Friday, September 11, 2009

Definition of Embedded system

1.WHAT IS EMBEDDED SYSTEM?
As the name signifies, an embedded system is defined as the system into which the user’s logic or ideas are embedded. Embedded systems include a variety of hardware and software components, which perform specific functions in host system, for example satellites, Washing machine, handheld telephones and automobiles. Embedded systems have become increasing digital with a non-digital peripheral (analog power) and therefore both Hardware and software coding signs are relevant. We are going for micro controller called the PIC micro controller. The PIC micro controller has the following advantages.
 Cost effectiveness
 Low power
 Highly user interactive
 A High level of system integration



2.PERIPHERAL INTERFACE CONTROLLER
The PIC16F877 Micro controller belongs to the midrange PIC. ThePIC16F87X Micro controller (MCU) Family provides a migration path from OTP to FLASH in 28 to 44-pin packages, with a wide range of peripheral integration options. This family features a 14-bit instruction set, 5 to 8 channels of 10-bit Analog-to-Digital Converters, interrupt handling capability, various serial interface capabilities, Capture/Compare/PWM, Brown-out Detection and an 8-level deep stack.
The PIC16F87X family provides performance and versatility to meet the most demanding requirements of today’s cost-sensitive analog designs. Plus, with FLASH program memory, PIC16F87X devices can be reprogrammed over the entire operating voltage range. The PIC16F87X family is ideally suited for high-speed applications

2a. High-Performance RISC CPU
• Only 35 instructions are there to implement the user’s logic.
• All instructions are single cycle (200 ns) except branch instructions which requires two-cycles.
• 128 to 368 bytes of user RAM.
• Up to 256 bytes of data EEPROM memory (internal), but we can interface max of 512KB of memory externally.
• Erase/write endurance.
• 14-bit wide instructions.
• 8-level deep hardware stack.
• Direct, indirect and relative addressing modes.
• 22 to 33 I/O pins.
• Processor read/write access to program memory.

2b. Peripheral Features
• Includes 3 timers – Timer 0, Timer 1 and Timer 2.
• Capture/Compare/PWM (CCP) modules
• 10-bit multi-channel Analog-to-Digital Converter
• Synchronous Serial Port (SSP) with I2C (Master/Slave)
• Universal Synchronous Asynchronous Receiver
• Transmitter (USART) with 9-bit address detection.

2c. Special Micro controller Features
• Power-on Reset (POR), Power-up Timer (PWRT) and
Oscillator Start-up Timer (OST).
• Watchdog Timer (WDT) with its own on-chip RC oscillator for reliable operation.
• Programmable code protection
• Power saving SLEEP mode
• Selectable oscillator options.
• XT: Standard crystal/resonator
• HS: High-speed crystal/resonator
• LP: Power saving, low frequency crystal

3. BIOMETRICS
Biometrics is defined as an automated method of identifying or authenticating the identity of a living person based on the physiological characteristics. It offers inherently stronger security than any other methods like iris, face and voice recognition. Basic steps involved in recognition systems are as follows:
• A mechanism to scan and capture
• Compression, Processing and Comparison
• Interfacing with the application system.
4. FINGER PRINT VERIFICATION SYSTEM
In order to have safety over the property, the people living in all parts of a country go for “Fully Secured Banking system”. But there are hackers and thieves who steel out of our own credit cards and debit cards People mainly look for the protective measures provided by the bankers. So to strengthen this system, we had chosen fingerprint of the user as the credit and debit cards along with an password for better security.
Since, the fingerprints of all the human beings are unique in nature, we had prescribed it as key factor. But there are other factors, which are unique like that of fingerprint. They are face, iris, signature and voice. Iris recognition system has the highest accuracy in finding the fraudulent persons and to have the lowest error rate. But it has a disadvantage of high cost. Hence we selected the next better factor (fingerprint), as it has moderate cost and high accuracy.
The statistics of various recognition techniques used are as follows:

FIG.2
5. Various Recognition Systems- Comparison
Here according to the statistic we can see from the graph that iris recognition has the maximum security but we have chosen the fingerprint technique. Since finger print recognition has the next best security system to the iris recognition. The cost of the finger print recognition system is comparably less and most reliable among the various recognition system
The above reasons that have made us go for fingerprint instead of the other biometrics technique for security system. This security techniques have made the credit or debit cards, ATM cards and bank lockers more secured.As per the above statistics, finger print recognition technique gains advantage than any other recognition techniques specified above.
The basic features of fingerprint are as follows.
 Uniqueness
 Permanency

No comments:

Post a Comment