SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 1 (May. - Jun. 2013), PP 19-23
www.iosrjournals.org
www.iosrjournals.org 19 | Page
FPGA Based Implementation of Electronic Safe Lock
Charnjit Singh1
, Abhilasha Sharma2
1
(M.Tech Student, Eternal University, H.P. India)
2
(Asst. Professor, Eternal University, H.P. India)
Abstract :Thispaper is based on design of an “Automatic Security System Using VHDL” providing
understandable and adequate operating procedure to the user. The operation is conducted by six different
modules. If any of the modules fails, the failed module can be replaced without affecting the activity of others.
The safety is ensured to the user by setting a secret code number which is the combination of three numbers, by
doing so, only the authorized users can unlock the safe. The paper finds its appositeness in big organizations,
military and banking sectors. Simulation through VHDL is quite generous and fiscal due to the reduction in
number of components. Important operation consideration is to not give any indication to the user that the
combination entered is incorrect until after the user has entered the all three numbers and pressed the OPEN
key. Otherwise, it is possible for a user to determine the combination in no more than 96 attempts, as opposed to
no more than 32,768 attempts.
Keywords –FPGA, FSM, LOCK, VHDL, XILINX
I. INTRODUCTION
The electronic lock is often introduced to illustrate the possibilities of design of an electronic system
using a top-down approach. This is because it is not too complicated but must be designed as a complete system.
The “customer” must be able to specify the key data sequence and the sequence must be easily modified when
required. As designs become more complex, it becomes more efficient to move away from ad-hoc methods and
use tools that allow the design to be carried out at a higher level of abstraction[1].
The design of electronics to control any automated system is generally referred as a CODE LOCK
MACHANISM. An application of this is design of electronic safe. The front panel of the safe is kept as simple
as possible for understanding of user. A code locking mechanism that transmits information between a key and a
locking mechanism secured against interception misuse, but flexible with respect to original equipment,
replacement parts, and emergency functions[2] , is obtained if the key code is, in each case, cryptographically
encoded through a hardware encoder. When the locking mechanism is first operated, a control element
inductively coupled to a locking mechanism read-write unit with a new key once and in a non-over writable
manner, transmits an indent number to the object memory [3]. Object-specific identity data are also stored in the
control element. With the latter, a key number from a key register of the control element is combined with the
key code to read the ladder together with a roll-in random code into the set of first still-neutral keys and into the
object memory. Thus, a key is valid only if the object-specific identity data are taken into account in its key
code [4].
The lock used in the electronic safe is basically a combinational lock. A combinational lock is a lock
that requires the entering of a specific sequence of symbols to dislodge and open. The symbols are typically
numerical, letters and other types of symbols may also be used to formulate a sequence. Depending on whether
the lock is single-dial, multiple-dial; or discs or keypads may be used to enter sequences. Combinational locks
are generally thought to be secure.
II. Overview Of Electronic Safe
The safe`s electronics receives inputs from the front panel & provide signals to the seven segment
displays & to a motorized bolt. When the bolt`s motor is actuated to turn in one direction, it unlocks the safe
door [5].
FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 20 | Page
Fig1. Basic View Of Electronic Safe
III. System Design
The block diagram of electronic safe lock and it is consists of six design entities [7].
U1: ose_decoder_fsm U5&U6: bcd_7seg
U2: bcd_2dec
U3: digit_compare
U4: master_fsm
Fig2. Block diagram of electronic safe lock
U1&U4 are both fsms which together control the operation of the system. U2 is two digits modulo
BCD counter. U5&U6 convert each BCD digit from U2 to a seven segment code. In theory, the control portion
of the electronic safe could be designed as a single fsm. However, it simplifies defining the operation of
electronic safe to partition the control function into two cooperating fsms. Ose fsm is component of
ose_decoder_fsm. It has limited and very specific functions. The other fsm is master_fsm. This fsm controls the
overall operation of the safe.
U1: OSE_DECODER_FSM
We can design a four time decoder that enables the counter to count once for each combination of
