COMPUTER ENGINEERING PROGRAM

Size: px
Start display at page:

Download "COMPUTER ENGINEERING PROGRAM"

Transcription

1 Learning Objectives COMPUTER ENGINEERING PROGRAM California Polytechnic State University CPE 169 Experiment 9 A Digital Alarm System 1. Finite State Machine (FSM) To understand how VHDL behavioral modeling is used to implement a FSM that controls a relatively complex digital system 2. Digital Systems Design To understand the interaction between various modules in a digital system To design and implement a system-level digital circuit based on a given specification 3. Xilinx Design Methodology and VHDL To gain more experience with VHDL structural modeling Introduction and Overview This experiment introduces a common sequential circuit in the context of digital system design: the Finite State Machine (FSM). Two common uses of the FSM are in the design of counters and system controllers. This experiment uses a FSM to control the various operating characteristics of the digital alarm system that was discussed in the previous experiments. The stated digital alarm system contains four main functional modules; three of these modules have been designed in previous experiments. The fourth module is the FSM and is the main focus of this experiment. The various modules of the digital alarm system are integrated using VHDL structural modeling thus highlighting the code reuse approach to digital design. Finite State Machine Design Using VHDL Implementing FSMs in VHDL is straight-forward using VHDL behavioral modeling. As you have probably noticed by now, any time that you are able to implement a circuit by describing its behavior (as opposed to describing the actually logic used to implement the behavior), you ll be allowing the VHDL synthesis process to do most of the grunt-work that has traditionally been required of the circuit designer. Once you understand these techniques, you ll be able to quickly apply them to the implementation step of any FSM problem. This approach is so straight-forward that it can be considered a template approach to implementing FSMs. But before we start on this, let s make note of a few things: The VHDL behavioral approach to FSM design reduces the many opportunities for errors associated with other techniques. The behavioral approach allows to you go from the state transition diagram to VHDL code: no equation generation is necessary. What enables this approach to become a cookie-cutter method for future FSM designs is to thoroughly understand each part of the template. The good news is that there are not that many parts to understand. Moreover, the effort you put into understanding these parts is an investment in understanding both VHDL and sequential circuit design in general. The Low-Carb VHDL tutorial contains a more complete version of the description that follows. If the description that follows seems inadequate, you may need to peruse the VHDL tutorial. 3/7/

2 FSMs Using VHDL Behavioral Modeling A block diagram for a generic FSM is shown in Figure 1. This diagram looks fairly generic but some important descriptive names are used for several of the blocks in the design. The next state decoder is a block of combinatorial logic that uses the current external inputs and the current state of the FSM to decide upon the appropriate next state for the FSM. In other words, the inputs to this block are decoded to produce an output that represents the next state of the FSM. The next state becomes the present state of the FSM when the clock input to the state registers block becomes active. The state registers block contains storage elements that store the present state of the machine. The inputs to the output decoder are decoded via combinatorial logic to generate the desired external outputs. The FSM diagram in Figure 1 is a generic model because the outputs can be considered either Mealy or Moore-types. Recall that Mealy outputs are a function of both the present state of the FSM and at least one external input while Moore outputs are only a function of the present state. Figure 1: Block diagram for a generic FSM. The FSM model shown in Figure 1 is probably the model that was used to introduce you to the concept of FSMs. But this is not how we ll model FSMs in the context of VHDL. The true power of VHDL emerges in its dealings with FSMs and behavioral modeling. As you ll see, the versatility of VHDL behavioral modeling removes the need for large paper designs of endless K-maps and gate-level combinatorial logic. The approach we ll describe in this section is modeled by the block diagram shown in Figure 2. Although it does not look that much clearer, you ll soon find the FSM model shown in Figure 2 to be a straight-forward method to implement FSMs. The behavioral model divides the FSM into two VHDL processes. One process, the Synchronous Process, handles all the matters regarding clocking and other controls associated with the storage element. The other process, the Combinatorial Process, handles all the matters associated with the Next State Decoder and the Output Decoder of Figure 1. Note that the Output and Next State decoder blocks in Figure 1 are generally comprised solely of combinatorial logic. There is some new lingo used in the description of signals seen in Figure 2. The inputs labeled Parallel Inputs are used to signify inputs that act in parallel to each of the storage elements. These inputs would include enables, presets, clears, etc. The inputs labeled State Transition Inputs include external inputs that control state transitions (determining the next states for the FSM). These inputs also include external inputs used to decode Mealy-type outputs. Figure 2: Model for VHDL implementations of FSMs. 3/7/

3 The approach that follows is referred to as the dependent PS/NS style for implementing FSMs. The best way to describe this approach is through an example problem. Although the following example is not the simplest FSM that was ever conceived, it does have all the required elements for a demonstration of this implementation method. EXAMPLE Write VHDL code that implements the FSM modeled by the state diagram below. Use a Dependent PS/NS coding style in your implementation. Consider the state variables to be external outputs of the FSM. Figure 3: An example of a VHDL FSM behavioral description. Figure 4: Black Box diagram for the FSM of the example. Figure 4 shows the black box diagram for the solution of the example while Figure 5 provides a VHDL solution to the example problem. A few of the more interesting points regarding the solution are listed below. A VHDL type is declared to represent the states in this FSM. This is an example of an enumeration type in VHDL. There is an internal numerical representation for each of the listed state type variables, but we only need to deal with their textual representation. The synchronous process is equal in form and function to a D flip-flop implementation. The only difference is we ve substituted PS and NS for D and Q, respectively. Note that in the synchronous process, there is no else statement, which is how VHDL infers the storage elements. Even though the code looks somewhat complicated, if you examine it closely, you can see that everything is nicely compartmentalized in the solution. There are two processes. The synchronous process handles the asynchronous reset and the assignment of a new state upon the arrival of the system clock. The combinatorial process handles the tasks not contained in the synchronous process: the determination of outputs, and the generation of the next state of the FSM. Because the two processes operate concurrently (remember, VHDL processes are concurrent statements), they can be considered as working in a lock-step manner. Changes to signal NS that are generated in the combinatorial process forces an evaluation of the synchronous process. When signal changes are actuated by the synchronous process on the next clock edge, the changes in the PS signal causes the combinatorial process to be evaluated. 3/7/

4 The case statement in the combinatorial process provides a when clause for each state of the FSM as well as a catch-all when others case. The Moore output is a function of only the present state. This is expressed by the fact that the assignment of the Z1 output is unconditionally evaluated in each when clause of the case statement in the combinatorial process. The Mealy-type output and the next-state assignment are handled inside the conditional statement (if) in the individual clauses of the case statement. This is because both the Z2 output and the next state assignment are functions of the external input X. Figure 5: The annotated solution the example problem. 3/7/

5 Figure 6: A digital alarm system for the Nexys board. Procedure Procedure Overview: In this experiment, you ll be designing and/or assembling the various components of a digital alarm system. All but one of the components in the digital alarm system were designed and tested in previous experiments. 1) Design a FSM that acts as a controller for the digital alarm system. 2) Design and test the digital alarm system. Procedure 1: Digital Alarm System FSM 1. Design a Finite State Machine for the Alarm System based on the following design criteria. The block diagram of the FSM is shown in Figure 7. Figure 7: Black-box diagram of the digital alarm FSM. 3/7/

6 a. This FSM has three inputs (SYS_ON_L, BREAK_IN, and CLK) and two outputs (ALARM and SYS_ARMED. NOTE: The SYS_ON_L signal is active low. This means that when the signal is in the 0 state, the signal is active. In terms of the circuit shown in Figure 7, when this signal is active, or asserted, the alarm system is turned on. When the signal is not asserted, the system is turned off (unarmed). Active low signals are typically noted with the _L suffix appended onto the signal name. b. The FSM has three states: UNARMED, ARMED, and ALARM_SOUNDING. c. When the FSM is in the UNARMED state, the system is off. If the SYS_ON_L input is asserted while in this state, the FSM transitions to the ARMED state on the next active clock edge. All other input combinations keep the system in the UNARMED state. Keep in mind that turning off the alarm is only accomplished by entering the correct alarm access code. If the correct access code is not entered on the switches, the system will "ARM" itself. d. When the FSM is in the ARMED state, the system is on and ready to detect break-ins. If the SYS_ON_L input is not asserted, the system is turned off by going back into the UNARMED state. If the SYS_ON_L is asserted and the BREAK_IN input is also asserted, the FSM transitions to the ALARM_SOUNDING state. Any other input combinations keep the system in the ARMED state. The SYS_ARMED output is only asserted while in the ARMED state. e. When the FSM is in the ALARM_SOUNDING state, a break-in has been detected. If the SYS_ON_L input is unasserted, the system is turned off and the FSM transitions to the UNARMED state. The FSM remains in the ALARM state for all other possible inputs conditions. The ALARM output is asserted while in the ALARM_SOUNDING state, and unasserted at all other times. 2. Draw a state transition diagram depicting the behavior of the FSM alarm system control. Also provide the corresponding PS/NS table. Include both items with your lab report. 3. Using the FSM behavioral modeling described at the beginning of this experiment, enter your design in VHDL using the Xilinx ISE software. Define a state_type which has the following states: ALARM_SOUNDING, ARMED, and UNARMED. 4. Simulate your design using ModelSim and provide an output of this simulation with your lab report. Be sure to include some pertinent annotations on your simulation. Procedure 2: Digital Alarm System 1. Reusing the modules you have designed and implemented in previous experiments, implement the Digital Alarm System shown in Figure 6. In the same project that you created for your FSM, add the VHDL modules to the project for your BCD-to-7-segment Display Decoder, Priority Encoder, and 4-bit Comparator. NOTE: The Priority Encoder was designed in Experiment 6. Recall that the 3-bit output of the priority encoder is the binary representation of the highest numbered input that is asserted. The STROBE output on the priority encoder is asserted when one or more inputs are asserted. NOTE: The BCD-to-7-segment display decoder was also designed in Experiment 6. 3/7/

7 NOTE: The comparator was designed in Experiment 7. In this current experiment, one of the 4-bit inputs to the comparator is used to hardwire a 4-bit access code into the hardware. The other input (4-bits) to the comparator is connected to switches and used to arm and disarm the digital alarm system. 2. Use VHDL structural modeling to assemble the four components of the digital alarm system as shown in Figure 6. Create a new "top-level" VHDL module that declares, instantiates, and interconnects the various design modules. a. Use buttons for the inputs to the Priority Encoder. The button inputs behave as break-in sensors in your alarm system. b. Use the four right-most switches to input the access codes to one set of inputs on the 4-bit comparator. These allow you to enter a 4-bit number that generates an EQ signal (to turn the alarm system OFF) if it matches the hardwired preset code. c. Connect the outputs of the FSM to two LEDs (LD5 & LD4 on the Nexys board). Include all VHDL source code files for the Digital Alarm System with your lab report as well as a complete block diagram. 3. Demonstrate your working Digital Alarm System to your instructor. Do not reveal your hardwired alarm code; your instructor will have to break the code in order to turn off your alarm system. Questions 1. Was your FSM designed as a Mealy or Moore-type machine? Would it matter which type of FSM was used for this design? Fully explain your answer. 2. How many flip-flops were required for the Digital Alarm System? 3. Using the PS/NS table that describes the FSM in this procedure, determine the Boolean logic equations for generating the excitation inputs of the required flip-flops from the input signals and the assigned State Variables of your FSM. (Assume that D flip-flops are used for the FSM.) 4. Explain how the priority encoder will respond if multiple sensors detect a break-in at the same time. 5. In Experiment 8, you designed a 4-bit binary counter. How could you, or more precisely your instructor, use the counter to crack your Digital Alarm System access code? Could the same code cracking approach be used if the alarm access code was 32 bits in length instead of 4? 6. Discuss how the system clock frequency affects the general operation of the digital alarm system. Are there any potential problems that could arise if the system clock is too fast, or too slow? 7. If a break-in is in-progress when the Digital Alarm System is being armed (break in occurs while initially in the UNARMED state), what is the longest possible time (t max ) before the alarm will sound after the access code switches are changed to arm the system? Assume that the system clock frequency was 10 Hz. Under the same circumstances, what is the shortest possible time (t min ) before the alarm will sound? Fully justify your answers (in words), and draw a Timing Diagram to illustrate the operation of the Alarm System for the situations leading to the longest and shortest response times. Include both input signals (BREAK_IN and SYS_ON_L), the system clock CLK, and both output signals (ARMED and ALARM) in your diagram. Show the t max and t min times on your diagram. 3/7/

