Design a alarm system - microprocessor system, Computer Engineering

Assignment Help:

  A burglar alarm system is controlled by a microprocessor system. The system has three independent circuit each consisting of 7 passive infra red sensors. The controller can be programmed to activate individual circuits and detect which passive has raised the alarm. Write a C program to control the system. Assume 

    Variable char a contains the passive details of circuit 1
    Variable char b contains the passive details of circuit 2
    Variable char c contains the passive details of circuit 3
 
The variable a/b/c is coded such that if the sensor is activated then its corresponding bit is set to 1 else it is 0. The bit format is bit 0 Lsb sensor and bit 6 Msb sensors. The program should initial run from a menu which enables various circuits to be turned on/off , a reset password to be set, a special simulation where a/b/c are entered from keyboard (test) and a system set . The program should display the state of the passives (active or non-active )  and if the alarm is raised  an audible alarm should be heard , the  set passive and an access code be requested to reset the system.


Related Discussions:- Design a alarm system - microprocessor system

The values 15 and 11 can also be defined by variable, In the statement Writ...

In the statement Write:/15(10) lfa1-lifnr. The values 15 and 11 can also be defined by variable. No, the value of 11 nad 15 is not described by variable.

Automatic stock control system in a supermarket, Automatic Stock Control Sy...

Automatic Stock Control System in a Supermarket -  Bar codes are associated to all goods/items sold by the supermarket as a means of identification -  Every bar code is asso

Common functions of interrupts - computer architecture, Common Functions of...

Common Functions of Interrupts: An Interrupt transfers control to the interrupt service routine, generally through the interrupt vector table, which contains the addresses

What are primary keys and foreign keys, What are primary keys and foreign k...

What are primary keys and foreign keys? Primary keys are the unique identifiers for every row. They must have unique values and cannot be null. Due to their significance in rel

What is the difference among character and block devices, a. What is the di...

a. What is the difference among character and block devices? b. Discuss the method to make a Kernel Driver for the PC Speaker. c. Explain the socket structure with the help o

What is exception, a. Explain about exception? When do they occur? Show usi...

a. Explain about exception? When do they occur? Show using an example how to give your own exception handler. b. Can you restrict the types of exception that a function can thro

Explain the working of a hybrid in telephone networks, How does a hybrid in...

How does a hybrid in telephone networks work ? The circuit operation is as follows: The input signal is coupled to the B and F windings similarly. By the C winding, the i

Determine flip-flops that are required for mod–16 counter, How many Flip-Fl...

How many Flip-Flops are required for mod-16 counter? Ans. 4 flip-flops is required for Mod-16 Counter. For Mod-m Counter, we require N flip-flops where N is selected to be the

Role of internet, Role of Internet, Intranet and extranet in e-business ...

Role of Internet, Intranet and extranet in e-business The following information activities are carried out in many business: 1.  Selling of raw materials 2.  Advertising o

Show the properties of text box, Q. Show the properties of Text Box? Th...

Q. Show the properties of Text Box? The tag is used to specify where user input is expected. It has several attributes, of which TYPE attribute is used to specify th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd