Design two moore fem state transition diagrams

Assignment Help Computer Engineering
Reference no: EM133325393

Assignment: Design two Moore FEM state transition diagrams (factored and unfactored FSIvf) for a PIN-based entry device that takes in two inputs, A and B, and it produces one output, E. Ensure that your machine is deterministic.

The machine starts in or is reset to the start state where E = fl.

After the following combination is entered for AB values, respectively: 11 9 1t} 9 G], the machine outputs E = l for two cyclesa'states. That is, it outputs E = 1 immediately after {11 is entered, and then for one more cycle irrespective of the input values. After the two cycles, it retnms back to the start state.

At all other times, the machine outputs E = II}.

For each incorrect attempt, such as 11 9 {H}, including incorrect attempts from the start state, the machine registers the attempt as failure, and the input sequence has to be entered again, starting with l 1. If there are less than three consecutive failures, then the number of failures is reset back to zero after the right combination is entered.

After three consecutive incorrect attempts, the machine goes to the locked-down mode from which it does not exit regardless of input unless it is reset. For the factored FEM, you should introduce a number of internal signals to synchronize the factored machines, but no other external signals except for the ones speci?ed above are allowed. Clearly explain your design, write explanations next to each important state, and next to each factored machine if applicable. Also, correctly label each state, write the output inside each state, include all the required transitions, and correctly label each transition.

 

 

Reference no: EM133325393

Questions Cloud

What is vlan how big is the mac address space : What is VLAN? How big is the MAC address space? What are the 2 similarities between Routers and Switch? 141 What are the 2 Ethernet topology?
Connection between slavery and the 13th amendment : What does the documentary, 13th, say about the connection between slavery and the 13th amendment?
Plot the histogram and the boxplot of your selected variable : Explain the differences and similarities between your two diagrams considering the information they provide about the variable distribution.
What would be challenges of not being proficient in language : What do you think would the be social, emotional, economic, and political challenges of not being proficient in the language?
Design two moore fem state transition diagrams : Design two Moore FEM state transition diagrams (factored and unfactored FSIvf) for a PIN-based entry device that takes in two inputs, A and B, and it produces
Apply data analytics techniques that you learnt : Apply data analytics techniques that you learnt in the seminars to extract meaningful insights or information from data
What are persistent gender inequality presented in today : What are persistent gender inequality presented in today's societ? What are some useful approaches to addressing these problems?
Research and recommend the most appropriate vpn technology : Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN.
Discuss issues related to ethnocentrism : Martha Nussbaum and Mary Midgley both discuss issues related to ethnocentrism, although neither one mentions the term.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questiondotties tax facility specializes in federal tax

questiondotties tax facility specializes in federal tax returns for professional clients such as physicians dentists

  Create an html document that describes an ordered list

Create and test an HTML document that describes an ordered list of your five favorite movies.

  Express the process of customer identification

Then, customer brings the videos to the front desk where an attendant identifies the customer using customer's ID Card, checks the customer's records in the system, and then enters information about rented videos into the system.

  Create a base class named book

Create a base class named Book. Data fields include title and author; functions include those that can set and display the fields.

  List the micro operations of each block in the diagram

What is the maximum number of I/O ports that can be implemented using MC68230s on a system bus with 16 address lines?

  What would be the length of the header as a function of n-k

Describe a method for Alice to encrypt an m-block message such that any two of Bob, Charlie, and David can decrypt.

  Determine the u-factor for the center-of-glass section

Determine the U-factor for the center-of-glass section of a double-pane window with a 13-mm air space for winter design conditions.

  Writing a program that creates three instances

Demonstrate the class by writing a program that creates three instances of it. One instance should hold your information, and the other two should hold your friends' or family members' information.

  Draw a circuit for one contact switch

Give the configuration of the interrupt associated registers if one door and one window are monitored (using two contact switches)

  Discuss how you can trace a vishing voip phone number

Discuss how you can trace a vishing VoIP phone number. Approach this topic from different aspects

  Would a system with all executables compiled statically use

Would a system with all executables compiled statically use more or less memory than a dynamic library implementation? Any other issues?

  Discuss your organization has iso 27001 certification or not

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd