基于单片机控制的电话自动报警系统外文翻译_第1页
基于单片机控制的电话自动报警系统外文翻译_第2页
基于单片机控制的电话自动报警系统外文翻译_第3页
基于单片机控制的电话自动报警系统外文翻译_第4页
基于单片机控制的电话自动报警系统外文翻译_第5页
已阅读5页,还剩7页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、 外文翻译1.外文原文:Structure and function of the MCS-51 series Structure and function of the MCS-51 series one-chip computer MCS-51 is a name of a piece of one-chip computer series which Intel Company produces. This company introduced 8 top-grade one-chip computers of MCS-51 series in 1980 after introducin

2、g 8 one-chip computers of MCS-48 series in 1976. It belong to a lot of kinds this line of one-chip computer the chips have,such as 8051, 8031, 8751, 80C51BH, 80C31BH,etc., their basic composition, basic performance and instruction system are all the same. 8051 daily representatives- 51 serial one-ch

3、ip computers . An one-chip computer system is made up of several following parts: ( 1) One microprocessor of 8 (CPU). ( 2) At slice data memory RAM (128B/256B),it use not depositting not can reading /data that write, such as result not middle of operation, final result and data wanted to show, etc.

4、( 3) Procedure memory ROM/EPROM (4KB/8KB ), is used to preserve the procedure , some initial data and form in slice. But does not take ROM/EPROM within some one-chip computers, such as 8031 , 8032, 80C ,etc. ( 4) Four 8 run side by side I/O interface P0 four P3, each mouth can use as introduction ,

5、may use as exporting too. ( 5) Two timer / counter, each timer / counter may set up and count in the way, used to count to the external incident, can set up into a timing way too, and can according to count or result of timing realize the control of the computer. ( 6) Five cut off cutting off the co

6、ntrol system of the source . ( 7) One all duplexing serial I/O mouth of UART (universal asynchronous receiver/transmitter (UART) ), is it realize one-chip computer or one-chip computer and serial communication of computer to use for. ( 8) Stretch oscillator and clock produce circuit, quartz crystal

7、finely tune electric capacity need outer. Allow oscillation frequency as 12 megahertas now at most. Every the above-mentioned part was joined through the inside data bus .Among them, CPU is a core of the one-chip computer, it is the control of the computer and command centre, made up of such parts a

8、s arithmetic unit and controller , etc. The arithmetic unit can carry on 8 persons of arithmetic operation and unit ALU of logic operation while including one, the 1 storing device temporarilies of 8, storing device 2 temporarily, 8's accumulation device ACC, register B and procedure state regis

9、ter PSW, etc. Person who accumulate ACC count by 2 input ends entered of checking etc. temporarily as one operation often, come from person who store 1 operation is it is it make operation to go on to count temporarily , operation result and loopback ACC with another one. In addition, ACC is often r

10、egarded as the transfer station of data transmission on 8051 inside . The same as general microprocessor, it is the busiest register. Help remembering that agreeing with A expresses in the order. The controller includes the procedure counter , the order is depositted, the order decipher, the oscilla

11、tor and timing circuit, etc. The procedure counter is made up of counter of 8 for two, amounts to 16. It is a byte address counter of the procedure in fact, the content is the next IA that will carried out in PC. The content which changes it can change the direction that the procedure carries out .

12、Shake the circuit in 8051 one-chip computers, only need outer quartz crystal and frequency to finely tune the electric capacity, its frequency range is its 12MHZ of 1.2MHZ. This pulse signal, as 8051 basic beats of working, namely the minimum unit of time. 8051 is the same as other computers, the wo

13、rk in harmony under the control of the basic beat, just like an orchestra according to the beat play that is commanded. There are ROM (procedure memory , can only read ) and RAM in 8051 slices (data memory, can is it can write ) two to read, they have each independent memory address space, dispose w

14、ay to be the same with general memory of computer. Procedure 8051 memory and 8751 slice procedure memory capacity 4KB, address begin from 0000H, used for preserving the procedure and form constant. Data 8051- 8751 8031 of memory data memory 128B, address false 00FH, use for middle result to deposit

15、operation, the data are stored temporarily and the data are buffered etc. In RAM of this 128B, there is unit of 32 byteses that can be appointed as the job register, this and general microprocessor is different, 8051 slice RAM and job register rank one formation the same to arrange the location. It

16、is not very the same that the memory of MCS-51 series one-chip computer and general computer disposes the way in addition. General computer for first address space, ROM and RAM can arrange in different space within the range of this address at will, namely the addresses of ROM and RAM, with distribu

17、ting different address space in a formation. While visiting the memory, corresponding and only an address Memory unit, can ROM, it can be RAM too, and by visiting the order similarly. This kind of memory structure is called the structure of Princeton. 8051 memories are divided into procedure memory

18、space and data memory space on the physics structure, there are four memory spaces in all: The procedure stores in one and data memory space outside data memory and one in procedure memory space and one outside one, the structure forms of this kind of procedure device and data memory separated form

19、data memory, called Harvard structure. But use the angle from users, 8051 memory address space is divided into three kinds: (1) In the slice, arrange blocks of FFFFH , 0000H of location , in unison outside the slice (use 16 addresses). (2) The data memory address space outside one of 64KB, the addre

20、ss is arranged from 0000H 64KB FFFFH (with 16 addresses ) too to the location. (3) Data memory address space of 256B (use 8 addresses). Three above-mentioned memory space addresses overlap, for distinguishing and designing the order symbol of different data transmission in the instruction system of

21、8051: CPU visit slice, ROM order spend MOVC , visit block RAM order uses MOVX outside the slice, RAM order uses MOV to visit in slice. 8051 one-chip computer have four 8 walk abreast I/O port, call P0, P1, P2 and P3. Each port is 8 accurate two-way mouths, accounts for 32 pins altogether. Every one

22、I/O line can be used as introduction and exported independently. Each port includes a latch (namely special function register ), one exports the driver and a introduction buffer . Make data can latch when outputting, data can buffer when making introduction , but four function of passway these self-

23、same. Expand among the system of memory outside having slice, four port these may serve as accurate two-way mouth of I/O in common use. Expand among the system of memory outside having slice, P2 mouth see high 8 address off; P0 mouth is a two-way bus, send the introduction of 8 low addresses and dat

24、a / export in timesharing Output grade , P3 of mouth , P1 of P1 , connect with inside have load resistance of drawing , every one of they can drive 4 Model LS TTL load to output. As while inputting the mouth, any TTL or NMOS circuit can drive P1 of 8051 one-chip computers as P3 mouth in a normal way

25、 . Because draw resistance on output grade of them have, can open a way collector too or drain-source resistance is it urge to open a way, do not need to have the resistance of drawing outerly . Mouths are all accurate two-way mouths too. When the conduct is input, must write the corresponding port

26、latch with 1 first . As to 80C51 one-chip computer, port can only offer milliampere of output electric currents, is it output mouth go when urging one ordinary basing of transistor to regard as, should contact a resistance among the port and transistor base , in order to the electricity while restra

27、ining the high level from exporting P1P3 Being restored to the throne is the operation of initializing of an one-chip computer. Its main function is to turn PC into 0000H initially , make the one-chip computer begin to hold the conduct procedure from unit 0000H. Except that the ones that enter the s

28、ystem are initialized normally,as because procedure operate it make mistakes or operate there aren't mistake, in order to extricate oneself from a predicament , need to be pressed and restored to the throne the key restarting too. It is an input end which is restored to the throne the signal in

29、8051 China RST pin. Restore to the throne signal high level effective , should sustain 24 shake cycle (namely 2 machine cycles ) the above its effective times. If 6 of frequency of utilization brilliant to shake, restore to the throne signal duration should exceed 4 delicate to finish restoring to t

30、he throne and operating. Produce the logic picture of circuit which is restored to the throne the signal:Restore to the throne the circuit and include two parts outside in the chip entirely. Outside that circuit produce to restore to the throne signal (RST ) hand over to Schmitt's trigger, resto

31、re to the throne circuit sample to output , Schmitt of trigger constantly in each S5P2 , machine of cycle in having one more , then just got and restored to the throne and operated the necessary signal insidly. Restore to the throne resistance of circuit generally, electric capacity parameter suitab

32、le for 6 brilliant to shake, can is it restore to the throne signal high level duration greater than 2 machine cycles to guarantee. Being restored to the throne in the circuit is simple, its function is very important. Pieces of one-chip computer system could normal running,should first check it can

33、 restore to the throne not succeeding. Checking and can pop one's head and monitor the pin with the oscillograph tentatively, push and is restored to the throne the key, the wave form that observes and has enough range is exported (instantaneous), can also through is it restore to the throne cir

34、cuit group holding value carry on the experiment to change.Telephone automatic alarm system Intelligent telephone alarm development Abstract: A single-chip microcomputer as the control core phone alarm. Use of the telephone network to transmit digital and voice messages, modern design, full-featured

35、, high reliability, easy to operate. This alarm is confidential departments, warehouse and home environment to achieve security of the site facilities. Key words: dual tone multi-frequency phone alarm to RISC the DTMF Introduction Since the reform and opening up in the process of urban development,

36、a large number of foreign population into the cities, a lot of pressure to the social order. Stolen for factories, offices and home, fire, looting; is particularly serious in some places, and staggering losses. Caused by the widespread concern of the public security departments attach great importan

37、ce and social circles. Some departments and residential area began to send people to guard during the day, night patrols, and have the purchase of protective iron gates, iron railings and passive preventive measures, the owner installed in the cage to safety. In the event of a police nature (such as

38、 fire or gas leak), only to find the cage firefighters at the scene outside, it is difficult to immediate relief, in fact drawbacks. From rectifying amenity point of view, also decency. To this end, the government departments to promote the adoption of high-tech means to achieve the technical precau

39、tions. In the practical needs of the social order and government departments to promote, market, domestic and imported anti-theft alarm came into being. To this end, our analysis, comparison of the internal structure and function of ten at home and abroad burglar alarm; combination of domestic condi

40、tions, developed conditions for the intelligent telephone alarm. Through unremitting efforts, has been a success. First, the overall design and technical requirements for the past, many units have been installed anti-theft alarm device, why are we still Stolen The reason why there are still people n

41、ot accustomed to the use of anti-theft alarm device Here relates to the functions of the machine, whether the reliability and machines in the course of simple and convenient, easy to program a series of problems. After a long investigation, technically a careful analysis that must meet the following

42、 technical requirements in order to achieve fully functional, easy to operate these two main objectives: (1) alarm sensitivity is higher, but also required to prevent false positives, we must A microcomputer monitor. It can analyze accident information from the sensors, to exclude false positive sig

43、nals due to the invasion of the small animals and other environmental interference signal. (2) the space distance between the site of the accident (alarm station) and call the object (receiving station) should be unrestricted. (3) voice and digital information can be in the same transmission channel

44、. Which transmission (digital or voice), to decide by the user. (4) due to different user environments, used in conjunction with the sensor type and quantity is not the same. For such a diverse user environment, machine set item would more (especially imports), causing the user to maneuver. To this

45、end, we had prepared well to adapt to reduced instruction set according to the order number of diverse user environment, enabling users to dial phone button, type the pre-programmed RISC serial number and the appropriate parameters to achieve a variety of programmed operation to adapt to different e

46、nvironmental requirements. User-programmed RISC like using a computer as simple and convenient, easy to accept. (5) the key data in the EEPROM firmware, procedures (such as user alarm phone number) can be temporarily modified in a telephone on the keyboard without the power-down is lost. (6) If for

47、some reason crashes should be able to resume normal operation automatically. The two technical measures to the above requirements is a daunting task but it is also necessary to achieve the target. To this end we are after long-term efforts, the following technical measures to achieve these goals: (1

48、) public telephone line as an information transmission media, not the radio. In this way, the machine subject to less interference, low false alarm rate, the use of a broader range. Any place of public telephone, alarm information can be reached from unrestricted. Take full advantage of the populari

49、ty of the advantages of the public telephone lines, the cost is greatly reduced. While simplifying the design, to improve reliability. (2) to send alarm information by voice or digital information, user-selectable. Brief and clear voice on the phone to listen to, easy to use. Conditional installatio

50、n place of the computer (such as the 110 center and unit security department), can also transmit digital signals for easy computer and alarm among digital communications. (3) The alarm has a dial to modify the circuit of the user's password can be very far away through the telephone line to modi

51、fy the password of their own home phone alarm, remote control alarm armed or disarmed operation. (4) install the watchdog circuit, for some reason crashes can automatically resume normal operation. (5) phone design, component selection and the connector installation process in line with the national

52、 "anti-theft alarm control technical conditions" (GB12663-90). (6) written in the EEPROM 9 RISC can be permanently saved after power failure. Users can set your own password, others can not use confidentiality. 9 Reduced Instruction (7) as follows: the user to set or modify passwords; the

53、user to set a phone number to call (up to 16 digits); the user to set a second phone number to call (up to 16 digit); the user to set the third phone number to call (up to 16 digits); the users to set the fourth call the telephone number (up to 16 digits); the set by the user 8 zone ( corresponds to

54、 8 sensors) armed or disarmed state; the user to set eight zone there is a sound alarm, or silent alarm (sound alarm is sounding the horn of the scene, to drive away intruders; silent alarm is silent scene, the sound from the telephone line single line sent to the called telephone, the outsiders can

55、 not hear); the user entry in paragraph 8 (corresponding to 8 sensors) voice, as a pre-alarm voice; the users through telephone dial-up operation, the alarm is armed or disarm. More than nine pre-programmed, numbered sequentially. Users simply dial telephone dial, you can choose a variety of operati

56、ons. These operations are as easy operation calculator. Third, the overall design of the circuit block diagram of a smart phone alarm design is completed, so the above technical requirements. The overall design of the circuit block diagram shown in Figure 1. Fourth, the main circuit 146 sensor signa

57、l input interface requirements for home security, should ensure that the monitored area (balconies, windows and doors, aisles, vaults, etc.) placed in the sensitive area of the sensor. Existing sensor products, such as infrared pyroelectric probe, the Doppler effect microwave probe, microwave - infr

58、ared complex with the probe for the detection of thieves invade very sensitive. Ion smoke detectors and semiconductor gas sensors used to monitor fires and gas leaks. Sensor products, most of the relay for signal output. The normally open relay contacts, alarm contacts closed. Sensor signal input in

59、terface circuit shown in Figure 2. Normal transistor collector output low; high output alarm. 8 transistors, respectively, from the 8-channel sensor signal sent to the 74F373 8 input for the CPU reads. 8 sensors is not filled to capacity, free transistor output low, does not alarm IN0 the IN7 respectively corresponding to the level signal from the eight sensors. 246 voice control and voice control of recording circuit recording circuit shown in Figure 3. ISD2575 chip for digital recording devices. Sound recording time up to 75s,. Continuous

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论