Académique Documents
Professionnel Documents
Culture Documents
] Technical Report
1. Introduction
2. Purpose
The purpose of this technical report is to define the objectives, design of product and
specification to be used in the commercial business. This report will:
3. Standard
A number of standards will be used to control the product development process. Any
noncompliance of these standards is expected to be minimal and will be handled on a
case-by-case basis. Non-compliance to these standards must be approved and noted in the
relevant review document or notes. ASCII stands for American Standard Code for
Information Interchange. Computers can only understand numbers, so an ASCII code is
the numerical representation of a character such as 'a' or '@' or an action of some sort.
ASCII was developed a long time ago and now the non-printing characters are rarely
used for their original purpose. Below is the ASCII character table and this includes
descriptions of the first 32 non-printing characters. ASCII was actually designed for use
with teletypes and so the descriptions are somewhat obscure. If someone says they want
your CV however in ASCII format, all this means is they want 'plain' text with no
formatting such as tabs, bold or underscoring - the raw format that any computer can
understand. This is usually so they can easily import the file into their own applications
without issues. Notepad.exe creates ASCII text, or in MS Word you can save a file as
'text only'.
4. Objective
Page 2 of 23
The following are the main objectives of the product are to produce a product which changes the
key by Bluetooth. This product also has a system that has security fiction to prevent the theft.
These products of these objectives will be identifiable, baseline, and traceable. In addition,
change control and problem reporting will be applied to the baseline products.
The following activities will accomplish the objectives of the product development process:
o Develop the software architecture that can handle and support many output
requirements in one time.
o Decompose the high-level requirement into low-level requirement that align to the
software architecture inside the product. Derive any additional requirement
necessary to support the software architecture.
Page 3 of 23
5. Product
5.1 Overview
The wireless locks actually a combination architecture the software and hardware. First, the
customer will use a hand phone as a key. Then they send a key in txt file by Bluetooth. After that
it’s accepted by the computer which like control the server. After that server will give response
and send to signal to our motor and the door will open. This figure below showed the overview
of our product.
5.2 Requirement
Page 4 of 23
⇒ The data to transfer from hand=phone to server must using the Bluetooth
technology
5.3 Design
Page 5 of 23
5.3.3 Circuit
Page 6 of 23
PC Rx
PC Tx
C1
C2
1u
5 4 U2 5V
1u
C2- C2+
6
VS- BYPASS2 ERROR2 DETECT2
2
VS+ SW-SPST LED-RED DOOR2 SW-SPST
LED-GREEN
8 9
R2IN R2OUT
7 10
T2OUT T2IN
13 12
R1IN R1OUT
14 11
T1OUT T1IN
C1- C1+
3 1 MAX232
U1 R1
13
OSC1/CLKIN RB0/INT
33 R2 BYPASS1 DETECT1
14
OSC2/CLKOUT RB1
34 R3
1k SW-SPST ERROR1 DOOR1 SW-SPST
35 R4 LED-RED LED-GREEN
RB2 1k
2 36 R5
RA0/AN0 RB3/PGM 1k
R10 3
RA1/AN1 RB4
37 R6
1k
4 38
10k
5
RA2/AN2/VREF-/CVREF RB5
39
R7
1k
RA3/AN3/VREF+ RB6/PGC R8
1k
C3 C4 6
RA4/T0CKI/C1OUT RB7/PGD
40
1k ALARM
1u 1u 7 R9
RA5/AN4/SS/C2OUT 1k
15
RC0/T1OSO/T1CKI
C5 8
RE0/AN5/RD RC1/T1OSI/CCP2
16
1k
1u 9 17 LED-RED
RE1/AN6/WR RC2/CCP1
10 18
RE2/AN7/CS RC3/SCK/SCL
23
RC4/SDI/SDA
1 24
MCLR/Vpp/THV RC5/SDO
25
RC6/TX/CK
RC7/RX/DT
26 BYPASS4 DETECT4
R15 SW-SPST ERROR4 DOOR4 SW-SPST
19 R16 LED-RED LED-GREEN
RD0/PSP0
20 R17
1k
RD1/PSP1
21 R18
1k
RD2/PSP2
22 R19
RD3/PSP3 1k
27 R20
1k
RD4/PSP4
28 R21
1k
RD5/PSP5
29 R22
1k
RD6/PSP6
30 1k
RD7/PSP7
1k
PIC16F877A
BYPASS3 DETECT3
SW-SPST ERROR3 DOOR3 SW-SPST
LED-RED LED-GREEN
Page 7 of 23
5.3.4 PCB
Page 8 of 23
#include<htc.h>
#include<pic.h>
__CONFIG(0x3F32);
void setup(){
TRISB = 0b10011001;
PORTB = 0b00000000;
TRISD = 0b10011001;
Page 9 of 23
PORTD = 0b00000000;
TRISC = 0b10000000;
PORTC = 0b00000000;
void read(){
SPBRG = 129;
TXSTA = 0b00100100;
RCSTA = 0b10010000;
while(!RCIF){
}
}
void main(){
setup();
while(1){
int password = 0;
int c1door1;
int c2door1;
int c3door1;
int c1door2;
int c2door2;
int c3door2;
int c1door3;
int c2door3;
int c3door3;
int c1door4;
int c2door4;
int c3door4;
if(uart_rx == 0){
read();
password = RCREG;
}
Page 10 of 23
if( door_detect1 == 1 ){
delay(50);
c3door1 = 1;
}
//***************************************************************************
****************************************************
//****************************************************** DOOR 2 START
***********************************************************
if( door_detect2 == 1 ){
delay(50);
c3door2 = 1;
}
Page 11 of 23
if( door_detect3 == 1 ){
delay(50);
c3door3 = 1;
}
//*************************************************************** DOOR 4
START *************************************************
//***************************************************************************
***************************************************
if(door_detect4 == 1){
delay(50);
c3door4 = 1;
}
Page 12 of 23
//***************************************************************************
****************************************************
//***************************************************************************
****************************************************
}
}
a. User will send txt file to server by using the Bluetooth technology.
b. Then the server will compare the data inside txt file with database.
c. If correct, the server will send the signal to the PIC/microcontroller unit and it
will open the door following the txt file.
d. If wrong file, the door cannot open and the wrong signal will show up.
e. If the door open by illegal way, the alarm will ring but the system still running.
Page 13 of 23
Page 14 of 23
5.3.8 SERVER
Page 15 of 23
Page 16 of 23
Page 17 of 23
Implementation
The objective of the detail implementation phase is to implement this product phase
by phase. The result of the detail implementation phase will produce the correctly
implements of requirements.
5.4 Generate the idea of our product
5.5 Software Implementation
Software Decription
Microsoft Visual Basic Create the program for server
MPLAB IDE(C) Create the program for PIC
Microsoft Access Create Database for server
An assigned engineer will perform unit testing. The assigned engineers will unit test executable
software using test procedures. On a periodic basis, the unit test procedures (for those functions
which have been unit tested) will be run against a complete build of the executable to ensure that
new modules are not introducing errors into previously tested modules. As part of the integration
test, memory and resource bounds checking will be performed. Development is complete when
the all unit test procedures have been run and appropriate disposition made for any discrepancies
found
6. Limitation
Page 18 of 23
6.1 The signal Bluetooth can detect is range around 10 meters. So the user needs to go
to nearly Bluetooth dongle to send the txt file to server.
6.2 The Bluetooth technology easily to hack. So Hacker can know the key data inside
the phone.
The responsibilities of the Mikuni Co. organization on the Wireless Lock Project and the
responsibilities of project members critical to the delivery of products. Table below is
about Roles and Responsibilities
8. Appendix
MAX-232
Page 19 of 23
PIC 16F877A
Page 20 of 23
Page 21 of 23
Pin Diagram
ASCII Code
Page 22 of 23
Voltage Regulation
Page 23 of 23