Free Engineering projects, mini projects, hobby projects, science projects



Hello engineers
,



Here is a new Index to help you in all you PROJECTS!! Here we are a young team working for all the latest engineering project information! So no need to worry about the electrical and electronics projects (engineering). For your colleges all those electrical and electronics projects(engineering).They are available here. Ideas and woks for all engineering, electrical and electronics projects done here!! Its a big boon for all the students to get a list of best working electrical and electronics projects (engineering)! Free projects here…

Select your topic..!





Op-Amp Circuits projects

Miscellaneous-projects!!

Audio Circuits projects

Lighting project circuits

Relay circuits

Switching circuits

Robotics-Projects

Free radio circuits- projects





Ideas for all engineering, electrical and electronics projects done here!! It a big boon for all the students to get a list of best working electrical and electronics projects (engineering)!

Robotics-Projects

All these engineering project content are in the stream of Electrical and electronics!

ROBOTIC CAR

Adam - I

Adam - II (micro mouse competition entrant)

Optical Mouse Hack - Used in Adam - II

The 1381-based solar engine


555-based solar engine

90S2313 AVR Robot Board

IR Detector for Robot

RF Modem Robotics Project

Small 3-wheel ROBOT with PIC16F84 brain & InfraRed eyes


Line Follower ROBOT

Desktop Line Following Robot

Mini line follower Robot


Free radio circuits- projects



All these engineering project content are in the stream of Electrical and electronics!







AM Receiver

ZN414 Portable Receiver

2 Transistor FM Voice Transmitter

FM Transmitter

4 Transistor Transmitter

FM Transmitter with Opamp

Band 2 Preamplifier

Superhet AM Broadcast Receiver

AM Broadcast Loop Antenna

Micro Power AM Broadcast Transmitter

FM Beacon Transmitter (88-108 MHz)

Medium-Power FM Transmitter





Here we have taken effort to collect all the radio circuits, frequency circuits, used for making projects! Mini projects and final year projects too!



Space Nuclear Power

Space Nuclear Power

Through the cooperative efforts of the U.S. Department of Energy (DOE),
formerly called the Atomic Energy Commission, and NASA, the United
States has used nuclear energy in its space program to provide electrical
power for many missions, including science stations on the Moon,
extensive exploration missions to the outer planets—Jupiter, Saturn,
Uranus, Neptune, and beyond—and even to search for life on the surface
of Mars.
For example, when the Apollo 12 mission astronauts departed from
the lunar surface on their return trip to Earth (November 1969), they left
behind a nuclear-powered science station that sent information back to
scientists on Earth for several years. That science station, as well as similar
stations left on the Moon by the Apollo 14 through 17 missions, operated
on electrical power supplied by plutonium-238-fueled, radioisotope thermoelectric
generators (RTGs). Since 1961, nuclear-power systems have
helped assure the success of many space missions, including the Pioneer
10 and 11 missions to Jupiter and Saturn; the Viking 1 and 2 landers on
Mars; the spectacular Voyager 1 and 2 missions to Jupiter, Saturn, Uranus,
Neptune, and beyond; the Ulysses mission to the Sun’s polar regions; the
Galileo mission to Jupiter, and the Cassini mission to Saturn.
Energy supplies that are reliable, transportable, and abundant represent
a very important technology in the development of solar-system
civilization. Space nuclear-power systems will play an ever-expanding role
in supporting more ambitious deep space–exploration missions by robots
and in supporting human spaceflight beyond Earth orbit, when astronauts
return to the Moon to build a permanent settlement and then visit Mars
to establish a surface base.
Space nuclear-power supplies offer several distinct advantages over
the more traditional solar and chemical space-power systems. These
advantages include compact size, modest mass requirements, very long
operating lifetimes, the ability to operate in extremely hostile environments
(such as intense trapped-radiation belts, the surface of Mars, the
moons of the outer planets, and even interstellar space), and the ability to
operate independent of distance from, or orientation to, the Sun.
Space nuclear-power systems use the thermal energy or heat released
by nuclear processes. These processes include the spontaneous (but
predictable) decay of radioisotopes, the controlled fission or splitting
of heavy atomic nuclei (such as fissile uranium-235) in a self-sustained
neutron chain reaction, and (eventually) the joining together, or fusing,
of light atomic nuclei (such as deuterium and tritium) in a controlled
thermonuclear reaction. This nuclear-reaction heat is converted directly
or through a variety of thermodynamic (heat-engine) cycles into electric
power. Until controlled thermonuclear fusion capabilities are achieved,
space nuclear-power applications will be based on the use of either radioisotope
decay or nuclear fission reactors.
The radioisotope thermoelectric generator consists of two main
functional components: the thermoelectric converter and the nuclear
heat source. The radioisotope plutonium-238 has been used as the heat
source in all U.S. space missions involving radioisotope power supplies.
Plutonium-238 has a half-life of about 87.7 years and therefore supports
a long operational life. (The half-life is the time required for one-half the
number of unstable nuclei present at a given time to undergo radioactive
decay.) In the nuclear decay process, plutonium-238 emits primarily alpha
radiation that has very low penetrating power. Consequently, only a small
amount of shielding is required to protect the spacecraft from its nuclear
emissions. A thermoelectric converter uses the thermocouple principle to
directly convert a portion of the nuclear (decay) heat into electricity.
A space fission-power system is a device designed and engineered to
generate power for space applications using a nuclear reactor to fission (or
split) uranium atoms. During the fission process, a neutron strikes a uranium
atom, causing it to release energy as it splits into smaller atoms, called
fission products. The released thermal energy (heat) is then converted into
electricity through a conversion system to power the spacecraft. This fission
process can be sustained and controlled to provide power at needed
levels in a continuous manner in a reactor system.
Space reactors are designed differently from terrestrial reactors. The
space reactors are much smaller, typically about the size of a 5-gallon can
of paint. Aerospace safety engineers also design space reactors to remain
in a cold, inactive state until arriving at a designated startup location in
space. Once at this designated location the reactor receives the command
signal to initiate operation. This design feature enhances system launch
and operations safety.
Although the design of a space fission-power system is quite complicated,
the basic theory on which it operates is fairly simple. To generate
electric power, there are only three basic subsystems: a controlled fission
reactor core to produce heat, a cooling loop or mechanism that removes
heat from the core, and a power conversion subsystem that receives the
heat from the cooling loop and converts a portion of the input heat into
electric power. The principles of thermodynamics govern that not all of
the input heat can be converted into useful electric energy, so some of the
input heat must be rejected to the environment (outer space). Engineers
use radiators to remove this excess (or waste) thermal energy from the
space power system and reject it to outer space.
Different power-conversion technologies can be used to convert heat
from the reactor into electricity. The final choice of a power-conversion
technology depends on the requirements of the mission and compatibility
with the rest of the spacecraft, including scientific payload. Engineers also
use a radiation shield to protect electronic components and other sensitive
equipment from the radiation emitted from the reactor during operation.
The Russian space program has flown several space nuclear reactors
(most recently a system called Topaz). The United States has flown only
one space nuclear reactor, an experimental system called the SNAP-10A,
which was launched and operated on-orbit in 1965. The objective of the
SNAP-10A program was to develop a space nuclear-reactor power unit
capable of producing a minimum of 500 watts-electric for a period of one
year, while operating in space. The SNAP-10A reactor was a small (about
the size of a garden pail) zirconium hydride (ZrH) thermal reactor fueled
by uranium-235. The SNAP-10A orbital test was successful, although the
mission was prematurely (and safely) terminated on-orbit by the failure of
an electronic component outside the reactor.
Since the United States first used nuclear power in space, great emphasis
has been placed on the safety of people and the protection of the
terrestrial environment. A continuing major objective in any new space
nuclear-power program is to avoid undue risks. In the case of radioisotope
power supplies, this means designing the system to contain the radioisotope
fuel under all normal and potential accident conditions. For space
nuclear reactors, such as the SNAP-10A and more advanced systems, this
means launching the reactor in a “cold” (non-operating) configuration
and starting up the reactor only after a safe, stable Earth orbit or interplanetary
trajectory has been achieved.

Network Communications Attacks

It is instructive to examine, at a very high level, how two hosts on the Internet usually make connections to one another to understand how attacks occur over the network. However, our goal here is not to explain protocols from a communications perspective (such as performance, reliability, and so on) or explore their details. Please note that what is described below corresponds only to a typical scenario and there are exceptions and many different possible variations for communications across the Internet.

Let us suppose that a client application on host A on network P wishes to connect to a server application on host B on network Q. The client and server applications run as processes on the respective hosts. The client application creates data that is sent down the protocol stack to the transport layer. The transport layer adds information to this data in a structured manner creating a segment that is passed down to the network layer. The transmission control protocol (TCP) and the user datagram protocol (UDP) are two common transport layer protocols.

The
transport layer segment forms the payload of a network layer packet or datagram usually carried by the Internet protocol (IP). The IP datagram is further carried by a link or medium access control (MAC) layer protocol in a frame on each link between host A and host B (examples are Ethernet and WiFi). Each link may have its own physical layer-dependent transmission mechanisms. At the transport layer, a port number will identify the process in host A; let us denote this port number as P A . Host A will have an IP address that belongs to network P; let us denote this as IP A . The tuple _ P A , IP A _ , which is sometimes called a socket , is a globally unique identifi er of the client process that intends to communicate with the server process. Similarly, the server process will be associated with a port number P B and an IP address IP B . A connection between the client and server can thus be uniquely identifi ed through the tuple _ P A , IP A , P B , IP B _ . The transport layer segment consists of a header containing the source port P A and the destination port P B . The IP datagram has a header that contains the source IP address IP A and the destination IP address IP B . Network interface cards only recognize the MAC address. When the network interface card in host A creates a MAC frame on the physical medium of network P, it typically uses a 48-bit source MAC address and a 48-bit destination MAC address. Obviously, host B is on a different network, possibly using a different link and physical layer. Thus, the destination MAC address does not belong to host B, but instead to a gateway or router that connects network P to other networks or the Internet. The IP address of the gateway is either manually installed in host A or host A fi nds this information using a dynamic host confi guration protocol (DHCP). DHCP is also used to dynamically assign IP addresses to hosts in a network. However, knowledge of simply the IP address of the gateway does not suffi ce since the MAC address is necessary for the frame to be received by the gateway. A mapping of the IP address to the MAC address can be obtained using the address resolution protocol (ARP). Similarly, when a frame arrives at the gateway from the Internet to the host on the network Q, the gateway will have to use the ARP to determine the MAC address of the destination host. The gateway is responsible for routing the IP datagram in the received MAC frame to another router in the Internet, which forms a node on one of the available paths to the destination network Q. Such paths are determined using routing information through routing protocols like the routing information protocol (RIP), open shortest path fi rst (OSPF), and border gateway protocol (BGP). How does the application process on host A know the IP address of host B? Usually, the IP address is not known, instead a domain name such as “ www.cnn .com ” that is human friendly is used in the application. It is necessary for host A to use the domain name service (DNS) to determine the IP address of host B. This has to happen prior to the actual data being sent in an IP packet to host B. Each network has a local name server that is known to every host in that network (possibly through DHCP). Host A contacts the local name server when the application process in host A desires to send a packet to host B with information about host B (say “ www.cnn.com ” ). If the local name server has cached information about the IP address of host B, it provides that information to host A immediately. If not, it contacts a root name server (there are only 13 of these worldwide). The root name servers have information about authoritative name servers that in turn have information related to hosts on their networks. In the above example, the root name server may provide the local name server of network P, the IP address of the authoritative name server for network Q. The local name server of network P then contacts the authoritative name server of network Q to obtain the IP address of host B. Then the IP address is forwarded to host A. Now suppose that host A was successful in fi nding the IP address of host B using DNS. The application process in host A with port number P A sends data to a process in host B with port number P B . How did the process in host A know the port number P B ? Standard applications have standard port numbers. For example, a web server usually employs the port number 80, a telnet server uses 23, a web server running the secure sockets layer (SSL) uses 443, the simple mail transport protocol (SMTP) uses 25, and so on. Port numbers may also be changed after initial contact as in the case of protocols like the fi le transfer protocol (FTP) or applications like Skype. Although port numbers for standard services are well known, this does not automatically imply that such services are not available at other port numbers. For instance, it is quite possible to run a web server at a port number other than 80. Services on servers “ listen ” for initial contact from clients at the standard port numbers. These are what we call “ open ” ports. When a packet from host A arrives at host B, it is sent up the protocol stack to the transport layer where the server that is listening at port number P B receives the application data in the transport layer segment. The server processes the data appropriately and responds to the client at port number P A , which is known because of the initial received packet. Figure a very simplified view of some of the many protocols and applications that are common in networked communications today. It is to be noted that this is just a very small fraction of the protocols and applications in use. Each of these protocols could perhaps create security problems because they are capable of being abused by malicious entities in ways in which they were not anticipated to be used. Security problems occur for a variety of reasons, but one common reason is that servers listening at known ports have bugs in their implementation (e.g., buffer overflows). For example, it is possible for a malicious entity (we will refer to a malicious entity—a human, a criminal organization, or software—as Oscar in this chapter) to craft packets that can be sent to buggy services. When a service is compromised, it can enable Oscar to take control over the host. This means Oscar can perhaps install malicious software on the host, use the host to launch other malicious packets, steal files that are stored on the host or on other hosts on the network that trust the compromised host, and so on as described in the following examples.

Network Perimeter Security

For network perimeter security, or protecting the external interfaces between

your network and external networks, we consider the use of address translation

mechanisms and fi rewalls.

Network address translation, or NAT, is the mapping of IP addresses from one

realm to another. Typically this is between public and private IP address space.

Private IP address space is the set of IETF-defi ned private address spaces (RFC 1918):



■ Class A 10.x.x.x 10/8 prefi x

■ Class B 172.16.x.x 172.16/12 prefi x

■ Class C 192.168.x.x 192.168/16 prefi x



NAT is used to create bindings between addresses, such as one-to-one address

binding (static NAT); one-to-many address binding (dynamic NAT); and address

and port bindings (network address port translation, or NAPT).

While NAT was developed to address the issues of address space exhaustion,

it was quickly adopted as a mechanism to enhance security at external interfaces.

Routes to private IP address spaces are not propagated within the Internet; therefore,

the use of private IP addresses hides the internal addressing structure of a

network from the outside.



The security architecture should consider a combination of static and dynamic

NAT and NAPT, based on the devices that are being protected. For example, static

NAT is often used for bindings to multiple-user devices such as servers or high-end

computing devices, while dynamic NAT is used with generic computing devices.

Firewalls are combinations of one or more security mechanisms, implemented

in network devices (routers) placed at strategic locations within a network.

Firewalls can be fi ltering gateways, application proxies with fi ltering gateways, or

devices running specialized “ fi rewall ” software.

Relay circuits

All these engineering project content are in the stream of Electrical and electronics!



Relay Toggle Circuit Using a 555 Timer

Relay Toggle Circuit Using a Single Transistor and Push Button

Relay Toggle Circuit Using a MOSFET and Push Button

555 Timer Monostable Circuit Using Pushbutton

Light Activated Relay (toggled)

Photo Electric Street Light

Power-On Time Delay Relay Circuit

Power-Off Time Delay Relay Circuit

Electronic Thermostat Relay Circuit

CHARGE COUPLED BI-DIRECTIONAL POWER MOSFET RELAY

SOLID STATE RELAY REQUIRES ONLY 50uA DRIVE CURRENT

THROUGH GLASS PUSHBUTTON SWITCH

Ultra Low Power Latching Relay Circuit

Universal Flasher using Latching Relay

Water Activated Relay

Time Delay Relay

Time Delay Relay II

Temperature-controlled Fan

Bedside Lamp Timer

Clap Relay

Water Pump Relay Control

free Electronic ebooks

These books are for free! These books are mostly the books used by the anna university and other important top universities in the stream of engineering! All these posts are collected for the internet sources.





Electronic Devices - Thomas L Floyd

Part1:

Part2:

Practical Radio Frequency Handbook 1.89 MB

Video Demystified - A Handbook for the Digital Engineer 5.07 MB

Dictionary of Video & Television Technology 1.45 MB

Introduction to Medical Electronics Applications 7.18 MB

Optical Fiber Telecommunication III 28.97 MB

Optical Fiber Telecommunication IV 33.46 MB

Fiber Bragg Gratings 29.25 MB

Mixed Signal & DSP Design Techniques 3.93 MB

RF & Microwave Radiation Safety Handbook 4.24 MB

Radar Systems Peak Detection & Tracking 1.98 MB

Telecommunications Circuits & Technology 2.20 MB

Electronic Packaging Handbook 13.19 MB

A Wavelet Tour of Signal Processing 18.94 MB

Op Amps for Everyone 2.09 MB

Third Generation CDMA Systems for Enhanced data Services 7.72 MB

Practical Handbook of Photovoltaic's - Fundamentals & Applications 16.39 MB

Bebop to the Boolean Boogie 21.88 MB

NMR-Spectroscopy: Data Acquisition 1.82 MB

Feature Extraction & Image Processing

Troubleshooting Analog Circuits

Building A Successful Board Test Strategy

Photoreactive Organic Thin Films

Audio & Hi-Fi Handbook

Sensors & Transducers

Digital Signal Processing 16.65 MB

SMT Soldering Handbook - Surface Mount Technology

Intelligent Communication Systems





Free electronics books, free ebooks, engineering ebooks, electronic engineering bo



More Pages: 1 2 3



free Electronics ebooks



These books are for free! These books are mostly the books used by the anna university and other important top universities in the stream of engineering! All these posts are collected for the internet sources.



OpAmps - Design, Application, & Troubleshooting

Pattern Recognition

Engineering Digital Design

Newsnes Data Communications Pocket Book

CE Conformity Marking & New Approach Directive

Newnes Guide to Television & Video Technology



Fabricating Printed Circuit Boards

DSP Integrated Circuits

Newnes Electrical Engineer's Handbook

Analog Circuit Design - Art Science & Personalities

The AR & Science of Analog Circuit Design

EMC for Product Designers

Analog & Digital Filter Design

Newnes Radio & RF Engineering Pocket Book

Introduction to Information Optics

Dictionary of Engineering

Introduction to Digital Audio

Solid State Tesla Coil

Thermal Analysis of a Transistor

Radar Technology Encyclopedia

Broadband Telecommunications Handbook

The Satellite Communication Applications Handbook

Automated Fingerprint Identification Systems

Radar Systems Analysis & Design using MATLAB



More Pages: 1 2 3

Related Posts Plugin for WordPress, Blogger...