Generates sequence code, Computer Engineering

The basic project will have each group generate a sequence of 1's and 0's using  the Motorola 688HC11 board to turn ON and then turn OFF the TV set installed in ATRC 306. Each television set has its own protocol to decode  the  input signal.   The TAs will give you the sequence of items you will need to produce.

The aim of the project is to reproduce those IR LED signals to turn your board into TV remote control. You can use timers and interrupts in order to generate the sequence by blinking the IR LED connected to one of the port pins.  It is advisable to use additional LEDs to help you debug items that are being generated.  Also, it is advisable to use the other ports of the 68HC11 to help you with generating the data, such as the timer,

What to Hand in? -

1.  Program code (.lst file) that successfully generates sequence code along with project report.  

2.  A demo must be given to the TAs showcasing the design of your design.

3.  Report guidelines will be uploaded on ecen3213 website.

Posted Date: 3/12/2013 2:43:34 AM | Location : United States







Related Discussions:- Generates sequence code, Assignment Help, Ask Question on Generates sequence code, Get Answer, Expert's Help, Generates sequence code Discussions

Write discussion on Generates sequence code
Your posts are moderated
Related Questions
What are the disadvantages of file processing system?

With the help of a truth table explain the working of a half subtractor. Draw the logic diagram using gates. Ans: Half Subtractor: For the subtraction of B (subtrahend) f

Why does DMA have priority over the CPU when both request a memory transfer? The data transfer monitored by DMA controller which is called as DMA channel. The CPU is included o


Write a recursive algorithm to count the number of right children in a binary search tree. Write the method levelCount whose header is given below. Method levelCount returns

Q. Illustration what is the cause of Brownian motion? Answer:- Molecules in a gas move freely, randomly, constantly in all directions and at high speeds. They are capable

What are the advantages of Public Key Cryptography? Advantages of Public Key Cryptography are illustrated in below: a) Increased convenience and security and b) Electro

The transport protocol used by TFTP (Trivial File Transfer Protocol) is? The transport protocol used through Trivial File Transfer Protocol is UDP.

What is meant by hotspots? A Hotspot is a list area where the mouse pointer appears as an upright hand symbol. When a user points to that area (and the hand cursor is active),

What are the disadvantages of Bespoke Software -  Very dependent on suppliers of the software; if they go out of business there would be little or no support if problems occ