Preview

Design & Implementation of a Sequence Detector on an Fpga

Powerful Essays
Open Document
Open Document
4901 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Design & Implementation of a Sequence Detector on an Fpga
Design & Implementation of a Sequence Detector on an FPGA

-------------------------------------------------
EE3076 – Advanced Digital Systems

28th January 2013
Revision 1.0

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------
Contents

Contents 1 Tables and Figures 3 Revision History 5 1 Introduction 6 1.1 Assignment Objectives 6 1.2 Assignment Description 6 1.3 FPGA Board 7 1.4 Pre – anticipated issue: Switch Bounce 8 2 Design 9 2.1 User Design Specification 9 2.2 High-Level Architecture 9 2.3 Formal Design Specification 10 2.3.1 Clock Divider 10 2.3.2 Keypad Driver 11 2.3.3 Sequence Detector Design 12 2.3.4 LED Driver 14 3 Implementation 15 3.1 Clock Divider 15 3.1.1 Port and Entity Declarations 15 3.1.2 Counter Implemented Clock Divider 16 3.2 Keypad Driver 16 3.2.1 Port and Entity Declaration 16 3.2.2 Keypad Button Translation 17 3.2.3 ‘Key Held Down’ Filter 17 3.2.4 Switch Bounce & Output P Filter 18 3.3 Sequence Detector 19 3.3.1 Port and Entity Declaration 19 3.3.2 Clock Enable Logic 19 3.3.3 Reset Logic and Symbol Counter Driving Logic 19 3.3.4 Next State Logic 20 3.3.5 Output Logic 21 3.4 Led Driver 21 3.4.1 Port and Entity Declaration 21 3.4.2 Led Driving Logic, Pattern Generation and Reset 22 4 Testing & Verification 23 4.1 Clock Divider 23 4.2 Keypad Driver 23 4.3 Sequence Detector 25 4.3.1 Initial Reset 25 4.3.2 State Transitions for Correct Sequence 25 4.3.3 Reset After Correct Sequence Detected 26 4.3.4 State Transition for Incorrect Sequence 27 4.3.5 Output after 25 Symbols Entered 27 4.4 Led Driver 28 4.5 Top-Level Testing 29 5 Conclusion 30

-------------------------------------------------
Tables and Figures

Figure 1:FPGA

You May Also Find These Documents Helpful

  • Good Essays

    For the correctness and reliability there will be zero tolerance for any errors in the improved ID3 algorithm that is being implemented. The algorithm will work efficiently in all cases.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Intruder AnalysisEssay

    • 1621 Words
    • 7 Pages

    In Andre Dubus's short story "The Intruder", Dubus tells a story of a young boy losing his innocence to protect his sister's, while struggling to find his place between boyhood and manhood. The young boy, who is named Kenneth, can be associated with many biblical allusions concerning the scenarios he is put in. In "The Intruder", Kenneth's relationship with Connie is being intruded on and he must protect it with his gun, the only symbol of manliness and power he has. In some ways, Kenneth can be portrayed as a Christ figure because of his sacrifice for his sister like Jesus did for the world. Kenneth can be seen as many things, but all he wants to be is a manly hero.…

    • 1621 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The Live Scan System

    • 540 Words
    • 3 Pages

    Before the live scan system was used, we used the good old paper and ink method. Contrary to popular belief the ink and paper is used more often than you think. On one of my deployments, in Afghanistan we used ink and paper for clearances, watch list suspects, visas, and suspects in an actual attempted murder. We did not have any new technology over there. So we brought almost 100 people to be finger printed by ink and paper. I assure you with that experience I have a new found affection towards the live scan system. Currently at Peterson Air Force Base we also use the ink method. However, at the Visitor Control Center we use a scanning device called SecuGen Hamster IV. It takes one picture of the pad of the finger then asks you to lift that finger and recapture the same print. One flaw to our scanner is when the two images are compared, if they do not match up you must restart the process. This can be very time consuming especially when we print all visitors entering the base. Being in Colorado with such a dry climate can also have an effect on people’s skin. I have found older adults have dryer hands and cracked finger…

    • 540 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Analyzing Messages

    • 1481 Words
    • 5 Pages

    Composing, sending, and receiving productive, developed messages require a high level of awareness by the sender and receiver. Senders should be well-versed in the varying tones he or she may portray in reference to the point attempting to be made and receivers should remain open to feedback and maintain the ability to delineate between negative and positive messages. "No communication skill is more critical to the manager than the ability to frame an issue effectively. How someone frames an issue influences how others see it and focuses their attention on particular aspects of it. Framing is the essence of targeting a communication to a specific audience" (Raffoni, 2009, p. 3).…

    • 1481 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Poka-yoke was invented by shigeo shingo in the 1960’s. the term poka-yoke comes from the japenese words “poka” (inadvertent mistake) and “yoke” (prevent) the essential idea of poka yoke is to design your process so that mistakes are impossible or atleast easily detected and corrected.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    We need to monitor the number of empty slots in the parking areas by setting up a sensor EN allocated in the ENTRANCE whereas the output of this sensor is HIGH (1) when there is a car entering the parking area. On the other hand, EX is allocated in the EXIT; the output of this sensor is HIGH (1) when there is a car leaving the parking areas. Hence, both of the sensors are connected to a sequential digital circuit for which we call it an up-down counter for which the circuit is used to count the number of cars entering and exiting the parking areas; the output of this circuit is connected to the 7-segments decoder to convert each BCD code to ten possible number from 0 to 9 in order display the number of empty slots available and to display the word FULL when there are no empty parking slots available as shown below:…

    • 3471 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.…

    • 11163 Words
    • 45 Pages
    Powerful Essays
  • Good Essays

    Digital Locking System with auto lock functionality has got several applications nowadays. As we are growing at high pace, we are getting more suspicious about our things. This locking system gives solution to that problem. This circuit described here activates only when the specified sequence of four digits is pressed. If a wrong key is touched, it will not unlock. The lock code is set by connecting nine SPST switches. The code lock circuit is built around two CD4013 dual-D flip-flop ICs. The clock pins of the four flip-flops are connected to that specified sequence of digits, which is the correct code sequence to unlock the system. The circuit also contains (555) timer IC to lock automatically after certain period of time.…

    • 446 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Esoc Board

    • 392 Words
    • 2 Pages

    The eSOC II (electronic System-on-a-Chip) board is designed to allow a direct interface between the Quartus II software and the Altera Cyclone II EP2C8 FPGA. The board provides an interface to the chip, along with supporting interface hardware. Details about the construction and use of the eSOC II board are available in the eSOC II Users Guide supplied with the board. The following is a summary of data taken from that Guide.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    “He remembered the pain that the Chief Elder called indescribable that would come with his training.” (62) Being The Receiver of Memory is not an honor because it’s a lonely job, plus it’s a painfully job that brings intense physical and mental pain, additionally, the community neglects his care.…

    • 844 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Since time immemorial, mankind has wanted to share and use information for later use. First, it was through the caveman paintings and symbols. Then we invented the alphabets, ideograms, numbers and other symbols. Using these, books were written and stored for future generations, in palm leaves, papyrus sheets or paper. The invention of printing brought the Gutenberg revolution, making multiple copies easily and spreading education to millions of people. Printed books occupy space. Libraries and archives are bursting at the seams. Enter the computer age and digitization using the binary code of combining zeros and ones (0,1) for alphabets and other such symbols, and reading them using the on-off electrical signals, which has made electronic storage possible, cutting down the size and space for ‘hard copies’. Integrated circuits, processors and related electronic wizardry have shrunk the size of computers and storage devices from room-size to finger nail size. Digital information is accumulating at an astounding rate, straining our ability to store and archive it. Hard drive storage has been made cheaper, faster and larger. Disk storage technology in general has seen incredible advances including reduction in size, an increase in real density, and an increase in internal data rates, but the future of hard disk technology is uncertain. Digital production, transmission and storage have revolutionized how we access and use information but have also made archiving an increasingly complex task that requires active, continuing maintenance of digital media. This challenge has focused some interest on DNA as an attractive target for information storage because of its capacity for high-density information encoding, longevity under easily achieved conditions and proven track record as an information bearer.…

    • 3588 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    My project this past spring involved the Soudan Underground Laboratory’s Low Background Counting Facility. The Low Background Counting Facility, or LBCF, is housed next to the Super Cryogenic Dark Matter Search (SuperCDMS) half-a-mile underground in an old northern Minnesota iron mine which has now been converted into a fully-equipped modern physics lab. The LBCF is a 40 x 35 x 100 ft. hall with an active muon veto shield—left over from the Soudan 2 proton decay experiment— lining nearly all of the facility, save for the floor. Also inside the LBCF is a neutron multiplicity meter, capable of fast neutron searches. This and the muon veto shield provide for interesting studies of environments with an ultra low flux of particles, studies crucial for understanding and developing the field underground physics. Such studies have applications in many exciting areas of contemporary physics, such as SuperCDMS and other dark matter searches (for one, neutrons can be virtually indistinguishable from WIMPs in the data), as well as searches for neutrino-less double beta decay, or any rare event searches, really.…

    • 1483 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The original problem that Fibonacci investigated (in the year 1202) was about how fast rabbits could breed in ideal circumstances.…

    • 2081 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Electronic Watchdog

    • 533 Words
    • 3 Pages

    pillars of the gate such that the IR beam gets interrupted when someone is standing at the gate or passing through it. The transmitter circuit (see Fig. 1) is built around timer NE555 (IC1), which is wired as an astable multivibrator producing a frequency of about 38 kHz. The infrared (IR) beam is transmitted through IR LED1. The receiver circuit is shown in Fig. 2. It comprises IR sensor TSOP1738 (IR RX1), npn transistor BC548 (T1), timer NE555 (IC2) and some resistors and capacitors. IC2 is wired as a monostable multivibrator with a time period of around 30 seconds. The melody generator section is built around melody generator IC UM66 (IC3), transistor T2 and loudspeaker LS1. Fig. 3 shows pin configurations of IR sensor TSOP1738 and melody generator IC UM66. The power supply for the Fig. 4 shows mounting arrangement for both the transmitter and receiver units on the gate pillars. To achieve a high directivity of the IR beam towards the sensor, use a reflector behind the IR LED. After both the units have been built, connect 6V power supply to the receiver circuit. You should hear a continuous melody from the speaker. Now connect 6V power to the transmitter also and orient IR LED1 towards IR receiver. The…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Dna Based Cryptography

    • 4527 Words
    • 19 Pages

    In the year 1994, Adleman[1] sets the step for the biocomputing research which introduced the idea of DNA to solve the complex mathematical problem and also he concluded that DNA has computational latent. He got this idea from the book “Molecular biology of the gene” which was written by James Watson who discovered the structure of DNA in 1953. His idea is to solve the unsolvable problems…

    • 4527 Words
    • 19 Pages
    Powerful Essays

Related Topics