8 8. If the system clock frequency was 10 Hz, what is the maximum time someone could break-in (activating one of the sensors) without being detected. Fully support your answer and assume the alarm system is already armed for this problem. 9. What would happen if the alarm system was armed, and a break-in was detected at the same instant that the system was being disarmed by a correct Access Code entry (both the Sys_On_L and Break_In signals switch at the same time)? Fully explain your answer keeping in mind that the correct response is dependent on your particular implementation of the alarm system s FSM. 3/7/

Reconfigurable Computing Lab 02: Seven-Segment Display and Digital Alarm Clock

Reconfigurable Computing Lab 02: Seven-Segment Display and Digital Alarm Clock Informatik Cauerstr. 98 Erlangen Reconfigurable Computing Lab : Seven-Segment Display and Digital Alarm Clock Problem (Seven-segment display) A seven-segment display consists of seven light emitting diodes

More information

Floating Point Fast Fourier Transform v2.1. User manual

Floating Point Fast Fourier Transform v2.1. User manual User manual Introduction The Fast Fourier Transform (FFT) is an efficient algorithm for computing the Discrete Fourier Transform (DFT). This Intellectual Property (IP) core was designed to offer very fast

More information

Design and Implementation of Pipelined Floating Point Fast Fourier Transform Processor

Design and Implementation of Pipelined Floating Point Fast Fourier Transform Processor IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 11 April 2015 ISSN (online): 2349-6010 Design and Implementation of Pipelined Floating Point Fast Fourier Transform

More information

DIGITAL SECURITY SYSTEM USING FPGA. Akash Rai 1, Akash Shukla 2

DIGITAL SECURITY SYSTEM USING FPGA. Akash Rai 1, Akash Shukla 2 DIGITAL SECURITY SYSTEM USING FPGA Akash Rai 1, Akash Shukla 2 1,2 Dept. of ECE, A.B.E.S ENGINEERING COLLEGE Ghaziabad India Abstract: Nowadays, house security system becomes the best solution to overcome

More information

Paradox Security System Graphic Dept - PRINTED IN CANADA. keypad entries in memory. arming permits movement in pre-selected,

Paradox Security System Graphic Dept - PRINTED IN CANADA. keypad entries in memory. arming permits movement in pre-selected, 970213-0001 ESPRIT 727 U LISTED User Manual VERSION 3.3 P R D O X S E C U R I T Y S Y S T E M S Paradox Security System Graphic Dept - PRINTED IN CANADA READY The green LED must be " on", indicating all

More information

Security System. User Guide for the LED Command Center

Security System. User Guide for the LED Command Center Security System User Guide for the LED Command Center National Security Systems Inc (800)457-1999 MY SECURITY COMPANY IS: CALL BEFORE TEST: THIS SECURITY SYSTEM IS CONNECTED TO TELEPHONE NUMBER: THE SECURITY

More information

Security Alarm System

Security Alarm System Security Alarm System Mati Goro, Rami Marogy, Kevin Jou, Nick Deneau Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland University, Rochester, MI e-mails:

More information

Solution-6 Operators Manual Page 1 Preface Congratulations on selecting the Solution-6 security control system for your installation. So that you can obtain the most from your unit, we suggest that you

More information

Wiring the DCI using a Modifry Products Plug-n-Play Harness

Wiring the DCI using a Modifry Products Plug-n-Play Harness Wired DCI-3 Installation & Operation The DCI does NOT work like the factory dash controls so review the Operation section before using it. Installing a DCI requires the same skills and tools as installing

More information

Challenger Series Users Manual

Challenger Series Users Manual Challenger Series Users Manual P/N MAUSER-TS1016 05 20AUG15 Copyright Trademarks and patents Manufacturer 2015 UTC Fire & Security Australia Pty Ltd. All rights reserved. The Challenger name and logo are

More information

Measurements & Instrumentation

Measurements & Instrumentation Measurements & Instrumentation PREPARED BY Academic Services Unit August 2013 Institute of Applied Technology, 2013 Module Objectives Upon successful completion of this module, students should be able

More information

Security System. User s Guide for the Text Command Center

Security System. User s Guide for the Text Command Center User s Guide for the Text Command Center MY ALARM COMPANY IS: CALL BEFORE TEST: THIS SECURITY SYSTEM IS CONNECTED TO TELEPHONE NUMBER: THE SECURITY CONTROL PANEL IS CONNECTED TO THE PHONE JACK LOCATED:

More information

DIY Cabinet Painting Guide

DIY Cabinet Painting Guide Before tackling a cabinet project on your own consider these simple steps to getting the job done like a pro without the trial and error Color Theory 2 Process Overview Looking at Colors Materials and

More information

BASIC-Tiger Application Note No. 029 Rev Waking up sleeping tigers. Gunther Zielosko. 1. Basics Real Time Clock

BASIC-Tiger Application Note No. 029 Rev Waking up sleeping tigers. Gunther Zielosko. 1. Basics Real Time Clock Waking up sleeping tigers Gunther Zielosko 1. Basics 1.1. Real Time Clock BASIC- or TINY-Tiger with built-in Real Time Clock (RTC) have a few advantages over those without RTC. This CMOS clock with its

More information

Monomino-Domino Tatami Coverings

Monomino-Domino Tatami Coverings Monomino-Domino Tatami Coverings Alejandro Erickson Joint work with Frank Ruskey at The University of Victoria, Canada December 4, 2013 Durham University, ACiD Seminar. Japanese Tatami mats Traditional

More information

THANK YOU FOR VOTING TEXECOM THANK YOU FOR VOTING TEXECOM USER GUIDE. Security Control Panels 1 INS167

THANK YOU FOR VOTING TEXECOM THANK YOU FOR VOTING TEXECOM USER GUIDE. Security Control Panels 1 INS167 Veritas User Guide Quick Reference Guide THANK YOU FOR VOTING TEXECOM THANK YOU FOR VOTING TEXECOM USER GUIDE Security Control Panels 1 INS167 Overview Premier Series User Guide 1. Overview Introduction

More information

CMPT 473 Software Quality Assurance. Test Planning. Nick Sumner

CMPT 473 Software Quality Assurance. Test Planning. Nick Sumner CMPT 473 Software Quality Assurance Test Planning Nick Sumner Planning Tests We have looked at fundamental criteria for evaluating test suites. 2 Planning Tests We have looked at fundamental criteria for

More information

AIRPORTS. CARECALLER PowerfulSecuritySolutionsForSeriousSecurityNeeds

AIRPORTS. CARECALLER PowerfulSecuritySolutionsForSeriousSecurityNeeds AIRPORTS CARECALLER PowerfulSecuritySolutionsForSeriousSecurityNeeds CARECALLER CARECALLER Emergency Call Systems are perfect for any Airport that is concerned with the safety and security of their employees.

More information

presentations the week of the final exams. Anyone who misses the appointment will receive a grade of zero.

presentations the week of the final exams. Anyone who misses the appointment will receive a grade of zero. CS 116 Section 4 PROJECT Spring 2016 Grade: Up to 12 points. Rules: To be worked on individually. Must be presented to the instructor in person in order to be graded. Similar projects will both receive

More information

Assignment 5: Fourier Analysis Assignment due 9 April 2012, 11:59 pm

Assignment 5: Fourier Analysis Assignment due 9 April 2012, 11:59 pm COS/MUS 314 Assignment 5: Fourier Analysis Assignment due 9 April 2012, 11:59 pm This assignment is done with your partner. Reading & Resources ChucK complex and polar data types: http://chuck.cs.princeton.edu/doc/language/type.html#complex

More information

Destiny Destiny Owners Manual

Destiny Destiny Owners Manual Destiny 4100 Destiny 4100 Owners Manual TABLE OF CONTENTS INTRODUCTION Control Panel...3 Detection Devices...3 Telephone Keypads...3 GLOSSARY... 4-5 LOCAL PHONE ACCESS Using Your Telephones As Keypads...6

More information

Tech Note - 25 Surveillance Systems that Work! Motion Security on GSS PC-Based DVR

Tech Note - 25 Surveillance Systems that Work! Motion Security on GSS PC-Based DVR Tech Note - 25 Surveillance Systems that Work! Surveillance Systems Motion Security on GSS PC-Based DVR If you are looking for answers to questions like 1. What is a Motion Security System? 2. How does

More information

Alarm System Example

Alarm System Example Alarm System Example ASD:Suite Copyright 2013 Verum Software Technologies B.V. ASD is licensed under EU Patent 1749264, Hong Kong Patent HK1104100 and US Patent 8370798 All rights are reserved. No part

More information

DR Series Appliance Cleaner Best Practices. Technical Whitepaper

DR Series Appliance Cleaner Best Practices. Technical Whitepaper DR Series Appliance Cleaner Best Practices Technical Whitepaper Quest Engineering November 2017 2017 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Energy: Synthesis and Analysis

Energy: Synthesis and Analysis Energy Use in the Home Introduction Energy: Synthesis and Analysis The average household spends over $1,300 a year for energy to run the many devices found in the home 1. The vast majority of this cost

More information

Water Tank and Heater

Water Tank and Heater Water Tank and Heater Exercise 1: Water Tank Simulation The goal is to simulate the water temperature in a heated tank. Implement an EPICS database called tank.db to accomplish this. The records that drive

More information

TRACE 700. Slide 1. Hello, my name is Nick Cavitt and I m a marketing engineer in the C.D.S. group at TRANE.

TRACE 700. Slide 1. Hello, my name is Nick Cavitt and I m a marketing engineer in the C.D.S. group at TRANE. Slide 1 TRACE 700 Chiller Sequencing and Controls Hello, my name is Nick Cavitt and I m a marketing engineer in the C.D.S. group at TRANE. Today, we will be talking about the Plant Sequencing and Controls

More information

Part 1: Playing with Electricity

Part 1: Playing with Electricity Foreword by Joe Grand... Acknowledgments... xix xxi Introduction xxiii About This Book...xxiv Who Should Read This Book...xxiv How to Read This Book....xxiv What s in This Book?....xxv Your Electronics

More information

MADE TO PROTECT INT-TSI. touchscreen keypad. intelligent alarm system control center

MADE TO PROTECT INT-TSI. touchscreen keypad. intelligent alarm system control center MADE TO PROTECT INT-TSI touchscreen keypad intelligent alarm system control center Control center UNLIMITED INTERACTI POSSIBILITIES REMOTE CTROL intelligent alarm system FLEXIBILITY AND VERSATILITY OF

More information

SAMPLE. added benefit of reduced operating costs during low demand periods, such as spring and fall.

SAMPLE. added benefit of reduced operating costs during low demand periods, such as spring and fall. Chapter 4 Variable-speed pumps. A variable-speed pump varies the flow rate by maintaining a constant pressure differential as zone valves open and close. A sensor measures the difference in pressure between

More information

Paradox Integration Module Settings Guide

Paradox Integration Module Settings Guide Paradox Integration Module Settings Guide List of Terms used in Paradox Integration Module Settings Guide............. 3 Introduction into Paradox Integration Module Settings Guide............... 4 Configuration

More information

Digiplex LED Keypads User s Manual

Digiplex LED Keypads User s Manual KLEDEU03.fm Page -1 Friday, May 4, 2001 11:25 AM Digiplex LED Keypads User s Manual KLEDEU03.fm Page 0 Friday, May 4, 2001 11:25 AM KLEDEU03.fm Page 1 Friday, May 4, 2001 11:25 AM TABLE OF CONTENTS 1.0

More information

L900 series USER MANUAL

L900 series USER MANUAL INTRODUCTION The BLUGUARD Control Panel is designed for simple operation yet provides the maximum protection for you. Please read this manual carefully and follow the instructions contained in this book.

