欢迎来到三一文库! | 帮助中心 三一文库31doc.com 一个上传文档投稿赚钱的网站
三一文库
全部分类
  • 研究报告>
  • 工作总结>
  • 合同范本>
  • 心得体会>
  • 工作报告>
  • 党团相关>
  • 幼儿/小学教育>
  • 高等教育>
  • 经济/贸易/财会>
  • 建筑/环境>
  • 金融/证券>
  • 医学/心理学>
  • ImageVerifierCode 换一换
    首页 三一文库 > 资源分类 > DOCX文档下载  

    毕业论文-基于80C51单片机的电子密码锁设计.docx

    • 资源ID:3940043       资源大小:229.57KB        全文页数:23页
    • 资源格式: DOCX        下载积分:6
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录 QQ登录   微博登录  
    二维码
    微信扫一扫登录
    下载资源需要6
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    毕业论文-基于80C51单片机的电子密码锁设计.docx

    目 录1绪论11.1引言11.2电子密码锁的背景11.3本设计特点12设计要求22.1设计任务22.2设计要求23硬件电路设计23.1设计方案的选择3 3.1.1方案一3 3.1.2方案二3 3.1.3方案确定33.2密码输入方式的选择4 3.2.1方案一4 3.2.1方案二4 3.2.3方案确定43.3主要元器件简介43.4硬件系统结构5 3.4.1复位电路5 3.4.2晶振电路6 3.4.3存储电路6 3.4.4报警电路74.程序设计84.1程序清单84.2 proteus/keil仿真图17 4.2.1电子密码锁开机仿真结果17 4.2.2电子密码锁修改密码仿真结果175.总结18参考文献1931.绪论1.1引言在日常生活和工作中,锁是每个人都离不开的,它是保护个人财产安全、保护资料档案的关键元素。随着电子技术的飞速发展,传统弹子锁的缺点渐渐被放大,社会对新式电子密码锁的需求越来越大,前景广阔。本课题主要采用单片机完成了一套具有按键输入、显示、解锁、报警及密码修改等多种功能的电子密码控制系统。据有关资料介绍,电子密码锁的研究从20世纪30年代就开始了,在一些特殊场所早就有所应用。这种锁是通过键盘输入一组密码完成开锁过程。研究这种锁的初衷,就是为提高锁的安全性。由于电子锁的密钥量(密码量)极大,可以与机械锁配合使用,并且可以避免因钥匙被仿制而留下安全隐患。电子锁只需记住一组密码,无需携带金属钥匙,免除了人们携带金属钥匙的烦恼,而被越来越多的人所欣赏。电子锁的种类繁多,例如数码锁,指纹锁,磁卡锁,IC卡锁,生物锁等。但较实用的还是按键式电子密码锁。目前使用的电子密码锁大部分是基于单片机技术,以单片机为主要器件,其编码器与解码器的生成为软件方式。1.2 电子密码锁的背景 随着社会科技的进步,锁已发展到了密码锁、磁性锁、电子锁、激光锁、声控锁等等。在传统钥匙的基础上,加了一组或多组密码,不同声音,不同磁场,不同声波,不同光束光波,不同图像。(如指纹、眼底视网膜等)来控制锁的开启。从而大大提高了锁的安全性,使不法之徒无从下手,人们也就能对自身财产安全有了更多的保障。当今安全信息系统应用越来越广泛,特别在保护机密、维护隐私和财产保护方面起到重大作用,而基于电子密码锁的安全系统是其中的组成部分,因此研究它具有重大的现实意义。1.3 本设计特点本系统由24C02和12864显示的电子密码锁设计单片机系统、4×3矩阵键盘、12864显示和报警系统等组成,具有设置、修改六位用户密码、超次报警、超次锁定、密码错误报警等功能(本设计由P0口控制LCD显示,密码正确则进入系统。密码错误显示“密码错误,重新输入密码”)除上述基本的密码锁功能外,依据实际的情况还可以添加遥控功能。本系统成本低廉,功能实用。2.设计要求2.1设计任务设计一种基于单片机的密码锁2.2 设计要求2.2.1密码用键盘输入(4-8位)2.2.2用户可预置密码(4-8位)2.2.3用LED数码管或LCD显示密码值,密码设置成功或开锁后显示“*”2.2.4密码输入成功后开锁,密码输入错误时数码管或者LCD提示错误信息,并且红色的LED亮,三次输入错误后,扬声器报警。3.硬件电路设计3.1设计方案的选择3.1.1方案一采用数字密码锁电路的好处就是设计简单。用以74LS112双JK触发器构成的数字逻辑电路作为密码锁的核心控制,共设了9个用户输入键,其中只有4个是有效的密码按键,其它的都是干扰按键,若按下干扰键,键盘输入电路自动清零,原先输入的密码无效,需要重新输入;如果用户输入密码的时间超过40秒(一般情况下,用户不会超过40秒,若用户觉得不便,还可以修改)电路将报警80秒,若电路连续报警三次,电路将锁定键盘5分钟,防止他人的非法操作。电路由两大部分组成:密码锁电路和备用电源(UPS),其中设置UPS电源是为了防止因为停电造成的密码锁电路失效,使用户免遭麻烦。密码锁电路包含:键盘输入、密码修改、密码检测、开锁电路、执行电路、报警电路、键盘输入次数锁定电路。3.1.2方案二采用一种是用以80C51为核心的单片机控制方案。利用单片机灵活的编程设计和丰富的IO端口,及其控制的准确性,不但能实现基本的密码锁功能,还能添加调电存储、声光提示甚至添加遥控控制功能。其原理如图所示。80C51单片机矩阵键盘控制输入错误锁定键盘延时报警控制电路24C02掉电存储开锁控制电路指示电路串口显示电路图3-1系统总设计结构图3.1.3方案确定通过比较以上两种方案,单片机方案有较大的活动空间,不但能实现所要求的功能而且能在很大的程度上扩展功能,而且还可以方便的对系统进行升级,所以我们采用后一种方案。 另外从经济实用的角度出发,采用80C51单机,研制了一款具有防盗自动报警功能的电子密码锁。该密码锁设计方法合理,简单易行,成本低,符合住宅、办公室用锁要求,具有一定的推广价值。3.2密码输入方式的选择 3.2.1方案一指纹输入识别 :指纹识别技术主要涉及四个功能:读取指纹图像、提取特征、保存数据和比对。通过指纹读取设备读取到人体指纹的图像,然后要对原始图像进行初步的处理,使之更清晰,再通过指纹辨识软件建立指纹的特征数据。软件从指纹上找到被称为“节点”(minutiae)的数据点,即指纹纹路的分叉、终止或打圈处的坐标位置,这些点同时具有七种以上的唯一性特征。通常手指上平均具有70个节点,所以这种方法会产生大约490个数据。这些数据,通常称为模板。通过计算机模糊比较的方法,把两个指纹的模板进行比较,计算出它们的相似程度,最终得到两个指纹的匹配结果,从而判断输入结果的正确与否。3.2.2方案二矩阵键盘输入识别: 由各按键组成的矩阵键盘每条行线和列线都对应一条I/O口线,键位设在行线和列线的交叉点,当一个键按下就会有某一条行线与某一条列线接触,只要确定接触的是哪两条线,即哪两个I/O口线,就可以确定哪一个键被触动。  行线设计成上拉口线,初始时被置高电位,列线悬空,初始置低。通过不断读行线口线,或者中断方式触发键位扫描。当发现有键按下,将列线逐一置低,其他列线置高,读行线口线。当某条列线置低时,某条行线也被拉低,则确定这两条线的交点处的按钮被按下。3.2.3方案确定考虑到方案一软硬件太过复杂,而且成本也高,故不采用,而方案二每个按键都可通过程序赋予功能,从而完成密码识别本方案简单易行,故采用。3.3主要元器件简介3.3.1 24C02串行E2PROM是基于I2C-BUS 的存储器件,遵循二线制协议,由于其具有接口方便,体积小,数据掉电不丢失等特点,在仪器仪表及工业自动化控制中得到大量的应用。随着世界上各公司对该器件的开发,市场上推出了许多牌号的24C02器件,甚至还有一些冒牌的24C02器件,这样就使批量生产的单片机控制系统的质量出现时好时坏的问题。笔者经过大量的设计实践和试验摸索找出了24C02在应用中之所以出现数据被冲掉的原因,并总结了一套保护24C02数据安全的软硬件设计方法。3.3.2 80C5180C51单片机属于MCS-51系列单片机,由Intel公司开发,其结构是8048的延伸,改进了8048的缺点,增加了如乘(MUL)、除(DIV)、减(SUBB)、比较(CMP)、16位数据指针、布尔代数运算等指令,以及串行通信能力和5个中断源。采用40个引脚双列直插式DIP(Dual In Line Package),内有128个RAM单元及4K的ROM。3.3.3 1286412864液晶是一种统称,只说明类屏的一个特征,就是128*64个点构成。对于液晶屏的特性则没有说明。3.4硬件系统结构3.4.1复位电路单片机复位是使CPU和系统中的其他功能部件都处在一个确定的初始状态,并从这个状态开始工作,例如复位后PC0000H,使单片机从第个单元取指令。无论是在单片机刚开始接上电源时,还是断电后或者发生故障后都要复位。在复位期间(即RST为高电平期间),P0口为高组态,P1P3口输出高电平;外部程序存储器读选通信号PSEN无效。地址锁存信号ALE也为高电平。根据实际情况选择如图2-1所示的复位电路。该电路在最简单的复位电路下增加了手动复位按键,在接通电源瞬间,电容C1上的电压很小,复位下拉电阻上的电压接近电源电压,即RST为高电平,在电容充电的过程中RST端电压逐渐下降,当RST端的电压小于某一数值后,CPU脱离复位状态,由于电容C1足够大,可以保证RST高电平有效时间大于24个振荡周期,CPU能够可靠复位。增加手动复位按键是为了避免死机时无法可靠复位。图3-2复位电路3.4.2晶振电路 80c51引脚XTAL1和XTAL2与晶体振荡器及电容C4、C5按图2-2所示方式连接。晶振、电容C4C5及片内与非门(作为反馈、放大元件)构成了电容三点式振荡器,振荡信号频率与晶振频率及电容C4、C5的容量有关,但主要由晶振频率决定,范围在033MHz之间,电容C4、C5取值范围在530pF之间。根据实际情况,本设计中采用12MHZ做系统的外部晶振11。电容取值为20pF。图3-3晶振电路3.4.3存储电路 AT24C02是一个2K位串行CMOS E2PROM, 内部含有256个8位字节,CATALYST公司的先进CMOS技术实质上减少了器件的功耗。AT24C02有一个16字节页写缓冲器。该器件通过IC总线接口进行操作,有一个专门的写保护功能。采用两线串行的总线和单片机通讯,电压最低可以到2.5V,额定电流为1mA,静态电流10Ua(5.5V),芯片内的资料可以在断电的情况下保存40年以上,而且采用8脚的DIP封装,使用方便。图3-4存储电路3.4.4报警电路报警部分由陶瓷压电发声装置及外围电路组成,加电后不发声,当有键按下时,“叮”声,每按一下,发声一次,密码正确时,不发声直接开锁,当密码输入错误时,单片机的P2.1引脚为低电平,三极管T3导喇叭发出噪鸣声报警。图3-5报警电路4.程序设计4.1 程序清单*/#include<reg51.h>#include<12864.h>#include<keypad.h>#include<24C01.h>#define uchar unsigned char#define uint unsigned intsbit LED1=P15;sbit LED2=P16;sbit INIT=P22;sbit SOUND=P17;ucharidata key6=0,0,0,0,0,0;ucharidataiic6=0,1,2,3,4,5;void press(uchar *s)uchardat;/* P3=0xf0;/保存第一位密码while(P3=0xf0);dat=key_scan();if(dat!=0x0a)&&(dat!=0x0b) *s=dat;Left(); star_12864(star,0x05,16); s+;/* P3=0xf0; /保存第二位密码while(P3=0xf0);dat=key_scan(); if(dat!=0x0a)&&(dat!=0x0b) *s=dat;Left(); star_12864(star,0x05,24); s+;/* P3=0xf0; /保存第三位密码while(P3=0xf0);dat=key_scan();if(dat!=0x0a)&&(dat!=0x0b) *s=dat;Left(); star_12864(star,0x05,32); s+;/* P3=0xf0; /保存第四位密码while(P3=0xf0);dat=key_scan();if(dat!=0x0a)&&(dat!=0x0b) *s=dat;Left(); star_12864(star,0x05,40); s+;/* P3=0xf0; /保存第五位密码while(P3=0xf0);dat=key_scan();if(dat!=0x0a)&&(dat!=0x0b) *s=dat;Left(); star_12864(star,0x05,48); s+;/* P3=0xf0; /保存第六位密码while(P3=0xf0);dat=key_scan();if(dat!=0x0a)&&(dat!=0x0b) *s=dat;Left(); star_12864(star,0x05,56); /* doP3=0xf0;/键入Enter键盘继续执行下面语句,否则等待while(P3=0xf0);dat=key_scan();while(dat!=0x0b);void Delay10ms(void) /延时10ms uinti,j,k;for(i=5;i>0;i-)for(j=4;j>0;j-)for(k=248;k>0;k-);void main()uchardat;uchar i=0,j=0,k;uchar x; LED1=1; LED2=1; SOUND=0; INIT=1; if(INIT=0) /密码初始化 x=SendB(iic,0x50,6);Delay10ms(); /首先从IIC器件中读出密码以供下面输入密码进行比较 x=ReadB(iic,0x50,6); Init_12864();/for(i=0;i<150;i+)Delay10ms();/*若密码不正确,循环执行dowhile()*do P3=0xf0;while(P3=0xf0);dat=key_scan();while(dat!=0x0b);if(dat=0x0b) do LED1=1; System(); /显示:"请输入密码"字幕press(key); if(key0=iic0)&&(key1=iic1)&&(key2=iic2)&&(key3=iic3)&&(key4=iic4)&&(key5=iic5) /密码比较,若密码正确责进入系统,若密码不正确则显示密码错误,重新输入密码 true();do P3=0xf0;/键入1或2继续执行下面语句,否则等待while(P3=0xf0);dat=key_scan();while(dat!=0x01&&dat!=0x02); if(dat=1) /开锁 LED1=0;unlock();for(i=0;i<100;i+)Delay10ms();continue; if(dat=2)/修改密码 doSystem(); press(key);again();press(iic); if(key0=iic0)&&(key1=iic1)&&(key2=iic2)&&(key3=iic3)&&(key4=iic4)&&(key5=iic5) succeed();/修改密码成功for(i=0;i<100;i+)Delay10ms();Delay10ms(); x=SendB(iic,0x50,6);Delay10ms(); x=ReadB(iic,0x50,6);break; else /修改密码不成功,重新修改 repeat();for(i=0;i<100;i+)Delay10ms(); while(1); else /密码不正确,重新输入密码j+;if(j=3)for(i=0;i<8;i+) LED2=0;for(k=0;k<5;k+)Delay10ms(); LED2=1;for(k=0;k<5;k+)Delay10ms();j=0; error();for(i=0;i<50;i+)Delay10ms(); while(1); 4.2 proteus/keil仿真图4.2.1电子密码锁开机仿真结果4.2.2 电子密码锁修改密码仿真结果5.总结使用单片机的制作的电子密码锁具有软硬件设计简单,易于开发,成本较低,安全可靠,操作方便等特点,可应用于住宅、办公室的保险箱及档案柜等需要防盗的场所,有一点的实用性。该电路设计还具有按键有效提示,输入错误提示,控制开锁电平,控制报警电路,修改密码等多种功能。通过本次课程设计,让我对单片机有了进一步的熟悉和了解,从理论到实践,在这段日子里,可以说得是苦多于甜,但是可以学到很多很多的东西,同时不仅可以巩固了以前所学过的知识,而且学到了很多在书本上所没有学到过的知识。通过这次课程设计使我懂得了理论与实际相结合是很重要的,只有理论知识是远远不够的,只有把所学的理论知识与实践相结合起来,从理论中得出结论,才能真正为社会服务,从而提高自己的实际动手能力和独立思考的能力。此次设计也让我明白了思路即出路,有什么不懂不明白的地方要及时请教或上网查询,只要认真钻研,动脑思考,动手实践,就没有弄不懂的知识,收获颇丰。特别感谢为辅导我们这次课程设计,一直辛苦工作的梁芳老师。参考文献1李建忠 余新拴 闵永智. 单片机原理及应用.(第三版). 西安电子科技大学出版社. 2013.102 王为青程国钢.单片机Keil Cx51 应用开发技术.人民邮电出版社,2007.2 3朱定华单片机原理及接口技术实验北京:清华大学出版社北方交通大学出版社2002.014蔡明文 冯先成单片机课程设计武汉:华中科技及大学出版社2007.08请删除以下内容,O(_)O谢谢! The term "autism" refers to a cluster of conditions appearing early in childhood. All involve severe impairments in social interaction, communication, imaginative abilities, and rigid, repetitive behaviors. To be considered an autistic disorder, some of these impairments must be manifest before the age of three. The reference book used by mental health professionals to diagnose mental disorders is the Diagnostic and Statistical Manual of Mental Disorders , also known as the DSM. The 2000 edition of this reference book (the Fourth Edition Text Revision known as DSM-IV-TR ) places autism in a category called pervasive developmental disorders . All of these disorders are characterized by ongoing problems with mutual social interaction and communication, or the presence of strange, repetitive behaviors,interests, and activities. People diagnosed with these disorders are affected in many ways for their entire lives. Description Each child diagnosed with an autistic disorder differs from every other, and so general descriptions of autistic behavior and characteristics do not apply equally to every child. Still, the common impairments in social interaction, communication and imagination, and rigid, repetitive behaviors make it possible to recognize children with these disorders, as they differ markedly from healthy children in many ways. Many parents of autistic children sense that something is not quite right even when their children are infants. The infants may have feeding problems, dislike being changed or bathed, or fuss over any change in routine. They may hold their bodies rigid, making it difficult for parents to cuddle them. Or, they may fail to anticipate being lifted, lying passively while the parent reaches for them, rather than holding their arms up in return. Most parents of autistic children become aware of the strangeness of these and other behaviors only gradually. Impairments in social interaction are usually among the earliest symptoms to develop. The most common social impairment is a kind of indifference to other people, or aloofness, even towards parents and close care-givers. The baby may fail to respond to his or her name being called and may show very little facial expression unless extremely angry, upset, or happy. Babies with autism may resist being touched, and appear to be lost in their own world, far from human interaction. Between seven and 10 months of age, most infants often resist being separated from a parent or well-known caregiver, but these infants may show no disturbance when picked up by a stranger. Other children with autism may be very passive, although less resistant to efforts by others to interact. However, they do not initiate social interaction themselves. Still others may attempt to engage with adults and peers, but in ways that strike others as inappropriate, or odd. In adolescence and adulthood, some of the higher-functioning individuals with autistic disorders may appear overly formal and polite. They may react with little spontaneity, as if social interaction doesn't come naturally or easily to them, and so they are trying to follow a pre-determined set of rules. Some individuals with autism have normal intelligence, and many have special talents in areas such as music or memory. However, individuals with autism may have other mental or emotional problems that co-exist with their autism. Some of these other disorders may include impulse control disorders, obsessive-compulsive disorder , mood and anxiety disorders, and mental retardation . PSYCHOLOGICAL AND FAMILY FACTORS. Although Henry Maudsley, in the late 1800s, was the first psychiatrist to focus on very young children with mental disorders, it was the psychiatrist Leo Kanner who coined the phrase "early infantile autism" in 1943. Kanner believed that the parents of children with autistic behaviors were emotionally cold and intellectually distant. He coined the term "refrigerator parents" to describe them. His belief that parental personality and behavior played a powerful role in the development of autistic behaviors left a devastating legacy of guilt and self-blame among parents of autistic children that continues to this day. Recent studies are unequivocal, however, in demonstrating that parents of autistic children are no different from parents of healthy children in their personalities or parenting behaviors. In fact, many families with an autistic child also have one or more perfectly healthy children. Because autistic children can be extremely sensitive to change, any change within the family situation can be potentially traumatic to the autistic child. A move, divorce, birth of a sibling or other stressors that occur in the lives of most families may evoke a more extreme reaction from an autistic child. While there is no single neurological abnormality found in children with autistic disorders, some research using non-invasive brain imaging techniques such as magnetic resonance imaging (MRI) suggests that certain areas of the brain may be involved. Several of the brain areas being researched are known to control emotion and the expression of emotion. These areas include the temporal lobe (large lobe of each side of the brain that contains a sensory area associated with hearing), the limbic system, the cerebellum, the frontal lobe, the amygdala, and the brain stem, which regulates homeostasis (body temperature and heart rate). Recent research has focused particularly on the temporal lobe because of the finding that previously healthy people who sustain temporal lobe damage may develop autistic-like

    注意事项

    本文(毕业论文-基于80C51单片机的电子密码锁设计.docx)为本站会员(爱问知识人)主动上传,三一文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    经营许可证编号:宁ICP备18001539号-1

    三一文库
    收起
    展开