A&B. this increases the effective resolution of OSE and decoder combination by a factor of 4, compared to
simply counting positive edges of A(or B) directly[4].
Fig3. State diagram of ose_decoder_fsm
FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 21 | Page
U2: BCD_2DEC
This two-digit BCD counter counts from 00 to 31 and then rolls over to 00. The count direction can be
up or down. The counter has two counts enable inputs: both must be asserted for the counter to count. Integer
variables are used to store the count.
U3: DIGIT_COMPARE
Fig4. Block daigram of digit_compare
This block is used to compare the two digits being entered by the user. The entity digit_compare has
bcd0, bcd1 and num_sel as inputs and num_eq as an output. The architecture body compares the three
combinations entered by the user. When the entered combination is correct the output signal num_eq becomes
equal to „1‟ otherwise it remains equal to „0‟.
U4:MASTER_FSM
The master_fsm is the most important and useful block of electronic safe. This block controls the
functioning of all the signals and blocks. In other words we can say that it is the heart of the electronic safe[9].
Fig5.State diagram of master_fsm
The overall characteristics of the safe are determined by component master_fsm.
U5&U6:BCD_7SEG
Fig6.Bcd to seven-segment decoder
FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 22 | Page
An often used decoder function is a BCD to seven-segment decoder [8]. This decoder takes as its
inputs four bits that represent a binary coded decimal value and generates a 7-bit output to drive a seven-
segment LED. If the BCD input has a value from 0 to 9, the output consists of the value needed to display the
corresponding decimal digit. If the BCD input is greater than 9, all the outputs are don`t care. Since these input
values should not occur.
IV. Rtl Simulation
The RTL simulation step is used to verify the correctness of the RTL VHDL description. The designers
use it to describe the clock by clock the behavior of the design. A standard VHDL simulator can be used to read
the RTL VHDL description and verify the correctness of the design. The designer can look at the output of the
simulator and determine whether or not the design is working properly.
The simulator will generate the output data that can be analyzed. The designer usually has number of
ways to analysis the data. The most common are output waveform and text tabular output. The RTL simulation
is shown below [10]:
Fig7. RTL view Fig8. Technology view
Fig9. Simulation result
V. Conclusion
In the present scenario of the technology there are two fields in engineering that hold great demand in
the industry, namely-communication & VLSI. Therefore, in order to add glimpse to this development we
thought of this research.A final point is that when a VHDL model is translated into the “gates and wires” that
are mapped onto a programmable logic device such as CPLD or FPGA, then it is the actual hardware being
configured, rather than the VHDL code being.When implementing the circuit in anti-fuse type FPGA, it is an
advantage that the configuration file in memory is not necessary. In this case it is already verified that the circuit
will be fully functional.
FPGA Based Implementation Of Electronic Safe
www.iosrjournals.org 23 | Page
References
[1] JialiangZhang , The Design, Simulation, Verification and Implementation of Vending Machine Based on FPGA , The Ohio
StateUniversity 2012 , Advisor: Prof. Y. F. Zheng, 2012.
[2] David Lee, MihalisYannakakis, PRINCIPLES AND METHODS OF TESTING FINITE STATE MACHINES, AT&T
BellLaboratories,Murray Hill, New Jersey Proceeding of the IEEE, 1996.
[3] Scott Harper and Peter Athanas, A Security Policy Based upon Hardware Encryption, Proceedings of the 37th Hawaii
InternationalConference on System Sciences - 2004
[4] Ana Monga1, Balwinder Singh2, Finite State Machine based Vending Machine Controller with Auto -Billing Features,
InternationalJournal of VLSI design & Communication Systems (VLSICS) Vol.3, No.2, April 2012
[5] Books:
[6] R.P.JAIN, “Modern Digital Electronics”, Tata McGraw Hill, Third Edition 2003.
[7] J.Bhaskar, “A VHDL Primer”, Pearson Education Asia, Third Edition 1999.
[8] Kenneth L. Short, “VHDL for Engineers”, Pearson Education Asia 2009.
[9] John N.Roth, “Digital Design using VHDL”.
[10] ACTIVE HDL, “ACTIVE HDL Software Quick Start Guide”.
[11] XILINX INC, “XILINX Software sampler Quick Start Guide”.
[12] M.morris Mano, “Digital Logic and Computer Design”, Prentice Hall of India, Nov 1995.
[13] Volnei A. Pedroni, “Circuit Design with VHDL”, Prentice Hall of India 2006.
[14] SudhakarYalamanchili, “Introductory VHDL”, Pearson Education Asia 2005.
[15] Kevin Skahill, “VHDL for Programmable Logic”, Pearson Education Asia 2004.

More Related Content

What's hot

DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)
DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)
DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)
Journal For Research
 
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Moe Moe Myint
 
Liquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptLiquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system ppt
Pankaj Singh
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
AakankshaR
 
Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...mahesh_rman
 
Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPT
Ashutha K
 
23. serial and parallel data communication
23. serial and parallel data communication23. serial and parallel data communication
23. serial and parallel data communication
sandip das
 
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paper
Himanshu Shekhar
 
Unit ii.arc of tms320 c5 xx
Unit ii.arc of tms320 c5 xxUnit ii.arc of tms320 c5 xx
Design challenges in embedded systems
Design challenges in embedded systemsDesign challenges in embedded systems
Design challenges in embedded systems
mahalakshmimalini
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
Vivek Maurya
 
Electronics Notice Board Notice board using Wi-Fi Report
Electronics Notice Board Notice board using Wi-Fi ReportElectronics Notice Board Notice board using Wi-Fi Report
Electronics Notice Board Notice board using Wi-Fi Report
Vaibhav Pandey
 
Microprocessor Lab Manual by Er. Swapnil V. Kaware
Microprocessor Lab Manual by Er. Swapnil V. KawareMicroprocessor Lab Manual by Er. Swapnil V. Kaware
Microprocessor Lab Manual by Er. Swapnil V. Kaware
Prof. Swapnil V. Kaware
 
Introduction to VLSI
Introduction to VLSI Introduction to VLSI
Introduction to VLSI illpa
 
Interfacing memory with 8086 microprocessor
Interfacing memory with 8086 microprocessorInterfacing memory with 8086 microprocessor
Interfacing memory with 8086 microprocessor
Vikas Gupta
 
Notes on gsm
Notes on gsmNotes on gsm
Notes on gsm
uttam927
 
Implementation of Reversable Logic Based Design using Submicron Technology
Implementation of Reversable Logic Based Design using Submicron TechnologyImplementation of Reversable Logic Based Design using Submicron Technology
Implementation of Reversable Logic Based Design using Submicron Technology
Sai Viswanath
 
Easy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry pptEasy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry ppt
Srilakshmi Iyengar
 
VLSI Testing Techniques
VLSI Testing TechniquesVLSI Testing Techniques
VLSI Testing Techniques
A B Shinde
 

What's hot (20)

DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)
DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)
DETECTION OF FAULT LOCATION IN TRANSMISSION LINE USING INTERNET OF THINGS (IOT)
 
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
 
Liquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptLiquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system ppt
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 
Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...
 
Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPT
 
23. serial and parallel data communication
23. serial and parallel data communication23. serial and parallel data communication
23. serial and parallel data communication
 
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paper
 
Unit ii.arc of tms320 c5 xx
Unit ii.arc of tms320 c5 xxUnit ii.arc of tms320 c5 xx
Unit ii.arc of tms320 c5 xx
 
Design challenges in embedded systems
Design challenges in embedded systemsDesign challenges in embedded systems
Design challenges in embedded systems
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Electronics Notice Board Notice board using Wi-Fi Report
Electronics Notice Board Notice board using Wi-Fi ReportElectronics Notice Board Notice board using Wi-Fi Report
Electronics Notice Board Notice board using Wi-Fi Report
 
Microprocessor Lab Manual by Er. Swapnil V. Kaware
Microprocessor Lab Manual by Er. Swapnil V. KawareMicroprocessor Lab Manual by Er. Swapnil V. Kaware
Microprocessor Lab Manual by Er. Swapnil V. Kaware
 
Introduction to VLSI
Introduction to VLSI Introduction to VLSI
Introduction to VLSI
 
Interfacing memory with 8086 microprocessor
Interfacing memory with 8086 microprocessorInterfacing memory with 8086 microprocessor
Interfacing memory with 8086 microprocessor
 
Notes on gsm
Notes on gsmNotes on gsm
Notes on gsm
 
Implementation of Reversable Logic Based Design using Submicron Technology
Implementation of Reversable Logic Based Design using Submicron TechnologyImplementation of Reversable Logic Based Design using Submicron Technology
Implementation of Reversable Logic Based Design using Submicron Technology
 
Easy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry pptEasy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry ppt
 
Intel 80486 Microprocessor
Intel 80486 MicroprocessorIntel 80486 Microprocessor
Intel 80486 Microprocessor
 
VLSI Testing Techniques
VLSI Testing TechniquesVLSI Testing Techniques
VLSI Testing Techniques
 

Viewers also liked

L1802037276
L1802037276L1802037276
L1802037276
IOSR Journals
 
T01821125128
T01821125128T01821125128
T01821125128
IOSR Journals
 
C011111523
C011111523C011111523
C011111523
IOSR Journals
 
C017141317
C017141317C017141317
C017141317
IOSR Journals
 
K011117277
K011117277K011117277
K011117277
IOSR Journals
 
H012645760.iosr jmce p2
H012645760.iosr jmce p2H012645760.iosr jmce p2
H012645760.iosr jmce p2
IOSR Journals
 
B1302020508
B1302020508B1302020508
B1302020508
IOSR Journals
 
P01262101104
P01262101104P01262101104
P01262101104
IOSR Journals
 
F1303023038
F1303023038F1303023038
F1303023038
IOSR Journals
 
H013154651
H013154651H013154651
H013154651
IOSR Journals
 
J012555862
J012555862J012555862
J012555862
IOSR Journals
 
G010133748
G010133748G010133748
G010133748
IOSR Journals
 
A017120105
A017120105A017120105
A017120105
IOSR Journals
 
A010330106
A010330106A010330106
A010330106
IOSR Journals
 
B017531518
B017531518B017531518
B017531518
IOSR Journals
 
K017317175
K017317175K017317175
K017317175
IOSR Journals
 
Static and Dynamic Behavior of Reinforced Concrete Framed Building: A Compara...
Static and Dynamic Behavior of Reinforced Concrete Framed Building: A Compara...Static and Dynamic Behavior of Reinforced Concrete Framed Building: A Compara...
Static and Dynamic Behavior of Reinforced Concrete Framed Building: A Compara...
IOSR Journals
 
A010520112
A010520112A010520112
A010520112
IOSR Journals
 
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 compositeStudy of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
IOSR Journals
 
K1102026568
K1102026568K1102026568
K1102026568
IOSR Journals
 

Viewers also liked (20)

L1802037276
L1802037276L1802037276
L1802037276
 
T01821125128
T01821125128T01821125128
T01821125128
 
C011111523
C011111523C011111523
C011111523
 
C017141317
C017141317C017141317
C017141317
 
K011117277
K011117277K011117277
K011117277
 
H012645760.iosr jmce p2
H012645760.iosr jmce p2H012645760.iosr jmce p2
H012645760.iosr jmce p2
 
B1302020508
B1302020508B1302020508
B1302020508
 
P01262101104
P01262101104P01262101104
P01262101104
 
F1303023038
F1303023038F1303023038
F1303023038
 
H013154651
H013154651H013154651
H013154651
 
J012555862
J012555862J012555862
J012555862
 
G010133748
G010133748G010133748
G010133748
 
A017120105
A017120105A017120105
A017120105
 
A010330106
A010330106A010330106
A010330106
 
B017531518
B017531518B017531518
B017531518
 
K017317175
K017317175K017317175
K017317175
 
Static and Dynamic Behavior of Reinforced Concrete Framed Building: A Compara...
Static and Dynamic Behavior of Reinforced Concrete Framed Building: A Compara...Static and Dynamic Behavior of Reinforced Concrete Framed Building: A Compara...
Static and Dynamic Behavior of Reinforced Concrete Framed Building: A Compara...
 
A010520112
A010520112A010520112
A010520112
 
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 compositeStudy of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 composite
 
K1102026568
K1102026568K1102026568
K1102026568
 

Similar to FPGA Based Implementation of Electronic Safe Lock

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
 
G05124550
G05124550G05124550
G05124550
IOSR-JEN
 
FPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for BeginnersFPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for Beginners
ijtsrd
 
finger print sensor
finger print sensor finger print sensor
finger print sensor
AnuragKumarJha4
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
SHASHANK WANKHADE
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
eSAT Journals
 
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGSA STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
International Journal of Technical Research & Application
 
Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level
IJECEIAES
 
IRJET- Design & Implementation of Black Box in Automobiles System
IRJET-  	  Design & Implementation of Black Box in Automobiles SystemIRJET-  	  Design & Implementation of Black Box in Automobiles System
IRJET- Design & Implementation of Black Box in Automobiles System
IRJET Journal
 
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
IJET - International Journal of Engineering and Techniques
 
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
SANTIAGO PABLO ALBERTO
 
An FPGA application of home security code using verilog
An FPGA application of home security code using verilogAn FPGA application of home security code using verilog
An FPGA application of home security code using verilog
International Journal of Reconfigurable and Embedded Systems
 
Fpga implementation of a functional microcontroller
Fpga implementation of a functional microcontrollerFpga implementation of a functional microcontroller
Fpga implementation of a functional microcontroller
eSAT Publishing House
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontroller
nooriasukmaningtyas
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
NIT srinagar
 
Design and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tDesign and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io t
IJARIIT
 

Similar to FPGA Based Implementation of Electronic Safe Lock (20)

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
10
1010
10
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
G05124550
G05124550G05124550
G05124550
 
FPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for BeginnersFPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for Beginners
 
finger print sensor
finger print sensor finger print sensor
finger print sensor
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGSA STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
 
Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level
 
IRJET- Design & Implementation of Black Box in Automobiles System
IRJET-  	  Design & Implementation of Black Box in Automobiles SystemIRJET-  	  Design & Implementation of Black Box in Automobiles System
IRJET- Design & Implementation of Black Box in Automobiles System
 
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
[IJET-V1I3P17] Authors :Prof. U. R. More. S. R. Adhav
 
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
 
An FPGA application of home security code using verilog
An FPGA application of home security code using verilogAn FPGA application of home security code using verilog
An FPGA application of home security code using verilog
 
Fpga implementation of a functional microcontroller
Fpga implementation of a functional microcontrollerFpga implementation of a functional microcontroller
Fpga implementation of a functional microcontroller
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontroller
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
 
Design and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tDesign and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io t
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 

Recently uploaded (20)

WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 

FPGA Based Implementation of Electronic Safe Lock

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 1 (May. - Jun. 2013), PP 19-23 www.iosrjournals.org www.iosrjournals.org 19 | Page FPGA Based Implementation of Electronic Safe Lock Charnjit Singh1 , Abhilasha Sharma2 1 (M.Tech Student, Eternal University, H.P. India) 2 (Asst. Professor, Eternal University, H.P. India) Abstract :Thispaper is based on design of an “Automatic Security System Using VHDL” providing understandable and adequate operating procedure to the user. The operation is conducted by six different modules. If any of the modules fails, the failed module can be replaced without affecting the activity of others. The safety is ensured to the user by setting a secret code number which is the combination of three numbers, by doing so, only the authorized users can unlock the safe. The paper finds its appositeness in big organizations, military and banking sectors. Simulation through VHDL is quite generous and fiscal due to the reduction in number of components. Important operation consideration is to not give any indication to the user that the combination entered is incorrect until after the user has entered the all three numbers and pressed the OPEN key. Otherwise, it is possible for a user to determine the combination in no more than 96 attempts, as opposed to no more than 32,768 attempts. Keywords –FPGA, FSM, LOCK, VHDL, XILINX I. INTRODUCTION The electronic lock is often introduced to illustrate the possibilities of design of an electronic system using a top-down approach. This is because it is not too complicated but must be designed as a complete system. The “customer” must be able to specify the key data sequence and the sequence must be easily modified when required. As designs become more complex, it becomes more efficient to move away from ad-hoc methods and use tools that allow the design to be carried out at a higher level of abstraction[1]. The design of electronics to control any automated system is generally referred as a CODE LOCK MACHANISM. An application of this is design of electronic safe. The front panel of the safe is kept as simple as possible for understanding of user. A code locking mechanism that transmits information between a key and a locking mechanism secured against interception misuse, but flexible with respect to original equipment, replacement parts, and emergency functions[2] , is obtained if the key code is, in each case, cryptographically encoded through a hardware encoder. When the locking mechanism is first operated, a control element inductively coupled to a locking mechanism read-write unit with a new key once and in a non-over writable manner, transmits an indent number to the object memory [3]. Object-specific identity data are also stored in the control element. With the latter, a key number from a key register of the control element is combined with the key code to read the ladder together with a roll-in random code into the set of first still-neutral keys and into the object memory. Thus, a key is valid only if the object-specific identity data are taken into account in its key code [4]. The lock used in the electronic safe is basically a combinational lock. A combinational lock is a lock that requires the entering of a specific sequence of symbols to dislodge and open. The symbols are typically numerical, letters and other types of symbols may also be used to formulate a sequence. Depending on whether the lock is single-dial, multiple-dial; or discs or keypads may be used to enter sequences. Combinational locks are generally thought to be secure. II. Overview Of Electronic Safe The safe`s electronics receives inputs from the front panel & provide signals to the seven segment displays & to a motorized bolt. When the bolt`s motor is actuated to turn in one direction, it unlocks the safe door [5].
  • 2. FPGA Based Implementation Of Electronic Safe www.iosrjournals.org 20 | Page Fig1. Basic View Of Electronic Safe III. System Design The block diagram of electronic safe lock and it is consists of six design entities [7]. U1: ose_decoder_fsm U5&U6: bcd_7seg U2: bcd_2dec U3: digit_compare U4: master_fsm Fig2. Block diagram of electronic safe lock U1&U4 are both fsms which together control the operation of the system. U2 is two digits modulo BCD counter. U5&U6 convert each BCD digit from U2 to a seven segment code. In theory, the control portion of the electronic safe could be designed as a single fsm. However, it simplifies defining the operation of electronic safe to partition the control function into two cooperating fsms. Ose fsm is component of ose_decoder_fsm. It has limited and very specific functions. The other fsm is master_fsm. This fsm controls the overall operation of the safe. U1: OSE_DECODER_FSM We can design a four time decoder that enables the counter to count once for each combination of A&B. this increases the effective resolution of OSE and decoder combination by a factor of 4, compared to simply counting positive edges of A(or B) directly[4]. Fig3. State diagram of ose_decoder_fsm
  • 3. FPGA Based Implementation Of Electronic Safe www.iosrjournals.org 21 | Page U2: BCD_2DEC This two-digit BCD counter counts from 00 to 31 and then rolls over to 00. The count direction can be up or down. The counter has two counts enable inputs: both must be asserted for the counter to count. Integer variables are used to store the count. U3: DIGIT_COMPARE Fig4. Block daigram of digit_compare This block is used to compare the two digits being entered by the user. The entity digit_compare has bcd0, bcd1 and num_sel as inputs and num_eq as an output. The architecture body compares the three combinations entered by the user. When the entered combination is correct the output signal num_eq becomes equal to „1‟ otherwise it remains equal to „0‟. U4:MASTER_FSM The master_fsm is the most important and useful block of electronic safe. This block controls the functioning of all the signals and blocks. In other words we can say that it is the heart of the electronic safe[9]. Fig5.State diagram of master_fsm The overall characteristics of the safe are determined by component master_fsm. U5&U6:BCD_7SEG Fig6.Bcd to seven-segment decoder
  • 4. FPGA Based Implementation Of Electronic Safe www.iosrjournals.org 22 | Page An often used decoder function is a BCD to seven-segment decoder [8]. This decoder takes as its inputs four bits that represent a binary coded decimal value and generates a 7-bit output to drive a seven- segment LED. If the BCD input has a value from 0 to 9, the output consists of the value needed to display the corresponding decimal digit. If the BCD input is greater than 9, all the outputs are don`t care. Since these input values should not occur. IV. Rtl Simulation The RTL simulation step is used to verify the correctness of the RTL VHDL description. The designers use it to describe the clock by clock the behavior of the design. A standard VHDL simulator can be used to read the RTL VHDL description and verify the correctness of the design. The designer can look at the output of the simulator and determine whether or not the design is working properly. The simulator will generate the output data that can be analyzed. The designer usually has number of ways to analysis the data. The most common are output waveform and text tabular output. The RTL simulation is shown below [10]: Fig7. RTL view Fig8. Technology view Fig9. Simulation result V. Conclusion In the present scenario of the technology there are two fields in engineering that hold great demand in the industry, namely-communication & VLSI. Therefore, in order to add glimpse to this development we thought of this research.A final point is that when a VHDL model is translated into the “gates and wires” that are mapped onto a programmable logic device such as CPLD or FPGA, then it is the actual hardware being configured, rather than the VHDL code being.When implementing the circuit in anti-fuse type FPGA, it is an advantage that the configuration file in memory is not necessary. In this case it is already verified that the circuit will be fully functional.
  • 5. FPGA Based Implementation Of Electronic Safe www.iosrjournals.org 23 | Page References [1] JialiangZhang , The Design, Simulation, Verification and Implementation of Vending Machine Based on FPGA , The Ohio StateUniversity 2012 , Advisor: Prof. Y. F. Zheng, 2012. [2] David Lee, MihalisYannakakis, PRINCIPLES AND METHODS OF TESTING FINITE STATE MACHINES, AT&T BellLaboratories,Murray Hill, New Jersey Proceeding of the IEEE, 1996. [3] Scott Harper and Peter Athanas, A Security Policy Based upon Hardware Encryption, Proceedings of the 37th Hawaii InternationalConference on System Sciences - 2004 [4] Ana Monga1, Balwinder Singh2, Finite State Machine based Vending Machine Controller with Auto -Billing Features, InternationalJournal of VLSI design & Communication Systems (VLSICS) Vol.3, No.2, April 2012 [5] Books: [6] R.P.JAIN, “Modern Digital Electronics”, Tata McGraw Hill, Third Edition 2003. [7] J.Bhaskar, “A VHDL Primer”, Pearson Education Asia, Third Edition 1999. [8] Kenneth L. Short, “VHDL for Engineers”, Pearson Education Asia 2009. [9] John N.Roth, “Digital Design using VHDL”. [10] ACTIVE HDL, “ACTIVE HDL Software Quick Start Guide”. [11] XILINX INC, “XILINX Software sampler Quick Start Guide”. [12] M.morris Mano, “Digital Logic and Computer Design”, Prentice Hall of India, Nov 1995. [13] Volnei A. Pedroni, “Circuit Design with VHDL”, Prentice Hall of India 2006. [14] SudhakarYalamanchili, “Introductory VHDL”, Pearson Education Asia 2005. [15] Kevin Skahill, “VHDL for Programmable Logic”, Pearson Education Asia 2004.