speech rec. report

Upload: mayurdhokiya

Post on 30-May-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Speech Rec. Report

    1/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    1. LITERATURE SURVEY:

    The Literature survey was conducted for the dissertation in all possible means

    through the media of Text Books, Reference books, and Data books, Technical magazinesand of course the powerful Information media of Internet.

    In this topic of Frequency Synthesizer Security System Using ARM7 we collected

    the information from all the above sources and compared the same with each other and

    also with our approach of communication and found that the method suggested in the

    Project is relatively with new concept and more accurate and automated with less manual

    intervention and hence easy to accept than the other conventional methods.

    We need to improve the usage and the utility of the same in the best possible

    manner. We need to analyses the problems faced by the customer and we should try to

    minimize the same so as to improve the total efficiency of the system.

    We are trying to build a standalone speaker dependent speech recognition circuit

    that may be interfaced to control just about anything electrical, such as; appliances, robots,

    test instruments, VCR's TV's, etc. The circuit is trained (programmed) to recognized

    words you want it to recognize. To control and command an appliance (computer, VCR,

    TV security system, etc.) by speaking to it, will make it easier, while increasing the

    efficiency and effectiveness of working with that device.

    The output of the system is displayed by the microprocessor on the seven segment

    display. The recognized voice is stored as the name of person. As the speech is recognized

    the persons name is shown.

    GFS G.C.O.E. Jalgaon 1

  • 8/9/2019 Speech Rec. Report

    2/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    2. INTRODUCTION:

    Speech recognition system means a system which when trained stores the words

    from the user and later on recognizes the words spoken by the user by comparing the

    words with those which were stored earlier while the system was trained. In the nearfuture, speech recognition will become the method of choice for controlling appliances,

    toys, tools, computers and robotics. There is a huge commercial market waiting for this

    technology to mature.

    We are trying to build a standalone speaker dependent speech recognition circuit

    that may be interfaced to control just about anything electrical, such as; appliances, robots,

    test instruments, VCR's TV's, etc. The circuit is trained (programmed) to recognized

    words you want it to recognize. To control and command an appliance (computer, VCR,

    TV security system, etc.) by speaking to it, will make it easier, while increasing the

    efficiency and effectiveness of working with that device.

    At its most basic level speech recognition allows the user to perform parallel tasks,

    (i.e. hands and eyes are busy elsewhere) while continuing to work with the computer or

    appliance.

    Speech recognition is classified into two categories, speaker dependent and

    speaker independent. The output of the system is displayed by the microprocessor on the

    seven segment display. The recognized voice is stored as the code of word.

    Speaker dependent :

    The individual who will be using the system trains these systems. These systems

    are capable of achieving a high command count and better than 95% accuracy for word

    recognition. The drawback to this approach is that the system only responds accurately

    only to the individual who trained the system. This is the most common approach

    employed in software for personal computers.

    Speaker independent :

    This is a system trained to respond to a word regardless of who speaks. Therefore

    the system must respond to a large variety of speech patterns, inflections and enunciation's

    of the target word. The command word count is usually lower than the speaker dependent

    however high accuracy can still be maintained within processing limits. Industrial

    requirements more often need speaker independent voice systems.

    GFS G.C.O.E. Jalgaon 2

  • 8/9/2019 Speech Rec. Report

    3/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    3. Basic Block Diagram:The basic Block Diagram of the system is shown below:

    MIC

    The blocks of the above block diagram are explained below:

    3.1 Microphone:

    This is the device which converts the sound signal to the electrical signal. The two plates

    are mounting apart at very low distance forms as a capacitor. The moving plate is

    connected to diaphragm. The diaphragm moves according to the sound waves which are

    strike on the diaphragm which result to change in current flow of the condenser mike. This

    output is applied to the amplifier section which is amplified by selective gain. The output

    current is a proportional to the sound signal striking on the diaphragm

    3.2 Amplifier:

    The voice signals from the microphone have very less amplitude about 0.1 mV. The signal

    from the microphone must be amplified with the help of an amplifier before can be given

    to the filter and the analog to digital converter. The amplifier must amplify the signal so

    that the voltage level of the signal rises to about 5 to 6 V so that it can be given to the

    analog to digital converter.

    Low Voltage Audio Power Amplifier: -

    General Description

    The LM386 is a power amplifier designed for use in low voltage consumer applications.

    The gain is internally set to 20 to keep external part count low, but the addition of an

    external resistor and capacitor between pins 1 and 8 will increase the gain to any value up

    to 200. The inputs are ground referenced while the output is automatically biased to one

    half the supply voltages. The quiescent power drain is only 24 mill watts when operating

    from a 6 volt supply, making the LM386 ideal for battery operation.

    GFS G.C.O.E. Jalgaon 3

    Filter SpeechProcessor

    ARM 7

    processorRelay drive

    unit

    Device

    under test

    Amplifier

    Power Supply

    Keypad

  • 8/9/2019 Speech Rec. Report

    4/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Features:

    Battery operation

    Minimum external parts

    Wide supply voltage range: 4V12V or 5V18V

    Low quiescent current drain: 4 mA Voltage gains from 20 to 200

    Ground referenced input

    Self-centering output quiescent voltage

    Low distortion

    Available in 8 pin MSOP package

    Applications:

    AM-FM radio amplifiers

    Portable tape player amplifiers Intercoms TV sound systems Line drivers Ultrasonic drivers Small servo drivers Power converters

    3.3 Filter:

    The range of the human speech is from 300 Hz to 3 KHz s in order to eliminate the stray

    noises and other sounds from the background along with the voice of the speaker.

    Therefore to do this here we are using a band pass filter with a pass band from 300 Hz to 3

    KHz.

    4. ARM 7 PROCESSOR UNIT:

    Introduction:

    The ARM7 is part of the Advanced RISC Machines (ARM) family of general

    purpose 32-bit microprocessors, which offer very low power consumption and price for

    high performance devices. The architecture is based on Reduced Instruction Set Computer

    (RISC) principles, and the instruction set and related decode mechanism are much simpler

    in comparison with micro programmed Complex Instruction Set Computers. This results

    GFS G.C.O.E. Jalgaon 4

  • 8/9/2019 Speech Rec. Report

    5/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    in a high instruction throughput and impressive real-time interrupt response from a small

    and cost-effective chip.

    The instruction set comprises eleven basic instruction types:

    Two of these make use of the on-chip arithmetic logic unit, barrel shifter and multiplier

    to perform high-speed operations on the data in a bank of 31 registers, each 32 bits wide.

    Three classes of instruction control data transfer between memory and the registers, one

    optimized for flexibility of addressing, another for rapid context switching and the third

    for swapping data.

    Three instructions control the flow and privilege level of execution.

    Three types are dedicated to the control of external coprocessors which allow the

    functionality of the instruction set to be extended off-chip in an open and uniform way.

    The ARM instruction set is a good target for compilers of many different high-levellanguages. Where required for critical code segments, assembly code programming is also

    straightforward, unlike some RISC processors which depend on sophisticated compiler

    technology to manage complicated instruction interdependencies. Pipelining is employed

    so that all parts of the processing and memory systems can operate continuously.

    Typically, while one instruction is being executed, its successor is being decoded, and a

    third instruction is being fetched from memory. The memory interface has been designed

    to allow the performance potential to be realized without incurring high costs in the

    memory system. Speed critical control signals are pipelined to allow system control

    functions to be implemented in standard low-power logic, and these control signals

    facilitate the exploitation of the fast local access modes offered by industry standard

    dynamic RAMs.

    ARM7 has a 32 bit address bus. All ARM processors share the same instruction set, and

    ARM7 can be configured to use a 26 bit address bus for backwards compatibility with

    earlier processors. ARM7 is a fully static CMOS implementation of the ARM which

    allows the clock to be stopped in any part of the cycle with extremely low residual power

    consumption and no loss of state.

    Features:

    Keil MCB2130 based design

    Removable Processor Board

    Small Size: 75mm*60mm

    ISP programming through inbuilt Booloader of LPC21XX series

    Power On/Off Switch

    GFS G.C.O.E. Jalgaon 5

  • 8/9/2019 Speech Rec. Report

    6/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    8 indicator led's with separate jumpers for enable/disable

    On board 3.3V regulator

    Rest and INT1 switches

    Potentiometer for ADC1

    JTAG standard port

    All port pins accessible through standard 8bit 10 pin connector

    4 DC motor driver interface with PWM.

    PWM for motor selectable through Jumpers

    Optional power pins through jumpers to reduce power consumption

    Capacitor filters at all power pins to reduce glitches

    DTR, RTS signals for reset and boot loader enter point

    Dual UART interface UART0 & UART1

    UART0/Programmer selection switch on ISP Programmer

    Simple 8 wire interface

    Compatible with LPC2138 development board Programmer compatible with Flash magic, LPC21ISP & LPC2000 flash utility (NXP)

    Benefits:

    Generic layout can be ported to specific process technologies.

    Unified memory bus simplifies SoC integration process.

    ARM and Thumb instructions sets can be mixed with minimal overhead to support

    application requirements for speed and code density.

    Code written for ARM7TDMI-S is binary-compatible with other members of the

    ARM7 Family and forwards compatible with ARM9, ARM9E and ARM10

    families, thus it's quite easy to port your design to higher level microcontroller or

    microprocessor.

    Static design and lower power consumption are essential for battery -powered

    devices.

    Instruction set can be extended for specific requirements using coprocessors.

    Embedded ICE-RT and optional ETM units enable extensive, real-time debug

    facilities.

    5. An Introduction to Speech Recognition:

    Have you ever talked to your computer? (And no, yelling at it when your Internet

    connection goes down or making polite chit-chat with it as you wait for all 25MB of that

    very important file to download doesn't count). We mean, have you really, really talked to

    your computer? Where it actually recognized what you said and then did something as a

    result? If you have, then you've used a technology known as speech recognition.

    GFS G.C.O.E. Jalgaon 6

  • 8/9/2019 Speech Rec. Report

    7/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    VoiceXML takes speech recognition even further. Instead of talking to your

    computer, you're essentially talking to a web site, and you're doing this over the phone.

    OK, you say, well, what exactly is speech recognition? Simply put, it is the process of

    converting spoken input to text. Speech recognition is thus sometimes referred to as

    speech-to-text.

    Speech recognition allows you to provide input to an application with your voice.

    Just like clicking with your mouse, typing on your keyboard, or pressing a key on the

    phone keypad provides input to an application, speech recognition allows you to provide

    input by talking. In the desktop world, you need a microphone to be able to do this. In the

    VoiceXML world, all you need is a telephone. For example, you might say something

    like "checking account balance", to which your bank's VoiceXML application replies "one

    million, two hundred twenty-eight thousand, six hundred ninety eight dollars and thirty

    seven cents." (We can dream, can't we)? Or, in response to hearing "Please say coffee, tea,

    or milk," you say "coffee" and the VoiceXML application you're calling tells you what theflavor of the day is and then asks if you'd like to place an order.

    Terms and Concepts

    Following are a few of the basic terms and concepts that are fundamental to speech

    recognition. It is important to have a good understanding of these concepts when

    developing VoiceXML applications.

    5.1 Utterances:

    When the user says something, this is known as an utterance. An utterance is anystream of speech between two periods of silence. Utterances are sent to the speech engine

    to be processed. Silence, in speech recognition, is almost as important as what is spoken,

    because silence delineates the start and end of an utterance. Here's how it works. The

    speech recognition engine is "listening" for speech input. When the engine detects audio

    input - in other words, a lack of silence -- the beginning of an utterance is signaled.

    Similarly, when the engine detects a certain amount of silence following the audio, the end

    of the utterance occurs.

    Utterances are sent to the speech engine to be processed. If the user doesnt say

    anything, the engine returns what is known as a silence timeout - an indication that there

    was no speech detected within the expected timeframe, and the application takes an

    appropriate action, such as re-prompting the user for input.

    An utterance can be a single word, or it can contain multiple words (a phrase or a

    sentence). For example, checking, checking account, or Id like to know the balance

    of my checking account please are all examples of possible utterances - things that a

    GFS G.C.O.E. Jalgaon 7

  • 8/9/2019 Speech Rec. Report

    8/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    caller might say to a banking application written in VoiceXML. Whether these words and

    phrases are valid at a particular point in a dialog is determined by which grammars are

    active (See "Grammars"). Note that there are small snippets of silence between the words

    spoken within a phrase. If the user pauses too long between the words of a phrase, the end

    of an utterance can be detected too soon, and only a partial phrase will be processed by the

    engine.

    5.2 Pronunciations:

    The speech recognition engine uses all sorts of data, statistical models, and

    algorithms to convert spoken input into text. One piece of information that the speech

    recognition engine uses to process a word is its pronunciation, which represents what the

    speech engine thinks a word should sound like. Words can have multiple pronunciations

    associated with them. For example, the word the has at least two pronunciations in the

    U.S. English language: thee and thuh. As a VoiceXML application developer, you

    may want to provide multiple pronunciations for certain words and phrases to allow forvariations in the ways your callers may speak them.

    5.3 Grammars:

    As a VoiceXML application developer, you must specify the words and phrases

    that users can say to your application. These words and phrases are defined to the speech

    recognition engine and are used in the recognition process. You can specify the valid

    words and phrases in a number of different ways, but in VoiceXML, you do this by

    specifying a grammar. A grammar uses a particular syntax, or set of rules, to define the

    words and phrases that can be recognized by the engine. A grammar can be as simple as alist of words, or it can be flexible enough to allow such variability in what can be said that

    it approaches natural language capability. Grammars define the domain, or context, within

    which the recognition engine works. The engine compares the current utterance against

    the words and phrases in the active grammars. If the user says something that is not in the

    grammar, the speech engine will not be able to decipher it correctly.

    Lets look at a specific example: Welcome to VoiceXML Bank. At any time, say main

    menu to return to this point. Choose one: accounts, loans, transfers, or exit. The grammar

    to support this interaction might contain the following words and phrases:

    accounts account balances

    my account information

    loans

    loan balances

    my loan information

    transfers

    GFS G.C.O.E. Jalgaon 8

  • 8/9/2019 Speech Rec. Report

    9/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    exit

    help

    In this grammar, you can see that there are multiple ways to say each command.

    You can define a single grammar for your application, or you may have multiple

    grammars. Chances are, you will have multiple grammars, and you will activate each

    grammar only when it is needed.

    You can imagine that you want to put careful thought into the design of application

    grammars. They can be as restrictive or as flexible as your users and application needs it

    to be. Of course, there are tradeoffs between recognition speed (response time) and

    accuracy versus the size of your grammar(s). You may want to experiment with different

    grammar designs to validate one that best matches the requirements and expectations of

    your users.

    5.4 Speaker Dependence vs. Speaker Independence:

    Speaker dependence describes the degree to which a speech recognition system

    requires knowledge of a speakers individual voice characteristics to successfully process

    speech. The speech recognition engine can learn how you speak words and phrases; it

    can be trained to your voice.

    Speech recognition systems that require a user to train the system to his/her voice

    are known as speaker-dependent systems. If you are familiar with desktop dictation

    systems, most are speaker dependent. Because they operate on very large vocabularies,

    dictation systems perform much better when the speaker has spent the time to train the

    system to his/her voice.

    Speech recognition systems that do not require a user to train the system are

    known as speaker-independent systems. Speech recognition in the VoiceXML world

    must be speaker-independent. Think of how many users (hundreds, maybe thousands) may

    be calling into your web site. You cannot require that each caller train the system to his or

    her voice. The speech recognition system in a voice-enabled web application MUST

    successfully process the speech of many different callers without having to understand theindividual voice characteristics of each caller.

    5.5 Accuracy:

    The performance of a speech recognition system is measurable. Perhaps the most

    widely used measurement is accuracy. It is typically a quantitative measurement and can

    be calculated in several ways. Arguably the most important measurement of accuracy is

    whether the desired end result occurred. This measurement is useful in validating

    GFS G.C.O.E. Jalgaon 9

  • 8/9/2019 Speech Rec. Report

    10/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    application design. For example, if the user said "yes," the engine returned "yes," and the

    "YES" action was executed, it is clear that the desired end result was achieved. But what

    happens if the engine returns text that does not exactly match the utterance? For example,

    what if the user said "nope," the engine returned "no," yet the "NO" action was executed?

    Should that be considered a successful dialog? The answer to that question is yes because

    the desired end result was achieved.

    Another measurement of recognition accuracy is whether the engine recognized

    the utterance exactly as spoken. This measure of recognition accuracy is expressed as a

    percentage and represents the number of utterances recognized correctly out of the total

    number of utterances spoken. It is a useful measurement when validating grammar design.

    Using the previous example, if the engine returned "nope" when the user said "no," this

    would be considered a recognition error. Based on the accuracy measurement, you may

    want to analyze your grammar to determine if there is anything you can do to improve

    accuracy. For instance, you might need to add "nope" as a valid word to your grammar.You may also want to check your grammar to see if it allows words that are acoustically

    similar (for example, "repeat/delete," "Austin/Boston," and "Addison/Madison"), and

    determine if there is any way you can make the allowable words more distinctive to the

    engine.

    Recognition accuracy is an important measure for all speech recognition

    applications. It is tied to grammar design and to the acoustic environment of the user. You

    need to measure the recognition accuracy for your application, and may want to adjust

    your application and its grammars based on the results obtained when you test your

    application with typical users.

    5.6 How it works:Now that we've discussed some of the basic terms and concepts involved in speech

    recognition, let's put them together and take a look at how the speech recognition process

    works.

    As you can probably imagine, the speech recognition engine has a rather complex task to

    handle, that of taking raw audio input and translating it to recognized text that an

    application understands. As shown in the diagram below, the major components we want

    to discuss are:

    Audio input

    Grammar(s)

    Acoustic Model

    Recognized text

    GFS G.C.O.E. Jalgaon 10

  • 8/9/2019 Speech Rec. Report

    11/116

  • 8/9/2019 Speech Rec. Report

    12/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    confidence score along with the text to indicate the likelihood that the returned text is

    correct.

    Not all utterances that are processed by the speech engine are accepted. Acceptance or

    rejection is flagged by the engine with each processed utterance.

    6. RELAY DRIVE UNIT:

    In this unit we use the two relay drive ckt. to drive the 2 relays. One is operating at

    12v and another is operating at 5v. Here we use the electromagnetic relay. The 5v relay is

    the type of Single Pole Double Through (SPDT) and 12v relay is the type of Double Pole

    Double Through (DPDT).

    5v relay will give the further supply to the door lock system. Which will on/off themotor of door lock system. Now 12v relay is used to open or close the door. It means it

    give the direction to the door by respective signal coming from the ARM7 unit.

    7. DEVICE UNDER TEST:

    In this unit u can connect any device which u want to on/off or open/close by using

    output of the relay. Here we use the door lock system which will open if the recognition is

    match by the system and automatically closed after some time delay.

    GFS G.C.O.E. Jalgaon 12

  • 8/9/2019 Speech Rec. Report

    13/116

  • 8/9/2019 Speech Rec. Report

    14/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    8.2 ARM7 PROCESSOR UNIT:

    GFS G.C.O.E. Jalgaon 14

  • 8/9/2019 Speech Rec. Report

    15/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    8.3 RELAY DRIVE UNIT:

    8.4 POWER SUPPLY:

    GFS G.C.O.E. Jalgaon 15

  • 8/9/2019 Speech Rec. Report

    16/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    9. Circuit Description:The project is based on the ARM LPC2148, This is the highly integrated

    processor. The heart of the project is two blocks speech processing and recognition unit

    and ARM Microprocessor LPC2148. First time, when the circuit is turned on, the

    HM2007 checks the static RAM. If everything checks out the board displays "00" on the

    digital display and lights the red LED (READY). It is in the "Ready waiting for a

    command.

    To Train:

    To train the circuit begins by pressing the word number you want to train on the

    keypad. The circuit can be trained to recognize up to 40 words. Use any numbers between

    1 and 40. For example press the number "1" to train word number 1. When you press the

    number(s) on the keypad the red led will turn off (status). The number is displayed on thedigital display. Next press the "TRAIN" key for train. When the "Train (SW13)" key is

    pressed it signals the chip to listen for a training word and the red led turns back on.

    Now speak the word you want the circuit to recognize into the microphone clearly.

    The LED should blink off momentarily; this is a signal that the word has been accepted.

    Continue training new words in the circuit using the procedure outlined above. Press the

    "2" key then "TRAIN (SW13)" key to train the second word and so on. The circuit will

    accept up to forty words. You do not have to enter 40 words into memory to use the

    circuit. If you want you can use as many word spaces as you want. Testing Recognition

    the circuit is continually listening. Repeat a trained word into the microphone. The numberof the word should be displayed on the digital display. For instance if the word "directory"

    was trained as word number 25. Saying the word "directory" into the microphone will

    cause the number 25 to be displayed.

    The output of the speech recognition processor i.e. HM2007 is directly available in

    eight bit form is available in parallel form. It is fed to the buffer IC 74ls373. This IC is a

    bidirectional data bus driver IC. This prevents the loading of the external circuit on the

    HM2007.

    That output signal is read by the arm microprocessor, connected at the pins p1.0 to

    1.7 and the data is compared by the microprocessor and if it matches the output at the p0.0

    is turned high to operate the relay driver card to operated the relay which turns on the

    motor and also high signal at the pin p0.1 operates the motor in anti-clock wise direction

    and this opens the gate by making the mechanism to operate and after waiting for some

    time the motor turns to operated in clock wise direction and switches off.

    GFS G.C.O.E. Jalgaon 16

  • 8/9/2019 Speech Rec. Report

    17/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    If the spoken word is not matched then the 7 segment display shows the error code

    as given below. It instructs the operator about the present status. In that case they get

    remains closed.

    Error Codes

    The chip provides the following error codes:

    55 = word too long

    66 = word too short

    77 = word no match

    10. CIRCUIT DESIGN:

    10.1 Power Supply:

    For our all IC we require 5V D.C. supply which can be generated by step down

    transformer, full wave bridge rectifier, filter condenser & voltage regulator IC7805. 12V

    supply for relay is generated separately using the same procedure as above.

    Design Details: -

    Power supply design

    Power supply is the first and the most important part of our project. For our project

    we require +5V regulated power supply with maximum current rating 500mA Following

    basic building blocks are required to generate regulated power supply.

    Step Down Transformer: -

    Step down transformer is the first part of regulated power supply. To step down themains 230V A.C. we require step down transformer. Following are the main characteristic

    of electronic transformer.

    Power transformers are usually designed to operate from source of low impedance at a

    single freq. It is required to construct with sufficient insulation of necessary dielectric

    strength.

    GFS G.C.O.E. Jalgaon 17

    Step-down

    transformer Rectifier

    Filter

    Ckt.Three

    Terminal

    Voltage reg.

    Regulated O/PVoltage

    Mains 230 V

    A.C.

  • 8/9/2019 Speech Rec. Report

    18/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Transformer ratings are expressed in voltamp. The volt-amp of each secondary winding

    or windings are added for the total secondary VA. To this are added the load losses.

    Temperature rise of a transformer is decided on two well-known factors i.e. losses on

    transformer and heat dissipating or cooling facility provided unit.

    10.2 Rectifier Unit:

    Rectifier unit is a ckt. which converts A.C. into pulsating D.C. Generally semi-

    conducting diode is used as rectifying element due to its property of conducting current in

    one direction only. Generally there are two types of rectifier.

    Half wave rectifier

    Full wave rectifier

    In half wave rectifier only half cycle of mains A.C. is rectified so its efficiency is very

    poor. So we use full wave bridge type rectifier, in which four diodes are used. In each half

    cycle, two diodes conduct at a time and we get maximum efficiency at o/p.

    Following are the main advantages and disadvantages of a full-wave bridge type rectifier

    ckt.

    Advantages: -

    1) The need of center tapped transformer is eliminated.

    2) The o/p is twice that of center tap circuit for the same secondary voltage.

    3) The PIV rating of diode is half of the center tap circuit.

    Disadvantages: -

    It requires four diodes. As during each half cycle of A.C. input, two diodes are

    conducting therefore voltage drop in internal resistance of rectifying unit will be twice as

    compared to center tap circuit.

    10.3 Filter Circuit:

    Generally a rectifier is required to produce pure D.C. supply for using at various

    places in the electronic circuit. However, the o/p of rectifier has pulsating character i.e. if

    such a D.C. is applied to electronic circuit it will produce a hum i.e. it will contain A.C.

    and D.C. components. The A.C. components are undesirable and must be kept away from

    the load. To do so a filter circuit is used which removes (or filters out) the A.C.

    components reaching the load. Obviously a filter circuit is installed between rectifier and

    voltage regulator. In our project we use capacitor filter because of its low cost, small size

    and little weight and good characteristic. Capacitors are connected in parallel to the

    rectifier o/p because it passes A.C. but does not pass D.C. at all.

    GFS G.C.O.E. Jalgaon 18

  • 8/9/2019 Speech Rec. Report

    19/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    10.4 Three terminal voltage regulators:

    A voltage regulator is a ckt. that supplies constant voltage regardless of change in

    load current. IC voltage regulators are versatile and relatively cheaper. The 7800 seriesconsists of three terminal positive voltage regulator. These ICs are designed as fixed

    voltage regulator and with adequate heat sink, can deliver o/p current in excess of 1A.

    These devices do not require external component. This IC also has internal thermal

    overload protection and internal short circuit and current limiting protection. For our

    project we use voltage regulator ICs 7812 & 7805.

    10.5 Design of Step down Transformer:

    The following information must be available to the designer before he commences for the

    design of transformer. Power Output. Operating Voltage.

    Frequency Range. Efficiency and Regulation.

    Size of core

    Size of core is one of the first considerations in regard of weight and volume of

    transformer. This depends on type of core and winding configuration used. Generally

    following formula is used to find area or size of core.

    P1

    Ai = -----------

    0.87

    Ai = Area of cross - section in Sq. cm. and

    P1 = Primary voltage.

    In transformer P1 = P2

    For our project we required +5V regulated output. So transformer secondary rating is 12V,

    4A

    So secondary power wattage is,

    P2 = 12 x 4 w.

    = 48w

    48

    GFS G.C.O.E. Jalgaon 19

  • 8/9/2019 Speech Rec. Report

    20/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    = 0.87

    = 7.427

    Generally 10% of area should be added to core to accommodate all turns for low Iron

    losses and compact size.

    So Ai = 8.1697

    Turns per volt of transformer are given by relation

    10,000

    Turns / Volt = ---------------------

    4.44 f Bm Ai

    Here, F = the frequency in Hz

    Bm = flux density in Wb/m2

    Ai = net area of cross section.

    Following table gives the value of turns per volt for 50 Hz frequency.

    Flux density Wb/m2 1.14 1.01 0.91 0.83 0.76

    Turns per volt 40/Ai 45/Ai 50/Ai 55/Ai 60/Ai

    Generally lower the flux density better be quality of transformer.

    For project for 50 Hz the turns per Volt for 0.91 Wb/m2 from above table.

    Turns per Volt = 50 / Ai

    = 50 / 8.1697

    6.13Thus for Primary winding = 220 x 6.13 = 1346.43.

    & for Secondary winding = 12 x 6.13 = 74

    Wire size

    As stated above size depends upon the current to be carried out by the winding, which

    depends upon current density of 3.1 A/mm2. For less copper losses 1.6 A/mm2 or 2.4

    A/mm2 may be used. Generally even size guage of wire are used.

    Rectifier Design

    GFS G.C.O.E. Jalgaon 20

  • 8/9/2019 Speech Rec. Report

    21/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    R.M.S. Secondary voltage at secondary of transformer is 12V.

    So maximum voltage Vm across Secondary is

    = Rms. Voltage x 2= 12 x 2

    = 16.97D.C. O/p Voltage at rectifier O/p is

    2 Vm

    Vdc = ----------

    2 x 16.97

    = -----------------------

    = 10.80 V

    PIV rating of each diode is

    PIV = 2 Vm.

    = 2 x 16.97

    = 34 V

    & maximum forward current which flow from each diode is 500mA.

    So from above parameter we select diode IN 4007 from diode selection manual.

    Design of Filter Capacitor

    Formula for calculating filter capacitor is,

    1

    C = ----------------------

    43 r f RL.

    Here r = ripple present at o/p of rectifier.

    (Which is maximum 0.1 for full wave rectifier)

    f = frequency of mains A.C.

    RL = I/p impedance of voltage regulator IC.

    1C = ------------------------------

    43 x 0.1 x 50 x 28

    = 1030 f 1000 f.

    GFS G.C.O.E. Jalgaon 21

  • 8/9/2019 Speech Rec. Report

    22/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    And voltage rating of filter capacitor is double of Vdc i.e. rectifier o/p which is 20V. So

    we choose 1000 f / 25V filter capacitor.

    IC 7812 (Voltage Regulator IC)

    Specifications: -Available o/p D.C. Voltage = +12V.

    Line Regulation = 0.03

    Load Regulation = 0.5

    Vin maximum = 35 V

    Ripple Rejection = 66-80 (db)

    IC 7805 (Voltage Regulator IC)

    Specifications: -

    Available o/p D.C. Voltage = + 5V.

    Line Regulation = 0.03Load Regulation = 0.5

    Vin maximum = 35 V

    Ripple Rejection = 66-80 (db)

    Technical Details

    IC 78XX (Voltage Regulator IC)

    OUTPUT CURRENT UP TO 1.5 A

    OUTPUT VOLTAGESOF 5; 5.2; 6; 8; 8.5; 9; 12; 15; 18; 24V THEOVERLOADPROTECTION SHORT CIRCUIT PROTECTION OUTPUT TRANSITION SOA PROTECTION

    10.6 DESCRIPTION:

    The L7800 series of three-terminal positive regulators is available in TO-220 TO-

    220FP TO-3 and D2PAK packages and several fixed output voltages, making it useful in a

    wide range of applications. These regulators can provide local on-card regulation,

    eliminating the distribution problems associated with single point regulation. Each type

    employs internal current limiting, thermal shut-down and safe area protection, making it

    essentially indestructible. If adequate heat sinking is provided, they can deliver over 1A

    output current. Although designed primarily as

    GFS G.C.O.E. Jalgaon 22

    1 2 3

    1 2 3

  • 8/9/2019 Speech Rec. Report

    23/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 23

  • 8/9/2019 Speech Rec. Report

    24/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Electrical Characteristic: -

    GFS G.C.O.E. Jalgaon 24

  • 8/9/2019 Speech Rec. Report

    25/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    11. CIRCUIT LAYOUT:

    GFS G.C.O.E. Jalgaon 25

  • 8/9/2019 Speech Rec. Report

    26/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    11.1 SPEECH UNIT LAYOUT:

    GFS G.C.O.E. Jalgaon 26

  • 8/9/2019 Speech Rec. Report

    27/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    11.2 ARM7 UNIT LAYOUT:

    GFS G.C.O.E. Jalgaon 27

  • 8/9/2019 Speech Rec. Report

    28/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    11.3 POWER SUPPLY LAYOUT: -

    11.4 KEYPAD LAYOUT:

    11.5 RELAY DRIVE UNIT LAYOUT:

    GFS G.C.O.E. Jalgaon 28

  • 8/9/2019 Speech Rec. Report

    29/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    12. PCB Designing and Fabrication:

    Introduction to printed circuit boards:It is called PCB in short; printed circuit pattern applied to one or both sides of an

    insulating base, depending upon that, and it is called single sided PCB or double-sided

    PCB. Conductor materials available are silver, brass, aluminum and copper; copper is

    most widely used which is used here as well. The thickness of conducting material

    depends on the current carrying capacity of the circuit.

    The printed circuit board usually serves three functions:

    It provides mechanical support to the components mounted on it. It provides necessary electrical interconnection.

    It acts as heat sink, i.e., it provides a conduction path leading to removal of most ofthe heat generated in the circuit.

    Cu clad:

    The base of laminate is either paper of glass fiber cloth. Cu foil, which is produced

    by the method of electroplating, is placed on laminate and both are kept under hydraulic

    pressure for proper adhesive pressure for proper adhesive. These Cu clad are easily

    available in the market.

    Types of Laminates:National Electrical Manufactures Association (NEMA) has various grades of

    laminates that are obtained by different resins and filters.

    Phenol:

    Phenol and Formaldehyde produce phenolic paper base laminate it has phenolic

    resins with proper filter. This is Brown in color and opaque. Disadvantage is poor

    moisture resistance.

    Epoxy Laminates:Epoxy paper that is also paper based but impregnated with epoxy resin, yellowish

    white and translucent.

    Epoxy Glass:

    GFS G.C.O.E. Jalgaon 29

  • 8/9/2019 Speech Rec. Report

    30/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    This base material has high mechanical strength and good electrical properties

    usually green in color and semitransparent. There are a variety of laminates available. We

    have selected Fiber Glass epoxy laminate.

    PCB fabrication includes following steps:

    Layout of the circuit Artwork designing Printing Etching Drilling

    Mounting of components and soldering Finishing

    Layout:

    The layout of a PCB has to incorporate all the board before one can go onto the all

    work preparation. Detailed circuit diagram, the design concept and the philosophy behind

    the equipment are very important for the layout.

    Layout Scale:

    Depending on the accuracy required artwork should be produced at a 1:1 or 2:1 or

    even 4:1 scale. The layout is best prepared on the same scale as the artwork to prevent the

    entire problem, which might be caused by redrawing of the layout to the artwork scale.

    The layout/ artwork scale commonly applied is 2:1 with a 1:1 scale, no demanding single

    sided boards can be designed but sufficient care should be taken, particularly during theartwork preparation.

    Procedure:

    The first rule is to replace each and every PCB layout as viewed from the

    component side. This rule must be strictly followed to avoid confusion, which would

    otherwise be caused.

    Another important rule is not to start the designing of a layout unless an absolutely clear

    circuit diagram is available.

    Among the components, the larger ones are placed first and the space in between is filled

    with smaller ones. Components requiring input/output connecting come near the

    connector. All components are placed in such a manner that de-soldering of other

    components is not necessary if they have to be replaced.

    Layout sketch:

    GFS G.C.O.E. Jalgaon 30

  • 8/9/2019 Speech Rec. Report

    31/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    The end product of the layout designing is the pencil sketched component and

    conductor drawing which is caller layout sketched. It contains all the information for the

    preparation of the network.

    Component holes:

    In a given, PCB most all the holes required are one particular diameter. Holes of a

    different are shown with a code in the actual layout sketch.

    Conductor Holes:

    A code can be used for the conductor with a special width. Minimum spacing

    should also be provided.

    A) Holes B) Conductor Widths

    Standard holes Standard width, 0.5 mm

    1.1 mm 1 mm

    1.5 mm 2 mm3.2 mm 4 mm

    Artwork:

    The generation of PCB artwork should be considered as the first step of the PCB

    manufacturing process. The importance of a prefect artwork should not be under

    estimated. Problems like inaccurate registered, broken annular rings or too critical spacing

    are often due to bad artwork. And even with the most sophisticated PCB production

    facilities, PCB can be made better than the quality of the artwork used.

    Basic Approaches:

    For ink drawing on white cardboard paper, good quality Indian ink and ink-pen set

    are minimum requirements.

    Drawing practice ---drawing procedure is very at-least by 0.1 0.2, and solder pad

    locations. And conductors can be easily displaced by 0.3 0.5 mm

    Screen Printing:

    The process of screening printing is well known to the printing industry because of

    its inherent capabilities of printing a wide range of inks on almost any kind of surface

    including glass, metal, plastic fabrics etc.Found their way into an extremely broad field of applications.

    Screen-printing offers the advantage of wide control on the ink deposition, thickness

    though the selection of suitable mass density and composition. In the production of PCBs,

    it is successfully employed in printing of

    Etch resists Plate resists

    GFS G.C.O.E. Jalgaon 31

  • 8/9/2019 Speech Rec. Report

    32/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Solder stop lacquers Notation printing

    In its basic form, the screen-printing process is very simple. A screen fabric with uniform

    meshes and opening is stretched and fixed on a solid frame of metal or wood. The circuit

    pattern area open, while the meshes in the rest of the area is closed. In the actual printingstep, ink is forced by the moving squeeze thorough the open meshes onto the surface of

    the material to be printed. The ink deposition, in a magnified cross section, shows the

    shape of a trapezoid.

    Pattern transfer onto the Screen:

    There are two different methods in use, and each method has its own advantages

    and disadvantages. With the direct method, the screen is prepared by coating a

    photographic emulsion directly onto the screen fabric and exposing it in the pattern area.

    The indirect method makes use of a separate screen process film, supported on a backing

    sheet. The film on its backing sheet that is there after pressed onto the screen fabric and

    sticks there. Finally, the backing sheet is peeled off, opening all those screen meshes,which are not covered by the film pattern.

    The direct method provides very durable screen stencils with a higher dimensional

    accuracy but the finest details are not reproduced. The indirect method is more suitable for

    smaller series and where the finest details to be reproduced. The indirect method is faster

    but dimensionally less accurate and the screen stencils are less durable, more sensitive to

    mechanical damages and interruption in printing.

    Etching:

    In all subtractive PCB process, etching is one of the most important steps. The

    final copper pattern is formed by selective removal of all the unwanted copper, which is

    not protected by an etching unit.

    Solutions, which are used in etching process, are known as enchants.

    Ferric Chloride Cupric Chloride Chromic Acid Alkaline Ammonia.

    Of these Ferric Chloride is widely used because it has short etching time and it can bestored for a long time. Etching of PCBs as required in modern electronic equipment

    production is usually done in spray type etching machines. Tank or bubble etching, in

    which the boards kept in tank, were lowered and fully immersed into the agitated, has

    almost disappeared.

    Component Mounting:

    GFS G.C.O.E. Jalgaon 32

  • 8/9/2019 Speech Rec. Report

    33/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Careful mounting of components on PCB increases the reliability of assembly.

    The leads must be cleaned before they are inserted in PCB holes. Asymmetric lead

    bending must be avoided; the ENT leads must fit into holes properly so that they can be

    soldered.

    When space is to be saved then vertical mounting is to be preferred. The vertical leads

    must have an insulating sleeve. Where jumper wire crosses over conductors, they must be

    insulated. For mounting of PCBs, TO5, DIP packages special jigs must be used of easy

    insertion. While mounting transistors, each lead must insulating sleeve. All the flat radial

    components such as resistors, diodes and inductors are mounted and soldered. Then IC

    bases are soldered. The vertical components such as transistors, gang condenser and FET

    are mounted & soldered.

    Soldering:

    The next process after the component mounting is soldering; solder pint isachieved by heating the solder and base metal about the melting point of the solders used.

    The necessary heat depends upon:

    The nature and type of joints

    Melting temperature of solder Flux

    Soldering techniques are of so many types but we are using iron soldering.

    Iron soldering:

    Soldering iron consists of an insulating handle connected through a metal shaft, ofa bit accurately makes contact with the component parts of the joint and solder and heats

    them up. The electrical heating element is located in the hollow shank or handles to heat

    the bit.

    Functions of the Bit:

    It stored heat and convey it from the heat source to the work. It may be required to

    store surplus solder from the joint. It may be required to store molten solder and flux to

    the work. The surface must be lined and wetted; this encourages flow of solder into the

    joint. When the surface of the work becomes tested by the solder, a continuous flow ofliquid metal between the bit and the work provides a path of high thermal conductivity

    through which heat can flow into the work piece.

    Solder bit are made up of copper; this metal has good wetting property, heat capability and

    thermal conductivity. Tin-lead solder affects copper during soldering operation.

    Production of copper bit can be made with thick iron coating followed by Ni/Tin plating.

    GFS G.C.O.E. Jalgaon 33

  • 8/9/2019 Speech Rec. Report

    34/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    The life of the bit is increased by a factor of 10 to 15. Solder irons are specified in terms of

    wattage. Depending on heat input intended for working and types of work ( continuous or

    individual) the choice of the solder iron can be made.

    Procedure of Soldering:

    The points to be joined must be cleaned first and fluxed. The hard solder iron and

    solder wire is applied to the work. The melted solder becomes bright and fluid. The iron

    must be removed after sufficient time and joint is allowed to coal.

    At the end, finishing is done.

    PCB, designing using computer aided designing (CAD):

    CAD has many advantages over manual designing, important among then is:

    Changes can be easily made because we dont have to erase our pencil work on paper

    repeatedly. Time is saved. Before taking printout we can have preview of the design etc.

    GFS G.C.O.E. Jalgaon 34

  • 8/9/2019 Speech Rec. Report

    35/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    13. FLOWCHART:

    GFS G.C.O.E. Jalgaon 35

    Switch on the power to alldevices

    Reset the system to start from initial

    Select audio mode and take speech

    sample

    Move data to temp.

    storage device

    Display system

    feedback on display

    & switch to standbymode

    Take sample of new speech

    Compare speech using

    ARM processor

  • 8/9/2019 Speech Rec. Report

    36/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    NO

    YES

    14. SOFTWARE SECTION:

    SOURCE CODE:

    /***********************************************************************

    * speech_main.c

    ************************************************************************/

    #include

    #include

    #define printf q_printf

    #include

    #define BIT0 0x00000001#define BIT1 0x00000002

    #define BIT2 0x00000004

    #define BIT3 0x00000008

    #define BIT4 0x00000010

    #define BIT5 0x00000020

    #define BIT6 0x00000040

    #define BIT7 0x00000080

    #define BIT8 0x00000100

    #define BIT9 0x00000200

    #define BIT10 0x00000400#define BIT11 0x00000800

    #define BIT12 0x00001000

    #define BIT13 0x00002000

    #define BIT14 0x00004000

    #define BIT15 0x00008000

    #define BIT16 0x00010000

    GFS G.C.O.E. Jalgaon 36

    If found

    correct?

    Pass the signal to device& display the result

  • 8/9/2019 Speech Rec. Report

    37/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    #define BIT17 0x00020000

    #define BIT18 0x00040000

    #define BIT19 0x00080000

    #define BIT20 0x00100000

    #define BIT21 0x00200000

    #define BIT22 0x00400000

    #define BIT23 0x00800000

    #define BIT24 0x01000000

    #define BIT25 0x02000000

    #define BIT26 0x04000000

    #define BIT27 0x08000000

    #define BIT28 0x10000000

    #define BIT29 0x20000000

    #define BIT30 0x40000000

    #define BIT31 0x80000000unsigned long temp1,temp2;

    char temp3;

    unsigned int adcdata;

    void delay(void)

    {

    int j;

    for (j=0;j

  • 8/9/2019 Speech Rec. Report

    38/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    {

    if( (*IOPIN0) & 0x00000002)

    // if(IOPIN0 == 0) ;

    {

    temp1 = *IOPIN0 ;

    temp2 = temp1|0x000f0000 ;

    if(temp2==1)

    {

    *IOPIN0=temp2;

    *IOPIN0=*IOPIN0 |0x0000fc00;

    *IOSET0 = *IOSET0 |0x0000ff00;

    delay();*IOCLR1 = *IOCLR1 |0x00FF0000;

    }

    /*{

    temp1 = temp1

  • 8/9/2019 Speech Rec. Report

    39/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    {

    *IOPIN0=temp2;

    *IOPIN0=*IOPIN0 |0x0000fc00;

    *IOSET0 = *IOSET0 |0x0000ff00;

    delay();

    *IOCLR1 = *IOCLR1 |0x0000FF00;

    }

    if(temp2==5)

    {

    *IOPIN0=temp2;

    *IOPIN0=*IOPIN0 |0x0000fc00;

    *IOSET0 = *IOSET0 |0x0000ff00;

    delay();

    *IOCLR1 = *IOCLR1 |0x0000FF00;

    }if(temp2==6)

    {

    *IOPIN0=temp2;

    *IOPIN0=*IOPIN0 |0x0000fc00;

    *IOSET0 = *IOSET0 |0x0000ff00;

    delay();

    *IOCLR1 = *IOCLR1 |0x0000FF00;

    }

    if(temp2==7)

    {

    *IOPIN0=temp2;

    *IOPIN0=*IOPIN0 |0x0000fc00;

    *IOSET0 = *IOSET0 |0x0000ff00;

    delay();

    *IOCLR1 = *IOCLR1 |0x0000FF00;

    }

    if(temp2==8)

    {

    *IOPIN0=temp2;*IOPIN0=*IOPIN0 |0x0000fc00;

    *IOSET0 = *IOSET0 |0x00100000;

    delay();

    *IOCLR1 = *IOCLR1 |0x00100000;

    }

    GFS G.C.O.E. Jalgaon 39

  • 8/9/2019 Speech Rec. Report

    40/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    }

    return 0;

    }

    15. TESTING AND TROUBLESHOOTING:

    After etching P.C.B. make continuity test of all tracks if any one track is damage

    then connect it through wire.

    After connecting project to mains socket makes sure supply is available in mains

    socket using tester.

    Check RST. Pulse of microprocessor IC at pin 9 when power is on this pin make

    high to low for short duration.

    Check VCC and Ground pin of all IC is connected to power supply.

    The first problems we have face that in designing of power supply about

    transformer. In Selection of transformer we take calculation of secondary current.

    We are going in wrong direction. Then we add the sinking current of all ICs and

    we get 200mA.so we select 500mA secondary current with 12v transformer.

    The second problem was that cannot record voice clearly. Because there is some

    problem in programming and solve it.

    The third problem is in recording of voice. In recording Humming sound of air

    disturb the recording. This can be solved by using Dynamic microphone instead of

    Condenser.

    GFS G.C.O.E. Jalgaon 40

  • 8/9/2019 Speech Rec. Report

    41/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    16 . ADVANTAGES:

    Speech is preferred as an input because it does not require training and it is much

    faster than any other input.

    Also information can be input while the person in engaged in other activities.

    Information can be fed via telephone or microphone which is relatively cheapercompared to current input systems.

    17. FUTURE SCOPE:

    The most recent development in the industry introduces the use of speech synthesis

    technology to the voice recognition system. Here, users will be able to access data that has

    been transferred using monitors and keyboards. The use of touch-tone keypad will be

    replaced by audio commands.

    There are several challenges the system needs to deal with in the future. First, the

    overall robustness of the system must be improved to facilitate implementation in real life

    applications involving telephone and computer systems. Second, the system must be able

    to reject irrelevant speech that does not contain valid words or commands. Third, the

    recognition process must be developed so that commands can be set in continuous speech.

    And finally, the voice systems must be able to become viable on low-cost processors.

    GFS G.C.O.E. Jalgaon 41

  • 8/9/2019 Speech Rec. Report

    42/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    18 . APPLICATIONS:

    Automatic translation;

    Automotive speech recognition (e.g., Ford Sync);

    Telematics (e.g. vehicle Navigation Systems);

    Court reporting (Real time Voice Writing);

    Hands-free computing: voice command recognition computer user interface; Home automation;

    Interactive voice response;

    Mobile telephony, including mobile email;

    Multimodal interaction;

    Pronunciation evaluation in computer-aided language learning applications;

    Robotics;

    Video games with Tom Clancy's End War and Lifeline as working examples;

    Transcription (digital speech-to-text);

    Speech-to-text (transcription of speech into mobile text messages);

    Air Traffic Control Speech Recognition

    GFS G.C.O.E. Jalgaon 42

  • 8/9/2019 Speech Rec. Report

    43/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    19 . CONCLUSION:

    In summary, frequency synthesizer system today can be used reasonably well for things

    like command and control or large vocabulary dictation and for well-structured speech, i.e.

    speech that is grammatically and syntactically well formed and based on a high quality

    audio signal. For natural speech, as in human-to-human conversation, or in lectures and

    the like, as well as for recorded audio and so on, frequency synthesizer system performsvery poorly indeed.

    So, while frequency synthesizer system is already being used for certain specific and well

    controlled applications, there is still quite a long way to go before it can offer automatic

    speech-to-text support while on the move. RNID continues to work with all major

    stakeholders in this field, so that the long-term potential of this technology will be fully

    realized.

    GFS G.C.O.E. Jalgaon 43

  • 8/9/2019 Speech Rec. Report

    44/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    20. REFERENCES:

    www.google.com

    www.pdfdatabase.com

    www.wikipedia.org

    www.datasheetcatalog.com

    www.chipdocs.com

    www.nidcd.nih.gov

    www.imagesco.com/speech-recognition-tech

    www.arm.com

    www.keil.com

    www.embeddedtraining4u.com

    www.ebookpdf.net

    Embedded systems, TMH Rajkamal

    ARM System on-chip Architecture, Pearson Steve Furber Speech recognition systems Kandasamy Sugumaran

    Embedded system & design- Dr. K.K.V. Prasad

    GFS G.C.O.E. Jalgaon 44

    http://www.google.com/http://www.pdfdatabase.com/http://www.wikipedia.org/http://www.datasheetcatalog.com/http://www.chipdocs.com/http://www.nidcd.nih.gov/http://www.imagesco.com/speech-recognition-techhttp://www.arm.com/http://www.keil.com/http://www.embeddedtraining4u.com/http://www.ebookpdf.net/http://www.google.com/http://www.pdfdatabase.com/http://www.wikipedia.org/http://www.datasheetcatalog.com/http://www.chipdocs.com/http://www.nidcd.nih.gov/http://www.imagesco.com/speech-recognition-techhttp://www.arm.com/http://www.keil.com/http://www.embeddedtraining4u.com/http://www.ebookpdf.net/
  • 8/9/2019 Speech Rec. Report

    45/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 45

  • 8/9/2019 Speech Rec. Report

    46/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    (I) COMPONENTS LIST:

    Component Name Quantity

    1) IC LPC2148 12) IC MAX232 1

    3) IC Socket 20 pin 1

    4) IC socket 50 pin 1

    5) IC socket 16 pin 2

    6) IC LM7805 2

    7) Diode 1n4007 8

    8) Switch micro 10

    9) Switch push to On 1

    10) Head phone 1

    11) Connecting Wires 3mtrs12) HM2007 1

    13) LED RED 1

    14) Disc capacitor .1 uf 10

    15) Resistor 10k, 1/4 w 20

    16) Resistor 470ohm 2

    17) IC 74LS373 1

    GFS G.C.O.E. Jalgaon 46

  • 8/9/2019 Speech Rec. Report

    47/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    18) Electrolytic capacitor 15

    19) Burg strip 10 line 1

    20) Display 7 segment display 2

    21) Transformer 9-0-9 /500ma 2

    22) Copper clad 2 sq feet

    23) Ferric chloride 500gm 1

    24) Crystal 11.o596 MHz 2

    25) Transistor BC 548 2

    (II ) DATASHEET OF ARM7:

    Brief history of ARM ARM is short for Advanced Risc Machines Ltd.

    Founded 1990, owned by Acorn, Apple and VLSI

    Known before becoming ARM as computer manufacturer Acorn which developed a 32-

    bit RISC processor for its own use (used in Acorn Archimedes)

    Why ARM here? ARM is one of the most licensed and thus widespread processor cores in the world

    Used especially in portable devices due to low power consumption and reasonable

    GFS G.C.O.E. Jalgaon 47

  • 8/9/2019 Speech Rec. Report

    48/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    performance (MIPS / watt)

    Several interesting extensions available or in development like Thumb instruction set

    and Jazelle Java machine

    ARM Processor cores: ARM6, ARM7, ARM9, ARM10, ARM11

    Extensions: Thumb, El Segundo, Jazelle etc.

    IP-blocks: UART, GPIO, memory controllers, etc

    ARM architecture ARM:

    32-bit RISC-processor core (32-bit instructions)

    37 pieces of 32-bit integer registers (16 available)

    Pipelined (ARM7: 3 stages)

    Cached (depending on the implementation)

    Von Neuman-type bus structure (ARM7), Harvard (ARM9)

    8 / 16 / 32 -bit data types

    7 modes of operation (usr, fiq, irq, svc, abt, sys, und)

    GFS G.C.O.E. Jalgaon 48

  • 8/9/2019 Speech Rec. Report

    49/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Simple structure -> reasonably good speed / power consumption ratio

    ARM7 BLOCK DIAGRAM :

    GFS G.C.O.E. Jalgaon 49

  • 8/9/2019 Speech Rec. Report

    50/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    ARM7 FUNCTIONAL DIAGRAM :

    GFS G.C.O.E. Jalgaon 50

  • 8/9/2019 Speech Rec. Report

    51/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    ARM7 internals ARM core modes of operation:

    User (usr): Normal program execution state

    GFS G.C.O.E. Jalgaon 51

  • 8/9/2019 Speech Rec. Report

    52/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    FIQ (fiq): Data transfer state (fast irq, DMA-type transfer)

    IRQ (iqr): Used for general interrupt services

    Supervisor (svc): Protected mode for operating system support

    Abort mode (abt): Selected when data or instruction fetch is aborted

    System (sys): Operating system privilege-mode for user

    Undefined (und): Selected when undefined instruction is fetched

    ARM7 register set Register structure depends on mode of operation

    16 pieces of 32-bit integer registers R0 - R15 are available in ARM-mode (usr, user)

    R0 - R12 are general purpose registers

    R13 is Stack Pointer (SP)

    R14 is subroutine Link Register

    Holds the value of R15 when BL-instruction is executed

    R15 is Program Counter (PC)

    Bits 1 and 0 are zeroes in ARM-state (32-bit addressing)

    R16 is state register (CPSR, Current Program Status Register)

    ARM7 register set

    There are 37 ARM registers in total of which variable amount is available as

    banked registers depending on the mode of operation.

    R13 functions always as stack pointer

    R14 functions as link register in other than sys and usr - modes

    SPSR = Saved Program Status Register

    Flag register Mode-bits tell the processor operating mode and thus the registers available

    GFS G.C.O.E. Jalgaon 52

  • 8/9/2019 Speech Rec. Report

    53/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    ARM7TDMI TDMI = (?)

    Thumb instruction set

    Debug-interface (JTAG/ICEBreaker)

    Multiplier (hardware)

    Interrupt (fast interrupts)

    The most used ARM-version

    GFS G.C.O.E. Jalgaon 53

  • 8/9/2019 Speech Rec. Report

    54/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    ARM instruction set Fully 32-bit instruction set in native operating mode

    32-bit long instruction word

    All instructions are conditional

    Normal execution with condition AL (always)

    For a RISC-processor, the instruction set is quite diverse with different addressing modes Instruction word length 32-bits

    36 instruction formats

    GFS G.C.O.E. Jalgaon 54

  • 8/9/2019 Speech Rec. Report

    55/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    All instructions are conditional

    In normal instruction execution (unconditional) condition field contents of AL is used

    (Always)

    In conditional operations one of the 14 available conditions is selected

    For example, instruction known usually as BNZ in ARM is NE (Z-flag clear)conditioned branch-instruction

    GFS G.C.O.E. Jalgaon 55

  • 8/9/2019 Speech Rec. Report

    56/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Branching BX, Branch and exchange

    Branch with instruction set exchange (ARM Thumb)

    B and BL

    Branch with 24-bit signed offset

    Link: PC -> R14

    GFS G.C.O.E. Jalgaon 56

  • 8/9/2019 Speech Rec. Report

    57/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Data processing AND, EOR, SUB, RSB, ADD, ADC, SBC, RSC, TST, TEQ, CMP, CMN, ORR, MOV,

    BIC, MVN

    Multiple operation instruction

    Multiplication

    GFS G.C.O.E. Jalgaon 57

  • 8/9/2019 Speech Rec. Report

    58/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    MUL, MLA

    MULL, MLAL

    GFS G.C.O.E. Jalgaon 58

  • 8/9/2019 Speech Rec. Report

    59/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Data transfer LDR, STR

    Other data transfer operations: LDRH, STRH, LDRSB, LDRSH, LDM, STM, SWP

    GFS G.C.O.E. Jalgaon 59

  • 8/9/2019 Speech Rec. Report

    60/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Exception SWI: Software Interrupt

    Transfers execution to address in memory location 0x8 and changes the mode to svc.

    Comment field allows the interrupt service to determine the wanted action for SWI.

    GFS G.C.O.E. Jalgaon 60

  • 8/9/2019 Speech Rec. Report

    61/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Other instructions Coprocessor instructions: CDP, LDC, STC, MRC, MCR

    ARM does not execute these instructions but lets a coprocessor to handle them

    CDP:

    Undefined instruction:

    ARM Thumb T (Thumb)-extension shrinks the ARM instruction set to 16-bit word length -> 35-40%

    saving in amount of memory compared to 32-bit instruction set

    Extension enables simpler and significantly cheaper realization of processor system.

    Instructions take only half of memory than with 32-bit instruction set without significant

    decrease in performance or increase in code size.

    Extension is made to instruction decoder at the processor pipeline

    Registers are preserved as 32-bit but only half of them are

    GFS G.C.O.E. Jalgaon 61

  • 8/9/2019 Speech Rec. Report

    62/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Thumb extension Thumb-instruction decoder is placed in pipeline

    Change to Thumb-mode happens by turning the state of multiplexers feeding the

    instruction decoders and data bus

    A1 selects the 16-bit half word from the 32-bit bus

    Example of instruction conversion

    GFS G.C.O.E. Jalgaon 62

  • 8/9/2019 Speech Rec. Report

    63/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Thumb-instruction ADD Rd,#constant is converted to unconditionally executed ARM-

    instruction ADD Rd,Rn,#constant

    Only the lower register set is in use so the upper register bit is fixed to zero and source

    and destination are equal.

    The constant is also 8-bit instead of 12-bit available in ARM-mode

    Changing the mode Set T-flag in CPSR register and execute BX (Branch eXchange) to the address the thumb

    code begins at

    Same memory space and contain mixed native ARM-code and Thumb-code

    Execution speed of 32-bit ARM-code decreases significantly if system uses only 16-bit

    data bus

    If native ARM-code is used, typically it is contained in separate ROM-area as a part of

    ASIC (ASSP) chip

    Return to Thumb code from native ARM-code can be made by resetting the T-flag and

    executing BX to desired address

    Thumb-state registers Only lower part of the register immediately available

    Upper register set (R8-R15) can be used with assembler code

    Instructions MOV, CMP and ADD are available between register sets

    GFS G.C.O.E. Jalgaon 63

  • 8/9/2019 Speech Rec. Report

    64/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Thumb instruction set Instruction word length shrunk to 16-bits

    Instructions follow their own syntax but each instruction has its native ARM instruction

    counterpart

    Due to shrinking some functionality is lost

    19 different Thumb instruction formats

    GFS G.C.O.E. Jalgaon 64

  • 8/9/2019 Speech Rec. Report

    65/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Format 1: Move shifted register

    LSL, LSR, ASR

    F.ex. LSL Rd, Rs, #offset shifts Rs left by #offset and stores the result in Rd

    GFS G.C.O.E. Jalgaon 65

  • 8/9/2019 Speech Rec. Report

    66/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Format 2: Add/subtract

    ADD, SUB

    F.ex. ADD Rd, Rs, Rn adds contents of Rn to contents of Rs and places the result in Rd

    Format 3: Move/compare/add/subtract immediate

    MOV, CMP, ADD, SUB

    F.ex. MOV R0, #128

    GFS G.C.O.E. Jalgaon 66

  • 8/9/2019 Speech Rec. Report

    67/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Format 4: ALU operations

    16 different arithmetic / logical operations for registers, see table

    F.ex. MUL R0, R7

    R0 = R7*R0

    GFS G.C.O.E. Jalgaon 67

  • 8/9/2019 Speech Rec. Report

    68/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Format 5: Hi register operations / branch exchange

    BX Rs / BX Hs perform a branch with optional mode change. To enter ARM mode,

    clear bit 0 of Rs before executing the instruction. Thumb mode is entered equivalently by

    setting the bit.

    Format 6: PC relative load

    F.ex. LDR Rd, [PC, #imm] adds unsigned (forward looking) offset (255 words, 1020bytes) in imm to the current value of the PC.

    GFS G.C.O.E. Jalgaon 68

  • 8/9/2019 Speech Rec. Report

    69/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Format 7: Load/store with register offset

    LDR, LDRB, STR, STRB

    F.ex. STR Rd,[Rb, Ro] calculates the target address by adding together Rb and Ro and

    stores the contents of Rd at the address

    Format 8: Load / store signextended byte / halfword

    LDSB, LDSH, LDRH, STRH

    GFS G.C.O.E. Jalgaon 69

  • 8/9/2019 Speech Rec. Report

    70/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Format 9: Load / store with immediate offset

    LDR, LDRB, STR, STRB

    Format 10: Load / store half word

    LDRH, STRH

    GFS G.C.O.E. Jalgaon 70

  • 8/9/2019 Speech Rec. Report

    71/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Format 11: SP-relative load /store

    LDR, STR

    Format 12: Load address

    Format 13: Add offset to Stack Pointer

    GFS G.C.O.E. Jalgaon 71

  • 8/9/2019 Speech Rec. Report

    72/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Format 14: Push / pop registers

    PUSH, POP

    Format 15: Multiple load /store

    LDMIA, STMIA

    Format 16: Conditional branch

    BEQ, BNE, BCS, BCC, BMI, BPL, BVS, BHI, BLS, BGE, BLT, BGT, BLE

    Format 17: Software interrupt

    SWI value8

    Used to enter interrupt routine (svc mode) pointed by contents of address 0x8.

    Interrupt service is executed in ARM-state.

    GFS G.C.O.E. Jalgaon 72

  • 8/9/2019 Speech Rec. Report

    73/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    Format 18: Unconditional branch

    B label, ARM equivalent BAL

    Format 19: Long Branch with link

    BL label

    32-bit instructions in two half words: Instruction 1 (H=0) contains the upper 11 bits of

    the target address. Instruction 2 (H=1) contains the lower 11 bits of the target address.

    GFS G.C.O.E. Jalgaon 73

  • 8/9/2019 Speech Rec. Report

    74/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    DC Parameters

    Absolute Maximum Ratings

    Note:

    These are stress ratings only. Exceeding the absolute maximum ratings may permanently

    damage the device. Operating the device at absolute maximum ratings for extendedperiods may affect device reliability.

    DC Operating Conditions

    Notes:

    1. Voltages measured with respect to VSS.

    GFS G.C.O.E. Jalgaon 74

  • 8/9/2019 Speech Rec. Report

    75/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    AC Parameters

    The timing parameters given here are preliminary data and subject to change when device

    characterisation is complete. The AC timing diagrams presented in this section assume

    that the outputs of the ARM7 cell have been loaded with the capacitive loads shown in the

    `Test Load' column of Table 26: AC Test Loads. These loads have been chosen as

    typical of the type of system in which ARM7 cell might be employed. The output drivers

    of the ARM7 cell are CMOS inverters which exhibit a propagation delay that increases

    linearly with the increase in load capacitance. An `Output derating' figure is given for each

    output driver, showing the approximate rate of increase of output time with increasing

    load capacitance.

    GFS G.C.O.E. Jalgaon 75

  • 8/9/2019 Speech Rec. Report

    76/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 76

  • 8/9/2019 Speech Rec. Report

    77/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    (III) HM 2007 DATASHEET:

    GFS G.C.O.E. Jalgaon 77

  • 8/9/2019 Speech Rec. Report

    78/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 78

  • 8/9/2019 Speech Rec. Report

    79/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 79

  • 8/9/2019 Speech Rec. Report

    80/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 80

  • 8/9/2019 Speech Rec. Report

    81/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 81

  • 8/9/2019 Speech Rec. Report

    82/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 82

  • 8/9/2019 Speech Rec. Report

    83/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 83

  • 8/9/2019 Speech Rec. Report

    84/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 84

  • 8/9/2019 Speech Rec. Report

    85/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 85

  • 8/9/2019 Speech Rec. Report

    86/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 86

  • 8/9/2019 Speech Rec. Report

    87/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 87

  • 8/9/2019 Speech Rec. Report

    88/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 88

  • 8/9/2019 Speech Rec. Report

    89/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    (IV) DATASHEET OF LM 386:

    GFS G.C.O.E. Jalgaon 89

  • 8/9/2019 Speech Rec. Report

    90/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 90

  • 8/9/2019 Speech Rec. Report

    91/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 91

  • 8/9/2019 Speech Rec. Report

    92/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 92

  • 8/9/2019 Speech Rec. Report

    93/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 93

  • 8/9/2019 Speech Rec. Report

    94/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 94

  • 8/9/2019 Speech Rec. Report

    95/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    (V) DATASHEET OF 74LS373:

    GFS G.C.O.E. Jalgaon 95

  • 8/9/2019 Speech Rec. Report

    96/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 96

  • 8/9/2019 Speech Rec. Report

    97/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 97

  • 8/9/2019 Speech Rec. Report

    98/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 98

  • 8/9/2019 Speech Rec. Report

    99/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 99

  • 8/9/2019 Speech Rec. Report

    100/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 100

  • 8/9/2019 Speech Rec. Report

    101/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 101

  • 8/9/2019 Speech Rec. Report

    102/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 102

  • 8/9/2019 Speech Rec. Report

    103/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 103

  • 8/9/2019 Speech Rec. Report

    104/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    (VI) DATASHEET OF IC 7448:

    GFS G.C.O.E. Jalgaon 104

  • 8/9/2019 Speech Rec. Report

    105/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 105

  • 8/9/2019 Speech Rec. Report

    106/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 106

  • 8/9/2019 Speech Rec. Report

    107/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 107

  • 8/9/2019 Speech Rec. Report

    108/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 108

  • 8/9/2019 Speech Rec. Report

    109/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 109

  • 8/9/2019 Speech Rec. Report

    110/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 110

  • 8/9/2019 Speech Rec. Report

    111/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 111

  • 8/9/2019 Speech Rec. Report

    112/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 112

  • 8/9/2019 Speech Rec. Report

    113/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 113

  • 8/9/2019 Speech Rec. Report

    114/116

    Frequency Synthesizer Security System Using ARM7[2009-10]

    GFS G.C.O.E. Jalgaon 114

  • 8/9/2019 Speech Rec. Report

    115/116

  • 8/9/2019 Speech Rec. Report

    116/116

    Frequency Synthesizer Security System Using ARM7[2009-10]