speech rec. report
TRANSCRIPT
-
8/9/2019 Speech Rec. Report
1/116
Frequency Synthesizer Security System Using ARM7[2009-10]
1. LITERATURE SURVEY:
The Literature survey was conducted for the dissertation in all possible means
through the media of Text Books, Reference books, and Data books, Technical magazinesand of course the powerful Information media of Internet.
In this topic of Frequency Synthesizer Security System Using ARM7 we collected
the information from all the above sources and compared the same with each other and
also with our approach of communication and found that the method suggested in the
Project is relatively with new concept and more accurate and automated with less manual
intervention and hence easy to accept than the other conventional methods.
We need to improve the usage and the utility of the same in the best possible
manner. We need to analyses the problems faced by the customer and we should try to
minimize the same so as to improve the total efficiency of the system.
We are trying to build a standalone speaker dependent speech recognition circuit
that may be interfaced to control just about anything electrical, such as; appliances, robots,
test instruments, VCR's TV's, etc. The circuit is trained (programmed) to recognized
words you want it to recognize. To control and command an appliance (computer, VCR,
TV security system, etc.) by speaking to it, will make it easier, while increasing the
efficiency and effectiveness of working with that device.
The output of the system is displayed by the microprocessor on the seven segment
display. The recognized voice is stored as the name of person. As the speech is recognized
the persons name is shown.
GFS G.C.O.E. Jalgaon 1
-
8/9/2019 Speech Rec. Report
2/116
Frequency Synthesizer Security System Using ARM7[2009-10]
2. INTRODUCTION:
Speech recognition system means a system which when trained stores the words
from the user and later on recognizes the words spoken by the user by comparing the
words with those which were stored earlier while the system was trained. In the nearfuture, speech recognition will become the method of choice for controlling appliances,
toys, tools, computers and robotics. There is a huge commercial market waiting for this
technology to mature.
We are trying to build a standalone speaker dependent speech recognition circuit
that may be interfaced to control just about anything electrical, such as; appliances, robots,
test instruments, VCR's TV's, etc. The circuit is trained (programmed) to recognized
words you want it to recognize. To control and command an appliance (computer, VCR,
TV security system, etc.) by speaking to it, will make it easier, while increasing the
efficiency and effectiveness of working with that device.
At its most basic level speech recognition allows the user to perform parallel tasks,
(i.e. hands and eyes are busy elsewhere) while continuing to work with the computer or
appliance.
Speech recognition is classified into two categories, speaker dependent and
speaker independent. The output of the system is displayed by the microprocessor on the
seven segment display. The recognized voice is stored as the code of word.
Speaker dependent :
The individual who will be using the system trains these systems. These systems
are capable of achieving a high command count and better than 95% accuracy for word
recognition. The drawback to this approach is that the system only responds accurately
only to the individual who trained the system. This is the most common approach
employed in software for personal computers.
Speaker independent :
This is a system trained to respond to a word regardless of who speaks. Therefore
the system must respond to a large variety of speech patterns, inflections and enunciation's
of the target word. The command word count is usually lower than the speaker dependent
however high accuracy can still be maintained within processing limits. Industrial
requirements more often need speaker independent voice systems.
GFS G.C.O.E. Jalgaon 2
-
8/9/2019 Speech Rec. Report
3/116
Frequency Synthesizer Security System Using ARM7[2009-10]
3. Basic Block Diagram:The basic Block Diagram of the system is shown below:
MIC
The blocks of the above block diagram are explained below:
3.1 Microphone:
This is the device which converts the sound signal to the electrical signal. The two plates
are mounting apart at very low distance forms as a capacitor. The moving plate is
connected to diaphragm. The diaphragm moves according to the sound waves which are
strike on the diaphragm which result to change in current flow of the condenser mike. This
output is applied to the amplifier section which is amplified by selective gain. The output
current is a proportional to the sound signal striking on the diaphragm
3.2 Amplifier:
The voice signals from the microphone have very less amplitude about 0.1 mV. The signal
from the microphone must be amplified with the help of an amplifier before can be given
to the filter and the analog to digital converter. The amplifier must amplify the signal so
that the voltage level of the signal rises to about 5 to 6 V so that it can be given to the
analog to digital converter.
Low Voltage Audio Power Amplifier: -
General Description
The LM386 is a power amplifier designed for use in low voltage consumer applications.
The gain is internally set to 20 to keep external part count low, but the addition of an
external resistor and capacitor between pins 1 and 8 will increase the gain to any value up
to 200. The inputs are ground referenced while the output is automatically biased to one
half the supply voltages. The quiescent power drain is only 24 mill watts when operating
from a 6 volt supply, making the LM386 ideal for battery operation.
GFS G.C.O.E. Jalgaon 3
Filter SpeechProcessor
ARM 7
processorRelay drive
unit
Device
under test
Amplifier
Power Supply
Keypad
-
8/9/2019 Speech Rec. Report
4/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Features:
Battery operation
Minimum external parts
Wide supply voltage range: 4V12V or 5V18V
Low quiescent current drain: 4 mA Voltage gains from 20 to 200
Ground referenced input
Self-centering output quiescent voltage
Low distortion
Available in 8 pin MSOP package
Applications:
AM-FM radio amplifiers
Portable tape player amplifiers Intercoms TV sound systems Line drivers Ultrasonic drivers Small servo drivers Power converters
3.3 Filter:
The range of the human speech is from 300 Hz to 3 KHz s in order to eliminate the stray
noises and other sounds from the background along with the voice of the speaker.
Therefore to do this here we are using a band pass filter with a pass band from 300 Hz to 3
KHz.
4. ARM 7 PROCESSOR UNIT:
Introduction:
The ARM7 is part of the Advanced RISC Machines (ARM) family of general
purpose 32-bit microprocessors, which offer very low power consumption and price for
high performance devices. The architecture is based on Reduced Instruction Set Computer
(RISC) principles, and the instruction set and related decode mechanism are much simpler
in comparison with micro programmed Complex Instruction Set Computers. This results
GFS G.C.O.E. Jalgaon 4
-
8/9/2019 Speech Rec. Report
5/116
Frequency Synthesizer Security System Using ARM7[2009-10]
in a high instruction throughput and impressive real-time interrupt response from a small
and cost-effective chip.
The instruction set comprises eleven basic instruction types:
Two of these make use of the on-chip arithmetic logic unit, barrel shifter and multiplier
to perform high-speed operations on the data in a bank of 31 registers, each 32 bits wide.
Three classes of instruction control data transfer between memory and the registers, one
optimized for flexibility of addressing, another for rapid context switching and the third
for swapping data.
Three instructions control the flow and privilege level of execution.
Three types are dedicated to the control of external coprocessors which allow the
functionality of the instruction set to be extended off-chip in an open and uniform way.
The ARM instruction set is a good target for compilers of many different high-levellanguages. Where required for critical code segments, assembly code programming is also
straightforward, unlike some RISC processors which depend on sophisticated compiler
technology to manage complicated instruction interdependencies. Pipelining is employed
so that all parts of the processing and memory systems can operate continuously.
Typically, while one instruction is being executed, its successor is being decoded, and a
third instruction is being fetched from memory. The memory interface has been designed
to allow the performance potential to be realized without incurring high costs in the
memory system. Speed critical control signals are pipelined to allow system control
functions to be implemented in standard low-power logic, and these control signals
facilitate the exploitation of the fast local access modes offered by industry standard
dynamic RAMs.
ARM7 has a 32 bit address bus. All ARM processors share the same instruction set, and
ARM7 can be configured to use a 26 bit address bus for backwards compatibility with
earlier processors. ARM7 is a fully static CMOS implementation of the ARM which
allows the clock to be stopped in any part of the cycle with extremely low residual power
consumption and no loss of state.
Features:
Keil MCB2130 based design
Removable Processor Board
Small Size: 75mm*60mm
ISP programming through inbuilt Booloader of LPC21XX series
Power On/Off Switch
GFS G.C.O.E. Jalgaon 5
-
8/9/2019 Speech Rec. Report
6/116
Frequency Synthesizer Security System Using ARM7[2009-10]
8 indicator led's with separate jumpers for enable/disable
On board 3.3V regulator
Rest and INT1 switches
Potentiometer for ADC1
JTAG standard port
All port pins accessible through standard 8bit 10 pin connector
4 DC motor driver interface with PWM.
PWM for motor selectable through Jumpers
Optional power pins through jumpers to reduce power consumption
Capacitor filters at all power pins to reduce glitches
DTR, RTS signals for reset and boot loader enter point
Dual UART interface UART0 & UART1
UART0/Programmer selection switch on ISP Programmer
Simple 8 wire interface
Compatible with LPC2138 development board Programmer compatible with Flash magic, LPC21ISP & LPC2000 flash utility (NXP)
Benefits:
Generic layout can be ported to specific process technologies.
Unified memory bus simplifies SoC integration process.
ARM and Thumb instructions sets can be mixed with minimal overhead to support
application requirements for speed and code density.
Code written for ARM7TDMI-S is binary-compatible with other members of the
ARM7 Family and forwards compatible with ARM9, ARM9E and ARM10
families, thus it's quite easy to port your design to higher level microcontroller or
microprocessor.
Static design and lower power consumption are essential for battery -powered
devices.
Instruction set can be extended for specific requirements using coprocessors.
Embedded ICE-RT and optional ETM units enable extensive, real-time debug
facilities.
5. An Introduction to Speech Recognition:
Have you ever talked to your computer? (And no, yelling at it when your Internet
connection goes down or making polite chit-chat with it as you wait for all 25MB of that
very important file to download doesn't count). We mean, have you really, really talked to
your computer? Where it actually recognized what you said and then did something as a
result? If you have, then you've used a technology known as speech recognition.
GFS G.C.O.E. Jalgaon 6
-
8/9/2019 Speech Rec. Report
7/116
Frequency Synthesizer Security System Using ARM7[2009-10]
VoiceXML takes speech recognition even further. Instead of talking to your
computer, you're essentially talking to a web site, and you're doing this over the phone.
OK, you say, well, what exactly is speech recognition? Simply put, it is the process of
converting spoken input to text. Speech recognition is thus sometimes referred to as
speech-to-text.
Speech recognition allows you to provide input to an application with your voice.
Just like clicking with your mouse, typing on your keyboard, or pressing a key on the
phone keypad provides input to an application, speech recognition allows you to provide
input by talking. In the desktop world, you need a microphone to be able to do this. In the
VoiceXML world, all you need is a telephone. For example, you might say something
like "checking account balance", to which your bank's VoiceXML application replies "one
million, two hundred twenty-eight thousand, six hundred ninety eight dollars and thirty
seven cents." (We can dream, can't we)? Or, in response to hearing "Please say coffee, tea,
or milk," you say "coffee" and the VoiceXML application you're calling tells you what theflavor of the day is and then asks if you'd like to place an order.
Terms and Concepts
Following are a few of the basic terms and concepts that are fundamental to speech
recognition. It is important to have a good understanding of these concepts when
developing VoiceXML applications.
5.1 Utterances:
When the user says something, this is known as an utterance. An utterance is anystream of speech between two periods of silence. Utterances are sent to the speech engine
to be processed. Silence, in speech recognition, is almost as important as what is spoken,
because silence delineates the start and end of an utterance. Here's how it works. The
speech recognition engine is "listening" for speech input. When the engine detects audio
input - in other words, a lack of silence -- the beginning of an utterance is signaled.
Similarly, when the engine detects a certain amount of silence following the audio, the end
of the utterance occurs.
Utterances are sent to the speech engine to be processed. If the user doesnt say
anything, the engine returns what is known as a silence timeout - an indication that there
was no speech detected within the expected timeframe, and the application takes an
appropriate action, such as re-prompting the user for input.
An utterance can be a single word, or it can contain multiple words (a phrase or a
sentence). For example, checking, checking account, or Id like to know the balance
of my checking account please are all examples of possible utterances - things that a
GFS G.C.O.E. Jalgaon 7
-
8/9/2019 Speech Rec. Report
8/116
Frequency Synthesizer Security System Using ARM7[2009-10]
caller might say to a banking application written in VoiceXML. Whether these words and
phrases are valid at a particular point in a dialog is determined by which grammars are
active (See "Grammars"). Note that there are small snippets of silence between the words
spoken within a phrase. If the user pauses too long between the words of a phrase, the end
of an utterance can be detected too soon, and only a partial phrase will be processed by the
engine.
5.2 Pronunciations:
The speech recognition engine uses all sorts of data, statistical models, and
algorithms to convert spoken input into text. One piece of information that the speech
recognition engine uses to process a word is its pronunciation, which represents what the
speech engine thinks a word should sound like. Words can have multiple pronunciations
associated with them. For example, the word the has at least two pronunciations in the
U.S. English language: thee and thuh. As a VoiceXML application developer, you
may want to provide multiple pronunciations for certain words and phrases to allow forvariations in the ways your callers may speak them.
5.3 Grammars:
As a VoiceXML application developer, you must specify the words and phrases
that users can say to your application. These words and phrases are defined to the speech
recognition engine and are used in the recognition process. You can specify the valid
words and phrases in a number of different ways, but in VoiceXML, you do this by
specifying a grammar. A grammar uses a particular syntax, or set of rules, to define the
words and phrases that can be recognized by the engine. A grammar can be as simple as alist of words, or it can be flexible enough to allow such variability in what can be said that
it approaches natural language capability. Grammars define the domain, or context, within
which the recognition engine works. The engine compares the current utterance against
the words and phrases in the active grammars. If the user says something that is not in the
grammar, the speech engine will not be able to decipher it correctly.
Lets look at a specific example: Welcome to VoiceXML Bank. At any time, say main
menu to return to this point. Choose one: accounts, loans, transfers, or exit. The grammar
to support this interaction might contain the following words and phrases:
accounts account balances
my account information
loans
loan balances
my loan information
transfers
GFS G.C.O.E. Jalgaon 8
-
8/9/2019 Speech Rec. Report
9/116
Frequency Synthesizer Security System Using ARM7[2009-10]
exit
help
In this grammar, you can see that there are multiple ways to say each command.
You can define a single grammar for your application, or you may have multiple
grammars. Chances are, you will have multiple grammars, and you will activate each
grammar only when it is needed.
You can imagine that you want to put careful thought into the design of application
grammars. They can be as restrictive or as flexible as your users and application needs it
to be. Of course, there are tradeoffs between recognition speed (response time) and
accuracy versus the size of your grammar(s). You may want to experiment with different
grammar designs to validate one that best matches the requirements and expectations of
your users.
5.4 Speaker Dependence vs. Speaker Independence:
Speaker dependence describes the degree to which a speech recognition system
requires knowledge of a speakers individual voice characteristics to successfully process
speech. The speech recognition engine can learn how you speak words and phrases; it
can be trained to your voice.
Speech recognition systems that require a user to train the system to his/her voice
are known as speaker-dependent systems. If you are familiar with desktop dictation
systems, most are speaker dependent. Because they operate on very large vocabularies,
dictation systems perform much better when the speaker has spent the time to train the
system to his/her voice.
Speech recognition systems that do not require a user to train the system are
known as speaker-independent systems. Speech recognition in the VoiceXML world
must be speaker-independent. Think of how many users (hundreds, maybe thousands) may
be calling into your web site. You cannot require that each caller train the system to his or
her voice. The speech recognition system in a voice-enabled web application MUST
successfully process the speech of many different callers without having to understand theindividual voice characteristics of each caller.
5.5 Accuracy:
The performance of a speech recognition system is measurable. Perhaps the most
widely used measurement is accuracy. It is typically a quantitative measurement and can
be calculated in several ways. Arguably the most important measurement of accuracy is
whether the desired end result occurred. This measurement is useful in validating
GFS G.C.O.E. Jalgaon 9
-
8/9/2019 Speech Rec. Report
10/116
Frequency Synthesizer Security System Using ARM7[2009-10]
application design. For example, if the user said "yes," the engine returned "yes," and the
"YES" action was executed, it is clear that the desired end result was achieved. But what
happens if the engine returns text that does not exactly match the utterance? For example,
what if the user said "nope," the engine returned "no," yet the "NO" action was executed?
Should that be considered a successful dialog? The answer to that question is yes because
the desired end result was achieved.
Another measurement of recognition accuracy is whether the engine recognized
the utterance exactly as spoken. This measure of recognition accuracy is expressed as a
percentage and represents the number of utterances recognized correctly out of the total
number of utterances spoken. It is a useful measurement when validating grammar design.
Using the previous example, if the engine returned "nope" when the user said "no," this
would be considered a recognition error. Based on the accuracy measurement, you may
want to analyze your grammar to determine if there is anything you can do to improve
accuracy. For instance, you might need to add "nope" as a valid word to your grammar.You may also want to check your grammar to see if it allows words that are acoustically
similar (for example, "repeat/delete," "Austin/Boston," and "Addison/Madison"), and
determine if there is any way you can make the allowable words more distinctive to the
engine.
Recognition accuracy is an important measure for all speech recognition
applications. It is tied to grammar design and to the acoustic environment of the user. You
need to measure the recognition accuracy for your application, and may want to adjust
your application and its grammars based on the results obtained when you test your
application with typical users.
5.6 How it works:Now that we've discussed some of the basic terms and concepts involved in speech
recognition, let's put them together and take a look at how the speech recognition process
works.
As you can probably imagine, the speech recognition engine has a rather complex task to
handle, that of taking raw audio input and translating it to recognized text that an
application understands. As shown in the diagram below, the major components we want
to discuss are:
Audio input
Grammar(s)
Acoustic Model
Recognized text
GFS G.C.O.E. Jalgaon 10
-
8/9/2019 Speech Rec. Report
11/116
-
8/9/2019 Speech Rec. Report
12/116
Frequency Synthesizer Security System Using ARM7[2009-10]
confidence score along with the text to indicate the likelihood that the returned text is
correct.
Not all utterances that are processed by the speech engine are accepted. Acceptance or
rejection is flagged by the engine with each processed utterance.
6. RELAY DRIVE UNIT:
In this unit we use the two relay drive ckt. to drive the 2 relays. One is operating at
12v and another is operating at 5v. Here we use the electromagnetic relay. The 5v relay is
the type of Single Pole Double Through (SPDT) and 12v relay is the type of Double Pole
Double Through (DPDT).
5v relay will give the further supply to the door lock system. Which will on/off themotor of door lock system. Now 12v relay is used to open or close the door. It means it
give the direction to the door by respective signal coming from the ARM7 unit.
7. DEVICE UNDER TEST:
In this unit u can connect any device which u want to on/off or open/close by using
output of the relay. Here we use the door lock system which will open if the recognition is
match by the system and automatically closed after some time delay.
GFS G.C.O.E. Jalgaon 12
-
8/9/2019 Speech Rec. Report
13/116
-
8/9/2019 Speech Rec. Report
14/116
Frequency Synthesizer Security System Using ARM7[2009-10]
8.2 ARM7 PROCESSOR UNIT:
GFS G.C.O.E. Jalgaon 14
-
8/9/2019 Speech Rec. Report
15/116
Frequency Synthesizer Security System Using ARM7[2009-10]
8.3 RELAY DRIVE UNIT:
8.4 POWER SUPPLY:
GFS G.C.O.E. Jalgaon 15
-
8/9/2019 Speech Rec. Report
16/116
Frequency Synthesizer Security System Using ARM7[2009-10]
9. Circuit Description:The project is based on the ARM LPC2148, This is the highly integrated
processor. The heart of the project is two blocks speech processing and recognition unit
and ARM Microprocessor LPC2148. First time, when the circuit is turned on, the
HM2007 checks the static RAM. If everything checks out the board displays "00" on the
digital display and lights the red LED (READY). It is in the "Ready waiting for a
command.
To Train:
To train the circuit begins by pressing the word number you want to train on the
keypad. The circuit can be trained to recognize up to 40 words. Use any numbers between
1 and 40. For example press the number "1" to train word number 1. When you press the
number(s) on the keypad the red led will turn off (status). The number is displayed on thedigital display. Next press the "TRAIN" key for train. When the "Train (SW13)" key is
pressed it signals the chip to listen for a training word and the red led turns back on.
Now speak the word you want the circuit to recognize into the microphone clearly.
The LED should blink off momentarily; this is a signal that the word has been accepted.
Continue training new words in the circuit using the procedure outlined above. Press the
"2" key then "TRAIN (SW13)" key to train the second word and so on. The circuit will
accept up to forty words. You do not have to enter 40 words into memory to use the
circuit. If you want you can use as many word spaces as you want. Testing Recognition
the circuit is continually listening. Repeat a trained word into the microphone. The numberof the word should be displayed on the digital display. For instance if the word "directory"
was trained as word number 25. Saying the word "directory" into the microphone will
cause the number 25 to be displayed.
The output of the speech recognition processor i.e. HM2007 is directly available in
eight bit form is available in parallel form. It is fed to the buffer IC 74ls373. This IC is a
bidirectional data bus driver IC. This prevents the loading of the external circuit on the
HM2007.
That output signal is read by the arm microprocessor, connected at the pins p1.0 to
1.7 and the data is compared by the microprocessor and if it matches the output at the p0.0
is turned high to operate the relay driver card to operated the relay which turns on the
motor and also high signal at the pin p0.1 operates the motor in anti-clock wise direction
and this opens the gate by making the mechanism to operate and after waiting for some
time the motor turns to operated in clock wise direction and switches off.
GFS G.C.O.E. Jalgaon 16
-
8/9/2019 Speech Rec. Report
17/116
Frequency Synthesizer Security System Using ARM7[2009-10]
If the spoken word is not matched then the 7 segment display shows the error code
as given below. It instructs the operator about the present status. In that case they get
remains closed.
Error Codes
The chip provides the following error codes:
55 = word too long
66 = word too short
77 = word no match
10. CIRCUIT DESIGN:
10.1 Power Supply:
For our all IC we require 5V D.C. supply which can be generated by step down
transformer, full wave bridge rectifier, filter condenser & voltage regulator IC7805. 12V
supply for relay is generated separately using the same procedure as above.
Design Details: -
Power supply design
Power supply is the first and the most important part of our project. For our project
we require +5V regulated power supply with maximum current rating 500mA Following
basic building blocks are required to generate regulated power supply.
Step Down Transformer: -
Step down transformer is the first part of regulated power supply. To step down themains 230V A.C. we require step down transformer. Following are the main characteristic
of electronic transformer.
Power transformers are usually designed to operate from source of low impedance at a
single freq. It is required to construct with sufficient insulation of necessary dielectric
strength.
GFS G.C.O.E. Jalgaon 17
Step-down
transformer Rectifier
Filter
Ckt.Three
Terminal
Voltage reg.
Regulated O/PVoltage
Mains 230 V
A.C.
-
8/9/2019 Speech Rec. Report
18/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Transformer ratings are expressed in voltamp. The volt-amp of each secondary winding
or windings are added for the total secondary VA. To this are added the load losses.
Temperature rise of a transformer is decided on two well-known factors i.e. losses on
transformer and heat dissipating or cooling facility provided unit.
10.2 Rectifier Unit:
Rectifier unit is a ckt. which converts A.C. into pulsating D.C. Generally semi-
conducting diode is used as rectifying element due to its property of conducting current in
one direction only. Generally there are two types of rectifier.
Half wave rectifier
Full wave rectifier
In half wave rectifier only half cycle of mains A.C. is rectified so its efficiency is very
poor. So we use full wave bridge type rectifier, in which four diodes are used. In each half
cycle, two diodes conduct at a time and we get maximum efficiency at o/p.
Following are the main advantages and disadvantages of a full-wave bridge type rectifier
ckt.
Advantages: -
1) The need of center tapped transformer is eliminated.
2) The o/p is twice that of center tap circuit for the same secondary voltage.
3) The PIV rating of diode is half of the center tap circuit.
Disadvantages: -
It requires four diodes. As during each half cycle of A.C. input, two diodes are
conducting therefore voltage drop in internal resistance of rectifying unit will be twice as
compared to center tap circuit.
10.3 Filter Circuit:
Generally a rectifier is required to produce pure D.C. supply for using at various
places in the electronic circuit. However, the o/p of rectifier has pulsating character i.e. if
such a D.C. is applied to electronic circuit it will produce a hum i.e. it will contain A.C.
and D.C. components. The A.C. components are undesirable and must be kept away from
the load. To do so a filter circuit is used which removes (or filters out) the A.C.
components reaching the load. Obviously a filter circuit is installed between rectifier and
voltage regulator. In our project we use capacitor filter because of its low cost, small size
and little weight and good characteristic. Capacitors are connected in parallel to the
rectifier o/p because it passes A.C. but does not pass D.C. at all.
GFS G.C.O.E. Jalgaon 18
-
8/9/2019 Speech Rec. Report
19/116
Frequency Synthesizer Security System Using ARM7[2009-10]
10.4 Three terminal voltage regulators:
A voltage regulator is a ckt. that supplies constant voltage regardless of change in
load current. IC voltage regulators are versatile and relatively cheaper. The 7800 seriesconsists of three terminal positive voltage regulator. These ICs are designed as fixed
voltage regulator and with adequate heat sink, can deliver o/p current in excess of 1A.
These devices do not require external component. This IC also has internal thermal
overload protection and internal short circuit and current limiting protection. For our
project we use voltage regulator ICs 7812 & 7805.
10.5 Design of Step down Transformer:
The following information must be available to the designer before he commences for the
design of transformer. Power Output. Operating Voltage.
Frequency Range. Efficiency and Regulation.
Size of core
Size of core is one of the first considerations in regard of weight and volume of
transformer. This depends on type of core and winding configuration used. Generally
following formula is used to find area or size of core.
P1
Ai = -----------
0.87
Ai = Area of cross - section in Sq. cm. and
P1 = Primary voltage.
In transformer P1 = P2
For our project we required +5V regulated output. So transformer secondary rating is 12V,
4A
So secondary power wattage is,
P2 = 12 x 4 w.
= 48w
48
GFS G.C.O.E. Jalgaon 19
-
8/9/2019 Speech Rec. Report
20/116
Frequency Synthesizer Security System Using ARM7[2009-10]
= 0.87
= 7.427
Generally 10% of area should be added to core to accommodate all turns for low Iron
losses and compact size.
So Ai = 8.1697
Turns per volt of transformer are given by relation
10,000
Turns / Volt = ---------------------
4.44 f Bm Ai
Here, F = the frequency in Hz
Bm = flux density in Wb/m2
Ai = net area of cross section.
Following table gives the value of turns per volt for 50 Hz frequency.
Flux density Wb/m2 1.14 1.01 0.91 0.83 0.76
Turns per volt 40/Ai 45/Ai 50/Ai 55/Ai 60/Ai
Generally lower the flux density better be quality of transformer.
For project for 50 Hz the turns per Volt for 0.91 Wb/m2 from above table.
Turns per Volt = 50 / Ai
= 50 / 8.1697
6.13Thus for Primary winding = 220 x 6.13 = 1346.43.
& for Secondary winding = 12 x 6.13 = 74
Wire size
As stated above size depends upon the current to be carried out by the winding, which
depends upon current density of 3.1 A/mm2. For less copper losses 1.6 A/mm2 or 2.4
A/mm2 may be used. Generally even size guage of wire are used.
Rectifier Design
GFS G.C.O.E. Jalgaon 20
-
8/9/2019 Speech Rec. Report
21/116
Frequency Synthesizer Security System Using ARM7[2009-10]
R.M.S. Secondary voltage at secondary of transformer is 12V.
So maximum voltage Vm across Secondary is
= Rms. Voltage x 2= 12 x 2
= 16.97D.C. O/p Voltage at rectifier O/p is
2 Vm
Vdc = ----------
2 x 16.97
= -----------------------
= 10.80 V
PIV rating of each diode is
PIV = 2 Vm.
= 2 x 16.97
= 34 V
& maximum forward current which flow from each diode is 500mA.
So from above parameter we select diode IN 4007 from diode selection manual.
Design of Filter Capacitor
Formula for calculating filter capacitor is,
1
C = ----------------------
43 r f RL.
Here r = ripple present at o/p of rectifier.
(Which is maximum 0.1 for full wave rectifier)
f = frequency of mains A.C.
RL = I/p impedance of voltage regulator IC.
1C = ------------------------------
43 x 0.1 x 50 x 28
= 1030 f 1000 f.
GFS G.C.O.E. Jalgaon 21
-
8/9/2019 Speech Rec. Report
22/116
Frequency Synthesizer Security System Using ARM7[2009-10]
And voltage rating of filter capacitor is double of Vdc i.e. rectifier o/p which is 20V. So
we choose 1000 f / 25V filter capacitor.
IC 7812 (Voltage Regulator IC)
Specifications: -Available o/p D.C. Voltage = +12V.
Line Regulation = 0.03
Load Regulation = 0.5
Vin maximum = 35 V
Ripple Rejection = 66-80 (db)
IC 7805 (Voltage Regulator IC)
Specifications: -
Available o/p D.C. Voltage = + 5V.
Line Regulation = 0.03Load Regulation = 0.5
Vin maximum = 35 V
Ripple Rejection = 66-80 (db)
Technical Details
IC 78XX (Voltage Regulator IC)
OUTPUT CURRENT UP TO 1.5 A
OUTPUT VOLTAGESOF 5; 5.2; 6; 8; 8.5; 9; 12; 15; 18; 24V THEOVERLOADPROTECTION SHORT CIRCUIT PROTECTION OUTPUT TRANSITION SOA PROTECTION
10.6 DESCRIPTION:
The L7800 series of three-terminal positive regulators is available in TO-220 TO-
220FP TO-3 and D2PAK packages and several fixed output voltages, making it useful in a
wide range of applications. These regulators can provide local on-card regulation,
eliminating the distribution problems associated with single point regulation. Each type
employs internal current limiting, thermal shut-down and safe area protection, making it
essentially indestructible. If adequate heat sinking is provided, they can deliver over 1A
output current. Although designed primarily as
GFS G.C.O.E. Jalgaon 22
1 2 3
1 2 3
-
8/9/2019 Speech Rec. Report
23/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 23
-
8/9/2019 Speech Rec. Report
24/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Electrical Characteristic: -
GFS G.C.O.E. Jalgaon 24
-
8/9/2019 Speech Rec. Report
25/116
Frequency Synthesizer Security System Using ARM7[2009-10]
11. CIRCUIT LAYOUT:
GFS G.C.O.E. Jalgaon 25
-
8/9/2019 Speech Rec. Report
26/116
Frequency Synthesizer Security System Using ARM7[2009-10]
11.1 SPEECH UNIT LAYOUT:
GFS G.C.O.E. Jalgaon 26
-
8/9/2019 Speech Rec. Report
27/116
Frequency Synthesizer Security System Using ARM7[2009-10]
11.2 ARM7 UNIT LAYOUT:
GFS G.C.O.E. Jalgaon 27
-
8/9/2019 Speech Rec. Report
28/116
Frequency Synthesizer Security System Using ARM7[2009-10]
11.3 POWER SUPPLY LAYOUT: -
11.4 KEYPAD LAYOUT:
11.5 RELAY DRIVE UNIT LAYOUT:
GFS G.C.O.E. Jalgaon 28
-
8/9/2019 Speech Rec. Report
29/116
Frequency Synthesizer Security System Using ARM7[2009-10]
12. PCB Designing and Fabrication:
Introduction to printed circuit boards:It is called PCB in short; printed circuit pattern applied to one or both sides of an
insulating base, depending upon that, and it is called single sided PCB or double-sided
PCB. Conductor materials available are silver, brass, aluminum and copper; copper is
most widely used which is used here as well. The thickness of conducting material
depends on the current carrying capacity of the circuit.
The printed circuit board usually serves three functions:
It provides mechanical support to the components mounted on it. It provides necessary electrical interconnection.
It acts as heat sink, i.e., it provides a conduction path leading to removal of most ofthe heat generated in the circuit.
Cu clad:
The base of laminate is either paper of glass fiber cloth. Cu foil, which is produced
by the method of electroplating, is placed on laminate and both are kept under hydraulic
pressure for proper adhesive pressure for proper adhesive. These Cu clad are easily
available in the market.
Types of Laminates:National Electrical Manufactures Association (NEMA) has various grades of
laminates that are obtained by different resins and filters.
Phenol:
Phenol and Formaldehyde produce phenolic paper base laminate it has phenolic
resins with proper filter. This is Brown in color and opaque. Disadvantage is poor
moisture resistance.
Epoxy Laminates:Epoxy paper that is also paper based but impregnated with epoxy resin, yellowish
white and translucent.
Epoxy Glass:
GFS G.C.O.E. Jalgaon 29
-
8/9/2019 Speech Rec. Report
30/116
Frequency Synthesizer Security System Using ARM7[2009-10]
This base material has high mechanical strength and good electrical properties
usually green in color and semitransparent. There are a variety of laminates available. We
have selected Fiber Glass epoxy laminate.
PCB fabrication includes following steps:
Layout of the circuit Artwork designing Printing Etching Drilling
Mounting of components and soldering Finishing
Layout:
The layout of a PCB has to incorporate all the board before one can go onto the all
work preparation. Detailed circuit diagram, the design concept and the philosophy behind
the equipment are very important for the layout.
Layout Scale:
Depending on the accuracy required artwork should be produced at a 1:1 or 2:1 or
even 4:1 scale. The layout is best prepared on the same scale as the artwork to prevent the
entire problem, which might be caused by redrawing of the layout to the artwork scale.
The layout/ artwork scale commonly applied is 2:1 with a 1:1 scale, no demanding single
sided boards can be designed but sufficient care should be taken, particularly during theartwork preparation.
Procedure:
The first rule is to replace each and every PCB layout as viewed from the
component side. This rule must be strictly followed to avoid confusion, which would
otherwise be caused.
Another important rule is not to start the designing of a layout unless an absolutely clear
circuit diagram is available.
Among the components, the larger ones are placed first and the space in between is filled
with smaller ones. Components requiring input/output connecting come near the
connector. All components are placed in such a manner that de-soldering of other
components is not necessary if they have to be replaced.
Layout sketch:
GFS G.C.O.E. Jalgaon 30
-
8/9/2019 Speech Rec. Report
31/116
Frequency Synthesizer Security System Using ARM7[2009-10]
The end product of the layout designing is the pencil sketched component and
conductor drawing which is caller layout sketched. It contains all the information for the
preparation of the network.
Component holes:
In a given, PCB most all the holes required are one particular diameter. Holes of a
different are shown with a code in the actual layout sketch.
Conductor Holes:
A code can be used for the conductor with a special width. Minimum spacing
should also be provided.
A) Holes B) Conductor Widths
Standard holes Standard width, 0.5 mm
1.1 mm 1 mm
1.5 mm 2 mm3.2 mm 4 mm
Artwork:
The generation of PCB artwork should be considered as the first step of the PCB
manufacturing process. The importance of a prefect artwork should not be under
estimated. Problems like inaccurate registered, broken annular rings or too critical spacing
are often due to bad artwork. And even with the most sophisticated PCB production
facilities, PCB can be made better than the quality of the artwork used.
Basic Approaches:
For ink drawing on white cardboard paper, good quality Indian ink and ink-pen set
are minimum requirements.
Drawing practice ---drawing procedure is very at-least by 0.1 0.2, and solder pad
locations. And conductors can be easily displaced by 0.3 0.5 mm
Screen Printing:
The process of screening printing is well known to the printing industry because of
its inherent capabilities of printing a wide range of inks on almost any kind of surface
including glass, metal, plastic fabrics etc.Found their way into an extremely broad field of applications.
Screen-printing offers the advantage of wide control on the ink deposition, thickness
though the selection of suitable mass density and composition. In the production of PCBs,
it is successfully employed in printing of
Etch resists Plate resists
GFS G.C.O.E. Jalgaon 31
-
8/9/2019 Speech Rec. Report
32/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Solder stop lacquers Notation printing
In its basic form, the screen-printing process is very simple. A screen fabric with uniform
meshes and opening is stretched and fixed on a solid frame of metal or wood. The circuit
pattern area open, while the meshes in the rest of the area is closed. In the actual printingstep, ink is forced by the moving squeeze thorough the open meshes onto the surface of
the material to be printed. The ink deposition, in a magnified cross section, shows the
shape of a trapezoid.
Pattern transfer onto the Screen:
There are two different methods in use, and each method has its own advantages
and disadvantages. With the direct method, the screen is prepared by coating a
photographic emulsion directly onto the screen fabric and exposing it in the pattern area.
The indirect method makes use of a separate screen process film, supported on a backing
sheet. The film on its backing sheet that is there after pressed onto the screen fabric and
sticks there. Finally, the backing sheet is peeled off, opening all those screen meshes,which are not covered by the film pattern.
The direct method provides very durable screen stencils with a higher dimensional
accuracy but the finest details are not reproduced. The indirect method is more suitable for
smaller series and where the finest details to be reproduced. The indirect method is faster
but dimensionally less accurate and the screen stencils are less durable, more sensitive to
mechanical damages and interruption in printing.
Etching:
In all subtractive PCB process, etching is one of the most important steps. The
final copper pattern is formed by selective removal of all the unwanted copper, which is
not protected by an etching unit.
Solutions, which are used in etching process, are known as enchants.
Ferric Chloride Cupric Chloride Chromic Acid Alkaline Ammonia.
Of these Ferric Chloride is widely used because it has short etching time and it can bestored for a long time. Etching of PCBs as required in modern electronic equipment
production is usually done in spray type etching machines. Tank or bubble etching, in
which the boards kept in tank, were lowered and fully immersed into the agitated, has
almost disappeared.
Component Mounting:
GFS G.C.O.E. Jalgaon 32
-
8/9/2019 Speech Rec. Report
33/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Careful mounting of components on PCB increases the reliability of assembly.
The leads must be cleaned before they are inserted in PCB holes. Asymmetric lead
bending must be avoided; the ENT leads must fit into holes properly so that they can be
soldered.
When space is to be saved then vertical mounting is to be preferred. The vertical leads
must have an insulating sleeve. Where jumper wire crosses over conductors, they must be
insulated. For mounting of PCBs, TO5, DIP packages special jigs must be used of easy
insertion. While mounting transistors, each lead must insulating sleeve. All the flat radial
components such as resistors, diodes and inductors are mounted and soldered. Then IC
bases are soldered. The vertical components such as transistors, gang condenser and FET
are mounted & soldered.
Soldering:
The next process after the component mounting is soldering; solder pint isachieved by heating the solder and base metal about the melting point of the solders used.
The necessary heat depends upon:
The nature and type of joints
Melting temperature of solder Flux
Soldering techniques are of so many types but we are using iron soldering.
Iron soldering:
Soldering iron consists of an insulating handle connected through a metal shaft, ofa bit accurately makes contact with the component parts of the joint and solder and heats
them up. The electrical heating element is located in the hollow shank or handles to heat
the bit.
Functions of the Bit:
It stored heat and convey it from the heat source to the work. It may be required to
store surplus solder from the joint. It may be required to store molten solder and flux to
the work. The surface must be lined and wetted; this encourages flow of solder into the
joint. When the surface of the work becomes tested by the solder, a continuous flow ofliquid metal between the bit and the work provides a path of high thermal conductivity
through which heat can flow into the work piece.
Solder bit are made up of copper; this metal has good wetting property, heat capability and
thermal conductivity. Tin-lead solder affects copper during soldering operation.
Production of copper bit can be made with thick iron coating followed by Ni/Tin plating.
GFS G.C.O.E. Jalgaon 33
-
8/9/2019 Speech Rec. Report
34/116
Frequency Synthesizer Security System Using ARM7[2009-10]
The life of the bit is increased by a factor of 10 to 15. Solder irons are specified in terms of
wattage. Depending on heat input intended for working and types of work ( continuous or
individual) the choice of the solder iron can be made.
Procedure of Soldering:
The points to be joined must be cleaned first and fluxed. The hard solder iron and
solder wire is applied to the work. The melted solder becomes bright and fluid. The iron
must be removed after sufficient time and joint is allowed to coal.
At the end, finishing is done.
PCB, designing using computer aided designing (CAD):
CAD has many advantages over manual designing, important among then is:
Changes can be easily made because we dont have to erase our pencil work on paper
repeatedly. Time is saved. Before taking printout we can have preview of the design etc.
GFS G.C.O.E. Jalgaon 34
-
8/9/2019 Speech Rec. Report
35/116
Frequency Synthesizer Security System Using ARM7[2009-10]
13. FLOWCHART:
GFS G.C.O.E. Jalgaon 35
Switch on the power to alldevices
Reset the system to start from initial
Select audio mode and take speech
sample
Move data to temp.
storage device
Display system
feedback on display
& switch to standbymode
Take sample of new speech
Compare speech using
ARM processor
-
8/9/2019 Speech Rec. Report
36/116
Frequency Synthesizer Security System Using ARM7[2009-10]
NO
YES
14. SOFTWARE SECTION:
SOURCE CODE:
/***********************************************************************
* speech_main.c
************************************************************************/
#include
#include
#define printf q_printf
#include
#define BIT0 0x00000001#define BIT1 0x00000002
#define BIT2 0x00000004
#define BIT3 0x00000008
#define BIT4 0x00000010
#define BIT5 0x00000020
#define BIT6 0x00000040
#define BIT7 0x00000080
#define BIT8 0x00000100
#define BIT9 0x00000200
#define BIT10 0x00000400#define BIT11 0x00000800
#define BIT12 0x00001000
#define BIT13 0x00002000
#define BIT14 0x00004000
#define BIT15 0x00008000
#define BIT16 0x00010000
GFS G.C.O.E. Jalgaon 36
If found
correct?
Pass the signal to device& display the result
-
8/9/2019 Speech Rec. Report
37/116
Frequency Synthesizer Security System Using ARM7[2009-10]
#define BIT17 0x00020000
#define BIT18 0x00040000
#define BIT19 0x00080000
#define BIT20 0x00100000
#define BIT21 0x00200000
#define BIT22 0x00400000
#define BIT23 0x00800000
#define BIT24 0x01000000
#define BIT25 0x02000000
#define BIT26 0x04000000
#define BIT27 0x08000000
#define BIT28 0x10000000
#define BIT29 0x20000000
#define BIT30 0x40000000
#define BIT31 0x80000000unsigned long temp1,temp2;
char temp3;
unsigned int adcdata;
void delay(void)
{
int j;
for (j=0;j
-
8/9/2019 Speech Rec. Report
38/116
Frequency Synthesizer Security System Using ARM7[2009-10]
{
if( (*IOPIN0) & 0x00000002)
// if(IOPIN0 == 0) ;
{
temp1 = *IOPIN0 ;
temp2 = temp1|0x000f0000 ;
if(temp2==1)
{
*IOPIN0=temp2;
*IOPIN0=*IOPIN0 |0x0000fc00;
*IOSET0 = *IOSET0 |0x0000ff00;
delay();*IOCLR1 = *IOCLR1 |0x00FF0000;
}
/*{
temp1 = temp1
-
8/9/2019 Speech Rec. Report
39/116
Frequency Synthesizer Security System Using ARM7[2009-10]
{
*IOPIN0=temp2;
*IOPIN0=*IOPIN0 |0x0000fc00;
*IOSET0 = *IOSET0 |0x0000ff00;
delay();
*IOCLR1 = *IOCLR1 |0x0000FF00;
}
if(temp2==5)
{
*IOPIN0=temp2;
*IOPIN0=*IOPIN0 |0x0000fc00;
*IOSET0 = *IOSET0 |0x0000ff00;
delay();
*IOCLR1 = *IOCLR1 |0x0000FF00;
}if(temp2==6)
{
*IOPIN0=temp2;
*IOPIN0=*IOPIN0 |0x0000fc00;
*IOSET0 = *IOSET0 |0x0000ff00;
delay();
*IOCLR1 = *IOCLR1 |0x0000FF00;
}
if(temp2==7)
{
*IOPIN0=temp2;
*IOPIN0=*IOPIN0 |0x0000fc00;
*IOSET0 = *IOSET0 |0x0000ff00;
delay();
*IOCLR1 = *IOCLR1 |0x0000FF00;
}
if(temp2==8)
{
*IOPIN0=temp2;*IOPIN0=*IOPIN0 |0x0000fc00;
*IOSET0 = *IOSET0 |0x00100000;
delay();
*IOCLR1 = *IOCLR1 |0x00100000;
}
GFS G.C.O.E. Jalgaon 39
-
8/9/2019 Speech Rec. Report
40/116
Frequency Synthesizer Security System Using ARM7[2009-10]
}
return 0;
}
15. TESTING AND TROUBLESHOOTING:
After etching P.C.B. make continuity test of all tracks if any one track is damage
then connect it through wire.
After connecting project to mains socket makes sure supply is available in mains
socket using tester.
Check RST. Pulse of microprocessor IC at pin 9 when power is on this pin make
high to low for short duration.
Check VCC and Ground pin of all IC is connected to power supply.
The first problems we have face that in designing of power supply about
transformer. In Selection of transformer we take calculation of secondary current.
We are going in wrong direction. Then we add the sinking current of all ICs and
we get 200mA.so we select 500mA secondary current with 12v transformer.
The second problem was that cannot record voice clearly. Because there is some
problem in programming and solve it.
The third problem is in recording of voice. In recording Humming sound of air
disturb the recording. This can be solved by using Dynamic microphone instead of
Condenser.
GFS G.C.O.E. Jalgaon 40
-
8/9/2019 Speech Rec. Report
41/116
Frequency Synthesizer Security System Using ARM7[2009-10]
16 . ADVANTAGES:
Speech is preferred as an input because it does not require training and it is much
faster than any other input.
Also information can be input while the person in engaged in other activities.
Information can be fed via telephone or microphone which is relatively cheapercompared to current input systems.
17. FUTURE SCOPE:
The most recent development in the industry introduces the use of speech synthesis
technology to the voice recognition system. Here, users will be able to access data that has
been transferred using monitors and keyboards. The use of touch-tone keypad will be
replaced by audio commands.
There are several challenges the system needs to deal with in the future. First, the
overall robustness of the system must be improved to facilitate implementation in real life
applications involving telephone and computer systems. Second, the system must be able
to reject irrelevant speech that does not contain valid words or commands. Third, the
recognition process must be developed so that commands can be set in continuous speech.
And finally, the voice systems must be able to become viable on low-cost processors.
GFS G.C.O.E. Jalgaon 41
-
8/9/2019 Speech Rec. Report
42/116
Frequency Synthesizer Security System Using ARM7[2009-10]
18 . APPLICATIONS:
Automatic translation;
Automotive speech recognition (e.g., Ford Sync);
Telematics (e.g. vehicle Navigation Systems);
Court reporting (Real time Voice Writing);
Hands-free computing: voice command recognition computer user interface; Home automation;
Interactive voice response;
Mobile telephony, including mobile email;
Multimodal interaction;
Pronunciation evaluation in computer-aided language learning applications;
Robotics;
Video games with Tom Clancy's End War and Lifeline as working examples;
Transcription (digital speech-to-text);
Speech-to-text (transcription of speech into mobile text messages);
Air Traffic Control Speech Recognition
GFS G.C.O.E. Jalgaon 42
-
8/9/2019 Speech Rec. Report
43/116
Frequency Synthesizer Security System Using ARM7[2009-10]
19 . CONCLUSION:
In summary, frequency synthesizer system today can be used reasonably well for things
like command and control or large vocabulary dictation and for well-structured speech, i.e.
speech that is grammatically and syntactically well formed and based on a high quality
audio signal. For natural speech, as in human-to-human conversation, or in lectures and
the like, as well as for recorded audio and so on, frequency synthesizer system performsvery poorly indeed.
So, while frequency synthesizer system is already being used for certain specific and well
controlled applications, there is still quite a long way to go before it can offer automatic
speech-to-text support while on the move. RNID continues to work with all major
stakeholders in this field, so that the long-term potential of this technology will be fully
realized.
GFS G.C.O.E. Jalgaon 43
-
8/9/2019 Speech Rec. Report
44/116
Frequency Synthesizer Security System Using ARM7[2009-10]
20. REFERENCES:
www.google.com
www.pdfdatabase.com
www.wikipedia.org
www.datasheetcatalog.com
www.chipdocs.com
www.nidcd.nih.gov
www.imagesco.com/speech-recognition-tech
www.arm.com
www.keil.com
www.embeddedtraining4u.com
www.ebookpdf.net
Embedded systems, TMH Rajkamal
ARM System on-chip Architecture, Pearson Steve Furber Speech recognition systems Kandasamy Sugumaran
Embedded system & design- Dr. K.K.V. Prasad
GFS G.C.O.E. Jalgaon 44
http://www.google.com/http://www.pdfdatabase.com/http://www.wikipedia.org/http://www.datasheetcatalog.com/http://www.chipdocs.com/http://www.nidcd.nih.gov/http://www.imagesco.com/speech-recognition-techhttp://www.arm.com/http://www.keil.com/http://www.embeddedtraining4u.com/http://www.ebookpdf.net/http://www.google.com/http://www.pdfdatabase.com/http://www.wikipedia.org/http://www.datasheetcatalog.com/http://www.chipdocs.com/http://www.nidcd.nih.gov/http://www.imagesco.com/speech-recognition-techhttp://www.arm.com/http://www.keil.com/http://www.embeddedtraining4u.com/http://www.ebookpdf.net/ -
8/9/2019 Speech Rec. Report
45/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 45
-
8/9/2019 Speech Rec. Report
46/116
Frequency Synthesizer Security System Using ARM7[2009-10]
(I) COMPONENTS LIST:
Component Name Quantity
1) IC LPC2148 12) IC MAX232 1
3) IC Socket 20 pin 1
4) IC socket 50 pin 1
5) IC socket 16 pin 2
6) IC LM7805 2
7) Diode 1n4007 8
8) Switch micro 10
9) Switch push to On 1
10) Head phone 1
11) Connecting Wires 3mtrs12) HM2007 1
13) LED RED 1
14) Disc capacitor .1 uf 10
15) Resistor 10k, 1/4 w 20
16) Resistor 470ohm 2
17) IC 74LS373 1
GFS G.C.O.E. Jalgaon 46
-
8/9/2019 Speech Rec. Report
47/116
Frequency Synthesizer Security System Using ARM7[2009-10]
18) Electrolytic capacitor 15
19) Burg strip 10 line 1
20) Display 7 segment display 2
21) Transformer 9-0-9 /500ma 2
22) Copper clad 2 sq feet
23) Ferric chloride 500gm 1
24) Crystal 11.o596 MHz 2
25) Transistor BC 548 2
(II ) DATASHEET OF ARM7:
Brief history of ARM ARM is short for Advanced Risc Machines Ltd.
Founded 1990, owned by Acorn, Apple and VLSI
Known before becoming ARM as computer manufacturer Acorn which developed a 32-
bit RISC processor for its own use (used in Acorn Archimedes)
Why ARM here? ARM is one of the most licensed and thus widespread processor cores in the world
Used especially in portable devices due to low power consumption and reasonable
GFS G.C.O.E. Jalgaon 47
-
8/9/2019 Speech Rec. Report
48/116
Frequency Synthesizer Security System Using ARM7[2009-10]
performance (MIPS / watt)
Several interesting extensions available or in development like Thumb instruction set
and Jazelle Java machine
ARM Processor cores: ARM6, ARM7, ARM9, ARM10, ARM11
Extensions: Thumb, El Segundo, Jazelle etc.
IP-blocks: UART, GPIO, memory controllers, etc
ARM architecture ARM:
32-bit RISC-processor core (32-bit instructions)
37 pieces of 32-bit integer registers (16 available)
Pipelined (ARM7: 3 stages)
Cached (depending on the implementation)
Von Neuman-type bus structure (ARM7), Harvard (ARM9)
8 / 16 / 32 -bit data types
7 modes of operation (usr, fiq, irq, svc, abt, sys, und)
GFS G.C.O.E. Jalgaon 48
-
8/9/2019 Speech Rec. Report
49/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Simple structure -> reasonably good speed / power consumption ratio
ARM7 BLOCK DIAGRAM :
GFS G.C.O.E. Jalgaon 49
-
8/9/2019 Speech Rec. Report
50/116
Frequency Synthesizer Security System Using ARM7[2009-10]
ARM7 FUNCTIONAL DIAGRAM :
GFS G.C.O.E. Jalgaon 50
-
8/9/2019 Speech Rec. Report
51/116
Frequency Synthesizer Security System Using ARM7[2009-10]
ARM7 internals ARM core modes of operation:
User (usr): Normal program execution state
GFS G.C.O.E. Jalgaon 51
-
8/9/2019 Speech Rec. Report
52/116
Frequency Synthesizer Security System Using ARM7[2009-10]
FIQ (fiq): Data transfer state (fast irq, DMA-type transfer)
IRQ (iqr): Used for general interrupt services
Supervisor (svc): Protected mode for operating system support
Abort mode (abt): Selected when data or instruction fetch is aborted
System (sys): Operating system privilege-mode for user
Undefined (und): Selected when undefined instruction is fetched
ARM7 register set Register structure depends on mode of operation
16 pieces of 32-bit integer registers R0 - R15 are available in ARM-mode (usr, user)
R0 - R12 are general purpose registers
R13 is Stack Pointer (SP)
R14 is subroutine Link Register
Holds the value of R15 when BL-instruction is executed
R15 is Program Counter (PC)
Bits 1 and 0 are zeroes in ARM-state (32-bit addressing)
R16 is state register (CPSR, Current Program Status Register)
ARM7 register set
There are 37 ARM registers in total of which variable amount is available as
banked registers depending on the mode of operation.
R13 functions always as stack pointer
R14 functions as link register in other than sys and usr - modes
SPSR = Saved Program Status Register
Flag register Mode-bits tell the processor operating mode and thus the registers available
GFS G.C.O.E. Jalgaon 52
-
8/9/2019 Speech Rec. Report
53/116
Frequency Synthesizer Security System Using ARM7[2009-10]
ARM7TDMI TDMI = (?)
Thumb instruction set
Debug-interface (JTAG/ICEBreaker)
Multiplier (hardware)
Interrupt (fast interrupts)
The most used ARM-version
GFS G.C.O.E. Jalgaon 53
-
8/9/2019 Speech Rec. Report
54/116
Frequency Synthesizer Security System Using ARM7[2009-10]
ARM instruction set Fully 32-bit instruction set in native operating mode
32-bit long instruction word
All instructions are conditional
Normal execution with condition AL (always)
For a RISC-processor, the instruction set is quite diverse with different addressing modes Instruction word length 32-bits
36 instruction formats
GFS G.C.O.E. Jalgaon 54
-
8/9/2019 Speech Rec. Report
55/116
Frequency Synthesizer Security System Using ARM7[2009-10]
All instructions are conditional
In normal instruction execution (unconditional) condition field contents of AL is used
(Always)
In conditional operations one of the 14 available conditions is selected
For example, instruction known usually as BNZ in ARM is NE (Z-flag clear)conditioned branch-instruction
GFS G.C.O.E. Jalgaon 55
-
8/9/2019 Speech Rec. Report
56/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Branching BX, Branch and exchange
Branch with instruction set exchange (ARM Thumb)
B and BL
Branch with 24-bit signed offset
Link: PC -> R14
GFS G.C.O.E. Jalgaon 56
-
8/9/2019 Speech Rec. Report
57/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Data processing AND, EOR, SUB, RSB, ADD, ADC, SBC, RSC, TST, TEQ, CMP, CMN, ORR, MOV,
BIC, MVN
Multiple operation instruction
Multiplication
GFS G.C.O.E. Jalgaon 57
-
8/9/2019 Speech Rec. Report
58/116
Frequency Synthesizer Security System Using ARM7[2009-10]
MUL, MLA
MULL, MLAL
GFS G.C.O.E. Jalgaon 58
-
8/9/2019 Speech Rec. Report
59/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Data transfer LDR, STR
Other data transfer operations: LDRH, STRH, LDRSB, LDRSH, LDM, STM, SWP
GFS G.C.O.E. Jalgaon 59
-
8/9/2019 Speech Rec. Report
60/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Exception SWI: Software Interrupt
Transfers execution to address in memory location 0x8 and changes the mode to svc.
Comment field allows the interrupt service to determine the wanted action for SWI.
GFS G.C.O.E. Jalgaon 60
-
8/9/2019 Speech Rec. Report
61/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Other instructions Coprocessor instructions: CDP, LDC, STC, MRC, MCR
ARM does not execute these instructions but lets a coprocessor to handle them
CDP:
Undefined instruction:
ARM Thumb T (Thumb)-extension shrinks the ARM instruction set to 16-bit word length -> 35-40%
saving in amount of memory compared to 32-bit instruction set
Extension enables simpler and significantly cheaper realization of processor system.
Instructions take only half of memory than with 32-bit instruction set without significant
decrease in performance or increase in code size.
Extension is made to instruction decoder at the processor pipeline
Registers are preserved as 32-bit but only half of them are
GFS G.C.O.E. Jalgaon 61
-
8/9/2019 Speech Rec. Report
62/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Thumb extension Thumb-instruction decoder is placed in pipeline
Change to Thumb-mode happens by turning the state of multiplexers feeding the
instruction decoders and data bus
A1 selects the 16-bit half word from the 32-bit bus
Example of instruction conversion
GFS G.C.O.E. Jalgaon 62
-
8/9/2019 Speech Rec. Report
63/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Thumb-instruction ADD Rd,#constant is converted to unconditionally executed ARM-
instruction ADD Rd,Rn,#constant
Only the lower register set is in use so the upper register bit is fixed to zero and source
and destination are equal.
The constant is also 8-bit instead of 12-bit available in ARM-mode
Changing the mode Set T-flag in CPSR register and execute BX (Branch eXchange) to the address the thumb
code begins at
Same memory space and contain mixed native ARM-code and Thumb-code
Execution speed of 32-bit ARM-code decreases significantly if system uses only 16-bit
data bus
If native ARM-code is used, typically it is contained in separate ROM-area as a part of
ASIC (ASSP) chip
Return to Thumb code from native ARM-code can be made by resetting the T-flag and
executing BX to desired address
Thumb-state registers Only lower part of the register immediately available
Upper register set (R8-R15) can be used with assembler code
Instructions MOV, CMP and ADD are available between register sets
GFS G.C.O.E. Jalgaon 63
-
8/9/2019 Speech Rec. Report
64/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Thumb instruction set Instruction word length shrunk to 16-bits
Instructions follow their own syntax but each instruction has its native ARM instruction
counterpart
Due to shrinking some functionality is lost
19 different Thumb instruction formats
GFS G.C.O.E. Jalgaon 64
-
8/9/2019 Speech Rec. Report
65/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Format 1: Move shifted register
LSL, LSR, ASR
F.ex. LSL Rd, Rs, #offset shifts Rs left by #offset and stores the result in Rd
GFS G.C.O.E. Jalgaon 65
-
8/9/2019 Speech Rec. Report
66/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Format 2: Add/subtract
ADD, SUB
F.ex. ADD Rd, Rs, Rn adds contents of Rn to contents of Rs and places the result in Rd
Format 3: Move/compare/add/subtract immediate
MOV, CMP, ADD, SUB
F.ex. MOV R0, #128
GFS G.C.O.E. Jalgaon 66
-
8/9/2019 Speech Rec. Report
67/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Format 4: ALU operations
16 different arithmetic / logical operations for registers, see table
F.ex. MUL R0, R7
R0 = R7*R0
GFS G.C.O.E. Jalgaon 67
-
8/9/2019 Speech Rec. Report
68/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Format 5: Hi register operations / branch exchange
BX Rs / BX Hs perform a branch with optional mode change. To enter ARM mode,
clear bit 0 of Rs before executing the instruction. Thumb mode is entered equivalently by
setting the bit.
Format 6: PC relative load
F.ex. LDR Rd, [PC, #imm] adds unsigned (forward looking) offset (255 words, 1020bytes) in imm to the current value of the PC.
GFS G.C.O.E. Jalgaon 68
-
8/9/2019 Speech Rec. Report
69/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Format 7: Load/store with register offset
LDR, LDRB, STR, STRB
F.ex. STR Rd,[Rb, Ro] calculates the target address by adding together Rb and Ro and
stores the contents of Rd at the address
Format 8: Load / store signextended byte / halfword
LDSB, LDSH, LDRH, STRH
GFS G.C.O.E. Jalgaon 69
-
8/9/2019 Speech Rec. Report
70/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Format 9: Load / store with immediate offset
LDR, LDRB, STR, STRB
Format 10: Load / store half word
LDRH, STRH
GFS G.C.O.E. Jalgaon 70
-
8/9/2019 Speech Rec. Report
71/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Format 11: SP-relative load /store
LDR, STR
Format 12: Load address
Format 13: Add offset to Stack Pointer
GFS G.C.O.E. Jalgaon 71
-
8/9/2019 Speech Rec. Report
72/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Format 14: Push / pop registers
PUSH, POP
Format 15: Multiple load /store
LDMIA, STMIA
Format 16: Conditional branch
BEQ, BNE, BCS, BCC, BMI, BPL, BVS, BHI, BLS, BGE, BLT, BGT, BLE
Format 17: Software interrupt
SWI value8
Used to enter interrupt routine (svc mode) pointed by contents of address 0x8.
Interrupt service is executed in ARM-state.
GFS G.C.O.E. Jalgaon 72
-
8/9/2019 Speech Rec. Report
73/116
Frequency Synthesizer Security System Using ARM7[2009-10]
Format 18: Unconditional branch
B label, ARM equivalent BAL
Format 19: Long Branch with link
BL label
32-bit instructions in two half words: Instruction 1 (H=0) contains the upper 11 bits of
the target address. Instruction 2 (H=1) contains the lower 11 bits of the target address.
GFS G.C.O.E. Jalgaon 73
-
8/9/2019 Speech Rec. Report
74/116
Frequency Synthesizer Security System Using ARM7[2009-10]
DC Parameters
Absolute Maximum Ratings
Note:
These are stress ratings only. Exceeding the absolute maximum ratings may permanently
damage the device. Operating the device at absolute maximum ratings for extendedperiods may affect device reliability.
DC Operating Conditions
Notes:
1. Voltages measured with respect to VSS.
GFS G.C.O.E. Jalgaon 74
-
8/9/2019 Speech Rec. Report
75/116
Frequency Synthesizer Security System Using ARM7[2009-10]
AC Parameters
The timing parameters given here are preliminary data and subject to change when device
characterisation is complete. The AC timing diagrams presented in this section assume
that the outputs of the ARM7 cell have been loaded with the capacitive loads shown in the
`Test Load' column of Table 26: AC Test Loads. These loads have been chosen as
typical of the type of system in which ARM7 cell might be employed. The output drivers
of the ARM7 cell are CMOS inverters which exhibit a propagation delay that increases
linearly with the increase in load capacitance. An `Output derating' figure is given for each
output driver, showing the approximate rate of increase of output time with increasing
load capacitance.
GFS G.C.O.E. Jalgaon 75
-
8/9/2019 Speech Rec. Report
76/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 76
-
8/9/2019 Speech Rec. Report
77/116
Frequency Synthesizer Security System Using ARM7[2009-10]
(III) HM 2007 DATASHEET:
GFS G.C.O.E. Jalgaon 77
-
8/9/2019 Speech Rec. Report
78/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 78
-
8/9/2019 Speech Rec. Report
79/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 79
-
8/9/2019 Speech Rec. Report
80/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 80
-
8/9/2019 Speech Rec. Report
81/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 81
-
8/9/2019 Speech Rec. Report
82/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 82
-
8/9/2019 Speech Rec. Report
83/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 83
-
8/9/2019 Speech Rec. Report
84/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 84
-
8/9/2019 Speech Rec. Report
85/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 85
-
8/9/2019 Speech Rec. Report
86/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 86
-
8/9/2019 Speech Rec. Report
87/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 87
-
8/9/2019 Speech Rec. Report
88/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 88
-
8/9/2019 Speech Rec. Report
89/116
Frequency Synthesizer Security System Using ARM7[2009-10]
(IV) DATASHEET OF LM 386:
GFS G.C.O.E. Jalgaon 89
-
8/9/2019 Speech Rec. Report
90/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 90
-
8/9/2019 Speech Rec. Report
91/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 91
-
8/9/2019 Speech Rec. Report
92/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 92
-
8/9/2019 Speech Rec. Report
93/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 93
-
8/9/2019 Speech Rec. Report
94/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 94
-
8/9/2019 Speech Rec. Report
95/116
Frequency Synthesizer Security System Using ARM7[2009-10]
(V) DATASHEET OF 74LS373:
GFS G.C.O.E. Jalgaon 95
-
8/9/2019 Speech Rec. Report
96/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 96
-
8/9/2019 Speech Rec. Report
97/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 97
-
8/9/2019 Speech Rec. Report
98/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 98
-
8/9/2019 Speech Rec. Report
99/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 99
-
8/9/2019 Speech Rec. Report
100/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 100
-
8/9/2019 Speech Rec. Report
101/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 101
-
8/9/2019 Speech Rec. Report
102/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 102
-
8/9/2019 Speech Rec. Report
103/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 103
-
8/9/2019 Speech Rec. Report
104/116
Frequency Synthesizer Security System Using ARM7[2009-10]
(VI) DATASHEET OF IC 7448:
GFS G.C.O.E. Jalgaon 104
-
8/9/2019 Speech Rec. Report
105/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 105
-
8/9/2019 Speech Rec. Report
106/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 106
-
8/9/2019 Speech Rec. Report
107/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 107
-
8/9/2019 Speech Rec. Report
108/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 108
-
8/9/2019 Speech Rec. Report
109/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 109
-
8/9/2019 Speech Rec. Report
110/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 110
-
8/9/2019 Speech Rec. Report
111/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 111
-
8/9/2019 Speech Rec. Report
112/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 112
-
8/9/2019 Speech Rec. Report
113/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 113
-
8/9/2019 Speech Rec. Report
114/116
Frequency Synthesizer Security System Using ARM7[2009-10]
GFS G.C.O.E. Jalgaon 114
-
8/9/2019 Speech Rec. Report
115/116
-
8/9/2019 Speech Rec. Report
116/116
Frequency Synthesizer Security System Using ARM7[2009-10]