More information

Modbus TCP/IP Option Instruction Manual

Modbus TCP/IP Option Instruction Manual W A L C H E M An Iwaki America Company WebMaster Modbus TCP/IP Option Web Master WIND Modbus TCP/IP Option Instruction Manual s825v008 and higher Five Boynton Road Hopping Brook Park Holliston, MA 01746

More information

DEVELOPMENT OF THE TANGO ALARM SYSTEM

DEVELOPMENT OF THE TANGO ALARM SYSTEM 10th ICALEPCS Int. Conf. on Accelerator & Large Expt. Physics Control Systems. Geneva, 10-14 Oct 2005, WE3B.1-70 (2005) DEVELOPMENT OF THE TANGO ALARM SYSTEM L. Pivetta Sincrotrone Trieste, Trieste, Italy

More information

Elite 64 Version 64 Zone Controller Arrowhead Alarm Products Ltd. Operating Guide. Proudly Designed and Manufactured in New Zealand

Elite 64 Version 64 Zone Controller Arrowhead Alarm Products Ltd. Operating Guide. Proudly Designed and Manufactured in New Zealand 2 Elite 64 Version 64 Zone Controller Arrowhead Alarm Products Ltd Operating Guide Proudly Designed and Manufactured in New Zealand 1 CONTENTS Page No. INTRODUCTION 3 About your Alarm 3 OPERATING YOUR

More information

Programming the Cell BE

Programming the Cell BE Programming the Cell BE Max Schneider Chair of Computer Science 3 - Computer Architecture Friedrich-Alexander-University Erlangen-Nuremberg October 26, 2010 Max Schneider (FAU) PParRA October 26, 2010

More information

Home Energy Audit. Overview. Objectives. Time Requirements. Materials. Procedure CON EDISON WEB-BASED MIDDLE SCHOOL ACTIVITY

Home Energy Audit. Overview. Objectives. Time Requirements. Materials. Procedure CON EDISON WEB-BASED MIDDLE SCHOOL ACTIVITY CON EDISON WEB-BASED MIDDLE SCHOOL ACTIVITY Home Energy Audit Overview In this activity, students will complete a worksheet leading them to a better understanding of their (and their household s) electricity

More information

Methodology of Implementing the Pulse code techniques for Distributed Optical Fiber Sensors by using FPGA: Cyclic Simplex Coding

Methodology of Implementing the Pulse code techniques for Distributed Optical Fiber Sensors by using FPGA: Cyclic Simplex Coding Methodology of Implementing the Pulse code techniques for Distributed Optical Fiber Sensors by using FPGA: Cyclic Simplex Coding Yelkal Mulualem Lecturer, Department of Information Technology, College

More information

The Dorm Room Genie. The Door Lock --To be completed by David Nedzel

The Dorm Room Genie. The Door Lock --To be completed by David Nedzel The Door Lock The Dorm Room Genie Students are issued keys by which to access their rooms, but far too often a key is forgotten inside the room leaving someone locked out. After a lockout, a student must

More information

Is your current safety system compliant to today's safety standard?

Is your current safety system compliant to today's safety standard? Is your current safety system compliant to today's safety standard? Abstract It is estimated that about 66% of the Programmable Electronic Systems (PES) running in the process industry were installed before

More information

Generator Paralleling Controller, GPC-3 Hydro Start and stop sequences, water level control

Generator Paralleling Controller, GPC-3 Hydro Start and stop sequences, water level control MULTI-LINE 2 APPLICATION NOTES Generator Paralleling Controller, GPC-3 Hydro Start and stop sequences, water level control Application description Needed options Wiring diagrams Functional description

More information

Consumer Features. Reputed Security. Model 6060/6010

Consumer Features. Reputed Security. Model 6060/6010 Model 6060/6010 Magellan is an all-in-one wireless security system that combines high security, ease of use and unique consumer features with a designer look you may never have associated with security.

More information

( )

( ) Course Title: Fire Dynamics (3087) Course Number: FST - 3087 Course Credit Hours: (3) Three Semester Hours Instructor Information: Bernard W. Becker, III, MS (937-751-7371) ccfdchiefbecker@yahoo.com Textbook:

More information

Contents. Glossary

Contents. Glossary Contents Glossary ------------------------------------------------------------------------------------------------------ 6 1. Introduction to the IDS 1632 -------------------------------------------------------------

More information

Session Four Functional safety: the next edition of IEC Mirek Generowicz Engineering Manager, I&E Systems Pty Ltd

Session Four Functional safety: the next edition of IEC Mirek Generowicz Engineering Manager, I&E Systems Pty Ltd Abstract Session Four Functional safety: the next edition of IEC 61511 Mirek Generowicz Engineering Manager, I&E Systems Pty Ltd The functional safety standard IEC 61511 provides a framework for managing

More information

TSP-6: Solar Water Heater

TSP-6: Solar Water Heater TSP-6: Solar Water Heater Introduction A company called SmartOptions has developed a rugged, cheap solar hot water system for use in dry, remote areas such as outback Australia and the Solomon Islands.

More information

Multistate Alarm. Introduction

Multistate Alarm. Introduction Object Dictionary 1 Multistate Alarm Introduction The Multistate Alarm object adds the alarming capability for a Boolean or multistate attribute for any object, such as the Present Value of a Binary Input

More information

An Embedded Digital Sensor Against EM and BB Fault Injection. David El-Baze, Jean-Baptiste Rigaud, Philippe Maurine

An Embedded Digital Sensor Against EM and BB Fault Injection. David El-Baze, Jean-Baptiste Rigaud, Philippe Maurine An Embedded Digital Sensor Against EM and BB Fault Injection David El-Baze, Jean-Baptiste Rigaud, Philippe Maurine Agenda Context Fault Model Detector Design EM and BB Detection Results Optimisation Next

More information

Table of Contents PART I: The History and Current Status of the Industrial HMI PART II: Fundamentals of HMI Design and Best Practices

Table of Contents PART I: The History and Current Status of the Industrial HMI PART II: Fundamentals of HMI Design and Best Practices Table of Contents PART I: The History and Current Status of the Industrial HMI We begin with the origin and evolution of the industrial HMI. The positive and negative issues posed by the introduction of

More information

RVL471 Heating and Domestic Hot Water Controller Basic Documentation

RVL471 Heating and Domestic Hot Water Controller Basic Documentation RVL471 Heating and Domestic Hot Water Controller Basic Documentation Edition: 2.2 Controller series: C CE1P2524E 23.10.2002 Siemens Building Technologies HVAC Products 2/118 HVAC Products 23.10.2002 Contents

More information

Coupling Multiple Hypothesis Testing with Proportion Estimation in Heterogeneous Categorical Sensor Networks

Coupling Multiple Hypothesis Testing with Proportion Estimation in Heterogeneous Categorical Sensor Networks Advancing the Science of Information Coupling Multiple Hypothesis Testing with Proportion Estimation in Heterogeneous Categorical Sensor Networks DTRA SBIR Phase II Contract: W911SR-10-C-0038 Chris Calderon,

More information

Welcome to. Welcome to Security and Peace of Mind CASTLE CARE TECH CARE TECH CARE TECH CARE TECH

Welcome to. Welcome to Security and Peace of Mind CASTLE CARE TECH CARE TECH CARE TECH CARE TECH Welcome to Welcome to Security and Peace of Mind CARE TECH CARE TECH CARE TECH CASTLE CARE TECH Contents Introduction A1-3 Using Meridian with your PIN Code B1-7 Using Meridian with your Tag C1-8 When

More information

Challenger10 Users Manual

Challenger10 Users Manual Challenger10 Users Manual P/N MAUSER-TS1016 REV 01 ISS 18FEB13 Copyright Trademarks and patents Manufacturer Agency compliance Contact information 2013 UTC Fire & Security. All rights reserved. The Challenger

More information

IDS S E C U R I T Y IDS816. User Manual MANUAL NO B ISSUED DEC 2004 VERSION 2.00

IDS S E C U R I T Y IDS816. User Manual MANUAL NO B ISSUED DEC 2004 VERSION 2.00 INHEP DIGITAL IDS S E C U R I T Y IDS816 User Manual MANUAL NO. 700-283-01 B ISSUED DEC 2004 VERSION 2.00 Contents 1. Introduction to the IDS816... 4 2. Understanding the Keypad Indicators... 4 3. Programmable

More information

BRIDGING THE SAFE AUTOMATION GAP PART 1

BRIDGING THE SAFE AUTOMATION GAP PART 1 BRIDGING THE SAFE AUTOMATION GAP PART 1 Angela E. Summers, Ph.D., P.E, President, SIS-TECH Solutions, LP Bridging the Safe Automation Gap Part 1, Mary Kay O Conner Process Safety Center, Texas A&M University,

More information

Dryer Controller M720

Dryer Controller M720 User Manual Dryer Controller M720 Hardware version 2.00 Software version 2.00 Manual M720 Dryer controller Page 1 of 60 Document history Preliminary version: - Created in April, 2009 Hardware Version 2.00,

More information

IDS816 User Manual H Issued January 2009

IDS816 User Manual H Issued January 2009 1 Contents Glossary-------------------------------------------------------------------------------------------------------------------6 1. Introduction to the IDS 816---------------------------------------------------------------------------7

More information

Watchguard WGAP864 User Manual

Watchguard WGAP864 User Manual Watchguard WGAP864 User Manual v1.0 Issued September 2016 1 2 Table of Contents Glossary... 5 1. Introduction to your Watchguard WGAP864... 6 2. Before Operating your Alarm System... 6 3. Understanding

More information

Challenges and Methods of Estimating a Conceptual HVAC Design

Challenges and Methods of Estimating a Conceptual HVAC Design Challenges and Methods of Estimating a Conceptual HVAC Design ABSTRACT In any conceptual HVAC design, estimators are faced with the challenge of trying to capture all of the pieces that complete a system.

More information

Management of In-Bin Natural Air Grain Drying Systems to Minimize Energy Cost

Management of In-Bin Natural Air Grain Drying Systems to Minimize Energy Cost Know how. Know now. EC710 Management of In-Bin Natural Air Grain Drying Systems to Minimize Energy Cost Thomas W. Dorn, Extension Educator With prices for all energy sources rising dramatically in recent

More information

NOXSYS A SYSTEM FOR THE HIGHEST LEVEL OF SECURITY

NOXSYS A SYSTEM FOR THE HIGHEST LEVEL OF SECURITY A SYSTEM FOR THE HIGHEST LEVEL OF SECURITY EVERYTHING IN VIEW, EVERYTHING UNDER CONTROL NOXTPA touch control panel 20 20 20 Control unit 2 Control unit 3 Control unit 4 20 Management system NOXSYS 2 17

More information

DCS-3000 AutoCure Operating Manual

DCS-3000 AutoCure Operating Manual DCS-3000 AutoCure Operating Manual DCS-3000 AutoCure Control System 2011 110707 page 1 ABLE OF CONENS 1. Overview 2. AutoCure operation 3. Casing control 4. Set Up (Changing the way the instrument works)

More information

Dell DR Series Appliance Cleaner Best Practices

Dell DR Series Appliance Cleaner Best Practices Dell DR Series Appliance Cleaner Best Practices Dell Engineering June 2016 A Dell Best Practices Document Revisions Date July 2016 Description Initial release THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES

More information

Fuzzy Logic Based Coolant Leak Detection

Fuzzy Logic Based Coolant Leak Detection Volume 118 No. 5 2018, 825-832 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Fuzzy Logic Based Coolant Leak Detection 1 J.Suganthi, M.E., 2 G. Nithya,

More information

Applications and Examples

Applications and Examples Applications and Examples Comat AG Bernstrasse 4 CH-3076 Worb Tel. +41 (0)31 838 55 77 www.comat.ch info@comat.ch Fax +41 (0)31 838 55 99 Contents General remarks to the examples... 3 Applications, Examples

More information

Fire Evacuation Manual

Fire Evacuation Manual Fire Evacuation Manual PIONEER HOME OF THE PLAZA CLUB PLAZA PIONEER HOME OF THE PLAZA CLUB PLAZA Fire Evacuation Manual Table of Contents: Section 1: Overview 1 Section 2: The Evacuation Team 2-3 Section

More information

Standard ECMA th Edition - December Declared Noise Emission Values of Information Technology and Telecommunications Equipment

Standard ECMA th Edition - December Declared Noise Emission Values of Information Technology and Telecommunications Equipment Standard ECMA-109 4 th Edition - December 1996 Standardizing Information and Communication Systems Declared Noise Emission Values of Information Technology and Telecommunications Equipment Phone: +41 22

More information

Use of the application program

Use of the application program Contents overview Use of the application program Use of the application program 1 1. Functional description 2 Switching on / off 2 Dimming brighter / darker 2 Dimming value (8 bit) 3 Status Switching (1

More information

Advance Warning Flasher System at High Speed

Advance Warning Flasher System at High Speed Evaluation of Integrated t Platoon-Priority Pi it and Advance Warning Flasher System at High Speed Intersections Dr. Henry Liu Sundeep Bhimireddy Department of Civil Engineering University of Minnesota,

More information

Section 9. Comparing Energy Consumption: More for Your Money. What Do You See? What Do You Think? Investigate. Learning Outcomes

Section 9. Comparing Energy Consumption: More for Your Money. What Do You See? What Do You Think? Investigate. Learning Outcomes Section 9 Comparing Energy Consumption: More for Your Money Section 9 Comparing Energy Consumption: More for Your Money What Do You See? Learning Outcomes In this section, you will Measure and compare

More information

Leader s Guide Marcom Group Ltd.

Leader s Guide Marcom Group Ltd. 1520 EVACUATION PROCEDURES Leader s Guide Marcom Group Ltd. Structure and Organization Information in this program is presented in a definite order so that employees will see the relationships between

More information

OVEN INDUSTRIES, INC.

OVEN INDUSTRIES, INC. OVEN INDUSTRIES, INC. OPERATING MANUAL Model 5C7-252 TEMPERATURE CONTROLLER With PLC Inputs Introduction Thank you for purchasing our controller. The Model 5C7-252 is an exceptionally versatile unit and

More information

User Manual. Dryer Controller M720

User Manual. Dryer Controller M720 User Manual Dryer Controller M720 Hardware version 1.00 Software version 1.00 Preliminary version Manual M720 Dryer controller Page 1 of 42 Document history Preliminary version: - Created in April, 2009

More information

Equipment Required. WaveRunner Zi series Oscilloscope 10:1 High impedance passive probe. 3. Turn off channel 2.

Equipment Required. WaveRunner Zi series Oscilloscope 10:1 High impedance passive probe. 3. Turn off channel 2. FFT Analysis TEN MINUTE TUTORIAL February 27, 2012 Summary Fast Fourier Transform analysis is common on most digital oscilloscopes. It is used to view signals in the frequency as well as the time domain.

More information

Practical Distributed Control Systems (DCS) for Engineers & Technicians. Contents

Practical Distributed Control Systems (DCS) for Engineers & Technicians. Contents Practical Distributed Control Systems (DCS) for Engineers & Technicians Contents Chapter 1 Introduction to Computer Based Control Systems 1 1.1 Introduction to computer based measurement and control systems

More information

Pipo Communications. Model ST-888. DTMF ANI/ENI Display Decoder

Pipo Communications. Model ST-888. DTMF ANI/ENI Display Decoder Pipo Communications Model ST-888 DTMF ANI/ENI Display Decoder 1516 Cassil Place Hollywood, California 90028-7106 Phone: 323-466-5444 Fax: 323-466-1520 www.pipo.cc Manual # 68-9888 May 1, 2002 Rev. 5/02

More information

Assessment Target(s): 4 A: Apply mathematics to solve problems arising in everyday life, society, and the workplace.

Assessment Target(s): 4 A: Apply mathematics to solve problems arising in everyday life, society, and the workplace. MAT.06.PT.4.DGRDN.A.167 Claim 4 Sample Item ID: MAT.06.PT.4.DGRDN.A.167 Title: Design a Garden (DGRDN) Grade: 06 Primary Claim: Claim 4: Modeling and Data Analysis Students can analyze complex, real-world

More information

Common Questions & Answers

Common Questions & Answers Common Questions & Answers Summary of Advantages Honeywell has proven manufacturing and design capability, distribution expertise and the field training/support necessary for a successful partnership with

More information

IDS S E C U R I T Y IDS816. User Manual. MANUAL NO A ISSUED November 2004 VERSION 1.00

IDS S E C U R I T Y IDS816.  User Manual. MANUAL NO A ISSUED November 2004 VERSION 1.00 INHEP DIGITAL IDS S E C U R I T Y IDS816 User Manual MANUAL NO. 700-283-02A ISSUED November 2004 VERSION 1.00 Contents 1. Introduction to the IDS816... 4 2. Understanding the Keypad Indicators... 4 3.

More information

NEBRASKA MODIFIED ROOF POND: 1985 SUMMER PERFORMANCE RESULTS

NEBRASKA MODIFIED ROOF POND: 1985 SUMMER PERFORMANCE RESULTS NEBRASKA MODIFIED ROOF POND: 1985 SUMMER PERFORMANCE RESULTS by Drs. Bing Chen, Raymond Guenther, John Maloney, and John Kasher and Chuck Sloup, Jay Kratochvil, Tom Goetzinger Passive Solar Research Group

More information

Student Exploration: Seed Germination

Student Exploration: Seed Germination Name: Date: Student Exploration: Seed Germination Vocabulary: controlled experiment, germinate, hypothesis, mean, seed, trial, variable Prior Knowledge Question (Do this BEFORE using the Gizmo.) Plants

More information

COMP201: Software Engineering I. Assignment 1, Part 2 (2017/2018) (100% mark for Assignment 1 is 10% of COMP201 grade)

COMP201: Software Engineering I. Assignment 1, Part 2 (2017/2018) (100% mark for Assignment 1 is 10% of COMP201 grade) COMP201: Software Engineering I Assignment 1, Part 2 (2017/2018) (100% mark for Assignment 1 is 10% of COMP201 grade) Deadline for Assignment 1, (Part 1 and 2): 30 th of October 2017, 17:00 Please submit

More information

Growing a Crystal Garden

Growing a Crystal Garden TEACHER NOTES Lab zonetm Growing a Crystal Garden The following steps will walk you through the. Use the hints and detailed directions as you guide your students through the creation of their crystal gardens,

More information

Marlin Filament Monitoring October 2014

Marlin Filament Monitoring October 2014 Why is Filament Monitoring Useful? Marlin Filament Monitoring October 2014 There are a number of filament monitors and filament break detectors available which will generate an alarm if the filament runs

More information

Fire Prevention and Safety

Fire Prevention and Safety Volume XXIX For Staff Members in Long-Term Care Facilitator s Guide [1] in Long-Term Care A fire can be an unpredictable and frightening event. But a fire that occurs in a long-term care setting can completely

More information

MT Alliance Refrigeration Technician s Manual

MT Alliance Refrigeration Technician s Manual MICRO THERMO TECHNOLOGIES MT Alliance Refrigeration Technician s Manual Document No. 71-MTA-1007-R3.1 V4.1 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in

More information

THE 3 THINGS IKEA CAN T DO FOR YOUR KITCHEN DESIGN. A Publication of Inspired Kitchen Design

THE 3 THINGS IKEA CAN T DO FOR YOUR KITCHEN DESIGN. A Publication of Inspired Kitchen Design THE 3 THINGS IKEA CAN T DO FOR YOUR KITCHEN DESIGN A Publication of Inspired Kitchen Design IKEA sure seems like a one-stop-shop for your brand new kitchen. But scratch the surface and you ll find that

More information

How does the Goodnight level work with C-Bus, and how do I use the Goodnight level?

How does the Goodnight level work with C-Bus, and how do I use the Goodnight level? How does the Goodnight level work with C-Bus, and how do I use the Goodnight level? Overview. One of the most popular C-Bus home automation benefits from Clever Home involves allowing home owners to limit

More information

Guidance Note No 21/1. CE Marking Windows and doorsets to BS EN 16034

Guidance Note No 21/1. CE Marking Windows and doorsets to BS EN 16034 Guidance Note No 21/1 CE Marking Windows and doorsets to BS EN 16034 Introduction CE Marking of construction products has been a legal requirement since July 2013. It is a European requirement for all

More information

Tiny Houses: Everything You Need To Know Before Buying A Tiny House (Tiny Houses, Tiny House Living, Tiny Homes, Tiny House) Download Free (EPUB,

Tiny Houses: Everything You Need To Know Before Buying A Tiny House (Tiny Houses, Tiny House Living, Tiny Homes, Tiny House) Download Free (EPUB, Tiny Houses: Everything You Need To Know Before Buying A Tiny House (Tiny Houses, Tiny House Living, Tiny Homes, Tiny House) Download Free (EPUB, PDF) Use The Information In This Book To Help You Answer

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD IEC 61508-2 First edition 2000-05 BASIC SAFETY PUBLICATION Functional safety of electrical/electronic/ programmable electronic safety-related systems Part 2: Requirements for electrical/electronic/

More information

FILE # PLC LADDER LOGIC DIAGRAM FOR A GARAGE DOOR OPENER

FILE # PLC LADDER LOGIC DIAGRAM FOR A GARAGE DOOR OPENER 22 April, 2018 FILE # PLC LADDER LOGIC DIAGRAM FOR A GARAGE DOOR OPENER Document Filetype: PDF 258.01 KB 0 FILE # PLC LADDER LOGIC DIAGRAM FOR A GARAGE DOOR OPENER Ladder logic wiring diagram along with

More information

User s Guide. SUB-MA7240O-0001.OG.Solution doc. Created: 6/05/03. Last Updated: 23/09/03. MA7240AO-0001 Version 1.0

User s Guide. SUB-MA7240O-0001.OG.Solution doc. Created: 6/05/03. Last Updated: 23/09/03. MA7240AO-0001 Version 1.0 User s Guide SUB-MA7240O-0001.OG.Solution40-111.doc Created: 6/05/03 Last Updated: 23/09/03 MA7240AO-0001 Version 1.0 2 Table Of Contents User List...6 Quick Reference..7 Features...7 Keypad User's Guide...8

More information

User s Information Guide R2A

User s Information Guide R2A Pi HSC505 Home Security Controller User s Information Guide R2A Page 1 of 15 of its development program. 1This document and product are copyrighted and all rights are reserved. Introduction Convention

More information

Connections, displays and operating elements C D E G H. Installing the control unit

Connections, displays and operating elements C D E G H. Installing the control unit 1 2 3 GB Control unit 0-10 V REG-K/3-gang with manual mode Operating instructions Art. no. MTN646991 ¼ DANGER Risk of fatal injury from electrical current. All work on the device should only be carried

More information

COMP201: Software Engineering I. Assignment 1, Part 1 (2017/2018) (100% mark for Assignment 1 is 10% of COMP201 grade)

COMP201: Software Engineering I. Assignment 1, Part 1 (2017/2018) (100% mark for Assignment 1 is 10% of COMP201 grade) COMP201: Software Engineering I Assignment 1, Part 1 (2017/2018) (100% mark for Assignment 1 is 10% of COMP201 grade) Deadline for Assignment 1, (Part 1 and 2): 30 th of October 2017, 17:00 Please submit

More information

Study and Design Considerations of HRSG Evaporators in Fast Start Combined Cycle Plants. Govind Rengarajan, P.E.CEM, Dan Taylor

Study and Design Considerations of HRSG Evaporators in Fast Start Combined Cycle Plants. Govind Rengarajan, P.E.CEM, Dan Taylor Study and Design Considerations of HRSG Evaporators in Fast Start Combined Cycle Plants Govind Rengarajan, P.E.CEM, Dan Taylor CMI Energy, Erie PA 1651 Bernd Pankow P.E, Pankow Engineering Abstract Combined

More information

NESS 5000 SERIES DIALLER

NESS 5000 SERIES DIALLER NESS 5000 SERIES DIALLER INSTALLATION MANUAL This manual is designed to provide the installation instructions on the NESS SECURITY PRODUCT'S 5000 SERIES Dialler. For complete details on the warranty or

More information

GE Security. Challenger V8 & V9. User Manual

GE Security. Challenger V8 & V9. User Manual GE Security Challenger V8 & V9 User Manual Copyright Disclaimer Trademarks and patents Intended use Copyright 2008, GE Security Pty. Ltd.. All rights reserved. This document may not be copied or otherwise

More information