SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 1 (May. - Jun. 2013), PP 19-23
www.iosrjournals.org
www.iosrjournals.org 19 | Page
FPGA Based Implementation of Electronic Safe Lock
Charnjit Singh1
, Abhilasha Sharma2
1
(M.Tech Student, Eternal University, H.P. India)
2
(Asst. Professor, Eternal University, H.P. India)
Abstract :Thispaper is based on design of an “Automatic Security System Using VHDL” providing
understandable and adequate operating procedure to the user. The operation is conducted by six different
modules. If any of the modules fails, the failed module can be replaced without affecting the activity of others.
The safety is ensured to the user by setting a secret code number which is the combination of three numbers, by
doing so, only the authorized users can unlock the safe. The paper finds its appositeness in big organizations,
military and banking sectors. Simulation through VHDL is quite generous and fiscal due to the reduction in
number of components. Important operation consideration is to not give any indication to the user that the
combination entered is incorrect until after the user has entered the all three numbers and pressed the OPEN
key. Otherwise, it is possible for a user to determine the combination in no more than 96 attempts, as opposed to
no more than 32,768 attempts.
Keywords –FPGA, FSM, LOCK, VHDL, XILINX
I. INTRODUCTION
The electronic lock is often introduced to illustrate the possibilities of design of an electronic system
using a top-down approach. This is because it is not too complicated but must be designed as a complete system.
The “customer” must be able to specify the key data sequence and the sequence must be easily modified when
required. As designs become more complex, it becomes more efficient to move away from ad-hoc methods and
use tools that allow the design to be carried out at a higher level of abstraction[1].
The design of electronics to control any automated system is generally referred as a CODE LOCK
MACHANISM. An application of this is design of electronic safe. The front panel of the safe is kept as simple
as possible for understanding of user. A code locking mechanism that transmits information between a key and a
locking mechanism secured against interception misuse, but flexible with respect to original equipment,
replacement parts, and emergency functions[2] , is obtained if the key code is, in each case, cryptographically
encoded through a hardware encoder. When the locking mechanism is first operated, a control element
inductively coupled to a locking mechanism read-write unit with a new key once and in a non-over writable
manner, transmits an indent number to the object memory [3]. Object-specific identity data are also stored in the
control element. With the latter, a key number from a key register of the control element is combined with the
key code to read the ladder together with a roll-in random code into the set of first still-neutral keys and into the
object memory. Thus, a key is valid only if the object-specific identity data are taken into account in its key
code [4].
The lock used in the electronic safe is basically a combinational lock. A combinational lock is a lock
that requires the entering of a specific sequence of symbols to dislodge and open. The symbols are typically
numerical, letters and other types of symbols may also be used to formulate a sequence. Depending on whether
the lock is single-dial, multiple-dial; or discs or keypads may be used to enter sequences. Combinational locks
are generally thought to be secure.
II. Overview Of Electronic Safe
The safe`s electronics receives inputs from the front panel & provide signals to the seven segment
displays & to a motorized bolt. When the bolt`s motor is actuated to turn in one direction, it unlocks the safe
door [5].
FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 20 | Page
Fig1. Basic View Of Electronic Safe
III. System Design
The block diagram of electronic safe lock and it is consists of six design entities [7].
U1: ose_decoder_fsm U5&U6: bcd_7seg
U2: bcd_2dec
U3: digit_compare
U4: master_fsm
Fig2. Block diagram of electronic safe lock
U1&U4 are both fsms which together control the operation of the system. U2 is two digits modulo
BCD counter. U5&U6 convert each BCD digit from U2 to a seven segment code. In theory, the control portion
of the electronic safe could be designed as a single fsm. However, it simplifies defining the operation of
electronic safe to partition the control function into two cooperating fsms. Ose fsm is component of
ose_decoder_fsm. It has limited and very specific functions. The other fsm is master_fsm. This fsm controls the
overall operation of the safe.
U1: OSE_DECODER_FSM
We can design a four time decoder that enables the counter to count once for each combination of
A&B. this increases the effective resolution of OSE and decoder combination by a factor of 4, compared to
simply counting positive edges of A(or B) directly[4].
Fig3. State diagram of ose_decoder_fsm
FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 21 | Page
U2: BCD_2DEC
This two-digit BCD counter counts from 00 to 31 and then rolls over to 00. The count direction can be
up or down. The counter has two counts enable inputs: both must be asserted for the counter to count. Integer
variables are used to store the count.
U3: DIGIT_COMPARE
Fig4. Block daigram of digit_compare
This block is used to compare the two digits being entered by the user. The entity digit_compare has
bcd0, bcd1 and num_sel as inputs and num_eq as an output. The architecture body compares the three
combinations entered by the user. When the entered combination is correct the output signal num_eq becomes
equal to „1‟ otherwise it remains equal to „0‟.
U4:MASTER_FSM
The master_fsm is the most important and useful block of electronic safe. This block controls the
functioning of all the signals and blocks. In other words we can say that it is the heart of the electronic safe[9].
Fig5.State diagram of master_fsm
The overall characteristics of the safe are determined by component master_fsm.
U5&U6:BCD_7SEG
Fig6.Bcd to seven-segment decoder
FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 22 | Page
An often used decoder function is a BCD to seven-segment decoder [8]. This decoder takes as its
inputs four bits that represent a binary coded decimal value and generates a 7-bit output to drive a seven-
segment LED. If the BCD input has a value from 0 to 9, the output consists of the value needed to display the
corresponding decimal digit. If the BCD input is greater than 9, all the outputs are don`t care. Since these input
values should not occur.
IV. Rtl Simulation
The RTL simulation step is used to verify the correctness of the RTL VHDL description. The designers
use it to describe the clock by clock the behavior of the design. A standard VHDL simulator can be used to read
the RTL VHDL description and verify the correctness of the design. The designer can look at the output of the
simulator and determine whether or not the design is working properly.
The simulator will generate the output data that can be analyzed. The designer usually has number of
ways to analysis the data. The most common are output waveform and text tabular output. The RTL simulation
is shown below [10]:
Fig7. RTL view Fig8. Technology view
Fig9. Simulation result
V. Conclusion
In the present scenario of the technology there are two fields in engineering that hold great demand in
the industry, namely-communication & VLSI. Therefore, in order to add glimpse to this development we
thought of this research.A final point is that when a VHDL model is translated into the “gates and wires” that
are mapped onto a programmable logic device such as CPLD or FPGA, then it is the actual hardware being
configured, rather than the VHDL code being.When implementing the circuit in anti-fuse type FPGA, it is an
advantage that the configuration file in memory is not necessary. In this case it is already verified that the circuit
will be fully functional.
FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 23 | Page
References
[1] JialiangZhang , The Design, Simulation, Verification and Implementation of Vending Machine Based on FPGA , The Ohio
StateUniversity 2012 , Advisor: Prof. Y. F. Zheng, 2012.
[2] David Lee, MihalisYannakakis, PRINCIPLES AND METHODS OF TESTING FINITE STATE MACHINES, AT&T
BellLaboratories,Murray Hill, New Jersey Proceeding of the IEEE, 1996.
[3] Scott Harper and Peter Athanas, A Security Policy Based upon Hardware Encryption, Proceedings of the 37th Hawaii
InternationalConference on System Sciences - 2004
[4] Ana Monga1, Balwinder Singh2, Finite State Machine based Vending Machine Controller with Auto -Billing Features,
InternationalJournal of VLSI design & Communication Systems (VLSICS) Vol.3, No.2, April 2012
[5] Books:
[6] R.P.JAIN, “Modern Digital Electronics”, Tata McGraw Hill, Third Edition 2003.
[7] J.Bhaskar, “A VHDL Primer”, Pearson Education Asia, Third Edition 1999.
[8] Kenneth L. Short, “VHDL for Engineers”, Pearson Education Asia 2009.
[9] John N.Roth, “Digital Design using VHDL”.
[10] ACTIVE HDL, “ACTIVE HDL Software Quick Start Guide”.
[11] XILINX INC, “XILINX Software sampler Quick Start Guide”.
[12] M.morris Mano, “Digital Logic and Computer Design”, Prentice Hall of India, Nov 1995.
[13] Volnei A. Pedroni, “Circuit Design with VHDL”, Prentice Hall of India 2006.
[14] SudhakarYalamanchili, “Introductory VHDL”, Pearson Education Asia 2005.
[15] Kevin Skahill, “VHDL for Programmable Logic”, Pearson Education Asia 2004.

More Related Content

What's hot

IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation csandit
 
Internet enebled data acquisition and device control
Internet enebled data acquisition and device controlInternet enebled data acquisition and device control
Internet enebled data acquisition and device controleSAT Journals
 
Application of Microcontroller in Transmitter Section of Wireless System
Application of Microcontroller in Transmitter Section of Wireless SystemApplication of Microcontroller in Transmitter Section of Wireless System
Application of Microcontroller in Transmitter Section of Wireless Systemijceronline
 
A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...theijes
 
Network Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC MicrocontrollerNetwork Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC MicrocontrollerCSCJournals
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer securityDeepak John
 
Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...Claude Ndayisenga
 
Fingerprint Attendance System - the hand-held device for classroom attendance
Fingerprint Attendance System - the hand-held device for classroom attendanceFingerprint Attendance System - the hand-held device for classroom attendance
Fingerprint Attendance System - the hand-held device for classroom attendancemohamedbasheerkp
 
Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...iosrjce
 
A design of FPGA based intelligent data handling interfacing card.
A design of FPGA based intelligent data handling interfacing card.A design of FPGA based intelligent data handling interfacing card.
A design of FPGA based intelligent data handling interfacing card.IJERA Editor
 
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain VehicleIRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain VehicleIRJET Journal
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewIJERA Editor
 
Design of a usb based data acquisition system
Design of a usb based data acquisition systemDesign of a usb based data acquisition system
Design of a usb based data acquisition systemeSAT Publishing House
 
Application of dual tone multi frequency technology
Application of dual tone multi frequency technologyApplication of dual tone multi frequency technology
Application of dual tone multi frequency technologyeSAT Publishing House
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pceSAT Journals
 
Thesis on Solar Based Hecto Robotic Vehicle
Thesis on Solar Based Hecto Robotic VehicleThesis on Solar Based Hecto Robotic Vehicle
Thesis on Solar Based Hecto Robotic VehicleAkhil Reddy Rondla
 

What's hot (17)

IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
 
Internet enebled data acquisition and device control
Internet enebled data acquisition and device controlInternet enebled data acquisition and device control
Internet enebled data acquisition and device control
 
Application of Microcontroller in Transmitter Section of Wireless System
Application of Microcontroller in Transmitter Section of Wireless SystemApplication of Microcontroller in Transmitter Section of Wireless System
Application of Microcontroller in Transmitter Section of Wireless System
 
A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...
 
Network Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC MicrocontrollerNetwork Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC Microcontroller
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer security
 
Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...Design and implementation of real time security guard robot using GSM/CDMA ne...
Design and implementation of real time security guard robot using GSM/CDMA ne...
 
Fingerprint Attendance System - the hand-held device for classroom attendance
Fingerprint Attendance System - the hand-held device for classroom attendanceFingerprint Attendance System - the hand-held device for classroom attendance
Fingerprint Attendance System - the hand-held device for classroom attendance
 
Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...
 
A design of FPGA based intelligent data handling interfacing card.
A design of FPGA based intelligent data handling interfacing card.A design of FPGA based intelligent data handling interfacing card.
A design of FPGA based intelligent data handling interfacing card.
 
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain VehicleIRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In Labview
 
Design of a usb based data acquisition system
Design of a usb based data acquisition systemDesign of a usb based data acquisition system
Design of a usb based data acquisition system
 
Application of dual tone multi frequency technology
Application of dual tone multi frequency technologyApplication of dual tone multi frequency technology
Application of dual tone multi frequency technology
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
 
Thesis on Solar Based Hecto Robotic Vehicle
Thesis on Solar Based Hecto Robotic VehicleThesis on Solar Based Hecto Robotic Vehicle
Thesis on Solar Based Hecto Robotic Vehicle
 
40120140504013
4012014050401340120140504013
40120140504013
 

Viewers also liked

Some forms of N-closed Maps in supra Topological spaces
Some forms of N-closed Maps in supra Topological spacesSome forms of N-closed Maps in supra Topological spaces
Some forms of N-closed Maps in supra Topological spacesIOSR Journals
 
Motor Fitness of Rural Primary School Girls In Comparison To Boys
Motor Fitness of Rural Primary School Girls In Comparison To Boys Motor Fitness of Rural Primary School Girls In Comparison To Boys
Motor Fitness of Rural Primary School Girls In Comparison To Boys IOSR Journals
 
Effects of Harness Running, Sand Running, Weight - Jacket Running and Weight ...
Effects of Harness Running, Sand Running, Weight - Jacket Running and Weight ...Effects of Harness Running, Sand Running, Weight - Jacket Running and Weight ...
Effects of Harness Running, Sand Running, Weight - Jacket Running and Weight ...IOSR Journals
 
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...IOSR Journals
 
On Stability Equilibrium Analysis of Endemic Malaria
On Stability Equilibrium Analysis of Endemic MalariaOn Stability Equilibrium Analysis of Endemic Malaria
On Stability Equilibrium Analysis of Endemic MalariaIOSR Journals
 
Postural Comparison of Dextrous and Ambidextrous Players
Postural Comparison of Dextrous and Ambidextrous PlayersPostural Comparison of Dextrous and Ambidextrous Players
Postural Comparison of Dextrous and Ambidextrous PlayersIOSR Journals
 
SD-miner System to Retrieve Probabilistic Neighborhood Points in Spatial Dat...
SD-miner System to Retrieve Probabilistic Neighborhood Points  in Spatial Dat...SD-miner System to Retrieve Probabilistic Neighborhood Points  in Spatial Dat...
SD-miner System to Retrieve Probabilistic Neighborhood Points in Spatial Dat...IOSR Journals
 
A Comparative Study of Certain Administrative and Academic Aspects of Minorit...
A Comparative Study of Certain Administrative and Academic Aspects of Minorit...A Comparative Study of Certain Administrative and Academic Aspects of Minorit...
A Comparative Study of Certain Administrative and Academic Aspects of Minorit...IOSR Journals
 
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.IOSR Journals
 
Bioavailability Studies of Ketorolac Tromethamine Fast Dissolving Tablets Pre...
Bioavailability Studies of Ketorolac Tromethamine Fast Dissolving Tablets Pre...Bioavailability Studies of Ketorolac Tromethamine Fast Dissolving Tablets Pre...
Bioavailability Studies of Ketorolac Tromethamine Fast Dissolving Tablets Pre...IOSR Journals
 
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particlesSimple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particlesIOSR Journals
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelCapacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
 
Design and Analysis of Impregnation Chamber Used In Vacuum Pressure Impregnat...
Design and Analysis of Impregnation Chamber Used In Vacuum Pressure Impregnat...Design and Analysis of Impregnation Chamber Used In Vacuum Pressure Impregnat...
Design and Analysis of Impregnation Chamber Used In Vacuum Pressure Impregnat...IOSR Journals
 
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...IOSR Journals
 

Viewers also liked (20)

Some forms of N-closed Maps in supra Topological spaces
Some forms of N-closed Maps in supra Topological spacesSome forms of N-closed Maps in supra Topological spaces
Some forms of N-closed Maps in supra Topological spaces
 
G0523444
G0523444G0523444
G0523444
 
Motor Fitness of Rural Primary School Girls In Comparison To Boys
Motor Fitness of Rural Primary School Girls In Comparison To Boys Motor Fitness of Rural Primary School Girls In Comparison To Boys
Motor Fitness of Rural Primary School Girls In Comparison To Boys
 
Effects of Harness Running, Sand Running, Weight - Jacket Running and Weight ...
Effects of Harness Running, Sand Running, Weight - Jacket Running and Weight ...Effects of Harness Running, Sand Running, Weight - Jacket Running and Weight ...
Effects of Harness Running, Sand Running, Weight - Jacket Running and Weight ...
 
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
 
On Stability Equilibrium Analysis of Endemic Malaria
On Stability Equilibrium Analysis of Endemic MalariaOn Stability Equilibrium Analysis of Endemic Malaria
On Stability Equilibrium Analysis of Endemic Malaria
 
E0312531
E0312531E0312531
E0312531
 
G0624353
G0624353G0624353
G0624353
 
Postural Comparison of Dextrous and Ambidextrous Players
Postural Comparison of Dextrous and Ambidextrous PlayersPostural Comparison of Dextrous and Ambidextrous Players
Postural Comparison of Dextrous and Ambidextrous Players
 
D0331923
D0331923D0331923
D0331923
 
SD-miner System to Retrieve Probabilistic Neighborhood Points in Spatial Dat...
SD-miner System to Retrieve Probabilistic Neighborhood Points  in Spatial Dat...SD-miner System to Retrieve Probabilistic Neighborhood Points  in Spatial Dat...
SD-miner System to Retrieve Probabilistic Neighborhood Points in Spatial Dat...
 
A Comparative Study of Certain Administrative and Academic Aspects of Minorit...
A Comparative Study of Certain Administrative and Academic Aspects of Minorit...A Comparative Study of Certain Administrative and Academic Aspects of Minorit...
A Comparative Study of Certain Administrative and Academic Aspects of Minorit...
 
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
 
Bioavailability Studies of Ketorolac Tromethamine Fast Dissolving Tablets Pre...
Bioavailability Studies of Ketorolac Tromethamine Fast Dissolving Tablets Pre...Bioavailability Studies of Ketorolac Tromethamine Fast Dissolving Tablets Pre...
Bioavailability Studies of Ketorolac Tromethamine Fast Dissolving Tablets Pre...
 
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particlesSimple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
F0522833
F0522833F0522833
F0522833
 
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelCapacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
 
Design and Analysis of Impregnation Chamber Used In Vacuum Pressure Impregnat...
Design and Analysis of Impregnation Chamber Used In Vacuum Pressure Impregnat...Design and Analysis of Impregnation Chamber Used In Vacuum Pressure Impregnat...
Design and Analysis of Impregnation Chamber Used In Vacuum Pressure Impregnat...
 
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
 

Similar to FPGA-based electronic safe lock design

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
FPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for BeginnersFPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for Beginnersijtsrd
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level IJECEIAES
 
IRJET- Design & Implementation of Black Box in Automobiles System
IRJET-  	  Design & Implementation of Black Box in Automobiles SystemIRJET-  	  Design & Implementation of Black Box in Automobiles System
IRJET- Design & Implementation of Black Box in Automobiles SystemIRJET Journal
 
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...SANTIAGO PABLO ALBERTO
 
Fpga implementation of a functional microcontroller
Fpga implementation of a functional microcontrollerFpga implementation of a functional microcontroller
Fpga implementation of a functional microcontrollereSAT Publishing House
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollernooriasukmaningtyas
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security systemNIT srinagar
 
Design and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tDesign and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tIJARIIT
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 

Similar to FPGA-based electronic safe lock design (20)

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
10
1010
10
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
G05124550
G05124550G05124550
G05124550
 
FPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for BeginnersFPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for Beginners
 
finger print sensor
finger print sensor finger print sensor
finger print sensor
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGSA STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
 
Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level
 
IRJET- Design & Implementation of Black Box in Automobiles System
IRJET-  	  Design & Implementation of Black Box in Automobiles SystemIRJET-  	  Design & Implementation of Black Box in Automobiles System
IRJET- Design & Implementation of Black Box in Automobiles System
 
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
 
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
 
An FPGA application of home security code using verilog
An FPGA application of home security code using verilogAn FPGA application of home security code using verilog
An FPGA application of home security code using verilog
 
Fpga implementation of a functional microcontroller
Fpga implementation of a functional microcontrollerFpga implementation of a functional microcontroller
Fpga implementation of a functional microcontroller
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontroller
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
 
Design and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tDesign and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io t
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

FPGA-based electronic safe lock design

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 1 (May. - Jun. 2013), PP 19-23 www.iosrjournals.org www.iosrjournals.org 19 | Page FPGA Based Implementation of Electronic Safe Lock Charnjit Singh1 , Abhilasha Sharma2 1 (M.Tech Student, Eternal University, H.P. India) 2 (Asst. Professor, Eternal University, H.P. India) Abstract :Thispaper is based on design of an “Automatic Security System Using VHDL” providing understandable and adequate operating procedure to the user. The operation is conducted by six different modules. If any of the modules fails, the failed module can be replaced without affecting the activity of others. The safety is ensured to the user by setting a secret code number which is the combination of three numbers, by doing so, only the authorized users can unlock the safe. The paper finds its appositeness in big organizations, military and banking sectors. Simulation through VHDL is quite generous and fiscal due to the reduction in number of components. Important operation consideration is to not give any indication to the user that the combination entered is incorrect until after the user has entered the all three numbers and pressed the OPEN key. Otherwise, it is possible for a user to determine the combination in no more than 96 attempts, as opposed to no more than 32,768 attempts. Keywords –FPGA, FSM, LOCK, VHDL, XILINX I. INTRODUCTION The electronic lock is often introduced to illustrate the possibilities of design of an electronic system using a top-down approach. This is because it is not too complicated but must be designed as a complete system. The “customer” must be able to specify the key data sequence and the sequence must be easily modified when required. As designs become more complex, it becomes more efficient to move away from ad-hoc methods and use tools that allow the design to be carried out at a higher level of abstraction[1]. The design of electronics to control any automated system is generally referred as a CODE LOCK MACHANISM. An application of this is design of electronic safe. The front panel of the safe is kept as simple as possible for understanding of user. A code locking mechanism that transmits information between a key and a locking mechanism secured against interception misuse, but flexible with respect to original equipment, replacement parts, and emergency functions[2] , is obtained if the key code is, in each case, cryptographically encoded through a hardware encoder. When the locking mechanism is first operated, a control element inductively coupled to a locking mechanism read-write unit with a new key once and in a non-over writable manner, transmits an indent number to the object memory [3]. Object-specific identity data are also stored in the control element. With the latter, a key number from a key register of the control element is combined with the key code to read the ladder together with a roll-in random code into the set of first still-neutral keys and into the object memory. Thus, a key is valid only if the object-specific identity data are taken into account in its key code [4]. The lock used in the electronic safe is basically a combinational lock. A combinational lock is a lock that requires the entering of a specific sequence of symbols to dislodge and open. The symbols are typically numerical, letters and other types of symbols may also be used to formulate a sequence. Depending on whether the lock is single-dial, multiple-dial; or discs or keypads may be used to enter sequences. Combinational locks are generally thought to be secure. II. Overview Of Electronic Safe The safe`s electronics receives inputs from the front panel & provide signals to the seven segment displays & to a motorized bolt. When the bolt`s motor is actuated to turn in one direction, it unlocks the safe door [5].
  • 2. FPGA Based Implementation Of Electronic Safe www.iosrjournals.org 20 | Page Fig1. Basic View Of Electronic Safe III. System Design The block diagram of electronic safe lock and it is consists of six design entities [7]. U1: ose_decoder_fsm U5&U6: bcd_7seg U2: bcd_2dec U3: digit_compare U4: master_fsm Fig2. Block diagram of electronic safe lock U1&U4 are both fsms which together control the operation of the system. U2 is two digits modulo BCD counter. U5&U6 convert each BCD digit from U2 to a seven segment code. In theory, the control portion of the electronic safe could be designed as a single fsm. However, it simplifies defining the operation of electronic safe to partition the control function into two cooperating fsms. Ose fsm is component of ose_decoder_fsm. It has limited and very specific functions. The other fsm is master_fsm. This fsm controls the overall operation of the safe. U1: OSE_DECODER_FSM We can design a four time decoder that enables the counter to count once for each combination of A&B. this increases the effective resolution of OSE and decoder combination by a factor of 4, compared to simply counting positive edges of A(or B) directly[4]. Fig3. State diagram of ose_decoder_fsm
  • 3. FPGA Based Implementation Of Electronic Safe www.iosrjournals.org 21 | Page U2: BCD_2DEC This two-digit BCD counter counts from 00 to 31 and then rolls over to 00. The count direction can be up or down. The counter has two counts enable inputs: both must be asserted for the counter to count. Integer variables are used to store the count. U3: DIGIT_COMPARE Fig4. Block daigram of digit_compare This block is used to compare the two digits being entered by the user. The entity digit_compare has bcd0, bcd1 and num_sel as inputs and num_eq as an output. The architecture body compares the three combinations entered by the user. When the entered combination is correct the output signal num_eq becomes equal to „1‟ otherwise it remains equal to „0‟. U4:MASTER_FSM The master_fsm is the most important and useful block of electronic safe. This block controls the functioning of all the signals and blocks. In other words we can say that it is the heart of the electronic safe[9]. Fig5.State diagram of master_fsm The overall characteristics of the safe are determined by component master_fsm. U5&U6:BCD_7SEG Fig6.Bcd to seven-segment decoder
  • 4. FPGA Based Implementation Of Electronic Safe www.iosrjournals.org 22 | Page An often used decoder function is a BCD to seven-segment decoder [8]. This decoder takes as its inputs four bits that represent a binary coded decimal value and generates a 7-bit output to drive a seven- segment LED. If the BCD input has a value from 0 to 9, the output consists of the value needed to display the corresponding decimal digit. If the BCD input is greater than 9, all the outputs are don`t care. Since these input values should not occur. IV. Rtl Simulation The RTL simulation step is used to verify the correctness of the RTL VHDL description. The designers use it to describe the clock by clock the behavior of the design. A standard VHDL simulator can be used to read the RTL VHDL description and verify the correctness of the design. The designer can look at the output of the simulator and determine whether or not the design is working properly. The simulator will generate the output data that can be analyzed. The designer usually has number of ways to analysis the data. The most common are output waveform and text tabular output. The RTL simulation is shown below [10]: Fig7. RTL view Fig8. Technology view Fig9. Simulation result V. Conclusion In the present scenario of the technology there are two fields in engineering that hold great demand in the industry, namely-communication & VLSI. Therefore, in order to add glimpse to this development we thought of this research.A final point is that when a VHDL model is translated into the “gates and wires” that are mapped onto a programmable logic device such as CPLD or FPGA, then it is the actual hardware being configured, rather than the VHDL code being.When implementing the circuit in anti-fuse type FPGA, it is an advantage that the configuration file in memory is not necessary. In this case it is already verified that the circuit will be fully functional.
  • 5. FPGA Based Implementation Of Electronic Safe www.iosrjournals.org 23 | Page References [1] JialiangZhang , The Design, Simulation, Verification and Implementation of Vending Machine Based on FPGA , The Ohio StateUniversity 2012 , Advisor: Prof. Y. F. Zheng, 2012. [2] David Lee, MihalisYannakakis, PRINCIPLES AND METHODS OF TESTING FINITE STATE MACHINES, AT&T BellLaboratories,Murray Hill, New Jersey Proceeding of the IEEE, 1996. [3] Scott Harper and Peter Athanas, A Security Policy Based upon Hardware Encryption, Proceedings of the 37th Hawaii InternationalConference on System Sciences - 2004 [4] Ana Monga1, Balwinder Singh2, Finite State Machine based Vending Machine Controller with Auto -Billing Features, InternationalJournal of VLSI design & Communication Systems (VLSICS) Vol.3, No.2, April 2012 [5] Books: [6] R.P.JAIN, “Modern Digital Electronics”, Tata McGraw Hill, Third Edition 2003. [7] J.Bhaskar, “A VHDL Primer”, Pearson Education Asia, Third Edition 1999. [8] Kenneth L. Short, “VHDL for Engineers”, Pearson Education Asia 2009. [9] John N.Roth, “Digital Design using VHDL”. [10] ACTIVE HDL, “ACTIVE HDL Software Quick Start Guide”. [11] XILINX INC, “XILINX Software sampler Quick Start Guide”. [12] M.morris Mano, “Digital Logic and Computer Design”, Prentice Hall of India, Nov 1995. [13] Volnei A. Pedroni, “Circuit Design with VHDL”, Prentice Hall of India 2006. [14] SudhakarYalamanchili, “Introductory VHDL”, Pearson Education Asia 2005. [15] Kevin Skahill, “VHDL for Programmable Logic”, Pearson Education Asia 2004.