Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: The schematic of the traffic light controller is as shown in figure below. There are three control buttons on the panel: HAZ (Hazard), LT (Left) and RT (Right). Whenever, HAZ is clicked, the entire six lights blink in unison pointing out the situation. Though, whenever LT is clicked, only the left three lights (L1, L2 and L3) blink pointing out the left turn and likewise, whenever RT is clicked, only the right three lights (R1, R2 & R3) blink pointing out the right turn.

Please prepare the VHDL code fulfilling such specifications. In order to integrate the clicking and display functionality, it is essential to interface the traffic light code with proper mouse and monitor interfacing codes. There is at least the given number of modules in the correct working of this system:

A) Traffic light controller module.
B) Mouse interfacing module.
C) Monitor interfacing module.
D) Video PLL (a specific code for viewing on the monitor screen).
E) Main module interconnecting the sub-modules via port-mapping.

1763_traffic light controller.jpg

Figure: Traffic Light Controller Schematic.

The output:

580_output of traffic light controller.jpg

Lab reports should follow the template illustrated below:

A) Front page with the title of the project, date and name of the students all along with their IDs.

B) Introduction on the working of the system all along with a targeted issue which is addressed.

C) Design methodology describing the hierarchy of the system along with the different modules, their role and respective ports.

D) Results with a detailed description of the behavior of the system.

E) Conclusion.

F) Problems faced (if any throughout the coding and implementation stages).

G) Screenshots for simulated waveforms, pin assignments, RTL view and state machine view. (RTL and state machine viewers can be found under Tools –> Netlist Viewers)

H) Contributions including the names of the individual team members and the name of the modules coded by them.

It must be a hierarchical code having two modules: traffic light module and clock division module. Moreover, you require to port map these two modules in a main program.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9761
  • Price:- $70

Priced at Now at $70, Verified Solution

  • AsyU replied

    Dear tutor can you assist me regarding this question Describe why adding only a few characters to text file may increase the file’s size by hundred bytes and at other times may not increase the file’s size at all.?

Have any Question? 


Related Questions in Computer Engineering

This exercise involves designing a help-desk priority

This exercise involves designing a help-desk priority manager. Help requests are stored in a text file with the following structure: priority, id of requesting party, time of request The priority is an integer in the ran ...

In sect 1013 we state that sender or message authentication

In Sect. 10.1.3 we state that sender (or message) authentication always implies data integrity. Why? Is the opposite true too, i.e., does data integrity imply sender authentication? Justify both answers. In this exercise ...

Computer security system security assignment objectivesthe

COMPUTER SECURITY (SYSTEM SECURITY) ASSIGNMENT Objectives: The main objective of this assignment is for the students to understand the security mechanisms in Unix-like operating systems and their interplay with software ...

1 stall cycles due to mispredicted branches increase the

1. Stall cycles due to mispredicted branches increase the CPI. What is the extra CPI due to mispredicted branches with the always-taken predictor? Assume that branch outcomes are determined in the EX stage, that there ar ...

1 what are the types of password attacks what can a systems

1. What are the types of password attacks? What can a systems administrator do to protect against them? 2. What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is mo ...

Assignmentscenario the newest gaming computer costs 5000

Assignment Scenario: The newest gaming computer costs $5000 for a 31-inch screen, two 1TB hard drive, a metallic case, and a blazing fast processor. Ten years ago, your grandmother gave you $2500. The money has been in a ...

Define inflation assume that you live in a simple economy

Define inflation. Assume that you live in a simple economy in which only three goods are produced and traded: fish, fruit, and meat. Suppose that on January 1, 2010, fish sold for $2.50 per pound, meat was $3.00 per poun ...

1 differentiate between access and authorization2 what are

1. Differentiate between access and authorization. 2. What are the bene fits of authorization? 3. Why is it dif fi cult to implement distributed authorization? 4. Discuss the merits and demerits of centralized and decent ...

1 implement the remaining methods of the

1. Implement the remaining methods of the TicketCounterSimulation class. 2. Modify the TicketCounterSimulation class to use seconds for the time units instead of minutes. Run an experiment with multiple simulations and p ...

Leta draw the set bb determine the boundary of bc

Let (a) Draw the set B (b) Determine the boundary of B (c) Determining the interior of B

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro