Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: The schematic of the traffic light controller is as shown in figure below. There are three control buttons on the panel: HAZ (Hazard), LT (Left) and RT (Right). Whenever, HAZ is clicked, the entire six lights blink in unison pointing out the situation. Though, whenever LT is clicked, only the left three lights (L1, L2 and L3) blink pointing out the left turn and likewise, whenever RT is clicked, only the right three lights (R1, R2 & R3) blink pointing out the right turn.

Please prepare the VHDL code fulfilling such specifications. In order to integrate the clicking and display functionality, it is essential to interface the traffic light code with proper mouse and monitor interfacing codes. There is at least the given number of modules in the correct working of this system:

A) Traffic light controller module.
B) Mouse interfacing module.
C) Monitor interfacing module.
D) Video PLL (a specific code for viewing on the monitor screen).
E) Main module interconnecting the sub-modules via port-mapping.

1763_traffic light controller.jpg

Figure: Traffic Light Controller Schematic.

The output:

580_output of traffic light controller.jpg

Lab reports should follow the template illustrated below:

A) Front page with the title of the project, date and name of the students all along with their IDs.

B) Introduction on the working of the system all along with a targeted issue which is addressed.

C) Design methodology describing the hierarchy of the system along with the different modules, their role and respective ports.

D) Results with a detailed description of the behavior of the system.

E) Conclusion.

F) Problems faced (if any throughout the coding and implementation stages).

G) Screenshots for simulated waveforms, pin assignments, RTL view and state machine view. (RTL and state machine viewers can be found under Tools –> Netlist Viewers)

H) Contributions including the names of the individual team members and the name of the modules coded by them.

It must be a hierarchical code having two modules: traffic light module and clock division module. Moreover, you require to port map these two modules in a main program.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9761
  • Price:- $70

Priced at Now at $70, Verified Solution

  • AsyU replied

    Dear tutor can you assist me regarding this question Describe why adding only a few characters to text file may increase the file’s size by hundred bytes and at other times may not increase the file’s size at all.?

Have any Question? 


Related Questions in Computer Engineering

Describe the facilitators role in a virtual team what tools

Describe the Facilitator's Role in a virtual team. What tools can a facilitator use to ensure High Impact Virtual Meeting? What are the keys to giving/ receiving constructive feedback? How is feedback different in a one- ...

Docking percolation and fire often when looking at the fire

Docking percolation and fire Often when looking at the Fire model we ask what density of trees is necessary to reach the right side of the screen. We can ask the same question about the porosity value in the Percolation ...

You can use a stack to check if a programming statement or

You can use a Stack to check if a programming statement or a formula has balanced parentheses. Write a Windows application that provides a text box for the user to enter an expression with parenthesis. Provide a Check Pa ...

1 list and describe the four primary types of ups systems

1. List and describe the four primary types of UPS systems. Which is the most effective and the most expensive, and why? 2. What two critical functions are impaired when water is not available in a facility? Why are thes ...

1 a client uses udp to send data to a server the data

1. A client uses UDP to send data to a server. The data length is 16 bytes. Calculate the efficiency of this transmission at the UDP level (ratio of useful bytes to total bytes). 2. The following is a dump (contents) of ...

1 virtual security seems to work in some systems why is

1. Virtual security seems to work in some systems. Why is this so? Can you apply it in a network environment? Support your response. 2. Security best practices are security guidelines and policies aimed at enhancing syst ...

Write a function that accepts as arguments the following a

Write a function that accepts as arguments the following: A) An array of integers B) An integer that indicates the number of elements in the array The function should determine the mode of the array. That is, it should d ...

1 what is radius what advantage does it have over tacacs2

1. What is RADIUS? What advantage does it have over TACACS? 2. What is a content filter? Where is it placed in the network to gain the best result for the organization? 3. What is a VPN? Why is it becoming more widely us ...

1 in wireshark go to statistics gt summary what is the

1 .In Wireshark, go to Statistics > Summary. What is the Average Mbps? 2. Go to Statistics > Protocol Hierarchy. Which protocols use most of the bandwidth? 3. Go to Statistics > Packet Lengths > Create Stat. What percent ...

1 how did cgi revolutionize web programming2 what are the

1. How did CGI revolutionize Web programming? 2. What are the differences between client-side and server-side scripting? Is one better than the other? 3. In terms of security, is client-side scripting better than server- ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen