精品中英文外文翻译基于单片机的汽车防盗报警系统设计定范文
基于单片机的无线防盗报警系统设计大学毕业论文外文文献翻译及原文
毕业设计(论文)外文文献翻译文献、资料中文题目:基于单片机的无线防盗报警系统设计文献、资料英文题目:文献、资料来源:文献、资料发表(出版)日期:院(部):专业:班级:姓名:学号:指导教师:翻译日期: 2017.02.14毕业设计(论文)外文资料翻译学院:专业:姓名:学号:外文出处:Multimedia Technology (ICMT), (用外文写)2011 International Conference on 附件: 1.外文资料翻译译文;2.外文原文。
注:请将该封面与附件装订成册。
附件1:外文资料翻译译文基于单片机的无线防盗报警系统设计摘要:为了对盗窃,抢劫等事故进行有效的监测和预警,统一使用了AT89C51单片机控制技术和红外探测技术,这是一种已经被设计出来的无线防盗报警技术,它包括硬件和软件两部分,硬件部分主要由红外传感器,发送和接收模块,单片机,声光报警等组成;软件部分包括主程序和音乐子程序。
用C语言或汇编语言编写源程序,再用keilC51平台进行调试的翻译后,下载到单片机AT89C51芯片,这种单片机和其他元器件根据设计电路焊接在PCB板上。
通电,闭合循环控制开关,当有人闯入红外发射区域时,触发声光报警,表明满足了设计要求。
关键词:红外传感器;发射;接收;单片机;报警1 前言随着时代的不断进步,人们对环境安全提出了一个更高的要求,特别是在生活安全方面,要时常地去注意那些不速之客。
现在许多小区已经安装了智能报警系统,从而提高了小区内的安全程度。
因为红外线是一种不可见光,具有很强的保密和安全性,而且采用无线发射和接收,不需要独立的线路,因此在安全装置的使用方面有很大的优势。
2 硬件系统的设计无线防盗系统图是以单片机为基础,如图1所示。
该系统包括红外传感器、发射模块、接收模块、单片机、声光警告等。
红外传感器的主要装置是由热释电红外传感器RE200B、热释电红外开关BISS0001和一些外部基本设备连接而成。
精品中英文外文翻译基于单片机的汽车防盗报警系统设计定
Based on monolithic integrated circuit automobile security alarmsystem designAbstract:Decodes the automobile security system using them on litchis integrated circuit interior resources realization jump code, it each time uses the remote control password all is changing, both enhanced the system security, and greatly reduced the cost.Keyword: Monolithic integrated circuit, Automobile security system , Code/decodeIntroductionIs unceasingly progressive along with the social economy and the high tech rapid development, in the routine work and the life, the automobile has become the people ideal transportation vehicle. But the following motor vehicle the case which robbed gradually is also in creased has created the pilot economical property loss. In order tore duce the automobile to rob the event the formation rate, for has the automobile the user to provide the safety control, simply develops one kind to be reliable, the ease of operation, can send out in the discovery normal condition to the pilot reports to the police the reminder and the security warning safety system has the practical significance. This article based on to the existing automobile security alarm system generalized analysis, develops one kind of brand-new security alarm system. This system has mainly used the jump code code/decoding principle, causes the overall system to be safer, greatly reduces password explaining rate.1. System principle of workThe automobile security alarm system the remote control which carries by the driver and installs in the automobile the controller two parts composes. The remote control and the controller all use eight CMOS which American AT-MEL Corporation produces the A VR monolithic integrated circuit, this series monolithic integrated circuit based on new simplifies instruction R the ISC structure, includes the service life most to be few is 1,000 time writes/scratches the circulation the Flash program memory, as well as the service life at least is 100,000time writes/scratches the circulation E the EPROM data-carrier storage, some 2 only have when the entire piececleaning can clean the programming encryption locks the localization.1.1 System designThe automobile security examination uses the ultrasonic sensor. The ultrasonic sensor is composed by the ultrasonic wave transmission circuit and the supersonic reception electric circuit, in the automobile cab appropriate position, installs the ultrasonic wave launch/receiver, as well as switch electric circuit T1. When the automobile parks the vehicle owner person must leave the automobile, with remote control closed switch T1, the automobile alarm system sat garrisons the condition, around the system use ultrasonic wave examination vehicle obstacle. Launches the partial electric circuits likes chart 1 to show. When its P1 mouth P1.1, P1.2 to the D trig , the P1.0 control ultrasonic wave launch, are 0, the photo electricity coupler outputs the TP1 end is 1, the permission ultrasonic wave launch, launches/the receive ultrasonic wave in turn, the circulation repeatedly carries on. Simultaneously the monolithic integrated circuit interior counter starts to count. The steam distance between vehicles obstacle distance is the time which sends out through the sound navigation and ranging reflects spends determines and carries on the computation. The reflection signal causes the D trigger to produce interrupt request signal INT1,simultaneously stops counting, reads takes counts the value, calculates the actual distance after the formula, then carries on the comparison with the datum distance, if examines when the actual distance is bigger than reference value 80cm, does not carry on the accustom-optics to report to the police; If some people approach the automobile to enter the cab, the examination actual distance is smaller than or was equal to when reference value 80cm, through monolithic integrated circuit P2.2 and the P2.3 port, actuates the indicating lamp display circuit and the sound alarm circuit, sends out three two flash. And triggers a high level, the actuation is wire less signal transmission circuit.Chart 1 Ultrasonic wave transmission circuit1.2 Code/decoding principleThe present automobile remote control security system are many isusesVD5026/27, PT2262/72, HT12E/D and so on the general code/decodes the electric circuit, its password decided by the component address, each set of security systems use a fixed invariable password. Along with the micro processing technology development, through the receiver emote control transmitting message, may intercept this fixed password, moreover general arranges the decoding address to lose the person to carry the component size limit, its quantity is impossible too much, can obtain not repeatedly codes very is also limited, also can very quickly explain the password with the automatic scanner. Therefore, this kind of password fixed invariable automobile security system has received the serious threat. Decodes the automobile security system using the monolithic integrated circuit interior resources realization jump code, it each time uses the remote control password all is changing, with the password no longer duplicates uses, causes the interception password also is makes a futile effort, in addition, it may increase the enough many passwords figure, enhances the system resistance illegal scanning the ability. The remote control coding altogether has 12 bytes, separately by 3 bytes codes channels code, 3 bytes codes forewords number, 5 bytes jumps codes, 1 byte pressed key operation code is composed. Encoded front adds on logic in each byte 0 to take the outset position, encoded behind adds on a logical 1 achievement in each byte to stop the position, and in most front adds on several logic 1 to take the guidance signal, this constituted the serial coded signal which uses in to transmit. The code channel code uses in to express the remote control status; each set of systems use a fixed channel code. The code foreword number uses in to record the encoded order, its starting value is 0, the monolithic integrated circuit every time codes a time, the code foreword number upwardly counts time. The code channel code and the code foreword number deposits in monolithic integrated circuit EEPROM, guarantees them power cut the influence. The jump code is the systematic true password, it passes through the complex special algorithm by the code channel code and the code foreword number to extract, this special algorithm foreign security. The pressed key operation code by the pressed key which presses was decided, when "the hypothesis" the key is pressed down, its code decides as 0 1H; When "relieves" the key presses down, its code decides as 00H. Whether is the decoding confirms receive the code legitimate a series of operating process. Was confirmed the legitimate code needs to satisfy three conditions; (1) codes the channel code and the decoding channel code is same; (2) coded the foreword number to be bigger than the decoding foreword number (decodingforeword number to record on legitimately has used code foreword number, this condition might guarantee before has used code was invalid); (3) jumps the code to be equal to reuses the special algorithm to extract changes the code. After the monolithic integrated circuit confirmed receives is the legitimate code, writes the code foreword number in the decoding foreword number, and completes corresponding operation processing according to the operation code. The decoding channel code and the decoding foreword number also deposits in monolithic integrated circuit EEPROM, guards against because of power cut loses.1.3 Security reports to the police realizationIf will have robber Chen ZheRu the room, starts the automobile, after wrong password, then the automobile storage battery +12V voltage, the ignition electric current way ignition lock, the ignition outage, the engine extinguishes, again starts, will duplicate the above process, like this, the bandits and thieves always will not be able to start the automobile, will not be able to achieve its anticipated goal. The alarm circuit mainly is composed by the integrated block and the speaker and electronic switching SCR. Triode or the multiple-unit tube, are for enhance the electric circuit measure which the power but often uses, it has composed a current amplification factor very big equivalent transistor, total enlargement factor for these two enlargement factor product. SCR is the electronic switching which constitutes by the silicon-controlled rectifier, the electric capacity and the resistance constitution negative booster concurrently filter, provides +3 +4V to IC the voltage, IC is traces Draws up sound reports to the police the integrated circuit, the alarm apparatus by the SCR control, robs the vehicle thief once after the wrong password, then the storage battery electric current enters the security system besides a group, another group is started in the engine, after leads the engine work, natural contact output voltage, after the differentiating circuit, silicon-controlled rectifier SCR is triggered, also passes through the resistance to fall the pressure, the voltage adds in the IC power source input end, IC obtains the voltage output alarm, enlarges after the multiple-unit tube, Destroys moves the speaker to send out resoundingly reports to the police the sound. when static state, entire electric circuit does not consume the electricity.2. Software designThe alarm apparatus software design mainly divides into:Master routine (alarm apparatus initialization, key modulation and decoding); Alarm apparatus interrupthandling routine. This alarm apparatus installs on the automobile steering wheel. After installs, starts the alarm apparatus, the alarm apparatus automatically retards20~30s to start to work, in order to lets use the person to have the enough time to lock the gate to leave the automobile. After the time delay the alarm apparatus enters the value to defend the active status, once the vehicle door is turned on or the windowpane hits garrulously, the oscillation pick-up examines the signal, time delay 20s starts to report to the police. The time delay goal is the master which causes the automobile is opening the gate to enter the vehicle internal energy closure alarm apparatus, in order to avoid reports to the police by mistake.2.1 Master routineThis part mainly completes to each severance entrance hypothesis, and reports to the police the depositing unit initialization to each fixed unit, establishes the special symbol value and to the pressed key interrupts processing. Master routine design diagram like chart 2 shows.Chart2 master routine frame chart2.2 Alarm apparatus interrupt handling routineThe burglar alarm disposal procedure uses time severance inquiry processing, each time severance, only is inquires each kind of control flag bit, controls each group output according to its condition. The procedure has not used has circulation processing the way, therefore time control conclusion, cannot eliminate controls the flag bit, only is repositions the scene, the waiting next time severance, again judges whether controls the conclusion.3. Concluding remarkUses automobile security alarm system cost which this kind of monolithic integrated circuit composes low, performance reliable, simultaneously settles the extension to be convenient. The use jump code code/decoding principle, causes the system to be safer, greatly reduces password explaining rate, will obtain the wide spread application in the future automobile security alarm system.基于单片机的汽车防盗报警系统设计摘要:应用单片机内部资源实现的跳变编码/解码汽车防盗系统,它每次使用的遥控密码都在变化,既提高了系统的安全性,又大大降低了成本。
外文翻译--基于GSM网络的智能汽车防盗报警系统的设计与开发
外文翻译标题:Design and Development of a Smart Auto Intruder Alarm System with GSM Network中文译名:基于GSM网络的智能汽车防盗报警系统的设计与开发作者:M.Ehikhamenle, B.O. Omijeh日期:2016年出处:Ehikhamenle M, Omijeh BO. Design and Development of a Smart Auto Intruder Alarm System with GSM Network [J]. IJIRCCE, 2016, 4(12): 20588-20597.分为2部分:第一部分为外文原文第二部分为中文译文Design and Development of a Smart Auto Intruder Alarm System with GSM NetworkM.E h ikhamenle1, B.O. Omijeh1Department of Electronic and Computer Engineering, University of Port Harcourt, Choba, Rivers State, Nigeria1’ABSTRACT :This project is based on the design and construction of an intruder detecting and alerting system. This was achieved using an AT89C52 microcontroller for the control of the other component, a SIM900-GSM module that communicates between the home owner phone and the PIR sensor (motion sensor). The interfacing between the GSM module and the microcontroller was achieved using an IC called MAX232 (this IC converts TTL voltage level (+5V) to RS232 voltage level (plus minus 7.5V) vice versa) and the microcontroller was programmed using assembly language. At the end of this project we were able to design and construct a device that is not only cheap but efficient. We overcome the problem of false alarm by using a PIR sensor (passive infrared: this sensor only respond to infrared emitted from the human body and animals) and after testing, the microcontroller responded to the information sent by the PIR sensor and in the occurrence of intrusion send an alert message to the home owner as well sounding an alarm to alert the neighbours using a buzzer.KEYWORDS; Intruder Detecting, G S M Module, P.I.R. SensorI.INTRODUCTION Security is a prime concern in our day-to-day life. Everyone wants to be as much secure as possible. In recent times the world has experienced an exponential increase in the rate of crime. Criminals break into houses on a daily basis around the world carting with huge amount of money and precious items. Sensitive and confidential documents, materials and equipment by corporation are constantly declared missing from where they are kept. So there is a need to provide a device that can detect unauthorized persons in an environment.In a network or a system, any kind of unauthorized or unapproved activities are called intrusions. An Intruder Detection System (IDS) is a collection of the tools, methods, and resources to help identify, assess, and report intrusions.Intrusion detection is typically one part of an overall protection system that is installed around a system or device and it is not a stand-alone protection measure (Ngad, 2008). In (Zhang et el, 2003), intrusion is defined as: “any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource” and intrusion prevention techniques (such as encryption, authentication, access control, secure routing, etc.) are presented as the first line of defense against intrusions.However, as in any kind of security system, intrusions cannot be totally prevented. The intrusion and compromise of a node leads to confidential information such as security keys being revealed to the intruders. This results in the failure of the preventive security mechanism. Therefore, IDSs are designed to reveal intrusions, before they can disclose the secured system resources. IDSs are always considered as a second wall of defense from the security point of view. IDSs are cyberspace equivalent of the burglar alarms that are being used in physical security systems today (Patcha and Park, 2007). As mentioned in (Zhang et el, 2003), the expected operational requirement of IDS s is given as: “low false positive rate, calculated as the percentage of normalcy variations detected as anomalies, and high true positive rate, calculated as the percentage of anomalies detected”.II.RELATED WORKS Considering the current global security environment, the importance of good physical security is difficult to ignore. Physical security services are becoming a private rather than public service i.e. individuals and organizations tend to hire private security firms and install security equipment and use the police as the back. According to the Bureau of Labor Statistics (2004), private security officers outnumber police officers by more than 2 to 1 in the United States of America. Recent reports suggest that this trend holds true for both daily security operations responding to terrorism, natural disasters. Physical security has seen less attention and it is primarily an applied field, it has no dedicated line of research. Instead, it is scattered through fields like engineering, computer science, chemistry and physics as well as social sciences such as criminology, sociology and psychology. The different types of existing security systems will be analyzed below. •Electrical LocksElectric locks come in many forms. The most basic is a Magnetic Lock (commonly called a mag lock). A large electro- magnet is mounted on the door frame and a corresponding armature is mounted on the door. When the magnet is powered and the door is closed, the armature is held fast to the magnet. Mag locks are simple to install and are very attack resistant. But mag locks are also problematic. Improperly installed or maintained mag locks have fallen on people. Also there is no mechanical free egress. In other words, one must unlock the mag lock to both enter and leave. This has caused fire marshals to impose strict codes on the use of mag locks and the access control practice in general. Other problems include a lag time in releasing as the collapsing magnetic field is not instantaneous. This lag time can cause a user to walk into the door. Finally, mag locks by design fail unlocked, that is if power is removed they unlock. This could be a problem where security is a prime concern.•Electric Strikes replace a standard strike mounted on the door frame and receive the latch and latch bolt. Electric strikes can be simple to install when they are designed for drop-in replacement of a standard strike. But some electric strikes require that the door frame be heavily modified. Electric strikes allow mechanical free egress: As a user leaves, he operates the lockset in the door, not the electric strike in the door frame. Electric strikes can also be either fail unlocked, as a mag lock, or the more secure fail locked. Electric strikes are easier to attack than a mag lock. It is simple to lever the door open at the strike. Often the there is an increased gap between the strike and the door latch. Latch guards are often used to cover this gap•Electric Mortise and Cylindrical Locks are drop in replacements for the door mounted mechanical locks. A hole must be drilled in the door for electric power wires. Also a power transfer hinge is used to get the power from the door frame to the door. Electric mortise and cylindrical locks allow mechanical free egress. Electric mortise and cylindrical locks can be either fail unlocked or fail locked.•Electrified Exit Hardware, sometimes called panic hardware or crash bars, are used in fire exit applications. The idea is that one simply pushes against the bar to open it, making it the easiest of mechanically free exit methods.Electrified exit hardware can be either fail unlocked or fail locked. A drawback of electrified exit hardware is their complexity which requires skill to install and maintenance to assure proper function.•Motor Operated Locks are used throughout Europe. A European motor operated lock has two modes, day mode where only the latch is electrically operated, and night mode where the more secure deadbolt is electrically operated ().USER AUTHENTICATION SYSTEMSWhen implemented with a digital access system, one of the following access systems or digital authentications systems can be with an electric lock. These however are only a few of the numerous authentication devices available.•Numerical Codes, Passwords and Passphrases: Perhaps the most prevalent form of electronic lock is that using a numerical code for authentication; the correct code must be entered in order for the lock to deactivate.Such locks typically provide a keypad, and some feature an audible response to each press. Combination lengths are usually between 4 and 6 digits long. A variation on this design involves the user entering the correctpassword or passphrase. A major hindrance however is the fact that users are capable of forgetting their codes.Forgetfulness is especially common in older people and this system will not be convenient for them. These codes are, in some cases, easy to crack.•Security Tokens: Another means of authenticating users is to require them to scan or "swipe" a security token such as a smart card or similar, or inter act a token with the lock. For example, some locks can access stored credentials on a personal digital assistant using infrared data transfer methods. However, just as in the case of an ATM card, the magnetic tape tends to wear off with time either resulting to time wasting in accessing a room or the inability of the user to access the room at all.•Biometrics: As biometrics become more and more prominent as a recognized means of positive identification, their use in security systems increases. Some new electronic locks take advantage of technologies such as fingerprint scanning, retinalscanning and iris scanning, and voiceprint identification to authenticate users. This is a very secure way of identifying a person’s identity but it is limited by the occurrence of an accident or disfiguration to the part of the body used for identification.III.MATERIALS AND METHODS The block diagram below shows the sections and the signal flow. The circuit diagram shows the different component required for the system to function properly.The Circuit AnalysisThe motion based security system is made up of the following stages;i.Power Supply Unitii.Input stage: the input stage comprises of;•Motion sensoriii.Control stage •Microcontrolleriv.Output stage •Buzzer•LCD Screen•Bulb•G S M moduleFig 3.1 The Block Diagram of the SystemA. POWER SUPPLY UNITFigure 3.2: Diagram of Power Supply UnitThe power supply serves as the main supply of electrical power to the system. The supply voltage is 220Vac that is step down by a 220Vac/12Vac, 500mA transformer. The 12V AC voltage is then rectified by a bridge rectifier to have a DC output. After the rectification process the remaining AC ripples are filtered off by a bypass capacitor. The output from the bypass capacitor is unregulated thereby causing a drastic voltage drop when a load is connected. To solve this problem an integrated IC chip voltage regulator is used to get fixed o utput.i. Analysis of Power Supply A 240/24V center tapped step– down transformer was used, to feed 24V to the circuit. Secondary voltage of transformer = 24V (Vγms ) the peak secondary voltage, V peak =√2 × Vγms ……3.1= √2 × 24 = 33.9VThe bridge rectifier diode will rectify the 24V from the secondary of the step down t ransformer.The full-wave bridge rectifier 5W001 was used because it have a peak inverse voltage of 50V and can pass a peak current of 2A which is suitable for our circuit design.V L (peαk ) = V (max ) − 2V d (oη) … … … … … … … … … 3.2Where V L(peak) is the peak to peak voltage of the loadV (max) is the maximum voltage of the alternating current V d(on) is the voltage drop across the bridge rectifier diode[33.9 − 2(0.7)] = 32.5VThe PIV rating of the diode to be used should be at least PIV = V (mαx ) − V D (oη) … … … … … … … … … 3.3 = 33.9 − 0.7= 33.2VTherefore the 50v PIV is far greater than this value 33.2v, thus making it suitable for this design. For a suitable filter capacitor value to be employed the following calculations was consideredVγ = Io /2fcWhere Vγ = γipple voltαge = 1.0Vf = fγequency = 50HzIo250mA Io = γegulαtoγ output cuγγent = 250mATherefore, C = 2fVγ = 2x50x1.0 = 2500 x 10-6 farad = 2500µf. Since 2500µf is not a standard value, 2200µf was used.2G N D2G N D2G N Dii. Voltage regulatorThree voltage regulators were used, two 7805 and 7812 both of them gives 5v and 12v respectively.iii. Light emitting diode (Indicator)A light emitting diode is connected in the circuit this will notify that there is power in the circuit. A resistor is connected in series with the light emitting diodes. The resistor limit the amount of current entering the light emitting diode. The value of the resistor is gotten from the calculation below.V = V = V d = V d + IRSupply voltageOperating voltage oflight emitting diode (LEDS ) I= R = V = V d = I = Allowable current through the LEDS Limiting current Re sistor 5v 2v 30mA(20mA )∴ R =V - V d I = 5 - 2 30mA=3 = 30 x 10-3 3 x 1000 30 R = 100ΩB. INPUT UNITThe input unit is made up of the motion sensor that senses if there is a movement in the restricted area the block diagram is shown below. .Fig 3.3 circuit diagram of the motion sensorThe motion sensor is used to detect the movement of a human body. It gives a low voltage when there is no motion, when there is motion it sends a 5volt, this will trigger the transistor. The transistor will send the zero voltage to the microcontroller. The transistor used in this circuit is used as a logic inverter. The voltage applied at the base is inverted at the collector terminal. When there is no intruder the motion sensor produces a low at its output terminal, the base of the transistor is connected to the output terminal of the motion sensor. The low signal switches off the transistor thereby preventing current from flowing via the resistor to the emitter. This is an open circuit condition, the voltage that will be gotten at the collector emitter junction is the maximum voltage applied at the collector terminal (5volt). This voltage is sent to the microcontroller.When the sensor senses motion it outputs a 5v for one second then goes back to zero, to search if there is any movement again. When the output is five volts the transistor is switched on making the collector voltage to have a zero voltage. The zero voltage notifies the microcontroller that an intruder has been detected. The motion sensor has a range of 6mD.CONTROL UNITThe control unit is the microcontroller (AT89c52). It is used to processes the security detecting system. The motion sensor is connected to the pin 1 of the microcontroller via the transistor logic inverter. When the microcontroller receives a low voltage from the input of the motion sensor it turns on the light, bulb, sends message to three individual and displays intruder detected on the liquid crystal display. The diagram of the control circuit is shown belowFrom figure 3.5, p1.0 is connected to the motion sensor via the logic inverter; p2 is connected to the liquid crystal display. Where p2.0, p2.1, p2.2 and p2.3 is connected to the data pins of the liquid crystal display and p2.5 and p2.7 is connected to the register select and enable of the liquid crystal display. P3.0 and P3.1 are the serial terminals of the microcontroller; it is connected to the GSM module via max232. The max232 is used to convert the voltage from the GSM to TTL voltage as well as converting TTL voltages to the acceptable voltage of the GSM module.The buzzer is connected to port 3.5 via a transistor when an intruder is detected; the microcontroller sends a 5volt to the base of the transistor. This switches the transistor and the buzzer is turn on.The light bulb is connected to relay which is connected to p3.6 of the microcontroller via the transistor, this illuminate the area of intrusion.Fig 3.4 control unitE.OUTPUT UNITThe output unit consists of;i.LCD Screenii.Buzzermpi. LCD ScreenThe LCD screen is used to display that an intruder has been detected; this is possible due to its data terminals and command register that the microcontroller is connected to. The buzzer sounds an alarm when an intruder is detected either from the infrared sensing system or the ultrasonic module.ii. BuzzerThe buzzer sounds an alarm when an intruder is detected from the motion detecting system.iii. LampThe lamp is connected to the microcontroller via a relay and transistor. When an intruder is detected the microcontroller switches on the bulb through the transistor and relay.iv. GSM moduleThe GSM module is used to sends message to three individual using AT commands. This is done by the microcontroller when an intruder is detected.F. CONSTRUCTION OF CIRCUIT AND ASSEMBLY OF COMPONENTSAfter designing the circuit in a software environment Proteus Version 7.8 and simulating it. The values of each component were obtained and ordered from the marketers and when they arrived construction began.The construction started with mounting of components on the Vero board; each component was tested before mounting and then soldered to the Vero board.The power supply unit was built first and the voltages from the voltage regulator were tested before going into the next stage. The control unit was soldered and tested. The output unit was soldered last and tested. Each stage is connected (joined) by a connecting wire or placed in the same row for continuity and tested before packaged with a plastic adaptable box. After packaging (casing) the prototype was tested and checked for any fault arising because of vibration and shaking owing to packaging.Figure 3.5: Circuit Diagram of the Motion Based Security System2G N D1 2 34 5 67 8 9 10 11 12 13 14V S S V D D V E ER S R W ED 0 D 1 D 2 D 3 D 4 D 5 D 6 D 72G N D2G N DIV.RESULTS AND DISCURTIONS Before using any component it is advisable to test them before soldering and also to test each stage of the project during construction. This approach provides us with an easy way to trace fault and easily correct them. The power supply unit was checked for proper voltage level from its output pins with a multi-meter. The motion sensor and GSM module were also tested, as well as the entire circuitry. The software programmed was simulated and checked in the assembler (M.I.D.E studio), the hex file was generated with no error recorded before it was burned into the microcontroller chip using a TOPWIN programmer.Fig 4.1 testing of source code using M.I.D.E studioFig 4.2 burning of program into chip using topwinA. POWER SUPPLY UNITTable below shows the power supply test using DC Multimeter.The motion sensorThe motion sensor was tested by placing the sensor, and sensing for the change of the output voltage. When the sensor senses motion the output is high and when no motion is sense the output is low.Table 4.2 results from the output of the motion sensorV.CONCLUSION The aim of the project is to develop a system that can be able to detect when an intruder enters an area, the system should alert the public by sounding an alarm, illuminating the area, as well as sending text messages to three different numbers. The circuit is an innovative device that is active in detecting an intruder. The device can be used at homes, schools, churches, etc. it will promote security of lives and property in this country if adopted.In Nigeria where home burglary and robbery is in the increase this circuit will reduce the rate of armed robbery in an area, and it is in line with the government vision 2020.REFERENCES1. Microsoft Encarta Encyclopedia (Student Edition), 2008Bitzer, E. and Hoffman, A. Research Paper: Psychology inthe Study of Physical Security, 20072.Bunn, M. & Wier, A. (2004). Securing the bomb: An agenda for Action. Cambridge, MA: Harvard University, BelferCenter for Science and International Affairs3.Higgins, M. (2005, September 10). Katrina-hit states turn to security firms, The Washington Times.4.Virasami, B. (2005, April 28). City to Train Private Security Guards. Newsday, p. A175.Hassan, M.F. (2008, October 14), Intelligent Intrusion Detection System, Blog. Microchip Technology, PIC16F87x DataSheet, 2001.6./wiki/intrusion_detection_systems (Retrieved Date: 6th November, 2008)/viewaricle/456786 (Retrieved Date: 12th September, 2008)8.U.S. Department of Labor: Bureau of Labor Statistics (2005) May 2004 National Occupational Employment and WageEstimates: Protective Service Occupations9./current/oes_33pr.htm (Retrieved Date: April 13, 2005)/projectsensors/026/ (Retrieved Date: 15th February, 2009)11. Harris, Tom (March, 2008), “How Burglar Alarms Work”, , Retrieved April 10, 2007,12.wikipedia (May, 2008), “Closed-circuit television”, Retrieved May 16, 2008, from13./wiki/surveillance_cameras wikipedia (May, 2008), “Security”,RetrievedMay 16, 2008,from/wiki/securityBIOGRAPHYEhikhamenle M. graduated with BEng (Second class upper honors)Electrical/Electronics Engineering from Ambrose Alli University Ekpoma in 2007.He obtained his Master degree in Electrical/Electronics Engineering fromUniversity of Benin (UNIBEN), specializing in Electronics and Telecommunications in 2010. He was Head of Department Essential services, Works and Services Directorate Ambrose Alli University Ekpoma in 2012/2013. He is presently a lecturer in Electronic and Computer Engineering Department University of Port-Harcourt (UNIPORT).He has taught courses in electronics, computer,and telecommunications Engineering. His research interest include: Electronic, telecommunication, power electronic CAD, ICT and Control Systems.中文翻译基于GSM网络的智能汽车防盗报警系统的设计与开发摘要:该项目是基于入侵检测和警报系统的设计和构造。
基于单片机和GSM模块的防火防盗毕业设计外文文献翻译
Automatic fire alarm systemThe traditional electron safe alarm system mainly is through the sensor automatic detection, produces the alarm,sends out the alarm the scene or reports to the police through the special electric near distance,thus causes people's vigilance。
Through many years research and the development,the present alarm apparatus may say is the class is multitudinous. As a result of the alarm apparatchik development and the social each domain anxious need, can application domain be more and more many, specially is overdevelops in the civil domain.In recent years,the infrared alarm apparatus already became reports to the police a domain hot spot,because it used was not the obviously infrared acquisition, Hereford the hiding to be good,characteristic and so on security。
Infrared sensor is different according to the mechanism may divide into the light survey and the hot survey。
汽车防装报警系统设英文文献翻译
毕业设计附件材料学生姓名:***学号:******所在系部:电气与电子工程学院专业班级:自动化专业(03)班指导老师:***日期:2013年6月目录1 英文文献翻译 (3)1.1英文文献原文题目 (3)1.2中文翻译 (10)2 专业阅读书目 (14)2.1 《毫米波雷达及其应用(精)》 (14)1 英文文献翻译1.1英文文献原文题目Increases massively along with the automobile, on the road the stream of vehicles rest, does not make the road traffic accident year to increase large scale by the , causes the massive personnel casualty and the property damage. News which according to Chinese male peaceful on January 14, 2005 issued: China altogether sent in 2004 to live the traffic accident 567, 753, caused 99, 217 dead, 451, 810 people the wound, the immediate goods are lost 27. 7 hundred million Yuan. Traffic accident's primary cause exercises after over speed , occupies the magical skill causes, the liquor drives, weary driving and so on. But collides is the traffic accident main manifestation, majority is the vehicle - vehicle collision and the person - vehicle collision. may affirm, along with our country automobile inventory and productivity swift growth, high speed road and first-class highway course fast extending, if does not enlarge road service peaceful the entire control, the traffic safety accident will increase massively, causes more casualties and economical the loss. the expert indicated to the road service accident's analysis result, in occurs junction passes in the accident, some 80% are because the pilot responds not promptly, does not handle, when makes to become. And some 65% accident are the automobile follows the collision to create, other belong lean the surface collision, to scratch hang the result. Therefore, Germany Mercedes-Benz Company's experts, in hands over after each kind to pass the accident to carry on the system research analysis obtains: If the pilot can before the accident has to shift to an earlier time 1 second consciousness to attend a meeting to have the traffic accident to occur, and has adopted corresponding the true measure, then the overwhelming majority accidentpossibly avoids. the automobile anti-collision early warning system to enhances the automobile travel security to be very important. Year starts from the 1971, domestic and foreign presented the ultrasonic wave, the radar, the laser, the machine to regard one after another to think, infrared as well as interactive and so on anti-collision early warning system's research or the product. This article to each kind of anti-collision aspects and so on early warning system's principle, characteristic, flaw will carry on the analysis, and proposes the automobile anti-collision early warning system's development direction. The automobile anti-collision early warning system is in the automobile travel process, as well as about the direction danger carries on the examination to automobile's around, in the automobile and the danger has in the collision danger situation, carries on the acousto-optic warning, prompts pilot dangerous thing the direction as well as the degree of hazard, with the aim of letting the pilot take the corresponding measure, avoids following the collision and the side hangs and so on traffic accident's occurrences. Automobile anti-collision early warning system general by the information acquisition, the information processing, the information judgment, the early warning information and so on four groups to become. The information acquisition present stage's technology has the ultrasonic wave, the radar, the laser, the machine vision,infrared as well as interactive, through these technical gathering automobile travel process in all around information; The information processing part is mainly carries on the processing analysis to the gathering information, sentences to break in the automobile travel process whether all around to have the danger, commonly used monolithic integrated circuit, ARM, microprocessors and so on DSP, even uses the multi-CPU special purpose computer to process; Information the judgment is according to this vehicle vehicle type, the weather, time as well as this vehicle and danger distanceto, information and so on relative velocity, relative acceleration, through the information fusion technology, real-time carries on the dangerous or the secure state dynamic identification; When the early warning information part mainly refers to information the identification for the danger, this part carries on the dangerous rank judgment, the dangerous direction as well as should a cousto-optic warning. As a result of the different information acquisition technology, its corresponding automobile against hits the early warning system to be different, below to each kind of anti-collision early warning system's principle, the characteristic, lacks to fall and so on aspects to carry on the analysis. After radar truck anti-collision early warning system use electromagnetic wave launch, meets obstacle the reflection the echo to examine and the computation unceasingly to it with the front or rear area the obstacle to the speed and the distance, undergoes the analysis judgment, with does not carry on the warning to present hazards' goal according to degree . This system by the dual-mode antenna, the directional coupler, the mixer, frequency modulation the oscillator and the processing unit is composed. When the transmitter uses microwave frequency modulated continuous wave system , in the vehicles march forward, the radar pencil beam launches the frequency modulated continuous wave signal forward, when the transmitting message meets the goal, is reflected for the identical antenna receive, after mixing enlargement processing, between the available its pulsation signal the difference expressed that the radar and goal distance leaves, may obtain the distance the corresponding signal impulse after the microprocessor processing computation to count the value, again according to the slip frequency signal difference and the relative velocity relations, calculates the goal the relative velocity which reaches to thunder , the microprocessor above two physical quantity substitution dangerous time letter counts thematrix, then figures out the dangerous time. radar sounding stable property, not easily object surface shape and color shade sound. The environment adaptation performance is good, is been big the weather effect, it has the measuring time to be short, the measuring range big (may achieve above 10km), the precision higher merit. But periphery the vehicles, the obstacle can have the electromagnetic wave disturbance to it, between trailer-mounted radar each other also has the disturbance. This system is huge, the construction cost is expensive. On the high speed road, the isolation strip and the road two side metal has limited this system's application to a great extent.Since the early 80s, many of the world famous universities and research institutions to And the United States more than 300 companies (including IBM and other computer companies) are put into research Study. Such as millimeter wave radar research, automotive radar used for more than 30GHZ The millimeter wave radar, it can reduce the electromagnetic radiation from the antenna beam angle increases Degrees, eliminating the need to reduce the reflection caused by the malfunction and interference; other Surface as the Doppler shift, the relative speed and high precision. Present primarily Used in millimeter wave broadband wireless data communications and guided weapons, but still did not put Off the radar of the inherent defects in poor anti-interference ability to detect small angle range, the steam Car driving in the jitter can not adapt, but also turn out in the road before and after testing by the To turn restrictions.② millimeter wave radar and image sensor combination with image Sensor under the direction of the road, so as to control the transfer of laser or millimeter wave radar Moving direction, laser or millimeter wave radar to follow the car driving Drive rotation. Have Effective solution to the laser or millimeter wave radar inherent part of the defect, the detection sideTo the line, perspective view of the shortcomings of small or even 0, but the image sensors And Lei da Yun station control technology high. ③improvements in algorithmic research Study [18] - [20], if the millimeter wave linear frequency modulation continuous wave (LFM - CM), two-lane Maximum matching hair, Larry detection, high-precision phase detection, narrowband compensation side Method, measured by the second difference method, etc. on the precision and improved anti-interference. Automotive collision avoidance systems are often not only in a technical, but full use of each Kind of technology expertise, the whole system performance greatly improved. An example of ChongqingAfter nearly a decade Chi Technology Co., Ltd. developed the "intelligent vehicle highway Active driving safety warning system ", Information Monitoring on each side of car is the super- Sound ranging principles. In the short-range ultrasonic distance measurement technique is very good, 4 - 5m range of powerful, but the car is moving in from the left and right sides of the information Auto close, so the use of its information gathering before and after image sensor. After nearly Decades of research, the company has been in the software algorithms have great breakthrough, as the U.S. State TI' s digital signal processor development, the company designs and more CPU Processors, so each CPU division of labor. Now, the company has been able to do per second Able to handle 37 images per second, far more than the film image, reaching as Frequency flow requirements, to ensure real-time detection, accuracy.From the twentieth century 80's, famous universities, research institutions And automobile manufacturers to actively research Automotive Collision warning systems, various transportCompanies and insurance companies are very concerned about how to reduce traffic accidents, the original Due to the following points: ① According to statistics, about 120 million people worldwide die each year payThrough accident, car accident not only caused the increase in economic losses, returned to the urban traffic Caused unnecessary congestion through to families in many wounds, so that people's health Living adversely affected, it has increasingly become concerned about social issues; ② Research That, as early as 1 s warning will reduced by 50% ~ 90% of rear-end accident; ③ security has beenThe focus of the automotive market, the survey shows that most users think the most important consideration The problem is that the safety car; ④great market prospects of the system [21]. Through the various existing features of vehicle collision avoidance warning systems, performance Analysis, we found that, ultrasonic, radar, laser has the following inherent flaw: ① in Car side there is more objective, not well identified the most dangerous targets, Lead to false positives; ② roads are not well detected corners dangerous target, subject to public Impact of road railings, also led to false positive and false negative; ③ radar and laser can be measured On the distance of several kilometers, but ineffective in the 200m the following high cost, big problemLittle to do, and they system complexity, bulky, expensive; ④ laser as Perception point of view is almost 0 directive, the weather and robustness;⑤machine vision The collision warning system with high technical requirements and hardware requirements by climate; ⑥ Infrared collision warning system is relatively the best, all-weather use,anti- Interference ability, but the system's technical requirements and hardware requirements are also high; ⑦ interaction Intelligent anti-collision warning system in the type of traffic information on a certain role in promoting, However, to supporting the use of cars widely used and requires a long process. Development of electronic technology will drive the development of collision warning systems. In order to prevent Collision warning system to overcome the shortcomings of each system above,the following aspects should : ① to improve anti-jamming capability, reduce false positives; ②increased visual angle, Improve the monitoring range; ③ enhance stability, reduce false positives, false negative; ④ increase in driving Members and automobile testing, because the collision in the driver's fatigue driving and vehicle Performance also has a relationship; ⑤ increased police decision-making factors, ultrasonic, radar, laser, etc. Alarm factor is the distance of cars and hazards should be considered relative velocity,The relative acceleration, vehicle and weather; ⑥ form of intelligent expert system to improve reporting Police real-time, accuracy, because the different models and different weather safetyDistance and time requirements of different security; ⑦industry standard form, it is imperative Because the product can not do without the successful application of industry standards.Collision Warning System will promote intelligent car, information, and Play a catalytic role on unmanned technology to make our journey in life Safe, comfortable, fast being.1.2中文翻译随着汽车大量增加,路上车流不息,使道路交通事故逐年大幅度增加,造成大量人员伤亡和财产损失。
单片机居家安全报警系统外文文献翻译
单片机居家安全报警系统外文文献翻译(含:英文原文及中文译文)英文原文Design of Home Safety Alarm System Based on Single Chip MicrocomputerAbstractThis design is to study the field of home safety alarm based on single-chip microcomputer, and design a home safety alarm system that is based on STC89C52 single chip microcomputer and is cost-effective and easy to install. The alarm system adopts the communication mode of wireless communication and GSM communication and the modular design concept. It detects different types of risk factors in the home environment through different types of sensor units, and feedbacks the environmental parameters of different rooms to the main control unit. The control unit makes corresponding decisions and issues alarm instructions when necessary to ensure the safety of the home environment. The system is simple and convenient to operate and has a high degree of intelligence. It can detect home risk factors and prevent dangerous accidents.Keywords: home security alarm system; wireless communication; GSM1 Introduction1.1 Hidden dangers and detection in modern home lifeIn the modern home life, people cannot live without convenient living materials such as running water, electricity, and natural gas. However, they bring convenience to us and also increase the unsafe factors in the home life, leaking water pipes, accidental fires, gas leaks, etc. An accident can bring irreparable damage to the family. With the increasing population of the city and the increasing mobility of the population, the crime rate of theft and house robbery has been high for many years. Traditional anti-theft doors and windows have a certain preventive effect, and there are also many security risks. A wide variety of decoration materials, furniture, and decorative items provide us with convenience and beautify the home while alsocontaminating formaldehyde. Therefore, the safety of the home environment has received increasing attention in recent years. How to create a comfortable, healthy and safe home environment has become a hot topic of common concern. In recent years, electronic technology has been changing with each passing day, and communication technology is flourishing. Among them, the development of chip technology and sensor technology is particularly prominent, which provides new options for the solution of home security issues. The use of a home safety alarm device with a microcontroller and a sensor as its core enables the detection of various risk factors in the home, such as gas concentration, formaldehyde content, leakage of water pipes, and theft of rooms, etc. The system can perform remote alarms in a timely manner and notify the user Solve it.1.2 Selected topics and meaningWith the rapid development of science and technology and economic level, people's requirements for the home environment have evolved from the initial satisfaction of simple housing development to the emphasis on the human needs of residential housing. As a result, many safe, comfortable, fast, and convenient smart communities have emerged. where safety is the primary goal. In addition to human factors, the establishment of security systems is an indispensable and important measure for the realization of smart residential security.At present, there are many types of home security products on the market, which can be roughly divided into several relatively independent categories such as anti-theft alarms, video surveillance, and access control systems. Some products have fewer functions, and products with more comprehensive functions have relatively higher prices. Installation is complicated. In other words, there is an urgent need for a product that requires a price to be popular, strong functions, simple installation, easy use, reliable work, and low false alarm rate. Therefore, starting from the actual application, this article systematically elaborates that the use of the system does not need to change the power lines in the home. It has low cost, does not affect aesthetics, wireless communication, and is easy to use. It is suitable for general househo ld use. Home security is closely related to each of us. The use of home security alarm devicescan improve the quality of life of people and make life more secure and convenient. Because of the advantages of the system and the unmatched price/performance ratio of the 51 series microcontrollers, it will be used in future development. Has a broad market prospects and development potential.1.3 Research Status and Development Trends at Home and AbroadIn recent years, with the rapid development of electronic information technology, computer technology, communication technology and sensor technology, there are more and more products related to home security alarms. Domestic and foreign companies such as Siemens, Honeywell, Bosch, Shenzhen Yingmao and many other companies have developed a series of home security alarm products. They generally have wired or wireless communication functions to complete some alarm functions and have carried out Successful application. For example, Siemens' product portfolio includes general-purpose security and security solutions and services, including access control systems, intrusion detection, video surveillance systems, on-site service control centers, and emergency management systems. Thanks to the installation of the Siemens fire and voice evacuation system, the Jinmao Tower and the Grand Hyatt Shanghai, the world's top hotel, provide safe and comfortable working and living environments for thousands of people. It can be foreseen that the smart residential community will become the development trend of the construction industry in the future, and the home security alarm system will become an integral part of the intelligent residential community. In particular, as people's living standards improve, people using home security alarm system equipment will More and more, people's lives will be more comfortable and safer.2 home security alarm system overall design2.1 Overall Design Scheme of Home Security Alarm SystemThe design of this system is a new home security alarm system that integrates single-chip microcomputer control technology, sensor detection technology, and communication technology. The system is based on the single-chip microcomputer and consists of various detection units placed in different rooms and main control units responsible for decision-making. Each detection unit is responsible for detectingvarious conditions of the indoor environment, such as temperature, humidity, formaldehyde content, leaking water, etc., and then sending the collected data to the main control unit through wireless communication, and the main control unit makes a decision and issues a corresponding The instruction controls the operation of the system, thus realizing the automatic detection and automatic alarm of the indoor environment and maintaining the safety of the indoor environment. The hardware of the system consists of eight parts: main control unit, fire detection unit, water leakage detection unit, anti-theft detection unit, gas leak detection unit, formaldehyde content detection unit, wireless communication module, and GSM network communication module. Ensure the normal operation of the system. The circuit of the system is mainly composed of a power supply module, a microcontroller module, a sensor module, a wireless module, a display module, and an alarm module.2.2 main control unitThe main control unit, as the control center of the system, is responsible for receiving the information of each detection unit through the wireless module, processing the information, finding the alarm information to issue a corresponding alarm, and promptly notifying the user for processing. The main control unit can complete tasks such as GSM network SMS alarm, sound and light alarm, LED screen display, and keyboard control. The GSM short message module is used to send and receive short messages so as to monitor home security. A variety of sensors are used to collect home information, and information fusion technology is used to obtain more reliable alarm information. After receiving the alarm information, the owner responded to the SMS to control and handle the situation on the site, so as to ensure home security and theft prevention. The system is simple in structure, easy to install and debug, and easy to use.DetectorThe detector is used to detect various environmental information in the room. The environmental information is sent to the main control unit so that the main control unit can process the information in time according to the information. The sensor is the core component of the detector. According to the detection situation,sensors of different types and different principles constitute different detectors. The detectors involved in the system mainly include the following types:(1) Fire detectorFire detectors are mainly installed in the kitchen. It uses a combination of smoke sensors and temperature and humidity sensors. Smoke sensors mainly include ion smoke sensors and photoelectric smoke sensors. The system uses ion smoke sensors. The ionized smoke sensor contains an internal radiation source 241. The current and voltage of the ionization chamber inside and outside the sensor are stable under normal conditions. When a fire occurs, the ionization chamber ionizes positive and negative ions under the action of an electric field. The two io ns move toward the positive and negative poles, and the internal current and voltage change to generate an alarm signal. The temperature and humidity sensor can convert the temperature and humidity of the environment into analog signals. These analog signals are converted into digital signals that can be processed by the MCU under the action of their own processing chip. In the event of a fire, the temperature and humidity in the room will rise sharply within a short period of time. Comprehensive temperature and humidity conditions can prevent false alarms due to external interference from the smoke sensor.(2) Water leak detectorThe leak detector is mainly installed in the bathroom. Its working principle is mainly to use the conductive characteristics of water. The two probes of the detector are installed slightly higher than the ground, and are respectively connected to an I/O pin and GND pin of the microcontroller. When water leakage occurs, the water level is higher than the height of the probe. The two probes of the detector are turned on, and the level of the I/O pin of the microcontroller is set low to generate an alarm signal.(3) Theft detectorThe anti-theft detector is installed above the window. The detection part is mainly composed of pyroelectric and infrared sensors. When a gangster enters through the window, pyroelectric and infrared laser sensors can generate alarm signalsat the same time. The combination of the two sensors can prevent false alarms caused by small animals or accidents. An important component of a pyroelectric sensor is a piezoelectric ceramic dielectric that maintains its polarization after being poled, known as spontaneous polarization. Spontaneous polarization decreases with increasing temperature and drops to zero at the Curie point. Therefore, when this material is exposed to infrared radiation and the temperature rises, the surface charge will decrease, which corresponds to the release of a part of the charge and is therefore called pyroelectricity. The released charge can be converted to a voltage output via an amplifier, thereby generating an alarm signal. When radiation continues to act on the pyroelectric element to balance its surface charge, it no longer releases charge. Therefore, pyroelectric sensors cannot detect constant infrared radiation. The infrared detector employs a photoelectric switch. The photoelectric switch (photoelectric sensor) is an abbreviation of the photoelectric proximity switch. It uses the object to block or reflect the light beam and strobes the circuit by a synchronous circuit to detect the presence or absence of an object. The photoelectric switch converts the input current into an optical signal on the transmitter, and the receiver then detects the target object according to the received light intensity or presence or absence.(4) Gas leak detectorThe gas is mainly composed of hydrogen, methane, carbon monoxide, and ethylene, and the natural gas is mainly composed of methane, ethane, propane, and other components. It can be seen that in both gases, methane is an important component of them. By detecting the methane content, it can be determined whether gas or natural gas leaks occur. The methane sensor converts the information related to the methane concentration into analog signals. These analog signals can be converted into digital signals by the A/D chip and sent to the microcontroller. The microcontroller can obtain the indoor methane content according to the size of the digital data. Calculate the concentration of gas and natural gas so that detection and alarm can be achieved.(5) Formaldehyde detectorFormaldehyde is generally considered to be the number one killer of the indoorenvironment. Its release period is generally 3-15 years, and its harm is very serious for the human body, especially infants, pregnant women, the elderly and chronic patients. Formaldehyde mainly exists on the floor, decoration plates, furniture, carpets, paints, and glue. People can easily overlook its existence, but it can cause serious damage to people's health. The formaldehyde sensor uses the electrochemical formaldehyde gas sensor HCHO produced by Dart Sensor. This sensor is developed based on a breath alcohol sensor and is suitable for monitoring in most environments (-20°C~+50°C) (for special applications, it can be used at higher temperatures). This sensor is simple in design, with few components and its cost is reduced. It does not require power supply excitation. It only requires power during signal processing and display, so it is only a simple small battery cell.communication deviceThis system mainly adopts wireless communication methods, which avoids complicated laying of lines and is both beautiful and convenient. The main control unit and each subunit communicate with the wireless module 24L01. The effective range is 60 meters, which fully meets the needs of home use. The communication between the main control unit and the user adopts the GSM (mobile phone network) method. The alarm system can send the information in the home to the user as a short message. The user can also control the running of the home system by sending an SMS.Home Security Alarm System Functions and Working PrinciplesThe main control unit of the system can be placed in the living room, and the detection unit can be installed in different rooms of the house. For example, the fire detection unit is installed in the kitchen, the leak detection unit may be installed in the toilet, the anti-theft alarm detection unit is installed above the door and window, the gas leak detection unit is installed in the kitchen, and the formaldehyde content detection unit is placed in the living room or the bedroom. The detection unit placed in different locations sends information to the main control unit in real time through the wireless device. Once a fire, leaking water pipe, burglary, or gas leak occurs, the main control unit will immediately receive an alarm signal. Then the main control unitThe unit will judge and process the alarm signal, get the alarm type, make an audible and visual alarm, and notify the user through the GSM network. The home security alarm system has six main functions: Mobile phone network intelligent alarm. When an unexpected situation in the home is detected, an alarm is sent through a text message. It can monitor the concentration of gas or natural gas in the home, discover gas leaks, and promptly report an alarm. Anti-theft function, when a thief enters, immediately makes an alarm, and promptly informs the police and the household head; Intelligent fire alarm, immediately when the fire occurs in the home, to alarm, to reduce the loss of property; Intelligent waterproof detection function, found a leak in the home, timely closure of the main valve, And notify the owner by SMS to avoid the loss; The system can be controlled by the remote controller, which is easy to use and easy to operate.3 Hardware Design of Home Security Alarm System3.1 Design of the main control unitThe main controller consists of power supply, GSM communication module, wireless communication module, display device, button, and remote controller. The structure is shown in the figure.Figure 3 main control unit system diagram Power section uses the AC220/DC5V power supply module, after the power supply voltage transformer voltage regulator, and finally get a stable 5V voltage to the microcontroller and other electrical equipment. The display device uses 12864 liquid crystal, 12864 is the abbreviation of dot matrix number of 128*64 dot matrix LCD module, 12864 LCD with Chinese font library can display 4 rows and 8 columns of 32 characters with 16 16 dot matrix, each The display RAM can display 1 Chinese character or 2 16×8 lattice full height ASCII code characters, that is, each display can display up to 32 Chinese characters or 64 ASCII characters. The display of indoor and outdoor temperature, humidity, light intensity, and system working status is realized through the liquid crystal, so that people can understand the working status of the system in real time. The basic circuit for displaying the liquid crystal is shown in Figure 4. Figure 4 LCD connection circuit diagram The GSM mobile network communication module is selected from theSiemens TC35 module, which is a dual-band 900/1800MHz highly integrated GSM module, it is easy to integrate, cost-effective, good product quality and performance The system guarantees that the system communicates with the user's mobile phone via SMS, which is convenient and quick. The GSM module can transmit voice and data signals and connect the SIM card reader and antenna respectively through the interface connector and antenna connector. The automatic baud rate is 1.2kb/s~115kb/s. It supports Short Message Service (SMS) in Text and PDU formats, and can send text messages and make phone calls. The module expansion circuit is shown in Figure 5, and the features are described below. Information transmission content: V oice and data power: Single power supply 3.3V ~ 5.5V Frequency band: Dual-band GSM900MHz and DCS1800MHz (Phase 2+) Transmitting power: 2W (GSM900MHz Class 4) 1W (DCS1800MHz Class 1) 8SIM Card Connection: External Antenna: External antenna connected by antenna connector Talk mode: 300mA (Typ.) Figure 5 TC35 peripheral expansion circuit diagram The wireless communication device uses the 24L01 wireless module, and the maximum operating speed is 2Mbps. It is highly efficient GFSK modulation and has strong anti-interference ability. Up to 126 available channels to meet the needs of multi-point communication and frequency hopping communication, built-in hardware CRC error detection and point-to-multipoint communication address control; Low power consumption 1. 9 - 3. 6V operation, 22uA in standby mode Under power-down mode is 900nA; Built-in 2. 4Ghz antenna, small and exquisite; The module can be set by software address, can be directly used by various microcontrollers, software programming is very convenient. When connecting with P0 port of 51 series single-chip microcomputer, it needs to add 10K pull-up resistor and it is not necessary to connect with other ports. For other series of microcontrollers, if it is 5V, please refer to the output current of the IO of this series of microcontrollers. If it exceeds 10mA, series resistor divider is required. If it is 3. 3V, it can be directly connected to the IO line of the RF2401 module. For example, if A VR series microcontrollers are 5V, they are generally connected in series with 2K resistors. The keypad is used to set the basic parameters of the main control unit. It can also set the parameters through theSAA3010T remote control. The remote control receiver uses HS0038. The connection circuit with the microcontroller is shown in Figure 6. Figure 6 Infrared remote control receiver circuit we use the receiver head, its drive circuit is simple, easy to control the microcontroller. Its operation method is the same as that of an ordinary TV remote controller, and the operation is simple and easy to use.3.2 Design of fire detection unitThe fire alarm unit is composed of a smoke sensor and a temperature and humidity sensor. The increase of the temperature and humidity sensor can enhance the reliability of the alarm and reduce the occurrence of false alarms. The composition of the fire alarm unit is shown in Figure 8. Fig. 8 System diagram of fire detection unit The smoke sensor converts the collected smoke concentration into an analog signal. After the A/D chip, the analog signal is converted into a digital signal and sent to the microcontroller. Temperature and humidity sensor The DH11 can send temperature and humidity in digital form to the microcontroller, so the signal does not have to be processed. The MCU sends the received information to the master control unit through the wireless communication module 24L01. The type of smoke sensor used in the system is MQ-2. The gas sensitive material used by MQ-2 is tin dioxide (SnO2) with low conductivity in clean air, and its sensitivity to smoke is very high.3.3 Design of leak detection unitThe unit's design mainly utilizes the conductive properties of water. There are two detection probes connected to the microcontroller, which are connected to the I/O pin and the GND pin of the microcontroller. When in use, put the two probes above the bathroom floor. When there is water leakage, the toilet will produce water. The two probes of the detector are connected to the stagnant water. The preset high-level I/O pins are set low. , Generate an alarm signal, the microcontroller then sends the alarm signal to the main control unit through the wireless communication module, thus completing the entire alarm process. The specific structure of the alarm unit is shown in Figure 11.3.4 Design of Gas Leak Detection UnitThe gas leak detection unit is mainly composed of a methane content displayliquid crystal, a methane sensor, a wireless communication module, and a buzzer alarm. The structure is shown in FIG. Figure 12 shows the gas leakage detection unit system. Among them, the liquid crystal display is a 5110 liquid crystal display. Its features are: Cost-effective, LCD1602 can display 32 characters, and Nokia5110 can display 15 Chinese characters, 30 characters, Nokia5110 bare screen only 8. 8 yuan, LCD1602 generally about 15 yuan, LCD12864 generally 50 to 70 yuan; interface is simple, only four I / O lines can drive, LCD1602 need 11 I / O lines, LCD12864 need 12 root. The speed is 20 times that of the LCD12864 and 40 times that of the LCD1602. The model selected for the methane sensor is GJ4. Its output is analog and needs to be sent to the microcontroller via A/D conversion. Its use is similar to the smoke sensor.3.5 Design of formaldehyde monitoring unitFormaldehyde detection unit is mainly composed of formaldehyde sensor, operational amplifier, wireless communication module and sound and light alarm. The formaldehyde sensor converts the formaldehyde concentration into electrical signals. The signal is processed by the operational amplifier and then input to the single-chip microcomputer. The single-chip microcomputer judges the signal and sends the formaldehyde content signal to the main control unit through the wireless communication module. The sensor contains a conventional two-electrode fuel cell sensor. The working electrode discharges electrons to the counter electrode through an external circuit and is consumed at the counting electrode end with the reduction of oxygen. The internal circuit is realized by the ion current in the electrolyte. Well-designed to facilitate the growth of electrolyte. The rise and fall of the electrolyte varies with the changes in ambient temperature and humidity, but the normal operation will not affect the calibration value. The specific circuit shown in Figure.3.6 Design of anti-theft alarm unitThe anti-theft alarm unit is a double detector consisting of a pyroelectric sensor and an infrared sensor. Compared with conventional pyroelectric or infrared single sensor systems, Shuangjian detectors have significantly reduced their false alarm rates.When the Shuangjian detector works, the two signals of the pyroelectric sensor and the infrared sensor are processed by the NAND gate and sent to the SCM. When only two sensors respond at the same time, the detector sends an alarm signal to the microcontroller, otherwise no alarm signal is generated. In addition, when designing, Fresnel lens is added to the pyroelectric sensor, and the principle diagram of false alarms that can reduce the external interference signal by changing the lens division method is shown in Fig.16. Fig. 16 System diagram of the anti-theft alarm unit When the double-detection detector works, the pyroelectric sensor and the infrared sensor signal are sent to the single-chip microcomputer after being processed by a NAND gate. When only two sensors respond at the same time, the detector sends an alarm signal to the microcontroller, otherwise no alarm signal is generated. In addition, Fresnel lens is added to the pyroelectric sensor during design. By changing the lens segmentation mode, false alarms due to external interference signals can be reduced. 3.7 Design of Communication SectionThe communication part of this system is mainly composed of GSM mobile network communication module and 24L01 wireless communication module. The GSM module communicates with the user's mobile phone through the mobile phone network of the mobile phone, and the user can understand the security situation at home at any time. Each detection unit communicates with the main control unit through the wireless communication module and feeds back the detected information to the main control unit in time. System Communication Structure Diagram The GSM mobile network communication module uses the TC35 module. Its main features are wide coverage, low cost, reliable quality, and high security. It inherits the standard A T instruction set and RS232 interface standard internally, which makes it easie r for the microcontroller system to control it. It reduces the design of external circuits and simplifies the programming of the program. The hardware circuit is not complicated, but there are many modules used, which increases the complexity of programming and the difficulty of debugging. Therefore, it is necessary to debug each module individually after being debugged by the single chip microcomputer. Communication module application circuit diagram SIM CARD is a mobile communication networkuser identification module. SIM CARD contains the user's user information and is an indispensable tool for communication with mobile phones. There are 6 pins corresponding to each other on the SIM card and the card holder. This is the interface between SIM CARD and TC35. The wireless communication part adopts 24L01 wireless communication module, which has built-in 2. 4Ghz antenna, small size, software address, software programming is very convenient, built-in special voltage regulator circuit, using a variety of power supply including DC/DC switching power supply are very good The communication effect, when connected to the P0 port of the 51 series single-chip microcomputer, requires a pull-up resistor of 10K, and it is not necessary to connect to other ports. The user can set the alarm phone number, alarm mode, work mode, etc. through the keypad. Through the liquid crystal display, you can clearly understand the operating conditions of the system and the environmental parameters in your home, such as temperature, humidity, gas concentration, formaldehyde concentration, leaks, and communication conditions.中文译文基于单片机的居家安全报警系统的设计摘要本设计是对基于单片机的居家安全报警领域进行研究,设计出以STC89C52 单片机为核心的高性价比,易于安装的居家安全报警系统。
汽车防盗报警器中外文翻译
汽车防盗报警器中外文翻译XXX: Car Anti-theft Alarm SystemCurrently。
XXX 60 n cars are sold worldwide every year。
with a total of over 400 n in use。
As the number of vehicles increases。
so do the number of traffic accidents and car thefts。
resulting in personal injury and economic loss。
People have XXX has XXX issue。
In order to ce car accidents and give car owners a sense of security。
it is of great XXX a safety system that is easy to operate。
automatically detects the safety status of each part of the car。
and alerts the driver with an alarm in case of XXX.Cars are of high value。
and with the increasing number of cars。
they have e the primary target of XXX。
us anti-XXX。
thieves can easily open the doors and drive away the car with a XXX。
the problem of car theft has not been XXX。
there are several ways to prevent car theft:1.Mechanical anti-theft: XXX is to lock a certain part of the car with a lock。
外文翻译--基于51单片机温度报警器的设计(适用于毕业论文外文翻译+中英文对照)
外文翻译--基于51单片机温度报警器的设计(适用于毕业论文外文翻译+中英文对照)XXX: Design of a Temperature Alarm Based on 51 MCUDepartment: n EngineeringMajor: Measurement and Control Technology and nClass:Student ID:Name:Supervisor:Date:A microcontroller。
also known as a single-chip computer system。
XXX its ns being integrated on a small chip。
it has most of the components needed for a complete computer system。
such as CPU。
memory。
internal and external bus systems。
and mostof them also have external storage。
At the same time。
it integrates XXX interfaces。
timers。
real-time clocks。
etc。
The most XXX integrate sound。
image。
ork。
and complex input-output systems on a single chip.XXX used in the industrial control field。
Microcontrollers XXX CPUs inside the chip。
The original design concept was to integrate a large number of peripheral devices and CPUs on a chip to make the computer system XXX's Z80 was the first processor designed according to this concept。
基于单片机的汽车防盗报警系统设计论文-毕业论文
4.根据按键的功能确定,设计按键功能子函数。
1
本次设计的核心中枢控制系统是单片机,单片机是整个设计最重要的部分,所有的功能实现都是通过单片机的内部资源和外设资源以及单片机的IO引脚来实现。那么什么是单片机呢?简要的介绍一下单片机的系统,单片机如下图1.1所示。
可以清楚地观察到单片机就是一个引出多个金属引脚的黑色芯片,在其内部排列着数以万计的硅晶体,这些硅晶体管的有序排列实现各种与非门的逻辑控制,我们把各个不同的逻辑控制叫做芯片的外设,通过陶瓷或者工程塑料将这些硅晶体管封装起来[4],同时将各个外设资源的功能引脚保留在封装之外,这就是看到的白色引脚,即单片机的管脚。引脚分为普通的IO引脚和外设的功能引脚,对于单片机本身来说,我们通过编程控制的就是单片机的引脚功能。有些特殊的引脚[5],在单片机的内部有固定的的设置空间,通过编程按照单片机的规则进行设置,最终实现其所拥有的功能。对于普通的IO管脚,系统进行输入与输出控制,结合外围的器件实现各种不同的功能要求[6]。
1
本设计中,通过检测锁车键是否锁定,没有锁定属于正常使用状态,不会进行报警,锁定后,通过检测轻触按键是否有动作,当检测到有信号时,说明有人准备偷车,通过GSM短信模块发送短信给车主,同时蜂鸣器进行鸣响报警。
本设计硬件研究内容:
1.研究核心控制芯片STC89C52单片机及其最小系统。
2.研究GSM短息模块,设计硬件控制电路。
本科毕业设计(论文)
题 目: 基于单片机的汽车防盗报警系统
基于单片机的多功能汽车防盗系统-本科毕业设计论文论文
本科毕业设计论文题目基于单片机的多功能汽车防盗系统Based on Single-chip Microcomputer multi-function car alarm专业名称学生姓名指导教师毕业时间毕业 任务书一、题目基于单片机的多功能汽车防盗系统二、指导思想和目的要求汽车是目前人类主要的交通工具,也是现代文明的标志。
在用的车辆越多,但随之而来的交通事故和被盗的汽车也越来越多,造成了人员伤亡及经济财产的损失。
人们对机动车辆的使用性能和防盗性能提出了更高的要求。
汽车安全成为一个重要的社会问题。
为了减少汽车事故的发生率,给拥有汽车的用户提供安全感,研制一种简单可靠、操作方便,能自动检测汽车各部分状况,发现不正常情况能给驾驶员发出报警提醒和防盗警报的安全系统,具有实际的设计意义。
三、主要技术指标发动机温度监测:测量范围为 -55 ℃ ~+ 125 ℃ ; 在 -10~+ 85°C 范围内,精度为 ± 0.5°C 。
轮胎压力监测:压力探测精度±0.017Bar 工作压力范围0 - 4.5Bar 。
无线报警 :工作频率433MHz 发送距离0-2km四、进度和要求第1-2周:查阅参考文献和相关资料。
通过反复阅读,弄清研究对象的基本原理。
第3-4周:完成论文的前言及第一章总体结构的设计。
第5-6周:构建论文硬件部分的主体结构,选择适合本文的中央处理器,了解处理器的主要指标。
第7-8周:完成系统电源,遥控等模块的设计,并构建传感器系统。
第9-10周:搜集各种传感器的资料,完成整个传感器系统。
第11-12周:完成报警电路的设计。
设计论文第13-14周:完成整个系统及几个重要模块的流程图设计并一同完成结束语致谢等论文最后部分。
第15-16周:完成论文的修改工作,确定终稿。
打印装订,准备论文答辩五、主要参考书及参考资料1.刘法治,郑竹林. GSM技术在机动车辆报警系统中的应用[J].电气应用, 20052.刘法治,赵明富,宁鹏达.基于单片机的汽车多功能报警系统设计[J].自动化仪表,20053.郑泉,曹成茂.汽车轮胎欠压报警器[J].安徽科技,19994.丁园园,赵维琴.基于MCS—51单片机的自动报警系统[J].仪表技术,20015.李朝青.单片机原理及接口技术[M].北京:北京航空航天大学出版社,19996.池保忠. 基于单片机的汽车防盗报警系统设计. 科教文汇,20067.郭梯云,李建东等. 移动通信(第四版). 西安: 西安电子科技大学出版社, 20068.徐凡.基于GSM 的汽车定位防盗系统研究[D]。
汽车防盗报警器外文文献翻译中英文
外文文献翻译(含:英文原文及中文译文)译文字数:3297字文献出处:SF Marseken. Automobile burglar alarm[J] Betascript Publishing, 2016,vol.1,no.3:10-21英文原文Automobile burglar alarmSF MarsekenThe automobile is the present humanity's main transportation vehicle, is also the modern civilization symbol. The world the automobile sales volume reaches more than 6000 ten thousand every year, the inventory has surpassed 400,000,000. Is using the vehicles are more, but the following traffic accident and the automobile which robbed are been also getting more and more, has created the personnel casualty and the economical property loss. The people set a higher request to motor vehicle's operational performance and the security performance. The auto safety becomes an important social question. In order to reduce motor vehicle accident's formation rate, for has automobile's user to provide the security sense, develops one kind simply reliable, the ease of operation, can automatic detection automobile various part of conditions, discover that the normal condition can send out the warning reminder and thesecurity warning safety system to the pilot, has the actual design significance.The car alarm is a device that is installed in the car to increase the difficulty of car theft and prolong the period of car theft. With the advancement of science and technology, in order to deal with the escalating methods of car theft, people have developed anti-theft devices of various methods and structures from generation to generation. Currently, anti-theft devices can be divided into three categories according to their structure: mechanical, electronic and Network type. Hook locks, steering wheel locks and shift locks are basically mechanical anti-theft devices. They mainly rely on locking clutches, brakes, throttles, or steering wheels and shift gears to achieve the purpose of anti-theft. However, only anti-theft alarms are not provided.Insert-type, button-type and remote control are all electronic anti-theft devices. It mainly aims to prevent theft by locking the ignition or starting. It also has anti-theft and sound alarm functions.GPS satellite positioning car alarm system is a network-based anti-theft device, it is mainly to lock the ignition or start to achieve the purpose of theft, but also through the GPS satellite positioning system (or other network system), the alarm information and alarm vehicle location Silently transmitted to the alarm center.Characteristics of remote-controlled car alarms Remote-controlledcar alarms are developed with the advancement of electronic technology and are the most widely popularized in the market. It is characterized by remote control of the entire function of the alarm, reliable and convenient, with vibration detection, gate protection and microwave or infrared probes and other functions. As the demand for anti-theft devices in the market continues to increase, remote control car alarms have also added many convenient functions, such as remote control central locks, remote air heaters, remote control electric doors and windows, and remote control of open luggage compartments.The value of automobiles is very high. As the number of automobiles continues to increase, automobiles have become the target of thefts by theft victims. Theft of automobiles has also become a major concern in today's society and is an urgent problem to be solved. At present, a variety of car anti-theft methods and products are constantly being updated. Although anti-theft mechanical locks have been installed on the doors and vehicle engines, the robbers can use the master key to open the doors without driving the car. Therefore, the car theft prevention problem is still not completely resolved. Today's car theft in society has the following ways:First, mechanical security, the main principle is to use a lock to lock a part of the car, so that it can not play its due role. There are several kinds of theft prevention methods as follows: transmission gear locks,steering wheel locks, brake pedal locks, and clutch pedal locks. The corresponding trouble is that mechanical locks are large in size, and the owner must carry a key with him at the same time. And there are many ways to crack it. Since the core is a lock in the end, it is hard to stop at the door. It is even more difficult to avoid large-scale car thefts such as hydraulic shears; losing the keys if they are not careful, etc. is also one of the possibilities for car theft.The second is electronic security. This is the most commonly used anti-theft measure in the current automotive market. When the anti-theft system is activated, the ignition coil and the fuel supply circuit can be cut off. Only when the unlocking key is under control can the alarm be released. There are a wide variety of such anti-theft products. Most domestic and foreign cars have been equipped with a key chip anti-piracy system when they leave the factory. This is to use the chip's transmitting radio in the key to connect with the ECU of the car and start the car engine. In addition to the sound and light alarm system, a light emitting diode (LED) is installed on the dashboard of the car to allow the owner to know the working status of the system, and it can also exert mental pressure on the car thieves in the car. When the car vibrates due to an external force or the door, back cover, and front cover are forcibly opened, the system will sound an alarm to deter car thief. There is also a two-way alarm system, which is more than the general light and sound alarmsystem can notify the owner of the function, when the car is affected by the outside world, people in the vicinity of the owner can be through the car with a LCD key to know the car Current state.The third is a network type anti-theft system, which mainly relies on social public networks to monitor the movement of vehicles. There are two kinds. One is the GPS satellite positioning anti-theft system. This system uses GPS satellite positioning to determine the vehicle position, and then transmits the position and alarm information to the alarm center through the GSM network. The alarm center controls the power off and fuel off of the car through the GSM network. The disadvantage of this kind of system is that the price is relatively high; moreover, it needs to pay for the service frequently; the power of the system is also relatively large; privacy will be affected; if the vehicle is left unused for a long time, the level of electricity will be lost. And cars parked underground, under big trees, building rafts, and indoor systems would not work. 2 is GSM, GPRS mobile anti-theft device, GSM mobile anti-theft device relies on GSM communication network, intelligent anti-theft linkage of mobile phones and cars, it has anti-theft, monitoring, remote control, remote alarm, positioning and anti-robbery and other functions. A very effective means of safeguarding public security and protecting the interests of car owners. Compared with similar products, the system also has multiple features such as concealed installation, advanced technology and reliableperformance. It has the advantage of not having to build base stations and the alarm is not limited by distance. The disadvantage is that it requires monthly fees for GSM numbers because it depends on the coverage of the GSN network. The thieves' method is also to use the jammer of the mobile phone signal, cut off the connection between the vehicle and the alarm center, and make the anti-theft system invalid.The fourth is the biometric anti-theft system, which uses the human body feature as the only unlocking key to lock the car engine into theft protection mode. Specific products include the owner's fingerprint activation controller and vein scan controller. It takes advantage of the sufficient information carried by human fingerprints and the feature that each person's fingerprint coincidence rate is almost zero. The owner's fingerprint information is stored in the memory of the system in advance, and the car can be started after verifying the identity through the fingerprint comparison, even if the car theft. Thieves who steal all the car keys will be helpless. However, its disadvantage is that it takes more than 2 seconds for the fingerprint to be compared before starting the car. If the thief cannot get your fingerprints, he will not be able to steal your car. However, in fact, the thieves steal the keys of the owner may not be able to crack all the anti-theft measures. When the biometric anti-theft, only the fingerprint car alarm can protect your car in the true sense.At present, GPS satellite positioning systems on the market arealready the most advanced anti-theft devices at home and abroad. The GPS system has vehicle positioning, anti-robbery alarm, network security, remote control to make it turn off, vehicle interior monitoring, rescue after anchoring, traffic information inquiry, electronic Dog navigation has been a lot of features such as vehicle information query. The GPS satellite positioning system is a network-based anti-theft device. It mainly relies on locking the ignition and starting to achieve the purpose of theft prevention. At the same time, the GPS satellite positioning system can transmit the alarm information to the alarm center along with the location of the alarm vehicle. However, experts also reminded that the name of this anti-theft technology sounds very loud, although there is a certain anti-theft effect, but it is not very practical to use, and the price is expensive, the actual effect is not great, satellite tracking anti-theft is mainly a return on automotive equipment The location of the vehicle is displayed via a satellite screen. Therefore, according to the installation of a tracking system in a stolen vehicle, the transmission system is destroyed, that is, the power supply is cut off, making it impossible for the satellite to track the position of the vehicle and lose the anti-theft effect. Such a system is very expensive. It costs 6000-7000 yuan to install a GPS without a display screen. It also pays a service fee of nearly a thousand yuan each year to a GPS system service company. Expensive purchase fees and usage fees make many owners discouraged. Economic efficiencyis not optimistic. Electrical alarm came into being. The electronic alarm system is based on the original central door lock, and an anti-piracy system control circuit has been added to control the movement of the car. At the same time, the electronic alarm is also an ideal alarm device. If there is a theft intention of theft, the anti-theft system will not only cut off the start circuit, ignition circuit, oil circuit, fuel circuit and transmission circuit, brake lock function, but also send a different sound and light distress signal to alarm , to mentally attack car theft to stop the car theft process.Since the world's first T-type Ford sedan was stolen, car-trafficking has become one of the most common crimes in big cities. The number of cars has increased, and the number of stolen vehicles has also increased year by year. As a result, social unrest has become larger and larger. They are worried that their cars are stolen. With the popularity of convertible cars, the lock on the car door is no longer the most solid. The concept of car door locks has gradually faded, and as a result, the car anti-theft system has emerged. The types of electronic anti-theft systems currently on the market are very large, and can be purchased for 300-400 yuan. Most of the new cars on the market today are equipped with original factory-built anti-theft devices. Some vehicles have anti-theft chips on their keys. They can randomly change their unlocking codes so that thieves cannot unlock them through high-tech methods, and such keys arelost. Only with the registration of vehicle users to the original manufacturer and a set of car keys. According to the latest automotive technical data, some vehicles have begun to replace the key with an invisible IC card. If the vehicle owner is within 3-5 meters of the vehicle, the car alarm will be automatically released. When the owner sits in the car, the ignition switch is pressed. The vehicle will start. The owner will automatically lock the door 5 meters away from the car. The anti-theft system will not be foolproof. Many cars nowadays have installed a computer anti-theft system for vehicles before they enter the market. When the data of the key chip and the data saved on the on-board computer are in agreement, the computer starts to work on the relevant system and allows the engine to start. Cars with on-board computer systems no longer need to install electronic anti-theft devices. If it is repeatedly installed, it may easily conflict with the originally installed computer anti-theft system; if it is necessary to install an electronic anti-theft device again, it is necessary to pay attention to separation from the ignition system, or it will make the engine unable to start and a series of other failures. If there is a failure, the owner cannot dismantle it himself. Use a professional device to clear the fault code and contact failure in a professional service shop.中文译文汽车防盗报警器SF Marseken目前汽车是人类最为主要的交通工具, 也是现代文明的标志。
基于单片机的外文翻译、中英文翻译
英文原文DescriptionThe at89s52 is a low-power, high-performance CMOS 8-bit microcomputer with 4K bytes of Flash Programmable and Erasable Read Only Memory (PEROM) and 128 bytes RAM. The device is manufactured using Atmel’s high density nonvolatile memory technology and is compatible with the industry standard MCS-51™ instruction set and pinout. The chip combines a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel at89s52 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications.Features:• Compatible with MCS-51™ Products• 4K Bytes of In-System Reprogrammable Flash Memory• Endurance: 1,000 Write/Erase Cycles• Fully Static Operation: 0 Hz to 24 MHz• Three-Level Program Memory Lock• 128 x 8-Bit Internal RAM• 32 Programmable I/O Lines• Two 16-Bit Timer/Counters• Six Interrupt Sources• Programmable Serial Channel• Low Power Idle and Power Down ModesThe at89s52 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, a five vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator and clock circuitry. In addition, the at89s52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power Down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. Pin Description:VCC Supply voltage.GND Ground.Port 0Port 0 is an 8-bit open drain bidirectional I/O port. As an output port each pin can sink eight TTL inputs. When is are written to port 0 pins, the pins can be used as high impedance inputs.Port 0 may also be configured to be the multiplexed loworder address/data bus during accesses to external program and data memory. In this mode P0 has internal pullups.Port 0 also receives the code bytes during Flash programming, and outputs theduring accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming.In normal operation ALE is emitted at a constant rate of 1/6 the oscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSENProgram Store Enable is the read strobe to external program memory.When the at89s52 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA/VPPExternal Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset.EA should be strapped to VCC for internal program executions.This pin also receives the 12-volt programming enable voltage(VPP) during Flash programming, for parts that require 12-volt VPP.XTAL1Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2Output from the inverting oscillator amplifier.Oscillator CharacteristicsXTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1 is driven as shown in Figure 2. There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through adivide-by-two flip-flop, but minimum and maximum voltage high and low time specifications must be observed.Idle ModeIn idle mode, the CPU puts itself to sleep while all the onchip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset.It should be noted that when idle is terminated by a hard ware reset, the device normally resumes program execution, from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access toport pin or to external memory.RDY/BSY output signal. P3.4 is pulled low after ALE goes high during programming to indicate BUSY. P3.4 is pulled high again when programming is done to indicate READY.Program Verify: If lock bits LB1 and LB2 have not been programmed, the programmed code data can be read back via the address and data lines for verification. The lock bits cannot be verified directly. Verification of the lock bits is achieved by observing that their features are enabled.Chip Erase: T he entire Flash Programmable and Erasable Read Only Memory array is erased electrically by using the proper combination of control signals and by holding ALE/PROG low for 10 ms. The code array is written with all “1”s. The chip erase operation must be executed before the code memory can be re-programmed.Reading the Signature Bytes: The signature bytes are read by the same procedure as a normal verification of locations 030H, 031H, and 032H, except thatP3.6 and P3.7 must be pulled to a logic low. The values returned are as follows.(030H) = 1EH indicates manufactured by Atmel(031H) = 51H indicates 89C51(032H) = FFH indicates 12V programming(032H) = 05H indicates 5V programmingProgramming InterfaceEvery code byte in the Flash array can be written and the entire array can be erased by using the appropriate combination of control signals. The write operation cycle is selftimed and once initiated, will automatically time itself to completion.中文翻译描述at89s52是美国ATMEL公司生产的低电压,高性能CMOS8位单片机,片内含4Kbytes的快速可擦写的只读程序存储器(PEROM)和128 bytes 的随机存取数据存储器(RAM),器件采用ATMEL公司的高密度、非易失性存储技术生产,兼容标准MCS-51产品指令系统,片内置通用8位中央处理器(CPU)和flish存储单元,功能强大at89s52单片机可为您提供许多高性价比的应用场合,可灵活应用于各种控制领域。
精品中英文外文翻译基于单片机的汽车防盗报警系统设计定
Based on monolithic integrated circuit automobile security alarmsystem designAbstract:Decodes the automobile security system using them on litchis integrated circuit interior resources realization jump code, it each time uses the remote control password all is changing, both enhanced the system security, and greatly reduced the cost.Keyword: Monolithic integrated circuit, Automobile security system , Code/decodeIntroductionIs unceasingly progressive along with the social economy and the high tech rapid development, in the routine work and the life, the automobile has become the people ideal transportation vehicle. But the following motor vehicle the case which robbed gradually is also in creased has created the pilot economical property loss. In order tore duce the automobile to rob the event the formation rate, for has the automobile the user to provide the safety control, simply develops one kind to be reliable, the ease of operation, can send out in the discovery normal condition to the pilot reports to the police the reminder and the security warning safety system has the practical significance. This article based on to the existing automobile security alarm system generalized analysis, develops one kind of brand-new security alarm system. This system has mainly used the jump code code/decoding principle, causes the overall system to be safer, greatly reduces password explaining rate.1. System principle of workThe automobile security alarm system the remote control which carries by the driver and installs in the automobile the controller two parts composes. The remote control and the controller all use eight CMOS which American AT-MEL Corporation produces the A VR monolithic integrated circuit, this series monolithic integrated circuit based on new simplifies instruction R the ISC structure, includes the service life most to be few is 1,000 time writes/scratches the circulation the Flash program memory, as well as the service life at least is 100,000time writes/scratches the circulation E the EPROM data-carrier storage, some 2 only have when the entire piececleaning can clean the programming encryption locks the localization.1.1 System designThe automobile security examination uses the ultrasonic sensor. The ultrasonic sensor is composed by the ultrasonic wave transmission circuit and the supersonic reception electric circuit, in the automobile cab appropriate position, installs the ultrasonic wave launch/receiver, as well as switch electric circuit T1. When the automobile parks the vehicle owner person must leave the automobile, with remote control closed switch T1, the automobile alarm system sat garrisons the condition, around the system use ultrasonic wave examination vehicle obstacle. Launches the partial electric circuits likes chart 1 to show. When its P1 mouth P1.1, P1.2 to the D trig , the P1.0 control ultrasonic wave launch, are 0, the photo electricity coupler outputs the TP1 end is 1, the permission ultrasonic wave launch, launches/the receive ultrasonic wave in turn, the circulation repeatedly carries on. Simultaneously the monolithic integrated circuit interior counter starts to count. The steam distance between vehicles obstacle distance is the time which sends out through the sound navigation and ranging reflects spends determines and carries on the computation. The reflection signal causes the D trigger to produce interrupt request signal INT1,simultaneously stops counting, reads takes counts the value, calculates the actual distance after the formula, then carries on the comparison with the datum distance, if examines when the actual distance is bigger than reference value 80cm, does not carry on the accustom-optics to report to the police; If some people approach the automobile to enter the cab, the examination actual distance is smaller than or was equal to when reference value 80cm, through monolithic integrated circuit P2.2 and the P2.3 port, actuates the indicating lamp display circuit and the sound alarm circuit, sends out three two flash. And triggers a high level, the actuation is wire less signal transmission circuit.Chart 1 Ultrasonic wave transmission circuit1.2 Code/decoding principleThe present automobile remote control security system are many isusesVD5026/27, PT2262/72, HT12E/D and so on the general code/decodes the electric circuit, its password decided by the component address, each set of security systems use a fixed invariable password. Along with the micro processing technology development, through the receiver emote control transmitting message, may intercept this fixed password, moreover general arranges the decoding address to lose the person to carry the component size limit, its quantity is impossible too much, can obtain not repeatedly codes very is also limited, also can very quickly explain the password with the automatic scanner. Therefore, this kind of password fixed invariable automobile security system has received the serious threat. Decodes the automobile security system using the monolithic integrated circuit interior resources realization jump code, it each time uses the remote control password all is changing, with the password no longer duplicates uses, causes the interception password also is makes a futile effort, in addition, it may increase the enough many passwords figure, enhances the system resistance illegal scanning the ability. The remote control coding altogether has 12 bytes, separately by 3 bytes codes channels code, 3 bytes codes forewords number, 5 bytes jumps codes, 1 byte pressed key operation code is composed. Encoded front adds on logic in each byte 0 to take the outset position, encoded behind adds on a logical 1 achievement in each byte to stop the position, and in most front adds on several logic 1 to take the guidance signal, this constituted the serial coded signal which uses in to transmit. The code channel code uses in to express the remote control status; each set of systems use a fixed channel code. The code foreword number uses in to record the encoded order, its starting value is 0, the monolithic integrated circuit every time codes a time, the code foreword number upwardly counts time. The code channel code and the code foreword number deposits in monolithic integrated circuit EEPROM, guarantees them power cut the influence. The jump code is the systematic true password, it passes through the complex special algorithm by the code channel code and the code foreword number to extract, this special algorithm foreign security. The pressed key operation code by the pressed key which presses was decided, when "the hypothesis" the key is pressed down, its code decides as 0 1H; When "relieves" the key presses down, its code decides as 00H. Whether is the decoding confirms receive the code legitimate a series of operating process. Was confirmed the legitimate code needs to satisfy three conditions; (1) codes the channel code and the decoding channel code is same; (2) coded the foreword number to be bigger than the decoding foreword number (decodingforeword number to record on legitimately has used code foreword number, this condition might guarantee before has used code was invalid); (3) jumps the code to be equal to reuses the special algorithm to extract changes the code. After the monolithic integrated circuit confirmed receives is the legitimate code, writes the code foreword number in the decoding foreword number, and completes corresponding operation processing according to the operation code. The decoding channel code and the decoding foreword number also deposits in monolithic integrated circuit EEPROM, guards against because of power cut loses.1.3 Security reports to the police realizationIf will have robber Chen ZheRu the room, starts the automobile, after wrong password, then the automobile storage battery +12V voltage, the ignition electric current way ignition lock, the ignition outage, the engine extinguishes, again starts, will duplicate the above process, like this, the bandits and thieves always will not be able to start the automobile, will not be able to achieve its anticipated goal. The alarm circuit mainly is composed by the integrated block and the speaker and electronic switching SCR. Triode or the multiple-unit tube, are for enhance the electric circuit measure which the power but often uses, it has composed a current amplification factor very big equivalent transistor, total enlargement factor for these two enlargement factor product. SCR is the electronic switching which constitutes by the silicon-controlled rectifier, the electric capacity and the resistance constitution negative booster concurrently filter, provides +3 +4V to IC the voltage, IC is traces Draws up sound reports to the police the integrated circuit, the alarm apparatus by the SCR control, robs the vehicle thief once after the wrong password, then the storage battery electric current enters the security system besides a group, another group is started in the engine, after leads the engine work, natural contact output voltage, after the differentiating circuit, silicon-controlled rectifier SCR is triggered, also passes through the resistance to fall the pressure, the voltage adds in the IC power source input end, IC obtains the voltage output alarm, enlarges after the multiple-unit tube, Destroys moves the speaker to send out resoundingly reports to the police the sound. when static state, entire electric circuit does not consume the electricity.2. Software designThe alarm apparatus software design mainly divides into:Master routine (alarm apparatus initialization, key modulation and decoding); Alarm apparatus interrupthandling routine. This alarm apparatus installs on the automobile steering wheel. After installs, starts the alarm apparatus, the alarm apparatus automatically retards20~30s to start to work, in order to lets use the person to have the enough time to lock the gate to leave the automobile. After the time delay the alarm apparatus enters the value to defend the active status, once the vehicle door is turned on or the windowpane hits garrulously, the oscillation pick-up examines the signal, time delay 20s starts to report to the police. The time delay goal is the master which causes the automobile is opening the gate to enter the vehicle internal energy closure alarm apparatus, in order to avoid reports to the police by mistake.2.1 Master routineThis part mainly completes to each severance entrance hypothesis, and reports to the police the depositing unit initialization to each fixed unit, establishes the special symbol value and to the pressed key interrupts processing. Master routine design diagram like chart 2 shows.Chart2 master routine frame chart2.2 Alarm apparatus interrupt handling routineThe burglar alarm disposal procedure uses time severance inquiry processing, each time severance, only is inquires each kind of control flag bit, controls each group output according to its condition. The procedure has not used has circulation processing the way, therefore time control conclusion, cannot eliminate controls the flag bit, only is repositions the scene, the waiting next time severance, again judges whether controls the conclusion.3. Concluding remarkUses automobile security alarm system cost which this kind of monolithic integrated circuit composes low, performance reliable, simultaneously settles the extension to be convenient. The use jump code code/decoding principle, causes the system to be safer, greatly reduces password explaining rate, will obtain the wide spread application in the future automobile security alarm system.基于单片机的汽车防盗报警系统设计摘要:应用单片机内部资源实现的跳变编码/解码汽车防盗系统,它每次使用的遥控密码都在变化,既提高了系统的安全性,又大大降低了成本。
51单片机介绍及基于单片机控制汽车防盗系统的范例 中英文对照
Structure and function of the MCS-51 series Structure and function of the MCS-51 series one-chip computer MCS-51 is a name of a piece of one-chip computer series which Intel Company produces. This company introduced 8 top-grade one-chip computers of MCS-51 series in 1980 after introducing 8 one-chip computers of MCS-48 series in 1976. It belong to a lot of kinds this line of one-chip computer the chips have,such as 8051, 8031, 8751, 80C51BH, 80C31BH,etc., their basic composition, basic performance and instruction system are all the same. 8051 daily representatives- 51 serial one-chip computers .An one-chip computer system is made up of several following parts: ( 1) One microprocessor of 8 (CPU). ( 2) At slice data memory RAM (128B/256B),it use not depositting not can reading /data that write, such as result not middle of operation, final result and data wanted to show, etc. ( 3) Procedure memory ROM/EPROM (4KB/8KB ), is used to preserve the procedure , some initial data and form in slice. But does not take ROM/EPROM within some one-chip computers, such as 8031 , 8032, 80C ,etc.. ( 4) Four 8 run side by side I/O interface P0 four P3, each mouth can use as introduction , may use as exporting too. ( 5) Two timer / counter, each timer / counter may set up and count in the way, used to count to the external incident, can set up into a timing way too, and can according to count or result of timing realize the control of the computer. ( 6) Five cut off cutting off the control system of the source . ( 7) One all duplexing serial I/O mouth of UART (universal asynchronous receiver/transmitter (UART) ), is it realize one-chip computer or one-chip computer and serial communication of computer to use for. ( 8) Stretch oscillator and clock produce circuit, quartz crystal finely tune electric capacity need outer. Allow oscillation frequency as 12 megahertas now at most. Every the above-mentioned part was joined through the inside data bus .Among them, CPU is a core of the one-chip computer, it is the control of the computer and command centre, made up of such parts as arithmetic unit and controller , etc.. The arithmetic unit can carry on 8 persons of arithmetic operation and unit ALU of logic operation while including one, the 1 storing device temporarilies of 8, storing device 2 temporarily, 8's accumulation device ACC, register B and procedure state register PSW, etc. Person who accumulate ACC count by 2 input ends entered of checking etc. temporarily as one operation often, come from person who store 1 operation is it is it make operation to go on to count temporarily , operation result and loopback ACC with another one. In addition, ACC is often regarded as the transfer station of data transmission on 8051 inside . Thesame as general microprocessor, it is the busiest register. Help remembering that agreeing with A expresses in the order. The controller includes the procedure counter , the order is depositted, the order decipher, the oscillator and timing circuit, etc. The procedure counter is made up of counter of 8 for two, amounts to 16. It is a byte address counter of the procedure in fact, the content is the next IA that will carried out in PC. The content which changes it can change the direction that the procedure carries out . Shake the circuit in 8051 one-chip computers, only need outer quartz crystal and frequency to finely tune the electric capacity, its frequency range is its 12MHZ of 1.2MHZ. This pulse signal, as 8051 basic beats of working, namely the minimum unit of time. 8051 is the same as other computers, the work in harmony under the control of the basic beat, just like an orchestra according to the beat play that is commanded.There are ROM (procedure memory , can only read ) and RAM in 8051 slices (data memory, can is it can write ) two to read, they have each independent memory address space, dispose way to be the same with general memory of computer. Procedure 8051 memory and 8751 slice procedure memory capacity 4KB, address begin from 0000H, used for preserving the procedure and form constant. Data 8051- 8751 8031 of memory data memory 128B, address false 00FH, use for middle result to deposit operation, the data are stored temporarily and the data are buffered etc.. In RAM of this 128B, there is unit of 32 byteses that can be appointed as the job register, this and general microprocessor is different, 8051 slice RAM and job register rank one formation the same to arrange the location. It is not very the same that the memory of MCS-51 series one-chip computer and general computer disposes the way in addition. General computer for first address space, ROM and RAM can arrange in different space within the range of this address at will, namely the addresses of ROM and RAM, with distributing different address space in a formation. While visiting the memory, corresponding and only an address Memory unit, can ROM, it can be RAM too, and by visiting the order similarly. This kind of memory structure is called the structure of Princeton. 8051 memories are divided into procedure memory space and data memory space on the physics structure, there are four memory spaces in all: The procedure stores in one and data memory space outside data memory and one in procedure memory space and one outside one, the structure forms of this kind of procedure device and data memory separated form data memory, called Harvard structure. But use the angle from users, 8051 memory address space is divided intothree kinds: (1) In the slice, arrange blocks of FFFFH , 0000H of location , in unison outside the slice (use 16 addresses). (2) The data memory address space outside one of 64KB, the address is arranged from 0000H 64KB FFFFH (with 16 addresses ) too to the location. (3) Data memory address space of 256B (use 8 addresses). Three above-mentioned memory space addresses overlap, for distinguishing and designing the order symbol of different data transmission in the instruction system of 8051: CPU visit slice, ROM order spend MOVC , visit block RAM order uses MOVX outside the slice, RAM order uses MOV to visit in slice.8051 one-chip computer have four 8 walk abreast I/O port, call P0, P1, P2 and P3. Each port is 8 accurate two-way mouths, accounts for 32 pins altogether. Every one I/O line can be used as introduction and exported independently. Each port includes a latch (namely special function register ), one exports the driver and a introduction buffer . Make data can latch when outputting, data can buffer when making introduction , but four function of passway these self-same. Expand among the system of memory outside having slice, four port these may serve as accurate two-way mouth of I/O in common use. Expand among the system of memory outside having slice, P2 mouth see high 8 address off; P0 mouth is a two-way bus, send the introduction of 8 low addresses and data / export in timesharingOutput grade , P3 of mouth , P1 of P1 , connect with inside have load resistance of drawing , every one of they can drive 4 Model LS TTL load to output. As while inputting the mouth, any TTL or NMOS circuit can drive P1 of 8051 one-chip computers as P3 mouth in a normal way . Because draw resistance on output grade of them have, can open a way collector too or drain-source resistance is it urge to open a way, do not need to have the resistance of drawing outerly . Mouths are all accurate two-way mouths too. When the conduct is input, must write the corresponding port latch with 1 first . As to 80C51 one-chip computer, port can only offer milliampere of output electric currents, is it output mouth go when urging one ordinary basing of transistor to regard as, should contact a resistance among the port and transistor base , in order to the electricity while restraining the high level from exporting P1~P3 Being restored to the throne is the operation of initializing of an one-chip computer. Its main function is to turn PC into 0000H initially , make the one-chip computer begin to hold the conduct procedure from unit 0000H. Except that the ones that enter the system are initialized normally,as because procedure operate it make mistakes or operate there aren't mistake, in order to extricate oneself from a predicament , need to be pressedand restored to the throne the key restarting too. It is an input end which is restored to the throne the signal in 8051 China RST pin. Restore to the throne signa l high level effective , should sustain 24 shake cycle (namely 2 machine cycles ) the above its effective times. If 6 of frequency of utilization brilliant to shake, restore to the throne signal duration should exceed 4 delicate to finish restoring to the throne and operating. Produce the logic picture of circuit which is restored to the throne the signal: Restore to the throne the circuit and include two parts outside in the chip entirely. Outside that circuit produce to restore to the throne signal (RST ) hand over to Schmitt's trigger, restore to the throne circuit sample to output , Schmitt of trigger constantly in each S5P2 , machine of cycle in having one more , then just got and restored to the throne and operated the necessary signal insidly. Restore to the throne resistance of circuit generally, electric capacity parameter suitable for 6 brilliant to shake, can is it restore to the throne signal high level duration greater than 2 machine cycles to guarantee. Being restored to the throne in the circuit is simple, its function is very important. Pieces of one-chip computer system could normal running,should first check it can restore to the throne not succeeding. Checking and can pop one's head and monitor the pin with the oscillograph tentatively, push and is restored to the throne the key, the wave form that observes and has enough range is exported (instantaneous), can also through is it restore to the throne circuit group holding value carry on the experiment to change.Based on monolithic integrated circuit automobile security alarmsystem designAbstract:Decodes the automobile security system using them on litchis integrated circuit interior resources realization jump code, it each time uses the remote control password all is changing, both enhanced the system security, and greatly reduced the cost.Keyword: Monolithic integrated circuit, Automobile security system , Code/decode IntroductionIs unceasingly progressive along with the social economy and the high tech rapid development, in the routine work and the life, the automobile has become the people ideal transportation vehicle. But the following motor vehicle the case which robbed gradually is also in creased has created the pilot economical property loss. In order tore duce the automobile to rob the event the formation rate, for has the automobile the user to provide the safety control, simply develops one kind to be reliable, the ease of operation, can send out in the discovery normal condition to the pilot reports to the police the reminder and the security warning safety system has the practical significance. This article based on to the existing automobile security alarm system generalized analysis, develops one kind of brand-new security alarm system. This system has mainly used the jump code code/decoding principle, causes the overall system to be safer, greatly reduces password explaining rate.1. System principle of workThe automobile security alarm system the remote control which carries by the driver and installs in the automobile the controller two parts composes. The remote control and the controller all use eight CMOS which American A T-MEL Corporation produces the AVR monolithic integrated circuit, this series monolithic integrated circuit based on new simplifies instruction R the ISC structure, includes the service life most to be few is 1,000 time writes/scratches the circulation the Flash program memory, as well as the service life at least is 100,000time writes/scratches the circulation E the EPROM data-carrier storage, some 2 only have when the entire piece cleaning can clean the programming encryption locks the localization.1.1 System designThe automobile security examination uses the ultrasonic sensor. The ultrasonic sensor is composed by the ultrasonic wave transmission circuit and the supersonic reception electric circuit, in the automobile cab appropriate position, installs the ultrasonic wave launch/receiver, as well as switch electric circuit T1. When the automobile parks the vehicle owner person must leave the automob ile, with remote control closed switch T1, the automobile alarm system sat garrisons the condition, around the system use ultrasonic wave examination vehicle obstacle. Launches the partial electric circuits likes chart 1 to show. When its P1 mouth P1.1, P1.2 to the D trig , the P1.0 control ultrasonic wave launch, are 0, the photo electricity coupler outputs the TP1 end is 1, the permission ultrasonic wave launch, launches/the receiveultrasonic wave in turn, the circulation repeatedly carries on. Simultaneously the monolithic integrated circuit interior counter starts to count. The steam distance between vehicles obstacle distance is the time which sends out through the sound navigation and ranging reflects spends determines and carries on the computation. The reflection signal causes the D trigger to produce interrupt request signal INT1,simultaneously stops counting, reads takes counts the value, calculates the actual distance after the formula, then carries on the comparison with the datum distance, if examines when the actual distance is bigger than reference value 80cm, does not carry on the accustom-optics to report to the police; If some people approach the automobile to enter the cab, the examination actual distance is smaller than or was equal to when reference value 80cm, through monolithic integrated circuit P2.2 and the P2.3 port, actuates the indicating lamp display circuit and the sound alarm circuit, sends out three two flash. And triggers a high level, the actuation is wire less signal transmission circuit.Chart 1 Ultrasonic wave transmission circuit1.2 Code/decoding principleThe present automobile remote control security system are many is usesVD5026/27, PT2262/72, HT12E/D and so on the general code/decodes the electric circuit, its password decided by the component address, each set of security systems use a fixed invariable password. Along with the micro processing technology development, through the receiver emote control transmitting message, may intercept this fixed password, moreover general arranges the decoding address to lose the person to carry the component size limit, its quantity is impossible too much, can obtain not repeatedly codes very is also limited, also can very quickly explain the password with the automatic scanner. Therefore, this kind of password fixed invariable automobile security system has received the serious threat. Decodes the automobile security system using the monolithic integrated circuit interior resources realization jump code, it each time uses the remote control password all is changing, with the password no longer duplicates uses, causes the interception password also is makes a futile effort, in addition, it may increase the enough many passwords figure,enhances the system resistance illegal scanning the ability. The remote control coding altogether has 12 bytes, separately by 3 bytes codes channels code, 3 bytes codes forewords number, 5 bytes jumps codes, 1 byte pressed key operation code is composed. Encoded front adds on logic in each byte 0 to take the outset position, encoded behind adds on a logical 1 achievement in each byte to stop the position, and in most front adds on several logic 1 to take the guidance signal, this constituted the serial coded signal which uses in to transmit. The code channel code uses in to express the remote control status; each set of systems use a fixed channel code. The code foreword number uses in to record the encoded order, its starting value is 0, the monolithic integrated circuit every time codes a time, the code foreword number upwardly counts time. The code channel code and the code foreword number deposits in monolithic integrated circuit EEPROM, guarantees them power cut the influence. The jump code is the systematic true password, it passes through the complex special algorithm by the code channel code and the code foreword number to extract, this special algorithm foreign security. The pressed key operation code by the pressed key which presses was decided, when "the hypothesis" the key is pressed down, its code decides as 0 1H; When "relieves" the key presses down, its code decides as 00H. Whether is the decoding confirms receive the code legitimate a series of operating process. Was confirmed the legitimate code needs to satisfy three conditions; (1) codes the channel code and the decoding channel code is same; (2) coded the foreword number to be bigger than the decoding foreword number (decoding foreword number to record on legitimately has used code foreword number, this condition might guarantee before has used code was invalid); (3) jumps the code to be equal to reuses the special algorithm to extract changes the code. After the monolithic integrated circuit confirmed receives is the legitimate code, writes the code foreword number in the decoding foreword number, and completes corresponding operation processing according to the operation code. The decoding channel code and the decoding foreword number also deposits in monolithic integrated circuit EEPROM, guards against because of power cut loses.1.3 Security reports to the police realizationIf will have robber Chen ZheRu the room, starts the automobile, after wrong password, then the automobile storage battery +12V voltage, the ignition electric current way ignition lock, the ignition outage, the engine extinguishes, again starts, will duplicate the above process, like this, the bandits and thieves always will not beable to start the automobile, will not be able to achieve its anticipated goal. The alarm circuit mainly is composed by the integrated block and the speaker and electronic switching SCR. Triode or the multiple-unit tube, are for enhance the electric circuit measure which the power but often uses, it has composed a current amplification factor very big equivalent transistor, total enlargement factor for these two enlargement factor product. SCR is the electronic switching which constitutes by the silicon-controlled rectifier, the electric capacity and the resistance constitution negative booster concurrently filter, provides +3 +4V to IC the voltage, IC is traces Draws up sound reports to the police the integrated circuit, the alarm apparatus by the SCR control, robs the vehicle thief once after the wrong password, then the storage battery electric current enters the security system besides a gro up, another group is started in the engine, after leads the engine work, natural contact output voltage, after the differentiating circuit, silicon-controlled rectifier SCR is triggered, also passes through the resistance to fall the pressure, the voltage adds in the IC power source input end, IC obtains the voltage output alarm, enlarges after the multiple-unit tube, Destroys moves the speaker to send out resoundingly reports to the police the sound. when static state, entire electric circuit does not consume the electricity.2. Software designThe alarm apparatus software design mainly divides into:Master routine (alarm apparatus initialization, key modulation and decoding); Alarm apparatus interrupt handling routine. This alarm apparatus installs on the automobile steering wheel. After installs, starts the alarm apparatus, the alarm apparatus automatically retards20~30s to start to work, in order to lets use the person to have the enough time to lock the gate to leave the automobile. After the time delay the alarm apparatus enters the value to defend the active status, once the vehicle door is turned on or the windowpane hits garrulously, the oscillation pick-up examines the signal, time delay 20s starts to report to the police. The time delay goal is the master which causes the automobile is opening the gate to enter the vehicle internal energy closure alarm apparatus, in order to avoid reports to the police by mistake.2.1 Master routineThis part mainly completes to each severance entrance hypothesis, and reports to the police the depositing unit initialization to each fixed unit, establishes the special symbol value and to the pressed key interrupts processing. Master routine designdiagram like chart 2 shows.Chart2 master routine frame chart2.2 Alarm apparatus interrupt handling routineThe burglar alarm disposal procedure uses time severance inquiry processing, each time severance, only is inquires each kind of control flag bit, controls each group output according to its condition. The procedure has not used has circulation processing the way, therefore time control conclusion, cannot eliminate controls the flag bit, only is repositions the scene, the waiting next time severance, again judges whether controls the conclusion.3. Concluding remarkUses automobile security alarm system cost which this kind of monolithic integrated circuit composes low, performance reliable, simultaneously settles the extension to be convenient. The use jump code code/decoding principle, causes the system to be safer, greatly reduces password explaining rate, will obtain the wide spread application in the future automobile security alarm system.51系列单片机的功能和结构结构和功能的监控监-51系列之一--计算机芯片监控监-51名是一幅一个电脑晶片,英特尔公司生产系列. 这家公司推出8级一个计算机芯片监控监-51系列之后,于1980年8引入一个计算机芯片监控监,于1976年48系列.。
外文翻译基于单片机的汽车倒车防撞语音提示系统
外文资料:Based on nRF24E1 and TMC2023 automobilecollision avoidance system development andrealizationCar engineering department of institute of technology of MunichBy LORENZ FERDIDADProgress of society with the development of times, more and more cars have entered ordinary people's family. Though the highway terms is being updated, yet avoid the crowded current situation of getting on the car of unavoidable highway, in addition, the speed is improved gradually, the malignant traffic accident is happening all the time, have brought the enormous life and property loss to people and the society. Car anticollision system whether one can send out seeing and hearing survey device of warning signal in advance to driver. It install, at car, can survey, attempt pedestrian, vehicle or barrier around close the automobile body usually; Can send out and collide the dangerous signal soon to driver and passenger ahead of time, impel driver bypass driver take emergency measure punish special dangerous situation even, avoid losses. At present, though various countries study, prevent system of colliding from (usually call the initiative security system in the world), but how could solve the timid and alert problem better, perplexing relevant workers all the time. The researcher in the world studies through a large number of experiments, has already reached common understanding, if want to solve problem described above effectively, the anticollision system must have the following functions:1)Must be capable of examining the angle, the azimuthal information ofthe goal is essential for removing emptily and alertly(2)Apt to produce anti-interference performance strong complicated transmission signal, cooperate with real-time high-efficient signal deal with with goal measuring algorithms, in order to remove emptily and alertly.Only the above two points combine together and guarantee the systematic dependability that the car defends colliding closely.1 TMC2023 chip and the nRF24E1 chip characteristic introduced TMC2032 is one kind of new entire digital correlation instrument electric circuit, its correlation word length and the related threshold are programmable. This chip is the monolithic 64 CMOS entire numeral correlation instrument large scale integrated circuit which American TRW Corporation recent years promoted, its interior had three independent clocks 8 displacements positions registers (stochastic data register A, local code register B and shield code register M); Moreover also has 7 registers to use for to load pre-placed limit. 0 ~ 64 between wilfully long stochastic data and the local code after the correlation operation, by the three samit the cushion 7 BCD code output, and limit compare with the initialization in the comparator, if the correlative value is bigger than or is equal to limit, then the flag bit by lowly changes high. Because has used the advanced high speed CMOS production craft, the parallel correlation speed reaches as high as above 30MHz. But widely applies to synchronization, the matched filtering, harms in the code examination, the recording and the bar code recognition, especially suits to the radar signal recognition. NRF24E1 is one kind of operating frequency may achieve 2.4GHz the wireless radio frequency receiving and dispatching chip, the channel operation time is smaller than 200 mu s, the data rate is 1Mbps outside, does not need to meet the SAW filter, is global general low cost radio frequency system level chip which the present world promotes for the first time.The interior inlays has with 8,051 compatible microprocessors and 10 9 inputs A/D switches, may between under the 1.9V ~ 3.6V voltage the steady work; The interior also inlays have impress the adjuster and the VDD voltage monitoring device. Wireless receiving and dispatching partially has with the nRF2401 similar function, this function starts by the internal parallel mouth and internal SPI, each due-out signal says regarding the processor all may take severs carries on the programming, or gives the microprocessor through the GPIO port biography. Chip nRF24E1 may realize the wireless communication in world public frequency band scope 2.4 ~ 2.5GHz. Receives and dispatches the partial packages to include the frequency divider, the amplifier, the regulator and two receiving and dispatching units. The output energy, the frequency band and other radio frequency parameter passable radio frequency registers conveniently have programmed the adjustment. Under the transmission pattern, the current consumption only has 10.5mA; Under the receive pattern, the current consumption only has 18mA, therefore the power loss is quite low.2 systems structures entire wrap information gathering system is composed by five sets of radio frequencies launches and the receiving device, each set of launches and the receive partial basic electric circuits all are same, these five sets of transmitter-receiver set also is connected with the DSP central processor, the central processor is responsible for the data which calculates them to pass on, makes the decision-making according to the actual situation. Each set of launches and receiving device structure like chart 1 shows. First by as the core radio frequency transmission circuit produces the high frequency electromagnetic wave take nRF24E1, then the modulation signal which sends by correlation operation chip TMC2032 to it carries on the modulation,thus produces with other radio frequency receiving and dispatching unit different radio-frequency signals, prepares for full for the receive. In order to enable the electromagnetic wave signal to have the enough far propagation distance, but also needs to modulate after the signal to carry on the enlargement, completes this function the electric circuit is the merit puts the electric circuit. Finally passes on airborne to a such signal. When sends out the electromagnetic wave meets when the obstacle returns, first must after correlation operation chip TMC2032 to it carry on the recognition, if the same group launches partially sends receives, and further bequeaths this signal the radio frequency receive part; Otherwise refuses to receive. Then the receive partially produces according to the electromagnetic wave in the airborne dissemination The phase moved calculates the time which its dissemination consumes, again calculates the obstacle and this group of receiving and dispatching partial distances. Finally gives this distance information the central processor. Central processing monolithic confidential at the same time the distance information which passes on to five groups of radio frequencies receiving and dispatching unit makes the computation, obtains obstacle and vehicle spatial position which measured. Reaches this point, the obstacle information gathering work basically completes, is left over is bequeaths again this comprehensive information the higher paraffin central processor, lets it make the final decision-making。
汽车防盗报警器中外文翻译
毕业设计(论文)外文资料翻译学院:专业:电气工程及其自动化姓名:学号:外文出处:(用外文写)附件: 1.外文资料翻译译文 2.外文原文注:附件1:外文资料翻译译文汽车防盗报警器目前汽车是人类最为主要的交通工具,也是现代文明的标志。
世界上每年汽车销售量超过6000万辆,保有量超过4 亿。
使用的车辆越多,随之而来的交通事故以及被盗的汽车量也越来越多,造成了人员伤亡和经济财产损失。
人们对车辆的使用性能和防盗性能提出了更高的要求。
汽车安全已经成为一个重要的社会性问题。
为了减少汽车事故的发生,让拥有汽车的用户保有安全感,研制出一种操作方便而又简单可靠,能自动检测汽车各部分安全状况,如果发现不正常情况能给司机给予报警提醒和防盗报警的安全系统,具有非常实际的意义。
汽车价值很高,伴随着汽车数量不断增加,汽车已经成为盗窃者的重点盗窃目标,汽车被偷也已成为当今社会普遍关注和急需解决的大问题。
目前,各种汽车防盗方式和产品不断更新,尽管车门和车辆引擎已经安装了防盗机械锁,但是盗徒用万能钥匙可不用吹灰之力把车门打开将车开走,所以汽车防盗问题仍然没有完全解决。
如今社会的汽车防盗有以下几种方式:一是机械防盗,主要原理是用锁锁住汽车上的某一部位,使其不能发挥应有的作用。
现有如下几种防盗方式:变速器档把锁、方向盘锁、制动踏板锁、离合踏板锁等,相应带来的麻烦是机械锁体积大,车主同时要随身多带一把钥匙。
而且破解的手段很多,由于核心终究是一把锁,这就难不住溜门撬锁之徒。
更难不住如液压剪之类的大型偷车手段;不小心再把钥匙丢了等等也是汽车被盗的可能性之一。
二是电子防盗,这是目前汽车市场上最为常用的防盗措施。
启动防盗系统便可将点火线圈和供油回路切断,只有在解锁钥匙的控制下才能将防盗正常解除。
这类防盗产品种类繁多。
国内外大部分小轿车在出厂时便已经配置了钥匙芯片防盗系统。
这是利用钥匙中的芯片发射无线电与本车的ECU接通后就能启动汽车发动机。
除此之外还有声光报警系统,汽车仪表盘上装有一种发光二极管,既可以让车主知道系统工作状态,同时也可以对窥探车内的偷车贼起到精神上的压力作用。
基于单片机的汽车防盗报警系统毕业设计论文
基于单片机的汽车防盗报警系统毕业设计论文目录1. 内容概览 (2)1.1 研究背景与意义 (2)1.2 国内外研究现状 (4)1.3 本文研究内容与结构安排 (5)2. 相关技术理论基础 (7)2.1 单片机技术概述 (7)2.2 无线通信技术介绍 (9)2.3 防盗报警系统工作原理 (11)2.4 汽车相关安全技术 (12)3. 系统总体方案设计 (13)3.1 系统功能需求分析 (14)3.2 系统架构与模块划分 (16)3.3 硬件设计方案 (17)4. 系统硬件设计 (21)4.1 单片机选型 (22)4.2 无线通信模块设计 (23)4.3 传感器设计 (25)4.4 报警模块设计 (26)4.5 系统电源管理 (28)5. 系统软件设计 (29)5.1 软件开发环境搭建 (31)5.2 系统软件架构 (32)5.3 无线数据传输协议设计 (33)5.4 报警逻辑编程实现 (34)5.5 测试与验证 (36)6. 系统实现 (37)6.1 硬件生产与组装 (39)6.3 系统集成测试 (41)6.4 现场应用与测试 (42)7. 系统性能测试与分析 (44)8. 结论与展望 (45)8.1 系统设计与实现的主要结论 (46)8.2 系统优化建议 (47)8.3 下一步工作展望 (48)1. 内容概览本论文旨在设计并实现一款基于单片机技术的汽车防盗报警系统。
该论文首先进行了系统的总体结构设计,包括硬件和软件两大部分。
硬件部分着重阐述了核心单片机的选择、模块的设计与实现,以及与之配套传感器的选择与安装技术;软件部分则详细说明了系统的软件架构、编程语言及控制流程。
其次,论文还细致分析了汽车防盗报警系统的具体功能实现过程,包括但不限于报警触发条件的设定、报警信号的处理以及系统的自我检测与维护机制。
对系统进行了严格的性能测试,确保其具备高度的可靠性和实用性。
通过本系统的设计和实现,不仅能够在一定程度上保护车主们的财产安全,同时对于推动微电子技术在汽车领域内的应用具有重要的参考和实践价值。
外文文献-基于at89c52单片机的防盗报警的设计制作
8-bit Microcontroller With 8K Bytes Flash A T89C52 FeaturesCompatible with MCS-51™ Products8K Bytes of In-System Reprogrammable Flash MemoryEndurance: 1,000 Write/Erase CyclesFully Static Operation: 0 Hz to 24 MHzThree-level Program Memory Lock256 x 8-bit Internal RAM32 Programmable I/O LinesThree 16-bit Timer/CountersEight Interrupt SourcesProgrammable Serial ChannelLow-power Idle and Power-down ModesDescriptionThe A T89C52 is a low-power, high-performance CMOS 8-bit microcomputer with 8K bytes of Flash programmable and erasable read only memory (PEROM). The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry-standard 80C51 and 80C52 instruction set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel A T89C52 is a powerful microcomputer which provides a highly-flexible and cost-effective solution to many embedded control applicationsPin ConfigurationsBlock DiagramPin Description VCCSupply voltage.GNDGround.Port 0Port 0 is an 8-bit open drain bi-directional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high-impedance inputs. Port 0 can also be configured to be the multiplexed low-order address/data bus during accesses to external program and data memory. In this mode, P0 has internal pull-ups. Port 0 also receives the code bytes during Flash programming and outputs the code bytes during program verification. External pull-ups are required during program verification.Port 1Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as shown in the following table. Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memories that use 16-bit addresses (MOVX @DPTR). In this application, Port 2 uses strong internal pull-ups when emitting 1s. During accesses to external data memories that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. Port 2 also receives the high-order address bits and some control signals during Flash programming and verification. Port 3Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by theinternal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups. Port 3 also serves the functions of various special features of the A T89C51, as shown in the following table. Port 3 also receives some control signals for Flash programming and verification.RST Resetinput. A high on this pin for two machine cycles while the oscillator is running resets the device.ALE/ PROGAddress Latch Enable is an output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming. In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator frequency and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external data memory. If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSENProgram Store Enable is the read strobe to external program memory. When the A T89C52 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA /VPPExternal Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to V CC for internal program executions. This pin also receives the 12-volt programming enable voltage (V PP ) during Flash programming when 12-volt programming is selected.Input to the inverting oscillator amplifier and input to the internal clock operating circuit. XTAL2Output from the inverting oscillator amplifier.Special Function RegistersA map of the on-chip memory area called the Special Function Register (SFR) space is shown in the Table 1.Note that not all of the addresses are occupied, and unoccupied addresses may not be implemented on the chip. Read accesses to these addresses will in general return random data, and write accesses will have an indeterminate effect. User software should not write 1s to these unlisted locations, since they may be used in future products to invoke new features. In that case, the reset or inactive values of the new bits will always be 0.Timer 2 RegistersControl and status bits are contained in registers T2CON and T2MOD for Timer 2. The register pair (RCAP2H, RCAP2L) are the Capture/Reload registers for Timer 2 in 16-bit capture mode or 16-bit auto-reload mode.Interrupt RegistersThe individual interrupt enable bits are in the IE register. Two priorities can be set for each of the six interrupt sources in the IP register.Data MemoryThe A T89C52 implements 256 bytes of on-chip RAM. The upper 128 bytes occupy a parallel address space to the Special Function Registers. That means the upper 128 bytes have the same addresses as the SFR space but are physically separate from SFR space.When an instruction accesses an internal location above address 7FH, the address mode used in the instruction specifies whether the CPU accesses the upper 128 bytes of RAM or the SFR space. Instructions that use direct addressing access SFR space. For example, the following direct addressing instruction accesses the SFR at location 0A0H .MOV 0A0H, #dataInstructions that use indirect addressing access the upper 128 bytes of RAM. For example, the following indirect addressing instruction, where R0 contains 0A0H, accesses the data byte at address 0A0H, rather than P2 (whose address is 0A0H).MOV @R0, #dataNote that stack operations are examples of indirect addressing, so the upper 128 bytes of data RAM are available as stack space.Timer 0 and 1Timer 0 and Timer 1 in the A T89C52 operate the same way as Timer 0 and Timer 1 in theTimer 2Timer 2 is a 16-bit Timer/Counter that can operate as either a timer or an event counter. The type of operation is selected by bit C/T2 in the SFR T2CON.Timer 2 has three operating modes: capture, auto-reload (up or down counting), and baud rate generator. The modes are selected by bits in T2CON, as shown in Table 3.Timer 2 consists of two 8-bit registers, TH2 and TL2. In the Timer function, the TL2 register is incremented every machine cycle. Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the oscillator frequency.In the Counter function, the register is incremented in response to a 1-to-0 transition at its corresponding external input pin, T2. In this function, the external input is sampled during S5P2 of every machine cycle. When the samples show a high in one cycle and a low in the next cycle, the count is incremented. The new count value appears in the register during S3P1 of the cycle following the one in which the transition was detected. Since two machine cycles (24 oscillator periods) are required to recognize a 1-to-0 transition, the maximum count rate is 1/24 of the oscillator frequency. To ensure that a given level is sampled at least once before it changes, the level should be held for at least one full machine cycleCapture ModeIn the capture mode, two options are selected by bit EXEN2 in T2CON. If EXEN2 = 0, Timer 2 is a 16-bit timer or counter which upon overflow sets bit TF2 in T2CON.This bit can then be used to generate an interrupt. If EXEN2 = 1, Timer 2 performs the same operation, but a 1-to-0 transition at external input T2EX also causes the current value in TH2 and TL2 to be captured into RCAP2H and RCAP2L, respectively. In addition, the transition at T2EX causes bit EXF2 in T2CON to be set. The EXF2 bit, like TF2 can generate an interrupt. The capture mode is illustrated in Figure 1.Auto-reload (Up or Down Counter)Timer 2 can be programmed to count up or down when configured in its 16-bit auto-reload mode. This feature is invoked by the DCEN (Down Counter Enable) bit located in the SFR T2MOD. Upon reset, the DCEN bit is set to 0 so that timer 2 will default to count up. When DCEN is set, Timer 2 can count up or down, depending on the value of the T2EX pin..Figure 2 shows Timer 2 automatically counting up when DCEN = 0. In this mode, two options are selected by bit EXEN2 in T2CON. If EXEN2 = 0, Timer 2 counts up to 0FFFFH and then sets the TF2 bit upon overflow. The overflow also causes the timer registers to be reloaded with the 16-bit value in RCAP2H and RCAP2L. The values in Timer in Capture ModeRCAP2H and RCAP2L are preset by software. If EXEN2 = 1, a 16-bit reload can be triggered either by an overflow or by a 1-to-0 transition at external input T2EX. This transition also sets the EXF2 bit. Both the TF2 and EXF2 bits can generate an interrupt if enabled.Setting the DCEN bit enables Timer 2 to count up or down, as shown in Figure 3. In this mode, the T2EX pin controls the direction of the count. A logic 1 at T2EX makes Timer 2 count up. The timer will overflow at 0FFFFH and set the TF2 bit. This overflow also causes the 16-bit value in RCAP2H and RCAP2L to be reloaded into the timer registers, TH2 and TL2, respectively.A logic 0 at T2EX makes Timer 2 count down. The timer underflows when TH2 and TL2 equal the values stored in RCAP2H and RCAP2L. The underflow sets the TF2 bit and causes0FFFFH to be reloaded into the timer registers. The EXF2 bit toggles whenever Timer 2 overflows or underflows and can be used as a 17th bit of resolution. In this operating mode, EXF2 does not flag an interrupt.8位8字节闪存单片机A T89C52主要性能与MCS-51单片机产品兼容8K字节在系统可编程Flash存储器1000次擦写周期全静态操作:0Hz~24Hz三级加密程序存储器256×8位内部存储器32个可编程I/O口线三个16位定时器/计数器八个中断源可编程串行通道低功耗空闲和掉电模式功能特性描述A T89S52是一种低功耗、高性能CMOS8位微控制器,具有8K内置可编程闪存。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
精品中英文外文翻译基于单片机的汽车防盗报警系统设计定Based on monolithic integrated circuit automobile security alarmsystem designAbstract:Decodes the automobile security system using them on litchis integrated circuit interior resources realization jump code, it each time uses the remote control password all is changing, both enhanced the system security, and greatly reduced the cost.Keyword: Monolithic integrated circuit, Automobile security system , Code/decodeIntroductionIs unceasingly progressive along with the social economy and the high tech rapid development, in the routine work and the life, the automobile has become the people ideal transportation vehicle. But the following motor vehicle the case which robbed gradually is also in creased has created the pilot economical property loss. In order tore duce the automobile to rob the event the formation rate, for has the automobile the user to provide the safety control, simply develops one kind to be reliable, the ease of operation, can send out in the discovery normal condition to the pilot reports to the police the reminder and the security warning safety system has the practical significance. This article based on to the existing automobile securityalarm system generalized analysis, develops one kind of brand-new security alarm system. This system has mainly used the jump code code/decoding principle, causes the overall system to be safer, greatly reduces password explaining rate.1. System principle of workThe automobile security alarm system the remote control which carries by the driver and installs in the automobile the controller two parts composes. The remote control and the controller all use eight CMOS which American AT-MEL Corporation produces the AVR monolithic integrated circuit, this series monolithic integrated circuit based on new simplifies instruction R the ISC structure, includes the service life most to be few is 1,000 time writes/scratches the circulation the Flash program memory, as well as the service life at least is 100,000time writes/scratches the circulation E the EPROM data-carrier storage, some 2 only have when the entire piece cleaning can clean the programming encryption locks the localization.1.1 System designThe automobile security examination uses the ultrasonic sensor. The ultrasonic sensor is composed by the ultrasonic wave transmission circuit and the supersonic reception electric circuit, in the automobile cab appropriate position, installs the ultrasonic wave launch/receiver,as well as switch electric circuit T1. When the automobile parks the vehicle owner person must leave the automobile, with remote control closed switch T1, the automobile alarm system sat garrisons the condition, around the system use ultrasonic wave examination vehicle obstacle. Launches the partial electric circuits likes chart 1 to show. When its P1 mouth P1.1, P1.2 to the D trig , the P1.0 control ultrasonic wave launch, are 0, the photo electricity coupler outputs the TP1 end is 1, the permission ultrasonic wave launch, launches/the receive ultrasonic wave in turn, the circulation repeatedly carries on. Simultaneously the monolithic integrated circuit interior counter starts to count. The steam distance between vehicles obstacle distance is the time which sends out through the sound navigation and ranging reflects spends determines and carries on the computation. The reflection signal causes the D trigger to produce interrupt request signal INT1,simultaneously stops counting, reads takes counts the value, calculates the actual distance after the formula, then carries on the comparison with the datum distance, if examines when the actual distance is bigger than reference value 80cm, does not carry on the accustom-optics to report to the police; If some people approach the automobile to enter the cab, the examination actual distance is smaller than or was equal to when reference value 80cm, through monolithic integrated circuit P2.2 and the P2.3 port, actuates theindicating lamp display circuit and the sound alarm circuit, sends out three two flash. And triggers a high level, the actuation is wire less signal transmission circuit.Chart 1 Ultrasonic wave transmission circuit1.2 Code/decoding principleThe present automobile remote control security system are many is usesVD5026/27, PT2262/72, HT12E/D and so on the general code/decodes the electric circuit, its password decided by the component address, each set of security systems use a fixed invariable password. Along with the micro processing technology development, through the receiver emote control transmitting message, may intercept this fixed password, moreover general arranges the decoding address to lose the person to carry the component size limit, its quantity is impossible too much, can obtain not repeatedly codes very is also limited, also can very quickly explain the password with the automatic scanner. Therefore, this kind of password fixed invariable automobile security system has received the serious threat. Decodes the automobile security system using the monolithic integrated circuit interior resources realization jump code, it each time uses the remote。