High-level state machine

Assignment Help Basic Computer Science
Reference no: EM131934319

Convert the C-like code provided to a High-Level State Machine. Do not optimize or change the code, simply convert as provided. 

Using the RTL design method, convert the high-level state machine you designed to a Datapath and Controller. You do not need to provide the Controller's corresponding Boolean equations (i.e. you only need to provide the FSM). Note: Be sure to explicitly list all inputs, outputs, and local registers along their respective sizes in your design using as few bits as possible for each register.

Inputs: a[256] (8 bits), go (1-bit)

Outputs: max_diff (1-byte), done (1-bit)

MAX_DIFF:

while(1) {

while(!go);

done = 0;

i = 0;

max = 0;

min = 255; // largest 8-bit value

while( i < 256 ) {

if( a[i] < min ) {

min = a[i];

}

if( a[i] > max ) {

max = a[i];

}

i = i + 1;

}

max_diff = max - min;

done = 1;

}

Reference no: EM131934319

Questions Cloud

What does a succession plan do : What competencies are needed in leaders for your organization and how do you proposed to develop those competencies in potential leaders?
Write report that evaluates an organisation people practices : MBA401 People, culture and contemporary leadership Assessment Report. Write a report that evaluates an organisation's people practices
Relational database design : You are tasked to develop a database design for a retail company that involves shipping orders to customers. Order data includes an order date
Describe the models for assessing the need for enterprise : Write an essay of 750 words that examines and describes the models for assessing the need for and applying enterprise-wide change initiatives.
High-level state machine : Convert the C-like code provided to a High-Level State Machine. Do not optimize or change the code, simply convert as provided.
Addresses the hidden node problem : (a) Addresses the hidden node problem, but not the exposed node problem. (b) Addresses the exposed node problem, but not the hidden node problem.
Research and describe a product development process : Research and describe a product development or management process, methodology, or model that could be utilized to implement the innovation.
What makes the charismatic leaders strong role models : What are the work behaviors that the charismatic leaders display that lead to a positive outcome among followers? What makes the charismatic leaders strong role
Cyberspace overlap with concerns pertaining to cybercrime : Explain how issues involving security in cyberspace overlap with concerns pertaining to cybercrime.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What big o would describe the performance of the method get

What Big O would describe the performance of the method get Position?

  Convert miles to kilometers and kilometers to miles

Justin Kace is promoting the metric system and wants people to be able to convert miles to kilometers and kilometers to miles.

  Civil law and one labeled criminal law

To better understand the differences between civil and criminal law can you prepare a list of the differences using two columns.

  Find and interpret the marginal revenue

Suppose that in a monopoly market, the demand function for a product is given by p = 160 - 0.1x where x is the number of units and p is the price in dollars.

  Understanding components of active directory

Active Directory (AD) was designed by the International Telecommunications Union (ITU) and is based on the X.500 suite of protocols.

  Draw a complete e-r diagram

Each club has one moderator, who might or might not be a faculty member. Draw a complete E-R diagram for this example. Include all constraints.

  Understanding of risk assessment

How do you think a risk assessment might be able to resolve this conflict? What is your understanding of risk assessment?

  Traffic stops and drones are constitutional under

Based only on the readings for this week (no outside research), discuss whether drug dogs at the traffic stops and the drones are constitutional under the 4th A

  How the grinch can do the job in o(n log n) time

He seeks to divide the players as unfairly as possible, so as to create the biggest possible talent imbalance between team A and team B. Show how the Grinch can do the job in O(n log n) time.

  What is the runtime complexity class of a sequential search

What is the runtime complexity class of a sequential search on an unsorted array? What is the runtime complexity class of the modified sequential search on a sorted array?

  Find the global stiffness matrix for the structure

Consider the structure composed of a spring and a linear bar as shown in Fig. 3.6. Given E = 200 GPa, A = 0.01 m2, k = 1000 kN/m, and P = 25 kN,

  Difference between http request methods get and post

E-Portals Development IT405 - Explain why delaying server-side widget loading is used even though the page's total load time is high?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd