Microcomputer - controlled breadmaking machine, Computer Engineering

Assignment Help:

Q. Microcomputer - Controlled Breadmaking Machine?

Figure shows a simplified schematic diagram of a microcomputer-controlled breadmaking machine. A microcomputer along with its timing circuit, keypad, and display unit controls the heating resistor, fan motor, and bread-ingredient mixing motor by means of digitally activated switches. An analog temperature sensor, through an A/D converter, provides the status of temperature to themicrocomputer.Adigital timer circuit counts down, showing the time remaining in the process.

The control programs are stored in ROM and determine when and how long the machine should mix the ingredients added to the bread pan, when and how long the heating resistor should be turned on or off for various parts of the cycle, and when and how long the fan should be on to cool the loaf after baking is finished. The parameters such as light, medium, or dark bread crust are entered through the keypad into RAM.

383_Microcomputer - Controlled Breadmaking Machine.png

According to the programs stored and the parameters entered, the machine initially mixes the ingredients for several minutes. The heating resistor is turned on to warm the yeast, causing the dough to rise while a temperature of about 90°F is maintained. The time remaining and the temperature are continually checked until the baked loaf is cooled, and the finished bread is finally ready in about 4 hours.

Microprocessors and computers in various forms are used extensively in household appliances, automobiles, and industrial equipment.


Related Discussions:- Microcomputer - controlled breadmaking machine

Compare hypertext versus hypermedia, Compare hypertext versus hypermedia.  ...

Compare hypertext versus hypermedia.  Hypertext is basically similar as regular text - it can be stored, read, searched, or edited - with a significant except ion: hyper text h

What is public key cryptography, What is Public Key Cryptography? Pub...

What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared

Works flowing related technologies influence e-business, How the works do f...

How the works do flowing related technologies influence e-business? Work Flow related Technologies influence e-business: Microsoft CRM automates internal business process

Internet application development, As an employee of an up and coming web De...

As an employee of an up and coming web Design Company, you have been approached by a small local cinema, called Valley Viewing who are looking to revamp their existing HTML website

What are rdram, What are RDRAM? RDRAM are Rambus DRAM. Rambus needs spe...

What are RDRAM? RDRAM are Rambus DRAM. Rambus needs specially designed memory chips. These chips use cell arrays based on the standard DRAM technology. Multiple banks of cell a

Steps uesd in quine mckluskey method, Q. Steps uesd in quine mckluskey meth...

Q. Steps uesd in quine mckluskey method? Step I: Build a table in that every term of expression is represented in row (Expression must be in SOP form). Terms can be expres

Describe the fundamental characteristics of antennas, Question 1: (a) ...

Question 1: (a) Describe the two fundamental characteristics of antennas explaining in detail how it affects the security of wireless networks. (b) What is a wireless cli

Subtract the numbers using 1's complements, Subtraction 11001-10110 using 1...

Subtraction 11001-10110 using 1's complement Ans. 11001 - 10110 01001 is 1' s Compliment of 10110, so     1 1 0 0 1 +  0 1 0 0 1 ------------------    1 0 0 0 1 0    Add 1

Depth-first search is different from breadth-first search, Depth-first sear...

Depth-first search is different from Breadth-first search in the following ways: A depth search traversal method goes to the deepest level of the tree first and then works up w

Explain dataadapter control, Which method do you invoke on the DataAdapter ...

Which method do you invoke on the DataAdapter control to load  your generated dataset with data? dataAdapter.Fill(ds). The beauty of this method is  it automatically implicitly

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd