Question

In: Computer Science

Use Tinkercad or any other tool to implement the following project You have two Arduinos which...

Use Tinkercad or any other tool to implement the following project

You have two Arduinos which are connected using serial cable

Arduino#1 is connected to the following components

1-LCD, , 2-DC motor, 3-Temperature Sensor

Arduino#2 is connected to an Alarm (Buzzer) + LED

You may use other components such as resistors, function generator, power supply, relay, etc.

The system should do the following:

  1. Read the temperature every 1.5 seconds (DO NOT USE DELAY).
  2. Starting at t=6 seconds, calculate the average temperature (Tavg) during the last 6 seconds. Repeat this process every 1.5 seconds (moving average).
  3. Write the Tavg on the LCD.
  4. If the Tavg is larger than 29 ̊C, drive a DC motor (fan) with 20% duty cycle. And then increase the speed of the fan with 10% for every 2 ̊C increase above 29. If the temperature goes below 27 C, turn the DC motor off.
  5. If the Temperature become more than 35 ̊C, then the alarm will work on Arduino#2 and the LED will be ON

Solutions

Expert Solution

First of all we are connect two arduino in serial communication that is connect tx-rx pin of two arduinos.here i am attach my simulation image..

For 1st arduino interfacing we are using.

Components Required for 1st arduino connection

  • Arduino Uno
  • L293D Motor Driver IC
  • DHT22 Sensor
  • 16×2 LCD Display
  • DC motor
  • 9V Battery
  • 10KΩ Potentiometer
  • 220Ω Resistor
  • Breadboard

For 2nd arduino interfacing we are using.

  • 1 x Piezo Buzzer
  • 1 x LED
  • 1 x 330 Ohm Resistor
  • 1 x 10 KOhm Resistor
  • 1 x Pushbutton
  • Jumper Wires

​​

Code for arduino 1 .

Code for arduino2.

In above both code we can add tx-Rx connection syntax.And we can change the temperature value in code according to our requirement.


Related Solutions

Use Proteus or any other tool to simulate 8086 signals of the following instructions: MOV AL,44H...
Use Proteus or any other tool to simulate 8086 signals of the following instructions: MOV AL,44H MOV BX, [1389H] MOV [BX], AL MOV AL,55H OUT 6EH, AL Add Latches and Buffers to the 8086 bus to get the address and data separately. Use similar code as in part a, but you have to use different numbers. You can add other codes if you wish. You have to include the signals CLK, ALE, M/IO’, RD’, WR’, DT/R’, DEN’, BHE’, Address and...
Select one screening tool (NOT an assessment tool) that you use in clinical practice or have...
Select one screening tool (NOT an assessment tool) that you use in clinical practice or have observed a colleague from another discipline using. If this is not possible, review the literature and select a screening tool that is relevant to FNP practice. Research the important parameters of this tool: sensitivity, specificity, reliability, and validity. If you do not currently use any screening tool, select one that would be appropriate to your practice as an FNP. Create a one-page summary about...
You have two coins, one of which you know to be fair and the other of...
You have two coins, one of which you know to be fair and the other of which has a probability of turning up heads of 0.7, but you can’t tell which one is which. You choose one coin at random and flip it ten times getting an equal number of heads and tails. What is the probability that you chose the unfair coin?
ROCK, PAPER, SCISSORS Using C++, you will implement a class called Tool. It should have an...
ROCK, PAPER, SCISSORS Using C++, you will implement a class called Tool. It should have an int field called strength and a char field called type. You may make them either private or protected. The Tool class should also contain the function void setStrength(int), which sets the strength for the Tool. Create 3 more classes called Rock, Paper, and Scissors, which inherit from Tool. Each of these classes will need a default constructor that sets the strength to 1 and...
You have to choose between two options using   PI (profitability index) as your project evaluation tool....
You have to choose between two options using   PI (profitability index) as your project evaluation tool. The company use a 15% discount rate The project “A” needs $25,000 for initial investment and will produce in 3 years $18,000 per year. The project “B” needs $50,000 for initial investment and will produce in 3 years $35,000 per year
You need to consider two projects which have the following cash flows: Project A requires an...
You need to consider two projects which have the following cash flows: Project A requires an initial investment of $10,000 and will generate net cash flows of $5,000 at the end of year 1, $6,000 at the end of year 2, $7,000 at the end of year 3, and $8,000 at the end of year 4. At the end of year 2, maintenance costs of $8,000 will have to be disbursed. Project B requires an initial investment of $15,500 and...
You need to consider two projects which have the following cash flows: Project A requires an...
You need to consider two projects which have the following cash flows: Project A requires an initial investment of $10,000 and will generate net cash flows of $5,000 at the end of year 1, $6,000 at the end of year 2, $7,000 at the end of year 3, and $8,000 at the end of year 4. At the end of year 2, maintenance costs of $8,000 will have to be disbursed. Project B requires an initial investment of $15,500 and...
26.5 Project 3: List & Queue ADT Overview For this project, you are to implement two...
26.5 Project 3: List & Queue ADT Overview For this project, you are to implement two abstract data types (ADTs). You will write a doubly linked list (Dll) and a queue class. The queue will use the dll internally. The class interfaces are downloadable below. You must follow the interface exactly. While you can define other public and private methods and fields, the class names and methods given must appear as provided, or you will not pass the unit tests....
Cryptography - please use Python to complete the following task. You don't have to implement AES...
Cryptography - please use Python to complete the following task. You don't have to implement AES just import the necessary libraries. Can you fix my code? Thanks! Read in a 128 bit key from the user (16 characters). If the user enters a key of any other size it's fine to terminate the program with an error. Read in a string of arbitary length from the user. (ie, the string could be 1 character, or 50,000, or anywhere in between)....
Construct a project charter for any project that you have ever worked on.  It can be for...
Construct a project charter for any project that you have ever worked on.  It can be for work, for school, or even somewhat fictitious.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT