Simulate the remote keyless entry control for the driver

Assignment Help Computer Engineering
Reference no: EM132196703

Question :

Write a c program, using the Arduino's integrated development environment (IDE), to simulate the Remote keyless entry control for the driver side door lock and the remote control parking with the following functions:

The door lock motor (simulated by a servo motor) locks and unlocks the driver side door with the following behavior:

The server motor starts at 0 degree to simulate the driver side door initially locked position.

The server motor rotates back-and-forth between 0 and 180 degrees to simulate the driver side door locked (0 degree) or unlocked (180 degree) positions.

The driver side door lock and unlock positions are controlled by an inferred remote control.

One button on the remote control can move the servomotor to the locked (0-degree) position. Another button on the remote control can move the servomotor to the unlocked (180-degree) position.

Use a stepper motor to simulate the movement of one car wheel during the remote control parking.

Rotate the stepper motor to one direction when the car is moving forward.

Rotate the stepper motor to the other direction when the car is moving backward.

Stop the stepper motor rotation when the car is not moving.

Use a distance sensor to sense objects within 30 cm. Use a red LED light to simulate the break light.

An inferred remote control is used to simulate the BMW 7 series key fob.

This project can be done by using any Inferred Remote control, as well as a smart phone with an inferred remote control app.

If you select to use a different remote control buttons than the specified SainSmart Remote Control buttons below to implement this project, you must demo this project in person.

Program the door to be unlocked (180-degree) by pressing the plus button on the SainSmart remote control.

Program the door to be locked (0-degree) by pressing the minus button on the SainSmart remote control.

If the door is already unlocked, receiving another door unlock signal should not move the servo motor.

If the door is already locked, receiving another door lock signal should not move the servo motor.

Program the stepper motor to rotate one direction when the forward button on the SainSmart remote control is pressed. However, while the forward button is pressed, if the distance sensor detects any object within 30 cm, turn on a red LED light to simulate the break light and stop the stepper motor rotation.

Program the stepper motor to rotate the other direction when the backward button on the SainSmart remote control is pressed. However, while the backward button is pressed, if the distance sensor detects any object within 30 cm, turn on a red LED light to simulate the break light and stop the stepper motor rotation.

Reference no: EM132196703

Questions Cloud

What is the utility company peak and off-peak profit levels : What is the utility company's peak and off-peak profit levels? What is the off-peak surplus electricity generated? When using this pricing scheme?
Specific performance be appropriate remedy : In which of the following situations would specific performance be an appropriate remedy? Discuss fully.
Excited about their empowerment program : A lack of Management Commitment The employees of a midsized printed circuit-board manufacturer had been excited about their empowerment program
Define strategies for international business : Relate the case to theories, concepts, and strategies for international business. Assess the situation and listen carefully to the suggestions in the case.
Simulate the remote keyless entry control for the driver : The server motor rotates back-and-forth between 0 and 180 degrees to simulate the driver side door locked (0 degree) or unlocked (180 degree) positions.
Your own business to develop and sell that product : Consider if you were an entrepreneur just starting up your own business to develop and sell that product.
Write an essay that presents specific arguments supported by : Write an essay that presents specific arguments supported by textual evidence and details gathered in your research. The topics suggested require a close
Personal jurisdiction over the other driver and why : If Mark were to sue the other driver, which state or states would have personal jurisdiction over the other driver and why?
Executives need to get up to speed in subject area : White papers and academic, peer-reviewed journals often provide the information executives need to get "up to speed" in a subject area,

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd