Software engineering and microprocessor systems

Assignment Help Computer Engineering
Reference no: EM131669

Software is required for a simple house burglar alarm system.

House Burglar Alarm Specification

A house has two rooms each of which have a PIR motion sensor. Each and every room has a security light. There is also a PIR sensor outside the front door, which becomes active when it is dark outside. There is a security light outside the front door. The security lights are switched on, and an audible alarm sounds under certain conditions.

If the outside PIR is triggered (i.e. it is dark, and motion is detected), an outside security light is switched on for 20 seconds. Any room sensor activated will trigger the light for (only) that room for 10 seconds. Both room sensors activated within 10 seconds will set off the audible alarm continuously.

The only way to stop the audible alarm is to input a correct PIN. If the correct PIN is input, the alarm system is de-activated, and becomes dormant (ready for further burglar detections). If an incorrect PIN is entered, a ‘first warning' is provided on an LCD panel.

If a further incorrect code is entered, the alarm remains on, the outside light flashes, and a message is sent to the police station. Entering the correct code at any time that the audible alarm is on will de-activate the alarm.

The STD shown in Figure is intended to reflect this requirement specification. Figure shows the hardware to be used for the implememntation and testing of the code.

Tasks. For the specification given:

1. Produce a Flowchart

2. Produce a working program

a. uses sensible labels in code, and is easy to read

b. uses correct inputs

c. generates correct LED outputs

d. generates correct LCD outputs

3. Produce report, presenting all above, readable to software/hardware engineer

4. A demonstration of the working program.

Reference no: EM131669

Questions Cloud

Bourne shell and design suitable functions : Bourne shell and design suitable functions
Net salvage value : Evaluate Net Salvage Value
Mergers and acquisitions : Track record of mergers and acquisitions
Present and defend the budget : Given a description of a new business, new product, service or project develop, present and defend the budget.
Software engineering and microprocessor systems : Software is required for a simple house burglar alarm system.
Financial statement analysis : Discuss at least 3 points which support your conclusion, and 1 of these points must relate to a competitor's financial performance
Depreciate assets : Are non-profit and governments required to depreciate assets
Expected net cash flows : Construct NPV profiles for Project A and B.
Expected rate of return : What is your expected rate of return over the one-month holding period?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a research report on design of a cisco router

Systems research and investigate novel ideas and applications.

  Examine the behavior of airfoil

Write HW assignment written in Matlab airfoils have different C mc/4

  Implementation of type data structures

How can string and word variable type data structures be implemented?

  Convert csv file into html file

Convert CSV file into HTML file

  Risk assessment of ict system

Risk Assessment of ICT System and Developing Computer Incident Response System on WAMP platform

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Write a recursive implementation of euclids algorithm

Write a recursive implementation of Euclids algorithm

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Security policy document project

Analyze security requirements and develop a security policy

  Calculate the component voltages

Input voltage will be a step voltage that is 0 volt before time t = 0 and V in

  Describe stages of the processor

Describe the decode stage and Describe the execution stage of add, andi, mul, divi, and neg.

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd