Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Electrical & Electronics Expert

1. Introduction

Intelligent homes are becoming increasingly popular as cost/performance ratio of microcontrollers is continuously dropping.  These systems incorporate a variety of transducers to detect and transmit status of the home to a supervisory microcomputer. Heating, lighting, security and other parameters are usually controlled by the microcomputer to give a comfortable and safe environment for the residents.

The block diagram of a simple home automation system is demonstrated below:

1242_Block diagram of automation system.jpg

2. Input and output connections

Details of connections to the microcontroller input and output ports are describeed below:

Analogue inputs:

Light Intensity Sensor (LDR) is connected to channel 0 of ADC (RA0).
Manual Control (potentiometer) is connected to channel 1 of ADC (RA1).

Analogue outputs:

Intensity of light emitted by the LED is controlled by PWM1 output (RC1).
Intensity of light emitted by the LED is controlled by PWM2 output (RC2).

Digital outputs:

LEDs connected to RC5 is used specify that a security link is broken.
RB0-RB5 outputs are connected to LCD.

Digital inputs:

RC3 switch is used to set desired ambient light on RC1 (light 1).
All window and door contacts are wire OR-ed and connected to RC4 input.
RC6 switch is used to increment security code from 0-9
RC7 is used to enter any of the three digit security code.

Table below shows the function of each bit of PORTC.
Bit number      Connection               Function
0                      Not used                    X
1                  PWM1 output               Controlled by Potentiometer (POT)
2                  PWM2 output               Controlled by LDR
3                 Sets light intensity         When held high, the desired ambient light 1 can be set
4                 Security loop                 High indicates a security breach
5                 Alarm                           Flashing LED
6                 Security code entry        High-Low transition increments code by one
7                  Enter code                   High-low transition enters one of 3 security digits

3. Objective:

To develop a ‘C’ program to emulate the intelligent home and evaluate its operation using E-BLOCK boards in the T5/03 Embedded Systems laboratory.

4. Purpose:

1. To prepare a structured and annotated ‘C’ program.
2. To provide evidence of the development of each stage of the program. This will consist of producing a logbook and a formal report.
3. To introduce new ideas or improvements to the system.

5. Tasks

The computer performs the following tasks.

1. The intensity of two lights is controlled either manually from potentiometer (dimmer mode) or automatically by measuring the intensity of ambient light using the LDR and adjusting the light output.

a) The intensity of LED connected to RC1 is adjusted by potentiometer. Press and hold RC3 switch and adjust the potentiometer from 0-5 V and show the set intensity on first line one of the LCD. The LED should light up to the required intensity when RC3 is released.

b) Intensity of LED connected to RC2 is controlled automatically by measuring the ambient light. When LDR is covered, the LED lights up to its maximum intensity (about 5 V) and turn off when uncovered. As you move your hand over the LDR, the intensity of the LED should change accordingly.

2. Contacts on the windows and doors are linked to form a continuous loop. RC4 is connected to the loop. When the window or door opens, voltage on the loop changes to 5V. This can be simulated by pressing the switch connected to RC4. A high on this pin indicates a security breach if the system is armed.

3. Security system could be armed and disarmed by entering a 3-digit code. Press the switch connected to RC6 repeatedly to change the first digit of the code from 0-9 as shown on the second line of the LCD When the first digit is displayed on the LCD, press the switch connected to RC7 to enter the digit and move to the next digit. After all three digits are entered, the LED connected to RC5 is turned on to indicate the security system is armed. The system can be disarmed in a same manner by entering a different code. Use following codes for the security system:

To arm the system: 123
To disarm the system: 230
The codes should be cleared after they have been entered for security reasons.

4. When the security loop is broken while the system is armed, the LED connected to RC5 must start to flash at a regular intervals (e.g. twice /second) for 30 seconds. During this period if the system is disarmed the LED must stop flashing and return to its off status. Though, if it is not disarmed in time then the system must automatically disarm itself.
Use Timer 0 in interrupt mode for flashing the RC5 LED.
Use Timer 1 in interrupt mode for timing 30 seconds.

7. Evidence
1- Formal report and logbook kept while developing

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M91718

Have any Question? 


Related Questions in Electrical & Electronics

A system has impulse response hn un - 3a determine the

A system has impulse response h[n] = u[n - 3]. a. Determine the impulse response of the inverse system h -1 [n]. b. Is the inverse stable? Is the inverse causal? c. Your boss asks you to implement h -1 [n] to the best of ...

In the first approach to streaming stored audiovideo figure

In the first approach to streaming stored audio/video (Figure 28.24), assume that we need to listen to a compressed song of 4 megabytes (a typical situation). If our connection to the Internet is via a 56-kbps modem, how ...

Each round in a block cipher should be invertible to make

Each round in a block cipher should be invertible to make the whole block invertible. Modern block ciphers use two approaches to achieve this. In the first approach, each component is invertible; in the second approach s ...

A create a vector a with elements from 1 to 100 store the

a. Create a vector a with elements from 1 to 100. Store the data of a in a file with filename test.txt. b. Create a vector b with elements from 100 to 1 and store the data of b in the file test.txt without deleting the d ...

A number equal to the sum of its coordinates is assigned to

A number equal to the sum of its coordinates is assigned to each point in a rectangular room having three of its contiguous edges as the coordinate axes. Draw a sketch of the constant-magnitude surfaces for the number fi ...

1 state the relationship between polarization current

1. State the relationship between polarization current density and electric field intensity. How is it taken into account in Maxwell's equations? 2. What is the revised definition of D? 3. State the relationship between ...

1 what are the names of the protocols discussed in this

1. What are the names of the protocols, discussed in this chapter, that provide security for e-mail? 2. How does PGP create a set of security parameters? 3. What is the purpose of the Handshake Protocol in SSL? 4. What i ...

The spacing a between the plates of a parallel-plate

The spacing a between the plates of a parallel-plate waveguide is equal to 5 cm. The dielectric between the plates is free space. If a generator of fundamental frequency 1800 MHz and rich in harmonics excites the wavegui ...

Discretize the continuous-time system with transfer

Discretize the continuous-time system with transfer function H(s) = (s + 10 )/s with use of the bilinear (Tustin) approximation method. Verify your result by converting the computed discrete-time system to continuous-tim ...

The rate at which metallic ions are electroplated from a

The rate at which metallic ions are electroplated from a dilute electrolytic solution onto a rotating disk electrode is usually governed by the mass diffusion rate of ions to the disk. This process is believed to be cont ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro