Abstract :Thispaper is based on design of an “Automatic Security System Using VHDL” providing understandable and adequate operating procedure to the user. The operation is conducted by six different modules. If any of the modules fails, the failed module can be replaced without affecting the activity of others. The safety is ensured to the user by setting a secret code number which is the combination of three numbers, by doing so, only the authorized users can unlock the safe. The paper finds its appositeness in big organizations, military and banking sectors. Simulation through VHDL is quite generous and fiscal due to the reduction in number of components. Important operation consideration is to not give any indication to the user that the combination entered is incorrect until after the user has entered the all three numbers and pressed the OPEN key. Otherwise, it is possible for a user to determine the combination in no more than 96 attempts, as opposed to no more than 32,768 attempts. Keywords –FPGA, FSM, LOCK, VHDL, XILINX
Fault location and correction are important in case of any power systems. This process has to be prompt and accurate so that system reliability can be improved , outage time can be reduced and restoration of system from fault can be accelerated.
Fault location calculation using Magnetoresistance sensor is described here.
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
A network switch (sometimes known as a switching hub) is a computer networking device that is used to connect devices together on a computer network by performing a form of packet switching. A switch is considered more advanced than a hub because a switch will only send a message to the device that needs or requests it, rather than broadcasting the same message out of each of its ports
Fault location and correction are important in case of any power systems. This process has to be prompt and accurate so that system reliability can be improved , outage time can be reduced and restoration of system from fault can be accelerated.
Fault location calculation using Magnetoresistance sensor is described here.
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
A network switch (sometimes known as a switching hub) is a computer networking device that is used to connect devices together on a computer network by performing a form of packet switching. A switch is considered more advanced than a hub because a switch will only send a message to the device that needs or requests it, rather than broadcasting the same message out of each of its ports
DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)Journal For Research
Transmission lines are used to transmit electric power to distant large load centres. These lines are exposed to faults as a result of lightning, short circuits, faulty equipment’s, miss-operation, human errors, overload, and aging.To avoid this situation, and we need the exact location of fault occurrence. This problem ishandled by a set of resistors representing cable length in KMs and fault creation is made by a set of switches at every known KM to cross check the accuracy of the same. The fault occurring at what distance and which phase is displayed on a 16X2 LCD interfaced with the microcontroller. Calculated values are sends to the receiving section with help of Zigbee. Measured values are updated in PC and monitored with help of .NET. RTC is used here to time and date reference, that when the event occurs.
Liquor detection through Automatic Motor locking system pptPankaj Singh
The main purpose behind this project is “Drunken driving detection”. Now-a-days, many accidents are happening because of the alcohol consumption of the driver. Thus drunk driving is a major reason of accidents in almost all countries all over the world
BCH codes, part of the cyclic codes, are very powerful error correcting codes widely used in the information coding techniques. This presentation explains these codes with an example.
Challenges faced during embedded system design:
The challenges in design of embedded systems have always been in the same limiting requirements for decades: Small form factor; Low energy; Long-term stable performance without maintenance.
Implementation of Reversable Logic Based Design using Submicron TechnologySai Viswanath
Reversible logic has emerged as a computing paradigm having application in low power CMOS, quantum and optical computing. Design of reversible logic gate is reversible operation, when we say reversible it performing computation in such a way that any previous state can be reconstructed at given a description of the current state. The classical set of gates such as AND, OR, and XOR are not reversible.
This presentation is a design of reversible logic gate used for reversible operation. When we say reversible computing, we mean performing computation in such a way that any previous state of the computation can always be reconstructed given a description of the current state. The classical set of gates such as AND, OR, and EXOR are not reversible. This paper also includes simulation results of forward & backward computation of reversible FREDKIN gate and TSG gate.
Development of biomedical technologies is an urgent necessity to improve diagnostic services.
Electronic pill technology is a more recent development.
A small miniaturized electronic pill can reach all areas such as small intestine.
DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)Journal For Research
Transmission lines are used to transmit electric power to distant large load centres. These lines are exposed to faults as a result of lightning, short circuits, faulty equipment’s, miss-operation, human errors, overload, and aging.To avoid this situation, and we need the exact location of fault occurrence. This problem ishandled by a set of resistors representing cable length in KMs and fault creation is made by a set of switches at every known KM to cross check the accuracy of the same. The fault occurring at what distance and which phase is displayed on a 16X2 LCD interfaced with the microcontroller. Calculated values are sends to the receiving section with help of Zigbee. Measured values are updated in PC and monitored with help of .NET. RTC is used here to time and date reference, that when the event occurs.
Liquor detection through Automatic Motor locking system pptPankaj Singh
The main purpose behind this project is “Drunken driving detection”. Now-a-days, many accidents are happening because of the alcohol consumption of the driver. Thus drunk driving is a major reason of accidents in almost all countries all over the world
BCH codes, part of the cyclic codes, are very powerful error correcting codes widely used in the information coding techniques. This presentation explains these codes with an example.
Challenges faced during embedded system design:
The challenges in design of embedded systems have always been in the same limiting requirements for decades: Small form factor; Low energy; Long-term stable performance without maintenance.
Implementation of Reversable Logic Based Design using Submicron TechnologySai Viswanath
Reversible logic has emerged as a computing paradigm having application in low power CMOS, quantum and optical computing. Design of reversible logic gate is reversible operation, when we say reversible it performing computation in such a way that any previous state can be reconstructed at given a description of the current state. The classical set of gates such as AND, OR, and XOR are not reversible.
This presentation is a design of reversible logic gate used for reversible operation. When we say reversible computing, we mean performing computation in such a way that any previous state of the computation can always be reconstructed given a description of the current state. The classical set of gates such as AND, OR, and EXOR are not reversible. This paper also includes simulation results of forward & backward computation of reversible FREDKIN gate and TSG gate.
Development of biomedical technologies is an urgent necessity to improve diagnostic services.
Electronic pill technology is a more recent development.
A small miniaturized electronic pill can reach all areas such as small intestine.
Static and Dynamic Behavior of Reinforced Concrete Framed Building: A Compara...IOSR Journals
Reinforced concrete frame buildings are most common type of construction in urban India, which is subjected to several types of forces during their life time such as static forces and dynamic forces due to wind and earthquakes. The static loads are constant with time, while dynamic loads are time varying, causing considerable inertia effects .It depends mainly on location of building, importance of its use and size of the building. Its consideration in analysis makes the solution more complicated and time consuming and its negligence may sometimes becomes the cause of disaster during earthquake.
So it is growing interest in the process of designing civil engineering structures capable to withstand dynamic loads . The behavior of building under dynamic forces depends upon its mass and stiffness properties, whereas the static behavior is solely dependent upon the stiffness characteristics.
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 compositeIOSR Journals
The research work is carried out on the study of tribological property of aluminium based metal matrix composite material, which is fabricated by using sol-gel technique. The composite material is prepared through liquid metallurgy method by using varying percentage of Alumina and aluminium and fixed percentage of copper 4.2%. Test sample billet is fabricated through casting method and has been examined the different mechanical behaviour such as Vickers Hardness Number, Ultimate Tensile Strength, 0.2% Proof Stress, etc.
From the study, it has been observed that with increase in the alumina content in matrix the ductility of composite show a contrary effect. The Pin-On-Disc test is used to evaluate the tribological property wear for composite material and it is observered that tendency of wear rate has improved. The weight losses of the specimen are measured and wear and friction characteristics are calculated with respect to time. Depth of wear track, sliding speed, bearing load friction coefficient and wear volume have been shown large sensitivity to the applied normal load and the testing time (or sliding distance). The XRD and SEM analysis are used to analyse the wear debris and track; and silent conclusion has been drawn
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one
developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with
the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
FPGA Based Digital Logic Circuits Operation for Beginnersijtsrd
This paper presents the operations of digital circuits based on FPGA. The long term of FPGA is field programmable gate array. FPGA is an integrated circuit designed to be configured by a customer or a designer after manufacturing hence field programmable . The operations of logic circuits such as logic gates, flip flop and 7 segment are tested using quartus II software and DE2 115 and DE1 FPGA development kits in this paper. Particularly, there are three main portions such as implementation of schematic diagram, designing of the vhdl program, the connection of the control panel and displaying the result of logic circuits on FPGA kit. The operations of combinational circuits are tested by designing the VHDL programs. And then the operations of sequential circuits are observed and displayed the results of them by illustrating the schematic diagrams. San San Naing | Ni Ni San Hlaing | Cho Thet Nwe "FPGA Based Digital Logic Circuits Operation for Beginners" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26372.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26372/fpga-based-digital-logic-circuits-operation-for-beginners/san-san-naing
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
Abstract In this paper, MEMS (Micro Electro Mechanical System) is implemented using Embedded controller PIC 16F877A. MEMS can be used to sense motion. Microcontroller detect any motion while they are occurs or not. The user can assign a password by fixed set of motions as decided by them. In that there are three techniques uses for user’s authentication. Firstly Microcontroller senses any motion which is matches with exist motion password, then first phase will unlock and it goes into next phase is human interface method of keypad that is traditional where the user enters the predefined password, if it is matched with the predefined password then second phase will be unlock. Then user will directly enter into the final phase which is a RFID card that is read by a RFID reader module connected to the Micro controller if the card is matched the final phase get completed and the desired operation will start. A buzzer is used for an indication of wrong password. This buzzer is ON until right password matches with existing password. Key Words: -Codebooks, Key Logger, PIC Microcontroller, Secret Little Functions, RFID, MEMS.
This study paper portrays a fresh approach for
a course and laboratory design to establish low cost prototypes
and other entrenched devices that accentuate virtual
programmable logic device (VPLD), object oriented java and
real time processing tactics. JAVA is used for software
development. The study encompasses the use of host and node
application. A high performance, low power AVR with high
endurance non-volatile memory segments and with an advance
RISC structure is used to construct prototypes. The paperwork
deals with the VPLD board which is capable to work as
corresponding digital logic analyzer, equation parser, standard
digital IC and design wave studio
Arduino based 74-series integrated circuits testing system at gate level IJECEIAES
The goal of this research article is to build and implement a low-cost, user-friendly 74-series logic integrated circuits (ICs) tester that is independent of a computer. Depending on the truth table of the gates and the IC configuration, the logic IC tester will be able to test the operation of the 74 series logic gates (AND, OR, NOR, NAND, XOR) of those ICs. It is feasible to test a range of logic ICs with higher pin widths thanks to the proposed system’s usage of an Arduino Mega platform module as a microcontroller, which provides the ability to connect 54 programmed logic inputs or outputs. The versatility offered by this design and the use of a personal computer allow for the reprograming and updating of the logic IC functional tester. Any 74-series ICs testing outcome will be shown on liquid crystal display (LCD) at the gate level. The logic IC functional tester was successfully constructed and operates flawlessly.
This paper presents interfaces required in wireless sensor node (WSN) implementation. Here keyboard,
LCD, ADC and Wi-Fi module interfaces are presented. These interfaces are developed as hardware prototypes in
the application of wireless sensor node as a single chip solution. Protocols of these interfaces have been described
with the help of their hardware simulations and synthesis reports.
The end application is proposed to monitor physical parameters remotely using wireless protocol. The sensor node
has to be implemented on Field Programmable Gate Array (FPGA). The proposed node design is reconfigurable,
and hence flexible in context of future modification. Xilinx platform is proposed for synthesis, simulation and
implementation.
Keywords — FPGA, wireless sensor node.
Traditional entrance keys performed a number of drawbacks, including the ease with which they can be stolen, duplicated, or misplaced, allowing unauthorized people to gain access to cash, valuables, and other important documents. As known, most digital electronic entrance locks use application specific integrated circuits (ASICs) as based, which have the disadvantage of being unable to be reconfigured, as opposed to field programmable gate arrays (FPGA). This project proposed a home security code lock using verilog hardware descriptive language (HDL) with two unlocking modes, using a button or a keypad which can be changed using a switch. The 7-segment on the Altera DE2-115 trainer board is used to display the passcode press by the keypad. The result of simulation on the keypad using finite state machine (FSM) technique was fulfill the theoretical concept in which it will go to the next state each time the correct input or passcode was entered. When the wrong input or passcode was entered, it will be entered to reset mode. As the conclusion, a fully comply output according to the theoretical FSM concept is fully achieved in this project.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Real time model of a lock gate system upon fingerprint with microcontrollernooriasukmaningtyas
Safety is one of the most important things that we are keen to provide all aspects of our lives. Keyless lock gate with fingerprint access has many advantages over traditional systems such as passwords. Therefore, fingerprint identification represents the main part, which require that system is cheap, practical, easy to use and allows fast and securely. This paper discusses the design and implementation with real time model of a practical lock gate system for the achievement of high security by using fingerprint purification to control the mechanism of opening doors in banks, warehouses, laboratories and places of interest. In this paper, the microcontroller technology in the Ardonio board was used with an optical sensor to take the fingerprint, convert it into digital data, and insert it into a definition window to unify all input data and store it for use when compared to the system experience. After obtaining the result of the comparison, the appropriate commands are prepared for operating the servo of the lock mechanism for the doors used. In the testing of the system, the results are very accurate. The system also has other advantages such as small size and low power required for operation and ease of use.
Design and implementation of microcontroller in fpga for io tIJARIIT
One of the buzz words in the Information Technology is the Internet of Things (IoT). In coming years, IoT will
transform the objects which are present in the real world into virtual objects. IoT keep us informed about the status of objects
and controls of things in a sensor network. Sensor node comprises of the sensor, microcontroller and RF transceiver. A
microcontroller is an integrated circuit which basically performs one task and executes a particular application. It contains
programmable in/out peripherals, memory, and processor. Microcontrollers are mostly designed in view of embedded and are
used to automatically controllable systems. In digital system design microcontrollers and field programmable gate arrays
(FPGAs), both are widely used. Microcontroller based devices are becoming increasingly widespread. On one hand, high speed,
power, and falling prices make them an obvious choice whereas fast growing popularity of FPGAs, the availability of powerful
development tools and the increase in speed and high density have made FPGA based systems an alternative choice. Sensor node
controller is going to develop using VHDL with behavioral modeling which is an abstract model of the controller and breaks
down of the system into subcomponents and functional blocks.
Similar to FPGA Based Implementation of Electronic Safe Lock (20)
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 1 (May. - Jun. 2013), PP 19-23
www.iosrjournals.org
www.iosrjournals.org 19 | Page
FPGA Based Implementation of Electronic Safe Lock
Charnjit Singh1
, Abhilasha Sharma2
1
(M.Tech Student, Eternal University, H.P. India)
2
(Asst. Professor, Eternal University, H.P. India)
Abstract :Thispaper is based on design of an “Automatic Security System Using VHDL” providing
understandable and adequate operating procedure to the user. The operation is conducted by six different
modules. If any of the modules fails, the failed module can be replaced without affecting the activity of others.
The safety is ensured to the user by setting a secret code number which is the combination of three numbers, by
doing so, only the authorized users can unlock the safe. The paper finds its appositeness in big organizations,
military and banking sectors. Simulation through VHDL is quite generous and fiscal due to the reduction in
number of components. Important operation consideration is to not give any indication to the user that the
combination entered is incorrect until after the user has entered the all three numbers and pressed the OPEN
key. Otherwise, it is possible for a user to determine the combination in no more than 96 attempts, as opposed to
no more than 32,768 attempts.
Keywords –FPGA, FSM, LOCK, VHDL, XILINX
I. INTRODUCTION
The electronic lock is often introduced to illustrate the possibilities of design of an electronic system
using a top-down approach. This is because it is not too complicated but must be designed as a complete system.
The “customer” must be able to specify the key data sequence and the sequence must be easily modified when
required. As designs become more complex, it becomes more efficient to move away from ad-hoc methods and
use tools that allow the design to be carried out at a higher level of abstraction[1].
The design of electronics to control any automated system is generally referred as a CODE LOCK
MACHANISM. An application of this is design of electronic safe. The front panel of the safe is kept as simple
as possible for understanding of user. A code locking mechanism that transmits information between a key and a
locking mechanism secured against interception misuse, but flexible with respect to original equipment,
replacement parts, and emergency functions[2] , is obtained if the key code is, in each case, cryptographically
encoded through a hardware encoder. When the locking mechanism is first operated, a control element
inductively coupled to a locking mechanism read-write unit with a new key once and in a non-over writable
manner, transmits an indent number to the object memory [3]. Object-specific identity data are also stored in the
control element. With the latter, a key number from a key register of the control element is combined with the
key code to read the ladder together with a roll-in random code into the set of first still-neutral keys and into the
object memory. Thus, a key is valid only if the object-specific identity data are taken into account in its key
code [4].
The lock used in the electronic safe is basically a combinational lock. A combinational lock is a lock
that requires the entering of a specific sequence of symbols to dislodge and open. The symbols are typically
numerical, letters and other types of symbols may also be used to formulate a sequence. Depending on whether
the lock is single-dial, multiple-dial; or discs or keypads may be used to enter sequences. Combinational locks
are generally thought to be secure.
II. Overview Of Electronic Safe
The safe`s electronics receives inputs from the front panel & provide signals to the seven segment
displays & to a motorized bolt. When the bolt`s motor is actuated to turn in one direction, it unlocks the safe
door [5].
2. FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 20 | Page
Fig1. Basic View Of Electronic Safe
III. System Design
The block diagram of electronic safe lock and it is consists of six design entities [7].
U1: ose_decoder_fsm U5&U6: bcd_7seg
U2: bcd_2dec
U3: digit_compare
U4: master_fsm
Fig2. Block diagram of electronic safe lock
U1&U4 are both fsms which together control the operation of the system. U2 is two digits modulo
BCD counter. U5&U6 convert each BCD digit from U2 to a seven segment code. In theory, the control portion
of the electronic safe could be designed as a single fsm. However, it simplifies defining the operation of
electronic safe to partition the control function into two cooperating fsms. Ose fsm is component of
ose_decoder_fsm. It has limited and very specific functions. The other fsm is master_fsm. This fsm controls the
overall operation of the safe.
U1: OSE_DECODER_FSM
We can design a four time decoder that enables the counter to count once for each combination of
A&B. this increases the effective resolution of OSE and decoder combination by a factor of 4, compared to
simply counting positive edges of A(or B) directly[4].
Fig3. State diagram of ose_decoder_fsm
3. FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 21 | Page
U2: BCD_2DEC
This two-digit BCD counter counts from 00 to 31 and then rolls over to 00. The count direction can be
up or down. The counter has two counts enable inputs: both must be asserted for the counter to count. Integer
variables are used to store the count.
U3: DIGIT_COMPARE
Fig4. Block daigram of digit_compare
This block is used to compare the two digits being entered by the user. The entity digit_compare has
bcd0, bcd1 and num_sel as inputs and num_eq as an output. The architecture body compares the three
combinations entered by the user. When the entered combination is correct the output signal num_eq becomes
equal to „1‟ otherwise it remains equal to „0‟.
U4:MASTER_FSM
The master_fsm is the most important and useful block of electronic safe. This block controls the
functioning of all the signals and blocks. In other words we can say that it is the heart of the electronic safe[9].
Fig5.State diagram of master_fsm
The overall characteristics of the safe are determined by component master_fsm.
U5&U6:BCD_7SEG
Fig6.Bcd to seven-segment decoder
4. FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 22 | Page
An often used decoder function is a BCD to seven-segment decoder [8]. This decoder takes as its
inputs four bits that represent a binary coded decimal value and generates a 7-bit output to drive a seven-
segment LED. If the BCD input has a value from 0 to 9, the output consists of the value needed to display the
corresponding decimal digit. If the BCD input is greater than 9, all the outputs are don`t care. Since these input
values should not occur.
IV. Rtl Simulation
The RTL simulation step is used to verify the correctness of the RTL VHDL description. The designers
use it to describe the clock by clock the behavior of the design. A standard VHDL simulator can be used to read
the RTL VHDL description and verify the correctness of the design. The designer can look at the output of the
simulator and determine whether or not the design is working properly.
The simulator will generate the output data that can be analyzed. The designer usually has number of
ways to analysis the data. The most common are output waveform and text tabular output. The RTL simulation
is shown below [10]:
Fig7. RTL view Fig8. Technology view
Fig9. Simulation result
V. Conclusion
In the present scenario of the technology there are two fields in engineering that hold great demand in
the industry, namely-communication & VLSI. Therefore, in order to add glimpse to this development we
thought of this research.A final point is that when a VHDL model is translated into the “gates and wires” that
are mapped onto a programmable logic device such as CPLD or FPGA, then it is the actual hardware being
configured, rather than the VHDL code being.When implementing the circuit in anti-fuse type FPGA, it is an
advantage that the configuration file in memory is not necessary. In this case it is already verified that the circuit
will be fully functional.
5. FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 23 | Page
References
[1] JialiangZhang , The Design, Simulation, Verification and Implementation of Vending Machine Based on FPGA , The Ohio
StateUniversity 2012 , Advisor: Prof. Y. F. Zheng, 2012.
[2] David Lee, MihalisYannakakis, PRINCIPLES AND METHODS OF TESTING FINITE STATE MACHINES, AT&T
BellLaboratories,Murray Hill, New Jersey Proceeding of the IEEE, 1996.
[3] Scott Harper and Peter Athanas, A Security Policy Based upon Hardware Encryption, Proceedings of the 37th Hawaii
InternationalConference on System Sciences - 2004
[4] Ana Monga1, Balwinder Singh2, Finite State Machine based Vending Machine Controller with Auto -Billing Features,
InternationalJournal of VLSI design & Communication Systems (VLSICS) Vol.3, No.2, April 2012
[5] Books:
[6] R.P.JAIN, “Modern Digital Electronics”, Tata McGraw Hill, Third Edition 2003.
[7] J.Bhaskar, “A VHDL Primer”, Pearson Education Asia, Third Edition 1999.
[8] Kenneth L. Short, “VHDL for Engineers”, Pearson Education Asia 2009.
[9] John N.Roth, “Digital Design using VHDL”.
[10] ACTIVE HDL, “ACTIVE HDL Software Quick Start Guide”.
[11] XILINX INC, “XILINX Software sampler Quick Start Guide”.
[12] M.morris Mano, “Digital Logic and Computer Design”, Prentice Hall of India, Nov 1995.
[13] Volnei A. Pedroni, “Circuit Design with VHDL”, Prentice Hall of India 2006.
[14] SudhakarYalamanchili, “Introductory VHDL”, Pearson Education Asia 2005.
[15] Kevin Skahill, “VHDL for Programmable Logic”, Pearson Education Asia 2004.