon,#2 CLINE43 ; end of line 43 ; line 44 ; #definego_idle()asmorlpcon,#1 CLINE44 ; end of line 44 ; line 45 ; #defineset_t0_mode(gate,c_t,mode)asmorltmod,#((gate * 8) + (c_t * 4) + mode) CLINE45 ; end of line 45 ; line 46 ; #defineset_t1_mode(gate,c_t,mode)asmorltmod,#(((gate * 8) + (c_t * 4) + mode) * 16) CLINE46 ; end of line 46 ; line 47 ; #defineset_com_mode(mode,sm2,ren)asmmovscon,#((mode * 64) + (sm2 * 32) + (ren * 16)) CLINE47 ; end of line 47 ; line 48 ; CLINE48 ; end of line 48 line 4 CLINE0 ; end of line 0 ; line 1 CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 line 5 ; */ CLINE5 ; end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; unsigned char inportb (unsigned int portid) ; CLINE7 ; end of line 7 ; line 8 ; void outportb (unsigned int portid, unsigned int value) ; CLINE8 ; end of line 8 ; line 9 ; unsigned char peekb (unsigned int addr) ; CLINE9 ; end of line 9 ; line 10 ; void pokeb (unsigned int addr, uns igned int value) ; CLINE10 ; end of line 10 ; line 11 ; void set_tcnt (int tnum, unsigned int count) ; CLINE11 ; end of line 11 ; line 12 ; void delay (int count) ; CLINE12 ; end of line 12 ; line 13 ; void delay_ms (int count) ; CLINE13 ; end of line 13 ; line 14 unsigned char lo_nibb (unsigned char ch) ; CLINE14 ; end of line 14 ; line 15 ; unsigned char hi_nibb (unsigned char ch) ; CLINE15 ; end of line 15 ; line 16 ; int getbyte () ; CLINE16 ; end of line 16 ; line 17 ; void sendbyte (unsigned char ch) ; CLINE17 ; end of line 17 ; line 18 ; int ser_rdy () ; CLINE18 ; end of line 18 ; line 19 ; void init_ser () ; CLINE19 ; end of line 19 ; line 20 ; CLINE20 ; end of line 20 ; line 21 ; #defineINT_EXT01 CLINE21 ; end of line 21 ; line 22 ; #defineINT_TMR02 CLINE22 ; end of line 22 ; line 23 ; #defineINT_EXT13 CLINE23 ; end of line 23 ; line 24 ; #defineINT_TMR14 CLINE24 ; end of line 24 line 25 ; #defineINT_SER5 CLINE25 ; end of line 25 ; line 26 ; #defineINT_TMR26 CLINE26 ; end o f line 26 ; line 27 ; CLINE27 ; end of line 27 ; line 5 CLINE0 ; end of line 0 ; line 1 ; /*math. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 ; end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; #definepye3. 14285714285714 CLINE7 ; end of line 7 ; line 8 ; #definepyex26. 28571428571429 CLINE8 ; end of line 8 ; line 9 ; #definepye_2 1. 57142857142857 CLINE9 ; end of line 9 line 10 ; #definepyex3_2 4. 71428571428571 CLINE10 ; end of line 10 ; line 11 ; #defineLOG20. 30102999566 CLINE11 ; end of line 11 ; line 12 ; #defineNLOG20. 69314718056 CLINE12 ; end of line 12 ; line 13 ; #defineCONST_M0. 43429 CLINE13 ; end of line 13 ; line 14 ; CLINE14 ; end of line 14 ; line 15 ; float sin (float x) ; CLINE15 ; end of line 15 ; line 16 ; float cos (float x) ; CLINE16 ; end of line 16 ; line 17 ; float tan (float x) ; CLINE17 ; end of line 17 ; line 18 ; float asin(float x) ; CLINE18 ; end of line 18 ; line 19 ; float acos (float x) ; CLINE19 ; end of line 19 ; line 20 ; float sinh (float x) ; CLINE20 ; end of line 20 ; line 21 ; float cosh (float x) ; CLINE21 ; end of line 21 ; line 22 ; float tanh (float x) ; CLINE22 ; end of line 22 ; line 23 ; float exp (float x_flval); CLINE23 ; end of line 23 ; line 24 ; float log (float value) ; CLINE24 ; end of line 24 ; line 25 ; float log10 (float value) ; CLINE25 ; end of line 25 ; line 26 ; float pow (float x, float y) ; CLINE26 ; end of line 26 ; line 27 ; float sqrt (float x) ; CLINE27 ; end of line 27 ; line 28 ; float ceil (float x) ; CLINE28 ; end of line 28 ; line 29 ; float floor (float x) ; CLINE29 ; end of line 29 ; line 30 ; float fabs (float x) ; CLINE30 end of line 30 ; line 31 ; float ldexp (float number, int power) ; CLINE31 ; end of line 31 ; line 32 ; float frexp (float number, int *power) ; CLINE32 ; end of line 32 ; line 33 ; float modf (float x, float *ipart) ; CLINE33 ; end of line 33 ; line 34 ; float fmod (float n1, float n2) ; CLINE34 ; end of line 34 ; line 35 ; CLINE35 ; end of line 35 ; line 6 CLINE0 ; end of line 0 ; line 1 ; /*stdlib. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 ; end of line 5 line 6 ; CLINE6 ; end of line 6 ; line 7 ; float atof (char *s) ; CLINE7 ; end of line 7 ; line 8 ; int atoi (char *s) ; CLINE8 ; end of line 8 ; line 9 ; long int atol (char *s) ; CLINE9 ; end of line 9 ; line 10 ; int abs (int n) ; CLINE10 ; end of line 10 ; line 11 ; long int labs (long int n) ; CLINE11 ; end of line 11 ; line 12 ; CLINE12 ; end of line 12 ; line 13 ; void int2bcd (int value, char *dest, int ndigits) ; CLINE13 ; end of line 13 ; line 14 ; void itoa_c31 (int value, char *dest, int ndigits) ; CLINE14 ; end of line 14 ; line 15 ; void ui2a_c31 (unsigned int value, char *dest, int ndigits) ; CLINE15 end of line 15 ; line 16 ; void ui2bcd (unsigned int value, char *dest, int ndigits) ; CLINE16 ; end of line 16 ; line 17 ; CLINE17 ; end of line 17 ; line 18 ; void long2bcd (long int val, char *dest, int cnt) ; CLINE18 ; end of line 18 ; line 19 ; void ltoa_c31 (long int val, char *dest, int cnt) ; CLINE19 ; end of line 19 ; line 20 ; CLINE20 ; end of line 20 ; line 7 ; #include CLINE0 ; end of line 0 ; line 1 ; /*etc. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; int bcd2int (char *str, int ndigits) ; CLINE7 ; end of line 7 ; line 8 ; void flot2str (float value, char *dest) ; CLINE8 ; end of line 8 ; line 9 ; CLINE9 ; end of line 9 ; line 8 ; #include CLINE0 ; end of line 0 ; line 1 ; /*string. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 ; end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; char * strcpy (char *dest, char *src) ; CLINE7 ; end of line 7 ; line 8 char * strncpy (char *dest, char *src, int maxlen) ; CLINE8 ; end of line 8 ; line 9 ; char * strcat (char *dest, char *src) ; CLINE9 ; end of line 9 ; line 10 ; int strcmp (char *s1, char *s2) ; CLINE10 ; end of line 10 ; line 11 ; unsigned int strlen (char *src) ; CLINE11 ; end of line 11 ; line 12 ; char * strlwr (char *s) ; CLINE12 ; end of line 12 ; line 13 ; char * strupr (char *s) ; CLINE13 ; end of line 13 ; line 14 ; CLINE14 ; end of line 14 ; line 15 ; void * memset (void *s, int c, int n) ; CLINE15 ; end of line 15 ; line 16 ; CLINE16 ; end of line 16 ; line 9 ; CLINE9 ; end of line 9 ; line 10 ; CLINE10 end of line 10 ; line 11 CLINE11 ; end of line 11 ; line 12 CLINE12 ; end of line 12 ; line 13 CLINE13 ; end of line 13 ; line 14 CLINE14 ; end of line 14 ; line 15 ; CLINE15 ; end of line 15 ; line 16 CLINE16 ; end of line 16 ; line 17 CLI NE17 ; end of line 17 ; line 18 ; float f1,f2,s1,s2; CLINE18 ; end of line 18 ; line 19 ; CLINE19 ; end of line 19 ; line 20 ; /*************************************************** CLINE20 ; end of line 20 ; line 21 ; * Prototype(s) * CLINE21 ; end of line 21 ; line 22 ; ***************************************************/ CLINE22 ; end of line 22 line 23 ; CLINE23 ; end of line 23 ; line 24 CLINE24 ; end of line 24 ; line 25 CLINE25 ; end of line 25 ; line 26 CLINE26 ; end of line 26 ; line 27 CLINE27 ; end of line 27 ; line 28 CLINE28 ; end of line 28 ; line 29 ; void LCD_init(); CLINE29 ; end of line 29 ; line 30 ; CLINE30 ; end of line 30 ; line 31 ; /*************************************************** CLINE31 ; end of line 31 ; line 32 ; * Sources * CLINE32 ; end of line 32 ; line 33 ; ***************************************************/ CLINE33 ; end of line 33 ; line 34 CLINE34 ; line 35 ; { CLINE35 _LCD_delay: end of line 35 ; line 36 ; unsigned char n; CLINE36 ; end of line 36 ; line 37 ; unsigned char i; CLINE37 ; end of line 37 ; line 38 CLINE38 pushbp movbp,sp incsp incsp for0: movr1,bp incr1 incr1 mov@r1,#0 for_in0: mova,bp adda,#0fdh movr1,a movmyacc,@r1 movr0,#myacc movr1,bp incr1 incr1 mova,@r1 clrc subba,@r0 clra movacc. 0,c mov@r0,a mova,myacc jnzfor_ok0 ljmpfor_out0 for_ok0: ; line 39 ; { CLINE39 ; line 40 CLINE40 for1: movr1,bp incr1 mov@r1,#0 for_in1: movr1,bp incr1 movr0,#myacc mova,@r1 clrc subba,#100 clra movacc. 0,c mov@r0,a mova,myacc jnzfor_ok1 ljmpfor_out1 for_ok1: ; line 41 ; { CLINE41 ; line 42 asm nop CLINE42 nop ; line 43 ; } CLINE43 for_inc1: movr1,bp incr1 inc@r1 ljmpfor_in1 for_out1: ; line 44 ; } CLINE44 for_inc0: movr1,bp incr1 incr1 inc@r1 ljmpfor_in0 for_out0: ; end of line 44 ; line 45 ; CLINE45 ; end of line 45 ; line 46 ; } CLINE46 movsp,bp popbp ret ; end of line 46 ; line 47 ; CLINE47 ; end of line 47 ; line 48 ; CLINE48 ; end of line 48 ; line 49CLINE49 ; line 50 ; { CLINE50 _LCD_command: ; end of line 50 ; line 51 CLINE51 pushbp movbp,sp mova,bp adda,#0fdh movr1,a mov160,@r1 ; end of line 51 ; line 52 CLINE52 clr P3. 2 ; end of line 52 ; line 53 CLINE53 clr p3. 1 ; end of line 53 line 54 CLINE54 setb P3. 0 ; end of line 54 ; line 55 CLINE55 clr P3. 0 ; end of line 55 ; line 56 CLINE56 mova,#01h pushacc lcall_LCD_delay decsp ; end of line 56 ; line 57 ; } CLINE57 movsp,bp popbp ret ; end of line 57 ; line 58 ; CLINE58 ; end of line 58 ; line 59 CLINE59 ; line 60 ; { CLINE60 _LCD_putc: ; end of line 60 ; line 61 ; P2 = ascii; CLINE61 pushbp movbp,sp mova,bp adda,#0fdh movr1,a mov160,@r1 ; end of line 61 ; line 62 CLINE62 setb P3. 2 ; end of line 62 ; line 63 ; asm clr p3. 1 CLINE63 clr p3. 1 ; end of line 63 ; line 64 CLINE64 setb P3. 0 ; end of line 64 ; line 65 ; asm clr P3. 0 CLINE65 How to cite Ultrasonic Speed Measurement, Papers

Sunday, April 26, 2020

Kilauea Essays - Hawaii Volcanoes National Park, Volcanology, Klauea

Kilauea Kristin Laske Science-2 2/14/00 Kilauea Hawaii consists of a string of islands, or an archapelago. Kilauea is located on one of these islands, the central Hawaii island. Kilauea is one of the world's most active volcanic craters. Craters are formed either by the massive collapse of material during volcanic activity, by unusually violent explosions, or later by erosion during dormancy (Comptons). It is situated on the southeastern slope of the great volcanic mountain Mauna Loa. Its elevation is 1111 m (3646 ft.) above sea level. The crater has an area of about 10 sq. km., which forms a great cavity in the side of the mountain. Volcanic activity recently has been restricted to an inner crater called Halemaumau. Halemaumau measures more than 900 m (about 3000 ft.) across and has a depth of about 400 m (about 1300 ft.). Kilauea has erupted at least once a year since 1952. The volcano spews an average of 525,000 cubic yards of lava a day and by 1995 had added about 500 acres of new land to the island (Encarta ?98). By June 1989, it had destroyed the visitors center at the national park, a stretch of Kalapana Highway, and more than 65 houses by 1990. Kilauea is located on a hot spot under the island, and the magma is thought to come from a depth of at least 50 km. below the surface. A hot spot is an area of volcanic activity near the center of two lithospeheric plates. Normally, lava streams constantly into the floor of the crater from subterranean sources which either cools and hardens, or accumulates until it drains off into other subterranean passages. When greater volcanic activity occurs, the lava is subjected to sudden changes of level, where it may escape from vents on the lower slope toward the sea. Kilauea is classified as a shield volcano. Shield volcanoes have a low, broad profile created by highly fluid basalt flows that spread over wide areas. The fluid basalt usually only builds a cone around seven degrees steep. Over thousands of years though, these cones can reach massive size, which is shown in the Hawaiian Island volcanoes. The Hawaiian Islands are composed of shield volcanoes, that have been built up from the sea floor. If measured from sea floor level, some of the Hawaiian volcanoes are the worlds largest mountains in terms of both height and volume (Comptons). In the 20th century, major flows occurred in 1920 and 1921, 1950, 1955, 1959, 1965, and 1969. The current eruption cycle, the longest-running in modern Hawaiian history, began on January 3, 1983 (Encarta).